Build

Regressions (compared to v6.12.8-157-gcab9a964396d)

dragonboard-845c, ltp-controllers

qemu-arm64-compat, ltp-syscalls

qemu-arm64, ltp-fs

qemu-armv7, ltp-fs

qemu-i386, kselftest-seccomp

qemu-i386, kselftest-tc-testing

qemu-x86_64-compat, ltp-fs

qemu-x86_64, ltp-sched

qemu-x86_64, kselftest-seccomp

qemu-x86_64, kselftest-timers

x15, ltp-controllers

Fixes (compared to v6.12.8-157-gcab9a964396d)

dragonboard-845c-compat, ltp-fs

qemu-arm64-compat, ltp-syscalls

qemu-riscv64, ltp-fs

qemu-x86_64-compat, ltp-cve

qemu-x86_64, kselftest-x86

Build Parser (compared to v6.12.8-157-gcab9a964396d)

i386, log-parser-build-clang

i386, log-parser-build-gcc

s390, log-parser-build-clang

s390, log-parser-build-gcc

x86_64, log-parser-build-clang

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.12.8-157-gcab9a964396d)

dragonboard-410c, log-parser-boot

dragonboard-845c-compat, log-parser-boot

qemu-arm64, log-parser-boot

qemu-x86_64, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.12.8-157-gcab9a964396d)

dragonboard-410c, log-parser-test

dragonboard-845c, log-parser-test

e850-96, log-parser-test

fvp-aemva, log-parser-test

qemu-arm64, log-parser-test

qemu-armv7, log-parser-test

qemu-i386, log-parser-test

qemu-riscv64, log-parser-test

qemu-x86_64, log-parser-test

x15, log-parser-test

Test log snippets

test log snippet regressions 2

Home

memcontrol03 memcontrol03
memcontrol03.c:144: TINFO: Child 41979 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 41980 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 41981 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:150: TBROK: tst_checkpoint_wait(1, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:107: TINFO: Child 41982 in trunk_G: Allocating anon: 155189248
memcontrol03.c:121: TPASS: Child 41982 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=53968896) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=29020160) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=23642112) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:150: TBROK: tst_checkpoint_wait(1, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:107: TINFO: Child 41983 in trunk_G: Allocating anon: 178257920
memcontrol03.c:116: TPASS: Child 41983 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52699136) ~= 52428800
memcontrol03.c:77: TBROK: tst_checkpoint_wake(1, 3, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:77: TWARN: tst_checkpoint_wake(1, 3, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:144: TINFO: Child 41993 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 41994 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 41995 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:107: TINFO: Child 41996 in trunk_G: Allocating anon: 155189248
memcontrol03.c:121: TPASS: Child 41996 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=53977088) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=29069312) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=23719936) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:107: TINFO: Child 41997 in trunk_G: Allocating anon: 178257920
memcontrol03.c:116: TPASS: Child 41997 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52744192) ~= 52428800
memcontrol03.c:144: TINFO: Child 42006 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 42007 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 42008 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:107: TINFO: Child 42009 in trunk_G: Allocating anon: 155189248
memcontrol03.c:121: TPASS: Child 42009 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=54046720) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=29179904) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=23781376) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:107: TINFO: Child 42010 in trunk_G: Allocating anon: 178257920
memcontrol03.c:116: TPASS: Child 42010 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52236288) ~= 52428800
memcontrol03.c:144: TINFO: Child 42034 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 42035 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 42036 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:107: TINFO: Child 42037 in trunk_G: Allocating anon: 155189248
memcontrol03.c:121: TPASS: Child 42037 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=53805056) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=28753920) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=24006656) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:107: TINFO: Child 42038 in trunk_G: Allocating anon: 178257920
memcontrol03.c:116: TPASS: Child 42038 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52252672) ~= 52428800

test log snippet regressions 3

Home

getrusage04 getrusage04
getrusage04    0  TINFO  :  Expected timers granularity is 4000 us
getrusage04    0  TINFO  :  Using 1 as multiply factor for max [us]time increment (1000+4000us)!
getrusage04    0  TINFO  :  utime:        9652us; stime:       75302us
getrusage04    0  TINFO  :  utime:        9944us; stime:       80561us
getrusage04    1  TFAIL  :  getrusage04.c:133: stime increased > 5000us:

test log snippet regressions 4

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 57982ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 60873ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 27463ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 31276ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 21454ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 43178ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 16644ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 18578ms

test log snippet regressions 5

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 25303ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 27000ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 21225ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 25381ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 14753ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 17421ms
fs_fill.c:115: TINFO: Running 4 writer threads

test log snippet regressions 6

Home

seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 pass
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped fail
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total pass
seccomp_seccomp_benchmark fail

test log snippet regressions 7

Home

seccomp_seccomp_benchmark_entry_2_bitmapped fail

test log snippet regressions 8

Home

tc-testing_tdc_sh_4524__Add_flow_filter_with_map_key_rshift_ops fail

test log snippet regressions 9

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 19229ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 38321ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 22230ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 6787ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 16202ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 4478ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 11054ms

test log snippet regressions 10

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 262434us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 11

Home

seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped fail

test log snippet regressions 12

Home

timers_posix_timers_check_signal_distribution fail

test log snippet regressions 13

Home

memcontrol03 memcontrol03
memcontrol03.c:144: TINFO: Child 30108 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 30109 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 30110 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:107: TINFO: Child 30111 in trunk_G: Allocating anon: 155189248
memcontrol03.c:121: TPASS: Child 30111 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=54169600) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=29159424) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=23805952) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:107: TINFO: Child 30113 in trunk_G: Allocating anon: 178257920
memcontrol03.c:116: TPASS: Child 30113 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52473856) ~= 52428800
memcontrol03.c:144: TINFO: Child 30120 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 30121 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 30122 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:107: TINFO: Child 30124 in trunk_G: Allocating anon: 155189248
memcontrol03.c:150: TBROK: tst_checkpoint_wait(1, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:121: TPASS: Child 30124 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=54091776) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=29179904) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=23769088) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:107: TINFO: Child 30125 in trunk_G: Allocating anon: 178257920
memcontrol03.c:150: TBROK: tst_checkpoint_wait(1, 10000) failed:[  323.422576] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),oom_memcg=/ltp/test-30094/trunk_A,task_memcg=/ltp/test-30094/trunk_A/trunk_G,task=memcontrol03,pid=30125,uid=0
memcontrol03.c:116: TPASS: Child 30125 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52649984) ~= 52428800
memcontrol03.c:77: TBROK: tst_checkpoint_wake(1, 3, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:77: TWARN: tst_checkpoint_wake(1, 3, 10000) failed: ETIMEDOUT (110)
memcontrol03.c:144: TINFO: Child 30133 in leaf_C: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 30134 in leaf_D: Allocating pagecache: 52428800
memcontrol03.c:144: TINFO: Child 30135 in leaf_F: Allocating pagecache: 52428800
memcontrol03.c:107: TINFO: Child 30137 in trunk_G: Allocating anon: 155189248
memcontrol03.c:121: TPASS: Child 30137 exited
memcontrol03.c:208: TPASS: Expect: (A/B memory.current=54181888) ~= 52428800
memcontrol03.c:214: TPASS: Expect: (A/B/C memory.current=29200384) ~= 34603008
memcontrol03.c:216: TPASS: Expect: (A/B/D memory.current=23818240) ~= 17825792
memcontrol03.c:218: TPASS: Expect: (A/B/E memory.current=0) ~= 0
memcontrol03.c:107: TINFO: Child 30138 in trunk_G: Allocating anon: 178257920
memcontrol03.c:116: TPASS: Child 30138 killed by OOM
memcontrol03.c:224: TPASS: Expect: (A/B memory.current=52518912) ~= 52428800

test log snippet build parser 2

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-1ed045.o: warning: relocation in read-only section `.text'

test log snippet build parser 3

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-0f13f0.o: warning: relocation in read-only section `.text'

test log snippet build parser 4

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-e6f2b8.o: warning: relocation in read-only section `.text'

test log snippet build parser 5

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-f82030.o: warning: relocation in read-only section `.text'

test log snippet build parser 6

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccebFFb0.o: warning: relocation in read-only section `.text'

test log snippet build parser 7

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccFRR0Y1.o: warning: relocation in read-only section `.text'

test log snippet build parser 8

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccp6nVUY.o: warning: relocation in read-only section `.text'

test log snippet build parser 9

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccqyhzK5.o: warning: relocation in read-only section `.text'

test log snippet build parser 10

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccTDBjkq.o: warning: relocation in read-only section `.text'

test log snippet build parser 11

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccUKzunm.o: warning: relocation in read-only section `.text'

test log snippet build parser 12

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccXcbyuS.o: warning: relocation in read-only section `.text'

test log snippet build parser 13

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccx714LU.o: warning: relocation in read-only section `.text'

test log snippet build parser 14

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cciqFdor.o: warning: relocation in read-only section `.text'

test log snippet build parser 15

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc0I4z9s.o: warning: relocation in read-only section `.text'

test log snippet build parser 16

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cclkTCx6.o: warning: relocation in read-only section `.text'

test log snippet build parser 17

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccnmomMx.o: warning: relocation in read-only section `.text'

test log snippet build parser 18

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc6OCbpj.o: warning: relocation in read-only section `.text'

test log snippet build parser 19

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc4SDj8D.o: warning: relocation in read-only section `.text'

test log snippet build parser 20

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccZIATrm.o: warning: relocation in read-only section `.text'

test log snippet build parser 21

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest_install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cczKevf6.o: warning: relocation in read-only section `.text'

test log snippet build parser 22

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/io_uring/io_uring.c:61:
In file included from /builds/linux/include/net/sock.h:46:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:701:20: warning: In file included from /builds/linux/kernel/sched/fair.c:38:

test log snippet build parser 23

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/proc/stat.c:16:
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
(PCI_IOB/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  ASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 24

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/s390/cio/ioasm.c:9:
In file included from /builds/linux/arch/s390/include/asm/chpid.h:10:
In file included from /builds/linux/arch/s390/include/asm/cio.h:10:
In file included from /builds/linux/arch/s390/include/asm/dma-types.h:7:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
693 |         readsb(PCI_IOBASE + addr, buffer,/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 25

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/proc/stat.c:16:
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
701 |         readsw/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 26

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/proc/stat.c:16:
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
sb(PCI_/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 27

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/proc/stat.c:16:
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
:693:20: warning: /builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 28

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/proc/stat.c:16:
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
718 |         write/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 29

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/crypto/crypto_user.c:14:
In file included from /builds/linux/include/net/netlink.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
addr, b/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from u/builds/linux/include/linux/skbuff.he:)28,:
In file included from  /builds/linux/include/linux/dma-mapping.hP:C11I:
addr, b/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 30

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/inet.h:42:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
al = __le16_to_/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  c709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 31

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.h:39:
In file included from /builds/linux/include/linux/if_link.h:5:
In file included from /builds/linux/include/uapi/linux/if_link.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
BASE + addr,/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^
 buffer, cou/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  nt);
      |                ~~~~~~~~~~ ^

test log snippet build parser 32

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from u/builds/linux/include/linux/skbuff.he:)28,:
In file included from  /builds/linux/include/linux/dma-mapping.hP:C11I:
CI_IOBA/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 33

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/sock_diag.h:5:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
37 | #define _/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  _le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
727/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^
 |         writesw(PCI_IOBASE + In file included from /builds/linux/net/ipv4/tcp_diag.c:10:

test log snippet build parser 34

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/trace/events/block.h:8:
In file included from /builds/linux/include/linux/blktrace_api.h:5:
In file included from /builds/linux/include/linux/blk-mq.h:8:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
dr, buf/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 35

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/crypto/crypto_user.c:14:
In file included from /builds/linux/include/net/netlink.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
dsb(PCI/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 36

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.h:39:
In file included from /builds/linux/include/linux/if_link.h:5:
In file included from /builds/linux/include/uapi/linux/if_link.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
eadsb(PCI_IOBASE /builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 37

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/nfs/sysfs.c:11:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
ffer, co/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 38

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/net/tap.c:2:
In file included from /builds/linux/include/linux/etherdevice.h:/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 39

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/linux/netdevice.h:38/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 40

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 41

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/inet.h:42:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 42

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/net/af_unix.h:9:
In file included from /builds/linux/include/net/sock.h/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 43

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/net/ipv6/ipcomp6.c:24:
In file included from /builds/linux/include/net/ip.h:22:
In file included from /builds/linux/include/linux/ip.h:16:
In file included from /builds/linux/include/linux/skbuff.hIn file included from :28/builds/linux/net/handshake/netlink.c:
/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]In file included from 

test log snippet build parser 44

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/net/ipv6/ip6_icmp.c:3:
In file included from /builds/linux/include/linux/icmpv6.h:5:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:548:31: warning: 12 warnings generated.

test log snippet build parser 45

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/crypto/crypto_user.c:14:
In file included from /builds/linux/include/net/netlink.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
_IOBA/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 46

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from u/builds/linux/include/linux/skbuff.he:)28,:
In file included from  /builds/linux/include/linux/dma-mapping.hP:C11I:
itesb(P/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 47

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/asm-generic/io.h/builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
itesb(PCI_IOBA/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 48

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/net/openvswitch/flow_table.c:6:
In file included from /builds/linux/net/openvswitch/flow.h:11:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
le32 __force)__raw_readl(PCI_IOB/builds/linux/include/asm-generic/io.h:701:20: warning: ASE performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buf+ addfer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 49

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/net/ethtool/netlink.h:6:
In file included from /builds/linux/include/linux/ethtool_netlink.h:6:
In file included from /builds/linux/include/uapi/linux/ethtool_netlink.h:12:
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
 __le16_to_cpu((/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 50

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from In file included from /builds/linux/drivers/nvme/host/pr.c:10:
In file included from /builds/linux/drivers/nvme/host/nvme.h:11:
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/net/netfilter/ipset/ip_set_getport.c/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^

test log snippet build parser 51

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/net/ip.h:22:
In file included from   /builds/linux/include/linux/ip.h605: | 16        :
(PCI_IOBA/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 52

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/inet.h:42:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
pu((__le1/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  6718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^
 __force)/builds/linux/include/asm-generic/io.h_:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 53

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/if_vlan.h:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
r, buffer, count)/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 54

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.h:39:
In file included from /builds/linux/include/linux/if_link.h:5:
In file included from /builds/linux/include/uapi/linux/if_link.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
605 |         __raw_/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 55

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
595 |         __raw_write/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  w((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 56

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
585 |         __raw_writeb/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  (value, PCI_IOBASE + addr);
      |                             ~~~~~~~~~~ ^

test log snippet build parser 57

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/gpu/drm/drm_vblank.c:37:
In file included from /builds/linux/include/drm/drm_vblank.h:32:
In file included from /builds/linux/include/drm/drm_file.h:39:
In file included from /builds/linux/include/drm/drm_prime.h:37:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
693 |         reads/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  b(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 58

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/fs/nfs/sysfs.c:11:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  701 |         readsw(PCI_IOBASE + addr, bu/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 59

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/md/dm-vdo/memory-alloc.h:10:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
ritesb(PCI_IOBASE /builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 60

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/crypto/crypto_user.c:14:
In file included from /builds/linux/include/net/netlink.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
SE + /builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 61

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from u/builds/linux/include/linux/skbuff.he:)28,:
In file included from  /builds/linux/include/linux/dma-mapping.hP:C11I:
SE + ad/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 62

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/gpu/drm/drm_vblank.c:37:
In file included from /builds/linux/include/drm/drm_vblank.h:32:
In file included from /builds/linux/include/drm/drm_file.h:39:
In file included from /builds/linux/include/drm/drm_prime.h:37:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
sl(PCI_/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 63

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from u/builds/linux/include/linux/skbuff.he:)28,:
In file included from  /builds/linux/include/linux/dma-mapping.hP:C11I:
uffer, c/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 64

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/if_vlan.h:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
574 |         val =/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   __le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.h:39:
In file included from /builds/linux/include/linux/if_link.h:5:
In file included from /builds/linux/include/uapi/linux/if_link.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
574 |         val =/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   __le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^

test log snippet build parser 65

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/net/sock.h:46:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  561 |         val = __le16_to_cpu/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 66

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  574 |         val/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   = __le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:35:59: note: expanded from macro '__le32_to_cpu'
   35 | #define __le32_to_cpu(x) __swab32((__force __u32)(__le32)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:115:54: note: expanded from macro '__swab32'
  115 | #define __swab32(x) (__u32)__builtin_bswap32((__u32)(x))
      |                                                      ^

test log snippet build parser 67

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/net/ip.h:22:
In file included from   /builds/linux/include/linux/ip.h605: | 16        :
:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/asm-generic/io.h
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 68

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/net/xfrm/xfrm_algo.c:15:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
w(PCI_I/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  OBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 69

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/gpu/drm/drm_vblank.c:37:
In file included from /builds/linux/include/drm/drm_vblank.h:32:
In file included from /builds/linux/include/drm/drm_file.h:39:
In file included from /builds/linux/include/drm/drm_prime.h:37:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
736 |         write/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 70

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/sock_diag.h:5:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  718 |         writesb(PCI_/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 71

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/net/xfrm/xfrm_algo.c:15:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
736 |         writesl(/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 72

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/uapi/linux/ethtool.h:19:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
(x) (__u16)__buil/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 73

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/sunrpc/clnt.h:19:
In file included from /builds/linux/include/linux/sunrpc/msg_prot.h:205:
In file included from /builds/linux/include/linux/inet.h:42:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
 addr, b/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 74

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_app.c:21:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
addr, bu/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  ffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 75

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/net/sock.h:46:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
+ addr, buffer, c/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 76

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
ASE + addr, bu/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 77

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/lib/dynamic_debug.c:38:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
BASE +/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^
 addr, /builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 78

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/md/dm-vdo/indexer/geometry.c:13:
In file included from /builds/linux/drivers/md/dm-vdo/memory-alloc.h:10:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
BASE/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^
 + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 79

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/if_arp.h:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
b(PCI_IOBAS/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  E + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 80

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/md/dm-vdo/indexer/geometry.c:13:
In file included from /builds/linux/drivers/md/dm-vdo/memory-alloc.h:10:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
CI_IO/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 81

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv4/ip_vti.c:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
   35 | #d/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 82

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  102 | #def/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 83

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
37 | #define/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^
 __le16/builds/linux/include/asm-generic/io.h_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
:/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 84

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv4/ip_vti.c:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
efine __/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 85

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
esb(PCI_IOBASE + /builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 86

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
fer, count);/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

      |                 ~~~~~~~~~~ ^

test log snippet build parser 87

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/infiniband/core/nldev.c:37:
In file included from /builds/linux/include/net/netlink.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:709:20: warning: In file included from performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 88

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/scsi/libsas/sas_scsi_host.c:15:
In file included from /builds/linux/drivers/scsi/libsas/sas_internal.h:13:
In file included from /builds/linux/include/scsi/scsi_host.h:11:
In file included from /builds/linux/include/linux/blk-mq.h:8:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]12 warnings generated.

  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 89

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/net/qeth_l2_main.c:19:
/builds/linux/include/linux/etherdevice.h:/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 90

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv4/ip_vti.c:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/uapi/linux/byteorder/big_endian.h:35:59: /builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 91

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/uapi/linux/byteorder/big_endian.h:/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 92

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/char/con3270.c:23:
In file included from /builds/linux/include/linux/memblock.h:13:
In file included from /builds/linux/arch/s390/include/asm/dma.h:5:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
IOBA/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 93

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/fs/nfsd/lockd.c:11:
In file included from /builds/linux/include/linux/lockd/bind.h:15:
In file included from /builds/linux/include/linux/lockd/xdr.h:15:
In file included from /builds/linux/include/linux/nfs.h:12:
In file included from /builds/linux/include/linux/sunrpc/auth.h:13:
In file included from /builds/linux/include/linux/sunrpc/sched.h:19:
In file included from /builds/linux/include/linux/sunrpc/xdr.h:17:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
IOBASE + /builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  addr);
      |                           ~~~~~~~~~~ ^

test log snippet build parser 94

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv4/ip_vti.c:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
le32_to_c/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  pu(x) __swab32((__force __u32)(__le32)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:115:54: note: expanded from macro '__swab32'
  115 | #define __swab32(x) (__u32)__builtin_bswap32((__u32)(x))
      |                                                      ^

test log snippet build parser 95

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/net/netfilter/nft_meta.c:/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 96

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/char/con3270.c:23:
In file included from /builds/linux/include/linux/memblock.h:13:
In file included from /builds/linux/arch/s390/include/asm/dma.h:5:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
PCI_/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 97

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/lib/dynamic_debug.c:38:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
(PCI_IO/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 98

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv6/ip6_fib.c:23:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
(PCI_IOB/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 99

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/crypto/scatterwalk.h:18:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
PCI_IOBASE + a/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 100

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/crypto/scatterwalk.h:18:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
(PCI_IOBASE + addr,/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
b/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 101

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
__raw_readw(PCI_I/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 102

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/lib/dynamic_debug.c:38:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
693 |         readsb/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  (PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 103

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/crypto/zcrypt_api.h:20:
In file included from /builds/linux/drivers/s390/crypto/ap_bus.h:20:
In file included from /builds/linux/arch/s390/include/asm/ap.h:15:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  709 |         readsl(PCI_/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 104

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_app.c:21:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
701 |         readsw/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 105

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/lib/crypto/mpi/mpi-mod.c:8:
In file included from /builds/linux/lib/crypto/mpi/mpi-internal.h:24:
In file included from /builds/linux/include/linux/mpi.h:21:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
readsw(P/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  CI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 106

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/fs/nfsd/lockd.c:11:
In file included from /builds/linux/include/linux/lockd/bind.h:15:
In file included from /builds/linux/include/linux/lockd/xdr.h:15:
In file included from /builds/linux/include/linux/nfs.h:12:
In file included from /builds/linux/include/linux/sunrpc/auth.h:13:
In file included from /builds/linux/include/linux/sunrpc/sched.h:19:
In file included from /builds/linux/include/linux/sunrpc/xdr.h:17:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
701 |         readsw(PCI_/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 107

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
        readsw(PCI_IOBASE + addr, b/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 108

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
s/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^
 generated.

test log snippet build parser 109

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/char/con3270.c:23:
In file included from /builds/linux/include/linux/memblock.h:13:
In file included from /builds/linux/arch/s390/include/asm/dma.h:5:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
SE +/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^
 addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 110

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/lockd/bind.h:15:
In file included from /builds/linux/include/linux/lockd/xdr.h:15:
In file included from /builds/linux/include/linux/nfs.h:12:
In file included from /builds/linux/include/linux/sunrpc/auth.h:13:
In file included from /builds/linux/include/linux/sunrpc/sched.h:19:
In file included from /builds/linux/include/linux/sunrpc/xdr.h:17:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
574 |         val = _/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  _le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:35:59: note: expanded from macro '__le32_to_cpu'
   35 | #define __le32_to_cpu(x) __swab32((__force __u32)(__le32)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:115:54: note: expanded from macro '__swab32'
  115 | #define __swab32(x) (__u32)__builtin_bswap32((__u32)(x))
      |                                                      ^

test log snippet build parser 111

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/tick.h:8:
In file included from /builds/linux/include/linux/clockchips.h:14:
In file included from /builds/linux/include/linux/clocksource.h:22:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
561 |         val = /builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
718/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
    |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 112

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
548 |         val = __raw_rea/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 113

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/if_arp.h:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
:709:20: warning: /builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  605 |         __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 114

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/if_arp.h:22:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
 warnings/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   generated.

test log snippet build parser 115

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/cio/eadm_sch.c:18:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
736 |         writes/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  l(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 116

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/lib/dynamic_debug.c:38:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
718 |         writesb/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv6/ip6_fib.c:23:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
718 |         writesb/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 117

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/mlx5/driver.h:38:
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
  In file included from 548/builds/linux/arch/s390/include/asm/io.h | :        95v:
a/builds/linux/include/asm-generic/io.h:574:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 118

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
adsb(PCI/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  _IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 119

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
AS/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 120

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
ASE + ad/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  dr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 121

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from c/builds/linux/arch/s390/include/asm/io.hp:u95_:
BASE +/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^
 add/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 122

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/char/diag_ftp.c:15:
In file included from /builds/linux/include/linux/irq.h:20:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
C/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 123

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  102 | #def/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 124

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
37 | #define /builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
701/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^
 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 125

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
37 | #define __le16_to_cp/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 126

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
dr, buffer, cou/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  nt);
      |                ~~~~~~~~~~ ^

test log snippet build parser 127

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/iommu.h:10:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
e __/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  605 |         __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 128

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
E /builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 129

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
E + addr,/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 130

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/crypto/vfio_ap_private.h:20:
In file included from /builds/linux/include/linux/kvm_host.h:19:
In file included from /builds/linux/include/linux/msi.h:24:
In file included from /builds/linux/include/linux/irq.h:20:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
e32_/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 131

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from c/builds/linux/arch/s390/include/asm/io.hp:u95_:
eadsb(/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 132

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/iommu.h:10:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
_forc/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 133

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/mpi.h:21:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
__force)cpu_/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 134

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/char/diag_ftp.c:15:
In file included from /builds/linux/include/linux/irq.h:20:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
I/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
_I/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 135

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:In file included from /builds/linux/net/ceph/decode.c:4:
In file included from /builds/linux/include/linux/inet.h:42:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/arch/s390/include/asm/io.h/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 136

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/nft_payload.c:10:
In file included from /builds/linux/include/linux/if_vlan.h:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/dma-mapping.h:/builds/linux/include/asm-generic/io.h11:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 137

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from In file included from /builds/linux/net/ipv6/ip6_tunnel.c:23:
In file included from /builds/linux/include/linux/icmp.h:16:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/linux/inet.h:42/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 138

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/io.h:14 warning:
sb(PCI_IOBASE + addr, b/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/io.h:14 warning:
/builds/linux/include/asm-generic/io.h:548:31: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 139

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/scatterlist.h:/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 140

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/nf_sockopt.c:5:
In file included from /builds/linux/include/linux/skbuff.h:/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/skbuff.h/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 141

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/virtio_config.h:7:
In file included from /builds/linux/include/linux/virtio.h:7/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 142

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/rds/rds.h:5:
In file included from /builds/linux/include/net/sock.h/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  :701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 143

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/fs/fs_context.c:22:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/rdma/ib_verbs.h:15/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 144

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/fs/fs_context.c:22:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/rdma/uverbs_types.h:/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 145

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/md/dm-vdo/indexer/volume.c:14:
In file included from /builds/linux/drivers/md/dm-vdo/memory-alloc.h:10:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/net/rds/ib_ring.c:/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  35693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 146

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/lib/dynamic_debug.c:38:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:709:20: warning: /builds/linux/include/uapi/linux/swab.hperforming pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]:

test log snippet build parser 147

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/crypto/zcrypt_ep11misc.c:20:
In file included from /builds/linux/drivers/s390/crypto/ap_bus.h:20:
In file included from /builds/linux/arch/s390/include/asm/ap.h:15:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:709:20: warning: In file included from performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 148

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 149

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/vfio/group.c:13:
In file included from /builds/linux/include/linux/vfio.h:12:
In file included from In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc_tun_mplsoudp.c:4:
In file included from /builds/linux/include/net/bareudp.h:6:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:548:31: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'

  102 | #define __swab16(x)   (548_ | _u        1v6a)l_ _=b _u_irlatwi_nr_ebasdwba(pP1C6(I(__I_Ou1B6A)S(Ex ))+
       a|                                                      ^d

test log snippet build parser 150

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/infiniband/core/uverbs_std_types_qp.c:6:
In file included from /builds/linux/include/rdma/uverbs_std_types.h:9:
In file included from /builds/linux/include/rdma/uverbs_types.h:10:
In file included from /builds/linux/include/rdma/ib_verbs.h:15:
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]In file included from 

test log snippet build parser 151

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_ipcomp.c:16:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:736:21:/builds/linux/include/asm-generic/io.h :595:59: warning: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]595 |         __raw_wr

test log snippet build parser 152

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
_le1/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  605 |         __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/bonding/bond_netlink.c:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
le16)(/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 153

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/s390/char/diag_ftp.c:15:
In file included from /builds/linux/include/linux/irq.h:20:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
l(P/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 154

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
OB/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 155

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from c/builds/linux/arch/s390/include/asm/io.hp:u95_:
PCI_IO/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 156

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
PCI_IOBA/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727S |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 157

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  605 |         __raw_write

test log snippet build parser 158

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/mlx5/driver.h:38:
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
585 |         __raw_writeb(/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  value, PCI_IOBASE + addr);
      |                             ~~~~~~~~~~ ^

test log snippet build parser 159

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/mlx5/driver.h:38:
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
605 |         __raw_writel(/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_(writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 160

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/fs/nfs/super.c:34:
In file included from /builds/linux/include/linux/sunrpc/clnt.h:19:
In file included from /builds/linux/include/linux/sunrpc/msg_prot.h:205:
In file included from /builds/linux/include/linux/inet.h:42:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
595 |         __raw_writew/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  605 |         __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 161

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/sunrpc/auth_gss/gss_generic_token.c:37:
In file included from /builds/linux/include/linux/sunrpc/sched.h:19:
In file included from /builds/linux/include/linux/sunrpc/xdr.h:17:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
rce)cpu/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  _to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 162

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/xsk/setup.c:4:
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/xsk/setup.h:7:
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en.h:35:
In file included from /builds/linux/include/linux/if_vlan.h:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
693 |         readsb/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 163

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
693 |         readsb(PCI_IOBASE/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));+
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
    addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 164

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
709 |         readsl(/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
709 |         readsl/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 165

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
sl(PCI_IOB/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 166

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
6_to_cpu((__le16 __force)__raw_readw(PCI/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  693 |         readsb(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 167

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
561 |         val = /builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_connlabel.c:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
561 |         val =/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
727/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
    | 37        wr | it#edsewf(iPnCeI __I_OlBASEe 1+6 _atdod_rc,p ub(uxf)f e_r_,s wcaobu1n6t()(;_

test log snippet build parser 168

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  548 |         val = __raw_rea/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  db(PCI_IOBASE + addr);
      |                           ~~~~~~~~~~ ^

test log snippet build parser 169

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
 |         val = __raw_read/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  b(PCI_IOBASE + addr);
      |                           ~~~~~~~~~~ ^

test log snippet build parser 170

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/net/netlink.h:6:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
548 |         val = __raw_readb(/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 171

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv4/metrics.c:2:
In file included from /builds/linux/include/linux/netlink.h:7:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
:718:21: warning: /builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
warning: /builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 172

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/ipvs/ip_vs_pe.c:12:
In file included from /builds/linux/include/net/ip_vs.h:24:
In file included from /builds/linux/include/linux/netfilter.h:6:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
736 |         write/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 173

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/xsk/setup.c:4:
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/xsk/setup.h:7:
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en.h:35:
In file included from /builds/linux/include/linux/if_vlan.h:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
727 |         writes/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  w(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
718 |         writes/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  b(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/xsk/setup.c:4:
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en/xsk/setup.h:7:
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/en.h:35:
In file included from /builds/linux/include/linux/if_vlan.h:10:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
718 |         writes/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 174

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
718 |         writesb/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  (PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 175

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/gpu/drm/drm_property.c:28:
In file included from /builds/linux/include/drm/drm_file.h:39:
In file included from /builds/linux/include/drm/drm_prime.h:37:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
727 |         writesw/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  (PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
727 |         writesw/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  (PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 176

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/iommu.h:10:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
x) _/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
   37 | #define __le16_to_cpu(x) __swab16((__force __u16)(__le16)(x))
      |                                                           ^
/builds/linux/include/uapi/linux/swab.h:102:54: note: expanded from macro '__swab16'
  102 | #define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 177

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
CI_I/builds/linux/include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  605 |         __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 178

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
37 | #define __/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 179

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/vxlan/vxlan_core.c:14:
In file included from /builds/linux/include/linux/udp.h:16:
In file included from /builds/linux/include/net/inet_sock.h:19:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
e __le/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 180

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_AUDIT.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
E + ad/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 181

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/mm/page_reporting.c:4:
In file included from /builds/linux/include/linux/page_reporting.h:6:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
eadsw(PCI_I/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  OBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 182

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  :

test log snippet build parser 183

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 184

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/sunrpc/svc.h:17:
In file included from /builds/linux/include/linux/sunrpc/xdr.h:17/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 185

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/vxlan/vxlan_core.c:14:
In file included from /builds/linux/include/linux/udp.h:16:
In file included from /builds/linux/include/net/inet_sock.h:19:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/linux/udp.h:/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 186

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/vxlan/vxlan_core.c:14:
In file included from /builds/linux/include/linux/udp.h:16:
In file included from /builds/linux/include/net/inet_sock.h:19:
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/net/inet_sock.h:/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 187

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/infiniband/core/uverbs_std_types_qp.c:6:
In file included from /builds/linux/include/rdma/uverbs_std_types.h:9:
In file included from /builds/linux/include/rdma/uverbs_types.h:10:
In file included from /builds/linux/include/rdma/ib_verbs.h:15:
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/rdma/uverbs_std_types.h:/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 188

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/infiniband/core/uverbs_std_types_qp.c:6:
In file included from /builds/linux/include/rdma/uverbs_std_types.h:9:
In file included from /builds/linux/include/rdma/uverbs_types.h:10:
In file included from /builds/linux/include/rdma/ib_verbs.h:15:
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
In file included from /builds/linux/include/rdma/uverbs_types.h:10/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 189

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:548:31: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/asm-generic/io.h
  548 |         val = __raw_readb(PCI_IOBASE + addr);
      |                           ~~~~~~~~~~ ^

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/slip/slhc.c:59:
In file included from /builds/linux/include/net/slhc_vj.h:84:
In file included from /builds/linux/include/linux/ip.h:16:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/asm-generic/io.h

test log snippet build parser 190

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/kernel/perf_event.c:13:
In file included from /builds/linux/include/linux/kvm_host.h:19:
In file included from /builds/linux/include/linux/msi.h:24:
In file included from /builds/linux/include/linux/irq.h:20:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/asm-generic/io.h:693:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]In file included from /builds/linux/security/integrity/ima/ima_asymmetric_keys.c:14:

test log snippet build parser 191

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/infiniband/core/uverbs_std_types_qp.c:6:
In file included from /builds/linux/include/rdma/uverbs_std_types.h:9:
In file included from /builds/linux/include/rdma/uverbs_types.h:10:
In file included from /builds/linux/include/rdma/ib_verbs.h:15:
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
/builds/linux/include/uapi/linux/swab.h:115:/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 192

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_AUDIT.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
_IOBAS/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 193

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_AUDIT.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
IOBASE/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 194

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
itesb(/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 195

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
le16_to_/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 196

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/infiniband/core/uverbs_std_types_qp.c:6:
In file included from /builds/linux/include/rdma/uverbs_std_types.h:9:
In file included from /builds/linux/include/rdma/uverbs_types.h:10:
In file included from /builds/linux/include/rdma/ib_verbs.h:15:
In file included from /builds/linux/include/linux/ethtool.h:18:
In file included from /builds/linux/include/linux/if_ether.h:19:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
54: note: expanded from macro '__swab32'/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

  115 | #define __swab32(x) (__u32)__builtin_bswap32((__u32)(x))
      |                                                      ^

test log snippet build parser 197

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
), P/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  595 |         __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
      |                                                       ~~~~~~~~~~ ^

test log snippet build parser 198

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv6/netfilter/nf_socket_ipv6.c:8:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
(PCI_IOB/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  736 |         writesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 199

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_AUDIT.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
701 |         read/builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 200

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/sched/sch_fifo.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
693 |         readsb(PCI_IOBASE + addr, bu/builds/linux/include/asm-generic/io.h:736:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 201

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv6/netfilter/nf_socket_ipv6.c:8:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
709 |         readsl/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  (PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 202

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/scatterlist.h:9:
 |         readsl(PCI_IOBASE/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
   561 |         val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
      |                                                         ~~~~~~~~~~ ^
+/builds/linux/include/uapi/linux/byteorder/big_endian.h:37:59: note: expanded from macro '__le16_to_cpu'
    addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 203

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_AUDIT.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
701 |         readsw(P/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  CI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 204

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/ipv6/netfilter/nf_socket_ipv6.c:8:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
ritesw/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  727 |         writesw(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 205

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/net/netfilter/xt_AUDIT.c:13:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
sw(PCI/builds/linux/include/asm-generic/io.h:718:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  718 |         writesb(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 206

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
548 |         val = __raw_rea/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 207

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
  736 |         w/builds/linux/include/asm-generic/io.h:727:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  ritesl(PCI_IOBASE + addr, buffer, count);
      |                 ~~~~~~~~~~ ^

test log snippet build parser 208

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
:709:20: warning: /builds/linux/include/asm-generic/io.h:709:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  709 |         readsl(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 209

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/drivers/net/ethernet/mellanox/mlx5/core/steering/hws/mlx5hws_internal.h:7:
In file included from /builds/linux/include/linux/mlx5/transobj.h:36:
In file included from /builds/linux/include/linux/mlx5/driver.h:38:
In file included from /builds/linux/include/linux/pci.h:39:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]/builds/linux/include/asm-generic/io.h
  561 |         val = __le16_t:o736_:c21p:u( (warning: _performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]_

test log snippet build parser 210

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:/builds/linux/include/asm-generic/io.h9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
736 |         writesl(PCI_IOBA/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]

test log snippet build parser 211

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
In file included from /builds/linux/include/linux/netdevice.h:38:
In file included from /builds/linux/include/net/net_namespace.h:43:
In file included from /builds/linux/include/linux/skbuff.h:28:
In file included from /builds/linux/include/linux/dma-mapping.h:11:
In file included from /builds/linux/include/linux/scatterlist.h:9:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
6(x) (__u16)/builds/linux/include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  __builtin_bswap16((__u16)(x))
      |                                                      ^

test log snippet build parser 212

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/include/linux/io.h:14:
 |         readsl(PCI_IOB/builds/linux/include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  ASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^

test log snippet build parser 213

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
In file included from /builds/linux/drivers/s390/cio/ioasm.c:9:
In file included from /builds/linux/arch/s390/include/asm/chpid.h:10:
In file included from /builds/linux/arch/s390/include/asm/cio.h:10:
In file included from /builds/linux/arch/s390/include/asm/dma-types.h:7:
In file included from /builds/linux/include/linux/io.h:14:
In file included from /builds/linux/arch/s390/include/asm/io.h:95:
12 warnings/builds/linux/include/asm-generic/io.h:701:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
  701 |         readsw(PCI_IOBASE + addr, buffer, count);
      |                ~~~~~~~~~~ ^
 generated.

test log snippet build parser 214

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stbYbak3: warning: allocated section `.got.plt' not in segment

test log snippet build parser 215

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stJ2cpbW: warning: allocated section `.got.plt' not in segment

test log snippet build parser 216

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: sttACpKf: warning: allocated section `.got.plt' not in segment

test log snippet build parser 217

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stNMzKVd: warning: allocated section `.got.plt' not in segment

test log snippet build parser 218

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-be98bb.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 219

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-65b5e8.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 220

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccOZgtg5.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 221

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cc6jViSL.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet boot parser 2

Home

------------[ cut here ]------------
[    8.891657] WARNING: CPU: 3 PID: 0 at kernel/context_tracking.c:128 ct_kernel_exit+0x80/0x8c
[    8.895458] Modules linked in: mdt_loader drm_exec qcom_vadc_common qcom_pon(+) v4l2_async gpu_sched qnoc_msm8916(+) videobuf2_v4l2 drm_dp_aux_bus videodev qcom_stats videobuf2_memops drm_display_helper videobuf2_common qcom_rng mc phy_qcom_usb_hs display_connector rpmsg_ctrl rpmsg_char drm_kms_helper socinfo ramoops rmtfs_mem reed_solomon drm fuse backlight ip_tables x_tables ipv6
[    8.915443] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G      D            6.12.10-rc1 #1
[    8.937651] Tainted: [D]=DIE
[    8.946053] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[    8.948932] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    8.948945] pc : ct_kernel_exit+0x80/0x8c
[    8.948957] lr : ct_kernel_exit+0x14/0x8c
[    8.948966] sp : ffff800082aabd40
[    8.948970] x29: ffff800082aabd40 x28: ffff800082469eb0 x27: ffff8000824a9000
[    8.949001] x23: 000000021178caa8 x22: 0000000000000000 x21: ffff0000048e2080
[    8.949015] x20: ffff8000824672e8 x19: ffff00003f8982e8 x18: ffff800082a85000
[    8.949029] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000001
[    8.949042] x14: 0000000000000251 x13: 0000000000000004 x12: 000000000a1fc936
[    8.949055] x11: 0000000000000015 x10: 000000000682aaab x9 : 4000000000000000
[    9.017525] x8 : 4000000000000002 x7 : 0000000000000f92 x6 : 000000000000b0a9
[    9.024642] x5 : 0000000000001440 x4 : 0000000000000048 x3 : 0000000000000006
[    9.031760] x2 : 0000000000000000 x1 : ffff0000048e2080 x0 : ffff7fffbd431000
[    9.038880] Call trace:
[    9.045987]  ct_kernel_exit+0x80/0x8c
[    9.048248]  ct_idle_enter+0x10/0x1c
[    9.052069]  cpuidle_enter_state+0x9c/0x268
[    9.052081]  cpuidle_enter+0x38/0x54
[    9.052095]  do_idle+0x1c8/0x258
[    9.052108]  cpu_startup_entry+0x34/0x3c
[    9.052118]  secondary_start_kernel+0x148/0x16c
[    9.052131]  __secondary_switched+0xc0/0xc4
[    9.052142] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

------------[ cut here ]------------
[    8.891657] WARNING: CPU: 3 PID: 0 at kernel/context_tracking.c:128 ct_kernel_exit+0x80/0x8c
[    8.895458] Modules linked in: mdt_loader drm_exec qcom_vadc_common qcom_pon(+) v4l2_async gpu_sched qnoc_msm8916(+) videobuf2_v4l2 drm_dp_aux_bus videodev qcom_stats videobuf2_memops drm_display_helper videobuf2_common qcom_rng mc phy_qcom_usb_hs display_connector rpmsg_ctrl rpmsg_char drm_kms_helper socinfo ramoops rmtfs_mem reed_solomon drm fuse backlight ip_tables x_tables ipv6
[    8.915443] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G      D            6.12.10-rc1 #1
[    8.937651] Tainted: [D]=DIE
[    8.946053] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[    8.948932] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    8.948945] pc : ct_kernel_exit+0x80/0x8c
[    8.948957] lr : ct_kernel_exit+0x14/0x8c
[    8.948966] sp : ffff800082aabd40
[    8.948970] x29: ffff800082aabd40 x28: ffff800082469eb0 x27: ffff8000824a9000
[    8.949001] x23: 000000021178caa8 x22: 0000000000000000 x21: ffff0000048e2080
[    8.949015] x20: ffff8000824672e8 x19: ffff00003f8982e8 x18: ffff800082a85000
[    8.949029] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000001
[    8.949042] x14: 0000000000000251 x13: 0000000000000004 x12: 000000000a1fc936
[    8.949055] x11: 0000000000000015 x10: 000000000682aaab x9 : 4000000000000000
[    9.017525] x8 : 4000000000000002 x7 : 0000000000000f92 x6 : 000000000000b0a9
[    9.024642] x5 : 0000000000001440 x4 : 0000000000000048 x3 : 0000000000000006
[    9.031760] x2 : 0000000000000000 x1 : ffff0000048e2080 x0 : ffff7fffbd431000
[    9.038880] Call trace:
[    9.045987]  ct_kernel_exit+0x80/0x8c
[    9.048248]  ct_idle_enter+0x10/0x1c
[    9.052069]  cpuidle_enter_state+0x9c/0x268
[    9.052081]  cpuidle_enter+0x38/0x54
[    9.052095]  do_idle+0x1c8/0x258
[    9.052108]  cpu_startup_entry+0x34/0x3c
[    9.052118]  secondary_start_kernel+0x148/0x16c
[    9.052131]  __secondary_switched+0xc0/0xc4
[    9.052142] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 4

Home

------------[ cut here ]------------
[    8.791383] WARNING: CPU: 2 PID: 0 at kernel/context_tracking.c:128 ct_kernel_exit+0x80/0x8c
[    8.795989] Modules linked in: qnoc_msm8916(+) qmi_helpers qcom_stats qcom_rng llcc_qcom videobuf2_dma_sg v4l2_mem2mem v4l2_fwnode ocmem rpmsg_ctrl drm_exec v4l2_async mdt_loader rpmsg_char videobuf2_v4l2 gpu_sched drm_dp_aux_bus videodev drm_display_helper videobuf2_memops videobuf2_common display_connector mc drm_kms_helper phy_qcom_usb_hs socinfo ramoops reed_solomon rmtfs_mem fuse drm backlight ip_tables x_tables ipv6
[    8.819446] CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Tainted: G      D            6.12.10-rc1 #1
[    8.841649] Tainted: [D]=DIE
[    8.850138] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[    8.853012] pstate: 204003c5 (nzCv DAIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    8.859696] pc : ct_kernel_exit+0x80/0x8c
[    8.866374] lr : ct_kernel_exit+0x14/0x8c
[    8.870540] sp : ffff800082aa3d40
[    8.874531] x29: ffff800082aa3d40 x28: ffff800082469eb0 x27: ffff8000824a9000
[    8.877838] x26: 0000000000000000 x25: ffff000004bb9898 x24: ffff000004bb9898
[    8.884954] x23: 000000020ba73aef x22: 0000000000000000 x21: ffff00003f86ceb8
[    8.892073] x20: ffff8000824672e8 x19: ffff00003f86a2e8 x18: ffff800082a7d038
[    8.899192] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000056
[    8.906310] x14: 00000000000000da x13: 0000000000000004 x12: 000000000a0329fe
[    8.913427] x11: 0000000000000015 x10: 000000000682aaab x9 : 4000000000000000
[    8.920545] x8 : 4000000000000002 x7 : 0000000000000384 x6 : 00000000000026be
[    8.927664] x5 : 0000000000000271 x4 : 0000000000000019 x3 : 0000000000000006
[    8.934782] x2 : 0000000000000000 x1 : ffff000004bb9880 x0 : ffff7fffbd403000
[    8.941901] Call trace:
[    8.949008]  ct_kernel_exit+0x80/0x8c
[    8.951269]  ct_idle_enter+0x10/0x1c
[    8.955087]  cpuidle_enter_state+0x9c/0x264
[    8.958734]  cpuidle_enter+0x38/0x54
[    8.962640]  do_idle+0x1c8/0x258
[    8.966457]  cpu_startup_entry+0x34/0x3c
[    8.969671]  secondary_start_kernel+0x148/0x16c
[    8.973578]  __secondary_switched+0xc0/0xc4
[    8.977832] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 5

Home

------------[ cut here ]------------
[    6.559632] qcom-pcie 1c00000.pcie: PCI host bridge to bus 0000:00
[    6.571691] WARNING: CPU: 1 PID: 408 at block/blk-mq.c:348 blk_mq_unquiesce_queue+0xa0/0xb0
[    6.582605] pci_bus 0000:00: root bus resource [bus 00-ff]
[    6.589565] Modules linked in: pwrseq_core i2c_qcom_geni
[    6.589592] pci_bus 0000:00: root bus resource [io  0x0000-0xfffff]
[    6.597646]  phy_qcom_qmp_combo videobuf2_v4l2
[    6.597654] pci_bus 0000:00: root bus resource [mem 0x60300000-0x60ffffff]
[    6.605718]  drm_display_helper aux_bridge qcom_q6v5_mss videobuf2_common
[    6.605882] pci 0000:00:00.0: [17cb:0106] type 01 class 0x060400 PCIe Root Port
[    6.614231]  spi_geni_qcom phy_qcom_qmp_usb qcom_rng camcc_sdm845 slim_qcom_ngd_ctrl
[    6.614282] pci 0000:00:00.0: BAR 0 [mem 0x00000000-0x00000fff]
[    6.618657]  gpi cfg80211 phy_qcom_qmp_ufs
[    6.626402] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    6.634881]  ufs_qcom qcrypto typec
[    6.634893] pci 0000:00:00.0:   bridge window [io  0x0000-0x0fff]
[    6.643384]  rfkill qrtr
[    6.654246] pci 0000:00:00.0:   bridge window [mem 0x00000000-0x000fffff]
[    6.662391]  phy_qcom_qmp_pcie coresight_stm
[    6.666796] pci 0000:00:00.0:   bridge window [mem 0x00000000-0x000fffff 64bit pref]
[    6.674940]  stm_core lmh
[    6.682723] pci 0000:00:00.0: PME# supported from D0 D3hot D3cold
[    6.687484]  icc_osm_l3 qcom_q6v5_pas
[    6.689608] pci 0000:01:00.0: [1912:0014] type 00 class 0x0c0330 PCIe Endpoint
[    6.696081]  slimbus qcom_pil_info pdr_interface qcom_q6v5 qcom_wdt qcom_pdr_msg display_connector
[    6.702741] pci 0000:01:00.0: BAR 0 [mem 0x00000000-0x00001fff 64bit]
[    6.708655]  icc_bwmon drm_kms_helper llcc_qcom
[    6.709356] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold
[    6.716817]  qcom_sysmon qcom_common
[    6.736018] pci 0000:00:00.0: bridge window [mem 0x60300000-0x603fffff]: assigned
[    6.737626]  qcom_glink_smem
[    6.744125] pci 0000:00:00.0: BAR 0 [mem 0x60400000-0x60400fff]: assigned
[    6.750172]  mdt_loader qmi_helpers
[    6.758070] pci 0000:01:00.0: BAR 0 [mem 0x60300000-0x60301fff 64bit]: assigned
[    6.758133] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    6.766225]  drm backlight
[    6.773595] pci 0000:00:00.0:   bridge window [mem 0x60300000-0x603fffff]
[    6.778416]  socinfo rmtfs_mem
[    6.778429] pci_bus 0000:00: resource 4 [io  0x0000-0xfffff]
[    6.787019] CPU: 1 UID: 0 PID: 408 Comm: kworker/u32:9 Not tainted 6.12.10-rc1 #1
[    6.793513] pci_bus 0000:00: resource 5 [mem 0x60300000-0x60ffffff]
[    6.799564] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.799570] Workqueue: devfreq_wq devfreq_monitor
[    6.807720] pci_bus 0000:01: resource 1 [mem 0x60300000-0x603fffff]
[    6.814994] 
[    6.814999] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.820008] pcieport 0000:00:00.0: Adding to iommu group 10
[    6.828431] pc : blk_mq_unquiesce_queue+0xa0/0xb0
[    6.836158] pcieport 0000:00:00.0: PME: Signaling with IRQ 159
[    6.840975] lr : blk_mq_unquiesce_queue+0x2c/0xb0
[    6.840981] sp : ffff8000813f3b90
[    6.840984] x29: ffff8000813f3b90
[    6.841286] pcieport 0000:00:00.0: AER: enabled with IRQ 159
[    6.846436]  x28: 0000000000000000 x27: ffff2f2c40365480
[    6.846444] x26: 0000000000000000
[    6.854722] pci 0000:01:00.0: enabling device (0000 -> 0002)
[    6.862127]  x25: 000000017df35082 x24: 00000000000f4240
[    6.867049] pci 0000:01:00.0: quirk_usb_early_handoff+0x0/0xa30 took 12057 usecs
[    6.875566] x23: 000000017eac5914 x22: 0000000000000000
[    6.882247] xhci_hcd 0000:01:00.0: Adding to iommu group 10
[    6.888116]  x21: ffff2f2c4bea2590
[    6.888121] x20: 0000000000000000 x19: ffff2f2c4bea2530 x18: ffffc2febca87310
[    7.227866] x17: ffffc2febca872f8 x16: 00000000000003e8 x15: 0000000000008000
[    7.235077] x14: 0000000000000040 x13: 000000016fffffff x12: 0000000000000001
[    7.242277] x11: ffff2f2cb9329280 x10: 0000000000000018 x9 : ffffc2febb37f700
[    7.249488] x8 : ffff8000813f3a98 x7 : 0000000000000000 x6 : 0000000000000001
[    7.256688] x5 : ffffc2febc57f000 x4 : ffffc2febc57f5a0 x3 : 0000000000000000
[    7.263898] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[    7.271110] Call trace:
[    7.273590]  blk_mq_unquiesce_queue+0xa0/0xb0
[    7.278000]  blk_mq_unquiesce_tagset+0x60/0x98
[    7.282495]  ufshcd_devfreq_scale+0x224/0x378
[    7.286908]  ufshcd_devfreq_target+0xd8/0x390
[    7.291316]  devfreq_set_target+0x98/0x228
[    7.295456]  devfreq_update_target+0xc8/0xe8
[    7.299768]  devfreq_monitor+0x3c/0x148
[    7.303649]  process_one_work+0x158/0x3d0
[    7.307709]  worker_thread+0x2d8/0x3e8
[    7.311505]  kthread+0x104/0x118
[    7.314776]  ret_from_fork+0x10/0x20
[    7.318394] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 6

Home

------------[ cut here ]------------
[    6.559632] qcom-pcie 1c00000.pcie: PCI host bridge to bus 0000:00
[    6.571691] WARNING: CPU: 1 PID: 408 at block/blk-mq.c:348 blk_mq_unquiesce_queue+0xa0/0xb0
[    6.582605] pci_bus 0000:00: root bus resource [bus 00-ff]
[    6.589565] Modules linked in: pwrseq_core i2c_qcom_geni
[    6.589592] pci_bus 0000:00: root bus resource [io  0x0000-0xfffff]
[    6.597646]  phy_qcom_qmp_combo videobuf2_v4l2
[    6.597654] pci_bus 0000:00: root bus resource [mem 0x60300000-0x60ffffff]
[    6.605718]  drm_display_helper aux_bridge qcom_q6v5_mss videobuf2_common
[    6.605882] pci 0000:00:00.0: [17cb:0106] type 01 class 0x060400 PCIe Root Port
[    6.614231]  spi_geni_qcom phy_qcom_qmp_usb qcom_rng camcc_sdm845 slim_qcom_ngd_ctrl
[    6.614282] pci 0000:00:00.0: BAR 0 [mem 0x00000000-0x00000fff]
[    6.618657]  gpi cfg80211 phy_qcom_qmp_ufs
[    6.626402] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    6.634881]  ufs_qcom qcrypto typec
[    6.634893] pci 0000:00:00.0:   bridge window [io  0x0000-0x0fff]
[    6.643384]  rfkill qrtr
[    6.654246] pci 0000:00:00.0:   bridge window [mem 0x00000000-0x000fffff]
[    6.662391]  phy_qcom_qmp_pcie coresight_stm
[    6.666796] pci 0000:00:00.0:   bridge window [mem 0x00000000-0x000fffff 64bit pref]
[    6.674940]  stm_core lmh
[    6.682723] pci 0000:00:00.0: PME# supported from D0 D3hot D3cold
[    6.687484]  icc_osm_l3 qcom_q6v5_pas
[    6.689608] pci 0000:01:00.0: [1912:0014] type 00 class 0x0c0330 PCIe Endpoint
[    6.696081]  slimbus qcom_pil_info pdr_interface qcom_q6v5 qcom_wdt qcom_pdr_msg display_connector
[    6.702741] pci 0000:01:00.0: BAR 0 [mem 0x00000000-0x00001fff 64bit]
[    6.708655]  icc_bwmon drm_kms_helper llcc_qcom
[    6.709356] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold
[    6.716817]  qcom_sysmon qcom_common
[    6.736018] pci 0000:00:00.0: bridge window [mem 0x60300000-0x603fffff]: assigned
[    6.737626]  qcom_glink_smem
[    6.744125] pci 0000:00:00.0: BAR 0 [mem 0x60400000-0x60400fff]: assigned
[    6.750172]  mdt_loader qmi_helpers
[    6.758070] pci 0000:01:00.0: BAR 0 [mem 0x60300000-0x60301fff 64bit]: assigned
[    6.758133] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    6.766225]  drm backlight
[    6.773595] pci 0000:00:00.0:   bridge window [mem 0x60300000-0x603fffff]
[    6.778416]  socinfo rmtfs_mem
[    6.778429] pci_bus 0000:00: resource 4 [io  0x0000-0xfffff]
[    6.787019] CPU: 1 UID: 0 PID: 408 Comm: kworker/u32:9 Not tainted 6.12.10-rc1 #1
[    6.793513] pci_bus 0000:00: resource 5 [mem 0x60300000-0x60ffffff]
[    6.799564] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.799570] Workqueue: devfreq_wq devfreq_monitor
[    6.807720] pci_bus 0000:01: resource 1 [mem 0x60300000-0x603fffff]
[    6.814994] 
[    6.814999] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.820008] pcieport 0000:00:00.0: Adding to iommu group 10
[    6.828431] pc : blk_mq_unquiesce_queue+0xa0/0xb0
[    6.836158] pcieport 0000:00:00.0: PME: Signaling with IRQ 159
[    6.840975] lr : blk_mq_unquiesce_queue+0x2c/0xb0
[    6.840981] sp : ffff8000813f3b90
[    6.840984] x29: ffff8000813f3b90
[    6.841286] pcieport 0000:00:00.0: AER: enabled with IRQ 159
[    6.846436]  x28: 0000000000000000 x27: ffff2f2c40365480
[    6.846444] x26: 0000000000000000
[    6.854722] pci 0000:01:00.0: enabling device (0000 -> 0002)
[    6.862127]  x25: 000000017df35082 x24: 00000000000f4240
[    6.867049] pci 0000:01:00.0: quirk_usb_early_handoff+0x0/0xa30 took 12057 usecs
[    6.875566] x23: 000000017eac5914 x22: 0000000000000000
[    6.882247] xhci_hcd 0000:01:00.0: Adding to iommu group 10
[    6.888116]  x21: ffff2f2c4bea2590
[    6.888121] x20: 0000000000000000 x19: ffff2f2c4bea2530 x18: ffffc2febca87310
[    7.227866] x17: ffffc2febca872f8 x16: 00000000000003e8 x15: 0000000000008000
[    7.235077] x14: 0000000000000040 x13: 000000016fffffff x12: 0000000000000001
[    7.242277] x11: ffff2f2cb9329280 x10: 0000000000000018 x9 : ffffc2febb37f700
[    7.249488] x8 : ffff8000813f3a98 x7 : 0000000000000000 x6 : 0000000000000001
[    7.256688] x5 : ffffc2febc57f000 x4 : ffffc2febc57f5a0 x3 : 0000000000000000
[    7.263898] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[    7.271110] Call trace:
[    7.273590]  blk_mq_unquiesce_queue+0xa0/0xb0
[    7.278000]  blk_mq_unquiesce_tagset+0x60/0x98
[    7.282495]  ufshcd_devfreq_scale+0x224/0x378
[    7.286908]  ufshcd_devfreq_target+0xd8/0x390
[    7.291316]  devfreq_set_target+0x98/0x228
[    7.295456]  devfreq_update_target+0xc8/0xe8
[    7.299768]  devfreq_monitor+0x3c/0x148
[    7.303649]  process_one_work+0x158/0x3d0
[    7.307709]  worker_thread+0x2d8/0x3e8
[    7.311505]  kthread+0x104/0x118
[    7.314776]  ret_from_fork+0x10/0x20
[    7.318394] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 7

Home

[   44.544812] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   44.545845] Modules linked in:
[   44.548915] CPU: 0 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   44.550520] Tainted: [N]=TEST
[   44.551014] Hardware name: linux,dummy-virt (DT)
[   44.551851] pstate: 82402009 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   44.552654] pc : kunit_test_null_dereference+0x2c/0x114
[   44.554414] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[   44.554763] sp : ffff800082d97dd0
[   44.555010] x29: ffff800082d97de0 x28: 0000000000000000 x27: 1ffe000018fcc921
[   44.555764] x26: dfff800000000000 x25: ffff9d4e844966e8 x24: fff00000c7b4cea0
[   44.557088] x23: 1ffe000018f699c1 x22: dfff800000000000 x21: dfff800000000000
[   44.558292] x20: ffff9d4e844a3b38 x19: fff00000c7b4ce08 x18: ffff800080097940
[   44.558936] x17: ffff9d4e84496214 x16: ffff9d4e8398ad94 x15: 0000000000000001
[   44.560088] x14: 1ffe000018fcca11 x13: 0000000000000000 x12: 0000000000000000
[   44.560938] x11: fffd800018fcca12 x10: dfff800000000000 x9 : 1ffe000018f699c2
[   44.562645] x8 : 7a57213597c80500 x7 : 0000000000000000 x6 : 72745f74696e756b
[   44.563808] x5 : fff00000c7b4b7d6 x4 : 0000000000000008 x3 : ffff9d4e8631b69c
[   44.564904] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[   44.566505] Call trace:
[   44.566887]  kunit_test_null_dereference+0x2c/0x114
[   44.567542]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   44.568189]  kthread+0x25c/0x35c
[   44.568634]  ret_from_fork+0x10/0x20
[   44.570450] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8) 
[   44.571609] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 8

Home

[   50.769688] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   50.770680] Modules linked in:
[   50.774970] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   50.776124] Tainted: [N]=TEST
[   50.776622] Hardware name: linux,dummy-virt (DT)
[   50.777605] pstate: 82402009 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   50.778479] pc : kunit_test_null_dereference+0x2c/0x114
[   50.780534] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[   50.781180] sp : ffff800082e07dd0
[   50.781712] x29: ffff800082e07de0 x28: 0000000000000000 x27: 1ffe000018fdf491
[   50.783308] x26: dfff800000000000 x25: ffff916fcdc8c2e8 x24: fff00000c7cde6a0
[   50.784339] x23: 1ffe000018f9bcc1 x22: dfff800000000000 x21: dfff800000000000
[   50.785379] x20: ffff916fcdc991b0 x19: fff00000c7cde608 x18: ffff800080097940
[   50.786502] x17: ffff916fcdc8be14 x16: ffff916fcd188c18 x15: 0000000000000001
[   50.788160] x14: 1ffe000018fdf581 x13: 0000000000000000 x12: 0000000000000000
[   50.789160] x11: fffd800018fdf582 x10: dfff800000000000 x9 : 1ffe000018f9bcc2
[   50.790476] x8 : 7a0f99548d97ba00 x7 : 0000000000000000 x6 : 72745f74696e756b
[   50.791543] x5 : fff00000c7cfcc96 x4 : 0000000000000008 x3 : ffff916fcfb1fcf8
[   50.792583] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[   50.793804] Call trace:
[   50.794514]  kunit_test_null_dereference+0x2c/0x114
[   50.795426]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   50.795930]  kthread+0x25c/0x35c
[   50.796499]  ret_from_fork+0x10/0x20
[   50.797732] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8) 
[   50.799319] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 9

Home

[   52.538191] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   52.539206] Modules linked in:
[   52.542591] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   52.543770] Tainted: [N]=TEST
[   52.544231] Hardware name: linux,dummy-virt (DT)
[   52.545217] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   52.546463] pc : kunit_test_null_dereference+0x68/0x160
[   52.548435] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[   52.549082] sp : ffff800080907db0
[   52.549876] x29: ffff800080907e10 x28: 0000000000000000 x27: 0000000000000000
[   52.551379] x26: 0000000000000000 x25: fff00000c7975b40 x24: fff00000c77af800
[   52.552296] x23: fff00000c77a0280 x22: ffff9abf899b1b64 x21: fff00000c77a0288
[   52.553201] x20: 1ffff00010120fb6 x19: ffff800080087a10 x18: 0000000000000000
[   52.554343] x17: ffff9abf88da77a8 x16: ffff9abf88da7530 x15: ffff9abf89969d48
[   52.555277] x14: ffff9abf892834a4 x13: 6461657268745f68 x12: fffd800018f2ec5a
[   52.556210] x11: 1ffe000018f2ec59 x10: fffd800018f2ec59 x9 : dfff800000000000
[   52.557218] x8 : fff00000c79762cc x7 : 0000000000000001 x6 : 0000000041b58ab3
[   52.558097] x5 : ffff700010120fb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   52.559063] x2 : dfff800000000000 x1 : fff00000c7975b40 x0 : ffff800080087a10
[   52.560423] Call trace:
[   52.560826]  kunit_test_null_dereference+0x68/0x160
[   52.561480]  kunit_generic_run_threadfn_adapter+0x80/0xec
[   52.562080]  kthread+0x2b4/0x338
[   52.562611]  ret_from_fork+0x10/0x20
[   52.564073] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   52.565190] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 10

Home

------------[ cut here ]------------
[    3.844996] ### dt-test ### EXPECT \ : WARNING: <<all>>
[    3.845651] ### dt-test ### EXPECT \ : refcount_t: underflow; use-after-free.
[    3.846570] ### dt-test ### EXPECT \ : ---[ end trace <<int>> ]---
[    3.847233] ### dt-test ### pass of_unittest_lifecycle():3455
[    3.848081] ------------[ cut here ]------------
[    3.848741] refcount_t: underflow; use-after-free.
[    3.850381] WARNING: CPU: 0 PID: 1 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148
[    3.851874] Modules linked in:
[    3.853281] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Tainted: G                 N 6.12.10-rc1 #1
[    3.853980] Tainted: [N]=TEST
[    3.854120] Hardware name: linux,dummy-virt (DT)
[    3.854464] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[    3.854729] pc : refcount_warn_saturate+0xf4/0x148
[    3.854925] lr : refcount_warn_saturate+0xf4/0x148
[    3.855116] sp : ffff80008002bc00
[    3.855430] x29: ffff80008002bc00 x28: ffff956389481478 x27: ffff95638967c558
[    3.856708] x26: ffff956388f9d648 x25: ffff956389481478 x24: ffff956388f9dfa8
[    3.857257] x23: fff00000c19dc930 x22: ffff95638967c558 x21: ffff95638a2a0000
[    3.857948] x20: ffff95638967c548 x19: fff00000c19dc9b0 x18: 0000000000000006
[    3.858684] x17: 656572662d726574 x16: 66612d657375203b x15: ffff80008002b620
[    3.859396] x14: 0000000000000000 x13: 205d313437383438 x12: 2e33202020205b3e
[    3.859923] x11: 3b776f6c66726564 x10: ffff956389bfe388 x9 : ffff956387544410
[    3.860655] x8 : 00000000ffffefff x7 : ffff956389bfe388 x6 : 80000000fffff000
[    3.861398] x5 : 000000000000029c x4 : 0000000000000000 x3 : 0000000000000000
[    3.861961] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c02e0000
[    3.862902] Call trace:
[    3.863230]  refcount_warn_saturate+0xf4/0x148
[    3.863655]  kobject_put+0x16c/0x218
[    3.864004]  of_node_put+0x20/0x38
[    3.864418]  of_unittest+0x1f3c/0x2ea0
[    3.864849]  do_one_initcall+0x60/0x2a8
[    3.865278]  kernel_init_freeable+0x204/0x3e0
[    3.865595]  kernel_init+0x28/0x1f0
[    3.865989]  ret_from_fork+0x10/0x20
[    3.866564] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 11

Home

[  140.765637] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  140.766835] Modules linked in:
[  140.768093] CPU: 1 UID: 0 PID: 614 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[  140.769436] Tainted: [B]=BAD_PAGE, [N]=TEST
[  140.769946] Hardware name: linux,dummy-virt (DT)
[  140.770635] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  140.771599] pc : kunit_test_null_dereference+0x70/0x170
[  140.772437] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  140.773182] sp : ffff8000834c7dc0
[  140.773785] x29: ffff8000834c7e20 x28: 0000000000000000 x27: 0000000000000000
[  140.775754] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c1da7680
[  140.777049] x23: ffff9d934b19e190 x22: ffff9d934b1a6d50 x21: fff00000c1da7688
[  140.778132] x20: 1ffff00010698fb8 x19: ffff8000800879f0 x18: 00000000ef34b58a
[  140.779163] x17: 0000000000000001 x16: fff00000da521e60 x15: ffff9d934b15b27c
[  140.780237] x14: 1ffe00001b4a43b0 x13: 0000000000000000 x12: fffd8000183f861a
[  140.781834] x11: 1ffe0000183f8619 x10: fffd8000183f8619 x9 : ffff9d934b19e218
[  140.783077] x8 : ffff8000834c7cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  140.784156] x5 : ffff700010698fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  140.785267] x2 : dfff800000000000 x1 : fff00000c1fc2800 x0 : ffff8000800879f0
[  140.786374] Call trace:
[  140.786871]  kunit_test_null_dereference+0x70/0x170
[  140.787587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  140.788305]  kthread+0x24c/0x2d0
[  140.788969]  ret_from_fork+0x10/0x20
[  140.790242] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  140.791822] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 12

Home

[   33.775663] ==================================================================
[   33.776842] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318
[   33.777584] Read of size 1 at addr ffff800080b77bdf by task kunit_try_catch/237
[   33.779539] 
[   33.779956] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.781197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.781881] Hardware name: linux,dummy-virt (DT)
[   33.782580] Call trace:
[   33.783018]  dump_backtrace+0x9c/0x128
[   33.783681]  show_stack+0x20/0x38
[   33.784275]  dump_stack_lvl+0x8c/0xd0
[   33.785195]  print_report+0x2fc/0x5e0
[   33.785695]  kasan_report+0xc8/0x118
[   33.786287]  __asan_report_load1_noabort+0x20/0x30
[   33.786946]  kasan_alloca_oob_left+0x2c0/0x318
[   33.787549]  kunit_try_run_case+0x14c/0x3d0
[   33.788224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.789297]  kthread+0x24c/0x2d0
[   33.789773]  ret_from_fork+0x10/0x20
[   33.790391] 
[   33.790714] The buggy address belongs to stack of task kunit_try_catch/237
[   33.791578] 
[   33.791948] The buggy address belongs to the virtual mapping at
[   33.791948]  [ffff800080b70000, ffff800080b79000) created by:
[   33.791948]  kernel_clone+0x140/0x790
[   33.793727] 
[   33.794127] The buggy address belongs to the physical page:
[   33.794788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b9
[   33.795570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.796495] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.798378] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.799454] page dumped because: kasan: bad access detected
[   33.800121] 
[   33.800504] Memory state around the buggy address:
[   33.801364]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.802274]  ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.803036] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.803862]                                                     ^
[   33.804963]  ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.805761]  ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.806576] ==================================================================

test log snippet boot parser 13

Home

[   33.817879] ==================================================================
[   33.819126] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   33.819934] Read of size 1 at addr ffff8000809d7bea by task kunit_try_catch/239
[   33.820602] 
[   33.821107] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.823206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.823745] Hardware name: linux,dummy-virt (DT)
[   33.824420] Call trace:
[   33.825178]  dump_backtrace+0x9c/0x128
[   33.825768]  show_stack+0x20/0x38
[   33.826322]  dump_stack_lvl+0x8c/0xd0
[   33.826817]  print_report+0x2fc/0x5e0
[   33.827516]  kasan_report+0xc8/0x118
[   33.828127]  __asan_report_load1_noabort+0x20/0x30
[   33.829490]  kasan_alloca_oob_right+0x2e4/0x348
[   33.830125]  kunit_try_run_case+0x14c/0x3d0
[   33.831032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.831762]  kthread+0x24c/0x2d0
[   33.832281]  ret_from_fork+0x10/0x20
[   33.832917] 
[   33.833302] The buggy address belongs to stack of task kunit_try_catch/239
[   33.834052] 
[   33.834442] The buggy address belongs to the virtual mapping at
[   33.834442]  [ffff8000809d0000, ffff8000809d9000) created by:
[   33.834442]  kernel_clone+0x140/0x790
[   33.836413] 
[   33.837795] The buggy address belongs to the physical page:
[   33.838335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057e0
[   33.839238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.840094] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.841532] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.842285] page dumped because: kasan: bad access detected
[   33.842915] 
[   33.843301] Memory state around the buggy address:
[   33.843842]  ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.844873]  ffff8000809d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.845952] >ffff8000809d7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.846802]                                                           ^
[   33.847682]  ffff8000809d7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.848621]  ffff8000809d7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.850095] ==================================================================

test log snippet boot parser 14

Home

[   31.481197] ==================================================================
[   31.482000] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.482589] Free of addr fff00000c3ec9b00 by task kunit_try_catch/178
[   31.483370] 
[   31.483727] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.485093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.485643] Hardware name: linux,dummy-virt (DT)
[   31.486210] Call trace:
[   31.486734]  dump_backtrace+0x9c/0x128
[   31.487863]  show_stack+0x20/0x38
[   31.488552]  dump_stack_lvl+0x8c/0xd0
[   31.489334]  print_report+0x118/0x5e0
[   31.490204]  kasan_report_invalid_free+0xb0/0xd8
[   31.491068]  check_slab_allocation+0xd4/0x108
[   31.491686]  __kasan_slab_pre_free+0x2c/0x48
[   31.492374]  kfree+0xe8/0x3b8
[   31.493272]  kfree_sensitive+0x3c/0xb0
[   31.494128]  kmalloc_double_kzfree+0x174/0x318
[   31.494765]  kunit_try_run_case+0x14c/0x3d0
[   31.495678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.496583]  kthread+0x24c/0x2d0
[   31.497100]  ret_from_fork+0x10/0x20
[   31.497623] 
[   31.497962] Allocated by task 178:
[   31.498822]  kasan_save_stack+0x3c/0x68
[   31.499427]  kasan_save_track+0x20/0x40
[   31.500132]  kasan_save_alloc_info+0x40/0x58
[   31.501191]  __kasan_kmalloc+0xd4/0xd8
[   31.501778]  __kmalloc_cache_noprof+0x144/0x328
[   31.502780]  kmalloc_double_kzfree+0xb8/0x318
[   31.503832]  kunit_try_run_case+0x14c/0x3d0
[   31.504424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.505374]  kthread+0x24c/0x2d0
[   31.505640]  ret_from_fork+0x10/0x20
[   31.505877] 
[   31.506096] Freed by task 178:
[   31.506484]  kasan_save_stack+0x3c/0x68
[   31.506963]  kasan_save_track+0x20/0x40
[   31.508669]  kasan_save_free_info+0x4c/0x78
[   31.509322]  __kasan_slab_free+0x6c/0x98
[   31.509906]  kfree+0x110/0x3b8
[   31.510672]  kfree_sensitive+0x80/0xb0
[   31.511245]  kmalloc_double_kzfree+0x120/0x318
[   31.511750]  kunit_try_run_case+0x14c/0x3d0
[   31.512882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.513588]  kthread+0x24c/0x2d0
[   31.514045]  ret_from_fork+0x10/0x20
[   31.514522] 
[   31.514873] The buggy address belongs to the object at fff00000c3ec9b00
[   31.514873]  which belongs to the cache kmalloc-16 of size 16
[   31.517008] The buggy address is located 0 bytes inside of
[   31.517008]  16-byte region [fff00000c3ec9b00, fff00000c3ec9b10)
[   31.518218] 
[   31.518510] The buggy address belongs to the physical page:
[   31.519439] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   31.520311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.521489] page_type: f5(slab)
[   31.521932] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.522657] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.523346] page dumped because: kasan: bad access detected
[   31.524011] 
[   31.524328] Memory state around the buggy address:
[   31.525004]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.525737]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   31.527094] >fff00000c3ec9b00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.527868]                    ^
[   31.529061]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.530026]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.530826] ==================================================================

test log snippet boot parser 15

Home

[   32.110858] ==================================================================
[   32.111611] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0
[   32.111967] Free of addr fff00000c57a6000 by task kunit_try_catch/195
[   32.113600] 
[   32.114681] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.116004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.116543] Hardware name: linux,dummy-virt (DT)
[   32.117608] Call trace:
[   32.118028]  dump_backtrace+0x9c/0x128
[   32.118605]  show_stack+0x20/0x38
[   32.119139]  dump_stack_lvl+0x8c/0xd0
[   32.119697]  print_report+0x118/0x5e0
[   32.120267]  kasan_report_invalid_free+0xb0/0xd8
[   32.121308]  check_slab_allocation+0xd4/0x108
[   32.121906]  __kasan_slab_pre_free+0x2c/0x48
[   32.122516]  kmem_cache_free+0xf0/0x468
[   32.123027]  kmem_cache_double_free+0x19c/0x3e0
[   32.123699]  kunit_try_run_case+0x14c/0x3d0
[   32.124250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.125294]  kthread+0x24c/0x2d0
[   32.125906]  ret_from_fork+0x10/0x20
[   32.126494] 
[   32.126851] Allocated by task 195:
[   32.127406]  kasan_save_stack+0x3c/0x68
[   32.127929]  kasan_save_track+0x20/0x40
[   32.128563]  kasan_save_alloc_info+0x40/0x58
[   32.129341]  __kasan_slab_alloc+0xa8/0xb0
[   32.130283]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.130881]  kmem_cache_double_free+0x130/0x3e0
[   32.131574]  kunit_try_run_case+0x14c/0x3d0
[   32.132097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.132998]  kthread+0x24c/0x2d0
[   32.133438]  ret_from_fork+0x10/0x20
[   32.134048] 
[   32.134398] Freed by task 195:
[   32.134901]  kasan_save_stack+0x3c/0x68
[   32.135434]  kasan_save_track+0x20/0x40
[   32.136055]  kasan_save_free_info+0x4c/0x78
[   32.136554]  __kasan_slab_free+0x6c/0x98
[   32.137389]  kmem_cache_free+0x118/0x468
[   32.138039]  kmem_cache_double_free+0x144/0x3e0
[   32.138724]  kunit_try_run_case+0x14c/0x3d0
[   32.139397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.140120]  kthread+0x24c/0x2d0
[   32.141008]  ret_from_fork+0x10/0x20
[   32.141620] 
[   32.141951] The buggy address belongs to the object at fff00000c57a6000
[   32.141951]  which belongs to the cache test_cache of size 200
[   32.143495] The buggy address is located 0 bytes inside of
[   32.143495]  200-byte region [fff00000c57a6000, fff00000c57a60c8)
[   32.144996] 
[   32.145594] The buggy address belongs to the physical page:
[   32.146248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a6
[   32.147194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.148010] page_type: f5(slab)
[   32.148548] raw: 0bfffe0000000000 fff00000c6812140 dead000000000122 0000000000000000
[   32.149482] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.150155] page dumped because: kasan: bad access detected
[   32.150921] 
[   32.151506] Memory state around the buggy address:
[   32.152179]  fff00000c57a5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.152839]  fff00000c57a5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.154282] >fff00000c57a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.154942]                    ^
[   32.155539]  fff00000c57a6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.156444]  fff00000c57a6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.157326] ==================================================================

test log snippet boot parser 16

Home

[   33.421400] ==================================================================
[   33.422455] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   33.423405] Free of addr fff00000c6813e00 by task kunit_try_catch/221
[   33.424154] 
[   33.424506] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.425889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.426340] Hardware name: linux,dummy-virt (DT)
[   33.426928] Call trace:
[   33.427474]  dump_backtrace+0x9c/0x128
[   33.428158]  show_stack+0x20/0x38
[   33.429111]  dump_stack_lvl+0x8c/0xd0
[   33.429696]  print_report+0x118/0x5e0
[   33.430213]  kasan_report_invalid_free+0xb0/0xd8
[   33.430947]  check_slab_allocation+0xd4/0x108
[   33.431652]  __kasan_mempool_poison_object+0x78/0x150
[   33.432269]  mempool_free+0x28c/0x328
[   33.433294]  mempool_double_free_helper+0x15c/0x2f8
[   33.434118]  mempool_kmalloc_double_free+0xb8/0x110
[   33.434796]  kunit_try_run_case+0x14c/0x3d0
[   33.435417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.436175]  kthread+0x24c/0x2d0
[   33.436828]  ret_from_fork+0x10/0x20
[   33.437425] 
[   33.437736] Allocated by task 221:
[   33.438305]  kasan_save_stack+0x3c/0x68
[   33.438887]  kasan_save_track+0x20/0x40
[   33.439922]  kasan_save_alloc_info+0x40/0x58
[   33.440538]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.441638]  remove_element+0x130/0x1f8
[   33.442257]  mempool_alloc_preallocated+0x58/0xc0
[   33.442940]  mempool_double_free_helper+0x94/0x2f8
[   33.443629]  mempool_kmalloc_double_free+0xb8/0x110
[   33.444343]  kunit_try_run_case+0x14c/0x3d0
[   33.445910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.446641]  kthread+0x24c/0x2d0
[   33.447252]  ret_from_fork+0x10/0x20
[   33.447876] 
[   33.448237] Freed by task 221:
[   33.448826]  kasan_save_stack+0x3c/0x68
[   33.449696]  kasan_save_track+0x20/0x40
[   33.450305]  kasan_save_free_info+0x4c/0x78
[   33.451000]  __kasan_mempool_poison_object+0xc0/0x150
[   33.451686]  mempool_free+0x28c/0x328
[   33.452339]  mempool_double_free_helper+0x104/0x2f8
[   33.453380]  mempool_kmalloc_double_free+0xb8/0x110
[   33.454300]  kunit_try_run_case+0x14c/0x3d0
[   33.455114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.455998]  kthread+0x24c/0x2d0
[   33.456713]  ret_from_fork+0x10/0x20
[   33.457262] 
[   33.457622] The buggy address belongs to the object at fff00000c6813e00
[   33.457622]  which belongs to the cache kmalloc-128 of size 128
[   33.459220] The buggy address is located 0 bytes inside of
[   33.459220]  128-byte region [fff00000c6813e00, fff00000c6813e80)
[   33.461189] 
[   33.461563] The buggy address belongs to the physical page:
[   33.462222] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106813
[   33.463543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.464286] page_type: f5(slab)
[   33.464739] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.466157] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.467032] page dumped because: kasan: bad access detected
[   33.468503] 
[   33.468945] Memory state around the buggy address:
[   33.469838]  fff00000c6813d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.470796]  fff00000c6813d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.471645] >fff00000c6813e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.472491]                    ^
[   33.473310]  fff00000c6813e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.474159]  fff00000c6813f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.474994] ==================================================================

test log snippet boot parser 17

Home

[   33.486738] ==================================================================
[   33.487891] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   33.488648] Free of addr fff00000c6a68000 by task kunit_try_catch/223
[   33.489759] 
[   33.490171] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.491547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.492201] Hardware name: linux,dummy-virt (DT)
[   33.493079] Call trace:
[   33.493509]  dump_backtrace+0x9c/0x128
[   33.494180]  show_stack+0x20/0x38
[   33.494733]  dump_stack_lvl+0x8c/0xd0
[   33.495378]  print_report+0x118/0x5e0
[   33.495957]  kasan_report_invalid_free+0xb0/0xd8
[   33.496736]  __kasan_mempool_poison_object+0x14c/0x150
[   33.497710]  mempool_free+0x28c/0x328
[   33.498411]  mempool_double_free_helper+0x15c/0x2f8
[   33.499100]  mempool_kmalloc_large_double_free+0xb8/0x110
[   33.499862]  kunit_try_run_case+0x14c/0x3d0
[   33.500504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.501495]  kthread+0x24c/0x2d0
[   33.502057]  ret_from_fork+0x10/0x20
[   33.502690] 
[   33.503030] The buggy address belongs to the physical page:
[   33.503799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a68
[   33.505227] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.506025] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.506903] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.507773] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.508681] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.509747] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.510669] head: 0bfffe0000000002 ffffc1ffc31a9a01 ffffffffffffffff 0000000000000000
[   33.511615] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.512481] page dumped because: kasan: bad access detected
[   33.513363] 
[   33.514117] Memory state around the buggy address:
[   33.514628]  fff00000c6a67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.515020]  fff00000c6a67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.515462] >fff00000c6a68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.515802]                    ^
[   33.516100]  fff00000c6a68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.517688]  fff00000c6a68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.518600] ==================================================================

test log snippet boot parser 18

Home

[   33.529877] ==================================================================
[   33.531171] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   33.531969] Free of addr fff00000c699c000 by task kunit_try_catch/225
[   33.532530] 
[   33.533119] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.534455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.536064] Hardware name: linux,dummy-virt (DT)
[   33.536823] Call trace:
[   33.537416]  dump_backtrace+0x9c/0x128
[   33.538088]  show_stack+0x20/0x38
[   33.538443]  dump_stack_lvl+0x8c/0xd0
[   33.539256]  print_report+0x118/0x5e0
[   33.539996]  kasan_report_invalid_free+0xb0/0xd8
[   33.540689]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.541351]  mempool_free+0x24c/0x328
[   33.542655]  mempool_double_free_helper+0x15c/0x2f8
[   33.543385]  mempool_page_alloc_double_free+0xb4/0x110
[   33.544021]  kunit_try_run_case+0x14c/0x3d0
[   33.544666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.545815]  kthread+0x24c/0x2d0
[   33.546290]  ret_from_fork+0x10/0x20
[   33.546809] 
[   33.547192] The buggy address belongs to the physical page:
[   33.547797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10699c
[   33.548873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.550127] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.550875] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.551723] page dumped because: kasan: bad access detected
[   33.552518] 
[   33.552920] Memory state around the buggy address:
[   33.553515]  fff00000c699bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.554535]  fff00000c699bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.555175] >fff00000c699c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.556092]                    ^
[   33.556597]  fff00000c699c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.557801]  fff00000c699c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.558711] ==================================================================

test log snippet boot parser 19

Home

[   33.671857] ==================================================================
[   33.673087] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258
[   33.674334] Read of size 1 at addr ffff9d93515e366d by task kunit_try_catch/231
[   33.675057] 
[   33.675352] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.678074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.678908] Hardware name: linux,dummy-virt (DT)
[   33.679453] Call trace:
[   33.679845]  dump_backtrace+0x9c/0x128
[   33.680439]  show_stack+0x20/0x38
[   33.680936]  dump_stack_lvl+0x8c/0xd0
[   33.681593]  print_report+0x2fc/0x5e0
[   33.683162]  kasan_report+0xc8/0x118
[   33.683835]  __asan_report_load1_noabort+0x20/0x30
[   33.684724]  kasan_global_oob_right+0x220/0x258
[   33.685451]  kunit_try_run_case+0x14c/0x3d0
[   33.686049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.686762]  kthread+0x24c/0x2d0
[   33.687323]  ret_from_fork+0x10/0x20
[   33.687875] 
[   33.688322] The buggy address belongs to the variable:
[   33.688940]  global_array+0xd/0x40
[   33.689557] 
[   33.690036] The buggy address belongs to the virtual mapping at
[   33.690036]  [ffff9d934f960000, ffff9d93516a1000) created by:
[   33.690036]  paging_init+0x668/0x7c8
[   33.692531] 
[   33.693480] The buggy address belongs to the physical page:
[   33.694234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x477e3
[   33.695018] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.696012] raw: 03fffe0000002000 ffffc1ffc01df8c8 ffffc1ffc01df8c8 0000000000000000
[   33.697344] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.698540] page dumped because: kasan: bad access detected
[   33.699182] 
[   33.699432] Memory state around the buggy address:
[   33.699970]  ffff9d93515e3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.701627]  ffff9d93515e3580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.702652] >ffff9d93515e3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   33.703454]                                                           ^
[   33.704133]  ffff9d93515e3680: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   33.705115]  ffff9d93515e3700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   33.706219] ==================================================================

test log snippet boot parser 20

Home

[   29.966118] ==================================================================
[   29.967536] BUG: KASAN: invalid-free in kfree+0x260/0x3b8
[   29.968237] Free of addr fff00000c6984001 by task kunit_try_catch/136
[   29.968850] 
[   29.970075] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.971304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.972072] Hardware name: linux,dummy-virt (DT)
[   29.972921] Call trace:
[   29.973197]  dump_backtrace+0x9c/0x128
[   29.973465]  show_stack+0x20/0x38
[   29.973711]  dump_stack_lvl+0x8c/0xd0
[   29.973964]  print_report+0x118/0x5e0
[   29.975222]  kasan_report_invalid_free+0xb0/0xd8
[   29.975845]  __kasan_kfree_large+0x5c/0xa8
[   29.976621]  free_large_kmalloc+0x58/0x140
[   29.977569]  kfree+0x260/0x3b8
[   29.978075]  kmalloc_large_invalid_free+0x114/0x290
[   29.978805]  kunit_try_run_case+0x14c/0x3d0
[   29.979424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.980163]  kthread+0x24c/0x2d0
[   29.980893]  ret_from_fork+0x10/0x20
[   29.981542] 
[   29.982054] The buggy address belongs to the physical page:
[   29.982650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   29.983515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.984340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.985548] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.986334] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.987000] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.988003] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.989115] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   29.990126] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.990821] page dumped because: kasan: bad access detected
[   29.991376] 
[   29.991733] Memory state around the buggy address:
[   29.992415]  fff00000c6983f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.993434]  fff00000c6983f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.994327] >fff00000c6984000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.995044]                    ^
[   29.995583]  fff00000c6984080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.996440]  fff00000c6984100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.997645] ==================================================================

test log snippet boot parser 21

Home

[   32.182421] ==================================================================
[   32.183561] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8
[   32.184304] Free of addr fff00000c6803001 by task kunit_try_catch/197
[   32.184962] 
[   32.185376] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.186762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.187371] Hardware name: linux,dummy-virt (DT)
[   32.187857] Call trace:
[   32.188527]  dump_backtrace+0x9c/0x128
[   32.189613]  show_stack+0x20/0x38
[   32.190153]  dump_stack_lvl+0x8c/0xd0
[   32.190754]  print_report+0x118/0x5e0
[   32.191311]  kasan_report_invalid_free+0xb0/0xd8
[   32.191923]  check_slab_allocation+0xfc/0x108
[   32.192554]  __kasan_slab_pre_free+0x2c/0x48
[   32.193601]  kmem_cache_free+0xf0/0x468
[   32.194175]  kmem_cache_invalid_free+0x190/0x3d8
[   32.194759]  kunit_try_run_case+0x14c/0x3d0
[   32.195295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.196065]  kthread+0x24c/0x2d0
[   32.196634]  ret_from_fork+0x10/0x20
[   32.197656] 
[   32.198028] Allocated by task 197:
[   32.198567]  kasan_save_stack+0x3c/0x68
[   32.199129]  kasan_save_track+0x20/0x40
[   32.199750]  kasan_save_alloc_info+0x40/0x58
[   32.200326]  __kasan_slab_alloc+0xa8/0xb0
[   32.201196]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.202433]  kmem_cache_invalid_free+0x130/0x3d8
[   32.203072]  kunit_try_run_case+0x14c/0x3d0
[   32.203660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.204284]  kthread+0x24c/0x2d0
[   32.205348]  ret_from_fork+0x10/0x20
[   32.205883] 
[   32.206264] The buggy address belongs to the object at fff00000c6803000
[   32.206264]  which belongs to the cache test_cache of size 200
[   32.207453] The buggy address is located 1 bytes inside of
[   32.207453]  200-byte region [fff00000c6803000, fff00000c68030c8)
[   32.208530] 
[   32.209315] The buggy address belongs to the physical page:
[   32.210066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106803
[   32.210961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.211604] page_type: f5(slab)
[   32.212175] raw: 0bfffe0000000000 fff00000c6812280 dead000000000122 0000000000000000
[   32.213443] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.214338] page dumped because: kasan: bad access detected
[   32.214869] 
[   32.215252] Memory state around the buggy address:
[   32.215915]  fff00000c6802f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.216679]  fff00000c6802f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   32.217964] >fff00000c6803000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.218740]                    ^
[   32.219209]  fff00000c6803080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.220018]  fff00000c6803100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.221282] ==================================================================

test log snippet boot parser 22

Home

[   33.625690] ==================================================================
[   33.627121] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   33.628049] Free of addr fff00000c6a30001 by task kunit_try_catch/229
[   33.629135] 
[   33.629897] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.630859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.631477] Hardware name: linux,dummy-virt (DT)
[   33.632064] Call trace:
[   33.632555]  dump_backtrace+0x9c/0x128
[   33.633617]  show_stack+0x20/0x38
[   33.634365]  dump_stack_lvl+0x8c/0xd0
[   33.634935]  print_report+0x118/0x5e0
[   33.635805]  kasan_report_invalid_free+0xb0/0xd8
[   33.636632]  __kasan_mempool_poison_object+0xfc/0x150
[   33.637393]  mempool_free+0x28c/0x328
[   33.637889]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   33.638549]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   33.639431]  kunit_try_run_case+0x14c/0x3d0
[   33.640013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.641443]  kthread+0x24c/0x2d0
[   33.641937]  ret_from_fork+0x10/0x20
[   33.642610] 
[   33.643017] The buggy address belongs to the physical page:
[   33.643621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a30
[   33.644547] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.645431] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.646786] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.647801] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.649049] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.649752] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.650755] head: 0bfffe0000000002 ffffc1ffc31a8c01 ffffffffffffffff 0000000000000000
[   33.651682] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.652563] page dumped because: kasan: bad access detected
[   33.653690] 
[   33.654082] Memory state around the buggy address:
[   33.654799]  fff00000c6a2ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.655591]  fff00000c6a2ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.656534] >fff00000c6a30000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.657296]                    ^
[   33.657842]  fff00000c6a30080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.658619]  fff00000c6a30100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.659956] ==================================================================

test log snippet boot parser 23

Home

[   33.570155] ==================================================================
[   33.571502] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   33.572558] Free of addr fff00000c685a401 by task kunit_try_catch/227
[   33.574353] 
[   33.574748] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.576366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.577182] Hardware name: linux,dummy-virt (DT)
[   33.577946] Call trace:
[   33.578615]  dump_backtrace+0x9c/0x128
[   33.579412]  show_stack+0x20/0x38
[   33.580143]  dump_stack_lvl+0x8c/0xd0
[   33.581087]  print_report+0x118/0x5e0
[   33.581528]  kasan_report_invalid_free+0xb0/0xd8
[   33.582374]  check_slab_allocation+0xfc/0x108
[   33.583119]  __kasan_mempool_poison_object+0x78/0x150
[   33.583721]  mempool_free+0x28c/0x328
[   33.584337]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   33.584998]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.585718]  kunit_try_run_case+0x14c/0x3d0
[   33.586433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.587159]  kthread+0x24c/0x2d0
[   33.587605]  ret_from_fork+0x10/0x20
[   33.588225] 
[   33.588589] Allocated by task 227:
[   33.589052]  kasan_save_stack+0x3c/0x68
[   33.589746]  kasan_save_track+0x20/0x40
[   33.590401]  kasan_save_alloc_info+0x40/0x58
[   33.591151]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.591787]  remove_element+0x130/0x1f8
[   33.592510]  mempool_alloc_preallocated+0x58/0xc0
[   33.593789]  mempool_kmalloc_invalid_free_helper+0x94/0x2b0
[   33.594365]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.594806]  kunit_try_run_case+0x14c/0x3d0
[   33.595522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.596294]  kthread+0x24c/0x2d0
[   33.596877]  ret_from_fork+0x10/0x20
[   33.597883] 
[   33.598307] The buggy address belongs to the object at fff00000c685a400
[   33.598307]  which belongs to the cache kmalloc-128 of size 128
[   33.599551] The buggy address is located 1 bytes inside of
[   33.599551]  128-byte region [fff00000c685a400, fff00000c685a480)
[   33.600957] 
[   33.601347] The buggy address belongs to the physical page:
[   33.602129] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685a
[   33.603164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.603965] page_type: f5(slab)
[   33.604524] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.605770] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.606639] page dumped because: kasan: bad access detected
[   33.607311] 
[   33.607712] Memory state around the buggy address:
[   33.608326]  fff00000c685a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.609525]  fff00000c685a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.610545] >fff00000c685a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.611378]                    ^
[   33.611857]  fff00000c685a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.613650]  fff00000c685a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.614336] ==================================================================

test log snippet boot parser 24

Home

[   31.137246] ==================================================================
[   31.138497] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8
[   31.139366] Read of size 18446744073709551614 at addr fff00000c680f704 by task kunit_try_catch/166
[   31.140475] 
[   31.141400] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.142529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.143215] Hardware name: linux,dummy-virt (DT)
[   31.143772] Call trace:
[   31.144283]  dump_backtrace+0x9c/0x128
[   31.145212]  show_stack+0x20/0x38
[   31.145747]  dump_stack_lvl+0x8c/0xd0
[   31.146463]  print_report+0x118/0x5e0
[   31.147198]  kasan_report+0xc8/0x118
[   31.147766]  kasan_check_range+0x100/0x1a8
[   31.148354]  __asan_memmove+0x3c/0x98
[   31.148940]  kmalloc_memmove_negative_size+0x15c/0x2f8
[   31.149962]  kunit_try_run_case+0x14c/0x3d0
[   31.150805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.151458]  kthread+0x24c/0x2d0
[   31.152043]  ret_from_fork+0x10/0x20
[   31.152605] 
[   31.152920] Allocated by task 166:
[   31.153496]  kasan_save_stack+0x3c/0x68
[   31.154063]  kasan_save_track+0x20/0x40
[   31.154916]  kasan_save_alloc_info+0x40/0x58
[   31.155589]  __kasan_kmalloc+0xd4/0xd8
[   31.156126]  __kmalloc_cache_noprof+0x144/0x328
[   31.157371]  kmalloc_memmove_negative_size+0xb8/0x2f8
[   31.158008]  kunit_try_run_case+0x14c/0x3d0
[   31.158658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.159288]  kthread+0x24c/0x2d0
[   31.159838]  ret_from_fork+0x10/0x20
[   31.160469] 
[   31.161194] The buggy address belongs to the object at fff00000c680f700
[   31.161194]  which belongs to the cache kmalloc-64 of size 64
[   31.162295] The buggy address is located 4 bytes inside of
[   31.162295]  64-byte region [fff00000c680f700, fff00000c680f740)
[   31.163538] 
[   31.163902] The buggy address belongs to the physical page:
[   31.164610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10680f
[   31.165822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.166690] page_type: f5(slab)
[   31.167282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.167955] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.169119] page dumped because: kasan: bad access detected
[   31.170044] 
[   31.170407] Memory state around the buggy address:
[   31.171078]  fff00000c680f600: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   31.171783]  fff00000c680f680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.172695] >fff00000c680f700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.173439]                    ^
[   31.174007]  fff00000c680f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.174847]  fff00000c680f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.176047] ==================================================================

test log snippet boot parser 25

Home

[   35.673249] ==================================================================
[   35.674068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   35.675013] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.675960] 
[   35.676357] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.677618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.678174] Hardware name: linux,dummy-virt (DT)
[   35.678798] Call trace:
[   35.679270]  dump_backtrace+0x9c/0x128
[   35.679943]  show_stack+0x20/0x38
[   35.680586]  dump_stack_lvl+0x8c/0xd0
[   35.681258]  print_report+0x118/0x5e0
[   35.681825]  kasan_report+0xc8/0x118
[   35.682496]  kasan_check_range+0x100/0x1a8
[   35.683143]  __kasan_check_write+0x20/0x30
[   35.683740]  kasan_atomics_helper+0x6bc/0x49c8
[   35.684535]  kasan_atomics+0x1a0/0x2e8
[   35.685134]  kunit_try_run_case+0x14c/0x3d0
[   35.685807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.686636]  kthread+0x24c/0x2d0
[   35.687194]  ret_from_fork+0x10/0x20
[   35.687852] 
[   35.688253] Allocated by task 251:
[   35.688737]  kasan_save_stack+0x3c/0x68
[   35.689414]  kasan_save_track+0x20/0x40
[   35.689904]  kasan_save_alloc_info+0x40/0x58
[   35.690620]  __kasan_kmalloc+0xd4/0xd8
[   35.691308]  __kmalloc_cache_noprof+0x144/0x328
[   35.692022]  kasan_atomics+0xb8/0x2e8
[   35.692675]  kunit_try_run_case+0x14c/0x3d0
[   35.693239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.694054]  kthread+0x24c/0x2d0
[   35.694614]  ret_from_fork+0x10/0x20
[   35.695239] 
[   35.695645] The buggy address belongs to the object at fff00000c5809b80
[   35.695645]  which belongs to the cache kmalloc-64 of size 64
[   35.696857] The buggy address is located 0 bytes to the right of
[   35.696857]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.698168] 
[   35.698544] The buggy address belongs to the physical page:
[   35.699230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.700238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.701072] page_type: f5(slab)
[   35.701692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.702583] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.703459] page dumped because: kasan: bad access detected
[   35.704181] 
[   35.704588] Memory state around the buggy address:
[   35.705216]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.706030]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.706931] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.707775]                                      ^
[   35.708443]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709283]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.710129] ==================================================================
---
[   36.373951] ==================================================================
[   36.374730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   36.375434] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.376365] 
[   36.376846] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.378106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.379217] Hardware name: linux,dummy-virt (DT)
[   36.379868] Call trace:
[   36.381254]  dump_backtrace+0x9c/0x128
[   36.381997]  show_stack+0x20/0x38
[   36.382736]  dump_stack_lvl+0x8c/0xd0
[   36.383513]  print_report+0x118/0x5e0
[   36.384118]  kasan_report+0xc8/0x118
[   36.384629]  kasan_check_range+0x100/0x1a8
[   36.385243]  __kasan_check_write+0x20/0x30
[   36.385949]  kasan_atomics_helper+0xda0/0x49c8
[   36.386617]  kasan_atomics+0x1a0/0x2e8
[   36.387340]  kunit_try_run_case+0x14c/0x3d0
[   36.388028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.388810]  kthread+0x24c/0x2d0
[   36.389439]  ret_from_fork+0x10/0x20
[   36.390093] 
[   36.390529] Allocated by task 251:
[   36.391044]  kasan_save_stack+0x3c/0x68
[   36.391754]  kasan_save_track+0x20/0x40
[   36.392533]  kasan_save_alloc_info+0x40/0x58
[   36.393162]  __kasan_kmalloc+0xd4/0xd8
[   36.393793]  __kmalloc_cache_noprof+0x144/0x328
[   36.394457]  kasan_atomics+0xb8/0x2e8
[   36.395109]  kunit_try_run_case+0x14c/0x3d0
[   36.395642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.396461]  kthread+0x24c/0x2d0
[   36.397080]  ret_from_fork+0x10/0x20
[   36.397658] 
[   36.398064] The buggy address belongs to the object at fff00000c5809b80
[   36.398064]  which belongs to the cache kmalloc-64 of size 64
[   36.399365] The buggy address is located 0 bytes to the right of
[   36.399365]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.400615] 
[   36.401049] The buggy address belongs to the physical page:
[   36.401767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.402776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.403661] page_type: f5(slab)
[   36.404285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.405136] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.406089] page dumped because: kasan: bad access detected
[   36.406783] 
[   36.407201] Memory state around the buggy address:
[   36.407831]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.408629]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.409520] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.410343]                                      ^
[   36.411081]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.411916]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.412739] ==================================================================
---
[   36.801882] ==================================================================
[   36.802555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   36.802938] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.803321] 
[   36.803489] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.803919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.804175] Hardware name: linux,dummy-virt (DT)
[   36.804426] Call trace:
[   36.804601]  dump_backtrace+0x9c/0x128
[   36.805302]  show_stack+0x20/0x38
[   36.805918]  dump_stack_lvl+0x8c/0xd0
[   36.806582]  print_report+0x118/0x5e0
[   36.807784]  kasan_report+0xc8/0x118
[   36.808884]  kasan_check_range+0x100/0x1a8
[   36.809660]  __kasan_check_write+0x20/0x30
[   36.810296]  kasan_atomics_helper+0x1144/0x49c8
[   36.811228]  kasan_atomics+0x1a0/0x2e8
[   36.812014]  kunit_try_run_case+0x14c/0x3d0
[   36.812817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.813574]  kthread+0x24c/0x2d0
[   36.814423]  ret_from_fork+0x10/0x20
[   36.815058] 
[   36.815433] Allocated by task 251:
[   36.815887]  kasan_save_stack+0x3c/0x68
[   36.816622]  kasan_save_track+0x20/0x40
[   36.817171]  kasan_save_alloc_info+0x40/0x58
[   36.817858]  __kasan_kmalloc+0xd4/0xd8
[   36.818530]  __kmalloc_cache_noprof+0x144/0x328
[   36.819211]  kasan_atomics+0xb8/0x2e8
[   36.819850]  kunit_try_run_case+0x14c/0x3d0
[   36.820493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.821203]  kthread+0x24c/0x2d0
[   36.821781]  ret_from_fork+0x10/0x20
[   36.822356] 
[   36.822769] The buggy address belongs to the object at fff00000c5809b80
[   36.822769]  which belongs to the cache kmalloc-64 of size 64
[   36.823959] The buggy address is located 0 bytes to the right of
[   36.823959]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.825251] 
[   36.825679] The buggy address belongs to the physical page:
[   36.826432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.827486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.828257] page_type: f5(slab)
[   36.828865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.829806] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.830608] page dumped because: kasan: bad access detected
[   36.831464] 
[   36.831800] Memory state around the buggy address:
[   36.832453]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.833316]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.834023] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.834924]                                      ^
[   36.835611]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.836509]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.837285] ==================================================================
---
[   36.017221] ==================================================================
[   36.018384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   36.019177] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.019995] 
[   36.020345] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.021561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.022122] Hardware name: linux,dummy-virt (DT)
[   36.022659] Call trace:
[   36.023051]  dump_backtrace+0x9c/0x128
[   36.024183]  show_stack+0x20/0x38
[   36.024730]  dump_stack_lvl+0x8c/0xd0
[   36.025437]  print_report+0x118/0x5e0
[   36.026193]  kasan_report+0xc8/0x118
[   36.026778]  kasan_check_range+0x100/0x1a8
[   36.027330]  __kasan_check_write+0x20/0x30
[   36.027965]  kasan_atomics_helper+0xabc/0x49c8
[   36.028694]  kasan_atomics+0x1a0/0x2e8
[   36.029351]  kunit_try_run_case+0x14c/0x3d0
[   36.030083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.030899]  kthread+0x24c/0x2d0
[   36.031544]  ret_from_fork+0x10/0x20
[   36.032150] 
[   36.032480] Allocated by task 251:
[   36.033068]  kasan_save_stack+0x3c/0x68
[   36.033788]  kasan_save_track+0x20/0x40
[   36.034379]  kasan_save_alloc_info+0x40/0x58
[   36.035058]  __kasan_kmalloc+0xd4/0xd8
[   36.035634]  __kmalloc_cache_noprof+0x144/0x328
[   36.036257]  kasan_atomics+0xb8/0x2e8
[   36.036910]  kunit_try_run_case+0x14c/0x3d0
[   36.037561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.038381]  kthread+0x24c/0x2d0
[   36.038946]  ret_from_fork+0x10/0x20
[   36.039606] 
[   36.039935] The buggy address belongs to the object at fff00000c5809b80
[   36.039935]  which belongs to the cache kmalloc-64 of size 64
[   36.041200] The buggy address is located 0 bytes to the right of
[   36.041200]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.042572] 
[   36.042993] The buggy address belongs to the physical page:
[   36.043753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.044549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.045482] page_type: f5(slab)
[   36.046089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.046924] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.047879] page dumped because: kasan: bad access detected
[   36.048589] 
[   36.049017] Memory state around the buggy address:
[   36.049661]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.050708]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.051580] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.052430]                                      ^
[   36.053055]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.053936]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.054778] ==================================================================
---
[   35.751617] ==================================================================
[   35.752455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   35.753827] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.754764] 
[   35.755216] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.756340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.756938] Hardware name: linux,dummy-virt (DT)
[   35.757621] Call trace:
[   35.758034]  dump_backtrace+0x9c/0x128
[   35.758697]  show_stack+0x20/0x38
[   35.759220]  dump_stack_lvl+0x8c/0xd0
[   35.759885]  print_report+0x118/0x5e0
[   35.760429]  kasan_report+0xc8/0x118
[   35.761080]  kasan_check_range+0x100/0x1a8
[   35.761781]  __kasan_check_write+0x20/0x30
[   35.762511]  kasan_atomics_helper+0x7a0/0x49c8
[   35.763138]  kasan_atomics+0x1a0/0x2e8
[   35.763775]  kunit_try_run_case+0x14c/0x3d0
[   35.764549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.765396]  kthread+0x24c/0x2d0
[   35.765949]  ret_from_fork+0x10/0x20
[   35.766626] 
[   35.766970] Allocated by task 251:
[   35.767501]  kasan_save_stack+0x3c/0x68
[   35.768235]  kasan_save_track+0x20/0x40
[   35.768906]  kasan_save_alloc_info+0x40/0x58
[   35.769558]  __kasan_kmalloc+0xd4/0xd8
[   35.770228]  __kmalloc_cache_noprof+0x144/0x328
[   35.770875]  kasan_atomics+0xb8/0x2e8
[   35.771533]  kunit_try_run_case+0x14c/0x3d0
[   35.772118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.772910]  kthread+0x24c/0x2d0
[   35.773444]  ret_from_fork+0x10/0x20
[   35.774109] 
[   35.774478] The buggy address belongs to the object at fff00000c5809b80
[   35.774478]  which belongs to the cache kmalloc-64 of size 64
[   35.775722] The buggy address is located 0 bytes to the right of
[   35.775722]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.777092] 
[   35.777513] The buggy address belongs to the physical page:
[   35.778198] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.779176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.779909] page_type: f5(slab)
[   35.780539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.781399] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.782341] page dumped because: kasan: bad access detected
[   35.783042] 
[   35.783389] Memory state around the buggy address:
[   35.784045]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.784927]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.785790] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.786621]                                      ^
[   35.787263]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.788121]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.788959] ==================================================================
---
[   35.941365] ==================================================================
[   35.942182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   35.942921] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.943729] 
[   35.944138] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.945094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.945712] Hardware name: linux,dummy-virt (DT)
[   35.946400] Call trace:
[   35.946861]  dump_backtrace+0x9c/0x128
[   35.947504]  show_stack+0x20/0x38
[   35.948008]  dump_stack_lvl+0x8c/0xd0
[   35.948629]  print_report+0x118/0x5e0
[   35.949148]  kasan_report+0xc8/0x118
[   35.949764]  kasan_check_range+0x100/0x1a8
[   35.950336]  __kasan_check_write+0x20/0x30
[   35.950923]  kasan_atomics_helper+0x9e4/0x49c8
[   35.951639]  kasan_atomics+0x1a0/0x2e8
[   35.952163]  kunit_try_run_case+0x14c/0x3d0
[   35.952826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.953599]  kthread+0x24c/0x2d0
[   35.954195]  ret_from_fork+0x10/0x20
[   35.954801] 
[   35.955153] Allocated by task 251:
[   35.955703]  kasan_save_stack+0x3c/0x68
[   35.956249]  kasan_save_track+0x20/0x40
[   35.956847]  kasan_save_alloc_info+0x40/0x58
[   35.957534]  __kasan_kmalloc+0xd4/0xd8
[   35.958183]  __kmalloc_cache_noprof+0x144/0x328
[   35.958816]  kasan_atomics+0xb8/0x2e8
[   35.959346]  kunit_try_run_case+0x14c/0x3d0
[   35.960018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.960801]  kthread+0x24c/0x2d0
[   35.961398]  ret_from_fork+0x10/0x20
[   35.961904] 
[   35.962291] The buggy address belongs to the object at fff00000c5809b80
[   35.962291]  which belongs to the cache kmalloc-64 of size 64
[   35.963497] The buggy address is located 0 bytes to the right of
[   35.963497]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.964761] 
[   35.965150] The buggy address belongs to the physical page:
[   35.965863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.966782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.967650] page_type: f5(slab)
[   35.968231] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.969001] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.969945] page dumped because: kasan: bad access detected
[   35.970669] 
[   35.971057] Memory state around the buggy address:
[   35.971617]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.972516]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.973347] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.974290]                                      ^
[   35.975028]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.975920]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.976802] ==================================================================
---
[   35.470718] ==================================================================
[   35.471364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   35.472037] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.473446] 
[   35.474012] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.475314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.476013] Hardware name: linux,dummy-virt (DT)
[   35.476965] Call trace:
[   35.477534]  dump_backtrace+0x9c/0x128
[   35.478326]  show_stack+0x20/0x38
[   35.478995]  dump_stack_lvl+0x8c/0xd0
[   35.479612]  print_report+0x118/0x5e0
[   35.480320]  kasan_report+0xc8/0x118
[   35.481262]  kasan_check_range+0x100/0x1a8
[   35.481918]  __kasan_check_write+0x20/0x30
[   35.482565]  kasan_atomics_helper+0x4a0/0x49c8
[   35.483154]  kasan_atomics+0x1a0/0x2e8
[   35.483657]  kunit_try_run_case+0x14c/0x3d0
[   35.484349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.485289]  kthread+0x24c/0x2d0
[   35.486044]  ret_from_fork+0x10/0x20
[   35.486555] 
[   35.486871] Allocated by task 251:
[   35.487380]  kasan_save_stack+0x3c/0x68
[   35.488028]  kasan_save_track+0x20/0x40
[   35.488620]  kasan_save_alloc_info+0x40/0x58
[   35.489661]  __kasan_kmalloc+0xd4/0xd8
[   35.490599]  __kmalloc_cache_noprof+0x144/0x328
[   35.491044]  kasan_atomics+0xb8/0x2e8
[   35.491642]  kunit_try_run_case+0x14c/0x3d0
[   35.492320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.493008]  kthread+0x24c/0x2d0
[   35.493566]  ret_from_fork+0x10/0x20
[   35.494078] 
[   35.494463] The buggy address belongs to the object at fff00000c5809b80
[   35.494463]  which belongs to the cache kmalloc-64 of size 64
[   35.495569] The buggy address is located 0 bytes to the right of
[   35.495569]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.496803] 
[   35.497203] The buggy address belongs to the physical page:
[   35.497931] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.499284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.500797] page_type: f5(slab)
[   35.501525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.502563] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.503441] page dumped because: kasan: bad access detected
[   35.504095] 
[   35.504429] Memory state around the buggy address:
[   35.504937]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.506187]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.506853] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.507735]                                      ^
[   35.508435]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.509463]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.510313] ==================================================================
---
[   36.961250] ==================================================================
[   36.962238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   36.964005] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.965019] 
[   36.965427] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.966505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.967105] Hardware name: linux,dummy-virt (DT)
[   36.967738] Call trace:
[   36.968225]  dump_backtrace+0x9c/0x128
[   36.968857]  show_stack+0x20/0x38
[   36.969482]  dump_stack_lvl+0x8c/0xd0
[   36.970073]  print_report+0x118/0x5e0
[   36.970562]  kasan_report+0xc8/0x118
[   36.971226]  kasan_check_range+0x100/0x1a8
[   36.971924]  __kasan_check_write+0x20/0x30
[   36.972650]  kasan_atomics_helper+0x1300/0x49c8
[   36.973424]  kasan_atomics+0x1a0/0x2e8
[   36.974072]  kunit_try_run_case+0x14c/0x3d0
[   36.974787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.975470]  kthread+0x24c/0x2d0
[   36.976080]  ret_from_fork+0x10/0x20
[   36.976646] 
[   36.977080] Allocated by task 251:
[   36.977674]  kasan_save_stack+0x3c/0x68
[   36.978371]  kasan_save_track+0x20/0x40
[   36.978917]  kasan_save_alloc_info+0x40/0x58
[   36.979616]  __kasan_kmalloc+0xd4/0xd8
[   36.980282]  __kmalloc_cache_noprof+0x144/0x328
[   36.980998]  kasan_atomics+0xb8/0x2e8
[   36.981612]  kunit_try_run_case+0x14c/0x3d0
[   36.982229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.983047]  kthread+0x24c/0x2d0
[   36.983663]  ret_from_fork+0x10/0x20
[   36.984262] 
[   36.984599] The buggy address belongs to the object at fff00000c5809b80
[   36.984599]  which belongs to the cache kmalloc-64 of size 64
[   36.985850] The buggy address is located 0 bytes to the right of
[   36.985850]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.987198] 
[   36.987633] The buggy address belongs to the physical page:
[   36.988275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.989332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.990081] page_type: f5(slab)
[   36.990560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.991892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.992945] page dumped because: kasan: bad access detected
[   36.993858] 
[   36.994410] Memory state around the buggy address:
[   36.995123]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.996200]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.997248] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.998261]                                      ^
[   36.999111]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.000152]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.000869] ==================================================================
---
[   35.295807] ==================================================================
[   35.296612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   35.298249] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.299550] 
[   35.300352] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.301796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.302422] Hardware name: linux,dummy-virt (DT)
[   35.303113] Call trace:
[   35.303608]  dump_backtrace+0x9c/0x128
[   35.304298]  show_stack+0x20/0x38
[   35.304942]  dump_stack_lvl+0x8c/0xd0
[   35.305881]  print_report+0x118/0x5e0
[   35.306670]  kasan_report+0xc8/0x118
[   35.307392]  kasan_check_range+0x100/0x1a8
[   35.308346]  __kasan_check_write+0x20/0x30
[   35.309090]  kasan_atomics_helper+0x344/0x49c8
[   35.309918]  kasan_atomics+0x1a0/0x2e8
[   35.310689]  kunit_try_run_case+0x14c/0x3d0
[   35.311511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.312455]  kthread+0x24c/0x2d0
[   35.313350]  ret_from_fork+0x10/0x20
[   35.313909] 
[   35.314267] Allocated by task 251:
[   35.314751]  kasan_save_stack+0x3c/0x68
[   35.315794]  kasan_save_track+0x20/0x40
[   35.316579]  kasan_save_alloc_info+0x40/0x58
[   35.317438]  __kasan_kmalloc+0xd4/0xd8
[   35.317961]  __kmalloc_cache_noprof+0x144/0x328
[   35.318563]  kasan_atomics+0xb8/0x2e8
[   35.320319]  kunit_try_run_case+0x14c/0x3d0
[   35.321339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.322539]  kthread+0x24c/0x2d0
[   35.323081]  ret_from_fork+0x10/0x20
[   35.323762] 
[   35.324187] The buggy address belongs to the object at fff00000c5809b80
[   35.324187]  which belongs to the cache kmalloc-64 of size 64
[   35.325358] The buggy address is located 0 bytes to the right of
[   35.325358]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.326950] 
[   35.327346] The buggy address belongs to the physical page:
[   35.328190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.329334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.330297] page_type: f5(slab)
[   35.331025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.331996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.333114] page dumped because: kasan: bad access detected
[   35.333774] 
[   35.334236] Memory state around the buggy address:
[   35.334946]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.335856]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.336920] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.337829]                                      ^
[   35.338573]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.339611]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.340439] ==================================================================
---
[   35.595589] ==================================================================
[   35.596419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   35.597356] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.598379] 
[   35.598711] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.599837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.600467] Hardware name: linux,dummy-virt (DT)
[   35.601227] Call trace:
[   35.601650]  dump_backtrace+0x9c/0x128
[   35.602377]  show_stack+0x20/0x38
[   35.602930]  dump_stack_lvl+0x8c/0xd0
[   35.603610]  print_report+0x118/0x5e0
[   35.604271]  kasan_report+0xc8/0x118
[   35.604827]  kasan_check_range+0x100/0x1a8
[   35.605649]  __kasan_check_write+0x20/0x30
[   35.606249]  kasan_atomics_helper+0x5e4/0x49c8
[   35.607016]  kasan_atomics+0x1a0/0x2e8
[   35.607621]  kunit_try_run_case+0x14c/0x3d0
[   35.608232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.609158]  kthread+0x24c/0x2d0
[   35.609662]  ret_from_fork+0x10/0x20
[   35.610364] 
[   35.610737] Allocated by task 251:
[   35.611308]  kasan_save_stack+0x3c/0x68
[   35.611952]  kasan_save_track+0x20/0x40
[   35.612601]  kasan_save_alloc_info+0x40/0x58
[   35.613379]  __kasan_kmalloc+0xd4/0xd8
[   35.613902]  __kmalloc_cache_noprof+0x144/0x328
[   35.614668]  kasan_atomics+0xb8/0x2e8
[   35.615318]  kunit_try_run_case+0x14c/0x3d0
[   35.615921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.616677]  kthread+0x24c/0x2d0
[   35.617343]  ret_from_fork+0x10/0x20
[   35.617957] 
[   35.618416] The buggy address belongs to the object at fff00000c5809b80
[   35.618416]  which belongs to the cache kmalloc-64 of size 64
[   35.619682] The buggy address is located 0 bytes to the right of
[   35.619682]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.620994] 
[   35.621395] The buggy address belongs to the physical page:
[   35.622078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.623009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.623897] page_type: f5(slab)
[   35.624523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.625529] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.626473] page dumped because: kasan: bad access detected
[   35.627104] 
[   35.627509] Memory state around the buggy address:
[   35.628239]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.629082]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.629909] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.630523]                                      ^
[   35.631269]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.632229]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.633027] ==================================================================
---
[   36.917064] ==================================================================
[   36.917706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   36.918482] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.919477] 
[   36.919828] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.921533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.922299] Hardware name: linux,dummy-virt (DT)
[   36.923131] Call trace:
[   36.923749]  dump_backtrace+0x9c/0x128
[   36.924357]  show_stack+0x20/0x38
[   36.925200]  dump_stack_lvl+0x8c/0xd0
[   36.925937]  print_report+0x118/0x5e0
[   36.926531]  kasan_report+0xc8/0x118
[   36.927398]  kasan_check_range+0x100/0x1a8
[   36.928212]  __kasan_check_write+0x20/0x30
[   36.929090]  kasan_atomics_helper+0x1288/0x49c8
[   36.929773]  kasan_atomics+0x1a0/0x2e8
[   36.930325]  kunit_try_run_case+0x14c/0x3d0
[   36.931258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.931913]  kthread+0x24c/0x2d0
[   36.932414]  ret_from_fork+0x10/0x20
[   36.932926] 
[   36.933784] Allocated by task 251:
[   36.934429]  kasan_save_stack+0x3c/0x68
[   36.935226]  kasan_save_track+0x20/0x40
[   36.936019]  kasan_save_alloc_info+0x40/0x58
[   36.936840]  __kasan_kmalloc+0xd4/0xd8
[   36.937605]  __kmalloc_cache_noprof+0x144/0x328
[   36.938408]  kasan_atomics+0xb8/0x2e8
[   36.939377]  kunit_try_run_case+0x14c/0x3d0
[   36.939912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.940782]  kthread+0x24c/0x2d0
[   36.941590]  ret_from_fork+0x10/0x20
[   36.942395] 
[   36.942928] The buggy address belongs to the object at fff00000c5809b80
[   36.942928]  which belongs to the cache kmalloc-64 of size 64
[   36.944314] The buggy address is located 0 bytes to the right of
[   36.944314]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.945550] 
[   36.945871] The buggy address belongs to the physical page:
[   36.947076] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.948169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.949145] page_type: f5(slab)
[   36.949911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.951014] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.952081] page dumped because: kasan: bad access detected
[   36.952957] 
[   36.953515] Memory state around the buggy address:
[   36.954270]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.955321]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.956366] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.957138]                                      ^
[   36.957731]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.958614]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.959337] ==================================================================
---
[   37.511958] ==================================================================
[   37.512770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   37.513871] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.514583] 
[   37.515147] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.516096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.516759] Hardware name: linux,dummy-virt (DT)
[   37.517543] Call trace:
[   37.517960]  dump_backtrace+0x9c/0x128
[   37.518541]  show_stack+0x20/0x38
[   37.519187]  dump_stack_lvl+0x8c/0xd0
[   37.519728]  print_report+0x118/0x5e0
[   37.520408]  kasan_report+0xc8/0x118
[   37.521028]  kasan_check_range+0x100/0x1a8
[   37.521726]  __kasan_check_write+0x20/0x30
[   37.522313]  kasan_atomics_helper+0x1810/0x49c8
[   37.523088]  kasan_atomics+0x1a0/0x2e8
[   37.523679]  kunit_try_run_case+0x14c/0x3d0
[   37.524387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.525111]  kthread+0x24c/0x2d0
[   37.525739]  ret_from_fork+0x10/0x20
[   37.526313] 
[   37.526688] Allocated by task 251:
[   37.527309]  kasan_save_stack+0x3c/0x68
[   37.527872]  kasan_save_track+0x20/0x40
[   37.528437]  kasan_save_alloc_info+0x40/0x58
[   37.529145]  __kasan_kmalloc+0xd4/0xd8
[   37.529712]  __kmalloc_cache_noprof+0x144/0x328
[   37.530438]  kasan_atomics+0xb8/0x2e8
[   37.531064]  kunit_try_run_case+0x14c/0x3d0
[   37.531751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.532466]  kthread+0x24c/0x2d0
[   37.532960]  ret_from_fork+0x10/0x20
[   37.533591] 
[   37.533925] The buggy address belongs to the object at fff00000c5809b80
[   37.533925]  which belongs to the cache kmalloc-64 of size 64
[   37.535120] The buggy address is located 0 bytes to the right of
[   37.535120]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.536336] 
[   37.536706] The buggy address belongs to the physical page:
[   37.537319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.538201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.539024] page_type: f5(slab)
[   37.539599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.540452] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.541457] page dumped because: kasan: bad access detected
[   37.542126] 
[   37.542474] Memory state around the buggy address:
[   37.543107]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.543930]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.544736] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.545549]                                      ^
[   37.546111]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.546916]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.547806] ==================================================================
---
[   36.877687] ==================================================================
[   36.878440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   36.879616] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.880165] 
[   36.880572] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.881860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.882533] Hardware name: linux,dummy-virt (DT)
[   36.883155] Call trace:
[   36.883625]  dump_backtrace+0x9c/0x128
[   36.884293]  show_stack+0x20/0x38
[   36.884908]  dump_stack_lvl+0x8c/0xd0
[   36.885502]  print_report+0x118/0x5e0
[   36.886129]  kasan_report+0xc8/0x118
[   36.886767]  kasan_check_range+0x100/0x1a8
[   36.887443]  __kasan_check_write+0x20/0x30
[   36.887950]  kasan_atomics_helper+0x121c/0x49c8
[   36.888754]  kasan_atomics+0x1a0/0x2e8
[   36.889370]  kunit_try_run_case+0x14c/0x3d0
[   36.890103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.890865]  kthread+0x24c/0x2d0
[   36.891511]  ret_from_fork+0x10/0x20
[   36.892178] 
[   36.892495] Allocated by task 251:
[   36.893131]  kasan_save_stack+0x3c/0x68
[   36.893767]  kasan_save_track+0x20/0x40
[   36.894365]  kasan_save_alloc_info+0x40/0x58
[   36.895052]  __kasan_kmalloc+0xd4/0xd8
[   36.895712]  __kmalloc_cache_noprof+0x144/0x328
[   36.896287]  kasan_atomics+0xb8/0x2e8
[   36.896968]  kunit_try_run_case+0x14c/0x3d0
[   36.897614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.898458]  kthread+0x24c/0x2d0
[   36.898909]  ret_from_fork+0x10/0x20
[   36.899610] 
[   36.900005] The buggy address belongs to the object at fff00000c5809b80
[   36.900005]  which belongs to the cache kmalloc-64 of size 64
[   36.901202] The buggy address is located 0 bytes to the right of
[   36.901202]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.902451] 
[   36.902873] The buggy address belongs to the physical page:
[   36.903654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.904578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.905415] page_type: f5(slab)
[   36.905996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.906930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.907916] page dumped because: kasan: bad access detected
[   36.908612] 
[   36.908999] Memory state around the buggy address:
[   36.909677]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.910530]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.911493] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.912282]                                      ^
[   36.912936]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.913809]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.914584] ==================================================================
---
[   37.128260] ==================================================================
[   37.129162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   37.130949] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.132001] 
[   37.132538] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.133814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.134579] Hardware name: linux,dummy-virt (DT)
[   37.135417] Call trace:
[   37.136061]  dump_backtrace+0x9c/0x128
[   37.136834]  show_stack+0x20/0x38
[   37.137416]  dump_stack_lvl+0x8c/0xd0
[   37.138084]  print_report+0x118/0x5e0
[   37.138639]  kasan_report+0xc8/0x118
[   37.139304]  kasan_check_range+0x100/0x1a8
[   37.139905]  __kasan_check_write+0x20/0x30
[   37.140489]  kasan_atomics_helper+0x14ac/0x49c8
[   37.141136]  kasan_atomics+0x1a0/0x2e8
[   37.141671]  kunit_try_run_case+0x14c/0x3d0
[   37.142306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.142917]  kthread+0x24c/0x2d0
[   37.143568]  ret_from_fork+0x10/0x20
[   37.144158] 
[   37.144739] Allocated by task 251:
[   37.145610]  kasan_save_stack+0x3c/0x68
[   37.146442]  kasan_save_track+0x20/0x40
[   37.147051]  kasan_save_alloc_info+0x40/0x58
[   37.147352]  __kasan_kmalloc+0xd4/0xd8
[   37.147599]  __kmalloc_cache_noprof+0x144/0x328
[   37.147875]  kasan_atomics+0xb8/0x2e8
[   37.148257]  kunit_try_run_case+0x14c/0x3d0
[   37.149212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.149857]  kthread+0x24c/0x2d0
[   37.150572]  ret_from_fork+0x10/0x20
[   37.151237] 
[   37.151616] The buggy address belongs to the object at fff00000c5809b80
[   37.151616]  which belongs to the cache kmalloc-64 of size 64
[   37.152865] The buggy address is located 0 bytes to the right of
[   37.152865]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.154396] 
[   37.154774] The buggy address belongs to the physical page:
[   37.155563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.156429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.157338] page_type: f5(slab)
[   37.157892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.159012] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.159856] page dumped because: kasan: bad access detected
[   37.160536] 
[   37.160898] Memory state around the buggy address:
[   37.161489]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.162433]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.163405] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.164197]                                      ^
[   37.164883]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.165696]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.166406] ==================================================================
---
[   36.609150] ==================================================================
[   36.609925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   36.610953] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.611629] 
[   36.612055] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.613209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.613847] Hardware name: linux,dummy-virt (DT)
[   36.614507] Call trace:
[   36.614964]  dump_backtrace+0x9c/0x128
[   36.615544]  show_stack+0x20/0x38
[   36.616192]  dump_stack_lvl+0x8c/0xd0
[   36.616818]  print_report+0x118/0x5e0
[   36.617499]  kasan_report+0xc8/0x118
[   36.618164]  kasan_check_range+0x100/0x1a8
[   36.618802]  __kasan_check_write+0x20/0x30
[   36.619413]  kasan_atomics_helper+0xf28/0x49c8
[   36.620164]  kasan_atomics+0x1a0/0x2e8
[   36.620744]  kunit_try_run_case+0x14c/0x3d0
[   36.621487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.622135]  kthread+0x24c/0x2d0
[   36.622758]  ret_from_fork+0x10/0x20
[   36.623437] 
[   36.623771] Allocated by task 251:
[   36.624336]  kasan_save_stack+0x3c/0x68
[   36.625008]  kasan_save_track+0x20/0x40
[   36.625613]  kasan_save_alloc_info+0x40/0x58
[   36.626329]  __kasan_kmalloc+0xd4/0xd8
[   36.626939]  __kmalloc_cache_noprof+0x144/0x328
[   36.627573]  kasan_atomics+0xb8/0x2e8
[   36.628163]  kunit_try_run_case+0x14c/0x3d0
[   36.628751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.629581]  kthread+0x24c/0x2d0
[   36.630113]  ret_from_fork+0x10/0x20
[   36.630787] 
[   36.631190] The buggy address belongs to the object at fff00000c5809b80
[   36.631190]  which belongs to the cache kmalloc-64 of size 64
[   36.632508] The buggy address is located 0 bytes to the right of
[   36.632508]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.633797] 
[   36.634234] The buggy address belongs to the physical page:
[   36.634820] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.635833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.636726] page_type: f5(slab)
[   36.637276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.638261] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.639129] page dumped because: kasan: bad access detected
[   36.639855] 
[   36.640279] Memory state around the buggy address:
[   36.641018]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.641818]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.642686] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.643541]                                      ^
[   36.644153]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.645067]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.645866] ==================================================================
---
[   35.904515] ==================================================================
[   35.905293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   35.906207] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.907081] 
[   35.907465] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.908556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.909185] Hardware name: linux,dummy-virt (DT)
[   35.909786] Call trace:
[   35.910271]  dump_backtrace+0x9c/0x128
[   35.910942]  show_stack+0x20/0x38
[   35.911500]  dump_stack_lvl+0x8c/0xd0
[   35.912120]  print_report+0x118/0x5e0
[   35.912738]  kasan_report+0xc8/0x118
[   35.913334]  kasan_check_range+0x100/0x1a8
[   35.913967]  __kasan_check_write+0x20/0x30
[   35.914637]  kasan_atomics_helper+0x978/0x49c8
[   35.915343]  kasan_atomics+0x1a0/0x2e8
[   35.915882]  kunit_try_run_case+0x14c/0x3d0
[   35.916580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.917370]  kthread+0x24c/0x2d0
[   35.917851]  ret_from_fork+0x10/0x20
[   35.918487] 
[   35.918855] Allocated by task 251:
[   35.919364]  kasan_save_stack+0x3c/0x68
[   35.919871]  kasan_save_track+0x20/0x40
[   35.920492]  kasan_save_alloc_info+0x40/0x58
[   35.921164]  __kasan_kmalloc+0xd4/0xd8
[   35.921730]  __kmalloc_cache_noprof+0x144/0x328
[   35.922434]  kasan_atomics+0xb8/0x2e8
[   35.923048]  kunit_try_run_case+0x14c/0x3d0
[   35.923556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924339]  kthread+0x24c/0x2d0
[   35.924898]  ret_from_fork+0x10/0x20
[   35.925527] 
[   35.925835] The buggy address belongs to the object at fff00000c5809b80
[   35.925835]  which belongs to the cache kmalloc-64 of size 64
[   35.927053] The buggy address is located 0 bytes to the right of
[   35.927053]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.928345] 
[   35.928716] The buggy address belongs to the physical page:
[   35.929461] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.930304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.931171] page_type: f5(slab)
[   35.931743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.932618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.933516] page dumped because: kasan: bad access detected
[   35.934171] 
[   35.934540] Memory state around the buggy address:
[   35.935152]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.935812]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.936723] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.937536]                                      ^
[   35.938196]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.938895]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.939792] ==================================================================
---
[   37.437132] ==================================================================
[   37.437802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   37.438744] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.439506] 
[   37.439897] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.441894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.442661] Hardware name: linux,dummy-virt (DT)
[   37.443278] Call trace:
[   37.443672]  dump_backtrace+0x9c/0x128
[   37.444326]  show_stack+0x20/0x38
[   37.444903]  dump_stack_lvl+0x8c/0xd0
[   37.445568]  print_report+0x118/0x5e0
[   37.446147]  kasan_report+0xc8/0x118
[   37.446665]  kasan_check_range+0x100/0x1a8
[   37.447346]  __kasan_check_write+0x20/0x30
[   37.447908]  kasan_atomics_helper+0x1780/0x49c8
[   37.448645]  kasan_atomics+0x1a0/0x2e8
[   37.449173]  kunit_try_run_case+0x14c/0x3d0
[   37.449844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.450609]  kthread+0x24c/0x2d0
[   37.451106]  ret_from_fork+0x10/0x20
[   37.451722] 
[   37.452106] Allocated by task 251:
[   37.452569]  kasan_save_stack+0x3c/0x68
[   37.453228]  kasan_save_track+0x20/0x40
[   37.453766]  kasan_save_alloc_info+0x40/0x58
[   37.454444]  __kasan_kmalloc+0xd4/0xd8
[   37.455004]  __kmalloc_cache_noprof+0x144/0x328
[   37.455680]  kasan_atomics+0xb8/0x2e8
[   37.456305]  kunit_try_run_case+0x14c/0x3d0
[   37.456855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.457572]  kthread+0x24c/0x2d0
[   37.458091]  ret_from_fork+0x10/0x20
[   37.458688] 
[   37.459070] The buggy address belongs to the object at fff00000c5809b80
[   37.459070]  which belongs to the cache kmalloc-64 of size 64
[   37.460278] The buggy address is located 0 bytes to the right of
[   37.460278]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.461486] 
[   37.461856] The buggy address belongs to the physical page:
[   37.462470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.463412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.464106] page_type: f5(slab)
[   37.464684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.465646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.466325] page dumped because: kasan: bad access detected
[   37.467074] 
[   37.467443] Memory state around the buggy address:
[   37.468035]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.468935]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.469709] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.470504]                                      ^
[   37.471128]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.471996]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.472758] ==================================================================
---
[   36.057049] ==================================================================
[   36.057903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   36.058748] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.059451] 
[   36.059886] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.061193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.061694] Hardware name: linux,dummy-virt (DT)
[   36.062433] Call trace:
[   36.062855]  dump_backtrace+0x9c/0x128
[   36.063505]  show_stack+0x20/0x38
[   36.064094]  dump_stack_lvl+0x8c/0xd0
[   36.064716]  print_report+0x118/0x5e0
[   36.065373]  kasan_report+0xc8/0x118
[   36.065944]  kasan_check_range+0x100/0x1a8
[   36.066661]  __kasan_check_write+0x20/0x30
[   36.067255]  kasan_atomics_helper+0xb28/0x49c8
[   36.067996]  kasan_atomics+0x1a0/0x2e8
[   36.068539]  kunit_try_run_case+0x14c/0x3d0
[   36.069256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.070001]  kthread+0x24c/0x2d0
[   36.070560]  ret_from_fork+0x10/0x20
[   36.071133] 
[   36.071536] Allocated by task 251:
[   36.072073]  kasan_save_stack+0x3c/0x68
[   36.072747]  kasan_save_track+0x20/0x40
[   36.073366]  kasan_save_alloc_info+0x40/0x58
[   36.074047]  __kasan_kmalloc+0xd4/0xd8
[   36.074702]  __kmalloc_cache_noprof+0x144/0x328
[   36.075341]  kasan_atomics+0xb8/0x2e8
[   36.076008]  kunit_try_run_case+0x14c/0x3d0
[   36.076583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.077402]  kthread+0x24c/0x2d0
[   36.077926]  ret_from_fork+0x10/0x20
[   36.078566] 
[   36.078970] The buggy address belongs to the object at fff00000c5809b80
[   36.078970]  which belongs to the cache kmalloc-64 of size 64
[   36.080233] The buggy address is located 0 bytes to the right of
[   36.080233]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.081539] 
[   36.081935] The buggy address belongs to the physical page:
[   36.082581] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.083543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.084403] page_type: f5(slab)
[   36.084962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.085910] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.086795] page dumped because: kasan: bad access detected
[   36.087439] 
[   36.087886] Memory state around the buggy address:
[   36.088471]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.089422]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.090298] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.091226]                                      ^
[   36.091867]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.092699]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.093518] ==================================================================
---
[   35.790889] ==================================================================
[   35.791570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   35.792503] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.793345] 
[   35.793622] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.794827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.795491] Hardware name: linux,dummy-virt (DT)
[   35.796537] Call trace:
[   35.797151]  dump_backtrace+0x9c/0x128
[   35.797809]  show_stack+0x20/0x38
[   35.798323]  dump_stack_lvl+0x8c/0xd0
[   35.798999]  print_report+0x118/0x5e0
[   35.799599]  kasan_report+0xc8/0x118
[   35.800259]  kasan_check_range+0x100/0x1a8
[   35.800831]  __kasan_check_write+0x20/0x30
[   35.801557]  kasan_atomics_helper+0x810/0x49c8
[   35.802224]  kasan_atomics+0x1a0/0x2e8
[   35.802896]  kunit_try_run_case+0x14c/0x3d0
[   35.803522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.804337]  kthread+0x24c/0x2d0
[   35.804918]  ret_from_fork+0x10/0x20
[   35.805609] 
[   35.805959] Allocated by task 251:
[   35.806522]  kasan_save_stack+0x3c/0x68
[   35.807182]  kasan_save_track+0x20/0x40
[   35.807846]  kasan_save_alloc_info+0x40/0x58
[   35.808504]  __kasan_kmalloc+0xd4/0xd8
[   35.809161]  __kmalloc_cache_noprof+0x144/0x328
[   35.809734]  kasan_atomics+0xb8/0x2e8
[   35.810378]  kunit_try_run_case+0x14c/0x3d0
[   35.811023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.811779]  kthread+0x24c/0x2d0
[   35.812413]  ret_from_fork+0x10/0x20
[   35.812972] 
[   35.813407] The buggy address belongs to the object at fff00000c5809b80
[   35.813407]  which belongs to the cache kmalloc-64 of size 64
[   35.814656] The buggy address is located 0 bytes to the right of
[   35.814656]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.816007] 
[   35.816414] The buggy address belongs to the physical page:
[   35.817117] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.818088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.819006] page_type: f5(slab)
[   35.819542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.820510] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.821296] page dumped because: kasan: bad access detected
[   35.822085] 
[   35.822400] Memory state around the buggy address:
[   35.823105]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.824041]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.824838] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.825710]                                      ^
[   35.826406]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.827315]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.828386] ==================================================================
---
[   36.725761] ==================================================================
[   36.726659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   36.727521] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.728334] 
[   36.728772] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.729947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.730442] Hardware name: linux,dummy-virt (DT)
[   36.731104] Call trace:
[   36.731521]  dump_backtrace+0x9c/0x128
[   36.732172]  show_stack+0x20/0x38
[   36.732711]  dump_stack_lvl+0x8c/0xd0
[   36.733360]  print_report+0x118/0x5e0
[   36.733995]  kasan_report+0xc8/0x118
[   36.734536]  kasan_check_range+0x100/0x1a8
[   36.735099]  __kasan_check_write+0x20/0x30
[   36.735760]  kasan_atomics_helper+0x106c/0x49c8
[   36.736354]  kasan_atomics+0x1a0/0x2e8
[   36.737004]  kunit_try_run_case+0x14c/0x3d0
[   36.737689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.738295]  kthread+0x24c/0x2d0
[   36.738875]  ret_from_fork+0x10/0x20
[   36.739513] 
[   36.739874] Allocated by task 251:
[   36.740495]  kasan_save_stack+0x3c/0x68
[   36.741105]  kasan_save_track+0x20/0x40
[   36.741742]  kasan_save_alloc_info+0x40/0x58
[   36.742388]  __kasan_kmalloc+0xd4/0xd8
[   36.743015]  __kmalloc_cache_noprof+0x144/0x328
[   36.743570]  kasan_atomics+0xb8/0x2e8
[   36.744170]  kunit_try_run_case+0x14c/0x3d0
[   36.744825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.745477]  kthread+0x24c/0x2d0
[   36.746005]  ret_from_fork+0x10/0x20
[   36.746596] 
[   36.746965] The buggy address belongs to the object at fff00000c5809b80
[   36.746965]  which belongs to the cache kmalloc-64 of size 64
[   36.748137] The buggy address is located 0 bytes to the right of
[   36.748137]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.749587] 
[   36.749963] The buggy address belongs to the physical page:
[   36.750629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.751497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.752337] page_type: f5(slab)
[   36.752810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.753806] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.754558] page dumped because: kasan: bad access detected
[   36.755205] 
[   36.755564] Memory state around the buggy address:
[   36.756223]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.756995]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.757917] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.758736]                                      ^
[   36.759443]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.760213]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.761162] ==================================================================
---
[   37.358875] ==================================================================
[   37.359536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   37.360522] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.361604] 
[   37.361957] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.363141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.363758] Hardware name: linux,dummy-virt (DT)
[   37.364436] Call trace:
[   37.364884]  dump_backtrace+0x9c/0x128
[   37.365618]  show_stack+0x20/0x38
[   37.366206]  dump_stack_lvl+0x8c/0xd0
[   37.366761]  print_report+0x118/0x5e0
[   37.367417]  kasan_report+0xc8/0x118
[   37.368004]  kasan_check_range+0x100/0x1a8
[   37.368711]  __kasan_check_write+0x20/0x30
[   37.369333]  kasan_atomics_helper+0x16f0/0x49c8
[   37.370080]  kasan_atomics+0x1a0/0x2e8
[   37.370776]  kunit_try_run_case+0x14c/0x3d0
[   37.371445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.372272]  kthread+0x24c/0x2d0
[   37.372902]  ret_from_fork+0x10/0x20
[   37.373553] 
[   37.373921] Allocated by task 251:
[   37.374569]  kasan_save_stack+0x3c/0x68
[   37.375159]  kasan_save_track+0x20/0x40
[   37.375764]  kasan_save_alloc_info+0x40/0x58
[   37.376493]  __kasan_kmalloc+0xd4/0xd8
[   37.377082]  __kmalloc_cache_noprof+0x144/0x328
[   37.377817]  kasan_atomics+0xb8/0x2e8
[   37.378464]  kunit_try_run_case+0x14c/0x3d0
[   37.379173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.379889]  kthread+0x24c/0x2d0
[   37.380556]  ret_from_fork+0x10/0x20
[   37.381141] 
[   37.381537] The buggy address belongs to the object at fff00000c5809b80
[   37.381537]  which belongs to the cache kmalloc-64 of size 64
[   37.382830] The buggy address is located 0 bytes to the right of
[   37.382830]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.384206] 
[   37.384591] The buggy address belongs to the physical page:
[   37.385362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.386269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.387171] page_type: f5(slab)
[   37.387747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.388561] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.389508] page dumped because: kasan: bad access detected
[   37.390208] 
[   37.390836] Memory state around the buggy address:
[   37.391454]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.392798]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.393596] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.394465]                                      ^
[   37.395421]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.396463]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.397462] ==================================================================
---
[   36.135196] ==================================================================
[   36.136114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   36.137192] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.138030] 
[   36.138471] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.139664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.140178] Hardware name: linux,dummy-virt (DT)
[   36.140923] Call trace:
[   36.141326]  dump_backtrace+0x9c/0x128
[   36.142029]  show_stack+0x20/0x38
[   36.142613]  dump_stack_lvl+0x8c/0xd0
[   36.143288]  print_report+0x118/0x5e0
[   36.143910]  kasan_report+0xc8/0x118
[   36.144525]  kasan_check_range+0x100/0x1a8
[   36.145166]  __kasan_check_write+0x20/0x30
[   36.145802]  kasan_atomics_helper+0xbc8/0x49c8
[   36.146543]  kasan_atomics+0x1a0/0x2e8
[   36.147150]  kunit_try_run_case+0x14c/0x3d0
[   36.147858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.148560]  kthread+0x24c/0x2d0
[   36.149193]  ret_from_fork+0x10/0x20
[   36.149794] 
[   36.150223] Allocated by task 251:
[   36.150805]  kasan_save_stack+0x3c/0x68
[   36.151540]  kasan_save_track+0x20/0x40
[   36.152125]  kasan_save_alloc_info+0x40/0x58
[   36.152815]  __kasan_kmalloc+0xd4/0xd8
[   36.153378]  __kmalloc_cache_noprof+0x144/0x328
[   36.154127]  kasan_atomics+0xb8/0x2e8
[   36.154688]  kunit_try_run_case+0x14c/0x3d0
[   36.155400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.156118]  kthread+0x24c/0x2d0
[   36.156729]  ret_from_fork+0x10/0x20
[   36.157348] 
[   36.157663] The buggy address belongs to the object at fff00000c5809b80
[   36.157663]  which belongs to the cache kmalloc-64 of size 64
[   36.158921] The buggy address is located 0 bytes to the right of
[   36.158921]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.160588] 
[   36.160958] The buggy address belongs to the physical page:
[   36.161649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.162702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.163492] page_type: f5(slab)
[   36.164042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.164896] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.165837] page dumped because: kasan: bad access detected
[   36.166489] 
[   36.166889] Memory state around the buggy address:
[   36.167520]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.168269]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.169170] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.169933]                                      ^
[   36.170669]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.171527]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.172371] ==================================================================
---
[   37.168431] ==================================================================
[   37.169847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   37.170905] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.171847] 
[   37.172262] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.173263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.173878] Hardware name: linux,dummy-virt (DT)
[   37.174401] Call trace:
[   37.174844]  dump_backtrace+0x9c/0x128
[   37.175500]  show_stack+0x20/0x38
[   37.176107]  dump_stack_lvl+0x8c/0xd0
[   37.176662]  print_report+0x118/0x5e0
[   37.177292]  kasan_report+0xc8/0x118
[   37.177903]  kasan_check_range+0x100/0x1a8
[   37.178521]  __kasan_check_write+0x20/0x30
[   37.179205]  kasan_atomics_helper+0x1518/0x49c8
[   37.179900]  kasan_atomics+0x1a0/0x2e8
[   37.180527]  kunit_try_run_case+0x14c/0x3d0
[   37.181077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.181870]  kthread+0x24c/0x2d0
[   37.182480]  ret_from_fork+0x10/0x20
[   37.183123] 
[   37.183483] Allocated by task 251:
[   37.184066]  kasan_save_stack+0x3c/0x68
[   37.184696]  kasan_save_track+0x20/0x40
[   37.185261]  kasan_save_alloc_info+0x40/0x58
[   37.185792]  __kasan_kmalloc+0xd4/0xd8
[   37.186423]  __kmalloc_cache_noprof+0x144/0x328
[   37.187078]  kasan_atomics+0xb8/0x2e8
[   37.187686]  kunit_try_run_case+0x14c/0x3d0
[   37.188230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.188958]  kthread+0x24c/0x2d0
[   37.189551]  ret_from_fork+0x10/0x20
[   37.190164] 
[   37.190576] The buggy address belongs to the object at fff00000c5809b80
[   37.190576]  which belongs to the cache kmalloc-64 of size 64
[   37.191774] The buggy address is located 0 bytes to the right of
[   37.191774]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.193200] 
[   37.193523] The buggy address belongs to the physical page:
[   37.194233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.195237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.195904] page_type: f5(slab)
[   37.196498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.197416] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.198152] page dumped because: kasan: bad access detected
[   37.198878] 
[   37.199270] Memory state around the buggy address:
[   37.199841]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.200807]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.201540] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.202368]                                      ^
[   37.203043]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.203832]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.204512] ==================================================================
---
[   36.288696] ==================================================================
[   36.289439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   36.290415] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.291385] 
[   36.291804] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.292863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.293523] Hardware name: linux,dummy-virt (DT)
[   36.294104] Call trace:
[   36.294499]  dump_backtrace+0x9c/0x128
[   36.295230]  show_stack+0x20/0x38
[   36.295842]  dump_stack_lvl+0x8c/0xd0
[   36.296545]  print_report+0x118/0x5e0
[   36.297152]  kasan_report+0xc8/0x118
[   36.297690]  kasan_check_range+0x100/0x1a8
[   36.298221]  __kasan_check_write+0x20/0x30
[   36.298747]  kasan_atomics_helper+0xd00/0x49c8
[   36.299257]  kasan_atomics+0x1a0/0x2e8
[   36.299684]  kunit_try_run_case+0x14c/0x3d0
[   36.300183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.300842]  kthread+0x24c/0x2d0
[   36.301351]  ret_from_fork+0x10/0x20
[   36.301859] 
[   36.302223] Allocated by task 251:
[   36.302789]  kasan_save_stack+0x3c/0x68
[   36.303426]  kasan_save_track+0x20/0x40
[   36.304100]  kasan_save_alloc_info+0x40/0x58
[   36.304680]  __kasan_kmalloc+0xd4/0xd8
[   36.305179]  __kmalloc_cache_noprof+0x144/0x328
[   36.305691]  kasan_atomics+0xb8/0x2e8
[   36.306237]  kunit_try_run_case+0x14c/0x3d0
[   36.306917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.307706]  kthread+0x24c/0x2d0
[   36.308303]  ret_from_fork+0x10/0x20
[   36.308892] 
[   36.309276] The buggy address belongs to the object at fff00000c5809b80
[   36.309276]  which belongs to the cache kmalloc-64 of size 64
[   36.311912] The buggy address is located 0 bytes to the right of
[   36.311912]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.313342] 
[   36.313589] The buggy address belongs to the physical page:
[   36.314232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.315304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.316161] page_type: f5(slab)
[   36.316799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.317620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.318556] page dumped because: kasan: bad access detected
[   36.319242] 
[   36.319643] Memory state around the buggy address:
[   36.320357]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.321171]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.322106] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.322928]                                      ^
[   36.323574]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.324465]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.325304] ==================================================================
---
[   36.686048] ==================================================================
[   36.686853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   36.687827] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.689153] 
[   36.689598] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.690725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.691367] Hardware name: linux,dummy-virt (DT)
[   36.692406] Call trace:
[   36.693283]  dump_backtrace+0x9c/0x128
[   36.694431]  show_stack+0x20/0x38
[   36.695103]  dump_stack_lvl+0x8c/0xd0
[   36.695682]  print_report+0x118/0x5e0
[   36.696215]  kasan_report+0xc8/0x118
[   36.696816]  kasan_check_range+0x100/0x1a8
[   36.697366]  __kasan_check_write+0x20/0x30
[   36.698045]  kasan_atomics_helper+0x1000/0x49c8
[   36.698615]  kasan_atomics+0x1a0/0x2e8
[   36.699273]  kunit_try_run_case+0x14c/0x3d0
[   36.699864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.700724]  kthread+0x24c/0x2d0
[   36.701329]  ret_from_fork+0x10/0x20
[   36.701865] 
[   36.702245] Allocated by task 251:
[   36.702793]  kasan_save_stack+0x3c/0x68
[   36.703336]  kasan_save_track+0x20/0x40
[   36.703955]  kasan_save_alloc_info+0x40/0x58
[   36.704587]  __kasan_kmalloc+0xd4/0xd8
[   36.705225]  __kmalloc_cache_noprof+0x144/0x328
[   36.705803]  kasan_atomics+0xb8/0x2e8
[   36.706433]  kunit_try_run_case+0x14c/0x3d0
[   36.707055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.707627]  kthread+0x24c/0x2d0
[   36.708208]  ret_from_fork+0x10/0x20
[   36.708801] 
[   36.709134] The buggy address belongs to the object at fff00000c5809b80
[   36.709134]  which belongs to the cache kmalloc-64 of size 64
[   36.710442] The buggy address is located 0 bytes to the right of
[   36.710442]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.711798] 
[   36.712194] The buggy address belongs to the physical page:
[   36.712884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.713905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.714552] page_type: f5(slab)
[   36.715141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.716039] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.716903] page dumped because: kasan: bad access detected
[   36.717620] 
[   36.718007] Memory state around the buggy address:
[   36.718681]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.719465]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.720352] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.721186]                                      ^
[   36.721820]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.722617]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.723428] ==================================================================
---
[   35.511886] ==================================================================
[   35.512758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   35.514193] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.515573] 
[   35.515962] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.517117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.518197] Hardware name: linux,dummy-virt (DT)
[   35.518899] Call trace:
[   35.519456]  dump_backtrace+0x9c/0x128
[   35.520033]  show_stack+0x20/0x38
[   35.520698]  dump_stack_lvl+0x8c/0xd0
[   35.521544]  print_report+0x118/0x5e0
[   35.522148]  kasan_report+0xc8/0x118
[   35.522683]  kasan_check_range+0x100/0x1a8
[   35.523400]  __kasan_check_write+0x20/0x30
[   35.523972]  kasan_atomics_helper+0x50c/0x49c8
[   35.524944]  kasan_atomics+0x1a0/0x2e8
[   35.525631]  kunit_try_run_case+0x14c/0x3d0
[   35.526303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.527058]  kthread+0x24c/0x2d0
[   35.527622]  ret_from_fork+0x10/0x20
[   35.528158] 
[   35.528568] Allocated by task 251:
[   35.529496]  kasan_save_stack+0x3c/0x68
[   35.530273]  kasan_save_track+0x20/0x40
[   35.530915]  kasan_save_alloc_info+0x40/0x58
[   35.531594]  __kasan_kmalloc+0xd4/0xd8
[   35.532240]  __kmalloc_cache_noprof+0x144/0x328
[   35.533326]  kasan_atomics+0xb8/0x2e8
[   35.534355]  kunit_try_run_case+0x14c/0x3d0
[   35.535333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.535660]  kthread+0x24c/0x2d0
[   35.535887]  ret_from_fork+0x10/0x20
[   35.536418] 
[   35.536873] The buggy address belongs to the object at fff00000c5809b80
[   35.536873]  which belongs to the cache kmalloc-64 of size 64
[   35.538833] The buggy address is located 0 bytes to the right of
[   35.538833]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.540344] 
[   35.541183] The buggy address belongs to the physical page:
[   35.541867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.542919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.543754] page_type: f5(slab)
[   35.544420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.545661] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.546882] page dumped because: kasan: bad access detected
[   35.547716] 
[   35.548068] Memory state around the buggy address:
[   35.548653]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.550033]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.551098] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.552116]                                      ^
[   35.553137]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.553750]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.554512] ==================================================================
---
[   35.424902] ==================================================================
[   35.426568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   35.427303] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.428230] 
[   35.428671] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.430095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.431185] Hardware name: linux,dummy-virt (DT)
[   35.431776] Call trace:
[   35.432190]  dump_backtrace+0x9c/0x128
[   35.433316]  show_stack+0x20/0x38
[   35.433760]  dump_stack_lvl+0x8c/0xd0
[   35.434580]  print_report+0x118/0x5e0
[   35.435236]  kasan_report+0xc8/0x118
[   35.435961]  kasan_check_range+0x100/0x1a8
[   35.436609]  __kasan_check_write+0x20/0x30
[   35.437647]  kasan_atomics_helper+0x434/0x49c8
[   35.438472]  kasan_atomics+0x1a0/0x2e8
[   35.439021]  kunit_try_run_case+0x14c/0x3d0
[   35.439579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.440322]  kthread+0x24c/0x2d0
[   35.441177]  ret_from_fork+0x10/0x20
[   35.441858] 
[   35.442200] Allocated by task 251:
[   35.442753]  kasan_save_stack+0x3c/0x68
[   35.443530]  kasan_save_track+0x20/0x40
[   35.444260]  kasan_save_alloc_info+0x40/0x58
[   35.445283]  __kasan_kmalloc+0xd4/0xd8
[   35.446422]  __kmalloc_cache_noprof+0x144/0x328
[   35.447056]  kasan_atomics+0xb8/0x2e8
[   35.447744]  kunit_try_run_case+0x14c/0x3d0
[   35.448578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.449683]  kthread+0x24c/0x2d0
[   35.450202]  ret_from_fork+0x10/0x20
[   35.451042] 
[   35.451600] The buggy address belongs to the object at fff00000c5809b80
[   35.451600]  which belongs to the cache kmalloc-64 of size 64
[   35.453324] The buggy address is located 0 bytes to the right of
[   35.453324]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.454901] 
[   35.455286] The buggy address belongs to the physical page:
[   35.456227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.457193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.458397] page_type: f5(slab)
[   35.459085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.460120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.461355] page dumped because: kasan: bad access detected
[   35.462047] 
[   35.462454] Memory state around the buggy address:
[   35.463084]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.463891]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.464835] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.465655]                                      ^
[   35.466242]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.468021]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.468957] ==================================================================
---
[   36.762632] ==================================================================
[   36.763994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   36.764867] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.765726] 
[   36.766141] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.767134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.767740] Hardware name: linux,dummy-virt (DT)
[   36.768351] Call trace:
[   36.768804]  dump_backtrace+0x9c/0x128
[   36.769442]  show_stack+0x20/0x38
[   36.770440]  dump_stack_lvl+0x8c/0xd0
[   36.771147]  print_report+0x118/0x5e0
[   36.771681]  kasan_report+0xc8/0x118
[   36.772265]  kasan_check_range+0x100/0x1a8
[   36.772906]  __kasan_check_write+0x20/0x30
[   36.773583]  kasan_atomics_helper+0x10d8/0x49c8
[   36.774317]  kasan_atomics+0x1a0/0x2e8
[   36.774866]  kunit_try_run_case+0x14c/0x3d0
[   36.775558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.776312]  kthread+0x24c/0x2d0
[   36.776896]  ret_from_fork+0x10/0x20
[   36.777540] 
[   36.777886] Allocated by task 251:
[   36.778331]  kasan_save_stack+0x3c/0x68
[   36.778960]  kasan_save_track+0x20/0x40
[   36.779617]  kasan_save_alloc_info+0x40/0x58
[   36.780261]  __kasan_kmalloc+0xd4/0xd8
[   36.780934]  __kmalloc_cache_noprof+0x144/0x328
[   36.781544]  kasan_atomics+0xb8/0x2e8
[   36.782174]  kunit_try_run_case+0x14c/0x3d0
[   36.782763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.783378]  kthread+0x24c/0x2d0
[   36.783943]  ret_from_fork+0x10/0x20
[   36.784455] 
[   36.784818] The buggy address belongs to the object at fff00000c5809b80
[   36.784818]  which belongs to the cache kmalloc-64 of size 64
[   36.786072] The buggy address is located 0 bytes to the right of
[   36.786072]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.787311] 
[   36.787679] The buggy address belongs to the physical page:
[   36.788305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.789296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.790078] page_type: f5(slab)
[   36.790713] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.791598] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.792402] page dumped because: kasan: bad access detected
[   36.793090] 
[   36.793459] Memory state around the buggy address:
[   36.794167]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.794898]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.795718] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.796533]                                      ^
[   36.797119]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.797879]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.798773] ==================================================================
---
[   35.173160] ==================================================================
[   35.175065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   35.175699] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.176872] 
[   35.177563] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.179658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.180406] Hardware name: linux,dummy-virt (DT)
[   35.181305] Call trace:
[   35.181732]  dump_backtrace+0x9c/0x128
[   35.182465]  show_stack+0x20/0x38
[   35.183145]  dump_stack_lvl+0x8c/0xd0
[   35.183745]  print_report+0x118/0x5e0
[   35.184290]  kasan_report+0xc8/0x118
[   35.185033]  kasan_check_range+0x100/0x1a8
[   35.185649]  __kasan_check_write+0x20/0x30
[   35.186310]  kasan_atomics_helper+0x25c/0x49c8
[   35.187027]  kasan_atomics+0x1a0/0x2e8
[   35.187593]  kunit_try_run_case+0x14c/0x3d0
[   35.188313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.189103]  kthread+0x24c/0x2d0
[   35.189755]  ret_from_fork+0x10/0x20
[   35.190389] 
[   35.190802] Allocated by task 251:
[   35.191409]  kasan_save_stack+0x3c/0x68
[   35.192101]  kasan_save_track+0x20/0x40
[   35.192675]  kasan_save_alloc_info+0x40/0x58
[   35.193442]  __kasan_kmalloc+0xd4/0xd8
[   35.194115]  __kmalloc_cache_noprof+0x144/0x328
[   35.194800]  kasan_atomics+0xb8/0x2e8
[   35.195431]  kunit_try_run_case+0x14c/0x3d0
[   35.195904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.196728]  kthread+0x24c/0x2d0
[   35.197316]  ret_from_fork+0x10/0x20
[   35.197917] 
[   35.198316] The buggy address belongs to the object at fff00000c5809b80
[   35.198316]  which belongs to the cache kmalloc-64 of size 64
[   35.199447] The buggy address is located 0 bytes to the right of
[   35.199447]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.200961] 
[   35.201399] The buggy address belongs to the physical page:
[   35.202065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.203406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.204608] page_type: f5(slab)
[   35.205094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.205923] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.207019] page dumped because: kasan: bad access detected
[   35.208014] 
[   35.208377] Memory state around the buggy address:
[   35.208938]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.210074]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.211082] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.211831]                                      ^
[   35.212385]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.213312]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.214202] ==================================================================
---
[   35.831312] ==================================================================
[   35.832110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   35.832960] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.833785] 
[   35.834344] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.835406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.835884] Hardware name: linux,dummy-virt (DT)
[   35.836562] Call trace:
[   35.837103]  dump_backtrace+0x9c/0x128
[   35.837770]  show_stack+0x20/0x38
[   35.838279]  dump_stack_lvl+0x8c/0xd0
[   35.838787]  print_report+0x118/0x5e0
[   35.839410]  kasan_report+0xc8/0x118
[   35.840053]  kasan_check_range+0x100/0x1a8
[   35.840721]  __kasan_check_write+0x20/0x30
[   35.841064]  kasan_atomics_helper+0x8d8/0x49c8
[   35.841761]  kasan_atomics+0x1a0/0x2e8
[   35.842578]  kunit_try_run_case+0x14c/0x3d0
[   35.843364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.844272]  kthread+0x24c/0x2d0
[   35.844757]  ret_from_fork+0x10/0x20
[   35.845280] 
[   35.845710] Allocated by task 251:
[   35.846386]  kasan_save_stack+0x3c/0x68
[   35.847033]  kasan_save_track+0x20/0x40
[   35.847322]  kasan_save_alloc_info+0x40/0x58
[   35.847587]  __kasan_kmalloc+0xd4/0xd8
[   35.847831]  __kmalloc_cache_noprof+0x144/0x328
[   35.848406]  kasan_atomics+0xb8/0x2e8
[   35.849224]  kunit_try_run_case+0x14c/0x3d0
[   35.850040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.850699]  kthread+0x24c/0x2d0
[   35.851285]  ret_from_fork+0x10/0x20
[   35.851819] 
[   35.852219] The buggy address belongs to the object at fff00000c5809b80
[   35.852219]  which belongs to the cache kmalloc-64 of size 64
[   35.853697] The buggy address is located 0 bytes to the right of
[   35.853697]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.854780] 
[   35.854953] The buggy address belongs to the physical page:
[   35.855452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.856343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.857218] page_type: f5(slab)
[   35.857752] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.858622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.859440] page dumped because: kasan: bad access detected
[   35.860192] 
[   35.860587] Memory state around the buggy address:
[   35.861181]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.862039]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.862865] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.863548]                                      ^
[   35.864247]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.865027]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.865874] ==================================================================
---
[   36.214101] ==================================================================
[   36.214916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   36.215769] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.216755] 
[   36.217395] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.218368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.218967] Hardware name: linux,dummy-virt (DT)
[   36.219648] Call trace:
[   36.220122]  dump_backtrace+0x9c/0x128
[   36.220718]  show_stack+0x20/0x38
[   36.221321]  dump_stack_lvl+0x8c/0xd0
[   36.221831]  print_report+0x118/0x5e0
[   36.222450]  kasan_report+0xc8/0x118
[   36.223086]  kasan_check_range+0x100/0x1a8
[   36.223735]  __kasan_check_write+0x20/0x30
[   36.224253]  kasan_atomics_helper+0xc64/0x49c8
[   36.224939]  kasan_atomics+0x1a0/0x2e8
[   36.225533]  kunit_try_run_case+0x14c/0x3d0
[   36.226212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.226885]  kthread+0x24c/0x2d0
[   36.227431]  ret_from_fork+0x10/0x20
[   36.228027] 
[   36.228390] Allocated by task 251:
[   36.228914]  kasan_save_stack+0x3c/0x68
[   36.229587]  kasan_save_track+0x20/0x40
[   36.230173]  kasan_save_alloc_info+0x40/0x58
[   36.230749]  __kasan_kmalloc+0xd4/0xd8
[   36.231370]  __kmalloc_cache_noprof+0x144/0x328
[   36.232007]  kasan_atomics+0xb8/0x2e8
[   36.232483]  kunit_try_run_case+0x14c/0x3d0
[   36.233159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.233891]  kthread+0x24c/0x2d0
[   36.234437]  ret_from_fork+0x10/0x20
[   36.235042] 
[   36.235414] The buggy address belongs to the object at fff00000c5809b80
[   36.235414]  which belongs to the cache kmalloc-64 of size 64
[   36.236603] The buggy address is located 0 bytes to the right of
[   36.236603]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.237842] 
[   36.238234] The buggy address belongs to the physical page:
[   36.238867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.239698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.240597] page_type: f5(slab)
[   36.241146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.242090] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.243035] page dumped because: kasan: bad access detected
[   36.243752] 
[   36.244146] Memory state around the buggy address:
[   36.244790]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.245899]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.246644] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.247507]                                      ^
[   36.248136]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.249020]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.249886] ==================================================================
---
[   35.634762] ==================================================================
[   35.635511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   35.636397] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.637404] 
[   35.637795] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.638927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.639481] Hardware name: linux,dummy-virt (DT)
[   35.640203] Call trace:
[   35.640650]  dump_backtrace+0x9c/0x128
[   35.641302]  show_stack+0x20/0x38
[   35.641943]  dump_stack_lvl+0x8c/0xd0
[   35.642501]  print_report+0x118/0x5e0
[   35.643173]  kasan_report+0xc8/0x118
[   35.643733]  kasan_check_range+0x100/0x1a8
[   35.644428]  __kasan_check_write+0x20/0x30
[   35.645022]  kasan_atomics_helper+0x650/0x49c8
[   35.645762]  kasan_atomics+0x1a0/0x2e8
[   35.646374]  kunit_try_run_case+0x14c/0x3d0
[   35.647122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.647884]  kthread+0x24c/0x2d0
[   35.648580]  ret_from_fork+0x10/0x20
[   35.649277] 
[   35.649729] Allocated by task 251:
[   35.650292]  kasan_save_stack+0x3c/0x68
[   35.650931]  kasan_save_track+0x20/0x40
[   35.651544]  kasan_save_alloc_info+0x40/0x58
[   35.652189]  __kasan_kmalloc+0xd4/0xd8
[   35.652877]  __kmalloc_cache_noprof+0x144/0x328
[   35.653609]  kasan_atomics+0xb8/0x2e8
[   35.654164]  kunit_try_run_case+0x14c/0x3d0
[   35.654898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.655589]  kthread+0x24c/0x2d0
[   35.656208]  ret_from_fork+0x10/0x20
[   35.656739] 
[   35.657174] The buggy address belongs to the object at fff00000c5809b80
[   35.657174]  which belongs to the cache kmalloc-64 of size 64
[   35.658412] The buggy address is located 0 bytes to the right of
[   35.658412]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.659748] 
[   35.660192] The buggy address belongs to the physical page:
[   35.660835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.661697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.662615] page_type: f5(slab)
[   35.663248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.664084] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.665001] page dumped because: kasan: bad access detected
[   35.665663] 
[   35.666089] Memory state around the buggy address:
[   35.666664]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.667596]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.668444] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.669312]                                      ^
[   35.669927]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670794]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.671630] ==================================================================
---
[   36.530632] ==================================================================
[   36.531423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   36.532236] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.533316] 
[   36.533691] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.534765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.535409] Hardware name: linux,dummy-virt (DT)
[   36.536113] Call trace:
[   36.536623]  dump_backtrace+0x9c/0x128
[   36.537208]  show_stack+0x20/0x38
[   36.537831]  dump_stack_lvl+0x8c/0xd0
[   36.538505]  print_report+0x118/0x5e0
[   36.539177]  kasan_report+0xc8/0x118
[   36.539732]  kasan_check_range+0x100/0x1a8
[   36.540437]  __kasan_check_write+0x20/0x30
[   36.541211]  kasan_atomics_helper+0xeb0/0x49c8
[   36.541825]  kasan_atomics+0x1a0/0x2e8
[   36.542482]  kunit_try_run_case+0x14c/0x3d0
[   36.543227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.544004]  kthread+0x24c/0x2d0
[   36.544624]  ret_from_fork+0x10/0x20
[   36.545210] 
[   36.545622] Allocated by task 251:
[   36.546184]  kasan_save_stack+0x3c/0x68
[   36.546858]  kasan_save_track+0x20/0x40
[   36.547395]  kasan_save_alloc_info+0x40/0x58
[   36.548132]  __kasan_kmalloc+0xd4/0xd8
[   36.548742]  __kmalloc_cache_noprof+0x144/0x328
[   36.549424]  kasan_atomics+0xb8/0x2e8
[   36.550110]  kunit_try_run_case+0x14c/0x3d0
[   36.550764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.551527]  kthread+0x24c/0x2d0
[   36.552151]  ret_from_fork+0x10/0x20
[   36.552681] 
[   36.553104] The buggy address belongs to the object at fff00000c5809b80
[   36.553104]  which belongs to the cache kmalloc-64 of size 64
[   36.554356] The buggy address is located 0 bytes to the right of
[   36.554356]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.555752] 
[   36.556188] The buggy address belongs to the physical page:
[   36.556780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.557853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.558701] page_type: f5(slab)
[   36.559250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.560212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.561194] page dumped because: kasan: bad access detected
[   36.561846] 
[   36.562269] Memory state around the buggy address:
[   36.562898]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.563706]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.564646] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.565460]                                      ^
[   36.566118]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.566964]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.567780] ==================================================================
---
[   37.245152] ==================================================================
[   37.245926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   37.246860] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.247614] 
[   37.248019] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.249134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.249748] Hardware name: linux,dummy-virt (DT)
[   37.250325] Call trace:
[   37.250839]  dump_backtrace+0x9c/0x128
[   37.251493]  show_stack+0x20/0x38
[   37.252099]  dump_stack_lvl+0x8c/0xd0
[   37.252630]  print_report+0x118/0x5e0
[   37.253213]  kasan_report+0xc8/0x118
[   37.253798]  kasan_check_range+0x100/0x1a8
[   37.254433]  __kasan_check_write+0x20/0x30
[   37.254929]  kasan_atomics_helper+0x15f0/0x49c8
[   37.255659]  kasan_atomics+0x1a0/0x2e8
[   37.256247]  kunit_try_run_case+0x14c/0x3d0
[   37.256788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.257608]  kthread+0x24c/0x2d0
[   37.258209]  ret_from_fork+0x10/0x20
[   37.258820] 
[   37.259191] Allocated by task 251:
[   37.259765]  kasan_save_stack+0x3c/0x68
[   37.260294]  kasan_save_track+0x20/0x40
[   37.260890]  kasan_save_alloc_info+0x40/0x58
[   37.261593]  __kasan_kmalloc+0xd4/0xd8
[   37.262092]  __kmalloc_cache_noprof+0x144/0x328
[   37.262725]  kasan_atomics+0xb8/0x2e8
[   37.263217]  kunit_try_run_case+0x14c/0x3d0
[   37.263719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.264500]  kthread+0x24c/0x2d0
[   37.265076]  ret_from_fork+0x10/0x20
[   37.265695] 
[   37.266083] The buggy address belongs to the object at fff00000c5809b80
[   37.266083]  which belongs to the cache kmalloc-64 of size 64
[   37.267378] The buggy address is located 0 bytes to the right of
[   37.267378]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.268707] 
[   37.269070] The buggy address belongs to the physical page:
[   37.269797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.270826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.271529] page_type: f5(slab)
[   37.272119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.273004] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.273828] page dumped because: kasan: bad access detected
[   37.274583] 
[   37.274948] Memory state around the buggy address:
[   37.275498]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.276397]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.277283] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.278182]                                      ^
[   37.278785]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.279560]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.280380] ==================================================================
---
[   36.647673] ==================================================================
[   36.649020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   36.650014] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.650854] 
[   36.651256] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.652323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.652906] Hardware name: linux,dummy-virt (DT)
[   36.654073] Call trace:
[   36.654528]  dump_backtrace+0x9c/0x128
[   36.655137]  show_stack+0x20/0x38
[   36.655716]  dump_stack_lvl+0x8c/0xd0
[   36.656238]  print_report+0x118/0x5e0
[   36.656797]  kasan_report+0xc8/0x118
[   36.657414]  kasan_check_range+0x100/0x1a8
[   36.658057]  __kasan_check_write+0x20/0x30
[   36.658707]  kasan_atomics_helper+0xf94/0x49c8
[   36.659363]  kasan_atomics+0x1a0/0x2e8
[   36.660012]  kunit_try_run_case+0x14c/0x3d0
[   36.660603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.661423]  kthread+0x24c/0x2d0
[   36.662082]  ret_from_fork+0x10/0x20
[   36.662711] 
[   36.663098] Allocated by task 251:
[   36.663576]  kasan_save_stack+0x3c/0x68
[   36.664234]  kasan_save_track+0x20/0x40
[   36.664786]  kasan_save_alloc_info+0x40/0x58
[   36.665299]  __kasan_kmalloc+0xd4/0xd8
[   36.665927]  __kmalloc_cache_noprof+0x144/0x328
[   36.666642]  kasan_atomics+0xb8/0x2e8
[   36.667255]  kunit_try_run_case+0x14c/0x3d0
[   36.667761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.668551]  kthread+0x24c/0x2d0
[   36.669094]  ret_from_fork+0x10/0x20
[   36.669573] 
[   36.669943] The buggy address belongs to the object at fff00000c5809b80
[   36.669943]  which belongs to the cache kmalloc-64 of size 64
[   36.671201] The buggy address is located 0 bytes to the right of
[   36.671201]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.672409] 
[   36.672786] The buggy address belongs to the physical page:
[   36.673537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.674427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.675272] page_type: f5(slab)
[   36.675847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.676824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.677537] page dumped because: kasan: bad access detected
[   36.678302] 
[   36.678666] Memory state around the buggy address:
[   36.679352]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.680169]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.681037] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.681837]                                      ^
[   36.682548]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.683274]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.684163] ==================================================================
---
[   35.383788] ==================================================================
[   35.384612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   35.386816] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.388214] 
[   35.388856] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.389913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.390427] Hardware name: linux,dummy-virt (DT)
[   35.390959] Call trace:
[   35.391438]  dump_backtrace+0x9c/0x128
[   35.392080]  show_stack+0x20/0x38
[   35.392592]  dump_stack_lvl+0x8c/0xd0
[   35.393511]  print_report+0x118/0x5e0
[   35.394271]  kasan_report+0xc8/0x118
[   35.394996]  kasan_check_range+0x100/0x1a8
[   35.395538]  __kasan_check_write+0x20/0x30
[   35.396092]  kasan_atomics_helper+0x3c8/0x49c8
[   35.397011]  kasan_atomics+0x1a0/0x2e8
[   35.397645]  kunit_try_run_case+0x14c/0x3d0
[   35.398236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.399067]  kthread+0x24c/0x2d0
[   35.399704]  ret_from_fork+0x10/0x20
[   35.400314] 
[   35.401051] Allocated by task 251:
[   35.401622]  kasan_save_stack+0x3c/0x68
[   35.402240]  kasan_save_track+0x20/0x40
[   35.402869]  kasan_save_alloc_info+0x40/0x58
[   35.403485]  __kasan_kmalloc+0xd4/0xd8
[   35.404141]  __kmalloc_cache_noprof+0x144/0x328
[   35.405114]  kasan_atomics+0xb8/0x2e8
[   35.405571]  kunit_try_run_case+0x14c/0x3d0
[   35.406197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.407271]  kthread+0x24c/0x2d0
[   35.407799]  ret_from_fork+0x10/0x20
[   35.408434] 
[   35.408798] The buggy address belongs to the object at fff00000c5809b80
[   35.408798]  which belongs to the cache kmalloc-64 of size 64
[   35.410504] The buggy address is located 0 bytes to the right of
[   35.410504]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.411148] 
[   35.411348] The buggy address belongs to the physical page:
[   35.411634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.412039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.412381] page_type: f5(slab)
[   35.412613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.414158] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.415235] page dumped because: kasan: bad access detected
[   35.416093] 
[   35.416552] Memory state around the buggy address:
[   35.417664]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.418729]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.419768] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.420684]                                      ^
[   35.421604]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.422405]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.423229] ==================================================================
---
[   35.978718] ==================================================================
[   35.979527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   35.980276] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.981205] 
[   35.981710] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.983654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.984732] Hardware name: linux,dummy-virt (DT)
[   35.985486] Call trace:
[   35.985944]  dump_backtrace+0x9c/0x128
[   35.986628]  show_stack+0x20/0x38
[   35.987217]  dump_stack_lvl+0x8c/0xd0
[   35.987785]  print_report+0x118/0x5e0
[   35.988352]  kasan_report+0xc8/0x118
[   35.988885]  kasan_check_range+0x100/0x1a8
[   35.989578]  __kasan_check_write+0x20/0x30
[   35.990234]  kasan_atomics_helper+0xa50/0x49c8
[   35.990926]  kasan_atomics+0x1a0/0x2e8
[   35.991575]  kunit_try_run_case+0x14c/0x3d0
[   35.992178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.992966]  kthread+0x24c/0x2d0
[   35.993558]  ret_from_fork+0x10/0x20
[   35.994115] 
[   35.994480] Allocated by task 251:
[   35.994999]  kasan_save_stack+0x3c/0x68
[   35.995610]  kasan_save_track+0x20/0x40
[   35.996247]  kasan_save_alloc_info+0x40/0x58
[   35.996821]  __kasan_kmalloc+0xd4/0xd8
[   35.997369]  __kmalloc_cache_noprof+0x144/0x328
[   35.998017]  kasan_atomics+0xb8/0x2e8
[   35.998557]  kunit_try_run_case+0x14c/0x3d0
[   35.999181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.999942]  kthread+0x24c/0x2d0
[   36.000521]  ret_from_fork+0x10/0x20
[   36.001041] 
[   36.001413] The buggy address belongs to the object at fff00000c5809b80
[   36.001413]  which belongs to the cache kmalloc-64 of size 64
[   36.002637] The buggy address is located 0 bytes to the right of
[   36.002637]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.003868] 
[   36.004256] The buggy address belongs to the physical page:
[   36.004870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.005793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.006576] page_type: f5(slab)
[   36.007091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.007883] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.008837] page dumped because: kasan: bad access detected
[   36.009407] 
[   36.009780] Memory state around the buggy address:
[   36.010463]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.011243]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.012011] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.012875]                                      ^
[   36.013447]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.014266]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.015032] ==================================================================
---
[   37.002807] ==================================================================
[   37.003574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   37.004592] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.006139] 
[   37.006677] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.007714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.008559] Hardware name: linux,dummy-virt (DT)
[   37.009397] Call trace:
[   37.010041]  dump_backtrace+0x9c/0x128
[   37.010776]  show_stack+0x20/0x38
[   37.011543]  dump_stack_lvl+0x8c/0xd0
[   37.012380]  print_report+0x118/0x5e0
[   37.013145]  kasan_report+0xc8/0x118
[   37.013670]  kasan_check_range+0x100/0x1a8
[   37.014247]  __kasan_check_write+0x20/0x30
[   37.014802]  kasan_atomics_helper+0x1370/0x49c8
[   37.015882]  kasan_atomics+0x1a0/0x2e8
[   37.016675]  kunit_try_run_case+0x14c/0x3d0
[   37.017509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.018458]  kthread+0x24c/0x2d0
[   37.019210]  ret_from_fork+0x10/0x20
[   37.020020] 
[   37.020556] Allocated by task 251:
[   37.021037]  kasan_save_stack+0x3c/0x68
[   37.021684]  kasan_save_track+0x20/0x40
[   37.022299]  kasan_save_alloc_info+0x40/0x58
[   37.022827]  __kasan_kmalloc+0xd4/0xd8
[   37.023506]  __kmalloc_cache_noprof+0x144/0x328
[   37.024184]  kasan_atomics+0xb8/0x2e8
[   37.024776]  kunit_try_run_case+0x14c/0x3d0
[   37.025505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.026331]  kthread+0x24c/0x2d0
[   37.026866]  ret_from_fork+0x10/0x20
[   37.027464] 
[   37.027839] The buggy address belongs to the object at fff00000c5809b80
[   37.027839]  which belongs to the cache kmalloc-64 of size 64
[   37.029102] The buggy address is located 0 bytes to the right of
[   37.029102]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.030397] 
[   37.030806] The buggy address belongs to the physical page:
[   37.031423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.032465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.033320] page_type: f5(slab)
[   37.033922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.034708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.035625] page dumped because: kasan: bad access detected
[   37.036303] 
[   37.036669] Memory state around the buggy address:
[   37.037372]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.038378]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.039260] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.040027]                                      ^
[   37.040677]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.041542]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.042435] ==================================================================
---
[   37.587017] ==================================================================
[   37.587743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   37.588540] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.589366] 
[   37.589774] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.590860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.591433] Hardware name: linux,dummy-virt (DT)
[   37.592110] Call trace:
[   37.592568]  dump_backtrace+0x9c/0x128
[   37.593188]  show_stack+0x20/0x38
[   37.593658]  dump_stack_lvl+0x8c/0xd0
[   37.594307]  print_report+0x118/0x5e0
[   37.594852]  kasan_report+0xc8/0x118
[   37.595443]  kasan_check_range+0x100/0x1a8
[   37.596119]  __kasan_check_write+0x20/0x30
[   37.596744]  kasan_atomics_helper+0x18a4/0x49c8
[   37.597465]  kasan_atomics+0x1a0/0x2e8
[   37.598121]  kunit_try_run_case+0x14c/0x3d0
[   37.598763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.599558]  kthread+0x24c/0x2d0
[   37.600057]  ret_from_fork+0x10/0x20
[   37.600725] 
[   37.601086] Allocated by task 251:
[   37.601635]  kasan_save_stack+0x3c/0x68
[   37.602175]  kasan_save_track+0x20/0x40
[   37.602801]  kasan_save_alloc_info+0x40/0x58
[   37.603396]  __kasan_kmalloc+0xd4/0xd8
[   37.604017]  __kmalloc_cache_noprof+0x144/0x328
[   37.604713]  kasan_atomics+0xb8/0x2e8
[   37.605277]  kunit_try_run_case+0x14c/0x3d0
[   37.605935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.606525]  kthread+0x24c/0x2d0
[   37.607125]  ret_from_fork+0x10/0x20
[   37.607681] 
[   37.608070] The buggy address belongs to the object at fff00000c5809b80
[   37.608070]  which belongs to the cache kmalloc-64 of size 64
[   37.609230] The buggy address is located 0 bytes to the right of
[   37.609230]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.610455] 
[   37.610864] The buggy address belongs to the physical page:
[   37.611548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.612357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.613224] page_type: f5(slab)
[   37.613817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.614744] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.615390] page dumped because: kasan: bad access detected
[   37.615899] 
[   37.616283] Memory state around the buggy address:
[   37.616899]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.617721]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.618433] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.619338]                                      ^
[   37.620010]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.620959]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.621626] ==================================================================
---
[   37.207581] ==================================================================
[   37.208327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   37.209262] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.210087] 
[   37.210450] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.211678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.212187] Hardware name: linux,dummy-virt (DT)
[   37.212847] Call trace:
[   37.213323]  dump_backtrace+0x9c/0x128
[   37.213953]  show_stack+0x20/0x38
[   37.214523]  dump_stack_lvl+0x8c/0xd0
[   37.215166]  print_report+0x118/0x5e0
[   37.215683]  kasan_report+0xc8/0x118
[   37.216305]  kasan_check_range+0x100/0x1a8
[   37.216959]  __kasan_check_write+0x20/0x30
[   37.217524]  kasan_atomics_helper+0x1584/0x49c8
[   37.218257]  kasan_atomics+0x1a0/0x2e8
[   37.218730]  kunit_try_run_case+0x14c/0x3d0
[   37.219424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.220120]  kthread+0x24c/0x2d0
[   37.220764]  ret_from_fork+0x10/0x20
[   37.221395] 
[   37.221765] Allocated by task 251:
[   37.222334]  kasan_save_stack+0x3c/0x68
[   37.222882]  kasan_save_track+0x20/0x40
[   37.223536]  kasan_save_alloc_info+0x40/0x58
[   37.224121]  __kasan_kmalloc+0xd4/0xd8
[   37.224728]  __kmalloc_cache_noprof+0x144/0x328
[   37.225443]  kasan_atomics+0xb8/0x2e8
[   37.226072]  kunit_try_run_case+0x14c/0x3d0
[   37.226577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.227352]  kthread+0x24c/0x2d0
[   37.227880]  ret_from_fork+0x10/0x20
[   37.228429] 
[   37.228797] The buggy address belongs to the object at fff00000c5809b80
[   37.228797]  which belongs to the cache kmalloc-64 of size 64
[   37.230063] The buggy address is located 0 bytes to the right of
[   37.230063]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.231281] 
[   37.231648] The buggy address belongs to the physical page:
[   37.232269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.233173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.234065] page_type: f5(slab)
[   37.234620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.235592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.236430] page dumped because: kasan: bad access detected
[   37.237112] 
[   37.237493] Memory state around the buggy address:
[   37.238148]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.238960]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.239721] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.240599]                                      ^
[   37.241224]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.242062]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.242843] ==================================================================
---
[   35.556102] ==================================================================
[   35.556920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   35.557772] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.558773] 
[   35.559237] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.560285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.561009] Hardware name: linux,dummy-virt (DT)
[   35.561784] Call trace:
[   35.562247]  dump_backtrace+0x9c/0x128
[   35.562925]  show_stack+0x20/0x38
[   35.563490]  dump_stack_lvl+0x8c/0xd0
[   35.564060]  print_report+0x118/0x5e0
[   35.564777]  kasan_report+0xc8/0x118
[   35.565410]  kasan_check_range+0x100/0x1a8
[   35.566173]  __kasan_check_write+0x20/0x30
[   35.566752]  kasan_atomics_helper+0x578/0x49c8
[   35.567486]  kasan_atomics+0x1a0/0x2e8
[   35.568075]  kunit_try_run_case+0x14c/0x3d0
[   35.568841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.569797]  kthread+0x24c/0x2d0
[   35.570399]  ret_from_fork+0x10/0x20
[   35.571000] 
[   35.571385] Allocated by task 251:
[   35.571997]  kasan_save_stack+0x3c/0x68
[   35.572569]  kasan_save_track+0x20/0x40
[   35.573195]  kasan_save_alloc_info+0x40/0x58
[   35.573742]  __kasan_kmalloc+0xd4/0xd8
[   35.574499]  __kmalloc_cache_noprof+0x144/0x328
[   35.575194]  kasan_atomics+0xb8/0x2e8
[   35.575697]  kunit_try_run_case+0x14c/0x3d0
[   35.576380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.577196]  kthread+0x24c/0x2d0
[   35.577864]  ret_from_fork+0x10/0x20
[   35.578515] 
[   35.578821] The buggy address belongs to the object at fff00000c5809b80
[   35.578821]  which belongs to the cache kmalloc-64 of size 64
[   35.580163] The buggy address is located 0 bytes to the right of
[   35.580163]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.581600] 
[   35.582040] The buggy address belongs to the physical page:
[   35.582823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.583766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.584522] page_type: f5(slab)
[   35.585282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.586119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.586927] page dumped because: kasan: bad access detected
[   35.587722] 
[   35.588140] Memory state around the buggy address:
[   35.588868]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.589851]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.590692] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.591556]                                      ^
[   35.592192]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.593217]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.594092] ==================================================================
---
[   35.711756] ==================================================================
[   35.712571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   35.713586] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.714330] 
[   35.714776] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.715955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.716624] Hardware name: linux,dummy-virt (DT)
[   35.717188] Call trace:
[   35.717659]  dump_backtrace+0x9c/0x128
[   35.718358]  show_stack+0x20/0x38
[   35.718994]  dump_stack_lvl+0x8c/0xd0
[   35.719603]  print_report+0x118/0x5e0
[   35.720272]  kasan_report+0xc8/0x118
[   35.720863]  kasan_check_range+0x100/0x1a8
[   35.721569]  __kasan_check_write+0x20/0x30
[   35.722318]  kasan_atomics_helper+0x728/0x49c8
[   35.722953]  kasan_atomics+0x1a0/0x2e8
[   35.723714]  kunit_try_run_case+0x14c/0x3d0
[   35.724336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.725246]  kthread+0x24c/0x2d0
[   35.725859]  ret_from_fork+0x10/0x20
[   35.726517] 
[   35.726966] Allocated by task 251:
[   35.727519]  kasan_save_stack+0x3c/0x68
[   35.728246]  kasan_save_track+0x20/0x40
[   35.728897]  kasan_save_alloc_info+0x40/0x58
[   35.729661]  __kasan_kmalloc+0xd4/0xd8
[   35.730315]  __kmalloc_cache_noprof+0x144/0x328
[   35.731095]  kasan_atomics+0xb8/0x2e8
[   35.731875]  kunit_try_run_case+0x14c/0x3d0
[   35.732635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.733407]  kthread+0x24c/0x2d0
[   35.733673]  ret_from_fork+0x10/0x20
[   35.733913] 
[   35.734166] The buggy address belongs to the object at fff00000c5809b80
[   35.734166]  which belongs to the cache kmalloc-64 of size 64
[   35.736034] The buggy address is located 0 bytes to the right of
[   35.736034]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.737551] 
[   35.738103] The buggy address belongs to the physical page:
[   35.738843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.739599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.739961] page_type: f5(slab)
[   35.740565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.741708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.742470] page dumped because: kasan: bad access detected
[   35.743203] 
[   35.743589] Memory state around the buggy address:
[   35.744232]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.745055]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.745863] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.746638]                                      ^
[   35.747384]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.748180]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.749133] ==================================================================
---
[   36.838824] ==================================================================
[   36.839761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   36.840407] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.841464] 
[   36.841912] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.843189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.843704] Hardware name: linux,dummy-virt (DT)
[   36.844433] Call trace:
[   36.844908]  dump_backtrace+0x9c/0x128
[   36.845621]  show_stack+0x20/0x38
[   36.846169]  dump_stack_lvl+0x8c/0xd0
[   36.846833]  print_report+0x118/0x5e0
[   36.847397]  kasan_report+0xc8/0x118
[   36.848061]  kasan_check_range+0x100/0x1a8
[   36.848725]  __kasan_check_write+0x20/0x30
[   36.849446]  kasan_atomics_helper+0x11b0/0x49c8
[   36.850109]  kasan_atomics+0x1a0/0x2e8
[   36.850713]  kunit_try_run_case+0x14c/0x3d0
[   36.851393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.852201]  kthread+0x24c/0x2d0
[   36.852829]  ret_from_fork+0x10/0x20
[   36.853407] 
[   36.853796] Allocated by task 251:
[   36.854374]  kasan_save_stack+0x3c/0x68
[   36.855075]  kasan_save_track+0x20/0x40
[   36.855582]  kasan_save_alloc_info+0x40/0x58
[   36.856303]  __kasan_kmalloc+0xd4/0xd8
[   36.856955]  __kmalloc_cache_noprof+0x144/0x328
[   36.857556]  kasan_atomics+0xb8/0x2e8
[   36.858199]  kunit_try_run_case+0x14c/0x3d0
[   36.858874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.859556]  kthread+0x24c/0x2d0
[   36.860168]  ret_from_fork+0x10/0x20
[   36.860729] 
[   36.861095] The buggy address belongs to the object at fff00000c5809b80
[   36.861095]  which belongs to the cache kmalloc-64 of size 64
[   36.862267] The buggy address is located 0 bytes to the right of
[   36.862267]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.863449] 
[   36.863760] The buggy address belongs to the physical page:
[   36.864540] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.865576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.866505] page_type: f5(slab)
[   36.867066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.868094] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.869027] page dumped because: kasan: bad access detected
[   36.869742] 
[   36.870125] Memory state around the buggy address:
[   36.870652]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.871658]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.872546] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.873425]                                      ^
[   36.874133]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.874884]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.875721] ==================================================================
---
[   37.282605] ==================================================================
[   37.283338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   37.284421] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.286040] 
[   37.286429] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.287226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.287828] Hardware name: linux,dummy-virt (DT)
[   37.288495] Call trace:
[   37.288953]  dump_backtrace+0x9c/0x128
[   37.289588]  show_stack+0x20/0x38
[   37.290201]  dump_stack_lvl+0x8c/0xd0
[   37.290862]  print_report+0x118/0x5e0
[   37.291430]  kasan_report+0xc8/0x118
[   37.291935]  kasan_check_range+0x100/0x1a8
[   37.292616]  __kasan_check_write+0x20/0x30
[   37.293280]  kasan_atomics_helper+0x165c/0x49c8
[   37.293873]  kasan_atomics+0x1a0/0x2e8
[   37.294528]  kunit_try_run_case+0x14c/0x3d0
[   37.295163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.295856]  kthread+0x24c/0x2d0
[   37.296455]  ret_from_fork+0x10/0x20
[   37.297100] 
[   37.297477] Allocated by task 251:
[   37.298046]  kasan_save_stack+0x3c/0x68
[   37.298623]  kasan_save_track+0x20/0x40
[   37.299187]  kasan_save_alloc_info+0x40/0x58
[   37.299812]  __kasan_kmalloc+0xd4/0xd8
[   37.300366]  __kmalloc_cache_noprof+0x144/0x328
[   37.301125]  kasan_atomics+0xb8/0x2e8
[   37.301735]  kunit_try_run_case+0x14c/0x3d0
[   37.302272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.303053]  kthread+0x24c/0x2d0
[   37.303570]  ret_from_fork+0x10/0x20
[   37.304200] 
[   37.304567] The buggy address belongs to the object at fff00000c5809b80
[   37.304567]  which belongs to the cache kmalloc-64 of size 64
[   37.305843] The buggy address is located 0 bytes to the right of
[   37.305843]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.307047] 
[   37.307426] The buggy address belongs to the physical page:
[   37.308169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.308963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.309831] page_type: f5(slab)
[   37.310361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.311397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.312118] page dumped because: kasan: bad access detected
[   37.312847] 
[   37.313231] Memory state around the buggy address:
[   37.313804]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.314629]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.315430] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.316282]                                      ^
[   37.316964]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.317770]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.318487] ==================================================================
---
[   37.044637] ==================================================================
[   37.046307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   37.047013] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.047990] 
[   37.048344] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.049649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.050163] Hardware name: linux,dummy-virt (DT)
[   37.050831] Call trace:
[   37.051613]  dump_backtrace+0x9c/0x128
[   37.052631]  show_stack+0x20/0x38
[   37.053388]  dump_stack_lvl+0x8c/0xd0
[   37.054173]  print_report+0x118/0x5e0
[   37.054924]  kasan_report+0xc8/0x118
[   37.055693]  kasan_check_range+0x100/0x1a8
[   37.056507]  __kasan_check_write+0x20/0x30
[   37.057351]  kasan_atomics_helper+0x141c/0x49c8
[   37.058201]  kasan_atomics+0x1a0/0x2e8
[   37.058845]  kunit_try_run_case+0x14c/0x3d0
[   37.059534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.060310]  kthread+0x24c/0x2d0
[   37.060941]  ret_from_fork+0x10/0x20
[   37.061553] 
[   37.061944] Allocated by task 251:
[   37.062530]  kasan_save_stack+0x3c/0x68
[   37.063219]  kasan_save_track+0x20/0x40
[   37.063807]  kasan_save_alloc_info+0x40/0x58
[   37.064493]  __kasan_kmalloc+0xd4/0xd8
[   37.065029]  __kmalloc_cache_noprof+0x144/0x328
[   37.065770]  kasan_atomics+0xb8/0x2e8
[   37.066401]  kunit_try_run_case+0x14c/0x3d0
[   37.066998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.067813]  kthread+0x24c/0x2d0
[   37.068436]  ret_from_fork+0x10/0x20
[   37.069033] 
[   37.069409] The buggy address belongs to the object at fff00000c5809b80
[   37.069409]  which belongs to the cache kmalloc-64 of size 64
[   37.070591] The buggy address is located 0 bytes to the right of
[   37.070591]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.071910] 
[   37.072338] The buggy address belongs to the physical page:
[   37.073039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.074012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.074906] page_type: f5(slab)
[   37.075504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.076308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.077286] page dumped because: kasan: bad access detected
[   37.078003] 
[   37.078359] Memory state around the buggy address:
[   37.078933]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.079695]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.080480] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.081257]                                      ^
[   37.082155]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.082965]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.084151] ==================================================================

test log snippet boot parser 26

Home

[   36.453243] ==================================================================
[   36.454059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   36.455613] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.456609] 
[   36.457110] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.458170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.458745] Hardware name: linux,dummy-virt (DT)
[   36.459430] Call trace:
[   36.459874]  dump_backtrace+0x9c/0x128
[   36.460663]  show_stack+0x20/0x38
[   36.461224]  dump_stack_lvl+0x8c/0xd0
[   36.461902]  print_report+0x118/0x5e0
[   36.462510]  kasan_report+0xc8/0x118
[   36.463168]  kasan_check_range+0x100/0x1a8
[   36.463789]  __kasan_check_read+0x20/0x30
[   36.464499]  kasan_atomics_helper+0xe3c/0x49c8
[   36.465141]  kasan_atomics+0x1a0/0x2e8
[   36.465816]  kunit_try_run_case+0x14c/0x3d0
[   36.466419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.467208]  kthread+0x24c/0x2d0
[   36.467728]  ret_from_fork+0x10/0x20
[   36.468389] 
[   36.468793] Allocated by task 251:
[   36.469293]  kasan_save_stack+0x3c/0x68
[   36.470043]  kasan_save_track+0x20/0x40
[   36.470701]  kasan_save_alloc_info+0x40/0x58
[   36.471287]  __kasan_kmalloc+0xd4/0xd8
[   36.471943]  __kmalloc_cache_noprof+0x144/0x328
[   36.472623]  kasan_atomics+0xb8/0x2e8
[   36.473283]  kunit_try_run_case+0x14c/0x3d0
[   36.473897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.474697]  kthread+0x24c/0x2d0
[   36.475321]  ret_from_fork+0x10/0x20
[   36.475912] 
[   36.476246] The buggy address belongs to the object at fff00000c5809b80
[   36.476246]  which belongs to the cache kmalloc-64 of size 64
[   36.477525] The buggy address is located 0 bytes to the right of
[   36.477525]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.478832] 
[   36.479262] The buggy address belongs to the physical page:
[   36.479925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.481032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.481851] page_type: f5(slab)
[   36.482395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.483334] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.484207] page dumped because: kasan: bad access detected
[   36.484880] 
[   36.485261] Memory state around the buggy address:
[   36.486010]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.486772]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.487660] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.488532]                                      ^
[   36.489162]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.490062]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.490870] ==================================================================
---
[   35.131477] ==================================================================
[   35.132304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   35.133105] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.134355] 
[   35.134762] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.136029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.136610] Hardware name: linux,dummy-virt (DT)
[   35.137382] Call trace:
[   35.138159]  dump_backtrace+0x9c/0x128
[   35.138790]  show_stack+0x20/0x38
[   35.139383]  dump_stack_lvl+0x8c/0xd0
[   35.140072]  print_report+0x118/0x5e0
[   35.141016]  kasan_report+0xc8/0x118
[   35.141600]  kasan_check_range+0x100/0x1a8
[   35.142243]  __kasan_check_read+0x20/0x30
[   35.142869]  kasan_atomics_helper+0x1f8/0x49c8
[   35.143545]  kasan_atomics+0x1a0/0x2e8
[   35.144227]  kunit_try_run_case+0x14c/0x3d0
[   35.145168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.145917]  kthread+0x24c/0x2d0
[   35.146498]  ret_from_fork+0x10/0x20
[   35.147094] 
[   35.147471] Allocated by task 251:
[   35.147992]  kasan_save_stack+0x3c/0x68
[   35.148604]  kasan_save_track+0x20/0x40
[   35.149607]  kasan_save_alloc_info+0x40/0x58
[   35.150237]  __kasan_kmalloc+0xd4/0xd8
[   35.150903]  __kmalloc_cache_noprof+0x144/0x328
[   35.151568]  kasan_atomics+0xb8/0x2e8
[   35.152228]  kunit_try_run_case+0x14c/0x3d0
[   35.153201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.154287]  kthread+0x24c/0x2d0
[   35.154843]  ret_from_fork+0x10/0x20
[   35.155487] 
[   35.155902] The buggy address belongs to the object at fff00000c5809b80
[   35.155902]  which belongs to the cache kmalloc-64 of size 64
[   35.157633] The buggy address is located 0 bytes to the right of
[   35.157633]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.158935] 
[   35.159350] The buggy address belongs to the physical page:
[   35.159962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.161355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.162295] page_type: f5(slab)
[   35.162664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.163654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.164500] page dumped because: kasan: bad access detected
[   35.165525] 
[   35.165841] Memory state around the buggy address:
[   35.166540]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.167394]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.168281] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.169180]                                      ^
[   35.170180]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.171080]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.171814] ==================================================================
---
[   35.216413] ==================================================================
[   35.217338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   35.218083] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.219013] 
[   35.219419] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.220615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.221145] Hardware name: linux,dummy-virt (DT)
[   35.221942] Call trace:
[   35.222424]  dump_backtrace+0x9c/0x128
[   35.223061]  show_stack+0x20/0x38
[   35.223570]  dump_stack_lvl+0x8c/0xd0
[   35.224211]  print_report+0x118/0x5e0
[   35.224880]  kasan_report+0xc8/0x118
[   35.225557]  kasan_check_range+0x100/0x1a8
[   35.226258]  __kasan_check_read+0x20/0x30
[   35.226773]  kasan_atomics_helper+0x2c4/0x49c8
[   35.227482]  kasan_atomics+0x1a0/0x2e8
[   35.228125]  kunit_try_run_case+0x14c/0x3d0
[   35.228760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.229371]  kthread+0x24c/0x2d0
[   35.230015]  ret_from_fork+0x10/0x20
[   35.230674] 
[   35.231050] Allocated by task 251:
[   35.231596]  kasan_save_stack+0x3c/0x68
[   35.232259]  kasan_save_track+0x20/0x40
[   35.232936]  kasan_save_alloc_info+0x40/0x58
[   35.233644]  __kasan_kmalloc+0xd4/0xd8
[   35.234176]  __kmalloc_cache_noprof+0x144/0x328
[   35.234773]  kasan_atomics+0xb8/0x2e8
[   35.235395]  kunit_try_run_case+0x14c/0x3d0
[   35.236066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.236887]  kthread+0x24c/0x2d0
[   35.237480]  ret_from_fork+0x10/0x20
[   35.238065] 
[   35.238449] The buggy address belongs to the object at fff00000c5809b80
[   35.238449]  which belongs to the cache kmalloc-64 of size 64
[   35.239589] The buggy address is located 0 bytes to the right of
[   35.239589]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.241075] 
[   35.241462] The buggy address belongs to the physical page:
[   35.242186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.243115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.244015] page_type: f5(slab)
[   35.244580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.245447] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.246478] page dumped because: kasan: bad access detected
[   35.247209] 
[   35.247515] Memory state around the buggy address:
[   35.248242]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.249111]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.250068] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.250748]                                      ^
[   35.251454]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.252321]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.253298] ==================================================================

test log snippet boot parser 27

Home

[   35.341860] ==================================================================
[   35.342612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   35.343546] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.344465] 
[   35.344866] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.346123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.346647] Hardware name: linux,dummy-virt (DT)
[   35.347171] Call trace:
[   35.347666]  dump_backtrace+0x9c/0x128
[   35.348331]  show_stack+0x20/0x38
[   35.348884]  dump_stack_lvl+0x8c/0xd0
[   35.349623]  print_report+0x118/0x5e0
[   35.350325]  kasan_report+0xc8/0x118
[   35.350934]  __asan_report_store4_noabort+0x20/0x30
[   35.352107]  kasan_atomics_helper+0x40fc/0x49c8
[   35.352615]  kasan_atomics+0x1a0/0x2e8
[   35.355458]  kunit_try_run_case+0x14c/0x3d0
[   35.356154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.357031]  kthread+0x24c/0x2d0
[   35.357605]  ret_from_fork+0x10/0x20
[   35.358263] 
[   35.358676] Allocated by task 251:
[   35.359277]  kasan_save_stack+0x3c/0x68
[   35.359848]  kasan_save_track+0x20/0x40
[   35.360531]  kasan_save_alloc_info+0x40/0x58
[   35.361208]  __kasan_kmalloc+0xd4/0xd8
[   35.361819]  __kmalloc_cache_noprof+0x144/0x328
[   35.362597]  kasan_atomics+0xb8/0x2e8
[   35.363197]  kunit_try_run_case+0x14c/0x3d0
[   35.363899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.364527]  kthread+0x24c/0x2d0
[   35.365222]  ret_from_fork+0x10/0x20
[   35.365789] 
[   35.366638] The buggy address belongs to the object at fff00000c5809b80
[   35.366638]  which belongs to the cache kmalloc-64 of size 64
[   35.368102] The buggy address is located 0 bytes to the right of
[   35.368102]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.369372] 
[   35.369763] The buggy address belongs to the physical page:
[   35.370589] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.371912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.372767] page_type: f5(slab)
[   35.373397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.374377] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.375305] page dumped because: kasan: bad access detected
[   35.375904] 
[   35.376334] Memory state around the buggy address:
[   35.377125]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.378113]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.378868] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.379748]                                      ^
[   35.380381]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.381237]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.382130] ==================================================================
---
[   36.569862] ==================================================================
[   36.571258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   36.572441] Write of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.573333] 
[   36.573726] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.574827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.575402] Hardware name: linux,dummy-virt (DT)
[   36.576023] Call trace:
[   36.576491]  dump_backtrace+0x9c/0x128
[   36.577078]  show_stack+0x20/0x38
[   36.577701]  dump_stack_lvl+0x8c/0xd0
[   36.578289]  print_report+0x118/0x5e0
[   36.578906]  kasan_report+0xc8/0x118
[   36.579539]  __asan_report_store8_noabort+0x20/0x30
[   36.580344]  kasan_atomics_helper+0x3fc4/0x49c8
[   36.581065]  kasan_atomics+0x1a0/0x2e8
[   36.581734]  kunit_try_run_case+0x14c/0x3d0
[   36.582424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.583106]  kthread+0x24c/0x2d0
[   36.583709]  ret_from_fork+0x10/0x20
[   36.584340] 
[   36.584653] Allocated by task 251:
[   36.585240]  kasan_save_stack+0x3c/0x68
[   36.585938]  kasan_save_track+0x20/0x40
[   36.586497]  kasan_save_alloc_info+0x40/0x58
[   36.587274]  __kasan_kmalloc+0xd4/0xd8
[   36.587892]  __kmalloc_cache_noprof+0x144/0x328
[   36.588616]  kasan_atomics+0xb8/0x2e8
[   36.589288]  kunit_try_run_case+0x14c/0x3d0
[   36.589968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.590735]  kthread+0x24c/0x2d0
[   36.591301]  ret_from_fork+0x10/0x20
[   36.591941] 
[   36.592338] The buggy address belongs to the object at fff00000c5809b80
[   36.592338]  which belongs to the cache kmalloc-64 of size 64
[   36.593619] The buggy address is located 0 bytes to the right of
[   36.593619]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.594934] 
[   36.595375] The buggy address belongs to the physical page:
[   36.596122] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.597101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.597970] page_type: f5(slab)
[   36.598504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.599317] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.600307] page dumped because: kasan: bad access detected
[   36.601071] 
[   36.601447] Memory state around the buggy address:
[   36.602192]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.602956]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.603897] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.604745]                                      ^
[   36.605485]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.606246]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.607188] ==================================================================
---
[   35.087223] ==================================================================
[   35.087924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   35.089488] Write of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.090621] 
[   35.091158] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.092241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.093037] Hardware name: linux,dummy-virt (DT)
[   35.093716] Call trace:
[   35.094202]  dump_backtrace+0x9c/0x128
[   35.094820]  show_stack+0x20/0x38
[   35.095421]  dump_stack_lvl+0x8c/0xd0
[   35.096047]  print_report+0x118/0x5e0
[   35.096601]  kasan_report+0xc8/0x118
[   35.097503]  __asan_report_store4_noabort+0x20/0x30
[   35.098213]  kasan_atomics_helper+0x40e4/0x49c8
[   35.098885]  kasan_atomics+0x1a0/0x2e8
[   35.099518]  kunit_try_run_case+0x14c/0x3d0
[   35.100235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.101174]  kthread+0x24c/0x2d0
[   35.101796]  ret_from_fork+0x10/0x20
[   35.102424] 
[   35.102766] Allocated by task 251:
[   35.103353]  kasan_save_stack+0x3c/0x68
[   35.104058]  kasan_save_track+0x20/0x40
[   35.104580]  kasan_save_alloc_info+0x40/0x58
[   35.105709]  __kasan_kmalloc+0xd4/0xd8
[   35.106175]  __kmalloc_cache_noprof+0x144/0x328
[   35.106911]  kasan_atomics+0xb8/0x2e8
[   35.107680]  kunit_try_run_case+0x14c/0x3d0
[   35.108243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.109199]  kthread+0x24c/0x2d0
[   35.109752]  ret_from_fork+0x10/0x20
[   35.110430] 
[   35.110831] The buggy address belongs to the object at fff00000c5809b80
[   35.110831]  which belongs to the cache kmalloc-64 of size 64
[   35.112242] The buggy address is located 0 bytes to the right of
[   35.112242]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.114072] 
[   35.114453] The buggy address belongs to the physical page:
[   35.115161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.116135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.117222] page_type: f5(slab)
[   35.118101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.119427] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.120215] page dumped because: kasan: bad access detected
[   35.121092] 
[   35.121759] Memory state around the buggy address:
[   35.122665]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.123693]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.125258] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.125957]                                      ^
[   35.126577]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.127912]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.129016] ==================================================================

test log snippet boot parser 28

Home

[   37.320005] ==================================================================
[   37.320733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   37.321711] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.322666] 
[   37.323041] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.323947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.324580] Hardware name: linux,dummy-virt (DT)
[   37.325256] Call trace:
[   37.325733]  dump_backtrace+0x9c/0x128
[   37.326339]  show_stack+0x20/0x38
[   37.326855]  dump_stack_lvl+0x8c/0xd0
[   37.327429]  print_report+0x118/0x5e0
[   37.327906]  kasan_report+0xc8/0x118
[   37.328514]  __asan_report_load8_noabort+0x20/0x30
[   37.329255]  kasan_atomics_helper+0x3f18/0x49c8
[   37.329960]  kasan_atomics+0x1a0/0x2e8
[   37.330667]  kunit_try_run_case+0x14c/0x3d0
[   37.331292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.331916]  kthread+0x24c/0x2d0
[   37.332522]  ret_from_fork+0x10/0x20
[   37.333070] 
[   37.333440] Allocated by task 251:
[   37.333948]  kasan_save_stack+0x3c/0x68
[   37.334605]  kasan_save_track+0x20/0x40
[   37.335134]  kasan_save_alloc_info+0x40/0x58
[   37.335802]  __kasan_kmalloc+0xd4/0xd8
[   37.336834]  __kmalloc_cache_noprof+0x144/0x328
[   37.337666]  kasan_atomics+0xb8/0x2e8
[   37.338187]  kunit_try_run_case+0x14c/0x3d0
[   37.338731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.339441]  kthread+0x24c/0x2d0
[   37.339955]  ret_from_fork+0x10/0x20
[   37.340738] 
[   37.341195] The buggy address belongs to the object at fff00000c5809b80
[   37.341195]  which belongs to the cache kmalloc-64 of size 64
[   37.342524] The buggy address is located 0 bytes to the right of
[   37.342524]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.343954] 
[   37.344419] The buggy address belongs to the physical page:
[   37.345156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.346235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.347135] page_type: f5(slab)
[   37.347679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.348688] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.349507] page dumped because: kasan: bad access detected
[   37.350334] 
[   37.350717] Memory state around the buggy address:
[   37.351435]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.352265]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.353100] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.353965]                                      ^
[   37.354754]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.355632]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.356507] ==================================================================
---
[   36.096531] ==================================================================
[   36.097518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   36.098722] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.099744] 
[   36.100167] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.101152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.101615] Hardware name: linux,dummy-virt (DT)
[   36.102329] Call trace:
[   36.102793]  dump_backtrace+0x9c/0x128
[   36.103473]  show_stack+0x20/0x38
[   36.103934]  dump_stack_lvl+0x8c/0xd0
[   36.104509]  print_report+0x118/0x5e0
[   36.105040]  kasan_report+0xc8/0x118
[   36.105547]  __asan_report_load4_noabort+0x20/0x30
[   36.106206]  kasan_atomics_helper+0x3f34/0x49c8
[   36.106742]  kasan_atomics+0x1a0/0x2e8
[   36.107347]  kunit_try_run_case+0x14c/0x3d0
[   36.108038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.108871]  kthread+0x24c/0x2d0
[   36.109519]  ret_from_fork+0x10/0x20
[   36.110178] 
[   36.110480] Allocated by task 251:
[   36.111091]  kasan_save_stack+0x3c/0x68
[   36.111735]  kasan_save_track+0x20/0x40
[   36.112416]  kasan_save_alloc_info+0x40/0x58
[   36.113107]  __kasan_kmalloc+0xd4/0xd8
[   36.113772]  __kmalloc_cache_noprof+0x144/0x328
[   36.114445]  kasan_atomics+0xb8/0x2e8
[   36.115047]  kunit_try_run_case+0x14c/0x3d0
[   36.115612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.116427]  kthread+0x24c/0x2d0
[   36.117048]  ret_from_fork+0x10/0x20
[   36.117686] 
[   36.118068] The buggy address belongs to the object at fff00000c5809b80
[   36.118068]  which belongs to the cache kmalloc-64 of size 64
[   36.119271] The buggy address is located 0 bytes to the right of
[   36.119271]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.120535] 
[   36.120909] The buggy address belongs to the physical page:
[   36.121646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.122558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.123354] page_type: f5(slab)
[   36.123949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.125134] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.126177] page dumped because: kasan: bad access detected
[   36.127047] 
[   36.127575] Memory state around the buggy address:
[   36.128298]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.129355]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.130195] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.131080]                                      ^
[   36.131684]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.132547]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.133392] ==================================================================
---
[   35.255010] ==================================================================
[   35.255753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   35.256532] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.257617] 
[   35.258035] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.258920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.259537] Hardware name: linux,dummy-virt (DT)
[   35.260218] Call trace:
[   35.260743]  dump_backtrace+0x9c/0x128
[   35.261397]  show_stack+0x20/0x38
[   35.261867]  dump_stack_lvl+0x8c/0xd0
[   35.262526]  print_report+0x118/0x5e0
[   35.263184]  kasan_report+0xc8/0x118
[   35.263773]  __asan_report_load4_noabort+0x20/0x30
[   35.264430]  kasan_atomics_helper+0x4264/0x49c8
[   35.265179]  kasan_atomics+0x1a0/0x2e8
[   35.265802]  kunit_try_run_case+0x14c/0x3d0
[   35.266405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.267278]  kthread+0x24c/0x2d0
[   35.267742]  ret_from_fork+0x10/0x20
[   35.268374] 
[   35.268758] Allocated by task 251:
[   35.269327]  kasan_save_stack+0x3c/0x68
[   35.269966]  kasan_save_track+0x20/0x40
[   35.270544]  kasan_save_alloc_info+0x40/0x58
[   35.271332]  __kasan_kmalloc+0xd4/0xd8
[   35.272040]  __kmalloc_cache_noprof+0x144/0x328
[   35.272810]  kasan_atomics+0xb8/0x2e8
[   35.274501]  kunit_try_run_case+0x14c/0x3d0
[   35.275344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.276164]  kthread+0x24c/0x2d0
[   35.276743]  ret_from_fork+0x10/0x20
[   35.277323] 
[   35.277645] The buggy address belongs to the object at fff00000c5809b80
[   35.277645]  which belongs to the cache kmalloc-64 of size 64
[   35.279114] The buggy address is located 0 bytes to the right of
[   35.279114]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.280335] 
[   35.280776] The buggy address belongs to the physical page:
[   35.281755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.282992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.283782] page_type: f5(slab)
[   35.284504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.285889] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.286760] page dumped because: kasan: bad access detected
[   35.287484] 
[   35.287889] Memory state around the buggy address:
[   35.288554]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.289780]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.290653] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.291512]                                      ^
[   35.292179]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.293218]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.294096] ==================================================================
---
[   36.251844] ==================================================================
[   36.252559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   36.253572] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.254518] 
[   36.254876] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.255942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.256432] Hardware name: linux,dummy-virt (DT)
[   36.257091] Call trace:
[   36.257559]  dump_backtrace+0x9c/0x128
[   36.258068]  show_stack+0x20/0x38
[   36.258654]  dump_stack_lvl+0x8c/0xd0
[   36.259245]  print_report+0x118/0x5e0
[   36.259829]  kasan_report+0xc8/0x118
[   36.260415]  __asan_report_load4_noabort+0x20/0x30
[   36.261121]  kasan_atomics_helper+0x3f4c/0x49c8
[   36.261810]  kasan_atomics+0x1a0/0x2e8
[   36.262443]  kunit_try_run_case+0x14c/0x3d0
[   36.263077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.263786]  kthread+0x24c/0x2d0
[   36.264377]  ret_from_fork+0x10/0x20
[   36.264942] 
[   36.265261] Allocated by task 251:
[   36.265820]  kasan_save_stack+0x3c/0x68
[   36.266486]  kasan_save_track+0x20/0x40
[   36.267065]  kasan_save_alloc_info+0x40/0x58
[   36.267650]  __kasan_kmalloc+0xd4/0xd8
[   36.268185]  __kmalloc_cache_noprof+0x144/0x328
[   36.268881]  kasan_atomics+0xb8/0x2e8
[   36.269519]  kunit_try_run_case+0x14c/0x3d0
[   36.270062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.270860]  kthread+0x24c/0x2d0
[   36.271392]  ret_from_fork+0x10/0x20
[   36.271887] 
[   36.272261] The buggy address belongs to the object at fff00000c5809b80
[   36.272261]  which belongs to the cache kmalloc-64 of size 64
[   36.273648] The buggy address is located 0 bytes to the right of
[   36.273648]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.274773] 
[   36.275164] The buggy address belongs to the physical page:
[   36.275893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.276595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.277551] page_type: f5(slab)
[   36.278146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.279068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.280029] page dumped because: kasan: bad access detected
[   36.280701] 
[   36.281090] Memory state around the buggy address:
[   36.281797]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.282747]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.283518] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.284434]                                      ^
[   36.285047]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.285929]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.286767] ==================================================================
---
[   36.327582] ==================================================================
[   36.328287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   36.329813] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.330661] 
[   36.331073] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.332033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.332731] Hardware name: linux,dummy-virt (DT)
[   36.334168] Call trace:
[   36.334687]  dump_backtrace+0x9c/0x128
[   36.335320]  show_stack+0x20/0x38
[   36.335939]  dump_stack_lvl+0x8c/0xd0
[   36.336510]  print_report+0x118/0x5e0
[   36.337171]  kasan_report+0xc8/0x118
[   36.337758]  __asan_report_load4_noabort+0x20/0x30
[   36.338526]  kasan_atomics_helper+0x3f40/0x49c8
[   36.339162]  kasan_atomics+0x1a0/0x2e8
[   36.339859]  kunit_try_run_case+0x14c/0x3d0
[   36.340695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.341502]  kthread+0x24c/0x2d0
[   36.342105]  ret_from_fork+0x10/0x20
[   36.342785] 
[   36.343151] Allocated by task 251:
[   36.343751]  kasan_save_stack+0x3c/0x68
[   36.344388]  kasan_save_track+0x20/0x40
[   36.345073]  kasan_save_alloc_info+0x40/0x58
[   36.345726]  __kasan_kmalloc+0xd4/0xd8
[   36.346399]  __kmalloc_cache_noprof+0x144/0x328
[   36.347076]  kasan_atomics+0xb8/0x2e8
[   36.347728]  kunit_try_run_case+0x14c/0x3d0
[   36.348337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.349161]  kthread+0x24c/0x2d0
[   36.349715]  ret_from_fork+0x10/0x20
[   36.350365] 
[   36.350758] The buggy address belongs to the object at fff00000c5809b80
[   36.350758]  which belongs to the cache kmalloc-64 of size 64
[   36.352255] The buggy address is located 0 bytes to the right of
[   36.352255]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.357640] 
[   36.358437] The buggy address belongs to the physical page:
[   36.360515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.362278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.363219] page_type: f5(slab)
[   36.363672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.364564] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.365451] page dumped because: kasan: bad access detected
[   36.366240] 
[   36.366632] Memory state around the buggy address:
[   36.367309]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.368177]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.369071] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.369770]                                      ^
[   36.370276]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.370998]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.371735] ==================================================================
---
[   37.399748] ==================================================================
[   37.400337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   37.402016] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.402726] 
[   37.403211] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.404276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.404923] Hardware name: linux,dummy-virt (DT)
[   37.405589] Call trace:
[   37.406070]  dump_backtrace+0x9c/0x128
[   37.406653]  show_stack+0x20/0x38
[   37.407143]  dump_stack_lvl+0x8c/0xd0
[   37.407610]  print_report+0x118/0x5e0
[   37.408149]  kasan_report+0xc8/0x118
[   37.408745]  __asan_report_load8_noabort+0x20/0x30
[   37.409415]  kasan_atomics_helper+0x3f5c/0x49c8
[   37.410060]  kasan_atomics+0x1a0/0x2e8
[   37.410644]  kunit_try_run_case+0x14c/0x3d0
[   37.411333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.411962]  kthread+0x24c/0x2d0
[   37.412569]  ret_from_fork+0x10/0x20
[   37.413091] 
[   37.413459] Allocated by task 251:
[   37.414088]  kasan_save_stack+0x3c/0x68
[   37.414639]  kasan_save_track+0x20/0x40
[   37.415266]  kasan_save_alloc_info+0x40/0x58
[   37.416277]  __kasan_kmalloc+0xd4/0xd8
[   37.417016]  __kmalloc_cache_noprof+0x144/0x328
[   37.417644]  kasan_atomics+0xb8/0x2e8
[   37.418220]  kunit_try_run_case+0x14c/0x3d0
[   37.418894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.419689]  kthread+0x24c/0x2d0
[   37.420212]  ret_from_fork+0x10/0x20
[   37.420787] 
[   37.421183] The buggy address belongs to the object at fff00000c5809b80
[   37.421183]  which belongs to the cache kmalloc-64 of size 64
[   37.422288] The buggy address is located 0 bytes to the right of
[   37.422288]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.423566] 
[   37.423931] The buggy address belongs to the physical page:
[   37.424620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.425461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.426189] page_type: f5(slab)
[   37.426677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.427638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.428578] page dumped because: kasan: bad access detected
[   37.429194] 
[   37.429564] Memory state around the buggy address:
[   37.430219]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.431051]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.431806] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.432700]                                      ^
[   37.433405]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.434195]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.434967] ==================================================================
---
[   36.492553] ==================================================================
[   36.493364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   36.494152] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.495097] 
[   36.495459] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.496670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.497339] Hardware name: linux,dummy-virt (DT)
[   36.497941] Call trace:
[   36.498476]  dump_backtrace+0x9c/0x128
[   36.499111]  show_stack+0x20/0x38
[   36.499649]  dump_stack_lvl+0x8c/0xd0
[   36.500301]  print_report+0x118/0x5e0
[   36.501043]  kasan_report+0xc8/0x118
[   36.501677]  __asan_report_load8_noabort+0x20/0x30
[   36.502446]  kasan_atomics_helper+0x40c0/0x49c8
[   36.503090]  kasan_atomics+0x1a0/0x2e8
[   36.503755]  kunit_try_run_case+0x14c/0x3d0
[   36.504310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.505142]  kthread+0x24c/0x2d0
[   36.505660]  ret_from_fork+0x10/0x20
[   36.506240] 
[   36.506609] Allocated by task 251:
[   36.507235]  kasan_save_stack+0x3c/0x68
[   36.507908]  kasan_save_track+0x20/0x40
[   36.508611]  kasan_save_alloc_info+0x40/0x58
[   36.509338]  __kasan_kmalloc+0xd4/0xd8
[   36.509861]  __kmalloc_cache_noprof+0x144/0x328
[   36.510688]  kasan_atomics+0xb8/0x2e8
[   36.511293]  kunit_try_run_case+0x14c/0x3d0
[   36.512018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.512726]  kthread+0x24c/0x2d0
[   36.513360]  ret_from_fork+0x10/0x20
[   36.513959] 
[   36.514350] The buggy address belongs to the object at fff00000c5809b80
[   36.514350]  which belongs to the cache kmalloc-64 of size 64
[   36.515647] The buggy address is located 0 bytes to the right of
[   36.515647]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.516939] 
[   36.517369] The buggy address belongs to the physical page:
[   36.518065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.518998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.519757] page_type: f5(slab)
[   36.520387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.521399] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.522229] page dumped because: kasan: bad access detected
[   36.522922] 
[   36.523351] Memory state around the buggy address:
[   36.523926]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.524783]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.525693] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.526571]                                      ^
[   36.527158]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.528046]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.528912] ==================================================================
---
[   36.414426] ==================================================================
[   36.415307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   36.416060] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.417008] 
[   36.417500] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.418530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.419178] Hardware name: linux,dummy-virt (DT)
[   36.419773] Call trace:
[   36.420288]  dump_backtrace+0x9c/0x128
[   36.421025]  show_stack+0x20/0x38
[   36.421543]  dump_stack_lvl+0x8c/0xd0
[   36.422204]  print_report+0x118/0x5e0
[   36.422853]  kasan_report+0xc8/0x118
[   36.423579]  __asan_report_load4_noabort+0x20/0x30
[   36.424347]  kasan_atomics_helper+0x3f6c/0x49c8
[   36.425154]  kasan_atomics+0x1a0/0x2e8
[   36.425855]  kunit_try_run_case+0x14c/0x3d0
[   36.426504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.427089]  kthread+0x24c/0x2d0
[   36.427703]  ret_from_fork+0x10/0x20
[   36.428381] 
[   36.428749] Allocated by task 251:
[   36.429269]  kasan_save_stack+0x3c/0x68
[   36.430004]  kasan_save_track+0x20/0x40
[   36.430657]  kasan_save_alloc_info+0x40/0x58
[   36.431301]  __kasan_kmalloc+0xd4/0xd8
[   36.431954]  __kmalloc_cache_noprof+0x144/0x328
[   36.432569]  kasan_atomics+0xb8/0x2e8
[   36.433139]  kunit_try_run_case+0x14c/0x3d0
[   36.433849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.434587]  kthread+0x24c/0x2d0
[   36.435220]  ret_from_fork+0x10/0x20
[   36.435776] 
[   36.436209] The buggy address belongs to the object at fff00000c5809b80
[   36.436209]  which belongs to the cache kmalloc-64 of size 64
[   36.437495] The buggy address is located 0 bytes to the right of
[   36.437495]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.438778] 
[   36.439184] The buggy address belongs to the physical page:
[   36.439807] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.440851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.441737] page_type: f5(slab)
[   36.442268] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.443226] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.444106] page dumped because: kasan: bad access detected
[   36.444788] 
[   36.445176] Memory state around the buggy address:
[   36.445819]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.446711]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.447581] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.448405]                                      ^
[   36.449028]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.449892]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.450811] ==================================================================
---
[   37.474890] ==================================================================
[   37.475651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   37.476443] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.477443] 
[   37.477861] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.478893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.479531] Hardware name: linux,dummy-virt (DT)
[   37.480138] Call trace:
[   37.480638]  dump_backtrace+0x9c/0x128
[   37.481288]  show_stack+0x20/0x38
[   37.481777]  dump_stack_lvl+0x8c/0xd0
[   37.482420]  print_report+0x118/0x5e0
[   37.483058]  kasan_report+0xc8/0x118
[   37.483571]  __asan_report_load8_noabort+0x20/0x30
[   37.484267]  kasan_atomics_helper+0x3f78/0x49c8
[   37.484962]  kasan_atomics+0x1a0/0x2e8
[   37.485608]  kunit_try_run_case+0x14c/0x3d0
[   37.486154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.486924]  kthread+0x24c/0x2d0
[   37.487508]  ret_from_fork+0x10/0x20
[   37.488042] 
[   37.488406] Allocated by task 251:
[   37.488962]  kasan_save_stack+0x3c/0x68
[   37.489507]  kasan_save_track+0x20/0x40
[   37.490159]  kasan_save_alloc_info+0x40/0x58
[   37.490858]  __kasan_kmalloc+0xd4/0xd8
[   37.491605]  __kmalloc_cache_noprof+0x144/0x328
[   37.492206]  kasan_atomics+0xb8/0x2e8
[   37.492852]  kunit_try_run_case+0x14c/0x3d0
[   37.493528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.494300]  kthread+0x24c/0x2d0
[   37.494915]  ret_from_fork+0x10/0x20
[   37.495507] 
[   37.495858] The buggy address belongs to the object at fff00000c5809b80
[   37.495858]  which belongs to the cache kmalloc-64 of size 64
[   37.497137] The buggy address is located 0 bytes to the right of
[   37.497137]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.498318] 
[   37.498692] The buggy address belongs to the physical page:
[   37.499438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.500307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.501148] page_type: f5(slab)
[   37.501725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.502505] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.503440] page dumped because: kasan: bad access detected
[   37.504025] 
[   37.504396] Memory state around the buggy address:
[   37.505080]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.505871]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.506653] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.507544]                                      ^
[   37.508192]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.509029]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.509774] ==================================================================
---
[   35.043229] ==================================================================
[   35.044684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   35.045951] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.046994] 
[   35.047510] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.048535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.049179] Hardware name: linux,dummy-virt (DT)
[   35.049861] Call trace:
[   35.050351]  dump_backtrace+0x9c/0x128
[   35.051370]  show_stack+0x20/0x38
[   35.051940]  dump_stack_lvl+0x8c/0xd0
[   35.052674]  print_report+0x118/0x5e0
[   35.053700]  kasan_report+0xc8/0x118
[   35.054317]  __asan_report_load4_noabort+0x20/0x30
[   35.055291]  kasan_atomics_helper+0x4210/0x49c8
[   35.056012]  kasan_atomics+0x1a0/0x2e8
[   35.057101]  kunit_try_run_case+0x14c/0x3d0
[   35.057673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.058461]  kthread+0x24c/0x2d0
[   35.059047]  ret_from_fork+0x10/0x20
[   35.059651] 
[   35.060024] Allocated by task 251:
[   35.060584]  kasan_save_stack+0x3c/0x68
[   35.061213]  kasan_save_track+0x20/0x40
[   35.061857]  kasan_save_alloc_info+0x40/0x58
[   35.062755]  __kasan_kmalloc+0xd4/0xd8
[   35.063370]  __kmalloc_cache_noprof+0x144/0x328
[   35.064055]  kasan_atomics+0xb8/0x2e8
[   35.065058]  kunit_try_run_case+0x14c/0x3d0
[   35.065679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.067344]  kthread+0x24c/0x2d0
[   35.067865]  ret_from_fork+0x10/0x20
[   35.068504] 
[   35.069130] The buggy address belongs to the object at fff00000c5809b80
[   35.069130]  which belongs to the cache kmalloc-64 of size 64
[   35.070307] The buggy address is located 0 bytes to the right of
[   35.070307]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.071642] 
[   35.072044] The buggy address belongs to the physical page:
[   35.072934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.073942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.074825] page_type: f5(slab)
[   35.075330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.076297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.077373] page dumped because: kasan: bad access detected
[   35.078055] 
[   35.078460] Memory state around the buggy address:
[   35.079116]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.080028]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.081235] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.082078]                                      ^
[   35.082733]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.083618]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.084485] ==================================================================
---
[   37.086673] ==================================================================
[   37.087416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   37.088448] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.089876] 
[   37.090279] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.091683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.092436] Hardware name: linux,dummy-virt (DT)
[   37.093282] Call trace:
[   37.093947]  dump_backtrace+0x9c/0x128
[   37.094767]  show_stack+0x20/0x38
[   37.095515]  dump_stack_lvl+0x8c/0xd0
[   37.096354]  print_report+0x118/0x5e0
[   37.096878]  kasan_report+0xc8/0x118
[   37.097411]  __asan_report_load8_noabort+0x20/0x30
[   37.098560]  kasan_atomics_helper+0x406c/0x49c8
[   37.099145]  kasan_atomics+0x1a0/0x2e8
[   37.099882]  kunit_try_run_case+0x14c/0x3d0
[   37.100676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.101599]  kthread+0x24c/0x2d0
[   37.102383]  ret_from_fork+0x10/0x20
[   37.103153] 
[   37.103669] Allocated by task 251:
[   37.104116]  kasan_save_stack+0x3c/0x68
[   37.105004]  kasan_save_track+0x20/0x40
[   37.105592]  kasan_save_alloc_info+0x40/0x58
[   37.106241]  __kasan_kmalloc+0xd4/0xd8
[   37.106883]  __kmalloc_cache_noprof+0x144/0x328
[   37.107520]  kasan_atomics+0xb8/0x2e8
[   37.108038]  kunit_try_run_case+0x14c/0x3d0
[   37.108598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.109317]  kthread+0x24c/0x2d0
[   37.109789]  ret_from_fork+0x10/0x20
[   37.110481] 
[   37.110848] The buggy address belongs to the object at fff00000c5809b80
[   37.110848]  which belongs to the cache kmalloc-64 of size 64
[   37.111870] The buggy address is located 0 bytes to the right of
[   37.111870]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.113525] 
[   37.114198] The buggy address belongs to the physical page:
[   37.114940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.116058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.117040] page_type: f5(slab)
[   37.117784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.118857] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.119737] page dumped because: kasan: bad access detected
[   37.120403] 
[   37.120810] Memory state around the buggy address:
[   37.121399]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.122382]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.123184] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.124081]                                      ^
[   37.124804]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.125623]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.126475] ==================================================================
---
[   35.867948] ==================================================================
[   35.868891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   35.870532] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   35.871311] 
[   35.871707] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.873021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.873628] Hardware name: linux,dummy-virt (DT)
[   35.873911] Call trace:
[   35.874214]  dump_backtrace+0x9c/0x128
[   35.874827]  show_stack+0x20/0x38
[   35.875423]  dump_stack_lvl+0x8c/0xd0
[   35.875945]  print_report+0x118/0x5e0
[   35.876575]  kasan_report+0xc8/0x118
[   35.877125]  __asan_report_load4_noabort+0x20/0x30
[   35.877851]  kasan_atomics_helper+0x4440/0x49c8
[   35.878560]  kasan_atomics+0x1a0/0x2e8
[   35.879209]  kunit_try_run_case+0x14c/0x3d0
[   35.879800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.880554]  kthread+0x24c/0x2d0
[   35.881041]  ret_from_fork+0x10/0x20
[   35.881655] 
[   35.882038] Allocated by task 251:
[   35.882576]  kasan_save_stack+0x3c/0x68
[   35.883207]  kasan_save_track+0x20/0x40
[   35.883835]  kasan_save_alloc_info+0x40/0x58
[   35.884451]  __kasan_kmalloc+0xd4/0xd8
[   35.885045]  __kmalloc_cache_noprof+0x144/0x328
[   35.885750]  kasan_atomics+0xb8/0x2e8
[   35.886396]  kunit_try_run_case+0x14c/0x3d0
[   35.887070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.887710]  kthread+0x24c/0x2d0
[   35.888291]  ret_from_fork+0x10/0x20
[   35.888893] 
[   35.889244] The buggy address belongs to the object at fff00000c5809b80
[   35.889244]  which belongs to the cache kmalloc-64 of size 64
[   35.890492] The buggy address is located 0 bytes to the right of
[   35.890492]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   35.891667] 
[   35.892067] The buggy address belongs to the physical page:
[   35.892798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   35.893657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.894401] page_type: f5(slab)
[   35.894968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.895804] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.896624] page dumped because: kasan: bad access detected
[   35.897331] 
[   35.897709] Memory state around the buggy address:
[   35.898260]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.899096]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.899888] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.900716]                                      ^
[   35.901336]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.902170]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.902937] ==================================================================
---
[   37.549244] ==================================================================
[   37.550194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   37.551563] Read of size 8 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   37.552227] 
[   37.552619] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.553724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.554363] Hardware name: linux,dummy-virt (DT)
[   37.555085] Call trace:
[   37.555521]  dump_backtrace+0x9c/0x128
[   37.556031]  show_stack+0x20/0x38
[   37.556645]  dump_stack_lvl+0x8c/0xd0
[   37.557285]  print_report+0x118/0x5e0
[   37.557897]  kasan_report+0xc8/0x118
[   37.558516]  __asan_report_load8_noabort+0x20/0x30
[   37.559199]  kasan_atomics_helper+0x3f88/0x49c8
[   37.559742]  kasan_atomics+0x1a0/0x2e8
[   37.560390]  kunit_try_run_case+0x14c/0x3d0
[   37.561005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.561778]  kthread+0x24c/0x2d0
[   37.562381]  ret_from_fork+0x10/0x20
[   37.563009] 
[   37.563365] Allocated by task 251:
[   37.563851]  kasan_save_stack+0x3c/0x68
[   37.564512]  kasan_save_track+0x20/0x40
[   37.565098]  kasan_save_alloc_info+0x40/0x58
[   37.565773]  __kasan_kmalloc+0xd4/0xd8
[   37.566411]  __kmalloc_cache_noprof+0x144/0x328
[   37.567143]  kasan_atomics+0xb8/0x2e8
[   37.567658]  kunit_try_run_case+0x14c/0x3d0
[   37.568310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.569097]  kthread+0x24c/0x2d0
[   37.569618]  ret_from_fork+0x10/0x20
[   37.570242] 
[   37.570649] The buggy address belongs to the object at fff00000c5809b80
[   37.570649]  which belongs to the cache kmalloc-64 of size 64
[   37.571892] The buggy address is located 0 bytes to the right of
[   37.571892]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   37.573172] 
[   37.573501] The buggy address belongs to the physical page:
[   37.574240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   37.575209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.576029] page_type: f5(slab)
[   37.576593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.577449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.578276] page dumped because: kasan: bad access detected
[   37.578934] 
[   37.579318] Memory state around the buggy address:
[   37.579944]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.580706]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.581576] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.582384]                                      ^
[   37.583007]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.583768]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.584581] ==================================================================
---
[   36.174267] ==================================================================
[   36.175120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   36.175929] Read of size 4 at addr fff00000c5809bb0 by task kunit_try_catch/251
[   36.176727] 
[   36.177188] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.178284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.178839] Hardware name: linux,dummy-virt (DT)
[   36.179484] Call trace:
[   36.179992]  dump_backtrace+0x9c/0x128
[   36.180585]  show_stack+0x20/0x38
[   36.181223]  dump_stack_lvl+0x8c/0xd0
[   36.181805]  print_report+0x118/0x5e0
[   36.182464]  kasan_report+0xc8/0x118
[   36.183114]  __asan_report_load4_noabort+0x20/0x30
[   36.183817]  kasan_atomics_helper+0x3f24/0x49c8
[   36.184543]  kasan_atomics+0x1a0/0x2e8
[   36.185234]  kunit_try_run_case+0x14c/0x3d0
[   36.185941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.186684]  kthread+0x24c/0x2d0
[   36.187301]  ret_from_fork+0x10/0x20
[   36.187904] 
[   36.188259] Allocated by task 251:
[   36.188767]  kasan_save_stack+0x3c/0x68
[   36.189498]  kasan_save_track+0x20/0x40
[   36.190136]  kasan_save_alloc_info+0x40/0x58
[   36.190928]  __kasan_kmalloc+0xd4/0xd8
[   36.191334]  __kmalloc_cache_noprof+0x144/0x328
[   36.192308]  kasan_atomics+0xb8/0x2e8
[   36.192680]  kunit_try_run_case+0x14c/0x3d0
[   36.193213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.193991]  kthread+0x24c/0x2d0
[   36.194567]  ret_from_fork+0x10/0x20
[   36.195088] 
[   36.195461] The buggy address belongs to the object at fff00000c5809b80
[   36.195461]  which belongs to the cache kmalloc-64 of size 64
[   36.196677] The buggy address is located 0 bytes to the right of
[   36.196677]  allocated 48-byte region [fff00000c5809b80, fff00000c5809bb0)
[   36.197871] 
[   36.198261] The buggy address belongs to the physical page:
[   36.198906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   36.199865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.200740] page_type: f5(slab)
[   36.201217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.202177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.203098] page dumped because: kasan: bad access detected
[   36.203730] 
[   36.204122] Memory state around the buggy address:
[   36.204729]  fff00000c5809a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.205492]  fff00000c5809b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.206391] >fff00000c5809b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.207232]                                      ^
[   36.207886]  fff00000c5809c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.208706]  fff00000c5809c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.209504] ==================================================================

