Build

Regressions (compared to v6.1.123-82-g88f2306b7d74)

arc, build

arm, build

dragonboard-410c, ltp-controllers

dragonboard-410c, perf

e850-96, perf

fvp-aemva, perf

mips, build

parisc, build

powerpc, build

qemu-arm64-compat, ltp-mm

qemu-arm64, perf

qemu-armv7, ltp-sched

qemu-armv7, kselftest-ftrace

qemu-i386, kselftest-net-mptcp

qemu-i386, kselftest-seccomp

qemu-x86_64-compat, ltp-fs

qemu-x86_64-compat, ltp-syscalls

qemu-x86_64, ltp-sched

qemu-x86_64, kselftest-net-mptcp

qemu-x86_64, kselftest-seccomp

qemu-x86_64, kselftest-x86

qemu-x86_64, perf

s390, build

sh, build

Fixes (compared to v6.1.123-82-g88f2306b7d74)

dragonboard-410c, ltp-controllers

dragonboard-845c-compat, ltp-controllers

qemu-arm64-protected, kvm-unit-tests

qemu-arm64, boot

qemu-arm64, kselftest-exec

qemu-armv7, ltp-fs

qemu-armv7, kselftest-net-mptcp

qemu-armv7, ltp-sched

qemu-i386, kselftest-net-mptcp

qemu-i386, perf

qemu-x86_64, ltp-sched

Build Parser (compared to v6.1.123-82-g88f2306b7d74)

arc, log-parser-build-gcc

arm, log-parser-build-clang

arm, log-parser-build-gcc

arm64, log-parser-build-clang

i386, log-parser-build-clang

i386, log-parser-build-gcc

mips, log-parser-build-gcc

parisc, log-parser-build-gcc

powerpc, log-parser-build-clang

powerpc, log-parser-build-gcc

s390, log-parser-build-clang

s390, log-parser-build-gcc

sh, log-parser-build-gcc

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.1.123-82-g88f2306b7d74)

dragonboard-845c-compat, log-parser-boot

dragonboard-845c, log-parser-boot

qemu-arm64, log-parser-boot

qemu-armv7, log-parser-boot

qemu-i386, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.1.123-82-g88f2306b7d74)

dragonboard-845c, log-parser-test

e850-96, log-parser-test

fvp-aemva-protected, log-parser-test

fvp-aemva-vhe, log-parser-test

fvp-aemva, log-parser-test

qemu-arm64, log-parser-test

qemu-armv7, log-parser-test

qemu-i386, log-parser-test

qemu-x86_64, log-parser-test

Test log snippets

test log snippet regressions 1

Home

None

test log snippet regressions 2

Home

None

test log snippet regressions 3

Home

None

test log snippet regressions 4

Home

None

test log snippet regressions 5

Home

None

test log snippet regressions 6

Home

None

test log snippet regressions 7

Home

None

test log snippet regressions 8

Home

None

test log snippet regressions 9

Home

None

test log snippet regressions 10

Home

None

test log snippet regressions 11

Home

memcg_test_3    memcg_test_3

test log snippet regressions 12

Home

perf_record_test fail

test log snippet regressions 13

Home

perf_report_test fail

test log snippet regressions 14

Home

perf_record_test fail

test log snippet regressions 15

Home

perf_report_test fail

test log snippet regressions 16

Home

perf_record_test fail

test log snippet regressions 17

Home

perf_report_test fail

test log snippet regressions 18

Home

None

test log snippet regressions 19

Home

None

test log snippet regressions 20

Home

None

test log snippet regressions 21

Home

None

test log snippet regressions 22

Home

None

test log snippet regressions 23

Home

None

test log snippet regressions 24

Home

None

test log snippet regressions 25

Home

None

test log snippet regressions 26

Home

None

test log snippet regressions 27

Home

None

test log snippet regressions 28

Home

None

test log snippet regressions 29

Home

None

test log snippet regressions 30

Home

None

test log snippet regressions 31

Home

None

test log snippet regressions 32

Home

None

test log snippet regressions 33

Home

None

test log snippet regressions 34

Home

None

test log snippet regressions 35

Home

ksm03 ksm03
ksm03_1 ksm03 -u 128

test log snippet regressions 36

Home

perf_record_test fail

test log snippet regressions 37

Home

perf_report_test fail

test log snippet regressions 38

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 243485us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 39

Home

ftrace_ftracetest-ktap_ftrace__test_for_function_event_triggers fail

test log snippet regressions 40

Home

net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail

test log snippet regressions 41

Home

seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped pass
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total pass
seccomp_seccomp_benchmark fail

test log snippet regressions 42

Home

seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail

test log snippet regressions 43

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 33884ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 67167ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 28004ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 11419ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 33781ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 3587ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file5
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 18397ms

test log snippet regressions 44

Home

epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 2560us with a timeout equal to zero

test log snippet regressions 45

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 341854us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 46

Home

net_mptcp_mptcp_connect_sh_-_mptcp_connect_New_MPTCP_socket_can_be_blocked_via_sysctl pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_ping_tests pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_MPTCP__ns1_10_0_1_1_10000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_MPTCP__ns1_10_0_1_1_10001_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_TCP__ns1_10_0_1_1_10002_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_MPTCP__ns1_dead_beef_1_1_10003_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_MPTCP__ns1_dead_beef_1_1_10004_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_TCP__ns1_dead_beef_1_1_10005_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_10_0_1_2_10006_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_dead_beef_1_2_10007_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_10_0_2_1_10008_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_dead_beef_2_1_10009_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_10_0_2_2_10010_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_dead_beef_2_2_10011_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_10_0_3_2_10012_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_dead_beef_3_2_10013_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns4_10_0_3_1_10014_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns4_dead_beef_3_1_10015_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns1_10_0_1_1_10016_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns1_dead_beef_1_1_10017_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_10_0_2_2_10018_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_dead_beef_2_2_10019_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_10_0_3_2_10020_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_dead_beef_3_2_10021_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns4_10_0_3_1_10022_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns4_dead_beef_3_1_10023_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns1_10_0_1_1_10024_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns1_dead_beef_1_1_10025_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_10_0_1_2_10026_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_dead_beef_1_2_10027_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_10_0_2_1_10028_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_dead_beef_2_1_10029_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns4_10_0_3_1_10030_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns4_dead_beef_3_1_10031_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns1_10_0_1_1_10032_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns1_dead_beef_1_1_10033_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_10_0_1_2_10034_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_dead_beef_1_2_10035_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_10_0_2_1_10036_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_dead_beef_2_1_10037_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_10_0_2_2_10038_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_dead_beef_2_2_10039_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_10_0_3_2_10040_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_dead_beef_3_2_10041_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_10_0_1_1_10042_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_10_0_1_1_10043_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_TCP__ns1_10_0_1_1_10044_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_dead_beef_1_1_10045_MPTCP fail
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_10_0_1_1_10046_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_10_0_1_1_10047_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_TCP__ns1_10_0_1_1_10048_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_dead_beef_1_1_10049_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_dead_beef_1_1_10050_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_TCP__ns1_dead_beef_1_1_10051_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_time_481ms skip
net_mptcp_mptcp_connect_sh_-_mptcp_connect_tproxy_ipv4_ns1_MPTCP__ns2_10_0_3_1_20000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_tproxy_ipv6_ns1_MPTCP__ns2_dead_beef_3_1_20000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_dead_beef_1_1_20002_MPTCP fail
net_mptcp_mptcp_connect_sh fail

test log snippet regressions 47

Home

net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail

test log snippet regressions 48

Home

net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_dead_beef_1_1_10045_MPTCP fail

test log snippet regressions 49

Home

seccomp_seccomp_benchmark_entry_2_bitmapped fail

test log snippet regressions 50

Home

x86_sigreturn_64 fail

test log snippet regressions 51

Home

perf_record_test fail

test log snippet regressions 52

Home

perf_report_test fail

test log snippet regressions 53

Home

None

test log snippet regressions 54

Home

None

test log snippet regressions 55

Home

None

test log snippet regressions 56

Home

None

test log snippet regressions 57

Home

None

test log snippet regressions 58

Home

None

test log snippet regressions 59

Home

None

test log snippet regressions 60

Home

None

test log snippet regressions 61

Home

None

test log snippet build parser 1

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arc CROSS_COMPILE=arc-elf32- 'CC=sccache arc-elf32-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |  if (udev && !udev->port_is_suspended) {
      |                   ^~

test log snippet build parser 2

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arc CROSS_COMPILE=arc-elf32- 'CC=sccache arc-elf32-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 3

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build ARCH=arc CROSS_COMPILE=arc-elf32- 'CC=sccache arc-elf32-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |  if (udev && !udev->port_is_suspended) {
      |                   ^~

test log snippet build parser 4

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 5

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 6

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 7

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 8

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 9

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 10

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 11

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 12

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 13

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 14

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 15

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/2/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/2/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 16

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 17

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 18

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 19

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 20

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/arm64/fp'
/tmp/fp-pidbench-b34e9d.s:110:1: error: symbol '_start' is already defined

test log snippet build parser 21

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/arm64/fp'
/tmp/fp-pidbench-04eae8.s:110:1: error: symbol '_start' is already defined

test log snippet build parser 22

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/arm64/fp'
/tmp/fp-pidbench-bdcd3f.s:110:1: error: symbol '_start' is already defined

test log snippet build parser 23

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/arm64/fp'
/tmp/fp-pidbench-0e0b61.s:110:1: error: symbol '_start' is already defined

test log snippet build parser 24

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-e26b68.o: warning: relocation in read-only section `.text'

test log snippet build parser 25

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
utils/cpupower-info.c:60:21: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]
   60 |                         params.perf_bias = 1;
      |                                          ^ ~

test log snippet build parser 26

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-e8646b.o: warning: relocation in read-only section `.text'

test log snippet build parser 27

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccHRgPmA.o: warning: relocation in read-only section `.text'

test log snippet build parser 28

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccMakdGc.o: warning: relocation in read-only section `.text'

test log snippet build parser 29

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccN68khL.o: warning: relocation in read-only section `.text'

test log snippet build parser 30

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccxx0Gq4.o: warning: relocation in read-only section `.text'

test log snippet build parser 31

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccHJZtiO.o: warning: relocation in read-only section `.text'

test log snippet build parser 32

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cclj7lp5.o: warning: relocation in read-only section `.text'

test log snippet build parser 33

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccULrSbp.o: warning: relocation in read-only section `.text'

test log snippet build parser 34

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccYR5eZg.o: warning: relocation in read-only section `.text'

test log snippet build parser 35

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 36

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 37

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 38

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 39

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 40

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 41

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 42

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 43

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 44

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 45

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 46

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'CC=sccache mips-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 47

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=parisc CROSS_COMPILE=hppa-linux-gnu- 'CC=sccache hppa-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 48

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=parisc CROSS_COMPILE=hppa-linux-gnu- 'CC=sccache hppa-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 49

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=parisc CROSS_COMPILE=hppa-linux-gnu- 'CC=sccache hppa-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 50

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=parisc CROSS_COMPILE=hppa-linux-gnu- 'CC=sccache hppa-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 51

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=parisc CROSS_COMPILE=hppa-linux-gnu- 'CC=sccache hppa-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 52

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=parisc CROSS_COMPILE=hppa-linux-gnu- 'CC=sccache hppa-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 53

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM_IAS=0
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 54

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM_IAS=0 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 55

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=0 LD=powerpc64le-linux-gnu-ld
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 56

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=0 LD=powerpc64le-linux-gnu-ld modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 57

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=0
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 58

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=0 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 59

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=0 LD=powerpc64le-linux-gnu-ld
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 60

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=0 LD=powerpc64le-linux-gnu-ld modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 61

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 62

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 63

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc'
powerpc64le-linux-gnu-ld: warning: arch/powerpc/boot/cuImage.mpc8349emitx has a LOAD segment with RWX permissions

test log snippet build parser 64

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc'
powerpc64le-linux-gnu-ld: warning: arch/powerpc/boot/cuImage.mpc8349emitxgp has a LOAD segment with RWX permissions

test log snippet build parser 65

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 66

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 67

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 68

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 69

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 70

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=powerpc CROSS_COMPILE=powerpc64le-linux-gnu- 'CC=sccache powerpc64le-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 71

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 72

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM_IAS=1 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 73

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 74

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM_IAS=1 modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 75

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- HOSTCC=clang CC=clang LLVM_IAS=1
/builds/linux/drivers/usb/core/port.c:417:21: error: no member named 'port_is_suspended' in 'struct usb_device'
  417 |         if (udev && !udev->port_is_suspended) {
      |                      ~~~~  ^

test log snippet build parser 76

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 77

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 78

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 79

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 80

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from /builds/linux/include/linux/string.h:293,
                 from /builds/linux/include/linux/bitmap.h:11,
                 from /builds/linux/include/linux/cpumask.h:12,
                 from /builds/linux/include/linux/smp.h:13,
                 from /builds/linux/include/linux/lockdep.h:14,
                 from /builds/linux/include/linux/spinlock.h:63,
                 from /builds/linux/include/linux/mmzone.h:8,
                 from /builds/linux/include/linux/gfp.h:7,
                 from /builds/linux/include/linux/slab.h:16,
                 from /builds/linux/kernel/fork.c:16:
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 81

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from /builds/linux/include/linux/string.h:293,
                 from /builds/linux/include/linux/bitmap.h:11,
                 from /builds/linux/include/linux/cpumask.h:12,
                 from /builds/linux/include/linux/smp.h:13,
                 from /builds/linux/include/linux/lockdep.h:14,
                 from /builds/linux/include/linux/spinlock.h:63,
                 from /builds/linux/include/linux/mmzone.h:8,
                 from /builds/linux/include/linux/gfp.h:7,
                 from /builds/linux/include/linux/slab.h:16,
                 from /builds/linux/kernel/fork.c:16:
In function 'fortify_memset_chk',
    inlined from 'task_io_accounting_init' at /builds/linux/include/linux/task_io_accounting_ops.h:46:2,
    inlined from 'copy_process' at /builds/linux/kernel/fork.c:2183:2:
/builds/linux/include/linux/fortify-string.h:314:4: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror]
    __write_overflow_field(p_size_field, size);
    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

test log snippet build parser 82

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 83

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from /builds/linux/include/linux/slab.h:15,
                 from /builds/linux/drivers/usb/core/port.c:10:
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 84

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 85

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from /builds/linux/include/linux/slab.h:15,
                 from /builds/linux/drivers/usb/core/port.c:10:
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:26: error: 'struct usb_device' has no member named 'port_is_suspended'
  417 |         if (udev && !udev->port_is_suspended) {
      |                          ^~

test log snippet build parser 86

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 87

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from /builds/linux/include/linux/slab.h:15,
                 from /builds/linux/drivers/usb/core/port.c:10:
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 88

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 89

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from /builds/linux/include/linux/slab.h:15,
                 from /builds/linux/drivers/usb/core/port.c:10:
/builds/linux/drivers/usb/core/port.c: In function 'usb_port_shutdown':
/builds/linux/drivers/usb/core/port.c:417:19: error: 'struct usb_device' has no member named 'port_is_suspended'
  if (udev && !udev->port_is_suspended) {
                   ^~

test log snippet build parser 90

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=sh CROSS_COMPILE=sh4-linux-gnu- 'CC=sccache sh4-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
sed: can't read modules.order: No such file or directory

test log snippet build parser 91

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccvBbQ9z.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 92

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[3]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cc0y84sX.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet boot parser 1

Home

------------[ cut here ]------------
[    6.059766] WARNING: CPU: 3 PID: 468 at drivers/interconnect/core.c:685 icc_disable+0x2c/0xf8
[    6.059785] Modules linked in: coresight_stm(+) qcom_stats(+) i2c_qcom_cci reset_qcom_pdc i2c_qcom_geni(+) gpi(+) spi_geni_qcom(+) qcom_rng phy_qcom_qmp_usb qcom_q6v5_mss stm_core ufs_qcom(+) phy_qcom_qmp_ufs cfg80211(+) phy_qcom_qmp_pcie rfkill qcom_wdt slim_qcom_ngd_ctrl icc_osm_l3 lmh pdr_interface slimbus qrtr llcc_qcom icc_bwmon qcom_q6v5_pas qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common qcom_glink_smem qmi_helpers mdt_loader display_connector drm_kms_helper drm socinfo rmtfs_mem
[    6.059875] CPU: 3 PID: 468 Comm: (udev-worker) Not tainted 6.1.125-rc1 #1
[    6.059881] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.059885] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.059890] pc : icc_disable+0x2c/0xf8
[    6.059896] lr : geni_icc_disable+0x44/0xbc
[    6.059904] sp : ffff80000957b510
[    6.059907] x29: ffff80000957b510 x28: 00000000000f4240 x27: ffff80000957b608
[    6.059915] x26: 0000000000000000 x25: 00000000fffffff5 x24: 0000000000000000
[    6.059923] x23: ffff80000957b5f0 x22: ffffbe15148577d0 x21: ffffbe15148577d0
[    6.059930] x20: ffff6cb5c837a580 x19: ffff6cb5c0867800 x18: 0000000000000001
[    6.059938] x17: 0000000000000001 x16: 000000000000010c x15: 0000000000000000
[    6.059945] x14: 00006cb5c812f000 x13: ffff800009578000 x12: 0000000003e7ffff
[    6.059952] x11: 0000000000000000 x10: 0000000000000002 x9 : ffffbe151472f83c
[    6.059975] x8 : 0000000000000000 x7 : 000000006fffffff x6 : ffff800008dd0d74
[    6.060000] x5 : 0000000000000008 x4 : ffff6cb63d5090f0 x3 : 0000000000006a03
[    6.060013] x2 : 0000000000000000 x1 : ffff6cb5c8018000 x0 : ffff6cb5c0867800
[    6.060021] Call trace:
[    6.060024]  icc_disable+0x2c/0xf8
[    6.060030]  geni_icc_disable+0x44/0xbc
[    6.060035]  spi_geni_runtime_suspend+0x40/0x50 [spi_geni_qcom]
[    6.060057]  pm_generic_runtime_suspend+0x34/0x48
[    6.060066]  __rpm_callback+0x88/0x3d8
[    6.060072]  rpm_suspend+0x2dc/0x710
[    6.060077]  rpm_idle+0x1a0/0x324
[    6.060082]  update_autosuspend+0x5c/0xc8
[    6.060087]  pm_runtime_disable_action+0x44/0x68
[    6.060092]  devm_action_release+0x20/0x2c
[    6.060098]  release_nodes+0x74/0x108
[    6.060102]  devres_release_all+0x90/0xd8
[    6.060107]  really_probe+0x90/0x434
[    6.060114]  __driver_probe_device+0xb0/0x178
[    6.060119]  driver_probe_device+0x48/0x22c
[    6.060124]  __driver_attach+0xf4/0x24c
[    6.060130]  bus_for_each_dev+0x88/0xd0
[    6.060135]  driver_attach+0x30/0x3c
[    6.060140]  bus_add_driver+0x110/0x220
[    6.060145]  driver_register+0x84/0x120
[    6.060150]  __platform_driver_register+0x2c/0x38
[    6.060156]  init_module+0x2c/0xfe8 [spi_geni_qcom]
[    6.060168]  do_one_initcall+0xe0/0x2f8
[    6.060176]  do_init_module+0x58/0x1d8
[    6.060184]  load_module+0x15b4/0x1858
[    6.060189]  __arm64_sys_finit_module+0xd4/0x14c
[    6.060195]  invoke_syscall+0x4c/0x110
[    6.060202]  el0_svc_common+0xd0/0x118
[    6.060208]  do_el0_svc+0x30/0x98
[    6.060213]  el0_svc+0x30/0x60
[    6.060221]  el0t_64_sync_handler+0x84/0xf0
[    6.060226]  el0t_64_sync+0x18c/0x190
[    6.060231] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 2

Home

------------[ cut here ]------------
[    6.175003] cfg80211: failed to load regulatory.db
[    6.175395] qcom-pcie 1c00000.pci: Adding to iommu group 7
[    6.175817] qcom-pcie 1c00000.pci: supply vdda not found, using dummy regulator
[    6.176218] qcom-pcie 1c00000.pci: host bridge /soc@0/pci@1c00000 ranges:
[    6.176257] qcom-pcie 1c00000.pci:       IO 0x0060200000..0x00602fffff -> 0x0000000000
[    6.176275] qcom-pcie 1c00000.pci:      MEM 0x0060300000..0x0060ffffff -> 0x0060300000
[    6.176428] /soc@0/mdss@ae00000/dsi@ae94000: Fixed dependency cycle(s) with /soc@0/geniqup@ac0000/i2c@a88000/hdmi-bridge@3b
[    6.176552] /soc@0/geniqup@ac0000/i2c@a88000/hdmi-bridge@3b: Fixed dependency cycle(s) with /soc@0/mdss@ae00000/dsi@ae94000
[    6.177629] gpi a00000.dma-controller: Adding to iommu group 8
[    6.179606] WARNING: CPU: 3 PID: 486 at drivers/interconnect/core.c:685 icc_disable+0x2c/0xf8
[    6.179624] Modules linked in:
[    6.180141] Bluetooth: Core ver 2.22
[    6.263782]  qcom_spmi_temp_alarm reset_qcom_pdc(+) ocmem bluetooth(+) videobuf2_memops soundwire_bus gpu_sched venus_core(+) qcom_stats spi_geni_qcom(+) v4l2_mem2mem drm_dp_aux_bus camcc_sdm845 videobuf2_v4l2 drm_display_helper i2c_qcom_geni(+) videobuf2_common phy_qcom_qmp_usb i2c_qcom_cci qcom_q6v5_mss qrtr qcom_q6v5_pas(+) slim_qcom_ngd_ctrl coresight_stm phy_qcom_qmp_ufs qcom_rng gpi qcom_pil_info qcom_q6v5 cfg80211 stm_core lmh qcom_sysmon pdr_interface qcom_wdt phy_qcom_qmp_pcie rfkill ufs_qcom slimbus icc_osm_l3 display_connector qcom_common qcom_glink_smem llcc_qcom qmi_helpers icc_bwmon drm_kms_helper mdt_loader drm socinfo rmtfs_mem
[    6.298141] qcom-pcie 1c00000.pci: iATU unroll: disabled
[    6.321256] CPU: 3 PID: 486 Comm: (udev-worker) Not tainted 6.1.125-rc1 #1
[    6.321262] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.321266] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.326632] qcom-pcie 1c00000.pci: iATU regions: 32 ob, 8 ib, align 4K, limit 4G
[    6.333540] pc : icc_disable+0x2c/0xf8
[    6.357538] lr : geni_icc_disable+0x44/0xbc
[    6.361763] sp : ffff800008b03510
[    6.365107] x29: ffff800008b03510 x28: 00000000000f4240 x27: ffff800008b03608
[    6.372311] x26: 0000000000000000 x25: 00000000fffffff5 x24: 0000000000000000
[    6.379515] x23: ffff800008b035f0 x22: ffffc251440577d0 x21: ffffc251440577d0
[    6.386716] x20: ffff1494888ac580 x19: ffff149480867000 x18: 0000000000000001
[    6.393917] x17: 0000000000000001 x16: 00000000000000c7 x15: 0000000000100000
[    6.401117] x14: 0000000000000000 x13: ffff800008b00000 x12: 0000000003e7ffff
[    6.408318] x11: 0000000000000000 x10: 0000000000000002 x9 : ffffc25143f2f83c
[    6.415521] x8 : 0000000000000000 x7 : 000000006fffffff x6 : ffff800008dd0d74
[    6.422721] x5 : 0000000000000008 x4 : ffff1494fd5090f0 x3 : 0000000000006a03
[    6.429921] x2 : 0000000000000000 x1 : ffff14948895c200 x0 : ffff149480867000
[    6.436087] qcom-pcie 1c00000.pci: PCIe Gen.2 x1 link up
[    6.437116] Call trace:
[    6.444947]  icc_disable+0x2c/0xf8
[    6.448381]  geni_icc_disable+0x44/0xbc
[    6.452255]  spi_geni_runtime_suspend+0x40/0x50 [spi_geni_qcom]
[    6.458247]  pm_generic_runtime_suspend+0x34/0x48
[    6.462998]  __rpm_callback+0x88/0x3d8
[    6.466787]  rpm_suspend+0x2dc/0x710
[    6.470404]  rpm_idle+0x1a0/0x324
[    6.473753]  update_autosuspend+0x5c/0xc8
[    6.477799]  pm_runtime_disable_action+0x44/0x68
[    6.482459]  devm_action_release+0x20/0x2c
[    6.486596]  release_nodes+0x74/0x108
[    6.490297]  devres_release_all+0x90/0xd8
[    6.494348]  really_probe+0x90/0x434
[    6.497962]  __driver_probe_device+0xb0/0x178
[    6.502364]  driver_probe_device+0x48/0x22c
[    6.506592]  __driver_attach+0xf4/0x24c
[    6.510466]  bus_for_each_dev+0x88/0xd0
[    6.514338]  driver_attach+0x30/0x3c
[    6.517952]  bus_add_driver+0x110/0x220
[    6.521822]  driver_register+0x84/0x120
[    6.525696]  __platform_driver_register+0x2c/0x38
[    6.530449]  init_module+0x2c/0xfe8 [spi_geni_qcom]
[    6.535381]  do_one_initcall+0xe0/0x2f8
[    6.539260]  do_init_module+0x58/0x1d8
[    6.543054]  load_module+0x15b4/0x1858
[    6.546843]  __arm64_sys_finit_module+0xd4/0x14c
[    6.551507]  invoke_syscall+0x4c/0x110
[    6.555301]  el0_svc_common+0xd0/0x118
[    6.559091]  do_el0_svc+0x30/0x98
[    6.562447]  el0_svc+0x30/0x60
[    6.565540]  el0t_64_sync_handler+0x84/0xf0
[    6.569759]  el0t_64_sync+0x18c/0x190
[    6.573465] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

------------[ cut here ]------------
[    6.175003] cfg80211: failed to load regulatory.db
[    6.175395] qcom-pcie 1c00000.pci: Adding to iommu group 7
[    6.175817] qcom-pcie 1c00000.pci: supply vdda not found, using dummy regulator
[    6.176218] qcom-pcie 1c00000.pci: host bridge /soc@0/pci@1c00000 ranges:
[    6.176257] qcom-pcie 1c00000.pci:       IO 0x0060200000..0x00602fffff -> 0x0000000000
[    6.176275] qcom-pcie 1c00000.pci:      MEM 0x0060300000..0x0060ffffff -> 0x0060300000
[    6.176428] /soc@0/mdss@ae00000/dsi@ae94000: Fixed dependency cycle(s) with /soc@0/geniqup@ac0000/i2c@a88000/hdmi-bridge@3b
[    6.176552] /soc@0/geniqup@ac0000/i2c@a88000/hdmi-bridge@3b: Fixed dependency cycle(s) with /soc@0/mdss@ae00000/dsi@ae94000
[    6.177629] gpi a00000.dma-controller: Adding to iommu group 8
[    6.179606] WARNING: CPU: 3 PID: 486 at drivers/interconnect/core.c:685 icc_disable+0x2c/0xf8
[    6.179624] Modules linked in:
[    6.180141] Bluetooth: Core ver 2.22
[    6.263782]  qcom_spmi_temp_alarm reset_qcom_pdc(+) ocmem bluetooth(+) videobuf2_memops soundwire_bus gpu_sched venus_core(+) qcom_stats spi_geni_qcom(+) v4l2_mem2mem drm_dp_aux_bus camcc_sdm845 videobuf2_v4l2 drm_display_helper i2c_qcom_geni(+) videobuf2_common phy_qcom_qmp_usb i2c_qcom_cci qcom_q6v5_mss qrtr qcom_q6v5_pas(+) slim_qcom_ngd_ctrl coresight_stm phy_qcom_qmp_ufs qcom_rng gpi qcom_pil_info qcom_q6v5 cfg80211 stm_core lmh qcom_sysmon pdr_interface qcom_wdt phy_qcom_qmp_pcie rfkill ufs_qcom slimbus icc_osm_l3 display_connector qcom_common qcom_glink_smem llcc_qcom qmi_helpers icc_bwmon drm_kms_helper mdt_loader drm socinfo rmtfs_mem
[    6.298141] qcom-pcie 1c00000.pci: iATU unroll: disabled
[    6.321256] CPU: 3 PID: 486 Comm: (udev-worker) Not tainted 6.1.125-rc1 #1
[    6.321262] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.321266] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.326632] qcom-pcie 1c00000.pci: iATU regions: 32 ob, 8 ib, align 4K, limit 4G
[    6.333540] pc : icc_disable+0x2c/0xf8
[    6.357538] lr : geni_icc_disable+0x44/0xbc
[    6.361763] sp : ffff800008b03510
[    6.365107] x29: ffff800008b03510 x28: 00000000000f4240 x27: ffff800008b03608
[    6.372311] x26: 0000000000000000 x25: 00000000fffffff5 x24: 0000000000000000
[    6.379515] x23: ffff800008b035f0 x22: ffffc251440577d0 x21: ffffc251440577d0
[    6.386716] x20: ffff1494888ac580 x19: ffff149480867000 x18: 0000000000000001
[    6.393917] x17: 0000000000000001 x16: 00000000000000c7 x15: 0000000000100000
[    6.401117] x14: 0000000000000000 x13: ffff800008b00000 x12: 0000000003e7ffff
[    6.408318] x11: 0000000000000000 x10: 0000000000000002 x9 : ffffc25143f2f83c
[    6.415521] x8 : 0000000000000000 x7 : 000000006fffffff x6 : ffff800008dd0d74
[    6.422721] x5 : 0000000000000008 x4 : ffff1494fd5090f0 x3 : 0000000000006a03
[    6.429921] x2 : 0000000000000000 x1 : ffff14948895c200 x0 : ffff149480867000
[    6.436087] qcom-pcie 1c00000.pci: PCIe Gen.2 x1 link up
[    6.437116] Call trace:
[    6.444947]  icc_disable+0x2c/0xf8
[    6.448381]  geni_icc_disable+0x44/0xbc
[    6.452255]  spi_geni_runtime_suspend+0x40/0x50 [spi_geni_qcom]
[    6.458247]  pm_generic_runtime_suspend+0x34/0x48
[    6.462998]  __rpm_callback+0x88/0x3d8
[    6.466787]  rpm_suspend+0x2dc/0x710
[    6.470404]  rpm_idle+0x1a0/0x324
[    6.473753]  update_autosuspend+0x5c/0xc8
[    6.477799]  pm_runtime_disable_action+0x44/0x68
[    6.482459]  devm_action_release+0x20/0x2c
[    6.486596]  release_nodes+0x74/0x108
[    6.490297]  devres_release_all+0x90/0xd8
[    6.494348]  really_probe+0x90/0x434
[    6.497962]  __driver_probe_device+0xb0/0x178
[    6.502364]  driver_probe_device+0x48/0x22c
[    6.506592]  __driver_attach+0xf4/0x24c
[    6.510466]  bus_for_each_dev+0x88/0xd0
[    6.514338]  driver_attach+0x30/0x3c
[    6.517952]  bus_add_driver+0x110/0x220
[    6.521822]  driver_register+0x84/0x120
[    6.525696]  __platform_driver_register+0x2c/0x38
[    6.530449]  init_module+0x2c/0xfe8 [spi_geni_qcom]
[    6.535381]  do_one_initcall+0xe0/0x2f8
[    6.539260]  do_init_module+0x58/0x1d8
[    6.543054]  load_module+0x15b4/0x1858
[    6.546843]  __arm64_sys_finit_module+0xd4/0x14c
[    6.551507]  invoke_syscall+0x4c/0x110
[    6.555301]  el0_svc_common+0xd0/0x118
[    6.559091]  do_el0_svc+0x30/0x98
[    6.562447]  el0_svc+0x30/0x60
[    6.565540]  el0t_64_sync_handler+0x84/0xf0
[    6.569759]  el0t_64_sync+0x18c/0x190
[    6.573465] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 4

Home

------------[ cut here ]------------
[    6.258343] /soc@0/geniqup@ac0000/i2c@a88000/hdmi-bridge@3b: Fixed dependency cycle(s) with /soc@0/mdss@ae00000/dsi@ae94000
[    6.273513] scsi 0:0:0:49488: Well-known LUN    SKhynix  H28S7Q302BMR     A002 PQ: 0 ANSI: 6
[    6.274002] WARNING: CPU: 2 PID: 452 at drivers/interconnect/core.c:685 icc_disable+0x2c/0xf8
[    6.274020] Modules linked in: qcom_stats(+) rtc_pm8xxx(+) camcc_sdm845(+) reset_qcom_pdc drm_display_helper i2c_qcom_geni(+) spi_geni_qcom(+) mac80211 i2c_qcom_cci gpi(+) videobuf2_common qcom_rng phy_qcom_qmp_usb
[    6.275717] rtc-pm8xxx c440000.spmi:pmic@0:rtc@6000: registered as rtc0
[    6.275789] rtc-pm8xxx c440000.spmi:pmic@0:rtc@6000: setting system clock to 1970-01-01T00:00:29 UTC (29)
[    6.281334] cpu cpu0: EM: created perf domain
[    6.290098]  qcom_q6v5_mss coresight_stm stm_core cfg80211 rfkill icc_osm_l3 lmh qcom_wdt phy_qcom_qmp_ufs ufs_qcom phy_qcom_qmp_pcie slim_qcom_ngd_ctrl pdr_interface slimbus qrtr llcc_qcom icc_bwmon qcom_q6v5_pas qcom_pil_info display_connector qcom_q6v5 qcom_sysmon qcom_common qcom_glink_smem drm_kms_helper qmi_helpers mdt_loader drm rmtfs_mem socinfo
[    6.394532] CPU: 2 PID: 452 Comm: (udev-worker) Not tainted 6.1.125-rc1 #1
[    6.401471] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.407184] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.414207] pc : icc_disable+0x2c/0xf8
[    6.417994] lr : geni_icc_disable+0x44/0xbc
[    6.422225] sp : ffff8000094db510
[    6.425568] x29: ffff8000094db510 x28: 00000000000f4240 x27: ffff8000094db608
[    6.432775] x26: 0000000000000000 x25: 00000000fffffff5 x24: 0000000000000000
[    6.439976] x23: ffff8000094db5f0 x22: ffffd9ccd58577d0 x21: ffffd9ccd58577d0
[    6.447175] x20: ffff5e9148a97580 x19: ffff5e914082b800 x18: 0000000000000164
[    6.454374] x17: 071c71c71c71c71c x16: 0000000000000038 x15: 0000000000100000
[    6.461571] x14: 0000000000000000 x13: ffff8000094d8000 x12: 0000000003e7ffff
[    6.468769] x11: 0000000000000000 x10: 0000000000000002 x9 : ffffd9ccd572f83c
[    6.475968] x8 : 0000000000000000 x7 : 00000000000000e1 x6 : 0000000000000124
[    6.483166] x5 : 000000000000014b x4 : ffff5e91bd4ea0f0 x3 : 0000000000008302
[    6.490362] x2 : 0000000000000000 x1 : ffff5e91426a8000 x0 : ffff5e914082b800
[    6.497560] Call trace:
[    6.500035]  icc_disable+0x2c/0xf8
[    6.503468]  geni_icc_disable+0x44/0xbc
[    6.507340]  spi_geni_runtime_suspend+0x40/0x50 [spi_geni_qcom]
[    6.513327]  pm_generic_runtime_suspend+0x34/0x48
[    6.518074]  __rpm_callback+0x88/0x3d8
[    6.521862]  rpm_suspend+0x2dc/0x710
[    6.525476]  rpm_idle+0x1a0/0x324
[    6.528821]  update_autosuspend+0x5c/0xc8
[    6.532867]  pm_runtime_disable_action+0x44/0x68
[    6.537525]  devm_action_release+0x20/0x2c
[    6.541671]  release_nodes+0x74/0x108
[    6.545370]  devres_release_all+0x90/0xd8
[    6.549415]  really_probe+0x90/0x434
[    6.553032]  __driver_probe_device+0xb0/0x178
[    6.557434]  driver_probe_device+0x48/0x22c
[    6.561663]  __driver_attach+0xf4/0x24c
[    6.565537]  bus_for_each_dev+0x88/0xd0
[    6.569411]  driver_attach+0x30/0x3c
[    6.573025]  bus_add_driver+0x110/0x220
[    6.576897]  driver_register+0x84/0x120
[    6.580770]  __platform_driver_register+0x2c/0x38
[    6.585517]  init_module+0x2c/0xfe8 [spi_geni_qcom]
[    6.590450]  do_one_initcall+0xe0/0x2f8
[    6.594327]  do_init_module+0x58/0x1d8
[    6.598117]  load_module+0x15b4/0x1858
[    6.601903]  __arm64_sys_finit_module+0xd4/0x14c
[    6.606565]  invoke_syscall+0x4c/0x110
[    6.610354]  el0_svc_common+0xd0/0x118
[    6.614140]  do_el0_svc+0x30/0x98
[    6.617487]  el0_svc+0x30/0x60
[    6.620579]  el0t_64_sync_handler+0x84/0xf0
[    6.624803]  el0t_64_sync+0x18c/0x190
[    6.628505] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 5

Home

------------[ cut here ]------------
[    6.258343] /soc@0/geniqup@ac0000/i2c@a88000/hdmi-bridge@3b: Fixed dependency cycle(s) with /soc@0/mdss@ae00000/dsi@ae94000
[    6.273513] scsi 0:0:0:49488: Well-known LUN    SKhynix  H28S7Q302BMR     A002 PQ: 0 ANSI: 6
[    6.274002] WARNING: CPU: 2 PID: 452 at drivers/interconnect/core.c:685 icc_disable+0x2c/0xf8
[    6.274020] Modules linked in: qcom_stats(+) rtc_pm8xxx(+) camcc_sdm845(+) reset_qcom_pdc drm_display_helper i2c_qcom_geni(+) spi_geni_qcom(+) mac80211 i2c_qcom_cci gpi(+) videobuf2_common qcom_rng phy_qcom_qmp_usb
[    6.275717] rtc-pm8xxx c440000.spmi:pmic@0:rtc@6000: registered as rtc0
[    6.275789] rtc-pm8xxx c440000.spmi:pmic@0:rtc@6000: setting system clock to 1970-01-01T00:00:29 UTC (29)
[    6.281334] cpu cpu0: EM: created perf domain
[    6.290098]  qcom_q6v5_mss coresight_stm stm_core cfg80211 rfkill icc_osm_l3 lmh qcom_wdt phy_qcom_qmp_ufs ufs_qcom phy_qcom_qmp_pcie slim_qcom_ngd_ctrl pdr_interface slimbus qrtr llcc_qcom icc_bwmon qcom_q6v5_pas qcom_pil_info display_connector qcom_q6v5 qcom_sysmon qcom_common qcom_glink_smem drm_kms_helper qmi_helpers mdt_loader drm rmtfs_mem socinfo
[    6.394532] CPU: 2 PID: 452 Comm: (udev-worker) Not tainted 6.1.125-rc1 #1
[    6.401471] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.407184] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.414207] pc : icc_disable+0x2c/0xf8
[    6.417994] lr : geni_icc_disable+0x44/0xbc
[    6.422225] sp : ffff8000094db510
[    6.425568] x29: ffff8000094db510 x28: 00000000000f4240 x27: ffff8000094db608
[    6.432775] x26: 0000000000000000 x25: 00000000fffffff5 x24: 0000000000000000
[    6.439976] x23: ffff8000094db5f0 x22: ffffd9ccd58577d0 x21: ffffd9ccd58577d0
[    6.447175] x20: ffff5e9148a97580 x19: ffff5e914082b800 x18: 0000000000000164
[    6.454374] x17: 071c71c71c71c71c x16: 0000000000000038 x15: 0000000000100000
[    6.461571] x14: 0000000000000000 x13: ffff8000094d8000 x12: 0000000003e7ffff
[    6.468769] x11: 0000000000000000 x10: 0000000000000002 x9 : ffffd9ccd572f83c
[    6.475968] x8 : 0000000000000000 x7 : 00000000000000e1 x6 : 0000000000000124
[    6.483166] x5 : 000000000000014b x4 : ffff5e91bd4ea0f0 x3 : 0000000000008302
[    6.490362] x2 : 0000000000000000 x1 : ffff5e91426a8000 x0 : ffff5e914082b800
[    6.497560] Call trace:
[    6.500035]  icc_disable+0x2c/0xf8
[    6.503468]  geni_icc_disable+0x44/0xbc
[    6.507340]  spi_geni_runtime_suspend+0x40/0x50 [spi_geni_qcom]
[    6.513327]  pm_generic_runtime_suspend+0x34/0x48
[    6.518074]  __rpm_callback+0x88/0x3d8
[    6.521862]  rpm_suspend+0x2dc/0x710
[    6.525476]  rpm_idle+0x1a0/0x324
[    6.528821]  update_autosuspend+0x5c/0xc8
[    6.532867]  pm_runtime_disable_action+0x44/0x68
[    6.537525]  devm_action_release+0x20/0x2c
[    6.541671]  release_nodes+0x74/0x108
[    6.545370]  devres_release_all+0x90/0xd8
[    6.549415]  really_probe+0x90/0x434
[    6.553032]  __driver_probe_device+0xb0/0x178
[    6.557434]  driver_probe_device+0x48/0x22c
[    6.561663]  __driver_attach+0xf4/0x24c
[    6.565537]  bus_for_each_dev+0x88/0xd0
[    6.569411]  driver_attach+0x30/0x3c
[    6.573025]  bus_add_driver+0x110/0x220
[    6.576897]  driver_register+0x84/0x120
[    6.580770]  __platform_driver_register+0x2c/0x38
[    6.585517]  init_module+0x2c/0xfe8 [spi_geni_qcom]
[    6.590450]  do_one_initcall+0xe0/0x2f8
[    6.594327]  do_init_module+0x58/0x1d8
[    6.598117]  load_module+0x15b4/0x1858
[    6.601903]  __arm64_sys_finit_module+0xd4/0x14c
[    6.606565]  invoke_syscall+0x4c/0x110
[    6.610354]  el0_svc_common+0xd0/0x118
[    6.614140]  do_el0_svc+0x30/0x98
[    6.617487]  el0_svc+0x30/0x60
[    6.620579]  el0t_64_sync_handler+0x84/0xf0
[    6.624803]  el0t_64_sync+0x18c/0x190
[    6.628505] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 6

Home

------------[ cut here ]------------
[    6.235624] WARNING: CPU: 2 PID: 461 at drivers/interconnect/core.c:685 icc_disable+0x2c/0xf8
[    6.235643] Modules linked in: i2c_qcom_geni(+) venus_core(+) i2c_qcom_cci camcc_sdm845(+) bluetooth(+) v4l2_mem2mem videobuf2_v4l2 reset_qcom_pdc spi_geni_qcom(+) videobuf2_common qrtr gpi qcom_q6v5_mss phy_qcom_qmp_usb qcom_rng cfg80211 coresight_stm qcom_q6v5_pas(+) phy_qcom_qmp_ufs stm_core slim_qcom_ngd_ctrl qcom_pil_info qcom_q6v5 icc_osm_l3 pdr_interface qcom_sysmon ufs_qcom(+) rfkill qcom_common phy_qcom_qmp_pcie lmh display_connector qcom_wdt slimbus drm_kms_helper qcom_glink_smem llcc_qcom icc_bwmon qmi_helpers mdt_loader socinfo drm rmtfs_mem
[    6.235734] CPU: 2 PID: 461 Comm: (udev-worker) Not tainted 6.1.125-rc1 #1
[    6.235739] Hardware name: Thundercomm Dragonboard 845c (DT)
[    6.235743] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    6.235749] pc : icc_disable+0x2c/0xf8
[    6.235755] lr : geni_icc_disable+0x44/0xbc
[    6.235763] sp : ffff80000959b510
[    6.235766] x29: ffff80000959b510 x28: 00000000000f4240 x27: ffff80000959b608
[    6.235775] x26: 0000000000000000 x25: 00000000fffffff5 x24: 0000000000000000
[    6.235782] x23: ffff80000959b5f0 x22: ffffb3a90e0577d0 x21: ffffb3a90e0577d0
[    6.235790] x20: ffff383880b53d80 x19: ffff38388082a600 x18: 0000000000000001
[    6.235797] x17: 00000000fa83b2da x16: ffffb3a90ea0da28 x15: 0000000000100000
[    6.235805] x14: 0000000000000000 x13: ffff800009598000 x12: 0000000003e7ffff
[    6.235812] x11: 0000000000000000 x10: 0000000000000002 x9 : ffffb3a90df2f83c
[    6.235820] x8 : 0000000000000000 x7 : 000000006fffffff x6 : ffff800008de0d74
[    6.235827] x5 : 0000000000000008 x4 : ffff3838fd4ea0f0 x3 : 000000000000a002
[    6.235834] x2 : 0000000000000000 x1 : ffff383887fb6300 x0 : ffff38388082a600
[    6.235841] Call trace:
[    6.235844]  icc_disable+0x2c/0xf8
[    6.235850]  geni_icc_disable+0x44/0xbc
[    6.235854]  spi_geni_runtime_suspend+0x40/0x50 [spi_geni_qcom]
[    6.235876]  pm_generic_runtime_suspend+0x34/0x48
[    6.235885]  __rpm_callback+0x88/0x3d8
[    6.235891]  rpm_suspend+0x2dc/0x710
[    6.235896]  rpm_idle+0x1a0/0x324
[    6.235901]  update_autosuspend+0x5c/0xc8
[    6.235906]  pm_runtime_disable_action+0x44/0x68
[    6.235911]  devm_action_release+0x20/0x2c
[    6.235918]  release_nodes+0x74/0x108
[    6.235922]  devres_release_all+0x90/0xd8
[    6.235926]  really_probe+0x90/0x434
[    6.235933]  __driver_probe_device+0xb0/0x178
[    6.235939]  driver_probe_device+0x48/0x22c
[    6.235944]  __driver_attach+0xf4/0x24c
[    6.235949]  bus_for_each_dev+0x88/0xd0
[    6.235954]  driver_attach+0x30/0x3c
[    6.235959]  bus_add_driver+0x110/0x220
[    6.235964]  driver_register+0x84/0x120
[    6.235970]  __platform_driver_register+0x2c/0x38
[    6.235976]  init_module+0x2c/0xfe8 [spi_geni_qcom]
[    6.235988]  do_one_initcall+0xe0/0x2f8
[    6.235996]  do_init_module+0x58/0x1d8
[    6.236003]  load_module+0x15b4/0x1858
[    6.236009]  __arm64_sys_finit_module+0xd4/0x14c
[    6.236014]  invoke_syscall+0x4c/0x110
[    6.236021]  el0_svc_common+0xd0/0x118
[    6.236027]  do_el0_svc+0x30/0x98
[    6.236032]  el0_svc+0x30/0x60
[    6.236039]  el0t_64_sync_handler+0x84/0xf0
[    6.236044]  el0t_64_sync+0x18c/0x190
[    6.236048] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 7

Home

[  132.541997] ==================================================================
[  132.543518] BUG: KASAN: double-free in kfree_sensitive+0x88/0xa4
[  132.545536] Free of addr ffff0000c5a7a200 by task kunit_try_catch/168
[  132.547038] 
[  132.547629] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.549886] Hardware name: linux,dummy-virt (DT)
[  132.550865] Call trace:
[  132.551358]  dump_backtrace+0xf8/0x118
[  132.552802]  show_stack+0x18/0x24
[  132.554107]  dump_stack_lvl+0x64/0x7c
[  132.555354]  print_report+0x144/0x6a8
[  132.556384]  kasan_report_invalid_free+0x9c/0x13c
[  132.557819]  ____kasan_slab_free+0x108/0x140
[  132.559268]  __kasan_slab_free+0x18/0x28
[  132.560766]  __kmem_cache_free+0xdc/0x284
[  132.562166]  kfree_sensitive+0x88/0xa4
[  132.563451]  kmalloc_double_kzfree+0xa4/0x144
[  132.564509]  kunit_try_run_case+0x80/0x184
[  132.566199]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.567904]  kthread+0x16c/0x21c
[  132.569327]  ret_from_fork+0x10/0x20
[  132.570368] 
[  132.570946] Allocated by task 168:
[  132.572047]  kasan_set_track+0x4c/0x80
[  132.573284]  kasan_save_alloc_info+0x28/0x34
[  132.574569]  __kasan_kmalloc+0x88/0xa0
[  132.576213]  kmalloc_trace+0x54/0x68
[  132.577410]  kmalloc_double_kzfree+0x48/0x144
[  132.578717]  kunit_try_run_case+0x80/0x184
[  132.580442]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.581897]  kthread+0x16c/0x21c
[  132.583013]  ret_from_fork+0x10/0x20
[  132.584200] 
[  132.584674] Freed by task 168:
[  132.585683]  kasan_set_track+0x4c/0x80
[  132.587002]  kasan_save_free_info+0x3c/0x60
[  132.588772]  ____kasan_slab_free+0xe8/0x140
[  132.590244]  __kasan_slab_free+0x18/0x28
[  132.591549]  __kmem_cache_free+0xdc/0x284
[  132.592770]  kfree_sensitive+0x88/0xa4
[  132.594152]  kmalloc_double_kzfree+0x90/0x144
[  132.595495]  kunit_try_run_case+0x80/0x184
[  132.597304]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.598898]  kthread+0x16c/0x21c
[  132.600051]  ret_from_fork+0x10/0x20
[  132.601033] 
[  132.601632] The buggy address belongs to the object at ffff0000c5a7a200
[  132.601632]  which belongs to the cache kmalloc-128 of size 128
[  132.603792] The buggy address is located 0 bytes inside of
[  132.603792]  128-byte region [ffff0000c5a7a200, ffff0000c5a7a280)
[  132.606521] 
[  132.607513] The buggy address belongs to the physical page:
[  132.609090] page:00000000b107010f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[  132.611034] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.612694] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.614679] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.616603] page dumped because: kasan: bad access detected
[  132.618165] 
[  132.618830] Memory state around the buggy address:
[  132.620687]  ffff0000c5a7a100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.622228]  ffff0000c5a7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.623816] >ffff0000c5a7a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.625265]                    ^
[  132.626811]  ffff0000c5a7a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.628284]  ffff0000c5a7a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.630010] ==================================================================

test log snippet boot parser 8

Home

[  130.194730] ==================================================================
[  130.196922] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8
[  130.198571] Free of addr ffff0000c5a38000 by task kunit_try_catch/160
[  130.199981] 
[  130.200572] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.202350] Hardware name: linux,dummy-virt (DT)
[  130.203357] Call trace:
[  130.204252]  dump_backtrace+0xf8/0x118
[  130.205512]  show_stack+0x18/0x24
[  130.206683]  dump_stack_lvl+0x64/0x7c
[  130.208033]  print_report+0x144/0x6a8
[  130.209275]  kasan_report_invalid_free+0x9c/0x13c
[  130.211071]  ____kasan_slab_free+0x108/0x140
[  130.212291]  __kasan_slab_free+0x18/0x28
[  130.213416]  kmem_cache_free+0xe0/0x358
[  130.214634]  kmem_cache_double_free+0xbc/0x1b8
[  130.216127]  kunit_try_run_case+0x80/0x184
[  130.217992]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.219614]  kthread+0x16c/0x21c
[  130.220787]  ret_from_fork+0x10/0x20
[  130.221970] 
[  130.222550] Allocated by task 160:
[  130.223511]  kasan_set_track+0x4c/0x80
[  130.224516]  kasan_save_alloc_info+0x28/0x34
[  130.225874]  __kasan_slab_alloc+0x58/0x70
[  130.227269]  slab_post_alloc_hook+0x70/0x2f8
[  130.228592]  kmem_cache_alloc+0x168/0x260
[  130.229860]  kmem_cache_double_free+0x90/0x1b8
[  130.231287]  kunit_try_run_case+0x80/0x184
[  130.232766]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.234516]  kthread+0x16c/0x21c
[  130.235743]  ret_from_fork+0x10/0x20
[  130.236870] 
[  130.237469] Freed by task 160:
[  130.238357]  kasan_set_track+0x4c/0x80
[  130.239459]  kasan_save_free_info+0x3c/0x60
[  130.240709]  ____kasan_slab_free+0xe8/0x140
[  130.241900]  __kasan_slab_free+0x18/0x28
[  130.243371]  kmem_cache_free+0xe0/0x358
[  130.244632]  kmem_cache_double_free+0xa4/0x1b8
[  130.246007]  kunit_try_run_case+0x80/0x184
[  130.247317]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.248754]  kthread+0x16c/0x21c
[  130.250105]  ret_from_fork+0x10/0x20
[  130.251339] 
[  130.251978] The buggy address belongs to the object at ffff0000c5a38000
[  130.251978]  which belongs to the cache test_cache of size 200
[  130.254301] The buggy address is located 0 bytes inside of
[  130.254301]  200-byte region [ffff0000c5a38000, ffff0000c5a380c8)
[  130.257230] 
[  130.257690] The buggy address belongs to the physical page:
[  130.259264] page:000000009afcfaf4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a38
[  130.261199] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.263018] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c57b2000
[  130.265082] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  130.266763] page dumped because: kasan: bad access detected
[  130.268071] 
[  130.268459] Memory state around the buggy address:
[  130.270033]  ffff0000c5a37f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.271661]  ffff0000c5a37f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.273197] >ffff0000c5a38000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.274698]                    ^
[  130.275716]  ffff0000c5a38080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  130.277280]  ffff0000c5a38100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.278835] ==================================================================

test log snippet boot parser 9

Home

[  129.776295] ==================================================================
[  129.778316] BUG: KASAN: global-out-of-bounds in kasan_global_oob_left+0x50/0xf4
[  129.780055] Read of size 1 at addr ffffb437ba6be5bd by task kunit_try_catch/154
[  129.781900] 
[  129.782683] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.785086] Hardware name: linux,dummy-virt (DT)
[  129.786412] Call trace:
[  129.787109]  dump_backtrace+0xf8/0x118
[  129.788237]  show_stack+0x18/0x24
[  129.789641]  dump_stack_lvl+0x64/0x7c
[  129.790805]  print_report+0x144/0x6a8
[  129.791983]  kasan_report+0xb0/0x160
[  129.793141]  __asan_load1+0x6c/0x70
[  129.794287]  kasan_global_oob_left+0x50/0xf4
[  129.795521]  kunit_try_run_case+0x80/0x184
[  129.796917]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.798512]  kthread+0x16c/0x21c
[  129.799774]  ret_from_fork+0x10/0x20
[  129.801197] 
[  129.802005] The buggy address belongs to the variable:
[  129.803271]  resource+0x5d/0x60
[  129.804328] 
[  129.804802] The buggy address belongs to the virtual mapping at
[  129.804802]  [ffffb437b9610000, ffffb437ba741000) created by:
[  129.804802]  map_kernel+0x1b4/0x330
[  129.808557] 
[  129.809565] The buggy address belongs to the physical page:
[  129.810933] page:00000000f0bf7617 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cbe
[  129.813064] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  129.814411] raw: 03fffc0000001000 fffffc00000f2f88 fffffc00000f2f88 0000000000000000
[  129.816083] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  129.817733] page dumped because: kasan: bad access detected
[  129.818970] 
[  129.819471] Memory state around the buggy address:
[  129.821213]  ffffb437ba6be480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[  129.822771]  ffffb437ba6be500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[  129.824332] >ffffb437ba6be580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[  129.825983]                                         ^
[  129.827404]  ffffb437ba6be600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.829080]  ffffb437ba6be680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.830496] ==================================================================

test log snippet boot parser 10

Home

[  129.717472] ==================================================================
[  129.719475] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0
[  129.721273] Read of size 1 at addr ffffb437ba6be5cd by task kunit_try_catch/153
[  129.722795] 
[  129.723382] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.725185] Hardware name: linux,dummy-virt (DT)
[  129.726267] Call trace:
[  129.726954]  dump_backtrace+0xf8/0x118
[  129.728147]  show_stack+0x18/0x24
[  129.729289]  dump_stack_lvl+0x64/0x7c
[  129.730447]  print_report+0x144/0x6a8
[  129.731523]  kasan_report+0xb0/0x160
[  129.732610]  __asan_load1+0x6c/0x70
[  129.733683]  kasan_global_oob_right+0x4c/0xf0
[  129.734914]  kunit_try_run_case+0x80/0x184
[  129.736193]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.737760]  kthread+0x16c/0x21c
[  129.738889]  ret_from_fork+0x10/0x20
[  129.739968] 
[  129.740658] The buggy address belongs to the variable:
[  129.741830]  global_array+0xd/0x20
[  129.742908] 
[  129.743514] The buggy address belongs to the virtual mapping at
[  129.743514]  [ffffb437b9610000, ffffb437ba741000) created by:
[  129.743514]  map_kernel+0x1b4/0x330
[  129.746328] 
[  129.747038] The buggy address belongs to the physical page:
[  129.748505] page:00000000f0bf7617 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cbe
[  129.750421] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  129.752608] raw: 03fffc0000001000 fffffc00000f2f88 fffffc00000f2f88 0000000000000000
[  129.754250] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  129.755728] page dumped because: kasan: bad access detected
[  129.756825] 
[  129.757419] Memory state around the buggy address:
[  129.758608]  ffffb437ba6be480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[  129.760138]  ffffb437ba6be500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[  129.761668] >ffffb437ba6be580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[  129.763088]                                               ^
[  129.764310]  ffffb437ba6be600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.765840]  ffffb437ba6be680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.767305] ==================================================================

test log snippet boot parser 11

Home

[  126.726083] ==================================================================
[  126.728143] BUG: KASAN: invalid-free in kfree+0x70/0x74
[  126.729637] Free of addr ffff0000c59f0001 by task kunit_try_catch/126
[  126.730672] 
[  126.731300] CPU: 1 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.733048] Hardware name: linux,dummy-virt (DT)
[  126.734044] Call trace:
[  126.735212]  dump_backtrace+0xf8/0x118
[  126.736963]  show_stack+0x18/0x24
[  126.738330]  dump_stack_lvl+0x64/0x7c
[  126.739539]  print_report+0x144/0x6a8
[  126.740906]  kasan_report_invalid_free+0x9c/0x13c
[  126.742394]  __kasan_kfree_large+0x6c/0x7c
[  126.743694]  free_large_kmalloc+0x60/0xe8
[  126.744840]  kfree+0x70/0x74
[  126.746059]  kmalloc_pagealloc_invalid_free+0x80/0x120
[  126.747612]  kunit_try_run_case+0x80/0x184
[  126.748901]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.750551]  kthread+0x16c/0x21c
[  126.751660]  ret_from_fork+0x10/0x20
[  126.752837] 
[  126.753278] The buggy address belongs to the physical page:
[  126.754445] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  126.757441] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  126.759147] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.761226] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.763173] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.764915] page dumped because: kasan: bad access detected
[  126.766033] 
[  126.766659] Memory state around the buggy address:
[  126.767861]  ffff0000c59eff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.769403]  ffff0000c59eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.771521] >ffff0000c59f0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.773424]                    ^
[  126.774266]  ffff0000c59f0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.776050]  ffff0000c59f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.777763] ==================================================================

test log snippet boot parser 12

Home

[  130.304183] ==================================================================
[  130.306597] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8
[  130.308211] Free of addr ffff0000c5a64001 by task kunit_try_catch/161
[  130.310381] 
[  130.311101] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.312933] Hardware name: linux,dummy-virt (DT)
[  130.314047] Call trace:
[  130.314809]  dump_backtrace+0xf8/0x118
[  130.315851]  show_stack+0x18/0x24
[  130.316489]  dump_stack_lvl+0x64/0x7c
[  130.317139]  print_report+0x144/0x6a8
[  130.318504]  kasan_report_invalid_free+0x9c/0x13c
[  130.320630]  ____kasan_slab_free+0x108/0x140
[  130.321875]  __kasan_slab_free+0x18/0x28
[  130.323042]  kmem_cache_free+0xe0/0x358
[  130.324318]  kmem_cache_invalid_free+0xb0/0x1b8
[  130.325406]  kunit_try_run_case+0x80/0x184
[  130.326688]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.328188]  kthread+0x16c/0x21c
[  130.329336]  ret_from_fork+0x10/0x20
[  130.330497] 
[  130.331098] Allocated by task 161:
[  130.332071]  kasan_set_track+0x4c/0x80
[  130.333282]  kasan_save_alloc_info+0x28/0x34
[  130.334478]  __kasan_slab_alloc+0x58/0x70
[  130.335552]  slab_post_alloc_hook+0x70/0x2f8
[  130.337345]  kmem_cache_alloc+0x168/0x260
[  130.338516]  kmem_cache_invalid_free+0x90/0x1b8
[  130.339844]  kunit_try_run_case+0x80/0x184
[  130.341101]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.342555]  kthread+0x16c/0x21c
[  130.344165]  ret_from_fork+0x10/0x20
[  130.345418] 
[  130.346201] The buggy address belongs to the object at ffff0000c5a64000
[  130.346201]  which belongs to the cache test_cache of size 200
[  130.348392] The buggy address is located 1 bytes inside of
[  130.348392]  200-byte region [ffff0000c5a64000, ffff0000c5a640c8)
[  130.350593] 
[  130.351109] The buggy address belongs to the physical page:
[  130.353203] page:00000000c1122d4b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a64
[  130.355157] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.356928] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c15c5c80
[  130.358691] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  130.360263] page dumped because: kasan: bad access detected
[  130.362395] 
[  130.362966] Memory state around the buggy address:
[  130.364241]  ffff0000c5a63f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.365760]  ffff0000c5a63f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.367248] >ffff0000c5a64000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.369704]                    ^
[  130.370958]  ffff0000c5a64080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  130.372466]  ffff0000c5a64100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.373927] ==================================================================

test log snippet boot parser 13

Home

[  128.582698] ==================================================================
[  128.585166] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164
[  128.586986] Read of size 18446744073709551614 at addr ffff0000c58e6904 by task kunit_try_catch/142
[  128.589248] 
[  128.589933] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.591804] Hardware name: linux,dummy-virt (DT)
[  128.592912] Call trace:
[  128.593636]  dump_backtrace+0xf8/0x118
[  128.594794]  show_stack+0x18/0x24
[  128.596022]  dump_stack_lvl+0x64/0x7c
[  128.597167]  print_report+0x144/0x6a8
[  128.598320]  kasan_report+0xb0/0x160
[  128.599475]  kasan_check_range+0x260/0x2a0
[  128.600797]  memmove+0x48/0x90
[  128.601877]  kmalloc_memmove_negative_size+0xb4/0x164
[  128.603083]  kunit_try_run_case+0x80/0x184
[  128.604432]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.606240]  kthread+0x16c/0x21c
[  128.607370]  ret_from_fork+0x10/0x20
[  128.608466] 
[  128.609199] Allocated by task 142:
[  128.610141]  kasan_set_track+0x4c/0x80
[  128.611220]  kasan_save_alloc_info+0x28/0x34
[  128.612458]  __kasan_kmalloc+0x88/0xa0
[  128.613566]  kmalloc_trace+0x54/0x68
[  128.615008]  kmalloc_memmove_negative_size+0x48/0x164
[  128.616390]  kunit_try_run_case+0x80/0x184
[  128.617126]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.618721]  kthread+0x16c/0x21c
[  128.619867]  ret_from_fork+0x10/0x20
[  128.621042] 
[  128.621807] The buggy address belongs to the object at ffff0000c58e6900
[  128.621807]  which belongs to the cache kmalloc-128 of size 128
[  128.624130] The buggy address is located 4 bytes inside of
[  128.624130]  128-byte region [ffff0000c58e6900, ffff0000c58e6980)
[  128.626467] 
[  128.627064] The buggy address belongs to the physical page:
[  128.628351] page:00000000d0c29e4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e6
[  128.630238] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.631988] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.634059] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.635463] page dumped because: kasan: bad access detected
[  128.636920] 
[  128.637385] Memory state around the buggy address:
[  128.638609]  ffff0000c58e6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.639936]  ffff0000c58e6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.641119] >ffff0000c58e6900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  128.642715]                    ^
[  128.643348]  ffff0000c58e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.645757]  ffff0000c58e6a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.647249] ==================================================================

test log snippet boot parser 14

Home

[  131.636466] ==================================================================
[  131.637823] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb8c
[  131.639648] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.641189] 
[  131.641810] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.643638] Hardware name: linux,dummy-virt (DT)
[  131.644714] Call trace:
[  131.645415]  dump_backtrace+0xf8/0x118
[  131.646641]  show_stack+0x18/0x24
[  131.647746]  dump_stack_lvl+0x64/0x7c
[  131.648877]  print_report+0x144/0x6a8
[  131.649984]  kasan_report+0xb0/0x160
[  131.651053]  kasan_check_range+0x260/0x2a0
[  131.652180]  __kasan_check_write+0x2c/0x3c
[  131.653352]  kasan_bitops_generic+0x260/0xb8c
[  131.654635]  kunit_try_run_case+0x80/0x184
[  131.655860]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.657295]  kthread+0x16c/0x21c
[  131.658404]  ret_from_fork+0x10/0x20
[  131.659483] 
[  131.660037] Allocated by task 166:
[  131.660929]  kasan_set_track+0x4c/0x80
[  131.662032]  kasan_save_alloc_info+0x28/0x34
[  131.663246]  __kasan_kmalloc+0x88/0xa0
[  131.664327]  kmalloc_trace+0x54/0x68
[  131.665405]  kasan_bitops_generic+0x4c/0xb8c
[  131.666640]  kunit_try_run_case+0x80/0x184
[  131.667846]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.669300]  kthread+0x16c/0x21c
[  131.670402]  ret_from_fork+0x10/0x20
[  131.671472] 
[  131.671985] The buggy address belongs to the object at ffff0000c59d3b00
[  131.671985]  which belongs to the cache kmalloc-128 of size 128
[  131.674188] The buggy address is located 8 bytes inside of
[  131.674188]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.676415] 
[  131.676941] The buggy address belongs to the physical page:
[  131.678148] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.679950] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.681630] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.683228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.684765] page dumped because: kasan: bad access detected
[  131.685905] 
[  131.686390] Memory state around the buggy address:
[  131.687520]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.689030]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.690565] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.692014]                       ^
[  131.692957]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.694480]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.695907] ==================================================================
---
[  132.066566] ==================================================================
[  132.067999] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb8c
[  132.069705] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.071200] 
[  132.071798] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.073671] Hardware name: linux,dummy-virt (DT)
[  132.074764] Call trace:
[  132.075369]  dump_backtrace+0xf8/0x118
[  132.076673]  show_stack+0x18/0x24
[  132.077680]  dump_stack_lvl+0x64/0x7c
[  132.078645]  print_report+0x144/0x6a8
[  132.079543]  kasan_report+0xb0/0x160
[  132.080660]  kasan_check_range+0x260/0x2a0
[  132.081951]  __kasan_check_write+0x2c/0x3c
[  132.083176]  kasan_bitops_generic+0x458/0xb8c
[  132.083910]  kunit_try_run_case+0x80/0x184
[  132.084692]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.086418]  kthread+0x16c/0x21c
[  132.087505]  ret_from_fork+0x10/0x20
[  132.088659] 
[  132.089236] Allocated by task 166:
[  132.090273]  kasan_set_track+0x4c/0x80
[  132.091402]  kasan_save_alloc_info+0x28/0x34
[  132.092610]  __kasan_kmalloc+0x88/0xa0
[  132.093661]  kmalloc_trace+0x54/0x68
[  132.094786]  kasan_bitops_generic+0x4c/0xb8c
[  132.096122]  kunit_try_run_case+0x80/0x184
[  132.097364]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.098826]  kthread+0x16c/0x21c
[  132.099969]  ret_from_fork+0x10/0x20
[  132.101087] 
[  132.101694] The buggy address belongs to the object at ffff0000c59d3b00
[  132.101694]  which belongs to the cache kmalloc-128 of size 128
[  132.104041] The buggy address is located 8 bytes inside of
[  132.104041]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.106303] 
[  132.106937] The buggy address belongs to the physical page:
[  132.108156] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.110069] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.111774] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.113456] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.114982] page dumped because: kasan: bad access detected
[  132.116195] 
[  132.116773] Memory state around the buggy address:
[  132.117965]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.119483]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.121023] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.122561]                       ^
[  132.123519]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.125058]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.126487] ==================================================================
---
[  131.820961] ==================================================================
[  131.822242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb8c
[  131.823730] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.825376] 
[  131.826009] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.827870] Hardware name: linux,dummy-virt (DT)
[  131.828656] Call trace:
[  131.829180]  dump_backtrace+0xf8/0x118
[  131.830933]  show_stack+0x18/0x24
[  131.832092]  dump_stack_lvl+0x64/0x7c
[  131.833355]  print_report+0x144/0x6a8
[  131.834472]  kasan_report+0xb0/0x160
[  131.835560]  kasan_check_range+0x260/0x2a0
[  131.836718]  __kasan_check_write+0x2c/0x3c
[  131.837928]  kasan_bitops_generic+0x350/0xb8c
[  131.839184]  kunit_try_run_case+0x80/0x184
[  131.840417]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.841902]  kthread+0x16c/0x21c
[  131.842991]  ret_from_fork+0x10/0x20
[  131.844069] 
[  131.844514] Allocated by task 166:
[  131.845488]  kasan_set_track+0x4c/0x80
[  131.846597]  kasan_save_alloc_info+0x28/0x34
[  131.847784]  __kasan_kmalloc+0x88/0xa0
[  131.848836]  kmalloc_trace+0x54/0x68
[  131.849989]  kasan_bitops_generic+0x4c/0xb8c
[  131.851207]  kunit_try_run_case+0x80/0x184
[  131.852414]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.853873]  kthread+0x16c/0x21c
[  131.854980]  ret_from_fork+0x10/0x20
[  131.856048] 
[  131.856552] The buggy address belongs to the object at ffff0000c59d3b00
[  131.856552]  which belongs to the cache kmalloc-128 of size 128
[  131.858718] The buggy address is located 8 bytes inside of
[  131.858718]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.860855] 
[  131.861361] The buggy address belongs to the physical page:
[  131.862563] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.864500] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.866334] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.868066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.869603] page dumped because: kasan: bad access detected
[  131.870833] 
[  131.871415] Memory state around the buggy address:
[  131.872674]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.874299]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.875879] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.877365]                       ^
[  131.878315]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.880018]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.881459] ==================================================================
---
[  132.190333] ==================================================================
[  132.191819] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb8c
[  132.193612] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.195129] 
[  132.195679] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.197523] Hardware name: linux,dummy-virt (DT)
[  132.198626] Call trace:
[  132.199319]  dump_backtrace+0xf8/0x118
[  132.200490]  show_stack+0x18/0x24
[  132.201613]  dump_stack_lvl+0x64/0x7c
[  132.202720]  print_report+0x144/0x6a8
[  132.203816]  kasan_report+0xb0/0x160
[  132.204902]  kasan_check_range+0x260/0x2a0
[  132.206064]  __kasan_check_write+0x2c/0x3c
[  132.207253]  kasan_bitops_generic+0x4fc/0xb8c
[  132.208517]  kunit_try_run_case+0x80/0x184
[  132.209767]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.211197]  kthread+0x16c/0x21c
[  132.212288]  ret_from_fork+0x10/0x20
[  132.213359] 
[  132.213923] Allocated by task 166:
[  132.214811]  kasan_set_track+0x4c/0x80
[  132.215869]  kasan_save_alloc_info+0x28/0x34
[  132.217085]  __kasan_kmalloc+0x88/0xa0
[  132.218187]  kmalloc_trace+0x54/0x68
[  132.219306]  kasan_bitops_generic+0x4c/0xb8c
[  132.220532]  kunit_try_run_case+0x80/0x184
[  132.221779]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.223207]  kthread+0x16c/0x21c
[  132.224287]  ret_from_fork+0x10/0x20
[  132.225380] 
[  132.225951] The buggy address belongs to the object at ffff0000c59d3b00
[  132.225951]  which belongs to the cache kmalloc-128 of size 128
[  132.228164] The buggy address is located 8 bytes inside of
[  132.228164]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.230431] 
[  132.231013] The buggy address belongs to the physical page:
[  132.232226] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.234085] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.235765] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.237382] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.238910] page dumped because: kasan: bad access detected
[  132.240052] 
[  132.240530] Memory state around the buggy address:
[  132.241716]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.243217]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.244743] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.246194]                       ^
[  132.247118]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.248610]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.250052] ==================================================================
---
[  131.310432] ==================================================================
[  131.311761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb8c
[  131.313475] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.315134] 
[  131.315703] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.317281] Hardware name: linux,dummy-virt (DT)
[  131.318749] Call trace:
[  131.319943]  dump_backtrace+0xf8/0x118
[  131.321233]  show_stack+0x18/0x24
[  131.322532]  dump_stack_lvl+0x64/0x7c
[  131.323761]  print_report+0x144/0x6a8
[  131.324878]  kasan_report+0xb0/0x160
[  131.326003]  kasan_check_range+0x260/0x2a0
[  131.327175]  __kasan_check_write+0x2c/0x3c
[  131.328394]  kasan_bitops_generic+0x14c/0xb8c
[  131.329696]  kunit_try_run_case+0x80/0x184
[  131.330730]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.332187]  kthread+0x16c/0x21c
[  131.333303]  ret_from_fork+0x10/0x20
[  131.334433] 
[  131.334980] Allocated by task 166:
[  131.335848]  kasan_set_track+0x4c/0x80
[  131.336900]  kasan_save_alloc_info+0x28/0x34
[  131.338103]  __kasan_kmalloc+0x88/0xa0
[  131.339202]  kmalloc_trace+0x54/0x68
[  131.340315]  kasan_bitops_generic+0x4c/0xb8c
[  131.341532]  kunit_try_run_case+0x80/0x184
[  131.342805]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.344221]  kthread+0x16c/0x21c
[  131.345303]  ret_from_fork+0x10/0x20
[  131.346374] 
[  131.346887] The buggy address belongs to the object at ffff0000c59d3b00
[  131.346887]  which belongs to the cache kmalloc-128 of size 128
[  131.349098] The buggy address is located 8 bytes inside of
[  131.349098]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.351277] 
[  131.351720] The buggy address belongs to the physical page:
[  131.352299] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.353987] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.355712] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.357348] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.358855] page dumped because: kasan: bad access detected
[  131.360055] 
[  131.360601] Memory state around the buggy address:
[  131.361720]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.363226]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.364744] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.366206]                       ^
[  131.367165]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.368658]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.370146] ==================================================================
---
[  131.442056] ==================================================================
[  131.443382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb8c
[  131.444878] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.446902] 
[  131.447641] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.449711] Hardware name: linux,dummy-virt (DT)
[  131.450806] Call trace:
[  131.451606]  dump_backtrace+0xf8/0x118
[  131.453059]  show_stack+0x18/0x24
[  131.454322]  dump_stack_lvl+0x64/0x7c
[  131.455594]  print_report+0x144/0x6a8
[  131.456756]  kasan_report+0xb0/0x160
[  131.457971]  kasan_check_range+0x260/0x2a0
[  131.459202]  __kasan_check_write+0x2c/0x3c
[  131.460534]  kasan_bitops_generic+0x1f0/0xb8c
[  131.462126]  kunit_try_run_case+0x80/0x184
[  131.463379]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.464982]  kthread+0x16c/0x21c
[  131.466138]  ret_from_fork+0x10/0x20
[  131.467251] 
[  131.467924] Allocated by task 166:
[  131.468957]  kasan_set_track+0x4c/0x80
[  131.470880]  kasan_save_alloc_info+0x28/0x34
[  131.472168]  __kasan_kmalloc+0x88/0xa0
[  131.473050]  kmalloc_trace+0x54/0x68
[  131.474306]  kasan_bitops_generic+0x4c/0xb8c
[  131.475606]  kunit_try_run_case+0x80/0x184
[  131.476643]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.478496]  kthread+0x16c/0x21c
[  131.479694]  ret_from_fork+0x10/0x20
[  131.480833] 
[  131.481452] The buggy address belongs to the object at ffff0000c59d3b00
[  131.481452]  which belongs to the cache kmalloc-128 of size 128
[  131.483868] The buggy address is located 8 bytes inside of
[  131.483868]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.487188] 
[  131.487860] The buggy address belongs to the physical page:
[  131.489091] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.491005] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.492832] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.494892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.496922] page dumped because: kasan: bad access detected
[  131.498195] 
[  131.498776] Memory state around the buggy address:
[  131.499977]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.501543]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.503835] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.505473]                       ^
[  131.506528]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.508051]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.509678] ==================================================================
---
[  131.698271] ==================================================================
[  131.699992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb8c
[  131.701695] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.703190] 
[  131.703738] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.705546] Hardware name: linux,dummy-virt (DT)
[  131.706630] Call trace:
[  131.707305]  dump_backtrace+0xf8/0x118
[  131.708533]  show_stack+0x18/0x24
[  131.709660]  dump_stack_lvl+0x64/0x7c
[  131.710764]  print_report+0x144/0x6a8
[  131.711813]  kasan_report+0xb0/0x160
[  131.712873]  kasan_check_range+0x260/0x2a0
[  131.714051]  __kasan_check_write+0x2c/0x3c
[  131.715206]  kasan_bitops_generic+0x2ac/0xb8c
[  131.716424]  kunit_try_run_case+0x80/0x184
[  131.717724]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.719164]  kthread+0x16c/0x21c
[  131.720252]  ret_from_fork+0x10/0x20
[  131.721350] 
[  131.721895] Allocated by task 166:
[  131.722864]  kasan_set_track+0x4c/0x80
[  131.723958]  kasan_save_alloc_info+0x28/0x34
[  131.725146]  __kasan_kmalloc+0x88/0xa0
[  131.726232]  kmalloc_trace+0x54/0x68
[  131.727350]  kasan_bitops_generic+0x4c/0xb8c
[  131.728554]  kunit_try_run_case+0x80/0x184
[  131.729806]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.731236]  kthread+0x16c/0x21c
[  131.732317]  ret_from_fork+0x10/0x20
[  131.733402] 
[  131.733894] The buggy address belongs to the object at ffff0000c59d3b00
[  131.733894]  which belongs to the cache kmalloc-128 of size 128
[  131.736143] The buggy address is located 8 bytes inside of
[  131.736143]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.738290] 
[  131.738895] The buggy address belongs to the physical page:
[  131.740091] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.741928] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.743612] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.745248] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.746746] page dumped because: kasan: bad access detected
[  131.747895] 
[  131.748414] Memory state around the buggy address:
[  131.749518]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.751028]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.752529] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.753979]                       ^
[  131.754890]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.756408]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.757906] ==================================================================
---
[  131.944409] ==================================================================
[  131.945981] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb8c
[  131.947692] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.949141] 
[  131.949750] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.951670] Hardware name: linux,dummy-virt (DT)
[  131.952694] Call trace:
[  131.953401]  dump_backtrace+0xf8/0x118
[  131.954629]  show_stack+0x18/0x24
[  131.955709]  dump_stack_lvl+0x64/0x7c
[  131.956846]  print_report+0x144/0x6a8
[  131.957888]  kasan_report+0xb0/0x160
[  131.958957]  kasan_check_range+0x260/0x2a0
[  131.960078]  __kasan_check_write+0x2c/0x3c
[  131.961230]  kasan_bitops_generic+0x3f4/0xb8c
[  131.962452]  kunit_try_run_case+0x80/0x184
[  131.963662]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.965088]  kthread+0x16c/0x21c
[  131.966178]  ret_from_fork+0x10/0x20
[  131.967269] 
[  131.967784] Allocated by task 166:
[  131.968698]  kasan_set_track+0x4c/0x80
[  131.969796]  kasan_save_alloc_info+0x28/0x34
[  131.970990]  __kasan_kmalloc+0x88/0xa0
[  131.972067]  kmalloc_trace+0x54/0x68
[  131.973176]  kasan_bitops_generic+0x4c/0xb8c
[  131.974395]  kunit_try_run_case+0x80/0x184
[  131.975615]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.977022]  kthread+0x16c/0x21c
[  131.978119]  ret_from_fork+0x10/0x20
[  131.979168] 
[  131.979719] The buggy address belongs to the object at ffff0000c59d3b00
[  131.979719]  which belongs to the cache kmalloc-128 of size 128
[  131.981930] The buggy address is located 8 bytes inside of
[  131.981930]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.984094] 
[  131.984713] The buggy address belongs to the physical page:
[  131.985948] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.987743] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.989371] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.990989] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.992474] page dumped because: kasan: bad access detected
[  131.993633] 
[  131.994135] Memory state around the buggy address:
[  131.995269]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.996769]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.998354] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.999769]                       ^
[  132.000726]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.002254]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.003672] ==================================================================
---
[  131.180801] ==================================================================
[  131.182987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb8c
[  131.184798] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.186286] 
[  131.186867] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.188680] Hardware name: linux,dummy-virt (DT)
[  131.189822] Call trace:
[  131.190609]  dump_backtrace+0xf8/0x118
[  131.191808]  show_stack+0x18/0x24
[  131.192941]  dump_stack_lvl+0x64/0x7c
[  131.194107]  print_report+0x144/0x6a8
[  131.195210]  kasan_report+0xb0/0x160
[  131.196331]  kasan_check_range+0x260/0x2a0
[  131.197490]  __kasan_check_write+0x2c/0x3c
[  131.198739]  kasan_bitops_generic+0xa8/0xb8c
[  131.200038]  kunit_try_run_case+0x80/0x184
[  131.201318]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.202850]  kthread+0x16c/0x21c
[  131.203977]  ret_from_fork+0x10/0x20
[  131.205107] 
[  131.205739] Allocated by task 166:
[  131.206661]  kasan_set_track+0x4c/0x80
[  131.207768]  kasan_save_alloc_info+0x28/0x34
[  131.209031]  __kasan_kmalloc+0x88/0xa0
[  131.210209]  kmalloc_trace+0x54/0x68
[  131.211374]  kasan_bitops_generic+0x4c/0xb8c
[  131.212655]  kunit_try_run_case+0x80/0x184
[  131.213955]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.215397]  kthread+0x16c/0x21c
[  131.216645]  ret_from_fork+0x10/0x20
[  131.217653] 
[  131.218320] The buggy address belongs to the object at ffff0000c59d3b00
[  131.218320]  which belongs to the cache kmalloc-128 of size 128
[  131.220661] The buggy address is located 8 bytes inside of
[  131.220661]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.222730] 
[  131.223054] The buggy address belongs to the physical page:
[  131.223667] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.225818] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.227857] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.229514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.231050] page dumped because: kasan: bad access detected
[  131.232342] 
[  131.232924] Memory state around the buggy address:
[  131.234132]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.235691]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.237246] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.238697]                       ^
[  131.239735]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.241307]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.242791] ==================================================================
---
[  131.514371] ==================================================================
[  131.515781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb8c
[  131.517509] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.518985] 
[  131.519490] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.521353] Hardware name: linux,dummy-virt (DT)
[  131.522385] Call trace:
[  131.523094]  dump_backtrace+0xf8/0x118
[  131.524263]  show_stack+0x18/0x24
[  131.525362]  dump_stack_lvl+0x64/0x7c
[  131.526474]  print_report+0x144/0x6a8
[  131.527604]  kasan_report+0xb0/0x160
[  131.528659]  kasan_check_range+0x260/0x2a0
[  131.529820]  __kasan_check_write+0x2c/0x3c
[  131.531021]  kasan_bitops_generic+0x244/0xb8c
[  131.532294]  kunit_try_run_case+0x80/0x184
[  131.533518]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.534970]  kthread+0x16c/0x21c
[  131.536104]  ret_from_fork+0x10/0x20
[  131.537193] 
[  131.537754] Allocated by task 166:
[  131.538618]  kasan_set_track+0x4c/0x80
[  131.539706]  kasan_save_alloc_info+0x28/0x34
[  131.540900]  __kasan_kmalloc+0x88/0xa0
[  131.541985]  kmalloc_trace+0x54/0x68
[  131.543083]  kasan_bitops_generic+0x4c/0xb8c
[  131.544314]  kunit_try_run_case+0x80/0x184
[  131.545525]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.546980]  kthread+0x16c/0x21c
[  131.548049]  ret_from_fork+0x10/0x20
[  131.549166] 
[  131.549711] The buggy address belongs to the object at ffff0000c59d3b00
[  131.549711]  which belongs to the cache kmalloc-128 of size 128
[  131.551978] The buggy address is located 8 bytes inside of
[  131.551978]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.554147] 
[  131.554740] The buggy address belongs to the physical page:
[  131.555984] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.557813] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.559249] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.560889] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.562399] page dumped because: kasan: bad access detected
[  131.563511] 
[  131.564019] Memory state around the buggy address:
[  131.565154]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.566680]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.568217] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.569648]                       ^
[  131.570546]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.572058]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.573489] ==================================================================
---
[  132.376669] ==================================================================
[  132.378321] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb8c
[  132.380152] Write of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.381474] 
[  132.382133] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.384198] Hardware name: linux,dummy-virt (DT)
[  132.385272] Call trace:
[  132.386042]  dump_backtrace+0xf8/0x118
[  132.387215]  show_stack+0x18/0x24
[  132.388349]  dump_stack_lvl+0x64/0x7c
[  132.389498]  print_report+0x144/0x6a8
[  132.390623]  kasan_report+0xb0/0x160
[  132.391679]  kasan_check_range+0x260/0x2a0
[  132.392872]  __kasan_check_write+0x2c/0x3c
[  132.394059]  kasan_bitops_generic+0x5f4/0xb8c
[  132.395287]  kunit_try_run_case+0x80/0x184
[  132.396498]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.398023]  kthread+0x16c/0x21c
[  132.399153]  ret_from_fork+0x10/0x20
[  132.400279] 
[  132.400844] Allocated by task 166:
[  132.401809]  kasan_set_track+0x4c/0x80
[  132.402895]  kasan_save_alloc_info+0x28/0x34
[  132.404092]  __kasan_kmalloc+0x88/0xa0
[  132.405167]  kmalloc_trace+0x54/0x68
[  132.406300]  kasan_bitops_generic+0x4c/0xb8c
[  132.407534]  kunit_try_run_case+0x80/0x184
[  132.408811]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.410281]  kthread+0x16c/0x21c
[  132.411384]  ret_from_fork+0x10/0x20
[  132.412476] 
[  132.413012] The buggy address belongs to the object at ffff0000c59d3b00
[  132.413012]  which belongs to the cache kmalloc-128 of size 128
[  132.415163] The buggy address is located 8 bytes inside of
[  132.415163]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.417250] 
[  132.417961] The buggy address belongs to the physical page:
[  132.419180] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.421043] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.422741] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.424419] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.425954] page dumped because: kasan: bad access detected
[  132.427141] 
[  132.427654] Memory state around the buggy address:
[  132.428835]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.430395]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.431941] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.433395]                       ^
[  132.434377]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.435880]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.437277] ==================================================================

test log snippet boot parser 15

Home

[  131.373613] ==================================================================
[  131.374943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb8c
[  131.376681] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.378624] 
[  131.379285] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.381307] Hardware name: linux,dummy-virt (DT)
[  131.383115] Call trace:
[  131.384200]  dump_backtrace+0xf8/0x118
[  131.385505]  show_stack+0x18/0x24
[  131.386826]  dump_stack_lvl+0x64/0x7c
[  131.388424]  print_report+0x144/0x6a8
[  131.390155]  kasan_report+0xb0/0x160
[  131.391314]  __asan_load8+0xa8/0xac
[  131.392399]  kasan_bitops_generic+0x19c/0xb8c
[  131.393720]  kunit_try_run_case+0x80/0x184
[  131.395040]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.397311]  kthread+0x16c/0x21c
[  131.398430]  ret_from_fork+0x10/0x20
[  131.399501] 
[  131.400025] Allocated by task 166:
[  131.400940]  kasan_set_track+0x4c/0x80
[  131.402043]  kasan_save_alloc_info+0x28/0x34
[  131.403208]  __kasan_kmalloc+0x88/0xa0
[  131.404370]  kmalloc_trace+0x54/0x68
[  131.405408]  kasan_bitops_generic+0x4c/0xb8c
[  131.406503]  kunit_try_run_case+0x80/0x184
[  131.407745]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.409208]  kthread+0x16c/0x21c
[  131.410312]  ret_from_fork+0x10/0x20
[  131.411396] 
[  131.412848] The buggy address belongs to the object at ffff0000c59d3b00
[  131.412848]  which belongs to the cache kmalloc-128 of size 128
[  131.415232] The buggy address is located 8 bytes inside of
[  131.415232]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.417334] 
[  131.417955] The buggy address belongs to the physical page:
[  131.419227] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.420950] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.423195] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.424747] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.426254] page dumped because: kasan: bad access detected
[  131.427419] 
[  131.427894] Memory state around the buggy address:
[  131.429049]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.430655]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.432778] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.434250]                       ^
[  131.435177]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.436926]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.438984] ==================================================================
---
[  131.245782] ==================================================================
[  131.247150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb8c
[  131.248853] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.250534] 
[  131.251145] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.253169] Hardware name: linux,dummy-virt (DT)
[  131.254807] Call trace:
[  131.255641]  dump_backtrace+0xf8/0x118
[  131.256981]  show_stack+0x18/0x24
[  131.258182]  dump_stack_lvl+0x64/0x7c
[  131.259355]  print_report+0x144/0x6a8
[  131.260503]  kasan_report+0xb0/0x160
[  131.261666]  __asan_load8+0xa8/0xac
[  131.262795]  kasan_bitops_generic+0xf8/0xb8c
[  131.264077]  kunit_try_run_case+0x80/0x184
[  131.265340]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.266810]  kthread+0x16c/0x21c
[  131.267927]  ret_from_fork+0x10/0x20
[  131.269028] 
[  131.269524] Allocated by task 166:
[  131.270466]  kasan_set_track+0x4c/0x80
[  131.271562]  kasan_save_alloc_info+0x28/0x34
[  131.272790]  __kasan_kmalloc+0x88/0xa0
[  131.273901]  kmalloc_trace+0x54/0x68
[  131.275007]  kasan_bitops_generic+0x4c/0xb8c
[  131.276182]  kunit_try_run_case+0x80/0x184
[  131.277407]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.278866]  kthread+0x16c/0x21c
[  131.279968]  ret_from_fork+0x10/0x20
[  131.281016] 
[  131.281532] The buggy address belongs to the object at ffff0000c59d3b00
[  131.281532]  which belongs to the cache kmalloc-128 of size 128
[  131.283768] The buggy address is located 8 bytes inside of
[  131.283768]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.285971] 
[  131.286465] The buggy address belongs to the physical page:
[  131.287764] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.289566] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.291393] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.293129] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.294628] page dumped because: kasan: bad access detected
[  131.295828] 
[  131.296387] Memory state around the buggy address:
[  131.297678]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.299218]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.300771] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.302228]                       ^
[  131.303209]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.304793]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.306243] ==================================================================
---
[  132.313888] ==================================================================
[  132.315310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb8c
[  132.317053] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.318610] 
[  132.319263] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.321081] Hardware name: linux,dummy-virt (DT)
[  132.322116] Call trace:
[  132.322770]  dump_backtrace+0xf8/0x118
[  132.323928]  show_stack+0x18/0x24
[  132.325084]  dump_stack_lvl+0x64/0x7c
[  132.326544]  print_report+0x144/0x6a8
[  132.327698]  kasan_report+0xb0/0x160
[  132.328816]  __asan_load8+0xa8/0xac
[  132.329928]  kasan_bitops_generic+0x59c/0xb8c
[  132.331182]  kunit_try_run_case+0x80/0x184
[  132.332407]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.333891]  kthread+0x16c/0x21c
[  132.335062]  ret_from_fork+0x10/0x20
[  132.336177] 
[  132.336722] Allocated by task 166:
[  132.337701]  kasan_set_track+0x4c/0x80
[  132.338786]  kasan_save_alloc_info+0x28/0x34
[  132.340943]  __kasan_kmalloc+0x88/0xa0
[  132.341988]  kmalloc_trace+0x54/0x68
[  132.343137]  kasan_bitops_generic+0x4c/0xb8c
[  132.344392]  kunit_try_run_case+0x80/0x184
[  132.345684]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.347150]  kthread+0x16c/0x21c
[  132.348263]  ret_from_fork+0x10/0x20
[  132.349377] 
[  132.349931] The buggy address belongs to the object at ffff0000c59d3b00
[  132.349931]  which belongs to the cache kmalloc-128 of size 128
[  132.352111] The buggy address is located 8 bytes inside of
[  132.352111]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.354327] 
[  132.355011] The buggy address belongs to the physical page:
[  132.356204] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.358036] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.359750] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.361439] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.362996] page dumped because: kasan: bad access detected
[  132.364118] 
[  132.364622] Memory state around the buggy address:
[  132.365854]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.367367]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.368885] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.370365]                       ^
[  132.371275]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.372858]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.374296] ==================================================================
---
[  132.006088] ==================================================================
[  132.007636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb8c
[  132.009344] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.010787] 
[  132.011418] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.013157] Hardware name: linux,dummy-virt (DT)
[  132.014257] Call trace:
[  132.014918]  dump_backtrace+0xf8/0x118
[  132.016169]  show_stack+0x18/0x24
[  132.017262]  dump_stack_lvl+0x64/0x7c
[  132.018406]  print_report+0x144/0x6a8
[  132.019483]  kasan_report+0xb0/0x160
[  132.020553]  __asan_load8+0xa8/0xac
[  132.021636]  kasan_bitops_generic+0x3fc/0xb8c
[  132.022941]  kunit_try_run_case+0x80/0x184
[  132.024149]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.025606]  kthread+0x16c/0x21c
[  132.026668]  ret_from_fork+0x10/0x20
[  132.027757] 
[  132.028268] Allocated by task 166:
[  132.029208]  kasan_set_track+0x4c/0x80
[  132.030308]  kasan_save_alloc_info+0x28/0x34
[  132.031485]  __kasan_kmalloc+0x88/0xa0
[  132.032557]  kmalloc_trace+0x54/0x68
[  132.033707]  kasan_bitops_generic+0x4c/0xb8c
[  132.034928]  kunit_try_run_case+0x80/0x184
[  132.036132]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.037551]  kthread+0x16c/0x21c
[  132.038671]  ret_from_fork+0x10/0x20
[  132.039714] 
[  132.040234] The buggy address belongs to the object at ffff0000c59d3b00
[  132.040234]  which belongs to the cache kmalloc-128 of size 128
[  132.042478] The buggy address is located 8 bytes inside of
[  132.042478]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.044677] 
[  132.045227] The buggy address belongs to the physical page:
[  132.046393] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.048239] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.049912] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.051606] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.053066] page dumped because: kasan: bad access detected
[  132.054182] 
[  132.054724] Memory state around the buggy address:
[  132.055817]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.057337]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.058886] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.060299]                       ^
[  132.061251]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.062787]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.064194] ==================================================================
---
[  132.128922] ==================================================================
[  132.130395] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb8c
[  132.132374] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.134064] 
[  132.134690] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.136532] Hardware name: linux,dummy-virt (DT)
[  132.137566] Call trace:
[  132.138243]  dump_backtrace+0xf8/0x118
[  132.139496]  show_stack+0x18/0x24
[  132.140636]  dump_stack_lvl+0x64/0x7c
[  132.141816]  print_report+0x144/0x6a8
[  132.142918]  kasan_report+0xb0/0x160
[  132.143981]  __asan_load8+0xa8/0xac
[  132.145075]  kasan_bitops_generic+0x4a8/0xb8c
[  132.146333]  kunit_try_run_case+0x80/0x184
[  132.147545]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.149017]  kthread+0x16c/0x21c
[  132.150099]  ret_from_fork+0x10/0x20
[  132.151218] 
[  132.151717] Allocated by task 166:
[  132.152670]  kasan_set_track+0x4c/0x80
[  132.153737]  kasan_save_alloc_info+0x28/0x34
[  132.154926]  __kasan_kmalloc+0x88/0xa0
[  132.155994]  kmalloc_trace+0x54/0x68
[  132.157098]  kasan_bitops_generic+0x4c/0xb8c
[  132.158346]  kunit_try_run_case+0x80/0x184
[  132.159561]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.161018]  kthread+0x16c/0x21c
[  132.162117]  ret_from_fork+0x10/0x20
[  132.163202] 
[  132.163704] The buggy address belongs to the object at ffff0000c59d3b00
[  132.163704]  which belongs to the cache kmalloc-128 of size 128
[  132.165843] The buggy address is located 8 bytes inside of
[  132.165843]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.168054] 
[  132.168633] The buggy address belongs to the physical page:
[  132.169864] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.171711] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.173376] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.175044] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.176518] page dumped because: kasan: bad access detected
[  132.177698] 
[  132.178178] Memory state around the buggy address:
[  132.179316]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.180855]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.182359] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.183805]                       ^
[  132.184719]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.186230]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.187674] ==================================================================
---
[  131.760499] ==================================================================
[  131.762062] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb8c
[  131.763460] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.765049] 
[  131.765695] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.767452] Hardware name: linux,dummy-virt (DT)
[  131.768482] Call trace:
[  131.769214]  dump_backtrace+0xf8/0x118
[  131.770414]  show_stack+0x18/0x24
[  131.771498]  dump_stack_lvl+0x64/0x7c
[  131.772646]  print_report+0x144/0x6a8
[  131.773749]  kasan_report+0xb0/0x160
[  131.774806]  __asan_load8+0xa8/0xac
[  131.775856]  kasan_bitops_generic+0x2fc/0xb8c
[  131.777095]  kunit_try_run_case+0x80/0x184
[  131.778322]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.779772]  kthread+0x16c/0x21c
[  131.780873]  ret_from_fork+0x10/0x20
[  131.782009] 
[  131.782608] Allocated by task 166:
[  131.783544]  kasan_set_track+0x4c/0x80
[  131.784642]  kasan_save_alloc_info+0x28/0x34
[  131.785849]  __kasan_kmalloc+0x88/0xa0
[  131.786921]  kmalloc_trace+0x54/0x68
[  131.788033]  kasan_bitops_generic+0x4c/0xb8c
[  131.789240]  kunit_try_run_case+0x80/0x184
[  131.790464]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.791912]  kthread+0x16c/0x21c
[  131.793029]  ret_from_fork+0x10/0x20
[  131.794131] 
[  131.794647] The buggy address belongs to the object at ffff0000c59d3b00
[  131.794647]  which belongs to the cache kmalloc-128 of size 128
[  131.796879] The buggy address is located 8 bytes inside of
[  131.796879]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.799007] 
[  131.799620] The buggy address belongs to the physical page:
[  131.800869] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.802717] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.804356] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.806024] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.807490] page dumped because: kasan: bad access detected
[  131.808663] 
[  131.809203] Memory state around the buggy address:
[  131.810328]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.811861]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.813361] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.814794]                       ^
[  131.815735]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.817263]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.818679] ==================================================================
---
[  131.884010] ==================================================================
[  131.885207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb8c
[  131.887146] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.888641] 
[  131.889272] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.891124] Hardware name: linux,dummy-virt (DT)
[  131.892165] Call trace:
[  131.892964]  dump_backtrace+0xf8/0x118
[  131.894158]  show_stack+0x18/0x24
[  131.895239]  dump_stack_lvl+0x64/0x7c
[  131.896330]  print_report+0x144/0x6a8
[  131.897413]  kasan_report+0xb0/0x160
[  131.898495]  __asan_load8+0xa8/0xac
[  131.899551]  kasan_bitops_generic+0x3a0/0xb8c
[  131.900796]  kunit_try_run_case+0x80/0x184
[  131.902045]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.903470]  kthread+0x16c/0x21c
[  131.904552]  ret_from_fork+0x10/0x20
[  131.905680] 
[  131.906160] Allocated by task 166:
[  131.907103]  kasan_set_track+0x4c/0x80
[  131.908165]  kasan_save_alloc_info+0x28/0x34
[  131.909339]  __kasan_kmalloc+0x88/0xa0
[  131.910408]  kmalloc_trace+0x54/0x68
[  131.911509]  kasan_bitops_generic+0x4c/0xb8c
[  131.912773]  kunit_try_run_case+0x80/0x184
[  131.914031]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.915448]  kthread+0x16c/0x21c
[  131.916519]  ret_from_fork+0x10/0x20
[  131.917631] 
[  131.918114] The buggy address belongs to the object at ffff0000c59d3b00
[  131.918114]  which belongs to the cache kmalloc-128 of size 128
[  131.920242] The buggy address is located 8 bytes inside of
[  131.920242]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.922385] 
[  131.923021] The buggy address belongs to the physical page:
[  131.924252] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.926079] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.927760] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.929355] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.930856] page dumped because: kasan: bad access detected
[  131.931984] 
[  131.932427] Memory state around the buggy address:
[  131.933640]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.935170]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.936683] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.938088]                       ^
[  131.939047]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.940630]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.942075] ==================================================================
---
[  132.252985] ==================================================================
[  132.254312] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb8c
[  132.256269] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  132.257753] 
[  132.258409] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.260180] Hardware name: linux,dummy-virt (DT)
[  132.261217] Call trace:
[  132.261984]  dump_backtrace+0xf8/0x118
[  132.263173]  show_stack+0x18/0x24
[  132.264253]  dump_stack_lvl+0x64/0x7c
[  132.265395]  print_report+0x144/0x6a8
[  132.266512]  kasan_report+0xb0/0x160
[  132.267562]  __asan_load8+0xa8/0xac
[  132.268613]  kasan_bitops_generic+0x54c/0xb8c
[  132.269868]  kunit_try_run_case+0x80/0x184
[  132.271093]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.272520]  kthread+0x16c/0x21c
[  132.273653]  ret_from_fork+0x10/0x20
[  132.274759] 
[  132.275275] Allocated by task 166:
[  132.276185]  kasan_set_track+0x4c/0x80
[  132.277285]  kasan_save_alloc_info+0x28/0x34
[  132.278500]  __kasan_kmalloc+0x88/0xa0
[  132.279595]  kmalloc_trace+0x54/0x68
[  132.280723]  kasan_bitops_generic+0x4c/0xb8c
[  132.281991]  kunit_try_run_case+0x80/0x184
[  132.283235]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.284669]  kthread+0x16c/0x21c
[  132.285755]  ret_from_fork+0x10/0x20
[  132.286836] 
[  132.287314] The buggy address belongs to the object at ffff0000c59d3b00
[  132.287314]  which belongs to the cache kmalloc-128 of size 128
[  132.289506] The buggy address is located 8 bytes inside of
[  132.289506]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  132.291707] 
[  132.292239] The buggy address belongs to the physical page:
[  132.293438] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  132.295260] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.296925] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.298554] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.300046] page dumped because: kasan: bad access detected
[  132.301164] 
[  132.301666] Memory state around the buggy address:
[  132.302822]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.304365]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.305918] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.307331]                       ^
[  132.308276]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.309789]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.311188] ==================================================================
---
[  131.575772] ==================================================================
[  131.577535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb8c
[  131.578955] Read of size 8 at addr ffff0000c59d3b08 by task kunit_try_catch/166
[  131.580541] 
[  131.581143] CPU: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.582965] Hardware name: linux,dummy-virt (DT)
[  131.584110] Call trace:
[  131.584823]  dump_backtrace+0xf8/0x118
[  131.586016]  show_stack+0x18/0x24
[  131.587083]  dump_stack_lvl+0x64/0x7c
[  131.588219]  print_report+0x144/0x6a8
[  131.589304]  kasan_report+0xb0/0x160
[  131.590369]  __asan_load8+0xa8/0xac
[  131.591462]  kasan_bitops_generic+0x24c/0xb8c
[  131.592760]  kunit_try_run_case+0x80/0x184
[  131.594049]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.595484]  kthread+0x16c/0x21c
[  131.596548]  ret_from_fork+0x10/0x20
[  131.597662] 
[  131.598151] Allocated by task 166:
[  131.599107]  kasan_set_track+0x4c/0x80
[  131.600162]  kasan_save_alloc_info+0x28/0x34
[  131.601344]  __kasan_kmalloc+0x88/0xa0
[  131.602422]  kmalloc_trace+0x54/0x68
[  131.603498]  kasan_bitops_generic+0x4c/0xb8c
[  131.604728]  kunit_try_run_case+0x80/0x184
[  131.605989]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.607414]  kthread+0x16c/0x21c
[  131.608500]  ret_from_fork+0x10/0x20
[  131.609563] 
[  131.610110] The buggy address belongs to the object at ffff0000c59d3b00
[  131.610110]  which belongs to the cache kmalloc-128 of size 128
[  131.612316] The buggy address is located 8 bytes inside of
[  131.612316]  128-byte region [ffff0000c59d3b00, ffff0000c59d3b80)
[  131.614413] 
[  131.615064] The buggy address belongs to the physical page:
[  131.616283] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.618144] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.619772] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.621413] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.622889] page dumped because: kasan: bad access detected
[  131.624053] 
[  131.624680] Memory state around the buggy address:
[  131.625803]  ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.627292]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.628852] >ffff0000c59d3b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.630314]                       ^
[  131.631238]  ffff0000c59d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.632698]  ffff0000c59d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.634100] ==================================================================

test log snippet boot parser 16

Home

[  126.850669] ==================================================================
[  126.853248] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c
[  126.855213] Write of size 1 at addr ffff0000c59b1f00 by task kunit_try_catch/129
[  126.857403] 
[  126.858045] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.859927] Hardware name: linux,dummy-virt (DT)
[  126.860891] Call trace:
[  126.861768]  dump_backtrace+0xf8/0x118
[  126.863066]  show_stack+0x18/0x24
[  126.864122]  dump_stack_lvl+0x64/0x7c
[  126.865375]  print_report+0x144/0x6a8
[  126.866518]  kasan_report+0xb0/0x160
[  126.867555]  __asan_store1+0x6c/0x70
[  126.868549]  kmalloc_large_oob_right+0xa0/0x14c
[  126.870370]  kunit_try_run_case+0x80/0x184
[  126.872160]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.873689]  kthread+0x16c/0x21c
[  126.874763]  ret_from_fork+0x10/0x20
[  126.875946] 
[  126.876858] Allocated by task 129:
[  126.877548]  kasan_set_track+0x4c/0x80
[  126.878773]  kasan_save_alloc_info+0x28/0x34
[  126.880290]  __kasan_kmalloc+0x88/0xa0
[  126.881420]  kmalloc_trace+0x54/0x68
[  126.882619]  kmalloc_large_oob_right+0x48/0x14c
[  126.884154]  kunit_try_run_case+0x80/0x184
[  126.885445]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.886916]  kthread+0x16c/0x21c
[  126.888280]  ret_from_fork+0x10/0x20
[  126.889183] 
[  126.889673] The buggy address belongs to the object at ffff0000c59b0000
[  126.889673]  which belongs to the cache kmalloc-8k of size 8192
[  126.892388] The buggy address is located 7936 bytes inside of
[  126.892388]  8192-byte region [ffff0000c59b0000, ffff0000c59b2000)
[  126.894810] 
[  126.895449] The buggy address belongs to the physical page:
[  126.897093] page:0000000072a59dca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b0
[  126.899037] head:0000000072a59dca order:3 compound_mapcount:0 compound_pincount:0
[  126.900693] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.902760] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[  126.904527] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  126.906027] page dumped because: kasan: bad access detected
[  126.907290] 
[  126.908532] Memory state around the buggy address:
[  126.909738]  ffff0000c59b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.911192]  ffff0000c59b1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.913108] >ffff0000c59b1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.914678]                    ^
[  126.915747]  ffff0000c59b1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.917277]  ffff0000c59b2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.918569] ==================================================================

test log snippet boot parser 17

Home

[  128.658278] ==================================================================
[  128.661023] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160
[  128.663010] Read of size 64 at addr ffff0000c5a35804 by task kunit_try_catch/143
[  128.665056] 
[  128.665529] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.667398] Hardware name: linux,dummy-virt (DT)
[  128.668620] Call trace:
[  128.669279]  dump_backtrace+0xf8/0x118
[  128.670558]  show_stack+0x18/0x24
[  128.671714]  dump_stack_lvl+0x64/0x7c
[  128.672823]  print_report+0x144/0x6a8
[  128.674648]  kasan_report+0xb0/0x160
[  128.675873]  kasan_check_range+0x260/0x2a0
[  128.677362]  memmove+0x48/0x90
[  128.678471]  kmalloc_memmove_invalid_size+0xb8/0x160
[  128.680051]  kunit_try_run_case+0x80/0x184
[  128.681081]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.682842]  kthread+0x16c/0x21c
[  128.684458]  ret_from_fork+0x10/0x20
[  128.685639] 
[  128.686166] Allocated by task 143:
[  128.687034]  kasan_set_track+0x4c/0x80
[  128.688249]  kasan_save_alloc_info+0x28/0x34
[  128.689439]  __kasan_kmalloc+0x88/0xa0
[  128.691531]  kmalloc_trace+0x54/0x68
[  128.693157]  kmalloc_memmove_invalid_size+0x48/0x160
[  128.694635]  kunit_try_run_case+0x80/0x184
[  128.696454]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.697982]  kthread+0x16c/0x21c
[  128.699223]  ret_from_fork+0x10/0x20
[  128.700611] 
[  128.701307] The buggy address belongs to the object at ffff0000c5a35800
[  128.701307]  which belongs to the cache kmalloc-128 of size 128
[  128.703965] The buggy address is located 4 bytes inside of
[  128.703965]  128-byte region [ffff0000c5a35800, ffff0000c5a35880)
[  128.706478] 
[  128.707127] The buggy address belongs to the physical page:
[  128.708615] page:000000003f2e44e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a35
[  128.710555] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.712386] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.713538] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.715446] page dumped because: kasan: bad access detected
[  128.717253] 
[  128.717883] Memory state around the buggy address:
[  128.719006]  ffff0000c5a35700: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.721089]  ffff0000c5a35780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.722864] >ffff0000c5a35800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  128.725028]                                            ^
[  128.726375]  ffff0000c5a35880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.728314]  ffff0000c5a35900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.729777] ==================================================================

test log snippet boot parser 18

Home

[  126.534634] ==================================================================
[  126.536982] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c
[  126.538879] Read of size 1 at addr ffff0000c587d000 by task kunit_try_catch/123
[  126.540288] 
[  126.541152] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.543164] Hardware name: linux,dummy-virt (DT)
[  126.544562] Call trace:
[  126.545466]  dump_backtrace+0xf8/0x118
[  126.546784]  show_stack+0x18/0x24
[  126.548248]  dump_stack_lvl+0x64/0x7c
[  126.549568]  print_report+0x144/0x6a8
[  126.550707]  kasan_report+0xb0/0x160
[  126.551930]  __asan_load1+0x6c/0x70
[  126.552863]  kmalloc_node_oob_right+0xa4/0x15c
[  126.554226]  kunit_try_run_case+0x80/0x184
[  126.555480]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.557013]  kthread+0x16c/0x21c
[  126.558319]  ret_from_fork+0x10/0x20
[  126.559496] 
[  126.560467] Allocated by task 123:
[  126.561472]  kasan_set_track+0x4c/0x80
[  126.562650]  kasan_save_alloc_info+0x28/0x34
[  126.563919]  __kasan_kmalloc+0x88/0xa0
[  126.565399]  kmalloc_node_trace+0x4c/0x60
[  126.566614]  kmalloc_node_oob_right+0x4c/0x15c
[  126.567867]  kunit_try_run_case+0x80/0x184
[  126.569357]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.570879]  kthread+0x16c/0x21c
[  126.572127]  ret_from_fork+0x10/0x20
[  126.573120] 
[  126.573776] The buggy address belongs to the object at ffff0000c587c000
[  126.573776]  which belongs to the cache kmalloc-4k of size 4096
[  126.576054] The buggy address is located 0 bytes to the right of
[  126.576054]  4096-byte region [ffff0000c587c000, ffff0000c587d000)
[  126.578886] 
[  126.579731] The buggy address belongs to the physical page:
[  126.580998] page:000000002b6e03cc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878
[  126.583012] head:000000002b6e03cc order:3 compound_mapcount:0 compound_pincount:0
[  126.584544] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.586731] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[  126.588686] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  126.590234] page dumped because: kasan: bad access detected
[  126.591385] 
[  126.592508] Memory state around the buggy address:
[  126.593785]  ffff0000c587cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.595187]  ffff0000c587cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.596878] >ffff0000c587d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.598732]                    ^
[  126.599365]  ffff0000c587d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.601372]  ffff0000c587d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.603044] ==================================================================

test log snippet boot parser 19

Home

[  128.018877] ==================================================================
[  128.021509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac
[  128.025363] Write of size 16 at addr ffff0000c5a29300 by task kunit_try_catch/135
[  128.026954] 
[  128.027538] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.029646] Hardware name: linux,dummy-virt (DT)
[  128.030644] Call trace:
[  128.031306]  dump_backtrace+0xf8/0x118
[  128.032550]  show_stack+0x18/0x24
[  128.033697]  dump_stack_lvl+0x64/0x7c
[  128.034907]  print_report+0x144/0x6a8
[  128.036122]  kasan_report+0xb0/0x160
[  128.037091]  kasan_check_range+0x260/0x2a0
[  128.038412]  memcpy+0x60/0x90
[  128.039371]  kmalloc_oob_16+0xfc/0x1ac
[  128.040996]  kunit_try_run_case+0x80/0x184
[  128.042133]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.043598]  kthread+0x16c/0x21c
[  128.045028]  ret_from_fork+0x10/0x20
[  128.046192] 
[  128.046664] Allocated by task 135:
[  128.047513]  kasan_set_track+0x4c/0x80
[  128.048719]  kasan_save_alloc_info+0x28/0x34
[  128.050322]  __kasan_kmalloc+0x88/0xa0
[  128.051368]  kmalloc_trace+0x54/0x68
[  128.052526]  kmalloc_oob_16+0x48/0x1ac
[  128.053453]  kunit_try_run_case+0x80/0x184
[  128.054975]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.056659]  kthread+0x16c/0x21c
[  128.057830]  ret_from_fork+0x10/0x20
[  128.059102] 
[  128.059725] The buggy address belongs to the object at ffff0000c5a29300
[  128.059725]  which belongs to the cache kmalloc-128 of size 128
[  128.062034] The buggy address is located 0 bytes inside of
[  128.062034]  128-byte region [ffff0000c5a29300, ffff0000c5a29380)
[  128.064128] 
[  128.064777] The buggy address belongs to the physical page:
[  128.066009] page:00000000ab36dc2d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a29
[  128.067844] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.070114] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.071927] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.074101] page dumped because: kasan: bad access detected
[  128.075899] 
[  128.076350] Memory state around the buggy address:
[  128.077854]  ffff0000c5a29200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  128.079658]  ffff0000c5a29280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.081501] >ffff0000c5a29300: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.083031]                       ^
[  128.084150]  ffff0000c5a29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.086001]  ffff0000c5a29400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.087673] ==================================================================

test log snippet boot parser 20

Home

[  128.192952] ==================================================================
[  128.194840] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150
[  128.196855] Write of size 128 at addr ffff0000c58e6200 by task kunit_try_catch/137
[  128.198528] 
[  128.200103] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.202302] Hardware name: linux,dummy-virt (DT)
[  128.203185] Call trace:
[  128.204400]  dump_backtrace+0xf8/0x118
[  128.205755]  show_stack+0x18/0x24
[  128.206674]  dump_stack_lvl+0x64/0x7c
[  128.208041]  print_report+0x144/0x6a8
[  128.208909]  kasan_report+0xb0/0x160
[  128.210113]  kasan_check_range+0x260/0x2a0
[  128.211292]  memset+0x40/0x70
[  128.212335]  kmalloc_oob_in_memset+0xa8/0x150
[  128.213564]  kunit_try_run_case+0x80/0x184
[  128.214954]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.216836]  kthread+0x16c/0x21c
[  128.217993]  ret_from_fork+0x10/0x20
[  128.219119] 
[  128.219712] Allocated by task 137:
[  128.220968]  kasan_set_track+0x4c/0x80
[  128.222046]  kasan_save_alloc_info+0x28/0x34
[  128.223245]  __kasan_kmalloc+0x88/0xa0
[  128.224561]  kmalloc_trace+0x54/0x68
[  128.225766]  kmalloc_oob_in_memset+0x48/0x150
[  128.226963]  kunit_try_run_case+0x80/0x184
[  128.228418]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.229926]  kthread+0x16c/0x21c
[  128.231053]  ret_from_fork+0x10/0x20
[  128.232144] 
[  128.233324] The buggy address belongs to the object at ffff0000c58e6200
[  128.233324]  which belongs to the cache kmalloc-128 of size 128
[  128.236329] The buggy address is located 0 bytes inside of
[  128.236329]  128-byte region [ffff0000c58e6200, ffff0000c58e6280)
[  128.238469] 
[  128.239109] The buggy address belongs to the physical page:
[  128.240456] page:00000000d0c29e4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e6
[  128.242570] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.244472] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.246125] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.247631] page dumped because: kasan: bad access detected
[  128.248671] 
[  128.249397] Memory state around the buggy address:
[  128.250472]  ffff0000c58e6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.252478]  ffff0000c58e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.253994] >ffff0000c58e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  128.255488]                                                                 ^
[  128.257396]  ffff0000c58e6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.258957]  ffff0000c58e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.260680] ==================================================================

test log snippet boot parser 21

Home

[  126.455255] ==================================================================
[  126.457709] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154
[  126.459281] Read of size 1 at addr ffff0000c59133ff by task kunit_try_catch/122
[  126.462082] 
[  126.462623] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.464452] Hardware name: linux,dummy-virt (DT)
[  126.465522] Call trace:
[  126.466999]  dump_backtrace+0xf8/0x118
[  126.468234]  show_stack+0x18/0x24
[  126.469438]  dump_stack_lvl+0x64/0x7c
[  126.470969]  print_report+0x144/0x6a8
[  126.472293]  kasan_report+0xb0/0x160
[  126.473613]  __asan_load1+0x6c/0x70
[  126.474746]  kmalloc_oob_left+0x9c/0x154
[  126.475986]  kunit_try_run_case+0x80/0x184
[  126.477431]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.479409]  kthread+0x16c/0x21c
[  126.480902]  ret_from_fork+0x10/0x20
[  126.482112] 
[  126.482645] Allocated by task 2:
[  126.483502]  kasan_set_track+0x4c/0x80
[  126.485648]  kasan_save_alloc_info+0x28/0x34
[  126.486810]  __kasan_kmalloc+0x88/0xa0
[  126.488423]  kmalloc_trace+0x54/0x68
[  126.489560]  set_kthread_struct+0x5c/0xf8
[  126.490731]  copy_process+0x61c/0x1364
[  126.492060]  kernel_clone+0xdc/0x378
[  126.493543]  kernel_thread+0x74/0xa4
[  126.494462]  kthreadd+0x218/0x238
[  126.495642]  ret_from_fork+0x10/0x20
[  126.497039] 
[  126.497650] The buggy address belongs to the object at ffff0000c5913300
[  126.497650]  which belongs to the cache kmalloc-128 of size 128
[  126.500456] The buggy address is located 127 bytes to the right of
[  126.500456]  128-byte region [ffff0000c5913300, ffff0000c5913380)
[  126.502712] 
[  126.503372] The buggy address belongs to the physical page:
[  126.505253] page:00000000c9678f44 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105913
[  126.507192] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  126.509041] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  126.510837] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.512709] page dumped because: kasan: bad access detected
[  126.513927] 
[  126.514379] Memory state around the buggy address:
[  126.515550]  ffff0000c5913280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.517459]  ffff0000c5913300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  126.518910] >ffff0000c5913380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.520954]                                                                 ^
[  126.522394]  ffff0000c5913400: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.523974]  ffff0000c5913480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.526018] ==================================================================

test log snippet boot parser 22

Home

[  128.270921] ==================================================================
[  128.273720] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154
[  128.275475] Write of size 2 at addr ffff0000c58e6377 by task kunit_try_catch/138
[  128.277487] 
[  128.278161] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.280154] Hardware name: linux,dummy-virt (DT)
[  128.281243] Call trace:
[  128.282322]  dump_backtrace+0xf8/0x118
[  128.283556]  show_stack+0x18/0x24
[  128.284909]  dump_stack_lvl+0x64/0x7c
[  128.286150]  print_report+0x144/0x6a8
[  128.287233]  kasan_report+0xb0/0x160
[  128.288315]  kasan_check_range+0x260/0x2a0
[  128.289481]  memset+0x40/0x70
[  128.291479]  kmalloc_oob_memset_2+0xac/0x154
[  128.292895]  kunit_try_run_case+0x80/0x184
[  128.294217]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.295981]  kthread+0x16c/0x21c
[  128.297232]  ret_from_fork+0x10/0x20
[  128.298380] 
[  128.298983] Allocated by task 138:
[  128.300172]  kasan_set_track+0x4c/0x80
[  128.301546]  kasan_save_alloc_info+0x28/0x34
[  128.302763]  __kasan_kmalloc+0x88/0xa0
[  128.303983]  kmalloc_trace+0x54/0x68
[  128.305089]  kmalloc_oob_memset_2+0x48/0x154
[  128.306338]  kunit_try_run_case+0x80/0x184
[  128.307528]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.309241]  kthread+0x16c/0x21c
[  128.310349]  ret_from_fork+0x10/0x20
[  128.312000] 
[  128.312900] The buggy address belongs to the object at ffff0000c58e6300
[  128.312900]  which belongs to the cache kmalloc-128 of size 128
[  128.315401] The buggy address is located 119 bytes inside of
[  128.315401]  128-byte region [ffff0000c58e6300, ffff0000c58e6380)
[  128.317725] 
[  128.318253] The buggy address belongs to the physical page:
[  128.319352] page:00000000d0c29e4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e6
[  128.321207] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.322683] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.324597] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.326295] page dumped because: kasan: bad access detected
[  128.327102] 
[  128.327648] Memory state around the buggy address:
[  128.329021]  ffff0000c58e6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.330727]  ffff0000c58e6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.332828] >ffff0000c58e6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  128.334610]                                                                 ^
[  128.336541]  ffff0000c58e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.338019]  ffff0000c58e6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.339806] ==================================================================
---
[  128.428989] ==================================================================
[  128.431330] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154
[  128.433162] Write of size 8 at addr ffff0000c58e6771 by task kunit_try_catch/140
[  128.434442] 
[  128.435110] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.437164] Hardware name: linux,dummy-virt (DT)
[  128.438214] Call trace:
[  128.438840]  dump_backtrace+0xf8/0x118
[  128.440072]  show_stack+0x18/0x24
[  128.441278]  dump_stack_lvl+0x64/0x7c
[  128.442237]  print_report+0x144/0x6a8
[  128.443022]  kasan_report+0xb0/0x160
[  128.444522]  kasan_check_range+0x260/0x2a0
[  128.445729]  memset+0x40/0x70
[  128.446716]  kmalloc_oob_memset_8+0xac/0x154
[  128.448106]  kunit_try_run_case+0x80/0x184
[  128.449320]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.450399]  kthread+0x16c/0x21c
[  128.451737]  ret_from_fork+0x10/0x20
[  128.452826] 
[  128.453495] Allocated by task 140:
[  128.454497]  kasan_set_track+0x4c/0x80
[  128.455669]  kasan_save_alloc_info+0x28/0x34
[  128.456935]  __kasan_kmalloc+0x88/0xa0
[  128.458014]  kmalloc_trace+0x54/0x68
[  128.459285]  kmalloc_oob_memset_8+0x48/0x154
[  128.460644]  kunit_try_run_case+0x80/0x184
[  128.462095]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.463635]  kthread+0x16c/0x21c
[  128.464907]  ret_from_fork+0x10/0x20
[  128.465962] 
[  128.466656] The buggy address belongs to the object at ffff0000c58e6700
[  128.466656]  which belongs to the cache kmalloc-128 of size 128
[  128.469028] The buggy address is located 113 bytes inside of
[  128.469028]  128-byte region [ffff0000c58e6700, ffff0000c58e6780)
[  128.471484] 
[  128.472180] The buggy address belongs to the physical page:
[  128.473336] page:00000000d0c29e4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e6
[  128.475436] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.477089] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.479440] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.481163] page dumped because: kasan: bad access detected
[  128.482316] 
[  128.482883] Memory state around the buggy address:
[  128.484364]  ffff0000c58e6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.486256]  ffff0000c58e6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.488112] >ffff0000c58e6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  128.489757]                                                                 ^
[  128.491391]  ffff0000c58e6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.493003]  ffff0000c58e6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.494765] ==================================================================

test log snippet boot parser 23

Home

[  128.505728] ==================================================================
[  128.507887] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154
[  128.509817] Write of size 16 at addr ffff0000c5a35569 by task kunit_try_catch/141
[  128.511528] 
[  128.513345] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.515301] Hardware name: linux,dummy-virt (DT)
[  128.516452] Call trace:
[  128.517006]  dump_backtrace+0xf8/0x118
[  128.517817]  show_stack+0x18/0x24
[  128.519231]  dump_stack_lvl+0x64/0x7c
[  128.520601]  print_report+0x144/0x6a8
[  128.521479]  kasan_report+0xb0/0x160
[  128.522678]  kasan_check_range+0x260/0x2a0
[  128.524283]  memset+0x40/0x70
[  128.525427]  kmalloc_oob_memset_16+0xac/0x154
[  128.526806]  kunit_try_run_case+0x80/0x184
[  128.528175]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.530384]  kthread+0x16c/0x21c
[  128.531558]  ret_from_fork+0x10/0x20
[  128.532715] 
[  128.533687] Allocated by task 141:
[  128.534708]  kasan_set_track+0x4c/0x80
[  128.535491]  kasan_save_alloc_info+0x28/0x34
[  128.537169]  __kasan_kmalloc+0x88/0xa0
[  128.538142]  kmalloc_trace+0x54/0x68
[  128.539806]  kmalloc_oob_memset_16+0x48/0x154
[  128.541334]  kunit_try_run_case+0x80/0x184
[  128.542395]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.543852]  kthread+0x16c/0x21c
[  128.545094]  ret_from_fork+0x10/0x20
[  128.546160] 
[  128.546603] The buggy address belongs to the object at ffff0000c5a35500
[  128.546603]  which belongs to the cache kmalloc-128 of size 128
[  128.549975] The buggy address is located 105 bytes inside of
[  128.549975]  128-byte region [ffff0000c5a35500, ffff0000c5a35580)
[  128.552423] 
[  128.553023] The buggy address belongs to the physical page:
[  128.554126] page:000000003f2e44e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a35
[  128.556627] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.558341] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.560188] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.562086] page dumped because: kasan: bad access detected
[  128.563356] 
[  128.564111] Memory state around the buggy address:
[  128.565182]  ffff0000c5a35400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.566958]  ffff0000c5a35480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.568814] >ffff0000c5a35500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  128.569964]                                                                 ^
[  128.571432]  ffff0000c5a35580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.572957]  ffff0000c5a35600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.574365] ==================================================================

test log snippet boot parser 24

Home

[  128.349288] ==================================================================
[  128.351314] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154
[  128.353022] Write of size 4 at addr ffff0000c5a29d75 by task kunit_try_catch/139
[  128.354159] 
[  128.354899] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.357431] Hardware name: linux,dummy-virt (DT)
[  128.358535] Call trace:
[  128.359570]  dump_backtrace+0xf8/0x118
[  128.361894]  show_stack+0x18/0x24
[  128.363113]  dump_stack_lvl+0x64/0x7c
[  128.364308]  print_report+0x144/0x6a8
[  128.365551]  kasan_report+0xb0/0x160
[  128.366907]  kasan_check_range+0x260/0x2a0
[  128.368129]  memset+0x40/0x70
[  128.368965]  kmalloc_oob_memset_4+0xac/0x154
[  128.370454]  kunit_try_run_case+0x80/0x184
[  128.371764]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.373290]  kthread+0x16c/0x21c
[  128.374522]  ret_from_fork+0x10/0x20
[  128.376172] 
[  128.376927] Allocated by task 139:
[  128.378112]  kasan_set_track+0x4c/0x80
[  128.379136]  kasan_save_alloc_info+0x28/0x34
[  128.380324]  __kasan_kmalloc+0x88/0xa0
[  128.381756]  kmalloc_trace+0x54/0x68
[  128.382911]  kmalloc_oob_memset_4+0x48/0x154
[  128.384122]  kunit_try_run_case+0x80/0x184
[  128.385313]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.386960]  kthread+0x16c/0x21c
[  128.388177]  ret_from_fork+0x10/0x20
[  128.389688] 
[  128.390244] The buggy address belongs to the object at ffff0000c5a29d00
[  128.390244]  which belongs to the cache kmalloc-128 of size 128
[  128.393054] The buggy address is located 117 bytes inside of
[  128.393054]  128-byte region [ffff0000c5a29d00, ffff0000c5a29d80)
[  128.395201] 
[  128.395764] The buggy address belongs to the physical page:
[  128.397238] page:00000000ab36dc2d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a29
[  128.399127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.400843] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.403380] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.404979] page dumped because: kasan: bad access detected
[  128.406302] 
[  128.406909] Memory state around the buggy address:
[  128.408123]  ffff0000c5a29c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.409742]  ffff0000c5a29c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.412238] >ffff0000c5a29d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  128.413677]                                                                 ^
[  128.415249]  ffff0000c5a29d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.416790]  ffff0000c5a29e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.418223] ==================================================================

test log snippet boot parser 25

Home

[  126.236643] ==================================================================
[  126.238660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264
[  126.241066] Write of size 1 at addr ffff0000c549ab73 by task kunit_try_catch/121
[  126.243063] 
[  126.244738] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[  126.246484] Hardware name: linux,dummy-virt (DT)
[  126.247542] Call trace:
[  126.248520]  dump_backtrace+0xf8/0x118
[  126.250068]  show_stack+0x18/0x24
[  126.251228]  dump_stack_lvl+0x64/0x7c
[  126.252343]  print_report+0x144/0x6a8
[  126.253518]  kasan_report+0xb0/0x160
[  126.254471]  __asan_store1+0x6c/0x70
[  126.256113]  kmalloc_oob_right+0x9c/0x264
[  126.257636]  kunit_try_run_case+0x80/0x184
[  126.258914]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.260698]  kthread+0x16c/0x21c
[  126.261780]  ret_from_fork+0x10/0x20
[  126.262971] 
[  126.263673] Allocated by task 121:
[  126.264942]  kasan_set_track+0x4c/0x80
[  126.266595]  kasan_save_alloc_info+0x28/0x34
[  126.268094]  __kasan_kmalloc+0x88/0xa0
[  126.268982]  kmalloc_trace+0x54/0x68
[  126.270425]  kmalloc_oob_right+0x48/0x264
[  126.272211]  kunit_try_run_case+0x80/0x184
[  126.273717]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.275233]  kthread+0x16c/0x21c
[  126.276426]  ret_from_fork+0x10/0x20
[  126.277376] 
[  126.278220] The buggy address belongs to the object at ffff0000c549ab00
[  126.278220]  which belongs to the cache kmalloc-128 of size 128
[  126.281416] The buggy address is located 115 bytes inside of
[  126.281416]  128-byte region [ffff0000c549ab00, ffff0000c549ab80)
[  126.283501] 
[  126.284757] The buggy address belongs to the physical page:
[  126.286456] page:000000008a0c0b77 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10549a
[  126.289065] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  126.291875] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  126.293553] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.295180] page dumped because: kasan: bad access detected
[  126.296534] 
[  126.297256] Memory state around the buggy address:
[  126.298716]  ffff0000c549aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.300354]  ffff0000c549aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.302419] >ffff0000c549ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  126.305013]                                                              ^
[  126.306763]  ffff0000c549ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.308681]  ffff0000c549ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.310527] ==================================================================

test log snippet boot parser 26

Home

[  126.384704] ==================================================================
[  126.386192] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264
[  126.387883] Read of size 1 at addr ffff0000c549ab80 by task kunit_try_catch/121
[  126.390593] 
[  126.391486] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.393375] Hardware name: linux,dummy-virt (DT)
[  126.394553] Call trace:
[  126.395222]  dump_backtrace+0xf8/0x118
[  126.396466]  show_stack+0x18/0x24
[  126.397606]  dump_stack_lvl+0x64/0x7c
[  126.398749]  print_report+0x144/0x6a8
[  126.399860]  kasan_report+0xb0/0x160
[  126.400922]  __asan_load1+0x6c/0x70
[  126.402015]  kmalloc_oob_right+0x134/0x264
[  126.403202]  kunit_try_run_case+0x80/0x184
[  126.404425]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.405931]  kthread+0x16c/0x21c
[  126.407015]  ret_from_fork+0x10/0x20
[  126.408119] 
[  126.408658] Allocated by task 121:
[  126.409549]  kasan_set_track+0x4c/0x80
[  126.410682]  kasan_save_alloc_info+0x28/0x34
[  126.411871]  __kasan_kmalloc+0x88/0xa0
[  126.412981]  kmalloc_trace+0x54/0x68
[  126.414134]  kmalloc_oob_right+0x48/0x264
[  126.415319]  kunit_try_run_case+0x80/0x184
[  126.416559]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.418065]  kthread+0x16c/0x21c
[  126.419175]  ret_from_fork+0x10/0x20
[  126.420260] 
[  126.420820] The buggy address belongs to the object at ffff0000c549ab00
[  126.420820]  which belongs to the cache kmalloc-128 of size 128
[  126.423062] The buggy address is located 0 bytes to the right of
[  126.423062]  128-byte region [ffff0000c549ab00, ffff0000c549ab80)
[  126.425279] 
[  126.425958] The buggy address belongs to the physical page:
[  126.427236] page:000000008a0c0b77 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10549a
[  126.429129] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  126.430826] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  126.432469] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.434026] page dumped because: kasan: bad access detected
[  126.435182] 
[  126.435674] Memory state around the buggy address:
[  126.436857]  ffff0000c549aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.438396]  ffff0000c549ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  126.439921] >ffff0000c549ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.441349]                    ^
[  126.442254]  ffff0000c549ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.443773]  ffff0000c549ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.445215] ==================================================================

test log snippet boot parser 27

Home

[  126.314295] ==================================================================
[  126.315972] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264
[  126.317193] Write of size 1 at addr ffff0000c549ab78 by task kunit_try_catch/121
[  126.318810] 
[  126.319444] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.321746] Hardware name: linux,dummy-virt (DT)
[  126.322910] Call trace:
[  126.323708]  dump_backtrace+0xf8/0x118
[  126.324923]  show_stack+0x18/0x24
[  126.326381]  dump_stack_lvl+0x64/0x7c
[  126.327830]  print_report+0x144/0x6a8
[  126.328944]  kasan_report+0xb0/0x160
[  126.330043]  __asan_store1+0x6c/0x70
[  126.331290]  kmalloc_oob_right+0xe8/0x264
[  126.332545]  kunit_try_run_case+0x80/0x184
[  126.334341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.336156]  kthread+0x16c/0x21c
[  126.337495]  ret_from_fork+0x10/0x20
[  126.338664] 
[  126.339186] Allocated by task 121:
[  126.340326]  kasan_set_track+0x4c/0x80
[  126.341438]  kasan_save_alloc_info+0x28/0x34
[  126.342539]  __kasan_kmalloc+0x88/0xa0
[  126.343774]  kmalloc_trace+0x54/0x68
[  126.344910]  kmalloc_oob_right+0x48/0x264
[  126.346236]  kunit_try_run_case+0x80/0x184
[  126.347661]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.349215]  kthread+0x16c/0x21c
[  126.350448]  ret_from_fork+0x10/0x20
[  126.351719] 
[  126.352387] The buggy address belongs to the object at ffff0000c549ab00
[  126.352387]  which belongs to the cache kmalloc-128 of size 128
[  126.354805] The buggy address is located 120 bytes inside of
[  126.354805]  128-byte region [ffff0000c549ab00, ffff0000c549ab80)
[  126.357669] 
[  126.358382] The buggy address belongs to the physical page:
[  126.359710] page:000000008a0c0b77 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10549a
[  126.361529] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  126.363695] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  126.365853] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.367406] page dumped because: kasan: bad access detected
[  126.368691] 
[  126.369214] Memory state around the buggy address:
[  126.370376]  ffff0000c549aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.372180]  ffff0000c549aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.373672] >ffff0000c549ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  126.374889]                                                                 ^
[  126.376951]  ffff0000c549ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.378529]  ffff0000c549ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.380140] ==================================================================

test log snippet boot parser 28

Home

[  126.614086] ==================================================================
[  126.616174] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130
[  126.618756] Write of size 1 at addr ffff0000c590a00a by task kunit_try_catch/124
[  126.621436] 
[  126.622188] CPU: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.624012] Hardware name: linux,dummy-virt (DT)
[  126.625180] Call trace:
[  126.625891]  dump_backtrace+0xf8/0x118
[  126.627107]  show_stack+0x18/0x24
[  126.628198]  dump_stack_lvl+0x64/0x7c
[  126.629481]  print_report+0x144/0x6a8
[  126.630560]  kasan_report+0xb0/0x160
[  126.631802]  __asan_store1+0x6c/0x70
[  126.632921]  kmalloc_pagealloc_oob_right+0x84/0x130
[  126.634023]  kunit_try_run_case+0x80/0x184
[  126.635321]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.637208]  kthread+0x16c/0x21c
[  126.638343]  ret_from_fork+0x10/0x20
[  126.639454] 
[  126.640297] The buggy address belongs to the physical page:
[  126.641571] page:000000006e067a64 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105908
[  126.643422] head:000000006e067a64 order:2 compound_mapcount:0 compound_pincount:0
[  126.645284] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.646708] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.648873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.650431] page dumped because: kasan: bad access detected
[  126.651662] 
[  126.652256] Memory state around the buggy address:
[  126.653729]  ffff0000c5909f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.655392]  ffff0000c5909f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.656963] >ffff0000c590a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.658646]                       ^
[  126.659613]  ffff0000c590a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.661727]  ffff0000c590a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.663172] ==================================================================

test log snippet boot parser 29

Home

[  129.038746] ==================================================================
[  129.041162] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc
[  129.042665] Read of size 1 at addr ffff0000c58ec0c8 by task kunit_try_catch/150
[  129.044318] 
[  129.044870] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.047318] Hardware name: linux,dummy-virt (DT)
[  129.048853] Call trace:
[  129.049658]  dump_backtrace+0xf8/0x118
[  129.050811]  show_stack+0x18/0x24
[  129.052211]  dump_stack_lvl+0x64/0x7c
[  129.053373]  print_report+0x144/0x6a8
[  129.054469]  kasan_report+0xb0/0x160
[  129.055554]  __asan_load1+0x6c/0x70
[  129.056869]  kmem_cache_oob+0xb0/0x1cc
[  129.058471]  kunit_try_run_case+0x80/0x184
[  129.059569]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.061002]  kthread+0x16c/0x21c
[  129.062103]  ret_from_fork+0x10/0x20
[  129.063218] 
[  129.064363] Allocated by task 150:
[  129.065835]  kasan_set_track+0x4c/0x80
[  129.066959]  kasan_save_alloc_info+0x28/0x34
[  129.068151]  __kasan_slab_alloc+0x58/0x70
[  129.069286]  slab_post_alloc_hook+0x70/0x2f8
[  129.070528]  kmem_cache_alloc+0x168/0x260
[  129.071797]  kmem_cache_oob+0x94/0x1cc
[  129.072904]  kunit_try_run_case+0x80/0x184
[  129.074542]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.075395]  kthread+0x16c/0x21c
[  129.076525]  ret_from_fork+0x10/0x20
[  129.077647] 
[  129.078257] The buggy address belongs to the object at ffff0000c58ec000
[  129.078257]  which belongs to the cache test_cache of size 200
[  129.080741] The buggy address is located 0 bytes to the right of
[  129.080741]  200-byte region [ffff0000c58ec000, ffff0000c58ec0c8)
[  129.083109] 
[  129.084294] The buggy address belongs to the physical page:
[  129.085499] page:00000000bf7b2152 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ec
[  129.087315] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.089104] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c15c5b00
[  129.091070] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  129.092240] page dumped because: kasan: bad access detected
[  129.095104] 
[  129.096342] Memory state around the buggy address:
[  129.098249]  ffff0000c58ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  129.100123]  ffff0000c58ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.102541] >ffff0000c58ec080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  129.104036]                                               ^
[  129.105251]  ffff0000c58ec100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.106840]  ffff0000c58ec180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.109329] ==================================================================

test log snippet boot parser 30

Home

[  127.583510] ==================================================================
[  127.585841] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[  127.587669] Write of size 1 at addr ffff0000c59f20c9 by task kunit_try_catch/133
[  127.589167] 
[  127.589891] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.591727] Hardware name: linux,dummy-virt (DT)
[  127.592808] Call trace:
[  127.593486]  dump_backtrace+0xf8/0x118
[  127.594743]  show_stack+0x18/0x24
[  127.595862]  dump_stack_lvl+0x64/0x7c
[  127.596972]  print_report+0x144/0x6a8
[  127.598058]  kasan_report+0xb0/0x160
[  127.599132]  __asan_store1+0x6c/0x70
[  127.600212]  krealloc_less_oob_helper+0x104/0x4b8
[  127.601530]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.602896]  kunit_try_run_case+0x80/0x184
[  127.604131]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.605624]  kthread+0x16c/0x21c
[  127.606751]  ret_from_fork+0x10/0x20
[  127.607832] 
[  127.608351] The buggy address belongs to the physical page:
[  127.609566] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.611426] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.612923] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.614599] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.616208] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.617719] page dumped because: kasan: bad access detected
[  127.618878] 
[  127.619358] Memory state around the buggy address:
[  127.620525]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.622103]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.623623] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.625075]                                               ^
[  127.626324]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.627864]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.629273] ==================================================================

test log snippet boot parser 31

Home

[  127.680223] ==================================================================
[  127.681977] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c8/0x4b8
[  127.684144] Write of size 1 at addr ffff0000c59f20da by task kunit_try_catch/133
[  127.686047] 
[  127.686792] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.689159] Hardware name: linux,dummy-virt (DT)
[  127.690547] Call trace:
[  127.691891]  dump_backtrace+0xf8/0x118
[  127.693181]  show_stack+0x18/0x24
[  127.694253]  dump_stack_lvl+0x64/0x7c
[  127.695395]  print_report+0x144/0x6a8
[  127.696452]  kasan_report+0xb0/0x160
[  127.698703]  __asan_store1+0x6c/0x70
[  127.699830]  krealloc_less_oob_helper+0x1c8/0x4b8
[  127.701226]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.702532]  kunit_try_run_case+0x80/0x184
[  127.704140]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.705699]  kthread+0x16c/0x21c
[  127.707043]  ret_from_fork+0x10/0x20
[  127.708238] 
[  127.708841] The buggy address belongs to the physical page:
[  127.710057] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.711916] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.713612] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.715884] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.717569] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.719052] page dumped because: kasan: bad access detected
[  127.720476] 
[  127.720969] Memory state around the buggy address:
[  127.722471]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.724057]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.725635] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.727056]                                                     ^
[  127.728571]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.730326]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.731803] ==================================================================

test log snippet boot parser 32

Home

[  127.087451] ==================================================================
[  127.089897] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[  127.091849] Write of size 1 at addr ffff0000c53b72c9 by task kunit_try_catch/131
[  127.093763] 
[  127.094549] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.096609] Hardware name: linux,dummy-virt (DT)
[  127.097754] Call trace:
[  127.098491]  dump_backtrace+0xf8/0x118
[  127.100078]  show_stack+0x18/0x24
[  127.101319]  dump_stack_lvl+0x64/0x7c
[  127.102475]  print_report+0x144/0x6a8
[  127.103564]  kasan_report+0xb0/0x160
[  127.104994]  __asan_store1+0x6c/0x70
[  127.105939]  krealloc_less_oob_helper+0x104/0x4b8
[  127.107342]  krealloc_less_oob+0x18/0x24
[  127.108557]  kunit_try_run_case+0x80/0x184
[  127.109964]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.111616]  kthread+0x16c/0x21c
[  127.112746]  ret_from_fork+0x10/0x20
[  127.113361] 
[  127.113707] Allocated by task 131:
[  127.114306]  kasan_set_track+0x4c/0x80
[  127.115205]  kasan_save_alloc_info+0x28/0x34
[  127.116484]  __kasan_krealloc+0xcc/0xf8
[  127.118107]  krealloc+0x150/0x274
[  127.119204]  krealloc_less_oob_helper+0x9c/0x4b8
[  127.120806]  krealloc_less_oob+0x18/0x24
[  127.121981]  kunit_try_run_case+0x80/0x184
[  127.123197]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.124747]  kthread+0x16c/0x21c
[  127.125727]  ret_from_fork+0x10/0x20
[  127.127065] 
[  127.127593] The buggy address belongs to the object at ffff0000c53b7200
[  127.127593]  which belongs to the cache kmalloc-256 of size 256
[  127.130267] The buggy address is located 201 bytes inside of
[  127.130267]  256-byte region [ffff0000c53b7200, ffff0000c53b7300)
[  127.133083] 
[  127.133872] The buggy address belongs to the physical page:
[  127.135184] page:00000000eca63956 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b6
[  127.137245] head:00000000eca63956 order:1 compound_mapcount:0 compound_pincount:0
[  127.138858] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.140961] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.142855] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.144445] page dumped because: kasan: bad access detected
[  127.145344] 
[  127.145915] Memory state around the buggy address:
[  127.147028]  ffff0000c53b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.148766]  ffff0000c53b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.150357] >ffff0000c53b7280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  127.152170]                                               ^
[  127.153401]  ffff0000c53b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.154950]  ffff0000c53b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.156739] ==================================================================

test log snippet boot parser 33

Home

[  127.632489] ==================================================================
[  127.634083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[  127.635952] Write of size 1 at addr ffff0000c59f20d0 by task kunit_try_catch/133
[  127.637436] 
[  127.638011] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.639921] Hardware name: linux,dummy-virt (DT)
[  127.640909] Call trace:
[  127.641458]  dump_backtrace+0xf8/0x118
[  127.642264]  show_stack+0x18/0x24
[  127.643402]  dump_stack_lvl+0x64/0x7c
[  127.644730]  print_report+0x144/0x6a8
[  127.645827]  kasan_report+0xb0/0x160
[  127.646915]  __asan_store1+0x6c/0x70
[  127.648002]  krealloc_less_oob_helper+0x158/0x4b8
[  127.649329]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.650679]  kunit_try_run_case+0x80/0x184
[  127.651943]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.653371]  kthread+0x16c/0x21c
[  127.654487]  ret_from_fork+0x10/0x20
[  127.655608] 
[  127.656056] The buggy address belongs to the physical page:
[  127.657239] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.659095] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.660600] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.662303] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.663946] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.665489] page dumped because: kasan: bad access detected
[  127.666615] 
[  127.667149] Memory state around the buggy address:
[  127.668361]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.669940]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.671412] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.672826]                                                  ^
[  127.674224]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.675719]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.677115] ==================================================================

test log snippet boot parser 34

Home

[  127.734316] ==================================================================
[  127.735549] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x218/0x4b8
[  127.738501] Write of size 1 at addr ffff0000c59f20ea by task kunit_try_catch/133
[  127.740023] 
[  127.741221] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.742928] Hardware name: linux,dummy-virt (DT)
[  127.743961] Call trace:
[  127.744723]  dump_backtrace+0xf8/0x118
[  127.745780]  show_stack+0x18/0x24
[  127.746983]  dump_stack_lvl+0x64/0x7c
[  127.748467]  print_report+0x144/0x6a8
[  127.749618]  kasan_report+0xb0/0x160
[  127.750679]  __asan_store1+0x6c/0x70
[  127.751828]  krealloc_less_oob_helper+0x218/0x4b8
[  127.753530]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.755093]  kunit_try_run_case+0x80/0x184
[  127.756612]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.758157]  kthread+0x16c/0x21c
[  127.759226]  ret_from_fork+0x10/0x20
[  127.761344] 
[  127.761860] The buggy address belongs to the physical page:
[  127.763120] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.765048] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.766600] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.768273] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.770113] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.772260] page dumped because: kasan: bad access detected
[  127.773433] 
[  127.774021] Memory state around the buggy address:
[  127.775130]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.776955]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.778708] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.780512]                                                           ^
[  127.782027]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.783657]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.785284] ==================================================================

test log snippet boot parser 35

Home

[  127.162107] ==================================================================
[  127.163675] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[  127.166033] Write of size 1 at addr ffff0000c53b72d0 by task kunit_try_catch/131
[  127.168346] 
[  127.169040] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.170851] Hardware name: linux,dummy-virt (DT)
[  127.171976] Call trace:
[  127.172747]  dump_backtrace+0xf8/0x118
[  127.173872]  show_stack+0x18/0x24
[  127.174503]  dump_stack_lvl+0x64/0x7c
[  127.175945]  print_report+0x144/0x6a8
[  127.177123]  kasan_report+0xb0/0x160
[  127.178320]  __asan_store1+0x6c/0x70
[  127.179531]  krealloc_less_oob_helper+0x158/0x4b8
[  127.181137]  krealloc_less_oob+0x18/0x24
[  127.182394]  kunit_try_run_case+0x80/0x184
[  127.183807]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.185216]  kthread+0x16c/0x21c
[  127.186289]  ret_from_fork+0x10/0x20
[  127.187288] 
[  127.187832] Allocated by task 131:
[  127.189013]  kasan_set_track+0x4c/0x80
[  127.190039]  kasan_save_alloc_info+0x28/0x34
[  127.191391]  __kasan_krealloc+0xcc/0xf8
[  127.193278]  krealloc+0x150/0x274
[  127.194296]  krealloc_less_oob_helper+0x9c/0x4b8
[  127.196085]  krealloc_less_oob+0x18/0x24
[  127.197394]  kunit_try_run_case+0x80/0x184
[  127.198564]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.200129]  kthread+0x16c/0x21c
[  127.201115]  ret_from_fork+0x10/0x20
[  127.202031] 
[  127.202548] The buggy address belongs to the object at ffff0000c53b7200
[  127.202548]  which belongs to the cache kmalloc-256 of size 256
[  127.205519] The buggy address is located 208 bytes inside of
[  127.205519]  256-byte region [ffff0000c53b7200, ffff0000c53b7300)
[  127.207983] 
[  127.208465] The buggy address belongs to the physical page:
[  127.210116] page:00000000eca63956 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b6
[  127.211999] head:00000000eca63956 order:1 compound_mapcount:0 compound_pincount:0
[  127.214165] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.216733] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.218654] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.220439] page dumped because: kasan: bad access detected
[  127.221690] 
[  127.222201] Memory state around the buggy address:
[  127.223324]  ffff0000c53b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.225054]  ffff0000c53b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.226763] >ffff0000c53b7280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  127.228311]                                                  ^
[  127.229693]  ffff0000c53b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.231334]  ffff0000c53b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.232803] ==================================================================

test log snippet boot parser 36

Home

[  127.235719] ==================================================================
[  127.237121] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c8/0x4b8
[  127.239112] Write of size 1 at addr ffff0000c53b72da by task kunit_try_catch/131
[  127.240768] 
[  127.241423] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.243643] Hardware name: linux,dummy-virt (DT)
[  127.245222] Call trace:
[  127.246028]  dump_backtrace+0xf8/0x118
[  127.248058]  show_stack+0x18/0x24
[  127.248979]  dump_stack_lvl+0x64/0x7c
[  127.250345]  print_report+0x144/0x6a8
[  127.251556]  kasan_report+0xb0/0x160
[  127.252878]  __asan_store1+0x6c/0x70
[  127.254200]  krealloc_less_oob_helper+0x1c8/0x4b8
[  127.255626]  krealloc_less_oob+0x18/0x24
[  127.257029]  kunit_try_run_case+0x80/0x184
[  127.258442]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.260496]  kthread+0x16c/0x21c
[  127.261772]  ret_from_fork+0x10/0x20
[  127.262934] 
[  127.263414] Allocated by task 131:
[  127.264497]  kasan_set_track+0x4c/0x80
[  127.265406]  kasan_save_alloc_info+0x28/0x34
[  127.267098]  __kasan_krealloc+0xcc/0xf8
[  127.268560]  krealloc+0x150/0x274
[  127.270091]  krealloc_less_oob_helper+0x9c/0x4b8
[  127.271427]  krealloc_less_oob+0x18/0x24
[  127.272640]  kunit_try_run_case+0x80/0x184
[  127.273943]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.275397]  kthread+0x16c/0x21c
[  127.276652]  ret_from_fork+0x10/0x20
[  127.277677] 
[  127.278233] The buggy address belongs to the object at ffff0000c53b7200
[  127.278233]  which belongs to the cache kmalloc-256 of size 256
[  127.281632] The buggy address is located 218 bytes inside of
[  127.281632]  256-byte region [ffff0000c53b7200, ffff0000c53b7300)
[  127.285061] 
[  127.285772] The buggy address belongs to the physical page:
[  127.286990] page:00000000eca63956 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b6
[  127.289071] head:00000000eca63956 order:1 compound_mapcount:0 compound_pincount:0
[  127.290965] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.292745] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.294779] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.296482] page dumped because: kasan: bad access detected
[  127.297321] 
[  127.297891] Memory state around the buggy address:
[  127.298771]  ffff0000c53b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.300863]  ffff0000c53b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.302424] >ffff0000c53b7280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  127.304195]                                                     ^
[  127.305656]  ffff0000c53b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.307319]  ffff0000c53b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.309089] ==================================================================

test log snippet boot parser 37

Home

[  127.787599] ==================================================================
[  127.788977] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x264/0x4b8
[  127.790815] Write of size 1 at addr ffff0000c59f20eb by task kunit_try_catch/133
[  127.793380] 
[  127.794141] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.795928] Hardware name: linux,dummy-virt (DT)
[  127.797052] Call trace:
[  127.797839]  dump_backtrace+0xf8/0x118
[  127.799107]  show_stack+0x18/0x24
[  127.800328]  dump_stack_lvl+0x64/0x7c
[  127.802401]  print_report+0x144/0x6a8
[  127.803350]  kasan_report+0xb0/0x160
[  127.804519]  __asan_store1+0x6c/0x70
[  127.805665]  krealloc_less_oob_helper+0x264/0x4b8
[  127.807022]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.808446]  kunit_try_run_case+0x80/0x184
[  127.809717]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.811511]  kthread+0x16c/0x21c
[  127.812629]  ret_from_fork+0x10/0x20
[  127.813693] 
[  127.814213] The buggy address belongs to the physical page:
[  127.815405] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.817257] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.818811] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.821207] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.822921] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.825048] page dumped because: kasan: bad access detected
[  127.826357] 
[  127.826944] Memory state around the buggy address:
[  127.828150]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.829792]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.831327] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.832989]                                                           ^
[  127.834347]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.835812]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.837197] ==================================================================

test log snippet boot parser 38

Home

[  127.312515] ==================================================================
[  127.314170] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x218/0x4b8
[  127.316116] Write of size 1 at addr ffff0000c53b72ea by task kunit_try_catch/131
[  127.318674] 
[  127.319674] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.321839] Hardware name: linux,dummy-virt (DT)
[  127.323116] Call trace:
[  127.324156]  dump_backtrace+0xf8/0x118
[  127.325313]  show_stack+0x18/0x24
[  127.326517]  dump_stack_lvl+0x64/0x7c
[  127.327876]  print_report+0x144/0x6a8
[  127.329323]  kasan_report+0xb0/0x160
[  127.330652]  __asan_store1+0x6c/0x70
[  127.332161]  krealloc_less_oob_helper+0x218/0x4b8
[  127.333471]  krealloc_less_oob+0x18/0x24
[  127.334687]  kunit_try_run_case+0x80/0x184
[  127.335949]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.337665]  kthread+0x16c/0x21c
[  127.338708]  ret_from_fork+0x10/0x20
[  127.339985] 
[  127.340465] Allocated by task 131:
[  127.341633]  kasan_set_track+0x4c/0x80
[  127.342797]  kasan_save_alloc_info+0x28/0x34
[  127.344166]  __kasan_krealloc+0xcc/0xf8
[  127.346152]  krealloc+0x150/0x274
[  127.347327]  krealloc_less_oob_helper+0x9c/0x4b8
[  127.348713]  krealloc_less_oob+0x18/0x24
[  127.349849]  kunit_try_run_case+0x80/0x184
[  127.351126]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.352883]  kthread+0x16c/0x21c
[  127.353991]  ret_from_fork+0x10/0x20
[  127.355414] 
[  127.356165] The buggy address belongs to the object at ffff0000c53b7200
[  127.356165]  which belongs to the cache kmalloc-256 of size 256
[  127.358512] The buggy address is located 234 bytes inside of
[  127.358512]  256-byte region [ffff0000c53b7200, ffff0000c53b7300)
[  127.361476] 
[  127.362051] The buggy address belongs to the physical page:
[  127.363283] page:00000000eca63956 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b6
[  127.365443] head:00000000eca63956 order:1 compound_mapcount:0 compound_pincount:0
[  127.366897] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.368789] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.370680] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.372456] page dumped because: kasan: bad access detected
[  127.373765] 
[  127.374234] Memory state around the buggy address:
[  127.375647]  ffff0000c53b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.377647]  ffff0000c53b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.379356] >ffff0000c53b7280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  127.381120]                                                           ^
[  127.382680]  ffff0000c53b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.384121]  ffff0000c53b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.386381] ==================================================================

test log snippet boot parser 39

Home

[  127.388760] ==================================================================
[  127.391171] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x264/0x4b8
[  127.394035] Write of size 1 at addr ffff0000c53b72eb by task kunit_try_catch/131
[  127.395539] 
[  127.396246] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.398653] Hardware name: linux,dummy-virt (DT)
[  127.400239] Call trace:
[  127.401345]  dump_backtrace+0xf8/0x118
[  127.402727]  show_stack+0x18/0x24
[  127.403997]  dump_stack_lvl+0x64/0x7c
[  127.404979]  print_report+0x144/0x6a8
[  127.406229]  kasan_report+0xb0/0x160
[  127.407348]  __asan_store1+0x6c/0x70
[  127.408403]  krealloc_less_oob_helper+0x264/0x4b8
[  127.409860]  krealloc_less_oob+0x18/0x24
[  127.411179]  kunit_try_run_case+0x80/0x184
[  127.413034]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.414378]  kthread+0x16c/0x21c
[  127.415230]  ret_from_fork+0x10/0x20
[  127.416595] 
[  127.417245] Allocated by task 131:
[  127.418828]  kasan_set_track+0x4c/0x80
[  127.420133]  kasan_save_alloc_info+0x28/0x34
[  127.421685]  __kasan_krealloc+0xcc/0xf8
[  127.422914]  krealloc+0x150/0x274
[  127.424500]  krealloc_less_oob_helper+0x9c/0x4b8
[  127.426252]  krealloc_less_oob+0x18/0x24
[  127.427491]  kunit_try_run_case+0x80/0x184
[  127.429123]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.430495]  kthread+0x16c/0x21c
[  127.431638]  ret_from_fork+0x10/0x20
[  127.432740] 
[  127.433160] The buggy address belongs to the object at ffff0000c53b7200
[  127.433160]  which belongs to the cache kmalloc-256 of size 256
[  127.435802] The buggy address is located 235 bytes inside of
[  127.435802]  256-byte region [ffff0000c53b7200, ffff0000c53b7300)
[  127.438138] 
[  127.438822] The buggy address belongs to the physical page:
[  127.440182] page:00000000eca63956 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b6
[  127.442664] head:00000000eca63956 order:1 compound_mapcount:0 compound_pincount:0
[  127.444132] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.446119] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.447989] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.450050] page dumped because: kasan: bad access detected
[  127.451203] 
[  127.452053] Memory state around the buggy address:
[  127.453561]  ffff0000c53b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.455260]  ffff0000c53b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.457011] >ffff0000c53b7280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  127.458119]                                                           ^
[  127.459332]  ffff0000c53b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.461197]  ffff0000c53b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.463167] ==================================================================

test log snippet boot parser 40

Home

[  127.526478] ==================================================================
[  127.528392] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[  127.530403] Write of size 1 at addr ffff0000c59f20f0 by task kunit_try_catch/132
[  127.532252] 
[  127.532827] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.534763] Hardware name: linux,dummy-virt (DT)
[  127.535874] Call trace:
[  127.536415]  dump_backtrace+0xf8/0x118
[  127.537941]  show_stack+0x18/0x24
[  127.539197]  dump_stack_lvl+0x64/0x7c
[  127.540321]  print_report+0x144/0x6a8
[  127.541411]  kasan_report+0xb0/0x160
[  127.542485]  __asan_store1+0x6c/0x70
[  127.543560]  krealloc_more_oob_helper+0x17c/0x2a4
[  127.544938]  krealloc_pagealloc_more_oob+0x18/0x24
[  127.546246]  kunit_try_run_case+0x80/0x184
[  127.547327]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.548980]  kthread+0x16c/0x21c
[  127.550045]  ret_from_fork+0x10/0x20
[  127.551249] 
[  127.551765] The buggy address belongs to the physical page:
[  127.553124] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.555466] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.556836] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.558749] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.560612] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.562745] page dumped because: kasan: bad access detected
[  127.563977] 
[  127.564620] Memory state around the buggy address:
[  127.565808]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.567361]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.569261] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  127.571015]                                                              ^
[  127.572455]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.573988]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.575382] ==================================================================

test log snippet boot parser 41

Home

[  126.929761] ==================================================================
[  126.932056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[  126.934654] Write of size 1 at addr ffff0000c57b00eb by task kunit_try_catch/130
[  126.937410] 
[  126.938198] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.940213] Hardware name: linux,dummy-virt (DT)
[  126.941317] Call trace:
[  126.942219]  dump_backtrace+0xf8/0x118
[  126.944281]  show_stack+0x18/0x24
[  126.945551]  dump_stack_lvl+0x64/0x7c
[  126.946806]  print_report+0x144/0x6a8
[  126.948335]  kasan_report+0xb0/0x160
[  126.949486]  __asan_store1+0x6c/0x70
[  126.950728]  krealloc_more_oob_helper+0x12c/0x2a4
[  126.952611]  krealloc_more_oob+0x18/0x24
[  126.953646]  kunit_try_run_case+0x80/0x184
[  126.954975]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.956514]  kthread+0x16c/0x21c
[  126.957847]  ret_from_fork+0x10/0x20
[  126.959285] 
[  126.959810] Allocated by task 130:
[  126.961076]  kasan_set_track+0x4c/0x80
[  126.962636]  kasan_save_alloc_info+0x28/0x34
[  126.963951]  __kasan_krealloc+0xcc/0xf8
[  126.964912]  krealloc+0x150/0x274
[  126.966461]  krealloc_more_oob_helper+0x9c/0x2a4
[  126.967924]  krealloc_more_oob+0x18/0x24
[  126.969124]  kunit_try_run_case+0x80/0x184
[  126.969996]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.971946]  kthread+0x16c/0x21c
[  126.973911]  ret_from_fork+0x10/0x20
[  126.975101] 
[  126.976001] The buggy address belongs to the object at ffff0000c57b0000
[  126.976001]  which belongs to the cache kmalloc-256 of size 256
[  126.978263] The buggy address is located 235 bytes inside of
[  126.978263]  256-byte region [ffff0000c57b0000, ffff0000c57b0100)
[  126.981013] 
[  126.981701] The buggy address belongs to the physical page:
[  126.982565] page:00000000f6cb15b8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[  126.984839] head:00000000f6cb15b8 order:1 compound_mapcount:0 compound_pincount:0
[  126.986709] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.989033] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.990861] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.992738] page dumped because: kasan: bad access detected
[  126.994447] 
[  126.994918] Memory state around the buggy address:
[  126.996107]  ffff0000c57aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.998641]  ffff0000c57b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.000283] >ffff0000c57b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  127.001877]                                                           ^
[  127.003300]  ffff0000c57b0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.005761]  ffff0000c57b0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.007463] ==================================================================

test log snippet boot parser 42

Home

[  127.009919] ==================================================================
[  127.011101] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[  127.012989] Write of size 1 at addr ffff0000c57b00f0 by task kunit_try_catch/130
[  127.014427] 
[  127.015122] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.017047] Hardware name: linux,dummy-virt (DT)
[  127.018288] Call trace:
[  127.018856]  dump_backtrace+0xf8/0x118
[  127.020292]  show_stack+0x18/0x24
[  127.021518]  dump_stack_lvl+0x64/0x7c
[  127.022659]  print_report+0x144/0x6a8
[  127.024164]  kasan_report+0xb0/0x160
[  127.025181]  __asan_store1+0x6c/0x70
[  127.026308]  krealloc_more_oob_helper+0x17c/0x2a4
[  127.027705]  krealloc_more_oob+0x18/0x24
[  127.028789]  kunit_try_run_case+0x80/0x184
[  127.030166]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.032171]  kthread+0x16c/0x21c
[  127.033223]  ret_from_fork+0x10/0x20
[  127.034454] 
[  127.034985] Allocated by task 130:
[  127.035863]  kasan_set_track+0x4c/0x80
[  127.037058]  kasan_save_alloc_info+0x28/0x34
[  127.038389]  __kasan_krealloc+0xcc/0xf8
[  127.039698]  krealloc+0x150/0x274
[  127.041053]  krealloc_more_oob_helper+0x9c/0x2a4
[  127.042506]  krealloc_more_oob+0x18/0x24
[  127.043760]  kunit_try_run_case+0x80/0x184
[  127.045528]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.046581]  kthread+0x16c/0x21c
[  127.047863]  ret_from_fork+0x10/0x20
[  127.049633] 
[  127.050286] The buggy address belongs to the object at ffff0000c57b0000
[  127.050286]  which belongs to the cache kmalloc-256 of size 256
[  127.053008] The buggy address is located 240 bytes inside of
[  127.053008]  256-byte region [ffff0000c57b0000, ffff0000c57b0100)
[  127.055022] 
[  127.055650] The buggy address belongs to the physical page:
[  127.057442] page:00000000f6cb15b8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[  127.059411] head:00000000f6cb15b8 order:1 compound_mapcount:0 compound_pincount:0
[  127.061274] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.063124] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.064879] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.066374] page dumped because: kasan: bad access detected
[  127.067517] 
[  127.068011] Memory state around the buggy address:
[  127.069198]  ffff0000c57aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.070709]  ffff0000c57b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.072482] >ffff0000c57b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  127.073938]                                                              ^
[  127.075355]  ffff0000c57b0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.076633]  ffff0000c57b0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.078830] ==================================================================

test log snippet boot parser 43

Home

[  127.473668] ==================================================================
[  127.475985] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[  127.477965] Write of size 1 at addr ffff0000c59f20eb by task kunit_try_catch/132
[  127.479854] 
[  127.480324] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.482915] Hardware name: linux,dummy-virt (DT)
[  127.483927] Call trace:
[  127.484651]  dump_backtrace+0xf8/0x118
[  127.485830]  show_stack+0x18/0x24
[  127.486956]  dump_stack_lvl+0x64/0x7c
[  127.488123]  print_report+0x144/0x6a8
[  127.490030]  kasan_report+0xb0/0x160
[  127.491146]  __asan_store1+0x6c/0x70
[  127.492255]  krealloc_more_oob_helper+0x12c/0x2a4
[  127.493619]  krealloc_pagealloc_more_oob+0x18/0x24
[  127.494900]  kunit_try_run_case+0x80/0x184
[  127.496269]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.497555]  kthread+0x16c/0x21c
[  127.498740]  ret_from_fork+0x10/0x20
[  127.499816] 
[  127.500350] The buggy address belongs to the physical page:
[  127.501524] page:00000000a7b4f5c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  127.503391] head:00000000a7b4f5c6 order:2 compound_mapcount:0 compound_pincount:0
[  127.504908] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.506884] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.508711] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.510531] page dumped because: kasan: bad access detected
[  127.512090] 
[  127.513259] Memory state around the buggy address:
[  127.514363]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.515936]  ffff0000c59f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.517567] >ffff0000c59f2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  127.519035]                                                           ^
[  127.520769]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.522146]  ffff0000c59f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.523868] ==================================================================

test log snippet boot parser 44

Home

[  129.860879] ==================================================================
[  129.863648] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164
[  129.865862] Read of size 1 at addr ffff0000c59d3080 by task kunit_try_catch/158
[  129.867282] 
[  129.868149] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.870352] Hardware name: linux,dummy-virt (DT)
[  129.871694] Call trace:
[  129.872534]  dump_backtrace+0xf8/0x118
[  129.873830]  show_stack+0x18/0x24
[  129.875012]  dump_stack_lvl+0x64/0x7c
[  129.876279]  print_report+0x144/0x6a8
[  129.877174]  kasan_report+0xb0/0x160
[  129.878460]  __asan_load1+0x6c/0x70
[  129.879522]  ksize_unpoisons_memory+0xb8/0x164
[  129.880892]  kunit_try_run_case+0x80/0x184
[  129.882360]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.884265]  kthread+0x16c/0x21c
[  129.885277]  ret_from_fork+0x10/0x20
[  129.886476] 
[  129.887018] Allocated by task 158:
[  129.888083]  kasan_set_track+0x4c/0x80
[  129.889424]  kasan_save_alloc_info+0x28/0x34
[  129.890737]  __kasan_kmalloc+0x88/0xa0
[  129.891982]  kmalloc_trace+0x54/0x68
[  129.893837]  ksize_unpoisons_memory+0x48/0x164
[  129.895213]  kunit_try_run_case+0x80/0x184
[  129.896460]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.898000]  kthread+0x16c/0x21c
[  129.899315]  ret_from_fork+0x10/0x20
[  129.900430] 
[  129.900948] The buggy address belongs to the object at ffff0000c59d3000
[  129.900948]  which belongs to the cache kmalloc-128 of size 128
[  129.903175] The buggy address is located 0 bytes to the right of
[  129.903175]  128-byte region [ffff0000c59d3000, ffff0000c59d3080)
[  129.906124] 
[  129.906802] The buggy address belongs to the physical page:
[  129.908641] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  129.909808] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.911640] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.913381] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.915401] page dumped because: kasan: bad access detected
[  129.916952] 
[  129.917503] Memory state around the buggy address:
[  129.918818]  ffff0000c59d2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.920794]  ffff0000c59d3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.922361] >ffff0000c59d3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.923961]                    ^
[  129.925303]  ffff0000c59d3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.927246]  ffff0000c59d3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.929167] ==================================================================

test log snippet boot parser 45

Home

[  130.507468] ==================================================================
[  130.509976] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64
[  130.511595] Read of size 1 at addr ffff0000c59d3718 by task kunit_try_catch/163
[  130.513873] 
[  130.514409] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.516327] Hardware name: linux,dummy-virt (DT)
[  130.517386] Call trace:
[  130.518747]  dump_backtrace+0xf8/0x118
[  130.520292]  show_stack+0x18/0x24
[  130.521407]  dump_stack_lvl+0x64/0x7c
[  130.522629]  print_report+0x144/0x6a8
[  130.523889]  kasan_report+0xb0/0x160
[  130.525084]  __asan_load1+0x6c/0x70
[  130.526189]  memchr+0x34/0x64
[  130.527206]  kasan_memchr+0xa8/0x158
[  130.528553]  kunit_try_run_case+0x80/0x184
[  130.529826]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.531272]  kthread+0x16c/0x21c
[  130.532394]  ret_from_fork+0x10/0x20
[  130.534082] 
[  130.534555] Allocated by task 163:
[  130.535477]  kasan_set_track+0x4c/0x80
[  130.536911]  kasan_save_alloc_info+0x28/0x34
[  130.538078]  __kasan_kmalloc+0x88/0xa0
[  130.539171]  kmalloc_trace+0x54/0x68
[  130.540299]  kasan_memchr+0x48/0x158
[  130.541431]  kunit_try_run_case+0x80/0x184
[  130.543197]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.544608]  kthread+0x16c/0x21c
[  130.545778]  ret_from_fork+0x10/0x20
[  130.546894] 
[  130.547409] The buggy address belongs to the object at ffff0000c59d3700
[  130.547409]  which belongs to the cache kmalloc-128 of size 128
[  130.550144] The buggy address is located 24 bytes inside of
[  130.550144]  128-byte region [ffff0000c59d3700, ffff0000c59d3780)
[  130.552762] 
[  130.553166] The buggy address belongs to the physical page:
[  130.554254] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.556389] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.558167] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.560343] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.561714] page dumped because: kasan: bad access detected
[  130.562941] 
[  130.563468] Memory state around the buggy address:
[  130.565168]  ffff0000c59d3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  130.566735]  ffff0000c59d3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.568725] >ffff0000c59d3700: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.570244]                             ^
[  130.571362]  ffff0000c59d3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.572845]  ffff0000c59d3800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.574429] ==================================================================

test log snippet boot parser 46

Home

[  130.583201] ==================================================================
[  130.584934] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8
[  130.586895] Read of size 1 at addr ffff0000c5a65318 by task kunit_try_catch/164
[  130.588626] 
[  130.589651] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.591494] Hardware name: linux,dummy-virt (DT)
[  130.593033] Call trace:
[  130.593902]  dump_backtrace+0xf8/0x118
[  130.595162]  show_stack+0x18/0x24
[  130.596331]  dump_stack_lvl+0x64/0x7c
[  130.597430]  print_report+0x144/0x6a8
[  130.598527]  kasan_report+0xb0/0x160
[  130.599655]  __asan_load1+0x6c/0x70
[  130.600876]  memcmp+0x8c/0xd8
[  130.602087]  kasan_memcmp+0xc8/0x178
[  130.603242]  kunit_try_run_case+0x80/0x184
[  130.605034]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.606299]  kthread+0x16c/0x21c
[  130.607478]  ret_from_fork+0x10/0x20
[  130.608708] 
[  130.609277] Allocated by task 164:
[  130.610201]  kasan_set_track+0x4c/0x80
[  130.611318]  kasan_save_alloc_info+0x28/0x34
[  130.612723]  __kasan_kmalloc+0x88/0xa0
[  130.613791]  kmalloc_trace+0x54/0x68
[  130.614978]  kasan_memcmp+0x58/0x178
[  130.616571]  kunit_try_run_case+0x80/0x184
[  130.617877]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.619332]  kthread+0x16c/0x21c
[  130.620817]  ret_from_fork+0x10/0x20
[  130.621820] 
[  130.622374] The buggy address belongs to the object at ffff0000c5a65300
[  130.622374]  which belongs to the cache kmalloc-128 of size 128
[  130.625057] The buggy address is located 24 bytes inside of
[  130.625057]  128-byte region [ffff0000c5a65300, ffff0000c5a65380)
[  130.626822] 
[  130.627345] The buggy address belongs to the physical page:
[  130.628926] page:000000003251ffd5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a65
[  130.630932] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.632867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.634413] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.636067] page dumped because: kasan: bad access detected
[  130.637343] 
[  130.637937] Memory state around the buggy address:
[  130.639018]  ffff0000c5a65200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  130.640478]  ffff0000c5a65280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.642454] >ffff0000c5a65300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.644210]                             ^
[  130.645339]  ffff0000c5a65380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.646926]  ffff0000c5a65400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.648439] ==================================================================

test log snippet boot parser 47

Home

[  132.453200] ==================================================================
[  132.455682] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4
[  132.457266] Read of size 1 at addr ffff0000c5a7a200 by task kunit_try_catch/168
[  132.458888] 
[  132.459362] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.461454] Hardware name: linux,dummy-virt (DT)
[  132.462497] Call trace:
[  132.463283]  dump_backtrace+0xf8/0x118
[  132.464945]  show_stack+0x18/0x24
[  132.466409]  dump_stack_lvl+0x64/0x7c
[  132.468703]  print_report+0x144/0x6a8
[  132.469769]  kasan_report+0xb0/0x160
[  132.470860]  __kasan_check_byte+0x3c/0x54
[  132.472195]  ksize+0x34/0x140
[  132.473283]  kfree_sensitive+0x1c/0xa4
[  132.474318]  kmalloc_double_kzfree+0xa4/0x144
[  132.475665]  kunit_try_run_case+0x80/0x184
[  132.477061]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.478509]  kthread+0x16c/0x21c
[  132.479750]  ret_from_fork+0x10/0x20
[  132.481018] 
[  132.481517] Allocated by task 168:
[  132.482322]  kasan_set_track+0x4c/0x80
[  132.483418]  kasan_save_alloc_info+0x28/0x34
[  132.484631]  __kasan_kmalloc+0x88/0xa0
[  132.485899]  kmalloc_trace+0x54/0x68
[  132.486693]  kmalloc_double_kzfree+0x48/0x144
[  132.488556]  kunit_try_run_case+0x80/0x184
[  132.490195]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.491926]  kthread+0x16c/0x21c
[  132.493534]  ret_from_fork+0x10/0x20
[  132.494802] 
[  132.495342] Freed by task 168:
[  132.496200]  kasan_set_track+0x4c/0x80
[  132.497519]  kasan_save_free_info+0x3c/0x60
[  132.498788]  ____kasan_slab_free+0xe8/0x140
[  132.500163]  __kasan_slab_free+0x18/0x28
[  132.502193]  __kmem_cache_free+0xdc/0x284
[  132.503450]  kfree_sensitive+0x88/0xa4
[  132.504782]  kmalloc_double_kzfree+0x90/0x144
[  132.506102]  kunit_try_run_case+0x80/0x184
[  132.507309]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.508854]  kthread+0x16c/0x21c
[  132.509986]  ret_from_fork+0x10/0x20
[  132.511037] 
[  132.511358] The buggy address belongs to the object at ffff0000c5a7a200
[  132.511358]  which belongs to the cache kmalloc-128 of size 128
[  132.513985] The buggy address is located 0 bytes inside of
[  132.513985]  128-byte region [ffff0000c5a7a200, ffff0000c5a7a280)
[  132.516854] 
[  132.517511] The buggy address belongs to the physical page:
[  132.518709] page:00000000b107010f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[  132.520670] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  132.522476] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  132.524893] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  132.526418] page dumped because: kasan: bad access detected
[  132.527530] 
[  132.528203] Memory state around the buggy address:
[  132.529752]  ffff0000c5a7a100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.531414]  ffff0000c5a7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.533124] >ffff0000c5a7a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  132.534596]                    ^
[  132.535746]  ffff0000c5a7a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.537313]  ffff0000c5a7a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  132.538962] ==================================================================

test log snippet boot parser 48

Home

[  126.670978] ==================================================================
[  126.673709] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c
[  126.675396] Read of size 1 at addr ffff0000c59f0000 by task kunit_try_catch/125
[  126.677220] 
[  126.678209] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.680262] Hardware name: linux,dummy-virt (DT)
[  126.681314] Call trace:
[  126.682103]  dump_backtrace+0xf8/0x118
[  126.683871]  show_stack+0x18/0x24
[  126.685449]  dump_stack_lvl+0x64/0x7c
[  126.686519]  print_report+0x144/0x6a8
[  126.687617]  kasan_report+0xb0/0x160
[  126.688763]  __asan_load1+0x6c/0x70
[  126.689729]  kmalloc_pagealloc_uaf+0x88/0x12c
[  126.690879]  kunit_try_run_case+0x80/0x184
[  126.692413]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.693891]  kthread+0x16c/0x21c
[  126.695242]  ret_from_fork+0x10/0x20
[  126.696547] 
[  126.697026] The buggy address belongs to the physical page:
[  126.698414] page:00000000a7b4f5c6 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[  126.700329] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  126.702058] raw: 0bfffc0000000000 fffffc0003167d08 ffff0000daf64f78 0000000000000000
[  126.703487] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  126.705276] page dumped because: kasan: bad access detected
[  126.706350] 
[  126.706942] Memory state around the buggy address:
[  126.708065]  ffff0000c59eff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.709617]  ffff0000c59eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.711236] >ffff0000c59f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.713096]                    ^
[  126.714079]  ffff0000c59f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.715747]  ffff0000c59f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.717226] ==================================================================

test log snippet boot parser 49

Home

[  128.738372] ==================================================================
[  128.740978] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148
[  128.742652] Read of size 1 at addr ffff0000c58e6e08 by task kunit_try_catch/144
[  128.744747] 
[  128.745552] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.747426] Hardware name: linux,dummy-virt (DT)
[  128.748968] Call trace:
[  128.749842]  dump_backtrace+0xf8/0x118
[  128.751140]  show_stack+0x18/0x24
[  128.752489]  dump_stack_lvl+0x64/0x7c
[  128.753629]  print_report+0x144/0x6a8
[  128.754692]  kasan_report+0xb0/0x160
[  128.755864]  __asan_load1+0x6c/0x70
[  128.756938]  kmalloc_uaf+0xa4/0x148
[  128.758418]  kunit_try_run_case+0x80/0x184
[  128.759903]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.761313]  kthread+0x16c/0x21c
[  128.762509]  ret_from_fork+0x10/0x20
[  128.763903] 
[  128.764607] Allocated by task 144:
[  128.765560]  kasan_set_track+0x4c/0x80
[  128.766692]  kasan_save_alloc_info+0x28/0x34
[  128.768030]  __kasan_kmalloc+0x88/0xa0
[  128.769130]  kmalloc_trace+0x54/0x68
[  128.770451]  kmalloc_uaf+0x48/0x148
[  128.771532]  kunit_try_run_case+0x80/0x184
[  128.773112]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.774673]  kthread+0x16c/0x21c
[  128.776095]  ret_from_fork+0x10/0x20
[  128.777258] 
[  128.777835] Freed by task 144:
[  128.778694]  kasan_set_track+0x4c/0x80
[  128.780350]  kasan_save_free_info+0x3c/0x60
[  128.781511]  ____kasan_slab_free+0xe8/0x140
[  128.782697]  __kasan_slab_free+0x18/0x28
[  128.783784]  __kmem_cache_free+0xdc/0x284
[  128.785174]  kfree+0x60/0x74
[  128.786174]  kmalloc_uaf+0x90/0x148
[  128.787256]  kunit_try_run_case+0x80/0x184
[  128.788447]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.789295]  kthread+0x16c/0x21c
[  128.789948]  ret_from_fork+0x10/0x20
[  128.790536] 
[  128.791421] The buggy address belongs to the object at ffff0000c58e6e00
[  128.791421]  which belongs to the cache kmalloc-128 of size 128
[  128.794599] The buggy address is located 8 bytes inside of
[  128.794599]  128-byte region [ffff0000c58e6e00, ffff0000c58e6e80)
[  128.797211] 
[  128.797827] The buggy address belongs to the physical page:
[  128.799005] page:00000000d0c29e4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e6
[  128.801032] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.802937] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.804914] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.806461] page dumped because: kasan: bad access detected
[  128.807622] 
[  128.808475] Memory state around the buggy address:
[  128.809685]  ffff0000c58e6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.811183]  ffff0000c58e6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.813188] >ffff0000c58e6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.814579]                       ^
[  128.815531]  ffff0000c58e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.817214]  ffff0000c58e6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.818776] ==================================================================

test log snippet boot parser 50

Home

[  128.919140] ==================================================================
[  128.921875] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8
[  128.923407] Read of size 1 at addr ffff0000c5a26328 by task kunit_try_catch/146
[  128.925496] 
[  128.926160] CPU: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.927980] Hardware name: linux,dummy-virt (DT)
[  128.929519] Call trace:
[  128.930443]  dump_backtrace+0xf8/0x118
[  128.931657]  show_stack+0x18/0x24
[  128.932999]  dump_stack_lvl+0x64/0x7c
[  128.934177]  print_report+0x144/0x6a8
[  128.935239]  kasan_report+0xb0/0x160
[  128.936361]  __asan_load1+0x6c/0x70
[  128.937431]  kmalloc_uaf2+0xfc/0x1e8
[  128.938839]  kunit_try_run_case+0x80/0x184
[  128.940429]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.941908]  kthread+0x16c/0x21c
[  128.942543]  ret_from_fork+0x10/0x20
[  128.943892] 
[  128.944613] Allocated by task 146:
[  128.945478]  kasan_set_track+0x4c/0x80
[  128.946593]  kasan_save_alloc_info+0x28/0x34
[  128.947807]  __kasan_kmalloc+0x88/0xa0
[  128.948746]  kmalloc_trace+0x54/0x68
[  128.949944]  kmalloc_uaf2+0x48/0x1e8
[  128.951088]  kunit_try_run_case+0x80/0x184
[  128.952472]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.954237]  kthread+0x16c/0x21c
[  128.955336]  ret_from_fork+0x10/0x20
[  128.956619] 
[  128.957151] Freed by task 146:
[  128.958086]  kasan_set_track+0x4c/0x80
[  128.959208]  kasan_save_free_info+0x3c/0x60
[  128.960507]  ____kasan_slab_free+0xe8/0x140
[  128.962108]  __kasan_slab_free+0x18/0x28
[  128.962978]  __kmem_cache_free+0xdc/0x284
[  128.964350]  kfree+0x60/0x74
[  128.965420]  kmalloc_uaf2+0x90/0x1e8
[  128.966720]  kunit_try_run_case+0x80/0x184
[  128.968037]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.969912]  kthread+0x16c/0x21c
[  128.971056]  ret_from_fork+0x10/0x20
[  128.972325] 
[  128.972750] The buggy address belongs to the object at ffff0000c5a26300
[  128.972750]  which belongs to the cache kmalloc-128 of size 128
[  128.975393] The buggy address is located 40 bytes inside of
[  128.975393]  128-byte region [ffff0000c5a26300, ffff0000c5a26380)
[  128.977875] 
[  128.978368] The buggy address belongs to the physical page:
[  128.979637] page:00000000b0e99772 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a26
[  128.981474] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.983560] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.985512] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.987012] page dumped because: kasan: bad access detected
[  128.988327] 
[  128.988948] Memory state around the buggy address:
[  128.990323]  ffff0000c5a26200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  128.992270]  ffff0000c5a26280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.993815] >ffff0000c5a26300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.995213]                                   ^
[  128.996670]  ffff0000c5a26380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.998255]  ffff0000c5a26400: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  129.000359] ==================================================================

test log snippet boot parser 51

Home

[  128.096787] ==================================================================
[  128.098784] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac
[  128.101857] Read of size 16 at addr ffff0000c5a29600 by task kunit_try_catch/136
[  128.104436] 
[  128.105729] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.107458] Hardware name: linux,dummy-virt (DT)
[  128.108998] Call trace:
[  128.110378]  dump_backtrace+0xf8/0x118
[  128.111566]  show_stack+0x18/0x24
[  128.112646]  dump_stack_lvl+0x64/0x7c
[  128.113901]  print_report+0x144/0x6a8
[  128.115033]  kasan_report+0xb0/0x160
[  128.116182]  kasan_check_range+0x260/0x2a0
[  128.118116]  memcpy+0x48/0x90
[  128.118972]  kmalloc_uaf_16+0x104/0x1ac
[  128.120374]  kunit_try_run_case+0x80/0x184
[  128.122049]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.123756]  kthread+0x16c/0x21c
[  128.124715]  ret_from_fork+0x10/0x20
[  128.126033] 
[  128.126848] Allocated by task 136:
[  128.127912]  kasan_set_track+0x4c/0x80
[  128.129027]  kasan_save_alloc_info+0x28/0x34
[  128.129938]  __kasan_kmalloc+0x88/0xa0
[  128.130972]  kmalloc_trace+0x54/0x68
[  128.132226]  kmalloc_uaf_16+0xa0/0x1ac
[  128.133429]  kunit_try_run_case+0x80/0x184
[  128.135091]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.137019]  kthread+0x16c/0x21c
[  128.137964]  ret_from_fork+0x10/0x20
[  128.139070] 
[  128.139538] Freed by task 136:
[  128.140750]  kasan_set_track+0x4c/0x80
[  128.142118]  kasan_save_free_info+0x3c/0x60
[  128.143499]  ____kasan_slab_free+0xe8/0x140
[  128.144874]  __kasan_slab_free+0x18/0x28
[  128.146143]  __kmem_cache_free+0xdc/0x284
[  128.147364]  kfree+0x60/0x74
[  128.148439]  kmalloc_uaf_16+0xe8/0x1ac
[  128.150168]  kunit_try_run_case+0x80/0x184
[  128.151415]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.153248]  kthread+0x16c/0x21c
[  128.154169]  ret_from_fork+0x10/0x20
[  128.155278] 
[  128.155787] The buggy address belongs to the object at ffff0000c5a29600
[  128.155787]  which belongs to the cache kmalloc-128 of size 128
[  128.158635] The buggy address is located 0 bytes inside of
[  128.158635]  128-byte region [ffff0000c5a29600, ffff0000c5a29680)
[  128.160838] 
[  128.161309] The buggy address belongs to the physical page:
[  128.163114] page:00000000ab36dc2d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a29
[  128.165669] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.167365] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.169199] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.170926] page dumped because: kasan: bad access detected
[  128.172376] 
[  128.173197] Memory state around the buggy address:
[  128.174875]  ffff0000c5a29500: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.176457]  ffff0000c5a29580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.178155] >ffff0000c5a29600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.179714]                    ^
[  128.181193]  ffff0000c5a29680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.182741]  ffff0000c5a29700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.184736] ==================================================================

