Home
Home
Home
Home
Home
Home
Home
ftrace_ftracetest-ktap_ftrace__function_pid_filters fail
Home
Home
Home
Home
Home
Home
Home
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 265130us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 261201us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 263958us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
Home
epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 3115us with a timeout equal to zero
Home
Home
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-713018.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-3f6c93.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-1c9a53.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-c24a1a.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccGkOaBq.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cciMK30P.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccj5LAGW.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccoDn8dL.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cctOsfM4.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccT4R1Vh.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccwpmCSn.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cczLrXFW.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccHWkk7f.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccnr0PAx.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccOfykyv.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccQ9ioPE.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccTyP51n.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cculNzR1.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccXGwcQB.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cczR61kf.o: warning: relocation in read-only section `.text'
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1
/builds/linux/fs/overlayfs/copy_up.c:1117:12: error: stack frame size (1040) exceeds limit (1024) in 'ovl_copy_up_flags' [-Werror,-Wframe-larger-than]
1117 | static int ovl_copy_up_flags(struct dentry *dentry, int flags)
| ^
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccXvJPIe.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccgmsGsf.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
------------[ cut here ]------------
[ 4.387444] sd 0:0:0:1: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA
[ 4.387454] sd 0:0:0:1: [sdb] Preferred minimum I/O size 786432 bytes
[ 4.387459] sd 0:0:0:1: [sdb] Optimal transfer size 786432 bytes
[ 4.390720] sdb: sdb1 sdb2
[ 4.395127] WARNING: CPU: 6 PID: 411 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[ 4.395141] Modules linked in:
[ 4.404619] sd 0:0:0:1: [sdb] Attached SCSI disk
[ 4.410208] rtc_pm8xxx qcom_vadc_common qcom_pon qcom_stats soundwire_bus ecc i2c_qcom_geni reset_qcom_pdc camcc_sdm845 drm_display_helper coresight_stm mc spi_geni_qcom gpi qcom_rng stm_core phy_qcom_qmp_combo phy_qcom_qmp_usb coresight_replicator
[ 4.418824] pci 0000:00:00.0: BAR 14: assigned [mem 0x60300000-0x603fffff]
[ 4.419094] coresight_funnel typec
[ 4.427517] pci 0000:00:00.0: BAR 0: assigned [mem 0x60400000-0x60400fff]
[ 4.430584] coresight_tmc
[ 4.435236] pci 0000:01:00.0: BAR 0: assigned [mem 0x60300000-0x60301fff 64bit]
[ 4.457433] cfg80211 qcom_q6v5_mss phy_qcom_qusb2
[ 4.464414] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[ 4.467863] qrtr rfkill phy_qcom_qmp_ufs
[ 4.474704] pci 0000:00:00.0: bridge window [mem 0x60300000-0x603fffff]
[ 4.477426] coresight qcrypto authenc
[ 4.484793] pci_bus 0000:00: resource 4 [io 0x0000-0xfffff]
[ 4.489615] libdes ufs_qcom phy_qcom_qmp_pcie
[ 4.494877] pci_bus 0000:00: resource 5 [mem 0x60300000-0x60ffffff]
[ 4.498909] icc_osm_l3 qcom_q6v5_pas lmh qcom_wdt
[ 4.505748] pci_bus 0000:01: resource 1 [mem 0x60300000-0x603fffff]
[ 4.509522] qcom_pil_info qcom_q6v5 slim_qcom_ngd_ctrl
[ 4.515362] pcieport 0000:00:00.0: Adding to iommu group 9
[ 4.519695] qcom_sysmon slimbus pdr_interface display_connector qcom_common
[ 4.526785] pcieport 0000:00:00.0: PME: Signaling with IRQ 169
[ 4.530829] qcom_glink_smem icc_bwmon llcc_qcom mdt_loader drm_kms_helper
[ 4.537677] pcieport 0000:00:00.0: AER: enabled with IRQ 169
[ 4.542399] qmi_helpers drm backlight rmtfs_mem socinfo
[ 4.548000] pci 0000:01:00.0: enabling device (0000 -> 0002)
[ 4.555021]
[ 4.555025] CPU: 6 PID: 411 Comm: kworker/u16:8 Not tainted 6.6.72-rc1 #1
[ 4.560969] pci 0000:01:00.0: quirk_usb_early_handoff+0x0/0xa28 took 12682 usecs
[ 4.567812] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 4.567815] Workqueue: devfreq_wq devfreq_monitor
[ 4.610854] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 4.617870] pc : blk_mq_unquiesce_queue+0x98/0xa0
[ 4.622611] lr : blk_mq_unquiesce_queue+0x24/0xa0
[ 4.627351] sp : ffff800081563bb0
[ 4.630699] x29: ffff800081563bb0 x28: 0000000000000000 x27: ffff7b2d00303468
[ 4.637891] x26: 0000000000000000 x25: 0000000000000000 x24: 00000000000f4240
[ 4.645083] x23: 00000000f05c5362 x22: 0000000000000000 x21: ffff7b2d09028098
[ 4.652274] x20: 0000000000000000 x19: ffff7b2d09028000 x18: ffff7b2d7d78d0ac
[ 4.659466] x17: 0000000000090030 x16: 0000000000000000 x15: 0000000000000000
[ 4.666656] x14: 0000000000000040 x13: 00000000000001fb x12: 0000000000000002
[ 4.673847] x11: fffffffff37a2b79 x10: 0000000000000001 x9 : ffffffffffffffff
[ 4.681037] x8 : ffff800081563b00 x7 : ffff7b2d00e6c090 x6 : ffff800081563b00
[ 4.688226] x5 : fffffffff37a2b79 x4 : ffff7b2d074da000 x3 : 0000000000000001
[ 4.695416] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[ 4.702606] Call trace:
[ 4.705084] blk_mq_unquiesce_queue+0x98/0xa0
[ 4.709483] blk_mq_unquiesce_tagset+0x58/0x84
[ 4.713967] ufshcd_devfreq_scale+0x210/0x350
[ 4.718370] ufshcd_devfreq_target+0xf0/0x1a4
[ 4.722767] devfreq_set_target+0x90/0x194
[ 4.726906] devfreq_update_target+0xc0/0xd8
[ 4.731217] devfreq_monitor+0x34/0x9c
[ 4.734999] process_one_work+0x144/0x29c
[ 4.739044] worker_thread+0x324/0x43c
[ 4.742826] kthread+0x110/0x114
[ 4.746082] ret_from_fork+0x10/0x20
[ 4.749697] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 4.387444] sd 0:0:0:1: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA
[ 4.387454] sd 0:0:0:1: [sdb] Preferred minimum I/O size 786432 bytes
[ 4.387459] sd 0:0:0:1: [sdb] Optimal transfer size 786432 bytes
[ 4.390720] sdb: sdb1 sdb2
[ 4.395127] WARNING: CPU: 6 PID: 411 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[ 4.395141] Modules linked in:
[ 4.404619] sd 0:0:0:1: [sdb] Attached SCSI disk
[ 4.410208] rtc_pm8xxx qcom_vadc_common qcom_pon qcom_stats soundwire_bus ecc i2c_qcom_geni reset_qcom_pdc camcc_sdm845 drm_display_helper coresight_stm mc spi_geni_qcom gpi qcom_rng stm_core phy_qcom_qmp_combo phy_qcom_qmp_usb coresight_replicator
[ 4.418824] pci 0000:00:00.0: BAR 14: assigned [mem 0x60300000-0x603fffff]
[ 4.419094] coresight_funnel typec
[ 4.427517] pci 0000:00:00.0: BAR 0: assigned [mem 0x60400000-0x60400fff]
[ 4.430584] coresight_tmc
[ 4.435236] pci 0000:01:00.0: BAR 0: assigned [mem 0x60300000-0x60301fff 64bit]
[ 4.457433] cfg80211 qcom_q6v5_mss phy_qcom_qusb2
[ 4.464414] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[ 4.467863] qrtr rfkill phy_qcom_qmp_ufs
[ 4.474704] pci 0000:00:00.0: bridge window [mem 0x60300000-0x603fffff]
[ 4.477426] coresight qcrypto authenc
[ 4.484793] pci_bus 0000:00: resource 4 [io 0x0000-0xfffff]
[ 4.489615] libdes ufs_qcom phy_qcom_qmp_pcie
[ 4.494877] pci_bus 0000:00: resource 5 [mem 0x60300000-0x60ffffff]
[ 4.498909] icc_osm_l3 qcom_q6v5_pas lmh qcom_wdt
[ 4.505748] pci_bus 0000:01: resource 1 [mem 0x60300000-0x603fffff]
[ 4.509522] qcom_pil_info qcom_q6v5 slim_qcom_ngd_ctrl
[ 4.515362] pcieport 0000:00:00.0: Adding to iommu group 9
[ 4.519695] qcom_sysmon slimbus pdr_interface display_connector qcom_common
[ 4.526785] pcieport 0000:00:00.0: PME: Signaling with IRQ 169
[ 4.530829] qcom_glink_smem icc_bwmon llcc_qcom mdt_loader drm_kms_helper
[ 4.537677] pcieport 0000:00:00.0: AER: enabled with IRQ 169
[ 4.542399] qmi_helpers drm backlight rmtfs_mem socinfo
[ 4.548000] pci 0000:01:00.0: enabling device (0000 -> 0002)
[ 4.555021]
[ 4.555025] CPU: 6 PID: 411 Comm: kworker/u16:8 Not tainted 6.6.72-rc1 #1
[ 4.560969] pci 0000:01:00.0: quirk_usb_early_handoff+0x0/0xa28 took 12682 usecs
[ 4.567812] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 4.567815] Workqueue: devfreq_wq devfreq_monitor
[ 4.610854] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 4.617870] pc : blk_mq_unquiesce_queue+0x98/0xa0
[ 4.622611] lr : blk_mq_unquiesce_queue+0x24/0xa0
[ 4.627351] sp : ffff800081563bb0
[ 4.630699] x29: ffff800081563bb0 x28: 0000000000000000 x27: ffff7b2d00303468
[ 4.637891] x26: 0000000000000000 x25: 0000000000000000 x24: 00000000000f4240
[ 4.645083] x23: 00000000f05c5362 x22: 0000000000000000 x21: ffff7b2d09028098
[ 4.652274] x20: 0000000000000000 x19: ffff7b2d09028000 x18: ffff7b2d7d78d0ac
[ 4.659466] x17: 0000000000090030 x16: 0000000000000000 x15: 0000000000000000
[ 4.666656] x14: 0000000000000040 x13: 00000000000001fb x12: 0000000000000002
[ 4.673847] x11: fffffffff37a2b79 x10: 0000000000000001 x9 : ffffffffffffffff
[ 4.681037] x8 : ffff800081563b00 x7 : ffff7b2d00e6c090 x6 : ffff800081563b00
[ 4.688226] x5 : fffffffff37a2b79 x4 : ffff7b2d074da000 x3 : 0000000000000001
[ 4.695416] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[ 4.702606] Call trace:
[ 4.705084] blk_mq_unquiesce_queue+0x98/0xa0
[ 4.709483] blk_mq_unquiesce_tagset+0x58/0x84
[ 4.713967] ufshcd_devfreq_scale+0x210/0x350
[ 4.718370] ufshcd_devfreq_target+0xf0/0x1a4
[ 4.722767] devfreq_set_target+0x90/0x194
[ 4.726906] devfreq_update_target+0xc0/0xd8
[ 4.731217] devfreq_monitor+0x34/0x9c
[ 4.734999] process_one_work+0x144/0x29c
[ 4.739044] worker_thread+0x324/0x43c
[ 4.742826] kthread+0x110/0x114
[ 4.746082] ret_from_fork+0x10/0x20
[ 4.749697] ---[ end trace 0000000000000000 ]---
Home
[ 173.718804] ==================================================================
[ 173.720889] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1f0
[ 173.722517] Read of size 1 at addr ffff800080817c1f by task kunit_try_catch/187
[ 173.724420]
[ 173.724953] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 173.727541] Hardware name: linux,dummy-virt (DT)
[ 173.728690] Call trace:
[ 173.729412] dump_backtrace+0x9c/0x128
[ 173.730517] show_stack+0x20/0x38
[ 173.731568] dump_stack_lvl+0x60/0xb0
[ 173.732686] print_report+0x314/0x5d8
[ 173.733768] kasan_report+0xc8/0x118
[ 173.735037] __asan_load1+0x60/0x70
[ 173.736283] kasan_alloca_oob_left+0x108/0x1f0
[ 173.737317] kunit_try_run_case+0xf8/0x260
[ 173.738847] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.740572] kthread+0x18c/0x1a8
[ 173.741563] ret_from_fork+0x10/0x20
[ 173.742680]
[ 173.743629] The buggy address belongs to stack of task kunit_try_catch/187
[ 173.745928]
[ 173.746461] The buggy address belongs to the virtual mapping at
[ 173.746461] [ffff800080810000, ffff800080819000) created by:
[ 173.746461] kernel_clone+0xf8/0x540
[ 173.750222]
[ 173.750690] The buggy address belongs to the physical page:
[ 173.752379] page:0000000019a0e304 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106061
[ 173.754186] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 173.756021] page_type: 0xffffffff()
[ 173.756862] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 173.758770] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 173.760131] page dumped because: kasan: bad access detected
[ 173.761522]
[ 173.762127] Memory state around the buggy address:
[ 173.763382] ffff800080817b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.765282] ffff800080817b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.767235] >ffff800080817c00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[ 173.768661] ^
[ 173.769786] ffff800080817c80: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[ 173.771501] ffff800080817d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 173.773150] ==================================================================
Home
[ 173.797325] ==================================================================
[ 173.799550] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x114/0x200
[ 173.800996] Read of size 1 at addr ffff800080887c2a by task kunit_try_catch/189
[ 173.802826]
[ 173.803572] CPU: 1 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 173.805936] Hardware name: linux,dummy-virt (DT)
[ 173.807496] Call trace:
[ 173.808325] dump_backtrace+0x9c/0x128
[ 173.809633] show_stack+0x20/0x38
[ 173.810747] dump_stack_lvl+0x60/0xb0
[ 173.812034] print_report+0x314/0x5d8
[ 173.813028] kasan_report+0xc8/0x118
[ 173.814232] __asan_load1+0x60/0x70
[ 173.815651] kasan_alloca_oob_right+0x114/0x200
[ 173.817241] kunit_try_run_case+0xf8/0x260
[ 173.818698] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.820578] kthread+0x18c/0x1a8
[ 173.821799] ret_from_fork+0x10/0x20
[ 173.822976]
[ 173.823433] The buggy address belongs to stack of task kunit_try_catch/189
[ 173.825563]
[ 173.826141] The buggy address belongs to the virtual mapping at
[ 173.826141] [ffff800080880000, ffff800080889000) created by:
[ 173.826141] kernel_clone+0xf8/0x540
[ 173.829812]
[ 173.830401] The buggy address belongs to the physical page:
[ 173.833259] page:000000009b09e6f5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7
[ 173.835490] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 173.836796] page_type: 0xffffffff()
[ 173.838138] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 173.840050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 173.842174] page dumped because: kasan: bad access detected
[ 173.843604]
[ 173.844133] Memory state around the buggy address:
[ 173.845576] ffff800080887b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.846856] ffff800080887b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.848715] >ffff800080887c00: ca ca ca ca 00 02 cb cb cb cb cb cb f1 f1 f1 f1
[ 173.850270] ^
[ 173.851837] ffff800080887c80: 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00
[ 173.853584] ffff800080887d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 173.855320] ==================================================================
Home
[ 177.082898] ==================================================================
[ 177.084984] BUG: KASAN: double-free in kfree+0x74/0x138
[ 177.086421] Free of addr ffff0000c5beef60 by task kunit_try_catch/211
[ 177.088542]
[ 177.089175] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 177.091156] Hardware name: linux,dummy-virt (DT)
[ 177.092361] Call trace:
[ 177.093082] dump_backtrace+0x9c/0x128
[ 177.094249] show_stack+0x20/0x38
[ 177.095403] dump_stack_lvl+0x60/0xb0
[ 177.096687] print_report+0xf8/0x5d8
[ 177.097822] kasan_report_invalid_free+0xb0/0xd8
[ 177.099224] __kasan_slab_free+0x134/0x170
[ 177.100579] __kmem_cache_free+0x170/0x2e0
[ 177.101788] kfree+0x74/0x138
[ 177.102760] kfree_sensitive+0x3c/0xb0
[ 177.104022] kmalloc_double_kzfree+0xc8/0x1d8
[ 177.105324] kunit_try_run_case+0xf8/0x260
[ 177.106601] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.108306] kthread+0x18c/0x1a8
[ 177.109381] ret_from_fork+0x10/0x20
[ 177.110628]
[ 177.111262] Allocated by task 211:
[ 177.112205] kasan_save_stack+0x3c/0x68
[ 177.113417] kasan_set_track+0x2c/0x40
[ 177.114595] kasan_save_alloc_info+0x24/0x38
[ 177.116162] __kasan_kmalloc+0xd4/0xd8
[ 177.117327] kmalloc_trace+0x68/0x130
[ 177.118416] kmalloc_double_kzfree+0x9c/0x1d8
[ 177.119694] kunit_try_run_case+0xf8/0x260
[ 177.121223] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.122682] kthread+0x18c/0x1a8
[ 177.123943] ret_from_fork+0x10/0x20
[ 177.125154]
[ 177.125671] Freed by task 211:
[ 177.127084] kasan_save_stack+0x3c/0x68
[ 177.128498] kasan_set_track+0x2c/0x40
[ 177.129640] kasan_save_free_info+0x38/0x60
[ 177.130757] __kasan_slab_free+0x100/0x170
[ 177.132172] __kmem_cache_free+0x170/0x2e0
[ 177.133388] kfree+0x74/0x138
[ 177.134362] kfree_sensitive+0x80/0xb0
[ 177.135951] kmalloc_double_kzfree+0xb8/0x1d8
[ 177.137203] kunit_try_run_case+0xf8/0x260
[ 177.138380] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.139829] kthread+0x18c/0x1a8
[ 177.140882] ret_from_fork+0x10/0x20
[ 177.141965]
[ 177.142533] The buggy address belongs to the object at ffff0000c5beef60
[ 177.142533] which belongs to the cache kmalloc-16 of size 16
[ 177.144910] The buggy address is located 0 bytes inside of
[ 177.144910] 16-byte region [ffff0000c5beef60, ffff0000c5beef70)
[ 177.148007]
[ 177.148551] The buggy address belongs to the physical page:
[ 177.150041] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 177.152550] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 177.154323] page_type: 0xffffffff()
[ 177.155744] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 177.156747] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 177.158575] page dumped because: kasan: bad access detected
[ 177.159891]
[ 177.160448] Memory state around the buggy address:
[ 177.162085] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 177.164244] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 177.165948] >ffff0000c5beef00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 177.167471] ^
[ 177.169094] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.170802] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 177.172795] ==================================================================
Home
[ 174.385440] ==================================================================
[ 174.387925] BUG: KASAN: double-free in kmem_cache_double_free+0xe8/0x240
[ 174.389865] Free of addr ffff0000c5f3d000 by task kunit_try_catch/195
[ 174.391951]
[ 174.393078] CPU: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.395559] Hardware name: linux,dummy-virt (DT)
[ 174.396865] Call trace:
[ 174.397653] dump_backtrace+0x9c/0x128
[ 174.398796] show_stack+0x20/0x38
[ 174.400033] dump_stack_lvl+0x60/0xb0
[ 174.401312] print_report+0xf8/0x5d8
[ 174.402420] kasan_report_invalid_free+0xb0/0xd8
[ 174.403995] __kasan_slab_free+0x134/0x170
[ 174.405252] kmem_cache_free+0x18c/0x3f8
[ 174.406391] kmem_cache_double_free+0xe8/0x240
[ 174.407676] kunit_try_run_case+0xf8/0x260
[ 174.409484] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.411088] kthread+0x18c/0x1a8
[ 174.412376] ret_from_fork+0x10/0x20
[ 174.413503]
[ 174.414069] Allocated by task 195:
[ 174.414999] kasan_save_stack+0x3c/0x68
[ 174.416422] kasan_set_track+0x2c/0x40
[ 174.417499] kasan_save_alloc_info+0x24/0x38
[ 174.418761] __kasan_slab_alloc+0xa8/0xb0
[ 174.420041] kmem_cache_alloc+0x134/0x330
[ 174.421386] kmem_cache_double_free+0xb8/0x240
[ 174.422694] kunit_try_run_case+0xf8/0x260
[ 174.424052] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.425554] kthread+0x18c/0x1a8
[ 174.426525] ret_from_fork+0x10/0x20
[ 174.427639]
[ 174.428879] Freed by task 195:
[ 174.429772] kasan_save_stack+0x3c/0x68
[ 174.430950] kasan_set_track+0x2c/0x40
[ 174.432186] kasan_save_free_info+0x38/0x60
[ 174.433514] __kasan_slab_free+0x100/0x170
[ 174.434759] kmem_cache_free+0x18c/0x3f8
[ 174.436037] kmem_cache_double_free+0xd4/0x240
[ 174.437174] kunit_try_run_case+0xf8/0x260
[ 174.438393] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.439994] kthread+0x18c/0x1a8
[ 174.440937] ret_from_fork+0x10/0x20
[ 174.442185]
[ 174.442701] The buggy address belongs to the object at ffff0000c5f3d000
[ 174.442701] which belongs to the cache test_cache of size 200
[ 174.445450] The buggy address is located 0 bytes inside of
[ 174.445450] 200-byte region [ffff0000c5f3d000, ffff0000c5f3d0c8)
[ 174.448324]
[ 174.448953] The buggy address belongs to the physical page:
[ 174.450280] page:0000000075cee7be refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f3d
[ 174.452533] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.454198] page_type: 0xffffffff()
[ 174.455656] raw: 0bfffc0000000800 ffff0000c56d8500 dead000000000122 0000000000000000
[ 174.457661] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 174.459330] page dumped because: kasan: bad access detected
[ 174.460879]
[ 174.461366] Memory state around the buggy address:
[ 174.462583] ffff0000c5f3cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.464850] ffff0000c5f3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.466518] >ffff0000c5f3d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 174.468319] ^
[ 174.469403] ffff0000c5f3d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 174.471112] ffff0000c5f3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.473141] ==================================================================
Home
[ 173.533413] ==================================================================
[ 173.536153] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x168
[ 173.537798] Read of size 1 at addr ffffdbbcf8074d0d by task kunit_try_catch/181
[ 173.540080]
[ 173.540562] CPU: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 173.542437] Hardware name: linux,dummy-virt (DT)
[ 173.544016] Call trace:
[ 173.544744] dump_backtrace+0x9c/0x128
[ 173.545864] show_stack+0x20/0x38
[ 173.546876] dump_stack_lvl+0x60/0xb0
[ 173.548238] print_report+0x314/0x5d8
[ 173.549449] kasan_report+0xc8/0x118
[ 173.550577] __asan_load1+0x60/0x70
[ 173.552289] kasan_global_oob_right+0xa8/0x168
[ 173.553798] kunit_try_run_case+0xf8/0x260
[ 173.555395] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.557001] kthread+0x18c/0x1a8
[ 173.557760] ret_from_fork+0x10/0x20
[ 173.559048]
[ 173.560408] The buggy address belongs to the variable:
[ 173.561506] global_array+0xd/0x40
[ 173.562613]
[ 173.563332] The buggy address belongs to the virtual mapping at
[ 173.563332] [ffffdbbcf6770000, ffffdbbcf8101000) created by:
[ 173.563332] paging_init+0x26c/0x968
[ 173.566460]
[ 173.567077] The buggy address belongs to the physical page:
[ 173.568480] page:00000000d0c19c13 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45674
[ 173.570459] flags: 0x3fffc0000004000(reserved|node=0|zone=0|lastcpupid=0xffff)
[ 173.572216] page_type: 0xffffffff()
[ 173.573587] raw: 03fffc0000004000 fffffc0000159d08 fffffc0000159d08 0000000000000000
[ 173.575114] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 173.577064] page dumped because: kasan: bad access detected
[ 173.578333]
[ 173.578893] Memory state around the buggy address:
[ 173.580172] ffffdbbcf8074c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.581832] ffffdbbcf8074c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.583538] >ffffdbbcf8074d00: 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[ 173.585184] ^
[ 173.586157] ffffdbbcf8074d80: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[ 173.587840] ffffdbbcf8074e00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[ 173.589409] ==================================================================
Home
[ 170.088228] ==================================================================
[ 170.090788] BUG: KASAN: invalid-free in kfree+0x12c/0x138
[ 170.092329] Free of addr ffff0000c5fb8001 by task kunit_try_catch/127
[ 170.094342]
[ 170.095365] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.097274] Hardware name: linux,dummy-virt (DT)
[ 170.098423] Call trace:
[ 170.099096] dump_backtrace+0x9c/0x128
[ 170.100375] show_stack+0x20/0x38
[ 170.101353] dump_stack_lvl+0x60/0xb0
[ 170.102605] print_report+0xf8/0x5d8
[ 170.103775] kasan_report_invalid_free+0xb0/0xd8
[ 170.104979] __kasan_kfree_large+0x54/0xa0
[ 170.106251] free_large_kmalloc+0x5c/0x100
[ 170.107538] kfree+0x12c/0x138
[ 170.108990] kmalloc_pagealloc_invalid_free+0xa8/0x1a8
[ 170.110330] kunit_try_run_case+0xf8/0x260
[ 170.111702] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.113529] kthread+0x18c/0x1a8
[ 170.114541] ret_from_fork+0x10/0x20
[ 170.115686]
[ 170.116962] The buggy address belongs to the physical page:
[ 170.118248] page:000000002fd1ef98 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb8
[ 170.120645] head:000000002fd1ef98 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.122358] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 170.124366] page_type: 0xffffffff()
[ 170.125556] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 170.127977] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 170.129525] page dumped because: kasan: bad access detected
[ 170.130799]
[ 170.131258] Memory state around the buggy address:
[ 170.132900] ffff0000c5fb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.134971] ffff0000c5fb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.136686] >ffff0000c5fb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.138379] ^
[ 170.139514] ffff0000c5fb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.141175] ffff0000c5fb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.142844] ==================================================================
Home
[ 174.517400] ==================================================================
[ 174.519281] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xdc/0x230
[ 174.522271] Free of addr ffff0000c60be001 by task kunit_try_catch/197
[ 174.524649]
[ 174.525953] CPU: 1 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.527937] Hardware name: linux,dummy-virt (DT)
[ 174.529337] Call trace:
[ 174.530209] dump_backtrace+0x9c/0x128
[ 174.531415] show_stack+0x20/0x38
[ 174.533042] dump_stack_lvl+0x60/0xb0
[ 174.534677] print_report+0xf8/0x5d8
[ 174.536406] kasan_report_invalid_free+0xb0/0xd8
[ 174.538006] __kasan_slab_free+0x164/0x170
[ 174.539377] kmem_cache_free+0x18c/0x3f8
[ 174.540858] kmem_cache_invalid_free+0xdc/0x230
[ 174.542324] kunit_try_run_case+0xf8/0x260
[ 174.543637] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.545265] kthread+0x18c/0x1a8
[ 174.546258] ret_from_fork+0x10/0x20
[ 174.547315]
[ 174.548122] Allocated by task 197:
[ 174.549183] kasan_save_stack+0x3c/0x68
[ 174.550833] kasan_set_track+0x2c/0x40
[ 174.552612] kasan_save_alloc_info+0x24/0x38
[ 174.554106] __kasan_slab_alloc+0xa8/0xb0
[ 174.555362] kmem_cache_alloc+0x134/0x330
[ 174.556751] kmem_cache_invalid_free+0xb8/0x230
[ 174.558110] kunit_try_run_case+0xf8/0x260
[ 174.559874] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.561411] kthread+0x18c/0x1a8
[ 174.562431] ret_from_fork+0x10/0x20
[ 174.563749]
[ 174.564627] The buggy address belongs to the object at ffff0000c60be000
[ 174.564627] which belongs to the cache test_cache of size 200
[ 174.567355] The buggy address is located 1 bytes inside of
[ 174.567355] 200-byte region [ffff0000c60be000, ffff0000c60be0c8)
[ 174.569863]
[ 174.570391] The buggy address belongs to the physical page:
[ 174.571771] page:00000000c0b61542 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060be
[ 174.574194] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.575937] page_type: 0xffffffff()
[ 174.576807] raw: 0bfffc0000000800 ffff0000c57388c0 dead000000000122 0000000000000000
[ 174.578593] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 174.580056] page dumped because: kasan: bad access detected
[ 174.581059]
[ 174.581805] Memory state around the buggy address:
[ 174.583516] ffff0000c60bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.584970] ffff0000c60bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.586975] >ffff0000c60be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 174.588599] ^
[ 174.589477] ffff0000c60be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 174.591194] ffff0000c60be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.593110] ==================================================================
Home
[ 172.213455] ==================================================================
[ 172.215267] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe0/0x1f0
[ 172.218041] Read of size 18446744073709551614 at addr ffff0000c6055204 by task kunit_try_catch/159
[ 172.220506]
[ 172.221196] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.222572] Hardware name: linux,dummy-virt (DT)
[ 172.224206] Call trace:
[ 172.225067] dump_backtrace+0x9c/0x128
[ 172.226184] show_stack+0x20/0x38
[ 172.227220] dump_stack_lvl+0x60/0xb0
[ 172.228417] print_report+0xf8/0x5d8
[ 172.229546] kasan_report+0xc8/0x118
[ 172.230668] kasan_check_range+0xe8/0x190
[ 172.231944] __asan_memmove+0x3c/0x98
[ 172.233264] kmalloc_memmove_negative_size+0xe0/0x1f0
[ 172.234651] kunit_try_run_case+0xf8/0x260
[ 172.236187] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.237663] kthread+0x18c/0x1a8
[ 172.238633] ret_from_fork+0x10/0x20
[ 172.240053]
[ 172.240564] Allocated by task 159:
[ 172.241547] kasan_save_stack+0x3c/0x68
[ 172.242739] kasan_set_track+0x2c/0x40
[ 172.244033] kasan_save_alloc_info+0x24/0x38
[ 172.245348] __kasan_kmalloc+0xd4/0xd8
[ 172.246471] kmalloc_trace+0x68/0x130
[ 172.247498] kmalloc_memmove_negative_size+0xa0/0x1f0
[ 172.248918] kunit_try_run_case+0xf8/0x260
[ 172.250127] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.251889] kthread+0x18c/0x1a8
[ 172.253105] ret_from_fork+0x10/0x20
[ 172.254192]
[ 172.254767] The buggy address belongs to the object at ffff0000c6055200
[ 172.254767] which belongs to the cache kmalloc-64 of size 64
[ 172.257378] The buggy address is located 4 bytes inside of
[ 172.257378] 64-byte region [ffff0000c6055200, ffff0000c6055240)
[ 172.259857]
[ 172.260352] The buggy address belongs to the physical page:
[ 172.261682] page:00000000e6689584 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106055
[ 172.264022] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.265692] page_type: 0xffffffff()
[ 172.266884] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 172.268893] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 172.270502] page dumped because: kasan: bad access detected
[ 172.271877]
[ 172.273118] Memory state around the buggy address:
[ 172.274404] ffff0000c6055100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 172.276297] ffff0000c6055180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.277952] >ffff0000c6055200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 172.279650] ^
[ 172.280325] ffff0000c6055280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.281991] ffff0000c6055300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.283842] ==================================================================
Home
[ 176.191456] ==================================================================
[ 176.192918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8
[ 176.194658] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.196641]
[ 176.197273] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.199238] Hardware name: linux,dummy-virt (DT)
[ 176.200384] Call trace:
[ 176.201090] dump_backtrace+0x9c/0x128
[ 176.202189] show_stack+0x20/0x38
[ 176.203193] dump_stack_lvl+0x60/0xb0
[ 176.204335] print_report+0xf8/0x5d8
[ 176.205460] kasan_report+0xc8/0x118
[ 176.206563] __asan_load8+0x9c/0xc0
[ 176.207678] kasan_bitops_modify.constprop.0+0x20c/0x6d8
[ 176.209090] kasan_bitops_generic+0xb4/0x148
[ 176.210312] kunit_try_run_case+0xf8/0x260
[ 176.211490] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.212950] kthread+0x18c/0x1a8
[ 176.213940] ret_from_fork+0x10/0x20
[ 176.214996]
[ 176.215502] Allocated by task 207:
[ 176.216481] kasan_save_stack+0x3c/0x68
[ 176.217615] kasan_set_track+0x2c/0x40
[ 176.218754] kasan_save_alloc_info+0x24/0x38
[ 176.220013] __kasan_kmalloc+0xd4/0xd8
[ 176.221159] kmalloc_trace+0x68/0x130
[ 176.222225] kasan_bitops_generic+0x98/0x148
[ 176.223451] kunit_try_run_case+0xf8/0x260
[ 176.224645] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.226096] kthread+0x18c/0x1a8
[ 176.227090] ret_from_fork+0x10/0x20
[ 176.228173]
[ 176.228655] The buggy address belongs to the object at ffff0000c5beef40
[ 176.228655] which belongs to the cache kmalloc-16 of size 16
[ 176.231054] The buggy address is located 8 bytes inside of
[ 176.231054] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.233487]
[ 176.234073] The buggy address belongs to the physical page:
[ 176.235336] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.237268] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.238846] page_type: 0xffffffff()
[ 176.239910] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.241564] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.243145] page dumped because: kasan: bad access detected
[ 176.244432]
[ 176.244976] Memory state around the buggy address:
[ 176.246205] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.247824] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.249401] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.250925] ^
[ 176.252257] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.253856] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.255368] ==================================================================
---
[ 175.985140] ==================================================================
[ 175.986591] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8
[ 175.988708] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.990262]
[ 175.990923] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.993951] Hardware name: linux,dummy-virt (DT)
[ 175.995124] Call trace:
[ 175.995843] dump_backtrace+0x9c/0x128
[ 175.996997] show_stack+0x20/0x38
[ 175.998019] dump_stack_lvl+0x60/0xb0
[ 175.999181] print_report+0xf8/0x5d8
[ 176.000325] kasan_report+0xc8/0x118
[ 176.001443] __asan_load8+0x9c/0xc0
[ 176.002539] kasan_bitops_modify.constprop.0+0x19c/0x6d8
[ 176.003971] kasan_bitops_generic+0xb4/0x148
[ 176.005189] kunit_try_run_case+0xf8/0x260
[ 176.006383] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.007876] kthread+0x18c/0x1a8
[ 176.008860] ret_from_fork+0x10/0x20
[ 176.009948]
[ 176.010446] Allocated by task 207:
[ 176.011382] kasan_save_stack+0x3c/0x68
[ 176.012534] kasan_set_track+0x2c/0x40
[ 176.013656] kasan_save_alloc_info+0x24/0x38
[ 176.014925] __kasan_kmalloc+0xd4/0xd8
[ 176.016073] kmalloc_trace+0x68/0x130
[ 176.017122] kasan_bitops_generic+0x98/0x148
[ 176.018329] kunit_try_run_case+0xf8/0x260
[ 176.019505] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.020974] kthread+0x18c/0x1a8
[ 176.021956] ret_from_fork+0x10/0x20
[ 176.023034]
[ 176.023553] The buggy address belongs to the object at ffff0000c5beef40
[ 176.023553] which belongs to the cache kmalloc-16 of size 16
[ 176.025962] The buggy address is located 8 bytes inside of
[ 176.025962] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.028435]
[ 176.028986] The buggy address belongs to the physical page:
[ 176.030310] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.032284] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.033867] page_type: 0xffffffff()
[ 176.034918] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.036633] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.038231] page dumped because: kasan: bad access detected
[ 176.039499]
[ 176.040072] Memory state around the buggy address:
[ 176.041286] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.042900] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.044506] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.046077] ^
[ 176.047378] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.049000] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.050543] ==================================================================
---
[ 175.752680] ==================================================================
[ 175.753889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8
[ 175.756652] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.758620]
[ 175.759511] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.761918] Hardware name: linux,dummy-virt (DT)
[ 175.763072] Call trace:
[ 175.763679] dump_backtrace+0x9c/0x128
[ 175.765322] show_stack+0x20/0x38
[ 175.766423] dump_stack_lvl+0x60/0xb0
[ 175.767774] print_report+0xf8/0x5d8
[ 175.769030] kasan_report+0xc8/0x118
[ 175.770357] __asan_load8+0x9c/0xc0
[ 175.772350] kasan_bitops_modify.constprop.0+0x130/0x6d8
[ 175.774107] kasan_bitops_generic+0xb4/0x148
[ 175.775496] kunit_try_run_case+0xf8/0x260
[ 175.777155] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.779249] kthread+0x18c/0x1a8
[ 175.780285] ret_from_fork+0x10/0x20
[ 175.781467]
[ 175.782100] Allocated by task 207:
[ 175.783242] kasan_save_stack+0x3c/0x68
[ 175.784266] kasan_set_track+0x2c/0x40
[ 175.785269] kasan_save_alloc_info+0x24/0x38
[ 175.787077] __kasan_kmalloc+0xd4/0xd8
[ 175.788229] kmalloc_trace+0x68/0x130
[ 175.789286] kasan_bitops_generic+0x98/0x148
[ 175.790565] kunit_try_run_case+0xf8/0x260
[ 175.791861] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.793306] kthread+0x18c/0x1a8
[ 175.794291] ret_from_fork+0x10/0x20
[ 175.795184]
[ 175.795631] The buggy address belongs to the object at ffff0000c5beef40
[ 175.795631] which belongs to the cache kmalloc-16 of size 16
[ 175.798881] The buggy address is located 8 bytes inside of
[ 175.798881] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 175.801449]
[ 175.802465] The buggy address belongs to the physical page:
[ 175.804267] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 175.806482] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.808453] page_type: 0xffffffff()
[ 175.810085] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 175.811823] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 175.813444] page dumped because: kasan: bad access detected
[ 175.814673]
[ 175.815577] Memory state around the buggy address:
[ 175.817130] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 175.818857] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 175.820769] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 175.822388] ^
[ 175.823990] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.825455] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 175.827460] ==================================================================
---
[ 175.604239] ==================================================================
[ 175.605846] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8
[ 175.607989] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.609613]
[ 175.610243] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.612498] Hardware name: linux,dummy-virt (DT)
[ 175.613814] Call trace:
[ 175.614620] dump_backtrace+0x9c/0x128
[ 175.615816] show_stack+0x20/0x38
[ 175.616889] dump_stack_lvl+0x60/0xb0
[ 175.618088] print_report+0xf8/0x5d8
[ 175.619251] kasan_report+0xc8/0x118
[ 175.620572] __asan_load8+0x9c/0xc0
[ 175.621707] kasan_bitops_modify.constprop.0+0xd0/0x6d8
[ 175.623223] kasan_bitops_generic+0xb4/0x148
[ 175.624484] kunit_try_run_case+0xf8/0x260
[ 175.625514] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.627168] kthread+0x18c/0x1a8
[ 175.628346] ret_from_fork+0x10/0x20
[ 175.629532]
[ 175.630204] Allocated by task 207:
[ 175.631154] kasan_save_stack+0x3c/0x68
[ 175.632524] kasan_set_track+0x2c/0x40
[ 175.633702] kasan_save_alloc_info+0x24/0x38
[ 175.635007] __kasan_kmalloc+0xd4/0xd8
[ 175.636185] kmalloc_trace+0x68/0x130
[ 175.637256] kasan_bitops_generic+0x98/0x148
[ 175.638545] kunit_try_run_case+0xf8/0x260
[ 175.639965] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.641417] kthread+0x18c/0x1a8
[ 175.642389] ret_from_fork+0x10/0x20
[ 175.643390]
[ 175.643880] The buggy address belongs to the object at ffff0000c5beef40
[ 175.643880] which belongs to the cache kmalloc-16 of size 16
[ 175.647829] The buggy address is located 8 bytes inside of
[ 175.647829] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 175.650423]
[ 175.651009] The buggy address belongs to the physical page:
[ 175.652611] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 175.654530] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.656551] page_type: 0xffffffff()
[ 175.657605] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 175.659305] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 175.660995] page dumped because: kasan: bad access detected
[ 175.662288]
[ 175.662830] Memory state around the buggy address:
[ 175.664061] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 175.665711] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 175.667533] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 175.668888] ^
[ 175.670058] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.672171] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 175.673885] ==================================================================
Home
[ 175.676904] ==================================================================
[ 175.678444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8
[ 175.680992] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.683290]
[ 175.684488] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.686318] Hardware name: linux,dummy-virt (DT)
[ 175.687433] Call trace:
[ 175.688276] dump_backtrace+0x9c/0x128
[ 175.689386] show_stack+0x20/0x38
[ 175.690377] dump_stack_lvl+0x60/0xb0
[ 175.691783] print_report+0xf8/0x5d8
[ 175.692882] kasan_report+0xc8/0x118
[ 175.694004] kasan_check_range+0xe8/0x190
[ 175.695246] __kasan_check_write+0x20/0x30
[ 175.696755] kasan_bitops_modify.constprop.0+0x100/0x6d8
[ 175.698227] kasan_bitops_generic+0xb4/0x148
[ 175.699481] kunit_try_run_case+0xf8/0x260
[ 175.700686] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.702476] kthread+0x18c/0x1a8
[ 175.703604] ret_from_fork+0x10/0x20
[ 175.704793]
[ 175.705290] Allocated by task 207:
[ 175.706259] kasan_save_stack+0x3c/0x68
[ 175.707504] kasan_set_track+0x2c/0x40
[ 175.708704] kasan_save_alloc_info+0x24/0x38
[ 175.710048] __kasan_kmalloc+0xd4/0xd8
[ 175.711276] kmalloc_trace+0x68/0x130
[ 175.712233] kasan_bitops_generic+0x98/0x148
[ 175.713444] kunit_try_run_case+0xf8/0x260
[ 175.714635] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.716513] kthread+0x18c/0x1a8
[ 175.717393] ret_from_fork+0x10/0x20
[ 175.718758]
[ 175.719409] The buggy address belongs to the object at ffff0000c5beef40
[ 175.719409] which belongs to the cache kmalloc-16 of size 16
[ 175.722401] The buggy address is located 8 bytes inside of
[ 175.722401] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 175.725178]
[ 175.725664] The buggy address belongs to the physical page:
[ 175.727296] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 175.729444] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.730808] page_type: 0xffffffff()
[ 175.731880] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 175.733640] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 175.735322] page dumped because: kasan: bad access detected
[ 175.737502]
[ 175.738580] Memory state around the buggy address:
[ 175.739888] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 175.741516] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 175.743518] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 175.744963] ^
[ 175.746237] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.748221] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 175.749775] ==================================================================
---
[ 175.906132] ==================================================================
[ 175.908804] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8
[ 175.910561] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.912348]
[ 175.914117] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.916170] Hardware name: linux,dummy-virt (DT)
[ 175.917354] Call trace:
[ 175.918137] dump_backtrace+0x9c/0x128
[ 175.920085] show_stack+0x20/0x38
[ 175.921277] dump_stack_lvl+0x60/0xb0
[ 175.922687] print_report+0xf8/0x5d8
[ 175.923891] kasan_report+0xc8/0x118
[ 175.925045] kasan_check_range+0xe8/0x190
[ 175.926368] __kasan_check_write+0x20/0x30
[ 175.928307] kasan_bitops_modify.constprop.0+0x194/0x6d8
[ 175.930031] kasan_bitops_generic+0xb4/0x148
[ 175.931303] kunit_try_run_case+0xf8/0x260
[ 175.932549] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.934058] kthread+0x18c/0x1a8
[ 175.935055] ret_from_fork+0x10/0x20
[ 175.936168]
[ 175.936804] Allocated by task 207:
[ 175.937677] kasan_save_stack+0x3c/0x68
[ 175.939297] kasan_set_track+0x2c/0x40
[ 175.940471] kasan_save_alloc_info+0x24/0x38
[ 175.941810] __kasan_kmalloc+0xd4/0xd8
[ 175.943007] kmalloc_trace+0x68/0x130
[ 175.944457] kasan_bitops_generic+0x98/0x148
[ 175.945644] kunit_try_run_case+0xf8/0x260
[ 175.946854] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.948541] kthread+0x18c/0x1a8
[ 175.949597] ret_from_fork+0x10/0x20
[ 175.950708]
[ 175.951301] The buggy address belongs to the object at ffff0000c5beef40
[ 175.951301] which belongs to the cache kmalloc-16 of size 16
[ 175.953785] The buggy address is located 8 bytes inside of
[ 175.953785] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 175.956195]
[ 175.956840] The buggy address belongs to the physical page:
[ 175.958072] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 175.959864] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.961496] page_type: 0xffffffff()
[ 175.962682] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 175.964749] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 175.966484] page dumped because: kasan: bad access detected
[ 175.968041]
[ 175.969271] Memory state around the buggy address:
[ 175.970689] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 175.973417] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 175.975052] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 175.976936] ^
[ 175.978467] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.980356] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 175.981959] ==================================================================
---
[ 175.528263] ==================================================================
[ 175.531273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8
[ 175.532741] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.535257]
[ 175.535770] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.538065] Hardware name: linux,dummy-virt (DT)
[ 175.539236] Call trace:
[ 175.540251] dump_backtrace+0x9c/0x128
[ 175.541501] show_stack+0x20/0x38
[ 175.542565] dump_stack_lvl+0x60/0xb0
[ 175.543945] print_report+0xf8/0x5d8
[ 175.545201] kasan_report+0xc8/0x118
[ 175.546316] kasan_check_range+0xe8/0x190
[ 175.547676] __kasan_check_write+0x20/0x30
[ 175.548685] kasan_bitops_modify.constprop.0+0xa4/0x6d8
[ 175.550314] kasan_bitops_generic+0xb4/0x148
[ 175.552187] kunit_try_run_case+0xf8/0x260
[ 175.553427] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.554925] kthread+0x18c/0x1a8
[ 175.555929] ret_from_fork+0x10/0x20
[ 175.557050]
[ 175.557611] Allocated by task 207:
[ 175.558526] kasan_save_stack+0x3c/0x68
[ 175.560133] kasan_set_track+0x2c/0x40
[ 175.561268] kasan_save_alloc_info+0x24/0x38
[ 175.562518] __kasan_kmalloc+0xd4/0xd8
[ 175.563630] kmalloc_trace+0x68/0x130
[ 175.565117] kasan_bitops_generic+0x98/0x148
[ 175.566335] kunit_try_run_case+0xf8/0x260
[ 175.567639] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.569017] kthread+0x18c/0x1a8
[ 175.570545] ret_from_fork+0x10/0x20
[ 175.571612]
[ 175.572229] The buggy address belongs to the object at ffff0000c5beef40
[ 175.572229] which belongs to the cache kmalloc-16 of size 16
[ 175.574744] The buggy address is located 8 bytes inside of
[ 175.574744] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 175.577291]
[ 175.577864] The buggy address belongs to the physical page:
[ 175.579206] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 175.581060] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.582591] page_type: 0xffffffff()
[ 175.584244] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 175.585891] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 175.587504] page dumped because: kasan: bad access detected
[ 175.588498]
[ 175.589123] Memory state around the buggy address:
[ 175.590527] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 175.592405] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 175.594018] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 175.595819] ^
[ 175.597180] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.598804] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 175.600507] ==================================================================
---
[ 175.830715] ==================================================================
[ 175.832224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8
[ 175.834069] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 175.836564]
[ 175.837402] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.839395] Hardware name: linux,dummy-virt (DT)
[ 175.840920] Call trace:
[ 175.841800] dump_backtrace+0x9c/0x128
[ 175.843083] show_stack+0x20/0x38
[ 175.843901] dump_stack_lvl+0x60/0xb0
[ 175.845129] print_report+0xf8/0x5d8
[ 175.846253] kasan_report+0xc8/0x118
[ 175.847519] kasan_check_range+0xe8/0x190
[ 175.848763] __kasan_check_write+0x20/0x30
[ 175.850153] kasan_bitops_modify.constprop.0+0x160/0x6d8
[ 175.851346] kasan_bitops_generic+0xb4/0x148
[ 175.852401] kunit_try_run_case+0xf8/0x260
[ 175.853695] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.855460] kthread+0x18c/0x1a8
[ 175.857363] ret_from_fork+0x10/0x20
[ 175.858377]
[ 175.859094] Allocated by task 207:
[ 175.860198] kasan_save_stack+0x3c/0x68
[ 175.861480] kasan_set_track+0x2c/0x40
[ 175.862657] kasan_save_alloc_info+0x24/0x38
[ 175.864071] __kasan_kmalloc+0xd4/0xd8
[ 175.865044] kmalloc_trace+0x68/0x130
[ 175.866439] kasan_bitops_generic+0x98/0x148
[ 175.867669] kunit_try_run_case+0xf8/0x260
[ 175.869020] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.870518] kthread+0x18c/0x1a8
[ 175.871452] ret_from_fork+0x10/0x20
[ 175.872640]
[ 175.873243] The buggy address belongs to the object at ffff0000c5beef40
[ 175.873243] which belongs to the cache kmalloc-16 of size 16
[ 175.876573] The buggy address is located 8 bytes inside of
[ 175.876573] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 175.879656]
[ 175.880244] The buggy address belongs to the physical page:
[ 175.881826] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 175.883620] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.885671] page_type: 0xffffffff()
[ 175.887319] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 175.889121] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 175.890486] page dumped because: kasan: bad access detected
[ 175.891947]
[ 175.892589] Memory state around the buggy address:
[ 175.893893] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 175.895779] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 175.897075] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 175.899001] ^
[ 175.900418] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.902061] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 175.903972] ==================================================================
---
[ 176.123209] ==================================================================
[ 176.124912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[ 176.126649] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.128463]
[ 176.129065] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.130840] Hardware name: linux,dummy-virt (DT)
[ 176.131931] Call trace:
[ 176.132688] dump_backtrace+0x9c/0x128
[ 176.133802] show_stack+0x20/0x38
[ 176.134793] dump_stack_lvl+0x60/0xb0
[ 176.135930] print_report+0xf8/0x5d8
[ 176.137041] kasan_report+0xc8/0x118
[ 176.138165] kasan_check_range+0xe8/0x190
[ 176.139383] __kasan_check_write+0x20/0x30
[ 176.140505] kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[ 176.141907] kasan_bitops_generic+0xb4/0x148
[ 176.143137] kunit_try_run_case+0xf8/0x260
[ 176.144333] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.145771] kthread+0x18c/0x1a8
[ 176.146741] ret_from_fork+0x10/0x20
[ 176.147848]
[ 176.148400] Allocated by task 207:
[ 176.149405] kasan_save_stack+0x3c/0x68
[ 176.150547] kasan_set_track+0x2c/0x40
[ 176.151674] kasan_save_alloc_info+0x24/0x38
[ 176.152945] __kasan_kmalloc+0xd4/0xd8
[ 176.154073] kmalloc_trace+0x68/0x130
[ 176.155142] kasan_bitops_generic+0x98/0x148
[ 176.156349] kunit_try_run_case+0xf8/0x260
[ 176.157511] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.158983] kthread+0x18c/0x1a8
[ 176.159986] ret_from_fork+0x10/0x20
[ 176.161071]
[ 176.161572] The buggy address belongs to the object at ffff0000c5beef40
[ 176.161572] which belongs to the cache kmalloc-16 of size 16
[ 176.163972] The buggy address is located 8 bytes inside of
[ 176.163972] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.166388]
[ 176.166928] The buggy address belongs to the physical page:
[ 176.168188] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.170164] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.171711] page_type: 0xffffffff()
[ 176.172761] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.174423] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.176071] page dumped because: kasan: bad access detected
[ 176.177347]
[ 176.177905] Memory state around the buggy address:
[ 176.179087] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.180748] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.182317] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.183885] ^
[ 176.185198] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.186846] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.188408] ==================================================================
---
[ 176.053971] ==================================================================
[ 176.055465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[ 176.057175] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.059006]
[ 176.059589] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.061398] Hardware name: linux,dummy-virt (DT)
[ 176.062503] Call trace:
[ 176.063236] dump_backtrace+0x9c/0x128
[ 176.064332] show_stack+0x20/0x38
[ 176.065336] dump_stack_lvl+0x60/0xb0
[ 176.066467] print_report+0xf8/0x5d8
[ 176.067543] kasan_report+0xc8/0x118
[ 176.068685] kasan_check_range+0xe8/0x190
[ 176.069882] __kasan_check_write+0x20/0x30
[ 176.071013] kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[ 176.072400] kasan_bitops_generic+0xb4/0x148
[ 176.073577] kunit_try_run_case+0xf8/0x260
[ 176.074767] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.076206] kthread+0x18c/0x1a8
[ 176.077172] ret_from_fork+0x10/0x20
[ 176.078252]
[ 176.078758] Allocated by task 207:
[ 176.079630] kasan_save_stack+0x3c/0x68
[ 176.080823] kasan_set_track+0x2c/0x40
[ 176.081933] kasan_save_alloc_info+0x24/0x38
[ 176.083208] __kasan_kmalloc+0xd4/0xd8
[ 176.084349] kmalloc_trace+0x68/0x130
[ 176.085391] kasan_bitops_generic+0x98/0x148
[ 176.086581] kunit_try_run_case+0xf8/0x260
[ 176.087803] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.089324] kthread+0x18c/0x1a8
[ 176.090959] ret_from_fork+0x10/0x20
[ 176.092073]
[ 176.092713] The buggy address belongs to the object at ffff0000c5beef40
[ 176.092713] which belongs to the cache kmalloc-16 of size 16
[ 176.095294] The buggy address is located 8 bytes inside of
[ 176.095294] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.097638]
[ 176.098259] The buggy address belongs to the physical page:
[ 176.099557] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.101535] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.103140] page_type: 0xffffffff()
[ 176.104282] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.106049] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.107664] page dumped because: kasan: bad access detected
[ 176.109010]
[ 176.109557] Memory state around the buggy address:
[ 176.110847] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.112476] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.114184] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.115752] ^
[ 176.117115] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.118775] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.120337] ==================================================================
Home
[ 176.258271] ==================================================================
[ 176.260115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[ 176.262006] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.263680]
[ 176.264285] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.266082] Hardware name: linux,dummy-virt (DT)
[ 176.267204] Call trace:
[ 176.267885] dump_backtrace+0x9c/0x128
[ 176.268980] show_stack+0x20/0x38
[ 176.269990] dump_stack_lvl+0x60/0xb0
[ 176.271109] print_report+0xf8/0x5d8
[ 176.272245] kasan_report+0xc8/0x118
[ 176.273358] kasan_check_range+0xe8/0x190
[ 176.274553] __kasan_check_write+0x20/0x30
[ 176.275676] kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[ 176.277224] kasan_bitops_generic+0xc0/0x148
[ 176.278434] kunit_try_run_case+0xf8/0x260
[ 176.279623] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.281090] kthread+0x18c/0x1a8
[ 176.282053] ret_from_fork+0x10/0x20
[ 176.283140]
[ 176.283645] Allocated by task 207:
[ 176.284605] kasan_save_stack+0x3c/0x68
[ 176.285766] kasan_set_track+0x2c/0x40
[ 176.286897] kasan_save_alloc_info+0x24/0x38
[ 176.288171] __kasan_kmalloc+0xd4/0xd8
[ 176.289287] kmalloc_trace+0x68/0x130
[ 176.290314] kasan_bitops_generic+0x98/0x148
[ 176.291498] kunit_try_run_case+0xf8/0x260
[ 176.292696] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.294154] kthread+0x18c/0x1a8
[ 176.295111] ret_from_fork+0x10/0x20
[ 176.296353]
[ 176.296901] The buggy address belongs to the object at ffff0000c5beef40
[ 176.296901] which belongs to the cache kmalloc-16 of size 16
[ 176.299309] The buggy address is located 8 bytes inside of
[ 176.299309] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.302746]
[ 176.303356] The buggy address belongs to the physical page:
[ 176.304606] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.306538] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.308102] page_type: 0xffffffff()
[ 176.309142] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.310845] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.312424] page dumped because: kasan: bad access detected
[ 176.313676]
[ 176.314199] Memory state around the buggy address:
[ 176.315416] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.317052] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.318666] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.320221] ^
[ 176.321555] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.323131] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.324687] ==================================================================
---
[ 176.886604] ==================================================================
[ 176.888199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[ 176.890195] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.892077]
[ 176.892604] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.894510] Hardware name: linux,dummy-virt (DT)
[ 176.895627] Call trace:
[ 176.896379] dump_backtrace+0x9c/0x128
[ 176.897473] show_stack+0x20/0x38
[ 176.898487] dump_stack_lvl+0x60/0xb0
[ 176.899657] print_report+0xf8/0x5d8
[ 176.900811] kasan_report+0xc8/0x118
[ 176.901934] kasan_check_range+0xe8/0x190
[ 176.903166] __kasan_check_write+0x20/0x30
[ 176.904312] kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[ 176.905872] kasan_bitops_generic+0xc0/0x148
[ 176.907086] kunit_try_run_case+0xf8/0x260
[ 176.908291] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.909778] kthread+0x18c/0x1a8
[ 176.910778] ret_from_fork+0x10/0x20
[ 176.911880]
[ 176.912405] Allocated by task 207:
[ 176.913318] kasan_save_stack+0x3c/0x68
[ 176.914486] kasan_set_track+0x2c/0x40
[ 176.915618] kasan_save_alloc_info+0x24/0x38
[ 176.916914] __kasan_kmalloc+0xd4/0xd8
[ 176.918096] kmalloc_trace+0x68/0x130
[ 176.919168] kasan_bitops_generic+0x98/0x148
[ 176.920388] kunit_try_run_case+0xf8/0x260
[ 176.921584] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.923052] kthread+0x18c/0x1a8
[ 176.924069] ret_from_fork+0x10/0x20
[ 176.925045]
[ 176.925553] The buggy address belongs to the object at ffff0000c5beef40
[ 176.925553] which belongs to the cache kmalloc-16 of size 16
[ 176.929213] The buggy address is located 8 bytes inside of
[ 176.929213] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.932121]
[ 176.932796] The buggy address belongs to the physical page:
[ 176.934117] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.936116] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.937682] page_type: 0xffffffff()
[ 176.938787] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.940505] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.942156] page dumped because: kasan: bad access detected
[ 176.943449]
[ 176.944002] Memory state around the buggy address:
[ 176.945212] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.946854] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.948467] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.950024] ^
[ 176.951359] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.952998] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.954543] ==================================================================
---
[ 176.538891] ==================================================================
[ 176.540570] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[ 176.542428] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.544184]
[ 176.544874] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.546667] Hardware name: linux,dummy-virt (DT)
[ 176.547822] Call trace:
[ 176.548523] dump_backtrace+0x9c/0x128
[ 176.549631] show_stack+0x20/0x38
[ 176.550638] dump_stack_lvl+0x60/0xb0
[ 176.551802] print_report+0xf8/0x5d8
[ 176.552924] kasan_report+0xc8/0x118
[ 176.554048] kasan_check_range+0xe8/0x190
[ 176.555248] __kasan_check_write+0x20/0x30
[ 176.556431] kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[ 176.557962] kasan_bitops_generic+0xc0/0x148
[ 176.559190] kunit_try_run_case+0xf8/0x260
[ 176.560401] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.561844] kthread+0x18c/0x1a8
[ 176.562805] ret_from_fork+0x10/0x20
[ 176.563866]
[ 176.564181] Allocated by task 207:
[ 176.564652] kasan_save_stack+0x3c/0x68
[ 176.565710] kasan_set_track+0x2c/0x40
[ 176.566822] kasan_save_alloc_info+0x24/0x38
[ 176.568107] __kasan_kmalloc+0xd4/0xd8
[ 176.569241] kmalloc_trace+0x68/0x130
[ 176.570294] kasan_bitops_generic+0x98/0x148
[ 176.571525] kunit_try_run_case+0xf8/0x260
[ 176.572713] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.574175] kthread+0x18c/0x1a8
[ 176.575172] ret_from_fork+0x10/0x20
[ 176.576292]
[ 176.576872] The buggy address belongs to the object at ffff0000c5beef40
[ 176.576872] which belongs to the cache kmalloc-16 of size 16
[ 176.579257] The buggy address is located 8 bytes inside of
[ 176.579257] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.581656]
[ 176.582300] The buggy address belongs to the physical page:
[ 176.583567] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.585537] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.587103] page_type: 0xffffffff()
[ 176.588150] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.589864] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.591402] page dumped because: kasan: bad access detected
[ 176.592656]
[ 176.593232] Memory state around the buggy address:
[ 176.594414] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.596034] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.597639] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.599187] ^
[ 176.600493] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.602138] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.603670] ==================================================================
---
[ 176.399539] ==================================================================
[ 176.401050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[ 176.403058] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.404871]
[ 176.405524] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.408151] Hardware name: linux,dummy-virt (DT)
[ 176.409183] Call trace:
[ 176.410066] dump_backtrace+0x9c/0x128
[ 176.411290] show_stack+0x20/0x38
[ 176.412367] dump_stack_lvl+0x60/0xb0
[ 176.413556] print_report+0xf8/0x5d8
[ 176.414674] kasan_report+0xc8/0x118
[ 176.415903] kasan_check_range+0xe8/0x190
[ 176.417128] __kasan_check_write+0x20/0x30
[ 176.418269] kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[ 176.419825] kasan_bitops_generic+0xc0/0x148
[ 176.421033] kunit_try_run_case+0xf8/0x260
[ 176.422229] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.423672] kthread+0x18c/0x1a8
[ 176.424669] ret_from_fork+0x10/0x20
[ 176.425780]
[ 176.426331] Allocated by task 207:
[ 176.427306] kasan_save_stack+0x3c/0x68
[ 176.428465] kasan_set_track+0x2c/0x40
[ 176.429602] kasan_save_alloc_info+0x24/0x38
[ 176.430792] __kasan_kmalloc+0xd4/0xd8
[ 176.431943] kmalloc_trace+0x68/0x130
[ 176.433015] kasan_bitops_generic+0x98/0x148
[ 176.434240] kunit_try_run_case+0xf8/0x260
[ 176.435414] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.436869] kthread+0x18c/0x1a8
[ 176.437856] ret_from_fork+0x10/0x20
[ 176.438957]
[ 176.439524] The buggy address belongs to the object at ffff0000c5beef40
[ 176.439524] which belongs to the cache kmalloc-16 of size 16
[ 176.441863] The buggy address is located 8 bytes inside of
[ 176.441863] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.444306]
[ 176.444929] The buggy address belongs to the physical page:
[ 176.446160] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.448195] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.449819] page_type: 0xffffffff()
[ 176.450860] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.452572] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.454207] page dumped because: kasan: bad access detected
[ 176.455478]
[ 176.456071] Memory state around the buggy address:
[ 176.457262] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.458894] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.460498] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.462080] ^
[ 176.463437] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.465104] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.466651] ==================================================================
---
[ 176.678613] ==================================================================
[ 176.680415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[ 176.682301] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.683925]
[ 176.684517] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.686387] Hardware name: linux,dummy-virt (DT)
[ 176.687503] Call trace:
[ 176.688263] dump_backtrace+0x9c/0x128
[ 176.689369] show_stack+0x20/0x38
[ 176.690381] dump_stack_lvl+0x60/0xb0
[ 176.691525] print_report+0xf8/0x5d8
[ 176.692665] kasan_report+0xc8/0x118
[ 176.693824] kasan_check_range+0xe8/0x190
[ 176.695062] __kasan_check_write+0x20/0x30
[ 176.696213] kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[ 176.697764] kasan_bitops_generic+0xc0/0x148
[ 176.698984] kunit_try_run_case+0xf8/0x260
[ 176.700194] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.701627] kthread+0x18c/0x1a8
[ 176.702600] ret_from_fork+0x10/0x20
[ 176.703695]
[ 176.704235] Allocated by task 207:
[ 176.705134] kasan_save_stack+0x3c/0x68
[ 176.706295] kasan_set_track+0x2c/0x40
[ 176.707403] kasan_save_alloc_info+0x24/0x38
[ 176.708698] __kasan_kmalloc+0xd4/0xd8
[ 176.709862] kmalloc_trace+0x68/0x130
[ 176.710923] kasan_bitops_generic+0x98/0x148
[ 176.712117] kunit_try_run_case+0xf8/0x260
[ 176.713310] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.714771] kthread+0x18c/0x1a8
[ 176.715994] ret_from_fork+0x10/0x20
[ 176.716903]
[ 176.717424] The buggy address belongs to the object at ffff0000c5beef40
[ 176.717424] which belongs to the cache kmalloc-16 of size 16
[ 176.720189] The buggy address is located 8 bytes inside of
[ 176.720189] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.722652]
[ 176.723223] The buggy address belongs to the physical page:
[ 176.724539] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.726538] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.728115] page_type: 0xffffffff()
[ 176.729181] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.730890] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.732502] page dumped because: kasan: bad access detected
[ 176.733769]
[ 176.734321] Memory state around the buggy address:
[ 176.735531] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.737156] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.738773] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.740337] ^
[ 176.741657] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.743275] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.744852] ==================================================================
Home
[ 176.608218] ==================================================================
[ 176.609659] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[ 176.611663] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.613557]
[ 176.614081] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.617250] Hardware name: linux,dummy-virt (DT)
[ 176.619085] Call trace:
[ 176.620010] dump_backtrace+0x9c/0x128
[ 176.621182] show_stack+0x20/0x38
[ 176.622240] dump_stack_lvl+0x60/0xb0
[ 176.623456] print_report+0xf8/0x5d8
[ 176.624677] kasan_report+0xc8/0x118
[ 176.625853] __asan_load8+0x9c/0xc0
[ 176.627030] kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[ 176.628622] kasan_bitops_generic+0xc0/0x148
[ 176.629964] kunit_try_run_case+0xf8/0x260
[ 176.631016] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.632585] kthread+0x18c/0x1a8
[ 176.633573] ret_from_fork+0x10/0x20
[ 176.634675]
[ 176.635258] Allocated by task 207:
[ 176.636218] kasan_save_stack+0x3c/0x68
[ 176.637379] kasan_set_track+0x2c/0x40
[ 176.638523] kasan_save_alloc_info+0x24/0x38
[ 176.639813] __kasan_kmalloc+0xd4/0xd8
[ 176.640954] kmalloc_trace+0x68/0x130
[ 176.642019] kasan_bitops_generic+0x98/0x148
[ 176.643235] kunit_try_run_case+0xf8/0x260
[ 176.644460] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.645927] kthread+0x18c/0x1a8
[ 176.646915] ret_from_fork+0x10/0x20
[ 176.648027]
[ 176.648609] The buggy address belongs to the object at ffff0000c5beef40
[ 176.648609] which belongs to the cache kmalloc-16 of size 16
[ 176.651008] The buggy address is located 8 bytes inside of
[ 176.651008] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.653498]
[ 176.654089] The buggy address belongs to the physical page:
[ 176.655424] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.657380] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.658956] page_type: 0xffffffff()
[ 176.660057] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.661759] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.663391] page dumped because: kasan: bad access detected
[ 176.664696]
[ 176.665273] Memory state around the buggy address:
[ 176.666498] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.668113] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.669751] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.671302] ^
[ 176.672584] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.674201] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.675759] ==================================================================
---
[ 176.816809] ==================================================================
[ 176.818309] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[ 176.820381] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.821862]
[ 176.823053] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.825097] Hardware name: linux,dummy-virt (DT)
[ 176.826185] Call trace:
[ 176.826940] dump_backtrace+0x9c/0x128
[ 176.828073] show_stack+0x20/0x38
[ 176.829099] dump_stack_lvl+0x60/0xb0
[ 176.830252] print_report+0xf8/0x5d8
[ 176.831387] kasan_report+0xc8/0x118
[ 176.832509] __asan_load8+0x9c/0xc0
[ 176.833610] kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[ 176.835202] kasan_bitops_generic+0xc0/0x148
[ 176.836473] kunit_try_run_case+0xf8/0x260
[ 176.837656] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.839121] kthread+0x18c/0x1a8
[ 176.840121] ret_from_fork+0x10/0x20
[ 176.841219]
[ 176.841794] Allocated by task 207:
[ 176.842759] kasan_save_stack+0x3c/0x68
[ 176.843908] kasan_set_track+0x2c/0x40
[ 176.845024] kasan_save_alloc_info+0x24/0x38
[ 176.846298] __kasan_kmalloc+0xd4/0xd8
[ 176.847441] kmalloc_trace+0x68/0x130
[ 176.848511] kasan_bitops_generic+0x98/0x148
[ 176.849737] kunit_try_run_case+0xf8/0x260
[ 176.850938] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.852426] kthread+0x18c/0x1a8
[ 176.853432] ret_from_fork+0x10/0x20
[ 176.854516]
[ 176.855142] The buggy address belongs to the object at ffff0000c5beef40
[ 176.855142] which belongs to the cache kmalloc-16 of size 16
[ 176.857649] The buggy address is located 8 bytes inside of
[ 176.857649] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.860167]
[ 176.860817] The buggy address belongs to the physical page:
[ 176.862085] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.864107] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.865709] page_type: 0xffffffff()
[ 176.866953] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.868647] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.870265] page dumped because: kasan: bad access detected
[ 176.871573]
[ 176.872229] Memory state around the buggy address:
[ 176.873759] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.875340] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.877063] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.878870] ^
[ 176.880142] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.881811] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.883373] ==================================================================
---
[ 176.747756] ==================================================================
[ 176.749318] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[ 176.751294] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.753099]
[ 176.753745] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.755517] Hardware name: linux,dummy-virt (DT)
[ 176.756656] Call trace:
[ 176.757399] dump_backtrace+0x9c/0x128
[ 176.758491] show_stack+0x20/0x38
[ 176.759499] dump_stack_lvl+0x60/0xb0
[ 176.760665] print_report+0xf8/0x5d8
[ 176.761811] kasan_report+0xc8/0x118
[ 176.762924] __asan_load8+0x9c/0xc0
[ 176.764069] kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[ 176.765621] kasan_bitops_generic+0xc0/0x148
[ 176.766840] kunit_try_run_case+0xf8/0x260
[ 176.768070] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.769509] kthread+0x18c/0x1a8
[ 176.770488] ret_from_fork+0x10/0x20
[ 176.771553]
[ 176.772143] Allocated by task 207:
[ 176.773087] kasan_save_stack+0x3c/0x68
[ 176.774266] kasan_set_track+0x2c/0x40
[ 176.775405] kasan_save_alloc_info+0x24/0x38
[ 176.776682] __kasan_kmalloc+0xd4/0xd8
[ 176.777848] kmalloc_trace+0x68/0x130
[ 176.778922] kasan_bitops_generic+0x98/0x148
[ 176.780147] kunit_try_run_case+0xf8/0x260
[ 176.781348] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.782813] kthread+0x18c/0x1a8
[ 176.783816] ret_from_fork+0x10/0x20
[ 176.784924]
[ 176.785494] The buggy address belongs to the object at ffff0000c5beef40
[ 176.785494] which belongs to the cache kmalloc-16 of size 16
[ 176.787956] The buggy address is located 8 bytes inside of
[ 176.787956] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.790393]
[ 176.791036] The buggy address belongs to the physical page:
[ 176.792338] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.794285] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.795884] page_type: 0xffffffff()
[ 176.796986] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.798690] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.800332] page dumped because: kasan: bad access detected
[ 176.801572]
[ 176.802105] Memory state around the buggy address:
[ 176.803336] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.804978] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.806572] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.808149] ^
[ 176.809503] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.811127] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.812648] ==================================================================
---
[ 176.469346] ==================================================================
[ 176.470944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[ 176.473039] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.474853]
[ 176.475534] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.477343] Hardware name: linux,dummy-virt (DT)
[ 176.478481] Call trace:
[ 176.479279] dump_backtrace+0x9c/0x128
[ 176.480416] show_stack+0x20/0x38
[ 176.481450] dump_stack_lvl+0x60/0xb0
[ 176.482643] print_report+0xf8/0x5d8
[ 176.483925] kasan_report+0xc8/0x118
[ 176.485144] __asan_load8+0x9c/0xc0
[ 176.486383] kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[ 176.488186] kasan_bitops_generic+0xc0/0x148
[ 176.489401] kunit_try_run_case+0xf8/0x260
[ 176.490697] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.492196] kthread+0x18c/0x1a8
[ 176.493209] ret_from_fork+0x10/0x20
[ 176.494363]
[ 176.494995] Allocated by task 207:
[ 176.496000] kasan_save_stack+0x3c/0x68
[ 176.497184] kasan_set_track+0x2c/0x40
[ 176.498361] kasan_save_alloc_info+0x24/0x38
[ 176.499625] __kasan_kmalloc+0xd4/0xd8
[ 176.500803] kmalloc_trace+0x68/0x130
[ 176.501866] kasan_bitops_generic+0x98/0x148
[ 176.503097] kunit_try_run_case+0xf8/0x260
[ 176.504294] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.505714] kthread+0x18c/0x1a8
[ 176.506694] ret_from_fork+0x10/0x20
[ 176.507919]
[ 176.508459] The buggy address belongs to the object at ffff0000c5beef40
[ 176.508459] which belongs to the cache kmalloc-16 of size 16
[ 176.510498] The buggy address is located 8 bytes inside of
[ 176.510498] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.513502]
[ 176.514142] The buggy address belongs to the physical page:
[ 176.515395] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.517347] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.518921] page_type: 0xffffffff()
[ 176.519992] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.521691] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.523311] page dumped because: kasan: bad access detected
[ 176.524628]
[ 176.525174] Memory state around the buggy address:
[ 176.526440] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.528062] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.529693] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.531258] ^
[ 176.532601] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.534184] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.535808] ==================================================================
---
[ 176.329080] ==================================================================
[ 176.330487] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[ 176.332429] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[ 176.334074]
[ 176.334695] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.336528] Hardware name: linux,dummy-virt (DT)
[ 176.337633] Call trace:
[ 176.338335] dump_backtrace+0x9c/0x128
[ 176.339456] show_stack+0x20/0x38
[ 176.340461] dump_stack_lvl+0x60/0xb0
[ 176.341599] print_report+0xf8/0x5d8
[ 176.342717] kasan_report+0xc8/0x118
[ 176.343860] __asan_load8+0x9c/0xc0
[ 176.345166] kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[ 176.346703] kasan_bitops_generic+0xc0/0x148
[ 176.347993] kunit_try_run_case+0xf8/0x260
[ 176.350935] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.352528] kthread+0x18c/0x1a8
[ 176.353385] ret_from_fork+0x10/0x20
[ 176.354694]
[ 176.355349] Allocated by task 207:
[ 176.356358] kasan_save_stack+0x3c/0x68
[ 176.357513] kasan_set_track+0x2c/0x40
[ 176.358643] kasan_save_alloc_info+0x24/0x38
[ 176.359933] __kasan_kmalloc+0xd4/0xd8
[ 176.361069] kmalloc_trace+0x68/0x130
[ 176.362158] kasan_bitops_generic+0x98/0x148
[ 176.363347] kunit_try_run_case+0xf8/0x260
[ 176.364545] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 176.366006] kthread+0x18c/0x1a8
[ 176.366980] ret_from_fork+0x10/0x20
[ 176.368078]
[ 176.368622] The buggy address belongs to the object at ffff0000c5beef40
[ 176.368622] which belongs to the cache kmalloc-16 of size 16
[ 176.370986] The buggy address is located 8 bytes inside of
[ 176.370986] allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[ 176.373347]
[ 176.374012] The buggy address belongs to the physical page:
[ 176.375285] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 176.377248] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 176.378930] page_type: 0xffffffff()
[ 176.380017] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 176.381704] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 176.383313] page dumped because: kasan: bad access detected
[ 176.384598]
[ 176.385146] Memory state around the buggy address:
[ 176.386373] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 176.388018] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 176.389614] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[ 176.391161] ^
[ 176.392507] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 176.394146] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 176.395691] ==================================================================
Home
[ 170.254893] ==================================================================
[ 170.256937] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x1e0
[ 170.258825] Write of size 1 at addr ffff0000c585df00 by task kunit_try_catch/133
[ 170.261300]
[ 170.262086] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.263953] Hardware name: linux,dummy-virt (DT)
[ 170.265159] Call trace:
[ 170.265868] dump_backtrace+0x9c/0x128
[ 170.267186] show_stack+0x20/0x38
[ 170.268582] dump_stack_lvl+0x60/0xb0
[ 170.269968] print_report+0xf8/0x5d8
[ 170.271271] kasan_report+0xc8/0x118
[ 170.272501] __asan_store1+0x60/0x70
[ 170.273962] kmalloc_large_oob_right+0xc8/0x1e0
[ 170.275598] kunit_try_run_case+0xf8/0x260
[ 170.276998] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.278465] kthread+0x18c/0x1a8
[ 170.279683] ret_from_fork+0x10/0x20
[ 170.280842]
[ 170.281457] Allocated by task 133:
[ 170.282428] kasan_save_stack+0x3c/0x68
[ 170.283577] kasan_set_track+0x2c/0x40
[ 170.285078] kasan_save_alloc_info+0x24/0x38
[ 170.286380] __kasan_kmalloc+0xd4/0xd8
[ 170.287823] kmalloc_trace+0x68/0x130
[ 170.288954] kmalloc_large_oob_right+0x9c/0x1e0
[ 170.290292] kunit_try_run_case+0xf8/0x260
[ 170.291868] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.293297] kthread+0x18c/0x1a8
[ 170.294377] ret_from_fork+0x10/0x20
[ 170.295662]
[ 170.296486] The buggy address belongs to the object at ffff0000c585c000
[ 170.296486] which belongs to the cache kmalloc-8k of size 8192
[ 170.299251] The buggy address is located 0 bytes to the right of
[ 170.299251] allocated 7936-byte region [ffff0000c585c000, ffff0000c585df00)
[ 170.302233]
[ 170.302884] The buggy address belongs to the physical page:
[ 170.304216] page:00000000be39d8dd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105858
[ 170.306244] head:00000000be39d8dd order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.307923] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.309577] page_type: 0xffffffff()
[ 170.310898] raw: 0bfffc0000000840 ffff0000c0002280 dead000000000122 0000000000000000
[ 170.313105] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[ 170.314814] page dumped because: kasan: bad access detected
[ 170.316060]
[ 170.316926] Memory state around the buggy address:
[ 170.318246] ffff0000c585de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.319886] ffff0000c585de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.321818] >ffff0000c585df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.323607] ^
[ 170.324380] ffff0000c585df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.326110] ffff0000c585e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.327654] ==================================================================
Home
[ 172.305782] ==================================================================
[ 172.308319] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe0/0x1f8
[ 172.310705] Read of size 64 at addr ffff0000c5f7ca84 by task kunit_try_catch/161
[ 172.312513]
[ 172.313066] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.314894] Hardware name: linux,dummy-virt (DT)
[ 172.316607] Call trace:
[ 172.317475] dump_backtrace+0x9c/0x128
[ 172.318538] show_stack+0x20/0x38
[ 172.319560] dump_stack_lvl+0x60/0xb0
[ 172.321130] print_report+0xf8/0x5d8
[ 172.322083] kasan_report+0xc8/0x118
[ 172.323653] kasan_check_range+0xe8/0x190
[ 172.325166] __asan_memmove+0x3c/0x98
[ 172.326044] kmalloc_memmove_invalid_size+0xe0/0x1f8
[ 172.328304] kunit_try_run_case+0xf8/0x260
[ 172.329535] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.330967] kthread+0x18c/0x1a8
[ 172.332014] ret_from_fork+0x10/0x20
[ 172.332929]
[ 172.333368] Allocated by task 161:
[ 172.334561] kasan_save_stack+0x3c/0x68
[ 172.336789] kasan_set_track+0x2c/0x40
[ 172.337932] kasan_save_alloc_info+0x24/0x38
[ 172.339308] __kasan_kmalloc+0xd4/0xd8
[ 172.340619] kmalloc_trace+0x68/0x130
[ 172.341648] kmalloc_memmove_invalid_size+0xa0/0x1f8
[ 172.342965] kunit_try_run_case+0xf8/0x260
[ 172.344129] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.345778] kthread+0x18c/0x1a8
[ 172.346760] ret_from_fork+0x10/0x20
[ 172.348067]
[ 172.348524] The buggy address belongs to the object at ffff0000c5f7ca80
[ 172.348524] which belongs to the cache kmalloc-64 of size 64
[ 172.351196] The buggy address is located 4 bytes inside of
[ 172.351196] allocated 64-byte region [ffff0000c5f7ca80, ffff0000c5f7cac0)
[ 172.354219]
[ 172.354810] The buggy address belongs to the physical page:
[ 172.356117] page:00000000c9fbfb33 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[ 172.358283] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.360222] page_type: 0xffffffff()
[ 172.361290] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 172.363035] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 172.364790] page dumped because: kasan: bad access detected
[ 172.366314]
[ 172.366785] Memory state around the buggy address:
[ 172.367766] ffff0000c5f7c980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 172.369939] ffff0000c5f7ca00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 172.371837] >ffff0000c5f7ca80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 172.373405] ^
[ 172.374763] ffff0000c5f7cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.376873] ffff0000c5f7cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.378483] ==================================================================
Home
[ 169.842528] ==================================================================
[ 169.845017] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[ 169.846619] Read of size 1 at addr ffff0000c6011000 by task kunit_try_catch/121
[ 169.848258]
[ 169.849465] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 169.851293] Hardware name: linux,dummy-virt (DT)
[ 169.852331] Call trace:
[ 169.853159] dump_backtrace+0x9c/0x128
[ 169.854317] show_stack+0x20/0x38
[ 169.855345] dump_stack_lvl+0x60/0xb0
[ 169.856558] print_report+0xf8/0x5d8
[ 169.857801] kasan_report+0xc8/0x118
[ 169.858963] __asan_load1+0x60/0x70
[ 169.860460] kmalloc_node_oob_right+0xd0/0x1f0
[ 169.861658] kunit_try_run_case+0xf8/0x260
[ 169.862881] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.864437] kthread+0x18c/0x1a8
[ 169.865417] ret_from_fork+0x10/0x20
[ 169.866361]
[ 169.866821] Allocated by task 121:
[ 169.868144] kasan_save_stack+0x3c/0x68
[ 169.869483] kasan_set_track+0x2c/0x40
[ 169.870689] kasan_save_alloc_info+0x24/0x38
[ 169.872336] __kasan_kmalloc+0xd4/0xd8
[ 169.873523] kmalloc_node_trace+0x64/0x130
[ 169.874763] kmalloc_node_oob_right+0xa4/0x1f0
[ 169.876159] kunit_try_run_case+0xf8/0x260
[ 169.877524] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.879148] kthread+0x18c/0x1a8
[ 169.880329] ret_from_fork+0x10/0x20
[ 169.881460]
[ 169.882009] The buggy address belongs to the object at ffff0000c6010000
[ 169.882009] which belongs to the cache kmalloc-4k of size 4096
[ 169.884842] The buggy address is located 0 bytes to the right of
[ 169.884842] allocated 4096-byte region [ffff0000c6010000, ffff0000c6011000)
[ 169.887939]
[ 169.888329] The buggy address belongs to the physical page:
[ 169.889147] page:000000006e8c73fb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106010
[ 169.891325] head:000000006e8c73fb order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 169.893137] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 169.894636] page_type: 0xffffffff()
[ 169.896011] raw: 0bfffc0000000840 ffff0000c0002140 dead000000000122 0000000000000000
[ 169.898139] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[ 169.900108] page dumped because: kasan: bad access detected
[ 169.901465]
[ 169.902112] Memory state around the buggy address:
[ 169.903408] ffff0000c6010f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 169.905541] ffff0000c6010f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 169.907328] >ffff0000c6011000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.908946] ^
[ 169.910056] ffff0000c6011080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.911829] ffff0000c6011100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.913597] ==================================================================
Home
[ 171.565338] ==================================================================
[ 171.567881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x268
[ 171.569173] Write of size 16 at addr ffff0000c5902340 by task kunit_try_catch/145
[ 171.570952]
[ 171.571660] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.573968] Hardware name: linux,dummy-virt (DT)
[ 171.575310] Call trace:
[ 171.576234] dump_backtrace+0x9c/0x128
[ 171.577313] show_stack+0x20/0x38
[ 171.578452] dump_stack_lvl+0x60/0xb0
[ 171.579702] print_report+0xf8/0x5d8
[ 171.580820] kasan_report+0xc8/0x118
[ 171.582039] __asan_store16+0xa4/0xa8
[ 171.583453] kmalloc_oob_16+0xf8/0x268
[ 171.585045] kunit_try_run_case+0xf8/0x260
[ 171.586022] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.587669] kthread+0x18c/0x1a8
[ 171.588875] ret_from_fork+0x10/0x20
[ 171.590037]
[ 171.590587] Allocated by task 145:
[ 171.591694] kasan_save_stack+0x3c/0x68
[ 171.593030] kasan_set_track+0x2c/0x40
[ 171.594217] kasan_save_alloc_info+0x24/0x38
[ 171.595681] __kasan_kmalloc+0xd4/0xd8
[ 171.596875] kmalloc_trace+0x68/0x130
[ 171.597952] kmalloc_oob_16+0xa4/0x268
[ 171.599044] kunit_try_run_case+0xf8/0x260
[ 171.600220] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.601881] kthread+0x18c/0x1a8
[ 171.602855] ret_from_fork+0x10/0x20
[ 171.604211]
[ 171.604827] The buggy address belongs to the object at ffff0000c5902340
[ 171.604827] which belongs to the cache kmalloc-16 of size 16
[ 171.607321] The buggy address is located 0 bytes inside of
[ 171.607321] allocated 13-byte region [ffff0000c5902340, ffff0000c590234d)
[ 171.609842]
[ 171.610435] The buggy address belongs to the physical page:
[ 171.612014] page:000000000435baa8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105902
[ 171.613571] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 171.615356] page_type: 0xffffffff()
[ 171.616701] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 171.618249] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 171.619936] page dumped because: kasan: bad access detected
[ 171.621486]
[ 171.622007] Memory state around the buggy address:
[ 171.623313] ffff0000c5902200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 171.625349] ffff0000c5902280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 171.627242] >ffff0000c5902300: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[ 171.628994] ^
[ 171.630323] ffff0000c5902380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.632040] ffff0000c5902400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.633508] ==================================================================
Home
[ 171.765927] ==================================================================
[ 171.767927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd4/0x1e8
[ 171.769611] Write of size 128 at addr ffff0000c5ed2e00 by task kunit_try_catch/149
[ 171.771236]
[ 171.771954] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.773849] Hardware name: linux,dummy-virt (DT)
[ 171.774961] Call trace:
[ 171.775613] dump_backtrace+0x9c/0x128
[ 171.776763] show_stack+0x20/0x38
[ 171.777775] dump_stack_lvl+0x60/0xb0
[ 171.778924] print_report+0xf8/0x5d8
[ 171.780060] kasan_report+0xc8/0x118
[ 171.781180] kasan_check_range+0xe8/0x190
[ 171.782390] __asan_memset+0x34/0x78
[ 171.783433] kmalloc_oob_in_memset+0xd4/0x1e8
[ 171.784668] kunit_try_run_case+0xf8/0x260
[ 171.785883] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.787335] kthread+0x18c/0x1a8
[ 171.788344] ret_from_fork+0x10/0x20
[ 171.789424]
[ 171.789952] Allocated by task 149:
[ 171.790912] kasan_save_stack+0x3c/0x68
[ 171.792068] kasan_set_track+0x2c/0x40
[ 171.793207] kasan_save_alloc_info+0x24/0x38
[ 171.794455] __kasan_kmalloc+0xd4/0xd8
[ 171.795591] kmalloc_trace+0x68/0x130
[ 171.796683] kmalloc_oob_in_memset+0xa0/0x1e8
[ 171.797916] kunit_try_run_case+0xf8/0x260
[ 171.799126] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.800592] kthread+0x18c/0x1a8
[ 171.801558] ret_from_fork+0x10/0x20
[ 171.802633]
[ 171.803158] The buggy address belongs to the object at ffff0000c5ed2e00
[ 171.803158] which belongs to the cache kmalloc-128 of size 128
[ 171.805632] The buggy address is located 0 bytes inside of
[ 171.805632] allocated 120-byte region [ffff0000c5ed2e00, ffff0000c5ed2e78)
[ 171.808065]
[ 171.808605] The buggy address belongs to the physical page:
[ 171.809905] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[ 171.811916] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 171.813471] page_type: 0xffffffff()
[ 171.814514] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 171.816251] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 171.817884] page dumped because: kasan: bad access detected
[ 171.819155]
[ 171.819683] Memory state around the buggy address:
[ 171.820934] ffff0000c5ed2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 171.822515] ffff0000c5ed2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.824123] >ffff0000c5ed2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 171.825645] ^
[ 171.827253] ffff0000c5ed2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.828869] ffff0000c5ed2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.830381] ==================================================================
Home
[ 169.754951] ==================================================================
[ 169.757235] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc8/0x1f0
[ 169.758796] Read of size 1 at addr ffff0000c5beeedf by task kunit_try_catch/119
[ 169.760641]
[ 169.761323] CPU: 1 PID: 119 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 169.762785] Hardware name: linux,dummy-virt (DT)
[ 169.763365] Call trace:
[ 169.763778] dump_backtrace+0x9c/0x128
[ 169.765050] show_stack+0x20/0x38
[ 169.766110] dump_stack_lvl+0x60/0xb0
[ 169.767309] print_report+0xf8/0x5d8
[ 169.768432] kasan_report+0xc8/0x118
[ 169.769513] __asan_load1+0x60/0x70
[ 169.770620] kmalloc_oob_left+0xc8/0x1f0
[ 169.771823] kunit_try_run_case+0xf8/0x260
[ 169.773069] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.774584] kthread+0x18c/0x1a8
[ 169.775620] ret_from_fork+0x10/0x20
[ 169.776749]
[ 169.777271] Allocated by task 29:
[ 169.778157] kasan_save_stack+0x3c/0x68
[ 169.779305] kasan_set_track+0x2c/0x40
[ 169.780452] kasan_save_alloc_info+0x24/0x38
[ 169.781685] __kasan_kmalloc+0xd4/0xd8
[ 169.782824] __kmalloc_node_track_caller+0x74/0x1d0
[ 169.784111] kvasprintf+0xcc/0x170
[ 169.785140] __kthread_create_on_node+0x11c/0x250
[ 169.786435] kthread_create_on_node+0xac/0xf0
[ 169.787686] create_worker+0x160/0x3b8
[ 169.788778] worker_thread+0x5d8/0x708
[ 169.789858] kthread+0x18c/0x1a8
[ 169.790825] ret_from_fork+0x10/0x20
[ 169.791905]
[ 169.792444] The buggy address belongs to the object at ffff0000c5beeec0
[ 169.792444] which belongs to the cache kmalloc-16 of size 16
[ 169.794805] The buggy address is located 19 bytes to the right of
[ 169.794805] allocated 12-byte region [ffff0000c5beeec0, ffff0000c5beeecc)
[ 169.797287]
[ 169.797884] The buggy address belongs to the physical page:
[ 169.799713] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 169.801755] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 169.803284] page_type: 0xffffffff()
[ 169.805363] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 169.807046] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 169.809136] page dumped because: kasan: bad access detected
[ 169.810054]
[ 169.810492] Memory state around the buggy address:
[ 169.812491] ffff0000c5beed80: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 169.814115] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 169.816088] >ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[ 169.817308] ^
[ 169.819100] ffff0000c5beef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.820854] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.822332] ==================================================================
Home
[ 171.850562] ==================================================================
[ 171.853141] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd8/0x1f0
[ 171.854414] Write of size 2 at addr ffff0000c6054277 by task kunit_try_catch/151
[ 171.856302]
[ 171.856944] CPU: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.859832] Hardware name: linux,dummy-virt (DT)
[ 171.860673] Call trace:
[ 171.861230] dump_backtrace+0x9c/0x128
[ 171.863872] show_stack+0x20/0x38
[ 171.864925] dump_stack_lvl+0x60/0xb0
[ 171.866178] print_report+0xf8/0x5d8
[ 171.867364] kasan_report+0xc8/0x118
[ 171.868774] kasan_check_range+0xe8/0x190
[ 171.869819] __asan_memset+0x34/0x78
[ 171.870887] kmalloc_oob_memset_2+0xd8/0x1f0
[ 171.872321] kunit_try_run_case+0xf8/0x260
[ 171.873344] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.874923] kthread+0x18c/0x1a8
[ 171.875862] ret_from_fork+0x10/0x20
[ 171.876946]
[ 171.877761] Allocated by task 151:
[ 171.878865] kasan_save_stack+0x3c/0x68
[ 171.880139] kasan_set_track+0x2c/0x40
[ 171.881472] kasan_save_alloc_info+0x24/0x38
[ 171.882845] __kasan_kmalloc+0xd4/0xd8
[ 171.884040] kmalloc_trace+0x68/0x130
[ 171.885139] kmalloc_oob_memset_2+0xa0/0x1f0
[ 171.886631] kunit_try_run_case+0xf8/0x260
[ 171.888638] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.890164] kthread+0x18c/0x1a8
[ 171.891970] ret_from_fork+0x10/0x20
[ 171.893418]
[ 171.894010] The buggy address belongs to the object at ffff0000c6054200
[ 171.894010] which belongs to the cache kmalloc-128 of size 128
[ 171.896803] The buggy address is located 119 bytes inside of
[ 171.896803] allocated 120-byte region [ffff0000c6054200, ffff0000c6054278)
[ 171.899554]
[ 171.900655] The buggy address belongs to the physical page:
[ 171.902281] page:00000000782541df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106054
[ 171.904622] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 171.906239] page_type: 0xffffffff()
[ 171.907741] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 171.909242] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 171.911082] page dumped because: kasan: bad access detected
[ 171.912303]
[ 171.913005] Memory state around the buggy address:
[ 171.914395] ffff0000c6054100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 171.916284] ffff0000c6054180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.918347] >ffff0000c6054200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 171.920239] ^
[ 171.921698] ffff0000c6054280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.923392] ffff0000c6054300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.925430] ==================================================================
Home
[ 172.126654] ==================================================================
[ 172.128753] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x1e8
[ 172.130339] Write of size 16 at addr ffff0000c6054569 by task kunit_try_catch/157
[ 172.131960]
[ 172.132642] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.134468] Hardware name: linux,dummy-virt (DT)
[ 172.135569] Call trace:
[ 172.136288] dump_backtrace+0x9c/0x128
[ 172.137350] show_stack+0x20/0x38
[ 172.138369] dump_stack_lvl+0x60/0xb0
[ 172.139497] print_report+0xf8/0x5d8
[ 172.140609] kasan_report+0xc8/0x118
[ 172.141737] kasan_check_range+0xe8/0x190
[ 172.142973] __asan_memset+0x34/0x78
[ 172.144009] kmalloc_oob_memset_16+0xd8/0x1e8
[ 172.145217] kunit_try_run_case+0xf8/0x260
[ 172.146421] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.147815] kthread+0x18c/0x1a8
[ 172.148809] ret_from_fork+0x10/0x20
[ 172.149913]
[ 172.150451] Allocated by task 157:
[ 172.151363] kasan_save_stack+0x3c/0x68
[ 172.152515] kasan_set_track+0x2c/0x40
[ 172.153643] kasan_save_alloc_info+0x24/0x38
[ 172.154893] __kasan_kmalloc+0xd4/0xd8
[ 172.156025] kmalloc_trace+0x68/0x130
[ 172.157123] kmalloc_oob_memset_16+0xa0/0x1e8
[ 172.158329] kunit_try_run_case+0xf8/0x260
[ 172.159528] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.160982] kthread+0x18c/0x1a8
[ 172.161976] ret_from_fork+0x10/0x20
[ 172.163053]
[ 172.163546] The buggy address belongs to the object at ffff0000c6054500
[ 172.163546] which belongs to the cache kmalloc-128 of size 128
[ 172.167046] The buggy address is located 105 bytes inside of
[ 172.167046] allocated 120-byte region [ffff0000c6054500, ffff0000c6054578)
[ 172.169388]
[ 172.169904] The buggy address belongs to the physical page:
[ 172.171091] page:00000000782541df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106054
[ 172.173714] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.175309] page_type: 0xffffffff()
[ 172.176332] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 172.178050] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 172.179662] page dumped because: kasan: bad access detected
[ 172.180983]
[ 172.181512] Memory state around the buggy address:
[ 172.182753] ffff0000c6054400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 172.184351] ffff0000c6054480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.185947] >ffff0000c6054500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 172.187455] ^
[ 172.189034] ffff0000c6054580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.190653] ffff0000c6054600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.192194] ==================================================================
---
[ 172.042016] ==================================================================
[ 172.044383] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8
[ 172.045971] Write of size 8 at addr ffff0000c6054471 by task kunit_try_catch/155
[ 172.047892]
[ 172.048590] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.050573] Hardware name: linux,dummy-virt (DT)
[ 172.052171] Call trace:
[ 172.053045] dump_backtrace+0x9c/0x128
[ 172.054155] show_stack+0x20/0x38
[ 172.055148] dump_stack_lvl+0x60/0xb0
[ 172.056290] print_report+0xf8/0x5d8
[ 172.057397] kasan_report+0xc8/0x118
[ 172.058493] kasan_check_range+0xe8/0x190
[ 172.059691] __asan_memset+0x34/0x78
[ 172.060770] kmalloc_oob_memset_8+0xd8/0x1e8
[ 172.061980] kunit_try_run_case+0xf8/0x260
[ 172.063166] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.064597] kthread+0x18c/0x1a8
[ 172.065531] ret_from_fork+0x10/0x20
[ 172.066612]
[ 172.067169] Allocated by task 155:
[ 172.068081] kasan_save_stack+0x3c/0x68
[ 172.069230] kasan_set_track+0x2c/0x40
[ 172.070334] kasan_save_alloc_info+0x24/0x38
[ 172.071567] __kasan_kmalloc+0xd4/0xd8
[ 172.072692] kmalloc_trace+0x68/0x130
[ 172.073768] kmalloc_oob_memset_8+0xa0/0x1e8
[ 172.074941] kunit_try_run_case+0xf8/0x260
[ 172.076153] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.077560] kthread+0x18c/0x1a8
[ 172.078522] ret_from_fork+0x10/0x20
[ 172.079579]
[ 172.080124] The buggy address belongs to the object at ffff0000c6054400
[ 172.080124] which belongs to the cache kmalloc-128 of size 128
[ 172.082438] The buggy address is located 113 bytes inside of
[ 172.082438] allocated 120-byte region [ffff0000c6054400, ffff0000c6054478)
[ 172.084980]
[ 172.085542] The buggy address belongs to the physical page:
[ 172.086799] page:00000000782541df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106054
[ 172.088683] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.090247] page_type: 0xffffffff()
[ 172.091316] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 172.093002] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 172.094575] page dumped because: kasan: bad access detected
[ 172.095974]
[ 172.096580] Memory state around the buggy address:
[ 172.097760] ffff0000c6054300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 172.099314] ffff0000c6054380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.100916] >ffff0000c6054400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 172.102401] ^
[ 172.103966] ffff0000c6054480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.105528] ffff0000c6054500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.107068] ==================================================================
Home
[ 171.948835] ==================================================================
[ 171.951335] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x1e8
[ 171.952951] Write of size 4 at addr ffff0000c6048075 by task kunit_try_catch/153
[ 171.954590]
[ 171.955170] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.957272] Hardware name: linux,dummy-virt (DT)
[ 171.958274] Call trace:
[ 171.959445] dump_backtrace+0x9c/0x128
[ 171.960442] show_stack+0x20/0x38
[ 171.961453] dump_stack_lvl+0x60/0xb0
[ 171.962589] print_report+0xf8/0x5d8
[ 171.963859] kasan_report+0xc8/0x118
[ 171.965099] kasan_check_range+0xe8/0x190
[ 171.966389] __asan_memset+0x34/0x78
[ 171.967835] kmalloc_oob_memset_4+0xd8/0x1e8
[ 171.968971] kunit_try_run_case+0xf8/0x260
[ 171.970239] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.971661] kthread+0x18c/0x1a8
[ 171.972899] ret_from_fork+0x10/0x20
[ 171.974296]
[ 171.975059] Allocated by task 153:
[ 171.976450] kasan_save_stack+0x3c/0x68
[ 171.977762] kasan_set_track+0x2c/0x40
[ 171.978964] kasan_save_alloc_info+0x24/0x38
[ 171.980206] __kasan_kmalloc+0xd4/0xd8
[ 171.981391] kmalloc_trace+0x68/0x130
[ 171.982471] kmalloc_oob_memset_4+0xa0/0x1e8
[ 171.983946] kunit_try_run_case+0xf8/0x260
[ 171.985043] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.986589] kthread+0x18c/0x1a8
[ 171.987565] ret_from_fork+0x10/0x20
[ 171.988756]
[ 171.989334] The buggy address belongs to the object at ffff0000c6048000
[ 171.989334] which belongs to the cache kmalloc-128 of size 128
[ 171.992170] The buggy address is located 117 bytes inside of
[ 171.992170] allocated 120-byte region [ffff0000c6048000, ffff0000c6048078)
[ 171.996017]
[ 171.997084] The buggy address belongs to the physical page:
[ 171.998375] page:0000000002e4fb2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106048
[ 172.000409] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.001843] page_type: 0xffffffff()
[ 172.002999] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 172.005062] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 172.006690] page dumped because: kasan: bad access detected
[ 172.008230]
[ 172.008793] Memory state around the buggy address:
[ 172.009972] ffff0000c6047f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 172.012162] ffff0000c6047f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 172.013861] >ffff0000c6048000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 172.015649] ^