test log snippet boot parser 29

Home

[   34.517272] ==================================================================
[   34.518127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   34.518948] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.519766] 
[   34.520165] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.521317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.521965] Hardware name: linux,dummy-virt (DT)
[   34.522748] Call trace:
[   34.523208]  dump_backtrace+0x9c/0x128
[   34.523747]  show_stack+0x20/0x38
[   34.524393]  dump_stack_lvl+0x8c/0xd0
[   34.525046]  print_report+0x118/0x5e0
[   34.525774]  kasan_report+0xc8/0x118
[   34.526374]  __asan_report_load8_noabort+0x20/0x30
[   34.527026]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   34.527835]  kasan_bitops_generic+0x114/0x1d0
[   34.528558]  kunit_try_run_case+0x14c/0x3d0
[   34.529273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.530139]  kthread+0x24c/0x2d0
[   34.530748]  ret_from_fork+0x10/0x20
[   34.531426] 
[   34.531810] Allocated by task 247:
[   34.532411]  kasan_save_stack+0x3c/0x68
[   34.533077]  kasan_save_track+0x20/0x40
[   34.533740]  kasan_save_alloc_info+0x40/0x58
[   34.534483]  __kasan_kmalloc+0xd4/0xd8
[   34.535114]  __kmalloc_cache_noprof+0x144/0x328
[   34.535651]  kasan_bitops_generic+0xa0/0x1d0
[   34.536388]  kunit_try_run_case+0x14c/0x3d0
[   34.537126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.538005]  kthread+0x24c/0x2d0
[   34.538594]  ret_from_fork+0x10/0x20
[   34.539165] 
[   34.539556] The buggy address belongs to the object at fff00000c3ec9b20
[   34.539556]  which belongs to the cache kmalloc-16 of size 16
[   34.540702] The buggy address is located 8 bytes inside of
[   34.540702]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.542160] 
[   34.542555] The buggy address belongs to the physical page:
[   34.543251] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.544372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.545446] page_type: f5(slab)
[   34.546078] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.547581] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.548001] page dumped because: kasan: bad access detected
[   34.548617] 
[   34.549856] Memory state around the buggy address:
[   34.550835]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.551880]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.552971] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.553913]                                   ^
[   34.554537]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.555423]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.556168] ==================================================================
---
[   34.394446] ==================================================================
[   34.395331] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   34.396200] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.397291] 
[   34.397653] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.398788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.400201] Hardware name: linux,dummy-virt (DT)
[   34.401131] Call trace:
[   34.401591]  dump_backtrace+0x9c/0x128
[   34.402218]  show_stack+0x20/0x38
[   34.402779]  dump_stack_lvl+0x8c/0xd0
[   34.403391]  print_report+0x118/0x5e0
[   34.403913]  kasan_report+0xc8/0x118
[   34.404566]  __asan_report_load8_noabort+0x20/0x30
[   34.405606]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   34.406360]  kasan_bitops_generic+0x114/0x1d0
[   34.407030]  kunit_try_run_case+0x14c/0x3d0
[   34.407590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.408430]  kthread+0x24c/0x2d0
[   34.409261]  ret_from_fork+0x10/0x20
[   34.409914] 
[   34.410335] Allocated by task 247:
[   34.410786]  kasan_save_stack+0x3c/0x68
[   34.411521]  kasan_save_track+0x20/0x40
[   34.412174]  kasan_save_alloc_info+0x40/0x58
[   34.412895]  __kasan_kmalloc+0xd4/0xd8
[   34.414429]  __kmalloc_cache_noprof+0x144/0x328
[   34.415112]  kasan_bitops_generic+0xa0/0x1d0
[   34.415772]  kunit_try_run_case+0x14c/0x3d0
[   34.416404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.417134]  kthread+0x24c/0x2d0
[   34.417755]  ret_from_fork+0x10/0x20
[   34.418695] 
[   34.419120] The buggy address belongs to the object at fff00000c3ec9b20
[   34.419120]  which belongs to the cache kmalloc-16 of size 16
[   34.420320] The buggy address is located 8 bytes inside of
[   34.420320]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.421880] 
[   34.422330] The buggy address belongs to the physical page:
[   34.423057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.424040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.425162] page_type: f5(slab)
[   34.425744] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.426675] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.427525] page dumped because: kasan: bad access detected
[   34.428294] 
[   34.428946] Memory state around the buggy address:
[   34.429656]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.430553]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.431403] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.432168]                                   ^
[   34.433148]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.434073]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.434813] ==================================================================
---
[   34.642622] ==================================================================
[   34.643570] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   34.644576] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.645513] 
[   34.645882] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.648969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.649556] Hardware name: linux,dummy-virt (DT)
[   34.650389] Call trace:
[   34.650952]  dump_backtrace+0x9c/0x128
[   34.651723]  show_stack+0x20/0x38
[   34.652337]  dump_stack_lvl+0x8c/0xd0
[   34.653306]  print_report+0x118/0x5e0
[   34.653886]  kasan_report+0xc8/0x118
[   34.654426]  __asan_report_load8_noabort+0x20/0x30
[   34.654967]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   34.655790]  kasan_bitops_generic+0x114/0x1d0
[   34.656518]  kunit_try_run_case+0x14c/0x3d0
[   34.657340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.658014]  kthread+0x24c/0x2d0
[   34.658618]  ret_from_fork+0x10/0x20
[   34.659240] 
[   34.659691] Allocated by task 247:
[   34.660263]  kasan_save_stack+0x3c/0x68
[   34.661492]  kasan_save_track+0x20/0x40
[   34.662028]  kasan_save_alloc_info+0x40/0x58
[   34.662504]  __kasan_kmalloc+0xd4/0xd8
[   34.663169]  __kmalloc_cache_noprof+0x144/0x328
[   34.663908]  kasan_bitops_generic+0xa0/0x1d0
[   34.664666]  kunit_try_run_case+0x14c/0x3d0
[   34.665391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.666281]  kthread+0x24c/0x2d0
[   34.666896]  ret_from_fork+0x10/0x20
[   34.667570] 
[   34.667990] The buggy address belongs to the object at fff00000c3ec9b20
[   34.667990]  which belongs to the cache kmalloc-16 of size 16
[   34.669376] The buggy address is located 8 bytes inside of
[   34.669376]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.670645] 
[   34.671075] The buggy address belongs to the physical page:
[   34.671753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.672680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.673600] page_type: f5(slab)
[   34.674202] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.674970] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.675954] page dumped because: kasan: bad access detected
[   34.676722] 
[   34.677145] Memory state around the buggy address:
[   34.677835]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.678674]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.679438] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.680329]                                   ^
[   34.680904]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681666]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.682525] ==================================================================
---
[   34.307814] ==================================================================
[   34.308548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   34.309887] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.310489] 
[   34.310935] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.312160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.312999] Hardware name: linux,dummy-virt (DT)
[   34.313848] Call trace:
[   34.314331]  dump_backtrace+0x9c/0x128
[   34.314927]  show_stack+0x20/0x38
[   34.315564]  dump_stack_lvl+0x8c/0xd0
[   34.316216]  print_report+0x118/0x5e0
[   34.316923]  kasan_report+0xc8/0x118
[   34.318349]  __asan_report_load8_noabort+0x20/0x30
[   34.319037]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   34.319948]  kasan_bitops_generic+0x114/0x1d0
[   34.320568]  kunit_try_run_case+0x14c/0x3d0
[   34.321130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.322273]  kthread+0x24c/0x2d0
[   34.322822]  ret_from_fork+0x10/0x20
[   34.323453] 
[   34.323637] Allocated by task 247:
[   34.323865]  kasan_save_stack+0x3c/0x68
[   34.324269]  kasan_save_track+0x20/0x40
[   34.324930]  kasan_save_alloc_info+0x40/0x58
[   34.325662]  __kasan_kmalloc+0xd4/0xd8
[   34.326323]  __kmalloc_cache_noprof+0x144/0x328
[   34.327426]  kasan_bitops_generic+0xa0/0x1d0
[   34.328526]  kunit_try_run_case+0x14c/0x3d0
[   34.329483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.330400]  kthread+0x24c/0x2d0
[   34.331148]  ret_from_fork+0x10/0x20
[   34.331902] 
[   34.332456] The buggy address belongs to the object at fff00000c3ec9b20
[   34.332456]  which belongs to the cache kmalloc-16 of size 16
[   34.333940] The buggy address is located 8 bytes inside of
[   34.333940]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.335282] 
[   34.335768] The buggy address belongs to the physical page:
[   34.336609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.337907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.338807] page_type: f5(slab)
[   34.339452] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.340456] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.341722] page dumped because: kasan: bad access detected
[   34.342323] 
[   34.342694] Memory state around the buggy address:
[   34.343291]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.344228]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.345396] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.346162]                                   ^
[   34.347240]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.348169]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.348937] ==================================================================

test log snippet boot parser 30

Home

[   34.437433] ==================================================================
[   34.438266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   34.439022] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.439847] 
[   34.440265] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.441310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.441925] Hardware name: linux,dummy-virt (DT)
[   34.442690] Call trace:
[   34.443204]  dump_backtrace+0x9c/0x128
[   34.443954]  show_stack+0x20/0x38
[   34.444555]  dump_stack_lvl+0x8c/0xd0
[   34.445173]  print_report+0x118/0x5e0
[   34.445753]  kasan_report+0xc8/0x118
[   34.446445]  kasan_check_range+0x100/0x1a8
[   34.447178]  __kasan_check_write+0x20/0x30
[   34.447774]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   34.448622]  kasan_bitops_generic+0x114/0x1d0
[   34.449267]  kunit_try_run_case+0x14c/0x3d0
[   34.450035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450913]  kthread+0x24c/0x2d0
[   34.451437]  ret_from_fork+0x10/0x20
[   34.452161] 
[   34.452563] Allocated by task 247:
[   34.453143]  kasan_save_stack+0x3c/0x68
[   34.454151]  kasan_save_track+0x20/0x40
[   34.454542]  kasan_save_alloc_info+0x40/0x58
[   34.455270]  __kasan_kmalloc+0xd4/0xd8
[   34.455925]  __kmalloc_cache_noprof+0x144/0x328
[   34.456523]  kasan_bitops_generic+0xa0/0x1d0
[   34.457227]  kunit_try_run_case+0x14c/0x3d0
[   34.457770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.458590]  kthread+0x24c/0x2d0
[   34.459149]  ret_from_fork+0x10/0x20
[   34.459788] 
[   34.460215] The buggy address belongs to the object at fff00000c3ec9b20
[   34.460215]  which belongs to the cache kmalloc-16 of size 16
[   34.461932] The buggy address is located 8 bytes inside of
[   34.461932]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.463203] 
[   34.463612] The buggy address belongs to the physical page:
[   34.464190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.465837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.466548] page_type: f5(slab)
[   34.466802] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.467205] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.467558] page dumped because: kasan: bad access detected
[   34.467838] 
[   34.468038] Memory state around the buggy address:
[   34.468757]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.470122]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.471486] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.472349]                                   ^
[   34.473040]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.473889]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.474740] ==================================================================
---
[   34.558237] ==================================================================
[   34.558881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   34.559613] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.560581] 
[   34.561550] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.562919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.563740] Hardware name: linux,dummy-virt (DT)
[   34.564435] Call trace:
[   34.564668]  dump_backtrace+0x9c/0x128
[   34.565738]  show_stack+0x20/0x38
[   34.566288]  dump_stack_lvl+0x8c/0xd0
[   34.567017]  print_report+0x118/0x5e0
[   34.567615]  kasan_report+0xc8/0x118
[   34.568140]  kasan_check_range+0x100/0x1a8
[   34.569066]  __kasan_check_write+0x20/0x30
[   34.569896]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   34.570698]  kasan_bitops_generic+0x114/0x1d0
[   34.571411]  kunit_try_run_case+0x14c/0x3d0
[   34.572069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.573107]  kthread+0x24c/0x2d0
[   34.573702]  ret_from_fork+0x10/0x20
[   34.574158] 
[   34.574549] Allocated by task 247:
[   34.575159]  kasan_save_stack+0x3c/0x68
[   34.575682]  kasan_save_track+0x20/0x40
[   34.576399]  kasan_save_alloc_info+0x40/0x58
[   34.577338]  __kasan_kmalloc+0xd4/0xd8
[   34.577812]  __kmalloc_cache_noprof+0x144/0x328
[   34.578487]  kasan_bitops_generic+0xa0/0x1d0
[   34.579697]  kunit_try_run_case+0x14c/0x3d0
[   34.580498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.581560]  kthread+0x24c/0x2d0
[   34.582038]  ret_from_fork+0x10/0x20
[   34.582518] 
[   34.582844] The buggy address belongs to the object at fff00000c3ec9b20
[   34.582844]  which belongs to the cache kmalloc-16 of size 16
[   34.584569] The buggy address is located 8 bytes inside of
[   34.584569]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.586164] 
[   34.586790] The buggy address belongs to the physical page:
[   34.587478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.588648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.589722] page_type: f5(slab)
[   34.590283] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.591449] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.592413] page dumped because: kasan: bad access detected
[   34.593298] 
[   34.594016] Memory state around the buggy address:
[   34.594883]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.595825]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.596950] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.597825]                                   ^
[   34.598496]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.599150]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.600024] ==================================================================
---
[   34.601708] ==================================================================
[   34.602397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   34.603400] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.604262] 
[   34.604612] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.605743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.606351] Hardware name: linux,dummy-virt (DT)
[   34.607056] Call trace:
[   34.607442]  dump_backtrace+0x9c/0x128
[   34.607916]  show_stack+0x20/0x38
[   34.608347]  dump_stack_lvl+0x8c/0xd0
[   34.608780]  print_report+0x118/0x5e0
[   34.609228]  kasan_report+0xc8/0x118
[   34.609689]  kasan_check_range+0x100/0x1a8
[   34.610568]  __kasan_check_write+0x20/0x30
[   34.611262]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   34.612058]  kasan_bitops_generic+0x114/0x1d0
[   34.612748]  kunit_try_run_case+0x14c/0x3d0
[   34.613449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.614145]  kthread+0x24c/0x2d0
[   34.614599]  ret_from_fork+0x10/0x20
[   34.615583] 
[   34.615957] Allocated by task 247:
[   34.616568]  kasan_save_stack+0x3c/0x68
[   34.617543]  kasan_save_track+0x20/0x40
[   34.618231]  kasan_save_alloc_info+0x40/0x58
[   34.618953]  __kasan_kmalloc+0xd4/0xd8
[   34.619466]  __kmalloc_cache_noprof+0x144/0x328
[   34.620226]  kasan_bitops_generic+0xa0/0x1d0
[   34.621410]  kunit_try_run_case+0x14c/0x3d0
[   34.622002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.623514]  kthread+0x24c/0x2d0
[   34.624152]  ret_from_fork+0x10/0x20
[   34.625242] 
[   34.625516] The buggy address belongs to the object at fff00000c3ec9b20
[   34.625516]  which belongs to the cache kmalloc-16 of size 16
[   34.627072] The buggy address is located 8 bytes inside of
[   34.627072]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.628589] 
[   34.629126] The buggy address belongs to the physical page:
[   34.629928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.630807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.631579] page_type: f5(slab)
[   34.632124] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.633026] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.634138] page dumped because: kasan: bad access detected
[   34.634805] 
[   34.635257] Memory state around the buggy address:
[   34.635995]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.636888]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.637855] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.638741]                                   ^
[   34.639461]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.640341]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.641195] ==================================================================
---
[   34.476264] ==================================================================
[   34.477137] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   34.478947] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.479866] 
[   34.480229] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.482003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.482908] Hardware name: linux,dummy-virt (DT)
[   34.483781] Call trace:
[   34.484224]  dump_backtrace+0x9c/0x128
[   34.485282]  show_stack+0x20/0x38
[   34.485815]  dump_stack_lvl+0x8c/0xd0
[   34.486411]  print_report+0x118/0x5e0
[   34.487015]  kasan_report+0xc8/0x118
[   34.487559]  kasan_check_range+0x100/0x1a8
[   34.488277]  __kasan_check_write+0x20/0x30
[   34.488891]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   34.489776]  kasan_bitops_generic+0x114/0x1d0
[   34.490544]  kunit_try_run_case+0x14c/0x3d0
[   34.491143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.491957]  kthread+0x24c/0x2d0
[   34.492483]  ret_from_fork+0x10/0x20
[   34.493219] 
[   34.493569] Allocated by task 247:
[   34.494131]  kasan_save_stack+0x3c/0x68
[   34.494799]  kasan_save_track+0x20/0x40
[   34.495360]  kasan_save_alloc_info+0x40/0x58
[   34.496035]  __kasan_kmalloc+0xd4/0xd8
[   34.496682]  __kmalloc_cache_noprof+0x144/0x328
[   34.497552]  kasan_bitops_generic+0xa0/0x1d0
[   34.498230]  kunit_try_run_case+0x14c/0x3d0
[   34.498770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.499581]  kthread+0x24c/0x2d0
[   34.500137]  ret_from_fork+0x10/0x20
[   34.500725] 
[   34.501128] The buggy address belongs to the object at fff00000c3ec9b20
[   34.501128]  which belongs to the cache kmalloc-16 of size 16
[   34.502444] The buggy address is located 8 bytes inside of
[   34.502444]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.503869] 
[   34.504256] The buggy address belongs to the physical page:
[   34.505003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.505803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.506665] page_type: f5(slab)
[   34.507232] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.508241] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.509256] page dumped because: kasan: bad access detected
[   34.510015] 
[   34.510476] Memory state around the buggy address:
[   34.511131]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.512091]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.512969] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.513794]                                   ^
[   34.514497]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.515333]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.515949] ==================================================================
---
[   34.263953] ==================================================================
[   34.265282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   34.266467] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.267183] 
[   34.267630] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.268859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.269804] Hardware name: linux,dummy-virt (DT)
[   34.270519] Call trace:
[   34.270921]  dump_backtrace+0x9c/0x128
[   34.271578]  show_stack+0x20/0x38
[   34.272221]  dump_stack_lvl+0x8c/0xd0
[   34.273113]  print_report+0x118/0x5e0
[   34.273758]  kasan_report+0xc8/0x118
[   34.274354]  kasan_check_range+0x100/0x1a8
[   34.275031]  __kasan_check_write+0x20/0x30
[   34.275687]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   34.276488]  kasan_bitops_generic+0x114/0x1d0
[   34.277496]  kunit_try_run_case+0x14c/0x3d0
[   34.278085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.278782]  kthread+0x24c/0x2d0
[   34.279484]  ret_from_fork+0x10/0x20
[   34.280075] 
[   34.280480] Allocated by task 247:
[   34.281314]  kasan_save_stack+0x3c/0x68
[   34.281922]  kasan_save_track+0x20/0x40
[   34.282576]  kasan_save_alloc_info+0x40/0x58
[   34.283248]  __kasan_kmalloc+0xd4/0xd8
[   34.283837]  __kmalloc_cache_noprof+0x144/0x328
[   34.284588]  kasan_bitops_generic+0xa0/0x1d0
[   34.286035]  kunit_try_run_case+0x14c/0x3d0
[   34.286707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.287423]  kthread+0x24c/0x2d0
[   34.288050]  ret_from_fork+0x10/0x20
[   34.288591] 
[   34.289062] The buggy address belongs to the object at fff00000c3ec9b20
[   34.289062]  which belongs to the cache kmalloc-16 of size 16
[   34.290697] The buggy address is located 8 bytes inside of
[   34.290697]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.291955] 
[   34.292394] The buggy address belongs to the physical page:
[   34.293379] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.294419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.295196] page_type: f5(slab)
[   34.295790] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.297059] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.297903] page dumped because: kasan: bad access detected
[   34.298588] 
[   34.298970] Memory state around the buggy address:
[   34.299714]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.300566]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.301618] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.302578]                                   ^
[   34.303177]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.304054]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.305301] ==================================================================
---
[   34.351459] ==================================================================
[   34.352138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   34.353259] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.353814] 
[   34.354205] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.355387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.356022] Hardware name: linux,dummy-virt (DT)
[   34.356734] Call trace:
[   34.357196]  dump_backtrace+0x9c/0x128
[   34.357861]  show_stack+0x20/0x38
[   34.358459]  dump_stack_lvl+0x8c/0xd0
[   34.359142]  print_report+0x118/0x5e0
[   34.359765]  kasan_report+0xc8/0x118
[   34.360286]  kasan_check_range+0x100/0x1a8
[   34.361109]  __kasan_check_write+0x20/0x30
[   34.361829]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   34.362638]  kasan_bitops_generic+0x114/0x1d0
[   34.363174]  kunit_try_run_case+0x14c/0x3d0
[   34.363918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.364938]  kthread+0x24c/0x2d0
[   34.365599]  ret_from_fork+0x10/0x20
[   34.366279] 
[   34.366638] Allocated by task 247:
[   34.367191]  kasan_save_stack+0x3c/0x68
[   34.367793]  kasan_save_track+0x20/0x40
[   34.368429]  kasan_save_alloc_info+0x40/0x58
[   34.369487]  __kasan_kmalloc+0xd4/0xd8
[   34.369939]  __kmalloc_cache_noprof+0x144/0x328
[   34.370459]  kasan_bitops_generic+0xa0/0x1d0
[   34.371081]  kunit_try_run_case+0x14c/0x3d0
[   34.371751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.372566]  kthread+0x24c/0x2d0
[   34.373666]  ret_from_fork+0x10/0x20
[   34.374400] 
[   34.374778] The buggy address belongs to the object at fff00000c3ec9b20
[   34.374778]  which belongs to the cache kmalloc-16 of size 16
[   34.376256] The buggy address is located 8 bytes inside of
[   34.376256]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.378029] 
[   34.378457] The buggy address belongs to the physical page:
[   34.379282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.380379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.381516] page_type: f5(slab)
[   34.382284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.383153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.384339] page dumped because: kasan: bad access detected
[   34.385287] 
[   34.385691] Memory state around the buggy address:
[   34.386668]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.387576]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.388360] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.388715]                                   ^
[   34.389156]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.390158]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.391218] ==================================================================

test log snippet boot parser 31

Home

[   34.837633] ==================================================================
[   34.838402] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   34.839301] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.840037] 
[   34.840463] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.841730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.842355] Hardware name: linux,dummy-virt (DT)
[   34.842941] Call trace:
[   34.843419]  dump_backtrace+0x9c/0x128
[   34.843963]  show_stack+0x20/0x38
[   34.844560]  dump_stack_lvl+0x8c/0xd0
[   34.845140]  print_report+0x118/0x5e0
[   34.845676]  kasan_report+0xc8/0x118
[   34.846244]  kasan_check_range+0x100/0x1a8
[   34.846805]  __kasan_check_write+0x20/0x30
[   34.847484]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   34.848355]  kasan_bitops_generic+0x120/0x1d0
[   34.848865]  kunit_try_run_case+0x14c/0x3d0
[   34.849557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.850266]  kthread+0x24c/0x2d0
[   34.850877]  ret_from_fork+0x10/0x20
[   34.851506] 
[   34.851877] Allocated by task 247:
[   34.852439]  kasan_save_stack+0x3c/0x68
[   34.853024]  kasan_save_track+0x20/0x40
[   34.853591]  kasan_save_alloc_info+0x40/0x58
[   34.854217]  __kasan_kmalloc+0xd4/0xd8
[   34.854848]  __kmalloc_cache_noprof+0x144/0x328
[   34.855567]  kasan_bitops_generic+0xa0/0x1d0
[   34.856080]  kunit_try_run_case+0x14c/0x3d0
[   34.856745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.857459]  kthread+0x24c/0x2d0
[   34.857971]  ret_from_fork+0x10/0x20
[   34.858589] 
[   34.858962] The buggy address belongs to the object at fff00000c3ec9b20
[   34.858962]  which belongs to the cache kmalloc-16 of size 16
[   34.860146] The buggy address is located 8 bytes inside of
[   34.860146]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.861304] 
[   34.861678] The buggy address belongs to the physical page:
[   34.862419] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.863420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.864226] page_type: f5(slab)
[   34.864794] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.865686] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.866453] page dumped because: kasan: bad access detected
[   34.867095] 
[   34.867410] Memory state around the buggy address:
[   34.868017]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.868930]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.869866] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.870651]                                   ^
[   34.871297]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.872219]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.873079] ==================================================================
---
[   34.684153] ==================================================================
[   34.684905] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   34.685834] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.686789] 
[   34.687298] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.688326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.688916] Hardware name: linux,dummy-virt (DT)
[   34.689657] Call trace:
[   34.690169]  dump_backtrace+0x9c/0x128
[   34.690774]  show_stack+0x20/0x38
[   34.691378]  dump_stack_lvl+0x8c/0xd0
[   34.692037]  print_report+0x118/0x5e0
[   34.693733]  kasan_report+0xc8/0x118
[   34.694244]  kasan_check_range+0x100/0x1a8
[   34.694864]  __kasan_check_write+0x20/0x30
[   34.695541]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   34.696251]  kasan_bitops_generic+0x120/0x1d0
[   34.697026]  kunit_try_run_case+0x14c/0x3d0
[   34.697650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.698383]  kthread+0x24c/0x2d0
[   34.698959]  ret_from_fork+0x10/0x20
[   34.699478] 
[   34.699852] Allocated by task 247:
[   34.700406]  kasan_save_stack+0x3c/0x68
[   34.701051]  kasan_save_track+0x20/0x40
[   34.701695]  kasan_save_alloc_info+0x40/0x58
[   34.702404]  __kasan_kmalloc+0xd4/0xd8
[   34.702969]  __kmalloc_cache_noprof+0x144/0x328
[   34.703707]  kasan_bitops_generic+0xa0/0x1d0
[   34.704361]  kunit_try_run_case+0x14c/0x3d0
[   34.705159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.705765]  kthread+0x24c/0x2d0
[   34.706241]  ret_from_fork+0x10/0x20
[   34.706873] 
[   34.707285] The buggy address belongs to the object at fff00000c3ec9b20
[   34.707285]  which belongs to the cache kmalloc-16 of size 16
[   34.708698] The buggy address is located 8 bytes inside of
[   34.708698]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.709885] 
[   34.710235] The buggy address belongs to the physical page:
[   34.711016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.712019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.712809] page_type: f5(slab)
[   34.713486] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.714379] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.715197] page dumped because: kasan: bad access detected
[   34.715847] 
[   34.716239] Memory state around the buggy address:
[   34.716921]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.717735]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.718582] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.719562]                                   ^
[   34.720281]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.721159]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.721951] ==================================================================
---
[   34.762800] ==================================================================
[   34.763680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   34.764688] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.765476] 
[   34.765904] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.766843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.767504] Hardware name: linux,dummy-virt (DT)
[   34.768167] Call trace:
[   34.768661]  dump_backtrace+0x9c/0x128
[   34.769306]  show_stack+0x20/0x38
[   34.769879]  dump_stack_lvl+0x8c/0xd0
[   34.770539]  print_report+0x118/0x5e0
[   34.771104]  kasan_report+0xc8/0x118
[   34.771649]  kasan_check_range+0x100/0x1a8
[   34.772246]  __kasan_check_write+0x20/0x30
[   34.772738]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   34.773392]  kasan_bitops_generic+0x120/0x1d0
[   34.774099]  kunit_try_run_case+0x14c/0x3d0
[   34.774765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.775570]  kthread+0x24c/0x2d0
[   34.776109]  ret_from_fork+0x10/0x20
[   34.776725] 
[   34.777101] Allocated by task 247:
[   34.777607]  kasan_save_stack+0x3c/0x68
[   34.778195]  kasan_save_track+0x20/0x40
[   34.778759]  kasan_save_alloc_info+0x40/0x58
[   34.779299]  __kasan_kmalloc+0xd4/0xd8
[   34.779916]  __kmalloc_cache_noprof+0x144/0x328
[   34.780631]  kasan_bitops_generic+0xa0/0x1d0
[   34.781322]  kunit_try_run_case+0x14c/0x3d0
[   34.781899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.782698]  kthread+0x24c/0x2d0
[   34.783188]  ret_from_fork+0x10/0x20
[   34.783790] 
[   34.784178] The buggy address belongs to the object at fff00000c3ec9b20
[   34.784178]  which belongs to the cache kmalloc-16 of size 16
[   34.785373] The buggy address is located 8 bytes inside of
[   34.785373]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.786375] 
[   34.786752] The buggy address belongs to the physical page:
[   34.787505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.788513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.789231] page_type: f5(slab)
[   34.789801] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.790820] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.791686] page dumped because: kasan: bad access detected
[   34.792320] 
[   34.792689] Memory state around the buggy address:
[   34.793283]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.794145]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.794952] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.795753]                                   ^
[   34.796297]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.797202]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.798024] ==================================================================
---
[   34.912185] ==================================================================
[   34.912954] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   34.914117] Write of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.914673] 
[   34.915086] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.916145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.916760] Hardware name: linux,dummy-virt (DT)
[   34.917369] Call trace:
[   34.917792]  dump_backtrace+0x9c/0x128
[   34.918420]  show_stack+0x20/0x38
[   34.918944]  dump_stack_lvl+0x8c/0xd0
[   34.919465]  print_report+0x118/0x5e0
[   34.920102]  kasan_report+0xc8/0x118
[   34.920665]  kasan_check_range+0x100/0x1a8
[   34.921237]  __kasan_check_write+0x20/0x30
[   34.921897]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   34.922545]  kasan_bitops_generic+0x120/0x1d0
[   34.923240]  kunit_try_run_case+0x14c/0x3d0
[   34.923887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.924531]  kthread+0x24c/0x2d0
[   34.925138]  ret_from_fork+0x10/0x20
[   34.925640] 
[   34.926023] Allocated by task 247:
[   34.926583]  kasan_save_stack+0x3c/0x68
[   34.927224]  kasan_save_track+0x20/0x40
[   34.927794]  kasan_save_alloc_info+0x40/0x58
[   34.928469]  __kasan_kmalloc+0xd4/0xd8
[   34.929062]  __kmalloc_cache_noprof+0x144/0x328
[   34.929629]  kasan_bitops_generic+0xa0/0x1d0
[   34.930315]  kunit_try_run_case+0x14c/0x3d0
[   34.930901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.931617]  kthread+0x24c/0x2d0
[   34.932211]  ret_from_fork+0x10/0x20
[   34.932825] 
[   34.933170] The buggy address belongs to the object at fff00000c3ec9b20
[   34.933170]  which belongs to the cache kmalloc-16 of size 16
[   34.934354] The buggy address is located 8 bytes inside of
[   34.934354]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.935561] 
[   34.935932] The buggy address belongs to the physical page:
[   34.936680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.937535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.938257] page_type: f5(slab)
[   34.938819] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.939718] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.940574] page dumped because: kasan: bad access detected
[   34.941254] 
[   34.941627] Memory state around the buggy address:
[   34.942218]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.943059]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.943876] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.944707]                                   ^
[   34.945379]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.946194]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.946966] ==================================================================

test log snippet boot parser 32

Home

[   34.799779] ==================================================================
[   34.800494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   34.801836] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.803573] 
[   34.804258] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.805662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.806249] Hardware name: linux,dummy-virt (DT)
[   34.806844] Call trace:
[   34.807302]  dump_backtrace+0x9c/0x128
[   34.807879]  show_stack+0x20/0x38
[   34.808477]  dump_stack_lvl+0x8c/0xd0
[   34.809041]  print_report+0x118/0x5e0
[   34.809641]  kasan_report+0xc8/0x118
[   34.810259]  __asan_report_load8_noabort+0x20/0x30
[   34.810995]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   34.811648]  kasan_bitops_generic+0x120/0x1d0
[   34.812345]  kunit_try_run_case+0x14c/0x3d0
[   34.812882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.813649]  kthread+0x24c/0x2d0
[   34.814246]  ret_from_fork+0x10/0x20
[   34.814852] 
[   34.815232] Allocated by task 247:
[   34.815670]  kasan_save_stack+0x3c/0x68
[   34.816305]  kasan_save_track+0x20/0x40
[   34.816796]  kasan_save_alloc_info+0x40/0x58
[   34.817487]  __kasan_kmalloc+0xd4/0xd8
[   34.818047]  __kmalloc_cache_noprof+0x144/0x328
[   34.818598]  kasan_bitops_generic+0xa0/0x1d0
[   34.819277]  kunit_try_run_case+0x14c/0x3d0
[   34.819850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.820654]  kthread+0x24c/0x2d0
[   34.821228]  ret_from_fork+0x10/0x20
[   34.821795] 
[   34.822176] The buggy address belongs to the object at fff00000c3ec9b20
[   34.822176]  which belongs to the cache kmalloc-16 of size 16
[   34.823342] The buggy address is located 8 bytes inside of
[   34.823342]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.824542] 
[   34.824861] The buggy address belongs to the physical page:
[   34.825513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.826420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.827126] page_type: f5(slab)
[   34.827706] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.828682] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.829432] page dumped because: kasan: bad access detected
[   34.830195] 
[   34.830583] Memory state around the buggy address:
[   34.831118]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.832016]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.832917] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.833707]                                   ^
[   34.834348]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.835156]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.835852] ==================================================================
---
[   34.723745] ==================================================================
[   34.724754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   34.725605] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.726553] 
[   34.728408] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.729445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.730000] Hardware name: linux,dummy-virt (DT)
[   34.730685] Call trace:
[   34.731067]  dump_backtrace+0x9c/0x128
[   34.731705]  show_stack+0x20/0x38
[   34.732256]  dump_stack_lvl+0x8c/0xd0
[   34.732875]  print_report+0x118/0x5e0
[   34.733465]  kasan_report+0xc8/0x118
[   34.733952]  __asan_report_load8_noabort+0x20/0x30
[   34.734694]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   34.735431]  kasan_bitops_generic+0x120/0x1d0
[   34.736104]  kunit_try_run_case+0x14c/0x3d0
[   34.736766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.737504]  kthread+0x24c/0x2d0
[   34.737969]  ret_from_fork+0x10/0x20
[   34.738607] 
[   34.738954] Allocated by task 247:
[   34.739519]  kasan_save_stack+0x3c/0x68
[   34.740138]  kasan_save_track+0x20/0x40
[   34.740665]  kasan_save_alloc_info+0x40/0x58
[   34.741347]  __kasan_kmalloc+0xd4/0xd8
[   34.741943]  __kmalloc_cache_noprof+0x144/0x328
[   34.742618]  kasan_bitops_generic+0xa0/0x1d0
[   34.743294]  kunit_try_run_case+0x14c/0x3d0
[   34.743960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.744674]  kthread+0x24c/0x2d0
[   34.745290]  ret_from_fork+0x10/0x20
[   34.745943] 
[   34.746370] The buggy address belongs to the object at fff00000c3ec9b20
[   34.746370]  which belongs to the cache kmalloc-16 of size 16
[   34.747430] The buggy address is located 8 bytes inside of
[   34.747430]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.748847] 
[   34.749245] The buggy address belongs to the physical page:
[   34.749918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.751042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.751802] page_type: f5(slab)
[   34.752381] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.753301] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.754130] page dumped because: kasan: bad access detected
[   34.754787] 
[   34.755175] Memory state around the buggy address:
[   34.755813]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.756627]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.757508] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.758271]                                   ^
[   34.758936]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.759781]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.760713] ==================================================================
---
[   34.948748] ==================================================================
[   34.949544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   34.950609] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.951956] 
[   34.953045] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.954513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.955035] Hardware name: linux,dummy-virt (DT)
[   34.955664] Call trace:
[   34.956136]  dump_backtrace+0x9c/0x128
[   34.956696]  show_stack+0x20/0x38
[   34.957314]  dump_stack_lvl+0x8c/0xd0
[   34.957899]  print_report+0x118/0x5e0
[   34.958940]  kasan_report+0xc8/0x118
[   34.959745]  __asan_report_load8_noabort+0x20/0x30
[   34.960364]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   34.961168]  kasan_bitops_generic+0x120/0x1d0
[   34.961781]  kunit_try_run_case+0x14c/0x3d0
[   34.962540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.963366]  kthread+0x24c/0x2d0
[   34.963996]  ret_from_fork+0x10/0x20
[   34.964630] 
[   34.965046] Allocated by task 247:
[   34.965684]  kasan_save_stack+0x3c/0x68
[   34.966354]  kasan_save_track+0x20/0x40
[   34.967068]  kasan_save_alloc_info+0x40/0x58
[   34.967765]  __kasan_kmalloc+0xd4/0xd8
[   34.968330]  __kmalloc_cache_noprof+0x144/0x328
[   34.968957]  kasan_bitops_generic+0xa0/0x1d0
[   34.969720]  kunit_try_run_case+0x14c/0x3d0
[   34.970386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.971149]  kthread+0x24c/0x2d0
[   34.971768]  ret_from_fork+0x10/0x20
[   34.972446] 
[   34.972765] The buggy address belongs to the object at fff00000c3ec9b20
[   34.972765]  which belongs to the cache kmalloc-16 of size 16
[   34.973964] The buggy address is located 8 bytes inside of
[   34.973964]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.975171] 
[   34.975530] The buggy address belongs to the physical page:
[   34.976087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.977250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.978223] page_type: f5(slab)
[   34.978871] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.979853] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.980829] page dumped because: kasan: bad access detected
[   34.981576] 
[   34.981955] Memory state around the buggy address:
[   34.982717]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.983548]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.984503] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.985379]                                   ^
[   34.986047]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.986945]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.987822] ==================================================================
---
[   34.874479] ==================================================================
[   34.875465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   34.876268] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.877250] 
[   34.877664] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.878541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.879175] Hardware name: linux,dummy-virt (DT)
[   34.879845] Call trace:
[   34.880311]  dump_backtrace+0x9c/0x128
[   34.880908]  show_stack+0x20/0x38
[   34.881524]  dump_stack_lvl+0x8c/0xd0
[   34.882100]  print_report+0x118/0x5e0
[   34.882681]  kasan_report+0xc8/0x118
[   34.883206]  __asan_report_load8_noabort+0x20/0x30
[   34.883872]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   34.884733]  kasan_bitops_generic+0x120/0x1d0
[   34.885287]  kunit_try_run_case+0x14c/0x3d0
[   34.885995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.886622]  kthread+0x24c/0x2d0
[   34.887228]  ret_from_fork+0x10/0x20
[   34.887794] 
[   34.888179] Allocated by task 247:
[   34.888699]  kasan_save_stack+0x3c/0x68
[   34.889288]  kasan_save_track+0x20/0x40
[   34.889855]  kasan_save_alloc_info+0x40/0x58
[   34.890558]  __kasan_kmalloc+0xd4/0xd8
[   34.891192]  __kmalloc_cache_noprof+0x144/0x328
[   34.891837]  kasan_bitops_generic+0xa0/0x1d0
[   34.892515]  kunit_try_run_case+0x14c/0x3d0
[   34.893092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.893855]  kthread+0x24c/0x2d0
[   34.894604]  ret_from_fork+0x10/0x20
[   34.895210] 
[   34.895584] The buggy address belongs to the object at fff00000c3ec9b20
[   34.895584]  which belongs to the cache kmalloc-16 of size 16
[   34.897113] The buggy address is located 8 bytes inside of
[   34.897113]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   34.898658] 
[   34.899047] The buggy address belongs to the physical page:
[   34.899571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   34.900644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.901370] page_type: f5(slab)
[   34.902012] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.902900] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.903819] page dumped because: kasan: bad access detected
[   34.904439] 
[   34.904837] Memory state around the buggy address:
[   34.905504]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.906326]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   34.907234] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.908044]                                   ^
[   34.908624]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.909515]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.910356] ==================================================================
---
[   34.989379] ==================================================================
[   34.989912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   34.990950] Read of size 8 at addr fff00000c3ec9b28 by task kunit_try_catch/247
[   34.992083] 
[   34.992475] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.994028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.994501] Hardware name: linux,dummy-virt (DT)
[   34.995143] Call trace:
[   34.995569]  dump_backtrace+0x9c/0x128
[   34.996211]  show_stack+0x20/0x38
[   34.996810]  dump_stack_lvl+0x8c/0xd0
[   34.997500]  print_report+0x118/0x5e0
[   34.998227]  kasan_report+0xc8/0x118
[   34.999012]  __asan_report_load8_noabort+0x20/0x30
[   34.999700]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   35.000422]  kasan_bitops_generic+0x120/0x1d0
[   35.001151]  kunit_try_run_case+0x14c/0x3d0
[   35.001763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.002526]  kthread+0x24c/0x2d0
[   35.003065]  ret_from_fork+0x10/0x20
[   35.003540] 
[   35.003922] Allocated by task 247:
[   35.004490]  kasan_save_stack+0x3c/0x68
[   35.005130]  kasan_save_track+0x20/0x40
[   35.005743]  kasan_save_alloc_info+0x40/0x58
[   35.006423]  __kasan_kmalloc+0xd4/0xd8
[   35.007052]  __kmalloc_cache_noprof+0x144/0x328
[   35.007633]  kasan_bitops_generic+0xa0/0x1d0
[   35.008318]  kunit_try_run_case+0x14c/0x3d0
[   35.008871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.009671]  kthread+0x24c/0x2d0
[   35.010139]  ret_from_fork+0x10/0x20
[   35.010766] 
[   35.011150] The buggy address belongs to the object at fff00000c3ec9b20
[   35.011150]  which belongs to the cache kmalloc-16 of size 16
[   35.012344] The buggy address is located 8 bytes inside of
[   35.012344]  allocated 9-byte region [fff00000c3ec9b20, fff00000c3ec9b29)
[   35.013517] 
[   35.013888] The buggy address belongs to the physical page:
[   35.014575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   35.015570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.016221] page_type: f5(slab)
[   35.016802] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.017718] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.018597] page dumped because: kasan: bad access detected
[   35.019213] 
[   35.019564] Memory state around the buggy address:
[   35.020207]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.021530]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   35.022200] >fff00000c3ec9b00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.022552]                                   ^
[   35.022811]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.023365]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.024655] ==================================================================

test log snippet boot parser 33

Home

[   29.830859] ==================================================================
[   29.831907] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308
[   29.832771] Write of size 1 at addr fff00000c5eadf00 by task kunit_try_catch/130
[   29.833536] 
[   29.833926] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.835384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.835893] Hardware name: linux,dummy-virt (DT)
[   29.836379] Call trace:
[   29.836880]  dump_backtrace+0x9c/0x128
[   29.837537]  show_stack+0x20/0x38
[   29.838123]  dump_stack_lvl+0x8c/0xd0
[   29.838707]  print_report+0x118/0x5e0
[   29.839301]  kasan_report+0xc8/0x118
[   29.839771]  __asan_report_store1_noabort+0x20/0x30
[   29.840492]  kmalloc_big_oob_right+0x2b8/0x308
[   29.841400]  kunit_try_run_case+0x14c/0x3d0
[   29.842043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.842765]  kthread+0x24c/0x2d0
[   29.843181]  ret_from_fork+0x10/0x20
[   29.844242] 
[   29.844683] Allocated by task 130:
[   29.845431]  kasan_save_stack+0x3c/0x68
[   29.846063]  kasan_save_track+0x20/0x40
[   29.846594]  kasan_save_alloc_info+0x40/0x58
[   29.847570]  __kasan_kmalloc+0xd4/0xd8
[   29.848321]  __kmalloc_cache_noprof+0x144/0x328
[   29.849020]  kmalloc_big_oob_right+0xb8/0x308
[   29.849879]  kunit_try_run_case+0x14c/0x3d0
[   29.850603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.851252]  kthread+0x24c/0x2d0
[   29.851771]  ret_from_fork+0x10/0x20
[   29.852294] 
[   29.852705] The buggy address belongs to the object at fff00000c5eac000
[   29.852705]  which belongs to the cache kmalloc-8k of size 8192
[   29.853956] The buggy address is located 0 bytes to the right of
[   29.853956]  allocated 7936-byte region [fff00000c5eac000, fff00000c5eadf00)
[   29.855288] 
[   29.855839] The buggy address belongs to the physical page:
[   29.856375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ea8
[   29.857686] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.858577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.859288] page_type: f5(slab)
[   29.859851] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.860830] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   29.861672] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.862645] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   29.863868] head: 0bfffe0000000003 ffffc1ffc317aa01 ffffffffffffffff 0000000000000000
[   29.865063] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.865896] page dumped because: kasan: bad access detected
[   29.866595] 
[   29.866950] Memory state around the buggy address:
[   29.867520]  fff00000c5eade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.868481]  fff00000c5eade80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.869643] >fff00000c5eadf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.870455]                    ^
[   29.870948]  fff00000c5eadf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.871854]  fff00000c5eae000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.872615] ==================================================================

test log snippet boot parser 34

Home

[   29.883458] ==================================================================
[   29.884540] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0
[   29.885347] Write of size 1 at addr fff00000c690e00a by task kunit_try_catch/132
[   29.886198] 
[   29.886588] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.888946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.890224] Hardware name: linux,dummy-virt (DT)
[   29.890864] Call trace:
[   29.891283]  dump_backtrace+0x9c/0x128
[   29.891889]  show_stack+0x20/0x38
[   29.892400]  dump_stack_lvl+0x8c/0xd0
[   29.893909]  print_report+0x118/0x5e0
[   29.894438]  kasan_report+0xc8/0x118
[   29.895046]  __asan_report_store1_noabort+0x20/0x30
[   29.895690]  kmalloc_large_oob_right+0x28c/0x2d0
[   29.896330]  kunit_try_run_case+0x14c/0x3d0
[   29.897180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.897854]  kthread+0x24c/0x2d0
[   29.898438]  ret_from_fork+0x10/0x20
[   29.899241] 
[   29.899630] The buggy address belongs to the physical page:
[   29.900307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10690c
[   29.902064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.902852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.903742] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.904567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.905848] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.906708] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.907565] head: 0bfffe0000000002 ffffc1ffc31a4301 ffffffffffffffff 0000000000000000
[   29.908424] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.909662] page dumped because: kasan: bad access detected
[   29.910191] 
[   29.910458] Memory state around the buggy address:
[   29.910730]  fff00000c690df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.911189]  fff00000c690df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.912057] >fff00000c690e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.913404]                       ^
[   29.913967]  fff00000c690e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.914689]  fff00000c690e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.915538] ==================================================================

test log snippet boot parser 35

Home

[   31.186420] ==================================================================
[   31.187603] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8
[   31.188548] Read of size 64 at addr fff00000c680f884 by task kunit_try_catch/168
[   31.189875] 
[   31.190218] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.191033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.191508] Hardware name: linux,dummy-virt (DT)
[   31.192309] Call trace:
[   31.192779]  dump_backtrace+0x9c/0x128
[   31.193538]  show_stack+0x20/0x38
[   31.194623]  dump_stack_lvl+0x8c/0xd0
[   31.195315]  print_report+0x118/0x5e0
[   31.196092]  kasan_report+0xc8/0x118
[   31.196912]  kasan_check_range+0x100/0x1a8
[   31.197708]  __asan_memmove+0x3c/0x98
[   31.198336]  kmalloc_memmove_invalid_size+0x15c/0x2f8
[   31.198950]  kunit_try_run_case+0x14c/0x3d0
[   31.199962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.201005]  kthread+0x24c/0x2d0
[   31.201541]  ret_from_fork+0x10/0x20
[   31.202054] 
[   31.202761] Allocated by task 168:
[   31.203390]  kasan_save_stack+0x3c/0x68
[   31.204080]  kasan_save_track+0x20/0x40
[   31.205235]  kasan_save_alloc_info+0x40/0x58
[   31.205846]  __kasan_kmalloc+0xd4/0xd8
[   31.206960]  __kmalloc_cache_noprof+0x144/0x328
[   31.207801]  kmalloc_memmove_invalid_size+0xb8/0x2f8
[   31.209057]  kunit_try_run_case+0x14c/0x3d0
[   31.209646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.210286]  kthread+0x24c/0x2d0
[   31.210726]  ret_from_fork+0x10/0x20
[   31.211454] 
[   31.211749] The buggy address belongs to the object at fff00000c680f880
[   31.211749]  which belongs to the cache kmalloc-64 of size 64
[   31.213800] The buggy address is located 4 bytes inside of
[   31.213800]  allocated 64-byte region [fff00000c680f880, fff00000c680f8c0)
[   31.215224] 
[   31.215613] The buggy address belongs to the physical page:
[   31.216437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10680f
[   31.217752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.218523] page_type: f5(slab)
[   31.219133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.219957] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.220921] page dumped because: kasan: bad access detected
[   31.221778] 
[   31.222089] Memory state around the buggy address:
[   31.222628]  fff00000c680f780: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.223807]  fff00000c680f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.224876] >fff00000c680f880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.225683]                                            ^
[   31.226295]  fff00000c680f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227204]  fff00000c680f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227847] ==================================================================

test log snippet boot parser 36

Home

[   29.775448] ==================================================================
[   29.776501] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348
[   29.777549] Read of size 1 at addr fff00000c68f5000 by task kunit_try_catch/128
[   29.778481] 
[   29.778871] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.780511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.781292] Hardware name: linux,dummy-virt (DT)
[   29.781623] Call trace:
[   29.781810]  dump_backtrace+0x9c/0x128
[   29.782245]  show_stack+0x20/0x38
[   29.782810]  dump_stack_lvl+0x8c/0xd0
[   29.783950]  print_report+0x118/0x5e0
[   29.784579]  kasan_report+0xc8/0x118
[   29.785432]  __asan_report_load1_noabort+0x20/0x30
[   29.786270]  kmalloc_node_oob_right+0x310/0x348
[   29.786831]  kunit_try_run_case+0x14c/0x3d0
[   29.787515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.788182]  kthread+0x24c/0x2d0
[   29.788960]  ret_from_fork+0x10/0x20
[   29.789656] 
[   29.789998] Allocated by task 128:
[   29.790458]  kasan_save_stack+0x3c/0x68
[   29.791368]  kasan_save_track+0x20/0x40
[   29.792163]  kasan_save_alloc_info+0x40/0x58
[   29.792869]  __kasan_kmalloc+0xd4/0xd8
[   29.793491]  __kmalloc_cache_node_noprof+0x164/0x348
[   29.793923]  kmalloc_node_oob_right+0xbc/0x348
[   29.794628]  kunit_try_run_case+0x14c/0x3d0
[   29.795363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.796239]  kthread+0x24c/0x2d0
[   29.796935]  ret_from_fork+0x10/0x20
[   29.797707] 
[   29.798045] The buggy address belongs to the object at fff00000c68f4000
[   29.798045]  which belongs to the cache kmalloc-4k of size 4096
[   29.799542] The buggy address is located 0 bytes to the right of
[   29.799542]  allocated 4096-byte region [fff00000c68f4000, fff00000c68f5000)
[   29.801399] 
[   29.801797] The buggy address belongs to the physical page:
[   29.802674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f0
[   29.803637] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.804452] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.805439] page_type: f5(slab)
[   29.805933] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.806870] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   29.808322] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.809618] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   29.810523] head: 0bfffe0000000003 ffffc1ffc31a3c01 ffffffffffffffff 0000000000000000
[   29.811318] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.812127] page dumped because: kasan: bad access detected
[   29.812813] 
[   29.813537] Memory state around the buggy address:
[   29.814132]  fff00000c68f4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.814873]  fff00000c68f4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.815715] >fff00000c68f5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.816495]                    ^
[   29.817582]  fff00000c68f5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.818405]  fff00000c68f5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.819173] ==================================================================

test log snippet boot parser 37

Home

[   30.766022] ==================================================================
[   30.767282] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400
[   30.768279] Write of size 16 at addr fff00000c57c6000 by task kunit_try_catch/152
[   30.769521] 
[   30.769826] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.771108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.771866] Hardware name: linux,dummy-virt (DT)
[   30.772442] Call trace:
[   30.772937]  dump_backtrace+0x9c/0x128
[   30.773564]  show_stack+0x20/0x38
[   30.774571]  dump_stack_lvl+0x8c/0xd0
[   30.775252]  print_report+0x118/0x5e0
[   30.775809]  kasan_report+0xc8/0x118
[   30.776409]  __asan_report_store16_noabort+0x20/0x30
[   30.776947]  kmalloc_oob_16+0x3a8/0x400
[   30.778197]  kunit_try_run_case+0x14c/0x3d0
[   30.778759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.779522]  kthread+0x24c/0x2d0
[   30.780048]  ret_from_fork+0x10/0x20
[   30.780620] 
[   30.781826] Allocated by task 152:
[   30.782205]  kasan_save_stack+0x3c/0x68
[   30.782840]  kasan_save_track+0x20/0x40
[   30.783382]  kasan_save_alloc_info+0x40/0x58
[   30.784054]  __kasan_kmalloc+0xd4/0xd8
[   30.784582]  __kmalloc_cache_noprof+0x144/0x328
[   30.785751]  kmalloc_oob_16+0xb4/0x400
[   30.786273]  kunit_try_run_case+0x14c/0x3d0
[   30.786913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.787592]  kthread+0x24c/0x2d0
[   30.788171]  ret_from_fork+0x10/0x20
[   30.789316] 
[   30.790057] The buggy address belongs to the object at fff00000c57c6000
[   30.790057]  which belongs to the cache kmalloc-16 of size 16
[   30.791352] The buggy address is located 0 bytes inside of
[   30.791352]  allocated 13-byte region [fff00000c57c6000, fff00000c57c600d)
[   30.792920] 
[   30.793306] The buggy address belongs to the physical page:
[   30.793864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c6
[   30.794838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.795815] page_type: f5(slab)
[   30.796356] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.797754] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.798499] page dumped because: kasan: bad access detected
[   30.799120] 
[   30.799477] Memory state around the buggy address:
[   30.800182]  fff00000c57c5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.800915]  fff00000c57c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.801847] >fff00000c57c6000: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.803155]                       ^
[   30.803889]  fff00000c57c6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.804718]  fff00000c57c6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.805510] ==================================================================

test log snippet boot parser 38

Home

[   29.716066] ==================================================================
[   29.717428] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340
[   29.718440] Read of size 1 at addr fff00000c5764fdf by task kunit_try_catch/126
[   29.719502] 
[   29.719839] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.721267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.721970] Hardware name: linux,dummy-virt (DT)
[   29.722745] Call trace:
[   29.723300]  dump_backtrace+0x9c/0x128
[   29.723964]  show_stack+0x20/0x38
[   29.724538]  dump_stack_lvl+0x8c/0xd0
[   29.725282]  print_report+0x118/0x5e0
[   29.726381]  kasan_report+0xc8/0x118
[   29.726827]  __asan_report_load1_noabort+0x20/0x30
[   29.727550]  kmalloc_oob_left+0x308/0x340
[   29.728339]  kunit_try_run_case+0x14c/0x3d0
[   29.729332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.730047]  kthread+0x24c/0x2d0
[   29.730581]  ret_from_fork+0x10/0x20
[   29.731167] 
[   29.731466] Allocated by task 1:
[   29.732072]  kasan_save_stack+0x3c/0x68
[   29.732730]  kasan_save_track+0x20/0x40
[   29.733389]  kasan_save_alloc_info+0x40/0x58
[   29.734648]  __kasan_kmalloc+0xd4/0xd8
[   29.735347]  __kmalloc_node_track_caller_noprof+0x184/0x440
[   29.736111]  kvasprintf+0xcc/0x170
[   29.736936]  __kthread_create_on_node+0x16c/0x348
[   29.737896]  kthread_create_on_node+0xac/0xf0
[   29.738543]  create_worker+0x380/0x6b8
[   29.739066]  alloc_unbound_pwq+0x62c/0x778
[   29.739593]  apply_wqattrs_prepare+0x1a0/0x6e0
[   29.740611]  apply_workqueue_attrs_locked+0x58/0xb8
[   29.741197]  alloc_workqueue+0x99c/0x1430
[   29.742152]  latency_fsnotify_init+0x28/0x60
[   29.742825]  do_one_initcall+0xd0/0x618
[   29.743814]  kernel_init_freeable+0x3e0/0x8a0
[   29.744535]  kernel_init+0x2c/0x1f8
[   29.745521]  ret_from_fork+0x10/0x20
[   29.746156] 
[   29.746543] The buggy address belongs to the object at fff00000c5764fc0
[   29.746543]  which belongs to the cache kmalloc-16 of size 16
[   29.747755] The buggy address is located 18 bytes to the right of
[   29.747755]  allocated 13-byte region [fff00000c5764fc0, fff00000c5764fcd)
[   29.749088] 
[   29.750288] The buggy address belongs to the physical page:
[   29.750943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105764
[   29.751879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.752603] page_type: f5(slab)
[   29.753394] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.754332] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.755124] page dumped because: kasan: bad access detected
[   29.755887] 
[   29.756285] Memory state around the buggy address:
[   29.757426]  fff00000c5764e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   29.758113]  fff00000c5764f00: 00 04 fc fc fa fb fc fc 00 03 fc fc 00 03 fc fc
[   29.759503] >fff00000c5764f80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 07 fc fc
[   29.760476]                                                     ^
[   29.761232]  fff00000c5765000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.762576]  fff00000c5765080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.763325] ==================================================================

test log snippet boot parser 39

Home

[   31.036537] ==================================================================
[   31.037892] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310
[   31.038910] Write of size 8 at addr fff00000c6826971 by task kunit_try_catch/162
[   31.039675] 
[   31.040157] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.041594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.042338] Hardware name: linux,dummy-virt (DT)
[   31.043068] Call trace:
[   31.043274]  dump_backtrace+0x9c/0x128
[   31.043536]  show_stack+0x20/0x38
[   31.043763]  dump_stack_lvl+0x8c/0xd0
[   31.044076]  print_report+0x118/0x5e0
[   31.044577]  kasan_report+0xc8/0x118
[   31.045780]  kasan_check_range+0x100/0x1a8
[   31.046515]  __asan_memset+0x34/0x78
[   31.047205]  kmalloc_oob_memset_8+0x15c/0x310
[   31.047962]  kunit_try_run_case+0x14c/0x3d0
[   31.048748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.049517]  kthread+0x24c/0x2d0
[   31.050454]  ret_from_fork+0x10/0x20
[   31.051101] 
[   31.051544] Allocated by task 162:
[   31.052119]  kasan_save_stack+0x3c/0x68
[   31.052821]  kasan_save_track+0x20/0x40
[   31.053777]  kasan_save_alloc_info+0x40/0x58
[   31.054221]  __kasan_kmalloc+0xd4/0xd8
[   31.054861]  __kmalloc_cache_noprof+0x144/0x328
[   31.055573]  kmalloc_oob_memset_8+0xb0/0x310
[   31.056151]  kunit_try_run_case+0x14c/0x3d0
[   31.057048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.057824]  kthread+0x24c/0x2d0
[   31.058295]  ret_from_fork+0x10/0x20
[   31.058908] 
[   31.059313] The buggy address belongs to the object at fff00000c6826900
[   31.059313]  which belongs to the cache kmalloc-128 of size 128
[   31.060691] The buggy address is located 113 bytes inside of
[   31.060691]  allocated 120-byte region [fff00000c6826900, fff00000c6826978)
[   31.062483] 
[   31.062895] The buggy address belongs to the physical page:
[   31.063651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106826
[   31.064603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.065682] page_type: f5(slab)
[   31.066187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.067253] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.068058] page dumped because: kasan: bad access detected
[   31.069188] 
[   31.069526] Memory state around the buggy address:
[   31.070137]  fff00000c6826800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.071002]  fff00000c6826880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.071778] >fff00000c6826900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.072590]                                                                 ^
[   31.074046]  fff00000c6826980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.074859]  fff00000c6826a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.075616] ==================================================================

test log snippet boot parser 40

Home

[   31.087732] ==================================================================
[   31.089118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310
[   31.089784] Write of size 16 at addr fff00000c6826a69 by task kunit_try_catch/164
[   31.091201] 
[   31.091806] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.093141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.094012] Hardware name: linux,dummy-virt (DT)
[   31.094655] Call trace:
[   31.095099]  dump_backtrace+0x9c/0x128
[   31.095702]  show_stack+0x20/0x38
[   31.096245]  dump_stack_lvl+0x8c/0xd0
[   31.097035]  print_report+0x118/0x5e0
[   31.098561]  kasan_report+0xc8/0x118
[   31.099117]  kasan_check_range+0x100/0x1a8
[   31.099835]  __asan_memset+0x34/0x78
[   31.100470]  kmalloc_oob_memset_16+0x15c/0x310
[   31.101138]  kunit_try_run_case+0x14c/0x3d0
[   31.101805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.102518]  kthread+0x24c/0x2d0
[   31.103008]  ret_from_fork+0x10/0x20
[   31.103513] 
[   31.103841] Allocated by task 164:
[   31.104419]  kasan_save_stack+0x3c/0x68
[   31.104995]  kasan_save_track+0x20/0x40
[   31.105666]  kasan_save_alloc_info+0x40/0x58
[   31.106284]  __kasan_kmalloc+0xd4/0xd8
[   31.106939]  __kmalloc_cache_noprof+0x144/0x328
[   31.107602]  kmalloc_oob_memset_16+0xb0/0x310
[   31.108327]  kunit_try_run_case+0x14c/0x3d0
[   31.108878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.109699]  kthread+0x24c/0x2d0
[   31.110246]  ret_from_fork+0x10/0x20
[   31.110783] 
[   31.111168] The buggy address belongs to the object at fff00000c6826a00
[   31.111168]  which belongs to the cache kmalloc-128 of size 128
[   31.112497] The buggy address is located 105 bytes inside of
[   31.112497]  allocated 120-byte region [fff00000c6826a00, fff00000c6826a78)
[   31.113653] 
[   31.114076] The buggy address belongs to the physical page:
[   31.114829] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106826
[   31.115782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.116529] page_type: f5(slab)
[   31.117152] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.118059] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.118851] page dumped because: kasan: bad access detected
[   31.119549] 
[   31.119943] Memory state around the buggy address:
[   31.120584]  fff00000c6826900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.121509]  fff00000c6826980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.122245] >fff00000c6826a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.123167]                                                                 ^
[   31.123997]  fff00000c6826a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.124848]  fff00000c6826b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.125546] ==================================================================

test log snippet boot parser 41

Home

[   30.931453] ==================================================================
[   30.932807] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310
[   30.933802] Write of size 2 at addr fff00000c6826777 by task kunit_try_catch/158
[   30.934758] 
[   30.935339] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.936231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.936956] Hardware name: linux,dummy-virt (DT)
[   30.937638] Call trace:
[   30.938067]  dump_backtrace+0x9c/0x128
[   30.938560]  show_stack+0x20/0x38
[   30.939037]  dump_stack_lvl+0x8c/0xd0
[   30.940142]  print_report+0x118/0x5e0
[   30.940660]  kasan_report+0xc8/0x118
[   30.941784]  kasan_check_range+0x100/0x1a8
[   30.942264]  __asan_memset+0x34/0x78
[   30.942896]  kmalloc_oob_memset_2+0x15c/0x310
[   30.943629]  kunit_try_run_case+0x14c/0x3d0
[   30.944333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.945278]  kthread+0x24c/0x2d0
[   30.946270]  ret_from_fork+0x10/0x20
[   30.946952] 
[   30.947293] Allocated by task 158:
[   30.947718]  kasan_save_stack+0x3c/0x68
[   30.948333]  kasan_save_track+0x20/0x40
[   30.949201]  kasan_save_alloc_info+0x40/0x58
[   30.949863]  __kasan_kmalloc+0xd4/0xd8
[   30.950478]  __kmalloc_cache_noprof+0x144/0x328
[   30.951101]  kmalloc_oob_memset_2+0xb0/0x310
[   30.951748]  kunit_try_run_case+0x14c/0x3d0
[   30.952381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.953394]  kthread+0x24c/0x2d0
[   30.953894]  ret_from_fork+0x10/0x20
[   30.954413] 
[   30.954770] The buggy address belongs to the object at fff00000c6826700
[   30.954770]  which belongs to the cache kmalloc-128 of size 128
[   30.955762] The buggy address is located 119 bytes inside of
[   30.955762]  allocated 120-byte region [fff00000c6826700, fff00000c6826778)
[   30.957133] 
[   30.957916] The buggy address belongs to the physical page:
[   30.958582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106826
[   30.959385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.960207] page_type: f5(slab)
[   30.960679] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.962132] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.962905] page dumped because: kasan: bad access detected
[   30.963537] 
[   30.963872] Memory state around the buggy address:
[   30.965284]  fff00000c6826600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.966277]  fff00000c6826680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.967231] >fff00000c6826700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.968285]                                                                 ^
[   30.969310]  fff00000c6826780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.970565]  fff00000c6826800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.971718] ==================================================================

test log snippet boot parser 42

Home

[   30.982413] ==================================================================
[   30.983530] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318
[   30.984156] Write of size 4 at addr fff00000c6826875 by task kunit_try_catch/160
[   30.985073] 
[   30.985454] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.986417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.987640] Hardware name: linux,dummy-virt (DT)
[   30.988665] Call trace:
[   30.989221]  dump_backtrace+0x9c/0x128
[   30.989935]  show_stack+0x20/0x38
[   30.990625]  dump_stack_lvl+0x8c/0xd0
[   30.991184]  print_report+0x118/0x5e0
[   30.991795]  kasan_report+0xc8/0x118
[   30.992348]  kasan_check_range+0x100/0x1a8
[   30.993246]  __asan_memset+0x34/0x78
[   30.994447]  kmalloc_oob_memset_4+0x15c/0x318
[   30.995070]  kunit_try_run_case+0x14c/0x3d0
[   30.995735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.996476]  kthread+0x24c/0x2d0
[   30.997133]  ret_from_fork+0x10/0x20
[   30.998117] 
[   30.998461] Allocated by task 160:
[   30.999063]  kasan_save_stack+0x3c/0x68
[   30.999707]  kasan_save_track+0x20/0x40
[   31.000304]  kasan_save_alloc_info+0x40/0x58
[   31.001669]  __kasan_kmalloc+0xd4/0xd8
[   31.002408]  __kmalloc_cache_noprof+0x144/0x328
[   31.003085]  kmalloc_oob_memset_4+0xb0/0x318
[   31.003904]  kunit_try_run_case+0x14c/0x3d0
[   31.004463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.005474]  kthread+0x24c/0x2d0
[   31.006192]  ret_from_fork+0x10/0x20
[   31.006815] 
[   31.007171] The buggy address belongs to the object at fff00000c6826800
[   31.007171]  which belongs to the cache kmalloc-128 of size 128
[   31.008344] The buggy address is located 117 bytes inside of
[   31.008344]  allocated 120-byte region [fff00000c6826800, fff00000c6826878)
[   31.010131] 
[   31.010481] The buggy address belongs to the physical page:
[   31.012062] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106826
[   31.013141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.014208] page_type: f5(slab)
[   31.014731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.015605] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.016451] page dumped because: kasan: bad access detected
[   31.017797] 
[   31.018355] Memory state around the buggy address:
[   31.019063]  fff00000c6826700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.020067]  fff00000c6826780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.021196] >fff00000c6826800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.022069]                                                                 ^
[   31.022829]  fff00000c6826880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.023730]  fff00000c6826900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.024603] ==================================================================

test log snippet boot parser 43

Home

[   29.624539] ==================================================================
[   29.625556] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   29.626280] Write of size 1 at addr fff00000c579b878 by task kunit_try_catch/124
[   29.626914] 
[   29.627349] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.628526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.629254] Hardware name: linux,dummy-virt (DT)
[   29.629935] Call trace:
[   29.630485]  dump_backtrace+0x9c/0x128
[   29.631196]  show_stack+0x20/0x38
[   29.631804]  dump_stack_lvl+0x8c/0xd0
[   29.632462]  print_report+0x118/0x5e0
[   29.633266]  kasan_report+0xc8/0x118
[   29.633888]  __asan_report_store1_noabort+0x20/0x30
[   29.634729]  kmalloc_oob_right+0x528/0x5f0
[   29.635453]  kunit_try_run_case+0x14c/0x3d0
[   29.636238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.637210]  kthread+0x24c/0x2d0
[   29.637841]  ret_from_fork+0x10/0x20
[   29.638514] 
[   29.638882] Allocated by task 124:
[   29.639464]  kasan_save_stack+0x3c/0x68
[   29.640137]  kasan_save_track+0x20/0x40
[   29.640838]  kasan_save_alloc_info+0x40/0x58
[   29.641594]  __kasan_kmalloc+0xd4/0xd8
[   29.642275]  __kmalloc_cache_noprof+0x144/0x328
[   29.643007]  kmalloc_oob_right+0xb8/0x5f0
[   29.643656]  kunit_try_run_case+0x14c/0x3d0
[   29.644227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.645109]  kthread+0x24c/0x2d0
[   29.645741]  ret_from_fork+0x10/0x20
[   29.646377] 
[   29.646744] The buggy address belongs to the object at fff00000c579b800
[   29.646744]  which belongs to the cache kmalloc-128 of size 128
[   29.647819] The buggy address is located 5 bytes to the right of
[   29.647819]  allocated 115-byte region [fff00000c579b800, fff00000c579b873)
[   29.649097] 
[   29.649706] The buggy address belongs to the physical page:
[   29.650434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10579b
[   29.651316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.652873] page_type: f5(slab)
[   29.653752] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.654429] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.655385] page dumped because: kasan: bad access detected
[   29.656068] 
[   29.656438] Memory state around the buggy address:
[   29.656992]  fff00000c579b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.658216]  fff00000c579b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.659040] >fff00000c579b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.659744]                                                                 ^
[   29.660647]  fff00000c579b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.661960]  fff00000c579b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.662607] ==================================================================

test log snippet boot parser 44

Home

[   29.663996] ==================================================================
[   29.664740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   29.665425] Read of size 1 at addr fff00000c579b880 by task kunit_try_catch/124
[   29.667268] 
[   29.668049] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.669844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.670540] Hardware name: linux,dummy-virt (DT)
[   29.671125] Call trace:
[   29.671607]  dump_backtrace+0x9c/0x128
[   29.672261]  show_stack+0x20/0x38
[   29.673015]  dump_stack_lvl+0x8c/0xd0
[   29.673951]  print_report+0x118/0x5e0
[   29.674964]  kasan_report+0xc8/0x118
[   29.675648]  __asan_report_load1_noabort+0x20/0x30
[   29.676117]  kmalloc_oob_right+0x588/0x5f0
[   29.676963]  kunit_try_run_case+0x14c/0x3d0
[   29.677542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.678334]  kthread+0x24c/0x2d0
[   29.678937]  ret_from_fork+0x10/0x20
[   29.679506] 
[   29.679863] Allocated by task 124:
[   29.680420]  kasan_save_stack+0x3c/0x68
[   29.681141]  kasan_save_track+0x20/0x40
[   29.682719]  kasan_save_alloc_info+0x40/0x58
[   29.683563]  __kasan_kmalloc+0xd4/0xd8
[   29.684357]  __kmalloc_cache_noprof+0x144/0x328
[   29.684965]  kmalloc_oob_right+0xb8/0x5f0
[   29.685527]  kunit_try_run_case+0x14c/0x3d0
[   29.686221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.687034]  kthread+0x24c/0x2d0
[   29.688045]  ret_from_fork+0x10/0x20
[   29.688522] 
[   29.689558] The buggy address belongs to the object at fff00000c579b800
[   29.689558]  which belongs to the cache kmalloc-128 of size 128
[   29.690951] The buggy address is located 13 bytes to the right of
[   29.690951]  allocated 115-byte region [fff00000c579b800, fff00000c579b873)
[   29.692166] 
[   29.692509] The buggy address belongs to the physical page:
[   29.693679] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10579b
[   29.694462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.695235] page_type: f5(slab)
[   29.695796] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.696590] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.697476] page dumped because: kasan: bad access detected
[   29.698020] 
[   29.698370] Memory state around the buggy address:
[   29.698946]  fff00000c579b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.699760]  fff00000c579b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.700577] >fff00000c579b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.701898]                    ^
[   29.702775]  fff00000c579b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.703448]  fff00000c579b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.704321] ==================================================================

test log snippet boot parser 45

Home

[   29.571592] ==================================================================
[   29.573172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   29.576202] Write of size 1 at addr fff00000c579b873 by task kunit_try_catch/124
[   29.577837] 
[   29.579891] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   29.581294] Tainted: [N]=TEST
[   29.582098] Hardware name: linux,dummy-virt (DT)
[   29.583205] Call trace:
[   29.583615]  dump_backtrace+0x9c/0x128
[   29.584230]  show_stack+0x20/0x38
[   29.585188]  dump_stack_lvl+0x8c/0xd0
[   29.585781]  print_report+0x118/0x5e0
[   29.586382]  kasan_report+0xc8/0x118
[   29.586875]  __asan_report_store1_noabort+0x20/0x30
[   29.587605]  kmalloc_oob_right+0x56c/0x5f0
[   29.588195]  kunit_try_run_case+0x14c/0x3d0
[   29.588854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.589575]  kthread+0x24c/0x2d0
[   29.590765]  ret_from_fork+0x10/0x20
[   29.591536] 
[   29.591937] Allocated by task 124:
[   29.592726]  kasan_save_stack+0x3c/0x68
[   29.593400]  kasan_save_track+0x20/0x40
[   29.594048]  kasan_save_alloc_info+0x40/0x58
[   29.594676]  __kasan_kmalloc+0xd4/0xd8
[   29.595707]  __kmalloc_cache_noprof+0x144/0x328
[   29.596348]  kmalloc_oob_right+0xb8/0x5f0
[   29.597279]  kunit_try_run_case+0x14c/0x3d0
[   29.597855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.598797]  kthread+0x24c/0x2d0
[   29.599291]  ret_from_fork+0x10/0x20
[   29.599852] 
[   29.600329] The buggy address belongs to the object at fff00000c579b800
[   29.600329]  which belongs to the cache kmalloc-128 of size 128
[   29.601748] The buggy address is located 0 bytes to the right of
[   29.601748]  allocated 115-byte region [fff00000c579b800, fff00000c579b873)
[   29.603895] 
[   29.604506] The buggy address belongs to the physical page:
[   29.606099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10579b
[   29.607138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.608527] page_type: f5(slab)
[   29.610036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.611343] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.612423] page dumped because: kasan: bad access detected
[   29.613413] 
[   29.613825] Memory state around the buggy address:
[   29.615037]  fff00000c579b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.615867]  fff00000c579b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.616719] >fff00000c579b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.617507]                                                              ^
[   29.618528]  fff00000c579b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.619428]  fff00000c579b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.620329] ==================================================================

test log snippet boot parser 46

Home

[   32.019582] ==================================================================
[   32.020932] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440
[   32.022006] Read of size 1 at addr fff00000c68100c8 by task kunit_try_catch/193
[   32.023571] 
[   32.024027] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.025507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.026016] Hardware name: linux,dummy-virt (DT)
[   32.027044] Call trace:
[   32.027458]  dump_backtrace+0x9c/0x128
[   32.027970]  show_stack+0x20/0x38
[   32.028472]  dump_stack_lvl+0x8c/0xd0
[   32.029649]  print_report+0x118/0x5e0
[   32.030421]  kasan_report+0xc8/0x118
[   32.031179]  __asan_report_load1_noabort+0x20/0x30
[   32.032040]  kmem_cache_oob+0x350/0x440
[   32.033408]  kunit_try_run_case+0x14c/0x3d0
[   32.034352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.034681]  kthread+0x24c/0x2d0
[   32.034908]  ret_from_fork+0x10/0x20
[   32.035313] 
[   32.035758] Allocated by task 193:
[   32.036426]  kasan_save_stack+0x3c/0x68
[   32.037595]  kasan_save_track+0x20/0x40
[   32.038235]  kasan_save_alloc_info+0x40/0x58
[   32.038923]  __kasan_slab_alloc+0xa8/0xb0
[   32.039603]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.040271]  kmem_cache_oob+0x130/0x440
[   32.041152]  kunit_try_run_case+0x14c/0x3d0
[   32.041651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.042383]  kthread+0x24c/0x2d0
[   32.042814]  ret_from_fork+0x10/0x20
[   32.043442] 
[   32.043966] The buggy address belongs to the object at fff00000c6810000
[   32.043966]  which belongs to the cache test_cache of size 200
[   32.045915] The buggy address is located 0 bytes to the right of
[   32.045915]  allocated 200-byte region [fff00000c6810000, fff00000c68100c8)
[   32.047437] 
[   32.047894] The buggy address belongs to the physical page:
[   32.048968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106810
[   32.050264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.050957] page_type: f5(slab)
[   32.051606] raw: 0bfffe0000000000 fff00000c6812000 dead000000000122 0000000000000000
[   32.052595] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.053886] page dumped because: kasan: bad access detected
[   32.054800] 
[   32.055349] Memory state around the buggy address:
[   32.055916]  fff00000c680ff80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.057178]  fff00000c6810000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.058483] >fff00000c6810080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.059626]                                               ^
[   32.060302]  fff00000c6810100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.061484]  fff00000c6810180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.062085] ==================================================================

test log snippet boot parser 47

Home

[   30.254687] ==================================================================
[   30.255454] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   30.256268] Write of size 1 at addr fff00000c5f206da by task kunit_try_catch/144
[   30.258282] 
[   30.258687] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.259671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.260279] Hardware name: linux,dummy-virt (DT)
[   30.260811] Call trace:
[   30.261276]  dump_backtrace+0x9c/0x128
[   30.261904]  show_stack+0x20/0x38
[   30.262495]  dump_stack_lvl+0x8c/0xd0
[   30.262958]  print_report+0x118/0x5e0
[   30.263569]  kasan_report+0xc8/0x118
[   30.264172]  __asan_report_store1_noabort+0x20/0x30
[   30.264794]  krealloc_less_oob_helper+0xa54/0xbc8
[   30.265512]  krealloc_less_oob+0x20/0x38
[   30.266045]  kunit_try_run_case+0x14c/0x3d0
[   30.266692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.267384]  kthread+0x24c/0x2d0
[   30.267948]  ret_from_fork+0x10/0x20
[   30.268470] 
[   30.268826] Allocated by task 144:
[   30.269386]  kasan_save_stack+0x3c/0x68
[   30.270043]  kasan_save_track+0x20/0x40
[   30.270615]  kasan_save_alloc_info+0x40/0x58
[   30.271193]  __kasan_krealloc+0x118/0x178
[   30.271833]  krealloc_noprof+0x10c/0x1a0
[   30.272373]  krealloc_less_oob_helper+0x170/0xbc8
[   30.273075]  krealloc_less_oob+0x20/0x38
[   30.273614]  kunit_try_run_case+0x14c/0x3d0
[   30.274275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.274911]  kthread+0x24c/0x2d0
[   30.275457]  ret_from_fork+0x10/0x20
[   30.276027] 
[   30.276391] The buggy address belongs to the object at fff00000c5f20600
[   30.276391]  which belongs to the cache kmalloc-256 of size 256
[   30.277581] The buggy address is located 17 bytes to the right of
[   30.277581]  allocated 201-byte region [fff00000c5f20600, fff00000c5f206c9)
[   30.278847] 
[   30.279233] The buggy address belongs to the physical page:
[   30.279951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.280853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.281634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.282542] page_type: f5(slab)
[   30.283050] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.283916] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.284769] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.285562] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.286516] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.287284] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.288200] page dumped because: kasan: bad access detected
[   30.288732] 
[   30.289109] Memory state around the buggy address:
[   30.289727]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.290580]  fff00000c5f20600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.291402] >fff00000c5f20680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.292205]                                                     ^
[   30.292885]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.293641]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.294516] ==================================================================

test log snippet boot parser 48

Home

[   30.297845] ==================================================================
[   30.298803] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   30.299710] Write of size 1 at addr fff00000c5f206ea by task kunit_try_catch/144
[   30.300830] 
[   30.301252] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.301726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.301963] Hardware name: linux,dummy-virt (DT)
[   30.302589] Call trace:
[   30.303066]  dump_backtrace+0x9c/0x128
[   30.303748]  show_stack+0x20/0x38
[   30.304232]  dump_stack_lvl+0x8c/0xd0
[   30.304717]  print_report+0x118/0x5e0
[   30.305329]  kasan_report+0xc8/0x118
[   30.305821]  __asan_report_store1_noabort+0x20/0x30
[   30.306541]  krealloc_less_oob_helper+0xa98/0xbc8
[   30.307249]  krealloc_less_oob+0x20/0x38
[   30.307782]  kunit_try_run_case+0x14c/0x3d0
[   30.308457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.309084]  kthread+0x24c/0x2d0
[   30.309671]  ret_from_fork+0x10/0x20
[   30.310283] 
[   30.310645] Allocated by task 144:
[   30.311145]  kasan_save_stack+0x3c/0x68
[   30.311764]  kasan_save_track+0x20/0x40
[   30.312271]  kasan_save_alloc_info+0x40/0x58
[   30.312924]  __kasan_krealloc+0x118/0x178
[   30.313517]  krealloc_noprof+0x10c/0x1a0
[   30.314062]  krealloc_less_oob_helper+0x170/0xbc8
[   30.314661]  krealloc_less_oob+0x20/0x38
[   30.315290]  kunit_try_run_case+0x14c/0x3d0
[   30.315930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.316701]  kthread+0x24c/0x2d0
[   30.317247]  ret_from_fork+0x10/0x20
[   30.317817] 
[   30.318204] The buggy address belongs to the object at fff00000c5f20600
[   30.318204]  which belongs to the cache kmalloc-256 of size 256
[   30.319454] The buggy address is located 33 bytes to the right of
[   30.319454]  allocated 201-byte region [fff00000c5f20600, fff00000c5f206c9)
[   30.320623] 
[   30.321010] The buggy address belongs to the physical page:
[   30.321738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.322555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.323293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.324207] page_type: f5(slab)
[   30.324760] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.325458] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.326452] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.327417] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.328293] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.329222] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.330016] page dumped because: kasan: bad access detected
[   30.330748] 
[   30.331062] Memory state around the buggy address:
[   30.331725]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.332466]  fff00000c5f20600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.333248] >fff00000c5f20680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.334053]                                                           ^
[   30.334684]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.335568]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.336303] ==================================================================

test log snippet boot parser 49

Home

[   30.610081] ==================================================================
[   30.610914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   30.612271] Write of size 1 at addr fff00000c69860eb by task kunit_try_catch/148
[   30.613296] 
[   30.613740] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.614744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.615387] Hardware name: linux,dummy-virt (DT)
[   30.616094] Call trace:
[   30.616474]  dump_backtrace+0x9c/0x128
[   30.617167]  show_stack+0x20/0x38
[   30.617709]  dump_stack_lvl+0x8c/0xd0
[   30.618418]  print_report+0x118/0x5e0
[   30.618922]  kasan_report+0xc8/0x118
[   30.619577]  __asan_report_store1_noabort+0x20/0x30
[   30.620249]  krealloc_less_oob_helper+0xa3c/0xbc8
[   30.621011]  krealloc_large_less_oob+0x20/0x38
[   30.621730]  kunit_try_run_case+0x14c/0x3d0
[   30.622346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.623148]  kthread+0x24c/0x2d0
[   30.623746]  ret_from_fork+0x10/0x20
[   30.624312] 
[   30.624675] The buggy address belongs to the physical page:
[   30.625285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.626358] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.627255] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.628351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.629311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.630277] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.631204] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.632178] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.632969] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.633852] page dumped because: kasan: bad access detected
[   30.634672] 
[   30.635081] Memory state around the buggy address:
[   30.635820]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.636667]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.637569] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.638415]                                                           ^
[   30.639255]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.640140]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.641007] ==================================================================

test log snippet boot parser 50

Home

[   30.338511] ==================================================================
[   30.340083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   30.340911] Write of size 1 at addr fff00000c5f206eb by task kunit_try_catch/144
[   30.341807] 
[   30.342222] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.343269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.343861] Hardware name: linux,dummy-virt (DT)
[   30.344454] Call trace:
[   30.345030]  dump_backtrace+0x9c/0x128
[   30.345675]  show_stack+0x20/0x38
[   30.346329]  dump_stack_lvl+0x8c/0xd0
[   30.346924]  print_report+0x118/0x5e0
[   30.347525]  kasan_report+0xc8/0x118
[   30.348103]  __asan_report_store1_noabort+0x20/0x30
[   30.348810]  krealloc_less_oob_helper+0xa3c/0xbc8
[   30.349479]  krealloc_less_oob+0x20/0x38
[   30.350034]  kunit_try_run_case+0x14c/0x3d0
[   30.350760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.351475]  kthread+0x24c/0x2d0
[   30.352100]  ret_from_fork+0x10/0x20
[   30.352602] 
[   30.353015] Allocated by task 144:
[   30.353570]  kasan_save_stack+0x3c/0x68
[   30.354167]  kasan_save_track+0x20/0x40
[   30.354820]  kasan_save_alloc_info+0x40/0x58
[   30.355524]  __kasan_krealloc+0x118/0x178
[   30.356198]  krealloc_noprof+0x10c/0x1a0
[   30.356768]  krealloc_less_oob_helper+0x170/0xbc8
[   30.357526]  krealloc_less_oob+0x20/0x38
[   30.358103]  kunit_try_run_case+0x14c/0x3d0
[   30.358797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.359497]  kthread+0x24c/0x2d0
[   30.360109]  ret_from_fork+0x10/0x20
[   30.360711] 
[   30.361113] The buggy address belongs to the object at fff00000c5f20600
[   30.361113]  which belongs to the cache kmalloc-256 of size 256
[   30.362361] The buggy address is located 34 bytes to the right of
[   30.362361]  allocated 201-byte region [fff00000c5f20600, fff00000c5f206c9)
[   30.363688] 
[   30.364121] The buggy address belongs to the physical page:
[   30.364753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.365727] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.366623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.367531] page_type: f5(slab)
[   30.368102] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.368868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.369815] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.370747] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.371692] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.372587] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.373440] page dumped because: kasan: bad access detected
[   30.374128] 
[   30.374467] Memory state around the buggy address:
[   30.375194]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.376001]  fff00000c5f20600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.376829] >fff00000c5f20680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.377701]                                                           ^
[   30.378463]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.379331]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.380109] ==================================================================

test log snippet boot parser 51

Home

[   30.505830] ==================================================================
[   30.506411] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   30.506775] Write of size 1 at addr fff00000c69860d0 by task kunit_try_catch/148
[   30.507282] 
[   30.507810] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.508894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.509511] Hardware name: linux,dummy-virt (DT)
[   30.510683] Call trace:
[   30.511174]  dump_backtrace+0x9c/0x128
[   30.511847]  show_stack+0x20/0x38
[   30.512537]  dump_stack_lvl+0x8c/0xd0
[   30.513542]  print_report+0x118/0x5e0
[   30.514072]  kasan_report+0xc8/0x118
[   30.514634]  __asan_report_store1_noabort+0x20/0x30
[   30.515274]  krealloc_less_oob_helper+0xb20/0xbc8
[   30.515876]  krealloc_large_less_oob+0x20/0x38
[   30.516579]  kunit_try_run_case+0x14c/0x3d0
[   30.517248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.518292]  kthread+0x24c/0x2d0
[   30.518855]  ret_from_fork+0x10/0x20
[   30.519459] 
[   30.519776] The buggy address belongs to the physical page:
[   30.520447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.521552] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.522393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.523351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.524304] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.526082] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.526954] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.527809] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.529069] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.529908] page dumped because: kasan: bad access detected
[   30.530405] 
[   30.530761] Memory state around the buggy address:
[   30.531371]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.532068]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.533486] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.534316]                                                  ^
[   30.535416]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.536169]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.537367] ==================================================================

test log snippet boot parser 52

Home

[   30.207101] ==================================================================
[   30.207836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   30.208732] Write of size 1 at addr fff00000c5f206d0 by task kunit_try_catch/144
[   30.209360] 
[   30.209763] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.210684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.211763] Hardware name: linux,dummy-virt (DT)
[   30.212357] Call trace:
[   30.213303]  dump_backtrace+0x9c/0x128
[   30.213851]  show_stack+0x20/0x38
[   30.214473]  dump_stack_lvl+0x8c/0xd0
[   30.215057]  print_report+0x118/0x5e0
[   30.215687]  kasan_report+0xc8/0x118
[   30.216258]  __asan_report_store1_noabort+0x20/0x30
[   30.217318]  krealloc_less_oob_helper+0xb20/0xbc8
[   30.218089]  krealloc_less_oob+0x20/0x38
[   30.218709]  kunit_try_run_case+0x14c/0x3d0
[   30.219329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.220035]  kthread+0x24c/0x2d0
[   30.220609]  ret_from_fork+0x10/0x20
[   30.221603] 
[   30.222018] Allocated by task 144:
[   30.222530]  kasan_save_stack+0x3c/0x68
[   30.223116]  kasan_save_track+0x20/0x40
[   30.223731]  kasan_save_alloc_info+0x40/0x58
[   30.224452]  __kasan_krealloc+0x118/0x178
[   30.225549]  krealloc_noprof+0x10c/0x1a0
[   30.226251]  krealloc_less_oob_helper+0x170/0xbc8
[   30.226878]  krealloc_less_oob+0x20/0x38
[   30.227539]  kunit_try_run_case+0x14c/0x3d0
[   30.228309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.229529]  kthread+0x24c/0x2d0
[   30.230290]  ret_from_fork+0x10/0x20
[   30.231103] 
[   30.231500] The buggy address belongs to the object at fff00000c5f20600
[   30.231500]  which belongs to the cache kmalloc-256 of size 256
[   30.233561] The buggy address is located 7 bytes to the right of
[   30.233561]  allocated 201-byte region [fff00000c5f20600, fff00000c5f206c9)
[   30.234829] 
[   30.235164] The buggy address belongs to the physical page:
[   30.235725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.236779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.237876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.238670] page_type: f5(slab)
[   30.239189] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.240063] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.241201] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.242079] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.242946] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.243796] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.245637] page dumped because: kasan: bad access detected
[   30.246183] 
[   30.246530] Memory state around the buggy address:
[   30.247085]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.247937]  fff00000c5f20600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.249010] >fff00000c5f20680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.249886]                                                  ^
[   30.250579]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.251421]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.252175] ==================================================================

test log snippet boot parser 53

Home

[   30.539594] ==================================================================
[   30.540398] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   30.541605] Write of size 1 at addr fff00000c69860da by task kunit_try_catch/148
[   30.542517] 
[   30.542864] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.544274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.545057] Hardware name: linux,dummy-virt (DT)
[   30.545725] Call trace:
[   30.546230]  dump_backtrace+0x9c/0x128
[   30.546907]  show_stack+0x20/0x38
[   30.547557]  dump_stack_lvl+0x8c/0xd0
[   30.548175]  print_report+0x118/0x5e0
[   30.548703]  kasan_report+0xc8/0x118
[   30.549346]  __asan_report_store1_noabort+0x20/0x30
[   30.550121]  krealloc_less_oob_helper+0xa54/0xbc8
[   30.551001]  krealloc_large_less_oob+0x20/0x38
[   30.551784]  kunit_try_run_case+0x14c/0x3d0
[   30.552574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.553482]  kthread+0x24c/0x2d0
[   30.554216]  ret_from_fork+0x10/0x20
[   30.554970] 
[   30.555510] The buggy address belongs to the physical page:
[   30.556207] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.557101] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.557909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.559243] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.560302] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.561402] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.562483] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.563565] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.564673] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.565726] page dumped because: kasan: bad access detected
[   30.566607] 
[   30.567141] Memory state around the buggy address:
[   30.567658]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.568440]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.569571] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.570566]                                                     ^
[   30.571526]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.572547]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.573582] ==================================================================

test log snippet boot parser 54

Home

[   30.157879] ==================================================================
[   30.158931] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   30.159733] Write of size 1 at addr fff00000c5f206c9 by task kunit_try_catch/144
[   30.160582] 
[   30.161520] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.162839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.163303] Hardware name: linux,dummy-virt (DT)
[   30.163944] Call trace:
[   30.164389]  dump_backtrace+0x9c/0x128
[   30.165445]  show_stack+0x20/0x38
[   30.166034]  dump_stack_lvl+0x8c/0xd0
[   30.166557]  print_report+0x118/0x5e0
[   30.167394]  kasan_report+0xc8/0x118
[   30.167952]  __asan_report_store1_noabort+0x20/0x30
[   30.168965]  krealloc_less_oob_helper+0xa2c/0xbc8
[   30.169586]  krealloc_less_oob+0x20/0x38
[   30.170144]  kunit_try_run_case+0x14c/0x3d0
[   30.170725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.171417]  kthread+0x24c/0x2d0
[   30.171911]  ret_from_fork+0x10/0x20
[   30.172542] 
[   30.173199] Allocated by task 144:
[   30.173759]  kasan_save_stack+0x3c/0x68
[   30.174357]  kasan_save_track+0x20/0x40
[   30.174892]  kasan_save_alloc_info+0x40/0x58
[   30.175563]  __kasan_krealloc+0x118/0x178
[   30.176132]  krealloc_noprof+0x10c/0x1a0
[   30.177791]  krealloc_less_oob_helper+0x170/0xbc8
[   30.178392]  krealloc_less_oob+0x20/0x38
[   30.179023]  kunit_try_run_case+0x14c/0x3d0
[   30.179539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.180613]  kthread+0x24c/0x2d0
[   30.181437]  ret_from_fork+0x10/0x20
[   30.182065] 
[   30.182415] The buggy address belongs to the object at fff00000c5f20600
[   30.182415]  which belongs to the cache kmalloc-256 of size 256
[   30.183451] The buggy address is located 0 bytes to the right of
[   30.183451]  allocated 201-byte region [fff00000c5f20600, fff00000c5f206c9)
[   30.184765] 
[   30.185754] The buggy address belongs to the physical page:
[   30.186492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.187363] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.188109] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.189322] page_type: f5(slab)
[   30.189775] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.190656] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.191532] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.192397] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.193635] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.194671] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.195680] page dumped because: kasan: bad access detected
[   30.196525] 
[   30.196920] Memory state around the buggy address:
[   30.197435]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.198342]  fff00000c5f20600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.199761] >fff00000c5f20680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.200612]                                               ^
[   30.201600]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.202664]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.203652] ==================================================================

test log snippet boot parser 55

Home

[   30.468184] ==================================================================
[   30.469356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   30.470559] Write of size 1 at addr fff00000c69860c9 by task kunit_try_catch/148
[   30.471672] 
[   30.472079] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.473734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.474521] Hardware name: linux,dummy-virt (DT)
[   30.475129] Call trace:
[   30.475832]  dump_backtrace+0x9c/0x128
[   30.476614]  show_stack+0x20/0x38
[   30.477414]  dump_stack_lvl+0x8c/0xd0
[   30.478058]  print_report+0x118/0x5e0
[   30.478666]  kasan_report+0xc8/0x118
[   30.479267]  __asan_report_store1_noabort+0x20/0x30
[   30.480059]  krealloc_less_oob_helper+0xa2c/0xbc8
[   30.480940]  krealloc_large_less_oob+0x20/0x38
[   30.481867]  kunit_try_run_case+0x14c/0x3d0
[   30.482652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.483306]  kthread+0x24c/0x2d0
[   30.483766]  ret_from_fork+0x10/0x20
[   30.485225] 
[   30.485522] The buggy address belongs to the physical page:
[   30.486130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.487070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.487891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.488733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.490192] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.491062] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.492085] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.493197] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.494192] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.494557] page dumped because: kasan: bad access detected
[   30.494837] 
[   30.495011] Memory state around the buggy address:
[   30.495520]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.496430]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.497718] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.498670]                                               ^
[   30.499562]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.500485]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.501492] ==================================================================

test log snippet boot parser 56

Home

[   30.575838] ==================================================================
[   30.576606] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   30.577836] Write of size 1 at addr fff00000c69860ea by task kunit_try_catch/148
[   30.578806] 
[   30.579287] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.580474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.581058] Hardware name: linux,dummy-virt (DT)
[   30.582459] Call trace:
[   30.583015]  dump_backtrace+0x9c/0x128
[   30.583793]  show_stack+0x20/0x38
[   30.584442]  dump_stack_lvl+0x8c/0xd0
[   30.585363]  print_report+0x118/0x5e0
[   30.586045]  kasan_report+0xc8/0x118
[   30.586581]  __asan_report_store1_noabort+0x20/0x30
[   30.587436]  krealloc_less_oob_helper+0xa98/0xbc8
[   30.588147]  krealloc_large_less_oob+0x20/0x38
[   30.588716]  kunit_try_run_case+0x14c/0x3d0
[   30.589676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.590649]  kthread+0x24c/0x2d0
[   30.591239]  ret_from_fork+0x10/0x20
[   30.591506] 
[   30.591658] The buggy address belongs to the physical page:
[   30.591932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.592659] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.594137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.595122] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.595499] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.595861] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.597267] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.598401] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.599060] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.599766] page dumped because: kasan: bad access detected
[   30.600601] 
[   30.601052] Memory state around the buggy address:
[   30.601884]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.602914]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.603885] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.604631]                                                           ^
[   30.605678]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.606708]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.607696] ==================================================================

test log snippet boot parser 57

Home

[   30.425755] ==================================================================
[   30.427075] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   30.427863] Write of size 1 at addr fff00000c69860f0 by task kunit_try_catch/146
[   30.429251] 
[   30.429690] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.430750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.431371] Hardware name: linux,dummy-virt (DT)
[   30.432165] Call trace:
[   30.432556]  dump_backtrace+0x9c/0x128
[   30.433189]  show_stack+0x20/0x38
[   30.434094]  dump_stack_lvl+0x8c/0xd0
[   30.434761]  print_report+0x118/0x5e0
[   30.435428]  kasan_report+0xc8/0x118
[   30.436088]  __asan_report_store1_noabort+0x20/0x30
[   30.436901]  krealloc_more_oob_helper+0x5dc/0x690
[   30.437567]  krealloc_large_more_oob+0x20/0x38
[   30.437959]  kunit_try_run_case+0x14c/0x3d0
[   30.438700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.439455]  kthread+0x24c/0x2d0
[   30.440052]  ret_from_fork+0x10/0x20
[   30.440766] 
[   30.441639] The buggy address belongs to the physical page:
[   30.442506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.443237] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.444549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.445453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.446405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.447269] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.448105] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.449018] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.450089] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.451351] page dumped because: kasan: bad access detected
[   30.452181] 
[   30.452486] Memory state around the buggy address:
[   30.453184]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.454172]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.454802] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.455740]                                                              ^
[   30.456501]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.457540]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.458446] ==================================================================

test log snippet boot parser 58

Home

[   30.392114] ==================================================================
[   30.393479] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   30.394240] Write of size 1 at addr fff00000c69860eb by task kunit_try_catch/146
[   30.395081] 
[   30.395519] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.396716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.397775] Hardware name: linux,dummy-virt (DT)
[   30.398430] Call trace:
[   30.398962]  dump_backtrace+0x9c/0x128
[   30.399543]  show_stack+0x20/0x38
[   30.400218]  dump_stack_lvl+0x8c/0xd0
[   30.401164]  print_report+0x118/0x5e0
[   30.401715]  kasan_report+0xc8/0x118
[   30.402410]  __asan_report_store1_noabort+0x20/0x30
[   30.403086]  krealloc_more_oob_helper+0x628/0x690
[   30.403903]  krealloc_large_more_oob+0x20/0x38
[   30.404602]  kunit_try_run_case+0x14c/0x3d0
[   30.405458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.406182]  kthread+0x24c/0x2d0
[   30.406754]  ret_from_fork+0x10/0x20
[   30.407350] 
[   30.407758] The buggy address belongs to the physical page:
[   30.408455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106984
[   30.409747] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.410703] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.411443] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.411829] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.412435] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.413822] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.414685] head: 0bfffe0000000002 ffffc1ffc31a6101 ffffffffffffffff 0000000000000000
[   30.415566] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.416541] page dumped because: kasan: bad access detected
[   30.417522] 
[   30.417924] Memory state around the buggy address:
[   30.418630]  fff00000c6985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.419436]  fff00000c6986000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.420310] >fff00000c6986080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.421056]                                                           ^
[   30.421896]  fff00000c6986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.422660]  fff00000c6986180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.423768] ==================================================================

test log snippet boot parser 59

Home

[   30.101645] ==================================================================
[   30.102342] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   30.103138] Write of size 1 at addr fff00000c5f204f0 by task kunit_try_catch/142
[   30.103792] 
[   30.104200] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.105374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.105824] Hardware name: linux,dummy-virt (DT)
[   30.106485] Call trace:
[   30.107512]  dump_backtrace+0x9c/0x128
[   30.108123]  show_stack+0x20/0x38
[   30.109083]  dump_stack_lvl+0x8c/0xd0
[   30.109903]  print_report+0x118/0x5e0
[   30.110733]  kasan_report+0xc8/0x118
[   30.111285]  __asan_report_store1_noabort+0x20/0x30
[   30.111921]  krealloc_more_oob_helper+0x5dc/0x690
[   30.112965]  krealloc_more_oob+0x20/0x38
[   30.113869]  kunit_try_run_case+0x14c/0x3d0
[   30.114598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.115284]  kthread+0x24c/0x2d0
[   30.115888]  ret_from_fork+0x10/0x20
[   30.116771] 
[   30.117416] Allocated by task 142:
[   30.118085]  kasan_save_stack+0x3c/0x68
[   30.118844]  kasan_save_track+0x20/0x40
[   30.119448]  kasan_save_alloc_info+0x40/0x58
[   30.120352]  __kasan_krealloc+0x118/0x178
[   30.121264]  krealloc_noprof+0x10c/0x1a0
[   30.122076]  krealloc_more_oob_helper+0x170/0x690
[   30.123147]  krealloc_more_oob+0x20/0x38
[   30.123673]  kunit_try_run_case+0x14c/0x3d0
[   30.124251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.125244]  kthread+0x24c/0x2d0
[   30.126023]  ret_from_fork+0x10/0x20
[   30.126681] 
[   30.127106] The buggy address belongs to the object at fff00000c5f20400
[   30.127106]  which belongs to the cache kmalloc-256 of size 256
[   30.127799] The buggy address is located 5 bytes to the right of
[   30.127799]  allocated 235-byte region [fff00000c5f20400, fff00000c5f204eb)
[   30.129824] 
[   30.130296] The buggy address belongs to the physical page:
[   30.131066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.131463] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.131816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.132406] page_type: f5(slab)
[   30.133475] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.134307] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.135159] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.136148] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.137225] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.137997] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.138812] page dumped because: kasan: bad access detected
[   30.139507] 
[   30.139822] Memory state around the buggy address:
[   30.140535]  fff00000c5f20380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.141487]  fff00000c5f20400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.142785] >fff00000c5f20480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.143992]                                                              ^
[   30.144712]  fff00000c5f20500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.145951]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.146690] ==================================================================

test log snippet boot parser 60

Home

[   30.054736] ==================================================================
[   30.055965] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   30.057037] Write of size 1 at addr fff00000c5f204eb by task kunit_try_catch/142
[   30.058394] 
[   30.058779] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.059787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.060607] Hardware name: linux,dummy-virt (DT)
[   30.061548] Call trace:
[   30.062385]  dump_backtrace+0x9c/0x128
[   30.063060]  show_stack+0x20/0x38
[   30.063661]  dump_stack_lvl+0x8c/0xd0
[   30.064163]  print_report+0x118/0x5e0
[   30.064428]  kasan_report+0xc8/0x118
[   30.064735]  __asan_report_store1_noabort+0x20/0x30
[   30.065967]  krealloc_more_oob_helper+0x628/0x690
[   30.066692]  krealloc_more_oob+0x20/0x38
[   30.067283]  kunit_try_run_case+0x14c/0x3d0
[   30.067638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.067942]  kthread+0x24c/0x2d0
[   30.068373]  ret_from_fork+0x10/0x20
[   30.069226] 
[   30.069619] Allocated by task 142:
[   30.070194]  kasan_save_stack+0x3c/0x68
[   30.070848]  kasan_save_track+0x20/0x40
[   30.071518]  kasan_save_alloc_info+0x40/0x58
[   30.072211]  __kasan_krealloc+0x118/0x178
[   30.072940]  krealloc_noprof+0x10c/0x1a0
[   30.074045]  krealloc_more_oob_helper+0x170/0x690
[   30.074762]  krealloc_more_oob+0x20/0x38
[   30.075401]  kunit_try_run_case+0x14c/0x3d0
[   30.076063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.077387]  kthread+0x24c/0x2d0
[   30.077948]  ret_from_fork+0x10/0x20
[   30.078429] 
[   30.078789] The buggy address belongs to the object at fff00000c5f20400
[   30.078789]  which belongs to the cache kmalloc-256 of size 256
[   30.079961] The buggy address is located 0 bytes to the right of
[   30.079961]  allocated 235-byte region [fff00000c5f20400, fff00000c5f204eb)
[   30.081318] 
[   30.081689] The buggy address belongs to the physical page:
[   30.082415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.083149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.084088] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.084757] page_type: f5(slab)
[   30.085613] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.086584] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.087650] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.088711] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.089600] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.090494] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.091254] page dumped because: kasan: bad access detected
[   30.091899] 
[   30.092276] Memory state around the buggy address:
[   30.092840]  fff00000c5f20380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094075]  fff00000c5f20400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.095393] >fff00000c5f20480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.096422]                                                           ^
[   30.097576]  fff00000c5f20500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.098466]  fff00000c5f20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.098817] ==================================================================

test log snippet boot parser 61

Home

[   31.543484] ==================================================================
[   31.544574] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720
[   31.545360] Read of size 1 at addr fff00000c57d6d73 by task kunit_try_catch/180
[   31.546209] 
[   31.546594] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.547531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.548139] Hardware name: linux,dummy-virt (DT)
[   31.548786] Call trace:
[   31.549181]  dump_backtrace+0x9c/0x128
[   31.550192]  show_stack+0x20/0x38
[   31.550786]  dump_stack_lvl+0x8c/0xd0
[   31.551194]  print_report+0x118/0x5e0
[   31.551784]  kasan_report+0xc8/0x118
[   31.552330]  __asan_report_load1_noabort+0x20/0x30
[   31.553065]  ksize_unpoisons_memory+0x630/0x720
[   31.553780]  kunit_try_run_case+0x14c/0x3d0
[   31.555027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.555676]  kthread+0x24c/0x2d0
[   31.556206]  ret_from_fork+0x10/0x20
[   31.556744] 
[   31.557124] Allocated by task 180:
[   31.557715]  kasan_save_stack+0x3c/0x68
[   31.558220]  kasan_save_track+0x20/0x40
[   31.558842]  kasan_save_alloc_info+0x40/0x58
[   31.559465]  __kasan_kmalloc+0xd4/0xd8
[   31.560040]  __kmalloc_cache_noprof+0x144/0x328
[   31.560679]  ksize_unpoisons_memory+0xc0/0x720
[   31.561333]  kunit_try_run_case+0x14c/0x3d0
[   31.562048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.562713]  kthread+0x24c/0x2d0
[   31.563544]  ret_from_fork+0x10/0x20
[   31.564148] 
[   31.564506] The buggy address belongs to the object at fff00000c57d6d00
[   31.564506]  which belongs to the cache kmalloc-128 of size 128
[   31.566059] The buggy address is located 0 bytes to the right of
[   31.566059]  allocated 115-byte region [fff00000c57d6d00, fff00000c57d6d73)
[   31.567311] 
[   31.567683] The buggy address belongs to the physical page:
[   31.568347] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d6
[   31.569152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.570269] page_type: f5(slab)
[   31.570954] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.572042] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.573248] page dumped because: kasan: bad access detected
[   31.574026] 
[   31.574322] Memory state around the buggy address:
[   31.574952]  fff00000c57d6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.575786]  fff00000c57d6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.576531] >fff00000c57d6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.577412]                                                              ^
[   31.578192]  fff00000c57d6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.579124]  fff00000c57d6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.579965] ==================================================================

test log snippet boot parser 62

Home

[   31.582349] ==================================================================
[   31.583175] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720
[   31.583902] Read of size 1 at addr fff00000c57d6d78 by task kunit_try_catch/180
[   31.584673] 
[   31.585092] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.586111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.586566] Hardware name: linux,dummy-virt (DT)
[   31.587235] Call trace:
[   31.587678]  dump_backtrace+0x9c/0x128
[   31.588219]  show_stack+0x20/0x38
[   31.588842]  dump_stack_lvl+0x8c/0xd0
[   31.590109]  print_report+0x118/0x5e0
[   31.590860]  kasan_report+0xc8/0x118
[   31.591506]  __asan_report_load1_noabort+0x20/0x30
[   31.592053]  ksize_unpoisons_memory+0x628/0x720
[   31.593319]  kunit_try_run_case+0x14c/0x3d0
[   31.594010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.594656]  kthread+0x24c/0x2d0
[   31.595093]  ret_from_fork+0x10/0x20
[   31.595527] 
[   31.596143] Allocated by task 180:
[   31.597167]  kasan_save_stack+0x3c/0x68
[   31.598050]  kasan_save_track+0x20/0x40
[   31.598549]  kasan_save_alloc_info+0x40/0x58
[   31.599213]  __kasan_kmalloc+0xd4/0xd8
[   31.599793]  __kmalloc_cache_noprof+0x144/0x328
[   31.600345]  ksize_unpoisons_memory+0xc0/0x720
[   31.601367]  kunit_try_run_case+0x14c/0x3d0
[   31.602057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.602654]  kthread+0x24c/0x2d0
[   31.603666]  ret_from_fork+0x10/0x20
[   31.604281] 
[   31.604604] The buggy address belongs to the object at fff00000c57d6d00
[   31.604604]  which belongs to the cache kmalloc-128 of size 128
[   31.606231] The buggy address is located 5 bytes to the right of
[   31.606231]  allocated 115-byte region [fff00000c57d6d00, fff00000c57d6d73)
[   31.607456] 
[   31.607806] The buggy address belongs to the physical page:
[   31.608438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d6
[   31.609337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.610546] page_type: f5(slab)
[   31.611124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.612796] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.613956] page dumped because: kasan: bad access detected
[   31.614729] 
[   31.615112] Memory state around the buggy address:
[   31.615743]  fff00000c57d6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.616682]  fff00000c57d6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.617886] >fff00000c57d6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.618796]                                                                 ^
[   31.619641]  fff00000c57d6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.620611]  fff00000c57d6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.621925] ==================================================================

test log snippet boot parser 63

Home

[   31.623462] ==================================================================
[   31.624294] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720
[   31.625704] Read of size 1 at addr fff00000c57d6d7f by task kunit_try_catch/180
[   31.627622] 
[   31.628047] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.629446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.629999] Hardware name: linux,dummy-virt (DT)
[   31.630665] Call trace:
[   31.631250]  dump_backtrace+0x9c/0x128
[   31.631868]  show_stack+0x20/0x38
[   31.632454]  dump_stack_lvl+0x8c/0xd0
[   31.633887]  print_report+0x118/0x5e0
[   31.634412]  kasan_report+0xc8/0x118
[   31.634892]  __asan_report_load1_noabort+0x20/0x30
[   31.635612]  ksize_unpoisons_memory+0x690/0x720
[   31.636212]  kunit_try_run_case+0x14c/0x3d0
[   31.636852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.637749]  kthread+0x24c/0x2d0
[   31.638651]  ret_from_fork+0x10/0x20
[   31.639219] 
[   31.639535] Allocated by task 180:
[   31.640102]  kasan_save_stack+0x3c/0x68
[   31.641248]  kasan_save_track+0x20/0x40
[   31.641770]  kasan_save_alloc_info+0x40/0x58
[   31.642268]  __kasan_kmalloc+0xd4/0xd8
[   31.642729]  __kmalloc_cache_noprof+0x144/0x328
[   31.643435]  ksize_unpoisons_memory+0xc0/0x720
[   31.644048]  kunit_try_run_case+0x14c/0x3d0
[   31.644698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.645359]  kthread+0x24c/0x2d0
[   31.646609]  ret_from_fork+0x10/0x20
[   31.647248] 
[   31.647599] The buggy address belongs to the object at fff00000c57d6d00
[   31.647599]  which belongs to the cache kmalloc-128 of size 128
[   31.649016] The buggy address is located 12 bytes to the right of
[   31.649016]  allocated 115-byte region [fff00000c57d6d00, fff00000c57d6d73)
[   31.651006] 
[   31.651365] The buggy address belongs to the physical page:
[   31.652098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d6
[   31.653402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.654166] page_type: f5(slab)
[   31.654702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.655699] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.656493] page dumped because: kasan: bad access detected
[   31.657381] 
[   31.657688] Memory state around the buggy address:
[   31.659294]  fff00000c57d6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.660249]  fff00000c57d6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.661460] >fff00000c57d6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.662278]                                                                 ^
[   31.663242]  fff00000c57d6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.664243]  fff00000c57d6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.665219] ==================================================================

test log snippet boot parser 64

Home

[   33.859368] ==================================================================
[   33.860535] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   33.861861] Read of size 1 at addr fff00000c63f7098 by task kunit_try_catch/241
[   33.863158] 
[   33.863716] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.864927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.865709] Hardware name: linux,dummy-virt (DT)
[   33.866201] Call trace:
[   33.866748]  dump_backtrace+0x9c/0x128
[   33.867485]  show_stack+0x20/0x38
[   33.868023]  dump_stack_lvl+0x8c/0xd0
[   33.868702]  print_report+0x118/0x5e0
[   33.869475]  kasan_report+0xc8/0x118
[   33.870076]  __asan_report_load1_noabort+0x20/0x30
[   33.870836]  memchr+0x78/0x88
[   33.871628]  kasan_memchr+0x150/0x2f0
[   33.872234]  kunit_try_run_case+0x14c/0x3d0
[   33.873293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.874043]  kthread+0x24c/0x2d0
[   33.874631]  ret_from_fork+0x10/0x20
[   33.875295] 
[   33.875627] Allocated by task 241:
[   33.876229]  kasan_save_stack+0x3c/0x68
[   33.877314]  kasan_save_track+0x20/0x40
[   33.877898]  kasan_save_alloc_info+0x40/0x58
[   33.878567]  __kasan_kmalloc+0xd4/0xd8
[   33.879153]  __kmalloc_cache_noprof+0x144/0x328
[   33.879821]  kasan_memchr+0xb0/0x2f0
[   33.880513]  kunit_try_run_case+0x14c/0x3d0
[   33.881590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.882324]  kthread+0x24c/0x2d0
[   33.882891]  ret_from_fork+0x10/0x20
[   33.883468] 
[   33.883878] The buggy address belongs to the object at fff00000c63f7080
[   33.883878]  which belongs to the cache kmalloc-32 of size 32
[   33.885609] The buggy address is located 0 bytes to the right of
[   33.885609]  allocated 24-byte region [fff00000c63f7080, fff00000c63f7098)
[   33.886947] 
[   33.887339] The buggy address belongs to the physical page:
[   33.887961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.889399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.890317] page_type: f5(slab)
[   33.891036] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.891920] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.892853] page dumped because: kasan: bad access detected
[   33.893872] 
[   33.894308] Memory state around the buggy address:
[   33.895106]  fff00000c63f6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.895856]  fff00000c63f7000: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.896719] >fff00000c63f7080: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.897945]                             ^
[   33.898773]  fff00000c63f7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.899641]  fff00000c63f7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.900324] ==================================================================

test log snippet boot parser 65

Home

[   33.912027] ==================================================================
[   33.913548] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.914372] Read of size 1 at addr fff00000c685bdd8 by task kunit_try_catch/243
[   33.915332] 
[   33.915687] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.916617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.917095] Hardware name: linux,dummy-virt (DT)
[   33.918646] Call trace:
[   33.918866]  dump_backtrace+0x9c/0x128
[   33.919422]  show_stack+0x20/0x38
[   33.920213]  dump_stack_lvl+0x8c/0xd0
[   33.920892]  print_report+0x118/0x5e0
[   33.921813]  kasan_report+0xc8/0x118
[   33.922302]  __asan_report_load1_noabort+0x20/0x30
[   33.923098]  memcmp+0x198/0x1d8
[   33.923756]  kasan_memcmp+0x170/0x310
[   33.924458]  kunit_try_run_case+0x14c/0x3d0
[   33.925319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.926223]  kthread+0x24c/0x2d0
[   33.926962]  ret_from_fork+0x10/0x20
[   33.927750] 
[   33.928311] Allocated by task 243:
[   33.929043]  kasan_save_stack+0x3c/0x68
[   33.929793]  kasan_save_track+0x20/0x40
[   33.930299]  kasan_save_alloc_info+0x40/0x58
[   33.930959]  __kasan_kmalloc+0xd4/0xd8
[   33.931514]  __kmalloc_cache_noprof+0x144/0x328
[   33.932259]  kasan_memcmp+0xbc/0x310
[   33.933103]  kunit_try_run_case+0x14c/0x3d0
[   33.933674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.934918]  kthread+0x24c/0x2d0
[   33.935712]  ret_from_fork+0x10/0x20
[   33.936253] 
[   33.936684] The buggy address belongs to the object at fff00000c685bdc0
[   33.936684]  which belongs to the cache kmalloc-32 of size 32
[   33.938182] The buggy address is located 0 bytes to the right of
[   33.938182]  allocated 24-byte region [fff00000c685bdc0, fff00000c685bdd8)
[   33.939516] 
[   33.939936] The buggy address belongs to the physical page:
[   33.940608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   33.941995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.942813] page_type: f5(slab)
[   33.943324] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.944258] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.945295] page dumped because: kasan: bad access detected
[   33.946067] 
[   33.946422] Memory state around the buggy address:
[   33.947092]  fff00000c685bc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.948030]  fff00000c685bd00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.949187] >fff00000c685bd80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.950056]                                                     ^
[   33.950747]  fff00000c685be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.951647]  fff00000c685be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.952495] ==================================================================

test log snippet boot parser 66

Home

[   33.082744] ==================================================================
[   33.083885] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   33.084800] Read of size 1 at addr fff00000c699e001 by task kunit_try_catch/209
[   33.085531] 
[   33.085924] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.086967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.088548] Hardware name: linux,dummy-virt (DT)
[   33.089674] Call trace:
[   33.090082]  dump_backtrace+0x9c/0x128
[   33.090630]  show_stack+0x20/0x38
[   33.091175]  dump_stack_lvl+0x8c/0xd0
[   33.091825]  print_report+0x118/0x5e0
[   33.092474]  kasan_report+0xc8/0x118
[   33.093428]  __asan_report_load1_noabort+0x20/0x30
[   33.094017]  mempool_oob_right_helper+0x2b8/0x2f8
[   33.094715]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   33.095296]  kunit_try_run_case+0x14c/0x3d0
[   33.095969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.096710]  kthread+0x24c/0x2d0
[   33.097893]  ret_from_fork+0x10/0x20
[   33.098349] 
[   33.098711] The buggy address belongs to the physical page:
[   33.099414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10699c
[   33.100133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.101242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.102481] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.103353] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.104293] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.105432] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.106672] head: 0bfffe0000000002 ffffc1ffc31a6701 ffffffffffffffff 0000000000000000
[   33.107724] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.108807] page dumped because: kasan: bad access detected
[   33.109404] 
[   33.109697] Memory state around the buggy address:
[   33.110328]  fff00000c699df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.111553]  fff00000c699df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.112327] >fff00000c699e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.113428]                    ^
[   33.114307]  fff00000c699e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.115273]  fff00000c699e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.116029] ==================================================================

test log snippet boot parser 67

Home

[   33.131315] ==================================================================
[   33.132567] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   33.133868] Read of size 1 at addr fff00000c685d2bb by task kunit_try_catch/211
[   33.134540] 
[   33.134838] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.135948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.136728] Hardware name: linux,dummy-virt (DT)
[   33.137610] Call trace:
[   33.138043]  dump_backtrace+0x9c/0x128
[   33.139077]  show_stack+0x20/0x38
[   33.139651]  dump_stack_lvl+0x8c/0xd0
[   33.140353]  print_report+0x118/0x5e0
[   33.141550]  kasan_report+0xc8/0x118
[   33.141909]  __asan_report_load1_noabort+0x20/0x30
[   33.142629]  mempool_oob_right_helper+0x2b8/0x2f8
[   33.143186]  mempool_slab_oob_right+0xb8/0x110
[   33.143856]  kunit_try_run_case+0x14c/0x3d0
[   33.144528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.145193]  kthread+0x24c/0x2d0
[   33.145763]  ret_from_fork+0x10/0x20
[   33.146394] 
[   33.146720] Allocated by task 211:
[   33.148126]  kasan_save_stack+0x3c/0x68
[   33.148684]  kasan_save_track+0x20/0x40
[   33.149557]  kasan_save_alloc_info+0x40/0x58
[   33.150106]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.150841]  remove_element+0x16c/0x1f8
[   33.151495]  mempool_alloc_preallocated+0x58/0xc0
[   33.152197]  mempool_oob_right_helper+0x98/0x2f8
[   33.153186]  mempool_slab_oob_right+0xb8/0x110
[   33.154326]  kunit_try_run_case+0x14c/0x3d0
[   33.155006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.155816]  kthread+0x24c/0x2d0
[   33.156539]  ret_from_fork+0x10/0x20
[   33.157174] 
[   33.157652] The buggy address belongs to the object at fff00000c685d240
[   33.157652]  which belongs to the cache test_cache of size 123
[   33.159319] The buggy address is located 0 bytes to the right of
[   33.159319]  allocated 123-byte region [fff00000c685d240, fff00000c685d2bb)
[   33.160317] 
[   33.160502] The buggy address belongs to the physical page:
[   33.160788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685d
[   33.161914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.163400] page_type: f5(slab)
[   33.164016] raw: 0bfffe0000000000 fff00000c6812500 dead000000000122 0000000000000000
[   33.164994] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   33.166050] page dumped because: kasan: bad access detected
[   33.166780] 
[   33.167157] Memory state around the buggy address:
[   33.167800]  fff00000c685d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.168467]  fff00000c685d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.169265] >fff00000c685d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.170371]                                         ^
[   33.171131]  fff00000c685d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.171794]  fff00000c685d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.173457] ==================================================================

test log snippet boot parser 68

Home

[   34.108093] ==================================================================
[   34.108752] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938
[   34.109776] Read of size 1 at addr fff00000c685bf10 by task kunit_try_catch/245
[   34.110805] 
[   34.111272] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.112545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.113376] Hardware name: linux,dummy-virt (DT)
[   34.114169] Call trace:
[   34.114684]  dump_backtrace+0x9c/0x128
[   34.115366]  show_stack+0x20/0x38
[   34.115926]  dump_stack_lvl+0x8c/0xd0
[   34.116537]  print_report+0x118/0x5e0
[   34.117302]  kasan_report+0xc8/0x118
[   34.118055]  __asan_report_load1_noabort+0x20/0x30
[   34.118733]  kasan_strings+0x894/0x938
[   34.119332]  kunit_try_run_case+0x14c/0x3d0
[   34.119971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.120967]  kthread+0x24c/0x2d0
[   34.121580]  ret_from_fork+0x10/0x20
[   34.122119] 
[   34.122444] Allocated by task 245:
[   34.122922]  kasan_save_stack+0x3c/0x68
[   34.123619]  kasan_save_track+0x20/0x40
[   34.124224]  kasan_save_alloc_info+0x40/0x58
[   34.125067]  __kasan_kmalloc+0xd4/0xd8
[   34.125671]  __kmalloc_cache_noprof+0x144/0x328
[   34.126170]  kasan_strings+0xb0/0x938
[   34.126882]  kunit_try_run_case+0x14c/0x3d0
[   34.127681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.128424]  kthread+0x24c/0x2d0
[   34.129517]  ret_from_fork+0x10/0x20
[   34.130110] 
[   34.130558] Freed by task 245:
[   34.131165]  kasan_save_stack+0x3c/0x68
[   34.131903]  kasan_save_track+0x20/0x40
[   34.132775]  kasan_save_free_info+0x4c/0x78
[   34.133577]  __kasan_slab_free+0x6c/0x98
[   34.134106]  kfree+0x110/0x3b8
[   34.134521]  kasan_strings+0x128/0x938
[   34.135035]  kunit_try_run_case+0x14c/0x3d0
[   34.135824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.136963]  kthread+0x24c/0x2d0
[   34.137461]  ret_from_fork+0x10/0x20
[   34.138066] 
[   34.138429] The buggy address belongs to the object at fff00000c685bf00
[   34.138429]  which belongs to the cache kmalloc-32 of size 32
[   34.139798] The buggy address is located 16 bytes inside of
[   34.139798]  freed 32-byte region [fff00000c685bf00, fff00000c685bf20)
[   34.141148] 
[   34.141762] The buggy address belongs to the physical page:
[   34.142660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   34.143482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.144573] page_type: f5(slab)
[   34.145322] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.146156] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.147103] page dumped because: kasan: bad access detected
[   34.147779] 
[   34.148176] Memory state around the buggy address:
[   34.149079]  fff00000c685be00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.150482]  fff00000c685be80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.151307] >fff00000c685bf00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.152192]                          ^
[   34.152963]  fff00000c685bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.153818]  fff00000c685c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.154575] ==================================================================

test log snippet boot parser 69

Home

[   31.429706] ==================================================================
[   31.431267] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x174/0x318
[   31.432218] Read of size 1 at addr fff00000c3ec9b00 by task kunit_try_catch/178
[   31.433401] 
[   31.434081] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.435218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.435470] Hardware name: linux,dummy-virt (DT)
[   31.435727] Call trace:
[   31.435907]  dump_backtrace+0x9c/0x128
[   31.436440]  show_stack+0x20/0x38
[   31.437374]  dump_stack_lvl+0x8c/0xd0
[   31.437902]  print_report+0x118/0x5e0
[   31.438577]  kasan_report+0xc8/0x118
[   31.439223]  __kasan_check_byte+0x54/0x70
[   31.439891]  kfree_sensitive+0x30/0xb0
[   31.440551]  kmalloc_double_kzfree+0x174/0x318
[   31.441591]  kunit_try_run_case+0x14c/0x3d0
[   31.442282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.443036]  kthread+0x24c/0x2d0
[   31.443609]  ret_from_fork+0x10/0x20
[   31.444275] 
[   31.444607] Allocated by task 178:
[   31.445335]  kasan_save_stack+0x3c/0x68
[   31.446183]  kasan_save_track+0x20/0x40
[   31.446800]  kasan_save_alloc_info+0x40/0x58
[   31.447348]  __kasan_kmalloc+0xd4/0xd8
[   31.447960]  __kmalloc_cache_noprof+0x144/0x328
[   31.448688]  kmalloc_double_kzfree+0xb8/0x318
[   31.449378]  kunit_try_run_case+0x14c/0x3d0
[   31.451134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.451798]  kthread+0x24c/0x2d0
[   31.452251]  ret_from_fork+0x10/0x20
[   31.453209] 
[   31.453587] Freed by task 178:
[   31.454135]  kasan_save_stack+0x3c/0x68
[   31.454778]  kasan_save_track+0x20/0x40
[   31.455436]  kasan_save_free_info+0x4c/0x78
[   31.456163]  __kasan_slab_free+0x6c/0x98
[   31.457172]  kfree+0x110/0x3b8
[   31.457633]  kfree_sensitive+0x80/0xb0
[   31.458255]  kmalloc_double_kzfree+0x120/0x318
[   31.458878]  kunit_try_run_case+0x14c/0x3d0
[   31.459426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.460220]  kthread+0x24c/0x2d0
[   31.461093]  ret_from_fork+0x10/0x20
[   31.461690] 
[   31.462012] The buggy address belongs to the object at fff00000c3ec9b00
[   31.462012]  which belongs to the cache kmalloc-16 of size 16
[   31.463210] The buggy address is located 0 bytes inside of
[   31.463210]  freed 16-byte region [fff00000c3ec9b00, fff00000c3ec9b10)
[   31.464526] 
[   31.465169] The buggy address belongs to the physical page:
[   31.465779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   31.466653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.467465] page_type: f5(slab)
[   31.468015] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.470340] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.471091] page dumped because: kasan: bad access detected
[   31.471810] 
[   31.472179] Memory state around the buggy address:
[   31.472862]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.473735]  fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   31.474565] >fff00000c3ec9b00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.475585]                    ^
[   31.476296]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.477461]  fff00000c3ec9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.478219] ==================================================================

test log snippet boot parser 70

Home

[   31.362911] ==================================================================
[   31.364052] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478
[   31.364749] Read of size 1 at addr fff00000c680fc28 by task kunit_try_catch/174
[   31.365346] 
[   31.365744] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.367118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.367603] Hardware name: linux,dummy-virt (DT)
[   31.368163] Call trace:
[   31.368702]  dump_backtrace+0x9c/0x128
[   31.369369]  show_stack+0x20/0x38
[   31.369939]  dump_stack_lvl+0x8c/0xd0
[   31.370656]  print_report+0x118/0x5e0
[   31.371170]  kasan_report+0xc8/0x118
[   31.371812]  __asan_report_load1_noabort+0x20/0x30
[   31.372400]  kmalloc_uaf2+0x408/0x478
[   31.373097]  kunit_try_run_case+0x14c/0x3d0
[   31.373668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374468]  kthread+0x24c/0x2d0
[   31.375092]  ret_from_fork+0x10/0x20
[   31.375726] 
[   31.376058] Allocated by task 174:
[   31.376605]  kasan_save_stack+0x3c/0x68
[   31.377269]  kasan_save_track+0x20/0x40
[   31.378221]  kasan_save_alloc_info+0x40/0x58
[   31.379516]  __kasan_kmalloc+0xd4/0xd8
[   31.380306]  __kmalloc_cache_noprof+0x144/0x328
[   31.381215]  kmalloc_uaf2+0xc4/0x478
[   31.381770]  kunit_try_run_case+0x14c/0x3d0
[   31.382306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.382929]  kthread+0x24c/0x2d0
[   31.383506]  ret_from_fork+0x10/0x20
[   31.384507] 
[   31.385211] Freed by task 174:
[   31.385641]  kasan_save_stack+0x3c/0x68
[   31.386284]  kasan_save_track+0x20/0x40
[   31.386763]  kasan_save_free_info+0x4c/0x78
[   31.387374]  __kasan_slab_free+0x6c/0x98
[   31.388011]  kfree+0x110/0x3b8
[   31.388553]  kmalloc_uaf2+0x138/0x478
[   31.389184]  kunit_try_run_case+0x14c/0x3d0
[   31.389774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.390247]  kthread+0x24c/0x2d0
[   31.390797]  ret_from_fork+0x10/0x20
[   31.391807] 
[   31.392189] The buggy address belongs to the object at fff00000c680fc00
[   31.392189]  which belongs to the cache kmalloc-64 of size 64
[   31.393443] The buggy address is located 40 bytes inside of
[   31.393443]  freed 64-byte region [fff00000c680fc00, fff00000c680fc40)
[   31.395304] 
[   31.395624] The buggy address belongs to the physical page:
[   31.396426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10680f
[   31.397740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.398597] page_type: f5(slab)
[   31.399206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.400197] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.401152] page dumped because: kasan: bad access detected
[   31.402222] 
[   31.402546] Memory state around the buggy address:
[   31.403318]  fff00000c680fb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.404202]  fff00000c680fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.405315] >fff00000c680fc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.406415]                                   ^
[   31.406937]  fff00000c680fc80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.407702]  fff00000c680fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.408525] ==================================================================

test log snippet boot parser 71

Home

[   30.818567] ==================================================================
[   30.819559] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.820349] Read of size 16 at addr fff00000c57c6060 by task kunit_try_catch/154
[   30.822188] 
[   30.822507] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.823383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.823931] Hardware name: linux,dummy-virt (DT)
[   30.824585] Call trace:
[   30.825365]  dump_backtrace+0x9c/0x128
[   30.825953]  show_stack+0x20/0x38
[   30.826526]  dump_stack_lvl+0x8c/0xd0
[   30.827160]  print_report+0x118/0x5e0
[   30.827658]  kasan_report+0xc8/0x118
[   30.828191]  __asan_report_load16_noabort+0x20/0x30
[   30.829547]  kmalloc_uaf_16+0x3bc/0x438
[   30.830180]  kunit_try_run_case+0x14c/0x3d0
[   30.830767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.831764]  kthread+0x24c/0x2d0
[   30.832357]  ret_from_fork+0x10/0x20
[   30.833252] 
[   30.833620] Allocated by task 154:
[   30.834222]  kasan_save_stack+0x3c/0x68
[   30.834884]  kasan_save_track+0x20/0x40
[   30.835476]  kasan_save_alloc_info+0x40/0x58
[   30.836153]  __kasan_kmalloc+0xd4/0xd8
[   30.836838]  __kmalloc_cache_noprof+0x144/0x328
[   30.837756]  kmalloc_uaf_16+0x144/0x438
[   30.838242]  kunit_try_run_case+0x14c/0x3d0
[   30.838871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.839679]  kthread+0x24c/0x2d0
[   30.840264]  ret_from_fork+0x10/0x20
[   30.840961] 
[   30.841351] Freed by task 154:
[   30.841916]  kasan_save_stack+0x3c/0x68
[   30.842460]  kasan_save_track+0x20/0x40
[   30.843448]  kasan_save_free_info+0x4c/0x78
[   30.844447]  __kasan_slab_free+0x6c/0x98
[   30.845091]  kfree+0x110/0x3b8
[   30.845685]  kmalloc_uaf_16+0x198/0x438
[   30.846251]  kunit_try_run_case+0x14c/0x3d0
[   30.846934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.847607]  kthread+0x24c/0x2d0
[   30.848188]  ret_from_fork+0x10/0x20
[   30.848718] 
[   30.849164] The buggy address belongs to the object at fff00000c57c6060
[   30.849164]  which belongs to the cache kmalloc-16 of size 16
[   30.850246] The buggy address is located 0 bytes inside of
[   30.850246]  freed 16-byte region [fff00000c57c6060, fff00000c57c6070)
[   30.851612] 
[   30.852038] The buggy address belongs to the physical page:
[   30.852748] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c6
[   30.853746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.854654] page_type: f5(slab)
[   30.855166] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.856204] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.857036] page dumped because: kasan: bad access detected
[   30.857765] 
[   30.858201] Memory state around the buggy address:
[   30.858846]  fff00000c57c5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.859750]  fff00000c57c5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.860680] >fff00000c57c6000: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   30.861627]                                                        ^
[   30.862352]  fff00000c57c6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.862960]  fff00000c57c6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.863881] ==================================================================

test log snippet boot parser 72

Home

[   31.242905] ==================================================================
[   31.245131] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340
[   31.246043] Read of size 1 at addr fff00000c3ec9ae8 by task kunit_try_catch/170
[   31.248157] 
[   31.248760] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.249939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.250817] Hardware name: linux,dummy-virt (DT)
[   31.251488] Call trace:
[   31.251922]  dump_backtrace+0x9c/0x128
[   31.252679]  show_stack+0x20/0x38
[   31.253542]  dump_stack_lvl+0x8c/0xd0
[   31.254304]  print_report+0x118/0x5e0
[   31.254932]  kasan_report+0xc8/0x118
[   31.255632]  __asan_report_load1_noabort+0x20/0x30
[   31.256397]  kmalloc_uaf+0x30c/0x340
[   31.257200]  kunit_try_run_case+0x14c/0x3d0
[   31.258087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.258880]  kthread+0x24c/0x2d0
[   31.259566]  ret_from_fork+0x10/0x20
[   31.260234] 
[   31.260954] Allocated by task 170:
[   31.261637]  kasan_save_stack+0x3c/0x68
[   31.262302]  kasan_save_track+0x20/0x40
[   31.263046]  kasan_save_alloc_info+0x40/0x58
[   31.263719]  __kasan_kmalloc+0xd4/0xd8
[   31.264447]  __kmalloc_cache_noprof+0x144/0x328
[   31.265464]  kmalloc_uaf+0xb8/0x340
[   31.265905]  kunit_try_run_case+0x14c/0x3d0
[   31.266257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.266921]  kthread+0x24c/0x2d0
[   31.267511]  ret_from_fork+0x10/0x20
[   31.268250] 
[   31.268619] Freed by task 170:
[   31.269296]  kasan_save_stack+0x3c/0x68
[   31.269938]  kasan_save_track+0x20/0x40
[   31.270626]  kasan_save_free_info+0x4c/0x78
[   31.271195]  __kasan_slab_free+0x6c/0x98
[   31.271686]  kfree+0x110/0x3b8
[   31.272686]  kmalloc_uaf+0x120/0x340
[   31.273661]  kunit_try_run_case+0x14c/0x3d0
[   31.274371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.275321]  kthread+0x24c/0x2d0
[   31.275954]  ret_from_fork+0x10/0x20
[   31.276593] 
[   31.277240] The buggy address belongs to the object at fff00000c3ec9ae0
[   31.277240]  which belongs to the cache kmalloc-16 of size 16
[   31.278600] The buggy address is located 8 bytes inside of
[   31.278600]  freed 16-byte region [fff00000c3ec9ae0, fff00000c3ec9af0)
[   31.279856] 
[   31.280148] The buggy address belongs to the physical page:
[   31.280655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec9
[   31.281677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.282273] page_type: f5(slab)
[   31.282690] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.283900] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.284854] page dumped because: kasan: bad access detected
[   31.285371] 
[   31.285938] Memory state around the buggy address:
[   31.287062]  fff00000c3ec9980: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   31.289623]  fff00000c3ec9a00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.290799] >fff00000c3ec9a80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   31.291656]                                                           ^
[   31.292598]  fff00000c3ec9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.293773]  fff00000c3ec9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.294735] ==================================================================

test log snippet boot parser 73

Home

[   31.305548] ==================================================================
[   31.306972] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328
[   31.308006] Write of size 33 at addr fff00000c57af300 by task kunit_try_catch/172
[   31.309537] 
[   31.310188] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.311328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.312051] Hardware name: linux,dummy-virt (DT)
[   31.312609] Call trace:
[   31.313004]  dump_backtrace+0x9c/0x128
[   31.313707]  show_stack+0x20/0x38
[   31.314364]  dump_stack_lvl+0x8c/0xd0
[   31.314926]  print_report+0x118/0x5e0
[   31.315588]  kasan_report+0xc8/0x118
[   31.316254]  kasan_check_range+0x100/0x1a8
[   31.316886]  __asan_memset+0x34/0x78
[   31.317493]  kmalloc_uaf_memset+0x17c/0x328
[   31.318064]  kunit_try_run_case+0x14c/0x3d0
[   31.318753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.319418]  kthread+0x24c/0x2d0
[   31.320035]  ret_from_fork+0x10/0x20
[   31.320663] 
[   31.321004] Allocated by task 172:
[   31.321540]  kasan_save_stack+0x3c/0x68
[   31.322240]  kasan_save_track+0x20/0x40
[   31.322792]  kasan_save_alloc_info+0x40/0x58
[   31.323507]  __kasan_kmalloc+0xd4/0xd8
[   31.324170]  __kmalloc_cache_noprof+0x144/0x328
[   31.324819]  kmalloc_uaf_memset+0xb8/0x328
[   31.325533]  kunit_try_run_case+0x14c/0x3d0
[   31.326135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.326930]  kthread+0x24c/0x2d0
[   31.327492]  ret_from_fork+0x10/0x20
[   31.328142] 
[   31.328511] Freed by task 172:
[   31.329003]  kasan_save_stack+0x3c/0x68
[   31.329854]  kasan_save_track+0x20/0x40
[   31.330502]  kasan_save_free_info+0x4c/0x78
[   31.331134]  __kasan_slab_free+0x6c/0x98
[   31.331779]  kfree+0x110/0x3b8
[   31.332355]  kmalloc_uaf_memset+0x120/0x328
[   31.333049]  kunit_try_run_case+0x14c/0x3d0
[   31.333714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.334539]  kthread+0x24c/0x2d0
[   31.335102]  ret_from_fork+0x10/0x20
[   31.335732] 
[   31.336123] The buggy address belongs to the object at fff00000c57af300
[   31.336123]  which belongs to the cache kmalloc-64 of size 64
[   31.337368] The buggy address is located 0 bytes inside of
[   31.337368]  freed 64-byte region [fff00000c57af300, fff00000c57af340)
[   31.338576] 
[   31.338949] The buggy address belongs to the physical page:
[   31.339537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057af
[   31.340553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.341265] page_type: f5(slab)
[   31.341874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.342741] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.343668] page dumped because: kasan: bad access detected
[   31.344329] 
[   31.344730] Memory state around the buggy address:
[   31.345421]  fff00000c57af200: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   31.346199]  fff00000c57af280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.347090] >fff00000c57af300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.347876]                    ^
[   31.348387]  fff00000c57af380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.349219]  fff00000c57af400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.350114] ==================================================================

test log snippet boot parser 74

Home

[   32.403158] ==================================================================
[   32.404187] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318
[   32.405517] Read of size 1 at addr fff00000c5709500 by task kunit_try_catch/201
[   32.406252] 
[   32.406702] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.408040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.408964] Hardware name: linux,dummy-virt (DT)
[   32.409635] Call trace:
[   32.410077]  dump_backtrace+0x9c/0x128
[   32.410651]  show_stack+0x20/0x38
[   32.411211]  dump_stack_lvl+0x8c/0xd0
[   32.411759]  print_report+0x118/0x5e0
[   32.412376]  kasan_report+0xc8/0x118
[   32.412970]  __kasan_check_byte+0x54/0x70
[   32.413554]  kmem_cache_destroy+0x34/0x218
[   32.414441]  kmem_cache_double_destroy+0x184/0x318
[   32.415163]  kunit_try_run_case+0x14c/0x3d0
[   32.415795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.416572]  kthread+0x24c/0x2d0
[   32.417405]  ret_from_fork+0x10/0x20
[   32.418032] 
[   32.418338] Allocated by task 201:
[   32.418877]  kasan_save_stack+0x3c/0x68
[   32.419412]  kasan_save_track+0x20/0x40
[   32.420052]  kasan_save_alloc_info+0x40/0x58
[   32.420956]  __kasan_slab_alloc+0xa8/0xb0
[   32.421553]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.422253]  __kmem_cache_create_args+0x19c/0x2c8
[   32.422863]  kmem_cache_double_destroy+0xd0/0x318
[   32.423421]  kunit_try_run_case+0x14c/0x3d0
[   32.424073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.425129]  kthread+0x24c/0x2d0
[   32.425568]  ret_from_fork+0x10/0x20
[   32.426369] 
[   32.426728] Freed by task 201:
[   32.427247]  kasan_save_stack+0x3c/0x68
[   32.427878]  kasan_save_track+0x20/0x40
[   32.428510]  kasan_save_free_info+0x4c/0x78
[   32.429478]  __kasan_slab_free+0x6c/0x98
[   32.430120]  kmem_cache_free+0x118/0x468
[   32.430715]  slab_kmem_cache_release+0x38/0x50
[   32.431405]  kmem_cache_release+0x1c/0x30
[   32.431926]  kobject_put+0x17c/0x430
[   32.432411]  sysfs_slab_release+0x1c/0x30
[   32.433341]  kmem_cache_destroy+0x118/0x218
[   32.434022]  kmem_cache_double_destroy+0x130/0x318
[   32.434704]  kunit_try_run_case+0x14c/0x3d0
[   32.435392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.436056]  kthread+0x24c/0x2d0
[   32.436594]  ret_from_fork+0x10/0x20
[   32.437380] 
[   32.437743] The buggy address belongs to the object at fff00000c5709500
[   32.437743]  which belongs to the cache kmem_cache of size 208
[   32.438827] The buggy address is located 0 bytes inside of
[   32.438827]  freed 208-byte region [fff00000c5709500, fff00000c57095d0)
[   32.440201] 
[   32.440524] The buggy address belongs to the physical page:
[   32.441570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   32.442438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.443256] page_type: f5(slab)
[   32.443811] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.445323] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   32.446128] page dumped because: kasan: bad access detected
[   32.446799] 
[   32.447135] Memory state around the buggy address:
[   32.447784]  fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.448919]  fff00000c5709480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.449855] >fff00000c5709500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.450591]                    ^
[   32.451132]  fff00000c5709580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.451851]  fff00000c5709600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.452926] ==================================================================

test log snippet boot parser 75

Home

[   32.305438] ==================================================================
[   32.306483] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488
[   32.307366] Read of size 1 at addr fff00000c3e72000 by task kunit_try_catch/199
[   32.308036] 
[   32.308426] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.309842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.310747] Hardware name: linux,dummy-virt (DT)
[   32.311294] Call trace:
[   32.312231]  dump_backtrace+0x9c/0x128
[   32.313306]  show_stack+0x20/0x38
[   32.313996]  dump_stack_lvl+0x8c/0xd0
[   32.314592]  print_report+0x118/0x5e0
[   32.315210]  kasan_report+0xc8/0x118
[   32.315782]  __asan_report_load1_noabort+0x20/0x30
[   32.316532]  kmem_cache_rcu_uaf+0x3a4/0x488
[   32.318010]  kunit_try_run_case+0x14c/0x3d0
[   32.318545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.319254]  kthread+0x24c/0x2d0
[   32.319818]  ret_from_fork+0x10/0x20
[   32.320368] 
[   32.320721] Allocated by task 199:
[   32.321280]  kasan_save_stack+0x3c/0x68
[   32.321887]  kasan_save_track+0x20/0x40
[   32.322899]  kasan_save_alloc_info+0x40/0x58
[   32.323494]  __kasan_slab_alloc+0xa8/0xb0
[   32.324137]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.325098]  kmem_cache_rcu_uaf+0x130/0x488
[   32.325870]  kunit_try_run_case+0x14c/0x3d0
[   32.326452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.327142]  kthread+0x24c/0x2d0
[   32.327638]  ret_from_fork+0x10/0x20
[   32.328140] 
[   32.328506] Freed by task 0:
[   32.329011]  kasan_save_stack+0x3c/0x68
[   32.329637]  kasan_save_track+0x20/0x40
[   32.330813]  kasan_save_free_info+0x4c/0x78
[   32.331483]  __kasan_slab_free+0x6c/0x98
[   32.332126]  slab_free_after_rcu_debug+0xd0/0x2d0
[   32.333618]  rcu_core+0xa54/0x1df8
[   32.334145]  rcu_core_si+0x18/0x30
[   32.334707]  handle_softirqs+0x36c/0xb18
[   32.335270]  __do_softirq+0x1c/0x28
[   32.335797] 
[   32.336134] Last potentially related work creation:
[   32.336778]  kasan_save_stack+0x3c/0x68
[   32.337302]  __kasan_record_aux_stack+0xbc/0xe8
[   32.338056]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.338676]  kmem_cache_free+0x28c/0x468
[   32.339300]  kmem_cache_rcu_uaf+0x170/0x488
[   32.340005]  kunit_try_run_case+0x14c/0x3d0
[   32.340695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.341352]  kthread+0x24c/0x2d0
[   32.342329]  ret_from_fork+0x10/0x20
[   32.342918] 
[   32.343298] The buggy address belongs to the object at fff00000c3e72000
[   32.343298]  which belongs to the cache test_cache of size 200
[   32.345218] The buggy address is located 0 bytes inside of
[   32.345218]  freed 200-byte region [fff00000c3e72000, fff00000c3e720c8)
[   32.347031] 
[   32.347440] The buggy address belongs to the physical page:
[   32.348051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e72
[   32.349235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.350302] page_type: f5(slab)
[   32.350737] raw: 0bfffe0000000000 fff00000c68123c0 dead000000000122 0000000000000000
[   32.351702] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.353085] page dumped because: kasan: bad access detected
[   32.353897] 
[   32.354221] Memory state around the buggy address:
[   32.354835]  fff00000c3e71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.355753]  fff00000c3e71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.357089] >fff00000c3e72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.357728]                    ^
[   32.358237]  fff00000c3e72080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.359130]  fff00000c3e72100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.360127] ==================================================================

test log snippet boot parser 76

Home

[   30.651537] ==================================================================
[   30.652889] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510
[   30.654014] Read of size 1 at addr fff00000c5f20800 by task kunit_try_catch/150
[   30.654850] 
[   30.655142] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.656146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.656565] Hardware name: linux,dummy-virt (DT)
[   30.657358] Call trace:
[   30.657715]  dump_backtrace+0x9c/0x128
[   30.658205]  show_stack+0x20/0x38
[   30.658638]  dump_stack_lvl+0x8c/0xd0
[   30.659280]  print_report+0x118/0x5e0
[   30.659850]  kasan_report+0xc8/0x118
[   30.660487]  __kasan_check_byte+0x54/0x70
[   30.661087]  krealloc_noprof+0x48/0x1a0
[   30.661572]  krealloc_uaf+0x18c/0x510
[   30.662055]  kunit_try_run_case+0x14c/0x3d0
[   30.662745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.663602]  kthread+0x24c/0x2d0
[   30.664308]  ret_from_fork+0x10/0x20
[   30.664952] 
[   30.665629] Allocated by task 150:
[   30.666216]  kasan_save_stack+0x3c/0x68
[   30.666879]  kasan_save_track+0x20/0x40
[   30.667549]  kasan_save_alloc_info+0x40/0x58
[   30.668344]  __kasan_kmalloc+0xd4/0xd8
[   30.669270]  __kmalloc_cache_noprof+0x144/0x328
[   30.669824]  krealloc_uaf+0xc8/0x510
[   30.670465]  kunit_try_run_case+0x14c/0x3d0
[   30.671102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.671759]  kthread+0x24c/0x2d0
[   30.672280]  ret_from_fork+0x10/0x20
[   30.673352] 
[   30.673681] Freed by task 150:
[   30.674454]  kasan_save_stack+0x3c/0x68
[   30.675090]  kasan_save_track+0x20/0x40
[   30.675704]  kasan_save_free_info+0x4c/0x78
[   30.676399]  __kasan_slab_free+0x6c/0x98
[   30.677058]  kfree+0x110/0x3b8
[   30.677658]  krealloc_uaf+0x130/0x510
[   30.678273]  kunit_try_run_case+0x14c/0x3d0
[   30.678849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.679700]  kthread+0x24c/0x2d0
[   30.680208]  ret_from_fork+0x10/0x20
[   30.680890] 
[   30.681289] The buggy address belongs to the object at fff00000c5f20800
[   30.681289]  which belongs to the cache kmalloc-256 of size 256
[   30.682510] The buggy address is located 0 bytes inside of
[   30.682510]  freed 256-byte region [fff00000c5f20800, fff00000c5f20900)
[   30.683949] 
[   30.684351] The buggy address belongs to the physical page:
[   30.685118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.686036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.686934] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.687818] page_type: f5(slab)
[   30.688414] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.689269] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.690464] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.691487] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.692548] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.693461] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.694176] page dumped because: kasan: bad access detected
[   30.694889] 
[   30.695221] Memory state around the buggy address:
[   30.695850]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.696704]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.697538] >fff00000c5f20800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.698365]                    ^
[   30.698893]  fff00000c5f20880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.699631]  fff00000c5f20900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.700488] ==================================================================

test log snippet boot parser 77

Home

[   30.702669] ==================================================================
[   30.704271] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510
[   30.705266] Read of size 1 at addr fff00000c5f20800 by task kunit_try_catch/150
[   30.706719] 
[   30.707075] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.708057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.708653] Hardware name: linux,dummy-virt (DT)
[   30.709304] Call trace:
[   30.709712]  dump_backtrace+0x9c/0x128
[   30.710343]  show_stack+0x20/0x38
[   30.710855]  dump_stack_lvl+0x8c/0xd0
[   30.711486]  print_report+0x118/0x5e0
[   30.712075]  kasan_report+0xc8/0x118
[   30.712659]  __asan_report_load1_noabort+0x20/0x30
[   30.713251]  krealloc_uaf+0x4c4/0x510
[   30.713872]  kunit_try_run_case+0x14c/0x3d0
[   30.714518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.715289]  kthread+0x24c/0x2d0
[   30.715847]  ret_from_fork+0x10/0x20
[   30.716429] 
[   30.716734] Allocated by task 150:
[   30.717290]  kasan_save_stack+0x3c/0x68
[   30.717840]  kasan_save_track+0x20/0x40
[   30.718824]  kasan_save_alloc_info+0x40/0x58
[   30.719445]  __kasan_kmalloc+0xd4/0xd8
[   30.719953]  __kmalloc_cache_noprof+0x144/0x328
[   30.720589]  krealloc_uaf+0xc8/0x510
[   30.721194]  kunit_try_run_case+0x14c/0x3d0
[   30.721845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.722536]  kthread+0x24c/0x2d0
[   30.723023]  ret_from_fork+0x10/0x20
[   30.723617] 
[   30.723999] Freed by task 150:
[   30.724495]  kasan_save_stack+0x3c/0x68
[   30.725036]  kasan_save_track+0x20/0x40
[   30.725660]  kasan_save_free_info+0x4c/0x78
[   30.726314]  __kasan_slab_free+0x6c/0x98
[   30.726804]  kfree+0x110/0x3b8
[   30.727368]  krealloc_uaf+0x130/0x510
[   30.727961]  kunit_try_run_case+0x14c/0x3d0
[   30.728504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.729271]  kthread+0x24c/0x2d0
[   30.729836]  ret_from_fork+0x10/0x20
[   30.730403] 
[   30.730846] The buggy address belongs to the object at fff00000c5f20800
[   30.730846]  which belongs to the cache kmalloc-256 of size 256
[   30.731997] The buggy address is located 0 bytes inside of
[   30.731997]  freed 256-byte region [fff00000c5f20800, fff00000c5f20900)
[   30.733290] 
[   30.734101] The buggy address belongs to the physical page:
[   30.734826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f20
[   30.735781] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.736648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.737661] page_type: f5(slab)
[   30.738221] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.739032] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.739841] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.740943] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.742705] head: 0bfffe0000000001 ffffc1ffc317c801 ffffffffffffffff 0000000000000000
[   30.743762] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.744794] page dumped because: kasan: bad access detected
[   30.745651] 
[   30.746393] Memory state around the buggy address:
[   30.746956]  fff00000c5f20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.747990]  fff00000c5f20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.748992] >fff00000c5f20800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.749936]                    ^
[   30.750676]  fff00000c5f20880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.751709]  fff00000c5f20900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.752681] ==================================================================

test log snippet boot parser 78

Home

[   31.778906] ==================================================================
[   31.779597] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0
[   31.780455] Read of size 1 at addr fff00000c5802278 by task kunit_try_catch/182
[   31.781731] 
[   31.782830] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.783720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.784203] Hardware name: linux,dummy-virt (DT)
[   31.784797] Call trace:
[   31.785573]  dump_backtrace+0x9c/0x128
[   31.786258]  show_stack+0x20/0x38
[   31.786890]  dump_stack_lvl+0x8c/0xd0
[   31.787564]  print_report+0x118/0x5e0
[   31.788214]  kasan_report+0xc8/0x118
[   31.789129]  __asan_report_load1_noabort+0x20/0x30
[   31.789965]  ksize_uaf+0x53c/0x5d0
[   31.791042]  kunit_try_run_case+0x14c/0x3d0
[   31.791588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.792362]  kthread+0x24c/0x2d0
[   31.793380]  ret_from_fork+0x10/0x20
[   31.793929] 
[   31.794281] Allocated by task 182:
[   31.794832]  kasan_save_stack+0x3c/0x68
[   31.795476]  kasan_save_track+0x20/0x40
[   31.796007]  kasan_save_alloc_info+0x40/0x58
[   31.796662]  __kasan_kmalloc+0xd4/0xd8
[   31.798273]  __kmalloc_cache_noprof+0x144/0x328
[   31.799106]  ksize_uaf+0xb8/0x5d0
[   31.799778]  kunit_try_run_case+0x14c/0x3d0
[   31.800568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.801234]  kthread+0x24c/0x2d0
[   31.801697]  ret_from_fork+0x10/0x20
[   31.802807] 
[   31.803065] Freed by task 182:
[   31.803956]  kasan_save_stack+0x3c/0x68
[   31.804802]  kasan_save_track+0x20/0x40
[   31.805777]  kasan_save_free_info+0x4c/0x78
[   31.806576]  __kasan_slab_free+0x6c/0x98
[   31.807355]  kfree+0x110/0x3b8
[   31.807887]  ksize_uaf+0x120/0x5d0
[   31.808825]  kunit_try_run_case+0x14c/0x3d0
[   31.809916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.810770]  kthread+0x24c/0x2d0
[   31.811504]  ret_from_fork+0x10/0x20
[   31.812277] 
[   31.813405] The buggy address belongs to the object at fff00000c5802200
[   31.813405]  which belongs to the cache kmalloc-128 of size 128
[   31.814929] The buggy address is located 120 bytes inside of
[   31.814929]  freed 128-byte region [fff00000c5802200, fff00000c5802280)
[   31.816229] 
[   31.816547] The buggy address belongs to the physical page:
[   31.817333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105802
[   31.818708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.819569] page_type: f5(slab)
[   31.820222] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.821619] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.822585] page dumped because: kasan: bad access detected
[   31.823465] 
[   31.823838] Memory state around the buggy address:
[   31.824569]  fff00000c5802100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.825325]  fff00000c5802180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.826541] >fff00000c5802200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.827366]                                                                 ^
[   31.828183]  fff00000c5802280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.829885]  fff00000c5802300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.830752] ==================================================================

test log snippet boot parser 79

Home

[   31.728366] ==================================================================
[   31.730195] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0
[   31.731019] Read of size 1 at addr fff00000c5802200 by task kunit_try_catch/182
[   31.731856] 
[   31.732240] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.733750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.734840] Hardware name: linux,dummy-virt (DT)
[   31.735445] Call trace:
[   31.735828]  dump_backtrace+0x9c/0x128
[   31.736404]  show_stack+0x20/0x38
[   31.737174]  dump_stack_lvl+0x8c/0xd0
[   31.737792]  print_report+0x118/0x5e0
[   31.738381]  kasan_report+0xc8/0x118
[   31.738744]  __asan_report_load1_noabort+0x20/0x30
[   31.739462]  ksize_uaf+0x578/0x5d0
[   31.739920]  kunit_try_run_case+0x14c/0x3d0
[   31.740676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.741858]  kthread+0x24c/0x2d0
[   31.742461]  ret_from_fork+0x10/0x20
[   31.743122] 
[   31.743446] Allocated by task 182:
[   31.744095]  kasan_save_stack+0x3c/0x68
[   31.744688]  kasan_save_track+0x20/0x40
[   31.745571]  kasan_save_alloc_info+0x40/0x58
[   31.746644]  __kasan_kmalloc+0xd4/0xd8
[   31.747437]  __kmalloc_cache_noprof+0x144/0x328
[   31.748290]  ksize_uaf+0xb8/0x5d0
[   31.748868]  kunit_try_run_case+0x14c/0x3d0
[   31.749348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.750552]  kthread+0x24c/0x2d0
[   31.751159]  ret_from_fork+0x10/0x20
[   31.751689] 
[   31.752225] Freed by task 182:
[   31.752706]  kasan_save_stack+0x3c/0x68
[   31.753259]  kasan_save_track+0x20/0x40
[   31.753777]  kasan_save_free_info+0x4c/0x78
[   31.755005]  __kasan_slab_free+0x6c/0x98
[   31.755749]  kfree+0x110/0x3b8
[   31.756203]  ksize_uaf+0x120/0x5d0
[   31.756689]  kunit_try_run_case+0x14c/0x3d0
[   31.757864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.758573]  kthread+0x24c/0x2d0
[   31.759131]  ret_from_fork+0x10/0x20
[   31.759759] 
[   31.760091] The buggy address belongs to the object at fff00000c5802200
[   31.760091]  which belongs to the cache kmalloc-128 of size 128
[   31.761677] The buggy address is located 0 bytes inside of
[   31.761677]  freed 128-byte region [fff00000c5802200, fff00000c5802280)
[   31.763398] 
[   31.763649] The buggy address belongs to the physical page:
[   31.764417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105802
[   31.765728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.766616] page_type: f5(slab)
[   31.767146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.768188] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.769055] page dumped because: kasan: bad access detected
[   31.769944] 
[   31.770454] Memory state around the buggy address:
[   31.771186]  fff00000c5802100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.771941]  fff00000c5802180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.773078] >fff00000c5802200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.774074]                    ^
[   31.774507]  fff00000c5802280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.775281]  fff00000c5802300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.776587] ==================================================================

test log snippet boot parser 80

Home

[   31.675322] ==================================================================
[   31.676766] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0
[   31.677861] Read of size 1 at addr fff00000c5802200 by task kunit_try_catch/182
[   31.678804] 
[   31.679197] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.680534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.681456] Hardware name: linux,dummy-virt (DT)
[   31.682204] Call trace:
[   31.682591]  dump_backtrace+0x9c/0x128
[   31.683124]  show_stack+0x20/0x38
[   31.683606]  dump_stack_lvl+0x8c/0xd0
[   31.684210]  print_report+0x118/0x5e0
[   31.684787]  kasan_report+0xc8/0x118
[   31.685734]  __kasan_check_byte+0x54/0x70
[   31.686417]  ksize+0x30/0x88
[   31.687063]  ksize_uaf+0x174/0x5d0
[   31.687692]  kunit_try_run_case+0x14c/0x3d0
[   31.688393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.689236]  kthread+0x24c/0x2d0
[   31.690109]  ret_from_fork+0x10/0x20
[   31.690744] 
[   31.691184] Allocated by task 182:
[   31.691727]  kasan_save_stack+0x3c/0x68
[   31.692445]  kasan_save_track+0x20/0x40
[   31.693161]  kasan_save_alloc_info+0x40/0x58
[   31.694039]  __kasan_kmalloc+0xd4/0xd8
[   31.694663]  __kmalloc_cache_noprof+0x144/0x328
[   31.695389]  ksize_uaf+0xb8/0x5d0
[   31.696034]  kunit_try_run_case+0x14c/0x3d0
[   31.698048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.698758]  kthread+0x24c/0x2d0
[   31.699355]  ret_from_fork+0x10/0x20
[   31.699992] 
[   31.700442] Freed by task 182:
[   31.701171]  kasan_save_stack+0x3c/0x68
[   31.702065]  kasan_save_track+0x20/0x40
[   31.702693]  kasan_save_free_info+0x4c/0x78
[   31.703386]  __kasan_slab_free+0x6c/0x98
[   31.704053]  kfree+0x110/0x3b8
[   31.704603]  ksize_uaf+0x120/0x5d0
[   31.705521]  kunit_try_run_case+0x14c/0x3d0
[   31.706206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.706963]  kthread+0x24c/0x2d0
[   31.707601]  ret_from_fork+0x10/0x20
[   31.708283] 
[   31.708720] The buggy address belongs to the object at fff00000c5802200
[   31.708720]  which belongs to the cache kmalloc-128 of size 128
[   31.710353] The buggy address is located 0 bytes inside of
[   31.710353]  freed 128-byte region [fff00000c5802200, fff00000c5802280)
[   31.711712] 
[   31.712197] The buggy address belongs to the physical page:
[   31.713320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105802
[   31.714314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.715044] page_type: f5(slab)
[   31.715502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.716412] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.718411] page dumped because: kasan: bad access detected
[   31.719194] 
[   31.719550] Memory state around the buggy address:
[   31.720161]  fff00000c5802100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.721014]  fff00000c5802180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.722098] >fff00000c5802200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.722965]                    ^
[   31.723762]  fff00000c5802280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.724605]  fff00000c5802300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.725715] ==================================================================

test log snippet boot parser 81

Home

[   33.195964] ==================================================================
[   33.197343] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   33.198068] Read of size 1 at addr fff00000c6830d00 by task kunit_try_catch/213
[   33.198867] 
[   33.200544] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.201901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.202404] Hardware name: linux,dummy-virt (DT)
[   33.202685] Call trace:
[   33.202873]  dump_backtrace+0x9c/0x128
[   33.203401]  show_stack+0x20/0x38
[   33.203845]  dump_stack_lvl+0x8c/0xd0
[   33.205045]  print_report+0x118/0x5e0
[   33.206446]  kasan_report+0xc8/0x118
[   33.207201]  __asan_report_load1_noabort+0x20/0x30
[   33.207952]  mempool_uaf_helper+0x320/0x348
[   33.208641]  mempool_kmalloc_uaf+0xbc/0x118
[   33.209647]  kunit_try_run_case+0x14c/0x3d0
[   33.210348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.211128]  kthread+0x24c/0x2d0
[   33.211613]  ret_from_fork+0x10/0x20
[   33.212402] 
[   33.213692] Allocated by task 213:
[   33.214207]  kasan_save_stack+0x3c/0x68
[   33.214966]  kasan_save_track+0x20/0x40
[   33.215578]  kasan_save_alloc_info+0x40/0x58
[   33.216236]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.217328]  remove_element+0x130/0x1f8
[   33.217915]  mempool_alloc_preallocated+0x58/0xc0
[   33.218618]  mempool_uaf_helper+0xa4/0x348
[   33.219241]  mempool_kmalloc_uaf+0xbc/0x118
[   33.219860]  kunit_try_run_case+0x14c/0x3d0
[   33.220549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.222160]  kthread+0x24c/0x2d0
[   33.223134]  ret_from_fork+0x10/0x20
[   33.223754] 
[   33.224152] Freed by task 213:
[   33.225117]  kasan_save_stack+0x3c/0x68
[   33.225724]  kasan_save_track+0x20/0x40
[   33.226347]  kasan_save_free_info+0x4c/0x78
[   33.226967]  __kasan_mempool_poison_object+0xc0/0x150
[   33.227683]  mempool_free+0x28c/0x328
[   33.228243]  mempool_uaf_helper+0x108/0x348
[   33.229611]  mempool_kmalloc_uaf+0xbc/0x118
[   33.230495]  kunit_try_run_case+0x14c/0x3d0
[   33.231563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.232307]  kthread+0x24c/0x2d0
[   33.233055]  ret_from_fork+0x10/0x20
[   33.234045] 
[   33.234464] The buggy address belongs to the object at fff00000c6830d00
[   33.234464]  which belongs to the cache kmalloc-128 of size 128
[   33.235725] The buggy address is located 0 bytes inside of
[   33.235725]  freed 128-byte region [fff00000c6830d00, fff00000c6830d80)
[   33.237331] 
[   33.237638] The buggy address belongs to the physical page:
[   33.238185] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106830
[   33.239962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.241097] page_type: f5(slab)
[   33.241689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.242259] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.243323] page dumped because: kasan: bad access detected
[   33.244190] 
[   33.244529] Memory state around the buggy address:
[   33.245675]  fff00000c6830c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.246723]  fff00000c6830c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.248169] >fff00000c6830d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.249167]                    ^
[   33.250023]  fff00000c6830d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.250801]  fff00000c6830e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.251724] ==================================================================

test log snippet boot parser 82

Home

[   33.308589] ==================================================================
[   33.309640] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   33.310586] Read of size 1 at addr fff00000c684f240 by task kunit_try_catch/217
[   33.311490] 
[   33.311890] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.313425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.314222] Hardware name: linux,dummy-virt (DT)
[   33.314845] Call trace:
[   33.315351]  dump_backtrace+0x9c/0x128
[   33.316042]  show_stack+0x20/0x38
[   33.316558]  dump_stack_lvl+0x8c/0xd0
[   33.317300]  print_report+0x118/0x5e0
[   33.317863]  kasan_report+0xc8/0x118
[   33.318546]  __asan_report_load1_noabort+0x20/0x30
[   33.319467]  mempool_uaf_helper+0x320/0x348
[   33.320032]  mempool_slab_uaf+0xb8/0x110
[   33.320640]  kunit_try_run_case+0x14c/0x3d0
[   33.321778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.322586]  kthread+0x24c/0x2d0
[   33.323152]  ret_from_fork+0x10/0x20
[   33.323657] 
[   33.324079] Allocated by task 217:
[   33.324618]  kasan_save_stack+0x3c/0x68
[   33.325507]  kasan_save_track+0x20/0x40
[   33.325954]  kasan_save_alloc_info+0x40/0x58
[   33.326535]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.327595]  remove_element+0x16c/0x1f8
[   33.328585]  mempool_alloc_preallocated+0x58/0xc0
[   33.329622]  mempool_uaf_helper+0xa4/0x348
[   33.330297]  mempool_slab_uaf+0xb8/0x110
[   33.331061]  kunit_try_run_case+0x14c/0x3d0
[   33.331721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.332578]  kthread+0x24c/0x2d0
[   33.333365]  ret_from_fork+0x10/0x20
[   33.334168] 
[   33.334597] Freed by task 217:
[   33.335179]  kasan_save_stack+0x3c/0x68
[   33.335879]  kasan_save_track+0x20/0x40
[   33.336547]  kasan_save_free_info+0x4c/0x78
[   33.337524]  __kasan_mempool_poison_object+0xc0/0x150
[   33.338284]  mempool_free+0x28c/0x328
[   33.339020]  mempool_uaf_helper+0x108/0x348
[   33.339775]  mempool_slab_uaf+0xb8/0x110
[   33.340523]  kunit_try_run_case+0x14c/0x3d0
[   33.341369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.342037]  kthread+0x24c/0x2d0
[   33.342475]  ret_from_fork+0x10/0x20
[   33.343017] 
[   33.343376] The buggy address belongs to the object at fff00000c684f240
[   33.343376]  which belongs to the cache test_cache of size 123
[   33.344784] The buggy address is located 0 bytes inside of
[   33.344784]  freed 123-byte region [fff00000c684f240, fff00000c684f2bb)
[   33.346865] 
[   33.347250] The buggy address belongs to the physical page:
[   33.347948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10684f
[   33.349392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.350363] page_type: f5(slab)
[   33.351152] raw: 0bfffe0000000000 fff00000c5709780 dead000000000122 0000000000000000
[   33.352237] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   33.353571] page dumped because: kasan: bad access detected
[   33.354318] 
[   33.354811] Memory state around the buggy address:
[   33.355475]  fff00000c684f100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.356361]  fff00000c684f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.357566] >fff00000c684f200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.358649]                                            ^
[   33.359445]  fff00000c684f280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.360315]  fff00000c684f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.361445] ==================================================================

test log snippet boot parser 83

Home

[   31.857309] ==================================================================
[   31.858249] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.859206] Read of size 4 at addr fff00000c57a7d40 by task swapper/1/0
[   31.859958] 
[   31.860457] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.10-rc1 #1
[   31.861716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.862330] Hardware name: linux,dummy-virt (DT)
[   31.862860] Call trace:
[   31.863340]  dump_backtrace+0x9c/0x128
[   31.863828]  show_stack+0x20/0x38
[   31.864310]  dump_stack_lvl+0x8c/0xd0
[   31.864921]  print_report+0x118/0x5e0
[   31.865545]  kasan_report+0xc8/0x118
[   31.866167]  __asan_report_load4_noabort+0x20/0x30
[   31.866869]  rcu_uaf_reclaim+0x64/0x70
[   31.867454]  rcu_core+0xa54/0x1df8
[   31.868079]  rcu_core_si+0x18/0x30
[   31.868643]  handle_softirqs+0x36c/0xb18
[   31.869137]  __do_softirq+0x1c/0x28
[   31.869716]  ____do_softirq+0x18/0x30
[   31.870338]  call_on_irq_stack+0x24/0x58
[   31.871010]  do_softirq_own_stack+0x24/0x38
[   31.871507]  irq_exit_rcu+0x1a4/0x268
[   31.872112]  el1_interrupt+0x38/0x58
[   31.872710]  el1h_64_irq_handler+0x18/0x28
[   31.873359]  el1h_64_irq+0x64/0x68
[   31.873848]  arch_local_irq_enable+0x4/0x8
[   31.874511]  do_idle+0x388/0x4f0
[   31.875045]  cpu_startup_entry+0x68/0x80
[   31.875587]  secondary_start_kernel+0x288/0x340
[   31.876295]  __secondary_switched+0xb8/0xc0
[   31.876815] 
[   31.877193] Allocated by task 184:
[   31.877748]  kasan_save_stack+0x3c/0x68
[   31.878269]  kasan_save_track+0x20/0x40
[   31.878881]  kasan_save_alloc_info+0x40/0x58
[   31.879458]  __kasan_kmalloc+0xd4/0xd8
[   31.879946]  __kmalloc_cache_noprof+0x144/0x328
[   31.880670]  rcu_uaf+0xb8/0x2e0
[   31.881227]  kunit_try_run_case+0x14c/0x3d0
[   31.881892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.882553]  kthread+0x24c/0x2d0
[   31.883130]  ret_from_fork+0x10/0x20
[   31.883712] 
[   31.884092] Freed by task 0:
[   31.884576]  kasan_save_stack+0x3c/0x68
[   31.885175]  kasan_save_track+0x20/0x40
[   31.885778]  kasan_save_free_info+0x4c/0x78
[   31.886338]  __kasan_slab_free+0x6c/0x98
[   31.886965]  kfree+0x110/0x3b8
[   31.887471]  rcu_uaf_reclaim+0x28/0x70
[   31.888088]  rcu_core+0xa54/0x1df8
[   31.888561]  rcu_core_si+0x18/0x30
[   31.889157]  handle_softirqs+0x36c/0xb18
[   31.889646]  __do_softirq+0x1c/0x28
[   31.890233] 
[   31.890681] Last potentially related work creation:
[   31.891313]  kasan_save_stack+0x3c/0x68
[   31.891827]  __kasan_record_aux_stack+0xbc/0xe8
[   31.892525]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.893208]  __call_rcu_common.constprop.0+0x74/0xa18
[   31.893810]  call_rcu+0x18/0x30
[   31.894381]  rcu_uaf+0x150/0x2e0
[   31.894948]  kunit_try_run_case+0x14c/0x3d0
[   31.895475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.896254]  kthread+0x24c/0x2d0
[   31.896776]  ret_from_fork+0x10/0x20
[   31.897401] 
[   31.897803] The buggy address belongs to the object at fff00000c57a7d40
[   31.897803]  which belongs to the cache kmalloc-32 of size 32
[   31.899646] The buggy address is located 0 bytes inside of
[   31.899646]  freed 32-byte region [fff00000c57a7d40, fff00000c57a7d60)
[   31.900901] 
[   31.901281] The buggy address belongs to the physical page:
[   31.902024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a7
[   31.902849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.903589] page_type: f5(slab)
[   31.904163] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.904953] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.905776] page dumped because: kasan: bad access detected
[   31.906508] 
[   31.906827] Memory state around the buggy address:
[   31.907358]  fff00000c57a7c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.908269]  fff00000c57a7c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.909013] >fff00000c57a7d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.909808]                                            ^
[   31.910432]  fff00000c57a7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.911246]  fff00000c57a7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.912045] ==================================================================

test log snippet boot parser 84

Home

[   33.963387] ==================================================================
[   33.964544] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   33.965420] Read of size 1 at addr fff00000c685bf10 by task kunit_try_catch/245
[   33.965813] 
[   33.966018] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.966816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.967415] Hardware name: linux,dummy-virt (DT)
[   33.968171] Call trace:
[   33.968733]  dump_backtrace+0x9c/0x128
[   33.969624]  show_stack+0x20/0x38
[   33.970041]  dump_stack_lvl+0x8c/0xd0
[   33.970640]  print_report+0x118/0x5e0
[   33.971220]  kasan_report+0xc8/0x118
[   33.971849]  __asan_report_load1_noabort+0x20/0x30
[   33.972534]  strchr+0xcc/0xd8
[   33.973503]  kasan_strings+0x18c/0x938
[   33.974159]  kunit_try_run_case+0x14c/0x3d0
[   33.974752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.975588]  kthread+0x24c/0x2d0
[   33.976231]  ret_from_fork+0x10/0x20
[   33.977140] 
[   33.977547] Allocated by task 245:
[   33.978158]  kasan_save_stack+0x3c/0x68
[   33.978717]  kasan_save_track+0x20/0x40
[   33.979379]  kasan_save_alloc_info+0x40/0x58
[   33.980033]  __kasan_kmalloc+0xd4/0xd8
[   33.980710]  __kmalloc_cache_noprof+0x144/0x328
[   33.981630]  kasan_strings+0xb0/0x938
[   33.982235]  kunit_try_run_case+0x14c/0x3d0
[   33.982886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.983639]  kthread+0x24c/0x2d0
[   33.984234]  ret_from_fork+0x10/0x20
[   33.985017] 
[   33.985631] Freed by task 245:
[   33.986166]  kasan_save_stack+0x3c/0x68
[   33.986826]  kasan_save_track+0x20/0x40
[   33.987473]  kasan_save_free_info+0x4c/0x78
[   33.988187]  __kasan_slab_free+0x6c/0x98
[   33.989029]  kfree+0x110/0x3b8
[   33.989805]  kasan_strings+0x128/0x938
[   33.990517]  kunit_try_run_case+0x14c/0x3d0
[   33.991125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.991782]  kthread+0x24c/0x2d0
[   33.992327]  ret_from_fork+0x10/0x20
[   33.993184] 
[   33.993553] The buggy address belongs to the object at fff00000c685bf00
[   33.993553]  which belongs to the cache kmalloc-32 of size 32
[   33.994738] The buggy address is located 16 bytes inside of
[   33.994738]  freed 32-byte region [fff00000c685bf00, fff00000c685bf20)
[   33.995851] 
[   33.996256] The buggy address belongs to the physical page:
[   33.997051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   33.997899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.998996] page_type: f5(slab)
[   33.999559] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.000348] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.001582] page dumped because: kasan: bad access detected
[   34.002222] 
[   34.002579] Memory state around the buggy address:
[   34.003145]  fff00000c685be00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.004021]  fff00000c685be80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.005199] >fff00000c685bf00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.005992]                          ^
[   34.006572]  fff00000c685bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.007320]  fff00000c685c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.008148] ==================================================================

test log snippet boot parser 85

Home

[   34.060316] ==================================================================
[   34.061152] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   34.061874] Read of size 1 at addr fff00000c685bf10 by task kunit_try_catch/245
[   34.062862] 
[   34.063221] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.064402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.065024] Hardware name: linux,dummy-virt (DT)
[   34.066234] Call trace:
[   34.066719]  dump_backtrace+0x9c/0x128
[   34.067422]  show_stack+0x20/0x38
[   34.068052]  dump_stack_lvl+0x8c/0xd0
[   34.068831]  print_report+0x118/0x5e0
[   34.069552]  kasan_report+0xc8/0x118
[   34.070150]  __asan_report_load1_noabort+0x20/0x30
[   34.070991]  strcmp+0xc0/0xc8
[   34.071541]  kasan_strings+0x254/0x938
[   34.072082]  kunit_try_run_case+0x14c/0x3d0
[   34.072727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.073482]  kthread+0x24c/0x2d0
[   34.074112]  ret_from_fork+0x10/0x20
[   34.074728] 
[   34.075087] Allocated by task 245:
[   34.075719]  kasan_save_stack+0x3c/0x68
[   34.076293]  kasan_save_track+0x20/0x40
[   34.077273]  kasan_save_alloc_info+0x40/0x58
[   34.077998]  __kasan_kmalloc+0xd4/0xd8
[   34.078527]  __kmalloc_cache_noprof+0x144/0x328
[   34.079282]  kasan_strings+0xb0/0x938
[   34.079825]  kunit_try_run_case+0x14c/0x3d0
[   34.080577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.081629]  kthread+0x24c/0x2d0
[   34.082090]  ret_from_fork+0x10/0x20
[   34.082691] 
[   34.083136] Freed by task 245:
[   34.083628]  kasan_save_stack+0x3c/0x68
[   34.084035]  kasan_save_track+0x20/0x40
[   34.085034]  kasan_save_free_info+0x4c/0x78
[   34.085741]  __kasan_slab_free+0x6c/0x98
[   34.086452]  kfree+0x110/0x3b8
[   34.087067]  kasan_strings+0x128/0x938
[   34.087760]  kunit_try_run_case+0x14c/0x3d0
[   34.088462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.089278]  kthread+0x24c/0x2d0
[   34.089835]  ret_from_fork+0x10/0x20
[   34.090478] 
[   34.090858] The buggy address belongs to the object at fff00000c685bf00
[   34.090858]  which belongs to the cache kmalloc-32 of size 32
[   34.092072] The buggy address is located 16 bytes inside of
[   34.092072]  freed 32-byte region [fff00000c685bf00, fff00000c685bf20)
[   34.093776] 
[   34.094187] The buggy address belongs to the physical page:
[   34.094844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   34.095809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.096596] page_type: f5(slab)
[   34.097188] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.098187] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.099058] page dumped because: kasan: bad access detected
[   34.099696] 
[   34.100117] Memory state around the buggy address:
[   34.100723]  fff00000c685be00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.101658]  fff00000c685be80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.102858] >fff00000c685bf00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.103711]                          ^
[   34.104675]  fff00000c685bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.105877]  fff00000c685c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.106839] ==================================================================

test log snippet boot parser 86

Home

[   34.156024] ==================================================================
[   34.157180] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   34.157959] Read of size 1 at addr fff00000c685bf10 by task kunit_try_catch/245
[   34.158752] 
[   34.159159] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.160265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.161210] Hardware name: linux,dummy-virt (DT)
[   34.161784] Call trace:
[   34.162158]  dump_backtrace+0x9c/0x128
[   34.162710]  show_stack+0x20/0x38
[   34.163304]  dump_stack_lvl+0x8c/0xd0
[   34.163848]  print_report+0x118/0x5e0
[   34.164473]  kasan_report+0xc8/0x118
[   34.165332]  __asan_report_load1_noabort+0x20/0x30
[   34.166019]  strlen+0xa8/0xb0
[   34.166569]  kasan_strings+0x334/0x938
[   34.167122]  kunit_try_run_case+0x14c/0x3d0
[   34.167796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.168595]  kthread+0x24c/0x2d0
[   34.169478]  ret_from_fork+0x10/0x20
[   34.170109] 
[   34.170475] Allocated by task 245:
[   34.170961]  kasan_save_stack+0x3c/0x68
[   34.171599]  kasan_save_track+0x20/0x40
[   34.172204]  kasan_save_alloc_info+0x40/0x58
[   34.173181]  __kasan_kmalloc+0xd4/0xd8
[   34.173667]  __kmalloc_cache_noprof+0x144/0x328
[   34.174381]  kasan_strings+0xb0/0x938
[   34.174908]  kunit_try_run_case+0x14c/0x3d0
[   34.175587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.176247]  kthread+0x24c/0x2d0
[   34.177611]  ret_from_fork+0x10/0x20
[   34.178353] 
[   34.178715] Freed by task 245:
[   34.179176]  kasan_save_stack+0x3c/0x68
[   34.179818]  kasan_save_track+0x20/0x40
[   34.180656]  kasan_save_free_info+0x4c/0x78
[   34.181576]  __kasan_slab_free+0x6c/0x98
[   34.182143]  kfree+0x110/0x3b8
[   34.182671]  kasan_strings+0x128/0x938
[   34.183688]  kunit_try_run_case+0x14c/0x3d0
[   34.184497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.185552]  kthread+0x24c/0x2d0
[   34.186012]  ret_from_fork+0x10/0x20
[   34.186487] 
[   34.186856] The buggy address belongs to the object at fff00000c685bf00
[   34.186856]  which belongs to the cache kmalloc-32 of size 32
[   34.188025] The buggy address is located 16 bytes inside of
[   34.188025]  freed 32-byte region [fff00000c685bf00, fff00000c685bf20)
[   34.189699] 
[   34.190046] The buggy address belongs to the physical page:
[   34.190849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   34.191824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.193004] page_type: f5(slab)
[   34.193819] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.194736] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.195605] page dumped because: kasan: bad access detected
[   34.196287] 
[   34.197724] Memory state around the buggy address:
[   34.198273]  fff00000c685be00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.199156]  fff00000c685be80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.200011] >fff00000c685bf00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.201053]                          ^
[   34.201753]  fff00000c685bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.202524]  fff00000c685c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.203344] ==================================================================

test log snippet boot parser 87

Home

[   34.206304] ==================================================================
[   34.207248] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   34.208131] Read of size 1 at addr fff00000c685bf10 by task kunit_try_catch/245
[   34.209390] 
[   34.209905] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.211032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.211686] Hardware name: linux,dummy-virt (DT)
[   34.212250] Call trace:
[   34.213075]  dump_backtrace+0x9c/0x128
[   34.213738]  show_stack+0x20/0x38
[   34.214353]  dump_stack_lvl+0x8c/0xd0
[   34.214919]  print_report+0x118/0x5e0
[   34.215580]  kasan_report+0xc8/0x118
[   34.216118]  __asan_report_load1_noabort+0x20/0x30
[   34.217181]  strnlen+0x80/0x88
[   34.217762]  kasan_strings+0x398/0x938
[   34.218320]  kunit_try_run_case+0x14c/0x3d0
[   34.219049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.219793]  kthread+0x24c/0x2d0
[   34.220291]  ret_from_fork+0x10/0x20
[   34.221255] 
[   34.221630] Allocated by task 245:
[   34.222196]  kasan_save_stack+0x3c/0x68
[   34.222786]  kasan_save_track+0x20/0x40
[   34.223337]  kasan_save_alloc_info+0x40/0x58
[   34.224015]  __kasan_kmalloc+0xd4/0xd8
[   34.224851]  __kmalloc_cache_noprof+0x144/0x328
[   34.225510]  kasan_strings+0xb0/0x938
[   34.226008]  kunit_try_run_case+0x14c/0x3d0
[   34.226658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.227546]  kthread+0x24c/0x2d0
[   34.228081]  ret_from_fork+0x10/0x20
[   34.229223] 
[   34.229570] Freed by task 245:
[   34.230063]  kasan_save_stack+0x3c/0x68
[   34.230726]  kasan_save_track+0x20/0x40
[   34.231322]  kasan_save_free_info+0x4c/0x78
[   34.231849]  __kasan_slab_free+0x6c/0x98
[   34.232507]  kfree+0x110/0x3b8
[   34.233347]  kasan_strings+0x128/0x938
[   34.233866]  kunit_try_run_case+0x14c/0x3d0
[   34.234552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.235250]  kthread+0x24c/0x2d0
[   34.235707]  ret_from_fork+0x10/0x20
[   34.236331] 
[   34.237014] The buggy address belongs to the object at fff00000c685bf00
[   34.237014]  which belongs to the cache kmalloc-32 of size 32
[   34.238202] The buggy address is located 16 bytes inside of
[   34.238202]  freed 32-byte region [fff00000c685bf00, fff00000c685bf20)
[   34.239411] 
[   34.239782] The buggy address belongs to the physical page:
[   34.240494] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   34.241536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.242588] page_type: f5(slab)
[   34.243132] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.244059] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.245299] page dumped because: kasan: bad access detected
[   34.245961] 
[   34.246333] Memory state around the buggy address:
[   34.246968]  fff00000c685be00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.248301]  fff00000c685be80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.249349] >fff00000c685bf00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.250375]                          ^
[   34.251339]  fff00000c685bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.252659]  fff00000c685c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.253756] ==================================================================

test log snippet boot parser 88

Home

[   34.010328] ==================================================================
[   34.011010] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   34.011743] Read of size 1 at addr fff00000c685bf10 by task kunit_try_catch/245
[   34.012709] 
[   34.013140] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.015472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.016034] Hardware name: linux,dummy-virt (DT)
[   34.016597] Call trace:
[   34.017115]  dump_backtrace+0x9c/0x128
[   34.017699]  show_stack+0x20/0x38
[   34.018179]  dump_stack_lvl+0x8c/0xd0
[   34.018796]  print_report+0x118/0x5e0
[   34.019785]  kasan_report+0xc8/0x118
[   34.020343]  __asan_report_load1_noabort+0x20/0x30
[   34.021325]  strrchr+0x6c/0x78
[   34.021851]  kasan_strings+0x1f0/0x938
[   34.022391]  kunit_try_run_case+0x14c/0x3d0
[   34.023069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.023849]  kthread+0x24c/0x2d0
[   34.024443]  ret_from_fork+0x10/0x20
[   34.025307] 
[   34.025690] Allocated by task 245:
[   34.026260]  kasan_save_stack+0x3c/0x68
[   34.026766]  kasan_save_track+0x20/0x40
[   34.027398]  kasan_save_alloc_info+0x40/0x58
[   34.028254]  __kasan_kmalloc+0xd4/0xd8
[   34.029075]  __kmalloc_cache_noprof+0x144/0x328
[   34.029775]  kasan_strings+0xb0/0x938
[   34.030360]  kunit_try_run_case+0x14c/0x3d0
[   34.030960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.031632]  kthread+0x24c/0x2d0
[   34.032216]  ret_from_fork+0x10/0x20
[   34.033247] 
[   34.034342] Freed by task 245:
[   34.034908]  kasan_save_stack+0x3c/0x68
[   34.035453]  kasan_save_track+0x20/0x40
[   34.036161]  kasan_save_free_info+0x4c/0x78
[   34.036853]  __kasan_slab_free+0x6c/0x98
[   34.037457]  kfree+0x110/0x3b8
[   34.037946]  kasan_strings+0x128/0x938
[   34.038862]  kunit_try_run_case+0x14c/0x3d0
[   34.039638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.040343]  kthread+0x24c/0x2d0
[   34.041248]  ret_from_fork+0x10/0x20
[   34.042076] 
[   34.042451] The buggy address belongs to the object at fff00000c685bf00
[   34.042451]  which belongs to the cache kmalloc-32 of size 32
[   34.043908] The buggy address is located 16 bytes inside of
[   34.043908]  freed 32-byte region [fff00000c685bf00, fff00000c685bf20)
[   34.045343] 
[   34.045715] The buggy address belongs to the physical page:
[   34.046361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10685b
[   34.047792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.049140] page_type: f5(slab)
[   34.049712] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.050566] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.051397] page dumped because: kasan: bad access detected
[   34.051960] 
[   34.052341] Memory state around the buggy address:
[   34.053188]  fff00000c685be00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.054356]  fff00000c685be80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.054966] >fff00000c685bf00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.055631]                          ^
[   34.056231]  fff00000c685bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.056964]  fff00000c685c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.058024] ==================================================================

test log snippet boot parser 89

Home

[   31.930821] ==================================================================
[   31.931965] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0
[   31.934252] Read of size 8 at addr fff00000c57ae780 by task kunit_try_catch/186
[   31.934898] 
[   31.935178] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.936353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.936813] Hardware name: linux,dummy-virt (DT)
[   31.937507] Call trace:
[   31.937932]  dump_backtrace+0x9c/0x128
[   31.938578]  show_stack+0x20/0x38
[   31.939380]  dump_stack_lvl+0x8c/0xd0
[   31.940002]  print_report+0x118/0x5e0
[   31.940500]  kasan_report+0xc8/0x118
[   31.941333]  __asan_report_load8_noabort+0x20/0x30
[   31.942059]  workqueue_uaf+0x498/0x4c0
[   31.942620]  kunit_try_run_case+0x14c/0x3d0
[   31.943236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.943942]  kthread+0x24c/0x2d0
[   31.944476]  ret_from_fork+0x10/0x20
[   31.945355] 
[   31.945728] Allocated by task 186:
[   31.946329]  kasan_save_stack+0x3c/0x68
[   31.946936]  kasan_save_track+0x20/0x40
[   31.947496]  kasan_save_alloc_info+0x40/0x58
[   31.948188]  __kasan_kmalloc+0xd4/0xd8
[   31.948736]  __kmalloc_cache_noprof+0x144/0x328
[   31.949898]  workqueue_uaf+0x140/0x4c0
[   31.950720]  kunit_try_run_case+0x14c/0x3d0
[   31.951393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.952095]  kthread+0x24c/0x2d0
[   31.952662]  ret_from_fork+0x10/0x20
[   31.953278] 
[   31.953644] Freed by task 10:
[   31.954140]  kasan_save_stack+0x3c/0x68
[   31.954617]  kasan_save_track+0x20/0x40
[   31.956277]  kasan_save_free_info+0x4c/0x78
[   31.957079]  __kasan_slab_free+0x6c/0x98
[   31.957901]  kfree+0x110/0x3b8
[   31.958460]  workqueue_uaf_work+0x18/0x30
[   31.959112]  process_one_work+0x530/0xfa8
[   31.959649]  worker_thread+0x614/0xf28
[   31.960317]  kthread+0x24c/0x2d0
[   31.960920]  ret_from_fork+0x10/0x20
[   31.961532] 
[   31.961826] Last potentially related work creation:
[   31.962506]  kasan_save_stack+0x3c/0x68
[   31.963134]  __kasan_record_aux_stack+0xbc/0xe8
[   31.963645]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.964382]  __queue_work+0x654/0xfe0
[   31.965447]  queue_work_on+0xbc/0xf8
[   31.966208]  workqueue_uaf+0x218/0x4c0
[   31.966900]  kunit_try_run_case+0x14c/0x3d0
[   31.967739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.968676]  kthread+0x24c/0x2d0
[   31.969580]  ret_from_fork+0x10/0x20
[   31.970100] 
[   31.970460] The buggy address belongs to the object at fff00000c57ae780
[   31.970460]  which belongs to the cache kmalloc-32 of size 32
[   31.971813] The buggy address is located 0 bytes inside of
[   31.971813]  freed 32-byte region [fff00000c57ae780, fff00000c57ae7a0)
[   31.973669] 
[   31.974319] The buggy address belongs to the physical page:
[   31.975322] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ae
[   31.976602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.977581] page_type: f5(slab)
[   31.978246] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.979305] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.980336] page dumped because: kasan: bad access detected
[   31.981325] 
[   31.981686] Memory state around the buggy address:
[   31.982366]  fff00000c57ae680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.983228]  fff00000c57ae700: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.984020] >fff00000c57ae780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.985020]                    ^
[   31.985565]  fff00000c57ae800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.986343]  fff00000c57ae880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.987255] ==================================================================

test log snippet boot parser 90

Home

[   33.725842] ==================================================================
[   33.727246] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   33.727999] Read of size 1 at addr ffff800080b67cba by task kunit_try_catch/235
[   33.728757] 
[   33.729948] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.731041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.731565] Hardware name: linux,dummy-virt (DT)
[   33.732155] Call trace:
[   33.732565]  dump_backtrace+0x9c/0x128
[   33.733510]  show_stack+0x20/0x38
[   33.734027]  dump_stack_lvl+0x8c/0xd0
[   33.734516]  print_report+0x2fc/0x5e0
[   33.735140]  kasan_report+0xc8/0x118
[   33.735620]  __asan_report_load1_noabort+0x20/0x30
[   33.736340]  kasan_stack_oob+0x238/0x270
[   33.737264]  kunit_try_run_case+0x14c/0x3d0
[   33.738291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.739144]  kthread+0x24c/0x2d0
[   33.739689]  ret_from_fork+0x10/0x20
[   33.740255] 
[   33.740852] The buggy address belongs to stack of task kunit_try_catch/235
[   33.741820]  and is located at offset 138 in frame:
[   33.742586]  kasan_stack_oob+0x0/0x270
[   33.743832] 
[   33.744246] This frame has 4 objects:
[   33.745012]  [48, 49) '__assertion'
[   33.745604]  [64, 72) 'array'
[   33.746074]  [96, 112) '__assertion'
[   33.746625]  [128, 138) 'stack_array'
[   33.747170] 
[   33.748024] The buggy address belongs to the virtual mapping at
[   33.748024]  [ffff800080b60000, ffff800080b69000) created by:
[   33.748024]  kernel_clone+0x140/0x790
[   33.750789] 
[   33.751259] The buggy address belongs to the physical page:
[   33.752074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10682c
[   33.753114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.753752] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.754946] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.755882] page dumped because: kasan: bad access detected
[   33.756641] 
[   33.757866] Memory state around the buggy address:
[   33.758512]  ffff800080b67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.759434]  ffff800080b67c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   33.760186] >ffff800080b67c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   33.760925]                                         ^
[   33.761528]  ffff800080b67d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   33.762395]  ffff800080b67d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.763126] ==================================================================

test log snippet boot parser 91

Home

[   29.926040] ==================================================================
[   29.927427] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300
[   29.928181] Read of size 1 at addr fff00000c690c000 by task kunit_try_catch/134
[   29.929580] 
[   29.930011] CPU: 1 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.931654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.932210] Hardware name: linux,dummy-virt (DT)
[   29.932605] Call trace:
[   29.933304]  dump_backtrace+0x9c/0x128
[   29.934310]  show_stack+0x20/0x38
[   29.934825]  dump_stack_lvl+0x8c/0xd0
[   29.935346]  print_report+0x118/0x5e0
[   29.935944]  kasan_report+0xc8/0x118
[   29.937148]  __asan_report_load1_noabort+0x20/0x30
[   29.937720]  kmalloc_large_uaf+0x2d8/0x300
[   29.938216]  kunit_try_run_case+0x14c/0x3d0
[   29.938924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.939725]  kthread+0x24c/0x2d0
[   29.940240]  ret_from_fork+0x10/0x20
[   29.940907] 
[   29.941730] The buggy address belongs to the physical page:
[   29.942537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10690c
[   29.943318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.944096] raw: 0bfffe0000000000 ffffc1ffc31a4408 fff00000da526140 0000000000000000
[   29.945187] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.946344] page dumped because: kasan: bad access detected
[   29.947471] 
[   29.947830] Memory state around the buggy address:
[   29.948515]  fff00000c690bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.949326]  fff00000c690bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.950225] >fff00000c690c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.951527]                    ^
[   29.952046]  fff00000c690c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.952963]  fff00000c690c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.954471] ==================================================================

test log snippet boot parser 92

Home

[   33.264526] ==================================================================
[   33.266173] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   33.267071] Read of size 1 at addr fff00000c6a68000 by task kunit_try_catch/215
[   33.268144] 
[   33.268562] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.269878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.270579] Hardware name: linux,dummy-virt (DT)
[   33.271127] Call trace:
[   33.271617]  dump_backtrace+0x9c/0x128
[   33.272299]  show_stack+0x20/0x38
[   33.272907]  dump_stack_lvl+0x8c/0xd0
[   33.273434]  print_report+0x118/0x5e0
[   33.274076]  kasan_report+0xc8/0x118
[   33.274540]  __asan_report_load1_noabort+0x20/0x30
[   33.275234]  mempool_uaf_helper+0x320/0x348
[   33.275770]  mempool_kmalloc_large_uaf+0xbc/0x118
[   33.276466]  kunit_try_run_case+0x14c/0x3d0
[   33.277223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277944]  kthread+0x24c/0x2d0
[   33.278796]  ret_from_fork+0x10/0x20
[   33.279422] 
[   33.279794] The buggy address belongs to the physical page:
[   33.280441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a68
[   33.281851] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.282942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.283872] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.284756] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.285718] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.286841] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.287681] head: 0bfffe0000000002 ffffc1ffc31a9a01 ffffffffffffffff 0000000000000000
[   33.288505] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.289740] page dumped because: kasan: bad access detected
[   33.290293] 
[   33.290691] Memory state around the buggy address:
[   33.291364]  fff00000c6a67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.292149]  fff00000c6a67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.292803] >fff00000c6a68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.293927]                    ^
[   33.294511]  fff00000c6a68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.295318]  fff00000c6a68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.296151] ==================================================================

test log snippet boot parser 93

Home

[   33.381937] ==================================================================
[   33.383081] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   33.383901] Read of size 1 at addr fff00000c699c000 by task kunit_try_catch/219
[   33.384779] 
[   33.385568] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.386422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.386854] Hardware name: linux,dummy-virt (DT)
[   33.388381] Call trace:
[   33.389015]  dump_backtrace+0x9c/0x128
[   33.389553]  show_stack+0x20/0x38
[   33.390536]  dump_stack_lvl+0x8c/0xd0
[   33.391445]  print_report+0x118/0x5e0
[   33.392091]  kasan_report+0xc8/0x118
[   33.392619]  __asan_report_load1_noabort+0x20/0x30
[   33.393269]  mempool_uaf_helper+0x320/0x348
[   33.393803]  mempool_page_alloc_uaf+0xb8/0x118
[   33.394881]  kunit_try_run_case+0x14c/0x3d0
[   33.395651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.396532]  kthread+0x24c/0x2d0
[   33.397440]  ret_from_fork+0x10/0x20
[   33.397895] 
[   33.398197] The buggy address belongs to the physical page:
[   33.399431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10699c
[   33.400535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.401732] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.402334] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.403139] page dumped because: kasan: bad access detected
[   33.403738] 
[   33.404029] Memory state around the buggy address:
[   33.404508]  fff00000c699bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.405180]  fff00000c699bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.407152] >fff00000c699c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.407504]                    ^
[   33.407719]  fff00000c699c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.408165]  fff00000c699c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.409495] ==================================================================

test log snippet boot parser 94

Home

[   30.017809] ==================================================================
[   30.018837] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368
[   30.019630] Read of size 1 at addr fff00000c69d0000 by task kunit_try_catch/140
[   30.020612] 
[   30.021077] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.022561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.023103] Hardware name: linux,dummy-virt (DT)
[   30.023669] Call trace:
[   30.024137]  dump_backtrace+0x9c/0x128
[   30.024937]  show_stack+0x20/0x38
[   30.025544]  dump_stack_lvl+0x8c/0xd0
[   30.026083]  print_report+0x118/0x5e0
[   30.026621]  kasan_report+0xc8/0x118
[   30.027263]  __asan_report_load1_noabort+0x20/0x30
[   30.027846]  page_alloc_uaf+0x33c/0x368
[   30.028540]  kunit_try_run_case+0x14c/0x3d0
[   30.029291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.030046]  kthread+0x24c/0x2d0
[   30.030636]  ret_from_fork+0x10/0x20
[   30.031234] 
[   30.031601] The buggy address belongs to the physical page:
[   30.032326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d0
[   30.033522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.034516] page_type: f0(buddy)
[   30.035027] raw: 0bfffe0000000000 fff00000ff6162e0 fff00000ff6162e0 0000000000000000
[   30.035942] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   30.036879] page dumped because: kasan: bad access detected
[   30.037763] 
[   30.038216] Memory state around the buggy address:
[   30.038822]  fff00000c69cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.039573]  fff00000c69cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.040475] >fff00000c69d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.041626]                    ^
[   30.042278]  fff00000c69d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.043141]  fff00000c69d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.043940] ==================================================================

test log snippet boot parser 95

Home

[   54.784931] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[   54.785946] Modules linked in:
[   54.790139] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   54.791483] Tainted: [N]=TEST
[   54.791883] Hardware name: linux,dummy-virt (DT)
[   54.792717] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   54.793459] pc : kunit_test_null_dereference+0x6c/0x15c
[   54.795723] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[   54.796492] sp : ffff800080f37da0
[   54.797043] x29: ffff800080f37da0 x28: 0000000000000000 x27: 0000000000000000
[   54.798505] x26: 0000000000000000 x25: fff00000c7b74900 x24: fff00000c7b74900
[   54.799692] x23: fff00000c7b74908 x22: ffff92a5727c64f4 x21: ffff92a575ef6dd8
[   54.800561] x20: ffff800080087a20 x19: 1ffff000101e6fba x18: 00000000767ced12
[   54.801053] x17: ffff92a57325ce68 x16: 1ffe00001b4bbd78 x15: 0000000000000003
[   54.801551] x14: 1ffe00001b4bbd8a x13: fffd800018f6ea12 x12: 1ffe000018f6ea11
[   54.802026] x11: 1ffe000018f6ea11 x10: fffd800018f6ea11 x9 : dfff800000000000
[   54.803075] x8 : 0000000000000001 x7 : fffd800018f6ea12 x6 : fff00000c7b7508c
[   54.804595] x5 : 0000000041b58ab3 x4 : ffff7000101e6fba x3 : 00000000f1f1f1f1
[   54.805666] x2 : 0000000000000003 x1 : dfff800000000000 x0 : ffff800080087a20
[   54.806821] Call trace:
[   54.807478]  kunit_test_null_dereference+0x6c/0x15c
[   54.808155]  kunit_generic_run_threadfn_adapter+0x80/0xec
[   54.808920]  kthread+0x330/0x3e8
[   54.809463]  ret_from_fork+0x10/0x20
[   54.810573] Code: 72be5e42 b9000482 aa0003f4 52800062 (39c00020) 
[   54.811909] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 96

Home

------------[ cut here ]------------
[  175.019075] WARNING: CPU: 1 PID: 1189 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0
[  175.020173] Modules linked in:
[  175.021237] CPU: 1 UID: 0 PID: 1189 Comm: kunit_try_catch Tainted: G    B D          N 6.12.10-rc1 #1
[  175.022275] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  175.022933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  175.023608] RIP: 0010:__drm_connector_init+0xcdf/0x11c0
[  175.024391] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00
[  175.025948] RSP: 0000:ffff888104d67c38 EFLAGS: 00010246
[  175.026396] RAX: dffffc0000000000 RBX: ffffffffbbfbe5c0 RCX: 0000000000000000
[  175.027223] RDX: 1ffffffff77f2ab2 RSI: ffff888104c68010 RDI: ffffffffbbf95590
[  175.028089] RBP: ffff888104d67cb0 R08: 0000000000000000 R09: ffffffffbbfaa0e0
[  175.028968] R10: 0000000000000003 R11: ffffffffb7c044aa R12: ffff888104c68010
[  175.029585] R13: ffff888100c90000 R14: 0000000000000000 R15: ffffffffbbf95540
[  175.030200] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  175.030891] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  175.031349] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  175.032019] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  175.032745] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  175.033329] Call Trace:
[  175.033736]  <TASK>
[  175.034066]  ? show_regs+0x68/0x80
[  175.034423]  ? __warn+0xd5/0x260
[  175.034915]  ? __drm_connector_init+0xcdf/0x11c0
[  175.035421]  ? report_bug+0x278/0x2e0
[  175.035953]  ? handle_bug+0x5c/0xb0
[  175.036392]  ? exc_invalid_op+0x1c/0x50
[  175.036927]  ? asm_exc_invalid_op+0x1f/0x30
[  175.037366]  ? ret_from_fork_asm+0x1a/0x30
[  175.037902]  ? __drm_connector_init+0xcdf/0x11c0
[  175.038441]  ? __drmm_add_action+0x1a4/0x280
[  175.039007]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.039630]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.040207]  drmm_connector_init+0xdc/0x170
[  175.040786]  ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80
[  175.041431]  drm_client_modeset_test_init+0x336/0x730
[  175.042028]  ? __pfx_drm_client_modeset_test_init+0x10/0x10
[  175.042673]  ? __schedule+0xc51/0x27c0
[  175.043075]  kunit_try_run_case+0x176/0x490
[  175.043674]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.044187]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  175.044784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  175.045254]  ? __kthread_parkme+0x82/0x160
[  175.045827]  ? preempt_count_sub+0x50/0x80
[  175.046347]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.046905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  175.047472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  175.047987]  kthread+0x257/0x310
[  175.048310]  ? __pfx_kthread+0x10/0x10
[  175.048872]  ret_from_fork+0x41/0x80
[  175.049321]  ? __pfx_kthread+0x10/0x10
[  175.049823]  ret_from_fork_asm+0x1a/0x30
[  175.050308]  </TASK>
[  175.050753] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 97

Home

------------[ cut here ]------------
[  175.252339] WARNING: CPU: 0 PID: 1197 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0
[  175.253018] Modules linked in:
[  175.253300] CPU: 0 UID: 0 PID: 1197 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  175.255063] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  175.255954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  175.256706] RIP: 0010:__drm_connector_init+0xcdf/0x11c0
[  175.257246] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00
[  175.258699] RSP: 0000:ffff888104d67c38 EFLAGS: 00010246
[  175.259423] RAX: dffffc0000000000 RBX: ffffffffbbfbe5c0 RCX: 0000000000000000
[  175.260623] RDX: 1ffffffff77f2ab2 RSI: ffff888105f7e010 RDI: ffffffffbbf95590
[  175.261338] RBP: ffff888104d67cb0 R08: 0000000000000000 R09: ffffffffbbfaa0e0
[  175.262118] R10: 0000000000000003 R11: 00000000d398d679 R12: ffff888105f7e010
[  175.263028] R13: ffff888100cae000 R14: 0000000000000000 R15: ffffffffbbf95540
[  175.263973] FS:  0000000000000000(0000) GS:ffff88815b000000(0000) knlGS:0000000000000000
[  175.264929] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  175.265970] CR2: 00007ffff7ffd000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  175.266540] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1322
[  175.267096] DR3: ffffffffbdfc1323 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  175.267628] Call Trace:
[  175.268605]  <TASK>
[  175.268904]  ? show_regs+0x68/0x80
[  175.269325]  ? __warn+0xd5/0x260
[  175.270302]  ? __drm_connector_init+0xcdf/0x11c0
[  175.270952]  ? report_bug+0x278/0x2e0
[  175.271318]  ? handle_bug+0x5c/0xb0
[  175.272206]  ? exc_invalid_op+0x1c/0x50
[  175.272891]  ? asm_exc_invalid_op+0x1f/0x30
[  175.273453]  ? __drm_connector_init+0xcdf/0x11c0
[  175.274110]  ? __drmm_add_action+0x1a4/0x280
[  175.274900]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.275384]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.276320]  drmm_connector_init+0xdc/0x170
[  175.276917]  ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80
[  175.277568]  drm_client_modeset_test_init+0x336/0x730
[  175.278235]  ? __pfx_drm_client_modeset_test_init+0x10/0x10
[  175.278870]  ? __schedule+0xc51/0x27c0
[  175.279277]  kunit_try_run_case+0x176/0x490
[  175.280857]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.281311]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  175.282174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  175.282955]  ? __kthread_parkme+0x82/0x160
[  175.283405]  ? preempt_count_sub+0x50/0x80
[  175.284029]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.284634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  175.285253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  175.286179]  kthread+0x257/0x310
[  175.287063]  ? __pfx_kthread+0x10/0x10
[  175.287441]  ret_from_fork+0x41/0x80
[  175.287824]  ? __pfx_kthread+0x10/0x10
[  175.288236]  ret_from_fork_asm+0x1a/0x30
[  175.288625]  </TASK>
[  175.289654] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 98

Home

------------[ cut here ]------------
[  175.139640] WARNING: CPU: 1 PID: 1193 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0
[  175.140906] Modules linked in:
[  175.142010] CPU: 1 UID: 0 PID: 1193 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  175.144861] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  175.145268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  175.146729] RIP: 0010:__drm_connector_init+0xcdf/0x11c0
[  175.147125] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00
[  175.148634] RSP: 0000:ffff888104e6fc38 EFLAGS: 00010246
[  175.149118] RAX: dffffc0000000000 RBX: ffffffffbbfbe5c0 RCX: 0000000000000000
[  175.149855] RDX: 1ffffffff77f2ab2 RSI: ffff888105db6010 RDI: ffffffffbbf95590
[  175.150765] RBP: ffff888104e6fcb0 R08: 0000000000000000 R09: ffffffffbbfaa0e0
[  175.151925] R10: 0000000000000003 R11: 00000000d398d679 R12: ffff888105db6010
[  175.152431] R13: ffff888100ca2000 R14: 0000000000000000 R15: ffffffffbbf95540
[  175.153186] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  175.153886] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  175.155434] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  175.156142] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  175.156645] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  175.157188] Call Trace:
[  175.157474]  <TASK>
[  175.158148]  ? show_regs+0x68/0x80
[  175.158962]  ? __warn+0xd5/0x260
[  175.159786]  ? __drm_connector_init+0xcdf/0x11c0
[  175.160516]  ? report_bug+0x278/0x2e0
[  175.161242]  ? handle_bug+0x5c/0xb0
[  175.161866]  ? exc_invalid_op+0x1c/0x50
[  175.162304]  ? asm_exc_invalid_op+0x1f/0x30
[  175.162728]  ? __drm_connector_init+0xcdf/0x11c0
[  175.163410]  ? __drmm_add_action+0x1a4/0x280
[  175.164494]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.165618]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.166153]  drmm_connector_init+0xdc/0x170
[  175.166580]  ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80
[  175.167091]  drm_client_modeset_test_init+0x336/0x730
[  175.167633]  ? __pfx_drm_client_modeset_test_init+0x10/0x10
[  175.168415]  ? __schedule+0xc51/0x27c0
[  175.169038]  kunit_try_run_case+0x176/0x490
[  175.169660]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.170166]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  175.170702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  175.171234]  ? __kthread_parkme+0x82/0x160
[  175.171837]  ? preempt_count_sub+0x50/0x80
[  175.172244]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.173001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  175.173516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  175.174454]  kthread+0x257/0x310
[  175.174783]  ? __pfx_kthread+0x10/0x10
[  175.175376]  ret_from_fork+0x41/0x80
[  175.175783]  ? __pfx_kthread+0x10/0x10
[  175.176126]  ret_from_fork_asm+0x1a/0x30
[  175.176585]  </TASK>
[  175.176983] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 99

Home

------------[ cut here ]------------
[  175.196122] WARNING: CPU: 1 PID: 1195 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0
[  175.198034] Modules linked in:
[  175.198394] CPU: 1 UID: 0 PID: 1195 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  175.199467] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  175.200158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  175.201346] RIP: 0010:__drm_connector_init+0xcdf/0x11c0
[  175.202196] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00
[  175.203610] RSP: 0000:ffff888107917c38 EFLAGS: 00010246
[  175.204267] RAX: dffffc0000000000 RBX: ffffffffbbfbe5c0 RCX: 0000000000000000
[  175.205570] RDX: 1ffffffff77f2ab2 RSI: ffff8881070ac010 RDI: ffffffffbbf95590
[  175.206405] RBP: ffff888107917cb0 R08: 0000000000000000 R09: ffffffffbbfaa0e0
[  175.207438] R10: 0000000000000003 R11: 00000000d398d679 R12: ffff8881070ac010
[  175.208085] R13: ffff888100ca0000 R14: 0000000000000000 R15: ffffffffbbf95540
[  175.209313] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  175.210569] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  175.210871] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  175.211456] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  175.212549] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  175.213109] Call Trace:
[  175.214365]  <TASK>
[  175.214804]  ? show_regs+0x68/0x80
[  175.215254]  ? __warn+0xd5/0x260
[  175.215640]  ? __drm_connector_init+0xcdf/0x11c0
[  175.216070]  ? report_bug+0x278/0x2e0
[  175.216499]  ? handle_bug+0x5c/0xb0
[  175.217110]  ? exc_invalid_op+0x1c/0x50
[  175.217775]  ? asm_exc_invalid_op+0x1f/0x30
[  175.218275]  ? __drm_connector_init+0xcdf/0x11c0
[  175.218910]  ? __drmm_add_action+0x1a4/0x280
[  175.219438]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.220181]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.221329]  drmm_connector_init+0xdc/0x170
[  175.221954]  ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80
[  175.223329]  drm_client_modeset_test_init+0x336/0x730
[  175.223851]  ? __pfx_drm_client_modeset_test_init+0x10/0x10
[  175.224760]  ? __schedule+0xc51/0x27c0
[  175.225148]  kunit_try_run_case+0x176/0x490
[  175.225776]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.226199]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  175.226699]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  175.227577]  ? __kthread_parkme+0x82/0x160
[  175.228326]  ? preempt_count_sub+0x50/0x80
[  175.229024]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.229515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  175.230434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  175.231435]  kthread+0x257/0x310
[  175.231928]  ? __pfx_kthread+0x10/0x10
[  175.232396]  ret_from_fork+0x41/0x80
[  175.233138]  ? __pfx_kthread+0x10/0x10
[  175.233832]  ret_from_fork_asm+0x1a/0x30
[  175.234277]  </TASK>
[  175.235109] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 100

Home

------------[ cut here ]------------
[  175.084388] WARNING: CPU: 1 PID: 1191 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0
[  175.085272] Modules linked in:
[  175.085747] CPU: 1 UID: 0 PID: 1191 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  175.086755] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  175.087269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  175.088516] RIP: 0010:__drm_connector_init+0xcdf/0x11c0
[  175.089076] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00
[  175.090835] RSP: 0000:ffff88810793fc38 EFLAGS: 00010246
[  175.091348] RAX: dffffc0000000000 RBX: ffffffffbbfbe5c0 RCX: 0000000000000000
[  175.092304] RDX: 1ffffffff77f2ab2 RSI: ffff888107056010 RDI: ffffffffbbf95590
[  175.093801] RBP: ffff88810793fcb0 R08: 0000000000000000 R09: ffffffffbbfaa0e0
[  175.094432] R10: 0000000000000003 R11: 00000000d398d679 R12: ffff888107056010
[  175.095395] R13: ffff888100ca5000 R14: 0000000000000000 R15: ffffffffbbf95540
[  175.096459] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  175.097306] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  175.098481] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  175.098980] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  175.099530] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  175.100348] Call Trace:
[  175.100874]  <TASK>
[  175.101228]  ? show_regs+0x68/0x80
[  175.102099]  ? __warn+0xd5/0x260
[  175.102654]  ? __drm_connector_init+0xcdf/0x11c0
[  175.103284]  ? report_bug+0x278/0x2e0
[  175.104183]  ? handle_bug+0x5c/0xb0
[  175.104519]  ? exc_invalid_op+0x1c/0x50
[  175.105234]  ? asm_exc_invalid_op+0x1f/0x30
[  175.106129]  ? __drm_connector_init+0xcdf/0x11c0
[  175.106544]  ? __drmm_add_action+0x1a4/0x280
[  175.107147]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.107807]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  175.108867]  drmm_connector_init+0xdc/0x170
[  175.109464]  ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80
[  175.110316]  drm_client_modeset_test_init+0x336/0x730
[  175.110922]  ? __pfx_drm_client_modeset_test_init+0x10/0x10
[  175.111434]  ? __schedule+0xc51/0x27c0
[  175.112005]  kunit_try_run_case+0x176/0x490
[  175.112888]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.113292]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  175.114071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  175.114520]  ? __kthread_parkme+0x82/0x160
[  175.115126]  ? preempt_count_sub+0x50/0x80
[  175.115959]  ? __pfx_kunit_try_run_case+0x10/0x10
[  175.116913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  175.117980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  175.118384]  kthread+0x257/0x310
[  175.119123]  ? __pfx_kthread+0x10/0x10
[  175.119771]  ret_from_fork+0x41/0x80
[  175.120303]  ? __pfx_kthread+0x10/0x10
[  175.120586]  ret_from_fork_asm+0x1a/0x30
[  175.121371]  </TASK>
[  175.122265] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 101

Home

------------[ cut here ]------------
[  179.364498] WARNING: CPU: 1 PID: 2179 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  179.365463] Modules linked in:
[  179.367003] CPU: 1 UID: 0 PID: 2179 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  179.367819] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  179.368304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  179.369638] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  179.370597] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  179.372259] RSP: 0000:ffff888103dafce8 EFLAGS: 00010286
[  179.372702] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  179.373243] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffbbffb540
[  179.374455] RBP: ffff888103dafd10 R08: 0000000000000000 R09: ffffed1020d253c0
[  179.375095] R10: ffff888106929e07 R11: 0000000000000000 R12: ffffffffbbffb528
[  179.376170] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888103dafda8
[  179.376624] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  179.377489] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  179.378697] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  179.379347] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  179.380129] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  179.380751] Call Trace:
[  179.381059]  <TASK>
[  179.381519]  ? show_regs+0x68/0x80
[  179.382111]  ? __warn+0xd5/0x260
[  179.382633]  ? drm_rect_calc_hscale+0x125/0x190
[  179.383136]  ? report_bug+0x278/0x2e0
[  179.383686]  ? handle_bug+0x5c/0xb0
[  179.384184]  ? exc_invalid_op+0x1c/0x50
[  179.384843]  ? asm_exc_invalid_op+0x1f/0x30
[  179.385213]  ? drm_rect_calc_hscale+0x125/0x190
[  179.386140]  drm_test_rect_calc_hscale+0x109/0x270
[  179.386847]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  179.387429]  ? __schedule+0xc51/0x27c0
[  179.388014]  ? __pfx_read_tsc+0x10/0x10
[  179.388650]  ? ktime_get_ts64+0x84/0x230
[  179.389165]  kunit_try_run_case+0x1b3/0x490
[  179.389588]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.390485]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  179.391095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  179.392029]  ? __kthread_parkme+0x82/0x160
[  179.392657]  ? preempt_count_sub+0x50/0x80
[  179.393631]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.394041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  179.394662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  179.395827]  kthread+0x257/0x310
[  179.396079]  ? __pfx_kthread+0x10/0x10
[  179.396592]  ret_from_fork+0x41/0x80
[  179.397112]  ? __pfx_kthread+0x10/0x10
[  179.397689]  ret_from_fork_asm+0x1a/0x30
[  179.398232]  </TASK>
[  179.398635] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 102

Home

------------[ cut here ]------------
[  179.404885] WARNING: CPU: 1 PID: 2181 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  179.406344] Modules linked in:
[  179.406763] CPU: 1 UID: 0 PID: 2181 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  179.407786] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  179.408497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  179.409615] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  179.410192] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  179.411658] RSP: 0000:ffff88810307fce8 EFLAGS: 00010286
[  179.412375] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  179.413170] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffbbffb578
[  179.414176] RBP: ffff88810307fd10 R08: 0000000000000000 R09: ffffed1020d253e0
[  179.415035] R10: ffff888106929f07 R11: 0000000000000000 R12: ffffffffbbffb560
[  179.415810] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810307fda8
[  179.416359] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  179.416980] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  179.417440] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  179.418666] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  179.419393] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  179.420382] Call Trace:
[  179.421047]  <TASK>
[  179.421450]  ? show_regs+0x68/0x80
[  179.422280]  ? __warn+0xd5/0x260
[  179.422763]  ? drm_rect_calc_hscale+0x125/0x190
[  179.423280]  ? report_bug+0x278/0x2e0
[  179.424002]  ? handle_bug+0x5c/0xb0
[  179.424418]  ? exc_invalid_op+0x1c/0x50
[  179.425001]  ? asm_exc_invalid_op+0x1f/0x30
[  179.425742]  ? drm_rect_calc_hscale+0x125/0x190
[  179.426554]  drm_test_rect_calc_hscale+0x109/0x270
[  179.427212]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  179.427915]  ? __schedule+0xc51/0x27c0
[  179.428436]  ? __pfx_read_tsc+0x10/0x10
[  179.428913]  ? ktime_get_ts64+0x84/0x230
[  179.429854]  kunit_try_run_case+0x1b3/0x490
[  179.430312]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.430936]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  179.431431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  179.432169]  ? __kthread_parkme+0x82/0x160
[  179.432665]  ? preempt_count_sub+0x50/0x80
[  179.433362]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.434237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  179.435036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  179.435746]  kthread+0x257/0x310
[  179.436135]  ? __pfx_kthread+0x10/0x10
[  179.436590]  ret_from_fork+0x41/0x80
[  179.437018]  ? __pfx_kthread+0x10/0x10
[  179.437570]  ret_from_fork_asm+0x1a/0x30
[  179.438515]  </TASK>
[  179.439020] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 103

Home

------------[ cut here ]------------
[  179.464256] WARNING: CPU: 1 PID: 2191 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  179.465176] Modules linked in:
[  179.465522] CPU: 1 UID: 0 PID: 2191 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  179.466888] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  179.467511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  179.468574] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  179.469248] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  179.470750] RSP: 0000:ffff888106a77ce8 EFLAGS: 00010286
[  179.471186] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  179.472258] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffbbffb53c
[  179.472844] RBP: ffff888106a77d10 R08: 0000000000000000 R09: ffffed1020df66e0
[  179.473356] R10: ffff888106fb3707 R11: 0000000000000000 R12: ffffffffbbffb528
[  179.474273] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888106a77da8
[  179.475066] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  179.475888] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  179.476563] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  179.477275] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  179.478050] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  179.478869] Call Trace:
[  179.479287]  <TASK>
[  179.479788]  ? show_regs+0x68/0x80
[  179.480311]  ? __warn+0xd5/0x260
[  179.480917]  ? drm_rect_calc_vscale+0x130/0x190
[  179.481557]  ? report_bug+0x278/0x2e0
[  179.482188]  ? handle_bug+0x5c/0xb0
[  179.482602]  ? exc_invalid_op+0x1c/0x50
[  179.483179]  ? asm_exc_invalid_op+0x1f/0x30
[  179.483742]  ? drm_rect_calc_vscale+0x130/0x190
[  179.484336]  drm_test_rect_calc_vscale+0x109/0x270
[  179.484997]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  179.485529]  ? __schedule+0xc51/0x27c0
[  179.486286]  ? __pfx_read_tsc+0x10/0x10
[  179.486901]  ? ktime_get_ts64+0x84/0x230
[  179.487589]  kunit_try_run_case+0x1b3/0x490
[  179.488259]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.489027]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  179.489502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  179.490814]  ? __kthread_parkme+0x82/0x160
[  179.491259]  ? preempt_count_sub+0x50/0x80
[  179.492160]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.493060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  179.494105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  179.494842]  kthread+0x257/0x310
[  179.495196]  ? __pfx_kthread+0x10/0x10
[  179.495891]  ret_from_fork+0x41/0x80
[  179.496061]  ? __pfx_kthread+0x10/0x10
[  179.496454]  ret_from_fork_asm+0x1a/0x30
[  179.497185]  </TASK>
[  179.497589] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 104

Home

------------[ cut here ]------------
[  179.503986] WARNING: CPU: 1 PID: 2193 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  179.505457] Modules linked in:
[  179.505992] CPU: 1 UID: 0 PID: 2193 Comm: kunit_try_catch Tainted: G    B D W        N 6.12.10-rc1 #1
[  179.507734] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  179.508855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  179.509647] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  179.510382] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  179.511856] RSP: 0000:ffff888106cefce8 EFLAGS: 00010286
[  179.512406] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  179.512959] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffbbffb574
[  179.513494] RBP: ffff888106cefd10 R08: 0000000000000000 R09: ffffed1020df6720
[  179.514063] R10: ffff888106fb3907 R11: 0000000000000000 R12: ffffffffbbffb560
[  179.514601] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888106cefda8
[  179.515570] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  179.516587] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  179.517612] CR2: 00007ffff7ffe000 CR3: 00000000754b4000 CR4: 00000000000006f0
[  179.518355] DR0: ffffffffbdfc1320 DR1: ffffffffbdfc1321 DR2: ffffffffbdfc1323
[  179.519211] DR3: ffffffffbdfc1325 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  179.519749] Call Trace:
[  179.520033]  <TASK>
[  179.520324]  ? show_regs+0x68/0x80
[  179.520670]  ? __warn+0xd5/0x260
[  179.522046]  ? drm_rect_calc_vscale+0x130/0x190
[  179.522828]  ? report_bug+0x278/0x2e0
[  179.523330]  ? handle_bug+0x5c/0xb0
[  179.524206]  ? exc_invalid_op+0x1c/0x50
[  179.524575]  ? asm_exc_invalid_op+0x1f/0x30
[  179.525474]  ? drm_rect_calc_vscale+0x130/0x190
[  179.526217]  drm_test_rect_calc_vscale+0x109/0x270
[  179.526756]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  179.527179]  ? __schedule+0x1b8d/0x27c0
[  179.527598]  ? __pfx_read_tsc+0x10/0x10
[  179.528099]  ? ktime_get_ts64+0x84/0x230
[  179.528616]  kunit_try_run_case+0x1b3/0x490
[  179.529055]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.529779]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  179.530198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  179.530662]  ? __kthread_parkme+0x82/0x160
[  179.531117]  ? preempt_count_sub+0x50/0x80
[  179.531495]  ? __pfx_kunit_try_run_case+0x10/0x10
[  179.532177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  179.532788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  179.533386]  kthread+0x257/0x310
[  179.533857]  ? __pfx_kthread+0x10/0x10
[  179.534322]  ret_from_fork+0x41/0x80
[  179.534871]  ? __pfx_kthread+0x10/0x10
[  179.535248]  ret_from_fork_asm+0x1a/0x30
[  179.535756]  </TASK>
[  179.536045] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 105