test log snippet boot parser 52

Home

[  128.827046] ==================================================================
[  128.829464] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c
[  128.831403] Write of size 33 at addr ffff0000c5a35c00 by task kunit_try_catch/145
[  128.833501] 
[  128.834053] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.836195] Hardware name: linux,dummy-virt (DT)
[  128.837461] Call trace:
[  128.838189]  dump_backtrace+0xf8/0x118
[  128.839349]  show_stack+0x18/0x24
[  128.840632]  dump_stack_lvl+0x64/0x7c
[  128.841631]  print_report+0x144/0x6a8
[  128.842613]  kasan_report+0xb0/0x160
[  128.843852]  kasan_check_range+0x260/0x2a0
[  128.845360]  memset+0x40/0x70
[  128.846396]  kmalloc_uaf_memset+0xac/0x14c
[  128.847616]  kunit_try_run_case+0x80/0x184
[  128.848849]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.850492]  kthread+0x16c/0x21c
[  128.851627]  ret_from_fork+0x10/0x20
[  128.852769] 
[  128.853371] Allocated by task 145:
[  128.854572]  kasan_set_track+0x4c/0x80
[  128.856249]  kasan_save_alloc_info+0x28/0x34
[  128.857343]  __kasan_kmalloc+0x88/0xa0
[  128.858308]  kmalloc_trace+0x54/0x68
[  128.859423]  kmalloc_uaf_memset+0x48/0x14c
[  128.860542]  kunit_try_run_case+0x80/0x184
[  128.861833]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.863304]  kthread+0x16c/0x21c
[  128.864457]  ret_from_fork+0x10/0x20
[  128.865555] 
[  128.866754] Freed by task 145:
[  128.867480]  kasan_set_track+0x4c/0x80
[  128.869051]  kasan_save_free_info+0x3c/0x60
[  128.870280]  ____kasan_slab_free+0xe8/0x140
[  128.871441]  __kasan_slab_free+0x18/0x28
[  128.872565]  __kmem_cache_free+0xdc/0x284
[  128.874318]  kfree+0x60/0x74
[  128.875339]  kmalloc_uaf_memset+0x90/0x14c
[  128.876940]  kunit_try_run_case+0x80/0x184
[  128.878176]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  128.879622]  kthread+0x16c/0x21c
[  128.880648]  ret_from_fork+0x10/0x20
[  128.881965] 
[  128.882467] The buggy address belongs to the object at ffff0000c5a35c00
[  128.882467]  which belongs to the cache kmalloc-128 of size 128
[  128.884854] The buggy address is located 0 bytes inside of
[  128.884854]  128-byte region [ffff0000c5a35c00, ffff0000c5a35c80)
[  128.887040] 
[  128.887664] The buggy address belongs to the physical page:
[  128.888850] page:000000003f2e44e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a35
[  128.890782] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.892300] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.894550] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.896190] page dumped because: kasan: bad access detected
[  128.897998] 
[  128.898523] Memory state around the buggy address:
[  128.899661]  ffff0000c5a35b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.901202]  ffff0000c5a35b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.902949] >ffff0000c5a35c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.904646]                    ^
[  128.905734]  ffff0000c5a35c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.907362]  ffff0000c5a35d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.909013] ==================================================================

test log snippet boot parser 53

Home

[  130.403212] ==================================================================
[  130.405252] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144
[  130.407748] Read of size 1 at addr ffff0000c57b2180 by task kunit_try_catch/162
[  130.409693] 
[  130.410618] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.412511] Hardware name: linux,dummy-virt (DT)
[  130.413811] Call trace:
[  130.414506]  dump_backtrace+0xf8/0x118
[  130.415833]  show_stack+0x18/0x24
[  130.417026]  dump_stack_lvl+0x64/0x7c
[  130.418130]  print_report+0x144/0x6a8
[  130.419365]  kasan_report+0xb0/0x160
[  130.420514]  __kasan_check_byte+0x3c/0x54
[  130.421749]  kmem_cache_destroy+0x3c/0x14c
[  130.423182]  kmem_cache_double_destroy+0xa4/0x144
[  130.424565]  kunit_try_run_case+0x80/0x184
[  130.426214]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.427664]  kthread+0x16c/0x21c
[  130.428912]  ret_from_fork+0x10/0x20
[  130.430083] 
[  130.430666] Allocated by task 162:
[  130.431738]  kasan_set_track+0x4c/0x80
[  130.433063]  kasan_save_alloc_info+0x28/0x34
[  130.434120]  __kasan_slab_alloc+0x58/0x70
[  130.435297]  slab_post_alloc_hook+0x70/0x2f8
[  130.436995]  kmem_cache_alloc+0x168/0x260
[  130.438233]  kmem_cache_create_usercopy+0x108/0x29c
[  130.439539]  kmem_cache_create+0x1c/0x28
[  130.440874]  kmem_cache_double_destroy+0x48/0x144
[  130.442048]  kunit_try_run_case+0x80/0x184
[  130.443358]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.445162]  kthread+0x16c/0x21c
[  130.446333]  ret_from_fork+0x10/0x20
[  130.447430] 
[  130.448197] Freed by task 162:
[  130.449919]  kasan_set_track+0x4c/0x80
[  130.451036]  kasan_save_free_info+0x3c/0x60
[  130.452148]  ____kasan_slab_free+0xe8/0x140
[  130.453642]  __kasan_slab_free+0x18/0x28
[  130.454824]  kmem_cache_free+0xe0/0x358
[  130.456797]  slab_kmem_cache_release+0x30/0x40
[  130.457892]  kmem_cache_release+0x14/0x20
[  130.459248]  kobject_put+0xd8/0x140
[  130.460700]  sysfs_slab_release+0x28/0x34
[  130.462011]  kmem_cache_destroy+0x148/0x14c
[  130.463248]  kmem_cache_double_destroy+0x90/0x144
[  130.464558]  kunit_try_run_case+0x80/0x184
[  130.465918]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.467749]  kthread+0x16c/0x21c
[  130.468902]  ret_from_fork+0x10/0x20
[  130.470075] 
[  130.470541] The buggy address belongs to the object at ffff0000c57b2180
[  130.470541]  which belongs to the cache kmem_cache of size 216
[  130.473112] The buggy address is located 0 bytes inside of
[  130.473112]  216-byte region [ffff0000c57b2180, ffff0000c57b2258)
[  130.475427] 
[  130.476033] The buggy address belongs to the physical page:
[  130.477428] page:000000006249961c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b2
[  130.479847] head:000000006249961c order:1 compound_mapcount:0 compound_pincount:0
[  130.482066] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  130.483876] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[  130.485538] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[  130.487365] page dumped because: kasan: bad access detected
[  130.488777] 
[  130.489361] Memory state around the buggy address:
[  130.490500]  ffff0000c57b2080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  130.492205]  ffff0000c57b2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.493792] >ffff0000c57b2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.495442]                    ^
[  130.496392]  ffff0000c57b2200: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  130.497924]  ffff0000c57b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.499572] ==================================================================

test log snippet boot parser 54

Home

[  127.846937] ==================================================================
[  127.849342] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c
[  127.850907] Read of size 1 at addr ffff0000c57b0200 by task kunit_try_catch/134
[  127.852786] 
[  127.853527] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.855432] Hardware name: linux,dummy-virt (DT)
[  127.856625] Call trace:
[  127.857405]  dump_backtrace+0xf8/0x118
[  127.858674]  show_stack+0x18/0x24
[  127.859824]  dump_stack_lvl+0x64/0x7c
[  127.861033]  print_report+0x144/0x6a8
[  127.862207]  kasan_report+0xb0/0x160
[  127.863345]  __kasan_check_byte+0x3c/0x54
[  127.864549]  krealloc+0x54/0x274
[  127.865699]  krealloc_uaf+0xac/0x21c
[  127.866815]  kunit_try_run_case+0x80/0x184
[  127.868129]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.869653]  kthread+0x16c/0x21c
[  127.870645]  ret_from_fork+0x10/0x20
[  127.871803] 
[  127.872294] Allocated by task 134:
[  127.873228]  kasan_set_track+0x4c/0x80
[  127.874327]  kasan_save_alloc_info+0x28/0x34
[  127.875501]  __kasan_kmalloc+0x88/0xa0
[  127.876606]  kmalloc_trace+0x54/0x68
[  127.877722]  krealloc_uaf+0x48/0x21c
[  127.878821]  kunit_try_run_case+0x80/0x184
[  127.880072]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.881511]  kthread+0x16c/0x21c
[  127.882655]  ret_from_fork+0x10/0x20
[  127.883735] 
[  127.884282] Freed by task 134:
[  127.885172]  kasan_set_track+0x4c/0x80
[  127.886267]  kasan_save_free_info+0x3c/0x60
[  127.887480]  ____kasan_slab_free+0xe8/0x140
[  127.888643]  __kasan_slab_free+0x18/0x28
[  127.889787]  __kmem_cache_free+0xdc/0x284
[  127.890947]  kfree+0x60/0x74
[  127.891970]  krealloc_uaf+0x90/0x21c
[  127.893047]  kunit_try_run_case+0x80/0x184
[  127.894288]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.895757]  kthread+0x16c/0x21c
[  127.896859]  ret_from_fork+0x10/0x20
[  127.897987] 
[  127.898569] The buggy address belongs to the object at ffff0000c57b0200
[  127.898569]  which belongs to the cache kmalloc-256 of size 256
[  127.901020] The buggy address is located 0 bytes inside of
[  127.901020]  256-byte region [ffff0000c57b0200, ffff0000c57b0300)
[  127.903316] 
[  127.903996] The buggy address belongs to the physical page:
[  127.905201] page:00000000f6cb15b8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[  127.907020] head:00000000f6cb15b8 order:1 compound_mapcount:0 compound_pincount:0
[  127.908494] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.910263] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.911923] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.913406] page dumped because: kasan: bad access detected
[  127.914547] 
[  127.915079] Memory state around the buggy address:
[  127.916243]  ffff0000c57b0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.917684]  ffff0000c57b0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.919291] >ffff0000c57b0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.920744]                    ^
[  127.921649]  ffff0000c57b0280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.923134]  ffff0000c57b0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.924528] ==================================================================

test log snippet boot parser 55

Home

[  127.927128] ==================================================================
[  127.928559] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c
[  127.930272] Read of size 1 at addr ffff0000c57b0200 by task kunit_try_catch/134
[  127.932071] 
[  127.932623] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.934143] Hardware name: linux,dummy-virt (DT)
[  127.935360] Call trace:
[  127.936187]  dump_backtrace+0xf8/0x118
[  127.937500]  show_stack+0x18/0x24
[  127.938624]  dump_stack_lvl+0x64/0x7c
[  127.940345]  print_report+0x144/0x6a8
[  127.941418]  kasan_report+0xb0/0x160
[  127.942713]  __asan_load1+0x6c/0x70
[  127.943870]  krealloc_uaf+0xd0/0x21c
[  127.944940]  kunit_try_run_case+0x80/0x184
[  127.946216]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.947758]  kthread+0x16c/0x21c
[  127.949051]  ret_from_fork+0x10/0x20
[  127.949976] 
[  127.950466] Allocated by task 134:
[  127.951695]  kasan_set_track+0x4c/0x80
[  127.953002]  kasan_save_alloc_info+0x28/0x34
[  127.954079]  __kasan_kmalloc+0x88/0xa0
[  127.955230]  kmalloc_trace+0x54/0x68
[  127.956529]  krealloc_uaf+0x48/0x21c
[  127.958119]  kunit_try_run_case+0x80/0x184
[  127.959261]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.960871]  kthread+0x16c/0x21c
[  127.962154]  ret_from_fork+0x10/0x20
[  127.963335] 
[  127.963935] Freed by task 134:
[  127.964979]  kasan_set_track+0x4c/0x80
[  127.966047]  kasan_save_free_info+0x3c/0x60
[  127.967628]  ____kasan_slab_free+0xe8/0x140
[  127.968872]  __kasan_slab_free+0x18/0x28
[  127.970017]  __kmem_cache_free+0xdc/0x284
[  127.971209]  kfree+0x60/0x74
[  127.972232]  krealloc_uaf+0x90/0x21c
[  127.973335]  kunit_try_run_case+0x80/0x184
[  127.975471]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  127.976941]  kthread+0x16c/0x21c
[  127.978073]  ret_from_fork+0x10/0x20
[  127.979132] 
[  127.979602] The buggy address belongs to the object at ffff0000c57b0200
[  127.979602]  which belongs to the cache kmalloc-256 of size 256
[  127.982337] The buggy address is located 0 bytes inside of
[  127.982337]  256-byte region [ffff0000c57b0200, ffff0000c57b0300)
[  127.985162] 
[  127.985737] The buggy address belongs to the physical page:
[  127.986953] page:00000000f6cb15b8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[  127.988799] head:00000000f6cb15b8 order:1 compound_mapcount:0 compound_pincount:0
[  127.991227] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.993058] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.994733] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.996266] page dumped because: kasan: bad access detected
[  127.998601] 
[  127.999142] Memory state around the buggy address:
[  128.000173]  ffff0000c57b0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.001479]  ffff0000c57b0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.003266] >ffff0000c57b0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.004839]                    ^
[  128.006632]  ffff0000c57b0280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.008288]  ffff0000c57b0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.009847] ==================================================================

test log snippet boot parser 56

Home

[  130.101427] ==================================================================
[  130.103009] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c
[  130.104529] Read of size 1 at addr ffff0000c59d3178 by task kunit_try_catch/159
[  130.106522] 
[  130.107207] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.109083] Hardware name: linux,dummy-virt (DT)
[  130.110149] Call trace:
[  130.110819]  dump_backtrace+0xf8/0x118
[  130.112174]  show_stack+0x18/0x24
[  130.113408]  dump_stack_lvl+0x64/0x7c
[  130.114562]  print_report+0x144/0x6a8
[  130.115651]  kasan_report+0xb0/0x160
[  130.116672]  __asan_load1+0x6c/0x70
[  130.117708]  ksize_uaf+0x130/0x24c
[  130.118809]  kunit_try_run_case+0x80/0x184
[  130.120339]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.121859]  kthread+0x16c/0x21c
[  130.122959]  ret_from_fork+0x10/0x20
[  130.124349] 
[  130.124798] Allocated by task 159:
[  130.125678]  kasan_set_track+0x4c/0x80
[  130.126915]  kasan_save_alloc_info+0x28/0x34
[  130.128189]  __kasan_kmalloc+0x88/0xa0
[  130.129349]  kmalloc_trace+0x54/0x68
[  130.130498]  ksize_uaf+0x48/0x24c
[  130.132493]  kunit_try_run_case+0x80/0x184
[  130.133886]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.135361]  kthread+0x16c/0x21c
[  130.136449]  ret_from_fork+0x10/0x20
[  130.137526] 
[  130.138082] Freed by task 159:
[  130.138923]  kasan_set_track+0x4c/0x80
[  130.140333]  kasan_save_free_info+0x3c/0x60
[  130.142139]  ____kasan_slab_free+0xe8/0x140
[  130.143321]  __kasan_slab_free+0x18/0x28
[  130.144433]  __kmem_cache_free+0xdc/0x284
[  130.145633]  kfree+0x60/0x74
[  130.146649]  ksize_uaf+0x90/0x24c
[  130.147790]  kunit_try_run_case+0x80/0x184
[  130.149095]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.150621]  kthread+0x16c/0x21c
[  130.151680]  ret_from_fork+0x10/0x20
[  130.152815] 
[  130.153333] The buggy address belongs to the object at ffff0000c59d3100
[  130.153333]  which belongs to the cache kmalloc-128 of size 128
[  130.156238] The buggy address is located 120 bytes inside of
[  130.156238]  128-byte region [ffff0000c59d3100, ffff0000c59d3180)
[  130.158523] 
[  130.159141] The buggy address belongs to the physical page:
[  130.161497] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.162497] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.163402] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.165713] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.167251] page dumped because: kasan: bad access detected
[  130.168771] 
[  130.169563] Memory state around the buggy address:
[  130.171250]  ffff0000c59d3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.172815]  ffff0000c59d3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.174374] >ffff0000c59d3100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.175957]                                                                 ^
[  130.178487]  ffff0000c59d3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.180110]  ffff0000c59d3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.181510] ==================================================================

test log snippet boot parser 57

Home

[  130.019680] ==================================================================
[  130.021207] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c
[  130.022770] Read of size 1 at addr ffff0000c59d3100 by task kunit_try_catch/159
[  130.024477] 
[  130.025291] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.028017] Hardware name: linux,dummy-virt (DT)
[  130.029152] Call trace:
[  130.029935]  dump_backtrace+0xf8/0x118
[  130.031112]  show_stack+0x18/0x24
[  130.032212]  dump_stack_lvl+0x64/0x7c
[  130.033337]  print_report+0x144/0x6a8
[  130.034416]  kasan_report+0xb0/0x160
[  130.035495]  __asan_load1+0x6c/0x70
[  130.036544]  ksize_uaf+0xe8/0x24c
[  130.037702]  kunit_try_run_case+0x80/0x184
[  130.038957]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.040413]  kthread+0x16c/0x21c
[  130.041494]  ret_from_fork+0x10/0x20
[  130.042641] 
[  130.043079] Allocated by task 159:
[  130.044066]  kasan_set_track+0x4c/0x80
[  130.045150]  kasan_save_alloc_info+0x28/0x34
[  130.046389]  __kasan_kmalloc+0x88/0xa0
[  130.047484]  kmalloc_trace+0x54/0x68
[  130.048669]  ksize_uaf+0x48/0x24c
[  130.049710]  kunit_try_run_case+0x80/0x184
[  130.050919]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.052340]  kthread+0x16c/0x21c
[  130.053419]  ret_from_fork+0x10/0x20
[  130.054523] 
[  130.055063] Freed by task 159:
[  130.055976]  kasan_set_track+0x4c/0x80
[  130.057073]  kasan_save_free_info+0x3c/0x60
[  130.058248]  ____kasan_slab_free+0xe8/0x140
[  130.059372]  __kasan_slab_free+0x18/0x28
[  130.060475]  __kmem_cache_free+0xdc/0x284
[  130.061669]  kfree+0x60/0x74
[  130.062679]  ksize_uaf+0x90/0x24c
[  130.063753]  kunit_try_run_case+0x80/0x184
[  130.065004]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.066464]  kthread+0x16c/0x21c
[  130.067592]  ret_from_fork+0x10/0x20
[  130.068677] 
[  130.069124] The buggy address belongs to the object at ffff0000c59d3100
[  130.069124]  which belongs to the cache kmalloc-128 of size 128
[  130.071454] The buggy address is located 0 bytes inside of
[  130.071454]  128-byte region [ffff0000c59d3100, ffff0000c59d3180)
[  130.073633] 
[  130.074215] The buggy address belongs to the physical page:
[  130.075478] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.077320] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.079026] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.080723] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.082253] page dumped because: kasan: bad access detected
[  130.083405] 
[  130.083901] Memory state around the buggy address:
[  130.085076]  ffff0000c59d3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.086597]  ffff0000c59d3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.088118] >ffff0000c59d3100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.089519]                    ^
[  130.090470]  ffff0000c59d3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.092051]  ffff0000c59d3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.093481] ==================================================================

test log snippet boot parser 58

Home

[  129.939484] ==================================================================
[  129.942113] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c
[  129.943630] Read of size 1 at addr ffff0000c59d3100 by task kunit_try_catch/159
[  129.945170] 
[  129.945844] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.947739] Hardware name: linux,dummy-virt (DT)
[  129.948849] Call trace:
[  129.949453]  dump_backtrace+0xf8/0x118
[  129.950685]  show_stack+0x18/0x24
[  129.951818]  dump_stack_lvl+0x64/0x7c
[  129.952982]  print_report+0x144/0x6a8
[  129.954116]  kasan_report+0xb0/0x160
[  129.955209]  __kasan_check_byte+0x3c/0x54
[  129.956363]  ksize+0x34/0x140
[  129.957407]  ksize_uaf+0xa4/0x24c
[  129.958533]  kunit_try_run_case+0x80/0x184
[  129.959837]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.961315]  kthread+0x16c/0x21c
[  129.962511]  ret_from_fork+0x10/0x20
[  129.963639] 
[  129.964141] Allocated by task 159:
[  129.965025]  kasan_set_track+0x4c/0x80
[  129.966149]  kasan_save_alloc_info+0x28/0x34
[  129.967358]  __kasan_kmalloc+0x88/0xa0
[  129.968458]  kmalloc_trace+0x54/0x68
[  129.969613]  ksize_uaf+0x48/0x24c
[  129.970695]  kunit_try_run_case+0x80/0x184
[  129.971941]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.973410]  kthread+0x16c/0x21c
[  129.974533]  ret_from_fork+0x10/0x20
[  129.975662] 
[  129.976161] Freed by task 159:
[  129.977055]  kasan_set_track+0x4c/0x80
[  129.978187]  kasan_save_free_info+0x3c/0x60
[  129.979409]  ____kasan_slab_free+0xe8/0x140
[  129.980541]  __kasan_slab_free+0x18/0x28
[  129.981696]  __kmem_cache_free+0xdc/0x284
[  129.982892]  kfree+0x60/0x74
[  129.983918]  ksize_uaf+0x90/0x24c
[  129.985025]  kunit_try_run_case+0x80/0x184
[  129.986264]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  129.987758]  kthread+0x16c/0x21c
[  129.988851]  ret_from_fork+0x10/0x20
[  129.989971] 
[  129.990432] The buggy address belongs to the object at ffff0000c59d3100
[  129.990432]  which belongs to the cache kmalloc-128 of size 128
[  129.992799] The buggy address is located 0 bytes inside of
[  129.992799]  128-byte region [ffff0000c59d3100, ffff0000c59d3180)
[  129.994937] 
[  129.995607] The buggy address belongs to the physical page:
[  129.996807] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  129.998724] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.000390] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.002093] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.003657] page dumped because: kasan: bad access detected
[  130.004810] 
[  130.005284] Memory state around the buggy address:
[  130.006473]  ffff0000c59d3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.007959]  ffff0000c59d3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.009483] >ffff0000c59d3100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.010986]                    ^
[  130.011877]  ffff0000c59d3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.013478]  ffff0000c59d3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.014965] ==================================================================

test log snippet boot parser 59

Home

[  126.793933] ==================================================================
[  126.796279] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134
[  126.798001] Read of size 1 at addr ffff0000c5a10000 by task kunit_try_catch/128
[  126.799511] 
[  126.800154] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.802105] Hardware name: linux,dummy-virt (DT)
[  126.803211] Call trace:
[  126.804282]  dump_backtrace+0xf8/0x118
[  126.805700]  show_stack+0x18/0x24
[  126.806967]  dump_stack_lvl+0x64/0x7c
[  126.808248]  print_report+0x144/0x6a8
[  126.809286]  kasan_report+0xb0/0x160
[  126.810517]  __asan_load1+0x6c/0x70
[  126.811511]  pagealloc_uaf+0x90/0x134
[  126.813077]  kunit_try_run_case+0x80/0x184
[  126.814217]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  126.816007]  kthread+0x16c/0x21c
[  126.816996]  ret_from_fork+0x10/0x20
[  126.818438] 
[  126.819008] The buggy address belongs to the physical page:
[  126.820459] page:000000007ffe59f8 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a10
[  126.822764] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  126.824636] raw: 0bfffc0000000000 ffff0000ff7f49a0 ffff0000ff7f49a0 0000000000000000
[  126.826735] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[  126.828888] page dumped because: kasan: bad access detected
[  126.829802] 
[  126.830098] Memory state around the buggy address:
[  126.830710]  ffff0000c5a0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.832229]  ffff0000c5a0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.834080] >ffff0000c5a10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.835497]                    ^
[  126.836552]  ffff0000c5a10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.838389]  ffff0000c5a10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.839985] ==================================================================

test log snippet boot parser 60

Home

[  130.656938] ==================================================================
[  130.659161] BUG: KASAN: use-after-free in strchr+0x20/0x6c
[  130.660859] Read of size 1 at addr ffff0000c59d3a10 by task kunit_try_catch/165
[  130.662875] 
[  130.663622] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.665964] Hardware name: linux,dummy-virt (DT)
[  130.667062] Call trace:
[  130.667780]  dump_backtrace+0xf8/0x118
[  130.669080]  show_stack+0x18/0x24
[  130.670046]  dump_stack_lvl+0x64/0x7c
[  130.671201]  print_report+0x144/0x6a8
[  130.672410]  kasan_report+0xb0/0x160
[  130.673464]  __asan_load1+0x6c/0x70
[  130.674608]  strchr+0x20/0x6c
[  130.675606]  kasan_strings+0xa8/0x404
[  130.677196]  kunit_try_run_case+0x80/0x184
[  130.678537]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.680090]  kthread+0x16c/0x21c
[  130.681194]  ret_from_fork+0x10/0x20
[  130.682219] 
[  130.682915] Allocated by task 165:
[  130.683970]  kasan_set_track+0x4c/0x80
[  130.685021]  kasan_save_alloc_info+0x28/0x34
[  130.686484]  __kasan_kmalloc+0x88/0xa0
[  130.687685]  kmalloc_trace+0x54/0x68
[  130.688869]  kasan_strings+0x48/0x404
[  130.690083]  kunit_try_run_case+0x80/0x184
[  130.691328]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.692873]  kthread+0x16c/0x21c
[  130.693520]  ret_from_fork+0x10/0x20
[  130.694662] 
[  130.695202] Freed by task 165:
[  130.696290]  kasan_set_track+0x4c/0x80
[  130.697375]  kasan_save_free_info+0x3c/0x60
[  130.698855]  ____kasan_slab_free+0xe8/0x140
[  130.700109]  __kasan_slab_free+0x18/0x28
[  130.701171]  __kmem_cache_free+0xdc/0x284
[  130.702448]  kfree+0x60/0x74
[  130.703484]  kasan_strings+0x90/0x404
[  130.704737]  kunit_try_run_case+0x80/0x184
[  130.706142]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.708165]  kthread+0x16c/0x21c
[  130.709421]  ret_from_fork+0x10/0x20
[  130.710448] 
[  130.711065] The buggy address belongs to the object at ffff0000c59d3a00
[  130.711065]  which belongs to the cache kmalloc-128 of size 128
[  130.714011] The buggy address is located 16 bytes inside of
[  130.714011]  128-byte region [ffff0000c59d3a00, ffff0000c59d3a80)
[  130.716485] 
[  130.716996] The buggy address belongs to the physical page:
[  130.718176] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.720406] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.721765] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.723395] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.725233] page dumped because: kasan: bad access detected
[  130.726522] 
[  130.727041] Memory state around the buggy address:
[  130.728302]  ffff0000c59d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.730052]  ffff0000c59d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.731443] >ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.733373]                          ^
[  130.734635]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.736200]  ffff0000c59d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.738351] ==================================================================

test log snippet boot parser 61

Home

[  130.826789] ==================================================================
[  130.828604] BUG: KASAN: use-after-free in strcmp+0x30/0x84
[  130.830244] Read of size 1 at addr ffff0000c59d3a10 by task kunit_try_catch/165
[  130.832240] 
[  130.832855] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.835187] Hardware name: linux,dummy-virt (DT)
[  130.836548] Call trace:
[  130.837960]  dump_backtrace+0xf8/0x118
[  130.839328]  show_stack+0x18/0x24
[  130.840517]  dump_stack_lvl+0x64/0x7c
[  130.842026]  print_report+0x144/0x6a8
[  130.843275]  kasan_report+0xb0/0x160
[  130.844263]  __asan_load1+0x6c/0x70
[  130.845449]  strcmp+0x30/0x84
[  130.846952]  kasan_strings+0x148/0x404
[  130.848318]  kunit_try_run_case+0x80/0x184
[  130.849630]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.851062]  kthread+0x16c/0x21c
[  130.852220]  ret_from_fork+0x10/0x20
[  130.853333] 
[  130.854862] Allocated by task 165:
[  130.855749]  kasan_set_track+0x4c/0x80
[  130.857315]  kasan_save_alloc_info+0x28/0x34
[  130.858536]  __kasan_kmalloc+0x88/0xa0
[  130.859629]  kmalloc_trace+0x54/0x68
[  130.861651]  kasan_strings+0x48/0x404
[  130.862776]  kunit_try_run_case+0x80/0x184
[  130.864323]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.865889]  kthread+0x16c/0x21c
[  130.866998]  ret_from_fork+0x10/0x20
[  130.868546] 
[  130.869243] Freed by task 165:
[  130.869931]  kasan_set_track+0x4c/0x80
[  130.871139]  kasan_save_free_info+0x3c/0x60
[  130.872840]  ____kasan_slab_free+0xe8/0x140
[  130.874240]  __kasan_slab_free+0x18/0x28
[  130.875495]  __kmem_cache_free+0xdc/0x284
[  130.876964]  kfree+0x60/0x74
[  130.877937]  kasan_strings+0x90/0x404
[  130.878572]  kunit_try_run_case+0x80/0x184
[  130.880023]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.881806]  kthread+0x16c/0x21c
[  130.882922]  ret_from_fork+0x10/0x20
[  130.884085] 
[  130.884608] The buggy address belongs to the object at ffff0000c59d3a00
[  130.884608]  which belongs to the cache kmalloc-128 of size 128
[  130.887326] The buggy address is located 16 bytes inside of
[  130.887326]  128-byte region [ffff0000c59d3a00, ffff0000c59d3a80)
[  130.890335] 
[  130.890751] The buggy address belongs to the physical page:
[  130.892395] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.894191] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.896310] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.897972] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.899630] page dumped because: kasan: bad access detected
[  130.900894] 
[  130.901396] Memory state around the buggy address:
[  130.902557]  ffff0000c59d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.905488]  ffff0000c59d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.907062] >ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.908887]                          ^
[  130.909756]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.911415]  ffff0000c59d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.913329] ==================================================================

test log snippet boot parser 62

Home

[  131.003566] ==================================================================
[  131.005325] BUG: KASAN: use-after-free in strlen+0x28/0x50
[  131.007195] Read of size 1 at addr ffff0000c59d3a10 by task kunit_try_catch/165
[  131.009028] 
[  131.010012] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.011782] Hardware name: linux,dummy-virt (DT)
[  131.012854] Call trace:
[  131.013489]  dump_backtrace+0xf8/0x118
[  131.014810]  show_stack+0x18/0x24
[  131.016504]  dump_stack_lvl+0x64/0x7c
[  131.018218]  print_report+0x144/0x6a8
[  131.019267]  kasan_report+0xb0/0x160
[  131.020337]  __asan_load1+0x6c/0x70
[  131.021419]  strlen+0x28/0x50
[  131.022446]  kasan_strings+0x1e8/0x404
[  131.023611]  kunit_try_run_case+0x80/0x184
[  131.024993]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.026712]  kthread+0x16c/0x21c
[  131.028020]  ret_from_fork+0x10/0x20
[  131.029149] 
[  131.029679] Allocated by task 165:
[  131.030566]  kasan_set_track+0x4c/0x80
[  131.032595]  kasan_save_alloc_info+0x28/0x34
[  131.033887]  __kasan_kmalloc+0x88/0xa0
[  131.035108]  kmalloc_trace+0x54/0x68
[  131.036178]  kasan_strings+0x48/0x404
[  131.037298]  kunit_try_run_case+0x80/0x184
[  131.038534]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.040320]  kthread+0x16c/0x21c
[  131.041931]  ret_from_fork+0x10/0x20
[  131.043252] 
[  131.043796] Freed by task 165:
[  131.044679]  kasan_set_track+0x4c/0x80
[  131.045816]  kasan_save_free_info+0x3c/0x60
[  131.047015]  ____kasan_slab_free+0xe8/0x140
[  131.048445]  __kasan_slab_free+0x18/0x28
[  131.049709]  __kmem_cache_free+0xdc/0x284
[  131.051027]  kfree+0x60/0x74
[  131.051941]  kasan_strings+0x90/0x404
[  131.053140]  kunit_try_run_case+0x80/0x184
[  131.054417]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.055993]  kthread+0x16c/0x21c
[  131.057988]  ret_from_fork+0x10/0x20
[  131.059105] 
[  131.059692] The buggy address belongs to the object at ffff0000c59d3a00
[  131.059692]  which belongs to the cache kmalloc-128 of size 128
[  131.061680] The buggy address is located 16 bytes inside of
[  131.061680]  128-byte region [ffff0000c59d3a00, ffff0000c59d3a80)
[  131.064647] 
[  131.065492] The buggy address belongs to the physical page:
[  131.066941] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.068267] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.069851] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.071519] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.073536] page dumped because: kasan: bad access detected
[  131.074776] 
[  131.075330] Memory state around the buggy address:
[  131.076450]  ffff0000c59d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.077965]  ffff0000c59d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.079461] >ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.080907]                          ^
[  131.082002]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.083555]  ffff0000c59d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.086004] ==================================================================

test log snippet boot parser 63

Home

[  130.916185] ==================================================================
[  130.918055] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0
[  130.919439] Read of size 1 at addr ffff0000c59d3a10 by task kunit_try_catch/165
[  130.921017] 
[  130.921942] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.923559] Hardware name: linux,dummy-virt (DT)
[  130.924745] Call trace:
[  130.925723]  dump_backtrace+0xf8/0x118
[  130.927214]  show_stack+0x18/0x24
[  130.928526]  dump_stack_lvl+0x64/0x7c
[  130.929936]  print_report+0x144/0x6a8
[  130.931122]  kasan_report+0xb0/0x160
[  130.932190]  __asan_load1+0x6c/0x70
[  130.933272]  strncmp+0x3c/0xa0
[  130.934659]  kasan_strings+0x1a0/0x404
[  130.935899]  kunit_try_run_case+0x80/0x184
[  130.937475]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.938986]  kthread+0x16c/0x21c
[  130.940375]  ret_from_fork+0x10/0x20
[  130.941433] 
[  130.942155] Allocated by task 165:
[  130.943125]  kasan_set_track+0x4c/0x80
[  130.944353]  kasan_save_alloc_info+0x28/0x34
[  130.945802]  __kasan_kmalloc+0x88/0xa0
[  130.946715]  kmalloc_trace+0x54/0x68
[  130.947986]  kasan_strings+0x48/0x404
[  130.948968]  kunit_try_run_case+0x80/0x184
[  130.950162]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.951932]  kthread+0x16c/0x21c
[  130.953362]  ret_from_fork+0x10/0x20
[  130.954515] 
[  130.955194] Freed by task 165:
[  130.956354]  kasan_set_track+0x4c/0x80
[  130.957472]  kasan_save_free_info+0x3c/0x60
[  130.958873]  ____kasan_slab_free+0xe8/0x140
[  130.960080]  __kasan_slab_free+0x18/0x28
[  130.961862]  __kmem_cache_free+0xdc/0x284
[  130.963034]  kfree+0x60/0x74
[  130.964041]  kasan_strings+0x90/0x404
[  130.965770]  kunit_try_run_case+0x80/0x184
[  130.967063]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.968544]  kthread+0x16c/0x21c
[  130.969693]  ret_from_fork+0x10/0x20
[  130.970825] 
[  130.971310] The buggy address belongs to the object at ffff0000c59d3a00
[  130.971310]  which belongs to the cache kmalloc-128 of size 128
[  130.973515] The buggy address is located 16 bytes inside of
[  130.973515]  128-byte region [ffff0000c59d3a00, ffff0000c59d3a80)
[  130.977399] 
[  130.978181] The buggy address belongs to the physical page:
[  130.978994] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.981020] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.982904] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.984791] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.986388] page dumped because: kasan: bad access detected
[  130.988208] 
[  130.989130] Memory state around the buggy address:
[  130.990349]  ffff0000c59d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.991940]  ffff0000c59d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.993749] >ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.995527]                          ^
[  130.997154]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.998854]  ffff0000c59d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.000463] ==================================================================

test log snippet boot parser 64

Home

[  131.088837] ==================================================================
[  131.090157] BUG: KASAN: use-after-free in strnlen+0x3c/0x74
[  131.091545] Read of size 1 at addr ffff0000c59d3a10 by task kunit_try_catch/165
[  131.094355] 
[  131.095025] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.096799] Hardware name: linux,dummy-virt (DT)
[  131.097837] Call trace:
[  131.098531]  dump_backtrace+0xf8/0x118
[  131.100651]  show_stack+0x18/0x24
[  131.101811]  dump_stack_lvl+0x64/0x7c
[  131.102803]  print_report+0x144/0x6a8
[  131.103921]  kasan_report+0xb0/0x160
[  131.104996]  __asan_load1+0x6c/0x70
[  131.106029]  strnlen+0x3c/0x74
[  131.107049]  kasan_strings+0x234/0x404
[  131.108280]  kunit_try_run_case+0x80/0x184
[  131.109323]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.111084]  kthread+0x16c/0x21c
[  131.112253]  ret_from_fork+0x10/0x20
[  131.113371] 
[  131.113937] Allocated by task 165:
[  131.114855]  kasan_set_track+0x4c/0x80
[  131.116076]  kasan_save_alloc_info+0x28/0x34
[  131.118130]  __kasan_kmalloc+0x88/0xa0
[  131.119089]  kmalloc_trace+0x54/0x68
[  131.120292]  kasan_strings+0x48/0x404
[  131.121314]  kunit_try_run_case+0x80/0x184
[  131.122606]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.124275]  kthread+0x16c/0x21c
[  131.125850]  ret_from_fork+0x10/0x20
[  131.127044] 
[  131.127732] Freed by task 165:
[  131.128595]  kasan_set_track+0x4c/0x80
[  131.129699]  kasan_save_free_info+0x3c/0x60
[  131.130903]  ____kasan_slab_free+0xe8/0x140
[  131.132055]  __kasan_slab_free+0x18/0x28
[  131.133891]  __kmem_cache_free+0xdc/0x284
[  131.134894]  kfree+0x60/0x74
[  131.136091]  kasan_strings+0x90/0x404
[  131.137219]  kunit_try_run_case+0x80/0x184
[  131.138430]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  131.139997]  kthread+0x16c/0x21c
[  131.141813]  ret_from_fork+0x10/0x20
[  131.143070] 
[  131.143550] The buggy address belongs to the object at ffff0000c59d3a00
[  131.143550]  which belongs to the cache kmalloc-128 of size 128
[  131.145952] The buggy address is located 16 bytes inside of
[  131.145952]  128-byte region [ffff0000c59d3a00, ffff0000c59d3a80)
[  131.148193] 
[  131.149743] The buggy address belongs to the physical page:
[  131.151070] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  131.153010] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.154811] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.156545] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.158445] page dumped because: kasan: bad access detected
[  131.159773] 
[  131.160408] Memory state around the buggy address:
[  131.161509]  ffff0000c59d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.163275]  ffff0000c59d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.165882] >ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.167511]                          ^
[  131.168608]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.170180]  ffff0000c59d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.172508] ==================================================================

test log snippet boot parser 65

Home

[  130.741171] ==================================================================
[  130.742602] BUG: KASAN: use-after-free in strrchr+0x34/0x68
[  130.744200] Read of size 1 at addr ffff0000c59d3a10 by task kunit_try_catch/165
[  130.746618] 
[  130.747213] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.749036] Hardware name: linux,dummy-virt (DT)
[  130.750378] Call trace:
[  130.750997]  dump_backtrace+0xf8/0x118
[  130.752141]  show_stack+0x18/0x24
[  130.753101]  dump_stack_lvl+0x64/0x7c
[  130.754507]  print_report+0x144/0x6a8
[  130.755860]  kasan_report+0xb0/0x160
[  130.757394]  __asan_load1+0x6c/0x70
[  130.758602]  strrchr+0x34/0x68
[  130.760723]  kasan_strings+0xf8/0x404
[  130.761869]  kunit_try_run_case+0x80/0x184
[  130.762975]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.764676]  kthread+0x16c/0x21c
[  130.765881]  ret_from_fork+0x10/0x20
[  130.767006] 
[  130.767540] Allocated by task 165:
[  130.768443]  kasan_set_track+0x4c/0x80
[  130.770498]  kasan_save_alloc_info+0x28/0x34
[  130.771885]  __kasan_kmalloc+0x88/0xa0
[  130.773026]  kmalloc_trace+0x54/0x68
[  130.774320]  kasan_strings+0x48/0x404
[  130.775470]  kunit_try_run_case+0x80/0x184
[  130.776728]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.778293]  kthread+0x16c/0x21c
[  130.779276]  ret_from_fork+0x10/0x20
[  130.780554] 
[  130.781148] Freed by task 165:
[  130.782381]  kasan_set_track+0x4c/0x80
[  130.784537]  kasan_save_free_info+0x3c/0x60
[  130.785858]  ____kasan_slab_free+0xe8/0x140
[  130.787089]  __kasan_slab_free+0x18/0x28
[  130.788301]  __kmem_cache_free+0xdc/0x284
[  130.789464]  kfree+0x60/0x74
[  130.790688]  kasan_strings+0x90/0x404
[  130.792027]  kunit_try_run_case+0x80/0x184
[  130.793331]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  130.794372]  kthread+0x16c/0x21c
[  130.795665]  ret_from_fork+0x10/0x20
[  130.796955] 
[  130.797615] The buggy address belongs to the object at ffff0000c59d3a00
[  130.797615]  which belongs to the cache kmalloc-128 of size 128
[  130.800013] The buggy address is located 16 bytes inside of
[  130.800013]  128-byte region [ffff0000c59d3a00, ffff0000c59d3a80)
[  130.802225] 
[  130.802887] The buggy address belongs to the physical page:
[  130.804234] page:000000005672043d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[  130.806058] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.807198] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.809115] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.810974] page dumped because: kasan: bad access detected
[  130.812652] 
[  130.813245] Memory state around the buggy address:
[  130.814186]  ffff0000c59d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.816034]  ffff0000c59d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.817982] >ffff0000c59d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.819571]                          ^
[  130.820661]  ffff0000c59d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.822378]  ffff0000c59d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.824104] ==================================================================

test log snippet boot parser 66

Home

[  132.702236] ==================================================================
[  132.704196] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c
[  132.705872] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/170
[  132.707787] 
[  132.708909] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.710863] Hardware name: linux,dummy-virt (DT)
[  132.712037] Call trace:
[  132.712817]  dump_backtrace+0xf8/0x118
[  132.714076]  show_stack+0x18/0x24
[  132.715295]  dump_stack_lvl+0x64/0x7c
[  132.716536]  print_report+0x144/0x6a8
[  132.717881]  kasan_report+0xb0/0x160
[  132.719045]  __asan_load1+0x6c/0x70
[  132.720542]  vmalloc_oob+0xe4/0x25c
[  132.721413]  kunit_try_run_case+0x80/0x184
[  132.722974]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.724823]  kthread+0x16c/0x21c
[  132.726075]  ret_from_fork+0x10/0x20
[  132.727233] 
[  132.727826] The buggy address belongs to the virtual mapping at
[  132.727826]  [ffff8000080fb000, ffff8000080fd000) created by:
[  132.727826]  vmalloc_oob+0x30/0x25c
[  132.731154] 
[  132.731911] The buggy address belongs to the physical page:
[  132.733347] page:00000000a5b2873d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[  132.735327] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  132.737330] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  132.739004] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  132.740781] page dumped because: kasan: bad access detected
[  132.741748] 
[  132.742368] Memory state around the buggy address:
[  132.743467]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  132.745151]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  132.746839] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  132.748805]                                                                 ^
[  132.750149]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  132.751338]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  132.753159] ==================================================================

test log snippet boot parser 67

Home

[  132.647301] ==================================================================
[  132.650343] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c
[  132.652498] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/170
[  132.654787] 
[  132.655392] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  132.657260] Hardware name: linux,dummy-virt (DT)
[  132.658266] Call trace:
[  132.659124]  dump_backtrace+0xf8/0x118
[  132.660466]  show_stack+0x18/0x24
[  132.661774]  dump_stack_lvl+0x64/0x7c
[  132.662971]  print_report+0x144/0x6a8
[  132.664436]  kasan_report+0xb0/0x160
[  132.665528]  __asan_load1+0x6c/0x70
[  132.666633]  vmalloc_oob+0x9c/0x25c
[  132.667855]  kunit_try_run_case+0x80/0x184
[  132.669185]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  132.671012]  kthread+0x16c/0x21c
[  132.672117]  ret_from_fork+0x10/0x20
[  132.673464] 
[  132.674154] The buggy address belongs to the virtual mapping at
[  132.674154]  [ffff8000080fb000, ffff8000080fd000) created by:
[  132.674154]  vmalloc_oob+0x30/0x25c
[  132.677068] 
[  132.677847] The buggy address belongs to the physical page:
[  132.678738] page:00000000a5b2873d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[  132.680922] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  132.682719] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  132.684704] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  132.686446] page dumped because: kasan: bad access detected
[  132.687891] 
[  132.688420] Memory state around the buggy address:
[  132.689659]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  132.691063]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  132.692713] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  132.694211]                                                              ^
[  132.695973]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  132.697607]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  132.698720] ==================================================================

test log snippet boot parser 68

Home

[  142.432186] ==================================================================
[  142.434119] BUG: KASAN: double-free in kfree_sensitive+0x88/0xa4
[  142.435825] Free of addr ffff0000c5942800 by task kunit_try_catch/167
[  142.437205] 
[  142.438444] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.440768] Hardware name: linux,dummy-virt (DT)
[  142.441972] Call trace:
[  142.442659]  dump_backtrace+0xf8/0x118
[  142.444037]  show_stack+0x18/0x24
[  142.445254]  __dump_stack+0x28/0x38
[  142.446519]  dump_stack_lvl+0x54/0x6c
[  142.447798]  print_address_description+0x7c/0x20c
[  142.448974]  print_report+0x50/0x68
[  142.450237]  kasan_report_invalid_free+0x9c/0xe8
[  142.451681]  ____kasan_slab_free+0x108/0x140
[  142.453854]  __kasan_slab_free+0x18/0x28
[  142.455378]  __kmem_cache_free+0xdc/0x284
[  142.456654]  kfree_sensitive+0x88/0xa4
[  142.457910]  kmalloc_double_kzfree+0xa4/0x144
[  142.459260]  kunit_try_run_case+0x80/0x184
[  142.460847]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.462323]  kthread+0x16c/0x21c
[  142.463484]  ret_from_fork+0x10/0x20
[  142.464721] 
[  142.465148] Allocated by task 167:
[  142.466154]  kasan_set_track+0x4c/0x80
[  142.467422]  kasan_save_alloc_info+0x28/0x34
[  142.468732]  __kasan_kmalloc+0x88/0xa0
[  142.470042]  kmalloc_trace+0x54/0x68
[  142.471224]  kmalloc_double_kzfree+0x48/0x144
[  142.472501]  kunit_try_run_case+0x80/0x184
[  142.473964]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.475736]  kthread+0x16c/0x21c
[  142.477136]  ret_from_fork+0x10/0x20
[  142.478418] 
[  142.479119] Freed by task 167:
[  142.480086]  kasan_set_track+0x4c/0x80
[  142.481474]  kasan_save_free_info+0x3c/0x60
[  142.482740]  ____kasan_slab_free+0xe8/0x140
[  142.484204]  __kasan_slab_free+0x18/0x28
[  142.485377]  __kmem_cache_free+0xdc/0x284
[  142.486636]  kfree_sensitive+0x88/0xa4
[  142.487837]  kmalloc_double_kzfree+0x90/0x144
[  142.489080]  kunit_try_run_case+0x80/0x184
[  142.490476]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.492069]  kthread+0x16c/0x21c
[  142.493332]  ret_from_fork+0x10/0x20
[  142.494960] 
[  142.496006] The buggy address belongs to the object at ffff0000c5942800
[  142.496006]  which belongs to the cache kmalloc-128 of size 128
[  142.498329] The buggy address is located 0 bytes inside of
[  142.498329]  128-byte region [ffff0000c5942800, ffff0000c5942880)
[  142.500962] 
[  142.501649] The buggy address belongs to the physical page:
[  142.502949] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.504864] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.506852] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.508648] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.510245] page dumped because: kasan: bad access detected
[  142.511534] 
[  142.512155] Memory state around the buggy address:
[  142.513282]  ffff0000c5942700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.515285]  ffff0000c5942780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.516793] >ffff0000c5942800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.518667]                    ^
[  142.519749]  ffff0000c5942880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.521447]  ffff0000c5942900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.522806] ==================================================================

test log snippet boot parser 69

Home

[  139.952939] ==================================================================
[  139.955084] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8
[  139.956969] Free of addr ffff0000c5a3e000 by task kunit_try_catch/159
[  139.958551] 
[  139.959100] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.961098] Hardware name: linux,dummy-virt (DT)
[  139.962238] Call trace:
[  139.963015]  dump_backtrace+0xf8/0x118
[  139.964327]  show_stack+0x18/0x24
[  139.965675]  __dump_stack+0x28/0x38
[  139.967038]  dump_stack_lvl+0x54/0x6c
[  139.968445]  print_address_description+0x7c/0x20c
[  139.969809]  print_report+0x50/0x68
[  139.970981]  kasan_report_invalid_free+0x9c/0xe8
[  139.972488]  ____kasan_slab_free+0x108/0x140
[  139.973714]  __kasan_slab_free+0x18/0x28
[  139.975056]  kmem_cache_free+0xe0/0x358
[  139.976560]  kmem_cache_double_free+0xbc/0x1b8
[  139.977922]  kunit_try_run_case+0x80/0x184
[  139.979169]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.980538]  kthread+0x16c/0x21c
[  139.982447]  ret_from_fork+0x10/0x20
[  139.983607] 
[  139.984165] Allocated by task 159:
[  139.985113]  kasan_set_track+0x4c/0x80
[  139.986344]  kasan_save_alloc_info+0x28/0x34
[  139.987675]  __kasan_slab_alloc+0x58/0x70
[  139.989073]  slab_post_alloc_hook+0x70/0x2f4
[  139.991077]  kmem_cache_alloc+0x168/0x260
[  139.992311]  kmem_cache_double_free+0x90/0x1b8
[  139.993610]  kunit_try_run_case+0x80/0x184
[  139.994833]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.996447]  kthread+0x16c/0x21c
[  139.997555]  ret_from_fork+0x10/0x20
[  139.998655] 
[  139.999165] Freed by task 159:
[  140.000030]  kasan_set_track+0x4c/0x80
[  140.001345]  kasan_save_free_info+0x3c/0x60
[  140.002546]  ____kasan_slab_free+0xe8/0x140
[  140.003922]  __kasan_slab_free+0x18/0x28
[  140.006292]  kmem_cache_free+0xe0/0x358
[  140.007321]  kmem_cache_double_free+0xa4/0x1b8
[  140.008663]  kunit_try_run_case+0x80/0x184
[  140.009954]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.011412]  kthread+0x16c/0x21c
[  140.012861]  ret_from_fork+0x10/0x20
[  140.014466] 
[  140.015098] The buggy address belongs to the object at ffff0000c5a3e000
[  140.015098]  which belongs to the cache test_cache of size 200
[  140.017773] The buggy address is located 0 bytes inside of
[  140.017773]  200-byte region [ffff0000c5a3e000, ffff0000c5a3e0c8)
[  140.020267] 
[  140.020878] The buggy address belongs to the physical page:
[  140.022140] page:00000000a3354315 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3e
[  140.024135] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.025861] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c14a5500
[  140.027517] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  140.028962] page dumped because: kasan: bad access detected
[  140.030158] 
[  140.030770] Memory state around the buggy address:
[  140.032445]  ffff0000c5a3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.034711]  ffff0000c5a3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.036281] >ffff0000c5a3e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.037757]                    ^
[  140.038766]  ffff0000c5a3e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  140.041094]  ffff0000c5a3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.042550] ==================================================================

test log snippet boot parser 70

Home

[  139.514820] ==================================================================
[  139.517377] BUG: KASAN: global-out-of-bounds in kasan_global_oob_left+0x50/0xf4
[  139.519058] Read of size 1 at addr ffffd1781baad57d by task kunit_try_catch/153
[  139.521068] 
[  139.521696] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.523514] Hardware name: linux,dummy-virt (DT)
[  139.524461] Call trace:
[  139.525231]  dump_backtrace+0xf8/0x118
[  139.526712]  show_stack+0x18/0x24
[  139.528052]  __dump_stack+0x28/0x38
[  139.529308]  dump_stack_lvl+0x54/0x6c
[  139.530551]  print_address_description+0x7c/0x20c
[  139.531980]  print_report+0x50/0x68
[  139.532901]  kasan_report+0xac/0x100
[  139.533892]  __asan_load1+0x6c/0x70
[  139.535186]  kasan_global_oob_left+0x50/0xf4
[  139.536428]  kunit_try_run_case+0x80/0x184
[  139.537794]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.539621]  kthread+0x16c/0x21c
[  139.540772]  ret_from_fork+0x10/0x20
[  139.541954] 
[  139.542558] The buggy address belongs to the variable:
[  139.543701]  resource+0x5d/0x60
[  139.544408] 
[  139.544717] The buggy address belongs to the virtual mapping at
[  139.544717]  [ffffd1781aa00000, ffffd1781bb31000) created by:
[  139.544717]  map_kernel+0x1b4/0x330
[  139.547653] 
[  139.548832] The buggy address belongs to the physical page:
[  139.549957] page:00000000a04c3d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cad
[  139.551877] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  139.553870] raw: 03fffc0000001000 fffffc00000f2b48 fffffc00000f2b48 0000000000000000
[  139.555578] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  139.557151] page dumped because: kasan: bad access detected
[  139.558166] 
[  139.558895] Memory state around the buggy address:
[  139.560244]  ffffd1781baad400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.561961]  ffffd1781baad480: 00 00 00 00 00 f9 f9 f9 04 f9 f9 f9 01 f9 f9 f9
[  139.563541] >ffffd1781baad500: 02 f9 f9 f9 00 00 00 00 00 00 00 f9 f9 f9 f9 f9
[  139.565072]                                                                 ^
[  139.566489]  ffffd1781baad580: 00 02 f9 f9 04 f9 f9 f9 00 00 00 00 00 00 00 00
[  139.568065]  ffffd1781baad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.569547] ==================================================================

test log snippet boot parser 71

Home

[  139.446702] ==================================================================
[  139.448970] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0
[  139.450755] Read of size 1 at addr ffffd1781baad58d by task kunit_try_catch/152
[  139.452419] 
[  139.453062] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.454866] Hardware name: linux,dummy-virt (DT)
[  139.456029] Call trace:
[  139.456954]  dump_backtrace+0xf8/0x118
[  139.458052]  show_stack+0x18/0x24
[  139.459270]  __dump_stack+0x28/0x38
[  139.460907]  dump_stack_lvl+0x54/0x6c
[  139.462106]  print_address_description+0x7c/0x20c
[  139.463529]  print_report+0x50/0x68
[  139.464766]  kasan_report+0xac/0x100
[  139.466193]  __asan_load1+0x6c/0x70
[  139.467593]  kasan_global_oob_right+0x4c/0xf0
[  139.469495]  kunit_try_run_case+0x80/0x184
[  139.470769]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.472411]  kthread+0x16c/0x21c
[  139.473566]  ret_from_fork+0x10/0x20
[  139.474733] 
[  139.475434] The buggy address belongs to the variable:
[  139.476918]  global_array+0xd/0x20
[  139.478169] 
[  139.478843] The buggy address belongs to the virtual mapping at
[  139.478843]  [ffffd1781aa00000, ffffd1781bb31000) created by:
[  139.478843]  map_kernel+0x1b4/0x330
[  139.481637] 
[  139.482301] The buggy address belongs to the physical page:
[  139.483515] page:00000000a04c3d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cad
[  139.485414] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  139.487173] raw: 03fffc0000001000 fffffc00000f2b48 fffffc00000f2b48 0000000000000000
[  139.488885] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  139.490876] page dumped because: kasan: bad access detected
[  139.492209] 
[  139.492810] Memory state around the buggy address:
[  139.493917]  ffffd1781baad480: 00 00 00 00 00 f9 f9 f9 04 f9 f9 f9 01 f9 f9 f9
[  139.495466]  ffffd1781baad500: 02 f9 f9 f9 00 00 00 00 00 00 00 f9 f9 f9 f9 f9
[  139.497018] >ffffd1781baad580: 00 02 f9 f9 04 f9 f9 f9 00 00 00 00 00 00 00 00
[  139.498807]                       ^
[  139.500012]  ffffd1781baad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.501646]  ffffd1781baad680: 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 f9
[  139.503068] ==================================================================

test log snippet boot parser 72

Home

[  136.309492] ==================================================================
[  136.311434] BUG: KASAN: invalid-free in kfree+0x70/0x74
[  136.313524] Free of addr ffff0000c59f4001 by task kunit_try_catch/125
[  136.314902] 
[  136.315917] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.317829] Hardware name: linux,dummy-virt (DT)
[  136.318914] Call trace:
[  136.319669]  dump_backtrace+0xf8/0x118
[  136.321146]  show_stack+0x18/0x24
[  136.322272]  __dump_stack+0x28/0x38
[  136.323545]  dump_stack_lvl+0x54/0x6c
[  136.324862]  print_address_description+0x7c/0x20c
[  136.326304]  print_report+0x50/0x68
[  136.327455]  kasan_report_invalid_free+0x9c/0xe8
[  136.328878]  __kasan_kfree_large+0x68/0x78
[  136.330166]  free_large_kmalloc+0x60/0xe8
[  136.331347]  kfree+0x70/0x74
[  136.332683]  kmalloc_pagealloc_invalid_free+0x80/0x120
[  136.333810]  kunit_try_run_case+0x80/0x184
[  136.335656]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.337221]  kthread+0x16c/0x21c
[  136.338233]  ret_from_fork+0x10/0x20
[  136.339456] 
[  136.340039] The buggy address belongs to the physical page:
[  136.341553] page:00000000d7fc3077 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f4
[  136.343391] head:00000000d7fc3077 order:2 compound_mapcount:0 compound_pincount:0
[  136.345147] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  136.346863] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  136.348692] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  136.350224] page dumped because: kasan: bad access detected
[  136.351469] 
[  136.351998] Memory state around the buggy address:
[  136.353190]  ffff0000c59f3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.355331]  ffff0000c59f3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.356978] >ffff0000c59f4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.358448]                    ^
[  136.359532]  ffff0000c59f4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.361385]  ffff0000c59f4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.362804] ==================================================================

test log snippet boot parser 73

Home

[  140.070161] ==================================================================
[  140.072029] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8
[  140.074319] Free of addr ffff0000c5942001 by task kunit_try_catch/160
[  140.075705] 
[  140.076293] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.078230] Hardware name: linux,dummy-virt (DT)
[  140.079374] Call trace:
[  140.080146]  dump_backtrace+0xf8/0x118
[  140.081437]  show_stack+0x18/0x24
[  140.082567]  __dump_stack+0x28/0x38
[  140.083842]  dump_stack_lvl+0x54/0x6c
[  140.085068]  print_address_description+0x7c/0x20c
[  140.086443]  print_report+0x50/0x68
[  140.087627]  kasan_report_invalid_free+0x9c/0xe8
[  140.089096]  ____kasan_slab_free+0x108/0x140
[  140.090226]  __kasan_slab_free+0x18/0x28
[  140.091549]  kmem_cache_free+0xe0/0x358
[  140.092723]  kmem_cache_invalid_free+0xb0/0x1b8
[  140.094029]  kunit_try_run_case+0x80/0x184
[  140.095288]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.096754]  kthread+0x16c/0x21c
[  140.097912]  ret_from_fork+0x10/0x20
[  140.099050] 
[  140.099667] Allocated by task 160:
[  140.100641]  kasan_set_track+0x4c/0x80
[  140.101871]  kasan_save_alloc_info+0x28/0x34
[  140.103097]  __kasan_slab_alloc+0x58/0x70
[  140.104379]  slab_post_alloc_hook+0x70/0x2f4
[  140.105641]  kmem_cache_alloc+0x168/0x260
[  140.106876]  kmem_cache_invalid_free+0x90/0x1b8
[  140.108208]  kunit_try_run_case+0x80/0x184
[  140.109470]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.110935]  kthread+0x16c/0x21c
[  140.112072]  ret_from_fork+0x10/0x20
[  140.113231] 
[  140.113801] The buggy address belongs to the object at ffff0000c5942000
[  140.113801]  which belongs to the cache test_cache of size 200
[  140.115954] The buggy address is located 1 bytes inside of
[  140.115954]  200-byte region [ffff0000c5942000, ffff0000c59420c8)
[  140.118154] 
[  140.118741] The buggy address belongs to the physical page:
[  140.119942] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.121787] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.123513] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1a92780
[  140.125159] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  140.126641] page dumped because: kasan: bad access detected
[  140.127788] 
[  140.128381] Memory state around the buggy address:
[  140.129526]  ffff0000c5941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.131065]  ffff0000c5941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.132621] >ffff0000c5942000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.134050]                    ^
[  140.135030]  ffff0000c5942080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  140.136493]  ffff0000c5942100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.137933] ==================================================================

test log snippet boot parser 74

Home

[  138.268714] ==================================================================
[  138.271022] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164
[  138.273508] Read of size 18446744073709551614 at addr ffff0000c593c604 by task kunit_try_catch/141
[  138.275502] 
[  138.276131] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.278029] Hardware name: linux,dummy-virt (DT)
[  138.279129] Call trace:
[  138.280171]  dump_backtrace+0xf8/0x118
[  138.281497]  show_stack+0x18/0x24
[  138.282744]  __dump_stack+0x28/0x38
[  138.283938]  dump_stack_lvl+0x54/0x6c
[  138.285252]  print_address_description+0x7c/0x20c
[  138.286611]  print_report+0x50/0x68
[  138.287835]  kasan_report+0xac/0x100
[  138.289045]  kasan_check_range+0x260/0x2a0
[  138.290901]  memmove+0x48/0x90
[  138.292151]  kmalloc_memmove_negative_size+0xb4/0x164
[  138.293709]  kunit_try_run_case+0x80/0x184
[  138.294988]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.296566]  kthread+0x16c/0x21c
[  138.297706]  ret_from_fork+0x10/0x20
[  138.298865] 
[  138.299430] Allocated by task 141:
[  138.300419]  kasan_set_track+0x4c/0x80
[  138.301791]  kasan_save_alloc_info+0x28/0x34
[  138.303073]  __kasan_kmalloc+0x88/0xa0
[  138.304551]  kmalloc_trace+0x54/0x68
[  138.305697]  kmalloc_memmove_negative_size+0x48/0x164
[  138.307074]  kunit_try_run_case+0x80/0x184
[  138.308745]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.310438]  kthread+0x16c/0x21c
[  138.312116]  ret_from_fork+0x10/0x20
[  138.313012] 
[  138.313548] The buggy address belongs to the object at ffff0000c593c600
[  138.313548]  which belongs to the cache kmalloc-128 of size 128
[  138.315808] The buggy address is located 4 bytes inside of
[  138.315808]  128-byte region [ffff0000c593c600, ffff0000c593c680)
[  138.317805] 
[  138.318387] The buggy address belongs to the physical page:
[  138.319556] page:00000000f1dc7839 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593c
[  138.321567] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.323372] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.325195] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.326732] page dumped because: kasan: bad access detected
[  138.327980] 
[  138.328510] Memory state around the buggy address:
[  138.330148]  ffff0000c593c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  138.331418]  ffff0000c593c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.333261] >ffff0000c593c600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  138.334958]                    ^
[  138.335837]  ffff0000c593c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.337429]  ffff0000c593c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.338817] ==================================================================

test log snippet boot parser 75

Home

[  141.791859] ==================================================================
[  141.793205] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb8c
[  141.795023] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.796569] 
[  141.797204] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.799084] Hardware name: linux,dummy-virt (DT)
[  141.800169] Call trace:
[  141.800949]  dump_backtrace+0xf8/0x118
[  141.802191]  show_stack+0x18/0x24
[  141.803331]  __dump_stack+0x28/0x38
[  141.804557]  dump_stack_lvl+0x54/0x6c
[  141.805792]  print_address_description+0x7c/0x20c
[  141.807136]  print_report+0x50/0x68
[  141.808305]  kasan_report+0xac/0x100
[  141.809478]  kasan_check_range+0x260/0x2a0
[  141.810797]  __kasan_check_write+0x2c/0x3c
[  141.812007]  kasan_bitops_generic+0x3f4/0xb8c
[  141.813282]  kunit_try_run_case+0x80/0x184
[  141.814563]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.816007]  kthread+0x16c/0x21c
[  141.817171]  ret_from_fork+0x10/0x20
[  141.818343] 
[  141.818932] Allocated by task 165:
[  141.819893]  kasan_set_track+0x4c/0x80
[  141.821114]  kasan_save_alloc_info+0x28/0x34
[  141.822329]  __kasan_kmalloc+0x88/0xa0
[  141.823626]  kmalloc_trace+0x54/0x68
[  141.824772]  kasan_bitops_generic+0x4c/0xb8c
[  141.826035]  kunit_try_run_case+0x80/0x184
[  141.827278]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.828750]  kthread+0x16c/0x21c
[  141.829896]  ret_from_fork+0x10/0x20
[  141.831001] 
[  141.831552] The buggy address belongs to the object at ffff0000c5942500
[  141.831552]  which belongs to the cache kmalloc-128 of size 128
[  141.833796] The buggy address is located 8 bytes inside of
[  141.833796]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.835924] 
[  141.836556] The buggy address belongs to the physical page:
[  141.837741] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.839576] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.841318] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.843001] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.844512] page dumped because: kasan: bad access detected
[  141.845699] 
[  141.846264] Memory state around the buggy address:
[  141.847391]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.848973]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.850512] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.851892]                       ^
[  141.852797]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.854395]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.855830] ==================================================================
---
[  141.113297] ==================================================================
[  141.114596] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb8c
[  141.116202] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.117876] 
[  141.118350] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.120261] Hardware name: linux,dummy-virt (DT)
[  141.121388] Call trace:
[  141.122070]  dump_backtrace+0xf8/0x118
[  141.123339]  show_stack+0x18/0x24
[  141.124520]  __dump_stack+0x28/0x38
[  141.125684]  dump_stack_lvl+0x54/0x6c
[  141.126967]  print_address_description+0x7c/0x20c
[  141.128330]  print_report+0x50/0x68
[  141.129478]  kasan_report+0xac/0x100
[  141.130718]  kasan_check_range+0x260/0x2a0
[  141.132007]  __kasan_check_write+0x2c/0x3c
[  141.133214]  kasan_bitops_generic+0x14c/0xb8c
[  141.134478]  kunit_try_run_case+0x80/0x184
[  141.135778]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.137225]  kthread+0x16c/0x21c
[  141.138389]  ret_from_fork+0x10/0x20
[  141.139537] 
[  141.140082] Allocated by task 165:
[  141.141048]  kasan_set_track+0x4c/0x80
[  141.142310]  kasan_save_alloc_info+0x28/0x34
[  141.143558]  __kasan_kmalloc+0x88/0xa0
[  141.144756]  kmalloc_trace+0x54/0x68
[  141.145942]  kasan_bitops_generic+0x4c/0xb8c
[  141.147243]  kunit_try_run_case+0x80/0x184
[  141.148461]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.149996]  kthread+0x16c/0x21c
[  141.151135]  ret_from_fork+0x10/0x20
[  141.152266] 
[  141.152827] The buggy address belongs to the object at ffff0000c5942500
[  141.152827]  which belongs to the cache kmalloc-128 of size 128
[  141.155046] The buggy address is located 8 bytes inside of
[  141.155046]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.157145] 
[  141.157778] The buggy address belongs to the physical page:
[  141.158931] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.160756] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.162534] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.164166] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.165674] page dumped because: kasan: bad access detected
[  141.166843] 
[  141.167428] Memory state around the buggy address:
[  141.168515]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.170019]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.171605] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.172982]                       ^
[  141.173956]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.175509]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.176941] ==================================================================
---
[  142.060056] ==================================================================
[  142.061291] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb8c
[  142.062979] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  142.064810] 
[  142.065272] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.067179] Hardware name: linux,dummy-virt (DT)
[  142.068280] Call trace:
[  142.069079]  dump_backtrace+0xf8/0x118
[  142.070328]  show_stack+0x18/0x24
[  142.071519]  __dump_stack+0x28/0x38
[  142.072724]  dump_stack_lvl+0x54/0x6c
[  142.073962]  print_address_description+0x7c/0x20c
[  142.075316]  print_report+0x50/0x68
[  142.076460]  kasan_report+0xac/0x100
[  142.077745]  kasan_check_range+0x260/0x2a0
[  142.079030]  __kasan_check_write+0x2c/0x3c
[  142.080285]  kasan_bitops_generic+0x4fc/0xb8c
[  142.081558]  kunit_try_run_case+0x80/0x184
[  142.082874]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.084343]  kthread+0x16c/0x21c
[  142.085504]  ret_from_fork+0x10/0x20
[  142.086664] 
[  142.087249] Allocated by task 165:
[  142.088201]  kasan_set_track+0x4c/0x80
[  142.089425]  kasan_save_alloc_info+0x28/0x34
[  142.090679]  __kasan_kmalloc+0x88/0xa0
[  142.091921]  kmalloc_trace+0x54/0x68
[  142.093085]  kasan_bitops_generic+0x4c/0xb8c
[  142.094389]  kunit_try_run_case+0x80/0x184
[  142.095647]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.097077]  kthread+0x16c/0x21c
[  142.098301]  ret_from_fork+0x10/0x20
[  142.099488] 
[  142.100089] The buggy address belongs to the object at ffff0000c5942500
[  142.100089]  which belongs to the cache kmalloc-128 of size 128
[  142.102268] The buggy address is located 8 bytes inside of
[  142.102268]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  142.104384] 
[  142.105002] The buggy address belongs to the physical page:
[  142.106236] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.108058] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.109830] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.111491] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.112933] page dumped because: kasan: bad access detected
[  142.114081] 
[  142.114711] Memory state around the buggy address:
[  142.115879]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.117465]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.119070] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.120532]                       ^
[  142.121519]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.123066]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.124592] ==================================================================
---
[  141.923386] ==================================================================
[  141.924852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb8c
[  141.926722] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.928503] 
[  141.930154] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.932184] Hardware name: linux,dummy-virt (DT)
[  141.933287] Call trace:
[  141.934088]  dump_backtrace+0xf8/0x118
[  141.935329]  show_stack+0x18/0x24
[  141.936508]  __dump_stack+0x28/0x38
[  141.937735]  dump_stack_lvl+0x54/0x6c
[  141.938967]  print_address_description+0x7c/0x20c
[  141.940316]  print_report+0x50/0x68
[  141.941470]  kasan_report+0xac/0x100
[  141.942728]  kasan_check_range+0x260/0x2a0
[  141.944065]  __kasan_check_write+0x2c/0x3c
[  141.945286]  kasan_bitops_generic+0x458/0xb8c
[  141.946592]  kunit_try_run_case+0x80/0x184
[  141.947874]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.949335]  kthread+0x16c/0x21c
[  141.950507]  ret_from_fork+0x10/0x20
[  141.951664] 
[  141.952281] Allocated by task 165:
[  141.953260]  kasan_set_track+0x4c/0x80
[  141.954501]  kasan_save_alloc_info+0x28/0x34
[  141.955863]  __kasan_kmalloc+0x88/0xa0
[  141.957134]  kmalloc_trace+0x54/0x68
[  141.958294]  kasan_bitops_generic+0x4c/0xb8c
[  141.959667]  kunit_try_run_case+0x80/0x184
[  141.960913]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.962410]  kthread+0x16c/0x21c
[  141.963623]  ret_from_fork+0x10/0x20
[  141.964769] 
[  141.965351] The buggy address belongs to the object at ffff0000c5942500
[  141.965351]  which belongs to the cache kmalloc-128 of size 128
[  141.967665] The buggy address is located 8 bytes inside of
[  141.967665]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.969872] 
[  141.970529] The buggy address belongs to the physical page:
[  141.971753] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.973646] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.975331] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.977215] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.978626] page dumped because: kasan: bad access detected
[  141.979822] 
[  141.980482] Memory state around the buggy address:
[  141.981709]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.983277]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.984728] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.986210]                       ^
[  141.987257]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.988747]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.990257] ==================================================================
---
[  141.461752] ==================================================================
[  141.462977] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb8c
[  141.464686] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.466097] 
[  141.466750] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.468593] Hardware name: linux,dummy-virt (DT)
[  141.469702] Call trace:
[  141.470434]  dump_backtrace+0xf8/0x118
[  141.471682]  show_stack+0x18/0x24
[  141.472799]  __dump_stack+0x28/0x38
[  141.474065]  dump_stack_lvl+0x54/0x6c
[  141.475280]  print_address_description+0x7c/0x20c
[  141.476603]  print_report+0x50/0x68
[  141.477783]  kasan_report+0xac/0x100
[  141.478985]  kasan_check_range+0x260/0x2a0
[  141.480222]  __kasan_check_write+0x2c/0x3c
[  141.481446]  kasan_bitops_generic+0x260/0xb8c
[  141.482791]  kunit_try_run_case+0x80/0x184
[  141.484003]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.485531]  kthread+0x16c/0x21c
[  141.486658]  ret_from_fork+0x10/0x20
[  141.487849] 
[  141.488409] Allocated by task 165:
[  141.489384]  kasan_set_track+0x4c/0x80
[  141.490619]  kasan_save_alloc_info+0x28/0x34
[  141.491803]  __kasan_kmalloc+0x88/0xa0
[  141.493068]  kmalloc_trace+0x54/0x68
[  141.494221]  kasan_bitops_generic+0x4c/0xb8c
[  141.495509]  kunit_try_run_case+0x80/0x184
[  141.496698]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.498250]  kthread+0x16c/0x21c
[  141.499386]  ret_from_fork+0x10/0x20
[  141.500518] 
[  141.501100] The buggy address belongs to the object at ffff0000c5942500
[  141.501100]  which belongs to the cache kmalloc-128 of size 128
[  141.503304] The buggy address is located 8 bytes inside of
[  141.503304]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.505466] 
[  141.506089] The buggy address belongs to the physical page:
[  141.507261] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.509087] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.510790] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.512500] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.513969] page dumped because: kasan: bad access detected
[  141.515183] 
[  141.515798] Memory state around the buggy address:
[  141.516938]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.518518]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.520062] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.521524]                       ^
[  141.522544]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.524121]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.525480] ==================================================================
---
[  142.260653] ==================================================================
[  142.262050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb8c
[  142.263860] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  142.265556] 
[  142.266236] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.268053] Hardware name: linux,dummy-virt (DT)
[  142.269127] Call trace:
[  142.269883]  dump_backtrace+0xf8/0x118
[  142.271160]  show_stack+0x18/0x24
[  142.272344]  __dump_stack+0x28/0x38
[  142.273544]  dump_stack_lvl+0x54/0x6c
[  142.274888]  print_address_description+0x7c/0x20c
[  142.276236]  print_report+0x50/0x68
[  142.277440]  kasan_report+0xac/0x100
[  142.278609]  kasan_check_range+0x260/0x2a0
[  142.279971]  __kasan_check_write+0x2c/0x3c
[  142.281149]  kasan_bitops_generic+0x5f4/0xb8c
[  142.282534]  kunit_try_run_case+0x80/0x184
[  142.283752]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.285256]  kthread+0x16c/0x21c
[  142.286457]  ret_from_fork+0x10/0x20
[  142.287601] 
[  142.288182] Allocated by task 165:
[  142.289130]  kasan_set_track+0x4c/0x80
[  142.290386]  kasan_save_alloc_info+0x28/0x34
[  142.291611]  __kasan_kmalloc+0x88/0xa0
[  142.292847]  kmalloc_trace+0x54/0x68
[  142.293972]  kasan_bitops_generic+0x4c/0xb8c
[  142.295278]  kunit_try_run_case+0x80/0x184
[  142.296518]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.298074]  kthread+0x16c/0x21c
[  142.299191]  ret_from_fork+0x10/0x20
[  142.300395] 
[  142.300950] The buggy address belongs to the object at ffff0000c5942500
[  142.300950]  which belongs to the cache kmalloc-128 of size 128
[  142.303166] The buggy address is located 8 bytes inside of
[  142.303166]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  142.305286] 
[  142.305928] The buggy address belongs to the physical page:
[  142.307121] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.308995] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.310810] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.312498] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.313999] page dumped because: kasan: bad access detected
[  142.315210] 
[  142.315837] Memory state around the buggy address:
[  142.317013]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.318647]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.320189] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.321657]                       ^
[  142.322720]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.324255]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.325707] ==================================================================
---
[  141.246982] ==================================================================
[  141.248448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb8c
[  141.250421] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.252141] 
[  141.252794] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.254636] Hardware name: linux,dummy-virt (DT)
[  141.255778] Call trace:
[  141.256512]  dump_backtrace+0xf8/0x118
[  141.257920]  show_stack+0x18/0x24
[  141.259069]  __dump_stack+0x28/0x38
[  141.260305]  dump_stack_lvl+0x54/0x6c
[  141.261537]  print_address_description+0x7c/0x20c
[  141.262880]  print_report+0x50/0x68
[  141.264105]  kasan_report+0xac/0x100
[  141.265493]  kasan_check_range+0x260/0x2a0
[  141.266832]  __kasan_check_write+0x2c/0x3c
[  141.268149]  kasan_bitops_generic+0x1f0/0xb8c
[  141.269417]  kunit_try_run_case+0x80/0x184
[  141.270664]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.272323]  kthread+0x16c/0x21c
[  141.273866]  ret_from_fork+0x10/0x20
[  141.275069] 
[  141.275790] Allocated by task 165:
[  141.276776]  kasan_set_track+0x4c/0x80
[  141.278044]  kasan_save_alloc_info+0x28/0x34
[  141.279322]  __kasan_kmalloc+0x88/0xa0
[  141.280733]  kmalloc_trace+0x54/0x68
[  141.282040]  kasan_bitops_generic+0x4c/0xb8c
[  141.283874]  kunit_try_run_case+0x80/0x184
[  141.285144]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.286693]  kthread+0x16c/0x21c
[  141.287878]  ret_from_fork+0x10/0x20
[  141.289135] 
[  141.289758] The buggy address belongs to the object at ffff0000c5942500
[  141.289758]  which belongs to the cache kmalloc-128 of size 128
[  141.292324] The buggy address is located 8 bytes inside of
[  141.292324]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.294712] 
[  141.295377] The buggy address belongs to the physical page:
[  141.296843] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.299243] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.301158] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.302840] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.304311] page dumped because: kasan: bad access detected
[  141.306563] 
[  141.307270] Memory state around the buggy address:
[  141.308525]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.310057]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.312402] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.314226]                       ^
[  141.315591]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.317064]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.318551] ==================================================================
---
[  141.321822] ==================================================================
[  141.322920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb8c
[  141.324592] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.326283] 
[  141.326866] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.328662] Hardware name: linux,dummy-virt (DT)
[  141.329690] Call trace:
[  141.330671]  dump_backtrace+0xf8/0x118
[  141.331906]  show_stack+0x18/0x24
[  141.333046]  __dump_stack+0x28/0x38
[  141.334262]  dump_stack_lvl+0x54/0x6c
[  141.335492]  print_address_description+0x7c/0x20c
[  141.336973]  print_report+0x50/0x68
[  141.338175]  kasan_report+0xac/0x100
[  141.339544]  kasan_check_range+0x260/0x2a0
[  141.340828]  __kasan_check_write+0x2c/0x3c
[  141.342023]  kasan_bitops_generic+0x244/0xb8c
[  141.343290]  kunit_try_run_case+0x80/0x184
[  141.344620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.346260]  kthread+0x16c/0x21c
[  141.347951]  ret_from_fork+0x10/0x20
[  141.349210] 
[  141.349789] Allocated by task 165:
[  141.350775]  kasan_set_track+0x4c/0x80
[  141.352190]  kasan_save_alloc_info+0x28/0x34
[  141.353337]  __kasan_kmalloc+0x88/0xa0
[  141.354827]  kmalloc_trace+0x54/0x68
[  141.356021]  kasan_bitops_generic+0x4c/0xb8c
[  141.357318]  kunit_try_run_case+0x80/0x184
[  141.358614]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.360346]  kthread+0x16c/0x21c
[  141.361570]  ret_from_fork+0x10/0x20
[  141.362841] 
[  141.363472] The buggy address belongs to the object at ffff0000c5942500
[  141.363472]  which belongs to the cache kmalloc-128 of size 128
[  141.365755] The buggy address is located 8 bytes inside of
[  141.365755]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.368423] 
[  141.368935] The buggy address belongs to the physical page:
[  141.370224] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.372193] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.373962] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.375615] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.377152] page dumped because: kasan: bad access detected
[  141.378283] 
[  141.379590] Memory state around the buggy address:
[  141.380778]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.382279]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.383863] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.385259]                       ^
[  141.387204]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.388788]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.390177] ==================================================================
---
[  141.660335] ==================================================================
[  141.661933] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb8c
[  141.663609] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.665160] 
[  141.665793] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.667577] Hardware name: linux,dummy-virt (DT)
[  141.668636] Call trace:
[  141.669350]  dump_backtrace+0xf8/0x118
[  141.670595]  show_stack+0x18/0x24
[  141.671737]  __dump_stack+0x28/0x38
[  141.672937]  dump_stack_lvl+0x54/0x6c
[  141.674173]  print_address_description+0x7c/0x20c
[  141.675535]  print_report+0x50/0x68
[  141.676659]  kasan_report+0xac/0x100
[  141.677898]  kasan_check_range+0x260/0x2a0
[  141.679241]  __kasan_check_write+0x2c/0x3c
[  141.680445]  kasan_bitops_generic+0x350/0xb8c
[  141.681732]  kunit_try_run_case+0x80/0x184
[  141.682981]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.684524]  kthread+0x16c/0x21c
[  141.685619]  ret_from_fork+0x10/0x20
[  141.686792] 
[  141.687380] Allocated by task 165:
[  141.688318]  kasan_set_track+0x4c/0x80
[  141.689611]  kasan_save_alloc_info+0x28/0x34
[  141.690839]  __kasan_kmalloc+0x88/0xa0
[  141.692053]  kmalloc_trace+0x54/0x68
[  141.693205]  kasan_bitops_generic+0x4c/0xb8c
[  141.694497]  kunit_try_run_case+0x80/0x184
[  141.695727]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.697192]  kthread+0x16c/0x21c
[  141.698422]  ret_from_fork+0x10/0x20
[  141.699567] 
[  141.700132] The buggy address belongs to the object at ffff0000c5942500
[  141.700132]  which belongs to the cache kmalloc-128 of size 128
[  141.702326] The buggy address is located 8 bytes inside of
[  141.702326]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.704479] 
[  141.705082] The buggy address belongs to the physical page:
[  141.706241] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.708087] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.709845] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.711562] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.713041] page dumped because: kasan: bad access detected
[  141.714219] 
[  141.714821] Memory state around the buggy address:
[  141.715961]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.717510]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.719047] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.720512]                       ^
[  141.721497]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.723058]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.724497] ==================================================================
---
[  140.977858] ==================================================================
[  140.979587] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb8c
[  140.981216] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  140.982871] 
[  140.983501] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.985247] Hardware name: linux,dummy-virt (DT)
[  140.986290] Call trace:
[  140.986979]  dump_backtrace+0xf8/0x118
[  140.988288]  show_stack+0x18/0x24
[  140.989459]  __dump_stack+0x28/0x38
[  140.990677]  dump_stack_lvl+0x54/0x6c
[  140.991952]  print_address_description+0x7c/0x20c
[  140.993330]  print_report+0x50/0x68
[  140.994505]  kasan_report+0xac/0x100
[  140.995701]  kasan_check_range+0x260/0x2a0
[  140.997005]  __kasan_check_write+0x2c/0x3c
[  140.998204]  kasan_bitops_generic+0xa8/0xb8c
[  140.999542]  kunit_try_run_case+0x80/0x184
[  141.000780]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.002284]  kthread+0x16c/0x21c
[  141.003444]  ret_from_fork+0x10/0x20
[  141.004592] 
[  141.005160] Allocated by task 165:
[  141.006120]  kasan_set_track+0x4c/0x80
[  141.007342]  kasan_save_alloc_info+0x28/0x34
[  141.008600]  __kasan_kmalloc+0x88/0xa0
[  141.009858]  kmalloc_trace+0x54/0x68
[  141.011009]  kasan_bitops_generic+0x4c/0xb8c
[  141.012277]  kunit_try_run_case+0x80/0x184
[  141.013517]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.015058]  kthread+0x16c/0x21c
[  141.016190]  ret_from_fork+0x10/0x20
[  141.017291] 
[  141.017932] The buggy address belongs to the object at ffff0000c5942500
[  141.017932]  which belongs to the cache kmalloc-128 of size 128
[  141.020129] The buggy address is located 8 bytes inside of
[  141.020129]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.022264] 
[  141.022891] The buggy address belongs to the physical page:
[  141.024026] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.025985] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.027749] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.029312] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.030888] page dumped because: kasan: bad access detected
[  141.032034] 
[  141.032599] Memory state around the buggy address:
[  141.033778]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.035394]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.036933] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.038407]                       ^
[  141.039393]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.040969]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.042417] ==================================================================
---
[  141.527884] ==================================================================
[  141.529780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb8c
[  141.531456] Write of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.532884] 
[  141.533534] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.535436] Hardware name: linux,dummy-virt (DT)
[  141.536559] Call trace:
[  141.537275]  dump_backtrace+0xf8/0x118
[  141.538599]  show_stack+0x18/0x24
[  141.539781]  __dump_stack+0x28/0x38
[  141.540987]  dump_stack_lvl+0x54/0x6c
[  141.542166]  print_address_description+0x7c/0x20c
[  141.543575]  print_report+0x50/0x68
[  141.544735]  kasan_report+0xac/0x100
[  141.545909]  kasan_check_range+0x260/0x2a0
[  141.547232]  __kasan_check_write+0x2c/0x3c
[  141.548448]  kasan_bitops_generic+0x2ac/0xb8c
[  141.549736]  kunit_try_run_case+0x80/0x184
[  141.551011]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.552483]  kthread+0x16c/0x21c
[  141.553598]  ret_from_fork+0x10/0x20
[  141.554739] 
[  141.555306] Allocated by task 165:
[  141.556193]  kasan_set_track+0x4c/0x80
[  141.557428]  kasan_save_alloc_info+0x28/0x34
[  141.558676]  __kasan_kmalloc+0x88/0xa0
[  141.559878]  kmalloc_trace+0x54/0x68
[  141.561061]  kasan_bitops_generic+0x4c/0xb8c
[  141.562292]  kunit_try_run_case+0x80/0x184
[  141.563591]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.565091]  kthread+0x16c/0x21c
[  141.566225]  ret_from_fork+0x10/0x20
[  141.567324] 
[  141.567944] The buggy address belongs to the object at ffff0000c5942500
[  141.567944]  which belongs to the cache kmalloc-128 of size 128
[  141.570189] The buggy address is located 8 bytes inside of
[  141.570189]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.572335] 
[  141.572966] The buggy address belongs to the physical page:
[  141.574105] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.575963] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.577702] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.579421] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.580878] page dumped because: kasan: bad access detected
[  141.582097] 
[  141.582698] Memory state around the buggy address:
[  141.583837]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.585411]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.586923] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.588372]                       ^
[  141.589327]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.590796]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.592256] ==================================================================

test log snippet boot parser 76

Home

[  141.595168] ==================================================================
[  141.596731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb8c
[  141.598298] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.599956] 
[  141.600602] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.602392] Hardware name: linux,dummy-virt (DT)
[  141.603471] Call trace:
[  141.604215]  dump_backtrace+0xf8/0x118
[  141.605449]  show_stack+0x18/0x24
[  141.606632]  __dump_stack+0x28/0x38
[  141.607895]  dump_stack_lvl+0x54/0x6c
[  141.609123]  print_address_description+0x7c/0x20c
[  141.610496]  print_report+0x50/0x68
[  141.611643]  kasan_report+0xac/0x100
[  141.612848]  __asan_load8+0xa8/0xac
[  141.613999]  kasan_bitops_generic+0x2fc/0xb8c
[  141.615310]  kunit_try_run_case+0x80/0x184
[  141.616582]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.618055]  kthread+0x16c/0x21c
[  141.619199]  ret_from_fork+0x10/0x20
[  141.620340] 
[  141.620904] Allocated by task 165:
[  141.621859]  kasan_set_track+0x4c/0x80
[  141.623100]  kasan_save_alloc_info+0x28/0x34
[  141.624326]  __kasan_kmalloc+0x88/0xa0
[  141.625533]  kmalloc_trace+0x54/0x68
[  141.626722]  kasan_bitops_generic+0x4c/0xb8c
[  141.628002]  kunit_try_run_case+0x80/0x184
[  141.629237]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.630714]  kthread+0x16c/0x21c
[  141.631827]  ret_from_fork+0x10/0x20
[  141.632958] 
[  141.633535] The buggy address belongs to the object at ffff0000c5942500
[  141.633535]  which belongs to the cache kmalloc-128 of size 128
[  141.635744] The buggy address is located 8 bytes inside of
[  141.635744]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.637874] 
[  141.638490] The buggy address belongs to the physical page:
[  141.639676] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.641533] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.643229] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.644894] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.646404] page dumped because: kasan: bad access detected
[  141.647492] 
[  141.648037] Memory state around the buggy address:
[  141.649160]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.650738]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.652167] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.653643]                       ^
[  141.654662]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.656128]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.657581] ==================================================================
---
[  141.179291] ==================================================================
[  141.180830] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb8c
[  141.182688] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.184318] 
[  141.184973] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.186811] Hardware name: linux,dummy-virt (DT)
[  141.187915] Call trace:
[  141.188628]  dump_backtrace+0xf8/0x118
[  141.190058]  show_stack+0x18/0x24
[  141.191202]  __dump_stack+0x28/0x38
[  141.192716]  dump_stack_lvl+0x54/0x6c
[  141.194024]  print_address_description+0x7c/0x20c
[  141.195371]  print_report+0x50/0x68
[  141.196630]  kasan_report+0xac/0x100
[  141.197989]  __asan_load8+0xa8/0xac
[  141.199221]  kasan_bitops_generic+0x19c/0xb8c
[  141.200620]  kunit_try_run_case+0x80/0x184
[  141.201890]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.203372]  kthread+0x16c/0x21c
[  141.204630]  ret_from_fork+0x10/0x20
[  141.205814] 
[  141.206372] Allocated by task 165:
[  141.207324]  kasan_set_track+0x4c/0x80
[  141.208722]  kasan_save_alloc_info+0x28/0x34
[  141.210031]  __kasan_kmalloc+0x88/0xa0
[  141.211219]  kmalloc_trace+0x54/0x68
[  141.212448]  kasan_bitops_generic+0x4c/0xb8c
[  141.213843]  kunit_try_run_case+0x80/0x184
[  141.215285]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.216903]  kthread+0x16c/0x21c
[  141.218081]  ret_from_fork+0x10/0x20
[  141.219198] 
[  141.219793] The buggy address belongs to the object at ffff0000c5942500
[  141.219793]  which belongs to the cache kmalloc-128 of size 128
[  141.222007] The buggy address is located 8 bytes inside of
[  141.222007]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.224240] 
[  141.224863] The buggy address belongs to the physical page:
[  141.226028] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.228000] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.229845] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.231621] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.233180] page dumped because: kasan: bad access detected
[  141.234328] 
[  141.234922] Memory state around the buggy address:
[  141.236093]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.237646]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.239243] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.240787]                       ^
[  141.241832]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.243306]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.244758] ==================================================================
---
[  142.127074] ==================================================================
[  142.128942] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb8c
[  142.130614] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  142.132201] 
[  142.132887] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.134703] Hardware name: linux,dummy-virt (DT)
[  142.135832] Call trace:
[  142.136621]  dump_backtrace+0xf8/0x118
[  142.137883]  show_stack+0x18/0x24
[  142.139067]  __dump_stack+0x28/0x38
[  142.140275]  dump_stack_lvl+0x54/0x6c
[  142.141525]  print_address_description+0x7c/0x20c
[  142.142868]  print_report+0x50/0x68
[  142.144019]  kasan_report+0xac/0x100
[  142.145229]  __asan_load8+0xa8/0xac
[  142.146432]  kasan_bitops_generic+0x54c/0xb8c
[  142.147756]  kunit_try_run_case+0x80/0x184
[  142.149026]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.150507]  kthread+0x16c/0x21c
[  142.151645]  ret_from_fork+0x10/0x20
[  142.152822] 
[  142.153381] Allocated by task 165:
[  142.154257]  kasan_set_track+0x4c/0x80
[  142.155516]  kasan_save_alloc_info+0x28/0x34
[  142.156746]  __kasan_kmalloc+0x88/0xa0
[  142.158042]  kmalloc_trace+0x54/0x68
[  142.159211]  kasan_bitops_generic+0x4c/0xb8c
[  142.160517]  kunit_try_run_case+0x80/0x184
[  142.161815]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.163290]  kthread+0x16c/0x21c
[  142.164456]  ret_from_fork+0x10/0x20
[  142.165605] 
[  142.166210] The buggy address belongs to the object at ffff0000c5942500
[  142.166210]  which belongs to the cache kmalloc-128 of size 128
[  142.168407] The buggy address is located 8 bytes inside of
[  142.168407]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  142.170586] 
[  142.171189] The buggy address belongs to the physical page:
[  142.172419] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.174277] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.175994] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.177757] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.179172] page dumped because: kasan: bad access detected
[  142.180346] 
[  142.180978] Memory state around the buggy address:
[  142.182059]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.183657]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.185185] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.187580]                       ^
[  142.189052]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.190508]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.192068] ==================================================================
---
[  141.726935] ==================================================================
[  141.728193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb8c
[  141.729993] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.731584] 
[  141.732211] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.734009] Hardware name: linux,dummy-virt (DT)
[  141.735059] Call trace:
[  141.735788]  dump_backtrace+0xf8/0x118
[  141.737007]  show_stack+0x18/0x24
[  141.738203]  __dump_stack+0x28/0x38
[  141.739425]  dump_stack_lvl+0x54/0x6c
[  141.740642]  print_address_description+0x7c/0x20c
[  141.741976]  print_report+0x50/0x68
[  141.743117]  kasan_report+0xac/0x100
[  141.744316]  __asan_load8+0xa8/0xac
[  141.745480]  kasan_bitops_generic+0x3a0/0xb8c
[  141.746823]  kunit_try_run_case+0x80/0x184
[  141.748084]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.749522]  kthread+0x16c/0x21c
[  141.750712]  ret_from_fork+0x10/0x20
[  141.751864] 
[  141.752449] Allocated by task 165:
[  141.753385]  kasan_set_track+0x4c/0x80
[  141.754576]  kasan_save_alloc_info+0x28/0x34
[  141.755858]  __kasan_kmalloc+0x88/0xa0
[  141.757081]  kmalloc_trace+0x54/0x68
[  141.758252]  kasan_bitops_generic+0x4c/0xb8c
[  141.759494]  kunit_try_run_case+0x80/0x184
[  141.760768]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.762300]  kthread+0x16c/0x21c
[  141.763438]  ret_from_fork+0x10/0x20
[  141.764578] 
[  141.765130] The buggy address belongs to the object at ffff0000c5942500
[  141.765130]  which belongs to the cache kmalloc-128 of size 128
[  141.767337] The buggy address is located 8 bytes inside of
[  141.767337]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.769563] 
[  141.770176] The buggy address belongs to the physical page:
[  141.771317] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.773234] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.774952] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.776590] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.778142] page dumped because: kasan: bad access detected
[  141.779330] 
[  141.779887] Memory state around the buggy address:
[  141.781049]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.782574]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.784148] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.785568]                       ^
[  141.786539]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.788048]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.789451] ==================================================================
---
[  141.045140] ==================================================================
[  141.046755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb8c
[  141.048315] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.049961] 
[  141.050616] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.052525] Hardware name: linux,dummy-virt (DT)
[  141.053629] Call trace:
[  141.054428]  dump_backtrace+0xf8/0x118
[  141.056015]  show_stack+0x18/0x24
[  141.057406]  __dump_stack+0x28/0x38
[  141.058931]  dump_stack_lvl+0x54/0x6c
[  141.060200]  print_address_description+0x7c/0x20c
[  141.061638]  print_report+0x50/0x68
[  141.062864]  kasan_report+0xac/0x100
[  141.064090]  __asan_load8+0xa8/0xac
[  141.065294]  kasan_bitops_generic+0xf8/0xb8c
[  141.066590]  kunit_try_run_case+0x80/0x184
[  141.067897]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.069384]  kthread+0x16c/0x21c
[  141.070529]  ret_from_fork+0x10/0x20
[  141.071765] 
[  141.072335] Allocated by task 165:
[  141.073296]  kasan_set_track+0x4c/0x80
[  141.074550]  kasan_save_alloc_info+0x28/0x34
[  141.075790]  __kasan_kmalloc+0x88/0xa0
[  141.076980]  kmalloc_trace+0x54/0x68
[  141.078216]  kasan_bitops_generic+0x4c/0xb8c
[  141.079562]  kunit_try_run_case+0x80/0x184
[  141.080812]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.082276]  kthread+0x16c/0x21c
[  141.083433]  ret_from_fork+0x10/0x20
[  141.084567] 
[  141.085141] The buggy address belongs to the object at ffff0000c5942500
[  141.085141]  which belongs to the cache kmalloc-128 of size 128
[  141.087402] The buggy address is located 8 bytes inside of
[  141.087402]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.089558] 
[  141.090181] The buggy address belongs to the physical page:
[  141.091377] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.093233] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.094990] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.096642] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.098117] page dumped because: kasan: bad access detected
[  141.099296] 
[  141.099872] Memory state around the buggy address:
[  141.100976]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.102547]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.104105] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.105541]                       ^
[  141.106503]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.108086]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.109518] ==================================================================
---
[  142.194431] ==================================================================
[  142.196223] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb8c
[  142.197940] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  142.199536] 
[  142.200184] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.201987] Hardware name: linux,dummy-virt (DT)
[  142.203065] Call trace:
[  142.203808]  dump_backtrace+0xf8/0x118
[  142.205079]  show_stack+0x18/0x24
[  142.206314]  __dump_stack+0x28/0x38
[  142.207512]  dump_stack_lvl+0x54/0x6c
[  142.208814]  print_address_description+0x7c/0x20c
[  142.210158]  print_report+0x50/0x68
[  142.211405]  kasan_report+0xac/0x100
[  142.212622]  __asan_load8+0xa8/0xac
[  142.213847]  kasan_bitops_generic+0x59c/0xb8c
[  142.215125]  kunit_try_run_case+0x80/0x184
[  142.216340]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.217872]  kthread+0x16c/0x21c
[  142.219086]  ret_from_fork+0x10/0x20
[  142.220201] 
[  142.220780] Allocated by task 165:
[  142.221727]  kasan_set_track+0x4c/0x80
[  142.222949]  kasan_save_alloc_info+0x28/0x34
[  142.224142]  __kasan_kmalloc+0x88/0xa0
[  142.225420]  kmalloc_trace+0x54/0x68
[  142.226663]  kasan_bitops_generic+0x4c/0xb8c
[  142.227924]  kunit_try_run_case+0x80/0x184
[  142.229255]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.230742]  kthread+0x16c/0x21c
[  142.231875]  ret_from_fork+0x10/0x20
[  142.232991] 
[  142.233583] The buggy address belongs to the object at ffff0000c5942500
[  142.233583]  which belongs to the cache kmalloc-128 of size 128
[  142.235850] The buggy address is located 8 bytes inside of
[  142.235850]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  142.238001] 
[  142.238614] The buggy address belongs to the physical page:
[  142.239850] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.241720] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.243469] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.245118] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.246617] page dumped because: kasan: bad access detected
[  142.247818] 
[  142.248448] Memory state around the buggy address:
[  142.249607]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.251122]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.252687] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.254087]                       ^
[  142.255121]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.256716]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.258196] ==================================================================
---
[  141.992663] ==================================================================
[  141.994416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb8c
[  141.996246] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.998047] 
[  141.998837] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.000717] Hardware name: linux,dummy-virt (DT)
[  142.001851] Call trace:
[  142.002657]  dump_backtrace+0xf8/0x118
[  142.003888]  show_stack+0x18/0x24
[  142.005026]  __dump_stack+0x28/0x38
[  142.006265]  dump_stack_lvl+0x54/0x6c
[  142.007554]  print_address_description+0x7c/0x20c
[  142.008897]  print_report+0x50/0x68
[  142.010414]  kasan_report+0xac/0x100
[  142.011697]  __asan_load8+0xa8/0xac
[  142.012880]  kasan_bitops_generic+0x4a8/0xb8c
[  142.014230]  kunit_try_run_case+0x80/0x184
[  142.015503]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.016964]  kthread+0x16c/0x21c
[  142.018183]  ret_from_fork+0x10/0x20
[  142.019373] 
[  142.019978] Allocated by task 165:
[  142.020964]  kasan_set_track+0x4c/0x80
[  142.022220]  kasan_save_alloc_info+0x28/0x34
[  142.023441]  __kasan_kmalloc+0x88/0xa0
[  142.024756]  kmalloc_trace+0x54/0x68
[  142.025936]  kasan_bitops_generic+0x4c/0xb8c
[  142.027214]  kunit_try_run_case+0x80/0x184
[  142.028471]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.029945]  kthread+0x16c/0x21c
[  142.031146]  ret_from_fork+0x10/0x20
[  142.032298] 
[  142.032918] The buggy address belongs to the object at ffff0000c5942500
[  142.032918]  which belongs to the cache kmalloc-128 of size 128
[  142.035095] The buggy address is located 8 bytes inside of
[  142.035095]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  142.037215] 
[  142.037874] The buggy address belongs to the physical page:
[  142.039131] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.040996] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.042774] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.044413] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.045972] page dumped because: kasan: bad access detected
[  142.047169] 
[  142.047785] Memory state around the buggy address:
[  142.048898]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.050511]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.052032] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.053495]                       ^
[  142.054530]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.056075]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.057520] ==================================================================
---
[  141.858257] ==================================================================
[  141.859624] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb8c
[  141.861444] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.862919] 
[  141.863522] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.865426] Hardware name: linux,dummy-virt (DT)
[  141.866527] Call trace:
[  141.867236]  dump_backtrace+0xf8/0x118
[  141.868494]  show_stack+0x18/0x24
[  141.869628]  __dump_stack+0x28/0x38
[  141.870838]  dump_stack_lvl+0x54/0x6c
[  141.872057]  print_address_description+0x7c/0x20c
[  141.873420]  print_report+0x50/0x68
[  141.874571]  kasan_report+0xac/0x100
[  141.875767]  __asan_load8+0xa8/0xac
[  141.876966]  kasan_bitops_generic+0x3fc/0xb8c
[  141.878222]  kunit_try_run_case+0x80/0x184
[  141.879543]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.880957]  kthread+0x16c/0x21c
[  141.882162]  ret_from_fork+0x10/0x20
[  141.883251] 
[  141.883798] Allocated by task 165:
[  141.884699]  kasan_set_track+0x4c/0x80
[  141.885920]  kasan_save_alloc_info+0x28/0x34
[  141.887139]  __kasan_kmalloc+0x88/0xa0
[  141.888390]  kmalloc_trace+0x54/0x68
[  141.889529]  kasan_bitops_generic+0x4c/0xb8c
[  141.890789]  kunit_try_run_case+0x80/0x184
[  141.891984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.893520]  kthread+0x16c/0x21c
[  141.894652]  ret_from_fork+0x10/0x20
[  141.895788] 
[  141.896351] The buggy address belongs to the object at ffff0000c5942500
[  141.896351]  which belongs to the cache kmalloc-128 of size 128
[  141.898574] The buggy address is located 8 bytes inside of
[  141.898574]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.900716] 
[  141.901315] The buggy address belongs to the physical page:
[  141.902514] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.904388] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.906170] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.907869] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.909351] page dumped because: kasan: bad access detected
[  141.910555] 
[  141.911123] Memory state around the buggy address:
[  141.912270]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.913777]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.915315] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.916707]                       ^
[  141.917701]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.919280]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.920714] ==================================================================
---
[  141.393271] ==================================================================
[  141.395549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb8c
[  141.397158] Read of size 8 at addr ffff0000c5942508 by task kunit_try_catch/165
[  141.399002] 
[  141.399577] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  141.401382] Hardware name: linux,dummy-virt (DT)
[  141.402499] Call trace:
[  141.403290]  dump_backtrace+0xf8/0x118
[  141.404531]  show_stack+0x18/0x24
[  141.405702]  __dump_stack+0x28/0x38
[  141.406903]  dump_stack_lvl+0x54/0x6c
[  141.408154]  print_address_description+0x7c/0x20c
[  141.409514]  print_report+0x50/0x68
[  141.410703]  kasan_report+0xac/0x100
[  141.411914]  __asan_load8+0xa8/0xac
[  141.413088]  kasan_bitops_generic+0x24c/0xb8c
[  141.414438]  kunit_try_run_case+0x80/0x184
[  141.415663]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.417171]  kthread+0x16c/0x21c
[  141.418344]  ret_from_fork+0x10/0x20
[  141.419505] 
[  141.420047] Allocated by task 165:
[  141.420983]  kasan_set_track+0x4c/0x80
[  141.422285]  kasan_save_alloc_info+0x28/0x34
[  141.423528]  __kasan_kmalloc+0x88/0xa0
[  141.424746]  kmalloc_trace+0x54/0x68
[  141.425902]  kasan_bitops_generic+0x4c/0xb8c
[  141.427164]  kunit_try_run_case+0x80/0x184
[  141.428430]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  141.429869]  kthread+0x16c/0x21c
[  141.431004]  ret_from_fork+0x10/0x20
[  141.432099] 
[  141.432672] The buggy address belongs to the object at ffff0000c5942500
[  141.432672]  which belongs to the cache kmalloc-128 of size 128
[  141.434848] The buggy address is located 8 bytes inside of
[  141.434848]  128-byte region [ffff0000c5942500, ffff0000c5942580)
[  141.436954] 
[  141.437562] The buggy address belongs to the physical page:
[  141.438749] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  141.440590] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  141.442341] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  141.444039] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  141.445518] page dumped because: kasan: bad access detected
[  141.446712] 
[  141.447265] Memory state around the buggy address:
[  141.448431]  ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  141.449919]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.451477] >ffff0000c5942500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.452887]                       ^
[  141.453883]  ffff0000c5942580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.455425]  ffff0000c5942600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.456867] ==================================================================

test log snippet boot parser 77

Home

[  136.443471] ==================================================================
[  136.445504] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c
[  136.447342] Write of size 1 at addr ffff0000c586df00 by task kunit_try_catch/128
[  136.448909] 
[  136.449551] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.451373] Hardware name: linux,dummy-virt (DT)
[  136.452525] Call trace:
[  136.453231]  dump_backtrace+0xf8/0x118
[  136.454548]  show_stack+0x18/0x24
[  136.455766]  __dump_stack+0x28/0x38
[  136.456785]  dump_stack_lvl+0x54/0x6c
[  136.458143]  print_address_description+0x7c/0x20c
[  136.459494]  print_report+0x50/0x68
[  136.460807]  kasan_report+0xac/0x100
[  136.462043]  __asan_store1+0x6c/0x70
[  136.463239]  kmalloc_large_oob_right+0xa0/0x14c
[  136.464581]  kunit_try_run_case+0x80/0x184
[  136.465829]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.467676]  kthread+0x16c/0x21c
[  136.468988]  ret_from_fork+0x10/0x20
[  136.470164] 
[  136.470746] Allocated by task 128:
[  136.471441]  kasan_set_track+0x4c/0x80
[  136.472894]  kasan_save_alloc_info+0x28/0x34
[  136.474097]  __kasan_kmalloc+0x88/0xa0
[  136.475368]  kmalloc_trace+0x54/0x68
[  136.476968]  kmalloc_large_oob_right+0x48/0x14c
[  136.478300]  kunit_try_run_case+0x80/0x184
[  136.479560]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.481021]  kthread+0x16c/0x21c
[  136.482238]  ret_from_fork+0x10/0x20
[  136.483429] 
[  136.484029] The buggy address belongs to the object at ffff0000c586c000
[  136.484029]  which belongs to the cache kmalloc-8k of size 8192
[  136.486697] The buggy address is located 7936 bytes inside of
[  136.486697]  8192-byte region [ffff0000c586c000, ffff0000c586e000)
[  136.488950] 
[  136.489908] The buggy address belongs to the physical page:
[  136.491019] page:000000005663c838 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105868
[  136.493100] head:000000005663c838 order:3 compound_mapcount:0 compound_pincount:0
[  136.494668] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.496497] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[  136.498282] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  136.499979] page dumped because: kasan: bad access detected
[  136.501156] 
[  136.501585] Memory state around the buggy address:
[  136.502762]  ffff0000c586de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.504374]  ffff0000c586de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.506267] >ffff0000c586df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.507855]                    ^
[  136.508665]  ffff0000c586df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.509427]  ffff0000c586e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.510651] ==================================================================

test log snippet boot parser 78

Home

[  138.351273] ==================================================================
[  138.353491] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160
[  138.355286] Read of size 64 at addr ffff0000c593cb04 by task kunit_try_catch/142
[  138.357262] 
[  138.357991] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.360312] Hardware name: linux,dummy-virt (DT)
[  138.361344] Call trace:
[  138.362200]  dump_backtrace+0xf8/0x118
[  138.363408]  show_stack+0x18/0x24
[  138.365028]  __dump_stack+0x28/0x38
[  138.366244]  dump_stack_lvl+0x54/0x6c
[  138.367623]  print_address_description+0x7c/0x20c
[  138.369151]  print_report+0x50/0x68
[  138.370337]  kasan_report+0xac/0x100
[  138.371559]  kasan_check_range+0x260/0x2a0
[  138.372949]  memmove+0x48/0x90
[  138.373744]  kmalloc_memmove_invalid_size+0xb8/0x160
[  138.375179]  kunit_try_run_case+0x80/0x184
[  138.376758]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.378265]  kthread+0x16c/0x21c
[  138.379490]  ret_from_fork+0x10/0x20
[  138.381146] 
[  138.381737] Allocated by task 142:
[  138.382614]  kasan_set_track+0x4c/0x80
[  138.383291]  kasan_save_alloc_info+0x28/0x34
[  138.384856]  __kasan_kmalloc+0x88/0xa0
[  138.386114]  kmalloc_trace+0x54/0x68
[  138.387313]  kmalloc_memmove_invalid_size+0x48/0x160
[  138.388833]  kunit_try_run_case+0x80/0x184
[  138.390207]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.391862]  kthread+0x16c/0x21c
[  138.393058]  ret_from_fork+0x10/0x20
[  138.394140] 
[  138.394763] The buggy address belongs to the object at ffff0000c593cb00
[  138.394763]  which belongs to the cache kmalloc-128 of size 128
[  138.397326] The buggy address is located 4 bytes inside of
[  138.397326]  128-byte region [ffff0000c593cb00, ffff0000c593cb80)
[  138.399476] 
[  138.400695] The buggy address belongs to the physical page:
[  138.401918] page:00000000f1dc7839 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593c
[  138.403853] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.405605] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.407453] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.409060] page dumped because: kasan: bad access detected
[  138.410436] 
[  138.411029] Memory state around the buggy address:
[  138.412286]  ffff0000c593ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  138.414291]  ffff0000c593ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.415744] >ffff0000c593cb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  138.417214]                                            ^
[  138.418804]  ffff0000c593cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.420613]  ffff0000c593cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.421851] ==================================================================

test log snippet boot parser 79

Home

[  136.106434] ==================================================================
[  136.108579] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c
[  136.110343] Read of size 1 at addr ffff0000c59a7000 by task kunit_try_catch/122
[  136.112053] 
[  136.113150] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.114876] Hardware name: linux,dummy-virt (DT)
[  136.116255] Call trace:
[  136.117018]  dump_backtrace+0xf8/0x118
[  136.118270]  show_stack+0x18/0x24
[  136.119447]  __dump_stack+0x28/0x38
[  136.120794]  dump_stack_lvl+0x54/0x6c
[  136.122043]  print_address_description+0x7c/0x20c
[  136.123447]  print_report+0x50/0x68
[  136.124684]  kasan_report+0xac/0x100
[  136.125861]  __asan_load1+0x6c/0x70
[  136.127097]  kmalloc_node_oob_right+0xa4/0x15c
[  136.128437]  kunit_try_run_case+0x80/0x184
[  136.129831]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.131388]  kthread+0x16c/0x21c
[  136.132661]  ret_from_fork+0x10/0x20
[  136.133967] 
[  136.134417] Allocated by task 122:
[  136.135380]  kasan_set_track+0x4c/0x80
[  136.136819]  kasan_save_alloc_info+0x28/0x34
[  136.138077]  __kasan_kmalloc+0x88/0xa0
[  136.139395]  kmalloc_node_trace+0x4c/0x60
[  136.140666]  kmalloc_node_oob_right+0x4c/0x15c
[  136.141937]  kunit_try_run_case+0x80/0x184
[  136.143174]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.144837]  kthread+0x16c/0x21c
[  136.146041]  ret_from_fork+0x10/0x20
[  136.147154] 
[  136.147766] The buggy address belongs to the object at ffff0000c59a6000
[  136.147766]  which belongs to the cache kmalloc-4k of size 4096
[  136.150253] The buggy address is located 0 bytes to the right of
[  136.150253]  4096-byte region [ffff0000c59a6000, ffff0000c59a7000)
[  136.152526] 
[  136.153508] The buggy address belongs to the physical page:
[  136.154842] page:00000000968a952a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[  136.156740] head:00000000968a952a order:3 compound_mapcount:0 compound_pincount:0
[  136.158630] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.160600] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[  136.162252] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  136.163999] page dumped because: kasan: bad access detected
[  136.164898] 
[  136.165508] Memory state around the buggy address:
[  136.166744]  ffff0000c59a6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.168272]  ffff0000c59a6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.170726] >ffff0000c59a7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.172299]                    ^
[  136.173386]  ffff0000c59a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.174929]  ffff0000c59a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.176347] ==================================================================

test log snippet boot parser 80

Home

[  137.670415] ==================================================================
[  137.672821] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac
[  137.674416] Write of size 16 at addr ffff0000c5922700 by task kunit_try_catch/134
[  137.676156] 
[  137.676883] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.679138] Hardware name: linux,dummy-virt (DT)
[  137.680277] Call trace:
[  137.681494]  dump_backtrace+0xf8/0x118
[  137.682743]  show_stack+0x18/0x24
[  137.684003]  __dump_stack+0x28/0x38
[  137.685419]  dump_stack_lvl+0x54/0x6c
[  137.686644]  print_address_description+0x7c/0x20c
[  137.688409]  print_report+0x50/0x68
[  137.689545]  kasan_report+0xac/0x100
[  137.690792]  kasan_check_range+0x260/0x2a0
[  137.692053]  memcpy+0x60/0x90
[  137.693190]  kmalloc_oob_16+0xfc/0x1ac
[  137.694432]  kunit_try_run_case+0x80/0x184
[  137.695676]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.696960]  kthread+0x16c/0x21c
[  137.698101]  ret_from_fork+0x10/0x20
[  137.699325] 
[  137.699941] Allocated by task 134:
[  137.700872]  kasan_set_track+0x4c/0x80
[  137.702056]  kasan_save_alloc_info+0x28/0x34
[  137.703468]  __kasan_kmalloc+0x88/0xa0
[  137.705398]  kmalloc_trace+0x54/0x68
[  137.706729]  kmalloc_oob_16+0x48/0x1ac
[  137.707942]  kunit_try_run_case+0x80/0x184
[  137.709107]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.710915]  kthread+0x16c/0x21c
[  137.712246]  ret_from_fork+0x10/0x20
[  137.713527] 
[  137.714181] The buggy address belongs to the object at ffff0000c5922700
[  137.714181]  which belongs to the cache kmalloc-128 of size 128
[  137.716798] The buggy address is located 0 bytes inside of
[  137.716798]  128-byte region [ffff0000c5922700, ffff0000c5922780)
[  137.718834] 
[  137.719524] The buggy address belongs to the physical page:
[  137.721019] page:00000000dad02aed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[  137.722835] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  137.724857] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  137.726574] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.728299] page dumped because: kasan: bad access detected
[  137.729802] 
[  137.730327] Memory state around the buggy address:
[  137.731449]  ffff0000c5922600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  137.733430]  ffff0000c5922680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.734948] >ffff0000c5922700: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.736561]                       ^
[  137.737467]  ffff0000c5922780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.739017]  ffff0000c5922800: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.741036] ==================================================================

test log snippet boot parser 81

Home

[  137.852218] ==================================================================
[  137.854467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150
[  137.856456] Write of size 128 at addr ffff0000c5922c00 by task kunit_try_catch/136
[  137.858438] 
[  137.859265] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.861450] Hardware name: linux,dummy-virt (DT)
[  137.862770] Call trace:
[  137.863453]  dump_backtrace+0xf8/0x118
[  137.864959]  show_stack+0x18/0x24
[  137.866250]  __dump_stack+0x28/0x38
[  137.867549]  dump_stack_lvl+0x54/0x6c
[  137.868909]  print_address_description+0x7c/0x20c
[  137.870390]  print_report+0x50/0x68
[  137.871777]  kasan_report+0xac/0x100
[  137.873214]  kasan_check_range+0x260/0x2a0
[  137.874595]  memset+0x40/0x70
[  137.875780]  kmalloc_oob_in_memset+0xa8/0x150
[  137.877180]  kunit_try_run_case+0x80/0x184
[  137.878655]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.880479]  kthread+0x16c/0x21c
[  137.882107]  ret_from_fork+0x10/0x20
[  137.883330] 
[  137.883858] Allocated by task 136:
[  137.884803]  kasan_set_track+0x4c/0x80
[  137.886207]  kasan_save_alloc_info+0x28/0x34
[  137.887766]  __kasan_kmalloc+0x88/0xa0
[  137.889538]  kmalloc_trace+0x54/0x68
[  137.890791]  kmalloc_oob_in_memset+0x48/0x150
[  137.892172]  kunit_try_run_case+0x80/0x184
[  137.893496]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.894949]  kthread+0x16c/0x21c
[  137.896131]  ret_from_fork+0x10/0x20
[  137.897323] 
[  137.897945] The buggy address belongs to the object at ffff0000c5922c00
[  137.897945]  which belongs to the cache kmalloc-128 of size 128
[  137.900818] The buggy address is located 0 bytes inside of
[  137.900818]  128-byte region [ffff0000c5922c00, ffff0000c5922c80)
[  137.902936] 
[  137.903552] The buggy address belongs to the physical page:
[  137.904707] page:00000000dad02aed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[  137.906410] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  137.907342] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  137.909042] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.910397] page dumped because: kasan: bad access detected
[  137.911891] 
[  137.912508] Memory state around the buggy address:
[  137.914146]  ffff0000c5922b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  137.915543]  ffff0000c5922b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.917347] >ffff0000c5922c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  137.918708]                                                                 ^
[  137.920211]  ffff0000c5922c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.921874]  ffff0000c5922d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.923280] ==================================================================

test log snippet boot parser 82

Home

[  136.021424] ==================================================================
[  136.023947] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154
[  136.026413] Read of size 1 at addr ffff0000c59c61ff by task kunit_try_catch/121
[  136.028482] 
[  136.029116] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.030885] Hardware name: linux,dummy-virt (DT)
[  136.032145] Call trace:
[  136.033243]  dump_backtrace+0xf8/0x118
[  136.034949]  show_stack+0x18/0x24
[  136.036319]  __dump_stack+0x28/0x38
[  136.037596]  dump_stack_lvl+0x54/0x6c
[  136.038823]  print_address_description+0x7c/0x20c
[  136.040477]  print_report+0x50/0x68
[  136.042061]  kasan_report+0xac/0x100
[  136.043259]  __asan_load1+0x6c/0x70
[  136.044707]  kmalloc_oob_left+0x9c/0x154
[  136.046033]  kunit_try_run_case+0x80/0x184
[  136.047323]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.049120]  kthread+0x16c/0x21c
[  136.050421]  ret_from_fork+0x10/0x20
[  136.051836] 
[  136.052562] Allocated by task 2:
[  136.053588]  kasan_set_track+0x4c/0x80
[  136.054924]  kasan_save_alloc_info+0x28/0x34
[  136.056194]  __kasan_kmalloc+0x88/0xa0
[  136.057485]  kmalloc_trace+0x54/0x68
[  136.058873]  set_kthread_struct+0x5c/0xf8
[  136.060290]  copy_process+0x61c/0x1360
[  136.061770]  kernel_clone+0xdc/0x378
[  136.062994]  kernel_thread+0x74/0xa4
[  136.064806]  kthreadd+0x218/0x238
[  136.066273]  ret_from_fork+0x10/0x20
[  136.067471] 
[  136.068249] The buggy address belongs to the object at ffff0000c59c6100
[  136.068249]  which belongs to the cache kmalloc-128 of size 128
[  136.070281] The buggy address is located 127 bytes to the right of
[  136.070281]  128-byte region [ffff0000c59c6100, ffff0000c59c6180)
[  136.072893] 
[  136.073517] The buggy address belongs to the physical page:
[  136.075239] page:0000000097f317ad refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c6
[  136.077447] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  136.079155] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  136.081056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.082529] page dumped because: kasan: bad access detected
[  136.083850] 
[  136.084421] Memory state around the buggy address:
[  136.085374]  ffff0000c59c6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.086976]  ffff0000c59c6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  136.088707] >ffff0000c59c6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.089958]                                                                 ^
[  136.091393]  ffff0000c59c6200: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.092992]  ffff0000c59c6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.094497] ==================================================================

test log snippet boot parser 83

Home

[  138.185990] ==================================================================
[  138.187874] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154
[  138.190527] Write of size 16 at addr ffff0000c58e4469 by task kunit_try_catch/140
[  138.193051] 
[  138.193700] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.195655] Hardware name: linux,dummy-virt (DT)
[  138.197461] Call trace:
[  138.198163]  dump_backtrace+0xf8/0x118
[  138.199440]  show_stack+0x18/0x24
[  138.200717]  __dump_stack+0x28/0x38
[  138.201724]  dump_stack_lvl+0x54/0x6c
[  138.203045]  print_address_description+0x7c/0x20c
[  138.204609]  print_report+0x50/0x68
[  138.205696]  kasan_report+0xac/0x100
[  138.207086]  kasan_check_range+0x260/0x2a0
[  138.208626]  memset+0x40/0x70
[  138.209794]  kmalloc_oob_memset_16+0xac/0x154
[  138.211142]  kunit_try_run_case+0x80/0x184
[  138.212884]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.214462]  kthread+0x16c/0x21c
[  138.215572]  ret_from_fork+0x10/0x20
[  138.216756] 
[  138.217415] Allocated by task 140:
[  138.218428]  kasan_set_track+0x4c/0x80
[  138.219706]  kasan_save_alloc_info+0x28/0x34
[  138.221135]  __kasan_kmalloc+0x88/0xa0
[  138.222536]  kmalloc_trace+0x54/0x68
[  138.223759]  kmalloc_oob_memset_16+0x48/0x154
[  138.225262]  kunit_try_run_case+0x80/0x184
[  138.226623]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.228273]  kthread+0x16c/0x21c
[  138.229521]  ret_from_fork+0x10/0x20
[  138.230742] 
[  138.231385] The buggy address belongs to the object at ffff0000c58e4400
[  138.231385]  which belongs to the cache kmalloc-128 of size 128
[  138.234047] The buggy address is located 105 bytes inside of
[  138.234047]  128-byte region [ffff0000c58e4400, ffff0000c58e4480)
[  138.236726] 
[  138.237399] The buggy address belongs to the physical page:
[  138.238501] page:00000000d0241a86 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e4
[  138.240737] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.242505] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.244159] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.245970] page dumped because: kasan: bad access detected
[  138.247121] 
[  138.247939] Memory state around the buggy address:
[  138.249081]  ffff0000c58e4300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.250950]  ffff0000c58e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.252667] >ffff0000c58e4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  138.254124]                                                                 ^
[  138.255798]  ffff0000c58e4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.257765]  ffff0000c58e4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.259107] ==================================================================

test log snippet boot parser 84

Home

[  138.018886] ==================================================================
[  138.021536] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154
[  138.022920] Write of size 4 at addr ffff0000c58e4075 by task kunit_try_catch/138
[  138.024561] 
[  138.025551] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.027344] Hardware name: linux,dummy-virt (DT)
[  138.028498] Call trace:
[  138.029786]  dump_backtrace+0xf8/0x118
[  138.031020]  show_stack+0x18/0x24
[  138.032289]  __dump_stack+0x28/0x38
[  138.033688]  dump_stack_lvl+0x54/0x6c
[  138.034908]  print_address_description+0x7c/0x20c
[  138.036292]  print_report+0x50/0x68
[  138.037613]  kasan_report+0xac/0x100
[  138.038844]  kasan_check_range+0x260/0x2a0
[  138.040436]  memset+0x40/0x70
[  138.041380]  kmalloc_oob_memset_4+0xac/0x154
[  138.042601]  kunit_try_run_case+0x80/0x184
[  138.043924]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.045494]  kthread+0x16c/0x21c
[  138.046722]  ret_from_fork+0x10/0x20
[  138.047979] 
[  138.048907] Allocated by task 138:
[  138.049868]  kasan_set_track+0x4c/0x80
[  138.051118]  kasan_save_alloc_info+0x28/0x34
[  138.052338]  __kasan_kmalloc+0x88/0xa0
[  138.053587]  kmalloc_trace+0x54/0x68
[  138.054720]  kmalloc_oob_memset_4+0x48/0x154
[  138.055713]  kunit_try_run_case+0x80/0x184
[  138.056404]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.058528]  kthread+0x16c/0x21c
[  138.060128]  ret_from_fork+0x10/0x20
[  138.061414] 
[  138.062186] The buggy address belongs to the object at ffff0000c58e4000
[  138.062186]  which belongs to the cache kmalloc-128 of size 128
[  138.064447] The buggy address is located 117 bytes inside of
[  138.064447]  128-byte region [ffff0000c58e4000, ffff0000c58e4080)
[  138.067428] 
[  138.068323] The buggy address belongs to the physical page:
[  138.069688] page:00000000d0241a86 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e4
[  138.072085] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.073555] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.075298] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.076755] page dumped because: kasan: bad access detected
[  138.078276] 
[  138.079024] Memory state around the buggy address:
[  138.080419]  ffff0000c58e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  138.082149]  ffff0000c58e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  138.083803] >ffff0000c58e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  138.085743]                                                                 ^
[  138.087350]  ffff0000c58e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.089237]  ffff0000c58e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.090751] ==================================================================

test log snippet boot parser 85

Home

[  138.102276] ==================================================================
[  138.104285] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154
[  138.106267] Write of size 8 at addr ffff0000c593c171 by task kunit_try_catch/139
[  138.108375] 
[  138.109373] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.111348] Hardware name: linux,dummy-virt (DT)
[  138.112569] Call trace:
[  138.113503]  dump_backtrace+0xf8/0x118
[  138.114882]  show_stack+0x18/0x24
[  138.116116]  __dump_stack+0x28/0x38
[  138.117557]  dump_stack_lvl+0x54/0x6c
[  138.119075]  print_address_description+0x7c/0x20c
[  138.120682]  print_report+0x50/0x68
[  138.121893]  kasan_report+0xac/0x100
[  138.123114]  kasan_check_range+0x260/0x2a0
[  138.124572]  memset+0x40/0x70
[  138.125913]  kmalloc_oob_memset_8+0xac/0x154
[  138.127321]  kunit_try_run_case+0x80/0x184
[  138.129162]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.130459]  kthread+0x16c/0x21c
[  138.131848]  ret_from_fork+0x10/0x20
[  138.133286] 
[  138.133906] Allocated by task 139:
[  138.134855]  kasan_set_track+0x4c/0x80
[  138.136112]  kasan_save_alloc_info+0x28/0x34
[  138.137498]  __kasan_kmalloc+0x88/0xa0
[  138.138761]  kmalloc_trace+0x54/0x68
[  138.140095]  kmalloc_oob_memset_8+0x48/0x154
[  138.141509]  kunit_try_run_case+0x80/0x184
[  138.142828]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.144288]  kthread+0x16c/0x21c
[  138.145582]  ret_from_fork+0x10/0x20
[  138.146691] 
[  138.147280] The buggy address belongs to the object at ffff0000c593c100
[  138.147280]  which belongs to the cache kmalloc-128 of size 128
[  138.150184] The buggy address is located 113 bytes inside of
[  138.150184]  128-byte region [ffff0000c593c100, ffff0000c593c180)
[  138.152823] 
[  138.153238] The buggy address belongs to the physical page:
[  138.154483] page:00000000f1dc7839 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593c
[  138.156410] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.158650] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.160544] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.162037] page dumped because: kasan: bad access detected
[  138.163173] 
[  138.164385] Memory state around the buggy address:
[  138.165532]  ffff0000c593c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  138.167198]  ffff0000c593c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.168903] >ffff0000c593c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  138.170463]                                                                 ^
[  138.172124]  ffff0000c593c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.173173]  ffff0000c593c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.174843] ==================================================================

test log snippet boot parser 86

Home

[  137.934069] ==================================================================
[  137.936174] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154
[  137.939009] Write of size 2 at addr ffff0000c5922e77 by task kunit_try_catch/137
[  137.941535] 
[  137.942173] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.944108] Hardware name: linux,dummy-virt (DT)
[  137.945166] Call trace:
[  137.946034]  dump_backtrace+0xf8/0x118
[  137.947414]  show_stack+0x18/0x24
[  137.948795]  __dump_stack+0x28/0x38
[  137.950116]  dump_stack_lvl+0x54/0x6c
[  137.951429]  print_address_description+0x7c/0x20c
[  137.952929]  print_report+0x50/0x68
[  137.954342]  kasan_report+0xac/0x100
[  137.955574]  kasan_check_range+0x260/0x2a0
[  137.956984]  memset+0x40/0x70
[  137.958099]  kmalloc_oob_memset_2+0xac/0x154
[  137.960070]  kunit_try_run_case+0x80/0x184
[  137.961446]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.962976]  kthread+0x16c/0x21c
[  137.964132]  ret_from_fork+0x10/0x20
[  137.965806] 
[  137.966724] Allocated by task 137:
[  137.967596]  kasan_set_track+0x4c/0x80
[  137.969121]  kasan_save_alloc_info+0x28/0x34
[  137.970395]  __kasan_kmalloc+0x88/0xa0
[  137.971875]  kmalloc_trace+0x54/0x68
[  137.973036]  kmalloc_oob_memset_2+0x48/0x154
[  137.974567]  kunit_try_run_case+0x80/0x184
[  137.975918]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.977609]  kthread+0x16c/0x21c
[  137.978873]  ret_from_fork+0x10/0x20
[  137.980287] 
[  137.980841] The buggy address belongs to the object at ffff0000c5922e00
[  137.980841]  which belongs to the cache kmalloc-128 of size 128
[  137.983061] The buggy address is located 119 bytes inside of
[  137.983061]  128-byte region [ffff0000c5922e00, ffff0000c5922e80)
[  137.985327] 
[  137.985928] The buggy address belongs to the physical page:
[  137.987573] page:00000000dad02aed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[  137.989812] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  137.991794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  137.994035] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.995490] page dumped because: kasan: bad access detected
[  137.996973] 
[  137.997515] Memory state around the buggy address:
[  137.998674]  ffff0000c5922d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  138.000265]  ffff0000c5922d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.002017] >ffff0000c5922e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  138.003535]                                                                 ^
[  138.004961]  ffff0000c5922e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.006533]  ffff0000c5922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.008929] ==================================================================

test log snippet boot parser 87

Home

[  135.787126] ==================================================================
[  135.789264] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264
[  135.791781] Write of size 1 at addr ffff0000c1ab1d73 by task kunit_try_catch/120
[  135.793529] 
[  135.794751] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[  135.797108] Hardware name: linux,dummy-virt (DT)
[  135.798637] Call trace:
[  135.799405]  dump_backtrace+0xf8/0x118
[  135.800982]  show_stack+0x18/0x24
[  135.802130]  __dump_stack+0x28/0x38
[  135.803370]  dump_stack_lvl+0x54/0x6c
[  135.804835]  print_address_description+0x7c/0x20c
[  135.806322]  print_report+0x50/0x68
[  135.807820]  kasan_report+0xac/0x100
[  135.809107]  __asan_store1+0x6c/0x70
[  135.810448]  kmalloc_oob_right+0x9c/0x264
[  135.811717]  kunit_try_run_case+0x80/0x184
[  135.812971]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  135.814510]  kthread+0x16c/0x21c
[  135.815706]  ret_from_fork+0x10/0x20
[  135.817074] 
[  135.817616] Allocated by task 120:
[  135.818756]  kasan_set_track+0x4c/0x80
[  135.820392]  kasan_save_alloc_info+0x28/0x34
[  135.821730]  __kasan_kmalloc+0x88/0xa0
[  135.822917]  kmalloc_trace+0x54/0x68
[  135.824818]  kmalloc_oob_right+0x48/0x264
[  135.825837]  kunit_try_run_case+0x80/0x184
[  135.827113]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  135.828677]  kthread+0x16c/0x21c
[  135.829903]  ret_from_fork+0x10/0x20
[  135.831129] 
[  135.831928] The buggy address belongs to the object at ffff0000c1ab1d00
[  135.831928]  which belongs to the cache kmalloc-128 of size 128
[  135.834141] The buggy address is located 115 bytes inside of
[  135.834141]  128-byte region [ffff0000c1ab1d00, ffff0000c1ab1d80)
[  135.836861] 
[  135.837633] The buggy address belongs to the physical page:
[  135.839279] page:00000000633e9dc2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab1
[  135.841827] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  135.844544] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  135.846280] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  135.847927] page dumped because: kasan: bad access detected
[  135.849450] 
[  135.850161] Memory state around the buggy address:
[  135.851790]  ffff0000c1ab1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  135.853582]  ffff0000c1ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  135.855190] >ffff0000c1ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  135.856781]                                                              ^
[  135.858847]  ffff0000c1ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  135.860419]  ffff0000c1ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  135.861328] ==================================================================

test log snippet boot parser 88

Home

[  135.865724] ==================================================================
[  135.867436] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264
[  135.870237] Write of size 1 at addr ffff0000c1ab1d78 by task kunit_try_catch/120
[  135.873467] 
[  135.874119] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  135.876003] Hardware name: linux,dummy-virt (DT)
[  135.877159] Call trace:
[  135.877946]  dump_backtrace+0xf8/0x118
[  135.879214]  show_stack+0x18/0x24
[  135.880506]  __dump_stack+0x28/0x38
[  135.881832]  dump_stack_lvl+0x54/0x6c
[  135.883170]  print_address_description+0x7c/0x20c
[  135.884773]  print_report+0x50/0x68
[  135.886030]  kasan_report+0xac/0x100
[  135.887281]  __asan_store1+0x6c/0x70
[  135.888734]  kmalloc_oob_right+0xe8/0x264
[  135.889973]  kunit_try_run_case+0x80/0x184
[  135.891203]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  135.892827]  kthread+0x16c/0x21c
[  135.894116]  ret_from_fork+0x10/0x20
[  135.895262] 
[  135.895991] Allocated by task 120:
[  135.897565]  kasan_set_track+0x4c/0x80
[  135.898783]  kasan_save_alloc_info+0x28/0x34
[  135.900225]  __kasan_kmalloc+0x88/0xa0
[  135.901599]  kmalloc_trace+0x54/0x68
[  135.902777]  kmalloc_oob_right+0x48/0x264
[  135.904340]  kunit_try_run_case+0x80/0x184
[  135.905798]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  135.907324]  kthread+0x16c/0x21c
[  135.908893]  ret_from_fork+0x10/0x20
[  135.910126] 
[  135.910742] The buggy address belongs to the object at ffff0000c1ab1d00
[  135.910742]  which belongs to the cache kmalloc-128 of size 128
[  135.912831] The buggy address is located 120 bytes inside of
[  135.912831]  128-byte region [ffff0000c1ab1d00, ffff0000c1ab1d80)
[  135.914982] 
[  135.915649] The buggy address belongs to the physical page:
[  135.916858] page:00000000633e9dc2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab1
[  135.919012] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  135.920690] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  135.922496] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  135.924085] page dumped because: kasan: bad access detected
[  135.925790] 
[  135.926418] Memory state around the buggy address:
[  135.927554]  ffff0000c1ab1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  135.929596]  ffff0000c1ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  135.931125] >ffff0000c1ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  135.932520]                                                                 ^
[  135.933980]  ffff0000c1ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  135.935335]  ffff0000c1ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  135.936838] ==================================================================

test log snippet boot parser 89

Home

[  135.941250] ==================================================================
[  135.942577] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264
[  135.944757] Read of size 1 at addr ffff0000c1ab1d80 by task kunit_try_catch/120
[  135.946585] 
[  135.947308] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  135.949909] Hardware name: linux,dummy-virt (DT)
[  135.950896] Call trace:
[  135.951707]  dump_backtrace+0xf8/0x118
[  135.953163]  show_stack+0x18/0x24
[  135.954429]  __dump_stack+0x28/0x38
[  135.955965]  dump_stack_lvl+0x54/0x6c
[  135.957628]  print_address_description+0x7c/0x20c
[  135.958972]  print_report+0x50/0x68
[  135.960216]  kasan_report+0xac/0x100
[  135.961543]  __asan_load1+0x6c/0x70
[  135.962740]  kmalloc_oob_right+0x134/0x264
[  135.963998]  kunit_try_run_case+0x80/0x184
[  135.965660]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  135.967220]  kthread+0x16c/0x21c
[  135.968563]  ret_from_fork+0x10/0x20
[  135.969781] 
[  135.970332] Allocated by task 120:
[  135.971265]  kasan_set_track+0x4c/0x80
[  135.972970]  kasan_save_alloc_info+0x28/0x34
[  135.974554]  __kasan_kmalloc+0x88/0xa0
[  135.975847]  kmalloc_trace+0x54/0x68
[  135.977282]  kmalloc_oob_right+0x48/0x264
[  135.978481]  kunit_try_run_case+0x80/0x184
[  135.979842]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  135.981278]  kthread+0x16c/0x21c
[  135.982469]  ret_from_fork+0x10/0x20
[  135.983673] 
[  135.984297] The buggy address belongs to the object at ffff0000c1ab1d00
[  135.984297]  which belongs to the cache kmalloc-128 of size 128
[  135.986703] The buggy address is located 0 bytes to the right of
[  135.986703]  128-byte region [ffff0000c1ab1d00, ffff0000c1ab1d80)
[  135.989033] 
[  135.989750] The buggy address belongs to the physical page:
[  135.990987] page:00000000633e9dc2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab1
[  135.992856] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  135.994644] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  135.996323] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  135.997960] page dumped because: kasan: bad access detected
[  135.999224] 
[  136.000029] Memory state around the buggy address:
[  136.001607]  ffff0000c1ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.003119]  ffff0000c1ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  136.005545] >ffff0000c1ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.006992]                    ^
[  136.008398]  ffff0000c1ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.010096]  ffff0000c1ab1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.011806] ==================================================================

test log snippet boot parser 90

Home

[  136.188543] ==================================================================
[  136.190567] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130
[  136.192738] Write of size 1 at addr ffff0000c598200a by task kunit_try_catch/123
[  136.194084] 
[  136.194740] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.197164] Hardware name: linux,dummy-virt (DT)
[  136.198396] Call trace:
[  136.199130]  dump_backtrace+0xf8/0x118
[  136.200556]  show_stack+0x18/0x24
[  136.201824]  __dump_stack+0x28/0x38
[  136.203013]  dump_stack_lvl+0x54/0x6c
[  136.204289]  print_address_description+0x7c/0x20c
[  136.205812]  print_report+0x50/0x68
[  136.206970]  kasan_report+0xac/0x100
[  136.208637]  __asan_store1+0x6c/0x70
[  136.209904]  kmalloc_pagealloc_oob_right+0x84/0x130
[  136.211254]  kunit_try_run_case+0x80/0x184
[  136.212586]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.214191]  kthread+0x16c/0x21c
[  136.215311]  ret_from_fork+0x10/0x20
[  136.216494] 
[  136.217034] The buggy address belongs to the physical page:
[  136.218782] page:00000000eff54a5d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105980
[  136.220737] head:00000000eff54a5d order:2 compound_mapcount:0 compound_pincount:0
[  136.222282] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  136.224340] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  136.226022] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  136.227595] page dumped because: kasan: bad access detected
[  136.228965] 
[  136.229529] Memory state around the buggy address:
[  136.230683]  ffff0000c5981f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.232517]  ffff0000c5981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.234052] >ffff0000c5982000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  136.235489]                       ^
[  136.237069]  ffff0000c5982080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  136.238451]  ffff0000c5982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  136.239949] ==================================================================

test log snippet boot parser 91

Home

[  138.760564] ==================================================================
[  138.762660] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc
[  138.764570] Read of size 1 at addr ffff0000c58f10c8 by task kunit_try_catch/149
[  138.766242] 
[  138.766835] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.768633] Hardware name: linux,dummy-virt (DT)
[  138.769164] Call trace:
[  138.770069]  dump_backtrace+0xf8/0x118
[  138.771244]  show_stack+0x18/0x24
[  138.772584]  __dump_stack+0x28/0x38
[  138.773824]  dump_stack_lvl+0x54/0x6c
[  138.775112]  print_address_description+0x7c/0x20c
[  138.776489]  print_report+0x50/0x68
[  138.777701]  kasan_report+0xac/0x100
[  138.778923]  __asan_load1+0x6c/0x70
[  138.780152]  kmem_cache_oob+0xb0/0x1cc
[  138.781740]  kunit_try_run_case+0x80/0x184
[  138.782995]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.784583]  kthread+0x16c/0x21c
[  138.785758]  ret_from_fork+0x10/0x20
[  138.786933] 
[  138.787587] Allocated by task 149:
[  138.788553]  kasan_set_track+0x4c/0x80
[  138.789972]  kasan_save_alloc_info+0x28/0x34
[  138.791264]  __kasan_slab_alloc+0x58/0x70
[  138.792677]  slab_post_alloc_hook+0x70/0x2f4
[  138.794060]  kmem_cache_alloc+0x168/0x260
[  138.795247]  kmem_cache_oob+0x94/0x1cc
[  138.796564]  kunit_try_run_case+0x80/0x184
[  138.797976]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.799648]  kthread+0x16c/0x21c
[  138.800942]  ret_from_fork+0x10/0x20
[  138.802155] 
[  138.802749] The buggy address belongs to the object at ffff0000c58f1000
[  138.802749]  which belongs to the cache test_cache of size 200
[  138.805300] The buggy address is located 0 bytes to the right of
[  138.805300]  200-byte region [ffff0000c58f1000, ffff0000c58f10c8)
[  138.807315] 
[  138.807946] The buggy address belongs to the physical page:
[  138.809581] page:00000000747157cd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f1
[  138.812091] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.813826] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1a92480
[  138.815503] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  138.816906] page dumped because: kasan: bad access detected
[  138.818274] 
[  138.818896] Memory state around the buggy address:
[  138.820058]  ffff0000c58f0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  138.821696]  ffff0000c58f1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  138.823272] >ffff0000c58f1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  138.824780]                                               ^
[  138.826498]  ffff0000c58f1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.828492]  ffff0000c58f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.829916] ==================================================================

test log snippet boot parser 92

Home

[  136.766074] ==================================================================
[  136.767449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[  136.769451] Write of size 1 at addr ffff0000c582dcd0 by task kunit_try_catch/130
[  136.771572] 
[  136.772476] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.774266] Hardware name: linux,dummy-virt (DT)
[  136.775487] Call trace:
[  136.776530]  dump_backtrace+0xf8/0x118
[  136.777814]  show_stack+0x18/0x24
[  136.778986]  __dump_stack+0x28/0x38
[  136.780424]  dump_stack_lvl+0x54/0x6c
[  136.781720]  print_address_description+0x7c/0x20c
[  136.783059]  print_report+0x50/0x68
[  136.784195]  kasan_report+0xac/0x100
[  136.785474]  __asan_store1+0x6c/0x70
[  136.786828]  krealloc_less_oob_helper+0x158/0x4b8
[  136.788193]  krealloc_less_oob+0x18/0x24
[  136.789488]  kunit_try_run_case+0x80/0x184
[  136.790695]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.792489]  kthread+0x16c/0x21c
[  136.793603]  ret_from_fork+0x10/0x20
[  136.794792] 
[  136.795403] Allocated by task 130:
[  136.796679]  kasan_set_track+0x4c/0x80
[  136.797978]  kasan_save_alloc_info+0x28/0x34
[  136.799215]  __kasan_krealloc+0xcc/0xf8
[  136.800534]  krealloc+0x150/0x270
[  136.801756]  krealloc_less_oob_helper+0x9c/0x4b8
[  136.803079]  krealloc_less_oob+0x18/0x24
[  136.804294]  kunit_try_run_case+0x80/0x184
[  136.806490]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.808111]  kthread+0x16c/0x21c
[  136.809351]  ret_from_fork+0x10/0x20
[  136.810493] 
[  136.811050] The buggy address belongs to the object at ffff0000c582dc00
[  136.811050]  which belongs to the cache kmalloc-256 of size 256
[  136.813261] The buggy address is located 208 bytes inside of
[  136.813261]  256-byte region [ffff0000c582dc00, ffff0000c582dd00)
[  136.816053] 
[  136.816651] The buggy address belongs to the physical page:
[  136.817744] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  136.819707] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  136.821271] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.823332] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  136.825432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.826940] page dumped because: kasan: bad access detected
[  136.828170] 
[  136.828785] Memory state around the buggy address:
[  136.830095]  ffff0000c582db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.832076]  ffff0000c582dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.833519] >ffff0000c582dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  136.834913]                                                  ^
[  136.836665]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.838244]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.839718] ==================================================================

test log snippet boot parser 93

Home

[  137.418293] ==================================================================
[  137.420030] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[  137.422343] Write of size 1 at addr ffff0000c5a220eb by task kunit_try_catch/132
[  137.424539] 
[  137.425175] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.427234] Hardware name: linux,dummy-virt (DT)
[  137.428372] Call trace:
[  137.429636]  dump_backtrace+0xf8/0x118
[  137.430861]  show_stack+0x18/0x24
[  137.432043]  __dump_stack+0x28/0x38
[  137.433345]  dump_stack_lvl+0x54/0x6c
[  137.434706]  print_address_description+0x7c/0x20c
[  137.436400]  print_report+0x50/0x68
[  137.437715]  kasan_report+0xac/0x100
[  137.439009]  __asan_store1+0x6c/0x70
[  137.440349]  krealloc_less_oob_helper+0x260/0x4b8
[  137.442086]  krealloc_pagealloc_less_oob+0x18/0x24
[  137.443393]  kunit_try_run_case+0x80/0x184
[  137.445145]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.446657]  kthread+0x16c/0x21c
[  137.448152]  ret_from_fork+0x10/0x20
[  137.449278] 
[  137.450549] The buggy address belongs to the physical page:
[  137.452168] page:000000008b52e324 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[  137.454141] head:000000008b52e324 order:2 compound_mapcount:0 compound_pincount:0
[  137.456034] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.457866] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.459724] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.461239] page dumped because: kasan: bad access detected
[  137.462818] 
[  137.463406] Memory state around the buggy address:
[  137.465458]  ffff0000c5a21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.466906]  ffff0000c5a22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.468661] >ffff0000c5a22080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  137.470108]                                                           ^
[  137.471546]  ffff0000c5a22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.473100]  ffff0000c5a22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.474876] ==================================================================

test log snippet boot parser 94

Home

[  136.686902] ==================================================================
[  136.689300] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[  136.691615] Write of size 1 at addr ffff0000c582dcc9 by task kunit_try_catch/130
[  136.693216] 
[  136.694082] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.696189] Hardware name: linux,dummy-virt (DT)
[  136.697346] Call trace:
[  136.698154]  dump_backtrace+0xf8/0x118
[  136.699377]  show_stack+0x18/0x24
[  136.700860]  __dump_stack+0x28/0x38
[  136.702041]  dump_stack_lvl+0x54/0x6c
[  136.703334]  print_address_description+0x7c/0x20c
[  136.704810]  print_report+0x50/0x68
[  136.706062]  kasan_report+0xac/0x100
[  136.707244]  __asan_store1+0x6c/0x70
[  136.708896]  krealloc_less_oob_helper+0x104/0x4b8
[  136.710238]  krealloc_less_oob+0x18/0x24
[  136.711543]  kunit_try_run_case+0x80/0x184
[  136.713135]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.714668]  kthread+0x16c/0x21c
[  136.715882]  ret_from_fork+0x10/0x20
[  136.717276] 
[  136.717905] Allocated by task 130:
[  136.718877]  kasan_set_track+0x4c/0x80
[  136.720173]  kasan_save_alloc_info+0x28/0x34
[  136.721600]  __kasan_krealloc+0xcc/0xf8
[  136.722814]  krealloc+0x150/0x270
[  136.724095]  krealloc_less_oob_helper+0x9c/0x4b8
[  136.725752]  krealloc_less_oob+0x18/0x24
[  136.727009]  kunit_try_run_case+0x80/0x184
[  136.728402]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.729739]  kthread+0x16c/0x21c
[  136.730954]  ret_from_fork+0x10/0x20
[  136.732195] 
[  136.733347] The buggy address belongs to the object at ffff0000c582dc00
[  136.733347]  which belongs to the cache kmalloc-256 of size 256
[  136.735565] The buggy address is located 201 bytes inside of
[  136.735565]  256-byte region [ffff0000c582dc00, ffff0000c582dd00)
[  136.738265] 
[  136.738893] The buggy address belongs to the physical page:
[  136.740400] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  136.742107] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  136.743528] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.745434] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  136.747200] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.748725] page dumped because: kasan: bad access detected
[  136.750499] 
[  136.751023] Memory state around the buggy address:
[  136.752139]  ffff0000c582db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.753774]  ffff0000c582dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.755341] >ffff0000c582dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  136.756840]                                               ^
[  136.758177]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.760266]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.761723] ==================================================================

test log snippet boot parser 95

Home

[  137.195010] ==================================================================
[  137.196936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[  137.199016] Write of size 1 at addr ffff0000c5a220c9 by task kunit_try_catch/132
[  137.201324] 
[  137.201967] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.203803] Hardware name: linux,dummy-virt (DT)
[  137.205181] Call trace:
[  137.205935]  dump_backtrace+0xf8/0x118
[  137.207200]  show_stack+0x18/0x24
[  137.208445]  __dump_stack+0x28/0x38
[  137.209625]  dump_stack_lvl+0x54/0x6c
[  137.210957]  print_address_description+0x7c/0x20c
[  137.212639]  print_report+0x50/0x68
[  137.213822]  kasan_report+0xac/0x100
[  137.215016]  __asan_store1+0x6c/0x70
[  137.216728]  krealloc_less_oob_helper+0x104/0x4b8
[  137.217926]  krealloc_pagealloc_less_oob+0x18/0x24
[  137.219292]  kunit_try_run_case+0x80/0x184
[  137.220547]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.222224]  kthread+0x16c/0x21c
[  137.223369]  ret_from_fork+0x10/0x20
[  137.224577] 
[  137.225631] The buggy address belongs to the physical page:
[  137.226699] page:000000008b52e324 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[  137.228611] head:000000008b52e324 order:2 compound_mapcount:0 compound_pincount:0
[  137.230157] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.232000] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.233641] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.235149] page dumped because: kasan: bad access detected
[  137.236581] 
[  137.237074] Memory state around the buggy address:
[  137.238372]  ffff0000c5a21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.239924]  ffff0000c5a22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.241503] >ffff0000c5a22080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  137.242961]                                               ^
[  137.244259]  ffff0000c5a22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.245701]  ffff0000c5a22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.247201] ==================================================================

test log snippet boot parser 96

Home

[  136.843530] ==================================================================
[  136.845104] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[  136.847598] Write of size 1 at addr ffff0000c582dcda by task kunit_try_catch/130
[  136.849589] 
[  136.850231] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.852555] Hardware name: linux,dummy-virt (DT)
[  136.853647] Call trace:
[  136.854425]  dump_backtrace+0xf8/0x118
[  136.855641]  show_stack+0x18/0x24
[  136.856850]  __dump_stack+0x28/0x38
[  136.858108]  dump_stack_lvl+0x54/0x6c
[  136.859373]  print_address_description+0x7c/0x20c
[  136.860778]  print_report+0x50/0x68
[  136.861968]  kasan_report+0xac/0x100
[  136.863214]  __asan_store1+0x6c/0x70
[  136.864384]  krealloc_less_oob_helper+0x1c4/0x4b8
[  136.865649]  krealloc_less_oob+0x18/0x24
[  136.866936]  kunit_try_run_case+0x80/0x184
[  136.868474]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.870009]  kthread+0x16c/0x21c
[  136.871175]  ret_from_fork+0x10/0x20
[  136.872627] 
[  136.873184] Allocated by task 130:
[  136.874150]  kasan_set_track+0x4c/0x80
[  136.875344]  kasan_save_alloc_info+0x28/0x34
[  136.876891]  __kasan_krealloc+0xcc/0xf8
[  136.878146]  krealloc+0x150/0x270
[  136.879299]  krealloc_less_oob_helper+0x9c/0x4b8
[  136.880727]  krealloc_less_oob+0x18/0x24
[  136.881955]  kunit_try_run_case+0x80/0x184
[  136.883167]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.884690]  kthread+0x16c/0x21c
[  136.885840]  ret_from_fork+0x10/0x20
[  136.887091] 
[  136.887767] The buggy address belongs to the object at ffff0000c582dc00
[  136.887767]  which belongs to the cache kmalloc-256 of size 256
[  136.890116] The buggy address is located 218 bytes inside of
[  136.890116]  256-byte region [ffff0000c582dc00, ffff0000c582dd00)
[  136.892229] 
[  136.892801] The buggy address belongs to the physical page:
[  136.894317] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  136.896513] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  136.898069] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.900182] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  136.901822] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.903272] page dumped because: kasan: bad access detected
[  136.904538] 
[  136.905445] Memory state around the buggy address:
[  136.906570]  ffff0000c582db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.908137]  ffff0000c582dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.909525] >ffff0000c582dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  136.911016]                                                     ^
[  136.912661]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.914123]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.915929] ==================================================================

test log snippet boot parser 97

Home

[  137.305972] ==================================================================
[  137.307274] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[  137.309935] Write of size 1 at addr ffff0000c5a220da by task kunit_try_catch/132
[  137.311564] 
[  137.312135] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.313977] Hardware name: linux,dummy-virt (DT)
[  137.315168] Call trace:
[  137.316522]  dump_backtrace+0xf8/0x118
[  137.317925]  show_stack+0x18/0x24
[  137.319087]  __dump_stack+0x28/0x38
[  137.320516]  dump_stack_lvl+0x54/0x6c
[  137.321772]  print_address_description+0x7c/0x20c
[  137.323168]  print_report+0x50/0x68
[  137.324392]  kasan_report+0xac/0x100
[  137.325600]  __asan_store1+0x6c/0x70
[  137.326945]  krealloc_less_oob_helper+0x1c4/0x4b8
[  137.328343]  krealloc_pagealloc_less_oob+0x18/0x24
[  137.330113]  kunit_try_run_case+0x80/0x184
[  137.331385]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.333060]  kthread+0x16c/0x21c
[  137.334470]  ret_from_fork+0x10/0x20
[  137.335642] 
[  137.336266] The buggy address belongs to the physical page:
[  137.337791] page:000000008b52e324 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[  137.339900] head:000000008b52e324 order:2 compound_mapcount:0 compound_pincount:0
[  137.341599] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.343413] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.345529] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.347288] page dumped because: kasan: bad access detected
[  137.348656] 
[  137.349541] Memory state around the buggy address:
[  137.350973]  ffff0000c5a21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.352532]  ffff0000c5a22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.354095] >ffff0000c5a22080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  137.355848]                                                     ^
[  137.357400]  ffff0000c5a22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.358941]  ffff0000c5a22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.360654] ==================================================================

test log snippet boot parser 98

Home

[  137.250239] ==================================================================
[  137.251607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[  137.254624] Write of size 1 at addr ffff0000c5a220d0 by task kunit_try_catch/132
[  137.256316] 
[  137.256930] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.258747] Hardware name: linux,dummy-virt (DT)
[  137.259934] Call trace:
[  137.260605]  dump_backtrace+0xf8/0x118
[  137.262140]  show_stack+0x18/0x24
[  137.263377]  __dump_stack+0x28/0x38
[  137.264580]  dump_stack_lvl+0x54/0x6c
[  137.265964]  print_address_description+0x7c/0x20c
[  137.267380]  print_report+0x50/0x68
[  137.268604]  kasan_report+0xac/0x100
[  137.270011]  __asan_store1+0x6c/0x70
[  137.271575]  krealloc_less_oob_helper+0x158/0x4b8
[  137.273074]  krealloc_pagealloc_less_oob+0x18/0x24
[  137.274661]  kunit_try_run_case+0x80/0x184
[  137.275891]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.278006]  kthread+0x16c/0x21c
[  137.279283]  ret_from_fork+0x10/0x20
[  137.280521] 
[  137.281102] The buggy address belongs to the physical page:
[  137.282288] page:000000008b52e324 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[  137.284780] head:000000008b52e324 order:2 compound_mapcount:0 compound_pincount:0
[  137.285704] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.287107] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.289062] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.290680] page dumped because: kasan: bad access detected
[  137.291977] 
[  137.292497] Memory state around the buggy address:
[  137.294044]  ffff0000c5a21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.295806]  ffff0000c5a22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.297635] >ffff0000c5a22080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  137.299038]                                                  ^
[  137.300866]  ffff0000c5a22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.302349]  ffff0000c5a22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.304180] ==================================================================

test log snippet boot parser 99

Home

[  136.993203] ==================================================================
[  136.994636] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[  136.996487] Write of size 1 at addr ffff0000c582dceb by task kunit_try_catch/130
[  136.998560] 
[  136.999204] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.001515] Hardware name: linux,dummy-virt (DT)
[  137.002663] Call trace:
[  137.003392]  dump_backtrace+0xf8/0x118
[  137.004790]  show_stack+0x18/0x24
[  137.005974]  __dump_stack+0x28/0x38
[  137.007151]  dump_stack_lvl+0x54/0x6c
[  137.008534]  print_address_description+0x7c/0x20c
[  137.009913]  print_report+0x50/0x68
[  137.011058]  kasan_report+0xac/0x100
[  137.012305]  __asan_store1+0x6c/0x70
[  137.013470]  krealloc_less_oob_helper+0x260/0x4b8
[  137.014884]  krealloc_less_oob+0x18/0x24
[  137.016329]  kunit_try_run_case+0x80/0x184
[  137.017719]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.019326]  kthread+0x16c/0x21c
[  137.020548]  ret_from_fork+0x10/0x20
[  137.021738] 
[  137.022344] Allocated by task 130:
[  137.023295]  kasan_set_track+0x4c/0x80
[  137.024729]  kasan_save_alloc_info+0x28/0x34
[  137.025888]  __kasan_krealloc+0xcc/0xf8
[  137.027165]  krealloc+0x150/0x270
[  137.028531]  krealloc_less_oob_helper+0x9c/0x4b8
[  137.029918]  krealloc_less_oob+0x18/0x24
[  137.031074]  kunit_try_run_case+0x80/0x184
[  137.032694]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.034155]  kthread+0x16c/0x21c
[  137.035293]  ret_from_fork+0x10/0x20
[  137.036776] 
[  137.037429] The buggy address belongs to the object at ffff0000c582dc00
[  137.037429]  which belongs to the cache kmalloc-256 of size 256
[  137.039971] The buggy address is located 235 bytes inside of
[  137.039971]  256-byte region [ffff0000c582dc00, ffff0000c582dd00)
[  137.042264] 
[  137.043081] The buggy address belongs to the physical page:
[  137.044662] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  137.046500] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  137.048207] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  137.050120] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  137.051768] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.053266] page dumped because: kasan: bad access detected
[  137.054508] 
[  137.055116] Memory state around the buggy address:
[  137.056924]  ffff0000c582db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.058316]  ffff0000c582dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.060183] >ffff0000c582dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  137.061702]                                                           ^
[  137.063159]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.064833]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.066184] ==================================================================

test log snippet boot parser 100

Home

[  137.361814] ==================================================================
[  137.362988] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[  137.365703] Write of size 1 at addr ffff0000c5a220ea by task kunit_try_catch/132
[  137.367399] 
[  137.368110] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.369903] Hardware name: linux,dummy-virt (DT)
[  137.371270] Call trace:
[  137.372039]  dump_backtrace+0xf8/0x118
[  137.373883]  show_stack+0x18/0x24
[  137.375044]  __dump_stack+0x28/0x38
[  137.376308]  dump_stack_lvl+0x54/0x6c
[  137.377767]  print_address_description+0x7c/0x20c
[  137.379154]  print_report+0x50/0x68
[  137.380799]  kasan_report+0xac/0x100
[  137.382039]  __asan_store1+0x6c/0x70
[  137.383262]  krealloc_less_oob_helper+0x214/0x4b8
[  137.384538]  krealloc_pagealloc_less_oob+0x18/0x24
[  137.385836]  kunit_try_run_case+0x80/0x184
[  137.387323]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.388764]  kthread+0x16c/0x21c
[  137.390093]  ret_from_fork+0x10/0x20
[  137.391223] 
[  137.391896] The buggy address belongs to the physical page:
[  137.393205] page:000000008b52e324 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[  137.395239] head:000000008b52e324 order:2 compound_mapcount:0 compound_pincount:0
[  137.397268] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.399077] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.400968] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.402529] page dumped because: kasan: bad access detected
[  137.404229] 
[  137.404959] Memory state around the buggy address:
[  137.406045]  ffff0000c5a21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.408098]  ffff0000c5a22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.409653] >ffff0000c5a22080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  137.410982]                                                           ^
[  137.412739]  ffff0000c5a22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.414550]  ffff0000c5a22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.415831] ==================================================================

test log snippet boot parser 101

Home

[  136.918181] ==================================================================
[  136.919438] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[  136.921536] Write of size 1 at addr ffff0000c582dcea by task kunit_try_catch/130
[  136.923214] 
[  136.924244] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.926004] Hardware name: linux,dummy-virt (DT)
[  136.927107] Call trace:
[  136.928176]  dump_backtrace+0xf8/0x118
[  136.929471]  show_stack+0x18/0x24
[  136.930667]  __dump_stack+0x28/0x38
[  136.931979]  dump_stack_lvl+0x54/0x6c
[  136.933255]  print_address_description+0x7c/0x20c
[  136.934670]  print_report+0x50/0x68
[  136.936074]  kasan_report+0xac/0x100
[  136.937409]  __asan_store1+0x6c/0x70
[  136.938482]  krealloc_less_oob_helper+0x214/0x4b8
[  136.939890]  krealloc_less_oob+0x18/0x24
[  136.941581]  kunit_try_run_case+0x80/0x184
[  136.942828]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.944529]  kthread+0x16c/0x21c
[  136.945703]  ret_from_fork+0x10/0x20
[  136.946816] 
[  136.947435] Allocated by task 130:
[  136.948332]  kasan_set_track+0x4c/0x80
[  136.949826]  kasan_save_alloc_info+0x28/0x34
[  136.951063]  __kasan_krealloc+0xcc/0xf8
[  136.952618]  krealloc+0x150/0x270
[  136.953721]  krealloc_less_oob_helper+0x9c/0x4b8
[  136.955049]  krealloc_less_oob+0x18/0x24
[  136.956180]  kunit_try_run_case+0x80/0x184
[  136.957559]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.959028]  kthread+0x16c/0x21c
[  136.960155]  ret_from_fork+0x10/0x20
[  136.961482] 
[  136.962005] The buggy address belongs to the object at ffff0000c582dc00
[  136.962005]  which belongs to the cache kmalloc-256 of size 256
[  136.964669] The buggy address is located 234 bytes inside of
[  136.964669]  256-byte region [ffff0000c582dc00, ffff0000c582dd00)
[  136.966834] 
[  136.967887] The buggy address belongs to the physical page:
[  136.969041] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  136.970852] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  136.972457] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.974700] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  136.976594] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.978110] page dumped because: kasan: bad access detected
[  136.979337] 
[  136.979934] Memory state around the buggy address:
[  136.981159]  ffff0000c582db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.983179]  ffff0000c582dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.984950] >ffff0000c582dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  136.986330]                                                           ^
[  136.987897]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.989258]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.990742] ==================================================================

test log snippet boot parser 102

Home

[  136.521808] ==================================================================
[  136.524431] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[  136.525729] Write of size 1 at addr ffff0000c42af4eb by task kunit_try_catch/129
[  136.526598] 
[  136.527212] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.529908] Hardware name: linux,dummy-virt (DT)
[  136.531032] Call trace:
[  136.532004]  dump_backtrace+0xf8/0x118
[  136.533404]  show_stack+0x18/0x24
[  136.534606]  __dump_stack+0x28/0x38
[  136.535824]  dump_stack_lvl+0x54/0x6c
[  136.537268]  print_address_description+0x7c/0x20c
[  136.538818]  print_report+0x50/0x68
[  136.539969]  kasan_report+0xac/0x100
[  136.541257]  __asan_store1+0x6c/0x70
[  136.542482]  krealloc_more_oob_helper+0x12c/0x2a4
[  136.543853]  krealloc_more_oob+0x18/0x24
[  136.545695]  kunit_try_run_case+0x80/0x184
[  136.546874]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.548830]  kthread+0x16c/0x21c
[  136.549995]  ret_from_fork+0x10/0x20
[  136.551140] 
[  136.551780] Allocated by task 129:
[  136.552733]  kasan_set_track+0x4c/0x80
[  136.554135]  kasan_save_alloc_info+0x28/0x34
[  136.555554]  __kasan_krealloc+0xcc/0xf8
[  136.556925]  krealloc+0x150/0x270
[  136.558182]  krealloc_more_oob_helper+0x9c/0x2a4
[  136.559556]  krealloc_more_oob+0x18/0x24
[  136.560879]  kunit_try_run_case+0x80/0x184
[  136.562187]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.564309]  kthread+0x16c/0x21c
[  136.565606]  ret_from_fork+0x10/0x20
[  136.566811] 
[  136.567854] The buggy address belongs to the object at ffff0000c42af400
[  136.567854]  which belongs to the cache kmalloc-256 of size 256
[  136.570184] The buggy address is located 235 bytes inside of
[  136.570184]  256-byte region [ffff0000c42af400, ffff0000c42af500)
[  136.572559] 
[  136.573079] The buggy address belongs to the physical page:
[  136.574305] page:00000000065e2273 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[  136.576386] head:00000000065e2273 order:1 compound_mapcount:0 compound_pincount:0
[  136.578050] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.579997] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  136.581846] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.583516] page dumped because: kasan: bad access detected
[  136.585105] 
[  136.585587] Memory state around the buggy address:
[  136.586864]  ffff0000c42af380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.589414]  ffff0000c42af400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.590848] >ffff0000c42af480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  136.592425]                                                           ^
[  136.594087]  ffff0000c42af500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.595621]  ffff0000c42af580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.597786] ==================================================================

test log snippet boot parser 103

Home

[  136.600457] ==================================================================
[  136.602096] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[  136.604636] Write of size 1 at addr ffff0000c42af4f0 by task kunit_try_catch/129
[  136.606119] 
[  136.607139] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.609172] Hardware name: linux,dummy-virt (DT)
[  136.610324] Call trace:
[  136.611003]  dump_backtrace+0xf8/0x118
[  136.612894]  show_stack+0x18/0x24
[  136.614138]  __dump_stack+0x28/0x38
[  136.615378]  dump_stack_lvl+0x54/0x6c
[  136.617011]  print_address_description+0x7c/0x20c
[  136.618457]  print_report+0x50/0x68
[  136.619795]  kasan_report+0xac/0x100
[  136.621222]  __asan_store1+0x6c/0x70
[  136.622730]  krealloc_more_oob_helper+0x17c/0x2a4
[  136.624166]  krealloc_more_oob+0x18/0x24
[  136.625343]  kunit_try_run_case+0x80/0x184
[  136.626620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.628320]  kthread+0x16c/0x21c
[  136.629594]  ret_from_fork+0x10/0x20
[  136.630750] 
[  136.631325] Allocated by task 129:
[  136.632306]  kasan_set_track+0x4c/0x80
[  136.633824]  kasan_save_alloc_info+0x28/0x34
[  136.635095]  __kasan_krealloc+0xcc/0xf8
[  136.636569]  krealloc+0x150/0x270
[  136.637714]  krealloc_more_oob_helper+0x9c/0x2a4
[  136.639171]  krealloc_more_oob+0x18/0x24
[  136.640489]  kunit_try_run_case+0x80/0x184
[  136.642066]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.643561]  kthread+0x16c/0x21c
[  136.644688]  ret_from_fork+0x10/0x20
[  136.645775] 
[  136.646440] The buggy address belongs to the object at ffff0000c42af400
[  136.646440]  which belongs to the cache kmalloc-256 of size 256
[  136.649479] The buggy address is located 240 bytes inside of
[  136.649479]  256-byte region [ffff0000c42af400, ffff0000c42af500)
[  136.651793] 
[  136.652344] The buggy address belongs to the physical page:
[  136.654265] page:00000000065e2273 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[  136.656424] head:00000000065e2273 order:1 compound_mapcount:0 compound_pincount:0
[  136.658041] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  136.660201] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  136.661331] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  136.662067] page dumped because: kasan: bad access detected
[  136.662873] 
[  136.663480] Memory state around the buggy address:
[  136.665390]  ffff0000c42af380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.667000]  ffff0000c42af400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  136.668973] >ffff0000c42af480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  136.670495]                                                              ^
[  136.672560]  ffff0000c42af500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.674240]  ffff0000c42af580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.675709] ==================================================================

test log snippet boot parser 104

Home

[  137.074771] ==================================================================
[  137.077241] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[  137.079199] Write of size 1 at addr ffff0000c59f60eb by task kunit_try_catch/131
[  137.081433] 
[  137.082096] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.084020] Hardware name: linux,dummy-virt (DT)
[  137.085255] Call trace:
[  137.086137]  dump_backtrace+0xf8/0x118
[  137.087430]  show_stack+0x18/0x24
[  137.088827]  __dump_stack+0x28/0x38
[  137.090041]  dump_stack_lvl+0x54/0x6c
[  137.091379]  print_address_description+0x7c/0x20c
[  137.092930]  print_report+0x50/0x68
[  137.094133]  kasan_report+0xac/0x100
[  137.095303]  __asan_store1+0x6c/0x70
[  137.096654]  krealloc_more_oob_helper+0x12c/0x2a4
[  137.098278]  krealloc_pagealloc_more_oob+0x18/0x24
[  137.099535]  kunit_try_run_case+0x80/0x184
[  137.100976]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.102549]  kthread+0x16c/0x21c
[  137.104005]  ret_from_fork+0x10/0x20
[  137.105219] 
[  137.105820] The buggy address belongs to the physical page:
[  137.107057] page:00000000d7fc3077 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f4
[  137.108957] head:00000000d7fc3077 order:2 compound_mapcount:0 compound_pincount:0
[  137.110509] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.112413] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.114091] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.116751] page dumped because: kasan: bad access detected
[  137.117849] 
[  137.118392] Memory state around the buggy address:
[  137.119991]  ffff0000c59f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.121382]  ffff0000c59f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.122902] >ffff0000c59f6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  137.124380]                                                           ^
[  137.126184]  ffff0000c59f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.127792]  ffff0000c59f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.129059] ==================================================================

test log snippet boot parser 105

Home

[  137.133757] ==================================================================
[  137.135047] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[  137.137108] Write of size 1 at addr ffff0000c59f60f0 by task kunit_try_catch/131
[  137.138769] 
[  137.139394] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.141411] Hardware name: linux,dummy-virt (DT)
[  137.142686] Call trace:
[  137.143444]  dump_backtrace+0xf8/0x118
[  137.144653]  show_stack+0x18/0x24
[  137.145826]  __dump_stack+0x28/0x38
[  137.147024]  dump_stack_lvl+0x54/0x6c
[  137.149159]  print_address_description+0x7c/0x20c
[  137.150602]  print_report+0x50/0x68
[  137.151749]  kasan_report+0xac/0x100
[  137.153048]  __asan_store1+0x6c/0x70
[  137.154266]  krealloc_more_oob_helper+0x17c/0x2a4
[  137.155904]  krealloc_pagealloc_more_oob+0x18/0x24
[  137.158003]  kunit_try_run_case+0x80/0x184
[  137.159263]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.160737]  kthread+0x16c/0x21c
[  137.161899]  ret_from_fork+0x10/0x20
[  137.163048] 
[  137.163628] The buggy address belongs to the physical page:
[  137.164971] page:00000000d7fc3077 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f4
[  137.167068] head:00000000d7fc3077 order:2 compound_mapcount:0 compound_pincount:0
[  137.168661] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  137.170445] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  137.172389] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  137.174298] page dumped because: kasan: bad access detected
[  137.175507] 
[  137.175999] Memory state around the buggy address:
[  137.177226]  ffff0000c59f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.178805]  ffff0000c59f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  137.180310] >ffff0000c59f6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  137.181792]                                                              ^
[  137.183172]  ffff0000c59f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.184748]  ffff0000c59f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  137.185972] ==================================================================

test log snippet boot parser 106

Home

[  139.606876] ==================================================================
[  139.609305] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164
[  139.611017] Read of size 1 at addr ffff0000c594a780 by task kunit_try_catch/157
[  139.612647] 
[  139.613292] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.615959] Hardware name: linux,dummy-virt (DT)
[  139.616932] Call trace:
[  139.618076]  dump_backtrace+0xf8/0x118
[  139.619335]  show_stack+0x18/0x24
[  139.620986]  __dump_stack+0x28/0x38
[  139.622198]  dump_stack_lvl+0x54/0x6c
[  139.623698]  print_address_description+0x7c/0x20c
[  139.625072]  print_report+0x50/0x68
[  139.626525]  kasan_report+0xac/0x100
[  139.628089]  __asan_load1+0x6c/0x70
[  139.629410]  ksize_unpoisons_memory+0xb8/0x164
[  139.630702]  kunit_try_run_case+0x80/0x184
[  139.632233]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.634018]  kthread+0x16c/0x21c
[  139.635202]  ret_from_fork+0x10/0x20
[  139.636384] 
[  139.636958] Allocated by task 157:
[  139.637855]  kasan_set_track+0x4c/0x80
[  139.639090]  kasan_save_alloc_info+0x28/0x34
[  139.640434]  __kasan_kmalloc+0x88/0xa0
[  139.641616]  kmalloc_trace+0x54/0x68
[  139.642894]  ksize_unpoisons_memory+0x48/0x164
[  139.644299]  kunit_try_run_case+0x80/0x184
[  139.645711]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.647213]  kthread+0x16c/0x21c
[  139.648462]  ret_from_fork+0x10/0x20
[  139.649560] 
[  139.650110] The buggy address belongs to the object at ffff0000c594a700
[  139.650110]  which belongs to the cache kmalloc-128 of size 128
[  139.653093] The buggy address is located 0 bytes to the right of
[  139.653093]  128-byte region [ffff0000c594a700, ffff0000c594a780)
[  139.655375] 
[  139.655950] The buggy address belongs to the physical page:
[  139.657071] page:0000000024c8fde4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594a
[  139.658968] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  139.660940] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  139.663279] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  139.664809] page dumped because: kasan: bad access detected
[  139.666036] 
[  139.666660] Memory state around the buggy address:
[  139.668026]  ffff0000c594a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.670037]  ffff0000c594a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.671776] >ffff0000c594a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.673723]                    ^
[  139.674712]  ffff0000c594a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.676440]  ffff0000c594a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.677929] ==================================================================

test log snippet boot parser 107

Home

[  140.274660] ==================================================================
[  140.277073] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64
[  140.278794] Read of size 1 at addr ffff0000c59cae18 by task kunit_try_catch/162
[  140.281334] 
[  140.282077] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.283914] Hardware name: linux,dummy-virt (DT)
[  140.285282] Call trace:
[  140.286226]  dump_backtrace+0xf8/0x118
[  140.287921]  show_stack+0x18/0x24
[  140.288985]  __dump_stack+0x28/0x38
[  140.290280]  dump_stack_lvl+0x54/0x6c
[  140.291573]  print_address_description+0x7c/0x20c
[  140.293321]  print_report+0x50/0x68
[  140.294572]  kasan_report+0xac/0x100
[  140.295942]  __asan_load1+0x6c/0x70
[  140.296853]  memchr+0x34/0x64
[  140.297588]  kasan_memchr+0xa8/0x158
[  140.299086]  kunit_try_run_case+0x80/0x184
[  140.300747]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.302203]  kthread+0x16c/0x21c
[  140.303419]  ret_from_fork+0x10/0x20
[  140.304865] 
[  140.305566] Allocated by task 162:
[  140.306515]  kasan_set_track+0x4c/0x80
[  140.307803]  kasan_save_alloc_info+0x28/0x34
[  140.308996]  __kasan_kmalloc+0x88/0xa0
[  140.310314]  kmalloc_trace+0x54/0x68
[  140.312095]  kasan_memchr+0x48/0x158
[  140.313062]  kunit_try_run_case+0x80/0x184
[  140.314336]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.316192]  kthread+0x16c/0x21c
[  140.317389]  ret_from_fork+0x10/0x20
[  140.318492] 
[  140.319037] The buggy address belongs to the object at ffff0000c59cae00
[  140.319037]  which belongs to the cache kmalloc-128 of size 128
[  140.321487] The buggy address is located 24 bytes inside of
[  140.321487]  128-byte region [ffff0000c59cae00, ffff0000c59cae80)
[  140.323617] 
[  140.324228] The buggy address belongs to the physical page:
[  140.325555] page:00000000464d9d31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[  140.327682] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.329691] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.331380] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.332889] page dumped because: kasan: bad access detected
[  140.334622] 
[  140.335243] Memory state around the buggy address:
[  140.337188]  ffff0000c59cad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.338622]  ffff0000c59cad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.340507] >ffff0000c59cae00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.341864]                             ^
[  140.342967]  ffff0000c59cae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.344553]  ffff0000c59caf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.346061] ==================================================================

test log snippet boot parser 108

Home

[  140.358182] ==================================================================
[  140.360083] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8
[  140.361521] Read of size 1 at addr ffff0000c5942218 by task kunit_try_catch/163
[  140.363125] 
[  140.364184] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.365957] Hardware name: linux,dummy-virt (DT)
[  140.367126] Call trace:
[  140.367961]  dump_backtrace+0xf8/0x118
[  140.369386]  show_stack+0x18/0x24
[  140.370677]  __dump_stack+0x28/0x38
[  140.372151]  dump_stack_lvl+0x54/0x6c
[  140.373487]  print_address_description+0x7c/0x20c
[  140.374891]  print_report+0x50/0x68
[  140.376021]  kasan_report+0xac/0x100
[  140.377389]  __asan_load1+0x6c/0x70
[  140.378588]  memcmp+0x8c/0xd8
[  140.379744]  kasan_memcmp+0xc8/0x178
[  140.381342]  kunit_try_run_case+0x80/0x184
[  140.382623]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.384315]  kthread+0x16c/0x21c
[  140.385398]  ret_from_fork+0x10/0x20
[  140.386561] 
[  140.387181] Allocated by task 163:
[  140.388092]  kasan_set_track+0x4c/0x80
[  140.389535]  kasan_save_alloc_info+0x28/0x34
[  140.390719]  __kasan_kmalloc+0x88/0xa0
[  140.392079]  kmalloc_trace+0x54/0x68
[  140.393275]  kasan_memcmp+0x58/0x178
[  140.394466]  kunit_try_run_case+0x80/0x184
[  140.395711]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.397281]  kthread+0x16c/0x21c
[  140.398554]  ret_from_fork+0x10/0x20
[  140.400102] 
[  140.400714] The buggy address belongs to the object at ffff0000c5942200
[  140.400714]  which belongs to the cache kmalloc-128 of size 128
[  140.402946] The buggy address is located 24 bytes inside of
[  140.402946]  128-byte region [ffff0000c5942200, ffff0000c5942280)
[  140.405934] 
[  140.406600] The buggy address belongs to the physical page:
[  140.408252] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.410257] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.412038] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.414020] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.415574] page dumped because: kasan: bad access detected
[  140.417053] 
[  140.417902] Memory state around the buggy address:
[  140.419191]  ffff0000c5942100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.421164]  ffff0000c5942180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.423073] >ffff0000c5942200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.424223]                             ^
[  140.425688]  ffff0000c5942280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.427748]  ffff0000c5942300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.428993] ==================================================================

test log snippet boot parser 109

Home

[  142.341411] ==================================================================
[  142.344016] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4
[  142.345728] Read of size 1 at addr ffff0000c5942800 by task kunit_try_catch/167
[  142.347233] 
[  142.348262] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.349976] Hardware name: linux,dummy-virt (DT)
[  142.351092] Call trace:
[  142.351904]  dump_backtrace+0xf8/0x118
[  142.352937]  show_stack+0x18/0x24
[  142.354380]  __dump_stack+0x28/0x38
[  142.355744]  dump_stack_lvl+0x54/0x6c
[  142.357136]  print_address_description+0x7c/0x20c
[  142.358521]  print_report+0x50/0x68
[  142.359743]  kasan_report+0xac/0x100
[  142.360699]  __kasan_check_byte+0x3c/0x54
[  142.361698]  ksize+0x34/0x13c
[  142.362892]  kfree_sensitive+0x1c/0xa4
[  142.364182]  kmalloc_double_kzfree+0xa4/0x144
[  142.365661]  kunit_try_run_case+0x80/0x184
[  142.366940]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.368657]  kthread+0x16c/0x21c
[  142.369817]  ret_from_fork+0x10/0x20
[  142.370987] 
[  142.371571] Allocated by task 167:
[  142.372546]  kasan_set_track+0x4c/0x80
[  142.373912]  kasan_save_alloc_info+0x28/0x34
[  142.375134]  __kasan_kmalloc+0x88/0xa0
[  142.376488]  kmalloc_trace+0x54/0x68
[  142.377329]  kmalloc_double_kzfree+0x48/0x144
[  142.378774]  kunit_try_run_case+0x80/0x184
[  142.380119]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.381663]  kthread+0x16c/0x21c
[  142.382820]  ret_from_fork+0x10/0x20
[  142.384212] 
[  142.384769] Freed by task 167:
[  142.385720]  kasan_set_track+0x4c/0x80
[  142.387035]  kasan_save_free_info+0x3c/0x60
[  142.388446]  ____kasan_slab_free+0xe8/0x140
[  142.389772]  __kasan_slab_free+0x18/0x28
[  142.391035]  __kmem_cache_free+0xdc/0x284
[  142.392573]  kfree_sensitive+0x88/0xa4
[  142.393775]  kmalloc_double_kzfree+0x90/0x144
[  142.395097]  kunit_try_run_case+0x80/0x184
[  142.396410]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.398026]  kthread+0x16c/0x21c
[  142.399152]  ret_from_fork+0x10/0x20
[  142.400549] 
[  142.401169] The buggy address belongs to the object at ffff0000c5942800
[  142.401169]  which belongs to the cache kmalloc-128 of size 128
[  142.403465] The buggy address is located 0 bytes inside of
[  142.403465]  128-byte region [ffff0000c5942800, ffff0000c5942880)
[  142.405611] 
[  142.406225] The buggy address belongs to the physical page:
[  142.408399] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  142.410320] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  142.412233] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  142.414055] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  142.416013] page dumped because: kasan: bad access detected
[  142.417081] 
[  142.417743] Memory state around the buggy address:
[  142.418899]  ffff0000c5942700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.420883]  ffff0000c5942780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.422614] >ffff0000c5942800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.424067]                    ^
[  142.425045]  ffff0000c5942880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.426956]  ffff0000c5942900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.428515] ==================================================================

test log snippet boot parser 110

Home

[  136.249814] ==================================================================
[  136.251721] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c
[  136.253443] Read of size 1 at addr ffff0000c5980000 by task kunit_try_catch/124
[  136.255122] 
[  136.255858] CPU: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.257893] Hardware name: linux,dummy-virt (DT)
[  136.259010] Call trace:
[  136.259860]  dump_backtrace+0xf8/0x118
[  136.261192]  show_stack+0x18/0x24
[  136.262414]  __dump_stack+0x28/0x38
[  136.263650]  dump_stack_lvl+0x54/0x6c
[  136.264905]  print_address_description+0x7c/0x20c
[  136.266323]  print_report+0x50/0x68
[  136.267749]  kasan_report+0xac/0x100
[  136.269044]  __asan_load1+0x6c/0x70
[  136.270174]  kmalloc_pagealloc_uaf+0x88/0x12c
[  136.271442]  kunit_try_run_case+0x80/0x184
[  136.272825]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.274533]  kthread+0x16c/0x21c
[  136.275671]  ret_from_fork+0x10/0x20
[  136.277219] 
[  136.277806] The buggy address belongs to the physical page:
[  136.279010] page:00000000eff54a5d refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105980
[  136.280922] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  136.282681] raw: 0bfffc0000000000 ffff0000daf53f78 ffff0000daf53f78 0000000000000000
[  136.284556] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  136.286050] page dumped because: kasan: bad access detected
[  136.287237] 
[  136.287999] Memory state around the buggy address:
[  136.289187]  ffff0000c597ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.290772]  ffff0000c597ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  136.292324] >ffff0000c5980000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.293978]                    ^
[  136.294935]  ffff0000c5980080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.296791]  ffff0000c5980100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.298286] ==================================================================