[ 172.017367] ffff0000c6048080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.018985] ffff0000c6048100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.020747] ==================================================================
Home
[ 169.510815] ==================================================================
[ 169.513179] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x308
[ 169.516331] Write of size 1 at addr ffff0000c5ed2373 by task kunit_try_catch/117
[ 169.517694]
[ 169.518910] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G N 6.6.72-rc1 #1
[ 169.521215] Hardware name: linux,dummy-virt (DT)
[ 169.522805] Call trace:
[ 169.523561] dump_backtrace+0x9c/0x128
[ 169.525346] show_stack+0x20/0x38
[ 169.526401] dump_stack_lvl+0x60/0xb0
[ 169.527836] print_report+0xf8/0x5d8
[ 169.528992] kasan_report+0xc8/0x118
[ 169.530157] __asan_store1+0x60/0x70
[ 169.531397] kmalloc_oob_right+0xc8/0x308
[ 169.533130] kunit_try_run_case+0xf8/0x260
[ 169.534408] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.536259] kthread+0x18c/0x1a8
[ 169.537239] ret_from_fork+0x10/0x20
[ 169.538745]
[ 169.539365] Allocated by task 117:
[ 169.540439] kasan_save_stack+0x3c/0x68
[ 169.542160] kasan_set_track+0x2c/0x40
[ 169.544048] kasan_save_alloc_info+0x24/0x38
[ 169.545394] __kasan_kmalloc+0xd4/0xd8
[ 169.546743] kmalloc_trace+0x68/0x130
[ 169.547875] kmalloc_oob_right+0xa0/0x308
[ 169.549660] kunit_try_run_case+0xf8/0x260
[ 169.551150] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.552795] kthread+0x18c/0x1a8
[ 169.554164] ret_from_fork+0x10/0x20
[ 169.556370]
[ 169.557383] The buggy address belongs to the object at ffff0000c5ed2300
[ 169.557383] which belongs to the cache kmalloc-128 of size 128
[ 169.560186] The buggy address is located 0 bytes to the right of
[ 169.560186] allocated 115-byte region [ffff0000c5ed2300, ffff0000c5ed2373)
[ 169.562677]
[ 169.563619] The buggy address belongs to the physical page:
[ 169.565549] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[ 169.568834] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 169.570419] page_type: 0xffffffff()
[ 169.572694] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 169.574505] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 169.576442] page dumped because: kasan: bad access detected
[ 169.577451]
[ 169.578025] Memory state around the buggy address:
[ 169.580287] ffff0000c5ed2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 169.581980] ffff0000c5ed2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.583705] >ffff0000c5ed2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 169.585553] ^
[ 169.587518] ffff0000c5ed2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.589157] ffff0000c5ed2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.590715] ==================================================================
Home
[ 169.673843] ==================================================================
[ 169.675521] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x118/0x308
[ 169.677079] Read of size 1 at addr ffff0000c5ed2380 by task kunit_try_catch/117
[ 169.678612]
[ 169.679209] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 169.681132] Hardware name: linux,dummy-virt (DT)
[ 169.682055] Call trace:
[ 169.682636] dump_backtrace+0x9c/0x128
[ 169.683560] show_stack+0x20/0x38
[ 169.684551] dump_stack_lvl+0x60/0xb0
[ 169.685748] print_report+0xf8/0x5d8
[ 169.686890] kasan_report+0xc8/0x118
[ 169.688037] __asan_load1+0x60/0x70
[ 169.689130] kmalloc_oob_right+0x118/0x308
[ 169.690292] kunit_try_run_case+0xf8/0x260
[ 169.691477] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.692987] kthread+0x18c/0x1a8
[ 169.693948] ret_from_fork+0x10/0x20
[ 169.695012]
[ 169.695495] Allocated by task 117:
[ 169.696479] kasan_save_stack+0x3c/0x68
[ 169.697995] kasan_set_track+0x2c/0x40
[ 169.700202] kasan_save_alloc_info+0x24/0x38
[ 169.701637] __kasan_kmalloc+0xd4/0xd8
[ 169.702868] kmalloc_trace+0x68/0x130
[ 169.703929] kmalloc_oob_right+0xa0/0x308
[ 169.705088] kunit_try_run_case+0xf8/0x260
[ 169.706286] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.707739] kthread+0x18c/0x1a8
[ 169.708709] ret_from_fork+0x10/0x20
[ 169.709807]
[ 169.710303] The buggy address belongs to the object at ffff0000c5ed2300
[ 169.710303] which belongs to the cache kmalloc-128 of size 128
[ 169.712625] The buggy address is located 13 bytes to the right of
[ 169.712625] allocated 115-byte region [ffff0000c5ed2300, ffff0000c5ed2373)
[ 169.715221]
[ 169.715825] The buggy address belongs to the physical page:
[ 169.717144] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[ 169.719098] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 169.720664] page_type: 0xffffffff()
[ 169.721708] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 169.723414] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 169.725045] page dumped because: kasan: bad access detected
[ 169.726321]
[ 169.726840] Memory state around the buggy address:
[ 169.728058] ffff0000c5ed2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.729661] ffff0000c5ed2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 169.731323] >ffff0000c5ed2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.732857] ^
[ 169.733768] ffff0000c5ed2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.735356] ffff0000c5ed2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.736891] ==================================================================
Home
[ 169.599263] ==================================================================
[ 169.600848] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xf0/0x308
[ 169.603176] Write of size 1 at addr ffff0000c5ed2378 by task kunit_try_catch/117
[ 169.605871]
[ 169.606660] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 169.608774] Hardware name: linux,dummy-virt (DT)
[ 169.609868] Call trace:
[ 169.610605] dump_backtrace+0x9c/0x128
[ 169.611800] show_stack+0x20/0x38
[ 169.612943] dump_stack_lvl+0x60/0xb0
[ 169.614140] print_report+0xf8/0x5d8
[ 169.615269] kasan_report+0xc8/0x118
[ 169.616418] __asan_store1+0x60/0x70
[ 169.617879] kmalloc_oob_right+0xf0/0x308
[ 169.619543] kunit_try_run_case+0xf8/0x260
[ 169.620744] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.622185] kthread+0x18c/0x1a8
[ 169.623337] ret_from_fork+0x10/0x20
[ 169.624274]
[ 169.625086] Allocated by task 117:
[ 169.626052] kasan_save_stack+0x3c/0x68
[ 169.627394] kasan_set_track+0x2c/0x40
[ 169.628589] kasan_save_alloc_info+0x24/0x38
[ 169.629852] __kasan_kmalloc+0xd4/0xd8
[ 169.630964] kmalloc_trace+0x68/0x130
[ 169.632017] kmalloc_oob_right+0xa0/0x308
[ 169.633165] kunit_try_run_case+0xf8/0x260
[ 169.634379] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.635865] kthread+0x18c/0x1a8
[ 169.636922] ret_from_fork+0x10/0x20
[ 169.637999]
[ 169.638505] The buggy address belongs to the object at ffff0000c5ed2300
[ 169.638505] which belongs to the cache kmalloc-128 of size 128
[ 169.641347] The buggy address is located 5 bytes to the right of
[ 169.641347] allocated 115-byte region [ffff0000c5ed2300, ffff0000c5ed2373)
[ 169.644243]
[ 169.644877] The buggy address belongs to the physical page:
[ 169.646159] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[ 169.648622] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 169.650230] page_type: 0xffffffff()
[ 169.651716] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 169.653383] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 169.655223] page dumped because: kasan: bad access detected
[ 169.656801]
[ 169.657372] Memory state around the buggy address:
[ 169.658581] ffff0000c5ed2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 169.660286] ffff0000c5ed2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.661554] >ffff0000c5ed2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 169.663779] ^
[ 169.665512] ffff0000c5ed2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.667337] ffff0000c5ed2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 169.668874] ==================================================================
Home
[ 169.940982] ==================================================================
[ 169.943938] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xac/0x1c0
[ 169.945534] Write of size 1 at addr ffff0000c5f1600a by task kunit_try_catch/123
[ 169.948063]
[ 169.948867] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 169.950986] Hardware name: linux,dummy-virt (DT)
[ 169.952286] Call trace:
[ 169.952961] dump_backtrace+0x9c/0x128
[ 169.953888] show_stack+0x20/0x38
[ 169.955152] dump_stack_lvl+0x60/0xb0
[ 169.956665] print_report+0xf8/0x5d8
[ 169.957967] kasan_report+0xc8/0x118
[ 169.959373] __asan_store1+0x60/0x70
[ 169.960620] kmalloc_pagealloc_oob_right+0xac/0x1c0
[ 169.962237] kunit_try_run_case+0xf8/0x260
[ 169.963808] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 169.965226] kthread+0x18c/0x1a8
[ 169.966039] ret_from_fork+0x10/0x20
[ 169.967444]
[ 169.968115] The buggy address belongs to the physical page:
[ 169.969624] page:0000000020943f65 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f14
[ 169.971923] head:0000000020943f65 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 169.973343] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 169.974889] page_type: 0xffffffff()
[ 169.976447] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 169.978376] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 169.980738] page dumped because: kasan: bad access detected
[ 169.981680]
[ 169.982254] Memory state around the buggy address:
[ 169.983712] ffff0000c5f15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 169.985364] ffff0000c5f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 169.986995] >ffff0000c5f16000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 169.988453] ^
[ 169.990096] ffff0000c5f16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 169.991886] ffff0000c5f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 169.993593] ==================================================================
Home
[ 172.805229] ==================================================================
[ 172.807333] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd8/0x268
[ 172.809258] Read of size 1 at addr ffff0000c5f320c8 by task kunit_try_catch/175
[ 172.810948]
[ 172.811490] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.813477] Hardware name: linux,dummy-virt (DT)
[ 172.814581] Call trace:
[ 172.815406] dump_backtrace+0x9c/0x128
[ 172.816786] show_stack+0x20/0x38
[ 172.817813] dump_stack_lvl+0x60/0xb0
[ 172.818976] print_report+0xf8/0x5d8
[ 172.820329] kasan_report+0xc8/0x118
[ 172.821547] __asan_load1+0x60/0x70
[ 172.822644] kmem_cache_oob+0xd8/0x268
[ 172.823832] kunit_try_run_case+0xf8/0x260
[ 172.825263] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.827217] kthread+0x18c/0x1a8
[ 172.828043] ret_from_fork+0x10/0x20
[ 172.829750]
[ 172.830334] Allocated by task 175:
[ 172.831246] kasan_save_stack+0x3c/0x68
[ 172.832445] kasan_set_track+0x2c/0x40
[ 172.833601] kasan_save_alloc_info+0x24/0x38
[ 172.834882] __kasan_slab_alloc+0xa8/0xb0
[ 172.836110] kmem_cache_alloc+0x134/0x330
[ 172.837294] kmem_cache_oob+0xb8/0x268
[ 172.838415] kunit_try_run_case+0xf8/0x260
[ 172.839633] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.841125] kthread+0x18c/0x1a8
[ 172.842104] ret_from_fork+0x10/0x20
[ 172.843198]
[ 172.843782] The buggy address belongs to the object at ffff0000c5f32000
[ 172.843782] which belongs to the cache test_cache of size 200
[ 172.846211] The buggy address is located 0 bytes to the right of
[ 172.846211] allocated 200-byte region [ffff0000c5f32000, ffff0000c5f320c8)
[ 172.848855]
[ 172.849377] The buggy address belongs to the physical page:
[ 172.850655] page:00000000d1f90efa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f32
[ 172.852692] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.854311] page_type: 0xffffffff()
[ 172.855413] raw: 0bfffc0000000800 ffff0000c5738780 dead000000000122 0000000000000000
[ 172.857173] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 172.858804] page dumped because: kasan: bad access detected
[ 172.860103]
[ 172.860626] Memory state around the buggy address:
[ 172.861836] ffff0000c5f31f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 172.863495] ffff0000c5f32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 172.865139] >ffff0000c5f32080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 172.866681] ^
[ 172.868062] ffff0000c5f32100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.869652] ffff0000c5f32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.871194] ==================================================================
Home
[ 170.521382] ==================================================================
[ 170.523845] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590
[ 170.526870] Write of size 1 at addr ffff0000c581dcc9 by task kunit_try_catch/137
[ 170.528897]
[ 170.529599] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.531609] Hardware name: linux,dummy-virt (DT)
[ 170.532775] Call trace:
[ 170.533336] dump_backtrace+0x9c/0x128
[ 170.534700] show_stack+0x20/0x38
[ 170.536158] dump_stack_lvl+0x60/0xb0
[ 170.537753] print_report+0xf8/0x5d8
[ 170.539532] kasan_report+0xc8/0x118
[ 170.540778] __asan_store1+0x60/0x70
[ 170.541980] krealloc_less_oob_helper+0x110/0x590
[ 170.543332] krealloc_less_oob+0x20/0x38
[ 170.544944] kunit_try_run_case+0xf8/0x260
[ 170.546585] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.548326] kthread+0x18c/0x1a8
[ 170.549177] ret_from_fork+0x10/0x20
[ 170.550313]
[ 170.550946] Allocated by task 137:
[ 170.551918] kasan_save_stack+0x3c/0x68
[ 170.553846] kasan_set_track+0x2c/0x40
[ 170.554898] kasan_save_alloc_info+0x24/0x38
[ 170.556471] __kasan_krealloc+0x10c/0x140
[ 170.557809] krealloc+0x10c/0x1a0
[ 170.558736] krealloc_less_oob_helper+0xd4/0x590
[ 170.560513] krealloc_less_oob+0x20/0x38
[ 170.561464] kunit_try_run_case+0xf8/0x260
[ 170.562490] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.564360] kthread+0x18c/0x1a8
[ 170.565414] ret_from_fork+0x10/0x20
[ 170.566684]
[ 170.567254] The buggy address belongs to the object at ffff0000c581dc00
[ 170.567254] which belongs to the cache kmalloc-256 of size 256
[ 170.569872] The buggy address is located 0 bytes to the right of
[ 170.569872] allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[ 170.573182]
[ 170.573775] The buggy address belongs to the physical page:
[ 170.575369] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[ 170.577153] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.579382] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.581539] page_type: 0xffffffff()
[ 170.582662] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.584535] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.586027] page dumped because: kasan: bad access detected
[ 170.587640]
[ 170.588163] Memory state around the buggy address:
[ 170.589776] ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.591639] ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.593249] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 170.594907] ^
[ 170.596249] ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.598047] ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.599927] ==================================================================
Home
[ 171.250488] ==================================================================
[ 171.252180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590
[ 171.253851] Write of size 1 at addr ffff0000c5f1a0ea by task kunit_try_catch/141
[ 171.255525]
[ 171.256185] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.257998] Hardware name: linux,dummy-virt (DT)
[ 171.259105] Call trace:
[ 171.259838] dump_backtrace+0x9c/0x128
[ 171.260945] show_stack+0x20/0x38
[ 171.261932] dump_stack_lvl+0x60/0xb0
[ 171.263067] print_report+0xf8/0x5d8
[ 171.264196] kasan_report+0xc8/0x118
[ 171.265307] __asan_store1+0x60/0x70
[ 171.266422] krealloc_less_oob_helper+0x1b8/0x590
[ 171.267926] krealloc_pagealloc_less_oob+0x20/0x38
[ 171.269103] kunit_try_run_case+0xf8/0x260
[ 171.270175] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.271695] kthread+0x18c/0x1a8
[ 171.272673] ret_from_fork+0x10/0x20
[ 171.273779]
[ 171.274284] The buggy address belongs to the physical page:
[ 171.275578] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[ 171.277532] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.279274] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 171.280861] page_type: 0xffffffff()
[ 171.281871] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 171.283555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 171.285238] page dumped because: kasan: bad access detected
[ 171.286498]
[ 171.287067] Memory state around the buggy address:
[ 171.288279] ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.289897] ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.291480] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 171.293013] ^
[ 171.294516] ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.296150] ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.297686] ==================================================================
Home
[ 171.198273] ==================================================================
[ 171.199900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590
[ 171.201474] Write of size 1 at addr ffff0000c5f1a0da by task kunit_try_catch/141
[ 171.203479]
[ 171.204341] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.206654] Hardware name: linux,dummy-virt (DT)
[ 171.207894] Call trace:
[ 171.208446] dump_backtrace+0x9c/0x128
[ 171.210230] show_stack+0x20/0x38
[ 171.211297] dump_stack_lvl+0x60/0xb0
[ 171.212323] print_report+0xf8/0x5d8
[ 171.213453] kasan_report+0xc8/0x118
[ 171.214571] __asan_store1+0x60/0x70
[ 171.215684] krealloc_less_oob_helper+0x18c/0x590
[ 171.216982] krealloc_pagealloc_less_oob+0x20/0x38
[ 171.218252] kunit_try_run_case+0xf8/0x260
[ 171.219430] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.220883] kthread+0x18c/0x1a8
[ 171.221836] ret_from_fork+0x10/0x20
[ 171.222926]
[ 171.223420] The buggy address belongs to the physical page:
[ 171.224664] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[ 171.226586] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.228342] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 171.229890] page_type: 0xffffffff()
[ 171.230899] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 171.232567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 171.234151] page dumped because: kasan: bad access detected
[ 171.235334]
[ 171.235975] Memory state around the buggy address:
[ 171.237152] ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.238705] ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.240333] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 171.241863] ^
[ 171.243266] ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.244845] ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.246346] ==================================================================
Home
[ 170.604526] ==================================================================
[ 170.606246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590
[ 170.608166] Write of size 1 at addr ffff0000c581dcd0 by task kunit_try_catch/137
[ 170.610503]
[ 170.611584] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.613669] Hardware name: linux,dummy-virt (DT)
[ 170.614891] Call trace:
[ 170.615567] dump_backtrace+0x9c/0x128
[ 170.617645] show_stack+0x20/0x38
[ 170.618697] dump_stack_lvl+0x60/0xb0
[ 170.619929] print_report+0xf8/0x5d8
[ 170.621099] kasan_report+0xc8/0x118
[ 170.622241] __asan_store1+0x60/0x70
[ 170.623405] krealloc_less_oob_helper+0x140/0x590
[ 170.624521] krealloc_less_oob+0x20/0x38
[ 170.625708] kunit_try_run_case+0xf8/0x260
[ 170.626794] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.628200] kthread+0x18c/0x1a8
[ 170.629483] ret_from_fork+0x10/0x20
[ 170.630640]
[ 170.631715] Allocated by task 137:
[ 170.632439] kasan_save_stack+0x3c/0x68
[ 170.633325] kasan_set_track+0x2c/0x40
[ 170.634679] kasan_save_alloc_info+0x24/0x38
[ 170.636215] __kasan_krealloc+0x10c/0x140
[ 170.637787] krealloc+0x10c/0x1a0
[ 170.638806] krealloc_less_oob_helper+0xd4/0x590
[ 170.640241] krealloc_less_oob+0x20/0x38
[ 170.641216] kunit_try_run_case+0xf8/0x260
[ 170.642482] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.644241] kthread+0x18c/0x1a8
[ 170.645234] ret_from_fork+0x10/0x20
[ 170.646417]
[ 170.647079] The buggy address belongs to the object at ffff0000c581dc00
[ 170.647079] which belongs to the cache kmalloc-256 of size 256
[ 170.649673] The buggy address is located 7 bytes to the right of
[ 170.649673] allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[ 170.653317]
[ 170.653892] The buggy address belongs to the physical page:
[ 170.655115] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[ 170.657385] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.659320] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.661078] page_type: 0xffffffff()
[ 170.662252] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.664275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.666402] page dumped because: kasan: bad access detected
[ 170.668220]
[ 170.668826] Memory state around the buggy address:
[ 170.670481] ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.672467] ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.674580] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 170.676631] ^
[ 170.678436] ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.680391] ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.682243] ==================================================================
Home
[ 170.686678] ==================================================================
[ 170.688354] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590
[ 170.690454] Write of size 1 at addr ffff0000c581dcda by task kunit_try_catch/137
[ 170.692871]
[ 170.693562] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.696374] Hardware name: linux,dummy-virt (DT)
[ 170.697494] Call trace:
[ 170.698434] dump_backtrace+0x9c/0x128
[ 170.699676] show_stack+0x20/0x38
[ 170.701008] dump_stack_lvl+0x60/0xb0
[ 170.701978] print_report+0xf8/0x5d8
[ 170.703293] kasan_report+0xc8/0x118
[ 170.704775] __asan_store1+0x60/0x70
[ 170.705748] krealloc_less_oob_helper+0x18c/0x590
[ 170.708243] krealloc_less_oob+0x20/0x38
[ 170.709582] kunit_try_run_case+0xf8/0x260
[ 170.710752] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.712277] kthread+0x18c/0x1a8
[ 170.713499] ret_from_fork+0x10/0x20
[ 170.714444]
[ 170.715284] Allocated by task 137:
[ 170.716768] kasan_save_stack+0x3c/0x68
[ 170.717904] kasan_set_track+0x2c/0x40
[ 170.719219] kasan_save_alloc_info+0x24/0x38
[ 170.721166] __kasan_krealloc+0x10c/0x140
[ 170.722611] krealloc+0x10c/0x1a0
[ 170.723768] krealloc_less_oob_helper+0xd4/0x590
[ 170.724969] krealloc_less_oob+0x20/0x38
[ 170.726176] kunit_try_run_case+0xf8/0x260
[ 170.727394] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.729252] kthread+0x18c/0x1a8
[ 170.730379] ret_from_fork+0x10/0x20
[ 170.731297]
[ 170.732782] The buggy address belongs to the object at ffff0000c581dc00
[ 170.732782] which belongs to the cache kmalloc-256 of size 256
[ 170.735510] The buggy address is located 17 bytes to the right of
[ 170.735510] allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[ 170.738286]
[ 170.738895] The buggy address belongs to the physical page:
[ 170.740646] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[ 170.742629] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.744377] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.745670] page_type: 0xffffffff()
[ 170.746712] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.748934] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.750601] page dumped because: kasan: bad access detected
[ 170.752015]
[ 170.752857] Memory state around the buggy address:
[ 170.754224] ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.756754] ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.758495] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 170.760459] ^
[ 170.761530] ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.763557] ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.765538] ==================================================================
Home
[ 170.847939] ==================================================================
[ 170.849469] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590
[ 170.851204] Write of size 1 at addr ffff0000c581dceb by task kunit_try_catch/137
[ 170.853183]
[ 170.854032] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.856145] Hardware name: linux,dummy-virt (DT)
[ 170.857398] Call trace:
[ 170.858227] dump_backtrace+0x9c/0x128
[ 170.859351] show_stack+0x20/0x38
[ 170.860356] dump_stack_lvl+0x60/0xb0
[ 170.861498] print_report+0xf8/0x5d8
[ 170.862609] kasan_report+0xc8/0x118
[ 170.863775] __asan_store1+0x60/0x70
[ 170.864890] krealloc_less_oob_helper+0x1e0/0x590
[ 170.866051] krealloc_less_oob+0x20/0x38
[ 170.867362] kunit_try_run_case+0xf8/0x260
[ 170.868648] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.870559] kthread+0x18c/0x1a8
[ 170.871868] ret_from_fork+0x10/0x20
[ 170.873119]
[ 170.874188] Allocated by task 137:
[ 170.875240] kasan_save_stack+0x3c/0x68
[ 170.876434] kasan_set_track+0x2c/0x40
[ 170.877590] kasan_save_alloc_info+0x24/0x38
[ 170.878854] __kasan_krealloc+0x10c/0x140
[ 170.880700] krealloc+0x10c/0x1a0
[ 170.881869] krealloc_less_oob_helper+0xd4/0x590
[ 170.883155] krealloc_less_oob+0x20/0x38
[ 170.884337] kunit_try_run_case+0xf8/0x260
[ 170.885566] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.887169] kthread+0x18c/0x1a8
[ 170.887961] ret_from_fork+0x10/0x20
[ 170.888961]
[ 170.889636] The buggy address belongs to the object at ffff0000c581dc00
[ 170.889636] which belongs to the cache kmalloc-256 of size 256
[ 170.892626] The buggy address is located 34 bytes to the right of
[ 170.892626] allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[ 170.895878]
[ 170.896610] The buggy address belongs to the physical page:
[ 170.898196] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[ 170.901003] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.902608] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.904432] page_type: 0xffffffff()
[ 170.905688] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.907819] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.909334] page dumped because: kasan: bad access detected
[ 170.910785]
[ 170.911541] Memory state around the buggy address:
[ 170.912768] ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.915296] ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.917220] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 170.918899] ^
[ 170.920621] ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.922340] ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.923917] ==================================================================
Home
[ 171.080020] ==================================================================
[ 171.083238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590
[ 171.085263] Write of size 1 at addr ffff0000c5f1a0c9 by task kunit_try_catch/141
[ 171.087447]
[ 171.088109] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.089826] Hardware name: linux,dummy-virt (DT)
[ 171.091038] Call trace:
[ 171.092094] dump_backtrace+0x9c/0x128
[ 171.093564] show_stack+0x20/0x38
[ 171.094961] dump_stack_lvl+0x60/0xb0
[ 171.096345] print_report+0xf8/0x5d8
[ 171.097561] kasan_report+0xc8/0x118
[ 171.098762] __asan_store1+0x60/0x70
[ 171.100071] krealloc_less_oob_helper+0x110/0x590
[ 171.102826] krealloc_pagealloc_less_oob+0x20/0x38
[ 171.104429] kunit_try_run_case+0xf8/0x260
[ 171.105710] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.107617] kthread+0x18c/0x1a8
[ 171.109224] ret_from_fork+0x10/0x20
[ 171.110191]
[ 171.110822] The buggy address belongs to the physical page:
[ 171.112854] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[ 171.115046] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.116940] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 171.118427] page_type: 0xffffffff()
[ 171.120171] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 171.121915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 171.123894] page dumped because: kasan: bad access detected
[ 171.124942]
[ 171.125662] Memory state around the buggy address:
[ 171.127867] ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.129714] ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.132083] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 171.133873] ^
[ 171.135705] ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.137526] ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.139445] ==================================================================
Home
[ 171.300478] ==================================================================
[ 171.302400] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590
[ 171.304175] Write of size 1 at addr ffff0000c5f1a0eb by task kunit_try_catch/141
[ 171.305977]
[ 171.306551] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.308439] Hardware name: linux,dummy-virt (DT)
[ 171.309571] Call trace:
[ 171.310334] dump_backtrace+0x9c/0x128
[ 171.311430] show_stack+0x20/0x38
[ 171.312480] dump_stack_lvl+0x60/0xb0
[ 171.313611] print_report+0xf8/0x5d8
[ 171.314783] kasan_report+0xc8/0x118
[ 171.315882] __asan_store1+0x60/0x70
[ 171.317016] krealloc_less_oob_helper+0x1e0/0x590
[ 171.318293] krealloc_pagealloc_less_oob+0x20/0x38
[ 171.319594] kunit_try_run_case+0xf8/0x260
[ 171.320781] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.322244] kthread+0x18c/0x1a8
[ 171.323206] ret_from_fork+0x10/0x20
[ 171.324285]
[ 171.324854] The buggy address belongs to the physical page:
[ 171.326138] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[ 171.328097] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.329846] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 171.331392] page_type: 0xffffffff()
[ 171.332441] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 171.334140] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 171.335750] page dumped because: kasan: bad access detected
[ 171.337000]
[ 171.337495] Memory state around the buggy address:
[ 171.338754] ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.340376] ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.341974] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 171.343539] ^
[ 171.345049] ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.346637] ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.348178] ==================================================================
Home
[ 171.144334] ==================================================================
[ 171.146178] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590
[ 171.149083] Write of size 1 at addr ffff0000c5f1a0d0 by task kunit_try_catch/141
[ 171.150742]
[ 171.151906] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.153887] Hardware name: linux,dummy-virt (DT)
[ 171.155111] Call trace:
[ 171.156052] dump_backtrace+0x9c/0x128
[ 171.157171] show_stack+0x20/0x38
[ 171.158156] dump_stack_lvl+0x60/0xb0
[ 171.159343] print_report+0xf8/0x5d8
[ 171.160520] kasan_report+0xc8/0x118
[ 171.161620] __asan_store1+0x60/0x70
[ 171.162762] krealloc_less_oob_helper+0x140/0x590
[ 171.164126] krealloc_pagealloc_less_oob+0x20/0x38
[ 171.165472] kunit_try_run_case+0xf8/0x260
[ 171.166475] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.167750] kthread+0x18c/0x1a8
[ 171.168905] ret_from_fork+0x10/0x20
[ 171.170153]
[ 171.171241] The buggy address belongs to the physical page:
[ 171.172259] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[ 171.174111] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.176247] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 171.177893] page_type: 0xffffffff()
[ 171.178924] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 171.180693] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 171.182315] page dumped because: kasan: bad access detected
[ 171.183599]
[ 171.184181] Memory state around the buggy address:
[ 171.185177] ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.186625] ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.188909] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 171.190532] ^
[ 171.191933] ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.192843] ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.194502] ==================================================================
Home
[ 170.768343] ==================================================================
[ 170.771315] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590
[ 170.773688] Write of size 1 at addr ffff0000c581dcea by task kunit_try_catch/137
[ 170.775347]
[ 170.775864] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.778486] Hardware name: linux,dummy-virt (DT)
[ 170.779652] Call trace:
[ 170.780324] dump_backtrace+0x9c/0x128
[ 170.781433] show_stack+0x20/0x38
[ 170.782443] dump_stack_lvl+0x60/0xb0
[ 170.783855] print_report+0xf8/0x5d8
[ 170.785147] kasan_report+0xc8/0x118
[ 170.786225] __asan_store1+0x60/0x70
[ 170.787348] krealloc_less_oob_helper+0x1b8/0x590
[ 170.788611] krealloc_less_oob+0x20/0x38
[ 170.789797] kunit_try_run_case+0xf8/0x260
[ 170.791402] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.793071] kthread+0x18c/0x1a8
[ 170.794491] ret_from_fork+0x10/0x20
[ 170.795553]
[ 170.796072] Allocated by task 137:
[ 170.796894] kasan_save_stack+0x3c/0x68
[ 170.798046] kasan_set_track+0x2c/0x40
[ 170.799150] kasan_save_alloc_info+0x24/0x38
[ 170.800538] __kasan_krealloc+0x10c/0x140
[ 170.801589] krealloc+0x10c/0x1a0
[ 170.802814] krealloc_less_oob_helper+0xd4/0x590
[ 170.804303] krealloc_less_oob+0x20/0x38
[ 170.805467] kunit_try_run_case+0xf8/0x260
[ 170.806534] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.808467] kthread+0x18c/0x1a8
[ 170.809434] ret_from_fork+0x10/0x20
[ 170.810318]
[ 170.810890] The buggy address belongs to the object at ffff0000c581dc00
[ 170.810890] which belongs to the cache kmalloc-256 of size 256
[ 170.814094] The buggy address is located 33 bytes to the right of
[ 170.814094] allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[ 170.816950]
[ 170.817671] The buggy address belongs to the physical page:
[ 170.819011] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[ 170.820652] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.822828] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.824628] page_type: 0xffffffff()
[ 170.826298] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.829104] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.830622] page dumped because: kasan: bad access detected
[ 170.832062]
[ 170.832742] Memory state around the buggy address:
[ 170.834085] ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.836080] ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.837341] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 170.839525] ^
[ 170.841099] ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.842661] ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.844160] ==================================================================
Home
[ 170.430541] ==================================================================
[ 170.431910] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[ 170.433199] Write of size 1 at addr ffff0000c3dbe4f0 by task kunit_try_catch/135
[ 170.434978]
[ 170.435521] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.437574] Hardware name: linux,dummy-virt (DT)
[ 170.438682] Call trace:
[ 170.439967] dump_backtrace+0x9c/0x128
[ 170.441194] show_stack+0x20/0x38
[ 170.442238] dump_stack_lvl+0x60/0xb0
[ 170.443844] print_report+0xf8/0x5d8
[ 170.444917] kasan_report+0xc8/0x118
[ 170.446086] __asan_store1+0x60/0x70
[ 170.447100] krealloc_more_oob_helper+0x168/0x380
[ 170.448590] krealloc_more_oob+0x20/0x38
[ 170.449755] kunit_try_run_case+0xf8/0x260
[ 170.450907] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.452420] kthread+0x18c/0x1a8
[ 170.453542] ret_from_fork+0x10/0x20
[ 170.454458]
[ 170.454958] Allocated by task 135:
[ 170.455760] kasan_save_stack+0x3c/0x68
[ 170.457136] kasan_set_track+0x2c/0x40
[ 170.458466] kasan_save_alloc_info+0x24/0x38
[ 170.459941] __kasan_krealloc+0x10c/0x140
[ 170.461281] krealloc+0x10c/0x1a0
[ 170.462084] krealloc_more_oob_helper+0xd4/0x380
[ 170.463367] krealloc_more_oob+0x20/0x38
[ 170.464773] kunit_try_run_case+0xf8/0x260
[ 170.466064] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.467802] kthread+0x18c/0x1a8
[ 170.468342] ret_from_fork+0x10/0x20
[ 170.468953]
[ 170.469251] The buggy address belongs to the object at ffff0000c3dbe400
[ 170.469251] which belongs to the cache kmalloc-256 of size 256
[ 170.472424] The buggy address is located 5 bytes to the right of
[ 170.472424] allocated 235-byte region [ffff0000c3dbe400, ffff0000c3dbe4eb)
[ 170.475101]
[ 170.476164] The buggy address belongs to the physical page:
[ 170.477385] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[ 170.479670] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.481413] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.483006] page_type: 0xffffffff()
[ 170.483997] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.485752] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.487905] page dumped because: kasan: bad access detected
[ 170.488923]
[ 170.489226] Memory state around the buggy address:
[ 170.489905] ffff0000c3dbe380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.491419] ffff0000c3dbe400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.493073] >ffff0000c3dbe480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 170.494695] ^
[ 170.496685] ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.498329] ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.499931] ==================================================================
Home
[ 170.999078] ==================================================================
[ 171.001070] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[ 171.003072] Write of size 1 at addr ffff0000c5fba0f0 by task kunit_try_catch/139
[ 171.005200]
[ 171.005694] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.008265] Hardware name: linux,dummy-virt (DT)
[ 171.009285] Call trace:
[ 171.009853] dump_backtrace+0x9c/0x128
[ 171.011114] show_stack+0x20/0x38
[ 171.012318] dump_stack_lvl+0x60/0xb0
[ 171.013590] print_report+0xf8/0x5d8
[ 171.014870] kasan_report+0xc8/0x118
[ 171.015883] __asan_store1+0x60/0x70
[ 171.017275] krealloc_more_oob_helper+0x168/0x380
[ 171.019305] krealloc_pagealloc_more_oob+0x20/0x38
[ 171.021427] kunit_try_run_case+0xf8/0x260
[ 171.022875] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.024662] kthread+0x18c/0x1a8
[ 171.025743] ret_from_fork+0x10/0x20
[ 171.026873]
[ 171.027621] The buggy address belongs to the physical page:
[ 171.029606] page:000000002fd1ef98 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb8
[ 171.031779] head:000000002fd1ef98 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.033670] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 171.035606] page_type: 0xffffffff()
[ 171.037748] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 171.039914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 171.041532] page dumped because: kasan: bad access detected
[ 171.043254]
[ 171.044249] Memory state around the buggy address:
[ 171.045983] ffff0000c5fb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.047853] ffff0000c5fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.049810] >ffff0000c5fba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 171.051476] ^
[ 171.053446] ffff0000c5fba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.055377] ffff0000c5fba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 171.056758] ==================================================================
Home
[ 170.942414] ==================================================================
[ 170.945166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[ 170.946670] Write of size 1 at addr ffff0000c5fba0eb by task kunit_try_catch/139
[ 170.948457]
[ 170.949166] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.951295] Hardware name: linux,dummy-virt (DT)
[ 170.952935] Call trace:
[ 170.953580] dump_backtrace+0x9c/0x128
[ 170.954700] show_stack+0x20/0x38
[ 170.955968] dump_stack_lvl+0x60/0xb0
[ 170.957248] print_report+0xf8/0x5d8
[ 170.958351] kasan_report+0xc8/0x118
[ 170.959399] __asan_store1+0x60/0x70
[ 170.961018] krealloc_more_oob_helper+0x138/0x380
[ 170.962247] krealloc_pagealloc_more_oob+0x20/0x38
[ 170.963826] kunit_try_run_case+0xf8/0x260
[ 170.965211] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.966682] kthread+0x18c/0x1a8
[ 170.967525] ret_from_fork+0x10/0x20
[ 170.968909]
[ 170.969538] The buggy address belongs to the physical page:
[ 170.970866] page:000000002fd1ef98 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb8
[ 170.973212] head:000000002fd1ef98 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.974906] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 170.977132] page_type: 0xffffffff()
[ 170.978144] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 170.980101] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 170.981441] page dumped because: kasan: bad access detected
[ 170.982651]
[ 170.983592] Memory state around the buggy address:
[ 170.985226] ffff0000c5fb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.987243] ffff0000c5fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.989067] >ffff0000c5fba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 170.990613] ^
[ 170.992272] ffff0000c5fba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 170.993760] ffff0000c5fba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 170.995714] ==================================================================
Home
[ 170.352377] ==================================================================
[ 170.354886] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[ 170.356861] Write of size 1 at addr ffff0000c3dbe4eb by task kunit_try_catch/135
[ 170.358694]
[ 170.359596] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.361416] Hardware name: linux,dummy-virt (DT)
[ 170.362497] Call trace:
[ 170.363565] dump_backtrace+0x9c/0x128
[ 170.364650] show_stack+0x20/0x38
[ 170.365638] dump_stack_lvl+0x60/0xb0
[ 170.366818] print_report+0xf8/0x5d8
[ 170.367977] kasan_report+0xc8/0x118
[ 170.369125] __asan_store1+0x60/0x70
[ 170.370296] krealloc_more_oob_helper+0x138/0x380
[ 170.371629] krealloc_more_oob+0x20/0x38
[ 170.372607] kunit_try_run_case+0xf8/0x260
[ 170.374149] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.375760] kthread+0x18c/0x1a8
[ 170.377428] ret_from_fork+0x10/0x20
[ 170.378578]
[ 170.379099] Allocated by task 135:
[ 170.380155] kasan_save_stack+0x3c/0x68
[ 170.381349] kasan_set_track+0x2c/0x40
[ 170.382498] kasan_save_alloc_info+0x24/0x38
[ 170.383838] __kasan_krealloc+0x10c/0x140
[ 170.385017] krealloc+0x10c/0x1a0
[ 170.386259] krealloc_more_oob_helper+0xd4/0x380
[ 170.387342] krealloc_more_oob+0x20/0x38
[ 170.388616] kunit_try_run_case+0xf8/0x260
[ 170.389917] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.391433] kthread+0x18c/0x1a8
[ 170.392530] ret_from_fork+0x10/0x20
[ 170.394266]
[ 170.394970] The buggy address belongs to the object at ffff0000c3dbe400
[ 170.394970] which belongs to the cache kmalloc-256 of size 256
[ 170.397693] The buggy address is located 0 bytes to the right of
[ 170.397693] allocated 235-byte region [ffff0000c3dbe400, ffff0000c3dbe4eb)
[ 170.400713]
[ 170.401376] The buggy address belongs to the physical page:
[ 170.402622] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[ 170.404757] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 170.406443] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 170.408173] page_type: 0xffffffff()
[ 170.409379] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 170.412693] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 170.414244] page dumped because: kasan: bad access detected
[ 170.415831]
[ 170.416359] Memory state around the buggy address:
[ 170.417579] ffff0000c3dbe380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.419609] ffff0000c3dbe400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 170.420813] >ffff0000c3dbe480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 170.421634] ^
[ 170.423194] ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.425029] ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.426617] ==================================================================
Home
[ 174.018926] ==================================================================
[ 174.020574] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x150/0x378
[ 174.022646] Read of size 1 at addr ffff0000c5f8387f by task kunit_try_catch/191
[ 174.024297]
[ 174.024954] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.026906] Hardware name: linux,dummy-virt (DT)
[ 174.028156] Call trace:
[ 174.028902] dump_backtrace+0x9c/0x128
[ 174.030020] show_stack+0x20/0x38
[ 174.030999] dump_stack_lvl+0x60/0xb0
[ 174.032158] print_report+0xf8/0x5d8
[ 174.033263] kasan_report+0xc8/0x118
[ 174.034410] __asan_load1+0x60/0x70
[ 174.035514] ksize_unpoisons_memory+0x150/0x378
[ 174.036786] kunit_try_run_case+0xf8/0x260
[ 174.037972] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.039411] kthread+0x18c/0x1a8
[ 174.040386] ret_from_fork+0x10/0x20
[ 174.041429]
[ 174.042016] Allocated by task 191:
[ 174.042916] kasan_save_stack+0x3c/0x68
[ 174.044104] kasan_set_track+0x2c/0x40
[ 174.045213] kasan_save_alloc_info+0x24/0x38
[ 174.046482] __kasan_kmalloc+0xd4/0xd8
[ 174.047628] kmalloc_trace+0x68/0x130
[ 174.048659] ksize_unpoisons_memory+0xb0/0x378
[ 174.049916] kunit_try_run_case+0xf8/0x260
[ 174.051112] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.052552] kthread+0x18c/0x1a8
[ 174.053526] ret_from_fork+0x10/0x20
[ 174.054595]
[ 174.055131] The buggy address belongs to the object at ffff0000c5f83800
[ 174.055131] which belongs to the cache kmalloc-128 of size 128
[ 174.057754] The buggy address is located 12 bytes to the right of
[ 174.057754] allocated 115-byte region [ffff0000c5f83800, ffff0000c5f83873)
[ 174.060441]
[ 174.060952] The buggy address belongs to the physical page:
[ 174.062293] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[ 174.064264] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.065831] page_type: 0xffffffff()
[ 174.066860] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 174.068574] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 174.070195] page dumped because: kasan: bad access detected
[ 174.071452]
[ 174.072048] Memory state around the buggy address:
[ 174.073233] ffff0000c5f83700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 174.074850] ffff0000c5f83780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.076465] >ffff0000c5f83800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 174.078047] ^
[ 174.079644] ffff0000c5f83880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.081304] ffff0000c5f83900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.082864] ==================================================================
Home
[ 173.881424] ==================================================================
[ 173.884037] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x104/0x378
[ 173.885805] Read of size 1 at addr ffff0000c5f83873 by task kunit_try_catch/191
[ 173.887587]
[ 173.888259] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 173.890103] Hardware name: linux,dummy-virt (DT)
[ 173.891250] Call trace:
[ 173.892050] dump_backtrace+0x9c/0x128
[ 173.893172] show_stack+0x20/0x38
[ 173.894197] dump_stack_lvl+0x60/0xb0
[ 173.895363] print_report+0xf8/0x5d8
[ 173.896531] kasan_report+0xc8/0x118
[ 173.897682] __asan_load1+0x60/0x70
[ 173.898830] ksize_unpoisons_memory+0x104/0x378
[ 173.900112] kunit_try_run_case+0xf8/0x260
[ 173.901365] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.902835] kthread+0x18c/0x1a8
[ 173.903820] ret_from_fork+0x10/0x20
[ 173.904891]
[ 173.905392] Allocated by task 191:
[ 173.906370] kasan_save_stack+0x3c/0x68
[ 173.907565] kasan_set_track+0x2c/0x40
[ 173.908692] kasan_save_alloc_info+0x24/0x38
[ 173.909946] __kasan_kmalloc+0xd4/0xd8
[ 173.911096] kmalloc_trace+0x68/0x130
[ 173.912156] ksize_unpoisons_memory+0xb0/0x378
[ 173.913438] kunit_try_run_case+0xf8/0x260
[ 173.914610] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.916097] kthread+0x18c/0x1a8
[ 173.917171] ret_from_fork+0x10/0x20
[ 173.919157]
[ 173.919611] The buggy address belongs to the object at ffff0000c5f83800
[ 173.919611] which belongs to the cache kmalloc-128 of size 128
[ 173.922184] The buggy address is located 0 bytes to the right of
[ 173.922184] allocated 115-byte region [ffff0000c5f83800, ffff0000c5f83873)
[ 173.924854]
[ 173.925395] The buggy address belongs to the physical page:
[ 173.926696] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[ 173.928673] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 173.930274] page_type: 0xffffffff()
[ 173.931338] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 173.933097] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 173.934709] page dumped because: kasan: bad access detected
[ 173.935996]
[ 173.936549] Memory state around the buggy address:
[ 173.937758] ffff0000c5f83700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 173.939374] ffff0000c5f83780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 173.941016] >ffff0000c5f83800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 173.942553] ^
[ 173.944151] ffff0000c5f83880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 173.945782] ffff0000c5f83900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 173.947342] ==================================================================
Home
[ 173.950417] ==================================================================
[ 173.952024] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x128/0x378
[ 173.954111] Read of size 1 at addr ffff0000c5f83878 by task kunit_try_catch/191
[ 173.956771]
[ 173.957275] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 173.959897] Hardware name: linux,dummy-virt (DT)
[ 173.961255] Call trace:
[ 173.962021] dump_backtrace+0x9c/0x128
[ 173.963196] show_stack+0x20/0x38
[ 173.964209] dump_stack_lvl+0x60/0xb0
[ 173.965355] print_report+0xf8/0x5d8
[ 173.966460] kasan_report+0xc8/0x118
[ 173.967558] __asan_load1+0x60/0x70
[ 173.968670] ksize_unpoisons_memory+0x128/0x378
[ 173.969948] kunit_try_run_case+0xf8/0x260
[ 173.971176] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.972626] kthread+0x18c/0x1a8
[ 173.973577] ret_from_fork+0x10/0x20
[ 173.974651]
[ 173.975228] Allocated by task 191:
[ 173.976138] kasan_save_stack+0x3c/0x68
[ 173.977273] kasan_set_track+0x2c/0x40
[ 173.978399] kasan_save_alloc_info+0x24/0x38
[ 173.979658] __kasan_kmalloc+0xd4/0xd8
[ 173.980788] kmalloc_trace+0x68/0x130
[ 173.981886] ksize_unpoisons_memory+0xb0/0x378
[ 173.983113] kunit_try_run_case+0xf8/0x260
[ 173.984322] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.985754] kthread+0x18c/0x1a8
[ 173.986701] ret_from_fork+0x10/0x20
[ 173.987806]
[ 173.988349] The buggy address belongs to the object at ffff0000c5f83800
[ 173.988349] which belongs to the cache kmalloc-128 of size 128
[ 173.990781] The buggy address is located 5 bytes to the right of
[ 173.990781] allocated 115-byte region [ffff0000c5f83800, ffff0000c5f83873)
[ 173.993252]
[ 173.993841] The buggy address belongs to the physical page:
[ 173.995127] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[ 173.997086] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 173.998632] page_type: 0xffffffff()
[ 173.999677] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 174.001378] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 174.002983] page dumped because: kasan: bad access detected
[ 174.004230]
[ 174.004777] Memory state around the buggy address:
[ 174.005975] ffff0000c5f83700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 174.007566] ffff0000c5f83780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.009166] >ffff0000c5f83800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 174.010711] ^
[ 174.012338] ffff0000c5f83880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.013961] ffff0000c5f83900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.015497] ==================================================================
Home
[ 174.772081] ==================================================================
[ 174.774841] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78
[ 174.776365] Read of size 1 at addr ffff0000c5f7f918 by task kunit_try_catch/201
[ 174.777760]
[ 174.778420] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.780683] Hardware name: linux,dummy-virt (DT)
[ 174.781559] Call trace:
[ 174.782254] dump_backtrace+0x9c/0x128
[ 174.783844] show_stack+0x20/0x38
[ 174.784892] dump_stack_lvl+0x60/0xb0
[ 174.786131] print_report+0xf8/0x5d8
[ 174.787391] kasan_report+0xc8/0x118
[ 174.788985] __asan_load1+0x60/0x70
[ 174.789915] memchr+0x28/0x78
[ 174.790464] kasan_memchr+0xd4/0x1f0
[ 174.791954] kunit_try_run_case+0xf8/0x260
[ 174.793179] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.794950] kthread+0x18c/0x1a8
[ 174.796015] ret_from_fork+0x10/0x20
[ 174.797009]
[ 174.797470] Allocated by task 201:
[ 174.798581] kasan_save_stack+0x3c/0x68
[ 174.800100] kasan_set_track+0x2c/0x40
[ 174.801415] kasan_save_alloc_info+0x24/0x38
[ 174.802878] __kasan_kmalloc+0xd4/0xd8
[ 174.804307] kmalloc_trace+0x68/0x130
[ 174.805767] kasan_memchr+0xa0/0x1f0
[ 174.806419] kunit_try_run_case+0xf8/0x260
[ 174.808209] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.810085] kthread+0x18c/0x1a8
[ 174.811534] ret_from_fork+0x10/0x20
[ 174.812395]
[ 174.812866] The buggy address belongs to the object at ffff0000c5f7f900
[ 174.812866] which belongs to the cache kmalloc-32 of size 32
[ 174.816671] The buggy address is located 0 bytes to the right of
[ 174.816671] allocated 24-byte region [ffff0000c5f7f900, ffff0000c5f7f918)
[ 174.820119]
[ 174.821478] The buggy address belongs to the physical page:
[ 174.822882] page:00000000ad3e6439 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7f
[ 174.824946] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.826513] page_type: 0xffffffff()
[ 174.827867] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 174.829703] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 174.831712] page dumped because: kasan: bad access detected
[ 174.833555]
[ 174.834234] Memory state around the buggy address:
[ 174.835934] ffff0000c5f7f800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 174.838305] ffff0000c5f7f880: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 174.840315] >ffff0000c5f7f900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.842105] ^
[ 174.843334] ffff0000c5f7f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.845339] ffff0000c5f7fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.846628] ==================================================================
Home
[ 174.870751] ==================================================================
[ 174.872739] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[ 174.874364] Read of size 1 at addr ffff0000c5f7f998 by task kunit_try_catch/203
[ 174.876486]
[ 174.877070] CPU: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.878907] Hardware name: linux,dummy-virt (DT)
[ 174.880054] Call trace:
[ 174.880767] dump_backtrace+0x9c/0x128
[ 174.882121] show_stack+0x20/0x38
[ 174.883249] dump_stack_lvl+0x60/0xb0
[ 174.884709] print_report+0xf8/0x5d8
[ 174.885941] kasan_report+0xc8/0x118
[ 174.887066] __asan_load1+0x60/0x70
[ 174.888238] memcmp+0x44/0xd0
[ 174.889329] kasan_memcmp+0xf0/0x208
[ 174.890387] kunit_try_run_case+0xf8/0x260
[ 174.891835] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.893643] kthread+0x18c/0x1a8
[ 174.894642] ret_from_fork+0x10/0x20
[ 174.895887]
[ 174.896419] Allocated by task 203:
[ 174.897277] kasan_save_stack+0x3c/0x68
[ 174.898426] kasan_set_track+0x2c/0x40
[ 174.899577] kasan_save_alloc_info+0x24/0x38
[ 174.900506] __kasan_kmalloc+0xd4/0xd8
[ 174.901746] kmalloc_trace+0x68/0x130
[ 174.903024] kasan_memcmp+0xac/0x208
[ 174.904171] kunit_try_run_case+0xf8/0x260
[ 174.906012] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.907633] kthread+0x18c/0x1a8
[ 174.908630] ret_from_fork+0x10/0x20
[ 174.910359]
[ 174.910875] The buggy address belongs to the object at ffff0000c5f7f980
[ 174.910875] which belongs to the cache kmalloc-32 of size 32
[ 174.913903] The buggy address is located 0 bytes to the right of
[ 174.913903] allocated 24-byte region [ffff0000c5f7f980, ffff0000c5f7f998)
[ 174.917072]
[ 174.917698] The buggy address belongs to the physical page:
[ 174.919083] page:00000000ad3e6439 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7f
[ 174.921608] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.923310] page_type: 0xffffffff()
[ 174.924808] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 174.926570] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 174.928224] page dumped because: kasan: bad access detected
[ 174.929704]
[ 174.930451] Memory state around the buggy address:
[ 174.932271] ffff0000c5f7f880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 174.933945] ffff0000c5f7f900: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 174.935663] >ffff0000c5f7f980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.937339] ^
[ 174.938451] ffff0000c5f7fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.940478] ffff0000c5f7fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.942084] ==================================================================
Home
[ 175.230558] ==================================================================
[ 175.231826] BUG: KASAN: slab-use-after-free in kasan_strings+0x150/0x478
[ 175.236368] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.237996]
[ 175.238528] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.240145] Hardware name: linux,dummy-virt (DT)
[ 175.241220] Call trace:
[ 175.241865] dump_backtrace+0x9c/0x128
[ 175.242956] show_stack+0x20/0x38
[ 175.244045] dump_stack_lvl+0x60/0xb0
[ 175.245084] print_report+0xf8/0x5d8
[ 175.246288] kasan_report+0xc8/0x118
[ 175.247603] __asan_load1+0x60/0x70
[ 175.248838] kasan_strings+0x150/0x478
[ 175.249697] kunit_try_run_case+0xf8/0x260
[ 175.250986] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.252860] kthread+0x18c/0x1a8
[ 175.253648] ret_from_fork+0x10/0x20
[ 175.255003]
[ 175.255485] Allocated by task 205:
[ 175.256824] kasan_save_stack+0x3c/0x68
[ 175.258022] kasan_set_track+0x2c/0x40
[ 175.259275] kasan_save_alloc_info+0x24/0x38
[ 175.261191] __kasan_kmalloc+0xd4/0xd8
[ 175.262684] kmalloc_trace+0x68/0x130
[ 175.263907] kasan_strings+0xa0/0x478
[ 175.264856] kunit_try_run_case+0xf8/0x260
[ 175.266105] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.267963] kthread+0x18c/0x1a8
[ 175.268740] ret_from_fork+0x10/0x20
[ 175.269498]
[ 175.269903] Freed by task 205:
[ 175.270839] kasan_save_stack+0x3c/0x68
[ 175.272814] kasan_set_track+0x2c/0x40
[ 175.273907] kasan_save_free_info+0x38/0x60
[ 175.274634] __kasan_slab_free+0x100/0x170
[ 175.275993] __kmem_cache_free+0x170/0x2e0
[ 175.277582] kfree+0x74/0x138
[ 175.278884] kasan_strings+0xbc/0x478
[ 175.280182] kunit_try_run_case+0xf8/0x260
[ 175.281641] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.283257] kthread+0x18c/0x1a8
[ 175.284421] ret_from_fork+0x10/0x20
[ 175.285310]
[ 175.285619] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.285619] which belongs to the cache kmalloc-32 of size 32
[ 175.288524] The buggy address is located 16 bytes inside of
[ 175.288524] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.291291]
[ 175.292021] The buggy address belongs to the physical page:
[ 175.293253] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.296816] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.298622] page_type: 0xffffffff()
[ 175.299825] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.302208] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.304008] page dumped because: kasan: bad access detected
[ 175.305461]
[ 175.306111] Memory state around the buggy address:
[ 175.307394] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.309156] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.310601] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.313125] ^
[ 175.314816] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.316910] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.318616] ==================================================================
Home
[ 175.230558] ==================================================================
[ 175.231826] BUG: KASAN: slab-use-after-free in kasan_strings+0x150/0x478
[ 175.236368] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.237996]
[ 175.238528] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.240145] Hardware name: linux,dummy-virt (DT)
[ 175.241220] Call trace:
[ 175.241865] dump_backtrace+0x9c/0x128
[ 175.242956] show_stack+0x20/0x38
[ 175.244045] dump_stack_lvl+0x60/0xb0
[ 175.245084] print_report+0xf8/0x5d8
[ 175.246288] kasan_report+0xc8/0x118
[ 175.247603] __asan_load1+0x60/0x70
[ 175.248838] kasan_strings+0x150/0x478
[ 175.249697] kunit_try_run_case+0xf8/0x260
[ 175.250986] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.252860] kthread+0x18c/0x1a8
[ 175.253648] ret_from_fork+0x10/0x20
[ 175.255003]
[ 175.255485] Allocated by task 205:
[ 175.256824] kasan_save_stack+0x3c/0x68
[ 175.258022] kasan_set_track+0x2c/0x40
[ 175.259275] kasan_save_alloc_info+0x24/0x38
[ 175.261191] __kasan_kmalloc+0xd4/0xd8
[ 175.262684] kmalloc_trace+0x68/0x130
[ 175.263907] kasan_strings+0xa0/0x478
[ 175.264856] kunit_try_run_case+0xf8/0x260
[ 175.266105] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.267963] kthread+0x18c/0x1a8
[ 175.268740] ret_from_fork+0x10/0x20
[ 175.269498]
[ 175.269903] Freed by task 205:
[ 175.270839] kasan_save_stack+0x3c/0x68
[ 175.272814] kasan_set_track+0x2c/0x40
[ 175.273907] kasan_save_free_info+0x38/0x60
[ 175.274634] __kasan_slab_free+0x100/0x170
[ 175.275993] __kmem_cache_free+0x170/0x2e0
[ 175.277582] kfree+0x74/0x138
[ 175.278884] kasan_strings+0xbc/0x478
[ 175.280182] kunit_try_run_case+0xf8/0x260
[ 175.281641] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.283257] kthread+0x18c/0x1a8
[ 175.284421] ret_from_fork+0x10/0x20
[ 175.285310]
[ 175.285619] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.285619] which belongs to the cache kmalloc-32 of size 32
[ 175.288524] The buggy address is located 16 bytes inside of
[ 175.288524] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.291291]
[ 175.292021] The buggy address belongs to the physical page:
[ 175.293253] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.296816] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.298622] page_type: 0xffffffff()
[ 175.299825] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.302208] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.304008] page dumped because: kasan: bad access detected
[ 175.305461]
[ 175.306111] Memory state around the buggy address:
[ 175.307394] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.309156] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.310601] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.313125] ^
[ 175.314816] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.316910] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.318616] ==================================================================
Home
[ 176.988750] ==================================================================
[ 176.991952] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xc8/0x1d8
[ 176.993898] Read of size 1 at addr ffff0000c5beef60 by task kunit_try_catch/211
[ 176.995543]
[ 176.996260] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 176.998189] Hardware name: linux,dummy-virt (DT)
[ 176.999498] Call trace:
[ 177.000280] dump_backtrace+0x9c/0x128
[ 177.001205] show_stack+0x20/0x38
[ 177.002283] dump_stack_lvl+0x60/0xb0
[ 177.003671] print_report+0xf8/0x5d8
[ 177.004913] kasan_report+0xc8/0x118
[ 177.006057] __kasan_check_byte+0x54/0x70
[ 177.007245] kfree_sensitive+0x30/0xb0
[ 177.008634] kmalloc_double_kzfree+0xc8/0x1d8
[ 177.009862] kunit_try_run_case+0xf8/0x260
[ 177.011068] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.012620] kthread+0x18c/0x1a8
[ 177.014333] ret_from_fork+0x10/0x20
[ 177.015525]
[ 177.016033] Allocated by task 211:
[ 177.016771] kasan_save_stack+0x3c/0x68
[ 177.018148] kasan_set_track+0x2c/0x40
[ 177.019803] kasan_save_alloc_info+0x24/0x38
[ 177.021182] __kasan_kmalloc+0xd4/0xd8
[ 177.022394] kmalloc_trace+0x68/0x130
[ 177.023743] kmalloc_double_kzfree+0x9c/0x1d8
[ 177.025110] kunit_try_run_case+0xf8/0x260
[ 177.026363] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.027885] kthread+0x18c/0x1a8
[ 177.028923] ret_from_fork+0x10/0x20
[ 177.030063]
[ 177.030633] Freed by task 211:
[ 177.031708] kasan_save_stack+0x3c/0x68
[ 177.033159] kasan_set_track+0x2c/0x40
[ 177.034153] kasan_save_free_info+0x38/0x60
[ 177.036390] __kasan_slab_free+0x100/0x170
[ 177.037624] __kmem_cache_free+0x170/0x2e0
[ 177.038831] kfree+0x74/0x138
[ 177.040081] kfree_sensitive+0x80/0xb0
[ 177.041156] kmalloc_double_kzfree+0xb8/0x1d8
[ 177.042343] kunit_try_run_case+0xf8/0x260
[ 177.043643] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.045180] kthread+0x18c/0x1a8
[ 177.046173] ret_from_fork+0x10/0x20
[ 177.047507]
[ 177.048175] The buggy address belongs to the object at ffff0000c5beef60
[ 177.048175] which belongs to the cache kmalloc-16 of size 16
[ 177.050613] The buggy address is located 0 bytes inside of
[ 177.050613] freed 16-byte region [ffff0000c5beef60, ffff0000c5beef70)
[ 177.053237]
[ 177.053712] The buggy address belongs to the physical page:
[ 177.055050] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 177.057553] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 177.059442] page_type: 0xffffffff()
[ 177.060555] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 177.062373] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 177.064556] page dumped because: kasan: bad access detected
[ 177.065833]
[ 177.066385] Memory state around the buggy address:
[ 177.067989] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 177.069636] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 177.071288] >ffff0000c5beef00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 177.073491] ^
[ 177.075306] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.077375] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 177.078874] ==================================================================
Home
[ 172.399918] ==================================================================
[ 172.402261] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xc8/0x1d0
[ 172.404239] Read of size 1 at addr ffff0000c5902388 by task kunit_try_catch/163
[ 172.406352]
[ 172.407335] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.409622] Hardware name: linux,dummy-virt (DT)
[ 172.410478] Call trace:
[ 172.411411] dump_backtrace+0x9c/0x128
[ 172.413147] show_stack+0x20/0x38
[ 172.414211] dump_stack_lvl+0x60/0xb0
[ 172.415823] print_report+0xf8/0x5d8
[ 172.416903] kasan_report+0xc8/0x118
[ 172.418046] __asan_load1+0x60/0x70
[ 172.419543] kmalloc_uaf+0xc8/0x1d0
[ 172.421310] kunit_try_run_case+0xf8/0x260
[ 172.422585] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.424044] kthread+0x18c/0x1a8
[ 172.424851] ret_from_fork+0x10/0x20
[ 172.425794]
[ 172.426265] Allocated by task 163:
[ 172.427107] kasan_save_stack+0x3c/0x68
[ 172.428820] kasan_set_track+0x2c/0x40
[ 172.430024] kasan_save_alloc_info+0x24/0x38
[ 172.431742] __kasan_kmalloc+0xd4/0xd8
[ 172.432944] kmalloc_trace+0x68/0x130
[ 172.434510] kmalloc_uaf+0x9c/0x1d0
[ 172.436114] kunit_try_run_case+0xf8/0x260
[ 172.437336] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.439019] kthread+0x18c/0x1a8
[ 172.440108] ret_from_fork+0x10/0x20
[ 172.441206]
[ 172.441888] Freed by task 163:
[ 172.442742] kasan_save_stack+0x3c/0x68
[ 172.444207] kasan_set_track+0x2c/0x40
[ 172.445812] kasan_save_free_info+0x38/0x60
[ 172.446568] __kasan_slab_free+0x100/0x170
[ 172.448691] __kmem_cache_free+0x170/0x2e0
[ 172.450071] kfree+0x74/0x138
[ 172.451178] kmalloc_uaf+0xb8/0x1d0
[ 172.452073] kunit_try_run_case+0xf8/0x260
[ 172.454299] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.456108] kthread+0x18c/0x1a8
[ 172.457153] ret_from_fork+0x10/0x20
[ 172.458453]
[ 172.459413] The buggy address belongs to the object at ffff0000c5902380
[ 172.459413] which belongs to the cache kmalloc-16 of size 16
[ 172.462687] The buggy address is located 8 bytes inside of
[ 172.462687] freed 16-byte region [ffff0000c5902380, ffff0000c5902390)
[ 172.465805]
[ 172.466409] The buggy address belongs to the physical page:
[ 172.467921] page:000000000435baa8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105902
[ 172.469471] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.471753] page_type: 0xffffffff()
[ 172.473113] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 172.474863] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 172.476523] page dumped because: kasan: bad access detected
[ 172.477917]
[ 172.478468] Memory state around the buggy address:
[ 172.480090] ffff0000c5902280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 172.481716] ffff0000c5902300: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[ 172.483740] >ffff0000c5902380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.484942] ^
[ 172.486009] ffff0000c5902400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.488266] ffff0000c5902480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.489675] ==================================================================
Home
[ 172.632937] ==================================================================
[ 172.635298] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x108/0x290
[ 172.636937] Read of size 1 at addr ffff0000c5f7cc28 by task kunit_try_catch/167
[ 172.639699]
[ 172.640229] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.641692] Hardware name: linux,dummy-virt (DT)
[ 172.643910] Call trace:
[ 172.644526] dump_backtrace+0x9c/0x128
[ 172.645981] show_stack+0x20/0x38
[ 172.647533] dump_stack_lvl+0x60/0xb0
[ 172.649156] print_report+0xf8/0x5d8
[ 172.650318] kasan_report+0xc8/0x118
[ 172.651571] __asan_load1+0x60/0x70
[ 172.653221] kmalloc_uaf2+0x108/0x290
[ 172.654277] kunit_try_run_case+0xf8/0x260
[ 172.655811] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.657276] kthread+0x18c/0x1a8
[ 172.658254] ret_from_fork+0x10/0x20
[ 172.659699]
[ 172.660911] Allocated by task 167:
[ 172.661838] kasan_save_stack+0x3c/0x68
[ 172.662990] kasan_set_track+0x2c/0x40
[ 172.664202] kasan_save_alloc_info+0x24/0x38
[ 172.665542] __kasan_kmalloc+0xd4/0xd8
[ 172.666785] kmalloc_trace+0x68/0x130
[ 172.668175] kmalloc_uaf2+0xb4/0x290
[ 172.669070] kunit_try_run_case+0xf8/0x260
[ 172.670484] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.672280] kthread+0x18c/0x1a8
[ 172.673384] ret_from_fork+0x10/0x20
[ 172.674560]
[ 172.675097] Freed by task 167:
[ 172.676407] kasan_save_stack+0x3c/0x68
[ 172.677410] kasan_set_track+0x2c/0x40
[ 172.678764] kasan_save_free_info+0x38/0x60
[ 172.680020] __kasan_slab_free+0x100/0x170
[ 172.681341] __kmem_cache_free+0x170/0x2e0
[ 172.682608] kfree+0x74/0x138
[ 172.683713] kmalloc_uaf2+0xc8/0x290
[ 172.684846] kunit_try_run_case+0xf8/0x260
[ 172.686151] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.688199] kthread+0x18c/0x1a8
[ 172.689153] ret_from_fork+0x10/0x20
[ 172.690244]
[ 172.690768] The buggy address belongs to the object at ffff0000c5f7cc00
[ 172.690768] which belongs to the cache kmalloc-64 of size 64
[ 172.693568] The buggy address is located 40 bytes inside of
[ 172.693568] freed 64-byte region [ffff0000c5f7cc00, ffff0000c5f7cc40)
[ 172.696232]
[ 172.697168] The buggy address belongs to the physical page:
[ 172.698535] page:00000000c9fbfb33 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[ 172.700778] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.702504] page_type: 0xffffffff()
[ 172.703578] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 172.705641] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 172.707585] page dumped because: kasan: bad access detected
[ 172.708577]
[ 172.709034] Memory state around the buggy address:
[ 172.709953] ffff0000c5f7cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.712117] ffff0000c5f7cb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.714223] >ffff0000c5f7cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.715848] ^
[ 172.717455] ffff0000c5f7cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.718740] ffff0000c5f7cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.721011] ==================================================================
Home
[ 171.656534] ==================================================================
[ 171.658876] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x258
[ 171.661259] Read of size 16 at addr ffff0000c5beef20 by task kunit_try_catch/147
[ 171.662916]
[ 171.663611] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.665785] Hardware name: linux,dummy-virt (DT)
[ 171.667021] Call trace:
[ 171.667712] dump_backtrace+0x9c/0x128
[ 171.668945] show_stack+0x20/0x38
[ 171.669960] dump_stack_lvl+0x60/0xb0
[ 171.670993] print_report+0xf8/0x5d8
[ 171.672117] kasan_report+0xc8/0x118
[ 171.673257] __asan_load16+0xa4/0xa8
[ 171.674354] kmalloc_uaf_16+0x100/0x258
[ 171.676239] kunit_try_run_case+0xf8/0x260
[ 171.677405] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.678947] kthread+0x18c/0x1a8
[ 171.680168] ret_from_fork+0x10/0x20
[ 171.681233]
[ 171.681775] Allocated by task 147:
[ 171.682668] kasan_save_stack+0x3c/0x68
[ 171.684017] kasan_set_track+0x2c/0x40
[ 171.685170] kasan_save_alloc_info+0x24/0x38
[ 171.686435] __kasan_kmalloc+0xd4/0xd8
[ 171.687716] kmalloc_trace+0x68/0x130
[ 171.689098] kmalloc_uaf_16+0xcc/0x258
[ 171.690140] kunit_try_run_case+0xf8/0x260
[ 171.691594] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.693089] kthread+0x18c/0x1a8
[ 171.694052] ret_from_fork+0x10/0x20
[ 171.695271]
[ 171.696153] Freed by task 147:
[ 171.697337] kasan_save_stack+0x3c/0x68
[ 171.698487] kasan_set_track+0x2c/0x40
[ 171.700192] kasan_save_free_info+0x38/0x60
[ 171.701519] __kasan_slab_free+0x100/0x170
[ 171.702701] __kmem_cache_free+0x170/0x2e0
[ 171.703880] kfree+0x74/0x138
[ 171.704869] kmalloc_uaf_16+0xe8/0x258
[ 171.705882] kunit_try_run_case+0xf8/0x260
[ 171.707268] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.708714] kthread+0x18c/0x1a8
[ 171.709710] ret_from_fork+0x10/0x20
[ 171.710849]
[ 171.711612] The buggy address belongs to the object at ffff0000c5beef20
[ 171.711612] which belongs to the cache kmalloc-16 of size 16
[ 171.713977] The buggy address is located 0 bytes inside of
[ 171.713977] freed 16-byte region [ffff0000c5beef20, ffff0000c5beef30)
[ 171.717015]
[ 171.717462] The buggy address belongs to the physical page:
[ 171.718576] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[ 171.720698] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 171.722408] page_type: 0xffffffff()
[ 171.724113] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 171.725955] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 171.727643] page dumped because: kasan: bad access detected
[ 171.729233]
[ 171.729796] Memory state around the buggy address:
[ 171.731008] ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 171.732971] ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 171.734597] >ffff0000c5beef00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 171.736458] ^
[ 171.737783] ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.739839] ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 171.741384] ==================================================================
Home
[ 172.513477] ==================================================================
[ 172.515891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd0/0x1d8
[ 172.518399] Write of size 33 at addr ffff0000c5f7cb80 by task kunit_try_catch/165
[ 172.519706]
[ 172.522000] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 172.523941] Hardware name: linux,dummy-virt (DT)
[ 172.524818] Call trace:
[ 172.525777] dump_backtrace+0x9c/0x128
[ 172.527216] show_stack+0x20/0x38
[ 172.528381] dump_stack_lvl+0x60/0xb0
[ 172.529585] print_report+0xf8/0x5d8
[ 172.530754] kasan_report+0xc8/0x118
[ 172.532040] kasan_check_range+0xe8/0x190
[ 172.533258] __asan_memset+0x34/0x78
[ 172.534467] kmalloc_uaf_memset+0xd0/0x1d8
[ 172.535870] kunit_try_run_case+0xf8/0x260
[ 172.536997] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.538565] kthread+0x18c/0x1a8
[ 172.540015] ret_from_fork+0x10/0x20
[ 172.541421]
[ 172.542051] Allocated by task 165:
[ 172.543029] kasan_save_stack+0x3c/0x68
[ 172.544749] kasan_set_track+0x2c/0x40
[ 172.545912] kasan_save_alloc_info+0x24/0x38
[ 172.547256] __kasan_kmalloc+0xd4/0xd8
[ 172.548362] kmalloc_trace+0x68/0x130
[ 172.549694] kmalloc_uaf_memset+0x9c/0x1d8
[ 172.551146] kunit_try_run_case+0xf8/0x260
[ 172.552378] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.553575] kthread+0x18c/0x1a8
[ 172.554155] ret_from_fork+0x10/0x20
[ 172.554770]
[ 172.555846] Freed by task 165:
[ 172.557647] kasan_save_stack+0x3c/0x68
[ 172.558981] kasan_set_track+0x2c/0x40
[ 172.560218] kasan_save_free_info+0x38/0x60
[ 172.561708] __kasan_slab_free+0x100/0x170
[ 172.563030] __kmem_cache_free+0x170/0x2e0
[ 172.564210] kfree+0x74/0x138
[ 172.565343] kmalloc_uaf_memset+0xb8/0x1d8
[ 172.566498] kunit_try_run_case+0xf8/0x260
[ 172.568201] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 172.569836] kthread+0x18c/0x1a8
[ 172.570865] ret_from_fork+0x10/0x20
[ 172.572057]
[ 172.572603] The buggy address belongs to the object at ffff0000c5f7cb80
[ 172.572603] which belongs to the cache kmalloc-64 of size 64
[ 172.575195] The buggy address is located 0 bytes inside of
[ 172.575195] freed 64-byte region [ffff0000c5f7cb80, ffff0000c5f7cbc0)
[ 172.578178]
[ 172.578738] The buggy address belongs to the physical page:
[ 172.580167] page:00000000c9fbfb33 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[ 172.582201] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 172.583604] page_type: 0xffffffff()
[ 172.585336] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 172.587157] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 172.589269] page dumped because: kasan: bad access detected
[ 172.590929]
[ 172.591920] Memory state around the buggy address:
[ 172.593445] ffff0000c5f7ca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.595161] ffff0000c5f7cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.596957] >ffff0000c5f7cb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 172.598604] ^
[ 172.599775] ffff0000c5f7cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.601686] ffff0000c5f7cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 172.603353] ==================================================================
Home
[ 174.649711] ==================================================================
[ 174.652502] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1b8
[ 174.653881] Read of size 1 at addr ffff0000c56d8640 by task kunit_try_catch/199
[ 174.656384]
[ 174.656912] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.659332] Hardware name: linux,dummy-virt (DT)
[ 174.660581] Call trace:
[ 174.661348] dump_backtrace+0x9c/0x128
[ 174.662493] show_stack+0x20/0x38
[ 174.663615] dump_stack_lvl+0x60/0xb0
[ 174.664914] print_report+0xf8/0x5d8
[ 174.666323] kasan_report+0xc8/0x118
[ 174.667987] __kasan_check_byte+0x54/0x70
[ 174.669302] kmem_cache_destroy+0x30/0x178
[ 174.670482] kmem_cache_double_destroy+0xd0/0x1b8
[ 174.672097] kunit_try_run_case+0xf8/0x260
[ 174.673392] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.675127] kthread+0x18c/0x1a8
[ 174.676229] ret_from_fork+0x10/0x20
[ 174.677375]
[ 174.678143] Allocated by task 199:
[ 174.679115] kasan_save_stack+0x3c/0x68
[ 174.680557] kasan_set_track+0x2c/0x40
[ 174.681977] kasan_save_alloc_info+0x24/0x38
[ 174.683362] __kasan_slab_alloc+0xa8/0xb0
[ 174.684781] kmem_cache_alloc+0x134/0x330
[ 174.685951] kmem_cache_create_usercopy+0x170/0x260
[ 174.687296] kmem_cache_create+0x24/0x38
[ 174.688699] kmem_cache_double_destroy+0xa4/0x1b8
[ 174.690290] kunit_try_run_case+0xf8/0x260
[ 174.691593] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.693144] kthread+0x18c/0x1a8
[ 174.694326] ret_from_fork+0x10/0x20
[ 174.695664]
[ 174.696287] Freed by task 199:
[ 174.697173] kasan_save_stack+0x3c/0x68
[ 174.698356] kasan_set_track+0x2c/0x40
[ 174.699844] kasan_save_free_info+0x38/0x60
[ 174.702025] __kasan_slab_free+0x100/0x170
[ 174.703299] kmem_cache_free+0x18c/0x3f8
[ 174.704491] slab_kmem_cache_release+0x38/0x50
[ 174.705743] kmem_cache_release+0x1c/0x30
[ 174.706922] kobject_put+0x104/0x2d0
[ 174.708169] sysfs_slab_release+0x30/0x48
[ 174.709363] kmem_cache_destroy+0xd8/0x178
[ 174.710580] kmem_cache_double_destroy+0xc0/0x1b8
[ 174.712152] kunit_try_run_case+0xf8/0x260
[ 174.713619] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.715263] kthread+0x18c/0x1a8
[ 174.716338] ret_from_fork+0x10/0x20
[ 174.717551]
[ 174.718197] The buggy address belongs to the object at ffff0000c56d8640
[ 174.718197] which belongs to the cache kmem_cache of size 208
[ 174.721814] The buggy address is located 0 bytes inside of
[ 174.721814] freed 208-byte region [ffff0000c56d8640, ffff0000c56d8710)
[ 174.725085]
[ 174.725883] The buggy address belongs to the physical page:
[ 174.727400] page:00000000ee5f9298 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d8
[ 174.730120] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.731448] page_type: 0xffffffff()
[ 174.732686] raw: 0bfffc0000000800 ffff0000c0001000 dead000000000122 0000000000000000
[ 174.734473] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[ 174.736404] page dumped because: kasan: bad access detected
[ 174.737363]
[ 174.737992] Memory state around the buggy address:
[ 174.739206] ffff0000c56d8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 174.740948] ffff0000c56d8580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 174.742543] >ffff0000c56d8600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 174.744389] ^
[ 174.745508] ffff0000c56d8680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 174.747339] ffff0000c56d8700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.748927] ==================================================================
Home
[ 171.458157] ==================================================================
[ 171.459682] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x10c/0x2c0
[ 171.461416] Read of size 1 at addr ffff0000c3dbe600 by task kunit_try_catch/143
[ 171.463740]
[ 171.464579] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.466428] Hardware name: linux,dummy-virt (DT)
[ 171.467903] Call trace:
[ 171.468443] dump_backtrace+0x9c/0x128
[ 171.469583] show_stack+0x20/0x38
[ 171.470575] dump_stack_lvl+0x60/0xb0
[ 171.471780] print_report+0xf8/0x5d8
[ 171.473144] kasan_report+0xc8/0x118
[ 171.474257] __asan_load1+0x60/0x70
[ 171.475565] krealloc_uaf+0x10c/0x2c0
[ 171.476834] kunit_try_run_case+0xf8/0x260
[ 171.478174] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.480362] kthread+0x18c/0x1a8
[ 171.481374] ret_from_fork+0x10/0x20
[ 171.482458]
[ 171.483008] Allocated by task 143:
[ 171.484119] kasan_save_stack+0x3c/0x68
[ 171.485206] kasan_set_track+0x2c/0x40
[ 171.486379] kasan_save_alloc_info+0x24/0x38
[ 171.487914] __kasan_kmalloc+0xd4/0xd8
[ 171.489016] kmalloc_trace+0x68/0x130
[ 171.490168] krealloc_uaf+0xb0/0x2c0
[ 171.491641] kunit_try_run_case+0xf8/0x260
[ 171.492939] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.494406] kthread+0x18c/0x1a8
[ 171.495499] ret_from_fork+0x10/0x20
[ 171.497129]
[ 171.497577] Freed by task 143:
[ 171.498223] kasan_save_stack+0x3c/0x68
[ 171.499503] kasan_set_track+0x2c/0x40
[ 171.501018] kasan_save_free_info+0x38/0x60
[ 171.502327] __kasan_slab_free+0x100/0x170
[ 171.503595] __kmem_cache_free+0x170/0x2e0
[ 171.504908] kfree+0x74/0x138
[ 171.505853] krealloc_uaf+0xcc/0x2c0
[ 171.506924] kunit_try_run_case+0xf8/0x260
[ 171.508303] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.509792] kthread+0x18c/0x1a8
[ 171.510767] ret_from_fork+0x10/0x20
[ 171.511932]
[ 171.512473] The buggy address belongs to the object at ffff0000c3dbe600
[ 171.512473] which belongs to the cache kmalloc-256 of size 256
[ 171.514968] The buggy address is located 0 bytes inside of
[ 171.514968] freed 256-byte region [ffff0000c3dbe600, ffff0000c3dbe700)
[ 171.518234]
[ 171.519280] The buggy address belongs to the physical page:
[ 171.520662] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[ 171.522899] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.524917] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 171.526640] page_type: 0xffffffff()
[ 171.527926] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 171.529582] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 171.531299] page dumped because: kasan: bad access detected
[ 171.532496]
[ 171.533026] Memory state around the buggy address:
[ 171.534240] ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.536759] ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.538494] >ffff0000c3dbe600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 171.540293] ^
[ 171.541302] ffff0000c3dbe680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 171.543033] ffff0000c3dbe700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.544259] ==================================================================
Home
[ 171.365703] ==================================================================
[ 171.368459] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2c0
[ 171.369779] Read of size 1 at addr ffff0000c3dbe600 by task kunit_try_catch/143
[ 171.371295]
[ 171.372020] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 171.374509] Hardware name: linux,dummy-virt (DT)
[ 171.375620] Call trace:
[ 171.376371] dump_backtrace+0x9c/0x128
[ 171.377458] show_stack+0x20/0x38
[ 171.378465] dump_stack_lvl+0x60/0xb0
[ 171.379828] print_report+0xf8/0x5d8
[ 171.380995] kasan_report+0xc8/0x118
[ 171.382114] __kasan_check_byte+0x54/0x70
[ 171.383391] krealloc+0x48/0x1a0
[ 171.384236] krealloc_uaf+0xe4/0x2c0
[ 171.386448] kunit_try_run_case+0xf8/0x260
[ 171.388358] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.389762] kthread+0x18c/0x1a8
[ 171.390771] ret_from_fork+0x10/0x20
[ 171.391978]
[ 171.392512] Allocated by task 143:
[ 171.393777] kasan_save_stack+0x3c/0x68
[ 171.395037] kasan_set_track+0x2c/0x40
[ 171.396459] kasan_save_alloc_info+0x24/0x38
[ 171.397566] __kasan_kmalloc+0xd4/0xd8
[ 171.398716] kmalloc_trace+0x68/0x130
[ 171.399970] krealloc_uaf+0xb0/0x2c0
[ 171.401040] kunit_try_run_case+0xf8/0x260
[ 171.402217] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.403920] kthread+0x18c/0x1a8
[ 171.404665] ret_from_fork+0x10/0x20
[ 171.405800]
[ 171.406417] Freed by task 143:
[ 171.407519] kasan_save_stack+0x3c/0x68
[ 171.408703] kasan_set_track+0x2c/0x40
[ 171.409878] kasan_save_free_info+0x38/0x60
[ 171.411408] __kasan_slab_free+0x100/0x170
[ 171.412669] __kmem_cache_free+0x170/0x2e0
[ 171.413896] kfree+0x74/0x138
[ 171.414704] krealloc_uaf+0xcc/0x2c0
[ 171.416087] kunit_try_run_case+0xf8/0x260
[ 171.417328] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 171.418762] kthread+0x18c/0x1a8
[ 171.419740] ret_from_fork+0x10/0x20
[ 171.420883]
[ 171.421468] The buggy address belongs to the object at ffff0000c3dbe600
[ 171.421468] which belongs to the cache kmalloc-256 of size 256
[ 171.424559] The buggy address is located 0 bytes inside of
[ 171.424559] freed 256-byte region [ffff0000c3dbe600, ffff0000c3dbe700)
[ 171.427949]
[ 171.428980] The buggy address belongs to the physical page:
[ 171.430311] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[ 171.432523] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 171.434308] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 171.436166] page_type: 0xffffffff()
[ 171.437331] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 171.439697] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 171.441316] page dumped because: kasan: bad access detected
[ 171.442610]
[ 171.443182] Memory state around the buggy address:
[ 171.444393] ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.446149] ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.447910] >ffff0000c3dbe600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 171.449572] ^
[ 171.450318] ffff0000c3dbe680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 171.452372] ffff0000c3dbe700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 171.454284] ==================================================================
Home
[ 174.190334] ==================================================================
[ 174.192156] BUG: KASAN: slab-use-after-free in ksize_uaf+0xe8/0x2f0
[ 174.193654] Read of size 1 at addr ffff0000c5f83b00 by task kunit_try_catch/193
[ 174.195481]
[ 174.196084] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.198083] Hardware name: linux,dummy-virt (DT)
[ 174.199860] Call trace:
[ 174.200482] dump_backtrace+0x9c/0x128
[ 174.201605] show_stack+0x20/0x38
[ 174.202673] dump_stack_lvl+0x60/0xb0
[ 174.203886] print_report+0xf8/0x5d8
[ 174.204995] kasan_report+0xc8/0x118
[ 174.206156] __asan_load1+0x60/0x70
[ 174.207343] ksize_uaf+0xe8/0x2f0
[ 174.208360] kunit_try_run_case+0xf8/0x260
[ 174.209772] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.211635] kthread+0x18c/0x1a8
[ 174.212518] ret_from_fork+0x10/0x20
[ 174.213534]
[ 174.214207] Allocated by task 193:
[ 174.215257] kasan_save_stack+0x3c/0x68
[ 174.216797] kasan_set_track+0x2c/0x40
[ 174.218070] kasan_save_alloc_info+0x24/0x38
[ 174.219494] __kasan_kmalloc+0xd4/0xd8
[ 174.220851] kmalloc_trace+0x68/0x130
[ 174.221793] ksize_uaf+0x9c/0x2f0
[ 174.222905] kunit_try_run_case+0xf8/0x260
[ 174.224319] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.225824] kthread+0x18c/0x1a8
[ 174.226797] ret_from_fork+0x10/0x20
[ 174.228247]
[ 174.228756] Freed by task 193:
[ 174.229613] kasan_save_stack+0x3c/0x68
[ 174.230776] kasan_set_track+0x2c/0x40
[ 174.231927] kasan_save_free_info+0x38/0x60
[ 174.233211] __kasan_slab_free+0x100/0x170
[ 174.234551] __kmem_cache_free+0x170/0x2e0
[ 174.235716] kfree+0x74/0x138
[ 174.236648] ksize_uaf+0xb8/0x2f0
[ 174.238424] kunit_try_run_case+0xf8/0x260
[ 174.239685] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.241457] kthread+0x18c/0x1a8
[ 174.242448] ret_from_fork+0x10/0x20
[ 174.243844]
[ 174.244443] The buggy address belongs to the object at ffff0000c5f83b00
[ 174.244443] which belongs to the cache kmalloc-128 of size 128
[ 174.247011] The buggy address is located 0 bytes inside of
[ 174.247011] freed 128-byte region [ffff0000c5f83b00, ffff0000c5f83b80)
[ 174.249693]
[ 174.250353] The buggy address belongs to the physical page:
[ 174.251932] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[ 174.254163] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.255986] page_type: 0xffffffff()
[ 174.257187] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 174.258931] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 174.260815] page dumped because: kasan: bad access detected
[ 174.262065]
[ 174.262586] Memory state around the buggy address:
[ 174.264049] ffff0000c5f83a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 174.265582] ffff0000c5f83a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.267271] >ffff0000c5f83b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 174.268803] ^
[ 174.269675] ffff0000c5f83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.271356] ffff0000c5f83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.273536] ==================================================================
Home
[ 174.277000] ==================================================================
[ 174.278547] BUG: KASAN: slab-use-after-free in ksize_uaf+0x10c/0x2f0
[ 174.280076] Read of size 1 at addr ffff0000c5f83b78 by task kunit_try_catch/193
[ 174.281967]
[ 174.282574] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.285039] Hardware name: linux,dummy-virt (DT)
[ 174.286287] Call trace:
[ 174.286864] dump_backtrace+0x9c/0x128
[ 174.288320] show_stack+0x20/0x38
[ 174.289298] dump_stack_lvl+0x60/0xb0
[ 174.290477] print_report+0xf8/0x5d8
[ 174.291552] kasan_report+0xc8/0x118
[ 174.292771] __asan_load1+0x60/0x70
[ 174.293857] ksize_uaf+0x10c/0x2f0
[ 174.295052] kunit_try_run_case+0xf8/0x260
[ 174.296470] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.297950] kthread+0x18c/0x1a8
[ 174.298934] ret_from_fork+0x10/0x20
[ 174.299896]
[ 174.300508] Allocated by task 193:
[ 174.301623] kasan_save_stack+0x3c/0x68
[ 174.302850] kasan_set_track+0x2c/0x40
[ 174.304541] kasan_save_alloc_info+0x24/0x38
[ 174.305878] __kasan_kmalloc+0xd4/0xd8
[ 174.307185] kmalloc_trace+0x68/0x130
[ 174.308288] ksize_uaf+0x9c/0x2f0
[ 174.309103] kunit_try_run_case+0xf8/0x260
[ 174.310401] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.311965] kthread+0x18c/0x1a8
[ 174.312993] ret_from_fork+0x10/0x20
[ 174.313882]
[ 174.314466] Freed by task 193:
[ 174.315630] kasan_save_stack+0x3c/0x68
[ 174.316971] kasan_set_track+0x2c/0x40
[ 174.318119] kasan_save_free_info+0x38/0x60
[ 174.319437] __kasan_slab_free+0x100/0x170
[ 174.321335] __kmem_cache_free+0x170/0x2e0
[ 174.322446] kfree+0x74/0x138
[ 174.323670] ksize_uaf+0xb8/0x2f0
[ 174.324918] kunit_try_run_case+0xf8/0x260
[ 174.326159] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.327949] kthread+0x18c/0x1a8
[ 174.328936] ret_from_fork+0x10/0x20
[ 174.330075]
[ 174.330697] The buggy address belongs to the object at ffff0000c5f83b00
[ 174.330697] which belongs to the cache kmalloc-128 of size 128
[ 174.333350] The buggy address is located 120 bytes inside of
[ 174.333350] freed 128-byte region [ffff0000c5f83b00, ffff0000c5f83b80)
[ 174.336251]
[ 174.336807] The buggy address belongs to the physical page:
[ 174.338117] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[ 174.340637] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.342032] page_type: 0xffffffff()
[ 174.343882] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 174.345514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 174.347185] page dumped because: kasan: bad access detected
[ 174.348558]
[ 174.349321] Memory state around the buggy address:
[ 174.350519] ffff0000c5f83a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 174.352452] ffff0000c5f83a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.354068] >ffff0000c5f83b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 174.355909] ^
[ 174.357675] ffff0000c5f83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.359567] ffff0000c5f83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.361065] ==================================================================
Home
[ 174.100900] ==================================================================
[ 174.103132] BUG: KASAN: slab-use-after-free in ksize_uaf+0xc8/0x2f0
[ 174.105226] Read of size 1 at addr ffff0000c5f83b00 by task kunit_try_catch/193
[ 174.106788]
[ 174.107493] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.109438] Hardware name: linux,dummy-virt (DT)
[ 174.110533] Call trace:
[ 174.111444] dump_backtrace+0x9c/0x128
[ 174.112616] show_stack+0x20/0x38
[ 174.113621] dump_stack_lvl+0x60/0xb0
[ 174.114802] print_report+0xf8/0x5d8
[ 174.116147] kasan_report+0xc8/0x118
[ 174.117455] __kasan_check_byte+0x54/0x70
[ 174.118644] ksize+0x30/0x88
[ 174.119612] ksize_uaf+0xc8/0x2f0
[ 174.120660] kunit_try_run_case+0xf8/0x260
[ 174.122127] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.123700] kthread+0x18c/0x1a8
[ 174.125391] ret_from_fork+0x10/0x20
[ 174.127313]
[ 174.128271] Allocated by task 193:
[ 174.129014] kasan_save_stack+0x3c/0x68
[ 174.130300] kasan_set_track+0x2c/0x40
[ 174.131657] kasan_save_alloc_info+0x24/0x38
[ 174.132992] __kasan_kmalloc+0xd4/0xd8
[ 174.134151] kmalloc_trace+0x68/0x130
[ 174.135505] ksize_uaf+0x9c/0x2f0
[ 174.136587] kunit_try_run_case+0xf8/0x260
[ 174.137825] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.139354] kthread+0x18c/0x1a8
[ 174.140144] ret_from_fork+0x10/0x20
[ 174.141402]
[ 174.141956] Freed by task 193:
[ 174.142807] kasan_save_stack+0x3c/0x68
[ 174.144042] kasan_set_track+0x2c/0x40
[ 174.145880] kasan_save_free_info+0x38/0x60
[ 174.147627] __kasan_slab_free+0x100/0x170
[ 174.148785] __kmem_cache_free+0x170/0x2e0
[ 174.150007] kfree+0x74/0x138
[ 174.150949] ksize_uaf+0xb8/0x2f0
[ 174.152275] kunit_try_run_case+0xf8/0x260
[ 174.153509] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.154980] kthread+0x18c/0x1a8
[ 174.155926] ret_from_fork+0x10/0x20
[ 174.157117]
[ 174.157625] The buggy address belongs to the object at ffff0000c5f83b00
[ 174.157625] which belongs to the cache kmalloc-128 of size 128
[ 174.160604] The buggy address is located 0 bytes inside of
[ 174.160604] freed 128-byte region [ffff0000c5f83b00, ffff0000c5f83b80)
[ 174.162954]
[ 174.164126] The buggy address belongs to the physical page:
[ 174.165174] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[ 174.167765] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 174.169629] page_type: 0xffffffff()
[ 174.170657] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 174.172245] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 174.173604] page dumped because: kasan: bad access detected
[ 174.174917]
[ 174.175433] Memory state around the buggy address:
[ 174.176591] ffff0000c5f83a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 174.178318] ffff0000c5f83a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.180364] >ffff0000c5f83b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 174.182012] ^
[ 174.182988] ffff0000c5f83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.184826] ffff0000c5f83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 174.186420] ==================================================================
Home
[ 177.208076] ==================================================================
[ 177.210498] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x30/0x50
[ 177.212743] Read of size 4 at addr ffff0000c5f7fac0 by task swapper/0/0
[ 177.214077]
[ 177.214672] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.6.72-rc1 #1
[ 177.216467] Hardware name: linux,dummy-virt (DT)
[ 177.217610] Call trace:
[ 177.218345] dump_backtrace+0x9c/0x128
[ 177.219613] show_stack+0x20/0x38
[ 177.220637] dump_stack_lvl+0x60/0xb0
[ 177.221884] print_report+0xf8/0x5d8
[ 177.223274] kasan_report+0xc8/0x118
[ 177.224966] __asan_load4+0x9c/0xc0
[ 177.226282] rcu_uaf_reclaim+0x30/0x50
[ 177.227762] rcu_core+0x448/0xf40
[ 177.229093] rcu_core_si+0x18/0x30
[ 177.232411] handle_softirqs+0x240/0x678
[ 177.233809] __do_softirq+0x1c/0x28
[ 177.234703] ____do_softirq+0x18/0x30
[ 177.236353] call_on_irq_stack+0x24/0x58
[ 177.237376] do_softirq_own_stack+0x24/0x38
[ 177.238580] irq_exit_rcu+0x110/0x160
[ 177.239875] el1_interrupt+0x38/0x58
[ 177.240880] el1h_64_irq_handler+0x18/0x28
[ 177.242032] el1h_64_irq+0x64/0x68
[ 177.243008] arch_local_irq_enable+0x4/0x8
[ 177.244253] do_idle+0x304/0x388
[ 177.245317] cpu_startup_entry+0x44/0x58
[ 177.246502] rest_init+0x11c/0x128
[ 177.247544] arch_call_rest_init+0x1c/0x28
[ 177.249045] start_kernel+0x2cc/0x390
[ 177.250187] __primary_switched+0xc0/0xd0
[ 177.251590]
[ 177.252478] Allocated by task 213:
[ 177.253230] kasan_save_stack+0x3c/0x68
[ 177.254521] kasan_set_track+0x2c/0x40
[ 177.255692] kasan_save_alloc_info+0x24/0x38
[ 177.257150] __kasan_kmalloc+0xd4/0xd8
[ 177.258308] kmalloc_trace+0x68/0x130
[ 177.259556] rcu_uaf+0x9c/0x1e0
[ 177.260689] kunit_try_run_case+0xf8/0x260
[ 177.261939] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.264051] kthread+0x18c/0x1a8
[ 177.265020] ret_from_fork+0x10/0x20
[ 177.266069]
[ 177.266589] Freed by task 0:
[ 177.267572] kasan_save_stack+0x3c/0x68
[ 177.268932] kasan_set_track+0x2c/0x40
[ 177.270231] kasan_save_free_info+0x38/0x60
[ 177.271543] __kasan_slab_free+0x100/0x170
[ 177.272852] __kmem_cache_free+0x170/0x2e0
[ 177.273874] kfree+0x74/0x138
[ 177.275811] rcu_uaf_reclaim+0x28/0x50
[ 177.277375] rcu_core+0x448/0xf40
[ 177.278503] rcu_core_si+0x18/0x30
[ 177.279768] handle_softirqs+0x240/0x678
[ 177.280816] __do_softirq+0x1c/0x28
[ 177.281841]
[ 177.282420] Last potentially related work creation:
[ 177.283357] kasan_save_stack+0x3c/0x68
[ 177.284579] __kasan_record_aux_stack+0xb8/0xe8
[ 177.286298] kasan_record_aux_stack_noalloc+0x14/0x20
[ 177.288007] __call_rcu_common.constprop.0+0x58/0x598
[ 177.289472] call_rcu+0x18/0x30
[ 177.290533] rcu_uaf+0xd4/0x1e0
[ 177.291774] kunit_try_run_case+0xf8/0x260
[ 177.293195] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.294684] kthread+0x18c/0x1a8
[ 177.295871] ret_from_fork+0x10/0x20
[ 177.296965]
[ 177.297481] The buggy address belongs to the object at ffff0000c5f7fac0
[ 177.297481] which belongs to the cache kmalloc-32 of size 32
[ 177.300751] The buggy address is located 0 bytes inside of
[ 177.300751] freed 32-byte region [ffff0000c5f7fac0, ffff0000c5f7fae0)
[ 177.303311]
[ 177.304608] The buggy address belongs to the physical page:
[ 177.305892] page:00000000ad3e6439 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7f
[ 177.308474] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 177.310109] page_type: 0xffffffff()
[ 177.311884] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 177.313499] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 177.315207] page dumped because: kasan: bad access detected
[ 177.316607]
[ 177.317122] Memory state around the buggy address:
[ 177.318338] ffff0000c5f7f980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 177.320371] ffff0000c5f7fa00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 177.322134] >ffff0000c5f7fa80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 177.324136] ^
[ 177.325242] ffff0000c5f7fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.326978] ffff0000c5f7fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.328559] ==================================================================
Home
[ 174.962806] ==================================================================
[ 174.965438] BUG: KASAN: slab-use-after-free in strchr+0x20/0x80
[ 174.966573] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 174.968921]
[ 174.969590] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.971607] Hardware name: linux,dummy-virt (DT)
[ 174.973085] Call trace:
[ 174.973979] dump_backtrace+0x9c/0x128
[ 174.975571] show_stack+0x20/0x38
[ 174.976662] dump_stack_lvl+0x60/0xb0
[ 174.977920] print_report+0xf8/0x5d8
[ 174.979129] kasan_report+0xc8/0x118
[ 174.980635] __asan_load1+0x60/0x70
[ 174.981818] strchr+0x20/0x80
[ 174.982839] kasan_strings+0xdc/0x478
[ 174.984173] kunit_try_run_case+0xf8/0x260
[ 174.986152] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.988286] kthread+0x18c/0x1a8
[ 174.989288] ret_from_fork+0x10/0x20
[ 174.990384]
[ 174.990908] Allocated by task 205:
[ 174.991837] kasan_save_stack+0x3c/0x68
[ 174.992919] kasan_set_track+0x2c/0x40
[ 174.994103] kasan_save_alloc_info+0x24/0x38
[ 174.995611] __kasan_kmalloc+0xd4/0xd8
[ 174.996872] kmalloc_trace+0x68/0x130
[ 174.997967] kasan_strings+0xa0/0x478
[ 174.999458] kunit_try_run_case+0xf8/0x260
[ 175.000566] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.002019] kthread+0x18c/0x1a8
[ 175.003103] ret_from_fork+0x10/0x20
[ 175.004331]
[ 175.004795] Freed by task 205:
[ 175.005492] kasan_save_stack+0x3c/0x68
[ 175.008008] kasan_set_track+0x2c/0x40
[ 175.009148] kasan_save_free_info+0x38/0x60
[ 175.010422] __kasan_slab_free+0x100/0x170
[ 175.011879] __kmem_cache_free+0x170/0x2e0
[ 175.013235] kfree+0x74/0x138
[ 175.014184] kasan_strings+0xbc/0x478
[ 175.015579] kunit_try_run_case+0xf8/0x260
[ 175.016825] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.018225] kthread+0x18c/0x1a8
[ 175.019253] ret_from_fork+0x10/0x20
[ 175.020230]
[ 175.020840] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.020840] which belongs to the cache kmalloc-32 of size 32
[ 175.024840] The buggy address is located 16 bytes inside of
[ 175.024840] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.027200]
[ 175.028123] The buggy address belongs to the physical page:
[ 175.029536] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.031461] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.033247] page_type: 0xffffffff()
[ 175.034439] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.036544] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.038236] page dumped because: kasan: bad access detected
[ 175.039853]
[ 175.040552] Memory state around the buggy address:
[ 175.041849] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.043596] ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 175.044980] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.047168] ^
[ 175.048930] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.050565] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.052103] ==================================================================
Home
[ 174.962806] ==================================================================
[ 174.965438] BUG: KASAN: slab-use-after-free in strchr+0x20/0x80
[ 174.966573] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 174.968921]
[ 174.969590] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 174.971607] Hardware name: linux,dummy-virt (DT)
[ 174.973085] Call trace:
[ 174.973979] dump_backtrace+0x9c/0x128
[ 174.975571] show_stack+0x20/0x38
[ 174.976662] dump_stack_lvl+0x60/0xb0
[ 174.977920] print_report+0xf8/0x5d8
[ 174.979129] kasan_report+0xc8/0x118
[ 174.980635] __asan_load1+0x60/0x70
[ 174.981818] strchr+0x20/0x80
[ 174.982839] kasan_strings+0xdc/0x478
[ 174.984173] kunit_try_run_case+0xf8/0x260
[ 174.986152] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 174.988286] kthread+0x18c/0x1a8
[ 174.989288] ret_from_fork+0x10/0x20
[ 174.990384]
[ 174.990908] Allocated by task 205:
[ 174.991837] kasan_save_stack+0x3c/0x68
[ 174.992919] kasan_set_track+0x2c/0x40
[ 174.994103] kasan_save_alloc_info+0x24/0x38
[ 174.995611] __kasan_kmalloc+0xd4/0xd8
[ 174.996872] kmalloc_trace+0x68/0x130
[ 174.997967] kasan_strings+0xa0/0x478
[ 174.999458] kunit_try_run_case+0xf8/0x260
[ 175.000566] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.002019] kthread+0x18c/0x1a8
[ 175.003103] ret_from_fork+0x10/0x20
[ 175.004331]
[ 175.004795] Freed by task 205:
[ 175.005492] kasan_save_stack+0x3c/0x68
[ 175.008008] kasan_set_track+0x2c/0x40
[ 175.009148] kasan_save_free_info+0x38/0x60
[ 175.010422] __kasan_slab_free+0x100/0x170
[ 175.011879] __kmem_cache_free+0x170/0x2e0
[ 175.013235] kfree+0x74/0x138
[ 175.014184] kasan_strings+0xbc/0x478
[ 175.015579] kunit_try_run_case+0xf8/0x260
[ 175.016825] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.018225] kthread+0x18c/0x1a8
[ 175.019253] ret_from_fork+0x10/0x20
[ 175.020230]
[ 175.020840] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.020840] which belongs to the cache kmalloc-32 of size 32
[ 175.024840] The buggy address is located 16 bytes inside of
[ 175.024840] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.027200]
[ 175.028123] The buggy address belongs to the physical page:
[ 175.029536] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.031461] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.033247] page_type: 0xffffffff()