Home

[   19.326334] ==================================================================
[   19.327864] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x31f/0x380
[   19.328610] Read of size 1 at addr ffff888102b47c9f by task kunit_try_catch/255
[   19.329698] 
[   19.330464] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.331388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.331761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.332558] Call Trace:
[   19.333387]  <TASK>
[   19.333627]  dump_stack_lvl+0x73/0xb0
[   19.334709]  print_report+0xd1/0x640
[   19.335199]  ? __virt_addr_valid+0x1db/0x2d0
[   19.335671]  ? kasan_addr_to_slab+0x11/0xa0
[   19.336712]  kasan_report+0x102/0x140
[   19.337108]  ? kasan_alloca_oob_left+0x31f/0x380
[   19.337881]  ? kasan_alloca_oob_left+0x31f/0x380
[   19.338507]  __asan_report_load1_noabort+0x18/0x20
[   19.338970]  kasan_alloca_oob_left+0x31f/0x380
[   19.339888]  ? trace_event_raw_event_ipi_send_cpu+0x100/0x1e0
[   19.340393]  ? __schedule+0xc51/0x27c0
[   19.341023]  ? trace_hardirqs_on+0x37/0xe0
[   19.341453]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   19.342079]  ? __schedule+0xc51/0x27c0
[   19.342594]  ? __pfx_read_tsc+0x10/0x10
[   19.343554]  ? ktime_get_ts64+0x84/0x230
[   19.343948]  kunit_try_run_case+0x1b3/0x490
[   19.344960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.345391]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.345823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.346267]  ? __kthread_parkme+0x82/0x160
[   19.346643]  ? preempt_count_sub+0x50/0x80
[   19.347924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.348498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.349180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.349853]  kthread+0x257/0x310
[   19.350351]  ? __pfx_kthread+0x10/0x10
[   19.350907]  ret_from_fork+0x41/0x80
[   19.351207]  ? __pfx_kthread+0x10/0x10
[   19.352093]  ret_from_fork_asm+0x1a/0x30
[   19.352447]  </TASK>
[   19.353016] 
[   19.354003] The buggy address belongs to stack of task kunit_try_catch/255
[   19.354520] 
[   19.354756] The buggy address belongs to the physical page:
[   19.355186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b47
[   19.356136] flags: 0x200000000000000(node=0|zone=2)
[   19.356617] raw: 0200000000000000 ffffea00040ad1c8 ffffea00040ad1c8 0000000000000000
[   19.357335] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.358038] page dumped because: kasan: bad access detected
[   19.358496] 
[   19.358766] Memory state around the buggy address:
[   19.359221]  ffff888102b47b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.360126]  ffff888102b47c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.360725] >ffff888102b47c80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00
[   19.361346]                             ^
[   19.361887]  ffff888102b47d00: 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3
[   19.362430]  ffff888102b47d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   19.363165] ==================================================================

test log snippet boot parser 106

Home

[   19.368915] ==================================================================
[   19.369954] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x328/0x390
[   19.370658] Read of size 1 at addr ffff888102bb7caa by task kunit_try_catch/257
[   19.371315] 
[   19.371531] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.372277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.372936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.373529] Call Trace:
[   19.373944]  <TASK>
[   19.374207]  dump_stack_lvl+0x73/0xb0
[   19.374803]  print_report+0xd1/0x640
[   19.375145]  ? __virt_addr_valid+0x1db/0x2d0
[   19.375532]  ? kasan_addr_to_slab+0x11/0xa0
[   19.375992]  kasan_report+0x102/0x140
[   19.376395]  ? kasan_alloca_oob_right+0x328/0x390
[   19.377631]  ? kasan_alloca_oob_right+0x328/0x390
[   19.378123]  __asan_report_load1_noabort+0x18/0x20
[   19.379378]  kasan_alloca_oob_right+0x328/0x390
[   19.379790]  ? irqentry_exit+0x2a/0x60
[   19.380332]  ? get_eff_addr_reg+0x260/0x430
[   19.380820]  ? trace_hardirqs_on+0x37/0xe0
[   19.381232]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   19.381685]  ? __pfx_read_tsc+0x10/0x10
[   19.382237]  ? ktime_get_ts64+0x84/0x230
[   19.382898]  kunit_try_run_case+0x1b3/0x490
[   19.383342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.383884]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.384330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.384941]  ? __kthread_parkme+0x82/0x160
[   19.385313]  ? preempt_count_sub+0x50/0x80
[   19.385909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.386396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.387106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.387903]  kthread+0x257/0x310
[   19.388276]  ? __pfx_kthread+0x10/0x10
[   19.388682]  ret_from_fork+0x41/0x80
[   19.389072]  ? __pfx_kthread+0x10/0x10
[   19.389399]  ret_from_fork_asm+0x1a/0x30
[   19.389747]  </TASK>
[   19.390171] 
[   19.390441] The buggy address belongs to stack of task kunit_try_catch/257
[   19.391156] 
[   19.391372] The buggy address belongs to the physical page:
[   19.392006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb7
[   19.392884] flags: 0x200000000000000(node=0|zone=2)
[   19.393443] raw: 0200000000000000 ffffea00040aedc8 ffffea00040aedc8 0000000000000000
[   19.394300] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.395061] page dumped because: kasan: bad access detected
[   19.395693] 
[   19.395898] Memory state around the buggy address:
[   19.396325]  ffff888102bb7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.397010]  ffff888102bb7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.397715] >ffff888102bb7c80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00
[   19.398378]                                   ^
[   19.399042]  ffff888102bb7d00: 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3
[   19.399724]  ffff888102bb7d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   19.400332] ==================================================================

test log snippet boot parser 107

Home

[   17.212421] ==================================================================
[   17.213200] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   17.214731] Free of addr ffff888101e64360 by task kunit_try_catch/196
[   17.215175] 
[   17.215395] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.216803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.217164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.217962] Call Trace:
[   17.218211]  <TASK>
[   17.218912]  dump_stack_lvl+0x73/0xb0
[   17.219357]  print_report+0xd1/0x640
[   17.219847]  ? __virt_addr_valid+0x1db/0x2d0
[   17.220174]  ? kfree_sensitive+0x2e/0x90
[   17.220619]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.221122]  ? kfree_sensitive+0x2e/0x90
[   17.221569]  kasan_report_invalid_free+0xc0/0xf0
[   17.222032]  ? kfree_sensitive+0x2e/0x90
[   17.222986]  ? kfree_sensitive+0x2e/0x90
[   17.223505]  check_slab_allocation+0x101/0x130
[   17.224169]  __kasan_slab_pre_free+0x28/0x40
[   17.224606]  kfree+0xf1/0x3d0
[   17.225226]  ? kfree_sensitive+0x2e/0x90
[   17.225651]  kfree_sensitive+0x2e/0x90
[   17.226419]  kmalloc_double_kzfree+0x19d/0x360
[   17.227054]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   17.227593]  ? __schedule+0xc51/0x27c0
[   17.228078]  ? __pfx_read_tsc+0x10/0x10
[   17.228664]  ? ktime_get_ts64+0x84/0x230
[   17.229197]  kunit_try_run_case+0x1b3/0x490
[   17.230135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.230805]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.231212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.231856]  ? __kthread_parkme+0x82/0x160
[   17.232326]  ? preempt_count_sub+0x50/0x80
[   17.233138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.233851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.234418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.234942]  kthread+0x257/0x310
[   17.235276]  ? __pfx_kthread+0x10/0x10
[   17.235677]  ret_from_fork+0x41/0x80
[   17.236738]  ? __pfx_kthread+0x10/0x10
[   17.237160]  ret_from_fork_asm+0x1a/0x30
[   17.237560]  </TASK>
[   17.237824] 
[   17.238002] Allocated by task 196:
[   17.238385]  kasan_save_stack+0x3d/0x60
[   17.238738]  kasan_save_track+0x18/0x40
[   17.239881]  kasan_save_alloc_info+0x3b/0x50
[   17.240442]  __kasan_kmalloc+0xb7/0xc0
[   17.240988]  __kmalloc_cache_noprof+0x162/0x350
[   17.241998]  kmalloc_double_kzfree+0xaa/0x360
[   17.242409]  kunit_try_run_case+0x1b3/0x490
[   17.243163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.244098]  kthread+0x257/0x310
[   17.244384]  ret_from_fork+0x41/0x80
[   17.244969]  ret_from_fork_asm+0x1a/0x30
[   17.245375] 
[   17.245651] Freed by task 196:
[   17.245956]  kasan_save_stack+0x3d/0x60
[   17.246408]  kasan_save_track+0x18/0x40
[   17.246951]  kasan_save_free_info+0x3f/0x60
[   17.247418]  __kasan_slab_free+0x56/0x70
[   17.247914]  kfree+0x123/0x3d0
[   17.248175]  kfree_sensitive+0x67/0x90
[   17.249022]  kmalloc_double_kzfree+0x12c/0x360
[   17.249546]  kunit_try_run_case+0x1b3/0x490
[   17.250019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.250743]  kthread+0x257/0x310
[   17.251166]  ret_from_fork+0x41/0x80
[   17.251750]  ret_from_fork_asm+0x1a/0x30
[   17.252266] 
[   17.252616] The buggy address belongs to the object at ffff888101e64360
[   17.252616]  which belongs to the cache kmalloc-16 of size 16
[   17.254119] The buggy address is located 0 bytes inside of
[   17.254119]  16-byte region [ffff888101e64360, ffff888101e64370)
[   17.255007] 
[   17.255232] The buggy address belongs to the physical page:
[   17.255714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e64
[   17.256600] flags: 0x200000000000000(node=0|zone=2)
[   17.257067] page_type: f5(slab)
[   17.257746] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.258410] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   17.259164] page dumped because: kasan: bad access detected
[   17.260077] 
[   17.260289] Memory state around the buggy address:
[   17.260904]  ffff888101e64200: 00 02 fc fc 00 03 fc fc fa fb fc fc 00 02 fc fc
[   17.261645]  ffff888101e64280: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.262286] >ffff888101e64300: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.263025]                                                        ^
[   17.263744]  ffff888101e64380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.264341]  ffff888101e64400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.265072] ==================================================================

test log snippet boot parser 108

Home

[   17.761384] ==================================================================
[   17.762366] BUG: KASAN: double-free in kmem_cache_double_free+0x1e6/0x490
[   17.763015] Free of addr ffff888102008000 by task kunit_try_catch/213
[   17.763539] 
[   17.764008] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.765633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.766380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.767252] Call Trace:
[   17.767473]  <TASK>
[   17.767676]  dump_stack_lvl+0x73/0xb0
[   17.768005]  print_report+0xd1/0x640
[   17.768296]  ? __virt_addr_valid+0x1db/0x2d0
[   17.768638]  ? kmem_cache_double_free+0x1e6/0x490
[   17.769030]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.770047]  ? kmem_cache_double_free+0x1e6/0x490
[   17.770410]  kasan_report_invalid_free+0xc0/0xf0
[   17.771968]  ? kmem_cache_double_free+0x1e6/0x490
[   17.772357]  ? kmem_cache_double_free+0x1e6/0x490
[   17.772908]  check_slab_allocation+0x101/0x130
[   17.773448]  __kasan_slab_pre_free+0x28/0x40
[   17.774085]  kmem_cache_free+0xee/0x400
[   17.774666]  ? kmem_cache_alloc_noprof+0x101/0x340
[   17.775123]  ? kmem_cache_double_free+0x1e6/0x490
[   17.776080]  kmem_cache_double_free+0x1e6/0x490
[   17.776542]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   17.776964]  ? finish_task_switch.isra.0+0x153/0x700
[   17.777445]  ? __switch_to+0x5d9/0xf60
[   17.777916]  ? irqentry_exit+0x2a/0x60
[   17.778404]  ? trace_hardirqs_on+0x37/0xe0
[   17.778961]  ? __pfx_read_tsc+0x10/0x10
[   17.779417]  ? ktime_get_ts64+0x84/0x230
[   17.779915]  kunit_try_run_case+0x1b3/0x490
[   17.780415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.781031]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.781952]  ? __kthread_parkme+0x82/0x160
[   17.782398]  ? preempt_count_sub+0x50/0x80
[   17.782998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.783438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.784133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.784827]  kthread+0x257/0x310
[   17.785170]  ? __pfx_kthread+0x10/0x10
[   17.785705]  ret_from_fork+0x41/0x80
[   17.786103]  ? __pfx_kthread+0x10/0x10
[   17.786990]  ret_from_fork_asm+0x1a/0x30
[   17.787376]  </TASK>
[   17.787704] 
[   17.787905] Allocated by task 213:
[   17.788289]  kasan_save_stack+0x3d/0x60
[   17.788639]  kasan_save_track+0x18/0x40
[   17.789045]  kasan_save_alloc_info+0x3b/0x50
[   17.789401]  __kasan_slab_alloc+0x91/0xa0
[   17.789942]  kmem_cache_alloc_noprof+0x101/0x340
[   17.790389]  kmem_cache_double_free+0x150/0x490
[   17.790915]  kunit_try_run_case+0x1b3/0x490
[   17.791395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.791950]  kthread+0x257/0x310
[   17.792331]  ret_from_fork+0x41/0x80
[   17.792861]  ret_from_fork_asm+0x1a/0x30
[   17.793328] 
[   17.794233] Freed by task 213:
[   17.794729]  kasan_save_stack+0x3d/0x60
[   17.795113]  kasan_save_track+0x18/0x40
[   17.795590]  kasan_save_free_info+0x3f/0x60
[   17.796110]  __kasan_slab_free+0x56/0x70
[   17.796640]  kmem_cache_free+0x120/0x400
[   17.797066]  kmem_cache_double_free+0x16b/0x490
[   17.797672]  kunit_try_run_case+0x1b3/0x490
[   17.798130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.799142]  kthread+0x257/0x310
[   17.799493]  ret_from_fork+0x41/0x80
[   17.800036]  ret_from_fork_asm+0x1a/0x30
[   17.800572] 
[   17.800817] The buggy address belongs to the object at ffff888102008000
[   17.800817]  which belongs to the cache test_cache of size 200
[   17.801698] The buggy address is located 0 bytes inside of
[   17.801698]  200-byte region [ffff888102008000, ffff8881020080c8)
[   17.802471] 
[   17.802682] The buggy address belongs to the physical page:
[   17.803356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102008
[   17.804306] flags: 0x200000000000000(node=0|zone=2)
[   17.805445] page_type: f5(slab)
[   17.805924] raw: 0200000000000000 ffff8881015d1780 dead000000000122 0000000000000000
[   17.806573] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   17.807068] page dumped because: kasan: bad access detected
[   17.807540] 
[   17.807736] Memory state around the buggy address:
[   17.808339]  ffff888102007f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.809013]  ffff888102007f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.809666] >ffff888102008000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.810317]                    ^
[   17.811142]  ffff888102008080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.811803]  ffff888102008100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.812444] ==================================================================

test log snippet boot parser 109

Home

[   18.961933] ==================================================================
[   18.962656] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   18.963402] Free of addr ffff888101492e00 by task kunit_try_catch/239
[   18.964910] 
[   18.965399] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.966333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.966661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.967367] Call Trace:
[   18.967611]  <TASK>
[   18.968435]  dump_stack_lvl+0x73/0xb0
[   18.969005]  print_report+0xd1/0x640
[   18.969443]  ? __virt_addr_valid+0x1db/0x2d0
[   18.970090]  ? mempool_double_free_helper+0x185/0x370
[   18.970705]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.971260]  ? mempool_double_free_helper+0x185/0x370
[   18.972104]  kasan_report_invalid_free+0xc0/0xf0
[   18.972616]  ? mempool_double_free_helper+0x185/0x370
[   18.973153]  ? mempool_double_free_helper+0x185/0x370
[   18.973617]  ? mempool_double_free_helper+0x185/0x370
[   18.974083]  check_slab_allocation+0x101/0x130
[   18.974479]  __kasan_mempool_poison_object+0x91/0x1d0
[   18.975242]  mempool_free+0x2ec/0x380
[   18.976223]  mempool_double_free_helper+0x185/0x370
[   18.976900]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   18.977723]  ? finish_task_switch.isra.0+0x153/0x700
[   18.978300]  mempool_kmalloc_double_free+0xb1/0x100
[   18.978981]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   18.979967]  ? __switch_to+0x5d9/0xf60
[   18.980284]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.980945]  ? __pfx_mempool_kfree+0x10/0x10
[   18.981578]  ? __pfx_read_tsc+0x10/0x10
[   18.982146]  ? ktime_get_ts64+0x84/0x230
[   18.982727]  kunit_try_run_case+0x1b3/0x490
[   18.983219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.984103]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.984787]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.985372]  ? __kthread_parkme+0x82/0x160
[   18.985915]  ? preempt_count_sub+0x50/0x80
[   18.986588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.987072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.987656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.988581]  kthread+0x257/0x310
[   18.988848]  ? __pfx_kthread+0x10/0x10
[   18.989372]  ret_from_fork+0x41/0x80
[   18.989934]  ? __pfx_kthread+0x10/0x10
[   18.991041]  ret_from_fork_asm+0x1a/0x30
[   18.991814]  </TASK>
[   18.992054] 
[   18.992242] Allocated by task 239:
[   18.993024]  kasan_save_stack+0x3d/0x60
[   18.993603]  kasan_save_track+0x18/0x40
[   18.994002]  kasan_save_alloc_info+0x3b/0x50
[   18.994452]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   18.995117]  remove_element+0x11e/0x190
[   18.995948]  mempool_alloc_preallocated+0x4d/0x90
[   18.996354]  mempool_double_free_helper+0x8b/0x370
[   18.996922]  mempool_kmalloc_double_free+0xb1/0x100
[   18.997872]  kunit_try_run_case+0x1b3/0x490
[   18.998540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.999106]  kthread+0x257/0x310
[   18.999511]  ret_from_fork+0x41/0x80
[   18.999872]  ret_from_fork_asm+0x1a/0x30
[   19.000279] 
[   19.000495] Freed by task 239:
[   19.001448]  kasan_save_stack+0x3d/0x60
[   19.001867]  kasan_save_track+0x18/0x40
[   19.002228]  kasan_save_free_info+0x3f/0x60
[   19.003062]  __kasan_mempool_poison_object+0x131/0x1d0
[   19.003589]  mempool_free+0x2ec/0x380
[   19.004286]  mempool_double_free_helper+0x10a/0x370
[   19.004725]  mempool_kmalloc_double_free+0xb1/0x100
[   19.005362]  kunit_try_run_case+0x1b3/0x490
[   19.005993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.006816]  kthread+0x257/0x310
[   19.007181]  ret_from_fork+0x41/0x80
[   19.007534]  ret_from_fork_asm+0x1a/0x30
[   19.007967] 
[   19.008152] The buggy address belongs to the object at ffff888101492e00
[   19.008152]  which belongs to the cache kmalloc-128 of size 128
[   19.009663] The buggy address is located 0 bytes inside of
[   19.009663]  128-byte region [ffff888101492e00, ffff888101492e80)
[   19.010207] 
[   19.010539] The buggy address belongs to the physical page:
[   19.011837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101492
[   19.012751] flags: 0x200000000000000(node=0|zone=2)
[   19.013246] page_type: f5(slab)
[   19.013952] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.015024] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.015909] page dumped because: kasan: bad access detected
[   19.016293] 
[   19.016542] Memory state around the buggy address:
[   19.017009]  ffff888101492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.017736]  ffff888101492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.019246] >ffff888101492e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.020381]                    ^
[   19.020952]  ffff888101492e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.021677]  ffff888101492f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.022212] ==================================================================

test log snippet boot parser 110

Home

[   19.076932] ==================================================================
[   19.078715] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   19.079399] Free of addr ffff888102b60000 by task kunit_try_catch/243
[   19.080810] 
[   19.081007] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.082234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.082394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.083256] Call Trace:
[   19.083550]  <TASK>
[   19.083865]  dump_stack_lvl+0x73/0xb0
[   19.084288]  print_report+0xd1/0x640
[   19.084722]  ? __virt_addr_valid+0x1db/0x2d0
[   19.085751]  ? mempool_double_free_helper+0x185/0x370
[   19.086257]  ? kasan_addr_to_slab+0x11/0xa0
[   19.086948]  ? mempool_double_free_helper+0x185/0x370
[   19.087681]  kasan_report_invalid_free+0xc0/0xf0
[   19.089173]  ? mempool_double_free_helper+0x185/0x370
[   19.089724]  ? mempool_double_free_helper+0x185/0x370
[   19.090203]  __kasan_mempool_poison_pages+0x115/0x130
[   19.090670]  mempool_free+0x290/0x380
[   19.091012]  mempool_double_free_helper+0x185/0x370
[   19.091565]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   19.092861]  ? finish_task_switch.isra.0+0x153/0x700
[   19.093868]  mempool_page_alloc_double_free+0xac/0x100
[   19.094387]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   19.095128]  ? __switch_to+0x5d9/0xf60
[   19.095988]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   19.096996]  ? __pfx_mempool_free_pages+0x10/0x10
[   19.097796]  ? __pfx_read_tsc+0x10/0x10
[   19.098190]  ? ktime_get_ts64+0x84/0x230
[   19.099027]  kunit_try_run_case+0x1b3/0x490
[   19.099531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.100142]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.100660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.101797]  ? __kthread_parkme+0x82/0x160
[   19.102617]  ? preempt_count_sub+0x50/0x80
[   19.103307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.104043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.104721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.105847]  kthread+0x257/0x310
[   19.106250]  ? __pfx_kthread+0x10/0x10
[   19.106631]  ret_from_fork+0x41/0x80
[   19.107011]  ? __pfx_kthread+0x10/0x10
[   19.107357]  ret_from_fork_asm+0x1a/0x30
[   19.107756]  </TASK>
[   19.108311] 
[   19.108918] The buggy address belongs to the physical page:
[   19.109692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b60
[   19.110641] flags: 0x200000000000000(node=0|zone=2)
[   19.111069] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   19.111978] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.112985] page dumped because: kasan: bad access detected
[   19.113436] 
[   19.113822] Memory state around the buggy address:
[   19.114293]  ffff888102b5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115089]  ffff888102b5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115933] >ffff888102b60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.116509]                    ^
[   19.117214]  ffff888102b60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.117964]  ffff888102b60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.118592] ==================================================================

test log snippet boot parser 111

Home

[   19.029879] ==================================================================
[   19.030792] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   19.031340] Free of addr ffff888102bc8000 by task kunit_try_catch/241
[   19.032515] 
[   19.032956] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.034152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.034788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.035749] Call Trace:
[   19.036215]  <TASK>
[   19.036798]  dump_stack_lvl+0x73/0xb0
[   19.037522]  print_report+0xd1/0x640
[   19.038330]  ? __virt_addr_valid+0x1db/0x2d0
[   19.038941]  ? mempool_double_free_helper+0x185/0x370
[   19.039826]  ? kasan_addr_to_slab+0x11/0xa0
[   19.040331]  ? mempool_double_free_helper+0x185/0x370
[   19.040951]  kasan_report_invalid_free+0xc0/0xf0
[   19.041324]  ? mempool_double_free_helper+0x185/0x370
[   19.041880]  ? mempool_double_free_helper+0x185/0x370
[   19.042381]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   19.043567]  mempool_free+0x2ec/0x380
[   19.043882]  mempool_double_free_helper+0x185/0x370
[   19.044387]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   19.044919]  ? irqentry_exit+0x2a/0x60
[   19.045735]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.046681]  mempool_kmalloc_large_double_free+0xb1/0x100
[   19.047262]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   19.047764]  ? __pfx_mempool_kmalloc+0x10/0x10
[   19.048176]  ? __pfx_mempool_kfree+0x10/0x10
[   19.048557]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   19.049701]  kunit_try_run_case+0x1b3/0x490
[   19.050238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.050976]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.051337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.052279]  ? __kthread_parkme+0x82/0x160
[   19.052651]  ? preempt_count_sub+0x50/0x80
[   19.053109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.054095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.054666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.055150]  kthread+0x257/0x310
[   19.055988]  ? __pfx_kthread+0x10/0x10
[   19.056279]  ret_from_fork+0x41/0x80
[   19.056827]  ? __pfx_kthread+0x10/0x10
[   19.057254]  ret_from_fork_asm+0x1a/0x30
[   19.057798]  </TASK>
[   19.058097] 
[   19.058355] The buggy address belongs to the physical page:
[   19.058956] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bc8
[   19.059528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.060112] flags: 0x200000000000040(head|node=0|zone=2)
[   19.060565] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   19.061375] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.062410] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   19.063026] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.063836] head: 0200000000000002 ffffea00040af201 ffffffffffffffff 0000000000000000
[   19.064624] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.065209] page dumped because: kasan: bad access detected
[   19.065827] 
[   19.066051] Memory state around the buggy address:
[   19.066923]  ffff888102bc7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.067455]  ffff888102bc7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.068160] >ffff888102bc8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.068859]                    ^
[   19.069155]  ffff888102bc8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.069895]  ffff888102bc8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.070603] ==================================================================

test log snippet boot parser 112

Home

[   19.232769] ==================================================================
[   19.233807] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0
[   19.234587] Read of size 1 at addr ffffffffbdfd2d0d by task kunit_try_catch/249
[   19.235171] 
[   19.235529] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.236764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.237110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.238835] Call Trace:
[   19.239138]  <TASK>
[   19.239617]  dump_stack_lvl+0x73/0xb0
[   19.240038]  print_report+0xd1/0x640
[   19.240595]  ? __virt_addr_valid+0x1db/0x2d0
[   19.241079]  ? kasan_addr_to_slab+0x11/0xa0
[   19.241978]  kasan_report+0x102/0x140
[   19.242322]  ? kasan_global_oob_right+0x288/0x2d0
[   19.242994]  ? kasan_global_oob_right+0x288/0x2d0
[   19.243652]  __asan_report_load1_noabort+0x18/0x20
[   19.244165]  kasan_global_oob_right+0x288/0x2d0
[   19.244657]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   19.245346]  ? __schedule+0xc51/0x27c0
[   19.246182]  ? __pfx_read_tsc+0x10/0x10
[   19.246770]  ? ktime_get_ts64+0x84/0x230
[   19.247259]  kunit_try_run_case+0x1b3/0x490
[   19.247900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.248412]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.248983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.249883]  ? __kthread_parkme+0x82/0x160
[   19.250208]  ? preempt_count_sub+0x50/0x80
[   19.250909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.251342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.252086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.252804]  kthread+0x257/0x310
[   19.253234]  ? __pfx_kthread+0x10/0x10
[   19.254022]  ret_from_fork+0x41/0x80
[   19.254429]  ? __pfx_kthread+0x10/0x10
[   19.254840]  ret_from_fork_asm+0x1a/0x30
[   19.255176]  </TASK>
[   19.255442] 
[   19.256084] The buggy address belongs to the variable:
[   19.256934]  global_array+0xd/0x40
[   19.257622] 
[   19.257922] The buggy address belongs to the physical page:
[   19.258520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x767d2
[   19.259101] flags: 0x100000000002000(reserved|node=0|zone=1)
[   19.259896] raw: 0100000000002000 ffffea0001d9f488 ffffea0001d9f488 0000000000000000
[   19.260752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.261481] page dumped because: kasan: bad access detected
[   19.262346] 
[   19.262530] Memory state around the buggy address:
[   19.263146]  ffffffffbdfd2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.264289]  ffffffffbdfd2c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.265206] >ffffffffbdfd2d00: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   19.265924]                       ^
[   19.266765]  ffffffffbdfd2d80: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   19.267266]  ffffffffbdfd2e00: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   19.268298] ==================================================================

test log snippet boot parser 113

Home

[   15.666461] ==================================================================
[   15.667723] BUG: KASAN: invalid-free in kfree+0x271/0x3d0
[   15.668183] Free of addr ffff888102358001 by task kunit_try_catch/154
[   15.668822] 
[   15.669020] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.669894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.670313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.670997] Call Trace:
[   15.671389]  <TASK>
[   15.671691]  dump_stack_lvl+0x73/0xb0
[   15.672128]  print_report+0xd1/0x640
[   15.672598]  ? __virt_addr_valid+0x1db/0x2d0
[   15.673026]  ? kfree+0x271/0x3d0
[   15.673455]  ? kasan_addr_to_slab+0x11/0xa0
[   15.673936]  ? kfree+0x271/0x3d0
[   15.674352]  kasan_report_invalid_free+0xc0/0xf0
[   15.675382]  ? kfree+0x271/0x3d0
[   15.675820]  ? kfree+0x271/0x3d0
[   15.676508]  __kasan_kfree_large+0x86/0xd0
[   15.676979]  free_large_kmalloc+0x3b/0xd0
[   15.677380]  kfree+0x271/0x3d0
[   15.677759]  kmalloc_large_invalid_free+0x121/0x2b0
[   15.678399]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   15.678894]  ? __schedule+0xc51/0x27c0
[   15.679644]  ? __pfx_read_tsc+0x10/0x10
[   15.680089]  ? ktime_get_ts64+0x84/0x230
[   15.680585]  kunit_try_run_case+0x1b3/0x490
[   15.680928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.681239]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.681553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.682353]  ? __kthread_parkme+0x82/0x160
[   15.682653]  ? preempt_count_sub+0x50/0x80
[   15.684009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.685101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.685736]  kthread+0x257/0x310
[   15.686316]  ? __pfx_kthread+0x10/0x10
[   15.686865]  ret_from_fork+0x41/0x80
[   15.687417]  ? __pfx_kthread+0x10/0x10
[   15.687941]  ret_from_fork_asm+0x1a/0x30
[   15.688698]  </TASK>
[   15.688954] 
[   15.689184] The buggy address belongs to the physical page:
[   15.690113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102358
[   15.691005] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.692100] flags: 0x200000000000040(head|node=0|zone=2)
[   15.692506] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.692937] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.693985] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.695122] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.695936] head: 0200000000000002 ffffea000408d601 ffffffffffffffff 0000000000000000
[   15.696535] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   15.697152] page dumped because: kasan: bad access detected
[   15.697617] 
[   15.697826] Memory state around the buggy address:
[   15.698261]  ffff888102357f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698853]  ffff888102357f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.700225] >ffff888102358000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.700736]                    ^
[   15.701100]  ffff888102358080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.701940]  ffff888102358100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.702691] ==================================================================

test log snippet boot parser 114

Home

[   17.825104] ==================================================================
[   17.826424] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d9/0x470
[   17.826924] Free of addr ffff88810148f001 by task kunit_try_catch/215
[   17.827538] 
[   17.827799] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.828454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.829816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.831277] Call Trace:
[   17.831833]  <TASK>
[   17.832263]  dump_stack_lvl+0x73/0xb0
[   17.832996]  print_report+0xd1/0x640
[   17.833746]  ? __virt_addr_valid+0x1db/0x2d0
[   17.834138]  ? kmem_cache_invalid_free+0x1d9/0x470
[   17.834645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.835097]  ? kmem_cache_invalid_free+0x1d9/0x470
[   17.835567]  kasan_report_invalid_free+0xc0/0xf0
[   17.836102]  ? kmem_cache_invalid_free+0x1d9/0x470
[   17.837156]  ? kmem_cache_invalid_free+0x1d9/0x470
[   17.838105]  check_slab_allocation+0x11f/0x130
[   17.838765]  __kasan_slab_pre_free+0x28/0x40
[   17.839180]  kmem_cache_free+0xee/0x400
[   17.839806]  ? kmem_cache_alloc_noprof+0x101/0x340
[   17.840341]  ? kmem_cache_invalid_free+0x1d9/0x470
[   17.840942]  kmem_cache_invalid_free+0x1d9/0x470
[   17.841413]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   17.842265]  ? finish_task_switch.isra.0+0x153/0x700
[   17.842855]  ? __switch_to+0x5d9/0xf60
[   17.843323]  ? __pfx_read_tsc+0x10/0x10
[   17.843887]  ? ktime_get_ts64+0x84/0x230
[   17.844278]  kunit_try_run_case+0x1b3/0x490
[   17.844938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.845331]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.846228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.846715]  ? __kthread_parkme+0x82/0x160
[   17.847117]  ? preempt_count_sub+0x50/0x80
[   17.847535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.847969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.848492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.849282]  kthread+0x257/0x310
[   17.850023]  ? __pfx_kthread+0x10/0x10
[   17.850598]  ret_from_fork+0x41/0x80
[   17.851034]  ? __pfx_kthread+0x10/0x10
[   17.851610]  ret_from_fork_asm+0x1a/0x30
[   17.852081]  </TASK>
[   17.852388] 
[   17.852827] Allocated by task 215:
[   17.853198]  kasan_save_stack+0x3d/0x60
[   17.854033]  kasan_save_track+0x18/0x40
[   17.854464]  kasan_save_alloc_info+0x3b/0x50
[   17.855053]  __kasan_slab_alloc+0x91/0xa0
[   17.855762]  kmem_cache_alloc_noprof+0x101/0x340
[   17.856235]  kmem_cache_invalid_free+0x158/0x470
[   17.856953]  kunit_try_run_case+0x1b3/0x490
[   17.857395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.858314]  kthread+0x257/0x310
[   17.858630]  ret_from_fork+0x41/0x80
[   17.859044]  ret_from_fork_asm+0x1a/0x30
[   17.859379] 
[   17.859610] The buggy address belongs to the object at ffff88810148f000
[   17.859610]  which belongs to the cache test_cache of size 200
[   17.860872] The buggy address is located 1 bytes inside of
[   17.860872]  200-byte region [ffff88810148f000, ffff88810148f0c8)
[   17.862110] 
[   17.862373] The buggy address belongs to the physical page:
[   17.863011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148f
[   17.863656] flags: 0x200000000000000(node=0|zone=2)
[   17.864118] page_type: f5(slab)
[   17.864497] raw: 0200000000000000 ffff888101425a00 dead000000000122 0000000000000000
[   17.865342] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   17.866666] page dumped because: kasan: bad access detected
[   17.867024] 
[   17.867289] Memory state around the buggy address:
[   17.868091]  ffff88810148ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.869116]  ffff88810148ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870225] >ffff88810148f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.870764]                    ^
[   17.871126]  ffff88810148f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.871712]  ffff88810148f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.872539] ==================================================================

test log snippet boot parser 115

Home

[   19.124990] ==================================================================
[   19.125820] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.126745] Free of addr ffff88810200df01 by task kunit_try_catch/245
[   19.127169] 
[   19.127416] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.128665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.129624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.130575] Call Trace:
[   19.131131]  <TASK>
[   19.131345]  dump_stack_lvl+0x73/0xb0
[   19.131851]  print_report+0xd1/0x640
[   19.132363]  ? __virt_addr_valid+0x1db/0x2d0
[   19.132911]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.133669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.134390]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.134966]  kasan_report_invalid_free+0xc0/0xf0
[   19.135826]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.136439]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.137439]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.138117]  check_slab_allocation+0x11f/0x130
[   19.138743]  __kasan_mempool_poison_object+0x91/0x1d0
[   19.139159]  mempool_free+0x2ec/0x380
[   19.139816]  mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.140685]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   19.141272]  ? irqentry_exit+0x2a/0x60
[   19.141670]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.142127]  mempool_kmalloc_invalid_free+0xb1/0x100
[   19.142624]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   19.143421]  ? __pfx_mempool_kmalloc+0x10/0x10
[   19.143993]  ? __pfx_mempool_kfree+0x10/0x10
[   19.144654]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   19.145165]  kunit_try_run_case+0x1b3/0x490
[   19.145828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.146309]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.147001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.147642]  ? __kthread_parkme+0x82/0x160
[   19.148117]  ? preempt_count_sub+0x50/0x80
[   19.148770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.149323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.149986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.150744]  kthread+0x257/0x310
[   19.151171]  ? __pfx_kthread+0x10/0x10
[   19.152115]  ret_from_fork+0x41/0x80
[   19.152570]  ? __pfx_kthread+0x10/0x10
[   19.152947]  ret_from_fork_asm+0x1a/0x30
[   19.153407]  </TASK>
[   19.153681] 
[   19.153906] Allocated by task 245:
[   19.154276]  kasan_save_stack+0x3d/0x60
[   19.154643]  kasan_save_track+0x18/0x40
[   19.155927]  kasan_save_alloc_info+0x3b/0x50
[   19.156275]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   19.157259]  remove_element+0x11e/0x190
[   19.157927]  mempool_alloc_preallocated+0x4d/0x90
[   19.158503]  mempool_kmalloc_invalid_free_helper+0x84/0x2e0
[   19.159382]  mempool_kmalloc_invalid_free+0xb1/0x100
[   19.159831]  kunit_try_run_case+0x1b3/0x490
[   19.160575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.161096]  kthread+0x257/0x310
[   19.161573]  ret_from_fork+0x41/0x80
[   19.161956]  ret_from_fork_asm+0x1a/0x30
[   19.162712] 
[   19.162921] The buggy address belongs to the object at ffff88810200df00
[   19.162921]  which belongs to the cache kmalloc-128 of size 128
[   19.164428] The buggy address is located 1 bytes inside of
[   19.164428]  128-byte region [ffff88810200df00, ffff88810200df80)
[   19.165603] 
[   19.165848] The buggy address belongs to the physical page:
[   19.166425] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10200d
[   19.167318] flags: 0x200000000000000(node=0|zone=2)
[   19.167942] page_type: f5(slab)
[   19.168247] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.169114] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   19.170024] page dumped because: kasan: bad access detected
[   19.170830] 
[   19.170985] Memory state around the buggy address:
[   19.172002]  ffff88810200de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.173145]  ffff88810200de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.174182] >ffff88810200df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.174433]                    ^
[   19.174668]  ffff88810200df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.175983]  ffff88810200e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.176947] ==================================================================

test log snippet boot parser 116

Home

[   19.182973] ==================================================================
[   19.184068] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.184570] Free of addr ffff888102b64001 by task kunit_try_catch/247
[   19.185000] 
[   19.185201] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.186425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.186833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.187746] Call Trace:
[   19.188221]  <TASK>
[   19.188517]  dump_stack_lvl+0x73/0xb0
[   19.188890]  print_report+0xd1/0x640
[   19.189963]  ? __virt_addr_valid+0x1db/0x2d0
[   19.190395]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.191049]  ? kasan_addr_to_slab+0x11/0xa0
[   19.191416]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.192065]  kasan_report_invalid_free+0xc0/0xf0
[   19.192926]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.193452]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.194944]  __kasan_mempool_poison_object+0x102/0x1d0
[   19.195681]  mempool_free+0x2ec/0x380
[   19.196145]  mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   19.196941]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   19.197535]  ? finish_task_switch.isra.0+0x153/0x700
[   19.198006]  mempool_kmalloc_large_invalid_free+0xb1/0x100
[   19.198916]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   19.199593]  ? __switch_to+0x5d9/0xf60
[   19.200341]  ? __pfx_mempool_kmalloc+0x10/0x10
[   19.201054]  ? __pfx_mempool_kfree+0x10/0x10
[   19.201586]  ? __pfx_read_tsc+0x10/0x10
[   19.202254]  ? ktime_get_ts64+0x84/0x230
[   19.202870]  kunit_try_run_case+0x1b3/0x490
[   19.203496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.204492]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.204949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.205576]  ? __kthread_parkme+0x82/0x160
[   19.206029]  ? preempt_count_sub+0x50/0x80
[   19.206467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.207073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.207880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.208156]  kthread+0x257/0x310
[   19.208912]  ? __pfx_kthread+0x10/0x10
[   19.209408]  ret_from_fork+0x41/0x80
[   19.209748]  ? __pfx_kthread+0x10/0x10
[   19.210135]  ret_from_fork_asm+0x1a/0x30
[   19.210579]  </TASK>
[   19.210974] 
[   19.211174] The buggy address belongs to the physical page:
[   19.211636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b64
[   19.212301] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.213684] flags: 0x200000000000040(head|node=0|zone=2)
[   19.214146] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   19.215590] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.216529] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   19.217259] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.218303] head: 0200000000000002 ffffea00040ad901 ffffffffffffffff 0000000000000000
[   19.218950] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.219496] page dumped because: kasan: bad access detected
[   19.220451] 
[   19.221108] Memory state around the buggy address:
[   19.221687]  ffff888102b63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.222443]  ffff888102b63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.223006] >ffff888102b64000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.223911]                    ^
[   19.224289]  ffff888102b64080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.225350]  ffff888102b64100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.226107] ==================================================================

test log snippet boot parser 117

Home

[   16.883885] ==================================================================
[   16.884623] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x172/0x330
[   16.885518] Read of size 18446744073709551614 at addr ffff888101ff9c04 by task kunit_try_catch/184
[   16.886101] 
[   16.886296] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.887725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.888610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.889327] Call Trace:
[   16.889592]  <TASK>
[   16.889963]  dump_stack_lvl+0x73/0xb0
[   16.890417]  print_report+0xd1/0x640
[   16.891099]  ? __virt_addr_valid+0x1db/0x2d0
[   16.891763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.892361]  kasan_report+0x102/0x140
[   16.892883]  ? kmalloc_memmove_negative_size+0x172/0x330
[   16.893504]  ? kmalloc_memmove_negative_size+0x172/0x330
[   16.894649]  kasan_check_range+0x10c/0x1c0
[   16.895073]  __asan_memmove+0x27/0x70
[   16.895701]  kmalloc_memmove_negative_size+0x172/0x330
[   16.896246]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   16.896748]  kunit_try_run_case+0x1b3/0x490
[   16.897172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.897871]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.898303]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.899202]  ? __kthread_parkme+0x82/0x160
[   16.899630]  ? preempt_count_sub+0x50/0x80
[   16.900166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.900824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.901332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.902007]  kthread+0x257/0x310
[   16.902345]  ? __pfx_kthread+0x10/0x10
[   16.903092]  ret_from_fork+0x41/0x80
[   16.903838]  ? __pfx_kthread+0x10/0x10
[   16.904157]  ret_from_fork_asm+0x1a/0x30
[   16.904732]  </TASK>
[   16.905012] 
[   16.905188] Allocated by task 184:
[   16.905537]  kasan_save_stack+0x3d/0x60
[   16.905977]  kasan_save_track+0x18/0x40
[   16.906431]  kasan_save_alloc_info+0x3b/0x50
[   16.906809]  __kasan_kmalloc+0xb7/0xc0
[   16.907212]  __kmalloc_cache_noprof+0x162/0x350
[   16.907825]  kmalloc_memmove_negative_size+0xad/0x330
[   16.908391]  kunit_try_run_case+0x1b3/0x490
[   16.909183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.909712]  kthread+0x257/0x310
[   16.910102]  ret_from_fork+0x41/0x80
[   16.911241]  ret_from_fork_asm+0x1a/0x30
[   16.911752] 
[   16.911950] The buggy address belongs to the object at ffff888101ff9c00
[   16.911950]  which belongs to the cache kmalloc-64 of size 64
[   16.912820] The buggy address is located 4 bytes inside of
[   16.912820]  64-byte region [ffff888101ff9c00, ffff888101ff9c40)
[   16.913574] 
[   16.913814] The buggy address belongs to the physical page:
[   16.914229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ff9
[   16.915169] flags: 0x200000000000000(node=0|zone=2)
[   16.915770] page_type: f5(slab)
[   16.916256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.917078] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   16.917834] page dumped because: kasan: bad access detected
[   16.918640] 
[   16.918897] Memory state around the buggy address:
[   16.919301]  ffff888101ff9b00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.920103]  ffff888101ff9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.920897] >ffff888101ff9c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.921673]                    ^
[   16.922105]  ffff888101ff9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.922902]  ffff888101ff9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.923680] ==================================================================

test log snippet boot parser 118

Home

[   21.660038] ==================================================================
[   21.660494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   21.661614] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.662293] 
[   21.662543] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.663437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.663759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.664930] Call Trace:
[   21.665645]  <TASK>
[   21.665893]  dump_stack_lvl+0x73/0xb0
[   21.666680]  print_report+0xd1/0x640
[   21.667297]  ? __virt_addr_valid+0x1db/0x2d0
[   21.668140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.668762]  kasan_report+0x102/0x140
[   21.669133]  ? kasan_atomics_helper+0x4a38/0x5450
[   21.669567]  ? kasan_atomics_helper+0x4a38/0x5450
[   21.670020]  __asan_report_load4_noabort+0x18/0x20
[   21.670694]  kasan_atomics_helper+0x4a38/0x5450
[   21.671658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.672142]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.672870]  kasan_atomics+0x1dd/0x310
[   21.673471]  ? __pfx_kasan_atomics+0x10/0x10
[   21.674071]  ? __pfx_kasan_atomics+0x10/0x10
[   21.674552]  kunit_try_run_case+0x1b3/0x490
[   21.675210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.675927]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.676938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.677327]  ? __kthread_parkme+0x82/0x160
[   21.677931]  ? preempt_count_sub+0x50/0x80
[   21.678602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.679199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.679910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.680643]  kthread+0x257/0x310
[   21.681054]  ? __pfx_kthread+0x10/0x10
[   21.681604]  ret_from_fork+0x41/0x80
[   21.681971]  ? __pfx_kthread+0x10/0x10
[   21.682403]  ret_from_fork_asm+0x1a/0x30
[   21.683078]  </TASK>
[   21.683430] 
[   21.683604] Allocated by task 269:
[   21.683881]  kasan_save_stack+0x3d/0x60
[   21.684399]  kasan_save_track+0x18/0x40
[   21.684865]  kasan_save_alloc_info+0x3b/0x50
[   21.685455]  __kasan_kmalloc+0xb7/0xc0
[   21.685892]  __kmalloc_cache_noprof+0x162/0x350
[   21.686440]  kasan_atomics+0x96/0x310
[   21.686737]  kunit_try_run_case+0x1b3/0x490
[   21.687160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.687795]  kthread+0x257/0x310
[   21.688297]  ret_from_fork+0x41/0x80
[   21.688806]  ret_from_fork_asm+0x1a/0x30
[   21.689119] 
[   21.689298] The buggy address belongs to the object at ffff888102c3d080
[   21.689298]  which belongs to the cache kmalloc-64 of size 64
[   21.690381] The buggy address is located 0 bytes to the right of
[   21.690381]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.691637] 
[   21.691893] The buggy address belongs to the physical page:
[   21.692422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.693124] flags: 0x200000000000000(node=0|zone=2)
[   21.693670] page_type: f5(slab)
[   21.694092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.694905] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.696465] page dumped because: kasan: bad access detected
[   21.696833] 
[   21.696987] Memory state around the buggy address:
[   21.697304]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.697831]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.698452] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.698898]                                      ^
[   21.699215]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.699598]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.700443] ==================================================================
---
[   23.034860] ==================================================================
[   23.035418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   23.036268] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   23.037088] 
[   23.037332] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.038727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.039122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.040522] Call Trace:
[   23.040849]  <TASK>
[   23.041095]  dump_stack_lvl+0x73/0xb0
[   23.041542]  print_report+0xd1/0x640
[   23.041998]  ? __virt_addr_valid+0x1db/0x2d0
[   23.042514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.043008]  kasan_report+0x102/0x140
[   23.043510]  ? kasan_atomics_helper+0x4fb4/0x5450
[   23.043993]  ? kasan_atomics_helper+0x4fb4/0x5450
[   23.044566]  __asan_report_load8_noabort+0x18/0x20
[   23.045053]  kasan_atomics_helper+0x4fb4/0x5450
[   23.045631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.046162]  ? __kmalloc_cache_noprof+0x162/0x350
[   23.046738]  kasan_atomics+0x1dd/0x310
[   23.047159]  ? __pfx_kasan_atomics+0x10/0x10
[   23.047703]  ? __pfx_kasan_atomics+0x10/0x10
[   23.048124]  kunit_try_run_case+0x1b3/0x490
[   23.048666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.049118]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.049672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.050168]  ? __kthread_parkme+0x82/0x160
[   23.050700]  ? preempt_count_sub+0x50/0x80
[   23.051125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.051695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.052274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.052843]  kthread+0x257/0x310
[   23.053301]  ? __pfx_kthread+0x10/0x10
[   23.053649]  ret_from_fork+0x41/0x80
[   23.054131]  ? __pfx_kthread+0x10/0x10
[   23.054589]  ret_from_fork_asm+0x1a/0x30
[   23.055034]  </TASK>
[   23.055393] 
[   23.055622] Allocated by task 269:
[   23.055980]  kasan_save_stack+0x3d/0x60
[   23.056450]  kasan_save_track+0x18/0x40
[   23.056860]  kasan_save_alloc_info+0x3b/0x50
[   23.057333]  __kasan_kmalloc+0xb7/0xc0
[   23.057794]  __kmalloc_cache_noprof+0x162/0x350
[   23.058310]  kasan_atomics+0x96/0x310
[   23.058646]  kunit_try_run_case+0x1b3/0x490
[   23.059226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.059738]  kthread+0x257/0x310
[   23.060245]  ret_from_fork+0x41/0x80
[   23.060654]  ret_from_fork_asm+0x1a/0x30
[   23.061121] 
[   23.061353] The buggy address belongs to the object at ffff888102c3d080
[   23.061353]  which belongs to the cache kmalloc-64 of size 64
[   23.062348] The buggy address is located 0 bytes to the right of
[   23.062348]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   23.063423] 
[   23.063681] The buggy address belongs to the physical page:
[   23.064174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   23.064868] flags: 0x200000000000000(node=0|zone=2)
[   23.065401] page_type: f5(slab)
[   23.065768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.066424] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.067058] page dumped because: kasan: bad access detected
[   23.067643] 
[   23.067891] Memory state around the buggy address:
[   23.068398]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.068960]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.069620] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.070253]                                      ^
[   23.070689]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071416]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071953] ==================================================================
---
[   22.880054] ==================================================================
[   22.880476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   22.882143] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.882923] 
[   22.883161] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.884063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.884558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.885300] Call Trace:
[   22.885804]  <TASK>
[   22.886270]  dump_stack_lvl+0x73/0xb0
[   22.886556]  print_report+0xd1/0x640
[   22.887082]  ? __virt_addr_valid+0x1db/0x2d0
[   22.887493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.888028]  kasan_report+0x102/0x140
[   22.888518]  ? kasan_atomics_helper+0x4f73/0x5450
[   22.888951]  ? kasan_atomics_helper+0x4f73/0x5450
[   22.889547]  __asan_report_load8_noabort+0x18/0x20
[   22.890004]  kasan_atomics_helper+0x4f73/0x5450
[   22.890738]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.891128]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.891823]  kasan_atomics+0x1dd/0x310
[   22.892213]  ? __pfx_kasan_atomics+0x10/0x10
[   22.892720]  ? __pfx_kasan_atomics+0x10/0x10
[   22.893187]  kunit_try_run_case+0x1b3/0x490
[   22.893597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.894081]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.894570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.895049]  ? __kthread_parkme+0x82/0x160
[   22.895673]  ? preempt_count_sub+0x50/0x80
[   22.896107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.896510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.897073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.897582]  kthread+0x257/0x310
[   22.897981]  ? __pfx_kthread+0x10/0x10
[   22.898387]  ret_from_fork+0x41/0x80
[   22.898885]  ? __pfx_kthread+0x10/0x10
[   22.899209]  ret_from_fork_asm+0x1a/0x30
[   22.899664]  </TASK>
[   22.899964] 
[   22.900152] Allocated by task 269:
[   22.900493]  kasan_save_stack+0x3d/0x60
[   22.901006]  kasan_save_track+0x18/0x40
[   22.901421]  kasan_save_alloc_info+0x3b/0x50
[   22.901746]  __kasan_kmalloc+0xb7/0xc0
[   22.902289]  __kmalloc_cache_noprof+0x162/0x350
[   22.902766]  kasan_atomics+0x96/0x310
[   22.903191]  kunit_try_run_case+0x1b3/0x490
[   22.903545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.904007]  kthread+0x257/0x310
[   22.904473]  ret_from_fork+0x41/0x80
[   22.904873]  ret_from_fork_asm+0x1a/0x30
[   22.905283] 
[   22.905501] The buggy address belongs to the object at ffff888102c3d080
[   22.905501]  which belongs to the cache kmalloc-64 of size 64
[   22.906326] The buggy address is located 0 bytes to the right of
[   22.906326]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.907325] 
[   22.907552] The buggy address belongs to the physical page:
[   22.907926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.908730] flags: 0x200000000000000(node=0|zone=2)
[   22.909171] page_type: f5(slab)
[   22.909509] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.910065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.910834] page dumped because: kasan: bad access detected
[   22.911217] 
[   22.911454] Memory state around the buggy address:
[   22.911934]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.912565]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.913194] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.913733]                                      ^
[   22.914175]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.914641]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.915221] ==================================================================
---
[   22.955650] ==================================================================
[   22.956302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   22.957058] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.957688] 
[   22.957945] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.958820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.959173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.959977] Call Trace:
[   22.960321]  <TASK>
[   22.960607]  dump_stack_lvl+0x73/0xb0
[   22.961045]  print_report+0xd1/0x640
[   22.961527]  ? __virt_addr_valid+0x1db/0x2d0
[   22.961949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.962575]  kasan_report+0x102/0x140
[   22.963011]  ? kasan_atomics_helper+0x4f9a/0x5450
[   22.963515]  ? kasan_atomics_helper+0x4f9a/0x5450
[   22.964023]  __asan_report_load8_noabort+0x18/0x20
[   22.964622]  kasan_atomics_helper+0x4f9a/0x5450
[   22.965019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.965647]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.966167]  kasan_atomics+0x1dd/0x310
[   22.966628]  ? __pfx_kasan_atomics+0x10/0x10
[   22.967128]  ? __pfx_kasan_atomics+0x10/0x10
[   22.967612]  kunit_try_run_case+0x1b3/0x490
[   22.968098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.968546]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.969053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.969491]  ? __kthread_parkme+0x82/0x160
[   22.969839]  ? preempt_count_sub+0x50/0x80
[   22.970219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.970719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.971385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.971929]  kthread+0x257/0x310
[   22.972256]  ? __pfx_kthread+0x10/0x10
[   22.972565]  ret_from_fork+0x41/0x80
[   22.972976]  ? __pfx_kthread+0x10/0x10
[   22.973426]  ret_from_fork_asm+0x1a/0x30
[   22.973920]  </TASK>
[   22.974232] 
[   22.974454] Allocated by task 269:
[   22.974827]  kasan_save_stack+0x3d/0x60
[   22.975314]  kasan_save_track+0x18/0x40
[   22.975669]  kasan_save_alloc_info+0x3b/0x50
[   22.976116]  __kasan_kmalloc+0xb7/0xc0
[   22.976526]  __kmalloc_cache_noprof+0x162/0x350
[   22.976987]  kasan_atomics+0x96/0x310
[   22.977417]  kunit_try_run_case+0x1b3/0x490
[   22.977822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.978258]  kthread+0x257/0x310
[   22.978535]  ret_from_fork+0x41/0x80
[   22.978968]  ret_from_fork_asm+0x1a/0x30
[   22.979426] 
[   22.979660] The buggy address belongs to the object at ffff888102c3d080
[   22.979660]  which belongs to the cache kmalloc-64 of size 64
[   22.980714] The buggy address is located 0 bytes to the right of
[   22.980714]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.982750] 
[   22.982948] The buggy address belongs to the physical page:
[   22.983972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.985083] flags: 0x200000000000000(node=0|zone=2)
[   22.985655] page_type: f5(slab)
[   22.986027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.986892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.987615] page dumped because: kasan: bad access detected
[   22.988112] 
[   22.988412] Memory state around the buggy address:
[   22.988751]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.989524]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.990245] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.990883]                                      ^
[   22.991366]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.992117]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.992746] ==================================================================
---
[   23.109993] ==================================================================
[   23.110601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   23.111302] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   23.111785] 
[   23.112071] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.112934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.113418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.113933] Call Trace:
[   23.114222]  <TASK>
[   23.114553]  dump_stack_lvl+0x73/0xb0
[   23.114980]  print_report+0xd1/0x640
[   23.115443]  ? __virt_addr_valid+0x1db/0x2d0
[   23.115931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.116491]  kasan_report+0x102/0x140
[   23.116932]  ? kasan_atomics_helper+0x4fa7/0x5450
[   23.117389]  ? kasan_atomics_helper+0x4fa7/0x5450
[   23.117957]  __asan_report_load8_noabort+0x18/0x20
[   23.118580]  kasan_atomics_helper+0x4fa7/0x5450
[   23.119069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.119591]  ? __kmalloc_cache_noprof+0x162/0x350
[   23.120140]  kasan_atomics+0x1dd/0x310
[   23.120615]  ? __pfx_kasan_atomics+0x10/0x10
[   23.121050]  ? __pfx_kasan_atomics+0x10/0x10
[   23.121615]  kunit_try_run_case+0x1b3/0x490
[   23.122135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.122558]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.122959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.123491]  ? __kthread_parkme+0x82/0x160
[   23.124022]  ? preempt_count_sub+0x50/0x80
[   23.124422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.124992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.125682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.126320]  kthread+0x257/0x310
[   23.126725]  ? __pfx_kthread+0x10/0x10
[   23.127143]  ret_from_fork+0x41/0x80
[   23.127631]  ? __pfx_kthread+0x10/0x10
[   23.127993]  ret_from_fork_asm+0x1a/0x30
[   23.128547]  </TASK>
[   23.128814] 
[   23.129050] Allocated by task 269:
[   23.129443]  kasan_save_stack+0x3d/0x60
[   23.129885]  kasan_save_track+0x18/0x40
[   23.130345]  kasan_save_alloc_info+0x3b/0x50
[   23.130831]  __kasan_kmalloc+0xb7/0xc0
[   23.131138]  __kmalloc_cache_noprof+0x162/0x350
[   23.131600]  kasan_atomics+0x96/0x310
[   23.132079]  kunit_try_run_case+0x1b3/0x490
[   23.132581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.133134]  kthread+0x257/0x310
[   23.133480]  ret_from_fork+0x41/0x80
[   23.133940]  ret_from_fork_asm+0x1a/0x30
[   23.134473] 
[   23.134680] The buggy address belongs to the object at ffff888102c3d080
[   23.134680]  which belongs to the cache kmalloc-64 of size 64
[   23.135545] The buggy address is located 0 bytes to the right of
[   23.135545]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   23.136600] 
[   23.136852] The buggy address belongs to the physical page:
[   23.137409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   23.138023] flags: 0x200000000000000(node=0|zone=2)
[   23.138564] page_type: f5(slab)
[   23.138941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.139614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.140259] page dumped because: kasan: bad access detected
[   23.140792] 
[   23.141001] Memory state around the buggy address:
[   23.141523]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.142092]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.142715] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.143266]                                      ^
[   23.143617]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.144337]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.144996] ==================================================================
---
[   21.417984] ==================================================================
[   21.419040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   21.420841] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.421482] 
[   21.421690] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.423395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.423821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.424650] Call Trace:
[   21.425048]  <TASK>
[   21.425397]  dump_stack_lvl+0x73/0xb0
[   21.425954]  print_report+0xd1/0x640
[   21.426470]  ? __virt_addr_valid+0x1db/0x2d0
[   21.426966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.427627]  kasan_report+0x102/0x140
[   21.428054]  ? kasan_atomics_helper+0x4a86/0x5450
[   21.428616]  ? kasan_atomics_helper+0x4a86/0x5450
[   21.429205]  __asan_report_load4_noabort+0x18/0x20
[   21.429737]  kasan_atomics_helper+0x4a86/0x5450
[   21.430365]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.430948]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.431436]  kasan_atomics+0x1dd/0x310
[   21.431888]  ? __pfx_kasan_atomics+0x10/0x10
[   21.432497]  ? __pfx_kasan_atomics+0x10/0x10
[   21.432989]  kunit_try_run_case+0x1b3/0x490
[   21.433477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.434260]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.434890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.435843]  ? __kthread_parkme+0x82/0x160
[   21.436282]  ? preempt_count_sub+0x50/0x80
[   21.436709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.437145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.438104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.438814]  kthread+0x257/0x310
[   21.439399]  ? __pfx_kthread+0x10/0x10
[   21.439995]  ret_from_fork+0x41/0x80
[   21.440522]  ? __pfx_kthread+0x10/0x10
[   21.440982]  ret_from_fork_asm+0x1a/0x30
[   21.441677]  </TASK>
[   21.442144] 
[   21.442505] Allocated by task 269:
[   21.442836]  kasan_save_stack+0x3d/0x60
[   21.443190]  kasan_save_track+0x18/0x40
[   21.443679]  kasan_save_alloc_info+0x3b/0x50
[   21.444038]  __kasan_kmalloc+0xb7/0xc0
[   21.444518]  __kmalloc_cache_noprof+0x162/0x350
[   21.445244]  kasan_atomics+0x96/0x310
[   21.445879]  kunit_try_run_case+0x1b3/0x490
[   21.446667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.447424]  kthread+0x257/0x310
[   21.447748]  ret_from_fork+0x41/0x80
[   21.448121]  ret_from_fork_asm+0x1a/0x30
[   21.448537] 
[   21.448792] The buggy address belongs to the object at ffff888102c3d080
[   21.448792]  which belongs to the cache kmalloc-64 of size 64
[   21.449587] The buggy address is located 0 bytes to the right of
[   21.449587]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.451225] 
[   21.451393] The buggy address belongs to the physical page:
[   21.451817] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.452547] flags: 0x200000000000000(node=0|zone=2)
[   21.453041] page_type: f5(slab)
[   21.453385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.454754] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.455357] page dumped because: kasan: bad access detected
[   21.455800] 
[   21.456027] Memory state around the buggy address:
[   21.456403]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.457017]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.457699] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.458207]                                      ^
[   21.458723]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.459372]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.460564] ==================================================================
---
[   22.638175] ==================================================================
[   22.639140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   22.639898] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.640599] 
[   22.640864] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.641682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.641990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.642836] Call Trace:
[   22.643142]  <TASK>
[   22.643409]  dump_stack_lvl+0x73/0xb0
[   22.643887]  print_report+0xd1/0x640
[   22.644396]  ? __virt_addr_valid+0x1db/0x2d0
[   22.644890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.645486]  kasan_report+0x102/0x140
[   22.645851]  ? kasan_atomics_helper+0x4f32/0x5450
[   22.646311]  ? kasan_atomics_helper+0x4f32/0x5450
[   22.646840]  __asan_report_load8_noabort+0x18/0x20
[   22.647381]  kasan_atomics_helper+0x4f32/0x5450
[   22.647874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.648436]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.649001]  kasan_atomics+0x1dd/0x310
[   22.649487]  ? __pfx_kasan_atomics+0x10/0x10
[   22.649955]  ? __pfx_kasan_atomics+0x10/0x10
[   22.650519]  kunit_try_run_case+0x1b3/0x490
[   22.650900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.651474]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.651965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.652484]  ? __kthread_parkme+0x82/0x160
[   22.652967]  ? preempt_count_sub+0x50/0x80
[   22.653475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.654024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.654610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.655156]  kthread+0x257/0x310
[   22.655628]  ? __pfx_kthread+0x10/0x10
[   22.656039]  ret_from_fork+0x41/0x80
[   22.656532]  ? __pfx_kthread+0x10/0x10
[   22.656869]  ret_from_fork_asm+0x1a/0x30
[   22.657415]  </TASK>
[   22.657696] 
[   22.657974] Allocated by task 269:
[   22.658365]  kasan_save_stack+0x3d/0x60
[   22.658797]  kasan_save_track+0x18/0x40
[   22.659251]  kasan_save_alloc_info+0x3b/0x50
[   22.659743]  __kasan_kmalloc+0xb7/0xc0
[   22.660134]  __kmalloc_cache_noprof+0x162/0x350
[   22.660632]  kasan_atomics+0x96/0x310
[   22.661222]  kunit_try_run_case+0x1b3/0x490
[   22.661665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.662173]  kthread+0x257/0x310
[   22.662630]  ret_from_fork+0x41/0x80
[   22.663040]  ret_from_fork_asm+0x1a/0x30
[   22.663517] 
[   22.663745] The buggy address belongs to the object at ffff888102c3d080
[   22.663745]  which belongs to the cache kmalloc-64 of size 64
[   22.664735] The buggy address is located 0 bytes to the right of
[   22.664735]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.665741] 
[   22.666031] The buggy address belongs to the physical page:
[   22.666587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.667265] flags: 0x200000000000000(node=0|zone=2)
[   22.667734] page_type: f5(slab)
[   22.668140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.668801] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.669660] page dumped because: kasan: bad access detected
[   22.670356] 
[   22.670658] Memory state around the buggy address:
[   22.670996]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671746]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.672531] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.673058]                                      ^
[   22.673566]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.674162]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.674812] ==================================================================
---
[   21.904873] ==================================================================
[   21.905527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   21.906150] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.906713] 
[   21.906963] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.907714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.908021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.909027] Call Trace:
[   21.909396]  <TASK>
[   21.909722]  dump_stack_lvl+0x73/0xb0
[   21.910384]  print_report+0xd1/0x640
[   21.910889]  ? __virt_addr_valid+0x1db/0x2d0
[   21.911454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.911961]  kasan_report+0x102/0x140
[   21.912274]  ? kasan_atomics_helper+0x49ea/0x5450
[   21.912757]  ? kasan_atomics_helper+0x49ea/0x5450
[   21.913508]  __asan_report_load4_noabort+0x18/0x20
[   21.914038]  kasan_atomics_helper+0x49ea/0x5450
[   21.914632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.915172]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.915831]  kasan_atomics+0x1dd/0x310
[   21.916251]  ? __pfx_kasan_atomics+0x10/0x10
[   21.916793]  ? __pfx_kasan_atomics+0x10/0x10
[   21.917133]  kunit_try_run_case+0x1b3/0x490
[   21.917579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.918399]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.919083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.919675]  ? __kthread_parkme+0x82/0x160
[   21.920290]  ? preempt_count_sub+0x50/0x80
[   21.920698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.921462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.922169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.922760]  kthread+0x257/0x310
[   21.923256]  ? __pfx_kthread+0x10/0x10
[   21.923674]  ret_from_fork+0x41/0x80
[   21.924104]  ? __pfx_kthread+0x10/0x10
[   21.924710]  ret_from_fork_asm+0x1a/0x30
[   21.925229]  </TASK>
[   21.925520] 
[   21.925744] Allocated by task 269:
[   21.926104]  kasan_save_stack+0x3d/0x60
[   21.926623]  kasan_save_track+0x18/0x40
[   21.927037]  kasan_save_alloc_info+0x3b/0x50
[   21.928148]  __kasan_kmalloc+0xb7/0xc0
[   21.928561]  __kmalloc_cache_noprof+0x162/0x350
[   21.928749]  kasan_atomics+0x96/0x310
[   21.929137]  kunit_try_run_case+0x1b3/0x490
[   21.929872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.930519]  kthread+0x257/0x310
[   21.930877]  ret_from_fork+0x41/0x80
[   21.931273]  ret_from_fork_asm+0x1a/0x30
[   21.931668] 
[   21.931988] The buggy address belongs to the object at ffff888102c3d080
[   21.931988]  which belongs to the cache kmalloc-64 of size 64
[   21.932932] The buggy address is located 0 bytes to the right of
[   21.932932]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.933947] 
[   21.934163] The buggy address belongs to the physical page:
[   21.934681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.935263] flags: 0x200000000000000(node=0|zone=2)
[   21.935612] page_type: f5(slab)
[   21.936040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.936870] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.937595] page dumped because: kasan: bad access detected
[   21.938078] 
[   21.938351] Memory state around the buggy address:
[   21.938816]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.939398]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.939852] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.940523]                                      ^
[   21.941000]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.941650]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.942386] ==================================================================
---
[   21.744348] ==================================================================
[   21.745094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   21.745611] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.747833] 
[   21.748060] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.748834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.749299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.750080] Call Trace:
[   21.750420]  <TASK>
[   21.750741]  dump_stack_lvl+0x73/0xb0
[   21.751071]  print_report+0xd1/0x640
[   21.751527]  ? __virt_addr_valid+0x1db/0x2d0
[   21.751956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.752532]  kasan_report+0x102/0x140
[   21.752996]  ? kasan_atomics_helper+0x4a1e/0x5450
[   21.753498]  ? kasan_atomics_helper+0x4a1e/0x5450
[   21.754089]  __asan_report_load4_noabort+0x18/0x20
[   21.754605]  kasan_atomics_helper+0x4a1e/0x5450
[   21.755119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.755699]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.756101]  kasan_atomics+0x1dd/0x310
[   21.756592]  ? __pfx_kasan_atomics+0x10/0x10
[   21.757114]  ? __pfx_kasan_atomics+0x10/0x10
[   21.757518]  kunit_try_run_case+0x1b3/0x490
[   21.758003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.758527]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.759013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.759573]  ? __kthread_parkme+0x82/0x160
[   21.760079]  ? preempt_count_sub+0x50/0x80
[   21.760512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.761105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.761690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.762260]  kthread+0x257/0x310
[   21.762609]  ? __pfx_kthread+0x10/0x10
[   21.763047]  ret_from_fork+0x41/0x80
[   21.763579]  ? __pfx_kthread+0x10/0x10
[   21.763982]  ret_from_fork_asm+0x1a/0x30
[   21.764887]  </TASK>
[   21.765540] 
[   21.765831] Allocated by task 269:
[   21.766168]  kasan_save_stack+0x3d/0x60
[   21.766721]  kasan_save_track+0x18/0x40
[   21.767124]  kasan_save_alloc_info+0x3b/0x50
[   21.767534]  __kasan_kmalloc+0xb7/0xc0
[   21.767937]  __kmalloc_cache_noprof+0x162/0x350
[   21.768438]  kasan_atomics+0x96/0x310
[   21.768834]  kunit_try_run_case+0x1b3/0x490
[   21.769280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.769884]  kthread+0x257/0x310
[   21.770227]  ret_from_fork+0x41/0x80
[   21.770587]  ret_from_fork_asm+0x1a/0x30
[   21.771171] 
[   21.771393] The buggy address belongs to the object at ffff888102c3d080
[   21.771393]  which belongs to the cache kmalloc-64 of size 64
[   21.772384] The buggy address is located 0 bytes to the right of
[   21.772384]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.773337] 
[   21.773580] The buggy address belongs to the physical page:
[   21.774122] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.774721] flags: 0x200000000000000(node=0|zone=2)
[   21.775191] page_type: f5(slab)
[   21.775611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.776142] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.776581] page dumped because: kasan: bad access detected
[   21.777127] 
[   21.777409] Memory state around the buggy address:
[   21.777954]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.778759]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.779236] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.779813]                                      ^
[   21.780301]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.780960]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.781756] ==================================================================
---
[   23.186254] ==================================================================
[   23.186918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   23.187613] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   23.188372] 
[   23.188627] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.189547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.190070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.190898] Call Trace:
[   23.191317]  <TASK>
[   23.191682]  dump_stack_lvl+0x73/0xb0
[   23.192246]  print_report+0xd1/0x640
[   23.192723]  ? __virt_addr_valid+0x1db/0x2d0
[   23.193344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.193933]  kasan_report+0x102/0x140
[   23.194481]  ? kasan_atomics_helper+0x5117/0x5450
[   23.194999]  ? kasan_atomics_helper+0x5117/0x5450
[   23.195594]  __asan_report_load8_noabort+0x18/0x20
[   23.196107]  kasan_atomics_helper+0x5117/0x5450
[   23.196709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.197366]  ? __kmalloc_cache_noprof+0x162/0x350
[   23.198575]  kasan_atomics+0x1dd/0x310
[   23.198911]  ? __pfx_kasan_atomics+0x10/0x10
[   23.199560]  ? __pfx_kasan_atomics+0x10/0x10
[   23.199992]  kunit_try_run_case+0x1b3/0x490
[   23.200541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.201224]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.202002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.202931]  ? __kthread_parkme+0x82/0x160
[   23.203274]  ? preempt_count_sub+0x50/0x80
[   23.203741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.204167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.204683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.205166]  kthread+0x257/0x310
[   23.205714]  ? __pfx_kthread+0x10/0x10
[   23.206180]  ret_from_fork+0x41/0x80
[   23.206489]  ? __pfx_kthread+0x10/0x10
[   23.206872]  ret_from_fork_asm+0x1a/0x30
[   23.207534]  </TASK>
[   23.208076] 
[   23.208610] Allocated by task 269:
[   23.208991]  kasan_save_stack+0x3d/0x60
[   23.209907]  kasan_save_track+0x18/0x40
[   23.210812]  kasan_save_alloc_info+0x3b/0x50
[   23.211430]  __kasan_kmalloc+0xb7/0xc0
[   23.211851]  __kmalloc_cache_noprof+0x162/0x350
[   23.212249]  kasan_atomics+0x96/0x310
[   23.212806]  kunit_try_run_case+0x1b3/0x490
[   23.213263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.213763]  kthread+0x257/0x310
[   23.214196]  ret_from_fork+0x41/0x80
[   23.214541]  ret_from_fork_asm+0x1a/0x30
[   23.215150] 
[   23.215426] The buggy address belongs to the object at ffff888102c3d080
[   23.215426]  which belongs to the cache kmalloc-64 of size 64
[   23.216328] The buggy address is located 0 bytes to the right of
[   23.216328]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   23.217293] 
[   23.217491] The buggy address belongs to the physical page:
[   23.218011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   23.218560] flags: 0x200000000000000(node=0|zone=2)
[   23.219098] page_type: f5(slab)
[   23.219496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.220230] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.220811] page dumped because: kasan: bad access detected
[   23.221338] 
[   23.221567] Memory state around the buggy address:
[   23.221912]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.222548]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.223110] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.223751]                                      ^
[   23.224257]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.224860]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.225441] ==================================================================
---
[   21.824310] ==================================================================
[   21.825291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   21.825877] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.826383] 
[   21.826640] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.827310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.827601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.828580] Call Trace:
[   21.828995]  <TASK>
[   21.829416]  dump_stack_lvl+0x73/0xb0
[   21.829954]  print_report+0xd1/0x640
[   21.830513]  ? __virt_addr_valid+0x1db/0x2d0
[   21.831041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.831666]  kasan_report+0x102/0x140
[   21.832073]  ? kasan_atomics_helper+0x4a04/0x5450
[   21.832944]  ? kasan_atomics_helper+0x4a04/0x5450
[   21.833514]  __asan_report_load4_noabort+0x18/0x20
[   21.833979]  kasan_atomics_helper+0x4a04/0x5450
[   21.834615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.835140]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.835619]  kasan_atomics+0x1dd/0x310
[   21.836017]  ? __pfx_kasan_atomics+0x10/0x10
[   21.836571]  ? __pfx_kasan_atomics+0x10/0x10
[   21.837058]  kunit_try_run_case+0x1b3/0x490
[   21.837689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.838098]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.838636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.839072]  ? __kthread_parkme+0x82/0x160
[   21.839606]  ? preempt_count_sub+0x50/0x80
[   21.840033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.840657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.841255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.841785]  kthread+0x257/0x310
[   21.842185]  ? __pfx_kthread+0x10/0x10
[   21.842635]  ret_from_fork+0x41/0x80
[   21.843051]  ? __pfx_kthread+0x10/0x10
[   21.843600]  ret_from_fork_asm+0x1a/0x30
[   21.844034]  </TASK>
[   21.844394] 
[   21.844670] Allocated by task 269:
[   21.845036]  kasan_save_stack+0x3d/0x60
[   21.845606]  kasan_save_track+0x18/0x40
[   21.845979]  kasan_save_alloc_info+0x3b/0x50
[   21.846470]  __kasan_kmalloc+0xb7/0xc0
[   21.846962]  __kmalloc_cache_noprof+0x162/0x350
[   21.847455]  kasan_atomics+0x96/0x310
[   21.847866]  kunit_try_run_case+0x1b3/0x490
[   21.848353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.848899]  kthread+0x257/0x310
[   21.849278]  ret_from_fork+0x41/0x80
[   21.849666]  ret_from_fork_asm+0x1a/0x30
[   21.850148] 
[   21.850334] The buggy address belongs to the object at ffff888102c3d080
[   21.850334]  which belongs to the cache kmalloc-64 of size 64
[   21.851344] The buggy address is located 0 bytes to the right of
[   21.851344]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.852135] 
[   21.852467] The buggy address belongs to the physical page:
[   21.853012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.853850] flags: 0x200000000000000(node=0|zone=2)
[   21.854302] page_type: f5(slab)
[   21.854680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.855361] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.856042] page dumped because: kasan: bad access detected
[   21.856441] 
[   21.856673] Memory state around the buggy address:
[   21.857166]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.859210]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.859837] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.860471]                                      ^
[   21.861006]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.861743]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.862380] ==================================================================
---
[   21.983027] ==================================================================
[   21.983743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   21.984547] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.984946] 
[   21.985292] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.986232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.986670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.987516] Call Trace:
[   21.987848]  <TASK>
[   21.988351]  dump_stack_lvl+0x73/0xb0
[   21.988733]  print_report+0xd1/0x640
[   21.989234]  ? __virt_addr_valid+0x1db/0x2d0
[   21.989613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.990326]  kasan_report+0x102/0x140
[   21.990822]  ? kasan_atomics_helper+0x49d0/0x5450
[   21.991330]  ? kasan_atomics_helper+0x49d0/0x5450
[   21.991721]  __asan_report_load4_noabort+0x18/0x20
[   21.992451]  kasan_atomics_helper+0x49d0/0x5450
[   21.992969]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.993563]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.994115]  kasan_atomics+0x1dd/0x310
[   21.994575]  ? __pfx_kasan_atomics+0x10/0x10
[   21.995064]  ? __pfx_kasan_atomics+0x10/0x10
[   21.995647]  kunit_try_run_case+0x1b3/0x490
[   21.996250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.996840]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.997413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.997996]  ? __kthread_parkme+0x82/0x160
[   21.998534]  ? preempt_count_sub+0x50/0x80
[   21.998950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.999486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.000001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.000599]  kthread+0x257/0x310
[   22.000930]  ? __pfx_kthread+0x10/0x10
[   22.001423]  ret_from_fork+0x41/0x80
[   22.001859]  ? __pfx_kthread+0x10/0x10
[   22.002338]  ret_from_fork_asm+0x1a/0x30
[   22.002765]  </TASK>
[   22.003105] 
[   22.003375] Allocated by task 269:
[   22.003662]  kasan_save_stack+0x3d/0x60
[   22.004140]  kasan_save_track+0x18/0x40
[   22.004622]  kasan_save_alloc_info+0x3b/0x50
[   22.005092]  __kasan_kmalloc+0xb7/0xc0
[   22.005503]  __kmalloc_cache_noprof+0x162/0x350
[   22.005869]  kasan_atomics+0x96/0x310
[   22.006356]  kunit_try_run_case+0x1b3/0x490
[   22.006864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.007396]  kthread+0x257/0x310
[   22.007714]  ret_from_fork+0x41/0x80
[   22.008170]  ret_from_fork_asm+0x1a/0x30
[   22.008644] 
[   22.008919] The buggy address belongs to the object at ffff888102c3d080
[   22.008919]  which belongs to the cache kmalloc-64 of size 64
[   22.009740] The buggy address is located 0 bytes to the right of
[   22.009740]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.010738] 
[   22.010984] The buggy address belongs to the physical page:
[   22.011574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.012260] flags: 0x200000000000000(node=0|zone=2)
[   22.012745] page_type: f5(slab)
[   22.013061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.013729] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.014368] page dumped because: kasan: bad access detected
[   22.014873] 
[   22.015115] Memory state around the buggy address:
[   22.015647]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.016175]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.017114] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.017968]                                      ^
[   22.018412]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.018970]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.019554] ==================================================================
---
[   22.062914] ==================================================================
[   22.063469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   22.064157] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.064714] 
[   22.064978] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.065831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.066131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.067095] Call Trace:
[   22.067451]  <TASK>
[   22.067645]  dump_stack_lvl+0x73/0xb0
[   22.067948]  print_report+0xd1/0x640
[   22.068550]  ? __virt_addr_valid+0x1db/0x2d0
[   22.069054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.069662]  kasan_report+0x102/0x140
[   22.070104]  ? kasan_atomics_helper+0x4eb0/0x5450
[   22.070573]  ? kasan_atomics_helper+0x4eb0/0x5450
[   22.071074]  __asan_report_load8_noabort+0x18/0x20
[   22.072274]  kasan_atomics_helper+0x4eb0/0x5450
[   22.073937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.074228]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.074426]  kasan_atomics+0x1dd/0x310
[   22.074585]  ? __pfx_kasan_atomics+0x10/0x10
[   22.074751]  ? __pfx_kasan_atomics+0x10/0x10
[   22.075086]  kunit_try_run_case+0x1b3/0x490
[   22.075442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.076022]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.076546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.077450]  ? __kthread_parkme+0x82/0x160
[   22.077850]  ? preempt_count_sub+0x50/0x80
[   22.078194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.078751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.079591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.080602]  kthread+0x257/0x310
[   22.081176]  ? __pfx_kthread+0x10/0x10
[   22.081569]  ret_from_fork+0x41/0x80
[   22.082223]  ? __pfx_kthread+0x10/0x10
[   22.082588]  ret_from_fork_asm+0x1a/0x30
[   22.083242]  </TASK>
[   22.083503] 
[   22.084030] Allocated by task 269:
[   22.084416]  kasan_save_stack+0x3d/0x60
[   22.085014]  kasan_save_track+0x18/0x40
[   22.085342]  kasan_save_alloc_info+0x3b/0x50
[   22.086001]  __kasan_kmalloc+0xb7/0xc0
[   22.086674]  __kmalloc_cache_noprof+0x162/0x350
[   22.087101]  kasan_atomics+0x96/0x310
[   22.087762]  kunit_try_run_case+0x1b3/0x490
[   22.088404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.088937]  kthread+0x257/0x310
[   22.089277]  ret_from_fork+0x41/0x80
[   22.089655]  ret_from_fork_asm+0x1a/0x30
[   22.090416] 
[   22.090732] The buggy address belongs to the object at ffff888102c3d080
[   22.090732]  which belongs to the cache kmalloc-64 of size 64
[   22.091976] The buggy address is located 0 bytes to the right of
[   22.091976]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.092853] 
[   22.093075] The buggy address belongs to the physical page:
[   22.093559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.094273] flags: 0x200000000000000(node=0|zone=2)
[   22.094674] page_type: f5(slab)
[   22.095076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.095665] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.096308] page dumped because: kasan: bad access detected
[   22.096679] 
[   22.096930] Memory state around the buggy address:
[   22.097425]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097986]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.098595] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.099115]                                      ^
[   22.099591]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.100145]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.100768] ==================================================================

test log snippet boot parser 119

Home

[   20.923935] ==================================================================
[   20.924402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   20.925053] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.926166] 
[   20.926451] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.927944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.928364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.929119] Call Trace:
[   20.930413]  <TASK>
[   20.930725]  dump_stack_lvl+0x73/0xb0
[   20.931091]  print_report+0xd1/0x640
[   20.932087]  ? __virt_addr_valid+0x1db/0x2d0
[   20.933142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.934140]  kasan_report+0x102/0x140
[   20.934674]  ? kasan_atomics_helper+0x5ff/0x5450
[   20.935206]  ? kasan_atomics_helper+0x5ff/0x5450
[   20.935632]  kasan_check_range+0x10c/0x1c0
[   20.936108]  __kasan_check_write+0x18/0x20
[   20.936593]  kasan_atomics_helper+0x5ff/0x5450
[   20.937053]  ? kasan_save_alloc_info+0x3b/0x50
[   20.937597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.937948]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.938326]  kasan_atomics+0x1dd/0x310
[   20.938824]  ? __pfx_kasan_atomics+0x10/0x10
[   20.939357]  ? __pfx_kasan_atomics+0x10/0x10
[   20.939882]  kunit_try_run_case+0x1b3/0x490
[   20.940502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.941031]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.941609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.942012]  ? __kthread_parkme+0x82/0x160
[   20.942400]  ? preempt_count_sub+0x50/0x80
[   20.942983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.943581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.944177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.944792]  kthread+0x257/0x310
[   20.945260]  ? __pfx_kthread+0x10/0x10
[   20.945634]  ret_from_fork+0x41/0x80
[   20.946028]  ? __pfx_kthread+0x10/0x10
[   20.946588]  ret_from_fork_asm+0x1a/0x30
[   20.947047]  </TASK>
[   20.947273] 
[   20.947548] Allocated by task 269:
[   20.947972]  kasan_save_stack+0x3d/0x60
[   20.948474]  kasan_save_track+0x18/0x40
[   20.948944]  kasan_save_alloc_info+0x3b/0x50
[   20.949352]  __kasan_kmalloc+0xb7/0xc0
[   20.950049]  __kmalloc_cache_noprof+0x162/0x350
[   20.950523]  kasan_atomics+0x96/0x310
[   20.950971]  kunit_try_run_case+0x1b3/0x490
[   20.951517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.952029]  kthread+0x257/0x310
[   20.952339]  ret_from_fork+0x41/0x80
[   20.954276]  ret_from_fork_asm+0x1a/0x30
[   20.954834] 
[   20.955064] The buggy address belongs to the object at ffff888102c3d080
[   20.955064]  which belongs to the cache kmalloc-64 of size 64
[   20.956580] The buggy address is located 0 bytes to the right of
[   20.956580]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.958579] 
[   20.958745] The buggy address belongs to the physical page:
[   20.959962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.960804] flags: 0x200000000000000(node=0|zone=2)
[   20.961479] page_type: f5(slab)
[   20.962453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.963917] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.964368] page dumped because: kasan: bad access detected
[   20.964683] 
[   20.964862] Memory state around the buggy address:
[   20.965059]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.966380]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.966868] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.968065]                                      ^
[   20.968394]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.969557]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.970169] ==================================================================
---
[   21.300090] ==================================================================
[   21.300741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   21.301839] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.302532] 
[   21.302818] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.303640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.304089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.304860] Call Trace:
[   21.305171]  <TASK>
[   21.305543]  dump_stack_lvl+0x73/0xb0
[   21.305986]  print_report+0xd1/0x640
[   21.306458]  ? __virt_addr_valid+0x1db/0x2d0
[   21.306977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.307558]  kasan_report+0x102/0x140
[   21.308019]  ? kasan_atomics_helper+0xac8/0x5450
[   21.308596]  ? kasan_atomics_helper+0xac8/0x5450
[   21.309131]  kasan_check_range+0x10c/0x1c0
[   21.309569]  __kasan_check_write+0x18/0x20
[   21.310052]  kasan_atomics_helper+0xac8/0x5450
[   21.310619]  ? kasan_save_alloc_info+0x3b/0x50
[   21.311034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.311612]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.312150]  kasan_atomics+0x1dd/0x310
[   21.312623]  ? __pfx_kasan_atomics+0x10/0x10
[   21.313119]  ? __pfx_kasan_atomics+0x10/0x10
[   21.313632]  kunit_try_run_case+0x1b3/0x490
[   21.314153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.314680]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.315254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.315718]  ? __kthread_parkme+0x82/0x160
[   21.316251]  ? preempt_count_sub+0x50/0x80
[   21.316717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.317271]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.317884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.318459]  kthread+0x257/0x310
[   21.318904]  ? __pfx_kthread+0x10/0x10
[   21.319363]  ret_from_fork+0x41/0x80
[   21.319794]  ? __pfx_kthread+0x10/0x10
[   21.320146]  ret_from_fork_asm+0x1a/0x30
[   21.320689]  </TASK>
[   21.320994] 
[   21.321268] Allocated by task 269:
[   21.321590]  kasan_save_stack+0x3d/0x60
[   21.322025]  kasan_save_track+0x18/0x40
[   21.322515]  kasan_save_alloc_info+0x3b/0x50
[   21.322921]  __kasan_kmalloc+0xb7/0xc0
[   21.323446]  __kmalloc_cache_noprof+0x162/0x350
[   21.323852]  kasan_atomics+0x96/0x310
[   21.324332]  kunit_try_run_case+0x1b3/0x490
[   21.324741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.325410]  kthread+0x257/0x310
[   21.325757]  ret_from_fork+0x41/0x80
[   21.326124]  ret_from_fork_asm+0x1a/0x30
[   21.326654] 
[   21.326911] The buggy address belongs to the object at ffff888102c3d080
[   21.326911]  which belongs to the cache kmalloc-64 of size 64
[   21.327699] The buggy address is located 0 bytes to the right of
[   21.327699]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.328856] 
[   21.329033] The buggy address belongs to the physical page:
[   21.329520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.330308] flags: 0x200000000000000(node=0|zone=2)
[   21.330835] page_type: f5(slab)
[   21.331298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.331906] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.332488] page dumped because: kasan: bad access detected
[   21.333002] 
[   21.333264] Memory state around the buggy address:
[   21.333588]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334272]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.334924] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.335599]                                      ^
[   21.336033]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.336664]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337104] ==================================================================
---
[   21.066711] ==================================================================
[   21.067187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   21.067891] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.068624] 
[   21.068958] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.069673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.070468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.071123] Call Trace:
[   21.071364]  <TASK>
[   21.071587]  dump_stack_lvl+0x73/0xb0
[   21.072032]  print_report+0xd1/0x640
[   21.072434]  ? __virt_addr_valid+0x1db/0x2d0
[   21.074000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.074916]  kasan_report+0x102/0x140
[   21.075338]  ? kasan_atomics_helper+0x7c8/0x5450
[   21.076166]  ? kasan_atomics_helper+0x7c8/0x5450
[   21.076918]  kasan_check_range+0x10c/0x1c0
[   21.077753]  __kasan_check_write+0x18/0x20
[   21.078822]  kasan_atomics_helper+0x7c8/0x5450
[   21.079367]  ? kasan_save_alloc_info+0x3b/0x50
[   21.080074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.080579]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.081033]  kasan_atomics+0x1dd/0x310
[   21.081410]  ? __pfx_kasan_atomics+0x10/0x10
[   21.082364]  ? __pfx_kasan_atomics+0x10/0x10
[   21.082835]  kunit_try_run_case+0x1b3/0x490
[   21.083251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.084114]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.084759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.085468]  ? __kthread_parkme+0x82/0x160
[   21.085936]  ? preempt_count_sub+0x50/0x80
[   21.086828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.087292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.088512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.089227]  kthread+0x257/0x310
[   21.089583]  ? __pfx_kthread+0x10/0x10
[   21.090002]  ret_from_fork+0x41/0x80
[   21.090404]  ? __pfx_kthread+0x10/0x10
[   21.091101]  ret_from_fork_asm+0x1a/0x30
[   21.091787]  </TASK>
[   21.092658] 
[   21.093049] Allocated by task 269:
[   21.093685]  kasan_save_stack+0x3d/0x60
[   21.094390]  kasan_save_track+0x18/0x40
[   21.094975]  kasan_save_alloc_info+0x3b/0x50
[   21.095196]  __kasan_kmalloc+0xb7/0xc0
[   21.095500]  __kmalloc_cache_noprof+0x162/0x350
[   21.096137]  kasan_atomics+0x96/0x310
[   21.096522]  kunit_try_run_case+0x1b3/0x490
[   21.096992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.097934]  kthread+0x257/0x310
[   21.098226]  ret_from_fork+0x41/0x80
[   21.098625]  ret_from_fork_asm+0x1a/0x30
[   21.099055] 
[   21.099273] The buggy address belongs to the object at ffff888102c3d080
[   21.099273]  which belongs to the cache kmalloc-64 of size 64
[   21.100813] The buggy address is located 0 bytes to the right of
[   21.100813]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.101725] 
[   21.102033] The buggy address belongs to the physical page:
[   21.102580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.103883] flags: 0x200000000000000(node=0|zone=2)
[   21.104890] page_type: f5(slab)
[   21.105207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.105461] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.106954] page dumped because: kasan: bad access detected
[   21.107409] 
[   21.108131] Memory state around the buggy address:
[   21.108684]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.109570]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.110399] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.110848]                                      ^
[   21.111308]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111986]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.112822] ==================================================================
---
[   21.019553] ==================================================================
[   21.020542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   21.021026] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.022656] 
[   21.023226] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.024218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.024509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.025256] Call Trace:
[   21.025999]  <TASK>
[   21.026576]  dump_stack_lvl+0x73/0xb0
[   21.027177]  print_report+0xd1/0x640
[   21.027961]  ? __virt_addr_valid+0x1db/0x2d0
[   21.028235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.029239]  kasan_report+0x102/0x140
[   21.029599]  ? kasan_atomics_helper+0x730/0x5450
[   21.030422]  ? kasan_atomics_helper+0x730/0x5450
[   21.031137]  kasan_check_range+0x10c/0x1c0
[   21.031765]  __kasan_check_write+0x18/0x20
[   21.032248]  kasan_atomics_helper+0x730/0x5450
[   21.032884]  ? kasan_save_alloc_info+0x3b/0x50
[   21.033403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.034003]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.034489]  kasan_atomics+0x1dd/0x310
[   21.035116]  ? __pfx_kasan_atomics+0x10/0x10
[   21.035563]  ? __pfx_kasan_atomics+0x10/0x10
[   21.035947]  kunit_try_run_case+0x1b3/0x490
[   21.036544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.036967]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.037442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.038169]  ? __kthread_parkme+0x82/0x160
[   21.038667]  ? preempt_count_sub+0x50/0x80
[   21.039146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.039802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.040266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.040907]  kthread+0x257/0x310
[   21.041481]  ? __pfx_kthread+0x10/0x10
[   21.041941]  ret_from_fork+0x41/0x80
[   21.042447]  ? __pfx_kthread+0x10/0x10
[   21.042834]  ret_from_fork_asm+0x1a/0x30
[   21.043341]  </TASK>
[   21.043682] 
[   21.043985] Allocated by task 269:
[   21.044281]  kasan_save_stack+0x3d/0x60
[   21.044760]  kasan_save_track+0x18/0x40
[   21.045183]  kasan_save_alloc_info+0x3b/0x50
[   21.045550]  __kasan_kmalloc+0xb7/0xc0
[   21.046040]  __kmalloc_cache_noprof+0x162/0x350
[   21.046727]  kasan_atomics+0x96/0x310
[   21.047252]  kunit_try_run_case+0x1b3/0x490
[   21.047768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.048178]  kthread+0x257/0x310
[   21.048528]  ret_from_fork+0x41/0x80
[   21.049030]  ret_from_fork_asm+0x1a/0x30
[   21.049710] 
[   21.049965] The buggy address belongs to the object at ffff888102c3d080
[   21.049965]  which belongs to the cache kmalloc-64 of size 64
[   21.050906] The buggy address is located 0 bytes to the right of
[   21.050906]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.052072] 
[   21.052249] The buggy address belongs to the physical page:
[   21.052606] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.055076] flags: 0x200000000000000(node=0|zone=2)
[   21.055572] page_type: f5(slab)
[   21.055929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.056520] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.057900] page dumped because: kasan: bad access detected
[   21.058742] 
[   21.059158] Memory state around the buggy address:
[   21.059493]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.060297]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.061485] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.062154]                                      ^
[   21.063348]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.064076]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.065236] ==================================================================
---
[   20.971138] ==================================================================
[   20.971877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   20.973039] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.973627] 
[   20.974328] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.976311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.977008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.978041] Call Trace:
[   20.978503]  <TASK>
[   20.978854]  dump_stack_lvl+0x73/0xb0
[   20.979830]  print_report+0xd1/0x640
[   20.980319]  ? __virt_addr_valid+0x1db/0x2d0
[   20.980967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.981877]  kasan_report+0x102/0x140
[   20.982867]  ? kasan_atomics_helper+0x698/0x5450
[   20.983079]  ? kasan_atomics_helper+0x698/0x5450
[   20.983578]  kasan_check_range+0x10c/0x1c0
[   20.984522]  __kasan_check_write+0x18/0x20
[   20.985398]  kasan_atomics_helper+0x698/0x5450
[   20.985936]  ? kasan_save_alloc_info+0x3b/0x50
[   20.986632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.987278]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.987980]  kasan_atomics+0x1dd/0x310
[   20.988422]  ? __pfx_kasan_atomics+0x10/0x10
[   20.988872]  ? __pfx_kasan_atomics+0x10/0x10
[   20.989351]  kunit_try_run_case+0x1b3/0x490
[   20.989834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.990215]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.990701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.991221]  ? __kthread_parkme+0x82/0x160
[   20.991656]  ? preempt_count_sub+0x50/0x80
[   20.992037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.992484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.993101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.993604]  kthread+0x257/0x310
[   20.994041]  ? __pfx_kthread+0x10/0x10
[   20.994326]  ret_from_fork+0x41/0x80
[   20.994582]  ? __pfx_kthread+0x10/0x10
[   20.995010]  ret_from_fork_asm+0x1a/0x30
[   20.996145]  </TASK>
[   20.996468] 
[   20.996734] Allocated by task 269:
[   20.997078]  kasan_save_stack+0x3d/0x60
[   20.997528]  kasan_save_track+0x18/0x40
[   20.997998]  kasan_save_alloc_info+0x3b/0x50
[   20.998439]  __kasan_kmalloc+0xb7/0xc0
[   20.998816]  __kmalloc_cache_noprof+0x162/0x350
[   20.999341]  kasan_atomics+0x96/0x310
[   21.000094]  kunit_try_run_case+0x1b3/0x490
[   21.000548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.001103]  kthread+0x257/0x310
[   21.001746]  ret_from_fork+0x41/0x80
[   21.002188]  ret_from_fork_asm+0x1a/0x30
[   21.002632] 
[   21.002879] The buggy address belongs to the object at ffff888102c3d080
[   21.002879]  which belongs to the cache kmalloc-64 of size 64
[   21.003731] The buggy address is located 0 bytes to the right of
[   21.003731]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.005800] 
[   21.006026] The buggy address belongs to the physical page:
[   21.006855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.008422] flags: 0x200000000000000(node=0|zone=2)
[   21.009392] page_type: f5(slab)
[   21.009674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.011071] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.011883] page dumped because: kasan: bad access detected
[   21.012926] 
[   21.013196] Memory state around the buggy address:
[   21.013619]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.014243]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.014805] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.015500]                                      ^
[   21.016926]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017370]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.018654] ==================================================================
---
[   21.114299] ==================================================================
[   21.114759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   21.116399] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.117328] 
[   21.118084] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.119921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.120286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.121332] Call Trace:
[   21.121926]  <TASK>
[   21.122329]  dump_stack_lvl+0x73/0xb0
[   21.123014]  print_report+0xd1/0x640
[   21.123711]  ? __virt_addr_valid+0x1db/0x2d0
[   21.124073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.124558]  kasan_report+0x102/0x140
[   21.125067]  ? kasan_atomics_helper+0x861/0x5450
[   21.125992]  ? kasan_atomics_helper+0x861/0x5450
[   21.126856]  kasan_check_range+0x10c/0x1c0
[   21.127244]  __kasan_check_write+0x18/0x20
[   21.127825]  kasan_atomics_helper+0x861/0x5450
[   21.128275]  ? kasan_save_alloc_info+0x3b/0x50
[   21.128960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.129585]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.130173]  kasan_atomics+0x1dd/0x310
[   21.130888]  ? __pfx_kasan_atomics+0x10/0x10
[   21.131966]  ? __pfx_kasan_atomics+0x10/0x10
[   21.132485]  kunit_try_run_case+0x1b3/0x490
[   21.132928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.133513]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.134205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.135048]  ? __kthread_parkme+0x82/0x160
[   21.135659]  ? preempt_count_sub+0x50/0x80
[   21.136058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.136921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.137628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.138213]  kthread+0x257/0x310
[   21.138842]  ? __pfx_kthread+0x10/0x10
[   21.139191]  ret_from_fork+0x41/0x80
[   21.140131]  ? __pfx_kthread+0x10/0x10
[   21.140522]  ret_from_fork_asm+0x1a/0x30
[   21.141154]  </TASK>
[   21.141455] 
[   21.141906] Allocated by task 269:
[   21.142401]  kasan_save_stack+0x3d/0x60
[   21.142943]  kasan_save_track+0x18/0x40
[   21.143579]  kasan_save_alloc_info+0x3b/0x50
[   21.144866]  __kasan_kmalloc+0xb7/0xc0
[   21.145252]  __kmalloc_cache_noprof+0x162/0x350
[   21.145765]  kasan_atomics+0x96/0x310
[   21.146504]  kunit_try_run_case+0x1b3/0x490
[   21.146901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.147478]  kthread+0x257/0x310
[   21.147825]  ret_from_fork+0x41/0x80
[   21.148288]  ret_from_fork_asm+0x1a/0x30
[   21.149589] 
[   21.149834] The buggy address belongs to the object at ffff888102c3d080
[   21.149834]  which belongs to the cache kmalloc-64 of size 64
[   21.151144] The buggy address is located 0 bytes to the right of
[   21.151144]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.152326] 
[   21.152892] The buggy address belongs to the physical page:
[   21.153786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.154730] flags: 0x200000000000000(node=0|zone=2)
[   21.155254] page_type: f5(slab)
[   21.155638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.156236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.157568] page dumped because: kasan: bad access detected
[   21.158232] 
[   21.158669] Memory state around the buggy address:
[   21.159363]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.160085]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.160666] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.161228]                                      ^
[   21.162167]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.162828]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.163699] ==================================================================
---
[   21.338894] ==================================================================
[   21.339664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   21.340436] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.341037] 
[   21.341340] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.342107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.342522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.343255] Call Trace:
[   21.343631]  <TASK>
[   21.343936]  dump_stack_lvl+0x73/0xb0
[   21.344410]  print_report+0xd1/0x640
[   21.344868]  ? __virt_addr_valid+0x1db/0x2d0
[   21.345382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.345968]  kasan_report+0x102/0x140
[   21.346479]  ? kasan_atomics_helper+0xb6b/0x5450
[   21.346886]  ? kasan_atomics_helper+0xb6b/0x5450
[   21.347496]  kasan_check_range+0x10c/0x1c0
[   21.347935]  __kasan_check_write+0x18/0x20
[   21.348469]  kasan_atomics_helper+0xb6b/0x5450
[   21.348978]  ? kasan_save_alloc_info+0x3b/0x50
[   21.349517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.350049]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.350649]  kasan_atomics+0x1dd/0x310
[   21.351062]  ? __pfx_kasan_atomics+0x10/0x10
[   21.351562]  ? __pfx_kasan_atomics+0x10/0x10
[   21.352110]  kunit_try_run_case+0x1b3/0x490
[   21.352595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.353132]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.353712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.354267]  ? __kthread_parkme+0x82/0x160
[   21.354752]  ? preempt_count_sub+0x50/0x80
[   21.355309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.355799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.356392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.356927]  kthread+0x257/0x310
[   21.357355]  ? __pfx_kthread+0x10/0x10
[   21.357818]  ret_from_fork+0x41/0x80
[   21.358234]  ? __pfx_kthread+0x10/0x10
[   21.358670]  ret_from_fork_asm+0x1a/0x30
[   21.359096]  </TASK>
[   21.359361] 
[   21.359631] Allocated by task 269:
[   21.360009]  kasan_save_stack+0x3d/0x60
[   21.360510]  kasan_save_track+0x18/0x40
[   21.360962]  kasan_save_alloc_info+0x3b/0x50
[   21.361412]  __kasan_kmalloc+0xb7/0xc0
[   21.361866]  __kmalloc_cache_noprof+0x162/0x350
[   21.362404]  kasan_atomics+0x96/0x310
[   21.362838]  kunit_try_run_case+0x1b3/0x490
[   21.363262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.363814]  kthread+0x257/0x310
[   21.364257]  ret_from_fork+0x41/0x80
[   21.364559]  ret_from_fork_asm+0x1a/0x30
[   21.364986] 
[   21.365304] The buggy address belongs to the object at ffff888102c3d080
[   21.365304]  which belongs to the cache kmalloc-64 of size 64
[   21.366459] The buggy address is located 0 bytes to the right of
[   21.366459]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.367293] 
[   21.367568] The buggy address belongs to the physical page:
[   21.368104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.368696] flags: 0x200000000000000(node=0|zone=2)
[   21.369267] page_type: f5(slab)
[   21.369638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.370262] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.370922] page dumped because: kasan: bad access detected
[   21.371456] 
[   21.371728] Memory state around the buggy address:
[   21.372159]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.372741]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.373489] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.374086]                                      ^
[   21.374515]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.375155]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.375612] ==================================================================
---
[   21.256702] ==================================================================
[   21.257499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   21.258437] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.259080] 
[   21.259369] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.260274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.260628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.261293] Call Trace:
[   21.261527]  <TASK>
[   21.261766]  dump_stack_lvl+0x73/0xb0
[   21.262258]  print_report+0xd1/0x640
[   21.262753]  ? __virt_addr_valid+0x1db/0x2d0
[   21.263339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.264016]  kasan_report+0x102/0x140
[   21.266894]  ? kasan_atomics_helper+0xa2c/0x5450
[   21.267251]  ? kasan_atomics_helper+0xa2c/0x5450
[   21.268017]  kasan_check_range+0x10c/0x1c0
[   21.268845]  __kasan_check_write+0x18/0x20
[   21.269665]  kasan_atomics_helper+0xa2c/0x5450
[   21.270417]  ? kasan_save_alloc_info+0x3b/0x50
[   21.270800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.271260]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.271682]  kasan_atomics+0x1dd/0x310
[   21.272070]  ? __pfx_kasan_atomics+0x10/0x10
[   21.272461]  ? __pfx_kasan_atomics+0x10/0x10
[   21.273440]  kunit_try_run_case+0x1b3/0x490
[   21.273965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.274482]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.274914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.275693]  ? __kthread_parkme+0x82/0x160
[   21.276029]  ? preempt_count_sub+0x50/0x80
[   21.276887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.277444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.278160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.278726]  kthread+0x257/0x310
[   21.279081]  ? __pfx_kthread+0x10/0x10
[   21.279913]  ret_from_fork+0x41/0x80
[   21.280193]  ? __pfx_kthread+0x10/0x10
[   21.280844]  ret_from_fork_asm+0x1a/0x30
[   21.281571]  </TASK>
[   21.281813] 
[   21.281975] Allocated by task 269:
[   21.282757]  kasan_save_stack+0x3d/0x60
[   21.282956]  kasan_save_track+0x18/0x40
[   21.283110]  kasan_save_alloc_info+0x3b/0x50
[   21.283389]  __kasan_kmalloc+0xb7/0xc0
[   21.284083]  __kmalloc_cache_noprof+0x162/0x350
[   21.284691]  kasan_atomics+0x96/0x310
[   21.285015]  kunit_try_run_case+0x1b3/0x490
[   21.285351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.285744]  kthread+0x257/0x310
[   21.286023]  ret_from_fork+0x41/0x80
[   21.286737]  ret_from_fork_asm+0x1a/0x30
[   21.287433] 
[   21.287832] The buggy address belongs to the object at ffff888102c3d080
[   21.287832]  which belongs to the cache kmalloc-64 of size 64
[   21.288974] The buggy address is located 0 bytes to the right of
[   21.288974]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.290129] 
[   21.290398] The buggy address belongs to the physical page:
[   21.291004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.291672] flags: 0x200000000000000(node=0|zone=2)
[   21.292178] page_type: f5(slab)
[   21.292501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.293264] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.293869] page dumped because: kasan: bad access detected
[   21.294433] 
[   21.294703] Memory state around the buggy address:
[   21.295246]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.295744]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.296478] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.297013]                                      ^
[   21.297585]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298261]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298835] ==================================================================
---
[   21.215151] ==================================================================
[   21.216357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   21.216936] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.218220] 
[   21.218445] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.219123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.219874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.220664] Call Trace:
[   21.220910]  <TASK>
[   21.221115]  dump_stack_lvl+0x73/0xb0
[   21.222146]  print_report+0xd1/0x640
[   21.223267]  ? __virt_addr_valid+0x1db/0x2d0
[   21.223922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.224490]  kasan_report+0x102/0x140
[   21.225103]  ? kasan_atomics_helper+0x993/0x5450
[   21.225651]  ? kasan_atomics_helper+0x993/0x5450
[   21.226162]  kasan_check_range+0x10c/0x1c0
[   21.226948]  __kasan_check_write+0x18/0x20
[   21.227881]  kasan_atomics_helper+0x993/0x5450
[   21.228223]  ? kasan_save_alloc_info+0x3b/0x50
[   21.229010]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.230173]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.230978]  kasan_atomics+0x1dd/0x310
[   21.231377]  ? __pfx_kasan_atomics+0x10/0x10
[   21.231860]  ? __pfx_kasan_atomics+0x10/0x10
[   21.232644]  kunit_try_run_case+0x1b3/0x490
[   21.233392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.234098]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.234744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.235212]  ? __kthread_parkme+0x82/0x160
[   21.235571]  ? preempt_count_sub+0x50/0x80
[   21.236045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.236476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.237014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.237652]  kthread+0x257/0x310
[   21.238009]  ? __pfx_kthread+0x10/0x10
[   21.238558]  ret_from_fork+0x41/0x80
[   21.238866]  ? __pfx_kthread+0x10/0x10
[   21.239279]  ret_from_fork_asm+0x1a/0x30
[   21.239748]  </TASK>
[   21.240041] 
[   21.240248] Allocated by task 269:
[   21.240541]  kasan_save_stack+0x3d/0x60
[   21.241078]  kasan_save_track+0x18/0x40
[   21.241427]  kasan_save_alloc_info+0x3b/0x50
[   21.241895]  __kasan_kmalloc+0xb7/0xc0
[   21.242351]  __kmalloc_cache_noprof+0x162/0x350
[   21.242874]  kasan_atomics+0x96/0x310
[   21.243250]  kunit_try_run_case+0x1b3/0x490
[   21.243689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.244295]  kthread+0x257/0x310
[   21.244606]  ret_from_fork+0x41/0x80
[   21.245044]  ret_from_fork_asm+0x1a/0x30
[   21.245468] 
[   21.245695] The buggy address belongs to the object at ffff888102c3d080
[   21.245695]  which belongs to the cache kmalloc-64 of size 64
[   21.246526] The buggy address is located 0 bytes to the right of
[   21.246526]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.247665] 
[   21.247885] The buggy address belongs to the physical page:
[   21.248279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.249034] flags: 0x200000000000000(node=0|zone=2)
[   21.249505] page_type: f5(slab)
[   21.249801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.250523] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.251110] page dumped because: kasan: bad access detected
[   21.251684] 
[   21.251890] Memory state around the buggy address:
[   21.252377]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.252948]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.253424] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.254009]                                      ^
[   21.254527]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.255257]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.255673] ==================================================================
---
[   20.783586] ==================================================================
[   20.784143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   20.784954] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.785601] 
[   20.786080] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.787201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.787743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.788486] Call Trace:
[   20.788765]  <TASK>
[   20.789029]  dump_stack_lvl+0x73/0xb0
[   20.789615]  print_report+0xd1/0x640
[   20.790033]  ? __virt_addr_valid+0x1db/0x2d0
[   20.790577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.791378]  kasan_report+0x102/0x140
[   20.791820]  ? kasan_atomics_helper+0x4a1/0x5450
[   20.792235]  ? kasan_atomics_helper+0x4a1/0x5450
[   20.792737]  kasan_check_range+0x10c/0x1c0
[   20.793113]  __kasan_check_write+0x18/0x20
[   20.793533]  kasan_atomics_helper+0x4a1/0x5450
[   20.794207]  ? kasan_save_alloc_info+0x3b/0x50
[   20.794663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.795595]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.796109]  kasan_atomics+0x1dd/0x310
[   20.796560]  ? __pfx_kasan_atomics+0x10/0x10
[   20.797124]  ? __pfx_kasan_atomics+0x10/0x10
[   20.797695]  kunit_try_run_case+0x1b3/0x490
[   20.798183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.799181]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.799609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.800150]  ? __kthread_parkme+0x82/0x160
[   20.800680]  ? preempt_count_sub+0x50/0x80
[   20.801153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.801720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.802221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.802881]  kthread+0x257/0x310
[   20.803164]  ? __pfx_kthread+0x10/0x10
[   20.803930]  ret_from_fork+0x41/0x80
[   20.804332]  ? __pfx_kthread+0x10/0x10
[   20.804880]  ret_from_fork_asm+0x1a/0x30
[   20.805321]  </TASK>
[   20.805594] 
[   20.806852] Allocated by task 269:
[   20.807637]  kasan_save_stack+0x3d/0x60
[   20.808699]  kasan_save_track+0x18/0x40
[   20.809069]  kasan_save_alloc_info+0x3b/0x50
[   20.809554]  __kasan_kmalloc+0xb7/0xc0
[   20.809927]  __kmalloc_cache_noprof+0x162/0x350
[   20.810542]  kasan_atomics+0x96/0x310
[   20.811046]  kunit_try_run_case+0x1b3/0x490
[   20.811683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.812038]  kthread+0x257/0x310
[   20.812341]  ret_from_fork+0x41/0x80
[   20.812733]  ret_from_fork_asm+0x1a/0x30
[   20.813354] 
[   20.813594] The buggy address belongs to the object at ffff888102c3d080
[   20.813594]  which belongs to the cache kmalloc-64 of size 64
[   20.815668] The buggy address is located 0 bytes to the right of
[   20.815668]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.816947] 
[   20.817233] The buggy address belongs to the physical page:
[   20.818193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.819144] flags: 0x200000000000000(node=0|zone=2)
[   20.819815] page_type: f5(slab)
[   20.820310] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.821237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.822183] page dumped because: kasan: bad access detected
[   20.822397] 
[   20.822629] Memory state around the buggy address:
[   20.823165]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.823813]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.824363] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.825096]                                      ^
[   20.825422]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.826763]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827643] ==================================================================
---
[   21.165251] ==================================================================
[   21.165692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   21.167515] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.168226] 
[   21.168622] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.170041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.170710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.171759] Call Trace:
[   21.172035]  <TASK>
[   21.172316]  dump_stack_lvl+0x73/0xb0
[   21.172695]  print_report+0xd1/0x640
[   21.173107]  ? __virt_addr_valid+0x1db/0x2d0
[   21.173539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.174102]  kasan_report+0x102/0x140
[   21.174422]  ? kasan_atomics_helper+0x8fa/0x5450
[   21.175216]  ? kasan_atomics_helper+0x8fa/0x5450
[   21.175971]  kasan_check_range+0x10c/0x1c0
[   21.176878]  __kasan_check_write+0x18/0x20
[   21.177458]  kasan_atomics_helper+0x8fa/0x5450
[   21.177878]  ? kasan_save_alloc_info+0x3b/0x50
[   21.178688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.179598]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.180134]  kasan_atomics+0x1dd/0x310
[   21.180994]  ? __pfx_kasan_atomics+0x10/0x10
[   21.181391]  ? __pfx_kasan_atomics+0x10/0x10
[   21.182081]  kunit_try_run_case+0x1b3/0x490
[   21.182713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.183233]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.183882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.184646]  ? __kthread_parkme+0x82/0x160
[   21.185269]  ? preempt_count_sub+0x50/0x80
[   21.186636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.187114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.187806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.188418]  kthread+0x257/0x310
[   21.188993]  ? __pfx_kthread+0x10/0x10
[   21.189427]  ret_from_fork+0x41/0x80
[   21.190363]  ? __pfx_kthread+0x10/0x10
[   21.190761]  ret_from_fork_asm+0x1a/0x30
[   21.191336]  </TASK>
[   21.191788] 
[   21.192223] Allocated by task 269:
[   21.192597]  kasan_save_stack+0x3d/0x60
[   21.193090]  kasan_save_track+0x18/0x40
[   21.193514]  kasan_save_alloc_info+0x3b/0x50
[   21.194063]  __kasan_kmalloc+0xb7/0xc0
[   21.195097]  __kmalloc_cache_noprof+0x162/0x350
[   21.195812]  kasan_atomics+0x96/0x310
[   21.196205]  kunit_try_run_case+0x1b3/0x490
[   21.196616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.197389]  kthread+0x257/0x310
[   21.197974]  ret_from_fork+0x41/0x80
[   21.198346]  ret_from_fork_asm+0x1a/0x30
[   21.198831] 
[   21.199009] The buggy address belongs to the object at ffff888102c3d080
[   21.199009]  which belongs to the cache kmalloc-64 of size 64
[   21.200482] The buggy address is located 0 bytes to the right of
[   21.200482]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.202163] 
[   21.202820] The buggy address belongs to the physical page:
[   21.203893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.204309] flags: 0x200000000000000(node=0|zone=2)
[   21.204716] page_type: f5(slab)
[   21.205096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.205753] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.206713] page dumped because: kasan: bad access detected
[   21.207433] 
[   21.208130] Memory state around the buggy address:
[   21.208546]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209339]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.210176] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.210925]                                      ^
[   21.211439]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.212424]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.213573] ==================================================================
---
[   20.874792] ==================================================================
[   20.875498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   20.876472] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.877113] 
[   20.878096] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.879266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.879822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.880723] Call Trace:
[   20.881004]  <TASK>
[   20.881281]  dump_stack_lvl+0x73/0xb0
[   20.882016]  print_report+0xd1/0x640
[   20.882813]  ? __virt_addr_valid+0x1db/0x2d0
[   20.883134]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.883671]  kasan_report+0x102/0x140
[   20.884094]  ? kasan_atomics_helper+0x566/0x5450
[   20.884517]  ? kasan_atomics_helper+0x566/0x5450
[   20.885153]  kasan_check_range+0x10c/0x1c0
[   20.886276]  __kasan_check_write+0x18/0x20
[   20.886658]  kasan_atomics_helper+0x566/0x5450
[   20.887318]  ? kasan_save_alloc_info+0x3b/0x50
[   20.888300]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.889007]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.889935]  kasan_atomics+0x1dd/0x310
[   20.890563]  ? __pfx_kasan_atomics+0x10/0x10
[   20.891152]  ? __pfx_kasan_atomics+0x10/0x10
[   20.892175]  kunit_try_run_case+0x1b3/0x490
[   20.892614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.893101]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.893545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.894225]  ? __kthread_parkme+0x82/0x160
[   20.894596]  ? preempt_count_sub+0x50/0x80
[   20.895164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.896141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.896730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.897310]  kthread+0x257/0x310
[   20.897930]  ? __pfx_kthread+0x10/0x10
[   20.898659]  ret_from_fork+0x41/0x80
[   20.899088]  ? __pfx_kthread+0x10/0x10
[   20.899511]  ret_from_fork_asm+0x1a/0x30
[   20.899924]  </TASK>
[   20.900202] 
[   20.900903] Allocated by task 269:
[   20.901241]  kasan_save_stack+0x3d/0x60
[   20.902101]  kasan_save_track+0x18/0x40
[   20.902574]  kasan_save_alloc_info+0x3b/0x50
[   20.903362]  __kasan_kmalloc+0xb7/0xc0
[   20.903988]  __kmalloc_cache_noprof+0x162/0x350
[   20.904826]  kasan_atomics+0x96/0x310
[   20.905244]  kunit_try_run_case+0x1b3/0x490
[   20.906031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.907224]  kthread+0x257/0x310
[   20.907647]  ret_from_fork+0x41/0x80
[   20.908194]  ret_from_fork_asm+0x1a/0x30
[   20.908750] 
[   20.909004] The buggy address belongs to the object at ffff888102c3d080
[   20.909004]  which belongs to the cache kmalloc-64 of size 64
[   20.909869] The buggy address is located 0 bytes to the right of
[   20.909869]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.911623] 
[   20.912037] The buggy address belongs to the physical page:
[   20.912590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.913339] flags: 0x200000000000000(node=0|zone=2)
[   20.913798] page_type: f5(slab)
[   20.914578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.915691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.916327] page dumped because: kasan: bad access detected
[   20.916803] 
[   20.917170] Memory state around the buggy address:
[   20.917659]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918671]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.919744] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.920419]                                      ^
[   20.921112]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.921966]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.922581] ==================================================================

test log snippet boot parser 120

Home

[   22.138904] ==================================================================
[   22.139706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   22.140760] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.141343] 
[   22.141529] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.142436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.142837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.143622] Call Trace:
[   22.143888]  <TASK>
[   22.144279]  dump_stack_lvl+0x73/0xb0
[   22.144672]  print_report+0xd1/0x640
[   22.145129]  ? __virt_addr_valid+0x1db/0x2d0
[   22.145647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.146266]  kasan_report+0x102/0x140
[   22.146703]  ? kasan_atomics_helper+0x50d6/0x5450
[   22.147275]  ? kasan_atomics_helper+0x50d6/0x5450
[   22.147804]  __asan_report_store8_noabort+0x1b/0x30
[   22.148326]  kasan_atomics_helper+0x50d6/0x5450
[   22.148845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.149434]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.149941]  kasan_atomics+0x1dd/0x310
[   22.150457]  ? __pfx_kasan_atomics+0x10/0x10
[   22.150912]  ? __pfx_kasan_atomics+0x10/0x10
[   22.151303]  kunit_try_run_case+0x1b3/0x490
[   22.151808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.152361]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.152904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.153471]  ? __kthread_parkme+0x82/0x160
[   22.153910]  ? preempt_count_sub+0x50/0x80
[   22.154447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.154922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.155541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.156132]  kthread+0x257/0x310
[   22.156562]  ? __pfx_kthread+0x10/0x10
[   22.157033]  ret_from_fork+0x41/0x80
[   22.157441]  ? __pfx_kthread+0x10/0x10
[   22.157883]  ret_from_fork_asm+0x1a/0x30
[   22.158444]  </TASK>
[   22.158686] 
[   22.158969] Allocated by task 269:
[   22.159360]  kasan_save_stack+0x3d/0x60
[   22.159754]  kasan_save_track+0x18/0x40
[   22.160191]  kasan_save_alloc_info+0x3b/0x50
[   22.160576]  __kasan_kmalloc+0xb7/0xc0
[   22.161053]  __kmalloc_cache_noprof+0x162/0x350
[   22.161464]  kasan_atomics+0x96/0x310
[   22.161754]  kunit_try_run_case+0x1b3/0x490
[   22.162116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.162737]  kthread+0x257/0x310
[   22.163222]  ret_from_fork+0x41/0x80
[   22.163634]  ret_from_fork_asm+0x1a/0x30
[   22.164129] 
[   22.164426] The buggy address belongs to the object at ffff888102c3d080
[   22.164426]  which belongs to the cache kmalloc-64 of size 64
[   22.165292] The buggy address is located 0 bytes to the right of
[   22.165292]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.166372] 
[   22.166638] The buggy address belongs to the physical page:
[   22.167072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.167832] flags: 0x200000000000000(node=0|zone=2)
[   22.168814] page_type: f5(slab)
[   22.169231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.169696] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.170716] page dumped because: kasan: bad access detected
[   22.171360] 
[   22.171588] Memory state around the buggy address:
[   22.172172]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.172917]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.173624] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.174396]                                      ^
[   22.174798]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.175364]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.176378] ==================================================================

test log snippet boot parser 121

Home

[   20.596047] ==================================================================
[   20.596691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   20.597483] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.598048] 
[   20.598305] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.599079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.600162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.600917] Call Trace:
[   20.601410]  <TASK>
[   20.601859]  dump_stack_lvl+0x73/0xb0
[   20.602290]  print_report+0xd1/0x640
[   20.602876]  ? __virt_addr_valid+0x1db/0x2d0
[   20.603337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.604327]  kasan_report+0x102/0x140
[   20.604838]  ? kasan_atomics_helper+0x4b8a/0x5450
[   20.605358]  ? kasan_atomics_helper+0x4b8a/0x5450
[   20.606042]  __asan_report_load4_noabort+0x18/0x20
[   20.606522]  kasan_atomics_helper+0x4b8a/0x5450
[   20.607180]  ? kasan_save_alloc_info+0x3b/0x50
[   20.607962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.608649]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.609141]  kasan_atomics+0x1dd/0x310
[   20.609733]  ? __pfx_kasan_atomics+0x10/0x10
[   20.610167]  ? __pfx_kasan_atomics+0x10/0x10
[   20.610596]  kunit_try_run_case+0x1b3/0x490
[   20.611013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.611407]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.612316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.612961]  ? __kthread_parkme+0x82/0x160
[   20.613409]  ? preempt_count_sub+0x50/0x80
[   20.613952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.614406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.615089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.615598]  kthread+0x257/0x310
[   20.615980]  ? __pfx_kthread+0x10/0x10
[   20.616341]  ret_from_fork+0x41/0x80
[   20.616721]  ? __pfx_kthread+0x10/0x10
[   20.617672]  ret_from_fork_asm+0x1a/0x30
[   20.618048]  </TASK>
[   20.618443] 
[   20.618836] Allocated by task 269:
[   20.619181]  kasan_save_stack+0x3d/0x60
[   20.619859]  kasan_save_track+0x18/0x40
[   20.620219]  kasan_save_alloc_info+0x3b/0x50
[   20.621118]  __kasan_kmalloc+0xb7/0xc0
[   20.621589]  __kmalloc_cache_noprof+0x162/0x350
[   20.622041]  kasan_atomics+0x96/0x310
[   20.622680]  kunit_try_run_case+0x1b3/0x490
[   20.623020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.624039]  kthread+0x257/0x310
[   20.624421]  ret_from_fork+0x41/0x80
[   20.624762]  ret_from_fork_asm+0x1a/0x30
[   20.625160] 
[   20.625390] The buggy address belongs to the object at ffff888102c3d080
[   20.625390]  which belongs to the cache kmalloc-64 of size 64
[   20.627002] The buggy address is located 0 bytes to the right of
[   20.627002]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.628844] 
[   20.629004] The buggy address belongs to the physical page:
[   20.630113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.631380] flags: 0x200000000000000(node=0|zone=2)
[   20.631980] page_type: f5(slab)
[   20.632235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.633467] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.634696] page dumped because: kasan: bad access detected
[   20.635531] 
[   20.635701] Memory state around the buggy address:
[   20.636555]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.637055]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.637893] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.639035]                                      ^
[   20.639444]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.640809]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.641307] ==================================================================
---
[   20.734795] ==================================================================
[   20.735240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   20.737081] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.737566] 
[   20.738301] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.739734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.740112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.740951] Call Trace:
[   20.741662]  <TASK>
[   20.741962]  dump_stack_lvl+0x73/0xb0
[   20.742807]  print_report+0xd1/0x640
[   20.743206]  ? __virt_addr_valid+0x1db/0x2d0
[   20.744307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.745024]  kasan_report+0x102/0x140
[   20.745636]  ? kasan_atomics_helper+0x4b56/0x5450
[   20.746076]  ? kasan_atomics_helper+0x4b56/0x5450
[   20.747225]  __asan_report_load4_noabort+0x18/0x20
[   20.747990]  kasan_atomics_helper+0x4b56/0x5450
[   20.748428]  ? kasan_save_alloc_info+0x3b/0x50
[   20.749169]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.750281]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.750895]  kasan_atomics+0x1dd/0x310
[   20.751246]  ? __pfx_kasan_atomics+0x10/0x10
[   20.752007]  ? __pfx_kasan_atomics+0x10/0x10
[   20.752395]  kunit_try_run_case+0x1b3/0x490
[   20.752913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.753448]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.753862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.754412]  ? __kthread_parkme+0x82/0x160
[   20.754742]  ? preempt_count_sub+0x50/0x80
[   20.755326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.756170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.756889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.757285]  kthread+0x257/0x310
[   20.758275]  ? __pfx_kthread+0x10/0x10
[   20.758688]  ret_from_fork+0x41/0x80
[   20.759312]  ? __pfx_kthread+0x10/0x10
[   20.760084]  ret_from_fork_asm+0x1a/0x30
[   20.760626]  </TASK>
[   20.761088] 
[   20.761403] Allocated by task 269:
[   20.761989]  kasan_save_stack+0x3d/0x60
[   20.762513]  kasan_save_track+0x18/0x40
[   20.762960]  kasan_save_alloc_info+0x3b/0x50
[   20.763916]  __kasan_kmalloc+0xb7/0xc0
[   20.764313]  __kmalloc_cache_noprof+0x162/0x350
[   20.765090]  kasan_atomics+0x96/0x310
[   20.765481]  kunit_try_run_case+0x1b3/0x490
[   20.765931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.766571]  kthread+0x257/0x310
[   20.767243]  ret_from_fork+0x41/0x80
[   20.768008]  ret_from_fork_asm+0x1a/0x30
[   20.768584] 
[   20.769153] The buggy address belongs to the object at ffff888102c3d080
[   20.769153]  which belongs to the cache kmalloc-64 of size 64
[   20.770578] The buggy address is located 0 bytes to the right of
[   20.770578]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.772099] 
[   20.772516] The buggy address belongs to the physical page:
[   20.773163] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.774099] flags: 0x200000000000000(node=0|zone=2)
[   20.775176] page_type: f5(slab)
[   20.775485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.776145] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.777153] page dumped because: kasan: bad access detected
[   20.777592] 
[   20.777829] Memory state around the buggy address:
[   20.778265]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.778983]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.779794] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.780331]                                      ^
[   20.780792]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.781391]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.782184] ==================================================================
---
[   20.503154] ==================================================================
[   20.504199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   20.504843] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.505419] 
[   20.505662] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.507433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.507980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.508851] Call Trace:
[   20.509150]  <TASK>
[   20.509652]  dump_stack_lvl+0x73/0xb0
[   20.510124]  print_report+0xd1/0x640
[   20.510872]  ? __virt_addr_valid+0x1db/0x2d0
[   20.511416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.512120]  kasan_report+0x102/0x140
[   20.512561]  ? kasan_atomics_helper+0x4bbe/0x5450
[   20.513072]  ? kasan_atomics_helper+0x4bbe/0x5450
[   20.513809]  __asan_report_load4_noabort+0x18/0x20
[   20.514267]  kasan_atomics_helper+0x4bbe/0x5450
[   20.515032]  ? kasan_save_alloc_info+0x3b/0x50
[   20.515515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.516032]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.516642]  kasan_atomics+0x1dd/0x310
[   20.517245]  ? __pfx_kasan_atomics+0x10/0x10
[   20.517704]  ? __pfx_kasan_atomics+0x10/0x10
[   20.518259]  kunit_try_run_case+0x1b3/0x490
[   20.519081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.520020]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.520491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.521663]  ? __kthread_parkme+0x82/0x160
[   20.522176]  ? preempt_count_sub+0x50/0x80
[   20.522821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.523234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.523722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.524963]  kthread+0x257/0x310
[   20.525429]  ? __pfx_kthread+0x10/0x10
[   20.526004]  ret_from_fork+0x41/0x80
[   20.526408]  ? __pfx_kthread+0x10/0x10
[   20.526866]  ret_from_fork_asm+0x1a/0x30
[   20.527350]  </TASK>
[   20.527962] 
[   20.528433] Allocated by task 269:
[   20.528684]  kasan_save_stack+0x3d/0x60
[   20.529499]  kasan_save_track+0x18/0x40
[   20.529845]  kasan_save_alloc_info+0x3b/0x50
[   20.530861]  __kasan_kmalloc+0xb7/0xc0
[   20.531297]  __kmalloc_cache_noprof+0x162/0x350
[   20.532244]  kasan_atomics+0x96/0x310
[   20.532847]  kunit_try_run_case+0x1b3/0x490
[   20.533403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.534084]  kthread+0x257/0x310
[   20.534433]  ret_from_fork+0x41/0x80
[   20.535007]  ret_from_fork_asm+0x1a/0x30
[   20.535454] 
[   20.535955] The buggy address belongs to the object at ffff888102c3d080
[   20.535955]  which belongs to the cache kmalloc-64 of size 64
[   20.537074] The buggy address is located 0 bytes to the right of
[   20.537074]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.538270] 
[   20.538653] The buggy address belongs to the physical page:
[   20.539108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.540156] flags: 0x200000000000000(node=0|zone=2)
[   20.540677] page_type: f5(slab)
[   20.541257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.542034] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.543105] page dumped because: kasan: bad access detected
[   20.543721] 
[   20.544060] Memory state around the buggy address:
[   20.544532]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.545267]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.546028] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.546803]                                      ^
[   20.547271]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.548027]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.548869] ==================================================================

test log snippet boot parser 122

Home

[   22.366857] ==================================================================
[   22.367982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   22.368578] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.369253] 
[   22.369550] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.370180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.370657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.371944] Call Trace:
[   22.372233]  <TASK>
[   22.372395]  dump_stack_lvl+0x73/0xb0
[   22.372567]  print_report+0xd1/0x640
[   22.372722]  ? __virt_addr_valid+0x1db/0x2d0
[   22.373026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.373417]  kasan_report+0x102/0x140
[   22.374148]  ? kasan_atomics_helper+0x1819/0x5450
[   22.374986]  ? kasan_atomics_helper+0x1819/0x5450
[   22.375663]  kasan_check_range+0x10c/0x1c0
[   22.376464]  __kasan_check_write+0x18/0x20
[   22.376832]  kasan_atomics_helper+0x1819/0x5450
[   22.377278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.377753]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.378233]  kasan_atomics+0x1dd/0x310
[   22.378623]  ? __pfx_kasan_atomics+0x10/0x10
[   22.379120]  ? __pfx_kasan_atomics+0x10/0x10
[   22.379568]  kunit_try_run_case+0x1b3/0x490
[   22.379962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.380482]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.380914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.381462]  ? __kthread_parkme+0x82/0x160
[   22.381857]  ? preempt_count_sub+0x50/0x80
[   22.382331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.382819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.383423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.383901]  kthread+0x257/0x310
[   22.384333]  ? __pfx_kthread+0x10/0x10
[   22.384743]  ret_from_fork+0x41/0x80
[   22.385121]  ? __pfx_kthread+0x10/0x10
[   22.385510]  ret_from_fork_asm+0x1a/0x30
[   22.385979]  </TASK>
[   22.386329] 
[   22.386558] Allocated by task 269:
[   22.386945]  kasan_save_stack+0x3d/0x60
[   22.387343]  kasan_save_track+0x18/0x40
[   22.387732]  kasan_save_alloc_info+0x3b/0x50
[   22.388142]  __kasan_kmalloc+0xb7/0xc0
[   22.388570]  __kmalloc_cache_noprof+0x162/0x350
[   22.389066]  kasan_atomics+0x96/0x310
[   22.389454]  kunit_try_run_case+0x1b3/0x490
[   22.389798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.390381]  kthread+0x257/0x310
[   22.390755]  ret_from_fork+0x41/0x80
[   22.391221]  ret_from_fork_asm+0x1a/0x30
[   22.391591] 
[   22.391769] The buggy address belongs to the object at ffff888102c3d080
[   22.391769]  which belongs to the cache kmalloc-64 of size 64
[   22.392760] The buggy address is located 0 bytes to the right of
[   22.392760]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.393661] 
[   22.393904] The buggy address belongs to the physical page:
[   22.394445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.395059] flags: 0x200000000000000(node=0|zone=2)
[   22.395589] page_type: f5(slab)
[   22.395957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.396598] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.397179] page dumped because: kasan: bad access detected
[   22.397685] 
[   22.397927] Memory state around the buggy address:
[   22.398386]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.398832]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.399497] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.400136]                                      ^
[   22.400565]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.401131]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.401649] ==================================================================
---
[   22.291933] ==================================================================
[   22.292542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   22.293136] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.293733] 
[   22.294021] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.294745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.295085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.295823] Call Trace:
[   22.296132]  <TASK>
[   22.296420]  dump_stack_lvl+0x73/0xb0
[   22.296833]  print_report+0xd1/0x640
[   22.297279]  ? __virt_addr_valid+0x1db/0x2d0
[   22.297681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.298157]  kasan_report+0x102/0x140
[   22.298624]  ? kasan_atomics_helper+0x16e8/0x5450
[   22.299119]  ? kasan_atomics_helper+0x16e8/0x5450
[   22.299664]  kasan_check_range+0x10c/0x1c0
[   22.300083]  __kasan_check_write+0x18/0x20
[   22.300497]  kasan_atomics_helper+0x16e8/0x5450
[   22.301000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.301496]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.301959]  kasan_atomics+0x1dd/0x310
[   22.302462]  ? __pfx_kasan_atomics+0x10/0x10
[   22.302886]  ? __pfx_kasan_atomics+0x10/0x10
[   22.303309]  kunit_try_run_case+0x1b3/0x490
[   22.303747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.304251]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.304698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.305113]  ? __kthread_parkme+0x82/0x160
[   22.305586]  ? preempt_count_sub+0x50/0x80
[   22.306085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.306504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.307081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.307642]  kthread+0x257/0x310
[   22.307954]  ? __pfx_kthread+0x10/0x10
[   22.308407]  ret_from_fork+0x41/0x80
[   22.308830]  ? __pfx_kthread+0x10/0x10
[   22.309240]  ret_from_fork_asm+0x1a/0x30
[   22.309691]  </TASK>
[   22.309989] 
[   22.310234] Allocated by task 269:
[   22.310570]  kasan_save_stack+0x3d/0x60
[   22.310958]  kasan_save_track+0x18/0x40
[   22.311380]  kasan_save_alloc_info+0x3b/0x50
[   22.311713]  __kasan_kmalloc+0xb7/0xc0
[   22.312152]  __kmalloc_cache_noprof+0x162/0x350
[   22.312686]  kasan_atomics+0x96/0x310
[   22.313106]  kunit_try_run_case+0x1b3/0x490
[   22.313498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.314047]  kthread+0x257/0x310
[   22.314488]  ret_from_fork+0x41/0x80
[   22.314847]  ret_from_fork_asm+0x1a/0x30
[   22.315282] 
[   22.315481] The buggy address belongs to the object at ffff888102c3d080
[   22.315481]  which belongs to the cache kmalloc-64 of size 64
[   22.316406] The buggy address is located 0 bytes to the right of
[   22.316406]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.317178] 
[   22.317410] The buggy address belongs to the physical page:
[   22.317765] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.318527] flags: 0x200000000000000(node=0|zone=2)
[   22.319018] page_type: f5(slab)
[   22.319436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.320169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.322010] page dumped because: kasan: bad access detected
[   22.322388] 
[   22.322563] Memory state around the buggy address:
[   22.323430]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.324076]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.325330] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.326008]                                      ^
[   22.326513]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.327080]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.327633] ==================================================================
---
[   21.461824] ==================================================================
[   21.462263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   21.463001] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.464039] 
[   21.464458] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.465603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.465984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.466716] Call Trace:
[   21.466980]  <TASK>
[   21.467259]  dump_stack_lvl+0x73/0xb0
[   21.467701]  print_report+0xd1/0x640
[   21.468064]  ? __virt_addr_valid+0x1db/0x2d0
[   21.468495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.469015]  kasan_report+0x102/0x140
[   21.469380]  ? kasan_atomics_helper+0xd48/0x5450
[   21.469817]  ? kasan_atomics_helper+0xd48/0x5450
[   21.470573]  kasan_check_range+0x10c/0x1c0
[   21.471026]  __kasan_check_write+0x18/0x20
[   21.471856]  kasan_atomics_helper+0xd48/0x5450
[   21.472440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.472954]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.473572]  kasan_atomics+0x1dd/0x310
[   21.473948]  ? __pfx_kasan_atomics+0x10/0x10
[   21.474536]  ? __pfx_kasan_atomics+0x10/0x10
[   21.474955]  kunit_try_run_case+0x1b3/0x490
[   21.475577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.476422]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.476898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.477332]  ? __kthread_parkme+0x82/0x160
[   21.477709]  ? preempt_count_sub+0x50/0x80
[   21.478126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.479077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.479797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.480473]  kthread+0x257/0x310
[   21.480999]  ? __pfx_kthread+0x10/0x10
[   21.481682]  ret_from_fork+0x41/0x80
[   21.482063]  ? __pfx_kthread+0x10/0x10
[   21.482618]  ret_from_fork_asm+0x1a/0x30
[   21.483206]  </TASK>
[   21.483811] 
[   21.483970] Allocated by task 269:
[   21.484319]  kasan_save_stack+0x3d/0x60
[   21.485124]  kasan_save_track+0x18/0x40
[   21.485627]  kasan_save_alloc_info+0x3b/0x50
[   21.486092]  __kasan_kmalloc+0xb7/0xc0
[   21.486520]  __kmalloc_cache_noprof+0x162/0x350
[   21.487010]  kasan_atomics+0x96/0x310
[   21.487447]  kunit_try_run_case+0x1b3/0x490
[   21.487878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.488420]  kthread+0x257/0x310
[   21.488950]  ret_from_fork+0x41/0x80
[   21.489526]  ret_from_fork_asm+0x1a/0x30
[   21.490007] 
[   21.490178] The buggy address belongs to the object at ffff888102c3d080
[   21.490178]  which belongs to the cache kmalloc-64 of size 64
[   21.490985] The buggy address is located 0 bytes to the right of
[   21.490985]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.492160] 
[   21.492632] The buggy address belongs to the physical page:
[   21.493827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.494930] flags: 0x200000000000000(node=0|zone=2)
[   21.495642] page_type: f5(slab)
[   21.496138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.497018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.497603] page dumped because: kasan: bad access detected
[   21.498030] 
[   21.498240] Memory state around the buggy address:
[   21.498537]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.499675]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.500576] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.501300]                                      ^
[   21.501747]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.502793]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.503237] ==================================================================
---
[   22.754368] ==================================================================
[   22.754896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   22.755542] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.756173] 
[   22.756473] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.757085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.757537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.758392] Call Trace:
[   22.758628]  <TASK>
[   22.758878]  dump_stack_lvl+0x73/0xb0
[   22.759355]  print_report+0xd1/0x640
[   22.759848]  ? __virt_addr_valid+0x1db/0x2d0
[   22.760382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.760943]  kasan_report+0x102/0x140
[   22.761389]  ? kasan_atomics_helper+0x1e13/0x5450
[   22.761940]  ? kasan_atomics_helper+0x1e13/0x5450
[   22.762529]  kasan_check_range+0x10c/0x1c0
[   22.762945]  __kasan_check_write+0x18/0x20
[   22.763407]  kasan_atomics_helper+0x1e13/0x5450
[   22.763848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.764281]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.764853]  kasan_atomics+0x1dd/0x310
[   22.765305]  ? __pfx_kasan_atomics+0x10/0x10
[   22.765808]  ? __pfx_kasan_atomics+0x10/0x10
[   22.766354]  kunit_try_run_case+0x1b3/0x490
[   22.766817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.767354]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.767851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.768433]  ? __kthread_parkme+0x82/0x160
[   22.768912]  ? preempt_count_sub+0x50/0x80
[   22.769451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.769840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.770577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.771145]  kthread+0x257/0x310
[   22.771563]  ? __pfx_kthread+0x10/0x10
[   22.772130]  ret_from_fork+0x41/0x80
[   22.772653]  ? __pfx_kthread+0x10/0x10
[   22.773009]  ret_from_fork_asm+0x1a/0x30
[   22.773390]  </TASK>
[   22.773671] 
[   22.773982] Allocated by task 269:
[   22.774446]  kasan_save_stack+0x3d/0x60
[   22.774914]  kasan_save_track+0x18/0x40
[   22.775461]  kasan_save_alloc_info+0x3b/0x50
[   22.775840]  __kasan_kmalloc+0xb7/0xc0
[   22.776369]  __kmalloc_cache_noprof+0x162/0x350
[   22.776999]  kasan_atomics+0x96/0x310
[   22.777489]  kunit_try_run_case+0x1b3/0x490
[   22.777829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.778484]  kthread+0x257/0x310
[   22.778942]  ret_from_fork+0x41/0x80
[   22.779503]  ret_from_fork_asm+0x1a/0x30
[   22.780033] 
[   22.780263] The buggy address belongs to the object at ffff888102c3d080
[   22.780263]  which belongs to the cache kmalloc-64 of size 64
[   22.781315] The buggy address is located 0 bytes to the right of
[   22.781315]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.782369] 
[   22.782602] The buggy address belongs to the physical page:
[   22.783238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.783700] flags: 0x200000000000000(node=0|zone=2)
[   22.784281] page_type: f5(slab)
[   22.784744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.785488] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.786176] page dumped because: kasan: bad access detected
[   22.786767] 
[   22.787000] Memory state around the buggy address:
[   22.787465]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.788171]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.788883] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.789573]                                      ^
[   22.789977]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.790695]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.791381] ==================================================================
---
[   22.916396] ==================================================================
[   22.917093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   22.917943] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.918440] 
[   22.918631] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.919561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.920227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.921488] Call Trace:
[   22.921864]  <TASK>
[   22.922081]  dump_stack_lvl+0x73/0xb0
[   22.922620]  print_report+0xd1/0x640
[   22.923051]  ? __virt_addr_valid+0x1db/0x2d0
[   22.923601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.924013]  kasan_report+0x102/0x140
[   22.924376]  ? kasan_atomics_helper+0x2007/0x5450
[   22.924952]  ? kasan_atomics_helper+0x2007/0x5450
[   22.925574]  kasan_check_range+0x10c/0x1c0
[   22.926085]  __kasan_check_write+0x18/0x20
[   22.926583]  kasan_atomics_helper+0x2007/0x5450
[   22.927109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.927642]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.928059]  kasan_atomics+0x1dd/0x310
[   22.928556]  ? __pfx_kasan_atomics+0x10/0x10
[   22.929067]  ? __pfx_kasan_atomics+0x10/0x10
[   22.929585]  kunit_try_run_case+0x1b3/0x490
[   22.930047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.930573]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.931067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.931651]  ? __kthread_parkme+0x82/0x160
[   22.932131]  ? preempt_count_sub+0x50/0x80
[   22.932657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.933133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.933705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.934370]  kthread+0x257/0x310
[   22.934740]  ? __pfx_kthread+0x10/0x10
[   22.935176]  ret_from_fork+0x41/0x80
[   22.935626]  ? __pfx_kthread+0x10/0x10
[   22.936144]  ret_from_fork_asm+0x1a/0x30
[   22.936634]  </TASK>
[   22.936982] 
[   22.937239] Allocated by task 269:
[   22.937610]  kasan_save_stack+0x3d/0x60
[   22.938053]  kasan_save_track+0x18/0x40
[   22.938485]  kasan_save_alloc_info+0x3b/0x50
[   22.938836]  __kasan_kmalloc+0xb7/0xc0
[   22.939264]  __kmalloc_cache_noprof+0x162/0x350
[   22.939735]  kasan_atomics+0x96/0x310
[   22.940318]  kunit_try_run_case+0x1b3/0x490
[   22.940726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.941118]  kthread+0x257/0x310
[   22.941426]  ret_from_fork+0x41/0x80
[   22.941724]  ret_from_fork_asm+0x1a/0x30
[   22.942244] 
[   22.942533] The buggy address belongs to the object at ffff888102c3d080
[   22.942533]  which belongs to the cache kmalloc-64 of size 64
[   22.943679] The buggy address is located 0 bytes to the right of
[   22.943679]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.944728] 
[   22.945022] The buggy address belongs to the physical page:
[   22.945608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.946390] flags: 0x200000000000000(node=0|zone=2)
[   22.946870] page_type: f5(slab)
[   22.947276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.948262] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.949799] page dumped because: kasan: bad access detected
[   22.950163] 
[   22.950471] Memory state around the buggy address:
[   22.950988]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.951578]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.952241] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.952829]                                      ^
[   22.953357]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.953985]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.954616] ==================================================================
---
[   22.255226] ==================================================================
[   22.255708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   22.256428] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.257074] 
[   22.257348] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.258118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.259682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.260509] Call Trace:
[   22.260811]  <TASK>
[   22.261086]  dump_stack_lvl+0x73/0xb0
[   22.261450]  print_report+0xd1/0x640
[   22.261930]  ? __virt_addr_valid+0x1db/0x2d0
[   22.262388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.262902]  kasan_report+0x102/0x140
[   22.263307]  ? kasan_atomics_helper+0x1650/0x5450
[   22.263808]  ? kasan_atomics_helper+0x1650/0x5450
[   22.264331]  kasan_check_range+0x10c/0x1c0
[   22.264763]  __kasan_check_write+0x18/0x20
[   22.265258]  kasan_atomics_helper+0x1650/0x5450
[   22.265677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.266219]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.266701]  kasan_atomics+0x1dd/0x310
[   22.267057]  ? __pfx_kasan_atomics+0x10/0x10
[   22.267576]  ? __pfx_kasan_atomics+0x10/0x10
[   22.268004]  kunit_try_run_case+0x1b3/0x490
[   22.268462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.268907]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.269435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.269903]  ? __kthread_parkme+0x82/0x160
[   22.270359]  ? preempt_count_sub+0x50/0x80
[   22.270798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.271268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.271759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.272370]  kthread+0x257/0x310
[   22.272709]  ? __pfx_kthread+0x10/0x10
[   22.273144]  ret_from_fork+0x41/0x80
[   22.273531]  ? __pfx_kthread+0x10/0x10
[   22.273979]  ret_from_fork_asm+0x1a/0x30
[   22.274443]  </TASK>
[   22.274688] 
[   22.274941] Allocated by task 269:
[   22.275311]  kasan_save_stack+0x3d/0x60
[   22.275687]  kasan_save_track+0x18/0x40
[   22.276057]  kasan_save_alloc_info+0x3b/0x50
[   22.276436]  __kasan_kmalloc+0xb7/0xc0
[   22.276855]  __kmalloc_cache_noprof+0x162/0x350
[   22.277378]  kasan_atomics+0x96/0x310
[   22.277766]  kunit_try_run_case+0x1b3/0x490
[   22.278245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.278710]  kthread+0x257/0x310
[   22.279005]  ret_from_fork+0x41/0x80
[   22.279391]  ret_from_fork_asm+0x1a/0x30
[   22.279825] 
[   22.280049] The buggy address belongs to the object at ffff888102c3d080
[   22.280049]  which belongs to the cache kmalloc-64 of size 64
[   22.281046] The buggy address is located 0 bytes to the right of
[   22.281046]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.281966] 
[   22.282161] The buggy address belongs to the physical page:
[   22.282569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.283142] flags: 0x200000000000000(node=0|zone=2)
[   22.283647] page_type: f5(slab)
[   22.284108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.284798] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.285462] page dumped because: kasan: bad access detected
[   22.285882] 
[   22.286073] Memory state around the buggy address:
[   22.286527]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.287219]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.287814] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.288379]                                      ^
[   22.288760]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.290044]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.290682] ==================================================================
---
[   22.213161] ==================================================================
[   22.213729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   22.214242] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.215491] 
[   22.215740] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.216506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.216841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.218758] Call Trace:
[   22.219052]  <TASK>
[   22.220531]  dump_stack_lvl+0x73/0xb0
[   22.221018]  print_report+0xd1/0x640
[   22.221568]  ? __virt_addr_valid+0x1db/0x2d0
[   22.222027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.223295]  kasan_report+0x102/0x140
[   22.224102]  ? kasan_atomics_helper+0x15b7/0x5450
[   22.224634]  ? kasan_atomics_helper+0x15b7/0x5450
[   22.225018]  kasan_check_range+0x10c/0x1c0
[   22.225797]  __kasan_check_write+0x18/0x20
[   22.226212]  kasan_atomics_helper+0x15b7/0x5450
[   22.226990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.227427]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.227825]  kasan_atomics+0x1dd/0x310
[   22.228040]  ? __pfx_kasan_atomics+0x10/0x10
[   22.228244]  ? __pfx_kasan_atomics+0x10/0x10
[   22.228654]  kunit_try_run_case+0x1b3/0x490
[   22.229068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.229510]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.229977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.230490]  ? __kthread_parkme+0x82/0x160
[   22.230897]  ? preempt_count_sub+0x50/0x80
[   22.231296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.232099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.232654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.233536]  kthread+0x257/0x310
[   22.234466]  ? __pfx_kthread+0x10/0x10
[   22.234882]  ret_from_fork+0x41/0x80
[   22.235395]  ? __pfx_kthread+0x10/0x10
[   22.235990]  ret_from_fork_asm+0x1a/0x30
[   22.236615]  </TASK>
[   22.237124] 
[   22.237396] Allocated by task 269:
[   22.237768]  kasan_save_stack+0x3d/0x60
[   22.238292]  kasan_save_track+0x18/0x40
[   22.238666]  kasan_save_alloc_info+0x3b/0x50
[   22.239035]  __kasan_kmalloc+0xb7/0xc0
[   22.239435]  __kmalloc_cache_noprof+0x162/0x350
[   22.240002]  kasan_atomics+0x96/0x310
[   22.240472]  kunit_try_run_case+0x1b3/0x490
[   22.240931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.241506]  kthread+0x257/0x310
[   22.241885]  ret_from_fork+0x41/0x80
[   22.242378]  ret_from_fork_asm+0x1a/0x30
[   22.242736] 
[   22.243022] The buggy address belongs to the object at ffff888102c3d080
[   22.243022]  which belongs to the cache kmalloc-64 of size 64
[   22.244179] The buggy address is located 0 bytes to the right of
[   22.244179]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.245704] 
[   22.246178] The buggy address belongs to the physical page:
[   22.246798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.247473] flags: 0x200000000000000(node=0|zone=2)
[   22.247967] page_type: f5(slab)
[   22.248336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.248918] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.249514] page dumped because: kasan: bad access detected
[   22.250013] 
[   22.250308] Memory state around the buggy address:
[   22.250710]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.251252]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.251842] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.252442]                                      ^
[   22.252872]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.253523]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.254105] ==================================================================
---
[   22.717124] ==================================================================
[   22.717659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   22.718453] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.719050] 
[   22.719373] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.720067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.720543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.721290] Call Trace:
[   22.721656]  <TASK>
[   22.721939]  dump_stack_lvl+0x73/0xb0
[   22.722455]  print_report+0xd1/0x640
[   22.722925]  ? __virt_addr_valid+0x1db/0x2d0
[   22.723329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.723924]  kasan_report+0x102/0x140
[   22.724368]  ? kasan_atomics_helper+0x1d7b/0x5450
[   22.724872]  ? kasan_atomics_helper+0x1d7b/0x5450
[   22.725418]  kasan_check_range+0x10c/0x1c0
[   22.725865]  __kasan_check_write+0x18/0x20
[   22.726363]  kasan_atomics_helper+0x1d7b/0x5450
[   22.726927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.727374]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.727962]  kasan_atomics+0x1dd/0x310
[   22.728474]  ? __pfx_kasan_atomics+0x10/0x10
[   22.728977]  ? __pfx_kasan_atomics+0x10/0x10
[   22.729511]  kunit_try_run_case+0x1b3/0x490
[   22.729976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.730421]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.730979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.731451]  ? __kthread_parkme+0x82/0x160
[   22.731956]  ? preempt_count_sub+0x50/0x80
[   22.732419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.732931]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.733635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.734229]  kthread+0x257/0x310
[   22.734564]  ? __pfx_kthread+0x10/0x10
[   22.734993]  ret_from_fork+0x41/0x80
[   22.735487]  ? __pfx_kthread+0x10/0x10
[   22.735862]  ret_from_fork_asm+0x1a/0x30
[   22.736398]  </TASK>
[   22.736719] 
[   22.736959] Allocated by task 269:
[   22.737357]  kasan_save_stack+0x3d/0x60
[   22.737828]  kasan_save_track+0x18/0x40
[   22.738324]  kasan_save_alloc_info+0x3b/0x50
[   22.738809]  __kasan_kmalloc+0xb7/0xc0
[   22.739175]  __kmalloc_cache_noprof+0x162/0x350
[   22.739658]  kasan_atomics+0x96/0x310
[   22.740053]  kunit_try_run_case+0x1b3/0x490
[   22.740641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.741079]  kthread+0x257/0x310
[   22.741527]  ret_from_fork+0x41/0x80
[   22.741965]  ret_from_fork_asm+0x1a/0x30
[   22.742407] 
[   22.742596] The buggy address belongs to the object at ffff888102c3d080
[   22.742596]  which belongs to the cache kmalloc-64 of size 64
[   22.743665] The buggy address is located 0 bytes to the right of
[   22.743665]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.744696] 
[   22.744974] The buggy address belongs to the physical page:
[   22.745475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.746132] flags: 0x200000000000000(node=0|zone=2)
[   22.746630] page_type: f5(slab)
[   22.746975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.747667] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.748219] page dumped because: kasan: bad access detected
[   22.748633] 
[   22.748915] Memory state around the buggy address:
[   22.749429]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.750027]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.750671] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.751196]                                      ^
[   22.751733]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.752449]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.752966] ==================================================================
---
[   22.328881] ==================================================================
[   22.329528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   22.330077] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.330732] 
[   22.331005] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.331617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.332292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.332941] Call Trace:
[   22.333229]  <TASK>
[   22.333524]  dump_stack_lvl+0x73/0xb0
[   22.333901]  print_report+0xd1/0x640
[   22.334434]  ? __virt_addr_valid+0x1db/0x2d0
[   22.334865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.335357]  kasan_report+0x102/0x140
[   22.335746]  ? kasan_atomics_helper+0x1780/0x5450
[   22.336329]  ? kasan_atomics_helper+0x1780/0x5450
[   22.336757]  kasan_check_range+0x10c/0x1c0
[   22.337117]  __kasan_check_write+0x18/0x20
[   22.337618]  kasan_atomics_helper+0x1780/0x5450
[   22.338113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.338671]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.339134]  kasan_atomics+0x1dd/0x310
[   22.339526]  ? __pfx_kasan_atomics+0x10/0x10
[   22.339977]  ? __pfx_kasan_atomics+0x10/0x10
[   22.340435]  kunit_try_run_case+0x1b3/0x490
[   22.340856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.341270]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.341652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.342230]  ? __kthread_parkme+0x82/0x160
[   22.342675]  ? preempt_count_sub+0x50/0x80
[   22.343152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.343675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.344246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.344695]  kthread+0x257/0x310
[   22.345098]  ? __pfx_kthread+0x10/0x10
[   22.345541]  ret_from_fork+0x41/0x80
[   22.345937]  ? __pfx_kthread+0x10/0x10
[   22.346368]  ret_from_fork_asm+0x1a/0x30
[   22.346813]  </TASK>
[   22.347071] 
[   22.347336] Allocated by task 269:
[   22.347607]  kasan_save_stack+0x3d/0x60
[   22.348003]  kasan_save_track+0x18/0x40
[   22.348470]  kasan_save_alloc_info+0x3b/0x50
[   22.348937]  __kasan_kmalloc+0xb7/0xc0
[   22.349373]  __kmalloc_cache_noprof+0x162/0x350
[   22.349790]  kasan_atomics+0x96/0x310
[   22.350237]  kunit_try_run_case+0x1b3/0x490
[   22.350683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.351591]  kthread+0x257/0x310
[   22.352431]  ret_from_fork+0x41/0x80
[   22.352800]  ret_from_fork_asm+0x1a/0x30
[   22.353217] 
[   22.353446] The buggy address belongs to the object at ffff888102c3d080
[   22.353446]  which belongs to the cache kmalloc-64 of size 64
[   22.355359] The buggy address is located 0 bytes to the right of
[   22.355359]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.356968] 
[   22.357147] The buggy address belongs to the physical page:
[   22.357835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.358452] flags: 0x200000000000000(node=0|zone=2)
[   22.358894] page_type: f5(slab)
[   22.359648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.360270] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.360837] page dumped because: kasan: bad access detected
[   22.361292] 
[   22.361517] Memory state around the buggy address:
[   22.361959]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.362429]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.363116] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.363727]                                      ^
[   22.364296]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.364841]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.365489] ==================================================================
---
[   22.599539] ==================================================================
[   22.600159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   22.600816] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.601382] 
[   22.601698] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.602636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.602968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.604442] Call Trace:
[   22.604751]  <TASK>
[   22.605053]  dump_stack_lvl+0x73/0xb0
[   22.605537]  print_report+0xd1/0x640
[   22.606332]  ? __virt_addr_valid+0x1db/0x2d0
[   22.606730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.607270]  kasan_report+0x102/0x140
[   22.607622]  ? kasan_atomics_helper+0x1c19/0x5450
[   22.608245]  ? kasan_atomics_helper+0x1c19/0x5450
[   22.608717]  kasan_check_range+0x10c/0x1c0
[   22.609266]  __kasan_check_write+0x18/0x20
[   22.609648]  kasan_atomics_helper+0x1c19/0x5450
[   22.610233]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.610788]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.611290]  kasan_atomics+0x1dd/0x310
[   22.611675]  ? __pfx_kasan_atomics+0x10/0x10
[   22.612181]  ? __pfx_kasan_atomics+0x10/0x10
[   22.612675]  kunit_try_run_case+0x1b3/0x490
[   22.613121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.613646]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.614171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.614762]  ? __kthread_parkme+0x82/0x160
[   22.615168]  ? preempt_count_sub+0x50/0x80
[   22.615715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.616266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.616791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.617437]  kthread+0x257/0x310
[   22.617854]  ? __pfx_kthread+0x10/0x10
[   22.618264]  ret_from_fork+0x41/0x80
[   22.618723]  ? __pfx_kthread+0x10/0x10
[   22.619126]  ret_from_fork_asm+0x1a/0x30
[   22.619652]  </TASK>
[   22.619989] 
[   22.620268] Allocated by task 269:
[   22.620579]  kasan_save_stack+0x3d/0x60
[   22.620997]  kasan_save_track+0x18/0x40
[   22.621493]  kasan_save_alloc_info+0x3b/0x50
[   22.621948]  __kasan_kmalloc+0xb7/0xc0
[   22.622508]  __kmalloc_cache_noprof+0x162/0x350
[   22.622902]  kasan_atomics+0x96/0x310
[   22.623384]  kunit_try_run_case+0x1b3/0x490
[   22.623829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.624339]  kthread+0x257/0x310
[   22.624755]  ret_from_fork+0x41/0x80
[   22.625174]  ret_from_fork_asm+0x1a/0x30
[   22.625649] 
[   22.625848] The buggy address belongs to the object at ffff888102c3d080
[   22.625848]  which belongs to the cache kmalloc-64 of size 64
[   22.626932] The buggy address is located 0 bytes to the right of
[   22.626932]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.627902] 
[   22.628174] The buggy address belongs to the physical page:
[   22.628710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.629451] flags: 0x200000000000000(node=0|zone=2)
[   22.630145] page_type: f5(slab)
[   22.630886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.631571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.632257] page dumped because: kasan: bad access detected
[   22.632749] 
[   22.632994] Memory state around the buggy address:
[   22.633529]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.634121]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.634799] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.635402]                                      ^
[   22.635895]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.636505]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.637095] ==================================================================
---
[   21.584430] ==================================================================
[   21.585091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   21.585904] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.586612] 
[   21.586913] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.587709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.588098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.588862] Call Trace:
[   21.589258]  <TASK>
[   21.589536]  dump_stack_lvl+0x73/0xb0
[   21.589992]  print_report+0xd1/0x640
[   21.590380]  ? __virt_addr_valid+0x1db/0x2d0
[   21.590907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.591486]  kasan_report+0x102/0x140
[   21.591929]  ? kasan_atomics_helper+0xf11/0x5450
[   21.592475]  ? kasan_atomics_helper+0xf11/0x5450
[   21.592874]  kasan_check_range+0x10c/0x1c0
[   21.593408]  __kasan_check_write+0x18/0x20
[   21.593898]  kasan_atomics_helper+0xf11/0x5450
[   21.594374]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.594952]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.595529]  kasan_atomics+0x1dd/0x310
[   21.595973]  ? __pfx_kasan_atomics+0x10/0x10
[   21.596398]  ? __pfx_kasan_atomics+0x10/0x10
[   21.596914]  kunit_try_run_case+0x1b3/0x490
[   21.597449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.597940]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.598509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.599027]  ? __kthread_parkme+0x82/0x160
[   21.599537]  ? preempt_count_sub+0x50/0x80
[   21.600006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.600509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.601106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.601565]  kthread+0x257/0x310
[   21.601965]  ? __pfx_kthread+0x10/0x10
[   21.602366]  ret_from_fork+0x41/0x80
[   21.602698]  ? __pfx_kthread+0x10/0x10
[   21.603083]  ret_from_fork_asm+0x1a/0x30
[   21.603565]  </TASK>
[   21.603863] 
[   21.604088] Allocated by task 269:
[   21.604451]  kasan_save_stack+0x3d/0x60
[   21.604870]  kasan_save_track+0x18/0x40
[   21.605270]  kasan_save_alloc_info+0x3b/0x50
[   21.605643]  __kasan_kmalloc+0xb7/0xc0
[   21.605976]  __kmalloc_cache_noprof+0x162/0x350
[   21.606490]  kasan_atomics+0x96/0x310
[   21.606906]  kunit_try_run_case+0x1b3/0x490
[   21.607400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.607951]  kthread+0x257/0x310
[   21.608330]  ret_from_fork+0x41/0x80
[   21.608651]  ret_from_fork_asm+0x1a/0x30
[   21.609091] 
[   21.609372] The buggy address belongs to the object at ffff888102c3d080
[   21.609372]  which belongs to the cache kmalloc-64 of size 64
[   21.610314] The buggy address is located 0 bytes to the right of
[   21.610314]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.611258] 
[   21.611446] The buggy address belongs to the physical page:
[   21.611815] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.612554] flags: 0x200000000000000(node=0|zone=2)
[   21.613055] page_type: f5(slab)
[   21.613482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.614084] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.614600] page dumped because: kasan: bad access detected
[   21.615053] 
[   21.615317] Memory state around the buggy address:
[   21.615764]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.617818]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.618456] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.619017]                                      ^
[   21.619448]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.619976]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.620499] ==================================================================
---
[   21.505415] ==================================================================
[   21.506189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   21.506816] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.507461] 
[   21.508285] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.508984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.509946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.510855] Call Trace:
[   21.511137]  <TASK>
[   21.511556]  dump_stack_lvl+0x73/0xb0
[   21.512341]  print_report+0xd1/0x640
[   21.512868]  ? __virt_addr_valid+0x1db/0x2d0
[   21.513499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.514181]  kasan_report+0x102/0x140
[   21.514671]  ? kasan_atomics_helper+0xde1/0x5450
[   21.515119]  ? kasan_atomics_helper+0xde1/0x5450
[   21.515910]  kasan_check_range+0x10c/0x1c0
[   21.516523]  __kasan_check_write+0x18/0x20
[   21.517120]  kasan_atomics_helper+0xde1/0x5450
[   21.517824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.518173]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.518618]  kasan_atomics+0x1dd/0x310
[   21.518996]  ? __pfx_kasan_atomics+0x10/0x10
[   21.519430]  ? __pfx_kasan_atomics+0x10/0x10
[   21.520454]  kunit_try_run_case+0x1b3/0x490
[   21.520892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.521694]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.522096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.522748]  ? __kthread_parkme+0x82/0x160
[   21.523158]  ? preempt_count_sub+0x50/0x80
[   21.523820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.524437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.524958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.525472]  kthread+0x257/0x310
[   21.525824]  ? __pfx_kthread+0x10/0x10
[   21.526212]  ret_from_fork+0x41/0x80
[   21.526616]  ? __pfx_kthread+0x10/0x10
[   21.527820]  ret_from_fork_asm+0x1a/0x30
[   21.528255]  </TASK>
[   21.528629] 
[   21.528967] Allocated by task 269:
[   21.529409]  kasan_save_stack+0x3d/0x60
[   21.529578]  kasan_save_track+0x18/0x40
[   21.529730]  kasan_save_alloc_info+0x3b/0x50
[   21.530115]  __kasan_kmalloc+0xb7/0xc0
[   21.530607]  __kmalloc_cache_noprof+0x162/0x350
[   21.531232]  kasan_atomics+0x96/0x310
[   21.531637]  kunit_try_run_case+0x1b3/0x490
[   21.532129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.532835]  kthread+0x257/0x310
[   21.533293]  ret_from_fork+0x41/0x80
[   21.533728]  ret_from_fork_asm+0x1a/0x30
[   21.534130] 
[   21.534377] The buggy address belongs to the object at ffff888102c3d080
[   21.534377]  which belongs to the cache kmalloc-64 of size 64
[   21.535253] The buggy address is located 0 bytes to the right of
[   21.535253]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.536327] 
[   21.536504] The buggy address belongs to the physical page:
[   21.536865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.537584] flags: 0x200000000000000(node=0|zone=2)
[   21.538120] page_type: f5(slab)
[   21.538563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.539279] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.539930] page dumped because: kasan: bad access detected
[   21.540490] 
[   21.540766] Memory state around the buggy address:
[   21.541260]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.541916]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.542659] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.543339]                                      ^
[   21.543876]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.544494]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545020] ==================================================================
---
[   22.177659] ==================================================================
[   22.178245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   22.178766] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.179559] 
[   22.179754] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.180978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.181377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.181987] Call Trace:
[   22.182341]  <TASK>
[   22.182644]  dump_stack_lvl+0x73/0xb0
[   22.183028]  print_report+0xd1/0x640
[   22.183567]  ? __virt_addr_valid+0x1db/0x2d0
[   22.183946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.184494]  kasan_report+0x102/0x140
[   22.184933]  ? kasan_atomics_helper+0x151e/0x5450
[   22.185453]  ? kasan_atomics_helper+0x151e/0x5450
[   22.185932]  kasan_check_range+0x10c/0x1c0
[   22.186462]  __kasan_check_write+0x18/0x20
[   22.186882]  kasan_atomics_helper+0x151e/0x5450
[   22.187414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.187891]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.188407]  kasan_atomics+0x1dd/0x310
[   22.188789]  ? __pfx_kasan_atomics+0x10/0x10
[   22.189185]  ? __pfx_kasan_atomics+0x10/0x10
[   22.189593]  kunit_try_run_case+0x1b3/0x490
[   22.190085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.190555]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.191058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.191531]  ? __kthread_parkme+0x82/0x160
[   22.191951]  ? preempt_count_sub+0x50/0x80
[   22.192295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.192687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.193302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.193882]  kthread+0x257/0x310
[   22.194229]  ? __pfx_kthread+0x10/0x10
[   22.194633]  ret_from_fork+0x41/0x80
[   22.195027]  ? __pfx_kthread+0x10/0x10
[   22.195462]  ret_from_fork_asm+0x1a/0x30
[   22.195881]  </TASK>
[   22.196162] 
[   22.196387] Allocated by task 269:
[   22.196655]  kasan_save_stack+0x3d/0x60
[   22.197097]  kasan_save_track+0x18/0x40
[   22.197737]  kasan_save_alloc_info+0x3b/0x50
[   22.198106]  __kasan_kmalloc+0xb7/0xc0
[   22.198550]  __kmalloc_cache_noprof+0x162/0x350
[   22.198984]  kasan_atomics+0x96/0x310
[   22.199379]  kunit_try_run_case+0x1b3/0x490
[   22.199763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.200281]  kthread+0x257/0x310
[   22.200567]  ret_from_fork+0x41/0x80
[   22.200889]  ret_from_fork_asm+0x1a/0x30
[   22.201207] 
[   22.201438] The buggy address belongs to the object at ffff888102c3d080
[   22.201438]  which belongs to the cache kmalloc-64 of size 64
[   22.202472] The buggy address is located 0 bytes to the right of
[   22.202472]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.203479] 
[   22.203716] The buggy address belongs to the physical page:
[   22.204192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.204757] flags: 0x200000000000000(node=0|zone=2)
[   22.205107] page_type: f5(slab)
[   22.205476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.206417] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.206975] page dumped because: kasan: bad access detected
[   22.207528] 
[   22.207705] Memory state around the buggy address:
[   22.208046]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.208896]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.209511] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.210336]                                      ^
[   22.210725]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.211267]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.211847] ==================================================================
---
[   22.403288] ==================================================================
[   22.404443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   22.404979] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.405667] 
[   22.405930] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.406682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.407018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.407612] Call Trace:
[   22.407936]  <TASK>
[   22.408275]  dump_stack_lvl+0x73/0xb0
[   22.408713]  print_report+0xd1/0x640
[   22.409140]  ? __virt_addr_valid+0x1db/0x2d0
[   22.409575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.410121]  kasan_report+0x102/0x140
[   22.410522]  ? kasan_atomics_helper+0x18b2/0x5450
[   22.410991]  ? kasan_atomics_helper+0x18b2/0x5450
[   22.411557]  kasan_check_range+0x10c/0x1c0
[   22.412019]  __kasan_check_write+0x18/0x20
[   22.412449]  kasan_atomics_helper+0x18b2/0x5450
[   22.412889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.413393]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.413863]  kasan_atomics+0x1dd/0x310
[   22.414277]  ? __pfx_kasan_atomics+0x10/0x10
[   22.414621]  ? __pfx_kasan_atomics+0x10/0x10
[   22.415103]  kunit_try_run_case+0x1b3/0x490
[   22.415611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.416103]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.416627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.417154]  ? __kthread_parkme+0x82/0x160
[   22.417592]  ? preempt_count_sub+0x50/0x80
[   22.418026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.418438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.419039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.419610]  kthread+0x257/0x310
[   22.419960]  ? __pfx_kthread+0x10/0x10
[   22.420427]  ret_from_fork+0x41/0x80
[   22.420869]  ? __pfx_kthread+0x10/0x10
[   22.421224]  ret_from_fork_asm+0x1a/0x30
[   22.421571]  </TASK>
[   22.421858] 
[   22.422093] Allocated by task 269:
[   22.422502]  kasan_save_stack+0x3d/0x60
[   22.422952]  kasan_save_track+0x18/0x40
[   22.423411]  kasan_save_alloc_info+0x3b/0x50
[   22.423832]  __kasan_kmalloc+0xb7/0xc0
[   22.424237]  __kmalloc_cache_noprof+0x162/0x350
[   22.424718]  kasan_atomics+0x96/0x310
[   22.425088]  kunit_try_run_case+0x1b3/0x490
[   22.425546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.426091]  kthread+0x257/0x310
[   22.426486]  ret_from_fork+0x41/0x80
[   22.426850]  ret_from_fork_asm+0x1a/0x30
[   22.427316] 
[   22.427536] The buggy address belongs to the object at ffff888102c3d080
[   22.427536]  which belongs to the cache kmalloc-64 of size 64
[   22.428430] The buggy address is located 0 bytes to the right of
[   22.428430]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.429172] 
[   22.429406] The buggy address belongs to the physical page:
[   22.429757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.430523] flags: 0x200000000000000(node=0|zone=2)
[   22.431022] page_type: f5(slab)
[   22.431435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.432128] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.432713] page dumped because: kasan: bad access detected
[   22.433163] 
[   22.433401] Memory state around the buggy address:
[   22.433724]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.434417]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.435052] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.435669]                                      ^
[   22.436139]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.436700]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.438245] ==================================================================
---
[   22.518425] ==================================================================
[   22.519076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   22.519801] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.520487] 
[   22.520700] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.521629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.521978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.522753] Call Trace:
[   22.523089]  <TASK>
[   22.523471]  dump_stack_lvl+0x73/0xb0
[   22.523891]  print_report+0xd1/0x640
[   22.524383]  ? __virt_addr_valid+0x1db/0x2d0
[   22.524831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.525451]  kasan_report+0x102/0x140
[   22.525956]  ? kasan_atomics_helper+0x1a80/0x5450
[   22.526497]  ? kasan_atomics_helper+0x1a80/0x5450
[   22.526950]  kasan_check_range+0x10c/0x1c0
[   22.527504]  __kasan_check_write+0x18/0x20
[   22.528025]  kasan_atomics_helper+0x1a80/0x5450
[   22.528684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.529252]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.529683]  kasan_atomics+0x1dd/0x310
[   22.530111]  ? __pfx_kasan_atomics+0x10/0x10
[   22.530572]  ? __pfx_kasan_atomics+0x10/0x10
[   22.531028]  kunit_try_run_case+0x1b3/0x490
[   22.531510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.531993]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.532586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.532977]  ? __kthread_parkme+0x82/0x160
[   22.533604]  ? preempt_count_sub+0x50/0x80
[   22.534414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.535003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.535765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.536404]  kthread+0x257/0x310
[   22.536958]  ? __pfx_kthread+0x10/0x10
[   22.537500]  ret_from_fork+0x41/0x80
[   22.538034]  ? __pfx_kthread+0x10/0x10
[   22.538591]  ret_from_fork_asm+0x1a/0x30
[   22.539197]  </TASK>
[   22.539651] 
[   22.539850] Allocated by task 269:
[   22.540710]  kasan_save_stack+0x3d/0x60
[   22.541073]  kasan_save_track+0x18/0x40
[   22.541796]  kasan_save_alloc_info+0x3b/0x50
[   22.542439]  __kasan_kmalloc+0xb7/0xc0
[   22.542882]  __kmalloc_cache_noprof+0x162/0x350
[   22.543277]  kasan_atomics+0x96/0x310
[   22.543825]  kunit_try_run_case+0x1b3/0x490
[   22.544199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.544748]  kthread+0x257/0x310
[   22.545129]  ret_from_fork+0x41/0x80
[   22.545474]  ret_from_fork_asm+0x1a/0x30
[   22.545857] 
[   22.546098] The buggy address belongs to the object at ffff888102c3d080
[   22.546098]  which belongs to the cache kmalloc-64 of size 64
[   22.546833] The buggy address is located 0 bytes to the right of
[   22.546833]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.548035] 
[   22.548214] The buggy address belongs to the physical page:
[   22.548556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.549255] flags: 0x200000000000000(node=0|zone=2)
[   22.549725] page_type: f5(slab)
[   22.550072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.550914] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.551806] page dumped because: kasan: bad access detected
[   22.552379] 
[   22.552738] Memory state around the buggy address:
[   22.553488]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.554002]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.554583] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.555240]                                      ^
[   22.555672]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556229]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556832] ==================================================================
---
[   21.702957] ==================================================================
[   21.703623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   21.704477] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.705705] 
[   21.705954] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.707002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.707160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.707812] Call Trace:
[   21.708159]  <TASK>
[   21.708450]  dump_stack_lvl+0x73/0xb0
[   21.708883]  print_report+0xd1/0x640
[   21.709321]  ? __virt_addr_valid+0x1db/0x2d0
[   21.709933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.710512]  kasan_report+0x102/0x140
[   21.711271]  ? kasan_atomics_helper+0x107a/0x5450
[   21.711823]  ? kasan_atomics_helper+0x107a/0x5450
[   21.712359]  kasan_check_range+0x10c/0x1c0
[   21.712938]  __kasan_check_write+0x18/0x20
[   21.713285]  kasan_atomics_helper+0x107a/0x5450
[   21.713863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.714444]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.715042]  kasan_atomics+0x1dd/0x310
[   21.715499]  ? __pfx_kasan_atomics+0x10/0x10
[   21.716021]  ? __pfx_kasan_atomics+0x10/0x10
[   21.716542]  kunit_try_run_case+0x1b3/0x490
[   21.717084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.717637]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.718455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.718883]  ? __kthread_parkme+0x82/0x160
[   21.719280]  ? preempt_count_sub+0x50/0x80
[   21.719684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.720149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.720620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.721754]  kthread+0x257/0x310
[   21.722111]  ? __pfx_kthread+0x10/0x10
[   21.722540]  ret_from_fork+0x41/0x80
[   21.722907]  ? __pfx_kthread+0x10/0x10
[   21.723308]  ret_from_fork_asm+0x1a/0x30
[   21.723945]  </TASK>
[   21.724175] 
[   21.724353] Allocated by task 269:
[   21.724712]  kasan_save_stack+0x3d/0x60
[   21.725121]  kasan_save_track+0x18/0x40
[   21.725475]  kasan_save_alloc_info+0x3b/0x50
[   21.725938]  __kasan_kmalloc+0xb7/0xc0
[   21.726354]  __kmalloc_cache_noprof+0x162/0x350
[   21.726753]  kasan_atomics+0x96/0x310
[   21.727594]  kunit_try_run_case+0x1b3/0x490
[   21.728269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.728791]  kthread+0x257/0x310
[   21.729156]  ret_from_fork+0x41/0x80
[   21.729551]  ret_from_fork_asm+0x1a/0x30
[   21.730041] 
[   21.730281] The buggy address belongs to the object at ffff888102c3d080
[   21.730281]  which belongs to the cache kmalloc-64 of size 64
[   21.731307] The buggy address is located 0 bytes to the right of
[   21.731307]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.732228] 
[   21.732496] The buggy address belongs to the physical page:
[   21.733417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.733940] flags: 0x200000000000000(node=0|zone=2)
[   21.734870] page_type: f5(slab)
[   21.735549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.736205] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.737042] page dumped because: kasan: bad access detected
[   21.737681] 
[   21.737912] Memory state around the buggy address:
[   21.738346]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.738900]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.739410] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.741279]                                      ^
[   21.741912]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.742355]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.742791] ==================================================================
---
[   21.863812] ==================================================================
[   21.864531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   21.865086] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.865644] 
[   21.865867] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.866756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.867268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.868121] Call Trace:
[   21.868549]  <TASK>
[   21.868897]  dump_stack_lvl+0x73/0xb0
[   21.869225]  print_report+0xd1/0x640
[   21.869804]  ? __virt_addr_valid+0x1db/0x2d0
[   21.870457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.871160]  kasan_report+0x102/0x140
[   21.871666]  ? kasan_atomics_helper+0x1218/0x5450
[   21.872232]  ? kasan_atomics_helper+0x1218/0x5450
[   21.872818]  kasan_check_range+0x10c/0x1c0
[   21.873163]  __kasan_check_write+0x18/0x20
[   21.873919]  kasan_atomics_helper+0x1218/0x5450
[   21.874613]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.875173]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.875758]  kasan_atomics+0x1dd/0x310
[   21.876256]  ? __pfx_kasan_atomics+0x10/0x10
[   21.876764]  ? __pfx_kasan_atomics+0x10/0x10
[   21.877295]  kunit_try_run_case+0x1b3/0x490
[   21.877645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.878159]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.878712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.879381]  ? __kthread_parkme+0x82/0x160
[   21.879860]  ? preempt_count_sub+0x50/0x80
[   21.880347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.880954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.881573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.882157]  kthread+0x257/0x310
[   21.882542]  ? __pfx_kthread+0x10/0x10
[   21.883017]  ret_from_fork+0x41/0x80
[   21.883588]  ? __pfx_kthread+0x10/0x10
[   21.884059]  ret_from_fork_asm+0x1a/0x30
[   21.884625]  </TASK>
[   21.884979] 
[   21.885222] Allocated by task 269:
[   21.885611]  kasan_save_stack+0x3d/0x60
[   21.886159]  kasan_save_track+0x18/0x40
[   21.886605]  kasan_save_alloc_info+0x3b/0x50
[   21.887146]  __kasan_kmalloc+0xb7/0xc0
[   21.887697]  __kmalloc_cache_noprof+0x162/0x350
[   21.888228]  kasan_atomics+0x96/0x310
[   21.888648]  kunit_try_run_case+0x1b3/0x490
[   21.889225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.889836]  kthread+0x257/0x310
[   21.890234]  ret_from_fork+0x41/0x80
[   21.890768]  ret_from_fork_asm+0x1a/0x30
[   21.891252] 
[   21.891516] The buggy address belongs to the object at ffff888102c3d080
[   21.891516]  which belongs to the cache kmalloc-64 of size 64
[   21.892791] The buggy address is located 0 bytes to the right of
[   21.892791]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.893923] 
[   21.894169] The buggy address belongs to the physical page:
[   21.894690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.895905] flags: 0x200000000000000(node=0|zone=2)
[   21.896760] page_type: f5(slab)
[   21.897056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.897686] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.898444] page dumped because: kasan: bad access detected
[   21.898931] 
[   21.899195] Memory state around the buggy address:
[   21.899673]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.900360]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.900987] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.901604]                                      ^
[   21.902103]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.902855]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.903627] ==================================================================
---
[   21.546372] ==================================================================
[   21.546989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   21.547546] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.548239] 
[   21.548516] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.549141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.549694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.550527] Call Trace:
[   21.550830]  <TASK>
[   21.551236]  dump_stack_lvl+0x73/0xb0
[   21.551659]  print_report+0xd1/0x640
[   21.552135]  ? __virt_addr_valid+0x1db/0x2d0
[   21.552595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.553409]  kasan_report+0x102/0x140
[   21.553847]  ? kasan_atomics_helper+0xe79/0x5450
[   21.555060]  ? kasan_atomics_helper+0xe79/0x5450
[   21.555590]  kasan_check_range+0x10c/0x1c0
[   21.556048]  __kasan_check_write+0x18/0x20
[   21.556467]  kasan_atomics_helper+0xe79/0x5450
[   21.556927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.557485]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.557998]  kasan_atomics+0x1dd/0x310
[   21.558473]  ? __pfx_kasan_atomics+0x10/0x10
[   21.558919]  ? __pfx_kasan_atomics+0x10/0x10
[   21.559404]  kunit_try_run_case+0x1b3/0x490
[   21.559848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.560397]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.560919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.561498]  ? __kthread_parkme+0x82/0x160
[   21.561919]  ? preempt_count_sub+0x50/0x80
[   21.562440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.562867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.563522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.564081]  kthread+0x257/0x310
[   21.564531]  ? __pfx_kthread+0x10/0x10
[   21.564954]  ret_from_fork+0x41/0x80
[   21.565440]  ? __pfx_kthread+0x10/0x10
[   21.565801]  ret_from_fork_asm+0x1a/0x30
[   21.566330]  </TASK>
[   21.566611] 
[   21.566870] Allocated by task 269:
[   21.567244]  kasan_save_stack+0x3d/0x60
[   21.567711]  kasan_save_track+0x18/0x40
[   21.568231]  kasan_save_alloc_info+0x3b/0x50
[   21.568635]  __kasan_kmalloc+0xb7/0xc0
[   21.569129]  __kmalloc_cache_noprof+0x162/0x350
[   21.569640]  kasan_atomics+0x96/0x310
[   21.570080]  kunit_try_run_case+0x1b3/0x490
[   21.570515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.571074]  kthread+0x257/0x310
[   21.571437]  ret_from_fork+0x41/0x80
[   21.571880]  ret_from_fork_asm+0x1a/0x30
[   21.572364] 
[   21.572617] The buggy address belongs to the object at ffff888102c3d080
[   21.572617]  which belongs to the cache kmalloc-64 of size 64
[   21.573621] The buggy address is located 0 bytes to the right of
[   21.573621]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.574700] 
[   21.574948] The buggy address belongs to the physical page:
[   21.575469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.576088] flags: 0x200000000000000(node=0|zone=2)
[   21.576557] page_type: f5(slab)
[   21.576982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.577679] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.578385] page dumped because: kasan: bad access detected
[   21.578857] 
[   21.579034] Memory state around the buggy address:
[   21.579410]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.580059]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.580813] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.581480]                                      ^
[   21.581919]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.582622]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.583110] ==================================================================
---
[   22.480161] ==================================================================
[   22.480945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   22.481618] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.482322] 
[   22.482573] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.483354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.483764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.484513] Call Trace:
[   22.484839]  <TASK>
[   22.485164]  dump_stack_lvl+0x73/0xb0
[   22.485621]  print_report+0xd1/0x640
[   22.486112]  ? __virt_addr_valid+0x1db/0x2d0
[   22.486646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.487227]  kasan_report+0x102/0x140
[   22.487611]  ? kasan_atomics_helper+0x19e4/0x5450
[   22.488145]  ? kasan_atomics_helper+0x19e4/0x5450
[   22.488696]  kasan_check_range+0x10c/0x1c0
[   22.489162]  __kasan_check_write+0x18/0x20
[   22.489656]  kasan_atomics_helper+0x19e4/0x5450
[   22.490147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.490674]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.491213]  kasan_atomics+0x1dd/0x310
[   22.491646]  ? __pfx_kasan_atomics+0x10/0x10
[   22.492154]  ? __pfx_kasan_atomics+0x10/0x10
[   22.492659]  kunit_try_run_case+0x1b3/0x490
[   22.493043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.493630]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.494164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.494666]  ? __kthread_parkme+0x82/0x160
[   22.495163]  ? preempt_count_sub+0x50/0x80
[   22.495692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.496258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.496829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.497821]  kthread+0x257/0x310
[   22.498344]  ? __pfx_kthread+0x10/0x10
[   22.498718]  ret_from_fork+0x41/0x80
[   22.499226]  ? __pfx_kthread+0x10/0x10
[   22.499580]  ret_from_fork_asm+0x1a/0x30
[   22.500060]  </TASK>
[   22.500416] 
[   22.500628] Allocated by task 269:
[   22.501028]  kasan_save_stack+0x3d/0x60
[   22.501504]  kasan_save_track+0x18/0x40
[   22.501971]  kasan_save_alloc_info+0x3b/0x50
[   22.502506]  __kasan_kmalloc+0xb7/0xc0
[   22.502892]  __kmalloc_cache_noprof+0x162/0x350
[   22.503375]  kasan_atomics+0x96/0x310
[   22.503848]  kunit_try_run_case+0x1b3/0x490
[   22.504325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.504898]  kthread+0x257/0x310
[   22.505177]  ret_from_fork+0x41/0x80
[   22.505689]  ret_from_fork_asm+0x1a/0x30
[   22.506167] 
[   22.506462] The buggy address belongs to the object at ffff888102c3d080
[   22.506462]  which belongs to the cache kmalloc-64 of size 64
[   22.507361] The buggy address is located 0 bytes to the right of
[   22.507361]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.508392] 
[   22.508627] The buggy address belongs to the physical page:
[   22.509220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.509893] flags: 0x200000000000000(node=0|zone=2)
[   22.510418] page_type: f5(slab)
[   22.510804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.511386] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.512049] page dumped because: kasan: bad access detected
[   22.512484] 
[   22.512710] Memory state around the buggy address:
[   22.513278]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.513875]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.514524] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.515104]                                      ^
[   22.515548]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.516138]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.516797] ==================================================================
---
[   23.073097] ==================================================================
[   23.073808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   23.074548] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   23.075221] 
[   23.075499] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.076291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.076701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.077451] Call Trace:
[   23.077766]  <TASK>
[   23.078021]  dump_stack_lvl+0x73/0xb0
[   23.078448]  print_report+0xd1/0x640
[   23.078914]  ? __virt_addr_valid+0x1db/0x2d0
[   23.079485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.079975]  kasan_report+0x102/0x140
[   23.080492]  ? kasan_atomics_helper+0x218b/0x5450
[   23.080984]  ? kasan_atomics_helper+0x218b/0x5450
[   23.081529]  kasan_check_range+0x10c/0x1c0
[   23.081982]  __kasan_check_write+0x18/0x20
[   23.082528]  kasan_atomics_helper+0x218b/0x5450
[   23.083044]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.083589]  ? __kmalloc_cache_noprof+0x162/0x350
[   23.084141]  kasan_atomics+0x1dd/0x310
[   23.084545]  ? __pfx_kasan_atomics+0x10/0x10
[   23.085040]  ? __pfx_kasan_atomics+0x10/0x10
[   23.085545]  kunit_try_run_case+0x1b3/0x490
[   23.086027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086566]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.087034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.087590]  ? __kthread_parkme+0x82/0x160
[   23.087999]  ? preempt_count_sub+0x50/0x80
[   23.088529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.089056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.089510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.089984]  kthread+0x257/0x310
[   23.090484]  ? __pfx_kthread+0x10/0x10
[   23.090923]  ret_from_fork+0x41/0x80
[   23.091384]  ? __pfx_kthread+0x10/0x10
[   23.091859]  ret_from_fork_asm+0x1a/0x30
[   23.092293]  </TASK>
[   23.092652] 
[   23.092869] Allocated by task 269:
[   23.093135]  kasan_save_stack+0x3d/0x60
[   23.093678]  kasan_save_track+0x18/0x40
[   23.094122]  kasan_save_alloc_info+0x3b/0x50
[   23.094660]  __kasan_kmalloc+0xb7/0xc0
[   23.095027]  __kmalloc_cache_noprof+0x162/0x350
[   23.095413]  kasan_atomics+0x96/0x310
[   23.095857]  kunit_try_run_case+0x1b3/0x490
[   23.096375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.096936]  kthread+0x257/0x310
[   23.097353]  ret_from_fork+0x41/0x80
[   23.097741]  ret_from_fork_asm+0x1a/0x30
[   23.098233] 
[   23.098500] The buggy address belongs to the object at ffff888102c3d080
[   23.098500]  which belongs to the cache kmalloc-64 of size 64
[   23.099231] The buggy address is located 0 bytes to the right of
[   23.099231]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   23.100386] 
[   23.100588] The buggy address belongs to the physical page:
[   23.101157] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   23.101805] flags: 0x200000000000000(node=0|zone=2)
[   23.102287] page_type: f5(slab)
[   23.102665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.103289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.103756] page dumped because: kasan: bad access detected
[   23.104415] 
[   23.104693] Memory state around the buggy address:
[   23.105158]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.105844]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.106400] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.107043]                                      ^
[   23.107519]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.108136]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.108806] ==================================================================
---
[   21.783083] ==================================================================
[   21.783729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   21.784224] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.784979] 
[   21.785257] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.786031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.786394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.787109] Call Trace:
[   21.787464]  <TASK>
[   21.787754]  dump_stack_lvl+0x73/0xb0
[   21.788231]  print_report+0xd1/0x640
[   21.788621]  ? __virt_addr_valid+0x1db/0x2d0
[   21.790098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.792002]  kasan_report+0x102/0x140
[   21.792506]  ? kasan_atomics_helper+0x1149/0x5450
[   21.792973]  ? kasan_atomics_helper+0x1149/0x5450
[   21.793793]  kasan_check_range+0x10c/0x1c0
[   21.794235]  __kasan_check_write+0x18/0x20
[   21.794766]  kasan_atomics_helper+0x1149/0x5450
[   21.795462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.795963]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.796699]  kasan_atomics+0x1dd/0x310
[   21.797220]  ? __pfx_kasan_atomics+0x10/0x10
[   21.797745]  ? __pfx_kasan_atomics+0x10/0x10
[   21.797967]  kunit_try_run_case+0x1b3/0x490
[   21.798148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.798468]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.799663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.800132]  ? __kthread_parkme+0x82/0x160
[   21.801039]  ? preempt_count_sub+0x50/0x80
[   21.801641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.802094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.802874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.803290]  kthread+0x257/0x310
[   21.803564]  ? __pfx_kthread+0x10/0x10
[   21.803877]  ret_from_fork+0x41/0x80
[   21.804170]  ? __pfx_kthread+0x10/0x10
[   21.804461]  ret_from_fork_asm+0x1a/0x30
[   21.804808]  </TASK>
[   21.805031] 
[   21.805204] Allocated by task 269:
[   21.805471]  kasan_save_stack+0x3d/0x60
[   21.806128]  kasan_save_track+0x18/0x40
[   21.806664]  kasan_save_alloc_info+0x3b/0x50
[   21.807208]  __kasan_kmalloc+0xb7/0xc0
[   21.807619]  __kmalloc_cache_noprof+0x162/0x350
[   21.808101]  kasan_atomics+0x96/0x310
[   21.808548]  kunit_try_run_case+0x1b3/0x490
[   21.809019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.809600]  kthread+0x257/0x310
[   21.809998]  ret_from_fork+0x41/0x80
[   21.810483]  ret_from_fork_asm+0x1a/0x30
[   21.810917] 
[   21.811240] The buggy address belongs to the object at ffff888102c3d080
[   21.811240]  which belongs to the cache kmalloc-64 of size 64
[   21.812067] The buggy address is located 0 bytes to the right of
[   21.812067]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.812803] 
[   21.813096] The buggy address belongs to the physical page:
[   21.813792] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.814633] flags: 0x200000000000000(node=0|zone=2)
[   21.815139] page_type: f5(slab)
[   21.815560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.816355] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.816951] page dumped because: kasan: bad access detected
[   21.817560] 
[   21.817801] Memory state around the buggy address:
[   21.818370]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.819029]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.819701] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.820130]                                      ^
[   21.820589]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.821660]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.822359] ==================================================================
---
[   22.439462] ==================================================================
[   22.440085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   22.440753] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.442418] 
[   22.442636] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.443554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.444006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.445314] Call Trace:
[   22.445756]  <TASK>
[   22.446233]  dump_stack_lvl+0x73/0xb0
[   22.446880]  print_report+0xd1/0x640
[   22.447437]  ? __virt_addr_valid+0x1db/0x2d0
[   22.447846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.448444]  kasan_report+0x102/0x140
[   22.449080]  ? kasan_atomics_helper+0x194b/0x5450
[   22.449908]  ? kasan_atomics_helper+0x194b/0x5450
[   22.450530]  kasan_check_range+0x10c/0x1c0
[   22.450917]  __kasan_check_write+0x18/0x20
[   22.451394]  kasan_atomics_helper+0x194b/0x5450
[   22.451840]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.452349]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.452866]  kasan_atomics+0x1dd/0x310
[   22.453231]  ? __pfx_kasan_atomics+0x10/0x10
[   22.453678]  ? __pfx_kasan_atomics+0x10/0x10
[   22.454088]  kunit_try_run_case+0x1b3/0x490
[   22.454576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.454998]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.455495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.456006]  ? __kthread_parkme+0x82/0x160
[   22.456440]  ? preempt_count_sub+0x50/0x80
[   22.456866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.457307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.457889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.458392]  kthread+0x257/0x310
[   22.458797]  ? __pfx_kthread+0x10/0x10
[   22.459228]  ret_from_fork+0x41/0x80
[   22.459641]  ? __pfx_kthread+0x10/0x10
[   22.460083]  ret_from_fork_asm+0x1a/0x30
[   22.460527]  </TASK>
[   22.460825] 
[   22.461056] Allocated by task 269:
[   22.461419]  kasan_save_stack+0x3d/0x60
[   22.461860]  kasan_save_track+0x18/0x40
[   22.462288]  kasan_save_alloc_info+0x3b/0x50
[   22.462660]  __kasan_kmalloc+0xb7/0xc0
[   22.462990]  __kmalloc_cache_noprof+0x162/0x350
[   22.463518]  kasan_atomics+0x96/0x310
[   22.463951]  kunit_try_run_case+0x1b3/0x490
[   22.464444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.464898]  kthread+0x257/0x310
[   22.465318]  ret_from_fork+0x41/0x80
[   22.465723]  ret_from_fork_asm+0x1a/0x30
[   22.466609] 
[   22.467311] The buggy address belongs to the object at ffff888102c3d080
[   22.467311]  which belongs to the cache kmalloc-64 of size 64
[   22.468248] The buggy address is located 0 bytes to the right of
[   22.468248]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.470083] 
[   22.470347] The buggy address belongs to the physical page:
[   22.470735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.471522] flags: 0x200000000000000(node=0|zone=2)
[   22.472173] page_type: f5(slab)
[   22.472713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.473491] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.474028] page dumped because: kasan: bad access detected
[   22.474610] 
[   22.474761] Memory state around the buggy address:
[   22.475163]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.475603]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.476279] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.476853]                                      ^
[   22.477407]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.477899]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.478624] ==================================================================
---
[   22.793243] ==================================================================
[   22.794129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   22.794881] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.795697] 
[   22.795941] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.796621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.797584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.798475] Call Trace:
[   22.798986]  <TASK>
[   22.799470]  dump_stack_lvl+0x73/0xb0
[   22.799898]  print_report+0xd1/0x640
[   22.800537]  ? __virt_addr_valid+0x1db/0x2d0
[   22.801150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.801669]  kasan_report+0x102/0x140
[   22.802391]  ? kasan_atomics_helper+0x1eab/0x5450
[   22.803039]  ? kasan_atomics_helper+0x1eab/0x5450
[   22.803920]  kasan_check_range+0x10c/0x1c0
[   22.804270]  __kasan_check_write+0x18/0x20
[   22.804692]  kasan_atomics_helper+0x1eab/0x5450
[   22.805402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.806052]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.806583]  kasan_atomics+0x1dd/0x310
[   22.807242]  ? __pfx_kasan_atomics+0x10/0x10
[   22.807949]  ? __pfx_kasan_atomics+0x10/0x10
[   22.808634]  kunit_try_run_case+0x1b3/0x490
[   22.809094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.809873]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.810578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.811215]  ? __kthread_parkme+0x82/0x160
[   22.811639]  ? preempt_count_sub+0x50/0x80
[   22.812655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.813133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.814139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.814589]  kthread+0x257/0x310
[   22.814882]  ? __pfx_kthread+0x10/0x10
[   22.815183]  ret_from_fork+0x41/0x80
[   22.815498]  ? __pfx_kthread+0x10/0x10
[   22.815845]  ret_from_fork_asm+0x1a/0x30
[   22.816216]  </TASK>
[   22.816433] 
[   22.816639] Allocated by task 269:
[   22.817011]  kasan_save_stack+0x3d/0x60
[   22.817427]  kasan_save_track+0x18/0x40
[   22.817944]  kasan_save_alloc_info+0x3b/0x50
[   22.818664]  __kasan_kmalloc+0xb7/0xc0
[   22.819433]  __kmalloc_cache_noprof+0x162/0x350
[   22.820199]  kasan_atomics+0x96/0x310
[   22.820810]  kunit_try_run_case+0x1b3/0x490
[   22.821355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.822001]  kthread+0x257/0x310
[   22.822495]  ret_from_fork+0x41/0x80
[   22.822896]  ret_from_fork_asm+0x1a/0x30
[   22.823429] 
[   22.823903] The buggy address belongs to the object at ffff888102c3d080
[   22.823903]  which belongs to the cache kmalloc-64 of size 64
[   22.824994] The buggy address is located 0 bytes to the right of
[   22.824994]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.826847] 
[   22.827047] The buggy address belongs to the physical page:
[   22.827567] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.828338] flags: 0x200000000000000(node=0|zone=2)
[   22.828737] page_type: f5(slab)
[   22.829169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.829717] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.830410] page dumped because: kasan: bad access detected
[   22.830993] 
[   22.831508] Memory state around the buggy address:
[   22.831950]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.832617]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.833329] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.833972]                                      ^
[   22.834444]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.835715]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.836303] ==================================================================
---
[   22.677050] ==================================================================
[   22.677931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   22.678320] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.679172] 
[   22.679384] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.680051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.680456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.681417] Call Trace:
[   22.681727]  <TASK>
[   22.682169]  dump_stack_lvl+0x73/0xb0
[   22.682568]  print_report+0xd1/0x640
[   22.683025]  ? __virt_addr_valid+0x1db/0x2d0
[   22.683619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.684269]  kasan_report+0x102/0x140
[   22.684768]  ? kasan_atomics_helper+0x1ce2/0x5450
[   22.685455]  ? kasan_atomics_helper+0x1ce2/0x5450
[   22.685947]  kasan_check_range+0x10c/0x1c0
[   22.686334]  __kasan_check_write+0x18/0x20
[   22.686845]  kasan_atomics_helper+0x1ce2/0x5450
[   22.687471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.687980]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.688677]  kasan_atomics+0x1dd/0x310
[   22.689110]  ? __pfx_kasan_atomics+0x10/0x10
[   22.689649]  ? __pfx_kasan_atomics+0x10/0x10
[   22.690111]  kunit_try_run_case+0x1b3/0x490
[   22.690731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.691150]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.691997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.692572]  ? __kthread_parkme+0x82/0x160
[   22.693007]  ? preempt_count_sub+0x50/0x80
[   22.693703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.694148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.694860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.695555]  kthread+0x257/0x310
[   22.696079]  ? __pfx_kthread+0x10/0x10
[   22.696516]  ret_from_fork+0x41/0x80
[   22.696882]  ? __pfx_kthread+0x10/0x10
[   22.697279]  ret_from_fork_asm+0x1a/0x30
[   22.697667]  </TASK>
[   22.697960] 
[   22.698181] Allocated by task 269:
[   22.698507]  kasan_save_stack+0x3d/0x60
[   22.699308]  kasan_save_track+0x18/0x40
[   22.699637]  kasan_save_alloc_info+0x3b/0x50
[   22.700016]  __kasan_kmalloc+0xb7/0xc0
[   22.700568]  __kmalloc_cache_noprof+0x162/0x350
[   22.700934]  kasan_atomics+0x96/0x310
[   22.701900]  kunit_try_run_case+0x1b3/0x490
[   22.702461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.702837]  kthread+0x257/0x310
[   22.703211]  ret_from_fork+0x41/0x80
[   22.703659]  ret_from_fork_asm+0x1a/0x30
[   22.704043] 
[   22.704663] The buggy address belongs to the object at ffff888102c3d080
[   22.704663]  which belongs to the cache kmalloc-64 of size 64
[   22.705880] The buggy address is located 0 bytes to the right of
[   22.705880]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.707194] 
[   22.707803] The buggy address belongs to the physical page:
[   22.708469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.709032] flags: 0x200000000000000(node=0|zone=2)
[   22.709504] page_type: f5(slab)
[   22.709814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.710443] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.711106] page dumped because: kasan: bad access detected
[   22.711579] 
[   22.711875] Memory state around the buggy address:
[   22.712364]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.712964]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.713622] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.714253]                                      ^
[   22.714680]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.715329]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.715934] ==================================================================
---
[   21.377228] ==================================================================
[   21.377889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   21.378501] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.380173] 
[   21.380607] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.382071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.382436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.382718] Call Trace:
[   21.382857]  <TASK>
[   21.382973]  dump_stack_lvl+0x73/0xb0
[   21.383143]  print_report+0xd1/0x640
[   21.383461]  ? __virt_addr_valid+0x1db/0x2d0
[   21.383973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.384447]  kasan_report+0x102/0x140
[   21.385646]  ? kasan_atomics_helper+0xc71/0x5450
[   21.386503]  ? kasan_atomics_helper+0xc71/0x5450
[   21.387120]  kasan_check_range+0x10c/0x1c0
[   21.387741]  __kasan_check_write+0x18/0x20
[   21.388271]  kasan_atomics_helper+0xc71/0x5450
[   21.388821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.389498]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.390287]  kasan_atomics+0x1dd/0x310
[   21.390620]  ? __pfx_kasan_atomics+0x10/0x10
[   21.391056]  ? __pfx_kasan_atomics+0x10/0x10
[   21.391733]  kunit_try_run_case+0x1b3/0x490
[   21.392176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.392886]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.393293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.393862]  ? __kthread_parkme+0x82/0x160
[   21.394651]  ? preempt_count_sub+0x50/0x80
[   21.395036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.395646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.396212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.396950]  kthread+0x257/0x310
[   21.397318]  ? __pfx_kthread+0x10/0x10
[   21.397854]  ret_from_fork+0x41/0x80
[   21.398552]  ? __pfx_kthread+0x10/0x10
[   21.398981]  ret_from_fork_asm+0x1a/0x30
[   21.399788]  </TASK>
[   21.399984] 
[   21.400159] Allocated by task 269:
[   21.400741]  kasan_save_stack+0x3d/0x60
[   21.401091]  kasan_save_track+0x18/0x40
[   21.401944]  kasan_save_alloc_info+0x3b/0x50
[   21.402702]  __kasan_kmalloc+0xb7/0xc0
[   21.402984]  __kmalloc_cache_noprof+0x162/0x350
[   21.403443]  kasan_atomics+0x96/0x310
[   21.403847]  kunit_try_run_case+0x1b3/0x490
[   21.404282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.404862]  kthread+0x257/0x310
[   21.405314]  ret_from_fork+0x41/0x80
[   21.405713]  ret_from_fork_asm+0x1a/0x30
[   21.406109] 
[   21.406418] The buggy address belongs to the object at ffff888102c3d080
[   21.406418]  which belongs to the cache kmalloc-64 of size 64
[   21.407363] The buggy address is located 0 bytes to the right of
[   21.407363]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.408342] 
[   21.408542] The buggy address belongs to the physical page:
[   21.409052] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.409766] flags: 0x200000000000000(node=0|zone=2)
[   21.410258] page_type: f5(slab)
[   21.410675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.411389] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.411944] page dumped because: kasan: bad access detected
[   21.412489] 
[   21.412726] Memory state around the buggy address:
[   21.413126]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.413844]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.414419] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.415025]                                      ^
[   21.415480]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.416040]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.416571] ==================================================================
---
[   21.944082] ==================================================================
[   21.944903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   21.945609] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.946325] 
[   21.946597] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.947426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.947831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.948586] Call Trace:
[   21.948909]  <TASK>
[   21.949254]  dump_stack_lvl+0x73/0xb0
[   21.949675]  print_report+0xd1/0x640
[   21.950119]  ? __virt_addr_valid+0x1db/0x2d0
[   21.950622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.951267]  kasan_report+0x102/0x140
[   21.951689]  ? kasan_atomics_helper+0x12e7/0x5450
[   21.952227]  ? kasan_atomics_helper+0x12e7/0x5450
[   21.952739]  kasan_check_range+0x10c/0x1c0
[   21.953321]  __kasan_check_write+0x18/0x20
[   21.953804]  kasan_atomics_helper+0x12e7/0x5450
[   21.954275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.954801]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.955390]  kasan_atomics+0x1dd/0x310
[   21.955752]  ? __pfx_kasan_atomics+0x10/0x10
[   21.956308]  ? __pfx_kasan_atomics+0x10/0x10
[   21.956839]  kunit_try_run_case+0x1b3/0x490
[   21.957310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.957765]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.958337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.958886]  ? __kthread_parkme+0x82/0x160
[   21.959343]  ? preempt_count_sub+0x50/0x80
[   21.959860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.960390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.961020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.961622]  kthread+0x257/0x310
[   21.961987]  ? __pfx_kthread+0x10/0x10
[   21.962493]  ret_from_fork+0x41/0x80
[   21.962900]  ? __pfx_kthread+0x10/0x10
[   21.963248]  ret_from_fork_asm+0x1a/0x30
[   21.963766]  </TASK>
[   21.964051] 
[   21.964308] Allocated by task 269:
[   21.964659]  kasan_save_stack+0x3d/0x60
[   21.965179]  kasan_save_track+0x18/0x40
[   21.965618]  kasan_save_alloc_info+0x3b/0x50
[   21.966142]  __kasan_kmalloc+0xb7/0xc0
[   21.966717]  __kmalloc_cache_noprof+0x162/0x350
[   21.967079]  kasan_atomics+0x96/0x310
[   21.967659]  kunit_try_run_case+0x1b3/0x490
[   21.968136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.968723]  kthread+0x257/0x310
[   21.969175]  ret_from_fork+0x41/0x80
[   21.969669]  ret_from_fork_asm+0x1a/0x30
[   21.970173] 
[   21.970494] The buggy address belongs to the object at ffff888102c3d080
[   21.970494]  which belongs to the cache kmalloc-64 of size 64
[   21.971241] The buggy address is located 0 bytes to the right of
[   21.971241]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.972439] 
[   21.972649] The buggy address belongs to the physical page:
[   21.973347] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.974120] flags: 0x200000000000000(node=0|zone=2)
[   21.974644] page_type: f5(slab)
[   21.974947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.975439] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.976287] page dumped because: kasan: bad access detected
[   21.976806] 
[   21.977028] Memory state around the buggy address:
[   21.977579]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.978325]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.978861] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.979491]                                      ^
[   21.980027]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.980704]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.981450] ==================================================================
---
[   22.102081] ==================================================================
[   22.102756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   22.103360] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.103975] 
[   22.104257] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.104961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.105394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.106435] Call Trace:
[   22.106886]  <TASK>
[   22.107130]  dump_stack_lvl+0x73/0xb0
[   22.107474]  print_report+0xd1/0x640
[   22.107908]  ? __virt_addr_valid+0x1db/0x2d0
[   22.108306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.108768]  kasan_report+0x102/0x140
[   22.109762]  ? kasan_atomics_helper+0x1468/0x5450
[   22.110312]  ? kasan_atomics_helper+0x1468/0x5450
[   22.110822]  kasan_check_range+0x10c/0x1c0
[   22.111237]  __kasan_check_write+0x18/0x20
[   22.111662]  kasan_atomics_helper+0x1468/0x5450
[   22.112164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.112713]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.113234]  kasan_atomics+0x1dd/0x310
[   22.113659]  ? __pfx_kasan_atomics+0x10/0x10
[   22.114127]  ? __pfx_kasan_atomics+0x10/0x10
[   22.114612]  kunit_try_run_case+0x1b3/0x490
[   22.114973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.115474]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.115973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.116404]  ? __kthread_parkme+0x82/0x160
[   22.116850]  ? preempt_count_sub+0x50/0x80
[   22.117357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.117787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.118420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.118951]  kthread+0x257/0x310
[   22.119375]  ? __pfx_kthread+0x10/0x10
[   22.119756]  ret_from_fork+0x41/0x80
[   22.120152]  ? __pfx_kthread+0x10/0x10
[   22.120567]  ret_from_fork_asm+0x1a/0x30
[   22.120967]  </TASK>
[   22.121296] 
[   22.121517] Allocated by task 269:
[   22.121895]  kasan_save_stack+0x3d/0x60
[   22.122293]  kasan_save_track+0x18/0x40
[   22.122686]  kasan_save_alloc_info+0x3b/0x50
[   22.123074]  __kasan_kmalloc+0xb7/0xc0
[   22.123516]  __kmalloc_cache_noprof+0x162/0x350
[   22.123984]  kasan_atomics+0x96/0x310
[   22.124428]  kunit_try_run_case+0x1b3/0x490
[   22.124888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.125354]  kthread+0x257/0x310
[   22.125711]  ret_from_fork+0x41/0x80
[   22.126142]  ret_from_fork_asm+0x1a/0x30
[   22.126595] 
[   22.126844] The buggy address belongs to the object at ffff888102c3d080
[   22.126844]  which belongs to the cache kmalloc-64 of size 64
[   22.127729] The buggy address is located 0 bytes to the right of
[   22.127729]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.128687] 
[   22.128944] The buggy address belongs to the physical page:
[   22.129355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.129997] flags: 0x200000000000000(node=0|zone=2)
[   22.130542] page_type: f5(slab)
[   22.130862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.131486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.132125] page dumped because: kasan: bad access detected
[   22.132594] 
[   22.132787] Memory state around the buggy address:
[   22.133271]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.133874]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.134500] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.135079]                                      ^
[   22.135460]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.135971]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.136626] ==================================================================
---
[   22.558022] ==================================================================
[   22.558510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   22.559166] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.559727] 
[   22.559984] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.560692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.561169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.561650] Call Trace:
[   22.561925]  <TASK>
[   22.562299]  dump_stack_lvl+0x73/0xb0
[   22.562692]  print_report+0xd1/0x640
[   22.563104]  ? __virt_addr_valid+0x1db/0x2d0
[   22.563645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.564112]  kasan_report+0x102/0x140
[   22.564544]  ? kasan_atomics_helper+0x1b23/0x5450
[   22.565035]  ? kasan_atomics_helper+0x1b23/0x5450
[   22.565589]  kasan_check_range+0x10c/0x1c0
[   22.566050]  __kasan_check_write+0x18/0x20
[   22.566498]  kasan_atomics_helper+0x1b23/0x5450
[   22.567024]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.567584]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.568057]  kasan_atomics+0x1dd/0x310
[   22.569269]  ? __pfx_kasan_atomics+0x10/0x10
[   22.569796]  ? __pfx_kasan_atomics+0x10/0x10
[   22.570159]  kunit_try_run_case+0x1b3/0x490
[   22.570394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.570572]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.570753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.571641]  ? __kthread_parkme+0x82/0x160
[   22.572331]  ? preempt_count_sub+0x50/0x80
[   22.573011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.573726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.575086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.575583]  kthread+0x257/0x310
[   22.575998]  ? __pfx_kthread+0x10/0x10
[   22.576552]  ret_from_fork+0x41/0x80
[   22.576986]  ? __pfx_kthread+0x10/0x10
[   22.577506]  ret_from_fork_asm+0x1a/0x30
[   22.578081]  </TASK>
[   22.578466] 
[   22.578735] Allocated by task 269:
[   22.579105]  kasan_save_stack+0x3d/0x60
[   22.579641]  kasan_save_track+0x18/0x40
[   22.580127]  kasan_save_alloc_info+0x3b/0x50
[   22.580684]  __kasan_kmalloc+0xb7/0xc0
[   22.581172]  __kmalloc_cache_noprof+0x162/0x350
[   22.581728]  kasan_atomics+0x96/0x310
[   22.582264]  kunit_try_run_case+0x1b3/0x490
[   22.582799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.583407]  kthread+0x257/0x310
[   22.583866]  ret_from_fork+0x41/0x80
[   22.584376]  ret_from_fork_asm+0x1a/0x30
[   22.584887] 
[   22.585116] The buggy address belongs to the object at ffff888102c3d080
[   22.585116]  which belongs to the cache kmalloc-64 of size 64
[   22.586277] The buggy address is located 0 bytes to the right of
[   22.586277]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.587484] 
[   22.587755] The buggy address belongs to the physical page:
[   22.588279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.589064] flags: 0x200000000000000(node=0|zone=2)
[   22.589613] page_type: f5(slab)
[   22.590028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.590878] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.591534] page dumped because: kasan: bad access detected
[   22.592096] 
[   22.592345] Memory state around the buggy address:
[   22.592909]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.593592]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.594322] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.594994]                                      ^
[   22.595526]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.596051]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.596974] ==================================================================
---
[   22.994113] ==================================================================
[   22.995156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   22.996020] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.996596] 
[   22.996867] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.998018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.998662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.999267] Call Trace:
[   22.999608]  <TASK>
[   23.000022]  dump_stack_lvl+0x73/0xb0
[   23.000447]  print_report+0xd1/0x640
[   23.000946]  ? __virt_addr_valid+0x1db/0x2d0
[   23.001509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.002030]  kasan_report+0x102/0x140
[   23.002503]  ? kasan_atomics_helper+0x20c9/0x5450
[   23.002985]  ? kasan_atomics_helper+0x20c9/0x5450
[   23.003593]  kasan_check_range+0x10c/0x1c0
[   23.004586]  __kasan_check_write+0x18/0x20
[   23.005051]  kasan_atomics_helper+0x20c9/0x5450
[   23.005574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.006125]  ? __kmalloc_cache_noprof+0x162/0x350
[   23.006846]  kasan_atomics+0x1dd/0x310
[   23.007510]  ? __pfx_kasan_atomics+0x10/0x10
[   23.007943]  ? __pfx_kasan_atomics+0x10/0x10
[   23.008124]  kunit_try_run_case+0x1b3/0x490
[   23.008703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.009497]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.010127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.010820]  ? __kthread_parkme+0x82/0x160
[   23.011185]  ? preempt_count_sub+0x50/0x80
[   23.011618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.012238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.013068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.013814]  kthread+0x257/0x310
[   23.014183]  ? __pfx_kthread+0x10/0x10
[   23.014597]  ret_from_fork+0x41/0x80
[   23.014996]  ? __pfx_kthread+0x10/0x10
[   23.015492]  ret_from_fork_asm+0x1a/0x30
[   23.015943]  </TASK>
[   23.016239] 
[   23.016487] Allocated by task 269:
[   23.017050]  kasan_save_stack+0x3d/0x60
[   23.017531]  kasan_save_track+0x18/0x40
[   23.018372]  kasan_save_alloc_info+0x3b/0x50
[   23.018759]  __kasan_kmalloc+0xb7/0xc0
[   23.019433]  __kmalloc_cache_noprof+0x162/0x350
[   23.019900]  kasan_atomics+0x96/0x310
[   23.020482]  kunit_try_run_case+0x1b3/0x490
[   23.020977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.021422]  kthread+0x257/0x310
[   23.021752]  ret_from_fork+0x41/0x80
[   23.022173]  ret_from_fork_asm+0x1a/0x30
[   23.022545] 
[   23.022827] The buggy address belongs to the object at ffff888102c3d080
[   23.022827]  which belongs to the cache kmalloc-64 of size 64
[   23.023725] The buggy address is located 0 bytes to the right of
[   23.023725]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   23.024805] 
[   23.025050] The buggy address belongs to the physical page:
[   23.025491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   23.026231] flags: 0x200000000000000(node=0|zone=2)
[   23.026721] page_type: f5(slab)
[   23.027159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.027843] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.028566] page dumped because: kasan: bad access detected
[   23.029062] 
[   23.029329] Memory state around the buggy address:
[   23.029751]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.030432]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.031031] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.031686]                                      ^
[   23.032171]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.032750]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.033466] ==================================================================
---
[   22.837614] ==================================================================
[   22.838728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   22.839442] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.840092] 
[   22.840416] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.841163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.841628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.842386] Call Trace:
[   22.842706]  <TASK>
[   22.843003]  dump_stack_lvl+0x73/0xb0
[   22.843505]  print_report+0xd1/0x640
[   22.843914]  ? __virt_addr_valid+0x1db/0x2d0
[   22.844448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.844948]  kasan_report+0x102/0x140
[   22.845325]  ? kasan_atomics_helper+0x1f44/0x5450
[   22.845866]  ? kasan_atomics_helper+0x1f44/0x5450
[   22.846460]  kasan_check_range+0x10c/0x1c0
[   22.846903]  __kasan_check_write+0x18/0x20
[   22.847378]  kasan_atomics_helper+0x1f44/0x5450
[   22.847922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.848443]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.848968]  kasan_atomics+0x1dd/0x310
[   22.849447]  ? __pfx_kasan_atomics+0x10/0x10
[   22.849924]  ? __pfx_kasan_atomics+0x10/0x10
[   22.850430]  kunit_try_run_case+0x1b3/0x490
[   22.850930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.851497]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.852015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.853103]  ? __kthread_parkme+0x82/0x160
[   22.853598]  ? preempt_count_sub+0x50/0x80
[   22.854236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.854749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.856025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.856719]  kthread+0x257/0x310
[   22.857286]  ? __pfx_kthread+0x10/0x10
[   22.857840]  ret_from_fork+0x41/0x80
[   22.858233]  ? __pfx_kthread+0x10/0x10
[   22.858918]  ret_from_fork_asm+0x1a/0x30
[   22.859554]  </TASK>
[   22.859757] 
[   22.860165] Allocated by task 269:
[   22.860528]  kasan_save_stack+0x3d/0x60
[   22.860980]  kasan_save_track+0x18/0x40
[   22.861808]  kasan_save_alloc_info+0x3b/0x50
[   22.862545]  __kasan_kmalloc+0xb7/0xc0
[   22.862874]  __kmalloc_cache_noprof+0x162/0x350
[   22.863690]  kasan_atomics+0x96/0x310
[   22.864177]  kunit_try_run_case+0x1b3/0x490
[   22.864677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.865239]  kthread+0x257/0x310
[   22.865649]  ret_from_fork+0x41/0x80
[   22.866147]  ret_from_fork_asm+0x1a/0x30
[   22.866766] 
[   22.867022] The buggy address belongs to the object at ffff888102c3d080
[   22.867022]  which belongs to the cache kmalloc-64 of size 64
[   22.868020] The buggy address is located 0 bytes to the right of
[   22.868020]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.869173] 
[   22.869360] The buggy address belongs to the physical page:
[   22.869764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.871045] flags: 0x200000000000000(node=0|zone=2)
[   22.871449] page_type: f5(slab)
[   22.871846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.872536] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.873085] page dumped because: kasan: bad access detected
[   22.873940] 
[   22.874188] Memory state around the buggy address:
[   22.874917]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.875426]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.876102] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.876861]                                      ^
[   22.877386]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.878010]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.878745] ==================================================================
---
[   21.622177] ==================================================================
[   21.622762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   21.623870] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   21.624432] 
[   21.624731] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.625507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.625864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.626633] Call Trace:
[   21.626918]  <TASK>
[   21.627184]  dump_stack_lvl+0x73/0xb0
[   21.627615]  print_report+0xd1/0x640
[   21.628053]  ? __virt_addr_valid+0x1db/0x2d0
[   21.628451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.629010]  kasan_report+0x102/0x140
[   21.629467]  ? kasan_atomics_helper+0xfaa/0x5450
[   21.629975]  ? kasan_atomics_helper+0xfaa/0x5450
[   21.630503]  kasan_check_range+0x10c/0x1c0
[   21.630917]  __kasan_check_write+0x18/0x20
[   21.631377]  kasan_atomics_helper+0xfaa/0x5450
[   21.631730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.632275]  ? __kmalloc_cache_noprof+0x162/0x350
[   21.632808]  kasan_atomics+0x1dd/0x310
[   21.633243]  ? __pfx_kasan_atomics+0x10/0x10
[   21.633702]  ? __pfx_kasan_atomics+0x10/0x10
[   21.634152]  kunit_try_run_case+0x1b3/0x490
[   21.634609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.635036]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.635461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.635997]  ? __kthread_parkme+0x82/0x160
[   21.636472]  ? preempt_count_sub+0x50/0x80
[   21.636910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.637419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.637862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.638444]  kthread+0x257/0x310
[   21.638842]  ? __pfx_kthread+0x10/0x10
[   21.639289]  ret_from_fork+0x41/0x80
[   21.639681]  ? __pfx_kthread+0x10/0x10
[   21.640107]  ret_from_fork_asm+0x1a/0x30
[   21.640498]  </TASK>
[   21.640803] 
[   21.641025] Allocated by task 269:
[   21.641421]  kasan_save_stack+0x3d/0x60
[   21.641860]  kasan_save_track+0x18/0x40
[   21.642351]  kasan_save_alloc_info+0x3b/0x50
[   21.642704]  __kasan_kmalloc+0xb7/0xc0
[   21.643024]  __kmalloc_cache_noprof+0x162/0x350
[   21.643518]  kasan_atomics+0x96/0x310
[   21.643919]  kunit_try_run_case+0x1b3/0x490
[   21.644447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.644968]  kthread+0x257/0x310
[   21.645299]  ret_from_fork+0x41/0x80
[   21.645603]  ret_from_fork_asm+0x1a/0x30
[   21.646066] 
[   21.646350] The buggy address belongs to the object at ffff888102c3d080
[   21.646350]  which belongs to the cache kmalloc-64 of size 64
[   21.648226] The buggy address is located 0 bytes to the right of
[   21.648226]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   21.648986] 
[   21.649167] The buggy address belongs to the physical page:
[   21.649860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   21.651278] flags: 0x200000000000000(node=0|zone=2)
[   21.651763] page_type: f5(slab)
[   21.652178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.652796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.653469] page dumped because: kasan: bad access detected
[   21.653905] 
[   21.654091] Memory state around the buggy address:
[   21.654681]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.655388]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.656051] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.656596]                                      ^
[   21.657056]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.657643]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.658440] ==================================================================
---
[   23.146343] ==================================================================
[   23.147008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   23.147618] Write of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   23.148237] 
[   23.148477] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.149073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.149601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.150295] Call Trace:
[   23.150558]  <TASK>
[   23.150851]  dump_stack_lvl+0x73/0xb0
[   23.151322]  print_report+0xd1/0x640
[   23.151745]  ? __virt_addr_valid+0x1db/0x2d0
[   23.152268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.152789]  kasan_report+0x102/0x140
[   23.153104]  ? kasan_atomics_helper+0x224d/0x5450
[   23.153621]  ? kasan_atomics_helper+0x224d/0x5450
[   23.154148]  kasan_check_range+0x10c/0x1c0
[   23.154607]  __kasan_check_write+0x18/0x20
[   23.155051]  kasan_atomics_helper+0x224d/0x5450
[   23.155583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.156067]  ? __kmalloc_cache_noprof+0x162/0x350
[   23.156559]  kasan_atomics+0x1dd/0x310
[   23.156943]  ? __pfx_kasan_atomics+0x10/0x10
[   23.157457]  ? __pfx_kasan_atomics+0x10/0x10
[   23.157943]  kunit_try_run_case+0x1b3/0x490
[   23.158406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.158863]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.159330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.159793]  ? __kthread_parkme+0x82/0x160
[   23.160180]  ? preempt_count_sub+0x50/0x80
[   23.160645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.161090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.161666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.162275]  kthread+0x257/0x310
[   23.162608]  ? __pfx_kthread+0x10/0x10
[   23.162973]  ret_from_fork+0x41/0x80
[   23.163421]  ? __pfx_kthread+0x10/0x10
[   23.163864]  ret_from_fork_asm+0x1a/0x30
[   23.164238]  </TASK>
[   23.164449] 
[   23.164621] Allocated by task 269:
[   23.164916]  kasan_save_stack+0x3d/0x60
[   23.165232]  kasan_save_track+0x18/0x40
[   23.165641]  kasan_save_alloc_info+0x3b/0x50
[   23.166164]  __kasan_kmalloc+0xb7/0xc0
[   23.166631]  __kmalloc_cache_noprof+0x162/0x350
[   23.167177]  kasan_atomics+0x96/0x310
[   23.168473]  kunit_try_run_case+0x1b3/0x490
[   23.168944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.170386]  kthread+0x257/0x310
[   23.170746]  ret_from_fork+0x41/0x80
[   23.171124]  ret_from_fork_asm+0x1a/0x30
[   23.172078] 
[   23.172592] The buggy address belongs to the object at ffff888102c3d080
[   23.172592]  which belongs to the cache kmalloc-64 of size 64
[   23.173845] The buggy address is located 0 bytes to the right of
[   23.173845]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   23.175374] 
[   23.175578] The buggy address belongs to the physical page:
[   23.176061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   23.176713] flags: 0x200000000000000(node=0|zone=2)
[   23.177247] page_type: f5(slab)
[   23.178014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.178735] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.179536] page dumped because: kasan: bad access detected
[   23.180516] 
[   23.180693] Memory state around the buggy address:
[   23.181161]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.181848]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.182580] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.183378]                                      ^
[   23.183811]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.184425]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.185060] ==================================================================

test log snippet boot parser 123

Home

[   22.020921] ==================================================================
[   22.021931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   22.023145] Read of size 8 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   22.023958] 
[   22.024273] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.025122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.025545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.026294] Call Trace:
[   22.026610]  <TASK>
[   22.027051]  dump_stack_lvl+0x73/0xb0
[   22.027555]  print_report+0xd1/0x640
[   22.028101]  ? __virt_addr_valid+0x1db/0x2d0
[   22.028615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.029343]  kasan_report+0x102/0x140
[   22.029845]  ? kasan_atomics_helper+0x13b6/0x5450
[   22.030400]  ? kasan_atomics_helper+0x13b6/0x5450
[   22.030966]  kasan_check_range+0x10c/0x1c0
[   22.031520]  __kasan_check_read+0x15/0x20
[   22.032019]  kasan_atomics_helper+0x13b6/0x5450
[   22.032598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.033167]  ? __kmalloc_cache_noprof+0x162/0x350
[   22.033713]  kasan_atomics+0x1dd/0x310
[   22.034260]  ? __pfx_kasan_atomics+0x10/0x10
[   22.034749]  ? __pfx_kasan_atomics+0x10/0x10
[   22.035272]  kunit_try_run_case+0x1b3/0x490
[   22.035829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.036414]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.037096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.037559]  ? __kthread_parkme+0x82/0x160
[   22.038018]  ? preempt_count_sub+0x50/0x80
[   22.038455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.038883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.039475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.039945]  kthread+0x257/0x310
[   22.040333]  ? __pfx_kthread+0x10/0x10
[   22.040857]  ret_from_fork+0x41/0x80
[   22.041244]  ? __pfx_kthread+0x10/0x10
[   22.041638]  ret_from_fork_asm+0x1a/0x30
[   22.042140]  </TASK>
[   22.042533] 
[   22.042752] Allocated by task 269:
[   22.043172]  kasan_save_stack+0x3d/0x60
[   22.043615]  kasan_save_track+0x18/0x40
[   22.044042]  kasan_save_alloc_info+0x3b/0x50
[   22.044518]  __kasan_kmalloc+0xb7/0xc0
[   22.045389]  __kmalloc_cache_noprof+0x162/0x350
[   22.045769]  kasan_atomics+0x96/0x310
[   22.046719]  kunit_try_run_case+0x1b3/0x490
[   22.047371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.047721]  kthread+0x257/0x310
[   22.048357]  ret_from_fork+0x41/0x80
[   22.048787]  ret_from_fork_asm+0x1a/0x30
[   22.049521] 
[   22.049832] The buggy address belongs to the object at ffff888102c3d080
[   22.049832]  which belongs to the cache kmalloc-64 of size 64
[   22.050934] The buggy address is located 0 bytes to the right of
[   22.050934]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   22.052516] 
[   22.052793] The buggy address belongs to the physical page:
[   22.053208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   22.053935] flags: 0x200000000000000(node=0|zone=2)
[   22.054343] page_type: f5(slab)
[   22.055120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.055738] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.056205] page dumped because: kasan: bad access detected
[   22.056729] 
[   22.057109] Memory state around the buggy address:
[   22.057744]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.058525]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.059123] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.059710]                                      ^
[   22.060069]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.060645]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.061768] ==================================================================

test log snippet boot parser 124

Home

[   20.686875] ==================================================================
[   20.687305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   20.687908] Read of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.688520] 
[   20.688765] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.690264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.690807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.691579] Call Trace:
[   20.691913]  <TASK>
[   20.692179]  dump_stack_lvl+0x73/0xb0
[   20.692749]  print_report+0xd1/0x640
[   20.693202]  ? __virt_addr_valid+0x1db/0x2d0
[   20.696105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.697013]  kasan_report+0x102/0x140
[   20.697396]  ? kasan_atomics_helper+0x3e0/0x5450
[   20.697831]  ? kasan_atomics_helper+0x3e0/0x5450
[   20.698591]  kasan_check_range+0x10c/0x1c0
[   20.699212]  __kasan_check_read+0x15/0x20
[   20.699539]  kasan_atomics_helper+0x3e0/0x5450
[   20.700345]  ? kasan_save_alloc_info+0x3b/0x50
[   20.701377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.701898]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.702628]  kasan_atomics+0x1dd/0x310
[   20.702973]  ? __pfx_kasan_atomics+0x10/0x10
[   20.703883]  ? __pfx_kasan_atomics+0x10/0x10
[   20.704393]  kunit_try_run_case+0x1b3/0x490
[   20.705088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.705559]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.706144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.707537]  ? __kthread_parkme+0x82/0x160
[   20.707918]  ? preempt_count_sub+0x50/0x80
[   20.708765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.709637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.710141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.710597]  kthread+0x257/0x310
[   20.710934]  ? __pfx_kthread+0x10/0x10
[   20.711284]  ret_from_fork+0x41/0x80
[   20.711636]  ? __pfx_kthread+0x10/0x10
[   20.712700]  ret_from_fork_asm+0x1a/0x30
[   20.713015]  </TASK>
[   20.713145] 
[   20.713298] Allocated by task 269:
[   20.714018]  kasan_save_stack+0x3d/0x60
[   20.715085]  kasan_save_track+0x18/0x40
[   20.715720]  kasan_save_alloc_info+0x3b/0x50
[   20.716431]  __kasan_kmalloc+0xb7/0xc0
[   20.717109]  __kmalloc_cache_noprof+0x162/0x350
[   20.717561]  kasan_atomics+0x96/0x310
[   20.718163]  kunit_try_run_case+0x1b3/0x490
[   20.718540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.718980]  kthread+0x257/0x310
[   20.719248]  ret_from_fork+0x41/0x80
[   20.719543]  ret_from_fork_asm+0x1a/0x30
[   20.720412] 
[   20.720855] The buggy address belongs to the object at ffff888102c3d080
[   20.720855]  which belongs to the cache kmalloc-64 of size 64
[   20.722119] The buggy address is located 0 bytes to the right of
[   20.722119]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.723199] 
[   20.723447] The buggy address belongs to the physical page:
[   20.724048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.724876] flags: 0x200000000000000(node=0|zone=2)
[   20.725257] page_type: f5(slab)
[   20.726116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.726969] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.727922] page dumped because: kasan: bad access detected
[   20.728363] 
[   20.728550] Memory state around the buggy address:
[   20.729009]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.730219]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.731037] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.731591]                                      ^
[   20.732109]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.733071]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.733736] ==================================================================