test log snippet boot parser 111

Home

[  138.630841] ==================================================================
[  138.632847] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8
[  138.634559] Read of size 1 at addr ffff0000c5987328 by task kunit_try_catch/145
[  138.636088] 
[  138.636856] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.639274] Hardware name: linux,dummy-virt (DT)
[  138.640887] Call trace:
[  138.641677]  dump_backtrace+0xf8/0x118
[  138.642916]  show_stack+0x18/0x24
[  138.644039]  __dump_stack+0x28/0x38
[  138.645639]  dump_stack_lvl+0x54/0x6c
[  138.646799]  print_address_description+0x7c/0x20c
[  138.648164]  print_report+0x50/0x68
[  138.649502]  kasan_report+0xac/0x100
[  138.650721]  __asan_load1+0x6c/0x70
[  138.651957]  kmalloc_uaf2+0xfc/0x1e8
[  138.653819]  kunit_try_run_case+0x80/0x184
[  138.655109]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.656972]  kthread+0x16c/0x21c
[  138.658098]  ret_from_fork+0x10/0x20
[  138.659238] 
[  138.659911] Allocated by task 145:
[  138.660879]  kasan_set_track+0x4c/0x80
[  138.662679]  kasan_save_alloc_info+0x28/0x34
[  138.664026]  __kasan_kmalloc+0x88/0xa0
[  138.665586]  kmalloc_trace+0x54/0x68
[  138.666732]  kmalloc_uaf2+0x48/0x1e8
[  138.668095]  kunit_try_run_case+0x80/0x184
[  138.669479]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.671014]  kthread+0x16c/0x21c
[  138.672240]  ret_from_fork+0x10/0x20
[  138.673858] 
[  138.674407] Freed by task 145:
[  138.675273]  kasan_set_track+0x4c/0x80
[  138.677295]  kasan_save_free_info+0x3c/0x60
[  138.678520]  ____kasan_slab_free+0xe8/0x140
[  138.679833]  __kasan_slab_free+0x18/0x28
[  138.681178]  __kmem_cache_free+0xdc/0x284
[  138.682508]  kfree+0x60/0x74
[  138.683599]  kmalloc_uaf2+0x90/0x1e8
[  138.684837]  kunit_try_run_case+0x80/0x184
[  138.686129]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.687826]  kthread+0x16c/0x21c
[  138.689052]  ret_from_fork+0x10/0x20
[  138.690305] 
[  138.690912] The buggy address belongs to the object at ffff0000c5987300
[  138.690912]  which belongs to the cache kmalloc-128 of size 128
[  138.693412] The buggy address is located 40 bytes inside of
[  138.693412]  128-byte region [ffff0000c5987300, ffff0000c5987380)
[  138.696309] 
[  138.696936] The buggy address belongs to the physical page:
[  138.698235] page:00000000b6b7d477 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105987
[  138.700247] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.701999] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.703854] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.706307] page dumped because: kasan: bad access detected
[  138.707730] 
[  138.708534] Memory state around the buggy address:
[  138.709874]  ffff0000c5987200: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.711942]  ffff0000c5987280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.713414] >ffff0000c5987300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  138.714816]                                   ^
[  138.716086]  ffff0000c5987380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.718149]  ffff0000c5987400: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  138.719593] ==================================================================

test log snippet boot parser 112

Home

[  137.753234] ==================================================================
[  137.755109] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac
[  137.756776] Read of size 16 at addr ffff0000c593db00 by task kunit_try_catch/135
[  137.758930] 
[  137.760134] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.762333] Hardware name: linux,dummy-virt (DT)
[  137.763784] Call trace:
[  137.764549]  dump_backtrace+0xf8/0x118
[  137.765788]  show_stack+0x18/0x24
[  137.766940]  __dump_stack+0x28/0x38
[  137.768211]  dump_stack_lvl+0x54/0x6c
[  137.769476]  print_address_description+0x7c/0x20c
[  137.770815]  print_report+0x50/0x68
[  137.772163]  kasan_report+0xac/0x100
[  137.773508]  kasan_check_range+0x260/0x2a0
[  137.775096]  memcpy+0x48/0x90
[  137.776037]  kmalloc_uaf_16+0x104/0x1ac
[  137.777437]  kunit_try_run_case+0x80/0x184
[  137.779009]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.780633]  kthread+0x16c/0x21c
[  137.781781]  ret_from_fork+0x10/0x20
[  137.782913] 
[  137.783913] Allocated by task 135:
[  137.784739]  kasan_set_track+0x4c/0x80
[  137.785995]  kasan_save_alloc_info+0x28/0x34
[  137.787253]  __kasan_kmalloc+0x88/0xa0
[  137.788582]  kmalloc_trace+0x54/0x68
[  137.789776]  kmalloc_uaf_16+0xa0/0x1ac
[  137.790913]  kunit_try_run_case+0x80/0x184
[  137.792225]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.794038]  kthread+0x16c/0x21c
[  137.795166]  ret_from_fork+0x10/0x20
[  137.796335] 
[  137.796920] Freed by task 135:
[  137.799038]  kasan_set_track+0x4c/0x80
[  137.800493]  kasan_save_free_info+0x3c/0x60
[  137.801770]  ____kasan_slab_free+0xe8/0x140
[  137.803067]  __kasan_slab_free+0x18/0x28
[  137.804597]  __kmem_cache_free+0xdc/0x284
[  137.805703]  kfree+0x60/0x74
[  137.806722]  kmalloc_uaf_16+0xe8/0x1ac
[  137.808074]  kunit_try_run_case+0x80/0x184
[  137.809342]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.810819]  kthread+0x16c/0x21c
[  137.811947]  ret_from_fork+0x10/0x20
[  137.813201] 
[  137.813790] The buggy address belongs to the object at ffff0000c593db00
[  137.813790]  which belongs to the cache kmalloc-128 of size 128
[  137.815985] The buggy address is located 0 bytes inside of
[  137.815985]  128-byte region [ffff0000c593db00, ffff0000c593db80)
[  137.818163] 
[  137.819850] The buggy address belongs to the physical page:
[  137.821077] page:00000000fe8ceeff refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d
[  137.822932] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  137.824310] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  137.826077] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.827625] page dumped because: kasan: bad access detected
[  137.828747] 
[  137.829227] Memory state around the buggy address:
[  137.830464]  ffff0000c593da00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.832224]  ffff0000c593da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.833892] >ffff0000c593db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  137.835339]                    ^
[  137.836406]  ffff0000c593db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.838056]  ffff0000c593dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.839426] ==================================================================

test log snippet boot parser 113

Home

[  138.434341] ==================================================================
[  138.436426] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148
[  138.438963] Read of size 1 at addr ffff0000c593cc08 by task kunit_try_catch/143
[  138.440775] 
[  138.441344] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.443155] Hardware name: linux,dummy-virt (DT)
[  138.444231] Call trace:
[  138.445256]  dump_backtrace+0xf8/0x118
[  138.446805]  show_stack+0x18/0x24
[  138.448173]  __dump_stack+0x28/0x38
[  138.449188]  dump_stack_lvl+0x54/0x6c
[  138.450460]  print_address_description+0x7c/0x20c
[  138.451862]  print_report+0x50/0x68
[  138.453895]  kasan_report+0xac/0x100
[  138.455079]  __asan_load1+0x6c/0x70
[  138.456630]  kmalloc_uaf+0xa4/0x148
[  138.457906]  kunit_try_run_case+0x80/0x184
[  138.459155]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.460619]  kthread+0x16c/0x21c
[  138.461848]  ret_from_fork+0x10/0x20
[  138.463020] 
[  138.463718] Allocated by task 143:
[  138.464794]  kasan_set_track+0x4c/0x80
[  138.466134]  kasan_save_alloc_info+0x28/0x34
[  138.467524]  __kasan_kmalloc+0x88/0xa0
[  138.468840]  kmalloc_trace+0x54/0x68
[  138.470123]  kmalloc_uaf+0x48/0x148
[  138.471351]  kunit_try_run_case+0x80/0x184
[  138.472829]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.474407]  kthread+0x16c/0x21c
[  138.475611]  ret_from_fork+0x10/0x20
[  138.477008] 
[  138.477652] Freed by task 143:
[  138.478500]  kasan_set_track+0x4c/0x80
[  138.480085]  kasan_save_free_info+0x3c/0x60
[  138.481522]  ____kasan_slab_free+0xe8/0x140
[  138.482910]  __kasan_slab_free+0x18/0x28
[  138.484154]  __kmem_cache_free+0xdc/0x284
[  138.485554]  kfree+0x60/0x74
[  138.486647]  kmalloc_uaf+0x90/0x148
[  138.488385]  kunit_try_run_case+0x80/0x184
[  138.489645]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.491118]  kthread+0x16c/0x21c
[  138.492183]  ret_from_fork+0x10/0x20
[  138.493263] 
[  138.494061] The buggy address belongs to the object at ffff0000c593cc00
[  138.494061]  which belongs to the cache kmalloc-128 of size 128
[  138.496846] The buggy address is located 8 bytes inside of
[  138.496846]  128-byte region [ffff0000c593cc00, ffff0000c593cc80)
[  138.498756] 
[  138.499320] The buggy address belongs to the physical page:
[  138.501280] page:00000000f1dc7839 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593c
[  138.503263] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.505016] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.506574] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.508290] page dumped because: kasan: bad access detected
[  138.509517] 
[  138.510133] Memory state around the buggy address:
[  138.511387]  ffff0000c593cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  138.513311]  ffff0000c593cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.515163] >ffff0000c593cc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  138.516517]                       ^
[  138.517415]  ffff0000c593cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.519547]  ffff0000c593cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.521282] ==================================================================

test log snippet boot parser 114

Home

[  138.532997] ==================================================================
[  138.534869] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c
[  138.536381] Write of size 33 at addr ffff0000c58e4d00 by task kunit_try_catch/144
[  138.538051] 
[  138.538702] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  138.540951] Hardware name: linux,dummy-virt (DT)
[  138.541956] Call trace:
[  138.542776]  dump_backtrace+0xf8/0x118
[  138.544078]  show_stack+0x18/0x24
[  138.545198]  __dump_stack+0x28/0x38
[  138.546501]  dump_stack_lvl+0x54/0x6c
[  138.548071]  print_address_description+0x7c/0x20c
[  138.549444]  print_report+0x50/0x68
[  138.550654]  kasan_report+0xac/0x100
[  138.552029]  kasan_check_range+0x260/0x2a0
[  138.553060]  memset+0x40/0x70
[  138.554134]  kmalloc_uaf_memset+0xac/0x14c
[  138.555148]  kunit_try_run_case+0x80/0x184
[  138.556607]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.558578]  kthread+0x16c/0x21c
[  138.560137]  ret_from_fork+0x10/0x20
[  138.561580] 
[  138.562160] Allocated by task 144:
[  138.563096]  kasan_set_track+0x4c/0x80
[  138.564350]  kasan_save_alloc_info+0x28/0x34
[  138.565658]  __kasan_kmalloc+0x88/0xa0
[  138.566892]  kmalloc_trace+0x54/0x68
[  138.568054]  kmalloc_uaf_memset+0x48/0x14c
[  138.569321]  kunit_try_run_case+0x80/0x184
[  138.570627]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.572407]  kthread+0x16c/0x21c
[  138.573609]  ret_from_fork+0x10/0x20
[  138.574606] 
[  138.575195] Freed by task 144:
[  138.576636]  kasan_set_track+0x4c/0x80
[  138.577980]  kasan_save_free_info+0x3c/0x60
[  138.579338]  ____kasan_slab_free+0xe8/0x140
[  138.580972]  __kasan_slab_free+0x18/0x28
[  138.582094]  __kmem_cache_free+0xdc/0x284
[  138.583307]  kfree+0x60/0x74
[  138.584685]  kmalloc_uaf_memset+0x90/0x14c
[  138.585910]  kunit_try_run_case+0x80/0x184
[  138.587136]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  138.588781]  kthread+0x16c/0x21c
[  138.589931]  ret_from_fork+0x10/0x20
[  138.591084] 
[  138.591649] The buggy address belongs to the object at ffff0000c58e4d00
[  138.591649]  which belongs to the cache kmalloc-128 of size 128
[  138.593910] The buggy address is located 0 bytes inside of
[  138.593910]  128-byte region [ffff0000c58e4d00, ffff0000c58e4d80)
[  138.596257] 
[  138.597013] The buggy address belongs to the physical page:
[  138.598636] page:00000000d0241a86 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e4
[  138.601033] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  138.603021] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  138.604877] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  138.606422] page dumped because: kasan: bad access detected
[  138.607930] 
[  138.608447] Memory state around the buggy address:
[  138.609603]  ffff0000c58e4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  138.611135]  ffff0000c58e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.613076] >ffff0000c58e4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  138.614525]                    ^
[  138.615513]  ffff0000c58e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.617032]  ffff0000c58e4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  138.618544] ==================================================================

test log snippet boot parser 115

Home

[  140.166067] ==================================================================
[  140.169435] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144
[  140.171262] Read of size 1 at addr ffff0000c1a92900 by task kunit_try_catch/161
[  140.172827] 
[  140.173496] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.175381] Hardware name: linux,dummy-virt (DT)
[  140.176544] Call trace:
[  140.177279]  dump_backtrace+0xf8/0x118
[  140.178505]  show_stack+0x18/0x24
[  140.179779]  __dump_stack+0x28/0x38
[  140.181152]  dump_stack_lvl+0x54/0x6c
[  140.182413]  print_address_description+0x7c/0x20c
[  140.183823]  print_report+0x50/0x68
[  140.185899]  kasan_report+0xac/0x100
[  140.187114]  __kasan_check_byte+0x3c/0x54
[  140.188386]  kmem_cache_destroy+0x3c/0x14c
[  140.189700]  kmem_cache_double_destroy+0xa4/0x144
[  140.191037]  kunit_try_run_case+0x80/0x184
[  140.192476]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.193905]  kthread+0x16c/0x21c
[  140.195066]  ret_from_fork+0x10/0x20
[  140.196198] 
[  140.196785] Allocated by task 161:
[  140.197708]  kasan_set_track+0x4c/0x80
[  140.198929]  kasan_save_alloc_info+0x28/0x34
[  140.200211]  __kasan_slab_alloc+0x58/0x70
[  140.201455]  slab_post_alloc_hook+0x70/0x2f4
[  140.202737]  kmem_cache_alloc+0x168/0x260
[  140.204262]  kmem_cache_create_usercopy+0x108/0x29c
[  140.205882]  kmem_cache_create+0x1c/0x28
[  140.207179]  kmem_cache_double_destroy+0x48/0x144
[  140.208756]  kunit_try_run_case+0x80/0x184
[  140.210096]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.211560]  kthread+0x16c/0x21c
[  140.212794]  ret_from_fork+0x10/0x20
[  140.214008] 
[  140.214661] Freed by task 161:
[  140.215560]  kasan_set_track+0x4c/0x80
[  140.217038]  kasan_save_free_info+0x3c/0x60
[  140.218285]  ____kasan_slab_free+0xe8/0x140
[  140.219664]  __kasan_slab_free+0x18/0x28
[  140.221082]  kmem_cache_free+0xe0/0x358
[  140.222252]  slab_kmem_cache_release+0x30/0x40
[  140.223604]  kmem_cache_release+0x14/0x20
[  140.225237]  kobject_put+0xd8/0x140
[  140.226762]  sysfs_slab_release+0x28/0x34
[  140.228464]  kmem_cache_destroy+0x148/0x14c
[  140.229699]  kmem_cache_double_destroy+0x90/0x144
[  140.231045]  kunit_try_run_case+0x80/0x184
[  140.232298]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.233883]  kthread+0x16c/0x21c
[  140.235024]  ret_from_fork+0x10/0x20
[  140.236237] 
[  140.237117] The buggy address belongs to the object at ffff0000c1a92900
[  140.237117]  which belongs to the cache kmem_cache of size 216
[  140.239245] The buggy address is located 0 bytes inside of
[  140.239245]  216-byte region [ffff0000c1a92900, ffff0000c1a929d8)
[  140.241724] 
[  140.242328] The buggy address belongs to the physical page:
[  140.243521] page:000000007b1d49f6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a92
[  140.245388] head:000000007b1d49f6 order:1 compound_mapcount:0 compound_pincount:0
[  140.247266] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  140.249399] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[  140.251035] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[  140.252759] page dumped because: kasan: bad access detected
[  140.254068] 
[  140.254686] Memory state around the buggy address:
[  140.255830]  ffff0000c1a92800: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  140.257919]  ffff0000c1a92880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.259409] >ffff0000c1a92900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.261026]                    ^
[  140.262013]  ffff0000c1a92980: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  140.263510]  ffff0000c1a92a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.264952] ==================================================================

test log snippet boot parser 116

Home

[  137.578834] ==================================================================
[  137.580115] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c
[  137.581607] Read of size 1 at addr ffff0000c582de00 by task kunit_try_catch/133
[  137.583690] 
[  137.584459] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.586276] Hardware name: linux,dummy-virt (DT)
[  137.587477] Call trace:
[  137.588205]  dump_backtrace+0xf8/0x118
[  137.589488]  show_stack+0x18/0x24
[  137.590612]  __dump_stack+0x28/0x38
[  137.591889]  dump_stack_lvl+0x54/0x6c
[  137.593105]  print_address_description+0x7c/0x20c
[  137.594481]  print_report+0x50/0x68
[  137.595634]  kasan_report+0xac/0x100
[  137.596841]  __asan_load1+0x6c/0x70
[  137.598075]  krealloc_uaf+0xd0/0x21c
[  137.599226]  kunit_try_run_case+0x80/0x184
[  137.600498]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.601966]  kthread+0x16c/0x21c
[  137.603105]  ret_from_fork+0x10/0x20
[  137.604227] 
[  137.604825] Allocated by task 133:
[  137.605804]  kasan_set_track+0x4c/0x80
[  137.607028]  kasan_save_alloc_info+0x28/0x34
[  137.608274]  __kasan_kmalloc+0x88/0xa0
[  137.609523]  kmalloc_trace+0x54/0x68
[  137.610681]  krealloc_uaf+0x48/0x21c
[  137.611781]  kunit_try_run_case+0x80/0x184
[  137.613052]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.614601]  kthread+0x16c/0x21c
[  137.615750]  ret_from_fork+0x10/0x20
[  137.616858] 
[  137.617397] Freed by task 133:
[  137.618298]  kasan_set_track+0x4c/0x80
[  137.619545]  kasan_save_free_info+0x3c/0x60
[  137.620816]  ____kasan_slab_free+0xe8/0x140
[  137.622119]  __kasan_slab_free+0x18/0x28
[  137.623381]  __kmem_cache_free+0xdc/0x284
[  137.624600]  kfree+0x60/0x74
[  137.625630]  krealloc_uaf+0x90/0x21c
[  137.626779]  kunit_try_run_case+0x80/0x184
[  137.628050]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.629485]  kthread+0x16c/0x21c
[  137.630680]  ret_from_fork+0x10/0x20
[  137.631819] 
[  137.632428] The buggy address belongs to the object at ffff0000c582de00
[  137.632428]  which belongs to the cache kmalloc-256 of size 256
[  137.634579] The buggy address is located 0 bytes inside of
[  137.634579]  256-byte region [ffff0000c582de00, ffff0000c582df00)
[  137.636699] 
[  137.637292] The buggy address belongs to the physical page:
[  137.638469] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  137.640320] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  137.641901] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  137.643672] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  137.645414] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.647342] page dumped because: kasan: bad access detected
[  137.648325] 
[  137.648994] Memory state around the buggy address:
[  137.650117]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.652658]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.654865] >ffff0000c582de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  137.656190]                    ^
[  137.657376]  ffff0000c582de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  137.658816]  ffff0000c582df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.660189] ==================================================================

test log snippet boot parser 117

Home

[  137.485937] ==================================================================
[  137.487972] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c
[  137.489536] Read of size 1 at addr ffff0000c582de00 by task kunit_try_catch/133
[  137.491770] 
[  137.492389] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  137.494621] Hardware name: linux,dummy-virt (DT)
[  137.496039] Call trace:
[  137.496720]  dump_backtrace+0xf8/0x118
[  137.498148]  show_stack+0x18/0x24
[  137.499416]  __dump_stack+0x28/0x38
[  137.500680]  dump_stack_lvl+0x54/0x6c
[  137.502095]  print_address_description+0x7c/0x20c
[  137.503519]  print_report+0x50/0x68
[  137.504834]  kasan_report+0xac/0x100
[  137.506071]  __kasan_check_byte+0x3c/0x54
[  137.507443]  krealloc+0x54/0x270
[  137.508883]  krealloc_uaf+0xac/0x21c
[  137.510007]  kunit_try_run_case+0x80/0x184
[  137.511402]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.513077]  kthread+0x16c/0x21c
[  137.514277]  ret_from_fork+0x10/0x20
[  137.515721] 
[  137.516466] Allocated by task 133:
[  137.517452]  kasan_set_track+0x4c/0x80
[  137.518689]  kasan_save_alloc_info+0x28/0x34
[  137.520157]  __kasan_kmalloc+0x88/0xa0
[  137.521317]  kmalloc_trace+0x54/0x68
[  137.522468]  krealloc_uaf+0x48/0x21c
[  137.523562]  kunit_try_run_case+0x80/0x184
[  137.524951]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.526561]  kthread+0x16c/0x21c
[  137.527754]  ret_from_fork+0x10/0x20
[  137.528967] 
[  137.530269] Freed by task 133:
[  137.531249]  kasan_set_track+0x4c/0x80
[  137.532612]  kasan_save_free_info+0x3c/0x60
[  137.533842]  ____kasan_slab_free+0xe8/0x140
[  137.535081]  __kasan_slab_free+0x18/0x28
[  137.536485]  __kmem_cache_free+0xdc/0x284
[  137.537799]  kfree+0x60/0x74
[  137.538864]  krealloc_uaf+0x90/0x21c
[  137.540514]  kunit_try_run_case+0x80/0x184
[  137.541545]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  137.543055]  kthread+0x16c/0x21c
[  137.544225]  ret_from_fork+0x10/0x20
[  137.545501] 
[  137.546123] The buggy address belongs to the object at ffff0000c582de00
[  137.546123]  which belongs to the cache kmalloc-256 of size 256
[  137.548316] The buggy address is located 0 bytes inside of
[  137.548316]  256-byte region [ffff0000c582de00, ffff0000c582df00)
[  137.550733] 
[  137.551242] The buggy address belongs to the physical page:
[  137.553562] page:00000000f0c7be7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582c
[  137.555207] head:00000000f0c7be7f order:1 compound_mapcount:0 compound_pincount:0
[  137.556719] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  137.558602] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  137.560451] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  137.561929] page dumped because: kasan: bad access detected
[  137.563069] 
[  137.563993] Memory state around the buggy address:
[  137.565148]  ffff0000c582dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.566616]  ffff0000c582dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.568334] >ffff0000c582de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  137.570175]                    ^
[  137.571706]  ffff0000c582de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  137.573341]  ffff0000c582df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  137.574689] ==================================================================

test log snippet boot parser 118

Home

[  139.777931] ==================================================================
[  139.779348] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c
[  139.780776] Read of size 1 at addr ffff0000c59ca900 by task kunit_try_catch/158
[  139.782389] 
[  139.783023] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.784844] Hardware name: linux,dummy-virt (DT)
[  139.785895] Call trace:
[  139.786697]  dump_backtrace+0xf8/0x118
[  139.787977]  show_stack+0x18/0x24
[  139.789141]  __dump_stack+0x28/0x38
[  139.790371]  dump_stack_lvl+0x54/0x6c
[  139.791589]  print_address_description+0x7c/0x20c
[  139.792932]  print_report+0x50/0x68
[  139.794093]  kasan_report+0xac/0x100
[  139.795289]  __asan_load1+0x6c/0x70
[  139.796508]  ksize_uaf+0xe8/0x24c
[  139.797685]  kunit_try_run_case+0x80/0x184
[  139.798933]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.800389]  kthread+0x16c/0x21c
[  139.801522]  ret_from_fork+0x10/0x20
[  139.802723] 
[  139.803266] Allocated by task 158:
[  139.804217]  kasan_set_track+0x4c/0x80
[  139.805464]  kasan_save_alloc_info+0x28/0x34
[  139.806653]  __kasan_kmalloc+0x88/0xa0
[  139.807978]  kmalloc_trace+0x54/0x68
[  139.809095]  ksize_uaf+0x48/0x24c
[  139.810232]  kunit_try_run_case+0x80/0x184
[  139.811522]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.813002]  kthread+0x16c/0x21c
[  139.814162]  ret_from_fork+0x10/0x20
[  139.815305] 
[  139.815887] Freed by task 158:
[  139.816786]  kasan_set_track+0x4c/0x80
[  139.818051]  kasan_save_free_info+0x3c/0x60
[  139.819277]  ____kasan_slab_free+0xe8/0x140
[  139.820554]  __kasan_slab_free+0x18/0x28
[  139.821861]  __kmem_cache_free+0xdc/0x284
[  139.823156]  kfree+0x60/0x74
[  139.824218]  ksize_uaf+0x90/0x24c
[  139.825324]  kunit_try_run_case+0x80/0x184
[  139.826588]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.828102]  kthread+0x16c/0x21c
[  139.829233]  ret_from_fork+0x10/0x20
[  139.830397] 
[  139.830988] The buggy address belongs to the object at ffff0000c59ca900
[  139.830988]  which belongs to the cache kmalloc-128 of size 128
[  139.833214] The buggy address is located 0 bytes inside of
[  139.833214]  128-byte region [ffff0000c59ca900, ffff0000c59ca980)
[  139.835421] 
[  139.835999] The buggy address belongs to the physical page:
[  139.837220] page:00000000464d9d31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[  139.839116] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  139.840862] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  139.842534] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  139.844022] page dumped because: kasan: bad access detected
[  139.845156] 
[  139.845776] Memory state around the buggy address:
[  139.846910]  ffff0000c59ca800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.848434]  ffff0000c59ca880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.850007] >ffff0000c59ca900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.851479]                    ^
[  139.852463]  ffff0000c59ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.854049]  ffff0000c59caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.855479] ==================================================================

test log snippet boot parser 119

Home

[  139.858326] ==================================================================
[  139.860275] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c
[  139.861737] Read of size 1 at addr ffff0000c59ca978 by task kunit_try_catch/158
[  139.863191] 
[  139.863854] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.865618] Hardware name: linux,dummy-virt (DT)
[  139.866687] Call trace:
[  139.867472]  dump_backtrace+0xf8/0x118
[  139.868769]  show_stack+0x18/0x24
[  139.869938]  __dump_stack+0x28/0x38
[  139.871127]  dump_stack_lvl+0x54/0x6c
[  139.872333]  print_address_description+0x7c/0x20c
[  139.873658]  print_report+0x50/0x68
[  139.874876]  kasan_report+0xac/0x100
[  139.876068]  __asan_load1+0x6c/0x70
[  139.877280]  ksize_uaf+0x130/0x24c
[  139.878434]  kunit_try_run_case+0x80/0x184
[  139.879686]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.881119]  kthread+0x16c/0x21c
[  139.882259]  ret_from_fork+0x10/0x20
[  139.883424] 
[  139.883999] Allocated by task 158:
[  139.884939]  kasan_set_track+0x4c/0x80
[  139.886208]  kasan_save_alloc_info+0x28/0x34
[  139.887502]  __kasan_kmalloc+0x88/0xa0
[  139.888755]  kmalloc_trace+0x54/0x68
[  139.889934]  ksize_uaf+0x48/0x24c
[  139.891048]  kunit_try_run_case+0x80/0x184
[  139.892269]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.893825]  kthread+0x16c/0x21c
[  139.894976]  ret_from_fork+0x10/0x20
[  139.896130] 
[  139.896751] Freed by task 158:
[  139.897697]  kasan_set_track+0x4c/0x80
[  139.899017]  kasan_save_free_info+0x3c/0x60
[  139.900223]  ____kasan_slab_free+0xe8/0x140
[  139.901594]  __kasan_slab_free+0x18/0x28
[  139.902933]  __kmem_cache_free+0xdc/0x284
[  139.904129]  kfree+0x60/0x74
[  139.905227]  ksize_uaf+0x90/0x24c
[  139.906338]  kunit_try_run_case+0x80/0x184
[  139.907593]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.909055]  kthread+0x16c/0x21c
[  139.910230]  ret_from_fork+0x10/0x20
[  139.911420] 
[  139.911979] The buggy address belongs to the object at ffff0000c59ca900
[  139.911979]  which belongs to the cache kmalloc-128 of size 128
[  139.914200] The buggy address is located 120 bytes inside of
[  139.914200]  128-byte region [ffff0000c59ca900, ffff0000c59ca980)
[  139.916384] 
[  139.916986] The buggy address belongs to the physical page:
[  139.918159] page:00000000464d9d31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[  139.920060] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  139.921866] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  139.923560] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  139.925032] page dumped because: kasan: bad access detected
[  139.926321] 
[  139.926929] Memory state around the buggy address:
[  139.928071]  ffff0000c59ca800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.929637]  ffff0000c59ca880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.931166] >ffff0000c59ca900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.932547]                                                                 ^
[  139.934060]  ffff0000c59ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.935582]  ffff0000c59caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.937058] ==================================================================

test log snippet boot parser 120

Home

[  139.689256] ==================================================================
[  139.691413] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c
[  139.693209] Read of size 1 at addr ffff0000c59ca900 by task kunit_try_catch/158
[  139.694916] 
[  139.695676] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  139.698043] Hardware name: linux,dummy-virt (DT)
[  139.699155] Call trace:
[  139.700220]  dump_backtrace+0xf8/0x118
[  139.701310]  show_stack+0x18/0x24
[  139.702513]  __dump_stack+0x28/0x38
[  139.703740]  dump_stack_lvl+0x54/0x6c
[  139.705007]  print_address_description+0x7c/0x20c
[  139.706405]  print_report+0x50/0x68
[  139.707643]  kasan_report+0xac/0x100
[  139.709004]  __kasan_check_byte+0x3c/0x54
[  139.710273]  ksize+0x34/0x13c
[  139.711328]  ksize_uaf+0xa4/0x24c
[  139.712654]  kunit_try_run_case+0x80/0x184
[  139.714000]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.715597]  kthread+0x16c/0x21c
[  139.716764]  ret_from_fork+0x10/0x20
[  139.718006] 
[  139.718597] Allocated by task 158:
[  139.719812]  kasan_set_track+0x4c/0x80
[  139.720968]  kasan_save_alloc_info+0x28/0x34
[  139.722185]  __kasan_kmalloc+0x88/0xa0
[  139.723427]  kmalloc_trace+0x54/0x68
[  139.724611]  ksize_uaf+0x48/0x24c
[  139.725733]  kunit_try_run_case+0x80/0x184
[  139.727016]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.728629]  kthread+0x16c/0x21c
[  139.729758]  ret_from_fork+0x10/0x20
[  139.730894] 
[  139.731499] Freed by task 158:
[  139.732374]  kasan_set_track+0x4c/0x80
[  139.734064]  kasan_save_free_info+0x3c/0x60
[  139.735279]  ____kasan_slab_free+0xe8/0x140
[  139.736737]  __kasan_slab_free+0x18/0x28
[  139.738265]  __kmem_cache_free+0xdc/0x284
[  139.739572]  kfree+0x60/0x74
[  139.740296]  ksize_uaf+0x90/0x24c
[  139.741393]  kunit_try_run_case+0x80/0x184
[  139.742697]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  139.744343]  kthread+0x16c/0x21c
[  139.745536]  ret_from_fork+0x10/0x20
[  139.746660] 
[  139.747295] The buggy address belongs to the object at ffff0000c59ca900
[  139.747295]  which belongs to the cache kmalloc-128 of size 128
[  139.749796] The buggy address is located 0 bytes inside of
[  139.749796]  128-byte region [ffff0000c59ca900, ffff0000c59ca980)
[  139.751995] 
[  139.753351] The buggy address belongs to the physical page:
[  139.754418] page:00000000464d9d31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[  139.756518] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  139.758278] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  139.760242] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  139.761701] page dumped because: kasan: bad access detected
[  139.762908] 
[  139.763515] Memory state around the buggy address:
[  139.764623]  ffff0000c59ca800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.766432]  ffff0000c59ca880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.768061] >ffff0000c59ca900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.769311]                    ^
[  139.770316]  ffff0000c59ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.772329]  ffff0000c59caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.773607] ==================================================================

test log snippet boot parser 121

Home

[  136.383001] ==================================================================
[  136.385971] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134
[  136.387604] Read of size 1 at addr ffff0000c5a20000 by task kunit_try_catch/127
[  136.389922] 
[  136.390707] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  136.392831] Hardware name: linux,dummy-virt (DT)
[  136.394106] Call trace:
[  136.394941]  dump_backtrace+0xf8/0x118
[  136.396227]  show_stack+0x18/0x24
[  136.397349]  __dump_stack+0x28/0x38
[  136.398724]  dump_stack_lvl+0x54/0x6c
[  136.400251]  print_address_description+0x7c/0x20c
[  136.401681]  print_report+0x50/0x68
[  136.402505]  kasan_report+0xac/0x100
[  136.403892]  __asan_load1+0x6c/0x70
[  136.405227]  pagealloc_uaf+0x90/0x134
[  136.406474]  kunit_try_run_case+0x80/0x184
[  136.407813]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  136.409824]  kthread+0x16c/0x21c
[  136.410935]  ret_from_fork+0x10/0x20
[  136.412246] 
[  136.412852] The buggy address belongs to the physical page:
[  136.414166] page:000000008b52e324 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a20
[  136.416477] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  136.418330] raw: 0bfffc0000000000 ffff0000ff7f5a08 ffff0000ff7f5a08 0000000000000000
[  136.419946] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[  136.421417] page dumped because: kasan: bad access detected
[  136.422635] 
[  136.423062] Memory state around the buggy address:
[  136.424746]  ffff0000c5a1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.426727]  ffff0000c5a1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.428939] >ffff0000c5a20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.430346]                    ^
[  136.431313]  ffff0000c5a20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.432897]  ffff0000c5a20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  136.434325] ==================================================================

test log snippet boot parser 122

Home

[  140.442479] ==================================================================
[  140.444867] BUG: KASAN: use-after-free in strchr+0x20/0x6c
[  140.446433] Read of size 1 at addr ffff0000c5942410 by task kunit_try_catch/164
[  140.448592] 
[  140.449235] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.451122] Hardware name: linux,dummy-virt (DT)
[  140.452348] Call trace:
[  140.453321]  dump_backtrace+0xf8/0x118
[  140.454740]  show_stack+0x18/0x24
[  140.456053]  __dump_stack+0x28/0x38
[  140.457476]  dump_stack_lvl+0x54/0x6c
[  140.458880]  print_address_description+0x7c/0x20c
[  140.460379]  print_report+0x50/0x68
[  140.461592]  kasan_report+0xac/0x100
[  140.462558]  __asan_load1+0x6c/0x70
[  140.464073]  strchr+0x20/0x6c
[  140.465348]  kasan_strings+0xa8/0x404
[  140.466569]  kunit_try_run_case+0x80/0x184
[  140.467808]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.469457]  kthread+0x16c/0x21c
[  140.470587]  ret_from_fork+0x10/0x20
[  140.471883] 
[  140.472425] Allocated by task 164:
[  140.473377]  kasan_set_track+0x4c/0x80
[  140.474753]  kasan_save_alloc_info+0x28/0x34
[  140.475966]  __kasan_kmalloc+0x88/0xa0
[  140.477222]  kmalloc_trace+0x54/0x68
[  140.479350]  kasan_strings+0x48/0x404
[  140.480939]  kunit_try_run_case+0x80/0x184
[  140.482267]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.483821]  kthread+0x16c/0x21c
[  140.484972]  ret_from_fork+0x10/0x20
[  140.486685] 
[  140.487208] Freed by task 164:
[  140.488443]  kasan_set_track+0x4c/0x80
[  140.489883]  kasan_save_free_info+0x3c/0x60
[  140.491136]  ____kasan_slab_free+0xe8/0x140
[  140.492543]  __kasan_slab_free+0x18/0x28
[  140.493996]  __kmem_cache_free+0xdc/0x284
[  140.495338]  kfree+0x60/0x74
[  140.496717]  kasan_strings+0x90/0x404
[  140.498076]  kunit_try_run_case+0x80/0x184
[  140.499305]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.500880]  kthread+0x16c/0x21c
[  140.502189]  ret_from_fork+0x10/0x20
[  140.503415] 
[  140.503984] The buggy address belongs to the object at ffff0000c5942400
[  140.503984]  which belongs to the cache kmalloc-128 of size 128
[  140.506604] The buggy address is located 16 bytes inside of
[  140.506604]  128-byte region [ffff0000c5942400, ffff0000c5942480)
[  140.509509] 
[  140.510149] The buggy address belongs to the physical page:
[  140.511330] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.513585] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.515426] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.518189] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.519904] page dumped because: kasan: bad access detected
[  140.521050] 
[  140.521737] Memory state around the buggy address:
[  140.522978]  ffff0000c5942300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  140.524528]  ffff0000c5942380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.526180] >ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.527747]                          ^
[  140.528893]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.531025]  ffff0000c5942500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.532625] ==================================================================

test log snippet boot parser 123

Home

[  140.629291] ==================================================================
[  140.630698] BUG: KASAN: use-after-free in strcmp+0x30/0x84
[  140.632239] Read of size 1 at addr ffff0000c5942410 by task kunit_try_catch/164
[  140.633742] 
[  140.634391] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.636256] Hardware name: linux,dummy-virt (DT)
[  140.637420] Call trace:
[  140.638190]  dump_backtrace+0xf8/0x118
[  140.639448]  show_stack+0x18/0x24
[  140.640602]  __dump_stack+0x28/0x38
[  140.641776]  dump_stack_lvl+0x54/0x6c
[  140.642965]  print_address_description+0x7c/0x20c
[  140.644346]  print_report+0x50/0x68
[  140.645491]  kasan_report+0xac/0x100
[  140.646695]  __asan_load1+0x6c/0x70
[  140.647917]  strcmp+0x30/0x84
[  140.648988]  kasan_strings+0x148/0x404
[  140.650184]  kunit_try_run_case+0x80/0x184
[  140.651444]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.652888]  kthread+0x16c/0x21c
[  140.654069]  ret_from_fork+0x10/0x20
[  140.655205] 
[  140.655792] Allocated by task 164:
[  140.656684]  kasan_set_track+0x4c/0x80
[  140.658030]  kasan_save_alloc_info+0x28/0x34
[  140.659212]  __kasan_kmalloc+0x88/0xa0
[  140.660515]  kmalloc_trace+0x54/0x68
[  140.661675]  kasan_strings+0x48/0x404
[  140.662826]  kunit_try_run_case+0x80/0x184
[  140.664092]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.665563]  kthread+0x16c/0x21c
[  140.666732]  ret_from_fork+0x10/0x20
[  140.667905] 
[  140.668500] Freed by task 164:
[  140.669398]  kasan_set_track+0x4c/0x80
[  140.670603]  kasan_save_free_info+0x3c/0x60
[  140.671810]  ____kasan_slab_free+0xe8/0x140
[  140.673111]  __kasan_slab_free+0x18/0x28
[  140.674318]  __kmem_cache_free+0xdc/0x284
[  140.675631]  kfree+0x60/0x74
[  140.676665]  kasan_strings+0x90/0x404
[  140.677876]  kunit_try_run_case+0x80/0x184
[  140.679123]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.680568]  kthread+0x16c/0x21c
[  140.681718]  ret_from_fork+0x10/0x20
[  140.682859] 
[  140.683462] The buggy address belongs to the object at ffff0000c5942400
[  140.683462]  which belongs to the cache kmalloc-128 of size 128
[  140.685698] The buggy address is located 16 bytes inside of
[  140.685698]  128-byte region [ffff0000c5942400, ffff0000c5942480)
[  140.687837] 
[  140.688448] The buggy address belongs to the physical page:
[  140.689649] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.691553] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.693252] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.694945] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.696451] page dumped because: kasan: bad access detected
[  140.697616] 
[  140.698183] Memory state around the buggy address:
[  140.699259]  ffff0000c5942300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  140.700821]  ffff0000c5942380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.702429] >ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.703906]                          ^
[  140.704969]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.706513]  ffff0000c5942500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.708036] ==================================================================

test log snippet boot parser 124

Home

[  140.792775] ==================================================================
[  140.794197] BUG: KASAN: use-after-free in strlen+0x28/0x50
[  140.795875] Read of size 1 at addr ffff0000c5942410 by task kunit_try_catch/164
[  140.797154] 
[  140.797818] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.799813] Hardware name: linux,dummy-virt (DT)
[  140.800739] Call trace:
[  140.801945]  dump_backtrace+0xf8/0x118
[  140.803268]  show_stack+0x18/0x24
[  140.804441]  __dump_stack+0x28/0x38
[  140.805635]  dump_stack_lvl+0x54/0x6c
[  140.806867]  print_address_description+0x7c/0x20c
[  140.808279]  print_report+0x50/0x68
[  140.810002]  kasan_report+0xac/0x100
[  140.811244]  __asan_load1+0x6c/0x70
[  140.812447]  strlen+0x28/0x50
[  140.813521]  kasan_strings+0x1e8/0x404
[  140.814657]  kunit_try_run_case+0x80/0x184
[  140.816204]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.817738]  kthread+0x16c/0x21c
[  140.818989]  ret_from_fork+0x10/0x20
[  140.820152] 
[  140.820736] Allocated by task 164:
[  140.821688]  kasan_set_track+0x4c/0x80
[  140.822915]  kasan_save_alloc_info+0x28/0x34
[  140.824765]  __kasan_kmalloc+0x88/0xa0
[  140.826098]  kmalloc_trace+0x54/0x68
[  140.827343]  kasan_strings+0x48/0x404
[  140.828550]  kunit_try_run_case+0x80/0x184
[  140.829816]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.831275]  kthread+0x16c/0x21c
[  140.832568]  ret_from_fork+0x10/0x20
[  140.834066] 
[  140.834672] Freed by task 164:
[  140.835640]  kasan_set_track+0x4c/0x80
[  140.836936]  kasan_save_free_info+0x3c/0x60
[  140.838195]  ____kasan_slab_free+0xe8/0x140
[  140.839505]  __kasan_slab_free+0x18/0x28
[  140.840867]  __kmem_cache_free+0xdc/0x284
[  140.842349]  kfree+0x60/0x74
[  140.843327]  kasan_strings+0x90/0x404
[  140.844608]  kunit_try_run_case+0x80/0x184
[  140.845875]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.847316]  kthread+0x16c/0x21c
[  140.848803]  ret_from_fork+0x10/0x20
[  140.850474] 
[  140.850920] The buggy address belongs to the object at ffff0000c5942400
[  140.850920]  which belongs to the cache kmalloc-128 of size 128
[  140.853086] The buggy address is located 16 bytes inside of
[  140.853086]  128-byte region [ffff0000c5942400, ffff0000c5942480)
[  140.855236] 
[  140.856851] The buggy address belongs to the physical page:
[  140.858289] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.860151] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.861914] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.864512] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.866060] page dumped because: kasan: bad access detected
[  140.867185] 
[  140.867789] Memory state around the buggy address:
[  140.868886]  ffff0000c5942300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  140.870412]  ffff0000c5942380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.871941] >ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.874427]                          ^
[  140.875560]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.877200]  ffff0000c5942500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.878700] ==================================================================

test log snippet boot parser 125

Home

[  140.711567] ==================================================================
[  140.713027] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0
[  140.714471] Read of size 1 at addr ffff0000c5942410 by task kunit_try_catch/164
[  140.715920] 
[  140.716563] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.718380] Hardware name: linux,dummy-virt (DT)
[  140.719482] Call trace:
[  140.720215]  dump_backtrace+0xf8/0x118
[  140.721441]  show_stack+0x18/0x24
[  140.722627]  __dump_stack+0x28/0x38
[  140.723837]  dump_stack_lvl+0x54/0x6c
[  140.725051]  print_address_description+0x7c/0x20c
[  140.726434]  print_report+0x50/0x68
[  140.727632]  kasan_report+0xac/0x100
[  140.728860]  __asan_load1+0x6c/0x70
[  140.730012]  strncmp+0x3c/0xa0
[  140.731147]  kasan_strings+0x1a0/0x404
[  140.732299]  kunit_try_run_case+0x80/0x184
[  140.733605]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.735021]  kthread+0x16c/0x21c
[  140.736214]  ret_from_fork+0x10/0x20
[  140.737426] 
[  140.738003] Allocated by task 164:
[  140.738929]  kasan_set_track+0x4c/0x80
[  140.740157]  kasan_save_alloc_info+0x28/0x34
[  140.741349]  __kasan_kmalloc+0x88/0xa0
[  140.742631]  kmalloc_trace+0x54/0x68
[  140.743771]  kasan_strings+0x48/0x404
[  140.744935]  kunit_try_run_case+0x80/0x184
[  140.746139]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.747698]  kthread+0x16c/0x21c
[  140.748848]  ret_from_fork+0x10/0x20
[  140.749981] 
[  140.750582] Freed by task 164:
[  140.751481]  kasan_set_track+0x4c/0x80
[  140.752669]  kasan_save_free_info+0x3c/0x60
[  140.753975]  ____kasan_slab_free+0xe8/0x140
[  140.755258]  __kasan_slab_free+0x18/0x28
[  140.756515]  __kmem_cache_free+0xdc/0x284
[  140.757741]  kfree+0x60/0x74
[  140.758778]  kasan_strings+0x90/0x404
[  140.759972]  kunit_try_run_case+0x80/0x184
[  140.761216]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.762670]  kthread+0x16c/0x21c
[  140.763792]  ret_from_fork+0x10/0x20
[  140.764938] 
[  140.765515] The buggy address belongs to the object at ffff0000c5942400
[  140.765515]  which belongs to the cache kmalloc-128 of size 128
[  140.767823] The buggy address is located 16 bytes inside of
[  140.767823]  128-byte region [ffff0000c5942400, ffff0000c5942480)
[  140.770008] 
[  140.770590] The buggy address belongs to the physical page:
[  140.771781] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.773602] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.775296] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.777103] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.778566] page dumped because: kasan: bad access detected
[  140.779780] 
[  140.780419] Memory state around the buggy address:
[  140.781569]  ffff0000c5942300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  140.783073]  ffff0000c5942380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.784634] >ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.786102]                          ^
[  140.787170]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.788711]  ffff0000c5942500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.790172] ==================================================================

test log snippet boot parser 126

Home

[  140.881862] ==================================================================
[  140.883406] BUG: KASAN: use-after-free in strnlen+0x3c/0x74
[  140.885034] Read of size 1 at addr ffff0000c5942410 by task kunit_try_catch/164
[  140.886846] 
[  140.887582] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.889434] Hardware name: linux,dummy-virt (DT)
[  140.891264] Call trace:
[  140.892039]  dump_backtrace+0xf8/0x118
[  140.893260]  show_stack+0x18/0x24
[  140.894477]  __dump_stack+0x28/0x38
[  140.895678]  dump_stack_lvl+0x54/0x6c
[  140.896986]  print_address_description+0x7c/0x20c
[  140.898641]  print_report+0x50/0x68
[  140.899954]  kasan_report+0xac/0x100
[  140.901155]  __asan_load1+0x6c/0x70
[  140.902480]  strnlen+0x3c/0x74
[  140.903635]  kasan_strings+0x234/0x404
[  140.904909]  kunit_try_run_case+0x80/0x184
[  140.906386]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.908128]  kthread+0x16c/0x21c
[  140.909309]  ret_from_fork+0x10/0x20
[  140.910502] 
[  140.911133] Allocated by task 164:
[  140.912115]  kasan_set_track+0x4c/0x80
[  140.914372]  kasan_save_alloc_info+0x28/0x34
[  140.915611]  __kasan_kmalloc+0x88/0xa0
[  140.916842]  kmalloc_trace+0x54/0x68
[  140.918058]  kasan_strings+0x48/0x404
[  140.919221]  kunit_try_run_case+0x80/0x184
[  140.920447]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.921904]  kthread+0x16c/0x21c
[  140.923200]  ret_from_fork+0x10/0x20
[  140.924236] 
[  140.924896] Freed by task 164:
[  140.925743]  kasan_set_track+0x4c/0x80
[  140.926972]  kasan_save_free_info+0x3c/0x60
[  140.928229]  ____kasan_slab_free+0xe8/0x140
[  140.929550]  __kasan_slab_free+0x18/0x28
[  140.930852]  __kmem_cache_free+0xdc/0x284
[  140.932175]  kfree+0x60/0x74
[  140.933265]  kasan_strings+0x90/0x404
[  140.934463]  kunit_try_run_case+0x80/0x184
[  140.935769]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.937298]  kthread+0x16c/0x21c
[  140.939233]  ret_from_fork+0x10/0x20
[  140.940333] 
[  140.940886] The buggy address belongs to the object at ffff0000c5942400
[  140.940886]  which belongs to the cache kmalloc-128 of size 128
[  140.943061] The buggy address is located 16 bytes inside of
[  140.943061]  128-byte region [ffff0000c5942400, ffff0000c5942480)
[  140.945204] 
[  140.946616] The buggy address belongs to the physical page:
[  140.947849] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.949755] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.951496] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.953491] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.955716] page dumped because: kasan: bad access detected
[  140.956918] 
[  140.957531] Memory state around the buggy address:
[  140.958713]  ffff0000c5942300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  140.960483]  ffff0000c5942380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.962376] >ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.963841]                          ^
[  140.964873]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.966405]  ffff0000c5942500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.967897] ==================================================================

test log snippet boot parser 127

Home

[  140.536206] ==================================================================
[  140.537995] BUG: KASAN: use-after-free in strrchr+0x34/0x68
[  140.539351] Read of size 1 at addr ffff0000c5942410 by task kunit_try_catch/164
[  140.541739] 
[  140.542275] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  140.544143] Hardware name: linux,dummy-virt (DT)
[  140.545278] Call trace:
[  140.546505]  dump_backtrace+0xf8/0x118
[  140.547907]  show_stack+0x18/0x24
[  140.549046]  __dump_stack+0x28/0x38
[  140.550425]  dump_stack_lvl+0x54/0x6c
[  140.552010]  print_address_description+0x7c/0x20c
[  140.553498]  print_report+0x50/0x68
[  140.554704]  kasan_report+0xac/0x100
[  140.556298]  __asan_load1+0x6c/0x70
[  140.557529]  strrchr+0x34/0x68
[  140.558656]  kasan_strings+0xf8/0x404
[  140.560148]  kunit_try_run_case+0x80/0x184
[  140.561216]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.562594]  kthread+0x16c/0x21c
[  140.564168]  ret_from_fork+0x10/0x20
[  140.565103] 
[  140.565722] Allocated by task 164:
[  140.566721]  kasan_set_track+0x4c/0x80
[  140.567971]  kasan_save_alloc_info+0x28/0x34
[  140.569267]  __kasan_kmalloc+0x88/0xa0
[  140.570758]  kmalloc_trace+0x54/0x68
[  140.572016]  kasan_strings+0x48/0x404
[  140.573089]  kunit_try_run_case+0x80/0x184
[  140.574070]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.575596]  kthread+0x16c/0x21c
[  140.576780]  ret_from_fork+0x10/0x20
[  140.577888] 
[  140.578684] Freed by task 164:
[  140.579626]  kasan_set_track+0x4c/0x80
[  140.580862]  kasan_save_free_info+0x3c/0x60
[  140.582213]  ____kasan_slab_free+0xe8/0x140
[  140.584488]  __kasan_slab_free+0x18/0x28
[  140.585654]  __kmem_cache_free+0xdc/0x284
[  140.586970]  kfree+0x60/0x74
[  140.588137]  kasan_strings+0x90/0x404
[  140.589385]  kunit_try_run_case+0x80/0x184
[  140.590654]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  140.592220]  kthread+0x16c/0x21c
[  140.593750]  ret_from_fork+0x10/0x20
[  140.595000] 
[  140.595567] The buggy address belongs to the object at ffff0000c5942400
[  140.595567]  which belongs to the cache kmalloc-128 of size 128
[  140.598281] The buggy address is located 16 bytes inside of
[  140.598281]  128-byte region [ffff0000c5942400, ffff0000c5942480)
[  140.600629] 
[  140.601373] The buggy address belongs to the physical page:
[  140.602702] page:000000003414f261 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[  140.605159] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  140.606975] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  140.609272] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  140.610783] page dumped because: kasan: bad access detected
[  140.612612] 
[  140.613334] Memory state around the buggy address:
[  140.614698]  ffff0000c5942300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  140.616217]  ffff0000c5942380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.617664] >ffff0000c5942400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.619248]                          ^
[  140.620426]  ffff0000c5942480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.622774]  ffff0000c5942500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.624188] ==================================================================

test log snippet boot parser 128

Home

[  142.596866] ==================================================================
[  142.598297] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c
[  142.599811] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[  142.601819] 
[  142.602897] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.604703] Hardware name: linux,dummy-virt (DT)
[  142.605834] Call trace:
[  142.606632]  dump_backtrace+0xf8/0x118
[  142.607905]  show_stack+0x18/0x24
[  142.609211]  __dump_stack+0x28/0x38
[  142.610490]  dump_stack_lvl+0x54/0x6c
[  142.611711]  print_address_description+0x7c/0x20c
[  142.613150]  print_report+0x50/0x68
[  142.614392]  kasan_report+0xac/0x100
[  142.615586]  __asan_load1+0x6c/0x70
[  142.616802]  vmalloc_oob+0xe4/0x25c
[  142.618080]  kunit_try_run_case+0x80/0x184
[  142.619608]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.621130]  kthread+0x16c/0x21c
[  142.622319]  ret_from_fork+0x10/0x20
[  142.623515] 
[  142.624267] The buggy address belongs to the virtual mapping at
[  142.624267]  [ffff8000080fb000, ffff8000080fd000) created by:
[  142.624267]  vmalloc_oob+0x30/0x25c
[  142.627014] 
[  142.627686] The buggy address belongs to the physical page:
[  142.629351] page:00000000834021ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3f
[  142.631216] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  142.633038] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  142.634733] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  142.636231] page dumped because: kasan: bad access detected
[  142.637449] 
[  142.638093] Memory state around the buggy address:
[  142.639282]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  142.641048]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  142.643055] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  142.644588]                                                                 ^
[  142.646096]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  142.647705]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  142.649445] ==================================================================

test log snippet boot parser 129

Home

[  142.539312] ==================================================================
[  142.541777] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c
[  142.543412] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[  142.545045] 
[  142.546082] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  142.547927] Hardware name: linux,dummy-virt (DT)
[  142.548636] Call trace:
[  142.549174]  dump_backtrace+0xf8/0x118
[  142.550693]  show_stack+0x18/0x24
[  142.551920]  __dump_stack+0x28/0x38
[  142.553245]  dump_stack_lvl+0x54/0x6c
[  142.554511]  print_address_description+0x7c/0x20c
[  142.556151]  print_report+0x50/0x68
[  142.557234]  kasan_report+0xac/0x100
[  142.558471]  __asan_load1+0x6c/0x70
[  142.559737]  vmalloc_oob+0x9c/0x25c
[  142.561324]  kunit_try_run_case+0x80/0x184
[  142.562620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[  142.564501]  kthread+0x16c/0x21c
[  142.565648]  ret_from_fork+0x10/0x20
[  142.566851] 
[  142.567453] The buggy address belongs to the virtual mapping at
[  142.567453]  [ffff8000080fb000, ffff8000080fd000) created by:
[  142.567453]  vmalloc_oob+0x30/0x25c
[  142.570704] 
[  142.571149] The buggy address belongs to the physical page:
[  142.572577] page:00000000834021ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3f
[  142.574522] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  142.576418] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  142.578073] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  142.579706] page dumped because: kasan: bad access detected
[  142.581314] 
[  142.582002] Memory state around the buggy address:
[  142.583190]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  142.585015]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  142.586697] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  142.588405]                                                              ^
[  142.590007]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  142.591569]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  142.593309] ==================================================================

test log snippet boot parser 130

Home

[  128.988167] ==================================================================
[  128.989844] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x100/0x1dc
[  128.991649] Read of size 1 at addr ffff800008577cbf by task kunit_try_catch/155
[  128.992426] 
[  128.992957] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.994533] Hardware name: linux,dummy-virt (DT)
[  128.995510] Call trace:
[  128.996060]  dump_backtrace.part.0+0xdc/0xf0
[  128.997298]  show_stack+0x18/0x30
[  128.998252]  dump_stack_lvl+0x64/0x80
[  128.999417]  print_report+0x158/0x458
[  129.000014]  kasan_report+0xb4/0xf4
[  129.000544]  __asan_load1+0x68/0x74
[  129.001191]  kasan_alloca_oob_left+0x100/0x1dc
[  129.002452]  kunit_try_run_case+0x84/0x120
[  129.003799]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.005053]  kthread+0x180/0x190
[  129.005956]  ret_from_fork+0x10/0x20
[  129.006917] 
[  129.007319] The buggy address belongs to stack of task kunit_try_catch/155
[  129.008835] 
[  129.009265] The buggy address belongs to the virtual mapping at
[  129.009265]  [ffff800008570000, ffff800008579000) created by:
[  129.009265]  kernel_clone+0xb4/0x470
[  129.011832] 
[  129.012366] The buggy address belongs to the physical page:
[  129.013343] page:00000000878dfd50 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105852
[  129.014895] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  129.016400] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  129.017817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  129.019333] page dumped because: kasan: bad access detected
[  129.020285] 
[  129.020652] Memory state around the buggy address:
[  129.021684]  ffff800008577b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.023020]  ffff800008577c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.024399] >ffff800008577c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  129.025732]                                         ^
[  129.026767]  ffff800008577d00: 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00
[  129.028370]  ffff800008577d80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.029638] ==================================================================

test log snippet boot parser 131

Home

[  129.038530] ==================================================================
[  129.040346] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x10c/0x1f4
[  129.042002] Read of size 1 at addr ffff800008787cca by task kunit_try_catch/156
[  129.043327] 
[  129.043899] CPU: 1 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.045389] Hardware name: linux,dummy-virt (DT)
[  129.046309] Call trace:
[  129.046996]  dump_backtrace.part.0+0xdc/0xf0
[  129.048354]  show_stack+0x18/0x30
[  129.049336]  dump_stack_lvl+0x64/0x80
[  129.050372]  print_report+0x158/0x458
[  129.051651]  kasan_report+0xb4/0xf4
[  129.052556]  __asan_load1+0x68/0x74
[  129.053513]  kasan_alloca_oob_right+0x10c/0x1f4
[  129.054655]  kunit_try_run_case+0x84/0x120
[  129.055915]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.057164]  kthread+0x180/0x190
[  129.058072]  ret_from_fork+0x10/0x20
[  129.058996] 
[  129.059886] The buggy address belongs to stack of task kunit_try_catch/156
[  129.060961] 
[  129.061520] The buggy address belongs to the virtual mapping at
[  129.061520]  [ffff800008780000, ffff800008789000) created by:
[  129.061520]  kernel_clone+0xb4/0x470
[  129.064190] 
[  129.064686] The buggy address belongs to the physical page:
[  129.066085] page:000000001e8e1cc3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059dc
[  129.067841] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  129.069214] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  129.070591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  129.072058] page dumped because: kasan: bad access detected
[  129.073119] 
[  129.073591] Memory state around the buggy address:
[  129.074539]  ffff800008787b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.076079]  ffff800008787c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.077420] >ffff800008787c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  129.078670]                                               ^
[  129.080268]  ffff800008787d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3
[  129.081671]  ffff800008787d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.082971] ==================================================================

test log snippet boot parser 132

Home

[  131.474294] ==================================================================
[  131.475649] BUG: KASAN: double-free in kfree+0x58/0x80
[  131.476967] Free of addr ffff0000c5a2e600 by task kunit_try_catch/167
[  131.478575] 
[  131.479684] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.481331] Hardware name: linux,dummy-virt (DT)
[  131.482238] Call trace:
[  131.482937]  dump_backtrace.part.0+0xdc/0xf0
[  131.484291]  show_stack+0x18/0x30
[  131.485468]  dump_stack_lvl+0x64/0x80
[  131.486491]  print_report+0x158/0x458
[  131.487543]  kasan_report_invalid_free+0x9c/0xc0
[  131.488664]  __kasan_slab_free+0x118/0x150
[  131.489798]  __kmem_cache_free+0x130/0x2a4
[  131.490911]  kfree+0x58/0x80
[  131.492248]  kfree_sensitive+0x24/0x5c
[  131.493273]  kmalloc_double_kzfree+0xc4/0x1d0
[  131.494386]  kunit_try_run_case+0x84/0x120
[  131.495500]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.496689]  kthread+0x180/0x190
[  131.497962]  ret_from_fork+0x10/0x20
[  131.498939] 
[  131.499776] Allocated by task 167:
[  131.500583]  kasan_save_stack+0x3c/0x70
[  131.501576]  kasan_set_track+0x2c/0x40
[  131.502518]  kasan_save_alloc_info+0x24/0x34
[  131.503679]  __kasan_kmalloc+0xb8/0xc0
[  131.504978]  kmalloc_trace+0x58/0x6c
[  131.506075]  kmalloc_double_kzfree+0x94/0x1d0
[  131.507348]  kunit_try_run_case+0x84/0x120
[  131.508517]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.509829]  kthread+0x180/0x190
[  131.510692]  ret_from_fork+0x10/0x20
[  131.512054] 
[  131.512588] Freed by task 167:
[  131.513357]  kasan_save_stack+0x3c/0x70
[  131.514376]  kasan_set_track+0x2c/0x40
[  131.515506]  kasan_save_free_info+0x38/0x5c
[  131.516594]  __kasan_slab_free+0xe4/0x150
[  131.517598]  __kmem_cache_free+0x130/0x2a4
[  131.518755]  kfree+0x58/0x80
[  131.519630]  kfree_sensitive+0x4c/0x5c
[  131.520694]  kmalloc_double_kzfree+0xb4/0x1d0
[  131.521940]  kunit_try_run_case+0x84/0x120
[  131.523238]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.524575]  kthread+0x180/0x190
[  131.525213]  ret_from_fork+0x10/0x20
[  131.526281] 
[  131.526835] The buggy address belongs to the object at ffff0000c5a2e600
[  131.526835]  which belongs to the cache kmalloc-128 of size 128
[  131.529290] The buggy address is located 0 bytes inside of
[  131.529290]  128-byte region [ffff0000c5a2e600, ffff0000c5a2e680)
[  131.531157] 
[  131.531618] The buggy address belongs to the physical page:
[  131.532629] page:0000000072979028 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2e
[  131.534655] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.536761] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.538079] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.539705] page dumped because: kasan: bad access detected
[  131.540856] 
[  131.541458] Memory state around the buggy address:
[  131.542569]  ffff0000c5a2e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.544141]  ffff0000c5a2e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.545389] >ffff0000c5a2e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.546606]                    ^
[  131.547733]  ffff0000c5a2e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.549219]  ffff0000c5a2e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.550594] ==================================================================

test log snippet boot parser 133

Home

[  129.381362] ==================================================================
[  129.382987] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x244
[  129.384319] Free of addr ffff0000c590c000 by task kunit_try_catch/159
[  129.385532] 
[  129.386079] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.387755] Hardware name: linux,dummy-virt (DT)
[  129.388724] Call trace:
[  129.389298]  dump_backtrace.part.0+0xdc/0xf0
[  129.391060]  show_stack+0x18/0x30
[  129.392110]  dump_stack_lvl+0x64/0x80
[  129.393201]  print_report+0x158/0x458
[  129.394180]  kasan_report_invalid_free+0x9c/0xc0
[  129.395245]  __kasan_slab_free+0x118/0x150
[  129.396231]  kmem_cache_free+0x1b8/0x38c
[  129.397290]  kmem_cache_double_free+0xe4/0x244
[  129.398437]  kunit_try_run_case+0x84/0x120
[  129.399509]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.400727]  kthread+0x180/0x190
[  129.401612]  ret_from_fork+0x10/0x20
[  129.402549] 
[  129.402984] Allocated by task 159:
[  129.403763]  kasan_save_stack+0x3c/0x70
[  129.404752]  kasan_set_track+0x2c/0x40
[  129.405694]  kasan_save_alloc_info+0x24/0x34
[  129.406770]  __kasan_slab_alloc+0x8c/0x90
[  129.407767]  kmem_cache_alloc+0x170/0x2d0
[  129.408869]  kmem_cache_double_free+0xb4/0x244
[  129.409987]  kunit_try_run_case+0x84/0x120
[  129.411038]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.412316]  kthread+0x180/0x190
[  129.413813]  ret_from_fork+0x10/0x20
[  129.414785] 
[  129.415275] Freed by task 159:
[  129.416020]  kasan_save_stack+0x3c/0x70
[  129.417014]  kasan_set_track+0x2c/0x40
[  129.417970]  kasan_save_free_info+0x38/0x5c
[  129.418999]  __kasan_slab_free+0xe4/0x150
[  129.420008]  kmem_cache_free+0x1b8/0x38c
[  129.421177]  kmem_cache_double_free+0xd0/0x244
[  129.422253]  kunit_try_run_case+0x84/0x120
[  129.423366]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.424605]  kthread+0x180/0x190
[  129.425534]  ret_from_fork+0x10/0x20
[  129.426511] 
[  129.426901] The buggy address belongs to the object at ffff0000c590c000
[  129.426901]  which belongs to the cache test_cache of size 200
[  129.428817] The buggy address is located 0 bytes inside of
[  129.428817]  200-byte region [ffff0000c590c000, ffff0000c590c0c8)
[  129.430691] 
[  129.431222] The buggy address belongs to the physical page:
[  129.432270] page:00000000fd6ab0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590c
[  129.433814] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.435461] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c140d800
[  129.437697] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  129.438926] page dumped because: kasan: bad access detected
[  129.439976] 
[  129.440443] Memory state around the buggy address:
[  129.441451]  ffff0000c590bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.442782]  ffff0000c590bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.444139] >ffff0000c590c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.445336]                    ^
[  129.446106]  ffff0000c590c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  129.447444]  ffff0000c590c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.448716] ==================================================================

test log snippet boot parser 134

Home

[  128.868106] ==================================================================
[  128.870053] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[  128.871570] Read of size 1 at addr ffffc1212f393ead by task kunit_try_catch/152
[  128.872693] 
[  128.873262] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.874709] Hardware name: linux,dummy-virt (DT)
[  128.875818] Call trace:
[  128.876878]  dump_backtrace.part.0+0xdc/0xf0
[  128.878191]  show_stack+0x18/0x30
[  128.879179]  dump_stack_lvl+0x64/0x80
[  128.880253]  print_report+0x158/0x458
[  128.881172]  kasan_report+0xb4/0xf4
[  128.882062]  __asan_load1+0x68/0x74
[  128.882974]  kasan_global_oob_right+0xa0/0x150
[  128.884222]  kunit_try_run_case+0x84/0x120
[  128.885743]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.887094]  kthread+0x180/0x190
[  128.888063]  ret_from_fork+0x10/0x20
[  128.889077] 
[  128.889615] The buggy address belongs to the variable:
[  128.890640]  global_array+0xd/0x40
[  128.892245] 
[  128.893008] The buggy address belongs to the virtual mapping at
[  128.893008]  [ffffc1212e1b0000, ffffc1212f411000) created by:
[  128.893008]  paging_init+0x284/0x744
[  128.895399] 
[  128.896217] The buggy address belongs to the physical page:
[  128.897220] page:000000008b50174e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45593
[  128.898984] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  128.900686] raw: 03fffc0000001000 fffffc00001564c8 fffffc00001564c8 0000000000000000
[  128.902198] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  128.903728] page dumped because: kasan: bad access detected
[  128.904806] 
[  128.905376] Memory state around the buggy address:
[  128.906455]  ffffc1212f393d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.907872]  ffffc1212f393e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.909486] >ffffc1212f393e80: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[  128.910828]                                   ^
[  128.911820]  ffffc1212f393f00: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[  128.913176]  ffffc1212f393f80: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[  128.914377] ==================================================================

test log snippet boot parser 135

Home

[  126.224815] ==================================================================
[  126.226537] BUG: KASAN: invalid-free in kfree+0x74/0x80
[  126.227749] Free of addr ffff0000c5a1c001 by task kunit_try_catch/125
[  126.228981] 
[  126.229547] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.231457] Hardware name: linux,dummy-virt (DT)
[  126.232304] Call trace:
[  126.232898]  dump_backtrace.part.0+0xdc/0xf0
[  126.234071]  show_stack+0x18/0x30
[  126.235089]  dump_stack_lvl+0x64/0x80
[  126.236164]  print_report+0x158/0x458
[  126.237160]  kasan_report_invalid_free+0x9c/0xc0
[  126.238217]  __kasan_kfree_large+0x54/0xa0
[  126.239336]  free_large_kmalloc+0x5c/0xf0
[  126.240350]  kfree+0x74/0x80
[  126.241294]  kmalloc_pagealloc_invalid_free+0xa0/0x1b0
[  126.242499]  kunit_try_run_case+0x84/0x120
[  126.243642]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.244929]  kthread+0x180/0x190
[  126.245797]  ret_from_fork+0x10/0x20
[  126.246714] 
[  126.247421] The buggy address belongs to the physical page:
[  126.248483] page:000000003086e8c1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1c
[  126.250486] head:000000003086e8c1 order:2 compound_mapcount:0 compound_pincount:0
[  126.251723] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.253134] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.254424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.255813] page dumped because: kasan: bad access detected
[  126.256853] 
[  126.257369] Memory state around the buggy address:
[  126.258343]  ffff0000c5a1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.259591]  ffff0000c5a1bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.261053] >ffff0000c5a1c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.262282]                    ^
[  126.263078]  ffff0000c5a1c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.264377]  ffff0000c5a1c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.265636] ==================================================================

test log snippet boot parser 136

Home

[  129.474759] ==================================================================
[  129.477029] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x230
[  129.478485] Free of addr ffff0000c59ef001 by task kunit_try_catch/160
[  129.480076] 
[  129.480607] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.482097] Hardware name: linux,dummy-virt (DT)
[  129.482934] Call trace:
[  129.483606]  dump_backtrace.part.0+0xdc/0xf0
[  129.484974]  show_stack+0x18/0x30
[  129.486159]  dump_stack_lvl+0x64/0x80
[  129.487484]  print_report+0x158/0x458
[  129.488585]  kasan_report_invalid_free+0x9c/0xc0
[  129.489698]  __kasan_slab_free+0x140/0x150
[  129.490705]  kmem_cache_free+0x1b8/0x38c
[  129.491870]  kmem_cache_invalid_free+0xd8/0x230
[  129.492770]  kunit_try_run_case+0x84/0x120
[  129.493871]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.495355]  kthread+0x180/0x190
[  129.496281]  ret_from_fork+0x10/0x20
[  129.497344] 
[  129.497866] Allocated by task 160:
[  129.498663]  kasan_save_stack+0x3c/0x70
[  129.500099]  kasan_set_track+0x2c/0x40
[  129.500997]  kasan_save_alloc_info+0x24/0x34
[  129.502070]  __kasan_slab_alloc+0x8c/0x90
[  129.503097]  kmem_cache_alloc+0x170/0x2d0
[  129.504558]  kmem_cache_invalid_free+0xb4/0x230
[  129.505681]  kunit_try_run_case+0x84/0x120
[  129.506687]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.507989]  kthread+0x180/0x190
[  129.508913]  ret_from_fork+0x10/0x20
[  129.510021] 
[  129.510587] The buggy address belongs to the object at ffff0000c59ef000
[  129.510587]  which belongs to the cache test_cache of size 200
[  129.513095] The buggy address is located 1 bytes inside of
[  129.513095]  200-byte region [ffff0000c59ef000, ffff0000c59ef0c8)
[  129.514901] 
[  129.515437] The buggy address belongs to the physical page:
[  129.516997] page:0000000017a1e9ed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef
[  129.518589] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.520469] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c140d980
[  129.521925] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  129.523274] page dumped because: kasan: bad access detected
[  129.525074] 
[  129.525588] Memory state around the buggy address:
[  129.526500]  ffff0000c59eef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  129.528229]  ffff0000c59eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  129.529559] >ffff0000c59ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.530811]                    ^
[  129.531784]  ffff0000c59ef080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  129.533500]  ffff0000c59ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.534790] ==================================================================

test log snippet boot parser 137

Home

[  127.810296] ==================================================================
[  127.812218] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xdc/0x1f0
[  127.813662] Read of size 18446744073709551614 at addr ffff0000c5958504 by task kunit_try_catch/141
[  127.815287] 
[  127.815842] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.817238] Hardware name: linux,dummy-virt (DT)
[  127.818066] Call trace:
[  127.818712]  dump_backtrace.part.0+0xdc/0xf0
[  127.819848]  show_stack+0x18/0x30
[  127.820807]  dump_stack_lvl+0x64/0x80
[  127.821814]  print_report+0x158/0x458
[  127.822785]  kasan_report+0xb4/0xf4
[  127.823689]  kasan_check_range+0xe4/0x190
[  127.824679]  memmove+0x44/0xc0
[  127.825595]  kmalloc_memmove_negative_size+0xdc/0x1f0
[  127.826786]  kunit_try_run_case+0x84/0x120
[  127.827796]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.829027]  kthread+0x180/0x190
[  127.829838]  ret_from_fork+0x10/0x20
[  127.830746] 
[  127.831231] Allocated by task 141:
[  127.832013]  kasan_save_stack+0x3c/0x70
[  127.832998]  kasan_set_track+0x2c/0x40
[  127.833911]  kasan_save_alloc_info+0x24/0x34
[  127.834983]  __kasan_kmalloc+0xb8/0xc0
[  127.835920]  kmalloc_trace+0x58/0x6c
[  127.836882]  kmalloc_memmove_negative_size+0x98/0x1f0
[  127.838090]  kunit_try_run_case+0x84/0x120
[  127.839120]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.840369]  kthread+0x180/0x190
[  127.841418]  ret_from_fork+0x10/0x20
[  127.842448] 
[  127.843054] The buggy address belongs to the object at ffff0000c5958500
[  127.843054]  which belongs to the cache kmalloc-128 of size 128
[  127.844988] The buggy address is located 4 bytes inside of
[  127.844988]  128-byte region [ffff0000c5958500, ffff0000c5958580)
[  127.846808] 
[  127.847323] The buggy address belongs to the physical page:
[  127.848390] page:000000002d103547 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[  127.849905] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.851346] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.852801] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.854101] page dumped because: kasan: bad access detected
[  127.855053] 
[  127.855535] Memory state around the buggy address:
[  127.856482]  ffff0000c5958400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.857779]  ffff0000c5958480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.859144] >ffff0000c5958500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  127.860376]                    ^
[  127.861184]  ffff0000c5958580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.862635]  ffff0000c5958600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.863900] ==================================================================

test log snippet boot parser 138

Home

[  130.469014] ==================================================================
[  130.470253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x148/0x684
[  130.472181] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.473661] 
[  130.474361] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.476990] Hardware name: linux,dummy-virt (DT)
[  130.477953] Call trace:
[  130.478579]  dump_backtrace.part.0+0xdc/0xf0
[  130.479926]  show_stack+0x18/0x30
[  130.481084]  dump_stack_lvl+0x64/0x80
[  130.482124]  print_report+0x158/0x458
[  130.483201]  kasan_report+0xb4/0xf4
[  130.484206]  kasan_check_range+0xe4/0x190
[  130.485311]  __kasan_check_write+0x28/0x3c
[  130.486358]  kasan_bitops_modify.constprop.0+0x148/0x684
[  130.487593]  kasan_bitops_generic+0xac/0x13c
[  130.488944]  kunit_try_run_case+0x84/0x120
[  130.489888]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.490723]  kthread+0x180/0x190
[  130.492105]  ret_from_fork+0x10/0x20
[  130.493070] 
[  130.493624] Allocated by task 165:
[  130.494438]  kasan_save_stack+0x3c/0x70
[  130.495389]  kasan_set_track+0x2c/0x40
[  130.496486]  kasan_save_alloc_info+0x24/0x34
[  130.497691]  __kasan_kmalloc+0xb8/0xc0
[  130.498725]  kmalloc_trace+0x58/0x6c
[  130.499841]  kasan_bitops_generic+0x90/0x13c
[  130.501063]  kunit_try_run_case+0x84/0x120
[  130.502137]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.503445]  kthread+0x180/0x190
[  130.504308]  ret_from_fork+0x10/0x20
[  130.505112] 
[  130.505703] The buggy address belongs to the object at ffff0000c5968200
[  130.505703]  which belongs to the cache kmalloc-128 of size 128
[  130.507723] The buggy address is located 8 bytes inside of
[  130.507723]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.509635] 
[  130.510600] The buggy address belongs to the physical page:
[  130.511723] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.513596] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.515090] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.516631] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.518007] page dumped because: kasan: bad access detected
[  130.519039] 
[  130.519801] Memory state around the buggy address:
[  130.520871]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.522244]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.523829] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.525327]                       ^
[  130.526227]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.527540]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.529105] ==================================================================
---
[  130.223956] ==================================================================
[  130.225543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x684
[  130.227083] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.229130] 
[  130.229710] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.231399] Hardware name: linux,dummy-virt (DT)
[  130.232393] Call trace:
[  130.233110]  dump_backtrace.part.0+0xdc/0xf0
[  130.234235]  show_stack+0x18/0x30
[  130.235296]  dump_stack_lvl+0x64/0x80
[  130.236131]  print_report+0x158/0x458
[  130.236841]  kasan_report+0xb4/0xf4
[  130.237533]  kasan_check_range+0xe4/0x190
[  130.238672]  __kasan_check_write+0x28/0x3c
[  130.239843]  kasan_bitops_modify.constprop.0+0x9c/0x684
[  130.241283]  kasan_bitops_generic+0xac/0x13c
[  130.242359]  kunit_try_run_case+0x84/0x120
[  130.243806]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.245041]  kthread+0x180/0x190
[  130.245908]  ret_from_fork+0x10/0x20
[  130.246933] 
[  130.247719] Allocated by task 165:
[  130.248715]  kasan_save_stack+0x3c/0x70
[  130.249666]  kasan_set_track+0x2c/0x40
[  130.250663]  kasan_save_alloc_info+0x24/0x34
[  130.252122]  __kasan_kmalloc+0xb8/0xc0
[  130.253053]  kmalloc_trace+0x58/0x6c
[  130.253983]  kasan_bitops_generic+0x90/0x13c
[  130.255144]  kunit_try_run_case+0x84/0x120
[  130.256241]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.257575]  kthread+0x180/0x190
[  130.258488]  ret_from_fork+0x10/0x20
[  130.259493] 
[  130.260025] The buggy address belongs to the object at ffff0000c5968200
[  130.260025]  which belongs to the cache kmalloc-128 of size 128
[  130.262117] The buggy address is located 8 bytes inside of
[  130.262117]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.264388] 
[  130.264930] The buggy address belongs to the physical page:
[  130.266198] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.267785] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.269592] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.271308] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.272733] page dumped because: kasan: bad access detected
[  130.273752] 
[  130.274341] Memory state around the buggy address:
[  130.275453]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.276896]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.278304] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.279843]                       ^
[  130.280773]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.282069]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.283413] ==================================================================
---
[  130.708476] ==================================================================
[  130.709692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1bc/0x684
[  130.711026] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.712074] 
[  130.713106] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.714563] Hardware name: linux,dummy-virt (DT)
[  130.715466] Call trace:
[  130.716051]  dump_backtrace.part.0+0xdc/0xf0
[  130.717150]  show_stack+0x18/0x30
[  130.718167]  dump_stack_lvl+0x64/0x80
[  130.719182]  print_report+0x158/0x458
[  130.720086]  kasan_report+0xb4/0xf4
[  130.721014]  kasan_check_range+0xe4/0x190
[  130.722037]  __kasan_check_write+0x28/0x3c
[  130.723091]  kasan_bitops_modify.constprop.0+0x1bc/0x684
[  130.724301]  kasan_bitops_generic+0xac/0x13c
[  130.725420]  kunit_try_run_case+0x84/0x120
[  130.726449]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.727720]  kthread+0x180/0x190
[  130.728611]  ret_from_fork+0x10/0x20
[  130.729578] 
[  130.730054] Allocated by task 165:
[  130.730877]  kasan_save_stack+0x3c/0x70
[  130.731856]  kasan_set_track+0x2c/0x40
[  130.732840]  kasan_save_alloc_info+0x24/0x34
[  130.733913]  __kasan_kmalloc+0xb8/0xc0
[  130.734886]  kmalloc_trace+0x58/0x6c
[  130.735832]  kasan_bitops_generic+0x90/0x13c
[  130.736994]  kunit_try_run_case+0x84/0x120
[  130.738043]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.739240]  kthread+0x180/0x190
[  130.740150]  ret_from_fork+0x10/0x20
[  130.741067] 
[  130.741569] The buggy address belongs to the object at ffff0000c5968200
[  130.741569]  which belongs to the cache kmalloc-128 of size 128
[  130.743495] The buggy address is located 8 bytes inside of
[  130.743495]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.745389] 
[  130.745925] The buggy address belongs to the physical page:
[  130.746927] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.748450] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.749808] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.751319] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.752602] page dumped because: kasan: bad access detected
[  130.753610] 
[  130.754117] Memory state around the buggy address:
[  130.755065]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.756421]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.757745] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.758997]                       ^
[  130.759839]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.761197]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.762479] ==================================================================
---
[  130.348380] ==================================================================
[  130.350068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf0/0x684
[  130.351862] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.353327] 
[  130.353922] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.355576] Hardware name: linux,dummy-virt (DT)
[  130.356550] Call trace:
[  130.357188]  dump_backtrace.part.0+0xdc/0xf0
[  130.358340]  show_stack+0x18/0x30
[  130.359335]  dump_stack_lvl+0x64/0x80
[  130.360373]  print_report+0x158/0x458
[  130.361337]  kasan_report+0xb4/0xf4
[  130.362315]  kasan_check_range+0xe4/0x190
[  130.363318]  __kasan_check_write+0x28/0x3c
[  130.364419]  kasan_bitops_modify.constprop.0+0xf0/0x684
[  130.365652]  kasan_bitops_generic+0xac/0x13c
[  130.366754]  kunit_try_run_case+0x84/0x120
[  130.367860]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.369088]  kthread+0x180/0x190
[  130.369990]  ret_from_fork+0x10/0x20
[  130.370964] 
[  130.371422] Allocated by task 165:
[  130.372163]  kasan_save_stack+0x3c/0x70
[  130.373156]  kasan_set_track+0x2c/0x40
[  130.374068]  kasan_save_alloc_info+0x24/0x34
[  130.375107]  __kasan_kmalloc+0xb8/0xc0
[  130.376022]  kmalloc_trace+0x58/0x6c
[  130.377032]  kasan_bitops_generic+0x90/0x13c
[  130.378147]  kunit_try_run_case+0x84/0x120
[  130.379163]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.380416]  kthread+0x180/0x190
[  130.381310]  ret_from_fork+0x10/0x20
[  130.382259] 
[  130.382805] The buggy address belongs to the object at ffff0000c5968200
[  130.382805]  which belongs to the cache kmalloc-128 of size 128
[  130.384742] The buggy address is located 8 bytes inside of
[  130.384742]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.386623] 
[  130.387179] The buggy address belongs to the physical page:
[  130.388229] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.389821] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.391302] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.392736] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.394114] page dumped because: kasan: bad access detected
[  130.395132] 
[  130.395540] Memory state around the buggy address:
[  130.396628]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.397965]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.399202] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.400502]                       ^
[  130.401400]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.402756]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.403954] ==================================================================
---
[  130.531479] ==================================================================
[  130.532707] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x178/0x684
[  130.534732] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.536471] 
[  130.536975] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.538831] Hardware name: linux,dummy-virt (DT)
[  130.539807] Call trace:
[  130.540766]  dump_backtrace.part.0+0xdc/0xf0
[  130.542007]  show_stack+0x18/0x30
[  130.543035]  dump_stack_lvl+0x64/0x80
[  130.544129]  print_report+0x158/0x458
[  130.545167]  kasan_report+0xb4/0xf4
[  130.546209]  kasan_check_range+0xe4/0x190
[  130.547451]  __kasan_check_write+0x28/0x3c
[  130.548728]  kasan_bitops_modify.constprop.0+0x178/0x684
[  130.550105]  kasan_bitops_generic+0xac/0x13c
[  130.551242]  kunit_try_run_case+0x84/0x120
[  130.552423]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.554189]  kthread+0x180/0x190
[  130.555183]  ret_from_fork+0x10/0x20
[  130.556352] 
[  130.556942] Allocated by task 165:
[  130.557765]  kasan_save_stack+0x3c/0x70
[  130.558703]  kasan_set_track+0x2c/0x40
[  130.559860]  kasan_save_alloc_info+0x24/0x34
[  130.561040]  __kasan_kmalloc+0xb8/0xc0
[  130.562313]  kmalloc_trace+0x58/0x6c
[  130.563290]  kasan_bitops_generic+0x90/0x13c
[  130.564813]  kunit_try_run_case+0x84/0x120
[  130.565921]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.567155]  kthread+0x180/0x190
[  130.567992]  ret_from_fork+0x10/0x20
[  130.568958] 
[  130.570003] The buggy address belongs to the object at ffff0000c5968200
[  130.570003]  which belongs to the cache kmalloc-128 of size 128
[  130.572298] The buggy address is located 8 bytes inside of
[  130.572298]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.574276] 
[  130.574826] The buggy address belongs to the physical page:
[  130.576245] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.577941] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.579750] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.581244] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.582532] page dumped because: kasan: bad access detected
[  130.583636] 
[  130.584146] Memory state around the buggy address:
[  130.585179]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.586862]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.588526] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.590019]                       ^
[  130.591271]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.592547]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.593764] ==================================================================
---
[  130.652042] ==================================================================
[  130.653547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x190/0x684
[  130.655080] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.656500] 
[  130.657053] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.658573] Hardware name: linux,dummy-virt (DT)
[  130.659474] Call trace:
[  130.660093]  dump_backtrace.part.0+0xdc/0xf0
[  130.661201]  show_stack+0x18/0x30
[  130.662214]  dump_stack_lvl+0x64/0x80
[  130.663231]  print_report+0x158/0x458
[  130.664156]  kasan_report+0xb4/0xf4
[  130.665048]  kasan_check_range+0xe4/0x190
[  130.666071]  __kasan_check_write+0x28/0x3c
[  130.667113]  kasan_bitops_modify.constprop.0+0x190/0x684
[  130.668340]  kasan_bitops_generic+0xac/0x13c
[  130.669422]  kunit_try_run_case+0x84/0x120
[  130.670463]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.671738]  kthread+0x180/0x190
[  130.672648]  ret_from_fork+0x10/0x20
[  130.673573] 
[  130.674044] Allocated by task 165:
[  130.674863]  kasan_save_stack+0x3c/0x70
[  130.675829]  kasan_set_track+0x2c/0x40
[  130.676763]  kasan_save_alloc_info+0x24/0x34
[  130.677821]  __kasan_kmalloc+0xb8/0xc0
[  130.678805]  kmalloc_trace+0x58/0x6c
[  130.679710]  kasan_bitops_generic+0x90/0x13c
[  130.680834]  kunit_try_run_case+0x84/0x120
[  130.681907]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.683118]  kthread+0x180/0x190
[  130.684035]  ret_from_fork+0x10/0x20
[  130.685000] 
[  130.685457] The buggy address belongs to the object at ffff0000c5968200
[  130.685457]  which belongs to the cache kmalloc-128 of size 128
[  130.687418] The buggy address is located 8 bytes inside of
[  130.687418]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.689294] 
[  130.689822] The buggy address belongs to the physical page:
[  130.690879] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.692510] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.693943] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.695335] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.696622] page dumped because: kasan: bad access detected
[  130.697613] 
[  130.698127] Memory state around the buggy address:
[  130.699149]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.700527]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.701908] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.703163]                       ^
[  130.704036]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.705391]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.706649] ==================================================================

test log snippet boot parser 139

Home

[  130.285706] ==================================================================
[  130.286890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xc4/0x684
[  130.289145] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.290378] 
[  130.290945] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.292551] Hardware name: linux,dummy-virt (DT)
[  130.293543] Call trace:
[  130.294192]  dump_backtrace.part.0+0xdc/0xf0
[  130.295714]  show_stack+0x18/0x30
[  130.296859]  dump_stack_lvl+0x64/0x80
[  130.297930]  print_report+0x158/0x458
[  130.298867]  kasan_report+0xb4/0xf4
[  130.299804]  __asan_load8+0x80/0xac
[  130.300853]  kasan_bitops_modify.constprop.0+0xc4/0x684
[  130.302300]  kasan_bitops_generic+0xac/0x13c
[  130.303583]  kunit_try_run_case+0x84/0x120
[  130.305051]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.306143]  kthread+0x180/0x190
[  130.307108]  ret_from_fork+0x10/0x20
[  130.308166] 
[  130.308844] Allocated by task 165:
[  130.309634]  kasan_save_stack+0x3c/0x70
[  130.310661]  kasan_set_track+0x2c/0x40
[  130.311737]  kasan_save_alloc_info+0x24/0x34
[  130.312917]  __kasan_kmalloc+0xb8/0xc0
[  130.314076]  kmalloc_trace+0x58/0x6c
[  130.315104]  kasan_bitops_generic+0x90/0x13c
[  130.316437]  kunit_try_run_case+0x84/0x120
[  130.317527]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.318863]  kthread+0x180/0x190
[  130.320071]  ret_from_fork+0x10/0x20
[  130.321155] 
[  130.321677] The buggy address belongs to the object at ffff0000c5968200
[  130.321677]  which belongs to the cache kmalloc-128 of size 128
[  130.323910] The buggy address is located 8 bytes inside of
[  130.323910]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.325792] 
[  130.326311] The buggy address belongs to the physical page:
[  130.327788] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.329447] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.330908] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.332379] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.333650] page dumped because: kasan: bad access detected
[  130.334923] 
[  130.335857] Memory state around the buggy address:
[  130.336778]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.338139]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.339592] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.340958]                       ^
[  130.341993]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.343417]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.344837] ==================================================================
---
[  130.595819] ==================================================================
[  130.597548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x684
[  130.600032] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.601187] 
[  130.601725] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.603197] Hardware name: linux,dummy-virt (DT)
[  130.604112] Call trace:
[  130.604716]  dump_backtrace.part.0+0xdc/0xf0
[  130.605822]  show_stack+0x18/0x30
[  130.606880]  dump_stack_lvl+0x64/0x80
[  130.607880]  print_report+0x158/0x458
[  130.608827]  kasan_report+0xb4/0xf4
[  130.609766]  __asan_load8+0x80/0xac
[  130.610708]  kasan_bitops_modify.constprop.0+0x180/0x684
[  130.611949]  kasan_bitops_generic+0xac/0x13c
[  130.613090]  kunit_try_run_case+0x84/0x120
[  130.614105]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.615384]  kthread+0x180/0x190
[  130.616291]  ret_from_fork+0x10/0x20
[  130.617216] 
[  130.617692] Allocated by task 165:
[  130.618477]  kasan_save_stack+0x3c/0x70
[  130.619400]  kasan_set_track+0x2c/0x40
[  130.620301]  kasan_save_alloc_info+0x24/0x34
[  130.621354]  __kasan_kmalloc+0xb8/0xc0
[  130.622312]  kmalloc_trace+0x58/0x6c
[  130.623265]  kasan_bitops_generic+0x90/0x13c
[  130.624338]  kunit_try_run_case+0x84/0x120
[  130.625385]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.626632]  kthread+0x180/0x190
[  130.627510]  ret_from_fork+0x10/0x20
[  130.628438] 
[  130.628911] The buggy address belongs to the object at ffff0000c5968200
[  130.628911]  which belongs to the cache kmalloc-128 of size 128
[  130.630873] The buggy address is located 8 bytes inside of
[  130.630873]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.632744] 
[  130.633254] The buggy address belongs to the physical page:
[  130.634285] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.635865] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.637286] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.638741] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.639989] page dumped because: kasan: bad access detected
[  130.641051] 
[  130.641551] Memory state around the buggy address:
[  130.642500]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.643841]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.645128] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.646365]                       ^
[  130.647194]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.648616]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.649831] ==================================================================
---
[  130.764796] ==================================================================
[  130.766327] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e8/0x684
[  130.768335] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.769658] 
[  130.770112] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.771659] Hardware name: linux,dummy-virt (DT)
[  130.772590] Call trace:
[  130.773223]  dump_backtrace.part.0+0xdc/0xf0
[  130.774341]  show_stack+0x18/0x30
[  130.775304]  dump_stack_lvl+0x64/0x80
[  130.776372]  print_report+0x158/0x458
[  130.777294]  kasan_report+0xb4/0xf4
[  130.778257]  __asan_load8+0x80/0xac
[  130.779171]  kasan_bitops_modify.constprop.0+0x1e8/0x684
[  130.780452]  kasan_bitops_generic+0xac/0x13c
[  130.781613]  kunit_try_run_case+0x84/0x120
[  130.782681]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.783925]  kthread+0x180/0x190
[  130.784829]  ret_from_fork+0x10/0x20
[  130.785774] 
[  130.786188] Allocated by task 165:
[  130.787017]  kasan_save_stack+0x3c/0x70
[  130.787989]  kasan_set_track+0x2c/0x40
[  130.788959]  kasan_save_alloc_info+0x24/0x34
[  130.790024]  __kasan_kmalloc+0xb8/0xc0
[  130.790958]  kmalloc_trace+0x58/0x6c
[  130.791973]  kasan_bitops_generic+0x90/0x13c
[  130.793045]  kunit_try_run_case+0x84/0x120
[  130.794049]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.795297]  kthread+0x180/0x190
[  130.796211]  ret_from_fork+0x10/0x20
[  130.797173] 
[  130.797664] The buggy address belongs to the object at ffff0000c5968200
[  130.797664]  which belongs to the cache kmalloc-128 of size 128
[  130.799576] The buggy address is located 8 bytes inside of
[  130.799576]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.801498] 
[  130.801960] The buggy address belongs to the physical page:
[  130.803014] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.804552] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.806034] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.807515] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.808814] page dumped because: kasan: bad access detected
[  130.809832] 
[  130.810346] Memory state around the buggy address:
[  130.811334]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.812685]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.813995] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.815233]                       ^
[  130.816044]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.817399]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.818659] ==================================================================
---
[  130.407807] ==================================================================
[  130.409232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x684
[  130.410824] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.412843] 
[  130.413565] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.415017] Hardware name: linux,dummy-virt (DT)
[  130.416392] Call trace:
[  130.417175]  dump_backtrace.part.0+0xdc/0xf0
[  130.418258]  show_stack+0x18/0x30
[  130.419552]  dump_stack_lvl+0x64/0x80
[  130.420728]  print_report+0x158/0x458
[  130.421691]  kasan_report+0xb4/0xf4
[  130.422611]  __asan_load8+0x80/0xac
[  130.423810]  kasan_bitops_modify.constprop.0+0x11c/0x684
[  130.425361]  kasan_bitops_generic+0xac/0x13c
[  130.426465]  kunit_try_run_case+0x84/0x120
[  130.427860]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.429100]  kthread+0x180/0x190
[  130.430093]  ret_from_fork+0x10/0x20
[  130.431154] 
[  130.431894] Allocated by task 165:
[  130.432604]  kasan_save_stack+0x3c/0x70
[  130.433356]  kasan_set_track+0x2c/0x40
[  130.434449]  kasan_save_alloc_info+0x24/0x34
[  130.435613]  __kasan_kmalloc+0xb8/0xc0
[  130.436650]  kmalloc_trace+0x58/0x6c
[  130.437625]  kasan_bitops_generic+0x90/0x13c
[  130.438748]  kunit_try_run_case+0x84/0x120
[  130.440076]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.441482]  kthread+0x180/0x190
[  130.442330]  ret_from_fork+0x10/0x20
[  130.443460] 
[  130.443923] The buggy address belongs to the object at ffff0000c5968200
[  130.443923]  which belongs to the cache kmalloc-128 of size 128
[  130.446103] The buggy address is located 8 bytes inside of
[  130.446103]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.448661] 
[  130.449200] The buggy address belongs to the physical page:
[  130.450176] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.451892] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.453293] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.454772] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.456197] page dumped because: kasan: bad access detected
[  130.457265] 
[  130.457818] Memory state around the buggy address:
[  130.458897]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.460264]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.461595] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.462891]                       ^
[  130.464439]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.465825]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.467158] ==================================================================

test log snippet boot parser 140

Home

[  130.820642] ==================================================================
[  130.821782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x760
[  130.823806] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.825104] 
[  130.825755] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.827204] Hardware name: linux,dummy-virt (DT)
[  130.828157] Call trace:
[  130.828808]  dump_backtrace.part.0+0xdc/0xf0
[  130.829945]  show_stack+0x18/0x30
[  130.830885]  dump_stack_lvl+0x64/0x80
[  130.831978]  print_report+0x158/0x458
[  130.832917]  kasan_report+0xb4/0xf4
[  130.833780]  kasan_check_range+0xe4/0x190
[  130.834785]  __kasan_check_write+0x28/0x3c
[  130.835851]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x760
[  130.837182]  kasan_bitops_generic+0xb8/0x13c
[  130.838254]  kunit_try_run_case+0x84/0x120
[  130.839311]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.840598]  kthread+0x180/0x190
[  130.841530]  ret_from_fork+0x10/0x20
[  130.842500] 
[  130.842969] Allocated by task 165:
[  130.843780]  kasan_save_stack+0x3c/0x70
[  130.844757]  kasan_set_track+0x2c/0x40
[  130.845692]  kasan_save_alloc_info+0x24/0x34
[  130.846805]  __kasan_kmalloc+0xb8/0xc0
[  130.847763]  kmalloc_trace+0x58/0x6c
[  130.848708]  kasan_bitops_generic+0x90/0x13c
[  130.849807]  kunit_try_run_case+0x84/0x120
[  130.850856]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.852114]  kthread+0x180/0x190
[  130.853014]  ret_from_fork+0x10/0x20
[  130.853941] 
[  130.854372] The buggy address belongs to the object at ffff0000c5968200
[  130.854372]  which belongs to the cache kmalloc-128 of size 128
[  130.856566] The buggy address is located 8 bytes inside of
[  130.856566]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.858507] 
[  130.859082] The buggy address belongs to the physical page:
[  130.860184] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.861837] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.863327] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.864851] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.866127] page dumped because: kasan: bad access detected
[  130.867215] 
[  130.867739] Memory state around the buggy address:
[  130.868794]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.870033]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.871394] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.872619]                       ^
[  130.873466]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.874838]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.876096] ==================================================================
---
[  131.159671] ==================================================================
[  131.160737] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0x760
[  131.162226] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  131.164044] 
[  131.164629] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.166243] Hardware name: linux,dummy-virt (DT)
[  131.167185] Call trace:
[  131.167787]  dump_backtrace.part.0+0xdc/0xf0
[  131.168990]  show_stack+0x18/0x30
[  131.169940]  dump_stack_lvl+0x64/0x80
[  131.170998]  print_report+0x158/0x458
[  131.172038]  kasan_report+0xb4/0xf4
[  131.172973]  kasan_check_range+0xe4/0x190
[  131.173959]  __kasan_check_write+0x28/0x3c
[  131.175040]  kasan_bitops_test_and_modify.constprop.0+0x188/0x760
[  131.176422]  kasan_bitops_generic+0xb8/0x13c
[  131.177530]  kunit_try_run_case+0x84/0x120
[  131.178560]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.179832]  kthread+0x180/0x190
[  131.180768]  ret_from_fork+0x10/0x20
[  131.181729] 
[  131.182218] Allocated by task 165:
[  131.183062]  kasan_save_stack+0x3c/0x70
[  131.184054]  kasan_set_track+0x2c/0x40
[  131.185023]  kasan_save_alloc_info+0x24/0x34
[  131.186096]  __kasan_kmalloc+0xb8/0xc0
[  131.187059]  kmalloc_trace+0x58/0x6c
[  131.188043]  kasan_bitops_generic+0x90/0x13c
[  131.189109]  kunit_try_run_case+0x84/0x120
[  131.190188]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.191576]  kthread+0x180/0x190
[  131.192481]  ret_from_fork+0x10/0x20
[  131.193430] 
[  131.193880] The buggy address belongs to the object at ffff0000c5968200
[  131.193880]  which belongs to the cache kmalloc-128 of size 128
[  131.195798] The buggy address is located 8 bytes inside of
[  131.195798]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.197699] 
[  131.198220] The buggy address belongs to the physical page:
[  131.199291] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.200828] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.202275] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.203731] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.205028] page dumped because: kasan: bad access detected
[  131.206069] 
[  131.206532] Memory state around the buggy address:
[  131.207579]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.208911]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.210253] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.211589]                       ^
[  131.212484]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.213837]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.215091] ==================================================================
---
[  131.330270] ==================================================================
[  131.331371] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x208/0x760
[  131.333073] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  131.334479] 
[  131.335021] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.336494] Hardware name: linux,dummy-virt (DT)
[  131.337392] Call trace:
[  131.338070]  dump_backtrace.part.0+0xdc/0xf0
[  131.339184]  show_stack+0x18/0x30
[  131.340187]  dump_stack_lvl+0x64/0x80
[  131.341263]  print_report+0x158/0x458
[  131.342193]  kasan_report+0xb4/0xf4
[  131.343172]  kasan_check_range+0xe4/0x190
[  131.344196]  __kasan_check_write+0x28/0x3c
[  131.345234]  kasan_bitops_test_and_modify.constprop.0+0x208/0x760
[  131.346652]  kasan_bitops_generic+0xb8/0x13c
[  131.347724]  kunit_try_run_case+0x84/0x120
[  131.348835]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.350065]  kthread+0x180/0x190
[  131.350964]  ret_from_fork+0x10/0x20
[  131.351965] 
[  131.352453] Allocated by task 165:
[  131.353281]  kasan_save_stack+0x3c/0x70
[  131.354267]  kasan_set_track+0x2c/0x40
[  131.355189]  kasan_save_alloc_info+0x24/0x34
[  131.356300]  __kasan_kmalloc+0xb8/0xc0
[  131.357290]  kmalloc_trace+0x58/0x6c
[  131.358242]  kasan_bitops_generic+0x90/0x13c
[  131.359415]  kunit_try_run_case+0x84/0x120
[  131.360485]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.361739]  kthread+0x180/0x190
[  131.362674]  ret_from_fork+0x10/0x20
[  131.363596] 
[  131.364074] The buggy address belongs to the object at ffff0000c5968200
[  131.364074]  which belongs to the cache kmalloc-128 of size 128
[  131.366008] The buggy address is located 8 bytes inside of
[  131.366008]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.367853] 
[  131.368245] The buggy address belongs to the physical page:
[  131.369340] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.370966] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.372469] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.373887] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.375196] page dumped because: kasan: bad access detected
[  131.376227] 
[  131.376768] Memory state around the buggy address:
[  131.377795]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.379115]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.380364] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.381581]                       ^
[  131.382370]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.383739]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.385040] ==================================================================
---
[  131.046826] ==================================================================
[  131.048320] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x130/0x760
[  131.049989] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  131.051398] 
[  131.051954] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.053387] Hardware name: linux,dummy-virt (DT)
[  131.054291] Call trace:
[  131.054915]  dump_backtrace.part.0+0xdc/0xf0
[  131.056018]  show_stack+0x18/0x30
[  131.057051]  dump_stack_lvl+0x64/0x80
[  131.058043]  print_report+0x158/0x458
[  131.059019]  kasan_report+0xb4/0xf4
[  131.059879]  kasan_check_range+0xe4/0x190
[  131.060889]  __kasan_check_write+0x28/0x3c
[  131.061966]  kasan_bitops_test_and_modify.constprop.0+0x130/0x760
[  131.063343]  kasan_bitops_generic+0xb8/0x13c
[  131.064475]  kunit_try_run_case+0x84/0x120
[  131.065554]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.066820]  kthread+0x180/0x190
[  131.067725]  ret_from_fork+0x10/0x20
[  131.068641] 
[  131.069135] Allocated by task 165:
[  131.069925]  kasan_save_stack+0x3c/0x70
[  131.070920]  kasan_set_track+0x2c/0x40
[  131.071877]  kasan_save_alloc_info+0x24/0x34
[  131.072937]  __kasan_kmalloc+0xb8/0xc0
[  131.073865]  kmalloc_trace+0x58/0x6c
[  131.074827]  kasan_bitops_generic+0x90/0x13c
[  131.075900]  kunit_try_run_case+0x84/0x120
[  131.076953]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.078174]  kthread+0x180/0x190
[  131.079067]  ret_from_fork+0x10/0x20
[  131.080020] 
[  131.080524] The buggy address belongs to the object at ffff0000c5968200
[  131.080524]  which belongs to the cache kmalloc-128 of size 128
[  131.082468] The buggy address is located 8 bytes inside of
[  131.082468]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.084302] 
[  131.084831] The buggy address belongs to the physical page:
[  131.085822] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.087449] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.088880] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.090275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.091613] page dumped because: kasan: bad access detected
[  131.092595] 
[  131.093111] Memory state around the buggy address:
[  131.094103]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.095368]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.096796] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.098028]                       ^
[  131.098900]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.100227]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.101547] ==================================================================
---
[  130.934644] ==================================================================
[  130.935881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf0/0x760
[  130.937566] Write of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.939038] 
[  130.939642] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.941145] Hardware name: linux,dummy-virt (DT)
[  130.942126] Call trace:
[  130.942787]  dump_backtrace.part.0+0xdc/0xf0
[  130.943949]  show_stack+0x18/0x30
[  130.944938]  dump_stack_lvl+0x64/0x80
[  130.945979]  print_report+0x158/0x458
[  130.946895]  kasan_report+0xb4/0xf4
[  130.947852]  kasan_check_range+0xe4/0x190
[  130.948866]  __kasan_check_write+0x28/0x3c
[  130.949908]  kasan_bitops_test_and_modify.constprop.0+0xf0/0x760
[  130.951276]  kasan_bitops_generic+0xb8/0x13c
[  130.952378]  kunit_try_run_case+0x84/0x120
[  130.953396]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.954697]  kthread+0x180/0x190
[  130.955572]  ret_from_fork+0x10/0x20
[  130.956550] 
[  130.957009] Allocated by task 165:
[  130.957809]  kasan_save_stack+0x3c/0x70
[  130.958762]  kasan_set_track+0x2c/0x40
[  130.959764]  kasan_save_alloc_info+0x24/0x34
[  130.960831]  __kasan_kmalloc+0xb8/0xc0
[  130.961823]  kmalloc_trace+0x58/0x6c
[  130.962790]  kasan_bitops_generic+0x90/0x13c
[  130.963857]  kunit_try_run_case+0x84/0x120
[  130.964923]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.966237]  kthread+0x180/0x190
[  130.967121]  ret_from_fork+0x10/0x20
[  130.968067] 
[  130.968560] The buggy address belongs to the object at ffff0000c5968200
[  130.968560]  which belongs to the cache kmalloc-128 of size 128
[  130.970521] The buggy address is located 8 bytes inside of
[  130.970521]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.972337] 
[  130.972893] The buggy address belongs to the physical page:
[  130.973943] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.975493] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.976933] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.978301] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.979583] page dumped because: kasan: bad access detected
[  130.980622] 
[  130.981118] Memory state around the buggy address:
[  130.982084]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.983379]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.984687] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.985941]                       ^
[  130.986759]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.988115]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.989374] ==================================================================

test log snippet boot parser 141

Home

[  131.104034] ==================================================================
[  131.105288] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x15c/0x760
[  131.106882] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  131.108184] 
[  131.108733] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.110189] Hardware name: linux,dummy-virt (DT)
[  131.111171] Call trace:
[  131.111984]  dump_backtrace.part.0+0xdc/0xf0
[  131.113135]  show_stack+0x18/0x30
[  131.114183]  dump_stack_lvl+0x64/0x80
[  131.115227]  print_report+0x158/0x458
[  131.116167]  kasan_report+0xb4/0xf4
[  131.117089]  __asan_load8+0x80/0xac
[  131.118033]  kasan_bitops_test_and_modify.constprop.0+0x15c/0x760
[  131.119380]  kasan_bitops_generic+0xb8/0x13c
[  131.120481]  kunit_try_run_case+0x84/0x120
[  131.121612]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.122839]  kthread+0x180/0x190
[  131.123745]  ret_from_fork+0x10/0x20
[  131.124668] 
[  131.125155] Allocated by task 165:
[  131.125952]  kasan_save_stack+0x3c/0x70
[  131.126956]  kasan_set_track+0x2c/0x40
[  131.127918]  kasan_save_alloc_info+0x24/0x34
[  131.128979]  __kasan_kmalloc+0xb8/0xc0
[  131.129933]  kmalloc_trace+0x58/0x6c
[  131.130884]  kasan_bitops_generic+0x90/0x13c
[  131.132024]  kunit_try_run_case+0x84/0x120
[  131.133128]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.134341]  kthread+0x180/0x190
[  131.135253]  ret_from_fork+0x10/0x20
[  131.136198] 
[  131.136678] The buggy address belongs to the object at ffff0000c5968200
[  131.136678]  which belongs to the cache kmalloc-128 of size 128
[  131.138608] The buggy address is located 8 bytes inside of
[  131.138608]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.140446] 
[  131.140981] The buggy address belongs to the physical page:
[  131.142093] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.143640] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.145098] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.146521] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.147849] page dumped because: kasan: bad access detected
[  131.148858] 
[  131.149379] Memory state around the buggy address:
[  131.150391]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.151748]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.153066] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.154327]                       ^
[  131.155181]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.156597]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.157880] ==================================================================
---
[  131.217138] ==================================================================
[  131.218669] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760
[  131.220294] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  131.221711] 
[  131.222223] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.223739] Hardware name: linux,dummy-virt (DT)
[  131.224592] Call trace:
[  131.225202]  dump_backtrace.part.0+0xdc/0xf0
[  131.226342]  show_stack+0x18/0x30
[  131.227347]  dump_stack_lvl+0x64/0x80
[  131.228417]  print_report+0x158/0x458
[  131.229461]  kasan_report+0xb4/0xf4
[  131.230382]  __asan_load8+0x80/0xac
[  131.231364]  kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760
[  131.232670]  kasan_bitops_generic+0xb8/0x13c
[  131.233837]  kunit_try_run_case+0x84/0x120
[  131.234913]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.236133]  kthread+0x180/0x190
[  131.237010]  ret_from_fork+0x10/0x20
[  131.237949] 
[  131.238494] Allocated by task 165:
[  131.239234]  kasan_save_stack+0x3c/0x70
[  131.240214]  kasan_set_track+0x2c/0x40
[  131.241158]  kasan_save_alloc_info+0x24/0x34
[  131.242237]  __kasan_kmalloc+0xb8/0xc0
[  131.243175]  kmalloc_trace+0x58/0x6c
[  131.244118]  kasan_bitops_generic+0x90/0x13c
[  131.245234]  kunit_try_run_case+0x84/0x120
[  131.246295]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.247544]  kthread+0x180/0x190
[  131.248468]  ret_from_fork+0x10/0x20
[  131.249380] 
[  131.249843] The buggy address belongs to the object at ffff0000c5968200
[  131.249843]  which belongs to the cache kmalloc-128 of size 128
[  131.251801] The buggy address is located 8 bytes inside of
[  131.251801]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.253634] 
[  131.254168] The buggy address belongs to the physical page:
[  131.255202] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.256795] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.258218] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.259634] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.260955] page dumped because: kasan: bad access detected
[  131.262063] 
[  131.262566] Memory state around the buggy address:
[  131.263612]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.264926]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.266254] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.267515]                       ^
[  131.268396]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.269780]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.271076] ==================================================================
---
[  130.991474] ==================================================================
[  130.993020] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x760
[  130.994669] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.996070] 
[  130.996623] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.998055] Hardware name: linux,dummy-virt (DT)
[  130.998919] Call trace:
[  130.999537]  dump_backtrace.part.0+0xdc/0xf0
[  131.000686]  show_stack+0x18/0x30
[  131.001694]  dump_stack_lvl+0x64/0x80
[  131.002724]  print_report+0x158/0x458
[  131.003687]  kasan_report+0xb4/0xf4
[  131.004610]  __asan_load8+0x80/0xac
[  131.005510]  kasan_bitops_test_and_modify.constprop.0+0xf8/0x760
[  131.006896]  kasan_bitops_generic+0xb8/0x13c
[  131.008016]  kunit_try_run_case+0x84/0x120
[  131.009037]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.010260]  kthread+0x180/0x190
[  131.011181]  ret_from_fork+0x10/0x20
[  131.012186] 
[  131.012690] Allocated by task 165:
[  131.013428]  kasan_save_stack+0x3c/0x70
[  131.014342]  kasan_set_track+0x2c/0x40
[  131.015308]  kasan_save_alloc_info+0x24/0x34
[  131.016320]  __kasan_kmalloc+0xb8/0xc0
[  131.017294]  kmalloc_trace+0x58/0x6c
[  131.018270]  kasan_bitops_generic+0x90/0x13c
[  131.019336]  kunit_try_run_case+0x84/0x120
[  131.020415]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.021712]  kthread+0x180/0x190
[  131.022625]  ret_from_fork+0x10/0x20
[  131.023575] 
[  131.023961] The buggy address belongs to the object at ffff0000c5968200
[  131.023961]  which belongs to the cache kmalloc-128 of size 128
[  131.025933] The buggy address is located 8 bytes inside of
[  131.025933]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.027812] 
[  131.028280] The buggy address belongs to the physical page:
[  131.029363] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.030927] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.032346] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.033792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.035282] page dumped because: kasan: bad access detected
[  131.036397] 
[  131.036833] Memory state around the buggy address:
[  131.037722]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.039147]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.040554] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.041796]                       ^
[  131.042655]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.043952]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.045155] ==================================================================
---
[  131.272808] ==================================================================
[  131.273924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760
[  131.276077] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  131.277457] 
[  131.278015] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.279538] Hardware name: linux,dummy-virt (DT)
[  131.280536] Call trace:
[  131.281163]  dump_backtrace.part.0+0xdc/0xf0
[  131.282299]  show_stack+0x18/0x30
[  131.283259]  dump_stack_lvl+0x64/0x80
[  131.284366]  print_report+0x158/0x458
[  131.285316]  kasan_report+0xb4/0xf4
[  131.286305]  __asan_load8+0x80/0xac
[  131.287256]  kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760
[  131.288596]  kasan_bitops_generic+0xb8/0x13c
[  131.289729]  kunit_try_run_case+0x84/0x120
[  131.290801]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.292040]  kthread+0x180/0x190
[  131.292971]  ret_from_fork+0x10/0x20
[  131.293918] 
[  131.294464] Allocated by task 165:
[  131.295289]  kasan_save_stack+0x3c/0x70
[  131.296261]  kasan_set_track+0x2c/0x40
[  131.297190]  kasan_save_alloc_info+0x24/0x34
[  131.298199]  __kasan_kmalloc+0xb8/0xc0
[  131.299135]  kmalloc_trace+0x58/0x6c
[  131.300130]  kasan_bitops_generic+0x90/0x13c
[  131.301239]  kunit_try_run_case+0x84/0x120
[  131.302329]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.303554]  kthread+0x180/0x190
[  131.304466]  ret_from_fork+0x10/0x20
[  131.305430] 
[  131.305915] The buggy address belongs to the object at ffff0000c5968200
[  131.305915]  which belongs to the cache kmalloc-128 of size 128
[  131.307818] The buggy address is located 8 bytes inside of
[  131.307818]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  131.309722] 
[  131.310228] The buggy address belongs to the physical page:
[  131.311253] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  131.312830] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.314290] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.315729] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.317032] page dumped because: kasan: bad access detected
[  131.318055] 
[  131.318594] Memory state around the buggy address:
[  131.319598]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.320915]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.322262] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.323531]                       ^
[  131.324431]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.325808]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.327080] ==================================================================
---
[  130.878371] ==================================================================
[  130.879944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xc4/0x760
[  130.881484] Read of size 8 at addr ffff0000c5968208 by task kunit_try_catch/165
[  130.883042] 
[  130.883953] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.885254] Hardware name: linux,dummy-virt (DT)
[  130.886180] Call trace:
[  130.886794]  dump_backtrace.part.0+0xdc/0xf0
[  130.887888]  show_stack+0x18/0x30
[  130.888895]  dump_stack_lvl+0x64/0x80
[  130.889935]  print_report+0x158/0x458
[  130.890968]  kasan_report+0xb4/0xf4
[  130.891884]  __asan_load8+0x80/0xac
[  130.892863]  kasan_bitops_test_and_modify.constprop.0+0xc4/0x760
[  130.894199]  kasan_bitops_generic+0xb8/0x13c
[  130.895313]  kunit_try_run_case+0x84/0x120
[  130.896349]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.897642]  kthread+0x180/0x190
[  130.898579]  ret_from_fork+0x10/0x20
[  130.899539] 
[  130.900066] Allocated by task 165:
[  130.900911]  kasan_save_stack+0x3c/0x70
[  130.901927]  kasan_set_track+0x2c/0x40
[  130.902895]  kasan_save_alloc_info+0x24/0x34
[  130.903963]  __kasan_kmalloc+0xb8/0xc0
[  130.904920]  kmalloc_trace+0x58/0x6c
[  130.905899]  kasan_bitops_generic+0x90/0x13c
[  130.906979]  kunit_try_run_case+0x84/0x120
[  130.908041]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.909332]  kthread+0x180/0x190
[  130.910256]  ret_from_fork+0x10/0x20
[  130.911220] 
[  130.911673] The buggy address belongs to the object at ffff0000c5968200
[  130.911673]  which belongs to the cache kmalloc-128 of size 128
[  130.913645] The buggy address is located 8 bytes inside of
[  130.913645]  128-byte region [ffff0000c5968200, ffff0000c5968280)
[  130.915532] 
[  130.916071] The buggy address belongs to the physical page:
[  130.917090] page:0000000056844de9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105968
[  130.918637] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.920106] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.921619] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.922872] page dumped because: kasan: bad access detected
[  130.923918] 
[  130.924460] Memory state around the buggy address:
[  130.925437]  ffff0000c5968100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.926784]  ffff0000c5968180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.928090] >ffff0000c5968200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.929335]                       ^
[  130.930148]  ffff0000c5968280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.931606]  ffff0000c5968300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.932798] ==================================================================

test log snippet boot parser 142

Home

[  126.330342] ==================================================================
[  126.332572] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc0/0x1f0
[  126.334033] Write of size 1 at addr ffff0000c403df00 by task kunit_try_catch/128
[  126.335544] 
[  126.336079] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.337624] Hardware name: linux,dummy-virt (DT)
[  126.338603] Call trace:
[  126.339474]  dump_backtrace.part.0+0xdc/0xf0
[  126.340624]  show_stack+0x18/0x30
[  126.341628]  dump_stack_lvl+0x64/0x80
[  126.342694]  print_report+0x158/0x458
[  126.344020]  kasan_report+0xb4/0xf4
[  126.344932]  __asan_store1+0x68/0x7c
[  126.345956]  kmalloc_large_oob_right+0xc0/0x1f0
[  126.347081]  kunit_try_run_case+0x84/0x120
[  126.348231]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.349444]  kthread+0x180/0x190
[  126.350367]  ret_from_fork+0x10/0x20
[  126.351720] 
[  126.352171] Allocated by task 128:
[  126.352955]  kasan_save_stack+0x3c/0x70
[  126.354188]  kasan_set_track+0x2c/0x40
[  126.355040]  kasan_save_alloc_info+0x24/0x34
[  126.356272]  __kasan_kmalloc+0xb8/0xc0
[  126.357264]  kmalloc_trace+0x58/0x6c
[  126.358194]  kmalloc_large_oob_right+0x94/0x1f0
[  126.359576]  kunit_try_run_case+0x84/0x120
[  126.360590]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.361817]  kthread+0x180/0x190
[  126.362728]  ret_from_fork+0x10/0x20
[  126.363711] 
[  126.364185] The buggy address belongs to the object at ffff0000c403c000
[  126.364185]  which belongs to the cache kmalloc-8k of size 8192
[  126.366429] The buggy address is located 7936 bytes inside of
[  126.366429]  8192-byte region [ffff0000c403c000, ffff0000c403e000)
[  126.368475] 
[  126.368994] The buggy address belongs to the physical page:
[  126.370002] page:000000008e61e691 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104038
[  126.372033] head:000000008e61e691 order:3 compound_mapcount:0 compound_pincount:0
[  126.373160] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.374823] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[  126.376272] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  126.377559] page dumped because: kasan: bad access detected
[  126.378610] 
[  126.379124] Memory state around the buggy address:
[  126.380434]  ffff0000c403de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.381759]  ffff0000c403de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.383475] >ffff0000c403df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.384545]                    ^
[  126.385335]  ffff0000c403df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.386728]  ffff0000c403e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.388094] ==================================================================

test log snippet boot parser 143

Home

[  127.872384] ==================================================================
[  127.874451] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xdc/0x1e0
[  127.876103] Read of size 64 at addr ffff0000c5848204 by task kunit_try_catch/142
[  127.878764] 
[  127.879265] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.881660] Hardware name: linux,dummy-virt (DT)
[  127.882666] Call trace:
[  127.883473]  dump_backtrace.part.0+0xdc/0xf0
[  127.884844]  show_stack+0x18/0x30
[  127.885826]  dump_stack_lvl+0x64/0x80
[  127.886889]  print_report+0x158/0x458
[  127.888145]  kasan_report+0xb4/0xf4
[  127.889107]  kasan_check_range+0xe4/0x190
[  127.890238]  memmove+0x44/0xc0
[  127.891298]  kmalloc_memmove_invalid_size+0xdc/0x1e0
[  127.892656]  kunit_try_run_case+0x84/0x120
[  127.893678]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.894928]  kthread+0x180/0x190
[  127.895835]  ret_from_fork+0x10/0x20
[  127.896765] 
[  127.897021] Allocated by task 142:
[  127.897389]  kasan_save_stack+0x3c/0x70
[  127.898825]  kasan_set_track+0x2c/0x40
[  127.899854]  kasan_save_alloc_info+0x24/0x34
[  127.901150]  __kasan_kmalloc+0xb8/0xc0
[  127.902093]  kmalloc_trace+0x58/0x6c
[  127.903205]  kmalloc_memmove_invalid_size+0x98/0x1e0
[  127.904506]  kunit_try_run_case+0x84/0x120
[  127.905691]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.906986]  kthread+0x180/0x190
[  127.907959]  ret_from_fork+0x10/0x20
[  127.908979] 
[  127.909492] The buggy address belongs to the object at ffff0000c5848200
[  127.909492]  which belongs to the cache kmalloc-128 of size 128
[  127.911417] The buggy address is located 4 bytes inside of
[  127.911417]  128-byte region [ffff0000c5848200, ffff0000c5848280)
[  127.913193] 
[  127.913755] The buggy address belongs to the physical page:
[  127.915115] page:0000000041fbd229 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105848
[  127.916654] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.918335] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.919390] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.921038] page dumped because: kasan: bad access detected
[  127.922229] 
[  127.922723] Memory state around the buggy address:
[  127.923741]  ffff0000c5848100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.925444]  ffff0000c5848180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.926981] >ffff0000c5848200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  127.928470]                                            ^
[  127.929371]  ffff0000c5848280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.930667]  ffff0000c5848300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.932224] ==================================================================

test log snippet boot parser 144

Home

[  126.064682] ==================================================================
[  126.066658] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xc8/0x1e4
[  126.068227] Read of size 1 at addr ffff0000c59b9000 by task kunit_try_catch/122
[  126.070009] 
[  126.070672] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.072190] Hardware name: linux,dummy-virt (DT)
[  126.073105] Call trace:
[  126.073457]  dump_backtrace.part.0+0xdc/0xf0
[  126.074804]  show_stack+0x18/0x30
[  126.076072]  dump_stack_lvl+0x64/0x80
[  126.077069]  print_report+0x158/0x458
[  126.078026]  kasan_report+0xb4/0xf4
[  126.078947]  __asan_load1+0x68/0x74
[  126.080087]  kmalloc_node_oob_right+0xc8/0x1e4
[  126.081567]  kunit_try_run_case+0x84/0x120
[  126.082633]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.084036]  kthread+0x180/0x190
[  126.084966]  ret_from_fork+0x10/0x20
[  126.085894] 
[  126.086376] Allocated by task 122:
[  126.087281]  kasan_save_stack+0x3c/0x70
[  126.088921]  kasan_set_track+0x2c/0x40
[  126.089809]  kasan_save_alloc_info+0x24/0x34
[  126.091055]  __kasan_kmalloc+0xb8/0xc0
[  126.092282]  kmalloc_node_trace+0x54/0x70
[  126.093341]  kmalloc_node_oob_right+0x9c/0x1e4
[  126.094479]  kunit_try_run_case+0x84/0x120
[  126.095613]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.096952]  kthread+0x180/0x190
[  126.097920]  ret_from_fork+0x10/0x20
[  126.098916] 
[  126.099332] The buggy address belongs to the object at ffff0000c59b8000
[  126.099332]  which belongs to the cache kmalloc-4k of size 4096
[  126.101384] The buggy address is located 0 bytes to the right of
[  126.101384]  4096-byte region [ffff0000c59b8000, ffff0000c59b9000)
[  126.103527] 
[  126.104415] The buggy address belongs to the physical page:
[  126.105357] page:000000001c4cc6d4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[  126.107253] head:000000001c4cc6d4 order:3 compound_mapcount:0 compound_pincount:0
[  126.108687] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.110167] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[  126.111628] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  126.113042] page dumped because: kasan: bad access detected
[  126.113859] 
[  126.114373] Memory state around the buggy address:
[  126.115502]  ffff0000c59b8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.116904]  ffff0000c59b8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.118216] >ffff0000c59b9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.120286]                    ^
[  126.121085]  ffff0000c59b9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.122419]  ffff0000c59b9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.123970] ==================================================================

test log snippet boot parser 145

Home

[  127.329490] ==================================================================
[  127.331024] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf0/0x290
[  127.332561] Write of size 16 at addr ffff0000c5909a00 by task kunit_try_catch/134
[  127.333990] 
[  127.334589] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.336331] Hardware name: linux,dummy-virt (DT)
[  127.337336] Call trace:
[  127.337960]  dump_backtrace.part.0+0xdc/0xf0
[  127.339124]  show_stack+0x18/0x30
[  127.340237]  dump_stack_lvl+0x64/0x80
[  127.341279]  print_report+0x158/0x458
[  127.342299]  kasan_report+0xb4/0xf4
[  127.343299]  __asan_store16+0x68/0x94
[  127.344281]  kmalloc_oob_16+0xf0/0x290
[  127.345563]  kunit_try_run_case+0x84/0x120
[  127.346631]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.348076]  kthread+0x180/0x190
[  127.349042]  ret_from_fork+0x10/0x20
[  127.350128] 
[  127.350692] Allocated by task 134:
[  127.351481]  kasan_save_stack+0x3c/0x70
[  127.352522]  kasan_set_track+0x2c/0x40
[  127.353633]  kasan_save_alloc_info+0x24/0x34
[  127.354749]  __kasan_kmalloc+0xb8/0xc0
[  127.355752]  kmalloc_trace+0x58/0x6c
[  127.356879]  kmalloc_oob_16+0x9c/0x290
[  127.358048]  kunit_try_run_case+0x84/0x120
[  127.359310]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.360899]  kthread+0x180/0x190
[  127.361821]  ret_from_fork+0x10/0x20
[  127.362746] 
[  127.363300] The buggy address belongs to the object at ffff0000c5909a00
[  127.363300]  which belongs to the cache kmalloc-128 of size 128
[  127.365791] The buggy address is located 0 bytes inside of
[  127.365791]  128-byte region [ffff0000c5909a00, ffff0000c5909a80)
[  127.367899] 
[  127.368703] The buggy address belongs to the physical page:
[  127.369798] page:0000000040aa1586 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105909
[  127.371477] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.373308] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.374860] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.376359] page dumped because: kasan: bad access detected
[  127.377319] 
[  127.377755] Memory state around the buggy address:
[  127.378855]  ffff0000c5909900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  127.380502]  ffff0000c5909980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.381784] >ffff0000c5909a00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.383317]                       ^
[  127.384497]  ffff0000c5909a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.385843]  ffff0000c5909b00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.387386] ==================================================================

test log snippet boot parser 146

Home

[  127.475833] ==================================================================
[  127.477792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xcc/0x1f0
[  127.479319] Write of size 128 at addr ffff0000c5909e00 by task kunit_try_catch/136
[  127.480847] 
[  127.481473] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.482977] Hardware name: linux,dummy-virt (DT)
[  127.484824] Call trace:
[  127.485529]  dump_backtrace.part.0+0xdc/0xf0
[  127.486676]  show_stack+0x18/0x30
[  127.487651]  dump_stack_lvl+0x64/0x80
[  127.488652]  print_report+0x158/0x458
[  127.489623]  kasan_report+0xb4/0xf4
[  127.490578]  kasan_check_range+0xe4/0x190
[  127.491802]  memset+0x40/0x70
[  127.492795]  kmalloc_oob_in_memset+0xcc/0x1f0
[  127.494044]  kunit_try_run_case+0x84/0x120
[  127.495136]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.496350]  kthread+0x180/0x190
[  127.497300]  ret_from_fork+0x10/0x20
[  127.498241] 
[  127.498694] Allocated by task 136:
[  127.499936]  kasan_save_stack+0x3c/0x70
[  127.501331]  kasan_set_track+0x2c/0x40
[  127.502317]  kasan_save_alloc_info+0x24/0x34
[  127.503511]  __kasan_kmalloc+0xb8/0xc0
[  127.504351]  kmalloc_trace+0x58/0x6c
[  127.505355]  kmalloc_oob_in_memset+0x98/0x1f0
[  127.506445]  kunit_try_run_case+0x84/0x120
[  127.507619]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.509535]  kthread+0x180/0x190
[  127.510481]  ret_from_fork+0x10/0x20
[  127.511470] 
[  127.511918] The buggy address belongs to the object at ffff0000c5909e00
[  127.511918]  which belongs to the cache kmalloc-128 of size 128
[  127.513820] The buggy address is located 0 bytes inside of
[  127.513820]  128-byte region [ffff0000c5909e00, ffff0000c5909e80)
[  127.515636] 
[  127.516757] The buggy address belongs to the physical page:
[  127.518048] page:0000000040aa1586 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105909
[  127.519574] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.521016] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.522435] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.523785] page dumped because: kasan: bad access detected
[  127.525469] 
[  127.525924] Memory state around the buggy address:
[  127.526822]  ffff0000c5909d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.528121]  ffff0000c5909d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.529425] >ffff0000c5909e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  127.530606]                                                                 ^
[  127.532150]  ffff0000c5909e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.533457]  ffff0000c5909f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.534756] ==================================================================

test log snippet boot parser 147

Home

[  125.997949] ==================================================================
[  125.999670] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc0/0x200
[  126.001084] Read of size 1 at addr ffff0000c59f59ff by task kunit_try_catch/121
[  126.002427] 
[  126.002993] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.004530] Hardware name: linux,dummy-virt (DT)
[  126.005571] Call trace:
[  126.006275]  dump_backtrace.part.0+0xdc/0xf0
[  126.007569]  show_stack+0x18/0x30
[  126.008552]  dump_stack_lvl+0x64/0x80
[  126.009612]  print_report+0x158/0x458
[  126.010676]  kasan_report+0xb4/0xf4
[  126.011998]  __asan_load1+0x68/0x74
[  126.012985]  kmalloc_oob_left+0xc0/0x200
[  126.014066]  kunit_try_run_case+0x84/0x120
[  126.015096]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.016493]  kthread+0x180/0x190
[  126.017509]  ret_from_fork+0x10/0x20
[  126.018224] 
[  126.018760] Allocated by task 2:
[  126.019648]  kasan_save_stack+0x3c/0x70
[  126.020612]  kasan_set_track+0x2c/0x40
[  126.021784]  kasan_save_alloc_info+0x24/0x34
[  126.022826]  __kasan_kmalloc+0xb8/0xc0
[  126.023748]  kmalloc_trace+0x58/0x6c
[  126.024797]  set_kthread_struct+0x5c/0x110
[  126.025783]  copy_process+0x1118/0x2230
[  126.026851]  kernel_clone+0xb4/0x470
[  126.027892]  kernel_thread+0xc0/0x100
[  126.028919]  kthreadd+0x1e0/0x2a0
[  126.029843]  ret_from_fork+0x10/0x20
[  126.030808] 
[  126.031669] The buggy address belongs to the object at ffff0000c59f5900
[  126.031669]  which belongs to the cache kmalloc-128 of size 128
[  126.033796] The buggy address is located 127 bytes to the right of
[  126.033796]  128-byte region [ffff0000c59f5900, ffff0000c59f5980)
[  126.035955] 
[  126.036520] The buggy address belongs to the physical page:
[  126.037599] page:0000000095f3dccc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f5
[  126.039373] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  126.040783] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  126.042400] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.043946] page dumped because: kasan: bad access detected
[  126.045049] 
[  126.045527] Memory state around the buggy address:
[  126.046511]  ffff0000c59f5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.048229]  ffff0000c59f5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  126.049502] >ffff0000c59f5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.050780]                                                                 ^
[  126.052449]  ffff0000c59f5a00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.053911]  ffff0000c59f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.055277] ==================================================================

test log snippet boot parser 148

Home

[  127.609747] ==================================================================
[  127.611669] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd0/0x200
[  127.613445] Write of size 4 at addr ffff0000c5958175 by task kunit_try_catch/138
[  127.614808] 
[  127.615360] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.617695] Hardware name: linux,dummy-virt (DT)
[  127.618479] Call trace:
[  127.619494]  dump_backtrace.part.0+0xdc/0xf0
[  127.620879]  show_stack+0x18/0x30
[  127.621870]  dump_stack_lvl+0x64/0x80
[  127.622903]  print_report+0x158/0x458
[  127.624226]  kasan_report+0xb4/0xf4
[  127.625137]  kasan_check_range+0xe4/0x190
[  127.626193]  memset+0x40/0x70
[  127.627071]  kmalloc_oob_memset_4+0xd0/0x200
[  127.628253]  kunit_try_run_case+0x84/0x120
[  127.629688]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.630950]  kthread+0x180/0x190
[  127.632029]  ret_from_fork+0x10/0x20
[  127.633053] 
[  127.633631] Allocated by task 138:
[  127.634444]  kasan_save_stack+0x3c/0x70
[  127.635435]  kasan_set_track+0x2c/0x40
[  127.636322]  kasan_save_alloc_info+0x24/0x34
[  127.637461]  __kasan_kmalloc+0xb8/0xc0
[  127.638400]  kmalloc_trace+0x58/0x6c
[  127.639488]  kmalloc_oob_memset_4+0x98/0x200
[  127.640594]  kunit_try_run_case+0x84/0x120
[  127.641661]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.643222]  kthread+0x180/0x190
[  127.644880]  ret_from_fork+0x10/0x20
[  127.645804] 
[  127.646269] The buggy address belongs to the object at ffff0000c5958100
[  127.646269]  which belongs to the cache kmalloc-128 of size 128
[  127.648628] The buggy address is located 117 bytes inside of
[  127.648628]  128-byte region [ffff0000c5958100, ffff0000c5958180)
[  127.650249] 
[  127.650752] The buggy address belongs to the physical page:
[  127.651996] page:000000002d103547 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[  127.653670] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.655168] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.656514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.657899] page dumped because: kasan: bad access detected
[  127.658919] 
[  127.660202] Memory state around the buggy address:
[  127.661175]  ffff0000c5958000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.662502]  ffff0000c5958080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.664192] >ffff0000c5958100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  127.665526]                                                                 ^
[  127.666732]  ffff0000c5958180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.668264]  ffff0000c5958200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.669819] ==================================================================

test log snippet boot parser 149

Home

[  127.745208] ==================================================================
[  127.746961] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd0/0x200
[  127.748824] Write of size 16 at addr ffff0000c5958469 by task kunit_try_catch/140
[  127.750285] 
[  127.750823] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.752495] Hardware name: linux,dummy-virt (DT)
[  127.753444] Call trace:
[  127.754090]  dump_backtrace.part.0+0xdc/0xf0
[  127.754771]  show_stack+0x18/0x30
[  127.755303]  dump_stack_lvl+0x64/0x80
[  127.755874]  print_report+0x158/0x458
[  127.756363]  kasan_report+0xb4/0xf4
[  127.757258]  kasan_check_range+0xe4/0x190
[  127.758480]  memset+0x40/0x70
[  127.759443]  kmalloc_oob_memset_16+0xd0/0x200
[  127.760681]  kunit_try_run_case+0x84/0x120
[  127.761896]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.763197]  kthread+0x180/0x190
[  127.764083]  ret_from_fork+0x10/0x20
[  127.765070] 
[  127.765603] Allocated by task 140:
[  127.766381]  kasan_save_stack+0x3c/0x70
[  127.767437]  kasan_set_track+0x2c/0x40
[  127.769055]  kasan_save_alloc_info+0x24/0x34
[  127.770139]  __kasan_kmalloc+0xb8/0xc0
[  127.771090]  kmalloc_trace+0x58/0x6c
[  127.772052]  kmalloc_oob_memset_16+0x98/0x200
[  127.773147]  kunit_try_run_case+0x84/0x120
[  127.774151]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.775701]  kthread+0x180/0x190
[  127.776715]  ret_from_fork+0x10/0x20
[  127.778023] 
[  127.778547] The buggy address belongs to the object at ffff0000c5958400
[  127.778547]  which belongs to the cache kmalloc-128 of size 128
[  127.780468] The buggy address is located 105 bytes inside of
[  127.780468]  128-byte region [ffff0000c5958400, ffff0000c5958480)
[  127.782348] 
[  127.782893] The buggy address belongs to the physical page:
[  127.784593] page:000000002d103547 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[  127.786140] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.787593] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.788925] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.790205] page dumped because: kasan: bad access detected
[  127.791748] 
[  127.792209] Memory state around the buggy address:
[  127.793272]  ffff0000c5958300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.794871]  ffff0000c5958380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.796173] >ffff0000c5958400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  127.797449]                                                                 ^
[  127.798740]  ffff0000c5958480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.800111]  ffff0000c5958500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.801701] ==================================================================

test log snippet boot parser 150

Home

[  127.677886] ==================================================================
[  127.679552] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd0/0x200
[  127.681185] Write of size 8 at addr ffff0000c592d571 by task kunit_try_catch/139
[  127.682582] 
[  127.683189] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.684823] Hardware name: linux,dummy-virt (DT)
[  127.685778] Call trace:
[  127.686466]  dump_backtrace.part.0+0xdc/0xf0
[  127.687808]  show_stack+0x18/0x30
[  127.688841]  dump_stack_lvl+0x64/0x80
[  127.689938]  print_report+0x158/0x458
[  127.690874]  kasan_report+0xb4/0xf4
[  127.691803]  kasan_check_range+0xe4/0x190
[  127.692841]  memset+0x40/0x70
[  127.693734]  kmalloc_oob_memset_8+0xd0/0x200
[  127.694849]  kunit_try_run_case+0x84/0x120
[  127.696025]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.697256]  kthread+0x180/0x190
[  127.698161]  ret_from_fork+0x10/0x20
[  127.699466] 
[  127.699974] Allocated by task 139:
[  127.700748]  kasan_save_stack+0x3c/0x70
[  127.701796]  kasan_set_track+0x2c/0x40
[  127.702773]  kasan_save_alloc_info+0x24/0x34
[  127.703964]  __kasan_kmalloc+0xb8/0xc0
[  127.704977]  kmalloc_trace+0x58/0x6c
[  127.706004]  kmalloc_oob_memset_8+0x98/0x200
[  127.707431]  kunit_try_run_case+0x84/0x120
[  127.708372]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.709640]  kthread+0x180/0x190
[  127.710531]  ret_from_fork+0x10/0x20
[  127.711686] 
[  127.712174] The buggy address belongs to the object at ffff0000c592d500
[  127.712174]  which belongs to the cache kmalloc-128 of size 128
[  127.714119] The buggy address is located 113 bytes inside of
[  127.714119]  128-byte region [ffff0000c592d500, ffff0000c592d580)
[  127.716273] 
[  127.716695] The buggy address belongs to the physical page:
[  127.717752] page:0000000046ac9bf0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592d
[  127.719600] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.720903] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.722395] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.723795] page dumped because: kasan: bad access detected
[  127.724820] 
[  127.725290] Memory state around the buggy address:
[  127.726296]  ffff0000c592d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.727742]  ffff0000c592d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.729063] >ffff0000c592d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  127.730275]                                                                 ^
[  127.731837]  ffff0000c592d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.733145]  ffff0000c592d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.734375] ==================================================================

test log snippet boot parser 151

Home

[  127.542756] ==================================================================
[  127.544625] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd0/0x200
[  127.546067] Write of size 2 at addr ffff0000c5958077 by task kunit_try_catch/137
[  127.547518] 
[  127.548278] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.549912] Hardware name: linux,dummy-virt (DT)
[  127.550818] Call trace:
[  127.551530]  dump_backtrace.part.0+0xdc/0xf0
[  127.552851]  show_stack+0x18/0x30
[  127.553904]  dump_stack_lvl+0x64/0x80
[  127.554931]  print_report+0x158/0x458
[  127.555977]  kasan_report+0xb4/0xf4
[  127.556962]  kasan_check_range+0xe4/0x190
[  127.558089]  memset+0x40/0x70
[  127.558978]  kmalloc_oob_memset_2+0xd0/0x200
[  127.560365]  kunit_try_run_case+0x84/0x120
[  127.561532]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.562746]  kthread+0x180/0x190
[  127.563944]  ret_from_fork+0x10/0x20
[  127.564983] 
[  127.565576] Allocated by task 137:
[  127.566156]  kasan_save_stack+0x3c/0x70
[  127.567186]  kasan_set_track+0x2c/0x40
[  127.568582]  kasan_save_alloc_info+0x24/0x34
[  127.569600]  __kasan_kmalloc+0xb8/0xc0
[  127.570481]  kmalloc_trace+0x58/0x6c
[  127.571501]  kmalloc_oob_memset_2+0x98/0x200
[  127.572615]  kunit_try_run_case+0x84/0x120
[  127.573673]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.574949]  kthread+0x180/0x190
[  127.575863]  ret_from_fork+0x10/0x20
[  127.576813] 
[  127.577262] The buggy address belongs to the object at ffff0000c5958000
[  127.577262]  which belongs to the cache kmalloc-128 of size 128
[  127.579763] The buggy address is located 119 bytes inside of
[  127.579763]  128-byte region [ffff0000c5958000, ffff0000c5958080)
[  127.581471] 
[  127.581964] The buggy address belongs to the physical page:
[  127.582963] page:000000002d103547 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[  127.584639] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.586149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.587482] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.589231] page dumped because: kasan: bad access detected
[  127.590276] 
[  127.590687] Memory state around the buggy address:
[  127.592049]  ffff0000c5957f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  127.593383]  ffff0000c5957f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  127.594733] >ffff0000c5958000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  127.596234]                                                                 ^
[  127.597741]  ffff0000c5958080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.598963]  ffff0000c5958100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.600200] ==================================================================

test log snippet boot parser 152

Home

[  125.805164] ==================================================================
[  125.806384] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc0/0x340
[  125.809036] Write of size 1 at addr ffff0000c5a01973 by task kunit_try_catch/120
[  125.810569] 
[  125.811582] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[  125.813572] Hardware name: linux,dummy-virt (DT)
[  125.814978] Call trace:
[  125.815744]  dump_backtrace.part.0+0xdc/0xf0
[  125.817054]  show_stack+0x18/0x30
[  125.818039]  dump_stack_lvl+0x64/0x80
[  125.819138]  print_report+0x158/0x458
[  125.820447]  kasan_report+0xb4/0xf4
[  125.821500]  __asan_store1+0x68/0x7c
[  125.822428]  kmalloc_oob_right+0xc0/0x340
[  125.823557]  kunit_try_run_case+0x84/0x120
[  125.824702]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  125.825752]  kthread+0x180/0x190
[  125.826231]  ret_from_fork+0x10/0x20
[  125.827251] 
[  125.828018] Allocated by task 120:
[  125.828997]  kasan_save_stack+0x3c/0x70
[  125.830588]  kasan_set_track+0x2c/0x40
[  125.831648]  kasan_save_alloc_info+0x24/0x34
[  125.832967]  __kasan_kmalloc+0xb8/0xc0
[  125.833913]  kmalloc_trace+0x58/0x6c
[  125.834943]  kmalloc_oob_right+0x98/0x340
[  125.836204]  kunit_try_run_case+0x84/0x120
[  125.837362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  125.838685]  kthread+0x180/0x190
[  125.839775]  ret_from_fork+0x10/0x20
[  125.840928] 
[  125.841582] The buggy address belongs to the object at ffff0000c5a01900
[  125.841582]  which belongs to the cache kmalloc-128 of size 128
[  125.843260] The buggy address is located 115 bytes inside of
[  125.843260]  128-byte region [ffff0000c5a01900, ffff0000c5a01980)
[  125.845473] 
[  125.846208] The buggy address belongs to the physical page:
[  125.847940] page:0000000096bca9fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[  125.849798] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  125.851975] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  125.853523] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  125.854602] page dumped because: kasan: bad access detected
[  125.855876] 
[  125.856380] Memory state around the buggy address:
[  125.857844]  ffff0000c5a01800: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.859117]  ffff0000c5a01880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.860669] >ffff0000c5a01900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  125.862450]                                                              ^
[  125.864147]  ffff0000c5a01980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.865090]  ffff0000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.866379] ==================================================================

test log snippet boot parser 153

Home

[  125.870334] ==================================================================
[  125.871694] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe4/0x340
[  125.873244] Write of size 1 at addr ffff0000c5a01978 by task kunit_try_catch/120
[  125.874646] 
[  125.875252] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  125.876843] Hardware name: linux,dummy-virt (DT)
[  125.877999] Call trace:
[  125.878644]  dump_backtrace.part.0+0xdc/0xf0
[  125.879895]  show_stack+0x18/0x30
[  125.881037]  dump_stack_lvl+0x64/0x80
[  125.882015]  print_report+0x158/0x458
[  125.882636]  kasan_report+0xb4/0xf4
[  125.883823]  __asan_store1+0x68/0x7c
[  125.884808]  kmalloc_oob_right+0xe4/0x340
[  125.886140]  kunit_try_run_case+0x84/0x120
[  125.887288]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  125.888761]  kthread+0x180/0x190
[  125.889566]  ret_from_fork+0x10/0x20
[  125.890077] 
[  125.890321] Allocated by task 120:
[  125.890955]  kasan_save_stack+0x3c/0x70
[  125.892149]  kasan_set_track+0x2c/0x40
[  125.893217]  kasan_save_alloc_info+0x24/0x34
[  125.894423]  __kasan_kmalloc+0xb8/0xc0
[  125.895502]  kmalloc_trace+0x58/0x6c
[  125.896554]  kmalloc_oob_right+0x98/0x340
[  125.897673]  kunit_try_run_case+0x84/0x120
[  125.898697]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  125.900240]  kthread+0x180/0x190
[  125.901182]  ret_from_fork+0x10/0x20
[  125.902089] 
[  125.902624] The buggy address belongs to the object at ffff0000c5a01900
[  125.902624]  which belongs to the cache kmalloc-128 of size 128
[  125.905004] The buggy address is located 120 bytes inside of
[  125.905004]  128-byte region [ffff0000c5a01900, ffff0000c5a01980)
[  125.906962] 
[  125.907698] The buggy address belongs to the physical page:
[  125.908733] page:0000000096bca9fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[  125.910266] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  125.911896] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  125.913528] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  125.914817] page dumped because: kasan: bad access detected
[  125.916151] 
[  125.916687] Memory state around the buggy address:
[  125.918050]  ffff0000c5a01800: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.919215]  ffff0000c5a01880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.920625] >ffff0000c5a01900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  125.921970]                                                                 ^
[  125.923203]  ffff0000c5a01980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.924383]  ffff0000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.925715] ==================================================================

test log snippet boot parser 154

Home

[  125.927541] ==================================================================
[  125.928777] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x340
[  125.930586] Read of size 1 at addr ffff0000c5a01980 by task kunit_try_catch/120
[  125.931860] 
[  125.932398] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  125.934188] Hardware name: linux,dummy-virt (DT)
[  125.935157] Call trace:
[  125.935945]  dump_backtrace.part.0+0xdc/0xf0
[  125.937382]  show_stack+0x18/0x30
[  125.938527]  dump_stack_lvl+0x64/0x80
[  125.939805]  print_report+0x158/0x458
[  125.940792]  kasan_report+0xb4/0xf4
[  125.941880]  __asan_load1+0x68/0x74
[  125.942811]  kmalloc_oob_right+0x108/0x340
[  125.943921]  kunit_try_run_case+0x84/0x120
[  125.944978]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  125.946252]  kthread+0x180/0x190
[  125.947170]  ret_from_fork+0x10/0x20
[  125.948206] 
[  125.949164] Allocated by task 120:
[  125.950008]  kasan_save_stack+0x3c/0x70
[  125.951038]  kasan_set_track+0x2c/0x40
[  125.952179]  kasan_save_alloc_info+0x24/0x34
[  125.953242]  __kasan_kmalloc+0xb8/0xc0
[  125.954226]  kmalloc_trace+0x58/0x6c
[  125.955286]  kmalloc_oob_right+0x98/0x340
[  125.956927]  kunit_try_run_case+0x84/0x120
[  125.958041]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  125.959340]  kthread+0x180/0x190
[  125.960197]  ret_from_fork+0x10/0x20
[  125.960929] 
[  125.961494] The buggy address belongs to the object at ffff0000c5a01900
[  125.961494]  which belongs to the cache kmalloc-128 of size 128
[  125.963665] The buggy address is located 0 bytes to the right of
[  125.963665]  128-byte region [ffff0000c5a01900, ffff0000c5a01980)
[  125.965774] 
[  125.966267] The buggy address belongs to the physical page:
[  125.967295] page:0000000096bca9fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[  125.969265] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  125.970723] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  125.972535] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  125.973896] page dumped because: kasan: bad access detected
[  125.974923] 
[  125.975622] Memory state around the buggy address:
[  125.976769]  ffff0000c5a01880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.978188]  ffff0000c5a01900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  125.979875] >ffff0000c5a01980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.981017]                    ^
[  125.981929]  ffff0000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.983652]  ffff0000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.984543] ==================================================================

test log snippet boot parser 155

Home

[  126.132747] ==================================================================
[  126.134501] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xa4/0x1e0
[  126.136109] Write of size 1 at addr ffff0000c599600a by task kunit_try_catch/123
[  126.137429] 
[  126.137976] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.139665] Hardware name: linux,dummy-virt (DT)
[  126.140638] Call trace:
[  126.141353]  dump_backtrace.part.0+0xdc/0xf0
[  126.142513]  show_stack+0x18/0x30
[  126.143540]  dump_stack_lvl+0x64/0x80
[  126.144665]  print_report+0x158/0x458
[  126.145609]  kasan_report+0xb4/0xf4
[  126.146526]  __asan_store1+0x68/0x7c
[  126.147564]  kmalloc_pagealloc_oob_right+0xa4/0x1e0
[  126.148727]  kunit_try_run_case+0x84/0x120
[  126.149856]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.151260]  kthread+0x180/0x190
[  126.152163]  ret_from_fork+0x10/0x20
[  126.153097] 
[  126.153619] The buggy address belongs to the physical page:
[  126.154780] page:0000000090fd5843 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105994
[  126.156390] head:0000000090fd5843 order:2 compound_mapcount:0 compound_pincount:0
[  126.157745] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.159170] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.160611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.161907] page dumped because: kasan: bad access detected
[  126.162909] 
[  126.163550] Memory state around the buggy address:
[  126.164609]  ffff0000c5995f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.165892]  ffff0000c5995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.167264] >ffff0000c5996000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.168231]                       ^
[  126.168891]  ffff0000c5996080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.170254]  ffff0000c5996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.171600] ==================================================================

test log snippet boot parser 156

Home

[  128.208307] ==================================================================
[  128.209904] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x250
[  128.211233] Read of size 1 at addr ffff0000c59430c8 by task kunit_try_catch/149
[  128.213479] 
[  128.214064] CPU: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.216524] Hardware name: linux,dummy-virt (DT)
[  128.217521] Call trace:
[  128.218235]  dump_backtrace.part.0+0xdc/0xf0
[  128.219774]  show_stack+0x18/0x30
[  128.220761]  dump_stack_lvl+0x64/0x80
[  128.221818]  print_report+0x158/0x458
[  128.222777]  kasan_report+0xb4/0xf4
[  128.223765]  __asan_load1+0x68/0x74
[  128.224809]  kmem_cache_oob+0xd4/0x250
[  128.225921]  kunit_try_run_case+0x84/0x120
[  128.227032]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.228503]  kthread+0x180/0x190
[  128.229448]  ret_from_fork+0x10/0x20
[  128.230433] 
[  128.230965] Allocated by task 149:
[  128.231979]  kasan_save_stack+0x3c/0x70
[  128.232921]  kasan_set_track+0x2c/0x40
[  128.234024]  kasan_save_alloc_info+0x24/0x34
[  128.235155]  __kasan_slab_alloc+0x8c/0x90
[  128.236154]  kmem_cache_alloc+0x170/0x2d0
[  128.237208]  kmem_cache_oob+0xb4/0x250
[  128.238386]  kunit_try_run_case+0x84/0x120
[  128.239529]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.240941]  kthread+0x180/0x190
[  128.241934]  ret_from_fork+0x10/0x20
[  128.242871] 
[  128.243653] The buggy address belongs to the object at ffff0000c5943000
[  128.243653]  which belongs to the cache test_cache of size 200
[  128.245738] The buggy address is located 0 bytes to the right of
[  128.245738]  200-byte region [ffff0000c5943000, ffff0000c59430c8)
[  128.248308] 
[  128.248860] The buggy address belongs to the physical page:
[  128.250143] page:000000004e5c10e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105943
[  128.251930] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.253243] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c140d500
[  128.254662] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  128.256064] page dumped because: kasan: bad access detected
[  128.256953] 
[  128.257582] Memory state around the buggy address:
[  128.258604]  ffff0000c5942f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.260227]  ffff0000c5943000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.261577] >ffff0000c5943080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  128.262819]                                               ^
[  128.263976]  ffff0000c5943100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.265512]  ffff0000c5943180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.266739] ==================================================================

test log snippet boot parser 157

Home

[  127.077004] ==================================================================
[  127.078139] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0
[  127.079994] Write of size 1 at addr ffff0000c599a0ea by task kunit_try_catch/132
[  127.082212] 
[  127.082758] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.084195] Hardware name: linux,dummy-virt (DT)
[  127.085090] Call trace:
[  127.085753]  dump_backtrace.part.0+0xdc/0xf0
[  127.086818]  show_stack+0x18/0x30
[  127.087809]  dump_stack_lvl+0x64/0x80
[  127.088999]  print_report+0x158/0x458
[  127.090078]  kasan_report+0xb4/0xf4
[  127.091051]  __asan_store1+0x68/0x7c
[  127.091940]  krealloc_less_oob_helper+0x1a8/0x5b0
[  127.093126]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.094296]  kunit_try_run_case+0x84/0x120
[  127.095386]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.097121]  kthread+0x180/0x190
[  127.098030]  ret_from_fork+0x10/0x20
[  127.099105] 
[  127.099553] The buggy address belongs to the physical page:
[  127.100572] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  127.102113] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  127.103356] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.104891] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.106324] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.108017] page dumped because: kasan: bad access detected
[  127.109042] 
[  127.109508] Memory state around the buggy address:
[  127.110563]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.112606]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.113896] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.115142]                                                           ^
[  127.116280]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.117593]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.118859] ==================================================================

test log snippet boot parser 158

Home

[  126.530707] ==================================================================
[  126.532572] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0
[  126.534283] Write of size 1 at addr ffff0000c54ad8c9 by task kunit_try_catch/130
[  126.535551] 
[  126.536111] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.537765] Hardware name: linux,dummy-virt (DT)
[  126.538608] Call trace:
[  126.539509]  dump_backtrace.part.0+0xdc/0xf0
[  126.540655]  show_stack+0x18/0x30
[  126.541625]  dump_stack_lvl+0x64/0x80
[  126.542637]  print_report+0x158/0x458
[  126.543895]  kasan_report+0xb4/0xf4
[  126.544867]  __asan_store1+0x68/0x7c
[  126.545817]  krealloc_less_oob_helper+0x10c/0x5b0
[  126.546980]  krealloc_less_oob+0x18/0x2c
[  126.548227]  kunit_try_run_case+0x84/0x120
[  126.549229]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.550530]  kthread+0x180/0x190
[  126.551520]  ret_from_fork+0x10/0x20
[  126.552447] 
[  126.552950] Allocated by task 130:
[  126.553765]  kasan_save_stack+0x3c/0x70
[  126.554807]  kasan_set_track+0x2c/0x40
[  126.555775]  kasan_save_alloc_info+0x24/0x34
[  126.556957]  __kasan_krealloc+0xf0/0x120
[  126.558215]  krealloc+0x154/0x1a0
[  126.559259]  krealloc_less_oob_helper+0xd0/0x5b0
[  126.560537]  krealloc_less_oob+0x18/0x2c
[  126.561539]  kunit_try_run_case+0x84/0x120
[  126.562584]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.563878]  kthread+0x180/0x190
[  126.564902]  ret_from_fork+0x10/0x20
[  126.565873] 
[  126.566329] The buggy address belongs to the object at ffff0000c54ad800
[  126.566329]  which belongs to the cache kmalloc-256 of size 256
[  126.568237] The buggy address is located 201 bytes inside of
[  126.568237]  256-byte region [ffff0000c54ad800, ffff0000c54ad900)
[  126.570353] 
[  126.570892] The buggy address belongs to the physical page:
[  126.572948] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  126.574533] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  126.575884] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.577420] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.579022] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.580628] page dumped because: kasan: bad access detected
[  126.581696] 
[  126.582153] Memory state around the buggy address:
[  126.583561]  ffff0000c54ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.584676]  ffff0000c54ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.586020] >ffff0000c54ad880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  126.587540]                                               ^
[  126.588637]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.590019]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.591575] ==================================================================

test log snippet boot parser 159

Home

[  126.990500] ==================================================================
[  126.992119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0
[  126.994071] Write of size 1 at addr ffff0000c599a0d0 by task kunit_try_catch/132
[  126.995334] 
[  126.995901] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.997432] Hardware name: linux,dummy-virt (DT)
[  126.998352] Call trace:
[  126.998957]  dump_backtrace.part.0+0xdc/0xf0
[  127.000292]  show_stack+0x18/0x30
[  127.001666]  dump_stack_lvl+0x64/0x80
[  127.002638]  print_report+0x158/0x458
[  127.003566]  kasan_report+0xb4/0xf4
[  127.004518]  __asan_store1+0x68/0x7c
[  127.005416]  krealloc_less_oob_helper+0x138/0x5b0
[  127.006623]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.007916]  kunit_try_run_case+0x84/0x120
[  127.008971]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.010177]  kthread+0x180/0x190
[  127.011195]  ret_from_fork+0x10/0x20
[  127.012224] 
[  127.012750] The buggy address belongs to the physical page:
[  127.013758] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  127.015805] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  127.017098] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.018553] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.019938] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.021151] page dumped because: kasan: bad access detected
[  127.022177] 
[  127.022702] Memory state around the buggy address:
[  127.023761]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.025002]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.026444] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.027792]                                                  ^
[  127.028986]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.030262]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.031671] ==================================================================

test log snippet boot parser 160

Home

[  126.724111] ==================================================================
[  126.725469] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0
[  126.727383] Write of size 1 at addr ffff0000c54ad8ea by task kunit_try_catch/130
[  126.728557] 
[  126.729099] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.730584] Hardware name: linux,dummy-virt (DT)
[  126.731786] Call trace:
[  126.732769]  dump_backtrace.part.0+0xdc/0xf0
[  126.734017]  show_stack+0x18/0x30
[  126.734996]  dump_stack_lvl+0x64/0x80
[  126.736352]  print_report+0x158/0x458
[  126.737340]  kasan_report+0xb4/0xf4
[  126.738260]  __asan_store1+0x68/0x7c
[  126.739273]  krealloc_less_oob_helper+0x1a8/0x5b0
[  126.740515]  krealloc_less_oob+0x18/0x2c
[  126.741783]  kunit_try_run_case+0x84/0x120
[  126.742879]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.744170]  kthread+0x180/0x190
[  126.745170]  ret_from_fork+0x10/0x20
[  126.746133] 
[  126.746611] Allocated by task 130:
[  126.747847]  kasan_save_stack+0x3c/0x70
[  126.749047]  kasan_set_track+0x2c/0x40
[  126.750099]  kasan_save_alloc_info+0x24/0x34
[  126.751607]  __kasan_krealloc+0xf0/0x120
[  126.752661]  krealloc+0x154/0x1a0
[  126.753626]  krealloc_less_oob_helper+0xd0/0x5b0
[  126.754779]  krealloc_less_oob+0x18/0x2c
[  126.755852]  kunit_try_run_case+0x84/0x120
[  126.757134]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.758503]  kthread+0x180/0x190
[  126.759465]  ret_from_fork+0x10/0x20
[  126.760816] 
[  126.761326] The buggy address belongs to the object at ffff0000c54ad800
[  126.761326]  which belongs to the cache kmalloc-256 of size 256
[  126.763228] The buggy address is located 234 bytes inside of
[  126.763228]  256-byte region [ffff0000c54ad800, ffff0000c54ad900)
[  126.765775] 
[  126.766308] The buggy address belongs to the physical page:
[  126.767738] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  126.769333] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  126.770707] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.772424] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.773996] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.775229] page dumped because: kasan: bad access detected
[  126.776397] 
[  126.776922] Memory state around the buggy address:
[  126.777916]  ffff0000c54ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.779332]  ffff0000c54ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.780516] >ffff0000c54ad880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  126.781854]                                                           ^
[  126.783176]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.784557]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.785891] ==================================================================

test log snippet boot parser 161

Home

[  127.034361] ==================================================================
[  127.035432] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0
[  127.037160] Write of size 1 at addr ffff0000c599a0da by task kunit_try_catch/132
[  127.038666] 
[  127.039448] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.041080] Hardware name: linux,dummy-virt (DT)
[  127.042051] Call trace:
[  127.042760]  dump_backtrace.part.0+0xdc/0xf0
[  127.043894]  show_stack+0x18/0x30
[  127.044879]  dump_stack_lvl+0x64/0x80
[  127.045931]  print_report+0x158/0x458
[  127.046876]  kasan_report+0xb4/0xf4
[  127.048076]  __asan_store1+0x68/0x7c
[  127.048993]  krealloc_less_oob_helper+0x180/0x5b0
[  127.050419]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.051647]  kunit_try_run_case+0x84/0x120
[  127.052743]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.053947]  kthread+0x180/0x190
[  127.054860]  ret_from_fork+0x10/0x20
[  127.056297] 
[  127.056884] The buggy address belongs to the physical page:
[  127.057982] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  127.059484] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  127.060781] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.062271] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.063744] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.065264] page dumped because: kasan: bad access detected
[  127.066355] 
[  127.066884] Memory state around the buggy address:
[  127.067906]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.069182]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.070548] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.071810]                                                     ^
[  127.073000]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.074117]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.075434] ==================================================================

test log snippet boot parser 162

Home

[  126.946463] ==================================================================
[  126.948546] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0
[  126.949975] Write of size 1 at addr ffff0000c599a0c9 by task kunit_try_catch/132
[  126.951379] 
[  126.951945] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.953725] Hardware name: linux,dummy-virt (DT)
[  126.954600] Call trace:
[  126.955188]  dump_backtrace.part.0+0xdc/0xf0
[  126.956538]  show_stack+0x18/0x30
[  126.957512]  dump_stack_lvl+0x64/0x80
[  126.958543]  print_report+0x158/0x458
[  126.959546]  kasan_report+0xb4/0xf4
[  126.960469]  __asan_store1+0x68/0x7c
[  126.961301]  krealloc_less_oob_helper+0x10c/0x5b0
[  126.962463]  krealloc_pagealloc_less_oob+0x18/0x24
[  126.963860]  kunit_try_run_case+0x84/0x120
[  126.964911]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.966179]  kthread+0x180/0x190
[  126.968053]  ret_from_fork+0x10/0x20
[  126.968856] 
[  126.969351] The buggy address belongs to the physical page:
[  126.970449] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  126.971960] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  126.973271] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.974700] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.976117] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.977659] page dumped because: kasan: bad access detected
[  126.978757] 
[  126.979292] Memory state around the buggy address:
[  126.980302]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.981640]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.983073] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  126.984286]                                               ^
[  126.985736]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.987371]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.988604] ==================================================================

test log snippet boot parser 163

Home

[  126.658906] ==================================================================
[  126.660055] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0
[  126.662370] Write of size 1 at addr ffff0000c54ad8da by task kunit_try_catch/130
[  126.664259] 
[  126.664771] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.668038] Hardware name: linux,dummy-virt (DT)
[  126.668786] Call trace:
[  126.669373]  dump_backtrace.part.0+0xdc/0xf0
[  126.670561]  show_stack+0x18/0x30
[  126.671591]  dump_stack_lvl+0x64/0x80
[  126.672597]  print_report+0x158/0x458
[  126.673698]  kasan_report+0xb4/0xf4
[  126.674673]  __asan_store1+0x68/0x7c
[  126.675847]  krealloc_less_oob_helper+0x180/0x5b0
[  126.677068]  krealloc_less_oob+0x18/0x2c
[  126.678078]  kunit_try_run_case+0x84/0x120
[  126.679730]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.680768]  kthread+0x180/0x190
[  126.681674]  ret_from_fork+0x10/0x20
[  126.682642] 
[  126.683108] Allocated by task 130:
[  126.683930]  kasan_save_stack+0x3c/0x70
[  126.684919]  kasan_set_track+0x2c/0x40
[  126.685886]  kasan_save_alloc_info+0x24/0x34
[  126.686977]  __kasan_krealloc+0xf0/0x120
[  126.688008]  krealloc+0x154/0x1a0
[  126.688973]  krealloc_less_oob_helper+0xd0/0x5b0
[  126.690274]  krealloc_less_oob+0x18/0x2c
[  126.691492]  kunit_try_run_case+0x84/0x120
[  126.692647]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.693928]  kthread+0x180/0x190
[  126.694872]  ret_from_fork+0x10/0x20
[  126.695834] 
[  126.697000] The buggy address belongs to the object at ffff0000c54ad800
[  126.697000]  which belongs to the cache kmalloc-256 of size 256
[  126.698860] The buggy address is located 218 bytes inside of
[  126.698860]  256-byte region [ffff0000c54ad800, ffff0000c54ad900)
[  126.701042] 
[  126.701614] The buggy address belongs to the physical page:
[  126.702667] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  126.704293] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  126.705678] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.707186] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.708885] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.710218] page dumped because: kasan: bad access detected
[  126.711622] 
[  126.712380] Memory state around the buggy address:
[  126.713359]  ffff0000c54ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.714779]  ffff0000c54ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.716077] >ffff0000c54ad880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  126.717605]                                                     ^
[  126.718757]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.720192]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.721390] ==================================================================

test log snippet boot parser 164

Home

[  126.595707] ==================================================================
[  126.596697] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0
[  126.597586] Write of size 1 at addr ffff0000c54ad8d0 by task kunit_try_catch/130
[  126.599012] 
[  126.600225] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.601727] Hardware name: linux,dummy-virt (DT)
[  126.602645] Call trace:
[  126.603566]  dump_backtrace.part.0+0xdc/0xf0
[  126.604751]  show_stack+0x18/0x30
[  126.605612]  dump_stack_lvl+0x64/0x80
[  126.606766]  print_report+0x158/0x458
[  126.607986]  kasan_report+0xb4/0xf4
[  126.608899]  __asan_store1+0x68/0x7c
[  126.609878]  krealloc_less_oob_helper+0x138/0x5b0
[  126.611077]  krealloc_less_oob+0x18/0x2c
[  126.612091]  kunit_try_run_case+0x84/0x120
[  126.613118]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.614709]  kthread+0x180/0x190
[  126.615515]  ret_from_fork+0x10/0x20
[  126.616642] 
[  126.617157] Allocated by task 130:
[  126.617994]  kasan_save_stack+0x3c/0x70
[  126.618997]  kasan_set_track+0x2c/0x40
[  126.619893]  kasan_save_alloc_info+0x24/0x34
[  126.621102]  __kasan_krealloc+0xf0/0x120
[  126.622190]  krealloc+0x154/0x1a0
[  126.623438]  krealloc_less_oob_helper+0xd0/0x5b0
[  126.624685]  krealloc_less_oob+0x18/0x2c
[  126.625711]  kunit_try_run_case+0x84/0x120
[  126.626779]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.628136]  kthread+0x180/0x190
[  126.629513]  ret_from_fork+0x10/0x20
[  126.630545] 
[  126.631041] The buggy address belongs to the object at ffff0000c54ad800
[  126.631041]  which belongs to the cache kmalloc-256 of size 256
[  126.633273] The buggy address is located 208 bytes inside of
[  126.633273]  256-byte region [ffff0000c54ad800, ffff0000c54ad900)
[  126.635476] 
[  126.635948] The buggy address belongs to the physical page:
[  126.637154] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  126.638701] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  126.640340] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.641846] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.643241] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.644536] page dumped because: kasan: bad access detected
[  126.645617] 
[  126.646103] Memory state around the buggy address:
[  126.647236]  ffff0000c54ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.648974]  ffff0000c54ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.650458] >ffff0000c54ad880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  126.651835]                                                  ^
[  126.652995]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.654446]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.655994] ==================================================================

test log snippet boot parser 165

Home

[  127.121486] ==================================================================
[  127.122719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0
[  127.124181] Write of size 1 at addr ffff0000c599a0eb by task kunit_try_catch/132
[  127.125541] 
[  127.126085] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.127587] Hardware name: linux,dummy-virt (DT)
[  127.128450] Call trace:
[  127.129095]  dump_backtrace.part.0+0xdc/0xf0
[  127.130445]  show_stack+0x18/0x30
[  127.131537]  dump_stack_lvl+0x64/0x80
[  127.132598]  print_report+0x158/0x458
[  127.133619]  kasan_report+0xb4/0xf4
[  127.134544]  __asan_store1+0x68/0x7c
[  127.135660]  krealloc_less_oob_helper+0x1cc/0x5b0
[  127.137223]  krealloc_pagealloc_less_oob+0x18/0x24
[  127.138396]  kunit_try_run_case+0x84/0x120
[  127.139507]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.140706]  kthread+0x180/0x190
[  127.141617]  ret_from_fork+0x10/0x20
[  127.142524] 
[  127.143034] The buggy address belongs to the physical page:
[  127.144043] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  127.145618] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  127.147103] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  127.148834] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  127.150124] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  127.151486] page dumped because: kasan: bad access detected
[  127.152462] 
[  127.153040] Memory state around the buggy address:
[  127.154564]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.155894]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  127.157231] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  127.158458]                                                           ^
[  127.160017]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.161392]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  127.162591] ==================================================================

test log snippet boot parser 166

Home

[  126.788433] ==================================================================
[  126.789598] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0
[  126.791263] Write of size 1 at addr ffff0000c54ad8eb by task kunit_try_catch/130
[  126.792577] 
[  126.793124] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.795474] Hardware name: linux,dummy-virt (DT)
[  126.796443] Call trace:
[  126.797097]  dump_backtrace.part.0+0xdc/0xf0
[  126.798639]  show_stack+0x18/0x30
[  126.799677]  dump_stack_lvl+0x64/0x80
[  126.800711]  print_report+0x158/0x458
[  126.801694]  kasan_report+0xb4/0xf4
[  126.802585]  __asan_store1+0x68/0x7c
[  126.803583]  krealloc_less_oob_helper+0x1cc/0x5b0
[  126.804730]  krealloc_less_oob+0x18/0x2c
[  126.805889]  kunit_try_run_case+0x84/0x120
[  126.807010]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.808246]  kthread+0x180/0x190
[  126.809113]  ret_from_fork+0x10/0x20
[  126.810078] 
[  126.810551] Allocated by task 130:
[  126.811435]  kasan_save_stack+0x3c/0x70
[  126.812427]  kasan_set_track+0x2c/0x40
[  126.813763]  kasan_save_alloc_info+0x24/0x34
[  126.814818]  __kasan_krealloc+0xf0/0x120
[  126.815772]  krealloc+0x154/0x1a0
[  126.816711]  krealloc_less_oob_helper+0xd0/0x5b0
[  126.817830]  krealloc_less_oob+0x18/0x2c
[  126.818929]  kunit_try_run_case+0x84/0x120
[  126.820095]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.821553]  kthread+0x180/0x190
[  126.822500]  ret_from_fork+0x10/0x20
[  126.823463] 
[  126.823950] The buggy address belongs to the object at ffff0000c54ad800
[  126.823950]  which belongs to the cache kmalloc-256 of size 256
[  126.825850] The buggy address is located 235 bytes inside of
[  126.825850]  256-byte region [ffff0000c54ad800, ffff0000c54ad900)
[  126.827711] 
[  126.828220] The buggy address belongs to the physical page:
[  126.829247] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  126.830900] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  126.832327] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.833837] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.835275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.836898] page dumped because: kasan: bad access detected
[  126.838255] 
[  126.838853] Memory state around the buggy address:
[  126.839935]  ffff0000c54ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.841269]  ffff0000c54ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.842632] >ffff0000c54ad880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  126.843947]                                                           ^
[  126.845297]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.846797]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.848051] ==================================================================

test log snippet boot parser 167

Home

[  126.461383] ==================================================================
[  126.462723] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370
[  126.464528] Write of size 1 at addr ffff0000c55cf8f0 by task kunit_try_catch/129
[  126.466080] 
[  126.466592] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.468165] Hardware name: linux,dummy-virt (DT)
[  126.469032] Call trace:
[  126.469960]  dump_backtrace.part.0+0xdc/0xf0
[  126.471045]  show_stack+0x18/0x30
[  126.472079]  dump_stack_lvl+0x64/0x80
[  126.473083]  print_report+0x158/0x458
[  126.474126]  kasan_report+0xb4/0xf4
[  126.474999]  __asan_store1+0x68/0x7c
[  126.476320]  krealloc_more_oob_helper+0x160/0x370
[  126.477516]  krealloc_more_oob+0x18/0x2c
[  126.478641]  kunit_try_run_case+0x84/0x120
[  126.479747]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.480772]  kthread+0x180/0x190
[  126.481735]  ret_from_fork+0x10/0x20
[  126.482678] 
[  126.483583] Allocated by task 129:
[  126.484454]  kasan_save_stack+0x3c/0x70
[  126.485477]  kasan_set_track+0x2c/0x40
[  126.486398]  kasan_save_alloc_info+0x24/0x34
[  126.487579]  __kasan_krealloc+0xf0/0x120
[  126.488748]  krealloc+0x154/0x1a0
[  126.489644]  krealloc_more_oob_helper+0xd0/0x370
[  126.490873]  krealloc_more_oob+0x18/0x2c
[  126.492065]  kunit_try_run_case+0x84/0x120
[  126.493505]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.494744]  kthread+0x180/0x190
[  126.495682]  ret_from_fork+0x10/0x20
[  126.496700] 
[  126.497206] The buggy address belongs to the object at ffff0000c55cf800
[  126.497206]  which belongs to the cache kmalloc-256 of size 256
[  126.499135] The buggy address is located 240 bytes inside of
[  126.499135]  256-byte region [ffff0000c55cf800, ffff0000c55cf900)
[  126.501013] 
[  126.501690] The buggy address belongs to the physical page:
[  126.503128] page:0000000023bfd232 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055ce
[  126.504776] head:0000000023bfd232 order:1 compound_mapcount:0 compound_pincount:0
[  126.506035] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.507805] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.509143] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.510465] page dumped because: kasan: bad access detected
[  126.511461] 
[  126.511923] Memory state around the buggy address:
[  126.512930]  ffff0000c55cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.514275]  ffff0000c55cf800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.515728] >ffff0000c55cf880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  126.517007]                                                              ^
[  126.517992]  ffff0000c55cf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.519940]  ffff0000c55cf980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.521082] ==================================================================

test log snippet boot parser 168

Home

[  126.897475] ==================================================================
[  126.898890] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370
[  126.900631] Write of size 1 at addr ffff0000c599a0f0 by task kunit_try_catch/131
[  126.902242] 
[  126.902832] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.904689] Hardware name: linux,dummy-virt (DT)
[  126.905680] Call trace:
[  126.906275]  dump_backtrace.part.0+0xdc/0xf0
[  126.907397]  show_stack+0x18/0x30
[  126.908375]  dump_stack_lvl+0x64/0x80
[  126.909357]  print_report+0x158/0x458
[  126.910355]  kasan_report+0xb4/0xf4
[  126.911282]  __asan_store1+0x68/0x7c
[  126.912220]  krealloc_more_oob_helper+0x160/0x370
[  126.913343]  krealloc_pagealloc_more_oob+0x18/0x24
[  126.914554]  kunit_try_run_case+0x84/0x120
[  126.915607]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.916837]  kthread+0x180/0x190
[  126.917749]  ret_from_fork+0x10/0x20
[  126.918730] 
[  126.919180] The buggy address belongs to the physical page:
[  126.920207] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  126.921754] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  126.923034] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.924519] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.925908] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.927189] page dumped because: kasan: bad access detected
[  126.928210] 
[  126.928704] Memory state around the buggy address:
[  126.929654]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.930972]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.932277] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  126.933485]                                                              ^
[  126.934745]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.936052]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.937275] ==================================================================

test log snippet boot parser 169

Home

[  126.396694] ==================================================================
[  126.398372] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370
[  126.399957] Write of size 1 at addr ffff0000c55cf8eb by task kunit_try_catch/129
[  126.401320] 
[  126.402571] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.404247] Hardware name: linux,dummy-virt (DT)
[  126.405188] Call trace:
[  126.405802]  dump_backtrace.part.0+0xdc/0xf0
[  126.406905]  show_stack+0x18/0x30
[  126.408616]  dump_stack_lvl+0x64/0x80
[  126.409666]  print_report+0x158/0x458
[  126.410651]  kasan_report+0xb4/0xf4
[  126.411743]  __asan_store1+0x68/0x7c
[  126.412670]  krealloc_more_oob_helper+0x134/0x370
[  126.413857]  krealloc_more_oob+0x18/0x2c
[  126.414922]  kunit_try_run_case+0x84/0x120
[  126.415990]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.417226]  kthread+0x180/0x190
[  126.418187]  ret_from_fork+0x10/0x20
[  126.419374] 
[  126.420201] Allocated by task 129:
[  126.421020]  kasan_save_stack+0x3c/0x70
[  126.421973]  kasan_set_track+0x2c/0x40
[  126.422867]  kasan_save_alloc_info+0x24/0x34
[  126.424504]  __kasan_krealloc+0xf0/0x120
[  126.425462]  krealloc+0x154/0x1a0
[  126.426346]  krealloc_more_oob_helper+0xd0/0x370
[  126.427706]  krealloc_more_oob+0x18/0x2c
[  126.428802]  kunit_try_run_case+0x84/0x120
[  126.429856]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.431103]  kthread+0x180/0x190
[  126.431988]  ret_from_fork+0x10/0x20
[  126.433107] 
[  126.433634] The buggy address belongs to the object at ffff0000c55cf800
[  126.433634]  which belongs to the cache kmalloc-256 of size 256
[  126.436149] The buggy address is located 235 bytes inside of
[  126.436149]  256-byte region [ffff0000c55cf800, ffff0000c55cf900)
[  126.438346] 
[  126.438873] The buggy address belongs to the physical page:
[  126.440237] page:0000000023bfd232 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055ce
[  126.441727] head:0000000023bfd232 order:1 compound_mapcount:0 compound_pincount:0
[  126.443028] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  126.444586] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  126.446066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  126.447808] page dumped because: kasan: bad access detected
[  126.449492] 
[  126.449972] Memory state around the buggy address:
[  126.450821]  ffff0000c55cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.452285]  ffff0000c55cf800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.453673] >ffff0000c55cf880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  126.454916]                                                           ^
[  126.456084]  ffff0000c55cf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.457922]  ffff0000c55cf980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.459325] ==================================================================

test log snippet boot parser 170

Home

[  126.856331] ==================================================================
[  126.857956] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370
[  126.859422] Write of size 1 at addr ffff0000c599a0eb by task kunit_try_catch/131
[  126.860821] 
[  126.861373] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.862897] Hardware name: linux,dummy-virt (DT)
[  126.863799] Call trace:
[  126.864386]  dump_backtrace.part.0+0xdc/0xf0
[  126.865528]  show_stack+0x18/0x30
[  126.866488]  dump_stack_lvl+0x64/0x80
[  126.867572]  print_report+0x158/0x458
[  126.868495]  kasan_report+0xb4/0xf4
[  126.869399]  __asan_store1+0x68/0x7c
[  126.870350]  krealloc_more_oob_helper+0x134/0x370
[  126.871542]  krealloc_pagealloc_more_oob+0x18/0x24
[  126.872679]  kunit_try_run_case+0x84/0x120
[  126.873723]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.874976]  kthread+0x180/0x190
[  126.875878]  ret_from_fork+0x10/0x20
[  126.876834] 
[  126.877314] The buggy address belongs to the physical page:
[  126.878395] page:0000000000c31414 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[  126.879891] head:0000000000c31414 order:2 compound_mapcount:0 compound_pincount:0
[  126.881124] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  126.882570] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  126.883958] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  126.885244] page dumped because: kasan: bad access detected
[  126.886254] 
[  126.886778] Memory state around the buggy address:
[  126.887768]  ffff0000c5999f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.889072]  ffff0000c599a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.890388] >ffff0000c599a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  126.891578]                                                           ^
[  126.892680]  ffff0000c599a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.893982]  ffff0000c599a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  126.895222] ==================================================================

test log snippet boot parser 171

Home

[  129.090720] ==================================================================
[  129.092650] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xdc/0x1e0
[  129.094084] Read of size 1 at addr ffff0000c5945680 by task kunit_try_catch/157
[  129.095451] 
[  129.095995] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.097621] Hardware name: linux,dummy-virt (DT)
[  129.098542] Call trace:
[  129.099169]  dump_backtrace.part.0+0xdc/0xf0
[  129.100336]  show_stack+0x18/0x30
[  129.101324]  dump_stack_lvl+0x64/0x80
[  129.102399]  print_report+0x158/0x458
[  129.103559]  kasan_report+0xb4/0xf4
[  129.104511]  __asan_load1+0x68/0x74
[  129.105385]  ksize_unpoisons_memory+0xdc/0x1e0
[  129.106543]  kunit_try_run_case+0x84/0x120
[  129.107661]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.109117]  kthread+0x180/0x190
[  129.110018]  ret_from_fork+0x10/0x20
[  129.110995] 
[  129.111465] Allocated by task 157:
[  129.112486]  kasan_save_stack+0x3c/0x70
[  129.113361]  kasan_set_track+0x2c/0x40
[  129.114304]  kasan_save_alloc_info+0x24/0x34
[  129.115561]  __kasan_kmalloc+0xb8/0xc0
[  129.116534]  kmalloc_trace+0x58/0x6c
[  129.117521]  ksize_unpoisons_memory+0x98/0x1e0
[  129.118662]  kunit_try_run_case+0x84/0x120
[  129.119751]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.120762]  kthread+0x180/0x190
[  129.121266]  ret_from_fork+0x10/0x20
[  129.121773] 
[  129.122018] The buggy address belongs to the object at ffff0000c5945600
[  129.122018]  which belongs to the cache kmalloc-128 of size 128
[  129.123680] The buggy address is located 0 bytes to the right of
[  129.123680]  128-byte region [ffff0000c5945600, ffff0000c5945680)
[  129.126118] 
[  129.126662] The buggy address belongs to the physical page:
[  129.128042] page:000000003971b6df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945
[  129.129566] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.130933] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.132607] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.133900] page dumped because: kasan: bad access detected
[  129.134917] 
[  129.135418] Memory state around the buggy address:
[  129.136383]  ffff0000c5945580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.137836]  ffff0000c5945600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.139502] >ffff0000c5945680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.140673]                    ^
[  129.141494]  ffff0000c5945700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.142812]  ffff0000c5945780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.144314] ==================================================================

test log snippet boot parser 172

Home

[  129.652629] ==================================================================
[  129.654362] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80
[  129.655954] Read of size 1 at addr ffff0000c5945c18 by task kunit_try_catch/162
[  129.657150] 
[  129.657727] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.659343] Hardware name: linux,dummy-virt (DT)
[  129.660650] Call trace:
[  129.661372]  dump_backtrace.part.0+0xdc/0xf0
[  129.662488]  show_stack+0x18/0x30
[  129.663597]  dump_stack_lvl+0x64/0x80
[  129.664863]  print_report+0x158/0x458
[  129.665886]  kasan_report+0xb4/0xf4
[  129.666835]  __asan_load1+0x68/0x74
[  129.667770]  memchr+0x28/0x80
[  129.668971]  kasan_memchr+0xcc/0x200
[  129.669998]  kunit_try_run_case+0x84/0x120
[  129.671127]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.672452]  kthread+0x180/0x190
[  129.673526]  ret_from_fork+0x10/0x20
[  129.674669] 
[  129.675310] Allocated by task 162:
[  129.676332]  kasan_save_stack+0x3c/0x70
[  129.677299]  kasan_set_track+0x2c/0x40
[  129.678205]  kasan_save_alloc_info+0x24/0x34
[  129.679384]  __kasan_kmalloc+0xb8/0xc0
[  129.680301]  kmalloc_trace+0x58/0x6c
[  129.681093]  kasan_memchr+0x98/0x200
[  129.682201]  kunit_try_run_case+0x84/0x120
[  129.683322]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.684224]  kthread+0x180/0x190
[  129.684853]  ret_from_fork+0x10/0x20
[  129.685890] 
[  129.686416] The buggy address belongs to the object at ffff0000c5945c00
[  129.686416]  which belongs to the cache kmalloc-128 of size 128
[  129.688637] The buggy address is located 24 bytes inside of
[  129.688637]  128-byte region [ffff0000c5945c00, ffff0000c5945c80)
[  129.690746] 
[  129.691344] The buggy address belongs to the physical page:
[  129.692511] page:000000003971b6df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945
[  129.694163] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.695841] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.697474] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.698808] page dumped because: kasan: bad access detected
[  129.700227] 
[  129.700592] Memory state around the buggy address:
[  129.701591]  ffff0000c5945b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.702882]  ffff0000c5945b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.704287] >ffff0000c5945c00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.705692]                             ^
[  129.706677]  ffff0000c5945c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.708400]  ffff0000c5945d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.709501] ==================================================================

test log snippet boot parser 173

Home

[  129.720532] ==================================================================
[  129.722169] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[  129.723468] Read of size 1 at addr ffff0000c59fde18 by task kunit_try_catch/163
[  129.724910] 
[  129.725613] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.727603] Hardware name: linux,dummy-virt (DT)
[  129.728477] Call trace:
[  129.729148]  dump_backtrace.part.0+0xdc/0xf0
[  129.730293]  show_stack+0x18/0x30
[  129.731378]  dump_stack_lvl+0x64/0x80
[  129.732280]  print_report+0x158/0x458
[  129.733293]  kasan_report+0xb4/0xf4
[  129.734228]  __asan_load1+0x68/0x74
[  129.735392]  memcmp+0x44/0xd0
[  129.736202]  kasan_memcmp+0xf4/0x200
[  129.737249]  kunit_try_run_case+0x84/0x120
[  129.738285]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.739707]  kthread+0x180/0x190
[  129.740629]  ret_from_fork+0x10/0x20
[  129.741599] 
[  129.742005] Allocated by task 163:
[  129.742833]  kasan_save_stack+0x3c/0x70
[  129.744044]  kasan_set_track+0x2c/0x40
[  129.745081]  kasan_save_alloc_info+0x24/0x34
[  129.746353]  __kasan_kmalloc+0xb8/0xc0
[  129.747442]  kmalloc_trace+0x58/0x6c
[  129.748489]  kasan_memcmp+0xb0/0x200
[  129.749457]  kunit_try_run_case+0x84/0x120
[  129.750487]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.751891]  kthread+0x180/0x190
[  129.752863]  ret_from_fork+0x10/0x20
[  129.753748] 
[  129.754231] The buggy address belongs to the object at ffff0000c59fde00
[  129.754231]  which belongs to the cache kmalloc-128 of size 128
[  129.756732] The buggy address is located 24 bytes inside of
[  129.756732]  128-byte region [ffff0000c59fde00, ffff0000c59fde80)
[  129.758656] 
[  129.759119] The buggy address belongs to the physical page:
[  129.760507] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  129.762143] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.763598] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.765262] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.766718] page dumped because: kasan: bad access detected
[  129.767948] 
[  129.768688] Memory state around the buggy address:
[  129.769625]  ffff0000c59fdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  129.770954]  ffff0000c59fdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.772489] >ffff0000c59fde00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.773763]                             ^
[  129.774704]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.776074]  ffff0000c59fdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.777365] ==================================================================