[ 175.034439] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.036544] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.038236] page dumped because: kasan: bad access detected
[ 175.039853]
[ 175.040552] Memory state around the buggy address:
[ 175.041849] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.043596] ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 175.044980] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.047168] ^
[ 175.048930] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.050565] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.052103] ==================================================================
Home
[ 175.140125] ==================================================================
[ 175.141844] BUG: KASAN: slab-use-after-free in strcmp+0x2c/0x78
[ 175.144227] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.145861]
[ 175.146441] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.148343] Hardware name: linux,dummy-virt (DT)
[ 175.149940] Call trace:
[ 175.150653] dump_backtrace+0x9c/0x128
[ 175.151849] show_stack+0x20/0x38
[ 175.152891] dump_stack_lvl+0x60/0xb0
[ 175.154042] print_report+0xf8/0x5d8
[ 175.155587] kasan_report+0xc8/0x118
[ 175.156874] __asan_load1+0x60/0x70
[ 175.158025] strcmp+0x2c/0x78
[ 175.159037] kasan_strings+0x12c/0x478
[ 175.160649] kunit_try_run_case+0xf8/0x260
[ 175.161929] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.163449] kthread+0x18c/0x1a8
[ 175.164462] ret_from_fork+0x10/0x20
[ 175.166105]
[ 175.166653] Allocated by task 205:
[ 175.168154] kasan_save_stack+0x3c/0x68
[ 175.169228] kasan_set_track+0x2c/0x40
[ 175.170375] kasan_save_alloc_info+0x24/0x38
[ 175.171783] __kasan_kmalloc+0xd4/0xd8
[ 175.173279] kmalloc_trace+0x68/0x130
[ 175.174343] kasan_strings+0xa0/0x478
[ 175.175839] kunit_try_run_case+0xf8/0x260
[ 175.176936] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.178405] kthread+0x18c/0x1a8
[ 175.179441] ret_from_fork+0x10/0x20
[ 175.180617]
[ 175.181089] Freed by task 205:
[ 175.182023] kasan_save_stack+0x3c/0x68
[ 175.183437] kasan_set_track+0x2c/0x40
[ 175.184543] kasan_save_free_info+0x38/0x60
[ 175.185880] __kasan_slab_free+0x100/0x170
[ 175.187121] __kmem_cache_free+0x170/0x2e0
[ 175.188703] kfree+0x74/0x138
[ 175.189655] kasan_strings+0xbc/0x478
[ 175.190765] kunit_try_run_case+0xf8/0x260
[ 175.192007] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.193529] kthread+0x18c/0x1a8
[ 175.194445] ret_from_fork+0x10/0x20
[ 175.195753]
[ 175.196325] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.196325] which belongs to the cache kmalloc-32 of size 32
[ 175.198763] The buggy address is located 16 bytes inside of
[ 175.198763] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.201214]
[ 175.202316] The buggy address belongs to the physical page:
[ 175.204010] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.206077] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.207682] page_type: 0xffffffff()
[ 175.208849] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.210887] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.212946] page dumped because: kasan: bad access detected
[ 175.214290]
[ 175.214876] Memory state around the buggy address:
[ 175.216015] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.218024] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.220124] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.221762] ^
[ 175.223353] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.225358] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.227046] ==================================================================
Home
[ 175.140125] ==================================================================
[ 175.141844] BUG: KASAN: slab-use-after-free in strcmp+0x2c/0x78
[ 175.144227] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.145861]
[ 175.146441] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.148343] Hardware name: linux,dummy-virt (DT)
[ 175.149940] Call trace:
[ 175.150653] dump_backtrace+0x9c/0x128
[ 175.151849] show_stack+0x20/0x38
[ 175.152891] dump_stack_lvl+0x60/0xb0
[ 175.154042] print_report+0xf8/0x5d8
[ 175.155587] kasan_report+0xc8/0x118
[ 175.156874] __asan_load1+0x60/0x70
[ 175.158025] strcmp+0x2c/0x78
[ 175.159037] kasan_strings+0x12c/0x478
[ 175.160649] kunit_try_run_case+0xf8/0x260
[ 175.161929] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.163449] kthread+0x18c/0x1a8
[ 175.164462] ret_from_fork+0x10/0x20
[ 175.166105]
[ 175.166653] Allocated by task 205:
[ 175.168154] kasan_save_stack+0x3c/0x68
[ 175.169228] kasan_set_track+0x2c/0x40
[ 175.170375] kasan_save_alloc_info+0x24/0x38
[ 175.171783] __kasan_kmalloc+0xd4/0xd8
[ 175.173279] kmalloc_trace+0x68/0x130
[ 175.174343] kasan_strings+0xa0/0x478
[ 175.175839] kunit_try_run_case+0xf8/0x260
[ 175.176936] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.178405] kthread+0x18c/0x1a8
[ 175.179441] ret_from_fork+0x10/0x20
[ 175.180617]
[ 175.181089] Freed by task 205:
[ 175.182023] kasan_save_stack+0x3c/0x68
[ 175.183437] kasan_set_track+0x2c/0x40
[ 175.184543] kasan_save_free_info+0x38/0x60
[ 175.185880] __kasan_slab_free+0x100/0x170
[ 175.187121] __kmem_cache_free+0x170/0x2e0
[ 175.188703] kfree+0x74/0x138
[ 175.189655] kasan_strings+0xbc/0x478
[ 175.190765] kunit_try_run_case+0xf8/0x260
[ 175.192007] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.193529] kthread+0x18c/0x1a8
[ 175.194445] ret_from_fork+0x10/0x20
[ 175.195753]
[ 175.196325] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.196325] which belongs to the cache kmalloc-32 of size 32
[ 175.198763] The buggy address is located 16 bytes inside of
[ 175.198763] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.201214]
[ 175.202316] The buggy address belongs to the physical page:
[ 175.204010] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.206077] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.207682] page_type: 0xffffffff()
[ 175.208849] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.210887] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.212946] page dumped because: kasan: bad access detected
[ 175.214290]
[ 175.214876] Memory state around the buggy address:
[ 175.216015] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.218024] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.220124] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.221762] ^
[ 175.223353] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.225358] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.227046] ==================================================================
Home
[ 175.321201] ==================================================================
[ 175.322867] BUG: KASAN: slab-use-after-free in strlen+0x18/0x68
[ 175.324394] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.326288]
[ 175.326978] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.328965] Hardware name: linux,dummy-virt (DT)
[ 175.330078] Call trace:
[ 175.330693] dump_backtrace+0x9c/0x128
[ 175.332496] show_stack+0x20/0x38
[ 175.333349] dump_stack_lvl+0x60/0xb0
[ 175.334710] print_report+0xf8/0x5d8
[ 175.336099] kasan_report+0xc8/0x118
[ 175.337824] __asan_load1+0x60/0x70
[ 175.339449] strlen+0x18/0x68
[ 175.340804] kasan_strings+0x17c/0x478
[ 175.341897] kunit_try_run_case+0xf8/0x260
[ 175.343444] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.344752] kthread+0x18c/0x1a8
[ 175.346141] ret_from_fork+0x10/0x20
[ 175.347740]
[ 175.348277] Allocated by task 205:
[ 175.349033] kasan_save_stack+0x3c/0x68
[ 175.350242] kasan_set_track+0x2c/0x40
[ 175.352052] kasan_save_alloc_info+0x24/0x38
[ 175.353465] __kasan_kmalloc+0xd4/0xd8
[ 175.354620] kmalloc_trace+0x68/0x130
[ 175.356055] kasan_strings+0xa0/0x478
[ 175.357267] kunit_try_run_case+0xf8/0x260
[ 175.358474] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.360156] kthread+0x18c/0x1a8
[ 175.361045] ret_from_fork+0x10/0x20
[ 175.361997]
[ 175.362656] Freed by task 205:
[ 175.364041] kasan_save_stack+0x3c/0x68
[ 175.365296] kasan_set_track+0x2c/0x40
[ 175.366530] kasan_save_free_info+0x38/0x60
[ 175.367924] __kasan_slab_free+0x100/0x170
[ 175.368962] __kmem_cache_free+0x170/0x2e0
[ 175.370190] kfree+0x74/0x138
[ 175.371582] kasan_strings+0xbc/0x478
[ 175.372747] kunit_try_run_case+0xf8/0x260
[ 175.374009] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.375580] kthread+0x18c/0x1a8
[ 175.376576] ret_from_fork+0x10/0x20
[ 175.378302]
[ 175.379024] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.379024] which belongs to the cache kmalloc-32 of size 32
[ 175.381960] The buggy address is located 16 bytes inside of
[ 175.381960] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.384790]
[ 175.385374] The buggy address belongs to the physical page:
[ 175.386862] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.389642] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.391341] page_type: 0xffffffff()
[ 175.393148] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.395819] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.397403] page dumped because: kasan: bad access detected
[ 175.398765]
[ 175.399616] Memory state around the buggy address:
[ 175.400938] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.403347] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.405330] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.406785] ^
[ 175.408431] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.409904] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.411834] ==================================================================
Home
[ 175.321201] ==================================================================
[ 175.322867] BUG: KASAN: slab-use-after-free in strlen+0x18/0x68
[ 175.324394] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.326288]
[ 175.326978] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.328965] Hardware name: linux,dummy-virt (DT)
[ 175.330078] Call trace:
[ 175.330693] dump_backtrace+0x9c/0x128
[ 175.332496] show_stack+0x20/0x38
[ 175.333349] dump_stack_lvl+0x60/0xb0
[ 175.334710] print_report+0xf8/0x5d8
[ 175.336099] kasan_report+0xc8/0x118
[ 175.337824] __asan_load1+0x60/0x70
[ 175.339449] strlen+0x18/0x68
[ 175.340804] kasan_strings+0x17c/0x478
[ 175.341897] kunit_try_run_case+0xf8/0x260
[ 175.343444] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.344752] kthread+0x18c/0x1a8
[ 175.346141] ret_from_fork+0x10/0x20
[ 175.347740]
[ 175.348277] Allocated by task 205:
[ 175.349033] kasan_save_stack+0x3c/0x68
[ 175.350242] kasan_set_track+0x2c/0x40
[ 175.352052] kasan_save_alloc_info+0x24/0x38
[ 175.353465] __kasan_kmalloc+0xd4/0xd8
[ 175.354620] kmalloc_trace+0x68/0x130
[ 175.356055] kasan_strings+0xa0/0x478
[ 175.357267] kunit_try_run_case+0xf8/0x260
[ 175.358474] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.360156] kthread+0x18c/0x1a8
[ 175.361045] ret_from_fork+0x10/0x20
[ 175.361997]
[ 175.362656] Freed by task 205:
[ 175.364041] kasan_save_stack+0x3c/0x68
[ 175.365296] kasan_set_track+0x2c/0x40
[ 175.366530] kasan_save_free_info+0x38/0x60
[ 175.367924] __kasan_slab_free+0x100/0x170
[ 175.368962] __kmem_cache_free+0x170/0x2e0
[ 175.370190] kfree+0x74/0x138
[ 175.371582] kasan_strings+0xbc/0x478
[ 175.372747] kunit_try_run_case+0xf8/0x260
[ 175.374009] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.375580] kthread+0x18c/0x1a8
[ 175.376576] ret_from_fork+0x10/0x20
[ 175.378302]
[ 175.379024] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.379024] which belongs to the cache kmalloc-32 of size 32
[ 175.381960] The buggy address is located 16 bytes inside of
[ 175.381960] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.384790]
[ 175.385374] The buggy address belongs to the physical page:
[ 175.386862] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.389642] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.391341] page_type: 0xffffffff()
[ 175.393148] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.395819] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.397403] page dumped because: kasan: bad access detected
[ 175.398765]
[ 175.399616] Memory state around the buggy address:
[ 175.400938] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.403347] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.405330] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.406785] ^
[ 175.408431] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.409904] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.411834] ==================================================================
Home
[ 175.414653] ==================================================================
[ 175.415928] BUG: KASAN: slab-use-after-free in strnlen+0x3c/0x68
[ 175.417715] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.419611]
[ 175.420314] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.422044] Hardware name: linux,dummy-virt (DT)
[ 175.422979] Call trace:
[ 175.423867] dump_backtrace+0x9c/0x128
[ 175.425241] show_stack+0x20/0x38
[ 175.426286] dump_stack_lvl+0x60/0xb0
[ 175.427510] print_report+0xf8/0x5d8
[ 175.428854] kasan_report+0xc8/0x118
[ 175.430121] __asan_load1+0x60/0x70
[ 175.431501] strnlen+0x3c/0x68
[ 175.432861] kasan_strings+0x1a4/0x478
[ 175.434051] kunit_try_run_case+0xf8/0x260
[ 175.435877] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.437178] kthread+0x18c/0x1a8
[ 175.438745] ret_from_fork+0x10/0x20
[ 175.440134]
[ 175.440789] Allocated by task 205:
[ 175.441674] kasan_save_stack+0x3c/0x68
[ 175.443242] kasan_set_track+0x2c/0x40
[ 175.444299] kasan_save_alloc_info+0x24/0x38
[ 175.446383] __kasan_kmalloc+0xd4/0xd8
[ 175.447644] kmalloc_trace+0x68/0x130
[ 175.449107] kasan_strings+0xa0/0x478
[ 175.450248] kunit_try_run_case+0xf8/0x260
[ 175.451683] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.453436] kthread+0x18c/0x1a8
[ 175.454608] ret_from_fork+0x10/0x20
[ 175.456104]
[ 175.456776] Freed by task 205:
[ 175.458009] kasan_save_stack+0x3c/0x68
[ 175.459758] kasan_set_track+0x2c/0x40
[ 175.460760] kasan_save_free_info+0x38/0x60
[ 175.461541] __kasan_slab_free+0x100/0x170
[ 175.462954] __kmem_cache_free+0x170/0x2e0
[ 175.464900] kfree+0x74/0x138
[ 175.465988] kasan_strings+0xbc/0x478
[ 175.467341] kunit_try_run_case+0xf8/0x260
[ 175.468989] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.470689] kthread+0x18c/0x1a8
[ 175.472002] ret_from_fork+0x10/0x20
[ 175.473272]
[ 175.473853] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.473853] which belongs to the cache kmalloc-32 of size 32
[ 175.476940] The buggy address is located 16 bytes inside of
[ 175.476940] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.479885]
[ 175.480382] The buggy address belongs to the physical page:
[ 175.481584] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.483651] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.486137] page_type: 0xffffffff()
[ 175.487369] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.489479] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.490981] page dumped because: kasan: bad access detected
[ 175.492267]
[ 175.492715] Memory state around the buggy address:
[ 175.493649] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.495830] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.498140] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.500452] ^
[ 175.501857] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.503533] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.505254] ==================================================================
Home
[ 175.414653] ==================================================================
[ 175.415928] BUG: KASAN: slab-use-after-free in strnlen+0x3c/0x68
[ 175.417715] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.419611]
[ 175.420314] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.422044] Hardware name: linux,dummy-virt (DT)
[ 175.422979] Call trace:
[ 175.423867] dump_backtrace+0x9c/0x128
[ 175.425241] show_stack+0x20/0x38
[ 175.426286] dump_stack_lvl+0x60/0xb0
[ 175.427510] print_report+0xf8/0x5d8
[ 175.428854] kasan_report+0xc8/0x118
[ 175.430121] __asan_load1+0x60/0x70
[ 175.431501] strnlen+0x3c/0x68
[ 175.432861] kasan_strings+0x1a4/0x478
[ 175.434051] kunit_try_run_case+0xf8/0x260
[ 175.435877] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.437178] kthread+0x18c/0x1a8
[ 175.438745] ret_from_fork+0x10/0x20
[ 175.440134]
[ 175.440789] Allocated by task 205:
[ 175.441674] kasan_save_stack+0x3c/0x68
[ 175.443242] kasan_set_track+0x2c/0x40
[ 175.444299] kasan_save_alloc_info+0x24/0x38
[ 175.446383] __kasan_kmalloc+0xd4/0xd8
[ 175.447644] kmalloc_trace+0x68/0x130
[ 175.449107] kasan_strings+0xa0/0x478
[ 175.450248] kunit_try_run_case+0xf8/0x260
[ 175.451683] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.453436] kthread+0x18c/0x1a8
[ 175.454608] ret_from_fork+0x10/0x20
[ 175.456104]
[ 175.456776] Freed by task 205:
[ 175.458009] kasan_save_stack+0x3c/0x68
[ 175.459758] kasan_set_track+0x2c/0x40
[ 175.460760] kasan_save_free_info+0x38/0x60
[ 175.461541] __kasan_slab_free+0x100/0x170
[ 175.462954] __kmem_cache_free+0x170/0x2e0
[ 175.464900] kfree+0x74/0x138
[ 175.465988] kasan_strings+0xbc/0x478
[ 175.467341] kunit_try_run_case+0xf8/0x260
[ 175.468989] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.470689] kthread+0x18c/0x1a8
[ 175.472002] ret_from_fork+0x10/0x20
[ 175.473272]
[ 175.473853] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.473853] which belongs to the cache kmalloc-32 of size 32
[ 175.476940] The buggy address is located 16 bytes inside of
[ 175.476940] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.479885]
[ 175.480382] The buggy address belongs to the physical page:
[ 175.481584] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.483651] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.486137] page_type: 0xffffffff()
[ 175.487369] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.489479] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.490981] page dumped because: kasan: bad access detected
[ 175.492267]
[ 175.492715] Memory state around the buggy address:
[ 175.493649] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.495830] ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.498140] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.500452] ^
[ 175.501857] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.503533] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.505254] ==================================================================
Home
[ 175.056818] ==================================================================
[ 175.058421] BUG: KASAN: slab-use-after-free in strrchr+0x28/0x58
[ 175.060653] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.063024]
[ 175.063776] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.065645] Hardware name: linux,dummy-virt (DT)
[ 175.066812] Call trace:
[ 175.067444] dump_backtrace+0x9c/0x128
[ 175.068608] show_stack+0x20/0x38
[ 175.069604] dump_stack_lvl+0x60/0xb0
[ 175.070764] print_report+0xf8/0x5d8
[ 175.071865] kasan_report+0xc8/0x118
[ 175.072963] __asan_load1+0x60/0x70
[ 175.074056] strrchr+0x28/0x58
[ 175.075042] kasan_strings+0x104/0x478
[ 175.076150] kunit_try_run_case+0xf8/0x260
[ 175.077363] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.078808] kthread+0x18c/0x1a8
[ 175.079781] ret_from_fork+0x10/0x20
[ 175.080866]
[ 175.081473] Allocated by task 205:
[ 175.082393] kasan_save_stack+0x3c/0x68
[ 175.083543] kasan_set_track+0x2c/0x40
[ 175.084700] kasan_save_alloc_info+0x24/0x38
[ 175.085966] __kasan_kmalloc+0xd4/0xd8
[ 175.087078] kmalloc_trace+0x68/0x130
[ 175.088162] kasan_strings+0xa0/0x478
[ 175.089210] kunit_try_run_case+0xf8/0x260
[ 175.090382] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.091846] kthread+0x18c/0x1a8
[ 175.092811] ret_from_fork+0x10/0x20
[ 175.093846]
[ 175.094307] Freed by task 205:
[ 175.095230] kasan_save_stack+0x3c/0x68
[ 175.096392] kasan_set_track+0x2c/0x40
[ 175.097511] kasan_save_free_info+0x38/0x60
[ 175.098792] __kasan_slab_free+0x100/0x170
[ 175.100016] __kmem_cache_free+0x170/0x2e0
[ 175.101199] kfree+0x74/0x138
[ 175.102145] kasan_strings+0xbc/0x478
[ 175.103104] kunit_try_run_case+0xf8/0x260
[ 175.104377] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.105611] kthread+0x18c/0x1a8
[ 175.106496] ret_from_fork+0x10/0x20
[ 175.107551]
[ 175.108155] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.108155] which belongs to the cache kmalloc-32 of size 32
[ 175.110444] The buggy address is located 16 bytes inside of
[ 175.110444] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.112851]
[ 175.113326] The buggy address belongs to the physical page:
[ 175.114699] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.116620] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.118211] page_type: 0xffffffff()
[ 175.119207] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.120905] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.122492] page dumped because: kasan: bad access detected
[ 175.123762]
[ 175.124289] Memory state around the buggy address:
[ 175.125520] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.127102] ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 175.128688] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.130203] ^
[ 175.131554] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.133142] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.134651] ==================================================================
Home
[ 175.056818] ==================================================================
[ 175.058421] BUG: KASAN: slab-use-after-free in strrchr+0x28/0x58
[ 175.060653] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[ 175.063024]
[ 175.063776] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 175.065645] Hardware name: linux,dummy-virt (DT)
[ 175.066812] Call trace:
[ 175.067444] dump_backtrace+0x9c/0x128
[ 175.068608] show_stack+0x20/0x38
[ 175.069604] dump_stack_lvl+0x60/0xb0
[ 175.070764] print_report+0xf8/0x5d8
[ 175.071865] kasan_report+0xc8/0x118
[ 175.072963] __asan_load1+0x60/0x70
[ 175.074056] strrchr+0x28/0x58
[ 175.075042] kasan_strings+0x104/0x478
[ 175.076150] kunit_try_run_case+0xf8/0x260
[ 175.077363] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.078808] kthread+0x18c/0x1a8
[ 175.079781] ret_from_fork+0x10/0x20
[ 175.080866]
[ 175.081473] Allocated by task 205:
[ 175.082393] kasan_save_stack+0x3c/0x68
[ 175.083543] kasan_set_track+0x2c/0x40
[ 175.084700] kasan_save_alloc_info+0x24/0x38
[ 175.085966] __kasan_kmalloc+0xd4/0xd8
[ 175.087078] kmalloc_trace+0x68/0x130
[ 175.088162] kasan_strings+0xa0/0x478
[ 175.089210] kunit_try_run_case+0xf8/0x260
[ 175.090382] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.091846] kthread+0x18c/0x1a8
[ 175.092811] ret_from_fork+0x10/0x20
[ 175.093846]
[ 175.094307] Freed by task 205:
[ 175.095230] kasan_save_stack+0x3c/0x68
[ 175.096392] kasan_set_track+0x2c/0x40
[ 175.097511] kasan_save_free_info+0x38/0x60
[ 175.098792] __kasan_slab_free+0x100/0x170
[ 175.100016] __kmem_cache_free+0x170/0x2e0
[ 175.101199] kfree+0x74/0x138
[ 175.102145] kasan_strings+0xbc/0x478
[ 175.103104] kunit_try_run_case+0xf8/0x260
[ 175.104377] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 175.105611] kthread+0x18c/0x1a8
[ 175.106496] ret_from_fork+0x10/0x20
[ 175.107551]
[ 175.108155] The buggy address belongs to the object at ffff0000c5f79a40
[ 175.108155] which belongs to the cache kmalloc-32 of size 32
[ 175.110444] The buggy address is located 16 bytes inside of
[ 175.110444] freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[ 175.112851]
[ 175.113326] The buggy address belongs to the physical page:
[ 175.114699] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 175.116620] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 175.118211] page_type: 0xffffffff()
[ 175.119207] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 175.120905] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 175.122492] page dumped because: kasan: bad access detected
[ 175.123762]
[ 175.124289] Memory state around the buggy address:
[ 175.125520] ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.127102] ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 175.128688] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 175.130203] ^
[ 175.131554] ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.133142] ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 175.134651] ==================================================================
Home
[ 177.370684] ==================================================================
[ 177.373313] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x270
[ 177.374921] Read of size 8 at addr ffff0000c5f79c00 by task kunit_try_catch/215
[ 177.376807]
[ 177.377412] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 177.379321] Hardware name: linux,dummy-virt (DT)
[ 177.380443] Call trace:
[ 177.381279] dump_backtrace+0x9c/0x128
[ 177.382371] show_stack+0x20/0x38
[ 177.383650] dump_stack_lvl+0x60/0xb0
[ 177.384956] print_report+0xf8/0x5d8
[ 177.386052] kasan_report+0xc8/0x118
[ 177.387240] __asan_load8+0x9c/0xc0
[ 177.388143] workqueue_uaf+0x14c/0x270
[ 177.388828] kunit_try_run_case+0xf8/0x260
[ 177.390426] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.392216] kthread+0x18c/0x1a8
[ 177.393333] ret_from_fork+0x10/0x20
[ 177.394472]
[ 177.395463] Allocated by task 215:
[ 177.396334] kasan_save_stack+0x3c/0x68
[ 177.397676] kasan_set_track+0x2c/0x40
[ 177.398811] kasan_save_alloc_info+0x24/0x38
[ 177.400225] __kasan_kmalloc+0xd4/0xd8
[ 177.401083] kmalloc_trace+0x68/0x130
[ 177.401673] workqueue_uaf+0xd0/0x270
[ 177.402310] kunit_try_run_case+0xf8/0x260
[ 177.403194] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.405293] kthread+0x18c/0x1a8
[ 177.406413] ret_from_fork+0x10/0x20
[ 177.407598]
[ 177.408429] Freed by task 24:
[ 177.409331] kasan_save_stack+0x3c/0x68
[ 177.410548] kasan_set_track+0x2c/0x40
[ 177.411712] kasan_save_free_info+0x38/0x60
[ 177.413041] __kasan_slab_free+0x100/0x170
[ 177.414247] __kmem_cache_free+0x170/0x2e0
[ 177.416067] kfree+0x74/0x138
[ 177.416975] workqueue_uaf_work+0x18/0x30
[ 177.418118] process_one_work+0x2a8/0x6d0
[ 177.419301] worker_thread+0x53c/0x708
[ 177.420354] kthread+0x18c/0x1a8
[ 177.421244] ret_from_fork+0x10/0x20
[ 177.422382]
[ 177.422955] Last potentially related work creation:
[ 177.424107] kasan_save_stack+0x3c/0x68
[ 177.425328] __kasan_record_aux_stack+0xb8/0xe8
[ 177.426640] kasan_record_aux_stack_noalloc+0x14/0x20
[ 177.428201] __queue_work+0x260/0x800
[ 177.429460] queue_work_on+0xb4/0xf0
[ 177.430574] workqueue_uaf+0x12c/0x270
[ 177.431915] kunit_try_run_case+0xf8/0x260
[ 177.433103] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.434614] kthread+0x18c/0x1a8
[ 177.435608] ret_from_fork+0x10/0x20
[ 177.436831]
[ 177.437467] The buggy address belongs to the object at ffff0000c5f79c00
[ 177.437467] which belongs to the cache kmalloc-32 of size 32
[ 177.440361] The buggy address is located 0 bytes inside of
[ 177.440361] freed 32-byte region [ffff0000c5f79c00, ffff0000c5f79c20)
[ 177.442790]
[ 177.443346] The buggy address belongs to the physical page:
[ 177.444639] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[ 177.446658] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 177.448855] page_type: 0xffffffff()
[ 177.449752] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 177.451454] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 177.453158] page dumped because: kasan: bad access detected
[ 177.454502]
[ 177.455042] Memory state around the buggy address:
[ 177.456687] ffff0000c5f79b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 177.458442] ffff0000c5f79b80: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[ 177.460487] >ffff0000c5f79c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.462077] ^
[ 177.463123] ffff0000c5f79c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.464827] ffff0000c5f79d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 177.466416] ==================================================================
Home
[ 173.633556] ==================================================================
[ 173.636966] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xbc/0x180
[ 173.638445] Read of size 1 at addr ffff800080857cfa by task kunit_try_catch/185
[ 173.640320]
[ 173.640843] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 173.643211] Hardware name: linux,dummy-virt (DT)
[ 173.644332] Call trace:
[ 173.645284] dump_backtrace+0x9c/0x128
[ 173.646508] show_stack+0x20/0x38
[ 173.647656] dump_stack_lvl+0x60/0xb0
[ 173.649023] print_report+0x314/0x5d8
[ 173.650178] kasan_report+0xc8/0x118
[ 173.651636] __asan_load1+0x60/0x70
[ 173.652707] kasan_stack_oob+0xbc/0x180
[ 173.653790] kunit_try_run_case+0xf8/0x260
[ 173.654981] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 173.656261] kthread+0x18c/0x1a8
[ 173.657385] ret_from_fork+0x10/0x20
[ 173.658694]
[ 173.659395] The buggy address belongs to stack of task kunit_try_catch/185
[ 173.661611] and is located at offset 138 in frame:
[ 173.662859] kasan_stack_oob+0x0/0x180
[ 173.664414]
[ 173.665010] This frame has 4 objects:
[ 173.666110] [48, 49) '__assertion'
[ 173.666320] [64, 72) 'array'
[ 173.667295] [96, 112) '__assertion'
[ 173.668418] [128, 138) 'stack_array'
[ 173.669386]
[ 173.670600] The buggy address belongs to the virtual mapping at
[ 173.670600] [ffff800080850000, ffff800080859000) created by:
[ 173.670600] kernel_clone+0xf8/0x540
[ 173.673912]
[ 173.674522] The buggy address belongs to the physical page:
[ 173.676017] page:00000000f50dcbb3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f3b
[ 173.678433] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 173.679811] page_type: 0xffffffff()
[ 173.681557] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 173.683356] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 173.684933] page dumped because: kasan: bad access detected
[ 173.686163]
[ 173.686696] Memory state around the buggy address:
[ 173.688077] ffff800080857b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 173.689881] ffff800080857c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
[ 173.691869] >ffff800080857c80: f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02
[ 173.693462] ^
[ 173.695145] ffff800080857d00: f3 f3 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 173.696883] ffff800080857d80: 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00
[ 173.698365] ==================================================================
Home
[ 170.017584] ==================================================================
[ 170.020235] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xac/0x1b0
[ 170.021466] Read of size 1 at addr ffff0000c5f18000 by task kunit_try_catch/125
[ 170.024257]
[ 170.024959] CPU: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.026823] Hardware name: linux,dummy-virt (DT)
[ 170.028031] Call trace:
[ 170.029232] dump_backtrace+0x9c/0x128
[ 170.030244] show_stack+0x20/0x38
[ 170.031312] dump_stack_lvl+0x60/0xb0
[ 170.032564] print_report+0xf8/0x5d8
[ 170.033687] kasan_report+0xc8/0x118
[ 170.034847] __asan_load1+0x60/0x70
[ 170.035996] kmalloc_pagealloc_uaf+0xac/0x1b0
[ 170.037283] kunit_try_run_case+0xf8/0x260
[ 170.038331] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.040474] kthread+0x18c/0x1a8
[ 170.041448] ret_from_fork+0x10/0x20
[ 170.042569]
[ 170.043244] The buggy address belongs to the physical page:
[ 170.044997] page:00000000353e52a8 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[ 170.047338] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 170.048919] page_type: 0xffffffff()
[ 170.049901] raw: 0bfffc0000000000 fffffc000317c708 ffff0000daa124f8 0000000000000000
[ 170.051757] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 170.053799] page dumped because: kasan: bad access detected
[ 170.055033]
[ 170.055635] Memory state around the buggy address:
[ 170.056854] ffff0000c5f17f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.058433] ffff0000c5f17f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 170.060448] >ffff0000c5f18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.062633] ^
[ 170.063557] ffff0000c5f18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.065227] ffff0000c5f18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.066832] ==================================================================
Home
[ 170.185985] ==================================================================
[ 170.188935] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x1e8
[ 170.190450] Read of size 1 at addr ffff0000c6020000 by task kunit_try_catch/131
[ 170.192507]
[ 170.193108] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 170.194975] Hardware name: linux,dummy-virt (DT)
[ 170.196261] Call trace:
[ 170.197068] dump_backtrace+0x9c/0x128
[ 170.198355] show_stack+0x20/0x38
[ 170.199559] dump_stack_lvl+0x60/0xb0
[ 170.200562] print_report+0xf8/0x5d8
[ 170.201635] kasan_report+0xc8/0x118
[ 170.202827] __asan_load1+0x60/0x70
[ 170.204151] pagealloc_uaf+0xd4/0x1e8
[ 170.205224] kunit_try_run_case+0xf8/0x260
[ 170.206446] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 170.208261] kthread+0x18c/0x1a8
[ 170.210009] ret_from_fork+0x10/0x20
[ 170.211397]
[ 170.211935] The buggy address belongs to the physical page:
[ 170.213426] page:00000000411e1e3e refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020
[ 170.215424] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 170.216939] page_type: 0xffffff7f(buddy)
[ 170.218127] raw: 0bfffc0000000000 ffff0000ff5fc9c8 ffff0000ff5fc9c8 0000000000000000
[ 170.220186] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[ 170.221874] page dumped because: kasan: bad access detected
[ 170.222851]
[ 170.223511] Memory state around the buggy address:
[ 170.224999] ffff0000c601ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.226741] ffff0000c601ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.228848] >ffff0000c6020000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.230567] ^
[ 170.232002] ffff0000c6020080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.233660] ffff0000c6020100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 170.235341] ==================================================================
Home
[ 177.567811] ==================================================================
[ 177.569351] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xec/0x320
[ 177.570775] Read of size 1 at addr ffff8000800fd7f8 by task kunit_try_catch/220
[ 177.573678]
[ 177.574597] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 177.577060] Hardware name: linux,dummy-virt (DT)
[ 177.578296] Call trace:
[ 177.579083] dump_backtrace+0x9c/0x128
[ 177.580210] show_stack+0x20/0x38
[ 177.581277] dump_stack_lvl+0x60/0xb0
[ 177.582477] print_report+0x314/0x5d8
[ 177.583681] kasan_report+0xc8/0x118
[ 177.584672] __asan_load1+0x60/0x70
[ 177.585715] vmalloc_oob+0xec/0x320
[ 177.587021] kunit_try_run_case+0xf8/0x260
[ 177.588324] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.589945] kthread+0x18c/0x1a8
[ 177.590884] ret_from_fork+0x10/0x20
[ 177.592225]
[ 177.592997] The buggy address belongs to the virtual mapping at
[ 177.592997] [ffff8000800fd000, ffff8000800ff000) created by:
[ 177.592997] vmalloc_oob+0x88/0x320
[ 177.596591]
[ 177.597228] The buggy address belongs to the physical page:
[ 177.598571] page:0000000087189a66 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ec
[ 177.600607] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 177.602049] page_type: 0xffffffff()
[ 177.603771] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 177.606214] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 177.608279] page dumped because: kasan: bad access detected
[ 177.609816]
[ 177.610619] Memory state around the buggy address:
[ 177.612055] ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 177.613858] ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 177.615527] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 177.617265] ^
[ 177.619593] ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 177.621295] ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 177.622869] ==================================================================
Home
[ 177.506777] ==================================================================
[ 177.510352] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x320
[ 177.512119] Read of size 1 at addr ffff8000800fd7f3 by task kunit_try_catch/220
[ 177.513835]
[ 177.514357] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 177.516360] Hardware name: linux,dummy-virt (DT)
[ 177.517475] Call trace:
[ 177.518223] dump_backtrace+0x9c/0x128
[ 177.519363] show_stack+0x20/0x38
[ 177.520380] dump_stack_lvl+0x60/0xb0
[ 177.521607] print_report+0x314/0x5d8
[ 177.522746] kasan_report+0xc8/0x118
[ 177.524065] __asan_load1+0x60/0x70
[ 177.525184] vmalloc_oob+0xc8/0x320
[ 177.526204] kunit_try_run_case+0xf8/0x260
[ 177.527574] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 177.530506] kthread+0x18c/0x1a8
[ 177.531621] ret_from_fork+0x10/0x20
[ 177.533000]
[ 177.533787] The buggy address belongs to the virtual mapping at
[ 177.533787] [ffff8000800fd000, ffff8000800ff000) created by:
[ 177.533787] vmalloc_oob+0x88/0x320
[ 177.537402]
[ 177.538070] The buggy address belongs to the physical page:
[ 177.539395] page:0000000087189a66 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ec
[ 177.540585] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 177.541949] page_type: 0xffffffff()
[ 177.543181] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 177.545056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 177.546684] page dumped because: kasan: bad access detected
[ 177.548066]
[ 177.549226] Memory state around the buggy address:
[ 177.550163] ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 177.553244] ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 177.555293] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 177.557469] ^
[ 177.559154] ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 177.560991] ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 177.562622] ==================================================================
Home
------------[ cut here ]------------
[ 315.033701] WARNING: CPU: 1 PID: 1424 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[ 315.035479] Modules linked in:
[ 315.035701] CPU: 1 PID: 1424 Comm: kunit_try_catch Tainted: G B W N 6.6.72-rc1 #1
[ 315.037406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 315.038487] EIP: drm_rect_calc_hscale+0x54/0x68
[ 315.039324] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[ 315.040930] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[ 315.041621] ESI: c1179d38 EDI: 7fffffff EBP: c2f81ebc ESP: c2f81eb8
[ 315.042434] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 315.043179] CR0: 80050033 CR2: f59e8000 CR3: 1c034000 CR4: 000006d0
[ 315.043541] DR0: dc093804 DR1: dc093809 DR2: dc09380a DR3: dc09380b
[ 315.044595] DR6: ffff0ff0 DR7: 00000600
[ 315.044843] Call Trace:
[ 315.045164] ? show_regs+0x52/0x5c
[ 315.046083] ? drm_rect_calc_hscale+0x54/0x68
[ 315.046467] ? __warn+0x89/0x15c
[ 315.047214] ? drm_rect_calc_hscale+0x54/0x68
[ 315.047578] ? drm_rect_calc_hscale+0x54/0x68
[ 315.047799] ? report_bug+0x189/0x1b0
[ 315.048537] ? drm_rect_calc_hscale+0x55/0x68
[ 315.049200] ? exc_overflow+0x50/0x50
[ 315.049755] ? handle_bug+0x56/0x90
[ 315.050204] ? exc_invalid_op+0x1b/0x70
[ 315.050496] ? dequeue_entity+0x172/0x570
[ 315.051431] ? sched_clock_cpu+0x75/0x3b4
[ 315.051682] ? handle_exception+0x133/0x133
[ 315.052354] ? exc_overflow+0x50/0x50
[ 315.052576] ? drm_rect_calc_hscale+0x54/0x68
[ 315.053305] ? exc_overflow+0x50/0x50
[ 315.053964] ? drm_rect_calc_hscale+0x54/0x68
[ 315.054570] drm_test_rect_calc_hscale+0x38/0xa8
[ 315.055218] ? ktime_get_ts64+0x4f/0x178
[ 315.055502] kunit_try_run_case+0x8a/0x1c4
[ 315.056049] ? ttwu_queue_wakelist+0xe3/0xe8
[ 315.056846] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 315.057583] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 315.057798] ? preempt_count_sub+0x54/0x78
[ 315.057798] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 315.059278] kthread+0xe0/0x108
[ 315.059949] ? kunit_try_catch_throw+0x1c/0x1c
[ 315.060440] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.061097] ret_from_fork+0x40/0x4c
[ 315.061553] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.062117] ret_from_fork_asm+0x12/0x18
[ 315.062593] entry_INT80_32+0xf0/0xf0
[ 315.063000] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 314.998590] WARNING: CPU: 0 PID: 1422 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[ 314.999941] Modules linked in:
[ 315.000668] CPU: 0 PID: 1422 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 315.002658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 315.003934] EIP: drm_rect_calc_hscale+0x54/0x68
[ 315.004548] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[ 315.007285] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[ 315.007839] ESI: c1179d38 EDI: 7fffffff EBP: c2f8bebc ESP: c2f8beb8
[ 315.008051] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 315.008051] CR0: 80050033 CR2: f59eafe0 CR3: 1c034000 CR4: 000006d0
[ 315.009670] DR0: dc093800 DR1: dc093801 DR2: dc093803 DR3: dc093805
[ 315.010245] DR6: ffff0ff0 DR7: 00000600
[ 315.010963] Call Trace:
[ 315.012294] ? show_regs+0x52/0x5c
[ 315.012674] ? drm_rect_calc_hscale+0x54/0x68
[ 315.013503] ? __warn+0x89/0x15c
[ 315.014014] ? drm_rect_calc_hscale+0x54/0x68
[ 315.014543] ? drm_rect_calc_hscale+0x54/0x68
[ 315.015027] ? report_bug+0x189/0x1b0
[ 315.015498] ? drm_rect_calc_hscale+0x55/0x68
[ 315.015905] ? exc_overflow+0x50/0x50
[ 315.016303] ? handle_bug+0x56/0x90
[ 315.016599] ? exc_invalid_op+0x1b/0x70
[ 315.017095] ? dequeue_entity+0x172/0x570
[ 315.017395] ? clockevents_program_event+0xd8/0x160
[ 315.018037] ? handle_exception+0x133/0x133
[ 315.018598] ? exc_overflow+0x50/0x50
[ 315.019170] ? drm_rect_calc_hscale+0x54/0x68
[ 315.020027] ? exc_overflow+0x50/0x50
[ 315.020320] ? drm_rect_calc_hscale+0x54/0x68
[ 315.020951] drm_test_rect_calc_hscale+0x38/0xa8
[ 315.021369] ? ktime_get_ts64+0x4f/0x178
[ 315.022002] kunit_try_run_case+0x8a/0x1c4
[ 315.022515] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 315.022938] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 315.023511] ? preempt_count_sub+0x54/0x78
[ 315.024073] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 315.024658] kthread+0xe0/0x108
[ 315.025137] ? kunit_try_catch_throw+0x1c/0x1c
[ 315.025559] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.026154] ret_from_fork+0x40/0x4c
[ 315.026469] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.027223] ret_from_fork_asm+0x12/0x18
[ 315.027899] entry_INT80_32+0xf0/0xf0
[ 315.028509] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 315.079022] WARNING: CPU: 1 PID: 1434 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[ 315.080084] Modules linked in:
[ 315.080364] CPU: 1 PID: 1434 Comm: kunit_try_catch Tainted: G B W N 6.6.72-rc1 #1
[ 315.080936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 315.081884] EIP: drm_rect_calc_vscale+0x50/0x70
[ 315.082610] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[ 315.084469] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[ 315.085252] ESI: c1179d38 EDI: 7fffffff EBP: c2f6debc ESP: c2f6deb8
[ 315.086197] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 315.087164] CR0: 80050033 CR2: f59e8000 CR3: 1c034000 CR4: 000006d0
[ 315.087603] DR0: dc093804 DR1: dc093809 DR2: dc09380a DR3: dc09380b
[ 315.088408] DR6: ffff0ff0 DR7: 00000600
[ 315.088980] Call Trace:
[ 315.089293] ? show_regs+0x52/0x5c
[ 315.089619] ? drm_rect_calc_vscale+0x50/0x70
[ 315.090210] ? __warn+0x89/0x15c
[ 315.090629] ? drm_rect_calc_vscale+0x50/0x70
[ 315.091318] ? drm_rect_calc_vscale+0x50/0x70
[ 315.092025] ? report_bug+0x189/0x1b0
[ 315.092295] ? drm_rect_calc_vscale+0x51/0x70
[ 315.093148] ? exc_overflow+0x50/0x50
[ 315.093473] ? handle_bug+0x56/0x90
[ 315.094093] ? exc_invalid_op+0x1b/0x70
[ 315.094361] ? dequeue_entity+0x172/0x570
[ 315.095233] ? sched_clock_cpu+0x75/0x3b4
[ 315.095565] ? handle_exception+0x133/0x133
[ 315.095952] ? exc_overflow+0x50/0x50
[ 315.096619] ? drm_rect_calc_vscale+0x50/0x70
[ 315.097310] ? exc_overflow+0x50/0x50
[ 315.097716] ? drm_rect_calc_vscale+0x50/0x70
[ 315.098363] drm_test_rect_calc_vscale+0x38/0xac
[ 315.098677] ? ktime_get_ts64+0x4f/0x178
[ 315.099255] kunit_try_run_case+0x8a/0x1c4
[ 315.099546] ? ttwu_queue_wakelist+0xe3/0xe8
[ 315.099958] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 315.100187] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 315.101069] ? preempt_count_sub+0x54/0x78
[ 315.101530] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 315.102344] kthread+0xe0/0x108
[ 315.102572] ? kunit_try_catch_throw+0x1c/0x1c
[ 315.103322] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.104190] ret_from_fork+0x40/0x4c
[ 315.104493] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.105339] ret_from_fork_asm+0x12/0x18
[ 315.106112] entry_INT80_32+0xf0/0xf0
[ 315.106528] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 315.110797] WARNING: CPU: 0 PID: 1436 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[ 315.112529] Modules linked in:
[ 315.113113] CPU: 0 PID: 1436 Comm: kunit_try_catch Tainted: G B W N 6.6.72-rc1 #1
[ 315.114067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 315.115458] EIP: drm_rect_calc_vscale+0x50/0x70
[ 315.116293] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[ 315.118302] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[ 315.118622] ESI: c1179d38 EDI: 7fffffff EBP: c2f89ebc ESP: c2f89eb8
[ 315.119155] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 315.119767] CR0: 80050033 CR2: f59eafe0 CR3: 1c034000 CR4: 000006d0
[ 315.120217] DR0: dc093800 DR1: dc093801 DR2: dc093803 DR3: dc093805
[ 315.120727] DR6: ffff0ff0 DR7: 00000600
[ 315.120727] Call Trace:
[ 315.120727] ? show_regs+0x52/0x5c
[ 315.121861] ? drm_rect_calc_vscale+0x50/0x70
[ 315.122066] ? __warn+0x89/0x15c
[ 315.122249] ? drm_rect_calc_vscale+0x50/0x70
[ 315.122488] ? drm_rect_calc_vscale+0x50/0x70
[ 315.122711] ? report_bug+0x189/0x1b0
[ 315.123188] ? drm_rect_calc_vscale+0x51/0x70
[ 315.123487] ? exc_overflow+0x50/0x50
[ 315.124267] ? handle_bug+0x56/0x90
[ 315.125112] ? exc_invalid_op+0x1b/0x70
[ 315.125694] ? dequeue_entity+0x172/0x570
[ 315.126457] ? sched_clock_cpu+0x75/0x3b4
[ 315.127081] ? handle_exception+0x133/0x133
[ 315.127081] ? exc_overflow+0x50/0x50
[ 315.129096] ? drm_rect_calc_vscale+0x50/0x70
[ 315.129541] ? exc_overflow+0x50/0x50
[ 315.130100] ? drm_rect_calc_vscale+0x50/0x70
[ 315.130469] drm_test_rect_calc_vscale+0x38/0xac
[ 315.131184] ? ktime_get_ts64+0x4f/0x178
[ 315.131651] kunit_try_run_case+0x8a/0x1c4
[ 315.132339] ? ttwu_queue_wakelist+0xe3/0xe8
[ 315.133144] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 315.133618] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 315.134090] ? preempt_count_sub+0x54/0x78
[ 315.134820] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 315.135524] kthread+0xe0/0x108
[ 315.135748] ? kunit_try_catch_throw+0x1c/0x1c
[ 315.135748] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.135748] ret_from_fork+0x40/0x4c
[ 315.135748] ? kthread_complete_and_exit+0x1c/0x1c
[ 315.135748] ret_from_fork_asm+0x12/0x18
[ 315.138709] entry_INT80_32+0xf0/0xf0
[ 315.139561] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 6.850219] WARNING: CPU: 0 PID: 0 at kernel/smp.c:786 smp_call_function_many_cond+0x4b0/0x5dc
[ 6.858917] Modules linked in:
[ 6.861999] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[ 6.868316] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 6.874420] unwind_backtrace from show_stack+0x18/0x1c
[ 6.879699] show_stack from dump_stack_lvl+0x58/0x70
[ 6.884796] dump_stack_lvl from __warn+0x80/0x12c
[ 6.889617] __warn from warn_slowpath_fmt+0x18c/0x194
[ 6.894805] warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[ 6.901824] smp_call_function_many_cond from smp_call_function+0x34/0x3c
[ 6.908660] smp_call_function from set_memory_valid+0x84/0xc0
[ 6.914520] set_memory_valid from kfence_guarded_free+0x16c/0x2e0
[ 6.920745] kfence_guarded_free from kmem_cache_free+0x24c/0x444
[ 6.926879] kmem_cache_free from rcu_core+0x2cc/0x998
[ 6.932067] rcu_core from handle_softirqs+0x15c/0x3dc
[ 6.937255] handle_softirqs from irq_exit+0xac/0xd4
[ 6.942260] irq_exit from __irq_svc+0x78/0x9c
[ 6.946716] Exception stack(0xc2201f18 to 0xc2201f60)
[ 6.951812] 1f00: 00004b2c 00000001
[ 6.960021] 1f20: 2da61000 00000000 c2210040 c248d6bc c2209f60 c2209fbc 00000000 00000000
[ 6.968231] 1f40: 00000000 c20dea70 c248cf48 c2201f68 c14bd070 c14bd074 600b0013 ffffffff
[ 6.976470] __irq_svc from default_idle_call+0x20/0xc0
[ 6.981719] default_idle_call from do_idle+0x234/0x2c4
[ 6.986968] do_idle from cpu_startup_entry+0x30/0x34
[ 6.992065] cpu_startup_entry from rest_init+0xb4/0xb8
[ 6.997314] rest_init from arch_post_acpi_subsys_init+0x0/0x18
[ 7.003295] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 596.692317] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec pm8916_wdt venus_dec venus_enc videobuf2_dma_contig crct10dif_ce qcom_wcnss_pil adv7511 cec coresight_cpu_debug coresight_stm coresight_cti stm_core snd_soc_apq8016_sbc snd_soc_qcom_common snd_soc_msm8916_digital qrtr snd_soc_lpass_apq8016 snd_soc_lpass_cpu snd_soc_lpass_platform qcom_spmi_temp_alarm qcom_q6v5_mss qcom_pon qcom_pil_info rtc_pm8xxx qcom_q6v5 qcom_sysmon qcom_common qcom_spmi_vadc qcom_glink_smem qmi_helpers qcom_vadc_common snd_soc_msm8916_analog qnoc_msm8916 msm qcom_stats venus_core llcc_qcom qcom_camss ocmem gpu_sched v4l2_mem2mem videobuf2_dma_sg drm_dp_aux_bus mdt_loader videobuf2_v4l2 drm_display_helper videobuf2_memops videobuf2_common icc_smd_rpm qcom_rng rpmsg_ctrl rpmsg_char display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[ 596.784269] CPU: 3 PID: 5673 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 596.789417] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 596.794872] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 596.801906] pc : cleanup_mnt+0xe4/0x158
[ 596.808460] lr : cleanup_mnt+0x54/0x158
[ 596.813492] sp : ffff80008c5bbcb0
[ 596.818388] x29: ffff80008c5bbcb0 x28: 00000000000000c0 x27: 0000000000000004
[ 596.823298] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 596.829268] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[ 596.836278] x20: ffff8000824feac0 x19: ffff000003ca23c0 x18: 00000017552e4c99
[ 596.843278] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 596.850366] x14: 0000000000000000 x13: ffff80008c5b8000 x12: ffff80008c5bc000
[ 596.857462] x11: f80895e646098600 x10: 000000000000000f x9 : ffff7fffbd5fa000
[ 596.864609] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 596.871759] x5 : 0000000080400019 x4 : ffff00003fab2e50 x3 : ffff80008c5bbc20
[ 596.878884] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[ 596.885969] Call trace:
[ 596.892967] cleanup_mnt+0xe4/0x158
[ 596.897428] __cleanup_mnt+0x20/0x38
[ 596.901919] task_work_run+0xb8/0xe0
[ 596.906379] do_notify_resume+0xa58/0xe98
[ 596.910868] el0_svc_compat+0x64/0x68
[ 596.915371] el0t_32_sync_handler+0x84/0xb8
[ 596.919907] el0t_32_sync+0x194/0x198
[ 596.924354] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 596.692317] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec pm8916_wdt venus_dec venus_enc videobuf2_dma_contig crct10dif_ce qcom_wcnss_pil adv7511 cec coresight_cpu_debug coresight_stm coresight_cti stm_core snd_soc_apq8016_sbc snd_soc_qcom_common snd_soc_msm8916_digital qrtr snd_soc_lpass_apq8016 snd_soc_lpass_cpu snd_soc_lpass_platform qcom_spmi_temp_alarm qcom_q6v5_mss qcom_pon qcom_pil_info rtc_pm8xxx qcom_q6v5 qcom_sysmon qcom_common qcom_spmi_vadc qcom_glink_smem qmi_helpers qcom_vadc_common snd_soc_msm8916_analog qnoc_msm8916 msm qcom_stats venus_core llcc_qcom qcom_camss ocmem gpu_sched v4l2_mem2mem videobuf2_dma_sg drm_dp_aux_bus mdt_loader videobuf2_v4l2 drm_display_helper videobuf2_memops videobuf2_common icc_smd_rpm qcom_rng rpmsg_ctrl rpmsg_char display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[ 596.784269] CPU: 3 PID: 5673 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 596.789417] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 596.794872] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 596.801906] pc : cleanup_mnt+0xe4/0x158
[ 596.808460] lr : cleanup_mnt+0x54/0x158
[ 596.813492] sp : ffff80008c5bbcb0
[ 596.818388] x29: ffff80008c5bbcb0 x28: 00000000000000c0 x27: 0000000000000004
[ 596.823298] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 596.829268] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[ 596.836278] x20: ffff8000824feac0 x19: ffff000003ca23c0 x18: 00000017552e4c99
[ 596.843278] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 596.850366] x14: 0000000000000000 x13: ffff80008c5b8000 x12: ffff80008c5bc000
[ 596.857462] x11: f80895e646098600 x10: 000000000000000f x9 : ffff7fffbd5fa000
[ 596.864609] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 596.871759] x5 : 0000000080400019 x4 : ffff00003fab2e50 x3 : ffff80008c5bbc20
[ 596.878884] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[ 596.885969] Call trace:
[ 596.892967] cleanup_mnt+0xe4/0x158
[ 596.897428] __cleanup_mnt+0x20/0x38
[ 596.901919] task_work_run+0xb8/0xe0
[ 596.906379] do_notify_resume+0xa58/0xe98
[ 596.910868] el0_svc_compat+0x64/0x68
[ 596.915371] el0t_32_sync_handler+0x84/0xb8
[ 596.919907] el0t_32_sync+0x194/0x198
[ 596.924354] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 630.287766] WARNING: CPU: 3 PID: 35730 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 630.330178] CPU: 3 PID: 35730 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 630.336972] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 630.343809] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 630.350686] pc : cleanup_mnt+0xe4/0x158
[ 630.357575] lr : cleanup_mnt+0x54/0x158
[ 630.364365] sp : ffff80008c70bcb0
[ 630.371031] x29: ffff80008c70bcb0 x28: 00000000000000c0 x27: 0000000000000004
[ 630.377840] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 630.384664] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[ 630.391535] x20: ffff8000824feac0 x19: ffff0000044f1540 x18: 0000001a5bf3b390
[ 630.398453] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 630.405362] x14: 0000000000000000 x13: ffff80008c708000 x12: ffff80008c70c000
[ 630.412450] x11: 949ed383c6f76100 x10: 000000000000000f x9 : ffff7fffbd5fa000
[ 630.419634] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 630.426730] x5 : 0000000080400034 x4 : ffff00002356e3c0 x3 : ffff80008c70bc20
[ 630.433753] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[ 630.440833] Call trace:
[ 630.447854] cleanup_mnt+0xe4/0x158
[ 630.454562] __cleanup_mnt+0x20/0x38
[ 630.461302] task_work_run+0xb8/0xe0
[ 630.468051] do_notify_resume+0xa58/0xe98
[ 630.474840] el0_svc+0x68/0x70
[ 630.481649] el0t_64_sync_handler+0x90/0x100
[ 630.488425] el0t_64_sync+0x190/0x198
[ 630.495198] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 630.287766] WARNING: CPU: 3 PID: 35730 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 630.330178] CPU: 3 PID: 35730 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 630.336972] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 630.343809] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 630.350686] pc : cleanup_mnt+0xe4/0x158
[ 630.357575] lr : cleanup_mnt+0x54/0x158
[ 630.364365] sp : ffff80008c70bcb0
[ 630.371031] x29: ffff80008c70bcb0 x28: 00000000000000c0 x27: 0000000000000004
[ 630.377840] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 630.384664] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[ 630.391535] x20: ffff8000824feac0 x19: ffff0000044f1540 x18: 0000001a5bf3b390
[ 630.398453] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 630.405362] x14: 0000000000000000 x13: ffff80008c708000 x12: ffff80008c70c000
[ 630.412450] x11: 949ed383c6f76100 x10: 000000000000000f x9 : ffff7fffbd5fa000
[ 630.419634] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 630.426730] x5 : 0000000080400034 x4 : ffff00002356e3c0 x3 : ffff80008c70bc20
[ 630.433753] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[ 630.440833] Call trace:
[ 630.447854] cleanup_mnt+0xe4/0x158
[ 630.454562] __cleanup_mnt+0x20/0x38
[ 630.461302] task_work_run+0xb8/0xe0
[ 630.468051] do_notify_resume+0xa58/0xe98
[ 630.474840] el0_svc+0x68/0x70
[ 630.481649] el0t_64_sync_handler+0x90/0x100
[ 630.488425] el0t_64_sync+0x190/0x198
[ 630.495198] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 617.602473] WARNING: CPU: 2 PID: 35735 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 617.669914] CPU: 2 PID: 35735 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 617.682958] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 617.696083] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 617.709312] pc : cleanup_mnt+0x11c/0x140
[ 617.722545] lr : cleanup_mnt+0x20/0x140
[ 617.735636] sp : ffff80008c8c3ca0
[ 617.748513] x29: ffff80008c8c3ca0 x28: 0000000000000004 x27: 0000000000000000
[ 617.761635] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 617.774792] x23: ffff000003c398e4 x22: ffff800082b4fb50 x21: ffff000003c39080
[ 617.788067] x20: ffff00000515c500 x19: 0000000000000000 x18: 0000000000000000
[ 617.801443] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000
[ 617.814704] x14: 0000000000000000 x13: 0000000000000000 x12: ffff800082495e28
[ 617.827894] x11: ffff800082485008 x10: 0000000000000002 x9 : ffff80008047a778
[ 617.841160] x8 : ffff80008c8c3b38 x7 : 0000000000000000 x6 : 0000000000000000
[ 617.854382] x5 : 0000000000000000 x4 : 0000000000000003 x3 : fffffbffeffe839c
[ 617.867401] x2 : 0000000000000005 x1 : 0000000000000004 x0 : 00000000ffffffff
[ 617.880305] Call trace:
[ 617.893004] cleanup_mnt+0x11c/0x140
[ 617.905821] __cleanup_mnt+0x1c/0x30
[ 617.918680] task_work_run+0x88/0xf8
[ 617.931568] do_notify_resume+0x214/0x1158
[ 617.944539] el0_svc+0xc8/0xe0
[ 617.957544] el0t_64_sync_handler+0x120/0x130
[ 617.970502] el0t_64_sync+0x190/0x198
[ 617.983478] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 617.602473] WARNING: CPU: 2 PID: 35735 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 617.669914] CPU: 2 PID: 35735 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 617.682958] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 617.696083] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 617.709312] pc : cleanup_mnt+0x11c/0x140
[ 617.722545] lr : cleanup_mnt+0x20/0x140
[ 617.735636] sp : ffff80008c8c3ca0
[ 617.748513] x29: ffff80008c8c3ca0 x28: 0000000000000004 x27: 0000000000000000
[ 617.761635] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 617.774792] x23: ffff000003c398e4 x22: ffff800082b4fb50 x21: ffff000003c39080
[ 617.788067] x20: ffff00000515c500 x19: 0000000000000000 x18: 0000000000000000
[ 617.801443] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000
[ 617.814704] x14: 0000000000000000 x13: 0000000000000000 x12: ffff800082495e28
[ 617.827894] x11: ffff800082485008 x10: 0000000000000002 x9 : ffff80008047a778
[ 617.841160] x8 : ffff80008c8c3b38 x7 : 0000000000000000 x6 : 0000000000000000
[ 617.854382] x5 : 0000000000000000 x4 : 0000000000000003 x3 : fffffbffeffe839c
[ 617.867401] x2 : 0000000000000005 x1 : 0000000000000004 x0 : 00000000ffffffff
[ 617.880305] Call trace:
[ 617.893004] cleanup_mnt+0x11c/0x140
[ 617.905821] __cleanup_mnt+0x1c/0x30
[ 617.918680] task_work_run+0x88/0xf8
[ 617.931568] do_notify_resume+0x214/0x1158
[ 617.944539] el0_svc+0xc8/0xe0
[ 617.957544] el0t_64_sync_handler+0x120/0x130
[ 617.970502] el0t_64_sync+0x190/0x198
[ 617.983478] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 60.928993] Modules linked in: snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug qcom_camss stm_core coresight_tmc adv7511 coresight_replicator venus_core coresight_cti coresight_funnel coresight_tpiu coresight videobuf2_dma_sg qrtr snd_soc_lpass_apq8016 cec snd_soc_lpass_cpu snd_soc_msm8916_digital v4l2_fwnode msm qcom_q6v5_mss v4l2_mem2mem snd_soc_lpass_platform snd_soc_apq8016_sbc v4l2_async snd_soc_qcom_common snd_soc_msm8916_analog qcom_spmi_temp_alarm videobuf2_memops rtc_pm8xxx qcom_pil_info qcom_pon videobuf2_v4l2 qcom_spmi_vadc qcom_q6v5 qcom_sysmon llcc_qcom qcom_vadc_common qcom_common ocmem videodev gpu_sched qcom_glink_smem mdt_loader drm_dp_aux_bus qmi_helpers videobuf2_common drm_display_helper qnoc_msm8916 mc qcom_rng qcom_stats display_connector phy_qcom_usb_hs drm_kms_helper icc_smd_rpm rpmsg_ctrl rpmsg_char socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[ 61.035060] CPU: 3 PID: 1453 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 61.378004] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 61.539894] lr : kvmalloc_node+0x64/0x10c
[ 61.744908] x29: ffff800085e9bcf0 x28: ffff00000c78f000 x27: 0000000000000000
[ 61.776707] x23: ffff0000035702c0 x22: ffff80008036eca4 x21: 00000000ffffffff
[ 62.115435] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 62.284292] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 62.485725] x5 : 0000000000000000 x4 : ffff00000c78f000 x3 : 0000000000000000
[ 62.525072] Call trace:
[ 62.847534] kvmalloc_node+0xfc/0x10c
[ 63.006113] expand_files+0x78/0x318
[ 63.214523] __arm64_sys_dup3+0x20/0x30
[ 63.248230] el0_svc_common.constprop.0+0x40/0xe0
[ 63.252830] do_el0_svc+0x1c/0x28
[ 63.257356] el0_svc+0x38/0xc8
[ 63.261816] el0t_64_sync_handler+0x120/0x12c
[ 63.266264] el0t_64_sync+0x190/0x194
[ 63.270632] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 60.928993] Modules linked in: snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug qcom_camss stm_core coresight_tmc adv7511 coresight_replicator venus_core coresight_cti coresight_funnel coresight_tpiu coresight videobuf2_dma_sg qrtr snd_soc_lpass_apq8016 cec snd_soc_lpass_cpu snd_soc_msm8916_digital v4l2_fwnode msm qcom_q6v5_mss v4l2_mem2mem snd_soc_lpass_platform snd_soc_apq8016_sbc v4l2_async snd_soc_qcom_common snd_soc_msm8916_analog qcom_spmi_temp_alarm videobuf2_memops rtc_pm8xxx qcom_pil_info qcom_pon videobuf2_v4l2 qcom_spmi_vadc qcom_q6v5 qcom_sysmon llcc_qcom qcom_vadc_common qcom_common ocmem videodev gpu_sched qcom_glink_smem mdt_loader drm_dp_aux_bus qmi_helpers videobuf2_common drm_display_helper qnoc_msm8916 mc qcom_rng qcom_stats display_connector phy_qcom_usb_hs drm_kms_helper icc_smd_rpm rpmsg_ctrl rpmsg_char socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[ 61.035060] CPU: 3 PID: 1453 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 61.378004] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 61.539894] lr : kvmalloc_node+0x64/0x10c
[ 61.744908] x29: ffff800085e9bcf0 x28: ffff00000c78f000 x27: 0000000000000000
[ 61.776707] x23: ffff0000035702c0 x22: ffff80008036eca4 x21: 00000000ffffffff
[ 62.115435] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 62.284292] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 62.485725] x5 : 0000000000000000 x4 : ffff00000c78f000 x3 : 0000000000000000
[ 62.525072] Call trace:
[ 62.847534] kvmalloc_node+0xfc/0x10c
[ 63.006113] expand_files+0x78/0x318
[ 63.214523] __arm64_sys_dup3+0x20/0x30
[ 63.248230] el0_svc_common.constprop.0+0x40/0xe0
[ 63.252830] do_el0_svc+0x1c/0x28
[ 63.257356] el0_svc+0x38/0xc8
[ 63.261816] el0t_64_sync_handler+0x120/0x12c
[ 63.266264] el0t_64_sync+0x190/0x194
[ 63.270632] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 401.952104] WARNING: CPU: 1 PID: 6452 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 401.993763] Modules linked in: overlay btrfs xor xor_neon raid6_pq z 0
[ 401.994060] qcom_sysmon display_connector qcom_common qcom_glink_smem mdt_loader drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[ 402.063707] CPU: 1 PID: 6452 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 402.074479] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 402.084245] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 402.095308] pc : cleanup_mnt+0xe4/0x158
[ 402.103176] lr : cleanup_mnt+0x54/0x158
[ 402.110961] sp : ffff800084263cb0
[ 402.118145] x29: ffff800084263cb0 x28: 00000000000000c0 x27: 0000000000000004
[ 402.129213] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 402.140257] x23: ffffb5a601283460 x22: ffffb5a60127e000 x21: 00000000ffffffff
[ 402.151326] x20: ffffb5a60127eac0 x19: ffff0b064346e8c0 x18: 0000000883f4a183
[ 402.162401] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 402.173491] x14: 0000000000000000 x13: ffff800084260000 x12: ffff800084264000
[ 402.184550] x11: 9472e6ac1a660500 x10: 00000000000000ff x9 : ffff5560bc34b000
[ 402.195575] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 000000000011a5a8
[ 402.206622] x5 : 0000000080150014 x4 : ffff0b06bd4c9e50 x3 : ffff800084263c20
[ 402.217707] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[ 402.228812] Call trace:
[ 402.235194] cleanup_mnt+0xe4/0x158
[ 402.242616] __cleanup_mnt+0x20/0x38
[ 402.250108] task_work_run+0xb8/0xe0
[ 402.257611] do_notify_resume+0xa58/0xe98
[ 402.265488] el0_svc_compat+0x64/0x68
[ 402.272955] el0t_32_sync_handler+0x84/0xb8
[ 402.280894] el0t_32_sync+0x194/0x198
[ 402.288240] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 401.952104] WARNING: CPU: 1 PID: 6452 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 401.993763] Modules linked in: overlay btrfs xor xor_neon raid6_pq z 0
[ 401.994060] qcom_sysmon display_connector qcom_common qcom_glink_smem mdt_loader drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[ 402.063707] CPU: 1 PID: 6452 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 402.074479] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 402.084245] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 402.095308] pc : cleanup_mnt+0xe4/0x158
[ 402.103176] lr : cleanup_mnt+0x54/0x158
[ 402.110961] sp : ffff800084263cb0
[ 402.118145] x29: ffff800084263cb0 x28: 00000000000000c0 x27: 0000000000000004
[ 402.129213] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 402.140257] x23: ffffb5a601283460 x22: ffffb5a60127e000 x21: 00000000ffffffff
[ 402.151326] x20: ffffb5a60127eac0 x19: ffff0b064346e8c0 x18: 0000000883f4a183
[ 402.162401] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 402.173491] x14: 0000000000000000 x13: ffff800084260000 x12: ffff800084264000
[ 402.184550] x11: 9472e6ac1a660500 x10: 00000000000000ff x9 : ffff5560bc34b000
[ 402.195575] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 000000000011a5a8
[ 402.206622] x5 : 0000000080150014 x4 : ffff0b06bd4c9e50 x3 : ffff800084263c20
[ 402.217707] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[ 402.228812] Call trace:
[ 402.235194] cleanup_mnt+0xe4/0x158
[ 402.242616] __cleanup_mnt+0x20/0x38
[ 402.250108] task_work_run+0xb8/0xe0
[ 402.257611] do_notify_resume+0xa58/0xe98
[ 402.265488] el0_svc_compat+0x64/0x68
[ 402.272955] el0t_32_sync_handler+0x84/0xb8
[ 402.280894] el0t_32_sync+0x194/0x198
[ 402.288240] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.910086] WARNING: CPU: 4 PID: 1860 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 51.951397] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec venus_dec venus_enc videobuf2_dma_contig mcp251xfd xhci_pci xhci_pci_renesas lontium_lt9611 can_dev venus_core v4l2_mem2mem ath10k_snoc qcom_camss videobuf2_dma_sg hci_uart v4l2_fwnode btqca v4l2_async ath10k_core videobuf2_v4l2 videobuf2_memops msm snd_soc_sdm845 btbcm ath ocmem videodev snd_soc_rt5663 qcom_spmi_adc5 gpu_sched snd_soc_qcom_common leds_qcom_lpg videobuf2_common snd_soc_rl6231 led_class_multicolor qcom_vadc_common crct10dif_ce qcom_spmi_temp_alarm rtc_pm8xxx qcom_pon drm_dp_aux_bus reset_qcom_pdc soundwire_bus qcom_stats bluetooth mac80211 camcc_sdm845 drm_display_helper ecdh_generic libarc4 ecc mc i2c_qcom_geni phy_qcom_qmp_combo spi_geni_qcom qcom_q6v5_mss coresight_stm typec gpi phy_qcom_qmp_usb qcom_rng stm_core coresight_replicator coresight_funnel phy_qcom_qusb2 qcrypto coresight_tmc cfg80211 phy_qcom_qmp_ufs authenc libdes rfkill coresight ufs_qcom phy_qcom_qmp_pcie lmh slim_qcom_ngd_ctrl qrtr slimbus
[ 51.951540] icc_osm_l3 icc_bwmon qcom_wdt pdr_interface display_connector llcc_qcom drm_kms_helper drm qcom_q6v5_pas qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[ 52.130519] CPU: 4 PID: 1860 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 52.171121] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 52.211051] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 52.252382] pc : kvmalloc_node+0xe0/0xe8
[ 52.290566] lr : kvmalloc_node+0x50/0xe8
[ 52.328745] sp : ffff800088ec3ce0
[ 52.366230] x29: ffff800088ec3cf0 x28: ffff5568c1ceb000 x27: 0000000000000000
[ 52.407564] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 52.448892] x23: 0000000080000000 x22: ffffa92268d06d20 x21: 0000000200002000
[ 52.490226] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 52.531548] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 52.572871] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 52.614196] x11: 0000000000000040 x10: 17983185dbed2800 x9 : 17983185dbed2800
[ 52.655520] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 52.696846] x5 : 0000000000000000 x4 : ffff800088ec3ca0 x3 : 0000000000000000
[ 52.738173] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 52.779498] Call trace:
[ 52.815922] kvmalloc_node+0xe0/0xe8
[ 52.853407] alloc_fdtable+0x7c/0x108
[ 52.890897] expand_files+0x114/0x2f0
[ 52.928377] ksys_dup3+0x60/0xf4
[ 52.965861] __arm64_sys_dup3+0x20/0x30
[ 53.004039] invoke_syscall+0x40/0x100
[ 53.041527] el0_svc_common+0xa8/0xd8
[ 53.079014] do_el0_svc+0x1c/0x28
[ 53.116499] el0_svc+0x38/0x64
[ 53.153634] el0t_64_sync_handler+0x90/0xfc
[ 53.191821] el0t_64_sync+0x190/0x194
[ 53.229303] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 402.920646] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_dec venus_enc lontium_lt9611 mcp251xfd xhci_pci videobuf2_dma_contig xhci_pci_renesas can_dev ath10k_snoc ath10k_core msm ath qcom_pon rtc_pm8xxx mac80211 snd_soc_sdm845 ocmem crct10dif_ce snd_soc_rt5663 leds_qcom_lpg gpu_sched snd_soc_qcom_common led_class_multicolor qcom_spmi_temp_alarm snd_soc_rl6231 qcom_spmi_adc5 drm_dp_aux_bus i2c_qcom_geni qcom_camss qcom_vadc_common drm_display_helper phy_qcom_qmp_combo qcom_stats soundwire_bus camcc_sdm845 videobuf2_dma_sg videobuf2_memops reset_qcom_pdc hci_uart slim_qcom_ngd_ctrl venus_core cfg80211 btqca btbcm v4l2_mem2mem videobuf2_v4l2 slimbus coresight_stm videobuf2_common bluetooth spi_geni_qcom typec phy_qcom_qmp_usb qcom_rng qcom_q6v5_mss gpi qrtr stm_core phy_qcom_qmp_ufs qcrypto ufs_qcom rfkill pdr_interface qcom_wdt lmh phy_qcom_qmp_pcie qcom_q6v5_pas qcom_pil_info icc_osm_l3 qcom_q6v5 display_connector
[ 402.920901] qcom_sysmon qcom_common qcom_glink_smem mdt_loader icc_bwmon llcc_qcom drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[ 403.040678] CPU: 1 PID: 36469 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 403.050299] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 403.058841] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 403.068685] pc : cleanup_mnt+0xe4/0x158
[ 403.075340] lr : cleanup_mnt+0x54/0x158
[ 403.081939] sp : ffff800085f83cb0
[ 403.087958] x29: ffff800085f83cb0 x28: 00000000000000c0 x27: 0000000000000004
[ 403.097858] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 403.107734] x23: ffffb4cd3da83460 x22: ffffb4cd3da7e000 x21: 00000000ffffffff
[ 403.117634] x20: ffffb4cd3da7eac0 x19: ffff2c1b0bc232c0 x18: 000000082fc3afac
[ 403.127526] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 403.137443] x14: 0000000000000000 x13: ffff800085f80000 x12: ffff800085f84000
[ 403.147328] x11: ce3eb58f2eae5e00 x10: 00000000000000ff x9 : ffff774e3fb4c000
[ 403.157204] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 00000000000020f2
[ 403.167082] x5 : 00000000000e4ea6 x4 : ffff2c1b7d4cae50 x3 : ffff800085f83c20
[ 403.176989] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[ 403.186914] Call trace:
[ 403.192105] cleanup_mnt+0xe4/0x158
[ 403.198344] __cleanup_mnt+0x20/0x38
[ 403.204654] task_work_run+0xb8/0xe0
[ 403.210979] do_notify_resume+0xa58/0xe98
[ 403.217704] el0_svc+0x68/0x70
[ 403.223410] el0t_64_sync_handler+0x90/0x100
[ 403.230311] el0t_64_sync+0x190/0x198
[ 403.236550] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 402.920646] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_dec venus_enc lontium_lt9611 mcp251xfd xhci_pci videobuf2_dma_contig xhci_pci_renesas can_dev ath10k_snoc ath10k_core msm ath qcom_pon rtc_pm8xxx mac80211 snd_soc_sdm845 ocmem crct10dif_ce snd_soc_rt5663 leds_qcom_lpg gpu_sched snd_soc_qcom_common led_class_multicolor qcom_spmi_temp_alarm snd_soc_rl6231 qcom_spmi_adc5 drm_dp_aux_bus i2c_qcom_geni qcom_camss qcom_vadc_common drm_display_helper phy_qcom_qmp_combo qcom_stats soundwire_bus camcc_sdm845 videobuf2_dma_sg videobuf2_memops reset_qcom_pdc hci_uart slim_qcom_ngd_ctrl venus_core cfg80211 btqca btbcm v4l2_mem2mem videobuf2_v4l2 slimbus coresight_stm videobuf2_common bluetooth spi_geni_qcom typec phy_qcom_qmp_usb qcom_rng qcom_q6v5_mss gpi qrtr stm_core phy_qcom_qmp_ufs qcrypto ufs_qcom rfkill pdr_interface qcom_wdt lmh phy_qcom_qmp_pcie qcom_q6v5_pas qcom_pil_info icc_osm_l3 qcom_q6v5 display_connector
[ 402.920901] qcom_sysmon qcom_common qcom_glink_smem mdt_loader icc_bwmon llcc_qcom drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[ 403.040678] CPU: 1 PID: 36469 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 403.050299] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 403.058841] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 403.068685] pc : cleanup_mnt+0xe4/0x158
[ 403.075340] lr : cleanup_mnt+0x54/0x158
[ 403.081939] sp : ffff800085f83cb0
[ 403.087958] x29: ffff800085f83cb0 x28: 00000000000000c0 x27: 0000000000000004
[ 403.097858] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 403.107734] x23: ffffb4cd3da83460 x22: ffffb4cd3da7e000 x21: 00000000ffffffff
[ 403.117634] x20: ffffb4cd3da7eac0 x19: ffff2c1b0bc232c0 x18: 000000082fc3afac
[ 403.127526] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 403.137443] x14: 0000000000000000 x13: ffff800085f80000 x12: ffff800085f84000
[ 403.147328] x11: ce3eb58f2eae5e00 x10: 00000000000000ff x9 : ffff774e3fb4c000
[ 403.157204] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 00000000000020f2
[ 403.167082] x5 : 00000000000e4ea6 x4 : ffff2c1b7d4cae50 x3 : ffff800085f83c20
[ 403.176989] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[ 403.186914] Call trace:
[ 403.192105] cleanup_mnt+0xe4/0x158
[ 403.198344] __cleanup_mnt+0x20/0x38
[ 403.204654] task_work_run+0xb8/0xe0
[ 403.210979] do_notify_resume+0xa58/0xe98
[ 403.217704] el0_svc+0x68/0x70
[ 403.223410] el0t_64_sync_handler+0x90/0x100
[ 403.230311] el0t_64_sync+0x190/0x198
[ 403.236550] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 399.278066] WARNING: CPU: 1 PID: 36404 at fs/namespace.c:1245 cleanup_mnings 0
[ 399.295472] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_enc venus_dec videobuf2_dma_contig mcp251xfd ath10k_snoc msm snd_soc_sdm845 ath10k_core can_dev lontium_lt9611 ath leds_qcom_lpg snd_soc_rt5663 qcom_spmi_adc5 ocmem hci_uart snd_soc_qcom_common qcom_camss venus_core btqca xhci_pci gpu_sched snd_soc_rl6231 videobuf2_dma_sg btbcm xhci_pci_renesas led_class_multicolor rtc_pm8xxx qcom_vadc_common qcom_spmi_temp_alarm qcom_pon v4l2_mem2mem soundwire_bus crct10dif_ce bluetooth mac80211 spi_geni_qcom qcom_stats videobuf2_memops phy_qcom_qmp_combo i2c_qcom_geni drm_dp_aux_bus videobuf2_v4l2 phy_qcom_qmp_usb reset_qcom_pdc typec drm_display_helper camcc_sdm845 videobuf2_common qcom_rng gpi qcom_q6v5_mss phy_qcom_qmp_ufs ufs_qcom qrtr cfg80211 qcrypto coresight_stm stm_core rfkill display_connector phy_qcom_qmp_pcie drm_kms_helper drm icc_osm_l3 qcom_wdt slim_qcom_ngd_ctrl slimbus qcom_q6v5_pas
[ 399.295900] pdr_interface lmh qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common llcc_qcom icc_bwmon qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[ 399.435371] CPU: 1 PID: 36404 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 399.447975] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 399.459458] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 399.472237] pc : cleanup_mnt+0x11c/0x140
[ 399.481875] lr : cleanup_mnt+0x20/0x140
[ 399.491318] sp : ffff800085f2bca0
[ 399.500141] x29: ffff800085f2bca0 x28: 0000000000000004 x27: 0000000000000000
[ 399.512852] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 399.525544] x23: ffff7aab0862dae4 x22: ffffb4c740ccfb50 x21: ffff7aab0862d280
[ 399.538271] x20: ffff7aab08757540 x19: 0000000000000000 x18: ffffb4c740bb7908
[ 399.551016] x17: ffffb4c740bb78f0 x16: ffffb4c73e512610 x15: 00000000001e8480
[ 399.563785] x14: ffff80008103b7d0 x13: 0000000160000008 x12: ffffb4c740615e28
[ 399.576545] x11: ffffb4c740605008 x10: 0000000000000002 x9 : ffffb4c73e5fa778
[ 399.589244] x8 : ffff800085f2bb38 x7 : 0000000000000000 x6 : 0000000000000000
[ 399.601959] x5 : 0000000000000000 x4 : 0000000000000007 x3 : fffffbffeffec680
[ 399.614714] x2 : 0000000000000009 x1 : 0000000000000008 x0 : 00000000ffffffff
[ 399.627492] Call trace:
[ 399.635537] cleanup_mnt+0x11c/0x140
[ 399.644708] __cleanup_mnt+0x1c/0x30
[ 399.653851] task_work_run+0x88/0xf8
[ 399.663013] do_notify_resume+0x214/0x1158
[ 399.672620] el0_svc+0xc8/0xe0
[ 399.681082] el0t_64_sync_handler+0x120/0x130
[ 399.690800] el0t_64_sync+0x190/0x198
[ 399.699717] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 399.278066] WARNING: CPU: 1 PID: 36404 at fs/namespace.c:1245 cleanup_mnings 0
[ 399.295472] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_enc venus_dec videobuf2_dma_contig mcp251xfd ath10k_snoc msm snd_soc_sdm845 ath10k_core can_dev lontium_lt9611 ath leds_qcom_lpg snd_soc_rt5663 qcom_spmi_adc5 ocmem hci_uart snd_soc_qcom_common qcom_camss venus_core btqca xhci_pci gpu_sched snd_soc_rl6231 videobuf2_dma_sg btbcm xhci_pci_renesas led_class_multicolor rtc_pm8xxx qcom_vadc_common qcom_spmi_temp_alarm qcom_pon v4l2_mem2mem soundwire_bus crct10dif_ce bluetooth mac80211 spi_geni_qcom qcom_stats videobuf2_memops phy_qcom_qmp_combo i2c_qcom_geni drm_dp_aux_bus videobuf2_v4l2 phy_qcom_qmp_usb reset_qcom_pdc typec drm_display_helper camcc_sdm845 videobuf2_common qcom_rng gpi qcom_q6v5_mss phy_qcom_qmp_ufs ufs_qcom qrtr cfg80211 qcrypto coresight_stm stm_core rfkill display_connector phy_qcom_qmp_pcie drm_kms_helper drm icc_osm_l3 qcom_wdt slim_qcom_ngd_ctrl slimbus qcom_q6v5_pas
[ 399.295900] pdr_interface lmh qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common llcc_qcom icc_bwmon qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[ 399.435371] CPU: 1 PID: 36404 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 399.447975] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 399.459458] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 399.472237] pc : cleanup_mnt+0x11c/0x140
[ 399.481875] lr : cleanup_mnt+0x20/0x140
[ 399.491318] sp : ffff800085f2bca0
[ 399.500141] x29: ffff800085f2bca0 x28: 0000000000000004 x27: 0000000000000000
[ 399.512852] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 399.525544] x23: ffff7aab0862dae4 x22: ffffb4c740ccfb50 x21: ffff7aab0862d280
[ 399.538271] x20: ffff7aab08757540 x19: 0000000000000000 x18: ffffb4c740bb7908
[ 399.551016] x17: ffffb4c740bb78f0 x16: ffffb4c73e512610 x15: 00000000001e8480
[ 399.563785] x14: ffff80008103b7d0 x13: 0000000160000008 x12: ffffb4c740615e28
[ 399.576545] x11: ffffb4c740605008 x10: 0000000000000002 x9 : ffffb4c73e5fa778
[ 399.589244] x8 : ffff800085f2bb38 x7 : 0000000000000000 x6 : 0000000000000000
[ 399.601959] x5 : 0000000000000000 x4 : 0000000000000007 x3 : fffffbffeffec680
[ 399.614714] x2 : 0000000000000009 x1 : 0000000000000008 x0 : 00000000ffffffff
[ 399.627492] Call trace:
[ 399.635537] cleanup_mnt+0x11c/0x140
[ 399.644708] __cleanup_mnt+0x1c/0x30
[ 399.653851] task_work_run+0x88/0xf8
[ 399.663013] do_notify_resume+0x214/0x1158
[ 399.672620] el0_svc+0xc8/0xe0
[ 399.681082] el0t_64_sync_handler+0x120/0x130
[ 399.690800] el0t_64_sync+0x190/0x198
[ 399.699717] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 52.367101] WARNING: CPU: 4 PID: 1872 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 52.408414] Modules linked in: fuse ip_tables x_tables snd_soc_hdmi_codec ax88179_178a usbnet hci_uart btqca venus_dec btbcm venus_enc xhci_pci mcp251xfd videobuf2_dma_contig xhci_pci_renesas can_dev lontium_lt9611 ath10k_snoc ath10k_core msm ath qcom_camss videobuf2_dma_sg v4l2_fwnode snd_soc_sdm845 v4l2_async venus_core ocmem leds_qcom_lpg gpu_sched led_class_multicolor snd_soc_rt5663 v4l2_mem2mem videobuf2_memops snd_soc_qcom_common bluetooth mac80211 videobuf2_v4l2 crct10dif_ce qcom_spmi_temp_alarm videodev ecdh_generic qcom_spmi_adc5 videobuf2_common libarc4 drm_dp_aux_bus snd_soc_rl6231 rtc_pm8xxx qcom_vadc_common qcom_pon qcom_stats soundwire_bus ecc i2c_qcom_geni reset_qcom_pdc camcc_sdm845 drm_display_helper coresight_stm mc spi_geni_qcom gpi qcom_rng stm_core phy_qcom_qmp_combo phy_qcom_qmp_usb coresight_replicator coresight_funnel typec coresight_tmc cfg80211 qcom_q6v5_mss phy_qcom_qusb2 qrtr rfkill phy_qcom_qmp_ufs coresight qcrypto authenc libdes ufs_qcom phy_qcom_qmp_pcie icc_osm_l3 qcom_q6v5_pas lmh
[ 52.408590] qcom_wdt qcom_pil_info qcom_q6v5 slim_qcom_ngd_ctrl qcom_sysmon slimbus pdr_interface display_connector qcom_common qcom_glink_smem icc_bwmon llcc_qcom mdt_loader drm_kms_helper qmi_helpers drm backlight rmtfs_mem socinfo
[ 52.587538] CPU: 4 PID: 1872 Comm: unshare_test Tainted: G W 6.6.72-rc1 #1
[ 52.629896] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 52.669828] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 52.711157] pc : kvmalloc_node+0xfc/0x10c
[ 52.749338] lr : kvmalloc_node+0x64/0x10c
[ 52.787524] sp : ffff800088edbce0
[ 52.825014] x29: ffff800088edbcf0 x28: ffff7b2d05469000 x27: 0000000000000000
[ 52.866364] x26: 0000000000000000 x25: 0000000000000000 x24: ffff7b2d00136f40
[ 52.907694] x23: ffff7b2d00136ec0 x22: ffffdf069eeeeca4 x21: 00000000ffffffff
[ 52.949027] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 52.990362] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 53.031691] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 53.073026] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 53.114360] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 53.155690] x5 : 0000000000000000 x4 : ffff7b2d05469000 x3 : 0000000000000000
[ 53.197026] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 53.238364] Call trace:
[ 53.274796] kvmalloc_node+0xfc/0x10c
[ 53.312290] alloc_fdtable+0x94/0x114
[ 53.349786] expand_files+0x78/0x318
[ 53.387274] ksys_dup3+0x60/0x128
[ 53.424766] __arm64_sys_dup3+0x20/0x30
[ 53.462957] invoke_syscall+0x48/0x114
[ 53.500440] el0_svc_common.constprop.0+0x40/0xe0
[ 53.539331] do_el0_svc+0x1c/0x28
[ 53.576811] el0_svc+0x38/0xc8
[ 53.613951] el0t_64_sync_handler+0x120/0x12c
[ 53.652140] el0t_64_sync+0x190/0x194
[ 53.689635] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.378622] WARNING: CPU: 0 PID: 1424 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 51.378715] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[ 51.379791] CPU: 0 PID: 1424 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 51.386560] Hardware name: WinLink E850-96 board (DT)
[ 51.391594] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 51.398537] pc : kvmalloc_node+0xe0/0xe8
[ 51.402443] lr : kvmalloc_node+0x50/0xe8
[ 51.406351] sp : ffff800083ed3ce0
[ 51.409647] x29: ffff800083ed3cf0 x28: ffff0008076c3000 x27: 0000000000000000
[ 51.416765] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 51.423885] x23: 0000000080000000 x22: ffff800080306d20 x21: 0000000200002000
[ 51.431001] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 51.438119] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.445239] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.452355] x11: 0000000000000040 x10: a2ab0f3bfcaf8e00 x9 : a2ab0f3bfcaf8e00
[ 51.459473] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 51.466593] x5 : 0000000000000000 x4 : ffff800083ed3ca0 x3 : 0000000000000000
[ 51.473709] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 51.480831] Call trace:
[ 51.483262] kvmalloc_node+0xe0/0xe8
[ 51.486820] alloc_fdtable+0x7c/0x108
[ 51.490462] expand_files+0x114/0x2f0
[ 51.494108] ksys_dup3+0x60/0xf4
[ 51.497320] __arm64_sys_dup3+0x20/0x30
[ 51.501139] invoke_syscall+0x40/0x100
[ 51.504872] el0_svc_common+0xa8/0xd8
[ 51.508520] do_el0_svc+0x1c/0x28
[ 51.511816] el0_svc+0x38/0x64
[ 51.514854] el0t_64_sync_handler+0x90/0xfc
[ 51.519021] el0t_64_sync+0x190/0x194
[ 51.522671] ---[ end trace 0000000000000000 ]---
Home
[ 2.337660] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[ 2.345891] CPU: 3 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[ 2.352138] Hardware name: WinLink E850-96 board (DT)
[ 2.357174] Call trace:
[ 2.359603] dump_backtrace+0x108/0x190
[ 2.363420] show_stack+0x24/0x30
[ 2.366718] dump_stack_lvl+0x60/0x80
[ 2.370364] dump_stack+0x18/0x28
[ 2.373663] panic+0x150/0x368
[ 2.376703] mount_root_generic+0x298/0x2e8
[ 2.380868] mount_block_root+0x5c/0x78
[ 2.384689] mount_root+0x74/0xa8
[ 2.387986] prepare_namespace+0x8c/0xd8
[ 2.391894] kernel_init_freeable+0x108/0x160
[ 2.396232] kernel_init+0x2c/0x1c0
[ 2.399706] ret_from_fork+0x10/0x20
[ 2.403267] SMP: stopping secondary CPUs
[ 2.407179] Kernel Offset: disabled
[ 2.410645] CPU features: 0x0,c0000000,00020143,0000721b
[ 2.415938] Memory Limit: none
[ 2.418983] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Home
[ 2.337660] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[ 2.345891] CPU: 3 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[ 2.352138] Hardware name: WinLink E850-96 board (DT)
[ 2.357174] Call trace:
[ 2.359603] dump_backtrace+0x108/0x190
[ 2.363420] show_stack+0x24/0x30
[ 2.366718] dump_stack_lvl+0x60/0x80
[ 2.370364] dump_stack+0x18/0x28
[ 2.373663] panic+0x150/0x368
[ 2.376703] mount_root_generic+0x298/0x2e8
[ 2.380868] mount_block_root+0x5c/0x78
[ 2.384689] mount_root+0x74/0xa8
[ 2.387986] prepare_namespace+0x8c/0xd8
[ 2.391894] kernel_init_freeable+0x108/0x160
[ 2.396232] kernel_init+0x2c/0x1c0
[ 2.399706] ret_from_fork+0x10/0x20
[ 2.403267] SMP: stopping secondary CPUs
[ 2.407179] Kernel Offset: disabled
[ 2.410645] CPU features: 0x0,c0000000,00020143,0000721b
[ 2.415938] Memory Limit: none
[ 2.418983] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Home
------------[ cut here ]------------
[ 51.494506] WARNING: CPU: 3 PID: 1425 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 51.497265] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[ 51.504733] CPU: 3 PID: 1425 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 51.511502] Hardware name: WinLink E850-96 board (DT)
[ 51.516536] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 51.523480] pc : kvmalloc_node+0xfc/0x10c
[ 51.527471] lr : kvmalloc_node+0x64/0x10c
[ 51.531466] sp : ffff800084133ce0
[ 51.534762] x29: ffff800084133cf0 x28: ffff00080605f000 x27: 0000000000000000
[ 51.541880] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0008012c3780
[ 51.548998] x23: ffff0008012c3700 x22: ffff8000802eeca4 x21: 00000000ffffffff
[ 51.556116] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 51.563234] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.570352] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.577470] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 51.584590] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 51.591706] x5 : 0000000000000000 x4 : ffff00080605f000 x3 : 0000000000000000
[ 51.598824] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 51.605946] Call trace:
[ 51.608377] kvmalloc_node+0xfc/0x10c
[ 51.612020] alloc_fdtable+0x94/0x114
[ 51.615664] expand_files+0x78/0x318
[ 51.619223] ksys_dup3+0x60/0x128
[ 51.622523] __arm64_sys_dup3+0x20/0x30
[ 51.626341] invoke_syscall+0x48/0x114
[ 51.630074] el0_svc_common.constprop.0+0x40/0xe0
[ 51.634761] do_el0_svc+0x1c/0x28
[ 51.638059] el0_svc+0x38/0xc8
[ 51.641097] el0t_64_sync_handler+0x120/0x12c
[ 51.645438] el0t_64_sync+0x190/0x194
[ 51.649087] ---[ end trace 0000000000000000 ]---
Home
[ 1.854181] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[ 1.854188] CPU: 5 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[ 1.854195] Hardware name: WinLink E850-96 board (DT)
[ 1.854199] Call trace:
[ 1.854204] dump_backtrace+0x90/0xe8
[ 1.854223] show_stack+0x18/0x24
[ 1.854236] dump_stack_lvl+0x48/0x60
[ 1.854248] dump_stack+0x18/0x24
[ 1.854257] panic+0x324/0x380
[ 1.854272] mount_root_generic+0x260/0x330
[ 1.854282] mount_root+0x170/0x334
[ 1.854290] prepare_namespace+0x6c/0x2a4
[ 1.854299] kernel_init_freeable+0x244/0x284
[ 1.854309] kernel_init+0x24/0x1dc
[ 1.854322] ret_from_fork+0x10/0x20
[ 1.854336] SMP: stopping secondary CPUs
[ 1.859467] Kernel Offset: disabled
[ 1.859471] CPU features: 0x0,c0000000,00020143,0000721b
[ 1.859481] Memory Limit: none
[ 1.945488] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Home
[ 1.854181] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[ 1.854188] CPU: 5 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[ 1.854195] Hardware name: WinLink E850-96 board (DT)
[ 1.854199] Call trace:
[ 1.854204] dump_backtrace+0x90/0xe8
[ 1.854223] show_stack+0x18/0x24
[ 1.854236] dump_stack_lvl+0x48/0x60
[ 1.854248] dump_stack+0x18/0x24
[ 1.854257] panic+0x324/0x380
[ 1.854272] mount_root_generic+0x260/0x330
[ 1.854282] mount_root+0x170/0x334
[ 1.854290] prepare_namespace+0x6c/0x2a4
[ 1.854299] kernel_init_freeable+0x244/0x284
[ 1.854309] kernel_init+0x24/0x1dc
[ 1.854322] ret_from_fork+0x10/0x20
[ 1.854336] SMP: stopping secondary CPUs
[ 1.859467] Kernel Offset: disabled
[ 1.859471] CPU features: 0x0,c0000000,00020143,0000721b
[ 1.859481] Memory Limit: none
[ 1.945488] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Home
------------[ cut here ]------------
[ 309.059412] WARNING: CPU: 0 PID: 533 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 309.059550] Modules linked in: panel_simple arm_spe_pmu crct10dif_ce pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[ 309.059949] CPU: 0 PID: 533 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 309.060065] Hardware name: FVP Base RevC (DT)
[ 309.060132] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 309.060260] pc : kvmalloc_node+0xe0/0xe8
[ 309.060356] lr : kvmalloc_node+0x50/0xe8
[ 309.060451] sp : ffff800080b5bce0
[ 309.060511] x29: ffff800080b5bcf0 x28: ffff000801092000 x27: 0000000000000000
[ 309.060682] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 309.060848] x23: 0000000080000000 x22: 9cb0d7c64b706d20 x21: 0000000200002000
[ 309.061018] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 309.061185] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 309.061349] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 309.061513] x11: 0000000000000040 x10: ffdec00d7c0edc00 x9 : ffdec00d7c0edc00
[ 309.061680] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 309.061846] x5 : 0000000000000000 x4 : ffff800080b5bca0 x3 : 0000000000000000
[ 309.062010] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 309.062173] Call trace:
[ 309.062224] kvmalloc_node+0xe0/0xe8
[ 309.062324] alloc_fdtable+0x7c/0x108
[ 309.062459] expand_files+0x114/0x2f0
[ 309.062558] ksys_dup3+0x60/0xf4
[ 309.062654] __arm64_sys_dup3+0x20/0x30
[ 309.062756] invoke_syscall+0x40/0x100
[ 309.062882] el0_svc_common+0xa8/0xd8
[ 309.063007] do_el0_svc+0x1c/0x28
[ 309.063129] el0_svc+0x38/0x64
[ 309.063234] el0t_64_sync_handler+0x90/0xfc
[ 309.063348] el0t_64_sync+0x190/0x194
[ 309.063448] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 352.742686] WARNING: CPU: 5 PID: 532 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 352.742829] Modules linked in: arm_spe_pmu panel_simple crct10dif_ce pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[ 352.743252] CPU: 5 PID: 532 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 352.743372] Hardware name: FVP Base RevC (DT)
[ 352.743445] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 352.743577] pc : kvmalloc_node+0xfc/0x10c
[ 352.743671] lr : kvmalloc_node+0x64/0x10c
[ 352.743773] sp : ffff800081a3bce0
[ 352.743839] x29: ffff800081a3bcf0 x28: ffff0008022c3000 x27: 0000000000000000
[ 352.744022] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000800b053c0
[ 352.744200] x23: ffff000800b05340 x22: febcd7c64b6eeca4 x21: 00000000ffffffff
[ 352.744384] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 352.744562] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 352.744737] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 352.744912] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 352.745087] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 352.745260] x5 : 0000000000000000 x4 : ffff0008022c3000 x3 : 0000000000000000
[ 352.745437] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 352.745612] Call trace:
[ 352.745667] kvmalloc_node+0xfc/0x10c
[ 352.745766] alloc_fdtable+0x94/0x114
[ 352.745873] expand_files+0x78/0x318
[ 352.745981] ksys_dup3+0x60/0x128
[ 352.746089] __arm64_sys_dup3+0x20/0x30
[ 352.746204] invoke_syscall+0x48/0x114
[ 352.746336] el0_svc_common.constprop.0+0x40/0xe0
[ 352.746479] do_el0_svc+0x1c/0x28
[ 352.746608] el0_svc+0x38/0xc8
[ 352.746719] el0t_64_sync_handler+0x120/0x12c
[ 352.746845] el0t_64_sync+0x190/0x194
[ 352.746950] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 356.803849] WARNING: CPU: 1 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 356.805937] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 356.809078] CPU: 1 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 356.809569] Hardware name: linux,dummy-virt (DT)
[ 356.810382] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 356.811214] pc : cleanup_mnt+0xe4/0x158
[ 356.811765] lr : cleanup_mnt+0x54/0x158
[ 356.812535] sp : ffff80008b6d3cb0
[ 356.813205] x29: ffff80008b6d3cb0 x28: 00000000000000c0 x27: 0000000000000004
[ 356.814738] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 356.816278] x23: ffffa95a34a83460 x22: ffffa95a34a7e000 x21: 00000000ffffffff
[ 356.817001] x20: ffffa95a34a7eac0 x19: ffff0000c2901000 x18: 0000000000000000
[ 356.817988] x17: ffffa95a33b4e828 x16: 0000000000000000 x15: 0000000000000000
[ 356.819281] x14: 0000000000000000 x13: ffff80008b6d0000 x12: ffff80008b6d4000
[ 356.820471] x11: 71c8ee307f807a00 x10: 0000000000000003 x9 : ffff56a6cab9b000
[ 356.821392] x8 : 0000000000000002 x7 : 0000000000000000 x6 : 000000000000000b
[ 356.821777] x5 : 0000000080400035 x4 : fffffc00030a4b20 x3 : ffff80008b6d3c20
[ 356.822732] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[ 356.824616] Call trace:
[ 356.825241] cleanup_mnt+0xe4/0x158
[ 356.825662] __cleanup_mnt+0x20/0x38
[ 356.825928] task_work_run+0xb8/0xe0
[ 356.827130] do_notify_resume+0xa58/0xe98
[ 356.827574] el0_svc_compat+0x64/0x68
[ 356.828489] el0t_32_sync_handler+0x84/0xb8
[ 356.829779] el0t_32_sync+0x194/0x198
[ 356.830333] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 356.803849] WARNING: CPU: 1 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 356.805937] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 356.809078] CPU: 1 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 356.809569] Hardware name: linux,dummy-virt (DT)
[ 356.810382] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 356.811214] pc : cleanup_mnt+0xe4/0x158
[ 356.811765] lr : cleanup_mnt+0x54/0x158
[ 356.812535] sp : ffff80008b6d3cb0
[ 356.813205] x29: ffff80008b6d3cb0 x28: 00000000000000c0 x27: 0000000000000004
[ 356.814738] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 356.816278] x23: ffffa95a34a83460 x22: ffffa95a34a7e000 x21: 00000000ffffffff
[ 356.817001] x20: ffffa95a34a7eac0 x19: ffff0000c2901000 x18: 0000000000000000
[ 356.817988] x17: ffffa95a33b4e828 x16: 0000000000000000 x15: 0000000000000000
[ 356.819281] x14: 0000000000000000 x13: ffff80008b6d0000 x12: ffff80008b6d4000
[ 356.820471] x11: 71c8ee307f807a00 x10: 0000000000000003 x9 : ffff56a6cab9b000
[ 356.821392] x8 : 0000000000000002 x7 : 0000000000000000 x6 : 000000000000000b
[ 356.821777] x5 : 0000000080400035 x4 : fffffc00030a4b20 x3 : ffff80008b6d3c20
[ 356.822732] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[ 356.824616] Call trace:
[ 356.825241] cleanup_mnt+0xe4/0x158
[ 356.825662] __cleanup_mnt+0x20/0x38
[ 356.825928] task_work_run+0xb8/0xe0
[ 356.827130] do_notify_resume+0xa58/0xe98
[ 356.827574] el0_svc_compat+0x64/0x68
[ 356.828489] el0t_32_sync_handler+0x84/0xb8
[ 356.829779] el0t_32_sync+0x194/0x198
[ 356.830333] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 373.881529] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 373.884310] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 373.888526] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 373.889444] Hardware name: linux,dummy-virt (DT)
[ 373.891421] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 373.892374] pc : cleanup_mnt+0x11c/0x140
[ 373.892692] lr : cleanup_mnt+0x20/0x140
[ 373.893065] sp : ffff80008aee3cc0
[ 373.893325] x29: ffff80008aee3cc0 x28: ffff0000c1f42100 x27: 0000000000000000
[ 373.893945] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 373.895358] x23: ffffad307769ab58 x22: ffff0000c1f42100 x21: ffff0000c1f42964
[ 373.896063] x20: ffff0000c28a6140 x19: 0000000000000000 x18: 0000000000000000
[ 373.897667] x17: ffff52d0885c8000 x16: ffffad3074f089e0 x15: 0000000000000000
[ 373.898549] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 373.899766] x11: 0000000100004802 x10: 0000000000000002 x9 : ffffad3074fe7428
[ 373.900755] x8 : ffff80008aee3b48 x7 : 0000000000000000 x6 : 0000000000000000
[ 373.902143] x5 : ffffad30770df000 x4 : 0000000000000001 x3 : fffffbffefff284c
[ 373.902790] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 373.904196] Call trace:
[ 373.904486] cleanup_mnt+0x11c/0x140
[ 373.904853] __cleanup_mnt+0x1c/0x30
[ 373.905461] task_work_run+0x80/0xe8
[ 373.905816] do_notify_resume+0x214/0xf30
[ 373.907168] el0_svc_compat+0x88/0xa0
[ 373.907617] el0t_32_sync_handler+0xb0/0x138
[ 373.908718] el0t_32_sync+0x194/0x198
[ 373.909966] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 373.881529] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 373.884310] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 373.888526] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 373.889444] Hardware name: linux,dummy-virt (DT)
[ 373.891421] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 373.892374] pc : cleanup_mnt+0x11c/0x140
[ 373.892692] lr : cleanup_mnt+0x20/0x140
[ 373.893065] sp : ffff80008aee3cc0
[ 373.893325] x29: ffff80008aee3cc0 x28: ffff0000c1f42100 x27: 0000000000000000
[ 373.893945] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 373.895358] x23: ffffad307769ab58 x22: ffff0000c1f42100 x21: ffff0000c1f42964
[ 373.896063] x20: ffff0000c28a6140 x19: 0000000000000000 x18: 0000000000000000
[ 373.897667] x17: ffff52d0885c8000 x16: ffffad3074f089e0 x15: 0000000000000000
[ 373.898549] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 373.899766] x11: 0000000100004802 x10: 0000000000000002 x9 : ffffad3074fe7428
[ 373.900755] x8 : ffff80008aee3b48 x7 : 0000000000000000 x6 : 0000000000000000
[ 373.902143] x5 : ffffad30770df000 x4 : 0000000000000001 x3 : fffffbffefff284c
[ 373.902790] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 373.904196] Call trace:
[ 373.904486] cleanup_mnt+0x11c/0x140
[ 373.904853] __cleanup_mnt+0x1c/0x30
[ 373.905461] task_work_run+0x80/0xe8
[ 373.905816] do_notify_resume+0x214/0xf30
[ 373.907168] el0_svc_compat+0x88/0xa0
[ 373.907617] el0t_32_sync_handler+0xb0/0x138
[ 373.908718] el0t_32_sync+0x194/0x198
[ 373.909966] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 54.301037] WARNING: CPU: 1 PID: 464 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 54.302642] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 54.306212] CPU: 1 PID: 464 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 54.306909] Hardware name: linux,dummy-virt (DT)
[ 54.307724] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 54.308220] pc : kvmalloc_node+0xe0/0xe8
[ 54.308637] lr : kvmalloc_node+0x50/0xe8
[ 54.309028] sp : ffff80008082bce0
[ 54.309563] x29: ffff80008082bcf0 x28: ffff0000c0beb000 x27: 0000000000000000
[ 54.310330] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 54.310982] x23: 0000000080001000 x22: 5bb5a4bab7f06d20 x21: 0000000200002000
[ 54.311709] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 54.312515] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 54.313098] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 54.313950] x11: 0000000000000040 x10: e1c6c458a70f8400 x9 : e1c6c458a70f8400
[ 54.315195] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 54.315862] x5 : 0000000000000000 x4 : ffff80008082bca0 x3 : 0000000000000000
[ 54.316805] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 54.317439] Call trace:
[ 54.318000] kvmalloc_node+0xe0/0xe8
[ 54.319969] alloc_fdtable+0x7c/0x108
[ 54.320939] expand_files+0x114/0x2f0
[ 54.324360] ksys_dup3+0x60/0xf4
[ 54.324580] __arm64_sys_dup3+0x20/0x30
[ 54.324820] invoke_syscall+0x40/0x100
[ 54.325222] el0_svc_common+0xa8/0xd8
[ 54.325473] do_el0_svc+0x1c/0x28
[ 54.325710] el0_svc+0x38/0x64
[ 54.325912] el0t_64_sync_handler+0x90/0xfc
[ 54.326140] el0t_64_sync+0x190/0x194
[ 54.328838] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 342.934763] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 342.937238] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 342.942179] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 342.943731] Hardware name: linux,dummy-virt (DT)
[ 342.945030] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 342.945502] pc : cleanup_mnt+0xe4/0x158
[ 342.945782] lr : cleanup_mnt+0x54/0x158
[ 342.946043] sp : ffff80008ad1bcb0
[ 342.946274] x29: ffff80008ad1bcb0 x28: 00000000000000c0 x27: 0000000000000004
[ 342.950047] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 342.952314] x23: ffffc6079dc83460 x22: ffffc6079dc7e000 x21: 00000000ffffffff
[ 342.953721] x20: ffffc6079dc7eac0 x19: ffff0000c6489b40 x18: 0000000000000000
[ 342.954538] x17: ffffc6079cd4e828 x16: 0000000000000000 x15: 0000000000000000
[ 342.955969] x14: 0000000000000000 x13: ffff80008ad18000 x12: ffff80008ad1c000
[ 342.957198] x11: 0d7eb2ee421f6e00 x10: 0000000000000003 x9 : ffff39f96199b000
[ 342.958125] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[ 342.959643] x5 : 0000000000000000 x4 : ffff0000ff5b4e50 x3 : ffff80008ad1bc20
[ 342.960639] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[ 342.961859] Call trace:
[ 342.962182] cleanup_mnt+0xe4/0x158
[ 342.963193] __cleanup_mnt+0x20/0x38
[ 342.963559] task_work_run+0xb8/0xe0
[ 342.964640] do_notify_resume+0xa58/0xe98
[ 342.965478] el0_svc+0x68/0x70
[ 342.966047] el0t_64_sync_handler+0x90/0x100
[ 342.966709] el0t_64_sync+0x190/0x198
[ 342.967875] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 342.934763] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 342.937238] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 342.942179] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 342.943731] Hardware name: linux,dummy-virt (DT)
[ 342.945030] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 342.945502] pc : cleanup_mnt+0xe4/0x158
[ 342.945782] lr : cleanup_mnt+0x54/0x158
[ 342.946043] sp : ffff80008ad1bcb0
[ 342.946274] x29: ffff80008ad1bcb0 x28: 00000000000000c0 x27: 0000000000000004
[ 342.950047] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[ 342.952314] x23: ffffc6079dc83460 x22: ffffc6079dc7e000 x21: 00000000ffffffff
[ 342.953721] x20: ffffc6079dc7eac0 x19: ffff0000c6489b40 x18: 0000000000000000
[ 342.954538] x17: ffffc6079cd4e828 x16: 0000000000000000 x15: 0000000000000000
[ 342.955969] x14: 0000000000000000 x13: ffff80008ad18000 x12: ffff80008ad1c000
[ 342.957198] x11: 0d7eb2ee421f6e00 x10: 0000000000000003 x9 : ffff39f96199b000
[ 342.958125] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[ 342.959643] x5 : 0000000000000000 x4 : ffff0000ff5b4e50 x3 : ffff80008ad1bc20
[ 342.960639] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[ 342.961859] Call trace:
[ 342.962182] cleanup_mnt+0xe4/0x158
[ 342.963193] __cleanup_mnt+0x20/0x38
[ 342.963559] task_work_run+0xb8/0xe0
[ 342.964640] do_notify_resume+0xa58/0xe98
[ 342.965478] el0_svc+0x68/0x70
[ 342.966047] el0t_64_sync_handler+0x90/0x100
[ 342.966709] el0t_64_sync+0x190/0x198
[ 342.967875] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 377.408463] WARNING: CPU: 0 PID: 11085 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 377.411074] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 377.415364] CPU: 0 PID: 11085 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 377.416224] Hardware name: linux,dummy-virt (DT)
[ 377.417768] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 377.418940] pc : cleanup_mnt+0xe4/0x158
[ 377.420543] lr : cleanup_mnt+0x54/0x158
[ 377.421433] sp : ffff80008b0a3cb0
[ 377.422222] x29: ffff80008b0a3cb0 x28: 00000000000000c0 x27: 0000000000000041
[ 377.423444] x26: 0000000000000004 x25: 0000000000000000 x24: 0000000000000000
[ 377.424859] x23: ffffb7cfb9c83458 x22: ffffb7cfb9c7e000 x21: 00000000ffffffff
[ 377.426193] x20: ffffb7cfb9c7eac0 x19: ffff0000c361da00 x18: 0000000000000000
[ 377.427677] x17: ffffb7cfb8d4e820 x16: 0000000000000000 x15: 0000000000000000
[ 377.428157] x14: 0000000000000000 x13: ffff80008b0a0000 x12: ffff80008b0a4000
[ 377.428587] x11: 1697607560e9c100 x10: 0000000000000003 x9 : ffff48314599b000
[ 377.429047] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[ 377.429454] x5 : 000000008040002d x4 : ffff0000ff5b4e50 x3 : ffff80008b0a3c20
[ 377.429870] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[ 377.430886] Call trace:
[ 377.431330] cleanup_mnt+0xe4/0x158
[ 377.431844] __cleanup_mnt+0x20/0x38
[ 377.432503] task_work_run+0xb8/0xe0
[ 377.433034] do_notify_resume+0xa08/0xe30
[ 377.433481] el0_svc+0x68/0x70
[ 377.433842] el0t_64_sync_handler+0x90/0x100
[ 377.434875] el0t_64_sync+0x190/0x198
[ 377.435497] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 377.408463] WARNING: CPU: 0 PID: 11085 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[ 377.411074] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 377.415364] CPU: 0 PID: 11085 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 377.416224] Hardware name: linux,dummy-virt (DT)
[ 377.417768] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 377.418940] pc : cleanup_mnt+0xe4/0x158
[ 377.420543] lr : cleanup_mnt+0x54/0x158
[ 377.421433] sp : ffff80008b0a3cb0
[ 377.422222] x29: ffff80008b0a3cb0 x28: 00000000000000c0 x27: 0000000000000041
[ 377.423444] x26: 0000000000000004 x25: 0000000000000000 x24: 0000000000000000
[ 377.424859] x23: ffffb7cfb9c83458 x22: ffffb7cfb9c7e000 x21: 00000000ffffffff
[ 377.426193] x20: ffffb7cfb9c7eac0 x19: ffff0000c361da00 x18: 0000000000000000
[ 377.427677] x17: ffffb7cfb8d4e820 x16: 0000000000000000 x15: 0000000000000000
[ 377.428157] x14: 0000000000000000 x13: ffff80008b0a0000 x12: ffff80008b0a4000
[ 377.428587] x11: 1697607560e9c100 x10: 0000000000000003 x9 : ffff48314599b000
[ 377.429047] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[ 377.429454] x5 : 000000008040002d x4 : ffff0000ff5b4e50 x3 : ffff80008b0a3c20
[ 377.429870] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[ 377.430886] Call trace:
[ 377.431330] cleanup_mnt+0xe4/0x158
[ 377.431844] __cleanup_mnt+0x20/0x38
[ 377.432503] task_work_run+0xb8/0xe0
[ 377.433034] do_notify_resume+0xa08/0xe30
[ 377.433481] el0_svc+0x68/0x70
[ 377.433842] el0t_64_sync_handler+0x90/0x100
[ 377.434875] el0t_64_sync+0x190/0x198
[ 377.435497] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 245.912469] WARNING: CPU: 1 PID: 11082 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 245.915032] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 245.918390] CPU: 1 PID: 11082 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 245.919611] Hardware name: linux,dummy-virt (DT)