test log snippet boot parser 125

Home

[   20.828735] ==================================================================
[   20.829632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   20.830707] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.831349] 
[   20.831589] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.832275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.832695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.833911] Call Trace:
[   20.834151]  <TASK>
[   20.834367]  dump_stack_lvl+0x73/0xb0
[   20.834811]  print_report+0xd1/0x640
[   20.835220]  ? __virt_addr_valid+0x1db/0x2d0
[   20.835676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.836969]  kasan_report+0x102/0x140
[   20.837717]  ? kasan_atomics_helper+0x4b3c/0x5450
[   20.838172]  ? kasan_atomics_helper+0x4b3c/0x5450
[   20.839273]  __asan_report_store4_noabort+0x1b/0x30
[   20.840198]  kasan_atomics_helper+0x4b3c/0x5450
[   20.841108]  ? kasan_save_alloc_info+0x3b/0x50
[   20.841528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.841966]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.842606]  kasan_atomics+0x1dd/0x310
[   20.843003]  ? __pfx_kasan_atomics+0x10/0x10
[   20.843711]  ? __pfx_kasan_atomics+0x10/0x10
[   20.844543]  kunit_try_run_case+0x1b3/0x490
[   20.844971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.845896]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.846438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.847431]  ? __kthread_parkme+0x82/0x160
[   20.848044]  ? preempt_count_sub+0x50/0x80
[   20.848836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.849371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.849996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.850624]  kthread+0x257/0x310
[   20.850981]  ? __pfx_kthread+0x10/0x10
[   20.851375]  ret_from_fork+0x41/0x80
[   20.851968]  ? __pfx_kthread+0x10/0x10
[   20.852367]  ret_from_fork_asm+0x1a/0x30
[   20.852742]  </TASK>
[   20.853033] 
[   20.853741] Allocated by task 269:
[   20.854126]  kasan_save_stack+0x3d/0x60
[   20.854726]  kasan_save_track+0x18/0x40
[   20.855110]  kasan_save_alloc_info+0x3b/0x50
[   20.855882]  __kasan_kmalloc+0xb7/0xc0
[   20.856323]  __kmalloc_cache_noprof+0x162/0x350
[   20.857075]  kasan_atomics+0x96/0x310
[   20.857622]  kunit_try_run_case+0x1b3/0x490
[   20.858019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.858502]  kthread+0x257/0x310
[   20.858877]  ret_from_fork+0x41/0x80
[   20.859219]  ret_from_fork_asm+0x1a/0x30
[   20.859658] 
[   20.860066] The buggy address belongs to the object at ffff888102c3d080
[   20.860066]  which belongs to the cache kmalloc-64 of size 64
[   20.861631] The buggy address is located 0 bytes to the right of
[   20.861631]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.862787] 
[   20.863016] The buggy address belongs to the physical page:
[   20.863683] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.864313] flags: 0x200000000000000(node=0|zone=2)
[   20.865204] page_type: f5(slab)
[   20.865561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.866343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.867049] page dumped because: kasan: bad access detected
[   20.867484] 
[   20.867653] Memory state around the buggy address:
[   20.868106]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.868666]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.870231] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.871057]                                      ^
[   20.871554]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.872490]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.873342] ==================================================================
---
[   20.550010] ==================================================================
[   20.550797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   20.551422] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.552327] 
[   20.552615] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.553285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.553688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.554392] Call Trace:
[   20.554695]  <TASK>
[   20.555226]  dump_stack_lvl+0x73/0xb0
[   20.555932]  print_report+0xd1/0x640
[   20.556378]  ? __virt_addr_valid+0x1db/0x2d0
[   20.556941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.557395]  kasan_report+0x102/0x140
[   20.557966]  ? kasan_atomics_helper+0x4ba4/0x5450
[   20.558658]  ? kasan_atomics_helper+0x4ba4/0x5450
[   20.559145]  __asan_report_store4_noabort+0x1b/0x30
[   20.560044]  kasan_atomics_helper+0x4ba4/0x5450
[   20.560657]  ? kasan_save_alloc_info+0x3b/0x50
[   20.561167]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.561768]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.562366]  kasan_atomics+0x1dd/0x310
[   20.562970]  ? __pfx_kasan_atomics+0x10/0x10
[   20.563832]  ? __pfx_kasan_atomics+0x10/0x10
[   20.564313]  kunit_try_run_case+0x1b3/0x490
[   20.564891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.565403]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.566026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.566642]  ? __kthread_parkme+0x82/0x160
[   20.567077]  ? preempt_count_sub+0x50/0x80
[   20.567895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.568597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.569301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.569918]  kthread+0x257/0x310
[   20.570225]  ? __pfx_kthread+0x10/0x10
[   20.571054]  ret_from_fork+0x41/0x80
[   20.571679]  ? __pfx_kthread+0x10/0x10
[   20.572017]  ret_from_fork_asm+0x1a/0x30
[   20.572917]  </TASK>
[   20.573161] 
[   20.573576] Allocated by task 269:
[   20.574236]  kasan_save_stack+0x3d/0x60
[   20.574936]  kasan_save_track+0x18/0x40
[   20.575875]  kasan_save_alloc_info+0x3b/0x50
[   20.576342]  __kasan_kmalloc+0xb7/0xc0
[   20.577010]  __kmalloc_cache_noprof+0x162/0x350
[   20.577499]  kasan_atomics+0x96/0x310
[   20.578228]  kunit_try_run_case+0x1b3/0x490
[   20.578909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.579508]  kthread+0x257/0x310
[   20.580224]  ret_from_fork+0x41/0x80
[   20.580940]  ret_from_fork_asm+0x1a/0x30
[   20.581348] 
[   20.581537] The buggy address belongs to the object at ffff888102c3d080
[   20.581537]  which belongs to the cache kmalloc-64 of size 64
[   20.583045] The buggy address is located 0 bytes to the right of
[   20.583045]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.584412] 
[   20.584808] The buggy address belongs to the physical page:
[   20.585603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.586019] flags: 0x200000000000000(node=0|zone=2)
[   20.586489] page_type: f5(slab)
[   20.587177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.588139] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.588734] page dumped because: kasan: bad access detected
[   20.589148] 
[   20.589369] Memory state around the buggy address:
[   20.590025]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.590764]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.591337] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.592439]                                      ^
[   20.593104]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.593904]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594702] ==================================================================
---
[   20.642258] ==================================================================
[   20.642917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   20.644170] Write of size 4 at addr ffff888102c3d0b0 by task kunit_try_catch/269
[   20.644764] 
[   20.645290] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.646816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.647293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.648086] Call Trace:
[   20.648834]  <TASK>
[   20.649086]  dump_stack_lvl+0x73/0xb0
[   20.649901]  print_report+0xd1/0x640
[   20.650366]  ? __virt_addr_valid+0x1db/0x2d0
[   20.650765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.651262]  kasan_report+0x102/0x140
[   20.651618]  ? kasan_atomics_helper+0x4b70/0x5450
[   20.652709]  ? kasan_atomics_helper+0x4b70/0x5450
[   20.653866]  __asan_report_store4_noabort+0x1b/0x30
[   20.654437]  kasan_atomics_helper+0x4b70/0x5450
[   20.655146]  ? kasan_save_alloc_info+0x3b/0x50
[   20.655886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.656540]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.657101]  kasan_atomics+0x1dd/0x310
[   20.657860]  ? __pfx_kasan_atomics+0x10/0x10
[   20.658278]  ? __pfx_kasan_atomics+0x10/0x10
[   20.658871]  kunit_try_run_case+0x1b3/0x490
[   20.659218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.660257]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.661012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.661525]  ? __kthread_parkme+0x82/0x160
[   20.662481]  ? preempt_count_sub+0x50/0x80
[   20.662944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.663858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.664400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.664840]  kthread+0x257/0x310
[   20.665212]  ? __pfx_kthread+0x10/0x10
[   20.665581]  ret_from_fork+0x41/0x80
[   20.666563]  ? __pfx_kthread+0x10/0x10
[   20.666942]  ret_from_fork_asm+0x1a/0x30
[   20.667418]  </TASK>
[   20.667791] 
[   20.667990] Allocated by task 269:
[   20.668394]  kasan_save_stack+0x3d/0x60
[   20.668868]  kasan_save_track+0x18/0x40
[   20.669325]  kasan_save_alloc_info+0x3b/0x50
[   20.670074]  __kasan_kmalloc+0xb7/0xc0
[   20.670492]  __kmalloc_cache_noprof+0x162/0x350
[   20.670923]  kasan_atomics+0x96/0x310
[   20.671266]  kunit_try_run_case+0x1b3/0x490
[   20.671694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.672158]  kthread+0x257/0x310
[   20.672512]  ret_from_fork+0x41/0x80
[   20.672979]  ret_from_fork_asm+0x1a/0x30
[   20.673770] 
[   20.673979] The buggy address belongs to the object at ffff888102c3d080
[   20.673979]  which belongs to the cache kmalloc-64 of size 64
[   20.675011] The buggy address is located 0 bytes to the right of
[   20.675011]  allocated 48-byte region [ffff888102c3d080, ffff888102c3d0b0)
[   20.676139] 
[   20.676388] The buggy address belongs to the physical page:
[   20.677025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3d
[   20.677988] flags: 0x200000000000000(node=0|zone=2)
[   20.678449] page_type: f5(slab)
[   20.678909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.679679] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.680349] page dumped because: kasan: bad access detected
[   20.680836] 
[   20.681066] Memory state around the buggy address:
[   20.681398]  ffff888102c3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.682414]  ffff888102c3d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.683130] >ffff888102c3d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.683843]                                      ^
[   20.684328]  ffff888102c3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685055]  ffff888102c3d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685998] ==================================================================

test log snippet boot parser 126

Home

[   19.889281] ==================================================================
[   19.890150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   19.891025] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   19.891993] 
[   19.892245] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.893218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.893618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.894614] Call Trace:
[   19.895032]  <TASK>
[   19.895357]  dump_stack_lvl+0x73/0xb0
[   19.895889]  print_report+0xd1/0x640
[   19.896323]  ? __virt_addr_valid+0x1db/0x2d0
[   19.897044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.897755]  kasan_report+0x102/0x140
[   19.898159]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   19.898881]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   19.899368]  kasan_check_range+0x10c/0x1c0
[   19.899930]  __kasan_check_write+0x18/0x20
[   19.900380]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   19.900908]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.901707]  ? __kmalloc_cache_noprof+0x162/0x350
[   19.902242]  kasan_bitops_generic+0x117/0x1c0
[   19.903007]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.903638]  ? __pfx_read_tsc+0x10/0x10
[   19.904085]  ? ktime_get_ts64+0x84/0x230
[   19.904569]  kunit_try_run_case+0x1b3/0x490
[   19.905005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.905631]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.906114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.906622]  ? __kthread_parkme+0x82/0x160
[   19.907013]  ? preempt_count_sub+0x50/0x80
[   19.907457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.907913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.908471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.909170]  kthread+0x257/0x310
[   19.909527]  ? __pfx_kthread+0x10/0x10
[   19.910341]  ret_from_fork+0x41/0x80
[   19.910691]  ? __pfx_kthread+0x10/0x10
[   19.911004]  ret_from_fork_asm+0x1a/0x30
[   19.912118]  </TASK>
[   19.912513] 
[   19.912685] Allocated by task 265:
[   19.913085]  kasan_save_stack+0x3d/0x60
[   19.913508]  kasan_save_track+0x18/0x40
[   19.914080]  kasan_save_alloc_info+0x3b/0x50
[   19.914437]  __kasan_kmalloc+0xb7/0xc0
[   19.914899]  __kmalloc_cache_noprof+0x162/0x350
[   19.915366]  kasan_bitops_generic+0x93/0x1c0
[   19.916058]  kunit_try_run_case+0x1b3/0x490
[   19.916883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.917760]  kthread+0x257/0x310
[   19.918341]  ret_from_fork+0x41/0x80
[   19.918609]  ret_from_fork_asm+0x1a/0x30
[   19.919105] 
[   19.919312] The buggy address belongs to the object at ffff888101402fa0
[   19.919312]  which belongs to the cache kmalloc-16 of size 16
[   19.920217] The buggy address is located 8 bytes inside of
[   19.920217]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   19.921363] 
[   19.921596] The buggy address belongs to the physical page:
[   19.922096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   19.922914] flags: 0x200000000000000(node=0|zone=2)
[   19.923931] page_type: f5(slab)
[   19.924412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.925229] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.925747] page dumped because: kasan: bad access detected
[   19.926241] 
[   19.926459] Memory state around the buggy address:
[   19.926882]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.927526]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.928058] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.928643]                                   ^
[   19.928998]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   19.929623]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   19.930230] ==================================================================
---
[   20.058018] ==================================================================
[   20.058599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.059238] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.060543] 
[   20.061434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.062091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.062622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.063512] Call Trace:
[   20.063978]  <TASK>
[   20.064193]  dump_stack_lvl+0x73/0xb0
[   20.064965]  print_report+0xd1/0x640
[   20.065667]  ? __virt_addr_valid+0x1db/0x2d0
[   20.066047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.066575]  kasan_report+0x102/0x140
[   20.067062]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.067843]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.068793]  kasan_check_range+0x10c/0x1c0
[   20.069141]  __kasan_check_write+0x18/0x20
[   20.069848]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.070524]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.071190]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.071846]  kasan_bitops_generic+0x117/0x1c0
[   20.072237]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.072711]  ? __pfx_read_tsc+0x10/0x10
[   20.073467]  ? ktime_get_ts64+0x84/0x230
[   20.074086]  kunit_try_run_case+0x1b3/0x490
[   20.074496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.075170]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.075915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.076482]  ? __kthread_parkme+0x82/0x160
[   20.076984]  ? preempt_count_sub+0x50/0x80
[   20.077408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.077828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.078394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.078978]  kthread+0x257/0x310
[   20.079285]  ? __pfx_kthread+0x10/0x10
[   20.079929]  ret_from_fork+0x41/0x80
[   20.080334]  ? __pfx_kthread+0x10/0x10
[   20.080765]  ret_from_fork_asm+0x1a/0x30
[   20.081297]  </TASK>
[   20.081516] 
[   20.081981] Allocated by task 265:
[   20.082370]  kasan_save_stack+0x3d/0x60
[   20.083275]  kasan_save_track+0x18/0x40
[   20.083889]  kasan_save_alloc_info+0x3b/0x50
[   20.084427]  __kasan_kmalloc+0xb7/0xc0
[   20.085240]  __kmalloc_cache_noprof+0x162/0x350
[   20.085929]  kasan_bitops_generic+0x93/0x1c0
[   20.086667]  kunit_try_run_case+0x1b3/0x490
[   20.087136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.087878]  kthread+0x257/0x310
[   20.088260]  ret_from_fork+0x41/0x80
[   20.088591]  ret_from_fork_asm+0x1a/0x30
[   20.089027] 
[   20.089251] The buggy address belongs to the object at ffff888101402fa0
[   20.089251]  which belongs to the cache kmalloc-16 of size 16
[   20.090636] The buggy address is located 8 bytes inside of
[   20.090636]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.091699] 
[   20.091937] The buggy address belongs to the physical page:
[   20.092485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.093241] flags: 0x200000000000000(node=0|zone=2)
[   20.093731] page_type: f5(slab)
[   20.094173] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.094721] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.095404] page dumped because: kasan: bad access detected
[   20.095847] 
[   20.096078] Memory state around the buggy address:
[   20.096518]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.097103]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.097718] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.098363]                                   ^
[   20.098797]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.099449]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.099969] ==================================================================
---
[   19.849005] ==================================================================
[   19.849663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   19.850386] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   19.851040] 
[   19.852120] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.852800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.853219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.853835] Call Trace:
[   19.854133]  <TASK>
[   19.854470]  dump_stack_lvl+0x73/0xb0
[   19.854836]  print_report+0xd1/0x640
[   19.855251]  ? __virt_addr_valid+0x1db/0x2d0
[   19.856390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.856884]  kasan_report+0x102/0x140
[   19.857248]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   19.857704]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   19.858238]  kasan_check_range+0x10c/0x1c0
[   19.858623]  __kasan_check_write+0x18/0x20
[   19.859021]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   19.859501]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.860243]  ? __kmalloc_cache_noprof+0x162/0x350
[   19.860866]  kasan_bitops_generic+0x117/0x1c0
[   19.861460]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.861927]  ? __pfx_read_tsc+0x10/0x10
[   19.862295]  ? ktime_get_ts64+0x84/0x230
[   19.862702]  kunit_try_run_case+0x1b3/0x490
[   19.863177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.863558]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.864011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.864562]  ? __kthread_parkme+0x82/0x160
[   19.864947]  ? preempt_count_sub+0x50/0x80
[   19.865408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.866076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.866491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.867089]  kthread+0x257/0x310
[   19.867613]  ? __pfx_kthread+0x10/0x10
[   19.868029]  ret_from_fork+0x41/0x80
[   19.868362]  ? __pfx_kthread+0x10/0x10
[   19.868763]  ret_from_fork_asm+0x1a/0x30
[   19.869212]  </TASK>
[   19.869488] 
[   19.869678] Allocated by task 265:
[   19.870005]  kasan_save_stack+0x3d/0x60
[   19.870340]  kasan_save_track+0x18/0x40
[   19.870640]  kasan_save_alloc_info+0x3b/0x50
[   19.870980]  __kasan_kmalloc+0xb7/0xc0
[   19.871322]  __kmalloc_cache_noprof+0x162/0x350
[   19.871816]  kasan_bitops_generic+0x93/0x1c0
[   19.872274]  kunit_try_run_case+0x1b3/0x490
[   19.872717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.873243]  kthread+0x257/0x310
[   19.873564]  ret_from_fork+0x41/0x80
[   19.873905]  ret_from_fork_asm+0x1a/0x30
[   19.874224] 
[   19.874446] The buggy address belongs to the object at ffff888101402fa0
[   19.874446]  which belongs to the cache kmalloc-16 of size 16
[   19.875477] The buggy address is located 8 bytes inside of
[   19.875477]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   19.876166] 
[   19.876386] The buggy address belongs to the physical page:
[   19.877358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   19.878970] flags: 0x200000000000000(node=0|zone=2)
[   19.879831] page_type: f5(slab)
[   19.880683] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.881768] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.882428] page dumped because: kasan: bad access detected
[   19.882873] 
[   19.883082] Memory state around the buggy address:
[   19.883838]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.884076]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.884544] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.885565]                                   ^
[   19.886018]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   19.886819]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   19.887741] ==================================================================
---
[   19.802282] ==================================================================
[   19.803444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   19.804710] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   19.805860] 
[   19.806183] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.807349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.809563] Call Trace:
[   19.810080]  <TASK>
[   19.810565]  dump_stack_lvl+0x73/0xb0
[   19.810934]  print_report+0xd1/0x640
[   19.811861]  ? __virt_addr_valid+0x1db/0x2d0
[   19.812247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.813146]  kasan_report+0x102/0x140
[   19.813521]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   19.814027]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   19.814996]  kasan_check_range+0x10c/0x1c0
[   19.815687]  __kasan_check_write+0x18/0x20
[   19.816100]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   19.816581]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.817022]  ? __kmalloc_cache_noprof+0x162/0x350
[   19.817530]  kasan_bitops_generic+0x117/0x1c0
[   19.818347]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.818817]  ? __pfx_read_tsc+0x10/0x10
[   19.819183]  ? ktime_get_ts64+0x84/0x230
[   19.820078]  kunit_try_run_case+0x1b3/0x490
[   19.820654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.820983]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.821625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.822024]  ? __kthread_parkme+0x82/0x160
[   19.822969]  ? preempt_count_sub+0x50/0x80
[   19.823703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.824168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.824883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.825356]  kthread+0x257/0x310
[   19.825883]  ? __pfx_kthread+0x10/0x10
[   19.826271]  ret_from_fork+0x41/0x80
[   19.827171]  ? __pfx_kthread+0x10/0x10
[   19.827527]  ret_from_fork_asm+0x1a/0x30
[   19.827937]  </TASK>
[   19.828214] 
[   19.828400] Allocated by task 265:
[   19.828730]  kasan_save_stack+0x3d/0x60
[   19.829203]  kasan_save_track+0x18/0x40
[   19.829884]  kasan_save_alloc_info+0x3b/0x50
[   19.830288]  __kasan_kmalloc+0xb7/0xc0
[   19.831252]  __kmalloc_cache_noprof+0x162/0x350
[   19.831864]  kasan_bitops_generic+0x93/0x1c0
[   19.832243]  kunit_try_run_case+0x1b3/0x490
[   19.832839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.833349]  kthread+0x257/0x310
[   19.833952]  ret_from_fork+0x41/0x80
[   19.834313]  ret_from_fork_asm+0x1a/0x30
[   19.835144] 
[   19.835368] The buggy address belongs to the object at ffff888101402fa0
[   19.835368]  which belongs to the cache kmalloc-16 of size 16
[   19.836419] The buggy address is located 8 bytes inside of
[   19.836419]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   19.837226] 
[   19.837449] The buggy address belongs to the physical page:
[   19.838156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   19.839261] flags: 0x200000000000000(node=0|zone=2)
[   19.839895] page_type: f5(slab)
[   19.840260] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.840869] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.841466] page dumped because: kasan: bad access detected
[   19.842134] 
[   19.842364] Memory state around the buggy address:
[   19.843183]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.843952]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.844696] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.845174]                                   ^
[   19.845864]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   19.847127]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   19.847530] ==================================================================
---
[   20.012677] ==================================================================
[   20.013906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.014858] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.016010] 
[   20.016431] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.017145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.017934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.018656] Call Trace:
[   20.018902]  <TASK>
[   20.019111]  dump_stack_lvl+0x73/0xb0
[   20.019875]  print_report+0xd1/0x640
[   20.020208]  ? __virt_addr_valid+0x1db/0x2d0
[   20.020609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.021143]  kasan_report+0x102/0x140
[   20.021832]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.022508]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.023012]  kasan_check_range+0x10c/0x1c0
[   20.023674]  __kasan_check_write+0x18/0x20
[   20.024161]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.024758]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.025429]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.025983]  kasan_bitops_generic+0x117/0x1c0
[   20.026580]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.026994]  ? __pfx_read_tsc+0x10/0x10
[   20.027719]  ? ktime_get_ts64+0x84/0x230
[   20.028085]  kunit_try_run_case+0x1b3/0x490
[   20.028699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.029099]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.029804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.030581]  ? __kthread_parkme+0x82/0x160
[   20.030952]  ? preempt_count_sub+0x50/0x80
[   20.031578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.032028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.032629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.033110]  kthread+0x257/0x310
[   20.033908]  ? __pfx_kthread+0x10/0x10
[   20.034223]  ret_from_fork+0x41/0x80
[   20.034845]  ? __pfx_kthread+0x10/0x10
[   20.035285]  ret_from_fork_asm+0x1a/0x30
[   20.035961]  </TASK>
[   20.036567] 
[   20.036740] Allocated by task 265:
[   20.037021]  kasan_save_stack+0x3d/0x60
[   20.037641]  kasan_save_track+0x18/0x40
[   20.038082]  kasan_save_alloc_info+0x3b/0x50
[   20.038786]  __kasan_kmalloc+0xb7/0xc0
[   20.039167]  __kmalloc_cache_noprof+0x162/0x350
[   20.039828]  kasan_bitops_generic+0x93/0x1c0
[   20.040434]  kunit_try_run_case+0x1b3/0x490
[   20.040763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.041693]  kthread+0x257/0x310
[   20.041995]  ret_from_fork+0x41/0x80
[   20.042369]  ret_from_fork_asm+0x1a/0x30
[   20.043020] 
[   20.043213] The buggy address belongs to the object at ffff888101402fa0
[   20.043213]  which belongs to the cache kmalloc-16 of size 16
[   20.045131] The buggy address is located 8 bytes inside of
[   20.045131]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.045975] 
[   20.046143] The buggy address belongs to the physical page:
[   20.046995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.047834] flags: 0x200000000000000(node=0|zone=2)
[   20.048385] page_type: f5(slab)
[   20.048657] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.049496] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.050035] page dumped because: kasan: bad access detected
[   20.051103] 
[   20.051478] Memory state around the buggy address:
[   20.051881]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.052412]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.053026] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.053839]                                   ^
[   20.054166]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.054629]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.055293] ==================================================================
---
[   19.932916] ==================================================================
[   19.933697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   19.934379] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   19.934945] 
[   19.935232] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.935918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.936310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.936999] Call Trace:
[   19.937323]  <TASK>
[   19.937559]  dump_stack_lvl+0x73/0xb0
[   19.937993]  print_report+0xd1/0x640
[   19.938472]  ? __virt_addr_valid+0x1db/0x2d0
[   19.938932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.939826]  kasan_report+0x102/0x140
[   19.940489]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   19.941288]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   19.941812]  kasan_check_range+0x10c/0x1c0
[   19.942252]  __kasan_check_write+0x18/0x20
[   19.942752]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   19.943380]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.943939]  ? __kmalloc_cache_noprof+0x162/0x350
[   19.944423]  kasan_bitops_generic+0x117/0x1c0
[   19.944795]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.945347]  ? __pfx_read_tsc+0x10/0x10
[   19.945724]  ? ktime_get_ts64+0x84/0x230
[   19.946218]  kunit_try_run_case+0x1b3/0x490
[   19.946605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.947032]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.947544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.948009]  ? __kthread_parkme+0x82/0x160
[   19.948486]  ? preempt_count_sub+0x50/0x80
[   19.948861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.949368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.949954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.950513]  kthread+0x257/0x310
[   19.950919]  ? __pfx_kthread+0x10/0x10
[   19.951359]  ret_from_fork+0x41/0x80
[   19.951677]  ? __pfx_kthread+0x10/0x10
[   19.952106]  ret_from_fork_asm+0x1a/0x30
[   19.952582]  </TASK>
[   19.952876] 
[   19.953080] Allocated by task 265:
[   19.953487]  kasan_save_stack+0x3d/0x60
[   19.953863]  kasan_save_track+0x18/0x40
[   19.954320]  kasan_save_alloc_info+0x3b/0x50
[   19.954730]  __kasan_kmalloc+0xb7/0xc0
[   19.955054]  __kmalloc_cache_noprof+0x162/0x350
[   19.955569]  kasan_bitops_generic+0x93/0x1c0
[   19.955994]  kunit_try_run_case+0x1b3/0x490
[   19.956457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.956909]  kthread+0x257/0x310
[   19.957179]  ret_from_fork+0x41/0x80
[   19.957618]  ret_from_fork_asm+0x1a/0x30
[   19.958064] 
[   19.958337] The buggy address belongs to the object at ffff888101402fa0
[   19.958337]  which belongs to the cache kmalloc-16 of size 16
[   19.959262] The buggy address is located 8 bytes inside of
[   19.959262]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   19.960038] 
[   19.960260] The buggy address belongs to the physical page:
[   19.960754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   19.961497] flags: 0x200000000000000(node=0|zone=2)
[   19.961966] page_type: f5(slab)
[   19.962296] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.962900] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.963591] page dumped because: kasan: bad access detected
[   19.964099] 
[   19.964366] Memory state around the buggy address:
[   19.964829]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.965438]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.966025] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.966527]                                   ^
[   19.966862]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   19.967487]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   19.968135] ==================================================================
---
[   20.101635] ==================================================================
[   20.102180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.102856] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.103409] 
[   20.103645] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.104509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.105143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.106352] Call Trace:
[   20.106671]  <TASK>
[   20.106958]  dump_stack_lvl+0x73/0xb0
[   20.107379]  print_report+0xd1/0x640
[   20.107759]  ? __virt_addr_valid+0x1db/0x2d0
[   20.108253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.108740]  kasan_report+0x102/0x140
[   20.109153]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.109683]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.110237]  kasan_check_range+0x10c/0x1c0
[   20.110621]  __kasan_check_write+0x18/0x20
[   20.111093]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.111601]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.112064]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.112623]  kasan_bitops_generic+0x117/0x1c0
[   20.113025]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.113565]  ? __pfx_read_tsc+0x10/0x10
[   20.113904]  ? ktime_get_ts64+0x84/0x230
[   20.114373]  kunit_try_run_case+0x1b3/0x490
[   20.114805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.115298]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.115737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.116224]  ? __kthread_parkme+0x82/0x160
[   20.116618]  ? preempt_count_sub+0x50/0x80
[   20.117091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.117573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.118031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.118597]  kthread+0x257/0x310
[   20.118974]  ? __pfx_kthread+0x10/0x10
[   20.119390]  ret_from_fork+0x41/0x80
[   20.119803]  ? __pfx_kthread+0x10/0x10
[   20.120132]  ret_from_fork_asm+0x1a/0x30
[   20.120587]  </TASK>
[   20.120861] 
[   20.121052] Allocated by task 265:
[   20.121450]  kasan_save_stack+0x3d/0x60
[   20.121838]  kasan_save_track+0x18/0x40
[   20.122284]  kasan_save_alloc_info+0x3b/0x50
[   20.122714]  __kasan_kmalloc+0xb7/0xc0
[   20.123056]  __kmalloc_cache_noprof+0x162/0x350
[   20.123430]  kasan_bitops_generic+0x93/0x1c0
[   20.123853]  kunit_try_run_case+0x1b3/0x490
[   20.124297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.124882]  kthread+0x257/0x310
[   20.125310]  ret_from_fork+0x41/0x80
[   20.125625]  ret_from_fork_asm+0x1a/0x30
[   20.125961] 
[   20.126231] The buggy address belongs to the object at ffff888101402fa0
[   20.126231]  which belongs to the cache kmalloc-16 of size 16
[   20.127240] The buggy address is located 8 bytes inside of
[   20.127240]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.128076] 
[   20.128350] The buggy address belongs to the physical page:
[   20.128793] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.129402] flags: 0x200000000000000(node=0|zone=2)
[   20.129741] page_type: f5(slab)
[   20.130034] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.130764] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.131500] page dumped because: kasan: bad access detected
[   20.132009] 
[   20.132173] Memory state around the buggy address:
[   20.132527]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.133145]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.133818] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.134480]                                   ^
[   20.134904]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.135473]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.136226] ==================================================================
---
[   19.970693] ==================================================================
[   19.971252] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   19.972800] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   19.973517] 
[   19.973814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.974656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.975096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.975949] Call Trace:
[   19.976240]  <TASK>
[   19.976510]  dump_stack_lvl+0x73/0xb0
[   19.976962]  print_report+0xd1/0x640
[   19.977378]  ? __virt_addr_valid+0x1db/0x2d0
[   19.978037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.978493]  kasan_report+0x102/0x140
[   19.978959]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   19.979509]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   19.980095]  kasan_check_range+0x10c/0x1c0
[   19.980750]  __kasan_check_write+0x18/0x20
[   19.980964]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   19.981157]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.982470]  ? __kmalloc_cache_noprof+0x162/0x350
[   19.982892]  kasan_bitops_generic+0x117/0x1c0
[   19.983545]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.983941]  ? __pfx_read_tsc+0x10/0x10
[   19.984400]  ? ktime_get_ts64+0x84/0x230
[   19.985084]  kunit_try_run_case+0x1b3/0x490
[   19.985709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.986166]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.986590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.987503]  ? __kthread_parkme+0x82/0x160
[   19.987875]  ? preempt_count_sub+0x50/0x80
[   19.988228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.988585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.989035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.990264]  kthread+0x257/0x310
[   19.990637]  ? __pfx_kthread+0x10/0x10
[   19.991119]  ret_from_fork+0x41/0x80
[   19.991534]  ? __pfx_kthread+0x10/0x10
[   19.992004]  ret_from_fork_asm+0x1a/0x30
[   19.992519]  </TASK>
[   19.992835] 
[   19.993098] Allocated by task 265:
[   19.993497]  kasan_save_stack+0x3d/0x60
[   19.993896]  kasan_save_track+0x18/0x40
[   19.994421]  kasan_save_alloc_info+0x3b/0x50
[   19.994905]  __kasan_kmalloc+0xb7/0xc0
[   19.995586]  __kmalloc_cache_noprof+0x162/0x350
[   19.996012]  kasan_bitops_generic+0x93/0x1c0
[   19.996415]  kunit_try_run_case+0x1b3/0x490
[   19.996895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.997543]  kthread+0x257/0x310
[   19.997907]  ret_from_fork+0x41/0x80
[   19.998465]  ret_from_fork_asm+0x1a/0x30
[   19.998832] 
[   19.999119] The buggy address belongs to the object at ffff888101402fa0
[   19.999119]  which belongs to the cache kmalloc-16 of size 16
[   20.000179] The buggy address is located 8 bytes inside of
[   20.000179]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.001298] 
[   20.001502] The buggy address belongs to the physical page:
[   20.002098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.002914] flags: 0x200000000000000(node=0|zone=2)
[   20.003413] page_type: f5(slab)
[   20.003849] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.004548] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.005309] page dumped because: kasan: bad access detected
[   20.005726] 
[   20.005954] Memory state around the buggy address:
[   20.006475]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.007138]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.007873] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.008550]                                   ^
[   20.009036]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.009714]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.010486] ==================================================================

test log snippet boot parser 127

Home

[   20.453178] ==================================================================
[   20.454428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   20.455607] Read of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.456096] 
[   20.456373] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.457032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.457476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.458219] Call Trace:
[   20.458531]  <TASK>
[   20.458802]  dump_stack_lvl+0x73/0xb0
[   20.459681]  print_report+0xd1/0x640
[   20.460442]  ? __virt_addr_valid+0x1db/0x2d0
[   20.460967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.461793]  kasan_report+0x102/0x140
[   20.462177]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   20.462713]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   20.463261]  __asan_report_load8_noabort+0x18/0x20
[   20.463702]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   20.464511]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.465004]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.465724]  kasan_bitops_generic+0x122/0x1c0
[   20.466496]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.467140]  ? __pfx_read_tsc+0x10/0x10
[   20.467686]  ? ktime_get_ts64+0x84/0x230
[   20.468592]  kunit_try_run_case+0x1b3/0x490
[   20.468944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.469662]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.470265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.470912]  ? __kthread_parkme+0x82/0x160
[   20.471496]  ? preempt_count_sub+0x50/0x80
[   20.471852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.472829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.473345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.473818]  kthread+0x257/0x310
[   20.473968]  ? __pfx_kthread+0x10/0x10
[   20.474136]  ret_from_fork+0x41/0x80
[   20.474618]  ? __pfx_kthread+0x10/0x10
[   20.475343]  ret_from_fork_asm+0x1a/0x30
[   20.475845]  </TASK>
[   20.476121] 
[   20.476370] Allocated by task 265:
[   20.476793]  kasan_save_stack+0x3d/0x60
[   20.477172]  kasan_save_track+0x18/0x40
[   20.477605]  kasan_save_alloc_info+0x3b/0x50
[   20.478018]  __kasan_kmalloc+0xb7/0xc0
[   20.478504]  __kmalloc_cache_noprof+0x162/0x350
[   20.478976]  kasan_bitops_generic+0x93/0x1c0
[   20.479494]  kunit_try_run_case+0x1b3/0x490
[   20.479874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.480410]  kthread+0x257/0x310
[   20.480824]  ret_from_fork+0x41/0x80
[   20.481270]  ret_from_fork_asm+0x1a/0x30
[   20.481701] 
[   20.481949] The buggy address belongs to the object at ffff888101402fa0
[   20.481949]  which belongs to the cache kmalloc-16 of size 16
[   20.482931] The buggy address is located 8 bytes inside of
[   20.482931]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.483876] 
[   20.484119] The buggy address belongs to the physical page:
[   20.484651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.485354] flags: 0x200000000000000(node=0|zone=2)
[   20.485758] page_type: f5(slab)
[   20.486235] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.486739] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.487497] page dumped because: kasan: bad access detected
[   20.487958] 
[   20.488240] Memory state around the buggy address:
[   20.488615]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.489300]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.489836] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.490508]                                   ^
[   20.491011]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.491601]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.492229] ==================================================================

test log snippet boot parser 128

Home

[   20.212109] ==================================================================
[   20.212953] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   20.213834] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.214525] 
[   20.214750] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.215652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.216106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.216920] Call Trace:
[   20.217417]  <TASK>
[   20.217749]  dump_stack_lvl+0x73/0xb0
[   20.218366]  print_report+0xd1/0x640
[   20.218892]  ? __virt_addr_valid+0x1db/0x2d0
[   20.219321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.219803]  kasan_report+0x102/0x140
[   20.220300]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   20.220904]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   20.221551]  kasan_check_range+0x10c/0x1c0
[   20.221998]  __kasan_check_write+0x18/0x20
[   20.222600]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   20.223277]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.223891]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.224560]  kasan_bitops_generic+0x122/0x1c0
[   20.225035]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.225900]  ? __pfx_read_tsc+0x10/0x10
[   20.226525]  ? ktime_get_ts64+0x84/0x230
[   20.226878]  kunit_try_run_case+0x1b3/0x490
[   20.227255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.227696]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.228526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.229023]  ? __kthread_parkme+0x82/0x160
[   20.229665]  ? preempt_count_sub+0x50/0x80
[   20.230265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.230735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.231472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.231688]  kthread+0x257/0x310
[   20.231864]  ? __pfx_kthread+0x10/0x10
[   20.232019]  ret_from_fork+0x41/0x80
[   20.232167]  ? __pfx_kthread+0x10/0x10
[   20.232482]  ret_from_fork_asm+0x1a/0x30
[   20.233225]  </TASK>
[   20.233663] 
[   20.233910] Allocated by task 265:
[   20.234287]  kasan_save_stack+0x3d/0x60
[   20.235173]  kasan_save_track+0x18/0x40
[   20.235639]  kasan_save_alloc_info+0x3b/0x50
[   20.235999]  __kasan_kmalloc+0xb7/0xc0
[   20.236408]  __kmalloc_cache_noprof+0x162/0x350
[   20.236928]  kasan_bitops_generic+0x93/0x1c0
[   20.237622]  kunit_try_run_case+0x1b3/0x490
[   20.238267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.238595]  kthread+0x257/0x310
[   20.238976]  ret_from_fork+0x41/0x80
[   20.239560]  ret_from_fork_asm+0x1a/0x30
[   20.240167] 
[   20.240437] The buggy address belongs to the object at ffff888101402fa0
[   20.240437]  which belongs to the cache kmalloc-16 of size 16
[   20.241832] The buggy address is located 8 bytes inside of
[   20.241832]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.242886] 
[   20.243107] The buggy address belongs to the physical page:
[   20.243593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.244178] flags: 0x200000000000000(node=0|zone=2)
[   20.244578] page_type: f5(slab)
[   20.245109] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.246089] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.246958] page dumped because: kasan: bad access detected
[   20.247541] 
[   20.247809] Memory state around the buggy address:
[   20.248271]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.248884]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.249552] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.250139]                                   ^
[   20.250707]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.251151]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.251755] ==================================================================
---
[   20.294479] ==================================================================
[   20.295665] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   20.296496] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.297138] 
[   20.297382] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.298295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.298798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.299536] Call Trace:
[   20.299842]  <TASK>
[   20.300114]  dump_stack_lvl+0x73/0xb0
[   20.300576]  print_report+0xd1/0x640
[   20.301000]  ? __virt_addr_valid+0x1db/0x2d0
[   20.301586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.302191]  kasan_report+0x102/0x140
[   20.302633]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   20.303207]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   20.304061]  kasan_check_range+0x10c/0x1c0
[   20.304537]  __kasan_check_write+0x18/0x20
[   20.304920]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   20.305371]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.306088]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.306636]  kasan_bitops_generic+0x122/0x1c0
[   20.307119]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.307597]  ? __pfx_read_tsc+0x10/0x10
[   20.308005]  ? ktime_get_ts64+0x84/0x230
[   20.308639]  kunit_try_run_case+0x1b3/0x490
[   20.309102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.309640]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.310126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.310642]  ? __kthread_parkme+0x82/0x160
[   20.311137]  ? preempt_count_sub+0x50/0x80
[   20.311602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.312093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.312661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.313171]  kthread+0x257/0x310
[   20.313621]  ? __pfx_kthread+0x10/0x10
[   20.314082]  ret_from_fork+0x41/0x80
[   20.314568]  ? __pfx_kthread+0x10/0x10
[   20.314914]  ret_from_fork_asm+0x1a/0x30
[   20.315449]  </TASK>
[   20.315756] 
[   20.315953] Allocated by task 265:
[   20.316310]  kasan_save_stack+0x3d/0x60
[   20.316729]  kasan_save_track+0x18/0x40
[   20.317200]  kasan_save_alloc_info+0x3b/0x50
[   20.317663]  __kasan_kmalloc+0xb7/0xc0
[   20.318283]  __kmalloc_cache_noprof+0x162/0x350
[   20.318672]  kasan_bitops_generic+0x93/0x1c0
[   20.319079]  kunit_try_run_case+0x1b3/0x490
[   20.319804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.320287]  kthread+0x257/0x310
[   20.320677]  ret_from_fork+0x41/0x80
[   20.321098]  ret_from_fork_asm+0x1a/0x30
[   20.321536] 
[   20.321794] The buggy address belongs to the object at ffff888101402fa0
[   20.321794]  which belongs to the cache kmalloc-16 of size 16
[   20.322737] The buggy address is located 8 bytes inside of
[   20.322737]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.323980] 
[   20.324200] The buggy address belongs to the physical page:
[   20.324556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.325114] flags: 0x200000000000000(node=0|zone=2)
[   20.326790] page_type: f5(slab)
[   20.327179] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.327860] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.328394] page dumped because: kasan: bad access detected
[   20.329575] 
[   20.329944] Memory state around the buggy address:
[   20.330834]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.331439]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.331947] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.332753]                                   ^
[   20.333109]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.333761]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.334374] ==================================================================
---
[   20.173980] ==================================================================
[   20.175148] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   20.175855] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.176577] 
[   20.176804] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.177567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.177955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.178712] Call Trace:
[   20.178959]  <TASK>
[   20.179179]  dump_stack_lvl+0x73/0xb0
[   20.179628]  print_report+0xd1/0x640
[   20.180093]  ? __virt_addr_valid+0x1db/0x2d0
[   20.180594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.181154]  kasan_report+0x102/0x140
[   20.181602]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   20.182045]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   20.182754]  kasan_check_range+0x10c/0x1c0
[   20.183303]  __kasan_check_write+0x18/0x20
[   20.183746]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   20.184411]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.185040]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.185508]  kasan_bitops_generic+0x122/0x1c0
[   20.185990]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.186576]  ? __pfx_read_tsc+0x10/0x10
[   20.186969]  ? ktime_get_ts64+0x84/0x230
[   20.187489]  kunit_try_run_case+0x1b3/0x490
[   20.187945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.188420]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.188835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.189404]  ? __kthread_parkme+0x82/0x160
[   20.189843]  ? preempt_count_sub+0x50/0x80
[   20.190275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.190615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.191099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.191710]  kthread+0x257/0x310
[   20.192106]  ? __pfx_kthread+0x10/0x10
[   20.192547]  ret_from_fork+0x41/0x80
[   20.192967]  ? __pfx_kthread+0x10/0x10
[   20.193385]  ret_from_fork_asm+0x1a/0x30
[   20.193855]  </TASK>
[   20.194108] 
[   20.194335] Allocated by task 265:
[   20.194682]  kasan_save_stack+0x3d/0x60
[   20.195106]  kasan_save_track+0x18/0x40
[   20.195448]  kasan_save_alloc_info+0x3b/0x50
[   20.195905]  __kasan_kmalloc+0xb7/0xc0
[   20.196407]  __kmalloc_cache_noprof+0x162/0x350
[   20.196926]  kasan_bitops_generic+0x93/0x1c0
[   20.197418]  kunit_try_run_case+0x1b3/0x490
[   20.197850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.198302]  kthread+0x257/0x310
[   20.198577]  ret_from_fork+0x41/0x80
[   20.199016]  ret_from_fork_asm+0x1a/0x30
[   20.199525] 
[   20.199852] The buggy address belongs to the object at ffff888101402fa0
[   20.199852]  which belongs to the cache kmalloc-16 of size 16
[   20.200946] The buggy address is located 8 bytes inside of
[   20.200946]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.201970] 
[   20.202160] The buggy address belongs to the physical page:
[   20.202542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.203284] flags: 0x200000000000000(node=0|zone=2)
[   20.203754] page_type: f5(slab)
[   20.204139] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.205064] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.205809] page dumped because: kasan: bad access detected
[   20.206353] 
[   20.206580] Memory state around the buggy address:
[   20.207113]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.207761]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.208367] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.209028]                                   ^
[   20.209387]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.209825]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.210553] ==================================================================
---
[   20.374861] ==================================================================
[   20.375437] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   20.376373] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.376992] 
[   20.377253] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.377972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.378347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.379714] Call Trace:
[   20.380078]  <TASK>
[   20.380375]  dump_stack_lvl+0x73/0xb0
[   20.380815]  print_report+0xd1/0x640
[   20.381188]  ? __virt_addr_valid+0x1db/0x2d0
[   20.381683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.382302]  kasan_report+0x102/0x140
[   20.382707]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   20.383269]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   20.383797]  kasan_check_range+0x10c/0x1c0
[   20.384197]  __kasan_check_write+0x18/0x20
[   20.385024]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   20.385606]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.386181]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.386712]  kasan_bitops_generic+0x122/0x1c0
[   20.387175]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.387714]  ? __pfx_read_tsc+0x10/0x10
[   20.388144]  ? ktime_get_ts64+0x84/0x230
[   20.388628]  kunit_try_run_case+0x1b3/0x490
[   20.389462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.390257]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.390648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.391195]  ? __kthread_parkme+0x82/0x160
[   20.391683]  ? preempt_count_sub+0x50/0x80
[   20.392356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.392941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.393814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.394362]  kthread+0x257/0x310
[   20.394762]  ? __pfx_kthread+0x10/0x10
[   20.395242]  ret_from_fork+0x41/0x80
[   20.395690]  ? __pfx_kthread+0x10/0x10
[   20.396583]  ret_from_fork_asm+0x1a/0x30
[   20.396835]  </TASK>
[   20.397036] 
[   20.397198] Allocated by task 265:
[   20.397489]  kasan_save_stack+0x3d/0x60
[   20.397803]  kasan_save_track+0x18/0x40
[   20.398111]  kasan_save_alloc_info+0x3b/0x50
[   20.398860]  __kasan_kmalloc+0xb7/0xc0
[   20.399640]  __kmalloc_cache_noprof+0x162/0x350
[   20.399993]  kasan_bitops_generic+0x93/0x1c0
[   20.400328]  kunit_try_run_case+0x1b3/0x490
[   20.400740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.401308]  kthread+0x257/0x310
[   20.401643]  ret_from_fork+0x41/0x80
[   20.402045]  ret_from_fork_asm+0x1a/0x30
[   20.402522] 
[   20.402713] The buggy address belongs to the object at ffff888101402fa0
[   20.402713]  which belongs to the cache kmalloc-16 of size 16
[   20.403543] The buggy address is located 8 bytes inside of
[   20.403543]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.404429] 
[   20.404612] The buggy address belongs to the physical page:
[   20.405099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.405824] flags: 0x200000000000000(node=0|zone=2)
[   20.406297] page_type: f5(slab)
[   20.406664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.407273] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.407763] page dumped because: kasan: bad access detected
[   20.408320] 
[   20.408543] Memory state around the buggy address:
[   20.408936]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.409534]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.410088] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.410732]                                   ^
[   20.411145]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.411641]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.412258] ==================================================================
---
[   20.253459] ==================================================================
[   20.254503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   20.255330] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.255991] 
[   20.256263] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.257581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.258121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.258983] Call Trace:
[   20.259435]  <TASK>
[   20.259737]  dump_stack_lvl+0x73/0xb0
[   20.260283]  print_report+0xd1/0x640
[   20.260655]  ? __virt_addr_valid+0x1db/0x2d0
[   20.261059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.261640]  kasan_report+0x102/0x140
[   20.262099]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   20.262752]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   20.263698]  kasan_check_range+0x10c/0x1c0
[   20.264227]  __kasan_check_write+0x18/0x20
[   20.264753]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   20.265338]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.265928]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.266375]  kasan_bitops_generic+0x122/0x1c0
[   20.266757]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.267374]  ? __pfx_read_tsc+0x10/0x10
[   20.267751]  ? ktime_get_ts64+0x84/0x230
[   20.268357]  kunit_try_run_case+0x1b3/0x490
[   20.268820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.269387]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.269938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.270510]  ? __kthread_parkme+0x82/0x160
[   20.271001]  ? preempt_count_sub+0x50/0x80
[   20.271509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.271936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.272481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.273085]  kthread+0x257/0x310
[   20.273459]  ? __pfx_kthread+0x10/0x10
[   20.273996]  ret_from_fork+0x41/0x80
[   20.274488]  ? __pfx_kthread+0x10/0x10
[   20.274983]  ret_from_fork_asm+0x1a/0x30
[   20.275471]  </TASK>
[   20.275756] 
[   20.275994] Allocated by task 265:
[   20.276466]  kasan_save_stack+0x3d/0x60
[   20.276957]  kasan_save_track+0x18/0x40
[   20.277464]  kasan_save_alloc_info+0x3b/0x50
[   20.277862]  __kasan_kmalloc+0xb7/0xc0
[   20.278308]  __kmalloc_cache_noprof+0x162/0x350
[   20.278904]  kasan_bitops_generic+0x93/0x1c0
[   20.279420]  kunit_try_run_case+0x1b3/0x490
[   20.279904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.280473]  kthread+0x257/0x310
[   20.280910]  ret_from_fork+0x41/0x80
[   20.281395]  ret_from_fork_asm+0x1a/0x30
[   20.281838] 
[   20.282075] The buggy address belongs to the object at ffff888101402fa0
[   20.282075]  which belongs to the cache kmalloc-16 of size 16
[   20.283071] The buggy address is located 8 bytes inside of
[   20.283071]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.283951] 
[   20.284345] The buggy address belongs to the physical page:
[   20.284919] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.285549] flags: 0x200000000000000(node=0|zone=2)
[   20.285989] page_type: f5(slab)
[   20.286383] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.287039] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.287595] page dumped because: kasan: bad access detected
[   20.288019] 
[   20.288425] Memory state around the buggy address:
[   20.288968]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.289635]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.290089] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.290835]                                   ^
[   20.291319]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.291963]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.292617] ==================================================================
---
[   20.137386] ==================================================================
[   20.138114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   20.139087] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.139565] 
[   20.139760] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.140609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.141011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.141827] Call Trace:
[   20.142067]  <TASK>
[   20.142331]  dump_stack_lvl+0x73/0xb0
[   20.142739]  print_report+0xd1/0x640
[   20.143156]  ? __virt_addr_valid+0x1db/0x2d0
[   20.143646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.144238]  kasan_report+0x102/0x140
[   20.144633]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   20.145218]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   20.145670]  kasan_check_range+0x10c/0x1c0
[   20.146023]  __kasan_check_write+0x18/0x20
[   20.146519]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   20.147127]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.147814]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.148284]  kasan_bitops_generic+0x122/0x1c0
[   20.148617]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.149116]  ? __pfx_read_tsc+0x10/0x10
[   20.149578]  ? ktime_get_ts64+0x84/0x230
[   20.150032]  kunit_try_run_case+0x1b3/0x490
[   20.150532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.150930]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.151470]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.151933]  ? __kthread_parkme+0x82/0x160
[   20.152309]  ? preempt_count_sub+0x50/0x80
[   20.152731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.153265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.153885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.154400]  kthread+0x257/0x310
[   20.154766]  ? __pfx_kthread+0x10/0x10
[   20.155150]  ret_from_fork+0x41/0x80
[   20.155494]  ? __pfx_kthread+0x10/0x10
[   20.155907]  ret_from_fork_asm+0x1a/0x30
[   20.156409]  </TASK>
[   20.156681] 
[   20.156921] Allocated by task 265:
[   20.157272]  kasan_save_stack+0x3d/0x60
[   20.157711]  kasan_save_track+0x18/0x40
[   20.158047]  kasan_save_alloc_info+0x3b/0x50
[   20.158546]  __kasan_kmalloc+0xb7/0xc0
[   20.158917]  __kmalloc_cache_noprof+0x162/0x350
[   20.159369]  kasan_bitops_generic+0x93/0x1c0
[   20.159728]  kunit_try_run_case+0x1b3/0x490
[   20.160152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.160653]  kthread+0x257/0x310
[   20.160946]  ret_from_fork+0x41/0x80
[   20.161291]  ret_from_fork_asm+0x1a/0x30
[   20.161597] 
[   20.161792] The buggy address belongs to the object at ffff888101402fa0
[   20.161792]  which belongs to the cache kmalloc-16 of size 16
[   20.162865] The buggy address is located 8 bytes inside of
[   20.162865]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.163932] 
[   20.164156] The buggy address belongs to the physical page:
[   20.164572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.165048] flags: 0x200000000000000(node=0|zone=2)
[   20.165564] page_type: f5(slab)
[   20.165939] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.166651] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.167342] page dumped because: kasan: bad access detected
[   20.167732] 
[   20.167870] Memory state around the buggy address:
[   20.168216]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.168702]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.169399] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.170099]                                   ^
[   20.170531]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.171137]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.171792] ==================================================================
---
[   20.335294] ==================================================================
[   20.335872] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   20.336916] Write of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.337573] 
[   20.337801] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.338514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.338920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.339608] Call Trace:
[   20.339856]  <TASK>
[   20.340137]  dump_stack_lvl+0x73/0xb0
[   20.340558]  print_report+0xd1/0x640
[   20.340985]  ? __virt_addr_valid+0x1db/0x2d0
[   20.341452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.341924]  kasan_report+0x102/0x140
[   20.342288]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   20.342862]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   20.343463]  kasan_check_range+0x10c/0x1c0
[   20.343803]  __kasan_check_write+0x18/0x20
[   20.344273]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   20.344862]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.345465]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.346030]  kasan_bitops_generic+0x122/0x1c0
[   20.346387]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.346906]  ? __pfx_read_tsc+0x10/0x10
[   20.347258]  ? ktime_get_ts64+0x84/0x230
[   20.347714]  kunit_try_run_case+0x1b3/0x490
[   20.348064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.348421]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.348919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.349550]  ? __kthread_parkme+0x82/0x160
[   20.349971]  ? preempt_count_sub+0x50/0x80
[   20.350469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.350867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.351532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.352017]  kthread+0x257/0x310
[   20.352379]  ? __pfx_kthread+0x10/0x10
[   20.352874]  ret_from_fork+0x41/0x80
[   20.353181]  ? __pfx_kthread+0x10/0x10
[   20.353488]  ret_from_fork_asm+0x1a/0x30
[   20.353841]  </TASK>
[   20.354109] 
[   20.354320] Allocated by task 265:
[   20.354669]  kasan_save_stack+0x3d/0x60
[   20.355345]  kasan_save_track+0x18/0x40
[   20.355751]  kasan_save_alloc_info+0x3b/0x50
[   20.356198]  __kasan_kmalloc+0xb7/0xc0
[   20.356574]  __kmalloc_cache_noprof+0x162/0x350
[   20.356993]  kasan_bitops_generic+0x93/0x1c0
[   20.358519]  kunit_try_run_case+0x1b3/0x490
[   20.358976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.359893]  kthread+0x257/0x310
[   20.360587]  ret_from_fork+0x41/0x80
[   20.360902]  ret_from_fork_asm+0x1a/0x30
[   20.361253] 
[   20.361463] The buggy address belongs to the object at ffff888101402fa0
[   20.361463]  which belongs to the cache kmalloc-16 of size 16
[   20.362357] The buggy address is located 8 bytes inside of
[   20.362357]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.363174] 
[   20.363389] The buggy address belongs to the physical page:
[   20.363860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.364475] flags: 0x200000000000000(node=0|zone=2)
[   20.364902] page_type: f5(slab)
[   20.365184] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.365952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.366520] page dumped because: kasan: bad access detected
[   20.366951] 
[   20.367170] Memory state around the buggy address:
[   20.367612]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.368075]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.368649] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.369397]                                   ^
[   20.369846]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.370469]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.370962] ==================================================================

test log snippet boot parser 129

Home

[   20.413694] ==================================================================
[   20.414788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   20.416044] Read of size 8 at addr ffff888101402fa8 by task kunit_try_catch/265
[   20.417571] 
[   20.418267] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.419136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.419578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.420388] Call Trace:
[   20.420691]  <TASK>
[   20.420966]  dump_stack_lvl+0x73/0xb0
[   20.421410]  print_report+0xd1/0x640
[   20.421756]  ? __virt_addr_valid+0x1db/0x2d0
[   20.422258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.422794]  kasan_report+0x102/0x140
[   20.423240]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   20.423821]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   20.424391]  kasan_check_range+0x10c/0x1c0
[   20.424809]  __kasan_check_read+0x15/0x20
[   20.425268]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   20.425843]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.426415]  ? __kmalloc_cache_noprof+0x162/0x350
[   20.426916]  kasan_bitops_generic+0x122/0x1c0
[   20.427426]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.427884]  ? __pfx_read_tsc+0x10/0x10
[   20.428726]  ? ktime_get_ts64+0x84/0x230
[   20.429158]  kunit_try_run_case+0x1b3/0x490
[   20.430093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.430548]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.430977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.431745]  ? __kthread_parkme+0x82/0x160
[   20.432525]  ? preempt_count_sub+0x50/0x80
[   20.432908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.433516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.434229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.434909]  kthread+0x257/0x310
[   20.435268]  ? __pfx_kthread+0x10/0x10
[   20.435673]  ret_from_fork+0x41/0x80
[   20.436045]  ? __pfx_kthread+0x10/0x10
[   20.436500]  ret_from_fork_asm+0x1a/0x30
[   20.436956]  </TASK>
[   20.437268] 
[   20.437487] Allocated by task 265:
[   20.437854]  kasan_save_stack+0x3d/0x60
[   20.438258]  kasan_save_track+0x18/0x40
[   20.438678]  kasan_save_alloc_info+0x3b/0x50
[   20.439097]  __kasan_kmalloc+0xb7/0xc0
[   20.439468]  __kmalloc_cache_noprof+0x162/0x350
[   20.439939]  kasan_bitops_generic+0x93/0x1c0
[   20.440386]  kunit_try_run_case+0x1b3/0x490
[   20.440768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.441325]  kthread+0x257/0x310
[   20.441634]  ret_from_fork+0x41/0x80
[   20.442023]  ret_from_fork_asm+0x1a/0x30
[   20.442451] 
[   20.442659] The buggy address belongs to the object at ffff888101402fa0
[   20.442659]  which belongs to the cache kmalloc-16 of size 16
[   20.443622] The buggy address is located 8 bytes inside of
[   20.443622]  allocated 9-byte region [ffff888101402fa0, ffff888101402fa9)
[   20.444355] 
[   20.444569] The buggy address belongs to the physical page:
[   20.445088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   20.445805] flags: 0x200000000000000(node=0|zone=2)
[   20.446153] page_type: f5(slab)
[   20.446554] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.447261] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.447924] page dumped because: kasan: bad access detected
[   20.448382] 
[   20.448606] Memory state around the buggy address:
[   20.448955]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.449595]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.450037] >ffff888101402f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.450680]                                   ^
[   20.451129]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   20.451720]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   20.452149] ==================================================================

test log snippet boot parser 130

Home

[   15.529105] ==================================================================
[   15.530553] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x318/0x370
[   15.531873] Write of size 1 at addr ffff888102ae1f00 by task kunit_try_catch/148
[   15.532416] 
[   15.533171] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.534049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.534340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.535343] Call Trace:
[   15.535605]  <TASK>
[   15.536687]  dump_stack_lvl+0x73/0xb0
[   15.537405]  print_report+0xd1/0x640
[   15.538243]  ? __virt_addr_valid+0x1db/0x2d0
[   15.538917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.539400]  kasan_report+0x102/0x140
[   15.540002]  ? kmalloc_big_oob_right+0x318/0x370
[   15.540577]  ? kmalloc_big_oob_right+0x318/0x370
[   15.541017]  __asan_report_store1_noabort+0x1b/0x30
[   15.541624]  kmalloc_big_oob_right+0x318/0x370
[   15.542010]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   15.542871]  ? __schedule+0xc51/0x27c0
[   15.543523]  ? __pfx_read_tsc+0x10/0x10
[   15.544092]  ? ktime_get_ts64+0x84/0x230
[   15.544734]  kunit_try_run_case+0x1b3/0x490
[   15.545305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.545864]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.546582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.546988]  ? __kthread_parkme+0x82/0x160
[   15.547694]  ? preempt_count_sub+0x50/0x80
[   15.548153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.548560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.549177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.550046]  kthread+0x257/0x310
[   15.550914]  ? __pfx_kthread+0x10/0x10
[   15.551461]  ret_from_fork+0x41/0x80
[   15.552060]  ? __pfx_kthread+0x10/0x10
[   15.552459]  ret_from_fork_asm+0x1a/0x30
[   15.552845]  </TASK>
[   15.553095] 
[   15.553276] Allocated by task 148:
[   15.553632]  kasan_save_stack+0x3d/0x60
[   15.554463]  kasan_save_track+0x18/0x40
[   15.554762]  kasan_save_alloc_info+0x3b/0x50
[   15.555130]  __kasan_kmalloc+0xb7/0xc0
[   15.555537]  __kmalloc_cache_noprof+0x162/0x350
[   15.556012]  kmalloc_big_oob_right+0xaa/0x370
[   15.556385]  kunit_try_run_case+0x1b3/0x490
[   15.556742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.557901]  kthread+0x257/0x310
[   15.558584]  ret_from_fork+0x41/0x80
[   15.558979]  ret_from_fork_asm+0x1a/0x30
[   15.559547] 
[   15.559745] The buggy address belongs to the object at ffff888102ae0000
[   15.559745]  which belongs to the cache kmalloc-8k of size 8192
[   15.560597] The buggy address is located 0 bytes to the right of
[   15.560597]  allocated 7936-byte region [ffff888102ae0000, ffff888102ae1f00)
[   15.561539] 
[   15.562439] The buggy address belongs to the physical page:
[   15.563046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae0
[   15.564083] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.564834] flags: 0x200000000000040(head|node=0|zone=2)
[   15.565720] page_type: f5(slab)
[   15.566129] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   15.567264] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   15.568023] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   15.569300] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   15.570143] head: 0200000000000003 ffffea00040ab801 ffffffffffffffff 0000000000000000
[   15.571133] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   15.572025] page dumped because: kasan: bad access detected
[   15.572956] 
[   15.573283] Memory state around the buggy address:
[   15.573731]  ffff888102ae1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.574526]  ffff888102ae1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.575092] >ffff888102ae1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.575569]                    ^
[   15.575978]  ffff888102ae1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.576606]  ffff888102ae2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.577307] ==================================================================

test log snippet boot parser 131

Home

[   15.583911] ==================================================================
[   15.584870] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2eb/0x340
[   15.585747] Write of size 1 at addr ffff88810235a00a by task kunit_try_catch/150
[   15.586838] 
[   15.587081] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.588291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.588919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.589963] Call Trace:
[   15.590482]  <TASK>
[   15.590732]  dump_stack_lvl+0x73/0xb0
[   15.591689]  print_report+0xd1/0x640
[   15.592332]  ? __virt_addr_valid+0x1db/0x2d0
[   15.593099]  ? kasan_addr_to_slab+0x11/0xa0
[   15.593748]  kasan_report+0x102/0x140
[   15.594286]  ? kmalloc_large_oob_right+0x2eb/0x340
[   15.595117]  ? kmalloc_large_oob_right+0x2eb/0x340
[   15.595789]  __asan_report_store1_noabort+0x1b/0x30
[   15.596227]  kmalloc_large_oob_right+0x2eb/0x340
[   15.596650]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   15.597716]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   15.598332]  kunit_try_run_case+0x1b3/0x490
[   15.598606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.599279]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.599969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.600833]  ? __kthread_parkme+0x82/0x160
[   15.601277]  ? preempt_count_sub+0x50/0x80
[   15.601952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.603253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.603923]  kthread+0x257/0x310
[   15.604252]  ? __pfx_kthread+0x10/0x10
[   15.604798]  ret_from_fork+0x41/0x80
[   15.605175]  ? __pfx_kthread+0x10/0x10
[   15.605750]  ret_from_fork_asm+0x1a/0x30
[   15.606196]  </TASK>
[   15.606472] 
[   15.607060] The buggy address belongs to the physical page:
[   15.607454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102358
[   15.608221] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.608825] flags: 0x200000000000040(head|node=0|zone=2)
[   15.609308] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.610074] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.610848] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.612063] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.612649] head: 0200000000000002 ffffea000408d601 ffffffffffffffff 0000000000000000
[   15.613302] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   15.614088] page dumped because: kasan: bad access detected
[   15.614552] 
[   15.614771] Memory state around the buggy address:
[   15.615182]  ffff888102359f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.615796]  ffff888102359f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.616260] >ffff88810235a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.617366]                       ^
[   15.617796]  ffff88810235a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.618396]  ffff88810235a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.619097] ==================================================================

test log snippet boot parser 132

Home

[   16.930792] ==================================================================
[   16.931582] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x170/0x330
[   16.932268] Read of size 64 at addr ffff888101482904 by task kunit_try_catch/186
[   16.933431] 
[   16.933755] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.934590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.935015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.935889] Call Trace:
[   16.936223]  <TASK>
[   16.937338]  dump_stack_lvl+0x73/0xb0
[   16.937848]  print_report+0xd1/0x640
[   16.938295]  ? __virt_addr_valid+0x1db/0x2d0
[   16.938684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.939190]  kasan_report+0x102/0x140
[   16.939586]  ? kmalloc_memmove_invalid_size+0x170/0x330
[   16.940229]  ? kmalloc_memmove_invalid_size+0x170/0x330
[   16.940897]  kasan_check_range+0x10c/0x1c0
[   16.941336]  __asan_memmove+0x27/0x70
[   16.941846]  kmalloc_memmove_invalid_size+0x170/0x330
[   16.942378]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   16.943374]  ? __schedule+0xc51/0x27c0
[   16.943937]  ? __pfx_read_tsc+0x10/0x10
[   16.944398]  ? ktime_get_ts64+0x84/0x230
[   16.944954]  kunit_try_run_case+0x1b3/0x490
[   16.945388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.945913]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.946350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.947385]  ? __kthread_parkme+0x82/0x160
[   16.948034]  ? preempt_count_sub+0x50/0x80
[   16.948669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.949116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.949857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.951208]  kthread+0x257/0x310
[   16.951666]  ? __pfx_kthread+0x10/0x10
[   16.952223]  ret_from_fork+0x41/0x80
[   16.952845]  ? __pfx_kthread+0x10/0x10
[   16.953018]  ret_from_fork_asm+0x1a/0x30
[   16.953186]  </TASK>
[   16.953738] 
[   16.954050] Allocated by task 186:
[   16.954886]  kasan_save_stack+0x3d/0x60
[   16.955861]  kasan_save_track+0x18/0x40
[   16.956393]  kasan_save_alloc_info+0x3b/0x50
[   16.957001]  __kasan_kmalloc+0xb7/0xc0
[   16.957565]  __kmalloc_cache_noprof+0x162/0x350
[   16.957970]  kmalloc_memmove_invalid_size+0xad/0x330
[   16.958572]  kunit_try_run_case+0x1b3/0x490
[   16.959003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.959558]  kthread+0x257/0x310
[   16.959889]  ret_from_fork+0x41/0x80
[   16.960872]  ret_from_fork_asm+0x1a/0x30
[   16.961340] 
[   16.961669] The buggy address belongs to the object at ffff888101482900
[   16.961669]  which belongs to the cache kmalloc-64 of size 64
[   16.962710] The buggy address is located 4 bytes inside of
[   16.962710]  allocated 64-byte region [ffff888101482900, ffff888101482940)
[   16.963719] 
[   16.963968] The buggy address belongs to the physical page:
[   16.964435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101482
[   16.965110] flags: 0x200000000000000(node=0|zone=2)
[   16.965511] page_type: f5(slab)
[   16.966425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.967146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   16.967888] page dumped because: kasan: bad access detected
[   16.968323] 
[   16.968674] Memory state around the buggy address:
[   16.969135]  ffff888101482800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.969853]  ffff888101482880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.970444] >ffff888101482900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.971366]                                            ^
[   16.971971]  ffff888101482980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.972510]  ffff888101482a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.973229] ==================================================================

test log snippet boot parser 133

Home

[   15.478869] ==================================================================
[   15.479646] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x36b/0x3d0
[   15.480245] Read of size 1 at addr ffff888102aa1000 by task kunit_try_catch/146
[   15.480968] 
[   15.481242] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.482564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.483003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.483824] Call Trace:
[   15.484118]  <TASK>
[   15.484581]  dump_stack_lvl+0x73/0xb0
[   15.484966]  print_report+0xd1/0x640
[   15.485407]  ? __virt_addr_valid+0x1db/0x2d0
[   15.485766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.486336]  kasan_report+0x102/0x140
[   15.486732]  ? kmalloc_node_oob_right+0x36b/0x3d0
[   15.487169]  ? kmalloc_node_oob_right+0x36b/0x3d0
[   15.487662]  __asan_report_load1_noabort+0x18/0x20
[   15.488826]  kmalloc_node_oob_right+0x36b/0x3d0
[   15.489269]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   15.489833]  ? __schedule+0xc51/0x27c0
[   15.490275]  ? __pfx_read_tsc+0x10/0x10
[   15.490830]  ? ktime_get_ts64+0x84/0x230
[   15.491174]  kunit_try_run_case+0x1b3/0x490
[   15.492057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492491]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.493076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.493694]  ? __kthread_parkme+0x82/0x160
[   15.494149]  ? preempt_count_sub+0x50/0x80
[   15.494792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.495185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.495796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.496330]  kthread+0x257/0x310
[   15.496703]  ? __pfx_kthread+0x10/0x10
[   15.497687]  ret_from_fork+0x41/0x80
[   15.498102]  ? __pfx_kthread+0x10/0x10
[   15.498738]  ret_from_fork_asm+0x1a/0x30
[   15.499143]  </TASK>
[   15.499573] 
[   15.499792] Allocated by task 146:
[   15.500126]  kasan_save_stack+0x3d/0x60
[   15.501053]  kasan_save_track+0x18/0x40
[   15.501602]  kasan_save_alloc_info+0x3b/0x50
[   15.501997]  __kasan_kmalloc+0xb7/0xc0
[   15.502408]  __kmalloc_cache_node_noprof+0x181/0x370
[   15.503040]  kmalloc_node_oob_right+0xac/0x3d0
[   15.503594]  kunit_try_run_case+0x1b3/0x490
[   15.504027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505000]  kthread+0x257/0x310
[   15.505287]  ret_from_fork+0x41/0x80
[   15.505727]  ret_from_fork_asm+0x1a/0x30
[   15.506100] 
[   15.506334] The buggy address belongs to the object at ffff888102aa0000
[   15.506334]  which belongs to the cache kmalloc-4k of size 4096
[   15.507185] The buggy address is located 0 bytes to the right of
[   15.507185]  allocated 4096-byte region [ffff888102aa0000, ffff888102aa1000)
[   15.508273] 
[   15.508909] The buggy address belongs to the physical page:
[   15.509646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   15.510759] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.511364] flags: 0x200000000000040(head|node=0|zone=2)
[   15.512117] page_type: f5(slab)
[   15.512903] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   15.513475] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   15.514233] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   15.515023] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   15.515910] head: 0200000000000003 ffffea00040aa801 ffffffffffffffff 0000000000000000
[   15.516893] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   15.517488] page dumped because: kasan: bad access detected
[   15.517982] 
[   15.518081] Memory state around the buggy address:
[   15.518331]  ffff888102aa0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.519015]  ffff888102aa0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.519843] >ffff888102aa1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.520316]                    ^
[   15.521174]  ffff888102aa1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522141]  ffff888102aa1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522905] ==================================================================

test log snippet boot parser 134

Home

[   16.520637] ==================================================================
[   16.521608] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x454/0x4a0
[   16.522101] Write of size 16 at addr ffff888101402f40 by task kunit_try_catch/170
[   16.522718] 
[   16.523105] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.523864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.524317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.525187] Call Trace:
[   16.525619]  <TASK>
[   16.525925]  dump_stack_lvl+0x73/0xb0
[   16.526412]  print_report+0xd1/0x640
[   16.526809]  ? __virt_addr_valid+0x1db/0x2d0
[   16.527246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.527795]  kasan_report+0x102/0x140
[   16.528146]  ? kmalloc_oob_16+0x454/0x4a0
[   16.528569]  ? kmalloc_oob_16+0x454/0x4a0
[   16.529806]  __asan_report_store16_noabort+0x1b/0x30
[   16.530315]  kmalloc_oob_16+0x454/0x4a0
[   16.530884]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   16.531404]  ? __schedule+0xc51/0x27c0
[   16.531959]  ? __pfx_read_tsc+0x10/0x10
[   16.532392]  ? ktime_get_ts64+0x84/0x230
[   16.532952]  kunit_try_run_case+0x1b3/0x490
[   16.533404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.534321]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.534880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.535373]  ? __kthread_parkme+0x82/0x160
[   16.535771]  ? preempt_count_sub+0x50/0x80
[   16.536510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.536933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.537449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.538234]  kthread+0x257/0x310
[   16.538864]  ? __pfx_kthread+0x10/0x10
[   16.539313]  ret_from_fork+0x41/0x80
[   16.539710]  ? __pfx_kthread+0x10/0x10
[   16.540074]  ret_from_fork_asm+0x1a/0x30
[   16.540476]  </TASK>
[   16.540723] 
[   16.541128] Allocated by task 170:
[   16.542302]  kasan_save_stack+0x3d/0x60
[   16.542859]  kasan_save_track+0x18/0x40
[   16.543367]  kasan_save_alloc_info+0x3b/0x50
[   16.543888]  __kasan_kmalloc+0xb7/0xc0
[   16.544338]  __kmalloc_cache_noprof+0x162/0x350
[   16.544995]  kmalloc_oob_16+0xa9/0x4a0
[   16.545627]  kunit_try_run_case+0x1b3/0x490
[   16.546158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.546637]  kthread+0x257/0x310
[   16.546959]  ret_from_fork+0x41/0x80
[   16.547350]  ret_from_fork_asm+0x1a/0x30
[   16.547698] 
[   16.548662] The buggy address belongs to the object at ffff888101402f40
[   16.548662]  which belongs to the cache kmalloc-16 of size 16
[   16.549822] The buggy address is located 0 bytes inside of
[   16.549822]  allocated 13-byte region [ffff888101402f40, ffff888101402f4d)
[   16.550991] 
[   16.551231] The buggy address belongs to the physical page:
[   16.551854] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   16.553101] flags: 0x200000000000000(node=0|zone=2)
[   16.553489] page_type: f5(slab)
[   16.553937] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.554561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   16.555352] page dumped because: kasan: bad access detected
[   16.555978] 
[   16.556146] Memory state around the buggy address:
[   16.556789]  ffff888101402e00: 00 01 fc fc fa fb fc fc 00 01 fc fc 00 01 fc fc
[   16.557568]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.558188] >ffff888101402f00: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   16.559180]                                               ^
[   16.560080]  ffff888101402f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.560797]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   16.561388] ==================================================================

test log snippet boot parser 135

Home

[   16.624665] ==================================================================
[   16.625421] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x160/0x320
[   16.626185] Write of size 128 at addr ffff888101ffbf00 by task kunit_try_catch/174
[   16.627258] 
[   16.627516] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.628402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.629388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.630090] Call Trace:
[   16.630799]  <TASK>
[   16.631100]  dump_stack_lvl+0x73/0xb0
[   16.631479]  print_report+0xd1/0x640
[   16.631968]  ? __virt_addr_valid+0x1db/0x2d0
[   16.632463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.633325]  kasan_report+0x102/0x140
[   16.634101]  ? kmalloc_oob_in_memset+0x160/0x320
[   16.634716]  ? kmalloc_oob_in_memset+0x160/0x320
[   16.635230]  kasan_check_range+0x10c/0x1c0
[   16.635644]  __asan_memset+0x27/0x50
[   16.635959]  kmalloc_oob_in_memset+0x160/0x320
[   16.636430]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   16.636922]  ? __schedule+0xc51/0x27c0
[   16.637216]  ? __pfx_read_tsc+0x10/0x10
[   16.637495]  ? ktime_get_ts64+0x84/0x230
[   16.637810]  kunit_try_run_case+0x1b3/0x490
[   16.638209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.639481]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.640013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.640745]  ? __kthread_parkme+0x82/0x160
[   16.641305]  ? preempt_count_sub+0x50/0x80
[   16.641880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.642201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.642568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.643039]  kthread+0x257/0x310
[   16.643330]  ? __pfx_kthread+0x10/0x10
[   16.643631]  ret_from_fork+0x41/0x80
[   16.644035]  ? __pfx_kthread+0x10/0x10
[   16.644431]  ret_from_fork_asm+0x1a/0x30
[   16.644988]  </TASK>
[   16.645210] 
[   16.645370] Allocated by task 174:
[   16.645615]  kasan_save_stack+0x3d/0x60
[   16.645926]  kasan_save_track+0x18/0x40
[   16.646218]  kasan_save_alloc_info+0x3b/0x50
[   16.647377]  __kasan_kmalloc+0xb7/0xc0
[   16.647856]  __kmalloc_cache_noprof+0x162/0x350
[   16.648274]  kmalloc_oob_in_memset+0xad/0x320
[   16.648917]  kunit_try_run_case+0x1b3/0x490
[   16.649479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.651169]  kthread+0x257/0x310
[   16.651463]  ret_from_fork+0x41/0x80
[   16.651757]  ret_from_fork_asm+0x1a/0x30
[   16.653114] 
[   16.653947] The buggy address belongs to the object at ffff888101ffbf00
[   16.653947]  which belongs to the cache kmalloc-128 of size 128
[   16.655984] The buggy address is located 0 bytes inside of
[   16.655984]  allocated 120-byte region [ffff888101ffbf00, ffff888101ffbf78)
[   16.657639] 
[   16.658127] The buggy address belongs to the physical page:
[   16.658965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ffb
[   16.659864] flags: 0x200000000000000(node=0|zone=2)
[   16.660447] page_type: f5(slab)
[   16.660865] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.661623] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.662341] page dumped because: kasan: bad access detected
[   16.662943] 
[   16.663137] Memory state around the buggy address:
[   16.664000]  ffff888101ffbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.664593]  ffff888101ffbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.665342] >ffff888101ffbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.666028]                                                                 ^
[   16.666832]  ffff888101ffbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.667403]  ffff888101ffc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.668401] ==================================================================

test log snippet boot parser 136

Home

[   15.428791] ==================================================================
[   15.429918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x363/0x3c0
[   15.430536] Read of size 1 at addr ffff888101402f1f by task kunit_try_catch/144
[   15.431155] 
[   15.431408] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.432162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.432809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.433863] Call Trace:
[   15.434179]  <TASK>
[   15.434634]  dump_stack_lvl+0x73/0xb0
[   15.435076]  print_report+0xd1/0x640
[   15.435661]  ? __virt_addr_valid+0x1db/0x2d0
[   15.436055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.436815]  kasan_report+0x102/0x140
[   15.437232]  ? kmalloc_oob_left+0x363/0x3c0
[   15.438013]  ? kmalloc_oob_left+0x363/0x3c0
[   15.438375]  __asan_report_load1_noabort+0x18/0x20
[   15.439008]  kmalloc_oob_left+0x363/0x3c0
[   15.439632]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   15.440072]  ? __schedule+0xc51/0x27c0
[   15.440546]  ? __pfx_read_tsc+0x10/0x10
[   15.440906]  ? ktime_get_ts64+0x84/0x230
[   15.441347]  kunit_try_run_case+0x1b3/0x490
[   15.441808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442266]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.442712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.443812]  ? __kthread_parkme+0x82/0x160
[   15.444269]  ? preempt_count_sub+0x50/0x80
[   15.444797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.445306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.446025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.447015]  kthread+0x257/0x310
[   15.447400]  ? __pfx_kthread+0x10/0x10
[   15.447895]  ret_from_fork+0x41/0x80
[   15.448323]  ? __pfx_kthread+0x10/0x10
[   15.448851]  ret_from_fork_asm+0x1a/0x30
[   15.449227]  </TASK>
[   15.449554] 
[   15.449769] Allocated by task 1:
[   15.450143]  kasan_save_stack+0x3d/0x60
[   15.450487]  kasan_save_track+0x18/0x40
[   15.450891]  kasan_save_alloc_info+0x3b/0x50
[   15.451330]  __kasan_kmalloc+0xb7/0xc0
[   15.451698]  __kmalloc_node_track_caller_noprof+0x1e8/0x450
[   15.452715]  kvasprintf+0xc6/0x150
[   15.453129]  __kthread_create_on_node+0x18c/0x3a0
[   15.453745]  kthread_create_on_node+0xa8/0xe0
[   15.454102]  create_worker+0x3c8/0x7a0
[   15.454701]  alloc_unbound_pwq+0x8ea/0xdb0
[   15.455153]  apply_wqattrs_prepare+0x332/0xd40
[   15.456067]  apply_workqueue_attrs_locked+0x4d/0xa0
[   15.456711]  alloc_workqueue+0xcc4/0x1ad0
[   15.457146]  latency_fsnotify_init+0x1b/0x50
[   15.457707]  do_one_initcall+0xb5/0x370
[   15.458095]  kernel_init_freeable+0x425/0x6f0
[   15.458717]  kernel_init+0x23/0x1e0
[   15.459046]  ret_from_fork+0x41/0x80
[   15.459864]  ret_from_fork_asm+0x1a/0x30
[   15.460289] 
[   15.460515] The buggy address belongs to the object at ffff888101402f00
[   15.460515]  which belongs to the cache kmalloc-16 of size 16
[   15.461568] The buggy address is located 18 bytes to the right of
[   15.461568]  allocated 13-byte region [ffff888101402f00, ffff888101402f0d)
[   15.462477] 
[   15.462699] The buggy address belongs to the physical page:
[   15.463301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   15.464436] flags: 0x200000000000000(node=0|zone=2)
[   15.464968] page_type: f5(slab)
[   15.465382] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.466049] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   15.466873] page dumped because: kasan: bad access detected
[   15.467360] 
[   15.467558] Memory state around the buggy address:
[   15.467936]  ffff888101402e00: 00 01 fc fc fa fb fc fc 00 01 fc fc 00 01 fc fc
[   15.468526]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.469626] >ffff888101402f00: 00 05 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   15.470125]                             ^
[   15.470653]  ffff888101402f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.471313]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   15.472022] ==================================================================

test log snippet boot parser 137

Home

[   16.835099] ==================================================================
[   16.836428] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   16.837545] Write of size 16 at addr ffff888101483b69 by task kunit_try_catch/182
[   16.838213] 
[   16.838386] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.839615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.840526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.841096] Call Trace:
[   16.841260]  <TASK>
[   16.841751]  dump_stack_lvl+0x73/0xb0
[   16.842566]  print_report+0xd1/0x640
[   16.842992]  ? __virt_addr_valid+0x1db/0x2d0
[   16.843548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.844379]  kasan_report+0x102/0x140
[   16.844997]  ? kmalloc_oob_memset_16+0x167/0x330
[   16.845503]  ? kmalloc_oob_memset_16+0x167/0x330
[   16.846277]  kasan_check_range+0x10c/0x1c0
[   16.846693]  __asan_memset+0x27/0x50
[   16.847126]  kmalloc_oob_memset_16+0x167/0x330
[   16.847581]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   16.848255]  ? __schedule+0xc51/0x27c0
[   16.848857]  ? __pfx_read_tsc+0x10/0x10
[   16.849307]  ? ktime_get_ts64+0x84/0x230
[   16.849860]  kunit_try_run_case+0x1b3/0x490
[   16.850398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.851022]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.851705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.852186]  ? __kthread_parkme+0x82/0x160
[   16.852835]  ? preempt_count_sub+0x50/0x80
[   16.853338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.853943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.854669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.855162]  kthread+0x257/0x310
[   16.855616]  ? __pfx_kthread+0x10/0x10
[   16.856386]  ret_from_fork+0x41/0x80
[   16.856945]  ? __pfx_kthread+0x10/0x10
[   16.857381]  ret_from_fork_asm+0x1a/0x30
[   16.858008]  </TASK>
[   16.858276] 
[   16.858696] Allocated by task 182:
[   16.859071]  kasan_save_stack+0x3d/0x60
[   16.859684]  kasan_save_track+0x18/0x40
[   16.860096]  kasan_save_alloc_info+0x3b/0x50
[   16.860829]  __kasan_kmalloc+0xb7/0xc0
[   16.861181]  __kmalloc_cache_noprof+0x162/0x350
[   16.861850]  kmalloc_oob_memset_16+0xad/0x330
[   16.862342]  kunit_try_run_case+0x1b3/0x490
[   16.862920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.863580]  kthread+0x257/0x310
[   16.863987]  ret_from_fork+0x41/0x80
[   16.864505]  ret_from_fork_asm+0x1a/0x30
[   16.864901] 
[   16.865120] The buggy address belongs to the object at ffff888101483b00
[   16.865120]  which belongs to the cache kmalloc-128 of size 128
[   16.866228] The buggy address is located 105 bytes inside of
[   16.866228]  allocated 120-byte region [ffff888101483b00, ffff888101483b78)
[   16.867443] 
[   16.867883] The buggy address belongs to the physical page:
[   16.868391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101483
[   16.869074] flags: 0x200000000000000(node=0|zone=2)
[   16.869707] page_type: f5(slab)
[   16.870067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.870920] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.871815] page dumped because: kasan: bad access detected
[   16.872285] 
[   16.872559] Memory state around the buggy address:
[   16.873167]  ffff888101483a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.873928]  ffff888101483a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874730] >ffff888101483b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.875334]                                                                 ^
[   16.876075]  ffff888101483b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876700]  ffff888101483c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.877577] ==================================================================

test log snippet boot parser 138

Home

[   16.730421] ==================================================================
[   16.731675] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330
[   16.732408] Write of size 4 at addr ffff888101fff275 by task kunit_try_catch/178
[   16.733688] 
[   16.733893] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.735118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.735601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.736633] Call Trace:
[   16.736884]  <TASK>
[   16.737177]  dump_stack_lvl+0x73/0xb0
[   16.737954]  print_report+0xd1/0x640
[   16.739060]  ? __virt_addr_valid+0x1db/0x2d0
[   16.739745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.740229]  kasan_report+0x102/0x140
[   16.740564]  ? kmalloc_oob_memset_4+0x167/0x330
[   16.741038]  ? kmalloc_oob_memset_4+0x167/0x330
[   16.741491]  kasan_check_range+0x10c/0x1c0
[   16.742048]  __asan_memset+0x27/0x50
[   16.742427]  kmalloc_oob_memset_4+0x167/0x330
[   16.742989]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   16.743591]  ? __schedule+0xc51/0x27c0
[   16.744015]  ? __pfx_read_tsc+0x10/0x10
[   16.744502]  ? ktime_get_ts64+0x84/0x230
[   16.745644]  kunit_try_run_case+0x1b3/0x490
[   16.746431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.746959]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.747737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.748235]  ? __kthread_parkme+0x82/0x160
[   16.748766]  ? preempt_count_sub+0x50/0x80
[   16.749746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.750049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.750698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.751699]  kthread+0x257/0x310
[   16.752250]  ? __pfx_kthread+0x10/0x10
[   16.753134]  ret_from_fork+0x41/0x80
[   16.753631]  ? __pfx_kthread+0x10/0x10
[   16.753996]  ret_from_fork_asm+0x1a/0x30
[   16.754893]  </TASK>
[   16.755154] 
[   16.755630] Allocated by task 178:
[   16.755935]  kasan_save_stack+0x3d/0x60
[   16.756739]  kasan_save_track+0x18/0x40
[   16.757836]  kasan_save_alloc_info+0x3b/0x50
[   16.758630]  __kasan_kmalloc+0xb7/0xc0
[   16.759027]  __kmalloc_cache_noprof+0x162/0x350
[   16.759624]  kmalloc_oob_memset_4+0xad/0x330
[   16.760102]  kunit_try_run_case+0x1b3/0x490
[   16.760479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.761501]  kthread+0x257/0x310
[   16.762107]  ret_from_fork+0x41/0x80
[   16.762846]  ret_from_fork_asm+0x1a/0x30
[   16.763201] 
[   16.763422] The buggy address belongs to the object at ffff888101fff200
[   16.763422]  which belongs to the cache kmalloc-128 of size 128
[   16.765013] The buggy address is located 117 bytes inside of
[   16.765013]  allocated 120-byte region [ffff888101fff200, ffff888101fff278)
[   16.766576] 
[   16.766894] The buggy address belongs to the physical page:
[   16.768232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   16.768863] flags: 0x200000000000000(node=0|zone=2)
[   16.769485] page_type: f5(slab)
[   16.770050] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.770934] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.772235] page dumped because: kasan: bad access detected
[   16.772598] 
[   16.772847] Memory state around the buggy address:
[   16.773853]  ffff888101fff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   16.774693]  ffff888101fff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775249] >ffff888101fff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.776360]                                                                 ^
[   16.777352]  ffff888101fff280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.778254]  ffff888101fff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.779177] ==================================================================

test log snippet boot parser 139

Home

[   16.673921] ==================================================================
[   16.674637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   16.676430] Write of size 2 at addr ffff888101483777 by task kunit_try_catch/176
[   16.677984] 
[   16.678223] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.679179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.680409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.681258] Call Trace:
[   16.681534]  <TASK>
[   16.682592]  dump_stack_lvl+0x73/0xb0
[   16.682933]  print_report+0xd1/0x640
[   16.683237]  ? __virt_addr_valid+0x1db/0x2d0
[   16.683548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.683938]  kasan_report+0x102/0x140
[   16.684227]  ? kmalloc_oob_memset_2+0x167/0x330
[   16.684842]  ? kmalloc_oob_memset_2+0x167/0x330
[   16.686168]  kasan_check_range+0x10c/0x1c0
[   16.687583]  __asan_memset+0x27/0x50
[   16.688581]  kmalloc_oob_memset_2+0x167/0x330
[   16.689180]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   16.689631]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   16.690106]  kunit_try_run_case+0x1b3/0x490
[   16.690501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.691831]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.692682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.693709]  ? __kthread_parkme+0x82/0x160
[   16.694619]  ? preempt_count_sub+0x50/0x80
[   16.695218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.695759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.696325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.697248]  kthread+0x257/0x310
[   16.698118]  ? __pfx_kthread+0x10/0x10
[   16.698841]  ret_from_fork+0x41/0x80
[   16.699152]  ? __pfx_kthread+0x10/0x10
[   16.699731]  ret_from_fork_asm+0x1a/0x30
[   16.700747]  </TASK>
[   16.701112] 
[   16.701521] Allocated by task 176:
[   16.702173]  kasan_save_stack+0x3d/0x60
[   16.703275]  kasan_save_track+0x18/0x40
[   16.703550]  kasan_save_alloc_info+0x3b/0x50
[   16.704007]  __kasan_kmalloc+0xb7/0xc0
[   16.705129]  __kmalloc_cache_noprof+0x162/0x350
[   16.705494]  kmalloc_oob_memset_2+0xad/0x330
[   16.706182]  kunit_try_run_case+0x1b3/0x490
[   16.706921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.707701]  kthread+0x257/0x310
[   16.708854]  ret_from_fork+0x41/0x80
[   16.709269]  ret_from_fork_asm+0x1a/0x30
[   16.709979] 
[   16.710360] The buggy address belongs to the object at ffff888101483700
[   16.710360]  which belongs to the cache kmalloc-128 of size 128
[   16.711905] The buggy address is located 119 bytes inside of
[   16.711905]  allocated 120-byte region [ffff888101483700, ffff888101483778)
[   16.713166] 
[   16.713423] The buggy address belongs to the physical page:
[   16.714387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101483
[   16.715340] flags: 0x200000000000000(node=0|zone=2)
[   16.716499] page_type: f5(slab)
[   16.717032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.717911] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.718767] page dumped because: kasan: bad access detected
[   16.719564] 
[   16.719841] Memory state around the buggy address:
[   16.720547]  ffff888101483600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   16.721045]  ffff888101483680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.721639] >ffff888101483700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.722253]                                                                 ^
[   16.722915]  ffff888101483780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.723768]  ffff888101483800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.724793] ==================================================================

test log snippet boot parser 140

Home

[   16.785089] ==================================================================
[   16.786550] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330
[   16.787334] Write of size 8 at addr ffff888101483a71 by task kunit_try_catch/180
[   16.788632] 
[   16.789100] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.790222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.791006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.791908] Call Trace:
[   16.792210]  <TASK>
[   16.792887]  dump_stack_lvl+0x73/0xb0
[   16.793223]  print_report+0xd1/0x640
[   16.793645]  ? __virt_addr_valid+0x1db/0x2d0
[   16.794088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.794681]  kasan_report+0x102/0x140
[   16.795299]  ? kmalloc_oob_memset_8+0x167/0x330
[   16.795960]  ? kmalloc_oob_memset_8+0x167/0x330
[   16.797009]  kasan_check_range+0x10c/0x1c0
[   16.797474]  __asan_memset+0x27/0x50
[   16.797830]  kmalloc_oob_memset_8+0x167/0x330
[   16.798279]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   16.798707]  ? __schedule+0xc51/0x27c0
[   16.799157]  ? __pfx_read_tsc+0x10/0x10
[   16.799755]  ? ktime_get_ts64+0x84/0x230
[   16.800143]  kunit_try_run_case+0x1b3/0x490
[   16.800689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.801105]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.801844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.802352]  ? __kthread_parkme+0x82/0x160
[   16.802859]  ? preempt_count_sub+0x50/0x80
[   16.803361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.803742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.804362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.805043]  kthread+0x257/0x310
[   16.805428]  ? __pfx_kthread+0x10/0x10
[   16.805927]  ret_from_fork+0x41/0x80
[   16.807244]  ? __pfx_kthread+0x10/0x10
[   16.808035]  ret_from_fork_asm+0x1a/0x30
[   16.809188]  </TASK>
[   16.809415] 
[   16.809763] Allocated by task 180:
[   16.810223]  kasan_save_stack+0x3d/0x60
[   16.810898]  kasan_save_track+0x18/0x40
[   16.811610]  kasan_save_alloc_info+0x3b/0x50
[   16.812244]  __kasan_kmalloc+0xb7/0xc0
[   16.812508]  __kmalloc_cache_noprof+0x162/0x350
[   16.813368]  kmalloc_oob_memset_8+0xad/0x330
[   16.814322]  kunit_try_run_case+0x1b3/0x490
[   16.814975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.815607]  kthread+0x257/0x310
[   16.816319]  ret_from_fork+0x41/0x80
[   16.817042]  ret_from_fork_asm+0x1a/0x30
[   16.817394] 
[   16.817623] The buggy address belongs to the object at ffff888101483a00
[   16.817623]  which belongs to the cache kmalloc-128 of size 128
[   16.818447] The buggy address is located 113 bytes inside of
[   16.818447]  allocated 120-byte region [ffff888101483a00, ffff888101483a78)
[   16.820062] 
[   16.820286] The buggy address belongs to the physical page:
[   16.820924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101483
[   16.821499] flags: 0x200000000000000(node=0|zone=2)
[   16.821941] page_type: f5(slab)
[   16.822399] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.823144] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.823615] page dumped because: kasan: bad access detected
[   16.824142] 
[   16.824391] Memory state around the buggy address:
[   16.824726]  ffff888101483900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   16.825954]  ffff888101483980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.826697] >ffff888101483a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.827216]                                                                 ^
[   16.827657]  ffff888101483a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.828556]  ffff888101483b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.829116] ==================================================================

test log snippet boot parser 141

Home

[   15.387056] ==================================================================
[   15.387964] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   15.388631] Read of size 1 at addr ffff888101ff3c80 by task kunit_try_catch/142
[   15.389282] 
[   15.389501] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.390342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.390659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.391427] Call Trace:
[   15.391739]  <TASK>
[   15.392053]  dump_stack_lvl+0x73/0xb0
[   15.392463]  print_report+0xd1/0x640
[   15.392864]  ? __virt_addr_valid+0x1db/0x2d0
[   15.393270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.393805]  kasan_report+0x102/0x140
[   15.394229]  ? kmalloc_oob_right+0x68c/0x7f0
[   15.394609]  ? kmalloc_oob_right+0x68c/0x7f0
[   15.395095]  __asan_report_load1_noabort+0x18/0x20
[   15.395652]  kmalloc_oob_right+0x68c/0x7f0
[   15.396038]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   15.396576]  ? __schedule+0xc51/0x27c0
[   15.396998]  ? __pfx_read_tsc+0x10/0x10
[   15.397463]  ? ktime_get_ts64+0x84/0x230
[   15.397825]  kunit_try_run_case+0x1b3/0x490
[   15.398325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.398765]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.399247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.399618]  ? __kthread_parkme+0x82/0x160
[   15.400062]  ? preempt_count_sub+0x50/0x80
[   15.400560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.401555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.402072]  kthread+0x257/0x310
[   15.402484]  ? __pfx_kthread+0x10/0x10
[   15.402915]  ret_from_fork+0x41/0x80
[   15.403361]  ? __pfx_kthread+0x10/0x10
[   15.403680]  ret_from_fork_asm+0x1a/0x30
[   15.404042]  </TASK>
[   15.404367] 
[   15.404576] Allocated by task 142:
[   15.404963]  kasan_save_stack+0x3d/0x60
[   15.405426]  kasan_save_track+0x18/0x40
[   15.405832]  kasan_save_alloc_info+0x3b/0x50
[   15.406270]  __kasan_kmalloc+0xb7/0xc0
[   15.406625]  __kmalloc_cache_noprof+0x162/0x350
[   15.407025]  kmalloc_oob_right+0xaa/0x7f0
[   15.407390]  kunit_try_run_case+0x1b3/0x490
[   15.407823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.408369]  kthread+0x257/0x310
[   15.408729]  ret_from_fork+0x41/0x80
[   15.409146]  ret_from_fork_asm+0x1a/0x30
[   15.409617] 
[   15.409830] The buggy address belongs to the object at ffff888101ff3c00
[   15.409830]  which belongs to the cache kmalloc-128 of size 128
[   15.410718] The buggy address is located 13 bytes to the right of
[   15.410718]  allocated 115-byte region [ffff888101ff3c00, ffff888101ff3c73)
[   15.411714] 
[   15.411961] The buggy address belongs to the physical page:
[   15.412444] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ff3
[   15.413553] flags: 0x200000000000000(node=0|zone=2)
[   15.413958] page_type: f5(slab)
[   15.414293] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.414815] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.415302] page dumped because: kasan: bad access detected
[   15.415829] 
[   15.416050] Memory state around the buggy address:
[   15.416548]  ffff888101ff3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.417138]  ffff888101ff3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.417627] >ffff888101ff3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418271]                    ^
[   15.418607]  ffff888101ff3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.419276]  ffff888101ff3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.419795] ==================================================================

test log snippet boot parser 142

Home

[   15.305494] ==================================================================
[   15.306821] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   15.307898] Write of size 1 at addr ffff888101ff3c73 by task kunit_try_catch/142
[   15.308660] 
[   15.310238] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   15.311172] Tainted: [N]=TEST
[   15.311563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.312764] Call Trace:
[   15.313177]  <TASK>
[   15.313732]  dump_stack_lvl+0x73/0xb0
[   15.314277]  print_report+0xd1/0x640
[   15.314671]  ? __virt_addr_valid+0x1db/0x2d0
[   15.315107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.315594]  kasan_report+0x102/0x140
[   15.316009]  ? kmalloc_oob_right+0x6f2/0x7f0
[   15.316497]  ? kmalloc_oob_right+0x6f2/0x7f0
[   15.316926]  __asan_report_store1_noabort+0x1b/0x30
[   15.317410]  kmalloc_oob_right+0x6f2/0x7f0
[   15.317802]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   15.318338]  ? __schedule+0xc51/0x27c0
[   15.318663]  ? __pfx_read_tsc+0x10/0x10
[   15.319110]  ? ktime_get_ts64+0x84/0x230
[   15.319505]  kunit_try_run_case+0x1b3/0x490
[   15.319983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320438]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.320934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.321431]  ? __kthread_parkme+0x82/0x160
[   15.321818]  ? preempt_count_sub+0x50/0x80
[   15.322315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.322765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.323276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.323795]  kthread+0x257/0x310
[   15.324146]  ? __pfx_kthread+0x10/0x10
[   15.324565]  ret_from_fork+0x41/0x80
[   15.324971]  ? __pfx_kthread+0x10/0x10
[   15.325397]  ret_from_fork_asm+0x1a/0x30
[   15.325949]  </TASK>
[   15.326411] 
[   15.326701] Allocated by task 142:
[   15.327330]  kasan_save_stack+0x3d/0x60
[   15.327763]  kasan_save_track+0x18/0x40
[   15.328136]  kasan_save_alloc_info+0x3b/0x50
[   15.328611]  __kasan_kmalloc+0xb7/0xc0
[   15.329025]  __kmalloc_cache_noprof+0x162/0x350
[   15.329444]  kmalloc_oob_right+0xaa/0x7f0
[   15.329849]  kunit_try_run_case+0x1b3/0x490
[   15.330348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.330802]  kthread+0x257/0x310
[   15.331169]  ret_from_fork+0x41/0x80
[   15.331574]  ret_from_fork_asm+0x1a/0x30
[   15.331974] 
[   15.332350] The buggy address belongs to the object at ffff888101ff3c00
[   15.332350]  which belongs to the cache kmalloc-128 of size 128
[   15.333573] The buggy address is located 0 bytes to the right of
[   15.333573]  allocated 115-byte region [ffff888101ff3c00, ffff888101ff3c73)
[   15.334446] 
[   15.334805] The buggy address belongs to the physical page:
[   15.335753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ff3
[   15.336917] flags: 0x200000000000000(node=0|zone=2)
[   15.338312] page_type: f5(slab)
[   15.339346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.339934] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.340632] page dumped because: kasan: bad access detected
[   15.341106] 
[   15.341335] Memory state around the buggy address:
[   15.342349]  ffff888101ff3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.342952]  ffff888101ff3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343664] >ffff888101ff3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.344225]                                                              ^
[   15.344892]  ffff888101ff3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.345497]  ffff888101ff3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.346140] ==================================================================

test log snippet boot parser 143

Home

[   15.348358] ==================================================================
[   15.349022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   15.350830] Write of size 1 at addr ffff888101ff3c78 by task kunit_try_catch/142
[   15.351655] 
[   15.351928] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.352883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.353546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.354090] Call Trace:
[   15.354374]  <TASK>
[   15.354755]  dump_stack_lvl+0x73/0xb0
[   15.355441]  print_report+0xd1/0x640
[   15.355952]  ? __virt_addr_valid+0x1db/0x2d0
[   15.356376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.357247]  kasan_report+0x102/0x140
[   15.357672]  ? kmalloc_oob_right+0x6bf/0x7f0
[   15.358570]  ? kmalloc_oob_right+0x6bf/0x7f0
[   15.359035]  __asan_report_store1_noabort+0x1b/0x30
[   15.359702]  kmalloc_oob_right+0x6bf/0x7f0
[   15.360164]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   15.360915]  ? __schedule+0xc51/0x27c0
[   15.361241]  ? __pfx_read_tsc+0x10/0x10
[   15.361536]  ? ktime_get_ts64+0x84/0x230
[   15.361868]  kunit_try_run_case+0x1b3/0x490
[   15.362206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362574]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.363678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.364055]  ? __kthread_parkme+0x82/0x160
[   15.364606]  ? preempt_count_sub+0x50/0x80
[   15.365353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.365763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.366468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366863]  kthread+0x257/0x310
[   15.367274]  ? __pfx_kthread+0x10/0x10
[   15.367671]  ret_from_fork+0x41/0x80
[   15.368051]  ? __pfx_kthread+0x10/0x10
[   15.368459]  ret_from_fork_asm+0x1a/0x30
[   15.368871]  </TASK>
[   15.369148] 
[   15.369374] Allocated by task 142:
[   15.369697]  kasan_save_stack+0x3d/0x60
[   15.370143]  kasan_save_track+0x18/0x40
[   15.370606]  kasan_save_alloc_info+0x3b/0x50
[   15.371017]  __kasan_kmalloc+0xb7/0xc0
[   15.371462]  __kmalloc_cache_noprof+0x162/0x350
[   15.371834]  kmalloc_oob_right+0xaa/0x7f0
[   15.372298]  kunit_try_run_case+0x1b3/0x490
[   15.372737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.373251]  kthread+0x257/0x310
[   15.373597]  ret_from_fork+0x41/0x80
[   15.374013]  ret_from_fork_asm+0x1a/0x30
[   15.374427] 
[   15.374600] The buggy address belongs to the object at ffff888101ff3c00
[   15.374600]  which belongs to the cache kmalloc-128 of size 128
[   15.375638] The buggy address is located 5 bytes to the right of
[   15.375638]  allocated 115-byte region [ffff888101ff3c00, ffff888101ff3c73)
[   15.376436] 
[   15.376657] The buggy address belongs to the physical page:
[   15.377168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ff3
[   15.377868] flags: 0x200000000000000(node=0|zone=2)
[   15.378392] page_type: f5(slab)
[   15.378724] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.379386] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.379951] page dumped because: kasan: bad access detected
[   15.380491] 
[   15.380682] Memory state around the buggy address:
[   15.381093]  ffff888101ff3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.381647]  ffff888101ff3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.382306] >ffff888101ff3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.382838]                                                                 ^
[   15.383383]  ffff888101ff3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.383955]  ffff888101ff3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.384547] ==================================================================

test log snippet boot parser 144

Home

[   17.697043] ==================================================================
[   17.698219] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x404/0x530
[   17.699121] Read of size 1 at addr ffff8881020060c8 by task kunit_try_catch/211
[   17.700046] 
[   17.700512] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.701686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.702041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.702898] Call Trace:
[   17.703327]  <TASK>
[   17.703956]  dump_stack_lvl+0x73/0xb0
[   17.704603]  print_report+0xd1/0x640
[   17.705025]  ? __virt_addr_valid+0x1db/0x2d0
[   17.705450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.706163]  kasan_report+0x102/0x140
[   17.706732]  ? kmem_cache_oob+0x404/0x530
[   17.707150]  ? kmem_cache_oob+0x404/0x530
[   17.707653]  __asan_report_load1_noabort+0x18/0x20
[   17.708094]  kmem_cache_oob+0x404/0x530
[   17.708530]  ? trace_hardirqs_on+0x37/0xe0
[   17.709001]  ? __pfx_kmem_cache_oob+0x10/0x10
[   17.709944]  ? finish_task_switch.isra.0+0x153/0x700
[   17.710604]  ? __switch_to+0x5d9/0xf60
[   17.711066]  ? __pfx_read_tsc+0x10/0x10
[   17.711671]  ? ktime_get_ts64+0x84/0x230
[   17.712154]  kunit_try_run_case+0x1b3/0x490
[   17.712723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.713156]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.713655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.714297]  ? __kthread_parkme+0x82/0x160
[   17.714818]  ? preempt_count_sub+0x50/0x80
[   17.715245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.715988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.716731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.717278]  kthread+0x257/0x310
[   17.717837]  ? __pfx_kthread+0x10/0x10
[   17.718213]  ret_from_fork+0x41/0x80
[   17.718878]  ? __pfx_kthread+0x10/0x10
[   17.719252]  ret_from_fork_asm+0x1a/0x30
[   17.719999]  </TASK>
[   17.720331] 
[   17.720688] Allocated by task 211:
[   17.721085]  kasan_save_stack+0x3d/0x60
[   17.721717]  kasan_save_track+0x18/0x40
[   17.722191]  kasan_save_alloc_info+0x3b/0x50
[   17.722820]  __kasan_slab_alloc+0x91/0xa0
[   17.723178]  kmem_cache_alloc_noprof+0x101/0x340
[   17.723948]  kmem_cache_oob+0x158/0x530
[   17.724355]  kunit_try_run_case+0x1b3/0x490
[   17.724956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.725622]  kthread+0x257/0x310
[   17.726050]  ret_from_fork+0x41/0x80
[   17.726640]  ret_from_fork_asm+0x1a/0x30
[   17.727012] 
[   17.727286] The buggy address belongs to the object at ffff888102006000
[   17.727286]  which belongs to the cache test_cache of size 200
[   17.728590] The buggy address is located 0 bytes to the right of
[   17.728590]  allocated 200-byte region [ffff888102006000, ffff8881020060c8)
[   17.729543] 
[   17.729793] The buggy address belongs to the physical page:
[   17.730242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102006
[   17.731027] flags: 0x200000000000000(node=0|zone=2)
[   17.731736] page_type: f5(slab)
[   17.732174] raw: 0200000000000000 ffff8881015d1640 dead000000000122 0000000000000000
[   17.732916] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   17.733718] page dumped because: kasan: bad access detected
[   17.734281] 
[   17.734488] Memory state around the buggy address:
[   17.735102]  ffff888102005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.735895]  ffff888102006000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.736588] >ffff888102006080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.737260]                                               ^
[   17.737923]  ffff888102006100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.738642]  ffff888102006180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.739162] ==================================================================

test log snippet boot parser 145

Home

[   15.912835] ==================================================================
[   15.913822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   15.914706] Write of size 1 at addr ffff88810039b6d0 by task kunit_try_catch/162
[   15.915337] 
[   15.915627] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.916454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.916875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.917624] Call Trace:
[   15.918076]  <TASK>
[   15.918412]  dump_stack_lvl+0x73/0xb0
[   15.919097]  print_report+0xd1/0x640
[   15.919923]  ? __virt_addr_valid+0x1db/0x2d0
[   15.920481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.921110]  kasan_report+0x102/0x140
[   15.921673]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   15.922169]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   15.922930]  __asan_report_store1_noabort+0x1b/0x30
[   15.923403]  krealloc_less_oob_helper+0xe25/0x11d0
[   15.923954]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   15.925003]  ? finish_task_switch.isra.0+0x153/0x700
[   15.925666]  ? __switch_to+0x5d9/0xf60
[   15.926173]  ? __schedule+0xc51/0x27c0
[   15.926571]  ? __pfx_read_tsc+0x10/0x10
[   15.927112]  krealloc_less_oob+0x1c/0x30
[   15.927585]  kunit_try_run_case+0x1b3/0x490
[   15.928139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.928725]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.929177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.929752]  ? __kthread_parkme+0x82/0x160
[   15.930242]  ? preempt_count_sub+0x50/0x80
[   15.930885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.931640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.932842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.933283]  kthread+0x257/0x310
[   15.933678]  ? __pfx_kthread+0x10/0x10
[   15.934091]  ret_from_fork+0x41/0x80
[   15.934765]  ? __pfx_kthread+0x10/0x10
[   15.935151]  ret_from_fork_asm+0x1a/0x30
[   15.935628]  </TASK>
[   15.935874] 
[   15.936130] Allocated by task 162:
[   15.936908]  kasan_save_stack+0x3d/0x60
[   15.937244]  kasan_save_track+0x18/0x40
[   15.938254]  kasan_save_alloc_info+0x3b/0x50
[   15.938646]  __kasan_krealloc+0x190/0x1f0
[   15.939386]  krealloc_noprof+0xc1/0x140
[   15.939968]  krealloc_less_oob_helper+0x1ab/0x11d0
[   15.940395]  krealloc_less_oob+0x1c/0x30
[   15.940975]  kunit_try_run_case+0x1b3/0x490
[   15.941408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.942437]  kthread+0x257/0x310
[   15.942834]  ret_from_fork+0x41/0x80
[   15.943184]  ret_from_fork_asm+0x1a/0x30
[   15.943791] 
[   15.944064] The buggy address belongs to the object at ffff88810039b600
[   15.944064]  which belongs to the cache kmalloc-256 of size 256
[   15.945131] The buggy address is located 7 bytes to the right of
[   15.945131]  allocated 201-byte region [ffff88810039b600, ffff88810039b6c9)
[   15.946144] 
[   15.946368] The buggy address belongs to the physical page:
[   15.946975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   15.947871] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.948823] flags: 0x200000000000040(head|node=0|zone=2)
[   15.949221] page_type: f5(slab)
[   15.949684] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.950392] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.951125] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.951859] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.952533] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   15.953353] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   15.954300] page dumped because: kasan: bad access detected
[   15.955017] 
[   15.955292] Memory state around the buggy address:
[   15.955805]  ffff88810039b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.956457]  ffff88810039b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.957147] >ffff88810039b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.957815]                                                  ^
[   15.958570]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.959608]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960171] ==================================================================

test log snippet boot parser 146

Home

[   15.961565] ==================================================================
[   15.962742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   15.963512] Write of size 1 at addr ffff88810039b6da by task kunit_try_catch/162
[   15.964115] 
[   15.964471] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.965388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.965734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.966967] Call Trace:
[   15.967581]  <TASK>
[   15.967918]  dump_stack_lvl+0x73/0xb0
[   15.968418]  print_report+0xd1/0x640
[   15.968842]  ? __virt_addr_valid+0x1db/0x2d0
[   15.969487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.970603]  kasan_report+0x102/0x140
[   15.971058]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   15.972009]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   15.972880]  __asan_report_store1_noabort+0x1b/0x30
[   15.973730]  krealloc_less_oob_helper+0xec8/0x11d0
[   15.974438]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   15.975027]  ? finish_task_switch.isra.0+0x153/0x700
[   15.975807]  ? __switch_to+0x5d9/0xf60
[   15.976166]  ? __schedule+0xc51/0x27c0
[   15.976826]  ? __pfx_read_tsc+0x10/0x10
[   15.977360]  krealloc_less_oob+0x1c/0x30
[   15.977931]  kunit_try_run_case+0x1b3/0x490
[   15.978411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.979559]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.980146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.981200]  ? __kthread_parkme+0x82/0x160
[   15.982012]  ? preempt_count_sub+0x50/0x80
[   15.982711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.983172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.983735]  kthread+0x257/0x310
[   15.985012]  ? __pfx_kthread+0x10/0x10
[   15.985440]  ret_from_fork+0x41/0x80
[   15.986180]  ? __pfx_kthread+0x10/0x10
[   15.986565]  ret_from_fork_asm+0x1a/0x30
[   15.987021]  </TASK>
[   15.987253] 
[   15.987475] Allocated by task 162:
[   15.988333]  kasan_save_stack+0x3d/0x60
[   15.989056]  kasan_save_track+0x18/0x40
[   15.989837]  kasan_save_alloc_info+0x3b/0x50
[   15.990269]  __kasan_krealloc+0x190/0x1f0
[   15.990973]  krealloc_noprof+0xc1/0x140
[   15.991498]  krealloc_less_oob_helper+0x1ab/0x11d0
[   15.992126]  krealloc_less_oob+0x1c/0x30
[   15.993042]  kunit_try_run_case+0x1b3/0x490
[   15.994023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.994447]  kthread+0x257/0x310
[   15.995093]  ret_from_fork+0x41/0x80
[   15.995767]  ret_from_fork_asm+0x1a/0x30
[   15.996139] 
[   15.996514] The buggy address belongs to the object at ffff88810039b600
[   15.996514]  which belongs to the cache kmalloc-256 of size 256
[   15.998356] The buggy address is located 17 bytes to the right of
[   15.998356]  allocated 201-byte region [ffff88810039b600, ffff88810039b6c9)
[   16.000081] 
[   16.000380] The buggy address belongs to the physical page:
[   16.001042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   16.002215] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.003228] flags: 0x200000000000040(head|node=0|zone=2)
[   16.003701] page_type: f5(slab)
[   16.004758] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.005646] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.006599] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.007228] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.008087] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   16.009023] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.009811] page dumped because: kasan: bad access detected
[   16.010253] 
[   16.010853] Memory state around the buggy address:
[   16.011351]  ffff88810039b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.011873]  ffff88810039b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.012895] >ffff88810039b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.013676]                                                     ^
[   16.014135]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.015497]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.016386] ==================================================================

test log snippet boot parser 147

Home

[   15.860346] ==================================================================
[   15.861219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   15.862036] Write of size 1 at addr ffff88810039b6c9 by task kunit_try_catch/162
[   15.862762] 
[   15.863073] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.863832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.864261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.865057] Call Trace:
[   15.865760]  <TASK>
[   15.866093]  dump_stack_lvl+0x73/0xb0
[   15.866433]  print_report+0xd1/0x640
[   15.867679]  ? __virt_addr_valid+0x1db/0x2d0
[   15.868111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.869089]  kasan_report+0x102/0x140
[   15.869505]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   15.870189]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   15.870964]  __asan_report_store1_noabort+0x1b/0x30
[   15.871442]  krealloc_less_oob_helper+0xd72/0x11d0
[   15.872147]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   15.873001]  ? finish_task_switch.isra.0+0x153/0x700
[   15.873462]  ? __switch_to+0x5d9/0xf60
[   15.873835]  ? __schedule+0xc51/0x27c0
[   15.874253]  ? __pfx_read_tsc+0x10/0x10
[   15.874671]  krealloc_less_oob+0x1c/0x30
[   15.875012]  kunit_try_run_case+0x1b3/0x490
[   15.875618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.876080]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.876474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.876983]  ? __kthread_parkme+0x82/0x160
[   15.877351]  ? preempt_count_sub+0x50/0x80
[   15.878756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.879250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.879992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.880532]  kthread+0x257/0x310
[   15.881012]  ? __pfx_kthread+0x10/0x10
[   15.882035]  ret_from_fork+0x41/0x80
[   15.882385]  ? __pfx_kthread+0x10/0x10
[   15.883232]  ret_from_fork_asm+0x1a/0x30
[   15.883958]  </TASK>
[   15.884224] 
[   15.884421] Allocated by task 162:
[   15.884811]  kasan_save_stack+0x3d/0x60
[   15.885614]  kasan_save_track+0x18/0x40
[   15.886083]  kasan_save_alloc_info+0x3b/0x50
[   15.887007]  __kasan_krealloc+0x190/0x1f0
[   15.887902]  krealloc_noprof+0xc1/0x140
[   15.888272]  krealloc_less_oob_helper+0x1ab/0x11d0
[   15.889942]  krealloc_less_oob+0x1c/0x30
[   15.890421]  kunit_try_run_case+0x1b3/0x490
[   15.891380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.892502]  kthread+0x257/0x310
[   15.892794]  ret_from_fork+0x41/0x80
[   15.893388]  ret_from_fork_asm+0x1a/0x30
[   15.894161] 
[   15.894477] The buggy address belongs to the object at ffff88810039b600
[   15.894477]  which belongs to the cache kmalloc-256 of size 256
[   15.895834] The buggy address is located 0 bytes to the right of
[   15.895834]  allocated 201-byte region [ffff88810039b600, ffff88810039b6c9)
[   15.896965] 
[   15.897163] The buggy address belongs to the physical page:
[   15.897681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   15.898336] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.899096] flags: 0x200000000000040(head|node=0|zone=2)
[   15.899831] page_type: f5(slab)
[   15.900166] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.900948] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.901805] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.902810] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.903913] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   15.904501] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   15.905299] page dumped because: kasan: bad access detected
[   15.905842] 
[   15.906050] Memory state around the buggy address:
[   15.906430]  ffff88810039b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.907013]  ffff88810039b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.908142] >ffff88810039b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.908691]                                               ^
[   15.909195]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909712]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.911003] ==================================================================

test log snippet boot parser 148

Home

[   16.017935] ==================================================================
[   16.019118] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   16.019941] Write of size 1 at addr ffff88810039b6ea by task kunit_try_catch/162
[   16.020643] 
[   16.021425] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.022083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.022457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.023130] Call Trace:
[   16.023427]  <TASK>
[   16.023721]  dump_stack_lvl+0x73/0xb0
[   16.024864]  print_report+0xd1/0x640
[   16.025423]  ? __virt_addr_valid+0x1db/0x2d0
[   16.025610]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.025886]  kasan_report+0x102/0x140
[   16.026867]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   16.027519]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   16.028177]  __asan_report_store1_noabort+0x1b/0x30
[   16.028608]  krealloc_less_oob_helper+0xe92/0x11d0
[   16.029077]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.029991]  ? finish_task_switch.isra.0+0x153/0x700
[   16.030491]  ? __switch_to+0x5d9/0xf60
[   16.030846]  ? __schedule+0xc51/0x27c0
[   16.031222]  ? __pfx_read_tsc+0x10/0x10
[   16.031591]  krealloc_less_oob+0x1c/0x30
[   16.032871]  kunit_try_run_case+0x1b3/0x490
[   16.033151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.033865]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.034312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.034826]  ? __kthread_parkme+0x82/0x160
[   16.035558]  ? preempt_count_sub+0x50/0x80
[   16.036285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.037416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.038119]  kthread+0x257/0x310
[   16.038735]  ? __pfx_kthread+0x10/0x10
[   16.039145]  ret_from_fork+0x41/0x80
[   16.039644]  ? __pfx_kthread+0x10/0x10
[   16.040068]  ret_from_fork_asm+0x1a/0x30
[   16.040906]  </TASK>
[   16.041118] 
[   16.041375] Allocated by task 162:
[   16.041743]  kasan_save_stack+0x3d/0x60
[   16.042185]  kasan_save_track+0x18/0x40
[   16.043138]  kasan_save_alloc_info+0x3b/0x50
[   16.043828]  __kasan_krealloc+0x190/0x1f0
[   16.044205]  krealloc_noprof+0xc1/0x140
[   16.044853]  krealloc_less_oob_helper+0x1ab/0x11d0
[   16.045499]  krealloc_less_oob+0x1c/0x30
[   16.045926]  kunit_try_run_case+0x1b3/0x490
[   16.046721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.047372]  kthread+0x257/0x310
[   16.047714]  ret_from_fork+0x41/0x80
[   16.048459]  ret_from_fork_asm+0x1a/0x30
[   16.048796] 
[   16.049122] The buggy address belongs to the object at ffff88810039b600
[   16.049122]  which belongs to the cache kmalloc-256 of size 256
[   16.050326] The buggy address is located 33 bytes to the right of
[   16.050326]  allocated 201-byte region [ffff88810039b600, ffff88810039b6c9)
[   16.051278] 
[   16.051573] The buggy address belongs to the physical page:
[   16.051996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   16.052967] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.053730] flags: 0x200000000000040(head|node=0|zone=2)
[   16.054504] page_type: f5(slab)
[   16.054889] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.055452] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.056030] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.057066] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.057758] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   16.058685] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.059217] page dumped because: kasan: bad access detected
[   16.059841] 
[   16.060013] Memory state around the buggy address:
[   16.060631]  ffff88810039b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.061499]  ffff88810039b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.062020] >ffff88810039b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.062991]                                                           ^
[   16.063533]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064111]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064588] ==================================================================

test log snippet boot parser 149

Home

[   16.066101] ==================================================================
[   16.066722] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   16.067438] Write of size 1 at addr ffff88810039b6eb by task kunit_try_catch/162
[   16.067957] 
[   16.068201] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.070036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.070474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.070990] Call Trace:
[   16.071222]  <TASK>
[   16.071482]  dump_stack_lvl+0x73/0xb0
[   16.071862]  print_report+0xd1/0x640
[   16.072272]  ? __virt_addr_valid+0x1db/0x2d0
[   16.072653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.074072]  kasan_report+0x102/0x140
[   16.075089]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   16.075584]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   16.075997]  __asan_report_store1_noabort+0x1b/0x30
[   16.076864]  krealloc_less_oob_helper+0xd49/0x11d0
[   16.077610]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.078107]  ? finish_task_switch.isra.0+0x153/0x700
[   16.078765]  ? __switch_to+0x5d9/0xf60
[   16.079133]  ? __schedule+0xc51/0x27c0
[   16.079610]  ? __pfx_read_tsc+0x10/0x10
[   16.080032]  krealloc_less_oob+0x1c/0x30
[   16.080495]  kunit_try_run_case+0x1b3/0x490
[   16.081209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081728]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.082156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.082545]  ? __kthread_parkme+0x82/0x160
[   16.083568]  ? preempt_count_sub+0x50/0x80
[   16.084001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.085230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.085682]  kthread+0x257/0x310
[   16.085979]  ? __pfx_kthread+0x10/0x10
[   16.086588]  ret_from_fork+0x41/0x80
[   16.087289]  ? __pfx_kthread+0x10/0x10
[   16.087662]  ret_from_fork_asm+0x1a/0x30
[   16.088080]  </TASK>
[   16.088375] 
[   16.088586] Allocated by task 162:
[   16.088964]  kasan_save_stack+0x3d/0x60
[   16.089331]  kasan_save_track+0x18/0x40
[   16.089796]  kasan_save_alloc_info+0x3b/0x50
[   16.090221]  __kasan_krealloc+0x190/0x1f0
[   16.090566]  krealloc_noprof+0xc1/0x140
[   16.091014]  krealloc_less_oob_helper+0x1ab/0x11d0
[   16.091439]  krealloc_less_oob+0x1c/0x30
[   16.091869]  kunit_try_run_case+0x1b3/0x490
[   16.092300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.092680]  kthread+0x257/0x310
[   16.093068]  ret_from_fork+0x41/0x80
[   16.093505]  ret_from_fork_asm+0x1a/0x30
[   16.093864] 
[   16.094103] The buggy address belongs to the object at ffff88810039b600
[   16.094103]  which belongs to the cache kmalloc-256 of size 256
[   16.095046] The buggy address is located 34 bytes to the right of
[   16.095046]  allocated 201-byte region [ffff88810039b600, ffff88810039b6c9)
[   16.095920] 
[   16.096147] The buggy address belongs to the physical page:
[   16.096758] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   16.097389] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.097962] flags: 0x200000000000040(head|node=0|zone=2)
[   16.098446] page_type: f5(slab)
[   16.098718] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.099237] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.100178] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.100851] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.101534] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   16.101999] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.102973] page dumped because: kasan: bad access detected
[   16.103431] 
[   16.103652] Memory state around the buggy address:
[   16.104154]  ffff88810039b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105197]  ffff88810039b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.105804] >ffff88810039b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.107455]                                                           ^
[   16.108033]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.108915]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.109818] ==================================================================

test log snippet boot parser 150

Home

[   15.803826] ==================================================================
[   15.804666] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   15.805346] Write of size 1 at addr ffff888100996ef0 by task kunit_try_catch/160
[   15.805759] 
[   15.805981] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.807884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.808388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.809642] Call Trace:
[   15.810180]  <TASK>
[   15.810769]  dump_stack_lvl+0x73/0xb0
[   15.811122]  print_report+0xd1/0x640
[   15.811431]  ? __virt_addr_valid+0x1db/0x2d0
[   15.811760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.812156]  kasan_report+0x102/0x140
[   15.813238]  ? krealloc_more_oob_helper+0x7ed/0x930
[   15.814256]  ? krealloc_more_oob_helper+0x7ed/0x930
[   15.815000]  __asan_report_store1_noabort+0x1b/0x30
[   15.815723]  krealloc_more_oob_helper+0x7ed/0x930
[   15.816244]  ? __schedule+0xc51/0x27c0
[   15.816722]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   15.818039]  ? finish_task_switch.isra.0+0x153/0x700
[   15.818665]  ? __switch_to+0x5d9/0xf60
[   15.819037]  ? __schedule+0xc51/0x27c0
[   15.819939]  ? __pfx_read_tsc+0x10/0x10
[   15.820236]  krealloc_more_oob+0x1c/0x30
[   15.820899]  kunit_try_run_case+0x1b3/0x490
[   15.821255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821820]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.822821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.823423]  ? __kthread_parkme+0x82/0x160
[   15.824074]  ? preempt_count_sub+0x50/0x80
[   15.824575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.825001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.825588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.826010]  kthread+0x257/0x310
[   15.826528]  ? __pfx_kthread+0x10/0x10
[   15.826919]  ret_from_fork+0x41/0x80
[   15.827291]  ? __pfx_kthread+0x10/0x10
[   15.827677]  ret_from_fork_asm+0x1a/0x30
[   15.828077]  </TASK>
[   15.828347] 
[   15.828557] Allocated by task 160:
[   15.829589]  kasan_save_stack+0x3d/0x60
[   15.829978]  kasan_save_track+0x18/0x40
[   15.830586]  kasan_save_alloc_info+0x3b/0x50
[   15.831010]  __kasan_krealloc+0x190/0x1f0
[   15.831339]  krealloc_noprof+0xc1/0x140
[   15.831765]  krealloc_more_oob_helper+0x1aa/0x930
[   15.832386]  krealloc_more_oob+0x1c/0x30
[   15.833122]  kunit_try_run_case+0x1b3/0x490
[   15.833435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.834084]  kthread+0x257/0x310
[   15.834683]  ret_from_fork+0x41/0x80
[   15.835088]  ret_from_fork_asm+0x1a/0x30
[   15.835698] 
[   15.835942] The buggy address belongs to the object at ffff888100996e00
[   15.835942]  which belongs to the cache kmalloc-256 of size 256
[   15.837208] The buggy address is located 5 bytes to the right of
[   15.837208]  allocated 235-byte region [ffff888100996e00, ffff888100996eeb)
[   15.838322] 
[   15.838525] The buggy address belongs to the physical page:
[   15.838963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100996
[   15.839693] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.840494] flags: 0x200000000000040(head|node=0|zone=2)
[   15.840940] page_type: f5(slab)
[   15.841290] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.841752] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.843350] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.844742] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.845535] head: 0200000000000001 ffffea0004026581 ffffffffffffffff 0000000000000000
[   15.845895] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   15.847169] page dumped because: kasan: bad access detected
[   15.847850] 
[   15.848197] Memory state around the buggy address:
[   15.848834]  ffff888100996d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.849648]  ffff888100996e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.850255] >ffff888100996e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.850865]                                                              ^
[   15.851370]  ffff888100996f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.852466]  ffff888100996f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.853549] ==================================================================

test log snippet boot parser 151

Home

[   15.753175] ==================================================================
[   15.754119] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   15.755370] Write of size 1 at addr ffff888100996eeb by task kunit_try_catch/160
[   15.756499] 
[   15.756716] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.757812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.758111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.759195] Call Trace:
[   15.759847]  <TASK>
[   15.760124]  dump_stack_lvl+0x73/0xb0
[   15.760510]  print_report+0xd1/0x640
[   15.761258]  ? __virt_addr_valid+0x1db/0x2d0
[   15.761982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.762662]  kasan_report+0x102/0x140
[   15.763169]  ? krealloc_more_oob_helper+0x823/0x930
[   15.763723]  ? krealloc_more_oob_helper+0x823/0x930
[   15.764418]  __asan_report_store1_noabort+0x1b/0x30
[   15.764832]  krealloc_more_oob_helper+0x823/0x930
[   15.765026]  ? __schedule+0xc51/0x27c0
[   15.765184]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   15.765564]  ? finish_task_switch.isra.0+0x153/0x700
[   15.766810]  ? __switch_to+0x5d9/0xf60
[   15.767491]  ? __schedule+0xc51/0x27c0
[   15.767868]  ? __pfx_read_tsc+0x10/0x10
[   15.768396]  krealloc_more_oob+0x1c/0x30
[   15.768846]  kunit_try_run_case+0x1b3/0x490
[   15.769751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770298]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.771221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.771956]  ? __kthread_parkme+0x82/0x160
[   15.772467]  ? preempt_count_sub+0x50/0x80
[   15.773102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.774014]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.774515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.775021]  kthread+0x257/0x310
[   15.775552]  ? __pfx_kthread+0x10/0x10
[   15.775939]  ret_from_fork+0x41/0x80
[   15.776667]  ? __pfx_kthread+0x10/0x10
[   15.777393]  ret_from_fork_asm+0x1a/0x30
[   15.777994]  </TASK>
[   15.778230] 
[   15.778386] Allocated by task 160:
[   15.779191]  kasan_save_stack+0x3d/0x60
[   15.779874]  kasan_save_track+0x18/0x40
[   15.780243]  kasan_save_alloc_info+0x3b/0x50
[   15.780911]  __kasan_krealloc+0x190/0x1f0
[   15.781919]  krealloc_noprof+0xc1/0x140
[   15.782153]  krealloc_more_oob_helper+0x1aa/0x930
[   15.782363]  krealloc_more_oob+0x1c/0x30
[   15.782881]  kunit_try_run_case+0x1b3/0x490
[   15.783523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.784501]  kthread+0x257/0x310
[   15.785033]  ret_from_fork+0x41/0x80
[   15.785366]  ret_from_fork_asm+0x1a/0x30
[   15.785968] 
[   15.786231] The buggy address belongs to the object at ffff888100996e00
[   15.786231]  which belongs to the cache kmalloc-256 of size 256
[   15.787177] The buggy address is located 0 bytes to the right of
[   15.787177]  allocated 235-byte region [ffff888100996e00, ffff888100996eeb)
[   15.788329] 
[   15.788696] The buggy address belongs to the physical page:
[   15.789192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100996
[   15.790089] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.790806] flags: 0x200000000000040(head|node=0|zone=2)
[   15.791295] page_type: f5(slab)
[   15.791660] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.792273] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.793003] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   15.793844] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   15.794670] head: 0200000000000001 ffffea0004026581 ffffffffffffffff 0000000000000000
[   15.795315] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   15.796049] page dumped because: kasan: bad access detected
[   15.796584] 
[   15.796834] Memory state around the buggy address:
[   15.797314]  ffff888100996d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.798029]  ffff888100996e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.798833] >ffff888100996e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.799383]                                                           ^
[   15.800095]  ffff888100996f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800750]  ffff888100996f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801362] ==================================================================

test log snippet boot parser 152

Home

[   17.271382] ==================================================================
[   17.272551] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   17.273381] Read of size 1 at addr ffff888101fffe73 by task kunit_try_catch/198
[   17.274409] 
[   17.274839] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.275598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.276136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.276936] Call Trace:
[   17.277284]  <TASK>
[   17.277647]  dump_stack_lvl+0x73/0xb0
[   17.278095]  print_report+0xd1/0x640
[   17.278664]  ? __virt_addr_valid+0x1db/0x2d0
[   17.279098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.279811]  kasan_report+0x102/0x140
[   17.280132]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   17.280591]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   17.281125]  __asan_report_load1_noabort+0x18/0x20
[   17.281677]  ksize_unpoisons_memory+0x81e/0x9b0
[   17.282171]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.282824]  ? finish_task_switch.isra.0+0x153/0x700
[   17.283455]  ? __switch_to+0x5d9/0xf60
[   17.283920]  ? __schedule+0xc51/0x27c0
[   17.284495]  ? __pfx_read_tsc+0x10/0x10
[   17.284881]  ? ktime_get_ts64+0x84/0x230
[   17.285488]  kunit_try_run_case+0x1b3/0x490
[   17.285997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.286578]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.287149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.287722]  ? __kthread_parkme+0x82/0x160
[   17.288262]  ? preempt_count_sub+0x50/0x80
[   17.288748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.289238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.289909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.290527]  kthread+0x257/0x310
[   17.290890]  ? __pfx_kthread+0x10/0x10
[   17.291457]  ret_from_fork+0x41/0x80
[   17.291899]  ? __pfx_kthread+0x10/0x10
[   17.292351]  ret_from_fork_asm+0x1a/0x30
[   17.292994]  </TASK>
[   17.293265] 
[   17.293576] Allocated by task 198:
[   17.293954]  kasan_save_stack+0x3d/0x60
[   17.294510]  kasan_save_track+0x18/0x40
[   17.294981]  kasan_save_alloc_info+0x3b/0x50
[   17.295533]  __kasan_kmalloc+0xb7/0xc0
[   17.296022]  __kmalloc_cache_noprof+0x162/0x350
[   17.296441]  ksize_unpoisons_memory+0xc8/0x9b0
[   17.296919]  kunit_try_run_case+0x1b3/0x490
[   17.297271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.297708]  kthread+0x257/0x310
[   17.298155]  ret_from_fork+0x41/0x80
[   17.298568]  ret_from_fork_asm+0x1a/0x30
[   17.299079] 
[   17.299365] The buggy address belongs to the object at ffff888101fffe00
[   17.299365]  which belongs to the cache kmalloc-128 of size 128
[   17.300446] The buggy address is located 0 bytes to the right of
[   17.300446]  allocated 115-byte region [ffff888101fffe00, ffff888101fffe73)
[   17.301504] 
[   17.301806] The buggy address belongs to the physical page:
[   17.302418] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   17.303805] flags: 0x200000000000000(node=0|zone=2)
[   17.304117] page_type: f5(slab)
[   17.304898] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.305532] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.306303] page dumped because: kasan: bad access detected
[   17.307122] 
[   17.307402] Memory state around the buggy address:
[   17.308129]  ffff888101fffd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.308717]  ffff888101fffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.309262] >ffff888101fffe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.309660]                                                              ^
[   17.310256]  ffff888101fffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.310858]  ffff888101ffff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.311465] ==================================================================

test log snippet boot parser 153

Home

[   17.352910] ==================================================================
[   17.353515] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   17.354683] Read of size 1 at addr ffff888101fffe7f by task kunit_try_catch/198
[   17.355114] 
[   17.355375] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.356673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.357042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.358110] Call Trace:
[   17.358590]  <TASK>
[   17.358886]  dump_stack_lvl+0x73/0xb0
[   17.359429]  print_report+0xd1/0x640
[   17.359806]  ? __virt_addr_valid+0x1db/0x2d0
[   17.360439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.360934]  kasan_report+0x102/0x140
[   17.361732]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   17.362226]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   17.362739]  __asan_report_load1_noabort+0x18/0x20
[   17.363438]  ksize_unpoisons_memory+0x7b8/0x9b0
[   17.363848]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.364405]  ? finish_task_switch.isra.0+0x153/0x700
[   17.364996]  ? __switch_to+0x5d9/0xf60
[   17.365535]  ? __schedule+0xc51/0x27c0
[   17.366376]  ? __pfx_read_tsc+0x10/0x10
[   17.366943]  ? ktime_get_ts64+0x84/0x230
[   17.367287]  kunit_try_run_case+0x1b3/0x490
[   17.367627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.367992]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.368926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.369597]  ? __kthread_parkme+0x82/0x160
[   17.369925]  ? preempt_count_sub+0x50/0x80
[   17.370535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.370948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.371587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.372104]  kthread+0x257/0x310
[   17.372528]  ? __pfx_kthread+0x10/0x10
[   17.373089]  ret_from_fork+0x41/0x80
[   17.373513]  ? __pfx_kthread+0x10/0x10
[   17.373988]  ret_from_fork_asm+0x1a/0x30
[   17.374453]  </TASK>
[   17.374802] 
[   17.375067] Allocated by task 198:
[   17.375665]  kasan_save_stack+0x3d/0x60
[   17.375991]  kasan_save_track+0x18/0x40
[   17.376873]  kasan_save_alloc_info+0x3b/0x50
[   17.377789]  __kasan_kmalloc+0xb7/0xc0
[   17.378146]  __kmalloc_cache_noprof+0x162/0x350
[   17.378941]  ksize_unpoisons_memory+0xc8/0x9b0
[   17.379446]  kunit_try_run_case+0x1b3/0x490
[   17.379844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.380334]  kthread+0x257/0x310
[   17.380762]  ret_from_fork+0x41/0x80
[   17.381317]  ret_from_fork_asm+0x1a/0x30
[   17.381827] 
[   17.381981] The buggy address belongs to the object at ffff888101fffe00
[   17.381981]  which belongs to the cache kmalloc-128 of size 128
[   17.383959] The buggy address is located 12 bytes to the right of
[   17.383959]  allocated 115-byte region [ffff888101fffe00, ffff888101fffe73)
[   17.384488] 
[   17.385057] The buggy address belongs to the physical page:
[   17.385807] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   17.386656] flags: 0x200000000000000(node=0|zone=2)
[   17.387251] page_type: f5(slab)
[   17.387598] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.388551] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.389320] page dumped because: kasan: bad access detected
[   17.389711] 
[   17.389952] Memory state around the buggy address:
[   17.390443]  ffff888101fffd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.391034]  ffff888101fffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.392039] >ffff888101fffe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.392857]                                                                 ^
[   17.393911]  ffff888101fffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.394874]  ffff888101ffff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.395710] ==================================================================

test log snippet boot parser 154

Home

[   17.313226] ==================================================================
[   17.314407] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   17.314958] Read of size 1 at addr ffff888101fffe78 by task kunit_try_catch/198
[   17.315586] 
[   17.315832] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.316516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.317053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.317765] Call Trace:
[   17.318100]  <TASK>
[   17.318415]  dump_stack_lvl+0x73/0xb0
[   17.318849]  print_report+0xd1/0x640
[   17.319170]  ? __virt_addr_valid+0x1db/0x2d0
[   17.319668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.320081]  kasan_report+0x102/0x140
[   17.320529]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   17.320996]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   17.321517]  __asan_report_load1_noabort+0x18/0x20
[   17.322024]  ksize_unpoisons_memory+0x7eb/0x9b0
[   17.322512]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.323003]  ? finish_task_switch.isra.0+0x153/0x700
[   17.323536]  ? __switch_to+0x5d9/0xf60
[   17.323899]  ? __schedule+0xc51/0x27c0
[   17.324375]  ? __pfx_read_tsc+0x10/0x10
[   17.324803]  ? ktime_get_ts64+0x84/0x230
[   17.325180]  kunit_try_run_case+0x1b3/0x490
[   17.325617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.326134]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.326597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.327072]  ? __kthread_parkme+0x82/0x160
[   17.327562]  ? preempt_count_sub+0x50/0x80
[   17.327939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.328457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.329055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.329554]  kthread+0x257/0x310
[   17.329961]  ? __pfx_kthread+0x10/0x10
[   17.330388]  ret_from_fork+0x41/0x80
[   17.330758]  ? __pfx_kthread+0x10/0x10
[   17.331164]  ret_from_fork_asm+0x1a/0x30
[   17.331633]  </TASK>
[   17.331870] 
[   17.332088] Allocated by task 198:
[   17.332512]  kasan_save_stack+0x3d/0x60
[   17.332970]  kasan_save_track+0x18/0x40
[   17.333933]  kasan_save_alloc_info+0x3b/0x50
[   17.334598]  __kasan_kmalloc+0xb7/0xc0
[   17.334927]  __kmalloc_cache_noprof+0x162/0x350
[   17.335273]  ksize_unpoisons_memory+0xc8/0x9b0
[   17.335605]  kunit_try_run_case+0x1b3/0x490
[   17.335945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.336458]  kthread+0x257/0x310
[   17.337187]  ret_from_fork+0x41/0x80
[   17.338100]  ret_from_fork_asm+0x1a/0x30
[   17.338814] 
[   17.339162] The buggy address belongs to the object at ffff888101fffe00
[   17.339162]  which belongs to the cache kmalloc-128 of size 128
[   17.340653] The buggy address is located 5 bytes to the right of
[   17.340653]  allocated 115-byte region [ffff888101fffe00, ffff888101fffe73)
[   17.341062] 
[   17.341150] The buggy address belongs to the physical page:
[   17.342018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   17.342657] flags: 0x200000000000000(node=0|zone=2)
[   17.343137] page_type: f5(slab)
[   17.343767] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.344513] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.345363] page dumped because: kasan: bad access detected
[   17.345727] 
[   17.345986] Memory state around the buggy address:
[   17.346694]  ffff888101fffd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.347294]  ffff888101fffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.347892] >ffff888101fffe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.348614]                                                                 ^
[   17.349139]  ffff888101fffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.349740]  ffff888101ffff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.350554] ==================================================================

test log snippet boot parser 155

Home

[   19.407734] ==================================================================
[   19.408501] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[   19.409117] Read of size 1 at addr ffff88810200f718 by task kunit_try_catch/259
[   19.410936] 
[   19.411137] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.412341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.412850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.413534] Call Trace:
[   19.413814]  <TASK>
[   19.414099]  dump_stack_lvl+0x73/0xb0
[   19.414537]  print_report+0xd1/0x640
[   19.414906]  ? __virt_addr_valid+0x1db/0x2d0
[   19.415352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.416393]  kasan_report+0x102/0x140
[   19.416871]  ? memchr+0x79/0x90
[   19.417245]  ? memchr+0x79/0x90
[   19.417724]  __asan_report_load1_noabort+0x18/0x20
[   19.418131]  memchr+0x79/0x90
[   19.418487]  kasan_memchr+0x163/0x320
[   19.419031]  ? __pfx_kasan_memchr+0x10/0x10
[   19.420023]  ? __schedule+0xc51/0x27c0
[   19.420343]  ? __pfx_read_tsc+0x10/0x10
[   19.420756]  ? ktime_get_ts64+0x84/0x230
[   19.421588]  kunit_try_run_case+0x1b3/0x490
[   19.422079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.422576]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.423258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.423726]  ? __kthread_parkme+0x82/0x160
[   19.424156]  ? preempt_count_sub+0x50/0x80
[   19.425630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.426103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.426746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.427290]  kthread+0x257/0x310
[   19.427672]  ? __pfx_kthread+0x10/0x10
[   19.428060]  ret_from_fork+0x41/0x80
[   19.428513]  ? __pfx_kthread+0x10/0x10
[   19.428839]  ret_from_fork_asm+0x1a/0x30
[   19.429693]  </TASK>
[   19.430171] 
[   19.430404] Allocated by task 259:
[   19.431256]  kasan_save_stack+0x3d/0x60
[   19.432213]  kasan_save_track+0x18/0x40
[   19.432488]  kasan_save_alloc_info+0x3b/0x50
[   19.432994]  __kasan_kmalloc+0xb7/0xc0
[   19.433808]  __kmalloc_cache_noprof+0x162/0x350
[   19.434829]  kasan_memchr+0xad/0x320
[   19.435303]  kunit_try_run_case+0x1b3/0x490
[   19.436106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.436876]  kthread+0x257/0x310
[   19.437200]  ret_from_fork+0x41/0x80
[   19.437623]  ret_from_fork_asm+0x1a/0x30
[   19.438005] 
[   19.438611] The buggy address belongs to the object at ffff88810200f700
[   19.438611]  which belongs to the cache kmalloc-32 of size 32
[   19.439826] The buggy address is located 0 bytes to the right of
[   19.439826]  allocated 24-byte region [ffff88810200f700, ffff88810200f718)
[   19.441260] 
[   19.442053] The buggy address belongs to the physical page:
[   19.442663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10200f
[   19.443524] flags: 0x200000000000000(node=0|zone=2)
[   19.444232] page_type: f5(slab)
[   19.444963] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.445728] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.446567] page dumped because: kasan: bad access detected
[   19.447081] 
[   19.447382] Memory state around the buggy address:
[   19.448009]  ffff88810200f600: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.448990]  ffff88810200f680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.449845] >ffff88810200f700: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450653]                             ^
[   19.451100]  ffff88810200f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.451937]  ffff88810200f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452931] ==================================================================

test log snippet boot parser 156

Home

[   19.459990] ==================================================================
[   19.460753] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   19.461366] Read of size 1 at addr ffff88810200f858 by task kunit_try_catch/261
[   19.462695] 
[   19.463215] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.464017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.464635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.465872] Call Trace:
[   19.466186]  <TASK>
[   19.466618]  dump_stack_lvl+0x73/0xb0
[   19.467147]  print_report+0xd1/0x640
[   19.467478]  ? __virt_addr_valid+0x1db/0x2d0
[   19.468090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.468610]  kasan_report+0x102/0x140
[   19.469095]  ? memcmp+0x1b4/0x1d0
[   19.469672]  ? memcmp+0x1b4/0x1d0
[   19.470106]  __asan_report_load1_noabort+0x18/0x20
[   19.470583]  memcmp+0x1b4/0x1d0
[   19.471033]  kasan_memcmp+0x190/0x390
[   19.471437]  ? trace_hardirqs_on+0x37/0xe0
[   19.471997]  ? __pfx_kasan_memcmp+0x10/0x10
[   19.472319]  ? finish_task_switch.isra.0+0x153/0x700
[   19.472833]  ? __switch_to+0x5d9/0xf60
[   19.473433]  ? __pfx_read_tsc+0x10/0x10
[   19.473831]  ? ktime_get_ts64+0x84/0x230
[   19.474172]  kunit_try_run_case+0x1b3/0x490
[   19.474617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.475524]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.475983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.477171]  ? __kthread_parkme+0x82/0x160
[   19.477553]  ? preempt_count_sub+0x50/0x80
[   19.478025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.478693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.479220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.479831]  kthread+0x257/0x310
[   19.480160]  ? __pfx_kthread+0x10/0x10
[   19.480720]  ret_from_fork+0x41/0x80
[   19.481073]  ? __pfx_kthread+0x10/0x10
[   19.481595]  ret_from_fork_asm+0x1a/0x30
[   19.482025]  </TASK>
[   19.482342] 
[   19.482534] Allocated by task 261:
[   19.482837]  kasan_save_stack+0x3d/0x60
[   19.483421]  kasan_save_track+0x18/0x40
[   19.483767]  kasan_save_alloc_info+0x3b/0x50
[   19.484183]  __kasan_kmalloc+0xb7/0xc0
[   19.484561]  __kmalloc_cache_noprof+0x162/0x350
[   19.484961]  kasan_memcmp+0xb8/0x390
[   19.485348]  kunit_try_run_case+0x1b3/0x490
[   19.486078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.486861]  kthread+0x257/0x310
[   19.487152]  ret_from_fork+0x41/0x80
[   19.487450]  ret_from_fork_asm+0x1a/0x30
[   19.488085] 
[   19.488351] The buggy address belongs to the object at ffff88810200f840
[   19.488351]  which belongs to the cache kmalloc-32 of size 32
[   19.489639] The buggy address is located 0 bytes to the right of
[   19.489639]  allocated 24-byte region [ffff88810200f840, ffff88810200f858)
[   19.490567] 
[   19.490831] The buggy address belongs to the physical page:
[   19.491203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10200f
[   19.491672] flags: 0x200000000000000(node=0|zone=2)
[   19.492072] page_type: f5(slab)
[   19.492440] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.493412] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.494395] page dumped because: kasan: bad access detected
[   19.495032] 
[   19.495200] Memory state around the buggy address:
[   19.495858]  ffff88810200f700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.496471]  ffff88810200f780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.496952] >ffff88810200f800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.498646]                                                     ^
[   19.499566]  ffff88810200f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500546]  ffff88810200f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.501271] ==================================================================

test log snippet boot parser 157

Home

[   18.603980] ==================================================================
[   18.604884] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   18.606205] Read of size 1 at addr ffff888102003e73 by task kunit_try_catch/225
[   18.606962] 
[   18.607510] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.608227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.609039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.610021] Call Trace:
[   18.610277]  <TASK>
[   18.610558]  dump_stack_lvl+0x73/0xb0
[   18.610965]  print_report+0xd1/0x640
[   18.611750]  ? __virt_addr_valid+0x1db/0x2d0
[   18.612124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.612740]  kasan_report+0x102/0x140
[   18.613089]  ? mempool_oob_right_helper+0x31a/0x380
[   18.613937]  ? mempool_oob_right_helper+0x31a/0x380
[   18.614756]  __asan_report_load1_noabort+0x18/0x20
[   18.615559]  mempool_oob_right_helper+0x31a/0x380
[   18.616088]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   18.616441]  ? finish_task_switch.isra.0+0x153/0x700
[   18.616860]  mempool_kmalloc_oob_right+0xb6/0x100
[   18.617368]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   18.618323]  ? __switch_to+0x5d9/0xf60
[   18.619040]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.619528]  ? __pfx_mempool_kfree+0x10/0x10
[   18.620065]  ? __pfx_read_tsc+0x10/0x10
[   18.620496]  ? ktime_get_ts64+0x84/0x230
[   18.621487]  kunit_try_run_case+0x1b3/0x490
[   18.622018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.622583]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.623093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.623746]  ? __kthread_parkme+0x82/0x160
[   18.624141]  ? preempt_count_sub+0x50/0x80
[   18.624723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.625133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.626326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.626864]  kthread+0x257/0x310
[   18.627297]  ? __pfx_kthread+0x10/0x10
[   18.627702]  ret_from_fork+0x41/0x80
[   18.628098]  ? __pfx_kthread+0x10/0x10
[   18.628600]  ret_from_fork_asm+0x1a/0x30
[   18.629083]  </TASK>
[   18.629387] 
[   18.629702] Allocated by task 225:
[   18.630094]  kasan_save_stack+0x3d/0x60
[   18.631063]  kasan_save_track+0x18/0x40
[   18.631488]  kasan_save_alloc_info+0x3b/0x50
[   18.631931]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   18.632401]  remove_element+0x11e/0x190
[   18.632760]  mempool_alloc_preallocated+0x4d/0x90
[   18.633407]  mempool_oob_right_helper+0x8b/0x380
[   18.633901]  mempool_kmalloc_oob_right+0xb6/0x100
[   18.634411]  kunit_try_run_case+0x1b3/0x490
[   18.634898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.635417]  kthread+0x257/0x310
[   18.635926]  ret_from_fork+0x41/0x80
[   18.636336]  ret_from_fork_asm+0x1a/0x30
[   18.637345] 
[   18.637570] The buggy address belongs to the object at ffff888102003e00
[   18.637570]  which belongs to the cache kmalloc-128 of size 128
[   18.638761] The buggy address is located 0 bytes to the right of
[   18.638761]  allocated 115-byte region [ffff888102003e00, ffff888102003e73)
[   18.639709] 
[   18.639933] The buggy address belongs to the physical page:
[   18.640414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102003
[   18.641092] flags: 0x200000000000000(node=0|zone=2)
[   18.641712] page_type: f5(slab)
[   18.642070] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.643205] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   18.643922] page dumped because: kasan: bad access detected
[   18.644359] 
[   18.644715] Memory state around the buggy address:
[   18.645109]  ffff888102003d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.645916]  ffff888102003d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.646619] >ffff888102003e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.647152]                                                              ^
[   18.647729]  ffff888102003e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.648260]  ffff888102003f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.648843] ==================================================================

test log snippet boot parser 158

Home

[   18.655915] ==================================================================
[   18.657147] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   18.657804] Read of size 1 at addr ffff888102a36001 by task kunit_try_catch/227
[   18.658042] 
[   18.658159] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.659586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.660739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.661616] Call Trace:
[   18.661917]  <TASK>
[   18.662274]  dump_stack_lvl+0x73/0xb0
[   18.662683]  print_report+0xd1/0x640
[   18.663276]  ? __virt_addr_valid+0x1db/0x2d0
[   18.663701]  ? kasan_addr_to_slab+0x11/0xa0
[   18.663994]  kasan_report+0x102/0x140
[   18.664272]  ? mempool_oob_right_helper+0x31a/0x380
[   18.664859]  ? mempool_oob_right_helper+0x31a/0x380
[   18.665487]  __asan_report_load1_noabort+0x18/0x20
[   18.666007]  mempool_oob_right_helper+0x31a/0x380
[   18.666849]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   18.667607]  ? irqentry_exit+0x2a/0x60
[   18.668035]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.669267]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   18.669961]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   18.670680]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.671074]  ? __pfx_mempool_kfree+0x10/0x10
[   18.671687]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   18.672331]  kunit_try_run_case+0x1b3/0x490
[   18.672961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.673476]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.674341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.674939]  ? __kthread_parkme+0x82/0x160
[   18.675412]  ? preempt_count_sub+0x50/0x80
[   18.675994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.676570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.677172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.677791]  kthread+0x257/0x310
[   18.678318]  ? __pfx_kthread+0x10/0x10
[   18.678990]  ret_from_fork+0x41/0x80
[   18.679442]  ? __pfx_kthread+0x10/0x10
[   18.679844]  ret_from_fork_asm+0x1a/0x30
[   18.680408]  </TASK>
[   18.680813] 
[   18.681037] The buggy address belongs to the physical page:
[   18.681442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a34
[   18.682214] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.682907] flags: 0x200000000000040(head|node=0|zone=2)
[   18.683425] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.684224] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.685508] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.686290] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.687082] head: 0200000000000002 ffffea00040a8d01 ffffffffffffffff 0000000000000000
[   18.687643] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.688225] page dumped because: kasan: bad access detected
[   18.688628] 
[   18.688979] Memory state around the buggy address:
[   18.689438]  ffff888102a35f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.690111]  ffff888102a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.691173] >ffff888102a36000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.691908]                    ^
[   18.692253]  ffff888102a36080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.692920]  ffff888102a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.693605] ==================================================================

test log snippet boot parser 159

Home

[   18.701891] ==================================================================
[   18.702643] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   18.703863] Read of size 1 at addr ffff88810200d2bb by task kunit_try_catch/229
[   18.705465] 
[   18.705827] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.707146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.707657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.708170] Call Trace:
[   18.708737]  <TASK>
[   18.709277]  dump_stack_lvl+0x73/0xb0
[   18.710032]  print_report+0xd1/0x640
[   18.710709]  ? __virt_addr_valid+0x1db/0x2d0
[   18.711148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.711868]  kasan_report+0x102/0x140
[   18.712323]  ? mempool_oob_right_helper+0x31a/0x380
[   18.713336]  ? mempool_oob_right_helper+0x31a/0x380
[   18.713891]  __asan_report_load1_noabort+0x18/0x20
[   18.714615]  mempool_oob_right_helper+0x31a/0x380
[   18.715097]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   18.715758]  ? finish_task_switch.isra.0+0x153/0x700
[   18.716321]  mempool_slab_oob_right+0xb1/0x100
[   18.716917]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   18.717433]  ? __switch_to+0x5d9/0xf60
[   18.718152]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   18.718471]  ? __pfx_mempool_free_slab+0x10/0x10
[   18.718969]  ? __pfx_read_tsc+0x10/0x10
[   18.719327]  ? ktime_get_ts64+0x84/0x230
[   18.719733]  kunit_try_run_case+0x1b3/0x490
[   18.720242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.720797]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.721314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.721966]  ? __kthread_parkme+0x82/0x160
[   18.722595]  ? preempt_count_sub+0x50/0x80
[   18.723103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.723668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.724273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.725422]  kthread+0x257/0x310
[   18.725941]  ? __pfx_kthread+0x10/0x10
[   18.726414]  ret_from_fork+0x41/0x80
[   18.726914]  ? __pfx_kthread+0x10/0x10
[   18.727403]  ret_from_fork_asm+0x1a/0x30
[   18.727858]  </TASK>
[   18.728122] 
[   18.728584] Allocated by task 229:
[   18.728952]  kasan_save_stack+0x3d/0x60
[   18.729362]  kasan_save_track+0x18/0x40
[   18.730312]  kasan_save_alloc_info+0x3b/0x50
[   18.730921]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   18.731595]  remove_element+0x11e/0x190
[   18.731973]  mempool_alloc_preallocated+0x4d/0x90
[   18.732569]  mempool_oob_right_helper+0x8b/0x380
[   18.733057]  mempool_slab_oob_right+0xb1/0x100
[   18.733689]  kunit_try_run_case+0x1b3/0x490
[   18.734110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.735129]  kthread+0x257/0x310
[   18.735422]  ret_from_fork+0x41/0x80
[   18.736048]  ret_from_fork_asm+0x1a/0x30
[   18.736615] 
[   18.736866] The buggy address belongs to the object at ffff88810200d240
[   18.736866]  which belongs to the cache test_cache of size 123
[   18.737941] The buggy address is located 0 bytes to the right of
[   18.737941]  allocated 123-byte region [ffff88810200d240, ffff88810200d2bb)
[   18.739082] 
[   18.739363] The buggy address belongs to the physical page:
[   18.740256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10200d
[   18.740898] flags: 0x200000000000000(node=0|zone=2)
[   18.741281] page_type: f5(slab)
[   18.741647] raw: 0200000000000000 ffff8881015d1b40 dead000000000122 0000000000000000
[   18.742689] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   18.743182] page dumped because: kasan: bad access detected
[   18.743881] 
[   18.744109] Memory state around the buggy address:
[   18.744691]  ffff88810200d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.745394]  ffff88810200d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.746463] >ffff88810200d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.747075]                                         ^
[   18.747642]  ffff88810200d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.748321]  ffff88810200d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.749040] ==================================================================

test log snippet boot parser 160

Home

[   19.661381] ==================================================================
[   19.662046] BUG: KASAN: slab-use-after-free in kasan_strings+0xa0f/0xb60
[   19.662874] Read of size 1 at addr ffff888102c398d0 by task kunit_try_catch/263
[   19.663458] 
[   19.663706] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.664443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.664816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.665652] Call Trace:
[   19.666182]  <TASK>
[   19.666557]  dump_stack_lvl+0x73/0xb0
[   19.666902]  print_report+0xd1/0x640
[   19.667380]  ? __virt_addr_valid+0x1db/0x2d0
[   19.668273]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.669044]  kasan_report+0x102/0x140
[   19.669515]  ? kasan_strings+0xa0f/0xb60
[   19.669992]  ? kasan_strings+0xa0f/0xb60
[   19.670582]  __asan_report_load1_noabort+0x18/0x20
[   19.671061]  kasan_strings+0xa0f/0xb60
[   19.671535]  ? __pfx_kasan_strings+0x10/0x10
[   19.671854]  ? __schedule+0xc51/0x27c0
[   19.672258]  ? __pfx_read_tsc+0x10/0x10
[   19.672647]  ? ktime_get_ts64+0x84/0x230
[   19.673073]  kunit_try_run_case+0x1b3/0x490
[   19.673526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.673907]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.674419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.675222]  ? __kthread_parkme+0x82/0x160
[   19.675562]  ? preempt_count_sub+0x50/0x80
[   19.675920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.676974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.677615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.678319]  kthread+0x257/0x310
[   19.678572]  ? __pfx_kthread+0x10/0x10
[   19.678997]  ret_from_fork+0x41/0x80
[   19.679354]  ? __pfx_kthread+0x10/0x10
[   19.679830]  ret_from_fork_asm+0x1a/0x30
[   19.680345]  </TASK>
[   19.680711] 
[   19.681173] Allocated by task 263:
[   19.682002]  kasan_save_stack+0x3d/0x60
[   19.682367]  kasan_save_track+0x18/0x40
[   19.682803]  kasan_save_alloc_info+0x3b/0x50
[   19.683311]  __kasan_kmalloc+0xb7/0xc0
[   19.683713]  __kmalloc_cache_noprof+0x162/0x350
[   19.684202]  kasan_strings+0xb3/0xb60
[   19.684618]  kunit_try_run_case+0x1b3/0x490
[   19.685127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.685584]  kthread+0x257/0x310
[   19.686039]  ret_from_fork+0x41/0x80
[   19.686686]  ret_from_fork_asm+0x1a/0x30
[   19.687533] 
[   19.687708] Freed by task 263:
[   19.687972]  kasan_save_stack+0x3d/0x60
[   19.688861]  kasan_save_track+0x18/0x40
[   19.689171]  kasan_save_free_info+0x3f/0x60
[   19.689647]  __kasan_slab_free+0x56/0x70
[   19.690180]  kfree+0x123/0x3d0
[   19.690677]  kasan_strings+0x13a/0xb60
[   19.691228]  kunit_try_run_case+0x1b3/0x490
[   19.691666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.692224]  kthread+0x257/0x310
[   19.692620]  ret_from_fork+0x41/0x80
[   19.693026]  ret_from_fork_asm+0x1a/0x30
[   19.693465] 
[   19.693729] The buggy address belongs to the object at ffff888102c398c0
[   19.693729]  which belongs to the cache kmalloc-32 of size 32
[   19.694692] The buggy address is located 16 bytes inside of
[   19.694692]  freed 32-byte region [ffff888102c398c0, ffff888102c398e0)
[   19.695603] 
[   19.695845] The buggy address belongs to the physical page:
[   19.696337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   19.697429] flags: 0x200000000000000(node=0|zone=2)
[   19.697907] page_type: f5(slab)
[   19.698228] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.698903] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.699911] page dumped because: kasan: bad access detected
[   19.700568] 
[   19.700956] Memory state around the buggy address:
[   19.701585]  ffff888102c39780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.702182]  ffff888102c39800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.702840] >ffff888102c39880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.703425]                                                  ^
[   19.704163]  ffff888102c39900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.704689]  ffff888102c39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.705189] ==================================================================

test log snippet boot parser 161

Home

[   17.155048] ==================================================================
[   17.156224] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19d/0x360
[   17.157037] Read of size 1 at addr ffff888101e64360 by task kunit_try_catch/196
[   17.157815] 
[   17.158075] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.159047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.159563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.160382] Call Trace:
[   17.160664]  <TASK>
[   17.160967]  dump_stack_lvl+0x73/0xb0
[   17.161432]  print_report+0xd1/0x640
[   17.162145]  ? __virt_addr_valid+0x1db/0x2d0
[   17.162830]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.163560]  kasan_report+0x102/0x140
[   17.164033]  ? kmalloc_double_kzfree+0x19d/0x360
[   17.164710]  ? kmalloc_double_kzfree+0x19d/0x360
[   17.165191]  ? kmalloc_double_kzfree+0x19d/0x360
[   17.165854]  __kasan_check_byte+0x3d/0x50
[   17.166339]  kfree_sensitive+0x22/0x90
[   17.166938]  kmalloc_double_kzfree+0x19d/0x360
[   17.167505]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   17.167965]  ? __schedule+0xc51/0x27c0
[   17.168715]  ? __pfx_read_tsc+0x10/0x10
[   17.169123]  ? ktime_get_ts64+0x84/0x230
[   17.169763]  kunit_try_run_case+0x1b3/0x490
[   17.170277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.170763]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.171427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.172063]  ? __kthread_parkme+0x82/0x160
[   17.173176]  ? preempt_count_sub+0x50/0x80
[   17.174566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.175845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.176971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.177445]  kthread+0x257/0x310
[   17.178254]  ? __pfx_kthread+0x10/0x10
[   17.178606]  ret_from_fork+0x41/0x80
[   17.178987]  ? __pfx_kthread+0x10/0x10
[   17.179183]  ret_from_fork_asm+0x1a/0x30
[   17.180123]  </TASK>
[   17.180624] 
[   17.180916] Allocated by task 196:
[   17.181481]  kasan_save_stack+0x3d/0x60
[   17.182254]  kasan_save_track+0x18/0x40
[   17.182894]  kasan_save_alloc_info+0x3b/0x50
[   17.183179]  __kasan_kmalloc+0xb7/0xc0
[   17.183871]  __kmalloc_cache_noprof+0x162/0x350
[   17.184684]  kmalloc_double_kzfree+0xaa/0x360
[   17.185043]  kunit_try_run_case+0x1b3/0x490
[   17.185721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.186651]  kthread+0x257/0x310
[   17.187281]  ret_from_fork+0x41/0x80
[   17.187635]  ret_from_fork_asm+0x1a/0x30
[   17.188623] 
[   17.188875] Freed by task 196:
[   17.189154]  kasan_save_stack+0x3d/0x60
[   17.189996]  kasan_save_track+0x18/0x40
[   17.190572]  kasan_save_free_info+0x3f/0x60
[   17.191105]  __kasan_slab_free+0x56/0x70
[   17.191869]  kfree+0x123/0x3d0
[   17.192144]  kfree_sensitive+0x67/0x90
[   17.193107]  kmalloc_double_kzfree+0x12c/0x360
[   17.193863]  kunit_try_run_case+0x1b3/0x490
[   17.194641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.195105]  kthread+0x257/0x310
[   17.195467]  ret_from_fork+0x41/0x80
[   17.195957]  ret_from_fork_asm+0x1a/0x30
[   17.196424] 
[   17.196714] The buggy address belongs to the object at ffff888101e64360
[   17.196714]  which belongs to the cache kmalloc-16 of size 16
[   17.197879] The buggy address is located 0 bytes inside of
[   17.197879]  freed 16-byte region [ffff888101e64360, ffff888101e64370)
[   17.199494] 
[   17.199922] The buggy address belongs to the physical page:
[   17.200564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e64
[   17.201507] flags: 0x200000000000000(node=0|zone=2)
[   17.202090] page_type: f5(slab)
[   17.202726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.203294] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   17.203897] page dumped because: kasan: bad access detected
[   17.204598] 
[   17.204761] Memory state around the buggy address:
[   17.205964]  ffff888101e64200: 00 02 fc fc 00 03 fc fc fa fb fc fc 00 02 fc fc
[   17.206801]  ffff888101e64280: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.207708] >ffff888101e64300: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.208071]                                                        ^
[   17.209000]  ffff888101e64380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.210000]  ffff888101e64400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.211262] ==================================================================

test log snippet boot parser 162

Home

[   16.980099] ==================================================================
[   16.981375] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380
[   16.982134] Read of size 1 at addr ffff888101402f88 by task kunit_try_catch/188
[   16.982906] 
[   16.983184] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.984085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.985139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.985829] Call Trace:
[   16.986147]  <TASK>
[   16.986433]  dump_stack_lvl+0x73/0xb0
[   16.986955]  print_report+0xd1/0x640
[   16.987410]  ? __virt_addr_valid+0x1db/0x2d0
[   16.988004]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.988809]  kasan_report+0x102/0x140
[   16.989165]  ? kmalloc_uaf+0x322/0x380
[   16.989798]  ? kmalloc_uaf+0x322/0x380
[   16.990252]  __asan_report_load1_noabort+0x18/0x20
[   16.991714]  kmalloc_uaf+0x322/0x380
[   16.992138]  ? __pfx_kmalloc_uaf+0x10/0x10
[   16.992691]  ? __schedule+0xc51/0x27c0
[   16.992932]  ? __pfx_read_tsc+0x10/0x10
[   16.993095]  ? ktime_get_ts64+0x84/0x230
[   16.993939]  kunit_try_run_case+0x1b3/0x490
[   16.994451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.994992]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.995963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.996642]  ? __kthread_parkme+0x82/0x160
[   16.997096]  ? preempt_count_sub+0x50/0x80
[   16.997540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.998311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.999083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.000070]  kthread+0x257/0x310
[   17.000492]  ? __pfx_kthread+0x10/0x10
[   17.000939]  ret_from_fork+0x41/0x80
[   17.001312]  ? __pfx_kthread+0x10/0x10
[   17.001842]  ret_from_fork_asm+0x1a/0x30
[   17.002262]  </TASK>
[   17.002512] 
[   17.002880] Allocated by task 188:
[   17.003247]  kasan_save_stack+0x3d/0x60
[   17.003659]  kasan_save_track+0x18/0x40
[   17.004147]  kasan_save_alloc_info+0x3b/0x50
[   17.005872]  __kasan_kmalloc+0xb7/0xc0
[   17.006814]  __kmalloc_cache_noprof+0x162/0x350
[   17.007428]  kmalloc_uaf+0xab/0x380
[   17.007977]  kunit_try_run_case+0x1b3/0x490
[   17.008568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.009062]  kthread+0x257/0x310
[   17.009675]  ret_from_fork+0x41/0x80
[   17.010078]  ret_from_fork_asm+0x1a/0x30
[   17.010880] 
[   17.011004] Freed by task 188:
[   17.011129]  kasan_save_stack+0x3d/0x60
[   17.011896]  kasan_save_track+0x18/0x40
[   17.012515]  kasan_save_free_info+0x3f/0x60
[   17.012950]  __kasan_slab_free+0x56/0x70
[   17.013359]  kfree+0x123/0x3d0
[   17.013682]  kmalloc_uaf+0x12d/0x380
[   17.014081]  kunit_try_run_case+0x1b3/0x490
[   17.014915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.015500]  kthread+0x257/0x310
[   17.016131]  ret_from_fork+0x41/0x80
[   17.017089]  ret_from_fork_asm+0x1a/0x30
[   17.017664] 
[   17.017861] The buggy address belongs to the object at ffff888101402f80
[   17.017861]  which belongs to the cache kmalloc-16 of size 16
[   17.019077] The buggy address is located 8 bytes inside of
[   17.019077]  freed 16-byte region [ffff888101402f80, ffff888101402f90)
[   17.020169] 
[   17.021126] The buggy address belongs to the physical page:
[   17.021670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101402
[   17.022693] flags: 0x200000000000000(node=0|zone=2)
[   17.023078] page_type: f5(slab)
[   17.023813] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.024346] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   17.024830] page dumped because: kasan: bad access detected
[   17.025266] 
[   17.025485] Memory state around the buggy address:
[   17.026043]  ffff888101402e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.026819]  ffff888101402f00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.028100] >ffff888101402f80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.028826]                       ^
[   17.029870]  ffff888101403000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   17.030697]  ffff888101403080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   17.031524] ==================================================================

test log snippet boot parser 163

Home

[   17.096437] ==================================================================
[   17.097340] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4aa/0x520
[   17.097928] Read of size 1 at addr ffff888101ff9f28 by task kunit_try_catch/192
[   17.098461] 
[   17.098716] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.100021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.100428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.101067] Call Trace:
[   17.101353]  <TASK>
[   17.101788]  dump_stack_lvl+0x73/0xb0
[   17.102253]  print_report+0xd1/0x640
[   17.102801]  ? __virt_addr_valid+0x1db/0x2d0
[   17.103166]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.103691]  kasan_report+0x102/0x140
[   17.104116]  ? kmalloc_uaf2+0x4aa/0x520
[   17.104514]  ? kmalloc_uaf2+0x4aa/0x520
[   17.104963]  __asan_report_load1_noabort+0x18/0x20
[   17.105388]  kmalloc_uaf2+0x4aa/0x520
[   17.106606]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   17.107034]  ? finish_task_switch.isra.0+0x153/0x700
[   17.107710]  ? __switch_to+0x5d9/0xf60
[   17.108106]  ? __schedule+0xc51/0x27c0
[   17.108710]  ? __pfx_read_tsc+0x10/0x10
[   17.109060]  ? ktime_get_ts64+0x84/0x230
[   17.110036]  kunit_try_run_case+0x1b3/0x490
[   17.110492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.111112]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.111716]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.112168]  ? __kthread_parkme+0x82/0x160
[   17.112725]  ? preempt_count_sub+0x50/0x80
[   17.113163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.114034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.114647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.115144]  kthread+0x257/0x310
[   17.115541]  ? __pfx_kthread+0x10/0x10
[   17.116059]  ret_from_fork+0x41/0x80
[   17.116610]  ? __pfx_kthread+0x10/0x10
[   17.117039]  ret_from_fork_asm+0x1a/0x30
[   17.117834]  </TASK>
[   17.118136] 
[   17.118365] Allocated by task 192:
[   17.118874]  kasan_save_stack+0x3d/0x60
[   17.119337]  kasan_save_track+0x18/0x40
[   17.119812]  kasan_save_alloc_info+0x3b/0x50
[   17.120302]  __kasan_kmalloc+0xb7/0xc0
[   17.120696]  __kmalloc_cache_noprof+0x162/0x350
[   17.121161]  kmalloc_uaf2+0xc7/0x520
[   17.121551]  kunit_try_run_case+0x1b3/0x490
[   17.122429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.123101]  kthread+0x257/0x310
[   17.123433]  ret_from_fork+0x41/0x80
[   17.123972]  ret_from_fork_asm+0x1a/0x30
[   17.124434] 
[   17.124798] Freed by task 192:
[   17.125131]  kasan_save_stack+0x3d/0x60
[   17.125968]  kasan_save_track+0x18/0x40
[   17.126372]  kasan_save_free_info+0x3f/0x60
[   17.126911]  __kasan_slab_free+0x56/0x70
[   17.127354]  kfree+0x123/0x3d0
[   17.127731]  kmalloc_uaf2+0x14d/0x520
[   17.128325]  kunit_try_run_case+0x1b3/0x490
[   17.128913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.129435]  kthread+0x257/0x310
[   17.130219]  ret_from_fork+0x41/0x80
[   17.130656]  ret_from_fork_asm+0x1a/0x30
[   17.130992] 
[   17.131160] The buggy address belongs to the object at ffff888101ff9f00
[   17.131160]  which belongs to the cache kmalloc-64 of size 64
[   17.132131] The buggy address is located 40 bytes inside of
[   17.132131]  freed 64-byte region [ffff888101ff9f00, ffff888101ff9f40)
[   17.133108] 
[   17.133392] The buggy address belongs to the physical page:
[   17.134609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ff9
[   17.135244] flags: 0x200000000000000(node=0|zone=2)
[   17.135868] page_type: f5(slab)
[   17.136167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.136985] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   17.138050] page dumped because: kasan: bad access detected
[   17.138467] 
[   17.138831] Memory state around the buggy address:
[   17.139244]  ffff888101ff9e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.139922]  ffff888101ff9e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.140618] >ffff888101ff9f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.141138]                                   ^
[   17.141584]  ffff888101ff9f80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   17.142701]  ffff888101ffa000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   17.143270] ==================================================================

test log snippet boot parser 164

Home

[   16.567965] ==================================================================
[   16.568684] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0
[   16.569768] Read of size 16 at addr ffff888101e64340 by task kunit_try_catch/172
[   16.571163] 
[   16.571701] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.572480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.573076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.573846] Call Trace:
[   16.573973]  <TASK>
[   16.574099]  dump_stack_lvl+0x73/0xb0
[   16.574604]  print_report+0xd1/0x640
[   16.575154]  ? __virt_addr_valid+0x1db/0x2d0
[   16.576020]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.576975]  kasan_report+0x102/0x140
[   16.577688]  ? kmalloc_uaf_16+0x47d/0x4c0
[   16.578116]  ? kmalloc_uaf_16+0x47d/0x4c0
[   16.578575]  __asan_report_load16_noabort+0x18/0x20
[   16.579432]  kmalloc_uaf_16+0x47d/0x4c0
[   16.580186]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   16.580600]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   16.581121]  kunit_try_run_case+0x1b3/0x490
[   16.581603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.582174]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.582899]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.583351]  ? __kthread_parkme+0x82/0x160
[   16.583799]  ? preempt_count_sub+0x50/0x80
[   16.584343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.585834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.586444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.587076]  kthread+0x257/0x310
[   16.587439]  ? __pfx_kthread+0x10/0x10
[   16.587938]  ret_from_fork+0x41/0x80
[   16.588391]  ? __pfx_kthread+0x10/0x10
[   16.588800]  ret_from_fork_asm+0x1a/0x30
[   16.589210]  </TASK>
[   16.589490] 
[   16.589704] Allocated by task 172:
[   16.590083]  kasan_save_stack+0x3d/0x60
[   16.590465]  kasan_save_track+0x18/0x40
[   16.591401]  kasan_save_alloc_info+0x3b/0x50
[   16.591974]  __kasan_kmalloc+0xb7/0xc0
[   16.592389]  __kmalloc_cache_noprof+0x162/0x350
[   16.592928]  kmalloc_uaf_16+0x15c/0x4c0
[   16.593385]  kunit_try_run_case+0x1b3/0x490
[   16.593895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.594961]  kthread+0x257/0x310
[   16.595354]  ret_from_fork+0x41/0x80
[   16.595930]  ret_from_fork_asm+0x1a/0x30
[   16.596354] 
[   16.596726] Freed by task 172:
[   16.597122]  kasan_save_stack+0x3d/0x60
[   16.597707]  kasan_save_track+0x18/0x40
[   16.598182]  kasan_save_free_info+0x3f/0x60
[   16.598622]  __kasan_slab_free+0x56/0x70
[   16.599495]  kfree+0x123/0x3d0
[   16.600004]  kmalloc_uaf_16+0x1d7/0x4c0
[   16.600763]  kunit_try_run_case+0x1b3/0x490
[   16.601327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.602061]  kthread+0x257/0x310
[   16.602472]  ret_from_fork+0x41/0x80
[   16.603267]  ret_from_fork_asm+0x1a/0x30
[   16.603995] 
[   16.604290] The buggy address belongs to the object at ffff888101e64340
[   16.604290]  which belongs to the cache kmalloc-16 of size 16
[   16.605395] The buggy address is located 0 bytes inside of
[   16.605395]  freed 16-byte region [ffff888101e64340, ffff888101e64350)
[   16.606399] 
[   16.606623] The buggy address belongs to the physical page:
[   16.607050] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e64
[   16.607686] flags: 0x200000000000000(node=0|zone=2)
[   16.608141] page_type: f5(slab)
[   16.608491] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.609069] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   16.609730] page dumped because: kasan: bad access detected
[   16.610250] 
[   16.611144] Memory state around the buggy address:
[   16.612096]  ffff888101e64200: 00 02 fc fc 00 03 fc fc fa fb fc fc 00 02 fc fc
[   16.613419]  ffff888101e64280: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.614519] >ffff888101e64300: 00 02 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   16.615319]                                            ^
[   16.616471]  ffff888101e64380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.617307]  ffff888101e64400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.617861] ==================================================================

test log snippet boot parser 165

Home

[   17.037432] ==================================================================
[   17.038270] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a4/0x360
[   17.039205] Write of size 33 at addr ffff888101ff9e80 by task kunit_try_catch/190
[   17.040758] 
[   17.040961] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.042149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.042612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.044169] Call Trace:
[   17.044822]  <TASK>
[   17.045226]  dump_stack_lvl+0x73/0xb0
[   17.045906]  print_report+0xd1/0x640
[   17.046454]  ? __virt_addr_valid+0x1db/0x2d0
[   17.047039]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.047601]  kasan_report+0x102/0x140
[   17.048037]  ? kmalloc_uaf_memset+0x1a4/0x360
[   17.048455]  ? kmalloc_uaf_memset+0x1a4/0x360
[   17.049297]  kasan_check_range+0x10c/0x1c0
[   17.050195]  __asan_memset+0x27/0x50
[   17.050760]  kmalloc_uaf_memset+0x1a4/0x360
[   17.051265]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   17.051938]  ? __schedule+0xc51/0x27c0
[   17.052336]  ? __pfx_read_tsc+0x10/0x10
[   17.052833]  ? ktime_get_ts64+0x84/0x230
[   17.053688]  kunit_try_run_case+0x1b3/0x490
[   17.054458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.055012]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.055804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.056214]  ? __kthread_parkme+0x82/0x160
[   17.056732]  ? preempt_count_sub+0x50/0x80
[   17.057344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.057987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.058788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.059802]  kthread+0x257/0x310
[   17.060187]  ? __pfx_kthread+0x10/0x10
[   17.060742]  ret_from_fork+0x41/0x80
[   17.061118]  ? __pfx_kthread+0x10/0x10
[   17.061615]  ret_from_fork_asm+0x1a/0x30
[   17.062256]  </TASK>
[   17.063002] 
[   17.063191] Allocated by task 190:
[   17.063740]  kasan_save_stack+0x3d/0x60
[   17.064137]  kasan_save_track+0x18/0x40
[   17.064722]  kasan_save_alloc_info+0x3b/0x50
[   17.065200]  __kasan_kmalloc+0xb7/0xc0
[   17.065710]  __kmalloc_cache_noprof+0x162/0x350
[   17.066166]  kmalloc_uaf_memset+0xaa/0x360
[   17.066639]  kunit_try_run_case+0x1b3/0x490
[   17.067047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.067582]  kthread+0x257/0x310
[   17.068480]  ret_from_fork+0x41/0x80
[   17.068936]  ret_from_fork_asm+0x1a/0x30
[   17.069585] 
[   17.069869] Freed by task 190:
[   17.070142]  kasan_save_stack+0x3d/0x60
[   17.070730]  kasan_save_track+0x18/0x40
[   17.071205]  kasan_save_free_info+0x3f/0x60
[   17.071800]  __kasan_slab_free+0x56/0x70
[   17.072222]  kfree+0x123/0x3d0
[   17.072930]  kmalloc_uaf_memset+0x12c/0x360
[   17.073459]  kunit_try_run_case+0x1b3/0x490
[   17.074017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.074842]  kthread+0x257/0x310
[   17.075194]  ret_from_fork+0x41/0x80
[   17.076273]  ret_from_fork_asm+0x1a/0x30
[   17.077039] 
[   17.077279] The buggy address belongs to the object at ffff888101ff9e80
[   17.077279]  which belongs to the cache kmalloc-64 of size 64
[   17.078323] The buggy address is located 0 bytes inside of
[   17.078323]  freed 64-byte region [ffff888101ff9e80, ffff888101ff9ec0)
[   17.079931] 
[   17.080118] The buggy address belongs to the physical page:
[   17.080926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ff9
[   17.081735] flags: 0x200000000000000(node=0|zone=2)
[   17.082218] page_type: f5(slab)
[   17.082622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.083867] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   17.084615] page dumped because: kasan: bad access detected
[   17.085066] 
[   17.085424] Memory state around the buggy address:
[   17.085875]  ffff888101ff9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.086465]  ffff888101ff9e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.087655] >ffff888101ff9e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.088424]                    ^
[   17.088757]  ffff888101ff9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.089617]  ffff888101ff9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.090022] ==================================================================

test log snippet boot parser 166

Home

[   17.994395] ==================================================================
[   17.995242] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[   17.996234] Read of size 1 at addr ffff888101425b40 by task kunit_try_catch/219
[   17.996767] 
[   17.997208] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.997858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.999015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.000271] Call Trace:
[   18.000715]  <TASK>
[   18.001019]  dump_stack_lvl+0x73/0xb0
[   18.001464]  print_report+0xd1/0x640
[   18.001859]  ? __virt_addr_valid+0x1db/0x2d0
[   18.002248]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.002733]  kasan_report+0x102/0x140
[   18.003237]  ? kmem_cache_double_destroy+0x1bd/0x380
[   18.003922]  ? kmem_cache_double_destroy+0x1bd/0x380
[   18.004539]  ? kmem_cache_double_destroy+0x1bd/0x380
[   18.004990]  __kasan_check_byte+0x3d/0x50
[   18.005529]  kmem_cache_destroy+0x25/0x1d0
[   18.005924]  kmem_cache_double_destroy+0x1bd/0x380
[   18.006505]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   18.007811]  ? finish_task_switch.isra.0+0x153/0x700
[   18.008361]  ? __switch_to+0x5d9/0xf60
[   18.009125]  ? __pfx_empty_cache_ctor+0x10/0x10
[   18.009735]  ? __pfx_read_tsc+0x10/0x10
[   18.010344]  ? ktime_get_ts64+0x84/0x230
[   18.010827]  kunit_try_run_case+0x1b3/0x490
[   18.011321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.011814]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.012330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.012742]  ? __kthread_parkme+0x82/0x160
[   18.013381]  ? preempt_count_sub+0x50/0x80
[   18.013874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.014403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.015285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.015675]  kthread+0x257/0x310
[   18.016278]  ? __pfx_kthread+0x10/0x10
[   18.016667]  ret_from_fork+0x41/0x80
[   18.017499]  ? __pfx_kthread+0x10/0x10
[   18.017967]  ret_from_fork_asm+0x1a/0x30
[   18.018534]  </TASK>
[   18.018804] 
[   18.019034] Allocated by task 219:
[   18.019414]  kasan_save_stack+0x3d/0x60
[   18.019924]  kasan_save_track+0x18/0x40
[   18.020455]  kasan_save_alloc_info+0x3b/0x50
[   18.020902]  __kasan_slab_alloc+0x91/0xa0
[   18.021373]  kmem_cache_alloc_noprof+0x101/0x340
[   18.021799]  __kmem_cache_create_args+0x18a/0x280
[   18.022357]  kmem_cache_double_destroy+0xd3/0x380
[   18.022843]  kunit_try_run_case+0x1b3/0x490
[   18.023260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.023682]  kthread+0x257/0x310
[   18.024180]  ret_from_fork+0x41/0x80
[   18.024642]  ret_from_fork_asm+0x1a/0x30
[   18.025795] 
[   18.026018] Freed by task 219:
[   18.026958]  kasan_save_stack+0x3d/0x60
[   18.027364]  kasan_save_track+0x18/0x40
[   18.027918]  kasan_save_free_info+0x3f/0x60
[   18.028373]  __kasan_slab_free+0x56/0x70
[   18.028744]  kmem_cache_free+0x120/0x400
[   18.029267]  slab_kmem_cache_release+0x2e/0x40
[   18.030403]  kmem_cache_release+0x16/0x20
[   18.031172]  kobject_put+0x181/0x450
[   18.031648]  sysfs_slab_release+0x16/0x20
[   18.032047]  kmem_cache_destroy+0xf0/0x1d0
[   18.032557]  kmem_cache_double_destroy+0x14c/0x380
[   18.033235]  kunit_try_run_case+0x1b3/0x490
[   18.034148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.034708]  kthread+0x257/0x310
[   18.035223]  ret_from_fork+0x41/0x80
[   18.035849]  ret_from_fork_asm+0x1a/0x30
[   18.036262] 
[   18.036814] The buggy address belongs to the object at ffff888101425b40
[   18.036814]  which belongs to the cache kmem_cache of size 208
[   18.038350] The buggy address is located 0 bytes inside of
[   18.038350]  freed 208-byte region [ffff888101425b40, ffff888101425c10)
[   18.039110] 
[   18.039345] The buggy address belongs to the physical page:
[   18.039833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101425
[   18.040574] flags: 0x200000000000000(node=0|zone=2)
[   18.041623] page_type: f5(slab)
[   18.042214] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   18.043082] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   18.043896] page dumped because: kasan: bad access detected
[   18.044166] 
[   18.044265] Memory state around the buggy address:
[   18.044430]  ffff888101425a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.044649]  ffff888101425a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   18.045021] >ffff888101425b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.046545]                                            ^
[   18.047065]  ffff888101425b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.048259]  ffff888101425c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049069] ==================================================================

test log snippet boot parser 167

Home

[   17.914896] ==================================================================
[   17.915613] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e5/0x510
[   17.916590] Read of size 1 at addr ffff88810200a000 by task kunit_try_catch/217
[   17.917224] 
[   17.917484] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.918238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.918818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.919634] Call Trace:
[   17.920023]  <TASK>
[   17.920442]  dump_stack_lvl+0x73/0xb0
[   17.920968]  print_report+0xd1/0x640
[   17.921616]  ? __virt_addr_valid+0x1db/0x2d0
[   17.922349]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.922833]  kasan_report+0x102/0x140
[   17.923184]  ? kmem_cache_rcu_uaf+0x3e5/0x510
[   17.923624]  ? kmem_cache_rcu_uaf+0x3e5/0x510
[   17.924215]  __asan_report_load1_noabort+0x18/0x20
[   17.925077]  kmem_cache_rcu_uaf+0x3e5/0x510
[   17.925386]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   17.925988]  ? finish_task_switch.isra.0+0x153/0x700
[   17.926715]  ? __switch_to+0x5d9/0xf60
[   17.927049]  ? __pfx_read_tsc+0x10/0x10
[   17.927528]  ? ktime_get_ts64+0x84/0x230
[   17.927983]  kunit_try_run_case+0x1b3/0x490
[   17.928479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.928912]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.929477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.929953]  ? __kthread_parkme+0x82/0x160
[   17.930479]  ? preempt_count_sub+0x50/0x80
[   17.930962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.931465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.932070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.932922]  kthread+0x257/0x310
[   17.933343]  ? __pfx_kthread+0x10/0x10
[   17.933823]  ret_from_fork+0x41/0x80
[   17.934246]  ? __pfx_kthread+0x10/0x10
[   17.934696]  ret_from_fork_asm+0x1a/0x30
[   17.935256]  </TASK>
[   17.935541] 
[   17.935746] Allocated by task 217:
[   17.936173]  kasan_save_stack+0x3d/0x60
[   17.936591]  kasan_save_track+0x18/0x40
[   17.937070]  kasan_save_alloc_info+0x3b/0x50
[   17.937492]  __kasan_slab_alloc+0x91/0xa0
[   17.937943]  kmem_cache_alloc_noprof+0x101/0x340
[   17.938466]  kmem_cache_rcu_uaf+0x156/0x510
[   17.938945]  kunit_try_run_case+0x1b3/0x490
[   17.939457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.939911]  kthread+0x257/0x310
[   17.940255]  ret_from_fork+0x41/0x80
[   17.940652]  ret_from_fork_asm+0x1a/0x30
[   17.941138] 
[   17.941359] Freed by task 0:
[   17.941725]  kasan_save_stack+0x3d/0x60
[   17.942160]  kasan_save_track+0x18/0x40
[   17.942609]  kasan_save_free_info+0x3f/0x60
[   17.943074]  __kasan_slab_free+0x56/0x70
[   17.943496]  slab_free_after_rcu_debug+0xe4/0x2f0
[   17.943936]  rcu_core+0x683/0x1c80
[   17.944378]  rcu_core_si+0x12/0x20
[   17.944741]  handle_softirqs+0x209/0x720
[   17.945267]  irq_exit_rcu+0x9c/0xd0
[   17.945616]  sysvec_apic_timer_interrupt+0x81/0x90
[   17.946153]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   17.946753] 
[   17.947076] Last potentially related work creation:
[   17.947549]  kasan_save_stack+0x3d/0x60
[   17.947895]  __kasan_record_aux_stack+0xae/0xc0
[   17.948455]  kasan_record_aux_stack_noalloc+0xf/0x20
[   17.949129]  kmem_cache_free+0x276/0x400
[   17.949524]  kmem_cache_rcu_uaf+0x195/0x510
[   17.949867]  kunit_try_run_case+0x1b3/0x490
[   17.950516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.951030]  kthread+0x257/0x310
[   17.951423]  ret_from_fork+0x41/0x80
[   17.951881]  ret_from_fork_asm+0x1a/0x30
[   17.952273] 
[   17.952444] The buggy address belongs to the object at ffff88810200a000
[   17.952444]  which belongs to the cache test_cache of size 200
[   17.954320] The buggy address is located 0 bytes inside of
[   17.954320]  freed 200-byte region [ffff88810200a000, ffff88810200a0c8)
[   17.955995] 
[   17.956233] The buggy address belongs to the physical page:
[   17.956866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10200a
[   17.957825] flags: 0x200000000000000(node=0|zone=2)
[   17.958540] page_type: f5(slab)
[   17.959052] raw: 0200000000000000 ffff8881015d18c0 dead000000000122 0000000000000000
[   17.959750] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   17.960027] page dumped because: kasan: bad access detected
[   17.960248] 
[   17.960556] Memory state around the buggy address:
[   17.961324]  ffff888102009f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.961913]  ffff888102009f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.962483] >ffff88810200a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.963095]                    ^
[   17.963660]  ffff88810200a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.964453]  ffff88810200a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.965019] ==================================================================

test log snippet boot parser 168

Home

[   16.405876] ==================================================================
[   16.407115] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0
[   16.408324] Read of size 1 at addr ffff88810039b800 by task kunit_try_catch/168
[   16.409702] 
[   16.409966] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.411286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.411862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.412739] Call Trace:
[   16.412959]  <TASK>
[   16.413192]  dump_stack_lvl+0x73/0xb0
[   16.413734]  print_report+0xd1/0x640
[   16.414193]  ? __virt_addr_valid+0x1db/0x2d0
[   16.415365]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.415963]  kasan_report+0x102/0x140
[   16.416309]  ? krealloc_uaf+0x1b9/0x5e0
[   16.416810]  ? krealloc_uaf+0x1b9/0x5e0
[   16.417613]  ? krealloc_uaf+0x1b9/0x5e0
[   16.417931]  __kasan_check_byte+0x3d/0x50
[   16.418254]  krealloc_noprof+0x35/0x140
[   16.418587]  krealloc_uaf+0x1b9/0x5e0
[   16.419064]  ? __pfx_krealloc_uaf+0x10/0x10
[   16.419491]  ? finish_task_switch.isra.0+0x153/0x700
[   16.420096]  ? __switch_to+0x5d9/0xf60
[   16.420616]  ? __schedule+0xc51/0x27c0
[   16.421002]  ? __pfx_read_tsc+0x10/0x10
[   16.421975]  ? ktime_get_ts64+0x84/0x230
[   16.422494]  kunit_try_run_case+0x1b3/0x490
[   16.423227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424152]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.424836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.425297]  ? __kthread_parkme+0x82/0x160
[   16.425746]  ? preempt_count_sub+0x50/0x80
[   16.426267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.427413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.427931]  kthread+0x257/0x310
[   16.428289]  ? __pfx_kthread+0x10/0x10
[   16.428648]  ret_from_fork+0x41/0x80
[   16.429763]  ? __pfx_kthread+0x10/0x10
[   16.430129]  ret_from_fork_asm+0x1a/0x30
[   16.430735]  </TASK>
[   16.431038] 
[   16.431258] Allocated by task 168:
[   16.431707]  kasan_save_stack+0x3d/0x60
[   16.432111]  kasan_save_track+0x18/0x40
[   16.432702]  kasan_save_alloc_info+0x3b/0x50
[   16.433087]  __kasan_kmalloc+0xb7/0xc0
[   16.434080]  __kmalloc_cache_noprof+0x162/0x350
[   16.434470]  krealloc_uaf+0xbc/0x5e0
[   16.435017]  kunit_try_run_case+0x1b3/0x490
[   16.435573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.436120]  kthread+0x257/0x310
[   16.436475]  ret_from_fork+0x41/0x80
[   16.436942]  ret_from_fork_asm+0x1a/0x30
[   16.437298] 
[   16.437686] Freed by task 168:
[   16.438078]  kasan_save_stack+0x3d/0x60
[   16.439120]  kasan_save_track+0x18/0x40
[   16.439615]  kasan_save_free_info+0x3f/0x60
[   16.440053]  __kasan_slab_free+0x56/0x70
[   16.440742]  kfree+0x123/0x3d0
[   16.441107]  krealloc_uaf+0x13e/0x5e0
[   16.441601]  kunit_try_run_case+0x1b3/0x490
[   16.442104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.442724]  kthread+0x257/0x310
[   16.443089]  ret_from_fork+0x41/0x80
[   16.444052]  ret_from_fork_asm+0x1a/0x30
[   16.444571] 
[   16.444836] The buggy address belongs to the object at ffff88810039b800
[   16.444836]  which belongs to the cache kmalloc-256 of size 256
[   16.445707] The buggy address is located 0 bytes inside of
[   16.445707]  freed 256-byte region [ffff88810039b800, ffff88810039b900)
[   16.446879] 
[   16.447117] The buggy address belongs to the physical page:
[   16.447708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   16.448330] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.449087] flags: 0x200000000000040(head|node=0|zone=2)
[   16.450248] page_type: f5(slab)
[   16.450603] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.451285] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.452138] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.452945] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.453717] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   16.454366] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.454904] page dumped because: kasan: bad access detected
[   16.455334] 
[   16.455558] Memory state around the buggy address:
[   16.456079]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.457358]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.457924] >ffff88810039b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.458440]                    ^
[   16.458758]  ffff88810039b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.459660]  ffff88810039b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.460228] ==================================================================

test log snippet boot parser 169

Home

[   16.463455] ==================================================================
[   16.464226] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53e/0x5e0
[   16.464636] Read of size 1 at addr ffff88810039b800 by task kunit_try_catch/168
[   16.465283] 
[   16.465526] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   16.466228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.466576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.467573] Call Trace:
[   16.467894]  <TASK>
[   16.468143]  dump_stack_lvl+0x73/0xb0
[   16.468714]  print_report+0xd1/0x640
[   16.469134]  ? __virt_addr_valid+0x1db/0x2d0
[   16.470273]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.470933]  kasan_report+0x102/0x140
[   16.471375]  ? krealloc_uaf+0x53e/0x5e0
[   16.471904]  ? krealloc_uaf+0x53e/0x5e0
[   16.472393]  __asan_report_load1_noabort+0x18/0x20
[   16.473194]  krealloc_uaf+0x53e/0x5e0
[   16.473565]  ? __pfx_krealloc_uaf+0x10/0x10
[   16.474011]  ? finish_task_switch.isra.0+0x153/0x700
[   16.474488]  ? __switch_to+0x5d9/0xf60
[   16.475199]  ? __schedule+0xc51/0x27c0
[   16.476067]  ? __pfx_read_tsc+0x10/0x10
[   16.476662]  ? ktime_get_ts64+0x84/0x230
[   16.477139]  kunit_try_run_case+0x1b3/0x490
[   16.477733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.478166]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.478799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.479254]  ? __kthread_parkme+0x82/0x160
[   16.479833]  ? preempt_count_sub+0x50/0x80
[   16.480233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.481272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.481859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.482395]  kthread+0x257/0x310
[   16.482794]  ? __pfx_kthread+0x10/0x10
[   16.483134]  ret_from_fork+0x41/0x80
[   16.483522]  ? __pfx_kthread+0x10/0x10
[   16.484006]  ret_from_fork_asm+0x1a/0x30
[   16.484608]  </TASK>
[   16.484911] 
[   16.485089] Allocated by task 168:
[   16.485574]  kasan_save_stack+0x3d/0x60
[   16.486024]  kasan_save_track+0x18/0x40
[   16.486428]  kasan_save_alloc_info+0x3b/0x50
[   16.487005]  __kasan_kmalloc+0xb7/0xc0
[   16.487964]  __kmalloc_cache_noprof+0x162/0x350
[   16.488393]  krealloc_uaf+0xbc/0x5e0
[   16.488893]  kunit_try_run_case+0x1b3/0x490
[   16.489316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.489964]  kthread+0x257/0x310
[   16.490312]  ret_from_fork+0x41/0x80
[   16.490851]  ret_from_fork_asm+0x1a/0x30
[   16.491225] 
[   16.491612] Freed by task 168:
[   16.491950]  kasan_save_stack+0x3d/0x60
[   16.492347]  kasan_save_track+0x18/0x40
[   16.492713]  kasan_save_free_info+0x3f/0x60
[   16.493159]  __kasan_slab_free+0x56/0x70
[   16.493568]  kfree+0x123/0x3d0
[   16.494677]  krealloc_uaf+0x13e/0x5e0
[   16.495014]  kunit_try_run_case+0x1b3/0x490
[   16.495604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.496053]  kthread+0x257/0x310
[   16.496573]  ret_from_fork+0x41/0x80
[   16.496988]  ret_from_fork_asm+0x1a/0x30
[   16.497567] 
[   16.497814] The buggy address belongs to the object at ffff88810039b800
[   16.497814]  which belongs to the cache kmalloc-256 of size 256
[   16.499274] The buggy address is located 0 bytes inside of
[   16.499274]  freed 256-byte region [ffff88810039b800, ffff88810039b900)
[   16.500231] 
[   16.500462] The buggy address belongs to the physical page:
[   16.500926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039a
[   16.501832] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.502661] flags: 0x200000000000040(head|node=0|zone=2)
[   16.503131] page_type: f5(slab)
[   16.504249] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.504951] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.505717] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.506342] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.507053] head: 0200000000000001 ffffea000400e681 ffffffffffffffff 0000000000000000
[   16.507619] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.508219] page dumped because: kasan: bad access detected
[   16.508587] 
[   16.508974] Memory state around the buggy address:
[   16.509439]  ffff88810039b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.510811]  ffff88810039b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511365] >ffff88810039b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.512002]                    ^
[   16.512365]  ffff88810039b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.513064]  ffff88810039b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.513758] ==================================================================

test log snippet boot parser 170

Home

[   17.449119] ==================================================================
[   17.449677] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0
[   17.451350] Read of size 1 at addr ffff888101ffff00 by task kunit_try_catch/200
[   17.451878] 
[   17.452114] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.452903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.453219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.454015] Call Trace:
[   17.454634]  <TASK>
[   17.454905]  dump_stack_lvl+0x73/0xb0
[   17.455080]  print_report+0xd1/0x640
[   17.455293]  ? __virt_addr_valid+0x1db/0x2d0
[   17.455691]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.456657]  kasan_report+0x102/0x140
[   17.457416]  ? ksize_uaf+0x600/0x6c0
[   17.457917]  ? ksize_uaf+0x600/0x6c0
[   17.458500]  __asan_report_load1_noabort+0x18/0x20
[   17.458965]  ksize_uaf+0x600/0x6c0
[   17.459441]  ? __pfx_ksize_uaf+0x10/0x10
[   17.460015]  ? __schedule+0x1b8d/0x27c0
[   17.460732]  ? __pfx_read_tsc+0x10/0x10
[   17.461104]  ? ktime_get_ts64+0x84/0x230
[   17.462051]  kunit_try_run_case+0x1b3/0x490
[   17.462440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.463008]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.463684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.464079]  ? __kthread_parkme+0x82/0x160
[   17.464488]  ? preempt_count_sub+0x50/0x80
[   17.464895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.465960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.466539]  kthread+0x257/0x310
[   17.466932]  ? __pfx_kthread+0x10/0x10
[   17.467375]  ret_from_fork+0x41/0x80
[   17.467750]  ? __pfx_kthread+0x10/0x10
[   17.468168]  ret_from_fork_asm+0x1a/0x30
[   17.468648]  </TASK>
[   17.468945] 
[   17.469130] Allocated by task 200:
[   17.469484]  kasan_save_stack+0x3d/0x60
[   17.469906]  kasan_save_track+0x18/0x40
[   17.470368]  kasan_save_alloc_info+0x3b/0x50
[   17.470706]  __kasan_kmalloc+0xb7/0xc0
[   17.471068]  __kmalloc_cache_noprof+0x162/0x350
[   17.471578]  ksize_uaf+0xab/0x6c0
[   17.471969]  kunit_try_run_case+0x1b3/0x490
[   17.472408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.472887]  kthread+0x257/0x310
[   17.473242]  ret_from_fork+0x41/0x80
[   17.473541]  ret_from_fork_asm+0x1a/0x30
[   17.473967] 
[   17.474235] Freed by task 200:
[   17.474560]  kasan_save_stack+0x3d/0x60
[   17.474988]  kasan_save_track+0x18/0x40
[   17.475410]  kasan_save_free_info+0x3f/0x60
[   17.475832]  __kasan_slab_free+0x56/0x70
[   17.476263]  kfree+0x123/0x3d0
[   17.476563]  ksize_uaf+0x12d/0x6c0
[   17.476953]  kunit_try_run_case+0x1b3/0x490
[   17.477386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.477908]  kthread+0x257/0x310
[   17.478341]  ret_from_fork+0x41/0x80
[   17.478682]  ret_from_fork_asm+0x1a/0x30
[   17.479091] 
[   17.479349] The buggy address belongs to the object at ffff888101ffff00
[   17.479349]  which belongs to the cache kmalloc-128 of size 128
[   17.480116] The buggy address is located 0 bytes inside of
[   17.480116]  freed 128-byte region [ffff888101ffff00, ffff888101ffff80)
[   17.481084] 
[   17.481340] The buggy address belongs to the physical page:
[   17.481922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   17.483234] flags: 0x200000000000000(node=0|zone=2)
[   17.483726] page_type: f5(slab)
[   17.484118] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.484693] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.485287] page dumped because: kasan: bad access detected
[   17.485811] 
[   17.486030] Memory state around the buggy address:
[   17.486548]  ffff888101fffe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.487161]  ffff888101fffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.487825] >ffff888101ffff00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.488456]                    ^
[   17.488821]  ffff888101ffff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.489283]  ffff888102000000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.489923] ==================================================================

test log snippet boot parser 171

Home

[   17.492635] ==================================================================
[   17.493400] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0
[   17.494108] Read of size 1 at addr ffff888101ffff78 by task kunit_try_catch/200
[   17.494833] 
[   17.495790] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.496829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.497361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.498172] Call Trace:
[   17.498415]  <TASK>
[   17.498618]  dump_stack_lvl+0x73/0xb0
[   17.498934]  print_report+0xd1/0x640
[   17.499388]  ? __virt_addr_valid+0x1db/0x2d0
[   17.499860]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.500274]  kasan_report+0x102/0x140
[   17.500758]  ? ksize_uaf+0x5e6/0x6c0
[   17.501186]  ? ksize_uaf+0x5e6/0x6c0
[   17.501969]  __asan_report_load1_noabort+0x18/0x20
[   17.502357]  ksize_uaf+0x5e6/0x6c0
[   17.502647]  ? __pfx_ksize_uaf+0x10/0x10
[   17.502990]  ? __schedule+0x1b8d/0x27c0
[   17.503818]  ? __pfx_read_tsc+0x10/0x10
[   17.504311]  ? ktime_get_ts64+0x84/0x230
[   17.504988]  kunit_try_run_case+0x1b3/0x490
[   17.505883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.506494]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.507193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.507682]  ? __kthread_parkme+0x82/0x160
[   17.508035]  ? preempt_count_sub+0x50/0x80
[   17.508428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.508816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.509241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.509790]  kthread+0x257/0x310
[   17.510131]  ? __pfx_kthread+0x10/0x10
[   17.510540]  ret_from_fork+0x41/0x80
[   17.510960]  ? __pfx_kthread+0x10/0x10
[   17.511357]  ret_from_fork_asm+0x1a/0x30
[   17.511715]  </TASK>
[   17.512004] 
[   17.512214] Allocated by task 200:
[   17.512651]  kasan_save_stack+0x3d/0x60
[   17.513107]  kasan_save_track+0x18/0x40
[   17.513532]  kasan_save_alloc_info+0x3b/0x50
[   17.513987]  __kasan_kmalloc+0xb7/0xc0
[   17.514325]  __kmalloc_cache_noprof+0x162/0x350
[   17.514666]  ksize_uaf+0xab/0x6c0
[   17.515068]  kunit_try_run_case+0x1b3/0x490
[   17.515709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516099]  kthread+0x257/0x310
[   17.516596]  ret_from_fork+0x41/0x80
[   17.517003]  ret_from_fork_asm+0x1a/0x30
[   17.517543] 
[   17.517758] Freed by task 200:
[   17.518084]  kasan_save_stack+0x3d/0x60
[   17.518457]  kasan_save_track+0x18/0x40
[   17.518756]  kasan_save_free_info+0x3f/0x60
[   17.519342]  __kasan_slab_free+0x56/0x70
[   17.519758]  kfree+0x123/0x3d0
[   17.520132]  ksize_uaf+0x12d/0x6c0
[   17.520449]  kunit_try_run_case+0x1b3/0x490
[   17.520858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.521251]  kthread+0x257/0x310
[   17.521606]  ret_from_fork+0x41/0x80
[   17.522022]  ret_from_fork_asm+0x1a/0x30
[   17.522457] 
[   17.522659] The buggy address belongs to the object at ffff888101ffff00
[   17.522659]  which belongs to the cache kmalloc-128 of size 128
[   17.523339] The buggy address is located 120 bytes inside of
[   17.523339]  freed 128-byte region [ffff888101ffff00, ffff888101ffff80)
[   17.524359] 
[   17.524614] The buggy address belongs to the physical page:
[   17.525099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   17.525894] flags: 0x200000000000000(node=0|zone=2)
[   17.526242] page_type: f5(slab)
[   17.526552] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.527196] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.528022] page dumped because: kasan: bad access detected
[   17.528521] 
[   17.528690] Memory state around the buggy address:
[   17.529031]  ffff888101fffe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.529586]  ffff888101fffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.530295] >ffff888101ffff00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.531067]                                                                 ^
[   17.531574]  ffff888101ffff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.532003]  ffff888102000000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.532510] ==================================================================

test log snippet boot parser 172

Home

[   17.402265] ==================================================================
[   17.403123] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0
[   17.403701] Read of size 1 at addr ffff888101ffff00 by task kunit_try_catch/200
[   17.404234] 
[   17.404576] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.405647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.405960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.406877] Call Trace:
[   17.407716]  <TASK>
[   17.407994]  dump_stack_lvl+0x73/0xb0
[   17.408464]  print_report+0xd1/0x640
[   17.408905]  ? __virt_addr_valid+0x1db/0x2d0
[   17.409710]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.410330]  kasan_report+0x102/0x140
[   17.410926]  ? ksize_uaf+0x19e/0x6c0
[   17.411582]  ? ksize_uaf+0x19e/0x6c0
[   17.412023]  ? ksize_uaf+0x19e/0x6c0
[   17.412463]  __kasan_check_byte+0x3d/0x50
[   17.413064]  ksize+0x20/0x60
[   17.413492]  ksize_uaf+0x19e/0x6c0
[   17.413978]  ? __pfx_ksize_uaf+0x10/0x10
[   17.414182]  ? __schedule+0x1b8d/0x27c0
[   17.414938]  ? __pfx_read_tsc+0x10/0x10
[   17.415666]  ? ktime_get_ts64+0x84/0x230
[   17.416074]  kunit_try_run_case+0x1b3/0x490
[   17.416731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.417202]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.417619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.418071]  ? __kthread_parkme+0x82/0x160
[   17.418436]  ? preempt_count_sub+0x50/0x80
[   17.418917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.419371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.419799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.420401]  kthread+0x257/0x310
[   17.420859]  ? __pfx_kthread+0x10/0x10
[   17.421339]  ret_from_fork+0x41/0x80
[   17.421762]  ? __pfx_kthread+0x10/0x10
[   17.422183]  ret_from_fork_asm+0x1a/0x30
[   17.422631]  </TASK>
[   17.422962] 
[   17.423227] Allocated by task 200:
[   17.423627]  kasan_save_stack+0x3d/0x60
[   17.424060]  kasan_save_track+0x18/0x40
[   17.424575]  kasan_save_alloc_info+0x3b/0x50
[   17.425025]  __kasan_kmalloc+0xb7/0xc0
[   17.425480]  __kmalloc_cache_noprof+0x162/0x350
[   17.425945]  ksize_uaf+0xab/0x6c0
[   17.426383]  kunit_try_run_case+0x1b3/0x490
[   17.426849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.427433]  kthread+0x257/0x310
[   17.427736]  ret_from_fork+0x41/0x80
[   17.428154]  ret_from_fork_asm+0x1a/0x30
[   17.428646] 
[   17.428889] Freed by task 200:
[   17.429268]  kasan_save_stack+0x3d/0x60
[   17.429725]  kasan_save_track+0x18/0x40
[   17.430221]  kasan_save_free_info+0x3f/0x60
[   17.430682]  __kasan_slab_free+0x56/0x70
[   17.431178]  kfree+0x123/0x3d0
[   17.431609]  ksize_uaf+0x12d/0x6c0
[   17.432025]  kunit_try_run_case+0x1b3/0x490
[   17.433453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.433944]  kthread+0x257/0x310
[   17.434258]  ret_from_fork+0x41/0x80
[   17.435085]  ret_from_fork_asm+0x1a/0x30
[   17.435571] 
[   17.435755] The buggy address belongs to the object at ffff888101ffff00
[   17.435755]  which belongs to the cache kmalloc-128 of size 128
[   17.437350] The buggy address is located 0 bytes inside of
[   17.437350]  freed 128-byte region [ffff888101ffff00, ffff888101ffff80)
[   17.438522] 
[   17.438863] The buggy address belongs to the physical page:
[   17.439255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff
[   17.439882] flags: 0x200000000000000(node=0|zone=2)
[   17.440328] page_type: f5(slab)
[   17.440680] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.441251] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.441972] page dumped because: kasan: bad access detected
[   17.442452] 
[   17.442610] Memory state around the buggy address:
[   17.442972]  ffff888101fffe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.444209]  ffff888101fffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.445076] >ffff888101ffff00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.445752]                    ^
[   17.446169]  ffff888101ffff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.446686]  ffff888102000000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.447176] ==================================================================

test log snippet boot parser 173

Home

[   18.860913] ==================================================================
[   18.861850] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   18.862465] Read of size 1 at addr ffff888102c39240 by task kunit_try_catch/235
[   18.863988] 
[   18.864288] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.865060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.865488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.866268] Call Trace:
[   18.866489]  <TASK>
[   18.866825]  dump_stack_lvl+0x73/0xb0
[   18.867289]  print_report+0xd1/0x640
[   18.867711]  ? __virt_addr_valid+0x1db/0x2d0
[   18.868246]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.868736]  kasan_report+0x102/0x140
[   18.869228]  ? mempool_uaf_helper+0x394/0x400
[   18.869673]  ? mempool_uaf_helper+0x394/0x400
[   18.870231]  __asan_report_load1_noabort+0x18/0x20
[   18.870721]  mempool_uaf_helper+0x394/0x400
[   18.871280]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   18.871760]  ? finish_task_switch.isra.0+0x153/0x700
[   18.872391]  mempool_slab_uaf+0xae/0x100
[   18.872834]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   18.873334]  ? __switch_to+0x5d9/0xf60
[   18.873824]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   18.874333]  ? __pfx_mempool_free_slab+0x10/0x10
[   18.874886]  ? __pfx_read_tsc+0x10/0x10
[   18.875349]  ? ktime_get_ts64+0x84/0x230
[   18.875711]  kunit_try_run_case+0x1b3/0x490
[   18.876270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.876722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.877277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.877832]  ? __kthread_parkme+0x82/0x160
[   18.878328]  ? preempt_count_sub+0x50/0x80
[   18.878841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.879379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.879947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.880577]  kthread+0x257/0x310
[   18.880959]  ? __pfx_kthread+0x10/0x10
[   18.881425]  ret_from_fork+0x41/0x80
[   18.881807]  ? __pfx_kthread+0x10/0x10
[   18.882270]  ret_from_fork_asm+0x1a/0x30
[   18.882703]  </TASK>
[   18.883031] 
[   18.883341] Allocated by task 235:
[   18.883675]  kasan_save_stack+0x3d/0x60
[   18.884148]  kasan_save_track+0x18/0x40
[   18.884620]  kasan_save_alloc_info+0x3b/0x50
[   18.885099]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   18.885694]  remove_element+0x11e/0x190
[   18.886181]  mempool_alloc_preallocated+0x4d/0x90
[   18.886617]  mempool_uaf_helper+0x97/0x400
[   18.887123]  mempool_slab_uaf+0xae/0x100
[   18.887518]  kunit_try_run_case+0x1b3/0x490
[   18.887874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.888356]  kthread+0x257/0x310
[   18.888672]  ret_from_fork+0x41/0x80
[   18.889146]  ret_from_fork_asm+0x1a/0x30
[   18.889653] 
[   18.889893] Freed by task 235:
[   18.890152]  kasan_save_stack+0x3d/0x60
[   18.890506]  kasan_save_track+0x18/0x40
[   18.890984]  kasan_save_free_info+0x3f/0x60
[   18.891482]  __kasan_mempool_poison_object+0x131/0x1d0
[   18.892004]  mempool_free+0x2ec/0x380
[   18.892475]  mempool_uaf_helper+0x11b/0x400
[   18.892931]  mempool_slab_uaf+0xae/0x100
[   18.894367]  kunit_try_run_case+0x1b3/0x490
[   18.895375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.896037]  kthread+0x257/0x310
[   18.896380]  ret_from_fork+0x41/0x80
[   18.896807]  ret_from_fork_asm+0x1a/0x30
[   18.897272] 
[   18.897543] The buggy address belongs to the object at ffff888102c39240
[   18.897543]  which belongs to the cache test_cache of size 123
[   18.898566] The buggy address is located 0 bytes inside of
[   18.898566]  freed 123-byte region [ffff888102c39240, ffff888102c392bb)
[   18.899521] 
[   18.899763] The buggy address belongs to the physical page:
[   18.900280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   18.901027] flags: 0x200000000000000(node=0|zone=2)
[   18.901538] page_type: f5(slab)
[   18.901965] raw: 0200000000000000 ffff888101425dc0 dead000000000122 0000000000000000
[   18.902626] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   18.903289] page dumped because: kasan: bad access detected
[   18.903789] 
[   18.904013] Memory state around the buggy address:
[   18.904520]  ffff888102c39100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.905143]  ffff888102c39180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.905788] >ffff888102c39200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.906391]                                            ^
[   18.906854]  ffff888102c39280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.907533]  ffff888102c39300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.908125] ==================================================================

test log snippet boot parser 174

Home

[   18.759129] ==================================================================
[   18.759842] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   18.760898] Read of size 1 at addr ffff88810200d200 by task kunit_try_catch/231
[   18.762077] 
[   18.762663] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.763499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.763950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.764818] Call Trace:
[   18.765411]  <TASK>
[   18.765650]  dump_stack_lvl+0x73/0xb0
[   18.766122]  print_report+0xd1/0x640
[   18.766503]  ? __virt_addr_valid+0x1db/0x2d0
[   18.766916]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.767330]  kasan_report+0x102/0x140
[   18.767714]  ? mempool_uaf_helper+0x394/0x400
[   18.768260]  ? mempool_uaf_helper+0x394/0x400
[   18.768732]  __asan_report_load1_noabort+0x18/0x20
[   18.769101]  mempool_uaf_helper+0x394/0x400
[   18.769590]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   18.770106]  ? finish_task_switch.isra.0+0x153/0x700
[   18.770658]  mempool_kmalloc_uaf+0xb3/0x100
[   18.771076]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   18.771531]  ? __switch_to+0x5d9/0xf60
[   18.771945]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.772462]  ? __pfx_mempool_kfree+0x10/0x10
[   18.772896]  ? __pfx_read_tsc+0x10/0x10
[   18.773372]  ? ktime_get_ts64+0x84/0x230
[   18.773751]  kunit_try_run_case+0x1b3/0x490
[   18.774276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.774719]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.775233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.775642]  ? __kthread_parkme+0x82/0x160
[   18.776091]  ? preempt_count_sub+0x50/0x80
[   18.776582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.776993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.777681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.778270]  kthread+0x257/0x310
[   18.778557]  ? __pfx_kthread+0x10/0x10
[   18.778978]  ret_from_fork+0x41/0x80
[   18.779417]  ? __pfx_kthread+0x10/0x10
[   18.779847]  ret_from_fork_asm+0x1a/0x30
[   18.780358]  </TASK>
[   18.780582] 
[   18.780749] Allocated by task 231:
[   18.781040]  kasan_save_stack+0x3d/0x60
[   18.781495]  kasan_save_track+0x18/0x40
[   18.781915]  kasan_save_alloc_info+0x3b/0x50
[   18.782389]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   18.782876]  remove_element+0x11e/0x190
[   18.783327]  mempool_alloc_preallocated+0x4d/0x90
[   18.783720]  mempool_uaf_helper+0x97/0x400
[   18.784169]  mempool_kmalloc_uaf+0xb3/0x100
[   18.784564]  kunit_try_run_case+0x1b3/0x490
[   18.785013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.785587]  kthread+0x257/0x310
[   18.785967]  ret_from_fork+0x41/0x80
[   18.786337]  ret_from_fork_asm+0x1a/0x30
[   18.786645] 
[   18.787275] Freed by task 231:
[   18.788079]  kasan_save_stack+0x3d/0x60
[   18.788961]  kasan_save_track+0x18/0x40
[   18.789602]  kasan_save_free_info+0x3f/0x60
[   18.790222]  __kasan_mempool_poison_object+0x131/0x1d0
[   18.790619]  mempool_free+0x2ec/0x380
[   18.790995]  mempool_uaf_helper+0x11b/0x400
[   18.791382]  mempool_kmalloc_uaf+0xb3/0x100
[   18.791737]  kunit_try_run_case+0x1b3/0x490
[   18.792506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.793233]  kthread+0x257/0x310
[   18.793672]  ret_from_fork+0x41/0x80
[   18.793994]  ret_from_fork_asm+0x1a/0x30
[   18.794346] 
[   18.794576] The buggy address belongs to the object at ffff88810200d200
[   18.794576]  which belongs to the cache kmalloc-128 of size 128
[   18.796124] The buggy address is located 0 bytes inside of
[   18.796124]  freed 128-byte region [ffff88810200d200, ffff88810200d280)
[   18.797501] 
[   18.797730] The buggy address belongs to the physical page:
[   18.798161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10200d
[   18.798732] flags: 0x200000000000000(node=0|zone=2)
[   18.799122] page_type: f5(slab)
[   18.799643] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.800804] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   18.801828] page dumped because: kasan: bad access detected
[   18.802380] 
[   18.802907] Memory state around the buggy address:
[   18.803322]  ffff88810200d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.804225]  ffff88810200d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.804980] >ffff88810200d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.805722]                    ^
[   18.806103]  ffff88810200d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806722]  ffff88810200d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.807699] ==================================================================

test log snippet boot parser 175

Home

[   17.546680] ==================================================================
[   17.547458] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   17.547958] Read of size 4 at addr ffff888101487240 by task swapper/0/0
[   17.548518] 
[   17.548757] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.12.10-rc1 #1
[   17.550151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.550704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.551649] Call Trace:
[   17.551998]  <IRQ>
[   17.552330]  dump_stack_lvl+0x73/0xb0
[   17.552908]  print_report+0xd1/0x640
[   17.553323]  ? __virt_addr_valid+0x1db/0x2d0
[   17.554149]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.554802]  kasan_report+0x102/0x140
[   17.555214]  ? rcu_uaf_reclaim+0x50/0x60
[   17.555839]  ? rcu_uaf_reclaim+0x50/0x60
[   17.556318]  __asan_report_load4_noabort+0x18/0x20
[   17.556757]  rcu_uaf_reclaim+0x50/0x60
[   17.557213]  rcu_core+0x683/0x1c80
[   17.557547]  ? __pfx_rcu_core+0x10/0x10
[   17.558423]  ? lapic_next_event+0x19/0x30
[   17.558937]  ? handle_softirqs+0x18e/0x720
[   17.559368]  rcu_core_si+0x12/0x20
[   17.559906]  handle_softirqs+0x209/0x720
[   17.560372]  ? __pfx_handle_softirqs+0x10/0x10
[   17.560983]  irq_exit_rcu+0x9c/0xd0
[   17.561395]  sysvec_apic_timer_interrupt+0x81/0x90
[   17.562278]  </IRQ>
[   17.562497]  <TASK>
[   17.562908]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   17.563564] RIP: 0010:default_idle+0xf/0x20
[   17.564130] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 53 b8 3a 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   17.565935] RSP: 0000:ffffffffbcc07df0 EFLAGS: 00010216
[   17.566575] RAX: ffff88815b000000 RBX: ffffffffbcc18700 RCX: ffffffffbb8aec25
[   17.567297] RDX: ffffed102b606b23 RSI: 0000000000000004 RDI: 00000000000932cc
[   17.567934] RBP: ffffffffbcc07df8 R08: 0000000000000001 R09: ffffed102b606b22
[   17.568927] R10: ffff88815b035913 R11: 0000000000000000 R12: 0000000000000000
[   17.569969] R13: fffffbfff79830e0 R14: ffffffffbd7571c8 R15: 0000000000000000
[   17.570641]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   17.571201]  ? arch_cpu_idle+0xd/0x20
[   17.571599]  default_idle_call+0x48/0x80
[   17.572290]  do_idle+0x313/0x3c0
[   17.572809]  ? __pfx_do_idle+0x10/0x10
[   17.573124]  ? trace_preempt_on+0x20/0xc0
[   17.574075]  ? schedule+0x86/0x310
[   17.574687]  ? preempt_count_sub+0x50/0x80
[   17.575152]  cpu_startup_entry+0x5c/0x70
[   17.575799]  rest_init+0x11a/0x140
[   17.576227]  ? acpi_subsystem_init+0x5d/0x150
[   17.576874]  start_kernel+0x320/0x400
[   17.577308]  x86_64_start_reservations+0x1c/0x30
[   17.578300]  x86_64_start_kernel+0xcf/0xe0
[   17.578989]  common_startup_64+0x12c/0x138
[   17.579614]  </TASK>
[   17.579923] 
[   17.580129] Allocated by task 202:
[   17.580636]  kasan_save_stack+0x3d/0x60
[   17.581080]  kasan_save_track+0x18/0x40
[   17.582015]  kasan_save_alloc_info+0x3b/0x50
[   17.582607]  __kasan_kmalloc+0xb7/0xc0
[   17.583063]  __kmalloc_cache_noprof+0x162/0x350
[   17.583673]  rcu_uaf+0xb1/0x330
[   17.584054]  kunit_try_run_case+0x1b3/0x490
[   17.584655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.585177]  kthread+0x257/0x310
[   17.586020]  ret_from_fork+0x41/0x80
[   17.586396]  ret_from_fork_asm+0x1a/0x30
[   17.587110] 
[   17.587385] Freed by task 0:
[   17.587899]  kasan_save_stack+0x3d/0x60
[   17.588313]  kasan_save_track+0x18/0x40
[   17.588873]  kasan_save_free_info+0x3f/0x60
[   17.589362]  __kasan_slab_free+0x56/0x70
[   17.589994]  kfree+0x123/0x3d0
[   17.590371]  rcu_uaf_reclaim+0x1f/0x60
[   17.590696]  rcu_core+0x683/0x1c80
[   17.591673]  rcu_core_si+0x12/0x20
[   17.592024]  handle_softirqs+0x209/0x720
[   17.592485]  irq_exit_rcu+0x9c/0xd0
[   17.593003]  sysvec_apic_timer_interrupt+0x81/0x90
[   17.593820]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   17.594635] 
[   17.594881] Last potentially related work creation:
[   17.595437]  kasan_save_stack+0x3d/0x60
[   17.596013]  __kasan_record_aux_stack+0xae/0xc0
[   17.596646]  kasan_record_aux_stack_noalloc+0xf/0x20
[   17.597127]  __call_rcu_common.constprop.0+0x72/0xaa0
[   17.598149]  call_rcu+0x12/0x20
[   17.598411]  rcu_uaf+0x169/0x330
[   17.598990]  kunit_try_run_case+0x1b3/0x490
[   17.599550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.600228]  kthread+0x257/0x310
[   17.600704]  ret_from_fork+0x41/0x80
[   17.601170]  ret_from_fork_asm+0x1a/0x30
[   17.601991] 
[   17.602236] The buggy address belongs to the object at ffff888101487240
[   17.602236]  which belongs to the cache kmalloc-32 of size 32
[   17.603074] The buggy address is located 0 bytes inside of
[   17.603074]  freed 32-byte region [ffff888101487240, ffff888101487260)
[   17.604212] 
[   17.604443] The buggy address belongs to the physical page:
[   17.605056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101487
[   17.606177] flags: 0x200000000000000(node=0|zone=2)
[   17.607047] page_type: f5(slab)
[   17.607255] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   17.608290] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   17.608987] page dumped because: kasan: bad access detected
[   17.609670] 
[   17.609879] Memory state around the buggy address:
[   17.610200]  ffff888101487100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   17.611493]  ffff888101487180: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   17.612167] >ffff888101487200: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   17.613035]                                            ^
[   17.613743]  ffff888101487280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.614177]  ffff888101487300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.614859] ==================================================================

test log snippet boot parser 176

Home

[   19.507824] ==================================================================
[   19.509187] BUG: KASAN: slab-use-after-free in strchr+0x9c/0xc0
[   19.509928] Read of size 1 at addr ffff888102c398d0 by task kunit_try_catch/263
[   19.511306] 
[   19.511904] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.512807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.513526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.514496] Call Trace:
[   19.514749]  <TASK>
[   19.514979]  dump_stack_lvl+0x73/0xb0
[   19.515728]  print_report+0xd1/0x640
[   19.516444]  ? __virt_addr_valid+0x1db/0x2d0
[   19.517071]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.517554]  kasan_report+0x102/0x140
[   19.517939]  ? strchr+0x9c/0xc0
[   19.518282]  ? strchr+0x9c/0xc0
[   19.518629]  __asan_report_load1_noabort+0x18/0x20
[   19.519231]  strchr+0x9c/0xc0
[   19.519656]  kasan_strings+0x1b1/0xb60
[   19.520145]  ? __pfx_kasan_strings+0x10/0x10
[   19.520908]  ? __schedule+0xc51/0x27c0
[   19.521411]  ? __pfx_read_tsc+0x10/0x10
[   19.522004]  ? ktime_get_ts64+0x84/0x230
[   19.522663]  kunit_try_run_case+0x1b3/0x490
[   19.523127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.523825]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.524224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.524973]  ? __kthread_parkme+0x82/0x160
[   19.525706]  ? preempt_count_sub+0x50/0x80
[   19.526166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.526833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.527376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.528079]  kthread+0x257/0x310
[   19.528511]  ? __pfx_kthread+0x10/0x10
[   19.528978]  ret_from_fork+0x41/0x80
[   19.529569]  ? __pfx_kthread+0x10/0x10
[   19.529998]  ret_from_fork_asm+0x1a/0x30
[   19.530762]  </TASK>
[   19.531093] 
[   19.531352] Allocated by task 263:
[   19.531828]  kasan_save_stack+0x3d/0x60
[   19.532343]  kasan_save_track+0x18/0x40
[   19.532919]  kasan_save_alloc_info+0x3b/0x50
[   19.533393]  __kasan_kmalloc+0xb7/0xc0
[   19.533950]  __kmalloc_cache_noprof+0x162/0x350
[   19.534339]  kasan_strings+0xb3/0xb60
[   19.534909]  kunit_try_run_case+0x1b3/0x490
[   19.535389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.536179]  kthread+0x257/0x310
[   19.536710]  ret_from_fork+0x41/0x80
[   19.537226]  ret_from_fork_asm+0x1a/0x30
[   19.537763] 
[   19.538020] Freed by task 263:
[   19.538429]  kasan_save_stack+0x3d/0x60
[   19.538984]  kasan_save_track+0x18/0x40
[   19.539574]  kasan_save_free_info+0x3f/0x60
[   19.540011]  __kasan_slab_free+0x56/0x70
[   19.540541]  kfree+0x123/0x3d0
[   19.541132]  kasan_strings+0x13a/0xb60
[   19.541702]  kunit_try_run_case+0x1b3/0x490
[   19.542121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.542873]  kthread+0x257/0x310
[   19.543264]  ret_from_fork+0x41/0x80
[   19.543688]  ret_from_fork_asm+0x1a/0x30
[   19.544142] 
[   19.544386] The buggy address belongs to the object at ffff888102c398c0
[   19.544386]  which belongs to the cache kmalloc-32 of size 32
[   19.545586] The buggy address is located 16 bytes inside of
[   19.545586]  freed 32-byte region [ffff888102c398c0, ffff888102c398e0)
[   19.547132] 
[   19.547793] The buggy address belongs to the physical page:
[   19.548268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   19.549093] flags: 0x200000000000000(node=0|zone=2)
[   19.549666] page_type: f5(slab)
[   19.550022] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.551063] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.551850] page dumped because: kasan: bad access detected
[   19.552926] 
[   19.553090] Memory state around the buggy address:
[   19.553497]  ffff888102c39780: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.554259]  ffff888102c39800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.555165] >ffff888102c39880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.555757]                                                  ^
[   19.557116]  ffff888102c39900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557669]  ffff888102c39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.558309] ==================================================================