test log snippet boot parser 174

Home

[  128.928794] ==================================================================
[  128.931172] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xb4/0x170
[  128.932842] Read of size 1 at addr ffff800008757d9a by task kunit_try_catch/154
[  128.934286] 
[  128.934895] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.936437] Hardware name: linux,dummy-virt (DT)
[  128.937263] Call trace:
[  128.937928]  dump_backtrace.part.0+0xdc/0xf0
[  128.939037]  show_stack+0x18/0x30
[  128.940113]  dump_stack_lvl+0x64/0x80
[  128.941251]  print_report+0x158/0x458
[  128.942184]  kasan_report+0xb4/0xf4
[  128.943180]  __asan_load1+0x68/0x74
[  128.944165]  kasan_stack_oob+0xb4/0x170
[  128.945254]  kunit_try_run_case+0x84/0x120
[  128.946362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.947818]  kthread+0x180/0x190
[  128.949054]  ret_from_fork+0x10/0x20
[  128.950033] 
[  128.950568] The buggy address belongs to stack of task kunit_try_catch/154
[  128.952060]  and is located at offset 138 in frame:
[  128.952997]  kasan_stack_oob+0x0/0x170
[  128.954300] 
[  128.954798] This frame has 4 objects:
[  128.955781]  [48, 49) '__assertion'
[  128.956052]  [64, 72) 'array'
[  128.956924]  [96, 112) '__assertion'
[  128.957752]  [128, 138) 'stack_array'
[  128.958645] 
[  128.959754] The buggy address belongs to the virtual mapping at
[  128.959754]  [ffff800008750000, ffff800008759000) created by:
[  128.959754]  kernel_clone+0xb4/0x470
[  128.962232] 
[  128.962769] The buggy address belongs to the physical page:
[  128.964146] page:00000000be3a5efd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105930
[  128.965717] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  128.967097] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  128.968605] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  128.969851] page dumped because: kasan: bad access detected
[  128.970349] 
[  128.970718] Memory state around the buggy address:
[  128.972010]  ffff800008757c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.973394]  ffff800008757d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[  128.974811] >ffff800008757d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00
[  128.976251]                             ^
[  128.977178]  ffff800008757e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.978499]  ffff800008757e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.979917] ==================================================================

test log snippet boot parser 175

Home

[  131.397137] ==================================================================
[  131.399481] BUG: KASAN: use-after-free in kfree_sensitive+0x18/0x5c
[  131.400863] Read of size 1 at addr ffff0000c5a2e600 by task kunit_try_catch/167
[  131.402553] 
[  131.403212] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.404870] Hardware name: linux,dummy-virt (DT)
[  131.405796] Call trace:
[  131.406461]  dump_backtrace.part.0+0xdc/0xf0
[  131.407927]  show_stack+0x18/0x30
[  131.408859]  dump_stack_lvl+0x64/0x80
[  131.409982]  print_report+0x158/0x458
[  131.410983]  kasan_report+0xb4/0xf4
[  131.412088]  __kasan_check_byte+0x54/0x70
[  131.413124]  ksize+0x3c/0x94
[  131.414028]  kfree_sensitive+0x18/0x5c
[  131.415303]  kmalloc_double_kzfree+0xc4/0x1d0
[  131.416380]  kunit_try_run_case+0x84/0x120
[  131.417458]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.418673]  kthread+0x180/0x190
[  131.419707]  ret_from_fork+0x10/0x20
[  131.420793] 
[  131.421348] Allocated by task 167:
[  131.422185]  kasan_save_stack+0x3c/0x70
[  131.423260]  kasan_set_track+0x2c/0x40
[  131.424195]  kasan_save_alloc_info+0x24/0x34
[  131.425117]  __kasan_kmalloc+0xb8/0xc0
[  131.426096]  kmalloc_trace+0x58/0x6c
[  131.427072]  kmalloc_double_kzfree+0x94/0x1d0
[  131.428288]  kunit_try_run_case+0x84/0x120
[  131.429501]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.430867]  kthread+0x180/0x190
[  131.432173]  ret_from_fork+0x10/0x20
[  131.433137] 
[  131.433641] Freed by task 167:
[  131.434393]  kasan_save_stack+0x3c/0x70
[  131.435719]  kasan_set_track+0x2c/0x40
[  131.436730]  kasan_save_free_info+0x38/0x5c
[  131.437793]  __kasan_slab_free+0xe4/0x150
[  131.438823]  __kmem_cache_free+0x130/0x2a4
[  131.440014]  kfree+0x58/0x80
[  131.440934]  kfree_sensitive+0x4c/0x5c
[  131.441983]  kmalloc_double_kzfree+0xb4/0x1d0
[  131.443340]  kunit_try_run_case+0x84/0x120
[  131.444503]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.445806]  kthread+0x180/0x190
[  131.446692]  ret_from_fork+0x10/0x20
[  131.447670] 
[  131.448294] The buggy address belongs to the object at ffff0000c5a2e600
[  131.448294]  which belongs to the cache kmalloc-128 of size 128
[  131.450261] The buggy address is located 0 bytes inside of
[  131.450261]  128-byte region [ffff0000c5a2e600, ffff0000c5a2e680)
[  131.452550] 
[  131.453101] The buggy address belongs to the physical page:
[  131.454123] page:0000000072979028 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2e
[  131.455922] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  131.457353] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  131.458782] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  131.460132] page dumped because: kasan: bad access detected
[  131.461186] 
[  131.462181] Memory state around the buggy address:
[  131.463196]  ffff0000c5a2e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.464649]  ffff0000c5a2e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.465989] >ffff0000c5a2e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  131.467281]                    ^
[  131.468380]  ffff0000c5a2e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.469936]  ffff0000c5a2e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.471544] ==================================================================

test log snippet boot parser 176

Home

[  126.180218] ==================================================================
[  126.182108] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xa8/0x1d0
[  126.184318] Read of size 1 at addr ffff0000c5994000 by task kunit_try_catch/124
[  126.185653] 
[  126.186168] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.187630] Hardware name: linux,dummy-virt (DT)
[  126.188528] Call trace:
[  126.189168]  dump_backtrace.part.0+0xdc/0xf0
[  126.190260]  show_stack+0x18/0x30
[  126.191322]  dump_stack_lvl+0x64/0x80
[  126.192347]  print_report+0x158/0x458
[  126.193316]  kasan_report+0xb4/0xf4
[  126.194195]  __asan_load1+0x68/0x74
[  126.195166]  kmalloc_pagealloc_uaf+0xa8/0x1d0
[  126.196267]  kunit_try_run_case+0x84/0x120
[  126.197304]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.198582]  kthread+0x180/0x190
[  126.199508]  ret_from_fork+0x10/0x20
[  126.200474] 
[  126.200929] The buggy address belongs to the physical page:
[  126.202046] page:0000000090fd5843 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105994
[  126.203577] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  126.204988] raw: 0bfffc0000000000 fffffc0003168708 ffff0000dac4af78 0000000000000000
[  126.206392] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  126.207685] page dumped because: kasan: bad access detected
[  126.208688] 
[  126.209186] Memory state around the buggy address:
[  126.210189]  ffff0000c5993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.211537]  ffff0000c5993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.212850] >ffff0000c5994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.214081]                    ^
[  126.214910]  ffff0000c5994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.216232]  ffff0000c5994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.217466] ==================================================================

test log snippet boot parser 177

Home

[  128.104053] ==================================================================
[  128.105716] BUG: KASAN: use-after-free in kmalloc_uaf2+0x104/0x290
[  128.106943] Read of size 1 at addr ffff0000c5958d28 by task kunit_try_catch/145
[  128.108636] 
[  128.109030] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.111326] Hardware name: linux,dummy-virt (DT)
[  128.112469] Call trace:
[  128.113074]  dump_backtrace.part.0+0xdc/0xf0
[  128.114234]  show_stack+0x18/0x30
[  128.115264]  dump_stack_lvl+0x64/0x80
[  128.116459]  print_report+0x158/0x458
[  128.117531]  kasan_report+0xb4/0xf4
[  128.118577]  __asan_load1+0x68/0x74
[  128.119686]  kmalloc_uaf2+0x104/0x290
[  128.120579]  kunit_try_run_case+0x84/0x120
[  128.121705]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.122965]  kthread+0x180/0x190
[  128.124203]  ret_from_fork+0x10/0x20
[  128.125302] 
[  128.125863] Allocated by task 145:
[  128.126711]  kasan_save_stack+0x3c/0x70
[  128.127792]  kasan_set_track+0x2c/0x40
[  128.128951]  kasan_save_alloc_info+0x24/0x34
[  128.130055]  __kasan_kmalloc+0xb8/0xc0
[  128.131047]  kmalloc_trace+0x58/0x6c
[  128.132364]  kmalloc_uaf2+0xac/0x290
[  128.133388]  kunit_try_run_case+0x84/0x120
[  128.134504]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.135792]  kthread+0x180/0x190
[  128.136614]  ret_from_fork+0x10/0x20
[  128.137593] 
[  128.138086] Freed by task 145:
[  128.138843]  kasan_save_stack+0x3c/0x70
[  128.139747]  kasan_set_track+0x2c/0x40
[  128.140900]  kasan_save_free_info+0x38/0x5c
[  128.142171]  __kasan_slab_free+0xe4/0x150
[  128.143562]  __kmem_cache_free+0x130/0x2a4
[  128.144729]  kfree+0x58/0x80
[  128.145592]  kmalloc_uaf2+0xc4/0x290
[  128.146607]  kunit_try_run_case+0x84/0x120
[  128.147876]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.149221]  kthread+0x180/0x190
[  128.150090]  ret_from_fork+0x10/0x20
[  128.151023] 
[  128.151484] The buggy address belongs to the object at ffff0000c5958d00
[  128.151484]  which belongs to the cache kmalloc-128 of size 128
[  128.153449] The buggy address is located 40 bytes inside of
[  128.153449]  128-byte region [ffff0000c5958d00, ffff0000c5958d80)
[  128.155585] 
[  128.156052] The buggy address belongs to the physical page:
[  128.157425] page:000000002d103547 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[  128.159097] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.160773] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.162063] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.163718] page dumped because: kasan: bad access detected
[  128.164507] 
[  128.164857] Memory state around the buggy address:
[  128.166009]  ffff0000c5958c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  128.167509]  ffff0000c5958c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.168790] >ffff0000c5958d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.170106]                                   ^
[  128.171149]  ffff0000c5958d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.173173]  ffff0000c5958e00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  128.174388] ==================================================================

test log snippet boot parser 178

Home

[  127.396302] ==================================================================
[  127.397839] BUG: KASAN: use-after-free in kmalloc_uaf_16+0xfc/0x290
[  127.399228] Read of size 16 at addr ffff0000c596bb00 by task kunit_try_catch/135
[  127.401106] 
[  127.401824] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.403541] Hardware name: linux,dummy-virt (DT)
[  127.404442] Call trace:
[  127.405006]  dump_backtrace.part.0+0xdc/0xf0
[  127.406236]  show_stack+0x18/0x30
[  127.407527]  dump_stack_lvl+0x64/0x80
[  127.408647]  print_report+0x158/0x458
[  127.409750]  kasan_report+0xb4/0xf4
[  127.410708]  __asan_load16+0x68/0x9c
[  127.411771]  kmalloc_uaf_16+0xfc/0x290
[  127.412841]  kunit_try_run_case+0x84/0x120
[  127.413874]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.415103]  kthread+0x180/0x190
[  127.416203]  ret_from_fork+0x10/0x20
[  127.417119] 
[  127.417603] Allocated by task 135:
[  127.418318]  kasan_save_stack+0x3c/0x70
[  127.419329]  kasan_set_track+0x2c/0x40
[  127.420228]  kasan_save_alloc_info+0x24/0x34
[  127.421050]  __kasan_kmalloc+0xb8/0xc0
[  127.421750]  kmalloc_trace+0x58/0x6c
[  127.422861]  kmalloc_uaf_16+0xc4/0x290
[  127.424168]  kunit_try_run_case+0x84/0x120
[  127.425289]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.426556]  kthread+0x180/0x190
[  127.427504]  ret_from_fork+0x10/0x20
[  127.428672] 
[  127.429192] Freed by task 135:
[  127.429971]  kasan_save_stack+0x3c/0x70
[  127.430942]  kasan_set_track+0x2c/0x40
[  127.431935]  kasan_save_free_info+0x38/0x5c
[  127.433069]  __kasan_slab_free+0xe4/0x150
[  127.434075]  __kmem_cache_free+0x130/0x2a4
[  127.435195]  kfree+0x58/0x80
[  127.436103]  kmalloc_uaf_16+0xe4/0x290
[  127.437303]  kunit_try_run_case+0x84/0x120
[  127.438354]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.439781]  kthread+0x180/0x190
[  127.440745]  ret_from_fork+0x10/0x20
[  127.441754] 
[  127.442240] The buggy address belongs to the object at ffff0000c596bb00
[  127.442240]  which belongs to the cache kmalloc-128 of size 128
[  127.444730] The buggy address is located 0 bytes inside of
[  127.444730]  128-byte region [ffff0000c596bb00, ffff0000c596bb80)
[  127.446632] 
[  127.447202] The buggy address belongs to the physical page:
[  127.448488] page:000000006bc8cbcf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[  127.450112] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.451859] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  127.453384] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.454790] page dumped because: kasan: bad access detected
[  127.455870] 
[  127.456634] Memory state around the buggy address:
[  127.457749]  ffff0000c596ba00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.459069]  ffff0000c596ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.460690] >ffff0000c596bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.462088]                    ^
[  127.463075]  ffff0000c596bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.464509]  ffff0000c596bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.465894] ==================================================================

test log snippet boot parser 179

Home

[  127.942433] ==================================================================
[  127.944366] BUG: KASAN: use-after-free in kmalloc_uaf+0xc4/0x1e0
[  127.945673] Read of size 1 at addr ffff0000c5848408 by task kunit_try_catch/143
[  127.947429] 
[  127.947909] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.949363] Hardware name: linux,dummy-virt (DT)
[  127.950323] Call trace:
[  127.950963]  dump_backtrace.part.0+0xdc/0xf0
[  127.952240]  show_stack+0x18/0x30
[  127.953597]  dump_stack_lvl+0x64/0x80
[  127.954673]  print_report+0x158/0x458
[  127.955714]  kasan_report+0xb4/0xf4
[  127.956621]  __asan_load1+0x68/0x74
[  127.957779]  kmalloc_uaf+0xc4/0x1e0
[  127.958760]  kunit_try_run_case+0x84/0x120
[  127.960011]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.961459]  kthread+0x180/0x190
[  127.962365]  ret_from_fork+0x10/0x20
[  127.963765] 
[  127.964222] Allocated by task 143:
[  127.965010]  kasan_save_stack+0x3c/0x70
[  127.965991]  kasan_set_track+0x2c/0x40
[  127.966909]  kasan_save_alloc_info+0x24/0x34
[  127.968069]  __kasan_kmalloc+0xb8/0xc0
[  127.969097]  kmalloc_trace+0x58/0x6c
[  127.970102]  kmalloc_uaf+0x94/0x1e0
[  127.971132]  kunit_try_run_case+0x84/0x120
[  127.972193]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.973423]  kthread+0x180/0x190
[  127.974369]  ret_from_fork+0x10/0x20
[  127.975376] 
[  127.975882] Freed by task 143:
[  127.976587]  kasan_save_stack+0x3c/0x70
[  127.977666]  kasan_set_track+0x2c/0x40
[  127.978955]  kasan_save_free_info+0x38/0x5c
[  127.980646]  __kasan_slab_free+0xe4/0x150
[  127.981673]  __kmem_cache_free+0x130/0x2a4
[  127.982786]  kfree+0x58/0x80
[  127.983800]  kmalloc_uaf+0xb4/0x1e0
[  127.984939]  kunit_try_run_case+0x84/0x120
[  127.986036]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.987320]  kthread+0x180/0x190
[  127.988239]  ret_from_fork+0x10/0x20
[  127.989312] 
[  127.989814] The buggy address belongs to the object at ffff0000c5848400
[  127.989814]  which belongs to the cache kmalloc-128 of size 128
[  127.992075] The buggy address is located 8 bytes inside of
[  127.992075]  128-byte region [ffff0000c5848400, ffff0000c5848480)
[  127.994127] 
[  127.994694] The buggy address belongs to the physical page:
[  127.995761] page:0000000041fbd229 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105848
[  127.997425] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  127.999519] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.000920] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.002269] page dumped because: kasan: bad access detected
[  128.003654] 
[  128.004443] Memory state around the buggy address:
[  128.005497]  ffff0000c5848300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  128.006876]  ffff0000c5848380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.008628] >ffff0000c5848400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.009827]                       ^
[  128.010626]  ffff0000c5848480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.012042]  ffff0000c5848500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.013427] ==================================================================

test log snippet boot parser 180

Home

[  128.023819] ==================================================================
[  128.025654] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xcc/0x1f0
[  128.027019] Write of size 33 at addr ffff0000c5958a00 by task kunit_try_catch/144
[  128.029023] 
[  128.029611] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.031426] Hardware name: linux,dummy-virt (DT)
[  128.032278] Call trace:
[  128.033003]  dump_backtrace.part.0+0xdc/0xf0
[  128.034167]  show_stack+0x18/0x30
[  128.035228]  dump_stack_lvl+0x64/0x80
[  128.036302]  print_report+0x158/0x458
[  128.037154]  kasan_report+0xb4/0xf4
[  128.038193]  kasan_check_range+0xe4/0x190
[  128.039299]  memset+0x40/0x70
[  128.040369]  kmalloc_uaf_memset+0xcc/0x1f0
[  128.041541]  kunit_try_run_case+0x84/0x120
[  128.042591]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.044050]  kthread+0x180/0x190
[  128.044929]  ret_from_fork+0x10/0x20
[  128.045922] 
[  128.046369] Allocated by task 144:
[  128.047238]  kasan_save_stack+0x3c/0x70
[  128.048584]  kasan_set_track+0x2c/0x40
[  128.049526]  kasan_save_alloc_info+0x24/0x34
[  128.050589]  __kasan_kmalloc+0xb8/0xc0
[  128.051770]  kmalloc_trace+0x58/0x6c
[  128.052360]  kmalloc_uaf_memset+0x94/0x1f0
[  128.052977]  kunit_try_run_case+0x84/0x120
[  128.053675]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.055102]  kthread+0x180/0x190
[  128.056334]  ret_from_fork+0x10/0x20
[  128.057292] 
[  128.057693] Freed by task 144:
[  128.058473]  kasan_save_stack+0x3c/0x70
[  128.059510]  kasan_set_track+0x2c/0x40
[  128.060442]  kasan_save_free_info+0x38/0x5c
[  128.061572]  __kasan_slab_free+0xe4/0x150
[  128.062609]  __kmem_cache_free+0x130/0x2a4
[  128.063848]  kfree+0x58/0x80
[  128.064970]  kmalloc_uaf_memset+0xb4/0x1f0
[  128.066026]  kunit_try_run_case+0x84/0x120
[  128.066944]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  128.068299]  kthread+0x180/0x190
[  128.069218]  ret_from_fork+0x10/0x20
[  128.070168] 
[  128.070646] The buggy address belongs to the object at ffff0000c5958a00
[  128.070646]  which belongs to the cache kmalloc-128 of size 128
[  128.073102] The buggy address is located 0 bytes inside of
[  128.073102]  128-byte region [ffff0000c5958a00, ffff0000c5958a80)
[  128.074713] 
[  128.075327] The buggy address belongs to the physical page:
[  128.076842] page:000000002d103547 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[  128.078415] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  128.080271] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  128.081668] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  128.082937] page dumped because: kasan: bad access detected
[  128.083996] 
[  128.084514] Memory state around the buggy address:
[  128.086079]  ffff0000c5958900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.087287]  ffff0000c5958980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.088706] >ffff0000c5958a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.090429]                    ^
[  128.091206]  ffff0000c5958a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.092614]  ffff0000c5958b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.093875] ==================================================================

test log snippet boot parser 181

Home

[  129.560635] ==================================================================
[  129.562586] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xcc/0x1d0
[  129.564144] Read of size 1 at addr ffff0000c3e9a480 by task kunit_try_catch/161
[  129.566150] 
[  129.566956] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.568882] Hardware name: linux,dummy-virt (DT)
[  129.569836] Call trace:
[  129.570501]  dump_backtrace.part.0+0xdc/0xf0
[  129.571845]  show_stack+0x18/0x30
[  129.572907]  dump_stack_lvl+0x64/0x80
[  129.574080]  print_report+0x158/0x458
[  129.575135]  kasan_report+0xb4/0xf4
[  129.576066]  __kasan_check_byte+0x54/0x70
[  129.577139]  kmem_cache_destroy+0xf0/0x194
[  129.578199]  kmem_cache_double_destroy+0xcc/0x1d0
[  129.579495]  kunit_try_run_case+0x84/0x120
[  129.580707]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.582056]  kthread+0x180/0x190
[  129.582968]  ret_from_fork+0x10/0x20
[  129.584075] 
[  129.584597] Allocated by task 161:
[  129.585365]  kasan_save_stack+0x3c/0x70
[  129.586354]  kasan_set_track+0x2c/0x40
[  129.587335]  kasan_save_alloc_info+0x24/0x34
[  129.588505]  __kasan_slab_alloc+0x8c/0x90
[  129.589553]  kmem_cache_alloc+0x170/0x2d0
[  129.590710]  kmem_cache_create_usercopy+0x144/0x26c
[  129.591937]  kmem_cache_create+0x1c/0x30
[  129.592705]  kmem_cache_double_destroy+0x9c/0x1d0
[  129.593927]  kunit_try_run_case+0x84/0x120
[  129.594950]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.596315]  kthread+0x180/0x190
[  129.597172]  ret_from_fork+0x10/0x20
[  129.598257] 
[  129.598806] Freed by task 161:
[  129.599643]  kasan_save_stack+0x3c/0x70
[  129.600635]  kasan_set_track+0x2c/0x40
[  129.601688]  kasan_save_free_info+0x38/0x5c
[  129.602754]  __kasan_slab_free+0xe4/0x150
[  129.603806]  kmem_cache_free+0x1b8/0x38c
[  129.605246]  slab_kmem_cache_release+0x30/0x40
[  129.606424]  kmem_cache_release+0x14/0x20
[  129.607579]  kobject_put+0xe0/0x184
[  129.608717]  sysfs_slab_release+0x28/0x34
[  129.609829]  kmem_cache_destroy+0xc8/0x194
[  129.610809]  kmem_cache_double_destroy+0xbc/0x1d0
[  129.612133]  kunit_try_run_case+0x84/0x120
[  129.613293]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.614606]  kthread+0x180/0x190
[  129.615508]  ret_from_fork+0x10/0x20
[  129.616476] 
[  129.616924] The buggy address belongs to the object at ffff0000c3e9a480
[  129.616924]  which belongs to the cache kmem_cache of size 216
[  129.618930] The buggy address is located 0 bytes inside of
[  129.618930]  216-byte region [ffff0000c3e9a480, ffff0000c3e9a558)
[  129.620804] 
[  129.621268] The buggy address belongs to the physical page:
[  129.622473] page:000000002be65cb1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e9a
[  129.624380] head:000000002be65cb1 order:1 compound_mapcount:0 compound_pincount:0
[  129.625728] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  129.627345] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[  129.629027] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[  129.630341] page dumped because: kasan: bad access detected
[  129.631372] 
[  129.631901] Memory state around the buggy address:
[  129.632867]  ffff0000c3e9a380: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  129.634188]  ffff0000c3e9a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.635923] >ffff0000c3e9a480: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.637182]                    ^
[  129.638029]  ffff0000c3e9a500: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  129.639783]  ffff0000c3e9a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.641058] ==================================================================

test log snippet boot parser 182

Home

[  127.171917] ==================================================================
[  127.173903] BUG: KASAN: use-after-free in krealloc_uaf+0xe0/0x2f0
[  127.175960] Read of size 1 at addr ffff0000c54ada00 by task kunit_try_catch/133
[  127.177227] 
[  127.178308] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.180036] Hardware name: linux,dummy-virt (DT)
[  127.181120] Call trace:
[  127.181710]  dump_backtrace.part.0+0xdc/0xf0
[  127.182886]  show_stack+0x18/0x30
[  127.184098]  dump_stack_lvl+0x64/0x80
[  127.185190]  print_report+0x158/0x458
[  127.186120]  kasan_report+0xb4/0xf4
[  127.187026]  __kasan_check_byte+0x54/0x70
[  127.188096]  krealloc+0xe0/0x1a0
[  127.189378]  krealloc_uaf+0xe0/0x2f0
[  127.190488]  kunit_try_run_case+0x84/0x120
[  127.191669]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.192992]  kthread+0x180/0x190
[  127.193741]  ret_from_fork+0x10/0x20
[  127.194716] 
[  127.195223] Allocated by task 133:
[  127.195994]  kasan_save_stack+0x3c/0x70
[  127.197002]  kasan_set_track+0x2c/0x40
[  127.198132]  kasan_save_alloc_info+0x24/0x34
[  127.199103]  __kasan_kmalloc+0xb8/0xc0
[  127.200378]  kmalloc_trace+0x58/0x6c
[  127.201299]  krealloc_uaf+0xa8/0x2f0
[  127.202259]  kunit_try_run_case+0x84/0x120
[  127.203314]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.204671]  kthread+0x180/0x190
[  127.205573]  ret_from_fork+0x10/0x20
[  127.206603] 
[  127.207144] Freed by task 133:
[  127.208300]  kasan_save_stack+0x3c/0x70
[  127.209283]  kasan_set_track+0x2c/0x40
[  127.210229]  kasan_save_free_info+0x38/0x5c
[  127.211351]  __kasan_slab_free+0xe4/0x150
[  127.212465]  __kmem_cache_free+0x130/0x2a4
[  127.213731]  kfree+0x58/0x80
[  127.214638]  krealloc_uaf+0xc8/0x2f0
[  127.215646]  kunit_try_run_case+0x84/0x120
[  127.216790]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.218033]  kthread+0x180/0x190
[  127.218951]  ret_from_fork+0x10/0x20
[  127.219997] 
[  127.221080] The buggy address belongs to the object at ffff0000c54ada00
[  127.221080]  which belongs to the cache kmalloc-256 of size 256
[  127.223220] The buggy address is located 0 bytes inside of
[  127.223220]  256-byte region [ffff0000c54ada00, ffff0000c54adb00)
[  127.225230] 
[  127.225580] The buggy address belongs to the physical page:
[  127.226841] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  127.228512] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  127.229929] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.231789] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.232552] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.233996] page dumped because: kasan: bad access detected
[  127.235121] 
[  127.235842] Memory state around the buggy address:
[  127.237480]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.238812]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.240288] >ffff0000c54ada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.241580]                    ^
[  127.242447]  ffff0000c54ada80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.243851]  ffff0000c54adb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.245010] ==================================================================

test log snippet boot parser 183

Home

[  127.246960] ==================================================================
[  127.248217] BUG: KASAN: use-after-free in krealloc_uaf+0x104/0x2f0
[  127.250025] Read of size 1 at addr ffff0000c54ada00 by task kunit_try_catch/133
[  127.251559] 
[  127.252156] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  127.253839] Hardware name: linux,dummy-virt (DT)
[  127.254745] Call trace:
[  127.255311]  dump_backtrace.part.0+0xdc/0xf0
[  127.256695]  show_stack+0x18/0x30
[  127.257712]  dump_stack_lvl+0x64/0x80
[  127.258780]  print_report+0x158/0x458
[  127.259953]  kasan_report+0xb4/0xf4
[  127.260847]  __asan_load1+0x68/0x74
[  127.261782]  krealloc_uaf+0x104/0x2f0
[  127.262817]  kunit_try_run_case+0x84/0x120
[  127.263932]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.265316]  kthread+0x180/0x190
[  127.266222]  ret_from_fork+0x10/0x20
[  127.267529] 
[  127.268484] Allocated by task 133:
[  127.269243]  kasan_save_stack+0x3c/0x70
[  127.270194]  kasan_set_track+0x2c/0x40
[  127.271715]  kasan_save_alloc_info+0x24/0x34
[  127.272588]  __kasan_kmalloc+0xb8/0xc0
[  127.273507]  kmalloc_trace+0x58/0x6c
[  127.274524]  krealloc_uaf+0xa8/0x2f0
[  127.275796]  kunit_try_run_case+0x84/0x120
[  127.276967]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.278261]  kthread+0x180/0x190
[  127.279149]  ret_from_fork+0x10/0x20
[  127.280073] 
[  127.280595] Freed by task 133:
[  127.281332]  kasan_save_stack+0x3c/0x70
[  127.282343]  kasan_set_track+0x2c/0x40
[  127.283616]  kasan_save_free_info+0x38/0x5c
[  127.284782]  __kasan_slab_free+0xe4/0x150
[  127.285818]  __kmem_cache_free+0x130/0x2a4
[  127.286981]  kfree+0x58/0x80
[  127.287868]  krealloc_uaf+0xc8/0x2f0
[  127.289066]  kunit_try_run_case+0x84/0x120
[  127.289815]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  127.290802]  kthread+0x180/0x190
[  127.291796]  ret_from_fork+0x10/0x20
[  127.292880] 
[  127.293426] The buggy address belongs to the object at ffff0000c54ada00
[  127.293426]  which belongs to the cache kmalloc-256 of size 256
[  127.295422] The buggy address is located 0 bytes inside of
[  127.295422]  256-byte region [ffff0000c54ada00, ffff0000c54adb00)
[  127.297892] 
[  127.298399] The buggy address belongs to the physical page:
[  127.299536] page:000000002dee6d95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ac
[  127.301379] head:000000002dee6d95 order:1 compound_mapcount:0 compound_pincount:0
[  127.302784] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  127.304743] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  127.306248] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  127.307801] page dumped because: kasan: bad access detected
[  127.308723] 
[  127.309201] Memory state around the buggy address:
[  127.310176]  ffff0000c54ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.311524]  ffff0000c54ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.313420] >ffff0000c54ada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.314643]                    ^
[  127.315498]  ffff0000c54ada80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  127.317090]  ffff0000c54adb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  127.318288] ==================================================================

test log snippet boot parser 184

Home

[  129.153557] ==================================================================
[  129.155283] BUG: KASAN: use-after-free in ksize_uaf+0xc4/0x32c
[  129.156701] Read of size 1 at addr ffff0000c5945700 by task kunit_try_catch/158
[  129.158196] 
[  129.158803] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.160522] Hardware name: linux,dummy-virt (DT)
[  129.161445] Call trace:
[  129.162040]  dump_backtrace.part.0+0xdc/0xf0
[  129.163200]  show_stack+0x18/0x30
[  129.164430]  dump_stack_lvl+0x64/0x80
[  129.165530]  print_report+0x158/0x458
[  129.166508]  kasan_report+0xb4/0xf4
[  129.167499]  __kasan_check_byte+0x54/0x70
[  129.168698]  ksize+0x3c/0x94
[  129.169585]  ksize_uaf+0xc4/0x32c
[  129.170611]  kunit_try_run_case+0x84/0x120
[  129.171826]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.173200]  kthread+0x180/0x190
[  129.174113]  ret_from_fork+0x10/0x20
[  129.175080] 
[  129.175677] Allocated by task 158:
[  129.176665]  kasan_save_stack+0x3c/0x70
[  129.177685]  kasan_set_track+0x2c/0x40
[  129.178626]  kasan_save_alloc_info+0x24/0x34
[  129.179887]  __kasan_kmalloc+0xb8/0xc0
[  129.180854]  kmalloc_trace+0x58/0x6c
[  129.181845]  ksize_uaf+0x94/0x32c
[  129.182846]  kunit_try_run_case+0x84/0x120
[  129.183966]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.185307]  kthread+0x180/0x190
[  129.186219]  ret_from_fork+0x10/0x20
[  129.187268] 
[  129.187697] Freed by task 158:
[  129.188611]  kasan_save_stack+0x3c/0x70
[  129.189546]  kasan_set_track+0x2c/0x40
[  129.190558]  kasan_save_free_info+0x38/0x5c
[  129.191601]  __kasan_slab_free+0xe4/0x150
[  129.192809]  __kmem_cache_free+0x130/0x2a4
[  129.193885]  kfree+0x58/0x80
[  129.194835]  ksize_uaf+0xb4/0x32c
[  129.195906]  kunit_try_run_case+0x84/0x120
[  129.197005]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.198306]  kthread+0x180/0x190
[  129.199254]  ret_from_fork+0x10/0x20
[  129.200471] 
[  129.200994] The buggy address belongs to the object at ffff0000c5945700
[  129.200994]  which belongs to the cache kmalloc-128 of size 128
[  129.203099] The buggy address is located 0 bytes inside of
[  129.203099]  128-byte region [ffff0000c5945700, ffff0000c5945780)
[  129.205147] 
[  129.205718] The buggy address belongs to the physical page:
[  129.206807] page:000000003971b6df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945
[  129.208598] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.210053] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.211798] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.212883] page dumped because: kasan: bad access detected
[  129.213872] 
[  129.214502] Memory state around the buggy address:
[  129.215615]  ffff0000c5945600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.217035]  ffff0000c5945680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.218352] >ffff0000c5945700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.219837]                    ^
[  129.220689]  ffff0000c5945780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.222046]  ffff0000c5945800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.223565] ==================================================================

test log snippet boot parser 185

Home

[  129.228117] ==================================================================
[  129.229352] BUG: KASAN: use-after-free in ksize_uaf+0xe0/0x32c
[  129.230546] Read of size 1 at addr ffff0000c5945700 by task kunit_try_catch/158
[  129.232509] 
[  129.233038] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.234549] Hardware name: linux,dummy-virt (DT)
[  129.235456] Call trace:
[  129.236015]  dump_backtrace.part.0+0xdc/0xf0
[  129.237158]  show_stack+0x18/0x30
[  129.238200]  dump_stack_lvl+0x64/0x80
[  129.239202]  print_report+0x158/0x458
[  129.240139]  kasan_report+0xb4/0xf4
[  129.241088]  __asan_load1+0x68/0x74
[  129.242035]  ksize_uaf+0xe0/0x32c
[  129.242974]  kunit_try_run_case+0x84/0x120
[  129.244020]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.245286]  kthread+0x180/0x190
[  129.246225]  ret_from_fork+0x10/0x20
[  129.247166] 
[  129.247699] Allocated by task 158:
[  129.248485]  kasan_save_stack+0x3c/0x70
[  129.249466]  kasan_set_track+0x2c/0x40
[  129.250316]  kasan_save_alloc_info+0x24/0x34
[  129.251438]  __kasan_kmalloc+0xb8/0xc0
[  129.252380]  kmalloc_trace+0x58/0x6c
[  129.253316]  ksize_uaf+0x94/0x32c
[  129.254317]  kunit_try_run_case+0x84/0x120
[  129.255337]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.256611]  kthread+0x180/0x190
[  129.257454]  ret_from_fork+0x10/0x20
[  129.258394] 
[  129.258893] Freed by task 158:
[  129.259633]  kasan_save_stack+0x3c/0x70
[  129.260600]  kasan_set_track+0x2c/0x40
[  129.261561]  kasan_save_free_info+0x38/0x5c
[  129.262593]  __kasan_slab_free+0xe4/0x150
[  129.263591]  __kmem_cache_free+0x130/0x2a4
[  129.264653]  kfree+0x58/0x80
[  129.265555]  ksize_uaf+0xb4/0x32c
[  129.266520]  kunit_try_run_case+0x84/0x120
[  129.267549]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.268809]  kthread+0x180/0x190
[  129.269629]  ret_from_fork+0x10/0x20
[  129.270607] 
[  129.271102] The buggy address belongs to the object at ffff0000c5945700
[  129.271102]  which belongs to the cache kmalloc-128 of size 128
[  129.273012] The buggy address is located 0 bytes inside of
[  129.273012]  128-byte region [ffff0000c5945700, ffff0000c5945780)
[  129.274836] 
[  129.275350] The buggy address belongs to the physical page:
[  129.276358] page:000000003971b6df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945
[  129.277951] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.279393] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.280847] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.282144] page dumped because: kasan: bad access detected
[  129.283170] 
[  129.283686] Memory state around the buggy address:
[  129.284684]  ffff0000c5945600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.285979]  ffff0000c5945680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.287333] >ffff0000c5945700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.288625]                    ^
[  129.289543]  ffff0000c5945780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.290917]  ffff0000c5945800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.292161] ==================================================================

test log snippet boot parser 186

Home

[  129.297141] ==================================================================
[  129.298213] BUG: KASAN: use-after-free in ksize_uaf+0x100/0x32c
[  129.299428] Read of size 1 at addr ffff0000c5945778 by task kunit_try_catch/158
[  129.300744] 
[  129.301298] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.302893] Hardware name: linux,dummy-virt (DT)
[  129.303961] Call trace:
[  129.304648]  dump_backtrace.part.0+0xdc/0xf0
[  129.305930]  show_stack+0x18/0x30
[  129.306931]  dump_stack_lvl+0x64/0x80
[  129.307981]  print_report+0x158/0x458
[  129.308957]  kasan_report+0xb4/0xf4
[  129.309839]  __asan_load1+0x68/0x74
[  129.310781]  ksize_uaf+0x100/0x32c
[  129.311757]  kunit_try_run_case+0x84/0x120
[  129.313452]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.314802]  kthread+0x180/0x190
[  129.315720]  ret_from_fork+0x10/0x20
[  129.316683] 
[  129.317172] Allocated by task 158:
[  129.317887]  kasan_save_stack+0x3c/0x70
[  129.318873]  kasan_set_track+0x2c/0x40
[  129.319841]  kasan_save_alloc_info+0x24/0x34
[  129.320961]  __kasan_kmalloc+0xb8/0xc0
[  129.322190]  kmalloc_trace+0x58/0x6c
[  129.323336]  ksize_uaf+0x94/0x32c
[  129.324362]  kunit_try_run_case+0x84/0x120
[  129.325386]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.326679]  kthread+0x180/0x190
[  129.327603]  ret_from_fork+0x10/0x20
[  129.329228] 
[  129.329784] Freed by task 158:
[  129.330586]  kasan_save_stack+0x3c/0x70
[  129.331563]  kasan_set_track+0x2c/0x40
[  129.332577]  kasan_save_free_info+0x38/0x5c
[  129.333649]  __kasan_slab_free+0xe4/0x150
[  129.334670]  __kmem_cache_free+0x130/0x2a4
[  129.336232]  kfree+0x58/0x80
[  129.337237]  ksize_uaf+0xb4/0x32c
[  129.338298]  kunit_try_run_case+0x84/0x120
[  129.339388]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.340667]  kthread+0x180/0x190
[  129.341603]  ret_from_fork+0x10/0x20
[  129.342587] 
[  129.343009] The buggy address belongs to the object at ffff0000c5945700
[  129.343009]  which belongs to the cache kmalloc-128 of size 128
[  129.345439] The buggy address is located 120 bytes inside of
[  129.345439]  128-byte region [ffff0000c5945700, ffff0000c5945780)
[  129.347478] 
[  129.348051] The buggy address belongs to the physical page:
[  129.349145] page:000000003971b6df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945
[  129.350771] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.352358] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.354092] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.355470] page dumped because: kasan: bad access detected
[  129.356520] 
[  129.356993] Memory state around the buggy address:
[  129.357995]  ffff0000c5945600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.359603]  ffff0000c5945680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.361504] >ffff0000c5945700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.362790]                                                                 ^
[  129.363955]  ffff0000c5945780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.365315]  ffff0000c5945800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.366588] ==================================================================

test log snippet boot parser 187

Home

[  126.281178] ==================================================================
[  126.283158] BUG: KASAN: use-after-free in pagealloc_uaf+0xcc/0x200
[  126.285482] Read of size 1 at addr ffff0000c5a30000 by task kunit_try_catch/127
[  126.286734] 
[  126.287822] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  126.289505] Hardware name: linux,dummy-virt (DT)
[  126.290230] Call trace:
[  126.290906]  dump_backtrace.part.0+0xdc/0xf0
[  126.292210]  show_stack+0x18/0x30
[  126.293628]  dump_stack_lvl+0x64/0x80
[  126.294626]  print_report+0x158/0x458
[  126.295638]  kasan_report+0xb4/0xf4
[  126.296690]  __asan_load1+0x68/0x74
[  126.297373]  pagealloc_uaf+0xcc/0x200
[  126.298427]  kunit_try_run_case+0x84/0x120
[  126.299521]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  126.301014]  kthread+0x180/0x190
[  126.301972]  ret_from_fork+0x10/0x20
[  126.302940] 
[  126.303393] The buggy address belongs to the physical page:
[  126.304657] page:00000000cd94cb8d refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a30
[  126.306211] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  126.307680] raw: 0bfffc0000000000 ffff0000ff7f59a0 ffff0000ff7f59a0 0000000000000000
[  126.309077] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[  126.310131] page dumped because: kasan: bad access detected
[  126.311492] 
[  126.312015] Memory state around the buggy address:
[  126.313280]  ffff0000c5a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.314637]  ffff0000c5a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.316064] >ffff0000c5a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.317550]                    ^
[  126.318361]  ffff0000c5a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.319755]  ffff0000c5a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  126.321304] ==================================================================

test log snippet boot parser 188

Home

[  129.786369] ==================================================================
[  129.788216] BUG: KASAN: use-after-free in strchr+0x20/0x80
[  129.789356] Read of size 1 at addr ffff0000c59fdf10 by task kunit_try_catch/164
[  129.790728] 
[  129.791275] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.793198] Hardware name: linux,dummy-virt (DT)
[  129.794147] Call trace:
[  129.794761]  dump_backtrace.part.0+0xdc/0xf0
[  129.796184]  show_stack+0x18/0x30
[  129.797166]  dump_stack_lvl+0x64/0x80
[  129.798424]  print_report+0x158/0x458
[  129.799702]  kasan_report+0xb4/0xf4
[  129.800608]  __asan_load1+0x68/0x74
[  129.801518]  strchr+0x20/0x80
[  129.802333]  kasan_strings+0xd0/0x520
[  129.803722]  kunit_try_run_case+0x84/0x120
[  129.804897]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.806168]  kthread+0x180/0x190
[  129.807635]  ret_from_fork+0x10/0x20
[  129.808490] 
[  129.809064] Allocated by task 164:
[  129.809969]  kasan_save_stack+0x3c/0x70
[  129.810813]  kasan_set_track+0x2c/0x40
[  129.811907]  kasan_save_alloc_info+0x24/0x34
[  129.812485]  __kasan_kmalloc+0xb8/0xc0
[  129.812959]  kmalloc_trace+0x58/0x6c
[  129.813504]  kasan_strings+0x98/0x520
[  129.814664]  kunit_try_run_case+0x84/0x120
[  129.815904]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.817174]  kthread+0x180/0x190
[  129.818038]  ret_from_fork+0x10/0x20
[  129.819323] 
[  129.819792] Freed by task 164:
[  129.820509]  kasan_save_stack+0x3c/0x70
[  129.821491]  kasan_set_track+0x2c/0x40
[  129.822436]  kasan_save_free_info+0x38/0x5c
[  129.823801]  __kasan_slab_free+0xe4/0x150
[  129.824797]  __kmem_cache_free+0x130/0x2a4
[  129.825864]  kfree+0x58/0x80
[  129.826774]  kasan_strings+0xb8/0x520
[  129.827908]  kunit_try_run_case+0x84/0x120
[  129.829021]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.830213]  kthread+0x180/0x190
[  129.831082]  ret_from_fork+0x10/0x20
[  129.832190] 
[  129.832666] The buggy address belongs to the object at ffff0000c59fdf00
[  129.832666]  which belongs to the cache kmalloc-128 of size 128
[  129.834606] The buggy address is located 16 bytes inside of
[  129.834606]  128-byte region [ffff0000c59fdf00, ffff0000c59fdf80)
[  129.836801] 
[  129.837310] The buggy address belongs to the physical page:
[  129.838332] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  129.840124] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.841577] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.842973] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.844344] page dumped because: kasan: bad access detected
[  129.845191] 
[  129.845738] Memory state around the buggy address:
[  129.846753]  ffff0000c59fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.848918]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.850236] >ffff0000c59fdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.851799]                          ^
[  129.852619]  ffff0000c59fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.853924]  ffff0000c59fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.855322] ==================================================================

test log snippet boot parser 189

Home

[  129.929681] ==================================================================
[  129.930698] BUG: KASAN: use-after-free in strcmp+0x2c/0x80
[  129.931999] Read of size 1 at addr ffff0000c59fdf10 by task kunit_try_catch/164
[  129.933239] 
[  129.934561] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.935905] Hardware name: linux,dummy-virt (DT)
[  129.936726] Call trace:
[  129.937685]  dump_backtrace.part.0+0xdc/0xf0
[  129.938851]  show_stack+0x18/0x30
[  129.940099]  dump_stack_lvl+0x64/0x80
[  129.941120]  print_report+0x158/0x458
[  129.942044]  kasan_report+0xb4/0xf4
[  129.943006]  __asan_load1+0x68/0x74
[  129.944137]  strcmp+0x2c/0x80
[  129.945008]  kasan_strings+0x120/0x520
[  129.946020]  kunit_try_run_case+0x84/0x120
[  129.947110]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.948429]  kthread+0x180/0x190
[  129.949365]  ret_from_fork+0x10/0x20
[  129.950429] 
[  129.950862] Allocated by task 164:
[  129.951842]  kasan_save_stack+0x3c/0x70
[  129.952934]  kasan_set_track+0x2c/0x40
[  129.953917]  kasan_save_alloc_info+0x24/0x34
[  129.955043]  __kasan_kmalloc+0xb8/0xc0
[  129.956316]  kmalloc_trace+0x58/0x6c
[  129.957213]  kasan_strings+0x98/0x520
[  129.958261]  kunit_try_run_case+0x84/0x120
[  129.959363]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.960762]  kthread+0x180/0x190
[  129.961712]  ret_from_fork+0x10/0x20
[  129.962676] 
[  129.963342] Freed by task 164:
[  129.964205]  kasan_save_stack+0x3c/0x70
[  129.965165]  kasan_set_track+0x2c/0x40
[  129.966097]  kasan_save_free_info+0x38/0x5c
[  129.967316]  __kasan_slab_free+0xe4/0x150
[  129.968384]  __kmem_cache_free+0x130/0x2a4
[  129.969536]  kfree+0x58/0x80
[  129.970428]  kasan_strings+0xb8/0x520
[  129.971759]  kunit_try_run_case+0x84/0x120
[  129.972757]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.973751]  kthread+0x180/0x190
[  129.974717]  ret_from_fork+0x10/0x20
[  129.975856] 
[  129.976425] The buggy address belongs to the object at ffff0000c59fdf00
[  129.976425]  which belongs to the cache kmalloc-128 of size 128
[  129.978348] The buggy address is located 16 bytes inside of
[  129.978348]  128-byte region [ffff0000c59fdf00, ffff0000c59fdf80)
[  129.980760] 
[  129.981400] The buggy address belongs to the physical page:
[  129.982476] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  129.984224] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.985680] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.987109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.988587] page dumped because: kasan: bad access detected
[  129.989613] 
[  129.990111] Memory state around the buggy address:
[  129.991101]  ffff0000c59fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.992463]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.993771] >ffff0000c59fdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.995032]                          ^
[  129.995924]  ffff0000c59fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.997373]  ffff0000c59fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.998591] ==================================================================

test log snippet boot parser 190

Home

[  130.073000] ==================================================================
[  130.074784] BUG: KASAN: use-after-free in strlen+0x18/0x64
[  130.076049] Read of size 1 at addr ffff0000c59fdf10 by task kunit_try_catch/164
[  130.077606] 
[  130.078211] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.079791] Hardware name: linux,dummy-virt (DT)
[  130.081347] Call trace:
[  130.081987]  dump_backtrace.part.0+0xdc/0xf0
[  130.083095]  show_stack+0x18/0x30
[  130.084109]  dump_stack_lvl+0x64/0x80
[  130.085108]  print_report+0x158/0x458
[  130.086086]  kasan_report+0xb4/0xf4
[  130.087038]  __asan_load1+0x68/0x74
[  130.088064]  strlen+0x18/0x64
[  130.089065]  kasan_strings+0x168/0x520
[  130.090269]  kunit_try_run_case+0x84/0x120
[  130.091479]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.092759]  kthread+0x180/0x190
[  130.093520]  ret_from_fork+0x10/0x20
[  130.094489] 
[  130.094952] Allocated by task 164:
[  130.095684]  kasan_save_stack+0x3c/0x70
[  130.096691]  kasan_set_track+0x2c/0x40
[  130.097715]  kasan_save_alloc_info+0x24/0x34
[  130.098846]  __kasan_kmalloc+0xb8/0xc0
[  130.099880]  kmalloc_trace+0x58/0x6c
[  130.100927]  kasan_strings+0x98/0x520
[  130.101902]  kunit_try_run_case+0x84/0x120
[  130.103005]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.104989]  kthread+0x180/0x190
[  130.105964]  ret_from_fork+0x10/0x20
[  130.106896] 
[  130.107326] Freed by task 164:
[  130.108095]  kasan_save_stack+0x3c/0x70
[  130.109080]  kasan_set_track+0x2c/0x40
[  130.110027]  kasan_save_free_info+0x38/0x5c
[  130.111165]  __kasan_slab_free+0xe4/0x150
[  130.112215]  __kmem_cache_free+0x130/0x2a4
[  130.113333]  kfree+0x58/0x80
[  130.114313]  kasan_strings+0xb8/0x520
[  130.115454]  kunit_try_run_case+0x84/0x120
[  130.116490]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.117718]  kthread+0x180/0x190
[  130.118633]  ret_from_fork+0x10/0x20
[  130.119639] 
[  130.120041] The buggy address belongs to the object at ffff0000c59fdf00
[  130.120041]  which belongs to the cache kmalloc-128 of size 128
[  130.122037] The buggy address is located 16 bytes inside of
[  130.122037]  128-byte region [ffff0000c59fdf00, ffff0000c59fdf80)
[  130.123859] 
[  130.124368] The buggy address belongs to the physical page:
[  130.126074] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  130.127467] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.129230] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.130721] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.132073] page dumped because: kasan: bad access detected
[  130.133306] 
[  130.133850] Memory state around the buggy address:
[  130.134719]  ffff0000c59fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.136035]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.137334] >ffff0000c59fdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.138629]                          ^
[  130.140240]  ffff0000c59fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.141747]  ffff0000c59fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.143045] ==================================================================

test log snippet boot parser 191

Home

[  130.000985] ==================================================================
[  130.002178] BUG: KASAN: use-after-free in strncmp+0x3c/0x90
[  130.003419] Read of size 1 at addr ffff0000c59fdf10 by task kunit_try_catch/164
[  130.004808] 
[  130.005354] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.008076] Hardware name: linux,dummy-virt (DT)
[  130.009101] Call trace:
[  130.009683]  dump_backtrace.part.0+0xdc/0xf0
[  130.010831]  show_stack+0x18/0x30
[  130.011891]  dump_stack_lvl+0x64/0x80
[  130.013019]  print_report+0x158/0x458
[  130.013876]  kasan_report+0xb4/0xf4
[  130.014818]  __asan_load1+0x68/0x74
[  130.015755]  strncmp+0x3c/0x90
[  130.016646]  kasan_strings+0x148/0x520
[  130.017664]  kunit_try_run_case+0x84/0x120
[  130.018797]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.020106]  kthread+0x180/0x190
[  130.020987]  ret_from_fork+0x10/0x20
[  130.021935] 
[  130.022451] Allocated by task 164:
[  130.023592]  kasan_save_stack+0x3c/0x70
[  130.024831]  kasan_set_track+0x2c/0x40
[  130.025805]  kasan_save_alloc_info+0x24/0x34
[  130.026837]  __kasan_kmalloc+0xb8/0xc0
[  130.028018]  kmalloc_trace+0x58/0x6c
[  130.028994]  kasan_strings+0x98/0x520
[  130.029958]  kunit_try_run_case+0x84/0x120
[  130.031020]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.032430]  kthread+0x180/0x190
[  130.033276]  ret_from_fork+0x10/0x20
[  130.034277] 
[  130.034799] Freed by task 164:
[  130.035729]  kasan_save_stack+0x3c/0x70
[  130.036678]  kasan_set_track+0x2c/0x40
[  130.037627]  kasan_save_free_info+0x38/0x5c
[  130.038631]  __kasan_slab_free+0xe4/0x150
[  130.039827]  __kmem_cache_free+0x130/0x2a4
[  130.040964]  kfree+0x58/0x80
[  130.041852]  kasan_strings+0xb8/0x520
[  130.042869]  kunit_try_run_case+0x84/0x120
[  130.043917]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.045126]  kthread+0x180/0x190
[  130.046024]  ret_from_fork+0x10/0x20
[  130.047010] 
[  130.047551] The buggy address belongs to the object at ffff0000c59fdf00
[  130.047551]  which belongs to the cache kmalloc-128 of size 128
[  130.049633] The buggy address is located 16 bytes inside of
[  130.049633]  128-byte region [ffff0000c59fdf00, ffff0000c59fdf80)
[  130.052041] 
[  130.052607] The buggy address belongs to the physical page:
[  130.053660] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  130.055206] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.056721] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.058422] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.059866] page dumped because: kasan: bad access detected
[  130.060956] 
[  130.061549] Memory state around the buggy address:
[  130.062539]  ffff0000c59fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.064072]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.065303] >ffff0000c59fdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.066615]                          ^
[  130.067831]  ffff0000c59fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.069134]  ffff0000c59fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.070536] ==================================================================

test log snippet boot parser 192

Home

[  130.145094] ==================================================================
[  130.146175] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c
[  130.147545] Read of size 1 at addr ffff0000c59fdf10 by task kunit_try_catch/164
[  130.148914] 
[  130.150846] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.152250] Hardware name: linux,dummy-virt (DT)
[  130.153173] Call trace:
[  130.153806]  dump_backtrace.part.0+0xdc/0xf0
[  130.154968]  show_stack+0x18/0x30
[  130.156525]  dump_stack_lvl+0x64/0x80
[  130.157542]  print_report+0x158/0x458
[  130.158571]  kasan_report+0xb4/0xf4
[  130.159501]  __asan_load1+0x68/0x74
[  130.160442]  strnlen+0x3c/0x6c
[  130.161322]  kasan_strings+0x18c/0x520
[  130.162294]  kunit_try_run_case+0x84/0x120
[  130.163691]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.165208]  kthread+0x180/0x190
[  130.166141]  ret_from_fork+0x10/0x20
[  130.167120] 
[  130.167578] Allocated by task 164:
[  130.168381]  kasan_save_stack+0x3c/0x70
[  130.169350]  kasan_set_track+0x2c/0x40
[  130.170246]  kasan_save_alloc_info+0x24/0x34
[  130.171497]  __kasan_kmalloc+0xb8/0xc0
[  130.172941]  kmalloc_trace+0x58/0x6c
[  130.173659]  kasan_strings+0x98/0x520
[  130.174741]  kunit_try_run_case+0x84/0x120
[  130.175744]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.177001]  kthread+0x180/0x190
[  130.177873]  ret_from_fork+0x10/0x20
[  130.178854] 
[  130.179473] Freed by task 164:
[  130.180421]  kasan_save_stack+0x3c/0x70
[  130.181347]  kasan_set_track+0x2c/0x40
[  130.182493]  kasan_save_free_info+0x38/0x5c
[  130.183575]  __kasan_slab_free+0xe4/0x150
[  130.184673]  __kmem_cache_free+0x130/0x2a4
[  130.185797]  kfree+0x58/0x80
[  130.186684]  kasan_strings+0xb8/0x520
[  130.187748]  kunit_try_run_case+0x84/0x120
[  130.188806]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  130.190141]  kthread+0x180/0x190
[  130.191051]  ret_from_fork+0x10/0x20
[  130.192030] 
[  130.192573] The buggy address belongs to the object at ffff0000c59fdf00
[  130.192573]  which belongs to the cache kmalloc-128 of size 128
[  130.194486] The buggy address is located 16 bytes inside of
[  130.194486]  128-byte region [ffff0000c59fdf00, ffff0000c59fdf80)
[  130.196482] 
[  130.196993] The buggy address belongs to the physical page:
[  130.198575] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  130.200099] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  130.201565] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  130.202971] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  130.204306] page dumped because: kasan: bad access detected
[  130.205353] 
[  130.206462] Memory state around the buggy address:
[  130.207338]  ffff0000c59fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.208692]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.210013] >ffff0000c59fdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.211270]                          ^
[  130.212104]  ffff0000c59fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.214233]  ffff0000c59fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.215477] ==================================================================

test log snippet boot parser 193

Home

[  129.856753] ==================================================================
[  129.858800] BUG: KASAN: use-after-free in strrchr+0x28/0x54
[  129.860313] Read of size 1 at addr ffff0000c59fdf10 by task kunit_try_catch/164
[  129.861756] 
[  129.862483] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.864331] Hardware name: linux,dummy-virt (DT)
[  129.865333] Call trace:
[  129.866057]  dump_backtrace.part.0+0xdc/0xf0
[  129.867319]  show_stack+0x18/0x30
[  129.868419]  dump_stack_lvl+0x64/0x80
[  129.869427]  print_report+0x158/0x458
[  129.870448]  kasan_report+0xb4/0xf4
[  129.871634]  __asan_load1+0x68/0x74
[  129.872490]  strrchr+0x28/0x54
[  129.873175]  kasan_strings+0xf4/0x520
[  129.874276]  kunit_try_run_case+0x84/0x120
[  129.875558]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.876822]  kthread+0x180/0x190
[  129.877718]  ret_from_fork+0x10/0x20
[  129.878650] 
[  129.879155] Allocated by task 164:
[  129.879964]  kasan_save_stack+0x3c/0x70
[  129.880981]  kasan_set_track+0x2c/0x40
[  129.881967]  kasan_save_alloc_info+0x24/0x34
[  129.883252]  __kasan_kmalloc+0xb8/0xc0
[  129.884615]  kmalloc_trace+0x58/0x6c
[  129.885823]  kasan_strings+0x98/0x520
[  129.886910]  kunit_try_run_case+0x84/0x120
[  129.888109]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.889392]  kthread+0x180/0x190
[  129.890291]  ret_from_fork+0x10/0x20
[  129.891323] 
[  129.891645] Freed by task 164:
[  129.892004]  kasan_save_stack+0x3c/0x70
[  129.892540]  kasan_set_track+0x2c/0x40
[  129.893252]  kasan_save_free_info+0x38/0x5c
[  129.894476]  __kasan_slab_free+0xe4/0x150
[  129.895797]  __kmem_cache_free+0x130/0x2a4
[  129.897017]  kfree+0x58/0x80
[  129.897910]  kasan_strings+0xb8/0x520
[  129.898472]  kunit_try_run_case+0x84/0x120
[  129.899014]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  129.900615]  kthread+0x180/0x190
[  129.901916]  ret_from_fork+0x10/0x20
[  129.902982] 
[  129.903595] The buggy address belongs to the object at ffff0000c59fdf00
[  129.903595]  which belongs to the cache kmalloc-128 of size 128
[  129.905731] The buggy address is located 16 bytes inside of
[  129.905731]  128-byte region [ffff0000c59fdf00, ffff0000c59fdf80)
[  129.907993] 
[  129.908560] The buggy address belongs to the physical page:
[  129.909627] page:000000006a54f270 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fd
[  129.911235] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  129.912856] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  129.914337] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  129.915653] page dumped because: kasan: bad access detected
[  129.916660] 
[  129.917492] Memory state around the buggy address:
[  129.918634]  ffff0000c59fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.920056]  ffff0000c59fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.921509] >ffff0000c59fdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.922738]                          ^
[  129.923961]  ffff0000c59fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.925261]  ffff0000c59fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.926562] ==================================================================

test log snippet boot parser 194

Home

[  131.614059] ==================================================================
[  131.615180] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe0/0x310
[  131.617149] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[  131.618623] 
[  131.619230] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.620900] Hardware name: linux,dummy-virt (DT)
[  131.621882] Call trace:
[  131.622658]  dump_backtrace.part.0+0xdc/0xf0
[  131.624034]  show_stack+0x18/0x30
[  131.625055]  dump_stack_lvl+0x64/0x80
[  131.626082]  print_report+0x158/0x458
[  131.627012]  kasan_report+0xb4/0xf4
[  131.627942]  __asan_load1+0x68/0x74
[  131.628915]  vmalloc_oob+0xe0/0x310
[  131.629886]  kunit_try_run_case+0x84/0x120
[  131.630952]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.632194]  kthread+0x180/0x190
[  131.633105]  ret_from_fork+0x10/0x20
[  131.634064] 
[  131.634587] The buggy address belongs to the virtual mapping at
[  131.634587]  [ffff8000080fb000, ffff8000080fd000) created by:
[  131.634587]  vmalloc_oob+0x80/0x310
[  131.636917] 
[  131.637468] The buggy address belongs to the physical page:
[  131.638461] page:0000000069017c0b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596a
[  131.640040] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  131.641380] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  131.642706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  131.644004] page dumped because: kasan: bad access detected
[  131.645039] 
[  131.645538] Memory state around the buggy address:
[  131.646593]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.647875]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.649127] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  131.650399]                                                                 ^
[  131.651699]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.653013]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.654260] ==================================================================

test log snippet boot parser 195

Home

[  131.566894] ==================================================================
[  131.569208] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc0/0x310
[  131.570629] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[  131.572389] 
[  131.572906] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.574438] Hardware name: linux,dummy-virt (DT)
[  131.575576] Call trace:
[  131.576232]  dump_backtrace.part.0+0xdc/0xf0
[  131.577436]  show_stack+0x18/0x30
[  131.578422]  dump_stack_lvl+0x64/0x80
[  131.579557]  print_report+0x158/0x458
[  131.580645]  kasan_report+0xb4/0xf4
[  131.581570]  __asan_load1+0x68/0x74
[  131.582499]  vmalloc_oob+0xc0/0x310
[  131.583717]  kunit_try_run_case+0x84/0x120
[  131.585017]  kunit_generic_run_threadfn_adapter+0x30/0x50
[  131.586491]  kthread+0x180/0x190
[  131.587556]  ret_from_fork+0x10/0x20
[  131.588559] 
[  131.589060] The buggy address belongs to the virtual mapping at
[  131.589060]  [ffff8000080fb000, ffff8000080fd000) created by:
[  131.589060]  vmalloc_oob+0x80/0x310
[  131.591378] 
[  131.592425] The buggy address belongs to the physical page:
[  131.593447] page:0000000069017c0b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596a
[  131.595030] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  131.596491] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  131.597827] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  131.599240] page dumped because: kasan: bad access detected
[  131.600189] 
[  131.600727] Memory state around the buggy address:
[  131.601798]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.603124]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.605331] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  131.606459]                                                              ^
[  131.607841]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.609215]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.610624] ==================================================================

test log snippet boot parser 196

Home

[  185.910363] ==================================================================
[  185.912675] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1e4
[  185.914557] Read of size 1 at addr ffff800008ba7cdf by task kunit_try_catch/239
[  185.915927] 
[  185.916852] CPU: 1 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  185.918617] Hardware name: linux,dummy-virt (DT)
[  185.920116] Call trace:
[  185.920816]  dump_backtrace+0xe0/0x134
[  185.921929]  show_stack+0x20/0x2c
[  185.923150]  dump_stack_lvl+0x88/0xb4
[  185.924256]  print_report+0x158/0x458
[  185.926018]  kasan_report+0xb4/0x170
[  185.927305]  __asan_load1+0x68/0x74
[  185.928296]  kasan_alloca_oob_left+0x108/0x1e4
[  185.929575]  kunit_try_run_case+0x8c/0x124
[  185.930998]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  185.932725]  kthread+0x15c/0x170
[  185.934283]  ret_from_fork+0x10/0x20
[  185.935936] 
[  185.936647] The buggy address belongs to stack of task kunit_try_catch/239
[  185.938081] 
[  185.938916] The buggy address belongs to the virtual mapping at
[  185.938916]  [ffff800008ba0000, ffff800008ba9000) created by:
[  185.938916]  kernel_clone+0xf8/0x540
[  185.941714] 
[  185.943199] The buggy address belongs to the physical page:
[  185.944671] page:000000006a41f6c2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106689
[  185.947884] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  185.949570] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  185.951295] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  185.952759] page dumped because: kasan: bad access detected
[  185.953931] 
[  185.954486] Memory state around the buggy address:
[  185.955772]  ffff800008ba7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.958117]  ffff800008ba7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.960051] >ffff800008ba7c80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[  185.961422]                                                     ^
[  185.962748]  ffff800008ba7d00: cb cb cb cb f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[  185.964244]  ffff800008ba7d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  185.965747] ==================================================================

test log snippet boot parser 197

Home

[  185.985964] ==================================================================
[  185.988126] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x114/0x200
[  185.990162] Read of size 1 at addr ffff800008b67cca by task kunit_try_catch/240
[  185.991969] 
[  185.992652] CPU: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  185.994603] Hardware name: linux,dummy-virt (DT)
[  185.995775] Call trace:
[  185.996591]  dump_backtrace+0xe0/0x134
[  185.997875]  show_stack+0x20/0x2c
[  185.998835]  dump_stack_lvl+0x88/0xb4
[  186.000026]  print_report+0x158/0x458
[  186.001177]  kasan_report+0xb4/0x170
[  186.002275]  __asan_load1+0x68/0x74
[  186.003547]  kasan_alloca_oob_right+0x114/0x200
[  186.004843]  kunit_try_run_case+0x8c/0x124
[  186.005992]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.007723]  kthread+0x15c/0x170
[  186.009479]  ret_from_fork+0x10/0x20
[  186.010600] 
[  186.011525] The buggy address belongs to stack of task kunit_try_catch/240
[  186.012927] 
[  186.013564] The buggy address belongs to the virtual mapping at
[  186.013564]  [ffff800008b60000, ffff800008b69000) created by:
[  186.013564]  kernel_clone+0xf8/0x540
[  186.016463] 
[  186.017308] The buggy address belongs to the physical page:
[  186.018868] page:0000000034ab57dd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674f
[  186.020671] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  186.022240] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  186.024054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  186.025470] page dumped because: kasan: bad access detected
[  186.026666] 
[  186.028030] Memory state around the buggy address:
[  186.029002]  ffff800008b67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.030585]  ffff800008b67c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.032476] >ffff800008b67c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  186.034199]                                               ^
[  186.035782]  ffff800008b67d00: 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00
[  186.037411]  ffff800008b67d80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.038788] ==================================================================

test log snippet boot parser 198

Home

[  188.777627] ==================================================================
[  188.779209] BUG: KASAN: double-free in __kmem_cache_free+0x15c/0x2a0
[  188.780912] Free of addr ffff0000c667be00 by task kunit_try_catch/251
[  188.782539] 
[  188.783137] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.784774] Hardware name: linux,dummy-virt (DT)
[  188.785943] Call trace:
[  188.786919]  dump_backtrace+0xe0/0x134
[  188.787886]  show_stack+0x20/0x2c
[  188.789022]  dump_stack_lvl+0x88/0xb4
[  188.790159]  print_report+0x158/0x458
[  188.791256]  kasan_report_invalid_free+0x98/0x12c
[  188.792732]  __kasan_slab_free+0x134/0x170
[  188.793863]  slab_free_freelist_hook+0xd8/0x1c0
[  188.795303]  __kmem_cache_free+0x15c/0x2a0
[  188.796539]  kfree+0x88/0x150
[  188.797677]  kfree_sensitive+0x2c/0x64
[  188.799127]  kmalloc_double_kzfree+0xcc/0x1e0
[  188.800395]  kunit_try_run_case+0x8c/0x124
[  188.802275]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.804262]  kthread+0x15c/0x170
[  188.805442]  ret_from_fork+0x10/0x20
[  188.806650] 
[  188.807153] Allocated by task 251:
[  188.807959]  kasan_save_stack+0x3c/0x70
[  188.809285]  kasan_set_track+0x2c/0x40
[  188.810521]  kasan_save_alloc_info+0x24/0x34
[  188.811702]  __kasan_kmalloc+0xd4/0xe0
[  188.812820]  kmalloc_trace+0x8c/0x150
[  188.814034]  kmalloc_double_kzfree+0x9c/0x1e0
[  188.815534]  kunit_try_run_case+0x8c/0x124
[  188.817683]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.819389]  kthread+0x15c/0x170
[  188.820485]  ret_from_fork+0x10/0x20
[  188.821607] 
[  188.822318] Freed by task 251:
[  188.823388]  kasan_save_stack+0x3c/0x70
[  188.824598]  kasan_set_track+0x2c/0x40
[  188.825634]  kasan_save_free_info+0x38/0x5c
[  188.826946]  __kasan_slab_free+0x100/0x170
[  188.828251]  slab_free_freelist_hook+0xd8/0x1c0
[  188.829701]  __kmem_cache_free+0x15c/0x2a0
[  188.831023]  kfree+0x88/0x150
[  188.832190]  kfree_sensitive+0x54/0x64
[  188.833312]  kmalloc_double_kzfree+0xbc/0x1e0
[  188.834615]  kunit_try_run_case+0x8c/0x124
[  188.835920]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.838260]  kthread+0x15c/0x170
[  188.839447]  ret_from_fork+0x10/0x20
[  188.840592] 
[  188.841238] The buggy address belongs to the object at ffff0000c667be00
[  188.841238]  which belongs to the cache kmalloc-128 of size 128
[  188.843467] The buggy address is located 0 bytes inside of
[  188.843467]  128-byte region [ffff0000c667be00, ffff0000c667be80)
[  188.845761] 
[  188.846393] The buggy address belongs to the physical page:
[  188.847634] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.849539] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.851384] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.853244] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.854597] page dumped because: kasan: bad access detected
[  188.856111] 
[  188.857181] Memory state around the buggy address:
[  188.858707]  ffff0000c667bd00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.860297]  ffff0000c667bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.862423] >ffff0000c667be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.863996]                    ^
[  188.864994]  ffff0000c667be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.866700]  ffff0000c667bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.868465] ==================================================================

test log snippet boot parser 199

Home

[  186.221054] ==================================================================
[  186.222885] BUG: KASAN: double-free in kmem_cache_free+0x194/0x430
[  186.224618] Free of addr ffff0000c667b000 by task kunit_try_catch/243
[  186.226832] 
[  186.227652] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.229565] Hardware name: linux,dummy-virt (DT)
[  186.230600] Call trace:
[  186.231240]  dump_backtrace+0xe0/0x134
[  186.232299]  show_stack+0x20/0x2c
[  186.233977]  dump_stack_lvl+0x88/0xb4
[  186.235303]  print_report+0x158/0x458
[  186.236411]  kasan_report_invalid_free+0x98/0x12c
[  186.238068]  __kasan_slab_free+0x134/0x170
[  186.239755]  slab_free_freelist_hook+0xd8/0x1c0
[  186.241580]  kmem_cache_free+0x194/0x430
[  186.242654]  kmem_cache_double_free+0xec/0x250
[  186.244139]  kunit_try_run_case+0x8c/0x124
[  186.245287]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.246723]  kthread+0x15c/0x170
[  186.247917]  ret_from_fork+0x10/0x20
[  186.249204] 
[  186.250147] Allocated by task 243:
[  186.251310]  kasan_save_stack+0x3c/0x70
[  186.252603]  kasan_set_track+0x2c/0x40
[  186.253935]  kasan_save_alloc_info+0x24/0x34
[  186.255362]  __kasan_slab_alloc+0xa8/0xac
[  186.256571]  kmem_cache_alloc+0x190/0x3b4
[  186.257666]  kmem_cache_double_free+0xbc/0x250
[  186.259075]  kunit_try_run_case+0x8c/0x124
[  186.260257]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.261893]  kthread+0x15c/0x170
[  186.262923]  ret_from_fork+0x10/0x20
[  186.264239] 
[  186.264816] Freed by task 243:
[  186.265645]  kasan_save_stack+0x3c/0x70
[  186.266950]  kasan_set_track+0x2c/0x40
[  186.268101]  kasan_save_free_info+0x38/0x5c
[  186.270002]  __kasan_slab_free+0x100/0x170
[  186.271308]  slab_free_freelist_hook+0xd8/0x1c0
[  186.272770]  kmem_cache_free+0x194/0x430
[  186.273917]  kmem_cache_double_free+0xd8/0x250
[  186.275267]  kunit_try_run_case+0x8c/0x124
[  186.276566]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.277943]  kthread+0x15c/0x170
[  186.279188]  ret_from_fork+0x10/0x20
[  186.280426] 
[  186.281628] The buggy address belongs to the object at ffff0000c667b000
[  186.281628]  which belongs to the cache test_cache of size 200
[  186.283930] The buggy address is located 0 bytes inside of
[  186.283930]  200-byte region [ffff0000c667b000, ffff0000c667b0c8)
[  186.286837] 
[  186.287430] The buggy address belongs to the physical page:
[  186.289235] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  186.291143] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.294128] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c62da600
[  186.296158] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  186.297631] page dumped because: kasan: bad access detected
[  186.298849] 
[  186.299447] Memory state around the buggy address:
[  186.301078]  ffff0000c667af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  186.303279]  ffff0000c667af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  186.304618] >ffff0000c667b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  186.306076]                    ^
[  186.307326]  ffff0000c667b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  186.309067]  ffff0000c667b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.310552] ==================================================================

test log snippet boot parser 200

Home

[  185.745501] ==================================================================
[  185.747984] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x160
[  185.749863] Read of size 1 at addr ffffd3232c7c2ded by task kunit_try_catch/236
[  185.751386] 
[  185.752440] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  185.754053] Hardware name: linux,dummy-virt (DT)
[  185.755329] Call trace:
[  185.755887]  dump_backtrace+0xe0/0x134
[  185.757058]  show_stack+0x20/0x2c
[  185.758043]  dump_stack_lvl+0x88/0xb4
[  185.759492]  print_report+0x158/0x458
[  185.760585]  kasan_report+0xb4/0x170
[  185.761676]  __asan_load1+0x68/0x74
[  185.762980]  kasan_global_oob_right+0xa8/0x160
[  185.764234]  kunit_try_run_case+0x8c/0x124
[  185.765394]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  185.766815]  kthread+0x15c/0x170
[  185.767935]  ret_from_fork+0x10/0x20
[  185.769139] 
[  185.769871] The buggy address belongs to the variable:
[  185.770975]  global_array+0xd/0x40
[  185.772449] 
[  185.773191] The buggy address belongs to the virtual mapping at
[  185.773191]  [ffffd3232b1d0000, ffffd3232c891000) created by:
[  185.773191]  paging_init+0x290/0x7ec
[  185.776287] 
[  185.777147] The buggy address belongs to the physical page:
[  185.778834] page:00000000fecf1f34 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x469c2
[  185.780563] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  185.782275] raw: 03fffc0000001000 fffffc00001a7088 fffffc00001a7088 0000000000000000
[  185.784123] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  185.785644] page dumped because: kasan: bad access detected
[  185.789046] 
[  185.789751] Memory state around the buggy address:
[  185.790686]  ffffd3232c7c2c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.792409]  ffffd3232c7c2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.793918] >ffffd3232c7c2d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[  185.795455]                                                           ^
[  185.796793]  ffffd3232c7c2e00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[  185.798291]  ffffd3232c7c2e80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[  185.799728] ==================================================================

test log snippet boot parser 201

Home

[  182.503669] ==================================================================
[  182.505718] BUG: KASAN: invalid-free in kfree+0x144/0x150
[  182.506973] Free of addr ffff0000c6848001 by task kunit_try_catch/209
[  182.508183] 
[  182.508835] CPU: 1 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.511284] Hardware name: linux,dummy-virt (DT)
[  182.513108] Call trace:
[  182.513946]  dump_backtrace+0xe0/0x134
[  182.515292]  show_stack+0x20/0x2c
[  182.517103]  dump_stack_lvl+0x88/0xb4
[  182.518317]  print_report+0x158/0x458
[  182.519651]  kasan_report_invalid_free+0x98/0x12c
[  182.521055]  __kasan_kfree_large+0x54/0xa0
[  182.522235]  free_large_kmalloc+0x64/0xcc
[  182.523532]  kfree+0x144/0x150
[  182.524588]  kmalloc_pagealloc_invalid_free+0xa8/0x1c0
[  182.526123]  kunit_try_run_case+0x8c/0x124
[  182.527566]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.529199]  kthread+0x15c/0x170
[  182.530437]  ret_from_fork+0x10/0x20
[  182.531736] 
[  182.532372] The buggy address belongs to the physical page:
[  182.533636] page:0000000005b5560f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106848
[  182.535356] head:0000000005b5560f order:2 compound_mapcount:0 compound_pincount:0
[  182.537008] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  182.539854] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  182.541335] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  182.542833] page dumped because: kasan: bad access detected
[  182.544077] 
[  182.544698] Memory state around the buggy address:
[  182.545802]  ffff0000c6847f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.547352]  ffff0000c6847f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.549465] >ffff0000c6848000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.551179]                    ^
[  182.552357]  ffff0000c6848080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.553873]  ffff0000c6848100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.555605] ==================================================================

test log snippet boot parser 202

Home

[  186.359878] ==================================================================
[  186.362201] BUG: KASAN: invalid-free in kmem_cache_free+0x194/0x430
[  186.363785] Free of addr ffff0000c6670001 by task kunit_try_catch/244
[  186.365298] 
[  186.366005] CPU: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.367655] Hardware name: linux,dummy-virt (DT)
[  186.368616] Call trace:
[  186.369421]  dump_backtrace+0xe0/0x134
[  186.370669]  show_stack+0x20/0x2c
[  186.371879]  dump_stack_lvl+0x88/0xb4
[  186.373091]  print_report+0x158/0x458
[  186.374225]  kasan_report_invalid_free+0x98/0x12c
[  186.375574]  __kasan_slab_free+0x164/0x170
[  186.376825]  slab_free_freelist_hook+0xd8/0x1c0
[  186.378401]  kmem_cache_free+0x194/0x430
[  186.379674]  kmem_cache_invalid_free+0xe0/0x230
[  186.380837]  kunit_try_run_case+0x8c/0x124
[  186.382010]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.383615]  kthread+0x15c/0x170
[  186.384774]  ret_from_fork+0x10/0x20
[  186.385845] 
[  186.388335] Allocated by task 244:
[  186.390195]  kasan_save_stack+0x3c/0x70
[  186.391452]  kasan_set_track+0x2c/0x40
[  186.392605]  kasan_save_alloc_info+0x24/0x34
[  186.393792]  __kasan_slab_alloc+0xa8/0xac
[  186.394977]  kmem_cache_alloc+0x190/0x3b4
[  186.396170]  kmem_cache_invalid_free+0xbc/0x230
[  186.397876]  kunit_try_run_case+0x8c/0x124
[  186.399366]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.401069]  kthread+0x15c/0x170
[  186.401988]  ret_from_fork+0x10/0x20
[  186.403200] 
[  186.403845] The buggy address belongs to the object at ffff0000c6670000
[  186.403845]  which belongs to the cache test_cache of size 200
[  186.405964] The buggy address is located 1 bytes inside of
[  186.405964]  200-byte region [ffff0000c6670000, ffff0000c66700c8)
[  186.408559] 
[  186.409152] The buggy address belongs to the physical page:
[  186.410410] page:00000000319418dd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106670
[  186.412030] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.413570] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c62da780
[  186.415690] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  186.416985] page dumped because: kasan: bad access detected
[  186.418256] 
[  186.418769] Memory state around the buggy address:
[  186.420145]  ffff0000c666ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.421802]  ffff0000c666ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.423604] >ffff0000c6670000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.425082]                    ^
[  186.425963]  ffff0000c6670080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  186.427696]  ffff0000c6670100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.429564] ==================================================================

test log snippet boot parser 203

Home

[  184.486022] ==================================================================
[  184.488092] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1fc
[  184.489760] Read of size 18446744073709551614 at addr ffff0000c655c904 by task kunit_try_catch/225
[  184.492140] 
[  184.492790] CPU: 1 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.494610] Hardware name: linux,dummy-virt (DT)
[  184.495786] Call trace:
[  184.496419]  dump_backtrace+0xe0/0x134
[  184.497452]  show_stack+0x20/0x2c
[  184.499048]  dump_stack_lvl+0x88/0xb4
[  184.500201]  print_report+0x158/0x458
[  184.501273]  kasan_report+0xb4/0x170
[  184.502324]  kasan_check_range+0xe4/0x190
[  184.503463]  memmove+0x44/0xc0
[  184.504497]  kmalloc_memmove_negative_size+0xe4/0x1fc
[  184.505947]  kunit_try_run_case+0x8c/0x124
[  184.507066]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.508473]  kthread+0x15c/0x170
[  184.509606]  ret_from_fork+0x10/0x20
[  184.510680] 
[  184.511201] Allocated by task 225:
[  184.512135]  kasan_save_stack+0x3c/0x70
[  184.513179]  kasan_set_track+0x2c/0x40
[  184.514286]  kasan_save_alloc_info+0x24/0x34
[  184.515455]  __kasan_kmalloc+0xd4/0xe0
[  184.516590]  kmalloc_trace+0x8c/0x150
[  184.517656]  kmalloc_memmove_negative_size+0xa0/0x1fc
[  184.519050]  kunit_try_run_case+0x8c/0x124
[  184.520182]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.521586]  kthread+0x15c/0x170
[  184.522652]  ret_from_fork+0x10/0x20
[  184.523700] 
[  184.524240] The buggy address belongs to the object at ffff0000c655c900
[  184.524240]  which belongs to the cache kmalloc-128 of size 128
[  184.526370] The buggy address is located 4 bytes inside of
[  184.526370]  128-byte region [ffff0000c655c900, ffff0000c655c980)
[  184.528421] 
[  184.529062] The buggy address belongs to the physical page:
[  184.530311] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.532102] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.533760] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.535276] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.536699] page dumped because: kasan: bad access detected
[  184.537801] 
[  184.538366] Memory state around the buggy address:
[  184.539568]  ffff0000c655c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.541029]  ffff0000c655c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.542571] >ffff0000c655c900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  184.543937]                    ^
[  184.544781]  ffff0000c655c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.546328]  ffff0000c655ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.547788] ==================================================================

test log snippet boot parser 204

Home

[  187.948476] ==================================================================
[  187.950184] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1f0/0x68c
[  187.951973] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.953542] 
[  187.954179] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.955859] Hardware name: linux,dummy-virt (DT)
[  187.956893] Call trace:
[  187.957599]  dump_backtrace+0xe0/0x134
[  187.958618]  show_stack+0x20/0x2c
[  187.959601]  dump_stack_lvl+0x88/0xb4
[  187.960706]  print_report+0x158/0x458
[  187.961769]  kasan_report+0xb4/0x170
[  187.962810]  __asan_load8+0x80/0xac
[  187.963967]  kasan_bitops_modify.constprop.0+0x1f0/0x68c
[  187.965325]  kasan_bitops_generic+0xb4/0x140
[  187.966647]  kunit_try_run_case+0x8c/0x124
[  187.967803]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.969192]  kthread+0x15c/0x170
[  187.970235]  ret_from_fork+0x10/0x20
[  187.971756] 
[  187.972321] Allocated by task 249:
[  187.973233]  kasan_save_stack+0x3c/0x70
[  187.974877]  kasan_set_track+0x2c/0x40
[  187.976408]  kasan_save_alloc_info+0x24/0x34
[  187.977634]  __kasan_kmalloc+0xd4/0xe0
[  187.978715]  kmalloc_trace+0x8c/0x150
[  187.979775]  kasan_bitops_generic+0x98/0x140
[  187.981113]  kunit_try_run_case+0x8c/0x124
[  187.982288]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.983701]  kthread+0x15c/0x170
[  187.984723]  ret_from_fork+0x10/0x20
[  187.985801] 
[  187.986333] The buggy address belongs to the object at ffff0000c667b800
[  187.986333]  which belongs to the cache kmalloc-128 of size 128
[  187.988432] The buggy address is located 8 bytes inside of
[  187.988432]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.990536] 
[  187.991134] The buggy address belongs to the physical page:
[  187.992308] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.994033] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.995686] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.997243] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.998686] page dumped because: kasan: bad access detected
[  187.999917] 
[  188.000428] Memory state around the buggy address:
[  188.001586]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.003036]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.004491] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.005865]                       ^
[  188.006775]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.008262]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.009695] ==================================================================
---
[  187.753070] ==================================================================
[  187.754422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x188/0x68c
[  187.756225] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.757794] 
[  187.758468] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.760159] Hardware name: linux,dummy-virt (DT)
[  187.761219] Call trace:
[  187.761969]  dump_backtrace+0xe0/0x134
[  187.763138]  show_stack+0x20/0x2c
[  187.764222]  dump_stack_lvl+0x88/0xb4
[  187.765557]  print_report+0x158/0x458
[  187.766845]  kasan_report+0xb4/0x170
[  187.767977]  __asan_load8+0x80/0xac
[  187.769122]  kasan_bitops_modify.constprop.0+0x188/0x68c
[  187.770526]  kasan_bitops_generic+0xb4/0x140
[  187.771886]  kunit_try_run_case+0x8c/0x124
[  187.773067]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.774560]  kthread+0x15c/0x170
[  187.775640]  ret_from_fork+0x10/0x20
[  187.776770] 
[  187.777402] Allocated by task 249:
[  187.778351]  kasan_save_stack+0x3c/0x70
[  187.779478]  kasan_set_track+0x2c/0x40
[  187.780574]  kasan_save_alloc_info+0x24/0x34
[  187.781811]  __kasan_kmalloc+0xd4/0xe0
[  187.783009]  kmalloc_trace+0x8c/0x150
[  187.784111]  kasan_bitops_generic+0x98/0x140
[  187.785409]  kunit_try_run_case+0x8c/0x124
[  187.786625]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.787998]  kthread+0x15c/0x170
[  187.789106]  ret_from_fork+0x10/0x20
[  187.790205] 
[  187.790884] The buggy address belongs to the object at ffff0000c667b800
[  187.790884]  which belongs to the cache kmalloc-128 of size 128
[  187.793103] The buggy address is located 8 bytes inside of
[  187.793103]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.795267] 
[  187.795959] The buggy address belongs to the physical page:
[  187.797188] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.798941] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.800704] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.802269] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.803631] page dumped because: kasan: bad access detected
[  187.804837] 
[  187.805536] Memory state around the buggy address:
[  187.806783]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.808233]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.809805] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.811157]                       ^
[  187.812231]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.813751]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.815114] ==================================================================
---
[  187.397667] ==================================================================
[  187.398885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xcc/0x68c
[  187.400666] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.402319] 
[  187.402928] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.404594] Hardware name: linux,dummy-virt (DT)
[  187.405690] Call trace:
[  187.406432]  dump_backtrace+0xe0/0x134
[  187.407539]  show_stack+0x20/0x2c
[  187.408486]  dump_stack_lvl+0x88/0xb4
[  187.409669]  print_report+0x158/0x458
[  187.410747]  kasan_report+0xb4/0x170
[  187.411845]  __asan_load8+0x80/0xac
[  187.412913]  kasan_bitops_modify.constprop.0+0xcc/0x68c
[  187.414267]  kasan_bitops_generic+0xb4/0x140
[  187.415611]  kunit_try_run_case+0x8c/0x124
[  187.416787]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.418158]  kthread+0x15c/0x170
[  187.419234]  ret_from_fork+0x10/0x20
[  187.420332] 
[  187.420870] Allocated by task 249:
[  187.421817]  kasan_save_stack+0x3c/0x70
[  187.422905]  kasan_set_track+0x2c/0x40
[  187.423960]  kasan_save_alloc_info+0x24/0x34
[  187.425237]  __kasan_kmalloc+0xd4/0xe0
[  187.426322]  kmalloc_trace+0x8c/0x150
[  187.427386]  kasan_bitops_generic+0x98/0x140
[  187.428620]  kunit_try_run_case+0x8c/0x124
[  187.429793]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.431202]  kthread+0x15c/0x170
[  187.432469]  ret_from_fork+0x10/0x20
[  187.433672] 
[  187.434236] The buggy address belongs to the object at ffff0000c667b800
[  187.434236]  which belongs to the cache kmalloc-128 of size 128
[  187.437400] The buggy address is located 8 bytes inside of
[  187.437400]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.439922] 
[  187.440533] The buggy address belongs to the physical page:
[  187.441631] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.444131] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.445990] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.447439] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.449031] page dumped because: kasan: bad access detected
[  187.450279] 
[  187.451049] Memory state around the buggy address:
[  187.452561]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.454134]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.455741] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.456959]                       ^
[  187.458264]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.459673]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.460871] ==================================================================
---
[  187.539732] ==================================================================
[  187.541132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x124/0x68c
[  187.542875] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.544422] 
[  187.545160] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.547120] Hardware name: linux,dummy-virt (DT)
[  187.548089] Call trace:
[  187.548968]  dump_backtrace+0xe0/0x134
[  187.550112]  show_stack+0x20/0x2c
[  187.551114]  dump_stack_lvl+0x88/0xb4
[  187.552253]  print_report+0x158/0x458
[  187.553342]  kasan_report+0xb4/0x170
[  187.554401]  __asan_load8+0x80/0xac
[  187.555576]  kasan_bitops_modify.constprop.0+0x124/0x68c
[  187.557292]  kasan_bitops_generic+0xb4/0x140
[  187.558881]  kunit_try_run_case+0x8c/0x124
[  187.560234]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.561749]  kthread+0x15c/0x170
[  187.563024]  ret_from_fork+0x10/0x20
[  187.564760] 
[  187.565679] Allocated by task 249:
[  187.567104]  kasan_save_stack+0x3c/0x70
[  187.568296]  kasan_set_track+0x2c/0x40
[  187.569435]  kasan_save_alloc_info+0x24/0x34
[  187.570712]  __kasan_kmalloc+0xd4/0xe0
[  187.572135]  kmalloc_trace+0x8c/0x150
[  187.573665]  kasan_bitops_generic+0x98/0x140
[  187.574900]  kunit_try_run_case+0x8c/0x124
[  187.576110]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.577483]  kthread+0x15c/0x170
[  187.578627]  ret_from_fork+0x10/0x20
[  187.580736] 
[  187.581341] The buggy address belongs to the object at ffff0000c667b800
[  187.581341]  which belongs to the cache kmalloc-128 of size 128
[  187.583782] The buggy address is located 8 bytes inside of
[  187.583782]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.585872] 
[  187.586848] The buggy address belongs to the physical page:
[  187.588749] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.590790] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.592491] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.594067] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.595872] page dumped because: kasan: bad access detected
[  187.597094] 
[  187.597652] Memory state around the buggy address:
[  187.598616]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.600289]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.601739] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.603287]                       ^
[  187.604638]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.606451]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.608281] ==================================================================

test log snippet boot parser 205

Home

[  187.464361] ==================================================================
[  187.465695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf8/0x68c
[  187.467772] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.469090] 
[  187.469766] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.471770] Hardware name: linux,dummy-virt (DT)
[  187.472855] Call trace:
[  187.473696]  dump_backtrace+0xe0/0x134
[  187.475024]  show_stack+0x20/0x2c
[  187.476287]  dump_stack_lvl+0x88/0xb4
[  187.477476]  print_report+0x158/0x458
[  187.479081]  kasan_report+0xb4/0x170
[  187.480261]  kasan_check_range+0xe4/0x190
[  187.481946]  __kasan_check_write+0x28/0x3c
[  187.483368]  kasan_bitops_modify.constprop.0+0xf8/0x68c
[  187.484826]  kasan_bitops_generic+0xb4/0x140
[  187.486065]  kunit_try_run_case+0x8c/0x124
[  187.487430]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.489074]  kthread+0x15c/0x170
[  187.490315]  ret_from_fork+0x10/0x20
[  187.491685] 
[  187.492231] Allocated by task 249:
[  187.493028]  kasan_save_stack+0x3c/0x70
[  187.493936]  kasan_set_track+0x2c/0x40
[  187.495343]  kasan_save_alloc_info+0x24/0x34
[  187.497251]  __kasan_kmalloc+0xd4/0xe0
[  187.498542]  kmalloc_trace+0x8c/0x150
[  187.499830]  kasan_bitops_generic+0x98/0x140
[  187.501287]  kunit_try_run_case+0x8c/0x124
[  187.502571]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.504454]  kthread+0x15c/0x170
[  187.505933]  ret_from_fork+0x10/0x20
[  187.507473] 
[  187.508337] The buggy address belongs to the object at ffff0000c667b800
[  187.508337]  which belongs to the cache kmalloc-128 of size 128
[  187.510429] The buggy address is located 8 bytes inside of
[  187.510429]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.512378] 
[  187.513072] The buggy address belongs to the physical page:
[  187.514938] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.516894] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.518915] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.521245] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.522814] page dumped because: kasan: bad access detected
[  187.524054] 
[  187.524687] Memory state around the buggy address:
[  187.525908]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.528461]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.529889] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.531319]                       ^
[  187.532348]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.533915]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.536452] ==================================================================
---
[  187.819164] ==================================================================
[  187.820323] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x198/0x68c
[  187.822082] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.823883] 
[  187.824500] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.826128] Hardware name: linux,dummy-virt (DT)
[  187.827126] Call trace:
[  187.827885]  dump_backtrace+0xe0/0x134
[  187.828953]  show_stack+0x20/0x2c
[  187.829888]  dump_stack_lvl+0x88/0xb4
[  187.830987]  print_report+0x158/0x458
[  187.832086]  kasan_report+0xb4/0x170
[  187.833159]  kasan_check_range+0xe4/0x190
[  187.834268]  __kasan_check_write+0x28/0x3c
[  187.835539]  kasan_bitops_modify.constprop.0+0x198/0x68c
[  187.836919]  kasan_bitops_generic+0xb4/0x140
[  187.838149]  kunit_try_run_case+0x8c/0x124
[  187.839368]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.840740]  kthread+0x15c/0x170
[  187.841793]  ret_from_fork+0x10/0x20
[  187.842878] 
[  187.843442] Allocated by task 249:
[  187.844369]  kasan_save_stack+0x3c/0x70
[  187.845475]  kasan_set_track+0x2c/0x40
[  187.846596]  kasan_save_alloc_info+0x24/0x34
[  187.847801]  __kasan_kmalloc+0xd4/0xe0
[  187.848836]  kmalloc_trace+0x8c/0x150
[  187.849953]  kasan_bitops_generic+0x98/0x140
[  187.851205]  kunit_try_run_case+0x8c/0x124
[  187.852380]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.853755]  kthread+0x15c/0x170
[  187.854822]  ret_from_fork+0x10/0x20
[  187.855847] 
[  187.856364] The buggy address belongs to the object at ffff0000c667b800
[  187.856364]  which belongs to the cache kmalloc-128 of size 128
[  187.858471] The buggy address is located 8 bytes inside of
[  187.858471]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.860456] 
[  187.861056] The buggy address belongs to the physical page:
[  187.862191] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.863904] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.865568] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.867160] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.869700] page dumped because: kasan: bad access detected
[  187.871433] 
[  187.872386] Memory state around the buggy address:
[  187.873529]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.875190]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.876625] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.877948]                       ^
[  187.878927]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.880439]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.881862] ==================================================================
---
[  187.688042] ==================================================================
[  187.689492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x68c
[  187.691104] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.692770] 
[  187.693446] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.695120] Hardware name: linux,dummy-virt (DT)
[  187.696188] Call trace:
[  187.696954]  dump_backtrace+0xe0/0x134
[  187.697997]  show_stack+0x20/0x2c
[  187.699046]  dump_stack_lvl+0x88/0xb4
[  187.700145]  print_report+0x158/0x458
[  187.701249]  kasan_report+0xb4/0x170
[  187.702404]  kasan_check_range+0xe4/0x190
[  187.703557]  __kasan_check_write+0x28/0x3c
[  187.704808]  kasan_bitops_modify.constprop.0+0x180/0x68c
[  187.706199]  kasan_bitops_generic+0xb4/0x140
[  187.707529]  kunit_try_run_case+0x8c/0x124
[  187.708723]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.710112]  kthread+0x15c/0x170
[  187.711133]  ret_from_fork+0x10/0x20
[  187.712277] 
[  187.712891] Allocated by task 249:
[  187.713821]  kasan_save_stack+0x3c/0x70
[  187.714929]  kasan_set_track+0x2c/0x40
[  187.716050]  kasan_save_alloc_info+0x24/0x34
[  187.717239]  __kasan_kmalloc+0xd4/0xe0
[  187.718285]  kmalloc_trace+0x8c/0x150
[  187.719434]  kasan_bitops_generic+0x98/0x140
[  187.720702]  kunit_try_run_case+0x8c/0x124
[  187.721880]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.723232]  kthread+0x15c/0x170
[  187.724304]  ret_from_fork+0x10/0x20
[  187.725380] 
[  187.725994] The buggy address belongs to the object at ffff0000c667b800
[  187.725994]  which belongs to the cache kmalloc-128 of size 128
[  187.728127] The buggy address is located 8 bytes inside of
[  187.728127]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.730277] 
[  187.730909] The buggy address belongs to the physical page:
[  187.732063] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.733811] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.735500] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.737004] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.738536] page dumped because: kasan: bad access detected
[  187.739727] 
[  187.740351] Memory state around the buggy address:
[  187.741496]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.742944]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.744479] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.745956]                       ^
[  187.746922]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.748358]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.749755] ==================================================================
---
[  187.328984] ==================================================================
[  187.330943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x68c
[  187.333944] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.335905] 
[  187.336846] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.338574] Hardware name: linux,dummy-virt (DT)
[  187.339492] Call trace:
[  187.340139]  dump_backtrace+0xe0/0x134
[  187.341083]  show_stack+0x20/0x2c
[  187.342201]  dump_stack_lvl+0x88/0xb4
[  187.343321]  print_report+0x158/0x458
[  187.344269]  kasan_report+0xb4/0x170
[  187.345400]  kasan_check_range+0xe4/0x190
[  187.346704]  __kasan_check_write+0x28/0x3c
[  187.347714]  kasan_bitops_modify.constprop.0+0xa4/0x68c
[  187.349145]  kasan_bitops_generic+0xb4/0x140
[  187.350374]  kunit_try_run_case+0x8c/0x124
[  187.351597]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.352959]  kthread+0x15c/0x170
[  187.354017]  ret_from_fork+0x10/0x20
[  187.355057] 
[  187.355621] Allocated by task 249:
[  187.356571]  kasan_save_stack+0x3c/0x70
[  187.357664]  kasan_set_track+0x2c/0x40
[  187.358782]  kasan_save_alloc_info+0x24/0x34
[  187.360006]  __kasan_kmalloc+0xd4/0xe0
[  187.361109]  kmalloc_trace+0x8c/0x150
[  187.362098]  kasan_bitops_generic+0x98/0x140
[  187.363436]  kunit_try_run_case+0x8c/0x124
[  187.364607]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.366017]  kthread+0x15c/0x170
[  187.367007]  ret_from_fork+0x10/0x20
[  187.368104] 
[  187.368657] The buggy address belongs to the object at ffff0000c667b800
[  187.368657]  which belongs to the cache kmalloc-128 of size 128
[  187.370845] The buggy address is located 8 bytes inside of
[  187.370845]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.372872] 
[  187.373450] The buggy address belongs to the physical page:
[  187.374631] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.376354] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.377965] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.379545] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.380995] page dumped because: kasan: bad access detected
[  187.382153] 
[  187.382732] Memory state around the buggy address:
[  187.383856]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.385354]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.386802] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.388226]                       ^
[  187.389236]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.390717]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.392135] ==================================================================
---
[  187.613492] ==================================================================
[  187.615977] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x150/0x68c
[  187.617783] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.619968] 
[  187.620648] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.622348] Hardware name: linux,dummy-virt (DT)
[  187.623332] Call trace:
[  187.624186]  dump_backtrace+0xe0/0x134
[  187.625289]  show_stack+0x20/0x2c
[  187.626283]  dump_stack_lvl+0x88/0xb4
[  187.628379]  print_report+0x158/0x458
[  187.629663]  kasan_report+0xb4/0x170
[  187.630794]  kasan_check_range+0xe4/0x190
[  187.631775]  __kasan_check_write+0x28/0x3c
[  187.632967]  kasan_bitops_modify.constprop.0+0x150/0x68c
[  187.634341]  kasan_bitops_generic+0xb4/0x140
[  187.635762]  kunit_try_run_case+0x8c/0x124
[  187.636929]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.638337]  kthread+0x15c/0x170
[  187.639839]  ret_from_fork+0x10/0x20
[  187.641101] 
[  187.641691] Allocated by task 249:
[  187.642641]  kasan_save_stack+0x3c/0x70
[  187.643754]  kasan_set_track+0x2c/0x40
[  187.644926]  kasan_save_alloc_info+0x24/0x34
[  187.646132]  __kasan_kmalloc+0xd4/0xe0
[  187.647308]  kmalloc_trace+0x8c/0x150
[  187.648488]  kasan_bitops_generic+0x98/0x140
[  187.649745]  kunit_try_run_case+0x8c/0x124
[  187.650975]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.652456]  kthread+0x15c/0x170
[  187.653599]  ret_from_fork+0x10/0x20
[  187.654997] 
[  187.657199] The buggy address belongs to the object at ffff0000c667b800
[  187.657199]  which belongs to the cache kmalloc-128 of size 128
[  187.659999] The buggy address is located 8 bytes inside of
[  187.659999]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.662058] 
[  187.662546] The buggy address belongs to the physical page:
[  187.663788] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.665621] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.667442] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.668990] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.670862] page dumped because: kasan: bad access detected
[  187.671968] 
[  187.672545] Memory state around the buggy address:
[  187.673601]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.675214]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.676864] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.679035]                       ^
[  187.679899]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.681448]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.683341] ==================================================================
---
[  187.884955] ==================================================================
[  187.886271] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1c4/0x68c
[  187.888038] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  187.889601] 
[  187.890214] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.891909] Hardware name: linux,dummy-virt (DT)
[  187.892912] Call trace:
[  187.893571]  dump_backtrace+0xe0/0x134
[  187.894682]  show_stack+0x20/0x2c
[  187.895695]  dump_stack_lvl+0x88/0xb4
[  187.896739]  print_report+0x158/0x458
[  187.897891]  kasan_report+0xb4/0x170
[  187.898960]  kasan_check_range+0xe4/0x190
[  187.900172]  __kasan_check_write+0x28/0x3c
[  187.901332]  kasan_bitops_modify.constprop.0+0x1c4/0x68c
[  187.902728]  kasan_bitops_generic+0xb4/0x140
[  187.903981]  kunit_try_run_case+0x8c/0x124
[  187.905151]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.906550]  kthread+0x15c/0x170
[  187.907563]  ret_from_fork+0x10/0x20
[  187.908677] 
[  187.909293] Allocated by task 249:
[  187.910231]  kasan_save_stack+0x3c/0x70
[  187.911388]  kasan_set_track+0x2c/0x40
[  187.912445]  kasan_save_alloc_info+0x24/0x34
[  187.913769]  __kasan_kmalloc+0xd4/0xe0
[  187.914817]  kmalloc_trace+0x8c/0x150
[  187.915871]  kasan_bitops_generic+0x98/0x140
[  187.917178]  kunit_try_run_case+0x8c/0x124
[  187.918303]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.919766]  kthread+0x15c/0x170
[  187.920798]  ret_from_fork+0x10/0x20
[  187.921861] 
[  187.922404] The buggy address belongs to the object at ffff0000c667b800
[  187.922404]  which belongs to the cache kmalloc-128 of size 128
[  187.924492] The buggy address is located 8 bytes inside of
[  187.924492]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  187.926551] 
[  187.927136] The buggy address belongs to the physical page:
[  187.928324] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.930064] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.931693] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.933226] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.934644] page dumped because: kasan: bad access detected
[  187.935779] 
[  187.936361] Memory state around the buggy address:
[  187.937489]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.939014]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.940432] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.941839]                       ^
[  187.942744]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.944272]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.945665] ==================================================================

test log snippet boot parser 206

Home

[  188.464234] ==================================================================
[  188.465324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1bc/0x770
[  188.467217] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.468930] 
[  188.469651] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.471423] Hardware name: linux,dummy-virt (DT)
[  188.472522] Call trace:
[  188.473251]  dump_backtrace+0xe0/0x134
[  188.474349]  show_stack+0x20/0x2c
[  188.475344]  dump_stack_lvl+0x88/0xb4
[  188.476421]  print_report+0x158/0x458
[  188.477564]  kasan_report+0xb4/0x170
[  188.478708]  __asan_load8+0x80/0xac
[  188.479808]  kasan_bitops_test_and_modify.constprop.0+0x1bc/0x770
[  188.481297]  kasan_bitops_generic+0xc0/0x140
[  188.482640]  kunit_try_run_case+0x8c/0x124
[  188.483835]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.485198]  kthread+0x15c/0x170
[  188.486257]  ret_from_fork+0x10/0x20
[  188.487348] 
[  188.487999] Allocated by task 249:
[  188.488893]  kasan_save_stack+0x3c/0x70
[  188.490041]  kasan_set_track+0x2c/0x40
[  188.491106]  kasan_save_alloc_info+0x24/0x34
[  188.493630]  __kasan_kmalloc+0xd4/0xe0
[  188.494968]  kmalloc_trace+0x8c/0x150
[  188.496046]  kasan_bitops_generic+0x98/0x140
[  188.497357]  kunit_try_run_case+0x8c/0x124
[  188.498540]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.499945]  kthread+0x15c/0x170
[  188.501054]  ret_from_fork+0x10/0x20
[  188.502119] 
[  188.502735] The buggy address belongs to the object at ffff0000c667b800
[  188.502735]  which belongs to the cache kmalloc-128 of size 128
[  188.504831] The buggy address is located 8 bytes inside of
[  188.504831]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.506876] 
[  188.507489] The buggy address belongs to the physical page:
[  188.508669] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.510383] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.512078] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.513580] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.515051] page dumped because: kasan: bad access detected
[  188.516179] 
[  188.516756] Memory state around the buggy address:
[  188.517872]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.519443]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.520969] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.522362]                       ^
[  188.523412]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.524862]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.526224] ==================================================================
---
[  188.336541] ==================================================================
[  188.337794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x770
[  188.339692] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.341590] 
[  188.342224] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.343918] Hardware name: linux,dummy-virt (DT)
[  188.345021] Call trace:
[  188.345826]  dump_backtrace+0xe0/0x134
[  188.346923]  show_stack+0x20/0x2c
[  188.347867]  dump_stack_lvl+0x88/0xb4
[  188.349016]  print_report+0x158/0x458
[  188.350169]  kasan_report+0xb4/0x170
[  188.351210]  __asan_load8+0x80/0xac
[  188.352352]  kasan_bitops_test_and_modify.constprop.0+0x164/0x770
[  188.353885]  kasan_bitops_generic+0xc0/0x140
[  188.354945]  kunit_try_run_case+0x8c/0x124
[  188.356126]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.357481]  kthread+0x15c/0x170
[  188.358479]  ret_from_fork+0x10/0x20
[  188.359646] 
[  188.360169] Allocated by task 249:
[  188.361079]  kasan_save_stack+0x3c/0x70
[  188.362134]  kasan_set_track+0x2c/0x40
[  188.363257]  kasan_save_alloc_info+0x24/0x34
[  188.364439]  __kasan_kmalloc+0xd4/0xe0
[  188.365573]  kmalloc_trace+0x8c/0x150
[  188.366624]  kasan_bitops_generic+0x98/0x140
[  188.367906]  kunit_try_run_case+0x8c/0x124
[  188.369058]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.370458]  kthread+0x15c/0x170
[  188.371524]  ret_from_fork+0x10/0x20
[  188.372578] 
[  188.373096] The buggy address belongs to the object at ffff0000c667b800
[  188.373096]  which belongs to the cache kmalloc-128 of size 128
[  188.375285] The buggy address is located 8 bytes inside of
[  188.375285]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.377337] 
[  188.377939] The buggy address belongs to the physical page:
[  188.379049] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.380641] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.382278] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.383823] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.385230] page dumped because: kasan: bad access detected
[  188.387579] 
[  188.388144] Memory state around the buggy address:
[  188.389171]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.390782]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.392289] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.393636]                       ^
[  188.394596]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.396054]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.397460] ==================================================================
---
[  188.076806] ==================================================================
[  188.079350] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xcc/0x770
[  188.081133] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.082687] 
[  188.083312] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.084976] Hardware name: linux,dummy-virt (DT)
[  188.085987] Call trace:
[  188.086721]  dump_backtrace+0xe0/0x134
[  188.087805]  show_stack+0x20/0x2c
[  188.088815]  dump_stack_lvl+0x88/0xb4
[  188.089885]  print_report+0x158/0x458
[  188.090998]  kasan_report+0xb4/0x170
[  188.092141]  __asan_load8+0x80/0xac
[  188.093167]  kasan_bitops_test_and_modify.constprop.0+0xcc/0x770
[  188.094742]  kasan_bitops_generic+0xc0/0x140
[  188.095994]  kunit_try_run_case+0x8c/0x124
[  188.097174]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.098563]  kthread+0x15c/0x170
[  188.099635]  ret_from_fork+0x10/0x20
[  188.100740] 
[  188.101314] Allocated by task 249:
[  188.102267]  kasan_save_stack+0x3c/0x70
[  188.103354]  kasan_set_track+0x2c/0x40
[  188.104463]  kasan_save_alloc_info+0x24/0x34
[  188.105676]  __kasan_kmalloc+0xd4/0xe0
[  188.106750]  kmalloc_trace+0x8c/0x150
[  188.107775]  kasan_bitops_generic+0x98/0x140
[  188.109041]  kunit_try_run_case+0x8c/0x124
[  188.110264]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.111671]  kthread+0x15c/0x170
[  188.112631]  ret_from_fork+0x10/0x20
[  188.113783] 
[  188.114328] The buggy address belongs to the object at ffff0000c667b800
[  188.114328]  which belongs to the cache kmalloc-128 of size 128
[  188.116473] The buggy address is located 8 bytes inside of
[  188.116473]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.118402] 
[  188.119045] The buggy address belongs to the physical page:
[  188.120171] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.121951] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.123541] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.125084] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.126557] page dumped because: kasan: bad access detected
[  188.127671] 
[  188.128253] Memory state around the buggy address:
[  188.129378]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.130822]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.132315] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.133741]                       ^
[  188.134702]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.136202]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.137607] ==================================================================
---
[  188.528914] ==================================================================
[  188.530067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0x770
[  188.532027] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.533593] 
[  188.534240] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.535815] Hardware name: linux,dummy-virt (DT)
[  188.536845] Call trace:
[  188.537482]  dump_backtrace+0xe0/0x134
[  188.538576]  show_stack+0x20/0x2c
[  188.539604]  dump_stack_lvl+0x88/0xb4
[  188.540785]  print_report+0x158/0x458
[  188.541888]  kasan_report+0xb4/0x170
[  188.542947]  __asan_load8+0x80/0xac
[  188.544061]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0x770
[  188.545585]  kasan_bitops_generic+0xc0/0x140
[  188.546872]  kunit_try_run_case+0x8c/0x124
[  188.548116]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.549480]  kthread+0x15c/0x170
[  188.550602]  ret_from_fork+0x10/0x20
[  188.551714] 
[  188.552295] Allocated by task 249:
[  188.553211]  kasan_save_stack+0x3c/0x70
[  188.554328]  kasan_set_track+0x2c/0x40
[  188.555377]  kasan_save_alloc_info+0x24/0x34
[  188.556683]  __kasan_kmalloc+0xd4/0xe0
[  188.557772]  kmalloc_trace+0x8c/0x150
[  188.558809]  kasan_bitops_generic+0x98/0x140
[  188.560110]  kunit_try_run_case+0x8c/0x124
[  188.561352]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.562729]  kthread+0x15c/0x170
[  188.563804]  ret_from_fork+0x10/0x20
[  188.564885] 
[  188.565414] The buggy address belongs to the object at ffff0000c667b800
[  188.565414]  which belongs to the cache kmalloc-128 of size 128
[  188.567489] The buggy address is located 8 bytes inside of
[  188.567489]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.569607] 
[  188.570183] The buggy address belongs to the physical page:
[  188.571359] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.573117] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.574771] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.576363] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.577798] page dumped because: kasan: bad access detected
[  188.579005] 
[  188.579587] Memory state around the buggy address:
[  188.580774]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.582238]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.583785] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.585243]                       ^
[  188.586194]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.587701]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.589150] ==================================================================
---
[  188.207936] ==================================================================
[  188.209135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x770
[  188.210993] Read of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.212527] 
[  188.213158] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.214794] Hardware name: linux,dummy-virt (DT)
[  188.215783] Call trace:
[  188.216452]  dump_backtrace+0xe0/0x134
[  188.217548]  show_stack+0x20/0x2c
[  188.218547]  dump_stack_lvl+0x88/0xb4
[  188.219659]  print_report+0x158/0x458
[  188.220734]  kasan_report+0xb4/0x170
[  188.221854]  __asan_load8+0x80/0xac
[  188.222932]  kasan_bitops_test_and_modify.constprop.0+0x100/0x770
[  188.224480]  kasan_bitops_generic+0xc0/0x140
[  188.225709]  kunit_try_run_case+0x8c/0x124
[  188.226840]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.228225]  kthread+0x15c/0x170
[  188.229338]  ret_from_fork+0x10/0x20
[  188.230403] 
[  188.230934] Allocated by task 249:
[  188.231867]  kasan_save_stack+0x3c/0x70
[  188.232959]  kasan_set_track+0x2c/0x40
[  188.233983]  kasan_save_alloc_info+0x24/0x34
[  188.235187]  __kasan_kmalloc+0xd4/0xe0
[  188.236305]  kmalloc_trace+0x8c/0x150
[  188.237342]  kasan_bitops_generic+0x98/0x140
[  188.238627]  kunit_try_run_case+0x8c/0x124
[  188.239891]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.241228]  kthread+0x15c/0x170
[  188.242266]  ret_from_fork+0x10/0x20
[  188.243323] 
[  188.243897] The buggy address belongs to the object at ffff0000c667b800
[  188.243897]  which belongs to the cache kmalloc-128 of size 128
[  188.246011] The buggy address is located 8 bytes inside of
[  188.246011]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.248043] 
[  188.248490] The buggy address belongs to the physical page:
[  188.249743] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.251540] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.253149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.254711] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.256138] page dumped because: kasan: bad access detected
[  188.257270] 
[  188.257863] Memory state around the buggy address:
[  188.259031]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.260546]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.262017] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.263520]                       ^
[  188.264443]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.265923]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.267295] ==================================================================

test log snippet boot parser 207

Home

[  188.591884] ==================================================================
[  188.593130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x210/0x770
[  188.595594] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.597188] 
[  188.598443] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.600576] Hardware name: linux,dummy-virt (DT)
[  188.601483] Call trace:
[  188.602280]  dump_backtrace+0xe0/0x134
[  188.603357]  show_stack+0x20/0x2c
[  188.604319]  dump_stack_lvl+0x88/0xb4
[  188.605479]  print_report+0x158/0x458
[  188.606581]  kasan_report+0xb4/0x170
[  188.607725]  kasan_check_range+0xe4/0x190
[  188.608948]  __kasan_check_write+0x28/0x3c
[  188.610130]  kasan_bitops_test_and_modify.constprop.0+0x210/0x770
[  188.611674]  kasan_bitops_generic+0xc0/0x140
[  188.612926]  kunit_try_run_case+0x8c/0x124
[  188.614125]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.615475]  kthread+0x15c/0x170
[  188.616603]  ret_from_fork+0x10/0x20
[  188.617676] 
[  188.618264] Allocated by task 249:
[  188.619194]  kasan_save_stack+0x3c/0x70
[  188.620268]  kasan_set_track+0x2c/0x40
[  188.621419]  kasan_save_alloc_info+0x24/0x34
[  188.622594]  __kasan_kmalloc+0xd4/0xe0
[  188.623743]  kmalloc_trace+0x8c/0x150
[  188.624835]  kasan_bitops_generic+0x98/0x140
[  188.626090]  kunit_try_run_case+0x8c/0x124
[  188.627274]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.628637]  kthread+0x15c/0x170
[  188.629761]  ret_from_fork+0x10/0x20
[  188.630855] 
[  188.631425] The buggy address belongs to the object at ffff0000c667b800
[  188.631425]  which belongs to the cache kmalloc-128 of size 128
[  188.633535] The buggy address is located 8 bytes inside of
[  188.633535]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.635644] 
[  188.636206] The buggy address belongs to the physical page:
[  188.637385] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.639135] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.640736] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.642300] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.643762] page dumped because: kasan: bad access detected
[  188.644939] 
[  188.645524] Memory state around the buggy address:
[  188.646679]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.648124]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.649683] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.651025]                       ^
[  188.651966]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.653437]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.654846] ==================================================================
---
[  188.399889] ==================================================================
[  188.401050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x190/0x770
[  188.402902] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.404474] 
[  188.404989] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.406731] Hardware name: linux,dummy-virt (DT)
[  188.407801] Call trace:
[  188.408480]  dump_backtrace+0xe0/0x134
[  188.409553]  show_stack+0x20/0x2c
[  188.410575]  dump_stack_lvl+0x88/0xb4
[  188.411645]  print_report+0x158/0x458
[  188.412749]  kasan_report+0xb4/0x170
[  188.413820]  kasan_check_range+0xe4/0x190
[  188.414945]  __kasan_check_write+0x28/0x3c
[  188.416139]  kasan_bitops_test_and_modify.constprop.0+0x190/0x770
[  188.417654]  kasan_bitops_generic+0xc0/0x140
[  188.418921]  kunit_try_run_case+0x8c/0x124
[  188.420062]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.421480]  kthread+0x15c/0x170
[  188.422572]  ret_from_fork+0x10/0x20
[  188.423666] 
[  188.424183] Allocated by task 249:
[  188.425129]  kasan_save_stack+0x3c/0x70
[  188.426184]  kasan_set_track+0x2c/0x40
[  188.427221]  kasan_save_alloc_info+0x24/0x34
[  188.428447]  __kasan_kmalloc+0xd4/0xe0
[  188.429583]  kmalloc_trace+0x8c/0x150
[  188.430681]  kasan_bitops_generic+0x98/0x140
[  188.431948]  kunit_try_run_case+0x8c/0x124
[  188.433108]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.434432]  kthread+0x15c/0x170
[  188.435466]  ret_from_fork+0x10/0x20
[  188.436558] 
[  188.437110] The buggy address belongs to the object at ffff0000c667b800
[  188.437110]  which belongs to the cache kmalloc-128 of size 128
[  188.439255] The buggy address is located 8 bytes inside of
[  188.439255]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.441370] 
[  188.441976] The buggy address belongs to the physical page:
[  188.443120] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.444815] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.446453] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.447989] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.449499] page dumped because: kasan: bad access detected
[  188.450540] 
[  188.451114] Memory state around the buggy address:
[  188.452355]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.453829]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.455342] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.456707]                       ^
[  188.457721]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.459171]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.460489] ==================================================================
---
[  188.140478] ==================================================================
[  188.141836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x770
[  188.143687] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.145057] 
[  188.145694] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.147410] Hardware name: linux,dummy-virt (DT)
[  188.148469] Call trace:
[  188.149229]  dump_backtrace+0xe0/0x134
[  188.150255]  show_stack+0x20/0x2c
[  188.151227]  dump_stack_lvl+0x88/0xb4
[  188.152296]  print_report+0x158/0x458
[  188.153423]  kasan_report+0xb4/0x170
[  188.154488]  kasan_check_range+0xe4/0x190
[  188.155659]  __kasan_check_write+0x28/0x3c
[  188.156837]  kasan_bitops_test_and_modify.constprop.0+0xf8/0x770
[  188.158317]  kasan_bitops_generic+0xc0/0x140
[  188.159654]  kunit_try_run_case+0x8c/0x124
[  188.160791]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.162172]  kthread+0x15c/0x170
[  188.163249]  ret_from_fork+0x10/0x20
[  188.164354] 
[  188.164892] Allocated by task 249:
[  188.165776]  kasan_save_stack+0x3c/0x70
[  188.166906]  kasan_set_track+0x2c/0x40
[  188.168009]  kasan_save_alloc_info+0x24/0x34
[  188.169190]  __kasan_kmalloc+0xd4/0xe0
[  188.170318]  kmalloc_trace+0x8c/0x150
[  188.171385]  kasan_bitops_generic+0x98/0x140
[  188.172655]  kunit_try_run_case+0x8c/0x124
[  188.173832]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.175188]  kthread+0x15c/0x170
[  188.176277]  ret_from_fork+0x10/0x20
[  188.177359] 
[  188.177899] The buggy address belongs to the object at ffff0000c667b800
[  188.177899]  which belongs to the cache kmalloc-128 of size 128
[  188.180651] The buggy address is located 8 bytes inside of
[  188.180651]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.183606] 
[  188.184237] The buggy address belongs to the physical page:
[  188.185390] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.187263] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.189008] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.190598] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.192003] page dumped because: kasan: bad access detected
[  188.193219] 
[  188.193700] Memory state around the buggy address:
[  188.194880]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.196408]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.197884] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.199269]                       ^
[  188.200281]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.201780]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.203187] ==================================================================
---
[  188.270114] ==================================================================
[  188.271456] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x138/0x770
[  188.273428] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.274970] 
[  188.275623] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.277239] Hardware name: linux,dummy-virt (DT)
[  188.278249] Call trace:
[  188.278976]  dump_backtrace+0xe0/0x134
[  188.280109]  show_stack+0x20/0x2c
[  188.281102]  dump_stack_lvl+0x88/0xb4
[  188.282211]  print_report+0x158/0x458
[  188.283338]  kasan_report+0xb4/0x170
[  188.284726]  kasan_check_range+0xe4/0x190
[  188.285978]  __kasan_check_write+0x28/0x3c
[  188.287755]  kasan_bitops_test_and_modify.constprop.0+0x138/0x770
[  188.289745]  kasan_bitops_generic+0xc0/0x140
[  188.291121]  kunit_try_run_case+0x8c/0x124
[  188.292338]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.293757]  kthread+0x15c/0x170
[  188.294786]  ret_from_fork+0x10/0x20
[  188.295973] 
[  188.296647] Allocated by task 249:
[  188.297601]  kasan_save_stack+0x3c/0x70
[  188.298559]  kasan_set_track+0x2c/0x40
[  188.299644]  kasan_save_alloc_info+0x24/0x34
[  188.300858]  __kasan_kmalloc+0xd4/0xe0
[  188.301999]  kmalloc_trace+0x8c/0x150
[  188.303076]  kasan_bitops_generic+0x98/0x140
[  188.304357]  kunit_try_run_case+0x8c/0x124
[  188.305547]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.306887]  kthread+0x15c/0x170
[  188.308020]  ret_from_fork+0x10/0x20
[  188.309085] 
[  188.309699] The buggy address belongs to the object at ffff0000c667b800
[  188.309699]  which belongs to the cache kmalloc-128 of size 128
[  188.311808] The buggy address is located 8 bytes inside of
[  188.311808]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.313865] 
[  188.314487] The buggy address belongs to the physical page:
[  188.315656] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.317477] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.319159] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.320680] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.322187] page dumped because: kasan: bad access detected
[  188.323348] 
[  188.323946] Memory state around the buggy address:
[  188.325093]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.326588]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.328000] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.329406]                       ^
[  188.330382]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.331877]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.333196] ==================================================================
---
[  188.012872] ==================================================================
[  188.014033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x770
[  188.015991] Write of size 8 at addr ffff0000c667b808 by task kunit_try_catch/249
[  188.017634] 
[  188.018308] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.019919] Hardware name: linux,dummy-virt (DT)
[  188.020971] Call trace:
[  188.021703]  dump_backtrace+0xe0/0x134
[  188.022741]  show_stack+0x20/0x2c
[  188.023752]  dump_stack_lvl+0x88/0xb4
[  188.024820]  print_report+0x158/0x458
[  188.025963]  kasan_report+0xb4/0x170
[  188.027012]  kasan_check_range+0xe4/0x190
[  188.028228]  __kasan_check_write+0x28/0x3c
[  188.029399]  kasan_bitops_test_and_modify.constprop.0+0xa4/0x770
[  188.030952]  kasan_bitops_generic+0xc0/0x140
[  188.032185]  kunit_try_run_case+0x8c/0x124
[  188.033337]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.034712]  kthread+0x15c/0x170
[  188.035807]  ret_from_fork+0x10/0x20
[  188.036895] 
[  188.037432] Allocated by task 249:
[  188.038359]  kasan_save_stack+0x3c/0x70
[  188.039493]  kasan_set_track+0x2c/0x40
[  188.040549]  kasan_save_alloc_info+0x24/0x34
[  188.041732]  __kasan_kmalloc+0xd4/0xe0
[  188.042809]  kmalloc_trace+0x8c/0x150
[  188.043955]  kasan_bitops_generic+0x98/0x140
[  188.045221]  kunit_try_run_case+0x8c/0x124
[  188.046353]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.047767]  kthread+0x15c/0x170
[  188.048851]  ret_from_fork+0x10/0x20
[  188.049945] 
[  188.050541] The buggy address belongs to the object at ffff0000c667b800
[  188.050541]  which belongs to the cache kmalloc-128 of size 128
[  188.052656] The buggy address is located 8 bytes inside of
[  188.052656]  128-byte region [ffff0000c667b800, ffff0000c667b880)
[  188.054686] 
[  188.055273] The buggy address belongs to the physical page:
[  188.056444] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.058176] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.059831] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.061351] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.062815] page dumped because: kasan: bad access detected
[  188.064049] 
[  188.064630] Memory state around the buggy address:
[  188.065720]  ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.067198]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.068703] >ffff0000c667b800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.070102]                       ^
[  188.071017]  ffff0000c667b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.072492]  ffff0000c667b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.073897] ==================================================================

test log snippet boot parser 208

Home

[  182.652685] ==================================================================
[  182.654769] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x200
[  182.656592] Write of size 1 at addr ffff0000c6505f00 by task kunit_try_catch/212
[  182.658171] 
[  182.658853] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.660813] Hardware name: linux,dummy-virt (DT)
[  182.661868] Call trace:
[  182.662907]  dump_backtrace+0xe0/0x134
[  182.664078]  show_stack+0x20/0x2c
[  182.664927]  dump_stack_lvl+0x88/0xb4
[  182.665531]  print_report+0x158/0x458
[  182.666100]  kasan_report+0xb4/0x170
[  182.667774]  __asan_store1+0x68/0x7c
[  182.668992]  kmalloc_large_oob_right+0xc8/0x200
[  182.670321]  kunit_try_run_case+0x8c/0x124
[  182.671648]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.673115]  kthread+0x15c/0x170
[  182.674125]  ret_from_fork+0x10/0x20
[  182.675341] 
[  182.676528] Allocated by task 212:
[  182.677296]  kasan_save_stack+0x3c/0x70
[  182.679635]  kasan_set_track+0x2c/0x40
[  182.680773]  kasan_save_alloc_info+0x24/0x34
[  182.681953]  __kasan_kmalloc+0xd4/0xe0
[  182.683207]  kmalloc_trace+0x8c/0x150
[  182.684343]  kmalloc_large_oob_right+0x9c/0x200
[  182.685881]  kunit_try_run_case+0x8c/0x124
[  182.687160]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.688681]  kthread+0x15c/0x170
[  182.689872]  ret_from_fork+0x10/0x20
[  182.691009] 
[  182.691643] The buggy address belongs to the object at ffff0000c6504000
[  182.691643]  which belongs to the cache kmalloc-8k of size 8192
[  182.694185] The buggy address is located 7936 bytes inside of
[  182.694185]  8192-byte region [ffff0000c6504000, ffff0000c6506000)
[  182.697102] 
[  182.697716] The buggy address belongs to the physical page:
[  182.698922] page:0000000074d13d80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[  182.700622] head:0000000074d13d80 order:3 compound_mapcount:0 compound_pincount:0
[  182.702033] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  182.703926] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[  182.705597] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  182.707676] page dumped because: kasan: bad access detected
[  182.708964] 
[  182.709571] Memory state around the buggy address:
[  182.710783]  ffff0000c6505e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.713186]  ffff0000c6505e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.714781] >ffff0000c6505f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.716177]                    ^
[  182.717157]  ffff0000c6505f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.718652]  ffff0000c6506000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.720699] ==================================================================

test log snippet boot parser 209

Home

[  184.572940] ==================================================================
[  184.575148] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e4
[  184.577052] Read of size 64 at addr ffff0000c655ca04 by task kunit_try_catch/226
[  184.578576] 
[  184.579273] CPU: 1 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.581007] Hardware name: linux,dummy-virt (DT)
[  184.582097] Call trace:
[  184.582747]  dump_backtrace+0xe0/0x134
[  184.583708]  show_stack+0x20/0x2c
[  184.584697]  dump_stack_lvl+0x88/0xb4
[  184.585917]  print_report+0x158/0x458
[  184.587106]  kasan_report+0xb4/0x170
[  184.588177]  kasan_check_range+0xe4/0x190
[  184.589353]  memmove+0x44/0xc0
[  184.590466]  kmalloc_memmove_invalid_size+0xe4/0x1e4
[  184.591801]  kunit_try_run_case+0x8c/0x124
[  184.592989]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.594481]  kthread+0x15c/0x170
[  184.595498]  ret_from_fork+0x10/0x20
[  184.596580] 
[  184.597169] Allocated by task 226:
[  184.598124]  kasan_save_stack+0x3c/0x70
[  184.599802]  kasan_set_track+0x2c/0x40
[  184.601231]  kasan_save_alloc_info+0x24/0x34
[  184.602466]  __kasan_kmalloc+0xd4/0xe0
[  184.603712]  kmalloc_trace+0x8c/0x150
[  184.604802]  kmalloc_memmove_invalid_size+0xa0/0x1e4
[  184.606257]  kunit_try_run_case+0x8c/0x124
[  184.607602]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.609041]  kthread+0x15c/0x170
[  184.609939]  ret_from_fork+0x10/0x20
[  184.611015] 
[  184.611617] The buggy address belongs to the object at ffff0000c655ca00
[  184.611617]  which belongs to the cache kmalloc-128 of size 128
[  184.613651] The buggy address is located 4 bytes inside of
[  184.613651]  128-byte region [ffff0000c655ca00, ffff0000c655ca80)
[  184.615595] 
[  184.616120] The buggy address belongs to the physical page:
[  184.617286] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.618976] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.620630] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.622159] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.623624] page dumped because: kasan: bad access detected
[  184.624789] 
[  184.625363] Memory state around the buggy address:
[  184.626546]  ffff0000c655c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.628048]  ffff0000c655c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.629397] >ffff0000c655ca00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  184.630778]                                            ^
[  184.632019]  ffff0000c655ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.633446]  ffff0000c655cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.634918] ==================================================================

test log snippet boot parser 210

Home

[  182.295681] ==================================================================
[  182.298133] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[  182.299800] Read of size 1 at addr ffff0000c67ef000 by task kunit_try_catch/206
[  182.301317] 
[  182.301990] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.304107] Hardware name: linux,dummy-virt (DT)
[  182.305158] Call trace:
[  182.305929]  dump_backtrace+0xe0/0x134
[  182.307102]  show_stack+0x20/0x2c
[  182.308084]  dump_stack_lvl+0x88/0xb4
[  182.309230]  print_report+0x158/0x458
[  182.310316]  kasan_report+0xb4/0x170
[  182.311384]  __asan_load1+0x68/0x74
[  182.312456]  kmalloc_node_oob_right+0xd0/0x1f0
[  182.313715]  kunit_try_run_case+0x8c/0x124
[  182.314838]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.316293]  kthread+0x15c/0x170
[  182.317342]  ret_from_fork+0x10/0x20
[  182.318404] 
[  182.318991] Allocated by task 206:
[  182.319923]  kasan_save_stack+0x3c/0x70
[  182.321025]  kasan_set_track+0x2c/0x40
[  182.322119]  kasan_save_alloc_info+0x24/0x34
[  182.323324]  __kasan_kmalloc+0xd4/0xe0
[  182.324411]  kmalloc_node_trace+0x90/0x150
[  182.325497]  kmalloc_node_oob_right+0xa4/0x1f0
[  182.326741]  kunit_try_run_case+0x8c/0x124
[  182.327907]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.329280]  kthread+0x15c/0x170
[  182.330305]  ret_from_fork+0x10/0x20
[  182.331326] 
[  182.331913] The buggy address belongs to the object at ffff0000c67ee000
[  182.331913]  which belongs to the cache kmalloc-4k of size 4096
[  182.333998] The buggy address is located 0 bytes to the right of
[  182.333998]  4096-byte region [ffff0000c67ee000, ffff0000c67ef000)
[  182.336192] 
[  182.336781] The buggy address belongs to the physical page:
[  182.338063] page:0000000075e6f1bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e8
[  182.339832] head:0000000075e6f1bf order:3 compound_mapcount:0 compound_pincount:0
[  182.341242] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  182.342926] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[  182.344408] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  182.345826] page dumped because: kasan: bad access detected
[  182.346869] 
[  182.347459] Memory state around the buggy address:
[  182.348968]  ffff0000c67eef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.350439]  ffff0000c67eef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.352047] >ffff0000c67ef000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.353560]                    ^
[  182.354580]  ffff0000c67ef080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.356218]  ffff0000c67ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.357654] ==================================================================

test log snippet boot parser 211

Home

[  183.891620] ==================================================================
[  183.893374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x2a0
[  183.894839] Write of size 16 at addr ffff0000c66d9800 by task kunit_try_catch/218
[  183.897039] 
[  183.897635] CPU: 1 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.899283] Hardware name: linux,dummy-virt (DT)
[  183.900318] Call trace:
[  183.900939]  dump_backtrace+0xe0/0x134
[  183.901495]  show_stack+0x20/0x2c
[  183.902234]  dump_stack_lvl+0x88/0xb4
[  183.903532]  print_report+0x158/0x458
[  183.904871]  kasan_report+0xb4/0x170
[  183.906042]  __asan_store16+0x68/0x94
[  183.907124]  kmalloc_oob_16+0xf8/0x2a0
[  183.908632]  kunit_try_run_case+0x8c/0x124
[  183.909902]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.911618]  kthread+0x15c/0x170
[  183.912771]  ret_from_fork+0x10/0x20
[  183.913989] 
[  183.914787] Allocated by task 218:
[  183.916071]  kasan_save_stack+0x3c/0x70
[  183.917051]  kasan_set_track+0x2c/0x40
[  183.918160]  kasan_save_alloc_info+0x24/0x34
[  183.919613]  __kasan_kmalloc+0xd4/0xe0
[  183.920435]  kmalloc_trace+0x8c/0x150
[  183.921567]  kmalloc_oob_16+0xa4/0x2a0
[  183.922896]  kunit_try_run_case+0x8c/0x124
[  183.924076]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.925160]  kthread+0x15c/0x170
[  183.926287]  ret_from_fork+0x10/0x20
[  183.927697] 
[  183.928421] The buggy address belongs to the object at ffff0000c66d9800
[  183.928421]  which belongs to the cache kmalloc-128 of size 128
[  183.930758] The buggy address is located 0 bytes inside of
[  183.930758]  128-byte region [ffff0000c66d9800, ffff0000c66d9880)
[  183.933213] 
[  183.933997] The buggy address belongs to the physical page:
[  183.935649] page:000000002cb8ccb8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d9
[  183.937400] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.939008] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  183.940688] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.941869] page dumped because: kasan: bad access detected
[  183.943127] 
[  183.943731] Memory state around the buggy address:
[  183.944803]  ffff0000c66d9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  183.946373]  ffff0000c66d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.947982] >ffff0000c66d9800: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.949336]                       ^
[  183.950356]  ffff0000c66d9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.951929]  ffff0000c66d9900: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.953304] ==================================================================

test log snippet boot parser 212

Home

[  184.062113] ==================================================================
[  184.064077] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd4/0x200
[  184.066359] Write of size 128 at addr ffff0000c655c300 by task kunit_try_catch/220
[  184.068894] 
[  184.069659] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.071352] Hardware name: linux,dummy-virt (DT)
[  184.072247] Call trace:
[  184.073021]  dump_backtrace+0xe0/0x134
[  184.074054]  show_stack+0x20/0x2c
[  184.075114]  dump_stack_lvl+0x88/0xb4
[  184.076261]  print_report+0x158/0x458
[  184.077399]  kasan_report+0xb4/0x170
[  184.078478]  kasan_check_range+0xe4/0x190
[  184.079771]  memset+0x40/0x70
[  184.080819]  kmalloc_oob_in_memset+0xd4/0x200
[  184.082137]  kunit_try_run_case+0x8c/0x124
[  184.083425]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.084858]  kthread+0x15c/0x170
[  184.086060]  ret_from_fork+0x10/0x20
[  184.087310] 
[  184.087982] Allocated by task 220:
[  184.088945]  kasan_save_stack+0x3c/0x70
[  184.090224]  kasan_set_track+0x2c/0x40
[  184.091460]  kasan_save_alloc_info+0x24/0x34
[  184.092883]  __kasan_kmalloc+0xd4/0xe0
[  184.094097]  kmalloc_trace+0x8c/0x150
[  184.095492]  kmalloc_oob_in_memset+0xa0/0x200
[  184.096802]  kunit_try_run_case+0x8c/0x124
[  184.097975]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.099686]  kthread+0x15c/0x170
[  184.100628]  ret_from_fork+0x10/0x20
[  184.101551] 
[  184.102177] The buggy address belongs to the object at ffff0000c655c300
[  184.102177]  which belongs to the cache kmalloc-128 of size 128
[  184.104653] The buggy address is located 0 bytes inside of
[  184.104653]  128-byte region [ffff0000c655c300, ffff0000c655c380)
[  184.106912] 
[  184.107558] The buggy address belongs to the physical page:
[  184.108903] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.110617] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.112290] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.114376] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.115724] page dumped because: kasan: bad access detected
[  184.117009] 
[  184.117490] Memory state around the buggy address:
[  184.119100]  ffff0000c655c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  184.120691]  ffff0000c655c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.122142] >ffff0000c655c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  184.123628]                                                                 ^
[  184.125086]  ffff0000c655c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.127668]  ffff0000c655c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.129036] ==================================================================

test log snippet boot parser 213

Home

[  182.200085] ==================================================================
[  182.202913] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc8/0x200
[  182.204527] Read of size 1 at addr ffff0000c67a68ff by task kunit_try_catch/205
[  182.206223] 
[  182.207486] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.209341] Hardware name: linux,dummy-virt (DT)
[  182.211005] Call trace:
[  182.211677]  dump_backtrace+0xe0/0x134
[  182.213116]  show_stack+0x20/0x2c
[  182.214058]  dump_stack_lvl+0x88/0xb4
[  182.215202]  print_report+0x158/0x458
[  182.216932]  kasan_report+0xb4/0x170
[  182.217814]  __asan_load1+0x68/0x74
[  182.219035]  kmalloc_oob_left+0xc8/0x200
[  182.220247]  kunit_try_run_case+0x8c/0x124
[  182.222094]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.223766]  kthread+0x15c/0x170
[  182.224795]  ret_from_fork+0x10/0x20
[  182.225367] 
[  182.225767] Allocated by task 1:
[  182.227072]  kasan_save_stack+0x3c/0x70
[  182.228448]  kasan_set_track+0x2c/0x40
[  182.229548]  kasan_save_alloc_info+0x24/0x34
[  182.231137]  __kasan_kmalloc+0xd4/0xe0
[  182.232566]  __kmalloc_node_track_caller+0x70/0x1c0
[  182.233833]  kvasprintf+0xd4/0x174
[  182.234920]  __kthread_create_on_node+0x26c/0x2e0
[  182.236279]  kthread_create_on_node+0xac/0xf0
[  182.237491]  kunit_try_catch_run+0xec/0x34c
[  182.238992]  kunit_run_case_catch_errors+0x15c/0x1e8
[  182.240557]  kunit_run_tests+0x324/0x6cc
[  182.241691]  __kunit_test_suites_init+0x8c/0xc0
[  182.243021]  kunit_run_all_tests+0x18c/0x2f0
[  182.244240]  kernel_init_freeable+0x33c/0x380
[  182.245709]  kernel_init+0x2c/0x150
[  182.246982]  ret_from_fork+0x10/0x20
[  182.248323] 
[  182.248933] The buggy address belongs to the object at ffff0000c67a6800
[  182.248933]  which belongs to the cache kmalloc-128 of size 128
[  182.252076] The buggy address is located 127 bytes to the right of
[  182.252076]  128-byte region [ffff0000c67a6800, ffff0000c67a6880)
[  182.254521] 
[  182.255320] The buggy address belongs to the physical page:
[  182.256458] page:0000000069fe19e2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067a6
[  182.258720] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  182.260660] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  182.262162] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.263781] page dumped because: kasan: bad access detected
[  182.264785] 
[  182.265395] Memory state around the buggy address:
[  182.267053]  ffff0000c67a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.268886]  ffff0000c67a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  182.270390] >ffff0000c67a6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.271960]                                                                 ^
[  182.273548]  ffff0000c67a6900: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.275331]  ffff0000c67a6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.276694] ==================================================================

test log snippet boot parser 214

Home

[  184.149930] ==================================================================
[  184.152296] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd8/0x200
[  184.154672] Write of size 2 at addr ffff0000c60a1077 by task kunit_try_catch/221
[  184.156402] 
[  184.157142] CPU: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.158787] Hardware name: linux,dummy-virt (DT)
[  184.160110] Call trace:
[  184.160791]  dump_backtrace+0xe0/0x134
[  184.161839]  show_stack+0x20/0x2c
[  184.163133]  dump_stack_lvl+0x88/0xb4
[  184.164221]  print_report+0x158/0x458
[  184.165602]  kasan_report+0xb4/0x170
[  184.167283]  kasan_check_range+0xe4/0x190
[  184.168452]  memset+0x40/0x70
[  184.169491]  kmalloc_oob_memset_2+0xd8/0x200
[  184.170739]  kunit_try_run_case+0x8c/0x124
[  184.172020]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.173535]  kthread+0x15c/0x170
[  184.174982]  ret_from_fork+0x10/0x20
[  184.175992] 
[  184.176376] Allocated by task 221:
[  184.177036]  kasan_save_stack+0x3c/0x70
[  184.178066]  kasan_set_track+0x2c/0x40
[  184.179705]  kasan_save_alloc_info+0x24/0x34
[  184.180936]  __kasan_kmalloc+0xd4/0xe0
[  184.181975]  kmalloc_trace+0x8c/0x150
[  184.183015]  kmalloc_oob_memset_2+0xa0/0x200
[  184.184445]  kunit_try_run_case+0x8c/0x124
[  184.185728]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.187678]  kthread+0x15c/0x170
[  184.188544]  ret_from_fork+0x10/0x20
[  184.189723] 
[  184.190371] The buggy address belongs to the object at ffff0000c60a1000
[  184.190371]  which belongs to the cache kmalloc-128 of size 128
[  184.192692] The buggy address is located 119 bytes inside of
[  184.192692]  128-byte region [ffff0000c60a1000, ffff0000c60a1080)
[  184.195708] 
[  184.196407] The buggy address belongs to the physical page:
[  184.197868] page:000000003e9f3cbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a1
[  184.199485] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.201933] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.203606] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.205019] page dumped because: kasan: bad access detected
[  184.206216] 
[  184.206845] Memory state around the buggy address:
[  184.207897]  ffff0000c60a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.209542]  ffff0000c60a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.211455] >ffff0000c60a1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  184.212790]                                                                 ^
[  184.214258]  ffff0000c60a1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.215873]  ffff0000c60a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.216757] ==================================================================

test log snippet boot parser 215

Home

[  184.238204] ==================================================================
[  184.240696] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x200
[  184.242320] Write of size 4 at addr ffff0000c655c675 by task kunit_try_catch/222
[  184.243884] 
[  184.244579] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.246350] Hardware name: linux,dummy-virt (DT)
[  184.247426] Call trace:
[  184.248090]  dump_backtrace+0xe0/0x134
[  184.248674]  show_stack+0x20/0x2c
[  184.249200]  dump_stack_lvl+0x88/0xb4
[  184.250022]  print_report+0x158/0x458
[  184.251620]  kasan_report+0xb4/0x170
[  184.252790]  kasan_check_range+0xe4/0x190
[  184.253930]  memset+0x40/0x70
[  184.255032]  kmalloc_oob_memset_4+0xd8/0x200
[  184.256198]  kunit_try_run_case+0x8c/0x124
[  184.257560]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.259136]  kthread+0x15c/0x170
[  184.260282]  ret_from_fork+0x10/0x20
[  184.261341] 
[  184.261921] Allocated by task 222:
[  184.263255]  kasan_save_stack+0x3c/0x70
[  184.264335]  kasan_set_track+0x2c/0x40
[  184.265487]  kasan_save_alloc_info+0x24/0x34
[  184.266714]  __kasan_kmalloc+0xd4/0xe0
[  184.267671]  kmalloc_trace+0x8c/0x150
[  184.268921]  kmalloc_oob_memset_4+0xa0/0x200
[  184.270149]  kunit_try_run_case+0x8c/0x124
[  184.271622]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.272970]  kthread+0x15c/0x170
[  184.274056]  ret_from_fork+0x10/0x20
[  184.275167] 
[  184.276110] The buggy address belongs to the object at ffff0000c655c600
[  184.276110]  which belongs to the cache kmalloc-128 of size 128
[  184.278225] The buggy address is located 117 bytes inside of
[  184.278225]  128-byte region [ffff0000c655c600, ffff0000c655c680)
[  184.281235] 
[  184.281837] The buggy address belongs to the physical page:
[  184.283010] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.285083] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.286799] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.288088] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.289288] page dumped because: kasan: bad access detected
[  184.290419] 
[  184.291022] Memory state around the buggy address:
[  184.292467]  ffff0000c655c500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.294062]  ffff0000c655c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.295721] >ffff0000c655c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  184.297147]                                                                 ^
[  184.298724]  ffff0000c655c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.300153]  ffff0000c655c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.301766] ==================================================================

test log snippet boot parser 216

Home

[  184.318237] ==================================================================
[  184.321921] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x200
[  184.324082] Write of size 8 at addr ffff0000c655c771 by task kunit_try_catch/223
[  184.325699] 
[  184.326476] CPU: 1 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.328021] Hardware name: linux,dummy-virt (DT)
[  184.329099] Call trace:
[  184.329832]  dump_backtrace+0xe0/0x134
[  184.331046]  show_stack+0x20/0x2c
[  184.332049]  dump_stack_lvl+0x88/0xb4
[  184.333092]  print_report+0x158/0x458
[  184.334218]  kasan_report+0xb4/0x170
[  184.335579]  kasan_check_range+0xe4/0x190
[  184.336582]  memset+0x40/0x70
[  184.337628]  kmalloc_oob_memset_8+0xd8/0x200
[  184.338762]  kunit_try_run_case+0x8c/0x124
[  184.340041]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.341651]  kthread+0x15c/0x170
[  184.342905]  ret_from_fork+0x10/0x20
[  184.344174] 
[  184.344819] Allocated by task 223:
[  184.345772]  kasan_save_stack+0x3c/0x70
[  184.347157]  kasan_set_track+0x2c/0x40
[  184.347986]  kasan_save_alloc_info+0x24/0x34
[  184.349222]  __kasan_kmalloc+0xd4/0xe0
[  184.350293]  kmalloc_trace+0x8c/0x150
[  184.351339]  kmalloc_oob_memset_8+0xa0/0x200
[  184.352660]  kunit_try_run_case+0x8c/0x124
[  184.353933]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.355551]  kthread+0x15c/0x170
[  184.356587]  ret_from_fork+0x10/0x20
[  184.357658] 
[  184.358206] The buggy address belongs to the object at ffff0000c655c700
[  184.358206]  which belongs to the cache kmalloc-128 of size 128
[  184.362033] The buggy address is located 113 bytes inside of
[  184.362033]  128-byte region [ffff0000c655c700, ffff0000c655c780)
[  184.364253] 
[  184.364684] The buggy address belongs to the physical page:
[  184.365784] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.367701] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.369360] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.371330] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.372624] page dumped because: kasan: bad access detected
[  184.373789] 
[  184.374634] Memory state around the buggy address:
[  184.375955]  ffff0000c655c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.377402]  ffff0000c655c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.378870] >ffff0000c655c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  184.380043]                                                                 ^
[  184.382252]  ffff0000c655c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.383880]  ffff0000c655c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.385247] ==================================================================
---
[  184.407714] ==================================================================
[  184.409629] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x200
[  184.411220] Write of size 16 at addr ffff0000c655c869 by task kunit_try_catch/224
[  184.412891] 
[  184.413551] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.415175] Hardware name: linux,dummy-virt (DT)
[  184.416272] Call trace:
[  184.416967]  dump_backtrace+0xe0/0x134
[  184.418052]  show_stack+0x20/0x2c
[  184.419085]  dump_stack_lvl+0x88/0xb4
[  184.420206]  print_report+0x158/0x458
[  184.421314]  kasan_report+0xb4/0x170
[  184.422395]  kasan_check_range+0xe4/0x190
[  184.423541]  memset+0x40/0x70
[  184.424575]  kmalloc_oob_memset_16+0xd8/0x200
[  184.425932]  kunit_try_run_case+0x8c/0x124
[  184.427128]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.428633]  kthread+0x15c/0x170
[  184.429742]  ret_from_fork+0x10/0x20
[  184.430884] 
[  184.431620] Allocated by task 224:
[  184.432576]  kasan_save_stack+0x3c/0x70
[  184.433837]  kasan_set_track+0x2c/0x40
[  184.434805]  kasan_save_alloc_info+0x24/0x34
[  184.436249]  __kasan_kmalloc+0xd4/0xe0
[  184.437386]  kmalloc_trace+0x8c/0x150
[  184.438472]  kmalloc_oob_memset_16+0xa0/0x200
[  184.439805]  kunit_try_run_case+0x8c/0x124
[  184.440942]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.442360]  kthread+0x15c/0x170
[  184.443384]  ret_from_fork+0x10/0x20
[  184.444451] 
[  184.445021] The buggy address belongs to the object at ffff0000c655c800
[  184.445021]  which belongs to the cache kmalloc-128 of size 128
[  184.447125] The buggy address is located 105 bytes inside of
[  184.447125]  128-byte region [ffff0000c655c800, ffff0000c655c880)
[  184.449251] 
[  184.449840] The buggy address belongs to the physical page:
[  184.450931] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.452678] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.454270] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.455863] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.457264] page dumped because: kasan: bad access detected
[  184.458399] 
[  184.458959] Memory state around the buggy address:
[  184.460018]  ffff0000c655c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.461473]  ffff0000c655c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.462934] >ffff0000c655c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  184.464254]                                                                 ^
[  184.465644]  ffff0000c655c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.467113]  ffff0000c655c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.468410] ==================================================================

test log snippet boot parser 217

Home

[  181.977856] ==================================================================
[  181.979862] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x350
[  181.983196] Write of size 1 at addr ffff0000c6767073 by task kunit_try_catch/204
[  181.985090] 
[  181.986535] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[  181.988706] Hardware name: linux,dummy-virt (DT)
[  181.990622] Call trace:
[  181.991612]  dump_backtrace+0xe0/0x134
[  181.992808]  show_stack+0x20/0x2c
[  181.993837]  dump_stack_lvl+0x88/0xb4
[  181.994953]  print_report+0x158/0x458
[  181.996116]  kasan_report+0xb4/0x170
[  181.997786]  __asan_store1+0x68/0x7c
[  181.999306]  kmalloc_oob_right+0xc8/0x350
[  182.000820]  kunit_try_run_case+0x8c/0x124
[  182.002021]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.003588]  kthread+0x15c/0x170
[  182.004780]  ret_from_fork+0x10/0x20
[  182.006938] 
[  182.007670] Allocated by task 204:
[  182.008888]  kasan_save_stack+0x3c/0x70
[  182.010177]  kasan_set_track+0x2c/0x40
[  182.011732]  kasan_save_alloc_info+0x24/0x34
[  182.013139]  __kasan_kmalloc+0xd4/0xe0
[  182.015136]  kmalloc_trace+0x8c/0x150
[  182.016077]  kmalloc_oob_right+0xa0/0x350
[  182.017334]  kunit_try_run_case+0x8c/0x124
[  182.018577]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.020108]  kthread+0x15c/0x170
[  182.021241]  ret_from_fork+0x10/0x20
[  182.022492] 
[  182.023344] The buggy address belongs to the object at ffff0000c6767000
[  182.023344]  which belongs to the cache kmalloc-128 of size 128
[  182.025665] The buggy address is located 115 bytes inside of
[  182.025665]  128-byte region [ffff0000c6767000, ffff0000c6767080)
[  182.028538] 
[  182.029336] The buggy address belongs to the physical page:
[  182.031119] page:00000000ec9f3674 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[  182.034027] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  182.036815] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  182.038290] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.040678] page dumped because: kasan: bad access detected
[  182.042067] 
[  182.042746] Memory state around the buggy address:
[  182.044426]  ffff0000c6766f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  182.045935]  ffff0000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.047487] >ffff0000c6767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  182.049007]                                                              ^
[  182.050345]  ffff0000c6767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.052023]  ffff0000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.053972] ==================================================================

test log snippet boot parser 218

Home

[  182.060614] ==================================================================
[  182.061886] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xec/0x350
[  182.064685] Write of size 1 at addr ffff0000c6767078 by task kunit_try_catch/204
[  182.067666] 
[  182.068316] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.070436] Hardware name: linux,dummy-virt (DT)
[  182.071567] Call trace:
[  182.072339]  dump_backtrace+0xe0/0x134
[  182.073427]  show_stack+0x20/0x2c
[  182.074395]  dump_stack_lvl+0x88/0xb4
[  182.075571]  print_report+0x158/0x458
[  182.076749]  kasan_report+0xb4/0x170
[  182.077740]  __asan_store1+0x68/0x7c
[  182.078839]  kmalloc_oob_right+0xec/0x350
[  182.079983]  kunit_try_run_case+0x8c/0x124
[  182.081175]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.082478]  kthread+0x15c/0x170
[  182.083601]  ret_from_fork+0x10/0x20
[  182.084638] 
[  182.085180] Allocated by task 204:
[  182.086033]  kasan_save_stack+0x3c/0x70
[  182.087120]  kasan_set_track+0x2c/0x40
[  182.088195]  kasan_save_alloc_info+0x24/0x34
[  182.089415]  __kasan_kmalloc+0xd4/0xe0
[  182.090484]  kmalloc_trace+0x8c/0x150
[  182.091555]  kmalloc_oob_right+0xa0/0x350
[  182.092780]  kunit_try_run_case+0x8c/0x124
[  182.093930]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.095259]  kthread+0x15c/0x170
[  182.096284]  ret_from_fork+0x10/0x20
[  182.097344] 
[  182.097907] The buggy address belongs to the object at ffff0000c6767000
[  182.097907]  which belongs to the cache kmalloc-128 of size 128
[  182.100023] The buggy address is located 120 bytes inside of
[  182.100023]  128-byte region [ffff0000c6767000, ffff0000c6767080)
[  182.102089] 
[  182.102691] The buggy address belongs to the physical page:
[  182.103861] page:00000000ec9f3674 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[  182.105574] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  182.107173] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  182.108749] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.110196] page dumped because: kasan: bad access detected
[  182.111328] 
[  182.111914] Memory state around the buggy address:
[  182.112984]  ffff0000c6766f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  182.114360]  ffff0000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.115902] >ffff0000c6767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  182.117308]                                                                 ^
[  182.118647]  ffff0000c6767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.120230]  ffff0000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.121648] ==================================================================

test log snippet boot parser 219

Home

[  182.124731] ==================================================================
[  182.125901] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x110/0x350
[  182.127483] Read of size 1 at addr ffff0000c6767080 by task kunit_try_catch/204
[  182.129035] 
[  182.129661] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.131245] Hardware name: linux,dummy-virt (DT)
[  182.132339] Call trace:
[  182.133093]  dump_backtrace+0xe0/0x134
[  182.134124]  show_stack+0x20/0x2c
[  182.135171]  dump_stack_lvl+0x88/0xb4
[  182.136284]  print_report+0x158/0x458
[  182.137373]  kasan_report+0xb4/0x170
[  182.138477]  __asan_load1+0x68/0x74
[  182.139572]  kmalloc_oob_right+0x110/0x350
[  182.140801]  kunit_try_run_case+0x8c/0x124
[  182.141944]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.143305]  kthread+0x15c/0x170
[  182.144329]  ret_from_fork+0x10/0x20
[  182.145500] 
[  182.146027] Allocated by task 204:
[  182.146942]  kasan_save_stack+0x3c/0x70
[  182.148034]  kasan_set_track+0x2c/0x40
[  182.149141]  kasan_save_alloc_info+0x24/0x34
[  182.150298]  __kasan_kmalloc+0xd4/0xe0
[  182.151415]  kmalloc_trace+0x8c/0x150
[  182.152478]  kmalloc_oob_right+0xa0/0x350
[  182.153771]  kunit_try_run_case+0x8c/0x124
[  182.154941]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.156339]  kthread+0x15c/0x170
[  182.157367]  ret_from_fork+0x10/0x20
[  182.158437] 
[  182.159061] The buggy address belongs to the object at ffff0000c6767000
[  182.159061]  which belongs to the cache kmalloc-128 of size 128
[  182.161226] The buggy address is located 0 bytes to the right of
[  182.161226]  128-byte region [ffff0000c6767000, ffff0000c6767080)
[  182.163988] 
[  182.164589] The buggy address belongs to the physical page:
[  182.166556] page:00000000ec9f3674 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[  182.168287] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  182.169904] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  182.171429] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.172878] page dumped because: kasan: bad access detected
[  182.173988] 
[  182.174585] Memory state around the buggy address:
[  182.175684]  ffff0000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.177143]  ffff0000c6767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  182.178622] >ffff0000c6767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.180006]                    ^
[  182.180888]  ffff0000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.182333]  ffff0000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.183758] ==================================================================

test log snippet boot parser 220

Home

[  182.373770] ==================================================================
[  182.375791] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xac/0x1e0
[  182.377360] Write of size 1 at addr ffff0000c680600a by task kunit_try_catch/207
[  182.379189] 
[  182.379792] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.382396] Hardware name: linux,dummy-virt (DT)
[  182.383673] Call trace:
[  182.384178]  dump_backtrace+0xe0/0x134
[  182.385344]  show_stack+0x20/0x2c
[  182.386375]  dump_stack_lvl+0x88/0xb4
[  182.387597]  print_report+0x158/0x458
[  182.388690]  kasan_report+0xb4/0x170
[  182.389808]  __asan_store1+0x68/0x7c
[  182.390975]  kmalloc_pagealloc_oob_right+0xac/0x1e0
[  182.392316]  kunit_try_run_case+0x8c/0x124
[  182.393491]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.395234]  kthread+0x15c/0x170
[  182.396147]  ret_from_fork+0x10/0x20
[  182.397301] 
[  182.397939] The buggy address belongs to the physical page:
[  182.399943] page:000000007b483e82 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106804
[  182.402015] head:000000007b483e82 order:2 compound_mapcount:0 compound_pincount:0
[  182.403340] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  182.405209] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  182.406768] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  182.409010] page dumped because: kasan: bad access detected
[  182.410378] 
[  182.411044] Memory state around the buggy address:
[  182.412300]  ffff0000c6805f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.413777]  ffff0000c6805f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.415129] >ffff0000c6806000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  182.417739]                       ^
[  182.419054]  ffff0000c6806080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  182.420700]  ffff0000c6806100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  182.422068] ==================================================================

test log snippet boot parser 221

Home

[  185.005376] ==================================================================
[  185.007840] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xdc/0x260
[  185.009675] Read of size 1 at addr ffff0000c66050c8 by task kunit_try_catch/233
[  185.011254] 
[  185.012855] CPU: 1 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  185.014842] Hardware name: linux,dummy-virt (DT)
[  185.015808] Call trace:
[  185.016450]  dump_backtrace+0xe0/0x134
[  185.017489]  show_stack+0x20/0x2c
[  185.018575]  dump_stack_lvl+0x88/0xb4
[  185.019811]  print_report+0x158/0x458
[  185.021067]  kasan_report+0xb4/0x170
[  185.022642]  __asan_load1+0x68/0x74
[  185.023685]  kmem_cache_oob+0xdc/0x260
[  185.025162]  kunit_try_run_case+0x8c/0x124
[  185.026794]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  185.028627]  kthread+0x15c/0x170
[  185.029719]  ret_from_fork+0x10/0x20
[  185.030814] 
[  185.031404] Allocated by task 233:
[  185.032243]  kasan_save_stack+0x3c/0x70
[  185.033456]  kasan_set_track+0x2c/0x40
[  185.034606]  kasan_save_alloc_info+0x24/0x34
[  185.036329]  __kasan_slab_alloc+0xa8/0xac
[  185.037849]  kmem_cache_alloc+0x190/0x3b4
[  185.039667]  kmem_cache_oob+0xbc/0x260
[  185.040671]  kunit_try_run_case+0x8c/0x124
[  185.041871]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  185.043298]  kthread+0x15c/0x170
[  185.044610]  ret_from_fork+0x10/0x20
[  185.046153] 
[  185.046721] The buggy address belongs to the object at ffff0000c6605000
[  185.046721]  which belongs to the cache test_cache of size 200
[  185.049531] The buggy address is located 0 bytes to the right of
[  185.049531]  200-byte region [ffff0000c6605000, ffff0000c66050c8)
[  185.053209] 
[  185.053793] The buggy address belongs to the physical page:
[  185.055007] page:000000005be0a458 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106605
[  185.056801] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  185.059032] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c64f6900
[  185.060546] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  185.061887] page dumped because: kasan: bad access detected
[  185.063331] 
[  185.063946] Memory state around the buggy address:
[  185.065180]  ffff0000c6604f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  185.067258]  ffff0000c6605000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.068774] >ffff0000c6605080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  185.070695]                                               ^
[  185.072495]  ffff0000c6605100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  185.074007]  ffff0000c6605180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  185.075553] ==================================================================

test log snippet boot parser 222

Home

[  183.588411] ==================================================================
[  183.589641] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b0/0x5b0
[  183.591311] Write of size 1 at addr ffff0000c680a0ea by task kunit_try_catch/216
[  183.593008] 
[  183.593684] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.595466] Hardware name: linux,dummy-virt (DT)
[  183.596684] Call trace:
[  183.597526]  dump_backtrace+0xe0/0x134
[  183.598848]  show_stack+0x20/0x2c
[  183.600187]  dump_stack_lvl+0x88/0xb4
[  183.601315]  print_report+0x158/0x458
[  183.602416]  kasan_report+0xb4/0x170
[  183.603880]  __asan_store1+0x68/0x7c
[  183.604899]  krealloc_less_oob_helper+0x1b0/0x5b0
[  183.606163]  krealloc_pagealloc_less_oob+0x20/0x30
[  183.608668]  kunit_try_run_case+0x8c/0x124
[  183.609729]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.611247]  kthread+0x15c/0x170
[  183.612419]  ret_from_fork+0x10/0x20
[  183.613457] 
[  183.614039] The buggy address belongs to the physical page:
[  183.615349] page:000000005c59ce2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808
[  183.617115] head:000000005c59ce2b order:2 compound_mapcount:0 compound_pincount:0
[  183.619499] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.620952] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.622692] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.624422] page dumped because: kasan: bad access detected
[  183.625543] 
[  183.626151] Memory state around the buggy address:
[  183.627759]  ffff0000c6809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.629359]  ffff0000c680a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.630939] >ffff0000c680a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  183.632974]                                                           ^
[  183.633785]  ffff0000c680a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.635828]  ffff0000c680a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.637131] ==================================================================

test log snippet boot parser 223

Home

[  183.640111] ==================================================================
[  183.641310] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d4/0x5b0
[  183.643428] Write of size 1 at addr ffff0000c680a0eb by task kunit_try_catch/216
[  183.645692] 
[  183.646591] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.648248] Hardware name: linux,dummy-virt (DT)
[  183.649273] Call trace:
[  183.649981]  dump_backtrace+0xe0/0x134
[  183.651012]  show_stack+0x20/0x2c
[  183.651939]  dump_stack_lvl+0x88/0xb4
[  183.653071]  print_report+0x158/0x458
[  183.654170]  kasan_report+0xb4/0x170
[  183.655194]  __asan_store1+0x68/0x7c
[  183.656262]  krealloc_less_oob_helper+0x1d4/0x5b0
[  183.657615]  krealloc_pagealloc_less_oob+0x20/0x30
[  183.658911]  kunit_try_run_case+0x8c/0x124
[  183.660122]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.661452]  kthread+0x15c/0x170
[  183.662497]  ret_from_fork+0x10/0x20
[  183.663614] 
[  183.664171] The buggy address belongs to the physical page:
[  183.665325] page:000000005c59ce2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808
[  183.667197] head:000000005c59ce2b order:2 compound_mapcount:0 compound_pincount:0
[  183.668739] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.670318] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.672197] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.673450] page dumped because: kasan: bad access detected
[  183.674809] 
[  183.675330] Memory state around the buggy address:
[  183.676614]  ffff0000c6809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.678113]  ffff0000c680a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.679725] >ffff0000c680a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  183.681006]                                                           ^
[  183.682617]  ffff0000c680a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.684155]  ffff0000c680a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.685572] ==================================================================

test log snippet boot parser 224

Home

[  183.535191] ==================================================================
[  183.536997] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x188/0x5b0
[  183.539216] Write of size 1 at addr ffff0000c680a0da by task kunit_try_catch/216
[  183.541612] 
[  183.542242] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.544325] Hardware name: linux,dummy-virt (DT)
[  183.545411] Call trace:
[  183.546122]  dump_backtrace+0xe0/0x134
[  183.547380]  show_stack+0x20/0x2c
[  183.548530]  dump_stack_lvl+0x88/0xb4
[  183.549792]  print_report+0x158/0x458
[  183.551012]  kasan_report+0xb4/0x170
[  183.552398]  __asan_store1+0x68/0x7c
[  183.553732]  krealloc_less_oob_helper+0x188/0x5b0
[  183.555292]  krealloc_pagealloc_less_oob+0x20/0x30
[  183.556901]  kunit_try_run_case+0x8c/0x124
[  183.558042]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.559980]  kthread+0x15c/0x170
[  183.561699]  ret_from_fork+0x10/0x20
[  183.562966] 
[  183.563714] The buggy address belongs to the physical page:
[  183.564788] page:000000005c59ce2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808
[  183.566575] head:000000005c59ce2b order:2 compound_mapcount:0 compound_pincount:0
[  183.568092] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.569937] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.572163] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.573534] page dumped because: kasan: bad access detected
[  183.574642] 
[  183.575192] Memory state around the buggy address:
[  183.576728]  ffff0000c6809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.578162]  ffff0000c680a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.579606] >ffff0000c680a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  183.581039]                                                     ^
[  183.582446]  ffff0000c680a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.584031]  ffff0000c680a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.585242] ==================================================================

test log snippet boot parser 225

Home

[  183.128487] ==================================================================
[  183.129798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b0/0x5b0
[  183.131676] Write of size 1 at addr ffff0000c6512eea by task kunit_try_catch/214
[  183.133129] 
[  183.134710] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.136526] Hardware name: linux,dummy-virt (DT)
[  183.137651] Call trace:
[  183.138803]  dump_backtrace+0xe0/0x134
[  183.140018]  show_stack+0x20/0x2c
[  183.141601]  dump_stack_lvl+0x88/0xb4
[  183.143068]  print_report+0x158/0x458
[  183.144414]  kasan_report+0xb4/0x170
[  183.145338]  __asan_store1+0x68/0x7c
[  183.146652]  krealloc_less_oob_helper+0x1b0/0x5b0
[  183.147852]  krealloc_less_oob+0x20/0x30
[  183.149073]  kunit_try_run_case+0x8c/0x124
[  183.150201]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.151821]  kthread+0x15c/0x170
[  183.153662]  ret_from_fork+0x10/0x20
[  183.154930] 
[  183.155529] Allocated by task 214:
[  183.156408]  kasan_save_stack+0x3c/0x70
[  183.157604]  kasan_set_track+0x2c/0x40
[  183.158676]  kasan_save_alloc_info+0x24/0x34
[  183.159996]  __kasan_krealloc+0x10c/0x140
[  183.161113]  krealloc+0x158/0x1c0
[  183.162142]  krealloc_less_oob_helper+0xd8/0x5b0
[  183.163659]  krealloc_less_oob+0x20/0x30
[  183.164964]  kunit_try_run_case+0x8c/0x124
[  183.166129]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.167839]  kthread+0x15c/0x170
[  183.168900]  ret_from_fork+0x10/0x20
[  183.170030] 
[  183.170841] The buggy address belongs to the object at ffff0000c6512e00
[  183.170841]  which belongs to the cache kmalloc-256 of size 256
[  183.173328] The buggy address is located 234 bytes inside of
[  183.173328]  256-byte region [ffff0000c6512e00, ffff0000c6512f00)
[  183.175908] 
[  183.176499] The buggy address belongs to the physical page:
[  183.177707] page:0000000042afbf6f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106512
[  183.179468] head:0000000042afbf6f order:1 compound_mapcount:0 compound_pincount:0
[  183.181240] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  183.182958] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  183.183864] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.185056] page dumped because: kasan: bad access detected
[  183.186199] 
[  183.187054] Memory state around the buggy address:
[  183.188327]  ffff0000c6512d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.189905]  ffff0000c6512e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.191627] >ffff0000c6512e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  183.192818]                                                           ^
[  183.194800]  ffff0000c6512f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.196426]  ffff0000c6512f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.197823] ==================================================================

test log snippet boot parser 226

Home

[  182.909231] ==================================================================
[  182.911533] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5b0
[  182.913193] Write of size 1 at addr ffff0000c6512ec9 by task kunit_try_catch/214
[  182.915134] 
[  182.915765] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.917466] Hardware name: linux,dummy-virt (DT)
[  182.918533] Call trace:
[  182.919724]  dump_backtrace+0xe0/0x134
[  182.920707]  show_stack+0x20/0x2c
[  182.921706]  dump_stack_lvl+0x88/0xb4
[  182.923068]  print_report+0x158/0x458
[  182.924200]  kasan_report+0xb4/0x170
[  182.925289]  __asan_store1+0x68/0x7c
[  182.926206]  krealloc_less_oob_helper+0x114/0x5b0
[  182.927719]  krealloc_less_oob+0x20/0x30
[  182.929034]  kunit_try_run_case+0x8c/0x124
[  182.930180]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.932193]  kthread+0x15c/0x170
[  182.933188]  ret_from_fork+0x10/0x20
[  182.934318] 
[  182.934851] Allocated by task 214:
[  182.936071]  kasan_save_stack+0x3c/0x70
[  182.937162]  kasan_set_track+0x2c/0x40
[  182.938240]  kasan_save_alloc_info+0x24/0x34
[  182.939660]  __kasan_krealloc+0x10c/0x140
[  182.940253]  krealloc+0x158/0x1c0
[  182.941005]  krealloc_less_oob_helper+0xd8/0x5b0
[  182.942472]  krealloc_less_oob+0x20/0x30
[  182.943587]  kunit_try_run_case+0x8c/0x124
[  182.944836]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.946177]  kthread+0x15c/0x170
[  182.947283]  ret_from_fork+0x10/0x20
[  182.948405] 
[  182.949045] The buggy address belongs to the object at ffff0000c6512e00
[  182.949045]  which belongs to the cache kmalloc-256 of size 256
[  182.951147] The buggy address is located 201 bytes inside of
[  182.951147]  256-byte region [ffff0000c6512e00, ffff0000c6512f00)
[  182.953291] 
[  182.954481] The buggy address belongs to the physical page:
[  182.956839] page:0000000042afbf6f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106512
[  182.958618] head:0000000042afbf6f order:1 compound_mapcount:0 compound_pincount:0
[  182.960202] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  182.961992] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  182.963190] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.964621] page dumped because: kasan: bad access detected
[  182.965843] 
[  182.966434] Memory state around the buggy address:
[  182.967982]  ffff0000c6512d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.969701]  ffff0000c6512e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.971365] >ffff0000c6512e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  182.973413]                                               ^
[  182.974643]  ffff0000c6512f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.976202]  ffff0000c6512f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.977552] ==================================================================

test log snippet boot parser 227

Home

[  183.055565] ==================================================================
[  183.056779] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x188/0x5b0
[  183.058474] Write of size 1 at addr ffff0000c6512eda by task kunit_try_catch/214
[  183.060438] 
[  183.061207] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.062990] Hardware name: linux,dummy-virt (DT)
[  183.063525] Call trace:
[  183.064222]  dump_backtrace+0xe0/0x134
[  183.065395]  show_stack+0x20/0x2c
[  183.066383]  dump_stack_lvl+0x88/0xb4
[  183.067802]  print_report+0x158/0x458
[  183.068769]  kasan_report+0xb4/0x170
[  183.069885]  __asan_store1+0x68/0x7c
[  183.070995]  krealloc_less_oob_helper+0x188/0x5b0
[  183.072380]  krealloc_less_oob+0x20/0x30
[  183.073634]  kunit_try_run_case+0x8c/0x124
[  183.074836]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.077222]  kthread+0x15c/0x170
[  183.078129]  ret_from_fork+0x10/0x20
[  183.079442] 
[  183.080206] Allocated by task 214:
[  183.081182]  kasan_save_stack+0x3c/0x70
[  183.082257]  kasan_set_track+0x2c/0x40
[  183.083305]  kasan_save_alloc_info+0x24/0x34
[  183.084704]  __kasan_krealloc+0x10c/0x140
[  183.085828]  krealloc+0x158/0x1c0
[  183.086870]  krealloc_less_oob_helper+0xd8/0x5b0
[  183.088165]  krealloc_less_oob+0x20/0x30
[  183.089416]  kunit_try_run_case+0x8c/0x124
[  183.090634]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.092073]  kthread+0x15c/0x170
[  183.093140]  ret_from_fork+0x10/0x20
[  183.094066] 
[  183.094621] The buggy address belongs to the object at ffff0000c6512e00
[  183.094621]  which belongs to the cache kmalloc-256 of size 256
[  183.096822] The buggy address is located 218 bytes inside of
[  183.096822]  256-byte region [ffff0000c6512e00, ffff0000c6512f00)
[  183.098988] 
[  183.100324] The buggy address belongs to the physical page:
[  183.101400] page:0000000042afbf6f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106512
[  183.103641] head:0000000042afbf6f order:1 compound_mapcount:0 compound_pincount:0
[  183.105203] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  183.107408] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  183.108820] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.110708] page dumped because: kasan: bad access detected
[  183.112102] 
[  183.112694] Memory state around the buggy address:
[  183.113776]  ffff0000c6512d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.115708]  ffff0000c6512e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.117360] >ffff0000c6512e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  183.119300]                                                     ^
[  183.121169]  ffff0000c6512f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.122577]  ffff0000c6512f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.124185] ==================================================================

test log snippet boot parser 228

Home

[  182.981712] ==================================================================
[  182.983215] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x5b0
[  182.986120] Write of size 1 at addr ffff0000c6512ed0 by task kunit_try_catch/214
[  182.987701] 
[  182.988401] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.990235] Hardware name: linux,dummy-virt (DT)
[  182.991355] Call trace:
[  182.992155]  dump_backtrace+0xe0/0x134
[  182.993221]  show_stack+0x20/0x2c
[  182.994272]  dump_stack_lvl+0x88/0xb4
[  182.995336]  print_report+0x158/0x458
[  182.996347]  kasan_report+0xb4/0x170
[  182.997871]  __asan_store1+0x68/0x7c
[  182.998764]  krealloc_less_oob_helper+0x140/0x5b0
[  183.000197]  krealloc_less_oob+0x20/0x30
[  183.001271]  kunit_try_run_case+0x8c/0x124
[  183.002550]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.003961]  kthread+0x15c/0x170
[  183.005729]  ret_from_fork+0x10/0x20
[  183.007057] 
[  183.007698] Allocated by task 214:
[  183.008642]  kasan_save_stack+0x3c/0x70
[  183.009775]  kasan_set_track+0x2c/0x40
[  183.011140]  kasan_save_alloc_info+0x24/0x34
[  183.012436]  __kasan_krealloc+0x10c/0x140
[  183.013568]  krealloc+0x158/0x1c0
[  183.014700]  krealloc_less_oob_helper+0xd8/0x5b0
[  183.015860]  krealloc_less_oob+0x20/0x30
[  183.017239]  kunit_try_run_case+0x8c/0x124
[  183.018690]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.020016]  kthread+0x15c/0x170
[  183.021155]  ret_from_fork+0x10/0x20
[  183.022258] 
[  183.022905] The buggy address belongs to the object at ffff0000c6512e00
[  183.022905]  which belongs to the cache kmalloc-256 of size 256
[  183.025097] The buggy address is located 208 bytes inside of
[  183.025097]  256-byte region [ffff0000c6512e00, ffff0000c6512f00)
[  183.027740] 
[  183.028328] The buggy address belongs to the physical page:
[  183.029562] page:0000000042afbf6f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106512
[  183.031296] head:0000000042afbf6f order:1 compound_mapcount:0 compound_pincount:0
[  183.033182] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  183.035116] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  183.036792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.038455] page dumped because: kasan: bad access detected
[  183.039735] 
[  183.040319] Memory state around the buggy address:
[  183.041500]  ffff0000c6512d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.043273]  ffff0000c6512e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.044586] >ffff0000c6512e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  183.046092]                                                  ^
[  183.047479]  ffff0000c6512f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.049668]  ffff0000c6512f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.051407] ==================================================================

test log snippet boot parser 229

Home

[  183.424598] ==================================================================
[  183.427600] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5b0
[  183.429929] Write of size 1 at addr ffff0000c680a0c9 by task kunit_try_catch/216
[  183.431705] 
[  183.432351] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.434580] Hardware name: linux,dummy-virt (DT)
[  183.435714] Call trace:
[  183.436480]  dump_backtrace+0xe0/0x134
[  183.437590]  show_stack+0x20/0x2c
[  183.438649]  dump_stack_lvl+0x88/0xb4
[  183.439696]  print_report+0x158/0x458
[  183.440856]  kasan_report+0xb4/0x170
[  183.441974]  __asan_store1+0x68/0x7c
[  183.443254]  krealloc_less_oob_helper+0x114/0x5b0
[  183.444578]  krealloc_pagealloc_less_oob+0x20/0x30
[  183.445844]  kunit_try_run_case+0x8c/0x124
[  183.447152]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.448703]  kthread+0x15c/0x170
[  183.449871]  ret_from_fork+0x10/0x20
[  183.451172] 
[  183.451876] The buggy address belongs to the physical page:
[  183.453136] page:000000005c59ce2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808
[  183.455332] head:000000005c59ce2b order:2 compound_mapcount:0 compound_pincount:0
[  183.456852] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.458942] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.460436] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.461674] page dumped because: kasan: bad access detected
[  183.463234] 
[  183.463942] Memory state around the buggy address:
[  183.465136]  ffff0000c6809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.466974]  ffff0000c680a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.469212] >ffff0000c680a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  183.470082]                                               ^
[  183.472000]  ffff0000c680a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.473351]  ffff0000c680a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.474882] ==================================================================

test log snippet boot parser 230

Home

[  183.479860] ==================================================================
[  183.481082] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x5b0
[  183.483095] Write of size 1 at addr ffff0000c680a0d0 by task kunit_try_catch/216
[  183.484524] 
[  183.485412] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.487437] Hardware name: linux,dummy-virt (DT)
[  183.488573] Call trace:
[  183.489327]  dump_backtrace+0xe0/0x134
[  183.491707]  show_stack+0x20/0x2c
[  183.492760]  dump_stack_lvl+0x88/0xb4
[  183.493814]  print_report+0x158/0x458
[  183.494911]  kasan_report+0xb4/0x170
[  183.495987]  __asan_store1+0x68/0x7c
[  183.497578]  krealloc_less_oob_helper+0x140/0x5b0
[  183.499056]  krealloc_pagealloc_less_oob+0x20/0x30
[  183.500596]  kunit_try_run_case+0x8c/0x124
[  183.501773]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.503563]  kthread+0x15c/0x170
[  183.504619]  ret_from_fork+0x10/0x20
[  183.505539] 
[  183.506121] The buggy address belongs to the physical page:
[  183.508152] page:000000005c59ce2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808
[  183.509861] head:000000005c59ce2b order:2 compound_mapcount:0 compound_pincount:0
[  183.512006] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.514984] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.516423] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.517830] page dumped because: kasan: bad access detected
[  183.519388] 
[  183.521016] Memory state around the buggy address:
[  183.522193]  ffff0000c6809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.523819]  ffff0000c680a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.525285] >ffff0000c680a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  183.526728]                                                  ^
[  183.528073]  ffff0000c680a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.530419]  ffff0000c680a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.532182] ==================================================================

test log snippet boot parser 231

Home

[  183.200949] ==================================================================
[  183.202194] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d4/0x5b0
[  183.204033] Write of size 1 at addr ffff0000c6512eeb by task kunit_try_catch/214
[  183.205299] 
[  183.205944] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.207834] Hardware name: linux,dummy-virt (DT)
[  183.209049] Call trace:
[  183.210221]  dump_backtrace+0xe0/0x134
[  183.211636]  show_stack+0x20/0x2c
[  183.212647]  dump_stack_lvl+0x88/0xb4
[  183.213702]  print_report+0x158/0x458
[  183.214949]  kasan_report+0xb4/0x170
[  183.216042]  __asan_store1+0x68/0x7c
[  183.217195]  krealloc_less_oob_helper+0x1d4/0x5b0
[  183.218471]  krealloc_less_oob+0x20/0x30
[  183.220020]  kunit_try_run_case+0x8c/0x124
[  183.221215]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.222615]  kthread+0x15c/0x170
[  183.223632]  ret_from_fork+0x10/0x20
[  183.224852] 
[  183.225470] Allocated by task 214:
[  183.226365]  kasan_save_stack+0x3c/0x70
[  183.227620]  kasan_set_track+0x2c/0x40
[  183.228826]  kasan_save_alloc_info+0x24/0x34
[  183.230175]  __kasan_krealloc+0x10c/0x140
[  183.231466]  krealloc+0x158/0x1c0
[  183.232439]  krealloc_less_oob_helper+0xd8/0x5b0
[  183.233976]  krealloc_less_oob+0x20/0x30
[  183.235466]  kunit_try_run_case+0x8c/0x124
[  183.236690]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.238150]  kthread+0x15c/0x170
[  183.239581]  ret_from_fork+0x10/0x20
[  183.240638] 
[  183.241196] The buggy address belongs to the object at ffff0000c6512e00
[  183.241196]  which belongs to the cache kmalloc-256 of size 256
[  183.243995] The buggy address is located 235 bytes inside of
[  183.243995]  256-byte region [ffff0000c6512e00, ffff0000c6512f00)
[  183.246391] 
[  183.247098] The buggy address belongs to the physical page:
[  183.248236] page:0000000042afbf6f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106512
[  183.250927] head:0000000042afbf6f order:1 compound_mapcount:0 compound_pincount:0
[  183.252466] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  183.254085] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  183.256057] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.257394] page dumped because: kasan: bad access detected
[  183.259116] 
[  183.259842] Memory state around the buggy address:
[  183.261038]  ffff0000c6512d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.262863]  ffff0000c6512e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.264191] >ffff0000c6512e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  183.265601]                                                           ^
[  183.267402]  ffff0000c6512f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.269090]  ffff0000c6512f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.271550] ==================================================================

test log snippet boot parser 232

Home

[  182.823883] ==================================================================
[  182.825614] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x374
[  182.828032] Write of size 1 at addr ffff0000c62d96f0 by task kunit_try_catch/213
[  182.829612] 
[  182.830294] CPU: 1 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.831957] Hardware name: linux,dummy-virt (DT)
[  182.833045] Call trace:
[  182.833904]  dump_backtrace+0xe0/0x134
[  182.834944]  show_stack+0x20/0x2c
[  182.835885]  dump_stack_lvl+0x88/0xb4
[  182.836826]  print_report+0x158/0x458
[  182.838000]  kasan_report+0xb4/0x170
[  182.839014]  __asan_store1+0x68/0x7c
[  182.840172]  krealloc_more_oob_helper+0x168/0x374
[  182.841484]  krealloc_more_oob+0x20/0x30
[  182.842637]  kunit_try_run_case+0x8c/0x124
[  182.843873]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.845250]  kthread+0x15c/0x170
[  182.846305]  ret_from_fork+0x10/0x20
[  182.847410] 
[  182.847973] Allocated by task 213:
[  182.848827]  kasan_save_stack+0x3c/0x70
[  182.849967]  kasan_set_track+0x2c/0x40
[  182.851071]  kasan_save_alloc_info+0x24/0x34
[  182.852283]  __kasan_krealloc+0x10c/0x140
[  182.853420]  krealloc+0x158/0x1c0
[  182.854415]  krealloc_more_oob_helper+0xd8/0x374
[  182.855691]  krealloc_more_oob+0x20/0x30
[  182.856904]  kunit_try_run_case+0x8c/0x124
[  182.858088]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.859434]  kthread+0x15c/0x170
[  182.860499]  ret_from_fork+0x10/0x20
[  182.861580] 
[  182.862161] The buggy address belongs to the object at ffff0000c62d9600
[  182.862161]  which belongs to the cache kmalloc-256 of size 256
[  182.864277] The buggy address is located 240 bytes inside of
[  182.864277]  256-byte region [ffff0000c62d9600, ffff0000c62d9700)
[  182.866389] 
[  182.867070] The buggy address belongs to the physical page:
[  182.868309] page:00000000336e9112 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d8
[  182.870074] head:00000000336e9112 order:1 compound_mapcount:0 compound_pincount:0
[  182.871579] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  182.873388] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  182.874961] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.876323] page dumped because: kasan: bad access detected
[  182.877489] 
[  182.878168] Memory state around the buggy address:
[  182.879419]  ffff0000c62d9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.880887]  ffff0000c62d9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.882495] >ffff0000c62d9680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  182.883884]                                                              ^
[  182.885342]  ffff0000c62d9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.886996]  ffff0000c62d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.888376] ==================================================================

test log snippet boot parser 233

Home

[  183.293304] ==================================================================
[  183.295832] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x13c/0x374
[  183.297848] Write of size 1 at addr ffff0000c68060eb by task kunit_try_catch/215
[  183.299637] 
[  183.300529] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.302194] Hardware name: linux,dummy-virt (DT)
[  183.303766] Call trace:
[  183.304933]  dump_backtrace+0xe0/0x134
[  183.306248]  show_stack+0x20/0x2c
[  183.307224]  dump_stack_lvl+0x88/0xb4
[  183.309309]  print_report+0x158/0x458
[  183.311131]  kasan_report+0xb4/0x170
[  183.312236]  __asan_store1+0x68/0x7c
[  183.313357]  krealloc_more_oob_helper+0x13c/0x374
[  183.314614]  krealloc_pagealloc_more_oob+0x20/0x2c
[  183.316149]  kunit_try_run_case+0x8c/0x124
[  183.317399]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.318820]  kthread+0x15c/0x170
[  183.319794]  ret_from_fork+0x10/0x20
[  183.320982] 
[  183.321585] The buggy address belongs to the physical page:
[  183.322738] page:000000007b483e82 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106804
[  183.324440] head:000000007b483e82 order:2 compound_mapcount:0 compound_pincount:0
[  183.325955] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.327872] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.329557] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.330970] page dumped because: kasan: bad access detected
[  183.332242] 
[  183.332824] Memory state around the buggy address:
[  183.333891]  ffff0000c6805f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.335525]  ffff0000c6806000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.337167] >ffff0000c6806080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  183.338969]                                                           ^
[  183.340214]  ffff0000c6806100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.341551]  ffff0000c6806180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.343357] ==================================================================