[ 245.920442] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 245.920969] pc : cleanup_mnt+0x11c/0x140
[ 245.921936] lr : cleanup_mnt+0x20/0x140
[ 245.922460] sp : ffff800083c2fcc0
[ 245.922844] x29: ffff800083c2fcc0 x28: ffff0000c3afd680 x27: 0000000000000000
[ 245.923678] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 245.925548] x23: ffffc09bb8e37b58 x22: ffff0000c3afd680 x21: ffff0000c3afdee4
[ 245.926055] x20: ffff0000c0ff6540 x19: 0000000000000000 x18: 0000000000000000
[ 245.926730] x17: ffff3f65453b0000 x16: ffffc09bb64feba0 x15: 0000000000000000
[ 245.928390] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 245.929566] x11: 00000000ffffcb07 x10: 0000000000000002 x9 : ffffc09bb65d9ee8
[ 245.930466] x8 : ffff800083c2fb48 x7 : 0000000000000000 x6 : 0000000000000000
[ 245.931513] x5 : ffffc09bb8839000 x4 : 0000000000000001 x3 : ffffffbfeff6996c
[ 245.932457] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 245.934108] Call trace:
[ 245.934711] cleanup_mnt+0x11c/0x140
[ 245.935248] __cleanup_mnt+0x1c/0x30
[ 245.935790] task_work_run+0x80/0xe8
[ 245.936240] do_notify_resume+0x204/0xeb8
[ 245.936720] el0_svc+0x12c/0x140
[ 245.937004] el0t_64_sync_handler+0x120/0x130
[ 245.937307] el0t_64_sync+0x190/0x198
[ 245.937754] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 245.912469] WARNING: CPU: 1 PID: 11082 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 245.915032] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 245.918390] CPU: 1 PID: 11082 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 245.919611] Hardware name: linux,dummy-virt (DT)
[ 245.920442] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 245.920969] pc : cleanup_mnt+0x11c/0x140
[ 245.921936] lr : cleanup_mnt+0x20/0x140
[ 245.922460] sp : ffff800083c2fcc0
[ 245.922844] x29: ffff800083c2fcc0 x28: ffff0000c3afd680 x27: 0000000000000000
[ 245.923678] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 245.925548] x23: ffffc09bb8e37b58 x22: ffff0000c3afd680 x21: ffff0000c3afdee4
[ 245.926055] x20: ffff0000c0ff6540 x19: 0000000000000000 x18: 0000000000000000
[ 245.926730] x17: ffff3f65453b0000 x16: ffffc09bb64feba0 x15: 0000000000000000
[ 245.928390] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 245.929566] x11: 00000000ffffcb07 x10: 0000000000000002 x9 : ffffc09bb65d9ee8
[ 245.930466] x8 : ffff800083c2fb48 x7 : 0000000000000000 x6 : 0000000000000000
[ 245.931513] x5 : ffffc09bb8839000 x4 : 0000000000000001 x3 : ffffffbfeff6996c
[ 245.932457] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 245.934108] Call trace:
[ 245.934711] cleanup_mnt+0x11c/0x140
[ 245.935248] __cleanup_mnt+0x1c/0x30
[ 245.935790] task_work_run+0x80/0xe8
[ 245.936240] do_notify_resume+0x204/0xeb8
[ 245.936720] el0_svc+0x12c/0x140
[ 245.937004] el0t_64_sync_handler+0x120/0x130
[ 245.937307] el0t_64_sync+0x190/0x198
[ 245.937754] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 1017.354341] WARNING: CPU: 0 PID: 16929 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 1017.356987] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 1017.360424] CPU: 0 PID: 16929 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 1017.361139] Hardware name: linux,dummy-virt (DT)
[ 1017.362366] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 1017.363312] pc : cleanup_mnt+0x11c/0x140
[ 1017.364404] lr : cleanup_mnt+0x20/0x140
[ 1017.364728] sp : ffff80008a173ca0
[ 1017.364987] x29: ffff80008a173ca0 x28: 000000000000000c x27: 0000000000000000
[ 1017.365565] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 1017.367560] x23: ffff0000c749b9e4 x22: ffffb255c90cfb50 x21: ffff0000c749b180
[ 1017.368221] x20: ffff0000c342a000 x19: 0000000000000000 x18: 0000000000000000
[ 1017.368873] x17: ffff4dab36b98000 x16: ffffb255c6912610 x15: 0000000000000000
[ 1017.369426] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1017.371160] x11: 0000000000000040 x10: 0000000000000002 x9 : ffffb255c69fa778
[ 1017.371804] x8 : ffff80008a173b38 x7 : 0000000000000000 x6 : 0000000000000000
[ 1017.372357] x5 : 0000000000000000 x4 : 0000000000000001 x3 : fffffbffeffe8eb0
[ 1017.372938] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 1017.373788] Call trace:
[ 1017.374089] cleanup_mnt+0x11c/0x140
[ 1017.374944] __cleanup_mnt+0x1c/0x30
[ 1017.375570] task_work_run+0x88/0xf8
[ 1017.375879] do_notify_resume+0x214/0x1158
[ 1017.376541] el0_svc+0xc8/0xe0
[ 1017.377112] el0t_64_sync_handler+0x120/0x130
[ 1017.377539] el0t_64_sync+0x190/0x198
[ 1017.378774] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 1017.354341] WARNING: CPU: 0 PID: 16929 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 1017.356987] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 1017.360424] CPU: 0 PID: 16929 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 1017.361139] Hardware name: linux,dummy-virt (DT)
[ 1017.362366] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 1017.363312] pc : cleanup_mnt+0x11c/0x140
[ 1017.364404] lr : cleanup_mnt+0x20/0x140
[ 1017.364728] sp : ffff80008a173ca0
[ 1017.364987] x29: ffff80008a173ca0 x28: 000000000000000c x27: 0000000000000000
[ 1017.365565] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 1017.367560] x23: ffff0000c749b9e4 x22: ffffb255c90cfb50 x21: ffff0000c749b180
[ 1017.368221] x20: ffff0000c342a000 x19: 0000000000000000 x18: 0000000000000000
[ 1017.368873] x17: ffff4dab36b98000 x16: ffffb255c6912610 x15: 0000000000000000
[ 1017.369426] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1017.371160] x11: 0000000000000040 x10: 0000000000000002 x9 : ffffb255c69fa778
[ 1017.371804] x8 : ffff80008a173b38 x7 : 0000000000000000 x6 : 0000000000000000
[ 1017.372357] x5 : 0000000000000000 x4 : 0000000000000001 x3 : fffffbffeffe8eb0
[ 1017.372938] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 1017.373788] Call trace:
[ 1017.374089] cleanup_mnt+0x11c/0x140
[ 1017.374944] __cleanup_mnt+0x1c/0x30
[ 1017.375570] task_work_run+0x88/0xf8
[ 1017.375879] do_notify_resume+0x214/0x1158
[ 1017.376541] el0_svc+0xc8/0xe0
[ 1017.377112] el0t_64_sync_handler+0x120/0x130
[ 1017.377539] el0t_64_sync+0x190/0x198
[ 1017.378774] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.308056] WARNING: CPU: 1 PID: 466 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 51.310507] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 51.313698] CPU: 1 PID: 466 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 51.314616] Hardware name: linux,dummy-virt (DT)
[ 51.315895] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 51.316878] pc : kvmalloc_node+0xfc/0x10c
[ 51.317672] lr : kvmalloc_node+0x64/0x10c
[ 51.318236] sp : ffff800080803ce0
[ 51.318598] x29: ffff800080803cf0 x28: ffff0000c0d4b000 x27: 0000000000000000
[ 51.319970] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0bd1680
[ 51.320908] x23: ffff0000c0bd1600 x22: cdd9d359722eeca4 x21: 00000000ffffffff
[ 51.321948] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 51.322860] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.323810] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.324562] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 51.325676] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 51.326590] x5 : 0000000000000000 x4 : ffff0000c0d4b000 x3 : 0000000000000000
[ 51.327052] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 51.327697] Call trace:
[ 51.328293] kvmalloc_node+0xfc/0x10c
[ 51.329015] alloc_fdtable+0x94/0x114
[ 51.330357] expand_files+0x78/0x318
[ 51.330813] ksys_dup3+0x60/0x128
[ 51.331560] __arm64_sys_dup3+0x20/0x30
[ 51.331969] invoke_syscall+0x48/0x114
[ 51.332377] el0_svc_common.constprop.0+0x40/0xe0
[ 51.332876] do_el0_svc+0x1c/0x28
[ 51.333463] el0_svc+0x38/0xc8
[ 51.334089] el0t_64_sync_handler+0x120/0x12c
[ 51.334967] el0t_64_sync+0x190/0x194
[ 51.335564] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 327.479195] WARNING: CPU: 1 PID: 11083 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 327.481341] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 327.484625] CPU: 1 PID: 11083 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 327.485306] Hardware name: linux,dummy-virt (DT)
[ 327.486081] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 327.486764] pc : cleanup_mnt+0x11c/0x140
[ 327.487216] lr : cleanup_mnt+0x20/0x140
[ 327.487637] sp : ffff8000898bbcc0
[ 327.488020] x29: ffff8000898bbcc0 x28: ffff0000c2036300 x27: 0000000000000000
[ 327.488838] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 327.489433] x23: ffffbaa5e209ab58 x22: ffff0000c2036300 x21: ffff0000c2036b64
[ 327.490162] x20: ffff0000c653d640 x19: 0000000000000000 x18: 0000000000000000
[ 327.490661] x17: ffff455b1dbe7000 x16: ffffbaa5df9089e0 x15: 00001e8480000000
[ 327.491441] x14: 00000000003d0900 x13: 0000000000000000 x12: 003d090000000000
[ 327.492121] x11: 0000000100001aae x10: 0000000000000002 x9 : ffffbaa5df9e7428
[ 327.492730] x8 : ffff8000898bbb48 x7 : 0000000000000000 x6 : 0000000000000000
[ 327.493597] x5 : ffffbaa5e1adf000 x4 : 0000000000000001 x3 : fffffbffefff2204
[ 327.494248] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 327.495061] Call trace:
[ 327.495411] cleanup_mnt+0x11c/0x140
[ 327.495762] __cleanup_mnt+0x1c/0x30
[ 327.496197] task_work_run+0x80/0xe8
[ 327.496621] do_notify_resume+0x214/0xf30
[ 327.497055] el0_svc+0xc8/0xe0
[ 327.497446] el0t_64_sync_handler+0x120/0x130
[ 327.497758] el0t_64_sync+0x190/0x198
[ 327.498240] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 327.479195] WARNING: CPU: 1 PID: 11083 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 327.481341] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 327.484625] CPU: 1 PID: 11083 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 327.485306] Hardware name: linux,dummy-virt (DT)
[ 327.486081] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 327.486764] pc : cleanup_mnt+0x11c/0x140
[ 327.487216] lr : cleanup_mnt+0x20/0x140
[ 327.487637] sp : ffff8000898bbcc0
[ 327.488020] x29: ffff8000898bbcc0 x28: ffff0000c2036300 x27: 0000000000000000
[ 327.488838] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 327.489433] x23: ffffbaa5e209ab58 x22: ffff0000c2036300 x21: ffff0000c2036b64
[ 327.490162] x20: ffff0000c653d640 x19: 0000000000000000 x18: 0000000000000000
[ 327.490661] x17: ffff455b1dbe7000 x16: ffffbaa5df9089e0 x15: 00001e8480000000
[ 327.491441] x14: 00000000003d0900 x13: 0000000000000000 x12: 003d090000000000
[ 327.492121] x11: 0000000100001aae x10: 0000000000000002 x9 : ffffbaa5df9e7428
[ 327.492730] x8 : ffff8000898bbb48 x7 : 0000000000000000 x6 : 0000000000000000
[ 327.493597] x5 : ffffbaa5e1adf000 x4 : 0000000000000001 x3 : fffffbffefff2204
[ 327.494248] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 327.495061] Call trace:
[ 327.495411] cleanup_mnt+0x11c/0x140
[ 327.495762] __cleanup_mnt+0x1c/0x30
[ 327.496197] task_work_run+0x80/0xe8
[ 327.496621] do_notify_resume+0x214/0xf30
[ 327.497055] el0_svc+0xc8/0xe0
[ 327.497446] el0t_64_sync_handler+0x120/0x130
[ 327.497758] el0t_64_sync+0x190/0x198
[ 327.498240] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 52.486270] WARNING: CPU: 1 PID: 469 at mm/util.c:632 kvmalloc_node+0xfc/0x108
[ 52.489069] Modules linked in:
[ 52.490775] CPU: 1 PID: 469 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 52.491969] Hardware name: Generic DT based system
[ 52.493736] unwind_backtrace from show_stack+0x10/0x14
[ 52.494602] show_stack from dump_stack_lvl+0x48/0x54
[ 52.495018] dump_stack_lvl from __warn+0xd4/0x200
[ 52.496319] __warn from warn_slowpath_fmt+0x11c/0x168
[ 52.497254] warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[ 52.498167] kvmalloc_node from alloc_fdtable+0x78/0x104
[ 52.499012] alloc_fdtable from expand_files+0x134/0x304
[ 52.499732] expand_files from ksys_dup3+0x58/0xd0
[ 52.500226] ksys_dup3 from ret_fast_syscall+0x0/0x4c
[ 52.501115] Exception stack(0xfa1c9fa8 to 0xfa1c9ff0)
[ 52.501593] 9fa0: 00440bcd 00000001 00000002 2000003c 00000000 00000000
[ 52.503200] 9fc0: 00440bcd 00000001 00442e6c 0000003f 0043e920 b6f6fce0 00000000 be9b23e0
[ 52.503660] 9fe0: 0000003f be9b21b4 b6ecef43 b6e4c786
[ 52.505084] ---[ end trace 0000000000000000 ]---
Home
[ 300.838075] BUG: Bad rss-counter state mm:b7eca513 type:MM_ANONPAGES val:1
Home
[ 300.838075] BUG: Bad rss-counter state mm:b7eca513 type:MM_ANONPAGES val:1
Home
--- cut here ---
[ 295.936571] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 295.944045] [00000023] *pgd=450a8003, *pmd=00000000
[ 295.955367] Internal error: Oops: 206 [#1] SMP ARM
[ 295.957497] Modules linked in:
[ 295.960606] CPU: 0 PID: 327 Comm: sh Not tainted 6.6.72-rc1 #1
[ 295.962070] Hardware name: Generic DT based system
[ 295.964444] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 295.967880] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 295.969249] pc : [<c065be18>] lr : [<c065bd34>] psr: a0070013
[ 295.970737] sp : fa151df8 ip : 00e5eab0 fp : fa151e30
[ 295.972193] r10: 00004dc0 r9 : c3001100 r8 : 00000000
[ 295.973873] r7 : 00004dc0 r6 : edbda1b8 r5 : 00000040 r4 : 00000040
[ 295.976243] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 295.978880] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 295.981204] Control: 30c5387d Table: 450a5700 DAC: fffffffd
[ 295.983114] Register r0 information: non-paged memory
[ 295.986132] Register r1 information: NULL pointer
[ 295.988088] Register r2 information: non-paged memory
[ 295.990154] Register r3 information: non-paged memory
[ 295.991119] Register r4 information: non-paged memory
[ 295.993524] Register r5 information: non-paged memory
[ 295.995627] Register r6 information: non-slab/vmalloc memory
[ 295.997953] Register r7 information: non-paged memory
[ 295.999629] Register r8 information: NULL pointer
[ 296.001517] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 296.005304] Register r10 information: non-paged memory
[ 296.006946] Register r11 information: 2-page vmalloc region starting at 0xfa150000 allocated at copy_process+0x164/0xdd8
[ 296.010173] Register r12 information: non-paged memory
[ 296.012114] Process sh (pid: 327, stack limit = 0xa30dea75)
[ 296.014136] Stack: (0xfa151df8 to 0xfa152000)
[ 296.016382] 1de0: c056079c c056079c
[ 296.019033] 1e00: fa151e64 00000000 00000040 6b777109 6b777109 c3001100 00000040 00004dc0
[ 296.021525] 1e20: c056079c 00000000 c056079c 00000000 fa151e60 c0414d54 c056079c 6b777109
[ 296.024207] 1e40: 000000bb 000000ba c5098700 c4888000 c4687300 c207b5c4 c300e2d8 00000000
[ 296.026694] 1e60: c300c098 c0414d54 00000000 000000f7 c300c090 00000000 fa151f78 c300c08c
[ 296.030341] 1e80: c300c080 c0560434 00000044 6b777109 c26985c0 c26985c0 ffffffff 000f6000
[ 296.033312] 1ea0: 000f6000 fa151f78 c416e928 00000004 fa151f70 c056be48 00000004 00000000
[ 296.036630] 1ec0: c26985c0 000f6000 fa151f78 c416e928 fa151f70 c0570e14 000f6000 6b777109
[ 296.039570] 1ee0: c416e900 c0570d70 00483c20 00000004 fa151f78 c0689078 fa151fa0 c055ea74
[ 296.041923] 1f00: c0689474 c4888000 fa151f3c 00000004 00000004 c4888000 00000004 c0580bb0
[ 296.044264] 1f20: c06b2de8 00000003 00000000 e1246ea0 c06b2f48 00000002 00000000 e1232d50
[ 296.046259] 1f40: 00000044 e126ec30 00000044 6b777109 00000001 6b777109 c416e900 c416e900
[ 296.048791] 1f60: 00483c20 fa151f78 00000004 00000004 fa151fa0 c0414d54 00000000 00000000
[ 296.050843] 1f80: 00000004 6b777109 00483c20 00000004 00000001 00000004 c04003c4 c4888000
[ 296.053215] 1fa0: 0048393c c0414d54 00483c20 00000004 00000001 00483c20 00000004 00000001
[ 296.056440] 1fc0: 00483c20 00000004 00000001 00000004 00000004 7fffffff 00483584 0048393c
[ 296.058930] 1fe0: 00000004 be9685e8 b6f082d3 b6e7d786 80070030 00000001 00000000 00000000
[ 296.061621] __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[ 296.064515] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 296.071693] ---[ end trace 0000000000000000 ]---
--- cut here ---
[ 300.777990] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.779269] [00000023] *pgd=449a5003, *pmd=00000000
[ 300.780197] Internal error: Oops: 206 [#6] SMP ARM
[ 300.780779] Modules linked in:
[ 300.781721] CPU: 0 PID: 383 Comm: sh Tainted: G D 6.6.72-rc1 #1
[ 300.782200] Hardware name: Generic DT based system
[ 300.783027] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.783852] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.784526] pc : [<c065be18>] lr : [<c065bd34>] psr: a00e0113
[ 300.784921] sp : fa175e18 ip : fa175dd8 fp : fa175e50
[ 300.785355] r10: 00000cc0 r9 : c3001100 r8 : ffffffff
[ 300.786318] r7 : 00000cc0 r6 : edbda1b8 r5 : c4648e00 r4 : 00000019
[ 300.787218] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.787626] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.788811] Control: 30c5387d Table: 4491cac0 DAC: fffffffd
[ 300.789717] Register r0 information: non-paged memory
[ 300.790875] Register r1 information: NULL pointer
[ 300.791457] Register r2 information: non-paged memory
[ 300.792298] Register r3 information: non-paged memory
[ 300.793596] Register r4 information: non-paged memory
[ 300.793970] Register r5 information: slab kmalloc-512 start c4648e00 pointer offset 0 size 512
[ 300.795562] Register r6 information: non-slab/vmalloc memory
[ 300.796513] Register r7 information: non-paged memory
[ 300.797236] Register r8 information: non-paged memory
[ 300.798289] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.799426] Register r10 information: non-paged memory
[ 300.799808] Register r11 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[ 300.800819] Register r12 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[ 300.801741] Process sh (pid: 383, stack limit = 0x09f7a260)
[ 300.802250] Stack: (0xfa175e18 to 0xfa176000)
[ 300.802784] 5e00: 00000000 fa175e64
[ 300.803608] 5e20: 00000000 00000000 00000019 00000000 96ed0d77 00000cc0 c4648e00 c3001100
[ 300.804517] 5e40: 464c457f c06ffc28 00000000 00000019 fa175e80 c0609944 c06ffc28 c40a4000
[ 300.805258] 5e60: 00000120 c40a4050 c4648e00 c4648e5c 464c457f fffffff8 00000000 fffff000
[ 300.805969] 5e80: fa175f08 c06ffc28 00000100 c41706c0 fa175ee0 c054a794 00000001 00000000
[ 300.806895] 5ea0: 00000000 fa175eec 00000000 00000000 00000000 00000000 c41706c0 00000000
[ 300.807761] 5ec0: 00000100 00000000 00000000 00000000 00000000 00004004 00000000 c40a4000
[ 300.808269] 5ee0: 00000154 00000000 96ed0d77 c26b5fe0 c4648e00 c28e7b90 00000001 c26b13b0
[ 300.809353] 5f00: fffffff8 fffffff8 fa175f50 c0694d0c 0000017f 0000017f c50d910c c50d8b00
[ 300.809789] 5f20: 00000000 c4648e5c 00000100 00000000 96ed0d77 fffffff9 fffffff2 c4648e00
[ 300.810203] 5f40: 004ed7a0 c50d8b00 c4580000 00000014 fa175f80 c06955cc ffffff9c 004eb5b0
[ 300.810608] 5f60: 004ed74c 004ed74c 004eb5b0 004ed7a4 0000000b c04003c4 c50d8b00 0000000b
[ 300.811043] 5f80: fa175fa0 c06951ec 00000000 c040d06c 004ed7a4 004eb5b0 004e4e4c 0000000b
[ 300.814134] 5fa0: 004e8224 c04003b4 004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[ 300.815098] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[ 300.816859] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68 60070030 004ed7a4 00000000 00000000
[ 300.817698] __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[ 300.818821] __kmalloc from load_elf_binary+0x22c/0xab8
[ 300.819751] load_elf_binary from bprm_execve+0x254/0x598
[ 300.820747] bprm_execve from do_execveat_common+0x2d0/0x324
[ 300.821435] do_execveat_common from sys_execve+0x44/0x4c
[ 300.821795] sys_execve from __sys_trace_return+0x0/0x10
[ 300.822564] Exception stack(0xfa175fa8 to 0xfa175ff0)
[ 300.823694] 5fa0: 004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[ 300.824750] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[ 300.825886] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68
[ 300.827081] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.828877] ---[ end trace 0000000000000000 ]---
--- cut here ---
[ 300.713684] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.715596] [00000023] *pgd=450af003, *pmd=00000000
[ 300.717405] Internal error: Oops: 206 [#5] SMP ARM
[ 300.718197] Modules linked in:
[ 300.719170] CPU: 0 PID: 326 Comm: sh Tainted: G D 6.6.72-rc1 #1
[ 300.720596] Hardware name: Generic DT based system
[ 300.721740] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.722608] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.722981] pc : [<c065be18>] lr : [<c065bd34>] psr: a00e0013
[ 300.723305] sp : fa14de18 ip : 00000000 fp : fa14de50
[ 300.723582] r10: 00000cc0 r9 : c3001100 r8 : ffffffff
[ 300.724437] r7 : 00000cc0 r6 : edbda1b8 r5 : c05813d8 r4 : 0000002c
[ 300.725253] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.727692] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.728936] Control: 30c5387d Table: 450a5600 DAC: fffffffd
[ 300.729289] Register r0 information: non-paged memory
[ 300.729688] Register r1 information: NULL pointer
[ 300.729957] Register r2 information: non-paged memory
[ 300.730240] Register r3 information: non-paged memory
[ 300.730524] Register r4 information: non-paged memory
[ 300.732037] Register r5 information: non-slab/vmalloc memory
[ 300.733742] Register r6 information: non-slab/vmalloc memory
[ 300.734742] Register r7 information: non-paged memory
[ 300.736337] Register r8 information: non-paged memory
[ 300.737440] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.739334] Register r10 information: non-paged memory
[ 300.740502] Register r11 information: 2-page vmalloc region starting at 0xfa14c000 allocated at copy_process+0x164/0xdd8
[ 300.742421] Register r12 information: NULL pointer
[ 300.742972] Process sh (pid: 326, stack limit = 0x1f6003ab)
[ 300.744498] Stack: (0xfa14de18 to 0xfa14e000)
[ 300.745292] de00: 0000000c c31421f8
[ 300.746040] de20: fa14de78 0000002c 0000002c 00000002 821e08e6 00000cc0 c05813d8 c3001100
[ 300.746454] de40: 00000024 c0554858 c0554f98 0000002c fa14de80 c0609944 c0554858 fa14df78
[ 300.748173] de60: c0581464 00000000 c05813d8 00000000 00000024 00000001 c0554f98 c50f7e08
[ 300.749193] de80: fa14deb8 c0554858 00000000 00000000 fa14df70 c2875b48 c262bb64 fa14df78
[ 300.750934] dea0: c055e5bc 0048fad8 00000002 fa14df78 c41baf28 00000002 fa14df70 c05813c8
[ 300.752368] dec0: fa14df70 c055e7c8 00000000 00000000 821e08e6 c41baf00 c055e5bc 0048fad8
[ 300.753511] dee0: 00000002 fa14df78 c41baf28 00000004 fa14df70 c0689078 fa14dfa0 c055ea74
[ 300.754701] df00: c0689474 c488c200 fa14df3c 00000004 00000002 c488c200 00000004 c0580bb0
[ 300.756828] df20: c06b2de8 00000003 00000000 22cd7380 c06b2f48 00000002 00000000 22cc7910
[ 300.757388] df40: 00000045 22e24010 00000045 821e08e6 00000001 821e08e6 c41baf00 c41baf00
[ 300.757816] df60: 0048fad8 fa14df78 00000002 00000004 fa14dfa0 c0414d54 00000000 00000000
[ 300.758218] df80: 00000002 821e08e6 0048fad8 00000002 00000001 00000004 c04003c4 c488c200
[ 300.758621] dfa0: 0048f964 c0414d54 0048fad8 00000002 00000001 0048fad8 00000002 00000001
[ 300.761518] dfc0: 0048fad8 00000002 00000001 00000004 00000002 7fffffff 0048f4a4 0048f964
[ 300.762437] dfe0: 00000004 be8dd5e8 b6eca2d3 b6e3f786 80070030 00000001 00000000 00000000
[ 300.765107] __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[ 300.765960] __kmalloc from tracepoint_probe_unregister+0xfc/0x4c4
[ 300.766639] tracepoint_probe_unregister from unregister_ftrace_graph+0x94/0xa4
[ 300.768319] unregister_ftrace_graph from ftrace_profile_write+0x20c/0x298
[ 300.768 309874] ftrace_profile_write from vfs_write+0x110/0x3c8
[ 300.770067] vfs_write from r
[ 300.771490] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.773100] ---[ end trace 0000000000000000 ]---
--- cut here ---
[ 300.847414] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.848725] [00000023] *pgd=44279003, *pmd=00000000
[ 300.849128] Internal error: Oops: 206 [#7] SMP ARM
[ 300.849384] Modules linked in:
[ 300.849575] CPU: 0 PID: 1 Comm: systemd Tainted: G D 6.6.72-rc1 #1
[ 300.851737] Hardware name: Generic DT based system
[ 300.852669] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.853676] LRKilled is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.854900] pc : [<c065be18>] lr : [
[ 300.856055] sp : f0825d48 ip : 00000000 fp : f0825d80
[ 300.857289] r10: 00000dc0 r9 : c3001100 r8 : ffffffff
[ 300.858149] r7 : 00000dc0 r6 : edbda1b8 r5 : c47f6680 r4 : 00000028
[ 300.858566] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.858848] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.859115] Control: 30c5387d Table: 432674c0 DAC: fffffffd
[ 300.859326] Register r0 information: non-paged memory
[ 300.859537] Register r1 information: NULL pointer
[ 300.859796] Register r2 information: non-paged memory
[ 300.860099] Register r3 information: non-paged memory
[ 300.861801] Register r4 information: non-paged memory
[ 300.863448] Register r5 information: slab kmalloc-128 start c47f6680 pointer offset 0 size 128
[ 300.865409] Register r6 information: non-slab/vmalloc memory
[ 300.867051] Register r7 information: non-paged memory
[ 300.867489] Register r8 information: non-paged memory
[ 300.867785] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.868269] Register r10 information: non-paged memory
[ 300.868650] Register r11 information: 2-page vmalloc region starting at 0xf0824000 allocated at copy_process+0x164/0xdd8
[ 300.870576] Register r12 information: NULL pointer
[ 300.871159] Process systemd (pid: 1, stack limit = 0x1294b5a9)
[ 300.871748] Stack: (0xf0825d48 to 0xf0826000)
[ 300.872309] 5d40: edbdae40 00000dc0 ffffffff c3002900 00000028 c065b9e4
[ 300.873247] 5d60: d1de3daa c072dad4 c47f6680 c31bb25c c3001100 00000028 c072dad4 00000dc0
[ 300.874212] 5d80: f0825db0 c0609e14 c072dad4 c06bce64 c4170600 c26977e8 c47f6680 c31bb25c
[ 300.874882] 5da0: 00000000 c4816600 c4170600 c3e22340 f0825dd8 c072dad4 c3e22340 c3e22340
[ 300.876019] 5dc0: c4170600 c417067c 00000041 c4170670 c072d8a4 c4170600 f0825e08 c06862ec
[ 300.877213] 5de0: c26b4724 c4170600 f0825e08 c06a0ce0 00020000 f0825e80 00000000 00000041
[ 300.878784] 5e00: c26b4724 00020000 f0825e78 c069af80 00000024 c3078658 f0825e70 000000e1
[ 300.880504] 5e20: 00000000 c3002b80 f0825ea0 c0568af4 f0825e70 00000024 c3220000 c26a5da0
[ 300.881929] 5e40: f0825e50 f0825e88 00000041 c0582128 00000000 c0582128 d1de3daa 00000000
[ 300.882893] 5e60: 00000001 f0825e80 c3220000 f0825f40 c3220000 00000142 f0825f38 c069a454
[ 300.883776] 5e80: c433eb50 c3c36550 6e32617e 0000000d c4898048 00000000 c33eb3d0 c38e8330
[ 300.884810] 5ea0: c3e22340 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[ 300.885451] 5ec0: 00000000 00000000 f0825ecc 00000000 00000000 00000000 00000000 00000000
[ 300.886328] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c4898000
[ 300.887730] 5f00: 00000000 00000002 ffffff9c 00000000 000041ed 00000000 000a0000 d1de3daa
[ 300.889007] 5f20: c4898000 ffffff9c 0000000c fffff000 c04003c4 00000142 f0825f68 c0686f14
[ 300.890554] 5f40: 00020000 00000000 00000004 00000100 00000001 d1de3daa 00636360 ffffff9c
[ 300.892236] 5f60: 00000000 000a0000 f0825fa0 c06870b4 000a0000 00000000 00000000 00000000
[ 300.893129] 5f80: 00000000 00000000 f0825fa0 d1de3daa 00636360 000a0000 00000000 00000142
[ 300.894227] 5fa0: 00000000 c04003b4 00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[ 300.895244] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[ 300.896206] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786 00030030 ffffff9c 00000000 00000000
[ 300.896851] __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[ 300.897847] kmalloc_trace from kernfs_fop_open+0x230/0x328
[ 300.899025] kernfs_fop_open from do_dentry_open+0x1e8/0x524
[ 300.899882] do_dentry_open from path_openat+0xa9c/0xc6c
[ 300.900421] path_openat from do_filp_open+0x8c/0x11c
[ 300.901201] do_filp_open from do_sys_openat2+0xa0/0xf0
[ 300.902114] do_sys_openat2 from sys_openat+0x9c/0xb8
[ 300.902554] sys_openat from __sys_trace_return+0x0/0x10
[ 300.903545] Exception stack(0xf0825fa8 to 0xf0825ff0)
[ 300.904129] 5fa0: 00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[ 300.904999] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[ 300.905812] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786
[ 300.906118] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.908909] ---[ end trace 0000000000000000 ]---
--- cut here ---
[ 296.214251] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 296.222261] [00000023] *pgd=450fc003, *pmd=00000000
[ 296.231417] Internal error: Oops: 206 [#2] SMP ARM
[ 296.232486] Modules linked in:
[ 296.234056] CPU: 0 PID: 380 Comm: cat Tainted: G D 6.6.72-rc1 #1
[ 296.236995] Hardware name: Generic DT based system
[ 296.238529] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 296.240509] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 296.242587] pc : [<c065be18>] lr : [<c065bd34>] psr: a00d0013
[ 296.244609] sp : fa179d40 ip : 015a9a80 fp : fa179d78
[ 296.246686] r10: 00000dc0 r9 : c3001100 r8 : ffffffff
[ 296.248444] r7 : 00000dc0 r6 : edbda1b8 r5 : c412b640 r4 : 00000010
[ 296.250286] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 296.252727] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 296.255372] Control: 30c5387d Table: 450f7d00 DAC: fffffffd
[ 296.257941] Register r0 information: non-paged memory
[ 296.259822] Register r1 information: NULL pointer
[ 296.261444] Register r2 information: non-paged memory
[ 296.263986] Register r3 information: non-paged memory
[ 296.266479] Register r4 information: zero-size pointer
[ 296.268359] Register r5 information: slab kmalloc-64 start c412b640 pointer offset 0 size 64
[ 296.272124] Register r6 information: non-slab/vmalloc memory
[ 296.274142] Register r7 information: non-paged memory
[ 296.275768] Register r8 information: non-paged memory
[ 296.277334] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 296.280529] Register r10 information: non-paged memory
[ 296.282014] Register r11 information: 2-page vmalloc region starting at 0xfa178000 allocated at copy_process+0x164/0xdd8
[ 296.285282] Register r12 information: non-paged memory
[ 296.287727] Process cat (pid: 380, stack limit = 0xd44bc6fc)
[ 296.289711] Stack: (0xfa179d40 to 0xfa17a000)
[ 296.291216] 9d40: c0577d98 c0577d98 fa179dac 00000000 00000010 bb6785ad bb6785ad c0577d98
[ 296.294116] 9d60: c412b640 c055e2d8 c3001100 00000010 c0577d98 00000dc0 fa179da8 c0414d54
[ 296.297632] 9d80: c0577d98 bb6785ad c3900510 c4b70008 c412b640 c055e2d8 00000041 c416ea30
[ 296.299798] 9da0: c0577cd0 c412b64c edbe1f50 c0414d54 00000044 c416e9c0 c412b650 c3900510
[ 296.303388] 9dc0: c416e9c0 c416ea3c 00000041 c416ea30 c0577cd0 c416e9c0 fa179e08 c06862ec
[ 296.305623] 9de0: 00000000 c0414d20 fa179e80 c416e9c0 00020000 fa179e80 00000000 00000041
[ 296.308525] 9e00: c26b4724 00020000 fa179e78 c0414d54 bb6785ad c069a3f0 00000002 bb6785ad
[ 296.310786] 9e20: c069a3f0 c0686f14 fa179f3c ffffff9c fa179f38 c04151ac c4db2100 fa179f40
[ 296.312761] 9e40: fa179e50 fa179e88 00000041 00000000 00000000 bb6785ad bb6785ad 00000000
[ 296.315952] 9e60: 00000001 fa179e80 c4db2100 fa179f40 c4db2100 00000142 fa179f38 c0414d54
[ 296.318837] 9e80: c453ad90 c38e7330 5490dc95 00000009 c489f036 00000000 c33eb3d0 c38e8330
[ 296.321258] 9ea0: c3900510 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[ 296.323902] 9ec0: 00000000 00000000 fa179ecc 00000000 00000000 00000000 00000000 00000000
[ 296.326267] 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c489f000
[ 296.328499] 9f00: 00000000 00000002 ffffff9c 00000000 000041e8 00000000 c489f000 bb6785ad
[ 296.330706] 9f20: c489f000 ffffff9c 00000003 fffff000 c04003c4 00000142 fa179f68 c0414d54
[ 296.333038] 9f40: 00020000 00000000 00000004 00000100 00000001 bb6785ad bedfcd5f ffffff9c
[ 296.335098] 9f60: 00000000 00020000 fa179fa0 c0414d54 00020000 00000000 00000000 00000000
[ 296.337306] 9f80: 00000000 00000000 bedfcd5f bb6785ad 00020000 00000000 bedfcd5f 00000142
[ 296.339376] 9fa0: 00485e38 c0414d54 00020000 00000000 ffffff9c bedfcd5f 00020000 00000000
[ 296.342019] 9fc0: 00020000 00000000 bedfcd5f 00000142 00001000 00484834 00020000 00485e38
[ 296.344042] 9fe0: 00000142 bedfc970 b6ebbdf7 b6e32786 200d0030 ffffff9c 00000000 00000000
[ 296.346688] __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[ 296.348515] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 296.354985] ---[ end trace 0000000000000000 ]---
--- cut here ---
[ 300.631961] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.633277] [00000023] *pgd=449a1003, *pmd=00000000
[ 300.634761] Internal error: Oops: 206 [#4] SMP ARM
[ 300.635210] Modules linked in:
[ 300.635482] CPU: 0 PID: 314 Comm: sh Tainted: G D 6.6.72-rc1 #1
[ 300.637139] Hardware name: Generic DT based system
[ 300.639824] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.640541] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.640851] pc : [<c065be18>] lr : [<c065bd34>] psr: a0000013
[ 300.641171] sp : fa0add48 ip : c4696038 fp : fa0add80
[ 300.641441] r10: 00000cc0 r9 : c3001100 r8 : ffffffff
[ 300.641824] r7 : 00000cc0 r6 : edbda1b8 r5 : c50d8000 r4 : 00000020
[ 300.642975] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.643914] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.645003] Control: 30c5387d Table: 445dd6c0 DAC: fffffffd
[ 300.646074] Register r0 information: non-paged memory
[ 300.646898] Register r1 information: NULL pointer
[ 300.647194] Register r2 information: non-paged memory
[ 300.648277] Register r3 information: non-paged memory
[ 300.649340] Register r4 information: non-paged memory
[ 300.650474] Register r5 information: slab task_struct start c50d8000 pointer offset 0 size 2816
[ 300.651797] Register r6 information: non-slab/vmalloc memory
[ 300.652116] Register r7 information: non-paged memory
[ 300.653327] Register r8 information: non-paged memory
[ 300.654048] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.655071] Register r10 information: non-paged memory
[ 300.655373] Register r11 information: 2-page vmalloc region starting at 0xfa0ac000 allocated at copy_process+0x164/0xdd8
[ 300.656693] Register r12 information: slab mm_struct start c4695e00 pointer offset 568 size 768
[ 300.658128] Process sh (pid: 314, stack limit = 0xec2da698)
[ 300.659399] Stack: (0xfa0add48 to 0xfa0ae000)
[ 300.660616] dd40: c3002380 c0454874 c4695e00 c3078658 00000020 c06073e0
[ 300.662102] dd60: dc7c6b63 c0420458 c50d8000 00000000 c3001100 00000020 c0420458 00000cc0
[ 300.662831] dd80: fa0addb0 c0609e14 c0420458 c4961288 fa0addc0 c4695e00 c50d8000 00000000
[ 300.663553] dda0: 00000000 c26276a8 c4695e00 c4695fb8 fa0addd0 c0420458 c4695e00 c50d8000
[ 300.664733] ddc0: 00000000 00000000 c26276a8 c50d8000 fa0ade00 c04524a4 c0454874 c4695e00
[ 300.666055] dde0: dc7c6b63 00000000 c50d8000 01200000 c330cc00 fa0adf30 c4695e00 c488ee00
[ 300.667043] de00: fa0ade88 c045489c 60000093 00000000 c1684c30 00000000 c25d2f90 c49a46d4
[ 300.668134] de20: 0000027e c057bb98 a0000013 c4826f40 c488ee00 000007e8 fa0ade48 c1684c30
[ 300.669213] de40: c4007700 c45d5500 fa0ade68 c04c5534 a0000013 dc7c6b63 c4007700 c04547f4
[ 300.669722] de60: c4007700 00000000 dc7c6b63 00000000 00000000 c488ee00 01200000 fa0adf30
[ 300.671158] de80: c50d86f8 00000000 fa0adee8 c0453928 40000000 40000002 c50d865c c488f5d8
[ 300.672488] dea0: 00000000 00000000 00000000 c50d8000 00000000 00000000 00000000 00000000
[ 300.673784] dec0: 00000000 c32c2978 dc7c6b63 00000000 01200000 fa0adf30 00000000 fa0adf30
[ 300.675280] dee0: 00000000 00000078 fa0adf28 c0455504 c25d2f90 c49a46d4 c04003c4 c488ee00
[ 300.676123] df00: fa0adf18 c05d0f68 dc7c6b63 01200011 00000000 00000000 00000000 fa0adf30
[ 300.677713] df20: 00000000 00000078 fa0adfa0 c0455ad4 01200000 00000000 00000000 b6f7dce8
[ 300.678608] df40: 00000000 00000000 00000011 00000000 00000000 00000000 00000000 00000000
[ 300.679438] df60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 300.680108] df80: 00000078 dc7c6b63 b6f7dce8 b6f7e180 00000001 00000078 c04003c4 c488ee00
[ 300.680862] dfa0: 0043b91c c04003b4 b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[ 300.681997] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[ 300.683431] dfe0: 00000078 bef955d0 b6ee549f b6e7c786 20000030 01200011 00000000 00000000
[ 300.684753] __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[ 300.685484] kmalloc_trace from pgd_alloc+0x2c/0x1e4
[ 300.686451] pgd_alloc from mm_init+0x114/0x27c
[ 300.687090] mm_init from copy_mm+0x98/0x7c8
[ 300.687558] copy_mm from copy_process+0x618/0xdd8
[ 300.688011] copy_process from kernel_clone+0xa0/0x320
[ 300.688394] kernel_clone from sys_clone+0xa0/0xbc
[ 300.689303] sys_clone from __sys_trace_return+0x0/0x10
[ 300.690767] Exception stack(0xfa0adfa8 to 0xfa0adff0)
[ 300.691632] dfa0: b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[ 300.692108] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[ 300.692498] dfe0: 00000078 bef955d0 b6ee549f b6e7c786
[ 300.693248] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.695600] ---[ end trace 0000000000000000 ]---
--- cut here ---
[ 296.924328] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 296.931932] [00000023] *pgd=80000040204003, *pmd=00000000
[ 296.940569] Internal error: Oops: 206 [#3] SMP ARM
[ 296.941453] Modules linked in:
[ 296.943906] CPU: 0 PID: 11 Comm: kworker/u4:0 Tainted: G D 6.6.72-rc1 #1
[ 296.945407] Hardware name: Generic DT based system
[ 296.946181] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work
[ 296.948809] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 296.949452] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 296.950457] pc : [<c065be18>] lr : [<c065bd34>] psr: a0030013
[ 296.952819] sp : f0875c10 ip : 033b3d50 fp : f0875c48
[ 296.954419] r10: 00000d40 r9 : c3001100 r8 : ffffffff
[ 296.956484] r7 : 00000d40 r6 : edbda1b8 r5 : 00000000 r4 : 00000040
[ 296.957144] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 296.957892] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 296.960726] Control: 30c5387d Table: 4491cac0 DAC: fffffffd
[ 296.962855] Register r0 information: non-paged memory
[ 296.964276] Register r1 information: NULL pointer
[ 296.964896] Register r2 information: non-paged memory
[ 296.965538] Register r3 information: non-paged memory
[ 296.967845] Register r4 information: non-paged memory
[ 296.969992] Register r5 information: NULL pointer
[ 296.971937] Register r6 information: non-slab/vmalloc memory
[ 296.973710] Register r7 information: non-paged memory
[ 296.975900] Register r8 information: non-paged memory
[ 296.977399] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 296.979819] Register r10 information: non-paged memory
[ 296.982087] Register r11 information: 2-page vmalloc region starting at 0xf0874000 allocated at copy_process+0x164/0xdd8
[ 296.985556] Register r12 information: non-paged memory
[ 296.987650] Process kworker/u4:0 (pid: 11, stack limit = 0x658c46cb)
[ 296.989120] Stack: (0xf0875c10 to 0xf0876000)
[ 296.990551] 5c00: c073ce34 c073ce34 f0875c7c 00000000
[ 296.993262] 5c20: 00000040 987168bd 987168bd 00000d40 00000000 c3001100 00000000 c073ce34
[ 296.995144] 5c40: 00000c40 00000040 f0875c78 c0414d54 c073ce34 987168bd c392f768 c392f690
[ 296.996517] 5c60: 00000000 000000ee 00000000 00000000 00000c40 00000000 f0875cc8 c0414d54
[ 296.999250] 5c80: 00000000 00000000 c0789c48 00000006 00000000 217ed860 00000045 217ff9b0
[ 297.001255] 5ca0: 00000000 987168bd c392f768 c385d000 00000013 f0875e78 00000001 f0875d30
[ 297.002390] 5cc0: c392f768 00000000 f0875de8 c0414d54 00000013 c057bc64 c3226e00 f0875d24
[ 297.005183] 5ce0: c49a46d4 00000000 c057bc64 c3226e00 f0875d24 c49a46d4 00000000 00000000
[ 297.007608] 5d00: 0000fc40 c0580bb0 f0875e60 f0875d60 c057bc64 c057bc64 c04ebd28 00000005
[ 297.008389] 5d20: c4138000 217d6e10 00000045 217d7560 00000000 00000000 00000000 00000000
[ 297.009142] 5d40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 297.010063] 5d60: 00000000 00000000 00030013 00000000 00000000 00000000 00000000 c3226e00
[ 297.013180] 5d80: 00000000 00000000 00000000 00000000 c392f750 c0580bb0 f0875e60 f0875df0
[ 297.016144] 5da0: c07599b8 c07599b8 c1680a70 00000005 00000000 217b9870 00000045 217c94b0
[ 297.018396] 5dc0: 00000045 987168bd 00000013 00000013 f0875e78 00000001 c385d000 c392f768
[ 297.019214] 5de0: c385d000 c392f750 f0875e60 c0414d54 c0743df0 c0580ac4 987168bd c0743df0
[ 297.021401] 5e00: 00000003 987168bd c0743df0 c0744040 f0875eb4 c4362330 f0875eb0 c04151ac
[ 297.023839] 5e20: 00000000 00000000 00000000 000000ee 00000712 00000000 0007a6ed 90000000
[ 297.025620] 5e40: 987168bd c392f768 00000000 00000001 00000000 00000000 c206a8c7 c385d000
[ 297.028207] 5e60: f0875eb0 c0414d54 00000045 987168bd c073b680 00000003 0007a6ed 00000000
[ 297.028990] 5e80: 000000ee 00000001 00000000 00000000 987168bd c387215c 00000000 c385d000
[ 297.030673] 5ea0: c4362330 c3872140 00000000 c28eb114 f0875ed8 c0414d54 00001000 f0875ee8
[ 297.032865] 5ec0: 00000000 f0875ee8 c3872140 c4054b05 c392f768 c28eb114 f0875f10 c0414d54
[ 297.035853] 5ee0: f0875f10 c04745e0 f0875ee8 f0875ee8 987168bd c300c900 c507f2d4 c392f964
[ 297.037648] 5f00: c4054b05 c4054b00 c300e600 c4054b78 f0875f58 c0414d54 c1684b38 00000000
[ 297.040018] 5f20: 00000000 214f4780 00000045 c300c918 c300c950 c300c92c c4054b05 c300e620
[ 297.041153] 5f40: c300e620 c300c92c c300c92c c300e600 c300e620 c300c900 f0875f80 c0414d54
[ 297.042522] 5f60: c3226e00 00000040 c32275ec c31c4a94 c31c4a80 c047c598 c300c900 c3226e00
[ 297.044957] 5f80: f0875fa8 c048343c c3226e00 c31c4140 c048330c 00000000 00000000 00000000
[ 297.047090] 5fa0: 00000000 00000000 00000000 c0400244 00000000 00000000 00000000 00000000
[ 297.047856] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 297.048590] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[ 297.052157] __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[ 297.054274] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 297.058056] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 300.777990] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.779269] [00000023] *pgd=449a5003, *pmd=00000000
[ 300.780197] Internal error: Oops: 206 [#6] SMP ARM
[ 300.780779] Modules linked in:
[ 300.781721] CPU: 0 PID: 383 Comm: sh Tainted: G D 6.6.72-rc1 #1
[ 300.782200] Hardware name: Generic DT based system
[ 300.783027] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.783852] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.784526] pc : [<c065be18>] lr : [<c065bd34>] psr: a00e0113
[ 300.784921] sp : fa175e18 ip : fa175dd8 fp : fa175e50
[ 300.785355] r10: 00000cc0 r9 : c3001100 r8 : ffffffff
[ 300.786318] r7 : 00000cc0 r6 : edbda1b8 r5 : c4648e00 r4 : 00000019
[ 300.787218] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.787626] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.788811] Control: 30c5387d Table: 4491cac0 DAC: fffffffd
[ 300.789717] Register r0 information: non-paged memory
[ 300.790875] Register r1 information: NULL pointer
[ 300.791457] Register r2 information: non-paged memory
[ 300.792298] Register r3 information: non-paged memory
[ 300.793596] Register r4 information: non-paged memory
[ 300.793970] Register r5 information: slab kmalloc-512 start c4648e00 pointer offset 0 size 512
[ 300.795562] Register r6 information: non-slab/vmalloc memory
[ 300.796513] Register r7 information: non-paged memory
[ 300.797236] Register r8 information: non-paged memory
[ 300.798289] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.799426] Register r10 information: non-paged memory
[ 300.799808] Register r11 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[ 300.800819] Register r12 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[ 300.801741] Process sh (pid: 383, stack limit = 0x09f7a260)
[ 300.802250] Stack: (0xfa175e18 to 0xfa176000)
[ 300.802784] 5e00: 00000000 fa175e64
[ 300.803608] 5e20: 00000000 00000000 00000019 00000000 96ed0d77 00000cc0 c4648e00 c3001100
[ 300.804517] 5e40: 464c457f c06ffc28 00000000 00000019 fa175e80 c0609944 c06ffc28 c40a4000
[ 300.805258] 5e60: 00000120 c40a4050 c4648e00 c4648e5c 464c457f fffffff8 00000000 fffff000
[ 300.805969] 5e80: fa175f08 c06ffc28 00000100 c41706c0 fa175ee0 c054a794 00000001 00000000
[ 300.806895] 5ea0: 00000000 fa175eec 00000000 00000000 00000000 00000000 c41706c0 00000000
[ 300.807761] 5ec0: 00000100 00000000 00000000 00000000 00000000 00004004 00000000 c40a4000
[ 300.808269] 5ee0: 00000154 00000000 96ed0d77 c26b5fe0 c4648e00 c28e7b90 00000001 c26b13b0
[ 300.809353] 5f00: fffffff8 fffffff8 fa175f50 c0694d0c 0000017f 0000017f c50d910c c50d8b00
[ 300.809789] 5f20: 00000000 c4648e5c 00000100 00000000 96ed0d77 fffffff9 fffffff2 c4648e00
[ 300.810203] 5f40: 004ed7a0 c50d8b00 c4580000 00000014 fa175f80 c06955cc ffffff9c 004eb5b0
[ 300.810608] 5f60: 004ed74c 004ed74c 004eb5b0 004ed7a4 0000000b c04003c4 c50d8b00 0000000b
[ 300.811043] 5f80: fa175fa0 c06951ec 00000000 c040d06c 004ed7a4 004eb5b0 004e4e4c 0000000b
[ 300.814134] 5fa0: 004e8224 c04003b4 004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[ 300.815098] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[ 300.816859] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68 60070030 004ed7a4 00000000 00000000
[ 300.817698] __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[ 300.818821] __kmalloc from load_elf_binary+0x22c/0xab8
[ 300.819751] load_elf_binary from bprm_execve+0x254/0x598
[ 300.820747] bprm_execve from do_execveat_common+0x2d0/0x324
[ 300.821435] do_execveat_common from sys_execve+0x44/0x4c
[ 300.821795] sys_execve from __sys_trace_return+0x0/0x10
[ 300.822564] Exception stack(0xfa175fa8 to 0xfa175ff0)
[ 300.823694] 5fa0: 004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[ 300.824750] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[ 300.825886] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68
[ 300.827081] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.828877] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 296.924328] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 296.931932] [00000023] *pgd=80000040204003, *pmd=00000000
[ 296.940569] Internal error: Oops: 206 [#3] SMP ARM
[ 296.941453] Modules linked in:
[ 296.943906] CPU: 0 PID: 11 Comm: kworker/u4:0 Tainted: G D 6.6.72-rc1 #1
[ 296.945407] Hardware name: Generic DT based system
[ 296.946181] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work
[ 296.948809] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 296.949452] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 296.950457] pc : [<c065be18>] lr : [<c065bd34>] psr: a0030013
[ 296.952819] sp : f0875c10 ip : 033b3d50 fp : f0875c48
[ 296.954419] r10: 00000d40 r9 : c3001100 r8 : ffffffff
[ 296.956484] r7 : 00000d40 r6 : edbda1b8 r5 : 00000000 r4 : 00000040
[ 296.957144] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 296.957892] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 296.960726] Control: 30c5387d Table: 4491cac0 DAC: fffffffd
[ 296.962855] Register r0 information: non-paged memory
[ 296.964276] Register r1 information: NULL pointer
[ 296.964896] Register r2 information: non-paged memory
[ 296.965538] Register r3 information: non-paged memory
[ 296.967845] Register r4 information: non-paged memory
[ 296.969992] Register r5 information: NULL pointer
[ 296.971937] Register r6 information: non-slab/vmalloc memory
[ 296.973710] Register r7 information: non-paged memory
[ 296.975900] Register r8 information: non-paged memory
[ 296.977399] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 296.979819] Register r10 information: non-paged memory
[ 296.982087] Register r11 information: 2-page vmalloc region starting at 0xf0874000 allocated at copy_process+0x164/0xdd8
[ 296.985556] Register r12 information: non-paged memory
[ 296.987650] Process kworker/u4:0 (pid: 11, stack limit = 0x658c46cb)
[ 296.989120] Stack: (0xf0875c10 to 0xf0876000)
[ 296.990551] 5c00: c073ce34 c073ce34 f0875c7c 00000000
[ 296.993262] 5c20: 00000040 987168bd 987168bd 00000d40 00000000 c3001100 00000000 c073ce34
[ 296.995144] 5c40: 00000c40 00000040 f0875c78 c0414d54 c073ce34 987168bd c392f768 c392f690
[ 296.996517] 5c60: 00000000 000000ee 00000000 00000000 00000c40 00000000 f0875cc8 c0414d54
[ 296.999250] 5c80: 00000000 00000000 c0789c48 00000006 00000000 217ed860 00000045 217ff9b0
[ 297.001255] 5ca0: 00000000 987168bd c392f768 c385d000 00000013 f0875e78 00000001 f0875d30
[ 297.002390] 5cc0: c392f768 00000000 f0875de8 c0414d54 00000013 c057bc64 c3226e00 f0875d24
[ 297.005183] 5ce0: c49a46d4 00000000 c057bc64 c3226e00 f0875d24 c49a46d4 00000000 00000000
[ 297.007608] 5d00: 0000fc40 c0580bb0 f0875e60 f0875d60 c057bc64 c057bc64 c04ebd28 00000005
[ 297.008389] 5d20: c4138000 217d6e10 00000045 217d7560 00000000 00000000 00000000 00000000
[ 297.009142] 5d40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 297.010063] 5d60: 00000000 00000000 00030013 00000000 00000000 00000000 00000000 c3226e00
[ 297.013180] 5d80: 00000000 00000000 00000000 00000000 c392f750 c0580bb0 f0875e60 f0875df0
[ 297.016144] 5da0: c07599b8 c07599b8 c1680a70 00000005 00000000 217b9870 00000045 217c94b0
[ 297.018396] 5dc0: 00000045 987168bd 00000013 00000013 f0875e78 00000001 c385d000 c392f768
[ 297.019214] 5de0: c385d000 c392f750 f0875e60 c0414d54 c0743df0 c0580ac4 987168bd c0743df0
[ 297.021401] 5e00: 00000003 987168bd c0743df0 c0744040 f0875eb4 c4362330 f0875eb0 c04151ac
[ 297.023839] 5e20: 00000000 00000000 00000000 000000ee 00000712 00000000 0007a6ed 90000000
[ 297.025620] 5e40: 987168bd c392f768 00000000 00000001 00000000 00000000 c206a8c7 c385d000
[ 297.028207] 5e60: f0875eb0 c0414d54 00000045 987168bd c073b680 00000003 0007a6ed 00000000
[ 297.028990] 5e80: 000000ee 00000001 00000000 00000000 987168bd c387215c 00000000 c385d000
[ 297.030673] 5ea0: c4362330 c3872140 00000000 c28eb114 f0875ed8 c0414d54 00001000 f0875ee8
[ 297.032865] 5ec0: 00000000 f0875ee8 c3872140 c4054b05 c392f768 c28eb114 f0875f10 c0414d54
[ 297.035853] 5ee0: f0875f10 c04745e0 f0875ee8 f0875ee8 987168bd c300c900 c507f2d4 c392f964
[ 297.037648] 5f00: c4054b05 c4054b00 c300e600 c4054b78 f0875f58 c0414d54 c1684b38 00000000
[ 297.040018] 5f20: 00000000 214f4780 00000045 c300c918 c300c950 c300c92c c4054b05 c300e620
[ 297.041153] 5f40: c300e620 c300c92c c300c92c c300e600 c300e620 c300c900 f0875f80 c0414d54
[ 297.042522] 5f60: c3226e00 00000040 c32275ec c31c4a94 c31c4a80 c047c598 c300c900 c3226e00
[ 297.044957] 5f80: f0875fa8 c048343c c3226e00 c31c4140 c048330c 00000000 00000000 00000000
[ 297.047090] 5fa0: 00000000 00000000 00000000 c0400244 00000000 00000000 00000000 00000000
[ 297.047856] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 297.048590] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[ 297.052157] __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[ 297.054274] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 297.058056] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 300.847414] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.848725] [00000023] *pgd=44279003, *pmd=00000000
[ 300.849128] Internal error: Oops: 206 [#7] SMP ARM
[ 300.849384] Modules linked in:
[ 300.849575] CPU: 0 PID: 1 Comm: systemd Tainted: G D 6.6.72-rc1 #1
[ 300.851737] Hardware name: Generic DT based system
[ 300.852669] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.853676] LRKilled is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.854900] pc : [<c065be18>] lr : [
[ 300.856055] sp : f0825d48 ip : 00000000 fp : f0825d80
[ 300.857289] r10: 00000dc0 r9 : c3001100 r8 : ffffffff
[ 300.858149] r7 : 00000dc0 r6 : edbda1b8 r5 : c47f6680 r4 : 00000028
[ 300.858566] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.858848] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.859115] Control: 30c5387d Table: 432674c0 DAC: fffffffd
[ 300.859326] Register r0 information: non-paged memory
[ 300.859537] Register r1 information: NULL pointer
[ 300.859796] Register r2 information: non-paged memory
[ 300.860099] Register r3 information: non-paged memory
[ 300.861801] Register r4 information: non-paged memory
[ 300.863448] Register r5 information: slab kmalloc-128 start c47f6680 pointer offset 0 size 128
[ 300.865409] Register r6 information: non-slab/vmalloc memory
[ 300.867051] Register r7 information: non-paged memory
[ 300.867489] Register r8 information: non-paged memory
[ 300.867785] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.868269] Register r10 information: non-paged memory
[ 300.868650] Register r11 information: 2-page vmalloc region starting at 0xf0824000 allocated at copy_process+0x164/0xdd8
[ 300.870576] Register r12 information: NULL pointer
[ 300.871159] Process systemd (pid: 1, stack limit = 0x1294b5a9)
[ 300.871748] Stack: (0xf0825d48 to 0xf0826000)
[ 300.872309] 5d40: edbdae40 00000dc0 ffffffff c3002900 00000028 c065b9e4
[ 300.873247] 5d60: d1de3daa c072dad4 c47f6680 c31bb25c c3001100 00000028 c072dad4 00000dc0
[ 300.874212] 5d80: f0825db0 c0609e14 c072dad4 c06bce64 c4170600 c26977e8 c47f6680 c31bb25c
[ 300.874882] 5da0: 00000000 c4816600 c4170600 c3e22340 f0825dd8 c072dad4 c3e22340 c3e22340
[ 300.876019] 5dc0: c4170600 c417067c 00000041 c4170670 c072d8a4 c4170600 f0825e08 c06862ec
[ 300.877213] 5de0: c26b4724 c4170600 f0825e08 c06a0ce0 00020000 f0825e80 00000000 00000041
[ 300.878784] 5e00: c26b4724 00020000 f0825e78 c069af80 00000024 c3078658 f0825e70 000000e1
[ 300.880504] 5e20: 00000000 c3002b80 f0825ea0 c0568af4 f0825e70 00000024 c3220000 c26a5da0
[ 300.881929] 5e40: f0825e50 f0825e88 00000041 c0582128 00000000 c0582128 d1de3daa 00000000
[ 300.882893] 5e60: 00000001 f0825e80 c3220000 f0825f40 c3220000 00000142 f0825f38 c069a454
[ 300.883776] 5e80: c433eb50 c3c36550 6e32617e 0000000d c4898048 00000000 c33eb3d0 c38e8330
[ 300.884810] 5ea0: c3e22340 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[ 300.885451] 5ec0: 00000000 00000000 f0825ecc 00000000 00000000 00000000 00000000 00000000
[ 300.886328] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c4898000
[ 300.887730] 5f00: 00000000 00000002 ffffff9c 00000000 000041ed 00000000 000a0000 d1de3daa
[ 300.889007] 5f20: c4898000 ffffff9c 0000000c fffff000 c04003c4 00000142 f0825f68 c0686f14
[ 300.890554] 5f40: 00020000 00000000 00000004 00000100 00000001 d1de3daa 00636360 ffffff9c
[ 300.892236] 5f60: 00000000 000a0000 f0825fa0 c06870b4 000a0000 00000000 00000000 00000000
[ 300.893129] 5f80: 00000000 00000000 f0825fa0 d1de3daa 00636360 000a0000 00000000 00000142
[ 300.894227] 5fa0: 00000000 c04003b4 00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[ 300.895244] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[ 300.896206] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786 00030030 ffffff9c 00000000 00000000
[ 300.896851] __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[ 300.897847] kmalloc_trace from kernfs_fop_open+0x230/0x328
[ 300.899025] kernfs_fop_open from do_dentry_open+0x1e8/0x524
[ 300.899882] do_dentry_open from path_openat+0xa9c/0xc6c
[ 300.900421] path_openat from do_filp_open+0x8c/0x11c
[ 300.901201] do_filp_open from do_sys_openat2+0xa0/0xf0
[ 300.902114] do_sys_openat2 from sys_openat+0x9c/0xb8
[ 300.902554] sys_openat from __sys_trace_return+0x0/0x10
[ 300.903545] Exception stack(0xf0825fa8 to 0xf0825ff0)
[ 300.904129] 5fa0: 00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[ 300.904999] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[ 300.905812] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786
[ 300.906118] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.908909] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 300.713684] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.715596] [00000023] *pgd=450af003, *pmd=00000000
[ 300.717405] Internal error: Oops: 206 [#5] SMP ARM
[ 300.718197] Modules linked in:
[ 300.719170] CPU: 0 PID: 326 Comm: sh Tainted: G D 6.6.72-rc1 #1
[ 300.720596] Hardware name: Generic DT based system
[ 300.721740] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.722608] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.722981] pc : [<c065be18>] lr : [<c065bd34>] psr: a00e0013
[ 300.723305] sp : fa14de18 ip : 00000000 fp : fa14de50
[ 300.723582] r10: 00000cc0 r9 : c3001100 r8 : ffffffff
[ 300.724437] r7 : 00000cc0 r6 : edbda1b8 r5 : c05813d8 r4 : 0000002c
[ 300.725253] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.727692] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.728936] Control: 30c5387d Table: 450a5600 DAC: fffffffd
[ 300.729289] Register r0 information: non-paged memory
[ 300.729688] Register r1 information: NULL pointer
[ 300.729957] Register r2 information: non-paged memory
[ 300.730240] Register r3 information: non-paged memory
[ 300.730524] Register r4 information: non-paged memory
[ 300.732037] Register r5 information: non-slab/vmalloc memory
[ 300.733742] Register r6 information: non-slab/vmalloc memory
[ 300.734742] Register r7 information: non-paged memory
[ 300.736337] Register r8 information: non-paged memory
[ 300.737440] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.739334] Register r10 information: non-paged memory
[ 300.740502] Register r11 information: 2-page vmalloc region starting at 0xfa14c000 allocated at copy_process+0x164/0xdd8
[ 300.742421] Register r12 information: NULL pointer
[ 300.742972] Process sh (pid: 326, stack limit = 0x1f6003ab)
[ 300.744498] Stack: (0xfa14de18 to 0xfa14e000)
[ 300.745292] de00: 0000000c c31421f8
[ 300.746040] de20: fa14de78 0000002c 0000002c 00000002 821e08e6 00000cc0 c05813d8 c3001100
[ 300.746454] de40: 00000024 c0554858 c0554f98 0000002c fa14de80 c0609944 c0554858 fa14df78
[ 300.748173] de60: c0581464 00000000 c05813d8 00000000 00000024 00000001 c0554f98 c50f7e08
[ 300.749193] de80: fa14deb8 c0554858 00000000 00000000 fa14df70 c2875b48 c262bb64 fa14df78
[ 300.750934] dea0: c055e5bc 0048fad8 00000002 fa14df78 c41baf28 00000002 fa14df70 c05813c8
[ 300.752368] dec0: fa14df70 c055e7c8 00000000 00000000 821e08e6 c41baf00 c055e5bc 0048fad8
[ 300.753511] dee0: 00000002 fa14df78 c41baf28 00000004 fa14df70 c0689078 fa14dfa0 c055ea74
[ 300.754701] df00: c0689474 c488c200 fa14df3c 00000004 00000002 c488c200 00000004 c0580bb0
[ 300.756828] df20: c06b2de8 00000003 00000000 22cd7380 c06b2f48 00000002 00000000 22cc7910
[ 300.757388] df40: 00000045 22e24010 00000045 821e08e6 00000001 821e08e6 c41baf00 c41baf00
[ 300.757816] df60: 0048fad8 fa14df78 00000002 00000004 fa14dfa0 c0414d54 00000000 00000000
[ 300.758218] df80: 00000002 821e08e6 0048fad8 00000002 00000001 00000004 c04003c4 c488c200
[ 300.758621] dfa0: 0048f964 c0414d54 0048fad8 00000002 00000001 0048fad8 00000002 00000001
[ 300.761518] dfc0: 0048fad8 00000002 00000001 00000004 00000002 7fffffff 0048f4a4 0048f964
[ 300.762437] dfe0: 00000004 be8dd5e8 b6eca2d3 b6e3f786 80070030 00000001 00000000 00000000
[ 300.765107] __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[ 300.765960] __kmalloc from tracepoint_probe_unregister+0xfc/0x4c4
[ 300.766639] tracepoint_probe_unregister from unregister_ftrace_graph+0x94/0xa4
[ 300.768319] unregister_ftrace_graph from ftrace_profile_write+0x20c/0x298
[ 300.768 309874] ftrace_profile_write from vfs_write+0x110/0x3c8
[ 300.770067] vfs_write from r
[ 300.771490] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.773100] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 295.936571] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 295.944045] [00000023] *pgd=450a8003, *pmd=00000000
[ 295.955367] Internal error: Oops: 206 [#1] SMP ARM
[ 295.957497] Modules linked in:
[ 295.960606] CPU: 0 PID: 327 Comm: sh Not tainted 6.6.72-rc1 #1
[ 295.962070] Hardware name: Generic DT based system
[ 295.964444] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 295.967880] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 295.969249] pc : [<c065be18>] lr : [<c065bd34>] psr: a0070013
[ 295.970737] sp : fa151df8 ip : 00e5eab0 fp : fa151e30
[ 295.972193] r10: 00004dc0 r9 : c3001100 r8 : 00000000
[ 295.973873] r7 : 00004dc0 r6 : edbda1b8 r5 : 00000040 r4 : 00000040
[ 295.976243] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 295.978880] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 295.981204] Control: 30c5387d Table: 450a5700 DAC: fffffffd
[ 295.983114] Register r0 information: non-paged memory
[ 295.986132] Register r1 information: NULL pointer
[ 295.988088] Register r2 information: non-paged memory
[ 295.990154] Register r3 information: non-paged memory
[ 295.991119] Register r4 information: non-paged memory
[ 295.993524] Register r5 information: non-paged memory
[ 295.995627] Register r6 information: non-slab/vmalloc memory
[ 295.997953] Register r7 information: non-paged memory
[ 295.999629] Register r8 information: NULL pointer
[ 296.001517] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 296.005304] Register r10 information: non-paged memory
[ 296.006946] Register r11 information: 2-page vmalloc region starting at 0xfa150000 allocated at copy_process+0x164/0xdd8
[ 296.010173] Register r12 information: non-paged memory
[ 296.012114] Process sh (pid: 327, stack limit = 0xa30dea75)
[ 296.014136] Stack: (0xfa151df8 to 0xfa152000)
[ 296.016382] 1de0: c056079c c056079c
[ 296.019033] 1e00: fa151e64 00000000 00000040 6b777109 6b777109 c3001100 00000040 00004dc0
[ 296.021525] 1e20: c056079c 00000000 c056079c 00000000 fa151e60 c0414d54 c056079c 6b777109
[ 296.024207] 1e40: 000000bb 000000ba c5098700 c4888000 c4687300 c207b5c4 c300e2d8 00000000
[ 296.026694] 1e60: c300c098 c0414d54 00000000 000000f7 c300c090 00000000 fa151f78 c300c08c
[ 296.030341] 1e80: c300c080 c0560434 00000044 6b777109 c26985c0 c26985c0 ffffffff 000f6000
[ 296.033312] 1ea0: 000f6000 fa151f78 c416e928 00000004 fa151f70 c056be48 00000004 00000000
[ 296.036630] 1ec0: c26985c0 000f6000 fa151f78 c416e928 fa151f70 c0570e14 000f6000 6b777109
[ 296.039570] 1ee0: c416e900 c0570d70 00483c20 00000004 fa151f78 c0689078 fa151fa0 c055ea74
[ 296.041923] 1f00: c0689474 c4888000 fa151f3c 00000004 00000004 c4888000 00000004 c0580bb0
[ 296.044264] 1f20: c06b2de8 00000003 00000000 e1246ea0 c06b2f48 00000002 00000000 e1232d50
[ 296.046259] 1f40: 00000044 e126ec30 00000044 6b777109 00000001 6b777109 c416e900 c416e900
[ 296.048791] 1f60: 00483c20 fa151f78 00000004 00000004 fa151fa0 c0414d54 00000000 00000000
[ 296.050843] 1f80: 00000004 6b777109 00483c20 00000004 00000001 00000004 c04003c4 c4888000
[ 296.053215] 1fa0: 0048393c c0414d54 00483c20 00000004 00000001 00483c20 00000004 00000001
[ 296.056440] 1fc0: 00483c20 00000004 00000001 00000004 00000004 7fffffff 00483584 0048393c
[ 296.058930] 1fe0: 00000004 be9685e8 b6f082d3 b6e7d786 80070030 00000001 00000000 00000000
[ 296.061621] __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[ 296.064515] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 296.071693] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 300.631961] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 300.633277] [00000023] *pgd=449a1003, *pmd=00000000
[ 300.634761] Internal error: Oops: 206 [#4] SMP ARM
[ 300.635210] Modules linked in:
[ 300.635482] CPU: 0 PID: 314 Comm: sh Tainted: G D 6.6.72-rc1 #1
[ 300.637139] Hardware name: Generic DT based system
[ 300.639824] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 300.640541] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 300.640851] pc : [<c065be18>] lr : [<c065bd34>] psr: a0000013
[ 300.641171] sp : fa0add48 ip : c4696038 fp : fa0add80
[ 300.641441] r10: 00000cc0 r9 : c3001100 r8 : ffffffff
[ 300.641824] r7 : 00000cc0 r6 : edbda1b8 r5 : c50d8000 r4 : 00000020
[ 300.642975] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 300.643914] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 300.645003] Control: 30c5387d Table: 445dd6c0 DAC: fffffffd
[ 300.646074] Register r0 information: non-paged memory
[ 300.646898] Register r1 information: NULL pointer
[ 300.647194] Register r2 information: non-paged memory
[ 300.648277] Register r3 information: non-paged memory
[ 300.649340] Register r4 information: non-paged memory
[ 300.650474] Register r5 information: slab task_struct start c50d8000 pointer offset 0 size 2816
[ 300.651797] Register r6 information: non-slab/vmalloc memory
[ 300.652116] Register r7 information: non-paged memory
[ 300.653327] Register r8 information: non-paged memory
[ 300.654048] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 300.655071] Register r10 information: non-paged memory
[ 300.655373] Register r11 information: 2-page vmalloc region starting at 0xfa0ac000 allocated at copy_process+0x164/0xdd8
[ 300.656693] Register r12 information: slab mm_struct start c4695e00 pointer offset 568 size 768
[ 300.658128] Process sh (pid: 314, stack limit = 0xec2da698)
[ 300.659399] Stack: (0xfa0add48 to 0xfa0ae000)
[ 300.660616] dd40: c3002380 c0454874 c4695e00 c3078658 00000020 c06073e0
[ 300.662102] dd60: dc7c6b63 c0420458 c50d8000 00000000 c3001100 00000020 c0420458 00000cc0
[ 300.662831] dd80: fa0addb0 c0609e14 c0420458 c4961288 fa0addc0 c4695e00 c50d8000 00000000
[ 300.663553] dda0: 00000000 c26276a8 c4695e00 c4695fb8 fa0addd0 c0420458 c4695e00 c50d8000
[ 300.664733] ddc0: 00000000 00000000 c26276a8 c50d8000 fa0ade00 c04524a4 c0454874 c4695e00
[ 300.666055] dde0: dc7c6b63 00000000 c50d8000 01200000 c330cc00 fa0adf30 c4695e00 c488ee00
[ 300.667043] de00: fa0ade88 c045489c 60000093 00000000 c1684c30 00000000 c25d2f90 c49a46d4
[ 300.668134] de20: 0000027e c057bb98 a0000013 c4826f40 c488ee00 000007e8 fa0ade48 c1684c30
[ 300.669213] de40: c4007700 c45d5500 fa0ade68 c04c5534 a0000013 dc7c6b63 c4007700 c04547f4
[ 300.669722] de60: c4007700 00000000 dc7c6b63 00000000 00000000 c488ee00 01200000 fa0adf30
[ 300.671158] de80: c50d86f8 00000000 fa0adee8 c0453928 40000000 40000002 c50d865c c488f5d8
[ 300.672488] dea0: 00000000 00000000 00000000 c50d8000 00000000 00000000 00000000 00000000
[ 300.673784] dec0: 00000000 c32c2978 dc7c6b63 00000000 01200000 fa0adf30 00000000 fa0adf30
[ 300.675280] dee0: 00000000 00000078 fa0adf28 c0455504 c25d2f90 c49a46d4 c04003c4 c488ee00
[ 300.676123] df00: fa0adf18 c05d0f68 dc7c6b63 01200011 00000000 00000000 00000000 fa0adf30
[ 300.677713] df20: 00000000 00000078 fa0adfa0 c0455ad4 01200000 00000000 00000000 b6f7dce8
[ 300.678608] df40: 00000000 00000000 00000011 00000000 00000000 00000000 00000000 00000000
[ 300.679438] df60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 300.680108] df80: 00000078 dc7c6b63 b6f7dce8 b6f7e180 00000001 00000078 c04003c4 c488ee00
[ 300.680862] dfa0: 0043b91c c04003b4 b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[ 300.681997] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[ 300.683431] dfe0: 00000078 bef955d0 b6ee549f b6e7c786 20000030 01200011 00000000 00000000
[ 300.684753] __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[ 300.685484] kmalloc_trace from pgd_alloc+0x2c/0x1e4
[ 300.686451] pgd_alloc from mm_init+0x114/0x27c
[ 300.687090] mm_init from copy_mm+0x98/0x7c8
[ 300.687558] copy_mm from copy_process+0x618/0xdd8
[ 300.688011] copy_process from kernel_clone+0xa0/0x320
[ 300.688394] kernel_clone from sys_clone+0xa0/0xbc
[ 300.689303] sys_clone from __sys_trace_return+0x0/0x10
[ 300.690767] Exception stack(0xfa0adfa8 to 0xfa0adff0)
[ 300.691632] dfa0: b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[ 300.692108] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[ 300.692498] dfe0: 00000078 bef955d0 b6ee549f b6e7c786
[ 300.693248] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 300.695600] ---[ end trace 0000000000000000 ]---
Home
--- cut here ---
[ 296.214251] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[ 296.222261] [00000023] *pgd=450fc003, *pmd=00000000
[ 296.231417] Internal error: Oops: 206 [#2] SMP ARM
[ 296.232486] Modules linked in:
[ 296.234056] CPU: 0 PID: 380 Comm: cat Tainted: G D 6.6.72-rc1 #1
[ 296.236995] Hardware name: Generic DT based system
[ 296.238529] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[ 296.240509] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[ 296.242587] pc : [<c065be18>] lr : [<c065bd34>] psr: a00d0013
[ 296.244609] sp : fa179d40 ip : 015a9a80 fp : fa179d78
[ 296.246686] r10: 00000dc0 r9 : c3001100 r8 : ffffffff
[ 296.248444] r7 : 00000dc0 r6 : edbda1b8 r5 : c412b640 r4 : 00000010
[ 296.250286] r3 : 00000020 r2 : 0000ac87 r1 : 00000000 r0 : 00000003
[ 296.252727] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 296.255372] Control: 30c5387d Table: 450f7d00 DAC: fffffffd
[ 296.257941] Register r0 information: non-paged memory
[ 296.259822] Register r1 information: NULL pointer
[ 296.261444] Register r2 information: non-paged memory
[ 296.263986] Register r3 information: non-paged memory
[ 296.266479] Register r4 information: zero-size pointer
[ 296.268359] Register r5 information: slab kmalloc-64 start c412b640 pointer offset 0 size 64
[ 296.272124] Register r6 information: non-slab/vmalloc memory
[ 296.274142] Register r7 information: non-paged memory
[ 296.275768] Register r8 information: non-paged memory
[ 296.277334] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[ 296.280529] Register r10 information: non-paged memory
[ 296.282014] Register r11 information: 2-page vmalloc region starting at 0xfa178000 allocated at copy_process+0x164/0xdd8
[ 296.285282] Register r12 information: non-paged memory
[ 296.287727] Process cat (pid: 380, stack limit = 0xd44bc6fc)
[ 296.289711] Stack: (0xfa179d40 to 0xfa17a000)
[ 296.291216] 9d40: c0577d98 c0577d98 fa179dac 00000000 00000010 bb6785ad bb6785ad c0577d98
[ 296.294116] 9d60: c412b640 c055e2d8 c3001100 00000010 c0577d98 00000dc0 fa179da8 c0414d54
[ 296.297632] 9d80: c0577d98 bb6785ad c3900510 c4b70008 c412b640 c055e2d8 00000041 c416ea30
[ 296.299798] 9da0: c0577cd0 c412b64c edbe1f50 c0414d54 00000044 c416e9c0 c412b650 c3900510
[ 296.303388] 9dc0: c416e9c0 c416ea3c 00000041 c416ea30 c0577cd0 c416e9c0 fa179e08 c06862ec
[ 296.305623] 9de0: 00000000 c0414d20 fa179e80 c416e9c0 00020000 fa179e80 00000000 00000041
[ 296.308525] 9e00: c26b4724 00020000 fa179e78 c0414d54 bb6785ad c069a3f0 00000002 bb6785ad
[ 296.310786] 9e20: c069a3f0 c0686f14 fa179f3c ffffff9c fa179f38 c04151ac c4db2100 fa179f40
[ 296.312761] 9e40: fa179e50 fa179e88 00000041 00000000 00000000 bb6785ad bb6785ad 00000000
[ 296.315952] 9e60: 00000001 fa179e80 c4db2100 fa179f40 c4db2100 00000142 fa179f38 c0414d54
[ 296.318837] 9e80: c453ad90 c38e7330 5490dc95 00000009 c489f036 00000000 c33eb3d0 c38e8330
[ 296.321258] 9ea0: c3900510 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[ 296.323902] 9ec0: 00000000 00000000 fa179ecc 00000000 00000000 00000000 00000000 00000000
[ 296.326267] 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c489f000
[ 296.328499] 9f00: 00000000 00000002 ffffff9c 00000000 000041e8 00000000 c489f000 bb6785ad
[ 296.330706] 9f20: c489f000 ffffff9c 00000003 fffff000 c04003c4 00000142 fa179f68 c0414d54
[ 296.333038] 9f40: 00020000 00000000 00000004 00000100 00000001 bb6785ad bedfcd5f ffffff9c
[ 296.335098] 9f60: 00000000 00020000 fa179fa0 c0414d54 00020000 00000000 00000000 00000000
[ 296.337306] 9f80: 00000000 00000000 bedfcd5f bb6785ad 00020000 00000000 bedfcd5f 00000142
[ 296.339376] 9fa0: 00485e38 c0414d54 00020000 00000000 ffffff9c bedfcd5f 00020000 00000000
[ 296.342019] 9fc0: 00020000 00000000 bedfcd5f 00000142 00001000 00484834 00020000 00485e38
[ 296.344042] 9fe0: 00000142 bedfc970 b6ebbdf7 b6e32786 200d0030 ffffff9c 00000000 00000000
[ 296.346688] __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[ 296.348515] Code: 15963008 13530000 0a000034 e599301c (e7936000)
[ 296.354985] ---[ end trace 0000000000000000 ]---
Home
[ 300.910357] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[ 300.911353] CPU1: stopping
[ 300.911521] CPU: 1 PID: 263 Comm: kirk Tainted: G D 6.6.72-rc1 #1
[ 300.911555] Hardware name: Generic DT based system
[ 300.911637] unwind_backtrace from show_stack+0x28/0x2c
[ 300.911712] show_stack from dump_stack_lvl+0x60/0x78
[ 300.911749] dump_stack_lvl from do_handle_IPI+0x1d4/0x1f0
[ 300.911778] do_handle_IPI from ipi_handler+0x28/0x30
[ 300.911807] ipi_handler from handle_percpu_devid_irq+0xcc/0x1c4
[ 300.911841] handle_percpu_devid_irq from generic_handle_domain_irq+0x44/0x54
[ 300.911872] generic_handle_domain_irq from gic_handle_irq+0x58/0xd4
[ 300.911899] gic_handle_irq from generic_handle_arch_irq+0x30/0x40
[ 300.911926] generic_handle_arch_irq from call_with_stack+0x18/0x20
[ 300.911988] call_with_stack from __irq_usr+0x70/0x80
[ 300.912015] Exception stack(0xfa0a1fb0 to 0xfa0a1ff8)
[ 300.912041] 1fa0: 80000000 b64d27c8 0048f9d8 b6341197
[ 300.912066] 1fc0: b6b70988 b62fe168 b6b7098a b6edf470 005710c0 00000049 00000000 b6edf4a0
[ 300.912087] 1fe0: 00541a70 beb39020 00000001 0010cece 200f0030 ffffffff
[ 300.927534] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---
Home
[ 300.910357] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[ 300.911353] CPU1: stopping
[ 300.911521] CPU: 1 PID: 263 Comm: kirk Tainted: G D 6.6.72-rc1 #1
[ 300.911555] Hardware name: Generic DT based system
[ 300.911637] unwind_backtrace from show_stack+0x28/0x2c
[ 300.911712] show_stack from dump_stack_lvl+0x60/0x78
[ 300.911749] dump_stack_lvl from do_handle_IPI+0x1d4/0x1f0
[ 300.911778] do_handle_IPI from ipi_handler+0x28/0x30
[ 300.911807] ipi_handler from handle_percpu_devid_irq+0xcc/0x1c4
[ 300.911841] handle_percpu_devid_irq from generic_handle_domain_irq+0x44/0x54
[ 300.911872] generic_handle_domain_irq from gic_handle_irq+0x58/0xd4
[ 300.911899] gic_handle_irq from generic_handle_arch_irq+0x30/0x40
[ 300.911926] generic_handle_arch_irq from call_with_stack+0x18/0x20
[ 300.911988] call_with_stack from __irq_usr+0x70/0x80
[ 300.912015] Exception stack(0xfa0a1fb0 to 0xfa0a1ff8)
[ 300.912041] 1fa0: 80000000 b64d27c8 0048f9d8 b6341197
[ 300.912066] 1fc0: b6b70988 b62fe168 b6b7098a b6edf470 005710c0 00000049 00000000 b6edf4a0
[ 300.912087] 1fe0: 00541a70 beb39020 00000001 0010cece 200f0030 ffffffff
[ 300.927534] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---
Home
[ 141.896590] ==================================================================
[ 141.897747] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[ 141.898789] Read of size 1 at addr fa08bd3f by task kunit_try_catch/181
[ 141.899527]
[ 141.899749] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.900708] Hardware name: Generic DT based system
[ 141.901319] unwind_backtrace from show_stack+0x18/0x1c
[ 141.902209] show_stack from dump_stack_lvl+0x58/0x70
[ 141.902902] dump_stack_lvl from print_report+0x164/0x51c
[ 141.903606] print_report from kasan_report+0xc8/0x104
[ 141.904400] kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[ 141.905206] kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[ 141.906160] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.907167] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.908156] kthread from ret_from_fork+0x14/0x30
[ 141.908786] Exception stack(0xfa08bfb0 to 0xfa08bff8)
[ 141.909402] bfa0: 00000000 00000000 00000000 00000000
[ 141.910489] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.911759] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.912492]
[ 141.912737] The buggy address belongs to stack of task kunit_try_catch/181
[ 141.913488]
[ 141.913733] The buggy address belongs to the virtual mapping at
[ 141.913733] [fa088000, fa08d000) created by:
[ 141.913733] kernel_clone+0xcc/0x4b0
[ 141.915319]
[ 141.915603] The buggy address belongs to the physical page:
[ 141.916150] page:1138d978 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc86
[ 141.917115] flags: 0x80000000(zone=2)
[ 141.917659] page_type: 0xffffffff()
[ 141.918140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 141.919058] raw: 00000000
[ 141.919384] page dumped because: kasan: bad access detected
[ 141.920117]
[ 141.920363] Memory state around the buggy address:
[ 141.921005] fa08bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.921636] fa08bc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.922463] >fa08bd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 141.923142] ^
[ 141.923772] fa08bd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[ 141.924478] fa08be00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.925236] ==================================================================
Home
[ 141.896590] ==================================================================
[ 141.897747] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[ 141.898789] Read of size 1 at addr fa08bd3f by task kunit_try_catch/181
[ 141.899527]
[ 141.899749] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.900708] Hardware name: Generic DT based system
[ 141.901319] unwind_backtrace from show_stack+0x18/0x1c
[ 141.902209] show_stack from dump_stack_lvl+0x58/0x70
[ 141.902902] dump_stack_lvl from print_report+0x164/0x51c
[ 141.903606] print_report from kasan_report+0xc8/0x104
[ 141.904400] kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[ 141.905206] kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[ 141.906160] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.907167] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.908156] kthread from ret_from_fork+0x14/0x30
[ 141.908786] Exception stack(0xfa08bfb0 to 0xfa08bff8)
[ 141.909402] bfa0: 00000000 00000000 00000000 00000000
[ 141.910489] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.911759] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.912492]
[ 141.912737] The buggy address belongs to stack of task kunit_try_catch/181
[ 141.913488]
[ 141.913733] The buggy address belongs to the virtual mapping at
[ 141.913733] [fa088000, fa08d000) created by:
[ 141.913733] kernel_clone+0xcc/0x4b0
[ 141.915319]
[ 141.915603] The buggy address belongs to the physical page:
[ 141.916150] page:1138d978 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc86
[ 141.917115] flags: 0x80000000(zone=2)
[ 141.917659] page_type: 0xffffffff()
[ 141.918140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 141.919058] raw: 00000000
[ 141.919384] page dumped because: kasan: bad access detected
[ 141.920117]
[ 141.920363] Memory state around the buggy address:
[ 141.921005] fa08bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.921636] fa08bc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.922463] >fa08bd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 141.923142] ^
[ 141.923772] fa08bd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[ 141.924478] fa08be00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.925236] ==================================================================
Home
[ 141.933318] ==================================================================
[ 141.934346] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1dc
[ 141.935062] Read of size 1 at addr fa093d4a by task kunit_try_catch/183
[ 141.935734]
[ 141.935971] CPU: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.936891] Hardware name: Generic DT based system
[ 141.937859] unwind_backtrace from show_stack+0x18/0x1c
[ 141.939224] show_stack from dump_stack_lvl+0x58/0x70
[ 141.940239] dump_stack_lvl from print_report+0x164/0x51c
[ 141.940945] print_report from kasan_report+0xc8/0x104
[ 141.941671] kasan_report from kasan_alloca_oob_right+0xfc/0x1dc
[ 141.942546] kasan_alloca_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 141.943388] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.944316] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.945149] kthread from ret_from_fork+0x14/0x30
[ 141.945741] Exception stack(0xfa093fb0 to 0xfa093ff8)
[ 141.946322] 3fa0: 00000000 00000000 00000000 00000000
[ 141.947443] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.948433] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.949043]
[ 141.949331] The buggy address belongs to stack of task kunit_try_catch/183
[ 141.949977]
[ 141.950351] The buggy address belongs to the virtual mapping at
[ 141.950351] [fa090000, fa095000) created by:
[ 141.950351] kernel_clone+0xcc/0x4b0
[ 141.951778]
[ 141.952077] The buggy address belongs to the physical page:
[ 141.952622] page:7d160432 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc8a
[ 141.953617] flags: 0x80000000(zone=2)
[ 141.954065] page_type: 0xffffffff()
[ 141.954667] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 141.955522] raw: 00000000
[ 141.955849] page dumped because: kasan: bad access detected
[ 141.956625]
[ 141.956870] Memory state around the buggy address:
[ 141.957878] fa093c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.958885] fa093c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.959637] >fa093d00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 141.960600] ^
[ 141.961396] fa093d80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[ 141.962330] fa093e00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.963021] ==================================================================
Home
[ 141.933318] ==================================================================
[ 141.934346] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1dc
[ 141.935062] Read of size 1 at addr fa093d4a by task kunit_try_catch/183
[ 141.935734]
[ 141.935971] CPU: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.936891] Hardware name: Generic DT based system
[ 141.937859] unwind_backtrace from show_stack+0x18/0x1c
[ 141.939224] show_stack from dump_stack_lvl+0x58/0x70
[ 141.940239] dump_stack_lvl from print_report+0x164/0x51c
[ 141.940945] print_report from kasan_report+0xc8/0x104
[ 141.941671] kasan_report from kasan_alloca_oob_right+0xfc/0x1dc
[ 141.942546] kasan_alloca_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 141.943388] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.944316] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.945149] kthread from ret_from_fork+0x14/0x30
[ 141.945741] Exception stack(0xfa093fb0 to 0xfa093ff8)
[ 141.946322] 3fa0: 00000000 00000000 00000000 00000000
[ 141.947443] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.948433] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.949043]
[ 141.949331] The buggy address belongs to stack of task kunit_try_catch/183
[ 141.949977]
[ 141.950351] The buggy address belongs to the virtual mapping at
[ 141.950351] [fa090000, fa095000) created by:
[ 141.950351] kernel_clone+0xcc/0x4b0
[ 141.951778]
[ 141.952077] The buggy address belongs to the physical page:
[ 141.952622] page:7d160432 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc8a
[ 141.953617] flags: 0x80000000(zone=2)
[ 141.954065] page_type: 0xffffffff()
[ 141.954667] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 141.955522] raw: 00000000
[ 141.955849] page dumped because: kasan: bad access detected
[ 141.956625]
[ 141.956870] Memory state around the buggy address:
[ 141.957878] fa093c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.958885] fa093c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.959637] >fa093d00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 141.960600] ^
[ 141.961396] fa093d80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[ 141.962330] fa093e00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.963021] ==================================================================
Home
[ 143.202190] ==================================================================
[ 143.202890] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd0/0x1cc
[ 143.203741] Free of addr c8fe9a80 by task kunit_try_catch/205
[ 143.204345]
[ 143.204593] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.205458] Hardware name: Generic DT based system
[ 143.206047] unwind_backtrace from show_stack+0x18/0x1c
[ 143.206878] show_stack from dump_stack_lvl+0x58/0x70
[ 143.207965] dump_stack_lvl from print_report+0x164/0x51c
[ 143.208697] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 143.209544] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[ 143.210413] __kasan_slab_free from __kmem_cache_free+0x140/0x2a8
[ 143.211461] __kmem_cache_free from kmalloc_double_kzfree+0xd0/0x1cc
[ 143.212371] kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[ 143.213330] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.214429] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.215266] kthread from ret_from_fork+0x14/0x30
[ 143.215837] Exception stack(0xfa103fb0 to 0xfa103ff8)
[ 143.216432] 3fa0: 00000000 00000000 00000000 00000000
[ 143.217607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.218436] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.219271]
[ 143.219620] Allocated by task 205:
[ 143.220214] kasan_set_track+0x3c/0x5c
[ 143.220927] __kasan_kmalloc+0x8c/0x94
[ 143.221371] kmalloc_double_kzfree+0xa0/0x1cc
[ 143.222282] kunit_try_run_case+0x11c/0x2e4
[ 143.222847] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.223616] kthread+0x184/0x1a8
[ 143.223991] ret_from_fork+0x14/0x30
[ 143.224580]
[ 143.224897] Freed by task 205:
[ 143.225416] kasan_set_track+0x3c/0x5c
[ 143.226225] kasan_save_free_info+0x30/0x3c
[ 143.226735] __kasan_slab_free+0xdc/0x124
[ 143.227896] __kmem_cache_free+0x140/0x2a8
[ 143.228537] kmalloc_double_kzfree+0xbc/0x1cc
[ 143.229255] kunit_try_run_case+0x11c/0x2e4
[ 143.229944] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.230703] kthread+0x184/0x1a8
[ 143.231220] ret_from_fork+0x14/0x30
[ 143.231786]
[ 143.232110] The buggy address belongs to the object at c8fe9a80
[ 143.232110] which belongs to the cache kmalloc-64 of size 64
[ 143.233537] The buggy address is located 0 bytes inside of
[ 143.233537] 64-byte region [c8fe9a80, c8fe9ac0)
[ 143.234734]
[ 143.234974] The buggy address belongs to the physical page:
[ 143.235714] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[ 143.236724] flags: 0x800(slab|zone=0)
[ 143.237256] page_type: 0xffffffff()
[ 143.238099] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.238885] raw: 00000000
[ 143.239465] page dumped because: kasan: bad access detected
[ 143.240043]
[ 143.240623] Memory state around the buggy address:
[ 143.241295] c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.242293] c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.242975] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.243808] ^
[ 143.244190] c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.244898] c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.245655] ==================================================================
Home
[ 143.202190] ==================================================================
[ 143.202890] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd0/0x1cc
[ 143.203741] Free of addr c8fe9a80 by task kunit_try_catch/205
[ 143.204345]
[ 143.204593] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.205458] Hardware name: Generic DT based system
[ 143.206047] unwind_backtrace from show_stack+0x18/0x1c
[ 143.206878] show_stack from dump_stack_lvl+0x58/0x70
[ 143.207965] dump_stack_lvl from print_report+0x164/0x51c
[ 143.208697] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 143.209544] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[ 143.210413] __kasan_slab_free from __kmem_cache_free+0x140/0x2a8
[ 143.211461] __kmem_cache_free from kmalloc_double_kzfree+0xd0/0x1cc
[ 143.212371] kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[ 143.213330] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.214429] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.215266] kthread from ret_from_fork+0x14/0x30
[ 143.215837] Exception stack(0xfa103fb0 to 0xfa103ff8)
[ 143.216432] 3fa0: 00000000 00000000 00000000 00000000
[ 143.217607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.218436] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.219271]
[ 143.219620] Allocated by task 205:
[ 143.220214] kasan_set_track+0x3c/0x5c
[ 143.220927] __kasan_kmalloc+0x8c/0x94
[ 143.221371] kmalloc_double_kzfree+0xa0/0x1cc
[ 143.222282] kunit_try_run_case+0x11c/0x2e4
[ 143.222847] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.223616] kthread+0x184/0x1a8
[ 143.223991] ret_from_fork+0x14/0x30
[ 143.224580]
[ 143.224897] Freed by task 205:
[ 143.225416] kasan_set_track+0x3c/0x5c
[ 143.226225] kasan_save_free_info+0x30/0x3c
[ 143.226735] __kasan_slab_free+0xdc/0x124
[ 143.227896] __kmem_cache_free+0x140/0x2a8
[ 143.228537] kmalloc_double_kzfree+0xbc/0x1cc
[ 143.229255] kunit_try_run_case+0x11c/0x2e4
[ 143.229944] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.230703] kthread+0x184/0x1a8
[ 143.231220] ret_from_fork+0x14/0x30
[ 143.231786]
[ 143.232110] The buggy address belongs to the object at c8fe9a80
[ 143.232110] which belongs to the cache kmalloc-64 of size 64
[ 143.233537] The buggy address is located 0 bytes inside of
[ 143.233537] 64-byte region [c8fe9a80, c8fe9ac0)
[ 143.234734]
[ 143.234974] The buggy address belongs to the physical page:
[ 143.235714] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[ 143.236724] flags: 0x800(slab|zone=0)
[ 143.237256] page_type: 0xffffffff()
[ 143.238099] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.238885] raw: 00000000
[ 143.239465] page dumped because: kasan: bad access detected
[ 143.240043]
[ 143.240623] Memory state around the buggy address:
[ 143.241295] c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.242293] c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.242975] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.243808] ^
[ 143.244190] c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.244898] c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.245655] ==================================================================
Home
[ 142.216033] ==================================================================
[ 142.216964] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c
[ 142.218110] Free of addr c8fe3000 by task kunit_try_catch/189
[ 142.218664]
[ 142.219057] CPU: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.220000] Hardware name: Generic DT based system
[ 142.220739] unwind_backtrace from show_stack+0x18/0x1c
[ 142.221562] show_stack from dump_stack_lvl+0x58/0x70
[ 142.222242] dump_stack_lvl from print_report+0x164/0x51c
[ 142.223047] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 142.223897] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[ 142.224773] __kasan_slab_free from kmem_cache_free+0x170/0x41c
[ 142.225636] kmem_cache_free from kmem_cache_double_free+0xe4/0x23c
[ 142.226510] kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4
[ 142.227517] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.228920] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.230040] kthread from ret_from_fork+0x14/0x30
[ 142.230800] Exception stack(0xfa093fb0 to 0xfa093ff8)
[ 142.231391] 3fa0: 00000000 00000000 00000000 00000000
[ 142.232269] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.233270] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.234017]
[ 142.234309] Allocated by task 189:
[ 142.234680] kasan_set_track+0x3c/0x5c
[ 142.235241] __kasan_slab_alloc+0x60/0x68
[ 142.235974] kmem_cache_alloc+0x1dc/0x574
[ 142.236465] kmem_cache_double_free+0xb0/0x23c
[ 142.237284] kunit_try_run_case+0x11c/0x2e4
[ 142.238020] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.239059] kthread+0x184/0x1a8
[ 142.239656] ret_from_fork+0x14/0x30
[ 142.240213]
[ 142.240540] Freed by task 189:
[ 142.240990] kasan_set_track+0x3c/0x5c
[ 142.241488] kasan_save_free_info+0x30/0x3c
[ 142.242032] __kasan_slab_free+0xdc/0x124
[ 142.242591] kmem_cache_free+0x170/0x41c
[ 142.243257] kmem_cache_double_free+0xcc/0x23c
[ 142.243752] kunit_try_run_case+0x11c/0x2e4
[ 142.244609] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.245460] kthread+0x184/0x1a8
[ 142.245889] ret_from_fork+0x14/0x30
[ 142.246372]
[ 142.246632] The buggy address belongs to the object at c8fe3000
[ 142.246632] which belongs to the cache test_cache of size 200
[ 142.248226] The buggy address is located 0 bytes inside of
[ 142.248226] 200-byte region [c8fe3000, c8fe30c8)
[ 142.249878]
[ 142.250151] The buggy address belongs to the physical page:
[ 142.250781] page:42624bb4 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe3
[ 142.251658] flags: 0x800(slab|zone=0)
[ 142.252242] page_type: 0xffffffff()
[ 142.252683] raw: 00000800 c8915e00 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 142.253591] raw: 00000000
[ 142.253942] page dumped because: kasan: bad access detected
[ 142.254549]
[ 142.254786] Memory state around the buggy address:
[ 142.255461] c8fe2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.256256] c8fe2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.256967] >c8fe3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.257982] ^
[ 142.258413] c8fe3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 142.259308] c8fe3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.260000] ==================================================================
Home
[ 142.216033] ==================================================================
[ 142.216964] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c
[ 142.218110] Free of addr c8fe3000 by task kunit_try_catch/189
[ 142.218664]
[ 142.219057] CPU: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.220000] Hardware name: Generic DT based system
[ 142.220739] unwind_backtrace from show_stack+0x18/0x1c
[ 142.221562] show_stack from dump_stack_lvl+0x58/0x70
[ 142.222242] dump_stack_lvl from print_report+0x164/0x51c
[ 142.223047] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 142.223897] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[ 142.224773] __kasan_slab_free from kmem_cache_free+0x170/0x41c
[ 142.225636] kmem_cache_free from kmem_cache_double_free+0xe4/0x23c
[ 142.226510] kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4
[ 142.227517] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.228920] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.230040] kthread from ret_from_fork+0x14/0x30
[ 142.230800] Exception stack(0xfa093fb0 to 0xfa093ff8)
[ 142.231391] 3fa0: 00000000 00000000 00000000 00000000
[ 142.232269] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.233270] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.234017]
[ 142.234309] Allocated by task 189:
[ 142.234680] kasan_set_track+0x3c/0x5c
[ 142.235241] __kasan_slab_alloc+0x60/0x68
[ 142.235974] kmem_cache_alloc+0x1dc/0x574
[ 142.236465] kmem_cache_double_free+0xb0/0x23c
[ 142.237284] kunit_try_run_case+0x11c/0x2e4
[ 142.238020] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.239059] kthread+0x184/0x1a8
[ 142.239656] ret_from_fork+0x14/0x30
[ 142.240213]
[ 142.240540] Freed by task 189:
[ 142.240990] kasan_set_track+0x3c/0x5c
[ 142.241488] kasan_save_free_info+0x30/0x3c
[ 142.242032] __kasan_slab_free+0xdc/0x124
[ 142.242591] kmem_cache_free+0x170/0x41c
[ 142.243257] kmem_cache_double_free+0xcc/0x23c
[ 142.243752] kunit_try_run_case+0x11c/0x2e4
[ 142.244609] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.245460] kthread+0x184/0x1a8
[ 142.245889] ret_from_fork+0x14/0x30
[ 142.246372]
[ 142.246632] The buggy address belongs to the object at c8fe3000
[ 142.246632] which belongs to the cache test_cache of size 200
[ 142.248226] The buggy address is located 0 bytes inside of
[ 142.248226] 200-byte region [c8fe3000, c8fe30c8)
[ 142.249878]
[ 142.250151] The buggy address belongs to the physical page:
[ 142.250781] page:42624bb4 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe3
[ 142.251658] flags: 0x800(slab|zone=0)
[ 142.252242] page_type: 0xffffffff()
[ 142.252683] raw: 00000800 c8915e00 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 142.253591] raw: 00000000
[ 142.253942] page dumped because: kasan: bad access detected
[ 142.254549]
[ 142.254786] Memory state around the buggy address:
[ 142.255461] c8fe2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.256256] c8fe2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.256967] >c8fe3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.257982] ^
[ 142.258413] c8fe3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 142.259308] c8fe3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.260000] ==================================================================
Home
[ 141.814780] ==================================================================
[ 141.815999] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[ 141.816758] Read of size 1 at addr c418402d by task kunit_try_catch/175
[ 141.817852]
[ 141.818173] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.818852] Hardware name: Generic DT based system
[ 141.819541] unwind_backtrace from show_stack+0x18/0x1c
[ 141.820255] show_stack from dump_stack_lvl+0x58/0x70
[ 141.820997] dump_stack_lvl from print_report+0x164/0x51c
[ 141.821730] print_report from kasan_report+0xc8/0x104
[ 141.822440] kasan_report from kasan_global_oob_right+0xa0/0x150
[ 141.823281] kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 141.824081] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.825076] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.825927] kthread from ret_from_fork+0x14/0x30
[ 141.826533] Exception stack(0xfa05bfb0 to 0xfa05bff8)
[ 141.827172] bfa0: 00000000 00000000 00000000 00000000
[ 141.828030] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.828994] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.829700]
[ 141.830025] The buggy address belongs to the variable:
[ 141.830613] global_array+0xd/0x40
[ 141.831170]
[ 141.831450] The buggy address belongs to the physical page:
[ 141.832099] page:20b71b86 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44184
[ 141.833010] flags: 0x4000(reserved|zone=0)
[ 141.833476] page_type: 0xffffffff()
[ 141.834152] raw: 00004000 edc8c694 edc8c694 00000000 00000000 00000000 ffffffff 00000001
[ 141.834983] raw: 00000000
[ 141.835294] page dumped because: kasan: bad access detected
[ 141.835988]
[ 141.836249] Memory state around the buggy address:
[ 141.836826] c4183f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.837516] c4183f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.838341] >c4184000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[ 141.839047] ^
[ 141.839501] c4184080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[ 141.840272] c4184100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[ 141.840943] ==================================================================
Home
[ 141.814780] ==================================================================
[ 141.815999] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[ 141.816758] Read of size 1 at addr c418402d by task kunit_try_catch/175
[ 141.817852]
[ 141.818173] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.818852] Hardware name: Generic DT based system
[ 141.819541] unwind_backtrace from show_stack+0x18/0x1c
[ 141.820255] show_stack from dump_stack_lvl+0x58/0x70
[ 141.820997] dump_stack_lvl from print_report+0x164/0x51c
[ 141.821730] print_report from kasan_report+0xc8/0x104
[ 141.822440] kasan_report from kasan_global_oob_right+0xa0/0x150
[ 141.823281] kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 141.824081] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.825076] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.825927] kthread from ret_from_fork+0x14/0x30
[ 141.826533] Exception stack(0xfa05bfb0 to 0xfa05bff8)
[ 141.827172] bfa0: 00000000 00000000 00000000 00000000
[ 141.828030] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.828994] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.829700]
[ 141.830025] The buggy address belongs to the variable:
[ 141.830613] global_array+0xd/0x40
[ 141.831170]
[ 141.831450] The buggy address belongs to the physical page:
[ 141.832099] page:20b71b86 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44184
[ 141.833010] flags: 0x4000(reserved|zone=0)
[ 141.833476] page_type: 0xffffffff()
[ 141.834152] raw: 00004000 edc8c694 edc8c694 00000000 00000000 00000000 ffffffff 00000001
[ 141.834983] raw: 00000000
[ 141.835294] page dumped because: kasan: bad access detected
[ 141.835988]
[ 141.836249] Memory state around the buggy address:
[ 141.836826] c4183f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.837516] c4183f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.838341] >c4184000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[ 141.839047] ^
[ 141.839501] c4184080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[ 141.840272] c4184100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[ 141.840943] ==================================================================
Home
[ 139.864772] ==================================================================
[ 139.866195] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[ 139.867033] Free of addr c8f14001 by task kunit_try_catch/121
[ 139.868303]
[ 139.868700] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.869824] Hardware name: Generic DT based system
[ 139.870501] unwind_backtrace from show_stack+0x18/0x1c
[ 139.870881] show_stack from dump_stack_lvl+0x58/0x70
[ 139.871336] dump_stack_lvl from print_report+0x164/0x51c
[ 139.872284] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 139.873197] kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[ 139.874218] free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[ 139.875203] kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x11c/0x2e4
[ 139.876174] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.877237] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.878355] kthread from ret_from_fork+0x14/0x30
[ 139.878885] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[ 139.879546] bfa0: 00000000 00000000 00000000 00000000
[ 139.880444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.881234] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.882002]
[ 139.882321] The buggy address belongs to the physical page:
[ 139.882914] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 139.883765] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.884574] flags: 0x40(head|zone=0)
[ 139.885027] page_type: 0xffffffff()
[ 139.885601] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 139.886382] raw: 00000000
[ 139.886781] page dumped because: kasan: bad access detected
[ 139.887491]
[ 139.887699] Memory state around the buggy address:
[ 139.888355] c8f13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.889057] c8f13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.889843] >c8f14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.890716] ^
[ 139.891081] c8f14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.891768] c8f14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.892521] ==================================================================
Home
[ 139.864772] ==================================================================
[ 139.866195] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[ 139.867033] Free of addr c8f14001 by task kunit_try_catch/121
[ 139.868303]
[ 139.868700] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.869824] Hardware name: Generic DT based system
[ 139.870501] unwind_backtrace from show_stack+0x18/0x1c
[ 139.870881] show_stack from dump_stack_lvl+0x58/0x70
[ 139.871336] dump_stack_lvl from print_report+0x164/0x51c
[ 139.872284] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 139.873197] kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[ 139.874218] free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[ 139.875203] kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x11c/0x2e4
[ 139.876174] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.877237] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.878355] kthread from ret_from_fork+0x14/0x30
[ 139.878885] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[ 139.879546] bfa0: 00000000 00000000 00000000 00000000
[ 139.880444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.881234] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.882002]
[ 139.882321] The buggy address belongs to the physical page:
[ 139.882914] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 139.883765] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.884574] flags: 0x40(head|zone=0)
[ 139.885027] page_type: 0xffffffff()
[ 139.885601] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 139.886382] raw: 00000000
[ 139.886781] page dumped because: kasan: bad access detected
[ 139.887491]
[ 139.887699] Memory state around the buggy address:
[ 139.888355] c8f13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.889057] c8f13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.889843] >c8f14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.890716] ^
[ 139.891081] c8f14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.891768] c8f14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.892521] ==================================================================
Home
[ 142.274972] ==================================================================
[ 142.276014] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x23c
[ 142.276823] Free of addr c8fe4001 by task kunit_try_catch/191
[ 142.278463]
[ 142.278799] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.279704] Hardware name: Generic DT based system
[ 142.280286] unwind_backtrace from show_stack+0x18/0x1c
[ 142.280989] show_stack from dump_stack_lvl+0x58/0x70
[ 142.281724] dump_stack_lvl from print_report+0x164/0x51c
[ 142.282544] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 142.283447] kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[ 142.284505] __kasan_slab_free from kmem_cache_free+0x170/0x41c
[ 142.285333] kmem_cache_free from kmem_cache_invalid_free+0xd8/0x23c
[ 142.286188] kmem_cache_invalid_free from kunit_try_run_case+0x11c/0x2e4
[ 142.287035] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.288031] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.289042] kthread from ret_from_fork+0x14/0x30
[ 142.289727] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[ 142.290512] 3fa0: 00000000 00000000 00000000 00000000
[ 142.291505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.292599] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.293456]
[ 142.293730] Allocated by task 191:
[ 142.294099] kasan_set_track+0x3c/0x5c
[ 142.294734] __kasan_slab_alloc+0x60/0x68
[ 142.295462] kmem_cache_alloc+0x1dc/0x574
[ 142.296032] kmem_cache_invalid_free+0xb0/0x23c
[ 142.296658] kunit_try_run_case+0x11c/0x2e4
[ 142.297273] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.297967] kthread+0x184/0x1a8
[ 142.298447] ret_from_fork+0x14/0x30
[ 142.298870]
[ 142.299182] The buggy address belongs to the object at c8fe4000
[ 142.299182] which belongs to the cache test_cache of size 200
[ 142.300397] The buggy address is located 1 bytes inside of
[ 142.300397] 200-byte region [c8fe4000, c8fe40c8)
[ 142.301582]
[ 142.301800] The buggy address belongs to the physical page:
[ 142.302564] page:a185f071 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe4
[ 142.303396] flags: 0x800(slab|zone=0)
[ 142.303868] page_type: 0xffffffff()
[ 142.304373] raw: 00000800 c8915f00 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 142.305358] raw: 00000000
[ 142.305771] page dumped because: kasan: bad access detected
[ 142.306365]
[ 142.306639] Memory state around the buggy address:
[ 142.307321] c8fe3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.308059] c8fe3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.309503] >c8fe4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 142.310147] ^
[ 142.310561] c8fe4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 142.311167] c8fe4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.311939] ==================================================================
Home
[ 142.274972] ==================================================================
[ 142.276014] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x23c
[ 142.276823] Free of addr c8fe4001 by task kunit_try_catch/191
[ 142.278463]
[ 142.278799] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.279704] Hardware name: Generic DT based system
[ 142.280286] unwind_backtrace from show_stack+0x18/0x1c
[ 142.280989] show_stack from dump_stack_lvl+0x58/0x70
[ 142.281724] dump_stack_lvl from print_report+0x164/0x51c