test log snippet boot parser 177

Home

[   19.616839] ==================================================================
[   19.617549] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   19.619163] Read of size 1 at addr ffff888102c398d0 by task kunit_try_catch/263
[   19.619695] 
[   19.619873] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.621521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.622262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.623184] Call Trace:
[   19.623454]  <TASK>
[   19.623742]  dump_stack_lvl+0x73/0xb0
[   19.624134]  print_report+0xd1/0x640
[   19.624503]  ? __virt_addr_valid+0x1db/0x2d0
[   19.625406]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.626002]  kasan_report+0x102/0x140
[   19.626507]  ? strcmp+0xb0/0xc0
[   19.626886]  ? strcmp+0xb0/0xc0
[   19.627351]  __asan_report_load1_noabort+0x18/0x20
[   19.627762]  strcmp+0xb0/0xc0
[   19.628150]  kasan_strings+0x2e9/0xb60
[   19.628518]  ? __pfx_kasan_strings+0x10/0x10
[   19.628995]  ? __schedule+0xc51/0x27c0
[   19.629546]  ? __pfx_read_tsc+0x10/0x10
[   19.629985]  ? ktime_get_ts64+0x84/0x230
[   19.630526]  kunit_try_run_case+0x1b3/0x490
[   19.631082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.631581]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.631994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.632551]  ? __kthread_parkme+0x82/0x160
[   19.633009]  ? preempt_count_sub+0x50/0x80
[   19.633510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.633988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.634640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.635241]  kthread+0x257/0x310
[   19.635649]  ? __pfx_kthread+0x10/0x10
[   19.636043]  ret_from_fork+0x41/0x80
[   19.636524]  ? __pfx_kthread+0x10/0x10
[   19.637010]  ret_from_fork_asm+0x1a/0x30
[   19.637491]  </TASK>
[   19.637823] 
[   19.638048] Allocated by task 263:
[   19.638431]  kasan_save_stack+0x3d/0x60
[   19.638907]  kasan_save_track+0x18/0x40
[   19.639361]  kasan_save_alloc_info+0x3b/0x50
[   19.639822]  __kasan_kmalloc+0xb7/0xc0
[   19.640267]  __kmalloc_cache_noprof+0x162/0x350
[   19.640730]  kasan_strings+0xb3/0xb60
[   19.641156]  kunit_try_run_case+0x1b3/0x490
[   19.641676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.642249]  kthread+0x257/0x310
[   19.642648]  ret_from_fork+0x41/0x80
[   19.643071]  ret_from_fork_asm+0x1a/0x30
[   19.643505] 
[   19.643683] Freed by task 263:
[   19.644091]  kasan_save_stack+0x3d/0x60
[   19.644541]  kasan_save_track+0x18/0x40
[   19.644939]  kasan_save_free_info+0x3f/0x60
[   19.645398]  __kasan_slab_free+0x56/0x70
[   19.645902]  kfree+0x123/0x3d0
[   19.646326]  kasan_strings+0x13a/0xb60
[   19.646804]  kunit_try_run_case+0x1b3/0x490
[   19.647146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.647764]  kthread+0x257/0x310
[   19.648121]  ret_from_fork+0x41/0x80
[   19.648594]  ret_from_fork_asm+0x1a/0x30
[   19.649013] 
[   19.649303] The buggy address belongs to the object at ffff888102c398c0
[   19.649303]  which belongs to the cache kmalloc-32 of size 32
[   19.650253] The buggy address is located 16 bytes inside of
[   19.650253]  freed 32-byte region [ffff888102c398c0, ffff888102c398e0)
[   19.651277] 
[   19.651452] The buggy address belongs to the physical page:
[   19.651936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   19.652729] flags: 0x200000000000000(node=0|zone=2)
[   19.653176] page_type: f5(slab)
[   19.653655] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.654424] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.654999] page dumped because: kasan: bad access detected
[   19.655468] 
[   19.655790] Memory state around the buggy address:
[   19.656377]  ffff888102c39780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.657018]  ffff888102c39800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.657729] >ffff888102c39880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.658412]                                                  ^
[   19.658809]  ffff888102c39900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.659543]  ffff888102c39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660269] ==================================================================

test log snippet boot parser 178

Home

[   19.707443] ==================================================================
[   19.708301] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   19.708740] Read of size 1 at addr ffff888102c398d0 by task kunit_try_catch/263
[   19.709263] 
[   19.709486] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.710482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.710844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.711858] Call Trace:
[   19.712109]  <TASK>
[   19.712974]  dump_stack_lvl+0x73/0xb0
[   19.713589]  print_report+0xd1/0x640
[   19.713910]  ? __virt_addr_valid+0x1db/0x2d0
[   19.714730]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.715184]  kasan_report+0x102/0x140
[   19.715873]  ? strlen+0x8f/0xb0
[   19.716267]  ? strlen+0x8f/0xb0
[   19.717140]  __asan_report_load1_noabort+0x18/0x20
[   19.717757]  strlen+0x8f/0xb0
[   19.718175]  kasan_strings+0x432/0xb60
[   19.718537]  ? __pfx_kasan_strings+0x10/0x10
[   19.719080]  ? __schedule+0xc51/0x27c0
[   19.719578]  ? __pfx_read_tsc+0x10/0x10
[   19.719979]  ? ktime_get_ts64+0x84/0x230
[   19.720419]  kunit_try_run_case+0x1b3/0x490
[   19.721054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.721970]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.722525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.723010]  ? __kthread_parkme+0x82/0x160
[   19.723491]  ? preempt_count_sub+0x50/0x80
[   19.723893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.724451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.725014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.725596]  kthread+0x257/0x310
[   19.726050]  ? __pfx_kthread+0x10/0x10
[   19.726379]  ret_from_fork+0x41/0x80
[   19.726842]  ? __pfx_kthread+0x10/0x10
[   19.727230]  ret_from_fork_asm+0x1a/0x30
[   19.727646]  </TASK>
[   19.727978] 
[   19.728214] Allocated by task 263:
[   19.728574]  kasan_save_stack+0x3d/0x60
[   19.729006]  kasan_save_track+0x18/0x40
[   19.729425]  kasan_save_alloc_info+0x3b/0x50
[   19.729995]  __kasan_kmalloc+0xb7/0xc0
[   19.730541]  __kmalloc_cache_noprof+0x162/0x350
[   19.730913]  kasan_strings+0xb3/0xb60
[   19.731252]  kunit_try_run_case+0x1b3/0x490
[   19.731734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.732295]  kthread+0x257/0x310
[   19.732623]  ret_from_fork+0x41/0x80
[   19.733038]  ret_from_fork_asm+0x1a/0x30
[   19.733533] 
[   19.733759] Freed by task 263:
[   19.734142]  kasan_save_stack+0x3d/0x60
[   19.734471]  kasan_save_track+0x18/0x40
[   19.734860]  kasan_save_free_info+0x3f/0x60
[   19.735334]  __kasan_slab_free+0x56/0x70
[   19.735796]  kfree+0x123/0x3d0
[   19.736160]  kasan_strings+0x13a/0xb60
[   19.736602]  kunit_try_run_case+0x1b3/0x490
[   19.737156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.737681]  kthread+0x257/0x310
[   19.738720]  ret_from_fork+0x41/0x80
[   19.739881]  ret_from_fork_asm+0x1a/0x30
[   19.740553] 
[   19.740726] The buggy address belongs to the object at ffff888102c398c0
[   19.740726]  which belongs to the cache kmalloc-32 of size 32
[   19.741678] The buggy address is located 16 bytes inside of
[   19.741678]  freed 32-byte region [ffff888102c398c0, ffff888102c398e0)
[   19.742607] 
[   19.742891] The buggy address belongs to the physical page:
[   19.743307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   19.744187] flags: 0x200000000000000(node=0|zone=2)
[   19.744635] page_type: f5(slab)
[   19.745016] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.745621] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.746384] page dumped because: kasan: bad access detected
[   19.746809] 
[   19.747053] Memory state around the buggy address:
[   19.747541]  ffff888102c39780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.748118]  ffff888102c39800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.748713] >ffff888102c39880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.749274]                                                  ^
[   19.749816]  ffff888102c39900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750516]  ffff888102c39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.751084] ==================================================================

test log snippet boot parser 179

Home

[   19.752701] ==================================================================
[   19.753338] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   19.753927] Read of size 1 at addr ffff888102c398d0 by task kunit_try_catch/263
[   19.754683] 
[   19.755040] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.755950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.756410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.757207] Call Trace:
[   19.757512]  <TASK>
[   19.757931]  dump_stack_lvl+0x73/0xb0
[   19.758379]  print_report+0xd1/0x640
[   19.758942]  ? __virt_addr_valid+0x1db/0x2d0
[   19.759283]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.759962]  kasan_report+0x102/0x140
[   19.760445]  ? strnlen+0x73/0x80
[   19.760851]  ? strnlen+0x73/0x80
[   19.761391]  __asan_report_load1_noabort+0x18/0x20
[   19.761840]  strnlen+0x73/0x80
[   19.762146]  kasan_strings+0x4cc/0xb60
[   19.762624]  ? __pfx_kasan_strings+0x10/0x10
[   19.763126]  ? __schedule+0xc51/0x27c0
[   19.763550]  ? __pfx_read_tsc+0x10/0x10
[   19.763983]  ? ktime_get_ts64+0x84/0x230
[   19.764590]  kunit_try_run_case+0x1b3/0x490
[   19.765094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.765719]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.766106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.766464]  ? __kthread_parkme+0x82/0x160
[   19.766959]  ? preempt_count_sub+0x50/0x80
[   19.767651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.768137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.768745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.769710]  kthread+0x257/0x310
[   19.770110]  ? __pfx_kthread+0x10/0x10
[   19.770947]  ret_from_fork+0x41/0x80
[   19.771803]  ? __pfx_kthread+0x10/0x10
[   19.772275]  ret_from_fork_asm+0x1a/0x30
[   19.772693]  </TASK>
[   19.772945] 
[   19.773152] Allocated by task 263:
[   19.773514]  kasan_save_stack+0x3d/0x60
[   19.773956]  kasan_save_track+0x18/0x40
[   19.774470]  kasan_save_alloc_info+0x3b/0x50
[   19.774894]  __kasan_kmalloc+0xb7/0xc0
[   19.775363]  __kmalloc_cache_noprof+0x162/0x350
[   19.775889]  kasan_strings+0xb3/0xb60
[   19.776322]  kunit_try_run_case+0x1b3/0x490
[   19.776757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.777315]  kthread+0x257/0x310
[   19.777679]  ret_from_fork+0x41/0x80
[   19.778093]  ret_from_fork_asm+0x1a/0x30
[   19.778590] 
[   19.778829] Freed by task 263:
[   19.779146]  kasan_save_stack+0x3d/0x60
[   19.779603]  kasan_save_track+0x18/0x40
[   19.780031]  kasan_save_free_info+0x3f/0x60
[   19.780546]  __kasan_slab_free+0x56/0x70
[   19.781017]  kfree+0x123/0x3d0
[   19.781382]  kasan_strings+0x13a/0xb60
[   19.781893]  kunit_try_run_case+0x1b3/0x490
[   19.782385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.782846]  kthread+0x257/0x310
[   19.783333]  ret_from_fork+0x41/0x80
[   19.783719]  ret_from_fork_asm+0x1a/0x30
[   19.784049] 
[   19.784340] The buggy address belongs to the object at ffff888102c398c0
[   19.784340]  which belongs to the cache kmalloc-32 of size 32
[   19.785282] The buggy address is located 16 bytes inside of
[   19.785282]  freed 32-byte region [ffff888102c398c0, ffff888102c398e0)
[   19.786268] 
[   19.786448] The buggy address belongs to the physical page:
[   19.786974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   19.787655] flags: 0x200000000000000(node=0|zone=2)
[   19.788063] page_type: f5(slab)
[   19.788504] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.789233] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.789876] page dumped because: kasan: bad access detected
[   19.790390] 
[   19.790648] Memory state around the buggy address:
[   19.791066]  ffff888102c39780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.791615]  ffff888102c39800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.792744] >ffff888102c39880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.793870]                                                  ^
[   19.794582]  ffff888102c39900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794900]  ffff888102c39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.795543] ==================================================================

test log snippet boot parser 180

Home

[   19.561127] ==================================================================
[   19.561770] BUG: KASAN: slab-use-after-free in strrchr+0x64/0x70
[   19.562960] Read of size 1 at addr ffff888102c398d0 by task kunit_try_catch/263
[   19.564414] 
[   19.564861] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.565571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.566095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.566837] Call Trace:
[   19.567327]  <TASK>
[   19.567549]  dump_stack_lvl+0x73/0xb0
[   19.568249]  print_report+0xd1/0x640
[   19.568919]  ? __virt_addr_valid+0x1db/0x2d0
[   19.569496]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.570376]  kasan_report+0x102/0x140
[   19.570763]  ? strrchr+0x64/0x70
[   19.571176]  ? strrchr+0x64/0x70
[   19.571842]  __asan_report_load1_noabort+0x18/0x20
[   19.572841]  strrchr+0x64/0x70
[   19.573502]  kasan_strings+0x24c/0xb60
[   19.573732]  ? __pfx_kasan_strings+0x10/0x10
[   19.574052]  ? __schedule+0xc51/0x27c0
[   19.575025]  ? __pfx_read_tsc+0x10/0x10
[   19.575208]  ? ktime_get_ts64+0x84/0x230
[   19.575949]  kunit_try_run_case+0x1b3/0x490
[   19.576310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.577009]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.577447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.577956]  ? __kthread_parkme+0x82/0x160
[   19.578876]  ? preempt_count_sub+0x50/0x80
[   19.579389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.580065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.580884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.581473]  kthread+0x257/0x310
[   19.582120]  ? __pfx_kthread+0x10/0x10
[   19.583026]  ret_from_fork+0x41/0x80
[   19.583399]  ? __pfx_kthread+0x10/0x10
[   19.583820]  ret_from_fork_asm+0x1a/0x30
[   19.584253]  </TASK>
[   19.584851] 
[   19.585170] Allocated by task 263:
[   19.585464]  kasan_save_stack+0x3d/0x60
[   19.586079]  kasan_save_track+0x18/0x40
[   19.586580]  kasan_save_alloc_info+0x3b/0x50
[   19.587450]  __kasan_kmalloc+0xb7/0xc0
[   19.588261]  __kmalloc_cache_noprof+0x162/0x350
[   19.588885]  kasan_strings+0xb3/0xb60
[   19.589595]  kunit_try_run_case+0x1b3/0x490
[   19.590229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.590856]  kthread+0x257/0x310
[   19.591181]  ret_from_fork+0x41/0x80
[   19.591989]  ret_from_fork_asm+0x1a/0x30
[   19.592726] 
[   19.593504] Freed by task 263:
[   19.593821]  kasan_save_stack+0x3d/0x60
[   19.594224]  kasan_save_track+0x18/0x40
[   19.594714]  kasan_save_free_info+0x3f/0x60
[   19.595609]  __kasan_slab_free+0x56/0x70
[   19.596055]  kfree+0x123/0x3d0
[   19.596585]  kasan_strings+0x13a/0xb60
[   19.597072]  kunit_try_run_case+0x1b3/0x490
[   19.597802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.598288]  kthread+0x257/0x310
[   19.599104]  ret_from_fork+0x41/0x80
[   19.599519]  ret_from_fork_asm+0x1a/0x30
[   19.600325] 
[   19.601116] The buggy address belongs to the object at ffff888102c398c0
[   19.601116]  which belongs to the cache kmalloc-32 of size 32
[   19.602330] The buggy address is located 16 bytes inside of
[   19.602330]  freed 32-byte region [ffff888102c398c0, ffff888102c398e0)
[   19.603748] 
[   19.603988] The buggy address belongs to the physical page:
[   19.604514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c39
[   19.606143] flags: 0x200000000000000(node=0|zone=2)
[   19.606557] page_type: f5(slab)
[   19.607119] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   19.607904] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   19.608599] page dumped because: kasan: bad access detected
[   19.609099] 
[   19.609316] Memory state around the buggy address:
[   19.610181]  ffff888102c39780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.610769]  ffff888102c39800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.612112] >ffff888102c39880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.613290]                                                  ^
[   19.613718]  ffff888102c39900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.614752]  ffff888102c39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.615241] ==================================================================

test log snippet boot parser 181

Home

[   17.624718] ==================================================================
[   17.626107] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[   17.626745] Read of size 8 at addr ffff8881014873c0 by task kunit_try_catch/204
[   17.627348] 
[   17.627593] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   17.628345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.628718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.630137] Call Trace:
[   17.630798]  <TASK>
[   17.631257]  dump_stack_lvl+0x73/0xb0
[   17.631604]  print_report+0xd1/0x640
[   17.632041]  ? __virt_addr_valid+0x1db/0x2d0
[   17.632825]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.633396]  kasan_report+0x102/0x140
[   17.634036]  ? workqueue_uaf+0x4d8/0x560
[   17.634938]  ? workqueue_uaf+0x4d8/0x560
[   17.635435]  __asan_report_load8_noabort+0x18/0x20
[   17.636082]  workqueue_uaf+0x4d8/0x560
[   17.636543]  ? __pfx_workqueue_uaf+0x10/0x10
[   17.637059]  ? __schedule+0xc51/0x27c0
[   17.637734]  ? __pfx_read_tsc+0x10/0x10
[   17.638371]  ? ktime_get_ts64+0x84/0x230
[   17.638948]  kunit_try_run_case+0x1b3/0x490
[   17.639408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.639792]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.640265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.640692]  ? __kthread_parkme+0x82/0x160
[   17.641092]  ? preempt_count_sub+0x50/0x80
[   17.641573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.642094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.643224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.643882]  kthread+0x257/0x310
[   17.644200]  ? __pfx_kthread+0x10/0x10
[   17.644629]  ret_from_fork+0x41/0x80
[   17.645116]  ? __pfx_kthread+0x10/0x10
[   17.645530]  ret_from_fork_asm+0x1a/0x30
[   17.645984]  </TASK>
[   17.646264] 
[   17.646474] Allocated by task 204:
[   17.646749]  kasan_save_stack+0x3d/0x60
[   17.647946]  kasan_save_track+0x18/0x40
[   17.648373]  kasan_save_alloc_info+0x3b/0x50
[   17.649412]  __kasan_kmalloc+0xb7/0xc0
[   17.649936]  __kmalloc_cache_noprof+0x162/0x350
[   17.650908]  workqueue_uaf+0x153/0x560
[   17.651618]  kunit_try_run_case+0x1b3/0x490
[   17.652117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.652917]  kthread+0x257/0x310
[   17.653241]  ret_from_fork+0x41/0x80
[   17.653596]  ret_from_fork_asm+0x1a/0x30
[   17.654230] 
[   17.654439] Freed by task 9:
[   17.655233]  kasan_save_stack+0x3d/0x60
[   17.655719]  kasan_save_track+0x18/0x40
[   17.656134]  kasan_save_free_info+0x3f/0x60
[   17.656675]  __kasan_slab_free+0x56/0x70
[   17.657075]  kfree+0x123/0x3d0
[   17.657423]  workqueue_uaf_work+0x12/0x20
[   17.657991]  process_one_work+0x5ee/0xf60
[   17.658430]  worker_thread+0x720/0x1300
[   17.659248]  kthread+0x257/0x310
[   17.659555]  ret_from_fork+0x41/0x80
[   17.660022]  ret_from_fork_asm+0x1a/0x30
[   17.660667] 
[   17.660909] Last potentially related work creation:
[   17.661363]  kasan_save_stack+0x3d/0x60
[   17.661890]  __kasan_record_aux_stack+0xae/0xc0
[   17.662399]  kasan_record_aux_stack_noalloc+0xf/0x20
[   17.663311]  __queue_work+0x67e/0xf70
[   17.663668]  queue_work_on+0x74/0xa0
[   17.664086]  workqueue_uaf+0x26e/0x560
[   17.664443]  kunit_try_run_case+0x1b3/0x490
[   17.665036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.665715]  kthread+0x257/0x310
[   17.666053]  ret_from_fork+0x41/0x80
[   17.666958]  ret_from_fork_asm+0x1a/0x30
[   17.667328] 
[   17.667681] The buggy address belongs to the object at ffff8881014873c0
[   17.667681]  which belongs to the cache kmalloc-32 of size 32
[   17.668737] The buggy address is located 0 bytes inside of
[   17.668737]  freed 32-byte region [ffff8881014873c0, ffff8881014873e0)
[   17.669744] 
[   17.669997] The buggy address belongs to the physical page:
[   17.670421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101487
[   17.671513] flags: 0x200000000000000(node=0|zone=2)
[   17.672011] page_type: f5(slab)
[   17.672305] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   17.672960] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   17.673554] page dumped because: kasan: bad access detected
[   17.674165] 
[   17.674418] Memory state around the buggy address:
[   17.675332]  ffff888101487280: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.675998]  ffff888101487300: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.676735] >ffff888101487380: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   17.677362]                                            ^
[   17.677941]  ffff888101487400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679010]  ffff888101487480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679542] ==================================================================

test log snippet boot parser 182

Home

[   19.278766] ==================================================================
[   19.280376] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2ae/0x300
[   19.281149] Read of size 1 at addr ffff888102bb7d72 by task kunit_try_catch/253
[   19.281964] 
[   19.282261] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.283032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.283519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.284163] Call Trace:
[   19.285133]  <TASK>
[   19.286211]  dump_stack_lvl+0x73/0xb0
[   19.286634]  print_report+0xd1/0x640
[   19.287192]  ? __virt_addr_valid+0x1db/0x2d0
[   19.288024]  ? kasan_addr_to_slab+0x11/0xa0
[   19.288939]  kasan_report+0x102/0x140
[   19.289250]  ? kasan_stack_oob+0x2ae/0x300
[   19.289841]  ? kasan_stack_oob+0x2ae/0x300
[   19.290614]  __asan_report_load1_noabort+0x18/0x20
[   19.291035]  kasan_stack_oob+0x2ae/0x300
[   19.291839]  ? __pfx_kasan_stack_oob+0x10/0x10
[   19.292491]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.293189]  ? __pfx_kasan_stack_oob+0x10/0x10
[   19.293974]  kunit_try_run_case+0x1b3/0x490
[   19.294343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.295164]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.296002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.297056]  ? __kthread_parkme+0x82/0x160
[   19.297514]  ? preempt_count_sub+0x50/0x80
[   19.298190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.298914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.299445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.300478]  kthread+0x257/0x310
[   19.301019]  ? __pfx_kthread+0x10/0x10
[   19.301488]  ret_from_fork+0x41/0x80
[   19.301901]  ? __pfx_kthread+0x10/0x10
[   19.302329]  ret_from_fork_asm+0x1a/0x30
[   19.303098]  </TASK>
[   19.303921] 
[   19.304252] The buggy address belongs to stack of task kunit_try_catch/253
[   19.304589]  and is located at offset 138 in frame:
[   19.304770]  kasan_stack_oob+0x0/0x300
[   19.306305] 
[   19.306593] This frame has 4 objects:
[   19.307343]  [48, 49) '__assertion'
[   19.307426]  [64, 72) 'array'
[   19.307974]  [96, 112) '__assertion'
[   19.308292]  [128, 138) 'stack_array'
[   19.308897] 
[   19.309887] The buggy address belongs to the physical page:
[   19.310688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb7
[   19.312042] flags: 0x200000000000000(node=0|zone=2)
[   19.312508] raw: 0200000000000000 ffffea00040aedc8 ffffea00040aedc8 0000000000000000
[   19.313087] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.313876] page dumped because: kasan: bad access detected
[   19.314746] 
[   19.315056] Memory state around the buggy address:
[   19.315666]  ffff888102bb7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.317124]  ffff888102bb7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   19.317759] >ffff888102bb7d00: f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3
[   19.318304]                                                              ^
[   19.319082]  ffff888102bb7d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   19.319981]  ffff888102bb7e00: f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00
[   19.320974] ==================================================================

test log snippet boot parser 183

Home

[   15.625221] ==================================================================
[   15.626138] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f3/0x340
[   15.627225] Read of size 1 at addr ffff888102358000 by task kunit_try_catch/152
[   15.628330] 
[   15.628533] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.630102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.630634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.631708] Call Trace:
[   15.632580]  <TASK>
[   15.632804]  dump_stack_lvl+0x73/0xb0
[   15.633407]  print_report+0xd1/0x640
[   15.634131]  ? __virt_addr_valid+0x1db/0x2d0
[   15.634869]  ? kasan_addr_to_slab+0x11/0xa0
[   15.635287]  kasan_report+0x102/0x140
[   15.635621]  ? kmalloc_large_uaf+0x2f3/0x340
[   15.636094]  ? kmalloc_large_uaf+0x2f3/0x340
[   15.636551]  __asan_report_load1_noabort+0x18/0x20
[   15.637337]  kmalloc_large_uaf+0x2f3/0x340
[   15.638224]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   15.638753]  ? __schedule+0xc51/0x27c0
[   15.639162]  ? __pfx_read_tsc+0x10/0x10
[   15.640062]  ? ktime_get_ts64+0x84/0x230
[   15.640718]  kunit_try_run_case+0x1b3/0x490
[   15.641417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.642105]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.642595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.643461]  ? __kthread_parkme+0x82/0x160
[   15.644077]  ? preempt_count_sub+0x50/0x80
[   15.644531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.645272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.645993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.646481]  kthread+0x257/0x310
[   15.647180]  ? __pfx_kthread+0x10/0x10
[   15.647770]  ret_from_fork+0x41/0x80
[   15.648171]  ? __pfx_kthread+0x10/0x10
[   15.648516]  ret_from_fork_asm+0x1a/0x30
[   15.649361]  </TASK>
[   15.650082] 
[   15.650528] The buggy address belongs to the physical page:
[   15.650978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102358
[   15.652054] flags: 0x200000000000000(node=0|zone=2)
[   15.652694] raw: 0200000000000000 ffffea000408d708 ffff88815b03f140 0000000000000000
[   15.653320] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   15.654547] page dumped because: kasan: bad access detected
[   15.655086] 
[   15.655337] Memory state around the buggy address:
[   15.655963]  ffff888102357f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656801]  ffff888102357f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.657378] >ffff888102358000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.658410]                    ^
[   15.658890]  ffff888102358080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.659538]  ffff888102358100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.660181] ==================================================================

test log snippet boot parser 184

Home

[   18.919309] ==================================================================
[   18.920106] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   18.921197] Read of size 1 at addr ffff888102b60000 by task kunit_try_catch/237
[   18.922639] 
[   18.923015] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.923697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.924519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.925700] Call Trace:
[   18.925934]  <TASK>
[   18.926151]  dump_stack_lvl+0x73/0xb0
[   18.926484]  print_report+0xd1/0x640
[   18.927108]  ? __virt_addr_valid+0x1db/0x2d0
[   18.928024]  ? kasan_addr_to_slab+0x11/0xa0
[   18.928430]  kasan_report+0x102/0x140
[   18.929084]  ? mempool_uaf_helper+0x394/0x400
[   18.929858]  ? mempool_uaf_helper+0x394/0x400
[   18.930307]  __asan_report_load1_noabort+0x18/0x20
[   18.930736]  mempool_uaf_helper+0x394/0x400
[   18.931159]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   18.931571]  ? finish_task_switch.isra.0+0x153/0x700
[   18.932173]  mempool_page_alloc_uaf+0xb1/0x100
[   18.932728]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   18.933370]  ? __switch_to+0x5d9/0xf60
[   18.933742]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   18.934497]  ? __pfx_mempool_free_pages+0x10/0x10
[   18.935117]  ? __pfx_read_tsc+0x10/0x10
[   18.935947]  ? ktime_get_ts64+0x84/0x230
[   18.937045]  kunit_try_run_case+0x1b3/0x490
[   18.937844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.938296]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.938706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.939140]  ? __kthread_parkme+0x82/0x160
[   18.939573]  ? preempt_count_sub+0x50/0x80
[   18.940035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.940564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.941147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.941926]  kthread+0x257/0x310
[   18.942835]  ? __pfx_kthread+0x10/0x10
[   18.943426]  ret_from_fork+0x41/0x80
[   18.943953]  ? __pfx_kthread+0x10/0x10
[   18.944409]  ret_from_fork_asm+0x1a/0x30
[   18.945175]  </TASK>
[   18.945608] 
[   18.945851] The buggy address belongs to the physical page:
[   18.946296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b60
[   18.947107] flags: 0x200000000000000(node=0|zone=2)
[   18.947596] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   18.948216] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.948766] page dumped because: kasan: bad access detected
[   18.949345] 
[   18.949699] Memory state around the buggy address:
[   18.950227]  ffff888102b5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.951415]  ffff888102b5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.952140] >ffff888102b60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.952945]                    ^
[   18.953268]  ffff888102b60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.954016]  ffff888102b60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.954614] ==================================================================

test log snippet boot parser 185

Home

[   18.814013] ==================================================================
[   18.815024] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   18.816124] Read of size 1 at addr ffff888102b60000 by task kunit_try_catch/233
[   18.816764] 
[   18.817042] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.817685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.818014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.819796] Call Trace:
[   18.820049]  <TASK>
[   18.820387]  dump_stack_lvl+0x73/0xb0
[   18.820801]  print_report+0xd1/0x640
[   18.821191]  ? __virt_addr_valid+0x1db/0x2d0
[   18.822185]  ? kasan_addr_to_slab+0x11/0xa0
[   18.822901]  kasan_report+0x102/0x140
[   18.823257]  ? mempool_uaf_helper+0x394/0x400
[   18.823736]  ? mempool_uaf_helper+0x394/0x400
[   18.824297]  __asan_report_load1_noabort+0x18/0x20
[   18.824848]  mempool_uaf_helper+0x394/0x400
[   18.825304]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   18.825805]  ? finish_task_switch.isra.0+0x153/0x700
[   18.826270]  mempool_kmalloc_large_uaf+0xb3/0x100
[   18.826732]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   18.827253]  ? __switch_to+0x5d9/0xf60
[   18.827667]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.828225]  ? __pfx_mempool_kfree+0x10/0x10
[   18.828792]  ? __pfx_read_tsc+0x10/0x10
[   18.829176]  ? ktime_get_ts64+0x84/0x230
[   18.829751]  kunit_try_run_case+0x1b3/0x490
[   18.830268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.830683]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.831275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.831824]  ? __kthread_parkme+0x82/0x160
[   18.832221]  ? preempt_count_sub+0x50/0x80
[   18.832697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.833294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.833793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.835502]  kthread+0x257/0x310
[   18.836562]  ? __pfx_kthread+0x10/0x10
[   18.836942]  ret_from_fork+0x41/0x80
[   18.837345]  ? __pfx_kthread+0x10/0x10
[   18.837905]  ret_from_fork_asm+0x1a/0x30
[   18.838435]  </TASK>
[   18.838988] 
[   18.839263] The buggy address belongs to the physical page:
[   18.840055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b60
[   18.841045] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.841759] flags: 0x200000000000040(head|node=0|zone=2)
[   18.842256] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.842857] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.843443] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.844123] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.845146] head: 0200000000000002 ffffea00040ad801 ffffffffffffffff 0000000000000000
[   18.846291] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.847111] page dumped because: kasan: bad access detected
[   18.847471] 
[   18.848278] Memory state around the buggy address:
[   18.848828]  ffff888102b5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.849441]  ffff888102b5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.850144] >ffff888102b60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.850936]                    ^
[   18.851336]  ffff888102b60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.852461]  ffff888102b60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.853159] ==================================================================

test log snippet boot parser 186

Home

[   15.715462] ==================================================================
[   15.716467] BUG: KASAN: use-after-free in page_alloc_uaf+0x358/0x3d0
[   15.717281] Read of size 1 at addr ffff888102b20000 by task kunit_try_catch/158
[   15.718762] 
[   15.719011] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   15.719812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.720196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.721190] Call Trace:
[   15.721474]  <TASK>
[   15.721928]  dump_stack_lvl+0x73/0xb0
[   15.722381]  print_report+0xd1/0x640
[   15.722941]  ? __virt_addr_valid+0x1db/0x2d0
[   15.723426]  ? kasan_addr_to_slab+0x11/0xa0
[   15.724067]  kasan_report+0x102/0x140
[   15.724465]  ? page_alloc_uaf+0x358/0x3d0
[   15.725108]  ? page_alloc_uaf+0x358/0x3d0
[   15.725641]  __asan_report_load1_noabort+0x18/0x20
[   15.726184]  page_alloc_uaf+0x358/0x3d0
[   15.726851]  ? __pfx_page_alloc_uaf+0x10/0x10
[   15.727336]  ? __schedule+0xc51/0x27c0
[   15.727920]  ? __pfx_read_tsc+0x10/0x10
[   15.728331]  ? ktime_get_ts64+0x84/0x230
[   15.728804]  kunit_try_run_case+0x1b3/0x490
[   15.729486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730336]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.731038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.731717]  ? __kthread_parkme+0x82/0x160
[   15.732186]  ? preempt_count_sub+0x50/0x80
[   15.732633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.733106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.733905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.734432]  kthread+0x257/0x310
[   15.734837]  ? __pfx_kthread+0x10/0x10
[   15.735175]  ret_from_fork+0x41/0x80
[   15.735830]  ? __pfx_kthread+0x10/0x10
[   15.736265]  ret_from_fork_asm+0x1a/0x30
[   15.736823]  </TASK>
[   15.737141] 
[   15.737388] The buggy address belongs to the physical page:
[   15.738094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   15.738812] flags: 0x200000000000000(node=0|zone=2)
[   15.739499] page_type: f0(buddy)
[   15.740130] raw: 0200000000000000 ffff88817fffb4e8 ffff88817fffb4e8 0000000000000000
[   15.740869] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   15.741645] page dumped because: kasan: bad access detected
[   15.742014] 
[   15.742245] Memory state around the buggy address:
[   15.742833]  ffff888102b1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.743387]  ffff888102b1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.744262] >ffff888102b20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.745005]                    ^
[   15.745418]  ffff888102b20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.746260]  ffff888102b20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.747048] ==================================================================

test log snippet boot parser 187

Home

------------[ cut here ]------------
[    7.178527] WARNING: CPU: 1 PID: 144 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[    7.187438] Modules linked in:
[    7.190521] CPU: 1 UID: 0 PID: 144 Comm: udevadm Not tainted 6.12.10-rc1 #1
[    7.197509] Hardware name: Generic DRA74X (Flattened Device Tree)
[    7.203643] Call trace: 
[    7.203643]  unwind_backtrace from show_stack+0x10/0x14
[    7.211456]  show_stack from dump_stack_lvl+0x54/0x68
[    7.211486]  dump_stack_lvl from __warn+0x7c/0x12c
[    7.211517]  __warn from warn_slowpath_fmt+0x184/0x18c
[    7.211517]  warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[    7.211547]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    7.211547]  smp_call_function from set_memory_valid+0x7c/0xbc
[    7.211578]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    7.211608]  kfence_guarded_free from rcu_core+0x2b8/0x91c
[    7.211608]  rcu_core from handle_softirqs+0x108/0x344
[    7.211639]  handle_softirqs from irq_exit+0x8c/0xb8
[    7.211639]  irq_exit from call_with_stack+0x18/0x20
[    7.211669]  call_with_stack from __irq_svc+0x8c/0xa4
[    7.211669] Exception stack(0xf2005ef8 to 0xf2005f40)
[    7.211669] 5ee0:                                                       2ce7c000 00000011
[    7.211700] 5f00: 00000010 c1d6f17c 00000000 c1e04b80 00000011 40010013 00000010 00000010
[    7.211700] 5f20: 00000006 beb2d8b0 80010093 f2005f48 00000000 c0961394 80010013 ffffffff
[    7.211700]  __irq_svc from percpu_counter_add_batch+0x70/0xc4
[    7.211730]  percpu_counter_add_batch from __fput+0x158/0x2d0
[    7.211730]  __fput from sys_close+0x28/0x5c
[    7.211761]  sys_close from ret_fast_syscall+0x0/0x5c
[    7.211761] Exception stack(0xf2005fa8 to 0xf2005ff0)
[    7.211761] 5fa0:                   00000002 b6d09868 00000007 00000011 00000000 00000001
[    7.211791] 5fc0: 00000002 b6d09868 00000007 00000006 beb2d644 beb2d640 beb2d650 beb2d8b0
[    7.211791] 5fe0: 00000006 beb2d5c0 b6e18d5b b6d96786
[    7.211822] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 188

Home

------------[ cut here ]------------
[    0.974487] WARNING: CPU: 1 PID: 31 at kernel/smp.c:815 smp_call_function_many_cond+0x4b0/0x5dc
[    0.974487] Modules linked in:
[    0.974517] CPU: 1 UID: 0 PID: 31 Comm: kworker/u10:1 Not tainted 6.12.10-rc1 #1
[    0.974517] Hardware name: Generic DRA74X (Flattened Device Tree)
[    0.974517] Workqueue: events_unbound deferred_probe_work_func
[    0.974548] Call trace: 
[    0.974548]  unwind_backtrace from show_stack+0x18/0x1c
[    0.974578]  show_stack from dump_stack_lvl+0x6c/0x8c
[    0.974609]  dump_stack_lvl from __warn+0x84/0x134
[    0.974609]  __warn from warn_slowpath_fmt+0x18c/0x194
[    0.974639]  warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[    0.974670]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    0.974670]  smp_call_function from set_memory_valid+0x84/0xc4
[    0.974700]  set_memory_valid from kfence_guarded_free+0x170/0x2dc
[    0.974731]  kfence_guarded_free from kmem_cache_free+0x35c/0x404
[    0.974731]  kmem_cache_free from rcu_core+0x2cc/0x998
[    0.974761]  rcu_core from handle_softirqs+0x158/0x3d8
[    0.974792]  handle_softirqs from irq_exit+0xac/0xd4
[    0.974792]  irq_exit from call_with_stack+0x18/0x20
[    0.974822]  call_with_stack from __irq_svc+0x90/0xac
[    0.974853] Exception stack(0xf00cd5e0 to 0xf00cd628)
[    0.974853] d5e0: c15a4b88 00000000 2c83c000 60000093 60000013 c3a11338 c3a112b8 60000013
[    0.974853] d600: 00000000 00000000 c2425bec 00000000 00000000 f00cd630 c0568c10 c15a4b8c
[    0.974853] d620: 60000013 ffffffff
[    0.974884]  __irq_svc from _raw_spin_unlock_irqrestore+0x40/0x44
[    0.974884]  _raw_spin_unlock_irqrestore from klist_next+0xc0/0x16c
[    0.974914]  klist_next from bus_for_each_drv+0xa4/0xec
[    0.974945]  bus_for_each_drv from __device_attach+0xb0/0x1dc
[    0.974975]  __device_attach from bus_probe_device+0x90/0x94
[    0.974975]  bus_probe_device from device_add+0x5f8/0x80c
[    0.975006]  device_add from of_platform_device_create_pdata+0xb0/0xf4
[    0.975036]  of_platform_device_create_pdata from of_platform_bus_create+0x1f8/0x4dc
[    0.975036]  of_platform_bus_create from of_platform_bus_create+0x25c/0x4dc
[    0.975067]  of_platform_bus_create from of_platform_populate+0x98/0x134
[    0.975067]  of_platform_populate from sysc_probe+0x10a4/0x145c
[    0.975097]  sysc_probe from platform_probe+0x64/0xb8
[    0.975128]  platform_probe from really_probe+0xe8/0x3d4
[    0.975128]  really_probe from __driver_probe_device+0xa4/0x1e8
[    0.975158]  __driver_probe_device from driver_probe_device+0x38/0xc8
[    0.975158]  driver_probe_device from __device_attach_driver+0xb0/0x128
[    0.975158]  __device_attach_driver from bus_for_each_drv+0x98/0xec
[    0.975189]  bus_for_each_drv from __device_attach+0xb0/0x1dc
[    0.975219]  __device_attach from bus_probe_device+0x90/0x94
[    0.975219]  bus_probe_device from device_add+0x5f8/0x80c
[    0.975250]  device_add from of_platform_device_create_pdata+0xb0/0xf4
[    0.975280]  of_platform_device_create_pdata from of_platform_bus_create+0x1f8/0x4dc
[    0.975280]  of_platform_bus_create from of_platform_populate+0x98/0x134
[    0.975311]  of_platform_populate from simple_pm_bus_probe+0xe4/0x128
[    0.975341]  simple_pm_bus_probe from platform_probe+0x64/0xb8
[    0.975341]  platform_probe from really_probe+0xe8/0x3d4
[    0.975372]  really_probe from __driver_probe_device+0xa4/0x1e8
[    0.975372]  __driver_probe_device from driver_probe_device+0x38/0xc8
[    0.975402]  driver_probe_device from __device_attach_driver+0xb0/0x128
[    0.975402]  __device_attach_driver from bus_for_each_drv+0x98/0xec
[    0.975433]  bus_for_each_drv from __device_attach+0xb0/0x1dc
[    0.975433]  __device_attach from bus_probe_device+0x90/0x94
[    0.975463]  bus_probe_device from device_add+0x5f8/0x80c
[    0.975494]  device_add from of_platform_device_create_pdata+0xb0/0xf4
[    0.975494]  of_platform_device_create_pdata from of_platform_bus_create+0x1f8/0x4dc
[    0.975524]  of_platform_bus_create from of_platform_populate+0x98/0x134
[    0.975555]  of_platform_populate from simple_pm_bus_probe+0xe4/0x128
[    0.975555]  simple_pm_bus_probe from platform_probe+0x64/0xb8
[    0.975585]  platform_probe from really_probe+0xe8/0x3d4
[    0.975585]  really_probe from __driver_probe_device+0xa4/0x1e8
[    0.975616]  __driver_probe_device from driver_probe_device+0x38/0xc8
[    0.975616]  driver_probe_device from __device_attach_driver+0xb0/0x128
[    0.975616]  __device_attach_driver from bus_for_each_drv+0x98/0xec
[    0.975646]  bus_for_each_drv from __device_attach+0xb0/0x1dc
[    0.975677]  __device_attach from bus_probe_device+0x90/0x94
[    0.975677]  bus_probe_device from device_add+0x5f8/0x80c
[    0.975708]  device_add from of_platform_device_create_pdata+0xb0/0xf4
[    0.975738]  of_platform_device_create_pdata from of_platform_bus_create+0x1f8/0x4dc
[    0.975738]  of_platform_bus_create from of_platform_populate+0x98/0x134
[    0.975769]  of_platform_populate from simple_pm_bus_probe+0xe4/0x128
[    0.975769]  simple_pm_bus_probe from platform_probe+0x64/0xb8
[    0.975799]  platform_probe from really_probe+0xe8/0x3d4
[    0.975830]  really_probe from __driver_probe_device+0xa4/0x1e8
[    0.975830]  __driver_probe_device from driver_probe_device+0x38/0xc8
[    0.975830]  driver_probe_device from __device_attach_driver+0xb0/0x128
[    0.975860]  __device_attach_driver from bus_for_each_drv+0x98/0xec
[    0.975860]  bus_for_each_drv from __device_attach+0xb0/0x1dc
[    0.975891]  __device_attach from bus_probe_device+0x90/0x94
[    0.975921]  bus_probe_device from deferred_probe_work_func+0x94/0xdc
[    0.975921]  deferred_probe_work_func from process_one_work+0x184/0x3cc
[    0.975952]  process_one_work from worker_thread+0x270/0x440
[    0.975952]  worker_thread from kthread+0xe8/0x104
[    0.975982]  kthread from ret_from_fork+0x14/0x20
[    0.976013] Exception stack(0xf00cdfb0 to 0xf00cdff8)
[    0.976013] dfa0:                                     00000000 00000000 00000000 00000000
[    0.976013] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    0.976043] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    0.976043] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 189

Home

------------[ cut here ]------------
[    4.789916] WARNING: CPU: 0 PID: 110 at kernel/smp.c:815 smp_call_function_many_cond+0x494/0x5cc
[    4.798828] Modules linked in:
[    4.801910] CPU: 0 UID: 0 PID: 110 Comm: systemd-rc-loca Not tainted 6.12.10-rc1 #1
[    4.809600] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.815734] Call trace: 
[    4.815765]  unwind_backtrace from show_stack+0x10/0x14
[    4.823608]  show_stack from dump_stack_lvl+0x50/0x64
[    4.828735]  dump_stack_lvl from __warn+0x80/0x134
[    4.828765]  __warn from warn_slowpath_fmt+0x170/0x178
[    4.828796]  warn_slowpath_fmt from smp_call_function_many_cond+0x494/0x5cc
[    4.828826]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    4.828826]  smp_call_function from flush_tlb_kernel_range+0x5c/0xa4
[    4.828887]  flush_tlb_kernel_range from __change_memory_common+0x5c/0x7c
[    4.828887]  __change_memory_common from set_memory_valid+0x4c/0x54
[    4.828918]  set_memory_valid from kfence_guarded_free+0x2ac/0x594
[    4.828918]  kfence_guarded_free from rcu_core+0x2bc/0x920
[    4.828948]  rcu_core from handle_softirqs+0x108/0x314
[    4.828979]  handle_softirqs from irq_exit+0x90/0xb8
[    4.829010]  irq_exit from call_with_stack+0x18/0x20
[    4.829040]  call_with_stack from __irq_usr+0x80/0xa0
[    4.829040] Exception stack(0xf1631fb0 to 0xf1631ff8)
[    4.829071] 1fa0:                                     b66247fc b675b284 61636269 7362696c
[    4.829071] 1fc0: 00636269 00100000 00000000 b675b000 00000001 b675e181 bee4b588 bee4b420
[    4.829071] 1fe0: ffffffff bee4afc0 b6efad19 b6f09290 000f0030 ffffffff
[    4.829162] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

Home

------------[ cut here ]------------
[   63.263191] WARNING: CPU: 3 PID: 1459 at mm/util.c:670 __kvmalloc_node_noprof+0x11c/0x124
[   63.267373] Modules linked in: snd_soc_hdmi_codec venus_enc pm8916_wdt venus_dec videobuf2_dma_contig crct10dif_ce qcom_wcnss_pil coresight_cpu_debug adv7511 coresight_stm coresight_cti coresight_tmc coresight_replicator coresight_funnel stm_core coresight_tpiu coresight cec snd_soc_lpass_apq8016 snd_soc_apq8016_sbc qrtr snd_soc_lpass_cpu snd_soc_qcom_common snd_soc_msm8916_digital snd_soc_lpass_platform snd_soc_msm8916_analog qcom_q6v5_mss msm qcom_spmi_vadc rtc_pm8xxx qcom_pil_info qcom_spmi_temp_alarm qcom_vadc_common qcom_q6v5 qcom_sysmon qcom_pon qcom_common venus_core llcc_qcom qcom_glink_smem v4l2_mem2mem ocmem qcom_camss qmi_helpers videobuf2_dma_sg v4l2_fwnode v4l2_async mdt_loader videobuf2_v4l2 drm_exec qnoc_msm8916 gpu_sched videodev videobuf2_memops qcom_stats drm_dp_aux_bus qcom_rng videobuf2_common drm_display_helper mc rpmsg_ctrl rpmsg_char phy_qcom_usb_hs display_connector socinfo ramoops rmtfs_mem drm_kms_helper reed_solomon fuse drm backlight ip_tables x_tables
[   63.368722] CPU: 3 UID: 0 PID: 1459 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   63.373959] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[   63.380383] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   63.387156] pc : __kvmalloc_node_noprof+0x11c/0x124
[   63.393787] lr : __kvmalloc_node_noprof+0x50/0x124
[   63.398975] sp : ffff80008652bce0
[   63.404208] x29: ffff80008652bcf0 x28: ffff00000a65ed80 x27: 0000000000000000
[   63.409522] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   63.415592] x23: 0000000080000000 x22: ffff8000803cb268 x21: 0000000200002000
[   63.422673] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   63.429834] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   63.436990] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   63.444089] x11: 0000000000000040 x10: f53808a3609e2b00 x9 : f53808a3609e2b00
[   63.451164] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   63.458250] x5 : 0000000000000000 x4 : ffff80008652bcb0 x3 : 0000000000000000
[   63.465401] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   63.472474] Call trace:
[   63.479495]  __kvmalloc_node_noprof+0x11c/0x124
[   63.484648]  alloc_fdtable+0x7c/0x108
[   63.489783]  expand_files+0x114/0x2f0
[   63.494850]  ksys_dup3+0x64/0xfc
[   63.499919]  __arm64_sys_dup3+0x20/0x30
[   63.504959]  invoke_syscall+0x40/0xf8
[   63.509931]  el0_svc_common+0xa8/0xd8
[   63.514832]  do_el0_svc+0x1c/0x28
[   63.519664]  el0_svc+0x38/0x68
[   63.524434]  el0t_64_sync_handler+0x90/0xfc
[   63.529178]  el0t_64_sync+0x190/0x194
[   63.533832] ---[ end trace 0000000000000000 ]---

test log snippet test parser 3

Home

------------[ cut here ]------------
[   68.851352] WARNING: CPU: 2 PID: 1459 at mm/util.c:670 __kvmalloc_node_noprof+0x138/0x148
[   68.872510] Modules linked in: asix usbnet snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_cpu_debug coresight_stm qrtr qcom_camss stm_core coresight_tmc coresight_replicator coresight_cti coresight_tpiu coresight_funnel qcom_q6v5_mss adv7511 qcom_pil_info videobuf2_dma_sg coresight qcom_q6v5 cec venus_core v4l2_fwnode qcom_sysmon snd_soc_lpass_apq8016 v4l2_async qcom_common snd_soc_lpass_cpu msm videobuf2_memops qcom_glink_smem snd_soc_msm8916_digital snd_soc_msm8916_analog snd_soc_apq8016_sbc snd_soc_lpass_platform qcom_spmi_vadc snd_soc_qcom_common v4l2_mem2mem qcom_spmi_temp_alarm qcom_vadc_common qcom_pon qmi_helpers videobuf2_v4l2 rtc_pm8xxx mdt_loader llcc_qcom videodev ocmem drm_exec qnoc_msm8916 gpu_sched qcom_stats videobuf2_common drm_dp_aux_bus mc qcom_rng drm_display_helper rpmsg_ctrl rpmsg_char socinfo phy_qcom_usb_hs display_connector drm_kms_helper ramoops rmtfs_mem reed_solomon fuse drm backlight ip_tables x_tables
[   69.063846] CPU: 2 UID: 0 PID: 1459 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   69.090504] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[   69.117095] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   69.143813] pc : __kvmalloc_node_noprof+0x138/0x148
[   69.170527] lr : __kvmalloc_node_noprof+0x64/0x148
[   69.197091] sp : ffff800086933ce0
[   69.223612] x29: ffff800086933cf0 x28: ffff00000f2ca480 x27: 0000000000000000
[   69.250533] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000003823180
[   69.277378] x23: ffff000003823200 x22: ffff8000803ad6b0 x21: 0000000200002000
[   69.304172] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   69.330889] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   69.357410] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   69.383710] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   69.409948] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   69.436160] x5 : 0000000000000000 x4 : ffff00000f2ca480 x3 : 0000000000000000
[   69.462283] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   69.488247] Call trace:
[   69.514000]  __kvmalloc_node_noprof+0x138/0x148
[   69.539840]  alloc_fdtable+0x90/0x110
[   69.565488]  expand_files+0x78/0x318
[   69.591000]  ksys_dup3+0x60/0x120
[   69.616400]  __arm64_sys_dup3+0x20/0x30
[   69.641742]  invoke_syscall+0x48/0x10c
[   69.666839]  el0_svc_common.constprop.0+0x40/0xe0
[   69.691904]  do_el0_svc+0x1c/0x28
[   69.716706]  el0_svc+0x30/0xcc
[   69.741585]  el0t_64_sync_handler+0x120/0x12c
[   69.766705]  el0t_64_sync+0x190/0x194
[   69.791669] ---[ end trace 0000000000000000 ]---

test log snippet test parser 4

Home

------------[ cut here ]------------
[   51.219224] WARNING: CPU: 2 PID: 1885 at mm/util.c:670 __kvmalloc_node_noprof+0x11c/0x124
[   51.263641] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec hci_uart venus_enc venus_dec btqca mcp251xfd videobuf2_dma_contig btbcm lontium_lt9611 xhci_pci_renesas can_dev qcom_camss snd_soc_sdm845 videobuf2_dma_sg leds_qcom_lpg qcom_pbs venus_core snd_soc_rt5663 v4l2_fwnode led_class_multicolor v4l2_mem2mem snd_soc_qcom_sdw v4l2_async qcom_spmi_temp_alarm snd_soc_qcom_common msm snd_soc_rl6231 videobuf2_v4l2 ath10k_snoc ath10k_core ocmem soundwire_bus bluetooth videodev rtc_pm8xxx drm_exec videobuf2_memops ath mac80211 qcom_pon crct10dif_ce videobuf2_common libarc4 gpu_sched ecdh_generic qcom_spmi_adc5 ecc drm_dp_aux_bus qcom_vadc_common qcom_stats reset_qcom_pdc pwrseq_core i2c_qcom_geni camcc_sdm845 drm_display_helper coresight_stm mc phy_qcom_qmp_combo qcrypto phy_qcom_qmp_usb stm_core coresight_replicator typec coresight_tmc spi_geni_qcom authenc aux_bridge coresight_funnel phy_qcom_qusb2 qcom_q6v5_mss libdes gpi qcom_rng phy_qcom_qmp_ufs qrtr coresight ufs_qcom cfg80211
[   51.263887]  slim_qcom_ngd_ctrl slimbus pdr_interface icc_osm_l3 phy_qcom_qmp_pcie qcom_wdt qcom_pdr_msg rfkill lmh qcom_q6v5_pas llcc_qcom icc_bwmon qcom_pil_info display_connector qcom_q6v5 qcom_sysmon drm_kms_helper qcom_common qcom_glink_smem mdt_loader qmi_helpers drm backlight socinfo rmtfs_mem
[   51.452830] CPU: 2 UID: 0 PID: 1885 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   51.496416] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.502165] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.509241] pc : __kvmalloc_node_noprof+0x11c/0x124
[   51.514203] lr : __kvmalloc_node_noprof+0x50/0x124
[   51.519078] sp : ffff800089893ce0
[   51.522455] x29: ffff800089893cf0 x28: ffff3698cbb9db40 x27: 0000000000000000
[   51.565757] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   51.573011] x23: 0000000080000000 x22: ffffcdd788b4b268 x21: 0000000200002000
[   51.580267] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   51.587515] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.630839] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.638091] x11: 0000000000000040 x10: 8045600998436400 x9 : 8045600998436400
[   51.645343] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   51.652595] x5 : 0000000000000000 x4 : ffff800089893cb0 x3 : 0000000000000000
[   51.659841] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   51.667096] Call trace:
[   51.669595]  __kvmalloc_node_noprof+0x11c/0x124
[   51.710258]  alloc_fdtable+0x7c/0x108
[   51.713986]  expand_files+0x114/0x2f0
[   51.717713]  ksys_dup3+0x64/0xfc
[   51.721007]  __arm64_sys_dup3+0x20/0x30
[   51.724908]  invoke_syscall+0x40/0xf8
[   51.764682]  el0_svc_common+0xa8/0xd8
[   51.768411]  do_el0_svc+0x1c/0x28
[   51.771794]  el0_svc+0x38/0x68
[   51.774909]  el0t_64_sync_handler+0x90/0xfc
[   51.779166]  el0t_64_sync+0x190/0x194
[   51.818952] ---[ end trace 0000000000000000 ]---

test log snippet test parser 5

Home

------------[ cut here ]------------
[   51.388552] WARNING: CPU: 0 PID: 1889 at mm/util.c:670 __kvmalloc_node_noprof+0x138/0x148
[   51.396869] Modules linked in: fuse ip_tables x_tables snd_soc_hdmi_codec ax88179_178a usbnet lontium_lt9611 venus_dec venus_enc videobuf2_dma_contig xhci_pci_renesas mcp251xfd can_dev leds_qcom_lpg hci_uart snd_soc_sdm845 snd_soc_rt5663 btqca qcom_pbs btbcm qcom_spmi_adc5 msm snd_soc_qcom_sdw led_class_multicolor qcom_spmi_temp_alarm qcom_pon ath10k_snoc rtc_pm8xxx qcom_camss qcom_vadc_common ath10k_core videobuf2_dma_sg snd_soc_qcom_common ocmem snd_soc_rl6231 drm_exec v4l2_fwnode soundwire_bus crct10dif_ce gpu_sched venus_core camcc_sdm845 ath drm_dp_aux_bus v4l2_async videobuf2_memops bluetooth qcrypto v4l2_mem2mem videobuf2_v4l2 i2c_qcom_geni reset_qcom_pdc qcom_stats mac80211 drm_display_helper ecdh_generic videodev coresight_stm libarc4 ecc phy_qcom_qmp_combo videobuf2_common mc pwrseq_core spi_geni_qcom phy_qcom_qusb2 cfg80211 stm_core aux_bridge authenc phy_qcom_qmp_usb typec gpi rfkill libdes phy_qcom_qmp_ufs qcom_rng coresight_funnel coresight_replicator coresight_tmc slim_qcom_ngd_ctrl qcom_q6v5_mss
[   51.397124]  coresight ufs_qcom phy_qcom_qmp_pcie icc_osm_l3 qcom_wdt lmh slimbus pdr_interface qcom_pdr_msg qrtr llcc_qcom icc_bwmon qcom_q6v5_pas qcom_pil_info qcom_q6v5 display_connector qcom_sysmon qcom_common drm_kms_helper qcom_glink_smem mdt_loader qmi_helpers drm socinfo backlight rmtfs_mem
[   51.514571] CPU: 0 UID: 0 PID: 1889 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   51.522164] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.527912] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.534979] pc : __kvmalloc_node_noprof+0x138/0x148
[   51.539942] lr : __kvmalloc_node_noprof+0x64/0x148
[   51.544813] sp : ffff800088fe3ce0
[   51.548188] x29: ffff800088fe3cf0 x28: ffff225d82944900 x27: 0000000000000000
[   51.555441] x26: 0000000000000000 x25: 0000000000000000 x24: ffff225d81516ec0
[   51.562690] x23: ffff225d81516f40 x22: ffffc7ece812d6b0 x21: 0000000200002000
[   51.569939] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   51.577187] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.584436] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.591685] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.598925] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   51.606171] x5 : 0000000000000000 x4 : ffff225d82944900 x3 : 0000000000000000
[   51.613419] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.620667] Call trace:
[   51.623160]  __kvmalloc_node_noprof+0x138/0x148
[   51.627768]  alloc_fdtable+0x90/0x110
[   51.631496]  expand_files+0x78/0x318
[   51.635135]  ksys_dup3+0x60/0x120
[   51.638505]  __arm64_sys_dup3+0x20/0x30
[   51.642414]  invoke_syscall+0x48/0x10c
[   51.646226]  el0_svc_common.constprop.0+0x40/0xe0
[   51.651010]  do_el0_svc+0x1c/0x28
[   51.654390]  el0_svc+0x30/0xcc
[   51.657502]  el0t_64_sync_handler+0x120/0x12c
[   51.661930]  el0t_64_sync+0x190/0x194
[   51.665657] ---[ end trace 0000000000000000 ]---

test log snippet test parser 6

Home

------------[ cut here ]------------
[   51.487834] WARNING: CPU: 4 PID: 1439 at mm/util.c:670 __kvmalloc_node_noprof+0x11c/0x124
[   51.488687] Modules linked in: smsc smsc95xx usbnet crct10dif_ce ramoops reed_solomon fuse drm backlight ip_tables x_tables
[   51.499801] CPU: 4 UID: 0 PID: 1439 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   51.507265] Hardware name: WinLink E850-96 board (DT)
[   51.512299] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.519242] pc : __kvmalloc_node_noprof+0x11c/0x124
[   51.524101] lr : __kvmalloc_node_noprof+0x50/0x124
[   51.528876] sp : ffff800084ca3ce0
[   51.532174] x29: ffff800084ca3cf0 x28: ffff00080299a480 x27: 0000000000000000
[   51.539294] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   51.546411] x23: 0000000080000000 x22: ffff80008034b268 x21: 0000000200002000
[   51.553528] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   51.560646] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.567764] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.574882] x11: 0000000000000040 x10: 437e94e2bf06e900 x9 : 437e94e2bf06e900
[   51.582000] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   51.589118] x5 : 0000000000000000 x4 : ffff800084ca3cb0 x3 : 0000000000000000
[   51.596236] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   51.603356] Call trace:
[   51.605786]  __kvmalloc_node_noprof+0x11c/0x124
[   51.610300]  alloc_fdtable+0x7c/0x108
[   51.613944]  expand_files+0x114/0x2f0
[   51.617589]  ksys_dup3+0x64/0xfc
[   51.620801]  __arm64_sys_dup3+0x20/0x30
[   51.624620]  invoke_syscall+0x40/0xf8
[   51.628266]  el0_svc_common+0xa8/0xd8
[   51.631912]  do_el0_svc+0x1c/0x28
[   51.635211]  el0_svc+0x38/0x68
[   51.638249]  el0t_64_sync_handler+0x90/0xfc
[   51.642415]  el0t_64_sync+0x190/0x194
[   51.646065] ---[ end trace 0000000000000000 ]---

test log snippet test parser 7

Home

[  162.817574] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  162.823795] Modules linked in:
[  162.826838] CPU: 4 UID: 0 PID: 665 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[  162.835949] Tainted: [B]=BAD_PAGE, [N]=TEST
[  162.840110] Hardware name: WinLink E850-96 board (DT)
[  162.845148] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.852089] pc : kunit_test_null_dereference+0x70/0x170
[  162.857296] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.863112] sp : ffff80008b8b7dc0
[  162.866412] x29: ffff80008b8b7e20 x28: 0000000000000000 x27: 0000000000000000
[  162.873528] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0008056f2180
[  162.880646] x23: ffff80008119e190 x22: ffff8000811a6d50 x21: ffff0008056f2188
[  162.887764] x20: 1ffff00011716fb8 x19: ffff8000877a79f0 x18: 0000000000000392
[  162.894883] x17: ffff8000811a7ce0 x16: ffff8000811a4e48 x15: ffff80008119ab4c
[  162.901999] x14: 1fffe0010b5ed1b0 x13: 0000000000000000 x12: ffff600100e3761a
[  162.909118] x11: 1fffe00100e37619 x10: ffff600100e37619 x9 : ffff80008119e218
[  162.916236] x8 : ffff80008b8b7cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  162.923354] x5 : ffff700011716fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  162.930472] x2 : dfff800000000000 x1 : ffff0008071ba800 x0 : ffff8000877a79f0
[  162.937593] Call trace:
[  162.940022]  kunit_test_null_dereference+0x70/0x170
[  162.944882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.950350]  kthread+0x24c/0x2d0
[  162.953562]  ret_from_fork+0x10/0x20
[  162.957133] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  162.963202] ---[ end trace 0000000000000000 ]---

test log snippet test parser 8

Home

[  162.817574] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  162.823795] Modules linked in:
[  162.826838] CPU: 4 UID: 0 PID: 665 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[  162.835949] Tainted: [B]=BAD_PAGE, [N]=TEST
[  162.840110] Hardware name: WinLink E850-96 board (DT)
[  162.845148] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.852089] pc : kunit_test_null_dereference+0x70/0x170
[  162.857296] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.863112] sp : ffff80008b8b7dc0
[  162.866412] x29: ffff80008b8b7e20 x28: 0000000000000000 x27: 0000000000000000
[  162.873528] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0008056f2180
[  162.880646] x23: ffff80008119e190 x22: ffff8000811a6d50 x21: ffff0008056f2188
[  162.887764] x20: 1ffff00011716fb8 x19: ffff8000877a79f0 x18: 0000000000000392
[  162.894883] x17: ffff8000811a7ce0 x16: ffff8000811a4e48 x15: ffff80008119ab4c
[  162.901999] x14: 1fffe0010b5ed1b0 x13: 0000000000000000 x12: ffff600100e3761a
[  162.909118] x11: 1fffe00100e37619 x10: ffff600100e37619 x9 : ffff80008119e218
[  162.916236] x8 : ffff80008b8b7cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  162.923354] x5 : ffff700011716fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  162.930472] x2 : dfff800000000000 x1 : ffff0008071ba800 x0 : ffff8000877a79f0
[  162.937593] Call trace:
[  162.940022]  kunit_test_null_dereference+0x70/0x170
[  162.944882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.950350]  kthread+0x24c/0x2d0
[  162.953562]  ret_from_fork+0x10/0x20
[  162.957133] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  162.963202] ---[ end trace 0000000000000000 ]---

test log snippet test parser 9

Home

[   38.502174] ==================================================================
[   38.511448] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318
[   38.518910] Read of size 1 at addr ffff800088e27bdf by task kunit_try_catch/288
[   38.526199] 
[   38.527683] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.536796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.540957] Hardware name: WinLink E850-96 board (DT)
[   38.545994] Call trace:
[   38.548424]  dump_backtrace+0x9c/0x128
[   38.552153]  show_stack+0x20/0x38
[   38.555452]  dump_stack_lvl+0x8c/0xd0
[   38.559098]  print_report+0x2fc/0x5e0
[   38.562743]  kasan_report+0xc8/0x118
[   38.566304]  __asan_report_load1_noabort+0x20/0x30
[   38.571076]  kasan_alloca_oob_left+0x2c0/0x318
[   38.575503]  kunit_try_run_case+0x14c/0x3d0
[   38.579670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.585139]  kthread+0x24c/0x2d0
[   38.588350]  ret_from_fork+0x10/0x20
[   38.591911] 
[   38.593390] The buggy address belongs to stack of task kunit_try_catch/288
[   38.600263] 
[   38.601723] The buggy address belongs to the virtual mapping at
[   38.601723]  [ffff800088e20000, ffff800088e29000) created by:
[   38.601723]  kernel_clone+0x140/0x790
[   38.616996] 
[   38.618475] The buggy address belongs to the physical page:
[   38.624031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88473e
[   38.632016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.638538] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.646255] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.653976] page dumped because: kasan: bad access detected
[   38.659530] 
[   38.661005] Memory state around the buggy address:
[   38.665785]  ffff800088e27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.672988]  ffff800088e27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.680193] >ffff800088e27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   38.687394]                                                     ^
[   38.693473]  ffff800088e27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   38.700678]  ffff800088e27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   38.707880] ==================================================================

test log snippet test parser 10

Home

[   38.502174] ==================================================================
[   38.511448] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318
[   38.518910] Read of size 1 at addr ffff800088e27bdf by task kunit_try_catch/288
[   38.526199] 
[   38.527683] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.536796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.540957] Hardware name: WinLink E850-96 board (DT)
[   38.545994] Call trace:
[   38.548424]  dump_backtrace+0x9c/0x128
[   38.552153]  show_stack+0x20/0x38
[   38.555452]  dump_stack_lvl+0x8c/0xd0
[   38.559098]  print_report+0x2fc/0x5e0
[   38.562743]  kasan_report+0xc8/0x118
[   38.566304]  __asan_report_load1_noabort+0x20/0x30
[   38.571076]  kasan_alloca_oob_left+0x2c0/0x318
[   38.575503]  kunit_try_run_case+0x14c/0x3d0
[   38.579670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.585139]  kthread+0x24c/0x2d0
[   38.588350]  ret_from_fork+0x10/0x20
[   38.591911] 
[   38.593390] The buggy address belongs to stack of task kunit_try_catch/288
[   38.600263] 
[   38.601723] The buggy address belongs to the virtual mapping at
[   38.601723]  [ffff800088e20000, ffff800088e29000) created by:
[   38.601723]  kernel_clone+0x140/0x790
[   38.616996] 
[   38.618475] The buggy address belongs to the physical page:
[   38.624031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88473e
[   38.632016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.638538] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.646255] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.653976] page dumped because: kasan: bad access detected
[   38.659530] 
[   38.661005] Memory state around the buggy address:
[   38.665785]  ffff800088e27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.672988]  ffff800088e27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.680193] >ffff800088e27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   38.687394]                                                     ^
[   38.693473]  ffff800088e27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   38.700678]  ffff800088e27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   38.707880] ==================================================================

test log snippet test parser 11

Home

[   38.716521] ==================================================================
[   38.726463] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   38.734010] Read of size 1 at addr ffff800088e47bea by task kunit_try_catch/290
[   38.741300] 
[   38.742785] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.751898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.756058] Hardware name: WinLink E850-96 board (DT)
[   38.761095] Call trace:
[   38.763523]  dump_backtrace+0x9c/0x128
[   38.767254]  show_stack+0x20/0x38
[   38.770553]  dump_stack_lvl+0x8c/0xd0
[   38.774200]  print_report+0x2fc/0x5e0
[   38.777844]  kasan_report+0xc8/0x118
[   38.781403]  __asan_report_load1_noabort+0x20/0x30
[   38.786177]  kasan_alloca_oob_right+0x2e4/0x348
[   38.790694]  kunit_try_run_case+0x14c/0x3d0
[   38.794858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.800328]  kthread+0x24c/0x2d0
[   38.803538]  ret_from_fork+0x10/0x20
[   38.807100] 
[   38.808576] The buggy address belongs to stack of task kunit_try_catch/290
[   38.815454] 
[   38.816914] The buggy address belongs to the virtual mapping at
[   38.816914]  [ffff800088e40000, ffff800088e49000) created by:
[   38.816914]  kernel_clone+0x140/0x790
[   38.832185] 
[   38.833664] The buggy address belongs to the physical page:
[   38.839220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884752
[   38.847203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.853723] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.861442] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.869164] page dumped because: kasan: bad access detected
[   38.874718] 
[   38.876193] Memory state around the buggy address:
[   38.880974]  ffff800088e47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.888175]  ffff800088e47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.895381] >ffff800088e47b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   38.902582]                                                           ^
[   38.909182]  ffff800088e47c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   38.916388]  ffff800088e47c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   38.923588] ==================================================================

test log snippet test parser 12

Home

[   38.716521] ==================================================================
[   38.726463] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   38.734010] Read of size 1 at addr ffff800088e47bea by task kunit_try_catch/290
[   38.741300] 
[   38.742785] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.751898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.756058] Hardware name: WinLink E850-96 board (DT)
[   38.761095] Call trace:
[   38.763523]  dump_backtrace+0x9c/0x128
[   38.767254]  show_stack+0x20/0x38
[   38.770553]  dump_stack_lvl+0x8c/0xd0
[   38.774200]  print_report+0x2fc/0x5e0
[   38.777844]  kasan_report+0xc8/0x118
[   38.781403]  __asan_report_load1_noabort+0x20/0x30
[   38.786177]  kasan_alloca_oob_right+0x2e4/0x348
[   38.790694]  kunit_try_run_case+0x14c/0x3d0
[   38.794858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.800328]  kthread+0x24c/0x2d0
[   38.803538]  ret_from_fork+0x10/0x20
[   38.807100] 
[   38.808576] The buggy address belongs to stack of task kunit_try_catch/290
[   38.815454] 
[   38.816914] The buggy address belongs to the virtual mapping at
[   38.816914]  [ffff800088e40000, ffff800088e49000) created by:
[   38.816914]  kernel_clone+0x140/0x790
[   38.832185] 
[   38.833664] The buggy address belongs to the physical page:
[   38.839220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884752
[   38.847203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.853723] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.861442] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.869164] page dumped because: kasan: bad access detected
[   38.874718] 
[   38.876193] Memory state around the buggy address:
[   38.880974]  ffff800088e47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.888175]  ffff800088e47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.895381] >ffff800088e47b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   38.902582]                                                           ^
[   38.909182]  ffff800088e47c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   38.916388]  ffff800088e47c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   38.923588] ==================================================================

test log snippet test parser 13

Home

[   29.372882] ==================================================================
[   29.379899] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   29.385884] Free of addr ffff000801fec300 by task kunit_try_catch/229
[   29.392308] 
[   29.393792] CPU: 4 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.402906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.407066] Hardware name: WinLink E850-96 board (DT)
[   29.412102] Call trace:
[   29.414530]  dump_backtrace+0x9c/0x128
[   29.418262]  show_stack+0x20/0x38
[   29.421561]  dump_stack_lvl+0x8c/0xd0
[   29.425207]  print_report+0x118/0x5e0
[   29.428853]  kasan_report_invalid_free+0xb0/0xd8
[   29.433453]  check_slab_allocation+0xd4/0x108
[   29.437793]  __kasan_slab_pre_free+0x2c/0x48
[   29.442047]  kfree+0xe8/0x3b8
[   29.444998]  kfree_sensitive+0x3c/0xb0
[   29.448731]  kmalloc_double_kzfree+0x174/0x318
[   29.453159]  kunit_try_run_case+0x14c/0x3d0
[   29.457326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462794]  kthread+0x24c/0x2d0
[   29.466005]  ret_from_fork+0x10/0x20
[   29.469566] 
[   29.471039] Allocated by task 229:
[   29.474426]  kasan_save_stack+0x3c/0x68
[   29.478244]  kasan_save_track+0x20/0x40
[   29.482063]  kasan_save_alloc_info+0x40/0x58
[   29.486317]  __kasan_kmalloc+0xd4/0xd8
[   29.490049]  __kmalloc_cache_noprof+0x144/0x328
[   29.494563]  kmalloc_double_kzfree+0xb8/0x318
[   29.498905]  kunit_try_run_case+0x14c/0x3d0
[   29.503070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.508539]  kthread+0x24c/0x2d0
[   29.511751]  ret_from_fork+0x10/0x20
[   29.515310] 
[   29.516785] Freed by task 229:
[   29.519823]  kasan_save_stack+0x3c/0x68
[   29.523643]  kasan_save_track+0x20/0x40
[   29.527462]  kasan_save_free_info+0x4c/0x78
[   29.531629]  __kasan_slab_free+0x6c/0x98
[   29.535535]  kfree+0x110/0x3b8
[   29.538573]  kfree_sensitive+0x80/0xb0
[   29.542306]  kmalloc_double_kzfree+0x120/0x318
[   29.546733]  kunit_try_run_case+0x14c/0x3d0
[   29.550901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.556368]  kthread+0x24c/0x2d0
[   29.559580]  ret_from_fork+0x10/0x20
[   29.563139] 
[   29.564617] The buggy address belongs to the object at ffff000801fec300
[   29.564617]  which belongs to the cache kmalloc-16 of size 16
[   29.576943] The buggy address is located 0 bytes inside of
[   29.576943]  16-byte region [ffff000801fec300, ffff000801fec310)
[   29.588398] 
[   29.589876] The buggy address belongs to the physical page:
[   29.595434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fec
[   29.603418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.609926] page_type: f5(slab)
[   29.613060] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.620783] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.628503] page dumped because: kasan: bad access detected
[   29.634058] 
[   29.635533] Memory state around the buggy address:
[   29.640313]  ffff000801fec200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.647516]  ffff000801fec280: 00 02 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   29.654722] >ffff000801fec300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.661922]                    ^
[   29.665137]  ffff000801fec380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672343]  ffff000801fec400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679543] ==================================================================

test log snippet test parser 14

Home

[   29.372882] ==================================================================
[   29.379899] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   29.385884] Free of addr ffff000801fec300 by task kunit_try_catch/229
[   29.392308] 
[   29.393792] CPU: 4 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.402906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.407066] Hardware name: WinLink E850-96 board (DT)
[   29.412102] Call trace:
[   29.414530]  dump_backtrace+0x9c/0x128
[   29.418262]  show_stack+0x20/0x38
[   29.421561]  dump_stack_lvl+0x8c/0xd0
[   29.425207]  print_report+0x118/0x5e0
[   29.428853]  kasan_report_invalid_free+0xb0/0xd8
[   29.433453]  check_slab_allocation+0xd4/0x108
[   29.437793]  __kasan_slab_pre_free+0x2c/0x48
[   29.442047]  kfree+0xe8/0x3b8
[   29.444998]  kfree_sensitive+0x3c/0xb0
[   29.448731]  kmalloc_double_kzfree+0x174/0x318
[   29.453159]  kunit_try_run_case+0x14c/0x3d0
[   29.457326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462794]  kthread+0x24c/0x2d0
[   29.466005]  ret_from_fork+0x10/0x20
[   29.469566] 
[   29.471039] Allocated by task 229:
[   29.474426]  kasan_save_stack+0x3c/0x68
[   29.478244]  kasan_save_track+0x20/0x40
[   29.482063]  kasan_save_alloc_info+0x40/0x58
[   29.486317]  __kasan_kmalloc+0xd4/0xd8
[   29.490049]  __kmalloc_cache_noprof+0x144/0x328
[   29.494563]  kmalloc_double_kzfree+0xb8/0x318
[   29.498905]  kunit_try_run_case+0x14c/0x3d0
[   29.503070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.508539]  kthread+0x24c/0x2d0
[   29.511751]  ret_from_fork+0x10/0x20
[   29.515310] 
[   29.516785] Freed by task 229:
[   29.519823]  kasan_save_stack+0x3c/0x68
[   29.523643]  kasan_save_track+0x20/0x40
[   29.527462]  kasan_save_free_info+0x4c/0x78
[   29.531629]  __kasan_slab_free+0x6c/0x98
[   29.535535]  kfree+0x110/0x3b8
[   29.538573]  kfree_sensitive+0x80/0xb0
[   29.542306]  kmalloc_double_kzfree+0x120/0x318
[   29.546733]  kunit_try_run_case+0x14c/0x3d0
[   29.550901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.556368]  kthread+0x24c/0x2d0
[   29.559580]  ret_from_fork+0x10/0x20
[   29.563139] 
[   29.564617] The buggy address belongs to the object at ffff000801fec300
[   29.564617]  which belongs to the cache kmalloc-16 of size 16
[   29.576943] The buggy address is located 0 bytes inside of
[   29.576943]  16-byte region [ffff000801fec300, ffff000801fec310)
[   29.588398] 
[   29.589876] The buggy address belongs to the physical page:
[   29.595434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fec
[   29.603418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.609926] page_type: f5(slab)
[   29.613060] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.620783] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.628503] page dumped because: kasan: bad access detected
[   29.634058] 
[   29.635533] Memory state around the buggy address:
[   29.640313]  ffff000801fec200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.647516]  ffff000801fec280: 00 02 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   29.654722] >ffff000801fec300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.661922]                    ^
[   29.665137]  ffff000801fec380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672343]  ffff000801fec400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679543] ==================================================================

test log snippet test parser 15

Home

[   32.727265] ==================================================================
[   32.727439] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0
[   32.727563] Free of addr ffff000801fb2000 by task kunit_try_catch/246
[   32.728972] 
[   32.730458] CPU: 7 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.739569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.743730] Hardware name: WinLink E850-96 board (DT)
[   32.748768] Call trace:
[   32.751196]  dump_backtrace+0x9c/0x128
[   32.754927]  show_stack+0x20/0x38
[   32.758225]  dump_stack_lvl+0x8c/0xd0
[   32.761871]  print_report+0x118/0x5e0
[   32.765517]  kasan_report_invalid_free+0xb0/0xd8
[   32.770117]  check_slab_allocation+0xd4/0x108
[   32.774457]  __kasan_slab_pre_free+0x2c/0x48
[   32.778711]  kmem_cache_free+0xf0/0x468
[   32.782530]  kmem_cache_double_free+0x19c/0x3e0
[   32.787044]  kunit_try_run_case+0x14c/0x3d0
[   32.791211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.796679]  kthread+0x24c/0x2d0
[   32.799891]  ret_from_fork+0x10/0x20
[   32.803454] 
[   32.804927] Allocated by task 246:
[   32.808315]  kasan_save_stack+0x3c/0x68
[   32.812130]  kasan_save_track+0x20/0x40
[   32.815950]  kasan_save_alloc_info+0x40/0x58
[   32.820203]  __kasan_slab_alloc+0xa8/0xb0
[   32.824198]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.828710]  kmem_cache_double_free+0x130/0x3e0
[   32.833224]  kunit_try_run_case+0x14c/0x3d0
[   32.837391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.842859]  kthread+0x24c/0x2d0
[   32.846071]  ret_from_fork+0x10/0x20
[   32.849630] 
[   32.851107] Freed by task 246:
[   32.854145]  kasan_save_stack+0x3c/0x68
[   32.857964]  kasan_save_track+0x20/0x40
[   32.861783]  kasan_save_free_info+0x4c/0x78
[   32.865949]  __kasan_slab_free+0x6c/0x98
[   32.869855]  kmem_cache_free+0x118/0x468
[   32.873762]  kmem_cache_double_free+0x144/0x3e0
[   32.878277]  kunit_try_run_case+0x14c/0x3d0
[   32.882442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.887911]  kthread+0x24c/0x2d0
[   32.891122]  ret_from_fork+0x10/0x20
[   32.894682] 
[   32.896157] The buggy address belongs to the object at ffff000801fb2000
[   32.896157]  which belongs to the cache test_cache of size 200
[   32.908572] The buggy address is located 0 bytes inside of
[   32.908572]  200-byte region [ffff000801fb2000, ffff000801fb20c8)
[   32.920115] 
[   32.921594] The buggy address belongs to the physical page:
[   32.927151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fb2
[   32.935134] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.942774] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.949719] page_type: f5(slab)
[   32.952856] raw: 0bfffe0000000040 ffff000801fb0000 dead000000000122 0000000000000000
[   32.960572] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.968298] head: 0bfffe0000000040 ffff000801fb0000 dead000000000122 0000000000000000
[   32.976110] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.983922] head: 0bfffe0000000001 fffffdffe007ec81 ffffffffffffffff 0000000000000000
[   32.991734] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   32.999541] page dumped because: kasan: bad access detected
[   33.005096] 
[   33.006572] Memory state around the buggy address:
[   33.011354]  ffff000801fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.018556]  ffff000801fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.025761] >ffff000801fb2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.032961]                    ^
[   33.036176]  ffff000801fb2080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.043380]  ffff000801fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.050582] ==================================================================

test log snippet test parser 16

Home

[   32.727265] ==================================================================
[   32.727439] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0
[   32.727563] Free of addr ffff000801fb2000 by task kunit_try_catch/246
[   32.728972] 
[   32.730458] CPU: 7 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.739569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.743730] Hardware name: WinLink E850-96 board (DT)
[   32.748768] Call trace:
[   32.751196]  dump_backtrace+0x9c/0x128
[   32.754927]  show_stack+0x20/0x38
[   32.758225]  dump_stack_lvl+0x8c/0xd0
[   32.761871]  print_report+0x118/0x5e0
[   32.765517]  kasan_report_invalid_free+0xb0/0xd8
[   32.770117]  check_slab_allocation+0xd4/0x108
[   32.774457]  __kasan_slab_pre_free+0x2c/0x48
[   32.778711]  kmem_cache_free+0xf0/0x468
[   32.782530]  kmem_cache_double_free+0x19c/0x3e0
[   32.787044]  kunit_try_run_case+0x14c/0x3d0
[   32.791211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.796679]  kthread+0x24c/0x2d0
[   32.799891]  ret_from_fork+0x10/0x20
[   32.803454] 
[   32.804927] Allocated by task 246:
[   32.808315]  kasan_save_stack+0x3c/0x68
[   32.812130]  kasan_save_track+0x20/0x40
[   32.815950]  kasan_save_alloc_info+0x40/0x58
[   32.820203]  __kasan_slab_alloc+0xa8/0xb0
[   32.824198]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.828710]  kmem_cache_double_free+0x130/0x3e0
[   32.833224]  kunit_try_run_case+0x14c/0x3d0
[   32.837391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.842859]  kthread+0x24c/0x2d0
[   32.846071]  ret_from_fork+0x10/0x20
[   32.849630] 
[   32.851107] Freed by task 246:
[   32.854145]  kasan_save_stack+0x3c/0x68
[   32.857964]  kasan_save_track+0x20/0x40
[   32.861783]  kasan_save_free_info+0x4c/0x78
[   32.865949]  __kasan_slab_free+0x6c/0x98
[   32.869855]  kmem_cache_free+0x118/0x468
[   32.873762]  kmem_cache_double_free+0x144/0x3e0
[   32.878277]  kunit_try_run_case+0x14c/0x3d0
[   32.882442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.887911]  kthread+0x24c/0x2d0
[   32.891122]  ret_from_fork+0x10/0x20
[   32.894682] 
[   32.896157] The buggy address belongs to the object at ffff000801fb2000
[   32.896157]  which belongs to the cache test_cache of size 200
[   32.908572] The buggy address is located 0 bytes inside of
[   32.908572]  200-byte region [ffff000801fb2000, ffff000801fb20c8)
[   32.920115] 
[   32.921594] The buggy address belongs to the physical page:
[   32.927151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fb2
[   32.935134] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.942774] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.949719] page_type: f5(slab)
[   32.952856] raw: 0bfffe0000000040 ffff000801fb0000 dead000000000122 0000000000000000
[   32.960572] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.968298] head: 0bfffe0000000040 ffff000801fb0000 dead000000000122 0000000000000000
[   32.976110] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.983922] head: 0bfffe0000000001 fffffdffe007ec81 ffffffffffffffff 0000000000000000
[   32.991734] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   32.999541] page dumped because: kasan: bad access detected
[   33.005096] 
[   33.006572] Memory state around the buggy address:
[   33.011354]  ffff000801fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.018556]  ffff000801fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.025761] >ffff000801fb2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.032961]                    ^
[   33.036176]  ffff000801fb2080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.043380]  ffff000801fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.050582] ==================================================================

test log snippet test parser 17

Home

[   36.658499] ==================================================================
[   36.668248] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   36.675361] Free of addr ffff000801fb6800 by task kunit_try_catch/272
[   36.681783] 
[   36.683268] CPU: 5 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.692379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.696540] Hardware name: WinLink E850-96 board (DT)
[   36.701578] Call trace:
[   36.704004]  dump_backtrace+0x9c/0x128
[   36.707736]  show_stack+0x20/0x38
[   36.711035]  dump_stack_lvl+0x8c/0xd0
[   36.714681]  print_report+0x118/0x5e0
[   36.718326]  kasan_report_invalid_free+0xb0/0xd8
[   36.722927]  check_slab_allocation+0xd4/0x108
[   36.727269]  __kasan_mempool_poison_object+0x78/0x150
[   36.732302]  mempool_free+0x28c/0x328
[   36.735949]  mempool_double_free_helper+0x15c/0x2f8
[   36.740809]  mempool_kmalloc_double_free+0xb8/0x110
[   36.745670]  kunit_try_run_case+0x14c/0x3d0
[   36.749838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.755305]  kthread+0x24c/0x2d0
[   36.758517]  ret_from_fork+0x10/0x20
[   36.762077] 
[   36.763552] Allocated by task 272:
[   36.766941]  kasan_save_stack+0x3c/0x68
[   36.770756]  kasan_save_track+0x20/0x40
[   36.774575]  kasan_save_alloc_info+0x40/0x58
[   36.778829]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.784126]  remove_element+0x130/0x1f8
[   36.787943]  mempool_alloc_preallocated+0x58/0xc0
[   36.792631]  mempool_double_free_helper+0x94/0x2f8
[   36.797405]  mempool_kmalloc_double_free+0xb8/0x110
[   36.802266]  kunit_try_run_case+0x14c/0x3d0
[   36.806432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.811901]  kthread+0x24c/0x2d0
[   36.815113]  ret_from_fork+0x10/0x20
[   36.818672] 
[   36.820149] Freed by task 272:
[   36.823187]  kasan_save_stack+0x3c/0x68
[   36.827005]  kasan_save_track+0x20/0x40
[   36.830825]  kasan_save_free_info+0x4c/0x78
[   36.834991]  __kasan_mempool_poison_object+0xc0/0x150
[   36.840027]  mempool_free+0x28c/0x328
[   36.843671]  mempool_double_free_helper+0x104/0x2f8
[   36.848533]  mempool_kmalloc_double_free+0xb8/0x110
[   36.853394]  kunit_try_run_case+0x14c/0x3d0
[   36.857560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.863029]  kthread+0x24c/0x2d0
[   36.866241]  ret_from_fork+0x10/0x20
[   36.869800] 
[   36.871277] The buggy address belongs to the object at ffff000801fb6800
[   36.871277]  which belongs to the cache kmalloc-128 of size 128
[   36.883777] The buggy address is located 0 bytes inside of
[   36.883777]  128-byte region [ffff000801fb6800, ffff000801fb6880)
[   36.895320] 
[   36.896799] The buggy address belongs to the physical page:
[   36.902358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fb6
[   36.910339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.917979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.924922] page_type: f5(slab)
[   36.928057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.935777] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.943504] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.951315] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.959128] head: 0bfffe0000000001 fffffdffe007ed81 ffffffffffffffff 0000000000000000
[   36.966939] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.974746] page dumped because: kasan: bad access detected
[   36.980301] 
[   36.981777] Memory state around the buggy address:
[   36.986558]  ffff000801fb6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.993759]  ffff000801fb6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.000966] >ffff000801fb6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.008166]                    ^
[   37.011381]  ffff000801fb6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.018585]  ffff000801fb6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.025787] ==================================================================
[   37.271329] ==================================================================
[   37.281950] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   37.289064] Free of addr ffff000803280000 by task kunit_try_catch/276
[   37.295489] 
[   37.296972] CPU: 5 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.306085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.310246] Hardware name: WinLink E850-96 board (DT)
[   37.315284] Call trace:
[   37.317710]  dump_backtrace+0x9c/0x128
[   37.321442]  show_stack+0x20/0x38
[   37.324741]  dump_stack_lvl+0x8c/0xd0
[   37.328387]  print_report+0x118/0x5e0
[   37.332033]  kasan_report_invalid_free+0xb0/0xd8
[   37.336633]  __kasan_mempool_poison_pages+0xe0/0xe8
[   37.341494]  mempool_free+0x24c/0x328
[   37.345140]  mempool_double_free_helper+0x15c/0x2f8
[   37.350001]  mempool_page_alloc_double_free+0xb4/0x110
[   37.355124]  kunit_try_run_case+0x14c/0x3d0
[   37.359290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.364758]  kthread+0x24c/0x2d0
[   37.367969]  ret_from_fork+0x10/0x20
[   37.371532] 
[   37.373008] The buggy address belongs to the physical page:
[   37.378564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883280
[   37.386549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.393069] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.400788] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.408507] page dumped because: kasan: bad access detected
[   37.414062] 
[   37.415538] Memory state around the buggy address:
[   37.420320]  ffff00080327ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.427520]  ffff00080327ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.434725] >ffff000803280000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.441926]                    ^
[   37.445142]  ffff000803280080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.452346]  ffff000803280100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.459549] ==================================================================
[   37.034721] ==================================================================
[   37.044894] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   37.052006] Free of addr ffff0008033f0000 by task kunit_try_catch/274
[   37.058426] 
[   37.059912] CPU: 6 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.069022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.073184] Hardware name: WinLink E850-96 board (DT)
[   37.078222] Call trace:
[   37.080649]  dump_backtrace+0x9c/0x128
[   37.084380]  show_stack+0x20/0x38
[   37.087679]  dump_stack_lvl+0x8c/0xd0
[   37.091324]  print_report+0x118/0x5e0
[   37.094970]  kasan_report_invalid_free+0xb0/0xd8
[   37.099571]  __kasan_mempool_poison_object+0x14c/0x150
[   37.104693]  mempool_free+0x28c/0x328
[   37.108338]  mempool_double_free_helper+0x15c/0x2f8
[   37.113199]  mempool_kmalloc_large_double_free+0xb8/0x110
[   37.118582]  kunit_try_run_case+0x14c/0x3d0
[   37.122747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.128217]  kthread+0x24c/0x2d0
[   37.131428]  ret_from_fork+0x10/0x20
[   37.134991] 
[   37.136466] The buggy address belongs to the physical page:
[   37.142022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833f0
[   37.150004] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.157646] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.164599] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.172318] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.180045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.187856] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.195670] head: 0bfffe0000000002 fffffdffe00cfc01 ffffffffffffffff 0000000000000000
[   37.203481] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   37.211288] page dumped because: kasan: bad access detected
[   37.216843] 
[   37.218319] Memory state around the buggy address:
[   37.223102]  ffff0008033eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.230301]  ffff0008033eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.237508] >ffff0008033f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.244707]                    ^
[   37.247922]  ffff0008033f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.255127]  ffff0008033f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.262328] ==================================================================

test log snippet test parser 18

Home

[   36.658499] ==================================================================
[   36.668248] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   36.675361] Free of addr ffff000801fb6800 by task kunit_try_catch/272
[   36.681783] 
[   36.683268] CPU: 5 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.692379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.696540] Hardware name: WinLink E850-96 board (DT)
[   36.701578] Call trace:
[   36.704004]  dump_backtrace+0x9c/0x128
[   36.707736]  show_stack+0x20/0x38
[   36.711035]  dump_stack_lvl+0x8c/0xd0
[   36.714681]  print_report+0x118/0x5e0
[   36.718326]  kasan_report_invalid_free+0xb0/0xd8
[   36.722927]  check_slab_allocation+0xd4/0x108
[   36.727269]  __kasan_mempool_poison_object+0x78/0x150
[   36.732302]  mempool_free+0x28c/0x328
[   36.735949]  mempool_double_free_helper+0x15c/0x2f8
[   36.740809]  mempool_kmalloc_double_free+0xb8/0x110
[   36.745670]  kunit_try_run_case+0x14c/0x3d0
[   36.749838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.755305]  kthread+0x24c/0x2d0
[   36.758517]  ret_from_fork+0x10/0x20
[   36.762077] 
[   36.763552] Allocated by task 272:
[   36.766941]  kasan_save_stack+0x3c/0x68
[   36.770756]  kasan_save_track+0x20/0x40
[   36.774575]  kasan_save_alloc_info+0x40/0x58
[   36.778829]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.784126]  remove_element+0x130/0x1f8
[   36.787943]  mempool_alloc_preallocated+0x58/0xc0
[   36.792631]  mempool_double_free_helper+0x94/0x2f8
[   36.797405]  mempool_kmalloc_double_free+0xb8/0x110
[   36.802266]  kunit_try_run_case+0x14c/0x3d0
[   36.806432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.811901]  kthread+0x24c/0x2d0
[   36.815113]  ret_from_fork+0x10/0x20
[   36.818672] 
[   36.820149] Freed by task 272:
[   36.823187]  kasan_save_stack+0x3c/0x68
[   36.827005]  kasan_save_track+0x20/0x40
[   36.830825]  kasan_save_free_info+0x4c/0x78
[   36.834991]  __kasan_mempool_poison_object+0xc0/0x150
[   36.840027]  mempool_free+0x28c/0x328
[   36.843671]  mempool_double_free_helper+0x104/0x2f8
[   36.848533]  mempool_kmalloc_double_free+0xb8/0x110
[   36.853394]  kunit_try_run_case+0x14c/0x3d0
[   36.857560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.863029]  kthread+0x24c/0x2d0
[   36.866241]  ret_from_fork+0x10/0x20
[   36.869800] 
[   36.871277] The buggy address belongs to the object at ffff000801fb6800
[   36.871277]  which belongs to the cache kmalloc-128 of size 128
[   36.883777] The buggy address is located 0 bytes inside of
[   36.883777]  128-byte region [ffff000801fb6800, ffff000801fb6880)
[   36.895320] 
[   36.896799] The buggy address belongs to the physical page:
[   36.902358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fb6
[   36.910339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.917979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.924922] page_type: f5(slab)
[   36.928057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.935777] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.943504] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.951315] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.959128] head: 0bfffe0000000001 fffffdffe007ed81 ffffffffffffffff 0000000000000000
[   36.966939] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.974746] page dumped because: kasan: bad access detected
[   36.980301] 
[   36.981777] Memory state around the buggy address:
[   36.986558]  ffff000801fb6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.993759]  ffff000801fb6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.000966] >ffff000801fb6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.008166]                    ^
[   37.011381]  ffff000801fb6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.018585]  ffff000801fb6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.025787] ==================================================================

test log snippet test parser 19

Home

[   37.034721] ==================================================================
[   37.044894] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   37.052006] Free of addr ffff0008033f0000 by task kunit_try_catch/274
[   37.058426] 
[   37.059912] CPU: 6 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.069022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.073184] Hardware name: WinLink E850-96 board (DT)
[   37.078222] Call trace:
[   37.080649]  dump_backtrace+0x9c/0x128
[   37.084380]  show_stack+0x20/0x38
[   37.087679]  dump_stack_lvl+0x8c/0xd0
[   37.091324]  print_report+0x118/0x5e0
[   37.094970]  kasan_report_invalid_free+0xb0/0xd8
[   37.099571]  __kasan_mempool_poison_object+0x14c/0x150
[   37.104693]  mempool_free+0x28c/0x328
[   37.108338]  mempool_double_free_helper+0x15c/0x2f8
[   37.113199]  mempool_kmalloc_large_double_free+0xb8/0x110
[   37.118582]  kunit_try_run_case+0x14c/0x3d0
[   37.122747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.128217]  kthread+0x24c/0x2d0
[   37.131428]  ret_from_fork+0x10/0x20
[   37.134991] 
[   37.136466] The buggy address belongs to the physical page:
[   37.142022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833f0
[   37.150004] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.157646] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.164599] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.172318] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.180045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.187856] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.195670] head: 0bfffe0000000002 fffffdffe00cfc01 ffffffffffffffff 0000000000000000
[   37.203481] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   37.211288] page dumped because: kasan: bad access detected
[   37.216843] 
[   37.218319] Memory state around the buggy address:
[   37.223102]  ffff0008033eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.230301]  ffff0008033eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.237508] >ffff0008033f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.244707]                    ^
[   37.247922]  ffff0008033f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.255127]  ffff0008033f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.262328] ==================================================================

test log snippet test parser 20

Home

[   37.271329] ==================================================================
[   37.281950] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   37.289064] Free of addr ffff000803280000 by task kunit_try_catch/276
[   37.295489] 
[   37.296972] CPU: 5 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.306085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.310246] Hardware name: WinLink E850-96 board (DT)
[   37.315284] Call trace:
[   37.317710]  dump_backtrace+0x9c/0x128
[   37.321442]  show_stack+0x20/0x38
[   37.324741]  dump_stack_lvl+0x8c/0xd0
[   37.328387]  print_report+0x118/0x5e0
[   37.332033]  kasan_report_invalid_free+0xb0/0xd8
[   37.336633]  __kasan_mempool_poison_pages+0xe0/0xe8
[   37.341494]  mempool_free+0x24c/0x328
[   37.345140]  mempool_double_free_helper+0x15c/0x2f8
[   37.350001]  mempool_page_alloc_double_free+0xb4/0x110
[   37.355124]  kunit_try_run_case+0x14c/0x3d0
[   37.359290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.364758]  kthread+0x24c/0x2d0
[   37.367969]  ret_from_fork+0x10/0x20
[   37.371532] 
[   37.373008] The buggy address belongs to the physical page:
[   37.378564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883280
[   37.386549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.393069] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.400788] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.408507] page dumped because: kasan: bad access detected
[   37.414062] 
[   37.415538] Memory state around the buggy address:
[   37.420320]  ffff00080327ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.427520]  ffff00080327ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.434725] >ffff000803280000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.441926]                    ^
[   37.445142]  ffff000803280080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.452346]  ffff000803280100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.459549] ==================================================================

test log snippet test parser 21

Home

[   38.035270] ==================================================================
[   38.045915] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258
[   38.053463] Read of size 1 at addr ffff8000875e366d by task kunit_try_catch/282
[   38.060755] 
[   38.062239] CPU: 5 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.071354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.075511] Hardware name: WinLink E850-96 board (DT)
[   38.080550] Call trace:
[   38.082977]  dump_backtrace+0x9c/0x128
[   38.086709]  show_stack+0x20/0x38
[   38.090007]  dump_stack_lvl+0x8c/0xd0
[   38.093653]  print_report+0x2fc/0x5e0
[   38.097298]  kasan_report+0xc8/0x118
[   38.100858]  __asan_report_load1_noabort+0x20/0x30
[   38.105632]  kasan_global_oob_right+0x220/0x258
[   38.110146]  kunit_try_run_case+0x14c/0x3d0
[   38.114312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.119781]  kthread+0x24c/0x2d0
[   38.122993]  ret_from_fork+0x10/0x20
[   38.126554] 
[   38.128027] The buggy address belongs to the variable:
[   38.133149]  global_array+0xd/0x40
[   38.136534] 
[   38.138014] The buggy address belongs to the virtual mapping at
[   38.138014]  [ffff800085960000, ffff8000876a1000) created by:
[   38.138014]  paging_init+0x668/0x7c8
[   38.153201] 
[   38.154681] The buggy address belongs to the physical page:
[   38.160237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x875e3
[   38.168134] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   38.175432] raw: 03fffe0000002000 fffffdffc01d78c8 fffffdffc01d78c8 0000000000000000
[   38.183154] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.190874] page dumped because: kasan: bad access detected
[   38.196429] 
[   38.197904] Memory state around the buggy address:
[   38.202685]  ffff8000875e3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.209887]  ffff8000875e3580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.217094] >ffff8000875e3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   38.224294]                                                           ^
[   38.230894]  ffff8000875e3680: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   38.238099]  ffff8000875e3700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   38.245300] ==================================================================

test log snippet test parser 22

Home

[   38.035270] ==================================================================
[   38.045915] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258
[   38.053463] Read of size 1 at addr ffff8000875e366d by task kunit_try_catch/282
[   38.060755] 
[   38.062239] CPU: 5 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.071354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.075511] Hardware name: WinLink E850-96 board (DT)
[   38.080550] Call trace:
[   38.082977]  dump_backtrace+0x9c/0x128
[   38.086709]  show_stack+0x20/0x38
[   38.090007]  dump_stack_lvl+0x8c/0xd0
[   38.093653]  print_report+0x2fc/0x5e0
[   38.097298]  kasan_report+0xc8/0x118
[   38.100858]  __asan_report_load1_noabort+0x20/0x30
[   38.105632]  kasan_global_oob_right+0x220/0x258
[   38.110146]  kunit_try_run_case+0x14c/0x3d0
[   38.114312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.119781]  kthread+0x24c/0x2d0
[   38.122993]  ret_from_fork+0x10/0x20
[   38.126554] 
[   38.128027] The buggy address belongs to the variable:
[   38.133149]  global_array+0xd/0x40
[   38.136534] 
[   38.138014] The buggy address belongs to the virtual mapping at
[   38.138014]  [ffff800085960000, ffff8000876a1000) created by:
[   38.138014]  paging_init+0x668/0x7c8
[   38.153201] 
[   38.154681] The buggy address belongs to the physical page:
[   38.160237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x875e3
[   38.168134] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   38.175432] raw: 03fffe0000002000 fffffdffc01d78c8 fffffdffc01d78c8 0000000000000000
[   38.183154] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.190874] page dumped because: kasan: bad access detected
[   38.196429] 
[   38.197904] Memory state around the buggy address:
[   38.202685]  ffff8000875e3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.209887]  ffff8000875e3580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.217094] >ffff8000875e3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   38.224294]                                                           ^
[   38.230894]  ffff8000875e3680: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   38.238099]  ffff8000875e3700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   38.245300] ==================================================================

test log snippet test parser 23

Home

[   20.592483] ==================================================================
[   20.601905] BUG: KASAN: invalid-free in kfree+0x260/0x3b8
[   20.607286] Free of addr ffff00080424c001 by task kunit_try_catch/187
[   20.613709] 
[   20.615191] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.624304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.628465] Hardware name: WinLink E850-96 board (DT)
[   20.633503] Call trace:
[   20.635932]  dump_backtrace+0x9c/0x128
[   20.639662]  show_stack+0x20/0x38
[   20.642960]  dump_stack_lvl+0x8c/0xd0
[   20.646606]  print_report+0x118/0x5e0
[   20.650252]  kasan_report_invalid_free+0xb0/0xd8
[   20.654852]  __kasan_kfree_large+0x5c/0xa8
[   20.658932]  free_large_kmalloc+0x58/0x140
[   20.663012]  kfree+0x260/0x3b8
[   20.666050]  kmalloc_large_invalid_free+0x114/0x290
[   20.670911]  kunit_try_run_case+0x14c/0x3d0
[   20.675078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.680546]  kthread+0x24c/0x2d0
[   20.683758]  ret_from_fork+0x10/0x20
[   20.687321] 
[   20.688797] The buggy address belongs to the physical page:
[   20.694353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88424c
[   20.702336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.709974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.716930] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.724649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.732375] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.740186] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.748000] head: 0bfffe0000000002 fffffdffe0109301 ffffffffffffffff 0000000000000000
[   20.755811] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.763618] page dumped because: kasan: bad access detected
[   20.769173] 
[   20.770649] Memory state around the buggy address:
[   20.775431]  ffff00080424bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.782632]  ffff00080424bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.789839] >ffff00080424c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.797038]                    ^
[   20.800252]  ffff00080424c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.807457]  ffff00080424c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.814659] ==================================================================

test log snippet test parser 24

Home

[   20.592483] ==================================================================
[   20.601905] BUG: KASAN: invalid-free in kfree+0x260/0x3b8
[   20.607286] Free of addr ffff00080424c001 by task kunit_try_catch/187
[   20.613709] 
[   20.615191] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.624304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.628465] Hardware name: WinLink E850-96 board (DT)
[   20.633503] Call trace:
[   20.635932]  dump_backtrace+0x9c/0x128
[   20.639662]  show_stack+0x20/0x38
[   20.642960]  dump_stack_lvl+0x8c/0xd0
[   20.646606]  print_report+0x118/0x5e0
[   20.650252]  kasan_report_invalid_free+0xb0/0xd8
[   20.654852]  __kasan_kfree_large+0x5c/0xa8
[   20.658932]  free_large_kmalloc+0x58/0x140
[   20.663012]  kfree+0x260/0x3b8
[   20.666050]  kmalloc_large_invalid_free+0x114/0x290
[   20.670911]  kunit_try_run_case+0x14c/0x3d0
[   20.675078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.680546]  kthread+0x24c/0x2d0
[   20.683758]  ret_from_fork+0x10/0x20
[   20.687321] 
[   20.688797] The buggy address belongs to the physical page:
[   20.694353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88424c
[   20.702336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.709974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.716930] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.724649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.732375] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.740186] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.748000] head: 0bfffe0000000002 fffffdffe0109301 ffffffffffffffff 0000000000000000
[   20.755811] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.763618] page dumped because: kasan: bad access detected
[   20.769173] 
[   20.770649] Memory state around the buggy address:
[   20.775431]  ffff00080424bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.782632]  ffff00080424bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.789839] >ffff00080424c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.797038]                    ^
[   20.800252]  ffff00080424c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.807457]  ffff00080424c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.814659] ==================================================================

test log snippet test parser 25

Home

[   33.064967] ==================================================================
[   33.069250] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8
[   33.076190] Free of addr ffff00080252a001 by task kunit_try_catch/248
[   33.082613] 
[   33.084099] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.093210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.097371] Hardware name: WinLink E850-96 board (DT)
[   33.102409] Call trace:
[   33.104836]  dump_backtrace+0x9c/0x128
[   33.108567]  show_stack+0x20/0x38
[   33.111866]  dump_stack_lvl+0x8c/0xd0
[   33.115511]  print_report+0x118/0x5e0
[   33.119157]  kasan_report_invalid_free+0xb0/0xd8
[   33.123758]  check_slab_allocation+0xfc/0x108
[   33.128098]  __kasan_slab_pre_free+0x2c/0x48
[   33.132352]  kmem_cache_free+0xf0/0x468
[   33.136172]  kmem_cache_invalid_free+0x190/0x3d8
[   33.140772]  kunit_try_run_case+0x14c/0x3d0
[   33.144939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.150407]  kthread+0x24c/0x2d0
[   33.153619]  ret_from_fork+0x10/0x20
[   33.157181] 
[   33.158654] Allocated by task 248:
[   33.162042]  kasan_save_stack+0x3c/0x68
[   33.165858]  kasan_save_track+0x20/0x40
[   33.169677]  kasan_save_alloc_info+0x40/0x58
[   33.173931]  __kasan_slab_alloc+0xa8/0xb0
[   33.177924]  kmem_cache_alloc_noprof+0xf4/0x308
[   33.182438]  kmem_cache_invalid_free+0x130/0x3d8
[   33.187038]  kunit_try_run_case+0x14c/0x3d0
[   33.191205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.196674]  kthread+0x24c/0x2d0
[   33.199885]  ret_from_fork+0x10/0x20
[   33.203444] 
[   33.204921] The buggy address belongs to the object at ffff00080252a000
[   33.204921]  which belongs to the cache test_cache of size 200
[   33.217335] The buggy address is located 1 bytes inside of
[   33.217335]  200-byte region [ffff00080252a000, ffff00080252a0c8)
[   33.228878] 
[   33.230356] The buggy address belongs to the physical page:
[   33.235914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88252a
[   33.243898] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.251536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.258478] page_type: f5(slab)
[   33.261616] raw: 0bfffe0000000040 ffff000801cac000 dead000000000122 0000000000000000
[   33.269336] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.277061] head: 0bfffe0000000040 ffff000801cac000 dead000000000122 0000000000000000
[   33.284872] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.292685] head: 0bfffe0000000001 fffffdffe0094a81 ffffffffffffffff 0000000000000000
[   33.300498] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   33.308303] page dumped because: kasan: bad access detected
[   33.313860] 
[   33.315335] Memory state around the buggy address:
[   33.320116]  ffff000802529f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.327317]  ffff000802529f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.334523] >ffff00080252a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.341723]                    ^
[   33.344939]  ffff00080252a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.352143]  ffff00080252a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359346] ==================================================================

test log snippet test parser 26

Home

[   33.064967] ==================================================================
[   33.069250] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8
[   33.076190] Free of addr ffff00080252a001 by task kunit_try_catch/248
[   33.082613] 
[   33.084099] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.093210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.097371] Hardware name: WinLink E850-96 board (DT)
[   33.102409] Call trace:
[   33.104836]  dump_backtrace+0x9c/0x128
[   33.108567]  show_stack+0x20/0x38
[   33.111866]  dump_stack_lvl+0x8c/0xd0
[   33.115511]  print_report+0x118/0x5e0
[   33.119157]  kasan_report_invalid_free+0xb0/0xd8
[   33.123758]  check_slab_allocation+0xfc/0x108
[   33.128098]  __kasan_slab_pre_free+0x2c/0x48
[   33.132352]  kmem_cache_free+0xf0/0x468
[   33.136172]  kmem_cache_invalid_free+0x190/0x3d8
[   33.140772]  kunit_try_run_case+0x14c/0x3d0
[   33.144939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.150407]  kthread+0x24c/0x2d0
[   33.153619]  ret_from_fork+0x10/0x20
[   33.157181] 
[   33.158654] Allocated by task 248:
[   33.162042]  kasan_save_stack+0x3c/0x68
[   33.165858]  kasan_save_track+0x20/0x40
[   33.169677]  kasan_save_alloc_info+0x40/0x58
[   33.173931]  __kasan_slab_alloc+0xa8/0xb0
[   33.177924]  kmem_cache_alloc_noprof+0xf4/0x308
[   33.182438]  kmem_cache_invalid_free+0x130/0x3d8
[   33.187038]  kunit_try_run_case+0x14c/0x3d0
[   33.191205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.196674]  kthread+0x24c/0x2d0
[   33.199885]  ret_from_fork+0x10/0x20
[   33.203444] 
[   33.204921] The buggy address belongs to the object at ffff00080252a000
[   33.204921]  which belongs to the cache test_cache of size 200
[   33.217335] The buggy address is located 1 bytes inside of
[   33.217335]  200-byte region [ffff00080252a000, ffff00080252a0c8)
[   33.228878] 
[   33.230356] The buggy address belongs to the physical page:
[   33.235914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88252a
[   33.243898] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.251536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.258478] page_type: f5(slab)
[   33.261616] raw: 0bfffe0000000040 ffff000801cac000 dead000000000122 0000000000000000
[   33.269336] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.277061] head: 0bfffe0000000040 ffff000801cac000 dead000000000122 0000000000000000
[   33.284872] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.292685] head: 0bfffe0000000001 fffffdffe0094a81 ffffffffffffffff 0000000000000000
[   33.300498] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   33.308303] page dumped because: kasan: bad access detected
[   33.313860] 
[   33.315335] Memory state around the buggy address:
[   33.320116]  ffff000802529f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.327317]  ffff000802529f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.334523] >ffff00080252a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.341723]                    ^
[   33.344939]  ffff00080252a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.352143]  ffff00080252a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359346] ==================================================================

test log snippet test parser 27

Home

[   37.796786] ==================================================================
[   37.807115] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.815102] Free of addr ffff000803280001 by task kunit_try_catch/280
[   37.821521] 
[   37.823005] CPU: 5 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.832120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.836279] Hardware name: WinLink E850-96 board (DT)
[   37.841317] Call trace:
[   37.843745]  dump_backtrace+0x9c/0x128
[   37.847476]  show_stack+0x20/0x38
[   37.850775]  dump_stack_lvl+0x8c/0xd0
[   37.854421]  print_report+0x118/0x5e0
[   37.858066]  kasan_report_invalid_free+0xb0/0xd8
[   37.862667]  __kasan_mempool_poison_object+0xfc/0x150
[   37.867701]  mempool_free+0x28c/0x328
[   37.871347]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.876991]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   37.882458]  kunit_try_run_case+0x14c/0x3d0
[   37.886625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.892094]  kthread+0x24c/0x2d0
[   37.895305]  ret_from_fork+0x10/0x20
[   37.898867] 
[   37.900343] The buggy address belongs to the physical page:
[   37.905900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883280
[   37.913883] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.921522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.928479] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.936196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.943922] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.951734] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.959547] head: 0bfffe0000000002 fffffdffe00ca001 ffffffffffffffff 0000000000000000
[   37.967358] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   37.975165] page dumped because: kasan: bad access detected
[   37.980721] 
[   37.982196] Memory state around the buggy address:
[   37.986976]  ffff00080327ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.994179]  ffff00080327ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.001384] >ffff000803280000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.008585]                    ^
[   38.011800]  ffff000803280080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.019005]  ffff000803280100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.026206] ==================================================================
[   37.468397] ==================================================================
[   37.478915] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.486893] Free of addr ffff000801f6e501 by task kunit_try_catch/278
[   37.493316] 
[   37.494799] CPU: 6 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.503914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.508073] Hardware name: WinLink E850-96 board (DT)
[   37.513108] Call trace:
[   37.515538]  dump_backtrace+0x9c/0x128
[   37.519270]  show_stack+0x20/0x38
[   37.522568]  dump_stack_lvl+0x8c/0xd0
[   37.526213]  print_report+0x118/0x5e0
[   37.529859]  kasan_report_invalid_free+0xb0/0xd8
[   37.534460]  check_slab_allocation+0xfc/0x108
[   37.538800]  __kasan_mempool_poison_object+0x78/0x150
[   37.543835]  mempool_free+0x28c/0x328
[   37.547480]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.553123]  mempool_kmalloc_invalid_free+0xb8/0x110
[   37.558070]  kunit_try_run_case+0x14c/0x3d0
[   37.562237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.567706]  kthread+0x24c/0x2d0
[   37.570918]  ret_from_fork+0x10/0x20
[   37.574481] 
[   37.575953] Allocated by task 278:
[   37.579341]  kasan_save_stack+0x3c/0x68
[   37.583157]  kasan_save_track+0x20/0x40
[   37.586976]  kasan_save_alloc_info+0x40/0x58
[   37.591230]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.596525]  remove_element+0x130/0x1f8
[   37.600344]  mempool_alloc_preallocated+0x58/0xc0
[   37.605033]  mempool_kmalloc_invalid_free_helper+0x94/0x2b0
[   37.610587]  mempool_kmalloc_invalid_free+0xb8/0x110
[   37.615535]  kunit_try_run_case+0x14c/0x3d0
[   37.619702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.625170]  kthread+0x24c/0x2d0
[   37.628382]  ret_from_fork+0x10/0x20
[   37.631941] 
[   37.633420] The buggy address belongs to the object at ffff000801f6e500
[   37.633420]  which belongs to the cache kmalloc-128 of size 128
[   37.645920] The buggy address is located 1 bytes inside of
[   37.645920]  128-byte region [ffff000801f6e500, ffff000801f6e580)
[   37.657461] 
[   37.658939] The buggy address belongs to the physical page:
[   37.664497] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   37.672481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.680120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.687063] page_type: f5(slab)
[   37.690198] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.697918] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.705645] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.713456] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.721269] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   37.729080] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   37.736887] page dumped because: kasan: bad access detected
[   37.742442] 
[   37.743918] Memory state around the buggy address:
[   37.748701]  ffff000801f6e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.755901]  ffff000801f6e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.763107] >ffff000801f6e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.770307]                    ^
[   37.773522]  ffff000801f6e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.780728]  ffff000801f6e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.787930] ==================================================================

test log snippet test parser 28

Home

[   37.468397] ==================================================================
[   37.478915] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.486893] Free of addr ffff000801f6e501 by task kunit_try_catch/278
[   37.493316] 
[   37.494799] CPU: 6 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.503914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.508073] Hardware name: WinLink E850-96 board (DT)
[   37.513108] Call trace:
[   37.515538]  dump_backtrace+0x9c/0x128
[   37.519270]  show_stack+0x20/0x38
[   37.522568]  dump_stack_lvl+0x8c/0xd0
[   37.526213]  print_report+0x118/0x5e0
[   37.529859]  kasan_report_invalid_free+0xb0/0xd8
[   37.534460]  check_slab_allocation+0xfc/0x108
[   37.538800]  __kasan_mempool_poison_object+0x78/0x150
[   37.543835]  mempool_free+0x28c/0x328
[   37.547480]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.553123]  mempool_kmalloc_invalid_free+0xb8/0x110
[   37.558070]  kunit_try_run_case+0x14c/0x3d0
[   37.562237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.567706]  kthread+0x24c/0x2d0
[   37.570918]  ret_from_fork+0x10/0x20
[   37.574481] 
[   37.575953] Allocated by task 278:
[   37.579341]  kasan_save_stack+0x3c/0x68
[   37.583157]  kasan_save_track+0x20/0x40
[   37.586976]  kasan_save_alloc_info+0x40/0x58
[   37.591230]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.596525]  remove_element+0x130/0x1f8
[   37.600344]  mempool_alloc_preallocated+0x58/0xc0
[   37.605033]  mempool_kmalloc_invalid_free_helper+0x94/0x2b0
[   37.610587]  mempool_kmalloc_invalid_free+0xb8/0x110
[   37.615535]  kunit_try_run_case+0x14c/0x3d0
[   37.619702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.625170]  kthread+0x24c/0x2d0
[   37.628382]  ret_from_fork+0x10/0x20
[   37.631941] 
[   37.633420] The buggy address belongs to the object at ffff000801f6e500
[   37.633420]  which belongs to the cache kmalloc-128 of size 128
[   37.645920] The buggy address is located 1 bytes inside of
[   37.645920]  128-byte region [ffff000801f6e500, ffff000801f6e580)
[   37.657461] 
[   37.658939] The buggy address belongs to the physical page:
[   37.664497] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   37.672481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.680120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.687063] page_type: f5(slab)
[   37.690198] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.697918] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.705645] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.713456] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.721269] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   37.729080] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   37.736887] page dumped because: kasan: bad access detected
[   37.742442] 
[   37.743918] Memory state around the buggy address:
[   37.748701]  ffff000801f6e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.755901]  ffff000801f6e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.763107] >ffff000801f6e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.770307]                    ^
[   37.773522]  ffff000801f6e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.780728]  ffff000801f6e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.787930] ==================================================================

test log snippet test parser 29

Home

[   37.796786] ==================================================================
[   37.807115] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.815102] Free of addr ffff000803280001 by task kunit_try_catch/280
[   37.821521] 
[   37.823005] CPU: 5 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   37.832120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.836279] Hardware name: WinLink E850-96 board (DT)
[   37.841317] Call trace:
[   37.843745]  dump_backtrace+0x9c/0x128
[   37.847476]  show_stack+0x20/0x38
[   37.850775]  dump_stack_lvl+0x8c/0xd0
[   37.854421]  print_report+0x118/0x5e0
[   37.858066]  kasan_report_invalid_free+0xb0/0xd8
[   37.862667]  __kasan_mempool_poison_object+0xfc/0x150
[   37.867701]  mempool_free+0x28c/0x328
[   37.871347]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   37.876991]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   37.882458]  kunit_try_run_case+0x14c/0x3d0
[   37.886625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.892094]  kthread+0x24c/0x2d0
[   37.895305]  ret_from_fork+0x10/0x20
[   37.898867] 
[   37.900343] The buggy address belongs to the physical page:
[   37.905900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883280
[   37.913883] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.921522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.928479] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.936196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.943922] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.951734] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.959547] head: 0bfffe0000000002 fffffdffe00ca001 ffffffffffffffff 0000000000000000
[   37.967358] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   37.975165] page dumped because: kasan: bad access detected
[   37.980721] 
[   37.982196] Memory state around the buggy address:
[   37.986976]  ffff00080327ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.994179]  ffff00080327ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.001384] >ffff000803280000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.008585]                    ^
[   38.011800]  ffff000803280080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.019005]  ffff000803280100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.026206] ==================================================================

test log snippet test parser 30

Home

[   27.601939] ==================================================================
[   27.611608] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8
[   27.619159] Read of size 18446744073709551614 at addr ffff000801421084 by task kunit_try_catch/217
[   27.628098] 
[   27.629584] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.638697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.642856] Hardware name: WinLink E850-96 board (DT)
[   27.647894] Call trace:
[   27.650323]  dump_backtrace+0x9c/0x128
[   27.654053]  show_stack+0x20/0x38
[   27.657351]  dump_stack_lvl+0x8c/0xd0
[   27.660997]  print_report+0x118/0x5e0
[   27.664643]  kasan_report+0xc8/0x118
[   27.668202]  kasan_check_range+0x100/0x1a8
[   27.672282]  __asan_memmove+0x3c/0x98
[   27.675927]  kmalloc_memmove_negative_size+0x15c/0x2f8
[   27.681049]  kunit_try_run_case+0x14c/0x3d0
[   27.685215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.690684]  kthread+0x24c/0x2d0
[   27.693896]  ret_from_fork+0x10/0x20
[   27.697457] 
[   27.698932] Allocated by task 217:
[   27.702320]  kasan_save_stack+0x3c/0x68
[   27.706137]  kasan_save_track+0x20/0x40
[   27.709955]  kasan_save_alloc_info+0x40/0x58
[   27.714208]  __kasan_kmalloc+0xd4/0xd8
[   27.717941]  __kmalloc_cache_noprof+0x144/0x328
[   27.722455]  kmalloc_memmove_negative_size+0xb8/0x2f8
[   27.727491]  kunit_try_run_case+0x14c/0x3d0
[   27.731656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.737124]  kthread+0x24c/0x2d0
[   27.740336]  ret_from_fork+0x10/0x20
[   27.743895] 
[   27.745372] The buggy address belongs to the object at ffff000801421080
[   27.745372]  which belongs to the cache kmalloc-64 of size 64
[   27.757700] The buggy address is located 4 bytes inside of
[   27.757700]  64-byte region [ffff000801421080, ffff0008014210c0)
[   27.769155] 
[   27.770633] The buggy address belongs to the physical page:
[   27.776191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881421
[   27.784175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.790682] page_type: f5(slab)
[   27.793821] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   27.801539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.809259] page dumped because: kasan: bad access detected
[   27.814814] 
[   27.816289] Memory state around the buggy address:
[   27.821071]  ffff000801420f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.828274]  ffff000801421000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.835478] >ffff000801421080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   27.842678]                    ^
[   27.845893]  ffff000801421100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.853098]  ffff000801421180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.860301] ==================================================================

test log snippet test parser 31

Home

[   27.601939] ==================================================================
[   27.611608] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8
[   27.619159] Read of size 18446744073709551614 at addr ffff000801421084 by task kunit_try_catch/217
[   27.628098] 
[   27.629584] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.638697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.642856] Hardware name: WinLink E850-96 board (DT)
[   27.647894] Call trace:
[   27.650323]  dump_backtrace+0x9c/0x128
[   27.654053]  show_stack+0x20/0x38
[   27.657351]  dump_stack_lvl+0x8c/0xd0
[   27.660997]  print_report+0x118/0x5e0
[   27.664643]  kasan_report+0xc8/0x118
[   27.668202]  kasan_check_range+0x100/0x1a8
[   27.672282]  __asan_memmove+0x3c/0x98
[   27.675927]  kmalloc_memmove_negative_size+0x15c/0x2f8
[   27.681049]  kunit_try_run_case+0x14c/0x3d0
[   27.685215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.690684]  kthread+0x24c/0x2d0
[   27.693896]  ret_from_fork+0x10/0x20
[   27.697457] 
[   27.698932] Allocated by task 217:
[   27.702320]  kasan_save_stack+0x3c/0x68
[   27.706137]  kasan_save_track+0x20/0x40
[   27.709955]  kasan_save_alloc_info+0x40/0x58
[   27.714208]  __kasan_kmalloc+0xd4/0xd8
[   27.717941]  __kmalloc_cache_noprof+0x144/0x328
[   27.722455]  kmalloc_memmove_negative_size+0xb8/0x2f8
[   27.727491]  kunit_try_run_case+0x14c/0x3d0
[   27.731656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.737124]  kthread+0x24c/0x2d0
[   27.740336]  ret_from_fork+0x10/0x20
[   27.743895] 
[   27.745372] The buggy address belongs to the object at ffff000801421080
[   27.745372]  which belongs to the cache kmalloc-64 of size 64
[   27.757700] The buggy address is located 4 bytes inside of
[   27.757700]  64-byte region [ffff000801421080, ffff0008014210c0)
[   27.769155] 
[   27.770633] The buggy address belongs to the physical page:
[   27.776191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881421
[   27.784175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.790682] page_type: f5(slab)
[   27.793821] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   27.801539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.809259] page dumped because: kasan: bad access detected
[   27.814814] 
[   27.816289] Memory state around the buggy address:
[   27.821071]  ffff000801420f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.828274]  ffff000801421000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.835478] >ffff000801421080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   27.842678]                    ^
[   27.845893]  ffff000801421100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.853098]  ffff000801421180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.860301] ==================================================================

test log snippet test parser 32

Home

[   55.144751] ==================================================================
[   55.151820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   55.159109] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.166487] 
[   55.167966] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.177082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.181244] Hardware name: WinLink E850-96 board (DT)
[   55.186279] Call trace:
[   55.188709]  dump_backtrace+0x9c/0x128
[   55.192442]  show_stack+0x20/0x38
[   55.195740]  dump_stack_lvl+0x8c/0xd0
[   55.199386]  print_report+0x118/0x5e0
[   55.203032]  kasan_report+0xc8/0x118
[   55.206591]  kasan_check_range+0x100/0x1a8
[   55.210670]  __kasan_check_write+0x20/0x30
[   55.214750]  kasan_atomics_helper+0xda0/0x49c8
[   55.219177]  kasan_atomics+0x1a0/0x2e8
[   55.222910]  kunit_try_run_case+0x14c/0x3d0
[   55.227077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.232545]  kthread+0x24c/0x2d0
[   55.235757]  ret_from_fork+0x10/0x20
[   55.239317] 
[   55.240792] Allocated by task 302:
[   55.244177]  kasan_save_stack+0x3c/0x68
[   55.247996]  kasan_save_track+0x20/0x40
[   55.251816]  kasan_save_alloc_info+0x40/0x58
[   55.256069]  __kasan_kmalloc+0xd4/0xd8
[   55.259802]  __kmalloc_cache_noprof+0x144/0x328
[   55.264315]  kasan_atomics+0xb8/0x2e8
[   55.267961]  kunit_try_run_case+0x14c/0x3d0
[   55.272128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.277597]  kthread+0x24c/0x2d0
[   55.280808]  ret_from_fork+0x10/0x20
[   55.284367] 
[   55.285843] The buggy address belongs to the object at ffff000800ddd700
[   55.285843]  which belongs to the cache kmalloc-64 of size 64
[   55.298169] The buggy address is located 0 bytes to the right of
[   55.298169]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.311016] 
[   55.312492] The buggy address belongs to the physical page:
[   55.318048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.326035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.332544] page_type: f5(slab)
[   55.335676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.343400] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.351119] page dumped because: kasan: bad access detected
[   55.356675] 
[   55.358150] Memory state around the buggy address:
[   55.362929]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.370133]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.377338] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.384539]                                      ^
[   55.389317]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.396521]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.403723] ==================================================================
[   59.663765] ==================================================================
[   59.670848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   59.678225] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.685603] 
[   59.687082] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.696198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.700360] Hardware name: WinLink E850-96 board (DT)
[   59.705395] Call trace:
[   59.707825]  dump_backtrace+0x9c/0x128
[   59.711558]  show_stack+0x20/0x38
[   59.714856]  dump_stack_lvl+0x8c/0xd0
[   59.718502]  print_report+0x118/0x5e0
[   59.722148]  kasan_report+0xc8/0x118
[   59.725707]  kasan_check_range+0x100/0x1a8
[   59.729787]  __kasan_check_write+0x20/0x30
[   59.733866]  kasan_atomics_helper+0x141c/0x49c8
[   59.738380]  kasan_atomics+0x1a0/0x2e8
[   59.742113]  kunit_try_run_case+0x14c/0x3d0
[   59.746279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.751748]  kthread+0x24c/0x2d0
[   59.754960]  ret_from_fork+0x10/0x20
[   59.758519] 
[   59.759994] Allocated by task 302:
[   59.763380]  kasan_save_stack+0x3c/0x68
[   59.767199]  kasan_save_track+0x20/0x40
[   59.771019]  kasan_save_alloc_info+0x40/0x58
[   59.775272]  __kasan_kmalloc+0xd4/0xd8
[   59.779005]  __kmalloc_cache_noprof+0x144/0x328
[   59.783519]  kasan_atomics+0xb8/0x2e8
[   59.787164]  kunit_try_run_case+0x14c/0x3d0
[   59.791331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.796799]  kthread+0x24c/0x2d0
[   59.800011]  ret_from_fork+0x10/0x20
[   59.803570] 
[   59.805045] The buggy address belongs to the object at ffff000800ddd700
[   59.805045]  which belongs to the cache kmalloc-64 of size 64
[   59.817373] The buggy address is located 0 bytes to the right of
[   59.817373]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.830219] 
[   59.831695] The buggy address belongs to the physical page:
[   59.837251] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.845238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.851747] page_type: f5(slab)
[   59.854879] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.862603] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.870323] page dumped because: kasan: bad access detected
[   59.875878] 
[   59.877354] Memory state around the buggy address:
[   59.882131]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.889336]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.896541] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.903742]                                      ^
[   59.908520]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.915725]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.922926] ==================================================================
[   48.503367] ==================================================================
[   48.510425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   48.517716] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   48.525094] 
[   48.526573] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.535689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.539850] Hardware name: WinLink E850-96 board (DT)
[   48.544885] Call trace:
[   48.547316]  dump_backtrace+0x9c/0x128
[   48.551048]  show_stack+0x20/0x38
[   48.554347]  dump_stack_lvl+0x8c/0xd0
[   48.557993]  print_report+0x118/0x5e0
[   48.561638]  kasan_report+0xc8/0x118
[   48.565197]  kasan_check_range+0x100/0x1a8
[   48.569277]  __kasan_check_write+0x20/0x30
[   48.573357]  kasan_atomics_helper+0x3c8/0x49c8
[   48.577784]  kasan_atomics+0x1a0/0x2e8
[   48.581516]  kunit_try_run_case+0x14c/0x3d0
[   48.585683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.591152]  kthread+0x24c/0x2d0
[   48.594364]  ret_from_fork+0x10/0x20
[   48.597923] 
[   48.599398] Allocated by task 302:
[   48.602783]  kasan_save_stack+0x3c/0x68
[   48.606603]  kasan_save_track+0x20/0x40
[   48.610422]  kasan_save_alloc_info+0x40/0x58
[   48.614676]  __kasan_kmalloc+0xd4/0xd8
[   48.618408]  __kmalloc_cache_noprof+0x144/0x328
[   48.622922]  kasan_atomics+0xb8/0x2e8
[   48.626568]  kunit_try_run_case+0x14c/0x3d0
[   48.630734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.636203]  kthread+0x24c/0x2d0
[   48.639415]  ret_from_fork+0x10/0x20
[   48.642974] 
[   48.644449] The buggy address belongs to the object at ffff000800ddd700
[   48.644449]  which belongs to the cache kmalloc-64 of size 64
[   48.656776] The buggy address is located 0 bytes to the right of
[   48.656776]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.669623] 
[   48.671098] The buggy address belongs to the physical page:
[   48.676655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.684642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.691150] page_type: f5(slab)
[   48.694282] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.702007] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.709727] page dumped because: kasan: bad access detected
[   48.715282] 
[   48.716757] Memory state around the buggy address:
[   48.721535]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.728740]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.735945] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.743146]                                      ^
[   48.747924]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.755128]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.762330] ==================================================================
[   49.302263] ==================================================================
[   49.309371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   49.316662] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.324040] 
[   49.325519] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.334635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.338797] Hardware name: WinLink E850-96 board (DT)
[   49.343831] Call trace:
[   49.346262]  dump_backtrace+0x9c/0x128
[   49.349995]  show_stack+0x20/0x38
[   49.353293]  dump_stack_lvl+0x8c/0xd0
[   49.356939]  print_report+0x118/0x5e0
[   49.360585]  kasan_report+0xc8/0x118
[   49.364144]  kasan_check_range+0x100/0x1a8
[   49.368223]  __kasan_check_write+0x20/0x30
[   49.372303]  kasan_atomics_helper+0x50c/0x49c8
[   49.376730]  kasan_atomics+0x1a0/0x2e8
[   49.380463]  kunit_try_run_case+0x14c/0x3d0
[   49.384630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.390098]  kthread+0x24c/0x2d0
[   49.393310]  ret_from_fork+0x10/0x20
[   49.396869] 
[   49.398344] Allocated by task 302:
[   49.401730]  kasan_save_stack+0x3c/0x68
[   49.405549]  kasan_save_track+0x20/0x40
[   49.409369]  kasan_save_alloc_info+0x40/0x58
[   49.413622]  __kasan_kmalloc+0xd4/0xd8
[   49.417355]  __kmalloc_cache_noprof+0x144/0x328
[   49.421869]  kasan_atomics+0xb8/0x2e8
[   49.425514]  kunit_try_run_case+0x14c/0x3d0
[   49.429681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.435150]  kthread+0x24c/0x2d0
[   49.438361]  ret_from_fork+0x10/0x20
[   49.441920] 
[   49.443395] The buggy address belongs to the object at ffff000800ddd700
[   49.443395]  which belongs to the cache kmalloc-64 of size 64
[   49.455722] The buggy address is located 0 bytes to the right of
[   49.455722]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   49.468569] 
[   49.470045] The buggy address belongs to the physical page:
[   49.475601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   49.483588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.490097] page_type: f5(slab)
[   49.493229] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.500953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   49.508673] page dumped because: kasan: bad access detected
[   49.514228] 
[   49.515703] Memory state around the buggy address:
[   49.520482]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.527686]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.534891] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.542092]                                      ^
[   49.546870]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.554075]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.561276] ==================================================================
[   52.494776] ==================================================================
[   52.501858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   52.509149] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   52.516527] 
[   52.518006] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   52.527121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.531283] Hardware name: WinLink E850-96 board (DT)
[   52.536319] Call trace:
[   52.538749]  dump_backtrace+0x9c/0x128
[   52.542482]  show_stack+0x20/0x38
[   52.545780]  dump_stack_lvl+0x8c/0xd0
[   52.549426]  print_report+0x118/0x5e0
[   52.553072]  kasan_report+0xc8/0x118
[   52.556630]  kasan_check_range+0x100/0x1a8
[   52.560710]  __kasan_check_write+0x20/0x30
[   52.564790]  kasan_atomics_helper+0xa50/0x49c8
[   52.569217]  kasan_atomics+0x1a0/0x2e8
[   52.572950]  kunit_try_run_case+0x14c/0x3d0
[   52.577116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.582585]  kthread+0x24c/0x2d0
[   52.585797]  ret_from_fork+0x10/0x20
[   52.589356] 
[   52.590831] Allocated by task 302:
[   52.594217]  kasan_save_stack+0x3c/0x68
[   52.598036]  kasan_save_track+0x20/0x40
[   52.601856]  kasan_save_alloc_info+0x40/0x58
[   52.606109]  __kasan_kmalloc+0xd4/0xd8
[   52.609842]  __kmalloc_cache_noprof+0x144/0x328
[   52.614355]  kasan_atomics+0xb8/0x2e8
[   52.618001]  kunit_try_run_case+0x14c/0x3d0
[   52.622168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.627636]  kthread+0x24c/0x2d0
[   52.630848]  ret_from_fork+0x10/0x20
[   52.634407] 
[   52.635883] The buggy address belongs to the object at ffff000800ddd700
[   52.635883]  which belongs to the cache kmalloc-64 of size 64
[   52.648209] The buggy address is located 0 bytes to the right of
[   52.648209]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.661056] 
[   52.662532] The buggy address belongs to the physical page:
[   52.668088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.676075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.682583] page_type: f5(slab)
[   52.685715] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.693440] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.701160] page dumped because: kasan: bad access detected
[   52.706715] 
[   52.708191] Memory state around the buggy address:
[   52.712968]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.720173]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.727378] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.734579]                                      ^
[   52.739357]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.746561]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.753763] ==================================================================
[   54.086090] ==================================================================
[   54.093154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   54.100444] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.107822] 
[   54.109301] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.118417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.122579] Hardware name: WinLink E850-96 board (DT)
[   54.127614] Call trace:
[   54.130044]  dump_backtrace+0x9c/0x128
[   54.133777]  show_stack+0x20/0x38
[   54.137076]  dump_stack_lvl+0x8c/0xd0
[   54.140721]  print_report+0x118/0x5e0
[   54.144367]  kasan_report+0xc8/0x118
[   54.147926]  kasan_check_range+0x100/0x1a8
[   54.152006]  __kasan_check_write+0x20/0x30
[   54.156086]  kasan_atomics_helper+0xc64/0x49c8
[   54.160513]  kasan_atomics+0x1a0/0x2e8
[   54.164245]  kunit_try_run_case+0x14c/0x3d0
[   54.168412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.173881]  kthread+0x24c/0x2d0
[   54.177092]  ret_from_fork+0x10/0x20
[   54.180652] 
[   54.182127] Allocated by task 302:
[   54.185512]  kasan_save_stack+0x3c/0x68
[   54.189331]  kasan_save_track+0x20/0x40
[   54.193151]  kasan_save_alloc_info+0x40/0x58
[   54.197404]  __kasan_kmalloc+0xd4/0xd8
[   54.201137]  __kmalloc_cache_noprof+0x144/0x328
[   54.205651]  kasan_atomics+0xb8/0x2e8
[   54.209297]  kunit_try_run_case+0x14c/0x3d0
[   54.213463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.218932]  kthread+0x24c/0x2d0
[   54.222144]  ret_from_fork+0x10/0x20
[   54.225702] 
[   54.227178] The buggy address belongs to the object at ffff000800ddd700
[   54.227178]  which belongs to the cache kmalloc-64 of size 64
[   54.239505] The buggy address is located 0 bytes to the right of
[   54.239505]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   54.252351] 
[   54.253827] The buggy address belongs to the physical page:
[   54.259383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.267370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.273879] page_type: f5(slab)
[   54.277011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.284735] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.292455] page dumped because: kasan: bad access detected
[   54.298011] 
[   54.299486] Memory state around the buggy address:
[   54.304264]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.311468]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.318673] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.325874]                                      ^
[   54.330652]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.337857]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.345058] ==================================================================
[   46.378870] ==================================================================
[   46.393098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   46.400476] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   46.407766] 
[   46.409250] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.418362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.422522] Hardware name: WinLink E850-96 board (DT)
[   46.427560] Call trace:
[   46.429987]  dump_backtrace+0x9c/0x128
[   46.433719]  show_stack+0x20/0x38
[   46.437018]  dump_stack_lvl+0x8c/0xd0
[   46.440664]  print_report+0x118/0x5e0
[   46.444309]  kasan_report+0xc8/0x118
[   46.447868]  __asan_report_load4_noabort+0x20/0x30
[   46.452642]  kasan_atomics_helper+0x4210/0x49c8
[   46.457156]  kasan_atomics+0x1a0/0x2e8
[   46.460889]  kunit_try_run_case+0x14c/0x3d0
[   46.465055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.470524]  kthread+0x24c/0x2d0
[   46.473736]  ret_from_fork+0x10/0x20
[   46.477298] 
[   46.478772] Allocated by task 302:
[   46.482159]  kasan_save_stack+0x3c/0x68
[   46.485975]  kasan_save_track+0x20/0x40
[   46.489795]  kasan_save_alloc_info+0x40/0x58
[   46.494048]  __kasan_kmalloc+0xd4/0xd8
[   46.497782]  __kmalloc_cache_noprof+0x144/0x328
[   46.502294]  kasan_atomics+0xb8/0x2e8
[   46.505940]  kunit_try_run_case+0x14c/0x3d0
[   46.510107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.515575]  kthread+0x24c/0x2d0
[   46.518787]  ret_from_fork+0x10/0x20
[   46.522346] 
[   46.523823] The buggy address belongs to the object at ffff000800ddd700
[   46.523823]  which belongs to the cache kmalloc-64 of size 64
[   46.536150] The buggy address is located 0 bytes to the right of
[   46.536150]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   46.548994] 
[   46.550474] The buggy address belongs to the physical page:
[   46.556030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   46.564015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.570524] page_type: f5(slab)
[   46.573662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.581380] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   46.589099] page dumped because: kasan: bad access detected
[   46.594655] 
[   46.596129] Memory state around the buggy address:
[   46.600911]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.608112]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.615317] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.622518]                                      ^
[   46.627296]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.634502]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.641702] ==================================================================
[   47.710783] ==================================================================
[   47.717904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   47.725279] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.732571] 
[   47.734056] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   47.743165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.747329] Hardware name: WinLink E850-96 board (DT)
[   47.752364] Call trace:
[   47.754793]  dump_backtrace+0x9c/0x128
[   47.758525]  show_stack+0x20/0x38
[   47.761824]  dump_stack_lvl+0x8c/0xd0
[   47.765470]  print_report+0x118/0x5e0
[   47.769115]  kasan_report+0xc8/0x118
[   47.772674]  __asan_report_load4_noabort+0x20/0x30
[   47.777449]  kasan_atomics_helper+0x4264/0x49c8
[   47.781964]  kasan_atomics+0x1a0/0x2e8
[   47.785695]  kunit_try_run_case+0x14c/0x3d0
[   47.789861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.795330]  kthread+0x24c/0x2d0
[   47.798542]  ret_from_fork+0x10/0x20
[   47.802103] 
[   47.803577] Allocated by task 302:
[   47.806963]  kasan_save_stack+0x3c/0x68
[   47.810782]  kasan_save_track+0x20/0x40
[   47.814601]  kasan_save_alloc_info+0x40/0x58
[   47.818854]  __kasan_kmalloc+0xd4/0xd8
[   47.822587]  __kmalloc_cache_noprof+0x144/0x328
[   47.827101]  kasan_atomics+0xb8/0x2e8
[   47.830746]  kunit_try_run_case+0x14c/0x3d0
[   47.834913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.840382]  kthread+0x24c/0x2d0
[   47.843594]  ret_from_fork+0x10/0x20
[   47.847153] 
[   47.848628] The buggy address belongs to the object at ffff000800ddd700
[   47.848628]  which belongs to the cache kmalloc-64 of size 64
[   47.860956] The buggy address is located 0 bytes to the right of
[   47.860956]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.873801] 
[   47.875279] The buggy address belongs to the physical page:
[   47.880834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.888820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.895330] page_type: f5(slab)
[   47.898463] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.906185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.913905] page dumped because: kasan: bad access detected
[   47.919460] 
[   47.920936] Memory state around the buggy address:
[   47.925715]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.932918]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.940124] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.947324]                                      ^
[   47.952102]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.959307]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.966508] ==================================================================
[   54.881716] ==================================================================
[   54.888802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   54.896178] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.903470] 
[   54.904949] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.914065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.918227] Hardware name: WinLink E850-96 board (DT)
[   54.923262] Call trace:
[   54.925692]  dump_backtrace+0x9c/0x128
[   54.929425]  show_stack+0x20/0x38
[   54.932723]  dump_stack_lvl+0x8c/0xd0
[   54.936369]  print_report+0x118/0x5e0
[   54.940015]  kasan_report+0xc8/0x118
[   54.943574]  __asan_report_load4_noabort+0x20/0x30
[   54.948348]  kasan_atomics_helper+0x3f40/0x49c8
[   54.952862]  kasan_atomics+0x1a0/0x2e8
[   54.956594]  kunit_try_run_case+0x14c/0x3d0
[   54.960761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.966230]  kthread+0x24c/0x2d0
[   54.969441]  ret_from_fork+0x10/0x20
[   54.973001] 
[   54.974476] Allocated by task 302:
[   54.977861]  kasan_save_stack+0x3c/0x68
[   54.981681]  kasan_save_track+0x20/0x40
[   54.985500]  kasan_save_alloc_info+0x40/0x58
[   54.989754]  __kasan_kmalloc+0xd4/0xd8
[   54.993486]  __kmalloc_cache_noprof+0x144/0x328
[   54.998000]  kasan_atomics+0xb8/0x2e8
[   55.001646]  kunit_try_run_case+0x14c/0x3d0
[   55.005812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.011281]  kthread+0x24c/0x2d0
[   55.014493]  ret_from_fork+0x10/0x20
[   55.018052] 
[   55.019527] The buggy address belongs to the object at ffff000800ddd700
[   55.019527]  which belongs to the cache kmalloc-64 of size 64
[   55.031854] The buggy address is located 0 bytes to the right of
[   55.031854]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.044701] 
[   55.046176] The buggy address belongs to the physical page:
[   55.051732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.059720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.066228] page_type: f5(slab)
[   55.069360] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.077084] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.084804] page dumped because: kasan: bad access detected
[   55.090359] 
[   55.091835] Memory state around the buggy address:
[   55.096613]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.103818]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.111022] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.118224]                                      ^
[   55.123001]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.130206]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.137408] ==================================================================
[   55.940215] ==================================================================
[   55.947293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   55.954670] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.961961] 
[   55.963440] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.972556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.976718] Hardware name: WinLink E850-96 board (DT)
[   55.981753] Call trace:
[   55.984183]  dump_backtrace+0x9c/0x128
[   55.987916]  show_stack+0x20/0x38
[   55.991214]  dump_stack_lvl+0x8c/0xd0
[   55.994860]  print_report+0x118/0x5e0
[   55.998506]  kasan_report+0xc8/0x118
[   56.002065]  __asan_report_load8_noabort+0x20/0x30
[   56.006839]  kasan_atomics_helper+0x40c0/0x49c8
[   56.011353]  kasan_atomics+0x1a0/0x2e8
[   56.015086]  kunit_try_run_case+0x14c/0x3d0
[   56.019252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.024721]  kthread+0x24c/0x2d0
[   56.027933]  ret_from_fork+0x10/0x20
[   56.031492] 
[   56.032967] Allocated by task 302:
[   56.036353]  kasan_save_stack+0x3c/0x68
[   56.040172]  kasan_save_track+0x20/0x40
[   56.043991]  kasan_save_alloc_info+0x40/0x58
[   56.048245]  __kasan_kmalloc+0xd4/0xd8
[   56.051977]  __kmalloc_cache_noprof+0x144/0x328
[   56.056491]  kasan_atomics+0xb8/0x2e8
[   56.060137]  kunit_try_run_case+0x14c/0x3d0
[   56.064304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.069772]  kthread+0x24c/0x2d0
[   56.072984]  ret_from_fork+0x10/0x20
[   56.076543] 
[   56.078018] The buggy address belongs to the object at ffff000800ddd700
[   56.078018]  which belongs to the cache kmalloc-64 of size 64
[   56.090345] The buggy address is located 0 bytes to the right of
[   56.090345]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.103192] 
[   56.104668] The buggy address belongs to the physical page:
[   56.110224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.118211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.124719] page_type: f5(slab)
[   56.127851] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.135576] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.143295] page dumped because: kasan: bad access detected
[   56.148851] 
[   56.150326] Memory state around the buggy address:
[   56.155104]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.162309]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.169513] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.176715]                                      ^
[   56.181492]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.188697]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.195899] ==================================================================
[   60.992751] ==================================================================
[   60.999824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   61.007198] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.014576] 
[   61.016056] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.025171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.029333] Hardware name: WinLink E850-96 board (DT)
[   61.034368] Call trace:
[   61.036798]  dump_backtrace+0x9c/0x128
[   61.040531]  show_stack+0x20/0x38
[   61.043830]  dump_stack_lvl+0x8c/0xd0
[   61.047475]  print_report+0x118/0x5e0
[   61.051121]  kasan_report+0xc8/0x118
[   61.054680]  kasan_check_range+0x100/0x1a8
[   61.058760]  __kasan_check_write+0x20/0x30
[   61.062839]  kasan_atomics_helper+0x15f0/0x49c8
[   61.067353]  kasan_atomics+0x1a0/0x2e8
[   61.071086]  kunit_try_run_case+0x14c/0x3d0
[   61.075252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.080721]  kthread+0x24c/0x2d0
[   61.083933]  ret_from_fork+0x10/0x20
[   61.087492] 
[   61.088968] Allocated by task 302:
[   61.092353]  kasan_save_stack+0x3c/0x68
[   61.096172]  kasan_save_track+0x20/0x40
[   61.099992]  kasan_save_alloc_info+0x40/0x58
[   61.104245]  __kasan_kmalloc+0xd4/0xd8
[   61.107978]  __kmalloc_cache_noprof+0x144/0x328
[   61.112492]  kasan_atomics+0xb8/0x2e8
[   61.116137]  kunit_try_run_case+0x14c/0x3d0
[   61.120304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.125773]  kthread+0x24c/0x2d0
[   61.128984]  ret_from_fork+0x10/0x20
[   61.132543] 
[   61.134019] The buggy address belongs to the object at ffff000800ddd700
[   61.134019]  which belongs to the cache kmalloc-64 of size 64
[   61.146346] The buggy address is located 0 bytes to the right of
[   61.146346]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.159192] 
[   61.160668] The buggy address belongs to the physical page:
[   61.166224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.174212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.180720] page_type: f5(slab)
[   61.183851] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.191576] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.199296] page dumped because: kasan: bad access detected
[   61.204851] 
[   61.206327] Memory state around the buggy address:
[   61.211105]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.218309]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.225514] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.232715]                                      ^
[   61.237493]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.244698]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.251899] ==================================================================
[   62.055217] ==================================================================
[   62.062305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   62.069682] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.076974] 
[   62.078452] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.087568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.091730] Hardware name: WinLink E850-96 board (DT)
[   62.096765] Call trace:
[   62.099196]  dump_backtrace+0x9c/0x128
[   62.102928]  show_stack+0x20/0x38
[   62.106227]  dump_stack_lvl+0x8c/0xd0
[   62.109872]  print_report+0x118/0x5e0
[   62.113518]  kasan_report+0xc8/0x118
[   62.117077]  __asan_report_load8_noabort+0x20/0x30
[   62.121851]  kasan_atomics_helper+0x3f5c/0x49c8
[   62.126365]  kasan_atomics+0x1a0/0x2e8
[   62.130098]  kunit_try_run_case+0x14c/0x3d0
[   62.134265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.139733]  kthread+0x24c/0x2d0
[   62.142945]  ret_from_fork+0x10/0x20
[   62.146505] 
[   62.147979] Allocated by task 302:
[   62.151365]  kasan_save_stack+0x3c/0x68
[   62.155184]  kasan_save_track+0x20/0x40
[   62.159004]  kasan_save_alloc_info+0x40/0x58
[   62.163257]  __kasan_kmalloc+0xd4/0xd8
[   62.166989]  __kmalloc_cache_noprof+0x144/0x328
[   62.171503]  kasan_atomics+0xb8/0x2e8
[   62.175149]  kunit_try_run_case+0x14c/0x3d0
[   62.179316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.184784]  kthread+0x24c/0x2d0
[   62.187996]  ret_from_fork+0x10/0x20
[   62.191555] 
[   62.193031] The buggy address belongs to the object at ffff000800ddd700
[   62.193031]  which belongs to the cache kmalloc-64 of size 64
[   62.205357] The buggy address is located 0 bytes to the right of
[   62.205357]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   62.218204] 
[   62.219680] The buggy address belongs to the physical page:
[   62.225236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   62.233223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.239731] page_type: f5(slab)
[   62.242863] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.250588] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   62.258308] page dumped because: kasan: bad access detected
[   62.263863] 
[   62.265338] Memory state around the buggy address:
[   62.270117]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.277321]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.284526] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.291727]                                      ^
[   62.296505]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.303710]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.310911] ==================================================================
[   62.847747] ==================================================================
[   62.854828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   62.862205] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.869583] 
[   62.871062] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.880178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.884340] Hardware name: WinLink E850-96 board (DT)
[   62.889375] Call trace:
[   62.891805]  dump_backtrace+0x9c/0x128
[   62.895538]  show_stack+0x20/0x38
[   62.898836]  dump_stack_lvl+0x8c/0xd0
[   62.902482]  print_report+0x118/0x5e0
[   62.906128]  kasan_report+0xc8/0x118
[   62.909686]  kasan_check_range+0x100/0x1a8
[   62.913767]  __kasan_check_write+0x20/0x30
[   62.917846]  kasan_atomics_helper+0x1810/0x49c8
[   62.922360]  kasan_atomics+0x1a0/0x2e8
[   62.926093]  kunit_try_run_case+0x14c/0x3d0
[   62.930259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.935728]  kthread+0x24c/0x2d0
[   62.938940]  ret_from_fork+0x10/0x20
[   62.942499] 
[   62.943974] Allocated by task 302:
[   62.947360]  kasan_save_stack+0x3c/0x68
[   62.951179]  kasan_save_track+0x20/0x40
[   62.954998]  kasan_save_alloc_info+0x40/0x58
[   62.959252]  __kasan_kmalloc+0xd4/0xd8
[   62.962985]  __kmalloc_cache_noprof+0x144/0x328
[   62.967499]  kasan_atomics+0xb8/0x2e8
[   62.971144]  kunit_try_run_case+0x14c/0x3d0
[   62.975311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.980779]  kthread+0x24c/0x2d0
[   62.983991]  ret_from_fork+0x10/0x20
[   62.987550] 
[   62.989026] The buggy address belongs to the object at ffff000800ddd700
[   62.989026]  which belongs to the cache kmalloc-64 of size 64
[   63.001352] The buggy address is located 0 bytes to the right of
[   63.001352]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   63.014199] 
[   63.015675] The buggy address belongs to the physical page:
[   63.021231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   63.029218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.035726] page_type: f5(slab)
[   63.038858] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.046583] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   63.054303] page dumped because: kasan: bad access detected
[   63.059858] 
[   63.061333] Memory state around the buggy address:
[   63.066112]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.073316]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.080521] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.087722]                                      ^
[   63.092500]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.099705]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.106906] ==================================================================
[   47.973805] ==================================================================
[   47.980923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   47.988209] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.995588] 
[   47.997069] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.006183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.010344] Hardware name: WinLink E850-96 board (DT)
[   48.015382] Call trace:
[   48.017810]  dump_backtrace+0x9c/0x128
[   48.021543]  show_stack+0x20/0x38
[   48.024841]  dump_stack_lvl+0x8c/0xd0
[   48.028487]  print_report+0x118/0x5e0
[   48.032133]  kasan_report+0xc8/0x118
[   48.035691]  kasan_check_range+0x100/0x1a8
[   48.039771]  __kasan_check_write+0x20/0x30
[   48.043851]  kasan_atomics_helper+0x344/0x49c8
[   48.048278]  kasan_atomics+0x1a0/0x2e8
[   48.052011]  kunit_try_run_case+0x14c/0x3d0
[   48.056177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.061646]  kthread+0x24c/0x2d0
[   48.064858]  ret_from_fork+0x10/0x20
[   48.068419] 
[   48.069892] Allocated by task 302:
[   48.073278]  kasan_save_stack+0x3c/0x68
[   48.077097]  kasan_save_track+0x20/0x40
[   48.080917]  kasan_save_alloc_info+0x40/0x58
[   48.085170]  __kasan_kmalloc+0xd4/0xd8
[   48.088902]  __kmalloc_cache_noprof+0x144/0x328
[   48.093416]  kasan_atomics+0xb8/0x2e8
[   48.097062]  kunit_try_run_case+0x14c/0x3d0
[   48.101228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.106697]  kthread+0x24c/0x2d0
[   48.109909]  ret_from_fork+0x10/0x20
[   48.113468] 
[   48.114944] The buggy address belongs to the object at ffff000800ddd700
[   48.114944]  which belongs to the cache kmalloc-64 of size 64
[   48.127273] The buggy address is located 0 bytes to the right of
[   48.127273]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.140117] 
[   48.141593] The buggy address belongs to the physical page:
[   48.147150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.155137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.161644] page_type: f5(slab)
[   48.164778] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.172501] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.180221] page dumped because: kasan: bad access detected
[   48.185776] 
[   48.187251] Memory state around the buggy address:
[   48.192031]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.199234]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.206439] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.213640]                                      ^
[   48.218418]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.225622]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.232824] ==================================================================
[   53.293722] ==================================================================
[   53.300805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   53.308182] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.315473] 
[   53.316953] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.326068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.330230] Hardware name: WinLink E850-96 board (DT)
[   53.335266] Call trace:
[   53.337695]  dump_backtrace+0x9c/0x128
[   53.341428]  show_stack+0x20/0x38
[   53.344726]  dump_stack_lvl+0x8c/0xd0
[   53.348372]  print_report+0x118/0x5e0
[   53.352018]  kasan_report+0xc8/0x118
[   53.355577]  __asan_report_load4_noabort+0x20/0x30
[   53.360351]  kasan_atomics_helper+0x3f34/0x49c8
[   53.364865]  kasan_atomics+0x1a0/0x2e8
[   53.368598]  kunit_try_run_case+0x14c/0x3d0
[   53.372764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.378233]  kthread+0x24c/0x2d0
[   53.381445]  ret_from_fork+0x10/0x20
[   53.385004] 
[   53.386479] Allocated by task 302:
[   53.389865]  kasan_save_stack+0x3c/0x68
[   53.393684]  kasan_save_track+0x20/0x40
[   53.397503]  kasan_save_alloc_info+0x40/0x58
[   53.401757]  __kasan_kmalloc+0xd4/0xd8
[   53.405489]  __kmalloc_cache_noprof+0x144/0x328
[   53.410003]  kasan_atomics+0xb8/0x2e8
[   53.413649]  kunit_try_run_case+0x14c/0x3d0
[   53.417815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.423284]  kthread+0x24c/0x2d0
[   53.426496]  ret_from_fork+0x10/0x20
[   53.430055] 
[   53.431530] The buggy address belongs to the object at ffff000800ddd700
[   53.431530]  which belongs to the cache kmalloc-64 of size 64
[   53.443857] The buggy address is located 0 bytes to the right of
[   53.443857]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.456704] 
[   53.458179] The buggy address belongs to the physical page:
[   53.463735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   53.471722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.478231] page_type: f5(slab)
[   53.481363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.489088] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.496807] page dumped because: kasan: bad access detected
[   53.502363] 
[   53.503838] Memory state around the buggy address:
[   53.508616]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.515821]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.523026] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.530227]                                      ^
[   53.535004]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.542209]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.549411] ==================================================================
[   59.130792] ==================================================================
[   59.137870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   59.145247] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.152625] 
[   59.154104] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.163220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.167382] Hardware name: WinLink E850-96 board (DT)
[   59.172417] Call trace:
[   59.174847]  dump_backtrace+0x9c/0x128
[   59.178580]  show_stack+0x20/0x38
[   59.181878]  dump_stack_lvl+0x8c/0xd0
[   59.185524]  print_report+0x118/0x5e0
[   59.189170]  kasan_report+0xc8/0x118
[   59.192729]  kasan_check_range+0x100/0x1a8
[   59.196809]  __kasan_check_write+0x20/0x30
[   59.200888]  kasan_atomics_helper+0x1300/0x49c8
[   59.205402]  kasan_atomics+0x1a0/0x2e8
[   59.209135]  kunit_try_run_case+0x14c/0x3d0
[   59.213301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.218770]  kthread+0x24c/0x2d0
[   59.221982]  ret_from_fork+0x10/0x20
[   59.225541] 
[   59.227016] Allocated by task 302:
[   59.230402]  kasan_save_stack+0x3c/0x68
[   59.234221]  kasan_save_track+0x20/0x40
[   59.238041]  kasan_save_alloc_info+0x40/0x58
[   59.242294]  __kasan_kmalloc+0xd4/0xd8
[   59.246026]  __kmalloc_cache_noprof+0x144/0x328
[   59.250540]  kasan_atomics+0xb8/0x2e8
[   59.254186]  kunit_try_run_case+0x14c/0x3d0
[   59.258353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.263822]  kthread+0x24c/0x2d0
[   59.267033]  ret_from_fork+0x10/0x20
[   59.270592] 
[   59.272068] The buggy address belongs to the object at ffff000800ddd700
[   59.272068]  which belongs to the cache kmalloc-64 of size 64
[   59.284394] The buggy address is located 0 bytes to the right of
[   59.284394]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.297241] 
[   59.298717] The buggy address belongs to the physical page:
[   59.304273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.312258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.318769] page_type: f5(slab)
[   59.321901] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.329625] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.337344] page dumped because: kasan: bad access detected
[   59.342900] 
[   59.344376] Memory state around the buggy address:
[   59.349153]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.356358]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.363563] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.370764]                                      ^
[   59.375542]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.382746]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.389948] ==================================================================
[   50.101248] ==================================================================
[   50.108318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   50.115609] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.122986] 
[   50.124465] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.133581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.137743] Hardware name: WinLink E850-96 board (DT)
[   50.142778] Call trace:
[   50.145209]  dump_backtrace+0x9c/0x128
[   50.148941]  show_stack+0x20/0x38
[   50.152239]  dump_stack_lvl+0x8c/0xd0
[   50.155885]  print_report+0x118/0x5e0
[   50.159531]  kasan_report+0xc8/0x118
[   50.163090]  kasan_check_range+0x100/0x1a8
[   50.167170]  __kasan_check_write+0x20/0x30
[   50.171250]  kasan_atomics_helper+0x650/0x49c8
[   50.175677]  kasan_atomics+0x1a0/0x2e8
[   50.179409]  kunit_try_run_case+0x14c/0x3d0
[   50.183576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.189044]  kthread+0x24c/0x2d0
[   50.192256]  ret_from_fork+0x10/0x20
[   50.195815] 
[   50.197291] Allocated by task 302:
[   50.200676]  kasan_save_stack+0x3c/0x68
[   50.204496]  kasan_save_track+0x20/0x40
[   50.208315]  kasan_save_alloc_info+0x40/0x58
[   50.212568]  __kasan_kmalloc+0xd4/0xd8
[   50.216301]  __kmalloc_cache_noprof+0x144/0x328
[   50.220815]  kasan_atomics+0xb8/0x2e8
[   50.224461]  kunit_try_run_case+0x14c/0x3d0
[   50.228627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.234096]  kthread+0x24c/0x2d0
[   50.237308]  ret_from_fork+0x10/0x20
[   50.240867] 
[   50.242342] The buggy address belongs to the object at ffff000800ddd700
[   50.242342]  which belongs to the cache kmalloc-64 of size 64
[   50.254669] The buggy address is located 0 bytes to the right of
[   50.254669]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.267515] 
[   50.268991] The buggy address belongs to the physical page:
[   50.274547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.282535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.289043] page_type: f5(slab)
[   50.292177] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.299899] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.307619] page dumped because: kasan: bad access detected
[   50.313174] 
[   50.314650] Memory state around the buggy address:
[   50.319428]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.326633]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.333837] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.341039]                                      ^
[   50.345816]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.353021]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.360222] ==================================================================
[   56.469543] ==================================================================
[   56.476625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   56.484002] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   56.491380] 
[   56.492859] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   56.501975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.506137] Hardware name: WinLink E850-96 board (DT)
[   56.511172] Call trace:
[   56.513602]  dump_backtrace+0x9c/0x128
[   56.517335]  show_stack+0x20/0x38
[   56.520633]  dump_stack_lvl+0x8c/0xd0
[   56.524279]  print_report+0x118/0x5e0
[   56.527925]  kasan_report+0xc8/0x118
[   56.531484]  __asan_report_store8_noabort+0x20/0x30
[   56.536345]  kasan_atomics_helper+0x3fc4/0x49c8
[   56.540859]  kasan_atomics+0x1a0/0x2e8
[   56.544591]  kunit_try_run_case+0x14c/0x3d0
[   56.548758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.554227]  kthread+0x24c/0x2d0
[   56.557438]  ret_from_fork+0x10/0x20
[   56.560998] 
[   56.562473] Allocated by task 302:
[   56.565859]  kasan_save_stack+0x3c/0x68
[   56.569678]  kasan_save_track+0x20/0x40
[   56.573497]  kasan_save_alloc_info+0x40/0x58
[   56.577751]  __kasan_kmalloc+0xd4/0xd8
[   56.581483]  __kmalloc_cache_noprof+0x144/0x328
[   56.585997]  kasan_atomics+0xb8/0x2e8
[   56.589643]  kunit_try_run_case+0x14c/0x3d0
[   56.593809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.599278]  kthread+0x24c/0x2d0
[   56.602490]  ret_from_fork+0x10/0x20
[   56.606049] 
[   56.607524] The buggy address belongs to the object at ffff000800ddd700
[   56.607524]  which belongs to the cache kmalloc-64 of size 64
[   56.619851] The buggy address is located 0 bytes to the right of
[   56.619851]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.632698] 
[   56.634174] The buggy address belongs to the physical page:
[   56.639730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.647716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.654225] page_type: f5(slab)
[   56.657357] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.665081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.672801] page dumped because: kasan: bad access detected
[   56.678357] 
[   56.679832] Memory state around the buggy address:
[   56.684610]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.691815]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.699019] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.706221]                                      ^
[   56.710998]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.718203]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.725405] ==================================================================
[   61.259229] ==================================================================
[   61.266310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   61.273687] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.281065] 
[   61.282544] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.291660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.295822] Hardware name: WinLink E850-96 board (DT)
[   61.300857] Call trace:
[   61.303287]  dump_backtrace+0x9c/0x128
[   61.307020]  show_stack+0x20/0x38
[   61.310319]  dump_stack_lvl+0x8c/0xd0
[   61.313965]  print_report+0x118/0x5e0
[   61.317610]  kasan_report+0xc8/0x118
[   61.321169]  kasan_check_range+0x100/0x1a8
[   61.325249]  __kasan_check_write+0x20/0x30
[   61.329329]  kasan_atomics_helper+0x165c/0x49c8
[   61.333842]  kasan_atomics+0x1a0/0x2e8
[   61.337575]  kunit_try_run_case+0x14c/0x3d0
[   61.341742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.347210]  kthread+0x24c/0x2d0
[   61.350422]  ret_from_fork+0x10/0x20
[   61.353982] 
[   61.355456] Allocated by task 302:
[   61.358842]  kasan_save_stack+0x3c/0x68
[   61.362662]  kasan_save_track+0x20/0x40
[   61.366481]  kasan_save_alloc_info+0x40/0x58
[   61.370734]  __kasan_kmalloc+0xd4/0xd8
[   61.374467]  __kmalloc_cache_noprof+0x144/0x328
[   61.378981]  kasan_atomics+0xb8/0x2e8
[   61.382626]  kunit_try_run_case+0x14c/0x3d0
[   61.386793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.392262]  kthread+0x24c/0x2d0
[   61.395473]  ret_from_fork+0x10/0x20
[   61.399032] 
[   61.400508] The buggy address belongs to the object at ffff000800ddd700
[   61.400508]  which belongs to the cache kmalloc-64 of size 64
[   61.412835] The buggy address is located 0 bytes to the right of
[   61.412835]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.425681] 
[   61.427157] The buggy address belongs to the physical page:
[   61.432713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.440700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.447209] page_type: f5(slab)
[   61.450341] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.458065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.465785] page dumped because: kasan: bad access detected
[   61.471340] 
[   61.472816] Memory state around the buggy address:
[   61.477594]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.484798]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.492003] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.499205]                                      ^
[   61.503982]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.511186]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.518388] ==================================================================
[   46.912190] ==================================================================
[   46.919310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   46.926594] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   46.933885] 
[   46.935367] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.944482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.948643] Hardware name: WinLink E850-96 board (DT)
[   46.953680] Call trace:
[   46.956107]  dump_backtrace+0x9c/0x128
[   46.959841]  show_stack+0x20/0x38
[   46.963138]  dump_stack_lvl+0x8c/0xd0
[   46.966784]  print_report+0x118/0x5e0
[   46.970430]  kasan_report+0xc8/0x118
[   46.973988]  kasan_check_range+0x100/0x1a8
[   46.978069]  __kasan_check_read+0x20/0x30
[   46.982061]  kasan_atomics_helper+0x1f8/0x49c8
[   46.986488]  kasan_atomics+0x1a0/0x2e8
[   46.990221]  kunit_try_run_case+0x14c/0x3d0
[   46.994387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.999856]  kthread+0x24c/0x2d0
[   47.003068]  ret_from_fork+0x10/0x20
[   47.006629] 
[   47.008103] Allocated by task 302:
[   47.011489]  kasan_save_stack+0x3c/0x68
[   47.015307]  kasan_save_track+0x20/0x40
[   47.019127]  kasan_save_alloc_info+0x40/0x58
[   47.023380]  __kasan_kmalloc+0xd4/0xd8
[   47.027114]  __kmalloc_cache_noprof+0x144/0x328
[   47.031627]  kasan_atomics+0xb8/0x2e8
[   47.035273]  kunit_try_run_case+0x14c/0x3d0
[   47.039439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.044908]  kthread+0x24c/0x2d0
[   47.048119]  ret_from_fork+0x10/0x20
[   47.051679] 
[   47.053155] The buggy address belongs to the object at ffff000800ddd700
[   47.053155]  which belongs to the cache kmalloc-64 of size 64
[   47.065482] The buggy address is located 0 bytes to the right of
[   47.065482]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.078327] 
[   47.079805] The buggy address belongs to the physical page:
[   47.085362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.093346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.099856] page_type: f5(slab)
[   47.102992] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.110711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.118431] page dumped because: kasan: bad access detected
[   47.123986] 
[   47.125462] Memory state around the buggy address:
[   47.130241]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.137444]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.144650] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.151850]                                      ^
[   47.156628]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.163833]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.171034] ==================================================================
[   49.568620] ==================================================================
[   49.575687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   49.582977] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.590356] 
[   49.591834] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.600950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.605112] Hardware name: WinLink E850-96 board (DT)
[   49.610147] Call trace:
[   49.612578]  dump_backtrace+0x9c/0x128
[   49.616310]  show_stack+0x20/0x38
[   49.619609]  dump_stack_lvl+0x8c/0xd0
[   49.623254]  print_report+0x118/0x5e0
[   49.626900]  kasan_report+0xc8/0x118
[   49.630459]  kasan_check_range+0x100/0x1a8
[   49.634539]  __kasan_check_write+0x20/0x30
[   49.638619]  kasan_atomics_helper+0x578/0x49c8
[   49.643046]  kasan_atomics+0x1a0/0x2e8
[   49.646778]  kunit_try_run_case+0x14c/0x3d0
[   49.650945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.656414]  kthread+0x24c/0x2d0
[   49.659625]  ret_from_fork+0x10/0x20
[   49.663185] 
[   49.664660] Allocated by task 302:
[   49.668045]  kasan_save_stack+0x3c/0x68
[   49.671864]  kasan_save_track+0x20/0x40
[   49.675684]  kasan_save_alloc_info+0x40/0x58
[   49.679938]  __kasan_kmalloc+0xd4/0xd8
[   49.683670]  __kmalloc_cache_noprof+0x144/0x328
[   49.688184]  kasan_atomics+0xb8/0x2e8
[   49.691830]  kunit_try_run_case+0x14c/0x3d0
[   49.695996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.701465]  kthread+0x24c/0x2d0
[   49.704677]  ret_from_fork+0x10/0x20
[   49.708236] 
[   49.709711] The buggy address belongs to the object at ffff000800ddd700
[   49.709711]  which belongs to the cache kmalloc-64 of size 64
[   49.722038] The buggy address is located 0 bytes to the right of
[   49.722038]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   49.734885] 
[   49.736360] The buggy address belongs to the physical page:
[   49.741916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   49.749904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.756412] page_type: f5(slab)
[   49.759544] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.767268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   49.774988] page dumped because: kasan: bad access detected
[   49.780544] 
[   49.782019] Memory state around the buggy address:
[   49.786797]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.794002]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.801206] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.808408]                                      ^
[   49.813185]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.820390]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.827592] ==================================================================
[   62.318244] ==================================================================
[   62.325323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   62.332699] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.340077] 
[   62.341556] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.350672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.354834] Hardware name: WinLink E850-96 board (DT)
[   62.359870] Call trace:
[   62.362299]  dump_backtrace+0x9c/0x128
[   62.366032]  show_stack+0x20/0x38
[   62.369330]  dump_stack_lvl+0x8c/0xd0
[   62.372976]  print_report+0x118/0x5e0
[   62.376622]  kasan_report+0xc8/0x118
[   62.380181]  kasan_check_range+0x100/0x1a8
[   62.384261]  __kasan_check_write+0x20/0x30
[   62.388340]  kasan_atomics_helper+0x1780/0x49c8
[   62.392854]  kasan_atomics+0x1a0/0x2e8
[   62.396587]  kunit_try_run_case+0x14c/0x3d0
[   62.400753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.406222]  kthread+0x24c/0x2d0
[   62.409434]  ret_from_fork+0x10/0x20
[   62.412993] 
[   62.414469] Allocated by task 302:
[   62.417854]  kasan_save_stack+0x3c/0x68
[   62.421673]  kasan_save_track+0x20/0x40
[   62.425493]  kasan_save_alloc_info+0x40/0x58
[   62.429746]  __kasan_kmalloc+0xd4/0xd8
[   62.433479]  __kmalloc_cache_noprof+0x144/0x328
[   62.437993]  kasan_atomics+0xb8/0x2e8
[   62.441638]  kunit_try_run_case+0x14c/0x3d0
[   62.445805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.451273]  kthread+0x24c/0x2d0
[   62.454485]  ret_from_fork+0x10/0x20
[   62.458044] 
[   62.459520] The buggy address belongs to the object at ffff000800ddd700
[   62.459520]  which belongs to the cache kmalloc-64 of size 64
[   62.471847] The buggy address is located 0 bytes to the right of
[   62.471847]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   62.484693] 
[   62.486169] The buggy address belongs to the physical page:
[   62.491725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   62.499712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.506221] page_type: f5(slab)
[   62.509352] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.517077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   62.524797] page dumped because: kasan: bad access detected
[   62.530352] 
[   62.531828] Memory state around the buggy address:
[   62.536606]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.543810]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.551015] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.558216]                                      ^
[   62.562994]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.570199]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.577400] ==================================================================
[   58.331332] ==================================================================
[   58.338403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   58.345780] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.353158] 
[   58.354637] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.363753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.367914] Hardware name: WinLink E850-96 board (DT)
[   58.372950] Call trace:
[   58.375380]  dump_backtrace+0x9c/0x128
[   58.379113]  show_stack+0x20/0x38
[   58.382411]  dump_stack_lvl+0x8c/0xd0
[   58.386057]  print_report+0x118/0x5e0
[   58.389703]  kasan_report+0xc8/0x118
[   58.393262]  kasan_check_range+0x100/0x1a8
[   58.397341]  __kasan_check_write+0x20/0x30
[   58.401421]  kasan_atomics_helper+0x11b0/0x49c8
[   58.405935]  kasan_atomics+0x1a0/0x2e8
[   58.409667]  kunit_try_run_case+0x14c/0x3d0
[   58.413834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.419303]  kthread+0x24c/0x2d0
[   58.422515]  ret_from_fork+0x10/0x20
[   58.426074] 
[   58.427549] Allocated by task 302:
[   58.430935]  kasan_save_stack+0x3c/0x68
[   58.434754]  kasan_save_track+0x20/0x40
[   58.438573]  kasan_save_alloc_info+0x40/0x58
[   58.442827]  __kasan_kmalloc+0xd4/0xd8
[   58.446559]  __kmalloc_cache_noprof+0x144/0x328
[   58.451073]  kasan_atomics+0xb8/0x2e8
[   58.454719]  kunit_try_run_case+0x14c/0x3d0
[   58.458886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.464354]  kthread+0x24c/0x2d0
[   58.467566]  ret_from_fork+0x10/0x20
[   58.471125] 
[   58.472600] The buggy address belongs to the object at ffff000800ddd700
[   58.472600]  which belongs to the cache kmalloc-64 of size 64
[   58.484927] The buggy address is located 0 bytes to the right of
[   58.484927]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   58.497774] 
[   58.499250] The buggy address belongs to the physical page:
[   58.504806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   58.512793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.519301] page_type: f5(slab)
[   58.522433] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.530158] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.537877] page dumped because: kasan: bad access detected
[   58.543433] 
[   58.544908] Memory state around the buggy address:
[   58.549686]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.556891]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.564096] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.571297]                                      ^
[   58.576075]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.583279]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.590481] ==================================================================
[   60.726255] ==================================================================
[   60.733333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   60.740709] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   60.748087] 
[   60.749566] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   60.758682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.762844] Hardware name: WinLink E850-96 board (DT)
[   60.767879] Call trace:
[   60.770309]  dump_backtrace+0x9c/0x128
[   60.774042]  show_stack+0x20/0x38
[   60.777341]  dump_stack_lvl+0x8c/0xd0
[   60.780986]  print_report+0x118/0x5e0
[   60.784632]  kasan_report+0xc8/0x118
[   60.788191]  kasan_check_range+0x100/0x1a8
[   60.792271]  __kasan_check_write+0x20/0x30
[   60.796351]  kasan_atomics_helper+0x1584/0x49c8
[   60.800864]  kasan_atomics+0x1a0/0x2e8
[   60.804597]  kunit_try_run_case+0x14c/0x3d0
[   60.808764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.814232]  kthread+0x24c/0x2d0
[   60.817444]  ret_from_fork+0x10/0x20
[   60.821003] 
[   60.822478] Allocated by task 302:
[   60.825864]  kasan_save_stack+0x3c/0x68
[   60.829683]  kasan_save_track+0x20/0x40
[   60.833503]  kasan_save_alloc_info+0x40/0x58
[   60.837756]  __kasan_kmalloc+0xd4/0xd8
[   60.841489]  __kmalloc_cache_noprof+0x144/0x328
[   60.846002]  kasan_atomics+0xb8/0x2e8
[   60.849648]  kunit_try_run_case+0x14c/0x3d0
[   60.853815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.859283]  kthread+0x24c/0x2d0
[   60.862495]  ret_from_fork+0x10/0x20
[   60.866055] 
[   60.867530] The buggy address belongs to the object at ffff000800ddd700
[   60.867530]  which belongs to the cache kmalloc-64 of size 64
[   60.879857] The buggy address is located 0 bytes to the right of
[   60.879857]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.892703] 
[   60.894179] The buggy address belongs to the physical page:
[   60.899735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.907720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.914231] page_type: f5(slab)
[   60.917363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.925087] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.932807] page dumped because: kasan: bad access detected
[   60.938362] 
[   60.939838] Memory state around the buggy address:
[   60.944616]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.951820]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.959025] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.966226]                                      ^
[   60.971004]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.978209]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.985410] ==================================================================
[   59.930265] ==================================================================
[   59.937337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   59.944714] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.952006] 
[   59.953484] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.962600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.966762] Hardware name: WinLink E850-96 board (DT)
[   59.971797] Call trace:
[   59.974228]  dump_backtrace+0x9c/0x128
[   59.977960]  show_stack+0x20/0x38
[   59.981259]  dump_stack_lvl+0x8c/0xd0
[   59.984904]  print_report+0x118/0x5e0
[   59.988550]  kasan_report+0xc8/0x118
[   59.992109]  __asan_report_load8_noabort+0x20/0x30
[   59.996883]  kasan_atomics_helper+0x406c/0x49c8
[   60.001397]  kasan_atomics+0x1a0/0x2e8
[   60.005130]  kunit_try_run_case+0x14c/0x3d0
[   60.009296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.014765]  kthread+0x24c/0x2d0
[   60.017977]  ret_from_fork+0x10/0x20
[   60.021536] 
[   60.023011] Allocated by task 302:
[   60.026397]  kasan_save_stack+0x3c/0x68
[   60.030216]  kasan_save_track+0x20/0x40
[   60.034036]  kasan_save_alloc_info+0x40/0x58
[   60.038289]  __kasan_kmalloc+0xd4/0xd8
[   60.042021]  __kmalloc_cache_noprof+0x144/0x328
[   60.046536]  kasan_atomics+0xb8/0x2e8
[   60.050181]  kunit_try_run_case+0x14c/0x3d0
[   60.054348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.059816]  kthread+0x24c/0x2d0
[   60.063028]  ret_from_fork+0x10/0x20
[   60.066588] 
[   60.068063] The buggy address belongs to the object at ffff000800ddd700
[   60.068063]  which belongs to the cache kmalloc-64 of size 64
[   60.080389] The buggy address is located 0 bytes to the right of
[   60.080389]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.093236] 
[   60.094712] The buggy address belongs to the physical page:
[   60.100268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.108253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.114763] page_type: f5(slab)
[   60.117896] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.125620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.133340] page dumped because: kasan: bad access detected
[   60.138895] 
[   60.140370] Memory state around the buggy address:
[   60.145148]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.152353]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.159558] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.166759]                                      ^
[   60.171537]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.178742]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.185943] ==================================================================
[   51.166510] ==================================================================
[   51.173579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   51.180870] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.188248] 
[   51.189727] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.198843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.203005] Hardware name: WinLink E850-96 board (DT)
[   51.208040] Call trace:
[   51.210470]  dump_backtrace+0x9c/0x128
[   51.214203]  show_stack+0x20/0x38
[   51.217501]  dump_stack_lvl+0x8c/0xd0
[   51.221147]  print_report+0x118/0x5e0
[   51.224793]  kasan_report+0xc8/0x118
[   51.228352]  kasan_check_range+0x100/0x1a8
[   51.232432]  __kasan_check_write+0x20/0x30
[   51.236511]  kasan_atomics_helper+0x810/0x49c8
[   51.240939]  kasan_atomics+0x1a0/0x2e8
[   51.244671]  kunit_try_run_case+0x14c/0x3d0
[   51.248838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.254306]  kthread+0x24c/0x2d0
[   51.257518]  ret_from_fork+0x10/0x20
[   51.261077] 
[   51.262552] Allocated by task 302:
[   51.265938]  kasan_save_stack+0x3c/0x68
[   51.269757]  kasan_save_track+0x20/0x40
[   51.273577]  kasan_save_alloc_info+0x40/0x58
[   51.277830]  __kasan_kmalloc+0xd4/0xd8
[   51.281563]  __kmalloc_cache_noprof+0x144/0x328
[   51.286076]  kasan_atomics+0xb8/0x2e8
[   51.289722]  kunit_try_run_case+0x14c/0x3d0
[   51.293889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.299358]  kthread+0x24c/0x2d0
[   51.302569]  ret_from_fork+0x10/0x20
[   51.306128] 
[   51.307604] The buggy address belongs to the object at ffff000800ddd700
[   51.307604]  which belongs to the cache kmalloc-64 of size 64
[   51.319931] The buggy address is located 0 bytes to the right of
[   51.319931]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.332777] 
[   51.334253] The buggy address belongs to the physical page:
[   51.339809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.347796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.354305] page_type: f5(slab)
[   51.357437] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.365161] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.372881] page dumped because: kasan: bad access detected
[   51.378436] 
[   51.379912] Memory state around the buggy address:
[   51.384690]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.391894]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.399099] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.406300]                                      ^
[   51.411078]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.418283]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.425484] ==================================================================
[   56.999022] ==================================================================
[   57.006131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   57.013421] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.020799] 
[   57.022278] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.031395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.035556] Hardware name: WinLink E850-96 board (DT)
[   57.040591] Call trace:
[   57.043022]  dump_backtrace+0x9c/0x128
[   57.046754]  show_stack+0x20/0x38
[   57.050053]  dump_stack_lvl+0x8c/0xd0
[   57.053698]  print_report+0x118/0x5e0
[   57.057344]  kasan_report+0xc8/0x118
[   57.060903]  kasan_check_range+0x100/0x1a8
[   57.064983]  __kasan_check_write+0x20/0x30
[   57.069063]  kasan_atomics_helper+0xf94/0x49c8
[   57.073490]  kasan_atomics+0x1a0/0x2e8
[   57.077222]  kunit_try_run_case+0x14c/0x3d0
[   57.081389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.086857]  kthread+0x24c/0x2d0
[   57.090069]  ret_from_fork+0x10/0x20
[   57.093629] 
[   57.095104] Allocated by task 302:
[   57.098489]  kasan_save_stack+0x3c/0x68
[   57.102309]  kasan_save_track+0x20/0x40
[   57.106128]  kasan_save_alloc_info+0x40/0x58
[   57.110382]  __kasan_kmalloc+0xd4/0xd8
[   57.114114]  __kmalloc_cache_noprof+0x144/0x328
[   57.118628]  kasan_atomics+0xb8/0x2e8
[   57.122273]  kunit_try_run_case+0x14c/0x3d0
[   57.126440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.131909]  kthread+0x24c/0x2d0
[   57.135120]  ret_from_fork+0x10/0x20
[   57.138680] 
[   57.140155] The buggy address belongs to the object at ffff000800ddd700
[   57.140155]  which belongs to the cache kmalloc-64 of size 64
[   57.152482] The buggy address is located 0 bytes to the right of
[   57.152482]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.165328] 
[   57.166805] The buggy address belongs to the physical page:
[   57.172361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.180347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.186856] page_type: f5(slab)
[   57.189988] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.197712] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   57.205432] page dumped because: kasan: bad access detected
[   57.210987] 
[   57.212463] Memory state around the buggy address:
[   57.217241]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.224446]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.231650] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.238852]                                      ^
[   57.243629]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.250834]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.258036] ==================================================================
[   61.525726] ==================================================================
[   61.532799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   61.540176] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.547468] 
[   61.548946] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.558062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.562224] Hardware name: WinLink E850-96 board (DT)
[   61.567259] Call trace:
[   61.569690]  dump_backtrace+0x9c/0x128
[   61.573422]  show_stack+0x20/0x38
[   61.576721]  dump_stack_lvl+0x8c/0xd0
[   61.580367]  print_report+0x118/0x5e0
[   61.584012]  kasan_report+0xc8/0x118
[   61.587571]  __asan_report_load8_noabort+0x20/0x30
[   61.592345]  kasan_atomics_helper+0x3f18/0x49c8
[   61.596859]  kasan_atomics+0x1a0/0x2e8
[   61.600592]  kunit_try_run_case+0x14c/0x3d0
[   61.604758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.610227]  kthread+0x24c/0x2d0
[   61.613439]  ret_from_fork+0x10/0x20
[   61.616999] 
[   61.618473] Allocated by task 302:
[   61.621859]  kasan_save_stack+0x3c/0x68
[   61.625678]  kasan_save_track+0x20/0x40
[   61.629498]  kasan_save_alloc_info+0x40/0x58
[   61.633751]  __kasan_kmalloc+0xd4/0xd8
[   61.637484]  __kmalloc_cache_noprof+0x144/0x328
[   61.641998]  kasan_atomics+0xb8/0x2e8
[   61.645643]  kunit_try_run_case+0x14c/0x3d0
[   61.649810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.655278]  kthread+0x24c/0x2d0
[   61.658490]  ret_from_fork+0x10/0x20
[   61.662049] 
[   61.663525] The buggy address belongs to the object at ffff000800ddd700
[   61.663525]  which belongs to the cache kmalloc-64 of size 64
[   61.675851] The buggy address is located 0 bytes to the right of
[   61.675851]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.688698] 
[   61.690174] The buggy address belongs to the physical page:
[   61.695730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.703717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.710225] page_type: f5(slab)
[   61.713359] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.721082] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.728802] page dumped because: kasan: bad access detected
[   61.734357] 
[   61.735833] Memory state around the buggy address:
[   61.740611]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.747815]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.755020] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.762221]                                      ^
[   61.766999]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.774204]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.781405] ==================================================================
[   51.962145] ==================================================================
[   51.969227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   51.976518] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.983896] 
[   51.985375] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.994491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.998652] Hardware name: WinLink E850-96 board (DT)
[   52.003687] Call trace:
[   52.006118]  dump_backtrace+0x9c/0x128
[   52.009851]  show_stack+0x20/0x38
[   52.013149]  dump_stack_lvl+0x8c/0xd0
[   52.016795]  print_report+0x118/0x5e0
[   52.020441]  kasan_report+0xc8/0x118
[   52.024000]  kasan_check_range+0x100/0x1a8
[   52.028079]  __kasan_check_write+0x20/0x30
[   52.032159]  kasan_atomics_helper+0x978/0x49c8
[   52.036586]  kasan_atomics+0x1a0/0x2e8
[   52.040319]  kunit_try_run_case+0x14c/0x3d0
[   52.044485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.049954]  kthread+0x24c/0x2d0
[   52.053166]  ret_from_fork+0x10/0x20
[   52.056725] 
[   52.058200] Allocated by task 302:
[   52.061586]  kasan_save_stack+0x3c/0x68
[   52.065405]  kasan_save_track+0x20/0x40
[   52.069225]  kasan_save_alloc_info+0x40/0x58
[   52.073478]  __kasan_kmalloc+0xd4/0xd8
[   52.077211]  __kmalloc_cache_noprof+0x144/0x328
[   52.081724]  kasan_atomics+0xb8/0x2e8
[   52.085370]  kunit_try_run_case+0x14c/0x3d0
[   52.089536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.095005]  kthread+0x24c/0x2d0
[   52.098217]  ret_from_fork+0x10/0x20
[   52.101776] 
[   52.103252] The buggy address belongs to the object at ffff000800ddd700
[   52.103252]  which belongs to the cache kmalloc-64 of size 64
[   52.115578] The buggy address is located 0 bytes to the right of
[   52.115578]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.128425] 
[   52.129901] The buggy address belongs to the physical page:
[   52.135457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.143444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.149953] page_type: f5(slab)
[   52.153084] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.160809] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.168529] page dumped because: kasan: bad access detected
[   52.174084] 
[   52.175560] Memory state around the buggy address:
[   52.180338]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.187542]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.194747] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.201948]                                      ^
[   52.206726]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.213930]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.221132] ==================================================================
[   58.064833] ==================================================================
[   58.071914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   58.079291] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.086669] 
[   58.088147] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.097264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.101425] Hardware name: WinLink E850-96 board (DT)
[   58.106460] Call trace:
[   58.108891]  dump_backtrace+0x9c/0x128
[   58.112624]  show_stack+0x20/0x38
[   58.115922]  dump_stack_lvl+0x8c/0xd0
[   58.119568]  print_report+0x118/0x5e0
[   58.123214]  kasan_report+0xc8/0x118
[   58.126773]  kasan_check_range+0x100/0x1a8
[   58.130852]  __kasan_check_write+0x20/0x30
[   58.134932]  kasan_atomics_helper+0x1144/0x49c8
[   58.139446]  kasan_atomics+0x1a0/0x2e8
[   58.143179]  kunit_try_run_case+0x14c/0x3d0
[   58.147345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.152814]  kthread+0x24c/0x2d0
[   58.156025]  ret_from_fork+0x10/0x20
[   58.159585] 
[   58.161060] Allocated by task 302:
[   58.164446]  kasan_save_stack+0x3c/0x68
[   58.168265]  kasan_save_track+0x20/0x40
[   58.172084]  kasan_save_alloc_info+0x40/0x58
[   58.176338]  __kasan_kmalloc+0xd4/0xd8
[   58.180070]  __kmalloc_cache_noprof+0x144/0x328
[   58.184584]  kasan_atomics+0xb8/0x2e8
[   58.188230]  kunit_try_run_case+0x14c/0x3d0
[   58.192396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.197865]  kthread+0x24c/0x2d0
[   58.201077]  ret_from_fork+0x10/0x20
[   58.204636] 
[   58.206111] The buggy address belongs to the object at ffff000800ddd700
[   58.206111]  which belongs to the cache kmalloc-64 of size 64
[   58.218438] The buggy address is located 0 bytes to the right of
[   58.218438]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   58.231285] 
[   58.232761] The buggy address belongs to the physical page:
[   58.238317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   58.246303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.252812] page_type: f5(slab)
[   58.255944] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.263669] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.271388] page dumped because: kasan: bad access detected
[   58.276944] 
[   58.278419] Memory state around the buggy address:
[   58.283197]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.290402]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.297606] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.304808]                                      ^
[   58.309585]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.316790]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.323992] ==================================================================
[   52.228437] ==================================================================
[   52.235543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   52.242833] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   52.250211] 
[   52.251690] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   52.260806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.264968] Hardware name: WinLink E850-96 board (DT)
[   52.270003] Call trace:
[   52.272434]  dump_backtrace+0x9c/0x128
[   52.276166]  show_stack+0x20/0x38
[   52.279465]  dump_stack_lvl+0x8c/0xd0
[   52.283110]  print_report+0x118/0x5e0
[   52.286756]  kasan_report+0xc8/0x118
[   52.290315]  kasan_check_range+0x100/0x1a8
[   52.294395]  __kasan_check_write+0x20/0x30
[   52.298474]  kasan_atomics_helper+0x9e4/0x49c8
[   52.302902]  kasan_atomics+0x1a0/0x2e8
[   52.306634]  kunit_try_run_case+0x14c/0x3d0
[   52.310801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.316269]  kthread+0x24c/0x2d0
[   52.319481]  ret_from_fork+0x10/0x20
[   52.323041] 
[   52.324516] Allocated by task 302:
[   52.327901]  kasan_save_stack+0x3c/0x68
[   52.331721]  kasan_save_track+0x20/0x40
[   52.335540]  kasan_save_alloc_info+0x40/0x58
[   52.339793]  __kasan_kmalloc+0xd4/0xd8
[   52.343526]  __kmalloc_cache_noprof+0x144/0x328
[   52.348040]  kasan_atomics+0xb8/0x2e8
[   52.351686]  kunit_try_run_case+0x14c/0x3d0
[   52.355852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.361321]  kthread+0x24c/0x2d0
[   52.364533]  ret_from_fork+0x10/0x20
[   52.368092] 
[   52.369567] The buggy address belongs to the object at ffff000800ddd700
[   52.369567]  which belongs to the cache kmalloc-64 of size 64
[   52.381894] The buggy address is located 0 bytes to the right of
[   52.381894]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.394740] 
[   52.396216] The buggy address belongs to the physical page:
[   52.401772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.409759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.416268] page_type: f5(slab)
[   52.419400] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.427124] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.434844] page dumped because: kasan: bad access detected
[   52.440399] 
[   52.441875] Memory state around the buggy address:
[   52.446653]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.453858]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.461062] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.468264]                                      ^
[   52.473041]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.480246]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.487447] ==================================================================
[   53.823031] ==================================================================
[   53.830137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   53.837514] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.844805] 
[   53.846284] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.855400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.859562] Hardware name: WinLink E850-96 board (DT)
[   53.864597] Call trace:
[   53.867028]  dump_backtrace+0x9c/0x128
[   53.870760]  show_stack+0x20/0x38
[   53.874059]  dump_stack_lvl+0x8c/0xd0
[   53.877705]  print_report+0x118/0x5e0
[   53.881350]  kasan_report+0xc8/0x118
[   53.884909]  __asan_report_load4_noabort+0x20/0x30
[   53.889683]  kasan_atomics_helper+0x3f24/0x49c8
[   53.894197]  kasan_atomics+0x1a0/0x2e8
[   53.897930]  kunit_try_run_case+0x14c/0x3d0
[   53.902097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.907565]  kthread+0x24c/0x2d0
[   53.910777]  ret_from_fork+0x10/0x20
[   53.914336] 
[   53.915811] Allocated by task 302:
[   53.919197]  kasan_save_stack+0x3c/0x68
[   53.923016]  kasan_save_track+0x20/0x40
[   53.926836]  kasan_save_alloc_info+0x40/0x58
[   53.931089]  __kasan_kmalloc+0xd4/0xd8
[   53.934822]  __kmalloc_cache_noprof+0x144/0x328
[   53.939335]  kasan_atomics+0xb8/0x2e8
[   53.942981]  kunit_try_run_case+0x14c/0x3d0
[   53.947148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.952616]  kthread+0x24c/0x2d0
[   53.955828]  ret_from_fork+0x10/0x20
[   53.959387] 
[   53.960863] The buggy address belongs to the object at ffff000800ddd700
[   53.960863]  which belongs to the cache kmalloc-64 of size 64
[   53.973189] The buggy address is located 0 bytes to the right of
[   53.973189]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.986036] 
[   53.987512] The buggy address belongs to the physical page:
[   53.993067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.001055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.007563] page_type: f5(slab)
[   54.010695] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.018420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.026140] page dumped because: kasan: bad access detected
[   54.031695] 
[   54.033171] Memory state around the buggy address:
[   54.037949]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.045153]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.052358] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.059559]                                      ^
[   54.064337]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.071542]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.078743] ==================================================================
[   57.265361] ==================================================================
[   57.272446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   57.279824] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.287202] 
[   57.288680] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.297797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.301958] Hardware name: WinLink E850-96 board (DT)
[   57.306993] Call trace:
[   57.309424]  dump_backtrace+0x9c/0x128
[   57.313156]  show_stack+0x20/0x38
[   57.316455]  dump_stack_lvl+0x8c/0xd0
[   57.320101]  print_report+0x118/0x5e0
[   57.323747]  kasan_report+0xc8/0x118
[   57.327306]  kasan_check_range+0x100/0x1a8
[   57.331385]  __kasan_check_write+0x20/0x30
[   57.335465]  kasan_atomics_helper+0x1000/0x49c8
[   57.339979]  kasan_atomics+0x1a0/0x2e8
[   57.343711]  kunit_try_run_case+0x14c/0x3d0
[   57.347878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.353347]  kthread+0x24c/0x2d0
[   57.356558]  ret_from_fork+0x10/0x20
[   57.360118] 
[   57.361593] Allocated by task 302:
[   57.364979]  kasan_save_stack+0x3c/0x68
[   57.368798]  kasan_save_track+0x20/0x40
[   57.372617]  kasan_save_alloc_info+0x40/0x58
[   57.376871]  __kasan_kmalloc+0xd4/0xd8
[   57.380603]  __kmalloc_cache_noprof+0x144/0x328
[   57.385117]  kasan_atomics+0xb8/0x2e8
[   57.388763]  kunit_try_run_case+0x14c/0x3d0
[   57.392929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.398398]  kthread+0x24c/0x2d0
[   57.401609]  ret_from_fork+0x10/0x20
[   57.405169] 
[   57.406644] The buggy address belongs to the object at ffff000800ddd700
[   57.406644]  which belongs to the cache kmalloc-64 of size 64
[   57.418971] The buggy address is located 0 bytes to the right of
[   57.418971]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.431818] 
[   57.433293] The buggy address belongs to the physical page:
[   57.438850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.446837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.453345] page_type: f5(slab)
[   57.456477] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.464202] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   57.471921] page dumped because: kasan: bad access detected
[   57.477477] 
[   57.478952] Memory state around the buggy address:
[   57.483730]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.490935]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.498139] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.505341]                                      ^
[   57.510119]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.517323]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.524525] ==================================================================
[   56.732747] ==================================================================
[   56.739815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   56.747106] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   56.754484] 
[   56.755963] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   56.765079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.769241] Hardware name: WinLink E850-96 board (DT)
[   56.774276] Call trace:
[   56.776706]  dump_backtrace+0x9c/0x128
[   56.780439]  show_stack+0x20/0x38
[   56.783737]  dump_stack_lvl+0x8c/0xd0
[   56.787383]  print_report+0x118/0x5e0
[   56.791029]  kasan_report+0xc8/0x118
[   56.794588]  kasan_check_range+0x100/0x1a8
[   56.798667]  __kasan_check_write+0x20/0x30
[   56.802747]  kasan_atomics_helper+0xf28/0x49c8
[   56.807174]  kasan_atomics+0x1a0/0x2e8
[   56.810907]  kunit_try_run_case+0x14c/0x3d0
[   56.815074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.820542]  kthread+0x24c/0x2d0
[   56.823754]  ret_from_fork+0x10/0x20
[   56.827313] 
[   56.828789] Allocated by task 302:
[   56.832174]  kasan_save_stack+0x3c/0x68
[   56.835993]  kasan_save_track+0x20/0x40
[   56.839813]  kasan_save_alloc_info+0x40/0x58
[   56.844066]  __kasan_kmalloc+0xd4/0xd8
[   56.847799]  __kmalloc_cache_noprof+0x144/0x328
[   56.852313]  kasan_atomics+0xb8/0x2e8
[   56.855958]  kunit_try_run_case+0x14c/0x3d0
[   56.860125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.865593]  kthread+0x24c/0x2d0
[   56.868805]  ret_from_fork+0x10/0x20
[   56.872364] 
[   56.873840] The buggy address belongs to the object at ffff000800ddd700
[   56.873840]  which belongs to the cache kmalloc-64 of size 64
[   56.886166] The buggy address is located 0 bytes to the right of
[   56.886166]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.899013] 
[   56.900489] The buggy address belongs to the physical page:
[   56.906045] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.914032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.920541] page_type: f5(slab)
[   56.923673] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.931397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.939117] page dumped because: kasan: bad access detected
[   56.944672] 
[   56.946148] Memory state around the buggy address:
[   56.950926]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.958130]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.965335] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.972536]                                      ^
[   56.977314]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.984519]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.991720] ==================================================================
[   49.834922] ==================================================================
[   49.842002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   49.849293] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.856671] 
[   49.858150] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.867266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.871428] Hardware name: WinLink E850-96 board (DT)
[   49.876463] Call trace:
[   49.878893]  dump_backtrace+0x9c/0x128
[   49.882626]  show_stack+0x20/0x38
[   49.885924]  dump_stack_lvl+0x8c/0xd0
[   49.889570]  print_report+0x118/0x5e0
[   49.893216]  kasan_report+0xc8/0x118
[   49.896775]  kasan_check_range+0x100/0x1a8
[   49.900854]  __kasan_check_write+0x20/0x30
[   49.904934]  kasan_atomics_helper+0x5e4/0x49c8
[   49.909361]  kasan_atomics+0x1a0/0x2e8
[   49.913094]  kunit_try_run_case+0x14c/0x3d0
[   49.917261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.922729]  kthread+0x24c/0x2d0
[   49.925941]  ret_from_fork+0x10/0x20
[   49.929500] 
[   49.930975] Allocated by task 302:
[   49.934361]  kasan_save_stack+0x3c/0x68
[   49.938180]  kasan_save_track+0x20/0x40
[   49.942000]  kasan_save_alloc_info+0x40/0x58
[   49.946253]  __kasan_kmalloc+0xd4/0xd8
[   49.949986]  __kmalloc_cache_noprof+0x144/0x328
[   49.954499]  kasan_atomics+0xb8/0x2e8
[   49.958145]  kunit_try_run_case+0x14c/0x3d0
[   49.962312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.967780]  kthread+0x24c/0x2d0
[   49.970992]  ret_from_fork+0x10/0x20
[   49.974551] 
[   49.976027] The buggy address belongs to the object at ffff000800ddd700
[   49.976027]  which belongs to the cache kmalloc-64 of size 64
[   49.988354] The buggy address is located 0 bytes to the right of
[   49.988354]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.001200] 
[   50.002676] The buggy address belongs to the physical page:
[   50.008232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.016219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.022727] page_type: f5(slab)
[   50.025860] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.033584] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.041304] page dumped because: kasan: bad access detected
[   50.046859] 
[   50.048335] Memory state around the buggy address:
[   50.053112]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.060317]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.067522] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.074723]                                      ^
[   50.079501]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.086706]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.093907] ==================================================================
[   50.633867] ==================================================================
[   50.640949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   50.648239] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.655617] 
[   50.657096] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.666212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.670374] Hardware name: WinLink E850-96 board (DT)
[   50.675409] Call trace:
[   50.677839]  dump_backtrace+0x9c/0x128
[   50.681572]  show_stack+0x20/0x38
[   50.684871]  dump_stack_lvl+0x8c/0xd0
[   50.688516]  print_report+0x118/0x5e0
[   50.692162]  kasan_report+0xc8/0x118
[   50.695721]  kasan_check_range+0x100/0x1a8
[   50.699801]  __kasan_check_write+0x20/0x30
[   50.703881]  kasan_atomics_helper+0x728/0x49c8
[   50.708307]  kasan_atomics+0x1a0/0x2e8
[   50.712040]  kunit_try_run_case+0x14c/0x3d0
[   50.716207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.721675]  kthread+0x24c/0x2d0
[   50.724887]  ret_from_fork+0x10/0x20
[   50.728447] 
[   50.729921] Allocated by task 302:
[   50.733308]  kasan_save_stack+0x3c/0x68
[   50.737127]  kasan_save_track+0x20/0x40
[   50.740946]  kasan_save_alloc_info+0x40/0x58
[   50.745199]  __kasan_kmalloc+0xd4/0xd8
[   50.748932]  __kmalloc_cache_noprof+0x144/0x328
[   50.753446]  kasan_atomics+0xb8/0x2e8
[   50.757091]  kunit_try_run_case+0x14c/0x3d0
[   50.761258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.766727]  kthread+0x24c/0x2d0
[   50.769939]  ret_from_fork+0x10/0x20
[   50.773498] 
[   50.774973] The buggy address belongs to the object at ffff000800ddd700
[   50.774973]  which belongs to the cache kmalloc-64 of size 64
[   50.787300] The buggy address is located 0 bytes to the right of
[   50.787300]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.800146] 
[   50.801622] The buggy address belongs to the physical page:
[   50.807178] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.815165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.821674] page_type: f5(slab)
[   50.824806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.832530] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.840250] page dumped because: kasan: bad access detected
[   50.845805] 
[   50.847281] Memory state around the buggy address:
[   50.852059]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.859263]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.866468] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.873669]                                      ^
[   50.878447]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.885652]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.892853] ==================================================================
[   57.798355] ==================================================================
[   57.805425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   57.812801] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.820180] 
[   57.821659] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.830775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.834936] Hardware name: WinLink E850-96 board (DT)
[   57.839971] Call trace:
[   57.842402]  dump_backtrace+0x9c/0x128
[   57.846135]  show_stack+0x20/0x38
[   57.849433]  dump_stack_lvl+0x8c/0xd0
[   57.853079]  print_report+0x118/0x5e0
[   57.856724]  kasan_report+0xc8/0x118
[   57.860284]  kasan_check_range+0x100/0x1a8
[   57.864363]  __kasan_check_write+0x20/0x30
[   57.868443]  kasan_atomics_helper+0x10d8/0x49c8
[   57.872957]  kasan_atomics+0x1a0/0x2e8
[   57.876690]  kunit_try_run_case+0x14c/0x3d0
[   57.880856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.886325]  kthread+0x24c/0x2d0
[   57.889537]  ret_from_fork+0x10/0x20
[   57.893096] 
[   57.894571] Allocated by task 302:
[   57.897956]  kasan_save_stack+0x3c/0x68
[   57.901776]  kasan_save_track+0x20/0x40
[   57.905595]  kasan_save_alloc_info+0x40/0x58
[   57.909849]  __kasan_kmalloc+0xd4/0xd8
[   57.913581]  __kmalloc_cache_noprof+0x144/0x328
[   57.918095]  kasan_atomics+0xb8/0x2e8
[   57.921741]  kunit_try_run_case+0x14c/0x3d0
[   57.925907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.931376]  kthread+0x24c/0x2d0
[   57.934588]  ret_from_fork+0x10/0x20
[   57.938147] 
[   57.939622] The buggy address belongs to the object at ffff000800ddd700
[   57.939622]  which belongs to the cache kmalloc-64 of size 64
[   57.951949] The buggy address is located 0 bytes to the right of
[   57.951949]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.964796] 
[   57.966271] The buggy address belongs to the physical page:
[   57.971827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.979815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.986323] page_type: f5(slab)
[   57.989455] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.997180] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.004899] page dumped because: kasan: bad access detected
[   58.010455] 
[   58.011930] Memory state around the buggy address:
[   58.016708]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.023913]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.031117] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.038319]                                      ^
[   58.043097]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.050301]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.057503] ==================================================================
[   63.377231] ==================================================================
[   63.384334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   63.391711] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   63.399089] 
[   63.400568] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.409684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.413846] Hardware name: WinLink E850-96 board (DT)
[   63.418881] Call trace:
[   63.421311]  dump_backtrace+0x9c/0x128
[   63.425044]  show_stack+0x20/0x38
[   63.428342]  dump_stack_lvl+0x8c/0xd0
[   63.431988]  print_report+0x118/0x5e0
[   63.435634]  kasan_report+0xc8/0x118
[   63.439193]  kasan_check_range+0x100/0x1a8
[   63.443273]  __kasan_check_write+0x20/0x30
[   63.447353]  kasan_atomics_helper+0x18a4/0x49c8
[   63.451866]  kasan_atomics+0x1a0/0x2e8
[   63.455599]  kunit_try_run_case+0x14c/0x3d0
[   63.459765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.465234]  kthread+0x24c/0x2d0
[   63.468446]  ret_from_fork+0x10/0x20
[   63.472007] 
[   63.473480] Allocated by task 302:
[   63.476866]  kasan_save_stack+0x3c/0x68
[   63.480685]  kasan_save_track+0x20/0x40
[   63.484505]  kasan_save_alloc_info+0x40/0x58
[   63.488758]  __kasan_kmalloc+0xd4/0xd8
[   63.492491]  __kmalloc_cache_noprof+0x144/0x328
[   63.497004]  kasan_atomics+0xb8/0x2e8
[   63.500650]  kunit_try_run_case+0x14c/0x3d0
[   63.504817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.510285]  kthread+0x24c/0x2d0
[   63.513497]  ret_from_fork+0x10/0x20
[   63.517056] 
[   63.518532] The buggy address belongs to the object at ffff000800ddd700
[   63.518532]  which belongs to the cache kmalloc-64 of size 64
[   63.530858] The buggy address is located 0 bytes to the right of
[   63.530858]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   63.543705] 
[   63.545181] The buggy address belongs to the physical page:
[   63.550737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   63.558723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.565232] page_type: f5(slab)
[   63.568364] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.576089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   63.583809] page dumped because: kasan: bad access detected
[   63.589364] 
[   63.590839] Memory state around the buggy address:
[   63.595617]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.602822]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.610027] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.617228]                                      ^
[   63.622006]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.629210]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.636412] ==================================================================
[   56.203242] ==================================================================
[   56.210309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   56.217600] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   56.224978] 
[   56.226457] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   56.235573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.239735] Hardware name: WinLink E850-96 board (DT)
[   56.244770] Call trace:
[   56.247200]  dump_backtrace+0x9c/0x128
[   56.250933]  show_stack+0x20/0x38
[   56.254231]  dump_stack_lvl+0x8c/0xd0
[   56.257877]  print_report+0x118/0x5e0
[   56.261523]  kasan_report+0xc8/0x118
[   56.265082]  kasan_check_range+0x100/0x1a8
[   56.269161]  __kasan_check_write+0x20/0x30
[   56.273242]  kasan_atomics_helper+0xeb0/0x49c8
[   56.277668]  kasan_atomics+0x1a0/0x2e8
[   56.281401]  kunit_try_run_case+0x14c/0x3d0
[   56.285567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.291036]  kthread+0x24c/0x2d0
[   56.294248]  ret_from_fork+0x10/0x20
[   56.297807] 
[   56.299283] Allocated by task 302:
[   56.302668]  kasan_save_stack+0x3c/0x68
[   56.306487]  kasan_save_track+0x20/0x40
[   56.310307]  kasan_save_alloc_info+0x40/0x58
[   56.314560]  __kasan_kmalloc+0xd4/0xd8
[   56.318293]  __kmalloc_cache_noprof+0x144/0x328
[   56.322807]  kasan_atomics+0xb8/0x2e8
[   56.326452]  kunit_try_run_case+0x14c/0x3d0
[   56.330619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.336087]  kthread+0x24c/0x2d0
[   56.339299]  ret_from_fork+0x10/0x20
[   56.342858] 
[   56.344334] The buggy address belongs to the object at ffff000800ddd700
[   56.344334]  which belongs to the cache kmalloc-64 of size 64
[   56.356661] The buggy address is located 0 bytes to the right of
[   56.356661]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.369507] 
[   56.370983] The buggy address belongs to the physical page:
[   56.376539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.384526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.391034] page_type: f5(slab)
[   56.394167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.401891] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.409611] page dumped because: kasan: bad access detected
[   56.415166] 
[   56.416642] Memory state around the buggy address:
[   56.421420]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.428624]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.435829] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.443030]                                      ^
[   56.447808]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.455012]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.462214] ==================================================================
[   53.556754] ==================================================================
[   53.563822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   53.571112] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.578490] 
[   53.579970] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.589085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.593247] Hardware name: WinLink E850-96 board (DT)
[   53.598282] Call trace:
[   53.600712]  dump_backtrace+0x9c/0x128
[   53.604444]  show_stack+0x20/0x38
[   53.607743]  dump_stack_lvl+0x8c/0xd0
[   53.611389]  print_report+0x118/0x5e0
[   53.615035]  kasan_report+0xc8/0x118
[   53.618594]  kasan_check_range+0x100/0x1a8
[   53.622673]  __kasan_check_write+0x20/0x30
[   53.626753]  kasan_atomics_helper+0xbc8/0x49c8
[   53.631180]  kasan_atomics+0x1a0/0x2e8
[   53.634913]  kunit_try_run_case+0x14c/0x3d0
[   53.639080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.644548]  kthread+0x24c/0x2d0
[   53.647760]  ret_from_fork+0x10/0x20
[   53.651319] 
[   53.652794] Allocated by task 302:
[   53.656180]  kasan_save_stack+0x3c/0x68
[   53.659999]  kasan_save_track+0x20/0x40
[   53.663818]  kasan_save_alloc_info+0x40/0x58
[   53.668072]  __kasan_kmalloc+0xd4/0xd8
[   53.671805]  __kmalloc_cache_noprof+0x144/0x328
[   53.676319]  kasan_atomics+0xb8/0x2e8
[   53.679964]  kunit_try_run_case+0x14c/0x3d0
[   53.684131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.689599]  kthread+0x24c/0x2d0
[   53.692811]  ret_from_fork+0x10/0x20
[   53.696370] 
[   53.697846] The buggy address belongs to the object at ffff000800ddd700
[   53.697846]  which belongs to the cache kmalloc-64 of size 64
[   53.710172] The buggy address is located 0 bytes to the right of
[   53.710172]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.723019] 
[   53.724495] The buggy address belongs to the physical page:
[   53.730051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   53.738038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.744546] page_type: f5(slab)
[   53.747678] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.755403] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.763123] page dumped because: kasan: bad access detected
[   53.768678] 
[   53.770154] Memory state around the buggy address:
[   53.774932]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.782136]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.789343] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.796542]                                      ^
[   53.801320]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.808524]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.815726] ==================================================================
[   63.114248] ==================================================================
[   63.121317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   63.128694] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   63.135985] 
[   63.137464] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.146580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.150742] Hardware name: WinLink E850-96 board (DT)
[   63.155777] Call trace:
[   63.158207]  dump_backtrace+0x9c/0x128
[   63.161940]  show_stack+0x20/0x38
[   63.165239]  dump_stack_lvl+0x8c/0xd0
[   63.168884]  print_report+0x118/0x5e0
[   63.172530]  kasan_report+0xc8/0x118
[   63.176089]  __asan_report_load8_noabort+0x20/0x30
[   63.180863]  kasan_atomics_helper+0x3f88/0x49c8
[   63.185377]  kasan_atomics+0x1a0/0x2e8
[   63.189110]  kunit_try_run_case+0x14c/0x3d0
[   63.193276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.198745]  kthread+0x24c/0x2d0
[   63.201957]  ret_from_fork+0x10/0x20
[   63.205518] 
[   63.206991] Allocated by task 302:
[   63.210377]  kasan_save_stack+0x3c/0x68
[   63.214196]  kasan_save_track+0x20/0x40
[   63.218015]  kasan_save_alloc_info+0x40/0x58
[   63.222269]  __kasan_kmalloc+0xd4/0xd8
[   63.226002]  __kmalloc_cache_noprof+0x144/0x328
[   63.230515]  kasan_atomics+0xb8/0x2e8
[   63.234161]  kunit_try_run_case+0x14c/0x3d0
[   63.238328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.243796]  kthread+0x24c/0x2d0
[   63.247008]  ret_from_fork+0x10/0x20
[   63.250569] 
[   63.252043] The buggy address belongs to the object at ffff000800ddd700
[   63.252043]  which belongs to the cache kmalloc-64 of size 64
[   63.264369] The buggy address is located 0 bytes to the right of
[   63.264369]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   63.277216] 
[   63.278691] The buggy address belongs to the physical page:
[   63.284248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   63.292235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.298744] page_type: f5(slab)
[   63.301875] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.309600] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   63.317320] page dumped because: kasan: bad access detected
[   63.322875] 
[   63.324350] Memory state around the buggy address:
[   63.329128]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.336333]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.343538] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.350739]                                      ^
[   63.355517]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.362721]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.369923] ==================================================================
[   55.674084] ==================================================================
[   55.681151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   55.688441] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.695733] 
[   55.697211] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.706327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.710489] Hardware name: WinLink E850-96 board (DT)
[   55.715524] Call trace:
[   55.717955]  dump_backtrace+0x9c/0x128
[   55.721687]  show_stack+0x20/0x38
[   55.724986]  dump_stack_lvl+0x8c/0xd0
[   55.728632]  print_report+0x118/0x5e0
[   55.732278]  kasan_report+0xc8/0x118
[   55.735836]  kasan_check_range+0x100/0x1a8
[   55.739916]  __kasan_check_read+0x20/0x30
[   55.743909]  kasan_atomics_helper+0xe3c/0x49c8
[   55.748336]  kasan_atomics+0x1a0/0x2e8
[   55.752069]  kunit_try_run_case+0x14c/0x3d0
[   55.756235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.761704]  kthread+0x24c/0x2d0
[   55.764916]  ret_from_fork+0x10/0x20
[   55.768475] 
[   55.769950] Allocated by task 302:
[   55.773336]  kasan_save_stack+0x3c/0x68
[   55.777155]  kasan_save_track+0x20/0x40
[   55.780974]  kasan_save_alloc_info+0x40/0x58
[   55.785228]  __kasan_kmalloc+0xd4/0xd8
[   55.788960]  __kmalloc_cache_noprof+0x144/0x328
[   55.793474]  kasan_atomics+0xb8/0x2e8
[   55.797120]  kunit_try_run_case+0x14c/0x3d0
[   55.801286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.806755]  kthread+0x24c/0x2d0
[   55.809967]  ret_from_fork+0x10/0x20
[   55.813526] 
[   55.815002] The buggy address belongs to the object at ffff000800ddd700
[   55.815002]  which belongs to the cache kmalloc-64 of size 64
[   55.827328] The buggy address is located 0 bytes to the right of
[   55.827328]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.840175] 
[   55.841651] The buggy address belongs to the physical page:
[   55.847207] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.855192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.861702] page_type: f5(slab)
[   55.864834] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.872559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.880278] page dumped because: kasan: bad access detected
[   55.885834] 
[   55.887309] Memory state around the buggy address:
[   55.892087]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.899292]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.906497] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.913698]                                      ^
[   55.918476]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.925680]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.932882] ==================================================================
[   58.597784] ==================================================================
[   58.604892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   58.612268] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.619647] 
[   58.621126] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.630242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.634404] Hardware name: WinLink E850-96 board (DT)
[   58.639439] Call trace:
[   58.641869]  dump_backtrace+0x9c/0x128
[   58.645601]  show_stack+0x20/0x38
[   58.648900]  dump_stack_lvl+0x8c/0xd0
[   58.652546]  print_report+0x118/0x5e0
[   58.656192]  kasan_report+0xc8/0x118
[   58.659751]  kasan_check_range+0x100/0x1a8
[   58.663830]  __kasan_check_write+0x20/0x30
[   58.667910]  kasan_atomics_helper+0x121c/0x49c8
[   58.672424]  kasan_atomics+0x1a0/0x2e8
[   58.676157]  kunit_try_run_case+0x14c/0x3d0
[   58.680323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.685792]  kthread+0x24c/0x2d0
[   58.689004]  ret_from_fork+0x10/0x20
[   58.692563] 
[   58.694038] Allocated by task 302:
[   58.697424]  kasan_save_stack+0x3c/0x68
[   58.701243]  kasan_save_track+0x20/0x40
[   58.705062]  kasan_save_alloc_info+0x40/0x58
[   58.709316]  __kasan_kmalloc+0xd4/0xd8
[   58.713048]  __kmalloc_cache_noprof+0x144/0x328
[   58.717562]  kasan_atomics+0xb8/0x2e8
[   58.721208]  kunit_try_run_case+0x14c/0x3d0
[   58.725375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.730843]  kthread+0x24c/0x2d0
[   58.734055]  ret_from_fork+0x10/0x20
[   58.737614] 
[   58.739090] The buggy address belongs to the object at ffff000800ddd700
[   58.739090]  which belongs to the cache kmalloc-64 of size 64
[   58.751416] The buggy address is located 0 bytes to the right of
[   58.751416]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   58.764263] 
[   58.765739] The buggy address belongs to the physical page:
[   58.771295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   58.779281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.785790] page_type: f5(slab)
[   58.788922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.796647] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.804367] page dumped because: kasan: bad access detected
[   58.809922] 
[   58.811397] Memory state around the buggy address:
[   58.816175]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.823380]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.830584] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.837786]                                      ^
[   58.842564]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.849768]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.856970] ==================================================================
[   57.531856] ==================================================================
[   57.538936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   57.546313] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.553691] 
[   57.555169] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.564285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.568447] Hardware name: WinLink E850-96 board (DT)
[   57.573482] Call trace:
[   57.575913]  dump_backtrace+0x9c/0x128
[   57.579645]  show_stack+0x20/0x38
[   57.582944]  dump_stack_lvl+0x8c/0xd0
[   57.586590]  print_report+0x118/0x5e0
[   57.590236]  kasan_report+0xc8/0x118
[   57.593794]  kasan_check_range+0x100/0x1a8
[   57.597875]  __kasan_check_write+0x20/0x30
[   57.601954]  kasan_atomics_helper+0x106c/0x49c8
[   57.606468]  kasan_atomics+0x1a0/0x2e8
[   57.610200]  kunit_try_run_case+0x14c/0x3d0
[   57.614367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.619836]  kthread+0x24c/0x2d0
[   57.623047]  ret_from_fork+0x10/0x20
[   57.626607] 
[   57.628082] Allocated by task 302:
[   57.631467]  kasan_save_stack+0x3c/0x68
[   57.635287]  kasan_save_track+0x20/0x40
[   57.639106]  kasan_save_alloc_info+0x40/0x58
[   57.643360]  __kasan_kmalloc+0xd4/0xd8
[   57.647092]  __kmalloc_cache_noprof+0x144/0x328
[   57.651606]  kasan_atomics+0xb8/0x2e8
[   57.655252]  kunit_try_run_case+0x14c/0x3d0
[   57.659418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.664887]  kthread+0x24c/0x2d0
[   57.668099]  ret_from_fork+0x10/0x20
[   57.671658] 
[   57.673133] The buggy address belongs to the object at ffff000800ddd700
[   57.673133]  which belongs to the cache kmalloc-64 of size 64
[   57.685460] The buggy address is located 0 bytes to the right of
[   57.685460]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.698307] 
[   57.699782] The buggy address belongs to the physical page:
[   57.705339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.713324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.719834] page_type: f5(slab)
[   57.722966] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.730691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   57.738410] page dumped because: kasan: bad access detected
[   57.743966] 
[   57.745441] Memory state around the buggy address:
[   57.750219]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.757424]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.764628] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.771830]                                      ^
[   57.776608]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.783812]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.791014] ==================================================================
[   50.367557] ==================================================================
[   50.374633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   50.381924] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.389302] 
[   50.390781] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.399897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.404058] Hardware name: WinLink E850-96 board (DT)
[   50.409094] Call trace:
[   50.411524]  dump_backtrace+0x9c/0x128
[   50.415256]  show_stack+0x20/0x38
[   50.418555]  dump_stack_lvl+0x8c/0xd0
[   50.422201]  print_report+0x118/0x5e0
[   50.425847]  kasan_report+0xc8/0x118
[   50.429406]  kasan_check_range+0x100/0x1a8
[   50.433485]  __kasan_check_write+0x20/0x30
[   50.437565]  kasan_atomics_helper+0x6bc/0x49c8
[   50.441992]  kasan_atomics+0x1a0/0x2e8
[   50.445725]  kunit_try_run_case+0x14c/0x3d0
[   50.449891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.455360]  kthread+0x24c/0x2d0
[   50.458572]  ret_from_fork+0x10/0x20
[   50.462131] 
[   50.463606] Allocated by task 302:
[   50.466992]  kasan_save_stack+0x3c/0x68
[   50.470811]  kasan_save_track+0x20/0x40
[   50.474630]  kasan_save_alloc_info+0x40/0x58
[   50.478884]  __kasan_kmalloc+0xd4/0xd8
[   50.482616]  __kmalloc_cache_noprof+0x144/0x328
[   50.487130]  kasan_atomics+0xb8/0x2e8
[   50.490776]  kunit_try_run_case+0x14c/0x3d0
[   50.494943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.500411]  kthread+0x24c/0x2d0
[   50.503623]  ret_from_fork+0x10/0x20
[   50.507182] 
[   50.508658] The buggy address belongs to the object at ffff000800ddd700
[   50.508658]  which belongs to the cache kmalloc-64 of size 64
[   50.520984] The buggy address is located 0 bytes to the right of
[   50.520984]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.533831] 
[   50.535307] The buggy address belongs to the physical page:
[   50.540863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.548850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.555358] page_type: f5(slab)
[   50.558490] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.566215] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.573935] page dumped because: kasan: bad access detected
[   50.579490] 
[   50.580966] Memory state around the buggy address:
[   50.585743]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.592948]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.600153] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.607354]                                      ^
[   50.612131]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.619336]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.626538] ==================================================================
[   61.788708] ==================================================================
[   61.795816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   61.803193] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.810571] 
[   61.812050] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.821166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.825328] Hardware name: WinLink E850-96 board (DT)
[   61.830363] Call trace:
[   61.832793]  dump_backtrace+0x9c/0x128
[   61.836526]  show_stack+0x20/0x38
[   61.839824]  dump_stack_lvl+0x8c/0xd0
[   61.843470]  print_report+0x118/0x5e0
[   61.847116]  kasan_report+0xc8/0x118
[   61.850675]  kasan_check_range+0x100/0x1a8
[   61.854755]  __kasan_check_write+0x20/0x30
[   61.858834]  kasan_atomics_helper+0x16f0/0x49c8
[   61.863348]  kasan_atomics+0x1a0/0x2e8
[   61.867081]  kunit_try_run_case+0x14c/0x3d0
[   61.871248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.876716]  kthread+0x24c/0x2d0
[   61.879928]  ret_from_fork+0x10/0x20
[   61.883488] 
[   61.884963] Allocated by task 302:
[   61.888348]  kasan_save_stack+0x3c/0x68
[   61.892167]  kasan_save_track+0x20/0x40
[   61.895987]  kasan_save_alloc_info+0x40/0x58
[   61.900240]  __kasan_kmalloc+0xd4/0xd8
[   61.903973]  __kmalloc_cache_noprof+0x144/0x328
[   61.908487]  kasan_atomics+0xb8/0x2e8
[   61.912132]  kunit_try_run_case+0x14c/0x3d0
[   61.916299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.921768]  kthread+0x24c/0x2d0
[   61.924979]  ret_from_fork+0x10/0x20
[   61.928538] 
[   61.930014] The buggy address belongs to the object at ffff000800ddd700
[   61.930014]  which belongs to the cache kmalloc-64 of size 64
[   61.942341] The buggy address is located 0 bytes to the right of
[   61.942341]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.955187] 
[   61.956663] The buggy address belongs to the physical page:
[   61.962219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.970206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.976715] page_type: f5(slab)
[   61.979847] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.987571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.995291] page dumped because: kasan: bad access detected
[   62.000846] 
[   62.002322] Memory state around the buggy address:
[   62.007100]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.014304]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.021509] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.028710]                                      ^
[   62.033488]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.040693]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.047894] ==================================================================
[   47.178331] ==================================================================
[   47.185445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   47.192735] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.200114] 
[   47.201596] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   47.210710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.214872] Hardware name: WinLink E850-96 board (DT)
[   47.219909] Call trace:
[   47.222336]  dump_backtrace+0x9c/0x128
[   47.226068]  show_stack+0x20/0x38
[   47.229367]  dump_stack_lvl+0x8c/0xd0
[   47.233013]  print_report+0x118/0x5e0
[   47.236658]  kasan_report+0xc8/0x118
[   47.240217]  kasan_check_range+0x100/0x1a8
[   47.244297]  __kasan_check_write+0x20/0x30
[   47.248377]  kasan_atomics_helper+0x25c/0x49c8
[   47.252804]  kasan_atomics+0x1a0/0x2e8
[   47.256537]  kunit_try_run_case+0x14c/0x3d0
[   47.260703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.266172]  kthread+0x24c/0x2d0
[   47.269384]  ret_from_fork+0x10/0x20
[   47.272945] 
[   47.274418] Allocated by task 302:
[   47.277805]  kasan_save_stack+0x3c/0x68
[   47.281624]  kasan_save_track+0x20/0x40
[   47.285442]  kasan_save_alloc_info+0x40/0x58
[   47.289696]  __kasan_kmalloc+0xd4/0xd8
[   47.293428]  __kmalloc_cache_noprof+0x144/0x328
[   47.297942]  kasan_atomics+0xb8/0x2e8
[   47.301588]  kunit_try_run_case+0x14c/0x3d0
[   47.305754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.311223]  kthread+0x24c/0x2d0
[   47.314435]  ret_from_fork+0x10/0x20
[   47.317993] 
[   47.319469] The buggy address belongs to the object at ffff000800ddd700
[   47.319469]  which belongs to the cache kmalloc-64 of size 64
[   47.331796] The buggy address is located 0 bytes to the right of
[   47.331796]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.344643] 
[   47.346120] The buggy address belongs to the physical page:
[   47.351676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.359664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.366170] page_type: f5(slab)
[   47.369304] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.377027] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.384746] page dumped because: kasan: bad access detected
[   47.390302] 
[   47.391777] Memory state around the buggy address:
[   47.396556]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.403760]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.410965] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.418166]                                      ^
[   47.422943]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.430148]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.437350] ==================================================================
[   60.459757] ==================================================================
[   60.466845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   60.474220] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   60.481598] 
[   60.483077] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   60.492193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.496355] Hardware name: WinLink E850-96 board (DT)
[   60.501390] Call trace:
[   60.503820]  dump_backtrace+0x9c/0x128
[   60.507553]  show_stack+0x20/0x38
[   60.510851]  dump_stack_lvl+0x8c/0xd0
[   60.514497]  print_report+0x118/0x5e0
[   60.518143]  kasan_report+0xc8/0x118
[   60.521702]  kasan_check_range+0x100/0x1a8
[   60.525782]  __kasan_check_write+0x20/0x30
[   60.529862]  kasan_atomics_helper+0x1518/0x49c8
[   60.534375]  kasan_atomics+0x1a0/0x2e8
[   60.538108]  kunit_try_run_case+0x14c/0x3d0
[   60.542275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.547743]  kthread+0x24c/0x2d0
[   60.550955]  ret_from_fork+0x10/0x20
[   60.554514] 
[   60.555989] Allocated by task 302:
[   60.559375]  kasan_save_stack+0x3c/0x68
[   60.563194]  kasan_save_track+0x20/0x40
[   60.567013]  kasan_save_alloc_info+0x40/0x58
[   60.571267]  __kasan_kmalloc+0xd4/0xd8
[   60.575000]  __kmalloc_cache_noprof+0x144/0x328
[   60.579513]  kasan_atomics+0xb8/0x2e8
[   60.583159]  kunit_try_run_case+0x14c/0x3d0
[   60.587326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.592795]  kthread+0x24c/0x2d0
[   60.596006]  ret_from_fork+0x10/0x20
[   60.599565] 
[   60.601040] The buggy address belongs to the object at ffff000800ddd700
[   60.601040]  which belongs to the cache kmalloc-64 of size 64
[   60.613368] The buggy address is located 0 bytes to the right of
[   60.613368]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.626214] 
[   60.627690] The buggy address belongs to the physical page:
[   60.633246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.641233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.647741] page_type: f5(slab)
[   60.650873] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.658598] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.666318] page dumped because: kasan: bad access detected
[   60.671873] 
[   60.673349] Memory state around the buggy address:
[   60.678126]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.685331]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.692536] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.699737]                                      ^
[   60.704515]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.711720]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.718921] ==================================================================
[   62.584740] ==================================================================
[   62.591811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   62.599188] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.606479] 
[   62.607958] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.617074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.621236] Hardware name: WinLink E850-96 board (DT)
[   62.626271] Call trace:
[   62.628702]  dump_backtrace+0x9c/0x128
[   62.632434]  show_stack+0x20/0x38
[   62.635732]  dump_stack_lvl+0x8c/0xd0
[   62.639379]  print_report+0x118/0x5e0
[   62.643024]  kasan_report+0xc8/0x118
[   62.646583]  __asan_report_load8_noabort+0x20/0x30
[   62.651357]  kasan_atomics_helper+0x3f78/0x49c8
[   62.655871]  kasan_atomics+0x1a0/0x2e8
[   62.659604]  kunit_try_run_case+0x14c/0x3d0
[   62.663770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.669239]  kthread+0x24c/0x2d0
[   62.672451]  ret_from_fork+0x10/0x20
[   62.676010] 
[   62.677485] Allocated by task 302:
[   62.680871]  kasan_save_stack+0x3c/0x68
[   62.684690]  kasan_save_track+0x20/0x40
[   62.688510]  kasan_save_alloc_info+0x40/0x58
[   62.692763]  __kasan_kmalloc+0xd4/0xd8
[   62.696495]  __kmalloc_cache_noprof+0x144/0x328
[   62.701009]  kasan_atomics+0xb8/0x2e8
[   62.704655]  kunit_try_run_case+0x14c/0x3d0
[   62.708822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.714290]  kthread+0x24c/0x2d0
[   62.717502]  ret_from_fork+0x10/0x20
[   62.721061] 
[   62.722537] The buggy address belongs to the object at ffff000800ddd700
[   62.722537]  which belongs to the cache kmalloc-64 of size 64
[   62.734863] The buggy address is located 0 bytes to the right of
[   62.734863]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   62.747710] 
[   62.749186] The buggy address belongs to the physical page:
[   62.754742] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   62.762728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.769237] page_type: f5(slab)
[   62.772369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.780094] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   62.787814] page dumped because: kasan: bad access detected
[   62.793369] 
[   62.794844] Memory state around the buggy address:
[   62.799622]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.806827]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.814032] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.821233]                                      ^
[   62.826011]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.833215]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.840417] ==================================================================
[   54.352386] ==================================================================
[   54.359469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   54.366847] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.374138] 
[   54.375617] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.384733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.388894] Hardware name: WinLink E850-96 board (DT)
[   54.393930] Call trace:
[   54.396360]  dump_backtrace+0x9c/0x128
[   54.400092]  show_stack+0x20/0x38
[   54.403391]  dump_stack_lvl+0x8c/0xd0
[   54.407036]  print_report+0x118/0x5e0
[   54.410682]  kasan_report+0xc8/0x118
[   54.414242]  __asan_report_load4_noabort+0x20/0x30
[   54.419016]  kasan_atomics_helper+0x3f4c/0x49c8
[   54.423530]  kasan_atomics+0x1a0/0x2e8
[   54.427262]  kunit_try_run_case+0x14c/0x3d0
[   54.431428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.436897]  kthread+0x24c/0x2d0
[   54.440109]  ret_from_fork+0x10/0x20
[   54.443670] 
[   54.445144] Allocated by task 302:
[   54.448529]  kasan_save_stack+0x3c/0x68
[   54.452348]  kasan_save_track+0x20/0x40
[   54.456168]  kasan_save_alloc_info+0x40/0x58
[   54.460421]  __kasan_kmalloc+0xd4/0xd8
[   54.464154]  __kmalloc_cache_noprof+0x144/0x328
[   54.468667]  kasan_atomics+0xb8/0x2e8
[   54.472313]  kunit_try_run_case+0x14c/0x3d0
[   54.476480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.481949]  kthread+0x24c/0x2d0
[   54.485160]  ret_from_fork+0x10/0x20
[   54.488720] 
[   54.490195] The buggy address belongs to the object at ffff000800ddd700
[   54.490195]  which belongs to the cache kmalloc-64 of size 64
[   54.502522] The buggy address is located 0 bytes to the right of
[   54.502522]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   54.515368] 
[   54.516844] The buggy address belongs to the physical page:
[   54.522402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.530387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.536896] page_type: f5(slab)
[   54.540028] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.547752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.555472] page dumped because: kasan: bad access detected
[   54.561027] 
[   54.562503] Memory state around the buggy address:
[   54.567281]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.574485]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.581690] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.588891]                                      ^
[   54.593669]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.600874]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.608075] ==================================================================
[   49.035974] ==================================================================
[   49.043058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   49.050346] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.057725] 
[   49.059203] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.068319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.072481] Hardware name: WinLink E850-96 board (DT)
[   49.077516] Call trace:
[   49.079946]  dump_backtrace+0x9c/0x128
[   49.083679]  show_stack+0x20/0x38
[   49.086978]  dump_stack_lvl+0x8c/0xd0
[   49.090624]  print_report+0x118/0x5e0
[   49.094269]  kasan_report+0xc8/0x118
[   49.097828]  kasan_check_range+0x100/0x1a8
[   49.101908]  __kasan_check_write+0x20/0x30
[   49.105988]  kasan_atomics_helper+0x4a0/0x49c8
[   49.110415]  kasan_atomics+0x1a0/0x2e8
[   49.114147]  kunit_try_run_case+0x14c/0x3d0
[   49.118314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.123783]  kthread+0x24c/0x2d0
[   49.126994]  ret_from_fork+0x10/0x20
[   49.130554] 
[   49.132029] Allocated by task 302:
[   49.135414]  kasan_save_stack+0x3c/0x68
[   49.139234]  kasan_save_track+0x20/0x40
[   49.143053]  kasan_save_alloc_info+0x40/0x58
[   49.147306]  __kasan_kmalloc+0xd4/0xd8
[   49.151039]  __kmalloc_cache_noprof+0x144/0x328
[   49.155553]  kasan_atomics+0xb8/0x2e8
[   49.159199]  kunit_try_run_case+0x14c/0x3d0
[   49.163365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.168834]  kthread+0x24c/0x2d0
[   49.172046]  ret_from_fork+0x10/0x20
[   49.175605] 
[   49.177080] The buggy address belongs to the object at ffff000800ddd700
[   49.177080]  which belongs to the cache kmalloc-64 of size 64
[   49.189407] The buggy address is located 0 bytes to the right of
[   49.189407]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   49.202254] 
[   49.203730] The buggy address belongs to the physical page:
[   49.209285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   49.217273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.223781] page_type: f5(slab)
[   49.226913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.234637] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   49.242357] page dumped because: kasan: bad access detected
[   49.247913] 
[   49.249388] Memory state around the buggy address:
[   49.254166]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.261370]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.268576] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.275777]                                      ^
[   49.280555]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.287759]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.294961] ==================================================================
[   60.193252] ==================================================================
[   60.200354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   60.207731] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   60.215109] 
[   60.216588] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   60.225704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.229866] Hardware name: WinLink E850-96 board (DT)
[   60.234901] Call trace:
[   60.237331]  dump_backtrace+0x9c/0x128
[   60.241064]  show_stack+0x20/0x38
[   60.244362]  dump_stack_lvl+0x8c/0xd0
[   60.248008]  print_report+0x118/0x5e0
[   60.251654]  kasan_report+0xc8/0x118
[   60.255213]  kasan_check_range+0x100/0x1a8
[   60.259293]  __kasan_check_write+0x20/0x30
[   60.263372]  kasan_atomics_helper+0x14ac/0x49c8
[   60.267886]  kasan_atomics+0x1a0/0x2e8
[   60.271619]  kunit_try_run_case+0x14c/0x3d0
[   60.275785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.281254]  kthread+0x24c/0x2d0
[   60.284466]  ret_from_fork+0x10/0x20
[   60.288025] 
[   60.289500] Allocated by task 302:
[   60.292886]  kasan_save_stack+0x3c/0x68
[   60.296705]  kasan_save_track+0x20/0x40
[   60.300525]  kasan_save_alloc_info+0x40/0x58
[   60.304778]  __kasan_kmalloc+0xd4/0xd8
[   60.308511]  __kmalloc_cache_noprof+0x144/0x328
[   60.313024]  kasan_atomics+0xb8/0x2e8
[   60.316670]  kunit_try_run_case+0x14c/0x3d0
[   60.320837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.326305]  kthread+0x24c/0x2d0
[   60.329517]  ret_from_fork+0x10/0x20
[   60.333076] 
[   60.334552] The buggy address belongs to the object at ffff000800ddd700
[   60.334552]  which belongs to the cache kmalloc-64 of size 64
[   60.346878] The buggy address is located 0 bytes to the right of
[   60.346878]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.359725] 
[   60.361201] The buggy address belongs to the physical page:
[   60.366757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.374744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.381253] page_type: f5(slab)
[   60.384385] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.392109] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.399829] page dumped because: kasan: bad access detected
[   60.405384] 
[   60.406859] Memory state around the buggy address:
[   60.411638]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.418842]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.426047] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.433248]                                      ^
[   60.438026]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.445231]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.452432] ==================================================================
[   48.769664] ==================================================================
[   48.776742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   48.784031] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   48.791409] 
[   48.792888] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.802004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.806166] Hardware name: WinLink E850-96 board (DT)
[   48.811201] Call trace:
[   48.813631]  dump_backtrace+0x9c/0x128
[   48.817363]  show_stack+0x20/0x38
[   48.820662]  dump_stack_lvl+0x8c/0xd0
[   48.824308]  print_report+0x118/0x5e0
[   48.827954]  kasan_report+0xc8/0x118
[   48.831513]  kasan_check_range+0x100/0x1a8
[   48.835593]  __kasan_check_write+0x20/0x30
[   48.839673]  kasan_atomics_helper+0x434/0x49c8
[   48.844099]  kasan_atomics+0x1a0/0x2e8
[   48.847832]  kunit_try_run_case+0x14c/0x3d0
[   48.851999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.857467]  kthread+0x24c/0x2d0
[   48.860679]  ret_from_fork+0x10/0x20
[   48.864238] 
[   48.865713] Allocated by task 302:
[   48.869099]  kasan_save_stack+0x3c/0x68
[   48.872918]  kasan_save_track+0x20/0x40
[   48.876738]  kasan_save_alloc_info+0x40/0x58
[   48.880991]  __kasan_kmalloc+0xd4/0xd8
[   48.884724]  __kmalloc_cache_noprof+0x144/0x328
[   48.889238]  kasan_atomics+0xb8/0x2e8
[   48.892883]  kunit_try_run_case+0x14c/0x3d0
[   48.897050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.902519]  kthread+0x24c/0x2d0
[   48.905730]  ret_from_fork+0x10/0x20
[   48.909289] 
[   48.910765] The buggy address belongs to the object at ffff000800ddd700
[   48.910765]  which belongs to the cache kmalloc-64 of size 64
[   48.923092] The buggy address is located 0 bytes to the right of
[   48.923092]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.935938] 
[   48.937414] The buggy address belongs to the physical page:
[   48.942970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.950957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.957466] page_type: f5(slab)
[   48.960598] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.968322] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.976042] page dumped because: kasan: bad access detected
[   48.981597] 
[   48.983073] Memory state around the buggy address:
[   48.987850]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.995055]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.002260] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.009461]                                      ^
[   49.014239]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.021444]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.028645] ==================================================================
[   52.761093] ==================================================================
[   52.768174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   52.775464] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   52.782842] 
[   52.784321] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   52.793437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.797599] Hardware name: WinLink E850-96 board (DT)
[   52.802634] Call trace:
[   52.805064]  dump_backtrace+0x9c/0x128
[   52.808797]  show_stack+0x20/0x38
[   52.812095]  dump_stack_lvl+0x8c/0xd0
[   52.815741]  print_report+0x118/0x5e0
[   52.819387]  kasan_report+0xc8/0x118
[   52.822946]  kasan_check_range+0x100/0x1a8
[   52.827026]  __kasan_check_write+0x20/0x30
[   52.831105]  kasan_atomics_helper+0xabc/0x49c8
[   52.835533]  kasan_atomics+0x1a0/0x2e8
[   52.839265]  kunit_try_run_case+0x14c/0x3d0
[   52.843432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.848900]  kthread+0x24c/0x2d0
[   52.852112]  ret_from_fork+0x10/0x20
[   52.855672] 
[   52.857147] Allocated by task 302:
[   52.860532]  kasan_save_stack+0x3c/0x68
[   52.864352]  kasan_save_track+0x20/0x40
[   52.868171]  kasan_save_alloc_info+0x40/0x58
[   52.872424]  __kasan_kmalloc+0xd4/0xd8
[   52.876157]  __kmalloc_cache_noprof+0x144/0x328
[   52.880671]  kasan_atomics+0xb8/0x2e8
[   52.884316]  kunit_try_run_case+0x14c/0x3d0
[   52.888483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.893952]  kthread+0x24c/0x2d0
[   52.897164]  ret_from_fork+0x10/0x20
[   52.900723] 
[   52.902198] The buggy address belongs to the object at ffff000800ddd700
[   52.902198]  which belongs to the cache kmalloc-64 of size 64
[   52.914525] The buggy address is located 0 bytes to the right of
[   52.914525]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.927371] 
[   52.928847] The buggy address belongs to the physical page:
[   52.934403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.942390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.948899] page_type: f5(slab)
[   52.952031] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.959755] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.967475] page dumped because: kasan: bad access detected
[   52.973030] 
[   52.974506] Memory state around the buggy address:
[   52.979284]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.986489]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.993693] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.000894]                                      ^
[   53.005672]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.012877]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.020078] ==================================================================
[   59.397288] ==================================================================
[   59.404359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   59.411736] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.419114] 
[   59.420593] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.429709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.433871] Hardware name: WinLink E850-96 board (DT)
[   59.438906] Call trace:
[   59.441336]  dump_backtrace+0x9c/0x128
[   59.445069]  show_stack+0x20/0x38
[   59.448367]  dump_stack_lvl+0x8c/0xd0
[   59.452013]  print_report+0x118/0x5e0
[   59.455659]  kasan_report+0xc8/0x118
[   59.459218]  kasan_check_range+0x100/0x1a8
[   59.463298]  __kasan_check_write+0x20/0x30
[   59.467378]  kasan_atomics_helper+0x1370/0x49c8
[   59.471891]  kasan_atomics+0x1a0/0x2e8
[   59.475624]  kunit_try_run_case+0x14c/0x3d0
[   59.479790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.485259]  kthread+0x24c/0x2d0
[   59.488471]  ret_from_fork+0x10/0x20
[   59.492030] 
[   59.493505] Allocated by task 302:
[   59.496890]  kasan_save_stack+0x3c/0x68
[   59.500710]  kasan_save_track+0x20/0x40
[   59.504530]  kasan_save_alloc_info+0x40/0x58
[   59.508783]  __kasan_kmalloc+0xd4/0xd8
[   59.512515]  __kmalloc_cache_noprof+0x144/0x328
[   59.517029]  kasan_atomics+0xb8/0x2e8
[   59.520675]  kunit_try_run_case+0x14c/0x3d0
[   59.524842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.530310]  kthread+0x24c/0x2d0
[   59.533522]  ret_from_fork+0x10/0x20
[   59.537081] 
[   59.538557] The buggy address belongs to the object at ffff000800ddd700
[   59.538557]  which belongs to the cache kmalloc-64 of size 64
[   59.550884] The buggy address is located 0 bytes to the right of
[   59.550884]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.563730] 
[   59.565206] The buggy address belongs to the physical page:
[   59.570762] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.578749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.585257] page_type: f5(slab)
[   59.588389] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.596114] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.603834] page dumped because: kasan: bad access detected
[   59.609389] 
[   59.610864] Memory state around the buggy address:
[   59.615642]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.622847]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.630052] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.637253]                                      ^
[   59.642031]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.649235]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.656437] ==================================================================
[   54.615420] ==================================================================
[   54.622486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   54.629777] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.637155] 
[   54.638634] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.647750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.651911] Hardware name: WinLink E850-96 board (DT)
[   54.656947] Call trace:
[   54.659377]  dump_backtrace+0x9c/0x128
[   54.663109]  show_stack+0x20/0x38
[   54.666408]  dump_stack_lvl+0x8c/0xd0
[   54.670054]  print_report+0x118/0x5e0
[   54.673699]  kasan_report+0xc8/0x118
[   54.677258]  kasan_check_range+0x100/0x1a8
[   54.681338]  __kasan_check_write+0x20/0x30
[   54.685418]  kasan_atomics_helper+0xd00/0x49c8
[   54.689845]  kasan_atomics+0x1a0/0x2e8
[   54.693578]  kunit_try_run_case+0x14c/0x3d0
[   54.697744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.703213]  kthread+0x24c/0x2d0
[   54.706424]  ret_from_fork+0x10/0x20
[   54.709984] 
[   54.711459] Allocated by task 302:
[   54.714845]  kasan_save_stack+0x3c/0x68
[   54.718664]  kasan_save_track+0x20/0x40
[   54.722483]  kasan_save_alloc_info+0x40/0x58
[   54.726737]  __kasan_kmalloc+0xd4/0xd8
[   54.730469]  __kmalloc_cache_noprof+0x144/0x328
[   54.734983]  kasan_atomics+0xb8/0x2e8
[   54.738629]  kunit_try_run_case+0x14c/0x3d0
[   54.742796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.748264]  kthread+0x24c/0x2d0
[   54.751476]  ret_from_fork+0x10/0x20
[   54.755035] 
[   54.756510] The buggy address belongs to the object at ffff000800ddd700
[   54.756510]  which belongs to the cache kmalloc-64 of size 64
[   54.768837] The buggy address is located 0 bytes to the right of
[   54.768837]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   54.781684] 
[   54.783160] The buggy address belongs to the physical page:
[   54.788715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.796703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.803211] page_type: f5(slab)
[   54.806344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.814068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.821787] page dumped because: kasan: bad access detected
[   54.827343] 
[   54.828818] Memory state around the buggy address:
[   54.833596]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.840801]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.848005] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.855207]                                      ^
[   54.859984]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.867189]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.874391] ==================================================================
[   53.027421] ==================================================================
[   53.034489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   53.041780] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.049158] 
[   53.050636] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.059753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.063914] Hardware name: WinLink E850-96 board (DT)
[   53.068949] Call trace:
[   53.071381]  dump_backtrace+0x9c/0x128
[   53.075112]  show_stack+0x20/0x38
[   53.078411]  dump_stack_lvl+0x8c/0xd0
[   53.082057]  print_report+0x118/0x5e0
[   53.085703]  kasan_report+0xc8/0x118
[   53.089261]  kasan_check_range+0x100/0x1a8
[   53.093341]  __kasan_check_write+0x20/0x30
[   53.097421]  kasan_atomics_helper+0xb28/0x49c8
[   53.101848]  kasan_atomics+0x1a0/0x2e8
[   53.105581]  kunit_try_run_case+0x14c/0x3d0
[   53.109747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.115216]  kthread+0x24c/0x2d0
[   53.118428]  ret_from_fork+0x10/0x20
[   53.121987] 
[   53.123462] Allocated by task 302:
[   53.126848]  kasan_save_stack+0x3c/0x68
[   53.130667]  kasan_save_track+0x20/0x40
[   53.134487]  kasan_save_alloc_info+0x40/0x58
[   53.138739]  __kasan_kmalloc+0xd4/0xd8
[   53.142473]  __kmalloc_cache_noprof+0x144/0x328
[   53.146986]  kasan_atomics+0xb8/0x2e8
[   53.150632]  kunit_try_run_case+0x14c/0x3d0
[   53.154799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.160267]  kthread+0x24c/0x2d0
[   53.163479]  ret_from_fork+0x10/0x20
[   53.167038] 
[   53.168513] The buggy address belongs to the object at ffff000800ddd700
[   53.168513]  which belongs to the cache kmalloc-64 of size 64
[   53.180840] The buggy address is located 0 bytes to the right of
[   53.180840]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.193687] 
[   53.195163] The buggy address belongs to the physical page:
[   53.200718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   53.208706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.215214] page_type: f5(slab)
[   53.218346] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.226070] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.233790] page dumped because: kasan: bad access detected
[   53.239346] 
[   53.240821] Memory state around the buggy address:
[   53.245599]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.252804]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.260009] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.267210]                                      ^
[   53.271987]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.279192]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.286394] ==================================================================
[   46.649066] ==================================================================
[   46.656117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   46.663490] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   46.670868] 
[   46.672351] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.681467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.685626] Hardware name: WinLink E850-96 board (DT)
[   46.690662] Call trace:
[   46.693090]  dump_backtrace+0x9c/0x128
[   46.696823]  show_stack+0x20/0x38
[   46.700121]  dump_stack_lvl+0x8c/0xd0
[   46.703767]  print_report+0x118/0x5e0
[   46.707413]  kasan_report+0xc8/0x118
[   46.710972]  __asan_report_store4_noabort+0x20/0x30
[   46.715833]  kasan_atomics_helper+0x40e4/0x49c8
[   46.720346]  kasan_atomics+0x1a0/0x2e8
[   46.724079]  kunit_try_run_case+0x14c/0x3d0
[   46.728246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.733715]  kthread+0x24c/0x2d0
[   46.736926]  ret_from_fork+0x10/0x20
[   46.740488] 
[   46.741961] Allocated by task 302:
[   46.745348]  kasan_save_stack+0x3c/0x68
[   46.749165]  kasan_save_track+0x20/0x40
[   46.752985]  kasan_save_alloc_info+0x40/0x58
[   46.757239]  __kasan_kmalloc+0xd4/0xd8
[   46.760971]  __kmalloc_cache_noprof+0x144/0x328
[   46.765485]  kasan_atomics+0xb8/0x2e8
[   46.769131]  kunit_try_run_case+0x14c/0x3d0
[   46.773297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.778766]  kthread+0x24c/0x2d0
[   46.781977]  ret_from_fork+0x10/0x20
[   46.785536] 
[   46.787013] The buggy address belongs to the object at ffff000800ddd700
[   46.787013]  which belongs to the cache kmalloc-64 of size 64
[   46.799338] The buggy address is located 0 bytes to the right of
[   46.799338]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   46.812185] 
[   46.813661] The buggy address belongs to the physical page:
[   46.819217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   46.827204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.833714] page_type: f5(slab)
[   46.836846] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.844569] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   46.852289] page dumped because: kasan: bad access detected
[   46.857844] 
[   46.859320] Memory state around the buggy address:
[   46.864099]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.871302]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.878508] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.885709]                                      ^
[   46.890488]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.897692]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.904892] ==================================================================
[   50.900155] ==================================================================
[   50.907264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   50.914555] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.921933] 
[   50.923412] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.932528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.936689] Hardware name: WinLink E850-96 board (DT)
[   50.941724] Call trace:
[   50.944155]  dump_backtrace+0x9c/0x128
[   50.947887]  show_stack+0x20/0x38
[   50.951186]  dump_stack_lvl+0x8c/0xd0
[   50.954832]  print_report+0x118/0x5e0
[   50.958478]  kasan_report+0xc8/0x118
[   50.962036]  kasan_check_range+0x100/0x1a8
[   50.966116]  __kasan_check_write+0x20/0x30
[   50.970196]  kasan_atomics_helper+0x7a0/0x49c8
[   50.974623]  kasan_atomics+0x1a0/0x2e8
[   50.978356]  kunit_try_run_case+0x14c/0x3d0
[   50.982522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.987991]  kthread+0x24c/0x2d0
[   50.991203]  ret_from_fork+0x10/0x20
[   50.994762] 
[   50.996237] Allocated by task 302:
[   50.999623]  kasan_save_stack+0x3c/0x68
[   51.003442]  kasan_save_track+0x20/0x40
[   51.007262]  kasan_save_alloc_info+0x40/0x58
[   51.011515]  __kasan_kmalloc+0xd4/0xd8
[   51.015247]  __kmalloc_cache_noprof+0x144/0x328
[   51.019761]  kasan_atomics+0xb8/0x2e8
[   51.023407]  kunit_try_run_case+0x14c/0x3d0
[   51.027573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.033042]  kthread+0x24c/0x2d0
[   51.036254]  ret_from_fork+0x10/0x20
[   51.039813] 
[   51.041288] The buggy address belongs to the object at ffff000800ddd700
[   51.041288]  which belongs to the cache kmalloc-64 of size 64
[   51.053615] The buggy address is located 0 bytes to the right of
[   51.053615]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.066462] 
[   51.067938] The buggy address belongs to the physical page:
[   51.073493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.081481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.087989] page_type: f5(slab)
[   51.091121] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.098846] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.106565] page dumped because: kasan: bad access detected
[   51.112121] 
[   51.113596] Memory state around the buggy address:
[   51.118374]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.125579]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.132784] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.139985]                                      ^
[   51.144762]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.151967]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.159169] ==================================================================
[   51.432818] ==================================================================
[   51.439895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   51.447185] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.454564] 
[   51.456042] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.465158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.469320] Hardware name: WinLink E850-96 board (DT)
[   51.474355] Call trace:
[   51.476786]  dump_backtrace+0x9c/0x128
[   51.480518]  show_stack+0x20/0x38
[   51.483817]  dump_stack_lvl+0x8c/0xd0
[   51.487463]  print_report+0x118/0x5e0
[   51.491108]  kasan_report+0xc8/0x118
[   51.494667]  kasan_check_range+0x100/0x1a8
[   51.498747]  __kasan_check_write+0x20/0x30
[   51.502827]  kasan_atomics_helper+0x8d8/0x49c8
[   51.507254]  kasan_atomics+0x1a0/0x2e8
[   51.510987]  kunit_try_run_case+0x14c/0x3d0
[   51.515153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.520622]  kthread+0x24c/0x2d0
[   51.523834]  ret_from_fork+0x10/0x20
[   51.527393] 
[   51.528868] Allocated by task 302:
[   51.532253]  kasan_save_stack+0x3c/0x68
[   51.536073]  kasan_save_track+0x20/0x40
[   51.539892]  kasan_save_alloc_info+0x40/0x58
[   51.544145]  __kasan_kmalloc+0xd4/0xd8
[   51.547878]  __kmalloc_cache_noprof+0x144/0x328
[   51.552392]  kasan_atomics+0xb8/0x2e8
[   51.556038]  kunit_try_run_case+0x14c/0x3d0
[   51.560204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.565673]  kthread+0x24c/0x2d0
[   51.568884]  ret_from_fork+0x10/0x20
[   51.572444] 
[   51.573919] The buggy address belongs to the object at ffff000800ddd700
[   51.573919]  which belongs to the cache kmalloc-64 of size 64
[   51.586246] The buggy address is located 0 bytes to the right of
[   51.586246]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.599093] 
[   51.600569] The buggy address belongs to the physical page:
[   51.606124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.614112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.620620] page_type: f5(slab)
[   51.623752] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.631476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.639196] page dumped because: kasan: bad access detected
[   51.644752] 
[   51.646227] Memory state around the buggy address:
[   51.651005]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.658210]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.665414] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.672616]                                      ^
[   51.677393]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.684598]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.691800] ==================================================================
[   58.864296] ==================================================================
[   58.871381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   58.878758] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.886136] 
[   58.887615] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.896731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.900893] Hardware name: WinLink E850-96 board (DT)
[   58.905928] Call trace:
[   58.908358]  dump_backtrace+0x9c/0x128
[   58.912091]  show_stack+0x20/0x38
[   58.915389]  dump_stack_lvl+0x8c/0xd0
[   58.919035]  print_report+0x118/0x5e0
[   58.922681]  kasan_report+0xc8/0x118
[   58.926240]  kasan_check_range+0x100/0x1a8
[   58.930320]  __kasan_check_write+0x20/0x30
[   58.934399]  kasan_atomics_helper+0x1288/0x49c8
[   58.938913]  kasan_atomics+0x1a0/0x2e8
[   58.942645]  kunit_try_run_case+0x14c/0x3d0
[   58.946812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.952281]  kthread+0x24c/0x2d0
[   58.955493]  ret_from_fork+0x10/0x20
[   58.959052] 
[   58.960527] Allocated by task 302:
[   58.963913]  kasan_save_stack+0x3c/0x68
[   58.967732]  kasan_save_track+0x20/0x40
[   58.971552]  kasan_save_alloc_info+0x40/0x58
[   58.975805]  __kasan_kmalloc+0xd4/0xd8
[   58.979538]  __kmalloc_cache_noprof+0x144/0x328
[   58.984051]  kasan_atomics+0xb8/0x2e8
[   58.987697]  kunit_try_run_case+0x14c/0x3d0
[   58.991864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.997332]  kthread+0x24c/0x2d0
[   59.000544]  ret_from_fork+0x10/0x20
[   59.004103] 
[   59.005579] The buggy address belongs to the object at ffff000800ddd700
[   59.005579]  which belongs to the cache kmalloc-64 of size 64
[   59.017905] The buggy address is located 0 bytes to the right of
[   59.017905]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.030752] 
[   59.032228] The buggy address belongs to the physical page:
[   59.037784] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.045771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.052279] page_type: f5(slab)
[   59.055411] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.063136] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.070856] page dumped because: kasan: bad access detected
[   59.076411] 
[   59.077886] Memory state around the buggy address:
[   59.082664]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.089869]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.097074] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.104275]                                      ^
[   59.109053]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.116258]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.123459] ==================================================================
[   48.240184] ==================================================================
[   48.247235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   48.254612] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   48.261990] 
[   48.263470] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.272585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.276747] Hardware name: WinLink E850-96 board (DT)
[   48.281785] Call trace:
[   48.284212]  dump_backtrace+0x9c/0x128
[   48.287945]  show_stack+0x20/0x38
[   48.291243]  dump_stack_lvl+0x8c/0xd0
[   48.294889]  print_report+0x118/0x5e0
[   48.298535]  kasan_report+0xc8/0x118
[   48.302094]  __asan_report_store4_noabort+0x20/0x30
[   48.306955]  kasan_atomics_helper+0x40fc/0x49c8
[   48.311468]  kasan_atomics+0x1a0/0x2e8
[   48.315201]  kunit_try_run_case+0x14c/0x3d0
[   48.319368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.324836]  kthread+0x24c/0x2d0
[   48.328048]  ret_from_fork+0x10/0x20
[   48.331608] 
[   48.333083] Allocated by task 302:
[   48.336468]  kasan_save_stack+0x3c/0x68
[   48.340288]  kasan_save_track+0x20/0x40
[   48.344107]  kasan_save_alloc_info+0x40/0x58
[   48.348360]  __kasan_kmalloc+0xd4/0xd8
[   48.352093]  __kmalloc_cache_noprof+0x144/0x328
[   48.356607]  kasan_atomics+0xb8/0x2e8
[   48.360252]  kunit_try_run_case+0x14c/0x3d0
[   48.364419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.369888]  kthread+0x24c/0x2d0
[   48.373099]  ret_from_fork+0x10/0x20
[   48.376659] 
[   48.378134] The buggy address belongs to the object at ffff000800ddd700
[   48.378134]  which belongs to the cache kmalloc-64 of size 64
[   48.390461] The buggy address is located 0 bytes to the right of
[   48.390461]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.403307] 
[   48.404783] The buggy address belongs to the physical page:
[   48.410339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.418327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.424835] page_type: f5(slab)
[   48.427968] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.435691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.443411] page dumped because: kasan: bad access detected
[   48.448966] 
[   48.450442] Memory state around the buggy address:
[   48.455220]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.462424]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.469630] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.476830]                                      ^
[   48.481608]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.488813]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.496014] ==================================================================
[   51.699141] ==================================================================
[   51.706211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   51.713588] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.720879] 
[   51.722358] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.731474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.735635] Hardware name: WinLink E850-96 board (DT)
[   51.740671] Call trace:
[   51.743101]  dump_backtrace+0x9c/0x128
[   51.746834]  show_stack+0x20/0x38
[   51.750132]  dump_stack_lvl+0x8c/0xd0
[   51.753778]  print_report+0x118/0x5e0
[   51.757424]  kasan_report+0xc8/0x118
[   51.760983]  __asan_report_load4_noabort+0x20/0x30
[   51.765757]  kasan_atomics_helper+0x4440/0x49c8
[   51.770271]  kasan_atomics+0x1a0/0x2e8
[   51.774003]  kunit_try_run_case+0x14c/0x3d0
[   51.778170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.783639]  kthread+0x24c/0x2d0
[   51.786851]  ret_from_fork+0x10/0x20
[   51.790410] 
[   51.791885] Allocated by task 302:
[   51.795270]  kasan_save_stack+0x3c/0x68
[   51.799090]  kasan_save_track+0x20/0x40
[   51.802909]  kasan_save_alloc_info+0x40/0x58
[   51.807163]  __kasan_kmalloc+0xd4/0xd8
[   51.810895]  __kmalloc_cache_noprof+0x144/0x328
[   51.815409]  kasan_atomics+0xb8/0x2e8
[   51.819055]  kunit_try_run_case+0x14c/0x3d0
[   51.823221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.828690]  kthread+0x24c/0x2d0
[   51.831902]  ret_from_fork+0x10/0x20
[   51.835461] 
[   51.836936] The buggy address belongs to the object at ffff000800ddd700
[   51.836936]  which belongs to the cache kmalloc-64 of size 64
[   51.849263] The buggy address is located 0 bytes to the right of
[   51.849263]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.862110] 
[   51.863585] The buggy address belongs to the physical page:
[   51.869141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.877129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.883637] page_type: f5(slab)
[   51.886769] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.894493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.902213] page dumped because: kasan: bad access detected
[   51.907769] 
[   51.909244] Memory state around the buggy address:
[   51.914022]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.921227]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.928432] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.935633]                                      ^
[   51.940410]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.947615]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.954816] ==================================================================
[   55.411026] ==================================================================
[   55.418135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   55.425511] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.432802] 
[   55.434282] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.443397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.447559] Hardware name: WinLink E850-96 board (DT)
[   55.452594] Call trace:
[   55.455025]  dump_backtrace+0x9c/0x128
[   55.458757]  show_stack+0x20/0x38
[   55.462056]  dump_stack_lvl+0x8c/0xd0
[   55.465702]  print_report+0x118/0x5e0
[   55.469347]  kasan_report+0xc8/0x118
[   55.472906]  __asan_report_load4_noabort+0x20/0x30
[   55.477680]  kasan_atomics_helper+0x3f6c/0x49c8
[   55.482194]  kasan_atomics+0x1a0/0x2e8
[   55.485927]  kunit_try_run_case+0x14c/0x3d0
[   55.490093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.495562]  kthread+0x24c/0x2d0
[   55.498774]  ret_from_fork+0x10/0x20
[   55.502333] 
[   55.503808] Allocated by task 302:
[   55.507194]  kasan_save_stack+0x3c/0x68
[   55.511013]  kasan_save_track+0x20/0x40
[   55.514833]  kasan_save_alloc_info+0x40/0x58
[   55.519086]  __kasan_kmalloc+0xd4/0xd8
[   55.522819]  __kmalloc_cache_noprof+0x144/0x328
[   55.527332]  kasan_atomics+0xb8/0x2e8
[   55.530978]  kunit_try_run_case+0x14c/0x3d0
[   55.535145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.540613]  kthread+0x24c/0x2d0
[   55.543825]  ret_from_fork+0x10/0x20
[   55.547384] 
[   55.548860] The buggy address belongs to the object at ffff000800ddd700
[   55.548860]  which belongs to the cache kmalloc-64 of size 64
[   55.561186] The buggy address is located 0 bytes to the right of
[   55.561186]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.574033] 
[   55.575509] The buggy address belongs to the physical page:
[   55.581065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.589052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.595560] page_type: f5(slab)
[   55.598692] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.606417] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.614137] page dumped because: kasan: bad access detected
[   55.619692] 
[   55.621168] Memory state around the buggy address:
[   55.625946]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.633150]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.640355] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.647556]                                      ^
[   55.652334]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.659538]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.666740] ==================================================================
[   47.444650] ==================================================================
[   47.451762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   47.459051] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.466342] 
[   47.467824] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   47.476939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.481100] Hardware name: WinLink E850-96 board (DT)
[   47.486137] Call trace:
[   47.488564]  dump_backtrace+0x9c/0x128
[   47.492297]  show_stack+0x20/0x38
[   47.495595]  dump_stack_lvl+0x8c/0xd0
[   47.499241]  print_report+0x118/0x5e0
[   47.502887]  kasan_report+0xc8/0x118
[   47.506447]  kasan_check_range+0x100/0x1a8
[   47.510526]  __kasan_check_read+0x20/0x30
[   47.514519]  kasan_atomics_helper+0x2c4/0x49c8
[   47.518946]  kasan_atomics+0x1a0/0x2e8
[   47.522678]  kunit_try_run_case+0x14c/0x3d0
[   47.526845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.532314]  kthread+0x24c/0x2d0
[   47.535525]  ret_from_fork+0x10/0x20
[   47.539085] 
[   47.540560] Allocated by task 302:
[   47.543947]  kasan_save_stack+0x3c/0x68
[   47.547765]  kasan_save_track+0x20/0x40
[   47.551584]  kasan_save_alloc_info+0x40/0x58
[   47.555838]  __kasan_kmalloc+0xd4/0xd8
[   47.559570]  __kmalloc_cache_noprof+0x144/0x328
[   47.564084]  kasan_atomics+0xb8/0x2e8
[   47.567730]  kunit_try_run_case+0x14c/0x3d0
[   47.571898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.577365]  kthread+0x24c/0x2d0
[   47.580577]  ret_from_fork+0x10/0x20
[   47.584136] 
[   47.585611] The buggy address belongs to the object at ffff000800ddd700
[   47.585611]  which belongs to the cache kmalloc-64 of size 64
[   47.597940] The buggy address is located 0 bytes to the right of
[   47.597940]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.610784] 
[   47.612260] The buggy address belongs to the physical page:
[   47.617819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.625805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.632312] page_type: f5(slab)
[   47.635446] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.643169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.650888] page dumped because: kasan: bad access detected
[   47.656443] 
[   47.657919] Memory state around the buggy address:
[   47.662698]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.669902]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.677107] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.684307]                                      ^
[   47.689085]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.696290]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.703491] ==================================================================