test log snippet boot parser 234

Home

[  183.346300] ==================================================================
[  183.347973] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x374
[  183.349920] Write of size 1 at addr ffff0000c68060f0 by task kunit_try_catch/215
[  183.351989] 
[  183.353158] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.354978] Hardware name: linux,dummy-virt (DT)
[  183.356207] Call trace:
[  183.357608]  dump_backtrace+0xe0/0x134
[  183.359034]  show_stack+0x20/0x2c
[  183.359953]  dump_stack_lvl+0x88/0xb4
[  183.361097]  print_report+0x158/0x458
[  183.362188]  kasan_report+0xb4/0x170
[  183.363293]  __asan_store1+0x68/0x7c
[  183.365397]  krealloc_more_oob_helper+0x168/0x374
[  183.366805]  krealloc_pagealloc_more_oob+0x20/0x2c
[  183.368127]  kunit_try_run_case+0x8c/0x124
[  183.369900]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.371530]  kthread+0x15c/0x170
[  183.373591]  ret_from_fork+0x10/0x20
[  183.374815] 
[  183.375602] The buggy address belongs to the physical page:
[  183.376792] page:000000007b483e82 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106804
[  183.379776] head:000000007b483e82 order:2 compound_mapcount:0 compound_pincount:0
[  183.381299] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  183.383315] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  183.384982] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  183.387116] page dumped because: kasan: bad access detected
[  183.388329] 
[  183.388761] Memory state around the buggy address:
[  183.389296]  ffff0000c6805f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.391274]  ffff0000c6806000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  183.393106] >ffff0000c6806080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  183.394666]                                                              ^
[  183.396066]  ffff0000c6806100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.397367]  ffff0000c6806180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  183.399197] ==================================================================

test log snippet boot parser 235

Home

[  182.740171] ==================================================================
[  182.742458] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x13c/0x374
[  182.744985] Write of size 1 at addr ffff0000c62d96eb by task kunit_try_catch/213
[  182.747422] 
[  182.748229] CPU: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.749771] Hardware name: linux,dummy-virt (DT)
[  182.751029] Call trace:
[  182.751880]  dump_backtrace+0xe0/0x134
[  182.753193]  show_stack+0x20/0x2c
[  182.754367]  dump_stack_lvl+0x88/0xb4
[  182.755763]  print_report+0x158/0x458
[  182.757112]  kasan_report+0xb4/0x170
[  182.758235]  __asan_store1+0x68/0x7c
[  182.759748]  krealloc_more_oob_helper+0x13c/0x374
[  182.761343]  krealloc_more_oob+0x20/0x30
[  182.762904]  kunit_try_run_case+0x8c/0x124
[  182.764723]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.766209]  kthread+0x15c/0x170
[  182.767449]  ret_from_fork+0x10/0x20
[  182.768543] 
[  182.769097] Allocated by task 213:
[  182.769984]  kasan_save_stack+0x3c/0x70
[  182.771437]  kasan_set_track+0x2c/0x40
[  182.772866]  kasan_save_alloc_info+0x24/0x34
[  182.774226]  __kasan_krealloc+0x10c/0x140
[  182.775703]  krealloc+0x158/0x1c0
[  182.776695]  krealloc_more_oob_helper+0xd8/0x374
[  182.778186]  krealloc_more_oob+0x20/0x30
[  182.780249]  kunit_try_run_case+0x8c/0x124
[  182.781382]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.782800]  kthread+0x15c/0x170
[  182.783985]  ret_from_fork+0x10/0x20
[  182.785676] 
[  182.786229] The buggy address belongs to the object at ffff0000c62d9600
[  182.786229]  which belongs to the cache kmalloc-256 of size 256
[  182.789057] The buggy address is located 235 bytes inside of
[  182.789057]  256-byte region [ffff0000c62d9600, ffff0000c62d9700)
[  182.791648] 
[  182.792259] The buggy address belongs to the physical page:
[  182.793688] page:00000000336e9112 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d8
[  182.796009] head:00000000336e9112 order:1 compound_mapcount:0 compound_pincount:0
[  182.797386] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  182.800010] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  182.801834] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  182.803425] page dumped because: kasan: bad access detected
[  182.804852] 
[  182.805399] Memory state around the buggy address:
[  182.806723]  ffff0000c62d9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.808631]  ffff0000c62d9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  182.810708] >ffff0000c62d9680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  182.812117]                                                           ^
[  182.813683]  ffff0000c62d9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.815954]  ffff0000c62d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.817151] ==================================================================

test log snippet boot parser 236

Home

[  186.060395] ==================================================================
[  186.062182] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xe4/0x1f0
[  186.063879] Read of size 1 at addr ffff0000c6750a80 by task kunit_try_catch/241
[  186.065465] 
[  186.066083] CPU: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.067738] Hardware name: linux,dummy-virt (DT)
[  186.068766] Call trace:
[  186.069551]  dump_backtrace+0xe0/0x134
[  186.070619]  show_stack+0x20/0x2c
[  186.071642]  dump_stack_lvl+0x88/0xb4
[  186.072729]  print_report+0x158/0x458
[  186.073895]  kasan_report+0xb4/0x170
[  186.074987]  __asan_load1+0x68/0x74
[  186.076029]  ksize_unpoisons_memory+0xe4/0x1f0
[  186.077369]  kunit_try_run_case+0x8c/0x124
[  186.078563]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.079939]  kthread+0x15c/0x170
[  186.081029]  ret_from_fork+0x10/0x20
[  186.082130] 
[  186.082731] Allocated by task 241:
[  186.083646]  kasan_save_stack+0x3c/0x70
[  186.084762]  kasan_set_track+0x2c/0x40
[  186.085910]  kasan_save_alloc_info+0x24/0x34
[  186.087100]  __kasan_kmalloc+0xd4/0xe0
[  186.088224]  kmalloc_trace+0x8c/0x150
[  186.089274]  ksize_unpoisons_memory+0xa0/0x1f0
[  186.090572]  kunit_try_run_case+0x8c/0x124
[  186.091772]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.093116]  kthread+0x15c/0x170
[  186.094229]  ret_from_fork+0x10/0x20
[  186.095310] 
[  186.095946] The buggy address belongs to the object at ffff0000c6750a00
[  186.095946]  which belongs to the cache kmalloc-128 of size 128
[  186.098078] The buggy address is located 0 bytes to the right of
[  186.098078]  128-byte region [ffff0000c6750a00, ffff0000c6750a80)
[  186.100221] 
[  186.100866] The buggy address belongs to the physical page:
[  186.102082] page:0000000030782acb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106750
[  186.103822] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.105565] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  186.107107] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  186.108528] page dumped because: kasan: bad access detected
[  186.109618] 
[  186.110234] Memory state around the buggy address:
[  186.111469]  ffff0000c6750980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.112954]  ffff0000c6750a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  186.114385] >ffff0000c6750a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.115862]                    ^
[  186.116816]  ffff0000c6750b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.118299]  ffff0000c6750b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.119772] ==================================================================

test log snippet boot parser 237

Home

[  186.610217] ==================================================================
[  186.612399] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80
[  186.614218] Read of size 1 at addr ffff0000c667d418 by task kunit_try_catch/246
[  186.615989] 
[  186.616638] CPU: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.618527] Hardware name: linux,dummy-virt (DT)
[  186.619845] Call trace:
[  186.620640]  dump_backtrace+0xe0/0x134
[  186.621899]  show_stack+0x20/0x2c
[  186.623078]  dump_stack_lvl+0x88/0xb4
[  186.624403]  print_report+0x158/0x458
[  186.625617]  kasan_report+0xb4/0x170
[  186.626789]  __asan_load1+0x68/0x74
[  186.628692]  memchr+0x28/0x80
[  186.630041]  kasan_memchr+0xd4/0x200
[  186.631442]  kunit_try_run_case+0x8c/0x124
[  186.632681]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.634052]  kthread+0x15c/0x170
[  186.635238]  ret_from_fork+0x10/0x20
[  186.636405] 
[  186.637294] Allocated by task 246:
[  186.638787]  kasan_save_stack+0x3c/0x70
[  186.640301]  kasan_set_track+0x2c/0x40
[  186.641675]  kasan_save_alloc_info+0x24/0x34
[  186.642952]  __kasan_kmalloc+0xd4/0xe0
[  186.644032]  kmalloc_trace+0x8c/0x150
[  186.645301]  kasan_memchr+0xa0/0x200
[  186.647074]  kunit_try_run_case+0x8c/0x124
[  186.648200]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.649644]  kthread+0x15c/0x170
[  186.650746]  ret_from_fork+0x10/0x20
[  186.652562] 
[  186.653424] The buggy address belongs to the object at ffff0000c667d400
[  186.653424]  which belongs to the cache kmalloc-128 of size 128
[  186.656216] The buggy address is located 24 bytes inside of
[  186.656216]  128-byte region [ffff0000c667d400, ffff0000c667d480)
[  186.658398] 
[  186.659519] The buggy address belongs to the physical page:
[  186.661588] page:0000000092b4fed3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667d
[  186.663613] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.664500] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  186.666682] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  186.668180] page dumped because: kasan: bad access detected
[  186.669198] 
[  186.669759] Memory state around the buggy address:
[  186.671254]  ffff0000c667d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  186.673205]  ffff0000c667d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.674886] >ffff0000c667d400: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.676125]                             ^
[  186.677194]  ffff0000c667d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.678499]  ffff0000c667d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.680665] ==================================================================

test log snippet boot parser 238

Home

[  186.704367] ==================================================================
[  186.706320] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[  186.707898] Read of size 1 at addr ffff0000c667b518 by task kunit_try_catch/247
[  186.709326] 
[  186.710055] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.711684] Hardware name: linux,dummy-virt (DT)
[  186.712749] Call trace:
[  186.713481]  dump_backtrace+0xe0/0x134
[  186.714538]  show_stack+0x20/0x2c
[  186.715578]  dump_stack_lvl+0x88/0xb4
[  186.716643]  print_report+0x158/0x458
[  186.717749]  kasan_report+0xb4/0x170
[  186.718791]  __asan_load1+0x68/0x74
[  186.719925]  memcmp+0x44/0xd0
[  186.720907]  kasan_memcmp+0xfc/0x210
[  186.721994]  kunit_try_run_case+0x8c/0x124
[  186.723220]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.724625]  kthread+0x15c/0x170
[  186.725688]  ret_from_fork+0x10/0x20
[  186.726784] 
[  186.727356] Allocated by task 247:
[  186.728256]  kasan_save_stack+0x3c/0x70
[  186.729392]  kasan_set_track+0x2c/0x40
[  186.730454]  kasan_save_alloc_info+0x24/0x34
[  186.731672]  __kasan_kmalloc+0xd4/0xe0
[  186.732768]  kmalloc_trace+0x8c/0x150
[  186.733861]  kasan_memcmp+0xb8/0x210
[  186.734965]  kunit_try_run_case+0x8c/0x124
[  186.736201]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.737554]  kthread+0x15c/0x170
[  186.738642]  ret_from_fork+0x10/0x20
[  186.739731] 
[  186.740239] The buggy address belongs to the object at ffff0000c667b500
[  186.740239]  which belongs to the cache kmalloc-128 of size 128
[  186.742336] The buggy address is located 24 bytes inside of
[  186.742336]  128-byte region [ffff0000c667b500, ffff0000c667b580)
[  186.744379] 
[  186.744988] The buggy address belongs to the physical page:
[  186.746120] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  186.747853] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.749448] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  186.751043] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  186.752463] page dumped because: kasan: bad access detected
[  186.753612] 
[  186.754183] Memory state around the buggy address:
[  186.755268]  ffff0000c667b400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.756815]  ffff0000c667b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.758419] >ffff0000c667b500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.759631]                             ^
[  186.760535]  ffff0000c667b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.762161]  ffff0000c667b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.764055] ==================================================================

test log snippet boot parser 239

Home

[  185.834076] ==================================================================
[  185.836871] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xbc/0x170
[  185.838420] Read of size 1 at addr ffff800008b97daa by task kunit_try_catch/238
[  185.839985] 
[  185.841074] CPU: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  185.842885] Hardware name: linux,dummy-virt (DT)
[  185.843987] Call trace:
[  185.844725]  dump_backtrace+0xe0/0x134
[  185.845814]  show_stack+0x20/0x2c
[  185.846903]  dump_stack_lvl+0x88/0xb4
[  185.848093]  print_report+0x158/0x458
[  185.849121]  kasan_report+0xb4/0x170
[  185.850229]  __asan_load1+0x68/0x74
[  185.851487]  kasan_stack_oob+0xbc/0x170
[  185.852638]  kunit_try_run_case+0x8c/0x124
[  185.853896]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  185.855433]  kthread+0x15c/0x170
[  185.856462]  ret_from_fork+0x10/0x20
[  185.857711] 
[  185.858473] The buggy address belongs to stack of task kunit_try_catch/238
[  185.860083]  and is located at offset 138 in frame:
[  185.861027]  kasan_stack_oob+0x0/0x170
[  185.862707] 
[  185.863418] This frame has 4 objects:
[  185.864616]  [48, 49) '__assertion'
[  185.864920]  [64, 72) 'array'
[  185.865662]  [96, 112) '__assertion'
[  185.866686]  [128, 138) 'stack_array'
[  185.867704] 
[  185.869021] The buggy address belongs to the virtual mapping at
[  185.869021]  [ffff800008b90000, ffff800008b99000) created by:
[  185.869021]  kernel_clone+0xf8/0x540
[  185.872138] 
[  185.872801] The buggy address belongs to the physical page:
[  185.873975] page:0000000040257616 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10668e
[  185.876780] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  185.878342] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  185.880182] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  185.881593] page dumped because: kasan: bad access detected
[  185.882817] 
[  185.883259] Memory state around the buggy address:
[  185.884548]  ffff800008b97c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.886081]  ffff800008b97d00: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[  185.887612] >ffff800008b97d80: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[  185.889109]                                   ^
[  185.890279]  ffff800008b97e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.892094]  ffff800008b97e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  185.893476] ==================================================================

test log snippet boot parser 240

Home

[  188.685675] ==================================================================
[  188.688319] BUG: KASAN: use-after-free in kfree_sensitive+0x20/0x64
[  188.689843] Read of size 1 at addr ffff0000c667be00 by task kunit_try_catch/251
[  188.691353] 
[  188.692023] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.693790] Hardware name: linux,dummy-virt (DT)
[  188.694903] Call trace:
[  188.695749]  dump_backtrace+0xe0/0x134
[  188.696876]  show_stack+0x20/0x2c
[  188.697891]  dump_stack_lvl+0x88/0xb4
[  188.699290]  print_report+0x158/0x458
[  188.700429]  kasan_report+0xb4/0x170
[  188.701552]  __kasan_check_byte+0x54/0x70
[  188.702739]  ksize+0x44/0xb0
[  188.703542]  kfree_sensitive+0x20/0x64
[  188.704697]  kmalloc_double_kzfree+0xcc/0x1e0
[  188.706032]  kunit_try_run_case+0x8c/0x124
[  188.707370]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.708947]  kthread+0x15c/0x170
[  188.710100]  ret_from_fork+0x10/0x20
[  188.711337] 
[  188.712457] Allocated by task 251:
[  188.714136]  kasan_save_stack+0x3c/0x70
[  188.716048]  kasan_set_track+0x2c/0x40
[  188.717276]  kasan_save_alloc_info+0x24/0x34
[  188.718637]  __kasan_kmalloc+0xd4/0xe0
[  188.719848]  kmalloc_trace+0x8c/0x150
[  188.720763]  kmalloc_double_kzfree+0x9c/0x1e0
[  188.722082]  kunit_try_run_case+0x8c/0x124
[  188.723483]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.724857]  kthread+0x15c/0x170
[  188.725958]  ret_from_fork+0x10/0x20
[  188.727139] 
[  188.728006] Freed by task 251:
[  188.728912]  kasan_save_stack+0x3c/0x70
[  188.730966]  kasan_set_track+0x2c/0x40
[  188.732075]  kasan_save_free_info+0x38/0x5c
[  188.733859]  __kasan_slab_free+0x100/0x170
[  188.735275]  slab_free_freelist_hook+0xd8/0x1c0
[  188.736668]  __kmem_cache_free+0x15c/0x2a0
[  188.737838]  kfree+0x88/0x150
[  188.738907]  kfree_sensitive+0x54/0x64
[  188.740034]  kmalloc_double_kzfree+0xbc/0x1e0
[  188.741285]  kunit_try_run_case+0x8c/0x124
[  188.742524]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.743827]  kthread+0x15c/0x170
[  188.744883]  ret_from_fork+0x10/0x20
[  188.746007] 
[  188.746660] The buggy address belongs to the object at ffff0000c667be00
[  188.746660]  which belongs to the cache kmalloc-128 of size 128
[  188.749431] The buggy address is located 0 bytes inside of
[  188.749431]  128-byte region [ffff0000c667be00, ffff0000c667be80)
[  188.752723] 
[  188.753253] The buggy address belongs to the physical page:
[  188.754555] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  188.756213] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  188.757859] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  188.759827] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.761221] page dumped because: kasan: bad access detected
[  188.762498] 
[  188.763224] Memory state around the buggy address:
[  188.764243]  ffff0000c667bd00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.765640]  ffff0000c667bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.767157] >ffff0000c667be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.768770]                    ^
[  188.769769]  ffff0000c667be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.771564]  ffff0000c667bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.773140] ==================================================================

test log snippet boot parser 241

Home

[  182.444350] ==================================================================
[  182.446527] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb0/0x1d0
[  182.448367] Read of size 1 at addr ffff0000c6804000 by task kunit_try_catch/208
[  182.449745] 
[  182.450522] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.452340] Hardware name: linux,dummy-virt (DT)
[  182.453576] Call trace:
[  182.454365]  dump_backtrace+0xe0/0x134
[  182.456010]  show_stack+0x20/0x2c
[  182.457141]  dump_stack_lvl+0x88/0xb4
[  182.458391]  print_report+0x158/0x458
[  182.459681]  kasan_report+0xb4/0x170
[  182.460807]  __asan_load1+0x68/0x74
[  182.461912]  kmalloc_pagealloc_uaf+0xb0/0x1d0
[  182.463190]  kunit_try_run_case+0x8c/0x124
[  182.464428]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.465796]  kthread+0x15c/0x170
[  182.466885]  ret_from_fork+0x10/0x20
[  182.467946] 
[  182.468476] The buggy address belongs to the physical page:
[  182.470093] page:000000007b483e82 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106804
[  182.472226] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  182.473824] raw: 0bfffc0000000000 fffffc00031a0208 ffff0000da7a0678 0000000000000000
[  182.475439] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  182.476845] page dumped because: kasan: bad access detected
[  182.478052] 
[  182.479269] Memory state around the buggy address:
[  182.480275]  ffff0000c6803f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.481652]  ffff0000c6803f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  182.483088] >ffff0000c6804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.484493]                    ^
[  182.485391]  ffff0000c6804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.487148]  ffff0000c6804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.488599] ==================================================================

test log snippet boot parser 242

Home

[  184.652313] ==================================================================
[  184.655853] BUG: KASAN: use-after-free in kmalloc_uaf+0xcc/0x1f0
[  184.657414] Read of size 1 at addr ffff0000c6562108 by task kunit_try_catch/227
[  184.658855] 
[  184.660252] CPU: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.661781] Hardware name: linux,dummy-virt (DT)
[  184.662900] Call trace:
[  184.663717]  dump_backtrace+0xe0/0x134
[  184.664848]  show_stack+0x20/0x2c
[  184.665924]  dump_stack_lvl+0x88/0xb4
[  184.667107]  print_report+0x158/0x458
[  184.668460]  kasan_report+0xb4/0x170
[  184.669756]  __asan_load1+0x68/0x74
[  184.671021]  kmalloc_uaf+0xcc/0x1f0
[  184.672327]  kunit_try_run_case+0x8c/0x124
[  184.673614]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.675158]  kthread+0x15c/0x170
[  184.676401]  ret_from_fork+0x10/0x20
[  184.677658] 
[  184.678275] Allocated by task 227:
[  184.679298]  kasan_save_stack+0x3c/0x70
[  184.680525]  kasan_set_track+0x2c/0x40
[  184.681713]  kasan_save_alloc_info+0x24/0x34
[  184.683106]  __kasan_kmalloc+0xd4/0xe0
[  184.684356]  kmalloc_trace+0x8c/0x150
[  184.685653]  kmalloc_uaf+0x9c/0x1f0
[  184.686862]  kunit_try_run_case+0x8c/0x124
[  184.688172]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.689720]  kthread+0x15c/0x170
[  184.690946]  ret_from_fork+0x10/0x20
[  184.692136] 
[  184.692788] Freed by task 227:
[  184.693648]  kasan_save_stack+0x3c/0x70
[  184.695205]  kasan_set_track+0x2c/0x40
[  184.696265]  kasan_save_free_info+0x38/0x5c
[  184.697676]  __kasan_slab_free+0x100/0x170
[  184.699025]  slab_free_freelist_hook+0xd8/0x1c0
[  184.700549]  __kmem_cache_free+0x15c/0x2a0
[  184.701820]  kfree+0x88/0x150
[  184.703261]  kmalloc_uaf+0xbc/0x1f0
[  184.705177]  kunit_try_run_case+0x8c/0x124
[  184.706757]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.708585]  kthread+0x15c/0x170
[  184.709643]  ret_from_fork+0x10/0x20
[  184.711141] 
[  184.711654] The buggy address belongs to the object at ffff0000c6562100
[  184.711654]  which belongs to the cache kmalloc-128 of size 128
[  184.713995] The buggy address is located 8 bytes inside of
[  184.713995]  128-byte region [ffff0000c6562100, ffff0000c6562180)
[  184.717004] 
[  184.717662] The buggy address belongs to the physical page:
[  184.719087] page:000000004980c0b3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106562
[  184.721120] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.723012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.724903] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.726659] page dumped because: kasan: bad access detected
[  184.727813] 
[  184.728332] Memory state around the buggy address:
[  184.729662]  ffff0000c6562000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.731822]  ffff0000c6562080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.733421] >ffff0000c6562100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.734821]                       ^
[  184.735772]  ffff0000c6562180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.737306]  ffff0000c6562200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.738743] ==================================================================

test log snippet boot parser 243

Home

[  184.860876] ==================================================================
[  184.862941] BUG: KASAN: use-after-free in kmalloc_uaf2+0x10c/0x2a0
[  184.864450] Read of size 1 at addr ffff0000c655ce28 by task kunit_try_catch/229
[  184.866553] 
[  184.867246] CPU: 1 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.868850] Hardware name: linux,dummy-virt (DT)
[  184.869879] Call trace:
[  184.870597]  dump_backtrace+0xe0/0x134
[  184.871615]  show_stack+0x20/0x2c
[  184.872580]  dump_stack_lvl+0x88/0xb4
[  184.873731]  print_report+0x158/0x458
[  184.874820]  kasan_report+0xb4/0x170
[  184.875864]  __asan_load1+0x68/0x74
[  184.876906]  kmalloc_uaf2+0x10c/0x2a0
[  184.878050]  kunit_try_run_case+0x8c/0x124
[  184.879208]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.880581]  kthread+0x15c/0x170
[  184.881629]  ret_from_fork+0x10/0x20
[  184.882703] 
[  184.883209] Allocated by task 229:
[  184.884099]  kasan_save_stack+0x3c/0x70
[  184.885186]  kasan_set_track+0x2c/0x40
[  184.886249]  kasan_save_alloc_info+0x24/0x34
[  184.887442]  __kasan_kmalloc+0xd4/0xe0
[  184.888558]  kmalloc_trace+0x8c/0x150
[  184.889632]  kmalloc_uaf2+0xb4/0x2a0
[  184.890692]  kunit_try_run_case+0x8c/0x124
[  184.891877]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.893225]  kthread+0x15c/0x170
[  184.894295]  ret_from_fork+0x10/0x20
[  184.895366] 
[  184.895935] Freed by task 229:
[  184.896763]  kasan_save_stack+0x3c/0x70
[  184.897817]  kasan_set_track+0x2c/0x40
[  184.898881]  kasan_save_free_info+0x38/0x5c
[  184.900048]  __kasan_slab_free+0x100/0x170
[  184.901163]  slab_free_freelist_hook+0xd8/0x1c0
[  184.902399]  __kmem_cache_free+0x15c/0x2a0
[  184.903492]  kfree+0x88/0x150
[  184.904439]  kmalloc_uaf2+0xcc/0x2a0
[  184.905624]  kunit_try_run_case+0x8c/0x124
[  184.906758]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.908127]  kthread+0x15c/0x170
[  184.909206]  ret_from_fork+0x10/0x20
[  184.910220] 
[  184.910765] The buggy address belongs to the object at ffff0000c655ce00
[  184.910765]  which belongs to the cache kmalloc-128 of size 128
[  184.912835] The buggy address is located 40 bytes inside of
[  184.912835]  128-byte region [ffff0000c655ce00, ffff0000c655ce80)
[  184.914865] 
[  184.915441] The buggy address belongs to the physical page:
[  184.916625] page:0000000011ced47b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[  184.918318] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.919967] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.921474] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.922919] page dumped because: kasan: bad access detected
[  184.924030] 
[  184.924615] Memory state around the buggy address:
[  184.925719]  ffff0000c655cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.927071]  ffff0000c655cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.928580] >ffff0000c655ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.929960]                                   ^
[  184.931027]  ffff0000c655ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.932446]  ffff0000c655cf00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  184.933840] ==================================================================

test log snippet boot parser 244

Home

[  183.976134] ==================================================================
[  183.977967] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x2a0
[  183.979530] Read of size 16 at addr ffff0000c66d9e00 by task kunit_try_catch/219
[  183.980909] 
[  183.981532] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.983309] Hardware name: linux,dummy-virt (DT)
[  183.984351] Call trace:
[  183.985063]  dump_backtrace+0xe0/0x134
[  183.986118]  show_stack+0x20/0x2c
[  183.987120]  dump_stack_lvl+0x88/0xb4
[  183.988184]  print_report+0x158/0x458
[  183.989293]  kasan_report+0xb4/0x170
[  183.990324]  __asan_load16+0x68/0x9c
[  183.991466]  kmalloc_uaf_16+0x104/0x2a0
[  183.992663]  kunit_try_run_case+0x8c/0x124
[  183.993633]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.995033]  kthread+0x15c/0x170
[  183.996085]  ret_from_fork+0x10/0x20
[  183.997171] 
[  183.997711] Allocated by task 219:
[  183.998603]  kasan_save_stack+0x3c/0x70
[  183.999728]  kasan_set_track+0x2c/0x40
[  184.000800]  kasan_save_alloc_info+0x24/0x34
[  184.001951]  __kasan_kmalloc+0xd4/0xe0
[  184.003043]  kmalloc_trace+0x8c/0x150
[  184.004120]  kmalloc_uaf_16+0xcc/0x2a0
[  184.005252]  kunit_try_run_case+0x8c/0x124
[  184.006403]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.007743]  kthread+0x15c/0x170
[  184.008810]  ret_from_fork+0x10/0x20
[  184.009843] 
[  184.010360] Freed by task 219:
[  184.011176]  kasan_save_stack+0x3c/0x70
[  184.012276]  kasan_set_track+0x2c/0x40
[  184.013387]  kasan_save_free_info+0x38/0x5c
[  184.014601]  __kasan_slab_free+0x100/0x170
[  184.015742]  slab_free_freelist_hook+0xd8/0x1c0
[  184.016996]  __kmem_cache_free+0x15c/0x2a0
[  184.018168]  kfree+0x88/0x150
[  184.019133]  kmalloc_uaf_16+0xec/0x2a0
[  184.020239]  kunit_try_run_case+0x8c/0x124
[  184.021474]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.022904]  kthread+0x15c/0x170
[  184.023960]  ret_from_fork+0x10/0x20
[  184.024966] 
[  184.025526] The buggy address belongs to the object at ffff0000c66d9e00
[  184.025526]  which belongs to the cache kmalloc-128 of size 128
[  184.027637] The buggy address is located 0 bytes inside of
[  184.027637]  128-byte region [ffff0000c66d9e00, ffff0000c66d9e80)
[  184.029733] 
[  184.030303] The buggy address belongs to the physical page:
[  184.031449] page:000000002cb8ccb8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d9
[  184.033169] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.034783] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.036341] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.037787] page dumped because: kasan: bad access detected
[  184.038934] 
[  184.039417] Memory state around the buggy address:
[  184.040546]  ffff0000c66d9d00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.041963]  ffff0000c66d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.043447] >ffff0000c66d9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.044847]                    ^
[  184.045746]  ffff0000c66d9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.047164]  ffff0000c66d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.048582] ==================================================================

test log snippet boot parser 245

Home

[  184.765613] ==================================================================
[  184.767477] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xd4/0x1f0
[  184.769350] Write of size 33 at addr ffff0000c6562400 by task kunit_try_catch/228
[  184.770934] 
[  184.771656] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  184.773292] Hardware name: linux,dummy-virt (DT)
[  184.774337] Call trace:
[  184.775104]  dump_backtrace+0xe0/0x134
[  184.776190]  show_stack+0x20/0x2c
[  184.777193]  dump_stack_lvl+0x88/0xb4
[  184.778283]  print_report+0x158/0x458
[  184.779420]  kasan_report+0xb4/0x170
[  184.780496]  kasan_check_range+0xe4/0x190
[  184.781622]  memset+0x40/0x70
[  184.782693]  kmalloc_uaf_memset+0xd4/0x1f0
[  184.783882]  kunit_try_run_case+0x8c/0x124
[  184.785034]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.786421]  kthread+0x15c/0x170
[  184.787482]  ret_from_fork+0x10/0x20
[  184.788552] 
[  184.789141] Allocated by task 228:
[  184.790082]  kasan_save_stack+0x3c/0x70
[  184.791207]  kasan_set_track+0x2c/0x40
[  184.792257]  kasan_save_alloc_info+0x24/0x34
[  184.793521]  __kasan_kmalloc+0xd4/0xe0
[  184.794482]  kmalloc_trace+0x8c/0x150
[  184.795638]  kmalloc_uaf_memset+0x9c/0x1f0
[  184.796798]  kunit_try_run_case+0x8c/0x124
[  184.798037]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.799389]  kthread+0x15c/0x170
[  184.800441]  ret_from_fork+0x10/0x20
[  184.801547] 
[  184.802138] Freed by task 228:
[  184.802987]  kasan_save_stack+0x3c/0x70
[  184.804153]  kasan_set_track+0x2c/0x40
[  184.805254]  kasan_save_free_info+0x38/0x5c
[  184.806415]  __kasan_slab_free+0x100/0x170
[  184.807676]  slab_free_freelist_hook+0xd8/0x1c0
[  184.808946]  __kmem_cache_free+0x15c/0x2a0
[  184.810128]  kfree+0x88/0x150
[  184.811111]  kmalloc_uaf_memset+0xbc/0x1f0
[  184.812340]  kunit_try_run_case+0x8c/0x124
[  184.813469]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  184.814951]  kthread+0x15c/0x170
[  184.816015]  ret_from_fork+0x10/0x20
[  184.817096] 
[  184.817666] The buggy address belongs to the object at ffff0000c6562400
[  184.817666]  which belongs to the cache kmalloc-128 of size 128
[  184.819831] The buggy address is located 0 bytes inside of
[  184.819831]  128-byte region [ffff0000c6562400, ffff0000c6562480)
[  184.821900] 
[  184.822547] The buggy address belongs to the physical page:
[  184.823742] page:000000004980c0b3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106562
[  184.825476] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.826963] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  184.828587] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  184.829987] page dumped because: kasan: bad access detected
[  184.831154] 
[  184.831795] Memory state around the buggy address:
[  184.832962]  ffff0000c6562300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.834390]  ffff0000c6562380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.835920] >ffff0000c6562400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  184.837379]                    ^
[  184.838481]  ffff0000c6562480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.839931]  ffff0000c6562500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.841393] ==================================================================

test log snippet boot parser 246

Home

[  186.492323] ==================================================================
[  186.494441] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xd4/0x1d0
[  186.497386] Read of size 1 at addr ffff0000c62da900 by task kunit_try_catch/245
[  186.499243] 
[  186.500226] CPU: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.501959] Hardware name: linux,dummy-virt (DT)
[  186.502968] Call trace:
[  186.503665]  dump_backtrace+0xe0/0x134
[  186.505322]  show_stack+0x20/0x2c
[  186.506415]  dump_stack_lvl+0x88/0xb4
[  186.507796]  print_report+0x158/0x458
[  186.508944]  kasan_report+0xb4/0x170
[  186.510060]  __kasan_check_byte+0x54/0x70
[  186.511358]  kmem_cache_destroy+0x100/0x1a4
[  186.512524]  kmem_cache_double_destroy+0xd4/0x1d0
[  186.514027]  kunit_try_run_case+0x8c/0x124
[  186.515401]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.517032]  kthread+0x15c/0x170
[  186.518052]  ret_from_fork+0x10/0x20
[  186.519191] 
[  186.520013] Allocated by task 245:
[  186.521602]  kasan_save_stack+0x3c/0x70
[  186.523475]  kasan_set_track+0x2c/0x40
[  186.524564]  kasan_save_alloc_info+0x24/0x34
[  186.525807]  __kasan_slab_alloc+0xa8/0xac
[  186.528153]  kmem_cache_alloc+0x190/0x3b4
[  186.529313]  kmem_cache_create_usercopy+0x14c/0x280
[  186.530931]  kmem_cache_create+0x24/0x30
[  186.532090]  kmem_cache_double_destroy+0xa4/0x1d0
[  186.533727]  kunit_try_run_case+0x8c/0x124
[  186.535081]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.536485]  kthread+0x15c/0x170
[  186.537647]  ret_from_fork+0x10/0x20
[  186.538874] 
[  186.539444] Freed by task 245:
[  186.540739]  kasan_save_stack+0x3c/0x70
[  186.541832]  kasan_set_track+0x2c/0x40
[  186.542986]  kasan_save_free_info+0x38/0x5c
[  186.544242]  __kasan_slab_free+0x100/0x170
[  186.546187]  slab_free_freelist_hook+0xd8/0x1c0
[  186.547845]  kmem_cache_free+0x194/0x430
[  186.548940]  slab_kmem_cache_release+0x38/0x50
[  186.550398]  kmem_cache_release+0x1c/0x30
[  186.552008]  kobject_put+0x104/0x2d0
[  186.553555]  sysfs_slab_release+0x30/0x40
[  186.555167]  kmem_cache_destroy+0xd8/0x1a4
[  186.556494]  kmem_cache_double_destroy+0xc4/0x1d0
[  186.557938]  kunit_try_run_case+0x8c/0x124
[  186.559291]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.560745]  kthread+0x15c/0x170
[  186.561967]  ret_from_fork+0x10/0x20
[  186.563390] 
[  186.564407] The buggy address belongs to the object at ffff0000c62da900
[  186.564407]  which belongs to the cache kmem_cache of size 216
[  186.566640] The buggy address is located 0 bytes inside of
[  186.566640]  216-byte region [ffff0000c62da900, ffff0000c62da9d8)
[  186.569263] 
[  186.570439] The buggy address belongs to the physical page:
[  186.571697] page:00000000dc1e5848 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062da
[  186.573422] head:00000000dc1e5848 order:1 compound_mapcount:0 compound_pincount:0
[  186.575354] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  186.577471] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[  186.579244] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[  186.580990] page dumped because: kasan: bad access detected
[  186.582222] 
[  186.582872] Memory state around the buggy address:
[  186.583916]  ffff0000c62da800: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  186.585780]  ffff0000c62da880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.587538] >ffff0000c62da900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  186.588875]                    ^
[  186.589912]  ffff0000c62da980: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  186.591925]  ffff0000c62daa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.593162] ==================================================================

test log snippet boot parser 247

Home

[  183.701685] ==================================================================
[  183.704601] BUG: KASAN: use-after-free in krealloc_uaf+0xe8/0x2f0
[  183.705910] Read of size 1 at addr ffff0000c62d9800 by task kunit_try_catch/217
[  183.707892] 
[  183.708498] CPU: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.710077] Hardware name: linux,dummy-virt (DT)
[  183.711173] Call trace:
[  183.711888]  dump_backtrace+0xe0/0x134
[  183.713221]  show_stack+0x20/0x2c
[  183.714175]  dump_stack_lvl+0x88/0xb4
[  183.715924]  print_report+0x158/0x458
[  183.717033]  kasan_report+0xb4/0x170
[  183.718075]  __kasan_check_byte+0x54/0x70
[  183.719221]  krealloc+0xec/0x1c0
[  183.720485]  krealloc_uaf+0xe8/0x2f0
[  183.721434]  kunit_try_run_case+0x8c/0x124
[  183.722850]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.724392]  kthread+0x15c/0x170
[  183.725499]  ret_from_fork+0x10/0x20
[  183.726751] 
[  183.727341] Allocated by task 217:
[  183.728129]  kasan_save_stack+0x3c/0x70
[  183.728989]  kasan_set_track+0x2c/0x40
[  183.730259]  kasan_save_alloc_info+0x24/0x34
[  183.731924]  __kasan_kmalloc+0xd4/0xe0
[  183.733171]  kmalloc_trace+0x8c/0x150
[  183.734184]  krealloc_uaf+0xb0/0x2f0
[  183.735910]  kunit_try_run_case+0x8c/0x124
[  183.737091]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.738551]  kthread+0x15c/0x170
[  183.740077]  ret_from_fork+0x10/0x20
[  183.741168] 
[  183.741806] Freed by task 217:
[  183.742926]  kasan_save_stack+0x3c/0x70
[  183.744282]  kasan_set_track+0x2c/0x40
[  183.745386]  kasan_save_free_info+0x38/0x5c
[  183.746951]  __kasan_slab_free+0x100/0x170
[  183.747992]  slab_free_freelist_hook+0xd8/0x1c0
[  183.749049]  __kmem_cache_free+0x15c/0x2a0
[  183.750353]  kfree+0x88/0x150
[  183.751976]  krealloc_uaf+0xd0/0x2f0
[  183.753130]  kunit_try_run_case+0x8c/0x124
[  183.754496]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.756226]  kthread+0x15c/0x170
[  183.757222]  ret_from_fork+0x10/0x20
[  183.759098] 
[  183.759728] The buggy address belongs to the object at ffff0000c62d9800
[  183.759728]  which belongs to the cache kmalloc-256 of size 256
[  183.761805] The buggy address is located 0 bytes inside of
[  183.761805]  256-byte region [ffff0000c62d9800, ffff0000c62d9900)
[  183.764007] 
[  183.764540] The buggy address belongs to the physical page:
[  183.765672] page:00000000336e9112 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d8
[  183.767627] head:00000000336e9112 order:1 compound_mapcount:0 compound_pincount:0
[  183.769138] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  183.770878] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  183.772961] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.774361] page dumped because: kasan: bad access detected
[  183.775734] 
[  183.776143] Memory state around the buggy address:
[  183.777230]  ffff0000c62d9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.778870]  ffff0000c62d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.780757] >ffff0000c62d9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  183.782120]                    ^
[  183.783694]  ffff0000c62d9880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  183.785166]  ffff0000c62d9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.786641] ==================================================================

test log snippet boot parser 248

Home

[  183.793925] ==================================================================
[  183.795232] BUG: KASAN: use-after-free in krealloc_uaf+0x10c/0x2f0
[  183.797461] Read of size 1 at addr ffff0000c62d9800 by task kunit_try_catch/217
[  183.799069] 
[  183.799757] CPU: 1 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  183.801435] Hardware name: linux,dummy-virt (DT)
[  183.802473] Call trace:
[  183.803224]  dump_backtrace+0xe0/0x134
[  183.804306]  show_stack+0x20/0x2c
[  183.805262]  dump_stack_lvl+0x88/0xb4
[  183.806468]  print_report+0x158/0x458
[  183.807640]  kasan_report+0xb4/0x170
[  183.808675]  __asan_load1+0x68/0x74
[  183.809822]  krealloc_uaf+0x10c/0x2f0
[  183.810980]  kunit_try_run_case+0x8c/0x124
[  183.812125]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.813533]  kthread+0x15c/0x170
[  183.814595]  ret_from_fork+0x10/0x20
[  183.815649] 
[  183.816196] Allocated by task 217:
[  183.817109]  kasan_save_stack+0x3c/0x70
[  183.818175]  kasan_set_track+0x2c/0x40
[  183.819313]  kasan_save_alloc_info+0x24/0x34
[  183.820547]  __kasan_kmalloc+0xd4/0xe0
[  183.821677]  kmalloc_trace+0x8c/0x150
[  183.822814]  krealloc_uaf+0xb0/0x2f0
[  183.823899]  kunit_try_run_case+0x8c/0x124
[  183.825092]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.826451]  kthread+0x15c/0x170
[  183.827597]  ret_from_fork+0x10/0x20
[  183.828670] 
[  183.829277] Freed by task 217:
[  183.830165]  kasan_save_stack+0x3c/0x70
[  183.831268]  kasan_set_track+0x2c/0x40
[  183.832318]  kasan_save_free_info+0x38/0x5c
[  183.833583]  __kasan_slab_free+0x100/0x170
[  183.834718]  slab_free_freelist_hook+0xd8/0x1c0
[  183.836111]  __kmem_cache_free+0x15c/0x2a0
[  183.837204]  kfree+0x88/0x150
[  183.838241]  krealloc_uaf+0xd0/0x2f0
[  183.839404]  kunit_try_run_case+0x8c/0x124
[  183.840590]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  183.841798]  kthread+0x15c/0x170
[  183.842850]  ret_from_fork+0x10/0x20
[  183.843909] 
[  183.844455] The buggy address belongs to the object at ffff0000c62d9800
[  183.844455]  which belongs to the cache kmalloc-256 of size 256
[  183.846595] The buggy address is located 0 bytes inside of
[  183.846595]  256-byte region [ffff0000c62d9800, ffff0000c62d9900)
[  183.848662] 
[  183.849246] The buggy address belongs to the physical page:
[  183.850354] page:00000000336e9112 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d8
[  183.852073] head:00000000336e9112 order:1 compound_mapcount:0 compound_pincount:0
[  183.853548] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  183.855213] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  183.856832] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  183.858265] page dumped because: kasan: bad access detected
[  183.859400] 
[  183.859950] Memory state around the buggy address:
[  183.861051]  ffff0000c62d9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.862554]  ffff0000c62d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.864039] >ffff0000c62d9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  183.865411]                    ^
[  183.866277]  ffff0000c62d9880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  183.867791]  ffff0000c62d9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.869153] ==================================================================

test log snippet boot parser 249

Home

[  182.589169] ==================================================================
[  182.592554] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x210
[  182.594136] Read of size 1 at addr ffff0000c6860000 by task kunit_try_catch/211
[  182.596953] 
[  182.598003] CPU: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  182.600272] Hardware name: linux,dummy-virt (DT)
[  182.601260] Call trace:
[  182.601933]  dump_backtrace+0xe0/0x134
[  182.603130]  show_stack+0x20/0x2c
[  182.604153]  dump_stack_lvl+0x88/0xb4
[  182.605278]  print_report+0x158/0x458
[  182.606343]  kasan_report+0xb4/0x170
[  182.607638]  __asan_load1+0x68/0x74
[  182.608700]  pagealloc_uaf+0xd4/0x210
[  182.609867]  kunit_try_run_case+0x8c/0x124
[  182.611108]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  182.613199]  kthread+0x15c/0x170
[  182.614923]  ret_from_fork+0x10/0x20
[  182.616139] 
[  182.616720] The buggy address belongs to the physical page:
[  182.617881] page:00000000b8baaf47 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x106860
[  182.619861] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  182.621390] raw: 0bfffc0000000000 ffff0000ff5fba08 ffff0000ff5fba08 0000000000000000
[  182.623327] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[  182.624644] page dumped because: kasan: bad access detected
[  182.625823] 
[  182.626410] Memory state around the buggy address:
[  182.627812]  ffff0000c685ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.629292]  ffff0000c685ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.630796] >ffff0000c6860000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.632023]                    ^
[  182.633870]  ffff0000c6860080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.635484]  ffff0000c6860100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  182.636929] ==================================================================

test log snippet boot parser 250

Home

[  186.785265] ==================================================================
[  186.787554] BUG: KASAN: use-after-free in strchr+0x20/0x80
[  186.789480] Read of size 1 at addr ffff0000c667b710 by task kunit_try_catch/248
[  186.792038] 
[  186.793749] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.795418] Hardware name: linux,dummy-virt (DT)
[  186.796529] Call trace:
[  186.797311]  dump_backtrace+0xe0/0x134
[  186.798464]  show_stack+0x20/0x2c
[  186.799649]  dump_stack_lvl+0x88/0xb4
[  186.800926]  print_report+0x158/0x458
[  186.802234]  kasan_report+0xb4/0x170
[  186.803566]  __asan_load1+0x68/0x74
[  186.804855]  strchr+0x20/0x80
[  186.806093]  kasan_strings+0xd8/0x530
[  186.807646]  kunit_try_run_case+0x8c/0x124
[  186.809137]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.811120]  kthread+0x15c/0x170
[  186.811941]  ret_from_fork+0x10/0x20
[  186.813104] 
[  186.813669] Allocated by task 248:
[  186.814609]  kasan_save_stack+0x3c/0x70
[  186.816078]  kasan_set_track+0x2c/0x40
[  186.817639]  kasan_save_alloc_info+0x24/0x34
[  186.819143]  __kasan_kmalloc+0xd4/0xe0
[  186.820299]  kmalloc_trace+0x8c/0x150
[  186.821356]  kasan_strings+0xa0/0x530
[  186.822730]  kunit_try_run_case+0x8c/0x124
[  186.824319]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.826266]  kthread+0x15c/0x170
[  186.827360]  ret_from_fork+0x10/0x20
[  186.828461] 
[  186.829054] Freed by task 248:
[  186.829894]  kasan_save_stack+0x3c/0x70
[  186.831377]  kasan_set_track+0x2c/0x40
[  186.832860]  kasan_save_free_info+0x38/0x5c
[  186.834399]  __kasan_slab_free+0x100/0x170
[  186.835666]  slab_free_freelist_hook+0xd8/0x1c0
[  186.836923]  __kmem_cache_free+0x15c/0x2a0
[  186.838126]  kfree+0x88/0x150
[  186.839139]  kasan_strings+0xc0/0x530
[  186.841359]  kunit_try_run_case+0x8c/0x124
[  186.842625]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.843996]  kthread+0x15c/0x170
[  186.845065]  ret_from_fork+0x10/0x20
[  186.846152] 
[  186.846799] The buggy address belongs to the object at ffff0000c667b700
[  186.846799]  which belongs to the cache kmalloc-128 of size 128
[  186.849737] The buggy address is located 16 bytes inside of
[  186.849737]  128-byte region [ffff0000c667b700, ffff0000c667b780)
[  186.851710] 
[  186.852308] The buggy address belongs to the physical page:
[  186.853486] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  186.855345] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.857867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  186.859442] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  186.861188] page dumped because: kasan: bad access detected
[  186.862573] 
[  186.863836] Memory state around the buggy address:
[  186.865659]  ffff0000c667b600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.867222]  ffff0000c667b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.868859] >ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  186.870301]                          ^
[  186.871390]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.873266]  ffff0000c667b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.875382] ==================================================================

test log snippet boot parser 251

Home

[  186.968920] ==================================================================
[  186.970147] BUG: KASAN: use-after-free in strcmp+0x2c/0x80
[  186.971462] Read of size 1 at addr ffff0000c667b710 by task kunit_try_catch/248
[  186.974393] 
[  186.975039] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.976835] Hardware name: linux,dummy-virt (DT)
[  186.977833] Call trace:
[  186.978553]  dump_backtrace+0xe0/0x134
[  186.979703]  show_stack+0x20/0x2c
[  186.980807]  dump_stack_lvl+0x88/0xb4
[  186.982018]  print_report+0x158/0x458
[  186.983243]  kasan_report+0xb4/0x170
[  186.984452]  __asan_load1+0x68/0x74
[  186.985483]  strcmp+0x2c/0x80
[  186.986808]  kasan_strings+0x128/0x530
[  186.988076]  kunit_try_run_case+0x8c/0x124
[  186.989327]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.990716]  kthread+0x15c/0x170
[  186.991642]  ret_from_fork+0x10/0x20
[  186.992838] 
[  186.993398] Allocated by task 248:
[  186.994252]  kasan_save_stack+0x3c/0x70
[  186.995551]  kasan_set_track+0x2c/0x40
[  186.996680]  kasan_save_alloc_info+0x24/0x34
[  186.997889]  __kasan_kmalloc+0xd4/0xe0
[  186.999565]  kmalloc_trace+0x8c/0x150
[  187.001392]  kasan_strings+0xa0/0x530
[  187.002611]  kunit_try_run_case+0x8c/0x124
[  187.003788]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.005176]  kthread+0x15c/0x170
[  187.006227]  ret_from_fork+0x10/0x20
[  187.007265] 
[  187.008388] Freed by task 248:
[  187.009322]  kasan_save_stack+0x3c/0x70
[  187.010701]  kasan_set_track+0x2c/0x40
[  187.011995]  kasan_save_free_info+0x38/0x5c
[  187.013264]  __kasan_slab_free+0x100/0x170
[  187.014388]  slab_free_freelist_hook+0xd8/0x1c0
[  187.015781]  __kmem_cache_free+0x15c/0x2a0
[  187.017247]  kfree+0x88/0x150
[  187.018774]  kasan_strings+0xc0/0x530
[  187.020006]  kunit_try_run_case+0x8c/0x124
[  187.021206]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.022630]  kthread+0x15c/0x170
[  187.024066]  ret_from_fork+0x10/0x20
[  187.025131] 
[  187.025707] The buggy address belongs to the object at ffff0000c667b700
[  187.025707]  which belongs to the cache kmalloc-128 of size 128
[  187.028071] The buggy address is located 16 bytes inside of
[  187.028071]  128-byte region [ffff0000c667b700, ffff0000c667b780)
[  187.030204] 
[  187.030853] The buggy address belongs to the physical page:
[  187.032397] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.034189] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.035986] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.037453] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.038978] page dumped because: kasan: bad access detected
[  187.040206] 
[  187.040801] Memory state around the buggy address:
[  187.041852]  ffff0000c667b600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.043820]  ffff0000c667b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.045347] >ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.046943]                          ^
[  187.047865]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.049423]  ffff0000c667b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.050864] ==================================================================

test log snippet boot parser 252

Home

[  187.136649] ==================================================================
[  187.138017] BUG: KASAN: use-after-free in strlen+0x18/0x64
[  187.139538] Read of size 1 at addr ffff0000c667b710 by task kunit_try_catch/248
[  187.141012] 
[  187.141620] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.143388] Hardware name: linux,dummy-virt (DT)
[  187.144430] Call trace:
[  187.145428]  dump_backtrace+0xe0/0x134
[  187.146629]  show_stack+0x20/0x2c
[  187.148579]  dump_stack_lvl+0x88/0xb4
[  187.149866]  print_report+0x158/0x458
[  187.151051]  kasan_report+0xb4/0x170
[  187.152139]  __asan_load1+0x68/0x74
[  187.153191]  strlen+0x18/0x64
[  187.154174]  kasan_strings+0x170/0x530
[  187.155427]  kunit_try_run_case+0x8c/0x124
[  187.156745]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.157959]  kthread+0x15c/0x170
[  187.159124]  ret_from_fork+0x10/0x20
[  187.160607] 
[  187.161213] Allocated by task 248:
[  187.162140]  kasan_save_stack+0x3c/0x70
[  187.163713]  kasan_set_track+0x2c/0x40
[  187.164892]  kasan_save_alloc_info+0x24/0x34
[  187.166072]  __kasan_kmalloc+0xd4/0xe0
[  187.167199]  kmalloc_trace+0x8c/0x150
[  187.168673]  kasan_strings+0xa0/0x530
[  187.170053]  kunit_try_run_case+0x8c/0x124
[  187.171368]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.173206]  kthread+0x15c/0x170
[  187.174124]  ret_from_fork+0x10/0x20
[  187.175483] 
[  187.176358] Freed by task 248:
[  187.177219]  kasan_save_stack+0x3c/0x70
[  187.178387]  kasan_set_track+0x2c/0x40
[  187.179673]  kasan_save_free_info+0x38/0x5c
[  187.181362]  __kasan_slab_free+0x100/0x170
[  187.182698]  slab_free_freelist_hook+0xd8/0x1c0
[  187.185255]  __kmem_cache_free+0x15c/0x2a0
[  187.186418]  kfree+0x88/0x150
[  187.187420]  kasan_strings+0xc0/0x530
[  187.188549]  kunit_try_run_case+0x8c/0x124
[  187.189823]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.191379]  kthread+0x15c/0x170
[  187.193369]  ret_from_fork+0x10/0x20
[  187.194475] 
[  187.195096] The buggy address belongs to the object at ffff0000c667b700
[  187.195096]  which belongs to the cache kmalloc-128 of size 128
[  187.197270] The buggy address is located 16 bytes inside of
[  187.197270]  128-byte region [ffff0000c667b700, ffff0000c667b780)
[  187.199309] 
[  187.200416] The buggy address belongs to the physical page:
[  187.201653] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.203247] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.205008] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.206753] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.208153] page dumped because: kasan: bad access detected
[  187.209280] 
[  187.209889] Memory state around the buggy address:
[  187.211468]  ffff0000c667b600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.213038]  ffff0000c667b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.214651] >ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.216168]                          ^
[  187.217195]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.218734]  ffff0000c667b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.220467] ==================================================================

test log snippet boot parser 253

Home

[  187.055961] ==================================================================
[  187.057155] BUG: KASAN: use-after-free in strncmp+0x3c/0x90
[  187.058626] Read of size 1 at addr ffff0000c667b710 by task kunit_try_catch/248
[  187.060184] 
[  187.060839] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.062450] Hardware name: linux,dummy-virt (DT)
[  187.063531] Call trace:
[  187.064219]  dump_backtrace+0xe0/0x134
[  187.065256]  show_stack+0x20/0x2c
[  187.066221]  dump_stack_lvl+0x88/0xb4
[  187.067289]  print_report+0x158/0x458
[  187.068425]  kasan_report+0xb4/0x170
[  187.069480]  __asan_load1+0x68/0x74
[  187.070589]  strncmp+0x3c/0x90
[  187.071598]  kasan_strings+0x150/0x530
[  187.072757]  kunit_try_run_case+0x8c/0x124
[  187.073880]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.075298]  kthread+0x15c/0x170
[  187.076400]  ret_from_fork+0x10/0x20
[  187.077486] 
[  187.078017] Allocated by task 248:
[  187.078917]  kasan_save_stack+0x3c/0x70
[  187.080055]  kasan_set_track+0x2c/0x40
[  187.081095]  kasan_save_alloc_info+0x24/0x34
[  187.082350]  __kasan_kmalloc+0xd4/0xe0
[  187.083462]  kmalloc_trace+0x8c/0x150
[  187.084498]  kasan_strings+0xa0/0x530
[  187.085680]  kunit_try_run_case+0x8c/0x124
[  187.086895]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.088232]  kthread+0x15c/0x170
[  187.089288]  ret_from_fork+0x10/0x20
[  187.090321] 
[  187.090839] Freed by task 248:
[  187.091691]  kasan_save_stack+0x3c/0x70
[  187.092784]  kasan_set_track+0x2c/0x40
[  187.093863]  kasan_save_free_info+0x38/0x5c
[  187.095103]  __kasan_slab_free+0x100/0x170
[  187.096265]  slab_free_freelist_hook+0xd8/0x1c0
[  187.097559]  __kmem_cache_free+0x15c/0x2a0
[  187.098655]  kfree+0x88/0x150
[  187.099641]  kasan_strings+0xc0/0x530
[  187.100770]  kunit_try_run_case+0x8c/0x124
[  187.101922]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.103296]  kthread+0x15c/0x170
[  187.104328]  ret_from_fork+0x10/0x20
[  187.106487] 
[  187.107007] The buggy address belongs to the object at ffff0000c667b700
[  187.107007]  which belongs to the cache kmalloc-128 of size 128
[  187.109338] The buggy address is located 16 bytes inside of
[  187.109338]  128-byte region [ffff0000c667b700, ffff0000c667b780)
[  187.111386] 
[  187.112036] The buggy address belongs to the physical page:
[  187.113265] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.115013] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.116735] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.118299] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.119817] page dumped because: kasan: bad access detected
[  187.120957] 
[  187.121447] Memory state around the buggy address:
[  187.122647]  ffff0000c667b600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.124181]  ffff0000c667b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.125731] >ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.127142]                          ^
[  187.128137]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.129698]  ffff0000c667b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.131103] ==================================================================

test log snippet boot parser 254

Home

[  187.225351] ==================================================================
[  187.226797] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c
[  187.228151] Read of size 1 at addr ffff0000c667b710 by task kunit_try_catch/248
[  187.229587] 
[  187.230235] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  187.232070] Hardware name: linux,dummy-virt (DT)
[  187.233758] Call trace:
[  187.234267]  dump_backtrace+0xe0/0x134
[  187.235638]  show_stack+0x20/0x2c
[  187.236652]  dump_stack_lvl+0x88/0xb4
[  187.237781]  print_report+0x158/0x458
[  187.239062]  kasan_report+0xb4/0x170
[  187.240356]  __asan_load1+0x68/0x74
[  187.241818]  strnlen+0x3c/0x6c
[  187.243121]  kasan_strings+0x194/0x530
[  187.244474]  kunit_try_run_case+0x8c/0x124
[  187.245682]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.247454]  kthread+0x15c/0x170
[  187.249156]  ret_from_fork+0x10/0x20
[  187.250450] 
[  187.251186] Allocated by task 248:
[  187.252193]  kasan_save_stack+0x3c/0x70
[  187.253338]  kasan_set_track+0x2c/0x40
[  187.254523]  kasan_save_alloc_info+0x24/0x34
[  187.255923]  __kasan_kmalloc+0xd4/0xe0
[  187.258007]  kmalloc_trace+0x8c/0x150
[  187.259122]  kasan_strings+0xa0/0x530
[  187.260318]  kunit_try_run_case+0x8c/0x124
[  187.261474]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.263233]  kthread+0x15c/0x170
[  187.264298]  ret_from_fork+0x10/0x20
[  187.265566] 
[  187.266151] Freed by task 248:
[  187.267024]  kasan_save_stack+0x3c/0x70
[  187.268234]  kasan_set_track+0x2c/0x40
[  187.269360]  kasan_save_free_info+0x38/0x5c
[  187.270614]  __kasan_slab_free+0x100/0x170
[  187.272670]  slab_free_freelist_hook+0xd8/0x1c0
[  187.274277]  __kmem_cache_free+0x15c/0x2a0
[  187.275426]  kfree+0x88/0x150
[  187.276335]  kasan_strings+0xc0/0x530
[  187.277472]  kunit_try_run_case+0x8c/0x124
[  187.278830]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  187.281290]  kthread+0x15c/0x170
[  187.282559]  ret_from_fork+0x10/0x20
[  187.283676] 
[  187.284258] The buggy address belongs to the object at ffff0000c667b700
[  187.284258]  which belongs to the cache kmalloc-128 of size 128
[  187.286350] The buggy address is located 16 bytes inside of
[  187.286350]  128-byte region [ffff0000c667b700, ffff0000c667b780)
[  187.289527] 
[  187.290131] The buggy address belongs to the physical page:
[  187.291127] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  187.293021] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.294724] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  187.296880] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.298543] page dumped because: kasan: bad access detected
[  187.299804] 
[  187.300390] Memory state around the buggy address:
[  187.301530]  ffff0000c667b600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.303480]  ffff0000c667b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.305531] >ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.306807]                          ^
[  187.307779]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.309248]  ffff0000c667b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.311563] ==================================================================

test log snippet boot parser 255

Home

[  186.879169] ==================================================================
[  186.880615] BUG: KASAN: use-after-free in strrchr+0x28/0x54
[  186.881972] Read of size 1 at addr ffff0000c667b710 by task kunit_try_catch/248
[  186.883561] 
[  186.884189] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.885757] Hardware name: linux,dummy-virt (DT)
[  186.886933] Call trace:
[  186.887687]  dump_backtrace+0xe0/0x134
[  186.888934]  show_stack+0x20/0x2c
[  186.890008]  dump_stack_lvl+0x88/0xb4
[  186.891329]  print_report+0x158/0x458
[  186.892526]  kasan_report+0xb4/0x170
[  186.893769]  __asan_load1+0x68/0x74
[  186.895072]  strrchr+0x28/0x54
[  186.896218]  kasan_strings+0xfc/0x530
[  186.897603]  kunit_try_run_case+0x8c/0x124
[  186.899003]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.900615]  kthread+0x15c/0x170
[  186.901914]  ret_from_fork+0x10/0x20
[  186.903163] 
[  186.903702] Allocated by task 248:
[  186.904584]  kasan_save_stack+0x3c/0x70
[  186.905673]  kasan_set_track+0x2c/0x40
[  186.907698]  kasan_save_alloc_info+0x24/0x34
[  186.909183]  __kasan_kmalloc+0xd4/0xe0
[  186.910141]  kmalloc_trace+0x8c/0x150
[  186.911245]  kasan_strings+0xa0/0x530
[  186.912359]  kunit_try_run_case+0x8c/0x124
[  186.913619]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.914997]  kthread+0x15c/0x170
[  186.916092]  ret_from_fork+0x10/0x20
[  186.917464] 
[  186.918363] Freed by task 248:
[  186.919483]  kasan_save_stack+0x3c/0x70
[  186.920683]  kasan_set_track+0x2c/0x40
[  186.921765]  kasan_save_free_info+0x38/0x5c
[  186.923030]  __kasan_slab_free+0x100/0x170
[  186.925970]  slab_free_freelist_hook+0xd8/0x1c0
[  186.927048]  __kmem_cache_free+0x15c/0x2a0
[  186.928218]  kfree+0x88/0x150
[  186.929203]  kasan_strings+0xc0/0x530
[  186.930344]  kunit_try_run_case+0x8c/0x124
[  186.932583]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.934093]  kthread+0x15c/0x170
[  186.935109]  ret_from_fork+0x10/0x20
[  186.936163] 
[  186.936793] The buggy address belongs to the object at ffff0000c667b700
[  186.936793]  which belongs to the cache kmalloc-128 of size 128
[  186.939070] The buggy address is located 16 bytes inside of
[  186.939070]  128-byte region [ffff0000c667b700, ffff0000c667b780)
[  186.941300] 
[  186.941908] The buggy address belongs to the physical page:
[  186.943219] page:0000000047cd95bf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  186.945344] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  186.948362] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  186.950678] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  186.952103] page dumped because: kasan: bad access detected
[  186.953336] 
[  186.954012] Memory state around the buggy address:
[  186.955754]  ffff0000c667b600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.957911]  ffff0000c667b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.959187] >ffff0000c667b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  186.960721]                          ^
[  186.961797]  ffff0000c667b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.963641]  ffff0000c667b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  186.965598] ==================================================================

test log snippet boot parser 256

Home

[  188.900999] ==================================================================
[  188.903816] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x310
[  188.905555] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/253
[  188.907877] 
[  188.908555] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.910221] Hardware name: linux,dummy-virt (DT)
[  188.911421] Call trace:
[  188.912263]  dump_backtrace+0xe0/0x134
[  188.913548]  show_stack+0x20/0x2c
[  188.914570]  dump_stack_lvl+0x88/0xb4
[  188.915944]  print_report+0x158/0x458
[  188.917131]  kasan_report+0xb4/0x170
[  188.918294]  __asan_load1+0x68/0x74
[  188.919755]  vmalloc_oob+0xc8/0x310
[  188.921055]  kunit_try_run_case+0x8c/0x124
[  188.922271]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.923973]  kthread+0x15c/0x170
[  188.925236]  ret_from_fork+0x10/0x20
[  188.926766] 
[  188.927409] The buggy address belongs to the virtual mapping at
[  188.927409]  [ffff8000080fb000, ffff8000080fd000) created by:
[  188.927409]  vmalloc_oob+0x88/0x310
[  188.930371] 
[  188.930981] The buggy address belongs to the physical page:
[  188.932216] page:000000009e2f0e80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106699
[  188.934123] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  188.936115] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  188.937786] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.939336] page dumped because: kasan: bad access detected
[  188.940269] 
[  188.941099] Memory state around the buggy address:
[  188.942358]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.944072]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.945627] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  188.947384]                                                              ^
[  188.948759]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  188.950436]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  188.951773] ==================================================================

test log snippet boot parser 257

Home

[  188.955845] ==================================================================
[  188.957181] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe8/0x310
[  188.959723] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/253
[  188.961863] 
[  188.962205] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  188.963723] Hardware name: linux,dummy-virt (DT)
[  188.965254] Call trace:
[  188.966919]  dump_backtrace+0xe0/0x134
[  188.968226]  show_stack+0x20/0x2c
[  188.969310]  dump_stack_lvl+0x88/0xb4
[  188.970369]  print_report+0x158/0x458
[  188.971722]  kasan_report+0xb4/0x170
[  188.972914]  __asan_load1+0x68/0x74
[  188.974024]  vmalloc_oob+0xe8/0x310
[  188.975331]  kunit_try_run_case+0x8c/0x124
[  188.976564]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  188.978272]  kthread+0x15c/0x170
[  188.979640]  ret_from_fork+0x10/0x20
[  188.980895] 
[  188.981551] The buggy address belongs to the virtual mapping at
[  188.981551]  [ffff8000080fb000, ffff8000080fd000) created by:
[  188.981551]  vmalloc_oob+0x88/0x310
[  188.985684] 
[  188.986337] The buggy address belongs to the physical page:
[  188.987879] page:000000009e2f0e80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106699
[  188.990015] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  188.992216] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  188.994253] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.995915] page dumped because: kasan: bad access detected
[  188.997131] 
[  188.997744] Memory state around the buggy address:
[  188.999007]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  189.001366]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  189.002969] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  189.004736]                                                                 ^
[  189.006565]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  189.008131]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  189.009534] ==================================================================

test log snippet boot parser 258

Home

[  191.314354] ==================================================================
[  191.315702] BUG: KFENCE: invalid free in test_double_free+0x114/0x1b0
[  191.315702] 
[  191.317343] Invalid free of 0x000000004c8e4ac6 (in kfence-#164):
[  191.318971]  test_double_free+0x114/0x1b0
[  191.320348]  kunit_try_run_case+0x8c/0x124
[  191.321634]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  191.323149]  kthread+0x15c/0x170
[  191.324086]  ret_from_fork+0x10/0x20
[  191.325204] 
[  191.325780] kfence-#164: 0x000000004c8e4ac6-0x000000001fa35ed9, size=32, cache=test
[  191.325780] 
[  191.327627] allocated by task 266 on cpu 1 at 191.312003s:
[  191.329248]  test_alloc+0x1d8/0x3b0
[  191.330269]  test_double_free+0xe0/0x1b0
[  191.331427]  kunit_try_run_case+0x8c/0x124
[  191.332732]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  191.334098]  kthread+0x15c/0x170
[  191.335232]  ret_from_fork+0x10/0x20
[  191.336368] 
[  191.337013] freed by task 266 on cpu 1 at 191.313144s:
[  191.338620]  test_double_free+0xfc/0x1b0
[  191.339632]  kunit_try_run_case+0x8c/0x124
[  191.340897]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  191.342307]  kthread+0x15c/0x170
[  191.343364]  ret_from_fork+0x10/0x20
[  191.344479] 
[  191.345154] CPU: 1 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  191.346908] Hardware name: linux,dummy-virt (DT)
[  191.348055] ==================================================================

test log snippet boot parser 259

Home

[  197.867867] ==================================================================
[  197.869132] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x138/0x1c0
[  197.869132] 
[  197.871455] Corrupted memory at 0x00000000cbb3f39e [ ! . . . . . . . . . . . . . . . ] (in kfence-#0):
[  197.876037]  test_kmalloc_aligned_oob_write+0x138/0x1c0
[  197.877415]  kunit_try_run_case+0x8c/0x124
[  197.878691]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  197.880192]  kthread+0x15c/0x170
[  197.881215]  ret_from_fork+0x10/0x20
[  197.882368] 
[  197.882983] kfence-#0: 0x000000007789a744-0x0000000013bdfe50, size=73, cache=kmalloc-128
[  197.882983] 
[  197.884865] allocated by task 276 on cpu 0 at 197.864314s:
[  197.886440]  test_alloc+0x1e8/0x3b0
[  197.887557]  test_kmalloc_aligned_oob_write+0xb4/0x1c0
[  197.888903]  kunit_try_run_case+0x8c/0x124
[  197.890178]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  197.891636]  kthread+0x15c/0x170
[  197.892709]  ret_from_fork+0x10/0x20
[  197.893758] 
[  197.894332] freed by task 276 on cpu 0 at 197.865916s:
[  197.896037]  test_kmalloc_aligned_oob_write+0x138/0x1c0
[  197.897261]  kunit_try_run_case+0x8c/0x124
[  197.898455]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  197.899937]  kthread+0x15c/0x170
[  197.900968]  ret_from_fork+0x10/0x20
[  197.902136] 
[  197.902737] CPU: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  197.904573] Hardware name: linux,dummy-virt (DT)
[  197.905722] ==================================================================

test log snippet boot parser 260

Home

[  197.867867] ==================================================================
[  197.869132] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x138/0x1c0
[  197.869132] 
[  197.871455] Corrupted memory at 0x00000000cbb3f39e [ ! . . . . . . . . . . . . . . . ] (in kfence-#0):
[  197.876037]  test_kmalloc_aligned_oob_write+0x138/0x1c0
[  197.877415]  kunit_try_run_case+0x8c/0x124
[  197.878691]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  197.880192]  kthread+0x15c/0x170
[  197.881215]  ret_from_fork+0x10/0x20
[  197.882368] 
[  197.882983] kfence-#0: 0x000000007789a744-0x0000000013bdfe50, size=73, cache=kmalloc-128
[  197.882983] 
[  197.884865] allocated by task 276 on cpu 0 at 197.864314s:
[  197.886440]  test_alloc+0x1e8/0x3b0
[  197.887557]  test_kmalloc_aligned_oob_write+0xb4/0x1c0
[  197.888903]  kunit_try_run_case+0x8c/0x124
[  197.890178]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  197.891636]  kthread+0x15c/0x170
[  197.892709]  ret_from_fork+0x10/0x20
[  197.893758] 
[  197.894332] freed by task 276 on cpu 0 at 197.865916s:
[  197.896037]  test_kmalloc_aligned_oob_write+0x138/0x1c0
[  197.897261]  kunit_try_run_case+0x8c/0x124
[  197.898455]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  197.899937]  kthread+0x15c/0x170
[  197.900968]  ret_from_fork+0x10/0x20
[  197.902136] 
[  197.902737] CPU: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  197.904573] Hardware name: linux,dummy-virt (DT)
[  197.905722] ==================================================================

test log snippet boot parser 261

Home

[  190.795305] ==================================================================
[  190.796931] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xe8/0x19c
[  190.796931] 
[  190.798929] Out-of-bounds write at 0x0000000033035220 (1B left of kfence-#125):
[  190.800740]  test_out_of_bounds_write+0xe8/0x19c
[  190.802248]  kunit_try_run_case+0x8c/0x124
[  190.803474]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  190.804999]  kthread+0x15c/0x170
[  190.806126]  ret_from_fork+0x10/0x20
[  190.807218] 
[  190.807832] kfence-#125: 0x00000000f1ba4225-0x00000000a65bcb22, size=32, cache=kmalloc-128
[  190.807832] 
[  190.809791] allocated by task 261 on cpu 0 at 190.792856s:
[  190.811646]  test_alloc+0x1e8/0x3b0
[  190.812581]  test_out_of_bounds_write+0xd4/0x19c
[  190.813937]  kunit_try_run_case+0x8c/0x124
[  190.815165]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  190.816635]  kthread+0x15c/0x170
[  190.817740]  ret_from_fork+0x10/0x20
[  190.818835] 
[  190.819532] CPU: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  190.821281] Hardware name: linux,dummy-virt (DT)
[  190.822395] ==================================================================

test log snippet boot parser 262

Home

[  186.145233] ==================================================================
[  186.148632] BUG: KFENCE: use-after-free read in ksize_uaf+0xe8/0x330
[  186.148632] 
[  186.150370] Use-after-free read at 0x0000000035f50b31 (in kfence-#244):
[  186.152005]  ksize_uaf+0xe8/0x330
[  186.153237]  kunit_try_run_case+0x8c/0x124
[  186.154405]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.155766]  kthread+0x15c/0x170
[  186.156862]  ret_from_fork+0x10/0x20
[  186.157937] 
[  186.158841] kfence-#244: 0x0000000035f50b31-0x000000002d6b6294, size=120, cache=kmalloc-128
[  186.158841] 
[  186.160798] allocated by task 242 on cpu 0 at 186.133893s:
[  186.162889]  __kmem_cache_alloc_node+0x2e4/0x330
[  186.163932]  kmalloc_trace+0x58/0x150
[  186.164938]  ksize_uaf+0x9c/0x330
[  186.166069]  kunit_try_run_case+0x8c/0x124
[  186.167224]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.168568]  kthread+0x15c/0x170
[  186.169638]  ret_from_fork+0x10/0x20
[  186.170794] 
[  186.171424] freed by task 242 on cpu 0 at 186.136007s:
[  186.173115]  ksize_uaf+0xbc/0x330
[  186.174020]  kunit_try_run_case+0x8c/0x124
[  186.175181]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.176555]  kthread+0x15c/0x170
[  186.177624]  ret_from_fork+0x10/0x20
[  186.178747] 
[  186.179373] CPU: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.181015] Hardware name: linux,dummy-virt (DT)
[  186.182085] ==================================================================

test log snippet boot parser 263

Home

[  186.145233] ==================================================================
[  186.148632] BUG: KFENCE: use-after-free read in ksize_uaf+0xe8/0x330
[  186.148632] 
[  186.150370] Use-after-free read at 0x0000000035f50b31 (in kfence-#244):
[  186.152005]  ksize_uaf+0xe8/0x330
[  186.153237]  kunit_try_run_case+0x8c/0x124
[  186.154405]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.155766]  kthread+0x15c/0x170
[  186.156862]  ret_from_fork+0x10/0x20
[  186.157937] 
[  186.158841] kfence-#244: 0x0000000035f50b31-0x000000002d6b6294, size=120, cache=kmalloc-128
[  186.158841] 
[  186.160798] allocated by task 242 on cpu 0 at 186.133893s:
[  186.162889]  __kmem_cache_alloc_node+0x2e4/0x330
[  186.163932]  kmalloc_trace+0x58/0x150
[  186.164938]  ksize_uaf+0x9c/0x330
[  186.166069]  kunit_try_run_case+0x8c/0x124
[  186.167224]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.168568]  kthread+0x15c/0x170
[  186.169638]  ret_from_fork+0x10/0x20
[  186.170794] 
[  186.171424] freed by task 242 on cpu 0 at 186.136007s:
[  186.173115]  ksize_uaf+0xbc/0x330
[  186.174020]  kunit_try_run_case+0x8c/0x124
[  186.175181]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  186.176555]  kthread+0x15c/0x170
[  186.177624]  ret_from_fork+0x10/0x20
[  186.178747] 
[  186.179373] CPU: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  186.181015] Hardware name: linux,dummy-virt (DT)
[  186.182085] ==================================================================

test log snippet boot parser 264

Home

[  207.144390] ==================================================================
[  207.145699] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x1c0/0x300
[  207.145699] 
[  207.147605] Use-after-free read at 0x000000003c0d4293 (in kfence-#23):
[  207.149231]  test_memcache_typesafe_by_rcu+0x1c0/0x300
[  207.150802]  kunit_try_run_case+0x8c/0x124
[  207.151992]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  207.153533]  kthread+0x15c/0x170
[  207.154594]  ret_from_fork+0x10/0x20
[  207.155735] 
[  207.156351] kfence-#23: 0x000000003c0d4293-0x0000000002afd06e, size=32, cache=test
[  207.156351] 
[  207.158166] allocated by task 281 on cpu 1 at 207.128287s:
[  207.159796]  test_alloc+0x1d8/0x3b0
[  207.160796]  test_memcache_typesafe_by_rcu+0x124/0x300
[  207.162228]  kunit_try_run_case+0x8c/0x124
[  207.163427]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  207.164867]  kthread+0x15c/0x170
[  207.165928]  ret_from_fork+0x10/0x20
[  207.167059] 
[  207.167686] freed by task 0 on cpu 1 at 207.142924s:
[  207.170302]  rcu_guarded_free+0x34/0x4c
[  207.171241]  rcu_core+0x400/0xea0
[  207.172340]  rcu_core_si+0x18/0x2c
[  207.173439]  handle_softirqs+0x248/0x670
[  207.174603]  __do_softirq+0x1c/0x28
[  207.175640]  ____do_softirq+0x18/0x24
[  207.176794]  call_on_irq_stack+0x24/0x54
[  207.177923]  do_softirq_own_stack+0x24/0x3c
[  207.179203]  __irq_exit_rcu+0xe8/0x140
[  207.180312]  irq_exit_rcu+0x1c/0x50
[  207.181449]  el1_interrupt+0x38/0x5c
[  207.182604]  el1h_64_irq_handler+0x18/0x24
[  207.183836]  el1h_64_irq+0x64/0x68
[  207.184887]  arch_local_irq_enable+0xc/0x20
[  207.186077]  default_idle_call+0x78/0x228
[  207.187344]  do_idle+0x31c/0x3a0
[  207.188419]  cpu_startup_entry+0x44/0x50
[  207.189647]  secondary_start_kernel+0x20c/0x250
[  207.190960]  __secondary_switched+0xb0/0xb4
[  207.192189] 
[  207.192864] CPU: 1 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  207.194636] Hardware name: linux,dummy-virt (DT)
[  207.195798] ==================================================================

test log snippet boot parser 265

Home

[   85.502753] ==================================================================
[   85.504266] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x104/0x1e0
[   85.505539] Read of size 1 at addr ffff800008777c3f by task kunit_try_catch/154
[   85.507054] 
[   85.507640] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.509367] Hardware name: linux,dummy-virt (DT)
[   85.510211] Call trace:
[   85.510788]  dump_backtrace+0x110/0x120
[   85.511657]  show_stack+0x18/0x28
[   85.512519]  dump_stack_lvl+0x68/0x84
[   85.513780]  print_report+0x158/0x4a4
[   85.514516]  kasan_report+0x98/0xe0
[   85.515200]  __asan_load1+0x68/0x78
[   85.516037]  kasan_alloca_oob_left+0x104/0x1e0
[   85.517116]  kunit_try_run_case+0x7c/0x120
[   85.518018]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.519046]  kthread+0x1a4/0x1b8
[   85.519778]  ret_from_fork+0x10/0x20
[   85.520580] 
[   85.521185] The buggy address belongs to stack of task kunit_try_catch/154
[   85.522570] 
[   85.522943] The buggy address belongs to the virtual mapping at
[   85.522943]  [ffff800008770000, ffff800008779000) created by:
[   85.522943]  kernel_clone+0xac/0x460
[   85.525115] 
[   85.525461] The buggy address belongs to the physical page:
[   85.527824] page:00000000f732aae2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599e
[   85.529522] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   85.530725] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   85.531953] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   85.533170] page dumped because: kasan: bad access detected
[   85.533989] 
[   85.534434] Memory state around the buggy address:
[   85.535298]  ffff800008777b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.536433]  ffff800008777b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.537794] >ffff800008777c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   85.538887]                                         ^
[   85.539743]  ffff800008777c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   85.540878]  ffff800008777d00: 01 f2 f2 f2 f2 f2 f2 f2 04 f2 f2 f2 f2 f2 f2 f2
[   85.542022] ==================================================================

test log snippet boot parser 266

Home

[   85.547667] ==================================================================
[   85.549171] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x110/0x1f8
[   85.550571] Read of size 1 at addr ffff800008797c4a by task kunit_try_catch/155
[   85.551929] 
[   85.552420] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.553741] Hardware name: linux,dummy-virt (DT)
[   85.554590] Call trace:
[   85.555121]  dump_backtrace+0x110/0x120
[   85.556042]  show_stack+0x18/0x28
[   85.556812]  dump_stack_lvl+0x68/0x84
[   85.557694]  print_report+0x158/0x4a4
[   85.558650]  kasan_report+0x98/0xe0
[   85.559515]  __asan_load1+0x68/0x78
[   85.560332]  kasan_alloca_oob_right+0x110/0x1f8
[   85.561891]  kunit_try_run_case+0x7c/0x120
[   85.562591]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.563740]  kthread+0x1a4/0x1b8
[   85.564352]  ret_from_fork+0x10/0x20
[   85.565579] 
[   85.565954] The buggy address belongs to stack of task kunit_try_catch/155
[   85.567161] 
[   85.567630] The buggy address belongs to the virtual mapping at
[   85.567630]  [ffff800008790000, ffff800008799000) created by:
[   85.567630]  kernel_clone+0xac/0x460
[   85.570751] 
[   85.571248] The buggy address belongs to the physical page:
[   85.571979] page:00000000109630c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a13
[   85.573874] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   85.575090] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   85.576312] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   85.577961] page dumped because: kasan: bad access detected
[   85.578971] 
[   85.579356] Memory state around the buggy address:
[   85.580187]  ffff800008797b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.581800]  ffff800008797b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.583094] >ffff800008797c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   85.584204]                                               ^
[   85.585386]  ffff800008797c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   85.586881]  ffff800008797d00: 01 f2 f2 f2 f2 f2 f2 f2 04 f2 f2 f2 f2 f2 f2 f2
[   85.588060] ==================================================================

test log snippet boot parser 267

Home

[   87.605634] ==================================================================
[   87.606662] BUG: KASAN: double-free in kfree+0x5c/0x70
[   87.607712] Free of addr ffff0000c5a95800 by task kunit_try_catch/166
[   87.608743] 
[   87.609514] CPU: 1 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.611332] Hardware name: linux,dummy-virt (DT)
[   87.612198] Call trace:
[   87.612830]  dump_backtrace+0x110/0x120
[   87.613764]  show_stack+0x18/0x28
[   87.614647]  dump_stack_lvl+0x68/0x84
[   87.615508]  print_report+0x158/0x4a4
[   87.616382]  kasan_report_invalid_free+0x84/0xa0
[   87.617436]  __kasan_slab_free+0x11c/0x158
[   87.618158]  __kmem_cache_free+0x138/0x2b0
[   87.618611]  kfree+0x5c/0x70
[   87.619454]  kfree_sensitive+0x24/0x60
[   87.620331]  kmalloc_double_kzfree+0xdc/0x1d8
[   87.621155]  kunit_try_run_case+0x7c/0x120
[   87.621591]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.622411]  kthread+0x1a4/0x1b8
[   87.623556]  ret_from_fork+0x10/0x20
[   87.624452] 
[   87.624902] Allocated by task 166:
[   87.625800]  kasan_save_stack+0x2c/0x58
[   87.626996]  kasan_set_track+0x2c/0x40
[   87.627817]  kasan_save_alloc_info+0x24/0x38
[   87.628719]  __kasan_kmalloc+0xa0/0xb8
[   87.629773]  kmalloc_trace+0x50/0x68
[   87.630610]  kmalloc_double_kzfree+0xa8/0x1d8
[   87.631537]  kunit_try_run_case+0x7c/0x120
[   87.632439]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.633641]  kthread+0x1a4/0x1b8
[   87.634862]  ret_from_fork+0x10/0x20
[   87.635721] 
[   87.636047] Freed by task 166:
[   87.636873]  kasan_save_stack+0x2c/0x58
[   87.637769]  kasan_set_track+0x2c/0x40
[   87.638590]  kasan_save_free_info+0x38/0x60
[   87.639485]  __kasan_slab_free+0xe8/0x158
[   87.640317]  __kmem_cache_free+0x138/0x2b0
[   87.641384]  kfree+0x5c/0x70
[   87.642220]  kfree_sensitive+0x4c/0x60
[   87.643012]  kmalloc_double_kzfree+0xc8/0x1d8
[   87.643664]  kunit_try_run_case+0x7c/0x120
[   87.644659]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.645946]  kthread+0x1a4/0x1b8
[   87.646764]  ret_from_fork+0x10/0x20
[   87.647617] 
[   87.648052] The buggy address belongs to the object at ffff0000c5a95800
[   87.648052]  which belongs to the cache kmalloc-128 of size 128
[   87.649770] The buggy address is located 0 bytes inside of
[   87.649770]  128-byte region [ffff0000c5a95800, ffff0000c5a95880)
[   87.652150] 
[   87.652590] The buggy address belongs to the physical page:
[   87.653615] page:00000000f566edea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a95
[   87.655072] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.656407] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.657870] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.658407] page dumped because: kasan: bad access detected
[   87.658801] 
[   87.659278] Memory state around the buggy address:
[   87.660293]  ffff0000c5a95700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.661596]  ffff0000c5a95780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.663765] >ffff0000c5a95800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.666895]                    ^
[   87.667866]  ffff0000c5a95880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.669055]  ffff0000c5a95900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.670246] ==================================================================

test log snippet boot parser 268

Home

[   85.851457] ==================================================================
[   85.853487] BUG: KASAN: double-free in kmem_cache_double_free+0xf8/0x260
[   85.854988] Free of addr ffff0000c599d000 by task kunit_try_catch/158
[   85.856520] 
[   85.857038] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.858354] Hardware name: linux,dummy-virt (DT)
[   85.859217] Call trace:
[   85.859807]  dump_backtrace+0x110/0x120
[   85.860693]  show_stack+0x18/0x28
[   85.861588]  dump_stack_lvl+0x68/0x84
[   85.862528]  print_report+0x158/0x4a4
[   85.863732]  kasan_report_invalid_free+0x84/0xa0
[   85.864701]  __kasan_slab_free+0x11c/0x158
[   85.865553]  kmem_cache_free+0x1b0/0x3a0
[   85.866454]  kmem_cache_double_free+0xf8/0x260
[   85.867374]  kunit_try_run_case+0x7c/0x120
[   85.868269]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.869350]  kthread+0x1a4/0x1b8
[   85.870457]  ret_from_fork+0x10/0x20
[   85.871488] 
[   85.872015] Allocated by task 158:
[   85.872645]  kasan_save_stack+0x2c/0x58
[   85.873551]  kasan_set_track+0x2c/0x40
[   85.874379]  kasan_save_alloc_info+0x24/0x38
[   85.875286]  __kasan_slab_alloc+0x74/0x90
[   85.876125]  slab_post_alloc_hook+0x6c/0x260
[   85.877242]  kmem_cache_alloc+0x164/0x270
[   85.878249]  kmem_cache_double_free+0xc4/0x260
[   85.879214]  kunit_try_run_case+0x7c/0x120
[   85.879907]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.881040]  kthread+0x1a4/0x1b8
[   85.881805]  ret_from_fork+0x10/0x20
[   85.882622] 
[   85.883110] Freed by task 158:
[   85.883793]  kasan_save_stack+0x2c/0x58
[   85.884609]  kasan_set_track+0x2c/0x40
[   85.885491]  kasan_save_free_info+0x38/0x60
[   85.886948]  __kasan_slab_free+0xe8/0x158
[   85.887767]  kmem_cache_free+0x1b0/0x3a0
[   85.888659]  kmem_cache_double_free+0xe0/0x260
[   85.889618]  kunit_try_run_case+0x7c/0x120
[   85.890528]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.891594]  kthread+0x1a4/0x1b8
[   85.892280]  ret_from_fork+0x10/0x20
[   85.893135] 
[   85.893533] The buggy address belongs to the object at ffff0000c599d000
[   85.893533]  which belongs to the cache test_cache of size 200
[   85.896153] The buggy address is located 0 bytes inside of
[   85.896153]  200-byte region [ffff0000c599d000, ffff0000c599d0c8)
[   85.897738] 
[   85.898361] The buggy address belongs to the physical page:
[   85.899377] page:000000004d0adae4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599d
[   85.900870] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   85.903075] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1a7a480
[   85.904317] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   85.905437] page dumped because: kasan: bad access detected
[   85.906376] 
[   85.906843] Memory state around the buggy address:
[   85.907728]  ffff0000c599cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.908937]  ffff0000c599cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.910387] >ffff0000c599d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.911441]                    ^
[   85.912236]  ffff0000c599d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   85.913487]  ffff0000c599d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.914580] ==================================================================

test log snippet boot parser 269

Home

[   85.400491] ==================================================================
[   85.402273] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xb8/0x168
[   85.403747] Read of size 1 at addr ffffa473f8152ded by task kunit_try_catch/151
[   85.404871] 
[   85.405461] CPU: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.407136] Hardware name: linux,dummy-virt (DT)
[   85.407971] Call trace:
[   85.408456]  dump_backtrace+0x110/0x120
[   85.409339]  show_stack+0x18/0x28
[   85.410238]  dump_stack_lvl+0x68/0x84
[   85.411111]  print_report+0x158/0x4a4
[   85.411972]  kasan_report+0x98/0xe0
[   85.412723]  __asan_load1+0x68/0x78
[   85.413576]  kasan_global_oob_right+0xb8/0x168
[   85.414810]  kunit_try_run_case+0x7c/0x120
[   85.415704]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.416739]  kthread+0x1a4/0x1b8
[   85.417870]  ret_from_fork+0x10/0x20
[   85.418574] 
[   85.419068] The buggy address belongs to the variable:
[   85.419841]  global_array+0xd/0x40
[   85.420698] 
[   85.421660] The buggy address belongs to the virtual mapping at
[   85.421660]  [ffffa473f6f70000, ffffa473f81d1000) created by:
[   85.421660]  paging_init+0x2a4/0x7a4
[   85.423632] 
[   85.424072] The buggy address belongs to the physical page:
[   85.425032] page:000000000d6482f8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45552
[   85.426663] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   85.428332] raw: 03fffc0000001000 fffffc0000155488 fffffc0000155488 0000000000000000
[   85.429629] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   85.430769] page dumped because: kasan: bad access detected
[   85.432014] 
[   85.432413] Memory state around the buggy address:
[   85.433643]  ffffa473f8152c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.434810]  ffffa473f8152d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.435984] >ffffa473f8152d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   85.437183]                                                           ^
[   85.438371]  ffffa473f8152e00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   85.439311]  ffffa473f8152e80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   85.440441] ==================================================================

test log snippet boot parser 270

Home

[   83.108781] ==================================================================
[   83.110838] BUG: KASAN: invalid-free in kfree+0x6c/0x70
[   83.111933] Free of addr ffff0000c59f0001 by task kunit_try_catch/124
[   83.113014] 
[   83.113700] CPU: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.115076] Hardware name: linux,dummy-virt (DT)
[   83.115905] Call trace:
[   83.116452]  dump_backtrace+0x110/0x120
[   83.117451]  show_stack+0x18/0x28
[   83.118291]  dump_stack_lvl+0x68/0x84
[   83.119136]  print_report+0x158/0x4a4
[   83.119996]  kasan_report_invalid_free+0x84/0xa0
[   83.120950]  __kasan_kfree_large+0x54/0xa0
[   83.121794]  free_large_kmalloc+0x58/0xe8
[   83.122693]  kfree+0x6c/0x70
[   83.123427]  kmalloc_pagealloc_invalid_free+0xc0/0x1c0
[   83.124431]  kunit_try_run_case+0x7c/0x120
[   83.125492]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.126302]  kthread+0x1a4/0x1b8
[   83.127952]  ret_from_fork+0x10/0x20
[   83.130218] 
[   83.130568] The buggy address belongs to the physical page:
[   83.131465] page:000000001dfd240b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[   83.132844] head:000000001dfd240b order:2 compound_mapcount:0 compound_pincount:0
[   83.133956] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.135213] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.136443] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.137837] page dumped because: kasan: bad access detected
[   83.138590] 
[   83.139284] Memory state around the buggy address:
[   83.140256]  ffff0000c59eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.141541]  ffff0000c59eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.142594] >ffff0000c59f0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.143617]                    ^
[   83.144313]  ffff0000c59f0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.145569]  ffff0000c59f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.146672] ==================================================================

test log snippet boot parser 271

Home

[   85.931130] ==================================================================
[   85.932598] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xf0/0x250
[   85.934084] Free of addr ffff0000c5a6a001 by task kunit_try_catch/159
[   85.935251] 
[   85.935747] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.936971] Hardware name: linux,dummy-virt (DT)
[   85.937830] Call trace:
[   85.938324]  dump_backtrace+0x110/0x120
[   85.939282]  show_stack+0x18/0x28
[   85.940007]  dump_stack_lvl+0x68/0x84
[   85.940892]  print_report+0x158/0x4a4
[   85.941751]  kasan_report_invalid_free+0x84/0xa0
[   85.942823]  __kasan_slab_free+0x144/0x158
[   85.943604]  kmem_cache_free+0x1b0/0x3a0
[   85.944531]  kmem_cache_invalid_free+0xf0/0x250
[   85.945728]  kunit_try_run_case+0x7c/0x120
[   85.946630]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.947602]  kthread+0x1a4/0x1b8
[   85.948372]  ret_from_fork+0x10/0x20
[   85.949233] 
[   85.949615] Allocated by task 159:
[   85.950342]  kasan_save_stack+0x2c/0x58
[   85.951511]  kasan_set_track+0x2c/0x40
[   85.952343]  kasan_save_alloc_info+0x24/0x38
[   85.953232]  __kasan_slab_alloc+0x74/0x90
[   85.954127]  slab_post_alloc_hook+0x6c/0x260
[   85.955169]  kmem_cache_alloc+0x164/0x270
[   85.956054]  kmem_cache_invalid_free+0xc8/0x250
[   85.957147]  kunit_try_run_case+0x7c/0x120
[   85.958055]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.959082]  kthread+0x1a4/0x1b8
[   85.959809]  ret_from_fork+0x10/0x20
[   85.960610] 
[   85.961171] The buggy address belongs to the object at ffff0000c5a6a000
[   85.961171]  which belongs to the cache test_cache of size 200
[   85.962999] The buggy address is located 1 bytes inside of
[   85.962999]  200-byte region [ffff0000c5a6a000, ffff0000c5a6a0c8)
[   85.964397] 
[   85.964878] The buggy address belongs to the physical page:
[   85.966066] page:000000007e05435c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a6a
[   85.967601] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   85.968923] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1485800
[   85.970286] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   85.971355] page dumped because: kasan: bad access detected
[   85.972212] 
[   85.972749] Memory state around the buggy address:
[   85.973910]  ffff0000c5a69f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.975140]  ffff0000c5a69f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.976302] >ffff0000c5a6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.977371]                    ^
[   85.978086]  ffff0000c5a6a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   85.979575]  ffff0000c5a6a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.980681] ==================================================================

test log snippet boot parser 272

Home

[   84.435734] ==================================================================
[   84.437526] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xf0/0x1f8
[   84.438756] Read of size 18446744073709551614 at addr ffff0000c59a0f04 by task kunit_try_catch/140
[   84.440233] 
[   84.440737] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.442167] Hardware name: linux,dummy-virt (DT)
[   84.443221] Call trace:
[   84.443810]  dump_backtrace+0x110/0x120
[   84.444628]  show_stack+0x18/0x28
[   84.445460]  dump_stack_lvl+0x68/0x84
[   84.446387]  print_report+0x158/0x4a4
[   84.447225]  kasan_report+0x98/0xe0
[   84.448018]  kasan_check_range+0x160/0x1d8
[   84.448912]  memmove+0x44/0xb0
[   84.449757]  kmalloc_memmove_negative_size+0xf0/0x1f8
[   84.450841]  kunit_try_run_case+0x7c/0x120
[   84.451721]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.452743]  kthread+0x1a4/0x1b8
[   84.453734]  ret_from_fork+0x10/0x20
[   84.454543] 
[   84.455019] Allocated by task 140:
[   84.455709]  kasan_save_stack+0x2c/0x58
[   84.456529]  kasan_set_track+0x2c/0x40
[   84.457413]  kasan_save_alloc_info+0x24/0x38
[   84.458300]  __kasan_kmalloc+0xa0/0xb8
[   84.459843]  kmalloc_trace+0x50/0x68
[   84.460649]  kmalloc_memmove_negative_size+0xa8/0x1f8
[   84.461843]  kunit_try_run_case+0x7c/0x120
[   84.462790]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.463749]  kthread+0x1a4/0x1b8
[   84.464573]  ret_from_fork+0x10/0x20
[   84.465468] 
[   84.466014] The buggy address belongs to the object at ffff0000c59a0f00
[   84.466014]  which belongs to the cache kmalloc-128 of size 128
[   84.467658] The buggy address is located 4 bytes inside of
[   84.467658]  128-byte region [ffff0000c59a0f00, ffff0000c59a0f80)
[   84.469209] 
[   84.469647] The buggy address belongs to the physical page:
[   84.470528] page:0000000031c2c49d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[   84.472113] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.473354] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.474881] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.475913] page dumped because: kasan: bad access detected
[   84.476903] 
[   84.477590] Memory state around the buggy address:
[   84.478296]  ffff0000c59a0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.479907]  ffff0000c59a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.481152] >ffff0000c59a0f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   84.482243]                    ^
[   84.483037]  ffff0000c59a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.484204]  ffff0000c59a1000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   84.485527] ==================================================================

test log snippet boot parser 273

Home

[   86.699525] ==================================================================
[   86.700327] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x14c/0x6a8
[   86.701926] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.703125] 
[   86.703590] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.704970] Hardware name: linux,dummy-virt (DT)
[   86.705757] Call trace:
[   86.706262]  dump_backtrace+0x110/0x120
[   86.707248]  show_stack+0x18/0x28
[   86.708077]  dump_stack_lvl+0x68/0x84
[   86.708919]  print_report+0x158/0x4a4
[   86.709748]  kasan_report+0x98/0xe0
[   86.711156]  __asan_load8+0x88/0xb0
[   86.711888]  kasan_bitops_modify.constprop.5+0x14c/0x6a8
[   86.712931]  kasan_bitops_generic+0xac/0x128
[   86.713834]  kunit_try_run_case+0x7c/0x120
[   86.714694]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.715740]  kthread+0x1a4/0x1b8
[   86.716500]  ret_from_fork+0x10/0x20
[   86.717361] 
[   86.717779] Allocated by task 164:
[   86.718444]  kasan_save_stack+0x2c/0x58
[   86.719964]  kasan_set_track+0x2c/0x40
[   86.720758]  kasan_save_alloc_info+0x24/0x38
[   86.721654]  __kasan_kmalloc+0xa0/0xb8
[   86.722437]  kmalloc_trace+0x50/0x68
[   86.723236]  kasan_bitops_generic+0x90/0x128
[   86.724156]  kunit_try_run_case+0x7c/0x120
[   86.725034]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.726074]  kthread+0x1a4/0x1b8
[   86.726940]  ret_from_fork+0x10/0x20
[   86.727354] 
[   86.727547] The buggy address belongs to the object at ffff0000c5a19800
[   86.727547]  which belongs to the cache kmalloc-128 of size 128
[   86.728839] The buggy address is located 8 bytes inside of
[   86.728839]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.731148] 
[   86.731603] The buggy address belongs to the physical page:
[   86.732504] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.734089] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.735463] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.736664] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.737810] page dumped because: kasan: bad access detected
[   86.738703] 
[   86.739129] Memory state around the buggy address:
[   86.740034]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.741216]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.742398] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.743491]                       ^
[   86.744221]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.745376]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.746563] ==================================================================
---
[   86.602264] ==================================================================
[   86.603326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0xe4/0x6a8
[   86.604636] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.605799] 
[   86.606288] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.607600] Hardware name: linux,dummy-virt (DT)
[   86.608401] Call trace:
[   86.608989]  dump_backtrace+0x110/0x120
[   86.609805]  show_stack+0x18/0x28
[   86.610691]  dump_stack_lvl+0x68/0x84
[   86.611634]  print_report+0x158/0x4a4
[   86.612528]  kasan_report+0x98/0xe0
[   86.613315]  __asan_load8+0x88/0xb0
[   86.614128]  kasan_bitops_modify.constprop.5+0xe4/0x6a8
[   86.615174]  kasan_bitops_generic+0xac/0x128
[   86.616086]  kunit_try_run_case+0x7c/0x120
[   86.616980]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.618001]  kthread+0x1a4/0x1b8
[   86.618742]  ret_from_fork+0x10/0x20
[   86.619545] 
[   86.619965] Allocated by task 164:
[   86.620602]  kasan_save_stack+0x2c/0x58
[   86.621439]  kasan_set_track+0x2c/0x40
[   86.622237]  kasan_save_alloc_info+0x24/0x38
[   86.623132]  __kasan_kmalloc+0xa0/0xb8
[   86.623931]  kmalloc_trace+0x50/0x68
[   86.624696]  kasan_bitops_generic+0x90/0x128
[   86.625609]  kunit_try_run_case+0x7c/0x120
[   86.626479]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.627516]  kthread+0x1a4/0x1b8
[   86.628276]  ret_from_fork+0x10/0x20
[   86.629090] 
[   86.629494] The buggy address belongs to the object at ffff0000c5a19800
[   86.629494]  which belongs to the cache kmalloc-128 of size 128
[   86.631152] The buggy address is located 8 bytes inside of
[   86.631152]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.632759] 
[   86.633242] The buggy address belongs to the physical page:
[   86.634111] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.635516] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.636754] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.637987] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.639111] page dumped because: kasan: bad access detected
[   86.640004] 
[   86.640405] Memory state around the buggy address:
[   86.641250]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.642413]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.643547] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.644622]                       ^
[   86.645379]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.646518]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.647612] ==================================================================
---
[   86.851679] ==================================================================
[   86.852717] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1c0/0x6a8
[   86.854426] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.855650] 
[   86.856155] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.857589] Hardware name: linux,dummy-virt (DT)
[   86.858424] Call trace:
[   86.859147]  dump_backtrace+0x110/0x120
[   86.860060]  show_stack+0x18/0x28
[   86.860884]  dump_stack_lvl+0x68/0x84
[   86.861806]  print_report+0x158/0x4a4
[   86.862742]  kasan_report+0x98/0xe0
[   86.863544]  __asan_load8+0x88/0xb0
[   86.864346]  kasan_bitops_modify.constprop.5+0x1c0/0x6a8
[   86.865386]  kasan_bitops_generic+0xac/0x128
[   86.866374]  kunit_try_run_case+0x7c/0x120
[   86.867271]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.868340]  kthread+0x1a4/0x1b8
[   86.869312]  ret_from_fork+0x10/0x20
[   86.870208] 
[   86.870674] Allocated by task 164:
[   86.871393]  kasan_save_stack+0x2c/0x58
[   86.872219]  kasan_set_track+0x2c/0x40
[   86.873267]  kasan_save_alloc_info+0x24/0x38
[   86.874074]  __kasan_kmalloc+0xa0/0xb8
[   86.875225]  kmalloc_trace+0x50/0x68
[   86.875650]  kasan_bitops_generic+0x90/0x128
[   86.876902]  kunit_try_run_case+0x7c/0x120
[   86.877710]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.878565]  kthread+0x1a4/0x1b8
[   86.879101]  ret_from_fork+0x10/0x20
[   86.880046] 
[   86.880528] The buggy address belongs to the object at ffff0000c5a19800
[   86.880528]  which belongs to the cache kmalloc-128 of size 128
[   86.882392] The buggy address is located 8 bytes inside of
[   86.882392]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.884031] 
[   86.885010] The buggy address belongs to the physical page:
[   86.885926] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.887503] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.888892] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.890371] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.891756] page dumped because: kasan: bad access detected
[   86.892710] 
[   86.893204] Memory state around the buggy address:
[   86.894189]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.895334]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.896581] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.898209]                       ^
[   86.898909]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.900169]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.901245] ==================================================================
---
[   87.002827] ==================================================================
[   87.003811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x238/0x6a8
[   87.005363] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.006571] 
[   87.007041] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.008367] Hardware name: linux,dummy-virt (DT)
[   87.009177] Call trace:
[   87.009706]  dump_backtrace+0x110/0x120
[   87.010603]  show_stack+0x18/0x28
[   87.011416]  dump_stack_lvl+0x68/0x84
[   87.012246]  print_report+0x158/0x4a4
[   87.013115]  kasan_report+0x98/0xe0
[   87.013903]  __asan_load8+0x88/0xb0
[   87.014694]  kasan_bitops_modify.constprop.5+0x238/0x6a8
[   87.015729]  kasan_bitops_generic+0xac/0x128
[   87.016647]  kunit_try_run_case+0x7c/0x120
[   87.017542]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.018575]  kthread+0x1a4/0x1b8
[   87.019339]  ret_from_fork+0x10/0x20
[   87.020140] 
[   87.020543] Allocated by task 164:
[   87.021263]  kasan_save_stack+0x2c/0x58
[   87.022087]  kasan_set_track+0x2c/0x40
[   87.022889]  kasan_save_alloc_info+0x24/0x38
[   87.023771]  __kasan_kmalloc+0xa0/0xb8
[   87.024570]  kmalloc_trace+0x50/0x68
[   87.025386]  kasan_bitops_generic+0x90/0x128
[   87.026290]  kunit_try_run_case+0x7c/0x120
[   87.027206]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.028254]  kthread+0x1a4/0x1b8
[   87.029013]  ret_from_fork+0x10/0x20
[   87.029784] 
[   87.030199] The buggy address belongs to the object at ffff0000c5a19800
[   87.030199]  which belongs to the cache kmalloc-128 of size 128
[   87.031898] The buggy address is located 8 bytes inside of
[   87.031898]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.033503] 
[   87.033968] The buggy address belongs to the physical page:
[   87.034884] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.036269] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.037508] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.038734] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.039886] page dumped because: kasan: bad access detected
[   87.040770] 
[   87.041195] Memory state around the buggy address:
[   87.042023]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.043196]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.044326] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.045411]                       ^
[   87.046102]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.047238]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.048315] ==================================================================

test log snippet boot parser 274

Home

[   86.954025] ==================================================================
[   86.955271] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x204/0x6a8
[   86.956729] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.958020] 
[   86.958455] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.959889] Hardware name: linux,dummy-virt (DT)
[   86.960755] Call trace:
[   86.961352]  dump_backtrace+0x110/0x120
[   86.962249]  show_stack+0x18/0x28
[   86.963083]  dump_stack_lvl+0x68/0x84
[   86.963924]  print_report+0x158/0x4a4
[   86.964772]  kasan_report+0x98/0xe0
[   86.965582]  kasan_check_range+0x160/0x1d8
[   86.966468]  __kasan_check_write+0x28/0x38
[   86.967371]  kasan_bitops_modify.constprop.5+0x204/0x6a8
[   86.968399]  kasan_bitops_generic+0xac/0x128
[   86.969355]  kunit_try_run_case+0x7c/0x120
[   86.970241]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.971275]  kthread+0x1a4/0x1b8
[   86.972041]  ret_from_fork+0x10/0x20
[   86.972864] 
[   86.973275] Allocated by task 164:
[   86.973971]  kasan_save_stack+0x2c/0x58
[   86.974813]  kasan_set_track+0x2c/0x40
[   86.975621]  kasan_save_alloc_info+0x24/0x38
[   86.976489]  __kasan_kmalloc+0xa0/0xb8
[   86.977300]  kmalloc_trace+0x50/0x68
[   86.978106]  kasan_bitops_generic+0x90/0x128
[   86.979024]  kunit_try_run_case+0x7c/0x120
[   86.979949]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.981038]  kthread+0x1a4/0x1b8
[   86.981772]  ret_from_fork+0x10/0x20
[   86.982576] 
[   86.982966] The buggy address belongs to the object at ffff0000c5a19800
[   86.982966]  which belongs to the cache kmalloc-128 of size 128
[   86.984642] The buggy address is located 8 bytes inside of
[   86.984642]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.986312] 
[   86.986760] The buggy address belongs to the physical page:
[   86.987658] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.989054] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.990310] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.991546] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.992677] page dumped because: kasan: bad access detected
[   86.993579] 
[   86.993974] Memory state around the buggy address:
[   86.994814]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.996014]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.997149] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.998215]                       ^
[   86.998902]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.000037]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.001122] ==================================================================
---
[   86.552239] ==================================================================
[   86.553725] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0xb4/0x6a8
[   86.555241] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.556654] 
[   86.557237] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.558545] Hardware name: linux,dummy-virt (DT)
[   86.559369] Call trace:
[   86.559908]  dump_backtrace+0x110/0x120
[   86.560771]  show_stack+0x18/0x28
[   86.561594]  dump_stack_lvl+0x68/0x84
[   86.562425]  print_report+0x158/0x4a4
[   86.563268]  kasan_report+0x98/0xe0
[   86.564056]  kasan_check_range+0x160/0x1d8
[   86.564932]  __kasan_check_write+0x28/0x38
[   86.565795]  kasan_bitops_modify.constprop.5+0xb4/0x6a8
[   86.566797]  kasan_bitops_generic+0xac/0x128
[   86.567704]  kunit_try_run_case+0x7c/0x120
[   86.568572]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.569620]  kthread+0x1a4/0x1b8
[   86.570391]  ret_from_fork+0x10/0x20
[   86.571183] 
[   86.571595] Allocated by task 164:
[   86.572210]  kasan_save_stack+0x2c/0x58
[   86.573083]  kasan_set_track+0x2c/0x40
[   86.573873]  kasan_save_alloc_info+0x24/0x38
[   86.574744]  __kasan_kmalloc+0xa0/0xb8
[   86.575542]  kmalloc_trace+0x50/0x68
[   86.576336]  kasan_bitops_generic+0x90/0x128
[   86.577251]  kunit_try_run_case+0x7c/0x120
[   86.578125]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.579164]  kthread+0x1a4/0x1b8
[   86.579903]  ret_from_fork+0x10/0x20
[   86.580702] 
[   86.581113] The buggy address belongs to the object at ffff0000c5a19800
[   86.581113]  which belongs to the cache kmalloc-128 of size 128
[   86.582775] The buggy address is located 8 bytes inside of
[   86.582775]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.584437] 
[   86.584887] The buggy address belongs to the physical page:
[   86.585763] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.587184] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.588431] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.589645] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.590777] page dumped because: kasan: bad access detected
[   86.591683] 
[   86.592096] Memory state around the buggy address:
[   86.592959]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.594127]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.595276] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.596363]                       ^
[   86.597081]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.598227]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.599319] ==================================================================
---
[   86.800422] ==================================================================
[   86.801466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1b8/0x6a8
[   86.802660] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.804265] 
[   86.804843] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.806261] Hardware name: linux,dummy-virt (DT)
[   86.807110] Call trace:
[   86.808044]  dump_backtrace+0x110/0x120
[   86.809101]  show_stack+0x18/0x28
[   86.809960]  dump_stack_lvl+0x68/0x84
[   86.810829]  print_report+0x158/0x4a4
[   86.811600]  kasan_report+0x98/0xe0
[   86.812435]  kasan_check_range+0x160/0x1d8
[   86.813340]  __kasan_check_write+0x28/0x38
[   86.814222]  kasan_bitops_modify.constprop.5+0x1b8/0x6a8
[   86.815173]  kasan_bitops_generic+0xac/0x128
[   86.816480]  kunit_try_run_case+0x7c/0x120
[   86.817467]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.818563]  kthread+0x1a4/0x1b8
[   86.819345]  ret_from_fork+0x10/0x20
[   86.820183] 
[   86.820646] Allocated by task 164:
[   86.821419]  kasan_save_stack+0x2c/0x58
[   86.822671]  kasan_set_track+0x2c/0x40
[   86.823467]  kasan_save_alloc_info+0x24/0x38
[   86.824375]  __kasan_kmalloc+0xa0/0xb8
[   86.825162]  kmalloc_trace+0x50/0x68
[   86.825943]  kasan_bitops_generic+0x90/0x128
[   86.826813]  kunit_try_run_case+0x7c/0x120
[   86.827701]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.828721]  kthread+0x1a4/0x1b8
[   86.829522]  ret_from_fork+0x10/0x20
[   86.830388] 
[   86.830813] The buggy address belongs to the object at ffff0000c5a19800
[   86.830813]  which belongs to the cache kmalloc-128 of size 128
[   86.832484] The buggy address is located 8 bytes inside of
[   86.832484]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.834366] 
[   86.834798] The buggy address belongs to the physical page:
[   86.835805] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.837216] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.838438] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.839832] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.841026] page dumped because: kasan: bad access detected
[   86.841950] 
[   86.842400] Memory state around the buggy address:
[   86.843290]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.844423]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.845625] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.846709]                       ^
[   86.847457]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.848551]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.849803] ==================================================================
---
[   86.651007] ==================================================================
[   86.651978] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x118/0x6a8
[   86.653333] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.654505] 
[   86.655043] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.656410] Hardware name: linux,dummy-virt (DT)
[   86.657270] Call trace:
[   86.657815]  dump_backtrace+0x110/0x120
[   86.658721]  show_stack+0x18/0x28
[   86.659528]  dump_stack_lvl+0x68/0x84
[   86.660414]  print_report+0x158/0x4a4
[   86.661170]  kasan_report+0x98/0xe0
[   86.661906]  kasan_check_range+0x160/0x1d8
[   86.662767]  __kasan_check_write+0x28/0x38
[   86.663502]  kasan_bitops_modify.constprop.5+0x118/0x6a8
[   86.664516]  kasan_bitops_generic+0xac/0x128
[   86.665537]  kunit_try_run_case+0x7c/0x120
[   86.666432]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.667613]  kthread+0x1a4/0x1b8
[   86.668462]  ret_from_fork+0x10/0x20
[   86.669337] 
[   86.669773] Allocated by task 164:
[   86.670431]  kasan_save_stack+0x2c/0x58
[   86.671306]  kasan_set_track+0x2c/0x40
[   86.672135]  kasan_save_alloc_info+0x24/0x38
[   86.673036]  __kasan_kmalloc+0xa0/0xb8
[   86.673837]  kmalloc_trace+0x50/0x68
[   86.674647]  kasan_bitops_generic+0x90/0x128
[   86.675554]  kunit_try_run_case+0x7c/0x120
[   86.676435]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.677491]  kthread+0x1a4/0x1b8
[   86.678241]  ret_from_fork+0x10/0x20
[   86.679033] 
[   86.679444] The buggy address belongs to the object at ffff0000c5a19800
[   86.679444]  which belongs to the cache kmalloc-128 of size 128
[   86.681143] The buggy address is located 8 bytes inside of
[   86.681143]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.682756] 
[   86.683216] The buggy address belongs to the physical page:
[   86.684146] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.685519] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.686751] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.687993] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.689138] page dumped because: kasan: bad access detected
[   86.690022] 
[   86.690410] Memory state around the buggy address:
[   86.691225]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.692394]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.693539] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.694626]                       ^
[   86.695314]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.696479]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.697571] ==================================================================
---
[   86.748448] ==================================================================
[   86.749774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x180/0x6a8
[   86.751756] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.753366] 
[   86.753842] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.755154] Hardware name: linux,dummy-virt (DT)
[   86.755982] Call trace:
[   86.756564]  dump_backtrace+0x110/0x120
[   86.757971]  show_stack+0x18/0x28
[   86.758704]  dump_stack_lvl+0x68/0x84
[   86.759546]  print_report+0x158/0x4a4
[   86.760424]  kasan_report+0x98/0xe0
[   86.761236]  kasan_check_range+0x160/0x1d8
[   86.762109]  __kasan_check_write+0x28/0x38
[   86.762966]  kasan_bitops_modify.constprop.5+0x180/0x6a8
[   86.764009]  kasan_bitops_generic+0xac/0x128
[   86.764915]  kunit_try_run_case+0x7c/0x120
[   86.765815]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.766930]  kthread+0x1a4/0x1b8
[   86.767645]  ret_from_fork+0x10/0x20
[   86.768517] 
[   86.768989] Allocated by task 164:
[   86.769578]  kasan_save_stack+0x2c/0x58
[   86.770406]  kasan_set_track+0x2c/0x40
[   86.771197]  kasan_save_alloc_info+0x24/0x38
[   86.772092]  __kasan_kmalloc+0xa0/0xb8
[   86.772903]  kmalloc_trace+0x50/0x68
[   86.773605]  kasan_bitops_generic+0x90/0x128
[   86.774685]  kunit_try_run_case+0x7c/0x120
[   86.775501]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.776194]  kthread+0x1a4/0x1b8
[   86.776964]  ret_from_fork+0x10/0x20
[   86.777725] 
[   86.778146] The buggy address belongs to the object at ffff0000c5a19800
[   86.778146]  which belongs to the cache kmalloc-128 of size 128
[   86.779774] The buggy address is located 8 bytes inside of
[   86.779774]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.781456] 
[   86.781914] The buggy address belongs to the physical page:
[   86.782738] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.784701] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.785981] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.787169] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.788309] page dumped because: kasan: bad access detected
[   86.789209] 
[   86.789634] Memory state around the buggy address:
[   86.790806]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.792422]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.793655] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.794753]                       ^
[   86.795479]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.796696]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.797802] ==================================================================
---
[   86.903389] ==================================================================
[   86.904385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1d0/0x6a8
[   86.906364] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   86.907987] 
[   86.908521] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.910000] Hardware name: linux,dummy-virt (DT)
[   86.910830] Call trace:
[   86.911395]  dump_backtrace+0x110/0x120
[   86.912294]  show_stack+0x18/0x28
[   86.913137]  dump_stack_lvl+0x68/0x84
[   86.913978]  print_report+0x158/0x4a4
[   86.914832]  kasan_report+0x98/0xe0
[   86.915633]  kasan_check_range+0x160/0x1d8
[   86.916419]  __kasan_check_write+0x28/0x38
[   86.917269]  kasan_bitops_modify.constprop.5+0x1d0/0x6a8
[   86.918824]  kasan_bitops_generic+0xac/0x128
[   86.919969]  kunit_try_run_case+0x7c/0x120
[   86.920946]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.922011]  kthread+0x1a4/0x1b8
[   86.922686]  ret_from_fork+0x10/0x20
[   86.923546] 
[   86.923980] Allocated by task 164:
[   86.924640]  kasan_save_stack+0x2c/0x58
[   86.925538]  kasan_set_track+0x2c/0x40
[   86.926392]  kasan_save_alloc_info+0x24/0x38
[   86.927298]  __kasan_kmalloc+0xa0/0xb8
[   86.928113]  kmalloc_trace+0x50/0x68
[   86.928931]  kasan_bitops_generic+0x90/0x128
[   86.929844]  kunit_try_run_case+0x7c/0x120
[   86.930726]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.931768]  kthread+0x1a4/0x1b8
[   86.932517]  ret_from_fork+0x10/0x20
[   86.933315] 
[   86.933720] The buggy address belongs to the object at ffff0000c5a19800
[   86.933720]  which belongs to the cache kmalloc-128 of size 128
[   86.935404] The buggy address is located 8 bytes inside of
[   86.935404]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   86.937009] 
[   86.937447] The buggy address belongs to the physical page:
[   86.938316] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.939733] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.941014] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.942238] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.943378] page dumped because: kasan: bad access detected
[   86.944263] 
[   86.944646] Memory state around the buggy address:
[   86.945474]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.946652]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.947793] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.948907]                       ^
[   86.949599]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.950743]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.951832] ==================================================================

test log snippet boot parser 275

Home

[   87.243283] ==================================================================
[   87.244175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x15c/0x780
[   87.245655] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.246775] 
[   87.247254] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.248568] Hardware name: linux,dummy-virt (DT)
[   87.249332] Call trace:
[   87.249928]  dump_backtrace+0x110/0x120
[   87.250876]  show_stack+0x18/0x28
[   87.251715]  dump_stack_lvl+0x68/0x84
[   87.252554]  print_report+0x158/0x4a4
[   87.253416]  kasan_report+0x98/0xe0
[   87.254214]  kasan_check_range+0x160/0x1d8
[   87.255084]  __kasan_check_write+0x28/0x38
[   87.255970]  kasan_bitops_test_and_modify.constprop.4+0x15c/0x780
[   87.257111]  kasan_bitops_generic+0xb8/0x128
[   87.258026]  kunit_try_run_case+0x7c/0x120
[   87.258910]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.259938]  kthread+0x1a4/0x1b8
[   87.260699]  ret_from_fork+0x10/0x20
[   87.261524] 
[   87.261946] Allocated by task 164:
[   87.262586]  kasan_save_stack+0x2c/0x58
[   87.263455]  kasan_set_track+0x2c/0x40
[   87.264246]  kasan_save_alloc_info+0x24/0x38
[   87.265140]  __kasan_kmalloc+0xa0/0xb8
[   87.265927]  kmalloc_trace+0x50/0x68
[   87.266710]  kasan_bitops_generic+0x90/0x128
[   87.267624]  kunit_try_run_case+0x7c/0x120
[   87.268506]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.269580]  kthread+0x1a4/0x1b8
[   87.270320]  ret_from_fork+0x10/0x20
[   87.271124] 
[   87.271532] The buggy address belongs to the object at ffff0000c5a19800
[   87.271532]  which belongs to the cache kmalloc-128 of size 128
[   87.273182] The buggy address is located 8 bytes inside of
[   87.273182]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.274801] 
[   87.275265] The buggy address belongs to the physical page:
[   87.276156] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.277555] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.278811] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.280104] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.281275] page dumped because: kasan: bad access detected
[   87.282148] 
[   87.282540] Memory state around the buggy address:
[   87.283554]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.284755]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.285967] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.287067]                       ^
[   87.287748]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.288941]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.290020] ==================================================================
---
[   87.146594] ==================================================================
[   87.147663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x114/0x780
[   87.149152] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.150301] 
[   87.150776] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.152146] Hardware name: linux,dummy-virt (DT)
[   87.152958] Call trace:
[   87.153502]  dump_backtrace+0x110/0x120
[   87.154374]  show_stack+0x18/0x28
[   87.155196]  dump_stack_lvl+0x68/0x84
[   87.156034]  print_report+0x158/0x4a4
[   87.156903]  kasan_report+0x98/0xe0
[   87.157682]  kasan_check_range+0x160/0x1d8
[   87.159167]  __kasan_check_write+0x28/0x38
[   87.159908]  kasan_bitops_test_and_modify.constprop.4+0x114/0x780
[   87.160886]  kasan_bitops_generic+0xb8/0x128
[   87.161730]  kunit_try_run_case+0x7c/0x120
[   87.162699]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.163798]  kthread+0x1a4/0x1b8
[   87.164425]  ret_from_fork+0x10/0x20
[   87.165111] 
[   87.165498] Allocated by task 164:
[   87.166233]  kasan_save_stack+0x2c/0x58
[   87.167096]  kasan_set_track+0x2c/0x40
[   87.167919]  kasan_save_alloc_info+0x24/0x38
[   87.168633]  __kasan_kmalloc+0xa0/0xb8
[   87.169321]  kmalloc_trace+0x50/0x68
[   87.170188]  kasan_bitops_generic+0x90/0x128
[   87.171015]  kunit_try_run_case+0x7c/0x120
[   87.171965]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.173141]  kthread+0x1a4/0x1b8
[   87.173919]  ret_from_fork+0x10/0x20
[   87.174559] 
[   87.174918] The buggy address belongs to the object at ffff0000c5a19800
[   87.174918]  which belongs to the cache kmalloc-128 of size 128
[   87.176173] The buggy address is located 8 bytes inside of
[   87.176173]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.177705] 
[   87.178170] The buggy address belongs to the physical page:
[   87.179159] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.180658] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.181742] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.184000] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.185165] page dumped because: kasan: bad access detected
[   87.186154] 
[   87.186601] Memory state around the buggy address:
[   87.187519]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.188807]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.189971] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.191040]                       ^
[   87.191731]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.192874]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.193953] ==================================================================
---
[   87.484385] ==================================================================
[   87.485369] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x25c/0x780
[   87.487039] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.488194] 
[   87.488642] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.490026] Hardware name: linux,dummy-virt (DT)
[   87.490841] Call trace:
[   87.491403]  dump_backtrace+0x110/0x120
[   87.492295]  show_stack+0x18/0x28
[   87.493129]  dump_stack_lvl+0x68/0x84
[   87.493959]  print_report+0x158/0x4a4
[   87.494793]  kasan_report+0x98/0xe0
[   87.495589]  kasan_check_range+0x160/0x1d8
[   87.496461]  __kasan_check_write+0x28/0x38
[   87.497364]  kasan_bitops_test_and_modify.constprop.4+0x25c/0x780
[   87.498490]  kasan_bitops_generic+0xb8/0x128
[   87.499421]  kunit_try_run_case+0x7c/0x120
[   87.500320]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.501366]  kthread+0x1a4/0x1b8
[   87.502138]  ret_from_fork+0x10/0x20
[   87.502961] 
[   87.503396] Allocated by task 164:
[   87.504057]  kasan_save_stack+0x2c/0x58
[   87.504897]  kasan_set_track+0x2c/0x40
[   87.505687]  kasan_save_alloc_info+0x24/0x38
[   87.506603]  __kasan_kmalloc+0xa0/0xb8
[   87.507410]  kmalloc_trace+0x50/0x68
[   87.508217]  kasan_bitops_generic+0x90/0x128
[   87.509149]  kunit_try_run_case+0x7c/0x120
[   87.510018]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.511058]  kthread+0x1a4/0x1b8
[   87.511805]  ret_from_fork+0x10/0x20
[   87.512631] 
[   87.513078] The buggy address belongs to the object at ffff0000c5a19800
[   87.513078]  which belongs to the cache kmalloc-128 of size 128
[   87.514755] The buggy address is located 8 bytes inside of
[   87.514755]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.516353] 
[   87.516823] The buggy address belongs to the physical page:
[   87.517725] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.519132] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.520365] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.521582] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.522698] page dumped because: kasan: bad access detected
[   87.523590] 
[   87.524023] Memory state around the buggy address:
[   87.524885]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.526030]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.527169] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.528256]                       ^
[   87.528987]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.530122]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.531221] ==================================================================
---
[   87.339489] ==================================================================
[   87.340374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x1c4/0x780
[   87.341958] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.343085] 
[   87.343567] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.344932] Hardware name: linux,dummy-virt (DT)
[   87.345772] Call trace:
[   87.346316]  dump_backtrace+0x110/0x120
[   87.347224]  show_stack+0x18/0x28
[   87.348042]  dump_stack_lvl+0x68/0x84
[   87.348892]  print_report+0x158/0x4a4
[   87.349731]  kasan_report+0x98/0xe0
[   87.350537]  kasan_check_range+0x160/0x1d8
[   87.351423]  __kasan_check_write+0x28/0x38
[   87.352307]  kasan_bitops_test_and_modify.constprop.4+0x1c4/0x780
[   87.353451]  kasan_bitops_generic+0xb8/0x128
[   87.354382]  kunit_try_run_case+0x7c/0x120
[   87.355274]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.356323]  kthread+0x1a4/0x1b8
[   87.357111]  ret_from_fork+0x10/0x20
[   87.357933] 
[   87.358356] Allocated by task 164:
[   87.359065]  kasan_save_stack+0x2c/0x58
[   87.359904]  kasan_set_track+0x2c/0x40
[   87.360706]  kasan_save_alloc_info+0x24/0x38
[   87.361611]  __kasan_kmalloc+0xa0/0xb8
[   87.362420]  kmalloc_trace+0x50/0x68
[   87.363238]  kasan_bitops_generic+0x90/0x128
[   87.364146]  kunit_try_run_case+0x7c/0x120
[   87.365036]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.366078]  kthread+0x1a4/0x1b8
[   87.366822]  ret_from_fork+0x10/0x20
[   87.367624] 
[   87.368073] The buggy address belongs to the object at ffff0000c5a19800
[   87.368073]  which belongs to the cache kmalloc-128 of size 128
[   87.369734] The buggy address is located 8 bytes inside of
[   87.369734]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.371380] 
[   87.372088] The buggy address belongs to the physical page:
[   87.372950] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.374296] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.375560] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.376797] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.377930] page dumped because: kasan: bad access detected
[   87.378805] 
[   87.379217] Memory state around the buggy address:
[   87.380068]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.381266]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.382396] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.383500]                       ^
[   87.384214]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.385377]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.386458] ==================================================================
---
[   87.050682] ==================================================================
[   87.051667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0xb0/0x780
[   87.053092] Write of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.054210] 
[   87.054690] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.056029] Hardware name: linux,dummy-virt (DT)
[   87.056830] Call trace:
[   87.057374]  dump_backtrace+0x110/0x120
[   87.058254]  show_stack+0x18/0x28
[   87.059072]  dump_stack_lvl+0x68/0x84
[   87.059915]  print_report+0x158/0x4a4
[   87.060762]  kasan_report+0x98/0xe0
[   87.061556]  kasan_check_range+0x160/0x1d8
[   87.062442]  __kasan_check_write+0x28/0x38
[   87.063323]  kasan_bitops_test_and_modify.constprop.4+0xb0/0x780
[   87.064436]  kasan_bitops_generic+0xb8/0x128
[   87.065361]  kunit_try_run_case+0x7c/0x120
[   87.066253]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.067316]  kthread+0x1a4/0x1b8
[   87.068056]  ret_from_fork+0x10/0x20
[   87.068878] 
[   87.069287] Allocated by task 164:
[   87.069966]  kasan_save_stack+0x2c/0x58
[   87.070785]  kasan_set_track+0x2c/0x40
[   87.071606]  kasan_save_alloc_info+0x24/0x38
[   87.072502]  __kasan_kmalloc+0xa0/0xb8
[   87.073323]  kmalloc_trace+0x50/0x68
[   87.074137]  kasan_bitops_generic+0x90/0x128
[   87.075049]  kunit_try_run_case+0x7c/0x120
[   87.075910]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.076953]  kthread+0x1a4/0x1b8
[   87.077682]  ret_from_fork+0x10/0x20
[   87.078469] 
[   87.078909] The buggy address belongs to the object at ffff0000c5a19800
[   87.078909]  which belongs to the cache kmalloc-128 of size 128
[   87.080575] The buggy address is located 8 bytes inside of
[   87.080575]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.082216] 
[   87.082670] The buggy address belongs to the physical page:
[   87.083571] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.084974] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.086218] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.087446] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.088561] page dumped because: kasan: bad access detected
[   87.089466] 
[   87.089895] Memory state around the buggy address:
[   87.090731]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.091906]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.093060] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.094142]                       ^
[   87.094842]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.095975]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.097046] ==================================================================

test log snippet boot parser 276

Home

[   87.436583] ==================================================================
[   87.437560] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x228/0x780
[   87.439107] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.440205] 
[   87.440701] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.442088] Hardware name: linux,dummy-virt (DT)
[   87.442906] Call trace:
[   87.443452]  dump_backtrace+0x110/0x120
[   87.444347]  show_stack+0x18/0x28
[   87.445167]  dump_stack_lvl+0x68/0x84
[   87.445990]  print_report+0x158/0x4a4
[   87.446835]  kasan_report+0x98/0xe0
[   87.447642]  __asan_load8+0x88/0xb0
[   87.448442]  kasan_bitops_test_and_modify.constprop.4+0x228/0x780
[   87.449590]  kasan_bitops_generic+0xb8/0x128
[   87.450526]  kunit_try_run_case+0x7c/0x120
[   87.451426]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.452473]  kthread+0x1a4/0x1b8
[   87.453265]  ret_from_fork+0x10/0x20
[   87.454076] 
[   87.454502] Allocated by task 164:
[   87.455186]  kasan_save_stack+0x2c/0x58
[   87.455996]  kasan_set_track+0x2c/0x40
[   87.456767]  kasan_save_alloc_info+0x24/0x38
[   87.457683]  __kasan_kmalloc+0xa0/0xb8
[   87.458499]  kmalloc_trace+0x50/0x68
[   87.459294]  kasan_bitops_generic+0x90/0x128
[   87.460218]  kunit_try_run_case+0x7c/0x120
[   87.461087]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.462145]  kthread+0x1a4/0x1b8
[   87.462915]  ret_from_fork+0x10/0x20
[   87.463714] 
[   87.464178] The buggy address belongs to the object at ffff0000c5a19800
[   87.464178]  which belongs to the cache kmalloc-128 of size 128
[   87.465808] The buggy address is located 8 bytes inside of
[   87.465808]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.467424] 
[   87.467912] The buggy address belongs to the physical page:
[   87.468839] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.470280] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.471521] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.472764] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.473935] page dumped because: kasan: bad access detected
[   87.474833] 
[   87.475295] Memory state around the buggy address:
[   87.476120]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.477313]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.478452] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.479564]                       ^
[   87.480302]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.481502]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.482595] ==================================================================
---
[   87.388256] ==================================================================
[   87.389227] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x1f8/0x780
[   87.390763] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.391881] 
[   87.392365] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.393898] Hardware name: linux,dummy-virt (DT)
[   87.394710] Call trace:
[   87.395254]  dump_backtrace+0x110/0x120
[   87.396147]  show_stack+0x18/0x28
[   87.397000]  dump_stack_lvl+0x68/0x84
[   87.397830]  print_report+0x158/0x4a4
[   87.398699]  kasan_report+0x98/0xe0
[   87.399498]  __asan_load8+0x88/0xb0
[   87.400313]  kasan_bitops_test_and_modify.constprop.4+0x1f8/0x780
[   87.401455]  kasan_bitops_generic+0xb8/0x128
[   87.402368]  kunit_try_run_case+0x7c/0x120
[   87.403270]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.404327]  kthread+0x1a4/0x1b8
[   87.405116]  ret_from_fork+0x10/0x20
[   87.405942] 
[   87.406361] Allocated by task 164:
[   87.407022]  kasan_save_stack+0x2c/0x58
[   87.407842]  kasan_set_track+0x2c/0x40
[   87.408650]  kasan_save_alloc_info+0x24/0x38
[   87.409546]  __kasan_kmalloc+0xa0/0xb8
[   87.410371]  kmalloc_trace+0x50/0x68
[   87.411162]  kasan_bitops_generic+0x90/0x128
[   87.412074]  kunit_try_run_case+0x7c/0x120
[   87.412955]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.413996]  kthread+0x1a4/0x1b8
[   87.414746]  ret_from_fork+0x10/0x20
[   87.415562] 
[   87.415996] The buggy address belongs to the object at ffff0000c5a19800
[   87.415996]  which belongs to the cache kmalloc-128 of size 128
[   87.417653] The buggy address is located 8 bytes inside of
[   87.417653]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.419350] 
[   87.419801] The buggy address belongs to the physical page:
[   87.420717] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.422133] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.423454] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.424777] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.425942] page dumped because: kasan: bad access detected
[   87.426888] 
[   87.427292] Memory state around the buggy address:
[   87.428143]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.429334]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.430500] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.431606]                       ^
[   87.432337]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.433481]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.434585] ==================================================================
---
[   87.195683] ==================================================================
[   87.196688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x11c/0x780
[   87.198290] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.199397] 
[   87.199864] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.201231] Hardware name: linux,dummy-virt (DT)
[   87.202032] Call trace:
[   87.202560]  dump_backtrace+0x110/0x120
[   87.203445]  show_stack+0x18/0x28
[   87.204269]  dump_stack_lvl+0x68/0x84
[   87.205265]  print_report+0x158/0x4a4
[   87.206120]  kasan_report+0x98/0xe0
[   87.206907]  __asan_load8+0x88/0xb0
[   87.207685]  kasan_bitops_test_and_modify.constprop.4+0x11c/0x780
[   87.208821]  kasan_bitops_generic+0xb8/0x128
[   87.209735]  kunit_try_run_case+0x7c/0x120
[   87.210616]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.211660]  kthread+0x1a4/0x1b8
[   87.212423]  ret_from_fork+0x10/0x20
[   87.213247] 
[   87.213649] Allocated by task 164:
[   87.214346]  kasan_save_stack+0x2c/0x58
[   87.215155]  kasan_set_track+0x2c/0x40
[   87.215956]  kasan_save_alloc_info+0x24/0x38
[   87.216810]  __kasan_kmalloc+0xa0/0xb8
[   87.217611]  kmalloc_trace+0x50/0x68
[   87.218410]  kasan_bitops_generic+0x90/0x128
[   87.219317]  kunit_try_run_case+0x7c/0x120
[   87.220192]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.221240]  kthread+0x1a4/0x1b8
[   87.222017]  ret_from_fork+0x10/0x20
[   87.222708] 
[   87.223104] The buggy address belongs to the object at ffff0000c5a19800
[   87.223104]  which belongs to the cache kmalloc-128 of size 128
[   87.224814] The buggy address is located 8 bytes inside of
[   87.224814]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.226453] 
[   87.226911] The buggy address belongs to the physical page:
[   87.227802] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.229204] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.230451] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.231660] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.232820] page dumped because: kasan: bad access detected
[   87.233711] 
[   87.234112] Memory state around the buggy address:
[   87.234959]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.236123]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.237273] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.238351]                       ^
[   87.239039]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.240203]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.241319] ==================================================================
---
[   87.098807] ==================================================================
[   87.099764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0xe0/0x780
[   87.101292] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.102418] 
[   87.102929] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.104295] Hardware name: linux,dummy-virt (DT)
[   87.105107] Call trace:
[   87.105621]  dump_backtrace+0x110/0x120
[   87.106505]  show_stack+0x18/0x28
[   87.107319]  dump_stack_lvl+0x68/0x84
[   87.108150]  print_report+0x158/0x4a4
[   87.108999]  kasan_report+0x98/0xe0
[   87.109770]  __asan_load8+0x88/0xb0
[   87.110564]  kasan_bitops_test_and_modify.constprop.4+0xe0/0x780
[   87.111691]  kasan_bitops_generic+0xb8/0x128
[   87.112628]  kunit_try_run_case+0x7c/0x120
[   87.113530]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.114575]  kthread+0x1a4/0x1b8
[   87.115348]  ret_from_fork+0x10/0x20
[   87.116169] 
[   87.116581] Allocated by task 164:
[   87.117249]  kasan_save_stack+0x2c/0x58
[   87.118091]  kasan_set_track+0x2c/0x40
[   87.118916]  kasan_save_alloc_info+0x24/0x38
[   87.119843]  __kasan_kmalloc+0xa0/0xb8
[   87.120629]  kmalloc_trace+0x50/0x68
[   87.121459]  kasan_bitops_generic+0x90/0x128
[   87.122109]  kunit_try_run_case+0x7c/0x120
[   87.122523]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.123477]  kthread+0x1a4/0x1b8
[   87.124239]  ret_from_fork+0x10/0x20
[   87.125085] 
[   87.125502] The buggy address belongs to the object at ffff0000c5a19800
[   87.125502]  which belongs to the cache kmalloc-128 of size 128
[   87.127176] The buggy address is located 8 bytes inside of
[   87.127176]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.128777] 
[   87.129255] The buggy address belongs to the physical page:
[   87.130145] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.131512] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.132754] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.133994] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.135137] page dumped because: kasan: bad access detected
[   87.136031] 
[   87.136427] Memory state around the buggy address:
[   87.137262]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.138425]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.139561] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.140646]                       ^
[   87.141346]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.142463]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.143534] ==================================================================
---
[   87.291743] ==================================================================
[   87.292737] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x190/0x780
[   87.294222] Read of size 8 at addr ffff0000c5a19808 by task kunit_try_catch/164
[   87.295322] 
[   87.295801] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.297193] Hardware name: linux,dummy-virt (DT)
[   87.298019] Call trace:
[   87.298568]  dump_backtrace+0x110/0x120
[   87.299463]  show_stack+0x18/0x28
[   87.300294]  dump_stack_lvl+0x68/0x84
[   87.301151]  print_report+0x158/0x4a4
[   87.302006]  kasan_report+0x98/0xe0
[   87.302785]  __asan_load8+0x88/0xb0
[   87.303589]  kasan_bitops_test_and_modify.constprop.4+0x190/0x780
[   87.304708]  kasan_bitops_generic+0xb8/0x128
[   87.305641]  kunit_try_run_case+0x7c/0x120
[   87.306508]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.307560]  kthread+0x1a4/0x1b8
[   87.308337]  ret_from_fork+0x10/0x20
[   87.309151] 
[   87.309553] Allocated by task 164:
[   87.310266]  kasan_save_stack+0x2c/0x58
[   87.310992]  kasan_set_track+0x2c/0x40
[   87.311770]  kasan_save_alloc_info+0x24/0x38
[   87.312665]  __kasan_kmalloc+0xa0/0xb8
[   87.313487]  kmalloc_trace+0x50/0x68
[   87.314294]  kasan_bitops_generic+0x90/0x128
[   87.315214]  kunit_try_run_case+0x7c/0x120
[   87.316110]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.317168]  kthread+0x1a4/0x1b8
[   87.317934]  ret_from_fork+0x10/0x20
[   87.318721] 
[   87.319164] The buggy address belongs to the object at ffff0000c5a19800
[   87.319164]  which belongs to the cache kmalloc-128 of size 128
[   87.320831] The buggy address is located 8 bytes inside of
[   87.320831]  128-byte region [ffff0000c5a19800, ffff0000c5a19880)
[   87.322478] 
[   87.322947] The buggy address belongs to the physical page:
[   87.323912] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   87.325325] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.326584] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.327821] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.328994] page dumped because: kasan: bad access detected
[   87.329892] 
[   87.330292] Memory state around the buggy address:
[   87.331126]  ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.332303]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.333432] >ffff0000c5a19800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.334532]                       ^
[   87.335245]  ffff0000c5a19880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.336392]  ffff0000c5a19900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.337476] ==================================================================

test log snippet boot parser 277

Home

[   83.201767] ==================================================================
[   83.203637] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd8/0x1f0
[   83.204930] Write of size 1 at addr ffff0000c407df00 by task kunit_try_catch/127
[   83.206097] 
[   83.206578] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.208872] Hardware name: linux,dummy-virt (DT)
[   83.209875] Call trace:
[   83.210389]  dump_backtrace+0x110/0x120
[   83.211436]  show_stack+0x18/0x28
[   83.212267]  dump_stack_lvl+0x68/0x84
[   83.213149]  print_report+0x158/0x4a4
[   83.214046]  kasan_report+0x98/0xe0
[   83.214981]  __asan_store1+0x68/0x78
[   83.215829]  kmalloc_large_oob_right+0xd8/0x1f0
[   83.216819]  kunit_try_run_case+0x7c/0x120
[   83.218116]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.219421]  kthread+0x1a4/0x1b8
[   83.220255]  ret_from_fork+0x10/0x20
[   83.221441] 
[   83.221897] Allocated by task 127:
[   83.222604]  kasan_save_stack+0x2c/0x58
[   83.223429]  kasan_set_track+0x2c/0x40
[   83.224240]  kasan_save_alloc_info+0x24/0x38
[   83.225463]  __kasan_kmalloc+0xa0/0xb8
[   83.226025]  kmalloc_trace+0x50/0x68
[   83.226401]  kmalloc_large_oob_right+0xa8/0x1f0
[   83.226835]  kunit_try_run_case+0x7c/0x120
[   83.228001]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.229185]  kthread+0x1a4/0x1b8
[   83.230054]  ret_from_fork+0x10/0x20
[   83.230863] 
[   83.231298] The buggy address belongs to the object at ffff0000c407c000
[   83.231298]  which belongs to the cache kmalloc-8k of size 8192
[   83.233151] The buggy address is located 7936 bytes inside of
[   83.233151]  8192-byte region [ffff0000c407c000, ffff0000c407e000)
[   83.235195] 
[   83.235644] The buggy address belongs to the physical page:
[   83.236524] page:00000000bd095821 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104078
[   83.238394] head:00000000bd095821 order:3 compound_mapcount:0 compound_pincount:0
[   83.239587] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.240955] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   83.242490] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   83.243596] page dumped because: kasan: bad access detected
[   83.244519] 
[   83.244943] Memory state around the buggy address:
[   83.246427]  ffff0000c407de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.247581]  ffff0000c407de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.248718] >ffff0000c407df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.250134]                    ^
[   83.250640]  ffff0000c407df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.251785]  ffff0000c407e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.252891] ==================================================================

test log snippet boot parser 278

Home

[   84.491577] ==================================================================
[   84.493197] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xf0/0x1e8
[   84.494626] Read of size 64 at addr ffff0000c59a1004 by task kunit_try_catch/141
[   84.495875] 
[   84.496346] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.497811] Hardware name: linux,dummy-virt (DT)
[   84.498545] Call trace:
[   84.499348]  dump_backtrace+0x110/0x120
[   84.500266]  show_stack+0x18/0x28
[   84.501321]  dump_stack_lvl+0x68/0x84
[   84.502195]  print_report+0x158/0x4a4
[   84.503057]  kasan_report+0x98/0xe0
[   84.503867]  kasan_check_range+0x160/0x1d8
[   84.504730]  memmove+0x44/0xb0
[   84.505521]  kmalloc_memmove_invalid_size+0xf0/0x1e8
[   84.506672]  kunit_try_run_case+0x7c/0x120
[   84.507562]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.508616]  kthread+0x1a4/0x1b8
[   84.509613]  ret_from_fork+0x10/0x20
[   84.510565] 
[   84.511018] Allocated by task 141:
[   84.511726]  kasan_save_stack+0x2c/0x58
[   84.512578]  kasan_set_track+0x2c/0x40
[   84.513531]  kasan_save_alloc_info+0x24/0x38
[   84.514445]  __kasan_kmalloc+0xa0/0xb8
[   84.515262]  kmalloc_trace+0x50/0x68
[   84.516067]  kmalloc_memmove_invalid_size+0xa8/0x1e8
[   84.517259]  kunit_try_run_case+0x7c/0x120
[   84.518077]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.519229]  kthread+0x1a4/0x1b8
[   84.520008]  ret_from_fork+0x10/0x20
[   84.520814] 
[   84.521492] The buggy address belongs to the object at ffff0000c59a1000
[   84.521492]  which belongs to the cache kmalloc-128 of size 128
[   84.523255] The buggy address is located 4 bytes inside of
[   84.523255]  128-byte region [ffff0000c59a1000, ffff0000c59a1080)
[   84.524930] 
[   84.525600] The buggy address belongs to the physical page:
[   84.526510] page:0000000055be31d5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a1
[   84.527923] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.529320] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.530484] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.531666] page dumped because: kasan: bad access detected
[   84.532567] 
[   84.533015] Memory state around the buggy address:
[   84.533910]  ffff0000c59a0f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.535014]  ffff0000c59a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.536217] >ffff0000c59a1000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   84.537532]                                            ^
[   84.538508]  ffff0000c59a1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.539669]  ffff0000c59a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.540752] ==================================================================

test log snippet boot parser 279

Home

[   82.974360] ==================================================================
[   82.975874] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xdc/0x1f0
[   82.977195] Read of size 1 at addr ffff0000c580f000 by task kunit_try_catch/121
[   82.978297] 
[   82.978771] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   82.980198] Hardware name: linux,dummy-virt (DT)
[   82.981003] Call trace:
[   82.981536]  dump_backtrace+0x110/0x120
[   82.982414]  show_stack+0x18/0x28
[   82.983224]  dump_stack_lvl+0x68/0x84
[   82.984054]  print_report+0x158/0x4a4
[   82.984910]  kasan_report+0x98/0xe0
[   82.985674]  __asan_load1+0x68/0x78
[   82.986457]  kmalloc_node_oob_right+0xdc/0x1f0
[   82.987400]  kunit_try_run_case+0x7c/0x120
[   82.988292]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.989356]  kthread+0x1a4/0x1b8
[   82.990133]  ret_from_fork+0x10/0x20
[   82.990946] 
[   82.991366] Allocated by task 121:
[   82.992000]  kasan_save_stack+0x2c/0x58
[   82.992827]  kasan_set_track+0x2c/0x40
[   82.993630]  kasan_save_alloc_info+0x24/0x38
[   82.994524]  __kasan_kmalloc+0xa0/0xb8
[   82.995324]  kmalloc_node_trace+0x48/0x60
[   82.996191]  kmalloc_node_oob_right+0xac/0x1f0
[   82.997127]  kunit_try_run_case+0x7c/0x120
[   82.998015]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.999040]  kthread+0x1a4/0x1b8
[   82.999779]  ret_from_fork+0x10/0x20
[   83.000569] 
[   83.000996] The buggy address belongs to the object at ffff0000c580e000
[   83.000996]  which belongs to the cache kmalloc-4k of size 4096
[   83.002639] The buggy address is located 0 bytes to the right of
[   83.002639]  4096-byte region [ffff0000c580e000, ffff0000c580f000)
[   83.004509] 
[   83.005024] The buggy address belongs to the physical page:
[   83.006173] page:00000000f442e0ae refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105808
[   83.007578] head:00000000f442e0ae order:3 compound_mapcount:0 compound_pincount:0
[   83.008687] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.010101] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   83.011322] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   83.012406] page dumped because: kasan: bad access detected
[   83.013379] 
[   83.013901] Memory state around the buggy address:
[   83.014891]  ffff0000c580ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.016057]  ffff0000c580ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.017227] >ffff0000c580f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.018323]                    ^
[   83.019113]  ffff0000c580f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.020287]  ffff0000c580f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.021372] ==================================================================

test log snippet boot parser 280

Home

[   84.037791] ==================================================================
[   84.039393] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x104/0x278
[   84.040479] Write of size 16 at addr ffff0000c5925400 by task kunit_try_catch/133
[   84.042044] 
[   84.042459] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.043596] Hardware name: linux,dummy-virt (DT)
[   84.044438] Call trace:
[   84.044964]  dump_backtrace+0x110/0x120
[   84.045883]  show_stack+0x18/0x28
[   84.047292]  dump_stack_lvl+0x68/0x84
[   84.048064]  print_report+0x158/0x4a4
[   84.049016]  kasan_report+0x98/0xe0
[   84.049786]  __asan_store16+0x7c/0xa8
[   84.050593]  kmalloc_oob_16+0x104/0x278
[   84.051743]  kunit_try_run_case+0x7c/0x120
[   84.052633]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.053673]  kthread+0x1a4/0x1b8
[   84.054433]  ret_from_fork+0x10/0x20
[   84.055450] 
[   84.055865] Allocated by task 133:
[   84.056571]  kasan_save_stack+0x2c/0x58
[   84.057436]  kasan_set_track+0x2c/0x40
[   84.058210]  kasan_save_alloc_info+0x24/0x38
[   84.058623]  __kasan_kmalloc+0xa0/0xb8
[   84.059130]  kmalloc_trace+0x50/0x68
[   84.059668]  kmalloc_oob_16+0xac/0x278
[   84.060601]  kunit_try_run_case+0x7c/0x120
[   84.061683]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.063215]  kthread+0x1a4/0x1b8
[   84.063945]  ret_from_fork+0x10/0x20
[   84.064721] 
[   84.065192] The buggy address belongs to the object at ffff0000c5925400
[   84.065192]  which belongs to the cache kmalloc-128 of size 128
[   84.067206] The buggy address is located 0 bytes inside of
[   84.067206]  128-byte region [ffff0000c5925400, ffff0000c5925480)
[   84.068960] 
[   84.069377] The buggy address belongs to the physical page:
[   84.070839] page:000000005aeaa9a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105925
[   84.072215] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.073504] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.074723] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.076163] page dumped because: kasan: bad access detected
[   84.077005] 
[   84.077440] Memory state around the buggy address:
[   84.078276]  ffff0000c5925300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   84.080076]  ffff0000c5925380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.081547] >ffff0000c5925400: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.082658]                       ^
[   84.083661]  ffff0000c5925480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.084963]  ffff0000c5925500: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.085898] ==================================================================

test log snippet boot parser 281

Home

[   84.162718] ==================================================================
[   84.164207] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xe0/0x1e8
[   84.165461] Write of size 128 at addr ffff0000c59a0600 by task kunit_try_catch/135
[   84.166720] 
[   84.167083] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.168576] Hardware name: linux,dummy-virt (DT)
[   84.169441] Call trace:
[   84.170022]  dump_backtrace+0x110/0x120
[   84.171233]  show_stack+0x18/0x28
[   84.172152]  dump_stack_lvl+0x68/0x84
[   84.173080]  print_report+0x158/0x4a4
[   84.174182]  kasan_report+0x98/0xe0
[   84.174944]  kasan_check_range+0x160/0x1d8
[   84.175779]  memset+0x3c/0x80
[   84.176520]  kmalloc_oob_in_memset+0xe0/0x1e8
[   84.177525]  kunit_try_run_case+0x7c/0x120
[   84.178412]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.179667]  kthread+0x1a4/0x1b8
[   84.180437]  ret_from_fork+0x10/0x20
[   84.181601] 
[   84.182044] Allocated by task 135:
[   84.182702]  kasan_save_stack+0x2c/0x58
[   84.183522]  kasan_set_track+0x2c/0x40
[   84.184333]  kasan_save_alloc_info+0x24/0x38
[   84.185280]  __kasan_kmalloc+0xa0/0xb8
[   84.186115]  kmalloc_trace+0x50/0x68
[   84.187182]  kmalloc_oob_in_memset+0xa8/0x1e8
[   84.188011]  kunit_try_run_case+0x7c/0x120
[   84.188899]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.190098]  kthread+0x1a4/0x1b8
[   84.190815]  ret_from_fork+0x10/0x20
[   84.191614] 
[   84.192049] The buggy address belongs to the object at ffff0000c59a0600
[   84.192049]  which belongs to the cache kmalloc-128 of size 128
[   84.193823] The buggy address is located 0 bytes inside of
[   84.193823]  128-byte region [ffff0000c59a0600, ffff0000c59a0680)
[   84.195431] 
[   84.195897] The buggy address belongs to the physical page:
[   84.196770] page:0000000031c2c49d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[   84.198282] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.199624] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.200824] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.201984] page dumped because: kasan: bad access detected
[   84.202841] 
[   84.203654] Memory state around the buggy address:
[   84.204442]  ffff0000c59a0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.205810]  ffff0000c59a0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.206977] >ffff0000c59a0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.208059]                                                                 ^
[   84.209349]  ffff0000c59a0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.210486]  ffff0000c59a0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.211583] ==================================================================

test log snippet boot parser 282

Home

[   82.906686] ==================================================================
[   82.908168] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xd4/0x1e8
[   82.909493] Read of size 1 at addr ffff0000c59223ff by task kunit_try_catch/120
[   82.910671] 
[   82.911142] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   82.912477] Hardware name: linux,dummy-virt (DT)
[   82.913503] Call trace:
[   82.914007]  dump_backtrace+0x110/0x120
[   82.915282]  show_stack+0x18/0x28
[   82.916121]  dump_stack_lvl+0x68/0x84
[   82.917052]  print_report+0x158/0x4a4
[   82.917976]  kasan_report+0x98/0xe0
[   82.918788]  __asan_load1+0x68/0x78
[   82.919608]  kmalloc_oob_left+0xd4/0x1e8
[   82.920375]  kunit_try_run_case+0x7c/0x120
[   82.921984]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.923160]  kthread+0x1a4/0x1b8
[   82.923985]  ret_from_fork+0x10/0x20
[   82.924781] 
[   82.925215] Allocated by task 119:
[   82.925882]  kasan_save_stack+0x2c/0x58
[   82.926707]  kasan_set_track+0x2c/0x40
[   82.927502]  kasan_save_alloc_info+0x24/0x38
[   82.928390]  __kasan_kmalloc+0xa0/0xb8
[   82.929247]  kmalloc_trace+0x50/0x68
[   82.930410]  kmalloc_oob_right+0xa8/0x328
[   82.931440]  kunit_try_run_case+0x7c/0x120
[   82.932328]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.933372]  kthread+0x1a4/0x1b8
[   82.934145]  ret_from_fork+0x10/0x20
[   82.934946] 
[   82.935435] Freed by task 119:
[   82.936101]  kasan_save_stack+0x2c/0x58
[   82.936912]  kasan_set_track+0x2c/0x40
[   82.937687]  kasan_save_free_info+0x38/0x60
[   82.938552]  __kasan_slab_free+0xe8/0x158
[   82.939844]  __kmem_cache_free+0x138/0x2b0
[   82.940754]  kfree+0x5c/0x70
[   82.941490]  kmalloc_oob_right+0x154/0x328
[   82.942380]  kunit_try_run_case+0x7c/0x120
[   82.943230]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.944256]  kthread+0x1a4/0x1b8
[   82.945145]  ret_from_fork+0x10/0x20
[   82.945979] 
[   82.946350] The buggy address belongs to the object at ffff0000c5922300
[   82.946350]  which belongs to the cache kmalloc-128 of size 128
[   82.948536] The buggy address is located 127 bytes to the right of
[   82.948536]  128-byte region [ffff0000c5922300, ffff0000c5922380)
[   82.950174] 
[   82.950619] The buggy address belongs to the physical page:
[   82.951523] page:0000000060292258 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[   82.952893] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   82.954193] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   82.955581] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   82.956784] page dumped because: kasan: bad access detected
[   82.957872] 
[   82.958337] Memory state around the buggy address:
[   82.959195]  ffff0000c5922280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.960406]  ffff0000c5922300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.962038] >ffff0000c5922380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.963277]                                                                 ^
[   82.964471]  ffff0000c5922400: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.965662]  ffff0000c5922480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.966756] ==================================================================

test log snippet boot parser 283

Home

[   82.906686] ==================================================================
[   82.908168] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xd4/0x1e8
[   82.909493] Read of size 1 at addr ffff0000c59223ff by task kunit_try_catch/120
[   82.910671] 
[   82.911142] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   82.912477] Hardware name: linux,dummy-virt (DT)
[   82.913503] Call trace:
[   82.914007]  dump_backtrace+0x110/0x120
[   82.915282]  show_stack+0x18/0x28
[   82.916121]  dump_stack_lvl+0x68/0x84
[   82.917052]  print_report+0x158/0x4a4
[   82.917976]  kasan_report+0x98/0xe0
[   82.918788]  __asan_load1+0x68/0x78
[   82.919608]  kmalloc_oob_left+0xd4/0x1e8
[   82.920375]  kunit_try_run_case+0x7c/0x120
[   82.921984]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.923160]  kthread+0x1a4/0x1b8
[   82.923985]  ret_from_fork+0x10/0x20
[   82.924781] 
[   82.925215] Allocated by task 119:
[   82.925882]  kasan_save_stack+0x2c/0x58
[   82.926707]  kasan_set_track+0x2c/0x40
[   82.927502]  kasan_save_alloc_info+0x24/0x38
[   82.928390]  __kasan_kmalloc+0xa0/0xb8
[   82.929247]  kmalloc_trace+0x50/0x68
[   82.930410]  kmalloc_oob_right+0xa8/0x328
[   82.931440]  kunit_try_run_case+0x7c/0x120
[   82.932328]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.933372]  kthread+0x1a4/0x1b8
[   82.934145]  ret_from_fork+0x10/0x20
[   82.934946] 
[   82.935435] Freed by task 119:
[   82.936101]  kasan_save_stack+0x2c/0x58
[   82.936912]  kasan_set_track+0x2c/0x40
[   82.937687]  kasan_save_free_info+0x38/0x60
[   82.938552]  __kasan_slab_free+0xe8/0x158
[   82.939844]  __kmem_cache_free+0x138/0x2b0
[   82.940754]  kfree+0x5c/0x70
[   82.941490]  kmalloc_oob_right+0x154/0x328
[   82.942380]  kunit_try_run_case+0x7c/0x120
[   82.943230]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.944256]  kthread+0x1a4/0x1b8
[   82.945145]  ret_from_fork+0x10/0x20
[   82.945979] 
[   82.946350] The buggy address belongs to the object at ffff0000c5922300
[   82.946350]  which belongs to the cache kmalloc-128 of size 128
[   82.948536] The buggy address is located 127 bytes to the right of
[   82.948536]  128-byte region [ffff0000c5922300, ffff0000c5922380)
[   82.950174] 
[   82.950619] The buggy address belongs to the physical page:
[   82.951523] page:0000000060292258 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[   82.952893] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   82.954193] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   82.955581] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   82.956784] page dumped because: kasan: bad access detected
[   82.957872] 
[   82.958337] Memory state around the buggy address:
[   82.959195]  ffff0000c5922280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.960406]  ffff0000c5922300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.962038] >ffff0000c5922380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.963277]                                                                 ^
[   82.964471]  ffff0000c5922400: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.965662]  ffff0000c5922480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.966756] ==================================================================

test log snippet boot parser 284

Home

[   84.272484] ==================================================================
[   84.274457] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xe4/0x1f8
[   84.275772] Write of size 4 at addr ffff0000c59a0875 by task kunit_try_catch/137
[   84.277116] 
[   84.277634] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.279024] Hardware name: linux,dummy-virt (DT)
[   84.279893] Call trace:
[   84.280528]  dump_backtrace+0x110/0x120
[   84.281442]  show_stack+0x18/0x28
[   84.282295]  dump_stack_lvl+0x68/0x84
[   84.283151]  print_report+0x158/0x4a4
[   84.283998]  kasan_report+0x98/0xe0
[   84.284784]  kasan_check_range+0x160/0x1d8
[   84.285688]  memset+0x3c/0x80
[   84.286450]  kmalloc_oob_memset_4+0xe4/0x1f8
[   84.287375]  kunit_try_run_case+0x7c/0x120
[   84.288282]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.289350]  kthread+0x1a4/0x1b8
[   84.290145]  ret_from_fork+0x10/0x20
[   84.290979] 
[   84.291423] Allocated by task 137:
[   84.292083]  kasan_save_stack+0x2c/0x58
[   84.292974]  kasan_set_track+0x2c/0x40
[   84.293801]  kasan_save_alloc_info+0x24/0x38
[   84.294724]  __kasan_kmalloc+0xa0/0xb8
[   84.295486]  kmalloc_trace+0x50/0x68
[   84.296279]  kmalloc_oob_memset_4+0xa8/0x1f8
[   84.297190]  kunit_try_run_case+0x7c/0x120
[   84.298064]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.299119]  kthread+0x1a4/0x1b8
[   84.299885]  ret_from_fork+0x10/0x20
[   84.300668] 
[   84.301086] The buggy address belongs to the object at ffff0000c59a0800
[   84.301086]  which belongs to the cache kmalloc-128 of size 128
[   84.302757] The buggy address is located 117 bytes inside of
[   84.302757]  128-byte region [ffff0000c59a0800, ffff0000c59a0880)
[   84.304323] 
[   84.304737] The buggy address belongs to the physical page:
[   84.305608] page:0000000031c2c49d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[   84.307024] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.308267] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.309495] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.310634] page dumped because: kasan: bad access detected
[   84.311519] 
[   84.311931] Memory state around the buggy address:
[   84.312763]  ffff0000c59a0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.313925]  ffff0000c59a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.315054] >ffff0000c59a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.316142]                                                                 ^
[   84.317216]  ffff0000c59a0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.318337]  ffff0000c59a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.319431] ==================================================================
---
[   84.217431] ==================================================================
[   84.219043] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xe4/0x1f0
[   84.220224] Write of size 2 at addr ffff0000c59a0777 by task kunit_try_catch/136
[   84.221443] 
[   84.222057] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.223405] Hardware name: linux,dummy-virt (DT)
[   84.224115] Call trace:
[   84.224679]  dump_backtrace+0x110/0x120
[   84.225572]  show_stack+0x18/0x28
[   84.226464]  dump_stack_lvl+0x68/0x84
[   84.227294]  print_report+0x158/0x4a4
[   84.228148]  kasan_report+0x98/0xe0
[   84.228982]  kasan_check_range+0x160/0x1d8
[   84.230064]  memset+0x3c/0x80
[   84.230797]  kmalloc_oob_memset_2+0xe4/0x1f0
[   84.231719]  kunit_try_run_case+0x7c/0x120
[   84.232604]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.233872]  kthread+0x1a4/0x1b8
[   84.234544]  ret_from_fork+0x10/0x20
[   84.235446] 
[   84.235975] Allocated by task 136:
[   84.236611]  kasan_save_stack+0x2c/0x58
[   84.237449]  kasan_set_track+0x2c/0x40
[   84.238322]  kasan_save_alloc_info+0x24/0x38
[   84.239220]  __kasan_kmalloc+0xa0/0xb8
[   84.240174]  kmalloc_trace+0x50/0x68
[   84.240978]  kmalloc_oob_memset_2+0xa8/0x1f0
[   84.242765]  kunit_try_run_case+0x7c/0x120
[   84.243500]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.244553]  kthread+0x1a4/0x1b8
[   84.245491]  ret_from_fork+0x10/0x20
[   84.246124] 
[   84.246566] The buggy address belongs to the object at ffff0000c59a0700
[   84.246566]  which belongs to the cache kmalloc-128 of size 128
[   84.248286] The buggy address is located 119 bytes inside of
[   84.248286]  128-byte region [ffff0000c59a0700, ffff0000c59a0780)
[   84.250162] 
[   84.250585] The buggy address belongs to the physical page:
[   84.251450] page:0000000031c2c49d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[   84.252824] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.254243] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.255462] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.256595] page dumped because: kasan: bad access detected
[   84.257618] 
[   84.258032] Memory state around the buggy address:
[   84.258905]  ffff0000c59a0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.260058]  ffff0000c59a0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.261772] >ffff0000c59a0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.262824]                                                                 ^
[   84.263917]  ffff0000c59a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.265053]  ffff0000c59a0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.266194] ==================================================================

test log snippet boot parser 285

Home

[   84.325402] ==================================================================
[   84.326922] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xe4/0x1f0
[   84.328136] Write of size 8 at addr ffff0000c595f271 by task kunit_try_catch/138
[   84.329786] 
[   84.330259] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.331576] Hardware name: linux,dummy-virt (DT)
[   84.332401] Call trace:
[   84.333406]  dump_backtrace+0x110/0x120
[   84.334140]  show_stack+0x18/0x28
[   84.334972]  dump_stack_lvl+0x68/0x84
[   84.335781]  print_report+0x158/0x4a4
[   84.336633]  kasan_report+0x98/0xe0
[   84.337751]  kasan_check_range+0x160/0x1d8
[   84.338630]  memset+0x3c/0x80
[   84.339379]  kmalloc_oob_memset_8+0xe4/0x1f0
[   84.340300]  kunit_try_run_case+0x7c/0x120
[   84.341254]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.341910]  kthread+0x1a4/0x1b8
[   84.342265]  ret_from_fork+0x10/0x20
[   84.342634] 
[   84.342817] Allocated by task 138:
[   84.344261]  kasan_save_stack+0x2c/0x58
[   84.345139]  kasan_set_track+0x2c/0x40
[   84.346139]  kasan_save_alloc_info+0x24/0x38
[   84.347022]  __kasan_kmalloc+0xa0/0xb8
[   84.347790]  kmalloc_trace+0x50/0x68
[   84.348585]  kmalloc_oob_memset_8+0xa8/0x1f0
[   84.349766]  kunit_try_run_case+0x7c/0x120
[   84.350562]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.351608]  kthread+0x1a4/0x1b8
[   84.352365]  ret_from_fork+0x10/0x20
[   84.353116] 
[   84.353314] The buggy address belongs to the object at ffff0000c595f200
[   84.353314]  which belongs to the cache kmalloc-128 of size 128
[   84.354198] The buggy address is located 113 bytes inside of
[   84.354198]  128-byte region [ffff0000c595f200, ffff0000c595f280)
[   84.356372] 
[   84.356790] The buggy address belongs to the physical page:
[   84.358027] page:000000004f979b4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595f
[   84.359363] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.360601] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.362038] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.363151] page dumped because: kasan: bad access detected
[   84.364009] 
[   84.364384] Memory state around the buggy address:
[   84.365549]  ffff0000c595f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.366710]  ffff0000c595f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.367928] >ffff0000c595f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.369013]                                                                 ^
[   84.370141]  ffff0000c595f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.371527]  ffff0000c595f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.372636] ==================================================================
---
[   84.379128] ==================================================================
[   84.380622] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xe4/0x1f0
[   84.382403] Write of size 16 at addr ffff0000c595f369 by task kunit_try_catch/139
[   84.383786] 
[   84.384722] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.386186] Hardware name: linux,dummy-virt (DT)
[   84.386997] Call trace:
[   84.387620]  dump_backtrace+0x110/0x120
[   84.388487]  show_stack+0x18/0x28
[   84.389430]  dump_stack_lvl+0x68/0x84
[   84.390083]  print_report+0x158/0x4a4
[   84.390898]  kasan_report+0x98/0xe0
[   84.391688]  kasan_check_range+0x160/0x1d8
[   84.392566]  memset+0x3c/0x80
[   84.393335]  kmalloc_oob_memset_16+0xe4/0x1f0
[   84.394274]  kunit_try_run_case+0x7c/0x120
[   84.395445]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.396414]  kthread+0x1a4/0x1b8
[   84.397257]  ret_from_fork+0x10/0x20
[   84.398082] 
[   84.398471] Allocated by task 139:
[   84.399548]  kasan_save_stack+0x2c/0x58
[   84.400438]  kasan_set_track+0x2c/0x40
[   84.401272]  kasan_save_alloc_info+0x24/0x38
[   84.402316]  __kasan_kmalloc+0xa0/0xb8
[   84.403147]  kmalloc_trace+0x50/0x68
[   84.403964]  kmalloc_oob_memset_16+0xa8/0x1f0
[   84.404895]  kunit_try_run_case+0x7c/0x120
[   84.405745]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.406688]  kthread+0x1a4/0x1b8
[   84.407506]  ret_from_fork+0x10/0x20
[   84.408741] 
[   84.409157] The buggy address belongs to the object at ffff0000c595f300
[   84.409157]  which belongs to the cache kmalloc-128 of size 128
[   84.411187] The buggy address is located 105 bytes inside of
[   84.411187]  128-byte region [ffff0000c595f300, ffff0000c595f380)
[   84.413194] 
[   84.413994] The buggy address belongs to the physical page:
[   84.414695] page:000000004f979b4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595f
[   84.416126] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.417734] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.418982] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.420279] page dumped because: kasan: bad access detected
[   84.421366] 
[   84.421711] Memory state around the buggy address:
[   84.422980]  ffff0000c595f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.424123]  ffff0000c595f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.425505] >ffff0000c595f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.426612]                                                                 ^
[   84.427680]  ffff0000c595f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.428790]  ffff0000c595f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.430166] ==================================================================

test log snippet boot parser 286

Home

[   82.743256] ==================================================================
[   82.744607] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xd4/0x328
[   82.746865] Write of size 1 at addr ffff0000c5922373 by task kunit_try_catch/119
[   82.748307] 
[   82.749261] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[   82.750805] Hardware name: linux,dummy-virt (DT)
[   82.752218] Call trace:
[   82.752717]  dump_backtrace+0x110/0x120
[   82.753994]  show_stack+0x18/0x28
[   82.754720]  dump_stack_lvl+0x68/0x84
[   82.755372]  print_report+0x158/0x4a4
[   82.756231]  kasan_report+0x98/0xe0
[   82.757165]  __asan_store1+0x68/0x78
[   82.757954]  kmalloc_oob_right+0xd4/0x328
[   82.758613]  kunit_try_run_case+0x7c/0x120
[   82.759534]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.760371]  kthread+0x1a4/0x1b8
[   82.760729]  ret_from_fork+0x10/0x20
[   82.762010] 
[   82.762511] Allocated by task 119:
[   82.763387]  kasan_save_stack+0x2c/0x58
[   82.764385]  kasan_set_track+0x2c/0x40
[   82.765233]  kasan_save_alloc_info+0x24/0x38
[   82.766143]  __kasan_kmalloc+0xa0/0xb8
[   82.767366]  kmalloc_trace+0x50/0x68
[   82.768011]  kmalloc_oob_right+0xa8/0x328
[   82.768892]  kunit_try_run_case+0x7c/0x120
[   82.770093]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.771151]  kthread+0x1a4/0x1b8
[   82.771900]  ret_from_fork+0x10/0x20
[   82.772780] 
[   82.773668] The buggy address belongs to the object at ffff0000c5922300
[   82.773668]  which belongs to the cache kmalloc-128 of size 128
[   82.775433] The buggy address is located 115 bytes inside of
[   82.775433]  128-byte region [ffff0000c5922300, ffff0000c5922380)
[   82.777585] 
[   82.778172] The buggy address belongs to the physical page:
[   82.779398] page:0000000060292258 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[   82.781517] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   82.783145] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   82.784305] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   82.785576] page dumped because: kasan: bad access detected
[   82.786535] 
[   82.787427] Memory state around the buggy address:
[   82.788472]  ffff0000c5922200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.789881]  ffff0000c5922280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.791061] >ffff0000c5922300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   82.792168]                                                              ^
[   82.793331]  ffff0000c5922380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.794504]  ffff0000c5922400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.796042] ==================================================================

test log snippet boot parser 287

Home

[   82.800316] ==================================================================
[   82.801741] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x328
[   82.803024] Write of size 1 at addr ffff0000c5922378 by task kunit_try_catch/119
[   82.804451] 
[   82.804986] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   82.806454] Hardware name: linux,dummy-virt (DT)
[   82.807372] Call trace:
[   82.807868]  dump_backtrace+0x110/0x120
[   82.808569]  show_stack+0x18/0x28
[   82.809469]  dump_stack_lvl+0x68/0x84
[   82.810293]  print_report+0x158/0x4a4
[   82.811332]  kasan_report+0x98/0xe0
[   82.812135]  __asan_store1+0x68/0x78
[   82.813173]  kmalloc_oob_right+0x100/0x328
[   82.814145]  kunit_try_run_case+0x7c/0x120
[   82.815063]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.815995]  kthread+0x1a4/0x1b8
[   82.816903]  ret_from_fork+0x10/0x20
[   82.818153] 
[   82.818777] Allocated by task 119:
[   82.819427]  kasan_save_stack+0x2c/0x58
[   82.820231]  kasan_set_track+0x2c/0x40
[   82.821336]  kasan_save_alloc_info+0x24/0x38
[   82.822302]  __kasan_kmalloc+0xa0/0xb8
[   82.823105]  kmalloc_trace+0x50/0x68
[   82.823909]  kmalloc_oob_right+0xa8/0x328
[   82.824784]  kunit_try_run_case+0x7c/0x120
[   82.825717]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.827444]  kthread+0x1a4/0x1b8
[   82.828224]  ret_from_fork+0x10/0x20
[   82.829303] 
[   82.829832] The buggy address belongs to the object at ffff0000c5922300
[   82.829832]  which belongs to the cache kmalloc-128 of size 128
[   82.831624] The buggy address is located 120 bytes inside of
[   82.831624]  128-byte region [ffff0000c5922300, ffff0000c5922380)
[   82.833557] 
[   82.834318] The buggy address belongs to the physical page:
[   82.835441] page:0000000060292258 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[   82.836901] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   82.838190] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   82.839830] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   82.841698] page dumped because: kasan: bad access detected
[   82.842494] 
[   82.842952] Memory state around the buggy address:
[   82.843867]  ffff0000c5922200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.845145]  ffff0000c5922280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.846334] >ffff0000c5922300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   82.847428]                                                                 ^
[   82.848532]  ffff0000c5922380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.849747]  ffff0000c5922400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.850840] ==================================================================

test log snippet boot parser 288

Home

[   82.856200] ==================================================================
[   82.857430] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x12c/0x328
[   82.858958] Read of size 1 at addr ffff0000c5922380 by task kunit_try_catch/119
[   82.860192] 
[   82.860669] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   82.861904] Hardware name: linux,dummy-virt (DT)
[   82.862765] Call trace:
[   82.863318]  dump_backtrace+0x110/0x120
[   82.864255]  show_stack+0x18/0x28
[   82.865129]  dump_stack_lvl+0x68/0x84
[   82.865948]  print_report+0x158/0x4a4
[   82.866818]  kasan_report+0x98/0xe0
[   82.867603]  __asan_load1+0x68/0x78
[   82.868399]  kmalloc_oob_right+0x12c/0x328
[   82.869295]  kunit_try_run_case+0x7c/0x120
[   82.870193]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.871235]  kthread+0x1a4/0x1b8
[   82.872004]  ret_from_fork+0x10/0x20
[   82.872828] 
[   82.873266] Allocated by task 119:
[   82.873950]  kasan_save_stack+0x2c/0x58
[   82.874809]  kasan_set_track+0x2c/0x40
[   82.875605]  kasan_save_alloc_info+0x24/0x38
[   82.876500]  __kasan_kmalloc+0xa0/0xb8
[   82.877295]  kmalloc_trace+0x50/0x68
[   82.878093]  kmalloc_oob_right+0xa8/0x328
[   82.878972]  kunit_try_run_case+0x7c/0x120
[   82.879891]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   82.880922]  kthread+0x1a4/0x1b8
[   82.881654]  ret_from_fork+0x10/0x20
[   82.882434] 
[   82.882819] The buggy address belongs to the object at ffff0000c5922300
[   82.882819]  which belongs to the cache kmalloc-128 of size 128
[   82.884590] The buggy address is located 0 bytes to the right of
[   82.884590]  128-byte region [ffff0000c5922300, ffff0000c5922380)
[   82.886235] 
[   82.886688] The buggy address belongs to the physical page:
[   82.887558] page:0000000060292258 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[   82.888974] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   82.890199] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   82.891381] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   82.892519] page dumped because: kasan: bad access detected
[   82.893406] 
[   82.893787] Memory state around the buggy address:
[   82.894614]  ffff0000c5922280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.895812]  ffff0000c5922300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   82.896952] >ffff0000c5922380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.898022]                    ^
[   82.898708]  ffff0000c5922400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.899845]  ffff0000c5922480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.900924] ==================================================================

test log snippet boot parser 289

Home

[   83.028068] ==================================================================
[   83.030082] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xc4/0x1d8
[   83.031415] Write of size 1 at addr ffff0000c59f200a by task kunit_try_catch/122
[   83.033035] 
[   83.033682] CPU: 0 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.035216] Hardware name: linux,dummy-virt (DT)
[   83.036253] Call trace:
[   83.036907]  dump_backtrace+0x110/0x120
[   83.037793]  show_stack+0x18/0x28
[   83.038607]  dump_stack_lvl+0x68/0x84
[   83.039443]  print_report+0x158/0x4a4
[   83.040300]  kasan_report+0x98/0xe0
[   83.041123]  __asan_store1+0x68/0x78
[   83.041968]  kmalloc_pagealloc_oob_right+0xc4/0x1d8
[   83.043496]  kunit_try_run_case+0x7c/0x120
[   83.044299]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.045422]  kthread+0x1a4/0x1b8
[   83.046202]  ret_from_fork+0x10/0x20
[   83.047035] 
[   83.047434] The buggy address belongs to the physical page:
[   83.048521] page:000000001dfd240b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[   83.050488] head:000000001dfd240b order:2 compound_mapcount:0 compound_pincount:0
[   83.051421] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.052730] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.053965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.055088] page dumped because: kasan: bad access detected
[   83.055972] 
[   83.056376] Memory state around the buggy address:
[   83.057203]  ffff0000c59f1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.058837]  ffff0000c59f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.060037] >ffff0000c59f2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.061087]                       ^
[   83.061746]  ffff0000c59f2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.062903]  ffff0000c59f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.063975] ==================================================================

test log snippet boot parser 290

Home

[   84.768250] ==================================================================
[   84.770017] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xec/0x268
[   84.771398] Read of size 1 at addr ffff0000c5a160c8 by task kunit_try_catch/148
[   84.772586] 
[   84.773044] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.774374] Hardware name: linux,dummy-virt (DT)
[   84.775136] Call trace:
[   84.775675]  dump_backtrace+0x110/0x120
[   84.776744]  show_stack+0x18/0x28
[   84.777730]  dump_stack_lvl+0x68/0x84
[   84.778552]  print_report+0x158/0x4a4
[   84.779393]  kasan_report+0x98/0xe0
[   84.780178]  __asan_load1+0x68/0x78
[   84.780962]  kmem_cache_oob+0xec/0x268
[   84.781976]  kunit_try_run_case+0x7c/0x120
[   84.782843]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.783912]  kthread+0x1a4/0x1b8
[   84.784673]  ret_from_fork+0x10/0x20
[   84.785884] 
[   84.786263] Allocated by task 148:
[   84.786968]  kasan_save_stack+0x2c/0x58
[   84.787802]  kasan_set_track+0x2c/0x40
[   84.788625]  kasan_save_alloc_info+0x24/0x38
[   84.789710]  __kasan_slab_alloc+0x74/0x90
[   84.790579]  slab_post_alloc_hook+0x6c/0x260
[   84.791513]  kmem_cache_alloc+0x164/0x270
[   84.792411]  kmem_cache_oob+0xc8/0x268
[   84.793286]  kunit_try_run_case+0x7c/0x120
[   84.794189]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.795471]  kthread+0x1a4/0x1b8
[   84.796243]  ret_from_fork+0x10/0x20
[   84.797219] 
[   84.797530] The buggy address belongs to the object at ffff0000c5a16000
[   84.797530]  which belongs to the cache test_cache of size 200
[   84.799294] The buggy address is located 0 bytes to the right of
[   84.799294]  200-byte region [ffff0000c5a16000, ffff0000c5a160c8)
[   84.800946] 
[   84.801693] The buggy address belongs to the physical page:
[   84.802602] page:000000005cd87df9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a16
[   84.803999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.805466] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1485500
[   84.806685] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   84.807828] page dumped because: kasan: bad access detected
[   84.808713] 
[   84.809301] Memory state around the buggy address:
[   84.810257]  ffff0000c5a15f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.811398]  ffff0000c5a16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   84.812643] >ffff0000c5a16080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   84.813962]                                               ^
[   84.814930]  ffff0000c5a16100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.816063]  ffff0000c5a16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.817115] ==================================================================

test log snippet boot parser 291

Home

[   83.368479] ==================================================================
[   83.370127] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x11c/0x5c0
[   83.372067] Write of size 1 at addr ffff0000c42ae8c9 by task kunit_try_catch/129
[   83.373292] 
[   83.373655] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.375120] Hardware name: linux,dummy-virt (DT)
[   83.375929] Call trace:
[   83.376447]  dump_backtrace+0x110/0x120
[   83.377428]  show_stack+0x18/0x28
[   83.378263]  dump_stack_lvl+0x68/0x84
[   83.379317]  print_report+0x158/0x4a4
[   83.380182]  kasan_report+0x98/0xe0
[   83.380976]  __asan_store1+0x68/0x78
[   83.381968]  krealloc_less_oob_helper+0x11c/0x5c0
[   83.382937]  krealloc_less_oob+0x18/0x28
[   83.383803]  kunit_try_run_case+0x7c/0x120
[   83.384695]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.385941]  kthread+0x1a4/0x1b8
[   83.386725]  ret_from_fork+0x10/0x20
[   83.387538] 
[   83.387962] Allocated by task 129:
[   83.388608]  kasan_save_stack+0x2c/0x58
[   83.390030]  kasan_set_track+0x2c/0x40
[   83.390825]  kasan_save_alloc_info+0x24/0x38
[   83.391606]  __kasan_krealloc+0xec/0x120
[   83.392493]  krealloc+0x13c/0x178
[   83.393441]  krealloc_less_oob_helper+0xdc/0x5c0
[   83.394549]  krealloc_less_oob+0x18/0x28
[   83.395438]  kunit_try_run_case+0x7c/0x120
[   83.396337]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.397647]  kthread+0x1a4/0x1b8
[   83.398448]  ret_from_fork+0x10/0x20
[   83.399254] 
[   83.399655] The buggy address belongs to the object at ffff0000c42ae800
[   83.399655]  which belongs to the cache kmalloc-256 of size 256
[   83.401634] The buggy address is located 201 bytes inside of
[   83.401634]  256-byte region [ffff0000c42ae800, ffff0000c42ae900)
[   83.403272] 
[   83.403723] The buggy address belongs to the physical page:
[   83.404604] page:000000005560a1ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[   83.406251] head:000000005560a1ac order:1 compound_mapcount:0 compound_pincount:0
[   83.407373] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.408707] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.410586] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.411575] page dumped because: kasan: bad access detected
[   83.412667] 
[   83.413335] Memory state around the buggy address:
[   83.414150]  ffff0000c42ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.415328]  ffff0000c42ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.416481] >ffff0000c42ae880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   83.417772]                                               ^
[   83.418676]  ffff0000c42ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.419795]  ffff0000c42ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.420900] ==================================================================

test log snippet boot parser 292

Home

[   83.867610] ==================================================================
[   83.868550] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1fc/0x5c0
[   83.869976] Write of size 1 at addr ffff0000c59e60eb by task kunit_try_catch/131
[   83.871271] 
[   83.871702] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.873080] Hardware name: linux,dummy-virt (DT)
[   83.873793] Call trace:
[   83.874460]  dump_backtrace+0x110/0x120
[   83.875355]  show_stack+0x18/0x28
[   83.876277]  dump_stack_lvl+0x68/0x84
[   83.877093]  print_report+0x158/0x4a4
[   83.878045]  kasan_report+0x98/0xe0
[   83.878915]  __asan_store1+0x68/0x78
[   83.879703]  krealloc_less_oob_helper+0x1fc/0x5c0
[   83.880680]  krealloc_pagealloc_less_oob+0x18/0x28
[   83.881658]  kunit_try_run_case+0x7c/0x120
[   83.882568]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.883605]  kthread+0x1a4/0x1b8
[   83.884385]  ret_from_fork+0x10/0x20
[   83.885214] 
[   83.885675] The buggy address belongs to the physical page:
[   83.886562] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.887932] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.889051] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.890271] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.891463] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.892587] page dumped because: kasan: bad access detected
[   83.893472] 
[   83.893890] Memory state around the buggy address:
[   83.894667]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.895891]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.897039] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   83.898110]                                                           ^
[   83.899137]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.900252]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.901340] ==================================================================

test log snippet boot parser 293

Home

[   83.718572] ==================================================================
[   83.720252] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x11c/0x5c0
[   83.721547] Write of size 1 at addr ffff0000c59e60c9 by task kunit_try_catch/131
[   83.723403] 
[   83.723814] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.725304] Hardware name: linux,dummy-virt (DT)
[   83.726455] Call trace:
[   83.727237]  dump_backtrace+0x110/0x120
[   83.728250]  show_stack+0x18/0x28
[   83.729081]  dump_stack_lvl+0x68/0x84
[   83.729888]  print_report+0x158/0x4a4
[   83.730722]  kasan_report+0x98/0xe0
[   83.731498]  __asan_store1+0x68/0x78
[   83.732301]  krealloc_less_oob_helper+0x11c/0x5c0
[   83.733354]  krealloc_pagealloc_less_oob+0x18/0x28
[   83.734238]  kunit_try_run_case+0x7c/0x120
[   83.735357]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.736449]  kthread+0x1a4/0x1b8
[   83.737140]  ret_from_fork+0x10/0x20
[   83.737985] 
[   83.738382] The buggy address belongs to the physical page:
[   83.739302] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.740722] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.741911] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.743505] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.744844] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.746068] page dumped because: kasan: bad access detected
[   83.746974] 
[   83.747387] Memory state around the buggy address:
[   83.748194]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.749687]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.750887] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   83.752089]                                               ^
[   83.753034]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.754165]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.755240] ==================================================================