[ 142.282544] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 142.283447] kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[ 142.284505] __kasan_slab_free from kmem_cache_free+0x170/0x41c
[ 142.285333] kmem_cache_free from kmem_cache_invalid_free+0xd8/0x23c
[ 142.286188] kmem_cache_invalid_free from kunit_try_run_case+0x11c/0x2e4
[ 142.287035] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.288031] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.289042] kthread from ret_from_fork+0x14/0x30
[ 142.289727] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[ 142.290512] 3fa0: 00000000 00000000 00000000 00000000
[ 142.291505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.292599] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.293456]
[ 142.293730] Allocated by task 191:
[ 142.294099] kasan_set_track+0x3c/0x5c
[ 142.294734] __kasan_slab_alloc+0x60/0x68
[ 142.295462] kmem_cache_alloc+0x1dc/0x574
[ 142.296032] kmem_cache_invalid_free+0xb0/0x23c
[ 142.296658] kunit_try_run_case+0x11c/0x2e4
[ 142.297273] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.297967] kthread+0x184/0x1a8
[ 142.298447] ret_from_fork+0x14/0x30
[ 142.298870]
[ 142.299182] The buggy address belongs to the object at c8fe4000
[ 142.299182] which belongs to the cache test_cache of size 200
[ 142.300397] The buggy address is located 1 bytes inside of
[ 142.300397] 200-byte region [c8fe4000, c8fe40c8)
[ 142.301582]
[ 142.301800] The buggy address belongs to the physical page:
[ 142.302564] page:a185f071 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe4
[ 142.303396] flags: 0x800(slab|zone=0)
[ 142.303868] page_type: 0xffffffff()
[ 142.304373] raw: 00000800 c8915f00 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 142.305358] raw: 00000000
[ 142.305771] page dumped because: kasan: bad access detected
[ 142.306365]
[ 142.306639] Memory state around the buggy address:
[ 142.307321] c8fe3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.308059] c8fe3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.309503] >c8fe4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 142.310147] ^
[ 142.310561] c8fe4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 142.311167] c8fe4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.311939] ==================================================================
Home
[ 140.880159] ==================================================================
[ 140.881031] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1f0
[ 140.882045] Read of size 4294967294 at addr c8fa0984 by task kunit_try_catch/153
[ 140.882769]
[ 140.883063] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.884050] Hardware name: Generic DT based system
[ 140.884889] unwind_backtrace from show_stack+0x18/0x1c
[ 140.885685] show_stack from dump_stack_lvl+0x58/0x70
[ 140.886377] dump_stack_lvl from print_report+0x164/0x51c
[ 140.887107] print_report from kasan_report+0xc8/0x104
[ 140.887928] kasan_report from kasan_check_range+0x14c/0x198
[ 140.889025] kasan_check_range from __asan_memmove+0x28/0x68
[ 140.890016] __asan_memmove from kmalloc_memmove_negative_size+0xe4/0x1f0
[ 140.890879] kmalloc_memmove_negative_size from kunit_try_run_case+0x11c/0x2e4
[ 140.891814] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.892782] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.893682] kthread from ret_from_fork+0x14/0x30
[ 140.894285] Exception stack(0xf9fc3fb0 to 0xf9fc3ff8)
[ 140.894859] 3fa0: 00000000 00000000 00000000 00000000
[ 140.895734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.896769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.897449]
[ 140.897735] Allocated by task 153:
[ 140.898109] kasan_set_track+0x3c/0x5c
[ 140.899510] __kasan_kmalloc+0x8c/0x94
[ 140.899905] kmalloc_memmove_negative_size+0xa0/0x1f0
[ 140.901249] kunit_try_run_case+0x11c/0x2e4
[ 140.901854] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.902591] kthread+0x184/0x1a8
[ 140.902988] ret_from_fork+0x14/0x30
[ 140.903521]
[ 140.903747] The buggy address belongs to the object at c8fa0980
[ 140.903747] which belongs to the cache kmalloc-64 of size 64
[ 140.905036] The buggy address is located 4 bytes inside of
[ 140.905036] 64-byte region [c8fa0980, c8fa09c0)
[ 140.906039]
[ 140.906375] The buggy address belongs to the physical page:
[ 140.906925] page:31e3ec12 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fa0
[ 140.907743] flags: 0x800(slab|zone=0)
[ 140.908613] page_type: 0xffffffff()
[ 140.909367] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.910339] raw: 00000000
[ 140.910668] page dumped because: kasan: bad access detected
[ 140.911243]
[ 140.911494] Memory state around the buggy address:
[ 140.912101] c8fa0880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.912803] c8fa0900: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 140.913686] >c8fa0980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 140.914376] ^
[ 140.914856] c8fa0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.915532] c8fa0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.916234] ==================================================================
Home
[ 140.880159] ==================================================================
[ 140.881031] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1f0
[ 140.882045] Read of size 4294967294 at addr c8fa0984 by task kunit_try_catch/153
[ 140.882769]
[ 140.883063] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.884050] Hardware name: Generic DT based system
[ 140.884889] unwind_backtrace from show_stack+0x18/0x1c
[ 140.885685] show_stack from dump_stack_lvl+0x58/0x70
[ 140.886377] dump_stack_lvl from print_report+0x164/0x51c
[ 140.887107] print_report from kasan_report+0xc8/0x104
[ 140.887928] kasan_report from kasan_check_range+0x14c/0x198
[ 140.889025] kasan_check_range from __asan_memmove+0x28/0x68
[ 140.890016] __asan_memmove from kmalloc_memmove_negative_size+0xe4/0x1f0
[ 140.890879] kmalloc_memmove_negative_size from kunit_try_run_case+0x11c/0x2e4
[ 140.891814] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.892782] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.893682] kthread from ret_from_fork+0x14/0x30
[ 140.894285] Exception stack(0xf9fc3fb0 to 0xf9fc3ff8)
[ 140.894859] 3fa0: 00000000 00000000 00000000 00000000
[ 140.895734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.896769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.897449]
[ 140.897735] Allocated by task 153:
[ 140.898109] kasan_set_track+0x3c/0x5c
[ 140.899510] __kasan_kmalloc+0x8c/0x94
[ 140.899905] kmalloc_memmove_negative_size+0xa0/0x1f0
[ 140.901249] kunit_try_run_case+0x11c/0x2e4
[ 140.901854] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.902591] kthread+0x184/0x1a8
[ 140.902988] ret_from_fork+0x14/0x30
[ 140.903521]
[ 140.903747] The buggy address belongs to the object at c8fa0980
[ 140.903747] which belongs to the cache kmalloc-64 of size 64
[ 140.905036] The buggy address is located 4 bytes inside of
[ 140.905036] 64-byte region [c8fa0980, c8fa09c0)
[ 140.906039]
[ 140.906375] The buggy address belongs to the physical page:
[ 140.906925] page:31e3ec12 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fa0
[ 140.907743] flags: 0x800(slab|zone=0)
[ 140.908613] page_type: 0xffffffff()
[ 140.909367] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.910339] raw: 00000000
[ 140.910668] page dumped because: kasan: bad access detected
[ 140.911243]
[ 140.911494] Memory state around the buggy address:
[ 140.912101] c8fa0880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.912803] c8fa0900: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 140.913686] >c8fa0980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 140.914376] ^
[ 140.914856] c8fa0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.915532] c8fa0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.916234] ==================================================================
Home
[ 142.859832] ==================================================================
[ 142.861730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[ 142.862569] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.863198]
[ 142.863495] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.864366] Hardware name: Generic DT based system
[ 142.864866] unwind_backtrace from show_stack+0x18/0x1c
[ 142.865652] show_stack from dump_stack_lvl+0x58/0x70
[ 142.866335] dump_stack_lvl from print_report+0x164/0x51c
[ 142.867015] print_report from kasan_report+0xc8/0x104
[ 142.867790] kasan_report from kasan_bitops_generic+0x26c/0xc30
[ 142.868651] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.869577] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.870604] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.871539] kthread from ret_from_fork+0x14/0x30
[ 142.872112] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.872784] 3fa0: 00000000 00000000 00000000 00000000
[ 142.873712] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.874623] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.875330]
[ 142.875577] Allocated by task 201:
[ 142.875938] kasan_set_track+0x3c/0x5c
[ 142.876535] __kasan_kmalloc+0x8c/0x94
[ 142.877050] kasan_bitops_generic+0xa0/0xc30
[ 142.877877] kunit_try_run_case+0x11c/0x2e4
[ 142.878449] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.879220] kthread+0x184/0x1a8
[ 142.879605] ret_from_fork+0x14/0x30
[ 142.880261]
[ 142.880523] The buggy address belongs to the object at c8fe7800
[ 142.880523] which belongs to the cache kmalloc-64 of size 64
[ 142.881661] The buggy address is located 4 bytes inside of
[ 142.881661] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.882938]
[ 142.883256] The buggy address belongs to the physical page:
[ 142.883852] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.884609] flags: 0x800(slab|zone=0)
[ 142.885204] page_type: 0xffffffff()
[ 142.885651] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.886452] raw: 00000000
[ 142.886909] page dumped because: kasan: bad access detected
[ 142.887555]
[ 142.888412] Memory state around the buggy address:
[ 142.889113] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.889806] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.890551] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.891256] ^
[ 142.891626] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.892426] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.892975] ==================================================================
[ 142.744699] ==================================================================
[ 142.745586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[ 142.746369] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.747767]
[ 142.748104] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.749172] Hardware name: Generic DT based system
[ 142.749713] unwind_backtrace from show_stack+0x18/0x1c
[ 142.750636] show_stack from dump_stack_lvl+0x58/0x70
[ 142.751473] dump_stack_lvl from print_report+0x164/0x51c
[ 142.752339] print_report from kasan_report+0xc8/0x104
[ 142.753096] kasan_report from kasan_check_range+0x14c/0x198
[ 142.754011] kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[ 142.755057] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.756117] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.757306] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.758431] kthread from ret_from_fork+0x14/0x30
[ 142.759239] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.759886] 3fa0: 00000000 00000000 00000000 00000000
[ 142.760922] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.761877] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.762674]
[ 142.762963] Allocated by task 201:
[ 142.763441] kasan_set_track+0x3c/0x5c
[ 142.764162] __kasan_kmalloc+0x8c/0x94
[ 142.764843] kasan_bitops_generic+0xa0/0xc30
[ 142.765500] kunit_try_run_case+0x11c/0x2e4
[ 142.766206] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.767036] kthread+0x184/0x1a8
[ 142.767807] ret_from_fork+0x14/0x30
[ 142.768371]
[ 142.768709] The buggy address belongs to the object at c8fe7800
[ 142.768709] which belongs to the cache kmalloc-64 of size 64
[ 142.769991] The buggy address is located 4 bytes inside of
[ 142.769991] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.771296]
[ 142.771674] The buggy address belongs to the physical page:
[ 142.772314] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.773348] flags: 0x800(slab|zone=0)
[ 142.773908] page_type: 0xffffffff()
[ 142.774614] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.775652] raw: 00000000
[ 142.776101] page dumped because: kasan: bad access detected
[ 142.776874]
[ 142.777330] Memory state around the buggy address:
[ 142.778144] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.778922] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.779672] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.780465] ^
[ 142.780957] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.781740] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.782558] ==================================================================
[ 142.821019] ==================================================================
[ 142.821753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[ 142.822458] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.823491]
[ 142.823751] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.824905] Hardware name: Generic DT based system
[ 142.825576] unwind_backtrace from show_stack+0x18/0x1c
[ 142.826449] show_stack from dump_stack_lvl+0x58/0x70
[ 142.827959] dump_stack_lvl from print_report+0x164/0x51c
[ 142.828777] print_report from kasan_report+0xc8/0x104
[ 142.829677] kasan_report from kasan_bitops_generic+0x20c/0xc30
[ 142.830594] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.831522] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.832517] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.833425] kthread from ret_from_fork+0x14/0x30
[ 142.834076] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.834759] 3fa0: 00000000 00000000 00000000 00000000
[ 142.835733] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.836681] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.837784]
[ 142.838181] Allocated by task 201:
[ 142.838866] kasan_set_track+0x3c/0x5c
[ 142.839562] __kasan_kmalloc+0x8c/0x94
[ 142.840269] kasan_bitops_generic+0xa0/0xc30
[ 142.841047] kunit_try_run_case+0x11c/0x2e4
[ 142.841668] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.842585] kthread+0x184/0x1a8
[ 142.842908] ret_from_fork+0x14/0x30
[ 142.843511]
[ 142.843741] The buggy address belongs to the object at c8fe7800
[ 142.843741] which belongs to the cache kmalloc-64 of size 64
[ 142.845012] The buggy address is located 4 bytes inside of
[ 142.845012] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.846091]
[ 142.846404] The buggy address belongs to the physical page:
[ 142.847104] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.848174] flags: 0x800(slab|zone=0)
[ 142.848646] page_type: 0xffffffff()
[ 142.849217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.850212] raw: 00000000
[ 142.850575] page dumped because: kasan: bad access detected
[ 142.851164]
[ 142.851461] Memory state around the buggy address:
[ 142.852000] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.852746] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.853535] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.854269] ^
[ 142.854658] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.855460] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.856177] ==================================================================
[ 142.709799] ==================================================================
[ 142.710490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[ 142.711337] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.712027]
[ 142.712346] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.713335] Hardware name: Generic DT based system
[ 142.713852] unwind_backtrace from show_stack+0x18/0x1c
[ 142.714607] show_stack from dump_stack_lvl+0x58/0x70
[ 142.715274] dump_stack_lvl from print_report+0x164/0x51c
[ 142.715958] print_report from kasan_report+0xc8/0x104
[ 142.716634] kasan_report from kasan_check_range+0x14c/0x198
[ 142.718066] kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[ 142.718895] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.719875] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.720827] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.721691] kthread from ret_from_fork+0x14/0x30
[ 142.722297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.722867] 3fa0: 00000000 00000000 00000000 00000000
[ 142.723833] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.724756] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.725499]
[ 142.725752] Allocated by task 201:
[ 142.726118] kasan_set_track+0x3c/0x5c
[ 142.726754] __kasan_kmalloc+0x8c/0x94
[ 142.727601] kasan_bitops_generic+0xa0/0xc30
[ 142.728368] kunit_try_run_case+0x11c/0x2e4
[ 142.729204] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.729913] kthread+0x184/0x1a8
[ 142.730485] ret_from_fork+0x14/0x30
[ 142.731025]
[ 142.731349] The buggy address belongs to the object at c8fe7800
[ 142.731349] which belongs to the cache kmalloc-64 of size 64
[ 142.732639] The buggy address is located 4 bytes inside of
[ 142.732639] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.733816]
[ 142.734092] The buggy address belongs to the physical page:
[ 142.734607] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.735613] flags: 0x800(slab|zone=0)
[ 142.736098] page_type: 0xffffffff()
[ 142.736554] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.737580] raw: 00000000
[ 142.737977] page dumped because: kasan: bad access detected
[ 142.738781]
[ 142.739099] Memory state around the buggy address:
[ 142.739687] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.740406] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.741146] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.741846] ^
[ 142.742164] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.742966] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.743733] ==================================================================
[ 142.931907] ==================================================================
[ 142.932892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[ 142.933663] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.934476]
[ 142.934727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.935489] Hardware name: Generic DT based system
[ 142.936168] unwind_backtrace from show_stack+0x18/0x1c
[ 142.936863] show_stack from dump_stack_lvl+0x58/0x70
[ 142.938285] dump_stack_lvl from print_report+0x164/0x51c
[ 142.939101] print_report from kasan_report+0xc8/0x104
[ 142.939805] kasan_report from kasan_check_range+0x14c/0x198
[ 142.940616] kasan_check_range from kasan_bitops_generic+0x310/0xc30
[ 142.941420] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.942291] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.943254] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.944103] kthread from ret_from_fork+0x14/0x30
[ 142.944819] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.945471] 3fa0: 00000000 00000000 00000000 00000000
[ 142.946349] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.947235] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.948238]
[ 142.948504] Allocated by task 201:
[ 142.948810] kasan_set_track+0x3c/0x5c
[ 142.949091] __kasan_kmalloc+0x8c/0x94
[ 142.949571] kasan_bitops_generic+0xa0/0xc30
[ 142.950225] kunit_try_run_case+0x11c/0x2e4
[ 142.950935] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.951821] kthread+0x184/0x1a8
[ 142.952352] ret_from_fork+0x14/0x30
[ 142.952762]
[ 142.952992] The buggy address belongs to the object at c8fe7800
[ 142.952992] which belongs to the cache kmalloc-64 of size 64
[ 142.954370] The buggy address is located 4 bytes inside of
[ 142.954370] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.955467]
[ 142.955766] The buggy address belongs to the physical page:
[ 142.956484] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.957762] flags: 0x800(slab|zone=0)
[ 142.958462] page_type: 0xffffffff()
[ 142.958937] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.959716] raw: 00000000
[ 142.960105] page dumped because: kasan: bad access detected
[ 142.960735]
[ 142.961052] Memory state around the buggy address:
[ 142.961666] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.962491] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.963346] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.964316] ^
[ 142.964668] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.965497] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.966412] ==================================================================
[ 142.968010] ==================================================================
[ 142.969200] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[ 142.969898] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.970457]
[ 142.970761] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.971709] Hardware name: Generic DT based system
[ 142.972294] unwind_backtrace from show_stack+0x18/0x1c
[ 142.973052] show_stack from dump_stack_lvl+0x58/0x70
[ 142.973837] dump_stack_lvl from print_report+0x164/0x51c
[ 142.974641] print_report from kasan_report+0xc8/0x104
[ 142.975361] kasan_report from kasan_bitops_generic+0x318/0xc30
[ 142.976236] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.977301] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.978368] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.979228] kthread from ret_from_fork+0x14/0x30
[ 142.979793] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.980504] 3fa0: 00000000 00000000 00000000 00000000
[ 142.981345] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.982281] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.983149]
[ 142.983395] Allocated by task 201:
[ 142.983776] kasan_set_track+0x3c/0x5c
[ 142.984405] __kasan_kmalloc+0x8c/0x94
[ 142.984858] kasan_bitops_generic+0xa0/0xc30
[ 142.985537] kunit_try_run_case+0x11c/0x2e4
[ 142.986076] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.986809] kthread+0x184/0x1a8
[ 142.987284] ret_from_fork+0x14/0x30
[ 142.987846]
[ 142.988067] The buggy address belongs to the object at c8fe7800
[ 142.988067] which belongs to the cache kmalloc-64 of size 64
[ 142.989564] The buggy address is located 4 bytes inside of
[ 142.989564] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.990678]
[ 142.990993] The buggy address belongs to the physical page:
[ 142.991651] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.992585] flags: 0x800(slab|zone=0)
[ 142.993089] page_type: 0xffffffff()
[ 142.993552] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.994458] raw: 00000000
[ 142.994923] page dumped because: kasan: bad access detected
[ 142.995444]
[ 142.995815] Memory state around the buggy address:
[ 142.996341] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.997310] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.998117] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.998809] ^
[ 142.999197] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.999881] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.000632] ==================================================================
[ 142.634480] ==================================================================
[ 142.636315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[ 142.637021] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.638451]
[ 142.638726] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.639636] Hardware name: Generic DT based system
[ 142.640424] unwind_backtrace from show_stack+0x18/0x1c
[ 142.641286] show_stack from dump_stack_lvl+0x58/0x70
[ 142.642003] dump_stack_lvl from print_report+0x164/0x51c
[ 142.642874] print_report from kasan_report+0xc8/0x104
[ 142.643635] kasan_report from kasan_bitops_generic+0x100/0xc30
[ 142.644520] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.645401] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.646353] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.647382] kthread from ret_from_fork+0x14/0x30
[ 142.648007] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.648711] 3fa0: 00000000 00000000 00000000 00000000
[ 142.650577] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.651409] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.652111]
[ 142.652413] Allocated by task 201:
[ 142.652837] kasan_set_track+0x3c/0x5c
[ 142.653496] __kasan_kmalloc+0x8c/0x94
[ 142.654046] kasan_bitops_generic+0xa0/0xc30
[ 142.654617] kunit_try_run_case+0x11c/0x2e4
[ 142.655210] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.655796] kthread+0x184/0x1a8
[ 142.656304] ret_from_fork+0x14/0x30
[ 142.656777]
[ 142.657018] The buggy address belongs to the object at c8fe7800
[ 142.657018] which belongs to the cache kmalloc-64 of size 64
[ 142.658541] The buggy address is located 4 bytes inside of
[ 142.658541] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.659953]
[ 142.660384] The buggy address belongs to the physical page:
[ 142.661251] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.662184] flags: 0x800(slab|zone=0)
[ 142.662711] page_type: 0xffffffff()
[ 142.663234] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.664151] raw: 00000000
[ 142.664553] page dumped because: kasan: bad access detected
[ 142.665367]
[ 142.665706] Memory state around the buggy address:
[ 142.666461] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.667452] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.668460] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.669271] ^
[ 142.669744] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.670602] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.671490] ==================================================================
[ 143.003618] ==================================================================
[ 143.005544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[ 143.006360] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.006964]
[ 143.007886] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.008893] Hardware name: Generic DT based system
[ 143.009529] unwind_backtrace from show_stack+0x18/0x1c
[ 143.010161] show_stack from dump_stack_lvl+0x58/0x70
[ 143.010930] dump_stack_lvl from print_report+0x164/0x51c
[ 143.011779] print_report from kasan_report+0xc8/0x104
[ 143.012363] kasan_report from kasan_bitops_generic+0x39c/0xc30
[ 143.013257] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.014085] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.015079] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.015930] kthread from ret_from_fork+0x14/0x30
[ 143.016481] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.017430] 3fa0: 00000000 00000000 00000000 00000000
[ 143.018293] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.019177] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.019908]
[ 143.020224] Allocated by task 201:
[ 143.020689] kasan_set_track+0x3c/0x5c
[ 143.021291] __kasan_kmalloc+0x8c/0x94
[ 143.021818] kasan_bitops_generic+0xa0/0xc30
[ 143.022451] kunit_try_run_case+0x11c/0x2e4
[ 143.022973] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.023734] kthread+0x184/0x1a8
[ 143.024163] ret_from_fork+0x14/0x30
[ 143.024703]
[ 143.025037] The buggy address belongs to the object at c8fe7800
[ 143.025037] which belongs to the cache kmalloc-64 of size 64
[ 143.026213] The buggy address is located 4 bytes inside of
[ 143.026213] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.027632]
[ 143.027910] The buggy address belongs to the physical page:
[ 143.028487] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.029310] flags: 0x800(slab|zone=0)
[ 143.029758] page_type: 0xffffffff()
[ 143.030391] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.031288] raw: 00000000
[ 143.031706] page dumped because: kasan: bad access detected
[ 143.032343]
[ 143.032605] Memory state around the buggy address:
[ 143.033220] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.033905] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.034682] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.035331] ^
[ 143.035789] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.036625] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.037605] ==================================================================
[ 143.040827] ==================================================================
[ 143.042762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[ 143.043457] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.044336]
[ 143.044586] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.045369] Hardware name: Generic DT based system
[ 143.046041] unwind_backtrace from show_stack+0x18/0x1c
[ 143.046856] show_stack from dump_stack_lvl+0x58/0x70
[ 143.048150] dump_stack_lvl from print_report+0x164/0x51c
[ 143.048859] print_report from kasan_report+0xc8/0x104
[ 143.049576] kasan_report from kasan_bitops_generic+0x404/0xc30
[ 143.050537] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.051390] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.052327] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.053199] kthread from ret_from_fork+0x14/0x30
[ 143.053827] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.054405] 3fa0: 00000000 00000000 00000000 00000000
[ 143.055354] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.056254] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.056940]
[ 143.057321] Allocated by task 201:
[ 143.057761] kasan_set_track+0x3c/0x5c
[ 143.058276] __kasan_kmalloc+0x8c/0x94
[ 143.058820] kasan_bitops_generic+0xa0/0xc30
[ 143.059636] kunit_try_run_case+0x11c/0x2e4
[ 143.060229] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.060811] kthread+0x184/0x1a8
[ 143.061359] ret_from_fork+0x14/0x30
[ 143.061880]
[ 143.062233] The buggy address belongs to the object at c8fe7800
[ 143.062233] which belongs to the cache kmalloc-64 of size 64
[ 143.063463] The buggy address is located 4 bytes inside of
[ 143.063463] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.064610]
[ 143.064907] The buggy address belongs to the physical page:
[ 143.065572] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.066425] flags: 0x800(slab|zone=0)
[ 143.066997] page_type: 0xffffffff()
[ 143.067728] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.068584] raw: 00000000
[ 143.068963] page dumped because: kasan: bad access detected
[ 143.069536]
[ 143.069891] Memory state around the buggy address:
[ 143.070473] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.071151] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.071860] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.072575] ^
[ 143.072929] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.073718] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.074463] ==================================================================
[ 142.783779] ==================================================================
[ 142.784488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[ 142.785420] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.786271]
[ 142.786654] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.788399] Hardware name: Generic DT based system
[ 142.789019] unwind_backtrace from show_stack+0x18/0x1c
[ 142.789881] show_stack from dump_stack_lvl+0x58/0x70
[ 142.790658] dump_stack_lvl from print_report+0x164/0x51c
[ 142.791469] print_report from kasan_report+0xc8/0x104
[ 142.792275] kasan_report from kasan_bitops_generic+0x1f8/0xc30
[ 142.793156] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.794068] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.795074] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.796000] kthread from ret_from_fork+0x14/0x30
[ 142.796696] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.797391] 3fa0: 00000000 00000000 00000000 00000000
[ 142.798552] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.799597] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.800390]
[ 142.800696] Allocated by task 201:
[ 142.801291] kasan_set_track+0x3c/0x5c
[ 142.801828] __kasan_kmalloc+0x8c/0x94
[ 142.802528] kasan_bitops_generic+0xa0/0xc30
[ 142.803162] kunit_try_run_case+0x11c/0x2e4
[ 142.803945] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.804678] kthread+0x184/0x1a8
[ 142.805154] ret_from_fork+0x14/0x30
[ 142.805783]
[ 142.806146] The buggy address belongs to the object at c8fe7800
[ 142.806146] which belongs to the cache kmalloc-64 of size 64
[ 142.807760] The buggy address is located 4 bytes inside of
[ 142.807760] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.809011]
[ 142.809380] The buggy address belongs to the physical page:
[ 142.810047] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.811088] flags: 0x800(slab|zone=0)
[ 142.811653] page_type: 0xffffffff()
[ 142.812149] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.813227] raw: 00000000
[ 142.813588] page dumped because: kasan: bad access detected
[ 142.814276]
[ 142.814593] Memory state around the buggy address:
[ 142.815103] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.816075] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.816946] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.817916] ^
[ 142.818274] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.818956] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.819797] ==================================================================
[ 142.896310] ==================================================================
[ 142.898416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[ 142.899495] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.900240]
[ 142.900529] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.901763] Hardware name: Generic DT based system
[ 142.902347] unwind_backtrace from show_stack+0x18/0x1c
[ 142.903071] show_stack from dump_stack_lvl+0x58/0x70
[ 142.903778] dump_stack_lvl from print_report+0x164/0x51c
[ 142.904588] print_report from kasan_report+0xc8/0x104
[ 142.905297] kasan_report from kasan_bitops_generic+0x2d4/0xc30
[ 142.906201] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.907013] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.908157] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.908995] kthread from ret_from_fork+0x14/0x30
[ 142.909621] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.910200] 3fa0: 00000000 00000000 00000000 00000000
[ 142.911054] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.912001] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.912741]
[ 142.912997] Allocated by task 201:
[ 142.913451] kasan_set_track+0x3c/0x5c
[ 142.914069] __kasan_kmalloc+0x8c/0x94
[ 142.914582] kasan_bitops_generic+0xa0/0xc30
[ 142.915244] kunit_try_run_case+0x11c/0x2e4
[ 142.915798] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.916534] kthread+0x184/0x1a8
[ 142.916960] ret_from_fork+0x14/0x30
[ 142.917802]
[ 142.918033] The buggy address belongs to the object at c8fe7800
[ 142.918033] which belongs to the cache kmalloc-64 of size 64
[ 142.919384] The buggy address is located 4 bytes inside of
[ 142.919384] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.920563]
[ 142.920858] The buggy address belongs to the physical page:
[ 142.921480] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.922254] flags: 0x800(slab|zone=0)
[ 142.922805] page_type: 0xffffffff()
[ 142.923217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.924095] raw: 00000000
[ 142.924562] page dumped because: kasan: bad access detected
[ 142.925196]
[ 142.925404] Memory state around the buggy address:
[ 142.926118] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.926897] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.927884] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.928502] ^
[ 142.929011] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.929913] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.930808] ==================================================================
[ 143.109989] ==================================================================
[ 143.110692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[ 143.111573] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.112198]
[ 143.112489] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.113412] Hardware name: Generic DT based system
[ 143.114065] unwind_backtrace from show_stack+0x18/0x1c
[ 143.114900] show_stack from dump_stack_lvl+0x58/0x70
[ 143.115562] dump_stack_lvl from print_report+0x164/0x51c
[ 143.116264] print_report from kasan_report+0xc8/0x104
[ 143.116842] kasan_report from kasan_check_range+0x14c/0x198
[ 143.118306] kasan_check_range from kasan_bitops_generic+0x478/0xc30
[ 143.119228] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.120150] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.121095] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.121961] kthread from ret_from_fork+0x14/0x30
[ 143.122537] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.123180] 3fa0: 00000000 00000000 00000000 00000000
[ 143.124076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.125034] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.125840]
[ 143.126085] Allocated by task 201:
[ 143.126473] kasan_set_track+0x3c/0x5c
[ 143.126980] __kasan_kmalloc+0x8c/0x94
[ 143.127827] kasan_bitops_generic+0xa0/0xc30
[ 143.128427] kunit_try_run_case+0x11c/0x2e4
[ 143.129019] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.129779] kthread+0x184/0x1a8
[ 143.130187] ret_from_fork+0x14/0x30
[ 143.130716]
[ 143.131013] The buggy address belongs to the object at c8fe7800
[ 143.131013] which belongs to the cache kmalloc-64 of size 64
[ 143.132104] The buggy address is located 4 bytes inside of
[ 143.132104] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.133353]
[ 143.133668] The buggy address belongs to the physical page:
[ 143.134309] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.135223] flags: 0x800(slab|zone=0)
[ 143.135641] page_type: 0xffffffff()
[ 143.136209] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.137315] raw: 00000000
[ 143.137613] page dumped because: kasan: bad access detected
[ 143.138420]
[ 143.138655] Memory state around the buggy address:
[ 143.139168] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.140165] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.140954] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.141643] ^
[ 143.141933] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.142764] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.143487] ==================================================================
[ 142.675353] ==================================================================
[ 142.677219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[ 142.678700] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.679450]
[ 142.679727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.680552] Hardware name: Generic DT based system
[ 142.681204] unwind_backtrace from show_stack+0x18/0x1c
[ 142.682083] show_stack from dump_stack_lvl+0x58/0x70
[ 142.682807] dump_stack_lvl from print_report+0x164/0x51c
[ 142.683533] print_report from kasan_report+0xc8/0x104
[ 142.684159] kasan_report from kasan_bitops_generic+0x168/0xc30
[ 142.685008] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.685868] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.686848] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.687686] kthread from ret_from_fork+0x14/0x30
[ 142.688297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.688867] 3fa0: 00000000 00000000 00000000 00000000
[ 142.689872] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.690751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.691507]
[ 142.691800] Allocated by task 201:
[ 142.692229] kasan_set_track+0x3c/0x5c
[ 142.692818] __kasan_kmalloc+0x8c/0x94
[ 142.693370] kasan_bitops_generic+0xa0/0xc30
[ 142.693961] kunit_try_run_case+0x11c/0x2e4
[ 142.694531] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.695190] kthread+0x184/0x1a8
[ 142.695574] ret_from_fork+0x14/0x30
[ 142.696199]
[ 142.696419] The buggy address belongs to the object at c8fe7800
[ 142.696419] which belongs to the cache kmalloc-64 of size 64
[ 142.697625] The buggy address is located 4 bytes inside of
[ 142.697625] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.698905]
[ 142.699200] The buggy address belongs to the physical page:
[ 142.699820] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.700747] flags: 0x800(slab|zone=0)
[ 142.701254] page_type: 0xffffffff()
[ 142.701661] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.702475] raw: 00000000
[ 142.702994] page dumped because: kasan: bad access detected
[ 142.703594]
[ 142.703817] Memory state around the buggy address:
[ 142.704479] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.705171] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.705987] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.706663] ^
[ 142.706990] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.707993] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.708676] ==================================================================
[ 143.075411] ==================================================================
[ 143.076316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[ 143.078057] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.078764]
[ 143.079038] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.079918] Hardware name: Generic DT based system
[ 143.080457] unwind_backtrace from show_stack+0x18/0x1c
[ 143.081241] show_stack from dump_stack_lvl+0x58/0x70
[ 143.082037] dump_stack_lvl from print_report+0x164/0x51c
[ 143.082776] print_report from kasan_report+0xc8/0x104
[ 143.083452] kasan_report from kasan_bitops_generic+0x43c/0xc30
[ 143.084253] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.085036] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.086032] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.086895] kthread from ret_from_fork+0x14/0x30
[ 143.087523] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.088100] 3fa0: 00000000 00000000 00000000 00000000
[ 143.089237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.090174] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.090908]
[ 143.091165] Allocated by task 201:
[ 143.091533] kasan_set_track+0x3c/0x5c
[ 143.092061] __kasan_kmalloc+0x8c/0x94
[ 143.092780] kasan_bitops_generic+0xa0/0xc30
[ 143.093343] kunit_try_run_case+0x11c/0x2e4
[ 143.093986] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.094622] kthread+0x184/0x1a8
[ 143.095163] ret_from_fork+0x14/0x30
[ 143.095749]
[ 143.095973] The buggy address belongs to the object at c8fe7800
[ 143.095973] which belongs to the cache kmalloc-64 of size 64
[ 143.097552] The buggy address is located 4 bytes inside of
[ 143.097552] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.098752]
[ 143.099051] The buggy address belongs to the physical page:
[ 143.099668] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.100565] flags: 0x800(slab|zone=0)
[ 143.101041] page_type: 0xffffffff()
[ 143.101473] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.102449] raw: 00000000
[ 143.102818] page dumped because: kasan: bad access detected
[ 143.103511]
[ 143.103742] Memory state around the buggy address:
[ 143.104430] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.105191] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.105877] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.106553] ^
[ 143.106847] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.107979] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.108717] ==================================================================
Home
[ 143.109989] ==================================================================
[ 143.110692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[ 143.111573] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.112198]
[ 143.112489] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.113412] Hardware name: Generic DT based system
[ 143.114065] unwind_backtrace from show_stack+0x18/0x1c
[ 143.114900] show_stack from dump_stack_lvl+0x58/0x70
[ 143.115562] dump_stack_lvl from print_report+0x164/0x51c
[ 143.116264] print_report from kasan_report+0xc8/0x104
[ 143.116842] kasan_report from kasan_check_range+0x14c/0x198
[ 143.118306] kasan_check_range from kasan_bitops_generic+0x478/0xc30
[ 143.119228] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.120150] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.121095] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.121961] kthread from ret_from_fork+0x14/0x30
[ 143.122537] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.123180] 3fa0: 00000000 00000000 00000000 00000000
[ 143.124076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.125034] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.125840]
[ 143.126085] Allocated by task 201:
[ 143.126473] kasan_set_track+0x3c/0x5c
[ 143.126980] __kasan_kmalloc+0x8c/0x94
[ 143.127827] kasan_bitops_generic+0xa0/0xc30
[ 143.128427] kunit_try_run_case+0x11c/0x2e4
[ 143.129019] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.129779] kthread+0x184/0x1a8
[ 143.130187] ret_from_fork+0x14/0x30
[ 143.130716]
[ 143.131013] The buggy address belongs to the object at c8fe7800
[ 143.131013] which belongs to the cache kmalloc-64 of size 64
[ 143.132104] The buggy address is located 4 bytes inside of
[ 143.132104] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.133353]
[ 143.133668] The buggy address belongs to the physical page:
[ 143.134309] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.135223] flags: 0x800(slab|zone=0)
[ 143.135641] page_type: 0xffffffff()
[ 143.136209] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.137315] raw: 00000000
[ 143.137613] page dumped because: kasan: bad access detected
[ 143.138420]
[ 143.138655] Memory state around the buggy address:
[ 143.139168] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.140165] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.140954] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.141643] ^
[ 143.141933] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.142764] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.143487] ==================================================================
---
[ 142.709799] ==================================================================
[ 142.710490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[ 142.711337] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.712027]
[ 142.712346] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.713335] Hardware name: Generic DT based system
[ 142.713852] unwind_backtrace from show_stack+0x18/0x1c
[ 142.714607] show_stack from dump_stack_lvl+0x58/0x70
[ 142.715274] dump_stack_lvl from print_report+0x164/0x51c
[ 142.715958] print_report from kasan_report+0xc8/0x104
[ 142.716634] kasan_report from kasan_check_range+0x14c/0x198
[ 142.718066] kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[ 142.718895] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.719875] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.720827] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.721691] kthread from ret_from_fork+0x14/0x30
[ 142.722297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.722867] 3fa0: 00000000 00000000 00000000 00000000
[ 142.723833] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.724756] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.725499]
[ 142.725752] Allocated by task 201:
[ 142.726118] kasan_set_track+0x3c/0x5c
[ 142.726754] __kasan_kmalloc+0x8c/0x94
[ 142.727601] kasan_bitops_generic+0xa0/0xc30
[ 142.728368] kunit_try_run_case+0x11c/0x2e4
[ 142.729204] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.729913] kthread+0x184/0x1a8
[ 142.730485] ret_from_fork+0x14/0x30
[ 142.731025]
[ 142.731349] The buggy address belongs to the object at c8fe7800
[ 142.731349] which belongs to the cache kmalloc-64 of size 64
[ 142.732639] The buggy address is located 4 bytes inside of
[ 142.732639] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.733816]
[ 142.734092] The buggy address belongs to the physical page:
[ 142.734607] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.735613] flags: 0x800(slab|zone=0)
[ 142.736098] page_type: 0xffffffff()
[ 142.736554] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.737580] raw: 00000000
[ 142.737977] page dumped because: kasan: bad access detected
[ 142.738781]
[ 142.739099] Memory state around the buggy address:
[ 142.739687] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.740406] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.741146] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.741846] ^
[ 142.742164] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.742966] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.743733] ==================================================================
---
[ 142.931907] ==================================================================
[ 142.932892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[ 142.933663] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.934476]
[ 142.934727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.935489] Hardware name: Generic DT based system
[ 142.936168] unwind_backtrace from show_stack+0x18/0x1c
[ 142.936863] show_stack from dump_stack_lvl+0x58/0x70
[ 142.938285] dump_stack_lvl from print_report+0x164/0x51c
[ 142.939101] print_report from kasan_report+0xc8/0x104
[ 142.939805] kasan_report from kasan_check_range+0x14c/0x198
[ 142.940616] kasan_check_range from kasan_bitops_generic+0x310/0xc30
[ 142.941420] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.942291] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.943254] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.944103] kthread from ret_from_fork+0x14/0x30
[ 142.944819] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.945471] 3fa0: 00000000 00000000 00000000 00000000
[ 142.946349] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.947235] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.948238]
[ 142.948504] Allocated by task 201:
[ 142.948810] kasan_set_track+0x3c/0x5c
[ 142.949091] __kasan_kmalloc+0x8c/0x94
[ 142.949571] kasan_bitops_generic+0xa0/0xc30
[ 142.950225] kunit_try_run_case+0x11c/0x2e4
[ 142.950935] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.951821] kthread+0x184/0x1a8
[ 142.952352] ret_from_fork+0x14/0x30
[ 142.952762]
[ 142.952992] The buggy address belongs to the object at c8fe7800
[ 142.952992] which belongs to the cache kmalloc-64 of size 64
[ 142.954370] The buggy address is located 4 bytes inside of
[ 142.954370] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.955467]
[ 142.955766] The buggy address belongs to the physical page:
[ 142.956484] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.957762] flags: 0x800(slab|zone=0)
[ 142.958462] page_type: 0xffffffff()
[ 142.958937] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.959716] raw: 00000000
[ 142.960105] page dumped because: kasan: bad access detected
[ 142.960735]
[ 142.961052] Memory state around the buggy address:
[ 142.961666] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.962491] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.963346] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.964316] ^
[ 142.964668] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.965497] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.966412] ==================================================================
---
[ 142.744699] ==================================================================
[ 142.745586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[ 142.746369] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.747767]
[ 142.748104] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.749172] Hardware name: Generic DT based system
[ 142.749713] unwind_backtrace from show_stack+0x18/0x1c
[ 142.750636] show_stack from dump_stack_lvl+0x58/0x70
[ 142.751473] dump_stack_lvl from print_report+0x164/0x51c
[ 142.752339] print_report from kasan_report+0xc8/0x104
[ 142.753096] kasan_report from kasan_check_range+0x14c/0x198
[ 142.754011] kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[ 142.755057] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.756117] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.757306] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.758431] kthread from ret_from_fork+0x14/0x30
[ 142.759239] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.759886] 3fa0: 00000000 00000000 00000000 00000000
[ 142.760922] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.761877] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.762674]
[ 142.762963] Allocated by task 201:
[ 142.763441] kasan_set_track+0x3c/0x5c
[ 142.764162] __kasan_kmalloc+0x8c/0x94
[ 142.764843] kasan_bitops_generic+0xa0/0xc30
[ 142.765500] kunit_try_run_case+0x11c/0x2e4
[ 142.766206] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.767036] kthread+0x184/0x1a8
[ 142.767807] ret_from_fork+0x14/0x30
[ 142.768371]
[ 142.768709] The buggy address belongs to the object at c8fe7800
[ 142.768709] which belongs to the cache kmalloc-64 of size 64
[ 142.769991] The buggy address is located 4 bytes inside of
[ 142.769991] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.771296]
[ 142.771674] The buggy address belongs to the physical page:
[ 142.772314] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.773348] flags: 0x800(slab|zone=0)
[ 142.773908] page_type: 0xffffffff()
[ 142.774614] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.775652] raw: 00000000
[ 142.776101] page dumped because: kasan: bad access detected
[ 142.776874]
[ 142.777330] Memory state around the buggy address:
[ 142.778144] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.778922] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.779672] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.780465] ^
[ 142.780957] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.781740] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.782558] ==================================================================
Home
[ 142.821019] ==================================================================
[ 142.821753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[ 142.822458] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.823491]
[ 142.823751] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.824905] Hardware name: Generic DT based system
[ 142.825576] unwind_backtrace from show_stack+0x18/0x1c
[ 142.826449] show_stack from dump_stack_lvl+0x58/0x70
[ 142.827959] dump_stack_lvl from print_report+0x164/0x51c
[ 142.828777] print_report from kasan_report+0xc8/0x104
[ 142.829677] kasan_report from kasan_bitops_generic+0x20c/0xc30
[ 142.830594] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.831522] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.832517] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.833425] kthread from ret_from_fork+0x14/0x30
[ 142.834076] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.834759] 3fa0: 00000000 00000000 00000000 00000000
[ 142.835733] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.836681] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.837784]
[ 142.838181] Allocated by task 201:
[ 142.838866] kasan_set_track+0x3c/0x5c
[ 142.839562] __kasan_kmalloc+0x8c/0x94
[ 142.840269] kasan_bitops_generic+0xa0/0xc30
[ 142.841047] kunit_try_run_case+0x11c/0x2e4
[ 142.841668] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.842585] kthread+0x184/0x1a8
[ 142.842908] ret_from_fork+0x14/0x30
[ 142.843511]
[ 142.843741] The buggy address belongs to the object at c8fe7800
[ 142.843741] which belongs to the cache kmalloc-64 of size 64
[ 142.845012] The buggy address is located 4 bytes inside of
[ 142.845012] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.846091]
[ 142.846404] The buggy address belongs to the physical page:
[ 142.847104] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.848174] flags: 0x800(slab|zone=0)
[ 142.848646] page_type: 0xffffffff()
[ 142.849217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.850212] raw: 00000000
[ 142.850575] page dumped because: kasan: bad access detected
[ 142.851164]
[ 142.851461] Memory state around the buggy address:
[ 142.852000] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.852746] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.853535] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.854269] ^
[ 142.854658] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.855460] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.856177] ==================================================================
Home
[ 142.859832] ==================================================================
[ 142.861730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[ 142.862569] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.863198]
[ 142.863495] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.864366] Hardware name: Generic DT based system
[ 142.864866] unwind_backtrace from show_stack+0x18/0x1c
[ 142.865652] show_stack from dump_stack_lvl+0x58/0x70
[ 142.866335] dump_stack_lvl from print_report+0x164/0x51c
[ 142.867015] print_report from kasan_report+0xc8/0x104
[ 142.867790] kasan_report from kasan_bitops_generic+0x26c/0xc30
[ 142.868651] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.869577] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.870604] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.871539] kthread from ret_from_fork+0x14/0x30
[ 142.872112] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.872784] 3fa0: 00000000 00000000 00000000 00000000
[ 142.873712] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.874623] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.875330]
[ 142.875577] Allocated by task 201:
[ 142.875938] kasan_set_track+0x3c/0x5c
[ 142.876535] __kasan_kmalloc+0x8c/0x94
[ 142.877050] kasan_bitops_generic+0xa0/0xc30
[ 142.877877] kunit_try_run_case+0x11c/0x2e4
[ 142.878449] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.879220] kthread+0x184/0x1a8
[ 142.879605] ret_from_fork+0x14/0x30
[ 142.880261]
[ 142.880523] The buggy address belongs to the object at c8fe7800
[ 142.880523] which belongs to the cache kmalloc-64 of size 64
[ 142.881661] The buggy address is located 4 bytes inside of
[ 142.881661] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.882938]
[ 142.883256] The buggy address belongs to the physical page:
[ 142.883852] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.884609] flags: 0x800(slab|zone=0)
[ 142.885204] page_type: 0xffffffff()
[ 142.885651] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.886452] raw: 00000000
[ 142.886909] page dumped because: kasan: bad access detected
[ 142.887555]
[ 142.888412] Memory state around the buggy address:
[ 142.889113] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.889806] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.890551] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.891256] ^
[ 142.891626] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.892426] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.892975] ==================================================================
---
[ 142.968010] ==================================================================
[ 142.969200] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[ 142.969898] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.970457]
[ 142.970761] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.971709] Hardware name: Generic DT based system
[ 142.972294] unwind_backtrace from show_stack+0x18/0x1c
[ 142.973052] show_stack from dump_stack_lvl+0x58/0x70
[ 142.973837] dump_stack_lvl from print_report+0x164/0x51c
[ 142.974641] print_report from kasan_report+0xc8/0x104
[ 142.975361] kasan_report from kasan_bitops_generic+0x318/0xc30
[ 142.976236] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.977301] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.978368] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.979228] kthread from ret_from_fork+0x14/0x30
[ 142.979793] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.980504] 3fa0: 00000000 00000000 00000000 00000000
[ 142.981345] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.982281] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.983149]
[ 142.983395] Allocated by task 201:
[ 142.983776] kasan_set_track+0x3c/0x5c
[ 142.984405] __kasan_kmalloc+0x8c/0x94
[ 142.984858] kasan_bitops_generic+0xa0/0xc30
[ 142.985537] kunit_try_run_case+0x11c/0x2e4
[ 142.986076] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.986809] kthread+0x184/0x1a8
[ 142.987284] ret_from_fork+0x14/0x30
[ 142.987846]
[ 142.988067] The buggy address belongs to the object at c8fe7800
[ 142.988067] which belongs to the cache kmalloc-64 of size 64
[ 142.989564] The buggy address is located 4 bytes inside of
[ 142.989564] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.990678]
[ 142.990993] The buggy address belongs to the physical page:
[ 142.991651] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.992585] flags: 0x800(slab|zone=0)
[ 142.993089] page_type: 0xffffffff()
[ 142.993552] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.994458] raw: 00000000
[ 142.994923] page dumped because: kasan: bad access detected
[ 142.995444]
[ 142.995815] Memory state around the buggy address:
[ 142.996341] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.997310] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.998117] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.998809] ^
[ 142.999197] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.999881] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.000632] ==================================================================
---
[ 142.634480] ==================================================================
[ 142.636315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[ 142.637021] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.638451]
[ 142.638726] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.639636] Hardware name: Generic DT based system
[ 142.640424] unwind_backtrace from show_stack+0x18/0x1c
[ 142.641286] show_stack from dump_stack_lvl+0x58/0x70
[ 142.642003] dump_stack_lvl from print_report+0x164/0x51c
[ 142.642874] print_report from kasan_report+0xc8/0x104
[ 142.643635] kasan_report from kasan_bitops_generic+0x100/0xc30
[ 142.644520] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.645401] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.646353] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.647382] kthread from ret_from_fork+0x14/0x30
[ 142.648007] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.648711] 3fa0: 00000000 00000000 00000000 00000000
[ 142.650577] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.651409] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.652111]
[ 142.652413] Allocated by task 201:
[ 142.652837] kasan_set_track+0x3c/0x5c
[ 142.653496] __kasan_kmalloc+0x8c/0x94
[ 142.654046] kasan_bitops_generic+0xa0/0xc30
[ 142.654617] kunit_try_run_case+0x11c/0x2e4
[ 142.655210] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.655796] kthread+0x184/0x1a8
[ 142.656304] ret_from_fork+0x14/0x30
[ 142.656777]
[ 142.657018] The buggy address belongs to the object at c8fe7800
[ 142.657018] which belongs to the cache kmalloc-64 of size 64
[ 142.658541] The buggy address is located 4 bytes inside of
[ 142.658541] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.659953]
[ 142.660384] The buggy address belongs to the physical page:
[ 142.661251] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.662184] flags: 0x800(slab|zone=0)
[ 142.662711] page_type: 0xffffffff()
[ 142.663234] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.664151] raw: 00000000
[ 142.664553] page dumped because: kasan: bad access detected
[ 142.665367]
[ 142.665706] Memory state around the buggy address:
[ 142.666461] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.667452] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.668460] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.669271] ^
[ 142.669744] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.670602] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.671490] ==================================================================
---
[ 143.003618] ==================================================================
[ 143.005544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[ 143.006360] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.006964]
[ 143.007886] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.008893] Hardware name: Generic DT based system
[ 143.009529] unwind_backtrace from show_stack+0x18/0x1c
[ 143.010161] show_stack from dump_stack_lvl+0x58/0x70
[ 143.010930] dump_stack_lvl from print_report+0x164/0x51c
[ 143.011779] print_report from kasan_report+0xc8/0x104
[ 143.012363] kasan_report from kasan_bitops_generic+0x39c/0xc30
[ 143.013257] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.014085] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.015079] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.015930] kthread from ret_from_fork+0x14/0x30
[ 143.016481] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.017430] 3fa0: 00000000 00000000 00000000 00000000
[ 143.018293] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.019177] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.019908]
[ 143.020224] Allocated by task 201:
[ 143.020689] kasan_set_track+0x3c/0x5c
[ 143.021291] __kasan_kmalloc+0x8c/0x94
[ 143.021818] kasan_bitops_generic+0xa0/0xc30
[ 143.022451] kunit_try_run_case+0x11c/0x2e4
[ 143.022973] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.023734] kthread+0x184/0x1a8
[ 143.024163] ret_from_fork+0x14/0x30
[ 143.024703]
[ 143.025037] The buggy address belongs to the object at c8fe7800
[ 143.025037] which belongs to the cache kmalloc-64 of size 64
[ 143.026213] The buggy address is located 4 bytes inside of
[ 143.026213] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.027632]
[ 143.027910] The buggy address belongs to the physical page:
[ 143.028487] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.029310] flags: 0x800(slab|zone=0)
[ 143.029758] page_type: 0xffffffff()
[ 143.030391] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.031288] raw: 00000000
[ 143.031706] page dumped because: kasan: bad access detected
[ 143.032343]
[ 143.032605] Memory state around the buggy address:
[ 143.033220] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.033905] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.034682] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.035331] ^
[ 143.035789] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.036625] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.037605] ==================================================================
---
[ 143.040827] ==================================================================
[ 143.042762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[ 143.043457] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.044336]
[ 143.044586] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.045369] Hardware name: Generic DT based system
[ 143.046041] unwind_backtrace from show_stack+0x18/0x1c
[ 143.046856] show_stack from dump_stack_lvl+0x58/0x70
[ 143.048150] dump_stack_lvl from print_report+0x164/0x51c
[ 143.048859] print_report from kasan_report+0xc8/0x104
[ 143.049576] kasan_report from kasan_bitops_generic+0x404/0xc30
[ 143.050537] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.051390] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.052327] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.053199] kthread from ret_from_fork+0x14/0x30
[ 143.053827] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.054405] 3fa0: 00000000 00000000 00000000 00000000
[ 143.055354] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.056254] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.056940]
[ 143.057321] Allocated by task 201:
[ 143.057761] kasan_set_track+0x3c/0x5c
[ 143.058276] __kasan_kmalloc+0x8c/0x94
[ 143.058820] kasan_bitops_generic+0xa0/0xc30
[ 143.059636] kunit_try_run_case+0x11c/0x2e4
[ 143.060229] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.060811] kthread+0x184/0x1a8
[ 143.061359] ret_from_fork+0x14/0x30
[ 143.061880]
[ 143.062233] The buggy address belongs to the object at c8fe7800
[ 143.062233] which belongs to the cache kmalloc-64 of size 64
[ 143.063463] The buggy address is located 4 bytes inside of
[ 143.063463] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.064610]
[ 143.064907] The buggy address belongs to the physical page:
[ 143.065572] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.066425] flags: 0x800(slab|zone=0)
[ 143.066997] page_type: 0xffffffff()
[ 143.067728] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.068584] raw: 00000000
[ 143.068963] page dumped because: kasan: bad access detected
[ 143.069536]
[ 143.069891] Memory state around the buggy address:
[ 143.070473] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.071151] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.071860] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.072575] ^
[ 143.072929] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.073718] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.074463] ==================================================================
---
[ 142.783779] ==================================================================
[ 142.784488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[ 142.785420] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.786271]
[ 142.786654] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.788399] Hardware name: Generic DT based system
[ 142.789019] unwind_backtrace from show_stack+0x18/0x1c
[ 142.789881] show_stack from dump_stack_lvl+0x58/0x70
[ 142.790658] dump_stack_lvl from print_report+0x164/0x51c
[ 142.791469] print_report from kasan_report+0xc8/0x104
[ 142.792275] kasan_report from kasan_bitops_generic+0x1f8/0xc30
[ 142.793156] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.794068] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.795074] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.796000] kthread from ret_from_fork+0x14/0x30
[ 142.796696] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.797391] 3fa0: 00000000 00000000 00000000 00000000
[ 142.798552] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.799597] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.800390]
[ 142.800696] Allocated by task 201:
[ 142.801291] kasan_set_track+0x3c/0x5c
[ 142.801828] __kasan_kmalloc+0x8c/0x94
[ 142.802528] kasan_bitops_generic+0xa0/0xc30
[ 142.803162] kunit_try_run_case+0x11c/0x2e4
[ 142.803945] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.804678] kthread+0x184/0x1a8
[ 142.805154] ret_from_fork+0x14/0x30
[ 142.805783]
[ 142.806146] The buggy address belongs to the object at c8fe7800
[ 142.806146] which belongs to the cache kmalloc-64 of size 64
[ 142.807760] The buggy address is located 4 bytes inside of
[ 142.807760] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.809011]
[ 142.809380] The buggy address belongs to the physical page:
[ 142.810047] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.811088] flags: 0x800(slab|zone=0)
[ 142.811653] page_type: 0xffffffff()
[ 142.812149] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.813227] raw: 00000000
[ 142.813588] page dumped because: kasan: bad access detected
[ 142.814276]
[ 142.814593] Memory state around the buggy address:
[ 142.815103] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.816075] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.816946] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.817916] ^
[ 142.818274] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.818956] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.819797] ==================================================================
---
[ 142.896310] ==================================================================
[ 142.898416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[ 142.899495] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.900240]
[ 142.900529] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.901763] Hardware name: Generic DT based system
[ 142.902347] unwind_backtrace from show_stack+0x18/0x1c
[ 142.903071] show_stack from dump_stack_lvl+0x58/0x70
[ 142.903778] dump_stack_lvl from print_report+0x164/0x51c
[ 142.904588] print_report from kasan_report+0xc8/0x104
[ 142.905297] kasan_report from kasan_bitops_generic+0x2d4/0xc30
[ 142.906201] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.907013] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.908157] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.908995] kthread from ret_from_fork+0x14/0x30
[ 142.909621] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.910200] 3fa0: 00000000 00000000 00000000 00000000
[ 142.911054] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.912001] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.912741]
[ 142.912997] Allocated by task 201:
[ 142.913451] kasan_set_track+0x3c/0x5c
[ 142.914069] __kasan_kmalloc+0x8c/0x94
[ 142.914582] kasan_bitops_generic+0xa0/0xc30
[ 142.915244] kunit_try_run_case+0x11c/0x2e4
[ 142.915798] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.916534] kthread+0x184/0x1a8
[ 142.916960] ret_from_fork+0x14/0x30
[ 142.917802]
[ 142.918033] The buggy address belongs to the object at c8fe7800
[ 142.918033] which belongs to the cache kmalloc-64 of size 64
[ 142.919384] The buggy address is located 4 bytes inside of
[ 142.919384] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.920563]
[ 142.920858] The buggy address belongs to the physical page:
[ 142.921480] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.922254] flags: 0x800(slab|zone=0)
[ 142.922805] page_type: 0xffffffff()
[ 142.923217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.924095] raw: 00000000
[ 142.924562] page dumped because: kasan: bad access detected
[ 142.925196]
[ 142.925404] Memory state around the buggy address:
[ 142.926118] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.926897] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.927884] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.928502] ^
[ 142.929011] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.929913] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.930808] ==================================================================
---
[ 142.675353] ==================================================================
[ 142.677219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[ 142.678700] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 142.679450]
[ 142.679727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.680552] Hardware name: Generic DT based system
[ 142.681204] unwind_backtrace from show_stack+0x18/0x1c
[ 142.682083] show_stack from dump_stack_lvl+0x58/0x70
[ 142.682807] dump_stack_lvl from print_report+0x164/0x51c
[ 142.683533] print_report from kasan_report+0xc8/0x104
[ 142.684159] kasan_report from kasan_bitops_generic+0x168/0xc30
[ 142.685008] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 142.685868] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.686848] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.687686] kthread from ret_from_fork+0x14/0x30
[ 142.688297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 142.688867] 3fa0: 00000000 00000000 00000000 00000000
[ 142.689872] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.690751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.691507]
[ 142.691800] Allocated by task 201:
[ 142.692229] kasan_set_track+0x3c/0x5c
[ 142.692818] __kasan_kmalloc+0x8c/0x94
[ 142.693370] kasan_bitops_generic+0xa0/0xc30
[ 142.693961] kunit_try_run_case+0x11c/0x2e4
[ 142.694531] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.695190] kthread+0x184/0x1a8
[ 142.695574] ret_from_fork+0x14/0x30
[ 142.696199]
[ 142.696419] The buggy address belongs to the object at c8fe7800
[ 142.696419] which belongs to the cache kmalloc-64 of size 64
[ 142.697625] The buggy address is located 4 bytes inside of
[ 142.697625] allocated 5-byte region [c8fe7800, c8fe7805)
[ 142.698905]
[ 142.699200] The buggy address belongs to the physical page:
[ 142.699820] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.700747] flags: 0x800(slab|zone=0)
[ 142.701254] page_type: 0xffffffff()
[ 142.701661] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 142.702475] raw: 00000000
[ 142.702994] page dumped because: kasan: bad access detected
[ 142.703594]
[ 142.703817] Memory state around the buggy address:
[ 142.704479] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.705171] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.705987] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.706663] ^
[ 142.706990] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.707993] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.708676] ==================================================================
---
[ 143.075411] ==================================================================
[ 143.076316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[ 143.078057] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[ 143.078764]
[ 143.079038] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.079918] Hardware name: Generic DT based system
[ 143.080457] unwind_backtrace from show_stack+0x18/0x1c
[ 143.081241] show_stack from dump_stack_lvl+0x58/0x70
[ 143.082037] dump_stack_lvl from print_report+0x164/0x51c
[ 143.082776] print_report from kasan_report+0xc8/0x104
[ 143.083452] kasan_report from kasan_bitops_generic+0x43c/0xc30
[ 143.084253] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 143.085036] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.086032] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.086895] kthread from ret_from_fork+0x14/0x30
[ 143.087523] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 143.088100] 3fa0: 00000000 00000000 00000000 00000000
[ 143.089237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.090174] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.090908]
[ 143.091165] Allocated by task 201:
[ 143.091533] kasan_set_track+0x3c/0x5c
[ 143.092061] __kasan_kmalloc+0x8c/0x94
[ 143.092780] kasan_bitops_generic+0xa0/0xc30
[ 143.093343] kunit_try_run_case+0x11c/0x2e4
[ 143.093986] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.094622] kthread+0x184/0x1a8
[ 143.095163] ret_from_fork+0x14/0x30
[ 143.095749]
[ 143.095973] The buggy address belongs to the object at c8fe7800
[ 143.095973] which belongs to the cache kmalloc-64 of size 64
[ 143.097552] The buggy address is located 4 bytes inside of
[ 143.097552] allocated 5-byte region [c8fe7800, c8fe7805)
[ 143.098752]
[ 143.099051] The buggy address belongs to the physical page:
[ 143.099668] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 143.100565] flags: 0x800(slab|zone=0)
[ 143.101041] page_type: 0xffffffff()
[ 143.101473] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 143.102449] raw: 00000000
[ 143.102818] page dumped because: kasan: bad access detected
[ 143.103511]
[ 143.103742] Memory state around the buggy address:
[ 143.104430] c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.105191] c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.105877] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.106553] ^
[ 143.106847] c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.107979] c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 143.108717] ==================================================================
Home
[ 139.939584] ==================================================================
[ 139.940734] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1dc
[ 139.941422] Write of size 1 at addr c8f79f00 by task kunit_try_catch/127
[ 139.942101]
[ 139.942359] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.943328] Hardware name: Generic DT based system
[ 139.943928] unwind_backtrace from show_stack+0x18/0x1c
[ 139.944679] show_stack from dump_stack_lvl+0x58/0x70
[ 139.945340] dump_stack_lvl from print_report+0x164/0x51c
[ 139.946013] print_report from kasan_report+0xc8/0x104
[ 139.946801] kasan_report from kmalloc_large_oob_right+0xcc/0x1dc
[ 139.947598] kmalloc_large_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.948766] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.949715] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.950648] kthread from ret_from_fork+0x14/0x30
[ 139.951189] Exception stack(0xf9efbfb0 to 0xf9efbff8)
[ 139.951818] bfa0: 00000000 00000000 00000000 00000000
[ 139.952650] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.953620] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.954393]
[ 139.954649] Allocated by task 127:
[ 139.955013] kasan_set_track+0x3c/0x5c
[ 139.955649] __kasan_kmalloc+0x8c/0x94
[ 139.956177] kmalloc_large_oob_right+0xa0/0x1dc
[ 139.956816] kunit_try_run_case+0x11c/0x2e4
[ 139.957693] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.958349] kthread+0x184/0x1a8
[ 139.958822] ret_from_fork+0x14/0x30
[ 139.959286]
[ 139.959633] The buggy address belongs to the object at c8f78000
[ 139.959633] which belongs to the cache kmalloc-8k of size 8192
[ 139.960723] The buggy address is located 0 bytes to the right of
[ 139.960723] allocated 7936-byte region [c8f78000, c8f79f00)
[ 139.961914]
[ 139.962216] The buggy address belongs to the physical page:
[ 139.962879] page:b889f1d2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f78
[ 139.963895] head:b889f1d2 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.964642] flags: 0x840(slab|head|zone=0)
[ 139.965208] page_type: 0xffffffff()
[ 139.965681] raw: 00000840 c4801a00 00000122 00000000 00000000 80020002 ffffffff 00000001
[ 139.966472] raw: 00000000
[ 139.966905] page dumped because: kasan: bad access detected
[ 139.967884]
[ 139.968139] Memory state around the buggy address:
[ 139.968696] c8f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.969335] c8f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.970249] >c8f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.970866] ^
[ 139.971325] c8f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.972088] c8f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.972924] ==================================================================
Home
[ 139.939584] ==================================================================
[ 139.940734] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1dc
[ 139.941422] Write of size 1 at addr c8f79f00 by task kunit_try_catch/127
[ 139.942101]
[ 139.942359] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.943328] Hardware name: Generic DT based system
[ 139.943928] unwind_backtrace from show_stack+0x18/0x1c
[ 139.944679] show_stack from dump_stack_lvl+0x58/0x70
[ 139.945340] dump_stack_lvl from print_report+0x164/0x51c
[ 139.946013] print_report from kasan_report+0xc8/0x104
[ 139.946801] kasan_report from kmalloc_large_oob_right+0xcc/0x1dc
[ 139.947598] kmalloc_large_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.948766] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.949715] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.950648] kthread from ret_from_fork+0x14/0x30
[ 139.951189] Exception stack(0xf9efbfb0 to 0xf9efbff8)
[ 139.951818] bfa0: 00000000 00000000 00000000 00000000
[ 139.952650] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.953620] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.954393]
[ 139.954649] Allocated by task 127:
[ 139.955013] kasan_set_track+0x3c/0x5c
[ 139.955649] __kasan_kmalloc+0x8c/0x94
[ 139.956177] kmalloc_large_oob_right+0xa0/0x1dc
[ 139.956816] kunit_try_run_case+0x11c/0x2e4
[ 139.957693] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.958349] kthread+0x184/0x1a8
[ 139.958822] ret_from_fork+0x14/0x30
[ 139.959286]
[ 139.959633] The buggy address belongs to the object at c8f78000
[ 139.959633] which belongs to the cache kmalloc-8k of size 8192
[ 139.960723] The buggy address is located 0 bytes to the right of
[ 139.960723] allocated 7936-byte region [c8f78000, c8f79f00)
[ 139.961914]
[ 139.962216] The buggy address belongs to the physical page:
[ 139.962879] page:b889f1d2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f78
[ 139.963895] head:b889f1d2 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.964642] flags: 0x840(slab|head|zone=0)
[ 139.965208] page_type: 0xffffffff()
[ 139.965681] raw: 00000840 c4801a00 00000122 00000000 00000000 80020002 ffffffff 00000001
[ 139.966472] raw: 00000000
[ 139.966905] page dumped because: kasan: bad access detected
[ 139.967884]
[ 139.968139] Memory state around the buggy address:
[ 139.968696] c8f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.969335] c8f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.970249] >c8f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.970866] ^
[ 139.971325] c8f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.972088] c8f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.972924] ==================================================================
Home
[ 140.923264] ==================================================================
[ 140.924459] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e8
[ 140.925209] Read of size 64 at addr c4ce1f84 by task kunit_try_catch/155
[ 140.925933]
[ 140.926277] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.927475] Hardware name: Generic DT based system
[ 140.928208] unwind_backtrace from show_stack+0x18/0x1c
[ 140.928907] show_stack from dump_stack_lvl+0x58/0x70
[ 140.929651] dump_stack_lvl from print_report+0x164/0x51c
[ 140.930525] print_report from kasan_report+0xc8/0x104
[ 140.931258] kasan_report from kasan_check_range+0x14c/0x198
[ 140.932026] kasan_check_range from __asan_memmove+0x28/0x68
[ 140.932889] __asan_memmove from kmalloc_memmove_invalid_size+0xe4/0x1e8
[ 140.933729] kmalloc_memmove_invalid_size from kunit_try_run_case+0x11c/0x2e4
[ 140.934667] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.935653] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.936495] kthread from ret_from_fork+0x14/0x30
[ 140.937294] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[ 140.937974] bfa0: 00000000 00000000 00000000 00000000
[ 140.939023] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.939909] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.940657]
[ 140.940899] Allocated by task 155:
[ 140.941280] kasan_set_track+0x3c/0x5c
[ 140.941876] __kasan_kmalloc+0x8c/0x94
[ 140.942359] kmalloc_memmove_invalid_size+0xa0/0x1e8
[ 140.943091] kunit_try_run_case+0x11c/0x2e4
[ 140.943739] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.944400] kthread+0x184/0x1a8
[ 140.944944] ret_from_fork+0x14/0x30
[ 140.945403]
[ 140.945764] The buggy address belongs to the object at c4ce1f80
[ 140.945764] which belongs to the cache kmalloc-64 of size 64
[ 140.946939] The buggy address is located 4 bytes inside of
[ 140.946939] allocated 64-byte region [c4ce1f80, c4ce1fc0)
[ 140.948299]
[ 140.948603] The buggy address belongs to the physical page:
[ 140.949313] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 140.950282] flags: 0x800(slab|zone=0)
[ 140.950757] page_type: 0xffffffff()
[ 140.951343] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.952301] raw: 00000000
[ 140.952612] page dumped because: kasan: bad access detected
[ 140.953293]
[ 140.953538] Memory state around the buggy address:
[ 140.954199] c4ce1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.954945] c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.955813] >c4ce1f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 140.956575] ^
[ 140.957394] c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 140.958196] c4ce2080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 140.958873] ==================================================================
Home
[ 140.923264] ==================================================================
[ 140.924459] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e8
[ 140.925209] Read of size 64 at addr c4ce1f84 by task kunit_try_catch/155
[ 140.925933]
[ 140.926277] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.927475] Hardware name: Generic DT based system
[ 140.928208] unwind_backtrace from show_stack+0x18/0x1c
[ 140.928907] show_stack from dump_stack_lvl+0x58/0x70
[ 140.929651] dump_stack_lvl from print_report+0x164/0x51c
[ 140.930525] print_report from kasan_report+0xc8/0x104
[ 140.931258] kasan_report from kasan_check_range+0x14c/0x198
[ 140.932026] kasan_check_range from __asan_memmove+0x28/0x68
[ 140.932889] __asan_memmove from kmalloc_memmove_invalid_size+0xe4/0x1e8
[ 140.933729] kmalloc_memmove_invalid_size from kunit_try_run_case+0x11c/0x2e4
[ 140.934667] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.935653] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.936495] kthread from ret_from_fork+0x14/0x30
[ 140.937294] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[ 140.937974] bfa0: 00000000 00000000 00000000 00000000
[ 140.939023] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.939909] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.940657]
[ 140.940899] Allocated by task 155:
[ 140.941280] kasan_set_track+0x3c/0x5c
[ 140.941876] __kasan_kmalloc+0x8c/0x94
[ 140.942359] kmalloc_memmove_invalid_size+0xa0/0x1e8
[ 140.943091] kunit_try_run_case+0x11c/0x2e4
[ 140.943739] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.944400] kthread+0x184/0x1a8
[ 140.944944] ret_from_fork+0x14/0x30
[ 140.945403]
[ 140.945764] The buggy address belongs to the object at c4ce1f80
[ 140.945764] which belongs to the cache kmalloc-64 of size 64
[ 140.946939] The buggy address is located 4 bytes inside of
[ 140.946939] allocated 64-byte region [c4ce1f80, c4ce1fc0)
[ 140.948299]
[ 140.948603] The buggy address belongs to the physical page:
[ 140.949313] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 140.950282] flags: 0x800(slab|zone=0)
[ 140.950757] page_type: 0xffffffff()
[ 140.951343] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.952301] raw: 00000000
[ 140.952612] page dumped because: kasan: bad access detected
[ 140.953293]
[ 140.953538] Memory state around the buggy address:
[ 140.954199] c4ce1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.954945] c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.955813] >c4ce1f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 140.956575] ^
[ 140.957394] c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 140.958196] c4ce2080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 140.958873] ==================================================================
Home
[ 139.756605] ==================================================================
[ 139.758009] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e8
[ 139.759591] Read of size 1 at addr c4ded000 by task kunit_try_catch/115
[ 139.760350]
[ 139.760699] CPU: 1 PID: 115 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.761657] Hardware name: Generic DT based system
[ 139.762220] unwind_backtrace from show_stack+0x18/0x1c
[ 139.763173] show_stack from dump_stack_lvl+0x58/0x70
[ 139.763877] dump_stack_lvl from print_report+0x164/0x51c
[ 139.764488] print_report from kasan_report+0xc8/0x104
[ 139.765355] kasan_report from kmalloc_node_oob_right+0xd4/0x1e8
[ 139.766391] kmalloc_node_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.767338] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.768278] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.769234] kthread from ret_from_fork+0x14/0x30
[ 139.769762] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[ 139.770359] bfa0: 00000000 00000000 00000000 00000000
[ 139.771306] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.772147] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.772938]
[ 139.773167] Allocated by task 115:
[ 139.773737] kasan_set_track+0x3c/0x5c
[ 139.774307] __kasan_kmalloc+0x8c/0x94
[ 139.774809] kmalloc_node_oob_right+0xa4/0x1e8
[ 139.775488] kunit_try_run_case+0x11c/0x2e4
[ 139.776095] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.776802] kthread+0x184/0x1a8
[ 139.777575] ret_from_fork+0x14/0x30
[ 139.778050]
[ 139.778333] The buggy address belongs to the object at c4dec000
[ 139.778333] which belongs to the cache kmalloc-4k of size 4096
[ 139.779338] The buggy address is located 0 bytes to the right of
[ 139.779338] allocated 4096-byte region [c4dec000, c4ded000)
[ 139.780479]
[ 139.780783] The buggy address belongs to the physical page:
[ 139.781605] page:6270766f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44de8
[ 139.782499] head:6270766f order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.783419] flags: 0x840(slab|head|zone=0)
[ 139.783905] page_type: 0xffffffff()
[ 139.784442] raw: 00000840 c4801900 00000122 00000000 00000000 80040004 ffffffff 00000001
[ 139.785267] raw: 00000000
[ 139.785635] page dumped because: kasan: bad access detected
[ 139.786180]
[ 139.786528] Memory state around the buggy address:
[ 139.787395] c4decf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.788149] c4decf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.788723] >c4ded000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.789658] ^
[ 139.790018] c4ded080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.790590] c4ded100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.791416] ==================================================================
Home
[ 139.756605] ==================================================================
[ 139.758009] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e8
[ 139.759591] Read of size 1 at addr c4ded000 by task kunit_try_catch/115
[ 139.760350]
[ 139.760699] CPU: 1 PID: 115 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.761657] Hardware name: Generic DT based system
[ 139.762220] unwind_backtrace from show_stack+0x18/0x1c
[ 139.763173] show_stack from dump_stack_lvl+0x58/0x70
[ 139.763877] dump_stack_lvl from print_report+0x164/0x51c
[ 139.764488] print_report from kasan_report+0xc8/0x104
[ 139.765355] kasan_report from kmalloc_node_oob_right+0xd4/0x1e8
[ 139.766391] kmalloc_node_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.767338] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.768278] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.769234] kthread from ret_from_fork+0x14/0x30
[ 139.769762] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[ 139.770359] bfa0: 00000000 00000000 00000000 00000000
[ 139.771306] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.772147] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.772938]
[ 139.773167] Allocated by task 115:
[ 139.773737] kasan_set_track+0x3c/0x5c
[ 139.774307] __kasan_kmalloc+0x8c/0x94
[ 139.774809] kmalloc_node_oob_right+0xa4/0x1e8
[ 139.775488] kunit_try_run_case+0x11c/0x2e4
[ 139.776095] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.776802] kthread+0x184/0x1a8
[ 139.777575] ret_from_fork+0x14/0x30
[ 139.778050]
[ 139.778333] The buggy address belongs to the object at c4dec000
[ 139.778333] which belongs to the cache kmalloc-4k of size 4096
[ 139.779338] The buggy address is located 0 bytes to the right of
[ 139.779338] allocated 4096-byte region [c4dec000, c4ded000)
[ 139.780479]
[ 139.780783] The buggy address belongs to the physical page:
[ 139.781605] page:6270766f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44de8
[ 139.782499] head:6270766f order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.783419] flags: 0x840(slab|head|zone=0)
[ 139.783905] page_type: 0xffffffff()
[ 139.784442] raw: 00000840 c4801900 00000122 00000000 00000000 80040004 ffffffff 00000001
[ 139.785267] raw: 00000000
[ 139.785635] page dumped because: kasan: bad access detected
[ 139.786180]
[ 139.786528] Memory state around the buggy address:
[ 139.787395] c4decf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.788149] c4decf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.788723] >c4ded000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.789658] ^
[ 139.790018] c4ded080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.790590] c4ded100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.791416] ==================================================================
Home
[ 140.566267] ==================================================================
[ 140.567273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[ 140.568298] Write of size 16 at addr c4ce1d80 by task kunit_try_catch/139
[ 140.569841]
[ 140.570086] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.571045] Hardware name: Generic DT based system
[ 140.571559] unwind_backtrace from show_stack+0x18/0x1c
[ 140.572468] show_stack from dump_stack_lvl+0x58/0x70
[ 140.573181] dump_stack_lvl from print_report+0x164/0x51c
[ 140.573887] print_report from kasan_report+0xc8/0x104
[ 140.574603] kasan_report from kasan_check_range+0x14c/0x198
[ 140.575406] kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[ 140.576197] kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[ 140.577056] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.578254] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.579137] kthread from ret_from_fork+0x14/0x30
[ 140.579839] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[ 140.580445] bfa0: 00000000 00000000 00000000 00000000
[ 140.581391] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.582276] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.583065]
[ 140.583335] Allocated by task 139:
[ 140.583685] kasan_set_track+0x3c/0x5c
[ 140.584281] __kasan_kmalloc+0x8c/0x94
[ 140.584856] kmalloc_oob_16+0xa0/0x24c
[ 140.585521] kunit_try_run_case+0x11c/0x2e4
[ 140.586041] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.586801] kthread+0x184/0x1a8
[ 140.587231] ret_from_fork+0x14/0x30
[ 140.588142]
[ 140.588348] The buggy address belongs to the object at c4ce1d80
[ 140.588348] which belongs to the cache kmalloc-64 of size 64
[ 140.589613] The buggy address is located 0 bytes inside of
[ 140.589613] allocated 13-byte region [c4ce1d80, c4ce1d8d)
[ 140.590748]
[ 140.591003] The buggy address belongs to the physical page:
[ 140.591574] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 140.592540] flags: 0x800(slab|zone=0)
[ 140.593066] page_type: 0xffffffff()
[ 140.593624] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.594415] raw: 00000000
[ 140.594889] page dumped because: kasan: bad access detected
[ 140.595430]
[ 140.595750] Memory state around the buggy address:
[ 140.596291] c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.596944] c4ce1d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.597702] >c4ce1d80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.598443] ^
[ 140.598921] c4ce1e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.600000] c4ce1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.600851] ==================================================================
Home
[ 140.566267] ==================================================================
[ 140.567273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[ 140.568298] Write of size 16 at addr c4ce1d80 by task kunit_try_catch/139
[ 140.569841]
[ 140.570086] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.571045] Hardware name: Generic DT based system
[ 140.571559] unwind_backtrace from show_stack+0x18/0x1c
[ 140.572468] show_stack from dump_stack_lvl+0x58/0x70
[ 140.573181] dump_stack_lvl from print_report+0x164/0x51c
[ 140.573887] print_report from kasan_report+0xc8/0x104
[ 140.574603] kasan_report from kasan_check_range+0x14c/0x198
[ 140.575406] kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[ 140.576197] kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[ 140.577056] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.578254] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.579137] kthread from ret_from_fork+0x14/0x30
[ 140.579839] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[ 140.580445] bfa0: 00000000 00000000 00000000 00000000
[ 140.581391] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.582276] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.583065]
[ 140.583335] Allocated by task 139:
[ 140.583685] kasan_set_track+0x3c/0x5c
[ 140.584281] __kasan_kmalloc+0x8c/0x94
[ 140.584856] kmalloc_oob_16+0xa0/0x24c
[ 140.585521] kunit_try_run_case+0x11c/0x2e4
[ 140.586041] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.586801] kthread+0x184/0x1a8
[ 140.587231] ret_from_fork+0x14/0x30
[ 140.588142]
[ 140.588348] The buggy address belongs to the object at c4ce1d80
[ 140.588348] which belongs to the cache kmalloc-64 of size 64
[ 140.589613] The buggy address is located 0 bytes inside of
[ 140.589613] allocated 13-byte region [c4ce1d80, c4ce1d8d)
[ 140.590748]
[ 140.591003] The buggy address belongs to the physical page:
[ 140.591574] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 140.592540] flags: 0x800(slab|zone=0)
[ 140.593066] page_type: 0xffffffff()
[ 140.593624] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.594415] raw: 00000000
[ 140.594889] page dumped because: kasan: bad access detected
[ 140.595430]
[ 140.595750] Memory state around the buggy address:
[ 140.596291] c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.596944] c4ce1d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.597702] >c4ce1d80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.598443] ^
[ 140.598921] c4ce1e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.600000] c4ce1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.600851] ==================================================================
Home
[ 140.655598] ==================================================================
[ 140.656633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1dc
[ 140.657454] Write of size 128 at addr c4ce0400 by task kunit_try_catch/143
[ 140.658165]
[ 140.658473] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.659442] Hardware name: Generic DT based system
[ 140.660013] unwind_backtrace from show_stack+0x18/0x1c
[ 140.660891] show_stack from dump_stack_lvl+0x58/0x70
[ 140.661657] dump_stack_lvl from print_report+0x164/0x51c
[ 140.662439] print_report from kasan_report+0xc8/0x104
[ 140.663166] kasan_report from kasan_check_range+0x14c/0x198
[ 140.664037] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.664798] __asan_memset from kmalloc_oob_in_memset+0xd8/0x1dc
[ 140.665540] kmalloc_oob_in_memset from kunit_try_run_case+0x11c/0x2e4
[ 140.666402] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.667377] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.668276] kthread from ret_from_fork+0x14/0x30
[ 140.669013] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[ 140.669760] bfa0: 00000000 00000000 00000000 00000000
[ 140.670811] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.671874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.672647]
[ 140.672966] Allocated by task 143:
[ 140.673392] kasan_set_track+0x3c/0x5c
[ 140.673893] __kasan_kmalloc+0x8c/0x94
[ 140.674570] kmalloc_oob_in_memset+0xa0/0x1dc
[ 140.675142] kunit_try_run_case+0x11c/0x2e4
[ 140.675905] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.676628] kthread+0x184/0x1a8
[ 140.677082] ret_from_fork+0x14/0x30
[ 140.677590]
[ 140.677848] The buggy address belongs to the object at c4ce0400
[ 140.677848] which belongs to the cache kmalloc-128 of size 128
[ 140.679081] The buggy address is located 0 bytes inside of
[ 140.679081] allocated 120-byte region [c4ce0400, c4ce0478)
[ 140.680196]
[ 140.680520] The buggy address belongs to the physical page:
[ 140.681249] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.682107] flags: 0x800(slab|zone=0)
[ 140.682565] page_type: 0xffffffff()
[ 140.683050] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.684044] raw: 00000000
[ 140.684402] page dumped because: kasan: bad access detected
[ 140.684992]
[ 140.685290] Memory state around the buggy address:
[ 140.685841] c4ce0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.686587] c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.687762] >c4ce0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.688512] ^
[ 140.689193] c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.690764] c4ce0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.691582] ==================================================================
Home
[ 140.655598] ==================================================================
[ 140.656633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1dc
[ 140.657454] Write of size 128 at addr c4ce0400 by task kunit_try_catch/143
[ 140.658165]
[ 140.658473] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.659442] Hardware name: Generic DT based system
[ 140.660013] unwind_backtrace from show_stack+0x18/0x1c
[ 140.660891] show_stack from dump_stack_lvl+0x58/0x70
[ 140.661657] dump_stack_lvl from print_report+0x164/0x51c
[ 140.662439] print_report from kasan_report+0xc8/0x104
[ 140.663166] kasan_report from kasan_check_range+0x14c/0x198
[ 140.664037] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.664798] __asan_memset from kmalloc_oob_in_memset+0xd8/0x1dc
[ 140.665540] kmalloc_oob_in_memset from kunit_try_run_case+0x11c/0x2e4
[ 140.666402] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.667377] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.668276] kthread from ret_from_fork+0x14/0x30
[ 140.669013] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[ 140.669760] bfa0: 00000000 00000000 00000000 00000000
[ 140.670811] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.671874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.672647]
[ 140.672966] Allocated by task 143:
[ 140.673392] kasan_set_track+0x3c/0x5c
[ 140.673893] __kasan_kmalloc+0x8c/0x94
[ 140.674570] kmalloc_oob_in_memset+0xa0/0x1dc
[ 140.675142] kunit_try_run_case+0x11c/0x2e4
[ 140.675905] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.676628] kthread+0x184/0x1a8
[ 140.677082] ret_from_fork+0x14/0x30
[ 140.677590]
[ 140.677848] The buggy address belongs to the object at c4ce0400
[ 140.677848] which belongs to the cache kmalloc-128 of size 128
[ 140.679081] The buggy address is located 0 bytes inside of
[ 140.679081] allocated 120-byte region [c4ce0400, c4ce0478)
[ 140.680196]
[ 140.680520] The buggy address belongs to the physical page:
[ 140.681249] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.682107] flags: 0x800(slab|zone=0)
[ 140.682565] page_type: 0xffffffff()
[ 140.683050] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.684044] raw: 00000000
[ 140.684402] page dumped because: kasan: bad access detected
[ 140.684992]
[ 140.685290] Memory state around the buggy address:
[ 140.685841] c4ce0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.686587] c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.687762] >c4ce0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.688512] ^
[ 140.689193] c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.690764] c4ce0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.691582] ==================================================================
Home
[ 139.705758] ==================================================================
[ 139.706876] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1e0
[ 139.707567] Read of size 1 at addr c4ce1cff by task kunit_try_catch/113
[ 139.708328]
[ 139.708944] CPU: 1 PID: 113 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.709859] Hardware name: Generic DT based system
[ 139.710355] unwind_backtrace from show_stack+0x18/0x1c