test log snippet test parser 33

Home

[   46.912190] ==================================================================
[   46.919310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   46.926594] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   46.933885] 
[   46.935367] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.944482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.948643] Hardware name: WinLink E850-96 board (DT)
[   46.953680] Call trace:
[   46.956107]  dump_backtrace+0x9c/0x128
[   46.959841]  show_stack+0x20/0x38
[   46.963138]  dump_stack_lvl+0x8c/0xd0
[   46.966784]  print_report+0x118/0x5e0
[   46.970430]  kasan_report+0xc8/0x118
[   46.973988]  kasan_check_range+0x100/0x1a8
[   46.978069]  __kasan_check_read+0x20/0x30
[   46.982061]  kasan_atomics_helper+0x1f8/0x49c8
[   46.986488]  kasan_atomics+0x1a0/0x2e8
[   46.990221]  kunit_try_run_case+0x14c/0x3d0
[   46.994387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.999856]  kthread+0x24c/0x2d0
[   47.003068]  ret_from_fork+0x10/0x20
[   47.006629] 
[   47.008103] Allocated by task 302:
[   47.011489]  kasan_save_stack+0x3c/0x68
[   47.015307]  kasan_save_track+0x20/0x40
[   47.019127]  kasan_save_alloc_info+0x40/0x58
[   47.023380]  __kasan_kmalloc+0xd4/0xd8
[   47.027114]  __kmalloc_cache_noprof+0x144/0x328
[   47.031627]  kasan_atomics+0xb8/0x2e8
[   47.035273]  kunit_try_run_case+0x14c/0x3d0
[   47.039439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.044908]  kthread+0x24c/0x2d0
[   47.048119]  ret_from_fork+0x10/0x20
[   47.051679] 
[   47.053155] The buggy address belongs to the object at ffff000800ddd700
[   47.053155]  which belongs to the cache kmalloc-64 of size 64
[   47.065482] The buggy address is located 0 bytes to the right of
[   47.065482]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.078327] 
[   47.079805] The buggy address belongs to the physical page:
[   47.085362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.093346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.099856] page_type: f5(slab)
[   47.102992] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.110711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.118431] page dumped because: kasan: bad access detected
[   47.123986] 
[   47.125462] Memory state around the buggy address:
[   47.130241]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.137444]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.144650] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.151850]                                      ^
[   47.156628]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.163833]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.171034] ==================================================================
---
[   47.444650] ==================================================================
[   47.451762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   47.459051] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.466342] 
[   47.467824] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   47.476939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.481100] Hardware name: WinLink E850-96 board (DT)
[   47.486137] Call trace:
[   47.488564]  dump_backtrace+0x9c/0x128
[   47.492297]  show_stack+0x20/0x38
[   47.495595]  dump_stack_lvl+0x8c/0xd0
[   47.499241]  print_report+0x118/0x5e0
[   47.502887]  kasan_report+0xc8/0x118
[   47.506447]  kasan_check_range+0x100/0x1a8
[   47.510526]  __kasan_check_read+0x20/0x30
[   47.514519]  kasan_atomics_helper+0x2c4/0x49c8
[   47.518946]  kasan_atomics+0x1a0/0x2e8
[   47.522678]  kunit_try_run_case+0x14c/0x3d0
[   47.526845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.532314]  kthread+0x24c/0x2d0
[   47.535525]  ret_from_fork+0x10/0x20
[   47.539085] 
[   47.540560] Allocated by task 302:
[   47.543947]  kasan_save_stack+0x3c/0x68
[   47.547765]  kasan_save_track+0x20/0x40
[   47.551584]  kasan_save_alloc_info+0x40/0x58
[   47.555838]  __kasan_kmalloc+0xd4/0xd8
[   47.559570]  __kmalloc_cache_noprof+0x144/0x328
[   47.564084]  kasan_atomics+0xb8/0x2e8
[   47.567730]  kunit_try_run_case+0x14c/0x3d0
[   47.571898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.577365]  kthread+0x24c/0x2d0
[   47.580577]  ret_from_fork+0x10/0x20
[   47.584136] 
[   47.585611] The buggy address belongs to the object at ffff000800ddd700
[   47.585611]  which belongs to the cache kmalloc-64 of size 64
[   47.597940] The buggy address is located 0 bytes to the right of
[   47.597940]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.610784] 
[   47.612260] The buggy address belongs to the physical page:
[   47.617819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.625805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.632312] page_type: f5(slab)
[   47.635446] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.643169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.650888] page dumped because: kasan: bad access detected
[   47.656443] 
[   47.657919] Memory state around the buggy address:
[   47.662698]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.669902]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.677107] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.684307]                                      ^
[   47.689085]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.696290]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.703491] ==================================================================
---
[   55.674084] ==================================================================
[   55.681151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   55.688441] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.695733] 
[   55.697211] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.706327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.710489] Hardware name: WinLink E850-96 board (DT)
[   55.715524] Call trace:
[   55.717955]  dump_backtrace+0x9c/0x128
[   55.721687]  show_stack+0x20/0x38
[   55.724986]  dump_stack_lvl+0x8c/0xd0
[   55.728632]  print_report+0x118/0x5e0
[   55.732278]  kasan_report+0xc8/0x118
[   55.735836]  kasan_check_range+0x100/0x1a8
[   55.739916]  __kasan_check_read+0x20/0x30
[   55.743909]  kasan_atomics_helper+0xe3c/0x49c8
[   55.748336]  kasan_atomics+0x1a0/0x2e8
[   55.752069]  kunit_try_run_case+0x14c/0x3d0
[   55.756235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.761704]  kthread+0x24c/0x2d0
[   55.764916]  ret_from_fork+0x10/0x20
[   55.768475] 
[   55.769950] Allocated by task 302:
[   55.773336]  kasan_save_stack+0x3c/0x68
[   55.777155]  kasan_save_track+0x20/0x40
[   55.780974]  kasan_save_alloc_info+0x40/0x58
[   55.785228]  __kasan_kmalloc+0xd4/0xd8
[   55.788960]  __kmalloc_cache_noprof+0x144/0x328
[   55.793474]  kasan_atomics+0xb8/0x2e8
[   55.797120]  kunit_try_run_case+0x14c/0x3d0
[   55.801286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.806755]  kthread+0x24c/0x2d0
[   55.809967]  ret_from_fork+0x10/0x20
[   55.813526] 
[   55.815002] The buggy address belongs to the object at ffff000800ddd700
[   55.815002]  which belongs to the cache kmalloc-64 of size 64
[   55.827328] The buggy address is located 0 bytes to the right of
[   55.827328]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.840175] 
[   55.841651] The buggy address belongs to the physical page:
[   55.847207] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.855192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.861702] page_type: f5(slab)
[   55.864834] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.872559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.880278] page dumped because: kasan: bad access detected
[   55.885834] 
[   55.887309] Memory state around the buggy address:
[   55.892087]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.899292]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.906497] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.913698]                                      ^
[   55.918476]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.925680]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.932882] ==================================================================

test log snippet test parser 34

Home

[   55.144751] ==================================================================
[   55.151820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   55.159109] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.166487] 
[   55.167966] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.177082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.181244] Hardware name: WinLink E850-96 board (DT)
[   55.186279] Call trace:
[   55.188709]  dump_backtrace+0x9c/0x128
[   55.192442]  show_stack+0x20/0x38
[   55.195740]  dump_stack_lvl+0x8c/0xd0
[   55.199386]  print_report+0x118/0x5e0
[   55.203032]  kasan_report+0xc8/0x118
[   55.206591]  kasan_check_range+0x100/0x1a8
[   55.210670]  __kasan_check_write+0x20/0x30
[   55.214750]  kasan_atomics_helper+0xda0/0x49c8
[   55.219177]  kasan_atomics+0x1a0/0x2e8
[   55.222910]  kunit_try_run_case+0x14c/0x3d0
[   55.227077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.232545]  kthread+0x24c/0x2d0
[   55.235757]  ret_from_fork+0x10/0x20
[   55.239317] 
[   55.240792] Allocated by task 302:
[   55.244177]  kasan_save_stack+0x3c/0x68
[   55.247996]  kasan_save_track+0x20/0x40
[   55.251816]  kasan_save_alloc_info+0x40/0x58
[   55.256069]  __kasan_kmalloc+0xd4/0xd8
[   55.259802]  __kmalloc_cache_noprof+0x144/0x328
[   55.264315]  kasan_atomics+0xb8/0x2e8
[   55.267961]  kunit_try_run_case+0x14c/0x3d0
[   55.272128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.277597]  kthread+0x24c/0x2d0
[   55.280808]  ret_from_fork+0x10/0x20
[   55.284367] 
[   55.285843] The buggy address belongs to the object at ffff000800ddd700
[   55.285843]  which belongs to the cache kmalloc-64 of size 64
[   55.298169] The buggy address is located 0 bytes to the right of
[   55.298169]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.311016] 
[   55.312492] The buggy address belongs to the physical page:
[   55.318048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.326035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.332544] page_type: f5(slab)
[   55.335676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.343400] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.351119] page dumped because: kasan: bad access detected
[   55.356675] 
[   55.358150] Memory state around the buggy address:
[   55.362929]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.370133]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.377338] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.384539]                                      ^
[   55.389317]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.396521]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.403723] ==================================================================
---
[   59.663765] ==================================================================
[   59.670848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   59.678225] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.685603] 
[   59.687082] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.696198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.700360] Hardware name: WinLink E850-96 board (DT)
[   59.705395] Call trace:
[   59.707825]  dump_backtrace+0x9c/0x128
[   59.711558]  show_stack+0x20/0x38
[   59.714856]  dump_stack_lvl+0x8c/0xd0
[   59.718502]  print_report+0x118/0x5e0
[   59.722148]  kasan_report+0xc8/0x118
[   59.725707]  kasan_check_range+0x100/0x1a8
[   59.729787]  __kasan_check_write+0x20/0x30
[   59.733866]  kasan_atomics_helper+0x141c/0x49c8
[   59.738380]  kasan_atomics+0x1a0/0x2e8
[   59.742113]  kunit_try_run_case+0x14c/0x3d0
[   59.746279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.751748]  kthread+0x24c/0x2d0
[   59.754960]  ret_from_fork+0x10/0x20
[   59.758519] 
[   59.759994] Allocated by task 302:
[   59.763380]  kasan_save_stack+0x3c/0x68
[   59.767199]  kasan_save_track+0x20/0x40
[   59.771019]  kasan_save_alloc_info+0x40/0x58
[   59.775272]  __kasan_kmalloc+0xd4/0xd8
[   59.779005]  __kmalloc_cache_noprof+0x144/0x328
[   59.783519]  kasan_atomics+0xb8/0x2e8
[   59.787164]  kunit_try_run_case+0x14c/0x3d0
[   59.791331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.796799]  kthread+0x24c/0x2d0
[   59.800011]  ret_from_fork+0x10/0x20
[   59.803570] 
[   59.805045] The buggy address belongs to the object at ffff000800ddd700
[   59.805045]  which belongs to the cache kmalloc-64 of size 64
[   59.817373] The buggy address is located 0 bytes to the right of
[   59.817373]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.830219] 
[   59.831695] The buggy address belongs to the physical page:
[   59.837251] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.845238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.851747] page_type: f5(slab)
[   59.854879] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.862603] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.870323] page dumped because: kasan: bad access detected
[   59.875878] 
[   59.877354] Memory state around the buggy address:
[   59.882131]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.889336]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.896541] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.903742]                                      ^
[   59.908520]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.915725]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.922926] ==================================================================
---
[   48.503367] ==================================================================
[   48.510425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   48.517716] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   48.525094] 
[   48.526573] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.535689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.539850] Hardware name: WinLink E850-96 board (DT)
[   48.544885] Call trace:
[   48.547316]  dump_backtrace+0x9c/0x128
[   48.551048]  show_stack+0x20/0x38
[   48.554347]  dump_stack_lvl+0x8c/0xd0
[   48.557993]  print_report+0x118/0x5e0
[   48.561638]  kasan_report+0xc8/0x118
[   48.565197]  kasan_check_range+0x100/0x1a8
[   48.569277]  __kasan_check_write+0x20/0x30
[   48.573357]  kasan_atomics_helper+0x3c8/0x49c8
[   48.577784]  kasan_atomics+0x1a0/0x2e8
[   48.581516]  kunit_try_run_case+0x14c/0x3d0
[   48.585683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.591152]  kthread+0x24c/0x2d0
[   48.594364]  ret_from_fork+0x10/0x20
[   48.597923] 
[   48.599398] Allocated by task 302:
[   48.602783]  kasan_save_stack+0x3c/0x68
[   48.606603]  kasan_save_track+0x20/0x40
[   48.610422]  kasan_save_alloc_info+0x40/0x58
[   48.614676]  __kasan_kmalloc+0xd4/0xd8
[   48.618408]  __kmalloc_cache_noprof+0x144/0x328
[   48.622922]  kasan_atomics+0xb8/0x2e8
[   48.626568]  kunit_try_run_case+0x14c/0x3d0
[   48.630734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.636203]  kthread+0x24c/0x2d0
[   48.639415]  ret_from_fork+0x10/0x20
[   48.642974] 
[   48.644449] The buggy address belongs to the object at ffff000800ddd700
[   48.644449]  which belongs to the cache kmalloc-64 of size 64
[   48.656776] The buggy address is located 0 bytes to the right of
[   48.656776]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.669623] 
[   48.671098] The buggy address belongs to the physical page:
[   48.676655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.684642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.691150] page_type: f5(slab)
[   48.694282] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.702007] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.709727] page dumped because: kasan: bad access detected
[   48.715282] 
[   48.716757] Memory state around the buggy address:
[   48.721535]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.728740]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.735945] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.743146]                                      ^
[   48.747924]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.755128]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.762330] ==================================================================
---
[   49.302263] ==================================================================
[   49.309371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   49.316662] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.324040] 
[   49.325519] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.334635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.338797] Hardware name: WinLink E850-96 board (DT)
[   49.343831] Call trace:
[   49.346262]  dump_backtrace+0x9c/0x128
[   49.349995]  show_stack+0x20/0x38
[   49.353293]  dump_stack_lvl+0x8c/0xd0
[   49.356939]  print_report+0x118/0x5e0
[   49.360585]  kasan_report+0xc8/0x118
[   49.364144]  kasan_check_range+0x100/0x1a8
[   49.368223]  __kasan_check_write+0x20/0x30
[   49.372303]  kasan_atomics_helper+0x50c/0x49c8
[   49.376730]  kasan_atomics+0x1a0/0x2e8
[   49.380463]  kunit_try_run_case+0x14c/0x3d0
[   49.384630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.390098]  kthread+0x24c/0x2d0
[   49.393310]  ret_from_fork+0x10/0x20
[   49.396869] 
[   49.398344] Allocated by task 302:
[   49.401730]  kasan_save_stack+0x3c/0x68
[   49.405549]  kasan_save_track+0x20/0x40
[   49.409369]  kasan_save_alloc_info+0x40/0x58
[   49.413622]  __kasan_kmalloc+0xd4/0xd8
[   49.417355]  __kmalloc_cache_noprof+0x144/0x328
[   49.421869]  kasan_atomics+0xb8/0x2e8
[   49.425514]  kunit_try_run_case+0x14c/0x3d0
[   49.429681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.435150]  kthread+0x24c/0x2d0
[   49.438361]  ret_from_fork+0x10/0x20
[   49.441920] 
[   49.443395] The buggy address belongs to the object at ffff000800ddd700
[   49.443395]  which belongs to the cache kmalloc-64 of size 64
[   49.455722] The buggy address is located 0 bytes to the right of
[   49.455722]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   49.468569] 
[   49.470045] The buggy address belongs to the physical page:
[   49.475601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   49.483588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.490097] page_type: f5(slab)
[   49.493229] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.500953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   49.508673] page dumped because: kasan: bad access detected
[   49.514228] 
[   49.515703] Memory state around the buggy address:
[   49.520482]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.527686]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.534891] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.542092]                                      ^
[   49.546870]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.554075]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.561276] ==================================================================
---
[   52.494776] ==================================================================
[   52.501858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   52.509149] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   52.516527] 
[   52.518006] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   52.527121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.531283] Hardware name: WinLink E850-96 board (DT)
[   52.536319] Call trace:
[   52.538749]  dump_backtrace+0x9c/0x128
[   52.542482]  show_stack+0x20/0x38
[   52.545780]  dump_stack_lvl+0x8c/0xd0
[   52.549426]  print_report+0x118/0x5e0
[   52.553072]  kasan_report+0xc8/0x118
[   52.556630]  kasan_check_range+0x100/0x1a8
[   52.560710]  __kasan_check_write+0x20/0x30
[   52.564790]  kasan_atomics_helper+0xa50/0x49c8
[   52.569217]  kasan_atomics+0x1a0/0x2e8
[   52.572950]  kunit_try_run_case+0x14c/0x3d0
[   52.577116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.582585]  kthread+0x24c/0x2d0
[   52.585797]  ret_from_fork+0x10/0x20
[   52.589356] 
[   52.590831] Allocated by task 302:
[   52.594217]  kasan_save_stack+0x3c/0x68
[   52.598036]  kasan_save_track+0x20/0x40
[   52.601856]  kasan_save_alloc_info+0x40/0x58
[   52.606109]  __kasan_kmalloc+0xd4/0xd8
[   52.609842]  __kmalloc_cache_noprof+0x144/0x328
[   52.614355]  kasan_atomics+0xb8/0x2e8
[   52.618001]  kunit_try_run_case+0x14c/0x3d0
[   52.622168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.627636]  kthread+0x24c/0x2d0
[   52.630848]  ret_from_fork+0x10/0x20
[   52.634407] 
[   52.635883] The buggy address belongs to the object at ffff000800ddd700
[   52.635883]  which belongs to the cache kmalloc-64 of size 64
[   52.648209] The buggy address is located 0 bytes to the right of
[   52.648209]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.661056] 
[   52.662532] The buggy address belongs to the physical page:
[   52.668088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.676075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.682583] page_type: f5(slab)
[   52.685715] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.693440] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.701160] page dumped because: kasan: bad access detected
[   52.706715] 
[   52.708191] Memory state around the buggy address:
[   52.712968]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.720173]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.727378] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.734579]                                      ^
[   52.739357]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.746561]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.753763] ==================================================================
---
[   54.086090] ==================================================================
[   54.093154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   54.100444] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.107822] 
[   54.109301] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.118417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.122579] Hardware name: WinLink E850-96 board (DT)
[   54.127614] Call trace:
[   54.130044]  dump_backtrace+0x9c/0x128
[   54.133777]  show_stack+0x20/0x38
[   54.137076]  dump_stack_lvl+0x8c/0xd0
[   54.140721]  print_report+0x118/0x5e0
[   54.144367]  kasan_report+0xc8/0x118
[   54.147926]  kasan_check_range+0x100/0x1a8
[   54.152006]  __kasan_check_write+0x20/0x30
[   54.156086]  kasan_atomics_helper+0xc64/0x49c8
[   54.160513]  kasan_atomics+0x1a0/0x2e8
[   54.164245]  kunit_try_run_case+0x14c/0x3d0
[   54.168412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.173881]  kthread+0x24c/0x2d0
[   54.177092]  ret_from_fork+0x10/0x20
[   54.180652] 
[   54.182127] Allocated by task 302:
[   54.185512]  kasan_save_stack+0x3c/0x68
[   54.189331]  kasan_save_track+0x20/0x40
[   54.193151]  kasan_save_alloc_info+0x40/0x58
[   54.197404]  __kasan_kmalloc+0xd4/0xd8
[   54.201137]  __kmalloc_cache_noprof+0x144/0x328
[   54.205651]  kasan_atomics+0xb8/0x2e8
[   54.209297]  kunit_try_run_case+0x14c/0x3d0
[   54.213463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.218932]  kthread+0x24c/0x2d0
[   54.222144]  ret_from_fork+0x10/0x20
[   54.225702] 
[   54.227178] The buggy address belongs to the object at ffff000800ddd700
[   54.227178]  which belongs to the cache kmalloc-64 of size 64
[   54.239505] The buggy address is located 0 bytes to the right of
[   54.239505]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   54.252351] 
[   54.253827] The buggy address belongs to the physical page:
[   54.259383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.267370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.273879] page_type: f5(slab)
[   54.277011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.284735] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.292455] page dumped because: kasan: bad access detected
[   54.298011] 
[   54.299486] Memory state around the buggy address:
[   54.304264]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.311468]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.318673] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.325874]                                      ^
[   54.330652]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.337857]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.345058] ==================================================================
---
[   62.847747] ==================================================================
[   62.854828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   62.862205] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.869583] 
[   62.871062] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.880178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.884340] Hardware name: WinLink E850-96 board (DT)
[   62.889375] Call trace:
[   62.891805]  dump_backtrace+0x9c/0x128
[   62.895538]  show_stack+0x20/0x38
[   62.898836]  dump_stack_lvl+0x8c/0xd0
[   62.902482]  print_report+0x118/0x5e0
[   62.906128]  kasan_report+0xc8/0x118
[   62.909686]  kasan_check_range+0x100/0x1a8
[   62.913767]  __kasan_check_write+0x20/0x30
[   62.917846]  kasan_atomics_helper+0x1810/0x49c8
[   62.922360]  kasan_atomics+0x1a0/0x2e8
[   62.926093]  kunit_try_run_case+0x14c/0x3d0
[   62.930259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.935728]  kthread+0x24c/0x2d0
[   62.938940]  ret_from_fork+0x10/0x20
[   62.942499] 
[   62.943974] Allocated by task 302:
[   62.947360]  kasan_save_stack+0x3c/0x68
[   62.951179]  kasan_save_track+0x20/0x40
[   62.954998]  kasan_save_alloc_info+0x40/0x58
[   62.959252]  __kasan_kmalloc+0xd4/0xd8
[   62.962985]  __kmalloc_cache_noprof+0x144/0x328
[   62.967499]  kasan_atomics+0xb8/0x2e8
[   62.971144]  kunit_try_run_case+0x14c/0x3d0
[   62.975311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.980779]  kthread+0x24c/0x2d0
[   62.983991]  ret_from_fork+0x10/0x20
[   62.987550] 
[   62.989026] The buggy address belongs to the object at ffff000800ddd700
[   62.989026]  which belongs to the cache kmalloc-64 of size 64
[   63.001352] The buggy address is located 0 bytes to the right of
[   63.001352]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   63.014199] 
[   63.015675] The buggy address belongs to the physical page:
[   63.021231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   63.029218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.035726] page_type: f5(slab)
[   63.038858] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.046583] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   63.054303] page dumped because: kasan: bad access detected
[   63.059858] 
[   63.061333] Memory state around the buggy address:
[   63.066112]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.073316]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.080521] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.087722]                                      ^
[   63.092500]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.099705]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.106906] ==================================================================
---
[   60.992751] ==================================================================
[   60.999824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   61.007198] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.014576] 
[   61.016056] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.025171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.029333] Hardware name: WinLink E850-96 board (DT)
[   61.034368] Call trace:
[   61.036798]  dump_backtrace+0x9c/0x128
[   61.040531]  show_stack+0x20/0x38
[   61.043830]  dump_stack_lvl+0x8c/0xd0
[   61.047475]  print_report+0x118/0x5e0
[   61.051121]  kasan_report+0xc8/0x118
[   61.054680]  kasan_check_range+0x100/0x1a8
[   61.058760]  __kasan_check_write+0x20/0x30
[   61.062839]  kasan_atomics_helper+0x15f0/0x49c8
[   61.067353]  kasan_atomics+0x1a0/0x2e8
[   61.071086]  kunit_try_run_case+0x14c/0x3d0
[   61.075252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.080721]  kthread+0x24c/0x2d0
[   61.083933]  ret_from_fork+0x10/0x20
[   61.087492] 
[   61.088968] Allocated by task 302:
[   61.092353]  kasan_save_stack+0x3c/0x68
[   61.096172]  kasan_save_track+0x20/0x40
[   61.099992]  kasan_save_alloc_info+0x40/0x58
[   61.104245]  __kasan_kmalloc+0xd4/0xd8
[   61.107978]  __kmalloc_cache_noprof+0x144/0x328
[   61.112492]  kasan_atomics+0xb8/0x2e8
[   61.116137]  kunit_try_run_case+0x14c/0x3d0
[   61.120304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.125773]  kthread+0x24c/0x2d0
[   61.128984]  ret_from_fork+0x10/0x20
[   61.132543] 
[   61.134019] The buggy address belongs to the object at ffff000800ddd700
[   61.134019]  which belongs to the cache kmalloc-64 of size 64
[   61.146346] The buggy address is located 0 bytes to the right of
[   61.146346]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.159192] 
[   61.160668] The buggy address belongs to the physical page:
[   61.166224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.174212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.180720] page_type: f5(slab)
[   61.183851] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.191576] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.199296] page dumped because: kasan: bad access detected
[   61.204851] 
[   61.206327] Memory state around the buggy address:
[   61.211105]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.218309]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.225514] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.232715]                                      ^
[   61.237493]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.244698]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.251899] ==================================================================
---
[   47.973805] ==================================================================
[   47.980923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   47.988209] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.995588] 
[   47.997069] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.006183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.010344] Hardware name: WinLink E850-96 board (DT)
[   48.015382] Call trace:
[   48.017810]  dump_backtrace+0x9c/0x128
[   48.021543]  show_stack+0x20/0x38
[   48.024841]  dump_stack_lvl+0x8c/0xd0
[   48.028487]  print_report+0x118/0x5e0
[   48.032133]  kasan_report+0xc8/0x118
[   48.035691]  kasan_check_range+0x100/0x1a8
[   48.039771]  __kasan_check_write+0x20/0x30
[   48.043851]  kasan_atomics_helper+0x344/0x49c8
[   48.048278]  kasan_atomics+0x1a0/0x2e8
[   48.052011]  kunit_try_run_case+0x14c/0x3d0
[   48.056177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.061646]  kthread+0x24c/0x2d0
[   48.064858]  ret_from_fork+0x10/0x20
[   48.068419] 
[   48.069892] Allocated by task 302:
[   48.073278]  kasan_save_stack+0x3c/0x68
[   48.077097]  kasan_save_track+0x20/0x40
[   48.080917]  kasan_save_alloc_info+0x40/0x58
[   48.085170]  __kasan_kmalloc+0xd4/0xd8
[   48.088902]  __kmalloc_cache_noprof+0x144/0x328
[   48.093416]  kasan_atomics+0xb8/0x2e8
[   48.097062]  kunit_try_run_case+0x14c/0x3d0
[   48.101228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.106697]  kthread+0x24c/0x2d0
[   48.109909]  ret_from_fork+0x10/0x20
[   48.113468] 
[   48.114944] The buggy address belongs to the object at ffff000800ddd700
[   48.114944]  which belongs to the cache kmalloc-64 of size 64
[   48.127273] The buggy address is located 0 bytes to the right of
[   48.127273]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.140117] 
[   48.141593] The buggy address belongs to the physical page:
[   48.147150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.155137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.161644] page_type: f5(slab)
[   48.164778] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.172501] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.180221] page dumped because: kasan: bad access detected
[   48.185776] 
[   48.187251] Memory state around the buggy address:
[   48.192031]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.199234]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.206439] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.213640]                                      ^
[   48.218418]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.225622]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.232824] ==================================================================
---
[   59.130792] ==================================================================
[   59.137870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   59.145247] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.152625] 
[   59.154104] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.163220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.167382] Hardware name: WinLink E850-96 board (DT)
[   59.172417] Call trace:
[   59.174847]  dump_backtrace+0x9c/0x128
[   59.178580]  show_stack+0x20/0x38
[   59.181878]  dump_stack_lvl+0x8c/0xd0
[   59.185524]  print_report+0x118/0x5e0
[   59.189170]  kasan_report+0xc8/0x118
[   59.192729]  kasan_check_range+0x100/0x1a8
[   59.196809]  __kasan_check_write+0x20/0x30
[   59.200888]  kasan_atomics_helper+0x1300/0x49c8
[   59.205402]  kasan_atomics+0x1a0/0x2e8
[   59.209135]  kunit_try_run_case+0x14c/0x3d0
[   59.213301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.218770]  kthread+0x24c/0x2d0
[   59.221982]  ret_from_fork+0x10/0x20
[   59.225541] 
[   59.227016] Allocated by task 302:
[   59.230402]  kasan_save_stack+0x3c/0x68
[   59.234221]  kasan_save_track+0x20/0x40
[   59.238041]  kasan_save_alloc_info+0x40/0x58
[   59.242294]  __kasan_kmalloc+0xd4/0xd8
[   59.246026]  __kmalloc_cache_noprof+0x144/0x328
[   59.250540]  kasan_atomics+0xb8/0x2e8
[   59.254186]  kunit_try_run_case+0x14c/0x3d0
[   59.258353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.263822]  kthread+0x24c/0x2d0
[   59.267033]  ret_from_fork+0x10/0x20
[   59.270592] 
[   59.272068] The buggy address belongs to the object at ffff000800ddd700
[   59.272068]  which belongs to the cache kmalloc-64 of size 64
[   59.284394] The buggy address is located 0 bytes to the right of
[   59.284394]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.297241] 
[   59.298717] The buggy address belongs to the physical page:
[   59.304273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.312258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.318769] page_type: f5(slab)
[   59.321901] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.329625] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.337344] page dumped because: kasan: bad access detected
[   59.342900] 
[   59.344376] Memory state around the buggy address:
[   59.349153]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.356358]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.363563] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.370764]                                      ^
[   59.375542]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.382746]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.389948] ==================================================================
---
[   50.101248] ==================================================================
[   50.108318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   50.115609] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.122986] 
[   50.124465] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.133581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.137743] Hardware name: WinLink E850-96 board (DT)
[   50.142778] Call trace:
[   50.145209]  dump_backtrace+0x9c/0x128
[   50.148941]  show_stack+0x20/0x38
[   50.152239]  dump_stack_lvl+0x8c/0xd0
[   50.155885]  print_report+0x118/0x5e0
[   50.159531]  kasan_report+0xc8/0x118
[   50.163090]  kasan_check_range+0x100/0x1a8
[   50.167170]  __kasan_check_write+0x20/0x30
[   50.171250]  kasan_atomics_helper+0x650/0x49c8
[   50.175677]  kasan_atomics+0x1a0/0x2e8
[   50.179409]  kunit_try_run_case+0x14c/0x3d0
[   50.183576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.189044]  kthread+0x24c/0x2d0
[   50.192256]  ret_from_fork+0x10/0x20
[   50.195815] 
[   50.197291] Allocated by task 302:
[   50.200676]  kasan_save_stack+0x3c/0x68
[   50.204496]  kasan_save_track+0x20/0x40
[   50.208315]  kasan_save_alloc_info+0x40/0x58
[   50.212568]  __kasan_kmalloc+0xd4/0xd8
[   50.216301]  __kmalloc_cache_noprof+0x144/0x328
[   50.220815]  kasan_atomics+0xb8/0x2e8
[   50.224461]  kunit_try_run_case+0x14c/0x3d0
[   50.228627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.234096]  kthread+0x24c/0x2d0
[   50.237308]  ret_from_fork+0x10/0x20
[   50.240867] 
[   50.242342] The buggy address belongs to the object at ffff000800ddd700
[   50.242342]  which belongs to the cache kmalloc-64 of size 64
[   50.254669] The buggy address is located 0 bytes to the right of
[   50.254669]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.267515] 
[   50.268991] The buggy address belongs to the physical page:
[   50.274547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.282535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.289043] page_type: f5(slab)
[   50.292177] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.299899] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.307619] page dumped because: kasan: bad access detected
[   50.313174] 
[   50.314650] Memory state around the buggy address:
[   50.319428]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.326633]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.333837] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.341039]                                      ^
[   50.345816]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.353021]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.360222] ==================================================================
---
[   61.259229] ==================================================================
[   61.266310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   61.273687] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.281065] 
[   61.282544] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.291660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.295822] Hardware name: WinLink E850-96 board (DT)
[   61.300857] Call trace:
[   61.303287]  dump_backtrace+0x9c/0x128
[   61.307020]  show_stack+0x20/0x38
[   61.310319]  dump_stack_lvl+0x8c/0xd0
[   61.313965]  print_report+0x118/0x5e0
[   61.317610]  kasan_report+0xc8/0x118
[   61.321169]  kasan_check_range+0x100/0x1a8
[   61.325249]  __kasan_check_write+0x20/0x30
[   61.329329]  kasan_atomics_helper+0x165c/0x49c8
[   61.333842]  kasan_atomics+0x1a0/0x2e8
[   61.337575]  kunit_try_run_case+0x14c/0x3d0
[   61.341742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.347210]  kthread+0x24c/0x2d0
[   61.350422]  ret_from_fork+0x10/0x20
[   61.353982] 
[   61.355456] Allocated by task 302:
[   61.358842]  kasan_save_stack+0x3c/0x68
[   61.362662]  kasan_save_track+0x20/0x40
[   61.366481]  kasan_save_alloc_info+0x40/0x58
[   61.370734]  __kasan_kmalloc+0xd4/0xd8
[   61.374467]  __kmalloc_cache_noprof+0x144/0x328
[   61.378981]  kasan_atomics+0xb8/0x2e8
[   61.382626]  kunit_try_run_case+0x14c/0x3d0
[   61.386793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.392262]  kthread+0x24c/0x2d0
[   61.395473]  ret_from_fork+0x10/0x20
[   61.399032] 
[   61.400508] The buggy address belongs to the object at ffff000800ddd700
[   61.400508]  which belongs to the cache kmalloc-64 of size 64
[   61.412835] The buggy address is located 0 bytes to the right of
[   61.412835]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.425681] 
[   61.427157] The buggy address belongs to the physical page:
[   61.432713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.440700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.447209] page_type: f5(slab)
[   61.450341] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.458065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.465785] page dumped because: kasan: bad access detected
[   61.471340] 
[   61.472816] Memory state around the buggy address:
[   61.477594]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.484798]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.492003] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.499205]                                      ^
[   61.503982]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.511186]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.518388] ==================================================================
---
[   49.568620] ==================================================================
[   49.575687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   49.582977] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.590356] 
[   49.591834] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.600950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.605112] Hardware name: WinLink E850-96 board (DT)
[   49.610147] Call trace:
[   49.612578]  dump_backtrace+0x9c/0x128
[   49.616310]  show_stack+0x20/0x38
[   49.619609]  dump_stack_lvl+0x8c/0xd0
[   49.623254]  print_report+0x118/0x5e0
[   49.626900]  kasan_report+0xc8/0x118
[   49.630459]  kasan_check_range+0x100/0x1a8
[   49.634539]  __kasan_check_write+0x20/0x30
[   49.638619]  kasan_atomics_helper+0x578/0x49c8
[   49.643046]  kasan_atomics+0x1a0/0x2e8
[   49.646778]  kunit_try_run_case+0x14c/0x3d0
[   49.650945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.656414]  kthread+0x24c/0x2d0
[   49.659625]  ret_from_fork+0x10/0x20
[   49.663185] 
[   49.664660] Allocated by task 302:
[   49.668045]  kasan_save_stack+0x3c/0x68
[   49.671864]  kasan_save_track+0x20/0x40
[   49.675684]  kasan_save_alloc_info+0x40/0x58
[   49.679938]  __kasan_kmalloc+0xd4/0xd8
[   49.683670]  __kmalloc_cache_noprof+0x144/0x328
[   49.688184]  kasan_atomics+0xb8/0x2e8
[   49.691830]  kunit_try_run_case+0x14c/0x3d0
[   49.695996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.701465]  kthread+0x24c/0x2d0
[   49.704677]  ret_from_fork+0x10/0x20
[   49.708236] 
[   49.709711] The buggy address belongs to the object at ffff000800ddd700
[   49.709711]  which belongs to the cache kmalloc-64 of size 64
[   49.722038] The buggy address is located 0 bytes to the right of
[   49.722038]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   49.734885] 
[   49.736360] The buggy address belongs to the physical page:
[   49.741916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   49.749904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.756412] page_type: f5(slab)
[   49.759544] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.767268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   49.774988] page dumped because: kasan: bad access detected
[   49.780544] 
[   49.782019] Memory state around the buggy address:
[   49.786797]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.794002]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.801206] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.808408]                                      ^
[   49.813185]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.820390]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.827592] ==================================================================
---
[   62.318244] ==================================================================
[   62.325323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   62.332699] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.340077] 
[   62.341556] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.350672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.354834] Hardware name: WinLink E850-96 board (DT)
[   62.359870] Call trace:
[   62.362299]  dump_backtrace+0x9c/0x128
[   62.366032]  show_stack+0x20/0x38
[   62.369330]  dump_stack_lvl+0x8c/0xd0
[   62.372976]  print_report+0x118/0x5e0
[   62.376622]  kasan_report+0xc8/0x118
[   62.380181]  kasan_check_range+0x100/0x1a8
[   62.384261]  __kasan_check_write+0x20/0x30
[   62.388340]  kasan_atomics_helper+0x1780/0x49c8
[   62.392854]  kasan_atomics+0x1a0/0x2e8
[   62.396587]  kunit_try_run_case+0x14c/0x3d0
[   62.400753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.406222]  kthread+0x24c/0x2d0
[   62.409434]  ret_from_fork+0x10/0x20
[   62.412993] 
[   62.414469] Allocated by task 302:
[   62.417854]  kasan_save_stack+0x3c/0x68
[   62.421673]  kasan_save_track+0x20/0x40
[   62.425493]  kasan_save_alloc_info+0x40/0x58
[   62.429746]  __kasan_kmalloc+0xd4/0xd8
[   62.433479]  __kmalloc_cache_noprof+0x144/0x328
[   62.437993]  kasan_atomics+0xb8/0x2e8
[   62.441638]  kunit_try_run_case+0x14c/0x3d0
[   62.445805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.451273]  kthread+0x24c/0x2d0
[   62.454485]  ret_from_fork+0x10/0x20
[   62.458044] 
[   62.459520] The buggy address belongs to the object at ffff000800ddd700
[   62.459520]  which belongs to the cache kmalloc-64 of size 64
[   62.471847] The buggy address is located 0 bytes to the right of
[   62.471847]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   62.484693] 
[   62.486169] The buggy address belongs to the physical page:
[   62.491725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   62.499712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.506221] page_type: f5(slab)
[   62.509352] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.517077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   62.524797] page dumped because: kasan: bad access detected
[   62.530352] 
[   62.531828] Memory state around the buggy address:
[   62.536606]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.543810]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.551015] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.558216]                                      ^
[   62.562994]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.570199]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.577400] ==================================================================
---
[   58.331332] ==================================================================
[   58.338403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   58.345780] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.353158] 
[   58.354637] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.363753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.367914] Hardware name: WinLink E850-96 board (DT)
[   58.372950] Call trace:
[   58.375380]  dump_backtrace+0x9c/0x128
[   58.379113]  show_stack+0x20/0x38
[   58.382411]  dump_stack_lvl+0x8c/0xd0
[   58.386057]  print_report+0x118/0x5e0
[   58.389703]  kasan_report+0xc8/0x118
[   58.393262]  kasan_check_range+0x100/0x1a8
[   58.397341]  __kasan_check_write+0x20/0x30
[   58.401421]  kasan_atomics_helper+0x11b0/0x49c8
[   58.405935]  kasan_atomics+0x1a0/0x2e8
[   58.409667]  kunit_try_run_case+0x14c/0x3d0
[   58.413834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.419303]  kthread+0x24c/0x2d0
[   58.422515]  ret_from_fork+0x10/0x20
[   58.426074] 
[   58.427549] Allocated by task 302:
[   58.430935]  kasan_save_stack+0x3c/0x68
[   58.434754]  kasan_save_track+0x20/0x40
[   58.438573]  kasan_save_alloc_info+0x40/0x58
[   58.442827]  __kasan_kmalloc+0xd4/0xd8
[   58.446559]  __kmalloc_cache_noprof+0x144/0x328
[   58.451073]  kasan_atomics+0xb8/0x2e8
[   58.454719]  kunit_try_run_case+0x14c/0x3d0
[   58.458886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.464354]  kthread+0x24c/0x2d0
[   58.467566]  ret_from_fork+0x10/0x20
[   58.471125] 
[   58.472600] The buggy address belongs to the object at ffff000800ddd700
[   58.472600]  which belongs to the cache kmalloc-64 of size 64
[   58.484927] The buggy address is located 0 bytes to the right of
[   58.484927]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   58.497774] 
[   58.499250] The buggy address belongs to the physical page:
[   58.504806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   58.512793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.519301] page_type: f5(slab)
[   58.522433] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.530158] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.537877] page dumped because: kasan: bad access detected
[   58.543433] 
[   58.544908] Memory state around the buggy address:
[   58.549686]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.556891]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.564096] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.571297]                                      ^
[   58.576075]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.583279]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.590481] ==================================================================
---
[   60.726255] ==================================================================
[   60.733333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   60.740709] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   60.748087] 
[   60.749566] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   60.758682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.762844] Hardware name: WinLink E850-96 board (DT)
[   60.767879] Call trace:
[   60.770309]  dump_backtrace+0x9c/0x128
[   60.774042]  show_stack+0x20/0x38
[   60.777341]  dump_stack_lvl+0x8c/0xd0
[   60.780986]  print_report+0x118/0x5e0
[   60.784632]  kasan_report+0xc8/0x118
[   60.788191]  kasan_check_range+0x100/0x1a8
[   60.792271]  __kasan_check_write+0x20/0x30
[   60.796351]  kasan_atomics_helper+0x1584/0x49c8
[   60.800864]  kasan_atomics+0x1a0/0x2e8
[   60.804597]  kunit_try_run_case+0x14c/0x3d0
[   60.808764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.814232]  kthread+0x24c/0x2d0
[   60.817444]  ret_from_fork+0x10/0x20
[   60.821003] 
[   60.822478] Allocated by task 302:
[   60.825864]  kasan_save_stack+0x3c/0x68
[   60.829683]  kasan_save_track+0x20/0x40
[   60.833503]  kasan_save_alloc_info+0x40/0x58
[   60.837756]  __kasan_kmalloc+0xd4/0xd8
[   60.841489]  __kmalloc_cache_noprof+0x144/0x328
[   60.846002]  kasan_atomics+0xb8/0x2e8
[   60.849648]  kunit_try_run_case+0x14c/0x3d0
[   60.853815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.859283]  kthread+0x24c/0x2d0
[   60.862495]  ret_from_fork+0x10/0x20
[   60.866055] 
[   60.867530] The buggy address belongs to the object at ffff000800ddd700
[   60.867530]  which belongs to the cache kmalloc-64 of size 64
[   60.879857] The buggy address is located 0 bytes to the right of
[   60.879857]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.892703] 
[   60.894179] The buggy address belongs to the physical page:
[   60.899735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.907720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.914231] page_type: f5(slab)
[   60.917363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.925087] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.932807] page dumped because: kasan: bad access detected
[   60.938362] 
[   60.939838] Memory state around the buggy address:
[   60.944616]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.951820]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.959025] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.966226]                                      ^
[   60.971004]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.978209]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.985410] ==================================================================
---
[   51.166510] ==================================================================
[   51.173579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   51.180870] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.188248] 
[   51.189727] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.198843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.203005] Hardware name: WinLink E850-96 board (DT)
[   51.208040] Call trace:
[   51.210470]  dump_backtrace+0x9c/0x128
[   51.214203]  show_stack+0x20/0x38
[   51.217501]  dump_stack_lvl+0x8c/0xd0
[   51.221147]  print_report+0x118/0x5e0
[   51.224793]  kasan_report+0xc8/0x118
[   51.228352]  kasan_check_range+0x100/0x1a8
[   51.232432]  __kasan_check_write+0x20/0x30
[   51.236511]  kasan_atomics_helper+0x810/0x49c8
[   51.240939]  kasan_atomics+0x1a0/0x2e8
[   51.244671]  kunit_try_run_case+0x14c/0x3d0
[   51.248838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.254306]  kthread+0x24c/0x2d0
[   51.257518]  ret_from_fork+0x10/0x20
[   51.261077] 
[   51.262552] Allocated by task 302:
[   51.265938]  kasan_save_stack+0x3c/0x68
[   51.269757]  kasan_save_track+0x20/0x40
[   51.273577]  kasan_save_alloc_info+0x40/0x58
[   51.277830]  __kasan_kmalloc+0xd4/0xd8
[   51.281563]  __kmalloc_cache_noprof+0x144/0x328
[   51.286076]  kasan_atomics+0xb8/0x2e8
[   51.289722]  kunit_try_run_case+0x14c/0x3d0
[   51.293889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.299358]  kthread+0x24c/0x2d0
[   51.302569]  ret_from_fork+0x10/0x20
[   51.306128] 
[   51.307604] The buggy address belongs to the object at ffff000800ddd700
[   51.307604]  which belongs to the cache kmalloc-64 of size 64
[   51.319931] The buggy address is located 0 bytes to the right of
[   51.319931]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.332777] 
[   51.334253] The buggy address belongs to the physical page:
[   51.339809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.347796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.354305] page_type: f5(slab)
[   51.357437] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.365161] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.372881] page dumped because: kasan: bad access detected
[   51.378436] 
[   51.379912] Memory state around the buggy address:
[   51.384690]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.391894]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.399099] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.406300]                                      ^
[   51.411078]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.418283]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.425484] ==================================================================
---
[   56.999022] ==================================================================
[   57.006131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   57.013421] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.020799] 
[   57.022278] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.031395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.035556] Hardware name: WinLink E850-96 board (DT)
[   57.040591] Call trace:
[   57.043022]  dump_backtrace+0x9c/0x128
[   57.046754]  show_stack+0x20/0x38
[   57.050053]  dump_stack_lvl+0x8c/0xd0
[   57.053698]  print_report+0x118/0x5e0
[   57.057344]  kasan_report+0xc8/0x118
[   57.060903]  kasan_check_range+0x100/0x1a8
[   57.064983]  __kasan_check_write+0x20/0x30
[   57.069063]  kasan_atomics_helper+0xf94/0x49c8
[   57.073490]  kasan_atomics+0x1a0/0x2e8
[   57.077222]  kunit_try_run_case+0x14c/0x3d0
[   57.081389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.086857]  kthread+0x24c/0x2d0
[   57.090069]  ret_from_fork+0x10/0x20
[   57.093629] 
[   57.095104] Allocated by task 302:
[   57.098489]  kasan_save_stack+0x3c/0x68
[   57.102309]  kasan_save_track+0x20/0x40
[   57.106128]  kasan_save_alloc_info+0x40/0x58
[   57.110382]  __kasan_kmalloc+0xd4/0xd8
[   57.114114]  __kmalloc_cache_noprof+0x144/0x328
[   57.118628]  kasan_atomics+0xb8/0x2e8
[   57.122273]  kunit_try_run_case+0x14c/0x3d0
[   57.126440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.131909]  kthread+0x24c/0x2d0
[   57.135120]  ret_from_fork+0x10/0x20
[   57.138680] 
[   57.140155] The buggy address belongs to the object at ffff000800ddd700
[   57.140155]  which belongs to the cache kmalloc-64 of size 64
[   57.152482] The buggy address is located 0 bytes to the right of
[   57.152482]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.165328] 
[   57.166805] The buggy address belongs to the physical page:
[   57.172361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.180347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.186856] page_type: f5(slab)
[   57.189988] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.197712] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   57.205432] page dumped because: kasan: bad access detected
[   57.210987] 
[   57.212463] Memory state around the buggy address:
[   57.217241]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.224446]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.231650] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.238852]                                      ^
[   57.243629]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.250834]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.258036] ==================================================================
---
[   51.962145] ==================================================================
[   51.969227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   51.976518] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.983896] 
[   51.985375] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.994491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.998652] Hardware name: WinLink E850-96 board (DT)
[   52.003687] Call trace:
[   52.006118]  dump_backtrace+0x9c/0x128
[   52.009851]  show_stack+0x20/0x38
[   52.013149]  dump_stack_lvl+0x8c/0xd0
[   52.016795]  print_report+0x118/0x5e0
[   52.020441]  kasan_report+0xc8/0x118
[   52.024000]  kasan_check_range+0x100/0x1a8
[   52.028079]  __kasan_check_write+0x20/0x30
[   52.032159]  kasan_atomics_helper+0x978/0x49c8
[   52.036586]  kasan_atomics+0x1a0/0x2e8
[   52.040319]  kunit_try_run_case+0x14c/0x3d0
[   52.044485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.049954]  kthread+0x24c/0x2d0
[   52.053166]  ret_from_fork+0x10/0x20
[   52.056725] 
[   52.058200] Allocated by task 302:
[   52.061586]  kasan_save_stack+0x3c/0x68
[   52.065405]  kasan_save_track+0x20/0x40
[   52.069225]  kasan_save_alloc_info+0x40/0x58
[   52.073478]  __kasan_kmalloc+0xd4/0xd8
[   52.077211]  __kmalloc_cache_noprof+0x144/0x328
[   52.081724]  kasan_atomics+0xb8/0x2e8
[   52.085370]  kunit_try_run_case+0x14c/0x3d0
[   52.089536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.095005]  kthread+0x24c/0x2d0
[   52.098217]  ret_from_fork+0x10/0x20
[   52.101776] 
[   52.103252] The buggy address belongs to the object at ffff000800ddd700
[   52.103252]  which belongs to the cache kmalloc-64 of size 64
[   52.115578] The buggy address is located 0 bytes to the right of
[   52.115578]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.128425] 
[   52.129901] The buggy address belongs to the physical page:
[   52.135457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.143444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.149953] page_type: f5(slab)
[   52.153084] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.160809] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.168529] page dumped because: kasan: bad access detected
[   52.174084] 
[   52.175560] Memory state around the buggy address:
[   52.180338]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.187542]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.194747] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.201948]                                      ^
[   52.206726]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.213930]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.221132] ==================================================================
---
[   58.064833] ==================================================================
[   58.071914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   58.079291] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.086669] 
[   58.088147] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.097264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.101425] Hardware name: WinLink E850-96 board (DT)
[   58.106460] Call trace:
[   58.108891]  dump_backtrace+0x9c/0x128
[   58.112624]  show_stack+0x20/0x38
[   58.115922]  dump_stack_lvl+0x8c/0xd0
[   58.119568]  print_report+0x118/0x5e0
[   58.123214]  kasan_report+0xc8/0x118
[   58.126773]  kasan_check_range+0x100/0x1a8
[   58.130852]  __kasan_check_write+0x20/0x30
[   58.134932]  kasan_atomics_helper+0x1144/0x49c8
[   58.139446]  kasan_atomics+0x1a0/0x2e8
[   58.143179]  kunit_try_run_case+0x14c/0x3d0
[   58.147345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.152814]  kthread+0x24c/0x2d0
[   58.156025]  ret_from_fork+0x10/0x20
[   58.159585] 
[   58.161060] Allocated by task 302:
[   58.164446]  kasan_save_stack+0x3c/0x68
[   58.168265]  kasan_save_track+0x20/0x40
[   58.172084]  kasan_save_alloc_info+0x40/0x58
[   58.176338]  __kasan_kmalloc+0xd4/0xd8
[   58.180070]  __kmalloc_cache_noprof+0x144/0x328
[   58.184584]  kasan_atomics+0xb8/0x2e8
[   58.188230]  kunit_try_run_case+0x14c/0x3d0
[   58.192396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.197865]  kthread+0x24c/0x2d0
[   58.201077]  ret_from_fork+0x10/0x20
[   58.204636] 
[   58.206111] The buggy address belongs to the object at ffff000800ddd700
[   58.206111]  which belongs to the cache kmalloc-64 of size 64
[   58.218438] The buggy address is located 0 bytes to the right of
[   58.218438]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   58.231285] 
[   58.232761] The buggy address belongs to the physical page:
[   58.238317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   58.246303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.252812] page_type: f5(slab)
[   58.255944] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.263669] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.271388] page dumped because: kasan: bad access detected
[   58.276944] 
[   58.278419] Memory state around the buggy address:
[   58.283197]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.290402]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.297606] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.304808]                                      ^
[   58.309585]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.316790]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.323992] ==================================================================
---
[   52.228437] ==================================================================
[   52.235543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   52.242833] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   52.250211] 
[   52.251690] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   52.260806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.264968] Hardware name: WinLink E850-96 board (DT)
[   52.270003] Call trace:
[   52.272434]  dump_backtrace+0x9c/0x128
[   52.276166]  show_stack+0x20/0x38
[   52.279465]  dump_stack_lvl+0x8c/0xd0
[   52.283110]  print_report+0x118/0x5e0
[   52.286756]  kasan_report+0xc8/0x118
[   52.290315]  kasan_check_range+0x100/0x1a8
[   52.294395]  __kasan_check_write+0x20/0x30
[   52.298474]  kasan_atomics_helper+0x9e4/0x49c8
[   52.302902]  kasan_atomics+0x1a0/0x2e8
[   52.306634]  kunit_try_run_case+0x14c/0x3d0
[   52.310801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.316269]  kthread+0x24c/0x2d0
[   52.319481]  ret_from_fork+0x10/0x20
[   52.323041] 
[   52.324516] Allocated by task 302:
[   52.327901]  kasan_save_stack+0x3c/0x68
[   52.331721]  kasan_save_track+0x20/0x40
[   52.335540]  kasan_save_alloc_info+0x40/0x58
[   52.339793]  __kasan_kmalloc+0xd4/0xd8
[   52.343526]  __kmalloc_cache_noprof+0x144/0x328
[   52.348040]  kasan_atomics+0xb8/0x2e8
[   52.351686]  kunit_try_run_case+0x14c/0x3d0
[   52.355852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.361321]  kthread+0x24c/0x2d0
[   52.364533]  ret_from_fork+0x10/0x20
[   52.368092] 
[   52.369567] The buggy address belongs to the object at ffff000800ddd700
[   52.369567]  which belongs to the cache kmalloc-64 of size 64
[   52.381894] The buggy address is located 0 bytes to the right of
[   52.381894]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.394740] 
[   52.396216] The buggy address belongs to the physical page:
[   52.401772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.409759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.416268] page_type: f5(slab)
[   52.419400] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.427124] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.434844] page dumped because: kasan: bad access detected
[   52.440399] 
[   52.441875] Memory state around the buggy address:
[   52.446653]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.453858]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.461062] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.468264]                                      ^
[   52.473041]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.480246]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.487447] ==================================================================
---
[   57.265361] ==================================================================
[   57.272446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   57.279824] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.287202] 
[   57.288680] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.297797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.301958] Hardware name: WinLink E850-96 board (DT)
[   57.306993] Call trace:
[   57.309424]  dump_backtrace+0x9c/0x128
[   57.313156]  show_stack+0x20/0x38
[   57.316455]  dump_stack_lvl+0x8c/0xd0
[   57.320101]  print_report+0x118/0x5e0
[   57.323747]  kasan_report+0xc8/0x118
[   57.327306]  kasan_check_range+0x100/0x1a8
[   57.331385]  __kasan_check_write+0x20/0x30
[   57.335465]  kasan_atomics_helper+0x1000/0x49c8
[   57.339979]  kasan_atomics+0x1a0/0x2e8
[   57.343711]  kunit_try_run_case+0x14c/0x3d0
[   57.347878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.353347]  kthread+0x24c/0x2d0
[   57.356558]  ret_from_fork+0x10/0x20
[   57.360118] 
[   57.361593] Allocated by task 302:
[   57.364979]  kasan_save_stack+0x3c/0x68
[   57.368798]  kasan_save_track+0x20/0x40
[   57.372617]  kasan_save_alloc_info+0x40/0x58
[   57.376871]  __kasan_kmalloc+0xd4/0xd8
[   57.380603]  __kmalloc_cache_noprof+0x144/0x328
[   57.385117]  kasan_atomics+0xb8/0x2e8
[   57.388763]  kunit_try_run_case+0x14c/0x3d0
[   57.392929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.398398]  kthread+0x24c/0x2d0
[   57.401609]  ret_from_fork+0x10/0x20
[   57.405169] 
[   57.406644] The buggy address belongs to the object at ffff000800ddd700
[   57.406644]  which belongs to the cache kmalloc-64 of size 64
[   57.418971] The buggy address is located 0 bytes to the right of
[   57.418971]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.431818] 
[   57.433293] The buggy address belongs to the physical page:
[   57.438850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.446837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.453345] page_type: f5(slab)
[   57.456477] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.464202] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   57.471921] page dumped because: kasan: bad access detected
[   57.477477] 
[   57.478952] Memory state around the buggy address:
[   57.483730]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.490935]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.498139] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.505341]                                      ^
[   57.510119]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.517323]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.524525] ==================================================================
---
[   56.732747] ==================================================================
[   56.739815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   56.747106] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   56.754484] 
[   56.755963] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   56.765079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.769241] Hardware name: WinLink E850-96 board (DT)
[   56.774276] Call trace:
[   56.776706]  dump_backtrace+0x9c/0x128
[   56.780439]  show_stack+0x20/0x38
[   56.783737]  dump_stack_lvl+0x8c/0xd0
[   56.787383]  print_report+0x118/0x5e0
[   56.791029]  kasan_report+0xc8/0x118
[   56.794588]  kasan_check_range+0x100/0x1a8
[   56.798667]  __kasan_check_write+0x20/0x30
[   56.802747]  kasan_atomics_helper+0xf28/0x49c8
[   56.807174]  kasan_atomics+0x1a0/0x2e8
[   56.810907]  kunit_try_run_case+0x14c/0x3d0
[   56.815074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.820542]  kthread+0x24c/0x2d0
[   56.823754]  ret_from_fork+0x10/0x20
[   56.827313] 
[   56.828789] Allocated by task 302:
[   56.832174]  kasan_save_stack+0x3c/0x68
[   56.835993]  kasan_save_track+0x20/0x40
[   56.839813]  kasan_save_alloc_info+0x40/0x58
[   56.844066]  __kasan_kmalloc+0xd4/0xd8
[   56.847799]  __kmalloc_cache_noprof+0x144/0x328
[   56.852313]  kasan_atomics+0xb8/0x2e8
[   56.855958]  kunit_try_run_case+0x14c/0x3d0
[   56.860125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.865593]  kthread+0x24c/0x2d0
[   56.868805]  ret_from_fork+0x10/0x20
[   56.872364] 
[   56.873840] The buggy address belongs to the object at ffff000800ddd700
[   56.873840]  which belongs to the cache kmalloc-64 of size 64
[   56.886166] The buggy address is located 0 bytes to the right of
[   56.886166]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.899013] 
[   56.900489] The buggy address belongs to the physical page:
[   56.906045] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.914032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.920541] page_type: f5(slab)
[   56.923673] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.931397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.939117] page dumped because: kasan: bad access detected
[   56.944672] 
[   56.946148] Memory state around the buggy address:
[   56.950926]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.958130]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.965335] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.972536]                                      ^
[   56.977314]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.984519]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.991720] ==================================================================
---
[   49.834922] ==================================================================
[   49.842002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   49.849293] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.856671] 
[   49.858150] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.867266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.871428] Hardware name: WinLink E850-96 board (DT)
[   49.876463] Call trace:
[   49.878893]  dump_backtrace+0x9c/0x128
[   49.882626]  show_stack+0x20/0x38
[   49.885924]  dump_stack_lvl+0x8c/0xd0
[   49.889570]  print_report+0x118/0x5e0
[   49.893216]  kasan_report+0xc8/0x118
[   49.896775]  kasan_check_range+0x100/0x1a8
[   49.900854]  __kasan_check_write+0x20/0x30
[   49.904934]  kasan_atomics_helper+0x5e4/0x49c8
[   49.909361]  kasan_atomics+0x1a0/0x2e8
[   49.913094]  kunit_try_run_case+0x14c/0x3d0
[   49.917261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.922729]  kthread+0x24c/0x2d0
[   49.925941]  ret_from_fork+0x10/0x20
[   49.929500] 
[   49.930975] Allocated by task 302:
[   49.934361]  kasan_save_stack+0x3c/0x68
[   49.938180]  kasan_save_track+0x20/0x40
[   49.942000]  kasan_save_alloc_info+0x40/0x58
[   49.946253]  __kasan_kmalloc+0xd4/0xd8
[   49.949986]  __kmalloc_cache_noprof+0x144/0x328
[   49.954499]  kasan_atomics+0xb8/0x2e8
[   49.958145]  kunit_try_run_case+0x14c/0x3d0
[   49.962312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.967780]  kthread+0x24c/0x2d0
[   49.970992]  ret_from_fork+0x10/0x20
[   49.974551] 
[   49.976027] The buggy address belongs to the object at ffff000800ddd700
[   49.976027]  which belongs to the cache kmalloc-64 of size 64
[   49.988354] The buggy address is located 0 bytes to the right of
[   49.988354]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.001200] 
[   50.002676] The buggy address belongs to the physical page:
[   50.008232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.016219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.022727] page_type: f5(slab)
[   50.025860] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.033584] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.041304] page dumped because: kasan: bad access detected
[   50.046859] 
[   50.048335] Memory state around the buggy address:
[   50.053112]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.060317]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.067522] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.074723]                                      ^
[   50.079501]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.086706]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.093907] ==================================================================
---
[   50.633867] ==================================================================
[   50.640949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   50.648239] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.655617] 
[   50.657096] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.666212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.670374] Hardware name: WinLink E850-96 board (DT)
[   50.675409] Call trace:
[   50.677839]  dump_backtrace+0x9c/0x128
[   50.681572]  show_stack+0x20/0x38
[   50.684871]  dump_stack_lvl+0x8c/0xd0
[   50.688516]  print_report+0x118/0x5e0
[   50.692162]  kasan_report+0xc8/0x118
[   50.695721]  kasan_check_range+0x100/0x1a8
[   50.699801]  __kasan_check_write+0x20/0x30
[   50.703881]  kasan_atomics_helper+0x728/0x49c8
[   50.708307]  kasan_atomics+0x1a0/0x2e8
[   50.712040]  kunit_try_run_case+0x14c/0x3d0
[   50.716207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.721675]  kthread+0x24c/0x2d0
[   50.724887]  ret_from_fork+0x10/0x20
[   50.728447] 
[   50.729921] Allocated by task 302:
[   50.733308]  kasan_save_stack+0x3c/0x68
[   50.737127]  kasan_save_track+0x20/0x40
[   50.740946]  kasan_save_alloc_info+0x40/0x58
[   50.745199]  __kasan_kmalloc+0xd4/0xd8
[   50.748932]  __kmalloc_cache_noprof+0x144/0x328
[   50.753446]  kasan_atomics+0xb8/0x2e8
[   50.757091]  kunit_try_run_case+0x14c/0x3d0
[   50.761258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.766727]  kthread+0x24c/0x2d0
[   50.769939]  ret_from_fork+0x10/0x20
[   50.773498] 
[   50.774973] The buggy address belongs to the object at ffff000800ddd700
[   50.774973]  which belongs to the cache kmalloc-64 of size 64
[   50.787300] The buggy address is located 0 bytes to the right of
[   50.787300]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.800146] 
[   50.801622] The buggy address belongs to the physical page:
[   50.807178] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.815165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.821674] page_type: f5(slab)
[   50.824806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.832530] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.840250] page dumped because: kasan: bad access detected
[   50.845805] 
[   50.847281] Memory state around the buggy address:
[   50.852059]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.859263]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.866468] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.873669]                                      ^
[   50.878447]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.885652]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.892853] ==================================================================
---
[   57.798355] ==================================================================
[   57.805425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   57.812801] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.820180] 
[   57.821659] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.830775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.834936] Hardware name: WinLink E850-96 board (DT)
[   57.839971] Call trace:
[   57.842402]  dump_backtrace+0x9c/0x128
[   57.846135]  show_stack+0x20/0x38
[   57.849433]  dump_stack_lvl+0x8c/0xd0
[   57.853079]  print_report+0x118/0x5e0
[   57.856724]  kasan_report+0xc8/0x118
[   57.860284]  kasan_check_range+0x100/0x1a8
[   57.864363]  __kasan_check_write+0x20/0x30
[   57.868443]  kasan_atomics_helper+0x10d8/0x49c8
[   57.872957]  kasan_atomics+0x1a0/0x2e8
[   57.876690]  kunit_try_run_case+0x14c/0x3d0
[   57.880856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.886325]  kthread+0x24c/0x2d0
[   57.889537]  ret_from_fork+0x10/0x20
[   57.893096] 
[   57.894571] Allocated by task 302:
[   57.897956]  kasan_save_stack+0x3c/0x68
[   57.901776]  kasan_save_track+0x20/0x40
[   57.905595]  kasan_save_alloc_info+0x40/0x58
[   57.909849]  __kasan_kmalloc+0xd4/0xd8
[   57.913581]  __kmalloc_cache_noprof+0x144/0x328
[   57.918095]  kasan_atomics+0xb8/0x2e8
[   57.921741]  kunit_try_run_case+0x14c/0x3d0
[   57.925907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.931376]  kthread+0x24c/0x2d0
[   57.934588]  ret_from_fork+0x10/0x20
[   57.938147] 
[   57.939622] The buggy address belongs to the object at ffff000800ddd700
[   57.939622]  which belongs to the cache kmalloc-64 of size 64
[   57.951949] The buggy address is located 0 bytes to the right of
[   57.951949]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.964796] 
[   57.966271] The buggy address belongs to the physical page:
[   57.971827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.979815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.986323] page_type: f5(slab)
[   57.989455] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.997180] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.004899] page dumped because: kasan: bad access detected
[   58.010455] 
[   58.011930] Memory state around the buggy address:
[   58.016708]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.023913]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.031117] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.038319]                                      ^
[   58.043097]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.050301]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.057503] ==================================================================
---
[   63.377231] ==================================================================
[   63.384334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   63.391711] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   63.399089] 
[   63.400568] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.409684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.413846] Hardware name: WinLink E850-96 board (DT)
[   63.418881] Call trace:
[   63.421311]  dump_backtrace+0x9c/0x128
[   63.425044]  show_stack+0x20/0x38
[   63.428342]  dump_stack_lvl+0x8c/0xd0
[   63.431988]  print_report+0x118/0x5e0
[   63.435634]  kasan_report+0xc8/0x118
[   63.439193]  kasan_check_range+0x100/0x1a8
[   63.443273]  __kasan_check_write+0x20/0x30
[   63.447353]  kasan_atomics_helper+0x18a4/0x49c8
[   63.451866]  kasan_atomics+0x1a0/0x2e8
[   63.455599]  kunit_try_run_case+0x14c/0x3d0
[   63.459765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.465234]  kthread+0x24c/0x2d0
[   63.468446]  ret_from_fork+0x10/0x20
[   63.472007] 
[   63.473480] Allocated by task 302:
[   63.476866]  kasan_save_stack+0x3c/0x68
[   63.480685]  kasan_save_track+0x20/0x40
[   63.484505]  kasan_save_alloc_info+0x40/0x58
[   63.488758]  __kasan_kmalloc+0xd4/0xd8
[   63.492491]  __kmalloc_cache_noprof+0x144/0x328
[   63.497004]  kasan_atomics+0xb8/0x2e8
[   63.500650]  kunit_try_run_case+0x14c/0x3d0
[   63.504817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.510285]  kthread+0x24c/0x2d0
[   63.513497]  ret_from_fork+0x10/0x20
[   63.517056] 
[   63.518532] The buggy address belongs to the object at ffff000800ddd700
[   63.518532]  which belongs to the cache kmalloc-64 of size 64
[   63.530858] The buggy address is located 0 bytes to the right of
[   63.530858]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   63.543705] 
[   63.545181] The buggy address belongs to the physical page:
[   63.550737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   63.558723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.565232] page_type: f5(slab)
[   63.568364] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.576089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   63.583809] page dumped because: kasan: bad access detected
[   63.589364] 
[   63.590839] Memory state around the buggy address:
[   63.595617]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.602822]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.610027] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.617228]                                      ^
[   63.622006]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.629210]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.636412] ==================================================================
---
[   56.203242] ==================================================================
[   56.210309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   56.217600] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   56.224978] 
[   56.226457] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   56.235573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.239735] Hardware name: WinLink E850-96 board (DT)
[   56.244770] Call trace:
[   56.247200]  dump_backtrace+0x9c/0x128
[   56.250933]  show_stack+0x20/0x38
[   56.254231]  dump_stack_lvl+0x8c/0xd0
[   56.257877]  print_report+0x118/0x5e0
[   56.261523]  kasan_report+0xc8/0x118
[   56.265082]  kasan_check_range+0x100/0x1a8
[   56.269161]  __kasan_check_write+0x20/0x30
[   56.273242]  kasan_atomics_helper+0xeb0/0x49c8
[   56.277668]  kasan_atomics+0x1a0/0x2e8
[   56.281401]  kunit_try_run_case+0x14c/0x3d0
[   56.285567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.291036]  kthread+0x24c/0x2d0
[   56.294248]  ret_from_fork+0x10/0x20
[   56.297807] 
[   56.299283] Allocated by task 302:
[   56.302668]  kasan_save_stack+0x3c/0x68
[   56.306487]  kasan_save_track+0x20/0x40
[   56.310307]  kasan_save_alloc_info+0x40/0x58
[   56.314560]  __kasan_kmalloc+0xd4/0xd8
[   56.318293]  __kmalloc_cache_noprof+0x144/0x328
[   56.322807]  kasan_atomics+0xb8/0x2e8
[   56.326452]  kunit_try_run_case+0x14c/0x3d0
[   56.330619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.336087]  kthread+0x24c/0x2d0
[   56.339299]  ret_from_fork+0x10/0x20
[   56.342858] 
[   56.344334] The buggy address belongs to the object at ffff000800ddd700
[   56.344334]  which belongs to the cache kmalloc-64 of size 64
[   56.356661] The buggy address is located 0 bytes to the right of
[   56.356661]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.369507] 
[   56.370983] The buggy address belongs to the physical page:
[   56.376539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.384526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.391034] page_type: f5(slab)
[   56.394167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.401891] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.409611] page dumped because: kasan: bad access detected
[   56.415166] 
[   56.416642] Memory state around the buggy address:
[   56.421420]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.428624]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.435829] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.443030]                                      ^
[   56.447808]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.455012]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.462214] ==================================================================
---
[   53.556754] ==================================================================
[   53.563822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   53.571112] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.578490] 
[   53.579970] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.589085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.593247] Hardware name: WinLink E850-96 board (DT)
[   53.598282] Call trace:
[   53.600712]  dump_backtrace+0x9c/0x128
[   53.604444]  show_stack+0x20/0x38
[   53.607743]  dump_stack_lvl+0x8c/0xd0
[   53.611389]  print_report+0x118/0x5e0
[   53.615035]  kasan_report+0xc8/0x118
[   53.618594]  kasan_check_range+0x100/0x1a8
[   53.622673]  __kasan_check_write+0x20/0x30
[   53.626753]  kasan_atomics_helper+0xbc8/0x49c8
[   53.631180]  kasan_atomics+0x1a0/0x2e8
[   53.634913]  kunit_try_run_case+0x14c/0x3d0
[   53.639080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.644548]  kthread+0x24c/0x2d0
[   53.647760]  ret_from_fork+0x10/0x20
[   53.651319] 
[   53.652794] Allocated by task 302:
[   53.656180]  kasan_save_stack+0x3c/0x68
[   53.659999]  kasan_save_track+0x20/0x40
[   53.663818]  kasan_save_alloc_info+0x40/0x58
[   53.668072]  __kasan_kmalloc+0xd4/0xd8
[   53.671805]  __kmalloc_cache_noprof+0x144/0x328
[   53.676319]  kasan_atomics+0xb8/0x2e8
[   53.679964]  kunit_try_run_case+0x14c/0x3d0
[   53.684131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.689599]  kthread+0x24c/0x2d0
[   53.692811]  ret_from_fork+0x10/0x20
[   53.696370] 
[   53.697846] The buggy address belongs to the object at ffff000800ddd700
[   53.697846]  which belongs to the cache kmalloc-64 of size 64
[   53.710172] The buggy address is located 0 bytes to the right of
[   53.710172]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.723019] 
[   53.724495] The buggy address belongs to the physical page:
[   53.730051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   53.738038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.744546] page_type: f5(slab)
[   53.747678] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.755403] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.763123] page dumped because: kasan: bad access detected
[   53.768678] 
[   53.770154] Memory state around the buggy address:
[   53.774932]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.782136]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.789343] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.796542]                                      ^
[   53.801320]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.808524]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.815726] ==================================================================
---
[   58.597784] ==================================================================
[   58.604892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   58.612268] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.619647] 
[   58.621126] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.630242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.634404] Hardware name: WinLink E850-96 board (DT)
[   58.639439] Call trace:
[   58.641869]  dump_backtrace+0x9c/0x128
[   58.645601]  show_stack+0x20/0x38
[   58.648900]  dump_stack_lvl+0x8c/0xd0
[   58.652546]  print_report+0x118/0x5e0
[   58.656192]  kasan_report+0xc8/0x118
[   58.659751]  kasan_check_range+0x100/0x1a8
[   58.663830]  __kasan_check_write+0x20/0x30
[   58.667910]  kasan_atomics_helper+0x121c/0x49c8
[   58.672424]  kasan_atomics+0x1a0/0x2e8
[   58.676157]  kunit_try_run_case+0x14c/0x3d0
[   58.680323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.685792]  kthread+0x24c/0x2d0
[   58.689004]  ret_from_fork+0x10/0x20
[   58.692563] 
[   58.694038] Allocated by task 302:
[   58.697424]  kasan_save_stack+0x3c/0x68
[   58.701243]  kasan_save_track+0x20/0x40
[   58.705062]  kasan_save_alloc_info+0x40/0x58
[   58.709316]  __kasan_kmalloc+0xd4/0xd8
[   58.713048]  __kmalloc_cache_noprof+0x144/0x328
[   58.717562]  kasan_atomics+0xb8/0x2e8
[   58.721208]  kunit_try_run_case+0x14c/0x3d0
[   58.725375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.730843]  kthread+0x24c/0x2d0
[   58.734055]  ret_from_fork+0x10/0x20
[   58.737614] 
[   58.739090] The buggy address belongs to the object at ffff000800ddd700
[   58.739090]  which belongs to the cache kmalloc-64 of size 64
[   58.751416] The buggy address is located 0 bytes to the right of
[   58.751416]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   58.764263] 
[   58.765739] The buggy address belongs to the physical page:
[   58.771295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   58.779281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.785790] page_type: f5(slab)
[   58.788922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.796647] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   58.804367] page dumped because: kasan: bad access detected
[   58.809922] 
[   58.811397] Memory state around the buggy address:
[   58.816175]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.823380]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.830584] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.837786]                                      ^
[   58.842564]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.849768]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.856970] ==================================================================
---
[   57.531856] ==================================================================
[   57.538936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   57.546313] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   57.553691] 
[   57.555169] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   57.564285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.568447] Hardware name: WinLink E850-96 board (DT)
[   57.573482] Call trace:
[   57.575913]  dump_backtrace+0x9c/0x128
[   57.579645]  show_stack+0x20/0x38
[   57.582944]  dump_stack_lvl+0x8c/0xd0
[   57.586590]  print_report+0x118/0x5e0
[   57.590236]  kasan_report+0xc8/0x118
[   57.593794]  kasan_check_range+0x100/0x1a8
[   57.597875]  __kasan_check_write+0x20/0x30
[   57.601954]  kasan_atomics_helper+0x106c/0x49c8
[   57.606468]  kasan_atomics+0x1a0/0x2e8
[   57.610200]  kunit_try_run_case+0x14c/0x3d0
[   57.614367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.619836]  kthread+0x24c/0x2d0
[   57.623047]  ret_from_fork+0x10/0x20
[   57.626607] 
[   57.628082] Allocated by task 302:
[   57.631467]  kasan_save_stack+0x3c/0x68
[   57.635287]  kasan_save_track+0x20/0x40
[   57.639106]  kasan_save_alloc_info+0x40/0x58
[   57.643360]  __kasan_kmalloc+0xd4/0xd8
[   57.647092]  __kmalloc_cache_noprof+0x144/0x328
[   57.651606]  kasan_atomics+0xb8/0x2e8
[   57.655252]  kunit_try_run_case+0x14c/0x3d0
[   57.659418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.664887]  kthread+0x24c/0x2d0
[   57.668099]  ret_from_fork+0x10/0x20
[   57.671658] 
[   57.673133] The buggy address belongs to the object at ffff000800ddd700
[   57.673133]  which belongs to the cache kmalloc-64 of size 64
[   57.685460] The buggy address is located 0 bytes to the right of
[   57.685460]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   57.698307] 
[   57.699782] The buggy address belongs to the physical page:
[   57.705339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   57.713324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.719834] page_type: f5(slab)
[   57.722966] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.730691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   57.738410] page dumped because: kasan: bad access detected
[   57.743966] 
[   57.745441] Memory state around the buggy address:
[   57.750219]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.757424]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.764628] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.771830]                                      ^
[   57.776608]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.783812]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.791014] ==================================================================
---
[   50.367557] ==================================================================
[   50.374633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   50.381924] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.389302] 
[   50.390781] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.399897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.404058] Hardware name: WinLink E850-96 board (DT)
[   50.409094] Call trace:
[   50.411524]  dump_backtrace+0x9c/0x128
[   50.415256]  show_stack+0x20/0x38
[   50.418555]  dump_stack_lvl+0x8c/0xd0
[   50.422201]  print_report+0x118/0x5e0
[   50.425847]  kasan_report+0xc8/0x118
[   50.429406]  kasan_check_range+0x100/0x1a8
[   50.433485]  __kasan_check_write+0x20/0x30
[   50.437565]  kasan_atomics_helper+0x6bc/0x49c8
[   50.441992]  kasan_atomics+0x1a0/0x2e8
[   50.445725]  kunit_try_run_case+0x14c/0x3d0
[   50.449891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.455360]  kthread+0x24c/0x2d0
[   50.458572]  ret_from_fork+0x10/0x20
[   50.462131] 
[   50.463606] Allocated by task 302:
[   50.466992]  kasan_save_stack+0x3c/0x68
[   50.470811]  kasan_save_track+0x20/0x40
[   50.474630]  kasan_save_alloc_info+0x40/0x58
[   50.478884]  __kasan_kmalloc+0xd4/0xd8
[   50.482616]  __kmalloc_cache_noprof+0x144/0x328
[   50.487130]  kasan_atomics+0xb8/0x2e8
[   50.490776]  kunit_try_run_case+0x14c/0x3d0
[   50.494943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.500411]  kthread+0x24c/0x2d0
[   50.503623]  ret_from_fork+0x10/0x20
[   50.507182] 
[   50.508658] The buggy address belongs to the object at ffff000800ddd700
[   50.508658]  which belongs to the cache kmalloc-64 of size 64
[   50.520984] The buggy address is located 0 bytes to the right of
[   50.520984]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   50.533831] 
[   50.535307] The buggy address belongs to the physical page:
[   50.540863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   50.548850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.555358] page_type: f5(slab)
[   50.558490] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.566215] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   50.573935] page dumped because: kasan: bad access detected
[   50.579490] 
[   50.580966] Memory state around the buggy address:
[   50.585743]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.592948]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.600153] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.607354]                                      ^
[   50.612131]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.619336]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.626538] ==================================================================
---
[   61.788708] ==================================================================
[   61.795816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   61.803193] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.810571] 
[   61.812050] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.821166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.825328] Hardware name: WinLink E850-96 board (DT)
[   61.830363] Call trace:
[   61.832793]  dump_backtrace+0x9c/0x128
[   61.836526]  show_stack+0x20/0x38
[   61.839824]  dump_stack_lvl+0x8c/0xd0
[   61.843470]  print_report+0x118/0x5e0
[   61.847116]  kasan_report+0xc8/0x118
[   61.850675]  kasan_check_range+0x100/0x1a8
[   61.854755]  __kasan_check_write+0x20/0x30
[   61.858834]  kasan_atomics_helper+0x16f0/0x49c8
[   61.863348]  kasan_atomics+0x1a0/0x2e8
[   61.867081]  kunit_try_run_case+0x14c/0x3d0
[   61.871248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.876716]  kthread+0x24c/0x2d0
[   61.879928]  ret_from_fork+0x10/0x20
[   61.883488] 
[   61.884963] Allocated by task 302:
[   61.888348]  kasan_save_stack+0x3c/0x68
[   61.892167]  kasan_save_track+0x20/0x40
[   61.895987]  kasan_save_alloc_info+0x40/0x58
[   61.900240]  __kasan_kmalloc+0xd4/0xd8
[   61.903973]  __kmalloc_cache_noprof+0x144/0x328
[   61.908487]  kasan_atomics+0xb8/0x2e8
[   61.912132]  kunit_try_run_case+0x14c/0x3d0
[   61.916299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.921768]  kthread+0x24c/0x2d0
[   61.924979]  ret_from_fork+0x10/0x20
[   61.928538] 
[   61.930014] The buggy address belongs to the object at ffff000800ddd700
[   61.930014]  which belongs to the cache kmalloc-64 of size 64
[   61.942341] The buggy address is located 0 bytes to the right of
[   61.942341]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.955187] 
[   61.956663] The buggy address belongs to the physical page:
[   61.962219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.970206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.976715] page_type: f5(slab)
[   61.979847] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.987571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.995291] page dumped because: kasan: bad access detected
[   62.000846] 
[   62.002322] Memory state around the buggy address:
[   62.007100]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.014304]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.021509] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.028710]                                      ^
[   62.033488]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.040693]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.047894] ==================================================================
---
[   47.178331] ==================================================================
[   47.185445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   47.192735] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.200114] 
[   47.201596] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   47.210710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.214872] Hardware name: WinLink E850-96 board (DT)
[   47.219909] Call trace:
[   47.222336]  dump_backtrace+0x9c/0x128
[   47.226068]  show_stack+0x20/0x38
[   47.229367]  dump_stack_lvl+0x8c/0xd0
[   47.233013]  print_report+0x118/0x5e0
[   47.236658]  kasan_report+0xc8/0x118
[   47.240217]  kasan_check_range+0x100/0x1a8
[   47.244297]  __kasan_check_write+0x20/0x30
[   47.248377]  kasan_atomics_helper+0x25c/0x49c8
[   47.252804]  kasan_atomics+0x1a0/0x2e8
[   47.256537]  kunit_try_run_case+0x14c/0x3d0
[   47.260703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.266172]  kthread+0x24c/0x2d0
[   47.269384]  ret_from_fork+0x10/0x20
[   47.272945] 
[   47.274418] Allocated by task 302:
[   47.277805]  kasan_save_stack+0x3c/0x68
[   47.281624]  kasan_save_track+0x20/0x40
[   47.285442]  kasan_save_alloc_info+0x40/0x58
[   47.289696]  __kasan_kmalloc+0xd4/0xd8
[   47.293428]  __kmalloc_cache_noprof+0x144/0x328
[   47.297942]  kasan_atomics+0xb8/0x2e8
[   47.301588]  kunit_try_run_case+0x14c/0x3d0
[   47.305754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.311223]  kthread+0x24c/0x2d0
[   47.314435]  ret_from_fork+0x10/0x20
[   47.317993] 
[   47.319469] The buggy address belongs to the object at ffff000800ddd700
[   47.319469]  which belongs to the cache kmalloc-64 of size 64
[   47.331796] The buggy address is located 0 bytes to the right of
[   47.331796]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.344643] 
[   47.346120] The buggy address belongs to the physical page:
[   47.351676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.359664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.366170] page_type: f5(slab)
[   47.369304] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.377027] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.384746] page dumped because: kasan: bad access detected
[   47.390302] 
[   47.391777] Memory state around the buggy address:
[   47.396556]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.403760]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.410965] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.418166]                                      ^
[   47.422943]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.430148]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.437350] ==================================================================
---
[   60.459757] ==================================================================
[   60.466845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   60.474220] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   60.481598] 
[   60.483077] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   60.492193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.496355] Hardware name: WinLink E850-96 board (DT)
[   60.501390] Call trace:
[   60.503820]  dump_backtrace+0x9c/0x128
[   60.507553]  show_stack+0x20/0x38
[   60.510851]  dump_stack_lvl+0x8c/0xd0
[   60.514497]  print_report+0x118/0x5e0
[   60.518143]  kasan_report+0xc8/0x118
[   60.521702]  kasan_check_range+0x100/0x1a8
[   60.525782]  __kasan_check_write+0x20/0x30
[   60.529862]  kasan_atomics_helper+0x1518/0x49c8
[   60.534375]  kasan_atomics+0x1a0/0x2e8
[   60.538108]  kunit_try_run_case+0x14c/0x3d0
[   60.542275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.547743]  kthread+0x24c/0x2d0
[   60.550955]  ret_from_fork+0x10/0x20
[   60.554514] 
[   60.555989] Allocated by task 302:
[   60.559375]  kasan_save_stack+0x3c/0x68
[   60.563194]  kasan_save_track+0x20/0x40
[   60.567013]  kasan_save_alloc_info+0x40/0x58
[   60.571267]  __kasan_kmalloc+0xd4/0xd8
[   60.575000]  __kmalloc_cache_noprof+0x144/0x328
[   60.579513]  kasan_atomics+0xb8/0x2e8
[   60.583159]  kunit_try_run_case+0x14c/0x3d0
[   60.587326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.592795]  kthread+0x24c/0x2d0
[   60.596006]  ret_from_fork+0x10/0x20
[   60.599565] 
[   60.601040] The buggy address belongs to the object at ffff000800ddd700
[   60.601040]  which belongs to the cache kmalloc-64 of size 64
[   60.613368] The buggy address is located 0 bytes to the right of
[   60.613368]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.626214] 
[   60.627690] The buggy address belongs to the physical page:
[   60.633246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.641233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.647741] page_type: f5(slab)
[   60.650873] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.658598] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.666318] page dumped because: kasan: bad access detected
[   60.671873] 
[   60.673349] Memory state around the buggy address:
[   60.678126]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.685331]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.692536] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.699737]                                      ^
[   60.704515]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.711720]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.718921] ==================================================================
---
[   49.035974] ==================================================================
[   49.043058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   49.050346] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   49.057725] 
[   49.059203] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   49.068319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.072481] Hardware name: WinLink E850-96 board (DT)
[   49.077516] Call trace:
[   49.079946]  dump_backtrace+0x9c/0x128
[   49.083679]  show_stack+0x20/0x38
[   49.086978]  dump_stack_lvl+0x8c/0xd0
[   49.090624]  print_report+0x118/0x5e0
[   49.094269]  kasan_report+0xc8/0x118
[   49.097828]  kasan_check_range+0x100/0x1a8
[   49.101908]  __kasan_check_write+0x20/0x30
[   49.105988]  kasan_atomics_helper+0x4a0/0x49c8
[   49.110415]  kasan_atomics+0x1a0/0x2e8
[   49.114147]  kunit_try_run_case+0x14c/0x3d0
[   49.118314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.123783]  kthread+0x24c/0x2d0
[   49.126994]  ret_from_fork+0x10/0x20
[   49.130554] 
[   49.132029] Allocated by task 302:
[   49.135414]  kasan_save_stack+0x3c/0x68
[   49.139234]  kasan_save_track+0x20/0x40
[   49.143053]  kasan_save_alloc_info+0x40/0x58
[   49.147306]  __kasan_kmalloc+0xd4/0xd8
[   49.151039]  __kmalloc_cache_noprof+0x144/0x328
[   49.155553]  kasan_atomics+0xb8/0x2e8
[   49.159199]  kunit_try_run_case+0x14c/0x3d0
[   49.163365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.168834]  kthread+0x24c/0x2d0
[   49.172046]  ret_from_fork+0x10/0x20
[   49.175605] 
[   49.177080] The buggy address belongs to the object at ffff000800ddd700
[   49.177080]  which belongs to the cache kmalloc-64 of size 64
[   49.189407] The buggy address is located 0 bytes to the right of
[   49.189407]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   49.202254] 
[   49.203730] The buggy address belongs to the physical page:
[   49.209285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   49.217273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.223781] page_type: f5(slab)
[   49.226913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.234637] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   49.242357] page dumped because: kasan: bad access detected
[   49.247913] 
[   49.249388] Memory state around the buggy address:
[   49.254166]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.261370]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.268576] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.275777]                                      ^
[   49.280555]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.287759]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.294961] ==================================================================
---
[   60.193252] ==================================================================
[   60.200354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   60.207731] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   60.215109] 
[   60.216588] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   60.225704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.229866] Hardware name: WinLink E850-96 board (DT)
[   60.234901] Call trace:
[   60.237331]  dump_backtrace+0x9c/0x128
[   60.241064]  show_stack+0x20/0x38
[   60.244362]  dump_stack_lvl+0x8c/0xd0
[   60.248008]  print_report+0x118/0x5e0
[   60.251654]  kasan_report+0xc8/0x118
[   60.255213]  kasan_check_range+0x100/0x1a8
[   60.259293]  __kasan_check_write+0x20/0x30
[   60.263372]  kasan_atomics_helper+0x14ac/0x49c8
[   60.267886]  kasan_atomics+0x1a0/0x2e8
[   60.271619]  kunit_try_run_case+0x14c/0x3d0
[   60.275785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.281254]  kthread+0x24c/0x2d0
[   60.284466]  ret_from_fork+0x10/0x20
[   60.288025] 
[   60.289500] Allocated by task 302:
[   60.292886]  kasan_save_stack+0x3c/0x68
[   60.296705]  kasan_save_track+0x20/0x40
[   60.300525]  kasan_save_alloc_info+0x40/0x58
[   60.304778]  __kasan_kmalloc+0xd4/0xd8
[   60.308511]  __kmalloc_cache_noprof+0x144/0x328
[   60.313024]  kasan_atomics+0xb8/0x2e8
[   60.316670]  kunit_try_run_case+0x14c/0x3d0
[   60.320837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.326305]  kthread+0x24c/0x2d0
[   60.329517]  ret_from_fork+0x10/0x20
[   60.333076] 
[   60.334552] The buggy address belongs to the object at ffff000800ddd700
[   60.334552]  which belongs to the cache kmalloc-64 of size 64
[   60.346878] The buggy address is located 0 bytes to the right of
[   60.346878]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.359725] 
[   60.361201] The buggy address belongs to the physical page:
[   60.366757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.374744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.381253] page_type: f5(slab)
[   60.384385] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.392109] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.399829] page dumped because: kasan: bad access detected
[   60.405384] 
[   60.406859] Memory state around the buggy address:
[   60.411638]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.418842]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.426047] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.433248]                                      ^
[   60.438026]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.445231]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.452432] ==================================================================
---
[   48.769664] ==================================================================
[   48.776742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   48.784031] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   48.791409] 
[   48.792888] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.802004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.806166] Hardware name: WinLink E850-96 board (DT)
[   48.811201] Call trace:
[   48.813631]  dump_backtrace+0x9c/0x128
[   48.817363]  show_stack+0x20/0x38
[   48.820662]  dump_stack_lvl+0x8c/0xd0
[   48.824308]  print_report+0x118/0x5e0
[   48.827954]  kasan_report+0xc8/0x118
[   48.831513]  kasan_check_range+0x100/0x1a8
[   48.835593]  __kasan_check_write+0x20/0x30
[   48.839673]  kasan_atomics_helper+0x434/0x49c8
[   48.844099]  kasan_atomics+0x1a0/0x2e8
[   48.847832]  kunit_try_run_case+0x14c/0x3d0
[   48.851999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.857467]  kthread+0x24c/0x2d0
[   48.860679]  ret_from_fork+0x10/0x20
[   48.864238] 
[   48.865713] Allocated by task 302:
[   48.869099]  kasan_save_stack+0x3c/0x68
[   48.872918]  kasan_save_track+0x20/0x40
[   48.876738]  kasan_save_alloc_info+0x40/0x58
[   48.880991]  __kasan_kmalloc+0xd4/0xd8
[   48.884724]  __kmalloc_cache_noprof+0x144/0x328
[   48.889238]  kasan_atomics+0xb8/0x2e8
[   48.892883]  kunit_try_run_case+0x14c/0x3d0
[   48.897050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.902519]  kthread+0x24c/0x2d0
[   48.905730]  ret_from_fork+0x10/0x20
[   48.909289] 
[   48.910765] The buggy address belongs to the object at ffff000800ddd700
[   48.910765]  which belongs to the cache kmalloc-64 of size 64
[   48.923092] The buggy address is located 0 bytes to the right of
[   48.923092]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.935938] 
[   48.937414] The buggy address belongs to the physical page:
[   48.942970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.950957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.957466] page_type: f5(slab)
[   48.960598] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.968322] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.976042] page dumped because: kasan: bad access detected
[   48.981597] 
[   48.983073] Memory state around the buggy address:
[   48.987850]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.995055]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.002260] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.009461]                                      ^
[   49.014239]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.021444]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.028645] ==================================================================
---
[   52.761093] ==================================================================
[   52.768174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   52.775464] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   52.782842] 
[   52.784321] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   52.793437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.797599] Hardware name: WinLink E850-96 board (DT)
[   52.802634] Call trace:
[   52.805064]  dump_backtrace+0x9c/0x128
[   52.808797]  show_stack+0x20/0x38
[   52.812095]  dump_stack_lvl+0x8c/0xd0
[   52.815741]  print_report+0x118/0x5e0
[   52.819387]  kasan_report+0xc8/0x118
[   52.822946]  kasan_check_range+0x100/0x1a8
[   52.827026]  __kasan_check_write+0x20/0x30
[   52.831105]  kasan_atomics_helper+0xabc/0x49c8
[   52.835533]  kasan_atomics+0x1a0/0x2e8
[   52.839265]  kunit_try_run_case+0x14c/0x3d0
[   52.843432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.848900]  kthread+0x24c/0x2d0
[   52.852112]  ret_from_fork+0x10/0x20
[   52.855672] 
[   52.857147] Allocated by task 302:
[   52.860532]  kasan_save_stack+0x3c/0x68
[   52.864352]  kasan_save_track+0x20/0x40
[   52.868171]  kasan_save_alloc_info+0x40/0x58
[   52.872424]  __kasan_kmalloc+0xd4/0xd8
[   52.876157]  __kmalloc_cache_noprof+0x144/0x328
[   52.880671]  kasan_atomics+0xb8/0x2e8
[   52.884316]  kunit_try_run_case+0x14c/0x3d0
[   52.888483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.893952]  kthread+0x24c/0x2d0
[   52.897164]  ret_from_fork+0x10/0x20
[   52.900723] 
[   52.902198] The buggy address belongs to the object at ffff000800ddd700
[   52.902198]  which belongs to the cache kmalloc-64 of size 64
[   52.914525] The buggy address is located 0 bytes to the right of
[   52.914525]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   52.927371] 
[   52.928847] The buggy address belongs to the physical page:
[   52.934403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   52.942390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.948899] page_type: f5(slab)
[   52.952031] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.959755] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.967475] page dumped because: kasan: bad access detected
[   52.973030] 
[   52.974506] Memory state around the buggy address:
[   52.979284]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.986489]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.993693] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.000894]                                      ^
[   53.005672]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.012877]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.020078] ==================================================================
---
[   59.397288] ==================================================================
[   59.404359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   59.411736] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.419114] 
[   59.420593] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.429709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.433871] Hardware name: WinLink E850-96 board (DT)
[   59.438906] Call trace:
[   59.441336]  dump_backtrace+0x9c/0x128
[   59.445069]  show_stack+0x20/0x38
[   59.448367]  dump_stack_lvl+0x8c/0xd0
[   59.452013]  print_report+0x118/0x5e0
[   59.455659]  kasan_report+0xc8/0x118
[   59.459218]  kasan_check_range+0x100/0x1a8
[   59.463298]  __kasan_check_write+0x20/0x30
[   59.467378]  kasan_atomics_helper+0x1370/0x49c8
[   59.471891]  kasan_atomics+0x1a0/0x2e8
[   59.475624]  kunit_try_run_case+0x14c/0x3d0
[   59.479790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.485259]  kthread+0x24c/0x2d0
[   59.488471]  ret_from_fork+0x10/0x20
[   59.492030] 
[   59.493505] Allocated by task 302:
[   59.496890]  kasan_save_stack+0x3c/0x68
[   59.500710]  kasan_save_track+0x20/0x40
[   59.504530]  kasan_save_alloc_info+0x40/0x58
[   59.508783]  __kasan_kmalloc+0xd4/0xd8
[   59.512515]  __kmalloc_cache_noprof+0x144/0x328
[   59.517029]  kasan_atomics+0xb8/0x2e8
[   59.520675]  kunit_try_run_case+0x14c/0x3d0
[   59.524842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.530310]  kthread+0x24c/0x2d0
[   59.533522]  ret_from_fork+0x10/0x20
[   59.537081] 
[   59.538557] The buggy address belongs to the object at ffff000800ddd700
[   59.538557]  which belongs to the cache kmalloc-64 of size 64
[   59.550884] The buggy address is located 0 bytes to the right of
[   59.550884]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.563730] 
[   59.565206] The buggy address belongs to the physical page:
[   59.570762] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.578749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.585257] page_type: f5(slab)
[   59.588389] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.596114] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.603834] page dumped because: kasan: bad access detected
[   59.609389] 
[   59.610864] Memory state around the buggy address:
[   59.615642]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.622847]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.630052] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.637253]                                      ^
[   59.642031]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.649235]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.656437] ==================================================================
---
[   54.615420] ==================================================================
[   54.622486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   54.629777] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.637155] 
[   54.638634] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.647750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.651911] Hardware name: WinLink E850-96 board (DT)
[   54.656947] Call trace:
[   54.659377]  dump_backtrace+0x9c/0x128
[   54.663109]  show_stack+0x20/0x38
[   54.666408]  dump_stack_lvl+0x8c/0xd0
[   54.670054]  print_report+0x118/0x5e0
[   54.673699]  kasan_report+0xc8/0x118
[   54.677258]  kasan_check_range+0x100/0x1a8
[   54.681338]  __kasan_check_write+0x20/0x30
[   54.685418]  kasan_atomics_helper+0xd00/0x49c8
[   54.689845]  kasan_atomics+0x1a0/0x2e8
[   54.693578]  kunit_try_run_case+0x14c/0x3d0
[   54.697744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.703213]  kthread+0x24c/0x2d0
[   54.706424]  ret_from_fork+0x10/0x20
[   54.709984] 
[   54.711459] Allocated by task 302:
[   54.714845]  kasan_save_stack+0x3c/0x68
[   54.718664]  kasan_save_track+0x20/0x40
[   54.722483]  kasan_save_alloc_info+0x40/0x58
[   54.726737]  __kasan_kmalloc+0xd4/0xd8
[   54.730469]  __kmalloc_cache_noprof+0x144/0x328
[   54.734983]  kasan_atomics+0xb8/0x2e8
[   54.738629]  kunit_try_run_case+0x14c/0x3d0
[   54.742796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.748264]  kthread+0x24c/0x2d0
[   54.751476]  ret_from_fork+0x10/0x20
[   54.755035] 
[   54.756510] The buggy address belongs to the object at ffff000800ddd700
[   54.756510]  which belongs to the cache kmalloc-64 of size 64
[   54.768837] The buggy address is located 0 bytes to the right of
[   54.768837]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   54.781684] 
[   54.783160] The buggy address belongs to the physical page:
[   54.788715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.796703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.803211] page_type: f5(slab)
[   54.806344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.814068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.821787] page dumped because: kasan: bad access detected
[   54.827343] 
[   54.828818] Memory state around the buggy address:
[   54.833596]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.840801]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.848005] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.855207]                                      ^
[   54.859984]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.867189]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.874391] ==================================================================
---
[   53.027421] ==================================================================
[   53.034489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   53.041780] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.049158] 
[   53.050636] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.059753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.063914] Hardware name: WinLink E850-96 board (DT)
[   53.068949] Call trace:
[   53.071381]  dump_backtrace+0x9c/0x128
[   53.075112]  show_stack+0x20/0x38
[   53.078411]  dump_stack_lvl+0x8c/0xd0
[   53.082057]  print_report+0x118/0x5e0
[   53.085703]  kasan_report+0xc8/0x118
[   53.089261]  kasan_check_range+0x100/0x1a8
[   53.093341]  __kasan_check_write+0x20/0x30
[   53.097421]  kasan_atomics_helper+0xb28/0x49c8
[   53.101848]  kasan_atomics+0x1a0/0x2e8
[   53.105581]  kunit_try_run_case+0x14c/0x3d0
[   53.109747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.115216]  kthread+0x24c/0x2d0
[   53.118428]  ret_from_fork+0x10/0x20
[   53.121987] 
[   53.123462] Allocated by task 302:
[   53.126848]  kasan_save_stack+0x3c/0x68
[   53.130667]  kasan_save_track+0x20/0x40
[   53.134487]  kasan_save_alloc_info+0x40/0x58
[   53.138739]  __kasan_kmalloc+0xd4/0xd8
[   53.142473]  __kmalloc_cache_noprof+0x144/0x328
[   53.146986]  kasan_atomics+0xb8/0x2e8
[   53.150632]  kunit_try_run_case+0x14c/0x3d0
[   53.154799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.160267]  kthread+0x24c/0x2d0
[   53.163479]  ret_from_fork+0x10/0x20
[   53.167038] 
[   53.168513] The buggy address belongs to the object at ffff000800ddd700
[   53.168513]  which belongs to the cache kmalloc-64 of size 64
[   53.180840] The buggy address is located 0 bytes to the right of
[   53.180840]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.193687] 
[   53.195163] The buggy address belongs to the physical page:
[   53.200718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   53.208706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.215214] page_type: f5(slab)
[   53.218346] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.226070] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.233790] page dumped because: kasan: bad access detected
[   53.239346] 
[   53.240821] Memory state around the buggy address:
[   53.245599]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.252804]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.260009] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.267210]                                      ^
[   53.271987]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.279192]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.286394] ==================================================================
---
[   50.900155] ==================================================================
[   50.907264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   50.914555] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   50.921933] 
[   50.923412] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   50.932528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.936689] Hardware name: WinLink E850-96 board (DT)
[   50.941724] Call trace:
[   50.944155]  dump_backtrace+0x9c/0x128
[   50.947887]  show_stack+0x20/0x38
[   50.951186]  dump_stack_lvl+0x8c/0xd0
[   50.954832]  print_report+0x118/0x5e0
[   50.958478]  kasan_report+0xc8/0x118
[   50.962036]  kasan_check_range+0x100/0x1a8
[   50.966116]  __kasan_check_write+0x20/0x30
[   50.970196]  kasan_atomics_helper+0x7a0/0x49c8
[   50.974623]  kasan_atomics+0x1a0/0x2e8
[   50.978356]  kunit_try_run_case+0x14c/0x3d0
[   50.982522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.987991]  kthread+0x24c/0x2d0
[   50.991203]  ret_from_fork+0x10/0x20
[   50.994762] 
[   50.996237] Allocated by task 302:
[   50.999623]  kasan_save_stack+0x3c/0x68
[   51.003442]  kasan_save_track+0x20/0x40
[   51.007262]  kasan_save_alloc_info+0x40/0x58
[   51.011515]  __kasan_kmalloc+0xd4/0xd8
[   51.015247]  __kmalloc_cache_noprof+0x144/0x328
[   51.019761]  kasan_atomics+0xb8/0x2e8
[   51.023407]  kunit_try_run_case+0x14c/0x3d0
[   51.027573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.033042]  kthread+0x24c/0x2d0
[   51.036254]  ret_from_fork+0x10/0x20
[   51.039813] 
[   51.041288] The buggy address belongs to the object at ffff000800ddd700
[   51.041288]  which belongs to the cache kmalloc-64 of size 64
[   51.053615] The buggy address is located 0 bytes to the right of
[   51.053615]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.066462] 
[   51.067938] The buggy address belongs to the physical page:
[   51.073493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.081481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.087989] page_type: f5(slab)
[   51.091121] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.098846] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.106565] page dumped because: kasan: bad access detected
[   51.112121] 
[   51.113596] Memory state around the buggy address:
[   51.118374]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.125579]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.132784] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.139985]                                      ^
[   51.144762]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.151967]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.159169] ==================================================================
---
[   51.432818] ==================================================================
[   51.439895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   51.447185] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.454564] 
[   51.456042] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.465158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.469320] Hardware name: WinLink E850-96 board (DT)
[   51.474355] Call trace:
[   51.476786]  dump_backtrace+0x9c/0x128
[   51.480518]  show_stack+0x20/0x38
[   51.483817]  dump_stack_lvl+0x8c/0xd0
[   51.487463]  print_report+0x118/0x5e0
[   51.491108]  kasan_report+0xc8/0x118
[   51.494667]  kasan_check_range+0x100/0x1a8
[   51.498747]  __kasan_check_write+0x20/0x30
[   51.502827]  kasan_atomics_helper+0x8d8/0x49c8
[   51.507254]  kasan_atomics+0x1a0/0x2e8
[   51.510987]  kunit_try_run_case+0x14c/0x3d0
[   51.515153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.520622]  kthread+0x24c/0x2d0
[   51.523834]  ret_from_fork+0x10/0x20
[   51.527393] 
[   51.528868] Allocated by task 302:
[   51.532253]  kasan_save_stack+0x3c/0x68
[   51.536073]  kasan_save_track+0x20/0x40
[   51.539892]  kasan_save_alloc_info+0x40/0x58
[   51.544145]  __kasan_kmalloc+0xd4/0xd8
[   51.547878]  __kmalloc_cache_noprof+0x144/0x328
[   51.552392]  kasan_atomics+0xb8/0x2e8
[   51.556038]  kunit_try_run_case+0x14c/0x3d0
[   51.560204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.565673]  kthread+0x24c/0x2d0
[   51.568884]  ret_from_fork+0x10/0x20
[   51.572444] 
[   51.573919] The buggy address belongs to the object at ffff000800ddd700
[   51.573919]  which belongs to the cache kmalloc-64 of size 64
[   51.586246] The buggy address is located 0 bytes to the right of
[   51.586246]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.599093] 
[   51.600569] The buggy address belongs to the physical page:
[   51.606124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.614112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.620620] page_type: f5(slab)
[   51.623752] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.631476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.639196] page dumped because: kasan: bad access detected
[   51.644752] 
[   51.646227] Memory state around the buggy address:
[   51.651005]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.658210]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.665414] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.672616]                                      ^
[   51.677393]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.684598]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.691800] ==================================================================
---
[   58.864296] ==================================================================
[   58.871381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   58.878758] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   58.886136] 
[   58.887615] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   58.896731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.900893] Hardware name: WinLink E850-96 board (DT)
[   58.905928] Call trace:
[   58.908358]  dump_backtrace+0x9c/0x128
[   58.912091]  show_stack+0x20/0x38
[   58.915389]  dump_stack_lvl+0x8c/0xd0
[   58.919035]  print_report+0x118/0x5e0
[   58.922681]  kasan_report+0xc8/0x118
[   58.926240]  kasan_check_range+0x100/0x1a8
[   58.930320]  __kasan_check_write+0x20/0x30
[   58.934399]  kasan_atomics_helper+0x1288/0x49c8
[   58.938913]  kasan_atomics+0x1a0/0x2e8
[   58.942645]  kunit_try_run_case+0x14c/0x3d0
[   58.946812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.952281]  kthread+0x24c/0x2d0
[   58.955493]  ret_from_fork+0x10/0x20
[   58.959052] 
[   58.960527] Allocated by task 302:
[   58.963913]  kasan_save_stack+0x3c/0x68
[   58.967732]  kasan_save_track+0x20/0x40
[   58.971552]  kasan_save_alloc_info+0x40/0x58
[   58.975805]  __kasan_kmalloc+0xd4/0xd8
[   58.979538]  __kmalloc_cache_noprof+0x144/0x328
[   58.984051]  kasan_atomics+0xb8/0x2e8
[   58.987697]  kunit_try_run_case+0x14c/0x3d0
[   58.991864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.997332]  kthread+0x24c/0x2d0
[   59.000544]  ret_from_fork+0x10/0x20
[   59.004103] 
[   59.005579] The buggy address belongs to the object at ffff000800ddd700
[   59.005579]  which belongs to the cache kmalloc-64 of size 64
[   59.017905] The buggy address is located 0 bytes to the right of
[   59.017905]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   59.030752] 
[   59.032228] The buggy address belongs to the physical page:
[   59.037784] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   59.045771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.052279] page_type: f5(slab)
[   59.055411] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.063136] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   59.070856] page dumped because: kasan: bad access detected
[   59.076411] 
[   59.077886] Memory state around the buggy address:
[   59.082664]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.089869]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.097074] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.104275]                                      ^
[   59.109053]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.116258]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.123459] ==================================================================

test log snippet test parser 35

Home

[   48.240184] ==================================================================
[   48.247235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   48.254612] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   48.261990] 
[   48.263470] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   48.272585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.276747] Hardware name: WinLink E850-96 board (DT)
[   48.281785] Call trace:
[   48.284212]  dump_backtrace+0x9c/0x128
[   48.287945]  show_stack+0x20/0x38
[   48.291243]  dump_stack_lvl+0x8c/0xd0
[   48.294889]  print_report+0x118/0x5e0
[   48.298535]  kasan_report+0xc8/0x118
[   48.302094]  __asan_report_store4_noabort+0x20/0x30
[   48.306955]  kasan_atomics_helper+0x40fc/0x49c8
[   48.311468]  kasan_atomics+0x1a0/0x2e8
[   48.315201]  kunit_try_run_case+0x14c/0x3d0
[   48.319368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.324836]  kthread+0x24c/0x2d0
[   48.328048]  ret_from_fork+0x10/0x20
[   48.331608] 
[   48.333083] Allocated by task 302:
[   48.336468]  kasan_save_stack+0x3c/0x68
[   48.340288]  kasan_save_track+0x20/0x40
[   48.344107]  kasan_save_alloc_info+0x40/0x58
[   48.348360]  __kasan_kmalloc+0xd4/0xd8
[   48.352093]  __kmalloc_cache_noprof+0x144/0x328
[   48.356607]  kasan_atomics+0xb8/0x2e8
[   48.360252]  kunit_try_run_case+0x14c/0x3d0
[   48.364419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.369888]  kthread+0x24c/0x2d0
[   48.373099]  ret_from_fork+0x10/0x20
[   48.376659] 
[   48.378134] The buggy address belongs to the object at ffff000800ddd700
[   48.378134]  which belongs to the cache kmalloc-64 of size 64
[   48.390461] The buggy address is located 0 bytes to the right of
[   48.390461]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   48.403307] 
[   48.404783] The buggy address belongs to the physical page:
[   48.410339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   48.418327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.424835] page_type: f5(slab)
[   48.427968] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.435691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.443411] page dumped because: kasan: bad access detected
[   48.448966] 
[   48.450442] Memory state around the buggy address:
[   48.455220]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.462424]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.469630] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.476830]                                      ^
[   48.481608]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.488813]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.496014] ==================================================================
---
[   46.649066] ==================================================================
[   46.656117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   46.663490] Write of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   46.670868] 
[   46.672351] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.681467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.685626] Hardware name: WinLink E850-96 board (DT)
[   46.690662] Call trace:
[   46.693090]  dump_backtrace+0x9c/0x128
[   46.696823]  show_stack+0x20/0x38
[   46.700121]  dump_stack_lvl+0x8c/0xd0
[   46.703767]  print_report+0x118/0x5e0
[   46.707413]  kasan_report+0xc8/0x118
[   46.710972]  __asan_report_store4_noabort+0x20/0x30
[   46.715833]  kasan_atomics_helper+0x40e4/0x49c8
[   46.720346]  kasan_atomics+0x1a0/0x2e8
[   46.724079]  kunit_try_run_case+0x14c/0x3d0
[   46.728246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.733715]  kthread+0x24c/0x2d0
[   46.736926]  ret_from_fork+0x10/0x20
[   46.740488] 
[   46.741961] Allocated by task 302:
[   46.745348]  kasan_save_stack+0x3c/0x68
[   46.749165]  kasan_save_track+0x20/0x40
[   46.752985]  kasan_save_alloc_info+0x40/0x58
[   46.757239]  __kasan_kmalloc+0xd4/0xd8
[   46.760971]  __kmalloc_cache_noprof+0x144/0x328
[   46.765485]  kasan_atomics+0xb8/0x2e8
[   46.769131]  kunit_try_run_case+0x14c/0x3d0
[   46.773297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.778766]  kthread+0x24c/0x2d0
[   46.781977]  ret_from_fork+0x10/0x20
[   46.785536] 
[   46.787013] The buggy address belongs to the object at ffff000800ddd700
[   46.787013]  which belongs to the cache kmalloc-64 of size 64
[   46.799338] The buggy address is located 0 bytes to the right of
[   46.799338]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   46.812185] 
[   46.813661] The buggy address belongs to the physical page:
[   46.819217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   46.827204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.833714] page_type: f5(slab)
[   46.836846] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.844569] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   46.852289] page dumped because: kasan: bad access detected
[   46.857844] 
[   46.859320] Memory state around the buggy address:
[   46.864099]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.871302]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.878508] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.885709]                                      ^
[   46.890488]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.897692]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.904892] ==================================================================
---
[   56.469543] ==================================================================
[   56.476625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   56.484002] Write of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   56.491380] 
[   56.492859] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   56.501975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.506137] Hardware name: WinLink E850-96 board (DT)
[   56.511172] Call trace:
[   56.513602]  dump_backtrace+0x9c/0x128
[   56.517335]  show_stack+0x20/0x38
[   56.520633]  dump_stack_lvl+0x8c/0xd0
[   56.524279]  print_report+0x118/0x5e0
[   56.527925]  kasan_report+0xc8/0x118
[   56.531484]  __asan_report_store8_noabort+0x20/0x30
[   56.536345]  kasan_atomics_helper+0x3fc4/0x49c8
[   56.540859]  kasan_atomics+0x1a0/0x2e8
[   56.544591]  kunit_try_run_case+0x14c/0x3d0
[   56.548758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.554227]  kthread+0x24c/0x2d0
[   56.557438]  ret_from_fork+0x10/0x20
[   56.560998] 
[   56.562473] Allocated by task 302:
[   56.565859]  kasan_save_stack+0x3c/0x68
[   56.569678]  kasan_save_track+0x20/0x40
[   56.573497]  kasan_save_alloc_info+0x40/0x58
[   56.577751]  __kasan_kmalloc+0xd4/0xd8
[   56.581483]  __kmalloc_cache_noprof+0x144/0x328
[   56.585997]  kasan_atomics+0xb8/0x2e8
[   56.589643]  kunit_try_run_case+0x14c/0x3d0
[   56.593809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.599278]  kthread+0x24c/0x2d0
[   56.602490]  ret_from_fork+0x10/0x20
[   56.606049] 
[   56.607524] The buggy address belongs to the object at ffff000800ddd700
[   56.607524]  which belongs to the cache kmalloc-64 of size 64
[   56.619851] The buggy address is located 0 bytes to the right of
[   56.619851]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.632698] 
[   56.634174] The buggy address belongs to the physical page:
[   56.639730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.647716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.654225] page_type: f5(slab)
[   56.657357] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.665081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.672801] page dumped because: kasan: bad access detected
[   56.678357] 
[   56.679832] Memory state around the buggy address:
[   56.684610]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.691815]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.699019] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.706221]                                      ^
[   56.710998]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.718203]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.725405] ==================================================================

test log snippet test parser 36

Home

[   46.378870] ==================================================================
[   46.393098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   46.400476] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   46.407766] 
[   46.409250] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.418362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.422522] Hardware name: WinLink E850-96 board (DT)
[   46.427560] Call trace:
[   46.429987]  dump_backtrace+0x9c/0x128
[   46.433719]  show_stack+0x20/0x38
[   46.437018]  dump_stack_lvl+0x8c/0xd0
[   46.440664]  print_report+0x118/0x5e0
[   46.444309]  kasan_report+0xc8/0x118
[   46.447868]  __asan_report_load4_noabort+0x20/0x30
[   46.452642]  kasan_atomics_helper+0x4210/0x49c8
[   46.457156]  kasan_atomics+0x1a0/0x2e8
[   46.460889]  kunit_try_run_case+0x14c/0x3d0
[   46.465055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.470524]  kthread+0x24c/0x2d0
[   46.473736]  ret_from_fork+0x10/0x20
[   46.477298] 
[   46.478772] Allocated by task 302:
[   46.482159]  kasan_save_stack+0x3c/0x68
[   46.485975]  kasan_save_track+0x20/0x40
[   46.489795]  kasan_save_alloc_info+0x40/0x58
[   46.494048]  __kasan_kmalloc+0xd4/0xd8
[   46.497782]  __kmalloc_cache_noprof+0x144/0x328
[   46.502294]  kasan_atomics+0xb8/0x2e8
[   46.505940]  kunit_try_run_case+0x14c/0x3d0
[   46.510107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.515575]  kthread+0x24c/0x2d0
[   46.518787]  ret_from_fork+0x10/0x20
[   46.522346] 
[   46.523823] The buggy address belongs to the object at ffff000800ddd700
[   46.523823]  which belongs to the cache kmalloc-64 of size 64
[   46.536150] The buggy address is located 0 bytes to the right of
[   46.536150]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   46.548994] 
[   46.550474] The buggy address belongs to the physical page:
[   46.556030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   46.564015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.570524] page_type: f5(slab)
[   46.573662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.581380] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   46.589099] page dumped because: kasan: bad access detected
[   46.594655] 
[   46.596129] Memory state around the buggy address:
[   46.600911]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.608112]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.615317] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.622518]                                      ^
[   46.627296]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.634502]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.641702] ==================================================================
---
[   54.881716] ==================================================================
[   54.888802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   54.896178] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.903470] 
[   54.904949] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.914065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.918227] Hardware name: WinLink E850-96 board (DT)
[   54.923262] Call trace:
[   54.925692]  dump_backtrace+0x9c/0x128
[   54.929425]  show_stack+0x20/0x38
[   54.932723]  dump_stack_lvl+0x8c/0xd0
[   54.936369]  print_report+0x118/0x5e0
[   54.940015]  kasan_report+0xc8/0x118
[   54.943574]  __asan_report_load4_noabort+0x20/0x30
[   54.948348]  kasan_atomics_helper+0x3f40/0x49c8
[   54.952862]  kasan_atomics+0x1a0/0x2e8
[   54.956594]  kunit_try_run_case+0x14c/0x3d0
[   54.960761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.966230]  kthread+0x24c/0x2d0
[   54.969441]  ret_from_fork+0x10/0x20
[   54.973001] 
[   54.974476] Allocated by task 302:
[   54.977861]  kasan_save_stack+0x3c/0x68
[   54.981681]  kasan_save_track+0x20/0x40
[   54.985500]  kasan_save_alloc_info+0x40/0x58
[   54.989754]  __kasan_kmalloc+0xd4/0xd8
[   54.993486]  __kmalloc_cache_noprof+0x144/0x328
[   54.998000]  kasan_atomics+0xb8/0x2e8
[   55.001646]  kunit_try_run_case+0x14c/0x3d0
[   55.005812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.011281]  kthread+0x24c/0x2d0
[   55.014493]  ret_from_fork+0x10/0x20
[   55.018052] 
[   55.019527] The buggy address belongs to the object at ffff000800ddd700
[   55.019527]  which belongs to the cache kmalloc-64 of size 64
[   55.031854] The buggy address is located 0 bytes to the right of
[   55.031854]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.044701] 
[   55.046176] The buggy address belongs to the physical page:
[   55.051732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.059720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.066228] page_type: f5(slab)
[   55.069360] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.077084] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.084804] page dumped because: kasan: bad access detected
[   55.090359] 
[   55.091835] Memory state around the buggy address:
[   55.096613]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.103818]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.111022] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.118224]                                      ^
[   55.123001]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.130206]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.137408] ==================================================================
---
[   55.940215] ==================================================================
[   55.947293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   55.954670] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.961961] 
[   55.963440] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.972556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.976718] Hardware name: WinLink E850-96 board (DT)
[   55.981753] Call trace:
[   55.984183]  dump_backtrace+0x9c/0x128
[   55.987916]  show_stack+0x20/0x38
[   55.991214]  dump_stack_lvl+0x8c/0xd0
[   55.994860]  print_report+0x118/0x5e0
[   55.998506]  kasan_report+0xc8/0x118
[   56.002065]  __asan_report_load8_noabort+0x20/0x30
[   56.006839]  kasan_atomics_helper+0x40c0/0x49c8
[   56.011353]  kasan_atomics+0x1a0/0x2e8
[   56.015086]  kunit_try_run_case+0x14c/0x3d0
[   56.019252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.024721]  kthread+0x24c/0x2d0
[   56.027933]  ret_from_fork+0x10/0x20
[   56.031492] 
[   56.032967] Allocated by task 302:
[   56.036353]  kasan_save_stack+0x3c/0x68
[   56.040172]  kasan_save_track+0x20/0x40
[   56.043991]  kasan_save_alloc_info+0x40/0x58
[   56.048245]  __kasan_kmalloc+0xd4/0xd8
[   56.051977]  __kmalloc_cache_noprof+0x144/0x328
[   56.056491]  kasan_atomics+0xb8/0x2e8
[   56.060137]  kunit_try_run_case+0x14c/0x3d0
[   56.064304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.069772]  kthread+0x24c/0x2d0
[   56.072984]  ret_from_fork+0x10/0x20
[   56.076543] 
[   56.078018] The buggy address belongs to the object at ffff000800ddd700
[   56.078018]  which belongs to the cache kmalloc-64 of size 64
[   56.090345] The buggy address is located 0 bytes to the right of
[   56.090345]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   56.103192] 
[   56.104668] The buggy address belongs to the physical page:
[   56.110224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   56.118211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.124719] page_type: f5(slab)
[   56.127851] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.135576] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   56.143295] page dumped because: kasan: bad access detected
[   56.148851] 
[   56.150326] Memory state around the buggy address:
[   56.155104]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.162309]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.169513] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.176715]                                      ^
[   56.181492]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.188697]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.195899] ==================================================================
---
[   62.055217] ==================================================================
[   62.062305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   62.069682] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.076974] 
[   62.078452] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.087568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.091730] Hardware name: WinLink E850-96 board (DT)
[   62.096765] Call trace:
[   62.099196]  dump_backtrace+0x9c/0x128
[   62.102928]  show_stack+0x20/0x38
[   62.106227]  dump_stack_lvl+0x8c/0xd0
[   62.109872]  print_report+0x118/0x5e0
[   62.113518]  kasan_report+0xc8/0x118
[   62.117077]  __asan_report_load8_noabort+0x20/0x30
[   62.121851]  kasan_atomics_helper+0x3f5c/0x49c8
[   62.126365]  kasan_atomics+0x1a0/0x2e8
[   62.130098]  kunit_try_run_case+0x14c/0x3d0
[   62.134265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.139733]  kthread+0x24c/0x2d0
[   62.142945]  ret_from_fork+0x10/0x20
[   62.146505] 
[   62.147979] Allocated by task 302:
[   62.151365]  kasan_save_stack+0x3c/0x68
[   62.155184]  kasan_save_track+0x20/0x40
[   62.159004]  kasan_save_alloc_info+0x40/0x58
[   62.163257]  __kasan_kmalloc+0xd4/0xd8
[   62.166989]  __kmalloc_cache_noprof+0x144/0x328
[   62.171503]  kasan_atomics+0xb8/0x2e8
[   62.175149]  kunit_try_run_case+0x14c/0x3d0
[   62.179316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.184784]  kthread+0x24c/0x2d0
[   62.187996]  ret_from_fork+0x10/0x20
[   62.191555] 
[   62.193031] The buggy address belongs to the object at ffff000800ddd700
[   62.193031]  which belongs to the cache kmalloc-64 of size 64
[   62.205357] The buggy address is located 0 bytes to the right of
[   62.205357]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   62.218204] 
[   62.219680] The buggy address belongs to the physical page:
[   62.225236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   62.233223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.239731] page_type: f5(slab)
[   62.242863] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.250588] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   62.258308] page dumped because: kasan: bad access detected
[   62.263863] 
[   62.265338] Memory state around the buggy address:
[   62.270117]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.277321]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.284526] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.291727]                                      ^
[   62.296505]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.303710]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.310911] ==================================================================
---
[   47.710783] ==================================================================
[   47.717904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   47.725279] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   47.732571] 
[   47.734056] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   47.743165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.747329] Hardware name: WinLink E850-96 board (DT)
[   47.752364] Call trace:
[   47.754793]  dump_backtrace+0x9c/0x128
[   47.758525]  show_stack+0x20/0x38
[   47.761824]  dump_stack_lvl+0x8c/0xd0
[   47.765470]  print_report+0x118/0x5e0
[   47.769115]  kasan_report+0xc8/0x118
[   47.772674]  __asan_report_load4_noabort+0x20/0x30
[   47.777449]  kasan_atomics_helper+0x4264/0x49c8
[   47.781964]  kasan_atomics+0x1a0/0x2e8
[   47.785695]  kunit_try_run_case+0x14c/0x3d0
[   47.789861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.795330]  kthread+0x24c/0x2d0
[   47.798542]  ret_from_fork+0x10/0x20
[   47.802103] 
[   47.803577] Allocated by task 302:
[   47.806963]  kasan_save_stack+0x3c/0x68
[   47.810782]  kasan_save_track+0x20/0x40
[   47.814601]  kasan_save_alloc_info+0x40/0x58
[   47.818854]  __kasan_kmalloc+0xd4/0xd8
[   47.822587]  __kmalloc_cache_noprof+0x144/0x328
[   47.827101]  kasan_atomics+0xb8/0x2e8
[   47.830746]  kunit_try_run_case+0x14c/0x3d0
[   47.834913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.840382]  kthread+0x24c/0x2d0
[   47.843594]  ret_from_fork+0x10/0x20
[   47.847153] 
[   47.848628] The buggy address belongs to the object at ffff000800ddd700
[   47.848628]  which belongs to the cache kmalloc-64 of size 64
[   47.860956] The buggy address is located 0 bytes to the right of
[   47.860956]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   47.873801] 
[   47.875279] The buggy address belongs to the physical page:
[   47.880834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   47.888820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.895330] page_type: f5(slab)
[   47.898463] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.906185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   47.913905] page dumped because: kasan: bad access detected
[   47.919460] 
[   47.920936] Memory state around the buggy address:
[   47.925715]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.932918]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.940124] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.947324]                                      ^
[   47.952102]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.959307]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.966508] ==================================================================
---
[   59.930265] ==================================================================
[   59.937337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   59.944714] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   59.952006] 
[   59.953484] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   59.962600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.966762] Hardware name: WinLink E850-96 board (DT)
[   59.971797] Call trace:
[   59.974228]  dump_backtrace+0x9c/0x128
[   59.977960]  show_stack+0x20/0x38
[   59.981259]  dump_stack_lvl+0x8c/0xd0
[   59.984904]  print_report+0x118/0x5e0
[   59.988550]  kasan_report+0xc8/0x118
[   59.992109]  __asan_report_load8_noabort+0x20/0x30
[   59.996883]  kasan_atomics_helper+0x406c/0x49c8
[   60.001397]  kasan_atomics+0x1a0/0x2e8
[   60.005130]  kunit_try_run_case+0x14c/0x3d0
[   60.009296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.014765]  kthread+0x24c/0x2d0
[   60.017977]  ret_from_fork+0x10/0x20
[   60.021536] 
[   60.023011] Allocated by task 302:
[   60.026397]  kasan_save_stack+0x3c/0x68
[   60.030216]  kasan_save_track+0x20/0x40
[   60.034036]  kasan_save_alloc_info+0x40/0x58
[   60.038289]  __kasan_kmalloc+0xd4/0xd8
[   60.042021]  __kmalloc_cache_noprof+0x144/0x328
[   60.046536]  kasan_atomics+0xb8/0x2e8
[   60.050181]  kunit_try_run_case+0x14c/0x3d0
[   60.054348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.059816]  kthread+0x24c/0x2d0
[   60.063028]  ret_from_fork+0x10/0x20
[   60.066588] 
[   60.068063] The buggy address belongs to the object at ffff000800ddd700
[   60.068063]  which belongs to the cache kmalloc-64 of size 64
[   60.080389] The buggy address is located 0 bytes to the right of
[   60.080389]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   60.093236] 
[   60.094712] The buggy address belongs to the physical page:
[   60.100268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   60.108253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.114763] page_type: f5(slab)
[   60.117896] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.125620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   60.133340] page dumped because: kasan: bad access detected
[   60.138895] 
[   60.140370] Memory state around the buggy address:
[   60.145148]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.152353]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.159558] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.166759]                                      ^
[   60.171537]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.178742]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.185943] ==================================================================
---
[   63.114248] ==================================================================
[   63.121317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   63.128694] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   63.135985] 
[   63.137464] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.146580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.150742] Hardware name: WinLink E850-96 board (DT)
[   63.155777] Call trace:
[   63.158207]  dump_backtrace+0x9c/0x128
[   63.161940]  show_stack+0x20/0x38
[   63.165239]  dump_stack_lvl+0x8c/0xd0
[   63.168884]  print_report+0x118/0x5e0
[   63.172530]  kasan_report+0xc8/0x118
[   63.176089]  __asan_report_load8_noabort+0x20/0x30
[   63.180863]  kasan_atomics_helper+0x3f88/0x49c8
[   63.185377]  kasan_atomics+0x1a0/0x2e8
[   63.189110]  kunit_try_run_case+0x14c/0x3d0
[   63.193276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.198745]  kthread+0x24c/0x2d0
[   63.201957]  ret_from_fork+0x10/0x20
[   63.205518] 
[   63.206991] Allocated by task 302:
[   63.210377]  kasan_save_stack+0x3c/0x68
[   63.214196]  kasan_save_track+0x20/0x40
[   63.218015]  kasan_save_alloc_info+0x40/0x58
[   63.222269]  __kasan_kmalloc+0xd4/0xd8
[   63.226002]  __kmalloc_cache_noprof+0x144/0x328
[   63.230515]  kasan_atomics+0xb8/0x2e8
[   63.234161]  kunit_try_run_case+0x14c/0x3d0
[   63.238328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.243796]  kthread+0x24c/0x2d0
[   63.247008]  ret_from_fork+0x10/0x20
[   63.250569] 
[   63.252043] The buggy address belongs to the object at ffff000800ddd700
[   63.252043]  which belongs to the cache kmalloc-64 of size 64
[   63.264369] The buggy address is located 0 bytes to the right of
[   63.264369]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   63.277216] 
[   63.278691] The buggy address belongs to the physical page:
[   63.284248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   63.292235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.298744] page_type: f5(slab)
[   63.301875] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.309600] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   63.317320] page dumped because: kasan: bad access detected
[   63.322875] 
[   63.324350] Memory state around the buggy address:
[   63.329128]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.336333]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.343538] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.350739]                                      ^
[   63.355517]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.362721]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.369923] ==================================================================
---
[   53.293722] ==================================================================
[   53.300805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   53.308182] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.315473] 
[   53.316953] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.326068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.330230] Hardware name: WinLink E850-96 board (DT)
[   53.335266] Call trace:
[   53.337695]  dump_backtrace+0x9c/0x128
[   53.341428]  show_stack+0x20/0x38
[   53.344726]  dump_stack_lvl+0x8c/0xd0
[   53.348372]  print_report+0x118/0x5e0
[   53.352018]  kasan_report+0xc8/0x118
[   53.355577]  __asan_report_load4_noabort+0x20/0x30
[   53.360351]  kasan_atomics_helper+0x3f34/0x49c8
[   53.364865]  kasan_atomics+0x1a0/0x2e8
[   53.368598]  kunit_try_run_case+0x14c/0x3d0
[   53.372764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.378233]  kthread+0x24c/0x2d0
[   53.381445]  ret_from_fork+0x10/0x20
[   53.385004] 
[   53.386479] Allocated by task 302:
[   53.389865]  kasan_save_stack+0x3c/0x68
[   53.393684]  kasan_save_track+0x20/0x40
[   53.397503]  kasan_save_alloc_info+0x40/0x58
[   53.401757]  __kasan_kmalloc+0xd4/0xd8
[   53.405489]  __kmalloc_cache_noprof+0x144/0x328
[   53.410003]  kasan_atomics+0xb8/0x2e8
[   53.413649]  kunit_try_run_case+0x14c/0x3d0
[   53.417815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.423284]  kthread+0x24c/0x2d0
[   53.426496]  ret_from_fork+0x10/0x20
[   53.430055] 
[   53.431530] The buggy address belongs to the object at ffff000800ddd700
[   53.431530]  which belongs to the cache kmalloc-64 of size 64
[   53.443857] The buggy address is located 0 bytes to the right of
[   53.443857]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.456704] 
[   53.458179] The buggy address belongs to the physical page:
[   53.463735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   53.471722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.478231] page_type: f5(slab)
[   53.481363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.489088] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.496807] page dumped because: kasan: bad access detected
[   53.502363] 
[   53.503838] Memory state around the buggy address:
[   53.508616]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.515821]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.523026] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.530227]                                      ^
[   53.535004]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.542209]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.549411] ==================================================================
---
[   62.584740] ==================================================================
[   62.591811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   62.599188] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   62.606479] 
[   62.607958] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   62.617074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.621236] Hardware name: WinLink E850-96 board (DT)
[   62.626271] Call trace:
[   62.628702]  dump_backtrace+0x9c/0x128
[   62.632434]  show_stack+0x20/0x38
[   62.635732]  dump_stack_lvl+0x8c/0xd0
[   62.639379]  print_report+0x118/0x5e0
[   62.643024]  kasan_report+0xc8/0x118
[   62.646583]  __asan_report_load8_noabort+0x20/0x30
[   62.651357]  kasan_atomics_helper+0x3f78/0x49c8
[   62.655871]  kasan_atomics+0x1a0/0x2e8
[   62.659604]  kunit_try_run_case+0x14c/0x3d0
[   62.663770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.669239]  kthread+0x24c/0x2d0
[   62.672451]  ret_from_fork+0x10/0x20
[   62.676010] 
[   62.677485] Allocated by task 302:
[   62.680871]  kasan_save_stack+0x3c/0x68
[   62.684690]  kasan_save_track+0x20/0x40
[   62.688510]  kasan_save_alloc_info+0x40/0x58
[   62.692763]  __kasan_kmalloc+0xd4/0xd8
[   62.696495]  __kmalloc_cache_noprof+0x144/0x328
[   62.701009]  kasan_atomics+0xb8/0x2e8
[   62.704655]  kunit_try_run_case+0x14c/0x3d0
[   62.708822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.714290]  kthread+0x24c/0x2d0
[   62.717502]  ret_from_fork+0x10/0x20
[   62.721061] 
[   62.722537] The buggy address belongs to the object at ffff000800ddd700
[   62.722537]  which belongs to the cache kmalloc-64 of size 64
[   62.734863] The buggy address is located 0 bytes to the right of
[   62.734863]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   62.747710] 
[   62.749186] The buggy address belongs to the physical page:
[   62.754742] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   62.762728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.769237] page_type: f5(slab)
[   62.772369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.780094] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   62.787814] page dumped because: kasan: bad access detected
[   62.793369] 
[   62.794844] Memory state around the buggy address:
[   62.799622]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.806827]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.814032] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.821233]                                      ^
[   62.826011]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.833215]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.840417] ==================================================================
---
[   53.823031] ==================================================================
[   53.830137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   53.837514] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   53.844805] 
[   53.846284] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   53.855400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.859562] Hardware name: WinLink E850-96 board (DT)
[   53.864597] Call trace:
[   53.867028]  dump_backtrace+0x9c/0x128
[   53.870760]  show_stack+0x20/0x38
[   53.874059]  dump_stack_lvl+0x8c/0xd0
[   53.877705]  print_report+0x118/0x5e0
[   53.881350]  kasan_report+0xc8/0x118
[   53.884909]  __asan_report_load4_noabort+0x20/0x30
[   53.889683]  kasan_atomics_helper+0x3f24/0x49c8
[   53.894197]  kasan_atomics+0x1a0/0x2e8
[   53.897930]  kunit_try_run_case+0x14c/0x3d0
[   53.902097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.907565]  kthread+0x24c/0x2d0
[   53.910777]  ret_from_fork+0x10/0x20
[   53.914336] 
[   53.915811] Allocated by task 302:
[   53.919197]  kasan_save_stack+0x3c/0x68
[   53.923016]  kasan_save_track+0x20/0x40
[   53.926836]  kasan_save_alloc_info+0x40/0x58
[   53.931089]  __kasan_kmalloc+0xd4/0xd8
[   53.934822]  __kmalloc_cache_noprof+0x144/0x328
[   53.939335]  kasan_atomics+0xb8/0x2e8
[   53.942981]  kunit_try_run_case+0x14c/0x3d0
[   53.947148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.952616]  kthread+0x24c/0x2d0
[   53.955828]  ret_from_fork+0x10/0x20
[   53.959387] 
[   53.960863] The buggy address belongs to the object at ffff000800ddd700
[   53.960863]  which belongs to the cache kmalloc-64 of size 64
[   53.973189] The buggy address is located 0 bytes to the right of
[   53.973189]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   53.986036] 
[   53.987512] The buggy address belongs to the physical page:
[   53.993067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.001055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.007563] page_type: f5(slab)
[   54.010695] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.018420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.026140] page dumped because: kasan: bad access detected
[   54.031695] 
[   54.033171] Memory state around the buggy address:
[   54.037949]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.045153]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.052358] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.059559]                                      ^
[   54.064337]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.071542]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.078743] ==================================================================
---
[   51.699141] ==================================================================
[   51.706211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   51.713588] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   51.720879] 
[   51.722358] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   51.731474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.735635] Hardware name: WinLink E850-96 board (DT)
[   51.740671] Call trace:
[   51.743101]  dump_backtrace+0x9c/0x128
[   51.746834]  show_stack+0x20/0x38
[   51.750132]  dump_stack_lvl+0x8c/0xd0
[   51.753778]  print_report+0x118/0x5e0
[   51.757424]  kasan_report+0xc8/0x118
[   51.760983]  __asan_report_load4_noabort+0x20/0x30
[   51.765757]  kasan_atomics_helper+0x4440/0x49c8
[   51.770271]  kasan_atomics+0x1a0/0x2e8
[   51.774003]  kunit_try_run_case+0x14c/0x3d0
[   51.778170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.783639]  kthread+0x24c/0x2d0
[   51.786851]  ret_from_fork+0x10/0x20
[   51.790410] 
[   51.791885] Allocated by task 302:
[   51.795270]  kasan_save_stack+0x3c/0x68
[   51.799090]  kasan_save_track+0x20/0x40
[   51.802909]  kasan_save_alloc_info+0x40/0x58
[   51.807163]  __kasan_kmalloc+0xd4/0xd8
[   51.810895]  __kmalloc_cache_noprof+0x144/0x328
[   51.815409]  kasan_atomics+0xb8/0x2e8
[   51.819055]  kunit_try_run_case+0x14c/0x3d0
[   51.823221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.828690]  kthread+0x24c/0x2d0
[   51.831902]  ret_from_fork+0x10/0x20
[   51.835461] 
[   51.836936] The buggy address belongs to the object at ffff000800ddd700
[   51.836936]  which belongs to the cache kmalloc-64 of size 64
[   51.849263] The buggy address is located 0 bytes to the right of
[   51.849263]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   51.862110] 
[   51.863585] The buggy address belongs to the physical page:
[   51.869141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   51.877129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.883637] page_type: f5(slab)
[   51.886769] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.894493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   51.902213] page dumped because: kasan: bad access detected
[   51.907769] 
[   51.909244] Memory state around the buggy address:
[   51.914022]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.921227]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.928432] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.935633]                                      ^
[   51.940410]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.947615]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.954816] ==================================================================
---
[   55.411026] ==================================================================
[   55.418135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   55.425511] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   55.432802] 
[   55.434282] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   55.443397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.447559] Hardware name: WinLink E850-96 board (DT)
[   55.452594] Call trace:
[   55.455025]  dump_backtrace+0x9c/0x128
[   55.458757]  show_stack+0x20/0x38
[   55.462056]  dump_stack_lvl+0x8c/0xd0
[   55.465702]  print_report+0x118/0x5e0
[   55.469347]  kasan_report+0xc8/0x118
[   55.472906]  __asan_report_load4_noabort+0x20/0x30
[   55.477680]  kasan_atomics_helper+0x3f6c/0x49c8
[   55.482194]  kasan_atomics+0x1a0/0x2e8
[   55.485927]  kunit_try_run_case+0x14c/0x3d0
[   55.490093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.495562]  kthread+0x24c/0x2d0
[   55.498774]  ret_from_fork+0x10/0x20
[   55.502333] 
[   55.503808] Allocated by task 302:
[   55.507194]  kasan_save_stack+0x3c/0x68
[   55.511013]  kasan_save_track+0x20/0x40
[   55.514833]  kasan_save_alloc_info+0x40/0x58
[   55.519086]  __kasan_kmalloc+0xd4/0xd8
[   55.522819]  __kmalloc_cache_noprof+0x144/0x328
[   55.527332]  kasan_atomics+0xb8/0x2e8
[   55.530978]  kunit_try_run_case+0x14c/0x3d0
[   55.535145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.540613]  kthread+0x24c/0x2d0
[   55.543825]  ret_from_fork+0x10/0x20
[   55.547384] 
[   55.548860] The buggy address belongs to the object at ffff000800ddd700
[   55.548860]  which belongs to the cache kmalloc-64 of size 64
[   55.561186] The buggy address is located 0 bytes to the right of
[   55.561186]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   55.574033] 
[   55.575509] The buggy address belongs to the physical page:
[   55.581065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   55.589052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.595560] page_type: f5(slab)
[   55.598692] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.606417] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   55.614137] page dumped because: kasan: bad access detected
[   55.619692] 
[   55.621168] Memory state around the buggy address:
[   55.625946]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.633150]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.640355] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.647556]                                      ^
[   55.652334]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.659538]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.666740] ==================================================================
---
[   61.525726] ==================================================================
[   61.532799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   61.540176] Read of size 8 at addr ffff000800ddd730 by task kunit_try_catch/302
[   61.547468] 
[   61.548946] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   61.558062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.562224] Hardware name: WinLink E850-96 board (DT)
[   61.567259] Call trace:
[   61.569690]  dump_backtrace+0x9c/0x128
[   61.573422]  show_stack+0x20/0x38
[   61.576721]  dump_stack_lvl+0x8c/0xd0
[   61.580367]  print_report+0x118/0x5e0
[   61.584012]  kasan_report+0xc8/0x118
[   61.587571]  __asan_report_load8_noabort+0x20/0x30
[   61.592345]  kasan_atomics_helper+0x3f18/0x49c8
[   61.596859]  kasan_atomics+0x1a0/0x2e8
[   61.600592]  kunit_try_run_case+0x14c/0x3d0
[   61.604758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.610227]  kthread+0x24c/0x2d0
[   61.613439]  ret_from_fork+0x10/0x20
[   61.616999] 
[   61.618473] Allocated by task 302:
[   61.621859]  kasan_save_stack+0x3c/0x68
[   61.625678]  kasan_save_track+0x20/0x40
[   61.629498]  kasan_save_alloc_info+0x40/0x58
[   61.633751]  __kasan_kmalloc+0xd4/0xd8
[   61.637484]  __kmalloc_cache_noprof+0x144/0x328
[   61.641998]  kasan_atomics+0xb8/0x2e8
[   61.645643]  kunit_try_run_case+0x14c/0x3d0
[   61.649810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.655278]  kthread+0x24c/0x2d0
[   61.658490]  ret_from_fork+0x10/0x20
[   61.662049] 
[   61.663525] The buggy address belongs to the object at ffff000800ddd700
[   61.663525]  which belongs to the cache kmalloc-64 of size 64
[   61.675851] The buggy address is located 0 bytes to the right of
[   61.675851]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   61.688698] 
[   61.690174] The buggy address belongs to the physical page:
[   61.695730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   61.703717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.710225] page_type: f5(slab)
[   61.713359] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.721082] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   61.728802] page dumped because: kasan: bad access detected
[   61.734357] 
[   61.735833] Memory state around the buggy address:
[   61.740611]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.747815]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.755020] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.762221]                                      ^
[   61.766999]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.774204]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.781405] ==================================================================
---
[   54.352386] ==================================================================
[   54.359469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   54.366847] Read of size 4 at addr ffff000800ddd730 by task kunit_try_catch/302
[   54.374138] 
[   54.375617] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   54.384733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.388894] Hardware name: WinLink E850-96 board (DT)
[   54.393930] Call trace:
[   54.396360]  dump_backtrace+0x9c/0x128
[   54.400092]  show_stack+0x20/0x38
[   54.403391]  dump_stack_lvl+0x8c/0xd0
[   54.407036]  print_report+0x118/0x5e0
[   54.410682]  kasan_report+0xc8/0x118
[   54.414242]  __asan_report_load4_noabort+0x20/0x30
[   54.419016]  kasan_atomics_helper+0x3f4c/0x49c8
[   54.423530]  kasan_atomics+0x1a0/0x2e8
[   54.427262]  kunit_try_run_case+0x14c/0x3d0
[   54.431428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.436897]  kthread+0x24c/0x2d0
[   54.440109]  ret_from_fork+0x10/0x20
[   54.443670] 
[   54.445144] Allocated by task 302:
[   54.448529]  kasan_save_stack+0x3c/0x68
[   54.452348]  kasan_save_track+0x20/0x40
[   54.456168]  kasan_save_alloc_info+0x40/0x58
[   54.460421]  __kasan_kmalloc+0xd4/0xd8
[   54.464154]  __kmalloc_cache_noprof+0x144/0x328
[   54.468667]  kasan_atomics+0xb8/0x2e8
[   54.472313]  kunit_try_run_case+0x14c/0x3d0
[   54.476480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.481949]  kthread+0x24c/0x2d0
[   54.485160]  ret_from_fork+0x10/0x20
[   54.488720] 
[   54.490195] The buggy address belongs to the object at ffff000800ddd700
[   54.490195]  which belongs to the cache kmalloc-64 of size 64
[   54.502522] The buggy address is located 0 bytes to the right of
[   54.502522]  allocated 48-byte region [ffff000800ddd700, ffff000800ddd730)
[   54.515368] 
[   54.516844] The buggy address belongs to the physical page:
[   54.522402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   54.530387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.536896] page_type: f5(slab)
[   54.540028] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.547752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.555472] page dumped because: kasan: bad access detected
[   54.561027] 
[   54.562503] Memory state around the buggy address:
[   54.567281]  ffff000800ddd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.574485]  ffff000800ddd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.581690] >ffff000800ddd700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.588891]                                      ^
[   54.593669]  ffff000800ddd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.600874]  ffff000800ddd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.608075] ==================================================================

test log snippet test parser 37

Home

[   41.552125] ==================================================================
[   41.559143] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   41.567300] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   41.574590] 
[   41.576074] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.585187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.589348] Hardware name: WinLink E850-96 board (DT)
[   41.594386] Call trace:
[   41.596813]  dump_backtrace+0x9c/0x128
[   41.600545]  show_stack+0x20/0x38
[   41.603844]  dump_stack_lvl+0x8c/0xd0
[   41.607489]  print_report+0x118/0x5e0
[   41.611135]  kasan_report+0xc8/0x118
[   41.614694]  __asan_report_load8_noabort+0x20/0x30
[   41.619468]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   41.624763]  kasan_bitops_generic+0x114/0x1d0
[   41.629103]  kunit_try_run_case+0x14c/0x3d0
[   41.633270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.638739]  kthread+0x24c/0x2d0
[   41.641950]  ret_from_fork+0x10/0x20
[   41.645510] 
[   41.646985] Allocated by task 298:
[   41.650372]  kasan_save_stack+0x3c/0x68
[   41.654190]  kasan_save_track+0x20/0x40
[   41.658009]  kasan_save_alloc_info+0x40/0x58
[   41.662263]  __kasan_kmalloc+0xd4/0xd8
[   41.665995]  __kmalloc_cache_noprof+0x144/0x328
[   41.670509]  kasan_bitops_generic+0xa0/0x1d0
[   41.674762]  kunit_try_run_case+0x14c/0x3d0
[   41.678929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.684399]  kthread+0x24c/0x2d0
[   41.687610]  ret_from_fork+0x10/0x20
[   41.691169] 
[   41.692644] The buggy address belongs to the object at ffff000801ef7020
[   41.692644]  which belongs to the cache kmalloc-16 of size 16
[   41.704970] The buggy address is located 8 bytes inside of
[   41.704970]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   41.717210] 
[   41.718687] The buggy address belongs to the physical page:
[   41.724243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   41.732230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.738737] page_type: f5(slab)
[   41.741872] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.749594] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   41.757313] page dumped because: kasan: bad access detected
[   41.762869] 
[   41.764344] Memory state around the buggy address:
[   41.769124]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.776327]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.783533] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.790733]                                   ^
[   41.795250]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.802455]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.809656] ==================================================================
[   41.281663] ==================================================================
[   41.290744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   41.298902] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   41.306280] 
[   41.307764] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.316875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.321037] Hardware name: WinLink E850-96 board (DT)
[   41.326073] Call trace:
[   41.328502]  dump_backtrace+0x9c/0x128
[   41.332234]  show_stack+0x20/0x38
[   41.335532]  dump_stack_lvl+0x8c/0xd0
[   41.339177]  print_report+0x118/0x5e0
[   41.342823]  kasan_report+0xc8/0x118
[   41.346382]  kasan_check_range+0x100/0x1a8
[   41.350462]  __kasan_check_write+0x20/0x30
[   41.354542]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   41.359838]  kasan_bitops_generic+0x114/0x1d0
[   41.364177]  kunit_try_run_case+0x14c/0x3d0
[   41.368344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.373812]  kthread+0x24c/0x2d0
[   41.377024]  ret_from_fork+0x10/0x20
[   41.380586] 
[   41.382059] Allocated by task 298:
[   41.385447]  kasan_save_stack+0x3c/0x68
[   41.389263]  kasan_save_track+0x20/0x40
[   41.393083]  kasan_save_alloc_info+0x40/0x58
[   41.397336]  __kasan_kmalloc+0xd4/0xd8
[   41.401069]  __kmalloc_cache_noprof+0x144/0x328
[   41.405583]  kasan_bitops_generic+0xa0/0x1d0
[   41.409836]  kunit_try_run_case+0x14c/0x3d0
[   41.414003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.419472]  kthread+0x24c/0x2d0
[   41.422683]  ret_from_fork+0x10/0x20
[   41.426242] 
[   41.427718] The buggy address belongs to the object at ffff000801ef7020
[   41.427718]  which belongs to the cache kmalloc-16 of size 16
[   41.440047] The buggy address is located 8 bytes inside of
[   41.440047]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   41.452283] 
[   41.453761] The buggy address belongs to the physical page:
[   41.459319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   41.467303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.473812] page_type: f5(slab)
[   41.476949] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.484667] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   41.492387] page dumped because: kasan: bad access detected
[   41.497942] 
[   41.499418] Memory state around the buggy address:
[   41.504199]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.511400]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.518606] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.525806]                                   ^
[   41.530324]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.537528]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.544730] ==================================================================
[   41.817003] ==================================================================
[   41.824071] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   41.832226] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   41.839604] 
[   41.841087] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.850201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.854362] Hardware name: WinLink E850-96 board (DT)
[   41.859398] Call trace:
[   41.861827]  dump_backtrace+0x9c/0x128
[   41.865558]  show_stack+0x20/0x38
[   41.868857]  dump_stack_lvl+0x8c/0xd0
[   41.872503]  print_report+0x118/0x5e0
[   41.876148]  kasan_report+0xc8/0x118
[   41.879707]  kasan_check_range+0x100/0x1a8
[   41.883787]  __kasan_check_write+0x20/0x30
[   41.887867]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   41.893162]  kasan_bitops_generic+0x114/0x1d0
[   41.897502]  kunit_try_run_case+0x14c/0x3d0
[   41.901669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.907139]  kthread+0x24c/0x2d0
[   41.910349]  ret_from_fork+0x10/0x20
[   41.913909] 
[   41.915385] Allocated by task 298:
[   41.918771]  kasan_save_stack+0x3c/0x68
[   41.922588]  kasan_save_track+0x20/0x40
[   41.926408]  kasan_save_alloc_info+0x40/0x58
[   41.930662]  __kasan_kmalloc+0xd4/0xd8
[   41.934394]  __kmalloc_cache_noprof+0x144/0x328
[   41.938908]  kasan_bitops_generic+0xa0/0x1d0
[   41.943161]  kunit_try_run_case+0x14c/0x3d0
[   41.947328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.952796]  kthread+0x24c/0x2d0
[   41.956008]  ret_from_fork+0x10/0x20
[   41.959567] 
[   41.961043] The buggy address belongs to the object at ffff000801ef7020
[   41.961043]  which belongs to the cache kmalloc-16 of size 16
[   41.973371] The buggy address is located 8 bytes inside of
[   41.973371]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   41.985609] 
[   41.987086] The buggy address belongs to the physical page:
[   41.992643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.000628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.007136] page_type: f5(slab)
[   42.010272] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.017993] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.025712] page dumped because: kasan: bad access detected
[   42.031267] 
[   42.032743] Memory state around the buggy address:
[   42.037522]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.044726]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.051931] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.059132]                                   ^
[   42.063649]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.070853]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.078055] ==================================================================
[   42.887184] ==================================================================
[   42.894196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   42.902348] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.909640] 
[   42.911121] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.920236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.924397] Hardware name: WinLink E850-96 board (DT)
[   42.929431] Call trace:
[   42.931862]  dump_backtrace+0x9c/0x128
[   42.935594]  show_stack+0x20/0x38
[   42.938893]  dump_stack_lvl+0x8c/0xd0
[   42.942539]  print_report+0x118/0x5e0
[   42.946185]  kasan_report+0xc8/0x118
[   42.949744]  __asan_report_load8_noabort+0x20/0x30
[   42.954517]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   42.959814]  kasan_bitops_generic+0x114/0x1d0
[   42.964154]  kunit_try_run_case+0x14c/0x3d0
[   42.968320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.973790]  kthread+0x24c/0x2d0
[   42.977000]  ret_from_fork+0x10/0x20
[   42.980561] 
[   42.982036] Allocated by task 298:
[   42.985421]  kasan_save_stack+0x3c/0x68
[   42.989239]  kasan_save_track+0x20/0x40
[   42.993059]  kasan_save_alloc_info+0x40/0x58
[   42.997312]  __kasan_kmalloc+0xd4/0xd8
[   43.001045]  __kmalloc_cache_noprof+0x144/0x328
[   43.005558]  kasan_bitops_generic+0xa0/0x1d0
[   43.009812]  kunit_try_run_case+0x14c/0x3d0
[   43.013979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.019447]  kthread+0x24c/0x2d0
[   43.022659]  ret_from_fork+0x10/0x20
[   43.026218] 
[   43.027695] The buggy address belongs to the object at ffff000801ef7020
[   43.027695]  which belongs to the cache kmalloc-16 of size 16
[   43.040021] The buggy address is located 8 bytes inside of
[   43.040021]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.052259] 
[   43.053736] The buggy address belongs to the physical page:
[   43.059294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.067279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.073786] page_type: f5(slab)
[   43.076922] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.084643] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.092363] page dumped because: kasan: bad access detected
[   43.097918] 
[   43.099394] Memory state around the buggy address:
[   43.104174]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.111376]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.118582] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.125782]                                   ^
[   43.130300]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.137504]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.144706] ==================================================================
[   42.350280] ==================================================================
[   42.357396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   42.365551] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.372930] 
[   42.374412] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.383525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.387687] Hardware name: WinLink E850-96 board (DT)
[   42.392724] Call trace:
[   42.395153]  dump_backtrace+0x9c/0x128
[   42.398884]  show_stack+0x20/0x38
[   42.402182]  dump_stack_lvl+0x8c/0xd0
[   42.405828]  print_report+0x118/0x5e0
[   42.409474]  kasan_report+0xc8/0x118
[   42.413033]  kasan_check_range+0x100/0x1a8
[   42.417112]  __kasan_check_write+0x20/0x30
[   42.421192]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   42.426489]  kasan_bitops_generic+0x114/0x1d0
[   42.430829]  kunit_try_run_case+0x14c/0x3d0
[   42.434994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.440464]  kthread+0x24c/0x2d0
[   42.443675]  ret_from_fork+0x10/0x20
[   42.447236] 
[   42.448711] Allocated by task 298:
[   42.452096]  kasan_save_stack+0x3c/0x68
[   42.455914]  kasan_save_track+0x20/0x40
[   42.459733]  kasan_save_alloc_info+0x40/0x58
[   42.463987]  __kasan_kmalloc+0xd4/0xd8
[   42.467719]  __kmalloc_cache_noprof+0x144/0x328
[   42.472233]  kasan_bitops_generic+0xa0/0x1d0
[   42.476486]  kunit_try_run_case+0x14c/0x3d0
[   42.480653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.486123]  kthread+0x24c/0x2d0
[   42.489334]  ret_from_fork+0x10/0x20
[   42.492893] 
[   42.494368] The buggy address belongs to the object at ffff000801ef7020
[   42.494368]  which belongs to the cache kmalloc-16 of size 16
[   42.506697] The buggy address is located 8 bytes inside of
[   42.506697]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   42.518934] 
[   42.520411] The buggy address belongs to the physical page:
[   42.525969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.533953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.540461] page_type: f5(slab)
[   42.543596] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.551318] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.559038] page dumped because: kasan: bad access detected
[   42.564593] 
[   42.566068] Memory state around the buggy address:
[   42.570848]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.578051]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.585256] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.592457]                                   ^
[   42.596974]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.604179]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.611380] ==================================================================
[   42.085378] ==================================================================
[   42.092469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   42.100624] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.107916] 
[   42.109397] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.118513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.122674] Hardware name: WinLink E850-96 board (DT)
[   42.127709] Call trace:
[   42.130138]  dump_backtrace+0x9c/0x128
[   42.133870]  show_stack+0x20/0x38
[   42.137169]  dump_stack_lvl+0x8c/0xd0
[   42.140815]  print_report+0x118/0x5e0
[   42.144460]  kasan_report+0xc8/0x118
[   42.148019]  __asan_report_load8_noabort+0x20/0x30
[   42.152794]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   42.158089]  kasan_bitops_generic+0x114/0x1d0
[   42.162429]  kunit_try_run_case+0x14c/0x3d0
[   42.166595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.172064]  kthread+0x24c/0x2d0
[   42.175276]  ret_from_fork+0x10/0x20
[   42.178835] 
[   42.180310] Allocated by task 298:
[   42.183696]  kasan_save_stack+0x3c/0x68
[   42.187515]  kasan_save_track+0x20/0x40
[   42.191335]  kasan_save_alloc_info+0x40/0x58
[   42.195588]  __kasan_kmalloc+0xd4/0xd8
[   42.199321]  __kmalloc_cache_noprof+0x144/0x328
[   42.203834]  kasan_bitops_generic+0xa0/0x1d0
[   42.208088]  kunit_try_run_case+0x14c/0x3d0
[   42.212255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.217723]  kthread+0x24c/0x2d0
[   42.220935]  ret_from_fork+0x10/0x20
[   42.224494] 
[   42.225969] The buggy address belongs to the object at ffff000801ef7020
[   42.225969]  which belongs to the cache kmalloc-16 of size 16
[   42.238299] The buggy address is located 8 bytes inside of
[   42.238299]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   42.250535] 
[   42.252012] The buggy address belongs to the physical page:
[   42.257568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.265554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.272064] page_type: f5(slab)
[   42.275196] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.282919] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.290639] page dumped because: kasan: bad access detected
[   42.296194] 
[   42.297670] Memory state around the buggy address:
[   42.302448]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.309653]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.316857] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.324058]                                   ^
[   42.328575]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.335780]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.342982] ==================================================================
[   42.618729] ==================================================================
[   42.625793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   42.633949] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.641328] 
[   42.642810] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.651926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.656084] Hardware name: WinLink E850-96 board (DT)
[   42.661121] Call trace:
[   42.663550]  dump_backtrace+0x9c/0x128
[   42.667283]  show_stack+0x20/0x38
[   42.670581]  dump_stack_lvl+0x8c/0xd0
[   42.674227]  print_report+0x118/0x5e0
[   42.677873]  kasan_report+0xc8/0x118
[   42.681432]  kasan_check_range+0x100/0x1a8
[   42.685511]  __kasan_check_write+0x20/0x30
[   42.689591]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   42.694888]  kasan_bitops_generic+0x114/0x1d0
[   42.699228]  kunit_try_run_case+0x14c/0x3d0
[   42.703393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.708863]  kthread+0x24c/0x2d0
[   42.712073]  ret_from_fork+0x10/0x20
[   42.715633] 
[   42.717108] Allocated by task 298:
[   42.720493]  kasan_save_stack+0x3c/0x68
[   42.724313]  kasan_save_track+0x20/0x40
[   42.728132]  kasan_save_alloc_info+0x40/0x58
[   42.732386]  __kasan_kmalloc+0xd4/0xd8
[   42.736118]  __kmalloc_cache_noprof+0x144/0x328
[   42.740632]  kasan_bitops_generic+0xa0/0x1d0
[   42.744885]  kunit_try_run_case+0x14c/0x3d0
[   42.749052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.754522]  kthread+0x24c/0x2d0
[   42.757733]  ret_from_fork+0x10/0x20
[   42.761291] 
[   42.762767] The buggy address belongs to the object at ffff000801ef7020
[   42.762767]  which belongs to the cache kmalloc-16 of size 16
[   42.775095] The buggy address is located 8 bytes inside of
[   42.775095]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   42.787332] 
[   42.788810] The buggy address belongs to the physical page:
[   42.794366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.802352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.808860] page_type: f5(slab)
[   42.811995] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.819716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.827436] page dumped because: kasan: bad access detected
[   42.832991] 
[   42.834467] Memory state around the buggy address:
[   42.839248]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.846450]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.853656] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.860856]                                   ^
[   42.865373]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.872578]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.879779] ==================================================================
[   43.688866] ==================================================================
[   43.695919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   43.704073] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.711364] 
[   43.712845] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.721962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.726120] Hardware name: WinLink E850-96 board (DT)
[   43.731157] Call trace:
[   43.733586]  dump_backtrace+0x9c/0x128
[   43.737318]  show_stack+0x20/0x38
[   43.740617]  dump_stack_lvl+0x8c/0xd0
[   43.744263]  print_report+0x118/0x5e0
[   43.747908]  kasan_report+0xc8/0x118
[   43.751468]  __asan_report_load8_noabort+0x20/0x30
[   43.756242]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   43.761537]  kasan_bitops_generic+0x114/0x1d0
[   43.765877]  kunit_try_run_case+0x14c/0x3d0
[   43.770043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.775514]  kthread+0x24c/0x2d0
[   43.778724]  ret_from_fork+0x10/0x20
[   43.782284] 
[   43.783759] Allocated by task 298:
[   43.787145]  kasan_save_stack+0x3c/0x68
[   43.790963]  kasan_save_track+0x20/0x40
[   43.794783]  kasan_save_alloc_info+0x40/0x58
[   43.799036]  __kasan_kmalloc+0xd4/0xd8
[   43.802769]  __kmalloc_cache_noprof+0x144/0x328
[   43.807283]  kasan_bitops_generic+0xa0/0x1d0
[   43.811536]  kunit_try_run_case+0x14c/0x3d0
[   43.815702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.821171]  kthread+0x24c/0x2d0
[   43.824383]  ret_from_fork+0x10/0x20
[   43.827942] 
[   43.829418] The buggy address belongs to the object at ffff000801ef7020
[   43.829418]  which belongs to the cache kmalloc-16 of size 16
[   43.841746] The buggy address is located 8 bytes inside of
[   43.841746]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.853983] 
[   43.855459] The buggy address belongs to the physical page:
[   43.861018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.869003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.875511] page_type: f5(slab)
[   43.878643] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.886367] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.894087] page dumped because: kasan: bad access detected
[   43.899642] 
[   43.901118] Memory state around the buggy address:
[   43.905895]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.913100]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.920305] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.927506]                                   ^
[   43.932024]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.939228]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.946430] ==================================================================
[   43.420455] ==================================================================
[   43.427517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   43.435674] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.443052] 
[   43.444533] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.453647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.457808] Hardware name: WinLink E850-96 board (DT)
[   43.462845] Call trace:
[   43.465274]  dump_backtrace+0x9c/0x128
[   43.469006]  show_stack+0x20/0x38
[   43.472305]  dump_stack_lvl+0x8c/0xd0
[   43.475951]  print_report+0x118/0x5e0
[   43.479597]  kasan_report+0xc8/0x118
[   43.483156]  kasan_check_range+0x100/0x1a8
[   43.487235]  __kasan_check_write+0x20/0x30
[   43.491315]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   43.496610]  kasan_bitops_generic+0x114/0x1d0
[   43.500951]  kunit_try_run_case+0x14c/0x3d0
[   43.505117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.510587]  kthread+0x24c/0x2d0
[   43.513798]  ret_from_fork+0x10/0x20
[   43.517357] 
[   43.518832] Allocated by task 298:
[   43.522217]  kasan_save_stack+0x3c/0x68
[   43.526037]  kasan_save_track+0x20/0x40
[   43.529856]  kasan_save_alloc_info+0x40/0x58
[   43.534110]  __kasan_kmalloc+0xd4/0xd8
[   43.537842]  __kmalloc_cache_noprof+0x144/0x328
[   43.542356]  kasan_bitops_generic+0xa0/0x1d0
[   43.546609]  kunit_try_run_case+0x14c/0x3d0
[   43.550776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.556245]  kthread+0x24c/0x2d0
[   43.559457]  ret_from_fork+0x10/0x20
[   43.563015] 
[   43.564491] The buggy address belongs to the object at ffff000801ef7020
[   43.564491]  which belongs to the cache kmalloc-16 of size 16
[   43.576818] The buggy address is located 8 bytes inside of
[   43.576818]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.589057] 
[   43.590534] The buggy address belongs to the physical page:
[   43.596091] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.604077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.610586] page_type: f5(slab)
[   43.613718] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.621441] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.629160] page dumped because: kasan: bad access detected
[   43.634716] 
[   43.636191] Memory state around the buggy address:
[   43.640971]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.648173]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.655380] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.662580]                                   ^
[   43.667097]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.674302]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.681503] ==================================================================
[   43.152067] ==================================================================
[   43.159119] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   43.167275] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.174653] 
[   43.176137] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.185249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.189410] Hardware name: WinLink E850-96 board (DT)
[   43.194446] Call trace:
[   43.196875]  dump_backtrace+0x9c/0x128
[   43.200608]  show_stack+0x20/0x38
[   43.203906]  dump_stack_lvl+0x8c/0xd0
[   43.207552]  print_report+0x118/0x5e0
[   43.211198]  kasan_report+0xc8/0x118
[   43.214758]  kasan_check_range+0x100/0x1a8
[   43.218837]  __kasan_check_write+0x20/0x30
[   43.222917]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   43.228213]  kasan_bitops_generic+0x114/0x1d0
[   43.232553]  kunit_try_run_case+0x14c/0x3d0
[   43.236718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.242188]  kthread+0x24c/0x2d0
[   43.245399]  ret_from_fork+0x10/0x20
[   43.248958] 
[   43.250433] Allocated by task 298:
[   43.253819]  kasan_save_stack+0x3c/0x68
[   43.257638]  kasan_save_track+0x20/0x40
[   43.261458]  kasan_save_alloc_info+0x40/0x58
[   43.265711]  __kasan_kmalloc+0xd4/0xd8
[   43.269444]  __kmalloc_cache_noprof+0x144/0x328
[   43.273957]  kasan_bitops_generic+0xa0/0x1d0
[   43.278211]  kunit_try_run_case+0x14c/0x3d0
[   43.282377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.287846]  kthread+0x24c/0x2d0
[   43.291058]  ret_from_fork+0x10/0x20
[   43.294616] 
[   43.296092] The buggy address belongs to the object at ffff000801ef7020
[   43.296092]  which belongs to the cache kmalloc-16 of size 16
[   43.308420] The buggy address is located 8 bytes inside of
[   43.308420]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.320658] 
[   43.322134] The buggy address belongs to the physical page:
[   43.327691] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.335678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.342185] page_type: f5(slab)
[   43.345319] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.353042] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.360761] page dumped because: kasan: bad access detected
[   43.366317] 
[   43.367792] Memory state around the buggy address:
[   43.372572]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.379775]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.386981] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.394181]                                   ^
[   43.398698]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.405903]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.413104] ==================================================================

test log snippet test parser 38

Home

[   41.281663] ==================================================================
[   41.290744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   41.298902] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   41.306280] 
[   41.307764] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.316875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.321037] Hardware name: WinLink E850-96 board (DT)
[   41.326073] Call trace:
[   41.328502]  dump_backtrace+0x9c/0x128
[   41.332234]  show_stack+0x20/0x38
[   41.335532]  dump_stack_lvl+0x8c/0xd0
[   41.339177]  print_report+0x118/0x5e0
[   41.342823]  kasan_report+0xc8/0x118
[   41.346382]  kasan_check_range+0x100/0x1a8
[   41.350462]  __kasan_check_write+0x20/0x30
[   41.354542]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   41.359838]  kasan_bitops_generic+0x114/0x1d0
[   41.364177]  kunit_try_run_case+0x14c/0x3d0
[   41.368344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.373812]  kthread+0x24c/0x2d0
[   41.377024]  ret_from_fork+0x10/0x20
[   41.380586] 
[   41.382059] Allocated by task 298:
[   41.385447]  kasan_save_stack+0x3c/0x68
[   41.389263]  kasan_save_track+0x20/0x40
[   41.393083]  kasan_save_alloc_info+0x40/0x58
[   41.397336]  __kasan_kmalloc+0xd4/0xd8
[   41.401069]  __kmalloc_cache_noprof+0x144/0x328
[   41.405583]  kasan_bitops_generic+0xa0/0x1d0
[   41.409836]  kunit_try_run_case+0x14c/0x3d0
[   41.414003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.419472]  kthread+0x24c/0x2d0
[   41.422683]  ret_from_fork+0x10/0x20
[   41.426242] 
[   41.427718] The buggy address belongs to the object at ffff000801ef7020
[   41.427718]  which belongs to the cache kmalloc-16 of size 16
[   41.440047] The buggy address is located 8 bytes inside of
[   41.440047]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   41.452283] 
[   41.453761] The buggy address belongs to the physical page:
[   41.459319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   41.467303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.473812] page_type: f5(slab)
[   41.476949] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.484667] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   41.492387] page dumped because: kasan: bad access detected
[   41.497942] 
[   41.499418] Memory state around the buggy address:
[   41.504199]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.511400]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.518606] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.525806]                                   ^
[   41.530324]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.537528]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.544730] ==================================================================
---
[   41.817003] ==================================================================
[   41.824071] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   41.832226] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   41.839604] 
[   41.841087] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.850201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.854362] Hardware name: WinLink E850-96 board (DT)
[   41.859398] Call trace:
[   41.861827]  dump_backtrace+0x9c/0x128
[   41.865558]  show_stack+0x20/0x38
[   41.868857]  dump_stack_lvl+0x8c/0xd0
[   41.872503]  print_report+0x118/0x5e0
[   41.876148]  kasan_report+0xc8/0x118
[   41.879707]  kasan_check_range+0x100/0x1a8
[   41.883787]  __kasan_check_write+0x20/0x30
[   41.887867]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   41.893162]  kasan_bitops_generic+0x114/0x1d0
[   41.897502]  kunit_try_run_case+0x14c/0x3d0
[   41.901669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.907139]  kthread+0x24c/0x2d0
[   41.910349]  ret_from_fork+0x10/0x20
[   41.913909] 
[   41.915385] Allocated by task 298:
[   41.918771]  kasan_save_stack+0x3c/0x68
[   41.922588]  kasan_save_track+0x20/0x40
[   41.926408]  kasan_save_alloc_info+0x40/0x58
[   41.930662]  __kasan_kmalloc+0xd4/0xd8
[   41.934394]  __kmalloc_cache_noprof+0x144/0x328
[   41.938908]  kasan_bitops_generic+0xa0/0x1d0
[   41.943161]  kunit_try_run_case+0x14c/0x3d0
[   41.947328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.952796]  kthread+0x24c/0x2d0
[   41.956008]  ret_from_fork+0x10/0x20
[   41.959567] 
[   41.961043] The buggy address belongs to the object at ffff000801ef7020
[   41.961043]  which belongs to the cache kmalloc-16 of size 16
[   41.973371] The buggy address is located 8 bytes inside of
[   41.973371]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   41.985609] 
[   41.987086] The buggy address belongs to the physical page:
[   41.992643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.000628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.007136] page_type: f5(slab)
[   42.010272] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.017993] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.025712] page dumped because: kasan: bad access detected
[   42.031267] 
[   42.032743] Memory state around the buggy address:
[   42.037522]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.044726]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.051931] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.059132]                                   ^
[   42.063649]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.070853]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.078055] ==================================================================
---
[   42.350280] ==================================================================
[   42.357396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   42.365551] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.372930] 
[   42.374412] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.383525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.387687] Hardware name: WinLink E850-96 board (DT)
[   42.392724] Call trace:
[   42.395153]  dump_backtrace+0x9c/0x128
[   42.398884]  show_stack+0x20/0x38
[   42.402182]  dump_stack_lvl+0x8c/0xd0
[   42.405828]  print_report+0x118/0x5e0
[   42.409474]  kasan_report+0xc8/0x118
[   42.413033]  kasan_check_range+0x100/0x1a8
[   42.417112]  __kasan_check_write+0x20/0x30
[   42.421192]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   42.426489]  kasan_bitops_generic+0x114/0x1d0
[   42.430829]  kunit_try_run_case+0x14c/0x3d0
[   42.434994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.440464]  kthread+0x24c/0x2d0
[   42.443675]  ret_from_fork+0x10/0x20
[   42.447236] 
[   42.448711] Allocated by task 298:
[   42.452096]  kasan_save_stack+0x3c/0x68
[   42.455914]  kasan_save_track+0x20/0x40
[   42.459733]  kasan_save_alloc_info+0x40/0x58
[   42.463987]  __kasan_kmalloc+0xd4/0xd8
[   42.467719]  __kmalloc_cache_noprof+0x144/0x328
[   42.472233]  kasan_bitops_generic+0xa0/0x1d0
[   42.476486]  kunit_try_run_case+0x14c/0x3d0
[   42.480653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.486123]  kthread+0x24c/0x2d0
[   42.489334]  ret_from_fork+0x10/0x20
[   42.492893] 
[   42.494368] The buggy address belongs to the object at ffff000801ef7020
[   42.494368]  which belongs to the cache kmalloc-16 of size 16
[   42.506697] The buggy address is located 8 bytes inside of
[   42.506697]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   42.518934] 
[   42.520411] The buggy address belongs to the physical page:
[   42.525969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.533953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.540461] page_type: f5(slab)
[   42.543596] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.551318] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.559038] page dumped because: kasan: bad access detected
[   42.564593] 
[   42.566068] Memory state around the buggy address:
[   42.570848]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.578051]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.585256] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.592457]                                   ^
[   42.596974]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.604179]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.611380] ==================================================================
---
[   42.618729] ==================================================================
[   42.625793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   42.633949] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.641328] 
[   42.642810] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.651926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.656084] Hardware name: WinLink E850-96 board (DT)
[   42.661121] Call trace:
[   42.663550]  dump_backtrace+0x9c/0x128
[   42.667283]  show_stack+0x20/0x38
[   42.670581]  dump_stack_lvl+0x8c/0xd0
[   42.674227]  print_report+0x118/0x5e0
[   42.677873]  kasan_report+0xc8/0x118
[   42.681432]  kasan_check_range+0x100/0x1a8
[   42.685511]  __kasan_check_write+0x20/0x30
[   42.689591]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   42.694888]  kasan_bitops_generic+0x114/0x1d0
[   42.699228]  kunit_try_run_case+0x14c/0x3d0
[   42.703393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.708863]  kthread+0x24c/0x2d0
[   42.712073]  ret_from_fork+0x10/0x20
[   42.715633] 
[   42.717108] Allocated by task 298:
[   42.720493]  kasan_save_stack+0x3c/0x68
[   42.724313]  kasan_save_track+0x20/0x40
[   42.728132]  kasan_save_alloc_info+0x40/0x58
[   42.732386]  __kasan_kmalloc+0xd4/0xd8
[   42.736118]  __kmalloc_cache_noprof+0x144/0x328
[   42.740632]  kasan_bitops_generic+0xa0/0x1d0
[   42.744885]  kunit_try_run_case+0x14c/0x3d0
[   42.749052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.754522]  kthread+0x24c/0x2d0
[   42.757733]  ret_from_fork+0x10/0x20
[   42.761291] 
[   42.762767] The buggy address belongs to the object at ffff000801ef7020
[   42.762767]  which belongs to the cache kmalloc-16 of size 16
[   42.775095] The buggy address is located 8 bytes inside of
[   42.775095]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   42.787332] 
[   42.788810] The buggy address belongs to the physical page:
[   42.794366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.802352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.808860] page_type: f5(slab)
[   42.811995] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.819716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.827436] page dumped because: kasan: bad access detected
[   42.832991] 
[   42.834467] Memory state around the buggy address:
[   42.839248]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.846450]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.853656] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.860856]                                   ^
[   42.865373]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.872578]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.879779] ==================================================================
---
[   43.420455] ==================================================================
[   43.427517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   43.435674] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.443052] 
[   43.444533] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.453647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.457808] Hardware name: WinLink E850-96 board (DT)
[   43.462845] Call trace:
[   43.465274]  dump_backtrace+0x9c/0x128
[   43.469006]  show_stack+0x20/0x38
[   43.472305]  dump_stack_lvl+0x8c/0xd0
[   43.475951]  print_report+0x118/0x5e0
[   43.479597]  kasan_report+0xc8/0x118
[   43.483156]  kasan_check_range+0x100/0x1a8
[   43.487235]  __kasan_check_write+0x20/0x30
[   43.491315]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   43.496610]  kasan_bitops_generic+0x114/0x1d0
[   43.500951]  kunit_try_run_case+0x14c/0x3d0
[   43.505117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.510587]  kthread+0x24c/0x2d0
[   43.513798]  ret_from_fork+0x10/0x20
[   43.517357] 
[   43.518832] Allocated by task 298:
[   43.522217]  kasan_save_stack+0x3c/0x68
[   43.526037]  kasan_save_track+0x20/0x40
[   43.529856]  kasan_save_alloc_info+0x40/0x58
[   43.534110]  __kasan_kmalloc+0xd4/0xd8
[   43.537842]  __kmalloc_cache_noprof+0x144/0x328
[   43.542356]  kasan_bitops_generic+0xa0/0x1d0
[   43.546609]  kunit_try_run_case+0x14c/0x3d0
[   43.550776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.556245]  kthread+0x24c/0x2d0
[   43.559457]  ret_from_fork+0x10/0x20
[   43.563015] 
[   43.564491] The buggy address belongs to the object at ffff000801ef7020
[   43.564491]  which belongs to the cache kmalloc-16 of size 16
[   43.576818] The buggy address is located 8 bytes inside of
[   43.576818]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.589057] 
[   43.590534] The buggy address belongs to the physical page:
[   43.596091] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.604077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.610586] page_type: f5(slab)
[   43.613718] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.621441] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.629160] page dumped because: kasan: bad access detected
[   43.634716] 
[   43.636191] Memory state around the buggy address:
[   43.640971]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.648173]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.655380] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.662580]                                   ^
[   43.667097]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.674302]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.681503] ==================================================================
---
[   43.152067] ==================================================================
[   43.159119] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   43.167275] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.174653] 
[   43.176137] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.185249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.189410] Hardware name: WinLink E850-96 board (DT)
[   43.194446] Call trace:
[   43.196875]  dump_backtrace+0x9c/0x128
[   43.200608]  show_stack+0x20/0x38
[   43.203906]  dump_stack_lvl+0x8c/0xd0
[   43.207552]  print_report+0x118/0x5e0
[   43.211198]  kasan_report+0xc8/0x118
[   43.214758]  kasan_check_range+0x100/0x1a8
[   43.218837]  __kasan_check_write+0x20/0x30
[   43.222917]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   43.228213]  kasan_bitops_generic+0x114/0x1d0
[   43.232553]  kunit_try_run_case+0x14c/0x3d0
[   43.236718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.242188]  kthread+0x24c/0x2d0
[   43.245399]  ret_from_fork+0x10/0x20
[   43.248958] 
[   43.250433] Allocated by task 298:
[   43.253819]  kasan_save_stack+0x3c/0x68
[   43.257638]  kasan_save_track+0x20/0x40
[   43.261458]  kasan_save_alloc_info+0x40/0x58
[   43.265711]  __kasan_kmalloc+0xd4/0xd8
[   43.269444]  __kmalloc_cache_noprof+0x144/0x328
[   43.273957]  kasan_bitops_generic+0xa0/0x1d0
[   43.278211]  kunit_try_run_case+0x14c/0x3d0
[   43.282377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.287846]  kthread+0x24c/0x2d0
[   43.291058]  ret_from_fork+0x10/0x20
[   43.294616] 
[   43.296092] The buggy address belongs to the object at ffff000801ef7020
[   43.296092]  which belongs to the cache kmalloc-16 of size 16
[   43.308420] The buggy address is located 8 bytes inside of
[   43.308420]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.320658] 
[   43.322134] The buggy address belongs to the physical page:
[   43.327691] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.335678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.342185] page_type: f5(slab)
[   43.345319] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.353042] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.360761] page dumped because: kasan: bad access detected
[   43.366317] 
[   43.367792] Memory state around the buggy address:
[   43.372572]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.379775]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.386981] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.394181]                                   ^
[   43.398698]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.405903]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.413104] ==================================================================

test log snippet test parser 39

Home

[   42.085378] ==================================================================
[   42.092469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   42.100624] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.107916] 
[   42.109397] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.118513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.122674] Hardware name: WinLink E850-96 board (DT)
[   42.127709] Call trace:
[   42.130138]  dump_backtrace+0x9c/0x128
[   42.133870]  show_stack+0x20/0x38
[   42.137169]  dump_stack_lvl+0x8c/0xd0
[   42.140815]  print_report+0x118/0x5e0
[   42.144460]  kasan_report+0xc8/0x118
[   42.148019]  __asan_report_load8_noabort+0x20/0x30
[   42.152794]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   42.158089]  kasan_bitops_generic+0x114/0x1d0
[   42.162429]  kunit_try_run_case+0x14c/0x3d0
[   42.166595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.172064]  kthread+0x24c/0x2d0
[   42.175276]  ret_from_fork+0x10/0x20
[   42.178835] 
[   42.180310] Allocated by task 298:
[   42.183696]  kasan_save_stack+0x3c/0x68
[   42.187515]  kasan_save_track+0x20/0x40
[   42.191335]  kasan_save_alloc_info+0x40/0x58
[   42.195588]  __kasan_kmalloc+0xd4/0xd8
[   42.199321]  __kmalloc_cache_noprof+0x144/0x328
[   42.203834]  kasan_bitops_generic+0xa0/0x1d0
[   42.208088]  kunit_try_run_case+0x14c/0x3d0
[   42.212255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.217723]  kthread+0x24c/0x2d0
[   42.220935]  ret_from_fork+0x10/0x20
[   42.224494] 
[   42.225969] The buggy address belongs to the object at ffff000801ef7020
[   42.225969]  which belongs to the cache kmalloc-16 of size 16
[   42.238299] The buggy address is located 8 bytes inside of
[   42.238299]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   42.250535] 
[   42.252012] The buggy address belongs to the physical page:
[   42.257568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   42.265554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.272064] page_type: f5(slab)
[   42.275196] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.282919] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   42.290639] page dumped because: kasan: bad access detected
[   42.296194] 
[   42.297670] Memory state around the buggy address:
[   42.302448]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.309653]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.316857] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.324058]                                   ^
[   42.328575]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.335780]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.342982] ==================================================================
---
[   41.552125] ==================================================================
[   41.559143] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   41.567300] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   41.574590] 
[   41.576074] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.585187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.589348] Hardware name: WinLink E850-96 board (DT)
[   41.594386] Call trace:
[   41.596813]  dump_backtrace+0x9c/0x128
[   41.600545]  show_stack+0x20/0x38
[   41.603844]  dump_stack_lvl+0x8c/0xd0
[   41.607489]  print_report+0x118/0x5e0
[   41.611135]  kasan_report+0xc8/0x118
[   41.614694]  __asan_report_load8_noabort+0x20/0x30
[   41.619468]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   41.624763]  kasan_bitops_generic+0x114/0x1d0
[   41.629103]  kunit_try_run_case+0x14c/0x3d0
[   41.633270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.638739]  kthread+0x24c/0x2d0
[   41.641950]  ret_from_fork+0x10/0x20
[   41.645510] 
[   41.646985] Allocated by task 298:
[   41.650372]  kasan_save_stack+0x3c/0x68
[   41.654190]  kasan_save_track+0x20/0x40
[   41.658009]  kasan_save_alloc_info+0x40/0x58
[   41.662263]  __kasan_kmalloc+0xd4/0xd8
[   41.665995]  __kmalloc_cache_noprof+0x144/0x328
[   41.670509]  kasan_bitops_generic+0xa0/0x1d0
[   41.674762]  kunit_try_run_case+0x14c/0x3d0
[   41.678929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.684399]  kthread+0x24c/0x2d0
[   41.687610]  ret_from_fork+0x10/0x20
[   41.691169] 
[   41.692644] The buggy address belongs to the object at ffff000801ef7020
[   41.692644]  which belongs to the cache kmalloc-16 of size 16
[   41.704970] The buggy address is located 8 bytes inside of
[   41.704970]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   41.717210] 
[   41.718687] The buggy address belongs to the physical page:
[   41.724243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   41.732230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.738737] page_type: f5(slab)
[   41.741872] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.749594] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   41.757313] page dumped because: kasan: bad access detected
[   41.762869] 
[   41.764344] Memory state around the buggy address:
[   41.769124]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.776327]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.783533] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.790733]                                   ^
[   41.795250]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.802455]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.809656] ==================================================================
---
[   43.688866] ==================================================================
[   43.695919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   43.704073] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.711364] 
[   43.712845] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.721962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.726120] Hardware name: WinLink E850-96 board (DT)
[   43.731157] Call trace:
[   43.733586]  dump_backtrace+0x9c/0x128
[   43.737318]  show_stack+0x20/0x38
[   43.740617]  dump_stack_lvl+0x8c/0xd0
[   43.744263]  print_report+0x118/0x5e0
[   43.747908]  kasan_report+0xc8/0x118
[   43.751468]  __asan_report_load8_noabort+0x20/0x30
[   43.756242]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   43.761537]  kasan_bitops_generic+0x114/0x1d0
[   43.765877]  kunit_try_run_case+0x14c/0x3d0
[   43.770043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.775514]  kthread+0x24c/0x2d0
[   43.778724]  ret_from_fork+0x10/0x20
[   43.782284] 
[   43.783759] Allocated by task 298:
[   43.787145]  kasan_save_stack+0x3c/0x68
[   43.790963]  kasan_save_track+0x20/0x40
[   43.794783]  kasan_save_alloc_info+0x40/0x58
[   43.799036]  __kasan_kmalloc+0xd4/0xd8
[   43.802769]  __kmalloc_cache_noprof+0x144/0x328
[   43.807283]  kasan_bitops_generic+0xa0/0x1d0
[   43.811536]  kunit_try_run_case+0x14c/0x3d0
[   43.815702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.821171]  kthread+0x24c/0x2d0
[   43.824383]  ret_from_fork+0x10/0x20
[   43.827942] 
[   43.829418] The buggy address belongs to the object at ffff000801ef7020
[   43.829418]  which belongs to the cache kmalloc-16 of size 16
[   43.841746] The buggy address is located 8 bytes inside of
[   43.841746]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.853983] 
[   43.855459] The buggy address belongs to the physical page:
[   43.861018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.869003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.875511] page_type: f5(slab)
[   43.878643] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.886367] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.894087] page dumped because: kasan: bad access detected
[   43.899642] 
[   43.901118] Memory state around the buggy address:
[   43.905895]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.913100]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.920305] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.927506]                                   ^
[   43.932024]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.939228]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.946430] ==================================================================
---
[   42.887184] ==================================================================
[   42.894196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   42.902348] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   42.909640] 
[   42.911121] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   42.920236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.924397] Hardware name: WinLink E850-96 board (DT)
[   42.929431] Call trace:
[   42.931862]  dump_backtrace+0x9c/0x128
[   42.935594]  show_stack+0x20/0x38
[   42.938893]  dump_stack_lvl+0x8c/0xd0
[   42.942539]  print_report+0x118/0x5e0
[   42.946185]  kasan_report+0xc8/0x118
[   42.949744]  __asan_report_load8_noabort+0x20/0x30
[   42.954517]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   42.959814]  kasan_bitops_generic+0x114/0x1d0
[   42.964154]  kunit_try_run_case+0x14c/0x3d0
[   42.968320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.973790]  kthread+0x24c/0x2d0
[   42.977000]  ret_from_fork+0x10/0x20
[   42.980561] 
[   42.982036] Allocated by task 298:
[   42.985421]  kasan_save_stack+0x3c/0x68
[   42.989239]  kasan_save_track+0x20/0x40
[   42.993059]  kasan_save_alloc_info+0x40/0x58
[   42.997312]  __kasan_kmalloc+0xd4/0xd8
[   43.001045]  __kmalloc_cache_noprof+0x144/0x328
[   43.005558]  kasan_bitops_generic+0xa0/0x1d0
[   43.009812]  kunit_try_run_case+0x14c/0x3d0
[   43.013979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.019447]  kthread+0x24c/0x2d0
[   43.022659]  ret_from_fork+0x10/0x20
[   43.026218] 
[   43.027695] The buggy address belongs to the object at ffff000801ef7020
[   43.027695]  which belongs to the cache kmalloc-16 of size 16
[   43.040021] The buggy address is located 8 bytes inside of
[   43.040021]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   43.052259] 
[   43.053736] The buggy address belongs to the physical page:
[   43.059294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   43.067279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.073786] page_type: f5(slab)
[   43.076922] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.084643] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   43.092363] page dumped because: kasan: bad access detected
[   43.097918] 
[   43.099394] Memory state around the buggy address:
[   43.104174]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.111376]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.118582] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.125782]                                   ^
[   43.130300]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.137504]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.144706] ==================================================================