test log snippet boot parser 294

Home

[   83.526701] ==================================================================
[   83.527651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d0/0x5c0
[   83.529815] Write of size 1 at addr ffff0000c42ae8ea by task kunit_try_catch/129
[   83.530836] 
[   83.531293] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.532610] Hardware name: linux,dummy-virt (DT)
[   83.533484] Call trace:
[   83.534021]  dump_backtrace+0x110/0x120
[   83.535165]  show_stack+0x18/0x28
[   83.535911]  dump_stack_lvl+0x68/0x84
[   83.536725]  print_report+0x158/0x4a4
[   83.537762]  kasan_report+0x98/0xe0
[   83.538546]  __asan_store1+0x68/0x78
[   83.539333]  krealloc_less_oob_helper+0x1d0/0x5c0
[   83.540283]  krealloc_less_oob+0x18/0x28
[   83.541178]  kunit_try_run_case+0x7c/0x120
[   83.542089]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.543347]  kthread+0x1a4/0x1b8
[   83.544129]  ret_from_fork+0x10/0x20
[   83.544951] 
[   83.545577] Allocated by task 129:
[   83.546211]  kasan_save_stack+0x2c/0x58
[   83.547022]  kasan_set_track+0x2c/0x40
[   83.547802]  kasan_save_alloc_info+0x24/0x38
[   83.548680]  __kasan_krealloc+0xec/0x120
[   83.550187]  krealloc+0x13c/0x178
[   83.550990]  krealloc_less_oob_helper+0xdc/0x5c0
[   83.551935]  krealloc_less_oob+0x18/0x28
[   83.552807]  kunit_try_run_case+0x7c/0x120
[   83.553884]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.554925]  kthread+0x1a4/0x1b8
[   83.555672]  ret_from_fork+0x10/0x20
[   83.556478] 
[   83.556904] The buggy address belongs to the object at ffff0000c42ae800
[   83.556904]  which belongs to the cache kmalloc-256 of size 256
[   83.558799] The buggy address is located 234 bytes inside of
[   83.558799]  256-byte region [ffff0000c42ae800, ffff0000c42ae900)
[   83.560475] 
[   83.560944] The buggy address belongs to the physical page:
[   83.562113] page:000000005560a1ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[   83.563365] head:000000005560a1ac order:1 compound_mapcount:0 compound_pincount:0
[   83.564448] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.565971] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.567226] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.568377] page dumped because: kasan: bad access detected
[   83.569469] 
[   83.569777] Memory state around the buggy address:
[   83.570273]  ffff0000c42ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.570772]  ffff0000c42ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.571978] >ffff0000c42ae880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   83.573179]                                                           ^
[   83.574595]  ffff0000c42ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.575865]  ffff0000c42ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.577278] ==================================================================

test log snippet boot parser 295

Home

[   83.579050] ==================================================================
[   83.579954] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1fc/0x5c0
[   83.582119] Write of size 1 at addr ffff0000c42ae8eb by task kunit_try_catch/129
[   83.583234] 
[   83.583682] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.585260] Hardware name: linux,dummy-virt (DT)
[   83.586054] Call trace:
[   83.586600]  dump_backtrace+0x110/0x120
[   83.588442]  show_stack+0x18/0x28
[   83.589473]  dump_stack_lvl+0x68/0x84
[   83.590300]  print_report+0x158/0x4a4
[   83.591203]  kasan_report+0x98/0xe0
[   83.591999]  __asan_store1+0x68/0x78
[   83.592784]  krealloc_less_oob_helper+0x1fc/0x5c0
[   83.593946]  krealloc_less_oob+0x18/0x28
[   83.594818]  kunit_try_run_case+0x7c/0x120
[   83.595692]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.596730]  kthread+0x1a4/0x1b8
[   83.597677]  ret_from_fork+0x10/0x20
[   83.598502] 
[   83.598912] Allocated by task 129:
[   83.599568]  kasan_save_stack+0x2c/0x58
[   83.600381]  kasan_set_track+0x2c/0x40
[   83.601592]  kasan_save_alloc_info+0x24/0x38
[   83.602761]  __kasan_krealloc+0xec/0x120
[   83.603643]  krealloc+0x13c/0x178
[   83.604314]  krealloc_less_oob_helper+0xdc/0x5c0
[   83.605611]  krealloc_less_oob+0x18/0x28
[   83.606505]  kunit_try_run_case+0x7c/0x120
[   83.607421]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.608479]  kthread+0x1a4/0x1b8
[   83.609453]  ret_from_fork+0x10/0x20
[   83.610064] 
[   83.610720] The buggy address belongs to the object at ffff0000c42ae800
[   83.610720]  which belongs to the cache kmalloc-256 of size 256
[   83.612396] The buggy address is located 235 bytes inside of
[   83.612396]  256-byte region [ffff0000c42ae800, ffff0000c42ae900)
[   83.614342] 
[   83.614687] The buggy address belongs to the physical page:
[   83.615505] page:000000005560a1ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[   83.618367] head:000000005560a1ac order:1 compound_mapcount:0 compound_pincount:0
[   83.619599] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.620793] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.622088] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.623332] page dumped because: kasan: bad access detected
[   83.624290] 
[   83.624731] Memory state around the buggy address:
[   83.625630]  ffff0000c42ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.626774]  ffff0000c42ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.627934] >ffff0000c42ae880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   83.629168]                                                           ^
[   83.630429]  ffff0000c42ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.631634]  ffff0000c42ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.632709] ==================================================================

test log snippet boot parser 296

Home

[   83.794664] ==================================================================
[   83.795598] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a0/0x5c0
[   83.796951] Write of size 1 at addr ffff0000c59e60da by task kunit_try_catch/131
[   83.799121] 
[   83.799552] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.800880] Hardware name: linux,dummy-virt (DT)
[   83.801668] Call trace:
[   83.802202]  dump_backtrace+0x110/0x120
[   83.803124]  show_stack+0x18/0x28
[   83.803972]  dump_stack_lvl+0x68/0x84
[   83.804783]  print_report+0x158/0x4a4
[   83.806373]  kasan_report+0x98/0xe0
[   83.807146]  __asan_store1+0x68/0x78
[   83.807900]  krealloc_less_oob_helper+0x1a0/0x5c0
[   83.808881]  krealloc_pagealloc_less_oob+0x18/0x28
[   83.809800]  kunit_try_run_case+0x7c/0x120
[   83.810687]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.811743]  kthread+0x1a4/0x1b8
[   83.812508]  ret_from_fork+0x10/0x20
[   83.813350] 
[   83.813768] The buggy address belongs to the physical page:
[   83.815129] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.816470] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.817651] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.818891] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.820098] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.821217] page dumped because: kasan: bad access detected
[   83.822134] 
[   83.822566] Memory state around the buggy address:
[   83.823384]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.825543]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.826596] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   83.827614]                                                     ^
[   83.828590]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.829793]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.830890] ==================================================================

test log snippet boot parser 297

Home

[   83.757889] ==================================================================
[   83.758573] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5c0
[   83.759895] Write of size 1 at addr ffff0000c59e60d0 by task kunit_try_catch/131
[   83.760979] 
[   83.761530] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.763038] Hardware name: linux,dummy-virt (DT)
[   83.763882] Call trace:
[   83.764414]  dump_backtrace+0x110/0x120
[   83.765452]  show_stack+0x18/0x28
[   83.766790]  dump_stack_lvl+0x68/0x84
[   83.767621]  print_report+0x158/0x4a4
[   83.768472]  kasan_report+0x98/0xe0
[   83.769263]  __asan_store1+0x68/0x78
[   83.770067]  krealloc_less_oob_helper+0x150/0x5c0
[   83.771043]  krealloc_pagealloc_less_oob+0x18/0x28
[   83.772021]  kunit_try_run_case+0x7c/0x120
[   83.772897]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.773961]  kthread+0x1a4/0x1b8
[   83.774720]  ret_from_fork+0x10/0x20
[   83.776125] 
[   83.776559] The buggy address belongs to the physical page:
[   83.777428] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.778823] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.779970] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.781539] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.782816] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.783965] page dumped because: kasan: bad access detected
[   83.784834] 
[   83.785237] Memory state around the buggy address:
[   83.786078]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.787232]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.788362] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   83.789464]                                                  ^
[   83.790556]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.791681]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.793168] ==================================================================

test log snippet boot parser 298

Home

[   83.422785] ==================================================================
[   83.424698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5c0
[   83.426194] Write of size 1 at addr ffff0000c42ae8d0 by task kunit_try_catch/129
[   83.427313] 
[   83.427788] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.429153] Hardware name: linux,dummy-virt (DT)
[   83.430167] Call trace:
[   83.430674]  dump_backtrace+0x110/0x120
[   83.431568]  show_stack+0x18/0x28
[   83.432397]  dump_stack_lvl+0x68/0x84
[   83.433349]  print_report+0x158/0x4a4
[   83.433766]  kasan_report+0x98/0xe0
[   83.434191]  __asan_store1+0x68/0x78
[   83.434560]  krealloc_less_oob_helper+0x150/0x5c0
[   83.435038]  krealloc_less_oob+0x18/0x28
[   83.435453]  kunit_try_run_case+0x7c/0x120
[   83.435902]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.436658]  kthread+0x1a4/0x1b8
[   83.437711]  ret_from_fork+0x10/0x20
[   83.438617] 
[   83.439325] Allocated by task 129:
[   83.439990]  kasan_save_stack+0x2c/0x58
[   83.440796]  kasan_set_track+0x2c/0x40
[   83.441603]  kasan_save_alloc_info+0x24/0x38
[   83.442622]  __kasan_krealloc+0xec/0x120
[   83.443453]  krealloc+0x13c/0x178
[   83.444286]  krealloc_less_oob_helper+0xdc/0x5c0
[   83.445376]  krealloc_less_oob+0x18/0x28
[   83.446307]  kunit_try_run_case+0x7c/0x120
[   83.447062]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.448167]  kthread+0x1a4/0x1b8
[   83.448924]  ret_from_fork+0x10/0x20
[   83.449919] 
[   83.450319] The buggy address belongs to the object at ffff0000c42ae800
[   83.450319]  which belongs to the cache kmalloc-256 of size 256
[   83.452044] The buggy address is located 208 bytes inside of
[   83.452044]  256-byte region [ffff0000c42ae800, ffff0000c42ae900)
[   83.453874] 
[   83.454300] The buggy address belongs to the physical page:
[   83.455184] page:000000005560a1ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[   83.456709] head:000000005560a1ac order:1 compound_mapcount:0 compound_pincount:0
[   83.458148] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.459463] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.460706] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.462657] page dumped because: kasan: bad access detected
[   83.463436] 
[   83.463816] Memory state around the buggy address:
[   83.464643]  ffff0000c42ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.466052]  ffff0000c42ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.467171] >ffff0000c42ae880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   83.468256]                                                  ^
[   83.469249]  ffff0000c42ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.469758]  ffff0000c42ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.471051] ==================================================================

test log snippet boot parser 299

Home

[   83.832335] ==================================================================
[   83.833437] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d0/0x5c0
[   83.834682] Write of size 1 at addr ffff0000c59e60ea by task kunit_try_catch/131
[   83.835942] 
[   83.836378] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.837780] Hardware name: linux,dummy-virt (DT)
[   83.838585] Call trace:
[   83.839226]  dump_backtrace+0x110/0x120
[   83.840253]  show_stack+0x18/0x28
[   83.841285]  dump_stack_lvl+0x68/0x84
[   83.842135]  print_report+0x158/0x4a4
[   83.842997]  kasan_report+0x98/0xe0
[   83.843769]  __asan_store1+0x68/0x78
[   83.844565]  krealloc_less_oob_helper+0x1d0/0x5c0
[   83.845676]  krealloc_pagealloc_less_oob+0x18/0x28
[   83.846588]  kunit_try_run_case+0x7c/0x120
[   83.847584]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.848686]  kthread+0x1a4/0x1b8
[   83.849461]  ret_from_fork+0x10/0x20
[   83.850272] 
[   83.850653] The buggy address belongs to the physical page:
[   83.851506] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.852906] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.854050] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.855311] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.856515] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.857608] page dumped because: kasan: bad access detected
[   83.858500] 
[   83.858927] Memory state around the buggy address:
[   83.859769]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.860896]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.862037] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   83.863107]                                                           ^
[   83.864152]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.865305]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.866236] ==================================================================

test log snippet boot parser 300

Home

[   83.472903] ==================================================================
[   83.475033] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a0/0x5c0
[   83.476281] Write of size 1 at addr ffff0000c42ae8da by task kunit_try_catch/129
[   83.477453] 
[   83.478259] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.479669] Hardware name: linux,dummy-virt (DT)
[   83.480515] Call trace:
[   83.481140]  dump_backtrace+0x110/0x120
[   83.481928]  show_stack+0x18/0x28
[   83.482831]  dump_stack_lvl+0x68/0x84
[   83.483685]  print_report+0x158/0x4a4
[   83.484559]  kasan_report+0x98/0xe0
[   83.485588]  __asan_store1+0x68/0x78
[   83.486241]  krealloc_less_oob_helper+0x1a0/0x5c0
[   83.487311]  krealloc_less_oob+0x18/0x28
[   83.488203]  kunit_try_run_case+0x7c/0x120
[   83.489150]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.490103]  kthread+0x1a4/0x1b8
[   83.490906]  ret_from_fork+0x10/0x20
[   83.491745] 
[   83.492203] Allocated by task 129:
[   83.492796]  kasan_save_stack+0x2c/0x58
[   83.494248]  kasan_set_track+0x2c/0x40
[   83.495151]  kasan_save_alloc_info+0x24/0x38
[   83.496083]  __kasan_krealloc+0xec/0x120
[   83.496953]  krealloc+0x13c/0x178
[   83.497806]  krealloc_less_oob_helper+0xdc/0x5c0
[   83.498786]  krealloc_less_oob+0x18/0x28
[   83.499664]  kunit_try_run_case+0x7c/0x120
[   83.500538]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.501662]  kthread+0x1a4/0x1b8
[   83.502548]  ret_from_fork+0x10/0x20
[   83.503370] 
[   83.503795] The buggy address belongs to the object at ffff0000c42ae800
[   83.503795]  which belongs to the cache kmalloc-256 of size 256
[   83.505723] The buggy address is located 218 bytes inside of
[   83.505723]  256-byte region [ffff0000c42ae800, ffff0000c42ae900)
[   83.507527] 
[   83.508017] The buggy address belongs to the physical page:
[   83.508894] page:000000005560a1ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042ae
[   83.510470] head:000000005560a1ac order:1 compound_mapcount:0 compound_pincount:0
[   83.511624] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.512819] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.514146] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.515363] page dumped because: kasan: bad access detected
[   83.516411] 
[   83.517129] Memory state around the buggy address:
[   83.518084]  ffff0000c42ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.519347]  ffff0000c42ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.520361] >ffff0000c42ae880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   83.521463]                                                     ^
[   83.522436]  ffff0000c42ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.523605]  ffff0000c42ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.524688] ==================================================================

test log snippet boot parser 301

Home

[   83.259258] ==================================================================
[   83.260836] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x388
[   83.262262] Write of size 1 at addr ffff0000c57a66eb by task kunit_try_catch/128
[   83.263722] 
[   83.264214] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.265589] Hardware name: linux,dummy-virt (DT)
[   83.266345] Call trace:
[   83.267172]  dump_backtrace+0x110/0x120
[   83.268038]  show_stack+0x18/0x28
[   83.268880]  dump_stack_lvl+0x68/0x84
[   83.269807]  print_report+0x158/0x4a4
[   83.270660]  kasan_report+0x98/0xe0
[   83.271441]  __asan_store1+0x68/0x78
[   83.272228]  krealloc_more_oob_helper+0x144/0x388
[   83.273255]  krealloc_more_oob+0x18/0x28
[   83.274317]  kunit_try_run_case+0x7c/0x120
[   83.275226]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.276296]  kthread+0x1a4/0x1b8
[   83.277262]  ret_from_fork+0x10/0x20
[   83.278097] 
[   83.278549] Allocated by task 128:
[   83.279268]  kasan_save_stack+0x2c/0x58
[   83.280093]  kasan_set_track+0x2c/0x40
[   83.280906]  kasan_save_alloc_info+0x24/0x38
[   83.281808]  __kasan_krealloc+0xec/0x120
[   83.283054]  krealloc+0x13c/0x178
[   83.283718]  krealloc_more_oob_helper+0xdc/0x388
[   83.284744]  krealloc_more_oob+0x18/0x28
[   83.285866]  kunit_try_run_case+0x7c/0x120
[   83.286636]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.287711]  kthread+0x1a4/0x1b8
[   83.288465]  ret_from_fork+0x10/0x20
[   83.289496] 
[   83.289805] The buggy address belongs to the object at ffff0000c57a6600
[   83.289805]  which belongs to the cache kmalloc-256 of size 256
[   83.291867] The buggy address is located 235 bytes inside of
[   83.291867]  256-byte region [ffff0000c57a6600, ffff0000c57a6700)
[   83.293653] 
[   83.294229] The buggy address belongs to the physical page:
[   83.295165] page:0000000029e69e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a6
[   83.296511] head:0000000029e69e9f order:1 compound_mapcount:0 compound_pincount:0
[   83.297716] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.299282] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.300416] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.301813] page dumped because: kasan: bad access detected
[   83.302780] 
[   83.303191] Memory state around the buggy address:
[   83.304361]  ffff0000c57a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.305577]  ffff0000c57a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.306832] >ffff0000c57a6680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   83.307990]                                                           ^
[   83.309171]  ffff0000c57a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.310616]  ffff0000c57a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.311799] ==================================================================

test log snippet boot parser 302

Home

[   83.678835] ==================================================================
[   83.679671] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x178/0x388
[   83.680996] Write of size 1 at addr ffff0000c59e60f0 by task kunit_try_catch/130
[   83.682202] 
[   83.682552] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.684251] Hardware name: linux,dummy-virt (DT)
[   83.685439] Call trace:
[   83.686164]  dump_backtrace+0x110/0x120
[   83.687071]  show_stack+0x18/0x28
[   83.687910]  dump_stack_lvl+0x68/0x84
[   83.688748]  print_report+0x158/0x4a4
[   83.689797]  kasan_report+0x98/0xe0
[   83.690606]  __asan_store1+0x68/0x78
[   83.691472]  krealloc_more_oob_helper+0x178/0x388
[   83.692467]  krealloc_pagealloc_more_oob+0x18/0x28
[   83.693579]  kunit_try_run_case+0x7c/0x120
[   83.694367]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.694894]  kthread+0x1a4/0x1b8
[   83.695251]  ret_from_fork+0x10/0x20
[   83.695622] 
[   83.695817] The buggy address belongs to the physical page:
[   83.697137] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.698688] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.699991] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.701333] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.703025] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.704073] page dumped because: kasan: bad access detected
[   83.705363] 
[   83.705707] Memory state around the buggy address:
[   83.706535]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.707777]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.709061] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   83.710156]                                                              ^
[   83.711409]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.711940]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.712407] ==================================================================

test log snippet boot parser 303

Home

[   83.639187] ==================================================================
[   83.640707] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x388
[   83.642333] Write of size 1 at addr ffff0000c59e60eb by task kunit_try_catch/130
[   83.643822] 
[   83.644415] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.645664] Hardware name: linux,dummy-virt (DT)
[   83.646295] Call trace:
[   83.647126]  dump_backtrace+0x110/0x120
[   83.648207]  show_stack+0x18/0x28
[   83.649214]  dump_stack_lvl+0x68/0x84
[   83.650048]  print_report+0x158/0x4a4
[   83.650908]  kasan_report+0x98/0xe0
[   83.651677]  __asan_store1+0x68/0x78
[   83.652481]  krealloc_more_oob_helper+0x144/0x388
[   83.653622]  krealloc_pagealloc_more_oob+0x18/0x28
[   83.654601]  kunit_try_run_case+0x7c/0x120
[   83.655526]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.656599]  kthread+0x1a4/0x1b8
[   83.657584]  ret_from_fork+0x10/0x20
[   83.658387] 
[   83.658794] The buggy address belongs to the physical page:
[   83.659716] page:00000000bea130a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.661431] head:00000000bea130a8 order:2 compound_mapcount:0 compound_pincount:0
[   83.662772] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   83.664035] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   83.665439] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   83.666605] page dumped because: kasan: bad access detected
[   83.667499] 
[   83.667917] Memory state around the buggy address:
[   83.668727]  ffff0000c59e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.670158]  ffff0000c59e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.671221] >ffff0000c59e6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   83.672328]                                                           ^
[   83.673197]  ffff0000c59e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.674777]  ffff0000c59e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   83.676102] ==================================================================

test log snippet boot parser 304

Home

[   83.315178] ==================================================================
[   83.316279] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x178/0x388
[   83.317673] Write of size 1 at addr ffff0000c57a66f0 by task kunit_try_catch/128
[   83.318571] 
[   83.319060] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.320376] Hardware name: linux,dummy-virt (DT)
[   83.321200] Call trace:
[   83.321742]  dump_backtrace+0x110/0x120
[   83.322608]  show_stack+0x18/0x28
[   83.323422]  dump_stack_lvl+0x68/0x84
[   83.324233]  print_report+0x158/0x4a4
[   83.325030]  kasan_report+0x98/0xe0
[   83.325814]  __asan_store1+0x68/0x78
[   83.326596]  krealloc_more_oob_helper+0x178/0x388
[   83.327554]  krealloc_more_oob+0x18/0x28
[   83.328418]  kunit_try_run_case+0x7c/0x120
[   83.329297]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.330349]  kthread+0x1a4/0x1b8
[   83.331113]  ret_from_fork+0x10/0x20
[   83.331927] 
[   83.332330] Allocated by task 128:
[   83.332986]  kasan_save_stack+0x2c/0x58
[   83.333779]  kasan_set_track+0x2c/0x40
[   83.334568]  kasan_save_alloc_info+0x24/0x38
[   83.335449]  __kasan_krealloc+0xec/0x120
[   83.336274]  krealloc+0x13c/0x178
[   83.337039]  krealloc_more_oob_helper+0xdc/0x388
[   83.337961]  krealloc_more_oob+0x18/0x28
[   83.338813]  kunit_try_run_case+0x7c/0x120
[   83.339657]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.340677]  kthread+0x1a4/0x1b8
[   83.341444]  ret_from_fork+0x10/0x20
[   83.342229] 
[   83.342631] The buggy address belongs to the object at ffff0000c57a6600
[   83.342631]  which belongs to the cache kmalloc-256 of size 256
[   83.344281] The buggy address is located 240 bytes inside of
[   83.344281]  256-byte region [ffff0000c57a6600, ffff0000c57a6700)
[   83.345832] 
[   83.346300] The buggy address belongs to the physical page:
[   83.347180] page:0000000029e69e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a6
[   83.348536] head:0000000029e69e9f order:1 compound_mapcount:0 compound_pincount:0
[   83.349649] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.350959] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.352166] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.353272] page dumped because: kasan: bad access detected
[   83.354140] 
[   83.354522] Memory state around the buggy address:
[   83.355362]  ffff0000c57a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.356485]  ffff0000c57a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   83.357617] >ffff0000c57a6680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   83.358685]                                                              ^
[   83.359727]  ffff0000c57a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.360868]  ffff0000c57a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.361929] ==================================================================

test log snippet boot parser 305

Home

[   85.594497] ==================================================================
[   85.595931] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xf0/0x1e8
[   85.596964] Read of size 1 at addr ffff0000c5a19080 by task kunit_try_catch/156
[   85.599001] 
[   85.599413] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.600645] Hardware name: linux,dummy-virt (DT)
[   85.601495] Call trace:
[   85.601994]  dump_backtrace+0x110/0x120
[   85.602916]  show_stack+0x18/0x28
[   85.603772]  dump_stack_lvl+0x68/0x84
[   85.604621]  print_report+0x158/0x4a4
[   85.605746]  kasan_report+0x98/0xe0
[   85.606620]  __asan_load1+0x68/0x78
[   85.607312]  ksize_unpoisons_memory+0xf0/0x1e8
[   85.608338]  kunit_try_run_case+0x7c/0x120
[   85.609208]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.610382]  kthread+0x1a4/0x1b8
[   85.611157]  ret_from_fork+0x10/0x20
[   85.611979] 
[   85.612395] Allocated by task 156:
[   85.613146]  kasan_save_stack+0x2c/0x58
[   85.614200]  kasan_set_track+0x2c/0x40
[   85.615020]  kasan_save_alloc_info+0x24/0x38
[   85.615912]  __kasan_kmalloc+0xa0/0xb8
[   85.616714]  kmalloc_trace+0x50/0x68
[   85.617522]  ksize_unpoisons_memory+0xa8/0x1e8
[   85.618876]  kunit_try_run_case+0x7c/0x120
[   85.619562]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.620420]  kthread+0x1a4/0x1b8
[   85.622355]  ret_from_fork+0x10/0x20
[   85.624015] 
[   85.626072] The buggy address belongs to the object at ffff0000c5a19000
[   85.626072]  which belongs to the cache kmalloc-128 of size 128
[   85.628680] The buggy address is located 0 bytes to the right of
[   85.628680]  128-byte region [ffff0000c5a19000, ffff0000c5a19080)
[   85.631631] 
[   85.632424] The buggy address belongs to the physical page:
[   85.633485] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   85.636013] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   85.637381] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   85.639028] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   85.640199] page dumped because: kasan: bad access detected
[   85.641535] 
[   85.641941] Memory state around the buggy address:
[   85.642781]  ffff0000c5a18f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.644023]  ffff0000c5a19000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.645490] >ffff0000c5a19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.646497]                    ^
[   85.647170]  ffff0000c5a19100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.648348]  ffff0000c5a19180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.649532] ==================================================================

test log snippet boot parser 306

Home

[   86.075912] ==================================================================
[   86.077493] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78
[   86.078661] Read of size 1 at addr ffff0000c5a19518 by task kunit_try_catch/161
[   86.080698] 
[   86.081257] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.082568] Hardware name: linux,dummy-virt (DT)
[   86.083452] Call trace:
[   86.084073]  dump_backtrace+0x110/0x120
[   86.084975]  show_stack+0x18/0x28
[   86.085810]  dump_stack_lvl+0x68/0x84
[   86.086643]  print_report+0x158/0x4a4
[   86.087506]  kasan_report+0x98/0xe0
[   86.088325]  __asan_load1+0x68/0x78
[   86.089160]  memchr+0x28/0x78
[   86.089940]  kasan_memchr+0xe0/0x1f0
[   86.090773]  kunit_try_run_case+0x7c/0x120
[   86.091670]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.092734]  kthread+0x1a4/0x1b8
[   86.093536]  ret_from_fork+0x10/0x20
[   86.094379] 
[   86.094840] Allocated by task 161:
[   86.095602]  kasan_save_stack+0x2c/0x58
[   86.096437]  kasan_set_track+0x2c/0x40
[   86.097254]  kasan_save_alloc_info+0x24/0x38
[   86.098173]  __kasan_kmalloc+0xa0/0xb8
[   86.098979]  kmalloc_trace+0x50/0x68
[   86.099783]  kasan_memchr+0xa8/0x1f0
[   86.100602]  kunit_try_run_case+0x7c/0x120
[   86.101511]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.102556]  kthread+0x1a4/0x1b8
[   86.103344]  ret_from_fork+0x10/0x20
[   86.104148] 
[   86.104585] The buggy address belongs to the object at ffff0000c5a19500
[   86.104585]  which belongs to the cache kmalloc-128 of size 128
[   86.106293] The buggy address is located 24 bytes inside of
[   86.106293]  128-byte region [ffff0000c5a19500, ffff0000c5a19580)
[   86.107964] 
[   86.108415] The buggy address belongs to the physical page:
[   86.109331] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.110711] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.111986] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.113213] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.114376] page dumped because: kasan: bad access detected
[   86.115278] 
[   86.115677] Memory state around the buggy address:
[   86.116532]  ffff0000c5a19400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.117615]  ffff0000c5a19480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.118746] >ffff0000c5a19500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.119841]                             ^
[   86.120599]  ffff0000c5a19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.121738]  ffff0000c5a19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.122836] ==================================================================

test log snippet boot parser 307

Home

[   86.131741] ==================================================================
[   86.133117] BUG: KASAN: slab-out-of-bounds in memcmp+0x34/0xe0
[   86.134252] Read of size 1 at addr ffff0000c5a19618 by task kunit_try_catch/162
[   86.135325] 
[   86.135811] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.137192] Hardware name: linux,dummy-virt (DT)
[   86.138055] Call trace:
[   86.138621]  dump_backtrace+0x110/0x120
[   86.139544]  show_stack+0x18/0x28
[   86.140365]  dump_stack_lvl+0x68/0x84
[   86.141072]  print_report+0x158/0x4a4
[   86.141730]  kasan_report+0x98/0xe0
[   86.142312]  __asan_load1+0x68/0x78
[   86.142898]  memcmp+0x34/0xe0
[   86.143701]  kasan_memcmp+0x104/0x210
[   86.144438]  kunit_try_run_case+0x7c/0x120
[   86.145387]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.146515]  kthread+0x1a4/0x1b8
[   86.147295]  ret_from_fork+0x10/0x20
[   86.148010] 
[   86.148405] Allocated by task 162:
[   86.149084]  kasan_save_stack+0x2c/0x58
[   86.149912]  kasan_set_track+0x2c/0x40
[   86.151196]  kasan_save_alloc_info+0x24/0x38
[   86.152197]  __kasan_kmalloc+0xa0/0xb8
[   86.153050]  kmalloc_trace+0x50/0x68
[   86.153916]  kasan_memcmp+0xb8/0x210
[   86.154772]  kunit_try_run_case+0x7c/0x120
[   86.155646]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.156692]  kthread+0x1a4/0x1b8
[   86.157469]  ret_from_fork+0x10/0x20
[   86.158279] 
[   86.158675] The buggy address belongs to the object at ffff0000c5a19600
[   86.158675]  which belongs to the cache kmalloc-128 of size 128
[   86.160449] The buggy address is located 24 bytes inside of
[   86.160449]  128-byte region [ffff0000c5a19600, ffff0000c5a19680)
[   86.162097] 
[   86.162544] The buggy address belongs to the physical page:
[   86.163456] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.164876] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.166146] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.167377] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.168492] page dumped because: kasan: bad access detected
[   86.169418] 
[   86.169813] Memory state around the buggy address:
[   86.170635]  ffff0000c5a19500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.171804]  ffff0000c5a19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.172949] >ffff0000c5a19600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.174030]                             ^
[   86.174775]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.175930]  ffff0000c5a19700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.177021] ==================================================================

test log snippet boot parser 308

Home

[   85.450913] ==================================================================
[   85.452772] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc8/0x178
[   85.454147] Read of size 1 at addr ffff800008797dca by task kunit_try_catch/153
[   85.455199] 
[   85.455789] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.457229] Hardware name: linux,dummy-virt (DT)
[   85.458041] Call trace:
[   85.458573]  dump_backtrace+0x110/0x120
[   85.459587]  show_stack+0x18/0x28
[   85.460446]  dump_stack_lvl+0x68/0x84
[   85.461160]  print_report+0x158/0x4a4
[   85.462082]  kasan_report+0x98/0xe0
[   85.462911]  __asan_load1+0x68/0x78
[   85.463711]  kasan_stack_oob+0xc8/0x178
[   85.464559]  kunit_try_run_case+0x7c/0x120
[   85.465691]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.466723]  kthread+0x1a4/0x1b8
[   85.467505]  ret_from_fork+0x10/0x20
[   85.468318] 
[   85.468839] The buggy address belongs to stack of task kunit_try_catch/153
[   85.470037]  and is located at offset 234 in frame:
[   85.471136]  kasan_stack_oob+0x0/0x178
[   85.472105] 
[   85.472517] This frame has 4 objects:
[   85.473405]  [32, 33) '__assertion'
[   85.473578]  [96, 104) 'array'
[   85.474105]  [160, 176) '__assertion'
[   85.474836]  [224, 234) 'stack_array'
[   85.475704] 
[   85.476745] The buggy address belongs to the virtual mapping at
[   85.476745]  [ffff800008790000, ffff800008799000) created by:
[   85.476745]  kernel_clone+0xac/0x460
[   85.479198] 
[   85.479650] The buggy address belongs to the physical page:
[   85.480516] page:00000000109630c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a13
[   85.482128] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   85.483286] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   85.484930] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   85.486065] page dumped because: kasan: bad access detected
[   85.487139] 
[   85.487616] Memory state around the buggy address:
[   85.488473]  ffff800008797c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   85.490196]  ffff800008797d00: 01 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 f2 f2 f2 f2
[   85.491262] >ffff800008797d80: 00 00 f2 f2 f2 f2 f2 f2 00 02 f2 f2 00 00 00 00
[   85.492361]                                               ^
[   85.493486]  ffff800008797e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.494604]  ffff800008797e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   85.496066] ==================================================================

test log snippet boot parser 309

Home

[   87.542041] ==================================================================
[   87.543962] BUG: KASAN: use-after-free in kfree_sensitive+0x18/0x60
[   87.545120] Read of size 1 at addr ffff0000c5a95800 by task kunit_try_catch/166
[   87.546251] 
[   87.546745] CPU: 1 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.548888] Hardware name: linux,dummy-virt (DT)
[   87.550117] Call trace:
[   87.550746]  dump_backtrace+0x110/0x120
[   87.551631]  show_stack+0x18/0x28
[   87.552448]  dump_stack_lvl+0x68/0x84
[   87.553561]  print_report+0x158/0x4a4
[   87.554494]  kasan_report+0x98/0xe0
[   87.555370]  __kasan_check_byte+0x58/0x70
[   87.556238]  ksize+0x30/0x80
[   87.556970]  kfree_sensitive+0x18/0x60
[   87.557810]  kmalloc_double_kzfree+0xdc/0x1d8
[   87.558757]  kunit_try_run_case+0x7c/0x120
[   87.559664]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.560706]  kthread+0x1a4/0x1b8
[   87.561467]  ret_from_fork+0x10/0x20
[   87.562284] 
[   87.562728] Allocated by task 166:
[   87.563325]  kasan_save_stack+0x2c/0x58
[   87.564217]  kasan_set_track+0x2c/0x40
[   87.565165]  kasan_save_alloc_info+0x24/0x38
[   87.566064]  __kasan_kmalloc+0xa0/0xb8
[   87.566659]  kmalloc_trace+0x50/0x68
[   87.567499]  kmalloc_double_kzfree+0xa8/0x1d8
[   87.568419]  kunit_try_run_case+0x7c/0x120
[   87.569515]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.570570]  kthread+0x1a4/0x1b8
[   87.571127]  ret_from_fork+0x10/0x20
[   87.571995] 
[   87.572392] Freed by task 166:
[   87.573132]  kasan_save_stack+0x2c/0x58
[   87.573922]  kasan_set_track+0x2c/0x40
[   87.574707]  kasan_save_free_info+0x38/0x60
[   87.575595]  __kasan_slab_free+0xe8/0x158
[   87.576422]  __kmem_cache_free+0x138/0x2b0
[   87.577618]  kfree+0x5c/0x70
[   87.578269]  kfree_sensitive+0x4c/0x60
[   87.578911]  kmalloc_double_kzfree+0xc8/0x1d8
[   87.579799]  kunit_try_run_case+0x7c/0x120
[   87.580685]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.582019]  kthread+0x1a4/0x1b8
[   87.582780]  ret_from_fork+0x10/0x20
[   87.583595] 
[   87.584049] The buggy address belongs to the object at ffff0000c5a95800
[   87.584049]  which belongs to the cache kmalloc-128 of size 128
[   87.585920] The buggy address is located 0 bytes inside of
[   87.585920]  128-byte region [ffff0000c5a95800, ffff0000c5a95880)
[   87.587535] 
[   87.587804] The buggy address belongs to the physical page:
[   87.588685] page:00000000f566edea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a95
[   87.590405] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   87.591738] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   87.593318] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   87.594188] page dumped because: kasan: bad access detected
[   87.595202] 
[   87.595671] Memory state around the buggy address:
[   87.596628]  ffff0000c5a95700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.598154]  ffff0000c5a95780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.598668] >ffff0000c5a95800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   87.600008]                    ^
[   87.600735]  ffff0000c5a95880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.601951]  ffff0000c5a95900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.603822] ==================================================================

test log snippet boot parser 310

Home

[   83.070204] ==================================================================
[   83.071727] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xc8/0x1d0
[   83.072903] Read of size 1 at addr ffff0000c59e4000 by task kunit_try_catch/123
[   83.074420] 
[   83.074802] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.076151] Hardware name: linux,dummy-virt (DT)
[   83.077126] Call trace:
[   83.077662]  dump_backtrace+0x110/0x120
[   83.078568]  show_stack+0x18/0x28
[   83.079220]  dump_stack_lvl+0x68/0x84
[   83.080128]  print_report+0x158/0x4a4
[   83.081021]  kasan_report+0x98/0xe0
[   83.081823]  __asan_load1+0x68/0x78
[   83.082786]  kmalloc_pagealloc_uaf+0xc8/0x1d0
[   83.083736]  kunit_try_run_case+0x7c/0x120
[   83.084597]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.085870]  kthread+0x1a4/0x1b8
[   83.086656]  ret_from_fork+0x10/0x20
[   83.087627] 
[   83.087956] The buggy address belongs to the physical page:
[   83.088735] page:00000000bea130a8 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   83.090413] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   83.091718] raw: 0bfffc0000000000 fffffc0003167a08 ffff0000dac51f78 0000000000000000
[   83.092968] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   83.094117] page dumped because: kasan: bad access detected
[   83.095249] 
[   83.095565] Memory state around the buggy address:
[   83.096431]  ffff0000c59e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.097660]  ffff0000c59e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.098911] >ffff0000c59e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.100012]                    ^
[   83.100712]  ffff0000c59e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.102020]  ffff0000c59e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.103038] ==================================================================

test log snippet boot parser 311

Home

[   84.091606] ==================================================================
[   84.093125] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x110/0x278
[   84.094792] Read of size 16 at addr ffff0000c59a0500 by task kunit_try_catch/134
[   84.096022] 
[   84.096431] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.097904] Hardware name: linux,dummy-virt (DT)
[   84.098769] Call trace:
[   84.099382]  dump_backtrace+0x110/0x120
[   84.100300]  show_stack+0x18/0x28
[   84.101100]  dump_stack_lvl+0x68/0x84
[   84.101913]  print_report+0x158/0x4a4
[   84.102719]  kasan_report+0x98/0xe0
[   84.103715]  __asan_load16+0x7c/0xa8
[   84.104507]  kmalloc_uaf_16+0x110/0x278
[   84.105587]  kunit_try_run_case+0x7c/0x120
[   84.106466]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.107525]  kthread+0x1a4/0x1b8
[   84.108291]  ret_from_fork+0x10/0x20
[   84.109139] 
[   84.109540] Allocated by task 134:
[   84.110235]  kasan_save_stack+0x2c/0x58
[   84.111116]  kasan_set_track+0x2c/0x40
[   84.112218]  kasan_save_alloc_info+0x24/0x38
[   84.113500]  __kasan_kmalloc+0xa0/0xb8
[   84.114350]  kmalloc_trace+0x50/0x68
[   84.115131]  kmalloc_uaf_16+0xd4/0x278
[   84.115962]  kunit_try_run_case+0x7c/0x120
[   84.116818]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.118065]  kthread+0x1a4/0x1b8
[   84.118755]  ret_from_fork+0x10/0x20
[   84.119486] 
[   84.120865] Freed by task 134:
[   84.121368]  kasan_save_stack+0x2c/0x58
[   84.122032]  kasan_set_track+0x2c/0x40
[   84.122663]  kasan_save_free_info+0x38/0x60
[   84.124607]  __kasan_slab_free+0xe8/0x158
[   84.125561]  __kmem_cache_free+0x138/0x2b0
[   84.126465]  kfree+0x5c/0x70
[   84.128115]  kmalloc_uaf_16+0xf4/0x278
[   84.128812]  kunit_try_run_case+0x7c/0x120
[   84.132453]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.133969]  kthread+0x1a4/0x1b8
[   84.135499]  ret_from_fork+0x10/0x20
[   84.136359] 
[   84.136766] The buggy address belongs to the object at ffff0000c59a0500
[   84.136766]  which belongs to the cache kmalloc-128 of size 128
[   84.138990] The buggy address is located 0 bytes inside of
[   84.138990]  128-byte region [ffff0000c59a0500, ffff0000c59a0580)
[   84.140491] 
[   84.140935] The buggy address belongs to the physical page:
[   84.142321] page:0000000031c2c49d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[   84.143577] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.144905] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.146281] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.147427] page dumped because: kasan: bad access detected
[   84.148315] 
[   84.148705] Memory state around the buggy address:
[   84.149581]  ffff0000c59a0400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.150805]  ffff0000c59a0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.151894] >ffff0000c59a0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.152893]                    ^
[   84.153676]  ffff0000c59a0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.154933]  ffff0000c59a0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.156065] ==================================================================

test log snippet boot parser 312

Home

[   84.683502] ==================================================================
[   84.685093] BUG: KASAN: use-after-free in kmalloc_uaf2+0x110/0x298
[   84.686232] Read of size 1 at addr ffff0000c595fc28 by task kunit_try_catch/144
[   84.687534] 
[   84.688074] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.689825] Hardware name: linux,dummy-virt (DT)
[   84.691164] Call trace:
[   84.691745]  dump_backtrace+0x110/0x120
[   84.692622]  show_stack+0x18/0x28
[   84.693504]  dump_stack_lvl+0x68/0x84
[   84.694441]  print_report+0x158/0x4a4
[   84.695387]  kasan_report+0x98/0xe0
[   84.696202]  __asan_load1+0x68/0x78
[   84.697069]  kmalloc_uaf2+0x110/0x298
[   84.698025]  kunit_try_run_case+0x7c/0x120
[   84.698929]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.700080]  kthread+0x1a4/0x1b8
[   84.700845]  ret_from_fork+0x10/0x20
[   84.701778] 
[   84.702509] Allocated by task 144:
[   84.703230]  kasan_save_stack+0x2c/0x58
[   84.704044]  kasan_set_track+0x2c/0x40
[   84.704883]  kasan_save_alloc_info+0x24/0x38
[   84.705927]  __kasan_kmalloc+0xa0/0xb8
[   84.706792]  kmalloc_trace+0x50/0x68
[   84.707690]  kmalloc_uaf2+0xb4/0x298
[   84.708490]  kunit_try_run_case+0x7c/0x120
[   84.709677]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.710724]  kthread+0x1a4/0x1b8
[   84.711483]  ret_from_fork+0x10/0x20
[   84.712524] 
[   84.712940] Freed by task 144:
[   84.713539]  kasan_save_stack+0x2c/0x58
[   84.714388]  kasan_set_track+0x2c/0x40
[   84.715179]  kasan_save_free_info+0x38/0x60
[   84.716178]  __kasan_slab_free+0xe8/0x158
[   84.716690]  __kmem_cache_free+0x138/0x2b0
[   84.717818]  kfree+0x5c/0x70
[   84.718601]  kmalloc_uaf2+0xcc/0x298
[   84.719441]  kunit_try_run_case+0x7c/0x120
[   84.720315]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.721203]  kthread+0x1a4/0x1b8
[   84.722261]  ret_from_fork+0x10/0x20
[   84.723314] 
[   84.723691] The buggy address belongs to the object at ffff0000c595fc00
[   84.723691]  which belongs to the cache kmalloc-128 of size 128
[   84.725973] The buggy address is located 40 bytes inside of
[   84.725973]  128-byte region [ffff0000c595fc00, ffff0000c595fc80)
[   84.727569] 
[   84.728387] The buggy address belongs to the physical page:
[   84.729273] page:000000004f979b4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595f
[   84.731034] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.732506] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.734085] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.735187] page dumped because: kasan: bad access detected
[   84.736122] 
[   84.736585] Memory state around the buggy address:
[   84.737421]  ffff0000c595fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.738407]  ffff0000c595fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.739596] >ffff0000c595fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.741273]                                   ^
[   84.742023]  ffff0000c595fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.743365]  ffff0000c595fd00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   84.744504] ==================================================================

test log snippet boot parser 313

Home

[   84.547968] ==================================================================
[   84.549587] BUG: KASAN: use-after-free in kmalloc_uaf+0xdc/0x1e8
[   84.550977] Read of size 1 at addr ffff0000c595fa08 by task kunit_try_catch/142
[   84.552538] 
[   84.553132] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.554673] Hardware name: linux,dummy-virt (DT)
[   84.555559] Call trace:
[   84.555810]  dump_backtrace+0x110/0x120
[   84.556721]  show_stack+0x18/0x28
[   84.557638]  dump_stack_lvl+0x68/0x84
[   84.558639]  print_report+0x158/0x4a4
[   84.559495]  kasan_report+0x98/0xe0
[   84.560286]  __asan_load1+0x68/0x78
[   84.561092]  kmalloc_uaf+0xdc/0x1e8
[   84.561911]  kunit_try_run_case+0x7c/0x120
[   84.562780]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.564117]  kthread+0x1a4/0x1b8
[   84.564901]  ret_from_fork+0x10/0x20
[   84.566033] 
[   84.566446] Allocated by task 142:
[   84.567140]  kasan_save_stack+0x2c/0x58
[   84.567966]  kasan_set_track+0x2c/0x40
[   84.568743]  kasan_save_alloc_info+0x24/0x38
[   84.569800]  __kasan_kmalloc+0xa0/0xb8
[   84.570592]  kmalloc_trace+0x50/0x68
[   84.571200]  kmalloc_uaf+0xa8/0x1e8
[   84.571998]  kunit_try_run_case+0x7c/0x120
[   84.572901]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.574373]  kthread+0x1a4/0x1b8
[   84.575217]  ret_from_fork+0x10/0x20
[   84.576061] 
[   84.576556] Freed by task 142:
[   84.577590]  kasan_save_stack+0x2c/0x58
[   84.578461]  kasan_set_track+0x2c/0x40
[   84.579311]  kasan_save_free_info+0x38/0x60
[   84.580136]  __kasan_slab_free+0xe8/0x158
[   84.581004]  __kmem_cache_free+0x138/0x2b0
[   84.582343]  kfree+0x5c/0x70
[   84.582902]  kmalloc_uaf+0xc8/0x1e8
[   84.583682]  kunit_try_run_case+0x7c/0x120
[   84.584565]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.585622]  kthread+0x1a4/0x1b8
[   84.586679]  ret_from_fork+0x10/0x20
[   84.587480] 
[   84.587907] The buggy address belongs to the object at ffff0000c595fa00
[   84.587907]  which belongs to the cache kmalloc-128 of size 128
[   84.590197] The buggy address is located 8 bytes inside of
[   84.590197]  128-byte region [ffff0000c595fa00, ffff0000c595fa80)
[   84.591809] 
[   84.592252] The buggy address belongs to the physical page:
[   84.593259] page:000000004f979b4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595f
[   84.594597] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.596216] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.597448] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.598844] page dumped because: kasan: bad access detected
[   84.599601] 
[   84.600044] Memory state around the buggy address:
[   84.600885]  ffff0000c595f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.602102]  ffff0000c595f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.603425] >ffff0000c595fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.604456]                       ^
[   84.605468]  ffff0000c595fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.606577]  ffff0000c595fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.607735] ==================================================================

test log snippet boot parser 314

Home

[   84.613682] ==================================================================
[   84.615149] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xe4/0x1e8
[   84.616269] Write of size 33 at addr ffff0000c595fb00 by task kunit_try_catch/143
[   84.617374] 
[   84.617834] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   84.619410] Hardware name: linux,dummy-virt (DT)
[   84.620233] Call trace:
[   84.620777]  dump_backtrace+0x110/0x120
[   84.622160]  show_stack+0x18/0x28
[   84.622800]  dump_stack_lvl+0x68/0x84
[   84.623429]  print_report+0x158/0x4a4
[   84.626235]  kasan_report+0x98/0xe0
[   84.627252]  kasan_check_range+0x160/0x1d8
[   84.628101]  memset+0x3c/0x80
[   84.628844]  kmalloc_uaf_memset+0xe4/0x1e8
[   84.629688]  kunit_try_run_case+0x7c/0x120
[   84.630684]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.631963]  kthread+0x1a4/0x1b8
[   84.632775]  ret_from_fork+0x10/0x20
[   84.633604] 
[   84.634428] Allocated by task 143:
[   84.635063]  kasan_save_stack+0x2c/0x58
[   84.635838]  kasan_set_track+0x2c/0x40
[   84.636645]  kasan_save_alloc_info+0x24/0x38
[   84.637819]  __kasan_kmalloc+0xa0/0xb8
[   84.638616]  kmalloc_trace+0x50/0x68
[   84.639419]  kmalloc_uaf_memset+0xa8/0x1e8
[   84.640295]  kunit_try_run_case+0x7c/0x120
[   84.641219]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.642305]  kthread+0x1a4/0x1b8
[   84.643440]  ret_from_fork+0x10/0x20
[   84.644247] 
[   84.644653] Freed by task 143:
[   84.645599]  kasan_save_stack+0x2c/0x58
[   84.646594]  kasan_set_track+0x2c/0x40
[   84.647247]  kasan_save_free_info+0x38/0x60
[   84.647898]  __kasan_slab_free+0xe8/0x158
[   84.648838]  __kmem_cache_free+0x138/0x2b0
[   84.649778]  kfree+0x5c/0x70
[   84.650799]  kmalloc_uaf_memset+0xc8/0x1e8
[   84.651692]  kunit_try_run_case+0x7c/0x120
[   84.652565]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.654248]  kthread+0x1a4/0x1b8
[   84.655022]  ret_from_fork+0x10/0x20
[   84.655806] 
[   84.656218] The buggy address belongs to the object at ffff0000c595fb00
[   84.656218]  which belongs to the cache kmalloc-128 of size 128
[   84.657972] The buggy address is located 0 bytes inside of
[   84.657972]  128-byte region [ffff0000c595fb00, ffff0000c595fb80)
[   84.660004] 
[   84.660449] The buggy address belongs to the physical page:
[   84.661490] page:000000004f979b4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595f
[   84.662964] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   84.664445] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   84.666009] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.667036] page dumped because: kasan: bad access detected
[   84.667917] 
[   84.668332] Memory state around the buggy address:
[   84.669460]  ffff0000c595fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.670525]  ffff0000c595fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.671737] >ffff0000c595fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.672794]                    ^
[   84.674013]  ffff0000c595fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.675371]  ffff0000c595fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.676492] ==================================================================

test log snippet boot parser 315

Home

[   86.000610] ==================================================================
[   86.002258] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xe0/0x1c8
[   86.003636] Read of size 1 at addr ffff0000c1a7a600 by task kunit_try_catch/160
[   86.004886] 
[   86.005468] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.006745] Hardware name: linux,dummy-virt (DT)
[   86.007585] Call trace:
[   86.008117]  dump_backtrace+0x110/0x120
[   86.009108]  show_stack+0x18/0x28
[   86.009827]  dump_stack_lvl+0x68/0x84
[   86.010725]  print_report+0x158/0x4a4
[   86.011575]  kasan_report+0x98/0xe0
[   86.012373]  __kasan_check_byte+0x58/0x70
[   86.013304]  kmem_cache_destroy+0x34/0x178
[   86.014060]  kmem_cache_double_destroy+0xe0/0x1c8
[   86.015063]  kunit_try_run_case+0x7c/0x120
[   86.016005]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.017108]  kthread+0x1a4/0x1b8
[   86.018304]  ret_from_fork+0x10/0x20
[   86.019093] 
[   86.019526] Allocated by task 160:
[   86.020204]  kasan_save_stack+0x2c/0x58
[   86.021048]  kasan_set_track+0x2c/0x40
[   86.021777]  kasan_save_alloc_info+0x24/0x38
[   86.022692]  __kasan_slab_alloc+0x74/0x90
[   86.023575]  slab_post_alloc_hook+0x6c/0x260
[   86.024510]  kmem_cache_alloc+0x164/0x270
[   86.025622]  kmem_cache_create_usercopy+0x1ac/0x2c0
[   86.026609]  kmem_cache_create+0x1c/0x28
[   86.027447]  kmem_cache_double_destroy+0xac/0x1c8
[   86.028418]  kunit_try_run_case+0x7c/0x120
[   86.029452]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.030529]  kthread+0x1a4/0x1b8
[   86.031274]  ret_from_fork+0x10/0x20
[   86.032101] 
[   86.032501] Freed by task 160:
[   86.033121]  kasan_save_stack+0x2c/0x58
[   86.034131]  kasan_set_track+0x2c/0x40
[   86.034950]  kasan_save_free_info+0x38/0x60
[   86.035816]  __kasan_slab_free+0xe8/0x158
[   86.036676]  kmem_cache_free+0x1b0/0x3a0
[   86.038011]  slab_kmem_cache_release+0x30/0x40
[   86.038940]  kmem_cache_release+0x14/0x20
[   86.039815]  kobject_put+0xe0/0x188
[   86.040654]  sysfs_slab_release+0x28/0x38
[   86.041734]  kmem_cache_destroy+0xe0/0x178
[   86.042591]  kmem_cache_double_destroy+0xcc/0x1c8
[   86.043524]  kunit_try_run_case+0x7c/0x120
[   86.044435]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.045667]  kthread+0x1a4/0x1b8
[   86.046408]  ret_from_fork+0x10/0x20
[   86.047212] 
[   86.047688] The buggy address belongs to the object at ffff0000c1a7a600
[   86.047688]  which belongs to the cache kmem_cache of size 216
[   86.049283] The buggy address is located 0 bytes inside of
[   86.049283]  216-byte region [ffff0000c1a7a600, ffff0000c1a7a6d8)
[   86.051206] 
[   86.051627] The buggy address belongs to the physical page:
[   86.052565] page:0000000013b95d09 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7a
[   86.054131] head:0000000013b95d09 order:1 compound_mapcount:0 compound_pincount:0
[   86.055256] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   86.056553] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   86.058402] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   86.059425] page dumped because: kasan: bad access detected
[   86.060251] 
[   86.060944] Memory state around the buggy address:
[   86.062064]  ffff0000c1a7a500: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   86.063494]  ffff0000c1a7a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.064526] >ffff0000c1a7a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.065785]                    ^
[   86.066449]  ffff0000c1a7a680: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   86.067579]  ffff0000c1a7a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.068641] ==================================================================

test log snippet boot parser 316

Home

[   83.972811] ==================================================================
[   83.974121] BUG: KASAN: use-after-free in krealloc_uaf+0x118/0x2c8
[   83.975637] Read of size 1 at addr ffff0000c57a6800 by task kunit_try_catch/132
[   83.976998] 
[   83.977348] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.978986] Hardware name: linux,dummy-virt (DT)
[   83.979682] Call trace:
[   83.980266]  dump_backtrace+0x110/0x120
[   83.981218]  show_stack+0x18/0x28
[   83.981906]  dump_stack_lvl+0x68/0x84
[   83.982807]  print_report+0x158/0x4a4
[   83.983709]  kasan_report+0x98/0xe0
[   83.984489]  __asan_load1+0x68/0x78
[   83.985433]  krealloc_uaf+0x118/0x2c8
[   83.986447]  kunit_try_run_case+0x7c/0x120
[   83.987399]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.988457]  kthread+0x1a4/0x1b8
[   83.989474]  ret_from_fork+0x10/0x20
[   83.990043] 
[   83.990239] Allocated by task 132:
[   83.990533]  kasan_save_stack+0x2c/0x58
[   83.991004]  kasan_set_track+0x2c/0x40
[   83.992094]  kasan_save_alloc_info+0x24/0x38
[   83.993205]  __kasan_kmalloc+0xa0/0xb8
[   83.994063]  kmalloc_trace+0x50/0x68
[   83.995092]  krealloc_uaf+0xb0/0x2c8
[   83.995928]  kunit_try_run_case+0x7c/0x120
[   83.996791]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.998118]  kthread+0x1a4/0x1b8
[   83.998815]  ret_from_fork+0x10/0x20
[   83.999643] 
[   84.000062] Freed by task 132:
[   84.000684]  kasan_save_stack+0x2c/0x58
[   84.001524]  kasan_set_track+0x2c/0x40
[   84.002672]  kasan_save_free_info+0x38/0x60
[   84.003472]  __kasan_slab_free+0xe8/0x158
[   84.004342]  __kmem_cache_free+0x138/0x2b0
[   84.005600]  kfree+0x5c/0x70
[   84.006099]  krealloc_uaf+0xd0/0x2c8
[   84.006487]  kunit_try_run_case+0x7c/0x120
[   84.007739]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   84.008839]  kthread+0x1a4/0x1b8
[   84.009820]  ret_from_fork+0x10/0x20
[   84.010767] 
[   84.011262] The buggy address belongs to the object at ffff0000c57a6800
[   84.011262]  which belongs to the cache kmalloc-256 of size 256
[   84.012869] The buggy address is located 0 bytes inside of
[   84.012869]  256-byte region [ffff0000c57a6800, ffff0000c57a6900)
[   84.015049] 
[   84.015481] The buggy address belongs to the physical page:
[   84.016471] page:0000000029e69e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a6
[   84.018020] head:0000000029e69e9f order:1 compound_mapcount:0 compound_pincount:0
[   84.019295] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   84.020489] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   84.021760] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   84.022914] page dumped because: kasan: bad access detected
[   84.023770] 
[   84.024884] Memory state around the buggy address:
[   84.026127]  ffff0000c57a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.027273]  ffff0000c57a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.028403] >ffff0000c57a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.029873]                    ^
[   84.030263]  ffff0000c57a6880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.030752]  ffff0000c57a6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.031867] ==================================================================

test log snippet boot parser 317

Home

[   83.908118] ==================================================================
[   83.909697] BUG: KASAN: use-after-free in krealloc_uaf+0xec/0x2c8
[   83.910746] Read of size 1 at addr ffff0000c57a6800 by task kunit_try_catch/132
[   83.911832] 
[   83.912310] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.913628] Hardware name: linux,dummy-virt (DT)
[   83.914999] Call trace:
[   83.915552]  dump_backtrace+0x110/0x120
[   83.916437]  show_stack+0x18/0x28
[   83.917321]  dump_stack_lvl+0x68/0x84
[   83.918422]  print_report+0x158/0x4a4
[   83.919146]  kasan_report+0x98/0xe0
[   83.919933]  __kasan_check_byte+0x58/0x70
[   83.920755]  krealloc+0x48/0x178
[   83.921558]  krealloc_uaf+0xec/0x2c8
[   83.922394]  kunit_try_run_case+0x7c/0x120
[   83.923644]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.924682]  kthread+0x1a4/0x1b8
[   83.925485]  ret_from_fork+0x10/0x20
[   83.926257] 
[   83.926672] Allocated by task 132:
[   83.927298]  kasan_save_stack+0x2c/0x58
[   83.928152]  kasan_set_track+0x2c/0x40
[   83.928987]  kasan_save_alloc_info+0x24/0x38
[   83.929884]  __kasan_kmalloc+0xa0/0xb8
[   83.930626]  kmalloc_trace+0x50/0x68
[   83.931409]  krealloc_uaf+0xb0/0x2c8
[   83.932297]  kunit_try_run_case+0x7c/0x120
[   83.933468]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.934319]  kthread+0x1a4/0x1b8
[   83.935073]  ret_from_fork+0x10/0x20
[   83.935895] 
[   83.936300] Freed by task 132:
[   83.936932]  kasan_save_stack+0x2c/0x58
[   83.938577]  kasan_set_track+0x2c/0x40
[   83.939278]  kasan_save_free_info+0x38/0x60
[   83.940230]  __kasan_slab_free+0xe8/0x158
[   83.941009]  __kmem_cache_free+0x138/0x2b0
[   83.942146]  kfree+0x5c/0x70
[   83.942893]  krealloc_uaf+0xd0/0x2c8
[   83.943710]  kunit_try_run_case+0x7c/0x120
[   83.944596]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.945664]  kthread+0x1a4/0x1b8
[   83.946706]  ret_from_fork+0x10/0x20
[   83.947515] 
[   83.947932] The buggy address belongs to the object at ffff0000c57a6800
[   83.947932]  which belongs to the cache kmalloc-256 of size 256
[   83.950357] The buggy address is located 0 bytes inside of
[   83.950357]  256-byte region [ffff0000c57a6800, ffff0000c57a6900)
[   83.952147] 
[   83.952515] The buggy address belongs to the physical page:
[   83.953697] page:0000000029e69e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a6
[   83.955377] head:0000000029e69e9f order:1 compound_mapcount:0 compound_pincount:0
[   83.956569] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   83.957921] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   83.959479] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   83.960711] page dumped because: kasan: bad access detected
[   83.961814] 
[   83.962471] Memory state around the buggy address:
[   83.963281]  ffff0000c57a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.964465]  ffff0000c57a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.965724] >ffff0000c57a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.966824]                    ^
[   83.968191]  ffff0000c57a6880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.969764]  ffff0000c57a6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.970999] ==================================================================

test log snippet boot parser 318

Home

[   85.656326] ==================================================================
[   85.658430] BUG: KASAN: use-after-free in ksize_uaf+0xdc/0x320
[   85.659563] Read of size 1 at addr ffff0000c5a19100 by task kunit_try_catch/157
[   85.660693] 
[   85.661139] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.662605] Hardware name: linux,dummy-virt (DT)
[   85.663362] Call trace:
[   85.663894]  dump_backtrace+0x110/0x120
[   85.665036]  show_stack+0x18/0x28
[   85.666094]  dump_stack_lvl+0x68/0x84
[   85.666977]  print_report+0x158/0x4a4
[   85.667910]  kasan_report+0x98/0xe0
[   85.668677]  __kasan_check_byte+0x58/0x70
[   85.669566]  ksize+0x30/0x80
[   85.670512]  ksize_uaf+0xdc/0x320
[   85.671323]  kunit_try_run_case+0x7c/0x120
[   85.672215]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.673286]  kthread+0x1a4/0x1b8
[   85.674311]  ret_from_fork+0x10/0x20
[   85.675210] 
[   85.675614] Allocated by task 157:
[   85.676262]  kasan_save_stack+0x2c/0x58
[   85.677182]  kasan_set_track+0x2c/0x40
[   85.678258]  kasan_save_alloc_info+0x24/0x38
[   85.679166]  __kasan_kmalloc+0xa0/0xb8
[   85.679996]  kmalloc_trace+0x50/0x68
[   85.680796]  ksize_uaf+0xa8/0x320
[   85.681610]  kunit_try_run_case+0x7c/0x120
[   85.682776]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.683822]  kthread+0x1a4/0x1b8
[   85.684931]  ret_from_fork+0x10/0x20
[   85.686023] 
[   85.686410] Freed by task 157:
[   85.687063]  kasan_save_stack+0x2c/0x58
[   85.687879]  kasan_set_track+0x2c/0x40
[   85.688654]  kasan_save_free_info+0x38/0x60
[   85.690025]  __kasan_slab_free+0xe8/0x158
[   85.690886]  __kmem_cache_free+0x138/0x2b0
[   85.691683]  kfree+0x5c/0x70
[   85.692440]  ksize_uaf+0xc8/0x320
[   85.693296]  kunit_try_run_case+0x7c/0x120
[   85.694251]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.695412]  kthread+0x1a4/0x1b8
[   85.696163]  ret_from_fork+0x10/0x20
[   85.697725] 
[   85.698069] The buggy address belongs to the object at ffff0000c5a19100
[   85.698069]  which belongs to the cache kmalloc-128 of size 128
[   85.699752] The buggy address is located 0 bytes inside of
[   85.699752]  128-byte region [ffff0000c5a19100, ffff0000c5a19180)
[   85.701426] 
[   85.701896] The buggy address belongs to the physical page:
[   85.702777] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   85.704288] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   85.705978] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   85.707107] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   85.708192] page dumped because: kasan: bad access detected
[   85.709142] 
[   85.709557] Memory state around the buggy address:
[   85.710361]  ffff0000c5a19000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.711730]  ffff0000c5a19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.712927] >ffff0000c5a19100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.714157]                    ^
[   85.715355]  ffff0000c5a19180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.716568]  ffff0000c5a19200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.717579] ==================================================================

test log snippet boot parser 319

Home

[   85.721776] ==================================================================
[   85.722768] BUG: KASAN: use-after-free in ksize_uaf+0x100/0x320
[   85.723783] Read of size 1 at addr ffff0000c5a19100 by task kunit_try_catch/157
[   85.724904] 
[   85.726152] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.727578] Hardware name: linux,dummy-virt (DT)
[   85.728406] Call trace:
[   85.729124]  dump_backtrace+0x110/0x120
[   85.730135]  show_stack+0x18/0x28
[   85.730883]  dump_stack_lvl+0x68/0x84
[   85.731748]  print_report+0x158/0x4a4
[   85.732667]  kasan_report+0x98/0xe0
[   85.733462]  __asan_load1+0x68/0x78
[   85.734238]  ksize_uaf+0x100/0x320
[   85.735040]  kunit_try_run_case+0x7c/0x120
[   85.735923]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.736990]  kthread+0x1a4/0x1b8
[   85.737714]  ret_from_fork+0x10/0x20
[   85.738458] 
[   85.739001] Allocated by task 157:
[   85.739624]  kasan_save_stack+0x2c/0x58
[   85.740592]  kasan_set_track+0x2c/0x40
[   85.741352]  kasan_save_alloc_info+0x24/0x38
[   85.742177]  __kasan_kmalloc+0xa0/0xb8
[   85.743029]  kmalloc_trace+0x50/0x68
[   85.743799]  ksize_uaf+0xa8/0x320
[   85.744602]  kunit_try_run_case+0x7c/0x120
[   85.746102]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.747137]  kthread+0x1a4/0x1b8
[   85.747894]  ret_from_fork+0x10/0x20
[   85.748688] 
[   85.749101] Freed by task 157:
[   85.749708]  kasan_save_stack+0x2c/0x58
[   85.750510]  kasan_set_track+0x2c/0x40
[   85.751310]  kasan_save_free_info+0x38/0x60
[   85.752184]  __kasan_slab_free+0xe8/0x158
[   85.753710]  __kmem_cache_free+0x138/0x2b0
[   85.754690]  kfree+0x5c/0x70
[   85.755279]  ksize_uaf+0xc8/0x320
[   85.756199]  kunit_try_run_case+0x7c/0x120
[   85.757150]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.758145]  kthread+0x1a4/0x1b8
[   85.758911]  ret_from_fork+0x10/0x20
[   85.759691] 
[   85.760098] The buggy address belongs to the object at ffff0000c5a19100
[   85.760098]  which belongs to the cache kmalloc-128 of size 128
[   85.761825] The buggy address is located 0 bytes inside of
[   85.761825]  128-byte region [ffff0000c5a19100, ffff0000c5a19180)
[   85.764384] 
[   85.764825] The buggy address belongs to the physical page:
[   85.765686] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   85.767106] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   85.768372] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   85.769602] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   85.770752] page dumped because: kasan: bad access detected
[   85.772209] 
[   85.772719] Memory state around the buggy address:
[   85.773618]  ffff0000c5a19000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.774744]  ffff0000c5a19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.775890] >ffff0000c5a19100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.776974]                    ^
[   85.778086]  ffff0000c5a19180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.779224]  ffff0000c5a19200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.780326] ==================================================================

test log snippet boot parser 320

Home

[   85.782166] ==================================================================
[   85.783113] BUG: KASAN: use-after-free in ksize_uaf+0x128/0x320
[   85.784199] Read of size 1 at addr ffff0000c5a19178 by task kunit_try_catch/157
[   85.785423] 
[   85.786120] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   85.787438] Hardware name: linux,dummy-virt (DT)
[   85.788965] Call trace:
[   85.789488]  dump_backtrace+0x110/0x120
[   85.790484]  show_stack+0x18/0x28
[   85.791294]  dump_stack_lvl+0x68/0x84
[   85.792115]  print_report+0x158/0x4a4
[   85.792978]  kasan_report+0x98/0xe0
[   85.793756]  __asan_load1+0x68/0x78
[   85.794553]  ksize_uaf+0x128/0x320
[   85.795788]  kunit_try_run_case+0x7c/0x120
[   85.796738]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.797902]  kthread+0x1a4/0x1b8
[   85.798649]  ret_from_fork+0x10/0x20
[   85.799452] 
[   85.799888] Allocated by task 157:
[   85.800534]  kasan_save_stack+0x2c/0x58
[   85.801407]  kasan_set_track+0x2c/0x40
[   85.802208]  kasan_save_alloc_info+0x24/0x38
[   85.803734]  __kasan_kmalloc+0xa0/0xb8
[   85.804510]  kmalloc_trace+0x50/0x68
[   85.805340]  ksize_uaf+0xa8/0x320
[   85.806158]  kunit_try_run_case+0x7c/0x120
[   85.807041]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.808092]  kthread+0x1a4/0x1b8
[   85.808833]  ret_from_fork+0x10/0x20
[   85.809676] 
[   85.810650] Freed by task 157:
[   85.811245]  kasan_save_stack+0x2c/0x58
[   85.812065]  kasan_set_track+0x2c/0x40
[   85.812878]  kasan_save_free_info+0x38/0x60
[   85.813740]  __kasan_slab_free+0xe8/0x158
[   85.814571]  __kmem_cache_free+0x138/0x2b0
[   85.815504]  kfree+0x5c/0x70
[   85.816231]  ksize_uaf+0xc8/0x320
[   85.817013]  kunit_try_run_case+0x7c/0x120
[   85.817831]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   85.818972]  kthread+0x1a4/0x1b8
[   85.819747]  ret_from_fork+0x10/0x20
[   85.820877] 
[   85.821266] The buggy address belongs to the object at ffff0000c5a19100
[   85.821266]  which belongs to the cache kmalloc-128 of size 128
[   85.823070] The buggy address is located 120 bytes inside of
[   85.823070]  128-byte region [ffff0000c5a19100, ffff0000c5a19180)
[   85.824705] 
[   85.825342] The buggy address belongs to the physical page:
[   85.826214] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   85.827869] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   85.829736] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   85.830996] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   85.832076] page dumped because: kasan: bad access detected
[   85.832952] 
[   85.833348] Memory state around the buggy address:
[   85.834149]  ffff0000c5a19000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.835263]  ffff0000c5a19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.836824] >ffff0000c5a19100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   85.837928]                                                                 ^
[   85.838991]  ffff0000c5a19180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.840109]  ffff0000c5a19200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.841646] ==================================================================

test log snippet boot parser 321

Home

[   83.160197] ==================================================================
[   83.162080] BUG: KASAN: use-after-free in pagealloc_uaf+0xe8/0x208
[   83.163409] Read of size 1 at addr ffff0000c5a10000 by task kunit_try_catch/126
[   83.164720] 
[   83.165286] CPU: 1 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   83.166978] Hardware name: linux,dummy-virt (DT)
[   83.167840] Call trace:
[   83.168536]  dump_backtrace+0x110/0x120
[   83.169576]  show_stack+0x18/0x28
[   83.170241]  dump_stack_lvl+0x68/0x84
[   83.171136]  print_report+0x158/0x4a4
[   83.171971]  kasan_report+0x98/0xe0
[   83.172750]  __asan_load1+0x68/0x78
[   83.173555]  pagealloc_uaf+0xe8/0x208
[   83.174375]  kunit_try_run_case+0x7c/0x120
[   83.175286]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   83.176481]  kthread+0x1a4/0x1b8
[   83.177465]  ret_from_fork+0x10/0x20
[   83.178364] 
[   83.178931] The buggy address belongs to the physical page:
[   83.179832] page:0000000019000686 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a10
[   83.181626] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   83.183010] raw: 0bfffc0000000000 ffff0000ff7f59a0 ffff0000ff7f59a0 0000000000000000
[   83.184252] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[   83.185706] page dumped because: kasan: bad access detected
[   83.186645] 
[   83.187085] Memory state around the buggy address:
[   83.188007]  ffff0000c5a0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.189139]  ffff0000c5a0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.190738] >ffff0000c5a10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.191822]                    ^
[   83.192446]  ffff0000c5a10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.193951]  ffff0000c5a10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   83.194910] ==================================================================

test log snippet boot parser 322

Home

[   86.184526] ==================================================================
[   86.186157] BUG: KASAN: use-after-free in strchr+0x1c/0x78
[   86.187330] Read of size 1 at addr ffff0000c5a19710 by task kunit_try_catch/163
[   86.188422] 
[   86.188934] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.190560] Hardware name: linux,dummy-virt (DT)
[   86.191499] Call trace:
[   86.192044]  dump_backtrace+0x110/0x120
[   86.192860]  show_stack+0x18/0x28
[   86.193734]  dump_stack_lvl+0x68/0x84
[   86.194577]  print_report+0x158/0x4a4
[   86.195428]  kasan_report+0x98/0xe0
[   86.196199]  __asan_load1+0x68/0x78
[   86.197031]  strchr+0x1c/0x78
[   86.197775]  kasan_strings+0xe4/0x4e0
[   86.198621]  kunit_try_run_case+0x7c/0x120
[   86.199524]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.200565]  kthread+0x1a4/0x1b8
[   86.201399]  ret_from_fork+0x10/0x20
[   86.202214] 
[   86.202621] Allocated by task 163:
[   86.203564]  kasan_save_stack+0x2c/0x58
[   86.204397]  kasan_set_track+0x2c/0x40
[   86.205519]  kasan_save_alloc_info+0x24/0x38
[   86.206424]  __kasan_kmalloc+0xa0/0xb8
[   86.207462]  kmalloc_trace+0x50/0x68
[   86.208251]  kasan_strings+0xa8/0x4e0
[   86.209515]  kunit_try_run_case+0x7c/0x120
[   86.210441]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.211515]  kthread+0x1a4/0x1b8
[   86.212285]  ret_from_fork+0x10/0x20
[   86.213107] 
[   86.213515] Freed by task 163:
[   86.214177]  kasan_save_stack+0x2c/0x58
[   86.215042]  kasan_set_track+0x2c/0x40
[   86.215824]  kasan_save_free_info+0x38/0x60
[   86.216745]  __kasan_slab_free+0xe8/0x158
[   86.217617]  __kmem_cache_free+0x138/0x2b0
[   86.218507]  kfree+0x5c/0x70
[   86.219208]  kasan_strings+0xc8/0x4e0
[   86.220028]  kunit_try_run_case+0x7c/0x120
[   86.220947]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.222012]  kthread+0x1a4/0x1b8
[   86.222767]  ret_from_fork+0x10/0x20
[   86.223575] 
[   86.224061] The buggy address belongs to the object at ffff0000c5a19700
[   86.224061]  which belongs to the cache kmalloc-128 of size 128
[   86.225812] The buggy address is located 16 bytes inside of
[   86.225812]  128-byte region [ffff0000c5a19700, ffff0000c5a19780)
[   86.227530] 
[   86.228041] The buggy address belongs to the physical page:
[   86.229019] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.230433] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.231738] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.233015] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.234176] page dumped because: kasan: bad access detected
[   86.235098] 
[   86.235530] Memory state around the buggy address:
[   86.236483]  ffff0000c5a19600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.237620]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.238795] >ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.239893]                          ^
[   86.240645]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.241799]  ffff0000c5a19800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.242917] ==================================================================

test log snippet boot parser 323

Home

[   86.307798] ==================================================================
[   86.308749] BUG: KASAN: use-after-free in strcmp+0x2c/0x78
[   86.310497] Read of size 1 at addr ffff0000c5a19710 by task kunit_try_catch/163
[   86.311662] 
[   86.312248] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.313658] Hardware name: linux,dummy-virt (DT)
[   86.314512] Call trace:
[   86.315110]  dump_backtrace+0x110/0x120
[   86.315997]  show_stack+0x18/0x28
[   86.316828]  dump_stack_lvl+0x68/0x84
[   86.317909]  print_report+0x158/0x4a4
[   86.319238]  kasan_report+0x98/0xe0
[   86.320040]  __asan_load1+0x68/0x78
[   86.320870]  strcmp+0x2c/0x78
[   86.321625]  kasan_strings+0x144/0x4e0
[   86.322474]  kunit_try_run_case+0x7c/0x120
[   86.323368]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.324415]  kthread+0x1a4/0x1b8
[   86.325208]  ret_from_fork+0x10/0x20
[   86.326059] 
[   86.326475] Allocated by task 163:
[   86.327149]  kasan_save_stack+0x2c/0x58
[   86.328279]  kasan_set_track+0x2c/0x40
[   86.329029]  kasan_save_alloc_info+0x24/0x38
[   86.329901]  __kasan_kmalloc+0xa0/0xb8
[   86.330725]  kmalloc_trace+0x50/0x68
[   86.331525]  kasan_strings+0xa8/0x4e0
[   86.332435]  kunit_try_run_case+0x7c/0x120
[   86.333876]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.335109]  kthread+0x1a4/0x1b8
[   86.335745]  ret_from_fork+0x10/0x20
[   86.336548] 
[   86.336994] Freed by task 163:
[   86.337618]  kasan_save_stack+0x2c/0x58
[   86.338452]  kasan_set_track+0x2c/0x40
[   86.339254]  kasan_save_free_info+0x38/0x60
[   86.340112]  __kasan_slab_free+0xe8/0x158
[   86.340970]  __kmem_cache_free+0x138/0x2b0
[   86.341821]  kfree+0x5c/0x70
[   86.342564]  kasan_strings+0xc8/0x4e0
[   86.343936]  kunit_try_run_case+0x7c/0x120
[   86.344806]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.345816]  kthread+0x1a4/0x1b8
[   86.346588]  ret_from_fork+0x10/0x20
[   86.347402] 
[   86.347783] The buggy address belongs to the object at ffff0000c5a19700
[   86.347783]  which belongs to the cache kmalloc-128 of size 128
[   86.350249] The buggy address is located 16 bytes inside of
[   86.350249]  128-byte region [ffff0000c5a19700, ffff0000c5a19780)
[   86.351910] 
[   86.352321] The buggy address belongs to the physical page:
[   86.353210] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.354641] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.355867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.357106] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.358249] page dumped because: kasan: bad access detected
[   86.359174] 
[   86.359604] Memory state around the buggy address:
[   86.360420]  ffff0000c5a19600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.361886]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.363051] >ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.364153]                          ^
[   86.364898]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.366029]  ffff0000c5a19800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.367105] ==================================================================

test log snippet boot parser 324

Home

[   86.430051] ==================================================================
[   86.431146] BUG: KASAN: use-after-free in strlen+0x18/0x68
[   86.432388] Read of size 1 at addr ffff0000c5a19710 by task kunit_try_catch/163
[   86.433389] 
[   86.433840] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.435164] Hardware name: linux,dummy-virt (DT)
[   86.435978] Call trace:
[   86.436542]  dump_backtrace+0x110/0x120
[   86.437540]  show_stack+0x18/0x28
[   86.438316]  dump_stack_lvl+0x68/0x84
[   86.439083]  print_report+0x158/0x4a4
[   86.440038]  kasan_report+0x98/0xe0
[   86.440906]  __asan_load1+0x68/0x78
[   86.441728]  strlen+0x18/0x68
[   86.442539]  kasan_strings+0x19c/0x4e0
[   86.443394]  kunit_try_run_case+0x7c/0x120
[   86.444279]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.445374]  kthread+0x1a4/0x1b8
[   86.446169]  ret_from_fork+0x10/0x20
[   86.447030] 
[   86.447442] Allocated by task 163:
[   86.448059]  kasan_save_stack+0x2c/0x58
[   86.448766]  kasan_set_track+0x2c/0x40
[   86.449692]  kasan_save_alloc_info+0x24/0x38
[   86.450669]  __kasan_kmalloc+0xa0/0xb8
[   86.451574]  kmalloc_trace+0x50/0x68
[   86.452367]  kasan_strings+0xa8/0x4e0
[   86.453211]  kunit_try_run_case+0x7c/0x120
[   86.454073]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.455156]  kthread+0x1a4/0x1b8
[   86.455930]  ret_from_fork+0x10/0x20
[   86.456745] 
[   86.457166] Freed by task 163:
[   86.457819]  kasan_save_stack+0x2c/0x58
[   86.458629]  kasan_set_track+0x2c/0x40
[   86.459403]  kasan_save_free_info+0x38/0x60
[   86.460422]  __kasan_slab_free+0xe8/0x158
[   86.461315]  __kmem_cache_free+0x138/0x2b0
[   86.462208]  kfree+0x5c/0x70
[   86.463093]  kasan_strings+0xc8/0x4e0
[   86.463999]  kunit_try_run_case+0x7c/0x120
[   86.464894]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.465914]  kthread+0x1a4/0x1b8
[   86.466641]  ret_from_fork+0x10/0x20
[   86.467430] 
[   86.467844] The buggy address belongs to the object at ffff0000c5a19700
[   86.467844]  which belongs to the cache kmalloc-128 of size 128
[   86.469523] The buggy address is located 16 bytes inside of
[   86.469523]  128-byte region [ffff0000c5a19700, ffff0000c5a19780)
[   86.471303] 
[   86.471729] The buggy address belongs to the physical page:
[   86.473183] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.474417] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.475658] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.476970] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.478596] page dumped because: kasan: bad access detected
[   86.479762] 
[   86.480165] Memory state around the buggy address:
[   86.481003]  ffff0000c5a19600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.482179]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.483314] >ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.484416]                          ^
[   86.485174]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.486227]  ffff0000c5a19800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.487218] ==================================================================

test log snippet boot parser 325

Home

[   86.370998] ==================================================================
[   86.371981] BUG: KASAN: use-after-free in strncmp+0x30/0xe0
[   86.373034] Read of size 1 at addr ffff0000c5a19710 by task kunit_try_catch/163
[   86.374266] 
[   86.374659] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.375996] Hardware name: linux,dummy-virt (DT)
[   86.376766] Call trace:
[   86.377370]  dump_backtrace+0x110/0x120
[   86.378290]  show_stack+0x18/0x28
[   86.379029]  dump_stack_lvl+0x68/0x84
[   86.379668]  print_report+0x158/0x4a4
[   86.380532]  kasan_report+0x98/0xe0
[   86.381376]  __asan_load1+0x68/0x78
[   86.382177]  strncmp+0x30/0xe0
[   86.382984]  kasan_strings+0x174/0x4e0
[   86.383811]  kunit_try_run_case+0x7c/0x120
[   86.384695]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.385806]  kthread+0x1a4/0x1b8
[   86.386592]  ret_from_fork+0x10/0x20
[   86.387907] 
[   86.388529] Allocated by task 163:
[   86.389218]  kasan_save_stack+0x2c/0x58
[   86.390043]  kasan_set_track+0x2c/0x40
[   86.390835]  kasan_save_alloc_info+0x24/0x38
[   86.391732]  __kasan_kmalloc+0xa0/0xb8
[   86.392529]  kmalloc_trace+0x50/0x68
[   86.393549]  kasan_strings+0xa8/0x4e0
[   86.394596]  kunit_try_run_case+0x7c/0x120
[   86.395138]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.395624]  kthread+0x1a4/0x1b8
[   86.395991]  ret_from_fork+0x10/0x20
[   86.396354] 
[   86.396543] Freed by task 163:
[   86.396829]  kasan_save_stack+0x2c/0x58
[   86.397686]  kasan_set_track+0x2c/0x40
[   86.398440]  kasan_save_free_info+0x38/0x60
[   86.399560]  __kasan_slab_free+0xe8/0x158
[   86.400447]  __kmem_cache_free+0x138/0x2b0
[   86.401410]  kfree+0x5c/0x70
[   86.402374]  kasan_strings+0xc8/0x4e0
[   86.403328]  kunit_try_run_case+0x7c/0x120
[   86.404292]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.405489]  kthread+0x1a4/0x1b8
[   86.406293]  ret_from_fork+0x10/0x20
[   86.407124] 
[   86.407558] The buggy address belongs to the object at ffff0000c5a19700
[   86.407558]  which belongs to the cache kmalloc-128 of size 128
[   86.409982] The buggy address is located 16 bytes inside of
[   86.409982]  128-byte region [ffff0000c5a19700, ffff0000c5a19780)
[   86.411774] 
[   86.412230] The buggy address belongs to the physical page:
[   86.413093] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.414510] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.415741] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.416948] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.418281] page dumped because: kasan: bad access detected
[   86.419588] 
[   86.419992] Memory state around the buggy address:
[   86.420786]  ffff0000c5a19600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.422142]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.423357] >ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.424516]                          ^
[   86.425747]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.427019]  ffff0000c5a19800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.428121] ==================================================================

test log snippet boot parser 326

Home

[   86.489536] ==================================================================
[   86.491381] BUG: KASAN: use-after-free in strnlen+0x20/0x90
[   86.492422] Read of size 1 at addr ffff0000c5a19710 by task kunit_try_catch/163
[   86.493810] 
[   86.494232] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.495350] Hardware name: linux,dummy-virt (DT)
[   86.496271] Call trace:
[   86.496885]  dump_backtrace+0x110/0x120
[   86.497741]  show_stack+0x18/0x28
[   86.498537]  dump_stack_lvl+0x68/0x84
[   86.499405]  print_report+0x158/0x4a4
[   86.500241]  kasan_report+0x98/0xe0
[   86.501041]  __asan_load1+0x68/0x78
[   86.501798]  strnlen+0x20/0x90
[   86.502596]  kasan_strings+0x1c8/0x4e0
[   86.503439]  kunit_try_run_case+0x7c/0x120
[   86.504320]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.505370]  kthread+0x1a4/0x1b8
[   86.506127]  ret_from_fork+0x10/0x20
[   86.506945] 
[   86.507416] Allocated by task 163:
[   86.508120]  kasan_save_stack+0x2c/0x58
[   86.508964]  kasan_set_track+0x2c/0x40
[   86.509749]  kasan_save_alloc_info+0x24/0x38
[   86.510641]  __kasan_kmalloc+0xa0/0xb8
[   86.511453]  kmalloc_trace+0x50/0x68
[   86.512279]  kasan_strings+0xa8/0x4e0
[   86.513100]  kunit_try_run_case+0x7c/0x120
[   86.513989]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.515056]  kthread+0x1a4/0x1b8
[   86.515805]  ret_from_fork+0x10/0x20
[   86.516606] 
[   86.517107] Freed by task 163:
[   86.517662]  kasan_save_stack+0x2c/0x58
[   86.518492]  kasan_set_track+0x2c/0x40
[   86.519296]  kasan_save_free_info+0x38/0x60
[   86.520186]  __kasan_slab_free+0xe8/0x158
[   86.521038]  __kmem_cache_free+0x138/0x2b0
[   86.521948]  kfree+0x5c/0x70
[   86.522627]  kasan_strings+0xc8/0x4e0
[   86.523447]  kunit_try_run_case+0x7c/0x120
[   86.524333]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.525348]  kthread+0x1a4/0x1b8
[   86.526089]  ret_from_fork+0x10/0x20
[   86.526884] 
[   86.527286] The buggy address belongs to the object at ffff0000c5a19700
[   86.527286]  which belongs to the cache kmalloc-128 of size 128
[   86.528966] The buggy address is located 16 bytes inside of
[   86.528966]  128-byte region [ffff0000c5a19700, ffff0000c5a19780)
[   86.530608] 
[   86.531057] The buggy address belongs to the physical page:
[   86.531970] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.533336] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.534596] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.535813] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.536978] page dumped because: kasan: bad access detected
[   86.537872] 
[   86.538248] Memory state around the buggy address:
[   86.539151]  ffff0000c5a19600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.540315]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.541459] >ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.542537]                          ^
[   86.543254]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.544406]  ffff0000c5a19800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.545498] ==================================================================

test log snippet boot parser 327

Home

[   86.247215] ==================================================================
[   86.248181] BUG: KASAN: use-after-free in strrchr+0x28/0x58
[   86.249251] Read of size 1 at addr ffff0000c5a19710 by task kunit_try_catch/163
[   86.250294] 
[   86.250514] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   86.251466] Hardware name: linux,dummy-virt (DT)
[   86.252384] Call trace:
[   86.252993]  dump_backtrace+0x110/0x120
[   86.253978]  show_stack+0x18/0x28
[   86.254809]  dump_stack_lvl+0x68/0x84
[   86.255632]  print_report+0x158/0x4a4
[   86.256561]  kasan_report+0x98/0xe0
[   86.257358]  __asan_load1+0x68/0x78
[   86.258321]  strrchr+0x28/0x58
[   86.259290]  kasan_strings+0x110/0x4e0
[   86.260175]  kunit_try_run_case+0x7c/0x120
[   86.261087]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.262157]  kthread+0x1a4/0x1b8
[   86.262950]  ret_from_fork+0x10/0x20
[   86.263780] 
[   86.264240] Allocated by task 163:
[   86.264943]  kasan_save_stack+0x2c/0x58
[   86.266070]  kasan_set_track+0x2c/0x40
[   86.266981]  kasan_save_alloc_info+0x24/0x38
[   86.267981]  __kasan_kmalloc+0xa0/0xb8
[   86.268792]  kmalloc_trace+0x50/0x68
[   86.269637]  kasan_strings+0xa8/0x4e0
[   86.270478]  kunit_try_run_case+0x7c/0x120
[   86.271370]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.272444]  kthread+0x1a4/0x1b8
[   86.273608]  ret_from_fork+0x10/0x20
[   86.274365] 
[   86.274882] Freed by task 163:
[   86.275586]  kasan_save_stack+0x2c/0x58
[   86.276504]  kasan_set_track+0x2c/0x40
[   86.277377]  kasan_save_free_info+0x38/0x60
[   86.278304]  __kasan_slab_free+0xe8/0x158
[   86.279182]  __kmem_cache_free+0x138/0x2b0
[   86.280106]  kfree+0x5c/0x70
[   86.280829]  kasan_strings+0xc8/0x4e0
[   86.282298]  kunit_try_run_case+0x7c/0x120
[   86.282719]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   86.283817]  kthread+0x1a4/0x1b8
[   86.284737]  ret_from_fork+0x10/0x20
[   86.285558] 
[   86.285908] The buggy address belongs to the object at ffff0000c5a19700
[   86.285908]  which belongs to the cache kmalloc-128 of size 128
[   86.287682] The buggy address is located 16 bytes inside of
[   86.287682]  128-byte region [ffff0000c5a19700, ffff0000c5a19780)
[   86.289385] 
[   86.289818] The buggy address belongs to the physical page:
[   86.291377] page:0000000049ef1fbd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a19
[   86.292836] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   86.294108] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   86.295336] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   86.296432] page dumped because: kasan: bad access detected
[   86.297424] 
[   86.297843] Memory state around the buggy address:
[   86.298680]  ffff0000c5a19600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.300390]  ffff0000c5a19680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.301549] >ffff0000c5a19700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   86.302669]                          ^
[   86.303419]  ffff0000c5a19780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.304586]  ffff0000c5a19800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.305723] ==================================================================

test log snippet boot parser 328

Home

[   87.720702] ==================================================================
[   87.721737] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x100/0x328
[   87.723508] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/168
[   87.724824] 
[   87.725491] CPU: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.727051] Hardware name: linux,dummy-virt (DT)
[   87.727945] Call trace:
[   87.728546]  dump_backtrace+0x110/0x120
[   87.729464]  show_stack+0x18/0x28
[   87.730402]  dump_stack_lvl+0x68/0x84
[   87.731217]  print_report+0x158/0x4a4
[   87.732052]  kasan_report+0x98/0xe0
[   87.732843]  __asan_load1+0x68/0x78
[   87.733673]  vmalloc_oob+0x100/0x328
[   87.734498]  kunit_try_run_case+0x7c/0x120
[   87.735405]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.736461]  kthread+0x1a4/0x1b8
[   87.737313]  ret_from_fork+0x10/0x20
[   87.738216] 
[   87.738666] The buggy address belongs to the virtual mapping at
[   87.738666]  [ffff8000080fb000, ffff8000080fd000) created by:
[   87.738666]  vmalloc_oob+0x94/0x328
[   87.740749] 
[   87.741296] The buggy address belongs to the physical page:
[   87.742279] page:00000000e722e1b5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aa0
[   87.744326] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   87.745822] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   87.747144] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   87.748336] page dumped because: kasan: bad access detected
[   87.749572] 
[   87.749996] Memory state around the buggy address:
[   87.750691]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   87.751842]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   87.752992] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   87.754163]                                                                 ^
[   87.755301]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   87.756280]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   87.757591] ==================================================================

test log snippet boot parser 329

Home

[   87.681566] ==================================================================
[   87.683771] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x328
[   87.684987] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/168
[   87.686173] 
[   87.687009] CPU: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   87.688202] Hardware name: linux,dummy-virt (DT)
[   87.689135] Call trace:
[   87.689758]  dump_backtrace+0x110/0x120
[   87.690694]  show_stack+0x18/0x28
[   87.691403]  dump_stack_lvl+0x68/0x84
[   87.692281]  print_report+0x158/0x4a4
[   87.693238]  kasan_report+0x98/0xe0
[   87.694092]  __asan_load1+0x68/0x78
[   87.694878]  vmalloc_oob+0xd8/0x328
[   87.695708]  kunit_try_run_case+0x7c/0x120
[   87.696594]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   87.697891]  kthread+0x1a4/0x1b8
[   87.698666]  ret_from_fork+0x10/0x20
[   87.699490] 
[   87.699935] The buggy address belongs to the virtual mapping at
[   87.699935]  [ffff8000080fb000, ffff8000080fd000) created by:
[   87.699935]  vmalloc_oob+0x94/0x328
[   87.702332] 
[   87.702699] The buggy address belongs to the physical page:
[   87.703581] page:00000000e722e1b5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aa0
[   87.704956] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   87.706504] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   87.707882] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   87.709195] page dumped because: kasan: bad access detected
[   87.710001] 
[   87.710313] Memory state around the buggy address:
[   87.711107]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   87.712439]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   87.713953] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   87.715047]                                                              ^
[   87.716253]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   87.717719]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   87.718739] ==================================================================

test log snippet boot parser 330

Home

[  130.097710] ==================================================================
[  130.098652] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[  130.099517] Read of size 1 at addr f9e9be1f by task kunit_try_catch/209
[  130.100091] 
[  130.100365] CPU: 1 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.101177] Hardware name: Generic DT based system
[  130.101783]  unwind_backtrace from show_stack+0x18/0x1c
[  130.102392]  show_stack from dump_stack_lvl+0x58/0x70
[  130.103093]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.103690]  print_report from kasan_report+0xb0/0xe4
[  130.104386]  kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[  130.105109]  kasan_alloca_oob_left from kunit_try_run_case+0x80/0x108
[  130.105821]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.106843]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.108318]  kthread from ret_from_fork+0x14/0x30
[  130.108893] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[  130.109512] bfa0:                                     00000000 00000000 00000000 00000000
[  130.110213] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.110995] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.111561] 
[  130.111856] The buggy address belongs to stack of task kunit_try_catch/209
[  130.112438] 
[  130.112735] The buggy address belongs to the virtual mapping at
[  130.112735]  [f9e98000, f9e9d000) created by:
[  130.112735]  kernel_clone+0xcc/0x4b0
[  130.113997] 
[  130.114251] The buggy address belongs to the physical page:
[  130.114827] page:903da6dc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fbb6
[  130.115490] flags: 0x80000000(zone=2)
[  130.116067] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  130.116769] raw: 00000000
[  130.117144] page dumped because: kasan: bad access detected
[  130.117753] 
[  130.118013] Memory state around the buggy address:
[  130.118462]  f9e9bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.119115]  f9e9bd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.119848] >f9e9be00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00
[  130.120528]                     ^
[  130.120937]  f9e9be80: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[  130.121513]  f9e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.122149] ==================================================================

test log snippet boot parser 331

Home

[  130.128261] ==================================================================
[  130.129205] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1d8
[  130.129966] Read of size 1 at addr f9ea3e2a by task kunit_try_catch/210
[  130.130578] 
[  130.130866] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.131610] Hardware name: Generic DT based system
[  130.132115]  unwind_backtrace from show_stack+0x18/0x1c
[  130.132693]  show_stack from dump_stack_lvl+0x58/0x70
[  130.133362]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.134063]  print_report from kasan_report+0xb0/0xe4
[  130.134582]  kasan_report from kasan_alloca_oob_right+0xfc/0x1d8
[  130.135375]  kasan_alloca_oob_right from kunit_try_run_case+0x80/0x108
[  130.136164]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.137162]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.138510]  kthread from ret_from_fork+0x14/0x30
[  130.138977] Exception stack(0xf9ea3fb0 to 0xf9ea3ff8)
[  130.139597] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.140433] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.141312] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.141857] 
[  130.142141] The buggy address belongs to stack of task kunit_try_catch/210
[  130.142873] 
[  130.143147] The buggy address belongs to the virtual mapping at
[  130.143147]  [f9ea0000, f9ea5000) created by:
[  130.143147]  kernel_clone+0xcc/0x4b0
[  130.144370] 
[  130.144644] The buggy address belongs to the physical page:
[  130.145125] page:f24da615 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fbba
[  130.145973] flags: 0x80000000(zone=2)
[  130.146655] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  130.147495] raw: 00000000
[  130.147982] page dumped because: kasan: bad access detected
[  130.148620] 
[  130.148930] Memory state around the buggy address:
[  130.149518]  f9ea3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.150286]  f9ea3d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.150966] >f9ea3e00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00
[  130.151978]                           ^
[  130.152401]  f9ea3e80: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[  130.152994]  f9ea3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.153583] ==================================================================

test log snippet boot parser 332

Home

[  131.164366] ==================================================================
[  131.165233] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd4/0x1cc
[  131.165909] Free of addr c5ac2800 by task kunit_try_catch/222
[  131.167533] 
[  131.167804] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.168403] Hardware name: Generic DT based system
[  131.168818]  unwind_backtrace from show_stack+0x18/0x1c
[  131.169834]  show_stack from dump_stack_lvl+0x58/0x70
[  131.170757]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.171317]  print_report from kasan_report_invalid_free+0x98/0xc4
[  131.172063]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  131.172777]  __kasan_slab_free from __kmem_cache_free+0x140/0x2ac
[  131.173540]  __kmem_cache_free from kmalloc_double_kzfree+0xd4/0x1cc
[  131.174366]  kmalloc_double_kzfree from kunit_try_run_case+0x80/0x108
[  131.175070]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.176057]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.177048]  kthread from ret_from_fork+0x14/0x30
[  131.177663] Exception stack(0xf9f03fb0 to 0xf9f03ff8)
[  131.178142] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.178968] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.179754] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.180339] 
[  131.180610] Allocated by task 222:
[  131.180961]  __kasan_kmalloc+0x8c/0x94
[  131.181476]  kmalloc_double_kzfree+0xa0/0x1cc
[  131.181929]  kunit_try_run_case+0x80/0x108
[  131.182497]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.183141]  kthread+0x148/0x16c
[  131.183616]  ret_from_fork+0x14/0x30
[  131.184084] 
[  131.184303] Freed by task 222:
[  131.184714]  kasan_save_free_info+0x30/0x3c
[  131.185293]  __kasan_slab_free+0xdc/0x124
[  131.185775]  __kmem_cache_free+0x140/0x2ac
[  131.186315]  kmalloc_double_kzfree+0xc0/0x1cc
[  131.187115]  kunit_try_run_case+0x80/0x108
[  131.187711]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.188245]  kthread+0x148/0x16c
[  131.188734]  ret_from_fork+0x14/0x30
[  131.189232] 
[  131.189497] The buggy address belongs to the object at c5ac2800
[  131.189497]  which belongs to the cache kmalloc-64 of size 64
[  131.190322] The buggy address is located 0 bytes inside of
[  131.190322]  64-byte region [c5ac2800, c5ac2840)
[  131.191341] 
[  131.191610] The buggy address belongs to the physical page:
[  131.192897] page:ccf8751e refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ac2
[  131.193584] flags: 0x200(slab|zone=0)
[  131.194151] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  131.194891] raw: 00000000
[  131.195264] page dumped because: kasan: bad access detected
[  131.195814] 
[  131.196102] Memory state around the buggy address:
[  131.196794]  c5ac2700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.197444]  c5ac2780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.197974] >c5ac2800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.198679]            ^
[  131.199065]  c5ac2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.199695]  c5ac2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.200290] ==================================================================

test log snippet boot parser 333

Home

[  130.317195] ==================================================================
[  130.318756] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x234
[  130.319504] Free of addr c5abd000 by task kunit_try_catch/213
[  130.320032] 
[  130.320309] CPU: 1 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.321078] Hardware name: Generic DT based system
[  130.321470]  unwind_backtrace from show_stack+0x18/0x1c
[  130.322195]  show_stack from dump_stack_lvl+0x58/0x70
[  130.322842]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.323528]  print_report from kasan_report_invalid_free+0x98/0xc4
[  130.324239]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  130.324969]  __kasan_slab_free from kmem_cache_free+0x170/0x420
[  130.325672]  kmem_cache_free from kmem_cache_double_free+0xe4/0x234
[  130.326442]  kmem_cache_double_free from kunit_try_run_case+0x80/0x108
[  130.327538]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.328248]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.329228]  kthread from ret_from_fork+0x14/0x30
[  130.329776] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[  130.330332] bfa0:                                     00000000 00000000 00000000 00000000
[  130.331077] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.331752] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.332462] 
[  130.332737] Allocated by task 213:
[  130.333051]  __kasan_slab_alloc+0x60/0x68
[  130.333597]  kmem_cache_alloc+0x188/0x53c
[  130.334093]  kmem_cache_double_free+0xb0/0x234
[  130.334643]  kunit_try_run_case+0x80/0x108
[  130.335212]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.335916]  kthread+0x148/0x16c
[  130.336310]  ret_from_fork+0x14/0x30
[  130.337535] 
[  130.337815] Freed by task 213:
[  130.338221]  kasan_save_free_info+0x30/0x3c
[  130.338945]  __kasan_slab_free+0xdc/0x124
[  130.339442]  kmem_cache_free+0x170/0x420
[  130.339977]  kmem_cache_double_free+0xcc/0x234
[  130.340434]  kunit_try_run_case+0x80/0x108
[  130.341200]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.341827]  kthread+0x148/0x16c
[  130.342246]  ret_from_fork+0x14/0x30
[  130.342743] 
[  130.343004] The buggy address belongs to the object at c5abd000
[  130.343004]  which belongs to the cache test_cache of size 200
[  130.344475] The buggy address is located 0 bytes inside of
[  130.344475]  200-byte region [c5abd000, c5abd0c8)
[  130.345461] 
[  130.345739] The buggy address belongs to the physical page:
[  130.346327] page:a760510b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abd
[  130.346997] flags: 0x200(slab|zone=0)
[  130.347555] raw: 00000200 00000000 00000122 c5ab6300 00000000 800f000f ffffffff 00000001
[  130.348308] raw: 00000000
[  130.348691] page dumped because: kasan: bad access detected
[  130.349132] 
[  130.349399] Memory state around the buggy address:
[  130.349966]  c5abcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.350585]  c5abcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.351315] >c5abd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.351830]            ^
[  130.352211]  c5abd080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  130.352938]  c5abd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.353493] ==================================================================

test log snippet boot parser 334

Home

[  130.028421] ==================================================================
[  130.029391] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x14c
[  130.030162] Read of size 1 at addr c41286ad by task kunit_try_catch/206
[  130.030821] 
[  130.031056] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.031842] Hardware name: Generic DT based system
[  130.032401]  unwind_backtrace from show_stack+0x18/0x1c
[  130.033162]  show_stack from dump_stack_lvl+0x58/0x70
[  130.033779]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.034473]  print_report from kasan_report+0xb0/0xe4
[  130.035124]  kasan_report from kasan_global_oob_right+0xa0/0x14c
[  130.036014]  kasan_global_oob_right from kunit_try_run_case+0x80/0x108
[  130.036980]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.037868]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.038770]  kthread from ret_from_fork+0x14/0x30
[  130.039351] Exception stack(0xf9e83fb0 to 0xf9e83ff8)
[  130.039904] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.040690] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.041485] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.042144] 
[  130.042470] The buggy address belongs to the variable:
[  130.043005]  global_array+0xd/0x40
[  130.043592] 
[  130.043897] The buggy address belongs to the physical page:
[  130.044412] page:72a013cf refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44128
[  130.045220] flags: 0x1000(reserved|zone=0)
[  130.045869] raw: 00001000 e9c6b9a4 e9c6b9a4 00000000 00000000 00000000 ffffffff 00000001
[  130.046670] raw: 00000000
[  130.047408] page dumped because: kasan: bad access detected
[  130.048193] 
[  130.048693] Memory state around the buggy address:
[  130.049239]  c4128580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.049804]  c4128600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.050512] >c4128680: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[  130.051132]                           ^
[  130.051544]  c4128700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[  130.052216]  c4128780: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 04
[  130.052812] ==================================================================

test log snippet boot parser 335

Home

[  128.287813] ==================================================================
[  128.288842] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x19c
[  128.289543] Free of addr c8e54001 by task kunit_try_catch/179
[  128.290166] 
[  128.290447] CPU: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.291205] Hardware name: Generic DT based system
[  128.291676]  unwind_backtrace from show_stack+0x18/0x1c
[  128.292382]  show_stack from dump_stack_lvl+0x58/0x70
[  128.292907]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.293587]  print_report from kasan_report_invalid_free+0x98/0xc4
[  128.294216]  kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[  128.295000]  free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x19c
[  128.295787]  kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x80/0x108
[  128.296662]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.297455]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.298173]  kthread from ret_from_fork+0x14/0x30
[  128.298681] Exception stack(0xf9dc3fb0 to 0xf9dc3ff8)
[  128.299293] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.300168] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.301021] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.301731] 
[  128.301963] The buggy address belongs to the physical page:
[  128.302470] page:d4694e46 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e54
[  128.303256] head:d4694e46 order:2 compound_mapcount:0 compound_pincount:0
[  128.303888] flags: 0x10000(head|zone=0)
[  128.304377] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.305210] raw: 00000000
[  128.305573] page dumped because: kasan: bad access detected
[  128.306110] 
[  128.306371] Memory state around the buggy address:
[  128.307476]  c8e53f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.308200]  c8e53f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.308905] >c8e54000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.309357]            ^
[  128.309655]  c8e54080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.310368]  c8e54100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.311089] ==================================================================

test log snippet boot parser 336

Home

[  130.368376] ==================================================================
[  130.369587] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x230
[  130.370310] Free of addr c5abe001 by task kunit_try_catch/214
[  130.370945] 
[  130.371241] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.372071] Hardware name: Generic DT based system
[  130.372672]  unwind_backtrace from show_stack+0x18/0x1c
[  130.373312]  show_stack from dump_stack_lvl+0x58/0x70
[  130.373929]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.374530]  print_report from kasan_report_invalid_free+0x98/0xc4
[  130.375325]  kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[  130.376137]  __kasan_slab_free from kmem_cache_free+0x170/0x420
[  130.376882]  kmem_cache_free from kmem_cache_invalid_free+0xd8/0x230
[  130.377603]  kmem_cache_invalid_free from kunit_try_run_case+0x80/0x108
[  130.378380]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.379346]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.380216]  kthread from ret_from_fork+0x14/0x30
[  130.380850] Exception stack(0xf9ec3fb0 to 0xf9ec3ff8)
[  130.381351] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.382057] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.382878] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.383581] 
[  130.383838] Allocated by task 214:
[  130.384268]  __kasan_slab_alloc+0x60/0x68
[  130.384757]  kmem_cache_alloc+0x188/0x53c
[  130.385285]  kmem_cache_invalid_free+0xb0/0x230
[  130.385919]  kunit_try_run_case+0x80/0x108
[  130.386354]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.387830]  kthread+0x148/0x16c
[  130.388262]  ret_from_fork+0x14/0x30
[  130.388688] 
[  130.388892] The buggy address belongs to the object at c5abe000
[  130.388892]  which belongs to the cache test_cache of size 200
[  130.390035] The buggy address is located 1 bytes inside of
[  130.390035]  200-byte region [c5abe000, c5abe0c8)
[  130.390910] 
[  130.391144] The buggy address belongs to the physical page:
[  130.391776] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.392539] flags: 0x200(slab|zone=0)
[  130.393071] raw: 00000200 00000000 00000122 c5ab6400 00000000 800f000f ffffffff 00000001
[  130.393763] raw: 00000000
[  130.394135] page dumped because: kasan: bad access detected
[  130.394713] 
[  130.394931] Memory state around the buggy address:
[  130.395455]  c5abdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.396157]  c5abdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.396863] >c5abe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.397425]            ^
[  130.397816]  c5abe080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  130.398326]  c5abe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.399010] ==================================================================

test log snippet boot parser 337

Home

[  129.149532] ==================================================================
[  129.150672] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe8/0x1e0
[  129.151514] Read of size 4294967294 at addr c8e90604 by task kunit_try_catch/195
[  129.152292] 
[  129.152572] CPU: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.153311] Hardware name: Generic DT based system
[  129.153758]  unwind_backtrace from show_stack+0x18/0x1c
[  129.154534]  show_stack from dump_stack_lvl+0x58/0x70
[  129.155257]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.155906]  print_report from kasan_report+0xb0/0xe4
[  129.156592]  kasan_report from kasan_check_range+0x148/0x194
[  129.157492]  kasan_check_range from memmove+0x28/0x68
[  129.158255]  memmove from kmalloc_memmove_negative_size+0xe8/0x1e0
[  129.159352]  kmalloc_memmove_negative_size from kunit_try_run_case+0x80/0x108
[  129.160226]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.161117]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.161923]  kthread from ret_from_fork+0x14/0x30
[  129.162535] Exception stack(0xf9e33fb0 to 0xf9e33ff8)
[  129.163070] 3fa0:                                     00000000 00000000 00000000 00000000
[  129.163896] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.164675] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.165389] 
[  129.165676] Allocated by task 195:
[  129.166138]  __kasan_kmalloc+0x8c/0x94
[  129.167185]  kmalloc_memmove_negative_size+0xa0/0x1e0
[  129.167701]  kunit_try_run_case+0x80/0x108
[  129.168128]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.168599]  kthread+0x148/0x16c
[  129.169235]  ret_from_fork+0x14/0x30
[  129.169791] 
[  129.170105] The buggy address belongs to the object at c8e90600
[  129.170105]  which belongs to the cache kmalloc-64 of size 64
[  129.171379] The buggy address is located 4 bytes inside of
[  129.171379]  64-byte region [c8e90600, c8e90640)
[  129.172518] 
[  129.172854] The buggy address belongs to the physical page:
[  129.173537] page:7a23107e refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e90
[  129.174422] flags: 0x200(slab|zone=0)
[  129.175121] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  129.175879] raw: 00000000
[  129.176224] page dumped because: kasan: bad access detected
[  129.177345] 
[  129.178238] Memory state around the buggy address:
[  129.178721]  c8e90500: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  129.179397]  c8e90580: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.180143] >c8e90600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  129.180875]            ^
[  129.181207]  c8e90680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.181949]  c8e90700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.182572] ==================================================================

test log snippet boot parser 338

Home

[  130.792210] ==================================================================
[  130.792811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1e4/0xbf0
[  130.793910] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.794740] 
[  130.795035] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.795843] Hardware name: Generic DT based system
[  130.796261]  unwind_backtrace from show_stack+0x18/0x1c
[  130.797931]  show_stack from dump_stack_lvl+0x58/0x70
[  130.798652]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.799282]  print_report from kasan_report+0xb0/0xe4
[  130.799990]  kasan_report from kasan_bitops_generic+0x1e4/0xbf0
[  130.800782]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.801463]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.802427]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.803231]  kthread from ret_from_fork+0x14/0x30
[  130.803802] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.804410] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.805054] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.805922] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.806588] 
[  130.806848] Allocated by task 220:
[  130.807283]  __kasan_kmalloc+0x8c/0x94
[  130.807770]  kasan_bitops_generic+0xa0/0xbf0
[  130.808291]  kunit_try_run_case+0x80/0x108
[  130.808890]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.809572]  kthread+0x148/0x16c
[  130.809984]  ret_from_fork+0x14/0x30
[  130.810472] 
[  130.810749] The buggy address belongs to the object at c5abe980
[  130.810749]  which belongs to the cache kmalloc-64 of size 64
[  130.811760] The buggy address is located 4 bytes inside of
[  130.811760]  64-byte region [c5abe980, c5abe9c0)
[  130.812624] 
[  130.812910] The buggy address belongs to the physical page:
[  130.813400] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.814186] flags: 0x200(slab|zone=0)
[  130.814746] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.815579] raw: 00000000
[  130.815938] page dumped because: kasan: bad access detected
[  130.816403] 
[  130.817235] Memory state around the buggy address:
[  130.818096]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.818821]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.820162] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.820843]            ^
[  130.821257]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.821994]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.822504] ==================================================================
---
[  130.662347] ==================================================================
[  130.664179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xfc/0xbf0
[  130.664781] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.665306] 
[  130.665582] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.666344] Hardware name: Generic DT based system
[  130.667019]  unwind_backtrace from show_stack+0x18/0x1c
[  130.667729]  show_stack from dump_stack_lvl+0x58/0x70
[  130.668505]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.669217]  print_report from kasan_report+0xb0/0xe4
[  130.669863]  kasan_report from kasan_bitops_generic+0xfc/0xbf0
[  130.670708]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.671661]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.672620]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.673518]  kthread from ret_from_fork+0x14/0x30
[  130.674075] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.674647] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.675374] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.676048] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.676779] 
[  130.677045] Allocated by task 220:
[  130.677390]  __kasan_kmalloc+0x8c/0x94
[  130.677925]  kasan_bitops_generic+0xa0/0xbf0
[  130.678441]  kunit_try_run_case+0x80/0x108
[  130.679017]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.679650]  kthread+0x148/0x16c
[  130.680127]  ret_from_fork+0x14/0x30
[  130.680611] 
[  130.680842] The buggy address belongs to the object at c5abe980
[  130.680842]  which belongs to the cache kmalloc-64 of size 64
[  130.681945] The buggy address is located 4 bytes inside of
[  130.681945]  64-byte region [c5abe980, c5abe9c0)
[  130.682790] 
[  130.683072] The buggy address belongs to the physical page:
[  130.683567] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.684363] flags: 0x200(slab|zone=0)
[  130.684917] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  130.685573] raw: 00000000
[  130.685910] page dumped because: kasan: bad access detected
[  130.686531] 
[  130.686807] Memory state around the buggy address:
[  130.687363]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.688090]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.688680] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.689277]            ^
[  130.689671]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.690220]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.690831] ==================================================================
---
[  130.695674] ==================================================================
[  130.697752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x15c/0xbf0
[  130.698711] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.699277] 
[  130.699501] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.700425] Hardware name: Generic DT based system
[  130.701000]  unwind_backtrace from show_stack+0x18/0x1c
[  130.701593]  show_stack from dump_stack_lvl+0x58/0x70
[  130.702166]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.702900]  print_report from kasan_report+0xb0/0xe4
[  130.703597]  kasan_report from kasan_bitops_generic+0x15c/0xbf0
[  130.704391]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.705217]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.706119]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.706856]  kthread from ret_from_fork+0x14/0x30
[  130.707508] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.708049] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.708926] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.709655] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.710368] 
[  130.710658] Allocated by task 220:
[  130.711072]  __kasan_kmalloc+0x8c/0x94
[  130.711595]  kasan_bitops_generic+0xa0/0xbf0
[  130.712191]  kunit_try_run_case+0x80/0x108
[  130.712677]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.713357]  kthread+0x148/0x16c
[  130.713855]  ret_from_fork+0x14/0x30
[  130.714274] 
[  130.714535] The buggy address belongs to the object at c5abe980
[  130.714535]  which belongs to the cache kmalloc-64 of size 64
[  130.715587] The buggy address is located 4 bytes inside of
[  130.715587]  64-byte region [c5abe980, c5abe9c0)
[  130.716534] 
[  130.716818] The buggy address belongs to the physical page:
[  130.717363] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.718203] flags: 0x200(slab|zone=0)
[  130.718678] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.719511] raw: 00000000
[  130.719848] page dumped because: kasan: bad access detected
[  130.720383] 
[  130.720609] Memory state around the buggy address:
[  130.721155]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.721854]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.722559] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.723161]            ^
[  130.723549]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.724238]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.725582] ==================================================================
---
[  130.955594] ==================================================================
[  130.956309] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2f0/0xbf0
[  130.957118] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.958493] 
[  130.958895] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.960350] Hardware name: Generic DT based system
[  130.961534]  unwind_backtrace from show_stack+0x18/0x1c
[  130.962271]  show_stack from dump_stack_lvl+0x58/0x70
[  130.962942]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.963652]  print_report from kasan_report+0xb0/0xe4
[  130.964317]  kasan_report from kasan_bitops_generic+0x2f0/0xbf0
[  130.965080]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.965915]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.966877]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.967778]  kthread from ret_from_fork+0x14/0x30
[  130.968393] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.968939] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.969766] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.970576] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.971243] 
[  130.971578] Allocated by task 220:
[  130.971915]  __kasan_kmalloc+0x8c/0x94
[  130.972491]  kasan_bitops_generic+0xa0/0xbf0
[  130.973061]  kunit_try_run_case+0x80/0x108
[  130.973725]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.974320]  kthread+0x148/0x16c
[  130.974827]  ret_from_fork+0x14/0x30
[  130.975367] 
[  130.975658] The buggy address belongs to the object at c5abe980
[  130.975658]  which belongs to the cache kmalloc-64 of size 64
[  130.976731] The buggy address is located 4 bytes inside of
[  130.976731]  64-byte region [c5abe980, c5abe9c0)
[  130.977667] 
[  130.978010] The buggy address belongs to the physical page:
[  130.978495] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.979376] flags: 0x200(slab|zone=0)
[  130.980025] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.980825] raw: 00000000
[  130.981227] page dumped because: kasan: bad access detected
[  130.981705] 
[  130.982031] Memory state around the buggy address:
[  130.982619]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.983344]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.984572] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.985105]            ^
[  130.985498]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.986322]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.986892] ==================================================================
---
[  130.990087] ==================================================================
[  130.991784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x36c/0xbf0
[  130.992543] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.993166] 
[  130.993430] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.994124] Hardware name: Generic DT based system
[  130.994681]  unwind_backtrace from show_stack+0x18/0x1c
[  130.995269]  show_stack from dump_stack_lvl+0x58/0x70
[  130.995944]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.997398]  print_report from kasan_report+0xb0/0xe4
[  130.998331]  kasan_report from kasan_bitops_generic+0x36c/0xbf0
[  130.999195]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.999949]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.000715]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.001571]  kthread from ret_from_fork+0x14/0x30
[  131.002167] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  131.002794] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.003554] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.004659] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.005289] 
[  131.005535] Allocated by task 220:
[  131.005927]  __kasan_kmalloc+0x8c/0x94
[  131.006483]  kasan_bitops_generic+0xa0/0xbf0
[  131.007208]  kunit_try_run_case+0x80/0x108
[  131.007867]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.008615]  kthread+0x148/0x16c
[  131.009058]  ret_from_fork+0x14/0x30
[  131.009570] 
[  131.009910] The buggy address belongs to the object at c5abe980
[  131.009910]  which belongs to the cache kmalloc-64 of size 64
[  131.011029] The buggy address is located 4 bytes inside of
[  131.011029]  64-byte region [c5abe980, c5abe9c0)
[  131.011919] 
[  131.012194] The buggy address belongs to the physical page:
[  131.012857] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  131.013646] flags: 0x200(slab|zone=0)
[  131.014073] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  131.014843] raw: 00000000
[  131.015238] page dumped because: kasan: bad access detected
[  131.015906] 
[  131.016226] Memory state around the buggy address:
[  131.016795]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.017288]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.018109] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.019110]            ^
[  131.020093]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  131.020855]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.021705] ==================================================================
---
[  131.025210] ==================================================================
[  131.027150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3cc/0xbf0
[  131.027918] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  131.028546] 
[  131.028836] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.029601] Hardware name: Generic DT based system
[  131.030180]  unwind_backtrace from show_stack+0x18/0x1c
[  131.030869]  show_stack from dump_stack_lvl+0x58/0x70
[  131.031556]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.032175]  print_report from kasan_report+0xb0/0xe4
[  131.032877]  kasan_report from kasan_bitops_generic+0x3cc/0xbf0
[  131.033476]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  131.034334]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.035297]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.036019]  kthread from ret_from_fork+0x14/0x30
[  131.036891] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  131.037676] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.038862] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.039837] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.040496] 
[  131.040761] Allocated by task 220:
[  131.041143]  __kasan_kmalloc+0x8c/0x94
[  131.041605]  kasan_bitops_generic+0xa0/0xbf0
[  131.042118]  kunit_try_run_case+0x80/0x108
[  131.042617]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.043317]  kthread+0x148/0x16c
[  131.043800]  ret_from_fork+0x14/0x30
[  131.044299] 
[  131.044551] The buggy address belongs to the object at c5abe980
[  131.044551]  which belongs to the cache kmalloc-64 of size 64
[  131.045440] The buggy address is located 4 bytes inside of
[  131.045440]  64-byte region [c5abe980, c5abe9c0)
[  131.046462] 
[  131.046694] The buggy address belongs to the physical page:
[  131.047279] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  131.048128] flags: 0x200(slab|zone=0)
[  131.048684] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  131.049426] raw: 00000000
[  131.049800] page dumped because: kasan: bad access detected
[  131.050398] 
[  131.050674] Memory state around the buggy address:
[  131.051098]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.051854]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.052476] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.053091]            ^
[  131.053463]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  131.054731]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.055534] ==================================================================
---
[  130.890755] ==================================================================
[  130.892497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2b0/0xbf0
[  130.893264] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.894008] 
[  130.894254] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.895079] Hardware name: Generic DT based system
[  130.895577]  unwind_backtrace from show_stack+0x18/0x1c
[  130.896335]  show_stack from dump_stack_lvl+0x58/0x70
[  130.897559]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.898610]  print_report from kasan_report+0xb0/0xe4
[  130.899522]  kasan_report from kasan_bitops_generic+0x2b0/0xbf0
[  130.900284]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.901117]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.902035]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.902874]  kthread from ret_from_fork+0x14/0x30
[  130.903542] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.904097] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.904947] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.905761] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.906475] 
[  130.906767] Allocated by task 220:
[  130.907237]  __kasan_kmalloc+0x8c/0x94
[  130.907661]  kasan_bitops_generic+0xa0/0xbf0
[  130.908310]  kunit_try_run_case+0x80/0x108
[  130.908834]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.909544]  kthread+0x148/0x16c
[  130.909976]  ret_from_fork+0x14/0x30
[  130.910515] 
[  130.911102] The buggy address belongs to the object at c5abe980
[  130.911102]  which belongs to the cache kmalloc-64 of size 64
[  130.912205] The buggy address is located 4 bytes inside of
[  130.912205]  64-byte region [c5abe980, c5abe9c0)
[  130.913136] 
[  130.913361] The buggy address belongs to the physical page:
[  130.914027] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.914717] flags: 0x200(slab|zone=0)
[  130.915317] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.916084] raw: 00000000
[  130.916734] page dumped because: kasan: bad access detected
[  130.917412] 
[  130.917988] Memory state around the buggy address:
[  130.918448]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.919179]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.920028] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.920666]            ^
[  130.921017]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.921804]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.922354] ==================================================================
---
[  131.056675] ==================================================================
[  131.057435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x400/0xbf0
[  131.058162] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  131.058945] 
[  131.059210] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.059814] Hardware name: Generic DT based system
[  131.060212]  unwind_backtrace from show_stack+0x18/0x1c
[  131.061747]  show_stack from dump_stack_lvl+0x58/0x70
[  131.062513]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.063229]  print_report from kasan_report+0xb0/0xe4
[  131.063910]  kasan_report from kasan_bitops_generic+0x400/0xbf0
[  131.064592]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  131.065384]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.066336]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.067256]  kthread from ret_from_fork+0x14/0x30
[  131.067919] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  131.068440] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.069323] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.069982] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.070700] 
[  131.070973] Allocated by task 220:
[  131.071347]  __kasan_kmalloc+0x8c/0x94
[  131.071869]  kasan_bitops_generic+0xa0/0xbf0
[  131.072428]  kunit_try_run_case+0x80/0x108
[  131.072883]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.073570]  kthread+0x148/0x16c
[  131.074045]  ret_from_fork+0x14/0x30
[  131.074509] 
[  131.074743] The buggy address belongs to the object at c5abe980
[  131.074743]  which belongs to the cache kmalloc-64 of size 64
[  131.075768] The buggy address is located 4 bytes inside of
[  131.075768]  64-byte region [c5abe980, c5abe9c0)
[  131.077060] 
[  131.077805] The buggy address belongs to the physical page:
[  131.078499] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  131.079205] flags: 0x200(slab|zone=0)
[  131.080218] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  131.081097] raw: 00000000
[  131.081476] page dumped because: kasan: bad access detected
[  131.082083] 
[  131.082332] Memory state around the buggy address:
[  131.082850]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.083384]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.084165] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.084911]            ^
[  131.085294]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  131.086004]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.086593] ==================================================================
---
[  130.856255] ==================================================================
[  130.859027] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x250/0xbf0
[  130.859873] Read of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.860488] 
[  130.860775] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.861604] Hardware name: Generic DT based system
[  130.862056]  unwind_backtrace from show_stack+0x18/0x1c
[  130.862795]  show_stack from dump_stack_lvl+0x58/0x70
[  130.863441]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.864018]  print_report from kasan_report+0xb0/0xe4
[  130.864728]  kasan_report from kasan_bitops_generic+0x250/0xbf0
[  130.865437]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.866164]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.867037]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.867878]  kthread from ret_from_fork+0x14/0x30
[  130.868494] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.869109] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.869933] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.870588] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.871323] 
[  130.871593] Allocated by task 220:
[  130.872029]  __kasan_kmalloc+0x8c/0x94
[  130.872423]  kasan_bitops_generic+0xa0/0xbf0
[  130.873026]  kunit_try_run_case+0x80/0x108
[  130.873603]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.874262]  kthread+0x148/0x16c
[  130.874654]  ret_from_fork+0x14/0x30
[  130.875157] 
[  130.875423] The buggy address belongs to the object at c5abe980
[  130.875423]  which belongs to the cache kmalloc-64 of size 64
[  130.876377] The buggy address is located 4 bytes inside of
[  130.876377]  64-byte region [c5abe980, c5abe9c0)
[  130.878401] 
[  130.878688] The buggy address belongs to the physical page:
[  130.879238] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.880128] flags: 0x200(slab|zone=0)
[  130.880745] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.881562] raw: 00000000
[  130.881924] page dumped because: kasan: bad access detected
[  130.882663] 
[  130.882976] Memory state around the buggy address:
[  130.883526]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.884316]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.885071] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.885720]            ^
[  130.886068]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.886736]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.887502] ==================================================================

test log snippet boot parser 339

Home

[  130.823587] ==================================================================
[  130.824193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xbf0
[  130.825045] Write of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.825699] 
[  130.825987] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.826572] Hardware name: Generic DT based system
[  130.827165]  unwind_backtrace from show_stack+0x18/0x1c
[  130.828045]  show_stack from dump_stack_lvl+0x58/0x70
[  130.828846]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.829744]  print_report from kasan_report+0xb0/0xe4
[  130.830551]  kasan_report from kasan_bitops_generic+0x1f8/0xbf0
[  130.831414]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.832332]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.833141]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.833507]  kthread from ret_from_fork+0x14/0x30
[  130.833913] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.834534] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.835684] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.836433] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.837119] 
[  130.837799] Allocated by task 220:
[  130.838209]  __kasan_kmalloc+0x8c/0x94
[  130.838742]  kasan_bitops_generic+0xa0/0xbf0
[  130.839214]  kunit_try_run_case+0x80/0x108
[  130.839816]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.840424]  kthread+0x148/0x16c
[  130.840906]  ret_from_fork+0x14/0x30
[  130.841339] 
[  130.841593] The buggy address belongs to the object at c5abe980
[  130.841593]  which belongs to the cache kmalloc-64 of size 64
[  130.842859] The buggy address is located 4 bytes inside of
[  130.842859]  64-byte region [c5abe980, c5abe9c0)
[  130.843886] 
[  130.844156] The buggy address belongs to the physical page:
[  130.844696] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.845516] flags: 0x200(slab|zone=0)
[  130.846068] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.846807] raw: 00000000
[  130.847167] page dumped because: kasan: bad access detected
[  130.847755] 
[  130.847962] Memory state around the buggy address:
[  130.848519]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.849306]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.850209] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.850721]            ^
[  130.851105]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.851805]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.852447] ==================================================================

test log snippet boot parser 340

Home

[  130.759688] ==================================================================
[  130.760543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1dc/0xbf0
[  130.761417] Write of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.762143] 
[  130.762382] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.763106] Hardware name: Generic DT based system
[  130.763502]  unwind_backtrace from show_stack+0x18/0x1c
[  130.764244]  show_stack from dump_stack_lvl+0x58/0x70
[  130.764968]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.765720]  print_report from kasan_report+0xb0/0xe4
[  130.766326]  kasan_report from kasan_check_range+0x148/0x194
[  130.767030]  kasan_check_range from kasan_bitops_generic+0x1dc/0xbf0
[  130.767935]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.768836]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.769618]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.770524]  kthread from ret_from_fork+0x14/0x30
[  130.771255] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.771714] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.772612] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.773514] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.774139] 
[  130.774410] Allocated by task 220:
[  130.774813]  __kasan_kmalloc+0x8c/0x94
[  130.775345]  kasan_bitops_generic+0xa0/0xbf0
[  130.775947]  kunit_try_run_case+0x80/0x108
[  130.776393]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.777147]  kthread+0x148/0x16c
[  130.777513]  ret_from_fork+0x14/0x30
[  130.778524] 
[  130.779268] The buggy address belongs to the object at c5abe980
[  130.779268]  which belongs to the cache kmalloc-64 of size 64
[  130.780667] The buggy address is located 4 bytes inside of
[  130.780667]  64-byte region [c5abe980, c5abe9c0)
[  130.781513] 
[  130.781879] The buggy address belongs to the physical page:
[  130.782524] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.783423] flags: 0x200(slab|zone=0)
[  130.784049] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.784891] raw: 00000000
[  130.785307] page dumped because: kasan: bad access detected
[  130.786018] 
[  130.786291] Memory state around the buggy address:
[  130.786810]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.787678]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.788417] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.789077]            ^
[  130.789513]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.790274]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.791041] ==================================================================
---
[  130.923479] ==================================================================
[  130.924885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2e8/0xbf0
[  130.925649] Write of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.926221] 
[  130.926493] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.927461] Hardware name: Generic DT based system
[  130.927969]  unwind_backtrace from show_stack+0x18/0x1c
[  130.928794]  show_stack from dump_stack_lvl+0x58/0x70
[  130.929496]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.930174]  print_report from kasan_report+0xb0/0xe4
[  130.930913]  kasan_report from kasan_check_range+0x148/0x194
[  130.931607]  kasan_check_range from kasan_bitops_generic+0x2e8/0xbf0
[  130.932421]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.933302]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.934194]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.935024]  kthread from ret_from_fork+0x14/0x30
[  130.935599] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.936236] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.937164] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.938561] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.939244] 
[  130.939504] Allocated by task 220:
[  130.940224]  __kasan_kmalloc+0x8c/0x94
[  130.940715]  kasan_bitops_generic+0xa0/0xbf0
[  130.941301]  kunit_try_run_case+0x80/0x108
[  130.941927]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.942668]  kthread+0x148/0x16c
[  130.943112]  ret_from_fork+0x14/0x30
[  130.943551] 
[  130.943850] The buggy address belongs to the object at c5abe980
[  130.943850]  which belongs to the cache kmalloc-64 of size 64
[  130.944880] The buggy address is located 4 bytes inside of
[  130.944880]  64-byte region [c5abe980, c5abe9c0)
[  130.945812] 
[  130.946120] The buggy address belongs to the physical page:
[  130.946657] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.947543] flags: 0x200(slab|zone=0)
[  130.948030] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.948734] raw: 00000000
[  130.949106] page dumped because: kasan: bad access detected
[  130.949694] 
[  130.949948] Memory state around the buggy address:
[  130.950533]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.951191]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.951855] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.952508]            ^
[  130.952964]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.953643]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.954377] ==================================================================
---
[  130.726779] ==================================================================
[  130.728191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x194/0xbf0
[  130.728922] Write of size 4 at addr c5abe984 by task kunit_try_catch/220
[  130.729935] 
[  130.730208] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.730942] Hardware name: Generic DT based system
[  130.731411]  unwind_backtrace from show_stack+0x18/0x1c
[  130.732151]  show_stack from dump_stack_lvl+0x58/0x70
[  130.732835]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.733444]  print_report from kasan_report+0xb0/0xe4
[  130.734096]  kasan_report from kasan_check_range+0x148/0x194
[  130.734840]  kasan_check_range from kasan_bitops_generic+0x194/0xbf0
[  130.735562]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  130.736318]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.737214]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.738053]  kthread from ret_from_fork+0x14/0x30
[  130.738701] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  130.739233] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.740027] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.740805] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.741368] 
[  130.741647] Allocated by task 220:
[  130.742045]  __kasan_kmalloc+0x8c/0x94
[  130.742552]  kasan_bitops_generic+0xa0/0xbf0
[  130.743018]  kunit_try_run_case+0x80/0x108
[  130.743584]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.744228]  kthread+0x148/0x16c
[  130.744708]  ret_from_fork+0x14/0x30
[  130.745119] 
[  130.745377] The buggy address belongs to the object at c5abe980
[  130.745377]  which belongs to the cache kmalloc-64 of size 64
[  130.746473] The buggy address is located 4 bytes inside of
[  130.746473]  64-byte region [c5abe980, c5abe9c0)
[  130.747559] 
[  130.748250] The buggy address belongs to the physical page:
[  130.748695] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  130.749825] flags: 0x200(slab|zone=0)
[  130.750496] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.751545] raw: 00000000
[  130.751940] page dumped because: kasan: bad access detected
[  130.752555] 
[  130.753086] Memory state around the buggy address:
[  130.753732]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.754322]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.755010] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.755767]            ^
[  130.756168]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.756803]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.757440] ==================================================================
---
[  131.088151] ==================================================================
[  131.088856] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0xbf0
[  131.089652] Write of size 4 at addr c5abe984 by task kunit_try_catch/220
[  131.090139] 
[  131.090370] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.091239] Hardware name: Generic DT based system
[  131.091803]  unwind_backtrace from show_stack+0x18/0x1c
[  131.092503]  show_stack from dump_stack_lvl+0x58/0x70
[  131.093132]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.093835]  print_report from kasan_report+0xb0/0xe4
[  131.094507]  kasan_report from kasan_check_range+0x148/0x194
[  131.095129]  kasan_check_range from kasan_bitops_generic+0x438/0xbf0
[  131.095921]  kasan_bitops_generic from kunit_try_run_case+0x80/0x108
[  131.096809]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.097884]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.098772]  kthread from ret_from_fork+0x14/0x30
[  131.099967] Exception stack(0xf9ef3fb0 to 0xf9ef3ff8)
[  131.100953] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.101743] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.102451] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.103172] 
[  131.103395] Allocated by task 220:
[  131.103838]  __kasan_kmalloc+0x8c/0x94
[  131.104287]  kasan_bitops_generic+0xa0/0xbf0
[  131.104892]  kunit_try_run_case+0x80/0x108
[  131.105363]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.106095]  kthread+0x148/0x16c
[  131.106575]  ret_from_fork+0x14/0x30
[  131.107096] 
[  131.107365] The buggy address belongs to the object at c5abe980
[  131.107365]  which belongs to the cache kmalloc-64 of size 64
[  131.108429] The buggy address is located 4 bytes inside of
[  131.108429]  64-byte region [c5abe980, c5abe9c0)
[  131.109353] 
[  131.109622] The buggy address belongs to the physical page:
[  131.110193] page:aa03e077 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abe
[  131.110838] flags: 0x200(slab|zone=0)
[  131.111400] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  131.112242] raw: 00000000
[  131.112619] page dumped because: kasan: bad access detected
[  131.113164] 
[  131.113402] Memory state around the buggy address:
[  131.114348]  c5abe880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.114993]  c5abe900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.115509] >c5abe980: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.116238]            ^
[  131.116624]  c5abea00: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  131.117611]  c5abea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.118768] ==================================================================

test log snippet boot parser 341

Home

[  128.349737] ==================================================================
[  128.350659] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1d0
[  128.351413] Write of size 1 at addr c8e79f00 by task kunit_try_catch/182
[  128.352008] 
[  128.352288] CPU: 1 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.352938] Hardware name: Generic DT based system
[  128.353494]  unwind_backtrace from show_stack+0x18/0x1c
[  128.354230]  show_stack from dump_stack_lvl+0x58/0x70
[  128.354884]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.355539]  print_report from kasan_report+0xb0/0xe4
[  128.356253]  kasan_report from kmalloc_large_oob_right+0xcc/0x1d0
[  128.357003]  kmalloc_large_oob_right from kunit_try_run_case+0x80/0x108
[  128.358013]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.358788]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.359800]  kthread from ret_from_fork+0x14/0x30
[  128.360435] Exception stack(0xf9dd3fb0 to 0xf9dd3ff8)
[  128.360991] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.361782] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.362510] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.363145] 
[  128.363422] Allocated by task 182:
[  128.363793]  __kasan_kmalloc+0x8c/0x94
[  128.364310]  kmalloc_large_oob_right+0xa0/0x1d0
[  128.364808]  kunit_try_run_case+0x80/0x108
[  128.365381]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.366058]  kthread+0x148/0x16c
[  128.366694]  ret_from_fork+0x14/0x30
[  128.367181] 
[  128.367429] The buggy address belongs to the object at c8e78000
[  128.367429]  which belongs to the cache kmalloc-8k of size 8192
[  128.368489] The buggy address is located 7936 bytes inside of
[  128.368489]  8192-byte region [c8e78000, c8e7a000)
[  128.369470] 
[  128.369708] The buggy address belongs to the physical page:
[  128.370323] page:6dfaa39e refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e78
[  128.371065] head:6dfaa39e order:3 compound_mapcount:0 compound_pincount:0
[  128.371626] flags: 0x10200(slab|head|zone=0)
[  128.372230] raw: 00010200 00000000 00000122 c4801a00 00000000 80020002 ffffffff 00000001
[  128.373071] raw: 00000000
[  128.373354] page dumped because: kasan: bad access detected
[  128.373946] 
[  128.374160] Memory state around the buggy address:
[  128.374627]  c8e79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.375362]  c8e79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.376067] >c8e79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.376912]            ^
[  128.377219]  c8e79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.377835]  c8e7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.378516] ==================================================================

test log snippet boot parser 342

Home

[  129.187414] ==================================================================
[  129.188498] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe8/0x1e8
[  129.189337] Read of size 64 at addr c5ab5504 by task kunit_try_catch/196
[  129.190055] 
[  129.190334] CPU: 1 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.191115] Hardware name: Generic DT based system
[  129.191691]  unwind_backtrace from show_stack+0x18/0x1c
[  129.192437]  show_stack from dump_stack_lvl+0x58/0x70
[  129.193182]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.193839]  print_report from kasan_report+0xb0/0xe4
[  129.194441]  kasan_report from kasan_check_range+0x148/0x194
[  129.195035]  kasan_check_range from memmove+0x28/0x68
[  129.195714]  memmove from kmalloc_memmove_invalid_size+0xe8/0x1e8
[  129.196518]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x80/0x108
[  129.197794]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.198194]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.198537]  kthread from ret_from_fork+0x14/0x30
[  129.198946] Exception stack(0xf9e33fb0 to 0xf9e33ff8)
[  129.199384] 3fa0:                                     00000000 00000000 00000000 00000000
[  129.200036] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.200826] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.201444] 
[  129.201722] Allocated by task 196:
[  129.202054]  __kasan_kmalloc+0x8c/0x94
[  129.202570]  kmalloc_memmove_invalid_size+0xa0/0x1e8
[  129.203245]  kunit_try_run_case+0x80/0x108
[  129.203787]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.204476]  kthread+0x148/0x16c
[  129.204945]  ret_from_fork+0x14/0x30
[  129.205362] 
[  129.205625] The buggy address belongs to the object at c5ab5500
[  129.205625]  which belongs to the cache kmalloc-64 of size 64
[  129.206974] The buggy address is located 4 bytes inside of
[  129.206974]  64-byte region [c5ab5500, c5ab5540)
[  129.207957] 
[  129.208224] The buggy address belongs to the physical page:
[  129.209232] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  129.210352] flags: 0x200(slab|zone=0)
[  129.210846] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  129.211713] raw: 00000000
[  129.211998] page dumped because: kasan: bad access detected
[  129.212648] 
[  129.212913] Memory state around the buggy address:
[  129.213462]  c5ab5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.214223]  c5ab5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.214949] >c5ab5500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  129.215538]                                    ^
[  129.216162]  c5ab5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.217326]  c5ab5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.217964] ==================================================================

test log snippet boot parser 343

Home

[  128.192591] ==================================================================
[  128.193566] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e4
[  128.194427] Read of size 1 at addr c8e71000 by task kunit_try_catch/176
[  128.195059] 
[  128.195377] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.196050] Hardware name: Generic DT based system
[  128.196926]  unwind_backtrace from show_stack+0x18/0x1c
[  128.198337]  show_stack from dump_stack_lvl+0x58/0x70
[  128.198934]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.199551]  print_report from kasan_report+0xb0/0xe4
[  128.200253]  kasan_report from kmalloc_node_oob_right+0xd4/0x1e4
[  128.200980]  kmalloc_node_oob_right from kunit_try_run_case+0x80/0x108
[  128.201858]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.202893]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.203667]  kthread from ret_from_fork+0x14/0x30
[  128.204213] Exception stack(0xf9dabfb0 to 0xf9dabff8)
[  128.204751] bfa0:                                     00000000 00000000 00000000 00000000
[  128.205580] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.206679] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.207245] 
[  128.207526] Allocated by task 176:
[  128.207977]  __kasan_kmalloc+0x8c/0x94
[  128.208447]  kmalloc_node_oob_right+0xa4/0x1e4
[  128.209120]  kunit_try_run_case+0x80/0x108
[  128.209718]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.210298]  kthread+0x148/0x16c
[  128.210804]  ret_from_fork+0x14/0x30
[  128.211311] 
[  128.211535] The buggy address belongs to the object at c8e70000
[  128.211535]  which belongs to the cache kmalloc-4k of size 4096
[  128.212571] The buggy address is located 0 bytes to the right of
[  128.212571]  4096-byte region [c8e70000, c8e71000)
[  128.213600] 
[  128.213847] The buggy address belongs to the physical page:
[  128.214447] page:cb7bb98d refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e70
[  128.215259] head:cb7bb98d order:3 compound_mapcount:0 compound_pincount:0
[  128.216033] flags: 0x10200(slab|head|zone=0)
[  128.216956] raw: 00010200 00000000 00000122 c4801900 00000000 80040004 ffffffff 00000001
[  128.217670] raw: 00000000
[  128.218041] page dumped because: kasan: bad access detected
[  128.218663] 
[  128.218894] Memory state around the buggy address:
[  128.219455]  c8e70f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.220057]  c8e70f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.220790] >c8e71000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.221275]            ^
[  128.221682]  c8e71080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.222398]  c8e71100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.223050] ==================================================================

test log snippet boot parser 344

Home

[  128.883362] ==================================================================
[  128.884516] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x250
[  128.885151] Write of size 16 at addr c5ab5400 by task kunit_try_catch/188
[  128.885769] 
[  128.886027] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.887304] Hardware name: Generic DT based system
[  128.887897]  unwind_backtrace from show_stack+0x18/0x1c
[  128.888576]  show_stack from dump_stack_lvl+0x58/0x70
[  128.889213]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.889769]  print_report from kasan_report+0xb0/0xe4
[  128.890454]  kasan_report from kasan_check_range+0x148/0x194
[  128.891208]  kasan_check_range from kmalloc_oob_16+0xf8/0x250
[  128.891819]  kmalloc_oob_16 from kunit_try_run_case+0x80/0x108
[  128.892599]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.893549]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.894235]  kthread from ret_from_fork+0x14/0x30
[  128.894886] Exception stack(0xf9e03fb0 to 0xf9e03ff8)
[  128.895464] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.896275] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.897498] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.898148] 
[  128.898397] Allocated by task 188:
[  128.898911]  __kasan_kmalloc+0x8c/0x94
[  128.899317]  kmalloc_oob_16+0xa0/0x250
[  128.899863]  kunit_try_run_case+0x80/0x108
[  128.900340]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.901085]  kthread+0x148/0x16c
[  128.901505]  ret_from_fork+0x14/0x30
[  128.902023] 
[  128.902286] The buggy address belongs to the object at c5ab5400
[  128.902286]  which belongs to the cache kmalloc-64 of size 64
[  128.903420] The buggy address is located 0 bytes inside of
[  128.903420]  64-byte region [c5ab5400, c5ab5440)
[  128.904202] 
[  128.904413] The buggy address belongs to the physical page:
[  128.905137] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  128.906135] flags: 0x200(slab|zone=0)
[  128.906993] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  128.907808] raw: 00000000
[  128.908211] page dumped because: kasan: bad access detected
[  128.908713] 
[  128.909008] Memory state around the buggy address:
[  128.909551]  c5ab5300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  128.910215]  c5ab5380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  128.911003] >c5ab5400: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.911777]               ^
[  128.912179]  c5ab5480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.912977]  c5ab5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.913731] ==================================================================

test log snippet boot parser 345

Home

[  128.962679] ==================================================================
[  128.963664] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1d8
[  128.964377] Write of size 128 at addr c5a7ab00 by task kunit_try_catch/190
[  128.965107] 
[  128.965330] CPU: 1 PID: 190 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.966332] Hardware name: Generic DT based system
[  128.966963]  unwind_backtrace from show_stack+0x18/0x1c
[  128.968377]  show_stack from dump_stack_lvl+0x58/0x70
[  128.969071]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.969737]  print_report from kasan_report+0xb0/0xe4
[  128.970333]  kasan_report from kasan_check_range+0x148/0x194
[  128.971025]  kasan_check_range from memset+0x20/0x3c
[  128.971673]  memset from kmalloc_oob_in_memset+0xd8/0x1d8
[  128.972247]  kmalloc_oob_in_memset from kunit_try_run_case+0x80/0x108
[  128.973112]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.973918]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.974772]  kthread from ret_from_fork+0x14/0x30
[  128.975283] Exception stack(0xf9e0bfb0 to 0xf9e0bff8)
[  128.975896] bfa0:                                     00000000 00000000 00000000 00000000
[  128.976578] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.977788] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.978407] 
[  128.978727] Allocated by task 190:
[  128.979191]  __kasan_kmalloc+0x8c/0x94
[  128.979732]  kmalloc_oob_in_memset+0xa0/0x1d8
[  128.980222]  kunit_try_run_case+0x80/0x108
[  128.980868]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.981563]  kthread+0x148/0x16c
[  128.982066]  ret_from_fork+0x14/0x30
[  128.982514] 
[  128.982743] The buggy address belongs to the object at c5a7ab00
[  128.982743]  which belongs to the cache kmalloc-128 of size 128
[  128.983669] The buggy address is located 0 bytes inside of
[  128.983669]  128-byte region [c5a7ab00, c5a7ab80)
[  128.984689] 
[  128.984956] The buggy address belongs to the physical page:
[  128.985395] page:456a4b80 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45a7a
[  128.986277] flags: 0x200(slab|zone=0)
[  128.986824] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  128.988278] raw: 00000000
[  128.988600] page dumped because: kasan: bad access detected
[  128.989162] 
[  128.989407] Memory state around the buggy address:
[  128.990255]  c5a7aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.990999]  c5a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.991620] >c5a7ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  128.992244]                                                         ^
[  128.992846]  c5a7ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.993474]  c5a7ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.994245] ==================================================================

test log snippet boot parser 346

Home

[  128.148046] ==================================================================
[  128.149050] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1d4
[  128.149837] Read of size 1 at addr c5ab537f by task kunit_try_catch/175
[  128.150458] 
[  128.150754] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.151488] Hardware name: Generic DT based system
[  128.152094]  unwind_backtrace from show_stack+0x18/0x1c
[  128.152717]  show_stack from dump_stack_lvl+0x58/0x70
[  128.153441]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.154139]  print_report from kasan_report+0xb0/0xe4
[  128.154762]  kasan_report from kmalloc_oob_left+0xcc/0x1d4
[  128.155539]  kmalloc_oob_left from kunit_try_run_case+0x80/0x108
[  128.156239]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.157511]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.158475]  kthread from ret_from_fork+0x14/0x30
[  128.159160] Exception stack(0xf9da3fb0 to 0xf9da3ff8)
[  128.159816] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.160667] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.161461] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.162069] 
[  128.162382] Allocated by task 173:
[  128.162797]  __kasan_kmalloc+0x8c/0x94
[  128.163373]  __kmalloc+0x5c/0x190
[  128.163851]  kunit_kmalloc_array_init+0x48/0x74
[  128.164489]  __kunit_add_resource+0x5c/0xd8
[  128.165129]  kunit_kmalloc_array+0x100/0x168
[  128.165712]  sysctl_test_api_dointvec_write_single_greater_int_max+0x134/0x2b8
[  128.166514]  kunit_try_run_case+0x80/0x108
[  128.167567]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.168318]  kthread+0x148/0x16c
[  128.168930]  ret_from_fork+0x14/0x30
[  128.169376] 
[  128.169683] Freed by task 173:
[  128.170035]  kasan_save_free_info+0x30/0x3c
[  128.170529]  __kasan_slab_free+0xdc/0x124
[  128.170999]  __kmem_cache_free+0x140/0x2ac
[  128.171416]  kunit_remove_resource+0xe0/0x100
[  128.172062]  kunit_cleanup+0x44/0x90
[  128.172667]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.173383]  kthread+0x148/0x16c
[  128.173930]  ret_from_fork+0x14/0x30
[  128.174490] 
[  128.174807] The buggy address belongs to the object at c5ab5300
[  128.174807]  which belongs to the cache kmalloc-64 of size 64
[  128.175849] The buggy address is located 63 bytes to the right of
[  128.175849]  64-byte region [c5ab5300, c5ab5340)
[  128.177097] 
[  128.177611] The buggy address belongs to the physical page:
[  128.178109] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  128.178767] flags: 0x200(slab|zone=0)
[  128.179361] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  128.180126] raw: 00000000
[  128.180500] page dumped because: kasan: bad access detected
[  128.181020] 
[  128.181311] Memory state around the buggy address:
[  128.181882]  c5ab5200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  128.182562]  c5ab5280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  128.183338] >c5ab5300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  128.183937]                                                         ^
[  128.184685]  c5ab5380: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.185373]  c5ab5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.186041] ==================================================================

test log snippet boot parser 347

Home

[  129.111436] ==================================================================
[  129.112459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1d4
[  129.113145] Write of size 16 at addr c5a7af69 by task kunit_try_catch/194
[  129.113725] 
[  129.114005] CPU: 1 PID: 194 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.114803] Hardware name: Generic DT based system
[  129.115369]  unwind_backtrace from show_stack+0x18/0x1c
[  129.116072]  show_stack from dump_stack_lvl+0x58/0x70
[  129.117002]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.117685]  print_report from kasan_report+0xb0/0xe4
[  129.118365]  kasan_report from kasan_check_range+0x148/0x194
[  129.119119]  kasan_check_range from memset+0x20/0x3c
[  129.119791]  memset from kmalloc_oob_memset_16+0xdc/0x1d4
[  129.120426]  kmalloc_oob_memset_16 from kunit_try_run_case+0x80/0x108
[  129.121286]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.122096]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.122966]  kthread from ret_from_fork+0x14/0x30
[  129.123542] Exception stack(0xf9e2bfb0 to 0xf9e2bff8)
[  129.124166] bfa0:                                     00000000 00000000 00000000 00000000
[  129.124933] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.125741] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.126318] 
[  129.126851] Allocated by task 194:
[  129.127299]  __kasan_kmalloc+0x8c/0x94
[  129.127739]  kmalloc_oob_memset_16+0xa0/0x1d4
[  129.128335]  kunit_try_run_case+0x80/0x108
[  129.128872]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.129502]  kthread+0x148/0x16c
[  129.130001]  ret_from_fork+0x14/0x30
[  129.130402] 
[  129.130675] The buggy address belongs to the object at c5a7af00
[  129.130675]  which belongs to the cache kmalloc-128 of size 128
[  129.131700] The buggy address is located 105 bytes inside of
[  129.131700]  128-byte region [c5a7af00, c5a7af80)
[  129.132651] 
[  129.132864] The buggy address belongs to the physical page:
[  129.133477] page:456a4b80 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45a7a
[  129.134306] flags: 0x200(slab|zone=0)
[  129.134882] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  129.135540] raw: 00000000
[  129.136464] page dumped because: kasan: bad access detected
[  129.137267] 
[  129.137527] Memory state around the buggy address:
[  129.138095]  c5a7ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.138847]  c5a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.139356] >c5a7af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  129.140149]                                                         ^
[  129.140972]  c5a7af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.141618]  c5a7b000: 00 00 00 00 fc fc 00 00 00 00 fc fc 00 00 00 00
[  129.142486] ==================================================================

test log snippet boot parser 348

Home

[  129.036115] ==================================================================
[  129.037597] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1d4
[  129.038390] Write of size 4 at addr c5a7ad75 by task kunit_try_catch/192
[  129.039696] 
[  129.040067] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.040984] Hardware name: Generic DT based system
[  129.041453]  unwind_backtrace from show_stack+0x18/0x1c
[  129.042232]  show_stack from dump_stack_lvl+0x58/0x70
[  129.042897]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.043571]  print_report from kasan_report+0xb0/0xe4
[  129.044256]  kasan_report from kasan_check_range+0x148/0x194
[  129.044980]  kasan_check_range from memset+0x20/0x3c
[  129.045669]  memset from kmalloc_oob_memset_4+0xdc/0x1d4
[  129.046409]  kmalloc_oob_memset_4 from kunit_try_run_case+0x80/0x108
[  129.047398]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.048309]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.049149]  kthread from ret_from_fork+0x14/0x30
[  129.049744] Exception stack(0xf9e1bfb0 to 0xf9e1bff8)
[  129.050271] bfa0:                                     00000000 00000000 00000000 00000000
[  129.051156] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.051926] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.052604] 
[  129.052892] Allocated by task 192:
[  129.053279]  __kasan_kmalloc+0x8c/0x94
[  129.053813]  kmalloc_oob_memset_4+0xa0/0x1d4
[  129.054477]  kunit_try_run_case+0x80/0x108
[  129.055055]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.055826]  kthread+0x148/0x16c
[  129.056359]  ret_from_fork+0x14/0x30
[  129.057089] 
[  129.057365] The buggy address belongs to the object at c5a7ad00
[  129.057365]  which belongs to the cache kmalloc-128 of size 128
[  129.058417] The buggy address is located 117 bytes inside of
[  129.058417]  128-byte region [c5a7ad00, c5a7ad80)
[  129.059416] 
[  129.059724] The buggy address belongs to the physical page:
[  129.060244] page:456a4b80 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45a7a
[  129.061018] flags: 0x200(slab|zone=0)
[  129.061612] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  129.062423] raw: 00000000
[  129.062841] page dumped because: kasan: bad access detected
[  129.063421] 
[  129.063706] Memory state around the buggy address:
[  129.064196]  c5a7ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.064899]  c5a7ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.065763] >c5a7ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  129.066727]                                                         ^
[  129.067249]  c5a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.068012]  c5a7ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.068687] ==================================================================

test log snippet boot parser 349

Home

[  129.000100] ==================================================================
[  129.001136] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1dc
[  129.001947] Write of size 2 at addr c5a7ac77 by task kunit_try_catch/191
[  129.002684] 
[  129.002972] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.003900] Hardware name: Generic DT based system
[  129.004422]  unwind_backtrace from show_stack+0x18/0x1c
[  129.005072]  show_stack from dump_stack_lvl+0x58/0x70
[  129.005781]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.006432]  print_report from kasan_report+0xb0/0xe4
[  129.007009]  kasan_report from kasan_check_range+0x148/0x194
[  129.007996]  kasan_check_range from memset+0x20/0x3c
[  129.008596]  memset from kmalloc_oob_memset_2+0xdc/0x1dc
[  129.009289]  kmalloc_oob_memset_2 from kunit_try_run_case+0x80/0x108
[  129.010037]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.010980]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.011807]  kthread from ret_from_fork+0x14/0x30
[  129.012397] Exception stack(0xf9e13fb0 to 0xf9e13ff8)
[  129.013046] 3fa0:                                     00000000 00000000 00000000 00000000
[  129.013783] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.014675] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.015347] 
[  129.015586] Allocated by task 191:
[  129.016047]  __kasan_kmalloc+0x8c/0x94
[  129.016569]  kmalloc_oob_memset_2+0xa0/0x1dc
[  129.017484]  kunit_try_run_case+0x80/0x108
[  129.018129]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.018787]  kthread+0x148/0x16c
[  129.019281]  ret_from_fork+0x14/0x30
[  129.019800] 
[  129.020017] The buggy address belongs to the object at c5a7ac00
[  129.020017]  which belongs to the cache kmalloc-128 of size 128
[  129.021065] The buggy address is located 119 bytes inside of
[  129.021065]  128-byte region [c5a7ac00, c5a7ac80)
[  129.022016] 
[  129.022321] The buggy address belongs to the physical page:
[  129.022972] page:456a4b80 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45a7a
[  129.023756] flags: 0x200(slab|zone=0)
[  129.024187] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  129.024942] raw: 00000000
[  129.025300] page dumped because: kasan: bad access detected
[  129.025911] 
[  129.026171] Memory state around the buggy address:
[  129.027181]  c5a7ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.027907]  c5a7ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.028539] >c5a7ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  129.029248]                                                         ^
[  129.029838]  c5a7ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.030550]  c5a7ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.031207] ==================================================================

test log snippet boot parser 350

Home

[  129.073685] ==================================================================
[  129.074828] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1d4
[  129.075748] Write of size 8 at addr c5a7ae71 by task kunit_try_catch/193
[  129.077371] 
[  129.077707] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.078530] Hardware name: Generic DT based system
[  129.079172]  unwind_backtrace from show_stack+0x18/0x1c
[  129.079965]  show_stack from dump_stack_lvl+0x58/0x70
[  129.080664]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.081237]  print_report from kasan_report+0xb0/0xe4
[  129.081854]  kasan_report from kasan_check_range+0x148/0x194
[  129.082499]  kasan_check_range from memset+0x20/0x3c
[  129.083157]  memset from kmalloc_oob_memset_8+0xdc/0x1d4
[  129.083903]  kmalloc_oob_memset_8 from kunit_try_run_case+0x80/0x108
[  129.084673]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.085519]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.086364]  kthread from ret_from_fork+0x14/0x30
[  129.087193] Exception stack(0xf9e23fb0 to 0xf9e23ff8)
[  129.087736] 3fa0:                                     00000000 00000000 00000000 00000000
[  129.088561] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.089312] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.090039] 
[  129.090292] Allocated by task 193:
[  129.090729]  __kasan_kmalloc+0x8c/0x94
[  129.091212]  kmalloc_oob_memset_8+0xa0/0x1d4
[  129.091816]  kunit_try_run_case+0x80/0x108
[  129.092269]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.092941]  kthread+0x148/0x16c
[  129.093428]  ret_from_fork+0x14/0x30
[  129.093917] 
[  129.094147] The buggy address belongs to the object at c5a7ae00
[  129.094147]  which belongs to the cache kmalloc-128 of size 128
[  129.095205] The buggy address is located 113 bytes inside of
[  129.095205]  128-byte region [c5a7ae00, c5a7ae80)
[  129.096105] 
[  129.096319] The buggy address belongs to the physical page:
[  129.097150] page:456a4b80 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45a7a
[  129.097935] flags: 0x200(slab|zone=0)
[  129.098480] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  129.099232] raw: 00000000
[  129.099531] page dumped because: kasan: bad access detected
[  129.100147] 
[  129.100408] Memory state around the buggy address:
[  129.100976]  c5a7ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  129.101596]  c5a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.102128] >c5a7ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  129.102816]                                                         ^
[  129.103458]  c5a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.104118]  c5a7af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.104820] ==================================================================

test log snippet boot parser 351

Home

[  128.040094] ==================================================================
[  128.041459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x314
[  128.042360] Write of size 1 at addr c8d84f73 by task kunit_try_catch/174
[  128.043014] 
[  128.043558] CPU: 0 PID: 174 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[  128.044301] Hardware name: Generic DT based system
[  128.044923]  unwind_backtrace from show_stack+0x18/0x1c
[  128.045649]  show_stack from dump_stack_lvl+0x58/0x70
[  128.046347]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.047027]  print_report from kasan_report+0xb0/0xe4
[  128.048158]  kasan_report from kmalloc_oob_right+0xcc/0x314
[  128.048907]  kmalloc_oob_right from kunit_try_run_case+0x80/0x108
[  128.049538]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.050472]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.051238]  kthread from ret_from_fork+0x14/0x30
[  128.051813] Exception stack(0xf9da3fb0 to 0xf9da3ff8)
[  128.052422] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.053131] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.053940] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.054794] 
[  128.055156] Allocated by task 174:
[  128.055807]  __kasan_kmalloc+0x8c/0x94
[  128.056593]  kmalloc_oob_right+0xa0/0x314
[  128.057368]  kunit_try_run_case+0x80/0x108
[  128.057932]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.058622]  kthread+0x148/0x16c
[  128.059114]  ret_from_fork+0x14/0x30
[  128.060299] 
[  128.060687] The buggy address belongs to the object at c8d84f00
[  128.060687]  which belongs to the cache kmalloc-128 of size 128
[  128.061675] The buggy address is located 115 bytes inside of
[  128.061675]  128-byte region [c8d84f00, c8d84f80)
[  128.062644] 
[  128.063084] The buggy address belongs to the physical page:
[  128.064093] page:c9d57dd1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48d84
[  128.065757] flags: 0x200(slab|zone=0)
[  128.067437] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  128.068353] raw: 00000000
[  128.068825] page dumped because: kasan: bad access detected
[  128.069417] 
[  128.069711] Memory state around the buggy address:
[  128.070470]  c8d84e00: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  128.071247]  c8d84e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.071982] >c8d84f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  128.072710]                                                      ^
[  128.073456]  c8d84f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.074022]  c8d85000: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc 00
[  128.074814] ==================================================================

test log snippet boot parser 352

Home

[  128.076520] ==================================================================
[  128.077885] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xfc/0x314
[  128.078553] Write of size 1 at addr c8d84f78 by task kunit_try_catch/174
[  128.079212] 
[  128.079496] CPU: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.080304] Hardware name: Generic DT based system
[  128.080867]  unwind_backtrace from show_stack+0x18/0x1c
[  128.081594]  show_stack from dump_stack_lvl+0x58/0x70
[  128.082290]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.082901]  print_report from kasan_report+0xb0/0xe4
[  128.083578]  kasan_report from kmalloc_oob_right+0xfc/0x314
[  128.084218]  kmalloc_oob_right from kunit_try_run_case+0x80/0x108
[  128.084986]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.085938]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.088300]  kthread from ret_from_fork+0x14/0x30
[  128.089355] Exception stack(0xf9da3fb0 to 0xf9da3ff8)
[  128.090231] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.090974] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.092065] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.093585] 
[  128.094176] Allocated by task 174:
[  128.094950]  __kasan_kmalloc+0x8c/0x94
[  128.095530]  kmalloc_oob_right+0xa0/0x314
[  128.096800]  kunit_try_run_case+0x80/0x108
[  128.097476]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.098019]  kthread+0x148/0x16c
[  128.098498]  ret_from_fork+0x14/0x30
[  128.098996] 
[  128.099210] The buggy address belongs to the object at c8d84f00
[  128.099210]  which belongs to the cache kmalloc-128 of size 128
[  128.100317] The buggy address is located 120 bytes inside of
[  128.100317]  128-byte region [c8d84f00, c8d84f80)
[  128.101208] 
[  128.101452] The buggy address belongs to the physical page:
[  128.102076] page:c9d57dd1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48d84
[  128.102861] flags: 0x200(slab|zone=0)
[  128.103337] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  128.104152] raw: 00000000
[  128.104464] page dumped because: kasan: bad access detected
[  128.105080] 
[  128.105333] Memory state around the buggy address:
[  128.105770]  c8d84e00: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  128.107082]  c8d84e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.107727] >c8d84f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  128.108580]                                                         ^
[  128.109180]  c8d84f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.109878]  c8d85000: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc 00
[  128.110459] ==================================================================

test log snippet boot parser 353

Home

[  128.112571] ==================================================================
[  128.113255] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x12c/0x314
[  128.113981] Read of size 1 at addr c8d84f80 by task kunit_try_catch/174
[  128.114524] 
[  128.114832] CPU: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.115650] Hardware name: Generic DT based system
[  128.116193]  unwind_backtrace from show_stack+0x18/0x1c
[  128.117455]  show_stack from dump_stack_lvl+0x58/0x70
[  128.118163]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.118869]  print_report from kasan_report+0xb0/0xe4
[  128.119485]  kasan_report from kmalloc_oob_right+0x12c/0x314
[  128.120296]  kmalloc_oob_right from kunit_try_run_case+0x80/0x108
[  128.121162]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.122104]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.122925]  kthread from ret_from_fork+0x14/0x30
[  128.123527] Exception stack(0xf9da3fb0 to 0xf9da3ff8)
[  128.124113] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.124921] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.125755] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.126481] 
[  128.126770] Allocated by task 174:
[  128.127659]  __kasan_kmalloc+0x8c/0x94
[  128.128146]  kmalloc_oob_right+0xa0/0x314
[  128.128748]  kunit_try_run_case+0x80/0x108
[  128.129363]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.130107]  kthread+0x148/0x16c
[  128.130558]  ret_from_fork+0x14/0x30
[  128.131079] 
[  128.131385] The buggy address belongs to the object at c8d84f00
[  128.131385]  which belongs to the cache kmalloc-128 of size 128
[  128.132484] The buggy address is located 0 bytes to the right of
[  128.132484]  128-byte region [c8d84f00, c8d84f80)
[  128.133420] 
[  128.133711] The buggy address belongs to the physical page:
[  128.134253] page:c9d57dd1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48d84
[  128.135130] flags: 0x200(slab|zone=0)
[  128.135624] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  128.136362] raw: 00000000
[  128.137467] page dumped because: kasan: bad access detected
[  128.138065] 
[  128.138340] Memory state around the buggy address:
[  128.138910]  c8d84e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.139561]  c8d84f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  128.140306] >c8d84f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.140924]            ^
[  128.141343]  c8d85000: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc 00
[  128.142023]  c8d85080: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc 00 00
[  128.142757] ==================================================================

test log snippet boot parser 354

Home

[  128.229310] ==================================================================
[  128.230275] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1b4
[  128.231137] Write of size 1 at addr c5af200a by task kunit_try_catch/177
[  128.231826] 
[  128.232072] CPU: 1 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.232855] Hardware name: Generic DT based system
[  128.233379]  unwind_backtrace from show_stack+0x18/0x1c
[  128.234101]  show_stack from dump_stack_lvl+0x58/0x70
[  128.234619]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.235344]  print_report from kasan_report+0xb0/0xe4
[  128.235900]  kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1b4
[  128.237181]  kmalloc_pagealloc_oob_right from kunit_try_run_case+0x80/0x108
[  128.238095]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.238934]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.239678]  kthread from ret_from_fork+0x14/0x30
[  128.240313] Exception stack(0xf9db3fb0 to 0xf9db3ff8)
[  128.240826] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.241712] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.242360] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.243034] 
[  128.243322] The buggy address belongs to the physical page:
[  128.243999] page:7f4ab90c refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af0
[  128.244771] head:7f4ab90c order:2 compound_mapcount:0 compound_pincount:0
[  128.245361] flags: 0x10000(head|zone=0)
[  128.245967] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.246735] raw: 00000000
[  128.247102] page dumped because: kasan: bad access detected
[  128.247587] 
[  128.247861] Memory state around the buggy address:
[  128.248380]  c5af1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.249314]  c5af1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.249883] >c5af2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.250568]               ^
[  128.250979]  c5af2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.251715]  c5af2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.252271] ==================================================================

test log snippet boot parser 355

Home

[  129.364662] ==================================================================
[  129.365700] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[  129.366431] Read of size 1 at addr c5ab90c8 by task kunit_try_catch/203
[  129.367096] 
[  129.367369] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.368305] Hardware name: Generic DT based system
[  129.368782]  unwind_backtrace from show_stack+0x18/0x1c
[  129.369583]  show_stack from dump_stack_lvl+0x58/0x70
[  129.370181]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.370968]  print_report from kasan_report+0xb0/0xe4
[  129.371662]  kasan_report from kmem_cache_oob+0xd4/0x248
[  129.372368]  kmem_cache_oob from kunit_try_run_case+0x80/0x108
[  129.373089]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.374054]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.374822]  kthread from ret_from_fork+0x14/0x30
[  129.375481] Exception stack(0xf9e6bfb0 to 0xf9e6bff8)
[  129.376023] bfa0:                                     00000000 00000000 00000000 00000000
[  129.377237] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.378170] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.378844] 
[  129.379075] Allocated by task 203:
[  129.379510]  __kasan_slab_alloc+0x60/0x68
[  129.380012]  kmem_cache_alloc+0x188/0x53c
[  129.380527]  kmem_cache_oob+0xb0/0x248
[  129.381082]  kunit_try_run_case+0x80/0x108
[  129.381553]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.382251]  kthread+0x148/0x16c
[  129.382742]  ret_from_fork+0x14/0x30
[  129.383110] 
[  129.383382] The buggy address belongs to the object at c5ab9000
[  129.383382]  which belongs to the cache test_cache of size 200
[  129.384334] The buggy address is located 0 bytes to the right of
[  129.384334]  200-byte region [c5ab9000, c5ab90c8)
[  129.385405] 
[  129.385680] The buggy address belongs to the physical page:
[  129.386135] page:412e2e65 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab9
[  129.386977] flags: 0x200(slab|zone=0)
[  129.387538] raw: 00000200 00000000 00000122 c5ab6000 00000000 800f000f ffffffff 00000001
[  129.388143] raw: 00000000
[  129.388513] page dumped because: kasan: bad access detected
[  129.389138] 
[  129.389396] Memory state around the buggy address:
[  129.389876]  c5ab8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.390526]  c5ab9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  129.391064] >c5ab9080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  129.392267]                                       ^
[  129.392778]  c5ab9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.393291]  c5ab9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.393987] ==================================================================

test log snippet boot parser 356

Home

[  128.520087] ==================================================================
[  128.520836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a4/0x5d0
[  128.521529] Write of size 1 at addr c4f4a2da by task kunit_try_catch/184
[  128.522256] 
[  128.522527] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.523292] Hardware name: Generic DT based system
[  128.523695]  unwind_backtrace from show_stack+0x18/0x1c
[  128.524412]  show_stack from dump_stack_lvl+0x58/0x70
[  128.525087]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.525796]  print_report from kasan_report+0xb0/0xe4
[  128.527281]  kasan_report from krealloc_less_oob_helper+0x1a4/0x5d0
[  128.527999]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.528889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.529745]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.530454]  kthread from ret_from_fork+0x14/0x30
[  128.531105] Exception stack(0xf9de3fb0 to 0xf9de3ff8)
[  128.531725] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.532546] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.533323] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.533951] 
[  128.534170] Allocated by task 184:
[  128.534482]  __kasan_krealloc+0xe0/0x104
[  128.535035]  krealloc+0xbc/0x12c
[  128.535535]  krealloc_less_oob_helper+0xd8/0x5d0
[  128.536201]  kunit_try_run_case+0x80/0x108
[  128.537043]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.537660]  kthread+0x148/0x16c
[  128.538029]  ret_from_fork+0x14/0x30
[  128.538527] 
[  128.538821] The buggy address belongs to the object at c4f4a200
[  128.538821]  which belongs to the cache kmalloc-256 of size 256
[  128.539974] The buggy address is located 218 bytes inside of
[  128.539974]  256-byte region [c4f4a200, c4f4a300)
[  128.541584] 
[  128.541835] The buggy address belongs to the physical page:
[  128.542388] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.543073] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.543819] flags: 0x10200(slab|head|zone=0)
[  128.544383] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.545117] raw: 00000000
[  128.545479] page dumped because: kasan: bad access detected
[  128.546054] 
[  128.546271] Memory state around the buggy address:
[  128.547051]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.547621]  c4f4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.548352] >c4f4a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  128.548941]                                             ^
[  128.549546]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.550179]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.550930] ==================================================================

test log snippet boot parser 357

Home

[  128.453217] ==================================================================
[  128.454307] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x118/0x5d0
[  128.455192] Write of size 1 at addr c4f4a2c9 by task kunit_try_catch/184
[  128.455755] 
[  128.456017] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.457885] Hardware name: Generic DT based system
[  128.458375]  unwind_backtrace from show_stack+0x18/0x1c
[  128.459190]  show_stack from dump_stack_lvl+0x58/0x70
[  128.459953]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.460700]  print_report from kasan_report+0xb0/0xe4
[  128.461406]  kasan_report from krealloc_less_oob_helper+0x118/0x5d0
[  128.462228]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.463171]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.464140]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.465014]  kthread from ret_from_fork+0x14/0x30
[  128.465679] Exception stack(0xf9de3fb0 to 0xf9de3ff8)
[  128.466208] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.467413] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.468168] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.468839] 
[  128.469172] Allocated by task 184:
[  128.469729]  __kasan_krealloc+0xe0/0x104
[  128.470192]  krealloc+0xbc/0x12c
[  128.470745]  krealloc_less_oob_helper+0xd8/0x5d0
[  128.471404]  kunit_try_run_case+0x80/0x108
[  128.471973]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.472560]  kthread+0x148/0x16c
[  128.473093]  ret_from_fork+0x14/0x30
[  128.473645] 
[  128.473874] The buggy address belongs to the object at c4f4a200
[  128.473874]  which belongs to the cache kmalloc-256 of size 256
[  128.474923] The buggy address is located 201 bytes inside of
[  128.474923]  256-byte region [c4f4a200, c4f4a300)
[  128.475999] 
[  128.476310] The buggy address belongs to the physical page:
[  128.477239] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.478083] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.478709] flags: 0x10200(slab|head|zone=0)
[  128.479355] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.480127] raw: 00000000
[  128.480404] page dumped because: kasan: bad access detected
[  128.480980] 
[  128.481267] Memory state around the buggy address:
[  128.481865]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.482608]  c4f4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.483343] >c4f4a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  128.484046]                                       ^
[  128.484561]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.485206]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.485958] ==================================================================

test log snippet boot parser 358

Home

[  128.701702] ==================================================================
[  128.702441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5d0
[  128.703202] Write of size 1 at addr c5af60d0 by task kunit_try_catch/186
[  128.703796] 
[  128.704071] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.705222] Hardware name: Generic DT based system
[  128.705733]  unwind_backtrace from show_stack+0x18/0x1c
[  128.706488]  show_stack from dump_stack_lvl+0x58/0x70
[  128.707334]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.708001]  print_report from kasan_report+0xb0/0xe4
[  128.708515]  kasan_report from krealloc_less_oob_helper+0x150/0x5d0
[  128.709229]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.710114]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.711060]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.711935]  kthread from ret_from_fork+0x14/0x30
[  128.712523] Exception stack(0xf9df3fb0 to 0xf9df3ff8)
[  128.713060] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.713841] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.714683] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.715373] 
[  128.715618] The buggy address belongs to the physical page:
[  128.716250] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.717805] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.718517] flags: 0x10000(head|zone=0)
[  128.718993] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.719797] raw: 00000000
[  128.720095] page dumped because: kasan: bad access detected
[  128.720684] 
[  128.720948] Memory state around the buggy address:
[  128.721488]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.722138]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.722864] >c5af6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  128.723479]                                          ^
[  128.724017]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.724734]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.725305] ==================================================================

test log snippet boot parser 359

Home

[  128.674902] ==================================================================
[  128.676160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x118/0x5d0
[  128.677292] Write of size 1 at addr c5af60c9 by task kunit_try_catch/186
[  128.677784] 
[  128.678215] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.679416] Hardware name: Generic DT based system
[  128.679911]  unwind_backtrace from show_stack+0x18/0x1c
[  128.680691]  show_stack from dump_stack_lvl+0x58/0x70
[  128.681327]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.682066]  print_report from kasan_report+0xb0/0xe4
[  128.682789]  kasan_report from krealloc_less_oob_helper+0x118/0x5d0
[  128.683642]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.684554]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.685436]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.686267]  kthread from ret_from_fork+0x14/0x30
[  128.686864] Exception stack(0xf9df3fb0 to 0xf9df3ff8)
[  128.687462] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.688119] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.689125] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.689726] 
[  128.690001] The buggy address belongs to the physical page:
[  128.690576] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.691341] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.692054] flags: 0x10000(head|zone=0)
[  128.692483] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.693309] raw: 00000000
[  128.693686] page dumped because: kasan: bad access detected
[  128.694183] 
[  128.694443] Memory state around the buggy address:
[  128.694987]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.695486]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.696245] >c5af6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  128.697146]                                       ^
[  128.697673]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.698365]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.698948] ==================================================================

test log snippet boot parser 360

Home

[  128.728504] ==================================================================
[  128.729211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a4/0x5d0
[  128.729863] Write of size 1 at addr c5af60da by task kunit_try_catch/186
[  128.730523] 
[  128.730802] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.731511] Hardware name: Generic DT based system
[  128.732065]  unwind_backtrace from show_stack+0x18/0x1c
[  128.732751]  show_stack from dump_stack_lvl+0x58/0x70
[  128.733258]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.733962]  print_report from kasan_report+0xb0/0xe4
[  128.734544]  kasan_report from krealloc_less_oob_helper+0x1a4/0x5d0
[  128.735309]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.736169]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.737874]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.738703]  kthread from ret_from_fork+0x14/0x30
[  128.739579] Exception stack(0xf9df3fb0 to 0xf9df3ff8)
[  128.740316] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.741164] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.741953] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.742503] 
[  128.742795] The buggy address belongs to the physical page:
[  128.743335] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.743970] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.744662] flags: 0x10000(head|zone=0)
[  128.745180] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.746028] raw: 00000000
[  128.746348] page dumped because: kasan: bad access detected
[  128.746790] 
[  128.747047] Memory state around the buggy address:
[  128.747587]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.748306]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.748928] >c5af6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  128.749514]                                             ^
[  128.750063]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.750746]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.751308] ==================================================================

test log snippet boot parser 361

Home

[  128.551878] ==================================================================
[  128.552368] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d8/0x5d0
[  128.553204] Write of size 1 at addr c4f4a2ea by task kunit_try_catch/184
[  128.553925] 
[  128.554204] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.554975] Hardware name: Generic DT based system
[  128.555524]  unwind_backtrace from show_stack+0x18/0x1c
[  128.556169]  show_stack from dump_stack_lvl+0x58/0x70
[  128.557588]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.558316]  print_report from kasan_report+0xb0/0xe4
[  128.558955]  kasan_report from krealloc_less_oob_helper+0x1d8/0x5d0
[  128.559790]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.560534]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.561466]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.562346]  kthread from ret_from_fork+0x14/0x30
[  128.562994] Exception stack(0xf9de3fb0 to 0xf9de3ff8)
[  128.563611] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.564326] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.565163] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.565685] 
[  128.565986] Allocated by task 184:
[  128.566454]  __kasan_krealloc+0xe0/0x104
[  128.566975]  krealloc+0xbc/0x12c
[  128.567467]  krealloc_less_oob_helper+0xd8/0x5d0
[  128.568028]  kunit_try_run_case+0x80/0x108
[  128.568605]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.569484]  kthread+0x148/0x16c
[  128.569919]  ret_from_fork+0x14/0x30
[  128.570386] 
[  128.570681] The buggy address belongs to the object at c4f4a200
[  128.570681]  which belongs to the cache kmalloc-256 of size 256
[  128.571687] The buggy address is located 234 bytes inside of
[  128.571687]  256-byte region [c4f4a200, c4f4a300)
[  128.572596] 
[  128.572886] The buggy address belongs to the physical page:
[  128.573445] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.574210] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.574977] flags: 0x10200(slab|head|zone=0)
[  128.575612] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.576752] raw: 00000000
[  128.577137] page dumped because: kasan: bad access detected
[  128.577793] 
[  128.578068] Memory state around the buggy address:
[  128.578669]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.579442]  c4f4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.580222] >c4f4a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  128.580774]                                                   ^
[  128.581354]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.582051]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.582582] ==================================================================

test log snippet boot parser 362

Home

[  128.777787] ==================================================================
[  128.778478] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x208/0x5d0
[  128.779201] Write of size 1 at addr c5af60eb by task kunit_try_catch/186
[  128.779960] 
[  128.780228] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.780968] Hardware name: Generic DT based system
[  128.781369]  unwind_backtrace from show_stack+0x18/0x1c
[  128.782106]  show_stack from dump_stack_lvl+0x58/0x70
[  128.782795]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.783393]  print_report from kasan_report+0xb0/0xe4
[  128.783962]  kasan_report from krealloc_less_oob_helper+0x208/0x5d0
[  128.784699]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.785548]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.786374]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.787300]  kthread from ret_from_fork+0x14/0x30
[  128.787945] Exception stack(0xf9df3fb0 to 0xf9df3ff8)
[  128.788546] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.789251] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.790118] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.790759] 
[  128.791006] The buggy address belongs to the physical page:
[  128.791515] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.792348] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.792914] flags: 0x10000(head|zone=0)
[  128.793472] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.794230] raw: 00000000
[  128.794592] page dumped because: kasan: bad access detected
[  128.795123] 
[  128.795389] Memory state around the buggy address:
[  128.795839]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.797407]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.798078] >c5af6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  128.798769]                                                   ^
[  128.799267]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.799994]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.800582] ==================================================================

test log snippet boot parser 363

Home

[  128.489366] ==================================================================
[  128.489985] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5d0
[  128.490696] Write of size 1 at addr c4f4a2d0 by task kunit_try_catch/184
[  128.491372] 
[  128.491601] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.492432] Hardware name: Generic DT based system
[  128.492959]  unwind_backtrace from show_stack+0x18/0x1c
[  128.493678]  show_stack from dump_stack_lvl+0x58/0x70
[  128.494245]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.494936]  print_report from kasan_report+0xb0/0xe4
[  128.495511]  kasan_report from krealloc_less_oob_helper+0x150/0x5d0
[  128.496284]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.497247]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.498179]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.499691]  kthread from ret_from_fork+0x14/0x30
[  128.500214] Exception stack(0xf9de3fb0 to 0xf9de3ff8)
[  128.500818] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.501586] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.502316] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.502945] 
[  128.503217] Allocated by task 184:
[  128.503627]  __kasan_krealloc+0xe0/0x104
[  128.504173]  krealloc+0xbc/0x12c
[  128.504658]  krealloc_less_oob_helper+0xd8/0x5d0
[  128.505257]  kunit_try_run_case+0x80/0x108
[  128.505853]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.506522]  kthread+0x148/0x16c
[  128.506960]  ret_from_fork+0x14/0x30
[  128.507436] 
[  128.507900] The buggy address belongs to the object at c4f4a200
[  128.507900]  which belongs to the cache kmalloc-256 of size 256
[  128.508876] The buggy address is located 208 bytes inside of
[  128.508876]  256-byte region [c4f4a200, c4f4a300)
[  128.509576] 
[  128.509867] The buggy address belongs to the physical page:
[  128.510405] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.511228] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.511844] flags: 0x10200(slab|head|zone=0)
[  128.512433] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.513228] raw: 00000000
[  128.513601] page dumped because: kasan: bad access detected
[  128.514152] 
[  128.514411] Memory state around the buggy address:
[  128.514900]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.515607]  c4f4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.516166] >c4f4a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  128.517094]                                          ^
[  128.517699]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.518301]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.518910] ==================================================================

test log snippet boot parser 364

Home

[  128.583731] ==================================================================
[  128.584392] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x208/0x5d0
[  128.585172] Write of size 1 at addr c4f4a2eb by task kunit_try_catch/184
[  128.585702] 
[  128.585916] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.587665] Hardware name: Generic DT based system
[  128.588239]  unwind_backtrace from show_stack+0x18/0x1c
[  128.589000]  show_stack from dump_stack_lvl+0x58/0x70
[  128.589557]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.590100]  print_report from kasan_report+0xb0/0xe4
[  128.590603]  kasan_report from krealloc_less_oob_helper+0x208/0x5d0
[  128.591434]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.592323]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.593142]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.593928]  kthread from ret_from_fork+0x14/0x30
[  128.594532] Exception stack(0xf9de3fb0 to 0xf9de3ff8)
[  128.595103] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.595903] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.596936] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.597526] 
[  128.597812] Allocated by task 184:
[  128.598195]  __kasan_krealloc+0xe0/0x104
[  128.598680]  krealloc+0xbc/0x12c
[  128.599144]  krealloc_less_oob_helper+0xd8/0x5d0
[  128.599705]  kunit_try_run_case+0x80/0x108
[  128.600283]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.601007]  kthread+0x148/0x16c
[  128.601478]  ret_from_fork+0x14/0x30
[  128.601880] 
[  128.602143] The buggy address belongs to the object at c4f4a200
[  128.602143]  which belongs to the cache kmalloc-256 of size 256
[  128.603104] The buggy address is located 235 bytes inside of
[  128.603104]  256-byte region [c4f4a200, c4f4a300)
[  128.604164] 
[  128.604434] The buggy address belongs to the physical page:
[  128.604987] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.605696] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.606678] flags: 0x10200(slab|head|zone=0)
[  128.607254] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.608001] raw: 00000000
[  128.608277] page dumped because: kasan: bad access detected
[  128.608884] 
[  128.609147] Memory state around the buggy address:
[  128.609716]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.610294]  c4f4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.611022] >c4f4a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  128.611706]                                                   ^
[  128.612159]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.612863]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.613541] ==================================================================

test log snippet boot parser 365

Home

[  128.752305] ==================================================================
[  128.752977] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d8/0x5d0
[  128.754111] Write of size 1 at addr c5af60ea by task kunit_try_catch/186
[  128.754676] 
[  128.754941] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.755752] Hardware name: Generic DT based system
[  128.756160]  unwind_backtrace from show_stack+0x18/0x1c
[  128.757749]  show_stack from dump_stack_lvl+0x58/0x70
[  128.758426]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.759157]  print_report from kasan_report+0xb0/0xe4
[  128.759857]  kasan_report from krealloc_less_oob_helper+0x1d8/0x5d0
[  128.760684]  krealloc_less_oob_helper from kunit_try_run_case+0x80/0x108
[  128.761491]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.762347]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.763096]  kthread from ret_from_fork+0x14/0x30
[  128.763710] Exception stack(0xf9df3fb0 to 0xf9df3ff8)
[  128.764173] 3fa0:                                     00000000 00000000 00000000 00000000
[  128.765014] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.765825] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.766536] 
[  128.766816] The buggy address belongs to the physical page:
[  128.767385] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.768238] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.769167] flags: 0x10000(head|zone=0)
[  128.769735] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.770500] raw: 00000000
[  128.770852] page dumped because: kasan: bad access detected
[  128.771283] 
[  128.771536] Memory state around the buggy address:
[  128.772102]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.772720]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.773246] >c5af6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  128.773937]                                                   ^
[  128.774561]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.775282]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.775906] ==================================================================