[ 139.711558] show_stack from dump_stack_lvl+0x58/0x70
[ 139.712304] dump_stack_lvl from print_report+0x164/0x51c
[ 139.713057] print_report from kasan_report+0xc8/0x104
[ 139.713747] kasan_report from kmalloc_oob_left+0xcc/0x1e0
[ 139.714534] kmalloc_oob_left from kunit_try_run_case+0x11c/0x2e4
[ 139.715298] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.716250] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.717107] kthread from ret_from_fork+0x14/0x30
[ 139.717994] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[ 139.719266] bfa0: 00000000 00000000 00000000 00000000
[ 139.720566] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.721483] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.722286]
[ 139.722709] Allocated by task 105:
[ 139.723254] kasan_set_track+0x3c/0x5c
[ 139.723969] __kasan_kmalloc+0x8c/0x94
[ 139.724532] kunit_add_action+0xa0/0x1e8
[ 139.725085] kunit_add_action_or_reset+0x18/0x30
[ 139.725704] kunit_kmalloc_array+0x44/0x60
[ 139.726323] sysctl_test_dointvec_write_happy_single_negative+0x14c/0x334
[ 139.727083] kunit_try_run_case+0x11c/0x2e4
[ 139.728049] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.728755] kthread+0x184/0x1a8
[ 139.729261] ret_from_fork+0x14/0x30
[ 139.729759]
[ 139.730008] Freed by task 106:
[ 139.730484] kasan_set_track+0x3c/0x5c
[ 139.731038] kasan_save_free_info+0x30/0x3c
[ 139.731549] __kasan_slab_free+0xdc/0x124
[ 139.732148] __kmem_cache_free+0x140/0x2a8
[ 139.732834] kunit_cleanup+0x44/0x90
[ 139.733364] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.734054] kthread+0x184/0x1a8
[ 139.734647] ret_from_fork+0x14/0x30
[ 139.735157]
[ 139.735459] The buggy address belongs to the object at c4ce1c80
[ 139.735459] which belongs to the cache kmalloc-64 of size 64
[ 139.736586] The buggy address is located 63 bytes to the right of
[ 139.736586] allocated 64-byte region [c4ce1c80, c4ce1cc0)
[ 139.738526]
[ 139.738944] The buggy address belongs to the physical page:
[ 139.739709] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 139.740691] flags: 0x800(slab|zone=0)
[ 139.741401] page_type: 0xffffffff()
[ 139.741875] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 139.742738] raw: 00000000
[ 139.743245] page dumped because: kasan: bad access detected
[ 139.743894]
[ 139.744111] Memory state around the buggy address:
[ 139.744774] c4ce1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 139.745507] c4ce1c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 139.746252] >c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 139.747136] ^
[ 139.747722] c4ce1d00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.748562] c4ce1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.749594] ==================================================================
Home
[ 139.705758] ==================================================================
[ 139.706876] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1e0
[ 139.707567] Read of size 1 at addr c4ce1cff by task kunit_try_catch/113
[ 139.708328]
[ 139.708944] CPU: 1 PID: 113 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.709859] Hardware name: Generic DT based system
[ 139.710355] unwind_backtrace from show_stack+0x18/0x1c
[ 139.711558] show_stack from dump_stack_lvl+0x58/0x70
[ 139.712304] dump_stack_lvl from print_report+0x164/0x51c
[ 139.713057] print_report from kasan_report+0xc8/0x104
[ 139.713747] kasan_report from kmalloc_oob_left+0xcc/0x1e0
[ 139.714534] kmalloc_oob_left from kunit_try_run_case+0x11c/0x2e4
[ 139.715298] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.716250] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.717107] kthread from ret_from_fork+0x14/0x30
[ 139.717994] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[ 139.719266] bfa0: 00000000 00000000 00000000 00000000
[ 139.720566] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.721483] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.722286]
[ 139.722709] Allocated by task 105:
[ 139.723254] kasan_set_track+0x3c/0x5c
[ 139.723969] __kasan_kmalloc+0x8c/0x94
[ 139.724532] kunit_add_action+0xa0/0x1e8
[ 139.725085] kunit_add_action_or_reset+0x18/0x30
[ 139.725704] kunit_kmalloc_array+0x44/0x60
[ 139.726323] sysctl_test_dointvec_write_happy_single_negative+0x14c/0x334
[ 139.727083] kunit_try_run_case+0x11c/0x2e4
[ 139.728049] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.728755] kthread+0x184/0x1a8
[ 139.729261] ret_from_fork+0x14/0x30
[ 139.729759]
[ 139.730008] Freed by task 106:
[ 139.730484] kasan_set_track+0x3c/0x5c
[ 139.731038] kasan_save_free_info+0x30/0x3c
[ 139.731549] __kasan_slab_free+0xdc/0x124
[ 139.732148] __kmem_cache_free+0x140/0x2a8
[ 139.732834] kunit_cleanup+0x44/0x90
[ 139.733364] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.734054] kthread+0x184/0x1a8
[ 139.734647] ret_from_fork+0x14/0x30
[ 139.735157]
[ 139.735459] The buggy address belongs to the object at c4ce1c80
[ 139.735459] which belongs to the cache kmalloc-64 of size 64
[ 139.736586] The buggy address is located 63 bytes to the right of
[ 139.736586] allocated 64-byte region [c4ce1c80, c4ce1cc0)
[ 139.738526]
[ 139.738944] The buggy address belongs to the physical page:
[ 139.739709] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 139.740691] flags: 0x800(slab|zone=0)
[ 139.741401] page_type: 0xffffffff()
[ 139.741875] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 139.742738] raw: 00000000
[ 139.743245] page dumped because: kasan: bad access detected
[ 139.743894]
[ 139.744111] Memory state around the buggy address:
[ 139.744774] c4ce1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 139.745507] c4ce1c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 139.746252] >c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 139.747136] ^
[ 139.747722] c4ce1d00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.748562] c4ce1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.749594] ==================================================================
Home
[ 140.746324] ==================================================================
[ 140.747448] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[ 140.748223] Write of size 4 at addr c4ce0675 by task kunit_try_catch/147
[ 140.749001]
[ 140.749467] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.750408] Hardware name: Generic DT based system
[ 140.751206] unwind_backtrace from show_stack+0x18/0x1c
[ 140.752025] show_stack from dump_stack_lvl+0x58/0x70
[ 140.752813] dump_stack_lvl from print_report+0x164/0x51c
[ 140.753629] print_report from kasan_report+0xc8/0x104
[ 140.754478] kasan_report from kasan_check_range+0x14c/0x198
[ 140.755435] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.756365] __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[ 140.757451] kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[ 140.758944] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.759996] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.760877] kthread from ret_from_fork+0x14/0x30
[ 140.761453] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[ 140.762209] bfa0: 00000000 00000000 00000000 00000000
[ 140.763172] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.764137] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.764923]
[ 140.765254] Allocated by task 147:
[ 140.765634] kasan_set_track+0x3c/0x5c
[ 140.766349] __kasan_kmalloc+0x8c/0x94
[ 140.767044] kmalloc_oob_memset_4+0xa0/0x1e8
[ 140.767679] kunit_try_run_case+0x11c/0x2e4
[ 140.768424] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.769264] kthread+0x184/0x1a8
[ 140.769731] ret_from_fork+0x14/0x30
[ 140.770406]
[ 140.770710] The buggy address belongs to the object at c4ce0600
[ 140.770710] which belongs to the cache kmalloc-128 of size 128
[ 140.772049] The buggy address is located 117 bytes inside of
[ 140.772049] allocated 120-byte region [c4ce0600, c4ce0678)
[ 140.773402]
[ 140.773780] The buggy address belongs to the physical page:
[ 140.774508] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.775419] flags: 0x800(slab|zone=0)
[ 140.776036] page_type: 0xffffffff()
[ 140.776653] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.777823] raw: 00000000
[ 140.778379] page dumped because: kasan: bad access detected
[ 140.779827]
[ 140.780237] Memory state around the buggy address:
[ 140.780795] c4ce0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.781486] c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.782359] >c4ce0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.783047] ^
[ 140.783820] c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.784443] c4ce0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.785195] ==================================================================
[ 140.793868] ==================================================================
[ 140.794930] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[ 140.795750] Write of size 8 at addr c4ce0771 by task kunit_try_catch/149
[ 140.796362]
[ 140.796667] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.798453] Hardware name: Generic DT based system
[ 140.799190] unwind_backtrace from show_stack+0x18/0x1c
[ 140.799875] show_stack from dump_stack_lvl+0x58/0x70
[ 140.800565] dump_stack_lvl from print_report+0x164/0x51c
[ 140.801358] print_report from kasan_report+0xc8/0x104
[ 140.802190] kasan_report from kasan_check_range+0x14c/0x198
[ 140.802937] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.803709] __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[ 140.804459] kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[ 140.805310] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.806253] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.807088] kthread from ret_from_fork+0x14/0x30
[ 140.807807] Exception stack(0xf9fa3fb0 to 0xf9fa3ff8)
[ 140.808526] 3fa0: 00000000 00000000 00000000 00000000
[ 140.809436] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.810319] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.810968]
[ 140.811279] Allocated by task 149:
[ 140.811717] kasan_set_track+0x3c/0x5c
[ 140.812295] __kasan_kmalloc+0x8c/0x94
[ 140.812868] kmalloc_oob_memset_8+0xa0/0x1e8
[ 140.813445] kunit_try_run_case+0x11c/0x2e4
[ 140.813935] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.814739] kthread+0x184/0x1a8
[ 140.815204] ret_from_fork+0x14/0x30
[ 140.815777]
[ 140.816026] The buggy address belongs to the object at c4ce0700
[ 140.816026] which belongs to the cache kmalloc-128 of size 128
[ 140.817701] The buggy address is located 113 bytes inside of
[ 140.817701] allocated 120-byte region [c4ce0700, c4ce0778)
[ 140.818843]
[ 140.819094] The buggy address belongs to the physical page:
[ 140.819716] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.820618] flags: 0x800(slab|zone=0)
[ 140.821071] page_type: 0xffffffff()
[ 140.821556] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.822475] raw: 00000000
[ 140.822911] page dumped because: kasan: bad access detected
[ 140.823546]
[ 140.823842] Memory state around the buggy address:
[ 140.824389] c4ce0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.824984] c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.825778] >c4ce0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.826539] ^
[ 140.827478] c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.828230] c4ce0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.828909] ==================================================================
[ 140.836782] ==================================================================
[ 140.838219] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[ 140.839101] Write of size 16 at addr c4ce0869 by task kunit_try_catch/151
[ 140.839954]
[ 140.840265] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.841463] Hardware name: Generic DT based system
[ 140.842097] unwind_backtrace from show_stack+0x18/0x1c
[ 140.843029] show_stack from dump_stack_lvl+0x58/0x70
[ 140.843775] dump_stack_lvl from print_report+0x164/0x51c
[ 140.844580] print_report from kasan_report+0xc8/0x104
[ 140.845274] kasan_report from kasan_check_range+0x14c/0x198
[ 140.846086] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.846866] __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[ 140.847850] kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[ 140.848622] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.849622] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.850497] kthread from ret_from_fork+0x14/0x30
[ 140.851082] Exception stack(0xf9fb3fb0 to 0xf9fb3ff8)
[ 140.851628] 3fa0: 00000000 00000000 00000000 00000000
[ 140.852631] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.853632] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.854339]
[ 140.854596] Allocated by task 151:
[ 140.855021] kasan_set_track+0x3c/0x5c
[ 140.855525] __kasan_kmalloc+0x8c/0x94
[ 140.856068] kmalloc_oob_memset_16+0xa0/0x1e0
[ 140.856652] kunit_try_run_case+0x11c/0x2e4
[ 140.857280] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.858101] kthread+0x184/0x1a8
[ 140.858732] ret_from_fork+0x14/0x30
[ 140.859384]
[ 140.859836] The buggy address belongs to the object at c4ce0800
[ 140.859836] which belongs to the cache kmalloc-128 of size 128
[ 140.861037] The buggy address is located 105 bytes inside of
[ 140.861037] allocated 120-byte region [c4ce0800, c4ce0878)
[ 140.861960]
[ 140.862292] The buggy address belongs to the physical page:
[ 140.862916] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.863965] flags: 0x800(slab|zone=0)
[ 140.864368] page_type: 0xffffffff()
[ 140.865047] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.865917] raw: 00000000
[ 140.866355] page dumped because: kasan: bad access detected
[ 140.866998]
[ 140.867252] Memory state around the buggy address:
[ 140.867839] c4ce0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.868538] c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.869553] >c4ce0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.870236] ^
[ 140.870904] c4ce0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.871774] c4ce0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.872490] ==================================================================
[ 140.701195] ==================================================================
[ 140.702363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[ 140.703005] Write of size 2 at addr c4ce0577 by task kunit_try_catch/145
[ 140.703741]
[ 140.703962] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.704843] Hardware name: Generic DT based system
[ 140.705566] unwind_backtrace from show_stack+0x18/0x1c
[ 140.706247] show_stack from dump_stack_lvl+0x58/0x70
[ 140.707020] dump_stack_lvl from print_report+0x164/0x51c
[ 140.707910] print_report from kasan_report+0xc8/0x104
[ 140.708717] kasan_report from kasan_check_range+0x14c/0x198
[ 140.709643] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.710414] __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[ 140.711179] kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[ 140.712005] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.713080] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.713947] kthread from ret_from_fork+0x14/0x30
[ 140.714566] Exception stack(0xf9f8bfb0 to 0xf9f8bff8)
[ 140.715189] bfa0: 00000000 00000000 00000000 00000000
[ 140.716111] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.716991] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.718389]
[ 140.718645] Allocated by task 145:
[ 140.719149] kasan_set_track+0x3c/0x5c
[ 140.719857] __kasan_kmalloc+0x8c/0x94
[ 140.720486] kmalloc_oob_memset_2+0xa0/0x1e4
[ 140.721096] kunit_try_run_case+0x11c/0x2e4
[ 140.721825] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.722602] kthread+0x184/0x1a8
[ 140.723103] ret_from_fork+0x14/0x30
[ 140.723626]
[ 140.723995] The buggy address belongs to the object at c4ce0500
[ 140.723995] which belongs to the cache kmalloc-128 of size 128
[ 140.725325] The buggy address is located 119 bytes inside of
[ 140.725325] allocated 120-byte region [c4ce0500, c4ce0578)
[ 140.726686]
[ 140.727009] The buggy address belongs to the physical page:
[ 140.727728] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.728658] flags: 0x800(slab|zone=0)
[ 140.729283] page_type: 0xffffffff()
[ 140.729806] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.730812] raw: 00000000
[ 140.731198] page dumped because: kasan: bad access detected
[ 140.731878]
[ 140.732211] Memory state around the buggy address:
[ 140.732782] c4ce0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.733610] c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.734492] >c4ce0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.735239] ^
[ 140.735915] c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.736741] c4ce0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.737529] ==================================================================
Home
[ 140.793868] ==================================================================
[ 140.794930] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[ 140.795750] Write of size 8 at addr c4ce0771 by task kunit_try_catch/149
[ 140.796362]
[ 140.796667] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.798453] Hardware name: Generic DT based system
[ 140.799190] unwind_backtrace from show_stack+0x18/0x1c
[ 140.799875] show_stack from dump_stack_lvl+0x58/0x70
[ 140.800565] dump_stack_lvl from print_report+0x164/0x51c
[ 140.801358] print_report from kasan_report+0xc8/0x104
[ 140.802190] kasan_report from kasan_check_range+0x14c/0x198
[ 140.802937] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.803709] __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[ 140.804459] kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[ 140.805310] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.806253] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.807088] kthread from ret_from_fork+0x14/0x30
[ 140.807807] Exception stack(0xf9fa3fb0 to 0xf9fa3ff8)
[ 140.808526] 3fa0: 00000000 00000000 00000000 00000000
[ 140.809436] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.810319] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.810968]
[ 140.811279] Allocated by task 149:
[ 140.811717] kasan_set_track+0x3c/0x5c
[ 140.812295] __kasan_kmalloc+0x8c/0x94
[ 140.812868] kmalloc_oob_memset_8+0xa0/0x1e8
[ 140.813445] kunit_try_run_case+0x11c/0x2e4
[ 140.813935] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.814739] kthread+0x184/0x1a8
[ 140.815204] ret_from_fork+0x14/0x30
[ 140.815777]
[ 140.816026] The buggy address belongs to the object at c4ce0700
[ 140.816026] which belongs to the cache kmalloc-128 of size 128
[ 140.817701] The buggy address is located 113 bytes inside of
[ 140.817701] allocated 120-byte region [c4ce0700, c4ce0778)
[ 140.818843]
[ 140.819094] The buggy address belongs to the physical page:
[ 140.819716] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.820618] flags: 0x800(slab|zone=0)
[ 140.821071] page_type: 0xffffffff()
[ 140.821556] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.822475] raw: 00000000
[ 140.822911] page dumped because: kasan: bad access detected
[ 140.823546]
[ 140.823842] Memory state around the buggy address:
[ 140.824389] c4ce0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.824984] c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.825778] >c4ce0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.826539] ^
[ 140.827478] c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.828230] c4ce0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.828909] ==================================================================
---
[ 140.836782] ==================================================================
[ 140.838219] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[ 140.839101] Write of size 16 at addr c4ce0869 by task kunit_try_catch/151
[ 140.839954]
[ 140.840265] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.841463] Hardware name: Generic DT based system
[ 140.842097] unwind_backtrace from show_stack+0x18/0x1c
[ 140.843029] show_stack from dump_stack_lvl+0x58/0x70
[ 140.843775] dump_stack_lvl from print_report+0x164/0x51c
[ 140.844580] print_report from kasan_report+0xc8/0x104
[ 140.845274] kasan_report from kasan_check_range+0x14c/0x198
[ 140.846086] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.846866] __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[ 140.847850] kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[ 140.848622] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.849622] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.850497] kthread from ret_from_fork+0x14/0x30
[ 140.851082] Exception stack(0xf9fb3fb0 to 0xf9fb3ff8)
[ 140.851628] 3fa0: 00000000 00000000 00000000 00000000
[ 140.852631] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.853632] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.854339]
[ 140.854596] Allocated by task 151:
[ 140.855021] kasan_set_track+0x3c/0x5c
[ 140.855525] __kasan_kmalloc+0x8c/0x94
[ 140.856068] kmalloc_oob_memset_16+0xa0/0x1e0
[ 140.856652] kunit_try_run_case+0x11c/0x2e4
[ 140.857280] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.858101] kthread+0x184/0x1a8
[ 140.858732] ret_from_fork+0x14/0x30
[ 140.859384]
[ 140.859836] The buggy address belongs to the object at c4ce0800
[ 140.859836] which belongs to the cache kmalloc-128 of size 128
[ 140.861037] The buggy address is located 105 bytes inside of
[ 140.861037] allocated 120-byte region [c4ce0800, c4ce0878)
[ 140.861960]
[ 140.862292] The buggy address belongs to the physical page:
[ 140.862916] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.863965] flags: 0x800(slab|zone=0)
[ 140.864368] page_type: 0xffffffff()
[ 140.865047] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.865917] raw: 00000000
[ 140.866355] page dumped because: kasan: bad access detected
[ 140.866998]
[ 140.867252] Memory state around the buggy address:
[ 140.867839] c4ce0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.868538] c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.869553] >c4ce0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.870236] ^
[ 140.870904] c4ce0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.871774] c4ce0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.872490] ==================================================================
Home
[ 140.746324] ==================================================================
[ 140.747448] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[ 140.748223] Write of size 4 at addr c4ce0675 by task kunit_try_catch/147
[ 140.749001]
[ 140.749467] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.750408] Hardware name: Generic DT based system
[ 140.751206] unwind_backtrace from show_stack+0x18/0x1c
[ 140.752025] show_stack from dump_stack_lvl+0x58/0x70
[ 140.752813] dump_stack_lvl from print_report+0x164/0x51c
[ 140.753629] print_report from kasan_report+0xc8/0x104
[ 140.754478] kasan_report from kasan_check_range+0x14c/0x198
[ 140.755435] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.756365] __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[ 140.757451] kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[ 140.758944] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.759996] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.760877] kthread from ret_from_fork+0x14/0x30
[ 140.761453] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[ 140.762209] bfa0: 00000000 00000000 00000000 00000000
[ 140.763172] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.764137] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.764923]
[ 140.765254] Allocated by task 147:
[ 140.765634] kasan_set_track+0x3c/0x5c
[ 140.766349] __kasan_kmalloc+0x8c/0x94
[ 140.767044] kmalloc_oob_memset_4+0xa0/0x1e8
[ 140.767679] kunit_try_run_case+0x11c/0x2e4
[ 140.768424] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.769264] kthread+0x184/0x1a8
[ 140.769731] ret_from_fork+0x14/0x30
[ 140.770406]
[ 140.770710] The buggy address belongs to the object at c4ce0600
[ 140.770710] which belongs to the cache kmalloc-128 of size 128
[ 140.772049] The buggy address is located 117 bytes inside of
[ 140.772049] allocated 120-byte region [c4ce0600, c4ce0678)
[ 140.773402]
[ 140.773780] The buggy address belongs to the physical page:
[ 140.774508] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.775419] flags: 0x800(slab|zone=0)
[ 140.776036] page_type: 0xffffffff()
[ 140.776653] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.777823] raw: 00000000
[ 140.778379] page dumped because: kasan: bad access detected
[ 140.779827]
[ 140.780237] Memory state around the buggy address:
[ 140.780795] c4ce0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.781486] c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.782359] >c4ce0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.783047] ^
[ 140.783820] c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.784443] c4ce0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.785195] ==================================================================
---
[ 140.701195] ==================================================================
[ 140.702363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[ 140.703005] Write of size 2 at addr c4ce0577 by task kunit_try_catch/145
[ 140.703741]
[ 140.703962] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.704843] Hardware name: Generic DT based system
[ 140.705566] unwind_backtrace from show_stack+0x18/0x1c
[ 140.706247] show_stack from dump_stack_lvl+0x58/0x70
[ 140.707020] dump_stack_lvl from print_report+0x164/0x51c
[ 140.707910] print_report from kasan_report+0xc8/0x104
[ 140.708717] kasan_report from kasan_check_range+0x14c/0x198
[ 140.709643] kasan_check_range from __asan_memset+0x20/0x3c
[ 140.710414] __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[ 140.711179] kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[ 140.712005] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.713080] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.713947] kthread from ret_from_fork+0x14/0x30
[ 140.714566] Exception stack(0xf9f8bfb0 to 0xf9f8bff8)
[ 140.715189] bfa0: 00000000 00000000 00000000 00000000
[ 140.716111] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.716991] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.718389]
[ 140.718645] Allocated by task 145:
[ 140.719149] kasan_set_track+0x3c/0x5c
[ 140.719857] __kasan_kmalloc+0x8c/0x94
[ 140.720486] kmalloc_oob_memset_2+0xa0/0x1e4
[ 140.721096] kunit_try_run_case+0x11c/0x2e4
[ 140.721825] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.722602] kthread+0x184/0x1a8
[ 140.723103] ret_from_fork+0x14/0x30
[ 140.723626]
[ 140.723995] The buggy address belongs to the object at c4ce0500
[ 140.723995] which belongs to the cache kmalloc-128 of size 128
[ 140.725325] The buggy address is located 119 bytes inside of
[ 140.725325] allocated 120-byte region [c4ce0500, c4ce0578)
[ 140.726686]
[ 140.727009] The buggy address belongs to the physical page:
[ 140.727728] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 140.728658] flags: 0x800(slab|zone=0)
[ 140.729283] page_type: 0xffffffff()
[ 140.729806] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.730812] raw: 00000000
[ 140.731198] page dumped because: kasan: bad access detected
[ 140.731878]
[ 140.732211] Memory state around the buggy address:
[ 140.732782] c4ce0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.733610] c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.734492] >c4ce0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 140.735239] ^
[ 140.735915] c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.736741] c4ce0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.737529] ==================================================================
Home
[ 139.665623] ==================================================================
[ 139.666294] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320
[ 139.667011] Read of size 1 at addr c4ce0380 by task kunit_try_catch/111
[ 139.668255]
[ 139.668624] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.669695] Hardware name: Generic DT based system
[ 139.670266] unwind_backtrace from show_stack+0x18/0x1c
[ 139.671000] show_stack from dump_stack_lvl+0x58/0x70
[ 139.671683] dump_stack_lvl from print_report+0x164/0x51c
[ 139.672419] print_report from kasan_report+0xc8/0x104
[ 139.673150] kasan_report from kmalloc_oob_right+0x134/0x320
[ 139.673900] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.674802] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.675744] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.676656] kthread from ret_from_fork+0x14/0x30
[ 139.677317] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[ 139.678085] bfa0: 00000000 00000000 00000000 00000000
[ 139.678959] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.679888] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.680629]
[ 139.680873] Allocated by task 111:
[ 139.681257] kasan_set_track+0x3c/0x5c
[ 139.681906] __kasan_kmalloc+0x8c/0x94
[ 139.682435] kmalloc_oob_right+0xa0/0x320
[ 139.682957] kunit_try_run_case+0x11c/0x2e4
[ 139.683454] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.684245] kthread+0x184/0x1a8
[ 139.684673] ret_from_fork+0x14/0x30
[ 139.685262]
[ 139.685502] The buggy address belongs to the object at c4ce0300
[ 139.685502] which belongs to the cache kmalloc-128 of size 128
[ 139.686813] The buggy address is located 13 bytes to the right of
[ 139.686813] allocated 115-byte region [c4ce0300, c4ce0373)
[ 139.688525]
[ 139.688751] The buggy address belongs to the physical page:
[ 139.689657] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 139.690514] flags: 0x800(slab|zone=0)
[ 139.690931] page_type: 0xffffffff()
[ 139.691559] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 139.692385] raw: 00000000
[ 139.692798] page dumped because: kasan: bad access detected
[ 139.693312]
[ 139.693684] Memory state around the buggy address:
[ 139.694245] c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.694951] c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 139.695715] >c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.696435] ^
[ 139.696841] c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.697705] c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.699173] ==================================================================
[ 139.584880] ==================================================================
[ 139.586077] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320
[ 139.586931] Write of size 1 at addr c4ce0373 by task kunit_try_catch/111
[ 139.588471]
[ 139.589089] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G N 6.6.72-rc1 #1
[ 139.590065] Hardware name: Generic DT based system
[ 139.590827] unwind_backtrace from show_stack+0x18/0x1c
[ 139.591638] show_stack from dump_stack_lvl+0x58/0x70
[ 139.592462] dump_stack_lvl from print_report+0x164/0x51c
[ 139.593288] print_report from kasan_report+0xc8/0x104
[ 139.594058] kasan_report from kmalloc_oob_right+0xcc/0x320
[ 139.594950] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.595757] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.596765] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.598156] kthread from ret_from_fork+0x14/0x30
[ 139.598982] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[ 139.599600] bfa0: 00000000 00000000 00000000 00000000
[ 139.600484] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.601646] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.602517]
[ 139.602834] Allocated by task 111:
[ 139.603487] kasan_set_track+0x3c/0x5c
[ 139.604078] __kasan_kmalloc+0x8c/0x94
[ 139.604648] kmalloc_oob_right+0xa0/0x320
[ 139.605168] kunit_try_run_case+0x11c/0x2e4
[ 139.605669] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.606511] kthread+0x184/0x1a8
[ 139.606977] ret_from_fork+0x14/0x30
[ 139.607492]
[ 139.607921] The buggy address belongs to the object at c4ce0300
[ 139.607921] which belongs to the cache kmalloc-128 of size 128
[ 139.609422] The buggy address is located 0 bytes to the right of
[ 139.609422] allocated 115-byte region [c4ce0300, c4ce0373)
[ 139.610777]
[ 139.611248] The buggy address belongs to the physical page:
[ 139.612266] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 139.613844] flags: 0x800(slab|zone=0)
[ 139.614880] page_type: 0xffffffff()
[ 139.616000] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 139.616929] raw: 00000000
[ 139.617514] page dumped because: kasan: bad access detected
[ 139.618262]
[ 139.618582] Memory state around the buggy address:
[ 139.619572] c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 139.620373] c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.621283] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 139.622057] ^
[ 139.622943] c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.623800] c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.624494] ==================================================================
[ 139.628883] ==================================================================
[ 139.629606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320
[ 139.630409] Write of size 1 at addr c4ce0378 by task kunit_try_catch/111
[ 139.631076]
[ 139.631317] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.632229] Hardware name: Generic DT based system
[ 139.632887] unwind_backtrace from show_stack+0x18/0x1c
[ 139.633649] show_stack from dump_stack_lvl+0x58/0x70
[ 139.634325] dump_stack_lvl from print_report+0x164/0x51c
[ 139.635117] print_report from kasan_report+0xc8/0x104
[ 139.635865] kasan_report from kmalloc_oob_right+0x100/0x320
[ 139.636634] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.637453] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.638676] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.639679] kthread from ret_from_fork+0x14/0x30
[ 139.640419] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[ 139.641032] bfa0: 00000000 00000000 00000000 00000000
[ 139.641894] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.642828] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.643643]
[ 139.643938] Allocated by task 111:
[ 139.644446] kasan_set_track+0x3c/0x5c
[ 139.645001] __kasan_kmalloc+0x8c/0x94
[ 139.645599] kmalloc_oob_right+0xa0/0x320
[ 139.646095] kunit_try_run_case+0x11c/0x2e4
[ 139.646784] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.647676] kthread+0x184/0x1a8
[ 139.648683] ret_from_fork+0x14/0x30
[ 139.649232]
[ 139.649484] The buggy address belongs to the object at c4ce0300
[ 139.649484] which belongs to the cache kmalloc-128 of size 128
[ 139.650774] The buggy address is located 5 bytes to the right of
[ 139.650774] allocated 115-byte region [c4ce0300, c4ce0373)
[ 139.652048]
[ 139.652334] The buggy address belongs to the physical page:
[ 139.653001] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 139.653933] flags: 0x800(slab|zone=0)
[ 139.654485] page_type: 0xffffffff()
[ 139.655001] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 139.655858] raw: 00000000
[ 139.656350] page dumped because: kasan: bad access detected
[ 139.656928]
[ 139.657296] Memory state around the buggy address:
[ 139.658034] c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 139.659032] c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.659753] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 139.660477] ^
[ 139.661212] c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.661977] c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.662677] ==================================================================
Home
[ 139.584880] ==================================================================
[ 139.586077] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320
[ 139.586931] Write of size 1 at addr c4ce0373 by task kunit_try_catch/111
[ 139.588471]
[ 139.589089] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G N 6.6.72-rc1 #1
[ 139.590065] Hardware name: Generic DT based system
[ 139.590827] unwind_backtrace from show_stack+0x18/0x1c
[ 139.591638] show_stack from dump_stack_lvl+0x58/0x70
[ 139.592462] dump_stack_lvl from print_report+0x164/0x51c
[ 139.593288] print_report from kasan_report+0xc8/0x104
[ 139.594058] kasan_report from kmalloc_oob_right+0xcc/0x320
[ 139.594950] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.595757] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.596765] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.598156] kthread from ret_from_fork+0x14/0x30
[ 139.598982] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[ 139.599600] bfa0: 00000000 00000000 00000000 00000000
[ 139.600484] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.601646] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.602517]
[ 139.602834] Allocated by task 111:
[ 139.603487] kasan_set_track+0x3c/0x5c
[ 139.604078] __kasan_kmalloc+0x8c/0x94
[ 139.604648] kmalloc_oob_right+0xa0/0x320
[ 139.605168] kunit_try_run_case+0x11c/0x2e4
[ 139.605669] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.606511] kthread+0x184/0x1a8
[ 139.606977] ret_from_fork+0x14/0x30
[ 139.607492]
[ 139.607921] The buggy address belongs to the object at c4ce0300
[ 139.607921] which belongs to the cache kmalloc-128 of size 128
[ 139.609422] The buggy address is located 0 bytes to the right of
[ 139.609422] allocated 115-byte region [c4ce0300, c4ce0373)
[ 139.610777]
[ 139.611248] The buggy address belongs to the physical page:
[ 139.612266] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 139.613844] flags: 0x800(slab|zone=0)
[ 139.614880] page_type: 0xffffffff()
[ 139.616000] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 139.616929] raw: 00000000
[ 139.617514] page dumped because: kasan: bad access detected
[ 139.618262]
[ 139.618582] Memory state around the buggy address:
[ 139.619572] c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 139.620373] c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.621283] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 139.622057] ^
[ 139.622943] c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.623800] c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.624494] ==================================================================
Home
[ 139.665623] ==================================================================
[ 139.666294] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320
[ 139.667011] Read of size 1 at addr c4ce0380 by task kunit_try_catch/111
[ 139.668255]
[ 139.668624] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.669695] Hardware name: Generic DT based system
[ 139.670266] unwind_backtrace from show_stack+0x18/0x1c
[ 139.671000] show_stack from dump_stack_lvl+0x58/0x70
[ 139.671683] dump_stack_lvl from print_report+0x164/0x51c
[ 139.672419] print_report from kasan_report+0xc8/0x104
[ 139.673150] kasan_report from kmalloc_oob_right+0x134/0x320
[ 139.673900] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.674802] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.675744] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.676656] kthread from ret_from_fork+0x14/0x30
[ 139.677317] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[ 139.678085] bfa0: 00000000 00000000 00000000 00000000
[ 139.678959] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.679888] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.680629]
[ 139.680873] Allocated by task 111:
[ 139.681257] kasan_set_track+0x3c/0x5c
[ 139.681906] __kasan_kmalloc+0x8c/0x94
[ 139.682435] kmalloc_oob_right+0xa0/0x320
[ 139.682957] kunit_try_run_case+0x11c/0x2e4
[ 139.683454] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.684245] kthread+0x184/0x1a8
[ 139.684673] ret_from_fork+0x14/0x30
[ 139.685262]
[ 139.685502] The buggy address belongs to the object at c4ce0300
[ 139.685502] which belongs to the cache kmalloc-128 of size 128
[ 139.686813] The buggy address is located 13 bytes to the right of
[ 139.686813] allocated 115-byte region [c4ce0300, c4ce0373)
[ 139.688525]
[ 139.688751] The buggy address belongs to the physical page:
[ 139.689657] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 139.690514] flags: 0x800(slab|zone=0)
[ 139.690931] page_type: 0xffffffff()
[ 139.691559] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 139.692385] raw: 00000000
[ 139.692798] page dumped because: kasan: bad access detected
[ 139.693312]
[ 139.693684] Memory state around the buggy address:
[ 139.694245] c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.694951] c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 139.695715] >c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.696435] ^
[ 139.696841] c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.697705] c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.699173] ==================================================================
Home
[ 139.628883] ==================================================================
[ 139.629606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320
[ 139.630409] Write of size 1 at addr c4ce0378 by task kunit_try_catch/111
[ 139.631076]
[ 139.631317] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.632229] Hardware name: Generic DT based system
[ 139.632887] unwind_backtrace from show_stack+0x18/0x1c
[ 139.633649] show_stack from dump_stack_lvl+0x58/0x70
[ 139.634325] dump_stack_lvl from print_report+0x164/0x51c
[ 139.635117] print_report from kasan_report+0xc8/0x104
[ 139.635865] kasan_report from kmalloc_oob_right+0x100/0x320
[ 139.636634] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.637453] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.638676] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.639679] kthread from ret_from_fork+0x14/0x30
[ 139.640419] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[ 139.641032] bfa0: 00000000 00000000 00000000 00000000
[ 139.641894] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.642828] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.643643]
[ 139.643938] Allocated by task 111:
[ 139.644446] kasan_set_track+0x3c/0x5c
[ 139.645001] __kasan_kmalloc+0x8c/0x94
[ 139.645599] kmalloc_oob_right+0xa0/0x320
[ 139.646095] kunit_try_run_case+0x11c/0x2e4
[ 139.646784] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.647676] kthread+0x184/0x1a8
[ 139.648683] ret_from_fork+0x14/0x30
[ 139.649232]
[ 139.649484] The buggy address belongs to the object at c4ce0300
[ 139.649484] which belongs to the cache kmalloc-128 of size 128
[ 139.650774] The buggy address is located 5 bytes to the right of
[ 139.650774] allocated 115-byte region [c4ce0300, c4ce0373)
[ 139.652048]
[ 139.652334] The buggy address belongs to the physical page:
[ 139.653001] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[ 139.653933] flags: 0x800(slab|zone=0)
[ 139.654485] page_type: 0xffffffff()
[ 139.655001] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 139.655858] raw: 00000000
[ 139.656350] page dumped because: kasan: bad access detected
[ 139.656928]
[ 139.657296] Memory state around the buggy address:
[ 139.658034] c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 139.659032] c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.659753] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 139.660477] ^
[ 139.661212] c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.661977] c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.662677] ==================================================================
Home
[ 139.798376] ==================================================================
[ 139.799514] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1bc
[ 139.800333] Write of size 1 at addr c8f1600a by task kunit_try_catch/117
[ 139.801019]
[ 139.801272] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.802172] Hardware name: Generic DT based system
[ 139.802872] unwind_backtrace from show_stack+0x18/0x1c
[ 139.803554] show_stack from dump_stack_lvl+0x58/0x70
[ 139.804261] dump_stack_lvl from print_report+0x164/0x51c
[ 139.804880] print_report from kasan_report+0xc8/0x104
[ 139.805669] kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1bc
[ 139.806587] kmalloc_pagealloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.807883] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.808904] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.809888] kthread from ret_from_fork+0x14/0x30
[ 139.810535] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[ 139.811155] bfa0: 00000000 00000000 00000000 00000000
[ 139.812006] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.812970] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.813671]
[ 139.813976] The buggy address belongs to the physical page:
[ 139.814600] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 139.815520] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.816408] flags: 0x40(head|zone=0)
[ 139.816850] page_type: 0xffffffff()
[ 139.817354] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 139.818415] raw: 00000000
[ 139.818757] page dumped because: kasan: bad access detected
[ 139.819362]
[ 139.819700] Memory state around the buggy address:
[ 139.820229] c8f15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.820959] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.821705] >c8f16000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 139.822428] ^
[ 139.822835] c8f16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 139.823722] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 139.824370] ==================================================================
Home
[ 139.798376] ==================================================================
[ 139.799514] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1bc
[ 139.800333] Write of size 1 at addr c8f1600a by task kunit_try_catch/117
[ 139.801019]
[ 139.801272] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.802172] Hardware name: Generic DT based system
[ 139.802872] unwind_backtrace from show_stack+0x18/0x1c
[ 139.803554] show_stack from dump_stack_lvl+0x58/0x70
[ 139.804261] dump_stack_lvl from print_report+0x164/0x51c
[ 139.804880] print_report from kasan_report+0xc8/0x104
[ 139.805669] kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1bc
[ 139.806587] kmalloc_pagealloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 139.807883] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.808904] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.809888] kthread from ret_from_fork+0x14/0x30
[ 139.810535] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[ 139.811155] bfa0: 00000000 00000000 00000000 00000000
[ 139.812006] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.812970] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.813671]
[ 139.813976] The buggy address belongs to the physical page:
[ 139.814600] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 139.815520] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 139.816408] flags: 0x40(head|zone=0)
[ 139.816850] page_type: 0xffffffff()
[ 139.817354] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 139.818415] raw: 00000000
[ 139.818757] page dumped because: kasan: bad access detected
[ 139.819362]
[ 139.819700] Memory state around the buggy address:
[ 139.820229] c8f15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.820959] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 139.821705] >c8f16000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 139.822428] ^
[ 139.822835] c8f16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 139.823722] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 139.824370] ==================================================================
Home
[ 141.132303] ==================================================================
[ 141.133407] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[ 141.134074] Read of size 1 at addr c4ce60c8 by task kunit_try_catch/169
[ 141.134837]
[ 141.135186] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.136274] Hardware name: Generic DT based system
[ 141.136888] unwind_backtrace from show_stack+0x18/0x1c
[ 141.137790] show_stack from dump_stack_lvl+0x58/0x70
[ 141.138645] dump_stack_lvl from print_report+0x164/0x51c
[ 141.139450] print_report from kasan_report+0xc8/0x104
[ 141.140256] kasan_report from kmem_cache_oob+0xd4/0x248
[ 141.141026] kmem_cache_oob from kunit_try_run_case+0x11c/0x2e4
[ 141.141875] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.142908] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.143828] kthread from ret_from_fork+0x14/0x30
[ 141.144585] Exception stack(0xfa02bfb0 to 0xfa02bff8)
[ 141.145287] bfa0: 00000000 00000000 00000000 00000000
[ 141.146263] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.147378] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.148233]
[ 141.148376] Allocated by task 169:
[ 141.148607] kasan_set_track+0x3c/0x5c
[ 141.148881] __kasan_slab_alloc+0x60/0x68
[ 141.149201] kmem_cache_alloc+0x1dc/0x574
[ 141.149840] kmem_cache_oob+0xb0/0x248
[ 141.150575] kunit_try_run_case+0x11c/0x2e4
[ 141.151262] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.152251] kthread+0x184/0x1a8
[ 141.152848] ret_from_fork+0x14/0x30
[ 141.153376]
[ 141.153758] The buggy address belongs to the object at c4ce6000
[ 141.153758] which belongs to the cache test_cache of size 200
[ 141.155051] The buggy address is located 0 bytes to the right of
[ 141.155051] allocated 200-byte region [c4ce6000, c4ce60c8)
[ 141.156384]
[ 141.156768] The buggy address belongs to the physical page:
[ 141.157448] page:d4781242 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce6
[ 141.158649] flags: 0x800(slab|zone=0)
[ 141.159192] page_type: 0xffffffff()
[ 141.159703] raw: 00000800 c4ce3000 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 141.160758] raw: 00000000
[ 141.161162] page dumped because: kasan: bad access detected
[ 141.161873]
[ 141.162248] Memory state around the buggy address:
[ 141.162857] c4ce5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.163788] c4ce6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.164647] >c4ce6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 141.165404] ^
[ 141.165972] c4ce6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.166810] c4ce6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.167958] ==================================================================
Home
[ 141.132303] ==================================================================
[ 141.133407] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[ 141.134074] Read of size 1 at addr c4ce60c8 by task kunit_try_catch/169
[ 141.134837]
[ 141.135186] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.136274] Hardware name: Generic DT based system
[ 141.136888] unwind_backtrace from show_stack+0x18/0x1c
[ 141.137790] show_stack from dump_stack_lvl+0x58/0x70
[ 141.138645] dump_stack_lvl from print_report+0x164/0x51c
[ 141.139450] print_report from kasan_report+0xc8/0x104
[ 141.140256] kasan_report from kmem_cache_oob+0xd4/0x248
[ 141.141026] kmem_cache_oob from kunit_try_run_case+0x11c/0x2e4
[ 141.141875] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.142908] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.143828] kthread from ret_from_fork+0x14/0x30
[ 141.144585] Exception stack(0xfa02bfb0 to 0xfa02bff8)
[ 141.145287] bfa0: 00000000 00000000 00000000 00000000
[ 141.146263] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.147378] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.148233]
[ 141.148376] Allocated by task 169:
[ 141.148607] kasan_set_track+0x3c/0x5c
[ 141.148881] __kasan_slab_alloc+0x60/0x68
[ 141.149201] kmem_cache_alloc+0x1dc/0x574
[ 141.149840] kmem_cache_oob+0xb0/0x248
[ 141.150575] kunit_try_run_case+0x11c/0x2e4
[ 141.151262] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.152251] kthread+0x184/0x1a8
[ 141.152848] ret_from_fork+0x14/0x30
[ 141.153376]
[ 141.153758] The buggy address belongs to the object at c4ce6000
[ 141.153758] which belongs to the cache test_cache of size 200
[ 141.155051] The buggy address is located 0 bytes to the right of
[ 141.155051] allocated 200-byte region [c4ce6000, c4ce60c8)
[ 141.156384]
[ 141.156768] The buggy address belongs to the physical page:
[ 141.157448] page:d4781242 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce6
[ 141.158649] flags: 0x800(slab|zone=0)
[ 141.159192] page_type: 0xffffffff()
[ 141.159703] raw: 00000800 c4ce3000 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 141.160758] raw: 00000000
[ 141.161162] page dumped because: kasan: bad access detected
[ 141.161873]
[ 141.162248] Memory state around the buggy address:
[ 141.162857] c4ce5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.163788] c4ce6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.164647] >c4ce6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 141.165404] ^
[ 141.165972] c4ce6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.166810] c4ce6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.167958] ==================================================================
Home
[ 140.135101] ==================================================================
[ 140.135950] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.136907] Write of size 1 at addr c4d5e4da by task kunit_try_catch/131
[ 140.138004]
[ 140.138466] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.139660] Hardware name: Generic DT based system
[ 140.140242] unwind_backtrace from show_stack+0x18/0x1c
[ 140.141350] show_stack from dump_stack_lvl+0x58/0x70
[ 140.142088] dump_stack_lvl from print_report+0x164/0x51c
[ 140.143043] print_report from kasan_report+0xc8/0x104
[ 140.143952] kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.144832] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.145759] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.146742] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.147673] kthread from ret_from_fork+0x14/0x30
[ 140.148361] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.149025] bfa0: 00000000 00000000 00000000 00000000
[ 140.149969] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.150859] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.151639]
[ 140.151936] Allocated by task 131:
[ 140.152502] kasan_set_track+0x3c/0x5c
[ 140.153215] __kasan_krealloc+0xe0/0x104
[ 140.153852] krealloc+0xd4/0x134
[ 140.154403] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.155045] kunit_try_run_case+0x11c/0x2e4
[ 140.155666] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.156451] kthread+0x184/0x1a8
[ 140.156921] ret_from_fork+0x14/0x30
[ 140.157561]
[ 140.158035] The buggy address belongs to the object at c4d5e400
[ 140.158035] which belongs to the cache kmalloc-256 of size 256
[ 140.160205] The buggy address is located 17 bytes to the right of
[ 140.160205] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.161803]
[ 140.162216] The buggy address belongs to the physical page:
[ 140.163226] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.163965] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.164782] flags: 0x840(slab|head|zone=0)
[ 140.165394] page_type: 0xffffffff()
[ 140.165814] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.166730] raw: 00000000
[ 140.167061] page dumped because: kasan: bad access detected
[ 140.167768]
[ 140.168001] Memory state around the buggy address:
[ 140.168593] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.169353] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.170114] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.170857] ^
[ 140.171461] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.172251] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.172950] ==================================================================
[ 140.357394] ==================================================================
[ 140.358088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[ 140.358882] Write of size 1 at addr c8f160d0 by task kunit_try_catch/135
[ 140.359661]
[ 140.359927] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.360854] Hardware name: Generic DT based system
[ 140.361511] unwind_backtrace from show_stack+0x18/0x1c
[ 140.362204] show_stack from dump_stack_lvl+0x58/0x70
[ 140.362947] dump_stack_lvl from print_report+0x164/0x51c
[ 140.363670] print_report from kasan_report+0xc8/0x104
[ 140.364461] kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[ 140.365333] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.366174] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.367051] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.367994] kthread from ret_from_fork+0x14/0x30
[ 140.368666] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.369315] bfa0: 00000000 00000000 00000000 00000000
[ 140.370298] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.371194] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.372035]
[ 140.372331] The buggy address belongs to the physical page:
[ 140.373043] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.373922] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.374718] flags: 0x40(head|zone=0)
[ 140.375215] page_type: 0xffffffff()
[ 140.375695] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.376465] raw: 00000000
[ 140.376886] page dumped because: kasan: bad access detected
[ 140.377533]
[ 140.377797] Memory state around the buggy address:
[ 140.378479] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.379200] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.379962] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.380731] ^
[ 140.381368] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.382169] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.383034] ==================================================================
[ 140.384088] ==================================================================
[ 140.384650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.385790] Write of size 1 at addr c8f160da by task kunit_try_catch/135
[ 140.386482]
[ 140.386782] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.387460] Hardware name: Generic DT based system
[ 140.388116] unwind_backtrace from show_stack+0x18/0x1c
[ 140.389665] show_stack from dump_stack_lvl+0x58/0x70
[ 140.390959] dump_stack_lvl from print_report+0x164/0x51c
[ 140.392387] print_report from kasan_report+0xc8/0x104
[ 140.392974] kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.393790] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.394655] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.395708] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.396720] kthread from ret_from_fork+0x14/0x30
[ 140.397338] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.397908] bfa0: 00000000 00000000 00000000 00000000
[ 140.398914] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.399809] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.400505]
[ 140.400827] The buggy address belongs to the physical page:
[ 140.401398] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.402191] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.403002] flags: 0x40(head|zone=0)
[ 140.403467] page_type: 0xffffffff()
[ 140.403919] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.404812] raw: 00000000
[ 140.405158] page dumped because: kasan: bad access detected
[ 140.405724]
[ 140.406014] Memory state around the buggy address:
[ 140.406601] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.407303] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.408651] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.409640] ^
[ 140.410194] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.410995] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.411682] ==================================================================
[ 140.439588] ==================================================================
[ 140.440388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[ 140.441140] Write of size 1 at addr c8f160eb by task kunit_try_catch/135
[ 140.441871]
[ 140.442195] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.442978] Hardware name: Generic DT based system
[ 140.444060] unwind_backtrace from show_stack+0x18/0x1c
[ 140.445227] show_stack from dump_stack_lvl+0x58/0x70
[ 140.445870] dump_stack_lvl from print_report+0x164/0x51c
[ 140.446553] print_report from kasan_report+0xc8/0x104
[ 140.447289] kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[ 140.448562] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.449455] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.450427] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.451267] kthread from ret_from_fork+0x14/0x30
[ 140.451874] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.452387] bfa0: 00000000 00000000 00000000 00000000
[ 140.453348] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.454190] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.454953]
[ 140.455256] The buggy address belongs to the physical page:
[ 140.455856] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.456684] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.457527] flags: 0x40(head|zone=0)
[ 140.458091] page_type: 0xffffffff()
[ 140.458558] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.459401] raw: 00000000
[ 140.459862] page dumped because: kasan: bad access detected
[ 140.460452]
[ 140.460701] Memory state around the buggy address:
[ 140.461374] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.462085] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.462916] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.463605] ^
[ 140.464264] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.464948] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.465667] ==================================================================
[ 140.412685] ==================================================================
[ 140.413391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.414013] Write of size 1 at addr c8f160ea by task kunit_try_catch/135
[ 140.415268]
[ 140.415792] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.416636] Hardware name: Generic DT based system
[ 140.417233] unwind_backtrace from show_stack+0x18/0x1c
[ 140.417893] show_stack from dump_stack_lvl+0x58/0x70
[ 140.418573] dump_stack_lvl from print_report+0x164/0x51c
[ 140.419414] print_report from kasan_report+0xc8/0x104
[ 140.420191] kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.421008] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.421884] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.422887] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.423821] kthread from ret_from_fork+0x14/0x30
[ 140.424416] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.425023] bfa0: 00000000 00000000 00000000 00000000
[ 140.425946] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.426801] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.427723]
[ 140.427949] The buggy address belongs to the physical page:
[ 140.428878] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.429958] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.430757] flags: 0x40(head|zone=0)
[ 140.431237] page_type: 0xffffffff()
[ 140.431667] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.432475] raw: 00000000
[ 140.432901] page dumped because: kasan: bad access detected
[ 140.433401]
[ 140.433728] Memory state around the buggy address:
[ 140.434313] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.435041] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.435771] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.436467] ^
[ 140.437147] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.437864] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.438510] ==================================================================
[ 140.213812] ==================================================================
[ 140.214673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[ 140.215698] Write of size 1 at addr c4d5e4eb by task kunit_try_catch/131
[ 140.216478]
[ 140.216851] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.218800] Hardware name: Generic DT based system
[ 140.219438] unwind_backtrace from show_stack+0x18/0x1c
[ 140.220385] show_stack from dump_stack_lvl+0x58/0x70
[ 140.221177] dump_stack_lvl from print_report+0x164/0x51c
[ 140.222038] print_report from kasan_report+0xc8/0x104
[ 140.222819] kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[ 140.223789] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.224665] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.225695] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.226607] kthread from ret_from_fork+0x14/0x30
[ 140.227295] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.227959] bfa0: 00000000 00000000 00000000 00000000
[ 140.228913] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.229863] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.230658]
[ 140.230971] Allocated by task 131:
[ 140.231588] kasan_set_track+0x3c/0x5c
[ 140.232199] __kasan_krealloc+0xe0/0x104
[ 140.232857] krealloc+0xd4/0x134
[ 140.233483] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.234215] kunit_try_run_case+0x11c/0x2e4
[ 140.234832] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.235606] kthread+0x184/0x1a8
[ 140.236089] ret_from_fork+0x14/0x30
[ 140.236677]
[ 140.236946] The buggy address belongs to the object at c4d5e400
[ 140.236946] which belongs to the cache kmalloc-256 of size 256
[ 140.238898] The buggy address is located 34 bytes to the right of
[ 140.238898] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.239983]
[ 140.240375] The buggy address belongs to the physical page:
[ 140.241227] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.242171] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.243093] flags: 0x840(slab|head|zone=0)
[ 140.243767] page_type: 0xffffffff()
[ 140.244323] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.245290] raw: 00000000
[ 140.245633] page dumped because: kasan: bad access detected
[ 140.246378]
[ 140.246717] Memory state around the buggy address:
[ 140.247364] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.248171] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.248918] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.249689] ^
[ 140.250382] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.251168] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.251974] ==================================================================
[ 140.062183] ==================================================================
[ 140.063236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[ 140.064016] Write of size 1 at addr c4d5e4c9 by task kunit_try_catch/131
[ 140.064710]
[ 140.064976] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.065786] Hardware name: Generic DT based system
[ 140.066336] unwind_backtrace from show_stack+0x18/0x1c
[ 140.067021] show_stack from dump_stack_lvl+0x58/0x70
[ 140.067938] dump_stack_lvl from print_report+0x164/0x51c
[ 140.068711] print_report from kasan_report+0xc8/0x104
[ 140.069389] kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[ 140.070182] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.071232] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.072163] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.072992] kthread from ret_from_fork+0x14/0x30
[ 140.073608] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.074248] bfa0: 00000000 00000000 00000000 00000000
[ 140.074987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.075920] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.076629]
[ 140.076945] Allocated by task 131:
[ 140.077491] kasan_set_track+0x3c/0x5c
[ 140.078154] __kasan_krealloc+0xe0/0x104
[ 140.078738] krealloc+0xd4/0x134
[ 140.079400] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.080030] kunit_try_run_case+0x11c/0x2e4
[ 140.080572] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.081372] kthread+0x184/0x1a8
[ 140.081887] ret_from_fork+0x14/0x30
[ 140.082385]
[ 140.082595] The buggy address belongs to the object at c4d5e400
[ 140.082595] which belongs to the cache kmalloc-256 of size 256
[ 140.084056] The buggy address is located 0 bytes to the right of
[ 140.084056] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.085164]
[ 140.085500] The buggy address belongs to the physical page:
[ 140.086109] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.086960] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.087951] flags: 0x840(slab|head|zone=0)
[ 140.088492] page_type: 0xffffffff()
[ 140.088965] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.089809] raw: 00000000
[ 140.090115] page dumped because: kasan: bad access detected
[ 140.090728]
[ 140.090999] Memory state around the buggy address:
[ 140.091630] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.092492] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.093264] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.093959] ^
[ 140.094510] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.095266] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.095960] ==================================================================
[ 140.098485] ==================================================================
[ 140.099407] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[ 140.100201] Write of size 1 at addr c4d5e4d0 by task kunit_try_catch/131
[ 140.100870]
[ 140.101188] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.102114] Hardware name: Generic DT based system
[ 140.102546] unwind_backtrace from show_stack+0x18/0x1c
[ 140.103406] show_stack from dump_stack_lvl+0x58/0x70
[ 140.104153] dump_stack_lvl from print_report+0x164/0x51c
[ 140.104816] print_report from kasan_report+0xc8/0x104
[ 140.105653] kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[ 140.106537] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.107405] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.108452] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.109400] kthread from ret_from_fork+0x14/0x30
[ 140.109962] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.110671] bfa0: 00000000 00000000 00000000 00000000
[ 140.111570] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.112507] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.113313]
[ 140.113540] Allocated by task 131:
[ 140.114067] kasan_set_track+0x3c/0x5c
[ 140.114538] __kasan_krealloc+0xe0/0x104
[ 140.115196] krealloc+0xd4/0x134
[ 140.115603] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.116389] kunit_try_run_case+0x11c/0x2e4
[ 140.116963] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.117715] kthread+0x184/0x1a8
[ 140.118426] ret_from_fork+0x14/0x30
[ 140.118998]
[ 140.119709] The buggy address belongs to the object at c4d5e400
[ 140.119709] which belongs to the cache kmalloc-256 of size 256
[ 140.121090] The buggy address is located 7 bytes to the right of
[ 140.121090] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.122237]
[ 140.122514] The buggy address belongs to the physical page:
[ 140.123335] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.124329] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.125172] flags: 0x840(slab|head|zone=0)
[ 140.125728] page_type: 0xffffffff()
[ 140.126166] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.127049] raw: 00000000
[ 140.127453] page dumped because: kasan: bad access detected
[ 140.128031]
[ 140.128453] Memory state around the buggy address:
[ 140.129051] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.129918] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.130694] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.131560] ^
[ 140.132203] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.133035] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.133784] ==================================================================
[ 140.174005] ==================================================================
[ 140.174995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.176021] Write of size 1 at addr c4d5e4ea by task kunit_try_catch/131
[ 140.176895]
[ 140.177716] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.179608] Hardware name: Generic DT based system
[ 140.180144] unwind_backtrace from show_stack+0x18/0x1c
[ 140.180781] show_stack from dump_stack_lvl+0x58/0x70
[ 140.181614] dump_stack_lvl from print_report+0x164/0x51c
[ 140.182377] print_report from kasan_report+0xc8/0x104
[ 140.183031] kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.183961] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.184850] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.185787] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.186638] kthread from ret_from_fork+0x14/0x30
[ 140.187314] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.187941] bfa0: 00000000 00000000 00000000 00000000
[ 140.188883] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.189914] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.190690]
[ 140.190971] Allocated by task 131:
[ 140.191551] kasan_set_track+0x3c/0x5c
[ 140.192082] __kasan_krealloc+0xe0/0x104
[ 140.192705] krealloc+0xd4/0x134
[ 140.193213] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.193904] kunit_try_run_case+0x11c/0x2e4
[ 140.194461] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.195318] kthread+0x184/0x1a8
[ 140.195830] ret_from_fork+0x14/0x30
[ 140.196275]
[ 140.196630] The buggy address belongs to the object at c4d5e400
[ 140.196630] which belongs to the cache kmalloc-256 of size 256
[ 140.198487] The buggy address is located 33 bytes to the right of
[ 140.198487] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.199753]
[ 140.199984] The buggy address belongs to the physical page:
[ 140.201140] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.202071] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.202939] flags: 0x840(slab|head|zone=0)
[ 140.203598] page_type: 0xffffffff()
[ 140.204209] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.205195] raw: 00000000
[ 140.205565] page dumped because: kasan: bad access detected
[ 140.206258]
[ 140.206589] Memory state around the buggy address:
[ 140.207233] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.208191] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.209032] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.209789] ^
[ 140.210543] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.211363] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.212141] ==================================================================
[ 140.325940] ==================================================================
[ 140.327188] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[ 140.328288] Write of size 1 at addr c8f160c9 by task kunit_try_catch/135
[ 140.328928]
[ 140.329325] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.330426] Hardware name: Generic DT based system
[ 140.331026] unwind_backtrace from show_stack+0x18/0x1c
[ 140.331817] show_stack from dump_stack_lvl+0x58/0x70
[ 140.332587] dump_stack_lvl from print_report+0x164/0x51c
[ 140.333265] print_report from kasan_report+0xc8/0x104
[ 140.334051] kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[ 140.334899] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.335786] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.336877] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.337831] kthread from ret_from_fork+0x14/0x30
[ 140.338782] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.339638] bfa0: 00000000 00000000 00000000 00000000
[ 140.340533] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.341465] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.342158]
[ 140.342425] The buggy address belongs to the physical page:
[ 140.342958] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.343908] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.344640] flags: 0x40(head|zone=0)
[ 140.345144] page_type: 0xffffffff()
[ 140.345585] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.346455] raw: 00000000
[ 140.346892] page dumped because: kasan: bad access detected
[ 140.347544]
[ 140.347784] Memory state around the buggy address:
[ 140.348407] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.349227] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.350026] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.350785] ^
[ 140.351420] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.352115] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.352710] ==================================================================
Home
[ 140.384088] ==================================================================
[ 140.384650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.385790] Write of size 1 at addr c8f160da by task kunit_try_catch/135
[ 140.386482]
[ 140.386782] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.387460] Hardware name: Generic DT based system
[ 140.388116] unwind_backtrace from show_stack+0x18/0x1c
[ 140.389665] show_stack from dump_stack_lvl+0x58/0x70
[ 140.390959] dump_stack_lvl from print_report+0x164/0x51c
[ 140.392387] print_report from kasan_report+0xc8/0x104
[ 140.392974] kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.393790] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.394655] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.395708] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.396720] kthread from ret_from_fork+0x14/0x30
[ 140.397338] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.397908] bfa0: 00000000 00000000 00000000 00000000
[ 140.398914] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.399809] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.400505]
[ 140.400827] The buggy address belongs to the physical page:
[ 140.401398] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.402191] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.403002] flags: 0x40(head|zone=0)
[ 140.403467] page_type: 0xffffffff()
[ 140.403919] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.404812] raw: 00000000
[ 140.405158] page dumped because: kasan: bad access detected
[ 140.405724]
[ 140.406014] Memory state around the buggy address:
[ 140.406601] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.407303] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.408651] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.409640] ^
[ 140.410194] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.410995] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.411682] ==================================================================
Home
[ 140.439588] ==================================================================
[ 140.440388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[ 140.441140] Write of size 1 at addr c8f160eb by task kunit_try_catch/135
[ 140.441871]
[ 140.442195] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.442978] Hardware name: Generic DT based system
[ 140.444060] unwind_backtrace from show_stack+0x18/0x1c
[ 140.445227] show_stack from dump_stack_lvl+0x58/0x70
[ 140.445870] dump_stack_lvl from print_report+0x164/0x51c
[ 140.446553] print_report from kasan_report+0xc8/0x104
[ 140.447289] kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[ 140.448562] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.449455] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.450427] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.451267] kthread from ret_from_fork+0x14/0x30
[ 140.451874] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.452387] bfa0: 00000000 00000000 00000000 00000000
[ 140.453348] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.454190] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.454953]
[ 140.455256] The buggy address belongs to the physical page:
[ 140.455856] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.456684] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.457527] flags: 0x40(head|zone=0)
[ 140.458091] page_type: 0xffffffff()
[ 140.458558] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.459401] raw: 00000000
[ 140.459862] page dumped because: kasan: bad access detected
[ 140.460452]
[ 140.460701] Memory state around the buggy address:
[ 140.461374] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.462085] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.462916] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.463605] ^
[ 140.464264] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.464948] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.465667] ==================================================================
Home
[ 140.098485] ==================================================================
[ 140.099407] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[ 140.100201] Write of size 1 at addr c4d5e4d0 by task kunit_try_catch/131
[ 140.100870]
[ 140.101188] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.102114] Hardware name: Generic DT based system
[ 140.102546] unwind_backtrace from show_stack+0x18/0x1c
[ 140.103406] show_stack from dump_stack_lvl+0x58/0x70
[ 140.104153] dump_stack_lvl from print_report+0x164/0x51c
[ 140.104816] print_report from kasan_report+0xc8/0x104
[ 140.105653] kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[ 140.106537] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.107405] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.108452] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.109400] kthread from ret_from_fork+0x14/0x30
[ 140.109962] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.110671] bfa0: 00000000 00000000 00000000 00000000
[ 140.111570] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.112507] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.113313]
[ 140.113540] Allocated by task 131:
[ 140.114067] kasan_set_track+0x3c/0x5c
[ 140.114538] __kasan_krealloc+0xe0/0x104
[ 140.115196] krealloc+0xd4/0x134
[ 140.115603] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.116389] kunit_try_run_case+0x11c/0x2e4
[ 140.116963] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.117715] kthread+0x184/0x1a8
[ 140.118426] ret_from_fork+0x14/0x30
[ 140.118998]
[ 140.119709] The buggy address belongs to the object at c4d5e400
[ 140.119709] which belongs to the cache kmalloc-256 of size 256
[ 140.121090] The buggy address is located 7 bytes to the right of
[ 140.121090] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.122237]
[ 140.122514] The buggy address belongs to the physical page:
[ 140.123335] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.124329] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.125172] flags: 0x840(slab|head|zone=0)
[ 140.125728] page_type: 0xffffffff()
[ 140.126166] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.127049] raw: 00000000
[ 140.127453] page dumped because: kasan: bad access detected
[ 140.128031]
[ 140.128453] Memory state around the buggy address:
[ 140.129051] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.129918] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.130694] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.131560] ^
[ 140.132203] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.133035] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.133784] ==================================================================
Home
[ 140.062183] ==================================================================
[ 140.063236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[ 140.064016] Write of size 1 at addr c4d5e4c9 by task kunit_try_catch/131
[ 140.064710]
[ 140.064976] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.065786] Hardware name: Generic DT based system
[ 140.066336] unwind_backtrace from show_stack+0x18/0x1c
[ 140.067021] show_stack from dump_stack_lvl+0x58/0x70
[ 140.067938] dump_stack_lvl from print_report+0x164/0x51c
[ 140.068711] print_report from kasan_report+0xc8/0x104
[ 140.069389] kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[ 140.070182] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.071232] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.072163] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.072992] kthread from ret_from_fork+0x14/0x30
[ 140.073608] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.074248] bfa0: 00000000 00000000 00000000 00000000
[ 140.074987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.075920] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.076629]
[ 140.076945] Allocated by task 131:
[ 140.077491] kasan_set_track+0x3c/0x5c
[ 140.078154] __kasan_krealloc+0xe0/0x104
[ 140.078738] krealloc+0xd4/0x134
[ 140.079400] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.080030] kunit_try_run_case+0x11c/0x2e4
[ 140.080572] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.081372] kthread+0x184/0x1a8
[ 140.081887] ret_from_fork+0x14/0x30
[ 140.082385]
[ 140.082595] The buggy address belongs to the object at c4d5e400
[ 140.082595] which belongs to the cache kmalloc-256 of size 256
[ 140.084056] The buggy address is located 0 bytes to the right of
[ 140.084056] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.085164]
[ 140.085500] The buggy address belongs to the physical page:
[ 140.086109] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.086960] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.087951] flags: 0x840(slab|head|zone=0)
[ 140.088492] page_type: 0xffffffff()
[ 140.088965] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.089809] raw: 00000000
[ 140.090115] page dumped because: kasan: bad access detected
[ 140.090728]
[ 140.090999] Memory state around the buggy address:
[ 140.091630] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.092492] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.093264] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.093959] ^
[ 140.094510] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.095266] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.095960] ==================================================================
Home
[ 140.174005] ==================================================================
[ 140.174995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.176021] Write of size 1 at addr c4d5e4ea by task kunit_try_catch/131
[ 140.176895]
[ 140.177716] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.179608] Hardware name: Generic DT based system
[ 140.180144] unwind_backtrace from show_stack+0x18/0x1c
[ 140.180781] show_stack from dump_stack_lvl+0x58/0x70
[ 140.181614] dump_stack_lvl from print_report+0x164/0x51c
[ 140.182377] print_report from kasan_report+0xc8/0x104
[ 140.183031] kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.183961] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.184850] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.185787] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.186638] kthread from ret_from_fork+0x14/0x30
[ 140.187314] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.187941] bfa0: 00000000 00000000 00000000 00000000
[ 140.188883] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.189914] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.190690]
[ 140.190971] Allocated by task 131:
[ 140.191551] kasan_set_track+0x3c/0x5c
[ 140.192082] __kasan_krealloc+0xe0/0x104
[ 140.192705] krealloc+0xd4/0x134
[ 140.193213] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.193904] kunit_try_run_case+0x11c/0x2e4
[ 140.194461] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.195318] kthread+0x184/0x1a8
[ 140.195830] ret_from_fork+0x14/0x30
[ 140.196275]
[ 140.196630] The buggy address belongs to the object at c4d5e400
[ 140.196630] which belongs to the cache kmalloc-256 of size 256
[ 140.198487] The buggy address is located 33 bytes to the right of
[ 140.198487] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.199753]
[ 140.199984] The buggy address belongs to the physical page:
[ 140.201140] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.202071] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.202939] flags: 0x840(slab|head|zone=0)
[ 140.203598] page_type: 0xffffffff()
[ 140.204209] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.205195] raw: 00000000
[ 140.205565] page dumped because: kasan: bad access detected
[ 140.206258]
[ 140.206589] Memory state around the buggy address:
[ 140.207233] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.208191] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.209032] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.209789] ^
[ 140.210543] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.211363] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.212141] ==================================================================
Home
[ 140.135101] ==================================================================
[ 140.135950] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.136907] Write of size 1 at addr c4d5e4da by task kunit_try_catch/131
[ 140.138004]
[ 140.138466] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.139660] Hardware name: Generic DT based system
[ 140.140242] unwind_backtrace from show_stack+0x18/0x1c
[ 140.141350] show_stack from dump_stack_lvl+0x58/0x70
[ 140.142088] dump_stack_lvl from print_report+0x164/0x51c
[ 140.143043] print_report from kasan_report+0xc8/0x104
[ 140.143952] kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[ 140.144832] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.145759] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.146742] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.147673] kthread from ret_from_fork+0x14/0x30
[ 140.148361] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.149025] bfa0: 00000000 00000000 00000000 00000000
[ 140.149969] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.150859] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.151639]
[ 140.151936] Allocated by task 131:
[ 140.152502] kasan_set_track+0x3c/0x5c
[ 140.153215] __kasan_krealloc+0xe0/0x104
[ 140.153852] krealloc+0xd4/0x134
[ 140.154403] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.155045] kunit_try_run_case+0x11c/0x2e4
[ 140.155666] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.156451] kthread+0x184/0x1a8
[ 140.156921] ret_from_fork+0x14/0x30
[ 140.157561]
[ 140.158035] The buggy address belongs to the object at c4d5e400
[ 140.158035] which belongs to the cache kmalloc-256 of size 256
[ 140.160205] The buggy address is located 17 bytes to the right of
[ 140.160205] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.161803]
[ 140.162216] The buggy address belongs to the physical page:
[ 140.163226] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.163965] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.164782] flags: 0x840(slab|head|zone=0)
[ 140.165394] page_type: 0xffffffff()
[ 140.165814] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.166730] raw: 00000000
[ 140.167061] page dumped because: kasan: bad access detected
[ 140.167768]
[ 140.168001] Memory state around the buggy address:
[ 140.168593] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.169353] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.170114] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.170857] ^
[ 140.171461] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.172251] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.172950] ==================================================================
Home
[ 140.412685] ==================================================================
[ 140.413391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.414013] Write of size 1 at addr c8f160ea by task kunit_try_catch/135
[ 140.415268]
[ 140.415792] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.416636] Hardware name: Generic DT based system
[ 140.417233] unwind_backtrace from show_stack+0x18/0x1c
[ 140.417893] show_stack from dump_stack_lvl+0x58/0x70
[ 140.418573] dump_stack_lvl from print_report+0x164/0x51c
[ 140.419414] print_report from kasan_report+0xc8/0x104
[ 140.420191] kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[ 140.421008] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.421884] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.422887] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.423821] kthread from ret_from_fork+0x14/0x30
[ 140.424416] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.425023] bfa0: 00000000 00000000 00000000 00000000
[ 140.425946] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.426801] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.427723]
[ 140.427949] The buggy address belongs to the physical page:
[ 140.428878] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.429958] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.430757] flags: 0x40(head|zone=0)
[ 140.431237] page_type: 0xffffffff()
[ 140.431667] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.432475] raw: 00000000
[ 140.432901] page dumped because: kasan: bad access detected
[ 140.433401]
[ 140.433728] Memory state around the buggy address:
[ 140.434313] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.435041] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.435771] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.436467] ^
[ 140.437147] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.437864] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.438510] ==================================================================
Home
[ 140.357394] ==================================================================
[ 140.358088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[ 140.358882] Write of size 1 at addr c8f160d0 by task kunit_try_catch/135
[ 140.359661]
[ 140.359927] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.360854] Hardware name: Generic DT based system
[ 140.361511] unwind_backtrace from show_stack+0x18/0x1c
[ 140.362204] show_stack from dump_stack_lvl+0x58/0x70
[ 140.362947] dump_stack_lvl from print_report+0x164/0x51c
[ 140.363670] print_report from kasan_report+0xc8/0x104
[ 140.364461] kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[ 140.365333] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.366174] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.367051] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.367994] kthread from ret_from_fork+0x14/0x30
[ 140.368666] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.369315] bfa0: 00000000 00000000 00000000 00000000
[ 140.370298] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.371194] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.372035]
[ 140.372331] The buggy address belongs to the physical page:
[ 140.373043] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.373922] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.374718] flags: 0x40(head|zone=0)
[ 140.375215] page_type: 0xffffffff()
[ 140.375695] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.376465] raw: 00000000
[ 140.376886] page dumped because: kasan: bad access detected
[ 140.377533]
[ 140.377797] Memory state around the buggy address:
[ 140.378479] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.379200] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.379962] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.380731] ^
[ 140.381368] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.382169] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.383034] ==================================================================
Home
[ 140.213812] ==================================================================
[ 140.214673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[ 140.215698] Write of size 1 at addr c4d5e4eb by task kunit_try_catch/131
[ 140.216478]
[ 140.216851] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.218800] Hardware name: Generic DT based system
[ 140.219438] unwind_backtrace from show_stack+0x18/0x1c
[ 140.220385] show_stack from dump_stack_lvl+0x58/0x70
[ 140.221177] dump_stack_lvl from print_report+0x164/0x51c
[ 140.222038] print_report from kasan_report+0xc8/0x104
[ 140.222819] kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[ 140.223789] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.224665] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.225695] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.226607] kthread from ret_from_fork+0x14/0x30
[ 140.227295] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 140.227959] bfa0: 00000000 00000000 00000000 00000000
[ 140.228913] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.229863] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.230658]
[ 140.230971] Allocated by task 131:
[ 140.231588] kasan_set_track+0x3c/0x5c
[ 140.232199] __kasan_krealloc+0xe0/0x104
[ 140.232857] krealloc+0xd4/0x134
[ 140.233483] krealloc_less_oob_helper+0xd4/0x5f0
[ 140.234215] kunit_try_run_case+0x11c/0x2e4
[ 140.234832] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.235606] kthread+0x184/0x1a8
[ 140.236089] ret_from_fork+0x14/0x30
[ 140.236677]
[ 140.236946] The buggy address belongs to the object at c4d5e400
[ 140.236946] which belongs to the cache kmalloc-256 of size 256
[ 140.238898] The buggy address is located 34 bytes to the right of
[ 140.238898] allocated 201-byte region [c4d5e400, c4d5e4c9)
[ 140.239983]
[ 140.240375] The buggy address belongs to the physical page:
[ 140.241227] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.242171] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.243093] flags: 0x840(slab|head|zone=0)
[ 140.243767] page_type: 0xffffffff()
[ 140.244323] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.245290] raw: 00000000
[ 140.245633] page dumped because: kasan: bad access detected
[ 140.246378]
[ 140.246717] Memory state around the buggy address:
[ 140.247364] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.248171] c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.248918] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 140.249689] ^
[ 140.250382] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.251168] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.251974] ==================================================================
Home
[ 140.325940] ==================================================================
[ 140.327188] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[ 140.328288] Write of size 1 at addr c8f160c9 by task kunit_try_catch/135
[ 140.328928]
[ 140.329325] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.330426] Hardware name: Generic DT based system
[ 140.331026] unwind_backtrace from show_stack+0x18/0x1c
[ 140.331817] show_stack from dump_stack_lvl+0x58/0x70
[ 140.332587] dump_stack_lvl from print_report+0x164/0x51c
[ 140.333265] print_report from kasan_report+0xc8/0x104
[ 140.334051] kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[ 140.334899] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.335786] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.336877] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.337831] kthread from ret_from_fork+0x14/0x30
[ 140.338782] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 140.339638] bfa0: 00000000 00000000 00000000 00000000
[ 140.340533] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.341465] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.342158]
[ 140.342425] The buggy address belongs to the physical page:
[ 140.342958] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.343908] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.344640] flags: 0x40(head|zone=0)
[ 140.345144] page_type: 0xffffffff()
[ 140.345585] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.346455] raw: 00000000
[ 140.346892] page dumped because: kasan: bad access detected
[ 140.347544]
[ 140.347784] Memory state around the buggy address:
[ 140.348407] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.349227] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.350026] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 140.350785] ^
[ 140.351420] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.352115] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.352710] ==================================================================
Home
[ 139.981497] ==================================================================
[ 139.982704] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[ 139.983540] Write of size 1 at addr c4d5e2eb by task kunit_try_catch/129
[ 139.984266]
[ 139.984505] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.985535] Hardware name: Generic DT based system
[ 139.986087] unwind_backtrace from show_stack+0x18/0x1c
[ 139.986771] show_stack from dump_stack_lvl+0x58/0x70
[ 139.987509] dump_stack_lvl from print_report+0x164/0x51c
[ 139.988719] print_report from kasan_report+0xc8/0x104
[ 139.989585] kasan_report from krealloc_more_oob_helper+0x144/0x384
[ 139.990469] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 139.991389] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.992451] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.993327] kthread from ret_from_fork+0x14/0x30
[ 139.993977] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[ 139.994715] bfa0: 00000000 00000000 00000000 00000000
[ 139.995684] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.996566] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.997369]
[ 139.997742] Allocated by task 129:
[ 139.998153] kasan_set_track+0x3c/0x5c
[ 139.998757] __kasan_krealloc+0xe0/0x104
[ 139.999225] krealloc+0xd4/0x134
[ 139.999764] krealloc_more_oob_helper+0xd4/0x384
[ 140.000440] kunit_try_run_case+0x11c/0x2e4
[ 140.000947] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.001771] kthread+0x184/0x1a8
[ 140.002213] ret_from_fork+0x14/0x30
[ 140.002656]
[ 140.002925] The buggy address belongs to the object at c4d5e200
[ 140.002925] which belongs to the cache kmalloc-256 of size 256
[ 140.004035] The buggy address is located 0 bytes to the right of
[ 140.004035] allocated 235-byte region [c4d5e200, c4d5e2eb)
[ 140.005438]
[ 140.005743] The buggy address belongs to the physical page:
[ 140.006435] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.007283] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.008065] flags: 0x840(slab|head|zone=0)
[ 140.008571] page_type: 0xffffffff()
[ 140.009052] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.009980] raw: 00000000
[ 140.010291] page dumped because: kasan: bad access detected
[ 140.010992]
[ 140.011320] Memory state around the buggy address:
[ 140.011889] c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.012722] c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.013492] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 140.014284] ^
[ 140.014815] c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.015668] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.016326] ==================================================================
[ 140.020582] ==================================================================
[ 140.021319] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[ 140.022067] Write of size 1 at addr c4d5e2f0 by task kunit_try_catch/129
[ 140.022819]
[ 140.023117] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.023846] Hardware name: Generic DT based system
[ 140.024538] unwind_backtrace from show_stack+0x18/0x1c
[ 140.025414] show_stack from dump_stack_lvl+0x58/0x70
[ 140.026256] dump_stack_lvl from print_report+0x164/0x51c
[ 140.027103] print_report from kasan_report+0xc8/0x104
[ 140.028024] kasan_report from krealloc_more_oob_helper+0x180/0x384
[ 140.028879] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.029731] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.030708] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.031562] kthread from ret_from_fork+0x14/0x30
[ 140.032158] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[ 140.032825] bfa0: 00000000 00000000 00000000 00000000
[ 140.033664] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.034628] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.035325]
[ 140.035628] Allocated by task 129:
[ 140.035980] kasan_set_track+0x3c/0x5c
[ 140.036623] __kasan_krealloc+0xe0/0x104
[ 140.037154] krealloc+0xd4/0x134
[ 140.037609] krealloc_more_oob_helper+0xd4/0x384
[ 140.038345] kunit_try_run_case+0x11c/0x2e4
[ 140.038924] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.039570] kthread+0x184/0x1a8
[ 140.040046] ret_from_fork+0x14/0x30
[ 140.040477]
[ 140.040852] The buggy address belongs to the object at c4d5e200
[ 140.040852] which belongs to the cache kmalloc-256 of size 256
[ 140.042163] The buggy address is located 5 bytes to the right of
[ 140.042163] allocated 235-byte region [c4d5e200, c4d5e2eb)
[ 140.043323]
[ 140.043622] The buggy address belongs to the physical page:
[ 140.044204] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.045150] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.045916] flags: 0x840(slab|head|zone=0)
[ 140.046354] page_type: 0xffffffff()
[ 140.046978] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.047809] raw: 00000000
[ 140.048228] page dumped because: kasan: bad access detected
[ 140.048758]
[ 140.049156] Memory state around the buggy address:
[ 140.049706] c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.050395] c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.051297] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 140.051944] ^
[ 140.052836] c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.053547] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.054234] ==================================================================
[ 140.259318] ==================================================================
[ 140.260606] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[ 140.261584] Write of size 1 at addr c8f160eb by task kunit_try_catch/133
[ 140.262195]
[ 140.262491] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.263448] Hardware name: Generic DT based system
[ 140.264037] unwind_backtrace from show_stack+0x18/0x1c
[ 140.265086] show_stack from dump_stack_lvl+0x58/0x70
[ 140.265955] dump_stack_lvl from print_report+0x164/0x51c
[ 140.266642] print_report from kasan_report+0xc8/0x104
[ 140.267390] kasan_report from krealloc_more_oob_helper+0x144/0x384
[ 140.268241] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.269236] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.270278] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.271308] kthread from ret_from_fork+0x14/0x30
[ 140.272000] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 140.272800] bfa0: 00000000 00000000 00000000 00000000
[ 140.273782] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.274722] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.275530]
[ 140.275811] The buggy address belongs to the physical page:
[ 140.276597] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.278016] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.278939] flags: 0x40(head|zone=0)
[ 140.279410] page_type: 0xffffffff()
[ 140.279986] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.281015] raw: 00000000
[ 140.281393] page dumped because: kasan: bad access detected
[ 140.282096]
[ 140.282415] Memory state around the buggy address:
[ 140.282997] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.283956] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.284792] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 140.285578] ^
[ 140.286377] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.287233] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.287985] ==================================================================
[ 140.290296] ==================================================================
[ 140.291019] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[ 140.291866] Write of size 1 at addr c8f160f0 by task kunit_try_catch/133
[ 140.292745]
[ 140.293105] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.294100] Hardware name: Generic DT based system
[ 140.294800] unwind_backtrace from show_stack+0x18/0x1c