test log snippet test parser 40

Home

[   44.760185] ==================================================================
[   44.767252] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   44.776192] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   44.783483] 
[   44.784965] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   44.794078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.798240] Hardware name: WinLink E850-96 board (DT)
[   44.803275] Call trace:
[   44.805705]  dump_backtrace+0x9c/0x128
[   44.809438]  show_stack+0x20/0x38
[   44.812736]  dump_stack_lvl+0x8c/0xd0
[   44.816382]  print_report+0x118/0x5e0
[   44.820028]  kasan_report+0xc8/0x118
[   44.823587]  __asan_report_load8_noabort+0x20/0x30
[   44.828361]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   44.834437]  kasan_bitops_generic+0x120/0x1d0
[   44.838778]  kunit_try_run_case+0x14c/0x3d0
[   44.842944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.848413]  kthread+0x24c/0x2d0
[   44.851625]  ret_from_fork+0x10/0x20
[   44.855184] 
[   44.856659] Allocated by task 298:
[   44.860044]  kasan_save_stack+0x3c/0x68
[   44.863864]  kasan_save_track+0x20/0x40
[   44.867683]  kasan_save_alloc_info+0x40/0x58
[   44.871937]  __kasan_kmalloc+0xd4/0xd8
[   44.875669]  __kmalloc_cache_noprof+0x144/0x328
[   44.880183]  kasan_bitops_generic+0xa0/0x1d0
[   44.884436]  kunit_try_run_case+0x14c/0x3d0
[   44.888603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.894072]  kthread+0x24c/0x2d0
[   44.897284]  ret_from_fork+0x10/0x20
[   44.900843] 
[   44.902318] The buggy address belongs to the object at ffff000801ef7020
[   44.902318]  which belongs to the cache kmalloc-16 of size 16
[   44.914646] The buggy address is located 8 bytes inside of
[   44.914646]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.926884] 
[   44.928359] The buggy address belongs to the physical page:
[   44.933915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.941903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.948411] page_type: f5(slab)
[   44.951543] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.959268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.966987] page dumped because: kasan: bad access detected
[   44.972543] 
[   44.974018] Memory state around the buggy address:
[   44.978798]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.986001]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.993206] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.000407]                                   ^
[   45.004924]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.012129]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.019330] ==================================================================
[   44.490215] ==================================================================
[   44.497294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   44.506230] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   44.513609] 
[   44.515091] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   44.524203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.528366] Hardware name: WinLink E850-96 board (DT)
[   44.533400] Call trace:
[   44.535831]  dump_backtrace+0x9c/0x128
[   44.539563]  show_stack+0x20/0x38
[   44.542862]  dump_stack_lvl+0x8c/0xd0
[   44.546507]  print_report+0x118/0x5e0
[   44.550153]  kasan_report+0xc8/0x118
[   44.553712]  kasan_check_range+0x100/0x1a8
[   44.557792]  __kasan_check_write+0x20/0x30
[   44.561872]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   44.567948]  kasan_bitops_generic+0x120/0x1d0
[   44.572290]  kunit_try_run_case+0x14c/0x3d0
[   44.576455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.581925]  kthread+0x24c/0x2d0
[   44.585136]  ret_from_fork+0x10/0x20
[   44.588696] 
[   44.590170] Allocated by task 298:
[   44.593555]  kasan_save_stack+0x3c/0x68
[   44.597375]  kasan_save_track+0x20/0x40
[   44.601194]  kasan_save_alloc_info+0x40/0x58
[   44.605448]  __kasan_kmalloc+0xd4/0xd8
[   44.609180]  __kmalloc_cache_noprof+0x144/0x328
[   44.613694]  kasan_bitops_generic+0xa0/0x1d0
[   44.617947]  kunit_try_run_case+0x14c/0x3d0
[   44.622114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.627583]  kthread+0x24c/0x2d0
[   44.630794]  ret_from_fork+0x10/0x20
[   44.634354] 
[   44.635829] The buggy address belongs to the object at ffff000801ef7020
[   44.635829]  which belongs to the cache kmalloc-16 of size 16
[   44.648157] The buggy address is located 8 bytes inside of
[   44.648157]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.660394] 
[   44.661871] The buggy address belongs to the physical page:
[   44.667427] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.675412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.681922] page_type: f5(slab)
[   44.685054] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.692779] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.700499] page dumped because: kasan: bad access detected
[   44.706054] 
[   44.707529] Memory state around the buggy address:
[   44.712309]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.719512]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.726717] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.733918]                                   ^
[   44.738435]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.745640]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.752841] ==================================================================
[   43.953752] ==================================================================
[   43.960842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   43.969780] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.977158] 
[   43.978641] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.987753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.991915] Hardware name: WinLink E850-96 board (DT)
[   43.996950] Call trace:
[   43.999380]  dump_backtrace+0x9c/0x128
[   44.003113]  show_stack+0x20/0x38
[   44.006411]  dump_stack_lvl+0x8c/0xd0
[   44.010057]  print_report+0x118/0x5e0
[   44.013703]  kasan_report+0xc8/0x118
[   44.017262]  kasan_check_range+0x100/0x1a8
[   44.021342]  __kasan_check_write+0x20/0x30
[   44.025423]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   44.031498]  kasan_bitops_generic+0x120/0x1d0
[   44.035838]  kunit_try_run_case+0x14c/0x3d0
[   44.040005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.045474]  kthread+0x24c/0x2d0
[   44.048685]  ret_from_fork+0x10/0x20
[   44.052245] 
[   44.053720] Allocated by task 298:
[   44.057105]  kasan_save_stack+0x3c/0x68
[   44.060924]  kasan_save_track+0x20/0x40
[   44.064744]  kasan_save_alloc_info+0x40/0x58
[   44.068997]  __kasan_kmalloc+0xd4/0xd8
[   44.072730]  __kmalloc_cache_noprof+0x144/0x328
[   44.077244]  kasan_bitops_generic+0xa0/0x1d0
[   44.081497]  kunit_try_run_case+0x14c/0x3d0
[   44.085664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.091133]  kthread+0x24c/0x2d0
[   44.094344]  ret_from_fork+0x10/0x20
[   44.097903] 
[   44.099380] The buggy address belongs to the object at ffff000801ef7020
[   44.099380]  which belongs to the cache kmalloc-16 of size 16
[   44.111707] The buggy address is located 8 bytes inside of
[   44.111707]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.123944] 
[   44.125420] The buggy address belongs to the physical page:
[   44.130976] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.138964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.145472] page_type: f5(slab)
[   44.148604] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.156328] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.164048] page dumped because: kasan: bad access detected
[   44.169603] 
[   44.171079] Memory state around the buggy address:
[   44.175857]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.183062]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.190266] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.197468]                                   ^
[   44.201985]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.209189]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.216391] ==================================================================
[   44.223750] ==================================================================
[   44.230802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   44.239741] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   44.247033] 
[   44.248514] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   44.257629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.261790] Hardware name: WinLink E850-96 board (DT)
[   44.266825] Call trace:
[   44.269255]  dump_backtrace+0x9c/0x128
[   44.272988]  show_stack+0x20/0x38
[   44.276286]  dump_stack_lvl+0x8c/0xd0
[   44.279932]  print_report+0x118/0x5e0
[   44.283578]  kasan_report+0xc8/0x118
[   44.287136]  __asan_report_load8_noabort+0x20/0x30
[   44.291911]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   44.297987]  kasan_bitops_generic+0x120/0x1d0
[   44.302327]  kunit_try_run_case+0x14c/0x3d0
[   44.306494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.311964]  kthread+0x24c/0x2d0
[   44.315174]  ret_from_fork+0x10/0x20
[   44.318735] 
[   44.320209] Allocated by task 298:
[   44.323594]  kasan_save_stack+0x3c/0x68
[   44.327414]  kasan_save_track+0x20/0x40
[   44.331233]  kasan_save_alloc_info+0x40/0x58
[   44.335487]  __kasan_kmalloc+0xd4/0xd8
[   44.339219]  __kmalloc_cache_noprof+0x144/0x328
[   44.343733]  kasan_bitops_generic+0xa0/0x1d0
[   44.347986]  kunit_try_run_case+0x14c/0x3d0
[   44.352153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.357622]  kthread+0x24c/0x2d0
[   44.360833]  ret_from_fork+0x10/0x20
[   44.364393] 
[   44.365868] The buggy address belongs to the object at ffff000801ef7020
[   44.365868]  which belongs to the cache kmalloc-16 of size 16
[   44.378197] The buggy address is located 8 bytes inside of
[   44.378197]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.390433] 
[   44.391909] The buggy address belongs to the physical page:
[   44.397465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.405452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.411961] page_type: f5(slab)
[   44.415093] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.422817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.430537] page dumped because: kasan: bad access detected
[   44.436093] 
[   44.437568] Memory state around the buggy address:
[   44.442347]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.449551]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.456755] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.463957]                                   ^
[   44.468474]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.475678]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.482880] ==================================================================
[   45.563090] ==================================================================
[   45.570191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   45.579131] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.586509] 
[   45.587990] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.597104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.601266] Hardware name: WinLink E850-96 board (DT)
[   45.606301] Call trace:
[   45.608732]  dump_backtrace+0x9c/0x128
[   45.612464]  show_stack+0x20/0x38
[   45.615763]  dump_stack_lvl+0x8c/0xd0
[   45.619408]  print_report+0x118/0x5e0
[   45.623054]  kasan_report+0xc8/0x118
[   45.626613]  kasan_check_range+0x100/0x1a8
[   45.630693]  __kasan_check_write+0x20/0x30
[   45.634773]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   45.640849]  kasan_bitops_generic+0x120/0x1d0
[   45.645190]  kunit_try_run_case+0x14c/0x3d0
[   45.649356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.654824]  kthread+0x24c/0x2d0
[   45.658036]  ret_from_fork+0x10/0x20
[   45.661596] 
[   45.663071] Allocated by task 298:
[   45.666456]  kasan_save_stack+0x3c/0x68
[   45.670276]  kasan_save_track+0x20/0x40
[   45.674095]  kasan_save_alloc_info+0x40/0x58
[   45.678348]  __kasan_kmalloc+0xd4/0xd8
[   45.682081]  __kmalloc_cache_noprof+0x144/0x328
[   45.686595]  kasan_bitops_generic+0xa0/0x1d0
[   45.690848]  kunit_try_run_case+0x14c/0x3d0
[   45.695015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.700483]  kthread+0x24c/0x2d0
[   45.703695]  ret_from_fork+0x10/0x20
[   45.707254] 
[   45.708730] The buggy address belongs to the object at ffff000801ef7020
[   45.708730]  which belongs to the cache kmalloc-16 of size 16
[   45.721056] The buggy address is located 8 bytes inside of
[   45.721056]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.733295] 
[   45.734771] The buggy address belongs to the physical page:
[   45.740327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   45.748314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.754823] page_type: f5(slab)
[   45.757955] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.765679] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   45.773399] page dumped because: kasan: bad access detected
[   45.778954] 
[   45.780430] Memory state around the buggy address:
[   45.785209]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.792412]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.799617] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.806818]                                   ^
[   45.811336]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.818540]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.825742] ==================================================================
[   45.833088] ==================================================================
[   45.840153] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   45.849093] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.856384] 
[   45.857864] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.866979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.871140] Hardware name: WinLink E850-96 board (DT)
[   45.876175] Call trace:
[   45.878606]  dump_backtrace+0x9c/0x128
[   45.882339]  show_stack+0x20/0x38
[   45.885637]  dump_stack_lvl+0x8c/0xd0
[   45.889283]  print_report+0x118/0x5e0
[   45.892929]  kasan_report+0xc8/0x118
[   45.896487]  __asan_report_load8_noabort+0x20/0x30
[   45.901262]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   45.907338]  kasan_bitops_generic+0x120/0x1d0
[   45.911678]  kunit_try_run_case+0x14c/0x3d0
[   45.915845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.921313]  kthread+0x24c/0x2d0
[   45.924525]  ret_from_fork+0x10/0x20
[   45.928085] 
[   45.929560] Allocated by task 298:
[   45.932945]  kasan_save_stack+0x3c/0x68
[   45.936765]  kasan_save_track+0x20/0x40
[   45.940584]  kasan_save_alloc_info+0x40/0x58
[   45.944837]  __kasan_kmalloc+0xd4/0xd8
[   45.948570]  __kmalloc_cache_noprof+0x144/0x328
[   45.953084]  kasan_bitops_generic+0xa0/0x1d0
[   45.957337]  kunit_try_run_case+0x14c/0x3d0
[   45.961504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.966972]  kthread+0x24c/0x2d0
[   45.970184]  ret_from_fork+0x10/0x20
[   45.973743] 
[   45.975219] The buggy address belongs to the object at ffff000801ef7020
[   45.975219]  which belongs to the cache kmalloc-16 of size 16
[   45.987545] The buggy address is located 8 bytes inside of
[   45.987545]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.999784] 
[   46.001260] The buggy address belongs to the physical page:
[   46.006816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   46.014803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.021311] page_type: f5(slab)
[   46.024444] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.032168] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   46.039888] page dumped because: kasan: bad access detected
[   46.045443] 
[   46.046919] Memory state around the buggy address:
[   46.051698]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.058901]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.066106] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.073307]                                   ^
[   46.077825]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.085030]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.092231] ==================================================================
[   45.296635] ==================================================================
[   45.303707] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   45.312642] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.319934] 
[   45.321414] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.330528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.334690] Hardware name: WinLink E850-96 board (DT)
[   45.339725] Call trace:
[   45.342155]  dump_backtrace+0x9c/0x128
[   45.345888]  show_stack+0x20/0x38
[   45.349186]  dump_stack_lvl+0x8c/0xd0
[   45.352832]  print_report+0x118/0x5e0
[   45.356478]  kasan_report+0xc8/0x118
[   45.360037]  __asan_report_load8_noabort+0x20/0x30
[   45.364811]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   45.370888]  kasan_bitops_generic+0x120/0x1d0
[   45.375229]  kunit_try_run_case+0x14c/0x3d0
[   45.379394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.384863]  kthread+0x24c/0x2d0
[   45.388075]  ret_from_fork+0x10/0x20
[   45.391634] 
[   45.393109] Allocated by task 298:
[   45.396495]  kasan_save_stack+0x3c/0x68
[   45.400314]  kasan_save_track+0x20/0x40
[   45.404133]  kasan_save_alloc_info+0x40/0x58
[   45.408387]  __kasan_kmalloc+0xd4/0xd8
[   45.412120]  __kmalloc_cache_noprof+0x144/0x328
[   45.416633]  kasan_bitops_generic+0xa0/0x1d0
[   45.420887]  kunit_try_run_case+0x14c/0x3d0
[   45.425053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.430522]  kthread+0x24c/0x2d0
[   45.433734]  ret_from_fork+0x10/0x20
[   45.437293] 
[   45.438768] The buggy address belongs to the object at ffff000801ef7020
[   45.438768]  which belongs to the cache kmalloc-16 of size 16
[   45.451097] The buggy address is located 8 bytes inside of
[   45.451097]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.463334] 
[   45.464810] The buggy address belongs to the physical page:
[   45.470366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   45.478355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.484861] page_type: f5(slab)
[   45.487994] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.495718] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   45.503438] page dumped because: kasan: bad access detected
[   45.508993] 
[   45.510468] Memory state around the buggy address:
[   45.515248]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.522451]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.529656] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.536857]                                   ^
[   45.541374]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.548579]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.555781] ==================================================================
[   45.026670] ==================================================================
[   45.033743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   45.042681] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.050059] 
[   45.051540] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.060654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.064816] Hardware name: WinLink E850-96 board (DT)
[   45.069851] Call trace:
[   45.072281]  dump_backtrace+0x9c/0x128
[   45.076014]  show_stack+0x20/0x38
[   45.079312]  dump_stack_lvl+0x8c/0xd0
[   45.082958]  print_report+0x118/0x5e0
[   45.086604]  kasan_report+0xc8/0x118
[   45.090163]  kasan_check_range+0x100/0x1a8
[   45.094243]  __kasan_check_write+0x20/0x30
[   45.098322]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   45.104399]  kasan_bitops_generic+0x120/0x1d0
[   45.108740]  kunit_try_run_case+0x14c/0x3d0
[   45.112905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.118374]  kthread+0x24c/0x2d0
[   45.121586]  ret_from_fork+0x10/0x20
[   45.125145] 
[   45.126620] Allocated by task 298:
[   45.130006]  kasan_save_stack+0x3c/0x68
[   45.133825]  kasan_save_track+0x20/0x40
[   45.137644]  kasan_save_alloc_info+0x40/0x58
[   45.141898]  __kasan_kmalloc+0xd4/0xd8
[   45.145631]  __kmalloc_cache_noprof+0x144/0x328
[   45.150144]  kasan_bitops_generic+0xa0/0x1d0
[   45.154398]  kunit_try_run_case+0x14c/0x3d0
[   45.158564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.164033]  kthread+0x24c/0x2d0
[   45.167245]  ret_from_fork+0x10/0x20
[   45.170804] 
[   45.172279] The buggy address belongs to the object at ffff000801ef7020
[   45.172279]  which belongs to the cache kmalloc-16 of size 16
[   45.184607] The buggy address is located 8 bytes inside of
[   45.184607]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.196845] 
[   45.198321] The buggy address belongs to the physical page:
[   45.203877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   45.211864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.218372] page_type: f5(slab)
[   45.221505] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.229229] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   45.236949] page dumped because: kasan: bad access detected
[   45.242504] 
[   45.243979] Memory state around the buggy address:
[   45.248759]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.255962]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.263167] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.270368]                                   ^
[   45.274885]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.282090]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.289292] ==================================================================
[   46.099557] ==================================================================
[   46.106645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   46.115582] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   46.122873] 
[   46.124354] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.133468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.137629] Hardware name: WinLink E850-96 board (DT)
[   46.142665] Call trace:
[   46.145095]  dump_backtrace+0x9c/0x128
[   46.148827]  show_stack+0x20/0x38
[   46.152126]  dump_stack_lvl+0x8c/0xd0
[   46.155772]  print_report+0x118/0x5e0
[   46.159418]  kasan_report+0xc8/0x118
[   46.162976]  __asan_report_load8_noabort+0x20/0x30
[   46.167751]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   46.173827]  kasan_bitops_generic+0x120/0x1d0
[   46.178167]  kunit_try_run_case+0x14c/0x3d0
[   46.182334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.187802]  kthread+0x24c/0x2d0
[   46.191014]  ret_from_fork+0x10/0x20
[   46.194573] 
[   46.196049] Allocated by task 298:
[   46.199434]  kasan_save_stack+0x3c/0x68
[   46.203254]  kasan_save_track+0x20/0x40
[   46.207073]  kasan_save_alloc_info+0x40/0x58
[   46.211326]  __kasan_kmalloc+0xd4/0xd8
[   46.215059]  __kmalloc_cache_noprof+0x144/0x328
[   46.219573]  kasan_bitops_generic+0xa0/0x1d0
[   46.223826]  kunit_try_run_case+0x14c/0x3d0
[   46.227993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.233461]  kthread+0x24c/0x2d0
[   46.236673]  ret_from_fork+0x10/0x20
[   46.240232] 
[   46.241708] The buggy address belongs to the object at ffff000801ef7020
[   46.241708]  which belongs to the cache kmalloc-16 of size 16
[   46.254034] The buggy address is located 8 bytes inside of
[   46.254034]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   46.266274] 
[   46.267749] The buggy address belongs to the physical page:
[   46.273305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   46.281293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.287801] page_type: f5(slab)
[   46.290933] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.298657] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   46.306377] page dumped because: kasan: bad access detected
[   46.311932] 
[   46.313408] Memory state around the buggy address:
[   46.318187]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.325390]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.332595] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.339797]                                   ^
[   46.344314]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.351518]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.358720] ==================================================================

test log snippet test parser 41

Home

[   44.490215] ==================================================================
[   44.497294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   44.506230] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   44.513609] 
[   44.515091] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   44.524203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.528366] Hardware name: WinLink E850-96 board (DT)
[   44.533400] Call trace:
[   44.535831]  dump_backtrace+0x9c/0x128
[   44.539563]  show_stack+0x20/0x38
[   44.542862]  dump_stack_lvl+0x8c/0xd0
[   44.546507]  print_report+0x118/0x5e0
[   44.550153]  kasan_report+0xc8/0x118
[   44.553712]  kasan_check_range+0x100/0x1a8
[   44.557792]  __kasan_check_write+0x20/0x30
[   44.561872]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   44.567948]  kasan_bitops_generic+0x120/0x1d0
[   44.572290]  kunit_try_run_case+0x14c/0x3d0
[   44.576455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.581925]  kthread+0x24c/0x2d0
[   44.585136]  ret_from_fork+0x10/0x20
[   44.588696] 
[   44.590170] Allocated by task 298:
[   44.593555]  kasan_save_stack+0x3c/0x68
[   44.597375]  kasan_save_track+0x20/0x40
[   44.601194]  kasan_save_alloc_info+0x40/0x58
[   44.605448]  __kasan_kmalloc+0xd4/0xd8
[   44.609180]  __kmalloc_cache_noprof+0x144/0x328
[   44.613694]  kasan_bitops_generic+0xa0/0x1d0
[   44.617947]  kunit_try_run_case+0x14c/0x3d0
[   44.622114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.627583]  kthread+0x24c/0x2d0
[   44.630794]  ret_from_fork+0x10/0x20
[   44.634354] 
[   44.635829] The buggy address belongs to the object at ffff000801ef7020
[   44.635829]  which belongs to the cache kmalloc-16 of size 16
[   44.648157] The buggy address is located 8 bytes inside of
[   44.648157]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.660394] 
[   44.661871] The buggy address belongs to the physical page:
[   44.667427] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.675412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.681922] page_type: f5(slab)
[   44.685054] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.692779] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.700499] page dumped because: kasan: bad access detected
[   44.706054] 
[   44.707529] Memory state around the buggy address:
[   44.712309]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.719512]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.726717] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.733918]                                   ^
[   44.738435]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.745640]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.752841] ==================================================================
---
[   43.953752] ==================================================================
[   43.960842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   43.969780] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   43.977158] 
[   43.978641] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   43.987753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.991915] Hardware name: WinLink E850-96 board (DT)
[   43.996950] Call trace:
[   43.999380]  dump_backtrace+0x9c/0x128
[   44.003113]  show_stack+0x20/0x38
[   44.006411]  dump_stack_lvl+0x8c/0xd0
[   44.010057]  print_report+0x118/0x5e0
[   44.013703]  kasan_report+0xc8/0x118
[   44.017262]  kasan_check_range+0x100/0x1a8
[   44.021342]  __kasan_check_write+0x20/0x30
[   44.025423]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   44.031498]  kasan_bitops_generic+0x120/0x1d0
[   44.035838]  kunit_try_run_case+0x14c/0x3d0
[   44.040005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.045474]  kthread+0x24c/0x2d0
[   44.048685]  ret_from_fork+0x10/0x20
[   44.052245] 
[   44.053720] Allocated by task 298:
[   44.057105]  kasan_save_stack+0x3c/0x68
[   44.060924]  kasan_save_track+0x20/0x40
[   44.064744]  kasan_save_alloc_info+0x40/0x58
[   44.068997]  __kasan_kmalloc+0xd4/0xd8
[   44.072730]  __kmalloc_cache_noprof+0x144/0x328
[   44.077244]  kasan_bitops_generic+0xa0/0x1d0
[   44.081497]  kunit_try_run_case+0x14c/0x3d0
[   44.085664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.091133]  kthread+0x24c/0x2d0
[   44.094344]  ret_from_fork+0x10/0x20
[   44.097903] 
[   44.099380] The buggy address belongs to the object at ffff000801ef7020
[   44.099380]  which belongs to the cache kmalloc-16 of size 16
[   44.111707] The buggy address is located 8 bytes inside of
[   44.111707]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.123944] 
[   44.125420] The buggy address belongs to the physical page:
[   44.130976] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.138964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.145472] page_type: f5(slab)
[   44.148604] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.156328] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.164048] page dumped because: kasan: bad access detected
[   44.169603] 
[   44.171079] Memory state around the buggy address:
[   44.175857]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.183062]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.190266] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.197468]                                   ^
[   44.201985]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.209189]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.216391] ==================================================================
---
[   45.026670] ==================================================================
[   45.033743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   45.042681] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.050059] 
[   45.051540] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.060654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.064816] Hardware name: WinLink E850-96 board (DT)
[   45.069851] Call trace:
[   45.072281]  dump_backtrace+0x9c/0x128
[   45.076014]  show_stack+0x20/0x38
[   45.079312]  dump_stack_lvl+0x8c/0xd0
[   45.082958]  print_report+0x118/0x5e0
[   45.086604]  kasan_report+0xc8/0x118
[   45.090163]  kasan_check_range+0x100/0x1a8
[   45.094243]  __kasan_check_write+0x20/0x30
[   45.098322]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   45.104399]  kasan_bitops_generic+0x120/0x1d0
[   45.108740]  kunit_try_run_case+0x14c/0x3d0
[   45.112905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.118374]  kthread+0x24c/0x2d0
[   45.121586]  ret_from_fork+0x10/0x20
[   45.125145] 
[   45.126620] Allocated by task 298:
[   45.130006]  kasan_save_stack+0x3c/0x68
[   45.133825]  kasan_save_track+0x20/0x40
[   45.137644]  kasan_save_alloc_info+0x40/0x58
[   45.141898]  __kasan_kmalloc+0xd4/0xd8
[   45.145631]  __kmalloc_cache_noprof+0x144/0x328
[   45.150144]  kasan_bitops_generic+0xa0/0x1d0
[   45.154398]  kunit_try_run_case+0x14c/0x3d0
[   45.158564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.164033]  kthread+0x24c/0x2d0
[   45.167245]  ret_from_fork+0x10/0x20
[   45.170804] 
[   45.172279] The buggy address belongs to the object at ffff000801ef7020
[   45.172279]  which belongs to the cache kmalloc-16 of size 16
[   45.184607] The buggy address is located 8 bytes inside of
[   45.184607]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.196845] 
[   45.198321] The buggy address belongs to the physical page:
[   45.203877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   45.211864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.218372] page_type: f5(slab)
[   45.221505] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.229229] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   45.236949] page dumped because: kasan: bad access detected
[   45.242504] 
[   45.243979] Memory state around the buggy address:
[   45.248759]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.255962]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.263167] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.270368]                                   ^
[   45.274885]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.282090]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.289292] ==================================================================
---
[   45.563090] ==================================================================
[   45.570191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   45.579131] Write of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.586509] 
[   45.587990] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.597104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.601266] Hardware name: WinLink E850-96 board (DT)
[   45.606301] Call trace:
[   45.608732]  dump_backtrace+0x9c/0x128
[   45.612464]  show_stack+0x20/0x38
[   45.615763]  dump_stack_lvl+0x8c/0xd0
[   45.619408]  print_report+0x118/0x5e0
[   45.623054]  kasan_report+0xc8/0x118
[   45.626613]  kasan_check_range+0x100/0x1a8
[   45.630693]  __kasan_check_write+0x20/0x30
[   45.634773]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   45.640849]  kasan_bitops_generic+0x120/0x1d0
[   45.645190]  kunit_try_run_case+0x14c/0x3d0
[   45.649356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.654824]  kthread+0x24c/0x2d0
[   45.658036]  ret_from_fork+0x10/0x20
[   45.661596] 
[   45.663071] Allocated by task 298:
[   45.666456]  kasan_save_stack+0x3c/0x68
[   45.670276]  kasan_save_track+0x20/0x40
[   45.674095]  kasan_save_alloc_info+0x40/0x58
[   45.678348]  __kasan_kmalloc+0xd4/0xd8
[   45.682081]  __kmalloc_cache_noprof+0x144/0x328
[   45.686595]  kasan_bitops_generic+0xa0/0x1d0
[   45.690848]  kunit_try_run_case+0x14c/0x3d0
[   45.695015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.700483]  kthread+0x24c/0x2d0
[   45.703695]  ret_from_fork+0x10/0x20
[   45.707254] 
[   45.708730] The buggy address belongs to the object at ffff000801ef7020
[   45.708730]  which belongs to the cache kmalloc-16 of size 16
[   45.721056] The buggy address is located 8 bytes inside of
[   45.721056]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.733295] 
[   45.734771] The buggy address belongs to the physical page:
[   45.740327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   45.748314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.754823] page_type: f5(slab)
[   45.757955] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.765679] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   45.773399] page dumped because: kasan: bad access detected
[   45.778954] 
[   45.780430] Memory state around the buggy address:
[   45.785209]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.792412]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.799617] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.806818]                                   ^
[   45.811336]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.818540]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.825742] ==================================================================

test log snippet test parser 42

Home

[   44.760185] ==================================================================
[   44.767252] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   44.776192] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   44.783483] 
[   44.784965] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   44.794078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.798240] Hardware name: WinLink E850-96 board (DT)
[   44.803275] Call trace:
[   44.805705]  dump_backtrace+0x9c/0x128
[   44.809438]  show_stack+0x20/0x38
[   44.812736]  dump_stack_lvl+0x8c/0xd0
[   44.816382]  print_report+0x118/0x5e0
[   44.820028]  kasan_report+0xc8/0x118
[   44.823587]  __asan_report_load8_noabort+0x20/0x30
[   44.828361]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   44.834437]  kasan_bitops_generic+0x120/0x1d0
[   44.838778]  kunit_try_run_case+0x14c/0x3d0
[   44.842944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.848413]  kthread+0x24c/0x2d0
[   44.851625]  ret_from_fork+0x10/0x20
[   44.855184] 
[   44.856659] Allocated by task 298:
[   44.860044]  kasan_save_stack+0x3c/0x68
[   44.863864]  kasan_save_track+0x20/0x40
[   44.867683]  kasan_save_alloc_info+0x40/0x58
[   44.871937]  __kasan_kmalloc+0xd4/0xd8
[   44.875669]  __kmalloc_cache_noprof+0x144/0x328
[   44.880183]  kasan_bitops_generic+0xa0/0x1d0
[   44.884436]  kunit_try_run_case+0x14c/0x3d0
[   44.888603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.894072]  kthread+0x24c/0x2d0
[   44.897284]  ret_from_fork+0x10/0x20
[   44.900843] 
[   44.902318] The buggy address belongs to the object at ffff000801ef7020
[   44.902318]  which belongs to the cache kmalloc-16 of size 16
[   44.914646] The buggy address is located 8 bytes inside of
[   44.914646]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.926884] 
[   44.928359] The buggy address belongs to the physical page:
[   44.933915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.941903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.948411] page_type: f5(slab)
[   44.951543] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.959268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.966987] page dumped because: kasan: bad access detected
[   44.972543] 
[   44.974018] Memory state around the buggy address:
[   44.978798]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.986001]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.993206] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.000407]                                   ^
[   45.004924]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.012129]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.019330] ==================================================================
---
[   44.223750] ==================================================================
[   44.230802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   44.239741] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   44.247033] 
[   44.248514] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   44.257629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.261790] Hardware name: WinLink E850-96 board (DT)
[   44.266825] Call trace:
[   44.269255]  dump_backtrace+0x9c/0x128
[   44.272988]  show_stack+0x20/0x38
[   44.276286]  dump_stack_lvl+0x8c/0xd0
[   44.279932]  print_report+0x118/0x5e0
[   44.283578]  kasan_report+0xc8/0x118
[   44.287136]  __asan_report_load8_noabort+0x20/0x30
[   44.291911]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   44.297987]  kasan_bitops_generic+0x120/0x1d0
[   44.302327]  kunit_try_run_case+0x14c/0x3d0
[   44.306494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.311964]  kthread+0x24c/0x2d0
[   44.315174]  ret_from_fork+0x10/0x20
[   44.318735] 
[   44.320209] Allocated by task 298:
[   44.323594]  kasan_save_stack+0x3c/0x68
[   44.327414]  kasan_save_track+0x20/0x40
[   44.331233]  kasan_save_alloc_info+0x40/0x58
[   44.335487]  __kasan_kmalloc+0xd4/0xd8
[   44.339219]  __kmalloc_cache_noprof+0x144/0x328
[   44.343733]  kasan_bitops_generic+0xa0/0x1d0
[   44.347986]  kunit_try_run_case+0x14c/0x3d0
[   44.352153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.357622]  kthread+0x24c/0x2d0
[   44.360833]  ret_from_fork+0x10/0x20
[   44.364393] 
[   44.365868] The buggy address belongs to the object at ffff000801ef7020
[   44.365868]  which belongs to the cache kmalloc-16 of size 16
[   44.378197] The buggy address is located 8 bytes inside of
[   44.378197]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   44.390433] 
[   44.391909] The buggy address belongs to the physical page:
[   44.397465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   44.405452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.411961] page_type: f5(slab)
[   44.415093] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.422817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   44.430537] page dumped because: kasan: bad access detected
[   44.436093] 
[   44.437568] Memory state around the buggy address:
[   44.442347]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.449551]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.456755] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.463957]                                   ^
[   44.468474]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.475678]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.482880] ==================================================================
---
[   45.833088] ==================================================================
[   45.840153] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   45.849093] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.856384] 
[   45.857864] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.866979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.871140] Hardware name: WinLink E850-96 board (DT)
[   45.876175] Call trace:
[   45.878606]  dump_backtrace+0x9c/0x128
[   45.882339]  show_stack+0x20/0x38
[   45.885637]  dump_stack_lvl+0x8c/0xd0
[   45.889283]  print_report+0x118/0x5e0
[   45.892929]  kasan_report+0xc8/0x118
[   45.896487]  __asan_report_load8_noabort+0x20/0x30
[   45.901262]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   45.907338]  kasan_bitops_generic+0x120/0x1d0
[   45.911678]  kunit_try_run_case+0x14c/0x3d0
[   45.915845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.921313]  kthread+0x24c/0x2d0
[   45.924525]  ret_from_fork+0x10/0x20
[   45.928085] 
[   45.929560] Allocated by task 298:
[   45.932945]  kasan_save_stack+0x3c/0x68
[   45.936765]  kasan_save_track+0x20/0x40
[   45.940584]  kasan_save_alloc_info+0x40/0x58
[   45.944837]  __kasan_kmalloc+0xd4/0xd8
[   45.948570]  __kmalloc_cache_noprof+0x144/0x328
[   45.953084]  kasan_bitops_generic+0xa0/0x1d0
[   45.957337]  kunit_try_run_case+0x14c/0x3d0
[   45.961504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.966972]  kthread+0x24c/0x2d0
[   45.970184]  ret_from_fork+0x10/0x20
[   45.973743] 
[   45.975219] The buggy address belongs to the object at ffff000801ef7020
[   45.975219]  which belongs to the cache kmalloc-16 of size 16
[   45.987545] The buggy address is located 8 bytes inside of
[   45.987545]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.999784] 
[   46.001260] The buggy address belongs to the physical page:
[   46.006816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   46.014803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.021311] page_type: f5(slab)
[   46.024444] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.032168] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   46.039888] page dumped because: kasan: bad access detected
[   46.045443] 
[   46.046919] Memory state around the buggy address:
[   46.051698]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.058901]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.066106] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.073307]                                   ^
[   46.077825]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.085030]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.092231] ==================================================================
---
[   45.296635] ==================================================================
[   45.303707] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   45.312642] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   45.319934] 
[   45.321414] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   45.330528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.334690] Hardware name: WinLink E850-96 board (DT)
[   45.339725] Call trace:
[   45.342155]  dump_backtrace+0x9c/0x128
[   45.345888]  show_stack+0x20/0x38
[   45.349186]  dump_stack_lvl+0x8c/0xd0
[   45.352832]  print_report+0x118/0x5e0
[   45.356478]  kasan_report+0xc8/0x118
[   45.360037]  __asan_report_load8_noabort+0x20/0x30
[   45.364811]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   45.370888]  kasan_bitops_generic+0x120/0x1d0
[   45.375229]  kunit_try_run_case+0x14c/0x3d0
[   45.379394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.384863]  kthread+0x24c/0x2d0
[   45.388075]  ret_from_fork+0x10/0x20
[   45.391634] 
[   45.393109] Allocated by task 298:
[   45.396495]  kasan_save_stack+0x3c/0x68
[   45.400314]  kasan_save_track+0x20/0x40
[   45.404133]  kasan_save_alloc_info+0x40/0x58
[   45.408387]  __kasan_kmalloc+0xd4/0xd8
[   45.412120]  __kmalloc_cache_noprof+0x144/0x328
[   45.416633]  kasan_bitops_generic+0xa0/0x1d0
[   45.420887]  kunit_try_run_case+0x14c/0x3d0
[   45.425053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.430522]  kthread+0x24c/0x2d0
[   45.433734]  ret_from_fork+0x10/0x20
[   45.437293] 
[   45.438768] The buggy address belongs to the object at ffff000801ef7020
[   45.438768]  which belongs to the cache kmalloc-16 of size 16
[   45.451097] The buggy address is located 8 bytes inside of
[   45.451097]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   45.463334] 
[   45.464810] The buggy address belongs to the physical page:
[   45.470366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   45.478355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.484861] page_type: f5(slab)
[   45.487994] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.495718] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   45.503438] page dumped because: kasan: bad access detected
[   45.508993] 
[   45.510468] Memory state around the buggy address:
[   45.515248]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.522451]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.529656] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.536857]                                   ^
[   45.541374]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.548579]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.555781] ==================================================================
---
[   46.099557] ==================================================================
[   46.106645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   46.115582] Read of size 8 at addr ffff000801ef7028 by task kunit_try_catch/298
[   46.122873] 
[   46.124354] CPU: 5 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   46.133468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.137629] Hardware name: WinLink E850-96 board (DT)
[   46.142665] Call trace:
[   46.145095]  dump_backtrace+0x9c/0x128
[   46.148827]  show_stack+0x20/0x38
[   46.152126]  dump_stack_lvl+0x8c/0xd0
[   46.155772]  print_report+0x118/0x5e0
[   46.159418]  kasan_report+0xc8/0x118
[   46.162976]  __asan_report_load8_noabort+0x20/0x30
[   46.167751]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   46.173827]  kasan_bitops_generic+0x120/0x1d0
[   46.178167]  kunit_try_run_case+0x14c/0x3d0
[   46.182334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.187802]  kthread+0x24c/0x2d0
[   46.191014]  ret_from_fork+0x10/0x20
[   46.194573] 
[   46.196049] Allocated by task 298:
[   46.199434]  kasan_save_stack+0x3c/0x68
[   46.203254]  kasan_save_track+0x20/0x40
[   46.207073]  kasan_save_alloc_info+0x40/0x58
[   46.211326]  __kasan_kmalloc+0xd4/0xd8
[   46.215059]  __kmalloc_cache_noprof+0x144/0x328
[   46.219573]  kasan_bitops_generic+0xa0/0x1d0
[   46.223826]  kunit_try_run_case+0x14c/0x3d0
[   46.227993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.233461]  kthread+0x24c/0x2d0
[   46.236673]  ret_from_fork+0x10/0x20
[   46.240232] 
[   46.241708] The buggy address belongs to the object at ffff000801ef7020
[   46.241708]  which belongs to the cache kmalloc-16 of size 16
[   46.254034] The buggy address is located 8 bytes inside of
[   46.254034]  allocated 9-byte region [ffff000801ef7020, ffff000801ef7029)
[   46.266274] 
[   46.267749] The buggy address belongs to the physical page:
[   46.273305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ef7
[   46.281293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.287801] page_type: f5(slab)
[   46.290933] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.298657] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   46.306377] page dumped because: kasan: bad access detected
[   46.311932] 
[   46.313408] Memory state around the buggy address:
[   46.318187]  ffff000801ef6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.325390]  ffff000801ef6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.332595] >ffff000801ef7000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.339797]                                   ^
[   46.344314]  ffff000801ef7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.351518]  ffff000801ef7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.358720] ==================================================================

test log snippet test parser 43

Home

[   19.877477] ==================================================================
[   19.887252] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308
[   19.894536] Write of size 1 at addr ffff000802721f00 by task kunit_try_catch/181
[   19.901912] 
[   19.903397] CPU: 7 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.912511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.916670] Hardware name: WinLink E850-96 board (DT)
[   19.921708] Call trace:
[   19.924136]  dump_backtrace+0x9c/0x128
[   19.927867]  show_stack+0x20/0x38
[   19.931165]  dump_stack_lvl+0x8c/0xd0
[   19.934811]  print_report+0x118/0x5e0
[   19.938457]  kasan_report+0xc8/0x118
[   19.942016]  __asan_report_store1_noabort+0x20/0x30
[   19.946877]  kmalloc_big_oob_right+0x2b8/0x308
[   19.951304]  kunit_try_run_case+0x14c/0x3d0
[   19.955470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960939]  kthread+0x24c/0x2d0
[   19.964151]  ret_from_fork+0x10/0x20
[   19.967714] 
[   19.969187] Allocated by task 181:
[   19.972573]  kasan_save_stack+0x3c/0x68
[   19.976390]  kasan_save_track+0x20/0x40
[   19.980210]  kasan_save_alloc_info+0x40/0x58
[   19.984463]  __kasan_kmalloc+0xd4/0xd8
[   19.988195]  __kmalloc_cache_noprof+0x144/0x328
[   19.992710]  kmalloc_big_oob_right+0xb8/0x308
[   19.997049]  kunit_try_run_case+0x14c/0x3d0
[   20.001216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.006689]  kthread+0x24c/0x2d0
[   20.009896]  ret_from_fork+0x10/0x20
[   20.013456] 
[   20.014933] The buggy address belongs to the object at ffff000802720000
[   20.014933]  which belongs to the cache kmalloc-8k of size 8192
[   20.027435] The buggy address is located 0 bytes to the right of
[   20.027435]  allocated 7936-byte region [ffff000802720000, ffff000802721f00)
[   20.040452] 
[   20.041930] The buggy address belongs to the physical page:
[   20.047488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882720
[   20.055470] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.063111] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.070054] page_type: f5(slab)
[   20.073190] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   20.080908] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   20.088635] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   20.096446] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   20.104259] head: 0bfffe0000000003 fffffdffe009c801 ffffffffffffffff 0000000000000000
[   20.112071] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   20.119877] page dumped because: kasan: bad access detected
[   20.125433] 
[   20.126909] Memory state around the buggy address:
[   20.131690]  ffff000802721e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.138893]  ffff000802721e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.146099] >ffff000802721f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.153297]                    ^
[   20.156512]  ffff000802721f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.163718]  ffff000802722000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.170920] ==================================================================

test log snippet test parser 44

Home

[   19.877477] ==================================================================
[   19.887252] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308
[   19.894536] Write of size 1 at addr ffff000802721f00 by task kunit_try_catch/181
[   19.901912] 
[   19.903397] CPU: 7 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.912511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.916670] Hardware name: WinLink E850-96 board (DT)
[   19.921708] Call trace:
[   19.924136]  dump_backtrace+0x9c/0x128
[   19.927867]  show_stack+0x20/0x38
[   19.931165]  dump_stack_lvl+0x8c/0xd0
[   19.934811]  print_report+0x118/0x5e0
[   19.938457]  kasan_report+0xc8/0x118
[   19.942016]  __asan_report_store1_noabort+0x20/0x30
[   19.946877]  kmalloc_big_oob_right+0x2b8/0x308
[   19.951304]  kunit_try_run_case+0x14c/0x3d0
[   19.955470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960939]  kthread+0x24c/0x2d0
[   19.964151]  ret_from_fork+0x10/0x20
[   19.967714] 
[   19.969187] Allocated by task 181:
[   19.972573]  kasan_save_stack+0x3c/0x68
[   19.976390]  kasan_save_track+0x20/0x40
[   19.980210]  kasan_save_alloc_info+0x40/0x58
[   19.984463]  __kasan_kmalloc+0xd4/0xd8
[   19.988195]  __kmalloc_cache_noprof+0x144/0x328
[   19.992710]  kmalloc_big_oob_right+0xb8/0x308
[   19.997049]  kunit_try_run_case+0x14c/0x3d0
[   20.001216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.006689]  kthread+0x24c/0x2d0
[   20.009896]  ret_from_fork+0x10/0x20
[   20.013456] 
[   20.014933] The buggy address belongs to the object at ffff000802720000
[   20.014933]  which belongs to the cache kmalloc-8k of size 8192
[   20.027435] The buggy address is located 0 bytes to the right of
[   20.027435]  allocated 7936-byte region [ffff000802720000, ffff000802721f00)
[   20.040452] 
[   20.041930] The buggy address belongs to the physical page:
[   20.047488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882720
[   20.055470] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.063111] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.070054] page_type: f5(slab)
[   20.073190] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   20.080908] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   20.088635] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   20.096446] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   20.104259] head: 0bfffe0000000003 fffffdffe009c801 ffffffffffffffff 0000000000000000
[   20.112071] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   20.119877] page dumped because: kasan: bad access detected
[   20.125433] 
[   20.126909] Memory state around the buggy address:
[   20.131690]  ffff000802721e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.138893]  ffff000802721e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.146099] >ffff000802721f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.153297]                    ^
[   20.156512]  ffff000802721f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.163718]  ffff000802722000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.170920] ==================================================================

test log snippet test parser 45

Home

[   20.180188] ==================================================================
[   20.189412] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0
[   20.196874] Write of size 1 at addr ffff00080342600a by task kunit_try_catch/183
[   20.204254] 
[   20.205737] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.214850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.219009] Hardware name: WinLink E850-96 board (DT)
[   20.224047] Call trace:
[   20.226475]  dump_backtrace+0x9c/0x128
[   20.230206]  show_stack+0x20/0x38
[   20.233504]  dump_stack_lvl+0x8c/0xd0
[   20.237150]  print_report+0x118/0x5e0
[   20.240796]  kasan_report+0xc8/0x118
[   20.244355]  __asan_report_store1_noabort+0x20/0x30
[   20.249216]  kmalloc_large_oob_right+0x28c/0x2d0
[   20.253816]  kunit_try_run_case+0x14c/0x3d0
[   20.257982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.263452]  kthread+0x24c/0x2d0
[   20.266663]  ret_from_fork+0x10/0x20
[   20.270227] 
[   20.271701] The buggy address belongs to the physical page:
[   20.277259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   20.285241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.292879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.299839] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.307555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.315280] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.323092] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.330905] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   20.338716] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.346523] page dumped because: kasan: bad access detected
[   20.352080] 
[   20.353554] Memory state around the buggy address:
[   20.358336]  ffff000803425f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.365537]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.372743] >ffff000803426000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.379943]                       ^
[   20.383419]  ffff000803426080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.390623]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.397826] ==================================================================

test log snippet test parser 46

Home

[   20.180188] ==================================================================
[   20.189412] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0
[   20.196874] Write of size 1 at addr ffff00080342600a by task kunit_try_catch/183
[   20.204254] 
[   20.205737] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.214850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.219009] Hardware name: WinLink E850-96 board (DT)
[   20.224047] Call trace:
[   20.226475]  dump_backtrace+0x9c/0x128
[   20.230206]  show_stack+0x20/0x38
[   20.233504]  dump_stack_lvl+0x8c/0xd0
[   20.237150]  print_report+0x118/0x5e0
[   20.240796]  kasan_report+0xc8/0x118
[   20.244355]  __asan_report_store1_noabort+0x20/0x30
[   20.249216]  kmalloc_large_oob_right+0x28c/0x2d0
[   20.253816]  kunit_try_run_case+0x14c/0x3d0
[   20.257982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.263452]  kthread+0x24c/0x2d0
[   20.266663]  ret_from_fork+0x10/0x20
[   20.270227] 
[   20.271701] The buggy address belongs to the physical page:
[   20.277259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   20.285241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.292879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.299839] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.307555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.315280] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.323092] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.330905] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   20.338716] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.346523] page dumped because: kasan: bad access detected
[   20.352080] 
[   20.353554] Memory state around the buggy address:
[   20.358336]  ffff000803425f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.365537]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.372743] >ffff000803426000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.379943]                       ^
[   20.383419]  ffff000803426080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.390623]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.397826] ==================================================================

test log snippet test parser 47

Home

[   27.869272] ==================================================================
[   27.879574] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8
[   27.887472] Read of size 64 at addr ffff000800ddd504 by task kunit_try_catch/219
[   27.894849] 
[   27.896333] CPU: 7 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.905445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.909606] Hardware name: WinLink E850-96 board (DT)
[   27.914644] Call trace:
[   27.917073]  dump_backtrace+0x9c/0x128
[   27.920802]  show_stack+0x20/0x38
[   27.924100]  dump_stack_lvl+0x8c/0xd0
[   27.927747]  print_report+0x118/0x5e0
[   27.931393]  kasan_report+0xc8/0x118
[   27.934951]  kasan_check_range+0x100/0x1a8
[   27.939031]  __asan_memmove+0x3c/0x98
[   27.942677]  kmalloc_memmove_invalid_size+0x15c/0x2f8
[   27.947712]  kunit_try_run_case+0x14c/0x3d0
[   27.951878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.957347]  kthread+0x24c/0x2d0
[   27.960559]  ret_from_fork+0x10/0x20
[   27.964121] 
[   27.965595] Allocated by task 219:
[   27.968982]  kasan_save_stack+0x3c/0x68
[   27.972798]  kasan_save_track+0x20/0x40
[   27.976617]  kasan_save_alloc_info+0x40/0x58
[   27.980871]  __kasan_kmalloc+0xd4/0xd8
[   27.984603]  __kmalloc_cache_noprof+0x144/0x328
[   27.989117]  kmalloc_memmove_invalid_size+0xb8/0x2f8
[   27.994065]  kunit_try_run_case+0x14c/0x3d0
[   27.998232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.003700]  kthread+0x24c/0x2d0
[   28.006912]  ret_from_fork+0x10/0x20
[   28.010471] 
[   28.011947] The buggy address belongs to the object at ffff000800ddd500
[   28.011947]  which belongs to the cache kmalloc-64 of size 64
[   28.024275] The buggy address is located 4 bytes inside of
[   28.024275]  allocated 64-byte region [ffff000800ddd500, ffff000800ddd540)
[   28.036599] 
[   28.038077] The buggy address belongs to the physical page:
[   28.043635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   28.051618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.058127] page_type: f5(slab)
[   28.061267] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.068984] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.076703] page dumped because: kasan: bad access detected
[   28.082259] 
[   28.083734] Memory state around the buggy address:
[   28.088515]  ffff000800ddd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.095716]  ffff000800ddd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.102923] >ffff000800ddd500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.110122]                                            ^
[   28.115421]  ffff000800ddd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122627]  ffff000800ddd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.129827] ==================================================================

test log snippet test parser 48

Home

[   27.869272] ==================================================================
[   27.879574] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8
[   27.887472] Read of size 64 at addr ffff000800ddd504 by task kunit_try_catch/219
[   27.894849] 
[   27.896333] CPU: 7 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.905445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.909606] Hardware name: WinLink E850-96 board (DT)
[   27.914644] Call trace:
[   27.917073]  dump_backtrace+0x9c/0x128
[   27.920802]  show_stack+0x20/0x38
[   27.924100]  dump_stack_lvl+0x8c/0xd0
[   27.927747]  print_report+0x118/0x5e0
[   27.931393]  kasan_report+0xc8/0x118
[   27.934951]  kasan_check_range+0x100/0x1a8
[   27.939031]  __asan_memmove+0x3c/0x98
[   27.942677]  kmalloc_memmove_invalid_size+0x15c/0x2f8
[   27.947712]  kunit_try_run_case+0x14c/0x3d0
[   27.951878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.957347]  kthread+0x24c/0x2d0
[   27.960559]  ret_from_fork+0x10/0x20
[   27.964121] 
[   27.965595] Allocated by task 219:
[   27.968982]  kasan_save_stack+0x3c/0x68
[   27.972798]  kasan_save_track+0x20/0x40
[   27.976617]  kasan_save_alloc_info+0x40/0x58
[   27.980871]  __kasan_kmalloc+0xd4/0xd8
[   27.984603]  __kmalloc_cache_noprof+0x144/0x328
[   27.989117]  kmalloc_memmove_invalid_size+0xb8/0x2f8
[   27.994065]  kunit_try_run_case+0x14c/0x3d0
[   27.998232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.003700]  kthread+0x24c/0x2d0
[   28.006912]  ret_from_fork+0x10/0x20
[   28.010471] 
[   28.011947] The buggy address belongs to the object at ffff000800ddd500
[   28.011947]  which belongs to the cache kmalloc-64 of size 64
[   28.024275] The buggy address is located 4 bytes inside of
[   28.024275]  allocated 64-byte region [ffff000800ddd500, ffff000800ddd540)
[   28.036599] 
[   28.038077] The buggy address belongs to the physical page:
[   28.043635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   28.051618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.058127] page_type: f5(slab)
[   28.061267] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.068984] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.076703] page dumped because: kasan: bad access detected
[   28.082259] 
[   28.083734] Memory state around the buggy address:
[   28.088515]  ffff000800ddd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.095716]  ffff000800ddd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.102923] >ffff000800ddd500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.110122]                                            ^
[   28.115421]  ffff000800ddd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122627]  ffff000800ddd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.129827] ==================================================================

test log snippet test parser 49

Home

[   19.575209] ==================================================================
[   19.584478] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348
[   19.591851] Read of size 1 at addr ffff000802719000 by task kunit_try_catch/179
[   19.599141] 
[   19.600625] CPU: 7 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.609736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.613897] Hardware name: WinLink E850-96 board (DT)
[   19.618934] Call trace:
[   19.621364]  dump_backtrace+0x9c/0x128
[   19.625094]  show_stack+0x20/0x38
[   19.628392]  dump_stack_lvl+0x8c/0xd0
[   19.632038]  print_report+0x118/0x5e0
[   19.635684]  kasan_report+0xc8/0x118
[   19.639242]  __asan_report_load1_noabort+0x20/0x30
[   19.644017]  kmalloc_node_oob_right+0x310/0x348
[   19.648530]  kunit_try_run_case+0x14c/0x3d0
[   19.652697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.658167]  kthread+0x24c/0x2d0
[   19.661378]  ret_from_fork+0x10/0x20
[   19.664941] 
[   19.666414] Allocated by task 179:
[   19.669800]  kasan_save_stack+0x3c/0x68
[   19.673617]  kasan_save_track+0x20/0x40
[   19.677436]  kasan_save_alloc_info+0x40/0x58
[   19.681690]  __kasan_kmalloc+0xd4/0xd8
[   19.685422]  __kmalloc_cache_node_noprof+0x164/0x348
[   19.690370]  kmalloc_node_oob_right+0xbc/0x348
[   19.694797]  kunit_try_run_case+0x14c/0x3d0
[   19.698964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704432]  kthread+0x24c/0x2d0
[   19.707645]  ret_from_fork+0x10/0x20
[   19.711203] 
[   19.712679] The buggy address belongs to the object at ffff000802718000
[   19.712679]  which belongs to the cache kmalloc-4k of size 4096
[   19.725182] The buggy address is located 0 bytes to the right of
[   19.725182]  allocated 4096-byte region [ffff000802718000, ffff000802719000)
[   19.738200] 
[   19.739678] The buggy address belongs to the physical page:
[   19.745235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882718
[   19.753218] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.760856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.767800] page_type: f5(slab)
[   19.770938] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   19.778656] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   19.786382] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   19.794194] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   19.802008] head: 0bfffe0000000003 fffffdffe009c601 ffffffffffffffff 0000000000000000
[   19.809818] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   19.817625] page dumped because: kasan: bad access detected
[   19.823182] 
[   19.824656] Memory state around the buggy address:
[   19.829437]  ffff000802718f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.836640]  ffff000802718f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.843845] >ffff000802719000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851045]                    ^
[   19.854260]  ffff000802719080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861465]  ffff000802719100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.868666] ==================================================================

test log snippet test parser 50

Home

[   19.575209] ==================================================================
[   19.584478] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348
[   19.591851] Read of size 1 at addr ffff000802719000 by task kunit_try_catch/179
[   19.599141] 
[   19.600625] CPU: 7 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.609736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.613897] Hardware name: WinLink E850-96 board (DT)
[   19.618934] Call trace:
[   19.621364]  dump_backtrace+0x9c/0x128
[   19.625094]  show_stack+0x20/0x38
[   19.628392]  dump_stack_lvl+0x8c/0xd0
[   19.632038]  print_report+0x118/0x5e0
[   19.635684]  kasan_report+0xc8/0x118
[   19.639242]  __asan_report_load1_noabort+0x20/0x30
[   19.644017]  kmalloc_node_oob_right+0x310/0x348
[   19.648530]  kunit_try_run_case+0x14c/0x3d0
[   19.652697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.658167]  kthread+0x24c/0x2d0
[   19.661378]  ret_from_fork+0x10/0x20
[   19.664941] 
[   19.666414] Allocated by task 179:
[   19.669800]  kasan_save_stack+0x3c/0x68
[   19.673617]  kasan_save_track+0x20/0x40
[   19.677436]  kasan_save_alloc_info+0x40/0x58
[   19.681690]  __kasan_kmalloc+0xd4/0xd8
[   19.685422]  __kmalloc_cache_node_noprof+0x164/0x348
[   19.690370]  kmalloc_node_oob_right+0xbc/0x348
[   19.694797]  kunit_try_run_case+0x14c/0x3d0
[   19.698964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704432]  kthread+0x24c/0x2d0
[   19.707645]  ret_from_fork+0x10/0x20
[   19.711203] 
[   19.712679] The buggy address belongs to the object at ffff000802718000
[   19.712679]  which belongs to the cache kmalloc-4k of size 4096
[   19.725182] The buggy address is located 0 bytes to the right of
[   19.725182]  allocated 4096-byte region [ffff000802718000, ffff000802719000)
[   19.738200] 
[   19.739678] The buggy address belongs to the physical page:
[   19.745235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882718
[   19.753218] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.760856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.767800] page_type: f5(slab)
[   19.770938] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   19.778656] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   19.786382] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   19.794194] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   19.802008] head: 0bfffe0000000003 fffffdffe009c601 ffffffffffffffff 0000000000000000
[   19.809818] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   19.817625] page dumped because: kasan: bad access detected
[   19.823182] 
[   19.824656] Memory state around the buggy address:
[   19.829437]  ffff000802718f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.836640]  ffff000802718f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.843845] >ffff000802719000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851045]                    ^
[   19.854260]  ffff000802719080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861465]  ffff000802719100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.868666] ==================================================================

test log snippet test parser 51

Home

[   25.497006] ==================================================================
[   25.505999] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400
[   25.512682] Write of size 16 at addr ffff000800dde020 by task kunit_try_catch/203
[   25.520144] 
[   25.521629] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   25.530740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.534902] Hardware name: WinLink E850-96 board (DT)
[   25.539937] Call trace:
[   25.542368]  dump_backtrace+0x9c/0x128
[   25.546098]  show_stack+0x20/0x38
[   25.549397]  dump_stack_lvl+0x8c/0xd0
[   25.553043]  print_report+0x118/0x5e0
[   25.556689]  kasan_report+0xc8/0x118
[   25.560247]  __asan_report_store16_noabort+0x20/0x30
[   25.565195]  kmalloc_oob_16+0x3a8/0x400
[   25.569015]  kunit_try_run_case+0x14c/0x3d0
[   25.573181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.578650]  kthread+0x24c/0x2d0
[   25.581861]  ret_from_fork+0x10/0x20
[   25.585425] 
[   25.586897] Allocated by task 203:
[   25.590284]  kasan_save_stack+0x3c/0x68
[   25.594101]  kasan_save_track+0x20/0x40
[   25.597920]  kasan_save_alloc_info+0x40/0x58
[   25.602174]  __kasan_kmalloc+0xd4/0xd8
[   25.605906]  __kmalloc_cache_noprof+0x144/0x328
[   25.610420]  kmalloc_oob_16+0xb4/0x400
[   25.614154]  kunit_try_run_case+0x14c/0x3d0
[   25.618319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.623788]  kthread+0x24c/0x2d0
[   25.627000]  ret_from_fork+0x10/0x20
[   25.630558] 
[   25.632037] The buggy address belongs to the object at ffff000800dde020
[   25.632037]  which belongs to the cache kmalloc-16 of size 16
[   25.644362] The buggy address is located 0 bytes inside of
[   25.644362]  allocated 13-byte region [ffff000800dde020, ffff000800dde02d)
[   25.656687] 
[   25.658165] The buggy address belongs to the physical page:
[   25.663723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dde
[   25.671707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.678215] page_type: f5(slab)
[   25.681352] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   25.689070] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.696790] page dumped because: kasan: bad access detected
[   25.702346] 
[   25.703821] Memory state around the buggy address:
[   25.708602]  ffff000800dddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.715804]  ffff000800dddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.723010] >ffff000800dde000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   25.730210]                                   ^
[   25.734727]  ffff000800dde080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.741932]  ffff000800dde100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.749135] ==================================================================

test log snippet test parser 52

Home

[   25.497006] ==================================================================
[   25.505999] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400
[   25.512682] Write of size 16 at addr ffff000800dde020 by task kunit_try_catch/203
[   25.520144] 
[   25.521629] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   25.530740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.534902] Hardware name: WinLink E850-96 board (DT)
[   25.539937] Call trace:
[   25.542368]  dump_backtrace+0x9c/0x128
[   25.546098]  show_stack+0x20/0x38
[   25.549397]  dump_stack_lvl+0x8c/0xd0
[   25.553043]  print_report+0x118/0x5e0
[   25.556689]  kasan_report+0xc8/0x118
[   25.560247]  __asan_report_store16_noabort+0x20/0x30
[   25.565195]  kmalloc_oob_16+0x3a8/0x400
[   25.569015]  kunit_try_run_case+0x14c/0x3d0
[   25.573181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.578650]  kthread+0x24c/0x2d0
[   25.581861]  ret_from_fork+0x10/0x20
[   25.585425] 
[   25.586897] Allocated by task 203:
[   25.590284]  kasan_save_stack+0x3c/0x68
[   25.594101]  kasan_save_track+0x20/0x40
[   25.597920]  kasan_save_alloc_info+0x40/0x58
[   25.602174]  __kasan_kmalloc+0xd4/0xd8
[   25.605906]  __kmalloc_cache_noprof+0x144/0x328
[   25.610420]  kmalloc_oob_16+0xb4/0x400
[   25.614154]  kunit_try_run_case+0x14c/0x3d0
[   25.618319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.623788]  kthread+0x24c/0x2d0
[   25.627000]  ret_from_fork+0x10/0x20
[   25.630558] 
[   25.632037] The buggy address belongs to the object at ffff000800dde020
[   25.632037]  which belongs to the cache kmalloc-16 of size 16
[   25.644362] The buggy address is located 0 bytes inside of
[   25.644362]  allocated 13-byte region [ffff000800dde020, ffff000800dde02d)
[   25.656687] 
[   25.658165] The buggy address belongs to the physical page:
[   25.663723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dde
[   25.671707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.678215] page_type: f5(slab)
[   25.681352] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   25.689070] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.696790] page dumped because: kasan: bad access detected
[   25.702346] 
[   25.703821] Memory state around the buggy address:
[   25.708602]  ffff000800dddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.715804]  ffff000800dddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.723010] >ffff000800dde000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   25.730210]                                   ^
[   25.734727]  ffff000800dde080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.741932]  ffff000800dde100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.749135] ==================================================================

test log snippet test parser 53

Home

[   26.060764] ==================================================================
[   26.070052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8
[   26.077343] Write of size 128 at addr ffff000801fac300 by task kunit_try_catch/207
[   26.084892] 
[   26.086377] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   26.095489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.099650] Hardware name: WinLink E850-96 board (DT)
[   26.104688] Call trace:
[   26.107116]  dump_backtrace+0x9c/0x128
[   26.110847]  show_stack+0x20/0x38
[   26.114146]  dump_stack_lvl+0x8c/0xd0
[   26.117791]  print_report+0x118/0x5e0
[   26.121437]  kasan_report+0xc8/0x118
[   26.124996]  kasan_check_range+0x100/0x1a8
[   26.129075]  __asan_memset+0x34/0x78
[   26.132635]  kmalloc_oob_in_memset+0x150/0x2e8
[   26.137061]  kunit_try_run_case+0x14c/0x3d0
[   26.141228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.146697]  kthread+0x24c/0x2d0
[   26.149908]  ret_from_fork+0x10/0x20
[   26.153470] 
[   26.154944] Allocated by task 207:
[   26.158331]  kasan_save_stack+0x3c/0x68
[   26.162148]  kasan_save_track+0x20/0x40
[   26.165967]  kasan_save_alloc_info+0x40/0x58
[   26.170221]  __kasan_kmalloc+0xd4/0xd8
[   26.173953]  __kmalloc_cache_noprof+0x144/0x328
[   26.178467]  kmalloc_oob_in_memset+0xb0/0x2e8
[   26.182807]  kunit_try_run_case+0x14c/0x3d0
[   26.186974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.192443]  kthread+0x24c/0x2d0
[   26.195655]  ret_from_fork+0x10/0x20
[   26.199213] 
[   26.200692] The buggy address belongs to the object at ffff000801fac300
[   26.200692]  which belongs to the cache kmalloc-128 of size 128
[   26.213193] The buggy address is located 0 bytes inside of
[   26.213193]  allocated 120-byte region [ffff000801fac300, ffff000801fac378)
[   26.225604] 
[   26.227080] The buggy address belongs to the physical page:
[   26.232638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   26.240621] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.248262] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.255203] page_type: f5(slab)
[   26.258342] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.266058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.273785] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.281596] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.289409] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   26.297221] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.305028] page dumped because: kasan: bad access detected
[   26.310583] 
[   26.312059] Memory state around the buggy address:
[   26.316838]  ffff000801fac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.324042]  ffff000801fac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.331248] >ffff000801fac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.338447]                                                                 ^
[   26.345569]  ffff000801fac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.352775]  ffff000801fac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.359975] ==================================================================

test log snippet test parser 54

Home

[   26.060764] ==================================================================
[   26.070052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8
[   26.077343] Write of size 128 at addr ffff000801fac300 by task kunit_try_catch/207
[   26.084892] 
[   26.086377] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   26.095489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.099650] Hardware name: WinLink E850-96 board (DT)
[   26.104688] Call trace:
[   26.107116]  dump_backtrace+0x9c/0x128
[   26.110847]  show_stack+0x20/0x38
[   26.114146]  dump_stack_lvl+0x8c/0xd0
[   26.117791]  print_report+0x118/0x5e0
[   26.121437]  kasan_report+0xc8/0x118
[   26.124996]  kasan_check_range+0x100/0x1a8
[   26.129075]  __asan_memset+0x34/0x78
[   26.132635]  kmalloc_oob_in_memset+0x150/0x2e8
[   26.137061]  kunit_try_run_case+0x14c/0x3d0
[   26.141228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.146697]  kthread+0x24c/0x2d0
[   26.149908]  ret_from_fork+0x10/0x20
[   26.153470] 
[   26.154944] Allocated by task 207:
[   26.158331]  kasan_save_stack+0x3c/0x68
[   26.162148]  kasan_save_track+0x20/0x40
[   26.165967]  kasan_save_alloc_info+0x40/0x58
[   26.170221]  __kasan_kmalloc+0xd4/0xd8
[   26.173953]  __kmalloc_cache_noprof+0x144/0x328
[   26.178467]  kmalloc_oob_in_memset+0xb0/0x2e8
[   26.182807]  kunit_try_run_case+0x14c/0x3d0
[   26.186974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.192443]  kthread+0x24c/0x2d0
[   26.195655]  ret_from_fork+0x10/0x20
[   26.199213] 
[   26.200692] The buggy address belongs to the object at ffff000801fac300
[   26.200692]  which belongs to the cache kmalloc-128 of size 128
[   26.213193] The buggy address is located 0 bytes inside of
[   26.213193]  allocated 120-byte region [ffff000801fac300, ffff000801fac378)
[   26.225604] 
[   26.227080] The buggy address belongs to the physical page:
[   26.232638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   26.240621] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.248262] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.255203] page_type: f5(slab)
[   26.258342] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.266058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.273785] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.281596] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.289409] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   26.297221] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.305028] page dumped because: kasan: bad access detected
[   26.310583] 
[   26.312059] Memory state around the buggy address:
[   26.316838]  ffff000801fac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.324042]  ffff000801fac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.331248] >ffff000801fac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.338447]                                                                 ^
[   26.345569]  ffff000801fac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.352775]  ffff000801fac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.359975] ==================================================================

test log snippet test parser 55

Home

[   19.271613] ==================================================================
[   19.280832] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340
[   19.287688] Read of size 1 at addr ffff0008014068bf by task kunit_try_catch/177
[   19.294978] 
[   19.296463] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.305576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.309735] Hardware name: WinLink E850-96 board (DT)
[   19.314773] Call trace:
[   19.317200]  dump_backtrace+0x9c/0x128
[   19.320933]  show_stack+0x20/0x38
[   19.324230]  dump_stack_lvl+0x8c/0xd0
[   19.327876]  print_report+0x118/0x5e0
[   19.331521]  kasan_report+0xc8/0x118
[   19.335080]  __asan_report_load1_noabort+0x20/0x30
[   19.339856]  kmalloc_oob_left+0x308/0x340
[   19.343848]  kunit_try_run_case+0x14c/0x3d0
[   19.348014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353483]  kthread+0x24c/0x2d0
[   19.356695]  ret_from_fork+0x10/0x20
[   19.360258] 
[   19.361730] Allocated by task 8:
[   19.364945]  kasan_save_stack+0x3c/0x68
[   19.368760]  kasan_save_track+0x20/0x40
[   19.372580]  kasan_save_alloc_info+0x40/0x58
[   19.376833]  __kasan_kmalloc+0xd4/0xd8
[   19.380566]  __kmalloc_node_track_caller_noprof+0x184/0x440
[   19.386121]  kstrdup+0x50/0xa8
[   19.389161]  kstrdup_const+0x48/0x60
[   19.392718]  __kernfs_new_node+0xb0/0x590
[   19.396711]  kernfs_new_node+0x100/0x1f8
[   19.400618]  kernfs_create_link+0xac/0x228
[   19.404697]  sysfs_do_create_link_sd+0x8c/0x128
[   19.409211]  sysfs_create_link+0x48/0xb8
[   19.413117]  bus_add_device+0xf4/0x3a0
[   19.416850]  device_add+0x71c/0x12b8
[   19.420410]  usb_add_gadget+0x3d4/0x5e0
[   19.424228]  dwc3_gadget_init+0xcb0/0x19b8
[   19.428308]  __dwc3_set_mode+0x714/0x11a8
[   19.432301]  process_one_work+0x530/0xfa8
[   19.436295]  worker_thread+0x614/0xf28
[   19.440027]  kthread+0x24c/0x2d0
[   19.443238]  ret_from_fork+0x10/0x20
[   19.446797] 
[   19.448275] The buggy address belongs to the object at ffff0008014068a0
[   19.448275]  which belongs to the cache kmalloc-16 of size 16
[   19.460603] The buggy address is located 22 bytes to the right of
[   19.460603]  allocated 9-byte region [ffff0008014068a0, ffff0008014068a9)
[   19.473446] 
[   19.474925] The buggy address belongs to the physical page:
[   19.480482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881406
[   19.488466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.494975] page_type: f5(slab)
[   19.498111] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   19.505831] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.513550] page dumped because: kasan: bad access detected
[   19.519107] 
[   19.520581] Memory state around the buggy address:
[   19.525362]  ffff000801406780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.532565]  ffff000801406800: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 01 fc fc
[   19.539770] >ffff000801406880: 00 01 fc fc 00 01 fc fc 00 07 fc fc fc fc fc fc
[   19.546969]                                         ^
[   19.552007]  ffff000801406900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559212]  ffff000801406980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566413] ==================================================================

test log snippet test parser 56

Home

[   19.271613] ==================================================================
[   19.280832] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340
[   19.287688] Read of size 1 at addr ffff0008014068bf by task kunit_try_catch/177
[   19.294978] 
[   19.296463] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.305576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.309735] Hardware name: WinLink E850-96 board (DT)
[   19.314773] Call trace:
[   19.317200]  dump_backtrace+0x9c/0x128
[   19.320933]  show_stack+0x20/0x38
[   19.324230]  dump_stack_lvl+0x8c/0xd0
[   19.327876]  print_report+0x118/0x5e0
[   19.331521]  kasan_report+0xc8/0x118
[   19.335080]  __asan_report_load1_noabort+0x20/0x30
[   19.339856]  kmalloc_oob_left+0x308/0x340
[   19.343848]  kunit_try_run_case+0x14c/0x3d0
[   19.348014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353483]  kthread+0x24c/0x2d0
[   19.356695]  ret_from_fork+0x10/0x20
[   19.360258] 
[   19.361730] Allocated by task 8:
[   19.364945]  kasan_save_stack+0x3c/0x68
[   19.368760]  kasan_save_track+0x20/0x40
[   19.372580]  kasan_save_alloc_info+0x40/0x58
[   19.376833]  __kasan_kmalloc+0xd4/0xd8
[   19.380566]  __kmalloc_node_track_caller_noprof+0x184/0x440
[   19.386121]  kstrdup+0x50/0xa8
[   19.389161]  kstrdup_const+0x48/0x60
[   19.392718]  __kernfs_new_node+0xb0/0x590
[   19.396711]  kernfs_new_node+0x100/0x1f8
[   19.400618]  kernfs_create_link+0xac/0x228
[   19.404697]  sysfs_do_create_link_sd+0x8c/0x128
[   19.409211]  sysfs_create_link+0x48/0xb8
[   19.413117]  bus_add_device+0xf4/0x3a0
[   19.416850]  device_add+0x71c/0x12b8
[   19.420410]  usb_add_gadget+0x3d4/0x5e0
[   19.424228]  dwc3_gadget_init+0xcb0/0x19b8
[   19.428308]  __dwc3_set_mode+0x714/0x11a8
[   19.432301]  process_one_work+0x530/0xfa8
[   19.436295]  worker_thread+0x614/0xf28
[   19.440027]  kthread+0x24c/0x2d0
[   19.443238]  ret_from_fork+0x10/0x20
[   19.446797] 
[   19.448275] The buggy address belongs to the object at ffff0008014068a0
[   19.448275]  which belongs to the cache kmalloc-16 of size 16
[   19.460603] The buggy address is located 22 bytes to the right of
[   19.460603]  allocated 9-byte region [ffff0008014068a0, ffff0008014068a9)
[   19.473446] 
[   19.474925] The buggy address belongs to the physical page:
[   19.480482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881406
[   19.488466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.494975] page_type: f5(slab)
[   19.498111] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   19.505831] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.513550] page dumped because: kasan: bad access detected
[   19.519107] 
[   19.520581] Memory state around the buggy address:
[   19.525362]  ffff000801406780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.532565]  ffff000801406800: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 01 fc fc
[   19.539770] >ffff000801406880: 00 01 fc fc 00 01 fc fc 00 07 fc fc fc fc fc fc
[   19.546969]                                         ^
[   19.552007]  ffff000801406900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559212]  ffff000801406980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566413] ==================================================================

test log snippet test parser 57

Home

[   26.985409] ==================================================================
[   26.994868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310
[   27.002067] Write of size 8 at addr ffff000801787b71 by task kunit_try_catch/213
[   27.009445] 
[   27.010930] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.020041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.024202] Hardware name: WinLink E850-96 board (DT)
[   27.029240] Call trace:
[   27.031668]  dump_backtrace+0x9c/0x128
[   27.035399]  show_stack+0x20/0x38
[   27.038698]  dump_stack_lvl+0x8c/0xd0
[   27.042343]  print_report+0x118/0x5e0
[   27.045989]  kasan_report+0xc8/0x118
[   27.049548]  kasan_check_range+0x100/0x1a8
[   27.053628]  __asan_memset+0x34/0x78
[   27.057187]  kmalloc_oob_memset_8+0x15c/0x310
[   27.061527]  kunit_try_run_case+0x14c/0x3d0
[   27.065693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.071162]  kthread+0x24c/0x2d0
[   27.074374]  ret_from_fork+0x10/0x20
[   27.077936] 
[   27.079410] Allocated by task 213:
[   27.082797]  kasan_save_stack+0x3c/0x68
[   27.086613]  kasan_save_track+0x20/0x40
[   27.090433]  kasan_save_alloc_info+0x40/0x58
[   27.094686]  __kasan_kmalloc+0xd4/0xd8
[   27.098419]  __kmalloc_cache_noprof+0x144/0x328
[   27.102932]  kmalloc_oob_memset_8+0xb0/0x310
[   27.107186]  kunit_try_run_case+0x14c/0x3d0
[   27.111353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.116821]  kthread+0x24c/0x2d0
[   27.120033]  ret_from_fork+0x10/0x20
[   27.123592] 
[   27.125069] The buggy address belongs to the object at ffff000801787b00
[   27.125069]  which belongs to the cache kmalloc-128 of size 128
[   27.137570] The buggy address is located 113 bytes inside of
[   27.137570]  allocated 120-byte region [ffff000801787b00, ffff000801787b78)
[   27.150154] 
[   27.151632] The buggy address belongs to the physical page:
[   27.157190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881786
[   27.165174] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.172811] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.179754] page_type: f5(slab)
[   27.182894] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.190611] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.198337] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.206149] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.213962] head: 0bfffe0000000001 fffffdffe005e181 ffffffffffffffff 0000000000000000
[   27.221773] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.229580] page dumped because: kasan: bad access detected
[   27.235135] 
[   27.236611] Memory state around the buggy address:
[   27.241392]  ffff000801787a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.248593]  ffff000801787a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.255800] >ffff000801787b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.263000]                                                                 ^
[   27.270120]  ffff000801787b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.277327]  ffff000801787c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.284527] ==================================================================
[   26.677030] ==================================================================
[   26.686709] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318
[   26.693914] Write of size 4 at addr ffff000801fac475 by task kunit_try_catch/211
[   26.701289] 
[   26.702774] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   26.711886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.716047] Hardware name: WinLink E850-96 board (DT)
[   26.721085] Call trace:
[   26.723513]  dump_backtrace+0x9c/0x128
[   26.727244]  show_stack+0x20/0x38
[   26.730543]  dump_stack_lvl+0x8c/0xd0
[   26.734188]  print_report+0x118/0x5e0
[   26.737834]  kasan_report+0xc8/0x118
[   26.741393]  kasan_check_range+0x100/0x1a8
[   26.745473]  __asan_memset+0x34/0x78
[   26.749032]  kmalloc_oob_memset_4+0x15c/0x318
[   26.753373]  kunit_try_run_case+0x14c/0x3d0
[   26.757538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.763008]  kthread+0x24c/0x2d0
[   26.766219]  ret_from_fork+0x10/0x20
[   26.769780] 
[   26.771255] Allocated by task 211:
[   26.774644]  kasan_save_stack+0x3c/0x68
[   26.778458]  kasan_save_track+0x20/0x40
[   26.782279]  kasan_save_alloc_info+0x40/0x58
[   26.786531]  __kasan_kmalloc+0xd4/0xd8
[   26.790264]  __kmalloc_cache_noprof+0x144/0x328
[   26.794777]  kmalloc_oob_memset_4+0xb0/0x318
[   26.799031]  kunit_try_run_case+0x14c/0x3d0
[   26.803197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.808666]  kthread+0x24c/0x2d0
[   26.811878]  ret_from_fork+0x10/0x20
[   26.815437] 
[   26.816913] The buggy address belongs to the object at ffff000801fac400
[   26.816913]  which belongs to the cache kmalloc-128 of size 128
[   26.829415] The buggy address is located 117 bytes inside of
[   26.829415]  allocated 120-byte region [ffff000801fac400, ffff000801fac478)
[   26.841999] 
[   26.843477] The buggy address belongs to the physical page:
[   26.849035] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   26.857017] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.864658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.871601] page_type: f5(slab)
[   26.874738] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.882456] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.890182] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.897993] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.905806] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   26.913618] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.921425] page dumped because: kasan: bad access detected
[   26.926980] 
[   26.928456] Memory state around the buggy address:
[   26.933237]  ffff000801fac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.940438]  ffff000801fac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.947644] >ffff000801fac400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.954844]                                                                 ^
[   26.961965]  ffff000801fac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.969170]  ffff000801fac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.976374] ==================================================================
[   27.293345] ==================================================================
[   27.303024] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310
[   27.310310] Write of size 16 at addr ffff000801fac569 by task kunit_try_catch/215
[   27.317773] 
[   27.319259] CPU: 7 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.328373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.332531] Hardware name: WinLink E850-96 board (DT)
[   27.337569] Call trace:
[   27.339995]  dump_backtrace+0x9c/0x128
[   27.343729]  show_stack+0x20/0x38
[   27.347026]  dump_stack_lvl+0x8c/0xd0
[   27.350673]  print_report+0x118/0x5e0
[   27.354318]  kasan_report+0xc8/0x118
[   27.357877]  kasan_check_range+0x100/0x1a8
[   27.361957]  __asan_memset+0x34/0x78
[   27.365516]  kmalloc_oob_memset_16+0x15c/0x310
[   27.369943]  kunit_try_run_case+0x14c/0x3d0
[   27.374109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.379577]  kthread+0x24c/0x2d0
[   27.382789]  ret_from_fork+0x10/0x20
[   27.386351] 
[   27.387825] Allocated by task 215:
[   27.391212]  kasan_save_stack+0x3c/0x68
[   27.395029]  kasan_save_track+0x20/0x40
[   27.398848]  kasan_save_alloc_info+0x40/0x58
[   27.403102]  __kasan_kmalloc+0xd4/0xd8
[   27.406834]  __kmalloc_cache_noprof+0x144/0x328
[   27.411349]  kmalloc_oob_memset_16+0xb0/0x310
[   27.415688]  kunit_try_run_case+0x14c/0x3d0
[   27.419855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.425323]  kthread+0x24c/0x2d0
[   27.428535]  ret_from_fork+0x10/0x20
[   27.432094] 
[   27.433570] The buggy address belongs to the object at ffff000801fac500
[   27.433570]  which belongs to the cache kmalloc-128 of size 128
[   27.446072] The buggy address is located 105 bytes inside of
[   27.446072]  allocated 120-byte region [ffff000801fac500, ffff000801fac578)
[   27.458657] 
[   27.460135] The buggy address belongs to the physical page:
[   27.465692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   27.473675] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.481316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.488258] page_type: f5(slab)
[   27.491397] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.499113] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.506840] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.514651] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.522464] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   27.530275] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.538082] page dumped because: kasan: bad access detected
[   27.543638] 
[   27.545113] Memory state around the buggy address:
[   27.549893]  ffff000801fac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.557097]  ffff000801fac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.564302] >ffff000801fac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.571502]                                                                 ^
[   27.578623]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.585829]  ffff000801fac600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.593031] ==================================================================
[   26.368946] ==================================================================
[   26.378555] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310
[   26.385759] Write of size 2 at addr ffff000801787a77 by task kunit_try_catch/209
[   26.393135] 
[   26.394619] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   26.403732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.407892] Hardware name: WinLink E850-96 board (DT)
[   26.412930] Call trace:
[   26.415359]  dump_backtrace+0x9c/0x128
[   26.419089]  show_stack+0x20/0x38
[   26.422387]  dump_stack_lvl+0x8c/0xd0
[   26.426033]  print_report+0x118/0x5e0
[   26.429679]  kasan_report+0xc8/0x118
[   26.433238]  kasan_check_range+0x100/0x1a8
[   26.437317]  __asan_memset+0x34/0x78
[   26.440876]  kmalloc_oob_memset_2+0x15c/0x310
[   26.445216]  kunit_try_run_case+0x14c/0x3d0
[   26.449383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.454854]  kthread+0x24c/0x2d0
[   26.458064]  ret_from_fork+0x10/0x20
[   26.461626] 
[   26.463100] Allocated by task 209:
[   26.466486]  kasan_save_stack+0x3c/0x68
[   26.470303]  kasan_save_track+0x20/0x40
[   26.474123]  kasan_save_alloc_info+0x40/0x58
[   26.478376]  __kasan_kmalloc+0xd4/0xd8
[   26.482108]  __kmalloc_cache_noprof+0x144/0x328
[   26.486622]  kmalloc_oob_memset_2+0xb0/0x310
[   26.490877]  kunit_try_run_case+0x14c/0x3d0
[   26.495042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.500511]  kthread+0x24c/0x2d0
[   26.503723]  ret_from_fork+0x10/0x20
[   26.507282] 
[   26.508760] The buggy address belongs to the object at ffff000801787a00
[   26.508760]  which belongs to the cache kmalloc-128 of size 128
[   26.521261] The buggy address is located 119 bytes inside of
[   26.521261]  allocated 120-byte region [ffff000801787a00, ffff000801787a78)
[   26.533843] 
[   26.535323] The buggy address belongs to the physical page:
[   26.540880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881786
[   26.548863] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.556500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.563445] page_type: f5(slab)
[   26.566582] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.574300] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.582027] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.589838] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.597651] head: 0bfffe0000000001 fffffdffe005e181 ffffffffffffffff 0000000000000000
[   26.605462] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.613270] page dumped because: kasan: bad access detected
[   26.618825] 
[   26.620301] Memory state around the buggy address:
[   26.625082]  ffff000801787900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.632283]  ffff000801787980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.639489] >ffff000801787a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.646689]                                                                 ^
[   26.653811]  ffff000801787a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.661015]  ffff000801787b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.668218] ==================================================================

test log snippet test parser 58

Home

[   26.368946] ==================================================================
[   26.378555] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310
[   26.385759] Write of size 2 at addr ffff000801787a77 by task kunit_try_catch/209
[   26.393135] 
[   26.394619] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   26.403732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.407892] Hardware name: WinLink E850-96 board (DT)
[   26.412930] Call trace:
[   26.415359]  dump_backtrace+0x9c/0x128
[   26.419089]  show_stack+0x20/0x38
[   26.422387]  dump_stack_lvl+0x8c/0xd0
[   26.426033]  print_report+0x118/0x5e0
[   26.429679]  kasan_report+0xc8/0x118
[   26.433238]  kasan_check_range+0x100/0x1a8
[   26.437317]  __asan_memset+0x34/0x78
[   26.440876]  kmalloc_oob_memset_2+0x15c/0x310
[   26.445216]  kunit_try_run_case+0x14c/0x3d0
[   26.449383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.454854]  kthread+0x24c/0x2d0
[   26.458064]  ret_from_fork+0x10/0x20
[   26.461626] 
[   26.463100] Allocated by task 209:
[   26.466486]  kasan_save_stack+0x3c/0x68
[   26.470303]  kasan_save_track+0x20/0x40
[   26.474123]  kasan_save_alloc_info+0x40/0x58
[   26.478376]  __kasan_kmalloc+0xd4/0xd8
[   26.482108]  __kmalloc_cache_noprof+0x144/0x328
[   26.486622]  kmalloc_oob_memset_2+0xb0/0x310
[   26.490877]  kunit_try_run_case+0x14c/0x3d0
[   26.495042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.500511]  kthread+0x24c/0x2d0
[   26.503723]  ret_from_fork+0x10/0x20
[   26.507282] 
[   26.508760] The buggy address belongs to the object at ffff000801787a00
[   26.508760]  which belongs to the cache kmalloc-128 of size 128
[   26.521261] The buggy address is located 119 bytes inside of
[   26.521261]  allocated 120-byte region [ffff000801787a00, ffff000801787a78)
[   26.533843] 
[   26.535323] The buggy address belongs to the physical page:
[   26.540880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881786
[   26.548863] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.556500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.563445] page_type: f5(slab)
[   26.566582] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.574300] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.582027] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.589838] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.597651] head: 0bfffe0000000001 fffffdffe005e181 ffffffffffffffff 0000000000000000
[   26.605462] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.613270] page dumped because: kasan: bad access detected
[   26.618825] 
[   26.620301] Memory state around the buggy address:
[   26.625082]  ffff000801787900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.632283]  ffff000801787980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.639489] >ffff000801787a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.646689]                                                                 ^
[   26.653811]  ffff000801787a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.661015]  ffff000801787b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.668218] ==================================================================

test log snippet test parser 59

Home

[   26.677030] ==================================================================
[   26.686709] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318
[   26.693914] Write of size 4 at addr ffff000801fac475 by task kunit_try_catch/211
[   26.701289] 
[   26.702774] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   26.711886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.716047] Hardware name: WinLink E850-96 board (DT)
[   26.721085] Call trace:
[   26.723513]  dump_backtrace+0x9c/0x128
[   26.727244]  show_stack+0x20/0x38
[   26.730543]  dump_stack_lvl+0x8c/0xd0
[   26.734188]  print_report+0x118/0x5e0
[   26.737834]  kasan_report+0xc8/0x118
[   26.741393]  kasan_check_range+0x100/0x1a8
[   26.745473]  __asan_memset+0x34/0x78
[   26.749032]  kmalloc_oob_memset_4+0x15c/0x318
[   26.753373]  kunit_try_run_case+0x14c/0x3d0
[   26.757538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.763008]  kthread+0x24c/0x2d0
[   26.766219]  ret_from_fork+0x10/0x20
[   26.769780] 
[   26.771255] Allocated by task 211:
[   26.774644]  kasan_save_stack+0x3c/0x68
[   26.778458]  kasan_save_track+0x20/0x40
[   26.782279]  kasan_save_alloc_info+0x40/0x58
[   26.786531]  __kasan_kmalloc+0xd4/0xd8
[   26.790264]  __kmalloc_cache_noprof+0x144/0x328
[   26.794777]  kmalloc_oob_memset_4+0xb0/0x318
[   26.799031]  kunit_try_run_case+0x14c/0x3d0
[   26.803197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.808666]  kthread+0x24c/0x2d0
[   26.811878]  ret_from_fork+0x10/0x20
[   26.815437] 
[   26.816913] The buggy address belongs to the object at ffff000801fac400
[   26.816913]  which belongs to the cache kmalloc-128 of size 128
[   26.829415] The buggy address is located 117 bytes inside of
[   26.829415]  allocated 120-byte region [ffff000801fac400, ffff000801fac478)
[   26.841999] 
[   26.843477] The buggy address belongs to the physical page:
[   26.849035] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   26.857017] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.864658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.871601] page_type: f5(slab)
[   26.874738] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.882456] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.890182] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.897993] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.905806] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   26.913618] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.921425] page dumped because: kasan: bad access detected
[   26.926980] 
[   26.928456] Memory state around the buggy address:
[   26.933237]  ffff000801fac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.940438]  ffff000801fac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.947644] >ffff000801fac400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.954844]                                                                 ^
[   26.961965]  ffff000801fac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.969170]  ffff000801fac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.976374] ==================================================================
---
[   27.293345] ==================================================================
[   27.303024] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310
[   27.310310] Write of size 16 at addr ffff000801fac569 by task kunit_try_catch/215
[   27.317773] 
[   27.319259] CPU: 7 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.328373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.332531] Hardware name: WinLink E850-96 board (DT)
[   27.337569] Call trace:
[   27.339995]  dump_backtrace+0x9c/0x128
[   27.343729]  show_stack+0x20/0x38
[   27.347026]  dump_stack_lvl+0x8c/0xd0
[   27.350673]  print_report+0x118/0x5e0
[   27.354318]  kasan_report+0xc8/0x118
[   27.357877]  kasan_check_range+0x100/0x1a8
[   27.361957]  __asan_memset+0x34/0x78
[   27.365516]  kmalloc_oob_memset_16+0x15c/0x310
[   27.369943]  kunit_try_run_case+0x14c/0x3d0
[   27.374109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.379577]  kthread+0x24c/0x2d0
[   27.382789]  ret_from_fork+0x10/0x20
[   27.386351] 
[   27.387825] Allocated by task 215:
[   27.391212]  kasan_save_stack+0x3c/0x68
[   27.395029]  kasan_save_track+0x20/0x40
[   27.398848]  kasan_save_alloc_info+0x40/0x58
[   27.403102]  __kasan_kmalloc+0xd4/0xd8
[   27.406834]  __kmalloc_cache_noprof+0x144/0x328
[   27.411349]  kmalloc_oob_memset_16+0xb0/0x310
[   27.415688]  kunit_try_run_case+0x14c/0x3d0
[   27.419855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.425323]  kthread+0x24c/0x2d0
[   27.428535]  ret_from_fork+0x10/0x20
[   27.432094] 
[   27.433570] The buggy address belongs to the object at ffff000801fac500
[   27.433570]  which belongs to the cache kmalloc-128 of size 128
[   27.446072] The buggy address is located 105 bytes inside of
[   27.446072]  allocated 120-byte region [ffff000801fac500, ffff000801fac578)
[   27.458657] 
[   27.460135] The buggy address belongs to the physical page:
[   27.465692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   27.473675] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.481316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.488258] page_type: f5(slab)
[   27.491397] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.499113] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.506840] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.514651] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.522464] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   27.530275] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.538082] page dumped because: kasan: bad access detected
[   27.543638] 
[   27.545113] Memory state around the buggy address:
[   27.549893]  ffff000801fac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.557097]  ffff000801fac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.564302] >ffff000801fac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.571502]                                                                 ^
[   27.578623]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.585829]  ffff000801fac600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.593031] ==================================================================

test log snippet test parser 60

Home

[   26.985409] ==================================================================
[   26.994868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310
[   27.002067] Write of size 8 at addr ffff000801787b71 by task kunit_try_catch/213
[   27.009445] 
[   27.010930] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   27.020041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.024202] Hardware name: WinLink E850-96 board (DT)
[   27.029240] Call trace:
[   27.031668]  dump_backtrace+0x9c/0x128
[   27.035399]  show_stack+0x20/0x38
[   27.038698]  dump_stack_lvl+0x8c/0xd0
[   27.042343]  print_report+0x118/0x5e0
[   27.045989]  kasan_report+0xc8/0x118
[   27.049548]  kasan_check_range+0x100/0x1a8
[   27.053628]  __asan_memset+0x34/0x78
[   27.057187]  kmalloc_oob_memset_8+0x15c/0x310
[   27.061527]  kunit_try_run_case+0x14c/0x3d0
[   27.065693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.071162]  kthread+0x24c/0x2d0
[   27.074374]  ret_from_fork+0x10/0x20
[   27.077936] 
[   27.079410] Allocated by task 213:
[   27.082797]  kasan_save_stack+0x3c/0x68
[   27.086613]  kasan_save_track+0x20/0x40
[   27.090433]  kasan_save_alloc_info+0x40/0x58
[   27.094686]  __kasan_kmalloc+0xd4/0xd8
[   27.098419]  __kmalloc_cache_noprof+0x144/0x328
[   27.102932]  kmalloc_oob_memset_8+0xb0/0x310
[   27.107186]  kunit_try_run_case+0x14c/0x3d0
[   27.111353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.116821]  kthread+0x24c/0x2d0
[   27.120033]  ret_from_fork+0x10/0x20
[   27.123592] 
[   27.125069] The buggy address belongs to the object at ffff000801787b00
[   27.125069]  which belongs to the cache kmalloc-128 of size 128
[   27.137570] The buggy address is located 113 bytes inside of
[   27.137570]  allocated 120-byte region [ffff000801787b00, ffff000801787b78)
[   27.150154] 
[   27.151632] The buggy address belongs to the physical page:
[   27.157190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881786
[   27.165174] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.172811] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.179754] page_type: f5(slab)
[   27.182894] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.190611] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.198337] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.206149] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.213962] head: 0bfffe0000000001 fffffdffe005e181 ffffffffffffffff 0000000000000000
[   27.221773] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.229580] page dumped because: kasan: bad access detected
[   27.235135] 
[   27.236611] Memory state around the buggy address:
[   27.241392]  ffff000801787a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.248593]  ffff000801787a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.255800] >ffff000801787b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.263000]                                                                 ^
[   27.270120]  ffff000801787b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.277327]  ffff000801787c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.284527] ==================================================================

test log snippet test parser 61

Home

[   18.973334] ==================================================================
[   18.980228] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   18.987169] Read of size 1 at addr ffff000801f6e180 by task kunit_try_catch/175
[   18.994461] 
[   18.995943] CPU: 6 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.005058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.009218] Hardware name: WinLink E850-96 board (DT)
[   19.014254] Call trace:
[   19.016684]  dump_backtrace+0x9c/0x128
[   19.020415]  show_stack+0x20/0x38
[   19.023714]  dump_stack_lvl+0x8c/0xd0
[   19.027359]  print_report+0x118/0x5e0
[   19.031005]  kasan_report+0xc8/0x118
[   19.034564]  __asan_report_load1_noabort+0x20/0x30
[   19.039338]  kmalloc_oob_right+0x588/0x5f0
[   19.043418]  kunit_try_run_case+0x14c/0x3d0
[   19.047585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.053053]  kthread+0x24c/0x2d0
[   19.056265]  ret_from_fork+0x10/0x20
[   19.059827] 
[   19.061300] Allocated by task 175:
[   19.064685]  kasan_save_stack+0x3c/0x68
[   19.068504]  kasan_save_track+0x20/0x40
[   19.072324]  kasan_save_alloc_info+0x40/0x58
[   19.076577]  __kasan_kmalloc+0xd4/0xd8
[   19.080310]  __kmalloc_cache_noprof+0x144/0x328
[   19.084824]  kmalloc_oob_right+0xb8/0x5f0
[   19.088817]  kunit_try_run_case+0x14c/0x3d0
[   19.092983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.098452]  kthread+0x24c/0x2d0
[   19.101663]  ret_from_fork+0x10/0x20
[   19.105223] 
[   19.106698] The buggy address belongs to the object at ffff000801f6e100
[   19.106698]  which belongs to the cache kmalloc-128 of size 128
[   19.119199] The buggy address is located 13 bytes to the right of
[   19.119199]  allocated 115-byte region [ffff000801f6e100, ffff000801f6e173)
[   19.132219] 
[   19.133696] The buggy address belongs to the physical page:
[   19.139252] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   19.147236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.154878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.161819] page_type: f5(slab)
[   19.164953] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.172675] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   19.180402] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.188213] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   19.196026] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   19.203838] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.211645] page dumped because: kasan: bad access detected
[   19.217200] 
[   19.218676] Memory state around the buggy address:
[   19.223453]  ffff000801f6e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.230658]  ffff000801f6e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.237863] >ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.245064]                    ^
[   19.248281]  ffff000801f6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255484]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.262686] ==================================================================
[   18.672215] ==================================================================
[   18.679366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   18.686307] Write of size 1 at addr ffff000801f6e178 by task kunit_try_catch/175
[   18.693685] 
[   18.695167] CPU: 6 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.704281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.708442] Hardware name: WinLink E850-96 board (DT)
[   18.713477] Call trace:
[   18.715906]  dump_backtrace+0x9c/0x128
[   18.719638]  show_stack+0x20/0x38
[   18.722937]  dump_stack_lvl+0x8c/0xd0
[   18.726583]  print_report+0x118/0x5e0
[   18.730229]  kasan_report+0xc8/0x118
[   18.733787]  __asan_report_store1_noabort+0x20/0x30
[   18.738649]  kmalloc_oob_right+0x528/0x5f0
[   18.742728]  kunit_try_run_case+0x14c/0x3d0
[   18.746895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.752363]  kthread+0x24c/0x2d0
[   18.755575]  ret_from_fork+0x10/0x20
[   18.759136] 
[   18.760610] Allocated by task 175:
[   18.763997]  kasan_save_stack+0x3c/0x68
[   18.767815]  kasan_save_track+0x20/0x40
[   18.771634]  kasan_save_alloc_info+0x40/0x58
[   18.775887]  __kasan_kmalloc+0xd4/0xd8
[   18.779620]  __kmalloc_cache_noprof+0x144/0x328
[   18.784134]  kmalloc_oob_right+0xb8/0x5f0
[   18.788127]  kunit_try_run_case+0x14c/0x3d0
[   18.792294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.797762]  kthread+0x24c/0x2d0
[   18.800974]  ret_from_fork+0x10/0x20
[   18.804533] 
[   18.806010] The buggy address belongs to the object at ffff000801f6e100
[   18.806010]  which belongs to the cache kmalloc-128 of size 128
[   18.818510] The buggy address is located 5 bytes to the right of
[   18.818510]  allocated 115-byte region [ffff000801f6e100, ffff000801f6e173)
[   18.831442] 
[   18.832919] The buggy address belongs to the physical page:
[   18.838476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   18.846459] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.854100] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.861042] page_type: f5(slab)
[   18.864176] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.871898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.879625] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.887437] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.895250] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   18.903061] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.910868] page dumped because: kasan: bad access detected
[   18.916424] 
[   18.917899] Memory state around the buggy address:
[   18.922677]  ffff000801f6e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.929882]  ffff000801f6e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.937086] >ffff000801f6e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.944287]                                                                 ^
[   18.951409]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.958615]  ffff000801f6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.965815] ==================================================================
[   18.368140] ==================================================================
[   18.374685] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   18.381624] Write of size 1 at addr ffff000801f6e173 by task kunit_try_catch/175
[   18.389002] 
[   18.390486] CPU: 6 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   18.399598] Tainted: [N]=TEST
[   18.402544] Hardware name: WinLink E850-96 board (DT)
[   18.407582] Call trace:
[   18.410009]  dump_backtrace+0x9c/0x128
[   18.413740]  show_stack+0x20/0x38
[   18.417039]  dump_stack_lvl+0x8c/0xd0
[   18.420684]  print_report+0x118/0x5e0
[   18.424330]  kasan_report+0xc8/0x118
[   18.427889]  __asan_report_store1_noabort+0x20/0x30
[   18.432752]  kmalloc_oob_right+0x56c/0x5f0
[   18.436830]  kunit_try_run_case+0x14c/0x3d0
[   18.440996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.446465]  kthread+0x24c/0x2d0
[   18.449677]  ret_from_fork+0x10/0x20
[   18.453240] 
[   18.454713] Allocated by task 175:
[   18.458100]  kasan_save_stack+0x3c/0x68
[   18.461916]  kasan_save_track+0x20/0x40
[   18.465736]  kasan_save_alloc_info+0x40/0x58
[   18.469988]  __kasan_kmalloc+0xd4/0xd8
[   18.473722]  __kmalloc_cache_noprof+0x144/0x328
[   18.478236]  kmalloc_oob_right+0xb8/0x5f0
[   18.482229]  kunit_try_run_case+0x14c/0x3d0
[   18.486395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.491864]  kthread+0x24c/0x2d0
[   18.495075]  ret_from_fork+0x10/0x20
[   18.498635] 
[   18.500111] The buggy address belongs to the object at ffff000801f6e100
[   18.500111]  which belongs to the cache kmalloc-128 of size 128
[   18.512612] The buggy address is located 0 bytes to the right of
[   18.512612]  allocated 115-byte region [ffff000801f6e100, ffff000801f6e173)
[   18.525544] 
[   18.527022] The buggy address belongs to the physical page:
[   18.532580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   18.540563] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.548203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.555146] page_type: f5(slab)
[   18.558284] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.566003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.573727] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.581538] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.589351] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   18.597163] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.604970] page dumped because: kasan: bad access detected
[   18.610525] 
[   18.612001] Memory state around the buggy address:
[   18.616783]  ffff000801f6e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.623983]  ffff000801f6e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.631189] >ffff000801f6e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.638389]                                                              ^
[   18.645250]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.652457]  ffff000801f6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659658] ==================================================================

test log snippet test parser 62

Home

[   18.973334] ==================================================================
[   18.980228] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   18.987169] Read of size 1 at addr ffff000801f6e180 by task kunit_try_catch/175
[   18.994461] 
[   18.995943] CPU: 6 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   19.005058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.009218] Hardware name: WinLink E850-96 board (DT)
[   19.014254] Call trace:
[   19.016684]  dump_backtrace+0x9c/0x128
[   19.020415]  show_stack+0x20/0x38
[   19.023714]  dump_stack_lvl+0x8c/0xd0
[   19.027359]  print_report+0x118/0x5e0
[   19.031005]  kasan_report+0xc8/0x118
[   19.034564]  __asan_report_load1_noabort+0x20/0x30
[   19.039338]  kmalloc_oob_right+0x588/0x5f0
[   19.043418]  kunit_try_run_case+0x14c/0x3d0
[   19.047585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.053053]  kthread+0x24c/0x2d0
[   19.056265]  ret_from_fork+0x10/0x20
[   19.059827] 
[   19.061300] Allocated by task 175:
[   19.064685]  kasan_save_stack+0x3c/0x68
[   19.068504]  kasan_save_track+0x20/0x40
[   19.072324]  kasan_save_alloc_info+0x40/0x58
[   19.076577]  __kasan_kmalloc+0xd4/0xd8
[   19.080310]  __kmalloc_cache_noprof+0x144/0x328
[   19.084824]  kmalloc_oob_right+0xb8/0x5f0
[   19.088817]  kunit_try_run_case+0x14c/0x3d0
[   19.092983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.098452]  kthread+0x24c/0x2d0
[   19.101663]  ret_from_fork+0x10/0x20
[   19.105223] 
[   19.106698] The buggy address belongs to the object at ffff000801f6e100
[   19.106698]  which belongs to the cache kmalloc-128 of size 128
[   19.119199] The buggy address is located 13 bytes to the right of
[   19.119199]  allocated 115-byte region [ffff000801f6e100, ffff000801f6e173)
[   19.132219] 
[   19.133696] The buggy address belongs to the physical page:
[   19.139252] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   19.147236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.154878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.161819] page_type: f5(slab)
[   19.164953] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.172675] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   19.180402] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.188213] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   19.196026] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   19.203838] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.211645] page dumped because: kasan: bad access detected
[   19.217200] 
[   19.218676] Memory state around the buggy address:
[   19.223453]  ffff000801f6e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.230658]  ffff000801f6e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.237863] >ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.245064]                    ^
[   19.248281]  ffff000801f6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255484]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.262686] ==================================================================

test log snippet test parser 63

Home

[   18.368140] ==================================================================
[   18.374685] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   18.381624] Write of size 1 at addr ffff000801f6e173 by task kunit_try_catch/175
[   18.389002] 
[   18.390486] CPU: 6 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G                 N 6.12.10-rc1 #1
[   18.399598] Tainted: [N]=TEST
[   18.402544] Hardware name: WinLink E850-96 board (DT)
[   18.407582] Call trace:
[   18.410009]  dump_backtrace+0x9c/0x128
[   18.413740]  show_stack+0x20/0x38
[   18.417039]  dump_stack_lvl+0x8c/0xd0
[   18.420684]  print_report+0x118/0x5e0
[   18.424330]  kasan_report+0xc8/0x118
[   18.427889]  __asan_report_store1_noabort+0x20/0x30
[   18.432752]  kmalloc_oob_right+0x56c/0x5f0
[   18.436830]  kunit_try_run_case+0x14c/0x3d0
[   18.440996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.446465]  kthread+0x24c/0x2d0
[   18.449677]  ret_from_fork+0x10/0x20
[   18.453240] 
[   18.454713] Allocated by task 175:
[   18.458100]  kasan_save_stack+0x3c/0x68
[   18.461916]  kasan_save_track+0x20/0x40
[   18.465736]  kasan_save_alloc_info+0x40/0x58
[   18.469988]  __kasan_kmalloc+0xd4/0xd8
[   18.473722]  __kmalloc_cache_noprof+0x144/0x328
[   18.478236]  kmalloc_oob_right+0xb8/0x5f0
[   18.482229]  kunit_try_run_case+0x14c/0x3d0
[   18.486395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.491864]  kthread+0x24c/0x2d0
[   18.495075]  ret_from_fork+0x10/0x20
[   18.498635] 
[   18.500111] The buggy address belongs to the object at ffff000801f6e100
[   18.500111]  which belongs to the cache kmalloc-128 of size 128
[   18.512612] The buggy address is located 0 bytes to the right of
[   18.512612]  allocated 115-byte region [ffff000801f6e100, ffff000801f6e173)
[   18.525544] 
[   18.527022] The buggy address belongs to the physical page:
[   18.532580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   18.540563] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.548203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.555146] page_type: f5(slab)
[   18.558284] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.566003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.573727] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.581538] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.589351] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   18.597163] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.604970] page dumped because: kasan: bad access detected
[   18.610525] 
[   18.612001] Memory state around the buggy address:
[   18.616783]  ffff000801f6e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.623983]  ffff000801f6e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.631189] >ffff000801f6e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.638389]                                                              ^
[   18.645250]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.652457]  ffff000801f6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659658] ==================================================================

test log snippet test parser 64

Home

[   18.672215] ==================================================================
[   18.679366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   18.686307] Write of size 1 at addr ffff000801f6e178 by task kunit_try_catch/175
[   18.693685] 
[   18.695167] CPU: 6 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   18.704281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.708442] Hardware name: WinLink E850-96 board (DT)
[   18.713477] Call trace:
[   18.715906]  dump_backtrace+0x9c/0x128
[   18.719638]  show_stack+0x20/0x38
[   18.722937]  dump_stack_lvl+0x8c/0xd0
[   18.726583]  print_report+0x118/0x5e0
[   18.730229]  kasan_report+0xc8/0x118
[   18.733787]  __asan_report_store1_noabort+0x20/0x30
[   18.738649]  kmalloc_oob_right+0x528/0x5f0
[   18.742728]  kunit_try_run_case+0x14c/0x3d0
[   18.746895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.752363]  kthread+0x24c/0x2d0
[   18.755575]  ret_from_fork+0x10/0x20
[   18.759136] 
[   18.760610] Allocated by task 175:
[   18.763997]  kasan_save_stack+0x3c/0x68
[   18.767815]  kasan_save_track+0x20/0x40
[   18.771634]  kasan_save_alloc_info+0x40/0x58
[   18.775887]  __kasan_kmalloc+0xd4/0xd8
[   18.779620]  __kmalloc_cache_noprof+0x144/0x328
[   18.784134]  kmalloc_oob_right+0xb8/0x5f0
[   18.788127]  kunit_try_run_case+0x14c/0x3d0
[   18.792294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.797762]  kthread+0x24c/0x2d0
[   18.800974]  ret_from_fork+0x10/0x20
[   18.804533] 
[   18.806010] The buggy address belongs to the object at ffff000801f6e100
[   18.806010]  which belongs to the cache kmalloc-128 of size 128
[   18.818510] The buggy address is located 5 bytes to the right of
[   18.818510]  allocated 115-byte region [ffff000801f6e100, ffff000801f6e173)
[   18.831442] 
[   18.832919] The buggy address belongs to the physical page:
[   18.838476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   18.846459] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.854100] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.861042] page_type: f5(slab)
[   18.864176] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.871898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.879625] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.887437] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   18.895250] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   18.903061] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.910868] page dumped because: kasan: bad access detected
[   18.916424] 
[   18.917899] Memory state around the buggy address:
[   18.922677]  ffff000801f6e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.929882]  ffff000801f6e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.937086] >ffff000801f6e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.944287]                                                                 ^
[   18.951409]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.958615]  ffff000801f6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.965815] ==================================================================

test log snippet test parser 65

Home

[   32.392556] ==================================================================
[   32.402177] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440
[   32.408856] Read of size 1 at addr ffff000801cac0c8 by task kunit_try_catch/244
[   32.416145] 
[   32.417629] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.426743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.430902] Hardware name: WinLink E850-96 board (DT)
[   32.435941] Call trace:
[   32.438369]  dump_backtrace+0x9c/0x128
[   32.442099]  show_stack+0x20/0x38
[   32.445397]  dump_stack_lvl+0x8c/0xd0
[   32.449044]  print_report+0x118/0x5e0
[   32.452691]  kasan_report+0xc8/0x118
[   32.456248]  __asan_report_load1_noabort+0x20/0x30
[   32.461023]  kmem_cache_oob+0x350/0x440
[   32.464841]  kunit_try_run_case+0x14c/0x3d0
[   32.469008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.474477]  kthread+0x24c/0x2d0
[   32.477689]  ret_from_fork+0x10/0x20
[   32.481252] 
[   32.482724] Allocated by task 244:
[   32.486112]  kasan_save_stack+0x3c/0x68
[   32.489928]  kasan_save_track+0x20/0x40
[   32.493747]  kasan_save_alloc_info+0x40/0x58
[   32.498001]  __kasan_slab_alloc+0xa8/0xb0
[   32.501993]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.506507]  kmem_cache_oob+0x130/0x440
[   32.510326]  kunit_try_run_case+0x14c/0x3d0
[   32.514493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.519962]  kthread+0x24c/0x2d0
[   32.523174]  ret_from_fork+0x10/0x20
[   32.526733] 
[   32.528210] The buggy address belongs to the object at ffff000801cac000
[   32.528210]  which belongs to the cache test_cache of size 200
[   32.540624] The buggy address is located 0 bytes to the right of
[   32.540624]  allocated 200-byte region [ffff000801cac000, ffff000801cac0c8)
[   32.553555] 
[   32.555035] The buggy address belongs to the physical page:
[   32.560591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881cac
[   32.568574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.576213] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.583156] page_type: f5(slab)
[   32.586294] raw: 0bfffe0000000040 ffff000801caa000 dead000000000122 0000000000000000
[   32.594012] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.601738] head: 0bfffe0000000040 ffff000801caa000 dead000000000122 0000000000000000
[   32.609550] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.617363] head: 0bfffe0000000001 fffffdffe0072b01 ffffffffffffffff 0000000000000000
[   32.625174] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   32.632981] page dumped because: kasan: bad access detected
[   32.638537] 
[   32.640012] Memory state around the buggy address:
[   32.644795]  ffff000801cabf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.651995]  ffff000801cac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.659199] >ffff000801cac080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.666401]                                               ^
[   32.671960]  ffff000801cac100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.679165]  ffff000801cac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.686367] ==================================================================

test log snippet test parser 66

Home

[   32.392556] ==================================================================
[   32.402177] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440
[   32.408856] Read of size 1 at addr ffff000801cac0c8 by task kunit_try_catch/244
[   32.416145] 
[   32.417629] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.426743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.430902] Hardware name: WinLink E850-96 board (DT)
[   32.435941] Call trace:
[   32.438369]  dump_backtrace+0x9c/0x128
[   32.442099]  show_stack+0x20/0x38
[   32.445397]  dump_stack_lvl+0x8c/0xd0
[   32.449044]  print_report+0x118/0x5e0
[   32.452691]  kasan_report+0xc8/0x118
[   32.456248]  __asan_report_load1_noabort+0x20/0x30
[   32.461023]  kmem_cache_oob+0x350/0x440
[   32.464841]  kunit_try_run_case+0x14c/0x3d0
[   32.469008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.474477]  kthread+0x24c/0x2d0
[   32.477689]  ret_from_fork+0x10/0x20
[   32.481252] 
[   32.482724] Allocated by task 244:
[   32.486112]  kasan_save_stack+0x3c/0x68
[   32.489928]  kasan_save_track+0x20/0x40
[   32.493747]  kasan_save_alloc_info+0x40/0x58
[   32.498001]  __kasan_slab_alloc+0xa8/0xb0
[   32.501993]  kmem_cache_alloc_noprof+0xf4/0x308
[   32.506507]  kmem_cache_oob+0x130/0x440
[   32.510326]  kunit_try_run_case+0x14c/0x3d0
[   32.514493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.519962]  kthread+0x24c/0x2d0
[   32.523174]  ret_from_fork+0x10/0x20
[   32.526733] 
[   32.528210] The buggy address belongs to the object at ffff000801cac000
[   32.528210]  which belongs to the cache test_cache of size 200
[   32.540624] The buggy address is located 0 bytes to the right of
[   32.540624]  allocated 200-byte region [ffff000801cac000, ffff000801cac0c8)
[   32.553555] 
[   32.555035] The buggy address belongs to the physical page:
[   32.560591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881cac
[   32.568574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.576213] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.583156] page_type: f5(slab)
[   32.586294] raw: 0bfffe0000000040 ffff000801caa000 dead000000000122 0000000000000000
[   32.594012] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.601738] head: 0bfffe0000000040 ffff000801caa000 dead000000000122 0000000000000000
[   32.609550] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   32.617363] head: 0bfffe0000000001 fffffdffe0072b01 ffffffffffffffff 0000000000000000
[   32.625174] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   32.632981] page dumped because: kasan: bad access detected
[   32.638537] 
[   32.640012] Memory state around the buggy address:
[   32.644795]  ffff000801cabf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.651995]  ffff000801cac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.659199] >ffff000801cac080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.666401]                                               ^
[   32.671960]  ffff000801cac100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.679165]  ffff000801cac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.686367] ==================================================================

test log snippet test parser 67

Home

[   21.954409] ==================================================================
[   21.961433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   21.968982] Write of size 1 at addr ffff00080341cad0 by task kunit_try_catch/195
[   21.976360] 
[   21.977843] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.986958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.991118] Hardware name: WinLink E850-96 board (DT)
[   21.996155] Call trace:
[   21.998582]  dump_backtrace+0x9c/0x128
[   22.002315]  show_stack+0x20/0x38
[   22.005614]  dump_stack_lvl+0x8c/0xd0
[   22.009260]  print_report+0x118/0x5e0
[   22.012905]  kasan_report+0xc8/0x118
[   22.016464]  __asan_report_store1_noabort+0x20/0x30
[   22.021325]  krealloc_less_oob_helper+0xb20/0xbc8
[   22.026012]  krealloc_less_oob+0x20/0x38
[   22.029918]  kunit_try_run_case+0x14c/0x3d0
[   22.034085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.039554]  kthread+0x24c/0x2d0
[   22.042765]  ret_from_fork+0x10/0x20
[   22.046328] 
[   22.047801] Allocated by task 195:
[   22.051187]  kasan_save_stack+0x3c/0x68
[   22.055005]  kasan_save_track+0x20/0x40
[   22.058824]  kasan_save_alloc_info+0x40/0x58
[   22.063078]  __kasan_krealloc+0x118/0x178
[   22.067071]  krealloc_noprof+0x10c/0x1a0
[   22.070976]  krealloc_less_oob_helper+0x170/0xbc8
[   22.075664]  krealloc_less_oob+0x20/0x38
[   22.079570]  kunit_try_run_case+0x14c/0x3d0
[   22.083737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.089206]  kthread+0x24c/0x2d0
[   22.092419]  ret_from_fork+0x10/0x20
[   22.095976] 
[   22.097453] The buggy address belongs to the object at ffff00080341ca00
[   22.097453]  which belongs to the cache kmalloc-256 of size 256
[   22.109955] The buggy address is located 7 bytes to the right of
[   22.109955]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   22.122886] 
[   22.124364] The buggy address belongs to the physical page:
[   22.129920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   22.137905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.145543] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.152486] page_type: f5(slab)
[   22.155622] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.163343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.171068] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.178880] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.186693] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   22.194504] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.202312] page dumped because: kasan: bad access detected
[   22.207867] 
[   22.209343] Memory state around the buggy address:
[   22.214122]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.221325]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.228530] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.235731]                                                  ^
[   22.241551]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.248755]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.255957] ==================================================================
[   22.572544] ==================================================================
[   22.579652] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   22.587202] Write of size 1 at addr ffff00080341caea by task kunit_try_catch/195
[   22.594580] 
[   22.596065] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.605176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.609337] Hardware name: WinLink E850-96 board (DT)
[   22.614373] Call trace:
[   22.616802]  dump_backtrace+0x9c/0x128
[   22.620535]  show_stack+0x20/0x38
[   22.623833]  dump_stack_lvl+0x8c/0xd0
[   22.627479]  print_report+0x118/0x5e0
[   22.631125]  kasan_report+0xc8/0x118
[   22.634683]  __asan_report_store1_noabort+0x20/0x30
[   22.639545]  krealloc_less_oob_helper+0xa98/0xbc8
[   22.644232]  krealloc_less_oob+0x20/0x38
[   22.648138]  kunit_try_run_case+0x14c/0x3d0
[   22.652305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.657774]  kthread+0x24c/0x2d0
[   22.660986]  ret_from_fork+0x10/0x20
[   22.664548] 
[   22.666020] Allocated by task 195:
[   22.669407]  kasan_save_stack+0x3c/0x68
[   22.673225]  kasan_save_track+0x20/0x40
[   22.677046]  kasan_save_alloc_info+0x40/0x58
[   22.681297]  __kasan_krealloc+0x118/0x178
[   22.685290]  krealloc_noprof+0x10c/0x1a0
[   22.689197]  krealloc_less_oob_helper+0x170/0xbc8
[   22.693884]  krealloc_less_oob+0x20/0x38
[   22.697790]  kunit_try_run_case+0x14c/0x3d0
[   22.701957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707426]  kthread+0x24c/0x2d0
[   22.710639]  ret_from_fork+0x10/0x20
[   22.714196] 
[   22.715673] The buggy address belongs to the object at ffff00080341ca00
[   22.715673]  which belongs to the cache kmalloc-256 of size 256
[   22.728174] The buggy address is located 33 bytes to the right of
[   22.728174]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   22.741192] 
[   22.742672] The buggy address belongs to the physical page:
[   22.748227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   22.756210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.763850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.770794] page_type: f5(slab)
[   22.773927] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.781650] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.789376] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.797188] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.805001] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   22.812811] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.820618] page dumped because: kasan: bad access detected
[   22.826174] 
[   22.827649] Memory state around the buggy address:
[   22.832430]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839633]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.846838] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.854038]                                                           ^
[   22.860638]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.867843]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.875045] ==================================================================
[   24.581539] ==================================================================
[   24.588650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   24.596199] Write of size 1 at addr ffff0008034260eb by task kunit_try_catch/199
[   24.603577] 
[   24.605063] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.614173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.618336] Hardware name: WinLink E850-96 board (DT)
[   24.623370] Call trace:
[   24.625801]  dump_backtrace+0x9c/0x128
[   24.629533]  show_stack+0x20/0x38
[   24.632831]  dump_stack_lvl+0x8c/0xd0
[   24.636476]  print_report+0x118/0x5e0
[   24.640122]  kasan_report+0xc8/0x118
[   24.643681]  __asan_report_store1_noabort+0x20/0x30
[   24.648542]  krealloc_less_oob_helper+0xa3c/0xbc8
[   24.653230]  krealloc_large_less_oob+0x20/0x38
[   24.657657]  kunit_try_run_case+0x14c/0x3d0
[   24.661823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.667292]  kthread+0x24c/0x2d0
[   24.670504]  ret_from_fork+0x10/0x20
[   24.674065] 
[   24.675540] The buggy address belongs to the physical page:
[   24.681096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   24.689080] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.696719] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.703673] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.711394] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.719120] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.726932] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.734745] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.742557] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.750364] page dumped because: kasan: bad access detected
[   24.755919] 
[   24.757395] Memory state around the buggy address:
[   24.762174]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.769377]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.776582] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.783783]                                                           ^
[   24.790384]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.797588]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.804791] ==================================================================
[   24.120962] ==================================================================
[   24.128067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   24.135616] Write of size 1 at addr ffff0008034260da by task kunit_try_catch/199
[   24.142994] 
[   24.144477] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.153589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.157752] Hardware name: WinLink E850-96 board (DT)
[   24.162788] Call trace:
[   24.165218]  dump_backtrace+0x9c/0x128
[   24.168949]  show_stack+0x20/0x38
[   24.172247]  dump_stack_lvl+0x8c/0xd0
[   24.175893]  print_report+0x118/0x5e0
[   24.179539]  kasan_report+0xc8/0x118
[   24.183098]  __asan_report_store1_noabort+0x20/0x30
[   24.187959]  krealloc_less_oob_helper+0xa54/0xbc8
[   24.192646]  krealloc_large_less_oob+0x20/0x38
[   24.197073]  kunit_try_run_case+0x14c/0x3d0
[   24.201240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.206709]  kthread+0x24c/0x2d0
[   24.209921]  ret_from_fork+0x10/0x20
[   24.213483] 
[   24.214957] The buggy address belongs to the physical page:
[   24.220513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   24.228497] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.236139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.243089] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.250812] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.258537] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.266348] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.274162] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.281973] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.289780] page dumped because: kasan: bad access detected
[   24.295336] 
[   24.296811] Memory state around the buggy address:
[   24.301591]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.308794]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.315998] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.323200]                                                     ^
[   24.329280]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.336484]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.343686] ==================================================================
[   22.263256] ==================================================================
[   22.270371] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   22.277918] Write of size 1 at addr ffff00080341cada by task kunit_try_catch/195
[   22.285296] 
[   22.286780] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.295893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.300055] Hardware name: WinLink E850-96 board (DT)
[   22.305090] Call trace:
[   22.307519]  dump_backtrace+0x9c/0x128
[   22.311251]  show_stack+0x20/0x38
[   22.314550]  dump_stack_lvl+0x8c/0xd0
[   22.318195]  print_report+0x118/0x5e0
[   22.321841]  kasan_report+0xc8/0x118
[   22.325400]  __asan_report_store1_noabort+0x20/0x30
[   22.330261]  krealloc_less_oob_helper+0xa54/0xbc8
[   22.334949]  krealloc_less_oob+0x20/0x38
[   22.338855]  kunit_try_run_case+0x14c/0x3d0
[   22.343021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.348490]  kthread+0x24c/0x2d0
[   22.351702]  ret_from_fork+0x10/0x20
[   22.355263] 
[   22.356736] Allocated by task 195:
[   22.360123]  kasan_save_stack+0x3c/0x68
[   22.363941]  kasan_save_track+0x20/0x40
[   22.367762]  kasan_save_alloc_info+0x40/0x58
[   22.372014]  __kasan_krealloc+0x118/0x178
[   22.376007]  krealloc_noprof+0x10c/0x1a0
[   22.379913]  krealloc_less_oob_helper+0x170/0xbc8
[   22.384601]  krealloc_less_oob+0x20/0x38
[   22.388507]  kunit_try_run_case+0x14c/0x3d0
[   22.392673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.398142]  kthread+0x24c/0x2d0
[   22.401355]  ret_from_fork+0x10/0x20
[   22.404913] 
[   22.406388] The buggy address belongs to the object at ffff00080341ca00
[   22.406388]  which belongs to the cache kmalloc-256 of size 256
[   22.418890] The buggy address is located 17 bytes to the right of
[   22.418890]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   22.431909] 
[   22.433385] The buggy address belongs to the physical page:
[   22.438944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   22.446926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.454568] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.461509] page_type: f5(slab)
[   22.464642] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.472365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.480092] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.487903] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.495716] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   22.503527] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.511335] page dumped because: kasan: bad access detected
[   22.516890] 
[   22.518366] Memory state around the buggy address:
[   22.523146]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.530350]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.537554] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.544754]                                                     ^
[   22.550834]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.558039]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.565240] ==================================================================
[   21.643290] ==================================================================
[   21.652758] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   21.660309] Write of size 1 at addr ffff00080341cac9 by task kunit_try_catch/195
[   21.667686] 
[   21.669169] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.678283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.682442] Hardware name: WinLink E850-96 board (DT)
[   21.687480] Call trace:
[   21.689907]  dump_backtrace+0x9c/0x128
[   21.693639]  show_stack+0x20/0x38
[   21.696937]  dump_stack_lvl+0x8c/0xd0
[   21.700583]  print_report+0x118/0x5e0
[   21.704229]  kasan_report+0xc8/0x118
[   21.707788]  __asan_report_store1_noabort+0x20/0x30
[   21.712649]  krealloc_less_oob_helper+0xa2c/0xbc8
[   21.717336]  krealloc_less_oob+0x20/0x38
[   21.721243]  kunit_try_run_case+0x14c/0x3d0
[   21.725409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.730878]  kthread+0x24c/0x2d0
[   21.734089]  ret_from_fork+0x10/0x20
[   21.737653] 
[   21.739125] Allocated by task 195:
[   21.742511]  kasan_save_stack+0x3c/0x68
[   21.746329]  kasan_save_track+0x20/0x40
[   21.750150]  kasan_save_alloc_info+0x40/0x58
[   21.754401]  __kasan_krealloc+0x118/0x178
[   21.758395]  krealloc_noprof+0x10c/0x1a0
[   21.762301]  krealloc_less_oob_helper+0x170/0xbc8
[   21.766988]  krealloc_less_oob+0x20/0x38
[   21.770894]  kunit_try_run_case+0x14c/0x3d0
[   21.775061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.780530]  kthread+0x24c/0x2d0
[   21.783743]  ret_from_fork+0x10/0x20
[   21.787301] 
[   21.788778] The buggy address belongs to the object at ffff00080341ca00
[   21.788778]  which belongs to the cache kmalloc-256 of size 256
[   21.801278] The buggy address is located 0 bytes to the right of
[   21.801278]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   21.814210] 
[   21.815688] The buggy address belongs to the physical page:
[   21.821246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   21.829230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.836868] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.843810] page_type: f5(slab)
[   21.846951] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.854666] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.862393] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.870204] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.878017] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   21.885829] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.893636] page dumped because: kasan: bad access detected
[   21.899192] 
[   21.900666] Memory state around the buggy address:
[   21.905448]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.912652]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.919856] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.927055]                                               ^
[   21.932614]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.939819]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.947022] ==================================================================
[   23.658769] ==================================================================
[   23.668785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   23.676336] Write of size 1 at addr ffff0008034260c9 by task kunit_try_catch/199
[   23.683713] 
[   23.685197] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.694310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.698471] Hardware name: WinLink E850-96 board (DT)
[   23.703507] Call trace:
[   23.705936]  dump_backtrace+0x9c/0x128
[   23.709668]  show_stack+0x20/0x38
[   23.712966]  dump_stack_lvl+0x8c/0xd0
[   23.716612]  print_report+0x118/0x5e0
[   23.720258]  kasan_report+0xc8/0x118
[   23.723817]  __asan_report_store1_noabort+0x20/0x30
[   23.728678]  krealloc_less_oob_helper+0xa2c/0xbc8
[   23.733365]  krealloc_large_less_oob+0x20/0x38
[   23.737792]  kunit_try_run_case+0x14c/0x3d0
[   23.741959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.747427]  kthread+0x24c/0x2d0
[   23.750639]  ret_from_fork+0x10/0x20
[   23.754201] 
[   23.755677] The buggy address belongs to the physical page:
[   23.761232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   23.769216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.776857] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.783809] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.791530] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.799256] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.807067] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.814880] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   23.822692] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.830499] page dumped because: kasan: bad access detected
[   23.836054] 
[   23.837530] Memory state around the buggy address:
[   23.842310]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.849514]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.856719] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.863918]                                               ^
[   23.869478]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.876682]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.883883] ==================================================================
[   22.882566] ==================================================================
[   22.889460] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   22.897006] Write of size 1 at addr ffff00080341caeb by task kunit_try_catch/195
[   22.904384] 
[   22.905869] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.914981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.919142] Hardware name: WinLink E850-96 board (DT)
[   22.924179] Call trace:
[   22.926607]  dump_backtrace+0x9c/0x128
[   22.930339]  show_stack+0x20/0x38
[   22.933637]  dump_stack_lvl+0x8c/0xd0
[   22.937284]  print_report+0x118/0x5e0
[   22.940929]  kasan_report+0xc8/0x118
[   22.944488]  __asan_report_store1_noabort+0x20/0x30
[   22.949349]  krealloc_less_oob_helper+0xa3c/0xbc8
[   22.954036]  krealloc_less_oob+0x20/0x38
[   22.957943]  kunit_try_run_case+0x14c/0x3d0
[   22.962109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.967578]  kthread+0x24c/0x2d0
[   22.970789]  ret_from_fork+0x10/0x20
[   22.974351] 
[   22.975825] Allocated by task 195:
[   22.979211]  kasan_save_stack+0x3c/0x68
[   22.983029]  kasan_save_track+0x20/0x40
[   22.986850]  kasan_save_alloc_info+0x40/0x58
[   22.991102]  __kasan_krealloc+0x118/0x178
[   22.995095]  krealloc_noprof+0x10c/0x1a0
[   22.999001]  krealloc_less_oob_helper+0x170/0xbc8
[   23.003688]  krealloc_less_oob+0x20/0x38
[   23.007595]  kunit_try_run_case+0x14c/0x3d0
[   23.011761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.017230]  kthread+0x24c/0x2d0
[   23.020443]  ret_from_fork+0x10/0x20
[   23.024001] 
[   23.025479] The buggy address belongs to the object at ffff00080341ca00
[   23.025479]  which belongs to the cache kmalloc-256 of size 256
[   23.037980] The buggy address is located 34 bytes to the right of
[   23.037980]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   23.050997] 
[   23.052476] The buggy address belongs to the physical page:
[   23.058031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   23.066014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.073656] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.080597] page_type: f5(slab)
[   23.083732] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.091453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.099180] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.106991] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.114804] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   23.122616] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.130423] page dumped because: kasan: bad access detected
[   23.135978] 
[   23.137453] Memory state around the buggy address:
[   23.142234]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.149437]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.156644] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.163842]                                                           ^
[   23.170443]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.177647]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.184849] ==================================================================
[   23.891242] ==================================================================
[   23.898298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   23.905846] Write of size 1 at addr ffff0008034260d0 by task kunit_try_catch/199
[   23.913223] 
[   23.914706] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.923821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.927981] Hardware name: WinLink E850-96 board (DT)
[   23.933017] Call trace:
[   23.935445]  dump_backtrace+0x9c/0x128
[   23.939178]  show_stack+0x20/0x38
[   23.942477]  dump_stack_lvl+0x8c/0xd0
[   23.946122]  print_report+0x118/0x5e0
[   23.949768]  kasan_report+0xc8/0x118
[   23.953327]  __asan_report_store1_noabort+0x20/0x30
[   23.958188]  krealloc_less_oob_helper+0xb20/0xbc8
[   23.962875]  krealloc_large_less_oob+0x20/0x38
[   23.967302]  kunit_try_run_case+0x14c/0x3d0
[   23.971469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.976938]  kthread+0x24c/0x2d0
[   23.980150]  ret_from_fork+0x10/0x20
[   23.983712] 
[   23.985186] The buggy address belongs to the physical page:
[   23.990743] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   23.998726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.006368] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.013317] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.021040] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.028766] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.036578] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.044391] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.052203] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.060009] page dumped because: kasan: bad access detected
[   24.065565] 
[   24.067040] Memory state around the buggy address:
[   24.071818]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.079023]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.086228] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.093429]                                                  ^
[   24.099248]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.106453]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.113654] ==================================================================
[   24.351151] ==================================================================
[   24.358096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   24.365647] Write of size 1 at addr ffff0008034260ea by task kunit_try_catch/199
[   24.373026] 
[   24.374509] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.383620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.387783] Hardware name: WinLink E850-96 board (DT)
[   24.392819] Call trace:
[   24.395247]  dump_backtrace+0x9c/0x128
[   24.398980]  show_stack+0x20/0x38
[   24.402279]  dump_stack_lvl+0x8c/0xd0
[   24.405925]  print_report+0x118/0x5e0
[   24.409570]  kasan_report+0xc8/0x118
[   24.413129]  __asan_report_store1_noabort+0x20/0x30
[   24.417989]  krealloc_less_oob_helper+0xa98/0xbc8
[   24.422678]  krealloc_large_less_oob+0x20/0x38
[   24.427105]  kunit_try_run_case+0x14c/0x3d0
[   24.431271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.436740]  kthread+0x24c/0x2d0
[   24.439951]  ret_from_fork+0x10/0x20
[   24.443514] 
[   24.444988] The buggy address belongs to the physical page:
[   24.450544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   24.458529] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.466168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.473118] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.480842] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.488568] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.496380] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.504193] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.512005] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.519812] page dumped because: kasan: bad access detected
[   24.525367] 
[   24.526842] Memory state around the buggy address:
[   24.531620]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.538825]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.546030] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.553231]                                                           ^
[   24.559831]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.567036]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.574238] ==================================================================

test log snippet test parser 68

Home

[   23.658769] ==================================================================
[   23.668785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   23.676336] Write of size 1 at addr ffff0008034260c9 by task kunit_try_catch/199
[   23.683713] 
[   23.685197] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.694310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.698471] Hardware name: WinLink E850-96 board (DT)
[   23.703507] Call trace:
[   23.705936]  dump_backtrace+0x9c/0x128
[   23.709668]  show_stack+0x20/0x38
[   23.712966]  dump_stack_lvl+0x8c/0xd0
[   23.716612]  print_report+0x118/0x5e0
[   23.720258]  kasan_report+0xc8/0x118
[   23.723817]  __asan_report_store1_noabort+0x20/0x30
[   23.728678]  krealloc_less_oob_helper+0xa2c/0xbc8
[   23.733365]  krealloc_large_less_oob+0x20/0x38
[   23.737792]  kunit_try_run_case+0x14c/0x3d0
[   23.741959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.747427]  kthread+0x24c/0x2d0
[   23.750639]  ret_from_fork+0x10/0x20
[   23.754201] 
[   23.755677] The buggy address belongs to the physical page:
[   23.761232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   23.769216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.776857] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.783809] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.791530] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.799256] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.807067] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.814880] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   23.822692] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.830499] page dumped because: kasan: bad access detected
[   23.836054] 
[   23.837530] Memory state around the buggy address:
[   23.842310]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.849514]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.856719] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.863918]                                               ^
[   23.869478]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.876682]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.883883] ==================================================================

test log snippet test parser 69

Home

[   24.351151] ==================================================================
[   24.358096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   24.365647] Write of size 1 at addr ffff0008034260ea by task kunit_try_catch/199
[   24.373026] 
[   24.374509] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.383620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.387783] Hardware name: WinLink E850-96 board (DT)
[   24.392819] Call trace:
[   24.395247]  dump_backtrace+0x9c/0x128
[   24.398980]  show_stack+0x20/0x38
[   24.402279]  dump_stack_lvl+0x8c/0xd0
[   24.405925]  print_report+0x118/0x5e0
[   24.409570]  kasan_report+0xc8/0x118
[   24.413129]  __asan_report_store1_noabort+0x20/0x30
[   24.417989]  krealloc_less_oob_helper+0xa98/0xbc8
[   24.422678]  krealloc_large_less_oob+0x20/0x38
[   24.427105]  kunit_try_run_case+0x14c/0x3d0
[   24.431271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.436740]  kthread+0x24c/0x2d0
[   24.439951]  ret_from_fork+0x10/0x20
[   24.443514] 
[   24.444988] The buggy address belongs to the physical page:
[   24.450544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   24.458529] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.466168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.473118] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.480842] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.488568] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.496380] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.504193] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.512005] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.519812] page dumped because: kasan: bad access detected
[   24.525367] 
[   24.526842] Memory state around the buggy address:
[   24.531620]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.538825]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.546030] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.553231]                                                           ^
[   24.559831]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.567036]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.574238] ==================================================================

test log snippet test parser 70

Home

[   22.263256] ==================================================================
[   22.270371] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   22.277918] Write of size 1 at addr ffff00080341cada by task kunit_try_catch/195
[   22.285296] 
[   22.286780] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.295893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.300055] Hardware name: WinLink E850-96 board (DT)
[   22.305090] Call trace:
[   22.307519]  dump_backtrace+0x9c/0x128
[   22.311251]  show_stack+0x20/0x38
[   22.314550]  dump_stack_lvl+0x8c/0xd0
[   22.318195]  print_report+0x118/0x5e0
[   22.321841]  kasan_report+0xc8/0x118
[   22.325400]  __asan_report_store1_noabort+0x20/0x30
[   22.330261]  krealloc_less_oob_helper+0xa54/0xbc8
[   22.334949]  krealloc_less_oob+0x20/0x38
[   22.338855]  kunit_try_run_case+0x14c/0x3d0
[   22.343021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.348490]  kthread+0x24c/0x2d0
[   22.351702]  ret_from_fork+0x10/0x20
[   22.355263] 
[   22.356736] Allocated by task 195:
[   22.360123]  kasan_save_stack+0x3c/0x68
[   22.363941]  kasan_save_track+0x20/0x40
[   22.367762]  kasan_save_alloc_info+0x40/0x58
[   22.372014]  __kasan_krealloc+0x118/0x178
[   22.376007]  krealloc_noprof+0x10c/0x1a0
[   22.379913]  krealloc_less_oob_helper+0x170/0xbc8
[   22.384601]  krealloc_less_oob+0x20/0x38
[   22.388507]  kunit_try_run_case+0x14c/0x3d0
[   22.392673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.398142]  kthread+0x24c/0x2d0
[   22.401355]  ret_from_fork+0x10/0x20
[   22.404913] 
[   22.406388] The buggy address belongs to the object at ffff00080341ca00
[   22.406388]  which belongs to the cache kmalloc-256 of size 256
[   22.418890] The buggy address is located 17 bytes to the right of
[   22.418890]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   22.431909] 
[   22.433385] The buggy address belongs to the physical page:
[   22.438944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   22.446926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.454568] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.461509] page_type: f5(slab)
[   22.464642] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.472365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.480092] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.487903] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.495716] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   22.503527] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.511335] page dumped because: kasan: bad access detected
[   22.516890] 
[   22.518366] Memory state around the buggy address:
[   22.523146]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.530350]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.537554] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.544754]                                                     ^
[   22.550834]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.558039]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.565240] ==================================================================

test log snippet test parser 71

Home

[   24.581539] ==================================================================
[   24.588650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   24.596199] Write of size 1 at addr ffff0008034260eb by task kunit_try_catch/199
[   24.603577] 
[   24.605063] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.614173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.618336] Hardware name: WinLink E850-96 board (DT)
[   24.623370] Call trace:
[   24.625801]  dump_backtrace+0x9c/0x128
[   24.629533]  show_stack+0x20/0x38
[   24.632831]  dump_stack_lvl+0x8c/0xd0
[   24.636476]  print_report+0x118/0x5e0
[   24.640122]  kasan_report+0xc8/0x118
[   24.643681]  __asan_report_store1_noabort+0x20/0x30
[   24.648542]  krealloc_less_oob_helper+0xa3c/0xbc8
[   24.653230]  krealloc_large_less_oob+0x20/0x38
[   24.657657]  kunit_try_run_case+0x14c/0x3d0
[   24.661823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.667292]  kthread+0x24c/0x2d0
[   24.670504]  ret_from_fork+0x10/0x20
[   24.674065] 
[   24.675540] The buggy address belongs to the physical page:
[   24.681096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   24.689080] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.696719] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.703673] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.711394] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.719120] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.726932] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.734745] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.742557] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.750364] page dumped because: kasan: bad access detected
[   24.755919] 
[   24.757395] Memory state around the buggy address:
[   24.762174]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.769377]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.776582] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.783783]                                                           ^
[   24.790384]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.797588]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.804791] ==================================================================

test log snippet test parser 72

Home

[   21.954409] ==================================================================
[   21.961433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   21.968982] Write of size 1 at addr ffff00080341cad0 by task kunit_try_catch/195
[   21.976360] 
[   21.977843] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.986958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.991118] Hardware name: WinLink E850-96 board (DT)
[   21.996155] Call trace:
[   21.998582]  dump_backtrace+0x9c/0x128
[   22.002315]  show_stack+0x20/0x38
[   22.005614]  dump_stack_lvl+0x8c/0xd0
[   22.009260]  print_report+0x118/0x5e0
[   22.012905]  kasan_report+0xc8/0x118
[   22.016464]  __asan_report_store1_noabort+0x20/0x30
[   22.021325]  krealloc_less_oob_helper+0xb20/0xbc8
[   22.026012]  krealloc_less_oob+0x20/0x38
[   22.029918]  kunit_try_run_case+0x14c/0x3d0
[   22.034085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.039554]  kthread+0x24c/0x2d0
[   22.042765]  ret_from_fork+0x10/0x20
[   22.046328] 
[   22.047801] Allocated by task 195:
[   22.051187]  kasan_save_stack+0x3c/0x68
[   22.055005]  kasan_save_track+0x20/0x40
[   22.058824]  kasan_save_alloc_info+0x40/0x58
[   22.063078]  __kasan_krealloc+0x118/0x178
[   22.067071]  krealloc_noprof+0x10c/0x1a0
[   22.070976]  krealloc_less_oob_helper+0x170/0xbc8
[   22.075664]  krealloc_less_oob+0x20/0x38
[   22.079570]  kunit_try_run_case+0x14c/0x3d0
[   22.083737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.089206]  kthread+0x24c/0x2d0
[   22.092419]  ret_from_fork+0x10/0x20
[   22.095976] 
[   22.097453] The buggy address belongs to the object at ffff00080341ca00
[   22.097453]  which belongs to the cache kmalloc-256 of size 256
[   22.109955] The buggy address is located 7 bytes to the right of
[   22.109955]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   22.122886] 
[   22.124364] The buggy address belongs to the physical page:
[   22.129920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   22.137905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.145543] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.152486] page_type: f5(slab)
[   22.155622] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.163343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.171068] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.178880] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.186693] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   22.194504] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.202312] page dumped because: kasan: bad access detected
[   22.207867] 
[   22.209343] Memory state around the buggy address:
[   22.214122]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.221325]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.228530] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.235731]                                                  ^
[   22.241551]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.248755]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.255957] ==================================================================

test log snippet test parser 73

Home

[   24.120962] ==================================================================
[   24.128067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   24.135616] Write of size 1 at addr ffff0008034260da by task kunit_try_catch/199
[   24.142994] 
[   24.144477] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.153589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.157752] Hardware name: WinLink E850-96 board (DT)
[   24.162788] Call trace:
[   24.165218]  dump_backtrace+0x9c/0x128
[   24.168949]  show_stack+0x20/0x38
[   24.172247]  dump_stack_lvl+0x8c/0xd0
[   24.175893]  print_report+0x118/0x5e0
[   24.179539]  kasan_report+0xc8/0x118
[   24.183098]  __asan_report_store1_noabort+0x20/0x30
[   24.187959]  krealloc_less_oob_helper+0xa54/0xbc8
[   24.192646]  krealloc_large_less_oob+0x20/0x38
[   24.197073]  kunit_try_run_case+0x14c/0x3d0
[   24.201240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.206709]  kthread+0x24c/0x2d0
[   24.209921]  ret_from_fork+0x10/0x20
[   24.213483] 
[   24.214957] The buggy address belongs to the physical page:
[   24.220513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   24.228497] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.236139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.243089] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.250812] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.258537] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.266348] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.274162] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.281973] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.289780] page dumped because: kasan: bad access detected
[   24.295336] 
[   24.296811] Memory state around the buggy address:
[   24.301591]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.308794]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.315998] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.323200]                                                     ^
[   24.329280]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.336484]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.343686] ==================================================================

test log snippet test parser 74

Home

[   22.882566] ==================================================================
[   22.889460] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   22.897006] Write of size 1 at addr ffff00080341caeb by task kunit_try_catch/195
[   22.904384] 
[   22.905869] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.914981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.919142] Hardware name: WinLink E850-96 board (DT)
[   22.924179] Call trace:
[   22.926607]  dump_backtrace+0x9c/0x128
[   22.930339]  show_stack+0x20/0x38
[   22.933637]  dump_stack_lvl+0x8c/0xd0
[   22.937284]  print_report+0x118/0x5e0
[   22.940929]  kasan_report+0xc8/0x118
[   22.944488]  __asan_report_store1_noabort+0x20/0x30
[   22.949349]  krealloc_less_oob_helper+0xa3c/0xbc8
[   22.954036]  krealloc_less_oob+0x20/0x38
[   22.957943]  kunit_try_run_case+0x14c/0x3d0
[   22.962109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.967578]  kthread+0x24c/0x2d0
[   22.970789]  ret_from_fork+0x10/0x20
[   22.974351] 
[   22.975825] Allocated by task 195:
[   22.979211]  kasan_save_stack+0x3c/0x68
[   22.983029]  kasan_save_track+0x20/0x40
[   22.986850]  kasan_save_alloc_info+0x40/0x58
[   22.991102]  __kasan_krealloc+0x118/0x178
[   22.995095]  krealloc_noprof+0x10c/0x1a0
[   22.999001]  krealloc_less_oob_helper+0x170/0xbc8
[   23.003688]  krealloc_less_oob+0x20/0x38
[   23.007595]  kunit_try_run_case+0x14c/0x3d0
[   23.011761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.017230]  kthread+0x24c/0x2d0
[   23.020443]  ret_from_fork+0x10/0x20
[   23.024001] 
[   23.025479] The buggy address belongs to the object at ffff00080341ca00
[   23.025479]  which belongs to the cache kmalloc-256 of size 256
[   23.037980] The buggy address is located 34 bytes to the right of
[   23.037980]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   23.050997] 
[   23.052476] The buggy address belongs to the physical page:
[   23.058031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   23.066014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.073656] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.080597] page_type: f5(slab)
[   23.083732] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.091453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.099180] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.106991] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.114804] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   23.122616] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.130423] page dumped because: kasan: bad access detected
[   23.135978] 
[   23.137453] Memory state around the buggy address:
[   23.142234]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.149437]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.156644] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.163842]                                                           ^
[   23.170443]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.177647]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.184849] ==================================================================

test log snippet test parser 75

Home

[   22.572544] ==================================================================
[   22.579652] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   22.587202] Write of size 1 at addr ffff00080341caea by task kunit_try_catch/195
[   22.594580] 
[   22.596065] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   22.605176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.609337] Hardware name: WinLink E850-96 board (DT)
[   22.614373] Call trace:
[   22.616802]  dump_backtrace+0x9c/0x128
[   22.620535]  show_stack+0x20/0x38
[   22.623833]  dump_stack_lvl+0x8c/0xd0
[   22.627479]  print_report+0x118/0x5e0
[   22.631125]  kasan_report+0xc8/0x118
[   22.634683]  __asan_report_store1_noabort+0x20/0x30
[   22.639545]  krealloc_less_oob_helper+0xa98/0xbc8
[   22.644232]  krealloc_less_oob+0x20/0x38
[   22.648138]  kunit_try_run_case+0x14c/0x3d0
[   22.652305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.657774]  kthread+0x24c/0x2d0
[   22.660986]  ret_from_fork+0x10/0x20
[   22.664548] 
[   22.666020] Allocated by task 195:
[   22.669407]  kasan_save_stack+0x3c/0x68
[   22.673225]  kasan_save_track+0x20/0x40
[   22.677046]  kasan_save_alloc_info+0x40/0x58
[   22.681297]  __kasan_krealloc+0x118/0x178
[   22.685290]  krealloc_noprof+0x10c/0x1a0
[   22.689197]  krealloc_less_oob_helper+0x170/0xbc8
[   22.693884]  krealloc_less_oob+0x20/0x38
[   22.697790]  kunit_try_run_case+0x14c/0x3d0
[   22.701957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707426]  kthread+0x24c/0x2d0
[   22.710639]  ret_from_fork+0x10/0x20
[   22.714196] 
[   22.715673] The buggy address belongs to the object at ffff00080341ca00
[   22.715673]  which belongs to the cache kmalloc-256 of size 256
[   22.728174] The buggy address is located 33 bytes to the right of
[   22.728174]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   22.741192] 
[   22.742672] The buggy address belongs to the physical page:
[   22.748227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   22.756210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.763850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.770794] page_type: f5(slab)
[   22.773927] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.781650] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.789376] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.797188] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.805001] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   22.812811] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.820618] page dumped because: kasan: bad access detected
[   22.826174] 
[   22.827649] Memory state around the buggy address:
[   22.832430]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839633]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.846838] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.854038]                                                           ^
[   22.860638]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.867843]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.875045] ==================================================================

test log snippet test parser 76

Home

[   21.643290] ==================================================================
[   21.652758] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   21.660309] Write of size 1 at addr ffff00080341cac9 by task kunit_try_catch/195
[   21.667686] 
[   21.669169] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.678283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.682442] Hardware name: WinLink E850-96 board (DT)
[   21.687480] Call trace:
[   21.689907]  dump_backtrace+0x9c/0x128
[   21.693639]  show_stack+0x20/0x38
[   21.696937]  dump_stack_lvl+0x8c/0xd0
[   21.700583]  print_report+0x118/0x5e0
[   21.704229]  kasan_report+0xc8/0x118
[   21.707788]  __asan_report_store1_noabort+0x20/0x30
[   21.712649]  krealloc_less_oob_helper+0xa2c/0xbc8
[   21.717336]  krealloc_less_oob+0x20/0x38
[   21.721243]  kunit_try_run_case+0x14c/0x3d0
[   21.725409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.730878]  kthread+0x24c/0x2d0
[   21.734089]  ret_from_fork+0x10/0x20
[   21.737653] 
[   21.739125] Allocated by task 195:
[   21.742511]  kasan_save_stack+0x3c/0x68
[   21.746329]  kasan_save_track+0x20/0x40
[   21.750150]  kasan_save_alloc_info+0x40/0x58
[   21.754401]  __kasan_krealloc+0x118/0x178
[   21.758395]  krealloc_noprof+0x10c/0x1a0
[   21.762301]  krealloc_less_oob_helper+0x170/0xbc8
[   21.766988]  krealloc_less_oob+0x20/0x38
[   21.770894]  kunit_try_run_case+0x14c/0x3d0
[   21.775061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.780530]  kthread+0x24c/0x2d0
[   21.783743]  ret_from_fork+0x10/0x20
[   21.787301] 
[   21.788778] The buggy address belongs to the object at ffff00080341ca00
[   21.788778]  which belongs to the cache kmalloc-256 of size 256
[   21.801278] The buggy address is located 0 bytes to the right of
[   21.801278]  allocated 201-byte region [ffff00080341ca00, ffff00080341cac9)
[   21.814210] 
[   21.815688] The buggy address belongs to the physical page:
[   21.821246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   21.829230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.836868] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.843810] page_type: f5(slab)
[   21.846951] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.854666] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.862393] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.870204] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.878017] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   21.885829] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.893636] page dumped because: kasan: bad access detected
[   21.899192] 
[   21.900666] Memory state around the buggy address:
[   21.905448]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.912652]  ffff00080341ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.919856] >ffff00080341ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.927055]                                               ^
[   21.932614]  ffff00080341cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.939819]  ffff00080341cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.947022] ==================================================================

test log snippet test parser 77

Home

[   23.891242] ==================================================================
[   23.898298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   23.905846] Write of size 1 at addr ffff0008034260d0 by task kunit_try_catch/199
[   23.913223] 
[   23.914706] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.923821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.927981] Hardware name: WinLink E850-96 board (DT)
[   23.933017] Call trace:
[   23.935445]  dump_backtrace+0x9c/0x128
[   23.939178]  show_stack+0x20/0x38
[   23.942477]  dump_stack_lvl+0x8c/0xd0
[   23.946122]  print_report+0x118/0x5e0
[   23.949768]  kasan_report+0xc8/0x118
[   23.953327]  __asan_report_store1_noabort+0x20/0x30
[   23.958188]  krealloc_less_oob_helper+0xb20/0xbc8
[   23.962875]  krealloc_large_less_oob+0x20/0x38
[   23.967302]  kunit_try_run_case+0x14c/0x3d0
[   23.971469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.976938]  kthread+0x24c/0x2d0
[   23.980150]  ret_from_fork+0x10/0x20
[   23.983712] 
[   23.985186] The buggy address belongs to the physical page:
[   23.990743] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   23.998726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.006368] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.013317] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.021040] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.028766] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.036578] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.044391] head: 0bfffe0000000002 fffffdffe00d0901 ffffffffffffffff 0000000000000000
[   24.052203] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.060009] page dumped because: kasan: bad access detected
[   24.065565] 
[   24.067040] Memory state around the buggy address:
[   24.071818]  ffff000803425f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.079023]  ffff000803426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.086228] >ffff000803426080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.093429]                                                  ^
[   24.099248]  ffff000803426100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.106453]  ffff000803426180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.113654] ==================================================================

test log snippet test parser 78

Home

[   23.426514] ==================================================================
[   23.433633] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   23.441182] Write of size 1 at addr ffff00080424e0f0 by task kunit_try_catch/197
[   23.448560] 
[   23.450043] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.459156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.463317] Hardware name: WinLink E850-96 board (DT)
[   23.468353] Call trace:
[   23.470782]  dump_backtrace+0x9c/0x128
[   23.474515]  show_stack+0x20/0x38
[   23.477813]  dump_stack_lvl+0x8c/0xd0
[   23.481459]  print_report+0x118/0x5e0
[   23.485105]  kasan_report+0xc8/0x118
[   23.488664]  __asan_report_store1_noabort+0x20/0x30
[   23.493525]  krealloc_more_oob_helper+0x5dc/0x690
[   23.498212]  krealloc_large_more_oob+0x20/0x38
[   23.502639]  kunit_try_run_case+0x14c/0x3d0
[   23.506806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.512275]  kthread+0x24c/0x2d0
[   23.515486]  ret_from_fork+0x10/0x20
[   23.519048] 
[   23.520521] The buggy address belongs to the physical page:
[   23.526078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88424c
[   23.534063] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.541705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.548655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.556377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.564103] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.571915] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.579728] head: 0bfffe0000000002 fffffdffe0109301 ffffffffffffffff 0000000000000000
[   23.587539] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.595346] page dumped because: kasan: bad access detected
[   23.600902] 
[   23.602377] Memory state around the buggy address:
[   23.607155]  ffff00080424df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.614360]  ffff00080424e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.621565] >ffff00080424e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.628766]                                                              ^
[   23.635627]  ffff00080424e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.642831]  ffff00080424e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.650033] ==================================================================
[   21.020082] ==================================================================
[   21.029244] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   21.036795] Write of size 1 at addr ffff00080341c8eb by task kunit_try_catch/193
[   21.044171] 
[   21.045654] CPU: 7 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.054767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.058927] Hardware name: WinLink E850-96 board (DT)
[   21.063965] Call trace:
[   21.066393]  dump_backtrace+0x9c/0x128
[   21.070123]  show_stack+0x20/0x38
[   21.073422]  dump_stack_lvl+0x8c/0xd0
[   21.077068]  print_report+0x118/0x5e0
[   21.080714]  kasan_report+0xc8/0x118
[   21.084273]  __asan_report_store1_noabort+0x20/0x30
[   21.089134]  krealloc_more_oob_helper+0x628/0x690
[   21.093821]  krealloc_more_oob+0x20/0x38
[   21.097727]  kunit_try_run_case+0x14c/0x3d0
[   21.101895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.107362]  kthread+0x24c/0x2d0
[   21.110575]  ret_from_fork+0x10/0x20
[   21.114136] 
[   21.115610] Allocated by task 193:
[   21.118998]  kasan_save_stack+0x3c/0x68
[   21.122815]  kasan_save_track+0x20/0x40
[   21.126634]  kasan_save_alloc_info+0x40/0x58
[   21.130887]  __kasan_krealloc+0x118/0x178
[   21.134880]  krealloc_noprof+0x10c/0x1a0
[   21.138786]  krealloc_more_oob_helper+0x170/0x690
[   21.143473]  krealloc_more_oob+0x20/0x38
[   21.147380]  kunit_try_run_case+0x14c/0x3d0
[   21.151546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.157015]  kthread+0x24c/0x2d0
[   21.160228]  ret_from_fork+0x10/0x20
[   21.163785] 
[   21.165263] The buggy address belongs to the object at ffff00080341c800
[   21.165263]  which belongs to the cache kmalloc-256 of size 256
[   21.177764] The buggy address is located 0 bytes to the right of
[   21.177764]  allocated 235-byte region [ffff00080341c800, ffff00080341c8eb)
[   21.190695] 
[   21.192173] The buggy address belongs to the physical page:
[   21.197731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   21.205714] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.213352] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.220296] page_type: f5(slab)
[   21.223433] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.231152] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.238878] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.246689] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.254502] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   21.262314] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.270120] page dumped because: kasan: bad access detected
[   21.275676] 
[   21.277152] Memory state around the buggy address:
[   21.281932]  ffff00080341c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.289136]  ffff00080341c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.296341] >ffff00080341c880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.303540]                                                           ^
[   21.310141]  ffff00080341c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.317345]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.324547] ==================================================================
[   21.331867] ==================================================================
[   21.338962] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   21.346508] Write of size 1 at addr ffff00080341c8f0 by task kunit_try_catch/193
[   21.353887] 
[   21.355367] CPU: 7 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.364484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.368643] Hardware name: WinLink E850-96 board (DT)
[   21.373681] Call trace:
[   21.376109]  dump_backtrace+0x9c/0x128
[   21.379842]  show_stack+0x20/0x38
[   21.383140]  dump_stack_lvl+0x8c/0xd0
[   21.386786]  print_report+0x118/0x5e0
[   21.390431]  kasan_report+0xc8/0x118
[   21.393990]  __asan_report_store1_noabort+0x20/0x30
[   21.398852]  krealloc_more_oob_helper+0x5dc/0x690
[   21.403539]  krealloc_more_oob+0x20/0x38
[   21.407445]  kunit_try_run_case+0x14c/0x3d0
[   21.411612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.417081]  kthread+0x24c/0x2d0
[   21.420292]  ret_from_fork+0x10/0x20
[   21.423854] 
[   21.425328] Allocated by task 193:
[   21.428712]  kasan_save_stack+0x3c/0x68
[   21.432532]  kasan_save_track+0x20/0x40
[   21.436352]  kasan_save_alloc_info+0x40/0x58
[   21.440604]  __kasan_krealloc+0x118/0x178
[   21.444597]  krealloc_noprof+0x10c/0x1a0
[   21.448503]  krealloc_more_oob_helper+0x170/0x690
[   21.453191]  krealloc_more_oob+0x20/0x38
[   21.457097]  kunit_try_run_case+0x14c/0x3d0
[   21.461264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.466733]  kthread+0x24c/0x2d0
[   21.469946]  ret_from_fork+0x10/0x20
[   21.473503] 
[   21.474979] The buggy address belongs to the object at ffff00080341c800
[   21.474979]  which belongs to the cache kmalloc-256 of size 256
[   21.487480] The buggy address is located 5 bytes to the right of
[   21.487480]  allocated 235-byte region [ffff00080341c800, ffff00080341c8eb)
[   21.500413] 
[   21.501890] The buggy address belongs to the physical page:
[   21.507446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   21.515430] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.523071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.530012] page_type: f5(slab)
[   21.533144] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.540869] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.548596] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.556407] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.564220] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   21.572032] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.579839] page dumped because: kasan: bad access detected
[   21.585394] 
[   21.586869] Memory state around the buggy address:
[   21.591650]  ffff00080341c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598852]  ffff00080341c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.606058] >ffff00080341c880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.613258]                                                              ^
[   21.620119]  ffff00080341c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.627324]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.634525] ==================================================================
[   23.193596] ==================================================================
[   23.203082] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   23.210631] Write of size 1 at addr ffff00080424e0eb by task kunit_try_catch/197
[   23.218010] 
[   23.219493] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.228605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.232766] Hardware name: WinLink E850-96 board (DT)
[   23.237805] Call trace:
[   23.240233]  dump_backtrace+0x9c/0x128
[   23.243963]  show_stack+0x20/0x38
[   23.247261]  dump_stack_lvl+0x8c/0xd0
[   23.250907]  print_report+0x118/0x5e0
[   23.254553]  kasan_report+0xc8/0x118
[   23.258112]  __asan_report_store1_noabort+0x20/0x30
[   23.262973]  krealloc_more_oob_helper+0x628/0x690
[   23.267660]  krealloc_large_more_oob+0x20/0x38
[   23.272087]  kunit_try_run_case+0x14c/0x3d0
[   23.276254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.281722]  kthread+0x24c/0x2d0
[   23.284934]  ret_from_fork+0x10/0x20
[   23.288497] 
[   23.289972] The buggy address belongs to the physical page:
[   23.295530] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88424c
[   23.303512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.311153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.318104] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.325825] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.333551] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.341362] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.349176] head: 0bfffe0000000002 fffffdffe0109301 ffffffffffffffff 0000000000000000
[   23.356987] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.364794] page dumped because: kasan: bad access detected
[   23.370349] 
[   23.371825] Memory state around the buggy address:
[   23.376607]  ffff00080424df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.383808]  ffff00080424e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.391014] >ffff00080424e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.398214]                                                           ^
[   23.404814]  ffff00080424e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.412019]  ffff00080424e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.419220] ==================================================================

test log snippet test parser 79

Home

[   23.426514] ==================================================================
[   23.433633] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   23.441182] Write of size 1 at addr ffff00080424e0f0 by task kunit_try_catch/197
[   23.448560] 
[   23.450043] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.459156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.463317] Hardware name: WinLink E850-96 board (DT)
[   23.468353] Call trace:
[   23.470782]  dump_backtrace+0x9c/0x128
[   23.474515]  show_stack+0x20/0x38
[   23.477813]  dump_stack_lvl+0x8c/0xd0
[   23.481459]  print_report+0x118/0x5e0
[   23.485105]  kasan_report+0xc8/0x118
[   23.488664]  __asan_report_store1_noabort+0x20/0x30
[   23.493525]  krealloc_more_oob_helper+0x5dc/0x690
[   23.498212]  krealloc_large_more_oob+0x20/0x38
[   23.502639]  kunit_try_run_case+0x14c/0x3d0
[   23.506806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.512275]  kthread+0x24c/0x2d0
[   23.515486]  ret_from_fork+0x10/0x20
[   23.519048] 
[   23.520521] The buggy address belongs to the physical page:
[   23.526078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88424c
[   23.534063] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.541705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.548655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.556377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.564103] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.571915] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.579728] head: 0bfffe0000000002 fffffdffe0109301 ffffffffffffffff 0000000000000000
[   23.587539] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.595346] page dumped because: kasan: bad access detected
[   23.600902] 
[   23.602377] Memory state around the buggy address:
[   23.607155]  ffff00080424df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.614360]  ffff00080424e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.621565] >ffff00080424e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.628766]                                                              ^
[   23.635627]  ffff00080424e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.642831]  ffff00080424e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.650033] ==================================================================

test log snippet test parser 80

Home

[   21.331867] ==================================================================
[   21.338962] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   21.346508] Write of size 1 at addr ffff00080341c8f0 by task kunit_try_catch/193
[   21.353887] 
[   21.355367] CPU: 7 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.364484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.368643] Hardware name: WinLink E850-96 board (DT)
[   21.373681] Call trace:
[   21.376109]  dump_backtrace+0x9c/0x128
[   21.379842]  show_stack+0x20/0x38
[   21.383140]  dump_stack_lvl+0x8c/0xd0
[   21.386786]  print_report+0x118/0x5e0
[   21.390431]  kasan_report+0xc8/0x118
[   21.393990]  __asan_report_store1_noabort+0x20/0x30
[   21.398852]  krealloc_more_oob_helper+0x5dc/0x690
[   21.403539]  krealloc_more_oob+0x20/0x38
[   21.407445]  kunit_try_run_case+0x14c/0x3d0
[   21.411612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.417081]  kthread+0x24c/0x2d0
[   21.420292]  ret_from_fork+0x10/0x20
[   21.423854] 
[   21.425328] Allocated by task 193:
[   21.428712]  kasan_save_stack+0x3c/0x68
[   21.432532]  kasan_save_track+0x20/0x40
[   21.436352]  kasan_save_alloc_info+0x40/0x58
[   21.440604]  __kasan_krealloc+0x118/0x178
[   21.444597]  krealloc_noprof+0x10c/0x1a0
[   21.448503]  krealloc_more_oob_helper+0x170/0x690
[   21.453191]  krealloc_more_oob+0x20/0x38
[   21.457097]  kunit_try_run_case+0x14c/0x3d0
[   21.461264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.466733]  kthread+0x24c/0x2d0
[   21.469946]  ret_from_fork+0x10/0x20
[   21.473503] 
[   21.474979] The buggy address belongs to the object at ffff00080341c800
[   21.474979]  which belongs to the cache kmalloc-256 of size 256
[   21.487480] The buggy address is located 5 bytes to the right of
[   21.487480]  allocated 235-byte region [ffff00080341c800, ffff00080341c8eb)
[   21.500413] 
[   21.501890] The buggy address belongs to the physical page:
[   21.507446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   21.515430] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.523071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.530012] page_type: f5(slab)
[   21.533144] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.540869] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.548596] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.556407] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.564220] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   21.572032] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.579839] page dumped because: kasan: bad access detected
[   21.585394] 
[   21.586869] Memory state around the buggy address:
[   21.591650]  ffff00080341c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598852]  ffff00080341c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.606058] >ffff00080341c880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.613258]                                                              ^
[   21.620119]  ffff00080341c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.627324]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.634525] ==================================================================

test log snippet test parser 81

Home

[   21.020082] ==================================================================
[   21.029244] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   21.036795] Write of size 1 at addr ffff00080341c8eb by task kunit_try_catch/193
[   21.044171] 
[   21.045654] CPU: 7 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   21.054767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.058927] Hardware name: WinLink E850-96 board (DT)
[   21.063965] Call trace:
[   21.066393]  dump_backtrace+0x9c/0x128
[   21.070123]  show_stack+0x20/0x38
[   21.073422]  dump_stack_lvl+0x8c/0xd0
[   21.077068]  print_report+0x118/0x5e0
[   21.080714]  kasan_report+0xc8/0x118
[   21.084273]  __asan_report_store1_noabort+0x20/0x30
[   21.089134]  krealloc_more_oob_helper+0x628/0x690
[   21.093821]  krealloc_more_oob+0x20/0x38
[   21.097727]  kunit_try_run_case+0x14c/0x3d0
[   21.101895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.107362]  kthread+0x24c/0x2d0
[   21.110575]  ret_from_fork+0x10/0x20
[   21.114136] 
[   21.115610] Allocated by task 193:
[   21.118998]  kasan_save_stack+0x3c/0x68
[   21.122815]  kasan_save_track+0x20/0x40
[   21.126634]  kasan_save_alloc_info+0x40/0x58
[   21.130887]  __kasan_krealloc+0x118/0x178
[   21.134880]  krealloc_noprof+0x10c/0x1a0
[   21.138786]  krealloc_more_oob_helper+0x170/0x690
[   21.143473]  krealloc_more_oob+0x20/0x38
[   21.147380]  kunit_try_run_case+0x14c/0x3d0
[   21.151546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.157015]  kthread+0x24c/0x2d0
[   21.160228]  ret_from_fork+0x10/0x20
[   21.163785] 
[   21.165263] The buggy address belongs to the object at ffff00080341c800
[   21.165263]  which belongs to the cache kmalloc-256 of size 256
[   21.177764] The buggy address is located 0 bytes to the right of
[   21.177764]  allocated 235-byte region [ffff00080341c800, ffff00080341c8eb)
[   21.190695] 
[   21.192173] The buggy address belongs to the physical page:
[   21.197731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88341c
[   21.205714] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.213352] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.220296] page_type: f5(slab)
[   21.223433] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.231152] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.238878] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.246689] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.254502] head: 0bfffe0000000002 fffffdffe00d0701 ffffffffffffffff 0000000000000000
[   21.262314] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.270120] page dumped because: kasan: bad access detected
[   21.275676] 
[   21.277152] Memory state around the buggy address:
[   21.281932]  ffff00080341c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.289136]  ffff00080341c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.296341] >ffff00080341c880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.303540]                                                           ^
[   21.310141]  ffff00080341c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.317345]  ffff00080341c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.324547] ==================================================================

test log snippet test parser 82

Home

[   23.193596] ==================================================================
[   23.203082] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   23.210631] Write of size 1 at addr ffff00080424e0eb by task kunit_try_catch/197
[   23.218010] 
[   23.219493] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   23.228605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.232766] Hardware name: WinLink E850-96 board (DT)
[   23.237805] Call trace:
[   23.240233]  dump_backtrace+0x9c/0x128
[   23.243963]  show_stack+0x20/0x38
[   23.247261]  dump_stack_lvl+0x8c/0xd0
[   23.250907]  print_report+0x118/0x5e0
[   23.254553]  kasan_report+0xc8/0x118
[   23.258112]  __asan_report_store1_noabort+0x20/0x30
[   23.262973]  krealloc_more_oob_helper+0x628/0x690
[   23.267660]  krealloc_large_more_oob+0x20/0x38
[   23.272087]  kunit_try_run_case+0x14c/0x3d0
[   23.276254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.281722]  kthread+0x24c/0x2d0
[   23.284934]  ret_from_fork+0x10/0x20
[   23.288497] 
[   23.289972] The buggy address belongs to the physical page:
[   23.295530] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88424c
[   23.303512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.311153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.318104] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.325825] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.333551] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.341362] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.349176] head: 0bfffe0000000002 fffffdffe0109301 ffffffffffffffff 0000000000000000
[   23.356987] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.364794] page dumped because: kasan: bad access detected
[   23.370349] 
[   23.371825] Memory state around the buggy address:
[   23.376607]  ffff00080424df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.383808]  ffff00080424e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.391014] >ffff00080424e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.398214]                                                           ^
[   23.404814]  ffff00080424e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.412019]  ffff00080424e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.419220] ==================================================================

test log snippet test parser 83

Home

[   30.294748] ==================================================================
[   30.301845] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720
[   30.309223] Read of size 1 at addr ffff000801fac67f by task kunit_try_catch/231
[   30.316514] 
[   30.317993] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.327109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.331269] Hardware name: WinLink E850-96 board (DT)
[   30.336307] Call trace:
[   30.338735]  dump_backtrace+0x9c/0x128
[   30.342467]  show_stack+0x20/0x38
[   30.345766]  dump_stack_lvl+0x8c/0xd0
[   30.349412]  print_report+0x118/0x5e0
[   30.353057]  kasan_report+0xc8/0x118
[   30.356616]  __asan_report_load1_noabort+0x20/0x30
[   30.361390]  ksize_unpoisons_memory+0x690/0x720
[   30.365904]  kunit_try_run_case+0x14c/0x3d0
[   30.370071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.375541]  kthread+0x24c/0x2d0
[   30.378751]  ret_from_fork+0x10/0x20
[   30.382313] 
[   30.383786] Allocated by task 231:
[   30.387173]  kasan_save_stack+0x3c/0x68
[   30.390991]  kasan_save_track+0x20/0x40
[   30.394810]  kasan_save_alloc_info+0x40/0x58
[   30.399063]  __kasan_kmalloc+0xd4/0xd8
[   30.402796]  __kmalloc_cache_noprof+0x144/0x328
[   30.407310]  ksize_unpoisons_memory+0xc0/0x720
[   30.411737]  kunit_try_run_case+0x14c/0x3d0
[   30.415904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.421374]  kthread+0x24c/0x2d0
[   30.424584]  ret_from_fork+0x10/0x20
[   30.428143] 
[   30.429618] The buggy address belongs to the object at ffff000801fac600
[   30.429618]  which belongs to the cache kmalloc-128 of size 128
[   30.442121] The buggy address is located 12 bytes to the right of
[   30.442121]  allocated 115-byte region [ffff000801fac600, ffff000801fac673)
[   30.455139] 
[   30.456618] The buggy address belongs to the physical page:
[   30.462173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   30.470157] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.477797] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.484739] page_type: f5(slab)
[   30.487874] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.495596] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.503322] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.511133] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.518947] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   30.526758] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.534565] page dumped because: kasan: bad access detected
[   30.540120] 
[   30.541596] Memory state around the buggy address:
[   30.546375]  ffff000801fac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.553578]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.560785] >ffff000801fac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.567985]                                                                 ^
[   30.575106]  ffff000801fac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.582311]  ffff000801fac700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.589512] ==================================================================
[   29.688283] ==================================================================
[   29.698124] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720
[   29.705499] Read of size 1 at addr ffff000801fac673 by task kunit_try_catch/231
[   29.712791] 
[   29.714275] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.723388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.727547] Hardware name: WinLink E850-96 board (DT)
[   29.732585] Call trace:
[   29.735013]  dump_backtrace+0x9c/0x128
[   29.738744]  show_stack+0x20/0x38
[   29.742042]  dump_stack_lvl+0x8c/0xd0
[   29.745688]  print_report+0x118/0x5e0
[   29.749334]  kasan_report+0xc8/0x118
[   29.752893]  __asan_report_load1_noabort+0x20/0x30
[   29.757667]  ksize_unpoisons_memory+0x630/0x720
[   29.762181]  kunit_try_run_case+0x14c/0x3d0
[   29.766347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.771816]  kthread+0x24c/0x2d0
[   29.775028]  ret_from_fork+0x10/0x20
[   29.778590] 
[   29.780064] Allocated by task 231:
[   29.783451]  kasan_save_stack+0x3c/0x68
[   29.787267]  kasan_save_track+0x20/0x40
[   29.791087]  kasan_save_alloc_info+0x40/0x58
[   29.795342]  __kasan_kmalloc+0xd4/0xd8
[   29.799072]  __kmalloc_cache_noprof+0x144/0x328
[   29.803586]  ksize_unpoisons_memory+0xc0/0x720
[   29.808013]  kunit_try_run_case+0x14c/0x3d0
[   29.812180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.817650]  kthread+0x24c/0x2d0
[   29.820860]  ret_from_fork+0x10/0x20
[   29.824419] 
[   29.825898] The buggy address belongs to the object at ffff000801fac600
[   29.825898]  which belongs to the cache kmalloc-128 of size 128
[   29.838400] The buggy address is located 0 bytes to the right of
[   29.838400]  allocated 115-byte region [ffff000801fac600, ffff000801fac673)
[   29.851329] 
[   29.852807] The buggy address belongs to the physical page:
[   29.858365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   29.866348] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.873987] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.880929] page_type: f5(slab)
[   29.884069] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.891785] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.899512] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.907323] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.915136] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   29.922948] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.930754] page dumped because: kasan: bad access detected
[   29.936310] 
[   29.937786] Memory state around the buggy address:
[   29.942568]  ffff000801fac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.949768]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.956974] >ffff000801fac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.964174]                                                              ^
[   29.971035]  ffff000801fac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.978240]  ffff000801fac700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985441] ==================================================================
[   29.993004] ==================================================================
[   29.999855] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720
[   30.007230] Read of size 1 at addr ffff000801fac678 by task kunit_try_catch/231
[   30.014521] 
[   30.016003] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.025119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.029279] Hardware name: WinLink E850-96 board (DT)
[   30.034316] Call trace:
[   30.036743]  dump_backtrace+0x9c/0x128
[   30.040475]  show_stack+0x20/0x38
[   30.043774]  dump_stack_lvl+0x8c/0xd0
[   30.047419]  print_report+0x118/0x5e0
[   30.051065]  kasan_report+0xc8/0x118
[   30.054624]  __asan_report_load1_noabort+0x20/0x30
[   30.059399]  ksize_unpoisons_memory+0x628/0x720
[   30.063912]  kunit_try_run_case+0x14c/0x3d0
[   30.068079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.073548]  kthread+0x24c/0x2d0
[   30.076760]  ret_from_fork+0x10/0x20
[   30.080321] 
[   30.081794] Allocated by task 231:
[   30.085181]  kasan_save_stack+0x3c/0x68
[   30.088999]  kasan_save_track+0x20/0x40
[   30.092818]  kasan_save_alloc_info+0x40/0x58
[   30.097072]  __kasan_kmalloc+0xd4/0xd8
[   30.100804]  __kmalloc_cache_noprof+0x144/0x328
[   30.105318]  ksize_unpoisons_memory+0xc0/0x720
[   30.109745]  kunit_try_run_case+0x14c/0x3d0
[   30.113912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.119380]  kthread+0x24c/0x2d0
[   30.122592]  ret_from_fork+0x10/0x20
[   30.126151] 
[   30.127628] The buggy address belongs to the object at ffff000801fac600
[   30.127628]  which belongs to the cache kmalloc-128 of size 128
[   30.140128] The buggy address is located 5 bytes to the right of
[   30.140128]  allocated 115-byte region [ffff000801fac600, ffff000801fac673)
[   30.153060] 
[   30.154538] The buggy address belongs to the physical page:
[   30.160095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   30.168078] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.175718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.182661] page_type: f5(slab)
[   30.185796] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.193517] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.201243] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.209055] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.216867] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   30.224680] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.232486] page dumped because: kasan: bad access detected
[   30.238041] 
[   30.239517] Memory state around the buggy address:
[   30.244298]  ffff000801fac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.251500]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258706] >ffff000801fac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.265906]                                                                 ^
[   30.273027]  ffff000801fac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.280232]  ffff000801fac700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287433] ==================================================================

test log snippet test parser 84

Home

[   30.294748] ==================================================================
[   30.301845] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720
[   30.309223] Read of size 1 at addr ffff000801fac67f by task kunit_try_catch/231
[   30.316514] 
[   30.317993] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.327109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.331269] Hardware name: WinLink E850-96 board (DT)
[   30.336307] Call trace:
[   30.338735]  dump_backtrace+0x9c/0x128
[   30.342467]  show_stack+0x20/0x38
[   30.345766]  dump_stack_lvl+0x8c/0xd0
[   30.349412]  print_report+0x118/0x5e0
[   30.353057]  kasan_report+0xc8/0x118
[   30.356616]  __asan_report_load1_noabort+0x20/0x30
[   30.361390]  ksize_unpoisons_memory+0x690/0x720
[   30.365904]  kunit_try_run_case+0x14c/0x3d0
[   30.370071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.375541]  kthread+0x24c/0x2d0
[   30.378751]  ret_from_fork+0x10/0x20
[   30.382313] 
[   30.383786] Allocated by task 231:
[   30.387173]  kasan_save_stack+0x3c/0x68
[   30.390991]  kasan_save_track+0x20/0x40
[   30.394810]  kasan_save_alloc_info+0x40/0x58
[   30.399063]  __kasan_kmalloc+0xd4/0xd8
[   30.402796]  __kmalloc_cache_noprof+0x144/0x328
[   30.407310]  ksize_unpoisons_memory+0xc0/0x720
[   30.411737]  kunit_try_run_case+0x14c/0x3d0
[   30.415904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.421374]  kthread+0x24c/0x2d0
[   30.424584]  ret_from_fork+0x10/0x20
[   30.428143] 
[   30.429618] The buggy address belongs to the object at ffff000801fac600
[   30.429618]  which belongs to the cache kmalloc-128 of size 128
[   30.442121] The buggy address is located 12 bytes to the right of
[   30.442121]  allocated 115-byte region [ffff000801fac600, ffff000801fac673)
[   30.455139] 
[   30.456618] The buggy address belongs to the physical page:
[   30.462173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   30.470157] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.477797] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.484739] page_type: f5(slab)
[   30.487874] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.495596] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.503322] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.511133] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.518947] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   30.526758] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.534565] page dumped because: kasan: bad access detected
[   30.540120] 
[   30.541596] Memory state around the buggy address:
[   30.546375]  ffff000801fac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.553578]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.560785] >ffff000801fac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.567985]                                                                 ^
[   30.575106]  ffff000801fac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.582311]  ffff000801fac700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.589512] ==================================================================

test log snippet test parser 85

Home

[   29.688283] ==================================================================
[   29.698124] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720
[   29.705499] Read of size 1 at addr ffff000801fac673 by task kunit_try_catch/231
[   29.712791] 
[   29.714275] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.723388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.727547] Hardware name: WinLink E850-96 board (DT)
[   29.732585] Call trace:
[   29.735013]  dump_backtrace+0x9c/0x128
[   29.738744]  show_stack+0x20/0x38
[   29.742042]  dump_stack_lvl+0x8c/0xd0
[   29.745688]  print_report+0x118/0x5e0
[   29.749334]  kasan_report+0xc8/0x118
[   29.752893]  __asan_report_load1_noabort+0x20/0x30
[   29.757667]  ksize_unpoisons_memory+0x630/0x720
[   29.762181]  kunit_try_run_case+0x14c/0x3d0
[   29.766347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.771816]  kthread+0x24c/0x2d0
[   29.775028]  ret_from_fork+0x10/0x20
[   29.778590] 
[   29.780064] Allocated by task 231:
[   29.783451]  kasan_save_stack+0x3c/0x68
[   29.787267]  kasan_save_track+0x20/0x40
[   29.791087]  kasan_save_alloc_info+0x40/0x58
[   29.795342]  __kasan_kmalloc+0xd4/0xd8
[   29.799072]  __kmalloc_cache_noprof+0x144/0x328
[   29.803586]  ksize_unpoisons_memory+0xc0/0x720
[   29.808013]  kunit_try_run_case+0x14c/0x3d0
[   29.812180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.817650]  kthread+0x24c/0x2d0
[   29.820860]  ret_from_fork+0x10/0x20
[   29.824419] 
[   29.825898] The buggy address belongs to the object at ffff000801fac600
[   29.825898]  which belongs to the cache kmalloc-128 of size 128
[   29.838400] The buggy address is located 0 bytes to the right of
[   29.838400]  allocated 115-byte region [ffff000801fac600, ffff000801fac673)
[   29.851329] 
[   29.852807] The buggy address belongs to the physical page:
[   29.858365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   29.866348] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.873987] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.880929] page_type: f5(slab)
[   29.884069] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.891785] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.899512] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.907323] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.915136] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   29.922948] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.930754] page dumped because: kasan: bad access detected
[   29.936310] 
[   29.937786] Memory state around the buggy address:
[   29.942568]  ffff000801fac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.949768]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.956974] >ffff000801fac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.964174]                                                              ^
[   29.971035]  ffff000801fac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.978240]  ffff000801fac700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985441] ==================================================================

test log snippet test parser 86

Home

[   29.993004] ==================================================================
[   29.999855] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720
[   30.007230] Read of size 1 at addr ffff000801fac678 by task kunit_try_catch/231
[   30.014521] 
[   30.016003] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.025119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.029279] Hardware name: WinLink E850-96 board (DT)
[   30.034316] Call trace:
[   30.036743]  dump_backtrace+0x9c/0x128
[   30.040475]  show_stack+0x20/0x38
[   30.043774]  dump_stack_lvl+0x8c/0xd0
[   30.047419]  print_report+0x118/0x5e0
[   30.051065]  kasan_report+0xc8/0x118
[   30.054624]  __asan_report_load1_noabort+0x20/0x30
[   30.059399]  ksize_unpoisons_memory+0x628/0x720
[   30.063912]  kunit_try_run_case+0x14c/0x3d0
[   30.068079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.073548]  kthread+0x24c/0x2d0
[   30.076760]  ret_from_fork+0x10/0x20
[   30.080321] 
[   30.081794] Allocated by task 231:
[   30.085181]  kasan_save_stack+0x3c/0x68
[   30.088999]  kasan_save_track+0x20/0x40
[   30.092818]  kasan_save_alloc_info+0x40/0x58
[   30.097072]  __kasan_kmalloc+0xd4/0xd8
[   30.100804]  __kmalloc_cache_noprof+0x144/0x328
[   30.105318]  ksize_unpoisons_memory+0xc0/0x720
[   30.109745]  kunit_try_run_case+0x14c/0x3d0
[   30.113912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.119380]  kthread+0x24c/0x2d0
[   30.122592]  ret_from_fork+0x10/0x20
[   30.126151] 
[   30.127628] The buggy address belongs to the object at ffff000801fac600
[   30.127628]  which belongs to the cache kmalloc-128 of size 128
[   30.140128] The buggy address is located 5 bytes to the right of
[   30.140128]  allocated 115-byte region [ffff000801fac600, ffff000801fac673)
[   30.153060] 
[   30.154538] The buggy address belongs to the physical page:
[   30.160095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   30.168078] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.175718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.182661] page_type: f5(slab)
[   30.185796] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.193517] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.201243] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.209055] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.216867] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   30.224680] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.232486] page dumped because: kasan: bad access detected
[   30.238041] 
[   30.239517] Memory state around the buggy address:
[   30.244298]  ffff000801fac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.251500]  ffff000801fac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258706] >ffff000801fac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.265906]                                                                 ^
[   30.273027]  ffff000801fac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.280232]  ffff000801fac700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287433] ==================================================================

test log snippet test parser 87

Home

[   38.932374] ==================================================================
[   38.942255] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   38.948071] Read of size 1 at addr ffff0008053bb198 by task kunit_try_catch/292
[   38.955360] 
[   38.956843] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.965959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.970117] Hardware name: WinLink E850-96 board (DT)
[   38.975155] Call trace:
[   38.977582]  dump_backtrace+0x9c/0x128
[   38.981314]  show_stack+0x20/0x38
[   38.984612]  dump_stack_lvl+0x8c/0xd0
[   38.988258]  print_report+0x118/0x5e0
[   38.991903]  kasan_report+0xc8/0x118
[   38.995462]  __asan_report_load1_noabort+0x20/0x30
[   39.000236]  memchr+0x78/0x88
[   39.003188]  kasan_memchr+0x150/0x2f0
[   39.006834]  kunit_try_run_case+0x14c/0x3d0
[   39.011000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.016469]  kthread+0x24c/0x2d0
[   39.019681]  ret_from_fork+0x10/0x20
[   39.023243] 
[   39.024717] Allocated by task 292:
[   39.028104]  kasan_save_stack+0x3c/0x68
[   39.031920]  kasan_save_track+0x20/0x40
[   39.035740]  kasan_save_alloc_info+0x40/0x58
[   39.039993]  __kasan_kmalloc+0xd4/0xd8
[   39.043726]  __kmalloc_cache_noprof+0x144/0x328
[   39.048239]  kasan_memchr+0xb0/0x2f0
[   39.051799]  kunit_try_run_case+0x14c/0x3d0
[   39.055965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.061434]  kthread+0x24c/0x2d0
[   39.064645]  ret_from_fork+0x10/0x20
[   39.068204] 
[   39.069681] The buggy address belongs to the object at ffff0008053bb180
[   39.069681]  which belongs to the cache kmalloc-32 of size 32
[   39.082008] The buggy address is located 0 bytes to the right of
[   39.082008]  allocated 24-byte region [ffff0008053bb180, ffff0008053bb198)
[   39.094853] 
[   39.096331] The buggy address belongs to the physical page:
[   39.101888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8853bb
[   39.109874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.116382] page_type: f5(slab)
[   39.119519] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.127237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.134957] page dumped because: kasan: bad access detected
[   39.140514] 
[   39.141987] Memory state around the buggy address:
[   39.146770]  ffff0008053bb080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.153971]  ffff0008053bb100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.161176] >ffff0008053bb180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.168376]                             ^
[   39.172374]  ffff0008053bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.179578]  ffff0008053bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.186781] ==================================================================

test log snippet test parser 88

Home

[   38.932374] ==================================================================
[   38.942255] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   38.948071] Read of size 1 at addr ffff0008053bb198 by task kunit_try_catch/292
[   38.955360] 
[   38.956843] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.965959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.970117] Hardware name: WinLink E850-96 board (DT)
[   38.975155] Call trace:
[   38.977582]  dump_backtrace+0x9c/0x128
[   38.981314]  show_stack+0x20/0x38
[   38.984612]  dump_stack_lvl+0x8c/0xd0
[   38.988258]  print_report+0x118/0x5e0
[   38.991903]  kasan_report+0xc8/0x118
[   38.995462]  __asan_report_load1_noabort+0x20/0x30
[   39.000236]  memchr+0x78/0x88
[   39.003188]  kasan_memchr+0x150/0x2f0
[   39.006834]  kunit_try_run_case+0x14c/0x3d0
[   39.011000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.016469]  kthread+0x24c/0x2d0
[   39.019681]  ret_from_fork+0x10/0x20
[   39.023243] 
[   39.024717] Allocated by task 292:
[   39.028104]  kasan_save_stack+0x3c/0x68
[   39.031920]  kasan_save_track+0x20/0x40
[   39.035740]  kasan_save_alloc_info+0x40/0x58
[   39.039993]  __kasan_kmalloc+0xd4/0xd8
[   39.043726]  __kmalloc_cache_noprof+0x144/0x328
[   39.048239]  kasan_memchr+0xb0/0x2f0
[   39.051799]  kunit_try_run_case+0x14c/0x3d0
[   39.055965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.061434]  kthread+0x24c/0x2d0
[   39.064645]  ret_from_fork+0x10/0x20
[   39.068204] 
[   39.069681] The buggy address belongs to the object at ffff0008053bb180
[   39.069681]  which belongs to the cache kmalloc-32 of size 32
[   39.082008] The buggy address is located 0 bytes to the right of
[   39.082008]  allocated 24-byte region [ffff0008053bb180, ffff0008053bb198)
[   39.094853] 
[   39.096331] The buggy address belongs to the physical page:
[   39.101888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8853bb
[   39.109874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.116382] page_type: f5(slab)
[   39.119519] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.127237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.134957] page dumped because: kasan: bad access detected
[   39.140514] 
[   39.141987] Memory state around the buggy address:
[   39.146770]  ffff0008053bb080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.153971]  ffff0008053bb100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.161176] >ffff0008053bb180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.168376]                             ^
[   39.172374]  ffff0008053bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.179578]  ffff0008053bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.186781] ==================================================================

test log snippet test parser 89

Home

[   39.195533] ==================================================================
[   39.204579] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.210568] Read of size 1 at addr ffff0008053bb218 by task kunit_try_catch/294
[   39.217857] 
[   39.219341] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   39.228452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.232612] Hardware name: WinLink E850-96 board (DT)
[   39.237651] Call trace:
[   39.240079]  dump_backtrace+0x9c/0x128
[   39.243809]  show_stack+0x20/0x38
[   39.247108]  dump_stack_lvl+0x8c/0xd0
[   39.250754]  print_report+0x118/0x5e0
[   39.254400]  kasan_report+0xc8/0x118
[   39.257960]  __asan_report_load1_noabort+0x20/0x30
[   39.262733]  memcmp+0x198/0x1d8
[   39.265858]  kasan_memcmp+0x170/0x310
[   39.269504]  kunit_try_run_case+0x14c/0x3d0
[   39.273671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.279139]  kthread+0x24c/0x2d0
[   39.282351]  ret_from_fork+0x10/0x20
[   39.285913] 
[   39.287386] Allocated by task 294:
[   39.290774]  kasan_save_stack+0x3c/0x68
[   39.294590]  kasan_save_track+0x20/0x40
[   39.298409]  kasan_save_alloc_info+0x40/0x58
[   39.302663]  __kasan_kmalloc+0xd4/0xd8
[   39.306395]  __kmalloc_cache_noprof+0x144/0x328
[   39.310909]  kasan_memcmp+0xbc/0x310
[   39.314468]  kunit_try_run_case+0x14c/0x3d0
[   39.318635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.324103]  kthread+0x24c/0x2d0
[   39.327315]  ret_from_fork+0x10/0x20
[   39.330874] 
[   39.332352] The buggy address belongs to the object at ffff0008053bb200
[   39.332352]  which belongs to the cache kmalloc-32 of size 32
[   39.344680] The buggy address is located 0 bytes to the right of
[   39.344680]  allocated 24-byte region [ffff0008053bb200, ffff0008053bb218)
[   39.357523] 
[   39.359001] The buggy address belongs to the physical page:
[   39.364558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8853bb
[   39.372544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.379053] page_type: f5(slab)
[   39.382188] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.389910] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.397628] page dumped because: kasan: bad access detected
[   39.403183] 
[   39.404657] Memory state around the buggy address:
[   39.409439]  ffff0008053bb100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.416641]  ffff0008053bb180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.423845] >ffff0008053bb200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.431046]                             ^
[   39.435043]  ffff0008053bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.442247]  ffff0008053bb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.449450] ==================================================================

test log snippet test parser 90

Home

[   39.195533] ==================================================================
[   39.204579] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.210568] Read of size 1 at addr ffff0008053bb218 by task kunit_try_catch/294
[   39.217857] 
[   39.219341] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   39.228452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.232612] Hardware name: WinLink E850-96 board (DT)
[   39.237651] Call trace:
[   39.240079]  dump_backtrace+0x9c/0x128
[   39.243809]  show_stack+0x20/0x38
[   39.247108]  dump_stack_lvl+0x8c/0xd0
[   39.250754]  print_report+0x118/0x5e0
[   39.254400]  kasan_report+0xc8/0x118
[   39.257960]  __asan_report_load1_noabort+0x20/0x30
[   39.262733]  memcmp+0x198/0x1d8
[   39.265858]  kasan_memcmp+0x170/0x310
[   39.269504]  kunit_try_run_case+0x14c/0x3d0
[   39.273671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.279139]  kthread+0x24c/0x2d0
[   39.282351]  ret_from_fork+0x10/0x20
[   39.285913] 
[   39.287386] Allocated by task 294:
[   39.290774]  kasan_save_stack+0x3c/0x68
[   39.294590]  kasan_save_track+0x20/0x40
[   39.298409]  kasan_save_alloc_info+0x40/0x58
[   39.302663]  __kasan_kmalloc+0xd4/0xd8
[   39.306395]  __kmalloc_cache_noprof+0x144/0x328
[   39.310909]  kasan_memcmp+0xbc/0x310
[   39.314468]  kunit_try_run_case+0x14c/0x3d0
[   39.318635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.324103]  kthread+0x24c/0x2d0
[   39.327315]  ret_from_fork+0x10/0x20
[   39.330874] 
[   39.332352] The buggy address belongs to the object at ffff0008053bb200
[   39.332352]  which belongs to the cache kmalloc-32 of size 32
[   39.344680] The buggy address is located 0 bytes to the right of
[   39.344680]  allocated 24-byte region [ffff0008053bb200, ffff0008053bb218)
[   39.357523] 
[   39.359001] The buggy address belongs to the physical page:
[   39.364558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8853bb
[   39.372544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.379053] page_type: f5(slab)
[   39.382188] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.389910] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.397628] page dumped because: kasan: bad access detected
[   39.403183] 
[   39.404657] Memory state around the buggy address:
[   39.409439]  ffff0008053bb100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.416641]  ffff0008053bb180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.423845] >ffff0008053bb200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.431046]                             ^
[   39.435043]  ffff0008053bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.442247]  ffff0008053bb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.449450] ==================================================================

test log snippet test parser 91

Home

[   35.035579] ==================================================================
[   35.045615] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   35.053162] Read of size 1 at addr ffff0008033f2001 by task kunit_try_catch/260
[   35.060453] 
[   35.061936] CPU: 6 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.071051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.075211] Hardware name: WinLink E850-96 board (DT)
[   35.080248] Call trace:
[   35.082677]  dump_backtrace+0x9c/0x128
[   35.086407]  show_stack+0x20/0x38
[   35.089705]  dump_stack_lvl+0x8c/0xd0
[   35.093351]  print_report+0x118/0x5e0
[   35.096996]  kasan_report+0xc8/0x118
[   35.100556]  __asan_report_load1_noabort+0x20/0x30
[   35.105330]  mempool_oob_right_helper+0x2b8/0x2f8
[   35.110016]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   35.115225]  kunit_try_run_case+0x14c/0x3d0
[   35.119392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.124860]  kthread+0x24c/0x2d0
[   35.128073]  ret_from_fork+0x10/0x20
[   35.131634] 
[   35.133109] The buggy address belongs to the physical page:
[   35.138667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833f0
[   35.146651] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.154290] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.161243] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.168963] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.176689] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.184501] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.192314] head: 0bfffe0000000002 fffffdffe00cfc01 ffffffffffffffff 0000000000000000
[   35.200125] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.207932] page dumped because: kasan: bad access detected
[   35.213488] 
[   35.214963] Memory state around the buggy address:
[   35.219744]  ffff0008033f1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.226945]  ffff0008033f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.234152] >ffff0008033f2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.241352]                    ^
[   35.244567]  ffff0008033f2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.251771]  ffff0008033f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.258973] ==================================================================
[   35.268329] ==================================================================
[   35.278425] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   35.285973] Read of size 1 at addr ffff00080539c2bb by task kunit_try_catch/262
[   35.293263] 
[   35.294746] CPU: 5 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.303857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.308019] Hardware name: WinLink E850-96 board (DT)
[   35.313057] Call trace:
[   35.315484]  dump_backtrace+0x9c/0x128
[   35.319216]  show_stack+0x20/0x38
[   35.322514]  dump_stack_lvl+0x8c/0xd0
[   35.326160]  print_report+0x118/0x5e0
[   35.329805]  kasan_report+0xc8/0x118
[   35.333365]  __asan_report_load1_noabort+0x20/0x30
[   35.338139]  mempool_oob_right_helper+0x2b8/0x2f8
[   35.342828]  mempool_slab_oob_right+0xb8/0x110
[   35.347253]  kunit_try_run_case+0x14c/0x3d0
[   35.351420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.356889]  kthread+0x24c/0x2d0
[   35.360100]  ret_from_fork+0x10/0x20
[   35.363665] 
[   35.365136] Allocated by task 262:
[   35.368524]  kasan_save_stack+0x3c/0x68
[   35.372340]  kasan_save_track+0x20/0x40
[   35.376159]  kasan_save_alloc_info+0x40/0x58
[   35.380412]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.385620]  remove_element+0x16c/0x1f8
[   35.389442]  mempool_alloc_preallocated+0x58/0xc0
[   35.394129]  mempool_oob_right_helper+0x98/0x2f8
[   35.398728]  mempool_slab_oob_right+0xb8/0x110
[   35.403155]  kunit_try_run_case+0x14c/0x3d0
[   35.407322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.412790]  kthread+0x24c/0x2d0
[   35.416002]  ret_from_fork+0x10/0x20
[   35.419561] 
[   35.421039] The buggy address belongs to the object at ffff00080539c240
[   35.421039]  which belongs to the cache test_cache of size 123
[   35.433452] The buggy address is located 0 bytes to the right of
[   35.433452]  allocated 123-byte region [ffff00080539c240, ffff00080539c2bb)
[   35.446384] 
[   35.447861] The buggy address belongs to the physical page:
[   35.453419] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88539c
[   35.461403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.467911] page_type: f5(slab)
[   35.471051] raw: 0bfffe0000000000 ffff000801fb4140 dead000000000122 0000000000000000
[   35.478769] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   35.486487] page dumped because: kasan: bad access detected
[   35.492044] 
[   35.493518] Memory state around the buggy address:
[   35.498299]  ffff00080539c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.505501]  ffff00080539c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   35.512707] >ffff00080539c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   35.519907]                                         ^
[   35.524945]  ffff00080539c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.532150]  ffff00080539c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.539351] ==================================================================
[   34.732013] ==================================================================
[   34.732196] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   34.732328] Read of size 1 at addr ffff000801bfc673 by task kunit_try_catch/258
[   34.738757] 
[   34.740241] CPU: 4 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.749354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.753513] Hardware name: WinLink E850-96 board (DT)
[   34.758551] Call trace:
[   34.760981]  dump_backtrace+0x9c/0x128
[   34.764710]  show_stack+0x20/0x38
[   34.768009]  dump_stack_lvl+0x8c/0xd0
[   34.771654]  print_report+0x118/0x5e0
[   34.775300]  kasan_report+0xc8/0x118
[   34.778861]  __asan_report_load1_noabort+0x20/0x30
[   34.783633]  mempool_oob_right_helper+0x2b8/0x2f8
[   34.788321]  mempool_kmalloc_oob_right+0xbc/0x118
[   34.793008]  kunit_try_run_case+0x14c/0x3d0
[   34.797175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.802643]  kthread+0x24c/0x2d0
[   34.805855]  ret_from_fork+0x10/0x20
[   34.809417] 
[   34.810891] Allocated by task 258:
[   34.814277]  kasan_save_stack+0x3c/0x68
[   34.818095]  kasan_save_track+0x20/0x40
[   34.821914]  kasan_save_alloc_info+0x40/0x58
[   34.826167]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.831464]  remove_element+0x130/0x1f8
[   34.835282]  mempool_alloc_preallocated+0x58/0xc0
[   34.839969]  mempool_oob_right_helper+0x98/0x2f8
[   34.844570]  mempool_kmalloc_oob_right+0xbc/0x118
[   34.849257]  kunit_try_run_case+0x14c/0x3d0
[   34.853424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.858892]  kthread+0x24c/0x2d0
[   34.862104]  ret_from_fork+0x10/0x20
[   34.865663] 
[   34.867141] The buggy address belongs to the object at ffff000801bfc600
[   34.867141]  which belongs to the cache kmalloc-128 of size 128
[   34.879641] The buggy address is located 0 bytes to the right of
[   34.879641]  allocated 115-byte region [ffff000801bfc600, ffff000801bfc673)
[   34.892572] 
[   34.894051] The buggy address belongs to the physical page:
[   34.899609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bfc
[   34.907592] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.915232] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.922174] page_type: f5(slab)
[   34.925312] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.933029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.940755] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.948567] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.956380] head: 0bfffe0000000001 fffffdffe006ff01 ffffffffffffffff 0000000000000000
[   34.964191] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   34.971998] page dumped because: kasan: bad access detected
[   34.977554] 
[   34.979029] Memory state around the buggy address:
[   34.983810]  ffff000801bfc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.991012]  ffff000801bfc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.998218] >ffff000801bfc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.005418]                                                              ^
[   35.012279]  ffff000801bfc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.019484]  ffff000801bfc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.026687] ==================================================================

test log snippet test parser 92

Home

[   34.732013] ==================================================================
[   34.732196] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   34.732328] Read of size 1 at addr ffff000801bfc673 by task kunit_try_catch/258
[   34.738757] 
[   34.740241] CPU: 4 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   34.749354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.753513] Hardware name: WinLink E850-96 board (DT)
[   34.758551] Call trace:
[   34.760981]  dump_backtrace+0x9c/0x128
[   34.764710]  show_stack+0x20/0x38
[   34.768009]  dump_stack_lvl+0x8c/0xd0
[   34.771654]  print_report+0x118/0x5e0
[   34.775300]  kasan_report+0xc8/0x118
[   34.778861]  __asan_report_load1_noabort+0x20/0x30
[   34.783633]  mempool_oob_right_helper+0x2b8/0x2f8
[   34.788321]  mempool_kmalloc_oob_right+0xbc/0x118
[   34.793008]  kunit_try_run_case+0x14c/0x3d0
[   34.797175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.802643]  kthread+0x24c/0x2d0
[   34.805855]  ret_from_fork+0x10/0x20
[   34.809417] 
[   34.810891] Allocated by task 258:
[   34.814277]  kasan_save_stack+0x3c/0x68
[   34.818095]  kasan_save_track+0x20/0x40
[   34.821914]  kasan_save_alloc_info+0x40/0x58
[   34.826167]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.831464]  remove_element+0x130/0x1f8
[   34.835282]  mempool_alloc_preallocated+0x58/0xc0
[   34.839969]  mempool_oob_right_helper+0x98/0x2f8
[   34.844570]  mempool_kmalloc_oob_right+0xbc/0x118
[   34.849257]  kunit_try_run_case+0x14c/0x3d0
[   34.853424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.858892]  kthread+0x24c/0x2d0
[   34.862104]  ret_from_fork+0x10/0x20
[   34.865663] 
[   34.867141] The buggy address belongs to the object at ffff000801bfc600
[   34.867141]  which belongs to the cache kmalloc-128 of size 128
[   34.879641] The buggy address is located 0 bytes to the right of
[   34.879641]  allocated 115-byte region [ffff000801bfc600, ffff000801bfc673)
[   34.892572] 
[   34.894051] The buggy address belongs to the physical page:
[   34.899609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bfc
[   34.907592] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.915232] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.922174] page_type: f5(slab)
[   34.925312] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.933029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.940755] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.948567] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.956380] head: 0bfffe0000000001 fffffdffe006ff01 ffffffffffffffff 0000000000000000
[   34.964191] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   34.971998] page dumped because: kasan: bad access detected
[   34.977554] 
[   34.979029] Memory state around the buggy address:
[   34.983810]  ffff000801bfc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.991012]  ffff000801bfc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.998218] >ffff000801bfc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.005418]                                                              ^
[   35.012279]  ffff000801bfc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.019484]  ffff000801bfc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.026687] ==================================================================

test log snippet test parser 93

Home

[   35.268329] ==================================================================
[   35.278425] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   35.285973] Read of size 1 at addr ffff00080539c2bb by task kunit_try_catch/262
[   35.293263] 
[   35.294746] CPU: 5 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.303857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.308019] Hardware name: WinLink E850-96 board (DT)
[   35.313057] Call trace:
[   35.315484]  dump_backtrace+0x9c/0x128
[   35.319216]  show_stack+0x20/0x38
[   35.322514]  dump_stack_lvl+0x8c/0xd0
[   35.326160]  print_report+0x118/0x5e0
[   35.329805]  kasan_report+0xc8/0x118
[   35.333365]  __asan_report_load1_noabort+0x20/0x30
[   35.338139]  mempool_oob_right_helper+0x2b8/0x2f8
[   35.342828]  mempool_slab_oob_right+0xb8/0x110
[   35.347253]  kunit_try_run_case+0x14c/0x3d0
[   35.351420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.356889]  kthread+0x24c/0x2d0
[   35.360100]  ret_from_fork+0x10/0x20
[   35.363665] 
[   35.365136] Allocated by task 262:
[   35.368524]  kasan_save_stack+0x3c/0x68
[   35.372340]  kasan_save_track+0x20/0x40
[   35.376159]  kasan_save_alloc_info+0x40/0x58
[   35.380412]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.385620]  remove_element+0x16c/0x1f8
[   35.389442]  mempool_alloc_preallocated+0x58/0xc0
[   35.394129]  mempool_oob_right_helper+0x98/0x2f8
[   35.398728]  mempool_slab_oob_right+0xb8/0x110
[   35.403155]  kunit_try_run_case+0x14c/0x3d0
[   35.407322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.412790]  kthread+0x24c/0x2d0
[   35.416002]  ret_from_fork+0x10/0x20
[   35.419561] 
[   35.421039] The buggy address belongs to the object at ffff00080539c240
[   35.421039]  which belongs to the cache test_cache of size 123
[   35.433452] The buggy address is located 0 bytes to the right of
[   35.433452]  allocated 123-byte region [ffff00080539c240, ffff00080539c2bb)
[   35.446384] 
[   35.447861] The buggy address belongs to the physical page:
[   35.453419] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88539c
[   35.461403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.467911] page_type: f5(slab)
[   35.471051] raw: 0bfffe0000000000 ffff000801fb4140 dead000000000122 0000000000000000
[   35.478769] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   35.486487] page dumped because: kasan: bad access detected
[   35.492044] 
[   35.493518] Memory state around the buggy address:
[   35.498299]  ffff00080539c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.505501]  ffff00080539c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   35.512707] >ffff00080539c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   35.519907]                                         ^
[   35.524945]  ffff00080539c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.532150]  ffff00080539c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.539351] ==================================================================

test log snippet test parser 94

Home

[   35.035579] ==================================================================
[   35.045615] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   35.053162] Read of size 1 at addr ffff0008033f2001 by task kunit_try_catch/260
[   35.060453] 
[   35.061936] CPU: 6 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.071051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.075211] Hardware name: WinLink E850-96 board (DT)
[   35.080248] Call trace:
[   35.082677]  dump_backtrace+0x9c/0x128
[   35.086407]  show_stack+0x20/0x38
[   35.089705]  dump_stack_lvl+0x8c/0xd0
[   35.093351]  print_report+0x118/0x5e0
[   35.096996]  kasan_report+0xc8/0x118
[   35.100556]  __asan_report_load1_noabort+0x20/0x30
[   35.105330]  mempool_oob_right_helper+0x2b8/0x2f8
[   35.110016]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   35.115225]  kunit_try_run_case+0x14c/0x3d0
[   35.119392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.124860]  kthread+0x24c/0x2d0
[   35.128073]  ret_from_fork+0x10/0x20
[   35.131634] 
[   35.133109] The buggy address belongs to the physical page:
[   35.138667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833f0
[   35.146651] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.154290] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.161243] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.168963] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.176689] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.184501] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.192314] head: 0bfffe0000000002 fffffdffe00cfc01 ffffffffffffffff 0000000000000000
[   35.200125] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.207932] page dumped because: kasan: bad access detected
[   35.213488] 
[   35.214963] Memory state around the buggy address:
[   35.219744]  ffff0008033f1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.226945]  ffff0008033f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.234152] >ffff0008033f2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.241352]                    ^
[   35.244567]  ffff0008033f2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.251771]  ffff0008033f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.258973] ==================================================================

test log snippet test parser 95

Home

[   40.371653] ==================================================================
[   40.378350] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938
[   40.385025] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.392319] 
[   40.393799] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   40.402912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.407076] Hardware name: WinLink E850-96 board (DT)
[   40.412111] Call trace:
[   40.414538]  dump_backtrace+0x9c/0x128
[   40.418271]  show_stack+0x20/0x38
[   40.421570]  dump_stack_lvl+0x8c/0xd0
[   40.425215]  print_report+0x118/0x5e0
[   40.428861]  kasan_report+0xc8/0x118
[   40.432420]  __asan_report_load1_noabort+0x20/0x30
[   40.437196]  kasan_strings+0x894/0x938
[   40.440928]  kunit_try_run_case+0x14c/0x3d0
[   40.445093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.450562]  kthread+0x24c/0x2d0
[   40.453774]  ret_from_fork+0x10/0x20
[   40.457337] 
[   40.458810] Allocated by task 296:
[   40.462194]  kasan_save_stack+0x3c/0x68
[   40.466013]  kasan_save_track+0x20/0x40
[   40.469833]  kasan_save_alloc_info+0x40/0x58
[   40.474085]  __kasan_kmalloc+0xd4/0xd8
[   40.477819]  __kmalloc_cache_noprof+0x144/0x328
[   40.482332]  kasan_strings+0xb0/0x938
[   40.485979]  kunit_try_run_case+0x14c/0x3d0
[   40.490145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.495613]  kthread+0x24c/0x2d0
[   40.498825]  ret_from_fork+0x10/0x20
[   40.502384] 
[   40.503861] Freed by task 296:
[   40.506898]  kasan_save_stack+0x3c/0x68
[   40.510717]  kasan_save_track+0x20/0x40
[   40.514537]  kasan_save_free_info+0x4c/0x78
[   40.518704]  __kasan_slab_free+0x6c/0x98
[   40.522610]  kfree+0x110/0x3b8
[   40.525648]  kasan_strings+0x128/0x938
[   40.529380]  kunit_try_run_case+0x14c/0x3d0
[   40.533547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.539016]  kthread+0x24c/0x2d0
[   40.542227]  ret_from_fork+0x10/0x20
[   40.545787] 
[   40.547262] The buggy address belongs to the object at ffff000800ddfc40
[   40.547262]  which belongs to the cache kmalloc-32 of size 32
[   40.559592] The buggy address is located 16 bytes inside of
[   40.559592]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   40.571654] 
[   40.573133] The buggy address belongs to the physical page:
[   40.578689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   40.586674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.593182] page_type: f5(slab)
[   40.596318] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.604037] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.611757] page dumped because: kasan: bad access detected
[   40.617314] 
[   40.618789] Memory state around the buggy address:
[   40.623568]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.630771]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.637976] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.645177]                                                  ^
[   40.650997]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.658201]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.665403] ==================================================================

test log snippet test parser 96

Home

[   40.371653] ==================================================================
[   40.378350] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938
[   40.385025] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.392319] 
[   40.393799] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   40.402912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.407076] Hardware name: WinLink E850-96 board (DT)
[   40.412111] Call trace:
[   40.414538]  dump_backtrace+0x9c/0x128
[   40.418271]  show_stack+0x20/0x38
[   40.421570]  dump_stack_lvl+0x8c/0xd0
[   40.425215]  print_report+0x118/0x5e0
[   40.428861]  kasan_report+0xc8/0x118
[   40.432420]  __asan_report_load1_noabort+0x20/0x30
[   40.437196]  kasan_strings+0x894/0x938
[   40.440928]  kunit_try_run_case+0x14c/0x3d0
[   40.445093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.450562]  kthread+0x24c/0x2d0
[   40.453774]  ret_from_fork+0x10/0x20
[   40.457337] 
[   40.458810] Allocated by task 296:
[   40.462194]  kasan_save_stack+0x3c/0x68
[   40.466013]  kasan_save_track+0x20/0x40
[   40.469833]  kasan_save_alloc_info+0x40/0x58
[   40.474085]  __kasan_kmalloc+0xd4/0xd8
[   40.477819]  __kmalloc_cache_noprof+0x144/0x328
[   40.482332]  kasan_strings+0xb0/0x938
[   40.485979]  kunit_try_run_case+0x14c/0x3d0
[   40.490145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.495613]  kthread+0x24c/0x2d0
[   40.498825]  ret_from_fork+0x10/0x20
[   40.502384] 
[   40.503861] Freed by task 296:
[   40.506898]  kasan_save_stack+0x3c/0x68
[   40.510717]  kasan_save_track+0x20/0x40
[   40.514537]  kasan_save_free_info+0x4c/0x78
[   40.518704]  __kasan_slab_free+0x6c/0x98
[   40.522610]  kfree+0x110/0x3b8
[   40.525648]  kasan_strings+0x128/0x938
[   40.529380]  kunit_try_run_case+0x14c/0x3d0
[   40.533547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.539016]  kthread+0x24c/0x2d0
[   40.542227]  ret_from_fork+0x10/0x20
[   40.545787] 
[   40.547262] The buggy address belongs to the object at ffff000800ddfc40
[   40.547262]  which belongs to the cache kmalloc-32 of size 32
[   40.559592] The buggy address is located 16 bytes inside of
[   40.559592]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   40.571654] 
[   40.573133] The buggy address belongs to the physical page:
[   40.578689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   40.586674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.593182] page_type: f5(slab)
[   40.596318] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.604037] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.611757] page dumped because: kasan: bad access detected
[   40.617314] 
[   40.618789] Memory state around the buggy address:
[   40.623568]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.630771]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.637976] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.645177]                                                  ^
[   40.650997]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.658201]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.665403] ==================================================================

test log snippet test parser 97

Home

[   29.057786] ==================================================================
[   29.071658] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x174/0x318
[   29.079035] Read of size 1 at addr ffff000801fec300 by task kunit_try_catch/229
[   29.086325] 
[   29.087809] CPU: 4 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.096922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.101081] Hardware name: WinLink E850-96 board (DT)
[   29.106119] Call trace:
[   29.108548]  dump_backtrace+0x9c/0x128
[   29.112278]  show_stack+0x20/0x38
[   29.115576]  dump_stack_lvl+0x8c/0xd0
[   29.119222]  print_report+0x118/0x5e0
[   29.122868]  kasan_report+0xc8/0x118
[   29.126427]  __kasan_check_byte+0x54/0x70
[   29.130419]  kfree_sensitive+0x30/0xb0
[   29.134152]  kmalloc_double_kzfree+0x174/0x318
[   29.138580]  kunit_try_run_case+0x14c/0x3d0
[   29.142745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.148214]  kthread+0x24c/0x2d0
[   29.151426]  ret_from_fork+0x10/0x20
[   29.154989] 
[   29.156462] Allocated by task 229:
[   29.159850]  kasan_save_stack+0x3c/0x68
[   29.163665]  kasan_save_track+0x20/0x40
[   29.167485]  kasan_save_alloc_info+0x40/0x58
[   29.171738]  __kasan_kmalloc+0xd4/0xd8
[   29.175471]  __kmalloc_cache_noprof+0x144/0x328
[   29.179985]  kmalloc_double_kzfree+0xb8/0x318
[   29.184326]  kunit_try_run_case+0x14c/0x3d0
[   29.188491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.193960]  kthread+0x24c/0x2d0
[   29.197172]  ret_from_fork+0x10/0x20
[   29.200731] 
[   29.202208] Freed by task 229:
[   29.205245]  kasan_save_stack+0x3c/0x68
[   29.209064]  kasan_save_track+0x20/0x40
[   29.212883]  kasan_save_free_info+0x4c/0x78
[   29.217050]  __kasan_slab_free+0x6c/0x98
[   29.220956]  kfree+0x110/0x3b8
[   29.223995]  kfree_sensitive+0x80/0xb0
[   29.227727]  kmalloc_double_kzfree+0x120/0x318
[   29.232154]  kunit_try_run_case+0x14c/0x3d0
[   29.236322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.241789]  kthread+0x24c/0x2d0
[   29.245001]  ret_from_fork+0x10/0x20
[   29.248560] 
[   29.250037] The buggy address belongs to the object at ffff000801fec300
[   29.250037]  which belongs to the cache kmalloc-16 of size 16
[   29.262365] The buggy address is located 0 bytes inside of
[   29.262365]  freed 16-byte region [ffff000801fec300, ffff000801fec310)
[   29.274341] 
[   29.275819] The buggy address belongs to the physical page:
[   29.281377] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fec
[   29.289361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.295869] page_type: f5(slab)
[   29.299009] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.306725] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.314444] page dumped because: kasan: bad access detected
[   29.320003] 
[   29.321475] Memory state around the buggy address:
[   29.326256]  ffff000801fec200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.333459]  ffff000801fec280: 00 02 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   29.340665] >ffff000801fec300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.347864]                    ^
[   29.351079]  ffff000801fec380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.358286]  ffff000801fec400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365487] ==================================================================

test log snippet test parser 98

Home

[   29.057786] ==================================================================
[   29.071658] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x174/0x318
[   29.079035] Read of size 1 at addr ffff000801fec300 by task kunit_try_catch/229
[   29.086325] 
[   29.087809] CPU: 4 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   29.096922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.101081] Hardware name: WinLink E850-96 board (DT)
[   29.106119] Call trace:
[   29.108548]  dump_backtrace+0x9c/0x128
[   29.112278]  show_stack+0x20/0x38
[   29.115576]  dump_stack_lvl+0x8c/0xd0
[   29.119222]  print_report+0x118/0x5e0
[   29.122868]  kasan_report+0xc8/0x118
[   29.126427]  __kasan_check_byte+0x54/0x70
[   29.130419]  kfree_sensitive+0x30/0xb0
[   29.134152]  kmalloc_double_kzfree+0x174/0x318
[   29.138580]  kunit_try_run_case+0x14c/0x3d0
[   29.142745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.148214]  kthread+0x24c/0x2d0
[   29.151426]  ret_from_fork+0x10/0x20
[   29.154989] 
[   29.156462] Allocated by task 229:
[   29.159850]  kasan_save_stack+0x3c/0x68
[   29.163665]  kasan_save_track+0x20/0x40
[   29.167485]  kasan_save_alloc_info+0x40/0x58
[   29.171738]  __kasan_kmalloc+0xd4/0xd8
[   29.175471]  __kmalloc_cache_noprof+0x144/0x328
[   29.179985]  kmalloc_double_kzfree+0xb8/0x318
[   29.184326]  kunit_try_run_case+0x14c/0x3d0
[   29.188491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.193960]  kthread+0x24c/0x2d0
[   29.197172]  ret_from_fork+0x10/0x20
[   29.200731] 
[   29.202208] Freed by task 229:
[   29.205245]  kasan_save_stack+0x3c/0x68
[   29.209064]  kasan_save_track+0x20/0x40
[   29.212883]  kasan_save_free_info+0x4c/0x78
[   29.217050]  __kasan_slab_free+0x6c/0x98
[   29.220956]  kfree+0x110/0x3b8
[   29.223995]  kfree_sensitive+0x80/0xb0
[   29.227727]  kmalloc_double_kzfree+0x120/0x318
[   29.232154]  kunit_try_run_case+0x14c/0x3d0
[   29.236322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.241789]  kthread+0x24c/0x2d0
[   29.245001]  ret_from_fork+0x10/0x20
[   29.248560] 
[   29.250037] The buggy address belongs to the object at ffff000801fec300
[   29.250037]  which belongs to the cache kmalloc-16 of size 16
[   29.262365] The buggy address is located 0 bytes inside of
[   29.262365]  freed 16-byte region [ffff000801fec300, ffff000801fec310)
[   29.274341] 
[   29.275819] The buggy address belongs to the physical page:
[   29.281377] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fec
[   29.289361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.295869] page_type: f5(slab)
[   29.299009] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.306725] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.314444] page dumped because: kasan: bad access detected
[   29.320003] 
[   29.321475] Memory state around the buggy address:
[   29.326256]  ffff000801fec200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.333459]  ffff000801fec280: 00 02 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   29.340665] >ffff000801fec300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.347864]                    ^
[   29.351079]  ffff000801fec380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.358286]  ffff000801fec400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365487] ==================================================================

test log snippet test parser 99

Home

[   25.758206] ==================================================================
[   25.767108] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   25.773874] Read of size 16 at addr ffff000801406900 by task kunit_try_catch/205
[   25.781252] 
[   25.782735] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   25.791848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.796009] Hardware name: WinLink E850-96 board (DT)
[   25.801047] Call trace:
[   25.803475]  dump_backtrace+0x9c/0x128
[   25.807205]  show_stack+0x20/0x38
[   25.810504]  dump_stack_lvl+0x8c/0xd0
[   25.814150]  print_report+0x118/0x5e0
[   25.817796]  kasan_report+0xc8/0x118
[   25.821355]  __asan_report_load16_noabort+0x20/0x30
[   25.826217]  kmalloc_uaf_16+0x3bc/0x438
[   25.830035]  kunit_try_run_case+0x14c/0x3d0
[   25.834202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.839670]  kthread+0x24c/0x2d0
[   25.842882]  ret_from_fork+0x10/0x20
[   25.846445] 
[   25.847916] Allocated by task 205:
[   25.851304]  kasan_save_stack+0x3c/0x68
[   25.855121]  kasan_save_track+0x20/0x40
[   25.858941]  kasan_save_alloc_info+0x40/0x58
[   25.863194]  __kasan_kmalloc+0xd4/0xd8
[   25.866927]  __kmalloc_cache_noprof+0x144/0x328
[   25.871441]  kmalloc_uaf_16+0x144/0x438
[   25.875260]  kunit_try_run_case+0x14c/0x3d0
[   25.879427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.884897]  kthread+0x24c/0x2d0
[   25.888107]  ret_from_fork+0x10/0x20
[   25.891666] 
[   25.893143] Freed by task 205:
[   25.896180]  kasan_save_stack+0x3c/0x68
[   25.899999]  kasan_save_track+0x20/0x40
[   25.903819]  kasan_save_free_info+0x4c/0x78
[   25.907985]  __kasan_slab_free+0x6c/0x98
[   25.911892]  kfree+0x110/0x3b8
[   25.914929]  kmalloc_uaf_16+0x198/0x438
[   25.918749]  kunit_try_run_case+0x14c/0x3d0
[   25.922915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.928384]  kthread+0x24c/0x2d0
[   25.931596]  ret_from_fork+0x10/0x20
[   25.935155] 
[   25.936632] The buggy address belongs to the object at ffff000801406900
[   25.936632]  which belongs to the cache kmalloc-16 of size 16
[   25.948958] The buggy address is located 0 bytes inside of
[   25.948958]  freed 16-byte region [ffff000801406900, ffff000801406910)
[   25.960936] 
[   25.962416] The buggy address belongs to the physical page:
[   25.967970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881406
[   25.975956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.982465] page_type: f5(slab)
[   25.985601] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   25.993319] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   26.001039] page dumped because: kasan: bad access detected
[   26.006596] 
[   26.008070] Memory state around the buggy address:
[   26.012850]  ffff000801406800: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 01 fc fc
[   26.020053]  ffff000801406880: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 00 fc fc
[   26.027259] >ffff000801406900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.034459]                    ^
[   26.037674]  ffff000801406980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.044880]  ffff000801406a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.052080] ==================================================================
[   28.138736] ==================================================================
[   28.149016] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340
[   28.155525] Read of size 1 at addr ffff000800dde068 by task kunit_try_catch/221
[   28.162814] 
[   28.164297] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   28.173413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.177571] Hardware name: WinLink E850-96 board (DT)
[   28.182609] Call trace:
[   28.185036]  dump_backtrace+0x9c/0x128
[   28.188767]  show_stack+0x20/0x38
[   28.192065]  dump_stack_lvl+0x8c/0xd0
[   28.195711]  print_report+0x118/0x5e0
[   28.199357]  kasan_report+0xc8/0x118
[   28.202916]  __asan_report_load1_noabort+0x20/0x30
[   28.207690]  kmalloc_uaf+0x30c/0x340
[   28.211249]  kunit_try_run_case+0x14c/0x3d0
[   28.215416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.220884]  kthread+0x24c/0x2d0
[   28.224096]  ret_from_fork+0x10/0x20
[   28.227658] 
[   28.229133] Allocated by task 221:
[   28.232518]  kasan_save_stack+0x3c/0x68
[   28.236336]  kasan_save_track+0x20/0x40
[   28.240155]  kasan_save_alloc_info+0x40/0x58
[   28.244408]  __kasan_kmalloc+0xd4/0xd8
[   28.248141]  __kmalloc_cache_noprof+0x144/0x328
[   28.252655]  kmalloc_uaf+0xb8/0x340
[   28.256128]  kunit_try_run_case+0x14c/0x3d0
[   28.260294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.265762]  kthread+0x24c/0x2d0
[   28.268974]  ret_from_fork+0x10/0x20
[   28.272533] 
[   28.274010] Freed by task 221:
[   28.277048]  kasan_save_stack+0x3c/0x68
[   28.280866]  kasan_save_track+0x20/0x40
[   28.284685]  kasan_save_free_info+0x4c/0x78
[   28.288852]  __kasan_slab_free+0x6c/0x98
[   28.292758]  kfree+0x110/0x3b8
[   28.295797]  kmalloc_uaf+0x120/0x340
[   28.299355]  kunit_try_run_case+0x14c/0x3d0
[   28.303522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.308991]  kthread+0x24c/0x2d0
[   28.312203]  ret_from_fork+0x10/0x20
[   28.315762] 
[   28.317239] The buggy address belongs to the object at ffff000800dde060
[   28.317239]  which belongs to the cache kmalloc-16 of size 16
[   28.329566] The buggy address is located 8 bytes inside of
[   28.329566]  freed 16-byte region [ffff000800dde060, ffff000800dde070)
[   28.341542] 
[   28.343022] The buggy address belongs to the physical page:
[   28.348578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dde
[   28.356561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.363070] page_type: f5(slab)
[   28.366209] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   28.373926] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.381646] page dumped because: kasan: bad access detected
[   28.387202] 
[   28.388677] Memory state around the buggy address:
[   28.393459]  ffff000800dddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.400661]  ffff000800dddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.407865] >ffff000800dde000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.415066]                                                           ^
[   28.421666]  ffff000800dde080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.428871]  ffff000800dde100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.436074] ==================================================================
[   28.751621] ==================================================================
[   28.761244] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478
[   28.767841] Read of size 1 at addr ffff000800ddd5a8 by task kunit_try_catch/225
[   28.775130] 
[   28.776615] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   28.785726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.789888] Hardware name: WinLink E850-96 board (DT)
[   28.794925] Call trace:
[   28.797354]  dump_backtrace+0x9c/0x128
[   28.801085]  show_stack+0x20/0x38
[   28.804383]  dump_stack_lvl+0x8c/0xd0
[   28.808029]  print_report+0x118/0x5e0
[   28.811674]  kasan_report+0xc8/0x118
[   28.815234]  __asan_report_load1_noabort+0x20/0x30
[   28.820007]  kmalloc_uaf2+0x408/0x478
[   28.823653]  kunit_try_run_case+0x14c/0x3d0
[   28.827820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.833288]  kthread+0x24c/0x2d0
[   28.836500]  ret_from_fork+0x10/0x20
[   28.840062] 
[   28.841536] Allocated by task 225:
[   28.844922]  kasan_save_stack+0x3c/0x68
[   28.848740]  kasan_save_track+0x20/0x40
[   28.852559]  kasan_save_alloc_info+0x40/0x58
[   28.856812]  __kasan_kmalloc+0xd4/0xd8
[   28.860545]  __kmalloc_cache_noprof+0x144/0x328
[   28.865059]  kmalloc_uaf2+0xc4/0x478
[   28.868619]  kunit_try_run_case+0x14c/0x3d0
[   28.872784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.878253]  kthread+0x24c/0x2d0
[   28.881465]  ret_from_fork+0x10/0x20
[   28.885024] 
[   28.886500] Freed by task 225:
[   28.889539]  kasan_save_stack+0x3c/0x68
[   28.893357]  kasan_save_track+0x20/0x40
[   28.897177]  kasan_save_free_info+0x4c/0x78
[   28.901343]  __kasan_slab_free+0x6c/0x98
[   28.905249]  kfree+0x110/0x3b8
[   28.908287]  kmalloc_uaf2+0x138/0x478
[   28.911933]  kunit_try_run_case+0x14c/0x3d0
[   28.916100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.921568]  kthread+0x24c/0x2d0
[   28.924780]  ret_from_fork+0x10/0x20
[   28.928339] 
[   28.929816] The buggy address belongs to the object at ffff000800ddd580
[   28.929816]  which belongs to the cache kmalloc-64 of size 64
[   28.942143] The buggy address is located 40 bytes inside of
[   28.942143]  freed 64-byte region [ffff000800ddd580, ffff000800ddd5c0)
[   28.954207] 
[   28.955685] The buggy address belongs to the physical page:
[   28.961243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   28.969227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.975737] page_type: f5(slab)
[   28.978872] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.986591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.994310] page dumped because: kasan: bad access detected
[   28.999865] 
[   29.001341] Memory state around the buggy address:
[   29.006125]  ffff000800ddd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.013324]  ffff000800ddd500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.020530] >ffff000800ddd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.027730]                                   ^
[   29.032249]  ffff000800ddd600: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   29.039452]  ffff000800ddd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.046655] ==================================================================

test log snippet test parser 100

Home

[   28.751621] ==================================================================
[   28.761244] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478
[   28.767841] Read of size 1 at addr ffff000800ddd5a8 by task kunit_try_catch/225
[   28.775130] 
[   28.776615] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   28.785726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.789888] Hardware name: WinLink E850-96 board (DT)
[   28.794925] Call trace:
[   28.797354]  dump_backtrace+0x9c/0x128
[   28.801085]  show_stack+0x20/0x38
[   28.804383]  dump_stack_lvl+0x8c/0xd0
[   28.808029]  print_report+0x118/0x5e0
[   28.811674]  kasan_report+0xc8/0x118
[   28.815234]  __asan_report_load1_noabort+0x20/0x30
[   28.820007]  kmalloc_uaf2+0x408/0x478
[   28.823653]  kunit_try_run_case+0x14c/0x3d0
[   28.827820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.833288]  kthread+0x24c/0x2d0
[   28.836500]  ret_from_fork+0x10/0x20
[   28.840062] 
[   28.841536] Allocated by task 225:
[   28.844922]  kasan_save_stack+0x3c/0x68
[   28.848740]  kasan_save_track+0x20/0x40
[   28.852559]  kasan_save_alloc_info+0x40/0x58
[   28.856812]  __kasan_kmalloc+0xd4/0xd8
[   28.860545]  __kmalloc_cache_noprof+0x144/0x328
[   28.865059]  kmalloc_uaf2+0xc4/0x478
[   28.868619]  kunit_try_run_case+0x14c/0x3d0
[   28.872784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.878253]  kthread+0x24c/0x2d0
[   28.881465]  ret_from_fork+0x10/0x20
[   28.885024] 
[   28.886500] Freed by task 225:
[   28.889539]  kasan_save_stack+0x3c/0x68
[   28.893357]  kasan_save_track+0x20/0x40
[   28.897177]  kasan_save_free_info+0x4c/0x78
[   28.901343]  __kasan_slab_free+0x6c/0x98
[   28.905249]  kfree+0x110/0x3b8
[   28.908287]  kmalloc_uaf2+0x138/0x478
[   28.911933]  kunit_try_run_case+0x14c/0x3d0
[   28.916100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.921568]  kthread+0x24c/0x2d0
[   28.924780]  ret_from_fork+0x10/0x20
[   28.928339] 
[   28.929816] The buggy address belongs to the object at ffff000800ddd580
[   28.929816]  which belongs to the cache kmalloc-64 of size 64
[   28.942143] The buggy address is located 40 bytes inside of
[   28.942143]  freed 64-byte region [ffff000800ddd580, ffff000800ddd5c0)
[   28.954207] 
[   28.955685] The buggy address belongs to the physical page:
[   28.961243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddd
[   28.969227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.975737] page_type: f5(slab)
[   28.978872] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.986591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.994310] page dumped because: kasan: bad access detected
[   28.999865] 
[   29.001341] Memory state around the buggy address:
[   29.006125]  ffff000800ddd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.013324]  ffff000800ddd500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.020530] >ffff000800ddd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.027730]                                   ^
[   29.032249]  ffff000800ddd600: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   29.039452]  ffff000800ddd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.046655] ==================================================================

test log snippet test parser 101

Home

[   28.138736] ==================================================================
[   28.149016] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340
[   28.155525] Read of size 1 at addr ffff000800dde068 by task kunit_try_catch/221
[   28.162814] 
[   28.164297] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   28.173413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.177571] Hardware name: WinLink E850-96 board (DT)
[   28.182609] Call trace:
[   28.185036]  dump_backtrace+0x9c/0x128
[   28.188767]  show_stack+0x20/0x38
[   28.192065]  dump_stack_lvl+0x8c/0xd0
[   28.195711]  print_report+0x118/0x5e0
[   28.199357]  kasan_report+0xc8/0x118
[   28.202916]  __asan_report_load1_noabort+0x20/0x30
[   28.207690]  kmalloc_uaf+0x30c/0x340
[   28.211249]  kunit_try_run_case+0x14c/0x3d0
[   28.215416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.220884]  kthread+0x24c/0x2d0
[   28.224096]  ret_from_fork+0x10/0x20
[   28.227658] 
[   28.229133] Allocated by task 221:
[   28.232518]  kasan_save_stack+0x3c/0x68
[   28.236336]  kasan_save_track+0x20/0x40
[   28.240155]  kasan_save_alloc_info+0x40/0x58
[   28.244408]  __kasan_kmalloc+0xd4/0xd8
[   28.248141]  __kmalloc_cache_noprof+0x144/0x328
[   28.252655]  kmalloc_uaf+0xb8/0x340
[   28.256128]  kunit_try_run_case+0x14c/0x3d0
[   28.260294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.265762]  kthread+0x24c/0x2d0
[   28.268974]  ret_from_fork+0x10/0x20
[   28.272533] 
[   28.274010] Freed by task 221:
[   28.277048]  kasan_save_stack+0x3c/0x68
[   28.280866]  kasan_save_track+0x20/0x40
[   28.284685]  kasan_save_free_info+0x4c/0x78
[   28.288852]  __kasan_slab_free+0x6c/0x98
[   28.292758]  kfree+0x110/0x3b8
[   28.295797]  kmalloc_uaf+0x120/0x340
[   28.299355]  kunit_try_run_case+0x14c/0x3d0
[   28.303522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.308991]  kthread+0x24c/0x2d0
[   28.312203]  ret_from_fork+0x10/0x20
[   28.315762] 
[   28.317239] The buggy address belongs to the object at ffff000800dde060
[   28.317239]  which belongs to the cache kmalloc-16 of size 16
[   28.329566] The buggy address is located 8 bytes inside of
[   28.329566]  freed 16-byte region [ffff000800dde060, ffff000800dde070)
[   28.341542] 
[   28.343022] The buggy address belongs to the physical page:
[   28.348578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dde
[   28.356561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.363070] page_type: f5(slab)
[   28.366209] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   28.373926] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.381646] page dumped because: kasan: bad access detected
[   28.387202] 
[   28.388677] Memory state around the buggy address:
[   28.393459]  ffff000800dddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.400661]  ffff000800dddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.407865] >ffff000800dde000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.415066]                                                           ^
[   28.421666]  ffff000800dde080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.428871]  ffff000800dde100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.436074] ==================================================================

test log snippet test parser 102

Home

[   25.758206] ==================================================================
[   25.767108] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   25.773874] Read of size 16 at addr ffff000801406900 by task kunit_try_catch/205
[   25.781252] 
[   25.782735] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   25.791848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.796009] Hardware name: WinLink E850-96 board (DT)
[   25.801047] Call trace:
[   25.803475]  dump_backtrace+0x9c/0x128
[   25.807205]  show_stack+0x20/0x38
[   25.810504]  dump_stack_lvl+0x8c/0xd0
[   25.814150]  print_report+0x118/0x5e0
[   25.817796]  kasan_report+0xc8/0x118
[   25.821355]  __asan_report_load16_noabort+0x20/0x30
[   25.826217]  kmalloc_uaf_16+0x3bc/0x438
[   25.830035]  kunit_try_run_case+0x14c/0x3d0
[   25.834202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.839670]  kthread+0x24c/0x2d0
[   25.842882]  ret_from_fork+0x10/0x20
[   25.846445] 
[   25.847916] Allocated by task 205:
[   25.851304]  kasan_save_stack+0x3c/0x68
[   25.855121]  kasan_save_track+0x20/0x40
[   25.858941]  kasan_save_alloc_info+0x40/0x58
[   25.863194]  __kasan_kmalloc+0xd4/0xd8
[   25.866927]  __kmalloc_cache_noprof+0x144/0x328
[   25.871441]  kmalloc_uaf_16+0x144/0x438
[   25.875260]  kunit_try_run_case+0x14c/0x3d0
[   25.879427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.884897]  kthread+0x24c/0x2d0
[   25.888107]  ret_from_fork+0x10/0x20
[   25.891666] 
[   25.893143] Freed by task 205:
[   25.896180]  kasan_save_stack+0x3c/0x68
[   25.899999]  kasan_save_track+0x20/0x40
[   25.903819]  kasan_save_free_info+0x4c/0x78
[   25.907985]  __kasan_slab_free+0x6c/0x98
[   25.911892]  kfree+0x110/0x3b8
[   25.914929]  kmalloc_uaf_16+0x198/0x438
[   25.918749]  kunit_try_run_case+0x14c/0x3d0
[   25.922915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.928384]  kthread+0x24c/0x2d0
[   25.931596]  ret_from_fork+0x10/0x20
[   25.935155] 
[   25.936632] The buggy address belongs to the object at ffff000801406900
[   25.936632]  which belongs to the cache kmalloc-16 of size 16
[   25.948958] The buggy address is located 0 bytes inside of
[   25.948958]  freed 16-byte region [ffff000801406900, ffff000801406910)
[   25.960936] 
[   25.962416] The buggy address belongs to the physical page:
[   25.967970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881406
[   25.975956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.982465] page_type: f5(slab)
[   25.985601] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   25.993319] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   26.001039] page dumped because: kasan: bad access detected
[   26.006596] 
[   26.008070] Memory state around the buggy address:
[   26.012850]  ffff000801406800: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 01 fc fc
[   26.020053]  ffff000801406880: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 00 fc fc
[   26.027259] >ffff000801406900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.034459]                    ^
[   26.037674]  ffff000801406980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.044880]  ffff000801406a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.052080] ==================================================================