test log snippet boot parser 366

Home

[  128.418011] ==================================================================
[  128.418680] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x370
[  128.419438] Write of size 1 at addr c4f4a0f0 by task kunit_try_catch/183
[  128.420124] 
[  128.420393] CPU: 1 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.420983] Hardware name: Generic DT based system
[  128.421366]  unwind_backtrace from show_stack+0x18/0x1c
[  128.421908]  show_stack from dump_stack_lvl+0x58/0x70
[  128.422420]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.423119]  print_report from kasan_report+0xb0/0xe4
[  128.423709]  kasan_report from krealloc_more_oob_helper+0x180/0x370
[  128.424439]  krealloc_more_oob_helper from kunit_try_run_case+0x80/0x108
[  128.425298]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.426174]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.426978]  kthread from ret_from_fork+0x14/0x30
[  128.427647] Exception stack(0xf9ddbfb0 to 0xf9ddbff8)
[  128.428249] bfa0:                                     00000000 00000000 00000000 00000000
[  128.429692] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.430418] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.431009] 
[  128.431287] Allocated by task 183:
[  128.431734]  __kasan_krealloc+0xe0/0x104
[  128.432271]  krealloc+0xbc/0x12c
[  128.432746]  krealloc_more_oob_helper+0xd8/0x370
[  128.433319]  kunit_try_run_case+0x80/0x108
[  128.433842]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.434496]  kthread+0x148/0x16c
[  128.434919]  ret_from_fork+0x14/0x30
[  128.435428] 
[  128.435707] The buggy address belongs to the object at c4f4a000
[  128.435707]  which belongs to the cache kmalloc-256 of size 256
[  128.436923] The buggy address is located 240 bytes inside of
[  128.436923]  256-byte region [c4f4a000, c4f4a100)
[  128.437834] 
[  128.438095] The buggy address belongs to the physical page:
[  128.438641] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.439386] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.440051] flags: 0x10200(slab|head|zone=0)
[  128.440669] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.441416] raw: 00000000
[  128.441812] page dumped because: kasan: bad access detected
[  128.442409] 
[  128.442624] Memory state around the buggy address:
[  128.443180]  c4f49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.443792]  c4f4a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.444499] >c4f4a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  128.445019]                                                      ^
[  128.445694]  c4f4a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.446557]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.447463] ==================================================================

test log snippet boot parser 367

Home

[  128.645701] ==================================================================
[  128.646374] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x370
[  128.647183] Write of size 1 at addr c5af60f0 by task kunit_try_catch/185
[  128.648283] 
[  128.648572] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.649383] Hardware name: Generic DT based system
[  128.649921]  unwind_backtrace from show_stack+0x18/0x1c
[  128.650665]  show_stack from dump_stack_lvl+0x58/0x70
[  128.651332]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.651997]  print_report from kasan_report+0xb0/0xe4
[  128.652523]  kasan_report from krealloc_more_oob_helper+0x180/0x370
[  128.653347]  krealloc_more_oob_helper from kunit_try_run_case+0x80/0x108
[  128.654166]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.655116]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.656006]  kthread from ret_from_fork+0x14/0x30
[  128.656935] Exception stack(0xf9debfb0 to 0xf9debff8)
[  128.657948] bfa0:                                     00000000 00000000 00000000 00000000
[  128.658674] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.659411] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.660352] 
[  128.660593] The buggy address belongs to the physical page:
[  128.661125] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.661837] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.662499] flags: 0x10000(head|zone=0)
[  128.663057] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.663820] raw: 00000000
[  128.664184] page dumped because: kasan: bad access detected
[  128.664648] 
[  128.664918] Memory state around the buggy address:
[  128.665466]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.666161]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.666797] >c5af6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  128.667471]                                                      ^
[  128.668014]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.668733]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.669311] ==================================================================

test log snippet boot parser 368

Home

[  128.619884] ==================================================================
[  128.620812] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x148/0x370
[  128.621616] Write of size 1 at addr c5af60eb by task kunit_try_catch/185
[  128.622328] 
[  128.622561] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.623376] Hardware name: Generic DT based system
[  128.623941]  unwind_backtrace from show_stack+0x18/0x1c
[  128.624524]  show_stack from dump_stack_lvl+0x58/0x70
[  128.625205]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.625832]  print_report from kasan_report+0xb0/0xe4
[  128.626398]  kasan_report from krealloc_more_oob_helper+0x148/0x370
[  128.627201]  krealloc_more_oob_helper from kunit_try_run_case+0x80/0x108
[  128.628250]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.629049]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.629974]  kthread from ret_from_fork+0x14/0x30
[  128.630502] Exception stack(0xf9debfb0 to 0xf9debff8)
[  128.631122] bfa0:                                     00000000 00000000 00000000 00000000
[  128.631867] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.632733] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.633224] 
[  128.633501] The buggy address belongs to the physical page:
[  128.634116] page:5fd5bcf7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af4
[  128.634884] head:5fd5bcf7 order:2 compound_mapcount:0 compound_pincount:0
[  128.635566] flags: 0x10000(head|zone=0)
[  128.636176] raw: 00010000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  128.637165] raw: 00000000
[  128.637519] page dumped because: kasan: bad access detected
[  128.638015] 
[  128.638277] Memory state around the buggy address:
[  128.638808]  c5af5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.639424]  c5af6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.640146] >c5af6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  128.640777]                                                   ^
[  128.641377]  c5af6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.642072]  c5af6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  128.642730] ==================================================================

test log snippet boot parser 369

Home

[  128.384957] ==================================================================
[  128.385909] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x148/0x370
[  128.387036] Write of size 1 at addr c4f4a0eb by task kunit_try_catch/183
[  128.387704] 
[  128.387983] CPU: 1 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.389816] Hardware name: Generic DT based system
[  128.390335]  unwind_backtrace from show_stack+0x18/0x1c
[  128.391079]  show_stack from dump_stack_lvl+0x58/0x70
[  128.391619]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.392330]  print_report from kasan_report+0xb0/0xe4
[  128.393009]  kasan_report from krealloc_more_oob_helper+0x148/0x370
[  128.393735]  krealloc_more_oob_helper from kunit_try_run_case+0x80/0x108
[  128.394460]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.395426]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.396248]  kthread from ret_from_fork+0x14/0x30
[  128.397119] Exception stack(0xf9ddbfb0 to 0xf9ddbff8)
[  128.397658] bfa0:                                     00000000 00000000 00000000 00000000
[  128.398495] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.399242] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.399896] 
[  128.400117] Allocated by task 183:
[  128.400540]  __kasan_krealloc+0xe0/0x104
[  128.401038]  krealloc+0xbc/0x12c
[  128.401524]  krealloc_more_oob_helper+0xd8/0x370
[  128.402035]  kunit_try_run_case+0x80/0x108
[  128.402609]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.403332]  kthread+0x148/0x16c
[  128.403732]  ret_from_fork+0x14/0x30
[  128.404232] 
[  128.404496] The buggy address belongs to the object at c4f4a000
[  128.404496]  which belongs to the cache kmalloc-256 of size 256
[  128.405442] The buggy address is located 235 bytes inside of
[  128.405442]  256-byte region [c4f4a000, c4f4a100)
[  128.406400] 
[  128.406926] The buggy address belongs to the physical page:
[  128.407532] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.408250] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.408975] flags: 0x10200(slab|head|zone=0)
[  128.409523] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.410290] raw: 00000000
[  128.410667] page dumped because: kasan: bad access detected
[  128.411269] 
[  128.411529] Memory state around the buggy address:
[  128.411937]  c4f49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.412658]  c4f4a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.413359] >c4f4a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  128.413894]                                                   ^
[  128.414542]  c4f4a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.416030]  c4f4a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.416796] ==================================================================

test log snippet boot parser 370

Home

[  130.160649] ==================================================================
[  130.161814] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xe8/0x1e4
[  130.162593] Read of size 1 at addr c5abb080 by task kunit_try_catch/211
[  130.163285] 
[  130.163562] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.164413] Hardware name: Generic DT based system
[  130.165023]  unwind_backtrace from show_stack+0x18/0x1c
[  130.165867]  show_stack from dump_stack_lvl+0x58/0x70
[  130.166655]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.167295]  print_report from kasan_report+0xb0/0xe4
[  130.168020]  kasan_report from ksize_unpoisons_memory+0xe8/0x1e4
[  130.168890]  ksize_unpoisons_memory from kunit_try_run_case+0x80/0x108
[  130.169784]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.170726]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.171570]  kthread from ret_from_fork+0x14/0x30
[  130.172249] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[  130.172807] bfa0:                                     00000000 00000000 00000000 00000000
[  130.173684] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.174518] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.175139] 
[  130.175446] Allocated by task 211:
[  130.175863]  __kasan_kmalloc+0x8c/0x94
[  130.176457]  ksize_unpoisons_memory+0xa0/0x1e4
[  130.177014]  kunit_try_run_case+0x80/0x108
[  130.177608]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.178365]  kthread+0x148/0x16c
[  130.178827]  ret_from_fork+0x14/0x30
[  130.179331] 
[  130.179566] The buggy address belongs to the object at c5abb000
[  130.179566]  which belongs to the cache kmalloc-128 of size 128
[  130.180556] The buggy address is located 0 bytes to the right of
[  130.180556]  128-byte region [c5abb000, c5abb080)
[  130.181583] 
[  130.181875] The buggy address belongs to the physical page:
[  130.182404] page:c412f7c5 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abb
[  130.183328] flags: 0x200(slab|zone=0)
[  130.183843] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  130.184711] raw: 00000000
[  130.185012] page dumped because: kasan: bad access detected
[  130.185579] 
[  130.185816] Memory state around the buggy address:
[  130.186425]  c5abaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.187133]  c5abb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.187862] >c5abb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.188557]            ^
[  130.188959]  c5abb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.189657]  c5abb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.190313] ==================================================================

test log snippet boot parser 371

Home

[  130.467554] ==================================================================
[  130.468484] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[  130.469190] Read of size 1 at addr c5ab5e98 by task kunit_try_catch/218
[  130.469798] 
[  130.470056] CPU: 1 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.470757] Hardware name: Generic DT based system
[  130.471313]  unwind_backtrace from show_stack+0x18/0x1c
[  130.472016]  show_stack from dump_stack_lvl+0x58/0x70
[  130.472710]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.473391]  print_report from kasan_report+0xb0/0xe4
[  130.473969]  kasan_report from memcmp+0x30/0xa0
[  130.474588]  memcmp from kasan_memcmp+0x110/0x21c
[  130.475198]  kasan_memcmp from kunit_try_run_case+0x80/0x108
[  130.475982]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.476847]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.477905]  kthread from ret_from_fork+0x14/0x30
[  130.478546] Exception stack(0xf9ee3fb0 to 0xf9ee3ff8)
[  130.479165] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.479908] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.480746] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.481377] 
[  130.481666] Allocated by task 218:
[  130.482097]  __kasan_kmalloc+0x8c/0x94
[  130.482535]  kasan_memcmp+0xc8/0x21c
[  130.483073]  kunit_try_run_case+0x80/0x108
[  130.483602]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.484197]  kthread+0x148/0x16c
[  130.484685]  ret_from_fork+0x14/0x30
[  130.485175] 
[  130.485438] The buggy address belongs to the object at c5ab5e80
[  130.485438]  which belongs to the cache kmalloc-64 of size 64
[  130.486412] The buggy address is located 24 bytes inside of
[  130.486412]  64-byte region [c5ab5e80, c5ab5ec0)
[  130.487175] 
[  130.487453] The buggy address belongs to the physical page:
[  130.488078] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  130.488792] flags: 0x200(slab|zone=0)
[  130.489348] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  130.490000] raw: 00000000
[  130.490367] page dumped because: kasan: bad access detected
[  130.490938] 
[  130.491162] Memory state around the buggy address:
[  130.491680]  c5ab5d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.492253]  c5ab5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.492980] >c5ab5e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.493690]                     ^
[  130.494023]  c5ab5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.494703]  c5ab5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.495362] ==================================================================

test log snippet boot parser 372

Home

[  130.061872] ==================================================================
[  130.063268] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x170
[  130.064132] Read of size 1 at addr f9e93f0a by task kunit_try_catch/208
[  130.064905] 
[  130.065181] CPU: 1 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.065863] Hardware name: Generic DT based system
[  130.066275]  unwind_backtrace from show_stack+0x18/0x1c
[  130.067326]  show_stack from dump_stack_lvl+0x58/0x70
[  130.067914]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.068660]  print_report from kasan_report+0xb0/0xe4
[  130.069307]  kasan_report from kasan_stack_oob+0xc0/0x170
[  130.070051]  kasan_stack_oob from kunit_try_run_case+0x80/0x108
[  130.070768]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.071741]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.072569]  kthread from ret_from_fork+0x14/0x30
[  130.073173] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[  130.073767] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.074532] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.075379] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.076105] 
[  130.076721] The buggy address belongs to stack of task kunit_try_catch/208
[  130.077556]  and is located at offset 106 in frame:
[  130.078080]  kasan_stack_oob+0x0/0x170
[  130.079298] 
[  130.079537] This frame has 4 objects:
[  130.080049]  [32, 33) '__assertion'
[  130.080164]  [48, 52) 'array'
[  130.080625]  [64, 72) '__assertion'
[  130.081123]  [96, 106) 'stack_array'
[  130.081512] 
[  130.082235] The buggy address belongs to the virtual mapping at
[  130.082235]  [f9e90000, f9e95000) created by:
[  130.082235]  kernel_clone+0xcc/0x4b0
[  130.083267] 
[  130.083585] The buggy address belongs to the physical page:
[  130.084209] page:c4179b3c refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fbb2
[  130.085021] flags: 0x80000000(zone=2)
[  130.085426] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  130.086249] raw: 00000000
[  130.086521] page dumped because: kasan: bad access detected
[  130.087574] 
[  130.087933] Memory state around the buggy address:
[  130.088669]  f9e93e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.089384]  f9e93e80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[  130.090018] >f9e93f00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  130.090698]               ^
[  130.091051]  f9e93f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.091556]  f9e94000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  130.092254] ==================================================================

test log snippet boot parser 373

Home

[  131.128368] ==================================================================
[  131.129799] BUG: KASAN: use-after-free in kmalloc_double_kzfree+0xd4/0x1cc
[  131.130708] Read of size 1 at addr c5ac2800 by task kunit_try_catch/222
[  131.130991] 
[  131.131106] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.131441] Hardware name: Generic DT based system
[  131.131675]  unwind_backtrace from show_stack+0x18/0x1c
[  131.132343]  show_stack from dump_stack_lvl+0x58/0x70
[  131.132951]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.133656]  print_report from kasan_report+0xb0/0xe4
[  131.134340]  kasan_report from __kasan_check_byte+0x34/0x3c
[  131.134943]  __kasan_check_byte from kfree_sensitive+0x20/0x70
[  131.135508]  kfree_sensitive from kmalloc_double_kzfree+0xd4/0x1cc
[  131.136343]  kmalloc_double_kzfree from kunit_try_run_case+0x80/0x108
[  131.137691]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.138648]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.139516]  kthread from ret_from_fork+0x14/0x30
[  131.140085] Exception stack(0xf9f03fb0 to 0xf9f03ff8)
[  131.140556] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.141372] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.142127] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.142798] 
[  131.143036] Allocated by task 222:
[  131.143468]  __kasan_kmalloc+0x8c/0x94
[  131.143995]  kmalloc_double_kzfree+0xa0/0x1cc
[  131.144520]  kunit_try_run_case+0x80/0x108
[  131.145103]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.145732]  kthread+0x148/0x16c
[  131.146198]  ret_from_fork+0x14/0x30
[  131.146646] 
[  131.147443] Freed by task 222:
[  131.147892]  kasan_save_free_info+0x30/0x3c
[  131.148961]  __kasan_slab_free+0xdc/0x124
[  131.149506]  __kmem_cache_free+0x140/0x2ac
[  131.150065]  kmalloc_double_kzfree+0xc0/0x1cc
[  131.150601]  kunit_try_run_case+0x80/0x108
[  131.151107]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.151810]  kthread+0x148/0x16c
[  131.152283]  ret_from_fork+0x14/0x30
[  131.152783] 
[  131.153046] The buggy address belongs to the object at c5ac2800
[  131.153046]  which belongs to the cache kmalloc-64 of size 64
[  131.154000] The buggy address is located 0 bytes inside of
[  131.154000]  64-byte region [c5ac2800, c5ac2840)
[  131.154884] 
[  131.155158] The buggy address belongs to the physical page:
[  131.155728] page:ccf8751e refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ac2
[  131.156527] flags: 0x200(slab|zone=0)
[  131.157096] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  131.157837] raw: 00000000
[  131.158174] page dumped because: kasan: bad access detected
[  131.158683] 
[  131.158935] Memory state around the buggy address:
[  131.159366]  c5ac2700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.160099]  c5ac2780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.160740] >c5ac2800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  131.161258]            ^
[  131.161651]  c5ac2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.162348]  c5ac2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  131.163050] ==================================================================

test log snippet boot parser 374

Home

[  128.259308] ==================================================================
[  128.260302] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb8/0x1a8
[  128.261294] Read of size 1 at addr c5af0000 by task kunit_try_catch/178
[  128.262021] 
[  128.262272] CPU: 1 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.263841] Hardware name: Generic DT based system
[  128.264702]  unwind_backtrace from show_stack+0x18/0x1c
[  128.265307]  show_stack from dump_stack_lvl+0x58/0x70
[  128.265951]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.266530]  print_report from kasan_report+0xb0/0xe4
[  128.267207]  kasan_report from kmalloc_pagealloc_uaf+0xb8/0x1a8
[  128.267890]  kmalloc_pagealloc_uaf from kunit_try_run_case+0x80/0x108
[  128.268566]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.270017]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.270809]  kthread from ret_from_fork+0x14/0x30
[  128.271380] Exception stack(0xf9dbbfb0 to 0xf9dbbff8)
[  128.271918] bfa0:                                     00000000 00000000 00000000 00000000
[  128.272776] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.273518] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.274117] 
[  128.274335] The buggy address belongs to the physical page:
[  128.275017] page:7f4ab90c refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x45af0
[  128.275875] flags: 0x0(zone=0)
[  128.276293] raw: 00000000 e9ca5a54 e3b5ad44 00000000 00000000 00000000 ffffffff 00000000
[  128.277127] raw: 00000000
[  128.277453] page dumped because: kasan: bad access detected
[  128.277920] 
[  128.278182] Memory state around the buggy address:
[  128.278740]  c5aeff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.279422]  c5aeff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  128.280012] >c5af0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.280682]            ^
[  128.280980]  c5af0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.281699]  c5af0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.282325] ==================================================================

test log snippet boot parser 375

Home

[  129.311591] ==================================================================
[  129.312557] BUG: KASAN: use-after-free in kmalloc_uaf2+0x108/0x294
[  129.313284] Read of size 1 at addr c5ab56a8 by task kunit_try_catch/199
[  129.313876] 
[  129.314131] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.315059] Hardware name: Generic DT based system
[  129.315556]  unwind_backtrace from show_stack+0x18/0x1c
[  129.316345]  show_stack from dump_stack_lvl+0x58/0x70
[  129.316958]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.317736]  print_report from kasan_report+0xb0/0xe4
[  129.318399]  kasan_report from kmalloc_uaf2+0x108/0x294
[  129.319149]  kmalloc_uaf2 from kunit_try_run_case+0x80/0x108
[  129.319899]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.320800]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.321662]  kthread from ret_from_fork+0x14/0x30
[  129.322341] Exception stack(0xf9e4bfb0 to 0xf9e4bff8)
[  129.322976] bfa0:                                     00000000 00000000 00000000 00000000
[  129.323620] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.324516] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.325251] 
[  129.325476] Allocated by task 199:
[  129.325989]  __kasan_kmalloc+0x8c/0x94
[  129.326513]  kmalloc_uaf2+0xac/0x294
[  129.327093]  kunit_try_run_case+0x80/0x108
[  129.327579]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.328348]  kthread+0x148/0x16c
[  129.328747]  ret_from_fork+0x14/0x30
[  129.329303] 
[  129.329545] Freed by task 199:
[  129.329883]  kasan_save_free_info+0x30/0x3c
[  129.330483]  __kasan_slab_free+0xdc/0x124
[  129.331055]  __kmem_cache_free+0x140/0x2ac
[  129.331559]  kmalloc_uaf2+0xc4/0x294
[  129.332138]  kunit_try_run_case+0x80/0x108
[  129.332651]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.333380]  kthread+0x148/0x16c
[  129.333898]  ret_from_fork+0x14/0x30
[  129.334379] 
[  129.334643] The buggy address belongs to the object at c5ab5680
[  129.334643]  which belongs to the cache kmalloc-64 of size 64
[  129.335728] The buggy address is located 40 bytes inside of
[  129.335728]  64-byte region [c5ab5680, c5ab56c0)
[  129.336555] 
[  129.336883] The buggy address belongs to the physical page:
[  129.337496] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  129.338300] flags: 0x200(slab|zone=0)
[  129.338893] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  129.339576] raw: 00000000
[  129.339966] page dumped because: kasan: bad access detected
[  129.340611] 
[  129.340888] Memory state around the buggy address:
[  129.341430]  c5ab5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.342091]  c5ab5600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.342855] >c5ab5680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.343426]                           ^
[  129.343956]  c5ab5700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  129.344647]  c5ab5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.345288] ==================================================================

test log snippet boot parser 376

Home

[  129.223850] ==================================================================
[  129.224910] BUG: KASAN: use-after-free in kmalloc_uaf+0xd4/0x1c4
[  129.225683] Read of size 1 at addr c5ab5588 by task kunit_try_catch/197
[  129.226412] 
[  129.226954] CPU: 1 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.227826] Hardware name: Generic DT based system
[  129.228231]  unwind_backtrace from show_stack+0x18/0x1c
[  129.228844]  show_stack from dump_stack_lvl+0x58/0x70
[  129.229568]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.230201]  print_report from kasan_report+0xb0/0xe4
[  129.230908]  kasan_report from kmalloc_uaf+0xd4/0x1c4
[  129.231689]  kmalloc_uaf from kunit_try_run_case+0x80/0x108
[  129.232376]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.233306]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.234257]  kthread from ret_from_fork+0x14/0x30
[  129.234940] Exception stack(0xf9e3bfb0 to 0xf9e3bff8)
[  129.235532] bfa0:                                     00000000 00000000 00000000 00000000
[  129.236443] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.237662] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.238280] 
[  129.238588] Allocated by task 197:
[  129.239002]  __kasan_kmalloc+0x8c/0x94
[  129.239539]  kmalloc_uaf+0xa0/0x1c4
[  129.240051]  kunit_try_run_case+0x80/0x108
[  129.240687]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.241310]  kthread+0x148/0x16c
[  129.241814]  ret_from_fork+0x14/0x30
[  129.242357] 
[  129.242602] Freed by task 197:
[  129.243009]  kasan_save_free_info+0x30/0x3c
[  129.243656]  __kasan_slab_free+0xdc/0x124
[  129.244236]  __kmem_cache_free+0x140/0x2ac
[  129.244825]  kmalloc_uaf+0xc0/0x1c4
[  129.245325]  kunit_try_run_case+0x80/0x108
[  129.245990]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.246550]  kthread+0x148/0x16c
[  129.247265]  ret_from_fork+0x14/0x30
[  129.247802] 
[  129.248071] The buggy address belongs to the object at c5ab5580
[  129.248071]  which belongs to the cache kmalloc-64 of size 64
[  129.249079] The buggy address is located 8 bytes inside of
[  129.249079]  64-byte region [c5ab5580, c5ab55c0)
[  129.250192] 
[  129.250413] The buggy address belongs to the physical page:
[  129.251130] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  129.251951] flags: 0x200(slab|zone=0)
[  129.252582] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  129.253499] raw: 00000000
[  129.253879] page dumped because: kasan: bad access detected
[  129.254476] 
[  129.255050] Memory state around the buggy address:
[  129.255540]  c5ab5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.256430]  c5ab5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.257227] >c5ab5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.257872]               ^
[  129.258264]  c5ab5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.258909]  c5ab5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.259667] ==================================================================

test log snippet boot parser 377

Home

[  128.919891] ==================================================================
[  128.921147] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x238
[  128.921858] Read of size 16 at addr c8e88780 by task kunit_try_catch/189
[  128.922920] 
[  128.923302] CPU: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.924136] Hardware name: Generic DT based system
[  128.924526]  unwind_backtrace from show_stack+0x18/0x1c
[  128.925253]  show_stack from dump_stack_lvl+0x58/0x70
[  128.925796]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.926400]  print_report from kasan_report+0xb0/0xe4
[  128.927340]  kasan_report from kmalloc_uaf_16+0x104/0x238
[  128.928172]  kmalloc_uaf_16 from kunit_try_run_case+0x80/0x108
[  128.929255]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.930102]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.930923]  kthread from ret_from_fork+0x14/0x30
[  128.931604] Exception stack(0xf9e0bfb0 to 0xf9e0bff8)
[  128.932272] bfa0:                                     00000000 00000000 00000000 00000000
[  128.933230] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.934189] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.934970] 
[  128.935264] Allocated by task 189:
[  128.935737]  __kasan_kmalloc+0x8c/0x94
[  128.936327]  kmalloc_uaf_16+0xc8/0x238
[  128.937096]  kunit_try_run_case+0x80/0x108
[  128.937625]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.938139]  kthread+0x148/0x16c
[  128.938986]  ret_from_fork+0x14/0x30
[  128.939491] 
[  128.939767] Freed by task 189:
[  128.940162]  kasan_save_free_info+0x30/0x3c
[  128.941059]  __kasan_slab_free+0xdc/0x124
[  128.941719]  __kmem_cache_free+0x140/0x2ac
[  128.942365]  kmalloc_uaf_16+0xe8/0x238
[  128.943011]  kunit_try_run_case+0x80/0x108
[  128.943705]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.944535]  kthread+0x148/0x16c
[  128.945010]  ret_from_fork+0x14/0x30
[  128.945496] 
[  128.946117] The buggy address belongs to the object at c8e88780
[  128.946117]  which belongs to the cache kmalloc-64 of size 64
[  128.947992] The buggy address is located 0 bytes inside of
[  128.947992]  64-byte region [c8e88780, c8e887c0)
[  128.948836] 
[  128.949102] The buggy address belongs to the physical page:
[  128.949651] page:10ea8e91 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e88
[  128.950390] flags: 0x200(slab|zone=0)
[  128.950838] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  128.952119] raw: 00000000
[  128.952509] page dumped because: kasan: bad access detected
[  128.953093] 
[  128.953332] Memory state around the buggy address:
[  128.953834]  c8e88680: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.954488]  c8e88700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.955660] >c8e88780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  128.956209]            ^
[  128.956600]  c8e88800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.957227]  c8e88880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.957975] ==================================================================

test log snippet boot parser 378

Home

[  129.264901] ==================================================================
[  129.266080] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xdc/0x1cc
[  129.267294] Write of size 33 at addr c5ab5600 by task kunit_try_catch/198
[  129.268053] 
[  129.268379] CPU: 1 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  129.269461] Hardware name: Generic DT based system
[  129.270166]  unwind_backtrace from show_stack+0x18/0x1c
[  129.270928]  show_stack from dump_stack_lvl+0x58/0x70
[  129.271738]  dump_stack_lvl from print_report+0x164/0x4bc
[  129.272529]  print_report from kasan_report+0xb0/0xe4
[  129.273405]  kasan_report from kasan_check_range+0x148/0x194
[  129.274124]  kasan_check_range from memset+0x20/0x3c
[  129.274945]  memset from kmalloc_uaf_memset+0xdc/0x1cc
[  129.275799]  kmalloc_uaf_memset from kunit_try_run_case+0x80/0x108
[  129.276951]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.277882]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  129.278297]  kthread from ret_from_fork+0x14/0x30
[  129.278587] Exception stack(0xf9e43fb0 to 0xf9e43ff8)
[  129.279176] 3fa0:                                     00000000 00000000 00000000 00000000
[  129.280107] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  129.281119] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  129.281873] 
[  129.282171] Allocated by task 198:
[  129.282705]  __kasan_kmalloc+0x8c/0x94
[  129.283330]  kmalloc_uaf_memset+0xa0/0x1cc
[  129.283876]  kunit_try_run_case+0x80/0x108
[  129.284543]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.285342]  kthread+0x148/0x16c
[  129.285911]  ret_from_fork+0x14/0x30
[  129.286495] 
[  129.286841] Freed by task 198:
[  129.287729]  kasan_save_free_info+0x30/0x3c
[  129.288334]  __kasan_slab_free+0xdc/0x124
[  129.288985]  __kmem_cache_free+0x140/0x2ac
[  129.289576]  kmalloc_uaf_memset+0xc0/0x1cc
[  129.290267]  kunit_try_run_case+0x80/0x108
[  129.290835]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  129.291671]  kthread+0x148/0x16c
[  129.292242]  ret_from_fork+0x14/0x30
[  129.292726] 
[  129.293024] The buggy address belongs to the object at c5ab5600
[  129.293024]  which belongs to the cache kmalloc-64 of size 64
[  129.294299] The buggy address is located 0 bytes inside of
[  129.294299]  64-byte region [c5ab5600, c5ab5640)
[  129.295484] 
[  129.295757] The buggy address belongs to the physical page:
[  129.296523] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  129.297411] flags: 0x200(slab|zone=0)
[  129.298034] raw: 00000200 00000000 00000122 c4801200 00000000 80200020 ffffffff 00000001
[  129.299010] raw: 00000000
[  129.299466] page dumped because: kasan: bad access detected
[  129.300107] 
[  129.300436] Memory state around the buggy address:
[  129.301020]  c5ab5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.301893]  c5ab5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.302686] >c5ab5600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  129.303437]            ^
[  129.303814]  c5ab5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.304686]  c5ab5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  129.305513] ==================================================================

test log snippet boot parser 379

Home

[  130.415564] ==================================================================
[  130.416845] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xd4/0x1c0
[  130.417686] Read of size 1 at addr c5ab6500 by task kunit_try_catch/215
[  130.418297] 
[  130.418608] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.419552] Hardware name: Generic DT based system
[  130.420096]  unwind_backtrace from show_stack+0x18/0x1c
[  130.420915]  show_stack from dump_stack_lvl+0x58/0x70
[  130.421466]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.422176]  print_report from kasan_report+0xb0/0xe4
[  130.422800]  kasan_report from __kasan_check_byte+0x34/0x3c
[  130.423420]  __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[  130.424238]  kmem_cache_destroy from kmem_cache_double_destroy+0xd4/0x1c0
[  130.425134]  kmem_cache_double_destroy from kunit_try_run_case+0x80/0x108
[  130.425956]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.427100]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.428092]  kthread from ret_from_fork+0x14/0x30
[  130.428703] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[  130.429174] bfa0:                                     00000000 00000000 00000000 00000000
[  130.429991] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.430862] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.431400] 
[  130.431690] Allocated by task 215:
[  130.432131]  __kasan_slab_alloc+0x60/0x68
[  130.432697]  kmem_cache_alloc+0x188/0x53c
[  130.433174]  kmem_cache_create_usercopy+0x150/0x364
[  130.433712]  kmem_cache_create+0x28/0x30
[  130.434245]  kmem_cache_double_destroy+0xa0/0x1c0
[  130.434902]  kunit_try_run_case+0x80/0x108
[  130.435347]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.436025]  kthread+0x148/0x16c
[  130.436501]  ret_from_fork+0x14/0x30
[  130.436960] 
[  130.437224] Freed by task 215:
[  130.437628]  kasan_save_free_info+0x30/0x3c
[  130.438098]  __kasan_slab_free+0xdc/0x124
[  130.438648]  kmem_cache_free+0x170/0x420
[  130.439077]  kobject_put+0xfc/0x320
[  130.439601]  kmem_cache_double_destroy+0xc0/0x1c0
[  130.440191]  kunit_try_run_case+0x80/0x108
[  130.440731]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.441378]  kthread+0x148/0x16c
[  130.441854]  ret_from_fork+0x14/0x30
[  130.442351] 
[  130.442584] The buggy address belongs to the object at c5ab6500
[  130.442584]  which belongs to the cache kmem_cache of size 144
[  130.443673] The buggy address is located 0 bytes inside of
[  130.443673]  144-byte region [c5ab6500, c5ab6590)
[  130.444520] 
[  130.444818] The buggy address belongs to the physical page:
[  130.445416] page:c9557386 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab6
[  130.446138] flags: 0x200(slab|zone=0)
[  130.447714] raw: 00000200 00000000 00000122 c4801000 00000000 80100010 ffffffff 00000001
[  130.448752] raw: 00000000
[  130.449022] page dumped because: kasan: bad access detected
[  130.449643] 
[  130.449897] Memory state around the buggy address:
[  130.450423]  c5ab6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  130.450943]  c5ab6480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.451474] >c5ab6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.451960]            ^
[  130.452340]  c5ab6580: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.452983]  c5ab6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.453649] ==================================================================

test log snippet boot parser 380

Home

[  128.842338] ==================================================================
[  128.843681] BUG: KASAN: use-after-free in krealloc_uaf+0x11c/0x2cc
[  128.844424] Read of size 1 at addr c4f4a400 by task kunit_try_catch/187
[  128.844968] 
[  128.845245] CPU: 1 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.846132] Hardware name: Generic DT based system
[  128.847039]  unwind_backtrace from show_stack+0x18/0x1c
[  128.847651]  show_stack from dump_stack_lvl+0x58/0x70
[  128.848345]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.848993]  print_report from kasan_report+0xb0/0xe4
[  128.849593]  kasan_report from krealloc_uaf+0x11c/0x2cc
[  128.850278]  krealloc_uaf from kunit_try_run_case+0x80/0x108
[  128.851071]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.851924]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.852750]  kthread from ret_from_fork+0x14/0x30
[  128.853366] Exception stack(0xf9dfbfb0 to 0xf9dfbff8)
[  128.853971] bfa0:                                     00000000 00000000 00000000 00000000
[  128.854763] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.855569] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.856276] 
[  128.856799] Allocated by task 187:
[  128.857480]  __kasan_kmalloc+0x8c/0x94
[  128.858018]  krealloc_uaf+0xac/0x2cc
[  128.858486]  kunit_try_run_case+0x80/0x108
[  128.859475]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.860165]  kthread+0x148/0x16c
[  128.860679]  ret_from_fork+0x14/0x30
[  128.861176] 
[  128.861411] Freed by task 187:
[  128.861826]  kasan_save_free_info+0x30/0x3c
[  128.862313]  __kasan_slab_free+0xdc/0x124
[  128.862876]  __kmem_cache_free+0x140/0x2ac
[  128.863431]  krealloc_uaf+0xcc/0x2cc
[  128.863896]  kunit_try_run_case+0x80/0x108
[  128.864467]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.865016]  kthread+0x148/0x16c
[  128.865490]  ret_from_fork+0x14/0x30
[  128.866028] 
[  128.866288] The buggy address belongs to the object at c4f4a400
[  128.866288]  which belongs to the cache kmalloc-256 of size 256
[  128.867253] The buggy address is located 0 bytes inside of
[  128.867253]  256-byte region [c4f4a400, c4f4a500)
[  128.868151] 
[  128.868426] The buggy address belongs to the physical page:
[  128.869073] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.869984] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.870769] flags: 0x10200(slab|head|zone=0)
[  128.871402] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.872290] raw: 00000000
[  128.872521] page dumped because: kasan: bad access detected
[  128.873120] 
[  128.873381] Memory state around the buggy address:
[  128.873831]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.874506]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.875207] >c4f4a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.875859]            ^
[  128.876265]  c4f4a480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.877718]  c4f4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.878354] ==================================================================

test log snippet boot parser 381

Home

[  128.805881] ==================================================================
[  128.806906] BUG: KASAN: use-after-free in krealloc_uaf+0xe8/0x2cc
[  128.807241] Read of size 1 at addr c4f4a400 by task kunit_try_catch/187
[  128.807511] 
[  128.807626] CPU: 1 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.808283] Hardware name: Generic DT based system
[  128.808804]  unwind_backtrace from show_stack+0x18/0x1c
[  128.809469]  show_stack from dump_stack_lvl+0x58/0x70
[  128.810166]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.810893]  print_report from kasan_report+0xb0/0xe4
[  128.811532]  kasan_report from __kasan_check_byte+0x34/0x3c
[  128.812135]  __kasan_check_byte from krealloc+0x30/0x12c
[  128.812856]  krealloc from krealloc_uaf+0xe8/0x2cc
[  128.813496]  krealloc_uaf from kunit_try_run_case+0x80/0x108
[  128.814272]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.815037]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.815922]  kthread from ret_from_fork+0x14/0x30
[  128.816497] Exception stack(0xf9dfbfb0 to 0xf9dfbff8)
[  128.817605] bfa0:                                     00000000 00000000 00000000 00000000
[  128.818825] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.819605] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.820131] 
[  128.820404] Allocated by task 187:
[  128.820845]  __kasan_kmalloc+0x8c/0x94
[  128.821305]  krealloc_uaf+0xac/0x2cc
[  128.821856]  kunit_try_run_case+0x80/0x108
[  128.822423]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.823032]  kthread+0x148/0x16c
[  128.823519]  ret_from_fork+0x14/0x30
[  128.824045] 
[  128.824289] Freed by task 187:
[  128.824648]  kasan_save_free_info+0x30/0x3c
[  128.825099]  __kasan_slab_free+0xdc/0x124
[  128.825649]  __kmem_cache_free+0x140/0x2ac
[  128.826217]  krealloc_uaf+0xcc/0x2cc
[  128.826747]  kunit_try_run_case+0x80/0x108
[  128.827292]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.828000]  kthread+0x148/0x16c
[  128.828486]  ret_from_fork+0x14/0x30
[  128.828926] 
[  128.829188] The buggy address belongs to the object at c4f4a400
[  128.829188]  which belongs to the cache kmalloc-256 of size 256
[  128.830127] The buggy address is located 0 bytes inside of
[  128.830127]  256-byte region [c4f4a400, c4f4a500)
[  128.831012] 
[  128.831275] The buggy address belongs to the physical page:
[  128.831886] page:64f6c405 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44f4a
[  128.832654] head:64f6c405 order:1 compound_mapcount:0 compound_pincount:0
[  128.833278] flags: 0x10200(slab|head|zone=0)
[  128.833907] raw: 00010200 00000000 00000122 c4801500 00000000 80100010 ffffffff 00000001
[  128.834703] raw: 00000000
[  128.835048] page dumped because: kasan: bad access detected
[  128.835504] 
[  128.835780] Memory state around the buggy address:
[  128.836354]  c4f4a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.837014]  c4f4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.837563] >c4f4a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.838232]            ^
[  128.838545]  c4f4a480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  128.839166]  c4f4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  128.839869] ==================================================================

test log snippet boot parser 382

Home

[  130.197325] ==================================================================
[  130.198312] BUG: KASAN: use-after-free in ksize_uaf+0xd4/0x2f0
[  130.199042] Read of size 1 at addr c5abb100 by task kunit_try_catch/212
[  130.199758] 
[  130.200010] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.200843] Hardware name: Generic DT based system
[  130.201377]  unwind_backtrace from show_stack+0x18/0x1c
[  130.202112]  show_stack from dump_stack_lvl+0x58/0x70
[  130.202814]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.203338]  print_report from kasan_report+0xb0/0xe4
[  130.204043]  kasan_report from __kasan_check_byte+0x34/0x3c
[  130.204800]  __kasan_check_byte from ksize+0x20/0x54
[  130.205507]  ksize from ksize_uaf+0xd4/0x2f0
[  130.206135]  ksize_uaf from kunit_try_run_case+0x80/0x108
[  130.207195]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.208397]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.209065]  kthread from ret_from_fork+0x14/0x30
[  130.209749] Exception stack(0xf9eb3fb0 to 0xf9eb3ff8)
[  130.210292] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.211167] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.212045] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.212702] 
[  130.213014] Allocated by task 212:
[  130.213384]  __kasan_kmalloc+0x8c/0x94
[  130.213963]  ksize_uaf+0xa0/0x2f0
[  130.214470]  kunit_try_run_case+0x80/0x108
[  130.215093]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.215827]  kthread+0x148/0x16c
[  130.216348]  ret_from_fork+0x14/0x30
[  130.217109] 
[  130.217546] Freed by task 212:
[  130.217932]  kasan_save_free_info+0x30/0x3c
[  130.218542]  __kasan_slab_free+0xdc/0x124
[  130.219062]  __kmem_cache_free+0x140/0x2ac
[  130.219676]  ksize_uaf+0xc0/0x2f0
[  130.220110]  kunit_try_run_case+0x80/0x108
[  130.220756]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.221388]  kthread+0x148/0x16c
[  130.221921]  ret_from_fork+0x14/0x30
[  130.222324] 
[  130.222623] The buggy address belongs to the object at c5abb100
[  130.222623]  which belongs to the cache kmalloc-128 of size 128
[  130.223740] The buggy address is located 0 bytes inside of
[  130.223740]  128-byte region [c5abb100, c5abb180)
[  130.224673] 
[  130.224949] The buggy address belongs to the physical page:
[  130.225532] page:c412f7c5 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abb
[  130.226407] flags: 0x200(slab|zone=0)
[  130.227086] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  130.227915] raw: 00000000
[  130.228290] page dumped because: kasan: bad access detected
[  130.228936] 
[  130.229234] Memory state around the buggy address:
[  130.229831]  c5abb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.230594]  c5abb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.231207] >c5abb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.231945]            ^
[  130.232287]  c5abb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.233042]  c5abb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.233710] ==================================================================

test log snippet boot parser 383

Home

[  130.235967] ==================================================================
[  130.236974] BUG: KASAN: use-after-free in ksize_uaf+0xfc/0x2f0
[  130.237676] Read of size 1 at addr c5abb100 by task kunit_try_catch/212
[  130.238412] 
[  130.238683] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.239593] Hardware name: Generic DT based system
[  130.240180]  unwind_backtrace from show_stack+0x18/0x1c
[  130.240855]  show_stack from dump_stack_lvl+0x58/0x70
[  130.241594]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.242357]  print_report from kasan_report+0xb0/0xe4
[  130.243007]  kasan_report from ksize_uaf+0xfc/0x2f0
[  130.243684]  ksize_uaf from kunit_try_run_case+0x80/0x108
[  130.244479]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.245363]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.246206]  kthread from ret_from_fork+0x14/0x30
[  130.246916] Exception stack(0xf9eb3fb0 to 0xf9eb3ff8)
[  130.247520] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.248727] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.249532] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.250572] 
[  130.250874] Allocated by task 212:
[  130.251321]  __kasan_kmalloc+0x8c/0x94
[  130.251959]  ksize_uaf+0xa0/0x2f0
[  130.252529]  kunit_try_run_case+0x80/0x108
[  130.253120]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.253793]  kthread+0x148/0x16c
[  130.254273]  ret_from_fork+0x14/0x30
[  130.254792] 
[  130.254994] Freed by task 212:
[  130.255447]  kasan_save_free_info+0x30/0x3c
[  130.256066]  __kasan_slab_free+0xdc/0x124
[  130.256502]  __kmem_cache_free+0x140/0x2ac
[  130.257107]  ksize_uaf+0xc0/0x2f0
[  130.257568]  kunit_try_run_case+0x80/0x108
[  130.258192]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.258854]  kthread+0x148/0x16c
[  130.259289]  ret_from_fork+0x14/0x30
[  130.259842] 
[  130.260079] The buggy address belongs to the object at c5abb100
[  130.260079]  which belongs to the cache kmalloc-128 of size 128
[  130.261086] The buggy address is located 0 bytes inside of
[  130.261086]  128-byte region [c5abb100, c5abb180)
[  130.262158] 
[  130.262440] The buggy address belongs to the physical page:
[  130.263030] page:c412f7c5 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abb
[  130.263877] flags: 0x200(slab|zone=0)
[  130.264401] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  130.265175] raw: 00000000
[  130.265588] page dumped because: kasan: bad access detected
[  130.266159] 
[  130.266444] Memory state around the buggy address:
[  130.267507]  c5abb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.268872]  c5abb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.269640] >c5abb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.270339]            ^
[  130.270718]  c5abb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.271428]  c5abb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.272096] ==================================================================

test log snippet boot parser 384

Home

[  130.274600] ==================================================================
[  130.275370] BUG: KASAN: use-after-free in ksize_uaf+0x128/0x2f0
[  130.275998] Read of size 1 at addr c5abb178 by task kunit_try_catch/212
[  130.276536] 
[  130.276837] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.277605] Hardware name: Generic DT based system
[  130.278171]  unwind_backtrace from show_stack+0x18/0x1c
[  130.278925]  show_stack from dump_stack_lvl+0x58/0x70
[  130.279493]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.280214]  print_report from kasan_report+0xb0/0xe4
[  130.280760]  kasan_report from ksize_uaf+0x128/0x2f0
[  130.281449]  ksize_uaf from kunit_try_run_case+0x80/0x108
[  130.282225]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.283002]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.283877]  kthread from ret_from_fork+0x14/0x30
[  130.284511] Exception stack(0xf9eb3fb0 to 0xf9eb3ff8)
[  130.285074] 3fa0:                                     00000000 00000000 00000000 00000000
[  130.285792] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.286770] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.287714] 
[  130.288323] Allocated by task 212:
[  130.289037]  __kasan_kmalloc+0x8c/0x94
[  130.289524]  ksize_uaf+0xa0/0x2f0
[  130.289836]  kunit_try_run_case+0x80/0x108
[  130.290398]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.291073]  kthread+0x148/0x16c
[  130.291476]  ret_from_fork+0x14/0x30
[  130.291943] 
[  130.292207] Freed by task 212:
[  130.292604]  kasan_save_free_info+0x30/0x3c
[  130.293069]  __kasan_slab_free+0xdc/0x124
[  130.293606]  __kmem_cache_free+0x140/0x2ac
[  130.294155]  ksize_uaf+0xc0/0x2f0
[  130.294683]  kunit_try_run_case+0x80/0x108
[  130.295235]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.295867]  kthread+0x148/0x16c
[  130.296334]  ret_from_fork+0x14/0x30
[  130.296814] 
[  130.297072] The buggy address belongs to the object at c5abb100
[  130.297072]  which belongs to the cache kmalloc-128 of size 128
[  130.297917] The buggy address is located 120 bytes inside of
[  130.297917]  128-byte region [c5abb100, c5abb180)
[  130.298954] 
[  130.299226] The buggy address belongs to the physical page:
[  130.299804] page:c412f7c5 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45abb
[  130.300544] flags: 0x200(slab|zone=0)
[  130.301600] raw: 00000200 00000000 00000122 c4801300 00000000 80100010 ffffffff 00000001
[  130.302227] raw: 00000000
[  130.302701] page dumped because: kasan: bad access detected
[  130.303189] 
[  130.303452] Memory state around the buggy address:
[  130.304015]  c5abb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.304728]  c5abb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.305339] >c5abb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.305915]                                                         ^
[  130.306894]  c5abb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.308115]  c5abb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  130.308823] ==================================================================

test log snippet boot parser 385

Home

[  128.321014] ==================================================================
[  128.322341] BUG: KASAN: use-after-free in pagealloc_uaf+0xcc/0x1c4
[  128.323026] Read of size 1 at addr c8e90000 by task kunit_try_catch/181
[  128.323760] 
[  128.324055] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  128.325010] Hardware name: Generic DT based system
[  128.325608]  unwind_backtrace from show_stack+0x18/0x1c
[  128.326367]  show_stack from dump_stack_lvl+0x58/0x70
[  128.327427]  dump_stack_lvl from print_report+0x164/0x4bc
[  128.328010]  print_report from kasan_report+0xb0/0xe4
[  128.328700]  kasan_report from pagealloc_uaf+0xcc/0x1c4
[  128.329390]  pagealloc_uaf from kunit_try_run_case+0x80/0x108
[  128.330128]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  128.330916]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  128.331801]  kthread from ret_from_fork+0x14/0x30
[  128.332349] Exception stack(0xf9dcbfb0 to 0xf9dcbff8)
[  128.332961] bfa0:                                     00000000 00000000 00000000 00000000
[  128.333712] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  128.334556] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  128.335170] 
[  128.335463] The buggy address belongs to the physical page:
[  128.336036] page:7a23107e refcount:0 mapcount:-128 mapping:00000000 index:0x0 pfn:0x48e90
[  128.337268] flags: 0x0(zone=0)
[  128.337733] raw: 00000000 c409dcd0 c409dcd0 00000000 00000000 00000004 ffffff7f 00000000
[  128.338734] raw: 00000000
[  128.339056] page dumped because: kasan: bad access detected
[  128.339495] 
[  128.339774] Memory state around the buggy address:
[  128.340325]  c8e8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.340920]  c8e8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.341447] >c8e90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.341932]            ^
[  128.342316]  c8e90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.343018]  c8e90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  128.343729] ==================================================================

test log snippet boot parser 386

Home

[  130.507754] ==================================================================
[  130.509532] BUG: KASAN: use-after-free in strcmp+0x20/0x54
[  130.510052] Read of size 1 at addr c5ab5f10 by task kunit_try_catch/219
[  130.510766] 
[  130.510991] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.511874] Hardware name: Generic DT based system
[  130.512335]  unwind_backtrace from show_stack+0x18/0x1c
[  130.513074]  show_stack from dump_stack_lvl+0x58/0x70
[  130.513690]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.514390]  print_report from kasan_report+0xb0/0xe4
[  130.515073]  kasan_report from strcmp+0x20/0x54
[  130.515575]  strcmp from kasan_strings+0x13c/0x4d0
[  130.516226]  kasan_strings from kunit_try_run_case+0x80/0x108
[  130.517239]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.518939]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.519669]  kthread from ret_from_fork+0x14/0x30
[  130.520227] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[  130.520727] bfa0:                                     00000000 00000000 00000000 00000000
[  130.521424] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.522213] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.522860] 
[  130.523078] Allocated by task 219:
[  130.523516]  __kasan_kmalloc+0x8c/0x94
[  130.523992]  kasan_strings+0xa0/0x4d0
[  130.524527]  kunit_try_run_case+0x80/0x108
[  130.525029]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.525718]  kthread+0x148/0x16c
[  130.526089]  ret_from_fork+0x14/0x30
[  130.526583] 
[  130.526860] Freed by task 219:
[  130.527202]  kasan_save_free_info+0x30/0x3c
[  130.527736]  __kasan_slab_free+0xdc/0x124
[  130.528277]  __kmem_cache_free+0x140/0x2ac
[  130.528705]  kasan_strings+0xc4/0x4d0
[  130.529167]  kunit_try_run_case+0x80/0x108
[  130.529755]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.530442]  kthread+0x148/0x16c
[  130.530891]  ret_from_fork+0x14/0x30
[  130.531296] 
[  130.531553] The buggy address belongs to the object at c5ab5f00
[  130.531553]  which belongs to the cache kmalloc-64 of size 64
[  130.532458] The buggy address is located 16 bytes inside of
[  130.532458]  64-byte region [c5ab5f00, c5ab5f40)
[  130.533448] 
[  130.533734] The buggy address belongs to the physical page:
[  130.534342] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  130.535142] flags: 0x200(slab|zone=0)
[  130.535722] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.536373] raw: 00000000
[  130.536752] page dumped because: kasan: bad access detected
[  130.537350] 
[  130.537589] Memory state around the buggy address:
[  130.537988]  c5ab5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.538496]  c5ab5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.539241] >c5ab5f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.539947]                  ^
[  130.540378]  c5ab5f80: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.541047]  c5ab6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.541708] ==================================================================

test log snippet boot parser 387

Home

[  130.581781] ==================================================================
[  130.582505] BUG: KASAN: use-after-free in strlen+0xc/0x44
[  130.583002] Read of size 1 at addr c5ab5f10 by task kunit_try_catch/219
[  130.583701] 
[  130.583974] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.584873] Hardware name: Generic DT based system
[  130.585456]  unwind_backtrace from show_stack+0x18/0x1c
[  130.586141]  show_stack from dump_stack_lvl+0x58/0x70
[  130.586680]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.587670]  print_report from kasan_report+0xb0/0xe4
[  130.588385]  kasan_report from strlen+0xc/0x44
[  130.589066]  strlen from kasan_strings+0x19c/0x4d0
[  130.589741]  kasan_strings from kunit_try_run_case+0x80/0x108
[  130.590440]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.591443]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.592309]  kthread from ret_from_fork+0x14/0x30
[  130.592929] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[  130.593434] bfa0:                                     00000000 00000000 00000000 00000000
[  130.594324] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.595125] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.595799] 
[  130.596033] Allocated by task 219:
[  130.596626]  __kasan_kmalloc+0x8c/0x94
[  130.597457]  kasan_strings+0xa0/0x4d0
[  130.598606]  kunit_try_run_case+0x80/0x108
[  130.599189]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.599676]  kthread+0x148/0x16c
[  130.600184]  ret_from_fork+0x14/0x30
[  130.600704] 
[  130.600992] Freed by task 219:
[  130.601360]  kasan_save_free_info+0x30/0x3c
[  130.601991]  __kasan_slab_free+0xdc/0x124
[  130.602562]  __kmem_cache_free+0x140/0x2ac
[  130.603069]  kasan_strings+0xc4/0x4d0
[  130.603643]  kunit_try_run_case+0x80/0x108
[  130.604255]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.604836]  kthread+0x148/0x16c
[  130.605357]  ret_from_fork+0x14/0x30
[  130.605903] 
[  130.606166] The buggy address belongs to the object at c5ab5f00
[  130.606166]  which belongs to the cache kmalloc-64 of size 64
[  130.607277] The buggy address is located 16 bytes inside of
[  130.607277]  64-byte region [c5ab5f00, c5ab5f40)
[  130.608248] 
[  130.608522] The buggy address belongs to the physical page:
[  130.609064] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  130.609983] flags: 0x200(slab|zone=0)
[  130.610537] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.611375] raw: 00000000
[  130.611734] page dumped because: kasan: bad access detected
[  130.612358] 
[  130.612666] Memory state around the buggy address:
[  130.613224]  c5ab5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.613969]  c5ab5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.615022] >c5ab5f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.615773]                  ^
[  130.616185]  c5ab5f80: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.616857]  c5ab6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.617809] ==================================================================

test log snippet boot parser 388

Home

[  130.544906] ==================================================================
[  130.545656] BUG: KASAN: use-after-free in strncmp+0x34/0x70
[  130.546280] Read of size 1 at addr c5ab5f10 by task kunit_try_catch/219
[  130.546806] 
[  130.547137] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.548027] Hardware name: Generic DT based system
[  130.548642]  unwind_backtrace from show_stack+0x18/0x1c
[  130.549315]  show_stack from dump_stack_lvl+0x58/0x70
[  130.550046]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.550761]  print_report from kasan_report+0xb0/0xe4
[  130.551412]  kasan_report from strncmp+0x34/0x70
[  130.552005]  strncmp from kasan_strings+0x170/0x4d0
[  130.552752]  kasan_strings from kunit_try_run_case+0x80/0x108
[  130.553526]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.554409]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.555313]  kthread from ret_from_fork+0x14/0x30
[  130.555919] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[  130.556405] bfa0:                                     00000000 00000000 00000000 00000000
[  130.557738] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.559163] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.559966] 
[  130.560236] Allocated by task 219:
[  130.560614]  __kasan_kmalloc+0x8c/0x94
[  130.561075]  kasan_strings+0xa0/0x4d0
[  130.561594]  kunit_try_run_case+0x80/0x108
[  130.562119]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.562784]  kthread+0x148/0x16c
[  130.563271]  ret_from_fork+0x14/0x30
[  130.563733] 
[  130.563987] Freed by task 219:
[  130.564382]  kasan_save_free_info+0x30/0x3c
[  130.564844]  __kasan_slab_free+0xdc/0x124
[  130.565376]  __kmem_cache_free+0x140/0x2ac
[  130.565831]  kasan_strings+0xc4/0x4d0
[  130.566354]  kunit_try_run_case+0x80/0x108
[  130.566845]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.567539]  kthread+0x148/0x16c
[  130.568022]  ret_from_fork+0x14/0x30
[  130.568487] 
[  130.568742] The buggy address belongs to the object at c5ab5f00
[  130.568742]  which belongs to the cache kmalloc-64 of size 64
[  130.569734] The buggy address is located 16 bytes inside of
[  130.569734]  64-byte region [c5ab5f00, c5ab5f40)
[  130.570720] 
[  130.570930] The buggy address belongs to the physical page:
[  130.571363] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  130.572219] flags: 0x200(slab|zone=0)
[  130.572702] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.573436] raw: 00000000
[  130.573818] page dumped because: kasan: bad access detected
[  130.574413] 
[  130.574690] Memory state around the buggy address:
[  130.575172]  c5ab5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.575906]  c5ab5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.576520] >c5ab5f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.578014]                  ^
[  130.578417]  c5ab5f80: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.579870]  c5ab6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.580695] ==================================================================

test log snippet boot parser 389

Home

[  130.618836] ==================================================================
[  130.619422] BUG: KASAN: use-after-free in strnlen+0x30/0x58
[  130.620154] Read of size 1 at addr c5ab5f10 by task kunit_try_catch/219
[  130.620866] 
[  130.621421] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  130.623050] Hardware name: Generic DT based system
[  130.623552]  unwind_backtrace from show_stack+0x18/0x1c
[  130.624361]  show_stack from dump_stack_lvl+0x58/0x70
[  130.625146]  dump_stack_lvl from print_report+0x164/0x4bc
[  130.625808]  print_report from kasan_report+0xb0/0xe4
[  130.626502]  kasan_report from strnlen+0x30/0x58
[  130.627252]  strnlen from kasan_strings+0x1cc/0x4d0
[  130.628031]  kasan_strings from kunit_try_run_case+0x80/0x108
[  130.628919]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.629707]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  130.630557]  kthread from ret_from_fork+0x14/0x30
[  130.631113] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[  130.631653] bfa0:                                     00000000 00000000 00000000 00000000
[  130.632400] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  130.633115] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  130.633813] 
[  130.634073] Allocated by task 219:
[  130.634498]  __kasan_kmalloc+0x8c/0x94
[  130.634949]  kasan_strings+0xa0/0x4d0
[  130.635487]  kunit_try_run_case+0x80/0x108
[  130.635965]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.637006]  kthread+0x148/0x16c
[  130.637971]  ret_from_fork+0x14/0x30
[  130.638498] 
[  130.638758] Freed by task 219:
[  130.639130]  kasan_save_free_info+0x30/0x3c
[  130.639678]  __kasan_slab_free+0xdc/0x124
[  130.640155]  __kmem_cache_free+0x140/0x2ac
[  130.640964]  kasan_strings+0xc4/0x4d0
[  130.641455]  kunit_try_run_case+0x80/0x108
[  130.642033]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  130.642729]  kthread+0x148/0x16c
[  130.643146]  ret_from_fork+0x14/0x30
[  130.643559] 
[  130.643852] The buggy address belongs to the object at c5ab5f00
[  130.643852]  which belongs to the cache kmalloc-64 of size 64
[  130.645067] The buggy address is located 16 bytes inside of
[  130.645067]  64-byte region [c5ab5f00, c5ab5f40)
[  130.646134] 
[  130.646420] The buggy address belongs to the physical page:
[  130.647080] page:8d1ec0c1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45ab5
[  130.647986] flags: 0x200(slab|zone=0)
[  130.648467] raw: 00000200 00000000 00000122 c4801200 00000000 00200020 ffffffff 00000001
[  130.649148] raw: 00000000
[  130.649517] page dumped because: kasan: bad access detected
[  130.650008] 
[  130.650264] Memory state around the buggy address:
[  130.650679]  c5ab5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.651388]  c5ab5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.651932] >c5ab5f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  130.652601]                  ^
[  130.652999]  c5ab5f80: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[  130.653716]  c5ab6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  130.654295] ==================================================================

test log snippet boot parser 390

Home

[  131.237318] ==================================================================
[  131.237938] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x108/0x320
[  131.238556] Read of size 1 at addr f18b57f8 by task kunit_try_catch/224
[  131.239172] 
[  131.239458] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.240271] Hardware name: Generic DT based system
[  131.240731]  unwind_backtrace from show_stack+0x18/0x1c
[  131.241426]  show_stack from dump_stack_lvl+0x58/0x70
[  131.241993]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.242686]  print_report from kasan_report+0xb0/0xe4
[  131.243241]  kasan_report from vmalloc_oob+0x108/0x320
[  131.243904]  vmalloc_oob from kunit_try_run_case+0x80/0x108
[  131.244659]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.245446]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.246320]  kthread from ret_from_fork+0x14/0x30
[  131.246947] Exception stack(0xf9f13fb0 to 0xf9f13ff8)
[  131.247549] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.249248] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.249954] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.250678] 
[  131.250988] The buggy address belongs to the virtual mapping at
[  131.250988]  [f18b5000, f18b7000) created by:
[  131.250988]  vmalloc_oob+0x88/0x320
[  131.252251] 
[  131.252532] The buggy address belongs to the physical page:
[  131.253087] page:c65a9aaf refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fbda
[  131.253869] flags: 0x80000000(zone=2)
[  131.254464] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  131.255239] raw: 00000000
[  131.255657] page dumped because: kasan: bad access detected
[  131.256321] 
[  131.256522] Memory state around the buggy address:
[  131.257116]  f18b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.257777]  f18b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.258541] >f18b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  131.259173]                                                         ^
[  131.259828]  f18b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.260589]  f18b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.261259] ==================================================================

test log snippet boot parser 391

Home

[  131.209093] ==================================================================
[  131.210363] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x320
[  131.211125] Read of size 1 at addr f18b57f3 by task kunit_try_catch/224
[  131.211829] 
[  131.212088] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[  131.212887] Hardware name: Generic DT based system
[  131.213429]  unwind_backtrace from show_stack+0x18/0x1c
[  131.214008]  show_stack from dump_stack_lvl+0x58/0x70
[  131.214694]  dump_stack_lvl from print_report+0x164/0x4bc
[  131.215252]  print_report from kasan_report+0xb0/0xe4
[  131.215951]  kasan_report from vmalloc_oob+0xd8/0x320
[  131.217195]  vmalloc_oob from kunit_try_run_case+0x80/0x108
[  131.217986]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  131.218864]  kunit_generic_run_threadfn_adapter from kthread+0x148/0x16c
[  131.219648]  kthread from ret_from_fork+0x14/0x30
[  131.220192] Exception stack(0xf9f13fb0 to 0xf9f13ff8)
[  131.220794] 3fa0:                                     00000000 00000000 00000000 00000000
[  131.221495] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  131.222252] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  131.222982] 
[  131.223269] The buggy address belongs to the virtual mapping at
[  131.223269]  [f18b5000, f18b7000) created by:
[  131.223269]  vmalloc_oob+0x88/0x320
[  131.224478] 
[  131.225161] The buggy address belongs to the physical page:
[  131.225993] page:c65a9aaf refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fbda
[  131.227088] flags: 0x80000000(zone=2)
[  131.227691] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  131.228380] raw: 00000000
[  131.228753] page dumped because: kasan: bad access detected
[  131.229348] 
[  131.229579] Memory state around the buggy address:
[  131.229997]  f18b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.230728]  f18b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  131.231415] >f18b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  131.231908]                                                      ^
[  131.232569]  f18b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.233283]  f18b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  131.233814] ==================================================================

test log snippet boot parser 392

Home

[   57.451669] ==================================================================
[   57.452107] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu.cold+0xb8/0x1b8
[   57.452107] 
[   57.452159] Use-after-free read at 0x(ptrval) (in kfence-#111):
[   57.452159]  test_memcache_typesafe_by_rcu.cold+0xb8/0x1b8
[   57.452159]  kunit_try_run_case+0x52/0x80
[   57.452159]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   57.452159]  kthread+0xda/0x100
[   57.452159]  ret_from_fork+0x1c/0x28
[   57.452159] 
[   57.452159] kfence-#111: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   57.452159] 
[   57.452159] allocated by task 222 on cpu 1 at 57.444467s:
[   57.452159]  test_alloc+0xb7/0x219
[   57.452159]  test_memcache_typesafe_by_rcu.cold+0x31/0x1b8
[   57.452159]  kunit_try_run_case+0x52/0x80
[   57.452159]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   57.452159]  kthread+0xda/0x100
[   57.452159]  ret_from_fork+0x1c/0x28
[   57.452159] 
[   57.452159] freed by task 0 on cpu 1 at 57.451442s:
[   57.452159]  rcu_guarded_free+0x15/0x20
[   57.452159]  rcu_core+0x251/0x9c0
[   57.452159]  rcu_core_si+0xd/0x10
[   57.452159]  handle_softirqs+0xd8/0x300
[   57.452159]  __do_softirq+0xf/0x11
[   57.452159]  call_on_stack+0x4c/0x60
[   57.452159]  do_softirq_own_stack+0x21/0x30
[   57.452159]  irq_exit_rcu+0xb3/0xe0
[   57.452159]  sysvec_apic_timer_interrupt+0x2c/0x40
[   57.452159]  handle_exception_return+0x0/0xad
[   57.452159]  default_idle+0x13/0x20
[   57.452159]  arch_cpu_idle+0x12/0x20
[   57.452159]  default_idle_call+0x48/0xf0
[   57.452159]  do_idle+0x21a/0x2b0
[   57.452159]  cpu_startup_entry+0x35/0x40
[   57.452159]  start_secondary+0x11f/0x140
[   57.452159]  startup_32_smp+0x161/0x164
[   57.452159] 
[   57.452159] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   57.452159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   57.452159] ==================================================================

test log snippet boot parser 393

Home

------------[ cut here ]------------
[    5.145751] WARNING: CPU: 1 PID: 222 at kernel/smp.c:923 smp_call_function_many_cond+0x3b0/0x3c4
[    5.154632] Modules linked in:
[    5.157714] CPU: 1 PID: 222 Comm: (direxec) Not tainted 6.1.125-rc1 #1
[    5.164276] Hardware name: Generic DRA74X (Flattened Device Tree)
[    5.170410]  unwind_backtrace from show_stack+0x18/0x1c
[    5.175689]  show_stack from dump_stack_lvl+0x58/0x70
[    5.180786]  dump_stack_lvl from __warn+0x80/0x12c
[    5.185607]  __warn from warn_slowpath_fmt+0x18c/0x194
[    5.190795]  warn_slowpath_fmt from smp_call_function_many_cond+0x3b0/0x3c4
[    5.197814]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    5.204650]  smp_call_function from set_memory_valid+0x84/0xc0
[    5.210540]  set_memory_valid from kfence_guarded_free+0x2cc/0x4a8
[    5.216766]  kfence_guarded_free from kmem_cache_free+0x240/0x444
[    5.222900]  kmem_cache_free from rcu_core+0x2bc/0x954
[    5.228088]  rcu_core from handle_softirqs+0x150/0x3d4
[    5.233276]  handle_softirqs from __irq_exit_rcu+0x98/0xbc
[    5.238800]  __irq_exit_rcu from irq_exit+0x10/0x30
[    5.243743]  irq_exit from call_with_stack+0x18/0x20
[    5.248748]  call_with_stack from __irq_svc+0x88/0x9c
[    5.253845] Exception stack(0xf16f1dd8 to 0xf16f1e20)
[    5.258911] 1dc0:                                                       c143d2d0 00000000
[    5.267150] 1de0: 2da83000 60090193 20090113 00000000 c3870ac0 04e00000 c3b11600 c3870ac0
[    5.275360] 1e00: faadd75f 00e00000 00000000 f16f1e28 c054c56c c143d2d4 60090113 ffffffff
[    5.283599]  __irq_svc from _raw_spin_unlock_irqrestore+0x40/0x44
[    5.289733]  _raw_spin_unlock_irqrestore from broadcast_tlb_mm_a15_erratum+0x7c/0x9c
[    5.297546]  broadcast_tlb_mm_a15_erratum from ptep_clear_flush+0x70/0x74
[    5.304382]  ptep_clear_flush from wp_page_copy+0x274/0x814
[    5.309997]  wp_page_copy from handle_mm_fault+0xba0/0x117c
[    5.315612]  handle_mm_fault from do_page_fault+0x1a8/0x370
[    5.321228]  do_page_fault from do_DataAbort+0x38/0xac
[    5.326385]  do_DataAbort from __dabt_usr+0x58/0x60
[    5.331298] Exception stack(0xf16f1fb0 to 0xf16f1ff8)
[    5.336364] 1fa0:                                     00000041 00000018 00000018 80000000
[    5.344604] 1fc0: 00493720 00000020 00000493 004905a8 00493740 b6ad3604 0049013b b6ad3618
[    5.352813] 1fe0: b6ad3638 beace4c0 b6a2b36d b6a2b2c0 80094830 ffffffff
[    5.359497] ---[ end trace 0000000000000000 ]---

test log snippet test parser 1

Home

------------[ cut here ]------------
[   51.880410] WARNING: CPU: 5 PID: 1907 at mm/util.c:596 kvmalloc_node+0xf0/0xf8
[   51.896501] Modules linked in: snd_soc_hdmi_codec fuse ip_tables x_tables ax88179_178a usbnet xhci_pci xhci_pci_renesas venus_dec venus_enc videobuf2_dma_contig mcp251xfd hci_uart can_dev btqca btbcm lontium_lt9611 leds_qcom_lpg qcom_camss snd_soc_sdm845 snd_soc_rt5663 qcom_pon videobuf2_dma_sg led_class_multicolor snd_soc_qcom_common v4l2_fwnode venus_core ath10k_snoc qcom_spmi_adc5 snd_soc_rl6231 qcom_spmi_temp_alarm rtc_pm8xxx qcom_vadc_common ath10k_core v4l2_mem2mem v4l2_async msm videobuf2_v4l2 videobuf2_memops soundwire_bus ath bluetooth ocmem videobuf2_common crct10dif_ce mac80211 ecdh_generic gpu_sched ecc i2c_qcom_cci spi_geni_qcom qcom_stats drm_dp_aux_bus libarc4 reset_qcom_pdc drm_display_helper videodev camcc_sdm845 mc i2c_qcom_geni qcom_rng coresight_stm phy_qcom_qmp_usb coresight_replicator coresight_tmc coresight_funnel stm_core phy_qcom_qmp_ufs qrtr phy_qcom_qusb2 gpi qcom_q6v5_mss coresight slim_qcom_ngd_ctrl pdr_interface ufs_qcom icc_bwmon qcom_q6v5_pas
[   51.896634]  qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common qcom_glink_smem display_connector qcom_wdt drm_kms_helper cfg80211 qmi_helpers phy_qcom_qmp_pcie rfkill slimbus icc_osm_l3 lmh llcc_qcom mdt_loader drm socinfo rmtfs_mem
[   52.021405] CPU: 5 PID: 1907 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   52.037507] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.052250] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   52.068391] pc : kvmalloc_node+0xf0/0xf8
[   52.081381] lr : kvmalloc_node+0x50/0xf8
[   52.094380] sp : ffff80000feabce0
[   52.106676] x29: ffff80000feabcf0 x28: ffff7aeb85878fc0 x27: 0000000000000000
[   52.122832] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   52.138973] x23: 0000000080000000 x22: ffffacd68b4ee970 x21: 0000000200002000
[   52.155116] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   52.171258] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   52.187400] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   52.203540] x11: 0000000000000040 x10: 5193f21e68f6f300 x9 : 5193f21e68f6f300
[   52.219681] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   52.235821] x5 : 0000000000000000 x4 : ffffacd68b4232b4 x3 : 0000000000000000
[   52.251960] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   52.268099] Call trace:
[   52.279335]  kvmalloc_node+0xf0/0xf8
[   52.291634]  alloc_fdtable+0x7c/0x108
[   52.303939]  expand_files+0x114/0x2f0
[   52.316238]  ksys_dup3+0x60/0xf4
[   52.328534]  __arm64_sys_dup3+0x20/0x30
[   52.341530]  invoke_syscall+0x40/0x104
[   52.353829]  el0_svc_common+0xb0/0xec
[   52.366129]  do_el0_svc+0x24/0x8c
[   52.378428]  el0_svc+0x2c/0x58
[   52.390373]  el0t_64_sync_handler+0x84/0xf0
[   52.403372]  el0t_64_sync+0x18c/0x190
[   52.415674] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffa532f7063ce0
[    0.000000] x29: ffffa532f7063ce0 x28: 0000000081000200 x27: ffffa532f6215be0
[    0.000000] x26: ffffa532f625eca0 x25: ffffa532f7467ce0 x24: ffffa532f5e38ad0
[    0.000000] x23: ffffa532f766c390 x22: 0000000000000001 x21: ffffa532f708abd8
[    0.000000] x20: ffffa532f766c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffa532f70637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffa532f70eb878 x9 : ffffa532f7093878
[    0.000000] x8 : ffffa532f7063ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffa532f766c000 x4 : ffffa532f643e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 3

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffd26bc1263ce0
[    0.000000] x29: ffffd26bc1263ce0 x28: 0000000081000200 x27: ffffd26bc0415be0
[    0.000000] x26: ffffd26bc045eca0 x25: ffffd26bc1667ce0 x24: ffffd26bc0038ad0
[    0.000000] x23: ffffd26bc186c390 x22: 0000000000000001 x21: ffffd26bc128abd8
[    0.000000] x20: ffffd26bc186c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffd26bc12637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffd26bc12eb878 x9 : ffffd26bc1293878
[    0.000000] x8 : ffffd26bc1263ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffd26bc186c000 x4 : ffffd26bc063e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 4

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffa1bfe4263ce0
[    0.000000] x29: ffffa1bfe4263ce0 x28: 0000000081000200 x27: ffffa1bfe3415be0
[    0.000000] x26: ffffa1bfe345eca0 x25: ffffa1bfe4667ce0 x24: ffffa1bfe3038ad0
[    0.000000] x23: ffffa1bfe486c390 x22: 0000000000000001 x21: ffffa1bfe428abd8
[    0.000000] x20: ffffa1bfe486c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffa1bfe42637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffa1bfe42eb878 x9 : ffffa1bfe4293878
[    0.000000] x8 : ffffa1bfe4263ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffa1bfe486c000 x4 : ffffa1bfe363e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 5

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffc4a893c63ce0
[    0.000000] x29: ffffc4a893c63ce0 x28: 0000000081000200 x27: ffffc4a892e15be0
[    0.000000] x26: ffffc4a892e5eca0 x25: ffffc4a894067ce0 x24: ffffc4a892a38ad0
[    0.000000] x23: ffffc4a89426c390 x22: 0000000000000001 x21: ffffc4a893c8abd8
[    0.000000] x20: ffffc4a89426c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc4a893c637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffc4a893ceb878 x9 : ffffc4a893c93878
[    0.000000] x8 : ffffc4a893c63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc4a89426c000 x4 : ffffc4a89303e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 6

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffdf9f16463ce0
[    0.000000] x29: ffffdf9f16463ce0 x28: 0000000081000200 x27: ffffdf9f15615be0
[    0.000000] x26: ffffdf9f1565eca0 x25: ffffdf9f16867ce0 x24: ffffdf9f15238ad0
[    0.000000] x23: ffffdf9f16a6c390 x22: 0000000000000001 x21: ffffdf9f1648abd8
[    0.000000] x20: ffffdf9f16a6c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffdf9f164637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffdf9f164eb878 x9 : ffffdf9f16493878
[    0.000000] x8 : ffffdf9f16463ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffdf9f16a6c000 x4 : ffffdf9f1583e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 7

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffdecdc7263ce0
[    0.000000] x29: ffffdecdc7263ce0 x28: 0000000081000200 x27: ffffdecdc6415be0
[    0.000000] x26: ffffdecdc645eca0 x25: ffffdecdc7667ce0 x24: ffffdecdc6038ad0
[    0.000000] x23: ffffdecdc786c390 x22: 0000000000000001 x21: ffffdecdc728abd8
[    0.000000] x20: ffffdecdc786c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffdecdc72637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffdecdc72eb878 x9 : ffffdecdc7293878
[    0.000000] x8 : ffffdecdc7263ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffdecdc786c000 x4 : ffffdecdc663e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 8

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffd47533863ce0
[    0.000000] x29: ffffd47533863ce0 x28: 0000000081000200 x27: ffffd47532a15be0
[    0.000000] x26: ffffd47532a5eca0 x25: ffffd47533c67ce0 x24: ffffd47532638ad0
[    0.000000] x23: ffffd47533e6c390 x22: 0000000000000001 x21: ffffd4753388abd8
[    0.000000] x20: ffffd47533e6c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffd475338637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffd475338eb878 x9 : ffffd47533893878
[    0.000000] x8 : ffffd47533863ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffd47533e6c000 x4 : ffffd47532c3e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 9

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffb96217a63ce0
[    0.000000] x29: ffffb96217a63ce0 x28: 0000000081000200 x27: ffffb96216c15be0
[    0.000000] x26: ffffb96216c5eca0 x25: ffffb96217e67ce0 x24: ffffb96216838ad0
[    0.000000] x23: ffffb9621806c390 x22: 0000000000000001 x21: ffffb96217a8abd8
[    0.000000] x20: ffffb9621806c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffb96217a637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffb96217aeb878 x9 : ffffb96217a93878
[    0.000000] x8 : ffffb96217a63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffb9621806c000 x4 : ffffb96216e3e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 10

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffa04334e63ce0
[    0.000000] x29: ffffa04334e63ce0 x28: 0000000081000200 x27: ffffa04334015be0
[    0.000000] x26: ffffa0433405eca0 x25: ffffa04335267ce0 x24: ffffa04333c38ad0
[    0.000000] x23: ffffa0433546c390 x22: 0000000000000001 x21: ffffa04334e8abd8
[    0.000000] x20: ffffa0433546c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffa04334e637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffa04334eeb878 x9 : ffffa04334e93878
[    0.000000] x8 : ffffa04334e63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffa0433546c000 x4 : ffffa0433423e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 11

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffbb785b263ce0
[    0.000000] x29: ffffbb785b263ce0 x28: 0000000081000200 x27: ffffbb785a415be0
[    0.000000] x26: ffffbb785a45eca0 x25: ffffbb785b667ce0 x24: ffffbb785a038ad0
[    0.000000] x23: ffffbb785b86c390 x22: 0000000000000001 x21: ffffbb785b28abd8
[    0.000000] x20: ffffbb785b86c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffbb785b2637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffbb785b2eb878 x9 : ffffbb785b293878
[    0.000000] x8 : ffffbb785b263ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffbb785b86c000 x4 : ffffbb785a63e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 12

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffda11a7c63ce0
[    0.000000] x29: ffffda11a7c63ce0 x28: 0000000081000200 x27: ffffda11a6e15be0
[    0.000000] x26: ffffda11a6e5eca0 x25: ffffda11a8067ce0 x24: ffffda11a6a38ad0
[    0.000000] x23: ffffda11a826c390 x22: 0000000000000001 x21: ffffda11a7c8abd8
[    0.000000] x20: ffffda11a826c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffda11a7c637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffda11a7ceb878 x9 : ffffda11a7c93878
[    0.000000] x8 : ffffda11a7c63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffda11a826c000 x4 : ffffda11a703e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 13

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffd47241e63ce0
[    0.000000] x29: ffffd47241e63ce0 x28: 0000000081000200 x27: ffffd47241015be0
[    0.000000] x26: ffffd4724105eca0 x25: ffffd47242267ce0 x24: ffffd47240c38ad0
[    0.000000] x23: ffffd4724246c390 x22: 0000000000000001 x21: ffffd47241e8abd8
[    0.000000] x20: ffffd4724246c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffd47241e637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffd47241eeb878 x9 : ffffd47241e93878
[    0.000000] x8 : ffffd47241e63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffd4724246c000 x4 : ffffd4724123e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 14

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffd75c7b063ce0
[    0.000000] x29: ffffd75c7b063ce0 x28: 0000000081000200 x27: ffffd75c7a215be0
[    0.000000] x26: ffffd75c7a25eca0 x25: ffffd75c7b467ce0 x24: ffffd75c79e38ad0
[    0.000000] x23: ffffd75c7b66c390 x22: 0000000000000001 x21: ffffd75c7b08abd8
[    0.000000] x20: ffffd75c7b66c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffd75c7b0637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffd75c7b0eb878 x9 : ffffd75c7b093878
[    0.000000] x8 : ffffd75c7b063ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffd75c7b66c000 x4 : ffffd75c7a43e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 15

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffac53c2863ce0
[    0.000000] x29: ffffac53c2863ce0 x28: 0000000081000200 x27: ffffac53c1a15be0
[    0.000000] x26: ffffac53c1a5eca0 x25: ffffac53c2c67ce0 x24: ffffac53c1638ad0
[    0.000000] x23: ffffac53c2e6c390 x22: 0000000000000001 x21: ffffac53c288abd8
[    0.000000] x20: ffffac53c2e6c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffac53c28637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffac53c28eb878 x9 : ffffac53c2893878
[    0.000000] x8 : ffffac53c2863ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffac53c2e6c000 x4 : ffffac53c1c3e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 16

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffc7f9a2863ce0
[    0.000000] x29: ffffc7f9a2863ce0 x28: 0000000081000200 x27: ffffc7f9a1a15be0
[    0.000000] x26: ffffc7f9a1a5eca0 x25: ffffc7f9a2c67ce0 x24: ffffc7f9a1638ad0
[    0.000000] x23: ffffc7f9a2e6c390 x22: 0000000000000001 x21: ffffc7f9a288abd8
[    0.000000] x20: ffffc7f9a2e6c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc7f9a28637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffc7f9a28eb878 x9 : ffffc7f9a2893878
[    0.000000] x8 : ffffc7f9a2863ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc7f9a2e6c000 x4 : ffffc7f9a1c3e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 17

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffa9c272e63ce0
[    0.000000] x29: ffffa9c272e63ce0 x28: 0000000081000200 x27: ffffa9c272015be0
[    0.000000] x26: ffffa9c27205eca0 x25: ffffa9c273267ce0 x24: ffffa9c271c38ad0
[    0.000000] x23: ffffa9c27346c390 x22: 0000000000000001 x21: ffffa9c272e8abd8
[    0.000000] x20: ffffa9c27346c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffa9c272e637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffa9c272eeb878 x9 : ffffa9c272e93878
[    0.000000] x8 : ffffa9c272e63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffa9c27346c000 x4 : ffffa9c27223e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 18

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffc37296663ce0
[    0.000000] x29: ffffc37296663ce0 x28: 0000000081000200 x27: ffffc37295815be0
[    0.000000] x26: ffffc3729585eca0 x25: ffffc37296a67ce0 x24: ffffc37295438ad0
[    0.000000] x23: ffffc37296c6c390 x22: 0000000000000001 x21: ffffc3729668abd8
[    0.000000] x20: ffffc37296c6c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc372966637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffc372966eb878 x9 : ffffc37296693878
[    0.000000] x8 : ffffc37296663ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc37296c6c000 x4 : ffffc37295a3e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 19

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffb9a1a7863ce0
[    0.000000] x29: ffffb9a1a7863ce0 x28: 0000000081000200 x27: ffffb9a1a6a15be0
[    0.000000] x26: ffffb9a1a6a5eca0 x25: ffffb9a1a7c67ce0 x24: ffffb9a1a6638ad0
[    0.000000] x23: ffffb9a1a7e6c390 x22: 0000000000000001 x21: ffffb9a1a788abd8
[    0.000000] x20: ffffb9a1a7e6c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffb9a1a78637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffb9a1a78eb878 x9 : ffffb9a1a7893878
[    0.000000] x8 : ffffb9a1a7863ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffb9a1a7e6c000 x4 : ffffb9a1a6c3e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 20

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffcac847c63ce0
[    0.000000] x29: ffffcac847c63ce0 x28: 0000000081000200 x27: ffffcac846e15be0
[    0.000000] x26: ffffcac846e5eca0 x25: ffffcac848067ce0 x24: ffffcac846a38ad0
[    0.000000] x23: ffffcac84826c390 x22: 0000000000000001 x21: ffffcac847c8abd8
[    0.000000] x20: ffffcac84826c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffcac847c637c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffcac847ceb878 x9 : ffffcac847c93878
[    0.000000] x8 : ffffcac847c63ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffcac84826c000 x4 : ffffcac84703e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x404/0x5f4
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff684 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 21

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffbcfd1df33ce0
[    0.000000] x29: ffffbcfd1df33ce0 x28: 0000000081000200 x27: ffffbcfd1d223e40
[    0.000000] x26: ffffbcfd1d263478 x25: ffffbcfd1e324320 x24: ffffbcfd1ce95da8
[    0.000000] x23: ffffbcfd1e47b090 x22: 0000000000000001 x21: ffffbcfd1e3ed0b0
[    0.000000] x20: ffffbcfd1e47b000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffbcfd1df337c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffbcfd1dfb5cb8 x9 : ffffbcfd1df5dcb8
[    0.000000] x8 : ffffbcfd1df33ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffbcfd1e47b000 x4 : ffffbcfd1d3ee000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x3fc/0x598
[    0.000000]  start_kernel+0xa8/0x75c
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff7a4 (b9433cc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 22

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1ec/0x2ac
[    0.000000] sp : ffffdff9ea5d7d30
[    0.000000] x29: ffffdff9ea5d7d30 x28: 00000000a327a1fc x27: 0000000000000000
[    0.000000] x26: 0000000000001000 x25: ffffdff9eb8b6ce0 x24: ffffdff9ebc72500
[    0.000000] x23: 0000000000000001 x22: ffffdff9ebc72580 x21: ffffdff9ebc72000
[    0.000000] x20: 0000000000010002 x19: ffffdff9e7f071c0 x18: ffffdff9e85a9ce8
[    0.000000] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: ffff7bff3d4baf21
[    0.000000] x11: 1ffffbff3d4baf20 x10: ffff7bff3d4baf20 x9 : dfff800000000000
[    0.000000] x8 : ffffdff9ea5d7ca0 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffdff9ebc72000 x4 : ffffdff9e85aa000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x5c
[    0.000000]  psci_dt_init+0xc0/0x100
[    0.000000]  setup_arch+0xe8/0x138
[    0.000000]  start_kernel+0x9c/0x3e8
[    0.000000]  __primary_switched+0xc0/0xc8
[    0.000000] Code: 1a9f97e0 14000002 52800000 b0fff584 (b94f40c2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 23

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1ec/0x2ac
[    0.000000] sp : ffffdff9ea5d7d30
[    0.000000] x29: ffffdff9ea5d7d30 x28: 00000000a327a1fc x27: 0000000000000000
[    0.000000] x26: 0000000000001000 x25: ffffdff9eb8b6ce0 x24: ffffdff9ebc72500
[    0.000000] x23: 0000000000000001 x22: ffffdff9ebc72580 x21: ffffdff9ebc72000
[    0.000000] x20: 0000000000010002 x19: ffffdff9e7f071c0 x18: ffffdff9e85a9ce8
[    0.000000] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: ffff7bff3d4baf21
[    0.000000] x11: 1ffffbff3d4baf20 x10: ffff7bff3d4baf20 x9 : dfff800000000000
[    0.000000] x8 : ffffdff9ea5d7ca0 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffdff9ebc72000 x4 : ffffdff9e85aa000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x5c
[    0.000000]  psci_dt_init+0xc0/0x100
[    0.000000]  setup_arch+0xe8/0x138
[    0.000000]  start_kernel+0x9c/0x3e8
[    0.000000]  __primary_switched+0xc0/0xc8
[    0.000000] Code: 1a9f97e0 14000002 52800000 b0fff584 (b94f40c2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 24

Home

[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

test log snippet test parser 25

Home

[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

test log snippet test parser 26

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffc9f2a5843ce0
[    0.000000] x29: ffffc9f2a5843ce0 x28: 0000000081000200 x27: ffffc9f2a49f50d0
[    0.000000] x26: ffffc9f2a4a39ac8 x25: ffffc9f2a5c47de0 x24: ffffc9f2a4618950
[    0.000000] x23: ffffc9f2a5e47318 x22: 0000000000000001 x21: ffffc9f2a586abd8
[    0.000000] x20: ffffc9f2a5e47000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc9f2a58437c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffc9f2a58cb878 x9 : ffffc9f2a5873878
[    0.000000] x8 : ffffc9f2a5843ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc9f2a5e47000 x4 : ffffc9f2a4c17000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x3fc/0x5ec
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 b0fff644 (b94dfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 27

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x74/0x18c
[    0.000000] lr : psci_probe+0x1f4/0x2b8
[    0.000000] sp : ffffc86d5e543ce0
[    0.000000] x29: ffffc86d5e543ce0 x28: 0000000081000200 x27: ffffc86d5db8db50
[    0.000000] x26: ffffc86d5dbc0148 x25: ffffc86d5e87f108 x24: ffffc86d5d88bb30
[    0.000000] x23: ffffc86d5e97cd90 x22: 0000000000000001 x21: ffffc86d5e8f40b0
[    0.000000] x20: ffffc86d5e97c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc86d5e5437c0
[    0.000000] x14: 0000000000000000 x13: ffffc86d5e563c60 x12: 0000000000000069
[    0.000000] x11: 0000000000000023 x10: ffffc86d5e5bbc60 x9 : ffffc86d5e563c60
[    0.000000] x8 : ffffc86d5e543ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc86d5e97c000 x4 : ffffc86d5dd3a000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x74/0x18c
[    0.000000]  psci_0_2_init+0x18/0x24
[    0.000000]  psci_1_0_init+0x14/0x50
[    0.000000]  psci_dt_init+0x64/0x94
[    0.000000]  setup_arch+0x3f0/0x58c
[    0.000000]  start_kernel+0x8c/0x6c4
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff8c4 (b94124c2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 28

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x74/0x18c
[    0.000000] lr : psci_probe+0x1f4/0x2b8
[    0.000000] sp : ffffa0d4ed543ce0
[    0.000000] x29: ffffa0d4ed543ce0 x28: 0000000081000200 x27: ffffa0d4ecb8db50
[    0.000000] x26: ffffa0d4ecbc0148 x25: ffffa0d4ed87f108 x24: ffffa0d4ec88bb30
[    0.000000] x23: ffffa0d4ed97cd90 x22: 0000000000000001 x21: ffffa0d4ed8f40b0
[    0.000000] x20: ffffa0d4ed97c000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffa0d4ed5437c0
[    0.000000] x14: 0000000000000000 x13: ffffa0d4ed563c60 x12: 0000000000000069
[    0.000000] x11: 0000000000000023 x10: ffffa0d4ed5bbc60 x9 : ffffa0d4ed563c60
[    0.000000] x8 : ffffa0d4ed543ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffa0d4ed97c000 x4 : ffffa0d4ecd3a000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x74/0x18c
[    0.000000]  psci_0_2_init+0x18/0x24
[    0.000000]  psci_1_0_init+0x14/0x50
[    0.000000]  psci_dt_init+0x64/0x94
[    0.000000]  setup_arch+0x3f0/0x58c
[    0.000000]  start_kernel+0x8c/0x6c4
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 90fff8c4 (b94124c2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 29

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffd525cd093ce0
[    0.000000] x29: ffffd525cd093ce0 x28: 0000000081000200 x27: ffffd525cc204128
[    0.000000] x26: ffffd525cc24f1c8 x25: ffffd525cd4bd740 x24: ffffd525cbe18950
[    0.000000] x23: ffffd525cd6bf398 x22: 0000000000000001 x21: ffffd525cd0bc0c8
[    0.000000] x20: ffffd525cd6bf000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffd525cd0937c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffd525cd124578 x9 : ffffd525cd0cc578
[    0.000000] x8 : ffffd525cd093ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffd525cd6bf000 x4 : ffffd525cc42e000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x3fc/0x5ec
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 f0fff664 (b9475cc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 30

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffc0a7d7643ce0
[    0.000000] x29: ffffc0a7d7643ce0 x28: 0000000081000200 x27: ffffc0a7d67f5000
[    0.000000] x26: ffffc0a7d6839a58 x25: ffffc0a7d7a47ce0 x24: ffffc0a7d6418950
[    0.000000] x23: ffffc0a7d7c47318 x22: 0000000000000001 x21: ffffc0a7d766abd8
[    0.000000] x20: ffffc0a7d7c47000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc0a7d76437c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffc0a7d76cb878 x9 : ffffc0a7d7673878
[    0.000000] x8 : ffffc0a7d7643ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc0a7d7c47000 x4 : ffffc0a7d6a17000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x3fc/0x5ec
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 b0fff644 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 31

Home

[    0.000000] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.125-rc1 #1
[    0.000000] Hardware name: Thundercomm Dragonboard 845c (DT)
[    0.000000] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : arm_smccc_version_init+0x7c/0x194
[    0.000000] lr : psci_probe+0x1fc/0x2c0
[    0.000000] sp : ffffc0a7d7643ce0
[    0.000000] x29: ffffc0a7d7643ce0 x28: 0000000081000200 x27: ffffc0a7d67f5000
[    0.000000] x26: ffffc0a7d6839a58 x25: ffffc0a7d7a47ce0 x24: ffffc0a7d6418950
[    0.000000] x23: ffffc0a7d7c47318 x22: 0000000000000001 x21: ffffc0a7d766abd8
[    0.000000] x20: ffffc0a7d7c47000 x19: 0000000000010002 x18: 0000000000000006
[    0.000000] x17: 6666663966643731 x16: 3030303030303078 x15: ffffc0a7d76437c0
[    0.000000] x14: 0000000000000000 x13: 2e646574726f7070 x12: 757320746f6e2045
[    0.000000] x11: 5059545f4f464e49 x10: ffffc0a7d76cb878 x9 : ffffc0a7d7673878
[    0.000000] x8 : ffffc0a7d7643ca8 x7 : 0000000000000000 x6 : 0000000000000000
[    0.000000] x5 : ffffc0a7d7c47000 x4 : ffffc0a7d6a17000 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  arm_smccc_version_init+0x7c/0x194
[    0.000000]  psci_0_2_init+0x20/0x2c
[    0.000000]  psci_1_0_init+0x1c/0x58
[    0.000000]  psci_dt_init+0x6c/0x9c
[    0.000000]  setup_arch+0x3fc/0x5ec
[    0.000000]  start_kernel+0xa8/0x764
[    0.000000]  __primary_switched+0xbc/0xc4
[    0.000000] Code: 1a9f97e0 14000002 52800000 b0fff644 (b94cfcc2) 
[    0.000000] ---[ end trace 0000000000000000 ]---

test log snippet test parser 32

Home

[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

test log snippet test parser 33

Home

[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

test log snippet test parser 34

Home

------------[ cut here ]------------
[   51.223878] WARNING: CPU: 0 PID: 1471 at mm/util.c:596 kvmalloc_node+0xf0/0xf8
[   51.228297] Modules linked in: crct10dif_ce fuse drm ip_tables x_tables
[   51.234897] CPU: 0 PID: 1471 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   51.241751] Hardware name: WinLink E850-96 board (DT)
[   51.246785] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.253730] pc : kvmalloc_node+0xf0/0xf8
[   51.257635] lr : kvmalloc_node+0x50/0xf8
[   51.261540] sp : ffff80000c1cbce0
[   51.264839] x29: ffff80000c1cbcf0 x28: ffff00080100af40 x27: 0000000000000000
[   51.271957] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   51.279075] x23: 0000000080000000 x22: ffff8000082ee970 x21: 0000000200002000
[   51.286193] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   51.293311] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.300429] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.307549] x11: 0000000000000040 x10: 359b307476751a00 x9 : 359b307476751a00
[   51.314665] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   51.321783] x5 : 0000000000000000 x4 : ffff8000082232b4 x3 : 0000000000000000
[   51.328901] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   51.336022] Call trace:
[   51.338454]  kvmalloc_node+0xf0/0xf8
[   51.342010]  alloc_fdtable+0x7c/0x108
[   51.345654]  expand_files+0x114/0x2f0
[   51.349302]  ksys_dup3+0x60/0xf4
[   51.352512]  __arm64_sys_dup3+0x20/0x30
[   51.356331]  invoke_syscall+0x40/0x104
[   51.360063]  el0_svc_common+0xb0/0xec
[   51.363709]  do_el0_svc+0x24/0x8c
[   51.367008]  el0_svc+0x2c/0x58
[   51.370046]  el0t_64_sync_handler+0x84/0xf0
[   51.374213]  el0t_64_sync+0x18c/0x190
[   51.377862] ---[ end trace 0000000000000000 ]---

test log snippet test parser 35

Home

[    2.114723] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    2.122949] CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.125-rc1 #1
[    2.129283] Hardware name: WinLink E850-96 board (DT)
[    2.134320] Call trace:
[    2.136750]  dump_backtrace+0x108/0x158
[    2.140566]  show_stack+0x24/0x30
[    2.143865]  dump_stack_lvl+0x7c/0xa0
[    2.147510]  dump_stack+0x18/0x48
[    2.150809]  panic+0x168/0x394
[    2.153847]  mount_block_root+0x190/0x258
[    2.157840]  mount_root+0x98/0xa8
[    2.161138]  prepare_namespace+0x118/0x194
[    2.165220]  kernel_init_freeable+0x11c/0x174
[    2.169558]  kernel_init+0x2c/0x1b8
[    2.173033]  ret_from_fork+0x10/0x20
[    2.176593] SMP: stopping secondary CPUs
[    2.180506] Kernel Offset: disabled
[    2.183971] CPU features: 0x060000,00000080,6600721b
[    2.188918] Memory Limit: none
[    2.191962] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 36

Home

[    2.114723] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    2.122949] CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.125-rc1 #1
[    2.129283] Hardware name: WinLink E850-96 board (DT)
[    2.134320] Call trace:
[    2.136750]  dump_backtrace+0x108/0x158
[    2.140566]  show_stack+0x24/0x30
[    2.143865]  dump_stack_lvl+0x7c/0xa0
[    2.147510]  dump_stack+0x18/0x48
[    2.150809]  panic+0x168/0x394
[    2.153847]  mount_block_root+0x190/0x258
[    2.157840]  mount_root+0x98/0xa8
[    2.161138]  prepare_namespace+0x118/0x194
[    2.165220]  kernel_init_freeable+0x11c/0x174
[    2.169558]  kernel_init+0x2c/0x1b8
[    2.173033]  ret_from_fork+0x10/0x20
[    2.176593] SMP: stopping secondary CPUs
[    2.180506] Kernel Offset: disabled
[    2.183971] CPU features: 0x060000,00000080,6600721b
[    2.188918] Memory Limit: none
[    2.191962] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 37

Home

------------[ cut here ]------------
[   51.427936] WARNING: CPU: 3 PID: 1473 at mm/util.c:596 kvmalloc_node+0x108/0x120
[   51.435309] Modules linked in: crct10dif_ce fuse drm ip_tables x_tables
[   51.441909] CPU: 3 PID: 1473 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   51.448767] Hardware name: WinLink E850-96 board (DT)
[   51.453800] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.460745] pc : kvmalloc_node+0x108/0x120
[   51.464822] lr : kvmalloc_node+0x64/0x120
[   51.468815] sp : ffff80000c473ce0
[   51.472114] x29: ffff80000c473cf0 x28: ffff0008032c1f80 x27: 0000000000000000
[   51.479232] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0008003b4600
[   51.486349] x23: ffff0008003b4580 x22: ffff8000082d7668 x21: 00000000ffffffff
[   51.493469] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   51.500585] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.507703] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.514821] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.521939] x8 : 00000000ffffffff x7 : 0000000000412cc0 x6 : 0000000200002000
[   51.529057] x5 : 0000000000000000 x4 : ffff0008032c1f80 x3 : 0000000000000000
[   51.536175] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.543297] Call trace:
[   51.545728]  kvmalloc_node+0x108/0x120
[   51.549458]  alloc_fdtable+0x94/0x11c
[   51.553102]  expand_files+0x78/0x31c
[   51.556663]  ksys_dup3+0x60/0x130
[   51.559961]  __arm64_sys_dup3+0x20/0x30
[   51.563779]  invoke_syscall+0x48/0x114
[   51.567511]  el0_svc_common.constprop.0+0x44/0xec
[   51.572199]  do_el0_svc+0x24/0x94
[   51.575499]  el0_svc+0x2c/0x84
[   51.578536]  el0t_64_sync_handler+0x114/0x120
[   51.582876]  el0t_64_sync+0x18c/0x190
[   51.586526] ---[ end trace 0000000000000000 ]---

test log snippet test parser 38

Home

------------[ cut here ]------------
[  396.487831] Unknown PMU version 10
[  396.488052] WARNING: CPU: 3 PID: 1603 at arch/arm64/kvm/pmu-emul.c:42 kvm_pmu_set_counter_event_type+0xbc/0xc4
[  396.488257] Modules linked in: pl111_drm drm_dma_helper crct10dif_ce panel_simple arm_spe_pmu drm_kms_helper fuse drm ip_tables x_tables
[  396.488803] CPU: 3 PID: 1603 Comm: qemu-system-aar Not tainted 6.1.125-rc1 #1
[  396.488932] Hardware name: FVP Base RevC (DT)
[  396.489006] pstate: 162402005 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  396.489142] pc : kvm_pmu_set_counter_event_type+0xbc/0xc4
[  396.489283] lr : kvm_pmu_set_counter_event_type+0xb0/0xc4
[  396.489424] sp : ffff80000aa739c0
[  396.489492] x29: ffff80000aa739e0 x28: ffff000802d3a100 x27: 0000000000000001
[  396.489675] x26: ffff000808403000 x25: ffff000802d3a100 x24: 00000000000000e0
[  396.489859] x23: 0000000000000002 x22: ffff80000aa73a90 x21: 00000000c800ffff
[  396.490041] x20: 000000000000005c x19: ffff0008043a25d0 x18: ffffd7c5d50c1e3a
[  396.490224] x17: 0000000000000001 x16: ffffffffffffffff x15: 0000000000000004
[  396.490401] x14: ffffd7c5d560b8f8 x13: 0000000000000003 x12: 0000000000000003
[  396.490585] x11: 00000000ffffefff x10: ffffd7c5d557fa4c x9 : 0acac322a1aa4e00
[  396.490769] x8 : 00000000c8000000 x7 : 205d313338373834 x6 : 342e36393320205b
[  396.490951] x5 : ffffd7c5d5b22037 x4 : ffff80000aa73617 x3 : 0000000000000000
[  396.491132] x2 : 000000000000001f x1 : 0000000000000000 x0 : ffff0008043a25d0
[  396.491311] Call trace:
[  396.491368]  kvm_pmu_set_counter_event_type+0xbc/0xc4
[  396.491513]  access_pmu_evtyper+0xfc/0x144
[  396.491622]  perform_access+0x48/0x160
[  396.491766]  emulate_sys_reg+0xf4/0x108
[  396.491906]  kvm_handle_sys_reg+0xb8/0x184
[  396.492051]  handle_exit+0x9c/0x148
[  396.492179]  kvm_arch_vcpu_ioctl_run+0x490/0x908
[  396.492291]  kvm_vcpu_ioctl+0x524/0x590
[  396.492408]  __arm64_sys_ioctl+0x94/0xd4
[  396.492540]  invoke_syscall+0x4c/0x110
[  396.492677]  el0_svc_common+0xd0/0x118
[  396.492816]  do_el0_svc+0x30/0x98
[  396.492949]  el0_svc+0x30/0x60
[  396.493059]  el0t_64_sync_handler+0x84/0xf0
[  396.493180]  el0t_64_sync+0x18c/0x190
[  396.493287] ---[ end trace 0000000000000000 ]---

test log snippet test parser 39

Home

------------[ cut here ]------------
[  402.882498] Unknown PMU version 10
[  402.882690] WARNING: CPU: 2 PID: 1602 at arch/arm64/kvm/pmu-emul.c:42 kvm_pmu_create_perf_event+0x278/0x284
[  402.882881] Modules linked in: pl111_drm drm_dma_helper crct10dif_ce panel_simple arm_spe_pmu drm_kms_helper fuse drm ip_tables x_tables
[  402.883281] CPU: 2 PID: 1602 Comm: qemu-system-aar Not tainted 6.1.125-rc1 #1
[  402.883406] Hardware name: FVP Base RevC (DT)
[  402.883477] pstate: 162402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  402.883616] pc : kvm_pmu_create_perf_event+0x278/0x284
[  402.883750] lr : kvm_pmu_create_perf_event+0x274/0x284
[  402.883890] sp : ffff80000a8a38b0
[  402.883959] x29: ffff80000a8a3950 x28: ffff0008022e8000 x27: 0000000000000001
[  402.884142] x26: ffff0008090dc000 x25: 00000000dbadc0de x24: ffff0008010ff000
[  402.884326] x23: 00000000c800c0de x22: ffff00080900aa00 x21: 0000000000000000
[  402.884507] x20: ffff00080900a5d0 x19: ffff00080900c538 x18: ffffd7c5d50c1e3a
[  402.884694] x17: 0000000000000001 x16: ffffffffffffffff x15: 0000000000000004
[  402.884875] x14: ffffd7c5d560b8f8 x13: 0000000000000003 x12: 0000000000000003
[  402.885055] x11: 00000000ffffefff x10: ffffd7c5d557fa4c x9 : f0d51567577fd100
[  402.885239] x8 : 0000000000000000 x7 : 205d383934323838 x6 : 382e32303420205b
[  402.885420] x5 : ffffd7c5d5b22037 x4 : ffff80000a8a3507 x3 : 0000000000000000
[  402.885601] x2 : 0000000000000000 x1 : ffff80000a8a3650 x0 : 0000000000000016
[  402.885780] Call trace:
[  402.885838]  kvm_pmu_create_perf_event+0x278/0x284
[  402.885978]  kvm_pmu_handle_pmcr+0x198/0x208
[  402.886115]  access_pmcr+0xa4/0xd0
[  402.886216]  perform_access+0x48/0x160
[  402.886361]  emulate_sys_reg+0xf4/0x108
[  402.886501]  kvm_handle_sys_reg+0xb8/0x184
[  402.886647]  handle_exit+0x9c/0x148
[  402.886774]  kvm_arch_vcpu_ioctl_run+0x490/0x908
[  402.886886]  kvm_vcpu_ioctl+0x524/0x590
[  402.887004]  __arm64_sys_ioctl+0x94/0xd4
[  402.887136]  invoke_syscall+0x4c/0x110
[  402.887270]  el0_svc_common+0xd0/0x118
[  402.887411]  do_el0_svc+0x30/0x98
[  402.887545]  el0_svc+0x30/0x60
[  402.887655]  el0t_64_sync_handler+0x84/0xf0
[  402.887775]  el0t_64_sync+0x18c/0x190
[  402.887882] ---[ end trace 0000000000000000 ]---

test log snippet test parser 40

Home

------------[ cut here ]------------
[  326.907670] WARNING: CPU: 1 PID: 563 at mm/util.c:596 kvmalloc_node+0xf0/0xf8
[  326.907832] Modules linked in: arm_spe_pmu panel_simple crct10dif_ce pl111_drm drm_dma_helper drm_kms_helper fuse drm ip_tables x_tables
[  326.908190] CPU: 1 PID: 563 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[  326.908305] Hardware name: FVP Base RevC (DT)
[  326.908371] pstate: 122402009 (nzCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  326.908499] pc : kvmalloc_node+0xf0/0xf8
[  326.908617] lr : kvmalloc_node+0x50/0xf8
[  326.908738] sp : ffff800008ed3ce0
[  326.908795] x29: ffff800008ed3cf0 x28: ffff0008022f8fc0 x27: 0000000000000000
[  326.908964] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  326.909122] x23: 0000000080000000 x22: 1a8cd7c5d38ce970 x21: 0000000200002000
[  326.909292] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  326.909454] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  326.909616] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  326.909777] x11: 0000000000000040 x10: 8950894970c7a500 x9 : 8950894970c7a500
[  326.909943] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  326.910101] x5 : 0000000000000000 x4 : ffffd7c5d38032b4 x3 : 0000000000000000
[  326.910263] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  326.910422] Call trace:
[  326.910473]  kvmalloc_node+0xf0/0xf8
[  326.910595]  alloc_fdtable+0x7c/0x108
[  326.910699]  expand_files+0x114/0x2f0
[  326.910808]  ksys_dup3+0x60/0xf4
[  326.910915]  __arm64_sys_dup3+0x20/0x30
[  326.911027]  invoke_syscall+0x40/0x104
[  326.911150]  el0_svc_common+0xb0/0xec
[  326.911272]  do_el0_svc+0x24/0x8c
[  326.911391]  el0_svc+0x2c/0x58
[  326.911502]  el0t_64_sync_handler+0x84/0xf0
[  326.911622]  el0t_64_sync+0x18c/0x190
[  326.911720] ---[ end trace 0000000000000000 ]---

test log snippet test parser 41

Home

[   10.329403] Internal error: Oops - BTI: 0000000036000002 [#1] PREEMPT SMP
[   10.329488] Modules linked in: fuse drm ip_tables x_tables
[   10.329669] CPU: 6 PID: 165 Comm: udevadm Not tainted 6.1.125-rc1 #1
[   10.329782] Hardware name: FVP Base RevC (DT)
[   10.329847] pstate: 142402809 (nZcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=-c)
[   10.329972] pc : kernfs_iop_getattr+0x4/0xd8
[   10.330077] lr : vfs_fstat+0xcc/0x110
[   10.330178] sp : ffff800008b93d30
[   10.330239] x29: ffff800008b93d30 x28: ffff000801180000 x27: 0000000000000000
[   10.330405] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   10.330566] x23: 0000000060000000 x22: 0000ffffb2d98530 x21: ffff800008b93d60
[   10.330733] x20: ffff000800b08a00 x19: ffff000800b08a00 x18: 0000000000000000
[   10.330899] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   10.331059] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   10.331220] x11: 0000000000000058 x10: 0000000000000007 x9 : 00000000000007df
[   10.331381] x8 : ffffd7c5d3940ff8 x7 : 0000000000000000 x6 : 0000000000000000
[   10.331542] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 00000000000007ff
[   10.331699] x2 : ffff800008b93d60 x1 : ffff000800b08a10 x0 : ffffd7c5d51a0298
[   10.331868] Call trace:
[   10.331917]  kernfs_iop_getattr+0x4/0xd8
[   10.332024]  __arm64_sys_newfstat+0x5c/0x9c
[   10.332136]  invoke_syscall+0x40/0x104
[   10.332260]  el0_svc_common+0xb0/0xec
[   10.332381]  do_el0_svc+0x24/0x8c
[   10.332497]  el0_svc+0x2c/0x58
[   10.332610]  el0t_64_sync_handler+0x84/0xf0
[   10.332731]  el0t_64_sync+0x18c/0x190
[   10.332831] Code: a8c47bfd d50323bf d65f03c0 d503233f (a9bd7bfd) 
[   10.332947] ---[ end trace 0000000000000000 ]---

test log snippet test parser 42

Home

[   10.329403] Internal error: Oops - BTI: 0000000036000002 [#1] PREEMPT SMP
[   10.329488] Modules linked in: fuse drm ip_tables x_tables
[   10.329669] CPU: 6 PID: 165 Comm: udevadm Not tainted 6.1.125-rc1 #1
[   10.329782] Hardware name: FVP Base RevC (DT)
[   10.329847] pstate: 142402809 (nZcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=-c)
[   10.329972] pc : kernfs_iop_getattr+0x4/0xd8
[   10.330077] lr : vfs_fstat+0xcc/0x110
[   10.330178] sp : ffff800008b93d30
[   10.330239] x29: ffff800008b93d30 x28: ffff000801180000 x27: 0000000000000000
[   10.330405] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   10.330566] x23: 0000000060000000 x22: 0000ffffb2d98530 x21: ffff800008b93d60
[   10.330733] x20: ffff000800b08a00 x19: ffff000800b08a00 x18: 0000000000000000
[   10.330899] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   10.331059] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   10.331220] x11: 0000000000000058 x10: 0000000000000007 x9 : 00000000000007df
[   10.331381] x8 : ffffd7c5d3940ff8 x7 : 0000000000000000 x6 : 0000000000000000
[   10.331542] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 00000000000007ff
[   10.331699] x2 : ffff800008b93d60 x1 : ffff000800b08a10 x0 : ffffd7c5d51a0298
[   10.331868] Call trace:
[   10.331917]  kernfs_iop_getattr+0x4/0xd8
[   10.332024]  __arm64_sys_newfstat+0x5c/0x9c
[   10.332136]  invoke_syscall+0x40/0x104
[   10.332260]  el0_svc_common+0xb0/0xec
[   10.332381]  do_el0_svc+0x24/0x8c
[   10.332497]  el0_svc+0x2c/0x58
[   10.332610]  el0t_64_sync_handler+0x84/0xf0
[   10.332731]  el0t_64_sync+0x18c/0x190
[   10.332831] Code: a8c47bfd d50323bf d65f03c0 d503233f (a9bd7bfd) 
[   10.332947] ---[ end trace 0000000000000000 ]---

test log snippet test parser 43

Home

------------[ cut here ]------------
[  301.459237] WARNING: CPU: 5 PID: 563 at mm/util.c:596 kvmalloc_node+0x108/0x120
[  301.459410] Modules linked in: crct10dif_ce panel_simple arm_spe_pmu pl111_drm drm_dma_helper drm_kms_helper fuse drm ip_tables x_tables
[  301.459798] CPU: 5 PID: 563 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[  301.459918] Hardware name: FVP Base RevC (DT)
[  301.459993] pstate: 122402009 (nzCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  301.460126] pc : kvmalloc_node+0x108/0x120
[  301.460253] lr : kvmalloc_node+0x64/0x120
[  301.460379] sp : ffff800009a5bce0
[  301.460446] x29: ffff800009a5bcf0 x28: ffff000807745e80 x27: 0000000000000000
[  301.460628] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000800827d00
[  301.460806] x23: ffff000800827c80 x22: eca6d7c5d3727668 x21: 00000000ffffffff
[  301.460986] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  301.461168] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  301.461342] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  301.461517] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  301.461691] x8 : 00000000ffffffff x7 : 0000000000412cc0 x6 : 0000000200002000
[  301.461869] x5 : 0000000000000000 x4 : ffff000807745e80 x3 : 0000000000000000
[  301.462045] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  301.462220] Call trace:
[  301.462275]  kvmalloc_node+0x108/0x120
[  301.462404]  alloc_fdtable+0x94/0x11c
[  301.462524]  expand_files+0x78/0x31c
[  301.462645]  ksys_dup3+0x60/0x130
[  301.462766]  __arm64_sys_dup3+0x20/0x30
[  301.462894]  invoke_syscall+0x48/0x114
[  301.463025]  el0_svc_common.constprop.0+0x44/0xec
[  301.463166]  do_el0_svc+0x24/0x94
[  301.463293]  el0_svc+0x2c/0x84
[  301.463386]  el0t_64_sync_handler+0x114/0x120
[  301.463491]  el0t_64_sync+0x18c/0x190
[  301.463598] ---[ end trace 0000000000000000 ]---

test log snippet test parser 44

Home

------------[ cut here ]------------
[   49.921224] WARNING: CPU: 0 PID: 526 at mm/util.c:596 kvmalloc_node+0xf0/0xf8
[   49.922995] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha3_generic sha512_ce sha512_arm64 fuse drm ip_tables x_tables
[   49.926843] CPU: 0 PID: 526 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   49.927658] Hardware name: linux,dummy-virt (DT)
[   49.928729] pstate: 22402009 (nzCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   49.929710] pc : kvmalloc_node+0xf0/0xf8
[   49.930164] lr : kvmalloc_node+0x50/0xf8
[   49.931177] sp : ffff8000088cbce0
[   49.931995] x29: ffff8000088cbcf0 x28: ffff0000c74e6e40 x27: 0000000000000000
[   49.933307] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   49.934066] x23: 0000000080001000 x22: 4eaea10a828ee970 x21: 0000000200002000
[   49.934890] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   49.935820] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   49.936425] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   49.937330] x11: 0000000000000040 x10: 5dc3efafc351bf00 x9 : 5dc3efafc351bf00
[   49.938103] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   49.938952] x5 : 0000000000000000 x4 : ffffa10a828232b4 x3 : 0000000000000000
[   49.939723] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   49.940774] Call trace:
[   49.941430]  kvmalloc_node+0xf0/0xf8
[   49.942124]  alloc_fdtable+0x7c/0x108
[   49.942828]  expand_files+0x114/0x2f0
[   49.943143]  ksys_dup3+0x60/0xf4
[   49.943665]  __arm64_sys_dup3+0x20/0x30
[   49.944106]  invoke_syscall+0x40/0x104
[   49.944403]  el0_svc_common+0xb0/0xec
[   49.944807]  do_el0_svc+0x24/0x8c
[   49.945338]  el0_svc+0x2c/0x58
[   49.945615]  el0t_64_sync_handler+0x84/0xf0
[   49.945885]  el0t_64_sync+0x18c/0x190
[   49.946605] ---[ end trace 0000000000000000 ]---

test log snippet test parser 45

Home

------------[ cut here ]------------
[   50.527353] WARNING: CPU: 1 PID: 527 at mm/util.c:596 kvmalloc_node+0x108/0x120
[   50.529082] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha3_generic sha512_ce sha512_arm64 fuse drm ip_tables x_tables
[   50.532137] CPU: 1 PID: 527 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   50.533071] Hardware name: linux,dummy-virt (DT)
[   50.533875] pstate: 22402009 (nzCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   50.534626] pc : kvmalloc_node+0x108/0x120
[   50.535165] lr : kvmalloc_node+0x64/0x120
[   50.535636] sp : ffff8000088bbce0
[   50.535970] x29: ffff8000088bbcf0 x28: ffff0000c0c83f00 x27: 0000000000000000
[   50.536521] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0fda180
[   50.537299] x23: ffff0000c0fda100 x22: f8bba1d7cead7668 x21: 00000000ffffffff
[   50.538136] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   50.538969] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   50.539892] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   50.540744] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   50.541467] x8 : 00000000ffffffff x7 : 0000000000412cc0 x6 : 0000000200002000
[   50.542253] x5 : 0000000000000000 x4 : ffff0000c0c83f00 x3 : 0000000000000000
[   50.543126] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   50.543999] Call trace:
[   50.544413]  kvmalloc_node+0x108/0x120
[   50.545093]  alloc_fdtable+0x94/0x11c
[   50.545643]  expand_files+0x78/0x31c
[   50.546074]  ksys_dup3+0x60/0x130
[   50.546471]  __arm64_sys_dup3+0x20/0x30
[   50.547004]  invoke_syscall+0x48/0x114
[   50.547422]  el0_svc_common.constprop.0+0x44/0xec
[   50.548031]  do_el0_svc+0x24/0x94
[   50.548422]  el0_svc+0x2c/0x84
[   50.548774]  el0t_64_sync_handler+0x114/0x120
[   50.549250]  el0t_64_sync+0x18c/0x190
[   50.549997] ---[ end trace 0000000000000000 ]---

test log snippet test parser 46

Home

------------[ cut here ]------------
[   51.470535] WARNING: CPU: 0 PID: 484 at mm/util.c:596 kvmalloc_node+0xfc/0x108
[   51.472124] Modules linked in:
[   51.473845] CPU: 0 PID: 484 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   51.474752] Hardware name: Generic DT based system
[   51.476506]  unwind_backtrace from show_stack+0x10/0x14
[   51.477281]  show_stack from dump_stack_lvl+0x48/0x54
[   51.477900]  dump_stack_lvl from __warn+0xd4/0x200
[   51.478999]  __warn from warn_slowpath_fmt+0x11c/0x168
[   51.479861]  warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[   51.480879]  kvmalloc_node from alloc_fdtable+0x78/0x104
[   51.481746]  alloc_fdtable from expand_files+0x134/0x304
[   51.482558]  expand_files from ksys_dup3+0x58/0xd0
[   51.483005]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   51.483672] Exception stack(0xfa18dfa8 to 0xfa18dff0)
[   51.484110] dfa0:                   00423bcd 00000001 00000002 2000003c 00000000 00000000
[   51.484631] dfc0: 00423bcd 00000001 00425e6c 0000003f 00421920 b6f62ce0 00000000 bed573f0
[   51.485401] dfe0: 0000003f bed571c4 b6ec1f43 b6e3f786
[   51.488124] ---[ end trace 0000000000000000 ]---

test log snippet test parser 47

Home

------------[ cut here ]------------
[   49.110985] WARNING: CPU: 1 PID: 486 at mm/util.c:596 kvmalloc_node+0xf4/0xf8
[   49.113157] Modules linked in:
[   49.116707] CPU: 1 PID: 486 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   49.117868] Hardware name: Generic DT based system
[   49.119501]  unwind_backtrace from show_stack+0x10/0x14
[   49.120823]  show_stack from dump_stack_lvl+0x40/0x4c
[   49.121352]  dump_stack_lvl from __warn+0x78/0x124
[   49.122126]  __warn from warn_slowpath_fmt+0x184/0x18c
[   49.123068]  warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[   49.123961]  kvmalloc_node from alloc_fdtable+0x88/0x104
[   49.125072]  alloc_fdtable from expand_files+0x78/0x2f4
[   49.125893]  expand_files from ksys_dup3+0x58/0xe0
[   49.126704]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   49.127733] Exception stack(0xfa1c5fa8 to 0xfa1c5ff0)
[   49.128710] 5fa0:                   bee4c2cc 00420000 00000002 2000003c 00000000 2000003c
[   49.129989] 5fc0: bee4c2cc 00420000 0041ff0c 0000003f 00402edd b6fb6ce0 00000000 0041ff0c
[   49.131064] 5fe0: 0000003f bee4c0f4 b6f15f43 b6e93786
[   49.131800] ---[ end trace 0000000000000000 ]---

test log snippet test parser 48

Home

------------[ cut here ]------------
[   32.986070] WARNING: CPU: 1 PID: 497 at mm/util.c:596 kvmalloc_node+0xd1/0xe0
[   32.987266] Modules linked in:
[   32.989329] CPU: 1 PID: 497 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   32.990486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.992077] EIP: kvmalloc_node+0xd1/0xe0
[   32.992577] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 f2 ae 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[   32.996099] EAX: 00000000 EBX: 80001000 ECX: cf7b146d EDX: 00000000
[   32.996858] ESI: 00400cc0 EDI: ffffffff EBP: c27f3eb8 ESP: c27f3ea4
[   32.998395] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   32.999090] CR0: 80050033 CR2: b7e0fbe0 CR3: 02499000 CR4: 000006d0
[   33.000490] Call Trace:
[   33.001837]  ? show_regs+0x4e/0x60
[   33.002836]  ? kvmalloc_node+0xd1/0xe0
[   33.003150]  ? __warn+0xa5/0x180
[   33.003410]  ? kvmalloc_node+0xd1/0xe0
[   33.003688]  ? kvmalloc_node+0xd1/0xe0
[   33.004723]  ? report_bug+0x11e/0x1b0
[   33.004964]  ? exc_overflow+0x40/0x40
[   33.005784]  ? handle_bug+0x2b/0x50
[   33.005977]  ? exc_invalid_op+0x17/0x40
[   33.006902]  ? handle_exception+0x133/0x133
[   33.007507]  ? kvmalloc_node+0x3d/0xe0
[   33.008105]  ? exc_overflow+0x40/0x40
[   33.008594]  ? kvmalloc_node+0xd1/0xe0
[   33.008785]  ? exc_overflow+0x40/0x40
[   33.009794]  ? kvmalloc_node+0xd1/0xe0
[   33.010033]  ? security_task_setrlimit+0x36/0x50
[   33.010485]  alloc_fdtable+0x70/0xf0
[   33.011083]  ? do_prlimit+0x11f/0x170
[   33.011892]  expand_files+0x101/0x2b0
[   33.012070]  ? __ia32_sys_prlimit64+0x20e/0x2c0
[   33.012536]  ksys_dup3+0x5b/0xb0
[   33.013553]  __ia32_sys_dup2+0x16/0x70
[   33.014472]  ia32_sys_call+0x278b/0x27d0
[   33.014831]  __do_fast_syscall_32+0x6c/0xc0
[   33.015039]  ? hrtimer_interrupt+0x137/0x420
[   33.016038]  ? exit_to_user_mode_prepare+0x29/0xc0
[   33.016531]  do_fast_syscall_32+0x29/0x60
[   33.016821]  do_SYSENTER_32+0x12/0x20
[   33.017022]  entry_SYSENTER_32+0x98/0xfb
[   33.017506] EIP: 0xb7f99509
[   33.018631] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[   33.019233] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7f7ee14
[   33.019608] ESI: 0045b124 EDI: bf9896a0 EBP: bf9896b8 ESP: bf989438
[   33.019993] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   33.020591] ---[ end trace 0000000000000000 ]---

test log snippet test parser 49

Home

------------[ cut here ]------------
[  100.780644] WARNING: CPU: 0 PID: 522 at mm/mremap.c:257 move_page_tables+0x596/0x610
[  100.781687] Modules linked in:
[  100.782472] CPU: 0 PID: 522 Comm: true Not tainted 6.1.125-rc1 #1
[  100.782907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  100.783873] EIP: move_page_tables+0x596/0x610
[  100.784386] Code: 38 e8 2e 65 eb ff eb 02 89 df 8b 55 cc e9 17 fb ff ff 8b 45 ac 8b 40 08 8b 55 c4 e8 d4 01 ff ff 85 c0 0f 84 2e fe ff ff eb 30 <0f> 0b e9 cc fc ff ff 8b 45 d0 e8 4b 1d 00 00 8b 55 cc 89 df e9 e6
[  100.785596] EAX: 02db5067 EBX: c2da3bf8 ECX: 00000000 EDX: bf800000
[  100.785879] ESI: bfc00000 EDI: c2c118b8 EBP: c2cf7d38 ESP: c2cf7ce0
[  100.786283] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010202
[  100.786975] CR0: 80050033 CR2: b7dee290 CR3: 02da3000 CR4: 000006d0
[  100.787710] Call Trace:
[  100.789319]  ? show_regs+0x53/0x60
[  100.789681]  ? move_page_tables+0x596/0x610
[  100.790246]  ? __warn+0xaa/0x180
[  100.790450]  ? move_page_tables+0x596/0x610
[  100.790710]  ? move_page_tables+0x596/0x610
[  100.791054]  ? report_bug+0x137/0x1d0
[  100.791301]  ? exc_overflow+0x40/0x40
[  100.791463]  ? handle_bug+0x2b/0x50
[  100.791614]  ? exc_invalid_op+0x17/0x40
[  100.792075]  ? handle_exception+0x133/0x133
[  100.792413]  ? exc_overflow+0x40/0x40
[  100.792927]  ? move_page_tables+0x596/0x610
[  100.794520]  ? exc_overflow+0x40/0x40
[  100.794731]  ? move_page_tables+0x596/0x610
[  100.794951]  setup_arg_pages+0x2f6/0x460
[  100.795409]  load_elf_binary+0x2a4/0xa80
[  100.795727]  ? __kernel_read+0x16c/0x1f0
[  100.796676]  ? _raw_read_unlock+0x1b/0x30
[  100.797182]  ? load_misc_binary+0x187/0x2a0
[  100.797603]  ? _raw_read_unlock+0x1b/0x30
[  100.798023]  ? _raw_read_unlock+0x1b/0x30
[  100.798483]  ? bprm_execve+0x280/0x570
[  100.798657]  bprm_execve+0x28e/0x570
[  100.798826]  do_execveat_common+0x246/0x2a0
[  100.800006]  __ia32_sys_execve+0x39/0x60
[  100.800332]  ia32_sys_call+0xdfd/0x27e0
[  100.800635]  __do_fast_syscall_32+0x86/0xd0
[  100.800867]  ? trace_hardirqs_on_prepare+0x2f/0x90
[  100.801062]  ? irqentry_exit_to_user_mode+0x14/0x20
[  100.801967]  do_fast_syscall_32+0x29/0x60
[  100.802426]  do_SYSENTER_32+0x12/0x20
[  100.802710]  entry_SYSENTER_32+0x98/0xfb
[  100.803339] EIP: 0xb7fa5509
[  100.804393] Code: Unable to access opcode bytes at 0xb7fa54df.
[  100.804840] EAX: ffffffda EBX: bf80c3f0 ECX: 0050e6a0 EDX: bf80c874
[  100.805385] ESI: 004f5033 EDI: bf80c3fc EBP: bf80c4d8 ESP: bf80c3c8
[  100.805871] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 007b EFLAGS: 00000292
[  100.806541] ---[ end trace 0000000000000000 ]---

test log snippet test parser 50

Home

------------[ cut here ]------------
[  100.780644] WARNING: CPU: 0 PID: 522 at mm/mremap.c:257 move_page_tables+0x596/0x610
[  100.781687] Modules linked in:
[  100.782472] CPU: 0 PID: 522 Comm: true Not tainted 6.1.125-rc1 #1
[  100.782907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  100.783873] EIP: move_page_tables+0x596/0x610
[  100.784386] Code: 38 e8 2e 65 eb ff eb 02 89 df 8b 55 cc e9 17 fb ff ff 8b 45 ac 8b 40 08 8b 55 c4 e8 d4 01 ff ff 85 c0 0f 84 2e fe ff ff eb 30 <0f> 0b e9 cc fc ff ff 8b 45 d0 e8 4b 1d 00 00 8b 55 cc 89 df e9 e6
[  100.785596] EAX: 02db5067 EBX: c2da3bf8 ECX: 00000000 EDX: bf800000
[  100.785879] ESI: bfc00000 EDI: c2c118b8 EBP: c2cf7d38 ESP: c2cf7ce0
[  100.786283] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010202
[  100.786975] CR0: 80050033 CR2: b7dee290 CR3: 02da3000 CR4: 000006d0
[  100.787710] Call Trace:
[  100.789319]  ? show_regs+0x53/0x60
[  100.789681]  ? move_page_tables+0x596/0x610
[  100.790246]  ? __warn+0xaa/0x180
[  100.790450]  ? move_page_tables+0x596/0x610
[  100.790710]  ? move_page_tables+0x596/0x610
[  100.791054]  ? report_bug+0x137/0x1d0
[  100.791301]  ? exc_overflow+0x40/0x40
[  100.791463]  ? handle_bug+0x2b/0x50
[  100.791614]  ? exc_invalid_op+0x17/0x40
[  100.792075]  ? handle_exception+0x133/0x133
[  100.792413]  ? exc_overflow+0x40/0x40
[  100.792927]  ? move_page_tables+0x596/0x610
[  100.794520]  ? exc_overflow+0x40/0x40
[  100.794731]  ? move_page_tables+0x596/0x610
[  100.794951]  setup_arg_pages+0x2f6/0x460
[  100.795409]  load_elf_binary+0x2a4/0xa80
[  100.795727]  ? __kernel_read+0x16c/0x1f0
[  100.796676]  ? _raw_read_unlock+0x1b/0x30
[  100.797182]  ? load_misc_binary+0x187/0x2a0
[  100.797603]  ? _raw_read_unlock+0x1b/0x30
[  100.798023]  ? _raw_read_unlock+0x1b/0x30
[  100.798483]  ? bprm_execve+0x280/0x570
[  100.798657]  bprm_execve+0x28e/0x570
[  100.798826]  do_execveat_common+0x246/0x2a0
[  100.800006]  __ia32_sys_execve+0x39/0x60
[  100.800332]  ia32_sys_call+0xdfd/0x27e0
[  100.800635]  __do_fast_syscall_32+0x86/0xd0
[  100.800867]  ? trace_hardirqs_on_prepare+0x2f/0x90
[  100.801062]  ? irqentry_exit_to_user_mode+0x14/0x20
[  100.801967]  do_fast_syscall_32+0x29/0x60
[  100.802426]  do_SYSENTER_32+0x12/0x20
[  100.802710]  entry_SYSENTER_32+0x98/0xfb
[  100.803339] EIP: 0xb7fa5509
[  100.804393] Code: Unable to access opcode bytes at 0xb7fa54df.
[  100.804840] EAX: ffffffda EBX: bf80c3f0 ECX: 0050e6a0 EDX: bf80c874
[  100.805385] ESI: 004f5033 EDI: bf80c3fc EBP: bf80c4d8 ESP: bf80c3c8
[  100.805871] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 007b EFLAGS: 00000292
[  100.806541] ---[ end trace 0000000000000000 ]---

test log snippet test parser 51

Home

------------[ cut here ]------------
[   32.218819] WARNING: CPU: 0 PID: 498 at mm/util.c:596 kvmalloc_node+0xe4/0xf0
[   32.219966] Modules linked in:
[   32.221927] CPU: 0 PID: 498 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   32.222508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.224484] EIP: kvmalloc_node+0xe4/0xf0
[   32.224824] Code: 75 f8 8b 7d fc 89 ec 5d c3 2e 8d 74 26 00 89 f2 81 ca 00 20 00 00 e9 6d ff ff ff 8d 76 00 81 e6 00 20 00 00 0f 85 3d ff ff ff <0f> 0b e9 36 ff ff ff 2e 8d 74 26 00 55 89 e5 53 89 c3 e8 65 b3 02
[   32.225807] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[   32.227483] ESI: 00000000 EDI: ffffffff EBP: c2543ef0 ESP: c2543ecc
[   32.228401] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   32.228748] CR0: 80050033 CR2: b7defbe0 CR3: 027af000 CR4: 000006d0
[   32.229473] Call Trace:
[   32.231789]  ? show_regs.cold+0x16/0x1b
[   32.232304]  ? kvmalloc_node+0xe4/0xf0
[   32.232677]  ? __warn+0x82/0xe0
[   32.232912]  ? kvmalloc_node+0xe4/0xf0
[   32.233103]  ? kvmalloc_node+0xe4/0xf0
[   32.233289]  ? report_bug+0x131/0x160
[   32.233438]  ? exc_overflow+0x50/0x50
[   32.233583]  ? handle_bug+0x2d/0x50
[   32.233715]  ? exc_invalid_op+0x1b/0x70
[   32.233848]  ? avc_has_perm+0xb9/0x1e0
[   32.234244]  ? handle_exception+0x133/0x133
[   32.234653]  ? exc_overflow+0x50/0x50
[   32.234975]  ? kvmalloc_node+0xe4/0xf0
[   32.235443]  ? exc_overflow+0x50/0x50
[   32.235756]  ? kvmalloc_node+0xe4/0xf0
[   32.236062]  ? kmalloc_trace+0x2b/0xa0
[   32.236513]  ? alloc_fdtable+0x42/0xe0
[   32.237012]  alloc_fdtable+0x67/0xe0
[   32.237706]  expand_files+0x55/0x820
[   32.238025]  ? do_prlimit+0xfc/0x1d0
[   32.238479]  ? __ia32_sys_prlimit64+0x29f/0x360
[   32.238853]  ksys_dup3+0x5a/0xf0
[   32.239284]  __ia32_sys_dup2+0x19/0x70
[   32.239608]  ia32_sys_call+0x1fec/0x26f0
[   32.239931]  __do_fast_syscall_32+0x45/0xb0
[   32.240417]  do_fast_syscall_32+0x32/0x70
[   32.240751]  do_SYSENTER_32+0x15/0x20
[   32.241320]  entry_SYSENTER_32+0x98/0xfb
[   32.241821] EIP: 0xb7f79549
[   32.242573] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   32.244419] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7f5ee14
[   32.245079] ESI: 004d15cc EDI: bfb24d30 EBP: bfb24ea8 ESP: bfb24c98
[   32.245559] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   32.246008] ---[ end trace 0000000000000000 ]---

test log snippet test parser 52

Home

------------[ cut here ]------------
[   44.094088] WARNING: CPU: 1 PID: 494 at mm/util.c:596 kvmalloc_node+0xd2/0xe0
[   44.095838] Modules linked in:
[   44.096315] CPU: 1 PID: 494 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   44.097109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.098641] RIP: 0010:kvmalloc_node+0xd2/0xe0
[   44.100135] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 47 9b 03 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 89 <0f> 0b 31 c0 eb e5 0f 1f 84 00 00 00 00 00 48 83 ff 11 72 2f 55 48
[   44.103794] RSP: 0018:ffff9af5c059fdb0 EFLAGS: 00010246
[   44.104997] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   44.106303] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffff9da05874
[   44.107618] RBP: ffff9af5c059fdc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[   44.107892] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[   44.108137] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[   44.108626] FS:  00007f6121efb740(0000) GS:ffff98c53bd00000(0000) knlGS:0000000000000000
[   44.109190] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   44.110213] CR2: 00007f6121f789e0 CR3: 00000001051f4000 CR4: 00000000000006e0
[   44.110745] Call Trace:
[   44.112541]  <TASK>
[   44.113449]  ? show_regs+0x58/0x60
[   44.114219]  ? __warn+0xc5/0x1c0
[   44.114973]  ? kvmalloc_node+0xd2/0xe0
[   44.115160]  ? report_bug+0x14e/0x1f0
[   44.115312]  ? handle_bug+0x3e/0x70
[   44.115472]  ? exc_invalid_op+0x1b/0x50
[   44.116217]  ? asm_exc_invalid_op+0x1b/0x20
[   44.117078]  ? kvmalloc_node+0x44/0xe0
[   44.117333]  ? kvmalloc_node+0xd2/0xe0
[   44.117726]  alloc_fdtable+0x7a/0x120
[   44.118154]  expand_files+0x11a/0x310
[   44.118314]  ? do_prlimit+0x120/0x160
[   44.118562]  ksys_dup3+0x75/0xe0
[   44.118811]  __x64_sys_dup2+0x21/0x90
[   44.119082]  x64_sys_call+0x2704/0x2ce0
[   44.119342]  do_syscall_64+0x4c/0xa0
[   44.119516]  ? exc_page_fault+0x5e/0xb0
[   44.120656]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[   44.121271] RIP: 0033:0x7f6121ff3c17
[   44.122267] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   44.124135] RSP: 002b:00007fffa9c05c78 EFLAGS: 00000206 ORIG_RAX: 0000000000000021
[   44.124589] RAX: ffffffffffffffda RBX: 00007fffa9c064d8 RCX: 00007f6121ff3c17
[   44.125321] RDX: 00007fffa9c05df8 RSI: 0000000040000038 RDI: 0000000000000002
[   44.126106] RBP: 00007fffa9c05e90 R08: 0000000000000064 R09: 0000000000000000
[   44.126864] R10: 00007f6121f10170 R11: 0000000000000206 R12: 0000000000000000
[   44.127189] R13: 00007fffa9c064e8 R14: 00007f6122129000 R15: 000055b333bfacf8
[   44.128128]  </TASK>
[   44.128434] ---[ end trace 0000000000000000 ]---

test log snippet test parser 53

Home

[   47.117121] ==================================================================
[   47.118475] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfa/0x1e0
[   47.119681] Read of size 1 at addr ffff888103497d9f by task kunit_try_catch/260
[   47.120187] 
[   47.120396] CPU: 1 PID: 260 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.122001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.123810] Call Trace:
[   47.124369]  <TASK>
[   47.124642]  dump_stack_lvl+0x49/0x62
[   47.125214]  print_report+0x189/0x4b1
[   47.125905]  ? kasan_addr_to_slab+0xd/0xb0
[   47.126380]  kasan_report+0xde/0x160
[   47.127330]  ? kasan_alloca_oob_left+0xfa/0x1e0
[   47.128095]  ? kasan_alloca_oob_left+0xfa/0x1e0
[   47.129068]  __asan_load1+0x62/0x70
[   47.129550]  kasan_alloca_oob_left+0xfa/0x1e0
[   47.130497]  ? __kunit_add_resource+0x7c/0x100
[   47.131147]  ? irqentry_exit+0x25/0x60
[   47.131981]  ? sysvec_apic_timer_interrupt+0x90/0xa0
[   47.132929]  ? trace_hardirqs_on+0x38/0x110
[   47.133542]  ? irqentry_exit+0x25/0x60
[   47.134205]  ? kasan_alloca_oob_right+0x1f0/0x1f0
[   47.134907]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   47.135504]  ? kasan_alloca_oob_right+0x1f0/0x1f0
[   47.136632]  ? kunit_try_run_case+0x84/0xd0
[   47.137158]  ? __kunit_add_resource+0xd1/0x100
[   47.138087]  kunit_try_run_case+0x8f/0xd0
[   47.138848]  ? kunit_catch_run_case+0x80/0x80
[   47.139898]  ? kunit_try_catch_throw+0x40/0x40
[   47.140622]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.141280]  kthread+0x17b/0x1b0
[   47.142160]  ? kthread_complete_and_exit+0x30/0x30
[   47.142823]  ret_from_fork+0x22/0x30
[   47.143381]  </TASK>
[   47.143748] 
[   47.144169] The buggy address belongs to stack of task kunit_try_catch/260
[   47.145666] 
[   47.146097] The buggy address belongs to the physical page:
[   47.146692] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103497
[   47.147718] flags: 0x200000000000000(node=0|zone=2)
[   47.148646] raw: 0200000000000000 ffffea00040d25c8 ffffea00040d25c8 0000000000000000
[   47.150031] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   47.150525] page dumped because: kasan: bad access detected
[   47.151481] 
[   47.151695] Memory state around the buggy address:
[   47.153126]  ffff888103497c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.153655]  ffff888103497d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.155759] >ffff888103497d80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[   47.156923]                             ^
[   47.157394]  ffff888103497e00: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[   47.158458]  ffff888103497e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.159406] ==================================================================

test log snippet test parser 54

Home

[   47.165444] ==================================================================
[   47.166231] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x103/0x1f0
[   47.167873] Read of size 1 at addr ffff888103487daa by task kunit_try_catch/261
[   47.169202] 
[   47.169442] CPU: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.170713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.171784] Call Trace:
[   47.172136]  <TASK>
[   47.172511]  dump_stack_lvl+0x49/0x62
[   47.173623]  print_report+0x189/0x4b1
[   47.174282]  ? kasan_addr_to_slab+0xd/0xb0
[   47.175049]  kasan_report+0xde/0x160
[   47.175856]  ? kasan_alloca_oob_right+0x103/0x1f0
[   47.176419]  ? kasan_alloca_oob_right+0x103/0x1f0
[   47.177193]  __asan_load1+0x62/0x70
[   47.177874]  kasan_alloca_oob_right+0x103/0x1f0
[   47.178483]  ? __kunit_add_resource+0x7c/0x100
[   47.179100]  ? _raw_spin_lock_irqsave+0x9e/0x100
[   47.179695]  ? _raw_spin_unlock_irqrestore+0x46/0x60
[   47.180493]  ? trace_preempt_on+0x2a/0xf0
[   47.181056]  ? __kunit_add_resource+0xd1/0x100
[   47.181700]  ? ksize_unpoisons_memory+0x1f0/0x1f0
[   47.182263]  ? __kunit_add_resource+0xd1/0x100
[   47.183221]  kunit_try_run_case+0x8f/0xd0
[   47.184013]  ? kunit_catch_run_case+0x80/0x80
[   47.184800]  ? kunit_try_catch_throw+0x40/0x40
[   47.185360]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.186269]  kthread+0x17b/0x1b0
[   47.186874]  ? kthread_complete_and_exit+0x30/0x30
[   47.188297]  ret_from_fork+0x22/0x30
[   47.188865]  </TASK>
[   47.189400] 
[   47.189857] The buggy address belongs to stack of task kunit_try_catch/261
[   47.190567] 
[   47.191212] The buggy address belongs to the physical page:
[   47.191721] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103487
[   47.192539] flags: 0x200000000000000(node=0|zone=2)
[   47.193222] raw: 0200000000000000 ffffea00040d21c8 ffffea00040d21c8 0000000000000000
[   47.194477] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   47.195482] page dumped because: kasan: bad access detected
[   47.196556] 
[   47.196756] Memory state around the buggy address:
[   47.197387]  ffff888103487c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.198989]  ffff888103487d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.199334] >ffff888103487d80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[   47.199949]                                   ^
[   47.200681]  ffff888103487e00: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[   47.201173]  ffff888103487e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.201640] ==================================================================

test log snippet test parser 55

Home

[   48.875478] ==================================================================
[   48.876683] BUG: KASAN: double-free in kfree+0x78/0x120
[   48.877380] Free of addr ffff88810329c040 by task kunit_try_catch/272
[   48.878237] 
[   48.878476] CPU: 1 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.879760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.880963] Call Trace:
[   48.881460]  <TASK>
[   48.881867]  dump_stack_lvl+0x49/0x62
[   48.882869]  print_report+0x189/0x4b1
[   48.883461]  ? kfree+0x78/0x120
[   48.884383]  ? kasan_complete_mode_report_info+0x7c/0x200
[   48.885393]  ? kfree+0x78/0x120
[   48.886180]  kasan_report_invalid_free+0x9d/0x110
[   48.887005]  ? kfree+0x78/0x120
[   48.887638]  ? kfree+0x78/0x120
[   48.888506]  ____kasan_slab_free+0x19f/0x1d0
[   48.889231]  ? kfree_sensitive+0x1f/0x50
[   48.890297]  __kasan_slab_free+0x12/0x20
[   48.890908]  __kmem_cache_free+0x188/0x2f0
[   48.891594]  kfree+0x78/0x120
[   48.892146]  kfree_sensitive+0x1f/0x50
[   48.893222]  kmalloc_double_kzfree+0xc8/0x1b0
[   48.893851]  ? kasan_global_oob_right+0x160/0x160
[   48.894470]  ? __kunit_add_resource+0xd1/0x100
[   48.895315]  ? kasan_test_init+0x13e/0x1b0
[   48.896283]  kunit_try_run_case+0x8f/0xd0
[   48.897103]  ? kunit_catch_run_case+0x80/0x80
[   48.897736]  ? kunit_try_catch_throw+0x40/0x40
[   48.898443]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.899341]  kthread+0x17b/0x1b0
[   48.899893]  ? kthread_complete_and_exit+0x30/0x30
[   48.900901]  ret_from_fork+0x22/0x30
[   48.901479]  </TASK>
[   48.902115] 
[   48.902412] Allocated by task 272:
[   48.902782]  kasan_save_stack+0x39/0x60
[   48.903327]  kasan_set_track+0x25/0x40
[   48.904414]  kasan_save_alloc_info+0x1e/0x30
[   48.905084]  __kasan_kmalloc+0xb6/0xc0
[   48.905736]  kmalloc_trace+0x48/0xb0
[   48.906383]  kmalloc_double_kzfree+0x99/0x1b0
[   48.907088]  kunit_try_run_case+0x8f/0xd0
[   48.907754]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.908496]  kthread+0x17b/0x1b0
[   48.909317]  ret_from_fork+0x22/0x30
[   48.910191] 
[   48.910418] Freed by task 272:
[   48.910906]  kasan_save_stack+0x39/0x60
[   48.911646]  kasan_set_track+0x25/0x40
[   48.912445]  kasan_save_free_info+0x2e/0x50
[   48.913293]  ____kasan_slab_free+0x175/0x1d0
[   48.913804]  __kasan_slab_free+0x12/0x20
[   48.914382]  __kmem_cache_free+0x188/0x2f0
[   48.915315]  kfree+0x78/0x120
[   48.915907]  kfree_sensitive+0x3e/0x50
[   48.916417]  kmalloc_double_kzfree+0xb1/0x1b0
[   48.917221]  kunit_try_run_case+0x8f/0xd0
[   48.918255]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.918827]  kthread+0x17b/0x1b0
[   48.919103]  ret_from_fork+0x22/0x30
[   48.919308] 
[   48.919420] The buggy address belongs to the object at ffff88810329c040
[   48.919420]  which belongs to the cache kmalloc-16 of size 16
[   48.921603] The buggy address is located 0 bytes inside of
[   48.921603]  16-byte region [ffff88810329c040, ffff88810329c050)
[   48.923225] 
[   48.923679] The buggy address belongs to the physical page:
[   48.924301] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10329c
[   48.925147] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.925834] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.926629] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.927315] page dumped because: kasan: bad access detected
[   48.928023] 
[   48.928281] Memory state around the buggy address:
[   48.928790]  ffff88810329bf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.930526]  ffff88810329bf80: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc
[   48.931062] >ffff88810329c000: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   48.931340]                                            ^
[   48.931683]  ffff88810329c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.932483]  ffff88810329c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.933187] ==================================================================

test log snippet test parser 56

Home

[   47.399371] ==================================================================
[   47.400612] BUG: KASAN: double-free in kmem_cache_double_free+0xe7/0x1e0
[   47.401999] Free of addr ffff8881032c1000 by task kunit_try_catch/264
[   47.402655] 
[   47.403100] CPU: 1 PID: 264 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.404050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.405925] Call Trace:
[   47.406469]  <TASK>
[   47.406953]  dump_stack_lvl+0x49/0x62
[   47.407624]  print_report+0x189/0x4b1
[   47.408331]  ? kmem_cache_double_free+0xe7/0x1e0
[   47.409054]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.410173]  ? kmem_cache_double_free+0xe7/0x1e0
[   47.410857]  kasan_report_invalid_free+0x9d/0x110
[   47.411753]  ? kmem_cache_double_free+0xe7/0x1e0
[   47.412338]  ? kmem_cache_double_free+0xe7/0x1e0
[   47.413496]  ____kasan_slab_free+0x19f/0x1d0
[   47.414118]  ? kmem_cache_double_free+0xe7/0x1e0
[   47.414636]  __kasan_slab_free+0x12/0x20
[   47.415225]  kmem_cache_free+0x19c/0x4a0
[   47.415757]  kmem_cache_double_free+0xe7/0x1e0
[   47.416301]  ? kmem_cache_invalid_free+0x1f0/0x1f0
[   47.416980]  ? __kunit_add_resource+0xd1/0x100
[   47.417503]  kunit_try_run_case+0x8f/0xd0
[   47.419121]  ? kunit_catch_run_case+0x80/0x80
[   47.419897]  ? kunit_try_catch_throw+0x40/0x40
[   47.420612]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.421111]  kthread+0x17b/0x1b0
[   47.421552]  ? kthread_complete_and_exit+0x30/0x30
[   47.422390]  ret_from_fork+0x22/0x30
[   47.423660]  </TASK>
[   47.424100] 
[   47.424425] Allocated by task 264:
[   47.425075]  kasan_save_stack+0x39/0x60
[   47.425642]  kasan_set_track+0x25/0x40
[   47.426343]  kasan_save_alloc_info+0x1e/0x30
[   47.426844]  __kasan_slab_alloc+0x90/0xa0
[   47.427888]  kmem_cache_alloc+0x14a/0x370
[   47.428351]  kmem_cache_double_free+0xb6/0x1e0
[   47.428828]  kunit_try_run_case+0x8f/0xd0
[   47.429709]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.430543]  kthread+0x17b/0x1b0
[   47.431154]  ret_from_fork+0x22/0x30
[   47.431480] 
[   47.432022] Freed by task 264:
[   47.432706]  kasan_save_stack+0x39/0x60
[   47.433651]  kasan_set_track+0x25/0x40
[   47.434273]  kasan_save_free_info+0x2e/0x50
[   47.435093]  ____kasan_slab_free+0x175/0x1d0
[   47.435952]  __kasan_slab_free+0x12/0x20
[   47.436556]  kmem_cache_free+0x19c/0x4a0
[   47.437196]  kmem_cache_double_free+0xcd/0x1e0
[   47.437897]  kunit_try_run_case+0x8f/0xd0
[   47.438521]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.439235]  kthread+0x17b/0x1b0
[   47.440187]  ret_from_fork+0x22/0x30
[   47.440645] 
[   47.440871] The buggy address belongs to the object at ffff8881032c1000
[   47.440871]  which belongs to the cache test_cache of size 200
[   47.442192] The buggy address is located 0 bytes inside of
[   47.442192]  200-byte region [ffff8881032c1000, ffff8881032c10c8)
[   47.444386] 
[   47.444646] The buggy address belongs to the physical page:
[   47.445631] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032c1
[   47.446663] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.447673] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881032a33c0
[   47.448890] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   47.449669] page dumped because: kasan: bad access detected
[   47.450120] 
[   47.450694] Memory state around the buggy address:
[   47.451464]  ffff8881032c0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.452276]  ffff8881032c0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.453360] >ffff8881032c1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.454255]                    ^
[   47.454955]  ffff8881032c1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   47.455855]  ffff8881032c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.456487] ==================================================================

test log snippet test parser 57

Home

[   47.028744] ==================================================================
[   47.029816] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x9f/0x160
[   47.030665] Read of size 1 at addr ffffffffb2dbe72d by task kunit_try_catch/257
[   47.032018] 
[   47.032400] CPU: 1 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.033514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.034822] Call Trace:
[   47.035220]  <TASK>
[   47.035648]  dump_stack_lvl+0x49/0x62
[   47.036324]  print_report+0x189/0x4b1
[   47.036910]  ? kasan_addr_to_slab+0xd/0xb0
[   47.037622]  kasan_report+0xde/0x160
[   47.038222]  ? finish_task_switch.isra.0+0xc8/0x3d0
[   47.038893]  ? kasan_global_oob_right+0x9f/0x160
[   47.039589]  ? kasan_global_oob_right+0x9f/0x160
[   47.040316]  __asan_load1+0x62/0x70
[   47.040892]  kasan_global_oob_right+0x9f/0x160
[   47.041550]  ? kasan_stack_oob+0x180/0x180
[   47.042197]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   47.043206]  ? kasan_test_init+0x13e/0x1b0
[   47.043923]  kunit_try_run_case+0x8f/0xd0
[   47.044683]  ? kunit_catch_run_case+0x80/0x80
[   47.045392]  ? kunit_try_catch_throw+0x40/0x40
[   47.046131]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.046875]  kthread+0x17b/0x1b0
[   47.047358]  ? kthread_complete_and_exit+0x30/0x30
[   47.047934]  ret_from_fork+0x22/0x30
[   47.048439]  </TASK>
[   47.048813] 
[   47.049151] The buggy address belongs to the variable:
[   47.050045]  global_array+0xd/0x40
[   47.051143] 
[   47.051578] The buggy address belongs to the physical page:
[   47.052396] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1353be
[   47.053400] flags: 0x200000000001000(reserved|node=0|zone=2)
[   47.054299] raw: 0200000000001000 ffffea0004d4ef88 ffffea0004d4ef88 0000000000000000
[   47.055132] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.055994] page dumped because: kasan: bad access detected
[   47.056608] 
[   47.056865] Memory state around the buggy address:
[   47.057406]  ffffffffb2dbe600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.058150]  ffffffffb2dbe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.058985] >ffffffffb2dbe700: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   47.059710]                                   ^
[   47.060606]  ffffffffb2dbe780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   47.061440]  ffffffffb2dbe800: 00 00 00 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   47.062444] ==================================================================

test log snippet test parser 58

Home

[   44.975663] ==================================================================
[   44.976646] BUG: KASAN: invalid-free in kfree+0xfa/0x120
[   44.977461] Free of addr ffff8881036c0001 by task kunit_try_catch/230
[   44.978362] 
[   44.978647] CPU: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.979498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.981035] Call Trace:
[   44.981302]  <TASK>
[   44.981570]  dump_stack_lvl+0x49/0x62
[   44.982651]  print_report+0x189/0x4b1
[   44.983579]  ? kfree+0xfa/0x120
[   44.984052]  ? kasan_addr_to_slab+0xd/0xb0
[   44.984492]  ? kfree+0xfa/0x120
[   44.985023]  kasan_report_invalid_free+0x9d/0x110
[   44.985602]  ? kfree+0xfa/0x120
[   44.986250]  ? kfree+0xfa/0x120
[   44.986872]  __kasan_kfree_large+0x82/0xd0
[   44.987547]  free_large_kmalloc+0x45/0xb0
[   44.988078]  kfree+0xfa/0x120
[   44.988389]  kmalloc_pagealloc_invalid_free+0xa7/0x1b0
[   44.989340]  ? kmalloc_large_oob_right+0x1e0/0x1e0
[   44.990127]  ? __kunit_add_resource+0xd1/0x100
[   44.990765]  ? kasan_test_init+0x13e/0x1b0
[   44.991522]  kunit_try_run_case+0x8f/0xd0
[   44.992220]  ? kunit_catch_run_case+0x80/0x80
[   44.993136]  ? kunit_try_catch_throw+0x40/0x40
[   44.994092]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.994791]  kthread+0x17b/0x1b0
[   44.995391]  ? kthread_complete_and_exit+0x30/0x30
[   44.996192]  ret_from_fork+0x22/0x30
[   44.997029]  </TASK>
[   44.997382] 
[   44.997677] The buggy address belongs to the physical page:
[   44.998563] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036c0
[   44.999518] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.000492] flags: 0x200000000010000(head|node=0|zone=2)
[   45.001289] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.002192] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.002916] page dumped because: kasan: bad access detected
[   45.003443] 
[   45.003737] Memory state around the buggy address:
[   45.005031]  ffff8881036bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.005843]  ffff8881036bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.006517] >ffff8881036c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.007222]                    ^
[   45.007557]  ffff8881036c0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.008360]  ffff8881036c0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.009167] ==================================================================

test log snippet test parser 59

Home

[   47.471659] ==================================================================
[   47.472805] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe0/0x1f0
[   47.473683] Free of addr ffff8881032c2001 by task kunit_try_catch/265
[   47.475285] 
[   47.475747] CPU: 1 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.476561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.477368] Call Trace:
[   47.477680]  <TASK>
[   47.478195]  dump_stack_lvl+0x49/0x62
[   47.478677]  print_report+0x189/0x4b1
[   47.479232]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   47.480049]  ? kasan_complete_mode_report_info+0x3c/0x200
[   47.480602]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   47.482050]  kasan_report_invalid_free+0x9d/0x110
[   47.482712]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   47.483302]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   47.483908]  ____kasan_slab_free+0x1c3/0x1d0
[   47.484660]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   47.485249]  __kasan_slab_free+0x12/0x20
[   47.485886]  kmem_cache_free+0x19c/0x4a0
[   47.486405]  kmem_cache_invalid_free+0xe0/0x1f0
[   47.486909]  ? kmem_cache_double_destroy+0x1b0/0x1b0
[   47.487470]  ? __kunit_add_resource+0xd1/0x100
[   47.488398]  kunit_try_run_case+0x8f/0xd0
[   47.489329]  ? kunit_catch_run_case+0x80/0x80
[   47.489891]  ? kunit_try_catch_throw+0x40/0x40
[   47.490503]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.491193]  kthread+0x17b/0x1b0
[   47.492412]  ? kthread_complete_and_exit+0x30/0x30
[   47.492925]  ret_from_fork+0x22/0x30
[   47.493466]  </TASK>
[   47.494001] 
[   47.494254] Allocated by task 265:
[   47.494561]  kasan_save_stack+0x39/0x60
[   47.495179]  kasan_set_track+0x25/0x40
[   47.495653]  kasan_save_alloc_info+0x1e/0x30
[   47.497033]  __kasan_slab_alloc+0x90/0xa0
[   47.497526]  kmem_cache_alloc+0x14a/0x370
[   47.498140]  kmem_cache_invalid_free+0xb9/0x1f0
[   47.498699]  kunit_try_run_case+0x8f/0xd0
[   47.499161]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.499841]  kthread+0x17b/0x1b0
[   47.500796]  ret_from_fork+0x22/0x30
[   47.501338] 
[   47.501628] The buggy address belongs to the object at ffff8881032c2000
[   47.501628]  which belongs to the cache test_cache of size 200
[   47.502710] The buggy address is located 1 bytes inside of
[   47.502710]  200-byte region [ffff8881032c2000, ffff8881032c20c8)
[   47.504654] 
[   47.504897] The buggy address belongs to the physical page:
[   47.505405] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032c2
[   47.506383] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.507019] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881032a3500
[   47.508284] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   47.509038] page dumped because: kasan: bad access detected
[   47.509615] 
[   47.509852] Memory state around the buggy address:
[   47.510426]  ffff8881032c1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.511126]  ffff8881032c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.511840] >ffff8881032c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.512654]                    ^
[   47.513674]  ffff8881032c2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   47.514333]  ffff8881032c2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.514906] ==================================================================

test log snippet test parser 60

Home

[   46.169079] ==================================================================
[   46.170408] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe7/0x1e0
[   46.171751] Read of size 18446744073709551614 at addr ffff8881032b7404 by task kunit_try_catch/246
[   46.173205] 
[   46.173877] CPU: 1 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.175120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.176140] Call Trace:
[   46.176557]  <TASK>
[   46.176931]  dump_stack_lvl+0x49/0x62
[   46.177429]  print_report+0x189/0x4b1
[   46.178184]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.179229]  kasan_report+0xde/0x160
[   46.179630]  ? kmalloc_memmove_negative_size+0xe7/0x1e0
[   46.180580]  ? kmalloc_memmove_negative_size+0xe7/0x1e0
[   46.181242]  kasan_check_range+0x10b/0x1c0
[   46.181966]  memmove+0x23/0x70
[   46.182466]  kmalloc_memmove_negative_size+0xe7/0x1e0
[   46.183211]  ? kmalloc_memmove_invalid_size+0x1e0/0x1e0
[   46.184002]  ? __kunit_add_resource+0xd1/0x100
[   46.184985]  kunit_try_run_case+0x8f/0xd0
[   46.185567]  ? kunit_catch_run_case+0x80/0x80
[   46.186245]  ? kunit_try_catch_throw+0x40/0x40
[   46.187056]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.188139]  kthread+0x17b/0x1b0
[   46.188843]  ? kthread_complete_and_exit+0x30/0x30
[   46.189488]  ret_from_fork+0x22/0x30
[   46.189886]  </TASK>
[   46.190170] 
[   46.190351] Allocated by task 246:
[   46.190879]  kasan_save_stack+0x39/0x60
[   46.191329]  kasan_set_track+0x25/0x40
[   46.191804]  kasan_save_alloc_info+0x1e/0x30
[   46.192312]  __kasan_kmalloc+0xb6/0xc0
[   46.192833]  kmalloc_trace+0x48/0xb0
[   46.193259]  kmalloc_memmove_negative_size+0x9b/0x1e0
[   46.193972]  kunit_try_run_case+0x8f/0xd0
[   46.194915]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.196202]  kthread+0x17b/0x1b0
[   46.196779]  ret_from_fork+0x22/0x30
[   46.197429] 
[   46.197836] The buggy address belongs to the object at ffff8881032b7400
[   46.197836]  which belongs to the cache kmalloc-64 of size 64
[   46.199122] The buggy address is located 4 bytes inside of
[   46.199122]  64-byte region [ffff8881032b7400, ffff8881032b7440)
[   46.200291] 
[   46.200995] The buggy address belongs to the physical page:
[   46.201600] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b7
[   46.202725] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.203363] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640
[   46.204138] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   46.204835] page dumped because: kasan: bad access detected
[   46.205485] 
[   46.205705] Memory state around the buggy address:
[   46.206331]  ffff8881032b7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.207078]  ffff8881032b7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.208250] >ffff8881032b7400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   46.209355]                    ^
[   46.210340]  ffff8881032b7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.211008]  ffff8881032b7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.211762] ==================================================================

test log snippet test parser 61

Home

[   47.986071] ==================================================================
[   47.987093] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   47.987953] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   47.988730] 
[   47.989015] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.990018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.992015] Call Trace:
[   47.992595]  <TASK>
[   47.993040]  dump_stack_lvl+0x49/0x62
[   47.993684]  print_report+0x189/0x4b1
[   47.994250]  ? kasan_complete_mode_report_info+0x3c/0x200
[   47.995322]  kasan_report+0xde/0x160
[   47.996143]  ? kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   47.996765]  ? kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   47.997437]  kasan_check_range+0x10b/0x1c0
[   47.998058]  __kasan_check_write+0x14/0x20
[   47.998649]  kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   47.999415]  ? kasan_test_exit+0xe0/0xe0
[   48.000205]  kasan_bitops_generic+0xa1/0x120
[   48.001048]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.001881]  ? kasan_test_init+0x13e/0x1b0
[   48.002508]  kunit_try_run_case+0x8f/0xd0
[   48.003157]  ? kunit_catch_run_case+0x80/0x80
[   48.003893]  ? kunit_try_catch_throw+0x40/0x40
[   48.004975]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.005624]  kthread+0x17b/0x1b0
[   48.006554]  ? kthread_complete_and_exit+0x30/0x30
[   48.007399]  ret_from_fork+0x22/0x30
[   48.007933]  </TASK>
[   48.008484] 
[   48.008675] Allocated by task 270:
[   48.009038]  kasan_save_stack+0x39/0x60
[   48.009639]  kasan_set_track+0x25/0x40
[   48.010531]  kasan_save_alloc_info+0x1e/0x30
[   48.011073]  __kasan_kmalloc+0xb6/0xc0
[   48.011499]  kmalloc_trace+0x48/0xb0
[   48.012129]  kasan_bitops_generic+0x86/0x120
[   48.013036]  kunit_try_run_case+0x8f/0xd0
[   48.013599]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.014443]  kthread+0x17b/0x1b0
[   48.014933]  ret_from_fork+0x22/0x30
[   48.015432] 
[   48.015721] The buggy address belongs to the object at ffff8881032fe0e0
[   48.015721]  which belongs to the cache kmalloc-16 of size 16
[   48.016704] The buggy address is located 8 bytes inside of
[   48.016704]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.018998] 
[   48.019236] The buggy address belongs to the physical page:
[   48.019860] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.020254] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.020711] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.021849] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.023278] page dumped because: kasan: bad access detected
[   48.023893] 
[   48.024256] Memory state around the buggy address:
[   48.024850]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.025691]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.027167] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.028387]                                                           ^
[   48.029034]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.029852]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.030620] ==================================================================
---
[   48.256319] ==================================================================
[   48.257656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   48.258319] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.259636] 
[   48.260072] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.260818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.261681] Call Trace:
[   48.262357]  <TASK>
[   48.262613]  dump_stack_lvl+0x49/0x62
[   48.262886]  print_report+0x189/0x4b1
[   48.263909]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.264632]  kasan_report+0xde/0x160
[   48.265261]  ? kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   48.266074]  ? kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   48.267206]  kasan_check_range+0x10b/0x1c0
[   48.268242]  __kasan_check_write+0x14/0x20
[   48.268877]  kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   48.269697]  ? kasan_test_exit+0xe0/0xe0
[   48.270276]  kasan_bitops_generic+0xa1/0x120
[   48.271044]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.272363]  ? kasan_test_init+0x13e/0x1b0
[   48.273080]  kunit_try_run_case+0x8f/0xd0
[   48.273853]  ? kunit_catch_run_case+0x80/0x80
[   48.274516]  ? kunit_try_catch_throw+0x40/0x40
[   48.275200]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.275972]  kthread+0x17b/0x1b0
[   48.276301]  ? kthread_complete_and_exit+0x30/0x30
[   48.276886]  ret_from_fork+0x22/0x30
[   48.277966]  </TASK>
[   48.278345] 
[   48.278642] Allocated by task 270:
[   48.279003]  kasan_save_stack+0x39/0x60
[   48.279647]  kasan_set_track+0x25/0x40
[   48.280637]  kasan_save_alloc_info+0x1e/0x30
[   48.281260]  __kasan_kmalloc+0xb6/0xc0
[   48.281766]  kmalloc_trace+0x48/0xb0
[   48.282221]  kasan_bitops_generic+0x86/0x120
[   48.282800]  kunit_try_run_case+0x8f/0xd0
[   48.283380]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.284097]  kthread+0x17b/0x1b0
[   48.284605]  ret_from_fork+0x22/0x30
[   48.285057] 
[   48.285326] The buggy address belongs to the object at ffff8881032fe0e0
[   48.285326]  which belongs to the cache kmalloc-16 of size 16
[   48.286860] The buggy address is located 8 bytes inside of
[   48.286860]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.287999] 
[   48.288290] The buggy address belongs to the physical page:
[   48.288919] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.289883] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.290580] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.292148] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.292855] page dumped because: kasan: bad access detected
[   48.293431] 
[   48.293718] Memory state around the buggy address:
[   48.294297]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.295386]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.296365] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.297003]                                                           ^
[   48.297693]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.298434]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.299697] ==================================================================
---
[   48.032710] ==================================================================
[   48.033422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   48.034324] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.035107] 
[   48.035393] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.037237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.038301] Call Trace:
[   48.038495]  <TASK>
[   48.038899]  dump_stack_lvl+0x49/0x62
[   48.039480]  print_report+0x189/0x4b1
[   48.040019]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.041189]  kasan_report+0xde/0x160
[   48.041704]  ? kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   48.042494]  ? kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   48.043260]  kasan_check_range+0x10b/0x1c0
[   48.043913]  __kasan_check_write+0x14/0x20
[   48.044587]  kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   48.045384]  ? kasan_test_exit+0xe0/0xe0
[   48.046361]  kasan_bitops_generic+0xa1/0x120
[   48.047021]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.047853]  ? kasan_test_init+0x13e/0x1b0
[   48.048524]  kunit_try_run_case+0x8f/0xd0
[   48.048990]  ? kunit_catch_run_case+0x80/0x80
[   48.049836]  ? kunit_try_catch_throw+0x40/0x40
[   48.050509]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.051379]  kthread+0x17b/0x1b0
[   48.051903]  ? kthread_complete_and_exit+0x30/0x30
[   48.052438]  ret_from_fork+0x22/0x30
[   48.052892]  </TASK>
[   48.053693] 
[   48.053957] Allocated by task 270:
[   48.054352]  kasan_save_stack+0x39/0x60
[   48.054787]  kasan_set_track+0x25/0x40
[   48.055245]  kasan_save_alloc_info+0x1e/0x30
[   48.055702]  __kasan_kmalloc+0xb6/0xc0
[   48.057419]  kmalloc_trace+0x48/0xb0
[   48.057990]  kasan_bitops_generic+0x86/0x120
[   48.058677]  kunit_try_run_case+0x8f/0xd0
[   48.059283]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.060053]  kthread+0x17b/0x1b0
[   48.060666]  ret_from_fork+0x22/0x30
[   48.061169] 
[   48.061531] The buggy address belongs to the object at ffff8881032fe0e0
[   48.061531]  which belongs to the cache kmalloc-16 of size 16
[   48.062902] The buggy address is located 8 bytes inside of
[   48.062902]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.064819] 
[   48.065143] The buggy address belongs to the physical page:
[   48.065789] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.067055] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.067714] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.068279] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.069326] page dumped because: kasan: bad access detected
[   48.070096] 
[   48.070287] Memory state around the buggy address:
[   48.071146]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.071732]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.072616] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.073204]                                                           ^
[   48.074095]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.075105]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.075385] ==================================================================
---
[   48.123576] ==================================================================
[   48.125276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x145/0x5a0
[   48.126218] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.126817] 
[   48.127548] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.128392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.129315] Call Trace:
[   48.129639]  <TASK>
[   48.130004]  dump_stack_lvl+0x49/0x62
[   48.130498]  print_report+0x189/0x4b1
[   48.131307]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.132335]  kasan_report+0xde/0x160
[   48.132863]  ? kasan_bitops_modify.constprop.0+0x145/0x5a0
[   48.133677]  ? kasan_bitops_modify.constprop.0+0x145/0x5a0
[   48.134417]  kasan_check_range+0x10b/0x1c0
[   48.135070]  __kasan_check_write+0x14/0x20
[   48.135773]  kasan_bitops_modify.constprop.0+0x145/0x5a0
[   48.136726]  ? kasan_test_exit+0xe0/0xe0
[   48.137120]  kasan_bitops_generic+0xa1/0x120
[   48.137361]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.138233]  ? kasan_test_init+0x13e/0x1b0
[   48.138980]  kunit_try_run_case+0x8f/0xd0
[   48.139685]  ? kunit_catch_run_case+0x80/0x80
[   48.140283]  ? kunit_try_catch_throw+0x40/0x40
[   48.140804]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.141520]  kthread+0x17b/0x1b0
[   48.142015]  ? kthread_complete_and_exit+0x30/0x30
[   48.142530]  ret_from_fork+0x22/0x30
[   48.143020]  </TASK>
[   48.143242] 
[   48.143449] Allocated by task 270:
[   48.144022]  kasan_save_stack+0x39/0x60
[   48.144901]  kasan_set_track+0x25/0x40
[   48.145388]  kasan_save_alloc_info+0x1e/0x30
[   48.145905]  __kasan_kmalloc+0xb6/0xc0
[   48.146429]  kmalloc_trace+0x48/0xb0
[   48.146883]  kasan_bitops_generic+0x86/0x120
[   48.147864]  kunit_try_run_case+0x8f/0xd0
[   48.148410]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.149775]  kthread+0x17b/0x1b0
[   48.150324]  ret_from_fork+0x22/0x30
[   48.150899] 
[   48.151197] The buggy address belongs to the object at ffff8881032fe0e0
[   48.151197]  which belongs to the cache kmalloc-16 of size 16
[   48.152531] The buggy address is located 8 bytes inside of
[   48.152531]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.153690] 
[   48.154082] The buggy address belongs to the physical page:
[   48.154581] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.155996] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.156665] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.157623] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.158644] page dumped because: kasan: bad access detected
[   48.159298] 
[   48.159755] Memory state around the buggy address:
[   48.160488]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.161090]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.162187] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.163009]                                                           ^
[   48.163686]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.164031]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.164706] ==================================================================
---
[   48.166557] ==================================================================
[   48.167721] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x5a0
[   48.168591] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.170018] 
[   48.170306] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.171355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.172427] Call Trace:
[   48.173038]  <TASK>
[   48.173441]  dump_stack_lvl+0x49/0x62
[   48.174496]  print_report+0x189/0x4b1
[   48.175299]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.176087]  kasan_report+0xde/0x160
[   48.176686]  ? kasan_bitops_modify.constprop.0+0x180/0x5a0
[   48.177300]  ? kasan_bitops_modify.constprop.0+0x180/0x5a0
[   48.178107]  kasan_check_range+0x10b/0x1c0
[   48.178633]  __kasan_check_write+0x14/0x20
[   48.179402]  kasan_bitops_modify.constprop.0+0x180/0x5a0
[   48.180365]  ? kasan_test_exit+0xe0/0xe0
[   48.181385]  kasan_bitops_generic+0xa1/0x120
[   48.181977]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.182779]  ? kasan_test_init+0x13e/0x1b0
[   48.183365]  kunit_try_run_case+0x8f/0xd0
[   48.184580]  ? kunit_catch_run_case+0x80/0x80
[   48.185133]  ? kunit_try_catch_throw+0x40/0x40
[   48.185754]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.186421]  kthread+0x17b/0x1b0
[   48.187030]  ? kthread_complete_and_exit+0x30/0x30
[   48.187651]  ret_from_fork+0x22/0x30
[   48.188309]  </TASK>
[   48.188920] 
[   48.189131] Allocated by task 270:
[   48.189377]  kasan_save_stack+0x39/0x60
[   48.189834]  kasan_set_track+0x25/0x40
[   48.190795]  kasan_save_alloc_info+0x1e/0x30
[   48.191279]  __kasan_kmalloc+0xb6/0xc0
[   48.191809]  kmalloc_trace+0x48/0xb0
[   48.192294]  kasan_bitops_generic+0x86/0x120
[   48.193218]  kunit_try_run_case+0x8f/0xd0
[   48.194008]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.194697]  kthread+0x17b/0x1b0
[   48.195172]  ret_from_fork+0x22/0x30
[   48.195664] 
[   48.195908] The buggy address belongs to the object at ffff8881032fe0e0
[   48.195908]  which belongs to the cache kmalloc-16 of size 16
[   48.197906] The buggy address is located 8 bytes inside of
[   48.197906]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.198922] 
[   48.199192] The buggy address belongs to the physical page:
[   48.199719] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.200655] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.201345] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.202980] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.203636] page dumped because: kasan: bad access detected
[   48.204242] 
[   48.204484] Memory state around the buggy address:
[   48.205000]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.205651]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.206704] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.207653]                                                           ^
[   48.208319]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.209265]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.210088] ==================================================================
---
[   48.076490] ==================================================================
[   48.077253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   48.078394] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.079922] 
[   48.080371] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.081734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.083153] Call Trace:
[   48.083493]  <TASK>
[   48.083808]  dump_stack_lvl+0x49/0x62
[   48.084345]  print_report+0x189/0x4b1
[   48.084894]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.086067]  kasan_report+0xde/0x160
[   48.086829]  ? kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   48.087765]  ? kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   48.089098]  kasan_check_range+0x10b/0x1c0
[   48.089934]  __kasan_check_write+0x14/0x20
[   48.090633]  kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   48.091421]  ? kasan_test_exit+0xe0/0xe0
[   48.091991]  kasan_bitops_generic+0xa1/0x120
[   48.092403]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.093207]  ? kasan_test_init+0x13e/0x1b0
[   48.093824]  kunit_try_run_case+0x8f/0xd0
[   48.094439]  ? kunit_catch_run_case+0x80/0x80
[   48.095117]  ? kunit_try_catch_throw+0x40/0x40
[   48.096411]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.097011]  kthread+0x17b/0x1b0
[   48.097431]  ? kthread_complete_and_exit+0x30/0x30
[   48.098308]  ret_from_fork+0x22/0x30
[   48.098768]  </TASK>
[   48.099183] 
[   48.099486] Allocated by task 270:
[   48.100524]  kasan_save_stack+0x39/0x60
[   48.101072]  kasan_set_track+0x25/0x40
[   48.101540]  kasan_save_alloc_info+0x1e/0x30
[   48.102157]  __kasan_kmalloc+0xb6/0xc0
[   48.102537]  kmalloc_trace+0x48/0xb0
[   48.103128]  kasan_bitops_generic+0x86/0x120
[   48.103687]  kunit_try_run_case+0x8f/0xd0
[   48.104305]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.105150]  kthread+0x17b/0x1b0
[   48.105870]  ret_from_fork+0x22/0x30
[   48.106870] 
[   48.107146] The buggy address belongs to the object at ffff8881032fe0e0
[   48.107146]  which belongs to the cache kmalloc-16 of size 16
[   48.108365] The buggy address is located 8 bytes inside of
[   48.108365]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.109543] 
[   48.110290] The buggy address belongs to the physical page:
[   48.110847] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.111714] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.112912] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.113876] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.115113] page dumped because: kasan: bad access detected
[   48.116041] 
[   48.116241] Memory state around the buggy address:
[   48.117025]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.117893]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.118702] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.119803]                                                           ^
[   48.121109]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.121702]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.122661] ==================================================================
---
[   48.211164] ==================================================================
[   48.211845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   48.213662] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.215269] 
[   48.215565] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.216651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.217480] Call Trace:
[   48.218299]  <TASK>
[   48.218475]  dump_stack_lvl+0x49/0x62
[   48.219300]  print_report+0x189/0x4b1
[   48.219711]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.220348]  kasan_report+0xde/0x160
[   48.220706]  ? kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   48.221808]  ? kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   48.222583]  kasan_check_range+0x10b/0x1c0
[   48.223330]  __kasan_check_write+0x14/0x20
[   48.224091]  kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   48.225086]  ? kasan_test_exit+0xe0/0xe0
[   48.225704]  kasan_bitops_generic+0xa1/0x120
[   48.226373]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.227686]  ? kasan_test_init+0x13e/0x1b0
[   48.228190]  kunit_try_run_case+0x8f/0xd0
[   48.228610]  ? kunit_catch_run_case+0x80/0x80
[   48.229134]  ? kunit_try_catch_throw+0x40/0x40
[   48.229669]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.230781]  kthread+0x17b/0x1b0
[   48.231368]  ? kthread_complete_and_exit+0x30/0x30
[   48.232287]  ret_from_fork+0x22/0x30
[   48.233029]  </TASK>
[   48.233446] 
[   48.233845] Allocated by task 270:
[   48.234410]  kasan_save_stack+0x39/0x60
[   48.235166]  kasan_set_track+0x25/0x40
[   48.235878]  kasan_save_alloc_info+0x1e/0x30
[   48.236237]  __kasan_kmalloc+0xb6/0xc0
[   48.237093]  kmalloc_trace+0x48/0xb0
[   48.237741]  kasan_bitops_generic+0x86/0x120
[   48.238583]  kunit_try_run_case+0x8f/0xd0
[   48.239051]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.240087]  kthread+0x17b/0x1b0
[   48.240533]  ret_from_fork+0x22/0x30
[   48.241031] 
[   48.241290] The buggy address belongs to the object at ffff8881032fe0e0
[   48.241290]  which belongs to the cache kmalloc-16 of size 16
[   48.242421] The buggy address is located 8 bytes inside of
[   48.242421]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.243506] 
[   48.243753] The buggy address belongs to the physical page:
[   48.244458] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.245271] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.246171] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.247932] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.248786] page dumped because: kasan: bad access detected
[   48.249306] 
[   48.249594] Memory state around the buggy address:
[   48.250174]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.250852]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.251520] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.252249]                                                           ^
[   48.253873]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.254505]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.255152] ==================================================================
---
[   48.300987] ==================================================================
[   48.301661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x229/0x5a0
[   48.305091] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.305766] 
[   48.306071] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.306775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.307838] Call Trace:
[   48.308133]  <TASK>
[   48.309353]  dump_stack_lvl+0x49/0x62
[   48.309816]  print_report+0x189/0x4b1
[   48.310347]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.310905]  kasan_report+0xde/0x160
[   48.311499]  ? kasan_bitops_modify.constprop.0+0x229/0x5a0
[   48.312381]  ? kasan_bitops_modify.constprop.0+0x229/0x5a0
[   48.313488]  kasan_check_range+0x10b/0x1c0
[   48.313985]  __kasan_check_write+0x14/0x20
[   48.314556]  kasan_bitops_modify.constprop.0+0x229/0x5a0
[   48.315619]  ? kasan_test_exit+0xe0/0xe0
[   48.316187]  kasan_bitops_generic+0xa1/0x120
[   48.316776]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.318057]  ? kasan_test_init+0x13e/0x1b0
[   48.318555]  kunit_try_run_case+0x8f/0xd0
[   48.319071]  ? kunit_catch_run_case+0x80/0x80
[   48.319671]  ? kunit_try_catch_throw+0x40/0x40
[   48.320373]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.321716]  kthread+0x17b/0x1b0
[   48.322721]  ? kthread_complete_and_exit+0x30/0x30
[   48.323472]  ret_from_fork+0x22/0x30
[   48.323951]  </TASK>
[   48.324290] 
[   48.325327] Allocated by task 270:
[   48.326158]  kasan_save_stack+0x39/0x60
[   48.326720]  kasan_set_track+0x25/0x40
[   48.327600]  kasan_save_alloc_info+0x1e/0x30
[   48.328097]  __kasan_kmalloc+0xb6/0xc0
[   48.328642]  kmalloc_trace+0x48/0xb0
[   48.329210]  kasan_bitops_generic+0x86/0x120
[   48.330279]  kunit_try_run_case+0x8f/0xd0
[   48.331097]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.331896]  kthread+0x17b/0x1b0
[   48.332488]  ret_from_fork+0x22/0x30
[   48.333118] 
[   48.333312] The buggy address belongs to the object at ffff8881032fe0e0
[   48.333312]  which belongs to the cache kmalloc-16 of size 16
[   48.335269] The buggy address is located 8 bytes inside of
[   48.335269]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.335787] 
[   48.335902] The buggy address belongs to the physical page:
[   48.336320] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.337612] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.338815] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.340030] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.340630] page dumped because: kasan: bad access detected
[   48.341221] 
[   48.341467] Memory state around the buggy address:
[   48.342383]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.343896]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.344713] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.345468]                                                           ^
[   48.346253]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.347111]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.347625] ==================================================================

test log snippet test parser 62

Home

[   48.668223] ==================================================================
[   48.669755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   48.670922] Read of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.672207] 
[   48.672688] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.673497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.675044] Call Trace:
[   48.675495]  <TASK>
[   48.676083]  dump_stack_lvl+0x49/0x62
[   48.676744]  print_report+0x189/0x4b1
[   48.677231]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.678212]  kasan_report+0xde/0x160
[   48.679070]  ? kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   48.679684]  ? kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   48.680636]  kasan_check_range+0x10b/0x1c0
[   48.681205]  __kasan_check_read+0x11/0x20
[   48.681802]  kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   48.682512]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.683166]  ? add_taint+0x2a/0x80
[   48.683664]  kasan_bitops_generic+0xac/0x120
[   48.684505]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.685950]  ? kasan_test_init+0x13e/0x1b0
[   48.686638]  kunit_try_run_case+0x8f/0xd0
[   48.687332]  ? kunit_catch_run_case+0x80/0x80
[   48.687977]  ? kunit_try_catch_throw+0x40/0x40
[   48.688535]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.689236]  kthread+0x17b/0x1b0
[   48.689691]  ? kthread_complete_and_exit+0x30/0x30
[   48.690359]  ret_from_fork+0x22/0x30
[   48.691119]  </TASK>
[   48.691705] 
[   48.691965] Allocated by task 270:
[   48.692371]  kasan_save_stack+0x39/0x60
[   48.693015]  kasan_set_track+0x25/0x40
[   48.693598]  kasan_save_alloc_info+0x1e/0x30
[   48.694287]  __kasan_kmalloc+0xb6/0xc0
[   48.695296]  kmalloc_trace+0x48/0xb0
[   48.695711]  kasan_bitops_generic+0x86/0x120
[   48.696191]  kunit_try_run_case+0x8f/0xd0
[   48.696584]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.697080]  kthread+0x17b/0x1b0
[   48.697623]  ret_from_fork+0x22/0x30
[   48.698237] 
[   48.698574] The buggy address belongs to the object at ffff8881032fe0e0
[   48.698574]  which belongs to the cache kmalloc-16 of size 16
[   48.699791] The buggy address is located 8 bytes inside of
[   48.699791]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.701296] 
[   48.701610] The buggy address belongs to the physical page:
[   48.702105] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.703442] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.705636] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.706636] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.707548] page dumped because: kasan: bad access detected
[   48.708109] 
[   48.708528] Memory state around the buggy address:
[   48.709108]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.709811]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.710730] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.711575]                                                           ^
[   48.712166]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.713106]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.714518] ==================================================================