[ 140.295630] show_stack from dump_stack_lvl+0x58/0x70
[ 140.296405] dump_stack_lvl from print_report+0x164/0x51c
[ 140.297385] print_report from kasan_report+0xc8/0x104
[ 140.298107] kasan_report from krealloc_more_oob_helper+0x180/0x384
[ 140.299470] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.300426] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.301485] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.302381] kthread from ret_from_fork+0x14/0x30
[ 140.303054] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 140.303768] bfa0: 00000000 00000000 00000000 00000000
[ 140.304779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.305821] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.306642]
[ 140.307008] The buggy address belongs to the physical page:
[ 140.307702] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.308786] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.309752] flags: 0x40(head|zone=0)
[ 140.310255] page_type: 0xffffffff()
[ 140.310832] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.311865] raw: 00000000
[ 140.312253] page dumped because: kasan: bad access detected
[ 140.312968]
[ 140.313373] Memory state around the buggy address:
[ 140.314002] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.314813] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.315597] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 140.316374] ^
[ 140.317109] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.317851] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.318860] ==================================================================
Home
[ 140.259318] ==================================================================
[ 140.260606] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[ 140.261584] Write of size 1 at addr c8f160eb by task kunit_try_catch/133
[ 140.262195]
[ 140.262491] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.263448] Hardware name: Generic DT based system
[ 140.264037] unwind_backtrace from show_stack+0x18/0x1c
[ 140.265086] show_stack from dump_stack_lvl+0x58/0x70
[ 140.265955] dump_stack_lvl from print_report+0x164/0x51c
[ 140.266642] print_report from kasan_report+0xc8/0x104
[ 140.267390] kasan_report from krealloc_more_oob_helper+0x144/0x384
[ 140.268241] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.269236] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.270278] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.271308] kthread from ret_from_fork+0x14/0x30
[ 140.272000] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 140.272800] bfa0: 00000000 00000000 00000000 00000000
[ 140.273782] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.274722] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.275530]
[ 140.275811] The buggy address belongs to the physical page:
[ 140.276597] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.278016] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.278939] flags: 0x40(head|zone=0)
[ 140.279410] page_type: 0xffffffff()
[ 140.279986] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.281015] raw: 00000000
[ 140.281393] page dumped because: kasan: bad access detected
[ 140.282096]
[ 140.282415] Memory state around the buggy address:
[ 140.282997] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.283956] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.284792] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 140.285578] ^
[ 140.286377] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.287233] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.287985] ==================================================================
Home
[ 139.981497] ==================================================================
[ 139.982704] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[ 139.983540] Write of size 1 at addr c4d5e2eb by task kunit_try_catch/129
[ 139.984266]
[ 139.984505] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.985535] Hardware name: Generic DT based system
[ 139.986087] unwind_backtrace from show_stack+0x18/0x1c
[ 139.986771] show_stack from dump_stack_lvl+0x58/0x70
[ 139.987509] dump_stack_lvl from print_report+0x164/0x51c
[ 139.988719] print_report from kasan_report+0xc8/0x104
[ 139.989585] kasan_report from krealloc_more_oob_helper+0x144/0x384
[ 139.990469] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 139.991389] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.992451] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.993327] kthread from ret_from_fork+0x14/0x30
[ 139.993977] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[ 139.994715] bfa0: 00000000 00000000 00000000 00000000
[ 139.995684] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.996566] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.997369]
[ 139.997742] Allocated by task 129:
[ 139.998153] kasan_set_track+0x3c/0x5c
[ 139.998757] __kasan_krealloc+0xe0/0x104
[ 139.999225] krealloc+0xd4/0x134
[ 139.999764] krealloc_more_oob_helper+0xd4/0x384
[ 140.000440] kunit_try_run_case+0x11c/0x2e4
[ 140.000947] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.001771] kthread+0x184/0x1a8
[ 140.002213] ret_from_fork+0x14/0x30
[ 140.002656]
[ 140.002925] The buggy address belongs to the object at c4d5e200
[ 140.002925] which belongs to the cache kmalloc-256 of size 256
[ 140.004035] The buggy address is located 0 bytes to the right of
[ 140.004035] allocated 235-byte region [c4d5e200, c4d5e2eb)
[ 140.005438]
[ 140.005743] The buggy address belongs to the physical page:
[ 140.006435] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.007283] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.008065] flags: 0x840(slab|head|zone=0)
[ 140.008571] page_type: 0xffffffff()
[ 140.009052] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.009980] raw: 00000000
[ 140.010291] page dumped because: kasan: bad access detected
[ 140.010992]
[ 140.011320] Memory state around the buggy address:
[ 140.011889] c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.012722] c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.013492] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 140.014284] ^
[ 140.014815] c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.015668] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.016326] ==================================================================
Home
[ 140.020582] ==================================================================
[ 140.021319] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[ 140.022067] Write of size 1 at addr c4d5e2f0 by task kunit_try_catch/129
[ 140.022819]
[ 140.023117] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.023846] Hardware name: Generic DT based system
[ 140.024538] unwind_backtrace from show_stack+0x18/0x1c
[ 140.025414] show_stack from dump_stack_lvl+0x58/0x70
[ 140.026256] dump_stack_lvl from print_report+0x164/0x51c
[ 140.027103] print_report from kasan_report+0xc8/0x104
[ 140.028024] kasan_report from krealloc_more_oob_helper+0x180/0x384
[ 140.028879] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.029731] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.030708] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.031562] kthread from ret_from_fork+0x14/0x30
[ 140.032158] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[ 140.032825] bfa0: 00000000 00000000 00000000 00000000
[ 140.033664] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.034628] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.035325]
[ 140.035628] Allocated by task 129:
[ 140.035980] kasan_set_track+0x3c/0x5c
[ 140.036623] __kasan_krealloc+0xe0/0x104
[ 140.037154] krealloc+0xd4/0x134
[ 140.037609] krealloc_more_oob_helper+0xd4/0x384
[ 140.038345] kunit_try_run_case+0x11c/0x2e4
[ 140.038924] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.039570] kthread+0x184/0x1a8
[ 140.040046] ret_from_fork+0x14/0x30
[ 140.040477]
[ 140.040852] The buggy address belongs to the object at c4d5e200
[ 140.040852] which belongs to the cache kmalloc-256 of size 256
[ 140.042163] The buggy address is located 5 bytes to the right of
[ 140.042163] allocated 235-byte region [c4d5e200, c4d5e2eb)
[ 140.043323]
[ 140.043622] The buggy address belongs to the physical page:
[ 140.044204] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.045150] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.045916] flags: 0x840(slab|head|zone=0)
[ 140.046354] page_type: 0xffffffff()
[ 140.046978] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.047809] raw: 00000000
[ 140.048228] page dumped because: kasan: bad access detected
[ 140.048758]
[ 140.049156] Memory state around the buggy address:
[ 140.049706] c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.050395] c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.051297] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 140.051944] ^
[ 140.052836] c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.053547] c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.054234] ==================================================================
Home
[ 140.290296] ==================================================================
[ 140.291019] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[ 140.291866] Write of size 1 at addr c8f160f0 by task kunit_try_catch/133
[ 140.292745]
[ 140.293105] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.294100] Hardware name: Generic DT based system
[ 140.294800] unwind_backtrace from show_stack+0x18/0x1c
[ 140.295630] show_stack from dump_stack_lvl+0x58/0x70
[ 140.296405] dump_stack_lvl from print_report+0x164/0x51c
[ 140.297385] print_report from kasan_report+0xc8/0x104
[ 140.298107] kasan_report from krealloc_more_oob_helper+0x180/0x384
[ 140.299470] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 140.300426] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.301485] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.302381] kthread from ret_from_fork+0x14/0x30
[ 140.303054] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 140.303768] bfa0: 00000000 00000000 00000000 00000000
[ 140.304779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.305821] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.306642]
[ 140.307008] The buggy address belongs to the physical page:
[ 140.307702] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[ 140.308786] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.309752] flags: 0x40(head|zone=0)
[ 140.310255] page_type: 0xffffffff()
[ 140.310832] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 140.311865] raw: 00000000
[ 140.312253] page dumped because: kasan: bad access detected
[ 140.312968]
[ 140.313373] Memory state around the buggy address:
[ 140.314002] c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.314813] c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 140.315597] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 140.316374] ^
[ 140.317109] c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.317851] c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 140.318860] ==================================================================
Home
[ 141.969384] ==================================================================
[ 141.970739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[ 141.971555] Read of size 1 at addr c8e0b673 by task kunit_try_catch/185
[ 141.972143]
[ 141.972480] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.973386] Hardware name: Generic DT based system
[ 141.973950] unwind_backtrace from show_stack+0x18/0x1c
[ 141.974582] show_stack from dump_stack_lvl+0x58/0x70
[ 141.975423] dump_stack_lvl from print_report+0x164/0x51c
[ 141.976217] print_report from kasan_report+0xc8/0x104
[ 141.976889] kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[ 141.977966] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 141.978620] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.979684] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.980715] kthread from ret_from_fork+0x14/0x30
[ 141.982169] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[ 141.982610] 3fa0: 00000000 00000000 00000000 00000000
[ 141.983256] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.984053] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.984853]
[ 141.985097] Allocated by task 185:
[ 141.985551] kasan_set_track+0x3c/0x5c
[ 141.986175] __kasan_kmalloc+0x8c/0x94
[ 141.986603] ksize_unpoisons_memory+0xb4/0x3b4
[ 141.987439] kunit_try_run_case+0x11c/0x2e4
[ 141.988739] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.989712] kthread+0x184/0x1a8
[ 141.990159] ret_from_fork+0x14/0x30
[ 141.990624]
[ 141.990850] The buggy address belongs to the object at c8e0b600
[ 141.990850] which belongs to the cache kmalloc-128 of size 128
[ 141.992109] The buggy address is located 0 bytes to the right of
[ 141.992109] allocated 115-byte region [c8e0b600, c8e0b673)
[ 141.993285]
[ 141.993582] The buggy address belongs to the physical page:
[ 141.994228] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 141.995091] flags: 0x800(slab|zone=0)
[ 141.995529] page_type: 0xffffffff()
[ 141.996029] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 141.997030] raw: 00000000
[ 141.997466] page dumped because: kasan: bad access detected
[ 141.998151]
[ 141.998427] Memory state around the buggy address:
[ 141.998890] c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[ 141.999691] c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.000443] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 142.001241] ^
[ 142.001908] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.002630] c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.003333] ==================================================================
[ 142.043310] ==================================================================
[ 142.043994] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[ 142.044751] Read of size 1 at addr c8e0b67f by task kunit_try_catch/185
[ 142.045449]
[ 142.045706] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.046643] Hardware name: Generic DT based system
[ 142.047576] unwind_backtrace from show_stack+0x18/0x1c
[ 142.048343] show_stack from dump_stack_lvl+0x58/0x70
[ 142.048960] dump_stack_lvl from print_report+0x164/0x51c
[ 142.049820] print_report from kasan_report+0xc8/0x104
[ 142.050645] kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[ 142.051560] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 142.052405] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.053352] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.054227] kthread from ret_from_fork+0x14/0x30
[ 142.054884] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[ 142.055549] 3fa0: 00000000 00000000 00000000 00000000
[ 142.056403] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.057267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.058597]
[ 142.058804] Allocated by task 185:
[ 142.059330] kasan_set_track+0x3c/0x5c
[ 142.059818] __kasan_kmalloc+0x8c/0x94
[ 142.060394] ksize_unpoisons_memory+0xb4/0x3b4
[ 142.060905] kunit_try_run_case+0x11c/0x2e4
[ 142.061632] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.062412] kthread+0x184/0x1a8
[ 142.062909] ret_from_fork+0x14/0x30
[ 142.063367]
[ 142.063734] The buggy address belongs to the object at c8e0b600
[ 142.063734] which belongs to the cache kmalloc-128 of size 128
[ 142.064920] The buggy address is located 12 bytes to the right of
[ 142.064920] allocated 115-byte region [c8e0b600, c8e0b673)
[ 142.066151]
[ 142.066424] The buggy address belongs to the physical page:
[ 142.066998] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.067863] flags: 0x800(slab|zone=0)
[ 142.068454] page_type: 0xffffffff()
[ 142.069116] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.070059] raw: 00000000
[ 142.070413] page dumped because: kasan: bad access detected
[ 142.071007]
[ 142.071561] Memory state around the buggy address:
[ 142.072069] c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[ 142.072734] c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.073417] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 142.074248] ^
[ 142.074921] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.075544] c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.076192] ==================================================================
[ 142.004551] ==================================================================
[ 142.005262] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[ 142.005922] Read of size 1 at addr c8e0b678 by task kunit_try_catch/185
[ 142.006659]
[ 142.006897] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.007849] Hardware name: Generic DT based system
[ 142.008708] unwind_backtrace from show_stack+0x18/0x1c
[ 142.009536] show_stack from dump_stack_lvl+0x58/0x70
[ 142.010197] dump_stack_lvl from print_report+0x164/0x51c
[ 142.011118] print_report from kasan_report+0xc8/0x104
[ 142.011871] kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[ 142.012961] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 142.013827] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.015076] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.016058] kthread from ret_from_fork+0x14/0x30
[ 142.016772] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[ 142.017690] 3fa0: 00000000 00000000 00000000 00000000
[ 142.018607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.019731] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.020511]
[ 142.020843] Allocated by task 185:
[ 142.021357] kasan_set_track+0x3c/0x5c
[ 142.022028] __kasan_kmalloc+0x8c/0x94
[ 142.022610] ksize_unpoisons_memory+0xb4/0x3b4
[ 142.023365] kunit_try_run_case+0x11c/0x2e4
[ 142.024159] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.024987] kthread+0x184/0x1a8
[ 142.025471] ret_from_fork+0x14/0x30
[ 142.026059]
[ 142.026324] The buggy address belongs to the object at c8e0b600
[ 142.026324] which belongs to the cache kmalloc-128 of size 128
[ 142.027999] The buggy address is located 5 bytes to the right of
[ 142.027999] allocated 115-byte region [c8e0b600, c8e0b673)
[ 142.029352]
[ 142.030112] The buggy address belongs to the physical page:
[ 142.030967] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.031776] flags: 0x800(slab|zone=0)
[ 142.032324] page_type: 0xffffffff()
[ 142.032771] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.033754] raw: 00000000
[ 142.034073] page dumped because: kasan: bad access detected
[ 142.034725]
[ 142.034989] Memory state around the buggy address:
[ 142.035594] c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[ 142.036405] c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.037138] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 142.037893] ^
[ 142.038934] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.039577] c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.040447] ==================================================================
Home
[ 142.043310] ==================================================================
[ 142.043994] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[ 142.044751] Read of size 1 at addr c8e0b67f by task kunit_try_catch/185
[ 142.045449]
[ 142.045706] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.046643] Hardware name: Generic DT based system
[ 142.047576] unwind_backtrace from show_stack+0x18/0x1c
[ 142.048343] show_stack from dump_stack_lvl+0x58/0x70
[ 142.048960] dump_stack_lvl from print_report+0x164/0x51c
[ 142.049820] print_report from kasan_report+0xc8/0x104
[ 142.050645] kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[ 142.051560] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 142.052405] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.053352] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.054227] kthread from ret_from_fork+0x14/0x30
[ 142.054884] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[ 142.055549] 3fa0: 00000000 00000000 00000000 00000000
[ 142.056403] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.057267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.058597]
[ 142.058804] Allocated by task 185:
[ 142.059330] kasan_set_track+0x3c/0x5c
[ 142.059818] __kasan_kmalloc+0x8c/0x94
[ 142.060394] ksize_unpoisons_memory+0xb4/0x3b4
[ 142.060905] kunit_try_run_case+0x11c/0x2e4
[ 142.061632] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.062412] kthread+0x184/0x1a8
[ 142.062909] ret_from_fork+0x14/0x30
[ 142.063367]
[ 142.063734] The buggy address belongs to the object at c8e0b600
[ 142.063734] which belongs to the cache kmalloc-128 of size 128
[ 142.064920] The buggy address is located 12 bytes to the right of
[ 142.064920] allocated 115-byte region [c8e0b600, c8e0b673)
[ 142.066151]
[ 142.066424] The buggy address belongs to the physical page:
[ 142.066998] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.067863] flags: 0x800(slab|zone=0)
[ 142.068454] page_type: 0xffffffff()
[ 142.069116] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.070059] raw: 00000000
[ 142.070413] page dumped because: kasan: bad access detected
[ 142.071007]
[ 142.071561] Memory state around the buggy address:
[ 142.072069] c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[ 142.072734] c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.073417] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 142.074248] ^
[ 142.074921] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.075544] c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.076192] ==================================================================
Home
[ 142.004551] ==================================================================
[ 142.005262] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[ 142.005922] Read of size 1 at addr c8e0b678 by task kunit_try_catch/185
[ 142.006659]
[ 142.006897] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.007849] Hardware name: Generic DT based system
[ 142.008708] unwind_backtrace from show_stack+0x18/0x1c
[ 142.009536] show_stack from dump_stack_lvl+0x58/0x70
[ 142.010197] dump_stack_lvl from print_report+0x164/0x51c
[ 142.011118] print_report from kasan_report+0xc8/0x104
[ 142.011871] kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[ 142.012961] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 142.013827] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.015076] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.016058] kthread from ret_from_fork+0x14/0x30
[ 142.016772] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[ 142.017690] 3fa0: 00000000 00000000 00000000 00000000
[ 142.018607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.019731] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.020511]
[ 142.020843] Allocated by task 185:
[ 142.021357] kasan_set_track+0x3c/0x5c
[ 142.022028] __kasan_kmalloc+0x8c/0x94
[ 142.022610] ksize_unpoisons_memory+0xb4/0x3b4
[ 142.023365] kunit_try_run_case+0x11c/0x2e4
[ 142.024159] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.024987] kthread+0x184/0x1a8
[ 142.025471] ret_from_fork+0x14/0x30
[ 142.026059]
[ 142.026324] The buggy address belongs to the object at c8e0b600
[ 142.026324] which belongs to the cache kmalloc-128 of size 128
[ 142.027999] The buggy address is located 5 bytes to the right of
[ 142.027999] allocated 115-byte region [c8e0b600, c8e0b673)
[ 142.029352]
[ 142.030112] The buggy address belongs to the physical page:
[ 142.030967] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.031776] flags: 0x800(slab|zone=0)
[ 142.032324] page_type: 0xffffffff()
[ 142.032771] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.033754] raw: 00000000
[ 142.034073] page dumped because: kasan: bad access detected
[ 142.034725]
[ 142.034989] Memory state around the buggy address:
[ 142.035594] c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[ 142.036405] c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.037138] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 142.037893] ^
[ 142.038934] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.039577] c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.040447] ==================================================================
Home
[ 141.969384] ==================================================================
[ 141.970739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[ 141.971555] Read of size 1 at addr c8e0b673 by task kunit_try_catch/185
[ 141.972143]
[ 141.972480] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.973386] Hardware name: Generic DT based system
[ 141.973950] unwind_backtrace from show_stack+0x18/0x1c
[ 141.974582] show_stack from dump_stack_lvl+0x58/0x70
[ 141.975423] dump_stack_lvl from print_report+0x164/0x51c
[ 141.976217] print_report from kasan_report+0xc8/0x104
[ 141.976889] kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[ 141.977966] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 141.978620] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.979684] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.980715] kthread from ret_from_fork+0x14/0x30
[ 141.982169] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[ 141.982610] 3fa0: 00000000 00000000 00000000 00000000
[ 141.983256] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.984053] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.984853]
[ 141.985097] Allocated by task 185:
[ 141.985551] kasan_set_track+0x3c/0x5c
[ 141.986175] __kasan_kmalloc+0x8c/0x94
[ 141.986603] ksize_unpoisons_memory+0xb4/0x3b4
[ 141.987439] kunit_try_run_case+0x11c/0x2e4
[ 141.988739] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.989712] kthread+0x184/0x1a8
[ 141.990159] ret_from_fork+0x14/0x30
[ 141.990624]
[ 141.990850] The buggy address belongs to the object at c8e0b600
[ 141.990850] which belongs to the cache kmalloc-128 of size 128
[ 141.992109] The buggy address is located 0 bytes to the right of
[ 141.992109] allocated 115-byte region [c8e0b600, c8e0b673)
[ 141.993285]
[ 141.993582] The buggy address belongs to the physical page:
[ 141.994228] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 141.995091] flags: 0x800(slab|zone=0)
[ 141.995529] page_type: 0xffffffff()
[ 141.996029] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 141.997030] raw: 00000000
[ 141.997466] page dumped because: kasan: bad access detected
[ 141.998151]
[ 141.998427] Memory state around the buggy address:
[ 141.998890] c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[ 141.999691] c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.000443] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 142.001241] ^
[ 142.001908] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.002630] c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.003333] ==================================================================
Home
[ 142.396886] ==================================================================
[ 142.398039] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[ 142.398801] Read of size 1 at addr c8fe7598 by task kunit_try_catch/197
[ 142.399408]
[ 142.399736] CPU: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.400774] Hardware name: Generic DT based system
[ 142.401428] unwind_backtrace from show_stack+0x18/0x1c
[ 142.402214] show_stack from dump_stack_lvl+0x58/0x70
[ 142.402946] dump_stack_lvl from print_report+0x164/0x51c
[ 142.403716] print_report from kasan_report+0xc8/0x104
[ 142.404467] kasan_report from memcmp+0x30/0xa0
[ 142.405230] memcmp from kasan_memcmp+0x100/0x210
[ 142.405937] kasan_memcmp from kunit_try_run_case+0x11c/0x2e4
[ 142.406758] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.407801] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.409109] kthread from ret_from_fork+0x14/0x30
[ 142.410575] Exception stack(0xfa0d3fb0 to 0xfa0d3ff8)
[ 142.411107] 3fa0: 00000000 00000000 00000000 00000000
[ 142.412025] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.412992] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.413732]
[ 142.414026] Allocated by task 197:
[ 142.414483] kasan_set_track+0x3c/0x5c
[ 142.415035] __kasan_kmalloc+0x8c/0x94
[ 142.415667] kasan_memcmp+0xb4/0x210
[ 142.416261] kunit_try_run_case+0x11c/0x2e4
[ 142.416972] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.417693] kthread+0x184/0x1a8
[ 142.418094] ret_from_fork+0x14/0x30
[ 142.418685]
[ 142.418925] The buggy address belongs to the object at c8fe7580
[ 142.418925] which belongs to the cache kmalloc-64 of size 64
[ 142.420262] The buggy address is located 0 bytes to the right of
[ 142.420262] allocated 24-byte region [c8fe7580, c8fe7598)
[ 142.421488]
[ 142.421745] The buggy address belongs to the physical page:
[ 142.422377] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.423375] flags: 0x800(slab|zone=0)
[ 142.423960] page_type: 0xffffffff()
[ 142.424689] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.425738] raw: 00000000
[ 142.426312] page dumped because: kasan: bad access detected
[ 142.426972]
[ 142.427705] Memory state around the buggy address:
[ 142.428353] c8fe7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.429017] c8fe7500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.429941] >c8fe7580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.430998] ^
[ 142.431738] c8fe7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.432611] c8fe7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.433357] ==================================================================
Home
[ 142.396886] ==================================================================
[ 142.398039] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[ 142.398801] Read of size 1 at addr c8fe7598 by task kunit_try_catch/197
[ 142.399408]
[ 142.399736] CPU: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.400774] Hardware name: Generic DT based system
[ 142.401428] unwind_backtrace from show_stack+0x18/0x1c
[ 142.402214] show_stack from dump_stack_lvl+0x58/0x70
[ 142.402946] dump_stack_lvl from print_report+0x164/0x51c
[ 142.403716] print_report from kasan_report+0xc8/0x104
[ 142.404467] kasan_report from memcmp+0x30/0xa0
[ 142.405230] memcmp from kasan_memcmp+0x100/0x210
[ 142.405937] kasan_memcmp from kunit_try_run_case+0x11c/0x2e4
[ 142.406758] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.407801] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.409109] kthread from ret_from_fork+0x14/0x30
[ 142.410575] Exception stack(0xfa0d3fb0 to 0xfa0d3ff8)
[ 142.411107] 3fa0: 00000000 00000000 00000000 00000000
[ 142.412025] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.412992] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.413732]
[ 142.414026] Allocated by task 197:
[ 142.414483] kasan_set_track+0x3c/0x5c
[ 142.415035] __kasan_kmalloc+0x8c/0x94
[ 142.415667] kasan_memcmp+0xb4/0x210
[ 142.416261] kunit_try_run_case+0x11c/0x2e4
[ 142.416972] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.417693] kthread+0x184/0x1a8
[ 142.418094] ret_from_fork+0x14/0x30
[ 142.418685]
[ 142.418925] The buggy address belongs to the object at c8fe7580
[ 142.418925] which belongs to the cache kmalloc-64 of size 64
[ 142.420262] The buggy address is located 0 bytes to the right of
[ 142.420262] allocated 24-byte region [c8fe7580, c8fe7598)
[ 142.421488]
[ 142.421745] The buggy address belongs to the physical page:
[ 142.422377] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[ 142.423375] flags: 0x800(slab|zone=0)
[ 142.423960] page_type: 0xffffffff()
[ 142.424689] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.425738] raw: 00000000
[ 142.426312] page dumped because: kasan: bad access detected
[ 142.426972]
[ 142.427705] Memory state around the buggy address:
[ 142.428353] c8fe7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.429017] c8fe7500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.429941] >c8fe7580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.430998] ^
[ 142.431738] c8fe7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.432611] c8fe7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.433357] ==================================================================
Home
[ 142.497279] ==================================================================
[ 142.498715] BUG: KASAN: slab-use-after-free in kasan_strings+0x170/0x4ec
[ 142.499487] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.500282]
[ 142.500608] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.501635] Hardware name: Generic DT based system
[ 142.502156] unwind_backtrace from show_stack+0x18/0x1c
[ 142.503005] show_stack from dump_stack_lvl+0x58/0x70
[ 142.503777] dump_stack_lvl from print_report+0x164/0x51c
[ 142.504600] print_report from kasan_report+0xc8/0x104
[ 142.505358] kasan_report from kasan_strings+0x170/0x4ec
[ 142.506109] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.506923] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.508049] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.509004] kthread from ret_from_fork+0x14/0x30
[ 142.509700] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.510446] bfa0: 00000000 00000000 00000000 00000000
[ 142.511427] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.512377] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.513251]
[ 142.513587] Allocated by task 199:
[ 142.514159] kasan_set_track+0x3c/0x5c
[ 142.514730] __kasan_kmalloc+0x8c/0x94
[ 142.515345] kasan_strings+0xa0/0x4ec
[ 142.515947] kunit_try_run_case+0x11c/0x2e4
[ 142.516594] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.517504] kthread+0x184/0x1a8
[ 142.517917] ret_from_fork+0x14/0x30
[ 142.518502]
[ 142.518750] Freed by task 199:
[ 142.519077] kasan_set_track+0x3c/0x5c
[ 142.520182] kasan_save_free_info+0x30/0x3c
[ 142.520785] __kasan_slab_free+0xdc/0x124
[ 142.521476] __kmem_cache_free+0x140/0x2a8
[ 142.522100] kasan_strings+0xbc/0x4ec
[ 142.522698] kunit_try_run_case+0x11c/0x2e4
[ 142.523354] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.524222] kthread+0x184/0x1a8
[ 142.524715] ret_from_fork+0x14/0x30
[ 142.525333]
[ 142.525685] The buggy address belongs to the object at c9008500
[ 142.525685] which belongs to the cache kmalloc-64 of size 64
[ 142.526997] The buggy address is located 16 bytes inside of
[ 142.526997] freed 64-byte region [c9008500, c9008540)
[ 142.528642]
[ 142.529022] The buggy address belongs to the physical page:
[ 142.529901] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.530878] flags: 0x800(slab|zone=0)
[ 142.531304] page_type: 0xffffffff()
[ 142.531786] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.532610] raw: 00000000
[ 142.533148] page dumped because: kasan: bad access detected
[ 142.533961]
[ 142.534182] Memory state around the buggy address:
[ 142.534827] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.535589] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.536304] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.537636] ^
[ 142.538257] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.538992] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.539705] ==================================================================
Home
[ 142.497279] ==================================================================
[ 142.498715] BUG: KASAN: slab-use-after-free in kasan_strings+0x170/0x4ec
[ 142.499487] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.500282]
[ 142.500608] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.501635] Hardware name: Generic DT based system
[ 142.502156] unwind_backtrace from show_stack+0x18/0x1c
[ 142.503005] show_stack from dump_stack_lvl+0x58/0x70
[ 142.503777] dump_stack_lvl from print_report+0x164/0x51c
[ 142.504600] print_report from kasan_report+0xc8/0x104
[ 142.505358] kasan_report from kasan_strings+0x170/0x4ec
[ 142.506109] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.506923] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.508049] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.509004] kthread from ret_from_fork+0x14/0x30
[ 142.509700] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.510446] bfa0: 00000000 00000000 00000000 00000000
[ 142.511427] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.512377] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.513251]
[ 142.513587] Allocated by task 199:
[ 142.514159] kasan_set_track+0x3c/0x5c
[ 142.514730] __kasan_kmalloc+0x8c/0x94
[ 142.515345] kasan_strings+0xa0/0x4ec
[ 142.515947] kunit_try_run_case+0x11c/0x2e4
[ 142.516594] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.517504] kthread+0x184/0x1a8
[ 142.517917] ret_from_fork+0x14/0x30
[ 142.518502]
[ 142.518750] Freed by task 199:
[ 142.519077] kasan_set_track+0x3c/0x5c
[ 142.520182] kasan_save_free_info+0x30/0x3c
[ 142.520785] __kasan_slab_free+0xdc/0x124
[ 142.521476] __kmem_cache_free+0x140/0x2a8
[ 142.522100] kasan_strings+0xbc/0x4ec
[ 142.522698] kunit_try_run_case+0x11c/0x2e4
[ 142.523354] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.524222] kthread+0x184/0x1a8
[ 142.524715] ret_from_fork+0x14/0x30
[ 142.525333]
[ 142.525685] The buggy address belongs to the object at c9008500
[ 142.525685] which belongs to the cache kmalloc-64 of size 64
[ 142.526997] The buggy address is located 16 bytes inside of
[ 142.526997] freed 64-byte region [c9008500, c9008540)
[ 142.528642]
[ 142.529022] The buggy address belongs to the physical page:
[ 142.529901] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.530878] flags: 0x800(slab|zone=0)
[ 142.531304] page_type: 0xffffffff()
[ 142.531786] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.532610] raw: 00000000
[ 142.533148] page dumped because: kasan: bad access detected
[ 142.533961]
[ 142.534182] Memory state around the buggy address:
[ 142.534827] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.535589] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.536304] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.537636] ^
[ 142.538257] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.538992] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.539705] ==================================================================
Home
[ 143.156682] ==================================================================
[ 143.158315] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd0/0x1cc
[ 143.159370] Read of size 1 at addr c8fe9a80 by task kunit_try_catch/205
[ 143.159892]
[ 143.160306] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.161821] Hardware name: Generic DT based system
[ 143.162517] unwind_backtrace from show_stack+0x18/0x1c
[ 143.163307] show_stack from dump_stack_lvl+0x58/0x70
[ 143.164205] dump_stack_lvl from print_report+0x164/0x51c
[ 143.164937] print_report from kasan_report+0xc8/0x104
[ 143.165727] kasan_report from __kasan_check_byte+0x34/0x3c
[ 143.166650] __kasan_check_byte from kfree_sensitive+0x20/0x6c
[ 143.167548] kfree_sensitive from kmalloc_double_kzfree+0xd0/0x1cc
[ 143.168345] kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[ 143.169300] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.170415] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.171302] kthread from ret_from_fork+0x14/0x30
[ 143.171883] Exception stack(0xfa103fb0 to 0xfa103ff8)
[ 143.172486] 3fa0: 00000000 00000000 00000000 00000000
[ 143.173476] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.174273] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.174863]
[ 143.175194] Allocated by task 205:
[ 143.175628] kasan_set_track+0x3c/0x5c
[ 143.176384] __kasan_kmalloc+0x8c/0x94
[ 143.177139] kmalloc_double_kzfree+0xa0/0x1cc
[ 143.177888] kunit_try_run_case+0x11c/0x2e4
[ 143.178500] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.179215] kthread+0x184/0x1a8
[ 143.179642] ret_from_fork+0x14/0x30
[ 143.180208]
[ 143.180437] Freed by task 205:
[ 143.180952] kasan_set_track+0x3c/0x5c
[ 143.181761] kasan_save_free_info+0x30/0x3c
[ 143.182430] __kasan_slab_free+0xdc/0x124
[ 143.183080] __kmem_cache_free+0x140/0x2a8
[ 143.183723] kmalloc_double_kzfree+0xbc/0x1cc
[ 143.184257] kunit_try_run_case+0x11c/0x2e4
[ 143.184910] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.185680] kthread+0x184/0x1a8
[ 143.186186] ret_from_fork+0x14/0x30
[ 143.186663]
[ 143.187023] The buggy address belongs to the object at c8fe9a80
[ 143.187023] which belongs to the cache kmalloc-64 of size 64
[ 143.188863] The buggy address is located 0 bytes inside of
[ 143.188863] freed 64-byte region [c8fe9a80, c8fe9ac0)
[ 143.190099]
[ 143.190412] The buggy address belongs to the physical page:
[ 143.191032] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[ 143.192285] flags: 0x800(slab|zone=0)
[ 143.192790] page_type: 0xffffffff()
[ 143.193378] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.194205] raw: 00000000
[ 143.194693] page dumped because: kasan: bad access detected
[ 143.195334]
[ 143.195566] Memory state around the buggy address:
[ 143.196164] c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.196941] c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.197590] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.199103] ^
[ 143.199479] c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.200214] c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.200892] ==================================================================
Home
[ 143.156682] ==================================================================
[ 143.158315] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd0/0x1cc
[ 143.159370] Read of size 1 at addr c8fe9a80 by task kunit_try_catch/205
[ 143.159892]
[ 143.160306] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.161821] Hardware name: Generic DT based system
[ 143.162517] unwind_backtrace from show_stack+0x18/0x1c
[ 143.163307] show_stack from dump_stack_lvl+0x58/0x70
[ 143.164205] dump_stack_lvl from print_report+0x164/0x51c
[ 143.164937] print_report from kasan_report+0xc8/0x104
[ 143.165727] kasan_report from __kasan_check_byte+0x34/0x3c
[ 143.166650] __kasan_check_byte from kfree_sensitive+0x20/0x6c
[ 143.167548] kfree_sensitive from kmalloc_double_kzfree+0xd0/0x1cc
[ 143.168345] kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[ 143.169300] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.170415] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.171302] kthread from ret_from_fork+0x14/0x30
[ 143.171883] Exception stack(0xfa103fb0 to 0xfa103ff8)
[ 143.172486] 3fa0: 00000000 00000000 00000000 00000000
[ 143.173476] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.174273] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.174863]
[ 143.175194] Allocated by task 205:
[ 143.175628] kasan_set_track+0x3c/0x5c
[ 143.176384] __kasan_kmalloc+0x8c/0x94
[ 143.177139] kmalloc_double_kzfree+0xa0/0x1cc
[ 143.177888] kunit_try_run_case+0x11c/0x2e4
[ 143.178500] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.179215] kthread+0x184/0x1a8
[ 143.179642] ret_from_fork+0x14/0x30
[ 143.180208]
[ 143.180437] Freed by task 205:
[ 143.180952] kasan_set_track+0x3c/0x5c
[ 143.181761] kasan_save_free_info+0x30/0x3c
[ 143.182430] __kasan_slab_free+0xdc/0x124
[ 143.183080] __kmem_cache_free+0x140/0x2a8
[ 143.183723] kmalloc_double_kzfree+0xbc/0x1cc
[ 143.184257] kunit_try_run_case+0x11c/0x2e4
[ 143.184910] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.185680] kthread+0x184/0x1a8
[ 143.186186] ret_from_fork+0x14/0x30
[ 143.186663]
[ 143.187023] The buggy address belongs to the object at c8fe9a80
[ 143.187023] which belongs to the cache kmalloc-64 of size 64
[ 143.188863] The buggy address is located 0 bytes inside of
[ 143.188863] freed 64-byte region [c8fe9a80, c8fe9ac0)
[ 143.190099]
[ 143.190412] The buggy address belongs to the physical page:
[ 143.191032] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[ 143.192285] flags: 0x800(slab|zone=0)
[ 143.192790] page_type: 0xffffffff()
[ 143.193378] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.194205] raw: 00000000
[ 143.194693] page dumped because: kasan: bad access detected
[ 143.195334]
[ 143.195566] Memory state around the buggy address:
[ 143.196164] c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.196941] c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.197590] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.199103] ^
[ 143.199479] c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.200214] c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.200892] ==================================================================
Home
[ 140.967601] ==================================================================
[ 140.968968] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd0/0x1d0
[ 140.969635] Read of size 1 at addr c4ce2008 by task kunit_try_catch/157
[ 140.970364]
[ 140.970662] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.971532] Hardware name: Generic DT based system
[ 140.972083] unwind_backtrace from show_stack+0x18/0x1c
[ 140.973030] show_stack from dump_stack_lvl+0x58/0x70
[ 140.973697] dump_stack_lvl from print_report+0x164/0x51c
[ 140.974542] print_report from kasan_report+0xc8/0x104
[ 140.975227] kasan_report from kmalloc_uaf+0xd0/0x1d0
[ 140.975890] kmalloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 140.976680] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.978331] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.979238] kthread from ret_from_fork+0x14/0x30
[ 140.979816] Exception stack(0xf9fdbfb0 to 0xf9fdbff8)
[ 140.980385] bfa0: 00000000 00000000 00000000 00000000
[ 140.981402] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.982340] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.983109]
[ 140.983489] Allocated by task 157:
[ 140.983839] kasan_set_track+0x3c/0x5c
[ 140.984536] __kasan_kmalloc+0x8c/0x94
[ 140.985158] kmalloc_uaf+0xa0/0x1d0
[ 140.985688] kunit_try_run_case+0x11c/0x2e4
[ 140.986317] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.987290] kthread+0x184/0x1a8
[ 140.987812] ret_from_fork+0x14/0x30
[ 140.988426]
[ 140.988763] Freed by task 157:
[ 140.989237] kasan_set_track+0x3c/0x5c
[ 140.989799] kasan_save_free_info+0x30/0x3c
[ 140.990560] __kasan_slab_free+0xdc/0x124
[ 140.991255] __kmem_cache_free+0x140/0x2a8
[ 140.991818] kmalloc_uaf+0xbc/0x1d0
[ 140.992341] kunit_try_run_case+0x11c/0x2e4
[ 140.992990] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.993832] kthread+0x184/0x1a8
[ 140.994330] ret_from_fork+0x14/0x30
[ 140.994925]
[ 140.995243] The buggy address belongs to the object at c4ce2000
[ 140.995243] which belongs to the cache kmalloc-64 of size 64
[ 140.996539] The buggy address is located 8 bytes inside of
[ 140.996539] freed 64-byte region [c4ce2000, c4ce2040)
[ 140.998172]
[ 140.998738] The buggy address belongs to the physical page:
[ 140.999476] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[ 141.000403] flags: 0x800(slab|zone=0)
[ 141.000992] page_type: 0xffffffff()
[ 141.001581] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 141.002595] raw: 00000000
[ 141.002968] page dumped because: kasan: bad access detected
[ 141.003659]
[ 141.004008] Memory state around the buggy address:
[ 141.004634] c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.005441] c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.006269] >c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.007222] ^
[ 141.007635] c4ce2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.008467] c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.009254] ==================================================================
[ 141.064051] ==================================================================
[ 141.065287] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[ 141.066009] Read of size 1 at addr c4ce2128 by task kunit_try_catch/161
[ 141.066749]
[ 141.066992] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.069085] Hardware name: Generic DT based system
[ 141.069853] unwind_backtrace from show_stack+0x18/0x1c
[ 141.070625] show_stack from dump_stack_lvl+0x58/0x70
[ 141.071338] dump_stack_lvl from print_report+0x164/0x51c
[ 141.072041] print_report from kasan_report+0xc8/0x104
[ 141.072748] kasan_report from kmalloc_uaf2+0x104/0x274
[ 141.073462] kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[ 141.074241] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.075182] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.076012] kthread from ret_from_fork+0x14/0x30
[ 141.076616] Exception stack(0xf9ffbfb0 to 0xf9ffbff8)
[ 141.077391] bfa0: 00000000 00000000 00000000 00000000
[ 141.078416] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.079020] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.079675]
[ 141.079901] Allocated by task 161:
[ 141.080439] kasan_set_track+0x3c/0x5c
[ 141.081024] __kasan_kmalloc+0x8c/0x94
[ 141.081692] kmalloc_uaf2+0xac/0x274
[ 141.082139] kunit_try_run_case+0x11c/0x2e4
[ 141.082704] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.083290] kthread+0x184/0x1a8
[ 141.083844] ret_from_fork+0x14/0x30
[ 141.084441]
[ 141.084671] Freed by task 161:
[ 141.085082] kasan_set_track+0x3c/0x5c
[ 141.085791] kasan_save_free_info+0x30/0x3c
[ 141.086436] __kasan_slab_free+0xdc/0x124
[ 141.086951] __kmem_cache_free+0x140/0x2a8
[ 141.087808] kmalloc_uaf2+0xc0/0x274
[ 141.088530] kunit_try_run_case+0x11c/0x2e4
[ 141.089043] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.089796] kthread+0x184/0x1a8
[ 141.090278] ret_from_fork+0x14/0x30
[ 141.090763]
[ 141.091030] The buggy address belongs to the object at c4ce2100
[ 141.091030] which belongs to the cache kmalloc-64 of size 64
[ 141.092215] The buggy address is located 40 bytes inside of
[ 141.092215] freed 64-byte region [c4ce2100, c4ce2140)
[ 141.093309]
[ 141.093605] The buggy address belongs to the physical page:
[ 141.094238] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[ 141.095046] flags: 0x800(slab|zone=0)
[ 141.095757] page_type: 0xffffffff()
[ 141.096438] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 141.097636] raw: 00000000
[ 141.098039] page dumped because: kasan: bad access detected
[ 141.099078]
[ 141.099332] Memory state around the buggy address:
[ 141.100155] c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.100811] c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.101747] >c4ce2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.102538] ^
[ 141.103103] c4ce2180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 141.103966] c4ce2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.104698] ==================================================================
[ 140.608741] ==================================================================
[ 140.609891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[ 140.610847] Read of size 16 at addr c4ce1f00 by task kunit_try_catch/141
[ 140.611488]
[ 140.611804] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.612733] Hardware name: Generic DT based system
[ 140.613305] unwind_backtrace from show_stack+0x18/0x1c
[ 140.614111] show_stack from dump_stack_lvl+0x58/0x70
[ 140.614824] dump_stack_lvl from print_report+0x164/0x51c
[ 140.615588] print_report from kasan_report+0xc8/0x104
[ 140.616336] kasan_report from kmalloc_uaf_16+0x100/0x240
[ 140.617166] kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[ 140.617905] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.619165] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.620000] kthread from ret_from_fork+0x14/0x30
[ 140.620695] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[ 140.621352] bfa0: 00000000 00000000 00000000 00000000
[ 140.622287] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.623273] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.624257]
[ 140.624560] Allocated by task 141:
[ 140.625004] kasan_set_track+0x3c/0x5c
[ 140.625683] __kasan_kmalloc+0x8c/0x94
[ 140.626230] kmalloc_uaf_16+0xc8/0x240
[ 140.626789] kunit_try_run_case+0x11c/0x2e4
[ 140.627608] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.628352] kthread+0x184/0x1a8
[ 140.628768] ret_from_fork+0x14/0x30
[ 140.629362]
[ 140.629603] Freed by task 141:
[ 140.630071] kasan_set_track+0x3c/0x5c
[ 140.630614] kasan_save_free_info+0x30/0x3c
[ 140.631235] __kasan_slab_free+0xdc/0x124
[ 140.631819] __kmem_cache_free+0x140/0x2a8
[ 140.632511] kmalloc_uaf_16+0xe4/0x240
[ 140.632996] kunit_try_run_case+0x11c/0x2e4
[ 140.633596] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.634482] kthread+0x184/0x1a8
[ 140.634890] ret_from_fork+0x14/0x30
[ 140.635503]
[ 140.635792] The buggy address belongs to the object at c4ce1f00
[ 140.635792] which belongs to the cache kmalloc-64 of size 64
[ 140.636970] The buggy address is located 0 bytes inside of
[ 140.636970] freed 64-byte region [c4ce1f00, c4ce1f40)
[ 140.638392]
[ 140.638656] The buggy address belongs to the physical page:
[ 140.639345] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 140.640043] flags: 0x800(slab|zone=0)
[ 140.640655] page_type: 0xffffffff()
[ 140.641235] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.641957] raw: 00000000
[ 140.642364] page dumped because: kasan: bad access detected
[ 140.643117]
[ 140.643360] Memory state around the buggy address:
[ 140.644018] c4ce1e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.644792] c4ce1e80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.645441] >c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.646366] ^
[ 140.646706] c4ce1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.647682] c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 140.648249] ==================================================================
Home
[ 140.608741] ==================================================================
[ 140.609891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[ 140.610847] Read of size 16 at addr c4ce1f00 by task kunit_try_catch/141
[ 140.611488]
[ 140.611804] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.612733] Hardware name: Generic DT based system
[ 140.613305] unwind_backtrace from show_stack+0x18/0x1c
[ 140.614111] show_stack from dump_stack_lvl+0x58/0x70
[ 140.614824] dump_stack_lvl from print_report+0x164/0x51c
[ 140.615588] print_report from kasan_report+0xc8/0x104
[ 140.616336] kasan_report from kmalloc_uaf_16+0x100/0x240
[ 140.617166] kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[ 140.617905] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.619165] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.620000] kthread from ret_from_fork+0x14/0x30
[ 140.620695] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[ 140.621352] bfa0: 00000000 00000000 00000000 00000000
[ 140.622287] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.623273] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.624257]
[ 140.624560] Allocated by task 141:
[ 140.625004] kasan_set_track+0x3c/0x5c
[ 140.625683] __kasan_kmalloc+0x8c/0x94
[ 140.626230] kmalloc_uaf_16+0xc8/0x240
[ 140.626789] kunit_try_run_case+0x11c/0x2e4
[ 140.627608] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.628352] kthread+0x184/0x1a8
[ 140.628768] ret_from_fork+0x14/0x30
[ 140.629362]
[ 140.629603] Freed by task 141:
[ 140.630071] kasan_set_track+0x3c/0x5c
[ 140.630614] kasan_save_free_info+0x30/0x3c
[ 140.631235] __kasan_slab_free+0xdc/0x124
[ 140.631819] __kmem_cache_free+0x140/0x2a8
[ 140.632511] kmalloc_uaf_16+0xe4/0x240
[ 140.632996] kunit_try_run_case+0x11c/0x2e4
[ 140.633596] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.634482] kthread+0x184/0x1a8
[ 140.634890] ret_from_fork+0x14/0x30
[ 140.635503]
[ 140.635792] The buggy address belongs to the object at c4ce1f00
[ 140.635792] which belongs to the cache kmalloc-64 of size 64
[ 140.636970] The buggy address is located 0 bytes inside of
[ 140.636970] freed 64-byte region [c4ce1f00, c4ce1f40)
[ 140.638392]
[ 140.638656] The buggy address belongs to the physical page:
[ 140.639345] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[ 140.640043] flags: 0x800(slab|zone=0)
[ 140.640655] page_type: 0xffffffff()
[ 140.641235] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 140.641957] raw: 00000000
[ 140.642364] page dumped because: kasan: bad access detected
[ 140.643117]
[ 140.643360] Memory state around the buggy address:
[ 140.644018] c4ce1e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.644792] c4ce1e80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.645441] >c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 140.646366] ^
[ 140.646706] c4ce1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.647682] c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 140.648249] ==================================================================
Home
[ 140.967601] ==================================================================
[ 140.968968] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd0/0x1d0
[ 140.969635] Read of size 1 at addr c4ce2008 by task kunit_try_catch/157
[ 140.970364]
[ 140.970662] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.971532] Hardware name: Generic DT based system
[ 140.972083] unwind_backtrace from show_stack+0x18/0x1c
[ 140.973030] show_stack from dump_stack_lvl+0x58/0x70
[ 140.973697] dump_stack_lvl from print_report+0x164/0x51c
[ 140.974542] print_report from kasan_report+0xc8/0x104
[ 140.975227] kasan_report from kmalloc_uaf+0xd0/0x1d0
[ 140.975890] kmalloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 140.976680] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.978331] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.979238] kthread from ret_from_fork+0x14/0x30
[ 140.979816] Exception stack(0xf9fdbfb0 to 0xf9fdbff8)
[ 140.980385] bfa0: 00000000 00000000 00000000 00000000
[ 140.981402] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.982340] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.983109]
[ 140.983489] Allocated by task 157:
[ 140.983839] kasan_set_track+0x3c/0x5c
[ 140.984536] __kasan_kmalloc+0x8c/0x94
[ 140.985158] kmalloc_uaf+0xa0/0x1d0
[ 140.985688] kunit_try_run_case+0x11c/0x2e4
[ 140.986317] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.987290] kthread+0x184/0x1a8
[ 140.987812] ret_from_fork+0x14/0x30
[ 140.988426]
[ 140.988763] Freed by task 157:
[ 140.989237] kasan_set_track+0x3c/0x5c
[ 140.989799] kasan_save_free_info+0x30/0x3c
[ 140.990560] __kasan_slab_free+0xdc/0x124
[ 140.991255] __kmem_cache_free+0x140/0x2a8
[ 140.991818] kmalloc_uaf+0xbc/0x1d0
[ 140.992341] kunit_try_run_case+0x11c/0x2e4
[ 140.992990] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.993832] kthread+0x184/0x1a8
[ 140.994330] ret_from_fork+0x14/0x30
[ 140.994925]
[ 140.995243] The buggy address belongs to the object at c4ce2000
[ 140.995243] which belongs to the cache kmalloc-64 of size 64
[ 140.996539] The buggy address is located 8 bytes inside of
[ 140.996539] freed 64-byte region [c4ce2000, c4ce2040)
[ 140.998172]
[ 140.998738] The buggy address belongs to the physical page:
[ 140.999476] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[ 141.000403] flags: 0x800(slab|zone=0)
[ 141.000992] page_type: 0xffffffff()
[ 141.001581] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 141.002595] raw: 00000000
[ 141.002968] page dumped because: kasan: bad access detected
[ 141.003659]
[ 141.004008] Memory state around the buggy address:
[ 141.004634] c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.005441] c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.006269] >c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.007222] ^
[ 141.007635] c4ce2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.008467] c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.009254] ==================================================================
Home
[ 141.064051] ==================================================================
[ 141.065287] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[ 141.066009] Read of size 1 at addr c4ce2128 by task kunit_try_catch/161
[ 141.066749]
[ 141.066992] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.069085] Hardware name: Generic DT based system
[ 141.069853] unwind_backtrace from show_stack+0x18/0x1c
[ 141.070625] show_stack from dump_stack_lvl+0x58/0x70
[ 141.071338] dump_stack_lvl from print_report+0x164/0x51c
[ 141.072041] print_report from kasan_report+0xc8/0x104
[ 141.072748] kasan_report from kmalloc_uaf2+0x104/0x274
[ 141.073462] kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[ 141.074241] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.075182] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.076012] kthread from ret_from_fork+0x14/0x30
[ 141.076616] Exception stack(0xf9ffbfb0 to 0xf9ffbff8)
[ 141.077391] bfa0: 00000000 00000000 00000000 00000000
[ 141.078416] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.079020] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.079675]
[ 141.079901] Allocated by task 161:
[ 141.080439] kasan_set_track+0x3c/0x5c
[ 141.081024] __kasan_kmalloc+0x8c/0x94
[ 141.081692] kmalloc_uaf2+0xac/0x274
[ 141.082139] kunit_try_run_case+0x11c/0x2e4
[ 141.082704] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.083290] kthread+0x184/0x1a8
[ 141.083844] ret_from_fork+0x14/0x30
[ 141.084441]
[ 141.084671] Freed by task 161:
[ 141.085082] kasan_set_track+0x3c/0x5c
[ 141.085791] kasan_save_free_info+0x30/0x3c
[ 141.086436] __kasan_slab_free+0xdc/0x124
[ 141.086951] __kmem_cache_free+0x140/0x2a8
[ 141.087808] kmalloc_uaf2+0xc0/0x274
[ 141.088530] kunit_try_run_case+0x11c/0x2e4
[ 141.089043] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.089796] kthread+0x184/0x1a8
[ 141.090278] ret_from_fork+0x14/0x30
[ 141.090763]
[ 141.091030] The buggy address belongs to the object at c4ce2100
[ 141.091030] which belongs to the cache kmalloc-64 of size 64
[ 141.092215] The buggy address is located 40 bytes inside of
[ 141.092215] freed 64-byte region [c4ce2100, c4ce2140)
[ 141.093309]
[ 141.093605] The buggy address belongs to the physical page:
[ 141.094238] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[ 141.095046] flags: 0x800(slab|zone=0)
[ 141.095757] page_type: 0xffffffff()
[ 141.096438] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 141.097636] raw: 00000000
[ 141.098039] page dumped because: kasan: bad access detected
[ 141.099078]
[ 141.099332] Memory state around the buggy address:
[ 141.100155] c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.100811] c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.101747] >c4ce2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.102538] ^
[ 141.103103] c4ce2180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 141.103966] c4ce2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.104698] ==================================================================
Home
[ 141.015804] ==================================================================
[ 141.016916] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd8/0x1d4
[ 141.018073] Write of size 33 at addr c4ce2080 by task kunit_try_catch/159
[ 141.018969]
[ 141.019308] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.020474] Hardware name: Generic DT based system
[ 141.021182] unwind_backtrace from show_stack+0x18/0x1c
[ 141.021883] show_stack from dump_stack_lvl+0x58/0x70
[ 141.022568] dump_stack_lvl from print_report+0x164/0x51c
[ 141.023414] print_report from kasan_report+0xc8/0x104
[ 141.024139] kasan_report from kasan_check_range+0x14c/0x198
[ 141.025001] kasan_check_range from __asan_memset+0x20/0x3c
[ 141.025853] __asan_memset from kmalloc_uaf_memset+0xd8/0x1d4
[ 141.026578] kmalloc_uaf_memset from kunit_try_run_case+0x11c/0x2e4
[ 141.027530] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.028433] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.029374] kthread from ret_from_fork+0x14/0x30
[ 141.029970] Exception stack(0xf9febfb0 to 0xf9febff8)
[ 141.030480] bfa0: 00000000 00000000 00000000 00000000
[ 141.031247] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.032185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.033025]
[ 141.033313] Allocated by task 159:
[ 141.033705] kasan_set_track+0x3c/0x5c
[ 141.034237] __kasan_kmalloc+0x8c/0x94
[ 141.034782] kmalloc_uaf_memset+0xa0/0x1d4
[ 141.035419] kunit_try_run_case+0x11c/0x2e4
[ 141.035967] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.036814] kthread+0x184/0x1a8
[ 141.037579] ret_from_fork+0x14/0x30
[ 141.038029]
[ 141.038316] Freed by task 159:
[ 141.038689] kasan_set_track+0x3c/0x5c
[ 141.039215] kasan_save_free_info+0x30/0x3c
[ 141.039724] __kasan_slab_free+0xdc/0x124
[ 141.040271] __kmem_cache_free+0x140/0x2a8
[ 141.041051] kmalloc_uaf_memset+0xbc/0x1d4
[ 141.041593] kunit_try_run_case+0x11c/0x2e4
[ 141.042066] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.042908] kthread+0x184/0x1a8
[ 141.043396] ret_from_fork+0x14/0x30
[ 141.043854]
[ 141.044163] The buggy address belongs to the object at c4ce2080
[ 141.044163] which belongs to the cache kmalloc-64 of size 64
[ 141.045358] The buggy address is located 0 bytes inside of
[ 141.045358] freed 64-byte region [c4ce2080, c4ce20c0)
[ 141.046535]
[ 141.046809] The buggy address belongs to the physical page:
[ 141.047393] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[ 141.048708] flags: 0x800(slab|zone=0)
[ 141.049209] page_type: 0xffffffff()
[ 141.049769] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 141.050529] raw: 00000000
[ 141.050972] page dumped because: kasan: bad access detected
[ 141.051680]
[ 141.051937] Memory state around the buggy address:
[ 141.052403] c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.053359] c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.054034] >c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.054875] ^
[ 141.055246] c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.055978] c4ce2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.056707] ==================================================================
Home
[ 141.015804] ==================================================================
[ 141.016916] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd8/0x1d4
[ 141.018073] Write of size 33 at addr c4ce2080 by task kunit_try_catch/159
[ 141.018969]
[ 141.019308] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.020474] Hardware name: Generic DT based system
[ 141.021182] unwind_backtrace from show_stack+0x18/0x1c
[ 141.021883] show_stack from dump_stack_lvl+0x58/0x70
[ 141.022568] dump_stack_lvl from print_report+0x164/0x51c
[ 141.023414] print_report from kasan_report+0xc8/0x104
[ 141.024139] kasan_report from kasan_check_range+0x14c/0x198
[ 141.025001] kasan_check_range from __asan_memset+0x20/0x3c
[ 141.025853] __asan_memset from kmalloc_uaf_memset+0xd8/0x1d4
[ 141.026578] kmalloc_uaf_memset from kunit_try_run_case+0x11c/0x2e4
[ 141.027530] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.028433] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.029374] kthread from ret_from_fork+0x14/0x30
[ 141.029970] Exception stack(0xf9febfb0 to 0xf9febff8)
[ 141.030480] bfa0: 00000000 00000000 00000000 00000000
[ 141.031247] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.032185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.033025]
[ 141.033313] Allocated by task 159:
[ 141.033705] kasan_set_track+0x3c/0x5c
[ 141.034237] __kasan_kmalloc+0x8c/0x94
[ 141.034782] kmalloc_uaf_memset+0xa0/0x1d4
[ 141.035419] kunit_try_run_case+0x11c/0x2e4
[ 141.035967] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.036814] kthread+0x184/0x1a8
[ 141.037579] ret_from_fork+0x14/0x30
[ 141.038029]
[ 141.038316] Freed by task 159:
[ 141.038689] kasan_set_track+0x3c/0x5c
[ 141.039215] kasan_save_free_info+0x30/0x3c
[ 141.039724] __kasan_slab_free+0xdc/0x124
[ 141.040271] __kmem_cache_free+0x140/0x2a8
[ 141.041051] kmalloc_uaf_memset+0xbc/0x1d4
[ 141.041593] kunit_try_run_case+0x11c/0x2e4
[ 141.042066] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.042908] kthread+0x184/0x1a8
[ 141.043396] ret_from_fork+0x14/0x30
[ 141.043854]
[ 141.044163] The buggy address belongs to the object at c4ce2080
[ 141.044163] which belongs to the cache kmalloc-64 of size 64
[ 141.045358] The buggy address is located 0 bytes inside of
[ 141.045358] freed 64-byte region [c4ce2080, c4ce20c0)
[ 141.046535]
[ 141.046809] The buggy address belongs to the physical page:
[ 141.047393] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[ 141.048708] flags: 0x800(slab|zone=0)
[ 141.049209] page_type: 0xffffffff()
[ 141.049769] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 141.050529] raw: 00000000
[ 141.050972] page dumped because: kasan: bad access detected
[ 141.051680]
[ 141.051937] Memory state around the buggy address:
[ 141.052403] c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.053359] c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.054034] >c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 141.054875] ^
[ 141.055246] c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.055978] c4ce2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 141.056707] ==================================================================
Home
[ 142.334354] ==================================================================
[ 142.335451] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1cc
[ 142.336316] Read of size 1 at addr c8fe5000 by task kunit_try_catch/193
[ 142.336919]
[ 142.337264] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.338952] Hardware name: Generic DT based system
[ 142.339739] unwind_backtrace from show_stack+0x18/0x1c
[ 142.340615] show_stack from dump_stack_lvl+0x58/0x70
[ 142.341283] dump_stack_lvl from print_report+0x164/0x51c
[ 142.342050] print_report from kasan_report+0xc8/0x104
[ 142.342723] kasan_report from __kasan_check_byte+0x34/0x3c
[ 142.343460] __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[ 142.344366] kmem_cache_destroy from kmem_cache_double_destroy+0xd0/0x1cc
[ 142.345291] kmem_cache_double_destroy from kunit_try_run_case+0x11c/0x2e4
[ 142.346177] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.347143] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.347995] kthread from ret_from_fork+0x14/0x30
[ 142.348605] Exception stack(0xfa0b3fb0 to 0xfa0b3ff8)
[ 142.349248] 3fa0: 00000000 00000000 00000000 00000000
[ 142.350195] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.351111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.351856]
[ 142.352095] Allocated by task 193:
[ 142.352564] kasan_set_track+0x3c/0x5c
[ 142.353084] __kasan_slab_alloc+0x60/0x68
[ 142.353723] kmem_cache_alloc+0x1dc/0x574
[ 142.354351] kmem_cache_create_usercopy+0x160/0x2a8
[ 142.355190] kmem_cache_create+0x28/0x30
[ 142.355944] kmem_cache_double_destroy+0xa0/0x1cc
[ 142.356722] kunit_try_run_case+0x11c/0x2e4
[ 142.357611] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.358907] kthread+0x184/0x1a8
[ 142.359404] ret_from_fork+0x14/0x30
[ 142.359919]
[ 142.360239] Freed by task 193:
[ 142.360637] kasan_set_track+0x3c/0x5c
[ 142.361204] kasan_save_free_info+0x30/0x3c
[ 142.361785] __kasan_slab_free+0xdc/0x124
[ 142.362382] kmem_cache_free+0x170/0x41c
[ 142.362891] kobject_put+0xfc/0x320
[ 142.363426] kmem_cache_double_destroy+0xbc/0x1cc
[ 142.364118] kunit_try_run_case+0x11c/0x2e4
[ 142.364634] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.365456] kthread+0x184/0x1a8
[ 142.365896] ret_from_fork+0x14/0x30
[ 142.366337]
[ 142.366632] The buggy address belongs to the object at c8fe5000
[ 142.366632] which belongs to the cache kmem_cache of size 132
[ 142.367775] The buggy address is located 0 bytes inside of
[ 142.367775] freed 132-byte region [c8fe5000, c8fe5084)
[ 142.368826]
[ 142.369141] The buggy address belongs to the physical page:
[ 142.369896] page:0aebde9c refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe5
[ 142.370756] flags: 0x800(slab|zone=0)
[ 142.371362] page_type: 0xffffffff()
[ 142.371790] raw: 00000800 c4801000 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.372712] raw: 00000000
[ 142.373029] page dumped because: kasan: bad access detected
[ 142.373761]
[ 142.374042] Memory state around the buggy address:
[ 142.374669] c8fe4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.375433] c8fe4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.376151] >c8fe5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.376830] ^
[ 142.377789] c8fe5080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.378538] c8fe5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.379302] ==================================================================
Home
[ 142.334354] ==================================================================
[ 142.335451] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1cc
[ 142.336316] Read of size 1 at addr c8fe5000 by task kunit_try_catch/193
[ 142.336919]
[ 142.337264] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.338952] Hardware name: Generic DT based system
[ 142.339739] unwind_backtrace from show_stack+0x18/0x1c
[ 142.340615] show_stack from dump_stack_lvl+0x58/0x70
[ 142.341283] dump_stack_lvl from print_report+0x164/0x51c
[ 142.342050] print_report from kasan_report+0xc8/0x104
[ 142.342723] kasan_report from __kasan_check_byte+0x34/0x3c
[ 142.343460] __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[ 142.344366] kmem_cache_destroy from kmem_cache_double_destroy+0xd0/0x1cc
[ 142.345291] kmem_cache_double_destroy from kunit_try_run_case+0x11c/0x2e4
[ 142.346177] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.347143] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.347995] kthread from ret_from_fork+0x14/0x30
[ 142.348605] Exception stack(0xfa0b3fb0 to 0xfa0b3ff8)
[ 142.349248] 3fa0: 00000000 00000000 00000000 00000000
[ 142.350195] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.351111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.351856]
[ 142.352095] Allocated by task 193:
[ 142.352564] kasan_set_track+0x3c/0x5c
[ 142.353084] __kasan_slab_alloc+0x60/0x68
[ 142.353723] kmem_cache_alloc+0x1dc/0x574
[ 142.354351] kmem_cache_create_usercopy+0x160/0x2a8
[ 142.355190] kmem_cache_create+0x28/0x30
[ 142.355944] kmem_cache_double_destroy+0xa0/0x1cc
[ 142.356722] kunit_try_run_case+0x11c/0x2e4
[ 142.357611] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.358907] kthread+0x184/0x1a8
[ 142.359404] ret_from_fork+0x14/0x30
[ 142.359919]
[ 142.360239] Freed by task 193:
[ 142.360637] kasan_set_track+0x3c/0x5c
[ 142.361204] kasan_save_free_info+0x30/0x3c
[ 142.361785] __kasan_slab_free+0xdc/0x124
[ 142.362382] kmem_cache_free+0x170/0x41c
[ 142.362891] kobject_put+0xfc/0x320
[ 142.363426] kmem_cache_double_destroy+0xbc/0x1cc
[ 142.364118] kunit_try_run_case+0x11c/0x2e4
[ 142.364634] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.365456] kthread+0x184/0x1a8
[ 142.365896] ret_from_fork+0x14/0x30
[ 142.366337]
[ 142.366632] The buggy address belongs to the object at c8fe5000
[ 142.366632] which belongs to the cache kmem_cache of size 132
[ 142.367775] The buggy address is located 0 bytes inside of
[ 142.367775] freed 132-byte region [c8fe5000, c8fe5084)
[ 142.368826]
[ 142.369141] The buggy address belongs to the physical page:
[ 142.369896] page:0aebde9c refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe5
[ 142.370756] flags: 0x800(slab|zone=0)
[ 142.371362] page_type: 0xffffffff()
[ 142.371790] raw: 00000800 c4801000 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.372712] raw: 00000000
[ 142.373029] page dumped because: kasan: bad access detected
[ 142.373761]
[ 142.374042] Memory state around the buggy address:
[ 142.374669] c8fe4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.375433] c8fe4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.376151] >c8fe5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.376830] ^
[ 142.377789] c8fe5080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.378538] c8fe5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.379302] ==================================================================
Home
[ 140.473571] ==================================================================
[ 140.474691] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2b8
[ 140.475346] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[ 140.476100]
[ 140.476388] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.477192] Hardware name: Generic DT based system
[ 140.477813] unwind_backtrace from show_stack+0x18/0x1c
[ 140.478440] show_stack from dump_stack_lvl+0x58/0x70
[ 140.479342] dump_stack_lvl from print_report+0x164/0x51c
[ 140.480034] print_report from kasan_report+0xc8/0x104
[ 140.480952] kasan_report from __kasan_check_byte+0x34/0x3c
[ 140.481742] __kasan_check_byte from krealloc+0x30/0x134
[ 140.482476] krealloc from krealloc_uaf+0xe4/0x2b8
[ 140.483176] krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 140.483898] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.484827] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.485695] kthread from ret_from_fork+0x14/0x30
[ 140.486292] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 140.486831] bfa0: 00000000 00000000 00000000 00000000
[ 140.488180] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.489320] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.489931]
[ 140.490239] Allocated by task 137:
[ 140.490722] kasan_set_track+0x3c/0x5c
[ 140.491205] __kasan_kmalloc+0x8c/0x94
[ 140.491912] krealloc_uaf+0xac/0x2b8
[ 140.492522] kunit_try_run_case+0x11c/0x2e4
[ 140.493063] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.493776] kthread+0x184/0x1a8
[ 140.494223] ret_from_fork+0x14/0x30
[ 140.494893]
[ 140.495204] Freed by task 137:
[ 140.495593] kasan_set_track+0x3c/0x5c
[ 140.496225] kasan_save_free_info+0x30/0x3c
[ 140.496779] __kasan_slab_free+0xdc/0x124
[ 140.497396] __kmem_cache_free+0x140/0x2a8
[ 140.497914] krealloc_uaf+0xc8/0x2b8
[ 140.498510] kunit_try_run_case+0x11c/0x2e4
[ 140.499062] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.499719] kthread+0x184/0x1a8
[ 140.500210] ret_from_fork+0x14/0x30
[ 140.500696]
[ 140.500991] The buggy address belongs to the object at c4d5e600
[ 140.500991] which belongs to the cache kmalloc-256 of size 256
[ 140.502295] The buggy address is located 0 bytes inside of
[ 140.502295] freed 256-byte region [c4d5e600, c4d5e700)
[ 140.503612]
[ 140.503860] The buggy address belongs to the physical page:
[ 140.504791] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.505650] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.506481] flags: 0x840(slab|head|zone=0)
[ 140.506948] page_type: 0xffffffff()
[ 140.507617] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.508950] raw: 00000000
[ 140.509283] page dumped because: kasan: bad access detected
[ 140.509797]
[ 140.510168] Memory state around the buggy address:
[ 140.510783] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.511475] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.512205] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.512932] ^
[ 140.513258] c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.514098] c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.514696] ==================================================================
[ 140.518209] ==================================================================
[ 140.518921] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x11c/0x2b8
[ 140.519610] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[ 140.520314]
[ 140.520575] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.521462] Hardware name: Generic DT based system
[ 140.522109] unwind_backtrace from show_stack+0x18/0x1c
[ 140.522780] show_stack from dump_stack_lvl+0x58/0x70
[ 140.523587] dump_stack_lvl from print_report+0x164/0x51c
[ 140.524220] print_report from kasan_report+0xc8/0x104
[ 140.524967] kasan_report from krealloc_uaf+0x11c/0x2b8
[ 140.525635] krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 140.526454] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.527800] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.528724] kthread from ret_from_fork+0x14/0x30
[ 140.529210] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 140.529895] bfa0: 00000000 00000000 00000000 00000000
[ 140.530792] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.531711] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.532415]
[ 140.532671] Allocated by task 137:
[ 140.533104] kasan_set_track+0x3c/0x5c
[ 140.533608] __kasan_kmalloc+0x8c/0x94
[ 140.534482] krealloc_uaf+0xac/0x2b8
[ 140.535110] kunit_try_run_case+0x11c/0x2e4
[ 140.535769] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.536632] kthread+0x184/0x1a8
[ 140.537238] ret_from_fork+0x14/0x30
[ 140.537788]
[ 140.538055] Freed by task 137:
[ 140.538382] kasan_set_track+0x3c/0x5c
[ 140.539041] kasan_save_free_info+0x30/0x3c
[ 140.539679] __kasan_slab_free+0xdc/0x124
[ 140.540371] __kmem_cache_free+0x140/0x2a8
[ 140.541041] krealloc_uaf+0xc8/0x2b8
[ 140.541676] kunit_try_run_case+0x11c/0x2e4
[ 140.542318] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.543066] kthread+0x184/0x1a8
[ 140.543548] ret_from_fork+0x14/0x30
[ 140.544076]
[ 140.544445] The buggy address belongs to the object at c4d5e600
[ 140.544445] which belongs to the cache kmalloc-256 of size 256
[ 140.545842] The buggy address is located 0 bytes inside of
[ 140.545842] freed 256-byte region [c4d5e600, c4d5e700)
[ 140.547097]
[ 140.547447] The buggy address belongs to the physical page:
[ 140.548368] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.549454] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.550433] flags: 0x840(slab|head|zone=0)
[ 140.551082] page_type: 0xffffffff()
[ 140.551786] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.552629] raw: 00000000
[ 140.552998] page dumped because: kasan: bad access detected
[ 140.553595]
[ 140.553828] Memory state around the buggy address:
[ 140.554353] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.555076] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.555845] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.556601] ^
[ 140.556914] c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.557643] c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.558305] ==================================================================
Home
[ 140.473571] ==================================================================
[ 140.474691] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2b8
[ 140.475346] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[ 140.476100]
[ 140.476388] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.477192] Hardware name: Generic DT based system
[ 140.477813] unwind_backtrace from show_stack+0x18/0x1c
[ 140.478440] show_stack from dump_stack_lvl+0x58/0x70
[ 140.479342] dump_stack_lvl from print_report+0x164/0x51c
[ 140.480034] print_report from kasan_report+0xc8/0x104
[ 140.480952] kasan_report from __kasan_check_byte+0x34/0x3c
[ 140.481742] __kasan_check_byte from krealloc+0x30/0x134
[ 140.482476] krealloc from krealloc_uaf+0xe4/0x2b8
[ 140.483176] krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 140.483898] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.484827] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.485695] kthread from ret_from_fork+0x14/0x30
[ 140.486292] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 140.486831] bfa0: 00000000 00000000 00000000 00000000
[ 140.488180] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.489320] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.489931]
[ 140.490239] Allocated by task 137:
[ 140.490722] kasan_set_track+0x3c/0x5c
[ 140.491205] __kasan_kmalloc+0x8c/0x94
[ 140.491912] krealloc_uaf+0xac/0x2b8
[ 140.492522] kunit_try_run_case+0x11c/0x2e4
[ 140.493063] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.493776] kthread+0x184/0x1a8
[ 140.494223] ret_from_fork+0x14/0x30
[ 140.494893]
[ 140.495204] Freed by task 137:
[ 140.495593] kasan_set_track+0x3c/0x5c
[ 140.496225] kasan_save_free_info+0x30/0x3c
[ 140.496779] __kasan_slab_free+0xdc/0x124
[ 140.497396] __kmem_cache_free+0x140/0x2a8
[ 140.497914] krealloc_uaf+0xc8/0x2b8
[ 140.498510] kunit_try_run_case+0x11c/0x2e4
[ 140.499062] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.499719] kthread+0x184/0x1a8
[ 140.500210] ret_from_fork+0x14/0x30
[ 140.500696]
[ 140.500991] The buggy address belongs to the object at c4d5e600
[ 140.500991] which belongs to the cache kmalloc-256 of size 256
[ 140.502295] The buggy address is located 0 bytes inside of
[ 140.502295] freed 256-byte region [c4d5e600, c4d5e700)
[ 140.503612]
[ 140.503860] The buggy address belongs to the physical page:
[ 140.504791] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.505650] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.506481] flags: 0x840(slab|head|zone=0)
[ 140.506948] page_type: 0xffffffff()
[ 140.507617] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.508950] raw: 00000000
[ 140.509283] page dumped because: kasan: bad access detected
[ 140.509797]
[ 140.510168] Memory state around the buggy address:
[ 140.510783] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.511475] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.512205] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.512932] ^
[ 140.513258] c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.514098] c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.514696] ==================================================================
Home
[ 140.518209] ==================================================================
[ 140.518921] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x11c/0x2b8
[ 140.519610] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[ 140.520314]
[ 140.520575] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 140.521462] Hardware name: Generic DT based system
[ 140.522109] unwind_backtrace from show_stack+0x18/0x1c
[ 140.522780] show_stack from dump_stack_lvl+0x58/0x70
[ 140.523587] dump_stack_lvl from print_report+0x164/0x51c
[ 140.524220] print_report from kasan_report+0xc8/0x104
[ 140.524967] kasan_report from krealloc_uaf+0x11c/0x2b8
[ 140.525635] krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 140.526454] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.527800] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 140.528724] kthread from ret_from_fork+0x14/0x30
[ 140.529210] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 140.529895] bfa0: 00000000 00000000 00000000 00000000
[ 140.530792] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 140.531711] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 140.532415]
[ 140.532671] Allocated by task 137:
[ 140.533104] kasan_set_track+0x3c/0x5c
[ 140.533608] __kasan_kmalloc+0x8c/0x94
[ 140.534482] krealloc_uaf+0xac/0x2b8
[ 140.535110] kunit_try_run_case+0x11c/0x2e4
[ 140.535769] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.536632] kthread+0x184/0x1a8
[ 140.537238] ret_from_fork+0x14/0x30
[ 140.537788]
[ 140.538055] Freed by task 137:
[ 140.538382] kasan_set_track+0x3c/0x5c
[ 140.539041] kasan_save_free_info+0x30/0x3c
[ 140.539679] __kasan_slab_free+0xdc/0x124
[ 140.540371] __kmem_cache_free+0x140/0x2a8
[ 140.541041] krealloc_uaf+0xc8/0x2b8
[ 140.541676] kunit_try_run_case+0x11c/0x2e4
[ 140.542318] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 140.543066] kthread+0x184/0x1a8
[ 140.543548] ret_from_fork+0x14/0x30
[ 140.544076]
[ 140.544445] The buggy address belongs to the object at c4d5e600
[ 140.544445] which belongs to the cache kmalloc-256 of size 256
[ 140.545842] The buggy address is located 0 bytes inside of
[ 140.545842] freed 256-byte region [c4d5e600, c4d5e700)
[ 140.547097]
[ 140.547447] The buggy address belongs to the physical page:
[ 140.548368] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[ 140.549454] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 140.550433] flags: 0x840(slab|head|zone=0)
[ 140.551082] page_type: 0xffffffff()
[ 140.551786] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 140.552629] raw: 00000000
[ 140.552998] page dumped because: kasan: bad access detected
[ 140.553595]
[ 140.553828] Memory state around the buggy address:
[ 140.554353] c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.555076] c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.555845] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.556601] ^
[ 140.556914] c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 140.557643] c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 140.558305] ==================================================================
Home
[ 142.124787] ==================================================================
[ 142.125413] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[ 142.126401] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[ 142.127802]
[ 142.128168] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.129159] Hardware name: Generic DT based system
[ 142.129743] unwind_backtrace from show_stack+0x18/0x1c
[ 142.130452] show_stack from dump_stack_lvl+0x58/0x70
[ 142.131193] dump_stack_lvl from print_report+0x164/0x51c
[ 142.132167] print_report from kasan_report+0xc8/0x104
[ 142.132949] kasan_report from ksize_uaf+0xfc/0x308
[ 142.133669] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 142.134536] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.135522] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.136376] kthread from ret_from_fork+0x14/0x30
[ 142.137224] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[ 142.137792] bfa0: 00000000 00000000 00000000 00000000
[ 142.138706] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.139966] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.140717]
[ 142.140958] Allocated by task 187:
[ 142.141406] kasan_set_track+0x3c/0x5c
[ 142.141939] __kasan_kmalloc+0x8c/0x94
[ 142.142570] ksize_uaf+0xa0/0x308
[ 142.143022] kunit_try_run_case+0x11c/0x2e4
[ 142.143615] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.144323] kthread+0x184/0x1a8
[ 142.144739] ret_from_fork+0x14/0x30
[ 142.145233]
[ 142.145526] Freed by task 187:
[ 142.146046] kasan_set_track+0x3c/0x5c
[ 142.146578] kasan_save_free_info+0x30/0x3c
[ 142.147346] __kasan_slab_free+0xdc/0x124
[ 142.148490] __kmem_cache_free+0x140/0x2a8
[ 142.149164] ksize_uaf+0xbc/0x308
[ 142.149585] kunit_try_run_case+0x11c/0x2e4
[ 142.150206] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.151007] kthread+0x184/0x1a8
[ 142.151542] ret_from_fork+0x14/0x30
[ 142.151964]
[ 142.152318] The buggy address belongs to the object at c8e0b700
[ 142.152318] which belongs to the cache kmalloc-128 of size 128
[ 142.153524] The buggy address is located 0 bytes inside of
[ 142.153524] freed 128-byte region [c8e0b700, c8e0b780)
[ 142.154621]
[ 142.154916] The buggy address belongs to the physical page:
[ 142.155532] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.156318] flags: 0x800(slab|zone=0)
[ 142.156889] page_type: 0xffffffff()
[ 142.157323] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.158843] raw: 00000000
[ 142.159318] page dumped because: kasan: bad access detected
[ 142.160202]
[ 142.160450] Memory state around the buggy address:
[ 142.160891] c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.161572] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.162338] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.162939] ^
[ 142.163398] c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.164021] c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.164800] ==================================================================
[ 142.081937] ==================================================================
[ 142.082973] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[ 142.083683] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[ 142.084405]
[ 142.084747] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.085557] Hardware name: Generic DT based system
[ 142.086222] unwind_backtrace from show_stack+0x18/0x1c
[ 142.086867] show_stack from dump_stack_lvl+0x58/0x70
[ 142.087575] dump_stack_lvl from print_report+0x164/0x51c
[ 142.088591] print_report from kasan_report+0xc8/0x104
[ 142.089314] kasan_report from __kasan_check_byte+0x34/0x3c
[ 142.089988] __kasan_check_byte from ksize+0x20/0x3c
[ 142.090942] ksize from ksize_uaf+0xd0/0x308
[ 142.091664] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 142.092394] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.093448] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.094303] kthread from ret_from_fork+0x14/0x30
[ 142.094974] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[ 142.095592] bfa0: 00000000 00000000 00000000 00000000
[ 142.096498] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.097701] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.098226]
[ 142.098418] Allocated by task 187:
[ 142.098723] kasan_set_track+0x3c/0x5c
[ 142.099114] __kasan_kmalloc+0x8c/0x94
[ 142.100274] ksize_uaf+0xa0/0x308
[ 142.100848] kunit_try_run_case+0x11c/0x2e4
[ 142.101515] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.102395] kthread+0x184/0x1a8
[ 142.102820] ret_from_fork+0x14/0x30
[ 142.103232]
[ 142.103440] Freed by task 187:
[ 142.103977] kasan_set_track+0x3c/0x5c
[ 142.104750] kasan_save_free_info+0x30/0x3c
[ 142.105440] __kasan_slab_free+0xdc/0x124
[ 142.105971] __kmem_cache_free+0x140/0x2a8
[ 142.106443] ksize_uaf+0xbc/0x308
[ 142.107651] kunit_try_run_case+0x11c/0x2e4
[ 142.108213] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.108918] kthread+0x184/0x1a8
[ 142.109333] ret_from_fork+0x14/0x30
[ 142.109881]
[ 142.110107] The buggy address belongs to the object at c8e0b700
[ 142.110107] which belongs to the cache kmalloc-128 of size 128
[ 142.111710] The buggy address is located 0 bytes inside of
[ 142.111710] freed 128-byte region [c8e0b700, c8e0b780)
[ 142.113009]
[ 142.113289] The buggy address belongs to the physical page:
[ 142.113853] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.114803] flags: 0x800(slab|zone=0)
[ 142.115353] page_type: 0xffffffff()
[ 142.115899] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.116910] raw: 00000000
[ 142.117357] page dumped because: kasan: bad access detected
[ 142.118154]
[ 142.118356] Memory state around the buggy address:
[ 142.119253] c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.120089] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.120830] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.121537] ^
[ 142.121931] c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.122682] c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.123632] ==================================================================
[ 142.165980] ==================================================================
[ 142.166667] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[ 142.167374] Read of size 1 at addr c8e0b778 by task kunit_try_catch/187
[ 142.168411]
[ 142.168652] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.169362] Hardware name: Generic DT based system
[ 142.170698] unwind_backtrace from show_stack+0x18/0x1c
[ 142.171602] show_stack from dump_stack_lvl+0x58/0x70
[ 142.172660] dump_stack_lvl from print_report+0x164/0x51c
[ 142.173389] print_report from kasan_report+0xc8/0x104
[ 142.174073] kasan_report from ksize_uaf+0x12c/0x308
[ 142.174806] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 142.175585] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.176520] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.177596] kthread from ret_from_fork+0x14/0x30
[ 142.178185] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[ 142.178706] bfa0: 00000000 00000000 00000000 00000000
[ 142.179989] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.180891] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.181549]
[ 142.181860] Allocated by task 187:
[ 142.182245] kasan_set_track+0x3c/0x5c
[ 142.182833] __kasan_kmalloc+0x8c/0x94
[ 142.183434] ksize_uaf+0xa0/0x308
[ 142.183964] kunit_try_run_case+0x11c/0x2e4
[ 142.184607] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.185347] kthread+0x184/0x1a8
[ 142.185753] ret_from_fork+0x14/0x30
[ 142.186314]
[ 142.186570] Freed by task 187:
[ 142.186892] kasan_set_track+0x3c/0x5c
[ 142.188170] kasan_save_free_info+0x30/0x3c
[ 142.188730] __kasan_slab_free+0xdc/0x124
[ 142.189372] __kmem_cache_free+0x140/0x2a8
[ 142.189902] ksize_uaf+0xbc/0x308
[ 142.190361] kunit_try_run_case+0x11c/0x2e4
[ 142.191056] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.191622] kthread+0x184/0x1a8
[ 142.192162] ret_from_fork+0x14/0x30
[ 142.192779]
[ 142.193004] The buggy address belongs to the object at c8e0b700
[ 142.193004] which belongs to the cache kmalloc-128 of size 128
[ 142.194268] The buggy address is located 120 bytes inside of
[ 142.194268] freed 128-byte region [c8e0b700, c8e0b780)
[ 142.195430]
[ 142.195748] The buggy address belongs to the physical page:
[ 142.196341] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.197655] flags: 0x800(slab|zone=0)
[ 142.198145] page_type: 0xffffffff()
[ 142.198702] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.199629] raw: 00000000
[ 142.200069] page dumped because: kasan: bad access detected
[ 142.201040]
[ 142.201419] Memory state around the buggy address:
[ 142.201881] c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.202675] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.203444] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.204163] ^
[ 142.204804] c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.205611] c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.206220] ==================================================================
Home
[ 142.165980] ==================================================================
[ 142.166667] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[ 142.167374] Read of size 1 at addr c8e0b778 by task kunit_try_catch/187
[ 142.168411]
[ 142.168652] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.169362] Hardware name: Generic DT based system
[ 142.170698] unwind_backtrace from show_stack+0x18/0x1c
[ 142.171602] show_stack from dump_stack_lvl+0x58/0x70
[ 142.172660] dump_stack_lvl from print_report+0x164/0x51c
[ 142.173389] print_report from kasan_report+0xc8/0x104
[ 142.174073] kasan_report from ksize_uaf+0x12c/0x308
[ 142.174806] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 142.175585] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.176520] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.177596] kthread from ret_from_fork+0x14/0x30
[ 142.178185] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[ 142.178706] bfa0: 00000000 00000000 00000000 00000000
[ 142.179989] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.180891] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.181549]
[ 142.181860] Allocated by task 187:
[ 142.182245] kasan_set_track+0x3c/0x5c
[ 142.182833] __kasan_kmalloc+0x8c/0x94
[ 142.183434] ksize_uaf+0xa0/0x308
[ 142.183964] kunit_try_run_case+0x11c/0x2e4
[ 142.184607] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.185347] kthread+0x184/0x1a8
[ 142.185753] ret_from_fork+0x14/0x30
[ 142.186314]
[ 142.186570] Freed by task 187:
[ 142.186892] kasan_set_track+0x3c/0x5c
[ 142.188170] kasan_save_free_info+0x30/0x3c
[ 142.188730] __kasan_slab_free+0xdc/0x124
[ 142.189372] __kmem_cache_free+0x140/0x2a8
[ 142.189902] ksize_uaf+0xbc/0x308
[ 142.190361] kunit_try_run_case+0x11c/0x2e4
[ 142.191056] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.191622] kthread+0x184/0x1a8
[ 142.192162] ret_from_fork+0x14/0x30
[ 142.192779]
[ 142.193004] The buggy address belongs to the object at c8e0b700
[ 142.193004] which belongs to the cache kmalloc-128 of size 128
[ 142.194268] The buggy address is located 120 bytes inside of
[ 142.194268] freed 128-byte region [c8e0b700, c8e0b780)
[ 142.195430]
[ 142.195748] The buggy address belongs to the physical page:
[ 142.196341] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.197655] flags: 0x800(slab|zone=0)
[ 142.198145] page_type: 0xffffffff()
[ 142.198702] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.199629] raw: 00000000
[ 142.200069] page dumped because: kasan: bad access detected
[ 142.201040]
[ 142.201419] Memory state around the buggy address:
[ 142.201881] c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.202675] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.203444] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.204163] ^
[ 142.204804] c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.205611] c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.206220] ==================================================================
Home
[ 142.081937] ==================================================================
[ 142.082973] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[ 142.083683] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[ 142.084405]
[ 142.084747] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.085557] Hardware name: Generic DT based system
[ 142.086222] unwind_backtrace from show_stack+0x18/0x1c
[ 142.086867] show_stack from dump_stack_lvl+0x58/0x70
[ 142.087575] dump_stack_lvl from print_report+0x164/0x51c
[ 142.088591] print_report from kasan_report+0xc8/0x104
[ 142.089314] kasan_report from __kasan_check_byte+0x34/0x3c
[ 142.089988] __kasan_check_byte from ksize+0x20/0x3c
[ 142.090942] ksize from ksize_uaf+0xd0/0x308
[ 142.091664] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 142.092394] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.093448] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.094303] kthread from ret_from_fork+0x14/0x30
[ 142.094974] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[ 142.095592] bfa0: 00000000 00000000 00000000 00000000
[ 142.096498] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.097701] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.098226]
[ 142.098418] Allocated by task 187:
[ 142.098723] kasan_set_track+0x3c/0x5c
[ 142.099114] __kasan_kmalloc+0x8c/0x94
[ 142.100274] ksize_uaf+0xa0/0x308
[ 142.100848] kunit_try_run_case+0x11c/0x2e4
[ 142.101515] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.102395] kthread+0x184/0x1a8
[ 142.102820] ret_from_fork+0x14/0x30
[ 142.103232]
[ 142.103440] Freed by task 187:
[ 142.103977] kasan_set_track+0x3c/0x5c
[ 142.104750] kasan_save_free_info+0x30/0x3c
[ 142.105440] __kasan_slab_free+0xdc/0x124
[ 142.105971] __kmem_cache_free+0x140/0x2a8
[ 142.106443] ksize_uaf+0xbc/0x308
[ 142.107651] kunit_try_run_case+0x11c/0x2e4
[ 142.108213] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.108918] kthread+0x184/0x1a8
[ 142.109333] ret_from_fork+0x14/0x30
[ 142.109881]
[ 142.110107] The buggy address belongs to the object at c8e0b700
[ 142.110107] which belongs to the cache kmalloc-128 of size 128
[ 142.111710] The buggy address is located 0 bytes inside of
[ 142.111710] freed 128-byte region [c8e0b700, c8e0b780)
[ 142.113009]
[ 142.113289] The buggy address belongs to the physical page:
[ 142.113853] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.114803] flags: 0x800(slab|zone=0)
[ 142.115353] page_type: 0xffffffff()
[ 142.115899] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.116910] raw: 00000000
[ 142.117357] page dumped because: kasan: bad access detected
[ 142.118154]
[ 142.118356] Memory state around the buggy address:
[ 142.119253] c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.120089] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.120830] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.121537] ^
[ 142.121931] c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.122682] c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.123632] ==================================================================
Home
[ 142.124787] ==================================================================
[ 142.125413] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[ 142.126401] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[ 142.127802]
[ 142.128168] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.129159] Hardware name: Generic DT based system
[ 142.129743] unwind_backtrace from show_stack+0x18/0x1c
[ 142.130452] show_stack from dump_stack_lvl+0x58/0x70
[ 142.131193] dump_stack_lvl from print_report+0x164/0x51c
[ 142.132167] print_report from kasan_report+0xc8/0x104
[ 142.132949] kasan_report from ksize_uaf+0xfc/0x308
[ 142.133669] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 142.134536] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.135522] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.136376] kthread from ret_from_fork+0x14/0x30
[ 142.137224] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[ 142.137792] bfa0: 00000000 00000000 00000000 00000000
[ 142.138706] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.139966] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.140717]
[ 142.140958] Allocated by task 187:
[ 142.141406] kasan_set_track+0x3c/0x5c
[ 142.141939] __kasan_kmalloc+0x8c/0x94
[ 142.142570] ksize_uaf+0xa0/0x308
[ 142.143022] kunit_try_run_case+0x11c/0x2e4
[ 142.143615] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.144323] kthread+0x184/0x1a8
[ 142.144739] ret_from_fork+0x14/0x30
[ 142.145233]
[ 142.145526] Freed by task 187:
[ 142.146046] kasan_set_track+0x3c/0x5c
[ 142.146578] kasan_save_free_info+0x30/0x3c
[ 142.147346] __kasan_slab_free+0xdc/0x124
[ 142.148490] __kmem_cache_free+0x140/0x2a8
[ 142.149164] ksize_uaf+0xbc/0x308
[ 142.149585] kunit_try_run_case+0x11c/0x2e4
[ 142.150206] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.151007] kthread+0x184/0x1a8
[ 142.151542] ret_from_fork+0x14/0x30
[ 142.151964]
[ 142.152318] The buggy address belongs to the object at c8e0b700
[ 142.152318] which belongs to the cache kmalloc-128 of size 128
[ 142.153524] The buggy address is located 0 bytes inside of
[ 142.153524] freed 128-byte region [c8e0b700, c8e0b780)
[ 142.154621]
[ 142.154916] The buggy address belongs to the physical page:
[ 142.155532] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[ 142.156318] flags: 0x800(slab|zone=0)
[ 142.156889] page_type: 0xffffffff()
[ 142.157323] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 142.158843] raw: 00000000
[ 142.159318] page dumped because: kasan: bad access detected
[ 142.160202]
[ 142.160450] Memory state around the buggy address:
[ 142.160891] c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.161572] c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.162338] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 142.162939] ^
[ 142.163398] c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.164021] c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.164800] ==================================================================
Home
[ 143.277876] ==================================================================
[ 143.278950] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x24/0x2c
[ 143.279853] Read of size 4 at addr c8fe9d00 by task swapper/0/0
[ 143.280433]
[ 143.280753] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.6.72-rc1 #1
[ 143.281458] Hardware name: Generic DT based system
[ 143.282094] unwind_backtrace from show_stack+0x18/0x1c
[ 143.282704] show_stack from dump_stack_lvl+0x58/0x70
[ 143.283542] dump_stack_lvl from print_report+0x164/0x51c
[ 143.284272] print_report from kasan_report+0xc8/0x104
[ 143.285063] kasan_report from rcu_uaf_reclaim+0x24/0x2c
[ 143.285768] rcu_uaf_reclaim from rcu_core+0x418/0xc84
[ 143.286415] rcu_core from handle_softirqs+0x23c/0x5fc
[ 143.287084] handle_softirqs from irq_exit+0xec/0x138
[ 143.287874] irq_exit from __irq_svc+0x78/0x9c
[ 143.288943] Exception stack(0xc3603ec0 to 0xc3603f08)
[ 143.289907] 3ec0: e7b62fd0 00000000 e7b62fd0 00000000 c3614a00 c360bf60 00000000 c360bfbc
[ 143.290808] 3ee0: b76c07e4 00000000 00000000 c3603f80 00000000 c3603f10 c04dc04c c04d367c
[ 143.292033] 3f00: 60000013 ffffffff
[ 143.292474] __irq_svc from arch_local_irq_enable+0x4/0x8
[ 143.293107] arch_local_irq_enable from do_idle+0x2d8/0x380
[ 143.293896] do_idle from cpu_startup_entry+0x38/0x3c
[ 143.294621] cpu_startup_entry from rest_init+0xdc/0xe0
[ 143.295338] rest_init from arch_post_acpi_subsys_init+0x0/0x18
[ 143.296206]
[ 143.296492] Allocated by task 207:
[ 143.296885] kasan_set_track+0x3c/0x5c