test log snippet test parser 103

Home

[   28.444765] ==================================================================
[   28.453785] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328
[   28.460901] Write of size 33 at addr ffff000801421100 by task kunit_try_catch/223
[   28.468365] 
[   28.469848] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   28.478962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.483122] Hardware name: WinLink E850-96 board (DT)
[   28.488160] Call trace:
[   28.490587]  dump_backtrace+0x9c/0x128
[   28.494318]  show_stack+0x20/0x38
[   28.497616]  dump_stack_lvl+0x8c/0xd0
[   28.501262]  print_report+0x118/0x5e0
[   28.504908]  kasan_report+0xc8/0x118
[   28.508467]  kasan_check_range+0x100/0x1a8
[   28.512547]  __asan_memset+0x34/0x78
[   28.516106]  kmalloc_uaf_memset+0x17c/0x328
[   28.520273]  kunit_try_run_case+0x14c/0x3d0
[   28.524439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.529908]  kthread+0x24c/0x2d0
[   28.533120]  ret_from_fork+0x10/0x20
[   28.536682] 
[   28.538155] Allocated by task 223:
[   28.541541]  kasan_save_stack+0x3c/0x68
[   28.545359]  kasan_save_track+0x20/0x40
[   28.549178]  kasan_save_alloc_info+0x40/0x58
[   28.553432]  __kasan_kmalloc+0xd4/0xd8
[   28.557164]  __kmalloc_cache_noprof+0x144/0x328
[   28.561678]  kmalloc_uaf_memset+0xb8/0x328
[   28.565758]  kunit_try_run_case+0x14c/0x3d0
[   28.569924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.575393]  kthread+0x24c/0x2d0
[   28.578604]  ret_from_fork+0x10/0x20
[   28.582164] 
[   28.583641] Freed by task 223:
[   28.586679]  kasan_save_stack+0x3c/0x68
[   28.590497]  kasan_save_track+0x20/0x40
[   28.594316]  kasan_save_free_info+0x4c/0x78
[   28.598483]  __kasan_slab_free+0x6c/0x98
[   28.602390]  kfree+0x110/0x3b8
[   28.605427]  kmalloc_uaf_memset+0x120/0x328
[   28.609594]  kunit_try_run_case+0x14c/0x3d0
[   28.613760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.619229]  kthread+0x24c/0x2d0
[   28.622441]  ret_from_fork+0x10/0x20
[   28.626000] 
[   28.627477] The buggy address belongs to the object at ffff000801421100
[   28.627477]  which belongs to the cache kmalloc-64 of size 64
[   28.639804] The buggy address is located 0 bytes inside of
[   28.639804]  freed 64-byte region [ffff000801421100, ffff000801421140)
[   28.651781] 
[   28.653260] The buggy address belongs to the physical page:
[   28.658816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881421
[   28.666800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.673308] page_type: f5(slab)
[   28.676448] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.684164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.691884] page dumped because: kasan: bad access detected
[   28.697439] 
[   28.698915] Memory state around the buggy address:
[   28.703697]  ffff000801421000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.710898]  ffff000801421080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.718104] >ffff000801421100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.725304]                    ^
[   28.728519]  ffff000801421180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.735725]  ffff000801421200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.742925] ==================================================================

test log snippet test parser 104

Home

[   28.444765] ==================================================================
[   28.453785] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328
[   28.460901] Write of size 33 at addr ffff000801421100 by task kunit_try_catch/223
[   28.468365] 
[   28.469848] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   28.478962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.483122] Hardware name: WinLink E850-96 board (DT)
[   28.488160] Call trace:
[   28.490587]  dump_backtrace+0x9c/0x128
[   28.494318]  show_stack+0x20/0x38
[   28.497616]  dump_stack_lvl+0x8c/0xd0
[   28.501262]  print_report+0x118/0x5e0
[   28.504908]  kasan_report+0xc8/0x118
[   28.508467]  kasan_check_range+0x100/0x1a8
[   28.512547]  __asan_memset+0x34/0x78
[   28.516106]  kmalloc_uaf_memset+0x17c/0x328
[   28.520273]  kunit_try_run_case+0x14c/0x3d0
[   28.524439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.529908]  kthread+0x24c/0x2d0
[   28.533120]  ret_from_fork+0x10/0x20
[   28.536682] 
[   28.538155] Allocated by task 223:
[   28.541541]  kasan_save_stack+0x3c/0x68
[   28.545359]  kasan_save_track+0x20/0x40
[   28.549178]  kasan_save_alloc_info+0x40/0x58
[   28.553432]  __kasan_kmalloc+0xd4/0xd8
[   28.557164]  __kmalloc_cache_noprof+0x144/0x328
[   28.561678]  kmalloc_uaf_memset+0xb8/0x328
[   28.565758]  kunit_try_run_case+0x14c/0x3d0
[   28.569924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.575393]  kthread+0x24c/0x2d0
[   28.578604]  ret_from_fork+0x10/0x20
[   28.582164] 
[   28.583641] Freed by task 223:
[   28.586679]  kasan_save_stack+0x3c/0x68
[   28.590497]  kasan_save_track+0x20/0x40
[   28.594316]  kasan_save_free_info+0x4c/0x78
[   28.598483]  __kasan_slab_free+0x6c/0x98
[   28.602390]  kfree+0x110/0x3b8
[   28.605427]  kmalloc_uaf_memset+0x120/0x328
[   28.609594]  kunit_try_run_case+0x14c/0x3d0
[   28.613760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.619229]  kthread+0x24c/0x2d0
[   28.622441]  ret_from_fork+0x10/0x20
[   28.626000] 
[   28.627477] The buggy address belongs to the object at ffff000801421100
[   28.627477]  which belongs to the cache kmalloc-64 of size 64
[   28.639804] The buggy address is located 0 bytes inside of
[   28.639804]  freed 64-byte region [ffff000801421100, ffff000801421140)
[   28.651781] 
[   28.653260] The buggy address belongs to the physical page:
[   28.658816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881421
[   28.666800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.673308] page_type: f5(slab)
[   28.676448] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.684164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.691884] page dumped because: kasan: bad access detected
[   28.697439] 
[   28.698915] Memory state around the buggy address:
[   28.703697]  ffff000801421000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.710898]  ffff000801421080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.718104] >ffff000801421100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.725304]                    ^
[   28.728519]  ffff000801421180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.735725]  ffff000801421200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.742925] ==================================================================

test log snippet test parser 105

Home

[   33.848787] ==================================================================
[   33.848970] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318
[   33.849104] Read of size 1 at addr ffff000801f70000 by task kunit_try_catch/252
[   33.852669] 
[   33.854154] CPU: 6 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.863267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.867426] Hardware name: WinLink E850-96 board (DT)
[   33.872464] Call trace:
[   33.874890]  dump_backtrace+0x9c/0x128
[   33.878623]  show_stack+0x20/0x38
[   33.881921]  dump_stack_lvl+0x8c/0xd0
[   33.885567]  print_report+0x118/0x5e0
[   33.889213]  kasan_report+0xc8/0x118
[   33.892771]  __kasan_check_byte+0x54/0x70
[   33.896765]  kmem_cache_destroy+0x34/0x218
[   33.900844]  kmem_cache_double_destroy+0x184/0x318
[   33.905618]  kunit_try_run_case+0x14c/0x3d0
[   33.909785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.915254]  kthread+0x24c/0x2d0
[   33.918466]  ret_from_fork+0x10/0x20
[   33.922028] 
[   33.923502] Allocated by task 252:
[   33.926889]  kasan_save_stack+0x3c/0x68
[   33.930705]  kasan_save_track+0x20/0x40
[   33.934524]  kasan_save_alloc_info+0x40/0x58
[   33.938778]  __kasan_slab_alloc+0xa8/0xb0
[   33.942771]  kmem_cache_alloc_noprof+0xf4/0x308
[   33.947285]  __kmem_cache_create_args+0x19c/0x2c8
[   33.951973]  kmem_cache_double_destroy+0xd0/0x318
[   33.956659]  kunit_try_run_case+0x14c/0x3d0
[   33.960826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.966294]  kthread+0x24c/0x2d0
[   33.969506]  ret_from_fork+0x10/0x20
[   33.973066] 
[   33.974542] Freed by task 252:
[   33.977581]  kasan_save_stack+0x3c/0x68
[   33.981399]  kasan_save_track+0x20/0x40
[   33.985218]  kasan_save_free_info+0x4c/0x78
[   33.989385]  __kasan_slab_free+0x6c/0x98
[   33.993291]  kmem_cache_free+0x118/0x468
[   33.997197]  slab_kmem_cache_release+0x38/0x50
[   34.001625]  kmem_cache_release+0x1c/0x30
[   34.005617]  kobject_put+0x17c/0x430
[   34.009176]  sysfs_slab_release+0x1c/0x30
[   34.013169]  kmem_cache_destroy+0x118/0x218
[   34.017336]  kmem_cache_double_destroy+0x130/0x318
[   34.022110]  kunit_try_run_case+0x14c/0x3d0
[   34.026276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.031745]  kthread+0x24c/0x2d0
[   34.034957]  ret_from_fork+0x10/0x20
[   34.038516] 
[   34.039993] The buggy address belongs to the object at ffff000801f70000
[   34.039993]  which belongs to the cache kmem_cache of size 208
[   34.052407] The buggy address is located 0 bytes inside of
[   34.052407]  freed 208-byte region [ffff000801f70000, ffff000801f700d0)
[   34.064470] 
[   34.065950] The buggy address belongs to the physical page:
[   34.071507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f70
[   34.079489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.087130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.094072] page_type: f5(slab)
[   34.097212] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   34.104927] raw: 0000000000000000 0000000080190019 00000001f5000000 0000000000000000
[   34.112654] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   34.120465] head: 0000000000000000 0000000080190019 00000001f5000000 0000000000000000
[   34.128278] head: 0bfffe0000000001 fffffdffe007dc01 ffffffffffffffff 0000000000000000
[   34.136089] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   34.143896] page dumped because: kasan: bad access detected
[   34.149451] 
[   34.150927] Memory state around the buggy address:
[   34.155708]  ffff000801f6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.162910]  ffff000801f6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.170116] >ffff000801f70000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.177316]                    ^
[   34.180531]  ffff000801f70080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   34.187735]  ffff000801f70100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.194938] ==================================================================

test log snippet test parser 106

Home

[   33.848787] ==================================================================
[   33.848970] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318
[   33.849104] Read of size 1 at addr ffff000801f70000 by task kunit_try_catch/252
[   33.852669] 
[   33.854154] CPU: 6 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.863267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.867426] Hardware name: WinLink E850-96 board (DT)
[   33.872464] Call trace:
[   33.874890]  dump_backtrace+0x9c/0x128
[   33.878623]  show_stack+0x20/0x38
[   33.881921]  dump_stack_lvl+0x8c/0xd0
[   33.885567]  print_report+0x118/0x5e0
[   33.889213]  kasan_report+0xc8/0x118
[   33.892771]  __kasan_check_byte+0x54/0x70
[   33.896765]  kmem_cache_destroy+0x34/0x218
[   33.900844]  kmem_cache_double_destroy+0x184/0x318
[   33.905618]  kunit_try_run_case+0x14c/0x3d0
[   33.909785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.915254]  kthread+0x24c/0x2d0
[   33.918466]  ret_from_fork+0x10/0x20
[   33.922028] 
[   33.923502] Allocated by task 252:
[   33.926889]  kasan_save_stack+0x3c/0x68
[   33.930705]  kasan_save_track+0x20/0x40
[   33.934524]  kasan_save_alloc_info+0x40/0x58
[   33.938778]  __kasan_slab_alloc+0xa8/0xb0
[   33.942771]  kmem_cache_alloc_noprof+0xf4/0x308
[   33.947285]  __kmem_cache_create_args+0x19c/0x2c8
[   33.951973]  kmem_cache_double_destroy+0xd0/0x318
[   33.956659]  kunit_try_run_case+0x14c/0x3d0
[   33.960826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.966294]  kthread+0x24c/0x2d0
[   33.969506]  ret_from_fork+0x10/0x20
[   33.973066] 
[   33.974542] Freed by task 252:
[   33.977581]  kasan_save_stack+0x3c/0x68
[   33.981399]  kasan_save_track+0x20/0x40
[   33.985218]  kasan_save_free_info+0x4c/0x78
[   33.989385]  __kasan_slab_free+0x6c/0x98
[   33.993291]  kmem_cache_free+0x118/0x468
[   33.997197]  slab_kmem_cache_release+0x38/0x50
[   34.001625]  kmem_cache_release+0x1c/0x30
[   34.005617]  kobject_put+0x17c/0x430
[   34.009176]  sysfs_slab_release+0x1c/0x30
[   34.013169]  kmem_cache_destroy+0x118/0x218
[   34.017336]  kmem_cache_double_destroy+0x130/0x318
[   34.022110]  kunit_try_run_case+0x14c/0x3d0
[   34.026276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.031745]  kthread+0x24c/0x2d0
[   34.034957]  ret_from_fork+0x10/0x20
[   34.038516] 
[   34.039993] The buggy address belongs to the object at ffff000801f70000
[   34.039993]  which belongs to the cache kmem_cache of size 208
[   34.052407] The buggy address is located 0 bytes inside of
[   34.052407]  freed 208-byte region [ffff000801f70000, ffff000801f700d0)
[   34.064470] 
[   34.065950] The buggy address belongs to the physical page:
[   34.071507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f70
[   34.079489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.087130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.094072] page_type: f5(slab)
[   34.097212] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   34.104927] raw: 0000000000000000 0000000080190019 00000001f5000000 0000000000000000
[   34.112654] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   34.120465] head: 0000000000000000 0000000080190019 00000001f5000000 0000000000000000
[   34.128278] head: 0bfffe0000000001 fffffdffe007dc01 ffffffffffffffff 0000000000000000
[   34.136089] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   34.143896] page dumped because: kasan: bad access detected
[   34.149451] 
[   34.150927] Memory state around the buggy address:
[   34.155708]  ffff000801f6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.162910]  ffff000801f6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.170116] >ffff000801f70000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.177316]                    ^
[   34.180531]  ffff000801f70080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   34.187735]  ffff000801f70100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.194938] ==================================================================

test log snippet test parser 107

Home

[   33.434157] ==================================================================
[   33.434346] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488
[   33.434471] Read of size 1 at addr ffff000801fb4000 by task kunit_try_catch/250
[   33.437863] 
[   33.439347] CPU: 7 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.448459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.452619] Hardware name: WinLink E850-96 board (DT)
[   33.457657] Call trace:
[   33.460085]  dump_backtrace+0x9c/0x128
[   33.463816]  show_stack+0x20/0x38
[   33.467114]  dump_stack_lvl+0x8c/0xd0
[   33.470760]  print_report+0x118/0x5e0
[   33.474405]  kasan_report+0xc8/0x118
[   33.477965]  __asan_report_load1_noabort+0x20/0x30
[   33.482739]  kmem_cache_rcu_uaf+0x3a4/0x488
[   33.486907]  kunit_try_run_case+0x14c/0x3d0
[   33.491072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496541]  kthread+0x24c/0x2d0
[   33.499753]  ret_from_fork+0x10/0x20
[   33.503316] 
[   33.504789] Allocated by task 250:
[   33.508175]  kasan_save_stack+0x3c/0x68
[   33.511992]  kasan_save_track+0x20/0x40
[   33.515812]  kasan_save_alloc_info+0x40/0x58
[   33.520065]  __kasan_slab_alloc+0xa8/0xb0
[   33.524057]  kmem_cache_alloc_noprof+0xf4/0x308
[   33.528572]  kmem_cache_rcu_uaf+0x130/0x488
[   33.532740]  kunit_try_run_case+0x14c/0x3d0
[   33.536905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.542374]  kthread+0x24c/0x2d0
[   33.545585]  ret_from_fork+0x10/0x20
[   33.549144] 
[   33.550621] Freed by task 0:
[   33.553488]  kasan_save_stack+0x3c/0x68
[   33.557304]  kasan_save_track+0x20/0x40
[   33.561123]  kasan_save_free_info+0x4c/0x78
[   33.565290]  __kasan_slab_free+0x6c/0x98
[   33.569196]  slab_free_after_rcu_debug+0xd0/0x2d0
[   33.573884]  rcu_core+0xa54/0x1df8
[   33.577269]  rcu_core_si+0x18/0x30
[   33.580654]  handle_softirqs+0x36c/0xb18
[   33.584560]  __do_softirq+0x1c/0x28
[   33.588033] 
[   33.589508] Last potentially related work creation:
[   33.594371]  kasan_save_stack+0x3c/0x68
[   33.598189]  __kasan_record_aux_stack+0xbc/0xe8
[   33.602702]  kasan_record_aux_stack_noalloc+0x14/0x20
[   33.607737]  kmem_cache_free+0x28c/0x468
[   33.611643]  kmem_cache_rcu_uaf+0x170/0x488
[   33.615810]  kunit_try_run_case+0x14c/0x3d0
[   33.619977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.625445]  kthread+0x24c/0x2d0
[   33.628658]  ret_from_fork+0x10/0x20
[   33.632216] 
[   33.633693] The buggy address belongs to the object at ffff000801fb4000
[   33.633693]  which belongs to the cache test_cache of size 200
[   33.646108] The buggy address is located 0 bytes inside of
[   33.646108]  freed 200-byte region [ffff000801fb4000, ffff000801fb40c8)
[   33.658170] 
[   33.659648] The buggy address belongs to the physical page:
[   33.665206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fb4
[   33.673189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.680829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.687770] page_type: f5(slab)
[   33.690911] raw: 0bfffe0000000040 ffff000801fb0140 dead000000000122 0000000000000000
[   33.698627] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.706354] head: 0bfffe0000000040 ffff000801fb0140 dead000000000122 0000000000000000
[   33.714165] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.721977] head: 0bfffe0000000001 fffffdffe007ed01 ffffffffffffffff 0000000000000000
[   33.729790] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   33.737596] page dumped because: kasan: bad access detected
[   33.743151] 
[   33.744627] Memory state around the buggy address:
[   33.749409]  ffff000801fb3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.756610]  ffff000801fb3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.763816] >ffff000801fb4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.771016]                    ^
[   33.774231]  ffff000801fb4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.781435]  ffff000801fb4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.788639] ==================================================================

test log snippet test parser 108

Home

[   33.434157] ==================================================================
[   33.434346] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488
[   33.434471] Read of size 1 at addr ffff000801fb4000 by task kunit_try_catch/250
[   33.437863] 
[   33.439347] CPU: 7 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   33.448459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.452619] Hardware name: WinLink E850-96 board (DT)
[   33.457657] Call trace:
[   33.460085]  dump_backtrace+0x9c/0x128
[   33.463816]  show_stack+0x20/0x38
[   33.467114]  dump_stack_lvl+0x8c/0xd0
[   33.470760]  print_report+0x118/0x5e0
[   33.474405]  kasan_report+0xc8/0x118
[   33.477965]  __asan_report_load1_noabort+0x20/0x30
[   33.482739]  kmem_cache_rcu_uaf+0x3a4/0x488
[   33.486907]  kunit_try_run_case+0x14c/0x3d0
[   33.491072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496541]  kthread+0x24c/0x2d0
[   33.499753]  ret_from_fork+0x10/0x20
[   33.503316] 
[   33.504789] Allocated by task 250:
[   33.508175]  kasan_save_stack+0x3c/0x68
[   33.511992]  kasan_save_track+0x20/0x40
[   33.515812]  kasan_save_alloc_info+0x40/0x58
[   33.520065]  __kasan_slab_alloc+0xa8/0xb0
[   33.524057]  kmem_cache_alloc_noprof+0xf4/0x308
[   33.528572]  kmem_cache_rcu_uaf+0x130/0x488
[   33.532740]  kunit_try_run_case+0x14c/0x3d0
[   33.536905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.542374]  kthread+0x24c/0x2d0
[   33.545585]  ret_from_fork+0x10/0x20
[   33.549144] 
[   33.550621] Freed by task 0:
[   33.553488]  kasan_save_stack+0x3c/0x68
[   33.557304]  kasan_save_track+0x20/0x40
[   33.561123]  kasan_save_free_info+0x4c/0x78
[   33.565290]  __kasan_slab_free+0x6c/0x98
[   33.569196]  slab_free_after_rcu_debug+0xd0/0x2d0
[   33.573884]  rcu_core+0xa54/0x1df8
[   33.577269]  rcu_core_si+0x18/0x30
[   33.580654]  handle_softirqs+0x36c/0xb18
[   33.584560]  __do_softirq+0x1c/0x28
[   33.588033] 
[   33.589508] Last potentially related work creation:
[   33.594371]  kasan_save_stack+0x3c/0x68
[   33.598189]  __kasan_record_aux_stack+0xbc/0xe8
[   33.602702]  kasan_record_aux_stack_noalloc+0x14/0x20
[   33.607737]  kmem_cache_free+0x28c/0x468
[   33.611643]  kmem_cache_rcu_uaf+0x170/0x488
[   33.615810]  kunit_try_run_case+0x14c/0x3d0
[   33.619977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.625445]  kthread+0x24c/0x2d0
[   33.628658]  ret_from_fork+0x10/0x20
[   33.632216] 
[   33.633693] The buggy address belongs to the object at ffff000801fb4000
[   33.633693]  which belongs to the cache test_cache of size 200
[   33.646108] The buggy address is located 0 bytes inside of
[   33.646108]  freed 200-byte region [ffff000801fb4000, ffff000801fb40c8)
[   33.658170] 
[   33.659648] The buggy address belongs to the physical page:
[   33.665206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fb4
[   33.673189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.680829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.687770] page_type: f5(slab)
[   33.690911] raw: 0bfffe0000000040 ffff000801fb0140 dead000000000122 0000000000000000
[   33.698627] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.706354] head: 0bfffe0000000040 ffff000801fb0140 dead000000000122 0000000000000000
[   33.714165] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000
[   33.721977] head: 0bfffe0000000001 fffffdffe007ed01 ffffffffffffffff 0000000000000000
[   33.729790] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   33.737596] page dumped because: kasan: bad access detected
[   33.743151] 
[   33.744627] Memory state around the buggy address:
[   33.749409]  ffff000801fb3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.756610]  ffff000801fb3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.763816] >ffff000801fb4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.771016]                    ^
[   33.774231]  ffff000801fb4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.781435]  ffff000801fb4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.788639] ==================================================================

test log snippet test parser 109

Home

[   25.157613] ==================================================================
[   25.164600] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510
[   25.171192] Read of size 1 at addr ffff000801773800 by task kunit_try_catch/201
[   25.178482] 
[   25.179966] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   25.189079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.193240] Hardware name: WinLink E850-96 board (DT)
[   25.198276] Call trace:
[   25.200704]  dump_backtrace+0x9c/0x128
[   25.204437]  show_stack+0x20/0x38
[   25.207735]  dump_stack_lvl+0x8c/0xd0
[   25.211381]  print_report+0x118/0x5e0
[   25.215027]  kasan_report+0xc8/0x118
[   25.218586]  __asan_report_load1_noabort+0x20/0x30
[   25.223360]  krealloc_uaf+0x4c4/0x510
[   25.227006]  kunit_try_run_case+0x14c/0x3d0
[   25.231173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.236641]  kthread+0x24c/0x2d0
[   25.239853]  ret_from_fork+0x10/0x20
[   25.243416] 
[   25.244887] Allocated by task 201:
[   25.248273]  kasan_save_stack+0x3c/0x68
[   25.252092]  kasan_save_track+0x20/0x40
[   25.255913]  kasan_save_alloc_info+0x40/0x58
[   25.260165]  __kasan_kmalloc+0xd4/0xd8
[   25.263898]  __kmalloc_cache_noprof+0x144/0x328
[   25.268412]  krealloc_uaf+0xc8/0x510
[   25.271970]  kunit_try_run_case+0x14c/0x3d0
[   25.276137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.281606]  kthread+0x24c/0x2d0
[   25.284818]  ret_from_fork+0x10/0x20
[   25.288376] 
[   25.289852] Freed by task 201:
[   25.292890]  kasan_save_stack+0x3c/0x68
[   25.296710]  kasan_save_track+0x20/0x40
[   25.300529]  kasan_save_free_info+0x4c/0x78
[   25.304696]  __kasan_slab_free+0x6c/0x98
[   25.308602]  kfree+0x110/0x3b8
[   25.311640]  krealloc_uaf+0x130/0x510
[   25.315286]  kunit_try_run_case+0x14c/0x3d0
[   25.319452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.324921]  kthread+0x24c/0x2d0
[   25.328133]  ret_from_fork+0x10/0x20
[   25.331692] 
[   25.333169] The buggy address belongs to the object at ffff000801773800
[   25.333169]  which belongs to the cache kmalloc-256 of size 256
[   25.345668] The buggy address is located 0 bytes inside of
[   25.345668]  freed 256-byte region [ffff000801773800, ffff000801773900)
[   25.357733] 
[   25.359209] The buggy address belongs to the physical page:
[   25.364768] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881770
[   25.372750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.380392] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.387334] page_type: f5(slab)
[   25.390468] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.398190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.405915] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.413727] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.421540] head: 0bfffe0000000002 fffffdffe005dc01 ffffffffffffffff 0000000000000000
[   25.429352] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.437159] page dumped because: kasan: bad access detected
[   25.442714] 
[   25.444190] Memory state around the buggy address:
[   25.448970]  ffff000801773700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.456173]  ffff000801773780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.463377] >ffff000801773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.470578]                    ^
[   25.473793]  ffff000801773880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.480999]  ffff000801773900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.488200] ==================================================================
[   24.813594] ==================================================================
[   24.823544] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510
[   24.830139] Read of size 1 at addr ffff000801773800 by task kunit_try_catch/201
[   24.837428] 
[   24.838912] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.848026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.852186] Hardware name: WinLink E850-96 board (DT)
[   24.857224] Call trace:
[   24.859653]  dump_backtrace+0x9c/0x128
[   24.863383]  show_stack+0x20/0x38
[   24.866682]  dump_stack_lvl+0x8c/0xd0
[   24.870327]  print_report+0x118/0x5e0
[   24.873973]  kasan_report+0xc8/0x118
[   24.877532]  __kasan_check_byte+0x54/0x70
[   24.881525]  krealloc_noprof+0x48/0x1a0
[   24.885344]  krealloc_uaf+0x18c/0x510
[   24.888990]  kunit_try_run_case+0x14c/0x3d0
[   24.893157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.898625]  kthread+0x24c/0x2d0
[   24.901837]  ret_from_fork+0x10/0x20
[   24.905399] 
[   24.906873] Allocated by task 201:
[   24.910261]  kasan_save_stack+0x3c/0x68
[   24.914076]  kasan_save_track+0x20/0x40
[   24.917897]  kasan_save_alloc_info+0x40/0x58
[   24.922149]  __kasan_kmalloc+0xd4/0xd8
[   24.925882]  __kmalloc_cache_noprof+0x144/0x328
[   24.930396]  krealloc_uaf+0xc8/0x510
[   24.933954]  kunit_try_run_case+0x14c/0x3d0
[   24.938121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.943590]  kthread+0x24c/0x2d0
[   24.946802]  ret_from_fork+0x10/0x20
[   24.950361] 
[   24.951838] Freed by task 201:
[   24.954876]  kasan_save_stack+0x3c/0x68
[   24.958693]  kasan_save_track+0x20/0x40
[   24.962513]  kasan_save_free_info+0x4c/0x78
[   24.966680]  __kasan_slab_free+0x6c/0x98
[   24.970587]  kfree+0x110/0x3b8
[   24.973624]  krealloc_uaf+0x130/0x510
[   24.977270]  kunit_try_run_case+0x14c/0x3d0
[   24.981436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.986905]  kthread+0x24c/0x2d0
[   24.990117]  ret_from_fork+0x10/0x20
[   24.993676] 
[   24.995154] The buggy address belongs to the object at ffff000801773800
[   24.995154]  which belongs to the cache kmalloc-256 of size 256
[   25.007654] The buggy address is located 0 bytes inside of
[   25.007654]  freed 256-byte region [ffff000801773800, ffff000801773900)
[   25.019717] 
[   25.021196] The buggy address belongs to the physical page:
[   25.026754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881770
[   25.034737] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.042377] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.049319] page_type: f5(slab)
[   25.052455] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.060174] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.067900] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.075712] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.083526] head: 0bfffe0000000002 fffffdffe005dc01 ffffffffffffffff 0000000000000000
[   25.091336] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.099143] page dumped because: kasan: bad access detected
[   25.104698] 
[   25.106174] Memory state around the buggy address:
[   25.110956]  ffff000801773700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.118157]  ffff000801773780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.125363] >ffff000801773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.132563]                    ^
[   25.135778]  ffff000801773880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.142983]  ffff000801773900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.150185] ==================================================================

test log snippet test parser 110

Home

[   25.157613] ==================================================================
[   25.164600] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510
[   25.171192] Read of size 1 at addr ffff000801773800 by task kunit_try_catch/201
[   25.178482] 
[   25.179966] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   25.189079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.193240] Hardware name: WinLink E850-96 board (DT)
[   25.198276] Call trace:
[   25.200704]  dump_backtrace+0x9c/0x128
[   25.204437]  show_stack+0x20/0x38
[   25.207735]  dump_stack_lvl+0x8c/0xd0
[   25.211381]  print_report+0x118/0x5e0
[   25.215027]  kasan_report+0xc8/0x118
[   25.218586]  __asan_report_load1_noabort+0x20/0x30
[   25.223360]  krealloc_uaf+0x4c4/0x510
[   25.227006]  kunit_try_run_case+0x14c/0x3d0
[   25.231173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.236641]  kthread+0x24c/0x2d0
[   25.239853]  ret_from_fork+0x10/0x20
[   25.243416] 
[   25.244887] Allocated by task 201:
[   25.248273]  kasan_save_stack+0x3c/0x68
[   25.252092]  kasan_save_track+0x20/0x40
[   25.255913]  kasan_save_alloc_info+0x40/0x58
[   25.260165]  __kasan_kmalloc+0xd4/0xd8
[   25.263898]  __kmalloc_cache_noprof+0x144/0x328
[   25.268412]  krealloc_uaf+0xc8/0x510
[   25.271970]  kunit_try_run_case+0x14c/0x3d0
[   25.276137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.281606]  kthread+0x24c/0x2d0
[   25.284818]  ret_from_fork+0x10/0x20
[   25.288376] 
[   25.289852] Freed by task 201:
[   25.292890]  kasan_save_stack+0x3c/0x68
[   25.296710]  kasan_save_track+0x20/0x40
[   25.300529]  kasan_save_free_info+0x4c/0x78
[   25.304696]  __kasan_slab_free+0x6c/0x98
[   25.308602]  kfree+0x110/0x3b8
[   25.311640]  krealloc_uaf+0x130/0x510
[   25.315286]  kunit_try_run_case+0x14c/0x3d0
[   25.319452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.324921]  kthread+0x24c/0x2d0
[   25.328133]  ret_from_fork+0x10/0x20
[   25.331692] 
[   25.333169] The buggy address belongs to the object at ffff000801773800
[   25.333169]  which belongs to the cache kmalloc-256 of size 256
[   25.345668] The buggy address is located 0 bytes inside of
[   25.345668]  freed 256-byte region [ffff000801773800, ffff000801773900)
[   25.357733] 
[   25.359209] The buggy address belongs to the physical page:
[   25.364768] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881770
[   25.372750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.380392] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.387334] page_type: f5(slab)
[   25.390468] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.398190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.405915] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.413727] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.421540] head: 0bfffe0000000002 fffffdffe005dc01 ffffffffffffffff 0000000000000000
[   25.429352] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.437159] page dumped because: kasan: bad access detected
[   25.442714] 
[   25.444190] Memory state around the buggy address:
[   25.448970]  ffff000801773700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.456173]  ffff000801773780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.463377] >ffff000801773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.470578]                    ^
[   25.473793]  ffff000801773880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.480999]  ffff000801773900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.488200] ==================================================================

test log snippet test parser 111

Home

[   24.813594] ==================================================================
[   24.823544] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510
[   24.830139] Read of size 1 at addr ffff000801773800 by task kunit_try_catch/201
[   24.837428] 
[   24.838912] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   24.848026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.852186] Hardware name: WinLink E850-96 board (DT)
[   24.857224] Call trace:
[   24.859653]  dump_backtrace+0x9c/0x128
[   24.863383]  show_stack+0x20/0x38
[   24.866682]  dump_stack_lvl+0x8c/0xd0
[   24.870327]  print_report+0x118/0x5e0
[   24.873973]  kasan_report+0xc8/0x118
[   24.877532]  __kasan_check_byte+0x54/0x70
[   24.881525]  krealloc_noprof+0x48/0x1a0
[   24.885344]  krealloc_uaf+0x18c/0x510
[   24.888990]  kunit_try_run_case+0x14c/0x3d0
[   24.893157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.898625]  kthread+0x24c/0x2d0
[   24.901837]  ret_from_fork+0x10/0x20
[   24.905399] 
[   24.906873] Allocated by task 201:
[   24.910261]  kasan_save_stack+0x3c/0x68
[   24.914076]  kasan_save_track+0x20/0x40
[   24.917897]  kasan_save_alloc_info+0x40/0x58
[   24.922149]  __kasan_kmalloc+0xd4/0xd8
[   24.925882]  __kmalloc_cache_noprof+0x144/0x328
[   24.930396]  krealloc_uaf+0xc8/0x510
[   24.933954]  kunit_try_run_case+0x14c/0x3d0
[   24.938121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.943590]  kthread+0x24c/0x2d0
[   24.946802]  ret_from_fork+0x10/0x20
[   24.950361] 
[   24.951838] Freed by task 201:
[   24.954876]  kasan_save_stack+0x3c/0x68
[   24.958693]  kasan_save_track+0x20/0x40
[   24.962513]  kasan_save_free_info+0x4c/0x78
[   24.966680]  __kasan_slab_free+0x6c/0x98
[   24.970587]  kfree+0x110/0x3b8
[   24.973624]  krealloc_uaf+0x130/0x510
[   24.977270]  kunit_try_run_case+0x14c/0x3d0
[   24.981436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.986905]  kthread+0x24c/0x2d0
[   24.990117]  ret_from_fork+0x10/0x20
[   24.993676] 
[   24.995154] The buggy address belongs to the object at ffff000801773800
[   24.995154]  which belongs to the cache kmalloc-256 of size 256
[   25.007654] The buggy address is located 0 bytes inside of
[   25.007654]  freed 256-byte region [ffff000801773800, ffff000801773900)
[   25.019717] 
[   25.021196] The buggy address belongs to the physical page:
[   25.026754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881770
[   25.034737] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.042377] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.049319] page_type: f5(slab)
[   25.052455] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.060174] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.067900] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   25.075712] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.083526] head: 0bfffe0000000002 fffffdffe005dc01 ffffffffffffffff 0000000000000000
[   25.091336] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.099143] page dumped because: kasan: bad access detected
[   25.104698] 
[   25.106174] Memory state around the buggy address:
[   25.110956]  ffff000801773700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.118157]  ffff000801773780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.125363] >ffff000801773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.132563]                    ^
[   25.135778]  ffff000801773880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.142983]  ffff000801773900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.150185] ==================================================================

test log snippet test parser 112

Home

[   31.277230] ==================================================================
[   31.284214] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0
[   31.290544] Read of size 1 at addr ffff000801f6e278 by task kunit_try_catch/233
[   31.297835] 
[   31.299320] CPU: 7 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.308430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.312593] Hardware name: WinLink E850-96 board (DT)
[   31.317630] Call trace:
[   31.320058]  dump_backtrace+0x9c/0x128
[   31.323789]  show_stack+0x20/0x38
[   31.327088]  dump_stack_lvl+0x8c/0xd0
[   31.330734]  print_report+0x118/0x5e0
[   31.334379]  kasan_report+0xc8/0x118
[   31.337939]  __asan_report_load1_noabort+0x20/0x30
[   31.342713]  ksize_uaf+0x53c/0x5d0
[   31.346098]  kunit_try_run_case+0x14c/0x3d0
[   31.350264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.355733]  kthread+0x24c/0x2d0
[   31.358945]  ret_from_fork+0x10/0x20
[   31.362508] 
[   31.363979] Allocated by task 233:
[   31.367366]  kasan_save_stack+0x3c/0x68
[   31.371185]  kasan_save_track+0x20/0x40
[   31.375004]  kasan_save_alloc_info+0x40/0x58
[   31.379257]  __kasan_kmalloc+0xd4/0xd8
[   31.382990]  __kmalloc_cache_noprof+0x144/0x328
[   31.387504]  ksize_uaf+0xb8/0x5d0
[   31.390802]  kunit_try_run_case+0x14c/0x3d0
[   31.394968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.400438]  kthread+0x24c/0x2d0
[   31.403649]  ret_from_fork+0x10/0x20
[   31.407208] 
[   31.408684] Freed by task 233:
[   31.411722]  kasan_save_stack+0x3c/0x68
[   31.415541]  kasan_save_track+0x20/0x40
[   31.419361]  kasan_save_free_info+0x4c/0x78
[   31.423527]  __kasan_slab_free+0x6c/0x98
[   31.427434]  kfree+0x110/0x3b8
[   31.430472]  ksize_uaf+0x120/0x5d0
[   31.433857]  kunit_try_run_case+0x14c/0x3d0
[   31.438023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.443492]  kthread+0x24c/0x2d0
[   31.446704]  ret_from_fork+0x10/0x20
[   31.450263] 
[   31.451740] The buggy address belongs to the object at ffff000801f6e200
[   31.451740]  which belongs to the cache kmalloc-128 of size 128
[   31.464240] The buggy address is located 120 bytes inside of
[   31.464240]  freed 128-byte region [ffff000801f6e200, ffff000801f6e280)
[   31.476478] 
[   31.477957] The buggy address belongs to the physical page:
[   31.483513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   31.491495] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.499137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.506078] page_type: f5(slab)
[   31.509213] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.516935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.524661] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.532472] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.540285] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   31.548097] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.555904] page dumped because: kasan: bad access detected
[   31.561459] 
[   31.562935] Memory state around the buggy address:
[   31.567715]  ffff000801f6e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.574918]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.582123] >ffff000801f6e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.589323]                                                                 ^
[   31.596445]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.603649]  ffff000801f6e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.610851] ==================================================================
[   30.940311] ==================================================================
[   30.947240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0
[   30.953569] Read of size 1 at addr ffff000801f6e200 by task kunit_try_catch/233
[   30.960860] 
[   30.962344] CPU: 6 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.971457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.975619] Hardware name: WinLink E850-96 board (DT)
[   30.980656] Call trace:
[   30.983082]  dump_backtrace+0x9c/0x128
[   30.986815]  show_stack+0x20/0x38
[   30.990114]  dump_stack_lvl+0x8c/0xd0
[   30.993760]  print_report+0x118/0x5e0
[   30.997405]  kasan_report+0xc8/0x118
[   31.000965]  __asan_report_load1_noabort+0x20/0x30
[   31.005738]  ksize_uaf+0x578/0x5d0
[   31.009124]  kunit_try_run_case+0x14c/0x3d0
[   31.013290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.018759]  kthread+0x24c/0x2d0
[   31.021971]  ret_from_fork+0x10/0x20
[   31.025534] 
[   31.027005] Allocated by task 233:
[   31.030392]  kasan_save_stack+0x3c/0x68
[   31.034210]  kasan_save_track+0x20/0x40
[   31.038030]  kasan_save_alloc_info+0x40/0x58
[   31.042283]  __kasan_kmalloc+0xd4/0xd8
[   31.046015]  __kmalloc_cache_noprof+0x144/0x328
[   31.050529]  ksize_uaf+0xb8/0x5d0
[   31.053828]  kunit_try_run_case+0x14c/0x3d0
[   31.057994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.063463]  kthread+0x24c/0x2d0
[   31.066675]  ret_from_fork+0x10/0x20
[   31.070234] 
[   31.071710] Freed by task 233:
[   31.074748]  kasan_save_stack+0x3c/0x68
[   31.078567]  kasan_save_track+0x20/0x40
[   31.082387]  kasan_save_free_info+0x4c/0x78
[   31.086553]  __kasan_slab_free+0x6c/0x98
[   31.090460]  kfree+0x110/0x3b8
[   31.093498]  ksize_uaf+0x120/0x5d0
[   31.096883]  kunit_try_run_case+0x14c/0x3d0
[   31.101049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.106518]  kthread+0x24c/0x2d0
[   31.109730]  ret_from_fork+0x10/0x20
[   31.113289] 
[   31.114766] The buggy address belongs to the object at ffff000801f6e200
[   31.114766]  which belongs to the cache kmalloc-128 of size 128
[   31.127268] The buggy address is located 0 bytes inside of
[   31.127268]  freed 128-byte region [ffff000801f6e200, ffff000801f6e280)
[   31.139330] 
[   31.140808] The buggy address belongs to the physical page:
[   31.146365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   31.154349] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.161988] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.168931] page_type: f5(slab)
[   31.172067] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.179787] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.187513] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.195325] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.203138] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   31.210949] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.218756] page dumped because: kasan: bad access detected
[   31.224312] 
[   31.225787] Memory state around the buggy address:
[   31.230566]  ffff000801f6e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.237769]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.244974] >ffff000801f6e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.252176]                    ^
[   31.255391]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.262595]  ffff000801f6e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.269797] ==================================================================
[   30.598433] ==================================================================
[   30.608181] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0
[   30.614515] Read of size 1 at addr ffff000801f6e200 by task kunit_try_catch/233
[   30.621803] 
[   30.623289] CPU: 6 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.632403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.636561] Hardware name: WinLink E850-96 board (DT)
[   30.641600] Call trace:
[   30.644028]  dump_backtrace+0x9c/0x128
[   30.647758]  show_stack+0x20/0x38
[   30.651057]  dump_stack_lvl+0x8c/0xd0
[   30.654702]  print_report+0x118/0x5e0
[   30.658348]  kasan_report+0xc8/0x118
[   30.661907]  __kasan_check_byte+0x54/0x70
[   30.665900]  ksize+0x30/0x88
[   30.668764]  ksize_uaf+0x174/0x5d0
[   30.672150]  kunit_try_run_case+0x14c/0x3d0
[   30.676316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681785]  kthread+0x24c/0x2d0
[   30.684997]  ret_from_fork+0x10/0x20
[   30.688560] 
[   30.690033] Allocated by task 233:
[   30.693420]  kasan_save_stack+0x3c/0x68
[   30.697236]  kasan_save_track+0x20/0x40
[   30.701055]  kasan_save_alloc_info+0x40/0x58
[   30.705309]  __kasan_kmalloc+0xd4/0xd8
[   30.709043]  __kmalloc_cache_noprof+0x144/0x328
[   30.713555]  ksize_uaf+0xb8/0x5d0
[   30.716854]  kunit_try_run_case+0x14c/0x3d0
[   30.721020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.726489]  kthread+0x24c/0x2d0
[   30.729701]  ret_from_fork+0x10/0x20
[   30.733260] 
[   30.734737] Freed by task 233:
[   30.737774]  kasan_save_stack+0x3c/0x68
[   30.741593]  kasan_save_track+0x20/0x40
[   30.745412]  kasan_save_free_info+0x4c/0x78
[   30.749579]  __kasan_slab_free+0x6c/0x98
[   30.753485]  kfree+0x110/0x3b8
[   30.756523]  ksize_uaf+0x120/0x5d0
[   30.759909]  kunit_try_run_case+0x14c/0x3d0
[   30.764075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.769544]  kthread+0x24c/0x2d0
[   30.772756]  ret_from_fork+0x10/0x20
[   30.776315] 
[   30.777792] The buggy address belongs to the object at ffff000801f6e200
[   30.777792]  which belongs to the cache kmalloc-128 of size 128
[   30.790293] The buggy address is located 0 bytes inside of
[   30.790293]  freed 128-byte region [ffff000801f6e200, ffff000801f6e280)
[   30.802356] 
[   30.803834] The buggy address belongs to the physical page:
[   30.809393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   30.817375] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.825015] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.831957] page_type: f5(slab)
[   30.835097] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.842813] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.850539] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.858351] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.866165] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   30.873975] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.881782] page dumped because: kasan: bad access detected
[   30.887337] 
[   30.888813] Memory state around the buggy address:
[   30.893593]  ffff000801f6e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.900796]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.908002] >ffff000801f6e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.915202]                    ^
[   30.918416]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.925622]  ffff000801f6e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.932825] ==================================================================

test log snippet test parser 113

Home

[   30.940311] ==================================================================
[   30.947240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0
[   30.953569] Read of size 1 at addr ffff000801f6e200 by task kunit_try_catch/233
[   30.960860] 
[   30.962344] CPU: 6 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.971457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.975619] Hardware name: WinLink E850-96 board (DT)
[   30.980656] Call trace:
[   30.983082]  dump_backtrace+0x9c/0x128
[   30.986815]  show_stack+0x20/0x38
[   30.990114]  dump_stack_lvl+0x8c/0xd0
[   30.993760]  print_report+0x118/0x5e0
[   30.997405]  kasan_report+0xc8/0x118
[   31.000965]  __asan_report_load1_noabort+0x20/0x30
[   31.005738]  ksize_uaf+0x578/0x5d0
[   31.009124]  kunit_try_run_case+0x14c/0x3d0
[   31.013290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.018759]  kthread+0x24c/0x2d0
[   31.021971]  ret_from_fork+0x10/0x20
[   31.025534] 
[   31.027005] Allocated by task 233:
[   31.030392]  kasan_save_stack+0x3c/0x68
[   31.034210]  kasan_save_track+0x20/0x40
[   31.038030]  kasan_save_alloc_info+0x40/0x58
[   31.042283]  __kasan_kmalloc+0xd4/0xd8
[   31.046015]  __kmalloc_cache_noprof+0x144/0x328
[   31.050529]  ksize_uaf+0xb8/0x5d0
[   31.053828]  kunit_try_run_case+0x14c/0x3d0
[   31.057994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.063463]  kthread+0x24c/0x2d0
[   31.066675]  ret_from_fork+0x10/0x20
[   31.070234] 
[   31.071710] Freed by task 233:
[   31.074748]  kasan_save_stack+0x3c/0x68
[   31.078567]  kasan_save_track+0x20/0x40
[   31.082387]  kasan_save_free_info+0x4c/0x78
[   31.086553]  __kasan_slab_free+0x6c/0x98
[   31.090460]  kfree+0x110/0x3b8
[   31.093498]  ksize_uaf+0x120/0x5d0
[   31.096883]  kunit_try_run_case+0x14c/0x3d0
[   31.101049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.106518]  kthread+0x24c/0x2d0
[   31.109730]  ret_from_fork+0x10/0x20
[   31.113289] 
[   31.114766] The buggy address belongs to the object at ffff000801f6e200
[   31.114766]  which belongs to the cache kmalloc-128 of size 128
[   31.127268] The buggy address is located 0 bytes inside of
[   31.127268]  freed 128-byte region [ffff000801f6e200, ffff000801f6e280)
[   31.139330] 
[   31.140808] The buggy address belongs to the physical page:
[   31.146365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   31.154349] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.161988] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.168931] page_type: f5(slab)
[   31.172067] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.179787] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.187513] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.195325] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.203138] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   31.210949] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.218756] page dumped because: kasan: bad access detected
[   31.224312] 
[   31.225787] Memory state around the buggy address:
[   31.230566]  ffff000801f6e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.237769]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.244974] >ffff000801f6e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.252176]                    ^
[   31.255391]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.262595]  ffff000801f6e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.269797] ==================================================================

test log snippet test parser 114

Home

[   31.277230] ==================================================================
[   31.284214] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0
[   31.290544] Read of size 1 at addr ffff000801f6e278 by task kunit_try_catch/233
[   31.297835] 
[   31.299320] CPU: 7 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   31.308430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.312593] Hardware name: WinLink E850-96 board (DT)
[   31.317630] Call trace:
[   31.320058]  dump_backtrace+0x9c/0x128
[   31.323789]  show_stack+0x20/0x38
[   31.327088]  dump_stack_lvl+0x8c/0xd0
[   31.330734]  print_report+0x118/0x5e0
[   31.334379]  kasan_report+0xc8/0x118
[   31.337939]  __asan_report_load1_noabort+0x20/0x30
[   31.342713]  ksize_uaf+0x53c/0x5d0
[   31.346098]  kunit_try_run_case+0x14c/0x3d0
[   31.350264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.355733]  kthread+0x24c/0x2d0
[   31.358945]  ret_from_fork+0x10/0x20
[   31.362508] 
[   31.363979] Allocated by task 233:
[   31.367366]  kasan_save_stack+0x3c/0x68
[   31.371185]  kasan_save_track+0x20/0x40
[   31.375004]  kasan_save_alloc_info+0x40/0x58
[   31.379257]  __kasan_kmalloc+0xd4/0xd8
[   31.382990]  __kmalloc_cache_noprof+0x144/0x328
[   31.387504]  ksize_uaf+0xb8/0x5d0
[   31.390802]  kunit_try_run_case+0x14c/0x3d0
[   31.394968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.400438]  kthread+0x24c/0x2d0
[   31.403649]  ret_from_fork+0x10/0x20
[   31.407208] 
[   31.408684] Freed by task 233:
[   31.411722]  kasan_save_stack+0x3c/0x68
[   31.415541]  kasan_save_track+0x20/0x40
[   31.419361]  kasan_save_free_info+0x4c/0x78
[   31.423527]  __kasan_slab_free+0x6c/0x98
[   31.427434]  kfree+0x110/0x3b8
[   31.430472]  ksize_uaf+0x120/0x5d0
[   31.433857]  kunit_try_run_case+0x14c/0x3d0
[   31.438023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.443492]  kthread+0x24c/0x2d0
[   31.446704]  ret_from_fork+0x10/0x20
[   31.450263] 
[   31.451740] The buggy address belongs to the object at ffff000801f6e200
[   31.451740]  which belongs to the cache kmalloc-128 of size 128
[   31.464240] The buggy address is located 120 bytes inside of
[   31.464240]  freed 128-byte region [ffff000801f6e200, ffff000801f6e280)
[   31.476478] 
[   31.477957] The buggy address belongs to the physical page:
[   31.483513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   31.491495] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.499137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.506078] page_type: f5(slab)
[   31.509213] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.516935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.524661] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.532472] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.540285] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   31.548097] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.555904] page dumped because: kasan: bad access detected
[   31.561459] 
[   31.562935] Memory state around the buggy address:
[   31.567715]  ffff000801f6e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.574918]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.582123] >ffff000801f6e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.589323]                                                                 ^
[   31.596445]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.603649]  ffff000801f6e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.610851] ==================================================================

test log snippet test parser 115

Home

[   30.598433] ==================================================================
[   30.608181] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0
[   30.614515] Read of size 1 at addr ffff000801f6e200 by task kunit_try_catch/233
[   30.621803] 
[   30.623289] CPU: 6 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   30.632403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.636561] Hardware name: WinLink E850-96 board (DT)
[   30.641600] Call trace:
[   30.644028]  dump_backtrace+0x9c/0x128
[   30.647758]  show_stack+0x20/0x38
[   30.651057]  dump_stack_lvl+0x8c/0xd0
[   30.654702]  print_report+0x118/0x5e0
[   30.658348]  kasan_report+0xc8/0x118
[   30.661907]  __kasan_check_byte+0x54/0x70
[   30.665900]  ksize+0x30/0x88
[   30.668764]  ksize_uaf+0x174/0x5d0
[   30.672150]  kunit_try_run_case+0x14c/0x3d0
[   30.676316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681785]  kthread+0x24c/0x2d0
[   30.684997]  ret_from_fork+0x10/0x20
[   30.688560] 
[   30.690033] Allocated by task 233:
[   30.693420]  kasan_save_stack+0x3c/0x68
[   30.697236]  kasan_save_track+0x20/0x40
[   30.701055]  kasan_save_alloc_info+0x40/0x58
[   30.705309]  __kasan_kmalloc+0xd4/0xd8
[   30.709043]  __kmalloc_cache_noprof+0x144/0x328
[   30.713555]  ksize_uaf+0xb8/0x5d0
[   30.716854]  kunit_try_run_case+0x14c/0x3d0
[   30.721020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.726489]  kthread+0x24c/0x2d0
[   30.729701]  ret_from_fork+0x10/0x20
[   30.733260] 
[   30.734737] Freed by task 233:
[   30.737774]  kasan_save_stack+0x3c/0x68
[   30.741593]  kasan_save_track+0x20/0x40
[   30.745412]  kasan_save_free_info+0x4c/0x78
[   30.749579]  __kasan_slab_free+0x6c/0x98
[   30.753485]  kfree+0x110/0x3b8
[   30.756523]  ksize_uaf+0x120/0x5d0
[   30.759909]  kunit_try_run_case+0x14c/0x3d0
[   30.764075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.769544]  kthread+0x24c/0x2d0
[   30.772756]  ret_from_fork+0x10/0x20
[   30.776315] 
[   30.777792] The buggy address belongs to the object at ffff000801f6e200
[   30.777792]  which belongs to the cache kmalloc-128 of size 128
[   30.790293] The buggy address is located 0 bytes inside of
[   30.790293]  freed 128-byte region [ffff000801f6e200, ffff000801f6e280)
[   30.802356] 
[   30.803834] The buggy address belongs to the physical page:
[   30.809393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f6e
[   30.817375] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.825015] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.831957] page_type: f5(slab)
[   30.835097] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.842813] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.850539] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.858351] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.866165] head: 0bfffe0000000001 fffffdffe007db81 ffffffffffffffff 0000000000000000
[   30.873975] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.881782] page dumped because: kasan: bad access detected
[   30.887337] 
[   30.888813] Memory state around the buggy address:
[   30.893593]  ffff000801f6e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.900796]  ffff000801f6e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.908002] >ffff000801f6e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.915202]                    ^
[   30.918416]  ffff000801f6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.925622]  ffff000801f6e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.932825] ==================================================================

test log snippet test parser 116

Home

[   36.142832] ==================================================================
[   36.152279] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   36.159399] Read of size 1 at addr ffff0008052f2240 by task kunit_try_catch/268
[   36.166687] 
[   36.168170] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.177284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.181443] Hardware name: WinLink E850-96 board (DT)
[   36.186480] Call trace:
[   36.188909]  dump_backtrace+0x9c/0x128
[   36.192640]  show_stack+0x20/0x38
[   36.195938]  dump_stack_lvl+0x8c/0xd0
[   36.199584]  print_report+0x118/0x5e0
[   36.203230]  kasan_report+0xc8/0x118
[   36.206789]  __asan_report_load1_noabort+0x20/0x30
[   36.211563]  mempool_uaf_helper+0x320/0x348
[   36.215731]  mempool_slab_uaf+0xb8/0x110
[   36.219636]  kunit_try_run_case+0x14c/0x3d0
[   36.223802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.229271]  kthread+0x24c/0x2d0
[   36.232483]  ret_from_fork+0x10/0x20
[   36.236045] 
[   36.237519] Allocated by task 268:
[   36.240906]  kasan_save_stack+0x3c/0x68
[   36.244722]  kasan_save_track+0x20/0x40
[   36.248542]  kasan_save_alloc_info+0x40/0x58
[   36.252795]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.258005]  remove_element+0x16c/0x1f8
[   36.261823]  mempool_alloc_preallocated+0x58/0xc0
[   36.266510]  mempool_uaf_helper+0xa4/0x348
[   36.270590]  mempool_slab_uaf+0xb8/0x110
[   36.274496]  kunit_try_run_case+0x14c/0x3d0
[   36.278663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.284131]  kthread+0x24c/0x2d0
[   36.287343]  ret_from_fork+0x10/0x20
[   36.290902] 
[   36.292379] Freed by task 268:
[   36.295417]  kasan_save_stack+0x3c/0x68
[   36.299235]  kasan_save_track+0x20/0x40
[   36.303055]  kasan_save_free_info+0x4c/0x78
[   36.307221]  __kasan_mempool_poison_object+0xc0/0x150
[   36.312256]  mempool_free+0x28c/0x328
[   36.315902]  mempool_uaf_helper+0x108/0x348
[   36.320068]  mempool_slab_uaf+0xb8/0x110
[   36.323975]  kunit_try_run_case+0x14c/0x3d0
[   36.328141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.333610]  kthread+0x24c/0x2d0
[   36.336822]  ret_from_fork+0x10/0x20
[   36.340381] 
[   36.341857] The buggy address belongs to the object at ffff0008052f2240
[   36.341857]  which belongs to the cache test_cache of size 123
[   36.354271] The buggy address is located 0 bytes inside of
[   36.354271]  freed 123-byte region [ffff0008052f2240, ffff0008052f22bb)
[   36.366335] 
[   36.367813] The buggy address belongs to the physical page:
[   36.373371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8852f2
[   36.381354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.387864] page_type: f5(slab)
[   36.391002] raw: 0bfffe0000000000 ffff000801fb03c0 dead000000000122 0000000000000000
[   36.398719] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   36.406439] page dumped because: kasan: bad access detected
[   36.411994] 
[   36.413469] Memory state around the buggy address:
[   36.418250]  ffff0008052f2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.425452]  ffff0008052f2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.432658] >ffff0008052f2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   36.439858]                                            ^
[   36.445157]  ffff0008052f2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.452361]  ffff0008052f2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.459564] ==================================================================
[   35.551720] ==================================================================
[   35.558018] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   35.565135] Read of size 1 at addr ffff000801fac900 by task kunit_try_catch/264
[   35.572425] 
[   35.573909] CPU: 7 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.583022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.587181] Hardware name: WinLink E850-96 board (DT)
[   35.592219] Call trace:
[   35.594647]  dump_backtrace+0x9c/0x128
[   35.598378]  show_stack+0x20/0x38
[   35.601677]  dump_stack_lvl+0x8c/0xd0
[   35.605324]  print_report+0x118/0x5e0
[   35.608968]  kasan_report+0xc8/0x118
[   35.612527]  __asan_report_load1_noabort+0x20/0x30
[   35.617301]  mempool_uaf_helper+0x320/0x348
[   35.621468]  mempool_kmalloc_uaf+0xbc/0x118
[   35.625634]  kunit_try_run_case+0x14c/0x3d0
[   35.629801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.635269]  kthread+0x24c/0x2d0
[   35.638481]  ret_from_fork+0x10/0x20
[   35.642045] 
[   35.643517] Allocated by task 264:
[   35.646905]  kasan_save_stack+0x3c/0x68
[   35.650721]  kasan_save_track+0x20/0x40
[   35.654541]  kasan_save_alloc_info+0x40/0x58
[   35.658794]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.664089]  remove_element+0x130/0x1f8
[   35.667908]  mempool_alloc_preallocated+0x58/0xc0
[   35.672596]  mempool_uaf_helper+0xa4/0x348
[   35.676675]  mempool_kmalloc_uaf+0xbc/0x118
[   35.680842]  kunit_try_run_case+0x14c/0x3d0
[   35.685008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.690477]  kthread+0x24c/0x2d0
[   35.693689]  ret_from_fork+0x10/0x20
[   35.697248] 
[   35.698725] Freed by task 264:
[   35.701762]  kasan_save_stack+0x3c/0x68
[   35.705581]  kasan_save_track+0x20/0x40
[   35.709400]  kasan_save_free_info+0x4c/0x78
[   35.713567]  __kasan_mempool_poison_object+0xc0/0x150
[   35.718602]  mempool_free+0x28c/0x328
[   35.722248]  mempool_uaf_helper+0x108/0x348
[   35.726416]  mempool_kmalloc_uaf+0xbc/0x118
[   35.730581]  kunit_try_run_case+0x14c/0x3d0
[   35.734747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.740216]  kthread+0x24c/0x2d0
[   35.743428]  ret_from_fork+0x10/0x20
[   35.746987] 
[   35.748464] The buggy address belongs to the object at ffff000801fac900
[   35.748464]  which belongs to the cache kmalloc-128 of size 128
[   35.760964] The buggy address is located 0 bytes inside of
[   35.760964]  freed 128-byte region [ffff000801fac900, ffff000801fac980)
[   35.773028] 
[   35.774507] The buggy address belongs to the physical page:
[   35.780065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   35.788047] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.795687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.802628] page_type: f5(slab)
[   35.805767] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.813485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.821211] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.829022] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.836835] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   35.844647] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.852454] page dumped because: kasan: bad access detected
[   35.858009] 
[   35.859485] Memory state around the buggy address:
[   35.864267]  ffff000801fac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.871469]  ffff000801fac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.878674] >ffff000801fac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.885873]                    ^
[   35.889088]  ffff000801fac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.896293]  ffff000801faca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.903495] ==================================================================

test log snippet test parser 117

Home

[   35.551720] ==================================================================
[   35.558018] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   35.565135] Read of size 1 at addr ffff000801fac900 by task kunit_try_catch/264
[   35.572425] 
[   35.573909] CPU: 7 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.583022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.587181] Hardware name: WinLink E850-96 board (DT)
[   35.592219] Call trace:
[   35.594647]  dump_backtrace+0x9c/0x128
[   35.598378]  show_stack+0x20/0x38
[   35.601677]  dump_stack_lvl+0x8c/0xd0
[   35.605324]  print_report+0x118/0x5e0
[   35.608968]  kasan_report+0xc8/0x118
[   35.612527]  __asan_report_load1_noabort+0x20/0x30
[   35.617301]  mempool_uaf_helper+0x320/0x348
[   35.621468]  mempool_kmalloc_uaf+0xbc/0x118
[   35.625634]  kunit_try_run_case+0x14c/0x3d0
[   35.629801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.635269]  kthread+0x24c/0x2d0
[   35.638481]  ret_from_fork+0x10/0x20
[   35.642045] 
[   35.643517] Allocated by task 264:
[   35.646905]  kasan_save_stack+0x3c/0x68
[   35.650721]  kasan_save_track+0x20/0x40
[   35.654541]  kasan_save_alloc_info+0x40/0x58
[   35.658794]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.664089]  remove_element+0x130/0x1f8
[   35.667908]  mempool_alloc_preallocated+0x58/0xc0
[   35.672596]  mempool_uaf_helper+0xa4/0x348
[   35.676675]  mempool_kmalloc_uaf+0xbc/0x118
[   35.680842]  kunit_try_run_case+0x14c/0x3d0
[   35.685008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.690477]  kthread+0x24c/0x2d0
[   35.693689]  ret_from_fork+0x10/0x20
[   35.697248] 
[   35.698725] Freed by task 264:
[   35.701762]  kasan_save_stack+0x3c/0x68
[   35.705581]  kasan_save_track+0x20/0x40
[   35.709400]  kasan_save_free_info+0x4c/0x78
[   35.713567]  __kasan_mempool_poison_object+0xc0/0x150
[   35.718602]  mempool_free+0x28c/0x328
[   35.722248]  mempool_uaf_helper+0x108/0x348
[   35.726416]  mempool_kmalloc_uaf+0xbc/0x118
[   35.730581]  kunit_try_run_case+0x14c/0x3d0
[   35.734747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.740216]  kthread+0x24c/0x2d0
[   35.743428]  ret_from_fork+0x10/0x20
[   35.746987] 
[   35.748464] The buggy address belongs to the object at ffff000801fac900
[   35.748464]  which belongs to the cache kmalloc-128 of size 128
[   35.760964] The buggy address is located 0 bytes inside of
[   35.760964]  freed 128-byte region [ffff000801fac900, ffff000801fac980)
[   35.773028] 
[   35.774507] The buggy address belongs to the physical page:
[   35.780065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881fac
[   35.788047] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.795687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.802628] page_type: f5(slab)
[   35.805767] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.813485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.821211] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.829022] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.836835] head: 0bfffe0000000001 fffffdffe007eb01 ffffffffffffffff 0000000000000000
[   35.844647] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.852454] page dumped because: kasan: bad access detected
[   35.858009] 
[   35.859485] Memory state around the buggy address:
[   35.864267]  ffff000801fac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.871469]  ffff000801fac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.878674] >ffff000801fac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.885873]                    ^
[   35.889088]  ffff000801fac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.896293]  ffff000801faca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.903495] ==================================================================

test log snippet test parser 118

Home

[   36.142832] ==================================================================
[   36.152279] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   36.159399] Read of size 1 at addr ffff0008052f2240 by task kunit_try_catch/268
[   36.166687] 
[   36.168170] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.177284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.181443] Hardware name: WinLink E850-96 board (DT)
[   36.186480] Call trace:
[   36.188909]  dump_backtrace+0x9c/0x128
[   36.192640]  show_stack+0x20/0x38
[   36.195938]  dump_stack_lvl+0x8c/0xd0
[   36.199584]  print_report+0x118/0x5e0
[   36.203230]  kasan_report+0xc8/0x118
[   36.206789]  __asan_report_load1_noabort+0x20/0x30
[   36.211563]  mempool_uaf_helper+0x320/0x348
[   36.215731]  mempool_slab_uaf+0xb8/0x110
[   36.219636]  kunit_try_run_case+0x14c/0x3d0
[   36.223802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.229271]  kthread+0x24c/0x2d0
[   36.232483]  ret_from_fork+0x10/0x20
[   36.236045] 
[   36.237519] Allocated by task 268:
[   36.240906]  kasan_save_stack+0x3c/0x68
[   36.244722]  kasan_save_track+0x20/0x40
[   36.248542]  kasan_save_alloc_info+0x40/0x58
[   36.252795]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.258005]  remove_element+0x16c/0x1f8
[   36.261823]  mempool_alloc_preallocated+0x58/0xc0
[   36.266510]  mempool_uaf_helper+0xa4/0x348
[   36.270590]  mempool_slab_uaf+0xb8/0x110
[   36.274496]  kunit_try_run_case+0x14c/0x3d0
[   36.278663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.284131]  kthread+0x24c/0x2d0
[   36.287343]  ret_from_fork+0x10/0x20
[   36.290902] 
[   36.292379] Freed by task 268:
[   36.295417]  kasan_save_stack+0x3c/0x68
[   36.299235]  kasan_save_track+0x20/0x40
[   36.303055]  kasan_save_free_info+0x4c/0x78
[   36.307221]  __kasan_mempool_poison_object+0xc0/0x150
[   36.312256]  mempool_free+0x28c/0x328
[   36.315902]  mempool_uaf_helper+0x108/0x348
[   36.320068]  mempool_slab_uaf+0xb8/0x110
[   36.323975]  kunit_try_run_case+0x14c/0x3d0
[   36.328141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.333610]  kthread+0x24c/0x2d0
[   36.336822]  ret_from_fork+0x10/0x20
[   36.340381] 
[   36.341857] The buggy address belongs to the object at ffff0008052f2240
[   36.341857]  which belongs to the cache test_cache of size 123
[   36.354271] The buggy address is located 0 bytes inside of
[   36.354271]  freed 123-byte region [ffff0008052f2240, ffff0008052f22bb)
[   36.366335] 
[   36.367813] The buggy address belongs to the physical page:
[   36.373371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8852f2
[   36.381354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.387864] page_type: f5(slab)
[   36.391002] raw: 0bfffe0000000000 ffff000801fb03c0 dead000000000122 0000000000000000
[   36.398719] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   36.406439] page dumped because: kasan: bad access detected
[   36.411994] 
[   36.413469] Memory state around the buggy address:
[   36.418250]  ffff0008052f2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.425452]  ffff0008052f2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.432658] >ffff0008052f2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   36.439858]                                            ^
[   36.445157]  ffff0008052f2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.452361]  ffff0008052f2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.459564] ==================================================================

test log snippet test parser 119

Home

[   31.666020] ==================================================================
[   31.666184] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.666302] Read of size 4 at addr ffff0008014204c0 by task swapper/0/0
[   31.667371] 
[   31.668855] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.12.10-rc1 #1
[   31.677273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.681434] Hardware name: WinLink E850-96 board (DT)
[   31.686471] Call trace:
[   31.688901]  dump_backtrace+0x9c/0x128
[   31.692631]  show_stack+0x20/0x38
[   31.695930]  dump_stack_lvl+0x8c/0xd0
[   31.699576]  print_report+0x118/0x5e0
[   31.703221]  kasan_report+0xc8/0x118
[   31.706780]  __asan_report_load4_noabort+0x20/0x30
[   31.711554]  rcu_uaf_reclaim+0x64/0x70
[   31.715287]  rcu_core+0xa54/0x1df8
[   31.718672]  rcu_core_si+0x18/0x30
[   31.722057]  handle_softirqs+0x36c/0xb18
[   31.725964]  __do_softirq+0x1c/0x28
[   31.729436]  ____do_softirq+0x18/0x30
[   31.733081]  call_on_irq_stack+0x24/0x58
[   31.736988]  do_softirq_own_stack+0x24/0x38
[   31.741154]  irq_exit_rcu+0x1a4/0x268
[   31.744800]  el1_interrupt+0x38/0x58
[   31.748359]  el1h_64_irq_handler+0x18/0x28
[   31.752439]  el1h_64_irq+0x64/0x68
[   31.755826]  arch_local_irq_enable+0x4/0x8
[   31.759904]  do_idle+0x388/0x4f0
[   31.763116]  cpu_startup_entry+0x64/0x80
[   31.767022]  rest_init+0x160/0x188
[   31.770409]  start_kernel+0x308/0x3d0
[   31.774053]  __primary_switched+0x84/0x98
[   31.778049] 
[   31.779523] Allocated by task 235:
[   31.782911]  kasan_save_stack+0x3c/0x68
[   31.786726]  kasan_save_track+0x20/0x40
[   31.790546]  kasan_save_alloc_info+0x40/0x58
[   31.794799]  __kasan_kmalloc+0xd4/0xd8
[   31.798532]  __kmalloc_cache_noprof+0x144/0x328
[   31.803046]  rcu_uaf+0xb8/0x2e0
[   31.806171]  kunit_try_run_case+0x14c/0x3d0
[   31.810337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.815806]  kthread+0x24c/0x2d0
[   31.819018]  ret_from_fork+0x10/0x20
[   31.822577] 
[   31.824054] Freed by task 0:
[   31.826918]  kasan_save_stack+0x3c/0x68
[   31.830736]  kasan_save_track+0x20/0x40
[   31.834556]  kasan_save_free_info+0x4c/0x78
[   31.838722]  __kasan_slab_free+0x6c/0x98
[   31.842629]  kfree+0x110/0x3b8
[   31.845667]  rcu_uaf_reclaim+0x28/0x70
[   31.849399]  rcu_core+0xa54/0x1df8
[   31.852785]  rcu_core_si+0x18/0x30
[   31.856170]  handle_softirqs+0x36c/0xb18
[   31.860076]  __do_softirq+0x1c/0x28
[   31.863549] 
[   31.865024] Last potentially related work creation:
[   31.869885]  kasan_save_stack+0x3c/0x68
[   31.873705]  __kasan_record_aux_stack+0xbc/0xe8
[   31.878220]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.883253]  __call_rcu_common.constprop.0+0x74/0xa18
[   31.888287]  call_rcu+0x18/0x30
[   31.891412]  rcu_uaf+0x150/0x2e0
[   31.894625]  kunit_try_run_case+0x14c/0x3d0
[   31.898791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.904260]  kthread+0x24c/0x2d0
[   31.907471]  ret_from_fork+0x10/0x20
[   31.911030] 
[   31.912509] The buggy address belongs to the object at ffff0008014204c0
[   31.912509]  which belongs to the cache kmalloc-32 of size 32
[   31.924835] The buggy address is located 0 bytes inside of
[   31.924835]  freed 32-byte region [ffff0008014204c0, ffff0008014204e0)
[   31.936811] 
[   31.938290] The buggy address belongs to the physical page:
[   31.943847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881420
[   31.951831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.958340] page_type: f5(slab)
[   31.961479] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   31.969195] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.976915] page dumped because: kasan: bad access detected
[   31.982470] 
[   31.983946] Memory state around the buggy address:
[   31.988727]  ffff000801420380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.995928]  ffff000801420400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.003134] >ffff000801420480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.010334]                                            ^
[   32.015633]  ffff000801420500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.022838]  ffff000801420580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.030039] ==================================================================

test log snippet test parser 120

Home

[   31.666020] ==================================================================
[   31.666184] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.666302] Read of size 4 at addr ffff0008014204c0 by task swapper/0/0
[   31.667371] 
[   31.668855] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.12.10-rc1 #1
[   31.677273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.681434] Hardware name: WinLink E850-96 board (DT)
[   31.686471] Call trace:
[   31.688901]  dump_backtrace+0x9c/0x128
[   31.692631]  show_stack+0x20/0x38
[   31.695930]  dump_stack_lvl+0x8c/0xd0
[   31.699576]  print_report+0x118/0x5e0
[   31.703221]  kasan_report+0xc8/0x118
[   31.706780]  __asan_report_load4_noabort+0x20/0x30
[   31.711554]  rcu_uaf_reclaim+0x64/0x70
[   31.715287]  rcu_core+0xa54/0x1df8
[   31.718672]  rcu_core_si+0x18/0x30
[   31.722057]  handle_softirqs+0x36c/0xb18
[   31.725964]  __do_softirq+0x1c/0x28
[   31.729436]  ____do_softirq+0x18/0x30
[   31.733081]  call_on_irq_stack+0x24/0x58
[   31.736988]  do_softirq_own_stack+0x24/0x38
[   31.741154]  irq_exit_rcu+0x1a4/0x268
[   31.744800]  el1_interrupt+0x38/0x58
[   31.748359]  el1h_64_irq_handler+0x18/0x28
[   31.752439]  el1h_64_irq+0x64/0x68
[   31.755826]  arch_local_irq_enable+0x4/0x8
[   31.759904]  do_idle+0x388/0x4f0
[   31.763116]  cpu_startup_entry+0x64/0x80
[   31.767022]  rest_init+0x160/0x188
[   31.770409]  start_kernel+0x308/0x3d0
[   31.774053]  __primary_switched+0x84/0x98
[   31.778049] 
[   31.779523] Allocated by task 235:
[   31.782911]  kasan_save_stack+0x3c/0x68
[   31.786726]  kasan_save_track+0x20/0x40
[   31.790546]  kasan_save_alloc_info+0x40/0x58
[   31.794799]  __kasan_kmalloc+0xd4/0xd8
[   31.798532]  __kmalloc_cache_noprof+0x144/0x328
[   31.803046]  rcu_uaf+0xb8/0x2e0
[   31.806171]  kunit_try_run_case+0x14c/0x3d0
[   31.810337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.815806]  kthread+0x24c/0x2d0
[   31.819018]  ret_from_fork+0x10/0x20
[   31.822577] 
[   31.824054] Freed by task 0:
[   31.826918]  kasan_save_stack+0x3c/0x68
[   31.830736]  kasan_save_track+0x20/0x40
[   31.834556]  kasan_save_free_info+0x4c/0x78
[   31.838722]  __kasan_slab_free+0x6c/0x98
[   31.842629]  kfree+0x110/0x3b8
[   31.845667]  rcu_uaf_reclaim+0x28/0x70
[   31.849399]  rcu_core+0xa54/0x1df8
[   31.852785]  rcu_core_si+0x18/0x30
[   31.856170]  handle_softirqs+0x36c/0xb18
[   31.860076]  __do_softirq+0x1c/0x28
[   31.863549] 
[   31.865024] Last potentially related work creation:
[   31.869885]  kasan_save_stack+0x3c/0x68
[   31.873705]  __kasan_record_aux_stack+0xbc/0xe8
[   31.878220]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.883253]  __call_rcu_common.constprop.0+0x74/0xa18
[   31.888287]  call_rcu+0x18/0x30
[   31.891412]  rcu_uaf+0x150/0x2e0
[   31.894625]  kunit_try_run_case+0x14c/0x3d0
[   31.898791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.904260]  kthread+0x24c/0x2d0
[   31.907471]  ret_from_fork+0x10/0x20
[   31.911030] 
[   31.912509] The buggy address belongs to the object at ffff0008014204c0
[   31.912509]  which belongs to the cache kmalloc-32 of size 32
[   31.924835] The buggy address is located 0 bytes inside of
[   31.924835]  freed 32-byte region [ffff0008014204c0, ffff0008014204e0)
[   31.936811] 
[   31.938290] The buggy address belongs to the physical page:
[   31.943847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881420
[   31.951831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.958340] page_type: f5(slab)
[   31.961479] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   31.969195] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.976915] page dumped because: kasan: bad access detected
[   31.982470] 
[   31.983946] Memory state around the buggy address:
[   31.988727]  ffff000801420380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.995928]  ffff000801420400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.003134] >ffff000801420480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.010334]                                            ^
[   32.015633]  ffff000801420500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.022838]  ffff000801420580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.030039] ==================================================================

test log snippet test parser 121

Home

[   39.458161] ==================================================================
[   39.467249] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   39.473149] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   39.480438] 
[   39.481924] CPU: 7 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   39.491036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.495196] Hardware name: WinLink E850-96 board (DT)
[   39.500234] Call trace:
[   39.502660]  dump_backtrace+0x9c/0x128
[   39.506392]  show_stack+0x20/0x38
[   39.509691]  dump_stack_lvl+0x8c/0xd0
[   39.513337]  print_report+0x118/0x5e0
[   39.516982]  kasan_report+0xc8/0x118
[   39.520541]  __asan_report_load1_noabort+0x20/0x30
[   39.525316]  strchr+0xcc/0xd8
[   39.528267]  kasan_strings+0x18c/0x938
[   39.532000]  kunit_try_run_case+0x14c/0x3d0
[   39.536166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.541634]  kthread+0x24c/0x2d0
[   39.544847]  ret_from_fork+0x10/0x20
[   39.548409] 
[   39.549883] Allocated by task 296:
[   39.553271]  kasan_save_stack+0x3c/0x68
[   39.557086]  kasan_save_track+0x20/0x40
[   39.560905]  kasan_save_alloc_info+0x40/0x58
[   39.565159]  __kasan_kmalloc+0xd4/0xd8
[   39.568891]  __kmalloc_cache_noprof+0x144/0x328
[   39.573405]  kasan_strings+0xb0/0x938
[   39.577051]  kunit_try_run_case+0x14c/0x3d0
[   39.581218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.586686]  kthread+0x24c/0x2d0
[   39.589898]  ret_from_fork+0x10/0x20
[   39.593457] 
[   39.594934] Freed by task 296:
[   39.597972]  kasan_save_stack+0x3c/0x68
[   39.601790]  kasan_save_track+0x20/0x40
[   39.605609]  kasan_save_free_info+0x4c/0x78
[   39.609776]  __kasan_slab_free+0x6c/0x98
[   39.613682]  kfree+0x110/0x3b8
[   39.616721]  kasan_strings+0x128/0x938
[   39.620454]  kunit_try_run_case+0x14c/0x3d0
[   39.624620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.630088]  kthread+0x24c/0x2d0
[   39.633300]  ret_from_fork+0x10/0x20
[   39.636859] 
[   39.638335] The buggy address belongs to the object at ffff000800ddfc40
[   39.638335]  which belongs to the cache kmalloc-32 of size 32
[   39.650663] The buggy address is located 16 bytes inside of
[   39.650663]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   39.662727] 
[   39.664205] The buggy address belongs to the physical page:
[   39.669763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   39.677746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.684256] page_type: f5(slab)
[   39.687393] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.695111] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.702831] page dumped because: kasan: bad access detected
[   39.708385] 
[   39.709861] Memory state around the buggy address:
[   39.714642]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.721844]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.729050] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.736250]                                                  ^
[   39.742070]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.749274]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.756475] ==================================================================

test log snippet test parser 122

Home

[   39.458161] ==================================================================
[   39.467249] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   39.473149] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   39.480438] 
[   39.481924] CPU: 7 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   39.491036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.495196] Hardware name: WinLink E850-96 board (DT)
[   39.500234] Call trace:
[   39.502660]  dump_backtrace+0x9c/0x128
[   39.506392]  show_stack+0x20/0x38
[   39.509691]  dump_stack_lvl+0x8c/0xd0
[   39.513337]  print_report+0x118/0x5e0
[   39.516982]  kasan_report+0xc8/0x118
[   39.520541]  __asan_report_load1_noabort+0x20/0x30
[   39.525316]  strchr+0xcc/0xd8
[   39.528267]  kasan_strings+0x18c/0x938
[   39.532000]  kunit_try_run_case+0x14c/0x3d0
[   39.536166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.541634]  kthread+0x24c/0x2d0
[   39.544847]  ret_from_fork+0x10/0x20
[   39.548409] 
[   39.549883] Allocated by task 296:
[   39.553271]  kasan_save_stack+0x3c/0x68
[   39.557086]  kasan_save_track+0x20/0x40
[   39.560905]  kasan_save_alloc_info+0x40/0x58
[   39.565159]  __kasan_kmalloc+0xd4/0xd8
[   39.568891]  __kmalloc_cache_noprof+0x144/0x328
[   39.573405]  kasan_strings+0xb0/0x938
[   39.577051]  kunit_try_run_case+0x14c/0x3d0
[   39.581218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.586686]  kthread+0x24c/0x2d0
[   39.589898]  ret_from_fork+0x10/0x20
[   39.593457] 
[   39.594934] Freed by task 296:
[   39.597972]  kasan_save_stack+0x3c/0x68
[   39.601790]  kasan_save_track+0x20/0x40
[   39.605609]  kasan_save_free_info+0x4c/0x78
[   39.609776]  __kasan_slab_free+0x6c/0x98
[   39.613682]  kfree+0x110/0x3b8
[   39.616721]  kasan_strings+0x128/0x938
[   39.620454]  kunit_try_run_case+0x14c/0x3d0
[   39.624620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.630088]  kthread+0x24c/0x2d0
[   39.633300]  ret_from_fork+0x10/0x20
[   39.636859] 
[   39.638335] The buggy address belongs to the object at ffff000800ddfc40
[   39.638335]  which belongs to the cache kmalloc-32 of size 32
[   39.650663] The buggy address is located 16 bytes inside of
[   39.650663]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   39.662727] 
[   39.664205] The buggy address belongs to the physical page:
[   39.669763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   39.677746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.684256] page_type: f5(slab)
[   39.687393] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.695111] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.702831] page dumped because: kasan: bad access detected
[   39.708385] 
[   39.709861] Memory state around the buggy address:
[   39.714642]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.721844]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.729050] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.736250]                                                  ^
[   39.742070]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.749274]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.756475] ==================================================================

test log snippet test parser 123

Home

[   40.067668] ==================================================================
[   40.074707] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.080604] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.087894] 
[   40.089379] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   40.098490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.102652] Hardware name: WinLink E850-96 board (DT)
[   40.107690] Call trace:
[   40.110117]  dump_backtrace+0x9c/0x128
[   40.113849]  show_stack+0x20/0x38
[   40.117147]  dump_stack_lvl+0x8c/0xd0
[   40.120793]  print_report+0x118/0x5e0
[   40.124438]  kasan_report+0xc8/0x118
[   40.127997]  __asan_report_load1_noabort+0x20/0x30
[   40.132772]  strcmp+0xc0/0xc8
[   40.135723]  kasan_strings+0x254/0x938
[   40.139456]  kunit_try_run_case+0x14c/0x3d0
[   40.143622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.149092]  kthread+0x24c/0x2d0
[   40.152303]  ret_from_fork+0x10/0x20
[   40.155864] 
[   40.157339] Allocated by task 296:
[   40.160725]  kasan_save_stack+0x3c/0x68
[   40.164542]  kasan_save_track+0x20/0x40
[   40.168361]  kasan_save_alloc_info+0x40/0x58
[   40.172615]  __kasan_kmalloc+0xd4/0xd8
[   40.176347]  __kmalloc_cache_noprof+0x144/0x328
[   40.180861]  kasan_strings+0xb0/0x938
[   40.184507]  kunit_try_run_case+0x14c/0x3d0
[   40.188673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.194142]  kthread+0x24c/0x2d0
[   40.197354]  ret_from_fork+0x10/0x20
[   40.200913] 
[   40.202389] Freed by task 296:
[   40.205429]  kasan_save_stack+0x3c/0x68
[   40.209246]  kasan_save_track+0x20/0x40
[   40.213066]  kasan_save_free_info+0x4c/0x78
[   40.217232]  __kasan_slab_free+0x6c/0x98
[   40.221139]  kfree+0x110/0x3b8
[   40.224177]  kasan_strings+0x128/0x938
[   40.227910]  kunit_try_run_case+0x14c/0x3d0
[   40.232076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.237544]  kthread+0x24c/0x2d0
[   40.240756]  ret_from_fork+0x10/0x20
[   40.244315] 
[   40.245791] The buggy address belongs to the object at ffff000800ddfc40
[   40.245791]  which belongs to the cache kmalloc-32 of size 32
[   40.258119] The buggy address is located 16 bytes inside of
[   40.258119]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   40.270183] 
[   40.271661] The buggy address belongs to the physical page:
[   40.277219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   40.285201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.291710] page_type: f5(slab)
[   40.294846] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.302567] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.310286] page dumped because: kasan: bad access detected
[   40.315842] 
[   40.317317] Memory state around the buggy address:
[   40.322096]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.329300]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.336505] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.343706]                                                  ^
[   40.349525]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.356730]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.363931] ==================================================================

test log snippet test parser 124

Home

[   40.067668] ==================================================================
[   40.074707] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.080604] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.087894] 
[   40.089379] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   40.098490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.102652] Hardware name: WinLink E850-96 board (DT)
[   40.107690] Call trace:
[   40.110117]  dump_backtrace+0x9c/0x128
[   40.113849]  show_stack+0x20/0x38
[   40.117147]  dump_stack_lvl+0x8c/0xd0
[   40.120793]  print_report+0x118/0x5e0
[   40.124438]  kasan_report+0xc8/0x118
[   40.127997]  __asan_report_load1_noabort+0x20/0x30
[   40.132772]  strcmp+0xc0/0xc8
[   40.135723]  kasan_strings+0x254/0x938
[   40.139456]  kunit_try_run_case+0x14c/0x3d0
[   40.143622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.149092]  kthread+0x24c/0x2d0
[   40.152303]  ret_from_fork+0x10/0x20
[   40.155864] 
[   40.157339] Allocated by task 296:
[   40.160725]  kasan_save_stack+0x3c/0x68
[   40.164542]  kasan_save_track+0x20/0x40
[   40.168361]  kasan_save_alloc_info+0x40/0x58
[   40.172615]  __kasan_kmalloc+0xd4/0xd8
[   40.176347]  __kmalloc_cache_noprof+0x144/0x328
[   40.180861]  kasan_strings+0xb0/0x938
[   40.184507]  kunit_try_run_case+0x14c/0x3d0
[   40.188673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.194142]  kthread+0x24c/0x2d0
[   40.197354]  ret_from_fork+0x10/0x20
[   40.200913] 
[   40.202389] Freed by task 296:
[   40.205429]  kasan_save_stack+0x3c/0x68
[   40.209246]  kasan_save_track+0x20/0x40
[   40.213066]  kasan_save_free_info+0x4c/0x78
[   40.217232]  __kasan_slab_free+0x6c/0x98
[   40.221139]  kfree+0x110/0x3b8
[   40.224177]  kasan_strings+0x128/0x938
[   40.227910]  kunit_try_run_case+0x14c/0x3d0
[   40.232076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.237544]  kthread+0x24c/0x2d0
[   40.240756]  ret_from_fork+0x10/0x20
[   40.244315] 
[   40.245791] The buggy address belongs to the object at ffff000800ddfc40
[   40.245791]  which belongs to the cache kmalloc-32 of size 32
[   40.258119] The buggy address is located 16 bytes inside of
[   40.258119]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   40.270183] 
[   40.271661] The buggy address belongs to the physical page:
[   40.277219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   40.285201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.291710] page_type: f5(slab)
[   40.294846] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.302567] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.310286] page dumped because: kasan: bad access detected
[   40.315842] 
[   40.317317] Memory state around the buggy address:
[   40.322096]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.329300]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.336505] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.343706]                                                  ^
[   40.349525]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.356730]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.363931] ==================================================================

test log snippet test parser 125

Home

[   40.672772] ==================================================================
[   40.679818] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.685715] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.693006] 
[   40.694490] CPU: 5 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   40.703604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.707764] Hardware name: WinLink E850-96 board (DT)
[   40.712802] Call trace:
[   40.715228]  dump_backtrace+0x9c/0x128
[   40.718961]  show_stack+0x20/0x38
[   40.722259]  dump_stack_lvl+0x8c/0xd0
[   40.725905]  print_report+0x118/0x5e0
[   40.729551]  kasan_report+0xc8/0x118
[   40.733110]  __asan_report_load1_noabort+0x20/0x30
[   40.737884]  strlen+0xa8/0xb0
[   40.740836]  kasan_strings+0x334/0x938
[   40.744569]  kunit_try_run_case+0x14c/0x3d0
[   40.748736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.754205]  kthread+0x24c/0x2d0
[   40.757415]  ret_from_fork+0x10/0x20
[   40.760978] 
[   40.762450] Allocated by task 296:
[   40.765838]  kasan_save_stack+0x3c/0x68
[   40.769654]  kasan_save_track+0x20/0x40
[   40.773474]  kasan_save_alloc_info+0x40/0x58
[   40.777727]  __kasan_kmalloc+0xd4/0xd8
[   40.781460]  __kmalloc_cache_noprof+0x144/0x328
[   40.785974]  kasan_strings+0xb0/0x938
[   40.789619]  kunit_try_run_case+0x14c/0x3d0
[   40.793786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.799255]  kthread+0x24c/0x2d0
[   40.802466]  ret_from_fork+0x10/0x20
[   40.806025] 
[   40.807503] Freed by task 296:
[   40.810539]  kasan_save_stack+0x3c/0x68
[   40.814360]  kasan_save_track+0x20/0x40
[   40.818178]  kasan_save_free_info+0x4c/0x78
[   40.822345]  __kasan_slab_free+0x6c/0x98
[   40.826251]  kfree+0x110/0x3b8
[   40.829289]  kasan_strings+0x128/0x938
[   40.833023]  kunit_try_run_case+0x14c/0x3d0
[   40.837190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.842657]  kthread+0x24c/0x2d0
[   40.845869]  ret_from_fork+0x10/0x20
[   40.849428] 
[   40.850903] The buggy address belongs to the object at ffff000800ddfc40
[   40.850903]  which belongs to the cache kmalloc-32 of size 32
[   40.863231] The buggy address is located 16 bytes inside of
[   40.863231]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   40.875295] 
[   40.876773] The buggy address belongs to the physical page:
[   40.882331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   40.890314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.896823] page_type: f5(slab)
[   40.899960] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.907679] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.915399] page dumped because: kasan: bad access detected
[   40.920954] 
[   40.922430] Memory state around the buggy address:
[   40.927209]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.934412]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.941617] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.948818]                                                  ^
[   40.954638]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.961842]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.969044] ==================================================================

test log snippet test parser 126

Home

[   40.672772] ==================================================================
[   40.679818] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.685715] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.693006] 
[   40.694490] CPU: 5 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   40.703604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.707764] Hardware name: WinLink E850-96 board (DT)
[   40.712802] Call trace:
[   40.715228]  dump_backtrace+0x9c/0x128
[   40.718961]  show_stack+0x20/0x38
[   40.722259]  dump_stack_lvl+0x8c/0xd0
[   40.725905]  print_report+0x118/0x5e0
[   40.729551]  kasan_report+0xc8/0x118
[   40.733110]  __asan_report_load1_noabort+0x20/0x30
[   40.737884]  strlen+0xa8/0xb0
[   40.740836]  kasan_strings+0x334/0x938
[   40.744569]  kunit_try_run_case+0x14c/0x3d0
[   40.748736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.754205]  kthread+0x24c/0x2d0
[   40.757415]  ret_from_fork+0x10/0x20
[   40.760978] 
[   40.762450] Allocated by task 296:
[   40.765838]  kasan_save_stack+0x3c/0x68
[   40.769654]  kasan_save_track+0x20/0x40
[   40.773474]  kasan_save_alloc_info+0x40/0x58
[   40.777727]  __kasan_kmalloc+0xd4/0xd8
[   40.781460]  __kmalloc_cache_noprof+0x144/0x328
[   40.785974]  kasan_strings+0xb0/0x938
[   40.789619]  kunit_try_run_case+0x14c/0x3d0
[   40.793786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.799255]  kthread+0x24c/0x2d0
[   40.802466]  ret_from_fork+0x10/0x20
[   40.806025] 
[   40.807503] Freed by task 296:
[   40.810539]  kasan_save_stack+0x3c/0x68
[   40.814360]  kasan_save_track+0x20/0x40
[   40.818178]  kasan_save_free_info+0x4c/0x78
[   40.822345]  __kasan_slab_free+0x6c/0x98
[   40.826251]  kfree+0x110/0x3b8
[   40.829289]  kasan_strings+0x128/0x938
[   40.833023]  kunit_try_run_case+0x14c/0x3d0
[   40.837190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.842657]  kthread+0x24c/0x2d0
[   40.845869]  ret_from_fork+0x10/0x20
[   40.849428] 
[   40.850903] The buggy address belongs to the object at ffff000800ddfc40
[   40.850903]  which belongs to the cache kmalloc-32 of size 32
[   40.863231] The buggy address is located 16 bytes inside of
[   40.863231]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   40.875295] 
[   40.876773] The buggy address belongs to the physical page:
[   40.882331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   40.890314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.896823] page_type: f5(slab)
[   40.899960] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.907679] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.915399] page dumped because: kasan: bad access detected
[   40.920954] 
[   40.922430] Memory state around the buggy address:
[   40.927209]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.934412]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.941617] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.948818]                                                  ^
[   40.954638]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.961842]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.969044] ==================================================================

test log snippet test parser 127

Home

[   40.976406] ==================================================================
[   40.983458] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   40.989443] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.996735] 
[   40.998217] CPU: 5 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.007330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.011493] Hardware name: WinLink E850-96 board (DT)
[   41.016529] Call trace:
[   41.018958]  dump_backtrace+0x9c/0x128
[   41.022689]  show_stack+0x20/0x38
[   41.025988]  dump_stack_lvl+0x8c/0xd0
[   41.029633]  print_report+0x118/0x5e0
[   41.033279]  kasan_report+0xc8/0x118
[   41.036838]  __asan_report_load1_noabort+0x20/0x30
[   41.041613]  strnlen+0x80/0x88
[   41.044650]  kasan_strings+0x398/0x938
[   41.048385]  kunit_try_run_case+0x14c/0x3d0
[   41.052551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.058019]  kthread+0x24c/0x2d0
[   41.061230]  ret_from_fork+0x10/0x20
[   41.064792] 
[   41.066264] Allocated by task 296:
[   41.069650]  kasan_save_stack+0x3c/0x68
[   41.073470]  kasan_save_track+0x20/0x40
[   41.077289]  kasan_save_alloc_info+0x40/0x58
[   41.081542]  __kasan_kmalloc+0xd4/0xd8
[   41.085275]  __kmalloc_cache_noprof+0x144/0x328
[   41.089789]  kasan_strings+0xb0/0x938
[   41.093434]  kunit_try_run_case+0x14c/0x3d0
[   41.097601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.103070]  kthread+0x24c/0x2d0
[   41.106281]  ret_from_fork+0x10/0x20
[   41.109841] 
[   41.111316] Freed by task 296:
[   41.114354]  kasan_save_stack+0x3c/0x68
[   41.118174]  kasan_save_track+0x20/0x40
[   41.121992]  kasan_save_free_info+0x4c/0x78
[   41.126160]  __kasan_slab_free+0x6c/0x98
[   41.130066]  kfree+0x110/0x3b8
[   41.133104]  kasan_strings+0x128/0x938
[   41.136837]  kunit_try_run_case+0x14c/0x3d0
[   41.141003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.146472]  kthread+0x24c/0x2d0
[   41.149684]  ret_from_fork+0x10/0x20
[   41.153243] 
[   41.154718] The buggy address belongs to the object at ffff000800ddfc40
[   41.154718]  which belongs to the cache kmalloc-32 of size 32
[   41.167047] The buggy address is located 16 bytes inside of
[   41.167047]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   41.179110] 
[   41.180587] The buggy address belongs to the physical page:
[   41.186144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   41.194129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.200637] page_type: f5(slab)
[   41.203773] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.211494] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   41.219214] page dumped because: kasan: bad access detected
[   41.224769] 
[   41.226245] Memory state around the buggy address:
[   41.231024]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.238227]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.245432] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.252633]                                                  ^
[   41.258452]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.265657]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.272859] ==================================================================

test log snippet test parser 128

Home

[   40.976406] ==================================================================
[   40.983458] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   40.989443] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   40.996735] 
[   40.998217] CPU: 5 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   41.007330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.011493] Hardware name: WinLink E850-96 board (DT)
[   41.016529] Call trace:
[   41.018958]  dump_backtrace+0x9c/0x128
[   41.022689]  show_stack+0x20/0x38
[   41.025988]  dump_stack_lvl+0x8c/0xd0
[   41.029633]  print_report+0x118/0x5e0
[   41.033279]  kasan_report+0xc8/0x118
[   41.036838]  __asan_report_load1_noabort+0x20/0x30
[   41.041613]  strnlen+0x80/0x88
[   41.044650]  kasan_strings+0x398/0x938
[   41.048385]  kunit_try_run_case+0x14c/0x3d0
[   41.052551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.058019]  kthread+0x24c/0x2d0
[   41.061230]  ret_from_fork+0x10/0x20
[   41.064792] 
[   41.066264] Allocated by task 296:
[   41.069650]  kasan_save_stack+0x3c/0x68
[   41.073470]  kasan_save_track+0x20/0x40
[   41.077289]  kasan_save_alloc_info+0x40/0x58
[   41.081542]  __kasan_kmalloc+0xd4/0xd8
[   41.085275]  __kmalloc_cache_noprof+0x144/0x328
[   41.089789]  kasan_strings+0xb0/0x938
[   41.093434]  kunit_try_run_case+0x14c/0x3d0
[   41.097601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.103070]  kthread+0x24c/0x2d0
[   41.106281]  ret_from_fork+0x10/0x20
[   41.109841] 
[   41.111316] Freed by task 296:
[   41.114354]  kasan_save_stack+0x3c/0x68
[   41.118174]  kasan_save_track+0x20/0x40
[   41.121992]  kasan_save_free_info+0x4c/0x78
[   41.126160]  __kasan_slab_free+0x6c/0x98
[   41.130066]  kfree+0x110/0x3b8
[   41.133104]  kasan_strings+0x128/0x938
[   41.136837]  kunit_try_run_case+0x14c/0x3d0
[   41.141003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.146472]  kthread+0x24c/0x2d0
[   41.149684]  ret_from_fork+0x10/0x20
[   41.153243] 
[   41.154718] The buggy address belongs to the object at ffff000800ddfc40
[   41.154718]  which belongs to the cache kmalloc-32 of size 32
[   41.167047] The buggy address is located 16 bytes inside of
[   41.167047]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   41.179110] 
[   41.180587] The buggy address belongs to the physical page:
[   41.186144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   41.194129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.200637] page_type: f5(slab)
[   41.203773] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.211494] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   41.219214] page dumped because: kasan: bad access detected
[   41.224769] 
[   41.226245] Memory state around the buggy address:
[   41.231024]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.238227]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.245432] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.252633]                                                  ^
[   41.258452]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.265657]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.272859] ==================================================================

test log snippet test parser 129

Home

[   39.763855] ==================================================================
[   39.770888] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   39.776874] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   39.784167] 
[   39.785648] CPU: 7 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   39.794764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.798924] Hardware name: WinLink E850-96 board (DT)
[   39.803960] Call trace:
[   39.806389]  dump_backtrace+0x9c/0x128
[   39.810121]  show_stack+0x20/0x38
[   39.813419]  dump_stack_lvl+0x8c/0xd0
[   39.817065]  print_report+0x118/0x5e0
[   39.820710]  kasan_report+0xc8/0x118
[   39.824269]  __asan_report_load1_noabort+0x20/0x30
[   39.829044]  strrchr+0x6c/0x78
[   39.832082]  kasan_strings+0x1f0/0x938
[   39.835816]  kunit_try_run_case+0x14c/0x3d0
[   39.839983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.845451]  kthread+0x24c/0x2d0
[   39.848662]  ret_from_fork+0x10/0x20
[   39.852222] 
[   39.853698] Allocated by task 296:
[   39.857085]  kasan_save_stack+0x3c/0x68
[   39.860901]  kasan_save_track+0x20/0x40
[   39.864720]  kasan_save_alloc_info+0x40/0x58
[   39.868974]  __kasan_kmalloc+0xd4/0xd8
[   39.872706]  __kmalloc_cache_noprof+0x144/0x328
[   39.877220]  kasan_strings+0xb0/0x938
[   39.880866]  kunit_try_run_case+0x14c/0x3d0
[   39.885032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.890501]  kthread+0x24c/0x2d0
[   39.893713]  ret_from_fork+0x10/0x20
[   39.897272] 
[   39.898747] Freed by task 296:
[   39.901787]  kasan_save_stack+0x3c/0x68
[   39.905605]  kasan_save_track+0x20/0x40
[   39.909424]  kasan_save_free_info+0x4c/0x78
[   39.913591]  __kasan_slab_free+0x6c/0x98
[   39.917497]  kfree+0x110/0x3b8
[   39.920535]  kasan_strings+0x128/0x938
[   39.924269]  kunit_try_run_case+0x14c/0x3d0
[   39.928434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.933903]  kthread+0x24c/0x2d0
[   39.937115]  ret_from_fork+0x10/0x20
[   39.940674] 
[   39.942149] The buggy address belongs to the object at ffff000800ddfc40
[   39.942149]  which belongs to the cache kmalloc-32 of size 32
[   39.954478] The buggy address is located 16 bytes inside of
[   39.954478]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   39.966542] 
[   39.968020] The buggy address belongs to the physical page:
[   39.973576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   39.981561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.988069] page_type: f5(slab)
[   39.991205] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.998927] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.006645] page dumped because: kasan: bad access detected
[   40.012201] 
[   40.013676] Memory state around the buggy address:
[   40.018455]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.025659]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.032864] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.040065]                                                  ^
[   40.045884]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.053089]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.060290] ==================================================================

test log snippet test parser 130

Home

[   39.763855] ==================================================================
[   39.770888] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   39.776874] Read of size 1 at addr ffff000800ddfc50 by task kunit_try_catch/296
[   39.784167] 
[   39.785648] CPU: 7 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   39.794764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.798924] Hardware name: WinLink E850-96 board (DT)
[   39.803960] Call trace:
[   39.806389]  dump_backtrace+0x9c/0x128
[   39.810121]  show_stack+0x20/0x38
[   39.813419]  dump_stack_lvl+0x8c/0xd0
[   39.817065]  print_report+0x118/0x5e0
[   39.820710]  kasan_report+0xc8/0x118
[   39.824269]  __asan_report_load1_noabort+0x20/0x30
[   39.829044]  strrchr+0x6c/0x78
[   39.832082]  kasan_strings+0x1f0/0x938
[   39.835816]  kunit_try_run_case+0x14c/0x3d0
[   39.839983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.845451]  kthread+0x24c/0x2d0
[   39.848662]  ret_from_fork+0x10/0x20
[   39.852222] 
[   39.853698] Allocated by task 296:
[   39.857085]  kasan_save_stack+0x3c/0x68
[   39.860901]  kasan_save_track+0x20/0x40
[   39.864720]  kasan_save_alloc_info+0x40/0x58
[   39.868974]  __kasan_kmalloc+0xd4/0xd8
[   39.872706]  __kmalloc_cache_noprof+0x144/0x328
[   39.877220]  kasan_strings+0xb0/0x938
[   39.880866]  kunit_try_run_case+0x14c/0x3d0
[   39.885032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.890501]  kthread+0x24c/0x2d0
[   39.893713]  ret_from_fork+0x10/0x20
[   39.897272] 
[   39.898747] Freed by task 296:
[   39.901787]  kasan_save_stack+0x3c/0x68
[   39.905605]  kasan_save_track+0x20/0x40
[   39.909424]  kasan_save_free_info+0x4c/0x78
[   39.913591]  __kasan_slab_free+0x6c/0x98
[   39.917497]  kfree+0x110/0x3b8
[   39.920535]  kasan_strings+0x128/0x938
[   39.924269]  kunit_try_run_case+0x14c/0x3d0
[   39.928434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.933903]  kthread+0x24c/0x2d0
[   39.937115]  ret_from_fork+0x10/0x20
[   39.940674] 
[   39.942149] The buggy address belongs to the object at ffff000800ddfc40
[   39.942149]  which belongs to the cache kmalloc-32 of size 32
[   39.954478] The buggy address is located 16 bytes inside of
[   39.954478]  freed 32-byte region [ffff000800ddfc40, ffff000800ddfc60)
[   39.966542] 
[   39.968020] The buggy address belongs to the physical page:
[   39.973576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   39.981561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.988069] page_type: f5(slab)
[   39.991205] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.998927] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   40.006645] page dumped because: kasan: bad access detected
[   40.012201] 
[   40.013676] Memory state around the buggy address:
[   40.018455]  ffff000800ddfb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.025659]  ffff000800ddfb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.032864] >ffff000800ddfc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.040065]                                                  ^
[   40.045884]  ffff000800ddfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.053089]  ffff000800ddfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.060290] ==================================================================

test log snippet test parser 131

Home

[   32.039996] ==================================================================
[   32.047406] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0
[   32.054088] Read of size 8 at addr ffff000800ddfa00 by task kunit_try_catch/237
[   32.061375] 
[   32.062861] CPU: 5 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.071973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.076133] Hardware name: WinLink E850-96 board (DT)
[   32.081172] Call trace:
[   32.083599]  dump_backtrace+0x9c/0x128
[   32.087330]  show_stack+0x20/0x38
[   32.090629]  dump_stack_lvl+0x8c/0xd0
[   32.094274]  print_report+0x118/0x5e0
[   32.097920]  kasan_report+0xc8/0x118
[   32.101479]  __asan_report_load8_noabort+0x20/0x30
[   32.106253]  workqueue_uaf+0x498/0x4c0
[   32.109985]  kunit_try_run_case+0x14c/0x3d0
[   32.114152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.119621]  kthread+0x24c/0x2d0
[   32.122833]  ret_from_fork+0x10/0x20
[   32.126394] 
[   32.127869] Allocated by task 237:
[   32.131255]  kasan_save_stack+0x3c/0x68
[   32.135072]  kasan_save_track+0x20/0x40
[   32.138891]  kasan_save_alloc_info+0x40/0x58
[   32.143145]  __kasan_kmalloc+0xd4/0xd8
[   32.146877]  __kmalloc_cache_noprof+0x144/0x328
[   32.151392]  workqueue_uaf+0x140/0x4c0
[   32.155124]  kunit_try_run_case+0x14c/0x3d0
[   32.159290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.164759]  kthread+0x24c/0x2d0
[   32.167971]  ret_from_fork+0x10/0x20
[   32.171530] 
[   32.173006] Freed by task 87:
[   32.175958]  kasan_save_stack+0x3c/0x68
[   32.179776]  kasan_save_track+0x20/0x40
[   32.183597]  kasan_save_free_info+0x4c/0x78
[   32.187762]  __kasan_slab_free+0x6c/0x98
[   32.191668]  kfree+0x110/0x3b8
[   32.194707]  workqueue_uaf_work+0x18/0x30
[   32.198699]  process_one_work+0x530/0xfa8
[   32.202692]  worker_thread+0x614/0xf28
[   32.206425]  kthread+0x24c/0x2d0
[   32.209637]  ret_from_fork+0x10/0x20
[   32.213196] 
[   32.214672] Last potentially related work creation:
[   32.219534]  kasan_save_stack+0x3c/0x68
[   32.223352]  __kasan_record_aux_stack+0xbc/0xe8
[   32.227866]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.232901]  __queue_work+0x654/0xfe0
[   32.236546]  queue_work_on+0xbc/0xf8
[   32.240105]  workqueue_uaf+0x218/0x4c0
[   32.243837]  kunit_try_run_case+0x14c/0x3d0
[   32.248005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.253473]  kthread+0x24c/0x2d0
[   32.256685]  ret_from_fork+0x10/0x20
[   32.260244] 
[   32.261720] The buggy address belongs to the object at ffff000800ddfa00
[   32.261720]  which belongs to the cache kmalloc-32 of size 32
[   32.274047] The buggy address is located 0 bytes inside of
[   32.274047]  freed 32-byte region [ffff000800ddfa00, ffff000800ddfa20)
[   32.286026] 
[   32.287504] The buggy address belongs to the physical page:
[   32.293061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   32.301045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.307552] page_type: f5(slab)
[   32.310691] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   32.318409] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.326128] page dumped because: kasan: bad access detected
[   32.331685] 
[   32.333159] Memory state around the buggy address:
[   32.337941]  ffff000800ddf900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.345142]  ffff000800ddf980: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   32.352348] >ffff000800ddfa00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.359548]                    ^
[   32.362763]  ffff000800ddfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.369968]  ffff000800ddfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.377169] ==================================================================

test log snippet test parser 132

Home

[   32.039996] ==================================================================
[   32.047406] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0
[   32.054088] Read of size 8 at addr ffff000800ddfa00 by task kunit_try_catch/237
[   32.061375] 
[   32.062861] CPU: 5 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   32.071973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.076133] Hardware name: WinLink E850-96 board (DT)
[   32.081172] Call trace:
[   32.083599]  dump_backtrace+0x9c/0x128
[   32.087330]  show_stack+0x20/0x38
[   32.090629]  dump_stack_lvl+0x8c/0xd0
[   32.094274]  print_report+0x118/0x5e0
[   32.097920]  kasan_report+0xc8/0x118
[   32.101479]  __asan_report_load8_noabort+0x20/0x30
[   32.106253]  workqueue_uaf+0x498/0x4c0
[   32.109985]  kunit_try_run_case+0x14c/0x3d0
[   32.114152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.119621]  kthread+0x24c/0x2d0
[   32.122833]  ret_from_fork+0x10/0x20
[   32.126394] 
[   32.127869] Allocated by task 237:
[   32.131255]  kasan_save_stack+0x3c/0x68
[   32.135072]  kasan_save_track+0x20/0x40
[   32.138891]  kasan_save_alloc_info+0x40/0x58
[   32.143145]  __kasan_kmalloc+0xd4/0xd8
[   32.146877]  __kmalloc_cache_noprof+0x144/0x328
[   32.151392]  workqueue_uaf+0x140/0x4c0
[   32.155124]  kunit_try_run_case+0x14c/0x3d0
[   32.159290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.164759]  kthread+0x24c/0x2d0
[   32.167971]  ret_from_fork+0x10/0x20
[   32.171530] 
[   32.173006] Freed by task 87:
[   32.175958]  kasan_save_stack+0x3c/0x68
[   32.179776]  kasan_save_track+0x20/0x40
[   32.183597]  kasan_save_free_info+0x4c/0x78
[   32.187762]  __kasan_slab_free+0x6c/0x98
[   32.191668]  kfree+0x110/0x3b8
[   32.194707]  workqueue_uaf_work+0x18/0x30
[   32.198699]  process_one_work+0x530/0xfa8
[   32.202692]  worker_thread+0x614/0xf28
[   32.206425]  kthread+0x24c/0x2d0
[   32.209637]  ret_from_fork+0x10/0x20
[   32.213196] 
[   32.214672] Last potentially related work creation:
[   32.219534]  kasan_save_stack+0x3c/0x68
[   32.223352]  __kasan_record_aux_stack+0xbc/0xe8
[   32.227866]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.232901]  __queue_work+0x654/0xfe0
[   32.236546]  queue_work_on+0xbc/0xf8
[   32.240105]  workqueue_uaf+0x218/0x4c0
[   32.243837]  kunit_try_run_case+0x14c/0x3d0
[   32.248005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.253473]  kthread+0x24c/0x2d0
[   32.256685]  ret_from_fork+0x10/0x20
[   32.260244] 
[   32.261720] The buggy address belongs to the object at ffff000800ddfa00
[   32.261720]  which belongs to the cache kmalloc-32 of size 32
[   32.274047] The buggy address is located 0 bytes inside of
[   32.274047]  freed 32-byte region [ffff000800ddfa00, ffff000800ddfa20)
[   32.286026] 
[   32.287504] The buggy address belongs to the physical page:
[   32.293061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ddf
[   32.301045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.307552] page_type: f5(slab)
[   32.310691] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   32.318409] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.326128] page dumped because: kasan: bad access detected
[   32.331685] 
[   32.333159] Memory state around the buggy address:
[   32.337941]  ffff000800ddf900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.345142]  ffff000800ddf980: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   32.352348] >ffff000800ddfa00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.359548]                    ^
[   32.362763]  ffff000800ddfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.369968]  ffff000800ddfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.377169] ==================================================================

test log snippet test parser 133

Home

[   38.257317] ==================================================================
[   38.271780] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   38.278633] Read of size 1 at addr ffff800088e07cba by task kunit_try_catch/286
[   38.285925] 
[   38.287409] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.296521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.300683] Hardware name: WinLink E850-96 board (DT)
[   38.305721] Call trace:
[   38.308147]  dump_backtrace+0x9c/0x128
[   38.311879]  show_stack+0x20/0x38
[   38.315178]  dump_stack_lvl+0x8c/0xd0
[   38.318823]  print_report+0x2fc/0x5e0
[   38.322469]  kasan_report+0xc8/0x118
[   38.326028]  __asan_report_load1_noabort+0x20/0x30
[   38.330802]  kasan_stack_oob+0x238/0x270
[   38.334708]  kunit_try_run_case+0x14c/0x3d0
[   38.338875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.344344]  kthread+0x24c/0x2d0
[   38.347555]  ret_from_fork+0x10/0x20
[   38.351117] 
[   38.352595] The buggy address belongs to stack of task kunit_try_catch/286
[   38.359449]  and is located at offset 138 in frame:
[   38.364309]  kasan_stack_oob+0x0/0x270
[   38.368046] 
[   38.369517] This frame has 4 objects:
[   38.373167]  [48, 49) '__assertion'
[   38.373191]  [64, 72) 'array'
[   38.376637]  [96, 112) '__assertion'
[   38.379590]  [128, 138) 'stack_array'
[   38.383145] 
[   38.388272] The buggy address belongs to the virtual mapping at
[   38.388272]  [ffff800088e00000, ffff800088e09000) created by:
[   38.388272]  kernel_clone+0x140/0x790
[   38.403544] 
[   38.405024] The buggy address belongs to the physical page:
[   38.410580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884bd1
[   38.418564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.425084] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.432803] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.440523] page dumped because: kasan: bad access detected
[   38.446080] 
[   38.447554] Memory state around the buggy address:
[   38.452335]  ffff800088e07b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.459536]  ffff800088e07c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   38.466743] >ffff800088e07c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   38.473942]                                         ^
[   38.478980]  ffff800088e07d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   38.486185]  ffff800088e07d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   38.493388] ==================================================================

test log snippet test parser 134

Home

[   38.257317] ==================================================================
[   38.271780] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   38.278633] Read of size 1 at addr ffff800088e07cba by task kunit_try_catch/286
[   38.285925] 
[   38.287409] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   38.296521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.300683] Hardware name: WinLink E850-96 board (DT)
[   38.305721] Call trace:
[   38.308147]  dump_backtrace+0x9c/0x128
[   38.311879]  show_stack+0x20/0x38
[   38.315178]  dump_stack_lvl+0x8c/0xd0
[   38.318823]  print_report+0x2fc/0x5e0
[   38.322469]  kasan_report+0xc8/0x118
[   38.326028]  __asan_report_load1_noabort+0x20/0x30
[   38.330802]  kasan_stack_oob+0x238/0x270
[   38.334708]  kunit_try_run_case+0x14c/0x3d0
[   38.338875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.344344]  kthread+0x24c/0x2d0
[   38.347555]  ret_from_fork+0x10/0x20
[   38.351117] 
[   38.352595] The buggy address belongs to stack of task kunit_try_catch/286
[   38.359449]  and is located at offset 138 in frame:
[   38.364309]  kasan_stack_oob+0x0/0x270
[   38.368046] 
[   38.369517] This frame has 4 objects:
[   38.373167]  [48, 49) '__assertion'
[   38.373191]  [64, 72) 'array'
[   38.376637]  [96, 112) '__assertion'
[   38.379590]  [128, 138) 'stack_array'
[   38.383145] 
[   38.388272] The buggy address belongs to the virtual mapping at
[   38.388272]  [ffff800088e00000, ffff800088e09000) created by:
[   38.388272]  kernel_clone+0x140/0x790
[   38.403544] 
[   38.405024] The buggy address belongs to the physical page:
[   38.410580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884bd1
[   38.418564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.425084] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.432803] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.440523] page dumped because: kasan: bad access detected
[   38.446080] 
[   38.447554] Memory state around the buggy address:
[   38.452335]  ffff800088e07b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.459536]  ffff800088e07c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   38.466743] >ffff800088e07c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   38.473942]                                         ^
[   38.478980]  ffff800088e07d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   38.486185]  ffff800088e07d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   38.493388] ==================================================================

test log snippet test parser 135

Home

[   20.406608] ==================================================================
[   20.416494] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300
[   20.423090] Read of size 1 at addr ffff000803424000 by task kunit_try_catch/185
[   20.430378] 
[   20.431860] CPU: 7 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.440976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.445134] Hardware name: WinLink E850-96 board (DT)
[   20.450171] Call trace:
[   20.452600]  dump_backtrace+0x9c/0x128
[   20.456332]  show_stack+0x20/0x38
[   20.459630]  dump_stack_lvl+0x8c/0xd0
[   20.463275]  print_report+0x118/0x5e0
[   20.466921]  kasan_report+0xc8/0x118
[   20.470480]  __asan_report_load1_noabort+0x20/0x30
[   20.475254]  kmalloc_large_uaf+0x2d8/0x300
[   20.479334]  kunit_try_run_case+0x14c/0x3d0
[   20.483501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488969]  kthread+0x24c/0x2d0
[   20.492181]  ret_from_fork+0x10/0x20
[   20.495744] 
[   20.497218] The buggy address belongs to the physical page:
[   20.502776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   20.510759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.517283] raw: 0bfffe0000000000 fffffdffe00d0a08 ffff00085afd3440 0000000000000000
[   20.524999] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.532721] page dumped because: kasan: bad access detected
[   20.538275] 
[   20.539750] Memory state around the buggy address:
[   20.544532]  ffff000803423f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.551732]  ffff000803423f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.558938] >ffff000803424000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.566138]                    ^
[   20.569353]  ffff000803424080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.576558]  ffff000803424100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.583759] ==================================================================

test log snippet test parser 136

Home

[   20.406608] ==================================================================
[   20.416494] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300
[   20.423090] Read of size 1 at addr ffff000803424000 by task kunit_try_catch/185
[   20.430378] 
[   20.431860] CPU: 7 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.440976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.445134] Hardware name: WinLink E850-96 board (DT)
[   20.450171] Call trace:
[   20.452600]  dump_backtrace+0x9c/0x128
[   20.456332]  show_stack+0x20/0x38
[   20.459630]  dump_stack_lvl+0x8c/0xd0
[   20.463275]  print_report+0x118/0x5e0
[   20.466921]  kasan_report+0xc8/0x118
[   20.470480]  __asan_report_load1_noabort+0x20/0x30
[   20.475254]  kmalloc_large_uaf+0x2d8/0x300
[   20.479334]  kunit_try_run_case+0x14c/0x3d0
[   20.483501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488969]  kthread+0x24c/0x2d0
[   20.492181]  ret_from_fork+0x10/0x20
[   20.495744] 
[   20.497218] The buggy address belongs to the physical page:
[   20.502776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883424
[   20.510759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.517283] raw: 0bfffe0000000000 fffffdffe00d0a08 ffff00085afd3440 0000000000000000
[   20.524999] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.532721] page dumped because: kasan: bad access detected
[   20.538275] 
[   20.539750] Memory state around the buggy address:
[   20.544532]  ffff000803423f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.551732]  ffff000803423f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.558938] >ffff000803424000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.566138]                    ^
[   20.569353]  ffff000803424080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.576558]  ffff000803424100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.583759] ==================================================================

test log snippet test parser 137

Home

[   36.471604] ==================================================================
[   36.477709] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   36.484392] Read of size 1 at addr ffff0008033f0000 by task kunit_try_catch/270
[   36.491682] 
[   36.493166] CPU: 6 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.502279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.506439] Hardware name: WinLink E850-96 board (DT)
[   36.511477] Call trace:
[   36.513905]  dump_backtrace+0x9c/0x128
[   36.517635]  show_stack+0x20/0x38
[   36.520934]  dump_stack_lvl+0x8c/0xd0
[   36.524579]  print_report+0x118/0x5e0
[   36.528225]  kasan_report+0xc8/0x118
[   36.531786]  __asan_report_load1_noabort+0x20/0x30
[   36.536558]  mempool_uaf_helper+0x320/0x348
[   36.540725]  mempool_page_alloc_uaf+0xb8/0x118
[   36.545153]  kunit_try_run_case+0x14c/0x3d0
[   36.549319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.554787]  kthread+0x24c/0x2d0
[   36.557999]  ret_from_fork+0x10/0x20
[   36.561562] 
[   36.563037] The buggy address belongs to the physical page:
[   36.568594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833f0
[   36.576578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.583098] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.590816] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.598538] page dumped because: kasan: bad access detected
[   36.604092] 
[   36.605567] Memory state around the buggy address:
[   36.610346]  ffff0008033eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.617550]  ffff0008033eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.624756] >ffff0008033f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.631958]                    ^
[   36.635171]  ffff0008033f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.642376]  ffff0008033f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.649577] ==================================================================
[   35.912446] ==================================================================
[   35.921903] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   35.928583] Read of size 1 at addr ffff000804258000 by task kunit_try_catch/266
[   35.935874] 
[   35.937358] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.946469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.950630] Hardware name: WinLink E850-96 board (DT)
[   35.955669] Call trace:
[   35.958097]  dump_backtrace+0x9c/0x128
[   35.961827]  show_stack+0x20/0x38
[   35.965126]  dump_stack_lvl+0x8c/0xd0
[   35.968771]  print_report+0x118/0x5e0
[   35.972417]  kasan_report+0xc8/0x118
[   35.975976]  __asan_report_load1_noabort+0x20/0x30
[   35.980752]  mempool_uaf_helper+0x320/0x348
[   35.984917]  mempool_kmalloc_large_uaf+0xbc/0x118
[   35.989604]  kunit_try_run_case+0x14c/0x3d0
[   35.993771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.999240]  kthread+0x24c/0x2d0
[   36.002452]  ret_from_fork+0x10/0x20
[   36.006013] 
[   36.007490] The buggy address belongs to the physical page:
[   36.013047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884258
[   36.021030] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.028669] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.035628] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.043342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.051068] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.058879] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.066693] head: 0bfffe0000000002 fffffdffe0109601 ffffffffffffffff 0000000000000000
[   36.074504] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.082311] page dumped because: kasan: bad access detected
[   36.087867] 
[   36.089342] Memory state around the buggy address:
[   36.094125]  ffff000804257f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.101326]  ffff000804257f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.108532] >ffff000804258000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.115731]                    ^
[   36.118946]  ffff000804258080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.126151]  ffff000804258100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.133354] ==================================================================

test log snippet test parser 138

Home

[   35.912446] ==================================================================
[   35.921903] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   35.928583] Read of size 1 at addr ffff000804258000 by task kunit_try_catch/266
[   35.935874] 
[   35.937358] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   35.946469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.950630] Hardware name: WinLink E850-96 board (DT)
[   35.955669] Call trace:
[   35.958097]  dump_backtrace+0x9c/0x128
[   35.961827]  show_stack+0x20/0x38
[   35.965126]  dump_stack_lvl+0x8c/0xd0
[   35.968771]  print_report+0x118/0x5e0
[   35.972417]  kasan_report+0xc8/0x118
[   35.975976]  __asan_report_load1_noabort+0x20/0x30
[   35.980752]  mempool_uaf_helper+0x320/0x348
[   35.984917]  mempool_kmalloc_large_uaf+0xbc/0x118
[   35.989604]  kunit_try_run_case+0x14c/0x3d0
[   35.993771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.999240]  kthread+0x24c/0x2d0
[   36.002452]  ret_from_fork+0x10/0x20
[   36.006013] 
[   36.007490] The buggy address belongs to the physical page:
[   36.013047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884258
[   36.021030] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.028669] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.035628] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.043342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.051068] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.058879] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.066693] head: 0bfffe0000000002 fffffdffe0109601 ffffffffffffffff 0000000000000000
[   36.074504] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.082311] page dumped because: kasan: bad access detected
[   36.087867] 
[   36.089342] Memory state around the buggy address:
[   36.094125]  ffff000804257f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.101326]  ffff000804257f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.108532] >ffff000804258000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.115731]                    ^
[   36.118946]  ffff000804258080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.126151]  ffff000804258100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.133354] ==================================================================

test log snippet test parser 139

Home

[   36.471604] ==================================================================
[   36.477709] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   36.484392] Read of size 1 at addr ffff0008033f0000 by task kunit_try_catch/270
[   36.491682] 
[   36.493166] CPU: 6 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   36.502279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.506439] Hardware name: WinLink E850-96 board (DT)
[   36.511477] Call trace:
[   36.513905]  dump_backtrace+0x9c/0x128
[   36.517635]  show_stack+0x20/0x38
[   36.520934]  dump_stack_lvl+0x8c/0xd0
[   36.524579]  print_report+0x118/0x5e0
[   36.528225]  kasan_report+0xc8/0x118
[   36.531786]  __asan_report_load1_noabort+0x20/0x30
[   36.536558]  mempool_uaf_helper+0x320/0x348
[   36.540725]  mempool_page_alloc_uaf+0xb8/0x118
[   36.545153]  kunit_try_run_case+0x14c/0x3d0
[   36.549319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.554787]  kthread+0x24c/0x2d0
[   36.557999]  ret_from_fork+0x10/0x20
[   36.561562] 
[   36.563037] The buggy address belongs to the physical page:
[   36.568594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833f0
[   36.576578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.583098] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.590816] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.598538] page dumped because: kasan: bad access detected
[   36.604092] 
[   36.605567] Memory state around the buggy address:
[   36.610346]  ffff0008033eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.617550]  ffff0008033eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.624756] >ffff0008033f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.631958]                    ^
[   36.635171]  ffff0008033f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.642376]  ffff0008033f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.649577] ==================================================================

test log snippet test parser 140

Home

[   20.827059] ==================================================================
[   20.841397] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368
[   20.847733] Read of size 1 at addr ffff000805520000 by task kunit_try_catch/191
[   20.855024] 
[   20.856507] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.865624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.869781] Hardware name: WinLink E850-96 board (DT)
[   20.874819] Call trace:
[   20.877246]  dump_backtrace+0x9c/0x128
[   20.880977]  show_stack+0x20/0x38
[   20.884276]  dump_stack_lvl+0x8c/0xd0
[   20.887922]  print_report+0x118/0x5e0
[   20.891568]  kasan_report+0xc8/0x118
[   20.895126]  __asan_report_load1_noabort+0x20/0x30
[   20.899901]  page_alloc_uaf+0x33c/0x368
[   20.903722]  kunit_try_run_case+0x14c/0x3d0
[   20.907886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.913357]  kthread+0x24c/0x2d0
[   20.916567]  ret_from_fork+0x10/0x20
[   20.920129] 
[   20.921604] The buggy address belongs to the physical page:
[   20.927162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885520
[   20.935146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.941655] page_type: f0(buddy)
[   20.944881] raw: 0bfffe0000000000 ffff00087f61fbc8 ffff00087f61fbc8 0000000000000000
[   20.952597] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   20.960316] page dumped because: kasan: bad access detected
[   20.965871] 
[   20.967347] Memory state around the buggy address:
[   20.972128]  ffff00080551ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.979329]  ffff00080551ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.986537] >ffff000805520000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.993736]                    ^
[   20.996951]  ffff000805520080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.004156]  ffff000805520100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.011357] ==================================================================

test log snippet test parser 141

Home

[   20.827059] ==================================================================
[   20.841397] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368
[   20.847733] Read of size 1 at addr ffff000805520000 by task kunit_try_catch/191
[   20.855024] 
[   20.856507] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   20.865624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.869781] Hardware name: WinLink E850-96 board (DT)
[   20.874819] Call trace:
[   20.877246]  dump_backtrace+0x9c/0x128
[   20.880977]  show_stack+0x20/0x38
[   20.884276]  dump_stack_lvl+0x8c/0xd0
[   20.887922]  print_report+0x118/0x5e0
[   20.891568]  kasan_report+0xc8/0x118
[   20.895126]  __asan_report_load1_noabort+0x20/0x30
[   20.899901]  page_alloc_uaf+0x33c/0x368
[   20.903722]  kunit_try_run_case+0x14c/0x3d0
[   20.907886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.913357]  kthread+0x24c/0x2d0
[   20.916567]  ret_from_fork+0x10/0x20
[   20.920129] 
[   20.921604] The buggy address belongs to the physical page:
[   20.927162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885520
[   20.935146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.941655] page_type: f0(buddy)
[   20.944881] raw: 0bfffe0000000000 ffff00087f61fbc8 ffff00087f61fbc8 0000000000000000
[   20.952597] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   20.960316] page dumped because: kasan: bad access detected
[   20.965871] 
[   20.967347] Memory state around the buggy address:
[   20.972128]  ffff00080551ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.979329]  ffff00080551ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.986537] >ffff000805520000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.993736]                    ^
[   20.996951]  ffff000805520080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.004156]  ffff000805520100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.011357] ==================================================================

test log snippet test parser 142

Home

[   63.864430] ==================================================================
[   63.871395] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x50c/0x5b0
[   63.878075] Read of size 1 at addr ffff80008779d7f8 by task kunit_try_catch/306
[   63.885367] 
[   63.886849] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.895964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.900125] Hardware name: WinLink E850-96 board (DT)
[   63.905160] Call trace:
[   63.907588]  dump_backtrace+0x9c/0x128
[   63.911321]  show_stack+0x20/0x38
[   63.914620]  dump_stack_lvl+0x8c/0xd0
[   63.918266]  print_report+0x2fc/0x5e0
[   63.921911]  kasan_report+0xc8/0x118
[   63.925470]  __asan_report_load1_noabort+0x20/0x30
[   63.930244]  vmalloc_oob+0x50c/0x5b0
[   63.933803]  kunit_try_run_case+0x14c/0x3d0
[   63.937970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.943439]  kthread+0x24c/0x2d0
[   63.946651]  ret_from_fork+0x10/0x20
[   63.950212] 
[   63.951689] The buggy address belongs to the virtual mapping at
[   63.951689]  [ffff80008779d000, ffff80008779f000) created by:
[   63.951689]  vmalloc_oob+0x98/0x5b0
[   63.966789] 
[   63.968267] The buggy address belongs to the physical page:
[   63.973822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884bd1
[   63.981808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.988326] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.996048] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.003768] page dumped because: kasan: bad access detected
[   64.009323] 
[   64.010799] Memory state around the buggy address:
[   64.015576]  ffff80008779d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.022781]  ffff80008779d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.029987] >ffff80008779d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   64.037187]                                                                 ^
[   64.044309]  ffff80008779d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.051513]  ffff80008779d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.058714] ==================================================================
[   63.655488] ==================================================================
[   63.669921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x560/0x5b0
[   63.676604] Read of size 1 at addr ffff80008779d7f3 by task kunit_try_catch/306
[   63.683895] 
[   63.685378] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.694493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.698652] Hardware name: WinLink E850-96 board (DT)
[   63.703690] Call trace:
[   63.706116]  dump_backtrace+0x9c/0x128
[   63.709849]  show_stack+0x20/0x38
[   63.713147]  dump_stack_lvl+0x8c/0xd0
[   63.716793]  print_report+0x2fc/0x5e0
[   63.720438]  kasan_report+0xc8/0x118
[   63.723997]  __asan_report_load1_noabort+0x20/0x30
[   63.728772]  vmalloc_oob+0x560/0x5b0
[   63.732330]  kunit_try_run_case+0x14c/0x3d0
[   63.736497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.741966]  kthread+0x24c/0x2d0
[   63.745178]  ret_from_fork+0x10/0x20
[   63.748739] 
[   63.750218] The buggy address belongs to the virtual mapping at
[   63.750218]  [ffff80008779d000, ffff80008779f000) created by:
[   63.750218]  vmalloc_oob+0x98/0x5b0
[   63.765316] 
[   63.766796] The buggy address belongs to the physical page:
[   63.772352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884bd1
[   63.780336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.786858] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.794575] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.802295] page dumped because: kasan: bad access detected
[   63.807852] 
[   63.809326] Memory state around the buggy address:
[   63.814108]  ffff80008779d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.821309]  ffff80008779d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.828515] >ffff80008779d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.835715]                                                              ^
[   63.842577]  ffff80008779d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.849780]  ffff80008779d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.856983] ==================================================================

test log snippet test parser 143

Home

[   63.655488] ==================================================================
[   63.669921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x560/0x5b0
[   63.676604] Read of size 1 at addr ffff80008779d7f3 by task kunit_try_catch/306
[   63.683895] 
[   63.685378] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.694493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.698652] Hardware name: WinLink E850-96 board (DT)
[   63.703690] Call trace:
[   63.706116]  dump_backtrace+0x9c/0x128
[   63.709849]  show_stack+0x20/0x38
[   63.713147]  dump_stack_lvl+0x8c/0xd0
[   63.716793]  print_report+0x2fc/0x5e0
[   63.720438]  kasan_report+0xc8/0x118
[   63.723997]  __asan_report_load1_noabort+0x20/0x30
[   63.728772]  vmalloc_oob+0x560/0x5b0
[   63.732330]  kunit_try_run_case+0x14c/0x3d0
[   63.736497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.741966]  kthread+0x24c/0x2d0
[   63.745178]  ret_from_fork+0x10/0x20
[   63.748739] 
[   63.750218] The buggy address belongs to the virtual mapping at
[   63.750218]  [ffff80008779d000, ffff80008779f000) created by:
[   63.750218]  vmalloc_oob+0x98/0x5b0
[   63.765316] 
[   63.766796] The buggy address belongs to the physical page:
[   63.772352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884bd1
[   63.780336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.786858] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.794575] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.802295] page dumped because: kasan: bad access detected
[   63.807852] 
[   63.809326] Memory state around the buggy address:
[   63.814108]  ffff80008779d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.821309]  ffff80008779d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.828515] >ffff80008779d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.835715]                                                              ^
[   63.842577]  ffff80008779d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.849780]  ffff80008779d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.856983] ==================================================================

test log snippet test parser 144

Home

[   63.864430] ==================================================================
[   63.871395] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x50c/0x5b0
[   63.878075] Read of size 1 at addr ffff80008779d7f8 by task kunit_try_catch/306
[   63.885367] 
[   63.886849] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   63.895964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.900125] Hardware name: WinLink E850-96 board (DT)
[   63.905160] Call trace:
[   63.907588]  dump_backtrace+0x9c/0x128
[   63.911321]  show_stack+0x20/0x38
[   63.914620]  dump_stack_lvl+0x8c/0xd0
[   63.918266]  print_report+0x2fc/0x5e0
[   63.921911]  kasan_report+0xc8/0x118
[   63.925470]  __asan_report_load1_noabort+0x20/0x30
[   63.930244]  vmalloc_oob+0x50c/0x5b0
[   63.933803]  kunit_try_run_case+0x14c/0x3d0
[   63.937970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.943439]  kthread+0x24c/0x2d0
[   63.946651]  ret_from_fork+0x10/0x20
[   63.950212] 
[   63.951689] The buggy address belongs to the virtual mapping at
[   63.951689]  [ffff80008779d000, ffff80008779f000) created by:
[   63.951689]  vmalloc_oob+0x98/0x5b0
[   63.966789] 
[   63.968267] The buggy address belongs to the physical page:
[   63.973822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884bd1
[   63.981808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.988326] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.996048] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.003768] page dumped because: kasan: bad access detected
[   64.009323] 
[   64.010799] Memory state around the buggy address:
[   64.015576]  ffff80008779d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.022781]  ffff80008779d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.029987] >ffff80008779d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   64.037187]                                                                 ^
[   64.044309]  ffff80008779d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.051513]  ffff80008779d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.058714] ==================================================================

test log snippet test parser 145

Home

[   66.602213] ==================================================================
[   66.602342] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   66.602342] 
[   66.602468] Invalid free of 0x(____ptrval____) (in kfence-#120):
[   66.602567]  test_double_free+0x100/0x238
[   66.605048]  kunit_try_run_case+0x14c/0x3d0
[   66.609214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.614683]  kthread+0x24c/0x2d0
[   66.617895]  ret_from_fork+0x10/0x20
[   66.621454] 
[   66.622932] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.622932] 
[   66.632047] allocated by task 334 on cpu 6 at 66.602141s (0.029904s ago):
[   66.638831]  test_alloc+0x22c/0x620
[   66.642287]  test_double_free+0xd4/0x238
[   66.646193]  kunit_try_run_case+0x14c/0x3d0
[   66.650359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.655829]  kthread+0x24c/0x2d0
[   66.659040]  ret_from_fork+0x10/0x20
[   66.662599] 
[   66.664077] freed by task 334 on cpu 6 at 66.602154s (0.061921s ago):
[   66.670516]  test_double_free+0xf0/0x238
[   66.674405]  kunit_try_run_case+0x14c/0x3d0
[   66.678571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.684040]  kthread+0x24c/0x2d0
[   66.687252]  ret_from_fork+0x10/0x20
[   66.690812] 
[   66.692295] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.701409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.705569] Hardware name: WinLink E850-96 board (DT)
[   66.710606] ==================================================================
[   66.382195] ==================================================================
[   66.382324] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   66.382324] 
[   66.382451] Invalid free of 0x(____ptrval____) (in kfence-#118):
[   66.382554]  test_double_free+0x1bc/0x238
[   66.385028]  kunit_try_run_case+0x14c/0x3d0
[   66.389195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.394664]  kthread+0x24c/0x2d0
[   66.397875]  ret_from_fork+0x10/0x20
[   66.401434] 
[   66.402913] kfence-#118: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.402913] 
[   66.412549] allocated by task 332 on cpu 5 at 66.382124s (0.030423s ago):
[   66.419336]  test_alloc+0x298/0x620
[   66.422789]  test_double_free+0xd4/0x238
[   66.426694]  kunit_try_run_case+0x14c/0x3d0
[   66.430861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.436331]  kthread+0x24c/0x2d0
[   66.439542]  ret_from_fork+0x10/0x20
[   66.443100] 
[   66.444581] freed by task 332 on cpu 5 at 66.382139s (0.062438s ago):
[   66.451019]  test_double_free+0x1ac/0x238
[   66.454993]  kunit_try_run_case+0x14c/0x3d0
[   66.459159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.464628]  kthread+0x24c/0x2d0
[   66.467840]  ret_from_fork+0x10/0x20
[   66.471400] 
[   66.472883] CPU: 5 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.481996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.486156] Hardware name: WinLink E850-96 board (DT)
[   66.491194] ==================================================================

test log snippet test parser 146

Home

[   66.602213] ==================================================================
[   66.602342] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   66.602342] 
[   66.602468] Invalid free of 0x(____ptrval____) (in kfence-#120):
[   66.602567]  test_double_free+0x100/0x238
[   66.605048]  kunit_try_run_case+0x14c/0x3d0
[   66.609214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.614683]  kthread+0x24c/0x2d0
[   66.617895]  ret_from_fork+0x10/0x20
[   66.621454] 
[   66.622932] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.622932] 
[   66.632047] allocated by task 334 on cpu 6 at 66.602141s (0.029904s ago):
[   66.638831]  test_alloc+0x22c/0x620
[   66.642287]  test_double_free+0xd4/0x238
[   66.646193]  kunit_try_run_case+0x14c/0x3d0
[   66.650359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.655829]  kthread+0x24c/0x2d0
[   66.659040]  ret_from_fork+0x10/0x20
[   66.662599] 
[   66.664077] freed by task 334 on cpu 6 at 66.602154s (0.061921s ago):
[   66.670516]  test_double_free+0xf0/0x238
[   66.674405]  kunit_try_run_case+0x14c/0x3d0
[   66.678571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.684040]  kthread+0x24c/0x2d0
[   66.687252]  ret_from_fork+0x10/0x20
[   66.690812] 
[   66.692295] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.701409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.705569] Hardware name: WinLink E850-96 board (DT)
[   66.710606] ==================================================================

test log snippet test parser 147

Home

[   66.382195] ==================================================================
[   66.382324] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   66.382324] 
[   66.382451] Invalid free of 0x(____ptrval____) (in kfence-#118):
[   66.382554]  test_double_free+0x1bc/0x238
[   66.385028]  kunit_try_run_case+0x14c/0x3d0
[   66.389195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.394664]  kthread+0x24c/0x2d0
[   66.397875]  ret_from_fork+0x10/0x20
[   66.401434] 
[   66.402913] kfence-#118: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.402913] 
[   66.412549] allocated by task 332 on cpu 5 at 66.382124s (0.030423s ago):
[   66.419336]  test_alloc+0x298/0x620
[   66.422789]  test_double_free+0xd4/0x238
[   66.426694]  kunit_try_run_case+0x14c/0x3d0
[   66.430861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.436331]  kthread+0x24c/0x2d0
[   66.439542]  ret_from_fork+0x10/0x20
[   66.443100] 
[   66.444581] freed by task 332 on cpu 5 at 66.382139s (0.062438s ago):
[   66.451019]  test_double_free+0x1ac/0x238
[   66.454993]  kunit_try_run_case+0x14c/0x3d0
[   66.459159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.464628]  kthread+0x24c/0x2d0
[   66.467840]  ret_from_fork+0x10/0x20
[   66.471400] 
[   66.472883] CPU: 5 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.481996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.486156] Hardware name: WinLink E850-96 board (DT)
[   66.491194] ==================================================================

test log snippet test parser 148

Home

[   67.030202] ==================================================================
[   67.030331] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   67.030331] 
[   67.030463] Invalid free of 0x(____ptrval____) (in kfence-#124):
[   67.030564]  test_invalid_addr_free+0xec/0x238
[   67.033904]  kunit_try_run_case+0x14c/0x3d0
[   67.038071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.043540]  kthread+0x24c/0x2d0
[   67.046751]  ret_from_fork+0x10/0x20
[   67.050310] 
[   67.051789] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.051789] 
[   67.060904] allocated by task 338 on cpu 6 at 67.030146s (0.030756s ago):
[   67.067687]  test_alloc+0x22c/0x620
[   67.071143]  test_invalid_addr_free+0xd4/0x238
[   67.075570]  kunit_try_run_case+0x14c/0x3d0
[   67.079737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.085206]  kthread+0x24c/0x2d0
[   67.088417]  ret_from_fork+0x10/0x20
[   67.091978] 
[   67.093460] CPU: 6 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.102572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.106735] Hardware name: WinLink E850-96 board (DT)
[   67.111772] ==================================================================
[   66.818191] ==================================================================
[   66.818318] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   66.818318] 
[   66.818453] Invalid free of 0x(____ptrval____) (in kfence-#122):
[   66.818557]  test_invalid_addr_free+0x1ac/0x238
[   66.822065]  kunit_try_run_case+0x14c/0x3d0
[   66.826232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.831700]  kthread+0x24c/0x2d0
[   66.834912]  ret_from_fork+0x10/0x20
[   66.838471] 
[   66.839949] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.839949] 
[   66.849586] allocated by task 336 on cpu 4 at 66.818137s (0.031446s ago):
[   66.856371]  test_alloc+0x298/0x620
[   66.859825]  test_invalid_addr_free+0xd4/0x238
[   66.864252]  kunit_try_run_case+0x14c/0x3d0
[   66.868418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.873887]  kthread+0x24c/0x2d0
[   66.877099]  ret_from_fork+0x10/0x20
[   66.880659] 
[   66.882142] CPU: 4 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.891255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.895416] Hardware name: WinLink E850-96 board (DT)
[   66.900454] ==================================================================

test log snippet test parser 149

Home

[   66.818191] ==================================================================
[   66.818318] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   66.818318] 
[   66.818453] Invalid free of 0x(____ptrval____) (in kfence-#122):
[   66.818557]  test_invalid_addr_free+0x1ac/0x238
[   66.822065]  kunit_try_run_case+0x14c/0x3d0
[   66.826232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.831700]  kthread+0x24c/0x2d0
[   66.834912]  ret_from_fork+0x10/0x20
[   66.838471] 
[   66.839949] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.839949] 
[   66.849586] allocated by task 336 on cpu 4 at 66.818137s (0.031446s ago):
[   66.856371]  test_alloc+0x298/0x620
[   66.859825]  test_invalid_addr_free+0xd4/0x238
[   66.864252]  kunit_try_run_case+0x14c/0x3d0
[   66.868418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.873887]  kthread+0x24c/0x2d0
[   66.877099]  ret_from_fork+0x10/0x20
[   66.880659] 
[   66.882142] CPU: 4 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.891255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.895416] Hardware name: WinLink E850-96 board (DT)
[   66.900454] ==================================================================

test log snippet test parser 150

Home

[   67.030202] ==================================================================
[   67.030331] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   67.030331] 
[   67.030463] Invalid free of 0x(____ptrval____) (in kfence-#124):
[   67.030564]  test_invalid_addr_free+0xec/0x238
[   67.033904]  kunit_try_run_case+0x14c/0x3d0
[   67.038071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.043540]  kthread+0x24c/0x2d0
[   67.046751]  ret_from_fork+0x10/0x20
[   67.050310] 
[   67.051789] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.051789] 
[   67.060904] allocated by task 338 on cpu 6 at 67.030146s (0.030756s ago):
[   67.067687]  test_alloc+0x22c/0x620
[   67.071143]  test_invalid_addr_free+0xd4/0x238
[   67.075570]  kunit_try_run_case+0x14c/0x3d0
[   67.079737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.085206]  kthread+0x24c/0x2d0
[   67.088417]  ret_from_fork+0x10/0x20
[   67.091978] 
[   67.093460] CPU: 6 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.102572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.106735] Hardware name: WinLink E850-96 board (DT)
[   67.111772] ==================================================================

test log snippet test parser 151

Home

[   75.305233] ==================================================================
[   75.305419] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   75.305419] 
[   75.305567] Invalid read at 0x(____ptrval____):
[   75.306749]  test_invalid_access+0xdc/0x1f0
[   75.310878]  kunit_try_run_case+0x14c/0x3d0
[   75.315045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.320512]  kthread+0x24c/0x2d0
[   75.323728]  ret_from_fork+0x10/0x20
[   75.327283] 
[   75.328744] CPU: 6 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   75.337883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.342044] Hardware name: WinLink E850-96 board (DT)
[   75.347080] ==================================================================

test log snippet test parser 152

Home

[   75.305233] ==================================================================
[   75.305419] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   75.305419] 
[   75.305567] Invalid read at 0x(____ptrval____):
[   75.306749]  test_invalid_access+0xdc/0x1f0
[   75.310878]  kunit_try_run_case+0x14c/0x3d0
[   75.315045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.320512]  kthread+0x24c/0x2d0
[   75.323728]  ret_from_fork+0x10/0x20
[   75.327283] 
[   75.328744] CPU: 6 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   75.337883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.342044] Hardware name: WinLink E850-96 board (DT)
[   75.347080] ==================================================================

test log snippet test parser 153

Home

[   67.134218] ==================================================================
[   67.139031] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   67.139031] 
[   67.147273] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#125):
[   67.156734]  test_corruption+0x278/0x378
[   67.160639]  kunit_try_run_case+0x14c/0x3d0
[   67.164805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.170274]  kthread+0x24c/0x2d0
[   67.173486]  ret_from_fork+0x10/0x20
[   67.177044] 
[   67.178524] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.178524] 
[   67.188159] allocated by task 340 on cpu 5 at 67.134152s (0.054005s ago):
[   67.194947]  test_alloc+0x298/0x620
[   67.198399]  test_corruption+0xdc/0x378
[   67.202218]  kunit_try_run_case+0x14c/0x3d0
[   67.206384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.211853]  kthread+0x24c/0x2d0
[   67.215064]  ret_from_fork+0x10/0x20
[   67.218624] 
[   67.220102] freed by task 340 on cpu 5 at 67.134166s (0.085933s ago):
[   67.226545]  test_corruption+0x278/0x378
[   67.230431]  kunit_try_run_case+0x14c/0x3d0
[   67.234596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.240064]  kthread+0x24c/0x2d0
[   67.243276]  ret_from_fork+0x10/0x20
[   67.246837] 
[   67.248319] CPU: 5 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.257432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.261593] Hardware name: WinLink E850-96 board (DT)
[   67.266629] ==================================================================
[   67.990213] ==================================================================
[   67.990343] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   67.990343] 
[   67.990474] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#133):
[   67.990631]  test_corruption+0x1d8/0x378
[   67.994177]  kunit_try_run_case+0x14c/0x3d0
[   67.998344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.003812]  kthread+0x24c/0x2d0
[   68.007024]  ret_from_fork+0x10/0x20
[   68.010583] 
[   68.012061] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.012061] 
[   68.021179] allocated by task 342 on cpu 6 at 67.990143s (0.031032s ago):
[   68.027959]  test_alloc+0x22c/0x620
[   68.031416]  test_corruption+0x198/0x378
[   68.035322]  kunit_try_run_case+0x14c/0x3d0
[   68.039489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.044957]  kthread+0x24c/0x2d0
[   68.048169]  ret_from_fork+0x10/0x20
[   68.051728] 
[   68.053206] freed by task 342 on cpu 6 at 67.990156s (0.063048s ago):
[   68.059645]  test_corruption+0x1d8/0x378
[   68.063534]  kunit_try_run_case+0x14c/0x3d0
[   68.067700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.073169]  kthread+0x24c/0x2d0
[   68.076381]  ret_from_fork+0x10/0x20
[   68.079941] 
[   68.081425] CPU: 6 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   68.090537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.094698] Hardware name: WinLink E850-96 board (DT)
[   68.099735] ==================================================================
[   67.770213] ==================================================================
[   67.770346] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   67.770346] 
[   67.770477] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#131):
[   67.772879]  test_corruption+0x120/0x378
[   67.776784]  kunit_try_run_case+0x14c/0x3d0
[   67.780950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.786419]  kthread+0x24c/0x2d0
[   67.789631]  ret_from_fork+0x10/0x20
[   67.793190] 
[   67.794669] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.794669] 
[   67.803782] allocated by task 342 on cpu 6 at 67.770144s (0.033637s ago):
[   67.810566]  test_alloc+0x22c/0x620
[   67.814023]  test_corruption+0xdc/0x378
[   67.817842]  kunit_try_run_case+0x14c/0x3d0
[   67.822009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.827478]  kthread+0x24c/0x2d0
[   67.830689]  ret_from_fork+0x10/0x20
[   67.834248] 
[   67.835727] freed by task 342 on cpu 6 at 67.770156s (0.065569s ago):
[   67.842165]  test_corruption+0x120/0x378
[   67.846054]  kunit_try_run_case+0x14c/0x3d0
[   67.850220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.855689]  kthread+0x24c/0x2d0
[   67.858901]  ret_from_fork+0x10/0x20
[   67.862461] 
[   67.863946] CPU: 6 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.873055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.877218] Hardware name: WinLink E850-96 board (DT)
[   67.882255] ==================================================================
[   67.342182] ==================================================================
[   67.342302] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   67.342302] 
[   67.342434] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#127):
[   67.342595]  test_corruption+0x284/0x378
[   67.346136]  kunit_try_run_case+0x14c/0x3d0
[   67.350303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.355772]  kthread+0x24c/0x2d0
[   67.358983]  ret_from_fork+0x10/0x20
[   67.362543] 
[   67.364021] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.364021] 
[   67.373656] allocated by task 340 on cpu 5 at 67.342117s (0.031538s ago):
[   67.380441]  test_alloc+0x298/0x620
[   67.383896]  test_corruption+0x198/0x378
[   67.387803]  kunit_try_run_case+0x14c/0x3d0
[   67.391970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.397438]  kthread+0x24c/0x2d0
[   67.400650]  ret_from_fork+0x10/0x20
[   67.404209] 
[   67.405688] freed by task 340 on cpu 5 at 67.342131s (0.063554s ago):
[   67.412126]  test_corruption+0x284/0x378
[   67.416014]  kunit_try_run_case+0x14c/0x3d0
[   67.420181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.425649]  kthread+0x24c/0x2d0
[   67.428861]  ret_from_fork+0x10/0x20
[   67.432421] 
[   67.433905] CPU: 5 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.443017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.447178] Hardware name: WinLink E850-96 board (DT)
[   67.452215] ==================================================================

test log snippet test parser 154

Home

[   67.770213] ==================================================================
[   67.770346] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   67.770346] 
[   67.770477] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#131):
[   67.772879]  test_corruption+0x120/0x378
[   67.776784]  kunit_try_run_case+0x14c/0x3d0
[   67.780950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.786419]  kthread+0x24c/0x2d0
[   67.789631]  ret_from_fork+0x10/0x20
[   67.793190] 
[   67.794669] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.794669] 
[   67.803782] allocated by task 342 on cpu 6 at 67.770144s (0.033637s ago):
[   67.810566]  test_alloc+0x22c/0x620
[   67.814023]  test_corruption+0xdc/0x378
[   67.817842]  kunit_try_run_case+0x14c/0x3d0
[   67.822009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.827478]  kthread+0x24c/0x2d0
[   67.830689]  ret_from_fork+0x10/0x20
[   67.834248] 
[   67.835727] freed by task 342 on cpu 6 at 67.770156s (0.065569s ago):
[   67.842165]  test_corruption+0x120/0x378
[   67.846054]  kunit_try_run_case+0x14c/0x3d0
[   67.850220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.855689]  kthread+0x24c/0x2d0
[   67.858901]  ret_from_fork+0x10/0x20
[   67.862461] 
[   67.863946] CPU: 6 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.873055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.877218] Hardware name: WinLink E850-96 board (DT)
[   67.882255] ==================================================================

test log snippet test parser 155

Home

[   67.990213] ==================================================================
[   67.990343] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   67.990343] 
[   67.990474] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#133):
[   67.990631]  test_corruption+0x1d8/0x378
[   67.994177]  kunit_try_run_case+0x14c/0x3d0
[   67.998344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.003812]  kthread+0x24c/0x2d0
[   68.007024]  ret_from_fork+0x10/0x20
[   68.010583] 
[   68.012061] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.012061] 
[   68.021179] allocated by task 342 on cpu 6 at 67.990143s (0.031032s ago):
[   68.027959]  test_alloc+0x22c/0x620
[   68.031416]  test_corruption+0x198/0x378
[   68.035322]  kunit_try_run_case+0x14c/0x3d0
[   68.039489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.044957]  kthread+0x24c/0x2d0
[   68.048169]  ret_from_fork+0x10/0x20
[   68.051728] 
[   68.053206] freed by task 342 on cpu 6 at 67.990156s (0.063048s ago):
[   68.059645]  test_corruption+0x1d8/0x378
[   68.063534]  kunit_try_run_case+0x14c/0x3d0
[   68.067700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.073169]  kthread+0x24c/0x2d0
[   68.076381]  ret_from_fork+0x10/0x20
[   68.079941] 
[   68.081425] CPU: 6 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   68.090537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.094698] Hardware name: WinLink E850-96 board (DT)
[   68.099735] ==================================================================

test log snippet test parser 156

Home

[   67.134218] ==================================================================
[   67.139031] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   67.139031] 
[   67.147273] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#125):
[   67.156734]  test_corruption+0x278/0x378
[   67.160639]  kunit_try_run_case+0x14c/0x3d0
[   67.164805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.170274]  kthread+0x24c/0x2d0
[   67.173486]  ret_from_fork+0x10/0x20
[   67.177044] 
[   67.178524] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.178524] 
[   67.188159] allocated by task 340 on cpu 5 at 67.134152s (0.054005s ago):
[   67.194947]  test_alloc+0x298/0x620
[   67.198399]  test_corruption+0xdc/0x378
[   67.202218]  kunit_try_run_case+0x14c/0x3d0
[   67.206384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.211853]  kthread+0x24c/0x2d0
[   67.215064]  ret_from_fork+0x10/0x20
[   67.218624] 
[   67.220102] freed by task 340 on cpu 5 at 67.134166s (0.085933s ago):
[   67.226545]  test_corruption+0x278/0x378
[   67.230431]  kunit_try_run_case+0x14c/0x3d0
[   67.234596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.240064]  kthread+0x24c/0x2d0
[   67.243276]  ret_from_fork+0x10/0x20
[   67.246837] 
[   67.248319] CPU: 5 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.257432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.261593] Hardware name: WinLink E850-96 board (DT)
[   67.266629] ==================================================================

test log snippet test parser 157

Home

[   67.342182] ==================================================================
[   67.342302] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   67.342302] 
[   67.342434] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#127):
[   67.342595]  test_corruption+0x284/0x378
[   67.346136]  kunit_try_run_case+0x14c/0x3d0
[   67.350303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.355772]  kthread+0x24c/0x2d0
[   67.358983]  ret_from_fork+0x10/0x20
[   67.362543] 
[   67.364021] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.364021] 
[   67.373656] allocated by task 340 on cpu 5 at 67.342117s (0.031538s ago):
[   67.380441]  test_alloc+0x298/0x620
[   67.383896]  test_corruption+0x198/0x378
[   67.387803]  kunit_try_run_case+0x14c/0x3d0
[   67.391970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.397438]  kthread+0x24c/0x2d0
[   67.400650]  ret_from_fork+0x10/0x20
[   67.404209] 
[   67.405688] freed by task 340 on cpu 5 at 67.342131s (0.063554s ago):
[   67.412126]  test_corruption+0x284/0x378
[   67.416014]  kunit_try_run_case+0x14c/0x3d0
[   67.420181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.425649]  kthread+0x24c/0x2d0
[   67.428861]  ret_from_fork+0x10/0x20
[   67.432421] 
[   67.433905] CPU: 5 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   67.443017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.447178] Hardware name: WinLink E850-96 board (DT)
[   67.452215] ==================================================================

test log snippet test parser 158

Home

[   74.970206] ==================================================================
[   74.970335] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.970335] 
[   74.970480] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#200):
[   74.974171]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.979378]  kunit_try_run_case+0x14c/0x3d0
[   74.983544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.989013]  kthread+0x24c/0x2d0
[   74.992226]  ret_from_fork+0x10/0x20
[   74.995784] 
[   74.997263] kfence-#200: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   74.997263] 
[   75.006901] allocated by task 354 on cpu 6 at 74.970131s (0.036765s ago):
[   75.013681]  test_alloc+0x298/0x620
[   75.017138]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   75.022259]  kunit_try_run_case+0x14c/0x3d0
[   75.026426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.031895]  kthread+0x24c/0x2d0
[   75.035106]  ret_from_fork+0x10/0x20
[   75.038665] 
[   75.040143] freed by task 354 on cpu 6 at 74.970147s (0.069995s ago):
[   75.046583]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.051773]  kunit_try_run_case+0x14c/0x3d0
[   75.055940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.061408]  kthread+0x24c/0x2d0
[   75.064619]  ret_from_fork+0x10/0x20
[   75.068180] 
[   75.069663] CPU: 6 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   75.078774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.082937] Hardware name: WinLink E850-96 board (DT)
[   75.087974] ==================================================================

test log snippet test parser 159

Home

[   74.970206] ==================================================================
[   74.970335] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.970335] 
[   74.970480] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#200):
[   74.974171]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.979378]  kunit_try_run_case+0x14c/0x3d0
[   74.983544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.989013]  kthread+0x24c/0x2d0
[   74.992226]  ret_from_fork+0x10/0x20
[   74.995784] 
[   74.997263] kfence-#200: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   74.997263] 
[   75.006901] allocated by task 354 on cpu 6 at 74.970131s (0.036765s ago):
[   75.013681]  test_alloc+0x298/0x620
[   75.017138]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   75.022259]  kunit_try_run_case+0x14c/0x3d0
[   75.026426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.031895]  kthread+0x24c/0x2d0
[   75.035106]  ret_from_fork+0x10/0x20
[   75.038665] 
[   75.040143] freed by task 354 on cpu 6 at 74.970147s (0.069995s ago):
[   75.046583]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.051773]  kunit_try_run_case+0x14c/0x3d0
[   75.055940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.061408]  kthread+0x24c/0x2d0
[   75.064619]  ret_from_fork+0x10/0x20
[   75.068180] 
[   75.069663] CPU: 6 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   75.078774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.082937] Hardware name: WinLink E850-96 board (DT)
[   75.087974] ==================================================================

test log snippet test parser 160

Home

[   74.346149] ==================================================================
[   74.346279] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   74.346279] 
[   74.346444] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#194):
[   74.348118]  test_kmalloc_aligned_oob_read+0x238/0x468
[   74.353238]  kunit_try_run_case+0x14c/0x3d0
[   74.357405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.362873]  kthread+0x24c/0x2d0
[   74.366085]  ret_from_fork+0x10/0x20
[   74.369644] 
[   74.371121] kfence-#194: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   74.371121] 
[   74.380757] allocated by task 352 on cpu 7 at 74.346114s (0.034641s ago):
[   74.387546]  test_alloc+0x298/0x620
[   74.390997]  test_kmalloc_aligned_oob_read+0x100/0x468
[   74.396119]  kunit_try_run_case+0x14c/0x3d0
[   74.400286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.405754]  kthread+0x24c/0x2d0
[   74.408966]  ret_from_fork+0x10/0x20
[   74.412527] 
[   74.414010] CPU: 7 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   74.423123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.427283] Hardware name: WinLink E850-96 board (DT)
[   74.432321] ==================================================================

test log snippet test parser 161

Home

[   74.346149] ==================================================================
[   74.346279] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   74.346279] 
[   74.346444] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#194):
[   74.348118]  test_kmalloc_aligned_oob_read+0x238/0x468
[   74.353238]  kunit_try_run_case+0x14c/0x3d0
[   74.357405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.362873]  kthread+0x24c/0x2d0
[   74.366085]  ret_from_fork+0x10/0x20
[   74.369644] 
[   74.371121] kfence-#194: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   74.371121] 
[   74.380757] allocated by task 352 on cpu 7 at 74.346114s (0.034641s ago):
[   74.387546]  test_alloc+0x298/0x620
[   74.390997]  test_kmalloc_aligned_oob_read+0x100/0x468
[   74.396119]  kunit_try_run_case+0x14c/0x3d0
[   74.400286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.405754]  kthread+0x24c/0x2d0
[   74.408966]  ret_from_fork+0x10/0x20
[   74.412527] 
[   74.414010] CPU: 7 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   74.423123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.427283] Hardware name: WinLink E850-96 board (DT)
[   74.432321] ==================================================================

test log snippet test parser 162

Home

[   64.898170] ==================================================================
[   64.898304] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   64.898304] 
[   64.898456] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#104):
[   64.899362]  test_out_of_bounds_read+0x114/0x3e0
[   64.903961]  kunit_try_run_case+0x14c/0x3d0
[   64.908127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.913596]  kthread+0x24c/0x2d0
[   64.916808]  ret_from_fork+0x10/0x20
[   64.920367] 
[   64.921846] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   64.921846] 
[   64.930960] allocated by task 322 on cpu 6 at 64.898136s (0.032822s ago):
[   64.937748]  test_alloc+0x22c/0x620
[   64.941200]  test_out_of_bounds_read+0xdc/0x3e0
[   64.945713]  kunit_try_run_case+0x14c/0x3d0
[   64.949880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.955349]  kthread+0x24c/0x2d0
[   64.958560]  ret_from_fork+0x10/0x20
[   64.962121] 
[   64.963604] CPU: 6 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   64.972717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.976878] Hardware name: WinLink E850-96 board (DT)
[   64.981915] ==================================================================
[   65.106176] ==================================================================
[   65.106307] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   65.106307] 
[   65.106459] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#106):
[   65.107539]  test_out_of_bounds_read+0x1c8/0x3e0
[   65.112138]  kunit_try_run_case+0x14c/0x3d0
[   65.116305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.121773]  kthread+0x24c/0x2d0
[   65.124985]  ret_from_fork+0x10/0x20
[   65.128544] 
[   65.130023] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.130023] 
[   65.139136] allocated by task 322 on cpu 6 at 65.106142s (0.032992s ago):
[   65.145926]  test_alloc+0x22c/0x620
[   65.149377]  test_out_of_bounds_read+0x198/0x3e0
[   65.153978]  kunit_try_run_case+0x14c/0x3d0
[   65.158144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.163613]  kthread+0x24c/0x2d0
[   65.166825]  ret_from_fork+0x10/0x20
[   65.170385] 
[   65.171868] CPU: 6 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   65.180981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.185142] Hardware name: WinLink E850-96 board (DT)
[   65.190179] ==================================================================
[   64.270156] ==================================================================
[   64.270290] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   64.270290] 
[   64.270440] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#98):
[   64.271261]  test_out_of_bounds_read+0x114/0x3e0
[   64.275860]  kunit_try_run_case+0x14c/0x3d0
[   64.280027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.285496]  kthread+0x24c/0x2d0
[   64.288707]  ret_from_fork+0x10/0x20
[   64.292266] 
[   64.293745] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   64.293745] 
[   64.303294] allocated by task 320 on cpu 5 at 64.270124s (0.033168s ago):
[   64.310082]  test_alloc+0x298/0x620
[   64.313533]  test_out_of_bounds_read+0xdc/0x3e0
[   64.318047]  kunit_try_run_case+0x14c/0x3d0
[   64.322214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.327683]  kthread+0x24c/0x2d0
[   64.330894]  ret_from_fork+0x10/0x20
[   64.334455] 
[   64.335938] CPU: 5 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   64.345054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.349210] Hardware name: WinLink E850-96 board (DT)
[   64.354249] ==================================================================
[   64.374142] ==================================================================
[   64.377248] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   64.377248] 
[   64.386276] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#99):
[   64.393567]  test_out_of_bounds_read+0x1c8/0x3e0
[   64.398168]  kunit_try_run_case+0x14c/0x3d0
[   64.402334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.407803]  kthread+0x24c/0x2d0
[   64.411014]  ret_from_fork+0x10/0x20
[   64.414574] 
[   64.416051] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   64.416051] 
[   64.425598] allocated by task 320 on cpu 5 at 64.374118s (0.051478s ago):
[   64.432385]  test_alloc+0x298/0x620
[   64.435841]  test_out_of_bounds_read+0x198/0x3e0
[   64.440441]  kunit_try_run_case+0x14c/0x3d0
[   64.444608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.450077]  kthread+0x24c/0x2d0
[   64.453288]  ret_from_fork+0x10/0x20
[   64.456848] 
[   64.458329] CPU: 5 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   64.467447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.471605] Hardware name: WinLink E850-96 board (DT)
[   64.476640] ==================================================================

test log snippet test parser 163

Home

[   64.374142] ==================================================================
[   64.377248] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   64.377248] 
[   64.386276] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#99):
[   64.393567]  test_out_of_bounds_read+0x1c8/0x3e0
[   64.398168]  kunit_try_run_case+0x14c/0x3d0
[   64.402334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.407803]  kthread+0x24c/0x2d0
[   64.411014]  ret_from_fork+0x10/0x20
[   64.414574] 
[   64.416051] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   64.416051] 
[   64.425598] allocated by task 320 on cpu 5 at 64.374118s (0.051478s ago):
[   64.432385]  test_alloc+0x298/0x620
[   64.435841]  test_out_of_bounds_read+0x198/0x3e0
[   64.440441]  kunit_try_run_case+0x14c/0x3d0
[   64.444608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.450077]  kthread+0x24c/0x2d0
[   64.453288]  ret_from_fork+0x10/0x20
[   64.456848] 
[   64.458329] CPU: 5 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   64.467447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.471605] Hardware name: WinLink E850-96 board (DT)
[   64.476640] ==================================================================

test log snippet test parser 164

Home

[   64.898170] ==================================================================
[   64.898304] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   64.898304] 
[   64.898456] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#104):
[   64.899362]  test_out_of_bounds_read+0x114/0x3e0
[   64.903961]  kunit_try_run_case+0x14c/0x3d0
[   64.908127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.913596]  kthread+0x24c/0x2d0
[   64.916808]  ret_from_fork+0x10/0x20
[   64.920367] 
[   64.921846] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   64.921846] 
[   64.930960] allocated by task 322 on cpu 6 at 64.898136s (0.032822s ago):
[   64.937748]  test_alloc+0x22c/0x620
[   64.941200]  test_out_of_bounds_read+0xdc/0x3e0
[   64.945713]  kunit_try_run_case+0x14c/0x3d0
[   64.949880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.955349]  kthread+0x24c/0x2d0
[   64.958560]  ret_from_fork+0x10/0x20
[   64.962121] 
[   64.963604] CPU: 6 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   64.972717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.976878] Hardware name: WinLink E850-96 board (DT)
[   64.981915] ==================================================================

test log snippet test parser 165

Home

[   64.270156] ==================================================================
[   64.270290] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   64.270290] 
[   64.270440] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#98):
[   64.271261]  test_out_of_bounds_read+0x114/0x3e0
[   64.275860]  kunit_try_run_case+0x14c/0x3d0
[   64.280027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.285496]  kthread+0x24c/0x2d0
[   64.288707]  ret_from_fork+0x10/0x20
[   64.292266] 
[   64.293745] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   64.293745] 
[   64.303294] allocated by task 320 on cpu 5 at 64.270124s (0.033168s ago):
[   64.310082]  test_alloc+0x298/0x620
[   64.313533]  test_out_of_bounds_read+0xdc/0x3e0
[   64.318047]  kunit_try_run_case+0x14c/0x3d0
[   64.322214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.327683]  kthread+0x24c/0x2d0
[   64.330894]  ret_from_fork+0x10/0x20
[   64.334455] 
[   64.335938] CPU: 5 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   64.345054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.349210] Hardware name: WinLink E850-96 board (DT)
[   64.354249] ==================================================================

test log snippet test parser 166

Home

[   65.106176] ==================================================================
[   65.106307] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   65.106307] 
[   65.106459] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#106):
[   65.107539]  test_out_of_bounds_read+0x1c8/0x3e0
[   65.112138]  kunit_try_run_case+0x14c/0x3d0
[   65.116305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.121773]  kthread+0x24c/0x2d0
[   65.124985]  ret_from_fork+0x10/0x20
[   65.128544] 
[   65.130023] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.130023] 
[   65.139136] allocated by task 322 on cpu 6 at 65.106142s (0.032992s ago):
[   65.145926]  test_alloc+0x22c/0x620
[   65.149377]  test_out_of_bounds_read+0x198/0x3e0
[   65.153978]  kunit_try_run_case+0x14c/0x3d0
[   65.158144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.163613]  kthread+0x24c/0x2d0
[   65.166825]  ret_from_fork+0x10/0x20
[   65.170385] 
[   65.171868] CPU: 6 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   65.180981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.185142] Hardware name: WinLink E850-96 board (DT)
[   65.190179] ==================================================================

test log snippet test parser 167

Home

[   65.730170] ==================================================================
[   65.730302] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   65.730302] 
[   65.730455] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#112):
[   65.731620]  test_out_of_bounds_write+0x100/0x240
[   65.736306]  kunit_try_run_case+0x14c/0x3d0
[   65.740472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.745941]  kthread+0x24c/0x2d0
[   65.749152]  ret_from_fork+0x10/0x20
[   65.752712] 
[   65.754189] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.754189] 
[   65.763305] allocated by task 326 on cpu 6 at 65.730137s (0.033166s ago):
[   65.770092]  test_alloc+0x22c/0x620
[   65.773546]  test_out_of_bounds_write+0xc8/0x240
[   65.778145]  kunit_try_run_case+0x14c/0x3d0
[   65.782312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.787781]  kthread+0x24c/0x2d0
[   65.790992]  ret_from_fork+0x10/0x20
[   65.794553] 
[   65.796036] CPU: 6 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   65.805147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.809309] Hardware name: WinLink E850-96 board (DT)
[   65.814347] ==================================================================
[   65.418160] ==================================================================
[   65.418290] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   65.418290] 
[   65.418445] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#109):
[   65.419607]  test_out_of_bounds_write+0x100/0x240
[   65.424295]  kunit_try_run_case+0x14c/0x3d0
[   65.428461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.433930]  kthread+0x24c/0x2d0
[   65.437142]  ret_from_fork+0x10/0x20
[   65.440701] 
[   65.442179] kfence-#109: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.442179] 
[   65.451815] allocated by task 324 on cpu 5 at 65.418130s (0.033684s ago):
[   65.458602]  test_alloc+0x298/0x620
[   65.462055]  test_out_of_bounds_write+0xc8/0x240
[   65.466655]  kunit_try_run_case+0x14c/0x3d0
[   65.470822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.476291]  kthread+0x24c/0x2d0
[   65.479504]  ret_from_fork+0x10/0x20
[   65.483063] 
[   65.484546] CPU: 5 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   65.493658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.497819] Hardware name: WinLink E850-96 board (DT)
[   65.502857] ==================================================================

test log snippet test parser 168

Home

[   65.730170] ==================================================================
[   65.730302] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   65.730302] 
[   65.730455] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#112):
[   65.731620]  test_out_of_bounds_write+0x100/0x240
[   65.736306]  kunit_try_run_case+0x14c/0x3d0
[   65.740472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.745941]  kthread+0x24c/0x2d0
[   65.749152]  ret_from_fork+0x10/0x20
[   65.752712] 
[   65.754189] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.754189] 
[   65.763305] allocated by task 326 on cpu 6 at 65.730137s (0.033166s ago):
[   65.770092]  test_alloc+0x22c/0x620
[   65.773546]  test_out_of_bounds_write+0xc8/0x240
[   65.778145]  kunit_try_run_case+0x14c/0x3d0
[   65.782312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.787781]  kthread+0x24c/0x2d0
[   65.790992]  ret_from_fork+0x10/0x20
[   65.794553] 
[   65.796036] CPU: 6 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   65.805147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.809309] Hardware name: WinLink E850-96 board (DT)
[   65.814347] ==================================================================

test log snippet test parser 169

Home

[   65.418160] ==================================================================
[   65.418290] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   65.418290] 
[   65.418445] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#109):
[   65.419607]  test_out_of_bounds_write+0x100/0x240
[   65.424295]  kunit_try_run_case+0x14c/0x3d0
[   65.428461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.433930]  kthread+0x24c/0x2d0
[   65.437142]  ret_from_fork+0x10/0x20
[   65.440701] 
[   65.442179] kfence-#109: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.442179] 
[   65.451815] allocated by task 324 on cpu 5 at 65.418130s (0.033684s ago):
[   65.458602]  test_alloc+0x298/0x620
[   65.462055]  test_out_of_bounds_write+0xc8/0x240
[   65.466655]  kunit_try_run_case+0x14c/0x3d0
[   65.470822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.476291]  kthread+0x24c/0x2d0
[   65.479504]  ret_from_fork+0x10/0x20
[   65.483063] 
[   65.484546] CPU: 5 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   65.493658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.497819] Hardware name: WinLink E850-96 board (DT)
[   65.502857] ==================================================================

test log snippet test parser 170

Home

[   98.878256] ==================================================================
[   98.878375] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   98.878375] 
[   98.878516] Use-after-free read at 0x(____ptrval____) (in kfence-#208):
[   98.879442]  test_krealloc+0x51c/0x830
[   98.883175]  kunit_try_run_case+0x14c/0x3d0
[   98.887341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.892809]  kthread+0x24c/0x2d0
[   98.896021]  ret_from_fork+0x10/0x20
[   98.899581] 
[   98.901060] kfence-#208: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   98.901060] 
[   98.910694] allocated by task 366 on cpu 6 at 98.878165s (0.032527s ago):
[   98.917484]  test_alloc+0x298/0x620
[   98.920934]  test_krealloc+0xc0/0x830
[   98.924580]  kunit_try_run_case+0x14c/0x3d0
[   98.928747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.934215]  kthread+0x24c/0x2d0
[   98.937427]  ret_from_fork+0x10/0x20
[   98.940986] 
[   98.942464] freed by task 366 on cpu 6 at 98.878193s (0.064269s ago):
[   98.948904]  krealloc_noprof+0xa8/0x1a0
[   98.952704]  test_krealloc+0x1dc/0x830
[   98.956437]  kunit_try_run_case+0x14c/0x3d0
[   98.960604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.966072]  kthread+0x24c/0x2d0
[   98.969284]  ret_from_fork+0x10/0x20
[   98.972845] 
[   98.974327] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   98.983445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   98.987601] Hardware name: WinLink E850-96 board (DT)
[   98.992639] ==================================================================

test log snippet test parser 171

Home

[   98.878256] ==================================================================
[   98.878375] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   98.878375] 
[   98.878516] Use-after-free read at 0x(____ptrval____) (in kfence-#208):
[   98.879442]  test_krealloc+0x51c/0x830
[   98.883175]  kunit_try_run_case+0x14c/0x3d0
[   98.887341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.892809]  kthread+0x24c/0x2d0
[   98.896021]  ret_from_fork+0x10/0x20
[   98.899581] 
[   98.901060] kfence-#208: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   98.901060] 
[   98.910694] allocated by task 366 on cpu 6 at 98.878165s (0.032527s ago):
[   98.917484]  test_alloc+0x298/0x620
[   98.920934]  test_krealloc+0xc0/0x830
[   98.924580]  kunit_try_run_case+0x14c/0x3d0
[   98.928747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.934215]  kthread+0x24c/0x2d0
[   98.937427]  ret_from_fork+0x10/0x20
[   98.940986] 
[   98.942464] freed by task 366 on cpu 6 at 98.878193s (0.064269s ago):
[   98.948904]  krealloc_noprof+0xa8/0x1a0
[   98.952704]  test_krealloc+0x1dc/0x830
[   98.956437]  kunit_try_run_case+0x14c/0x3d0
[   98.960604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.966072]  kthread+0x24c/0x2d0
[   98.969284]  ret_from_fork+0x10/0x20
[   98.972845] 
[   98.974327] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   98.983445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   98.987601] Hardware name: WinLink E850-96 board (DT)
[   98.992639] ==================================================================

test log snippet test parser 172

Home

[   98.654141] ==================================================================
[   98.654284] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   98.654284] 
[   98.654443] Use-after-free read at 0x(____ptrval____) (in kfence-#206):
[   98.655339]  test_memcache_typesafe_by_rcu+0x280/0x560
[   98.660461]  kunit_try_run_case+0x14c/0x3d0
[   98.664628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.670096]  kthread+0x24c/0x2d0
[   98.673308]  ret_from_fork+0x10/0x20
[   98.676867] 
[   98.678346] kfence-#206: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   98.678346] 
[   98.687460] allocated by task 364 on cpu 5 at 98.602132s (0.085326s ago):
[   98.694248]  test_alloc+0x22c/0x620
[   98.697700]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   98.702821]  kunit_try_run_case+0x14c/0x3d0
[   98.706988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.712458]  kthread+0x24c/0x2d0
[   98.715668]  ret_from_fork+0x10/0x20
[   98.719227] 
[   98.720705] freed by task 364 on cpu 5 at 98.602148s (0.118555s ago):
[   98.727139]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   98.732251]  kunit_try_run_case+0x14c/0x3d0
[   98.736414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.741883]  kthread+0x24c/0x2d0
[   98.745095]  ret_from_fork+0x10/0x20
[   98.748656] 
[   98.750138] CPU: 5 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   98.759251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   98.763412] Hardware name: WinLink E850-96 board (DT)
[   98.768449] ==================================================================

test log snippet test parser 173

Home

[   98.654141] ==================================================================
[   98.654284] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   98.654284] 
[   98.654443] Use-after-free read at 0x(____ptrval____) (in kfence-#206):
[   98.655339]  test_memcache_typesafe_by_rcu+0x280/0x560
[   98.660461]  kunit_try_run_case+0x14c/0x3d0
[   98.664628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.670096]  kthread+0x24c/0x2d0
[   98.673308]  ret_from_fork+0x10/0x20
[   98.676867] 
[   98.678346] kfence-#206: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   98.678346] 
[   98.687460] allocated by task 364 on cpu 5 at 98.602132s (0.085326s ago):
[   98.694248]  test_alloc+0x22c/0x620
[   98.697700]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   98.702821]  kunit_try_run_case+0x14c/0x3d0
[   98.706988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.712458]  kthread+0x24c/0x2d0
[   98.715668]  ret_from_fork+0x10/0x20
[   98.719227] 
[   98.720705] freed by task 364 on cpu 5 at 98.602148s (0.118555s ago):
[   98.727139]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   98.732251]  kunit_try_run_case+0x14c/0x3d0
[   98.736414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.741883]  kthread+0x24c/0x2d0
[   98.745095]  ret_from_fork+0x10/0x20
[   98.748656] 
[   98.750138] CPU: 5 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   98.759251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   98.763412] Hardware name: WinLink E850-96 board (DT)
[   98.768449] ==================================================================

test log snippet test parser 174

Home

[   66.162185] ==================================================================
[   66.162310] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   66.162310] 
[   66.162461] Use-after-free read at 0x(____ptrval____) (in kfence-#116):
[   66.162933]  test_use_after_free_read+0x114/0x248
[   66.167620]  kunit_try_run_case+0x14c/0x3d0
[   66.171787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.177256]  kthread+0x24c/0x2d0
[   66.180467]  ret_from_fork+0x10/0x20
[   66.184026] 
[   66.185505] kfence-#116: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.185505] 
[   66.194619] allocated by task 330 on cpu 5 at 66.162135s (0.032481s ago):
[   66.201407]  test_alloc+0x22c/0x620
[   66.204859]  test_use_after_free_read+0xd0/0x248
[   66.209460]  kunit_try_run_case+0x14c/0x3d0
[   66.213626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.219095]  kthread+0x24c/0x2d0
[   66.222307]  ret_from_fork+0x10/0x20
[   66.225866] 
[   66.227343] freed by task 330 on cpu 5 at 66.162148s (0.065193s ago):
[   66.233787]  test_use_after_free_read+0xf0/0x248
[   66.238365]  kunit_try_run_case+0x14c/0x3d0
[   66.242532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.248001]  kthread+0x24c/0x2d0
[   66.251213]  ret_from_fork+0x10/0x20
[   66.254773] 
[   66.256255] CPU: 5 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.265368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.269529] Hardware name: WinLink E850-96 board (DT)
[   66.274567] ==================================================================
[   65.938189] ==================================================================
[   65.938321] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   65.938321] 
[   65.938474] Use-after-free read at 0x(____ptrval____) (in kfence-#114):
[   65.938942]  test_use_after_free_read+0x114/0x248
[   65.943630]  kunit_try_run_case+0x14c/0x3d0
[   65.947796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.953265]  kthread+0x24c/0x2d0
[   65.956477]  ret_from_fork+0x10/0x20
[   65.960036] 
[   65.961515] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.961515] 
[   65.971149] allocated by task 328 on cpu 7 at 65.938134s (0.033014s ago):
[   65.977938]  test_alloc+0x298/0x620
[   65.981390]  test_use_after_free_read+0xd0/0x248
[   65.985991]  kunit_try_run_case+0x14c/0x3d0
[   65.990157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.995626]  kthread+0x24c/0x2d0
[   65.998837]  ret_from_fork+0x10/0x20
[   66.002397] 
[   66.003874] freed by task 328 on cpu 7 at 65.938149s (0.065723s ago):
[   66.010315]  test_use_after_free_read+0x1c0/0x248
[   66.014983]  kunit_try_run_case+0x14c/0x3d0
[   66.019150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.024618]  kthread+0x24c/0x2d0
[   66.027830]  ret_from_fork+0x10/0x20
[   66.031391] 
[   66.032873] CPU: 7 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.041987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.046147] Hardware name: WinLink E850-96 board (DT)
[   66.051184] ==================================================================

test log snippet test parser 175

Home

[   65.938189] ==================================================================
[   65.938321] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   65.938321] 
[   65.938474] Use-after-free read at 0x(____ptrval____) (in kfence-#114):
[   65.938942]  test_use_after_free_read+0x114/0x248
[   65.943630]  kunit_try_run_case+0x14c/0x3d0
[   65.947796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.953265]  kthread+0x24c/0x2d0
[   65.956477]  ret_from_fork+0x10/0x20
[   65.960036] 
[   65.961515] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.961515] 
[   65.971149] allocated by task 328 on cpu 7 at 65.938134s (0.033014s ago):
[   65.977938]  test_alloc+0x298/0x620
[   65.981390]  test_use_after_free_read+0xd0/0x248
[   65.985991]  kunit_try_run_case+0x14c/0x3d0
[   65.990157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.995626]  kthread+0x24c/0x2d0
[   65.998837]  ret_from_fork+0x10/0x20
[   66.002397] 
[   66.003874] freed by task 328 on cpu 7 at 65.938149s (0.065723s ago):
[   66.010315]  test_use_after_free_read+0x1c0/0x248
[   66.014983]  kunit_try_run_case+0x14c/0x3d0
[   66.019150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.024618]  kthread+0x24c/0x2d0
[   66.027830]  ret_from_fork+0x10/0x20
[   66.031391] 
[   66.032873] CPU: 7 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.041987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.046147] Hardware name: WinLink E850-96 board (DT)
[   66.051184] ==================================================================

test log snippet test parser 176

Home

[   66.162185] ==================================================================
[   66.162310] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   66.162310] 
[   66.162461] Use-after-free read at 0x(____ptrval____) (in kfence-#116):
[   66.162933]  test_use_after_free_read+0x114/0x248
[   66.167620]  kunit_try_run_case+0x14c/0x3d0
[   66.171787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.177256]  kthread+0x24c/0x2d0
[   66.180467]  ret_from_fork+0x10/0x20
[   66.184026] 
[   66.185505] kfence-#116: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.185505] 
[   66.194619] allocated by task 330 on cpu 5 at 66.162135s (0.032481s ago):
[   66.201407]  test_alloc+0x22c/0x620
[   66.204859]  test_use_after_free_read+0xd0/0x248
[   66.209460]  kunit_try_run_case+0x14c/0x3d0
[   66.213626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.219095]  kthread+0x24c/0x2d0
[   66.222307]  ret_from_fork+0x10/0x20
[   66.225866] 
[   66.227343] freed by task 330 on cpu 5 at 66.162148s (0.065193s ago):
[   66.233787]  test_use_after_free_read+0xf0/0x248
[   66.238365]  kunit_try_run_case+0x14c/0x3d0
[   66.242532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.248001]  kthread+0x24c/0x2d0
[   66.251213]  ret_from_fork+0x10/0x20
[   66.254773] 
[   66.256255] CPU: 5 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N 6.12.10-rc1 #1
[   66.265368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.269529] Hardware name: WinLink E850-96 board (DT)
[   66.274567] ==================================================================

test log snippet test parser 177

Home

[  219.347188] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  219.355403] SMP: stopping secondary CPUs
[  219.359327] Kernel Offset: disabled
[  219.362777] CPU features: 0x08,00000000,00200928,0200721b
[  219.368158] Memory Limit: none
[  219.371206] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 178

Home

[  219.347188] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  219.355403] SMP: stopping secondary CPUs
[  219.359327] Kernel Offset: disabled
[  219.362777] CPU features: 0x08,00000000,00200928,0200721b
[  219.368158] Memory Limit: none
[  219.371206] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 179

Home

------------[ cut here ]------------
[   51.391549] WARNING: CPU: 0 PID: 1440 at mm/util.c:670 __kvmalloc_node_noprof+0x138/0x148
[   51.393490] Modules linked in: smsc smsc95xx usbnet crct10dif_ce ramoops reed_solomon fuse drm backlight ip_tables x_tables
[   51.404601] CPU: 0 UID: 0 PID: 1440 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   51.412064] Hardware name: WinLink E850-96 board (DT)
[   51.417099] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.424042] pc : __kvmalloc_node_noprof+0x138/0x148
[   51.428902] lr : __kvmalloc_node_noprof+0x64/0x148
[   51.433677] sp : ffff800084943ce0
[   51.436974] x29: ffff800084943cf0 x28: ffff00080a14db40 x27: 0000000000000000
[   51.444092] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0008010a1080
[   51.451211] x23: ffff0008010a1100 x22: ffff80008032d6b0 x21: 0000000200002000
[   51.458329] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   51.465445] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.472563] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.479681] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.486799] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   51.493918] x5 : 0000000000000000 x4 : ffff00080a14db40 x3 : 0000000000000000
[   51.501035] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.508156] Call trace:
[   51.510586]  __kvmalloc_node_noprof+0x138/0x148
[   51.515102]  alloc_fdtable+0x90/0x110
[   51.518746]  expand_files+0x78/0x318
[   51.522306]  ksys_dup3+0x60/0x120
[   51.525601]  __arm64_sys_dup3+0x20/0x30
[   51.529422]  invoke_syscall+0x48/0x10c
[   51.533153]  el0_svc_common.constprop.0+0x40/0xe0
[   51.537842]  do_el0_svc+0x1c/0x28
[   51.541141]  el0_svc+0x30/0xcc
[   51.544177]  el0t_64_sync_handler+0x120/0x12c
[   51.548517]  el0t_64_sync+0x190/0x194
[   51.552167] ---[ end trace 0000000000000000 ]---

test log snippet test parser 180

Home

------------[ cut here ]------------
[  260.713711] WARNING: CPU: 0 PID: 535 at mm/util.c:670 __kvmalloc_node_noprof+0x11c/0x124
[  260.713902] Modules linked in: panel_simple arm_spe_pmu crct10dif_ce pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  260.714348] CPU: 0 UID: 0 PID: 535 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[  260.714477] Hardware name: FVP Base RevC (DT)
[  260.714554] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  260.714689] pc : __kvmalloc_node_noprof+0x11c/0x124
[  260.714838] lr : __kvmalloc_node_noprof+0x50/0x124
[  260.714987] sp : ffff8000819bbce0
[  260.715052] x29: ffff8000819bbcf0 x28: ffff000808912480 x27: 0000000000000000
[  260.715242] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  260.715423] x23: 0000000080000000 x22: 1bb2a9916654b268 x21: 0000000200002000
[  260.715610] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  260.715794] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  260.715975] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  260.716156] x11: 0000000000000040 x10: 3a8a7fe9f6f5c800 x9 : 3a8a7fe9f6f5c800
[  260.716342] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  260.716521] x5 : 0000000000000000 x4 : ffff8000819bbcb0 x3 : 0000000000000000
[  260.716703] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  260.716882] Call trace:
[  260.716941]  __kvmalloc_node_noprof+0x11c/0x124
[  260.717093]  alloc_fdtable+0x7c/0x108
[  260.717216]  expand_files+0x114/0x2f0
[  260.717343]  ksys_dup3+0x64/0xfc
[  260.717471]  __arm64_sys_dup3+0x20/0x30
[  260.717602]  invoke_syscall+0x40/0xf8
[  260.717737]  el0_svc_common+0xa8/0xd8
[  260.717872]  do_el0_svc+0x1c/0x28
[  260.718004]  el0_svc+0x38/0x68
[  260.718139]  el0t_64_sync_handler+0x90/0xfc
[  260.718285]  el0t_64_sync+0x190/0x194
[  260.718392] ---[ end trace 0000000000000000 ]---

test log snippet test parser 181

Home

------------[ cut here ]------------
[  250.298466] WARNING: CPU: 3 PID: 532 at mm/util.c:670 __kvmalloc_node_noprof+0x138/0x148
[  250.298664] Modules linked in: panel_simple pl111_drm arm_spe_pmu drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[  250.299137] CPU: 3 UID: 0 PID: 532 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[  250.299273] Hardware name: FVP Base RevC (DT)
[  250.299354] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  250.299494] pc : __kvmalloc_node_noprof+0x138/0x148
[  250.299646] lr : __kvmalloc_node_noprof+0x64/0x148
[  250.299798] sp : ffff800081cc3ce0
[  250.299872] x29: ffff800081cc3cf0 x28: ffff000803c14900 x27: 0000000000000000
[  250.300072] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000803b23700
[  250.300268] x23: ffff000803b23780 x22: 6bfaa9916652d6b0 x21: 0000000200002000
[  250.300470] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[  250.300666] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  250.300859] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  250.301051] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  250.301239] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[  250.301435] x5 : 0000000000000000 x4 : ffff000803c14900 x3 : 0000000000000000
[  250.301629] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  250.301822] Call trace:
[  250.301885]  __kvmalloc_node_noprof+0x138/0x148
[  250.302039]  alloc_fdtable+0x90/0x110
[  250.302165]  expand_files+0x78/0x318
[  250.302293]  ksys_dup3+0x60/0x120
[  250.302419]  __arm64_sys_dup3+0x20/0x30
[  250.302553]  invoke_syscall+0x48/0x10c
[  250.302697]  el0_svc_common.constprop.0+0x40/0xe0
[  250.302849]  do_el0_svc+0x1c/0x28
[  250.302987]  el0_svc+0x30/0xcc
[  250.303127]  el0t_64_sync_handler+0x120/0x12c
[  250.303281]  el0t_64_sync+0x190/0x194
[  250.303393] ---[ end trace 0000000000000000 ]---

test log snippet test parser 182

Home

------------[ cut here ]------------
[   49.846565] WARNING: CPU: 0 PID: 465 at mm/util.c:670 __kvmalloc_node_noprof+0x11c/0x124
[   49.848531] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   49.852020] CPU: 0 UID: 0 PID: 465 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   49.852844] Hardware name: linux,dummy-virt (DT)
[   49.853464] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   49.853947] pc : __kvmalloc_node_noprof+0x11c/0x124
[   49.856031] lr : __kvmalloc_node_noprof+0x50/0x124
[   49.856556] sp : ffff800080a3bce0
[   49.856962] x29: ffff800080a3bcf0 x28: fff00000c6b19240 x27: 0000000000000000
[   49.858729] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   49.859203] x23: 0000000080001000 x22: b3ef9be94354b268 x21: 0000000200002000
[   49.859701] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   49.861591] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   49.862836] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   49.863370] x11: 0000000000000040 x10: 5eb62224f7458200 x9 : 5eb62224f7458200
[   49.863864] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   49.864322] x5 : 0000000000000000 x4 : ffff800080a3bcb0 x3 : 0000000000000000
[   49.865833] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   49.868000] Call trace:
[   49.868236]  __kvmalloc_node_noprof+0x11c/0x124
[   49.868652]  alloc_fdtable+0x7c/0x108
[   49.868917]  expand_files+0x114/0x2f0
[   49.870314]  ksys_dup3+0x64/0xfc
[   49.870659]  __arm64_sys_dup3+0x20/0x30
[   49.871021]  invoke_syscall+0x40/0xf8
[   49.871391]  el0_svc_common+0xa8/0xd8
[   49.872276]  do_el0_svc+0x1c/0x28
[   49.872522]  el0_svc+0x38/0x68
[   49.872786]  el0t_64_sync_handler+0x90/0xfc
[   49.873055]  el0t_64_sync+0x190/0x194
[   49.873453] ---[ end trace 0000000000000000 ]---

test log snippet test parser 183

Home

------------[ cut here ]------------
[   51.232134] WARNING: CPU: 0 PID: 466 at mm/util.c:670 __kvmalloc_node_noprof+0x138/0x148
[   51.234138] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 drm fuse backlight ip_tables x_tables
[   51.238782] CPU: 0 UID: 0 PID: 466 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   51.239450] Hardware name: linux,dummy-virt (DT)
[   51.240101] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   51.240899] pc : __kvmalloc_node_noprof+0x138/0x148
[   51.241584] lr : __kvmalloc_node_noprof+0x64/0x148
[   51.242404] sp : ffff800080a53ce0
[   51.242833] x29: ffff800080a53cf0 x28: fff00000c13d36c0 x27: 0000000000000000
[   51.243766] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c013ec00
[   51.244666] x23: fff00000c013ec80 x22: f59fa63a5092d6b0 x21: 0000000200002000
[   51.245885] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   51.247105] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.248563] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.250040] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.251052] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   51.251532] x5 : 0000000000000000 x4 : fff00000c13d36c0 x3 : 0000000000000000
[   51.252053] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.252738] Call trace:
[   51.253674]  __kvmalloc_node_noprof+0x138/0x148
[   51.254757]  alloc_fdtable+0x90/0x110
[   51.255658]  expand_files+0x78/0x318
[   51.256568]  ksys_dup3+0x60/0x120
[   51.257287]  __arm64_sys_dup3+0x20/0x30
[   51.258288]  invoke_syscall+0x48/0x10c
[   51.259150]  el0_svc_common.constprop.0+0x40/0xe0
[   51.259847]  do_el0_svc+0x1c/0x28
[   51.260105]  el0_svc+0x30/0xcc
[   51.260351]  el0t_64_sync_handler+0x120/0x12c
[   51.260639]  el0t_64_sync+0x190/0x194
[   51.261100] ---[ end trace 0000000000000000 ]---

test log snippet test parser 184

Home

------------[ cut here ]------------
[   77.055885] WARNING: CPU: 1 PID: 470 at mm/util.c:670 __kvmalloc_node_noprof+0xfc/0x108
[   77.059436] Modules linked in:
[   77.061741] CPU: 1 UID: 0 PID: 470 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   77.062696] Hardware name: Generic DT based system
[   77.063366] Call trace: 
[   77.064832]  unwind_backtrace from show_stack+0x10/0x14
[   77.065871]  show_stack from dump_stack_lvl+0x34/0x70
[   77.066964]  dump_stack_lvl from __warn+0xd8/0x20c
[   77.068012]  __warn from warn_slowpath_fmt+0x11c/0x168
[   77.068964]  warn_slowpath_fmt from __kvmalloc_node_noprof+0xfc/0x108
[   77.069592]  __kvmalloc_node_noprof from alloc_fdtable+0x78/0x104
[   77.070302]  alloc_fdtable from expand_files+0x134/0x304
[   77.070588]  expand_files from ksys_dup3+0x58/0xc8
[   77.070842]  ksys_dup3 from ret_fast_syscall+0x0/0x5c
[   77.071237] Exception stack(0xfa2b5fa8 to 0xfa2b5ff0)
[   77.072744] 5fa0:                   00427bcd 00000001 00000002 2000003c 00000000 00000000
[   77.073506] 5fc0: 00427bcd 00000001 00429e6c 0000003f 00425920 b6fabce0 00000000 beaf43e0
[   77.074214] 5fe0: 0000003f beaf41b4 b6f0af43 b6e88786
[   77.075682] ---[ end trace 0000000000000000 ]---

test log snippet test parser 185

Home

------------[ cut here ]------------
[   85.577463] WARNING: CPU: 1 PID: 470 at mm/util.c:670 __kvmalloc_node_noprof+0xf4/0xf8
[   85.580051] Modules linked in:
[   85.585017] CPU: 1 UID: 0 PID: 470 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   85.586054] Hardware name: Generic DT based system
[   85.586694] Call trace: 
[   85.587613]  unwind_backtrace from show_stack+0x10/0x14
[   85.589204]  show_stack from dump_stack_lvl+0x54/0x68
[   85.590063]  dump_stack_lvl from __warn+0x7c/0x12c
[   85.590618]  __warn from warn_slowpath_fmt+0x184/0x18c
[   85.592426]  warn_slowpath_fmt from __kvmalloc_node_noprof+0xf4/0xf8
[   85.592745]  __kvmalloc_node_noprof from alloc_fdtable+0x88/0x104
[   85.594004]  alloc_fdtable from expand_files+0x78/0x2f4
[   85.594734]  expand_files from ksys_dup3+0x58/0xd8
[   85.595461]  ksys_dup3 from ret_fast_syscall+0x0/0x5c
[   85.596082] Exception stack(0xfa2cdfa8 to 0xfa2cdff0)
[   85.596745] dfa0:                   be8aa2bc 00440000 00000002 2000003c 00000000 2000003c
[   85.597831] dfc0: be8aa2bc 00440000 0043ff0c 0000003f 00422edd b6f2ece0 00000000 0043ff0c
[   85.598229] dfe0: 0000003f be8aa0e4 b6e8df43 b6e0b786
[   85.600313] ---[ end trace 0000000000000000 ]---

test log snippet test parser 186

Home

------------[ cut here ]------------
[   29.629044] WARNING: CPU: 1 PID: 478 at mm/util.c:670 __kvmalloc_node_noprof+0xd1/0xe0
[   29.631270] Modules linked in:
[   29.632176] CPU: 1 UID: 0 PID: 478 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   29.632890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.634270] EIP: __kvmalloc_node_noprof+0xd1/0xe0
[   29.634926] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 02 f4 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 55 89 e5 53 57 56 50
[   29.636484] EAX: 00000000 EBX: 80001000 ECX: c71d293d EDX: 00000000
[   29.636766] ESI: 00400cc0 EDI: ffffffff EBP: c23b5ebc ESP: c23b5ea8
[   29.637030] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   29.637663] CR0: 80050033 CR2: b7d2de40 CR3: 02384000 CR4: 000006d0
[   29.640983] Call Trace:
[   29.642885]  ? show_regs+0x4e/0x60
[   29.643325]  ? __kvmalloc_node_noprof+0xd1/0xe0
[   29.643899]  ? __warn+0xaa/0x190
[   29.644254]  ? __kvmalloc_node_noprof+0xd1/0xe0
[   29.644964]  ? __kvmalloc_node_noprof+0xd1/0xe0
[   29.645323]  ? report_bug+0x10e/0x1a0
[   29.646550]  ? exc_overflow+0x38/0x38
[   29.646718]  ? handle_bug+0x48/0x68
[   29.646956]  ? exc_invalid_op+0x17/0x3c
[   29.647115]  ? handle_exception+0x14b/0x14b
[   29.647288]  ? __kvmalloc_node_noprof+0x3d/0xe0
[   29.647514]  ? exc_overflow+0x38/0x38
[   29.647676]  ? __kvmalloc_node_noprof+0xd1/0xe0
[   29.647858]  ? exc_overflow+0x38/0x38
[   29.648012]  ? __kvmalloc_node_noprof+0xd1/0xe0
[   29.648194]  alloc_fdtable+0x70/0xf0
[   29.648684]  expand_files+0x101/0x2b0
[   29.651406]  ksys_dup3+0x59/0xa0
[   29.652050]  __ia32_sys_dup2+0x16/0x60
[   29.652224]  ia32_sys_call+0x22c4/0x2950
[   29.652387]  __do_fast_syscall_32+0x74/0xb4
[   29.652586]  ? do_user_addr_fault+0x1ae/0x3e0
[   29.652765]  ? arch_exit_to_user_mode_prepare+0x13/0x50
[   29.652966]  ? irqentry_exit_to_user_mode+0x83/0x94
[   29.653160]  do_fast_syscall_32+0x29/0x54
[   29.653327]  do_SYSENTER_32+0x12/0x14
[   29.653541]  entry_SYSENTER_32+0xa6/0x115
[   29.654075] EIP: 0xb7ecf539
[   29.656320] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[   29.658361] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7eb4e14
[   29.659191] ESI: 004a9124 EDI: bfb07e70 EBP: bfb07e88 ESP: bfb07c08
[   29.660456] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   29.662285] ---[ end trace 0000000000000000 ]---

test log snippet test parser 187

Home

------------[ cut here ]------------
[   30.514971] WARNING: CPU: 1 PID: 477 at mm/util.c:670 __kvmalloc_node_noprof+0xe8/0xf0
[   30.516051] Modules linked in:
[   30.517084] CPU: 1 UID: 0 PID: 477 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   30.519606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.521397] EIP: __kvmalloc_node_noprof+0xe8/0xf0
[   30.522659] Code: 75 f8 8b 7d fc 89 ec 5d c3 2e 8d 74 26 00 89 f2 81 ca 00 20 00 00 e9 6d ff ff ff 8d 76 00 81 e6 00 20 00 00 0f 85 39 ff ff ff <0f> 0b e9 32 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[   30.523363] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[   30.524916] ESI: 00000000 EDI: ffffffff EBP: c21a7ee4 ESP: c21a7ec0
[   30.525246] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   30.526642] CR0: 80050033 CR2: b7ef2a22 CR3: 023f7000 CR4: 000006d0
[   30.527388] Call Trace:
[   30.529969]  ? show_regs+0x4d/0x54
[   30.530228]  ? __kvmalloc_node_noprof+0xe8/0xf0
[   30.530394]  ? __warn+0x89/0x158
[   30.530523]  ? __kvmalloc_node_noprof+0xe8/0xf0
[   30.530708]  ? __kvmalloc_node_noprof+0xe8/0xf0
[   30.530880]  ? report_bug+0x186/0x1b0
[   30.531040]  ? __kvmalloc_node_noprof+0xe9/0xf0
[   30.531236]  ? exc_overflow+0x50/0x50
[   30.531821]  ? handle_bug+0x56/0x90
[   30.533077]  ? exc_invalid_op+0x1b/0x70
[   30.533746]  ? avc_has_perm_noaudit+0x66/0xe8
[   30.534122]  ? handle_exception+0x14b/0x14b
[   30.534585]  ? exc_overflow+0x50/0x50
[   30.536536]  ? __kvmalloc_node_noprof+0xe8/0xf0
[   30.537796]  ? exc_overflow+0x50/0x50
[   30.538211]  ? __kvmalloc_node_noprof+0xe8/0xf0
[   30.539015]  ? alloc_fdtable+0x42/0xdc
[   30.539351]  alloc_fdtable+0x67/0xdc
[   30.539901]  expand_files+0x55/0x814
[   30.540119]  ? do_prlimit+0xfc/0x1c0
[   30.540410]  ? __ia32_sys_prlimit64+0x28f/0x320
[   30.540579]  ksys_dup3+0x58/0xf0
[   30.542146]  __ia32_sys_dup2+0x21/0xc8
[   30.542308]  ? syscall_exit_to_user_mode+0x3a/0x198
[   30.542491]  ia32_sys_call+0x20ec/0x2818
[   30.542646]  __do_fast_syscall_32+0x4c/0xbc
[   30.544747]  do_fast_syscall_32+0x2b/0x60
[   30.544995]  do_SYSENTER_32+0x15/0x18
[   30.545134]  entry_SYSENTER_32+0xa6/0x115
[   30.546098] EIP: 0xb7f75579
[   30.548125] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   30.549654] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7f5ae14
[   30.550094] ESI: 0043b5cc EDI: bf84ee80 EBP: bf84eff8 ESP: bf84ede8
[   30.551645] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   30.552865] ---[ end trace 0000000000000000 ]---

test log snippet test parser 188

Home

[  152.190911] watchdog: BUG: soft lockup - CPU#0 stuck for 29s! [kworker/u9:3:120]

test log snippet test parser 189

Home

[  152.190911] watchdog: BUG: soft lockup - CPU#0 stuck for 29s! [kworker/u9:3:120]

test log snippet test parser 190

Home

[  124.041652] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 58s!
[  158.957180] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 92s!

test log snippet test parser 191

Home

[  124.041652] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 58s!
---
[  158.957180] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 92s!

test log snippet test parser 192

Home

------------[ cut here ]------------
[   42.623521] WARNING: CPU: 1 PID: 480 at mm/util.c:670 __kvmalloc_node_noprof+0xdf/0xf0
[   42.625251] Modules linked in:
[   42.627316] CPU: 1 UID: 0 PID: 480 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   42.628727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   42.630325] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[   42.630671] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 1b 3d 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   42.633805] RSP: 0018:ffffabdc40653dc8 EFLAGS: 00010246
[   42.634392] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   42.634719] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa425f4e8
[   42.635292] RBP: ffffabdc40653de0 R08: 0000000000412cc0 R09: 00000000ffffffff
[   42.635982] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[   42.636246] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[   42.637677] FS:  00007f19b9c00740(0000) GS:ffff9c3c3bd00000(0000) knlGS:0000000000000000
[   42.638869] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   42.639841] CR2: 00007f19b9da4680 CR3: 0000000103906000 CR4: 00000000000006f0
[   42.641531] Call Trace:
[   42.642970]  <TASK>
[   42.643667]  ? show_regs+0x5d/0x70
[   42.644201]  ? __warn+0xcf/0x1d0
[   42.644419]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   42.645075]  ? report_bug+0x14c/0x1f0
[   42.645311]  ? handle_bug+0x67/0x90
[   42.645553]  ? exc_invalid_op+0x1f/0x50
[   42.646170]  ? asm_exc_invalid_op+0x1f/0x30
[   42.646367]  ? __kvmalloc_node_noprof+0x48/0xf0
[   42.646567]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   42.647023]  ? __kvmalloc_node_noprof+0x48/0xf0
[   42.647396]  alloc_fdtable+0x74/0x110
[   42.648056]  expand_files+0x11a/0x310
[   42.648362]  ? enqueue_hrtimer+0x3a/0xa0
[   42.648665]  ? ktime_get+0x47/0xd0
[   42.649029]  ? lapic_next_event+0x15/0x20
[   42.649330]  ? clockevents_program_event+0x8e/0x110
[   42.649675]  ksys_dup3+0x71/0xd0
[   42.650045]  __x64_sys_dup2+0x1e/0x80
[   42.650415]  x64_sys_call+0x628/0x2ee0
[   42.650709]  do_syscall_64+0xd0/0x1a0
[   42.651127]  ? irqentry_exit+0x16/0x60
[   42.651290]  ? sysvec_apic_timer_interrupt+0x4a/0x90
[   42.651470]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   42.651829] RIP: 0033:0x7f19b9cf8c17
[   42.652694] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   42.654015] RSP: 002b:00007fff070841a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   42.654556] RAX: ffffffffffffffda RBX: 00007fff07084a08 RCX: 00007f19b9cf8c17
[   42.655763] RDX: 00007fff07084328 RSI: 0000000040000038 RDI: 0000000000000002
[   42.656720] RBP: 00007fff070843c0 R08: 0000000000000064 R09: 0000000000000000
[   42.658485] R10: 00007f19b9c15170 R11: 0000000000000202 R12: 0000000000000000
[   42.660248] R13: 00007fff07084a18 R14: 00007f19b9e34000 R15: 0000556ef0b7ecf8
[   42.661408]  </TASK>
[   42.661674] ---[ end trace 0000000000000000 ]---

test log snippet test parser 193

Home

------------[ cut here ]------------
[   46.492649] WARNING: CPU: 1 PID: 476 at mm/util.c:670 __kvmalloc_node_noprof+0xd2/0xe0
[   46.495204] Modules linked in:
[   46.496622] CPU: 1 UID: 0 PID: 476 Comm: unshare_test Not tainted 6.12.10-rc1 #1
[   46.498458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.499408] RIP: 0010:__kvmalloc_node_noprof+0xd2/0xe0
[   46.500404] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90
[   46.501688] RSP: 0018:ffffab3ec059bdf8 EFLAGS: 00010246
[   46.502305] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   46.502772] RDX: 0000000000000000 RSI: ffffffffa149b011 RDI: 0000000000452cc0
[   46.503416] RBP: ffffab3ec059be10 R08: 0000000000000040 R09: 0000000000000000
[   46.503953] R10: ffffab3ec059bdf8 R11: 0000000000000000 R12: 0000000200002000
[   46.504304] R13: 00000000ffffffff R14: ffff91b000ea13c0 R15: ffff91b000ea1340
[   46.504649] FS:  00007fb31520d740(0000) GS:ffff91b07bd00000(0000) knlGS:0000000000000000
[   46.505554] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   46.506017] CR2: 00007fb3153b1680 CR3: 00000001032f2000 CR4: 00000000000006f0
[   46.507277] Call Trace:
[   46.508811]  <TASK>
[   46.509654]  ? show_regs+0x63/0x70
[   46.510040]  ? __warn+0x8c/0x140
[   46.510535]  ? __kvmalloc_node_noprof+0xd2/0xe0
[   46.510899]  ? report_bug+0x175/0x1a0
[   46.512217]  ? handle_bug+0x5c/0xa0
[   46.512449]  ? exc_invalid_op+0x1c/0x80
[   46.512611]  ? asm_exc_invalid_op+0x1f/0x30
[   46.512772]  ? __kmalloc_node_noprof+0x2a1/0x320
[   46.513206]  ? __kvmalloc_node_noprof+0xd2/0xe0
[   46.513586]  ? __kvmalloc_node_noprof+0x4e/0xe0
[   46.514194]  alloc_fdtable+0x74/0x100
[   46.514722]  expand_files+0x62/0x310
[   46.516175]  ? do_prlimit+0x12f/0x210
[   46.516542]  ksys_dup3+0x67/0x100
[   46.516765]  __x64_sys_dup2+0x2d/0xd0
[   46.516937]  x64_sys_call+0x1cb8/0x2060
[   46.517293]  do_syscall_64+0x9e/0x1a0
[   46.517554]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   46.517889] RIP: 0033:0x7fb315305c17
[   46.519505] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   46.521231] RSP: 002b:00007ffc85544528 EFLAGS: 00000206 ORIG_RAX: 0000000000000021
[   46.521819] RAX: ffffffffffffffda RBX: 00007ffc85544d88 RCX: 00007fb315305c17
[   46.523286] RDX: 00007ffc85544550 RSI: 0000000040000038 RDI: 0000000000000002
[   46.523858] RBP: 00007ffc85544750 R08: 0000000000000064 R09: 0000000000000000
[   46.524291] R10: 00007fb315222170 R11: 0000000000000206 R12: 0000000000000000
[   46.524610] R13: 00007ffc85544d98 R14: 00007fb315441000 R15: 000055a5b24afdd8
[   46.525795]  </TASK>
[   46.526207] ---[ end trace 0000000000000000 ]---

test log snippet test parser 194

Home

[    3.766815] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[    3.773559] Modules linked in:
[    3.776641] CPU: 0 UID: 0 PID: 44 Comm: kworker/u10:2 Not tainted 6.12.10-rc1 #1
[    3.784057] Hardware name: Generic DRA74X (Flattened Device Tree)
[    3.790191] Workqueue: events_unbound deferred_probe_work_func
[    3.796081] PC is at edma_probe+0x1024/0x1034
[    3.800476] LR is at devm_kmalloc+0xf4/0x134
[    3.804748] pc : [<c0beaeac>]    lr : [<c0dc7114>]    psr: 60000013
[    3.811065] sp : f0101980  ip : 00070007  fp : efc88728
[    3.816314] r10: c3d32c10  r9 : 00000003  r8 : c3d32c00
[    3.821563] r7 : 00000002  r6 : c21d06bc  r5 : c282cc40  r4 : 00000001
[    3.828124] r3 : 00000001  r2 : 00000002  r1 : 00000002  r0 : c2b6c1c0
[    3.834686] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[    3.841857] Control: 30c5387d  Table: 80203000  DAC: fffffffd
[    3.847625] Register r0 information: slab kmalloc-rnd-08-128 start c2b6c180 pointer offset 64 size 128
[    3.857025] Register r1 information: non-paged memory
[    3.862091] Register r2 information: non-paged memory
[    3.867187] Register r3 information: non-paged memory
[    3.872253] Register r4 information: non-paged memory
[    3.877349] Register r5 information: slab kmalloc-rnd-15-512 start c282cc00 pointer offset 64 size 512
[    3.886718] Register r6 information: non-slab/vmalloc memory
[    3.892425] Register r7 information: non-paged memory
[    3.897491] Register r8 information: slab kmalloc-rnd-04-1k start c3d32c00 pointer offset 0 size 1024
[    3.906799] Register r9 information: non-paged memory
[    3.911865] Register r10 information: slab kmalloc-rnd-04-1k start c3d32c00 pointer offset 16 size 1024
[    3.921325] Register r11 information: non-slab/vmalloc memory
[    3.927124] Register r12 information: non-paged memory
[    3.932281] Process kworker/u10:2 (pid: 44, stack limit = 0xe5391506)
[    3.938751] Stack: (0xf0101980 to 0xf0102000)
[    3.943145] 1980: 00000001 c1301574 c3d32c10 c21d06bc c21d06bc 3f45655f 00000001 c0b43000
[    3.951354] 19a0: c2b6c3c0 00000000 00000001 00000000 c2c74688 00000000 c22d3df8 c12fdfa4
[    3.959594] 19c0: c1b81ea3 c1b1eb29 efc88728 3f45655f c22d3df8 fc8f9ed5 f0101ac8 c12febfc
[    3.967803] 19e0: ffffffff c2c745d8 00000000 00000000 00000000 00000000 00000000 00000000
[    3.976043] 1a00: 00000000 00000000 6a08ec29 c3d32c10 c21d06bc c21d06bc 3f45655f c22d3df8
[    3.984252] 1a20: fc8f9ed5 f0101ac8 00000001 c0dc4ce4 c3d32c10 c21d06bc 00000000 c0dc1418
[    3.992462] 1a40: c3d32c10 c21d06bc c22d3e00 000000ab 00000001 c0dc0550 c3d32c10 c3d32c10
[    4.000701] 1a60: 00000001 c0dc1128 c3d32c10 c21d06bc f0101ac8 00000000 c2b67600 c0dc0fe0
[    4.008911] 1a80: c0dc0eac c0dc0eac 00000000 f0101a98 00000001 c0dbd5d0 c2b6766c c2e24e38
[    4.017150] 1aa0: c2b67600 6a08ec29 c3d32c10 c3d32c54 00000000 00000001 00000000 c2b67600
[    4.025360] 1ac0: 00000000 c0dc0368 c3d32c10 00000001 00000100 6a08ec29 c3d32c10 c22d3dec
[    4.033569] 1ae0: c2b67600 c1842528 c3d32c10 c0dbd83c c3d32c10 c3d33c10 00000000 c3d33c10
[    4.041809] 1b00: c3d32c10 efc8878c 00000001 c0db8fe4 6a08ec29 00000000 00000000 00000000
[    4.050018] 1b20: c3d32c00 efc88728 c3d32c10 efc8878c 00000000 c1300bac efc88728 c3d33c10
[    4.058258] 1b40: c201d220 00000000 00000000 efc8878c c1642f90 c1300e44 c2bd3810 c3d33c10
[    4.066467] 1b60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.074676] 1b80: 00000000 00000000 6a08ec29 efc88728 c201d220 c1642f90 efc8842c 00000000
[    4.082916] 1ba0: c3d33c10 00000001 c22c27e8 c13010c0 00000001 c1af43f8 c2c86e40 efc88590
[    4.091125] 1bc0: f0101c10 00000001 00000000 c1af43f8 c1bf8c22 c0a19420 00000000 00000000
[    4.099334] 1be0: c22d3df8 c3d33c10 c201d1f0 efc8842c 00000000 00000000 43300000 00000000
[    4.107574] 1c00: 00100000 00000000 00000200 00000000 00000002 c223a46c ff9e8304 ff9e8304
[    4.115783] 1c20: 00000001 00000001 00000001 00000000 6a08ec29 c3d33c10 c210cee0 c210cee0
[    4.124023] 1c40: 3f45655f c22d3df8 fc8f9ed5 f0101cf0 00000001 c0dc4ce4 c3d33c10 c210cee0
[    4.132232] 1c60: 00000000 c0dc1418 c3d33c10 c210cee0 c22d3e00 000000ab 00000001 c0dc0550
[    4.140441] 1c80: c3d33c10 c3d33c10 00000001 c0dc1128 c3d33c10 c210cee0 f0101cf0 00000000
[    4.148681] 1ca0: c2b67600 c0dc0fe0 c0dc0eac c0dc0eac 00000000 f0101cc0 00000001 c0dbd5d0
[    4.156890] 1cc0: c2b6766c c386a938 c2b67600 6a08ec29 c3d33c10 c3d33c54 00000000 00000001
[    4.165100] 1ce0: 00000000 c2b67600 c201d1f0 c0dc0368 c3d33c10 00000001 00000100 6a08ec29
[    4.173339] 1d00: c3d33c10 c22d3dec c2b67600 c1842528 c3d33c10 c0dbd83c c3d33c10 c2bd3810
[    4.181549] 1d20: 00000000 c2bd3810 c3d33c10 efc88490 00000001 c0db8fe4 6a08ec29 00000000
[    4.189788] 1d40: 00000000 00000000 c3d33c00 efc8842c c3d33c10 efc88490 c201d1f0 c1300bac
[    4.197998] 1d60: efc8842c c2bd3810 c201d220 c201d1f0 00000000 efc88490 00000000 c1300e44
[    4.206207] 1d80: 00000000 c2bd3810 43300000 00000000 43300003 00000000 ff9e8268 00000200
[    4.214447] 1da0: 00000000 00000000 00000000 00000000 6a08ec29 efc8842c c201d220 00000000
[    4.222656] 1dc0: efc26d44 00000000 c2bd3810 00000001 c291170d c13010c0 00000001 f0101eb8
[    4.230895] 1de0: c2bd3810 efc26d44 c2e329c0 c2bd3800 c210ce04 c201d220 f0101eb8 c0a18700
[    4.239105] 1e00: c2bd3810 c210ce04 c210ce04 3f45655f c22d3df8 fc8f9ed5 c291170d c0dc4ce4
[    4.247314] 1e20: c2bd3810 c210ce04 00000000 c0dc1418 c2bd3810 c210ce04 c22d3e00 00000001
[    4.255554] 1e40: c291170d c0dc0550 c2bd3810 c2bd3810 c291170d c0dc1128 c2bd3810 c210ce04
[    4.263763] 1e60: f0101eb8 00000000 c2b67600 c0dc0fe0 c0dc0eac c0dc0eac 00000000 f0101e88
[    4.272003] 1e80: c291170d c0dbd5d0 c2b6766c c386a7b8 c2b67600 6a08ec29 c2bd3810 c2bd3854
[    4.280212] 1ea0: 00000000 00000001 00000000 c2b67600 c296d800 c0dc0368 c2bd3810 00000001
[    4.288421] 1ec0: c291170d 6a08ec29 c2bd3810 c22d3dec c2b67600 c1842528 00000000 c0dbd83c
[    4.296661] 1ee0: c21fc708 c2bd3810 c2bf2ad4 c21fc724 00000000 c2911700 c291170d c0dc0c40
[    4.304870] 1f00: c29a5600 c21fc72c 0000000a 00000004 c2911780 c047639c f0101f38 c1605d28
[    4.313110] 1f20: 00000000 00000002 6a08ec29 c2f93f00 c29a5618 c29a5650 c29a562c c296d800
[    4.321319] 1f40: c29a5600 c29a562c c2f93f00 c296d820 c2269874 00000402 00000000 c047876c
[    4.329528] 1f60: c29a9240 c04784bc c29a5600 00000040 c2f945c4 c29a9254 c29a9240 c04784bc
[    4.337768] 1f80: c29a5600 c2f93f00 00000000 c047eee8 c29a68c0 c047edb0 00000000 00000000
[    4.345977] 1fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[    4.354187] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.362426] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[    4.370635] Call trace: 
[    4.370635]  edma_probe from platform_probe+0xac/0xe0
[    4.378295]  platform_probe from really_probe+0x170/0x3cc
[    4.383728]  really_probe from __driver_probe_device+0x94/0xdc
[    4.389587]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.396148]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.402923]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.409393]  bus_for_each_drv from __device_attach+0xcc/0x180
[    4.415161]  __device_attach from bus_probe_device+0xac/0x128
[    4.420959]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.426391]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.432983]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.440765]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.447448]  of_platform_populate from sysc_probe+0xa84/0xb94
[    4.453216]  sysc_probe from platform_probe+0xac/0xe0
[    4.458312]  platform_probe from really_probe+0x170/0x3cc
[    4.463745]  really_probe from __driver_probe_device+0x94/0xdc
[    4.469635]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.476196]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.482940]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.489410]  bus_for_each_drv from __device_attach+0xcc/0x180
[    4.495208]  __device_attach from bus_probe_device+0xac/0x128
[    4.500976]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.506439]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.513000]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.520782]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.527465]  of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[    4.533843]  simple_pm_bus_probe from platform_probe+0xac/0xe0
[    4.539733]  platform_probe from really_probe+0x170/0x3cc
[    4.545166]  really_probe from __driver_probe_device+0x94/0xdc
[    4.551025]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.557617]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.564361]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.570831]  bus_for_each_drv from __device_attach+0xcc/0x180
[    4.576599]  __device_attach from bus_probe_device+0xac/0x128
[    4.582397]  bus_probe_device from deferred_probe_work_func+0x94/0xd4
[    4.588867]  deferred_probe_work_func from process_scheduled_works+0x2d8/0x4fc
[    4.596160]  process_scheduled_works from worker_thread+0x2b0/0x3ac
[    4.602447]  worker_thread from kthread+0x138/0x164
[    4.607360]  kthread from ret_from_fork+0x14/0x38
[    4.612121] Exception stack(0xf0101fb0 to 0xf0101ff8)
[    4.617187] 1fa0:                                     00000000 00000000 00000000 00000000
[    4.625396] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.633636] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.640289] Code: e3a01004 e3570008 e5c01008 1a000001 (e7ffdefe) 
[    4.646423] ---[ end trace 0000000000000000 ]---

test log snippet test parser 195

Home

[    3.762634] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[    3.769378] Modules linked in:
[    3.772460] CPU: 0 UID: 0 PID: 44 Comm: kworker/u10:2 Not tainted 6.12.10-rc1 #1
[    3.779907] Hardware name: Generic DRA74X (Flattened Device Tree)
[    3.786010] Workqueue: events_unbound deferred_probe_work_func
[    3.791900] PC is at edma_probe+0xb34/0xfe4
[    3.796112] LR is at devm_kmalloc+0xf4/0x12c
[    3.800415] pc : [<c0bf3ab0>]    lr : [<c0dd0790>]    psr: 60000013
[    3.806701] sp : f0101938  ip : 00070007  fp : efc88728
[    3.811981] r10: c3c6f410  r9 : c3cc3840  r8 : c3c6f400
[    3.817230] r7 : 00000002  r6 : 00000000  r5 : 00000003  r4 : 00000001
[    3.823791] r3 : 00000001  r2 : 00000002  r1 : 00000002  r0 : c2811dc0
[    3.830352] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[    3.837524] Control: 30c5387d  Table: 80203000  DAC: fffffffd
[    3.843292] Register r0 information: slab kmalloc-128 start c2811d80 pointer offset 64 size 128
[    3.852050] Register r1 information: non-paged memory
[    3.857147] Register r2 information: non-paged memory
[    3.862243] Register r3 information: non-paged memory
[    3.867309] Register r4 information: non-paged memory
[    3.872406] Register r5 information: non-paged memory
[    3.877471] Register r6 information: NULL pointer
[    3.882202] Register r7 information: non-paged memory
[    3.887298] Register r8 information: slab kmalloc-rnd-06-1k start c3c6f400 pointer offset 0 size 1024
[    3.896575] Register r9 information: slab kmalloc-rnd-02-512 start c3cc3800 pointer offset 64 size 512
[    3.905944] Register r10 information: slab kmalloc-rnd-06-1k start c3c6f400 pointer offset 16 size 1024
[    3.915435] Register r11 information: non-slab/vmalloc memory
[    3.921203] Register r12 information: non-paged memory
[    3.926361] Process kworker/u10:2 (pid: 44, stack limit = 0x9365a9dd)
[    3.932861] Stack: (0xf0101938 to 0xf0102000)
[    3.937225] 1920:                                                       00000001 c1314870
[    3.945465] 1940: c3c6f410 c21d066c c21d066c efc88728 00000001 c2811d40 c291be7c 00000000
[    3.953674] 1960: 00000001 00000000 c2cad898 00000000 c22d3e00 c13112a4 c1b81aa5 c1b1e711
[    3.961883] 1980: efc88728 3f45655f c22d3e00 fc8f9ed5 f0101a98 c1311eec ffffffff c2cad8f0
[    3.970123] 19a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    3.978332] 19c0: 7cf51d31 c3c6f410 c21d066c c21d066c 3f45655f c22d3e00 fc8f9ed5 f0101a98
[    3.986572] 19e0: 00000001 c0dce3a0 c3c6f410 c21d066c 00000000 c0dcaaf8 c3c6f410 c21d066c
[    3.994781] 1a00: c22d3e08 000000aa 00000001 c0dc9b7c 60000013 efc88728 c3c6f410 c3c6f410
[    4.003021] 1a20: c22d3e08 000000aa c22d3e00 fc8f9ed5 00000001 c0dca808 c3c6f410 c21d066c
[    4.011230] 1a40: f0101a98 00000000 c2b6a700 c0dca6c0 c0dca58c c0dca58c 00000000 f0101a68
[    4.019439] 1a60: 00000001 c0dc6bfc c2b6a76c c2e2e7b8 c2b6a700 7cf51d31 c3c6f410 c3c6f454
[    4.027679] 1a80: 00000000 00000001 00000000 c2b6a700 00000000 c0dc9994 c3c6f410 00000001
[    4.035888] 1aa0: 00000100 7cf51d31 c3c6f410 c22d3df4 c2b6a700 c184259c c3c6f410 c0dc6e68
[    4.044128] 1ac0: c3c6f410 c3c6f810 00000000 c3c6f810 c3c6f410 efc8878c 00000001 c0dc25f8
[    4.052337] 1ae0: 7cf51d31 00000000 00000000 00000000 c3c6f400 efc88728 c3c6f410 efc8878c
[    4.060546] 1b00: 00000000 c1313ea8 efc88728 c3c6f810 c201d1a8 00000000 00000000 efc8878c
[    4.068786] 1b20: c16430d0 c1314140 c2bbb810 c3c6f810 00000000 00000000 00000000 00000000
[    4.076995] 1b40: 00000000 00000000 00000000 00000000 00000000 00000000 7cf51d31 efc88728
[    4.085235] 1b60: c201d1a8 c16430d0 efc8842c 00000000 c3c6f810 00000001 c22c27e8 c13143bc
[    4.093444] 1b80: 00000001 c1af3fe0 c2ccf640 efc88590 f0101be0 00000001 00000000 c1af3fe0
[    4.101654] 1ba0: c1bf880c c0a21e14 00000000 00000000 c22d3e00 c3c6f810 c201d414 efc8842c
[    4.109893] 1bc0: 00000000 00000000 43300000 00000000 00100000 00000000 00000200 00000000
[    4.118103] 1be0: 00000002 c223a3ec ff9e8304 ff9e8304 00000001 00000001 00000001 00000000
[    4.126342] 1c00: 7cf51d31 c3c6f810 c210cea0 c210cea0 3f45655f c22d3e00 fc8f9ed5 f0101cd8
[    4.134552] 1c20: 00000001 c0dce3a0 c3c6f810 c210cea0 00000000 c0dcaaf8 c3c6f810 c210cea0
[    4.142761] 1c40: c22d3e08 000000aa 00000001 c0dc9b7c 60000013 efc8842c c3c6f810 c3c6f810
[    4.151000] 1c60: c22d3e08 000000aa c22d3e00 fc8f9ed5 00000001 c0dca808 c3c6f810 c210cea0
[    4.159210] 1c80: f0101cd8 00000000 c2b6a700 c0dca6c0 c0dca58c c0dca58c 00000000 f0101ca8
[    4.167419] 1ca0: 00000001 c0dc6bfc c2b6a76c c386ceb8 c2b6a700 7cf51d31 c3c6f810 c3c6f854
[    4.175659] 1cc0: 00000000 00000001 00000000 c2b6a700 c201d414 c0dc9994 c3c6f810 00000001
[    4.183868] 1ce0: 00000100 7cf51d31 c3c6f810 c22d3df4 c2b6a700 c184259c c3c6f810 c0dc6e68
[    4.192108] 1d00: c3c6f810 c2bbb810 00000000 c2bbb810 c3c6f810 efc88490 00000001 c0dc25f8
[    4.200317] 1d20: 7cf51d31 00000000 00000000 00000000 c3c6f800 efc8842c c3c6f810 efc88490
[    4.208526] 1d40: c201d414 c1313ea8 efc8842c c2bbb810 c201d1a8 c201d414 00000000 efc88490
[    4.216766] 1d60: 00000000 c1314140 00000000 c2bbb810 43300000 00000000 43300003 00000000
[    4.224975] 1d80: ff9e8268 00000200 00000000 00000000 00000000 00000000 7cf51d31 efc8842c
[    4.233215] 1da0: c201d1a8 00000000 efc26d44 00000000 c2bbb810 00000001 c291630d c13143bc
[    4.241424] 1dc0: 00000001 f0101eb8 c2bbb810 efc26d44 c2e39740 c2bbb800 c210cdc4 c201d1a8
[    4.249633] 1de0: f0101eb8 c0a210f0 c2bbb810 c210cdc4 c210cdc4 3f45655f c22d3e00 fc8f9ed5
[    4.257873] 1e00: c291630d c0dce3a0 c2bbb810 c210cdc4 00000000 c0dcaaf8 c2bbb810 c210cdc4
[    4.266082] 1e20: c22d3e08 00000001 c291630d c0dc9b7c 60000013 efc26d44 c2bbb810 c2bbb810
[    4.274322] 1e40: c22d3e08 00000001 c22d3e00 fc8f9ed5 c291630d c0dca808 c2bbb810 c210cdc4
[    4.282531] 1e60: f0101eb8 00000000 c2b6a700 c0dca6c0 c0dca58c c0dca58c 00000000 f0101e88
[    4.290740] 1e80: c291630d c0dc6bfc c2b6a76c c386c638 c2b6a700 7cf51d31 c2bbb810 c2bbb854
[    4.298980] 1ea0: 00000000 00000001 00000000 c2b6a700 c2957400 c0dc9994 c2bbb810 00000001
[    4.307189] 1ec0: c291630d 7cf51d31 c2bbb810 c22d3df4 c2b6a700 c184259c 00000000 c0dc6e68
[    4.315429] 1ee0: c21fc6ac c2bbb810 c2909dd4 c21fc6c8 00000000 c2916300 c291630d c0dca320
[    4.323638] 1f00: c29a0a00 c21fc6d0 0000000a 00000004 c2916380 c0478154 f0101f38 c1605e28
[    4.331848] 1f20: 00000000 00000002 7cf51d31 c2f7bf00 c29a0a18 c29a0a50 c29a0a2c c2957400
[    4.340087] 1f40: c29a0a00 c29a0a2c c2f7bf00 c2957420 c22697f4 00000402 00000000 c047a598
[    4.348297] 1f60: c299efc0 c047a2e8 c29a0a00 00000040 c2f7c5c4 c299efd4 c299efc0 c047a2e8
[    4.356506] 1f80: c29a0a00 c2f7bf00 00000000 c0480d6c c29ab540 c0480c34 00000000 00000000
[    4.364746] 1fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[    4.372955] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.381195] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[    4.389404] Call trace: 
[    4.389404]  edma_probe from platform_probe+0xac/0xe0
[    4.397033]  platform_probe from really_probe+0x170/0x3cc
[    4.402465]  really_probe from __driver_probe_device+0x90/0x18c
[    4.408447]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.415008]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.421752]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.428222]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.434020]  __device_attach from bus_probe_device+0xac/0x128
[    4.439788]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.445251]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.451812]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.459594]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.466278]  of_platform_populate from sysc_probe+0xa88/0xb98
[    4.472045]  sysc_probe from platform_probe+0xac/0xe0
[    4.477142]  platform_probe from really_probe+0x170/0x3cc
[    4.482574]  really_probe from __driver_probe_device+0x90/0x18c
[    4.488525]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.495117]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.501831]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.508331]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.514099]  __device_attach from bus_probe_device+0xac/0x128
[    4.519897]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.525329]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.531890]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.539703]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.546356]  of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[    4.552764]  simple_pm_bus_probe from platform_probe+0xac/0xe0
[    4.558624]  platform_probe from really_probe+0x170/0x3cc
[    4.564056]  really_probe from __driver_probe_device+0x90/0x18c
[    4.570007]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.576599]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.583312]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.589813]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.595581]  __device_attach from bus_probe_device+0xac/0x128
[    4.601379]  bus_probe_device from deferred_probe_work_func+0x94/0xd4
[    4.607879]  deferred_probe_work_func from process_scheduled_works+0x2d8/0x4fc
[    4.615142]  process_scheduled_works from worker_thread+0x2b0/0x3ac
[    4.621459]  worker_thread from kthread+0x138/0x164
[    4.626373]  kthread from ret_from_fork+0x14/0x38
[    4.631103] Exception stack(0xf0101fb0 to 0xf0101ff8)
[    4.636169] 1fa0:                                     00000000 00000000 00000000 00000000
[    4.644409] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.652618] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.659271] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe) 
[    4.665405] ---[ end trace 0000000000000000 ]---