test log snippet test parser 63

Home

[   48.533028] ==================================================================
[   48.533676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   48.535233] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.536204] 
[   48.536444] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.538267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.538970] Call Trace:
[   48.539474]  <TASK>
[   48.539930]  dump_stack_lvl+0x49/0x62
[   48.540573]  print_report+0x189/0x4b1
[   48.541237]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.541862]  kasan_report+0xde/0x160
[   48.542428]  ? kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   48.543447]  ? kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   48.544428]  kasan_check_range+0x10b/0x1c0
[   48.545308]  __kasan_check_write+0x14/0x20
[   48.546030]  kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   48.547026]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.547750]  ? add_taint+0x2a/0x80
[   48.548146]  kasan_bitops_generic+0xac/0x120
[   48.549026]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.549873]  ? kasan_test_init+0x13e/0x1b0
[   48.550553]  kunit_try_run_case+0x8f/0xd0
[   48.551265]  ? kunit_catch_run_case+0x80/0x80
[   48.551959]  ? kunit_try_catch_throw+0x40/0x40
[   48.552492]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.553102]  kthread+0x17b/0x1b0
[   48.554018]  ? kthread_complete_and_exit+0x30/0x30
[   48.554812]  ret_from_fork+0x22/0x30
[   48.555359]  </TASK>
[   48.555596] 
[   48.556052] Allocated by task 270:
[   48.556818]  kasan_save_stack+0x39/0x60
[   48.557538]  kasan_set_track+0x25/0x40
[   48.558138]  kasan_save_alloc_info+0x1e/0x30
[   48.558843]  __kasan_kmalloc+0xb6/0xc0
[   48.559447]  kmalloc_trace+0x48/0xb0
[   48.560404]  kasan_bitops_generic+0x86/0x120
[   48.560970]  kunit_try_run_case+0x8f/0xd0
[   48.561766]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.562461]  kthread+0x17b/0x1b0
[   48.563571]  ret_from_fork+0x22/0x30
[   48.564009] 
[   48.564232] The buggy address belongs to the object at ffff8881032fe0e0
[   48.564232]  which belongs to the cache kmalloc-16 of size 16
[   48.565347] The buggy address is located 8 bytes inside of
[   48.565347]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.566355] 
[   48.566607] The buggy address belongs to the physical page:
[   48.567110] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.568665] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.569293] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.569991] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.570709] page dumped because: kasan: bad access detected
[   48.571440] 
[   48.572106] Memory state around the buggy address:
[   48.573219]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.574188]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.574968] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.575727]                                                           ^
[   48.576706]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.577465]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.578140] ==================================================================
---
[   48.623510] ==================================================================
[   48.624374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   48.625435] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.626220] 
[   48.626523] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.627313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.628205] Call Trace:
[   48.628507]  <TASK>
[   48.628833]  dump_stack_lvl+0x49/0x62
[   48.629594]  print_report+0x189/0x4b1
[   48.630193]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.630754]  kasan_report+0xde/0x160
[   48.631389]  ? kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   48.632198]  ? kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   48.632913]  kasan_check_range+0x10b/0x1c0
[   48.633600]  __kasan_check_write+0x14/0x20
[   48.634130]  kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   48.634926]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.635696]  ? add_taint+0x2a/0x80
[   48.636325]  kasan_bitops_generic+0xac/0x120
[   48.636922]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.637596]  ? kasan_test_init+0x13e/0x1b0
[   48.638421]  kunit_try_run_case+0x8f/0xd0
[   48.639011]  ? kunit_catch_run_case+0x80/0x80
[   48.639566]  ? kunit_try_catch_throw+0x40/0x40
[   48.640241]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.641009]  kthread+0x17b/0x1b0
[   48.641545]  ? kthread_complete_and_exit+0x30/0x30
[   48.642138]  ret_from_fork+0x22/0x30
[   48.642611]  </TASK>
[   48.642986] 
[   48.643241] Allocated by task 270:
[   48.643785]  kasan_save_stack+0x39/0x60
[   48.644345]  kasan_set_track+0x25/0x40
[   48.644801]  kasan_save_alloc_info+0x1e/0x30
[   48.645484]  __kasan_kmalloc+0xb6/0xc0
[   48.646245]  kmalloc_trace+0x48/0xb0
[   48.646759]  kasan_bitops_generic+0x86/0x120
[   48.647303]  kunit_try_run_case+0x8f/0xd0
[   48.647815]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.648671]  kthread+0x17b/0x1b0
[   48.649020]  ret_from_fork+0x22/0x30
[   48.649399] 
[   48.649714] The buggy address belongs to the object at ffff8881032fe0e0
[   48.649714]  which belongs to the cache kmalloc-16 of size 16
[   48.651978] The buggy address is located 8 bytes inside of
[   48.651978]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.653130] 
[   48.653432] The buggy address belongs to the physical page:
[   48.654260] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.656118] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.657269] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.658231] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.660081] page dumped because: kasan: bad access detected
[   48.660641] 
[   48.660959] Memory state around the buggy address:
[   48.661502]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.662355]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.663388] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.664767]                                                           ^
[   48.665455]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.666420]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.667016] ==================================================================
---
[   48.485237] ==================================================================
[   48.486037] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   48.487547] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.488216] 
[   48.489356] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.490643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.491787] Call Trace:
[   48.492216]  <TASK>
[   48.492681]  dump_stack_lvl+0x49/0x62
[   48.493667]  print_report+0x189/0x4b1
[   48.494313]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.494900]  kasan_report+0xde/0x160
[   48.495442]  ? kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   48.496157]  ? kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   48.497166]  kasan_check_range+0x10b/0x1c0
[   48.497700]  __kasan_check_write+0x14/0x20
[   48.498272]  kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   48.499504]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.500122]  ? add_taint+0x2a/0x80
[   48.500561]  kasan_bitops_generic+0xac/0x120
[   48.501339]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.502344]  ? kasan_test_init+0x13e/0x1b0
[   48.502860]  kunit_try_run_case+0x8f/0xd0
[   48.503288]  ? kunit_catch_run_case+0x80/0x80
[   48.503876]  ? kunit_try_catch_throw+0x40/0x40
[   48.504577]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.505435]  kthread+0x17b/0x1b0
[   48.506054]  ? kthread_complete_and_exit+0x30/0x30
[   48.506685]  ret_from_fork+0x22/0x30
[   48.507204]  </TASK>
[   48.507620] 
[   48.507935] Allocated by task 270:
[   48.508490]  kasan_save_stack+0x39/0x60
[   48.509351]  kasan_set_track+0x25/0x40
[   48.509822]  kasan_save_alloc_info+0x1e/0x30
[   48.510419]  __kasan_kmalloc+0xb6/0xc0
[   48.511061]  kmalloc_trace+0x48/0xb0
[   48.511772]  kasan_bitops_generic+0x86/0x120
[   48.512643]  kunit_try_run_case+0x8f/0xd0
[   48.513317]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.514035]  kthread+0x17b/0x1b0
[   48.514470]  ret_from_fork+0x22/0x30
[   48.514911] 
[   48.515193] The buggy address belongs to the object at ffff8881032fe0e0
[   48.515193]  which belongs to the cache kmalloc-16 of size 16
[   48.516874] The buggy address is located 8 bytes inside of
[   48.516874]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.518398] 
[   48.518723] The buggy address belongs to the physical page:
[   48.519535] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.521040] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.521705] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.522628] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.523315] page dumped because: kasan: bad access detected
[   48.524036] 
[   48.524475] Memory state around the buggy address:
[   48.525187]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.525874]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.526560] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.527500]                                                           ^
[   48.528303]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.529309]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.529899] ==================================================================
---
[   48.394416] ==================================================================
[   48.395152] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   48.396181] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.396992] 
[   48.397365] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.398305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.399750] Call Trace:
[   48.400061]  <TASK>
[   48.400530]  dump_stack_lvl+0x49/0x62
[   48.401261]  print_report+0x189/0x4b1
[   48.401889]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.402595]  kasan_report+0xde/0x160
[   48.403105]  ? kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   48.403829]  ? kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   48.404561]  kasan_check_range+0x10b/0x1c0
[   48.405048]  __kasan_check_write+0x14/0x20
[   48.405646]  kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   48.406408]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.407145]  ? add_taint+0x2a/0x80
[   48.407741]  kasan_bitops_generic+0xac/0x120
[   48.408348]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.409148]  ? kasan_test_init+0x13e/0x1b0
[   48.409703]  kunit_try_run_case+0x8f/0xd0
[   48.410221]  ? kunit_catch_run_case+0x80/0x80
[   48.410887]  ? kunit_try_catch_throw+0x40/0x40
[   48.411552]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.412122]  kthread+0x17b/0x1b0
[   48.412609]  ? kthread_complete_and_exit+0x30/0x30
[   48.413273]  ret_from_fork+0x22/0x30
[   48.413862]  </TASK>
[   48.414291] 
[   48.414639] Allocated by task 270:
[   48.415111]  kasan_save_stack+0x39/0x60
[   48.415797]  kasan_set_track+0x25/0x40
[   48.416432]  kasan_save_alloc_info+0x1e/0x30
[   48.416897]  __kasan_kmalloc+0xb6/0xc0
[   48.417481]  kmalloc_trace+0x48/0xb0
[   48.417893]  kasan_bitops_generic+0x86/0x120
[   48.418641]  kunit_try_run_case+0x8f/0xd0
[   48.419164]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.419922]  kthread+0x17b/0x1b0
[   48.420439]  ret_from_fork+0x22/0x30
[   48.421037] 
[   48.421322] The buggy address belongs to the object at ffff8881032fe0e0
[   48.421322]  which belongs to the cache kmalloc-16 of size 16
[   48.422563] The buggy address is located 8 bytes inside of
[   48.422563]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.423759] 
[   48.424131] The buggy address belongs to the physical page:
[   48.424685] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.425663] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.426293] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.427174] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.427994] page dumped because: kasan: bad access detected
[   48.428556] 
[   48.428755] Memory state around the buggy address:
[   48.429689]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.430386]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.431934] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.432738]                                                           ^
[   48.433511]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.434395]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.435151] ==================================================================
---
[   48.350099] ==================================================================
[   48.351816] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   48.352859] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.353868] 
[   48.354285] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.355376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.356427] Call Trace:
[   48.356910]  <TASK>
[   48.357366]  dump_stack_lvl+0x49/0x62
[   48.358041]  print_report+0x189/0x4b1
[   48.358640]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.359376]  kasan_report+0xde/0x160
[   48.360007]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   48.360775]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   48.361566]  kasan_check_range+0x10b/0x1c0
[   48.362135]  __kasan_check_write+0x14/0x20
[   48.362725]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   48.363554]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.364278]  ? add_taint+0x2a/0x80
[   48.364976]  kasan_bitops_generic+0xac/0x120
[   48.365605]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.366358]  ? kasan_test_init+0x13e/0x1b0
[   48.366866]  kunit_try_run_case+0x8f/0xd0
[   48.367407]  ? kunit_catch_run_case+0x80/0x80
[   48.368012]  ? kunit_try_catch_throw+0x40/0x40
[   48.368585]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.369301]  kthread+0x17b/0x1b0
[   48.370096]  ? kthread_complete_and_exit+0x30/0x30
[   48.370614]  ret_from_fork+0x22/0x30
[   48.371267]  </TASK>
[   48.371567] 
[   48.372153] Allocated by task 270:
[   48.372499]  kasan_save_stack+0x39/0x60
[   48.373111]  kasan_set_track+0x25/0x40
[   48.373744]  kasan_save_alloc_info+0x1e/0x30
[   48.374250]  __kasan_kmalloc+0xb6/0xc0
[   48.374795]  kmalloc_trace+0x48/0xb0
[   48.375368]  kasan_bitops_generic+0x86/0x120
[   48.375921]  kunit_try_run_case+0x8f/0xd0
[   48.376524]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.377229]  kthread+0x17b/0x1b0
[   48.377718]  ret_from_fork+0x22/0x30
[   48.378251] 
[   48.378559] The buggy address belongs to the object at ffff8881032fe0e0
[   48.378559]  which belongs to the cache kmalloc-16 of size 16
[   48.379704] The buggy address is located 8 bytes inside of
[   48.379704]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.380804] 
[   48.381178] The buggy address belongs to the physical page:
[   48.381951] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.383463] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.384084] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.384852] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.385833] page dumped because: kasan: bad access detected
[   48.386385] 
[   48.386684] Memory state around the buggy address:
[   48.387258]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.388066]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.388637] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.389186]                                                           ^
[   48.390351]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.391155]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.391805] ==================================================================
---
[   48.579287] ==================================================================
[   48.580829] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   48.581759] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.582901] 
[   48.583166] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.584698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.585514] Call Trace:
[   48.585903]  <TASK>
[   48.586310]  dump_stack_lvl+0x49/0x62
[   48.586868]  print_report+0x189/0x4b1
[   48.587423]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.588330]  kasan_report+0xde/0x160
[   48.589219]  ? kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   48.590122]  ? kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   48.591019]  kasan_check_range+0x10b/0x1c0
[   48.591513]  __kasan_check_write+0x14/0x20
[   48.592050]  kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   48.592771]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.593407]  ? add_taint+0x2a/0x80
[   48.593875]  kasan_bitops_generic+0xac/0x120
[   48.594533]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.595625]  ? kasan_test_init+0x13e/0x1b0
[   48.596203]  kunit_try_run_case+0x8f/0xd0
[   48.596869]  ? kunit_catch_run_case+0x80/0x80
[   48.597401]  ? kunit_try_catch_throw+0x40/0x40
[   48.598157]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.598654]  kthread+0x17b/0x1b0
[   48.599010]  ? kthread_complete_and_exit+0x30/0x30
[   48.599684]  ret_from_fork+0x22/0x30
[   48.600248]  </TASK>
[   48.600648] 
[   48.600913] Allocated by task 270:
[   48.601385]  kasan_save_stack+0x39/0x60
[   48.601953]  kasan_set_track+0x25/0x40
[   48.602643]  kasan_save_alloc_info+0x1e/0x30
[   48.603230]  __kasan_kmalloc+0xb6/0xc0
[   48.603693]  kmalloc_trace+0x48/0xb0
[   48.604326]  kasan_bitops_generic+0x86/0x120
[   48.605485]  kunit_try_run_case+0x8f/0xd0
[   48.606005]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.606603]  kthread+0x17b/0x1b0
[   48.607207]  ret_from_fork+0x22/0x30
[   48.607756] 
[   48.608047] The buggy address belongs to the object at ffff8881032fe0e0
[   48.608047]  which belongs to the cache kmalloc-16 of size 16
[   48.609201] The buggy address is located 8 bytes inside of
[   48.609201]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.610099] 
[   48.610350] The buggy address belongs to the physical page:
[   48.611112] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.612184] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.612799] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.613650] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.614651] page dumped because: kasan: bad access detected
[   48.615238] 
[   48.615420] Memory state around the buggy address:
[   48.616053]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.616965]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.617655] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.618581]                                                           ^
[   48.619153]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.620234]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.621641] ==================================================================
---
[   48.436404] ==================================================================
[   48.437735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   48.438732] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.439525] 
[   48.439962] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.441595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.442403] Call Trace:
[   48.442851]  <TASK>
[   48.443285]  dump_stack_lvl+0x49/0x62
[   48.443933]  print_report+0x189/0x4b1
[   48.444524]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.445483]  kasan_report+0xde/0x160
[   48.446182]  ? kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   48.447298]  ? kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   48.448076]  kasan_check_range+0x10b/0x1c0
[   48.448773]  __kasan_check_write+0x14/0x20
[   48.449490]  kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   48.450230]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.451153]  ? add_taint+0x2a/0x80
[   48.451588]  kasan_bitops_generic+0xac/0x120
[   48.452179]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.453055]  ? kasan_test_init+0x13e/0x1b0
[   48.454211]  kunit_try_run_case+0x8f/0xd0
[   48.455046]  ? kunit_catch_run_case+0x80/0x80
[   48.455768]  ? kunit_try_catch_throw+0x40/0x40
[   48.456279]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.457504]  kthread+0x17b/0x1b0
[   48.458036]  ? kthread_complete_and_exit+0x30/0x30
[   48.458732]  ret_from_fork+0x22/0x30
[   48.459565]  </TASK>
[   48.459995] 
[   48.460179] Allocated by task 270:
[   48.461233]  kasan_save_stack+0x39/0x60
[   48.461800]  kasan_set_track+0x25/0x40
[   48.462274]  kasan_save_alloc_info+0x1e/0x30
[   48.462928]  __kasan_kmalloc+0xb6/0xc0
[   48.463901]  kmalloc_trace+0x48/0xb0
[   48.464516]  kasan_bitops_generic+0x86/0x120
[   48.465316]  kunit_try_run_case+0x8f/0xd0
[   48.465811]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.467246]  kthread+0x17b/0x1b0
[   48.467702]  ret_from_fork+0x22/0x30
[   48.468411] 
[   48.469159] The buggy address belongs to the object at ffff8881032fe0e0
[   48.469159]  which belongs to the cache kmalloc-16 of size 16
[   48.470736] The buggy address is located 8 bytes inside of
[   48.470736]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.471740] 
[   48.472067] The buggy address belongs to the physical page:
[   48.472598] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.474275] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.475017] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.475888] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.476888] page dumped because: kasan: bad access detected
[   48.477307] 
[   48.477503] Memory state around the buggy address:
[   48.477752]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.478802]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.480088] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.481008]                                                           ^
[   48.481710]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.483091]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.484033] ==================================================================
---
[   48.764402] ==================================================================
[   48.765503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   48.766456] Write of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.767435] 
[   48.768143] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.769905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.770852] Call Trace:
[   48.771273]  <TASK>
[   48.771737]  dump_stack_lvl+0x49/0x62
[   48.772435]  print_report+0x189/0x4b1
[   48.773692]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.774380]  kasan_report+0xde/0x160
[   48.774783]  ? kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   48.775346]  ? kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   48.776077]  kasan_check_range+0x10b/0x1c0
[   48.776554]  __kasan_check_write+0x14/0x20
[   48.777572]  kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   48.778303]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.779127]  ? add_taint+0x2a/0x80
[   48.779964]  kasan_bitops_generic+0xac/0x120
[   48.780428]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.781161]  ? kasan_test_init+0x13e/0x1b0
[   48.782159]  kunit_try_run_case+0x8f/0xd0
[   48.782698]  ? kunit_catch_run_case+0x80/0x80
[   48.783727]  ? kunit_try_catch_throw+0x40/0x40
[   48.784261]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.785000]  kthread+0x17b/0x1b0
[   48.785813]  ? kthread_complete_and_exit+0x30/0x30
[   48.786777]  ret_from_fork+0x22/0x30
[   48.787141]  </TASK>
[   48.787283] 
[   48.787388] Allocated by task 270:
[   48.787569]  kasan_save_stack+0x39/0x60
[   48.787798]  kasan_set_track+0x25/0x40
[   48.788234]  kasan_save_alloc_info+0x1e/0x30
[   48.789837]  __kasan_kmalloc+0xb6/0xc0
[   48.791072]  kmalloc_trace+0x48/0xb0
[   48.791778]  kasan_bitops_generic+0x86/0x120
[   48.792426]  kunit_try_run_case+0x8f/0xd0
[   48.792685]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.792977]  kthread+0x17b/0x1b0
[   48.793346]  ret_from_fork+0x22/0x30
[   48.794592] 
[   48.794850] The buggy address belongs to the object at ffff8881032fe0e0
[   48.794850]  which belongs to the cache kmalloc-16 of size 16
[   48.796414] The buggy address is located 8 bytes inside of
[   48.796414]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.797683] 
[   48.798131] The buggy address belongs to the physical page:
[   48.799304] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.800402] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.801061] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.801912] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.802538] page dumped because: kasan: bad access detected
[   48.803994] 
[   48.804209] Memory state around the buggy address:
[   48.804712]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.805457]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.806463] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.807610]                                                           ^
[   48.808435]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.809341]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.810144] ==================================================================

test log snippet test parser 64

Home

[   48.715525] ==================================================================
[   48.716201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   48.718186] Read of size 8 at addr ffff8881032fe0e8 by task kunit_try_catch/270
[   48.719634] 
[   48.719874] CPU: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.720965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.722072] Call Trace:
[   48.722645]  <TASK>
[   48.723169]  dump_stack_lvl+0x49/0x62
[   48.723575]  print_report+0x189/0x4b1
[   48.724231]  ? kasan_complete_mode_report_info+0x3c/0x200
[   48.725061]  kasan_report+0xde/0x160
[   48.725582]  ? kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   48.726413]  ? kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   48.727385]  __asan_load8+0x7e/0xb0
[   48.727990]  kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   48.728831]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   48.729814]  ? add_taint+0x2a/0x80
[   48.730366]  kasan_bitops_generic+0xac/0x120
[   48.730873]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   48.731785]  ? kasan_test_init+0x13e/0x1b0
[   48.733044]  kunit_try_run_case+0x8f/0xd0
[   48.733562]  ? kunit_catch_run_case+0x80/0x80
[   48.734358]  ? kunit_try_catch_throw+0x40/0x40
[   48.734974]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.735551]  kthread+0x17b/0x1b0
[   48.736328]  ? kthread_complete_and_exit+0x30/0x30
[   48.737728]  ret_from_fork+0x22/0x30
[   48.738652]  </TASK>
[   48.739045] 
[   48.739158] Allocated by task 270:
[   48.739329]  kasan_save_stack+0x39/0x60
[   48.740026]  kasan_set_track+0x25/0x40
[   48.740847]  kasan_save_alloc_info+0x1e/0x30
[   48.741743]  __kasan_kmalloc+0xb6/0xc0
[   48.742541]  kmalloc_trace+0x48/0xb0
[   48.743188]  kasan_bitops_generic+0x86/0x120
[   48.743817]  kunit_try_run_case+0x8f/0xd0
[   48.744346]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.745112]  kthread+0x17b/0x1b0
[   48.745873]  ret_from_fork+0x22/0x30
[   48.746491] 
[   48.746788] The buggy address belongs to the object at ffff8881032fe0e0
[   48.746788]  which belongs to the cache kmalloc-16 of size 16
[   48.748094] The buggy address is located 8 bytes inside of
[   48.748094]  16-byte region [ffff8881032fe0e0, ffff8881032fe0f0)
[   48.749485] 
[   48.749778] The buggy address belongs to the physical page:
[   48.750231] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   48.751536] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.752787] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.753828] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.754436] page dumped because: kasan: bad access detected
[   48.755550] 
[   48.755994] Memory state around the buggy address:
[   48.756663]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.757358]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.758799] >ffff8881032fe080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.759596]                                                           ^
[   48.760194]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.761228]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.762204] ==================================================================

test log snippet test parser 65

Home

[   45.051361] ==================================================================
[   45.052319] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1e0
[   45.053132] Write of size 1 at addr ffff888103691f00 by task kunit_try_catch/233
[   45.053800] 
[   45.054546] CPU: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.055926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.057011] Call Trace:
[   45.057499]  <TASK>
[   45.057841]  dump_stack_lvl+0x49/0x62
[   45.058409]  print_report+0x189/0x4b1
[   45.059037]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.059654]  kasan_report+0xde/0x160
[   45.060312]  ? kmalloc_large_oob_right+0xcc/0x1e0
[   45.061012]  ? kmalloc_large_oob_right+0xcc/0x1e0
[   45.061601]  __asan_store1+0x65/0x70
[   45.062188]  kmalloc_large_oob_right+0xcc/0x1e0
[   45.062836]  ? kmalloc_oob_16+0x250/0x250
[   45.063403]  ? __kunit_add_resource+0xd1/0x100
[   45.064039]  ? kasan_test_init+0x13e/0x1b0
[   45.064648]  kunit_try_run_case+0x8f/0xd0
[   45.065189]  ? kunit_catch_run_case+0x80/0x80
[   45.065847]  ? kunit_try_catch_throw+0x40/0x40
[   45.066465]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.067258]  kthread+0x17b/0x1b0
[   45.067495]  ? kthread_complete_and_exit+0x30/0x30
[   45.068185]  ret_from_fork+0x22/0x30
[   45.068794]  </TASK>
[   45.069200] 
[   45.069437] Allocated by task 233:
[   45.069868]  kasan_save_stack+0x39/0x60
[   45.070406]  kasan_set_track+0x25/0x40
[   45.071036]  kasan_save_alloc_info+0x1e/0x30
[   45.072075]  __kasan_kmalloc+0xb6/0xc0
[   45.072608]  kmalloc_trace+0x48/0xb0
[   45.073008]  kmalloc_large_oob_right+0x99/0x1e0
[   45.073518]  kunit_try_run_case+0x8f/0xd0
[   45.074059]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.074665]  kthread+0x17b/0x1b0
[   45.075124]  ret_from_fork+0x22/0x30
[   45.075626] 
[   45.075893] The buggy address belongs to the object at ffff888103690000
[   45.075893]  which belongs to the cache kmalloc-8k of size 8192
[   45.077044] The buggy address is located 7936 bytes inside of
[   45.077044]  8192-byte region [ffff888103690000, ffff888103692000)
[   45.078232] 
[   45.078485] The buggy address belongs to the physical page:
[   45.079187] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103690
[   45.080059] head:(____ptrval____) order:3 compound_mapcount:0 compound_pincount:0
[   45.080747] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.081621] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100042280
[   45.082398] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   45.083366] page dumped because: kasan: bad access detected
[   45.083985] 
[   45.084266] Memory state around the buggy address:
[   45.084970]  ffff888103691e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.085738]  ffff888103691e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.086568] >ffff888103691f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.087233]                    ^
[   45.087702]  ffff888103691f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.088489]  ffff888103692000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.089302] ==================================================================

test log snippet test parser 66

Home

[   46.217155] ==================================================================
[   46.218252] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.218975] Read of size 64 at addr ffff8881032b7484 by task kunit_try_catch/247
[   46.219868] 
[   46.220210] CPU: 1 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.221421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.223067] Call Trace:
[   46.223665]  <TASK>
[   46.224209]  dump_stack_lvl+0x49/0x62
[   46.224876]  print_report+0x189/0x4b1
[   46.225441]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.226133]  kasan_report+0xde/0x160
[   46.226710]  ? kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.227363]  ? kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.228084]  kasan_check_range+0x10b/0x1c0
[   46.228553]  memmove+0x23/0x70
[   46.229041]  kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.229636]  ? kmem_cache_accounted+0x140/0x140
[   46.230205]  ? kmem_cache_accounted+0x140/0x140
[   46.230905]  ? kunit_try_run_case+0x84/0xd0
[   46.231709]  ? __kunit_add_resource+0xd1/0x100
[   46.232429]  kunit_try_run_case+0x8f/0xd0
[   46.233162]  ? kunit_catch_run_case+0x80/0x80
[   46.233817]  ? kunit_try_catch_throw+0x40/0x40
[   46.234539]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.235294]  kthread+0x17b/0x1b0
[   46.235837]  ? kthread_complete_and_exit+0x30/0x30
[   46.236597]  ret_from_fork+0x22/0x30
[   46.237223]  </TASK>
[   46.237632] 
[   46.237933] Allocated by task 247:
[   46.239076]  kasan_save_stack+0x39/0x60
[   46.239444]  kasan_set_track+0x25/0x40
[   46.240649]  kasan_save_alloc_info+0x1e/0x30
[   46.241288]  __kasan_kmalloc+0xb6/0xc0
[   46.241989]  kmalloc_trace+0x48/0xb0
[   46.242623]  kmalloc_memmove_invalid_size+0x9b/0x1e0
[   46.243247]  kunit_try_run_case+0x8f/0xd0
[   46.243935]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.244628]  kthread+0x17b/0x1b0
[   46.245157]  ret_from_fork+0x22/0x30
[   46.245818] 
[   46.246185] The buggy address belongs to the object at ffff8881032b7480
[   46.246185]  which belongs to the cache kmalloc-64 of size 64
[   46.247583] The buggy address is located 4 bytes inside of
[   46.247583]  64-byte region [ffff8881032b7480, ffff8881032b74c0)
[   46.248817] 
[   46.249059] The buggy address belongs to the physical page:
[   46.249724] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b7
[   46.250535] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.251370] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640
[   46.252256] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   46.253140] page dumped because: kasan: bad access detected
[   46.253812] 
[   46.254170] Memory state around the buggy address:
[   46.254847]  ffff8881032b7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.255646]  ffff8881032b7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.256349] >ffff8881032b7480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   46.257216]                                            ^
[   46.257989]  ffff8881032b7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.258799]  ffff8881032b7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.259658] ==================================================================

test log snippet test parser 67

Home

[   46.217155] ==================================================================
[   46.218252] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.218975] Read of size 64 at addr ffff8881032b7484 by task kunit_try_catch/247
[   46.219868] 
[   46.220210] CPU: 1 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.221421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.223067] Call Trace:
[   46.223665]  <TASK>
[   46.224209]  dump_stack_lvl+0x49/0x62
[   46.224876]  print_report+0x189/0x4b1
[   46.225441]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.226133]  kasan_report+0xde/0x160
[   46.226710]  ? kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.227363]  ? kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.228084]  kasan_check_range+0x10b/0x1c0
[   46.228553]  memmove+0x23/0x70
[   46.229041]  kmalloc_memmove_invalid_size+0xe6/0x1e0
[   46.229636]  ? kmem_cache_accounted+0x140/0x140
[   46.230205]  ? kmem_cache_accounted+0x140/0x140
[   46.230905]  ? kunit_try_run_case+0x84/0xd0
[   46.231709]  ? __kunit_add_resource+0xd1/0x100
[   46.232429]  kunit_try_run_case+0x8f/0xd0
[   46.233162]  ? kunit_catch_run_case+0x80/0x80
[   46.233817]  ? kunit_try_catch_throw+0x40/0x40
[   46.234539]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.235294]  kthread+0x17b/0x1b0
[   46.235837]  ? kthread_complete_and_exit+0x30/0x30
[   46.236597]  ret_from_fork+0x22/0x30
[   46.237223]  </TASK>
[   46.237632] 
[   46.237933] Allocated by task 247:
[   46.239076]  kasan_save_stack+0x39/0x60
[   46.239444]  kasan_set_track+0x25/0x40
[   46.240649]  kasan_save_alloc_info+0x1e/0x30
[   46.241288]  __kasan_kmalloc+0xb6/0xc0
[   46.241989]  kmalloc_trace+0x48/0xb0
[   46.242623]  kmalloc_memmove_invalid_size+0x9b/0x1e0
[   46.243247]  kunit_try_run_case+0x8f/0xd0
[   46.243935]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.244628]  kthread+0x17b/0x1b0
[   46.245157]  ret_from_fork+0x22/0x30
[   46.245818] 
[   46.246185] The buggy address belongs to the object at ffff8881032b7480
[   46.246185]  which belongs to the cache kmalloc-64 of size 64
[   46.247583] The buggy address is located 4 bytes inside of
[   46.247583]  64-byte region [ffff8881032b7480, ffff8881032b74c0)
[   46.248817] 
[   46.249059] The buggy address belongs to the physical page:
[   46.249724] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b7
[   46.250535] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.251370] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640
[   46.252256] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   46.253140] page dumped because: kasan: bad access detected
[   46.253812] 
[   46.254170] Memory state around the buggy address:
[   46.254847]  ffff8881032b7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.255646]  ffff8881032b7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.256349] >ffff8881032b7480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   46.257216]                                            ^
[   46.257989]  ffff8881032b7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.258799]  ffff8881032b7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.259658] ==================================================================

test log snippet test parser 68

Home

[   44.849607] ==================================================================
[   44.850735] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[   44.852095] Read of size 1 at addr ffff8881033e3000 by task kunit_try_catch/227
[   44.853215] 
[   44.853460] CPU: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.855803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.856971] Call Trace:
[   44.857398]  <TASK>
[   44.858206]  dump_stack_lvl+0x49/0x62
[   44.859371]  print_report+0x189/0x4b1
[   44.860253]  ? kasan_complete_mode_report_info+0x3c/0x200
[   44.860966]  kasan_report+0xde/0x160
[   44.861450]  ? kmalloc_node_oob_right+0xd0/0x1f0
[   44.862075]  ? kmalloc_node_oob_right+0xd0/0x1f0
[   44.862781]  __asan_load1+0x62/0x70
[   44.863328]  kmalloc_node_oob_right+0xd0/0x1f0
[   44.864227]  ? pagealloc_uaf+0x1e0/0x1e0
[   44.864896]  ? __kunit_add_resource+0xd1/0x100
[   44.865576]  kunit_try_run_case+0x8f/0xd0
[   44.866342]  ? kunit_catch_run_case+0x80/0x80
[   44.867377]  ? kunit_try_catch_throw+0x40/0x40
[   44.868149]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.868767]  kthread+0x17b/0x1b0
[   44.869181]  ? kthread_complete_and_exit+0x30/0x30
[   44.869814]  ret_from_fork+0x22/0x30
[   44.870713]  </TASK>
[   44.871300] 
[   44.871494] Allocated by task 227:
[   44.872533]  kasan_save_stack+0x39/0x60
[   44.873199]  kasan_set_track+0x25/0x40
[   44.874046]  kasan_save_alloc_info+0x1e/0x30
[   44.874554]  __kasan_kmalloc+0xb6/0xc0
[   44.875243]  kmalloc_node_trace+0x45/0xb0
[   44.875859]  kmalloc_node_oob_right+0x9d/0x1f0
[   44.876701]  kunit_try_run_case+0x8f/0xd0
[   44.877596]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.878427]  kthread+0x17b/0x1b0
[   44.879269]  ret_from_fork+0x22/0x30
[   44.880008] 
[   44.880397] The buggy address belongs to the object at ffff8881033e2000
[   44.880397]  which belongs to the cache kmalloc-4k of size 4096
[   44.882136] The buggy address is located 0 bytes to the right of
[   44.882136]  4096-byte region [ffff8881033e2000, ffff8881033e3000)
[   44.883717] 
[   44.884162] The buggy address belongs to the physical page:
[   44.885102] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033e0
[   44.886313] head:(____ptrval____) order:3 compound_mapcount:0 compound_pincount:0
[   44.887258] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   44.888236] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100042140
[   44.888987] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   44.890200] page dumped because: kasan: bad access detected
[   44.891269] 
[   44.891605] Memory state around the buggy address:
[   44.892297]  ffff8881033e2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.893027]  ffff8881033e2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.894135] >ffff8881033e3000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.895146]                    ^
[   44.895516]  ffff8881033e3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.896304]  ffff8881033e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.897626] ==================================================================

test log snippet test parser 69

Home

[   45.832398] ==================================================================
[   45.833133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xef/0x250
[   45.833738] Write of size 16 at addr ffff8881032fe060 by task kunit_try_catch/239
[   45.834980] 
[   45.835554] CPU: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.837079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.837898] Call Trace:
[   45.838263]  <TASK>
[   45.838576]  dump_stack_lvl+0x49/0x62
[   45.839335]  print_report+0x189/0x4b1
[   45.840206]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.841038]  kasan_report+0xde/0x160
[   45.841481]  ? kmalloc_oob_16+0xef/0x250
[   45.841978]  ? kmalloc_oob_16+0xef/0x250
[   45.842462]  __asan_store16+0x68/0x90
[   45.842879]  kmalloc_oob_16+0xef/0x250
[   45.843475]  ? kmalloc_uaf_16+0x250/0x250
[   45.843899]  ? kmalloc_uaf_16+0x250/0x250
[   45.844328]  ? kunit_try_run_case+0x84/0xd0
[   45.845222]  ? __kunit_add_resource+0xd1/0x100
[   45.845996]  kunit_try_run_case+0x8f/0xd0
[   45.846566]  ? kunit_catch_run_case+0x80/0x80
[   45.847560]  ? kunit_try_catch_throw+0x40/0x40
[   45.848082]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.848637]  kthread+0x17b/0x1b0
[   45.849131]  ? kthread_complete_and_exit+0x30/0x30
[   45.849714]  ret_from_fork+0x22/0x30
[   45.850280]  </TASK>
[   45.850837] 
[   45.851175] Allocated by task 239:
[   45.851882]  kasan_save_stack+0x39/0x60
[   45.852338]  kasan_set_track+0x25/0x40
[   45.853211]  kasan_save_alloc_info+0x1e/0x30
[   45.854100]  __kasan_kmalloc+0xb6/0xc0
[   45.854697]  kmalloc_trace+0x48/0xb0
[   45.855421]  kmalloc_oob_16+0x8b/0x250
[   45.856113]  kunit_try_run_case+0x8f/0xd0
[   45.856694]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.857479]  kthread+0x17b/0x1b0
[   45.857980]  ret_from_fork+0x22/0x30
[   45.858809] 
[   45.859389] The buggy address belongs to the object at ffff8881032fe060
[   45.859389]  which belongs to the cache kmalloc-16 of size 16
[   45.860807] The buggy address is located 0 bytes inside of
[   45.860807]  16-byte region [ffff8881032fe060, ffff8881032fe070)
[   45.862090] 
[   45.862496] The buggy address belongs to the physical page:
[   45.863213] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   45.864450] flags: 0x200000000000200(slab|node=0|zone=2)
[   45.865843] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   45.867100] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.867911] page dumped because: kasan: bad access detected
[   45.868462] 
[   45.869075] Memory state around the buggy address:
[   45.869926]  ffff8881032fdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.870848]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.872028] >ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   45.872915]                                                           ^
[   45.873928]  ffff8881032fe080: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.874612]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.875274] ==================================================================

test log snippet test parser 70

Home

[   45.934124] ==================================================================
[   45.935552] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd6/0x1d0
[   45.936688] Write of size 128 at addr ffff8881032b5f00 by task kunit_try_catch/241
[   45.938154] 
[   45.938358] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.939634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.941266] Call Trace:
[   45.941631]  <TASK>
[   45.942408]  dump_stack_lvl+0x49/0x62
[   45.943032]  print_report+0x189/0x4b1
[   45.943480]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.944381]  kasan_report+0xde/0x160
[   45.944900]  ? kmalloc_oob_in_memset+0xd6/0x1d0
[   45.945521]  ? kmalloc_oob_in_memset+0xd6/0x1d0
[   45.945991]  kasan_check_range+0x10b/0x1c0
[   45.946734]  memset+0x23/0x50
[   45.947230]  kmalloc_oob_in_memset+0xd6/0x1d0
[   45.948178]  ? kmalloc_oob_memset_2+0x1d0/0x1d0
[   45.949130]  ? __kunit_add_resource+0xd1/0x100
[   45.949928]  kunit_try_run_case+0x8f/0xd0
[   45.951076]  ? kunit_catch_run_case+0x80/0x80
[   45.951784]  ? kunit_try_catch_throw+0x40/0x40
[   45.952687]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.953477]  kthread+0x17b/0x1b0
[   45.954143]  ? kthread_complete_and_exit+0x30/0x30
[   45.955048]  ret_from_fork+0x22/0x30
[   45.955599]  </TASK>
[   45.956153] 
[   45.956851] Allocated by task 241:
[   45.957398]  kasan_save_stack+0x39/0x60
[   45.958075]  kasan_set_track+0x25/0x40
[   45.958730]  kasan_save_alloc_info+0x1e/0x30
[   45.959765]  __kasan_kmalloc+0xb6/0xc0
[   45.960326]  kmalloc_trace+0x48/0xb0
[   45.960875]  kmalloc_oob_in_memset+0x9b/0x1d0
[   45.961963]  kunit_try_run_case+0x8f/0xd0
[   45.962771]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.963775]  kthread+0x17b/0x1b0
[   45.964505]  ret_from_fork+0x22/0x30
[   45.965103] 
[   45.965364] The buggy address belongs to the object at ffff8881032b5f00
[   45.965364]  which belongs to the cache kmalloc-128 of size 128
[   45.966749] The buggy address is located 0 bytes inside of
[   45.966749]  128-byte region [ffff8881032b5f00, ffff8881032b5f80)
[   45.968146] 
[   45.968620] The buggy address belongs to the physical page:
[   45.969624] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b5
[   45.970583] flags: 0x200000000000200(slab|node=0|zone=2)
[   45.971563] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   45.972328] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.973410] page dumped because: kasan: bad access detected
[   45.974588] 
[   45.975053] Memory state around the buggy address:
[   45.975761]  ffff8881032b5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.976836]  ffff8881032b5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.977553] >ffff8881032b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.978626]                                                                 ^
[   45.979222]  ffff8881032b5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.979962]  ffff8881032b6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc
[   45.981084] ==================================================================

test log snippet test parser 71

Home

[   44.781991] ==================================================================
[   44.782933] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcb/0x1e0
[   44.783872] Read of size 1 at addr ffff8881032fe03f by task kunit_try_catch/226
[   44.784793] 
[   44.785240] CPU: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.786519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.787534] Call Trace:
[   44.788069]  <TASK>
[   44.788513]  dump_stack_lvl+0x49/0x62
[   44.789154]  print_report+0x189/0x4b1
[   44.789565]  ? kasan_complete_mode_report_info+0x7c/0x200
[   44.790349]  kasan_report+0xde/0x160
[   44.791102]  ? kmalloc_oob_left+0xcb/0x1e0
[   44.791683]  ? kmalloc_oob_left+0xcb/0x1e0
[   44.792188]  __asan_load1+0x62/0x70
[   44.793024]  kmalloc_oob_left+0xcb/0x1e0
[   44.793997]  ? kmalloc_pagealloc_oob_right+0x1c0/0x1c0
[   44.794744]  ? __kunit_add_resource+0xd1/0x100
[   44.795397]  kunit_try_run_case+0x8f/0xd0
[   44.796086]  ? kunit_catch_run_case+0x80/0x80
[   44.796711]  ? kunit_try_catch_throw+0x40/0x40
[   44.797481]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.798224]  kthread+0x17b/0x1b0
[   44.798746]  ? kthread_complete_and_exit+0x30/0x30
[   44.799439]  ret_from_fork+0x22/0x30
[   44.800035]  </TASK>
[   44.800437] 
[   44.801103] Allocated by task 1:
[   44.802103]  kasan_save_stack+0x39/0x60
[   44.802878]  kasan_set_track+0x25/0x40
[   44.803524]  kasan_save_alloc_info+0x1e/0x30
[   44.804277]  __kasan_kmalloc+0xb6/0xc0
[   44.804846]  __kmalloc+0x5e/0x170
[   44.805298]  x509_fabricate_name.isra.0+0x1da/0x330
[   44.806243]  x509_note_subject+0x59/0x70
[   44.806860]  asn1_ber_decoder+0x84a/0x1250
[   44.807504]  x509_cert_parse+0x122/0x370
[   44.808449]  x509_key_preparse+0x3e/0x3b0
[   44.809182]  asymmetric_key_preparse+0x70/0xf0
[   44.810239]  key_create_or_update+0x329/0x7a0
[   44.810919]  regulatory_init_db+0x132/0x210
[   44.811435]  do_one_initcall+0xaf/0x310
[   44.812360]  kernel_init_freeable+0x2d2/0x337
[   44.813338]  kernel_init+0x1d/0x150
[   44.814150]  ret_from_fork+0x22/0x30
[   44.814580] 
[   44.815163] Freed by task 1:
[   44.816016]  kasan_save_stack+0x39/0x60
[   44.816543]  kasan_set_track+0x25/0x40
[   44.817077]  kasan_save_free_info+0x2e/0x50
[   44.817604]  ____kasan_slab_free+0x175/0x1d0
[   44.818205]  __kasan_slab_free+0x12/0x20
[   44.818662]  __kmem_cache_free+0x188/0x2f0
[   44.819622]  kfree+0x78/0x120
[   44.820321]  x509_free_certificate.part.0+0x55/0x90
[   44.821060]  x509_free_certificate+0x13/0x20
[   44.821564]  x509_key_preparse+0x335/0x3b0
[   44.822239]  asymmetric_key_preparse+0x70/0xf0
[   44.823230]  key_create_or_update+0x329/0x7a0
[   44.823601]  regulatory_init_db+0x132/0x210
[   44.824427]  do_one_initcall+0xaf/0x310
[   44.825113]  kernel_init_freeable+0x2d2/0x337
[   44.825706]  kernel_init+0x1d/0x150
[   44.826317]  ret_from_fork+0x22/0x30
[   44.827347] 
[   44.827607] The buggy address belongs to the object at ffff8881032fe020
[   44.827607]  which belongs to the cache kmalloc-16 of size 16
[   44.828575] The buggy address is located 15 bytes to the right of
[   44.828575]  16-byte region [ffff8881032fe020, ffff8881032fe030)
[   44.829810] 
[   44.830104] The buggy address belongs to the physical page:
[   44.830724] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   44.832238] flags: 0x200000000000200(slab|node=0|zone=2)
[   44.833005] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   44.833751] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   44.834719] page dumped because: kasan: bad access detected
[   44.835260] 
[   44.835487] Memory state around the buggy address:
[   44.836035]  ffff8881032fdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.836664]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.838211] >ffff8881032fe000: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   44.839680]                                         ^
[   44.840634]  ffff8881032fe080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.841297]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.842608] ==================================================================

test log snippet test parser 72

Home

[   45.986329] ==================================================================
[   45.987639] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd9/0x1d0
[   45.988399] Write of size 2 at addr ffff8881032b8077 by task kunit_try_catch/242
[   45.989591] 
[   45.990105] CPU: 1 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.991190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.992355] Call Trace:
[   45.992836]  <TASK>
[   45.993155]  dump_stack_lvl+0x49/0x62
[   45.994242]  print_report+0x189/0x4b1
[   45.994813]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.995642]  kasan_report+0xde/0x160
[   45.996213]  ? kmalloc_oob_memset_2+0xd9/0x1d0
[   45.996929]  ? kmalloc_oob_memset_2+0xd9/0x1d0
[   45.997518]  kasan_check_range+0x10b/0x1c0
[   45.998328]  memset+0x23/0x50
[   45.998774]  kmalloc_oob_memset_2+0xd9/0x1d0
[   45.999484]  ? kmalloc_oob_memset_4+0x1d0/0x1d0
[   46.000179]  ? __kunit_add_resource+0xd1/0x100
[   46.000673]  kunit_try_run_case+0x8f/0xd0
[   46.001406]  ? kunit_catch_run_case+0x80/0x80
[   46.002325]  ? kunit_try_catch_throw+0x40/0x40
[   46.003000]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.003916]  kthread+0x17b/0x1b0
[   46.004602]  ? kthread_complete_and_exit+0x30/0x30
[   46.005277]  ret_from_fork+0x22/0x30
[   46.005883]  </TASK>
[   46.006201] 
[   46.006391] Allocated by task 242:
[   46.007277]  kasan_save_stack+0x39/0x60
[   46.008109]  kasan_set_track+0x25/0x40
[   46.008915]  kasan_save_alloc_info+0x1e/0x30
[   46.009707]  __kasan_kmalloc+0xb6/0xc0
[   46.010488]  kmalloc_trace+0x48/0xb0
[   46.011135]  kmalloc_oob_memset_2+0x9b/0x1d0
[   46.011659]  kunit_try_run_case+0x8f/0xd0
[   46.012179]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.013069]  kthread+0x17b/0x1b0
[   46.013500]  ret_from_fork+0x22/0x30
[   46.014092] 
[   46.014396] The buggy address belongs to the object at ffff8881032b8000
[   46.014396]  which belongs to the cache kmalloc-128 of size 128
[   46.015856] The buggy address is located 119 bytes inside of
[   46.015856]  128-byte region [ffff8881032b8000, ffff8881032b8080)
[   46.017516] 
[   46.018353] The buggy address belongs to the physical page:
[   46.019122] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b8
[   46.020071] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.021086] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   46.022165] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.023022] page dumped because: kasan: bad access detected
[   46.023713] 
[   46.024108] Memory state around the buggy address:
[   46.024698]  ffff8881032b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.025784]  ffff8881032b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.026787] >ffff8881032b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   46.027693]                                                                 ^
[   46.028566]  ffff8881032b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.029466]  ffff8881032b8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.030462] ==================================================================

test log snippet test parser 73

Home

[   46.036987] ==================================================================
[   46.038034] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd9/0x1d0
[   46.038822] Write of size 4 at addr ffff8881032b8175 by task kunit_try_catch/243
[   46.039564] 
[   46.040069] CPU: 1 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.041067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.041881] Call Trace:
[   46.042214]  <TASK>
[   46.042554]  dump_stack_lvl+0x49/0x62
[   46.043086]  print_report+0x189/0x4b1
[   46.043890]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.044469]  kasan_report+0xde/0x160
[   46.044974]  ? kmalloc_oob_memset_4+0xd9/0x1d0
[   46.045584]  ? kmalloc_oob_memset_4+0xd9/0x1d0
[   46.046175]  kasan_check_range+0x10b/0x1c0
[   46.046685]  memset+0x23/0x50
[   46.047248]  kmalloc_oob_memset_4+0xd9/0x1d0
[   46.047818]  ? kmalloc_oob_memset_8+0x1d0/0x1d0
[   46.048517]  ? __kunit_add_resource+0xd1/0x100
[   46.049307]  kunit_try_run_case+0x8f/0xd0
[   46.049891]  ? kunit_catch_run_case+0x80/0x80
[   46.050526]  ? kunit_try_catch_throw+0x40/0x40
[   46.051107]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.051776]  kthread+0x17b/0x1b0
[   46.052245]  ? kthread_complete_and_exit+0x30/0x30
[   46.052860]  ret_from_fork+0x22/0x30
[   46.053534]  </TASK>
[   46.053892] 
[   46.054211] Allocated by task 243:
[   46.054710]  kasan_save_stack+0x39/0x60
[   46.055288]  kasan_set_track+0x25/0x40
[   46.055953]  kasan_save_alloc_info+0x1e/0x30
[   46.056511]  __kasan_kmalloc+0xb6/0xc0
[   46.057135]  kmalloc_trace+0x48/0xb0
[   46.057675]  kmalloc_oob_memset_4+0x9b/0x1d0
[   46.058188]  kunit_try_run_case+0x8f/0xd0
[   46.058867]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.059579]  kthread+0x17b/0x1b0
[   46.060067]  ret_from_fork+0x22/0x30
[   46.060681] 
[   46.061122] The buggy address belongs to the object at ffff8881032b8100
[   46.061122]  which belongs to the cache kmalloc-128 of size 128
[   46.062379] The buggy address is located 117 bytes inside of
[   46.062379]  128-byte region [ffff8881032b8100, ffff8881032b8180)
[   46.063416] 
[   46.063635] The buggy address belongs to the physical page:
[   46.064367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b8
[   46.065338] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.066129] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   46.066957] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.067719] page dumped because: kasan: bad access detected
[   46.068309] 
[   46.068668] Memory state around the buggy address:
[   46.069176]  ffff8881032b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.070002]  ffff8881032b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.070733] >ffff8881032b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   46.071613]                                                                 ^
[   46.072269]  ffff8881032b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.073079]  ffff8881032b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.073854] ==================================================================
---
[   46.080561] ==================================================================
[   46.081679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd9/0x1d0
[   46.082815] Write of size 8 at addr ffff8881032b8271 by task kunit_try_catch/244
[   46.083670] 
[   46.084008] CPU: 1 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.084835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.086032] Call Trace:
[   46.086372]  <TASK>
[   46.086678]  dump_stack_lvl+0x49/0x62
[   46.087261]  print_report+0x189/0x4b1
[   46.087991]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.088537]  kasan_report+0xde/0x160
[   46.089137]  ? kmalloc_oob_memset_8+0xd9/0x1d0
[   46.089973]  ? kmalloc_oob_memset_8+0xd9/0x1d0
[   46.090636]  kasan_check_range+0x10b/0x1c0
[   46.091194]  memset+0x23/0x50
[   46.091583]  kmalloc_oob_memset_8+0xd9/0x1d0
[   46.092081]  ? kmalloc_oob_memset_16+0x1d0/0x1d0
[   46.092575]  ? __kunit_add_resource+0xd1/0x100
[   46.093621]  kunit_try_run_case+0x8f/0xd0
[   46.094246]  ? kunit_catch_run_case+0x80/0x80
[   46.094838]  ? kunit_try_catch_throw+0x40/0x40
[   46.095402]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.096082]  kthread+0x17b/0x1b0
[   46.096561]  ? kthread_complete_and_exit+0x30/0x30
[   46.097244]  ret_from_fork+0x22/0x30
[   46.097866]  </TASK>
[   46.098330] 
[   46.098672] Allocated by task 244:
[   46.099176]  kasan_save_stack+0x39/0x60
[   46.099769]  kasan_set_track+0x25/0x40
[   46.100331]  kasan_save_alloc_info+0x1e/0x30
[   46.100906]  __kasan_kmalloc+0xb6/0xc0
[   46.101517]  kmalloc_trace+0x48/0xb0
[   46.102066]  kmalloc_oob_memset_8+0x9b/0x1d0
[   46.102646]  kunit_try_run_case+0x8f/0xd0
[   46.103235]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.103989]  kthread+0x17b/0x1b0
[   46.104489]  ret_from_fork+0x22/0x30
[   46.104985] 
[   46.105291] The buggy address belongs to the object at ffff8881032b8200
[   46.105291]  which belongs to the cache kmalloc-128 of size 128
[   46.106597] The buggy address is located 113 bytes inside of
[   46.106597]  128-byte region [ffff8881032b8200, ffff8881032b8280)
[   46.107662] 
[   46.108036] The buggy address belongs to the physical page:
[   46.108656] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b8
[   46.109631] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.110362] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   46.111216] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.112054] page dumped because: kasan: bad access detected
[   46.112666] 
[   46.112981] Memory state around the buggy address:
[   46.113974]  ffff8881032b8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.114620]  ffff8881032b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.115399] >ffff8881032b8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   46.116119]                                                                 ^
[   46.116885]  ffff8881032b8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.117717]  ffff8881032b8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.118384] ==================================================================

test log snippet test parser 74

Home

[   46.124214] ==================================================================
[   46.125326] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd9/0x1d0
[   46.126047] Write of size 16 at addr ffff8881032b8369 by task kunit_try_catch/245
[   46.126717] 
[   46.127112] CPU: 1 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.128377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.129251] Call Trace:
[   46.129668]  <TASK>
[   46.130013]  dump_stack_lvl+0x49/0x62
[   46.130560]  print_report+0x189/0x4b1
[   46.131107]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.131700]  kasan_report+0xde/0x160
[   46.132313]  ? kmalloc_oob_memset_16+0xd9/0x1d0
[   46.132908]  ? kmalloc_oob_memset_16+0xd9/0x1d0
[   46.133610]  kasan_check_range+0x10b/0x1c0
[   46.134482]  memset+0x23/0x50
[   46.135315]  kmalloc_oob_memset_16+0xd9/0x1d0
[   46.136370]  ? kmalloc_uaf_memset+0x1c0/0x1c0
[   46.137187]  ? kmalloc_uaf_memset+0x1c0/0x1c0
[   46.137928]  ? kunit_try_run_case+0x84/0xd0
[   46.138434]  ? __kunit_add_resource+0xd1/0x100
[   46.138953]  kunit_try_run_case+0x8f/0xd0
[   46.139513]  ? kunit_catch_run_case+0x80/0x80
[   46.140130]  ? kunit_try_catch_throw+0x40/0x40
[   46.140715]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.141358]  kthread+0x17b/0x1b0
[   46.141812]  ? kthread_complete_and_exit+0x30/0x30
[   46.142361]  ret_from_fork+0x22/0x30
[   46.142921]  </TASK>
[   46.143310] 
[   46.143625] Allocated by task 245:
[   46.144042]  kasan_save_stack+0x39/0x60
[   46.144521]  kasan_set_track+0x25/0x40
[   46.145137]  kasan_save_alloc_info+0x1e/0x30
[   46.145743]  __kasan_kmalloc+0xb6/0xc0
[   46.146297]  kmalloc_trace+0x48/0xb0
[   46.146784]  kmalloc_oob_memset_16+0x9b/0x1d0
[   46.147301]  kunit_try_run_case+0x8f/0xd0
[   46.147977]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.148668]  kthread+0x17b/0x1b0
[   46.149113]  ret_from_fork+0x22/0x30
[   46.149691] 
[   46.149996] The buggy address belongs to the object at ffff8881032b8300
[   46.149996]  which belongs to the cache kmalloc-128 of size 128
[   46.151151] The buggy address is located 105 bytes inside of
[   46.151151]  128-byte region [ffff8881032b8300, ffff8881032b8380)
[   46.152188] 
[   46.152502] The buggy address belongs to the physical page:
[   46.153057] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b8
[   46.154059] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.154804] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   46.155650] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.156695] page dumped because: kasan: bad access detected
[   46.157362] 
[   46.157647] Memory state around the buggy address:
[   46.158217]  ffff8881032b8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.158924]  ffff8881032b8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.159770] >ffff8881032b8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   46.160509]                                                                 ^
[   46.161162]  ffff8881032b8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.161787]  ffff8881032b8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.162589] ==================================================================

test log snippet test parser 75

Home

[   44.738323] ==================================================================
[   44.739340] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x132/0x310
[   44.740041] Read of size 1 at addr ffff8881032b5380 by task kunit_try_catch/225
[   44.741182] 
[   44.741838] CPU: 1 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.742745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.743445] Call Trace:
[   44.743888]  <TASK>
[   44.744265]  dump_stack_lvl+0x49/0x62
[   44.744846]  print_report+0x189/0x4b1
[   44.745334]  ? kasan_complete_mode_report_info+0x3c/0x200
[   44.746075]  kasan_report+0xde/0x160
[   44.746574]  ? kmalloc_oob_right+0x132/0x310
[   44.747413]  ? kmalloc_oob_right+0x132/0x310
[   44.747848]  __asan_load1+0x62/0x70
[   44.748238]  kmalloc_oob_right+0x132/0x310
[   44.748728]  ? kmalloc_oob_left+0x1e0/0x1e0
[   44.749502]  ? __kunit_add_resource+0xd1/0x100
[   44.750270]  kunit_try_run_case+0x8f/0xd0
[   44.750726]  ? kunit_catch_run_case+0x80/0x80
[   44.751517]  ? kunit_try_catch_throw+0x40/0x40
[   44.752087]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.752955]  kthread+0x17b/0x1b0
[   44.753564]  ? kthread_complete_and_exit+0x30/0x30
[   44.754089]  ret_from_fork+0x22/0x30
[   44.754600]  </TASK>
[   44.754976] 
[   44.755271] Allocated by task 225:
[   44.755740]  kasan_save_stack+0x39/0x60
[   44.756272]  kasan_set_track+0x25/0x40
[   44.757069]  kasan_save_alloc_info+0x1e/0x30
[   44.757534]  __kasan_kmalloc+0xb6/0xc0
[   44.758041]  kmalloc_trace+0x48/0xb0
[   44.758574]  kmalloc_oob_right+0x9b/0x310
[   44.759103]  kunit_try_run_case+0x8f/0xd0
[   44.759659]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.760377]  kthread+0x17b/0x1b0
[   44.760807]  ret_from_fork+0x22/0x30
[   44.761265] 
[   44.761514] The buggy address belongs to the object at ffff8881032b5300
[   44.761514]  which belongs to the cache kmalloc-128 of size 128
[   44.762617] The buggy address is located 0 bytes to the right of
[   44.762617]  128-byte region [ffff8881032b5300, ffff8881032b5380)
[   44.764345] 
[   44.764661] The buggy address belongs to the physical page:
[   44.765240] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b5
[   44.766102] flags: 0x200000000000200(slab|node=0|zone=2)
[   44.766995] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   44.768008] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.769002] page dumped because: kasan: bad access detected
[   44.769758] 
[   44.770009] Memory state around the buggy address:
[   44.770608]  ffff8881032b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.771301]  ffff8881032b5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   44.772024] >ffff8881032b5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.772837]                    ^
[   44.773307]  ffff8881032b5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.774135]  ffff8881032b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.774927] ==================================================================

test log snippet test parser 76

Home

[   44.654132] ==================================================================
[   44.655444] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcb/0x310
[   44.656738] Write of size 1 at addr ffff8881032b5373 by task kunit_try_catch/225
[   44.657505] 
[   44.658595] CPU: 1 PID: 225 Comm: kunit_try_catch Tainted: G                 N 6.1.125-rc1 #1
[   44.659883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.661335] Call Trace:
[   44.661912]  <TASK>
[   44.662585]  dump_stack_lvl+0x49/0x62
[   44.663228]  print_report+0x189/0x4b1
[   44.663696]  ? kasan_complete_mode_report_info+0x3c/0x200
[   44.664296]  kasan_report+0xde/0x160
[   44.664903]  ? kmalloc_oob_right+0xcb/0x310
[   44.665552]  ? kmalloc_oob_right+0xcb/0x310
[   44.666157]  __asan_store1+0x65/0x70
[   44.666723]  kmalloc_oob_right+0xcb/0x310
[   44.667273]  ? kmalloc_oob_left+0x1e0/0x1e0
[   44.667970]  ? __kunit_add_resource+0xd1/0x100
[   44.668544]  kunit_try_run_case+0x8f/0xd0
[   44.669109]  ? kunit_catch_run_case+0x80/0x80
[   44.669657]  ? kunit_try_catch_throw+0x40/0x40
[   44.670299]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.670987]  kthread+0x17b/0x1b0
[   44.671401]  ? kthread_complete_and_exit+0x30/0x30
[   44.672105]  ret_from_fork+0x22/0x30
[   44.672758]  </TASK>
[   44.673229] 
[   44.673582] Allocated by task 225:
[   44.674257]  kasan_save_stack+0x39/0x60
[   44.674830]  kasan_set_track+0x25/0x40
[   44.675344]  kasan_save_alloc_info+0x1e/0x30
[   44.675995]  __kasan_kmalloc+0xb6/0xc0
[   44.676530]  kmalloc_trace+0x48/0xb0
[   44.676998]  kmalloc_oob_right+0x9b/0x310
[   44.677500]  kunit_try_run_case+0x8f/0xd0
[   44.678084]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.678706]  kthread+0x17b/0x1b0
[   44.679248]  ret_from_fork+0x22/0x30
[   44.679874] 
[   44.680250] The buggy address belongs to the object at ffff8881032b5300
[   44.680250]  which belongs to the cache kmalloc-128 of size 128
[   44.681590] The buggy address is located 115 bytes inside of
[   44.681590]  128-byte region [ffff8881032b5300, ffff8881032b5380)
[   44.682605] 
[   44.683068] The buggy address belongs to the physical page:
[   44.684162] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b5
[   44.685431] flags: 0x200000000000200(slab|node=0|zone=2)
[   44.687044] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   44.688358] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.689491] page dumped because: kasan: bad access detected
[   44.690231] 
[   44.690508] Memory state around the buggy address:
[   44.691530]  ffff8881032b5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.692418]  ffff8881032b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.693183] >ffff8881032b5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   44.693955]                                                              ^
[   44.694780]  ffff8881032b5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.695513]  ffff8881032b5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.696273] ==================================================================

test log snippet test parser 77

Home

[   44.699014] ==================================================================
[   44.699724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xfd/0x310
[   44.700491] Write of size 1 at addr ffff8881032b5378 by task kunit_try_catch/225
[   44.701100] 
[   44.701387] CPU: 1 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.702643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.703841] Call Trace:
[   44.704143]  <TASK>
[   44.704544]  dump_stack_lvl+0x49/0x62
[   44.705419]  print_report+0x189/0x4b1
[   44.705884]  ? kasan_complete_mode_report_info+0x3c/0x200
[   44.706570]  kasan_report+0xde/0x160
[   44.707294]  ? kmalloc_oob_right+0xfd/0x310
[   44.707881]  ? kmalloc_oob_right+0xfd/0x310
[   44.708536]  __asan_store1+0x65/0x70
[   44.709120]  kmalloc_oob_right+0xfd/0x310
[   44.709503]  ? kmalloc_oob_left+0x1e0/0x1e0
[   44.710152]  ? __kunit_add_resource+0xd1/0x100
[   44.710701]  kunit_try_run_case+0x8f/0xd0
[   44.711256]  ? kunit_catch_run_case+0x80/0x80
[   44.711814]  ? kunit_try_catch_throw+0x40/0x40
[   44.712674]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.713315]  kthread+0x17b/0x1b0
[   44.713783]  ? kthread_complete_and_exit+0x30/0x30
[   44.714419]  ret_from_fork+0x22/0x30
[   44.715114]  </TASK>
[   44.715536] 
[   44.716028] Allocated by task 225:
[   44.716405]  kasan_save_stack+0x39/0x60
[   44.717120]  kasan_set_track+0x25/0x40
[   44.717497]  kasan_save_alloc_info+0x1e/0x30
[   44.718325]  __kasan_kmalloc+0xb6/0xc0
[   44.718962]  kmalloc_trace+0x48/0xb0
[   44.719456]  kmalloc_oob_right+0x9b/0x310
[   44.720188]  kunit_try_run_case+0x8f/0xd0
[   44.720665]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.721254]  kthread+0x17b/0x1b0
[   44.721643]  ret_from_fork+0x22/0x30
[   44.722208] 
[   44.722496] The buggy address belongs to the object at ffff8881032b5300
[   44.722496]  which belongs to the cache kmalloc-128 of size 128
[   44.723699] The buggy address is located 120 bytes inside of
[   44.723699]  128-byte region [ffff8881032b5300, ffff8881032b5380)
[   44.725185] 
[   44.725549] The buggy address belongs to the physical page:
[   44.726134] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b5
[   44.727257] flags: 0x200000000000200(slab|node=0|zone=2)
[   44.728138] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   44.729042] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.729964] page dumped because: kasan: bad access detected
[   44.730730] 
[   44.731053] Memory state around the buggy address:
[   44.731770]  ffff8881032b5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.732609]  ffff8881032b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.733391] >ffff8881032b5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   44.734891]                                                                 ^
[   44.735743]  ffff8881032b5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.736374]  ffff8881032b5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.737337] ==================================================================

test log snippet test parser 78

Home

[   44.902371] ==================================================================
[   44.903966] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xad/0x1c0
[   44.904920] Write of size 1 at addr ffff8881036c200a by task kunit_try_catch/228
[   44.905598] 
[   44.905865] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.906803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.907773] Call Trace:
[   44.908293]  <TASK>
[   44.908770]  dump_stack_lvl+0x49/0x62
[   44.909405]  print_report+0x189/0x4b1
[   44.910059]  ? kasan_addr_to_slab+0xd/0xb0
[   44.910801]  kasan_report+0xde/0x160
[   44.911332]  ? kmalloc_pagealloc_oob_right+0xad/0x1c0
[   44.912084]  ? kmalloc_pagealloc_oob_right+0xad/0x1c0
[   44.912676]  __asan_store1+0x65/0x70
[   44.913169]  kmalloc_pagealloc_oob_right+0xad/0x1c0
[   44.913927]  ? kmalloc_pagealloc_uaf+0x1a0/0x1a0
[   44.914471]  ? __kunit_add_resource+0xd1/0x100
[   44.915060]  ? kasan_test_init+0x13e/0x1b0
[   44.915706]  kunit_try_run_case+0x8f/0xd0
[   44.916193]  ? kunit_catch_run_case+0x80/0x80
[   44.916887]  ? kunit_try_catch_throw+0x40/0x40
[   44.917457]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.918322]  kthread+0x17b/0x1b0
[   44.918854]  ? kthread_complete_and_exit+0x30/0x30
[   44.919475]  ret_from_fork+0x22/0x30
[   44.920065]  </TASK>
[   44.920466] 
[   44.921198] The buggy address belongs to the physical page:
[   44.922068] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036c0
[   44.922989] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   44.923708] flags: 0x200000000010000(head|node=0|zone=2)
[   44.924423] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   44.925456] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.926227] page dumped because: kasan: bad access detected
[   44.926985] 
[   44.927457] Memory state around the buggy address:
[   44.928028]  ffff8881036c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.928783]  ffff8881036c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.929358] >ffff8881036c2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.930310]                       ^
[   44.930990]  ffff8881036c2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.931691]  ffff8881036c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.932711] ==================================================================

test log snippet test parser 79

Home

[   46.434627] ==================================================================
[   46.436143] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xe4/0x210
[   46.437014] Read of size 1 at addr ffff8881032bb0c8 by task kunit_try_catch/254
[   46.438116] 
[   46.438408] CPU: 1 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.439247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.440119] Call Trace:
[   46.440555]  <TASK>
[   46.441012]  dump_stack_lvl+0x49/0x62
[   46.441638]  print_report+0x189/0x4b1
[   46.442374]  ? kasan_complete_mode_report_info+0x3c/0x200
[   46.443093]  kasan_report+0xde/0x160
[   46.443554]  ? kmem_cache_oob+0xe4/0x210
[   46.444022]  ? kmem_cache_oob+0xe4/0x210
[   46.444678]  __asan_load1+0x62/0x70
[   46.445213]  kmem_cache_oob+0xe4/0x210
[   46.445805]  ? kmem_cache_double_free+0x1e0/0x1e0
[   46.446340]  ? __kunit_add_resource+0xd1/0x100
[   46.446736]  kunit_try_run_case+0x8f/0xd0
[   46.447119]  ? kunit_catch_run_case+0x80/0x80
[   46.448308]  ? kunit_try_catch_throw+0x40/0x40
[   46.448932]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.449550]  kthread+0x17b/0x1b0
[   46.450007]  ? kthread_complete_and_exit+0x30/0x30
[   46.450653]  ret_from_fork+0x22/0x30
[   46.451145]  </TASK>
[   46.451753] 
[   46.452091] Allocated by task 254:
[   46.452457]  kasan_save_stack+0x39/0x60
[   46.452852]  kasan_set_track+0x25/0x40
[   46.453203]  kasan_save_alloc_info+0x1e/0x30
[   46.453816]  __kasan_slab_alloc+0x90/0xa0
[   46.454492]  kmem_cache_alloc+0x14a/0x370
[   46.455327]  kmem_cache_oob+0xbd/0x210
[   46.456216]  kunit_try_run_case+0x8f/0xd0
[   46.456915]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.457623]  kthread+0x17b/0x1b0
[   46.458045]  ret_from_fork+0x22/0x30
[   46.458451] 
[   46.458704] The buggy address belongs to the object at ffff8881032bb000
[   46.458704]  which belongs to the cache test_cache of size 200
[   46.460032] The buggy address is located 0 bytes to the right of
[   46.460032]  200-byte region [ffff8881032bb000, ffff8881032bb0c8)
[   46.461214] 
[   46.461523] The buggy address belongs to the physical page:
[   46.462093] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032bb
[   46.463264] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.464001] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881032a3140
[   46.464990] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   46.465753] page dumped because: kasan: bad access detected
[   46.466343] 
[   46.466639] Memory state around the buggy address:
[   46.467250]  ffff8881032baf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.468045]  ffff8881032bb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.468826] >ffff8881032bb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   46.469622]                                               ^
[   46.470235]  ffff8881032bb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.471121]  ffff8881032bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.471929] ==================================================================

test log snippet test parser 80

Home

[   45.600554] ==================================================================
[   45.601345] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1f3/0x620
[   45.602309] Write of size 1 at addr ffff8881036ea0da by task kunit_try_catch/237
[   45.603007] 
[   45.603350] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.604491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.605558] Call Trace:
[   45.605969]  <TASK>
[   45.606334]  dump_stack_lvl+0x49/0x62
[   45.606972]  print_report+0x189/0x4b1
[   45.607560]  ? kasan_addr_to_slab+0xd/0xb0
[   45.608164]  kasan_report+0xde/0x160
[   45.608537]  ? krealloc_less_oob_helper+0x1f3/0x620
[   45.609159]  ? krealloc_less_oob_helper+0x1f3/0x620
[   45.609974]  __asan_store1+0x65/0x70
[   45.610477]  krealloc_less_oob_helper+0x1f3/0x620
[   45.611236]  ? krealloc_uaf+0x2e0/0x2e0
[   45.611725]  ? __kunit_add_resource+0xd1/0x100
[   45.612237]  ? preempt_count_sub+0x4c/0x70
[   45.612926]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.613615]  ? __kunit_add_resource+0xd1/0x100
[   45.614806]  krealloc_pagealloc_less_oob+0x18/0x20
[   45.615424]  kunit_try_run_case+0x8f/0xd0
[   45.615990]  ? kunit_catch_run_case+0x80/0x80
[   45.616600]  ? kunit_try_catch_throw+0x40/0x40
[   45.617133]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.617912]  kthread+0x17b/0x1b0
[   45.618370]  ? kthread_complete_and_exit+0x30/0x30
[   45.619011]  ret_from_fork+0x22/0x30
[   45.619432]  </TASK>
[   45.619792] 
[   45.620144] The buggy address belongs to the physical page:
[   45.620735] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.621681] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.622334] flags: 0x200000000010000(head|node=0|zone=2)
[   45.623041] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.623777] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.624756] page dumped because: kasan: bad access detected
[   45.625320] 
[   45.625565] Memory state around the buggy address:
[   45.626106]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.626986]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.627633] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   45.628267]                                                     ^
[   45.629110]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.629910]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.630956] ==================================================================

test log snippet test parser 81

Home

[   45.286649] ==================================================================
[   45.287442] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1f3/0x620
[   45.288490] Write of size 1 at addr ffff88810091fada by task kunit_try_catch/235
[   45.290719] 
[   45.291058] CPU: 1 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.291873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.292847] Call Trace:
[   45.293492]  <TASK>
[   45.293826]  dump_stack_lvl+0x49/0x62
[   45.295009]  print_report+0x189/0x4b1
[   45.295641]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.296379]  kasan_report+0xde/0x160
[   45.297164]  ? krealloc_less_oob_helper+0x1f3/0x620
[   45.297876]  ? krealloc_less_oob_helper+0x1f3/0x620
[   45.298508]  __asan_store1+0x65/0x70
[   45.299035]  krealloc_less_oob_helper+0x1f3/0x620
[   45.299620]  ? krealloc_uaf+0x2e0/0x2e0
[   45.300725]  ? __kunit_add_resource+0xd1/0x100
[   45.301470]  ? preempt_count_sub+0x4c/0x70
[   45.302060]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.303107]  ? __kunit_add_resource+0xd1/0x100
[   45.303934]  krealloc_less_oob+0x18/0x20
[   45.304653]  kunit_try_run_case+0x8f/0xd0
[   45.305384]  ? kunit_catch_run_case+0x80/0x80
[   45.305994]  ? kunit_try_catch_throw+0x40/0x40
[   45.306561]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.307484]  kthread+0x17b/0x1b0
[   45.307861]  ? kthread_complete_and_exit+0x30/0x30
[   45.308975]  ret_from_fork+0x22/0x30
[   45.309517]  </TASK>
[   45.310096] 
[   45.310386] Allocated by task 235:
[   45.311344]  kasan_save_stack+0x39/0x60
[   45.312283]  kasan_set_track+0x25/0x40
[   45.312795]  kasan_save_alloc_info+0x1e/0x30
[   45.313406]  __kasan_krealloc+0x12e/0x180
[   45.314030]  krealloc+0xae/0x140
[   45.314354]  krealloc_less_oob_helper+0xe8/0x620
[   45.315223]  krealloc_less_oob+0x18/0x20
[   45.315792]  kunit_try_run_case+0x8f/0xd0
[   45.317063]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.317671]  kthread+0x17b/0x1b0
[   45.318420]  ret_from_fork+0x22/0x30
[   45.319263] 
[   45.319479] The buggy address belongs to the object at ffff88810091fa00
[   45.319479]  which belongs to the cache kmalloc-256 of size 256
[   45.320422] The buggy address is located 218 bytes inside of
[   45.320422]  256-byte region [ffff88810091fa00, ffff88810091fb00)
[   45.322050] 
[   45.323133] The buggy address belongs to the physical page:
[   45.324311] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   45.325361] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.326889] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.327848] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.328707] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.329670] page dumped because: kasan: bad access detected
[   45.330512] 
[   45.330766] Memory state around the buggy address:
[   45.331278]  ffff88810091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.332826]  ffff88810091fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.333559] >ffff88810091fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   45.334492]                                                     ^
[   45.335116]  ffff88810091fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.336278]  ffff88810091fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.337052] ==================================================================

test log snippet test parser 82

Home

[   45.192431] ==================================================================
[   45.193126] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x141/0x620
[   45.193859] Write of size 1 at addr ffff88810091fac9 by task kunit_try_catch/235
[   45.195119] 
[   45.195569] CPU: 1 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.196897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.198015] Call Trace:
[   45.198597]  <TASK>
[   45.199321]  dump_stack_lvl+0x49/0x62
[   45.200285]  print_report+0x189/0x4b1
[   45.200929]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.202089]  kasan_report+0xde/0x160
[   45.202459]  ? krealloc_less_oob_helper+0x141/0x620
[   45.202981]  ? krealloc_less_oob_helper+0x141/0x620
[   45.203610]  __asan_store1+0x65/0x70
[   45.204487]  krealloc_less_oob_helper+0x141/0x620
[   45.205353]  ? krealloc_uaf+0x2e0/0x2e0
[   45.206011]  ? __kunit_add_resource+0xd1/0x100
[   45.206598]  ? preempt_count_sub+0x4c/0x70
[   45.207088]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.207354]  ? __kunit_add_resource+0xd1/0x100
[   45.207593]  krealloc_less_oob+0x18/0x20
[   45.207842]  kunit_try_run_case+0x8f/0xd0
[   45.208284]  ? kunit_catch_run_case+0x80/0x80
[   45.208824]  ? kunit_try_catch_throw+0x40/0x40
[   45.209500]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.210708]  kthread+0x17b/0x1b0
[   45.211399]  ? kthread_complete_and_exit+0x30/0x30
[   45.212052]  ret_from_fork+0x22/0x30
[   45.212880]  </TASK>
[   45.213426] 
[   45.214146] Allocated by task 235:
[   45.214528]  kasan_save_stack+0x39/0x60
[   45.214912]  kasan_set_track+0x25/0x40
[   45.215428]  kasan_save_alloc_info+0x1e/0x30
[   45.215901]  __kasan_krealloc+0x12e/0x180
[   45.216462]  krealloc+0xae/0x140
[   45.217119]  krealloc_less_oob_helper+0xe8/0x620
[   45.217768]  krealloc_less_oob+0x18/0x20
[   45.218342]  kunit_try_run_case+0x8f/0xd0
[   45.219392]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.220132]  kthread+0x17b/0x1b0
[   45.220577]  ret_from_fork+0x22/0x30
[   45.221012] 
[   45.221312] The buggy address belongs to the object at ffff88810091fa00
[   45.221312]  which belongs to the cache kmalloc-256 of size 256
[   45.222309] The buggy address is located 201 bytes inside of
[   45.222309]  256-byte region [ffff88810091fa00, ffff88810091fb00)
[   45.223704] 
[   45.224029] The buggy address belongs to the physical page:
[   45.224514] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   45.225436] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.226606] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.227664] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.228593] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.229295] page dumped because: kasan: bad access detected
[   45.229845] 
[   45.230396] Memory state around the buggy address:
[   45.231056]  ffff88810091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.231965]  ffff88810091fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.232595] >ffff88810091fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   45.233569]                                               ^
[   45.234061]  ffff88810091fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.235033]  ffff88810091fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.235710] ==================================================================

test log snippet test parser 83

Home

[   45.667108] ==================================================================
[   45.668078] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x25e/0x620
[   45.669386] Write of size 1 at addr ffff8881036ea0eb by task kunit_try_catch/237
[   45.670353] 
[   45.670710] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.671590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.672775] Call Trace:
[   45.673769]  <TASK>
[   45.674307]  dump_stack_lvl+0x49/0x62
[   45.675144]  print_report+0x189/0x4b1
[   45.675724]  ? kasan_addr_to_slab+0xd/0xb0
[   45.676282]  kasan_report+0xde/0x160
[   45.677137]  ? krealloc_less_oob_helper+0x25e/0x620
[   45.678159]  ? krealloc_less_oob_helper+0x25e/0x620
[   45.679155]  __asan_store1+0x65/0x70
[   45.679964]  krealloc_less_oob_helper+0x25e/0x620
[   45.680922]  ? krealloc_uaf+0x2e0/0x2e0
[   45.682011]  ? __kunit_add_resource+0xd1/0x100
[   45.682716]  ? preempt_count_sub+0x4c/0x70
[   45.683216]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.683909]  ? __kunit_add_resource+0xd1/0x100
[   45.684581]  krealloc_pagealloc_less_oob+0x18/0x20
[   45.685258]  kunit_try_run_case+0x8f/0xd0
[   45.685784]  ? kunit_catch_run_case+0x80/0x80
[   45.686274]  ? kunit_try_catch_throw+0x40/0x40
[   45.686796]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.687977]  kthread+0x17b/0x1b0
[   45.688678]  ? kthread_complete_and_exit+0x30/0x30
[   45.689453]  ret_from_fork+0x22/0x30
[   45.690288]  </TASK>
[   45.690547] 
[   45.690821] The buggy address belongs to the physical page:
[   45.691565] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.692543] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.693510] flags: 0x200000000010000(head|node=0|zone=2)
[   45.694406] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.695319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.696229] page dumped because: kasan: bad access detected
[   45.697225] 
[   45.697980] Memory state around the buggy address:
[   45.698600]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.699363]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.700263] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   45.701116]                                                           ^
[   45.701712]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.702789]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.703503] ==================================================================

test log snippet test parser 84

Home

[   45.633301] ==================================================================
[   45.633815] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x229/0x620
[   45.634694] Write of size 1 at addr ffff8881036ea0ea by task kunit_try_catch/237
[   45.635498] 
[   45.635819] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.636831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.638697] Call Trace:
[   45.639085]  <TASK>
[   45.639482]  dump_stack_lvl+0x49/0x62
[   45.640293]  print_report+0x189/0x4b1
[   45.640834]  ? kasan_addr_to_slab+0xd/0xb0
[   45.641334]  kasan_report+0xde/0x160
[   45.642011]  ? krealloc_less_oob_helper+0x229/0x620
[   45.642694]  ? krealloc_less_oob_helper+0x229/0x620
[   45.643377]  __asan_store1+0x65/0x70
[   45.644028]  krealloc_less_oob_helper+0x229/0x620
[   45.644692]  ? krealloc_uaf+0x2e0/0x2e0
[   45.645167]  ? __kunit_add_resource+0xd1/0x100
[   45.645605]  ? preempt_count_sub+0x4c/0x70
[   45.646258]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.647135]  ? __kunit_add_resource+0xd1/0x100
[   45.647860]  krealloc_pagealloc_less_oob+0x18/0x20
[   45.648691]  kunit_try_run_case+0x8f/0xd0
[   45.649325]  ? kunit_catch_run_case+0x80/0x80
[   45.649883]  ? kunit_try_catch_throw+0x40/0x40
[   45.650418]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.650890]  kthread+0x17b/0x1b0
[   45.651327]  ? kthread_complete_and_exit+0x30/0x30
[   45.652159]  ret_from_fork+0x22/0x30
[   45.652884]  </TASK>
[   45.653256] 
[   45.653600] The buggy address belongs to the physical page:
[   45.654398] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.655556] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.656587] flags: 0x200000000010000(head|node=0|zone=2)
[   45.657183] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.658174] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.658773] page dumped because: kasan: bad access detected
[   45.659505] 
[   45.659843] Memory state around the buggy address:
[   45.660515]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.661491]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.662431] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   45.663353]                                                           ^
[   45.664320]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.665087]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.665574] ==================================================================

test log snippet test parser 85

Home

[   45.394574] ==================================================================
[   45.395563] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x25e/0x620
[   45.396409] Write of size 1 at addr ffff88810091faeb by task kunit_try_catch/235
[   45.397991] 
[   45.398309] CPU: 1 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.399174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.400114] Call Trace:
[   45.400525]  <TASK>
[   45.400976]  dump_stack_lvl+0x49/0x62
[   45.401388]  print_report+0x189/0x4b1
[   45.402321]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.403594]  kasan_report+0xde/0x160
[   45.404140]  ? krealloc_less_oob_helper+0x25e/0x620
[   45.405018]  ? krealloc_less_oob_helper+0x25e/0x620
[   45.405877]  __asan_store1+0x65/0x70
[   45.406582]  krealloc_less_oob_helper+0x25e/0x620
[   45.407451]  ? krealloc_uaf+0x2e0/0x2e0
[   45.408269]  ? __kunit_add_resource+0xd1/0x100
[   45.409129]  ? preempt_count_sub+0x4c/0x70
[   45.409915]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.410519]  ? __kunit_add_resource+0xd1/0x100
[   45.411565]  krealloc_less_oob+0x18/0x20
[   45.412209]  kunit_try_run_case+0x8f/0xd0
[   45.412927]  ? kunit_catch_run_case+0x80/0x80
[   45.413701]  ? kunit_try_catch_throw+0x40/0x40
[   45.414236]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.414813]  kthread+0x17b/0x1b0
[   45.416073]  ? kthread_complete_and_exit+0x30/0x30
[   45.416784]  ret_from_fork+0x22/0x30
[   45.417390]  </TASK>
[   45.417891] 
[   45.418553] Allocated by task 235:
[   45.419162]  kasan_save_stack+0x39/0x60
[   45.419857]  kasan_set_track+0x25/0x40
[   45.420372]  kasan_save_alloc_info+0x1e/0x30
[   45.421073]  __kasan_krealloc+0x12e/0x180
[   45.421613]  krealloc+0xae/0x140
[   45.422203]  krealloc_less_oob_helper+0xe8/0x620
[   45.422900]  krealloc_less_oob+0x18/0x20
[   45.423890]  kunit_try_run_case+0x8f/0xd0
[   45.424841]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.425501]  kthread+0x17b/0x1b0
[   45.426081]  ret_from_fork+0x22/0x30
[   45.426751] 
[   45.427033] The buggy address belongs to the object at ffff88810091fa00
[   45.427033]  which belongs to the cache kmalloc-256 of size 256
[   45.428915] The buggy address is located 235 bytes inside of
[   45.428915]  256-byte region [ffff88810091fa00, ffff88810091fb00)
[   45.430650] 
[   45.430897] The buggy address belongs to the physical page:
[   45.431809] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   45.433136] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.434301] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.434861] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.435559] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.436269] page dumped because: kasan: bad access detected
[   45.436816] 
[   45.437489] Memory state around the buggy address:
[   45.438117]  ffff88810091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.439003]  ffff88810091fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.439691] >ffff88810091fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   45.440701]                                                           ^
[   45.441570]  ffff88810091fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.442447]  ffff88810091fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.443402] ==================================================================

test log snippet test parser 86

Home

[   45.532166] ==================================================================
[   45.533290] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x141/0x620
[   45.534240] Write of size 1 at addr ffff8881036ea0c9 by task kunit_try_catch/237
[   45.535066] 
[   45.535371] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.536352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.537305] Call Trace:
[   45.537702]  <TASK>
[   45.538109]  dump_stack_lvl+0x49/0x62
[   45.538743]  print_report+0x189/0x4b1
[   45.539302]  ? kasan_addr_to_slab+0xd/0xb0
[   45.540034]  kasan_report+0xde/0x160
[   45.540633]  ? krealloc_less_oob_helper+0x141/0x620
[   45.541333]  ? krealloc_less_oob_helper+0x141/0x620
[   45.542088]  __asan_store1+0x65/0x70
[   45.542648]  krealloc_less_oob_helper+0x141/0x620
[   45.543258]  ? krealloc_uaf+0x2e0/0x2e0
[   45.543879]  ? __kunit_add_resource+0xd1/0x100
[   45.544539]  ? preempt_count_sub+0x4c/0x70
[   45.545119]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.545785]  ? __kunit_add_resource+0xd1/0x100
[   45.546422]  krealloc_pagealloc_less_oob+0x18/0x20
[   45.547108]  kunit_try_run_case+0x8f/0xd0
[   45.547696]  ? kunit_catch_run_case+0x80/0x80
[   45.548287]  ? kunit_try_catch_throw+0x40/0x40
[   45.548904]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.549616]  kthread+0x17b/0x1b0
[   45.550299]  ? kthread_complete_and_exit+0x30/0x30
[   45.550736]  ret_from_fork+0x22/0x30
[   45.551118]  </TASK>
[   45.551702] 
[   45.552220] The buggy address belongs to the physical page:
[   45.553151] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.554123] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.554785] flags: 0x200000000010000(head|node=0|zone=2)
[   45.555622] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.556297] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.557271] page dumped because: kasan: bad access detected
[   45.557995] 
[   45.558263] Memory state around the buggy address:
[   45.558757]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.559865]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.560717] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   45.561559]                                               ^
[   45.562105]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.562996]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.563902] ==================================================================

test log snippet test parser 87

Home

[   45.338834] ==================================================================
[   45.339893] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x229/0x620
[   45.341007] Write of size 1 at addr ffff88810091faea by task kunit_try_catch/235
[   45.342154] 
[   45.342472] CPU: 1 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.344717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.346011] Call Trace:
[   45.346576]  <TASK>
[   45.346910]  dump_stack_lvl+0x49/0x62
[   45.347608]  print_report+0x189/0x4b1
[   45.348106]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.348757]  kasan_report+0xde/0x160
[   45.349249]  ? krealloc_less_oob_helper+0x229/0x620
[   45.350484]  ? krealloc_less_oob_helper+0x229/0x620
[   45.351213]  __asan_store1+0x65/0x70
[   45.352160]  krealloc_less_oob_helper+0x229/0x620
[   45.353143]  ? krealloc_uaf+0x2e0/0x2e0
[   45.353669]  ? __kunit_add_resource+0xd1/0x100
[   45.354709]  ? preempt_count_sub+0x4c/0x70
[   45.355317]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.356290]  ? __kunit_add_resource+0xd1/0x100
[   45.356964]  krealloc_less_oob+0x18/0x20
[   45.357702]  kunit_try_run_case+0x8f/0xd0
[   45.358292]  ? kunit_catch_run_case+0x80/0x80
[   45.359484]  ? kunit_try_catch_throw+0x40/0x40
[   45.360229]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.361185]  kthread+0x17b/0x1b0
[   45.362114]  ? kthread_complete_and_exit+0x30/0x30
[   45.362893]  ret_from_fork+0x22/0x30
[   45.363377]  </TASK>
[   45.363659] 
[   45.363924] Allocated by task 235:
[   45.364330]  kasan_save_stack+0x39/0x60
[   45.364778]  kasan_set_track+0x25/0x40
[   45.366215]  kasan_save_alloc_info+0x1e/0x30
[   45.367064]  __kasan_krealloc+0x12e/0x180
[   45.367882]  krealloc+0xae/0x140
[   45.368333]  krealloc_less_oob_helper+0xe8/0x620
[   45.369372]  krealloc_less_oob+0x18/0x20
[   45.370269]  kunit_try_run_case+0x8f/0xd0
[   45.371077]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.372448]  kthread+0x17b/0x1b0
[   45.373435]  ret_from_fork+0x22/0x30
[   45.374035] 
[   45.374435] The buggy address belongs to the object at ffff88810091fa00
[   45.374435]  which belongs to the cache kmalloc-256 of size 256
[   45.376437] The buggy address is located 234 bytes inside of
[   45.376437]  256-byte region [ffff88810091fa00, ffff88810091fb00)
[   45.377793] 
[   45.378285] The buggy address belongs to the physical page:
[   45.379305] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   45.380629] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.381769] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.382781] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.383722] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.384838] page dumped because: kasan: bad access detected
[   45.385878] 
[   45.386399] Memory state around the buggy address:
[   45.386858]  ffff88810091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.387792]  ffff88810091fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.388831] >ffff88810091fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   45.389580]                                                           ^
[   45.390339]  ffff88810091fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.391124]  ffff88810091fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.392260] ==================================================================

test log snippet test parser 88

Home

[   45.565744] ==================================================================
[   45.566558] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18d/0x620
[   45.568133] Write of size 1 at addr ffff8881036ea0d0 by task kunit_try_catch/237
[   45.569335] 
[   45.569691] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.570702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.572009] Call Trace:
[   45.572451]  <TASK>
[   45.572982]  dump_stack_lvl+0x49/0x62
[   45.573652]  print_report+0x189/0x4b1
[   45.574401]  ? kasan_addr_to_slab+0xd/0xb0
[   45.574993]  kasan_report+0xde/0x160
[   45.575572]  ? krealloc_less_oob_helper+0x18d/0x620
[   45.576299]  ? krealloc_less_oob_helper+0x18d/0x620
[   45.577072]  __asan_store1+0x65/0x70
[   45.577891]  krealloc_less_oob_helper+0x18d/0x620
[   45.578499]  ? krealloc_uaf+0x2e0/0x2e0
[   45.578954]  ? __kunit_add_resource+0xd1/0x100
[   45.579552]  ? preempt_count_sub+0x4c/0x70
[   45.580160]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.580912]  ? __kunit_add_resource+0xd1/0x100
[   45.581530]  krealloc_pagealloc_less_oob+0x18/0x20
[   45.582281]  kunit_try_run_case+0x8f/0xd0
[   45.582907]  ? kunit_catch_run_case+0x80/0x80
[   45.583500]  ? kunit_try_catch_throw+0x40/0x40
[   45.584120]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.584895]  kthread+0x17b/0x1b0
[   45.585514]  ? kthread_complete_and_exit+0x30/0x30
[   45.586194]  ret_from_fork+0x22/0x30
[   45.586755]  </TASK>
[   45.587089] 
[   45.587411] The buggy address belongs to the physical page:
[   45.588070] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.589097] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.589827] flags: 0x200000000010000(head|node=0|zone=2)
[   45.590679] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.591377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.592039] page dumped because: kasan: bad access detected
[   45.592637] 
[   45.593004] Memory state around the buggy address:
[   45.593529]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.594338]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.595217] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   45.596016]                                                  ^
[   45.596635]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.597296]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.598123] ==================================================================

test log snippet test parser 89

Home

[   45.238406] ==================================================================
[   45.239044] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18d/0x620
[   45.239444] Write of size 1 at addr ffff88810091fad0 by task kunit_try_catch/235
[   45.239733] 
[   45.239853] CPU: 1 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.242543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.243642] Call Trace:
[   45.244030]  <TASK>
[   45.244414]  dump_stack_lvl+0x49/0x62
[   45.245510]  print_report+0x189/0x4b1
[   45.246096]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.246707]  kasan_report+0xde/0x160
[   45.247228]  ? krealloc_less_oob_helper+0x18d/0x620
[   45.247974]  ? krealloc_less_oob_helper+0x18d/0x620
[   45.248691]  __asan_store1+0x65/0x70
[   45.249191]  krealloc_less_oob_helper+0x18d/0x620
[   45.249687]  ? krealloc_uaf+0x2e0/0x2e0
[   45.250273]  ? __kunit_add_resource+0xd1/0x100
[   45.250872]  ? preempt_count_sub+0x4c/0x70
[   45.251336]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.252150]  ? __kunit_add_resource+0xd1/0x100
[   45.253373]  krealloc_less_oob+0x18/0x20
[   45.254034]  kunit_try_run_case+0x8f/0xd0
[   45.254607]  ? kunit_catch_run_case+0x80/0x80
[   45.255220]  ? kunit_try_catch_throw+0x40/0x40
[   45.256002]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.256609]  kthread+0x17b/0x1b0
[   45.257378]  ? kthread_complete_and_exit+0x30/0x30
[   45.257818]  ret_from_fork+0x22/0x30
[   45.258588]  </TASK>
[   45.258921] 
[   45.259544] Allocated by task 235:
[   45.259958]  kasan_save_stack+0x39/0x60
[   45.260438]  kasan_set_track+0x25/0x40
[   45.261365]  kasan_save_alloc_info+0x1e/0x30
[   45.262001]  __kasan_krealloc+0x12e/0x180
[   45.262428]  krealloc+0xae/0x140
[   45.263257]  krealloc_less_oob_helper+0xe8/0x620
[   45.264028]  krealloc_less_oob+0x18/0x20
[   45.264759]  kunit_try_run_case+0x8f/0xd0
[   45.265531]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.266277]  kthread+0x17b/0x1b0
[   45.266674]  ret_from_fork+0x22/0x30
[   45.267178] 
[   45.267432] The buggy address belongs to the object at ffff88810091fa00
[   45.267432]  which belongs to the cache kmalloc-256 of size 256
[   45.269266] The buggy address is located 208 bytes inside of
[   45.269266]  256-byte region [ffff88810091fa00, ffff88810091fb00)
[   45.270709] 
[   45.271243] The buggy address belongs to the physical page:
[   45.271890] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   45.273601] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.274547] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.275363] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.276169] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.276749] page dumped because: kasan: bad access detected
[   45.278218] 
[   45.278415] Memory state around the buggy address:
[   45.279554]  ffff88810091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.280508]  ffff88810091fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.281830] >ffff88810091fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   45.282474]                                                  ^
[   45.283149]  ffff88810091fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.284035]  ffff88810091fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.285405] ==================================================================

test log snippet test parser 90

Home

[   45.451696] ==================================================================
[   45.452367] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17d/0x3b0
[   45.453417] Write of size 1 at addr ffff8881036ea0eb by task kunit_try_catch/236
[   45.454551] 
[   45.454814] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.456919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.457513] Call Trace:
[   45.457818]  <TASK>
[   45.458307]  dump_stack_lvl+0x49/0x62
[   45.458846]  print_report+0x189/0x4b1
[   45.459621]  ? kasan_addr_to_slab+0xd/0xb0
[   45.460327]  kasan_report+0xde/0x160
[   45.460872]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   45.461640]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   45.462788]  __asan_store1+0x65/0x70
[   45.463401]  krealloc_more_oob_helper+0x17d/0x3b0
[   45.464231]  ? krealloc_less_oob+0x20/0x20
[   45.465033]  ? __kunit_add_resource+0xd1/0x100
[   45.465526]  ? preempt_count_sub+0x4c/0x70
[   45.465909]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.467093]  ? __kunit_add_resource+0xd1/0x100
[   45.467636]  krealloc_pagealloc_more_oob+0x18/0x20
[   45.468272]  kunit_try_run_case+0x8f/0xd0
[   45.469588]  ? kunit_catch_run_case+0x80/0x80
[   45.470300]  ? kunit_try_catch_throw+0x40/0x40
[   45.470954]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.472126]  kthread+0x17b/0x1b0
[   45.472535]  ? kthread_complete_and_exit+0x30/0x30
[   45.473058]  ret_from_fork+0x22/0x30
[   45.473514]  </TASK>
[   45.473781] 
[   45.474613] The buggy address belongs to the physical page:
[   45.475520] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.476696] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.477362] flags: 0x200000000010000(head|node=0|zone=2)
[   45.477981] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.478757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.480244] page dumped because: kasan: bad access detected
[   45.480931] 
[   45.481175] Memory state around the buggy address:
[   45.481769]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.482529]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.483493] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   45.484086]                                                           ^
[   45.485755]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.486672]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.487712] ==================================================================

test log snippet test parser 91

Home

[   45.489326] ==================================================================
[   45.490261] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1b8/0x3b0
[   45.491347] Write of size 1 at addr ffff8881036ea0f0 by task kunit_try_catch/236
[   45.492308] 
[   45.492851] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.494520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.496310] Call Trace:
[   45.496806]  <TASK>
[   45.497390]  dump_stack_lvl+0x49/0x62
[   45.498328]  print_report+0x189/0x4b1
[   45.498856]  ? kasan_addr_to_slab+0xd/0xb0
[   45.499594]  kasan_report+0xde/0x160
[   45.500185]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   45.500794]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   45.501800]  __asan_store1+0x65/0x70
[   45.502600]  krealloc_more_oob_helper+0x1b8/0x3b0
[   45.503342]  ? krealloc_less_oob+0x20/0x20
[   45.504042]  ? __kunit_add_resource+0xd1/0x100
[   45.504877]  ? preempt_count_sub+0x4c/0x70
[   45.505613]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.506482]  ? __kunit_add_resource+0xd1/0x100
[   45.507156]  krealloc_pagealloc_more_oob+0x18/0x20
[   45.507922]  kunit_try_run_case+0x8f/0xd0
[   45.509112]  ? kunit_catch_run_case+0x80/0x80
[   45.510302]  ? kunit_try_catch_throw+0x40/0x40
[   45.511008]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.511961]  kthread+0x17b/0x1b0
[   45.512613]  ? kthread_complete_and_exit+0x30/0x30
[   45.513197]  ret_from_fork+0x22/0x30
[   45.514078]  </TASK>
[   45.514430] 
[   45.514911] The buggy address belongs to the physical page:
[   45.515966] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   45.517104] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   45.517748] flags: 0x200000000010000(head|node=0|zone=2)
[   45.518339] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   45.519251] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   45.520084] page dumped because: kasan: bad access detected
[   45.521184] 
[   45.521525] Memory state around the buggy address:
[   45.522158]  ffff8881036e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.522930]  ffff8881036ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.524190] >ffff8881036ea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   45.525170]                                                              ^
[   45.526112]  ffff8881036ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.526883]  ffff8881036ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   45.527722] ==================================================================

test log snippet test parser 92

Home

[   45.140214] ==================================================================
[   45.141285] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1b8/0x3b0
[   45.142348] Write of size 1 at addr ffff888100351cf0 by task kunit_try_catch/234
[   45.143281] 
[   45.144184] CPU: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.145218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.146155] Call Trace:
[   45.146488]  <TASK>
[   45.147047]  dump_stack_lvl+0x49/0x62
[   45.147806]  print_report+0x189/0x4b1
[   45.148335]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.149165]  kasan_report+0xde/0x160
[   45.150205]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   45.151096]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   45.151744]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   45.152035]  __asan_store1+0x65/0x70
[   45.152257]  krealloc_more_oob_helper+0x1b8/0x3b0
[   45.152579]  ? krealloc_less_oob+0x20/0x20
[   45.153480]  ? __kunit_add_resource+0xd1/0x100
[   45.154459]  ? preempt_count_sub+0x4c/0x70
[   45.155098]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.156022]  ? __kunit_add_resource+0xd1/0x100
[   45.156755]  krealloc_more_oob+0x18/0x20
[   45.157277]  kunit_try_run_case+0x8f/0xd0
[   45.157972]  ? kunit_catch_run_case+0x80/0x80
[   45.158490]  ? kunit_try_catch_throw+0x40/0x40
[   45.159004]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.159763]  kthread+0x17b/0x1b0
[   45.160559]  ? kthread_complete_and_exit+0x30/0x30
[   45.161199]  ret_from_fork+0x22/0x30
[   45.161583]  </TASK>
[   45.161901] 
[   45.162228] Allocated by task 234:
[   45.162614]  kasan_save_stack+0x39/0x60
[   45.163267]  kasan_set_track+0x25/0x40
[   45.163860]  kasan_save_alloc_info+0x1e/0x30
[   45.164477]  __kasan_krealloc+0x12e/0x180
[   45.164888]  krealloc+0xae/0x140
[   45.165910]  krealloc_more_oob_helper+0xe5/0x3b0
[   45.166685]  krealloc_more_oob+0x18/0x20
[   45.167188]  kunit_try_run_case+0x8f/0xd0
[   45.167414]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.168047]  kthread+0x17b/0x1b0
[   45.168998]  ret_from_fork+0x22/0x30
[   45.169459] 
[   45.169658] The buggy address belongs to the object at ffff888100351c00
[   45.169658]  which belongs to the cache kmalloc-256 of size 256
[   45.171332] The buggy address is located 240 bytes inside of
[   45.171332]  256-byte region [ffff888100351c00, ffff888100351d00)
[   45.172539] 
[   45.172737] The buggy address belongs to the physical page:
[   45.174423] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   45.175319] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.176117] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.176911] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.177843] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.178870] page dumped because: kasan: bad access detected
[   45.179816] 
[   45.180306] Memory state around the buggy address:
[   45.180895]  ffff888100351b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.181594]  ffff888100351c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.182504] >ffff888100351c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   45.183452]                                                              ^
[   45.184193]  ffff888100351d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.185018]  ffff888100351d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.185701] ==================================================================

test log snippet test parser 93

Home

[   45.096006] ==================================================================
[   45.097002] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17d/0x3b0
[   45.098478] Write of size 1 at addr ffff888100351ceb by task kunit_try_catch/234
[   45.099188] 
[   45.099479] CPU: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.100438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.101226] Call Trace:
[   45.101586]  <TASK>
[   45.101892]  dump_stack_lvl+0x49/0x62
[   45.102476]  print_report+0x189/0x4b1
[   45.102986]  ? kasan_complete_mode_report_info+0x3c/0x200
[   45.103604]  kasan_report+0xde/0x160
[   45.104435]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   45.105031]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   45.105555]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   45.106397]  __asan_store1+0x65/0x70
[   45.107059]  krealloc_more_oob_helper+0x17d/0x3b0
[   45.107692]  ? krealloc_less_oob+0x20/0x20
[   45.108301]  ? __kunit_add_resource+0xd1/0x100
[   45.108917]  ? preempt_count_sub+0x4c/0x70
[   45.109517]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.110306]  ? __kunit_add_resource+0xd1/0x100
[   45.111089]  krealloc_more_oob+0x18/0x20
[   45.111820]  kunit_try_run_case+0x8f/0xd0
[   45.112584]  ? kunit_catch_run_case+0x80/0x80
[   45.113050]  ? kunit_try_catch_throw+0x40/0x40
[   45.113292]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.113922]  kthread+0x17b/0x1b0
[   45.114749]  ? kthread_complete_and_exit+0x30/0x30
[   45.115491]  ret_from_fork+0x22/0x30
[   45.115993]  </TASK>
[   45.116329] 
[   45.116633] Allocated by task 234:
[   45.117047]  kasan_save_stack+0x39/0x60
[   45.117731]  kasan_set_track+0x25/0x40
[   45.118253]  kasan_save_alloc_info+0x1e/0x30
[   45.118878]  __kasan_krealloc+0x12e/0x180
[   45.119443]  krealloc+0xae/0x140
[   45.119964]  krealloc_more_oob_helper+0xe5/0x3b0
[   45.120625]  krealloc_more_oob+0x18/0x20
[   45.121217]  kunit_try_run_case+0x8f/0xd0
[   45.121934]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.122685]  kthread+0x17b/0x1b0
[   45.123109]  ret_from_fork+0x22/0x30
[   45.123543] 
[   45.124045] The buggy address belongs to the object at ffff888100351c00
[   45.124045]  which belongs to the cache kmalloc-256 of size 256
[   45.125283] The buggy address is located 235 bytes inside of
[   45.125283]  256-byte region [ffff888100351c00, ffff888100351d00)
[   45.126374] 
[   45.126638] The buggy address belongs to the physical page:
[   45.127439] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   45.128628] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.129499] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.130319] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.131244] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.132122] page dumped because: kasan: bad access detected
[   45.132742] 
[   45.133007] Memory state around the buggy address:
[   45.133559]  ffff888100351b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.134406]  ffff888100351c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.135251] >ffff888100351c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   45.136042]                                                           ^
[   45.136737]  ffff888100351d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.137552]  ffff888100351d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.138348] ==================================================================

test log snippet test parser 94

Home

[   47.208290] ==================================================================
[   47.209744] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xe5/0x1f0
[   47.210660] Read of size 1 at addr ffff888103386f80 by task kunit_try_catch/262
[   47.211821] 
[   47.211989] CPU: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.212550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.213661] Call Trace:
[   47.214223]  <TASK>
[   47.214630]  dump_stack_lvl+0x49/0x62
[   47.215252]  print_report+0x189/0x4b1
[   47.216038]  ? kasan_complete_mode_report_info+0x3c/0x200
[   47.216766]  kasan_report+0xde/0x160
[   47.217292]  ? ksize_unpoisons_memory+0xe5/0x1f0
[   47.218127]  ? ksize_unpoisons_memory+0xe5/0x1f0
[   47.218706]  __asan_load1+0x62/0x70
[   47.219355]  ksize_unpoisons_memory+0xe5/0x1f0
[   47.220071]  ? ksize_uaf+0x2f0/0x2f0
[   47.220725]  ? __kunit_add_resource+0xd1/0x100
[   47.221342]  kunit_try_run_case+0x8f/0xd0
[   47.221850]  ? kunit_catch_run_case+0x80/0x80
[   47.222594]  ? kunit_try_catch_throw+0x40/0x40
[   47.223254]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.224019]  kthread+0x17b/0x1b0
[   47.224553]  ? kthread_complete_and_exit+0x30/0x30
[   47.225157]  ret_from_fork+0x22/0x30
[   47.225708]  </TASK>
[   47.226112] 
[   47.226344] Allocated by task 262:
[   47.226913]  kasan_save_stack+0x39/0x60
[   47.227583]  kasan_set_track+0x25/0x40
[   47.228213]  kasan_save_alloc_info+0x1e/0x30
[   47.228988]  __kasan_kmalloc+0xb6/0xc0
[   47.229655]  kmalloc_trace+0x48/0xb0
[   47.230136]  ksize_unpoisons_memory+0x9b/0x1f0
[   47.230804]  kunit_try_run_case+0x8f/0xd0
[   47.231354]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.232150]  kthread+0x17b/0x1b0
[   47.232653]  ret_from_fork+0x22/0x30
[   47.233153] 
[   47.233480] The buggy address belongs to the object at ffff888103386f00
[   47.233480]  which belongs to the cache kmalloc-128 of size 128
[   47.234724] The buggy address is located 0 bytes to the right of
[   47.234724]  128-byte region [ffff888103386f00, ffff888103386f80)
[   47.235987] 
[   47.236296] The buggy address belongs to the physical page:
[   47.236984] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103386
[   47.238070] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.238761] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   47.239584] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.240280] page dumped because: kasan: bad access detected
[   47.240926] 
[   47.241227] Memory state around the buggy address:
[   47.241736]  ffff888103386e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.242715]  ffff888103386f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.243494] >ffff888103386f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.244211]                    ^
[   47.244675]  ffff888103387000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc
[   47.245442]  ffff888103387080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   47.246217] ==================================================================

test log snippet test parser 95

Home

[   47.597658] ==================================================================
[   47.598794] BUG: KASAN: slab-out-of-bounds in memchr+0x23/0x50
[   47.599911] Read of size 1 at addr ffff888103388398 by task kunit_try_catch/267
[   47.600846] 
[   47.601187] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.602529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.603591] Call Trace:
[   47.603895]  <TASK>
[   47.604624]  dump_stack_lvl+0x49/0x62
[   47.605288]  print_report+0x189/0x4b1
[   47.606112]  ? kasan_complete_mode_report_info+0x3c/0x200
[   47.606777]  kasan_report+0xde/0x160
[   47.607398]  ? memchr+0x23/0x50
[   47.607898]  ? memchr+0x23/0x50
[   47.608520]  __asan_load1+0x62/0x70
[   47.609248]  memchr+0x23/0x50
[   47.609744]  kasan_memchr+0xd9/0x1e0
[   47.610273]  ? kasan_memcmp+0x260/0x260
[   47.610969]  ? __kunit_add_resource+0xd1/0x100
[   47.611646]  kunit_try_run_case+0x8f/0xd0
[   47.612247]  ? kunit_catch_run_case+0x80/0x80
[   47.612790]  ? kunit_try_catch_throw+0x40/0x40
[   47.613647]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.614576]  kthread+0x17b/0x1b0
[   47.615261]  ? kthread_complete_and_exit+0x30/0x30
[   47.616001]  ret_from_fork+0x22/0x30
[   47.616731]  </TASK>
[   47.617109] 
[   47.617370] Allocated by task 267:
[   47.618213]  kasan_save_stack+0x39/0x60
[   47.619067]  kasan_set_track+0x25/0x40
[   47.619669]  kasan_save_alloc_info+0x1e/0x30
[   47.620256]  __kasan_kmalloc+0xb6/0xc0
[   47.620740]  kmalloc_trace+0x48/0xb0
[   47.621546]  kasan_memchr+0x9b/0x1e0
[   47.622275]  kunit_try_run_case+0x8f/0xd0
[   47.622768]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.623811]  kthread+0x17b/0x1b0
[   47.624478]  ret_from_fork+0x22/0x30
[   47.625303] 
[   47.625682] The buggy address belongs to the object at ffff888103388380
[   47.625682]  which belongs to the cache kmalloc-32 of size 32
[   47.627541] The buggy address is located 24 bytes inside of
[   47.627541]  32-byte region [ffff888103388380, ffff8881033883a0)
[   47.629163] 
[   47.629563] The buggy address belongs to the physical page:
[   47.630340] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.631602] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.632414] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.633138] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.633811] page dumped because: kasan: bad access detected
[   47.634763] 
[   47.635190] Memory state around the buggy address:
[   47.635656]  ffff888103388280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.636732]  ffff888103388300: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   47.637435] >ffff888103388380: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.638315]                             ^
[   47.638807]  ffff888103388400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.639932]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.640675] ==================================================================

test log snippet test parser 96

Home

[   47.646568] ==================================================================
[   47.648430] BUG: KASAN: slab-out-of-bounds in memcmp+0x39/0xb0
[   47.649181] Read of size 1 at addr ffff8881033883d8 by task kunit_try_catch/268
[   47.650632] 
[   47.651192] CPU: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.652109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.653170] Call Trace:
[   47.653722]  <TASK>
[   47.654304]  dump_stack_lvl+0x49/0x62
[   47.655234]  print_report+0x189/0x4b1
[   47.655757]  ? kasan_complete_mode_report_info+0x3c/0x200
[   47.656603]  kasan_report+0xde/0x160
[   47.657393]  ? memcmp+0x39/0xb0
[   47.657766]  ? memcmp+0x39/0xb0
[   47.658251]  __asan_load1+0x62/0x70
[   47.658738]  memcmp+0x39/0xb0
[   47.659652]  kasan_memcmp+0x12f/0x260
[   47.660415]  ? kmalloc_oob_in_memset+0x1d0/0x1d0
[   47.661540]  ? preempt_count_sub+0x4c/0x70
[   47.662300]  kunit_try_run_case+0x8f/0xd0
[   47.663032]  ? kunit_catch_run_case+0x80/0x80
[   47.663706]  ? kunit_try_catch_throw+0x40/0x40
[   47.664583]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.665723]  kthread+0x17b/0x1b0
[   47.666237]  ? kthread_complete_and_exit+0x30/0x30
[   47.667108]  ret_from_fork+0x22/0x30
[   47.667765]  </TASK>
[   47.668271] 
[   47.668417] Allocated by task 268:
[   47.669161]  kasan_save_stack+0x39/0x60
[   47.670019]  kasan_set_track+0x25/0x40
[   47.670908]  kasan_save_alloc_info+0x1e/0x30
[   47.671883]  __kasan_kmalloc+0xb6/0xc0
[   47.672551]  kmalloc_trace+0x48/0xb0
[   47.673157]  kasan_memcmp+0xe0/0x260
[   47.673489]  kunit_try_run_case+0x8f/0xd0
[   47.674121]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.674899]  kthread+0x17b/0x1b0
[   47.675280]  ret_from_fork+0x22/0x30
[   47.675826] 
[   47.676199] The buggy address belongs to the object at ffff8881033883c0
[   47.676199]  which belongs to the cache kmalloc-32 of size 32
[   47.678202] The buggy address is located 24 bytes inside of
[   47.678202]  32-byte region [ffff8881033883c0, ffff8881033883e0)
[   47.679845] 
[   47.680188] The buggy address belongs to the physical page:
[   47.681277] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.682236] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.682513] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.682804] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.683616] page dumped because: kasan: bad access detected
[   47.684311] 
[   47.684621] Memory state around the buggy address:
[   47.685431]  ffff888103388280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.686766]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.687594] >ffff888103388380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   47.688703]                                                     ^
[   47.689161]  ffff888103388400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.689664]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.690971] ==================================================================

test log snippet test parser 97

Home

[   47.072850] ==================================================================
[   47.074379] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xbd/0x180
[   47.075650] Read of size 1 at addr ffff888103487e6a by task kunit_try_catch/259
[   47.076416] 
[   47.076758] CPU: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.077735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.078832] Call Trace:
[   47.079232]  <TASK>
[   47.079551]  dump_stack_lvl+0x49/0x62
[   47.080420]  print_report+0x189/0x4b1
[   47.081187]  ? kasan_addr_to_slab+0xd/0xb0
[   47.081433]  kasan_report+0xde/0x160
[   47.082328]  ? kasan_stack_oob+0xbd/0x180
[   47.082799]  ? kasan_stack_oob+0xbd/0x180
[   47.083562]  __asan_load1+0x62/0x70
[   47.084342]  kasan_stack_oob+0xbd/0x180
[   47.084912]  ? match_all_mem_tag+0x20/0x20
[   47.085383]  ? preempt_count_sub+0x4c/0x70
[   47.085976]  ? __kunit_add_resource+0xd1/0x100
[   47.086666]  ? kasan_test_init+0x13e/0x1b0
[   47.087292]  kunit_try_run_case+0x8f/0xd0
[   47.087799]  ? kunit_catch_run_case+0x80/0x80
[   47.088310]  ? kunit_try_catch_throw+0x40/0x40
[   47.089103]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.089829]  kthread+0x17b/0x1b0
[   47.090562]  ? kthread_complete_and_exit+0x30/0x30
[   47.091220]  ret_from_fork+0x22/0x30
[   47.091718]  </TASK>
[   47.092036] 
[   47.092447] The buggy address belongs to stack of task kunit_try_catch/259
[   47.093462]  and is located at offset 138 in frame:
[   47.094042]  kasan_stack_oob+0x0/0x180
[   47.095053] 
[   47.095370] This frame has 4 objects:
[   47.096087]  [48, 49) '__assertion'
[   47.096186]  [64, 72) 'array'
[   47.096725]  [96, 112) '__assertion'
[   47.097370]  [128, 138) 'stack_array'
[   47.097770] 
[   47.099044] The buggy address belongs to the physical page:
[   47.099644] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103487
[   47.100704] flags: 0x200000000000000(node=0|zone=2)
[   47.101404] raw: 0200000000000000 ffffea00040d21c8 ffffea00040d21c8 0000000000000000
[   47.102421] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   47.103355] page dumped because: kasan: bad access detected
[   47.104138] 
[   47.104364] Memory state around the buggy address:
[   47.105365]  ffff888103487d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.106262]  ffff888103487d80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   47.107125] >ffff888103487e00: f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3 f3
[   47.107787]                                                           ^
[   47.108813]  ffff888103487e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.109432]  ffff888103487f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.110472] ==================================================================

test log snippet test parser 98

Home

[   48.820088] ==================================================================
[   48.821919] BUG: KASAN: use-after-free in kfree_sensitive+0x12/0x50
[   48.822761] Read of size 1 at addr ffff88810329c040 by task kunit_try_catch/272
[   48.824161] 
[   48.825168] CPU: 1 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   48.826253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.827787] Call Trace:
[   48.828284]  <TASK>
[   48.828699]  dump_stack_lvl+0x49/0x62
[   48.829368]  print_report+0x189/0x4b1
[   48.829819]  ? kasan_complete_mode_report_info+0x7c/0x200
[   48.830511]  kasan_report+0xde/0x160
[   48.831085]  ? kfree_sensitive+0x12/0x50
[   48.831725]  ? kfree_sensitive+0x12/0x50
[   48.832170]  ? kfree_sensitive+0x12/0x50
[   48.832529]  __kasan_check_byte+0x39/0x50
[   48.833199]  ksize+0x1e/0x70
[   48.833751]  kfree_sensitive+0x12/0x50
[   48.834478]  kmalloc_double_kzfree+0xc8/0x1b0
[   48.835228]  ? kasan_global_oob_right+0x160/0x160
[   48.836082]  ? __kunit_add_resource+0xd1/0x100
[   48.836518]  ? kasan_test_init+0x13e/0x1b0
[   48.837357]  kunit_try_run_case+0x8f/0xd0
[   48.838319]  ? kunit_catch_run_case+0x80/0x80
[   48.839061]  ? kunit_try_catch_throw+0x40/0x40
[   48.839606]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.840552]  kthread+0x17b/0x1b0
[   48.841338]  ? kthread_complete_and_exit+0x30/0x30
[   48.842394]  ret_from_fork+0x22/0x30
[   48.842836]  </TASK>
[   48.843283] 
[   48.843544] Allocated by task 272:
[   48.844515]  kasan_save_stack+0x39/0x60
[   48.845099]  kasan_set_track+0x25/0x40
[   48.845870]  kasan_save_alloc_info+0x1e/0x30
[   48.847194]  __kasan_kmalloc+0xb6/0xc0
[   48.847875]  kmalloc_trace+0x48/0xb0
[   48.848290]  kmalloc_double_kzfree+0x99/0x1b0
[   48.849016]  kunit_try_run_case+0x8f/0xd0
[   48.849893]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.850791]  kthread+0x17b/0x1b0
[   48.851132]  ret_from_fork+0x22/0x30
[   48.851422] 
[   48.852216] Freed by task 272:
[   48.852930]  kasan_save_stack+0x39/0x60
[   48.853526]  kasan_set_track+0x25/0x40
[   48.854339]  kasan_save_free_info+0x2e/0x50
[   48.854858]  ____kasan_slab_free+0x175/0x1d0
[   48.855308]  __kasan_slab_free+0x12/0x20
[   48.855825]  __kmem_cache_free+0x188/0x2f0
[   48.856918]  kfree+0x78/0x120
[   48.857349]  kfree_sensitive+0x3e/0x50
[   48.857829]  kmalloc_double_kzfree+0xb1/0x1b0
[   48.858462]  kunit_try_run_case+0x8f/0xd0
[   48.859014]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   48.859712]  kthread+0x17b/0x1b0
[   48.860231]  ret_from_fork+0x22/0x30
[   48.860798] 
[   48.861026] The buggy address belongs to the object at ffff88810329c040
[   48.861026]  which belongs to the cache kmalloc-16 of size 16
[   48.862431] The buggy address is located 0 bytes inside of
[   48.862431]  16-byte region [ffff88810329c040, ffff88810329c050)
[   48.863526] 
[   48.863767] The buggy address belongs to the physical page:
[   48.864641] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10329c
[   48.865363] flags: 0x200000000000200(slab|node=0|zone=2)
[   48.866305] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   48.867152] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.867981] page dumped because: kasan: bad access detected
[   48.868576] 
[   48.868856] Memory state around the buggy address:
[   48.869520]  ffff88810329bf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.870406]  ffff88810329bf80: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc
[   48.871254] >ffff88810329c000: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   48.872235]                                            ^
[   48.872623]  ffff88810329c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.873275]  ffff88810329c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.874234] ==================================================================

test log snippet test parser 99

Home

[   44.938182] ==================================================================
[   44.939350] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xad/0x1a0
[   44.940232] Read of size 1 at addr ffff8881036e8000 by task kunit_try_catch/229
[   44.941865] 
[   44.942222] CPU: 1 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   44.943320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.944243] Call Trace:
[   44.945204]  <TASK>
[   44.945587]  dump_stack_lvl+0x49/0x62
[   44.946270]  print_report+0x189/0x4b1
[   44.946922]  ? kasan_addr_to_slab+0xd/0xb0
[   44.947741]  kasan_report+0xde/0x160
[   44.948451]  ? kmalloc_pagealloc_uaf+0xad/0x1a0
[   44.949280]  ? kmalloc_pagealloc_uaf+0xad/0x1a0
[   44.949687]  __asan_load1+0x62/0x70
[   44.950338]  kmalloc_pagealloc_uaf+0xad/0x1a0
[   44.951362]  ? kmalloc_pagealloc_invalid_free+0x1b0/0x1b0
[   44.952355]  ? __kunit_add_resource+0xd1/0x100
[   44.953188]  ? kasan_test_init+0x13e/0x1b0
[   44.953637]  kunit_try_run_case+0x8f/0xd0
[   44.954233]  ? kunit_catch_run_case+0x80/0x80
[   44.955020]  ? kunit_try_catch_throw+0x40/0x40
[   44.955577]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   44.956392]  kthread+0x17b/0x1b0
[   44.956955]  ? kthread_complete_and_exit+0x30/0x30
[   44.957366]  ret_from_fork+0x22/0x30
[   44.958064]  </TASK>
[   44.958500] 
[   44.958782] The buggy address belongs to the physical page:
[   44.959423] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036e8
[   44.960421] flags: 0x200000000000000(node=0|zone=2)
[   44.960986] raw: 0200000000000000 ffffea00040dbb08 ffff88815b53b1f8 0000000000000000
[   44.961725] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   44.962524] page dumped because: kasan: bad access detected
[   44.963084] 
[   44.963340] Memory state around the buggy address:
[   44.964537]  ffff8881036e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.965446]  ffff8881036e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.966397] >ffff8881036e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   44.967082]                    ^
[   44.967510]  ffff8881036e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   44.968204]  ffff8881036e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   44.968816] ==================================================================

test log snippet test parser 100

Home

[   45.881560] ==================================================================
[   45.882728] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x250
[   45.883631] Read of size 16 at addr ffff8881032fe0c0 by task kunit_try_catch/240
[   45.884225] 
[   45.884479] CPU: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.885164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.886411] Call Trace:
[   45.887634]  <TASK>
[   45.887955]  dump_stack_lvl+0x49/0x62
[   45.888660]  print_report+0x189/0x4b1
[   45.889303]  ? kasan_complete_mode_report_info+0x7c/0x200
[   45.890074]  kasan_report+0xde/0x160
[   45.890606]  ? kmalloc_uaf_16+0x104/0x250
[   45.891236]  ? kmalloc_uaf_16+0x104/0x250
[   45.892039]  __asan_load16+0x65/0x90
[   45.892567]  kmalloc_uaf_16+0x104/0x250
[   45.893042]  ? kmalloc_uaf+0x1c0/0x1c0
[   45.893529]  ? __kunit_add_resource+0xd1/0x100
[   45.894099]  ? kasan_test_init+0x13e/0x1b0
[   45.894608]  kunit_try_run_case+0x8f/0xd0
[   45.895256]  ? kunit_catch_run_case+0x80/0x80
[   45.895867]  ? kunit_try_catch_throw+0x40/0x40
[   45.896477]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.897092]  kthread+0x17b/0x1b0
[   45.897549]  ? kthread_complete_and_exit+0x30/0x30
[   45.898169]  ret_from_fork+0x22/0x30
[   45.898676]  </TASK>
[   45.899004] 
[   45.899233] Allocated by task 240:
[   45.899561]  kasan_save_stack+0x39/0x60
[   45.900469]  kasan_set_track+0x25/0x40
[   45.901076]  kasan_save_alloc_info+0x1e/0x30
[   45.901591]  __kasan_kmalloc+0xb6/0xc0
[   45.902058]  kmalloc_trace+0x48/0xb0
[   45.902623]  kmalloc_uaf_16+0xc5/0x250
[   45.903141]  kunit_try_run_case+0x8f/0xd0
[   45.903579]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.904382]  kthread+0x17b/0x1b0
[   45.904836]  ret_from_fork+0x22/0x30
[   45.905359] 
[   45.905923] Freed by task 240:
[   45.906367]  kasan_save_stack+0x39/0x60
[   45.907056]  kasan_set_track+0x25/0x40
[   45.907585]  kasan_save_free_info+0x2e/0x50
[   45.908154]  ____kasan_slab_free+0x175/0x1d0
[   45.908999]  __kasan_slab_free+0x12/0x20
[   45.909456]  __kmem_cache_free+0x188/0x2f0
[   45.910138]  kfree+0x78/0x120
[   45.910644]  kmalloc_uaf_16+0xe5/0x250
[   45.911161]  kunit_try_run_case+0x8f/0xd0
[   45.911758]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.912386]  kthread+0x17b/0x1b0
[   45.913146]  ret_from_fork+0x22/0x30
[   45.913640] 
[   45.913882] The buggy address belongs to the object at ffff8881032fe0c0
[   45.913882]  which belongs to the cache kmalloc-16 of size 16
[   45.915525] The buggy address is located 0 bytes inside of
[   45.915525]  16-byte region [ffff8881032fe0c0, ffff8881032fe0d0)
[   45.917106] 
[   45.917556] The buggy address belongs to the physical page:
[   45.918098] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032fe
[   45.919019] flags: 0x200000000000200(slab|node=0|zone=2)
[   45.919611] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   45.920425] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.921156] page dumped because: kasan: bad access detected
[   45.921810] 
[   45.922143] Memory state around the buggy address:
[   45.922674]  ffff8881032fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.923710]  ffff8881032fe000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.924501] >ffff8881032fe080: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   45.925215]                                            ^
[   45.925806]  ffff8881032fe100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.926636]  ffff8881032fe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.927450] ==================================================================

test log snippet test parser 101

Home

[   46.368577] ==================================================================
[   46.369931] BUG: KASAN: use-after-free in kmalloc_uaf2+0x11e/0x2b0
[   46.370672] Read of size 1 at addr ffff8881032b75a8 by task kunit_try_catch/250
[   46.372017] 
[   46.372449] CPU: 1 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.373501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.374372] Call Trace:
[   46.374712]  <TASK>
[   46.375047]  dump_stack_lvl+0x49/0x62
[   46.375587]  print_report+0x189/0x4b1
[   46.376065]  ? kasan_complete_mode_report_info+0x7c/0x200
[   46.376749]  kasan_report+0xde/0x160
[   46.377222]  ? kmalloc_uaf2+0x11e/0x2b0
[   46.378061]  ? kmalloc_uaf2+0x11e/0x2b0
[   46.378769]  __asan_load1+0x62/0x70
[   46.379242]  kmalloc_uaf2+0x11e/0x2b0
[   46.379655]  ? kfree_via_page+0x190/0x190
[   46.380305]  ? preempt_count_sub+0x4c/0x70
[   46.380936]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   46.381511]  ? __kunit_add_resource+0xd1/0x100
[   46.382174]  kunit_try_run_case+0x8f/0xd0
[   46.382684]  ? kunit_catch_run_case+0x80/0x80
[   46.383178]  ? kunit_try_catch_throw+0x40/0x40
[   46.383699]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.384331]  kthread+0x17b/0x1b0
[   46.384889]  ? kthread_complete_and_exit+0x30/0x30
[   46.385444]  ret_from_fork+0x22/0x30
[   46.386092]  </TASK>
[   46.386426] 
[   46.387064] Allocated by task 250:
[   46.387457]  kasan_save_stack+0x39/0x60
[   46.388123]  kasan_set_track+0x25/0x40
[   46.388592]  kasan_save_alloc_info+0x1e/0x30
[   46.389315]  __kasan_kmalloc+0xb6/0xc0
[   46.389952]  kmalloc_trace+0x48/0xb0
[   46.390482]  kmalloc_uaf2+0xac/0x2b0
[   46.391313]  kunit_try_run_case+0x8f/0xd0
[   46.392044]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.392704]  kthread+0x17b/0x1b0
[   46.393175]  ret_from_fork+0x22/0x30
[   46.393689] 
[   46.393919] Freed by task 250:
[   46.394431]  kasan_save_stack+0x39/0x60
[   46.394961]  kasan_set_track+0x25/0x40
[   46.395463]  kasan_save_free_info+0x2e/0x50
[   46.396073]  ____kasan_slab_free+0x175/0x1d0
[   46.396634]  __kasan_slab_free+0x12/0x20
[   46.397283]  __kmem_cache_free+0x188/0x2f0
[   46.398157]  kfree+0x78/0x120
[   46.398619]  kmalloc_uaf2+0xcc/0x2b0
[   46.399139]  kunit_try_run_case+0x8f/0xd0
[   46.399783]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.400748]  kthread+0x17b/0x1b0
[   46.401193]  ret_from_fork+0x22/0x30
[   46.401797] 
[   46.402129] The buggy address belongs to the object at ffff8881032b7580
[   46.402129]  which belongs to the cache kmalloc-64 of size 64
[   46.403218] The buggy address is located 40 bytes inside of
[   46.403218]  64-byte region [ffff8881032b7580, ffff8881032b75c0)
[   46.404315] 
[   46.404642] The buggy address belongs to the physical page:
[   46.405335] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b7
[   46.406320] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.407282] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640
[   46.408034] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   46.408971] page dumped because: kasan: bad access detected
[   46.409547] 
[   46.409834] Memory state around the buggy address:
[   46.410502]  ffff8881032b7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.411207]  ffff8881032b7500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.411933] >ffff8881032b7580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.412697]                                   ^
[   46.413280]  ffff8881032b7600: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   46.414114]  ffff8881032b7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.414890] ==================================================================

test log snippet test parser 102

Home

[   46.265713] ==================================================================
[   46.267002] BUG: KASAN: use-after-free in kmalloc_uaf+0xcd/0x1c0
[   46.267686] Read of size 1 at addr ffff88810329c028 by task kunit_try_catch/248
[   46.268681] 
[   46.269022] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.270039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.271333] Call Trace:
[   46.271716]  <TASK>
[   46.272155]  dump_stack_lvl+0x49/0x62
[   46.272686]  print_report+0x189/0x4b1
[   46.273291]  ? kasan_complete_mode_report_info+0x7c/0x200
[   46.274017]  kasan_report+0xde/0x160
[   46.274411]  ? kmalloc_uaf+0xcd/0x1c0
[   46.275119]  ? kmalloc_uaf+0xcd/0x1c0
[   46.275633]  __asan_load1+0x62/0x70
[   46.276238]  kmalloc_uaf+0xcd/0x1c0
[   46.276852]  ? kmalloc_uaf2+0x2b0/0x2b0
[   46.277661]  ? __kunit_add_resource+0xd1/0x100
[   46.278237]  ? kasan_test_init+0x13e/0x1b0
[   46.278859]  kunit_try_run_case+0x8f/0xd0
[   46.279350]  ? kunit_catch_run_case+0x80/0x80
[   46.279981]  ? kunit_try_catch_throw+0x40/0x40
[   46.280534]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.281100]  kthread+0x17b/0x1b0
[   46.281550]  ? kthread_complete_and_exit+0x30/0x30
[   46.282185]  ret_from_fork+0x22/0x30
[   46.282854]  </TASK>
[   46.283183] 
[   46.283483] Allocated by task 248:
[   46.283906]  kasan_save_stack+0x39/0x60
[   46.284521]  kasan_set_track+0x25/0x40
[   46.285310]  kasan_save_alloc_info+0x1e/0x30
[   46.285791]  __kasan_kmalloc+0xb6/0xc0
[   46.286577]  kmalloc_trace+0x48/0xb0
[   46.287003]  kmalloc_uaf+0x99/0x1c0
[   46.287561]  kunit_try_run_case+0x8f/0xd0
[   46.288040]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.288903]  kthread+0x17b/0x1b0
[   46.289321]  ret_from_fork+0x22/0x30
[   46.289790] 
[   46.290075] Freed by task 248:
[   46.290419]  kasan_save_stack+0x39/0x60
[   46.290924]  kasan_set_track+0x25/0x40
[   46.291773]  kasan_save_free_info+0x2e/0x50
[   46.292344]  ____kasan_slab_free+0x175/0x1d0
[   46.292929]  __kasan_slab_free+0x12/0x20
[   46.293417]  __kmem_cache_free+0x188/0x2f0
[   46.293895]  kfree+0x78/0x120
[   46.294505]  kmalloc_uaf+0xb5/0x1c0
[   46.294993]  kunit_try_run_case+0x8f/0xd0
[   46.295501]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.296120]  kthread+0x17b/0x1b0
[   46.296625]  ret_from_fork+0x22/0x30
[   46.297107] 
[   46.297326] The buggy address belongs to the object at ffff88810329c020
[   46.297326]  which belongs to the cache kmalloc-16 of size 16
[   46.298587] The buggy address is located 8 bytes inside of
[   46.298587]  16-byte region [ffff88810329c020, ffff88810329c030)
[   46.299684] 
[   46.299935] The buggy address belongs to the physical page:
[   46.300398] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10329c
[   46.301322] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.302082] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   46.302847] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   46.303745] page dumped because: kasan: bad access detected
[   46.304291] 
[   46.304512] Memory state around the buggy address:
[   46.305055]  ffff88810329bf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.305881]  ffff88810329bf80: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc
[   46.306560] >ffff88810329c000: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   46.307277]                                   ^
[   46.307841]  ffff88810329c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.308634]  ffff88810329c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.309331] ==================================================================

test log snippet test parser 103

Home

[   46.315284] ==================================================================
[   46.316746] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xcf/0x1c0
[   46.317539] Write of size 33 at addr ffff8881032b7500 by task kunit_try_catch/249
[   46.318212] 
[   46.318545] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   46.319409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.320329] Call Trace:
[   46.320777]  <TASK>
[   46.321139]  dump_stack_lvl+0x49/0x62
[   46.321743]  print_report+0x189/0x4b1
[   46.322485]  ? kasan_complete_mode_report_info+0x7c/0x200
[   46.323154]  kasan_report+0xde/0x160
[   46.323798]  ? kmalloc_uaf_memset+0xcf/0x1c0
[   46.324416]  ? kmalloc_uaf_memset+0xcf/0x1c0
[   46.325003]  kasan_check_range+0x10b/0x1c0
[   46.325645]  memset+0x23/0x50
[   46.326150]  kmalloc_uaf_memset+0xcf/0x1c0
[   46.326814]  ? kasan_strings+0x4e0/0x4e0
[   46.327355]  ? __kunit_add_resource+0xd1/0x100
[   46.328073]  ? kasan_test_init+0x13e/0x1b0
[   46.328626]  kunit_try_run_case+0x8f/0xd0
[   46.329267]  ? kunit_catch_run_case+0x80/0x80
[   46.329797]  ? kunit_try_catch_throw+0x40/0x40
[   46.330708]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.331404]  kthread+0x17b/0x1b0
[   46.331926]  ? kthread_complete_and_exit+0x30/0x30
[   46.332567]  ret_from_fork+0x22/0x30
[   46.333226]  </TASK>
[   46.333791] 
[   46.334072] Allocated by task 249:
[   46.334437]  kasan_save_stack+0x39/0x60
[   46.334895]  kasan_set_track+0x25/0x40
[   46.335343]  kasan_save_alloc_info+0x1e/0x30
[   46.335872]  __kasan_kmalloc+0xb6/0xc0
[   46.336288]  kmalloc_trace+0x48/0xb0
[   46.336921]  kmalloc_uaf_memset+0x99/0x1c0
[   46.337615]  kunit_try_run_case+0x8f/0xd0
[   46.338318]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.339059]  kthread+0x17b/0x1b0
[   46.339645]  ret_from_fork+0x22/0x30
[   46.340242] 
[   46.340523] Freed by task 249:
[   46.341117]  kasan_save_stack+0x39/0x60
[   46.341814]  kasan_set_track+0x25/0x40
[   46.343017]  kasan_save_free_info+0x2e/0x50
[   46.343833]  ____kasan_slab_free+0x175/0x1d0
[   46.344602]  __kasan_slab_free+0x12/0x20
[   46.345156]  __kmem_cache_free+0x188/0x2f0
[   46.345549]  kfree+0x78/0x120
[   46.346343]  kmalloc_uaf_memset+0xb1/0x1c0
[   46.347141]  kunit_try_run_case+0x8f/0xd0
[   46.347903]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   46.348531]  kthread+0x17b/0x1b0
[   46.348927]  ret_from_fork+0x22/0x30
[   46.349360] 
[   46.349639] The buggy address belongs to the object at ffff8881032b7500
[   46.349639]  which belongs to the cache kmalloc-64 of size 64
[   46.351387] The buggy address is located 0 bytes inside of
[   46.351387]  64-byte region [ffff8881032b7500, ffff8881032b7540)
[   46.352616] 
[   46.352809] The buggy address belongs to the physical page:
[   46.353651] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032b7
[   46.354692] flags: 0x200000000000200(slab|node=0|zone=2)
[   46.355316] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640
[   46.356005] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   46.356798] page dumped because: kasan: bad access detected
[   46.357255] 
[   46.357439] Memory state around the buggy address:
[   46.357859]  ffff8881032b7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.358447]  ffff8881032b7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.359292] >ffff8881032b7500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.360415]                    ^
[   46.361090]  ffff8881032b7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.362086]  ffff8881032b7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.362907] ==================================================================

test log snippet test parser 104

Home

[   47.530209] ==================================================================
[   47.531476] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xc2/0x1b0
[   47.532780] Read of size 1 at addr ffff8881032a3640 by task kunit_try_catch/266
[   47.533696] 
[   47.533988] CPU: 1 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.535805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.536673] Call Trace:
[   47.537032]  <TASK>
[   47.537629]  dump_stack_lvl+0x49/0x62
[   47.538217]  print_report+0x189/0x4b1
[   47.538785]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.539528]  kasan_report+0xde/0x160
[   47.540274]  ? kmem_cache_double_destroy+0xc2/0x1b0
[   47.541296]  ? kmem_cache_double_destroy+0xc2/0x1b0
[   47.542367]  ? kmem_cache_double_destroy+0xc2/0x1b0
[   47.542989]  __kasan_check_byte+0x39/0x50
[   47.543436]  kmem_cache_destroy+0x21/0x170
[   47.544914]  kmem_cache_double_destroy+0xc2/0x1b0
[   47.545491]  ? kasan_memchr+0x1e0/0x1e0
[   47.546043]  ? __kunit_add_resource+0xd1/0x100
[   47.546588]  ? kasan_test_init+0x13e/0x1b0
[   47.547119]  kunit_try_run_case+0x8f/0xd0
[   47.547780]  ? kunit_catch_run_case+0x80/0x80
[   47.548433]  ? kunit_try_catch_throw+0x40/0x40
[   47.549594]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.550433]  kthread+0x17b/0x1b0
[   47.550804]  ? kthread_complete_and_exit+0x30/0x30
[   47.551402]  ret_from_fork+0x22/0x30
[   47.552042]  </TASK>
[   47.552476] 
[   47.552727] Allocated by task 266:
[   47.554006]  kasan_save_stack+0x39/0x60
[   47.554491]  kasan_set_track+0x25/0x40
[   47.555196]  kasan_save_alloc_info+0x1e/0x30
[   47.555975]  __kasan_slab_alloc+0x90/0xa0
[   47.556445]  kmem_cache_alloc+0x14a/0x370
[   47.556985]  kmem_cache_create_usercopy+0x120/0x290
[   47.557528]  kmem_cache_create+0x16/0x20
[   47.558190]  kmem_cache_double_destroy+0x93/0x1b0
[   47.559549]  kunit_try_run_case+0x8f/0xd0
[   47.560208]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.561027]  kthread+0x17b/0x1b0
[   47.561560]  ret_from_fork+0x22/0x30
[   47.561998] 
[   47.562982] Freed by task 266:
[   47.563276]  kasan_save_stack+0x39/0x60
[   47.563919]  kasan_set_track+0x25/0x40
[   47.564592]  kasan_save_free_info+0x2e/0x50
[   47.565273]  ____kasan_slab_free+0x175/0x1d0
[   47.566597]  __kasan_slab_free+0x12/0x20
[   47.567271]  kmem_cache_free+0x19c/0x4a0
[   47.567957]  slab_kmem_cache_release+0x2a/0x40
[   47.568675]  kmem_cache_release+0x12/0x20
[   47.569453]  kobject_put+0xf2/0x250
[   47.570427]  sysfs_slab_release+0x20/0x30
[   47.571049]  kmem_cache_destroy+0xce/0x170
[   47.571558]  kmem_cache_double_destroy+0xab/0x1b0
[   47.572195]  kunit_try_run_case+0x8f/0xd0
[   47.572931]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.573987]  kthread+0x17b/0x1b0
[   47.575142]  ret_from_fork+0x22/0x30
[   47.575996] 
[   47.576343] The buggy address belongs to the object at ffff8881032a3640
[   47.576343]  which belongs to the cache kmem_cache of size 216
[   47.578277] The buggy address is located 0 bytes inside of
[   47.578277]  216-byte region [ffff8881032a3640, ffff8881032a3718)
[   47.580220] 
[   47.580442] The buggy address belongs to the physical page:
[   47.581069] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032a3
[   47.582163] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.582972] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041000
[   47.584026] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[   47.585279] page dumped because: kasan: bad access detected
[   47.586464] 
[   47.586665] Memory state around the buggy address:
[   47.587243]  ffff8881032a3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.587895]  ffff8881032a3580: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc
[   47.588633] >ffff8881032a3600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   47.589814]                                            ^
[   47.590245]  ffff8881032a3680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.590769]  ffff8881032a3700: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.591918] ==================================================================

test log snippet test parser 105

Home

[   45.709738] ==================================================================
[   45.711318] BUG: KASAN: use-after-free in krealloc_uaf+0xed/0x2e0
[   45.712402] Read of size 1 at addr ffff888100351e00 by task kunit_try_catch/238
[   45.713158] 
[   45.713498] CPU: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.714339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.715692] Call Trace:
[   45.716370]  <TASK>
[   45.717045]  dump_stack_lvl+0x49/0x62
[   45.717842]  print_report+0x189/0x4b1
[   45.718384]  ? kasan_complete_mode_report_info+0x7c/0x200
[   45.719278]  kasan_report+0xde/0x160
[   45.719793]  ? krealloc_uaf+0xed/0x2e0
[   45.720626]  ? krealloc_uaf+0xed/0x2e0
[   45.721172]  ? krealloc_uaf+0xed/0x2e0
[   45.721787]  __kasan_check_byte+0x39/0x50
[   45.722563]  krealloc+0x35/0x140
[   45.723241]  krealloc_uaf+0xed/0x2e0
[   45.723990]  ? kmalloc_memmove_negative_size+0x1e0/0x1e0
[   45.724711]  ? preempt_count_sub+0x4c/0x70
[   45.725543]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.726514]  ? __kunit_add_resource+0xd1/0x100
[   45.727551]  kunit_try_run_case+0x8f/0xd0
[   45.728217]  ? kunit_catch_run_case+0x80/0x80
[   45.729045]  ? kunit_try_catch_throw+0x40/0x40
[   45.729799]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.730595]  kthread+0x17b/0x1b0
[   45.731035]  ? kthread_complete_and_exit+0x30/0x30
[   45.731559]  ret_from_fork+0x22/0x30
[   45.732330]  </TASK>
[   45.732697] 
[   45.733243] Allocated by task 238:
[   45.733801]  kasan_save_stack+0x39/0x60
[   45.734563]  kasan_set_track+0x25/0x40
[   45.735283]  kasan_save_alloc_info+0x1e/0x30
[   45.735985]  __kasan_kmalloc+0xb6/0xc0
[   45.736739]  kmalloc_trace+0x48/0xb0
[   45.737469]  krealloc_uaf+0xac/0x2e0
[   45.738043]  kunit_try_run_case+0x8f/0xd0
[   45.738828]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.739605]  kthread+0x17b/0x1b0
[   45.740154]  ret_from_fork+0x22/0x30
[   45.741019] 
[   45.741338] Freed by task 238:
[   45.741833]  kasan_save_stack+0x39/0x60
[   45.742624]  kasan_set_track+0x25/0x40
[   45.743362]  kasan_save_free_info+0x2e/0x50
[   45.744293]  ____kasan_slab_free+0x175/0x1d0
[   45.745007]  __kasan_slab_free+0x12/0x20
[   45.745755]  __kmem_cache_free+0x188/0x2f0
[   45.746466]  kfree+0x78/0x120
[   45.747145]  krealloc_uaf+0xcc/0x2e0
[   45.747589]  kunit_try_run_case+0x8f/0xd0
[   45.748577]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.749311]  kthread+0x17b/0x1b0
[   45.750213]  ret_from_fork+0x22/0x30
[   45.750737] 
[   45.751220] The buggy address belongs to the object at ffff888100351e00
[   45.751220]  which belongs to the cache kmalloc-256 of size 256
[   45.752932] The buggy address is located 0 bytes inside of
[   45.752932]  256-byte region [ffff888100351e00, ffff888100351f00)
[   45.754351] 
[   45.754590] The buggy address belongs to the physical page:
[   45.755473] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   45.756605] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.758036] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.759120] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.760215] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.760809] page dumped because: kasan: bad access detected
[   45.761376] 
[   45.761620] Memory state around the buggy address:
[   45.762197]  ffff888100351d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.762991]  ffff888100351d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.763918] >ffff888100351e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.764679]                    ^
[   45.765186]  ffff888100351e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.766074]  ffff888100351f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.766878] ==================================================================

test log snippet test parser 106

Home

[   45.768759] ==================================================================
[   45.769413] BUG: KASAN: use-after-free in krealloc_uaf+0x126/0x2e0
[   45.770206] Read of size 1 at addr ffff888100351e00 by task kunit_try_catch/238
[   45.771766] 
[   45.772019] CPU: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.773069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.774174] Call Trace:
[   45.774511]  <TASK>
[   45.774887]  dump_stack_lvl+0x49/0x62
[   45.775539]  print_report+0x189/0x4b1
[   45.776164]  ? kasan_complete_mode_report_info+0x7c/0x200
[   45.777662]  kasan_report+0xde/0x160
[   45.778381]  ? krealloc_uaf+0x126/0x2e0
[   45.779550]  ? krealloc_uaf+0x126/0x2e0
[   45.780435]  __asan_load1+0x62/0x70
[   45.780897]  krealloc_uaf+0x126/0x2e0
[   45.781903]  ? kmalloc_memmove_negative_size+0x1e0/0x1e0
[   45.782968]  ? preempt_count_sub+0x4c/0x70
[   45.783664]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   45.784470]  ? __kunit_add_resource+0xd1/0x100
[   45.785318]  kunit_try_run_case+0x8f/0xd0
[   45.785957]  ? kunit_catch_run_case+0x80/0x80
[   45.786538]  ? kunit_try_catch_throw+0x40/0x40
[   45.787112]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.787718]  kthread+0x17b/0x1b0
[   45.788415]  ? kthread_complete_and_exit+0x30/0x30
[   45.789006]  ret_from_fork+0x22/0x30
[   45.789500]  </TASK>
[   45.789851] 
[   45.790592] Allocated by task 238:
[   45.791165]  kasan_save_stack+0x39/0x60
[   45.791704]  kasan_set_track+0x25/0x40
[   45.792405]  kasan_save_alloc_info+0x1e/0x30
[   45.792920]  __kasan_kmalloc+0xb6/0xc0
[   45.793587]  kmalloc_trace+0x48/0xb0
[   45.794649]  krealloc_uaf+0xac/0x2e0
[   45.795216]  kunit_try_run_case+0x8f/0xd0
[   45.796074]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.796653]  kthread+0x17b/0x1b0
[   45.797278]  ret_from_fork+0x22/0x30
[   45.797802] 
[   45.798158] Freed by task 238:
[   45.798637]  kasan_save_stack+0x39/0x60
[   45.799117]  kasan_set_track+0x25/0x40
[   45.799709]  kasan_save_free_info+0x2e/0x50
[   45.800263]  ____kasan_slab_free+0x175/0x1d0
[   45.800778]  __kasan_slab_free+0x12/0x20
[   45.801294]  __kmem_cache_free+0x188/0x2f0
[   45.801850]  kfree+0x78/0x120
[   45.803098]  krealloc_uaf+0xcc/0x2e0
[   45.803545]  kunit_try_run_case+0x8f/0xd0
[   45.804135]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.804730]  kthread+0x17b/0x1b0
[   45.805381]  ret_from_fork+0x22/0x30
[   45.805837] 
[   45.807221] The buggy address belongs to the object at ffff888100351e00
[   45.807221]  which belongs to the cache kmalloc-256 of size 256
[   45.808607] The buggy address is located 0 bytes inside of
[   45.808607]  256-byte region [ffff888100351e00, ffff888100351f00)
[   45.810150] 
[   45.810914] The buggy address belongs to the physical page:
[   45.811505] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   45.812307] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   45.813678] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   45.814682] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   45.815713] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.816655] page dumped because: kasan: bad access detected
[   45.817397] 
[   45.817654] Memory state around the buggy address:
[   45.818664]  ffff888100351d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.819691]  ffff888100351d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.820586] >ffff888100351e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.821606]                    ^
[   45.822417]  ffff888100351e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.823509]  ffff888100351f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.824509] ==================================================================

test log snippet test parser 107

Home

[   47.346995] ==================================================================
[   47.348348] BUG: KASAN: use-after-free in ksize_uaf+0x12e/0x2f0
[   47.349216] Read of size 1 at addr ffff88810338b078 by task kunit_try_catch/263
[   47.349907] 
[   47.350323] CPU: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.351267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.352348] Call Trace:
[   47.353114]  <TASK>
[   47.353700]  dump_stack_lvl+0x49/0x62
[   47.354344]  print_report+0x189/0x4b1
[   47.354979]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.355790]  kasan_report+0xde/0x160
[   47.356440]  ? ksize_uaf+0xd0/0x2f0
[   47.356867]  ? ksize_uaf+0x12e/0x2f0
[   47.357360]  ? ksize_uaf+0x12e/0x2f0
[   47.357901]  __asan_load1+0x62/0x70
[   47.358382]  ksize_uaf+0x12e/0x2f0
[   47.358899]  ? kmem_cache_oob+0x210/0x210
[   47.359440]  ? __kunit_add_resource+0xd1/0x100
[   47.360013]  ? kasan_test_init+0x13e/0x1b0
[   47.360649]  kunit_try_run_case+0x8f/0xd0
[   47.361209]  ? kunit_catch_run_case+0x80/0x80
[   47.361772]  ? kunit_try_catch_throw+0x40/0x40
[   47.362328]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.363061]  kthread+0x17b/0x1b0
[   47.363548]  ? kthread_complete_and_exit+0x30/0x30
[   47.364092]  ret_from_fork+0x22/0x30
[   47.364655]  </TASK>
[   47.364961] 
[   47.365240] Allocated by task 263:
[   47.365679]  kasan_save_stack+0x39/0x60
[   47.366173]  kasan_set_track+0x25/0x40
[   47.366755]  kasan_save_alloc_info+0x1e/0x30
[   47.367324]  __kasan_kmalloc+0xb6/0xc0
[   47.367820]  kmalloc_trace+0x48/0xb0
[   47.368345]  ksize_uaf+0x99/0x2f0
[   47.368856]  kunit_try_run_case+0x8f/0xd0
[   47.369413]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.370136]  kthread+0x17b/0x1b0
[   47.370641]  ret_from_fork+0x22/0x30
[   47.371198] 
[   47.371516] Freed by task 263:
[   47.371855]  kasan_save_stack+0x39/0x60
[   47.372517]  kasan_set_track+0x25/0x40
[   47.373078]  kasan_save_free_info+0x2e/0x50
[   47.373611]  ____kasan_slab_free+0x175/0x1d0
[   47.374264]  __kasan_slab_free+0x12/0x20
[   47.374825]  __kmem_cache_free+0x188/0x2f0
[   47.375318]  kfree+0x78/0x120
[   47.375882]  ksize_uaf+0xb9/0x2f0
[   47.376311]  kunit_try_run_case+0x8f/0xd0
[   47.376854]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.377603]  kthread+0x17b/0x1b0
[   47.378033]  ret_from_fork+0x22/0x30
[   47.378567] 
[   47.378834] The buggy address belongs to the object at ffff88810338b000
[   47.378834]  which belongs to the cache kmalloc-128 of size 128
[   47.380057] The buggy address is located 120 bytes inside of
[   47.380057]  128-byte region [ffff88810338b000, ffff88810338b080)
[   47.381150] 
[   47.381505] The buggy address belongs to the physical page:
[   47.382067] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10338b
[   47.382994] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.383698] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   47.384351] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.385141] page dumped because: kasan: bad access detected
[   47.385836] 
[   47.386139] Memory state around the buggy address:
[   47.386734]  ffff88810338af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.387421]  ffff88810338af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.388211] >ffff88810338b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.388891]                                                                 ^
[   47.389715]  ffff88810338b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.390399]  ffff88810338b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.391092] ==================================================================

test log snippet test parser 108

Home

[   47.252073] ==================================================================
[   47.253189] BUG: KASAN: use-after-free in ksize_uaf+0xd0/0x2f0
[   47.254048] Read of size 1 at addr ffff88810338b000 by task kunit_try_catch/263
[   47.254704] 
[   47.255103] CPU: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.256299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.257413] Call Trace:
[   47.257802]  <TASK>
[   47.258164]  dump_stack_lvl+0x49/0x62
[   47.258702]  print_report+0x189/0x4b1
[   47.259268]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.260159]  kasan_report+0xde/0x160
[   47.260756]  ? ksize_uaf+0xd0/0x2f0
[   47.261375]  ? ksize_uaf+0xd0/0x2f0
[   47.262048]  ? ksize_uaf+0xd0/0x2f0
[   47.262782]  __kasan_check_byte+0x39/0x50
[   47.263276]  ksize+0x1e/0x70
[   47.263975]  ksize_uaf+0xd0/0x2f0
[   47.264486]  ? kmem_cache_oob+0x210/0x210
[   47.264961]  ? __kunit_add_resource+0xd1/0x100
[   47.265489]  ? kasan_test_init+0x13e/0x1b0
[   47.266398]  kunit_try_run_case+0x8f/0xd0
[   47.266869]  ? kunit_catch_run_case+0x80/0x80
[   47.267862]  ? kunit_try_catch_throw+0x40/0x40
[   47.268360]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.269034]  kthread+0x17b/0x1b0
[   47.269427]  ? kthread_complete_and_exit+0x30/0x30
[   47.270046]  ret_from_fork+0x22/0x30
[   47.270740]  </TASK>
[   47.271062] 
[   47.271383] Allocated by task 263:
[   47.271931]  kasan_save_stack+0x39/0x60
[   47.272977]  kasan_set_track+0x25/0x40
[   47.273475]  kasan_save_alloc_info+0x1e/0x30
[   47.274101]  __kasan_kmalloc+0xb6/0xc0
[   47.274697]  kmalloc_trace+0x48/0xb0
[   47.275235]  ksize_uaf+0x99/0x2f0
[   47.275887]  kunit_try_run_case+0x8f/0xd0
[   47.276760]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.277428]  kthread+0x17b/0x1b0
[   47.277816]  ret_from_fork+0x22/0x30
[   47.278845] 
[   47.279101] Freed by task 263:
[   47.279639]  kasan_save_stack+0x39/0x60
[   47.280251]  kasan_set_track+0x25/0x40
[   47.280883]  kasan_save_free_info+0x2e/0x50
[   47.281379]  ____kasan_slab_free+0x175/0x1d0
[   47.281890]  __kasan_slab_free+0x12/0x20
[   47.282397]  __kmem_cache_free+0x188/0x2f0
[   47.282889]  kfree+0x78/0x120
[   47.283756]  ksize_uaf+0xb9/0x2f0
[   47.284189]  kunit_try_run_case+0x8f/0xd0
[   47.284758]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.285342]  kthread+0x17b/0x1b0
[   47.285856]  ret_from_fork+0x22/0x30
[   47.286412] 
[   47.286701] The buggy address belongs to the object at ffff88810338b000
[   47.286701]  which belongs to the cache kmalloc-128 of size 128
[   47.287749] The buggy address is located 0 bytes inside of
[   47.287749]  128-byte region [ffff88810338b000, ffff88810338b080)
[   47.288858] 
[   47.289134] The buggy address belongs to the physical page:
[   47.289851] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10338b
[   47.290760] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.291518] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   47.292191] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.293040] page dumped because: kasan: bad access detected
[   47.293598] 
[   47.293809] Memory state around the buggy address:
[   47.294416]  ffff88810338af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.295160]  ffff88810338af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.295856] >ffff88810338b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.296583]                    ^
[   47.297008]  ffff88810338b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.297765]  ffff88810338b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.298540] ==================================================================

test log snippet test parser 109

Home

[   47.301208] ==================================================================
[   47.301872] BUG: KASAN: use-after-free in ksize_uaf+0xfd/0x2f0
[   47.302530] Read of size 1 at addr ffff88810338b000 by task kunit_try_catch/263
[   47.303206] 
[   47.303537] CPU: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.304427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.305261] Call Trace:
[   47.305693]  <TASK>
[   47.306069]  dump_stack_lvl+0x49/0x62
[   47.306681]  print_report+0x189/0x4b1
[   47.307173]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.307889]  kasan_report+0xde/0x160
[   47.308597]  ? ksize_uaf+0xd0/0x2f0
[   47.309124]  ? ksize_uaf+0xfd/0x2f0
[   47.309816]  ? ksize_uaf+0xfd/0x2f0
[   47.310335]  __asan_load1+0x62/0x70
[   47.310892]  ksize_uaf+0xfd/0x2f0
[   47.311421]  ? kmem_cache_oob+0x210/0x210
[   47.312052]  ? __kunit_add_resource+0xd1/0x100
[   47.312694]  ? kasan_test_init+0x13e/0x1b0
[   47.313667]  kunit_try_run_case+0x8f/0xd0
[   47.314687]  ? kunit_catch_run_case+0x80/0x80
[   47.315263]  ? kunit_try_catch_throw+0x40/0x40
[   47.315843]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.316659]  kthread+0x17b/0x1b0
[   47.317134]  ? kthread_complete_and_exit+0x30/0x30
[   47.317660]  ret_from_fork+0x22/0x30
[   47.318415]  </TASK>
[   47.319354] 
[   47.319664] Allocated by task 263:
[   47.320014]  kasan_save_stack+0x39/0x60
[   47.320509]  kasan_set_track+0x25/0x40
[   47.321119]  kasan_save_alloc_info+0x1e/0x30
[   47.321660]  __kasan_kmalloc+0xb6/0xc0
[   47.322225]  kmalloc_trace+0x48/0xb0
[   47.322787]  ksize_uaf+0x99/0x2f0
[   47.323306]  kunit_try_run_case+0x8f/0xd0
[   47.323822]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.324503]  kthread+0x17b/0x1b0
[   47.325040]  ret_from_fork+0x22/0x30
[   47.325611] 
[   47.325860] Freed by task 263:
[   47.326326]  kasan_save_stack+0x39/0x60
[   47.326815]  kasan_set_track+0x25/0x40
[   47.327487]  kasan_save_free_info+0x2e/0x50
[   47.328036]  ____kasan_slab_free+0x175/0x1d0
[   47.328628]  __kasan_slab_free+0x12/0x20
[   47.329227]  __kmem_cache_free+0x188/0x2f0
[   47.329819]  kfree+0x78/0x120
[   47.330311]  ksize_uaf+0xb9/0x2f0
[   47.330770]  kunit_try_run_case+0x8f/0xd0
[   47.331427]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.332106]  kthread+0x17b/0x1b0
[   47.332560]  ret_from_fork+0x22/0x30
[   47.333080] 
[   47.333355] The buggy address belongs to the object at ffff88810338b000
[   47.333355]  which belongs to the cache kmalloc-128 of size 128
[   47.334595] The buggy address is located 0 bytes inside of
[   47.334595]  128-byte region [ffff88810338b000, ffff88810338b080)
[   47.335629] 
[   47.335952] The buggy address belongs to the physical page:
[   47.336538] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10338b
[   47.337507] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.338152] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   47.338892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.339904] page dumped because: kasan: bad access detected
[   47.340504] 
[   47.340779] Memory state around the buggy address:
[   47.341344]  ffff88810338af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.342067]  ffff88810338af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.342837] >ffff88810338b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.343596]                    ^
[   47.344049]  ffff88810338b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.344733]  ffff88810338b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.345525] ==================================================================

test log snippet test parser 110

Home

[   45.019130] ==================================================================
[   45.020706] BUG: KASAN: use-after-free in pagealloc_uaf+0xe7/0x1e0
[   45.021562] Read of size 1 at addr ffff888103720000 by task kunit_try_catch/232
[   45.022092] 
[   45.022400] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   45.023398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.024348] Call Trace:
[   45.024887]  <TASK>
[   45.025335]  dump_stack_lvl+0x49/0x62
[   45.025822]  print_report+0x189/0x4b1
[   45.026362]  ? kasan_addr_to_slab+0xd/0xb0
[   45.026964]  kasan_report+0xde/0x160
[   45.027483]  ? pagealloc_uaf+0xe7/0x1e0
[   45.028047]  ? pagealloc_uaf+0xe7/0x1e0
[   45.028692]  __asan_load1+0x62/0x70
[   45.029216]  pagealloc_uaf+0xe7/0x1e0
[   45.029766]  ? krealloc_more_oob+0x20/0x20
[   45.030369]  ? __kunit_add_resource+0xd1/0x100
[   45.031000]  ? kasan_test_init+0x13e/0x1b0
[   45.031627]  kunit_try_run_case+0x8f/0xd0
[   45.032192]  ? kunit_catch_run_case+0x80/0x80
[   45.032819]  ? kunit_try_catch_throw+0x40/0x40
[   45.033421]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   45.034097]  kthread+0x17b/0x1b0
[   45.034619]  ? kthread_complete_and_exit+0x30/0x30
[   45.035202]  ret_from_fork+0x22/0x30
[   45.035721]  </TASK>
[   45.036080] 
[   45.036399] The buggy address belongs to the physical page:
[   45.036932] page:(____ptrval____) refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x103720
[   45.038107] flags: 0x200000000000000(node=0|zone=2)
[   45.038765] raw: 0200000000000000 ffff88817fffbba8 ffff88817fffbba8 0000000000000000
[   45.039687] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[   45.040359] page dumped because: kasan: bad access detected
[   45.041006] 
[   45.041240] Memory state around the buggy address:
[   45.041821]  ffff88810371ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.042621]  ffff88810371ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.043358] >ffff888103720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.044050]                    ^
[   45.044591]  ffff888103720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.045222]  ffff888103720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.046124] ==================================================================

test log snippet test parser 111

Home

[   47.697591] ==================================================================
[   47.698962] BUG: KASAN: use-after-free in strchr+0x14/0x60
[   47.699699] Read of size 1 at addr ffff888103388410 by task kunit_try_catch/269
[   47.700428] 
[   47.700804] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.702159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.703424] Call Trace:
[   47.704049]  <TASK>
[   47.704391]  dump_stack_lvl+0x49/0x62
[   47.704973]  print_report+0x189/0x4b1
[   47.705483]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.706378]  kasan_report+0xde/0x160
[   47.707124]  ? strchr+0x14/0x60
[   47.707596]  ? strchr+0x14/0x60
[   47.708055]  __asan_load1+0x62/0x70
[   47.708435]  strchr+0x14/0x60
[   47.708989]  kasan_strings+0xd9/0x4e0
[   47.709462]  ? kmalloc_oob_right+0x310/0x310
[   47.710346]  ? __kunit_add_resource+0xd1/0x100
[   47.710878]  ? kasan_test_init+0x13e/0x1b0
[   47.711547]  kunit_try_run_case+0x8f/0xd0
[   47.712206]  ? kunit_catch_run_case+0x80/0x80
[   47.713007]  ? kunit_try_catch_throw+0x40/0x40
[   47.713562]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.714271]  kthread+0x17b/0x1b0
[   47.714859]  ? kthread_complete_and_exit+0x30/0x30
[   47.715463]  ret_from_fork+0x22/0x30
[   47.716215]  </TASK>
[   47.716611] 
[   47.716888] Allocated by task 269:
[   47.717303]  kasan_save_stack+0x39/0x60
[   47.717867]  kasan_set_track+0x25/0x40
[   47.718528]  kasan_save_alloc_info+0x1e/0x30
[   47.719276]  __kasan_kmalloc+0xb6/0xc0
[   47.720006]  kmalloc_trace+0x48/0xb0
[   47.720638]  kasan_strings+0x99/0x4e0
[   47.721146]  kunit_try_run_case+0x8f/0xd0
[   47.721790]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.722347]  kthread+0x17b/0x1b0
[   47.722907]  ret_from_fork+0x22/0x30
[   47.723332] 
[   47.723547] Freed by task 269:
[   47.724027]  kasan_save_stack+0x39/0x60
[   47.724535]  kasan_set_track+0x25/0x40
[   47.725085]  kasan_save_free_info+0x2e/0x50
[   47.725567]  ____kasan_slab_free+0x175/0x1d0
[   47.726164]  __kasan_slab_free+0x12/0x20
[   47.726740]  __kmem_cache_free+0x188/0x2f0
[   47.727226]  kfree+0x78/0x120
[   47.727835]  kasan_strings+0xbd/0x4e0
[   47.728480]  kunit_try_run_case+0x8f/0xd0
[   47.729001]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.729640]  kthread+0x17b/0x1b0
[   47.730094]  ret_from_fork+0x22/0x30
[   47.730595] 
[   47.730873] The buggy address belongs to the object at ffff888103388400
[   47.730873]  which belongs to the cache kmalloc-32 of size 32
[   47.731828] The buggy address is located 16 bytes inside of
[   47.731828]  32-byte region [ffff888103388400, ffff888103388420)
[   47.733027] 
[   47.733313] The buggy address belongs to the physical page:
[   47.733877] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.734850] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.735410] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.736218] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.737098] page dumped because: kasan: bad access detected
[   47.737738] 
[   47.738005] Memory state around the buggy address:
[   47.738421]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.739315]  ffff888103388380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.740136] >ffff888103388400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   47.740763]                          ^
[   47.741236]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.742152]  ffff888103388500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.742914] ==================================================================

test log snippet test parser 112

Home

[   47.796205] ==================================================================
[   47.796972] BUG: KASAN: use-after-free in strcmp+0x22/0x60
[   47.797741] Read of size 1 at addr ffff888103388410 by task kunit_try_catch/269
[   47.799716] 
[   47.800013] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.800795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.801695] Call Trace:
[   47.802108]  <TASK>
[   47.802531]  dump_stack_lvl+0x49/0x62
[   47.803047]  print_report+0x189/0x4b1
[   47.803613]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.804224]  kasan_report+0xde/0x160
[   47.804907]  ? strcmp+0x22/0x60
[   47.805440]  ? strcmp+0x22/0x60
[   47.805902]  __asan_load1+0x62/0x70
[   47.806494]  strcmp+0x22/0x60
[   47.806988]  kasan_strings+0x14d/0x4e0
[   47.807475]  ? kmalloc_oob_right+0x310/0x310
[   47.808018]  ? __kunit_add_resource+0xd1/0x100
[   47.808544]  ? kasan_test_init+0x13e/0x1b0
[   47.809118]  kunit_try_run_case+0x8f/0xd0
[   47.809599]  ? kunit_catch_run_case+0x80/0x80
[   47.810177]  ? kunit_try_catch_throw+0x40/0x40
[   47.811008]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.811639]  kthread+0x17b/0x1b0
[   47.812258]  ? kthread_complete_and_exit+0x30/0x30
[   47.813006]  ret_from_fork+0x22/0x30
[   47.813571]  </TASK>
[   47.813858] 
[   47.814469] Allocated by task 269:
[   47.814810]  kasan_save_stack+0x39/0x60
[   47.815254]  kasan_set_track+0x25/0x40
[   47.816005]  kasan_save_alloc_info+0x1e/0x30
[   47.816499]  __kasan_kmalloc+0xb6/0xc0
[   47.817053]  kmalloc_trace+0x48/0xb0
[   47.817594]  kasan_strings+0x99/0x4e0
[   47.818195]  kunit_try_run_case+0x8f/0xd0
[   47.818732]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.819437]  kthread+0x17b/0x1b0
[   47.820185]  ret_from_fork+0x22/0x30
[   47.820643] 
[   47.821302] Freed by task 269:
[   47.821721]  kasan_save_stack+0x39/0x60
[   47.822378]  kasan_set_track+0x25/0x40
[   47.823058]  kasan_save_free_info+0x2e/0x50
[   47.823707]  ____kasan_slab_free+0x175/0x1d0
[   47.824684]  __kasan_slab_free+0x12/0x20
[   47.825766]  __kmem_cache_free+0x188/0x2f0
[   47.826407]  kfree+0x78/0x120
[   47.826832]  kasan_strings+0xbd/0x4e0
[   47.827463]  kunit_try_run_case+0x8f/0xd0
[   47.827993]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.828849]  kthread+0x17b/0x1b0
[   47.829383]  ret_from_fork+0x22/0x30
[   47.830076] 
[   47.830363] The buggy address belongs to the object at ffff888103388400
[   47.830363]  which belongs to the cache kmalloc-32 of size 32
[   47.831457] The buggy address is located 16 bytes inside of
[   47.831457]  32-byte region [ffff888103388400, ffff888103388420)
[   47.832558] 
[   47.832880] The buggy address belongs to the physical page:
[   47.833595] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.834715] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.835309] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.836377] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.837301] page dumped because: kasan: bad access detected
[   47.837998] 
[   47.838321] Memory state around the buggy address:
[   47.838960]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.839720]  ffff888103388380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.840341] >ffff888103388400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   47.841149]                          ^
[   47.841539]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.842185]  ffff888103388500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.842793] ==================================================================

test log snippet test parser 113

Home

[   47.889672] ==================================================================
[   47.890986] BUG: KASAN: use-after-free in strlen+0xf/0x50
[   47.891681] Read of size 1 at addr ffff888103388410 by task kunit_try_catch/269
[   47.892327] 
[   47.892619] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.893736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.894601] Call Trace:
[   47.895099]  <TASK>
[   47.895434]  dump_stack_lvl+0x49/0x62
[   47.896124]  print_report+0x189/0x4b1
[   47.896695]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.897349]  kasan_report+0xde/0x160
[   47.898170]  ? strlen+0xf/0x50
[   47.898649]  ? strlen+0xf/0x50
[   47.899243]  __asan_load1+0x62/0x70
[   47.899819]  strlen+0xf/0x50
[   47.900375]  kasan_strings+0x1bf/0x4e0
[   47.900956]  ? kmalloc_oob_right+0x310/0x310
[   47.901518]  ? __kunit_add_resource+0xd1/0x100
[   47.902168]  ? kasan_test_init+0x13e/0x1b0
[   47.902554]  kunit_try_run_case+0x8f/0xd0
[   47.902907]  ? kunit_catch_run_case+0x80/0x80
[   47.903506]  ? kunit_try_catch_throw+0x40/0x40
[   47.904282]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.905230]  kthread+0x17b/0x1b0
[   47.905794]  ? kthread_complete_and_exit+0x30/0x30
[   47.906618]  ret_from_fork+0x22/0x30
[   47.907248]  </TASK>
[   47.907634] 
[   47.907932] Allocated by task 269:
[   47.908323]  kasan_save_stack+0x39/0x60
[   47.909027]  kasan_set_track+0x25/0x40
[   47.909617]  kasan_save_alloc_info+0x1e/0x30
[   47.910286]  __kasan_kmalloc+0xb6/0xc0
[   47.910840]  kmalloc_trace+0x48/0xb0
[   47.911382]  kasan_strings+0x99/0x4e0
[   47.911915]  kunit_try_run_case+0x8f/0xd0
[   47.912589]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.913276]  kthread+0x17b/0x1b0
[   47.913816]  ret_from_fork+0x22/0x30
[   47.914325] 
[   47.914671] Freed by task 269:
[   47.915074]  kasan_save_stack+0x39/0x60
[   47.915747]  kasan_set_track+0x25/0x40
[   47.916316]  kasan_save_free_info+0x2e/0x50
[   47.916899]  ____kasan_slab_free+0x175/0x1d0
[   47.917639]  __kasan_slab_free+0x12/0x20
[   47.918258]  __kmem_cache_free+0x188/0x2f0
[   47.918917]  kfree+0x78/0x120
[   47.919404]  kasan_strings+0xbd/0x4e0
[   47.919998]  kunit_try_run_case+0x8f/0xd0
[   47.920625]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.921204]  kthread+0x17b/0x1b0
[   47.921732]  ret_from_fork+0x22/0x30
[   47.922527] 
[   47.923020] The buggy address belongs to the object at ffff888103388400
[   47.923020]  which belongs to the cache kmalloc-32 of size 32
[   47.924345] The buggy address is located 16 bytes inside of
[   47.924345]  32-byte region [ffff888103388400, ffff888103388420)
[   47.925694] 
[   47.925907] The buggy address belongs to the physical page:
[   47.926846] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.927805] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.928516] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.929296] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.930043] page dumped because: kasan: bad access detected
[   47.930618] 
[   47.930881] Memory state around the buggy address:
[   47.931432]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.932134]  ffff888103388380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.932826] >ffff888103388400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   47.933604]                          ^
[   47.934052]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.934806]  ffff888103388500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.935441] ==================================================================

test log snippet test parser 114

Home

[   47.845183] ==================================================================
[   47.845971] BUG: KASAN: use-after-free in strncmp+0x32/0x80
[   47.846562] Read of size 1 at addr ffff888103388410 by task kunit_try_catch/269
[   47.847263] 
[   47.847556] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.848458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.849281] Call Trace:
[   47.849608]  <TASK>
[   47.850046]  dump_stack_lvl+0x49/0x62
[   47.850602]  print_report+0x189/0x4b1
[   47.851283]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.851879]  kasan_report+0xde/0x160
[   47.852404]  ? kasan_report.cold+0xc/0x11
[   47.853072]  ? strncmp+0x32/0x80
[   47.853532]  ? strncmp+0x32/0x80
[   47.853934]  __asan_load1+0x62/0x70
[   47.854563]  strncmp+0x32/0x80
[   47.855144]  kasan_strings+0x18c/0x4e0
[   47.855852]  ? kmalloc_oob_right+0x310/0x310
[   47.856438]  ? __kunit_add_resource+0xd1/0x100
[   47.857236]  ? kasan_test_init+0x13e/0x1b0
[   47.857830]  kunit_try_run_case+0x8f/0xd0
[   47.858357]  ? kunit_catch_run_case+0x80/0x80
[   47.859069]  ? kunit_try_catch_throw+0x40/0x40
[   47.859723]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.860308]  kthread+0x17b/0x1b0
[   47.860810]  ? kthread_complete_and_exit+0x30/0x30
[   47.861480]  ret_from_fork+0x22/0x30
[   47.862061]  </TASK>
[   47.862403] 
[   47.862760] Allocated by task 269:
[   47.863158]  kasan_save_stack+0x39/0x60
[   47.863803]  kasan_set_track+0x25/0x40
[   47.864330]  kasan_save_alloc_info+0x1e/0x30
[   47.864862]  __kasan_kmalloc+0xb6/0xc0
[   47.865445]  kmalloc_trace+0x48/0xb0
[   47.866107]  kasan_strings+0x99/0x4e0
[   47.866647]  kunit_try_run_case+0x8f/0xd0
[   47.867215]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.868030]  kthread+0x17b/0x1b0
[   47.868472]  ret_from_fork+0x22/0x30
[   47.869049] 
[   47.869381] Freed by task 269:
[   47.869703]  kasan_save_stack+0x39/0x60
[   47.870341]  kasan_set_track+0x25/0x40
[   47.871017]  kasan_save_free_info+0x2e/0x50
[   47.871545]  ____kasan_slab_free+0x175/0x1d0
[   47.872107]  __kasan_slab_free+0x12/0x20
[   47.872639]  __kmem_cache_free+0x188/0x2f0
[   47.873298]  kfree+0x78/0x120
[   47.873750]  kasan_strings+0xbd/0x4e0
[   47.874289]  kunit_try_run_case+0x8f/0xd0
[   47.874803]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.875412]  kthread+0x17b/0x1b0
[   47.875835]  ret_from_fork+0x22/0x30
[   47.876229] 
[   47.876492] The buggy address belongs to the object at ffff888103388400
[   47.876492]  which belongs to the cache kmalloc-32 of size 32
[   47.877723] The buggy address is located 16 bytes inside of
[   47.877723]  32-byte region [ffff888103388400, ffff888103388420)
[   47.878646] 
[   47.878918] The buggy address belongs to the physical page:
[   47.879553] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.880556] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.881379] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.882105] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.882995] page dumped because: kasan: bad access detected
[   47.883473] 
[   47.883789] Memory state around the buggy address:
[   47.884366]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.885191]  ffff888103388380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.885931] >ffff888103388400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   47.886588]                          ^
[   47.887104]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.887883]  ffff888103388500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.888544] ==================================================================

test log snippet test parser 115

Home

[   47.937319] ==================================================================
[   47.938106] BUG: KASAN: use-after-free in strnlen+0x2d/0x50
[   47.938805] Read of size 1 at addr ffff888103388410 by task kunit_try_catch/269
[   47.939532] 
[   47.939837] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.940640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.941429] Call Trace:
[   47.941859]  <TASK>
[   47.942298]  dump_stack_lvl+0x49/0x62
[   47.942892]  print_report+0x189/0x4b1
[   47.943495]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.944140]  kasan_report+0xde/0x160
[   47.944641]  ? kasan_report.cold+0xc/0x11
[   47.945153]  ? strnlen+0x2d/0x50
[   47.945714]  ? strnlen+0x2d/0x50
[   47.946179]  __asan_load1+0x62/0x70
[   47.946758]  strnlen+0x2d/0x50
[   47.947216]  kasan_strings+0x1f7/0x4e0
[   47.947817]  ? kmalloc_oob_right+0x310/0x310
[   47.948489]  ? __kunit_add_resource+0xd1/0x100
[   47.949070]  ? kasan_test_init+0x13e/0x1b0
[   47.949680]  kunit_try_run_case+0x8f/0xd0
[   47.950268]  ? kunit_catch_run_case+0x80/0x80
[   47.950869]  ? kunit_try_catch_throw+0x40/0x40
[   47.951509]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.952190]  kthread+0x17b/0x1b0
[   47.952670]  ? kthread_complete_and_exit+0x30/0x30
[   47.953276]  ret_from_fork+0x22/0x30
[   47.954109]  </TASK>
[   47.954435] 
[   47.954722] Allocated by task 269:
[   47.955182]  kasan_save_stack+0x39/0x60
[   47.955639]  kasan_set_track+0x25/0x40
[   47.956219]  kasan_save_alloc_info+0x1e/0x30
[   47.956707]  __kasan_kmalloc+0xb6/0xc0
[   47.957342]  kmalloc_trace+0x48/0xb0
[   47.957803]  kasan_strings+0x99/0x4e0
[   47.958423]  kunit_try_run_case+0x8f/0xd0
[   47.958966]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.959591]  kthread+0x17b/0x1b0
[   47.960058]  ret_from_fork+0x22/0x30
[   47.960582] 
[   47.960857] Freed by task 269:
[   47.961260]  kasan_save_stack+0x39/0x60
[   47.961735]  kasan_set_track+0x25/0x40
[   47.962325]  kasan_save_free_info+0x2e/0x50
[   47.962893]  ____kasan_slab_free+0x175/0x1d0
[   47.963536]  __kasan_slab_free+0x12/0x20
[   47.964088]  __kmem_cache_free+0x188/0x2f0
[   47.964658]  kfree+0x78/0x120
[   47.965119]  kasan_strings+0xbd/0x4e0
[   47.965663]  kunit_try_run_case+0x8f/0xd0
[   47.966188]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.966773]  kthread+0x17b/0x1b0
[   47.967333]  ret_from_fork+0x22/0x30
[   47.967805] 
[   47.968105] The buggy address belongs to the object at ffff888103388400
[   47.968105]  which belongs to the cache kmalloc-32 of size 32
[   47.969268] The buggy address is located 16 bytes inside of
[   47.969268]  32-byte region [ffff888103388400, ffff888103388420)
[   47.970296] 
[   47.970647] The buggy address belongs to the physical page:
[   47.971208] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.972223] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.972965] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.973786] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.974536] page dumped because: kasan: bad access detected
[   47.975129] 
[   47.975377] Memory state around the buggy address:
[   47.975931]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.976650]  ffff888103388380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.977327] >ffff888103388400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   47.978106]                          ^
[   47.978531]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.979331]  ffff888103388500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.980009] ==================================================================

test log snippet test parser 116

Home

[   47.744638] ==================================================================
[   47.746744] BUG: KASAN: use-after-free in strrchr+0x1a/0x40
[   47.747985] Read of size 1 at addr ffff888103388410 by task kunit_try_catch/269
[   47.748842] 
[   47.749540] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.125-rc1 #1
[   47.750932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.751956] Call Trace:
[   47.752494]  <TASK>
[   47.753011]  dump_stack_lvl+0x49/0x62
[   47.753550]  print_report+0x189/0x4b1
[   47.754066]  ? kasan_complete_mode_report_info+0x7c/0x200
[   47.754732]  kasan_report+0xde/0x160
[   47.755275]  ? strrchr+0x1a/0x40
[   47.755876]  ? strrchr+0x1a/0x40
[   47.756416]  __asan_load1+0x62/0x70
[   47.757103]  strrchr+0x1a/0x40
[   47.757599]  kasan_strings+0x112/0x4e0
[   47.758381]  ? kmalloc_oob_right+0x310/0x310
[   47.759006]  ? __kunit_add_resource+0xd1/0x100
[   47.759685]  ? kasan_test_init+0x13e/0x1b0
[   47.760260]  kunit_try_run_case+0x8f/0xd0
[   47.760900]  ? kunit_catch_run_case+0x80/0x80
[   47.761559]  ? kunit_try_catch_throw+0x40/0x40
[   47.762082]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.762656]  kthread+0x17b/0x1b0
[   47.763133]  ? kthread_complete_and_exit+0x30/0x30
[   47.763715]  ret_from_fork+0x22/0x30
[   47.764232]  </TASK>
[   47.764665] 
[   47.764984] Allocated by task 269:
[   47.765600]  kasan_save_stack+0x39/0x60
[   47.766177]  kasan_set_track+0x25/0x40
[   47.766609]  kasan_save_alloc_info+0x1e/0x30
[   47.767335]  __kasan_kmalloc+0xb6/0xc0
[   47.767982]  kmalloc_trace+0x48/0xb0
[   47.768574]  kasan_strings+0x99/0x4e0
[   47.769054]  kunit_try_run_case+0x8f/0xd0
[   47.769661]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.770340]  kthread+0x17b/0x1b0
[   47.770925]  ret_from_fork+0x22/0x30
[   47.771528] 
[   47.771792] Freed by task 269:
[   47.772218]  kasan_save_stack+0x39/0x60
[   47.772813]  kasan_set_track+0x25/0x40
[   47.773334]  kasan_save_free_info+0x2e/0x50
[   47.773893]  ____kasan_slab_free+0x175/0x1d0
[   47.774720]  __kasan_slab_free+0x12/0x20
[   47.775356]  __kmem_cache_free+0x188/0x2f0
[   47.776131]  kfree+0x78/0x120
[   47.776595]  kasan_strings+0xbd/0x4e0
[   47.777287]  kunit_try_run_case+0x8f/0xd0
[   47.777820]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   47.778553]  kthread+0x17b/0x1b0
[   47.778887]  ret_from_fork+0x22/0x30
[   47.779429] 
[   47.779896] The buggy address belongs to the object at ffff888103388400
[   47.779896]  which belongs to the cache kmalloc-32 of size 32
[   47.781244] The buggy address is located 16 bytes inside of
[   47.781244]  32-byte region [ffff888103388400, ffff888103388420)
[   47.782515] 
[   47.782883] The buggy address belongs to the physical page:
[   47.783624] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103388
[   47.784617] flags: 0x200000000000200(slab|node=0|zone=2)
[   47.785272] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   47.786188] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.786856] page dumped because: kasan: bad access detected
[   47.787448] 
[   47.787684] Memory state around the buggy address:
[   47.788264]  ffff888103388300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.788921]  ffff888103388380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.789979] >ffff888103388400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   47.790702]                          ^
[   47.791317]  ffff888103388480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.792209]  ffff888103388500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.793040] ==================================================================

test log snippet test parser 117

Home

------------[ cut here ]------------
[   53.186821] WARNING: CPU: 0 PID: 498 at mm/util.c:596 kvmalloc_node+0xcd/0xe0
[   53.188788] Modules linked in:
[   53.189765] CPU: 0 PID: 498 Comm: unshare_test Not tainted 6.1.125-rc1 #1
[   53.190455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.191421] RIP: 0010:kvmalloc_node+0xcd/0xe0
[   53.192012] Code: 03 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89
[   53.193682] RSP: 0018:ffffbea40061be00 EFLAGS: 00010246
[   53.194922] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   53.196636] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[   53.197862] RBP: ffffbea40061be18 R08: 0000000000000040 R09: 0000000000000246
[   53.199209] R10: 0000000000400cc0 R11: 0000000000000038 R12: 0000000200002000
[   53.200248] R13: 00000000ffffffff R14: ffff9f9fc01be440 R15: ffff9f9fc01be3c0
[   53.201086] FS:  00007fb3dc9c1740(0000) GS:ffff9fa03bc00000(0000) knlGS:0000000000000000
[   53.202625] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   53.203459] CR2: 00007fb3dca6f900 CR3: 000000010198a000 CR4: 00000000000006f0
[   53.204832] Call Trace:
[   53.206675]  <TASK>
[   53.207392]  ? show_regs.cold+0x1a/0x1f
[   53.207999]  ? __warn+0x7b/0xd0
[   53.208827]  ? kvmalloc_node+0xcd/0xe0
[   53.209495]  ? report_bug+0xdb/0x150
[   53.209778]  ? handle_bug+0x42/0x80
[   53.210080]  ? exc_invalid_op+0x18/0x70
[   53.211332]  ? asm_exc_invalid_op+0x1b/0x20
[   53.211952]  ? kvmalloc_node+0xcd/0xe0
[   53.212699]  alloc_fdtable+0x74/0x100
[   53.213563]  expand_files+0x62/0x300
[   53.213882]  ? arch_restore_msi_irqs+0x10/0x10
[   53.214822]  ? lapic_next_event+0x1b/0x30
[   53.215200]  ? clockevents_program_event+0x9b/0x100
[   53.216034]  ksys_dup3+0x70/0x110
[   53.216784]  __x64_sys_dup2+0x26/0xa0
[   53.217162]  x64_sys_call+0x199d/0x1c40
[   53.217898]  do_syscall_64+0x35/0x80
[   53.218705]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[   53.219481] RIP: 0033:0x7fb3dcab9c17
[   53.220815] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   53.222339] RSP: 002b:00007fff51b48418 EFLAGS: 00000206 ORIG_RAX: 0000000000000021
[   53.223474] RAX: ffffffffffffffda RBX: 00007fff51b48c78 RCX: 00007fb3dcab9c17
[   53.224051] RDX: 00007fff51b48440 RSI: 0000000040000038 RDI: 0000000000000002
[   53.224812] RBP: 00007fff51b48640 R08: 0000000000000064 R09: 0000000000000000
[   53.226118] R10: 00007fb3dc9d6170 R11: 0000000000000206 R12: 0000000000000000
[   53.227087] R13: 00007fff51b48c88 R14: 00007fb3dcbef000 R15: 00005619bcfebdd8
[   53.227612]  </TASK>
[   53.228134] ---[ end trace 0000000000000000 ]---