[ 143.297432] __kasan_kmalloc+0x8c/0x94
[ 143.298033] rcu_uaf+0xa0/0x1dc
[ 143.298497] kunit_try_run_case+0x11c/0x2e4
[ 143.298996] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.299787] kthread+0x184/0x1a8
[ 143.300244] ret_from_fork+0x14/0x30
[ 143.300886]
[ 143.301116] Freed by task 0:
[ 143.301519] kasan_set_track+0x3c/0x5c
[ 143.301985] kasan_save_free_info+0x30/0x3c
[ 143.302715] __kasan_slab_free+0xdc/0x124
[ 143.303182] __kmem_cache_free+0x140/0x2a8
[ 143.303898] rcu_uaf_reclaim+0x1c/0x2c
[ 143.304357] rcu_core+0x418/0xc84
[ 143.304974] handle_softirqs+0x23c/0x5fc
[ 143.305520] irq_exit+0xec/0x138
[ 143.306114] __irq_svc+0x78/0x9c
[ 143.306511] arch_local_irq_enable+0x4/0x8
[ 143.307156] do_idle+0x2d8/0x380
[ 143.308368] cpu_startup_entry+0x38/0x3c
[ 143.308909] rest_init+0xdc/0xe0
[ 143.309412] arch_post_acpi_subsys_init+0x0/0x18
[ 143.309986]
[ 143.310364] Last potentially related work creation:
[ 143.310840] kasan_save_stack+0x30/0x4c
[ 143.311468] __kasan_record_aux_stack+0x84/0x8c
[ 143.312158] __call_rcu_common.constprop.0+0x44/0x59c
[ 143.312959] rcu_uaf+0xdc/0x1dc
[ 143.313443] kunit_try_run_case+0x11c/0x2e4
[ 143.313983] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.314690] kthread+0x184/0x1a8
[ 143.315118] ret_from_fork+0x14/0x30
[ 143.315744]
[ 143.315994] The buggy address belongs to the object at c8fe9d00
[ 143.315994] which belongs to the cache kmalloc-64 of size 64
[ 143.317281] The buggy address is located 0 bytes inside of
[ 143.317281] freed 64-byte region [c8fe9d00, c8fe9d40)
[ 143.318451]
[ 143.318736] The buggy address belongs to the physical page:
[ 143.319311] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[ 143.320355] flags: 0x800(slab|zone=0)
[ 143.320790] page_type: 0xffffffff()
[ 143.321385] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.322264] raw: 00000000
[ 143.322792] page dumped because: kasan: bad access detected
[ 143.323404]
[ 143.323785] Memory state around the buggy address:
[ 143.324357] c8fe9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.325090] c8fe9c80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.325990] >c8fe9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.326667] ^
[ 143.327085] c8fe9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.327805] c8fe9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.328524] ==================================================================
Home
[ 143.277876] ==================================================================
[ 143.278950] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x24/0x2c
[ 143.279853] Read of size 4 at addr c8fe9d00 by task swapper/0/0
[ 143.280433]
[ 143.280753] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.6.72-rc1 #1
[ 143.281458] Hardware name: Generic DT based system
[ 143.282094] unwind_backtrace from show_stack+0x18/0x1c
[ 143.282704] show_stack from dump_stack_lvl+0x58/0x70
[ 143.283542] dump_stack_lvl from print_report+0x164/0x51c
[ 143.284272] print_report from kasan_report+0xc8/0x104
[ 143.285063] kasan_report from rcu_uaf_reclaim+0x24/0x2c
[ 143.285768] rcu_uaf_reclaim from rcu_core+0x418/0xc84
[ 143.286415] rcu_core from handle_softirqs+0x23c/0x5fc
[ 143.287084] handle_softirqs from irq_exit+0xec/0x138
[ 143.287874] irq_exit from __irq_svc+0x78/0x9c
[ 143.288943] Exception stack(0xc3603ec0 to 0xc3603f08)
[ 143.289907] 3ec0: e7b62fd0 00000000 e7b62fd0 00000000 c3614a00 c360bf60 00000000 c360bfbc
[ 143.290808] 3ee0: b76c07e4 00000000 00000000 c3603f80 00000000 c3603f10 c04dc04c c04d367c
[ 143.292033] 3f00: 60000013 ffffffff
[ 143.292474] __irq_svc from arch_local_irq_enable+0x4/0x8
[ 143.293107] arch_local_irq_enable from do_idle+0x2d8/0x380
[ 143.293896] do_idle from cpu_startup_entry+0x38/0x3c
[ 143.294621] cpu_startup_entry from rest_init+0xdc/0xe0
[ 143.295338] rest_init from arch_post_acpi_subsys_init+0x0/0x18
[ 143.296206]
[ 143.296492] Allocated by task 207:
[ 143.296885] kasan_set_track+0x3c/0x5c
[ 143.297432] __kasan_kmalloc+0x8c/0x94
[ 143.298033] rcu_uaf+0xa0/0x1dc
[ 143.298497] kunit_try_run_case+0x11c/0x2e4
[ 143.298996] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.299787] kthread+0x184/0x1a8
[ 143.300244] ret_from_fork+0x14/0x30
[ 143.300886]
[ 143.301116] Freed by task 0:
[ 143.301519] kasan_set_track+0x3c/0x5c
[ 143.301985] kasan_save_free_info+0x30/0x3c
[ 143.302715] __kasan_slab_free+0xdc/0x124
[ 143.303182] __kmem_cache_free+0x140/0x2a8
[ 143.303898] rcu_uaf_reclaim+0x1c/0x2c
[ 143.304357] rcu_core+0x418/0xc84
[ 143.304974] handle_softirqs+0x23c/0x5fc
[ 143.305520] irq_exit+0xec/0x138
[ 143.306114] __irq_svc+0x78/0x9c
[ 143.306511] arch_local_irq_enable+0x4/0x8
[ 143.307156] do_idle+0x2d8/0x380
[ 143.308368] cpu_startup_entry+0x38/0x3c
[ 143.308909] rest_init+0xdc/0xe0
[ 143.309412] arch_post_acpi_subsys_init+0x0/0x18
[ 143.309986]
[ 143.310364] Last potentially related work creation:
[ 143.310840] kasan_save_stack+0x30/0x4c
[ 143.311468] __kasan_record_aux_stack+0x84/0x8c
[ 143.312158] __call_rcu_common.constprop.0+0x44/0x59c
[ 143.312959] rcu_uaf+0xdc/0x1dc
[ 143.313443] kunit_try_run_case+0x11c/0x2e4
[ 143.313983] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.314690] kthread+0x184/0x1a8
[ 143.315118] ret_from_fork+0x14/0x30
[ 143.315744]
[ 143.315994] The buggy address belongs to the object at c8fe9d00
[ 143.315994] which belongs to the cache kmalloc-64 of size 64
[ 143.317281] The buggy address is located 0 bytes inside of
[ 143.317281] freed 64-byte region [c8fe9d00, c8fe9d40)
[ 143.318451]
[ 143.318736] The buggy address belongs to the physical page:
[ 143.319311] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[ 143.320355] flags: 0x800(slab|zone=0)
[ 143.320790] page_type: 0xffffffff()
[ 143.321385] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.322264] raw: 00000000
[ 143.322792] page dumped because: kasan: bad access detected
[ 143.323404]
[ 143.323785] Memory state around the buggy address:
[ 143.324357] c8fe9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.325090] c8fe9c80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.325990] >c8fe9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.326667] ^
[ 143.327085] c8fe9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.327805] c8fe9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.328524] ==================================================================
Home
[ 142.450213] ==================================================================
[ 142.452309] BUG: KASAN: slab-use-after-free in strcmp+0x20/0x54
[ 142.453094] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.454035]
[ 142.454306] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.455051] Hardware name: Generic DT based system
[ 142.455906] unwind_backtrace from show_stack+0x18/0x1c
[ 142.456720] show_stack from dump_stack_lvl+0x58/0x70
[ 142.457840] dump_stack_lvl from print_report+0x164/0x51c
[ 142.458897] print_report from kasan_report+0xc8/0x104
[ 142.459657] kasan_report from strcmp+0x20/0x54
[ 142.460418] strcmp from kasan_strings+0x140/0x4ec
[ 142.461219] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.462047] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.463029] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.463972] kthread from ret_from_fork+0x14/0x30
[ 142.464628] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.465345] bfa0: 00000000 00000000 00000000 00000000
[ 142.466333] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.467473] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.468682]
[ 142.468874] Allocated by task 199:
[ 142.469195] kasan_set_track+0x3c/0x5c
[ 142.469597] __kasan_kmalloc+0x8c/0x94
[ 142.469984] kasan_strings+0xa0/0x4ec
[ 142.471404] kunit_try_run_case+0x11c/0x2e4
[ 142.472182] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.473065] kthread+0x184/0x1a8
[ 142.473852] ret_from_fork+0x14/0x30
[ 142.474525]
[ 142.474738] Freed by task 199:
[ 142.475342] kasan_set_track+0x3c/0x5c
[ 142.476056] kasan_save_free_info+0x30/0x3c
[ 142.476640] __kasan_slab_free+0xdc/0x124
[ 142.477619] __kmem_cache_free+0x140/0x2a8
[ 142.478597] kasan_strings+0xbc/0x4ec
[ 142.479099] kunit_try_run_case+0x11c/0x2e4
[ 142.479744] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.480499] kthread+0x184/0x1a8
[ 142.481013] ret_from_fork+0x14/0x30
[ 142.481581]
[ 142.481935] The buggy address belongs to the object at c9008500
[ 142.481935] which belongs to the cache kmalloc-64 of size 64
[ 142.483312] The buggy address is located 16 bytes inside of
[ 142.483312] freed 64-byte region [c9008500, c9008540)
[ 142.484626]
[ 142.484903] The buggy address belongs to the physical page:
[ 142.485703] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.486712] flags: 0x800(slab|zone=0)
[ 142.487607] page_type: 0xffffffff()
[ 142.488208] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.489221] raw: 00000000
[ 142.489672] page dumped because: kasan: bad access detected
[ 142.490350]
[ 142.490666] Memory state around the buggy address:
[ 142.491201] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.492065] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.492885] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.493743] ^
[ 142.494189] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.494991] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.495738] ==================================================================
Home
[ 142.450213] ==================================================================
[ 142.452309] BUG: KASAN: slab-use-after-free in strcmp+0x20/0x54
[ 142.453094] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.454035]
[ 142.454306] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.455051] Hardware name: Generic DT based system
[ 142.455906] unwind_backtrace from show_stack+0x18/0x1c
[ 142.456720] show_stack from dump_stack_lvl+0x58/0x70
[ 142.457840] dump_stack_lvl from print_report+0x164/0x51c
[ 142.458897] print_report from kasan_report+0xc8/0x104
[ 142.459657] kasan_report from strcmp+0x20/0x54
[ 142.460418] strcmp from kasan_strings+0x140/0x4ec
[ 142.461219] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.462047] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.463029] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.463972] kthread from ret_from_fork+0x14/0x30
[ 142.464628] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.465345] bfa0: 00000000 00000000 00000000 00000000
[ 142.466333] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.467473] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.468682]
[ 142.468874] Allocated by task 199:
[ 142.469195] kasan_set_track+0x3c/0x5c
[ 142.469597] __kasan_kmalloc+0x8c/0x94
[ 142.469984] kasan_strings+0xa0/0x4ec
[ 142.471404] kunit_try_run_case+0x11c/0x2e4
[ 142.472182] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.473065] kthread+0x184/0x1a8
[ 142.473852] ret_from_fork+0x14/0x30
[ 142.474525]
[ 142.474738] Freed by task 199:
[ 142.475342] kasan_set_track+0x3c/0x5c
[ 142.476056] kasan_save_free_info+0x30/0x3c
[ 142.476640] __kasan_slab_free+0xdc/0x124
[ 142.477619] __kmem_cache_free+0x140/0x2a8
[ 142.478597] kasan_strings+0xbc/0x4ec
[ 142.479099] kunit_try_run_case+0x11c/0x2e4
[ 142.479744] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.480499] kthread+0x184/0x1a8
[ 142.481013] ret_from_fork+0x14/0x30
[ 142.481581]
[ 142.481935] The buggy address belongs to the object at c9008500
[ 142.481935] which belongs to the cache kmalloc-64 of size 64
[ 142.483312] The buggy address is located 16 bytes inside of
[ 142.483312] freed 64-byte region [c9008500, c9008540)
[ 142.484626]
[ 142.484903] The buggy address belongs to the physical page:
[ 142.485703] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.486712] flags: 0x800(slab|zone=0)
[ 142.487607] page_type: 0xffffffff()
[ 142.488208] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.489221] raw: 00000000
[ 142.489672] page dumped because: kasan: bad access detected
[ 142.490350]
[ 142.490666] Memory state around the buggy address:
[ 142.491201] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.492065] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.492885] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.493743] ^
[ 142.494189] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.494991] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.495738] ==================================================================
Home
[ 142.540784] ==================================================================
[ 142.541802] BUG: KASAN: slab-use-after-free in strlen+0xc/0x44
[ 142.542331] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.543232]
[ 142.543445] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.544658] Hardware name: Generic DT based system
[ 142.545285] unwind_backtrace from show_stack+0x18/0x1c
[ 142.545989] show_stack from dump_stack_lvl+0x58/0x70
[ 142.546656] dump_stack_lvl from print_report+0x164/0x51c
[ 142.547420] print_report from kasan_report+0xc8/0x104
[ 142.548084] kasan_report from strlen+0xc/0x44
[ 142.548946] strlen from kasan_strings+0x1a8/0x4ec
[ 142.550068] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.550876] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.551986] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.552952] kthread from ret_from_fork+0x14/0x30
[ 142.553603] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.554160] bfa0: 00000000 00000000 00000000 00000000
[ 142.554999] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.556067] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.556931]
[ 142.557214] Allocated by task 199:
[ 142.557643] kasan_set_track+0x3c/0x5c
[ 142.558116] __kasan_kmalloc+0x8c/0x94
[ 142.558797] kasan_strings+0xa0/0x4ec
[ 142.559775] kunit_try_run_case+0x11c/0x2e4
[ 142.560602] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.561293] kthread+0x184/0x1a8
[ 142.561735] ret_from_fork+0x14/0x30
[ 142.562208]
[ 142.562452] Freed by task 199:
[ 142.562927] kasan_set_track+0x3c/0x5c
[ 142.563602] kasan_save_free_info+0x30/0x3c
[ 142.564427] __kasan_slab_free+0xdc/0x124
[ 142.565196] __kmem_cache_free+0x140/0x2a8
[ 142.565870] kasan_strings+0xbc/0x4ec
[ 142.566175] kunit_try_run_case+0x11c/0x2e4
[ 142.566841] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.568155] kthread+0x184/0x1a8
[ 142.568634] ret_from_fork+0x14/0x30
[ 142.569197]
[ 142.569480] The buggy address belongs to the object at c9008500
[ 142.569480] which belongs to the cache kmalloc-64 of size 64
[ 142.570671] The buggy address is located 16 bytes inside of
[ 142.570671] freed 64-byte region [c9008500, c9008540)
[ 142.571954]
[ 142.572335] The buggy address belongs to the physical page:
[ 142.572931] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.574108] flags: 0x800(slab|zone=0)
[ 142.574822] page_type: 0xffffffff()
[ 142.575566] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.576567] raw: 00000000
[ 142.577311] page dumped because: kasan: bad access detected
[ 142.578249]
[ 142.578569] Memory state around the buggy address:
[ 142.579069] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.579837] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.580515] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.581213] ^
[ 142.581538] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.582319] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.583063] ==================================================================
Home
[ 142.540784] ==================================================================
[ 142.541802] BUG: KASAN: slab-use-after-free in strlen+0xc/0x44
[ 142.542331] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.543232]
[ 142.543445] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.544658] Hardware name: Generic DT based system
[ 142.545285] unwind_backtrace from show_stack+0x18/0x1c
[ 142.545989] show_stack from dump_stack_lvl+0x58/0x70
[ 142.546656] dump_stack_lvl from print_report+0x164/0x51c
[ 142.547420] print_report from kasan_report+0xc8/0x104
[ 142.548084] kasan_report from strlen+0xc/0x44
[ 142.548946] strlen from kasan_strings+0x1a8/0x4ec
[ 142.550068] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.550876] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.551986] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.552952] kthread from ret_from_fork+0x14/0x30
[ 142.553603] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.554160] bfa0: 00000000 00000000 00000000 00000000
[ 142.554999] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.556067] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.556931]
[ 142.557214] Allocated by task 199:
[ 142.557643] kasan_set_track+0x3c/0x5c
[ 142.558116] __kasan_kmalloc+0x8c/0x94
[ 142.558797] kasan_strings+0xa0/0x4ec
[ 142.559775] kunit_try_run_case+0x11c/0x2e4
[ 142.560602] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.561293] kthread+0x184/0x1a8
[ 142.561735] ret_from_fork+0x14/0x30
[ 142.562208]
[ 142.562452] Freed by task 199:
[ 142.562927] kasan_set_track+0x3c/0x5c
[ 142.563602] kasan_save_free_info+0x30/0x3c
[ 142.564427] __kasan_slab_free+0xdc/0x124
[ 142.565196] __kmem_cache_free+0x140/0x2a8
[ 142.565870] kasan_strings+0xbc/0x4ec
[ 142.566175] kunit_try_run_case+0x11c/0x2e4
[ 142.566841] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.568155] kthread+0x184/0x1a8
[ 142.568634] ret_from_fork+0x14/0x30
[ 142.569197]
[ 142.569480] The buggy address belongs to the object at c9008500
[ 142.569480] which belongs to the cache kmalloc-64 of size 64
[ 142.570671] The buggy address is located 16 bytes inside of
[ 142.570671] freed 64-byte region [c9008500, c9008540)
[ 142.571954]
[ 142.572335] The buggy address belongs to the physical page:
[ 142.572931] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.574108] flags: 0x800(slab|zone=0)
[ 142.574822] page_type: 0xffffffff()
[ 142.575566] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.576567] raw: 00000000
[ 142.577311] page dumped because: kasan: bad access detected
[ 142.578249]
[ 142.578569] Memory state around the buggy address:
[ 142.579069] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.579837] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.580515] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.581213] ^
[ 142.581538] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.582319] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.583063] ==================================================================
Home
[ 142.583963] ==================================================================
[ 142.584927] BUG: KASAN: slab-use-after-free in strnlen+0x30/0x58
[ 142.585680] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.586443]
[ 142.586732] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.588382] Hardware name: Generic DT based system
[ 142.588983] unwind_backtrace from show_stack+0x18/0x1c
[ 142.589891] show_stack from dump_stack_lvl+0x58/0x70
[ 142.590536] dump_stack_lvl from print_report+0x164/0x51c
[ 142.591368] print_report from kasan_report+0xc8/0x104
[ 142.592155] kasan_report from strnlen+0x30/0x58
[ 142.592808] strnlen from kasan_strings+0x1dc/0x4ec
[ 142.593444] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.594261] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.595253] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.596092] kthread from ret_from_fork+0x14/0x30
[ 142.596687] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.597806] bfa0: 00000000 00000000 00000000 00000000
[ 142.598747] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.599757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.600469]
[ 142.600714] Allocated by task 199:
[ 142.601093] kasan_set_track+0x3c/0x5c
[ 142.601706] __kasan_kmalloc+0x8c/0x94
[ 142.602226] kasan_strings+0xa0/0x4ec
[ 142.602672] kunit_try_run_case+0x11c/0x2e4
[ 142.603343] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.604079] kthread+0x184/0x1a8
[ 142.604486] ret_from_fork+0x14/0x30
[ 142.605071]
[ 142.605336] Freed by task 199:
[ 142.605782] kasan_set_track+0x3c/0x5c
[ 142.606301] kasan_save_free_info+0x30/0x3c
[ 142.606788] __kasan_slab_free+0xdc/0x124
[ 142.607438] __kmem_cache_free+0x140/0x2a8
[ 142.608442] kasan_strings+0xbc/0x4ec
[ 142.609178] kunit_try_run_case+0x11c/0x2e4
[ 142.609674] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.610605] kthread+0x184/0x1a8
[ 142.611192] ret_from_fork+0x14/0x30
[ 142.611711]
[ 142.612050] The buggy address belongs to the object at c9008500
[ 142.612050] which belongs to the cache kmalloc-64 of size 64
[ 142.613402] The buggy address is located 16 bytes inside of
[ 142.613402] freed 64-byte region [c9008500, c9008540)
[ 142.614699]
[ 142.614944] The buggy address belongs to the physical page:
[ 142.615709] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.616683] flags: 0x800(slab|zone=0)
[ 142.617211] page_type: 0xffffffff()
[ 142.618293] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.619179] raw: 00000000
[ 142.619595] page dumped because: kasan: bad access detected
[ 142.620238]
[ 142.620582] Memory state around the buggy address:
[ 142.621319] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.622093] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.622979] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.623787] ^
[ 142.624261] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.625083] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.625919] ==================================================================
Home
[ 142.583963] ==================================================================
[ 142.584927] BUG: KASAN: slab-use-after-free in strnlen+0x30/0x58
[ 142.585680] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[ 142.586443]
[ 142.586732] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 142.588382] Hardware name: Generic DT based system
[ 142.588983] unwind_backtrace from show_stack+0x18/0x1c
[ 142.589891] show_stack from dump_stack_lvl+0x58/0x70
[ 142.590536] dump_stack_lvl from print_report+0x164/0x51c
[ 142.591368] print_report from kasan_report+0xc8/0x104
[ 142.592155] kasan_report from strnlen+0x30/0x58
[ 142.592808] strnlen from kasan_strings+0x1dc/0x4ec
[ 142.593444] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 142.594261] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.595253] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 142.596092] kthread from ret_from_fork+0x14/0x30
[ 142.596687] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 142.597806] bfa0: 00000000 00000000 00000000 00000000
[ 142.598747] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 142.599757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 142.600469]
[ 142.600714] Allocated by task 199:
[ 142.601093] kasan_set_track+0x3c/0x5c
[ 142.601706] __kasan_kmalloc+0x8c/0x94
[ 142.602226] kasan_strings+0xa0/0x4ec
[ 142.602672] kunit_try_run_case+0x11c/0x2e4
[ 142.603343] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.604079] kthread+0x184/0x1a8
[ 142.604486] ret_from_fork+0x14/0x30
[ 142.605071]
[ 142.605336] Freed by task 199:
[ 142.605782] kasan_set_track+0x3c/0x5c
[ 142.606301] kasan_save_free_info+0x30/0x3c
[ 142.606788] __kasan_slab_free+0xdc/0x124
[ 142.607438] __kmem_cache_free+0x140/0x2a8
[ 142.608442] kasan_strings+0xbc/0x4ec
[ 142.609178] kunit_try_run_case+0x11c/0x2e4
[ 142.609674] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 142.610605] kthread+0x184/0x1a8
[ 142.611192] ret_from_fork+0x14/0x30
[ 142.611711]
[ 142.612050] The buggy address belongs to the object at c9008500
[ 142.612050] which belongs to the cache kmalloc-64 of size 64
[ 142.613402] The buggy address is located 16 bytes inside of
[ 142.613402] freed 64-byte region [c9008500, c9008540)
[ 142.614699]
[ 142.614944] The buggy address belongs to the physical page:
[ 142.615709] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[ 142.616683] flags: 0x800(slab|zone=0)
[ 142.617211] page_type: 0xffffffff()
[ 142.618293] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 142.619179] raw: 00000000
[ 142.619595] page dumped because: kasan: bad access detected
[ 142.620238]
[ 142.620582] Memory state around the buggy address:
[ 142.621319] c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.622093] c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 142.622979] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 142.623787] ^
[ 142.624261] c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 142.625083] c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 142.625919] ==================================================================
Home
[ 143.339197] ==================================================================
[ 143.340476] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x264
[ 143.341257] Read of size 4 at addr c8fea080 by task kunit_try_catch/209
[ 143.342019]
[ 143.342309] CPU: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.343413] Hardware name: Generic DT based system
[ 143.343872] unwind_backtrace from show_stack+0x18/0x1c
[ 143.344649] show_stack from dump_stack_lvl+0x58/0x70
[ 143.345362] dump_stack_lvl from print_report+0x164/0x51c
[ 143.346117] print_report from kasan_report+0xc8/0x104
[ 143.346760] kasan_report from workqueue_uaf+0x14c/0x264
[ 143.347631] workqueue_uaf from kunit_try_run_case+0x11c/0x2e4
[ 143.348887] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.349875] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.350729] kthread from ret_from_fork+0x14/0x30
[ 143.351310] Exception stack(0xfa11bfb0 to 0xfa11bff8)
[ 143.351934] bfa0: 00000000 00000000 00000000 00000000
[ 143.352779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.353798] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.354490]
[ 143.354783] Allocated by task 209:
[ 143.355172] kasan_set_track+0x3c/0x5c
[ 143.355690] __kasan_kmalloc+0x8c/0x94
[ 143.356200] workqueue_uaf+0xcc/0x264
[ 143.356714] kunit_try_run_case+0x11c/0x2e4
[ 143.357406] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.358265] kthread+0x184/0x1a8
[ 143.358867] ret_from_fork+0x14/0x30
[ 143.359874]
[ 143.360223] Freed by task 63:
[ 143.360695] kasan_set_track+0x3c/0x5c
[ 143.361263] kasan_save_free_info+0x30/0x3c
[ 143.361784] __kasan_slab_free+0xdc/0x124
[ 143.362426] __kmem_cache_free+0x140/0x2a8
[ 143.363309] process_one_work+0x2e4/0x678
[ 143.363822] worker_thread+0x4d8/0x828
[ 143.364465] kthread+0x184/0x1a8
[ 143.364941] ret_from_fork+0x14/0x30
[ 143.365453]
[ 143.365709] Last potentially related work creation:
[ 143.366255] kasan_save_stack+0x30/0x4c
[ 143.366908] __kasan_record_aux_stack+0x84/0x8c
[ 143.367709] __queue_work+0x2a8/0x9b8
[ 143.368473] queue_work_on+0x98/0x9c
[ 143.369007] workqueue_uaf+0x128/0x264
[ 143.369557] kunit_try_run_case+0x11c/0x2e4
[ 143.370190] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.370873] kthread+0x184/0x1a8
[ 143.371284] ret_from_fork+0x14/0x30
[ 143.371921]
[ 143.372178] The buggy address belongs to the object at c8fea080
[ 143.372178] which belongs to the cache kmalloc-64 of size 64
[ 143.373351] The buggy address is located 0 bytes inside of
[ 143.373351] freed 64-byte region [c8fea080, c8fea0c0)
[ 143.374534]
[ 143.374814] The buggy address belongs to the physical page:
[ 143.375538] page:3f561fb6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fea
[ 143.376439] flags: 0x800(slab|zone=0)
[ 143.376884] page_type: 0xffffffff()
[ 143.377408] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.378466] raw: 00000000
[ 143.378950] page dumped because: kasan: bad access detected
[ 143.379629]
[ 143.379921] Memory state around the buggy address:
[ 143.380509] c8fe9f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.381195] c8fea000: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.382233] >c8fea080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.383060] ^
[ 143.383477] c8fea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.384273] c8fea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.385034] ==================================================================
Home
[ 143.339197] ==================================================================
[ 143.340476] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x264
[ 143.341257] Read of size 4 at addr c8fea080 by task kunit_try_catch/209
[ 143.342019]
[ 143.342309] CPU: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.343413] Hardware name: Generic DT based system
[ 143.343872] unwind_backtrace from show_stack+0x18/0x1c
[ 143.344649] show_stack from dump_stack_lvl+0x58/0x70
[ 143.345362] dump_stack_lvl from print_report+0x164/0x51c
[ 143.346117] print_report from kasan_report+0xc8/0x104
[ 143.346760] kasan_report from workqueue_uaf+0x14c/0x264
[ 143.347631] workqueue_uaf from kunit_try_run_case+0x11c/0x2e4
[ 143.348887] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.349875] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.350729] kthread from ret_from_fork+0x14/0x30
[ 143.351310] Exception stack(0xfa11bfb0 to 0xfa11bff8)
[ 143.351934] bfa0: 00000000 00000000 00000000 00000000
[ 143.352779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.353798] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.354490]
[ 143.354783] Allocated by task 209:
[ 143.355172] kasan_set_track+0x3c/0x5c
[ 143.355690] __kasan_kmalloc+0x8c/0x94
[ 143.356200] workqueue_uaf+0xcc/0x264
[ 143.356714] kunit_try_run_case+0x11c/0x2e4
[ 143.357406] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.358265] kthread+0x184/0x1a8
[ 143.358867] ret_from_fork+0x14/0x30
[ 143.359874]
[ 143.360223] Freed by task 63:
[ 143.360695] kasan_set_track+0x3c/0x5c
[ 143.361263] kasan_save_free_info+0x30/0x3c
[ 143.361784] __kasan_slab_free+0xdc/0x124
[ 143.362426] __kmem_cache_free+0x140/0x2a8
[ 143.363309] process_one_work+0x2e4/0x678
[ 143.363822] worker_thread+0x4d8/0x828
[ 143.364465] kthread+0x184/0x1a8
[ 143.364941] ret_from_fork+0x14/0x30
[ 143.365453]
[ 143.365709] Last potentially related work creation:
[ 143.366255] kasan_save_stack+0x30/0x4c
[ 143.366908] __kasan_record_aux_stack+0x84/0x8c
[ 143.367709] __queue_work+0x2a8/0x9b8
[ 143.368473] queue_work_on+0x98/0x9c
[ 143.369007] workqueue_uaf+0x128/0x264
[ 143.369557] kunit_try_run_case+0x11c/0x2e4
[ 143.370190] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.370873] kthread+0x184/0x1a8
[ 143.371284] ret_from_fork+0x14/0x30
[ 143.371921]
[ 143.372178] The buggy address belongs to the object at c8fea080
[ 143.372178] which belongs to the cache kmalloc-64 of size 64
[ 143.373351] The buggy address is located 0 bytes inside of
[ 143.373351] freed 64-byte region [c8fea080, c8fea0c0)
[ 143.374534]
[ 143.374814] The buggy address belongs to the physical page:
[ 143.375538] page:3f561fb6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fea
[ 143.376439] flags: 0x800(slab|zone=0)
[ 143.376884] page_type: 0xffffffff()
[ 143.377408] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 143.378466] raw: 00000000
[ 143.378950] page dumped because: kasan: bad access detected
[ 143.379629]
[ 143.379921] Memory state around the buggy address:
[ 143.380509] c8fe9f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.381195] c8fea000: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.382233] >c8fea080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 143.383060] ^
[ 143.383477] c8fea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.384273] c8fea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 143.385034] ==================================================================
Home
[ 141.856169] ==================================================================
[ 141.857551] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x174
[ 141.859052] Read of size 1 at addr fa07be0a by task kunit_try_catch/179
[ 141.859823]
[ 141.860144] CPU: 1 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.861172] Hardware name: Generic DT based system
[ 141.861707] unwind_backtrace from show_stack+0x18/0x1c
[ 141.862392] show_stack from dump_stack_lvl+0x58/0x70
[ 141.863244] dump_stack_lvl from print_report+0x164/0x51c
[ 141.863994] print_report from kasan_report+0xc8/0x104
[ 141.864748] kasan_report from kasan_stack_oob+0xc0/0x174
[ 141.865547] kasan_stack_oob from kunit_try_run_case+0x11c/0x2e4
[ 141.866454] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.867402] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.868285] kthread from ret_from_fork+0x14/0x30
[ 141.868873] Exception stack(0xfa07bfb0 to 0xfa07bff8)
[ 141.869465] bfa0: 00000000 00000000 00000000 00000000
[ 141.870530] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.871509] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.872199]
[ 141.872565] The buggy address belongs to stack of task kunit_try_catch/179
[ 141.873344] and is located at offset 106 in frame:
[ 141.873979] kasan_stack_oob+0x0/0x174
[ 141.875041]
[ 141.875315] This frame has 4 objects:
[ 141.875842] [32, 33) '__assertion'
[ 141.875953] [48, 52) 'array'
[ 141.876457] [64, 72) '__assertion'
[ 141.876885] [96, 106) 'stack_array'
[ 141.877331]
[ 141.878162] The buggy address belongs to the virtual mapping at
[ 141.878162] [fa078000, fa07d000) created by:
[ 141.878162] kernel_clone+0xcc/0x4b0
[ 141.879643]
[ 141.880102] The buggy address belongs to the physical page:
[ 141.880922] page:03b3ba91 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc7e
[ 141.881794] flags: 0x80000000(zone=2)
[ 141.882251] page_type: 0xffffffff()
[ 141.882722] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 141.883659] raw: 00000000
[ 141.883971] page dumped because: kasan: bad access detected
[ 141.884707]
[ 141.884923] Memory state around the buggy address:
[ 141.885589] fa07bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.886331] fa07bd80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 141.887083] >fa07be00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.887780] ^
[ 141.888189] fa07be80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[ 141.888859] fa07bf00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.889568] ==================================================================
Home
[ 141.856169] ==================================================================
[ 141.857551] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x174
[ 141.859052] Read of size 1 at addr fa07be0a by task kunit_try_catch/179
[ 141.859823]
[ 141.860144] CPU: 1 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 141.861172] Hardware name: Generic DT based system
[ 141.861707] unwind_backtrace from show_stack+0x18/0x1c
[ 141.862392] show_stack from dump_stack_lvl+0x58/0x70
[ 141.863244] dump_stack_lvl from print_report+0x164/0x51c
[ 141.863994] print_report from kasan_report+0xc8/0x104
[ 141.864748] kasan_report from kasan_stack_oob+0xc0/0x174
[ 141.865547] kasan_stack_oob from kunit_try_run_case+0x11c/0x2e4
[ 141.866454] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 141.867402] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 141.868285] kthread from ret_from_fork+0x14/0x30
[ 141.868873] Exception stack(0xfa07bfb0 to 0xfa07bff8)
[ 141.869465] bfa0: 00000000 00000000 00000000 00000000
[ 141.870530] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 141.871509] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 141.872199]
[ 141.872565] The buggy address belongs to stack of task kunit_try_catch/179
[ 141.873344] and is located at offset 106 in frame:
[ 141.873979] kasan_stack_oob+0x0/0x174
[ 141.875041]
[ 141.875315] This frame has 4 objects:
[ 141.875842] [32, 33) '__assertion'
[ 141.875953] [48, 52) 'array'
[ 141.876457] [64, 72) '__assertion'
[ 141.876885] [96, 106) 'stack_array'
[ 141.877331]
[ 141.878162] The buggy address belongs to the virtual mapping at
[ 141.878162] [fa078000, fa07d000) created by:
[ 141.878162] kernel_clone+0xcc/0x4b0
[ 141.879643]
[ 141.880102] The buggy address belongs to the physical page:
[ 141.880922] page:03b3ba91 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc7e
[ 141.881794] flags: 0x80000000(zone=2)
[ 141.882251] page_type: 0xffffffff()
[ 141.882722] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 141.883659] raw: 00000000
[ 141.883971] page dumped because: kasan: bad access detected
[ 141.884707]
[ 141.884923] Memory state around the buggy address:
[ 141.885589] fa07bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.886331] fa07bd80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 141.887083] >fa07be00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.887780] ^
[ 141.888189] fa07be80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[ 141.888859] fa07bf00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 141.889568] ==================================================================
Home
[ 139.831567] ==================================================================
[ 139.832804] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb4/0x1ac
[ 139.833473] Read of size 1 at addr c8ec8000 by task kunit_try_catch/119
[ 139.834138]
[ 139.834445] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.835314] Hardware name: Generic DT based system
[ 139.835886] unwind_backtrace from show_stack+0x18/0x1c
[ 139.836748] show_stack from dump_stack_lvl+0x58/0x70
[ 139.837777] dump_stack_lvl from print_report+0x164/0x51c
[ 139.838757] print_report from kasan_report+0xc8/0x104
[ 139.839429] kasan_report from kmalloc_pagealloc_uaf+0xb4/0x1ac
[ 139.840011] kmalloc_pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 139.842030] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.843063] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.843959] kthread from ret_from_fork+0x14/0x30
[ 139.844589] Exception stack(0xf9ec3fb0 to 0xf9ec3ff8)
[ 139.845143] 3fa0: 00000000 00000000 00000000 00000000
[ 139.846055] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.846909] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.847939]
[ 139.848654] The buggy address belongs to the physical page:
[ 139.849309] page:9c6d4078 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48ec8
[ 139.850519] flags: 0x0(zone=0)
[ 139.850930] page_type: 0xffffffff()
[ 139.851471] raw: 00000000 edd3a4b4 e7b68e84 00000000 00000000 00000000 ffffffff 00000000
[ 139.852270] raw: 00000000
[ 139.852788] page dumped because: kasan: bad access detected
[ 139.853469]
[ 139.853764] Memory state around the buggy address:
[ 139.854364] c8ec7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.855102] c8ec7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.855881] >c8ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.856610] ^
[ 139.857012] c8ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.857897] c8ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.859040] ==================================================================
Home
[ 139.831567] ==================================================================
[ 139.832804] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb4/0x1ac
[ 139.833473] Read of size 1 at addr c8ec8000 by task kunit_try_catch/119
[ 139.834138]
[ 139.834445] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.835314] Hardware name: Generic DT based system
[ 139.835886] unwind_backtrace from show_stack+0x18/0x1c
[ 139.836748] show_stack from dump_stack_lvl+0x58/0x70
[ 139.837777] dump_stack_lvl from print_report+0x164/0x51c
[ 139.838757] print_report from kasan_report+0xc8/0x104
[ 139.839429] kasan_report from kmalloc_pagealloc_uaf+0xb4/0x1ac
[ 139.840011] kmalloc_pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 139.842030] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.843063] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.843959] kthread from ret_from_fork+0x14/0x30
[ 139.844589] Exception stack(0xf9ec3fb0 to 0xf9ec3ff8)
[ 139.845143] 3fa0: 00000000 00000000 00000000 00000000
[ 139.846055] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.846909] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.847939]
[ 139.848654] The buggy address belongs to the physical page:
[ 139.849309] page:9c6d4078 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48ec8
[ 139.850519] flags: 0x0(zone=0)
[ 139.850930] page_type: 0xffffffff()
[ 139.851471] raw: 00000000 edd3a4b4 e7b68e84 00000000 00000000 00000000 ffffffff 00000000
[ 139.852270] raw: 00000000
[ 139.852788] page dumped because: kasan: bad access detected
[ 139.853469]
[ 139.853764] Memory state around the buggy address:
[ 139.854364] c8ec7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.855102] c8ec7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 139.855881] >c8ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.856610] ^
[ 139.857012] c8ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.857897] c8ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.859040] ==================================================================
Home
[ 139.905761] ==================================================================
[ 139.907018] BUG: KASAN: use-after-free in pagealloc_uaf+0xc8/0x1cc
[ 139.907766] Read of size 1 at addr c8f80000 by task kunit_try_catch/125
[ 139.909669]
[ 139.910099] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.911211] Hardware name: Generic DT based system
[ 139.911748] unwind_backtrace from show_stack+0x18/0x1c
[ 139.912691] show_stack from dump_stack_lvl+0x58/0x70
[ 139.913388] dump_stack_lvl from print_report+0x164/0x51c
[ 139.914234] print_report from kasan_report+0xc8/0x104
[ 139.914908] kasan_report from pagealloc_uaf+0xc8/0x1cc
[ 139.915561] pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 139.916333] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.917545] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.918386] kthread from ret_from_fork+0x14/0x30
[ 139.918970] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[ 139.919566] bfa0: 00000000 00000000 00000000 00000000
[ 139.920413] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.921368] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.922109]
[ 139.922454] The buggy address belongs to the physical page:
[ 139.923100] page:643ab6e7 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f80
[ 139.923856] flags: 0x0(zone=0)
[ 139.924351] page_type: 0xffffff7f(buddy)
[ 139.924934] raw: 00000000 c40f83ac c40f83ac 00000000 00000000 00000007 ffffff7f 00000000
[ 139.925934] raw: 00000000
[ 139.926367] page dumped because: kasan: bad access detected
[ 139.927076]
[ 139.927335] Memory state around the buggy address:
[ 139.927939] c8f7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.928975] c8f7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.929727] >c8f80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.930425] ^
[ 139.930809] c8f80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.931585] c8f80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.932338] ==================================================================
Home
[ 139.905761] ==================================================================
[ 139.907018] BUG: KASAN: use-after-free in pagealloc_uaf+0xc8/0x1cc
[ 139.907766] Read of size 1 at addr c8f80000 by task kunit_try_catch/125
[ 139.909669]
[ 139.910099] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 139.911211] Hardware name: Generic DT based system
[ 139.911748] unwind_backtrace from show_stack+0x18/0x1c
[ 139.912691] show_stack from dump_stack_lvl+0x58/0x70
[ 139.913388] dump_stack_lvl from print_report+0x164/0x51c
[ 139.914234] print_report from kasan_report+0xc8/0x104
[ 139.914908] kasan_report from pagealloc_uaf+0xc8/0x1cc
[ 139.915561] pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 139.916333] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 139.917545] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 139.918386] kthread from ret_from_fork+0x14/0x30
[ 139.918970] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[ 139.919566] bfa0: 00000000 00000000 00000000 00000000
[ 139.920413] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 139.921368] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 139.922109]
[ 139.922454] The buggy address belongs to the physical page:
[ 139.923100] page:643ab6e7 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f80
[ 139.923856] flags: 0x0(zone=0)
[ 139.924351] page_type: 0xffffff7f(buddy)
[ 139.924934] raw: 00000000 c40f83ac c40f83ac 00000000 00000000 00000007 ffffff7f 00000000
[ 139.925934] raw: 00000000
[ 139.926367] page dumped because: kasan: bad access detected
[ 139.927076]
[ 139.927335] Memory state around the buggy address:
[ 139.927939] c8f7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.928975] c8f7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.929727] >c8f80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.930425] ^
[ 139.930809] c8f80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.931585] c8f80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 139.932338] ==================================================================
Home
[ 143.398212] ==================================================================
[ 143.399754] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x300
[ 143.400610] Read of size 1 at addr f18f57f3 by task kunit_try_catch/214
[ 143.401377]
[ 143.401662] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.402645] Hardware name: Generic DT based system
[ 143.403144] unwind_backtrace from show_stack+0x18/0x1c
[ 143.404050] show_stack from dump_stack_lvl+0x58/0x70
[ 143.404848] dump_stack_lvl from print_report+0x164/0x51c
[ 143.405636] print_report from kasan_report+0xc8/0x104
[ 143.406321] kasan_report from vmalloc_oob+0xd8/0x300
[ 143.407082] vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[ 143.407842] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.409057] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.409850] kthread from ret_from_fork+0x14/0x30
[ 143.410928] Exception stack(0xfa143fb0 to 0xfa143ff8)
[ 143.411643] 3fa0: 00000000 00000000 00000000 00000000
[ 143.412691] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.413743] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.414548]
[ 143.414894] The buggy address belongs to the virtual mapping at
[ 143.414894] [f18f5000, f18f7000) created by:
[ 143.414894] vmalloc_oob+0x88/0x300
[ 143.416354]
[ 143.416789] The buggy address belongs to the physical page:
[ 143.417796] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[ 143.418819] flags: 0x80000000(zone=2)
[ 143.419288] page_type: 0xffffffff()
[ 143.419730] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 143.420851] raw: 00000000
[ 143.421232] page dumped because: kasan: bad access detected
[ 143.421963]
[ 143.422348] Memory state around the buggy address:
[ 143.422926] f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.423866] f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.424794] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 143.425575] ^
[ 143.426367] f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.427206] f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.427890] ==================================================================
[ 143.430554] ==================================================================
[ 143.431280] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x10c/0x300
[ 143.431985] Read of size 1 at addr f18f57f8 by task kunit_try_catch/214
[ 143.432577]
[ 143.432889] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.433902] Hardware name: Generic DT based system
[ 143.434496] unwind_backtrace from show_stack+0x18/0x1c
[ 143.435205] show_stack from dump_stack_lvl+0x58/0x70
[ 143.435894] dump_stack_lvl from print_report+0x164/0x51c
[ 143.436657] print_report from kasan_report+0xc8/0x104
[ 143.437588] kasan_report from vmalloc_oob+0x10c/0x300
[ 143.438417] vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[ 143.439178] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.440082] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.441046] kthread from ret_from_fork+0x14/0x30
[ 143.441725] Exception stack(0xfa143fb0 to 0xfa143ff8)
[ 143.442344] 3fa0: 00000000 00000000 00000000 00000000
[ 143.443375] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.444316] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.445161]
[ 143.445443] The buggy address belongs to the virtual mapping at
[ 143.445443] [f18f5000, f18f7000) created by:
[ 143.445443] vmalloc_oob+0x88/0x300
[ 143.446951]
[ 143.447346] The buggy address belongs to the physical page:
[ 143.448038] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[ 143.448875] flags: 0x80000000(zone=2)
[ 143.449677] page_type: 0xffffffff()
[ 143.450348] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 143.451343] raw: 00000000
[ 143.451723] page dumped because: kasan: bad access detected
[ 143.452273]
[ 143.452582] Memory state around the buggy address:
[ 143.453319] f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.453972] f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.454738] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 143.455593] ^
[ 143.456249] f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.457169] f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.458005] ==================================================================
Home
[ 143.430554] ==================================================================
[ 143.431280] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x10c/0x300
[ 143.431985] Read of size 1 at addr f18f57f8 by task kunit_try_catch/214
[ 143.432577]
[ 143.432889] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.433902] Hardware name: Generic DT based system
[ 143.434496] unwind_backtrace from show_stack+0x18/0x1c
[ 143.435205] show_stack from dump_stack_lvl+0x58/0x70
[ 143.435894] dump_stack_lvl from print_report+0x164/0x51c
[ 143.436657] print_report from kasan_report+0xc8/0x104
[ 143.437588] kasan_report from vmalloc_oob+0x10c/0x300
[ 143.438417] vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[ 143.439178] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.440082] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.441046] kthread from ret_from_fork+0x14/0x30
[ 143.441725] Exception stack(0xfa143fb0 to 0xfa143ff8)
[ 143.442344] 3fa0: 00000000 00000000 00000000 00000000
[ 143.443375] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.444316] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.445161]
[ 143.445443] The buggy address belongs to the virtual mapping at
[ 143.445443] [f18f5000, f18f7000) created by:
[ 143.445443] vmalloc_oob+0x88/0x300
[ 143.446951]
[ 143.447346] The buggy address belongs to the physical page:
[ 143.448038] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[ 143.448875] flags: 0x80000000(zone=2)
[ 143.449677] page_type: 0xffffffff()
[ 143.450348] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 143.451343] raw: 00000000
[ 143.451723] page dumped because: kasan: bad access detected
[ 143.452273]
[ 143.452582] Memory state around the buggy address:
[ 143.453319] f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.453972] f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.454738] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 143.455593] ^
[ 143.456249] f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.457169] f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.458005] ==================================================================
Home
[ 143.398212] ==================================================================
[ 143.399754] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x300
[ 143.400610] Read of size 1 at addr f18f57f3 by task kunit_try_catch/214
[ 143.401377]
[ 143.401662] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 143.402645] Hardware name: Generic DT based system
[ 143.403144] unwind_backtrace from show_stack+0x18/0x1c
[ 143.404050] show_stack from dump_stack_lvl+0x58/0x70
[ 143.404848] dump_stack_lvl from print_report+0x164/0x51c
[ 143.405636] print_report from kasan_report+0xc8/0x104
[ 143.406321] kasan_report from vmalloc_oob+0xd8/0x300
[ 143.407082] vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[ 143.407842] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 143.409057] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 143.409850] kthread from ret_from_fork+0x14/0x30
[ 143.410928] Exception stack(0xfa143fb0 to 0xfa143ff8)
[ 143.411643] 3fa0: 00000000 00000000 00000000 00000000
[ 143.412691] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 143.413743] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 143.414548]
[ 143.414894] The buggy address belongs to the virtual mapping at
[ 143.414894] [f18f5000, f18f7000) created by:
[ 143.414894] vmalloc_oob+0x88/0x300
[ 143.416354]
[ 143.416789] The buggy address belongs to the physical page:
[ 143.417796] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[ 143.418819] flags: 0x80000000(zone=2)
[ 143.419288] page_type: 0xffffffff()
[ 143.419730] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 143.420851] raw: 00000000
[ 143.421232] page dumped because: kasan: bad access detected
[ 143.421963]
[ 143.422348] Memory state around the buggy address:
[ 143.422926] f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.423866] f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 143.424794] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 143.425575] ^
[ 143.426367] f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.427206] f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 143.427890] ==================================================================
Home
------------[ cut here ]------------
[ 49.228250] WARNING: CPU: 0 PID: 470 at mm/util.c:632 kvmalloc_node+0xf4/0xf8
[ 49.229544] Modules linked in:
[ 49.231588] CPU: 0 PID: 470 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 49.232527] Hardware name: Generic DT based system
[ 49.234276] unwind_backtrace from show_stack+0x10/0x14
[ 49.235022] show_stack from dump_stack_lvl+0x40/0x4c
[ 49.235609] dump_stack_lvl from __warn+0x78/0x124
[ 49.236316] __warn from warn_slowpath_fmt+0x184/0x18c
[ 49.236953] warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[ 49.237449] kvmalloc_node from alloc_fdtable+0x88/0x104
[ 49.237821] alloc_fdtable from expand_files+0x78/0x2f4
[ 49.238758] expand_files from ksys_dup3+0x58/0xe0
[ 49.239081] ksys_dup3 from ret_fast_syscall+0x0/0x4c
[ 49.239674] Exception stack(0xfa211fa8 to 0xfa211ff0)
[ 49.240191] 1fa0: be8512bc 004a0000 00000002 2000003c 00000000 2000003c
[ 49.240570] 1fc0: be8512bc 004a0000 0049ff0c 0000003f 00482edd b6fbdce0 00000000 0049ff0c
[ 49.242105] 1fe0: 0000003f be8510e4 b6f1cf43 b6e9a786
[ 49.243602] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 34.110417] WARNING: CPU: 1 PID: 475 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 34.112477] Modules linked in:
[ 34.113651] CPU: 1 PID: 475 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 34.114382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 34.116267] EIP: kvmalloc_node+0xd1/0xe0
[ 34.116638] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 b2 de 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[ 34.117357] EAX: 00000000 EBX: 80001000 ECX: d8fbd4ed EDX: 00000000
[ 34.117633] ESI: 00400cc0 EDI: ffffffff EBP: c22c9eb8 ESP: c22c9ea4
[ 34.118545] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 34.119796] CR0: 80050033 CR2: b7ddde40 CR3: 02392000 CR4: 000006d0
[ 34.120495] Call Trace:
[ 34.123642] ? show_regs+0x4e/0x60
[ 34.123969] ? kvmalloc_node+0xd1/0xe0
[ 34.124140] ? __warn+0xa5/0x180
[ 34.125536] ? kvmalloc_node+0xd1/0xe0
[ 34.125967] ? kvmalloc_node+0xd1/0xe0
[ 34.126353] ? report_bug+0x11e/0x1b0
[ 34.126925] ? exc_overflow+0x38/0x38
[ 34.127696] ? handle_bug+0x48/0x68
[ 34.128020] ? exc_invalid_op+0x17/0x3c
[ 34.129480] ? handle_exception+0x133/0x133
[ 34.129926] ? kvmalloc_node+0x3d/0xe0
[ 34.130123] ? exc_overflow+0x38/0x38
[ 34.131673] ? kvmalloc_node+0xd1/0xe0
[ 34.132121] ? exc_overflow+0x38/0x38
[ 34.132980] ? kvmalloc_node+0xd1/0xe0
[ 34.134308] ? security_task_setrlimit+0x36/0x50
[ 34.135302] alloc_fdtable+0x70/0xf0
[ 34.137006] ? do_prlimit+0x11f/0x170
[ 34.137200] expand_files+0x101/0x2b0
[ 34.137369] ? __ia32_sys_prlimit64+0x20e/0x2c0
[ 34.137571] ksys_dup3+0x5b/0xb0
[ 34.137731] __ia32_sys_dup2+0x16/0x70
[ 34.139050] ia32_sys_call+0x273a/0x27d0
[ 34.139229] __do_fast_syscall_32+0x6c/0xb4
[ 34.139420] ? exit_to_user_mode_prepare+0x29/0xc0
[ 34.139614] do_fast_syscall_32+0x29/0x5c
[ 34.139802] do_SYSENTER_32+0x12/0x14
[ 34.139966] entry_SYSENTER_32+0x98/0xf9
[ 34.140349] EIP: 0xb7f7f539
[ 34.140880] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[ 34.142082] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7f64e14
[ 34.142515] ESI: 00424124 EDI: bffbd2a0 EBP: bffbd2b8 ESP: bffbd038
[ 34.143242] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 34.145049] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 32.120268] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xd8/0xe0
[ 32.121576] Modules linked in:
[ 32.122886] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 32.123292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.124007] EIP: kvmalloc_node+0xd8/0xe0
[ 32.124418] Code: ff 2d 00 20 80 00 89 04 24 89 d8 e8 fe 22 03 00 8b 5d f4 8b 75 f8 8b 7d fc 89 ec 5d c3 90 81 e6 00 20 00 00 0f 85 49 ff ff ff <0f> 0b e9 42 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[ 32.127174] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[ 32.127478] ESI: 00000000 EDI: ffffffff EBP: c1f0bef0 ESP: c1f0becc
[ 32.127983] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 32.129080] CR0: 80050033 CR2: b7e877d0 CR3: 022d0000 CR4: 000006d0
[ 32.130126] Call Trace:
[ 32.131832] ? show_regs+0x4d/0x54
[ 32.132075] ? kvmalloc_node+0xd8/0xe0
[ 32.132225] ? __warn+0x84/0x150
[ 32.132363] ? kvmalloc_node+0xd8/0xe0
[ 32.132572] ? kvmalloc_node+0xd8/0xe0
[ 32.132942] ? report_bug+0x189/0x1b0
[ 32.133392] ? kvmalloc_node+0xd9/0xe0
[ 32.133941] ? exc_overflow+0x50/0x50
[ 32.134331] ? handle_bug+0x56/0x90
[ 32.134578] ? exc_invalid_op+0x1b/0x70
[ 32.134726] ? kvmalloc_node+0x59/0xe0
[ 32.134871] ? handle_exception+0x133/0x133
[ 32.135108] ? exc_overflow+0x50/0x50
[ 32.135272] ? kvmalloc_node+0xd8/0xe0
[ 32.135425] ? exc_overflow+0x50/0x50
[ 32.136152] ? kvmalloc_node+0xd8/0xe0
[ 32.136428] ? kmalloc_trace+0x2b/0xa0
[ 32.138019] ? alloc_fdtable+0x42/0xd8
[ 32.138286] ? finish_task_switch.isra.0+0x73/0x254
[ 32.139242] ? __switch_to_asm+0x3b/0xf0
[ 32.140183] ? __switch_to_asm+0x35/0xf0
[ 32.140485] alloc_fdtable+0x67/0xd8
[ 32.141171] expand_files+0x55/0x81c
[ 32.141457] ksys_dup3+0x5a/0xe4
[ 32.142374] __ia32_sys_dup2+0x19/0x70
[ 32.142561] ia32_sys_call+0x1d96/0x2738
[ 32.143729] __do_fast_syscall_32+0x45/0xac
[ 32.144010] do_fast_syscall_32+0x32/0x74
[ 32.144260] do_SYSENTER_32+0x15/0x24
[ 32.145365] entry_SYSENTER_32+0x98/0xf9
[ 32.145922] EIP: 0xb7fc3579
[ 32.146442] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 32.147429] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7fa8e14
[ 32.148578] ESI: 004235cc EDI: bfa5cb00 EBP: bfa5cc78 ESP: bfa5ca68
[ 32.149636] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 32.150625] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 344.490389] WARNING: CPU: 0 PID: 11385 at fs/namespace.c:1245 cleanup_mnt+0x118/0x18c
[ 344.490647] Modules linked in: overlay drm backlight i2c_core drm_panel_orientation_quirks dm_mod ip_tables x_tables
[ 344.491208] CPU: 0 PID: 11385 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 344.491269] Hardware name: riscv-virtio,qemu (DT)
[ 344.491486] epc : cleanup_mnt+0x118/0x18c
[ 344.491578] ra : __cleanup_mnt+0x1c/0x24
[ 344.491619] epc : ffffffff802ebb58 ra : ffffffff802eba38 sp : ff20000001a6bdd0
[ 344.491655] gp : ffffffff81a3d2e8 tp : ff60000082600000 t0 : fffc000000000000
[ 344.491688] t1 : 00000000000000fd t2 : 0000000000000002 s0 : ff20000001a6be00
[ 344.491719] s1 : 0000000000000003 a0 : ffffffffffffffff a1 : 0000000000000000
[ 344.491753] a2 : 0000000000000000 a3 : 000000000000003f a4 : ffffffff81a7e0b0
[ 344.491786] a5 : fffffffffffffffc a6 : ffffffffffffffff a7 : 0000000000001000
[ 344.491815] s2 : ff60000082960000 s3 : ff60000082600830 s4 : ffffffff81a4f860
[ 344.491847] s5 : ff60000082960180 s6 : ffffffff81342492 s7 : 0000000000002000
[ 344.491881] s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[ 344.491937] s11: 0000000000000008 t3 : 00000007fffffff8 t4 : ff60000085bd26c8
[ 344.491967] t5 : 0000000000000000 t6 : 0000000000001551
[ 344.491997] status: 0000000200000120 badaddr: ffffffff802ebb58 cause: 0000000000000003
[ 344.492166] [<ffffffff802ebb58>] cleanup_mnt+0x118/0x18c
[ 344.492372] [<ffffffff802eba38>] __cleanup_mnt+0x1c/0x24
[ 344.492402] [<ffffffff80056852>] task_work_run+0x92/0xc4
[ 344.492437] [<ffffffff800c1a9a>] exit_to_user_mode_loop+0xd8/0xec
[ 344.492463] [<ffffffff800c157e>] exit_to_user_mode_prepare+0x24/0x2c
[ 344.492486] [<ffffffff80bbad30>] syscall_exit_to_user_mode+0x26/0x38
[ 344.492520] [<ffffffff80bbaa20>] do_trap_ecall_u+0x60/0xa0
[ 344.492577] [<ffffffff80bc57d8>] ret_from_exception+0x0/0x64
[ 344.492753] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 344.490389] WARNING: CPU: 0 PID: 11385 at fs/namespace.c:1245 cleanup_mnt+0x118/0x18c
[ 344.490647] Modules linked in: overlay drm backlight i2c_core drm_panel_orientation_quirks dm_mod ip_tables x_tables
[ 344.491208] CPU: 0 PID: 11385 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 344.491269] Hardware name: riscv-virtio,qemu (DT)
[ 344.491486] epc : cleanup_mnt+0x118/0x18c
[ 344.491578] ra : __cleanup_mnt+0x1c/0x24
[ 344.491619] epc : ffffffff802ebb58 ra : ffffffff802eba38 sp : ff20000001a6bdd0
[ 344.491655] gp : ffffffff81a3d2e8 tp : ff60000082600000 t0 : fffc000000000000
[ 344.491688] t1 : 00000000000000fd t2 : 0000000000000002 s0 : ff20000001a6be00
[ 344.491719] s1 : 0000000000000003 a0 : ffffffffffffffff a1 : 0000000000000000
[ 344.491753] a2 : 0000000000000000 a3 : 000000000000003f a4 : ffffffff81a7e0b0
[ 344.491786] a5 : fffffffffffffffc a6 : ffffffffffffffff a7 : 0000000000001000
[ 344.491815] s2 : ff60000082960000 s3 : ff60000082600830 s4 : ffffffff81a4f860
[ 344.491847] s5 : ff60000082960180 s6 : ffffffff81342492 s7 : 0000000000002000
[ 344.491881] s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[ 344.491937] s11: 0000000000000008 t3 : 00000007fffffff8 t4 : ff60000085bd26c8
[ 344.491967] t5 : 0000000000000000 t6 : 0000000000001551
[ 344.491997] status: 0000000200000120 badaddr: ffffffff802ebb58 cause: 0000000000000003
[ 344.492166] [<ffffffff802ebb58>] cleanup_mnt+0x118/0x18c
[ 344.492372] [<ffffffff802eba38>] __cleanup_mnt+0x1c/0x24
[ 344.492402] [<ffffffff80056852>] task_work_run+0x92/0xc4
[ 344.492437] [<ffffffff800c1a9a>] exit_to_user_mode_loop+0xd8/0xec
[ 344.492463] [<ffffffff800c157e>] exit_to_user_mode_prepare+0x24/0x2c
[ 344.492486] [<ffffffff80bbad30>] syscall_exit_to_user_mode+0x26/0x38
[ 344.492520] [<ffffffff80bbaa20>] do_trap_ecall_u+0x60/0xa0
[ 344.492577] [<ffffffff80bc57d8>] ret_from_exception+0x0/0x64
[ 344.492753] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 125.773548] event 'ma_read' has unsafe pointer field 'fn'
[ 125.774851] WARNING: CPU: 1 PID: 309 at kernel/trace/trace.c:3881 ignore_event+0x1f8/0x214
[ 125.775012] Modules linked in: drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[ 125.775477] CPU: 1 PID: 309 Comm: cat Not tainted 6.6.72-rc1 #1
[ 125.775511] Hardware name: riscv-virtio,qemu (DT)
[ 125.775590] epc : ignore_event+0x1f8/0x214
[ 125.775623] ra : ignore_event+0x1f8/0x214
[ 125.775670] epc : ffffffff8012b93c ra : ffffffff8012b93c sp : ff200000004b3c00
[ 125.775686] gp : ffffffff81a320e8 tp : ff60000086d2c600 t0 : ffffffff8182d538
[ 125.775702] t1 : 000000000000002d t2 : 205b2d2d2d2d2d2d s0 : ff200000004b3c70
[ 125.775716] s1 : ff6000008014f150 a0 : 000000000000002d a1 : 0000000000000001
[ 125.775729] a2 : 0000000000000000 a3 : 0000000000000008 a4 : 0000000000000000
[ 125.775742] a5 : 0000000000000000 a6 : ffffffffffffe000 a7 : 0000000000000010
[ 125.775756] s2 : ffffffff81600c80 s3 : ff600000862ec0a0 s4 : ffffffff819bf810
[ 125.775771] s5 : ff600000862ed0d8 s6 : ff60000087323018 s7 : ff600000862ed0a0
[ 125.775788] s8 : ffffffff81000000 s9 : ffffffff81600000 s10: ffffffff819cbe68
[ 125.775805] s11: ff600000862ee000 t3 : ffffffff81a48742 t4 : ffffffff81a48742
[ 125.775822] t5 : ffffffff81a48748 t6 : ff200000004b3a18
[ 125.775836] status: 0000000200000120 badaddr: ffffffff8012b93c cause: 0000000000000003
[ 125.775892] [<ffffffff8012b93c>] ignore_event+0x1f8/0x214
[ 125.775919] [<ffffffff80130b66>] trace_event_printf+0x36/0x80
[ 125.775946] [<ffffffff80ba4b24>] trace_raw_output_ma_read+0x5e/0x7a
[ 125.776230] [<ffffffff8012cf58>] print_trace_line+0x1d8/0x4a8
[ 125.776252] [<ffffffff8012d81c>] tracing_read_pipe+0x168/0x302
[ 125.776272] [<ffffffff802aa6ea>] vfs_read+0xac/0x27c
[ 125.776303] [<ffffffff802ab0c6>] ksys_read+0x68/0xec
[ 125.776327] [<ffffffff802ab16a>] __riscv_sys_read+0x20/0x28
[ 125.776352] [<ffffffff80bcfd1c>] do_trap_ecall_u+0x12a/0x13c
[ 125.776382] [<ffffffff80bdb9c8>] ret_from_exception+0x0/0x64
[ 125.776523] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 323.346314] WARNING: CPU: 0 PID: 11383 at fs/namespace.c:1245 cleanup_mnt+0x116/0x12a
[ 323.346544] Modules linked in: overlay drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[ 323.347022] CPU: 0 PID: 11383 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 323.347077] Hardware name: riscv-virtio,qemu (DT)
[ 323.347282] epc : cleanup_mnt+0x116/0x12a
[ 323.347377] ra : cleanup_mnt+0x1c/0x12a
[ 323.347436] epc : ffffffff802d2a6e ra : ffffffff802d2974 sp : ff20000001e8bdd0
[ 323.347470] gp : ffffffff81a320e8 tp : ff60000082500000 t0 : 0000000000000001
[ 323.347501] t1 : 000000000000ffff t2 : ffffffffffffffc0 s0 : ff20000001e8be00
[ 323.347535] s1 : 0000000000000000 a0 : ffffffffffffffff a1 : 0000000000000003
[ 323.347567] a2 : fffffffe820c6bbc a3 : ff6000017df2d000 a4 : 0000000000000001
[ 323.347599] a5 : 0000000000000000 a6 : ffffffff81a72f58 a7 : 0000000000000001
[ 323.347630] s2 : ff600000839d6780 s3 : ff60000082500830 s4 : ff600000825008a0
[ 323.347662] s5 : ff60000082501000 s6 : ff60000082500000 s7 : ffffffff81a44810
[ 323.347692] s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[ 323.347723] s11: 0000000000000008 t3 : 00000000ffffffff t4 : 0000000000000040
[ 323.347752] t5 : 00000000fa83b2da t6 : 000000000004f515
[ 323.347791] status: 0000000200000120 badaddr: ffffffff802d2a6e cause: 0000000000000003
[ 323.347903] [<ffffffff802d2a6e>] cleanup_mnt+0x116/0x12a
[ 323.348043] [<ffffffff802d2aec>] __cleanup_mnt+0x1c/0x24
[ 323.348069] [<ffffffff800557a4>] task_work_run+0x80/0xc0
[ 323.348101] [<ffffffff800be790>] exit_to_user_mode_loop.isra.0+0x106/0x10a
[ 323.348128] [<ffffffff80bd0112>] syscall_exit_to_user_mode+0x5a/0x76
[ 323.348163] [<ffffffff80bcfc3e>] do_trap_ecall_u+0x4c/0x13c
[ 323.348188] [<ffffffff80bdb9c8>] ret_from_exception+0x0/0x64
[ 323.348347] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 323.346314] WARNING: CPU: 0 PID: 11383 at fs/namespace.c:1245 cleanup_mnt+0x116/0x12a
[ 323.346544] Modules linked in: overlay drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[ 323.347022] CPU: 0 PID: 11383 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 323.347077] Hardware name: riscv-virtio,qemu (DT)
[ 323.347282] epc : cleanup_mnt+0x116/0x12a
[ 323.347377] ra : cleanup_mnt+0x1c/0x12a
[ 323.347436] epc : ffffffff802d2a6e ra : ffffffff802d2974 sp : ff20000001e8bdd0
[ 323.347470] gp : ffffffff81a320e8 tp : ff60000082500000 t0 : 0000000000000001
[ 323.347501] t1 : 000000000000ffff t2 : ffffffffffffffc0 s0 : ff20000001e8be00
[ 323.347535] s1 : 0000000000000000 a0 : ffffffffffffffff a1 : 0000000000000003
[ 323.347567] a2 : fffffffe820c6bbc a3 : ff6000017df2d000 a4 : 0000000000000001
[ 323.347599] a5 : 0000000000000000 a6 : ffffffff81a72f58 a7 : 0000000000000001
[ 323.347630] s2 : ff600000839d6780 s3 : ff60000082500830 s4 : ff600000825008a0
[ 323.347662] s5 : ff60000082501000 s6 : ff60000082500000 s7 : ffffffff81a44810
[ 323.347692] s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[ 323.347723] s11: 0000000000000008 t3 : 00000000ffffffff t4 : 0000000000000040
[ 323.347752] t5 : 00000000fa83b2da t6 : 000000000004f515
[ 323.347791] status: 0000000200000120 badaddr: ffffffff802d2a6e cause: 0000000000000003
[ 323.347903] [<ffffffff802d2a6e>] cleanup_mnt+0x116/0x12a
[ 323.348043] [<ffffffff802d2aec>] __cleanup_mnt+0x1c/0x24
[ 323.348069] [<ffffffff800557a4>] task_work_run+0x80/0xc0
[ 323.348101] [<ffffffff800be790>] exit_to_user_mode_loop.isra.0+0x106/0x10a
[ 323.348128] [<ffffffff80bd0112>] syscall_exit_to_user_mode+0x5a/0x76
[ 323.348163] [<ffffffff80bcfc3e>] do_trap_ecall_u+0x4c/0x13c
[ 323.348188] [<ffffffff80bdb9c8>] ret_from_exception+0x0/0x64
[ 323.348347] ---[ end trace 0000000000000000 ]---
Home
[ 82.504461] Kernel panic - not syncing: Fatal exception in interrupt
[ 82.504467] ? down_write+0x53/0x70
[ 82.504507] ? up_write+0x5/0x70
[ 82.504559] ? up_write+0x5/0x70
[ 82.504604] ? free_pgtables+0xa7/0x190
[ 82.504688] exit_mmap+0x279/0x4a0
[ 82.504878] __mmput+0x47/0x110
[ 82.504919] mmput+0x27/0x30
[ 82.504968] exit_mm+0xe1/0x160
[ 82.505032] do_exit+0x247/0x970
[ 82.505060] ? _raw_spin_unlock_irq+0x20/0x40
[ 82.505092] ? preempt_count_sub+0x63/0x80
[ 82.505152] do_group_exit+0x92/0xa0
[ 82.505209] __ia32_sys_exit_group+0x1b/0x20
[ 82.505243] ia32_sys_call+0x2615/0x3010
[ 82.505275] __do_fast_syscall_32+0xb4/0x110
[ 82.505314] ? irqentry_exit_to_user_mode+0x17/0x20
[ 82.505367] do_fast_syscall_32+0x37/0x80
[ 82.505410] do_SYSENTER_32+0x1f/0x30
[ 82.505443] entry_SYSENTER_compat_after_hwframe+0x85/0x97
[ 82.505473] RIP: 0023:0xf7f26539
[ 82.505531] Code: Unable to access opcode bytes at 0xf7f2650f.
[ 82.505545] RSP: 002b:00000000ffd15398 EFLAGS: 00000206 ORIG_RAX: 00000000000000fc
[ 82.505584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000ffffffb8
[ 82.505603] RDX: 00000000000000fc RSI: 0000000000000003 RDI: 0000000000000004
[ 82.505620] RBP: 00000000ffd154c8 R08: 0000000000000000 R09: 0000000000000000
[ 82.505637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
[ 82.505654] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 82.505778] </TASK>
[ 82.505791] Modules linked in:
[ 82.505852] ---[ end trace 0000000000000000 ]---
[ 82.505872] RIP: 0010:up_write+0x5/0x70
[ 82.505906] Code: eb dd f0 48 83 63 08 fd eb e7 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f <1f> 44 00 00 55 48 89 e5 53 48 89 fb bf 01 00 00 00 e8 f5 6c fc ff
[ 82.505928] RSP: 0018:ffffa994c0817b78 EFLAGS: 00000286
[ 82.505969] RAX: 0000000080000000 RBX: ffffa259c0051a40 RCX: 0000000080000001
[ 82.505990] RDX: 0000000000000c01 RSI: ffffffffab571c23 RDI: ffffa259c43bc820
[ 82.506006] RBP: ffffa994c0817be8 R08: ffffa994c0817a68 R09: 0000000000000000
[ 82.506024] R10: 00000000f7eff000 R11: 00000000f7eff000 R12: ffffa259c0051a40
[ 82.506042] R13: 00000000f7eff000 R14: ffffa259c27d02a0 R15: 000000000000000c
[ 82.506060] FS: 0000000000000000(0000) GS:ffffa25a3bc00000(0000) knlGS:0000000000000000
[ 82.506086] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[ 82.506105] CR2: 00000000ffd1547c CR3: 000000005ce40000 CR4: 00000000000006f0
[ 85.859705] Shutting down cpus with NMI
[ 85.861849] Kernel Offset: 0x29200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 85.911969] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
Home
[ 82.504461] Kernel panic - not syncing: Fatal exception in interrupt
[ 82.504467] ? down_write+0x53/0x70
[ 82.504507] ? up_write+0x5/0x70
[ 82.504559] ? up_write+0x5/0x70
[ 82.504604] ? free_pgtables+0xa7/0x190
[ 82.504688] exit_mmap+0x279/0x4a0
[ 82.504878] __mmput+0x47/0x110
[ 82.504919] mmput+0x27/0x30
[ 82.504968] exit_mm+0xe1/0x160
[ 82.505032] do_exit+0x247/0x970
[ 82.505060] ? _raw_spin_unlock_irq+0x20/0x40
[ 82.505092] ? preempt_count_sub+0x63/0x80
[ 82.505152] do_group_exit+0x92/0xa0
[ 82.505209] __ia32_sys_exit_group+0x1b/0x20
[ 82.505243] ia32_sys_call+0x2615/0x3010
[ 82.505275] __do_fast_syscall_32+0xb4/0x110
[ 82.505314] ? irqentry_exit_to_user_mode+0x17/0x20
[ 82.505367] do_fast_syscall_32+0x37/0x80
[ 82.505410] do_SYSENTER_32+0x1f/0x30
[ 82.505443] entry_SYSENTER_compat_after_hwframe+0x85/0x97
[ 82.505473] RIP: 0023:0xf7f26539
[ 82.505531] Code: Unable to access opcode bytes at 0xf7f2650f.
[ 82.505545] RSP: 002b:00000000ffd15398 EFLAGS: 00000206 ORIG_RAX: 00000000000000fc
[ 82.505584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000ffffffb8
[ 82.505603] RDX: 00000000000000fc RSI: 0000000000000003 RDI: 0000000000000004
[ 82.505620] RBP: 00000000ffd154c8 R08: 0000000000000000 R09: 0000000000000000
[ 82.505637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
[ 82.505654] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 82.505778] </TASK>
[ 82.505791] Modules linked in:
[ 82.505852] ---[ end trace 0000000000000000 ]---
[ 82.505872] RIP: 0010:up_write+0x5/0x70
[ 82.505906] Code: eb dd f0 48 83 63 08 fd eb e7 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f <1f> 44 00 00 55 48 89 e5 53 48 89 fb bf 01 00 00 00 e8 f5 6c fc ff
[ 82.505928] RSP: 0018:ffffa994c0817b78 EFLAGS: 00000286
[ 82.505969] RAX: 0000000080000000 RBX: ffffa259c0051a40 RCX: 0000000080000001
[ 82.505990] RDX: 0000000000000c01 RSI: ffffffffab571c23 RDI: ffffa259c43bc820
[ 82.506006] RBP: ffffa994c0817be8 R08: ffffa994c0817a68 R09: 0000000000000000
[ 82.506024] R10: 00000000f7eff000 R11: 00000000f7eff000 R12: ffffa259c0051a40
[ 82.506042] R13: 00000000f7eff000 R14: ffffa259c27d02a0 R15: 000000000000000c
[ 82.506060] FS: 0000000000000000(0000) GS:ffffa25a3bc00000(0000) knlGS:0000000000000000
[ 82.506086] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[ 82.506105] CR2: 00000000ffd1547c CR3: 000000005ce40000 CR4: 00000000000006f0
[ 85.859705] Shutting down cpus with NMI
[ 85.861849] Kernel Offset: 0x29200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 85.911969] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
Home
------------[ cut here ]------------
[ 52.791053] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xde/0xf0
[ 52.793551] Modules linked in:
[ 52.795373] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 52.795822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.797860] RIP: 0010:kvmalloc_node+0xde/0xf0
[ 52.798334] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 16 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 <0f> 0b 31 c0 eb e5 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90
[ 52.798949] RSP: 0018:ffffad80405d7db0 EFLAGS: 00010246
[ 52.799225] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 52.799472] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa5445788
[ 52.799916] RBP: ffffad80405d7dc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 52.800491] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[ 52.801084] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[ 52.801988] FS: 00007faf84374740(0000) GS:ffff89567bd00000(0000) knlGS:0000000000000000
[ 52.803728] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 52.804221] CR2: 00007faf844fb942 CR3: 0000000101bcc000 CR4: 00000000000006e0
[ 52.805111] Call Trace:
[ 52.808182] <TASK>
[ 52.808933] ? show_regs+0x5c/0x70
[ 52.809260] ? __warn+0xc9/0x1d0
[ 52.809877] ? kvmalloc_node+0xde/0xf0
[ 52.810205] ? report_bug+0x152/0x200
[ 52.810985] ? handle_bug+0x68/0x90
[ 52.811183] ? exc_invalid_op+0x1f/0x50
[ 52.811336] ? asm_exc_invalid_op+0x1f/0x30
[ 52.813177] ? kvmalloc_node+0x48/0xf0
[ 52.813779] ? kvmalloc_node+0xde/0xf0
[ 52.814388] alloc_fdtable+0x7a/0x120
[ 52.815009] expand_files+0x11a/0x310
[ 52.815325] ? do_prlimit+0x120/0x160
[ 52.815609] ksys_dup3+0x75/0xe0
[ 52.815836] __x64_sys_dup2+0x25/0x90
[ 52.816304] x64_sys_call+0x256b/0x2d20
[ 52.817342] do_syscall_64+0x55/0xb0
[ 52.817741] ? exc_page_fault+0x65/0xc0
[ 52.818742] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 52.820493] RIP: 0033:0x7faf8446cc17
[ 52.821220] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 52.822296] RSP: 002b:00007fffc6ec73c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 52.822846] RAX: ffffffffffffffda RBX: 00007fffc6ec7c28 RCX: 00007faf8446cc17
[ 52.823348] RDX: 00007fffc6ec7548 RSI: 0000000040000038 RDI: 0000000000000002
[ 52.824319] RBP: 00007fffc6ec75e0 R08: 0000000000000064 R09: 0000000000000000
[ 52.824686] R10: 00007faf84389170 R11: 0000000000000202 R12: 0000000000000000
[ 52.825120] R13: 00007fffc6ec7c38 R14: 00007faf845a2000 R15: 000055dc20b96cf8
[ 52.827255] </TASK>
[ 52.827779] ---[ end trace 0000000000000000 ]---
Home
[ 49.391415] ==================================================================
[ 49.393142] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfe/0x1f0
[ 49.394644] Read of size 1 at addr ffff888102ad7cbf by task kunit_try_catch/204
[ 49.395613]
[ 49.396425] CPU: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.397636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.398784] Call Trace:
[ 49.399212] <TASK>
[ 49.399585] dump_stack_lvl+0x4e/0x90
[ 49.400693] print_report+0xd2/0x660
[ 49.401564] ? __virt_addr_valid+0x156/0x1e0
[ 49.402428] ? kasan_addr_to_slab+0x11/0xb0
[ 49.403220] kasan_report+0xff/0x140
[ 49.404035] ? kasan_alloca_oob_left+0xfe/0x1f0
[ 49.404458] ? kasan_alloca_oob_left+0xfe/0x1f0
[ 49.404757] __asan_load1+0x66/0x70
[ 49.405682] kasan_alloca_oob_left+0xfe/0x1f0
[ 49.406612] ? irqentry_exit+0x29/0x60
[ 49.407342] ? inat_get_escape_attribute+0x10/0xb0
[ 49.408151] ? trace_hardirqs_on+0x37/0xd0
[ 49.408896] ? irqentry_exit+0x29/0x60
[ 49.409482] ? __pfx_kasan_alloca_oob_left+0x10/0x10
[ 49.410179] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 49.410833] ? __pfx_kasan_alloca_oob_left+0x10/0x10
[ 49.411755] ? kunit_try_run_case+0x11b/0x290
[ 49.412362] kunit_try_run_case+0x126/0x290
[ 49.413516] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.413987] ? __kasan_check_write+0x18/0x20
[ 49.414651] ? trace_preempt_on+0x20/0xa0
[ 49.415522] ? __kthread_parkme+0x4f/0xd0
[ 49.416268] ? preempt_count_sub+0x50/0x80
[ 49.417529] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.418254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.418616] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.419447] kthread+0x19e/0x1e0
[ 49.420245] ? __pfx_kthread+0x10/0x10
[ 49.420947] ret_from_fork+0x41/0x70
[ 49.421610] ? __pfx_kthread+0x10/0x10
[ 49.422046] ret_from_fork_asm+0x1b/0x30
[ 49.422551] </TASK>
[ 49.422957]
[ 49.423315] The buggy address belongs to stack of task kunit_try_catch/204
[ 49.424079]
[ 49.424655] The buggy address belongs to the physical page:
[ 49.425545] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad7
[ 49.427031] flags: 0x200000000000000(node=0|zone=2)
[ 49.427946] page_type: 0xffffffff()
[ 49.428414] raw: 0200000000000000 ffffea00040ab5c8 ffffea00040ab5c8 0000000000000000
[ 49.429822] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 49.430592] page dumped because: kasan: bad access detected
[ 49.431672]
[ 49.432120] Memory state around the buggy address:
[ 49.432690] ffff888102ad7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.434248] ffff888102ad7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.435847] >ffff888102ad7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 49.436543] ^
[ 49.437312] ffff888102ad7d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 49.437844] ffff888102ad7d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[ 49.439081] ==================================================================
Home
[ 49.450776] ==================================================================
[ 49.451918] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x107/0x1f0
[ 49.452800] Read of size 1 at addr ffff888102affcca by task kunit_try_catch/206
[ 49.453955]
[ 49.454512] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.455709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.456939] Call Trace:
[ 49.457642] <TASK>
[ 49.458113] dump_stack_lvl+0x4e/0x90
[ 49.458848] print_report+0xd2/0x660
[ 49.459486] ? __virt_addr_valid+0x156/0x1e0
[ 49.460250] ? kasan_addr_to_slab+0x11/0xb0
[ 49.460856] kasan_report+0xff/0x140
[ 49.461497] ? kasan_alloca_oob_right+0x107/0x1f0
[ 49.462160] ? kasan_alloca_oob_right+0x107/0x1f0
[ 49.462882] __asan_load1+0x66/0x70
[ 49.463505] kasan_alloca_oob_right+0x107/0x1f0
[ 49.464186] ? trace_event_raw_event_ipi_handler+0xf0/0x130
[ 49.465058] ? __schedule+0x70b/0x1190
[ 49.465712] ? trace_hardirqs_on+0x37/0xd0
[ 49.466448] ? __pfx_kasan_alloca_oob_right+0x10/0x10
[ 49.467540] ? __schedule+0x70b/0x1190
[ 49.468199] ? ktime_get_ts64+0x118/0x140
[ 49.468897] kunit_try_run_case+0x126/0x290
[ 49.469531] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.470464] ? __kasan_check_write+0x18/0x20
[ 49.471141] ? trace_preempt_on+0x20/0xa0
[ 49.471727] ? __kthread_parkme+0x4f/0xd0
[ 49.472430] ? preempt_count_sub+0x50/0x80
[ 49.473134] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.473739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.474469] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.475294] kthread+0x19e/0x1e0
[ 49.475918] ? __pfx_kthread+0x10/0x10
[ 49.476554] ret_from_fork+0x41/0x70
[ 49.477244] ? __pfx_kthread+0x10/0x10
[ 49.477880] ret_from_fork_asm+0x1b/0x30
[ 49.478596] </TASK>
[ 49.479065]
[ 49.479391] The buggy address belongs to stack of task kunit_try_catch/206
[ 49.480329]
[ 49.480643] The buggy address belongs to the physical page:
[ 49.481467] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aff
[ 49.482715] flags: 0x200000000000000(node=0|zone=2)
[ 49.483597] page_type: 0xffffffff()
[ 49.484254] raw: 0200000000000000 ffffea00040abfc8 ffffea00040abfc8 0000000000000000
[ 49.485233] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 49.485964] page dumped because: kasan: bad access detected
[ 49.486588]
[ 49.486874] Memory state around the buggy address:
[ 49.487536] ffff888102affb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.488569] ffff888102affc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.489541] >ffff888102affc80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 49.490429] ^
[ 49.491183] ffff888102affd00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 49.491837] ffff888102affd80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[ 49.492543] ==================================================================
Home
[ 51.704635] ==================================================================
[ 51.705479] BUG: KASAN: double-free in kfree+0x7c/0x120
[ 51.706171] Free of addr ffff88810148a9e0 by task kunit_try_catch/228
[ 51.707010]
[ 51.707324] CPU: 1 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.708097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.709212] Call Trace:
[ 51.709593] <TASK>
[ 51.710020] dump_stack_lvl+0x4e/0x90
[ 51.710616] print_report+0xd2/0x660
[ 51.711076] ? __virt_addr_valid+0x156/0x1e0
[ 51.711728] ? kfree+0x7c/0x120
[ 51.712360] ? kasan_complete_mode_report_info+0x64/0x200
[ 51.713190] ? kfree+0x7c/0x120
[ 51.713779] kasan_report_invalid_free+0xcf/0x100
[ 51.714533] ? kfree+0x7c/0x120
[ 51.715038] ? kfree+0x7c/0x120
[ 51.715586] ____kasan_slab_free+0x19c/0x1d0
[ 51.716335] ? kfree_sensitive+0x2e/0x90
[ 51.716957] __kasan_slab_free+0x16/0x20
[ 51.717538] __kmem_cache_free+0x190/0x310
[ 51.718316] kfree+0x7c/0x120
[ 51.718869] kfree_sensitive+0x2e/0x90
[ 51.719428] kmalloc_double_kzfree+0xd4/0x1d0
[ 51.720198] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 51.720698] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 51.721493] ? kunit_try_run_case+0x11b/0x290
[ 51.722230] kunit_try_run_case+0x126/0x290
[ 51.722917] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.723619] ? __kasan_check_write+0x18/0x20
[ 51.724228] ? trace_preempt_on+0x20/0xa0
[ 51.724701] ? __kthread_parkme+0x4f/0xd0
[ 51.725474] ? preempt_count_sub+0x50/0x80
[ 51.726139] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.726919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.727799] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.728519] kthread+0x19e/0x1e0
[ 51.729180] ? __pfx_kthread+0x10/0x10
[ 51.729630] ret_from_fork+0x41/0x70
[ 51.730224] ? __pfx_kthread+0x10/0x10
[ 51.730936] ret_from_fork_asm+0x1b/0x30
[ 51.731611] </TASK>
[ 51.732115]
[ 51.732426] Allocated by task 228:
[ 51.733034] kasan_save_stack+0x3c/0x60
[ 51.733485] kasan_set_track+0x29/0x40
[ 51.733923] kasan_save_alloc_info+0x22/0x30
[ 51.734579] __kasan_kmalloc+0xb7/0xc0
[ 51.735195] kmalloc_trace+0x4c/0xb0
[ 51.735786] kmalloc_double_kzfree+0x9d/0x1d0
[ 51.736477] kunit_try_run_case+0x126/0x290
[ 51.737172] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.737877] kthread+0x19e/0x1e0
[ 51.738428] ret_from_fork+0x41/0x70
[ 51.739138] ret_from_fork_asm+0x1b/0x30
[ 51.739628]
[ 51.739927] Freed by task 228:
[ 51.740283] kasan_save_stack+0x3c/0x60
[ 51.740944] kasan_set_track+0x29/0x40
[ 51.741538] kasan_save_free_info+0x2f/0x50
[ 51.742211] ____kasan_slab_free+0x172/0x1d0
[ 51.742848] __kasan_slab_free+0x16/0x20
[ 51.743470] __kmem_cache_free+0x190/0x310
[ 51.744149] kfree+0x7c/0x120
[ 51.744623] kfree_sensitive+0x67/0x90
[ 51.745101] kmalloc_double_kzfree+0xbd/0x1d0
[ 51.745710] kunit_try_run_case+0x126/0x290
[ 51.746415] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.747235] kthread+0x19e/0x1e0
[ 51.749355] ret_from_fork+0x41/0x70
[ 51.750009] ret_from_fork_asm+0x1b/0x30
[ 51.750503]
[ 51.750792] The buggy address belongs to the object at ffff88810148a9e0
[ 51.750792] which belongs to the cache kmalloc-16 of size 16
[ 51.751834] The buggy address is located 0 bytes inside of
[ 51.751834] 16-byte region [ffff88810148a9e0, ffff88810148a9f0)
[ 51.753051]
[ 51.753354] The buggy address belongs to the physical page:
[ 51.753799] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[ 51.754734] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.755434] page_type: 0xffffffff()
[ 51.755987] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.756920] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.757729] page dumped because: kasan: bad access detected
[ 51.758301]
[ 51.758630] Memory state around the buggy address:
[ 51.759303] ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[ 51.760197] ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc fa fb fc fc
[ 51.760936] >ffff88810148a980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.761708] ^
[ 51.762383] ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.763011] ffff88810148aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.763706] ==================================================================
Home
[ 49.884659] ==================================================================
[ 49.885660] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x250
[ 49.886751] Free of addr ffff88810206f000 by task kunit_try_catch/212
[ 49.887560]
[ 49.887851] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.889017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.889819] Call Trace:
[ 49.890252] <TASK>
[ 49.890668] dump_stack_lvl+0x4e/0x90
[ 49.891339] print_report+0xd2/0x660
[ 49.891865] ? __virt_addr_valid+0x156/0x1e0
[ 49.892480] ? kmem_cache_double_free+0xeb/0x250
[ 49.893330] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.894594] ? kmem_cache_double_free+0xeb/0x250
[ 49.895481] kasan_report_invalid_free+0xcf/0x100
[ 49.896094] ? kmem_cache_double_free+0xeb/0x250
[ 49.897065] ? kmem_cache_double_free+0xeb/0x250
[ 49.897631] ____kasan_slab_free+0x19c/0x1d0
[ 49.898564] ? kmem_cache_double_free+0xeb/0x250
[ 49.899337] __kasan_slab_free+0x16/0x20
[ 49.900207] kmem_cache_free+0x1a7/0x4b0
[ 49.900974] kmem_cache_double_free+0xeb/0x250
[ 49.901589] ? __pfx_kmem_cache_double_free+0x10/0x10
[ 49.902326] ? __schedule+0x70b/0x1190
[ 49.902837] ? irqentry_exit+0x29/0x60
[ 49.903377] ? ktime_get_ts64+0x118/0x140
[ 49.904675] kunit_try_run_case+0x126/0x290
[ 49.905217] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.905810] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 49.906441] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.907217] ? kunit_generic_run_threadfn_adapter+0x29/0x50
[ 49.907878] ? __kthread_parkme+0xaa/0xd0
[ 49.909215] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.909732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.910390] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.911685] kthread+0x19e/0x1e0
[ 49.912299] ? __pfx_kthread+0x10/0x10
[ 49.913103] ret_from_fork+0x41/0x70
[ 49.913676] ? __pfx_kthread+0x10/0x10
[ 49.914580] ret_from_fork_asm+0x1b/0x30
[ 49.915221] </TASK>
[ 49.915504]
[ 49.915713] Allocated by task 212:
[ 49.916099] kasan_save_stack+0x3c/0x60
[ 49.916538] kasan_set_track+0x29/0x40
[ 49.918174] kasan_save_alloc_info+0x22/0x30
[ 49.918797] __kasan_slab_alloc+0x91/0xa0
[ 49.919457] kmem_cache_alloc+0x180/0x3b0
[ 49.920154] kmem_cache_double_free+0xba/0x250
[ 49.921037] kunit_try_run_case+0x126/0x290
[ 49.921626] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.922308] kthread+0x19e/0x1e0
[ 49.922816] ret_from_fork+0x41/0x70
[ 49.923421] ret_from_fork_asm+0x1b/0x30
[ 49.924639]
[ 49.924869] Freed by task 212:
[ 49.925313] kasan_save_stack+0x3c/0x60
[ 49.925906] kasan_set_track+0x29/0x40
[ 49.926442] kasan_save_free_info+0x2f/0x50
[ 49.927072] ____kasan_slab_free+0x172/0x1d0
[ 49.927559] __kasan_slab_free+0x16/0x20
[ 49.928919] kmem_cache_free+0x1a7/0x4b0
[ 49.929421] kmem_cache_double_free+0xd1/0x250
[ 49.930130] kunit_try_run_case+0x126/0x290
[ 49.930629] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.931756] kthread+0x19e/0x1e0
[ 49.933007] ret_from_fork+0x41/0x70
[ 49.933505] ret_from_fork_asm+0x1b/0x30
[ 49.933964]
[ 49.934500] The buggy address belongs to the object at ffff88810206f000
[ 49.934500] which belongs to the cache test_cache of size 200
[ 49.935561] The buggy address is located 0 bytes inside of
[ 49.935561] 200-byte region [ffff88810206f000, ffff88810206f0c8)
[ 49.936870]
[ 49.937728] The buggy address belongs to the physical page:
[ 49.938713] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10206f
[ 49.940118] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.940695] page_type: 0xffffffff()
[ 49.941517] raw: 0200000000000800 ffff88810206c000 dead000000000122 0000000000000000
[ 49.942513] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 49.943809] page dumped because: kasan: bad access detected
[ 49.944389]
[ 49.944598] Memory state around the buggy address:
[ 49.945131] ffff88810206ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.946082] ffff88810206ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.947715] >ffff88810206f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.948640] ^
[ 49.948956] ffff88810206f080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 49.950107] ffff88810206f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.951222] ==================================================================
Home
[ 49.279580] ==================================================================
[ 49.280841] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170
[ 49.282201] Read of size 1 at addr ffffffff9afa96ed by task kunit_try_catch/198
[ 49.282848]
[ 49.283224] CPU: 1 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.285222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.286510] Call Trace:
[ 49.287220] <TASK>
[ 49.287506] dump_stack_lvl+0x4e/0x90
[ 49.288687] print_report+0xd2/0x660
[ 49.289329] ? __virt_addr_valid+0x156/0x1e0
[ 49.290337] ? kasan_addr_to_slab+0x11/0xb0
[ 49.291216] kasan_report+0xff/0x140
[ 49.291666] ? kasan_global_oob_right+0xa3/0x170
[ 49.292695] ? kasan_global_oob_right+0xa3/0x170
[ 49.293359] __asan_load1+0x66/0x70
[ 49.294233] kasan_global_oob_right+0xa3/0x170
[ 49.295009] ? __pfx_kasan_global_oob_right+0x10/0x10
[ 49.295447] ? ktime_get_ts64+0x118/0x140
[ 49.295732] kunit_try_run_case+0x126/0x290
[ 49.296860] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.297563] ? __kasan_check_write+0x18/0x20
[ 49.298630] ? trace_preempt_on+0x20/0xa0
[ 49.299403] ? __kthread_parkme+0x4f/0xd0
[ 49.300375] ? preempt_count_sub+0x50/0x80
[ 49.301097] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.301673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.302702] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.304032] kthread+0x19e/0x1e0
[ 49.304529] ? __pfx_kthread+0x10/0x10
[ 49.305458] ret_from_fork+0x41/0x70
[ 49.306082] ? __pfx_kthread+0x10/0x10
[ 49.306541] ret_from_fork_asm+0x1b/0x30
[ 49.308047] </TASK>
[ 49.308652]
[ 49.309147] The buggy address belongs to the variable:
[ 49.309898] global_array+0xd/0x40
[ 49.310644]
[ 49.311223] The buggy address belongs to the physical page:
[ 49.311839] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x297a9
[ 49.312663] flags: 0x100000000004000(reserved|node=0|zone=1)
[ 49.313686] page_type: 0xffffffff()
[ 49.314518] raw: 0100000000004000 ffffea0000a5ea48 ffffea0000a5ea48 0000000000000000
[ 49.315677] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 49.316614] page dumped because: kasan: bad access detected
[ 49.317136]
[ 49.317553] Memory state around the buggy address:
[ 49.318294] ffffffff9afa9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.319615] ffffffff9afa9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.320642] >ffffffff9afa9680: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 49.321510] ^
[ 49.322526] ffffffff9afa9700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 49.323346] ffffffff9afa9780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[ 49.324140] ==================================================================
Home
[ 46.845420] ==================================================================
[ 46.846745] BUG: KASAN: invalid-free in kfree+0xfb/0x120
[ 46.848148] Free of addr ffff888102108001 by task kunit_try_catch/144
[ 46.849254]
[ 46.849647] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.851418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.852462] Call Trace:
[ 46.852840] <TASK>
[ 46.853444] dump_stack_lvl+0x4e/0x90
[ 46.854103] print_report+0xd2/0x660
[ 46.855076] ? __virt_addr_valid+0x156/0x1e0
[ 46.855785] ? kfree+0xfb/0x120
[ 46.856400] ? kasan_addr_to_slab+0x11/0xb0
[ 46.857016] ? kfree+0xfb/0x120
[ 46.857563] kasan_report_invalid_free+0xcf/0x100
[ 46.858167] ? kfree+0xfb/0x120
[ 46.859177] ? kfree+0xfb/0x120
[ 46.859802] __kasan_kfree_large+0x86/0xd0
[ 46.860749] free_large_kmalloc+0x46/0xd0
[ 46.861478] kfree+0xfb/0x120
[ 46.861918] kmalloc_pagealloc_invalid_free+0xa9/0x1a0
[ 46.863171] ? __pfx_kmalloc_pagealloc_invalid_free+0x10/0x10
[ 46.864117] ? ktime_get_ts64+0x118/0x140
[ 46.864640] kunit_try_run_case+0x126/0x290
[ 46.865473] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.866345] ? __kasan_check_write+0x18/0x20
[ 46.867024] ? trace_preempt_on+0x20/0xa0
[ 46.867554] ? __kthread_parkme+0x4f/0xd0
[ 46.868123] ? preempt_count_sub+0x50/0x80
[ 46.868748] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.869601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.870580] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.871392] kthread+0x19e/0x1e0
[ 46.872205] ? __pfx_kthread+0x10/0x10
[ 46.872883] ret_from_fork+0x41/0x70
[ 46.873433] ? __pfx_kthread+0x10/0x10
[ 46.874037] ret_from_fork_asm+0x1b/0x30
[ 46.875055] </TASK>
[ 46.875299]
[ 46.875793] The buggy address belongs to the physical page:
[ 46.876697] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102108
[ 46.878052] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 46.879074] flags: 0x200000000000040(head|node=0|zone=2)
[ 46.880177] page_type: 0xffffffff()
[ 46.880504] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 46.881464] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 46.882586] page dumped because: kasan: bad access detected
[ 46.883422]
[ 46.884018] Memory state around the buggy address:
[ 46.884592] ffff888102107f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.885155] ffff888102107f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.886632] >ffff888102108000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.887337] ^
[ 46.887742] ffff888102108080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.888773] ffff888102108100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.889784] ==================================================================
Home
[ 49.972491] ==================================================================
[ 49.973493] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x260
[ 49.975178] Free of addr ffff888102850001 by task kunit_try_catch/214
[ 49.976487]
[ 49.977016] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.977692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.979103] Call Trace:
[ 49.979533] <TASK>
[ 49.980078] dump_stack_lvl+0x4e/0x90
[ 49.980619] print_report+0xd2/0x660
[ 49.981508] ? __virt_addr_valid+0x156/0x1e0
[ 49.982258] ? kmem_cache_invalid_free+0xe4/0x260
[ 49.982854] ? kasan_complete_mode_report_info+0x2a/0x200
[ 49.984228] ? kmem_cache_invalid_free+0xe4/0x260
[ 49.984866] kasan_report_invalid_free+0xcf/0x100
[ 49.985470] ? kmem_cache_invalid_free+0xe4/0x260
[ 49.986322] ? kmem_cache_invalid_free+0xe4/0x260
[ 49.986886] ____kasan_slab_free+0x1c0/0x1d0
[ 49.987722] ? kmem_cache_invalid_free+0xe4/0x260
[ 49.988176] __kasan_slab_free+0x16/0x20
[ 49.988700] kmem_cache_free+0x1a7/0x4b0
[ 49.989196] kmem_cache_invalid_free+0xe4/0x260
[ 49.990219] ? __pfx_kmem_cache_invalid_free+0x10/0x10
[ 49.991090] ? __schedule+0x70b/0x1190
[ 49.991621] ? ktime_get_ts64+0x118/0x140
[ 49.992429] kunit_try_run_case+0x126/0x290
[ 49.992979] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.994023] ? __kasan_check_write+0x18/0x20
[ 49.994640] ? trace_preempt_on+0x20/0xa0
[ 49.995229] ? __kthread_parkme+0x4f/0xd0
[ 49.995947] ? preempt_count_sub+0x50/0x80
[ 49.996704] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.997366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.998493] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.999351] kthread+0x19e/0x1e0
[ 50.000063] ? __pfx_kthread+0x10/0x10
[ 50.000696] ret_from_fork+0x41/0x70
[ 50.001276] ? __pfx_kthread+0x10/0x10
[ 50.001734] ret_from_fork_asm+0x1b/0x30
[ 50.003023] </TASK>
[ 50.003398]
[ 50.003626] Allocated by task 214:
[ 50.004437] kasan_save_stack+0x3c/0x60
[ 50.005294] kasan_set_track+0x29/0x40
[ 50.006441] kasan_save_alloc_info+0x22/0x30
[ 50.006976] __kasan_slab_alloc+0x91/0xa0
[ 50.007745] kmem_cache_alloc+0x180/0x3b0
[ 50.008317] kmem_cache_invalid_free+0xbd/0x260
[ 50.009448] kunit_try_run_case+0x126/0x290
[ 50.010052] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.011360] kthread+0x19e/0x1e0
[ 50.011813] ret_from_fork+0x41/0x70
[ 50.012588] ret_from_fork_asm+0x1b/0x30
[ 50.013468]
[ 50.013693] The buggy address belongs to the object at ffff888102850000
[ 50.013693] which belongs to the cache test_cache of size 200
[ 50.014926] The buggy address is located 1 bytes inside of
[ 50.014926] 200-byte region [ffff888102850000, ffff8881028500c8)
[ 50.017243]
[ 50.017562] The buggy address belongs to the physical page:
[ 50.018408] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[ 50.020033] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.020693] page_type: 0xffffffff()
[ 50.021198] raw: 0200000000000800 ffff888101ba1dc0 dead000000000122 0000000000000000
[ 50.022161] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 50.023600] page dumped because: kasan: bad access detected
[ 50.024466]
[ 50.024842] Memory state around the buggy address:
[ 50.025878] ffff88810284ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.026756] ffff88810284ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.027639] >ffff888102850000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 50.028601] ^
[ 50.029235] ffff888102850080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 50.029964] ffff888102850100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.031144] ==================================================================
Home
[ 48.288558] ==================================================================
[ 48.289629] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xeb/0x1f0
[ 48.290607] Read of size 18446744073709551614 at addr ffff888102067484 by task kunit_try_catch/176
[ 48.291551]
[ 48.291883] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.293159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.294130] Call Trace:
[ 48.294597] <TASK>
[ 48.295174] dump_stack_lvl+0x4e/0x90
[ 48.295788] print_report+0xd2/0x660
[ 48.296328] ? __virt_addr_valid+0x156/0x1e0
[ 48.296887] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.297721] kasan_report+0xff/0x140
[ 48.298240] ? kmalloc_memmove_negative_size+0xeb/0x1f0
[ 48.298903] ? kmalloc_memmove_negative_size+0xeb/0x1f0
[ 48.299640] kasan_check_range+0x10c/0x1c0
[ 48.300254] __asan_memmove+0x27/0x70
[ 48.300860] kmalloc_memmove_negative_size+0xeb/0x1f0
[ 48.301487] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[ 48.302289] ? __schedule+0x70b/0x1190
[ 48.302796] ? ktime_get_ts64+0x118/0x140
[ 48.303443] kunit_try_run_case+0x126/0x290
[ 48.304071] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.304733] ? __kasan_check_write+0x18/0x20
[ 48.305361] ? trace_preempt_on+0x20/0xa0
[ 48.305944] ? __kthread_parkme+0x4f/0xd0
[ 48.306482] ? preempt_count_sub+0x50/0x80
[ 48.307118] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.307830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.308594] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.309303] kthread+0x19e/0x1e0
[ 48.309889] ? __pfx_kthread+0x10/0x10
[ 48.310441] ret_from_fork+0x41/0x70
[ 48.310982] ? __pfx_kthread+0x10/0x10
[ 48.311570] ret_from_fork_asm+0x1b/0x30
[ 48.312242] </TASK>
[ 48.312600]
[ 48.313648] Allocated by task 176:
[ 48.314515] kasan_save_stack+0x3c/0x60
[ 48.315125] kasan_set_track+0x29/0x40
[ 48.315670] kasan_save_alloc_info+0x22/0x30
[ 48.316241] __kasan_kmalloc+0xb7/0xc0
[ 48.316833] kmalloc_trace+0x4c/0xb0
[ 48.317408] kmalloc_memmove_negative_size+0x9f/0x1f0
[ 48.318096] kunit_try_run_case+0x126/0x290
[ 48.318588] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.319367] kthread+0x19e/0x1e0
[ 48.319942] ret_from_fork+0x41/0x70
[ 48.320469] ret_from_fork_asm+0x1b/0x30
[ 48.320955]
[ 48.321975] The buggy address belongs to the object at ffff888102067480
[ 48.321975] which belongs to the cache kmalloc-64 of size 64
[ 48.323364] The buggy address is located 4 bytes inside of
[ 48.323364] 64-byte region [ffff888102067480, ffff8881020674c0)
[ 48.324920]
[ 48.325211] The buggy address belongs to the physical page:
[ 48.326113] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[ 48.327152] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.327943] page_type: 0xffffffff()
[ 48.328428] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 48.329480] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 48.330424] page dumped because: kasan: bad access detected
[ 48.331289]
[ 48.331603] Memory state around the buggy address:
[ 48.332313] ffff888102067380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.333383] ffff888102067400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.334252] >ffff888102067480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 48.335162] ^
[ 48.335817] ffff888102067500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.336601] ffff888102067580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.337582] ==================================================================
Home
[ 51.064612] ==================================================================
[ 51.065525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 51.066447] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.067204]
[ 51.067425] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.068260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.069317] Call Trace:
[ 51.069727] <TASK>
[ 51.070179] dump_stack_lvl+0x4e/0x90
[ 51.070853] print_report+0xd2/0x660
[ 51.071394] ? __virt_addr_valid+0x156/0x1e0
[ 51.072110] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.072629] kasan_report+0xff/0x140
[ 51.073184] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 51.074012] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 51.074828] kasan_check_range+0x10c/0x1c0
[ 51.075488] __kasan_check_write+0x18/0x20
[ 51.076087] kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 51.076691] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 51.077543] ? kasan_set_track+0x29/0x40
[ 51.078176] ? kasan_save_alloc_info+0x22/0x30
[ 51.078827] ? __kasan_kmalloc+0xb7/0xc0
[ 51.079320] kasan_bitops_generic+0xa9/0x130
[ 51.080020] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.080557] ? ktime_get_ts64+0x118/0x140
[ 51.081143] kunit_try_run_case+0x126/0x290
[ 51.081788] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.082512] ? __kasan_check_write+0x18/0x20
[ 51.083265] ? trace_preempt_on+0x20/0xa0
[ 51.083906] ? __kthread_parkme+0x4f/0xd0
[ 51.084498] ? preempt_count_sub+0x50/0x80
[ 51.085160] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.085877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.086676] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.088899] kthread+0x19e/0x1e0
[ 51.089574] ? __pfx_kthread+0x10/0x10
[ 51.090209] ret_from_fork+0x41/0x70
[ 51.090660] ? __pfx_kthread+0x10/0x10
[ 51.091252] ret_from_fork_asm+0x1b/0x30
[ 51.092050] </TASK>
[ 51.092439]
[ 51.092735] Allocated by task 224:
[ 51.093616] kasan_save_stack+0x3c/0x60
[ 51.095098] kasan_set_track+0x29/0x40
[ 51.095478] kasan_save_alloc_info+0x22/0x30
[ 51.096183] __kasan_kmalloc+0xb7/0xc0
[ 51.096785] kmalloc_trace+0x4c/0xb0
[ 51.097939] kasan_bitops_generic+0x8e/0x130
[ 51.099228] kunit_try_run_case+0x126/0x290
[ 51.100038] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.100725] kthread+0x19e/0x1e0
[ 51.101597] ret_from_fork+0x41/0x70
[ 51.102978] ret_from_fork_asm+0x1b/0x30
[ 51.103487]
[ 51.103698] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.103698] which belongs to the cache kmalloc-16 of size 16
[ 51.105488] The buggy address is located 8 bytes inside of
[ 51.105488] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.107322]
[ 51.107621] The buggy address belongs to the physical page:
[ 51.108354] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.109372] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.110356] page_type: 0xffffffff()
[ 51.110877] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.111673] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.112628] page dumped because: kasan: bad access detected
[ 51.113364]
[ 51.114048] Memory state around the buggy address:
[ 51.114780] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.116119] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.117063] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.117768] ^
[ 51.118970] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.119782] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.120839] ==================================================================
---
[ 51.013694] ==================================================================
[ 51.014478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 51.015524] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.016341]
[ 51.016593] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.018270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.018670] Call Trace:
[ 51.018922] <TASK>
[ 51.020011] dump_stack_lvl+0x4e/0x90
[ 51.020609] print_report+0xd2/0x660
[ 51.021275] ? __virt_addr_valid+0x156/0x1e0
[ 51.021952] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.022907] kasan_report+0xff/0x140
[ 51.023569] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 51.024409] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 51.025390] kasan_check_range+0x10c/0x1c0
[ 51.025858] __kasan_check_write+0x18/0x20
[ 51.026858] kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 51.027691] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 51.028599] ? kasan_set_track+0x29/0x40
[ 51.029340] ? kasan_save_alloc_info+0x22/0x30
[ 51.029784] ? __kasan_kmalloc+0xb7/0xc0
[ 51.030348] kasan_bitops_generic+0xa9/0x130
[ 51.031429] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.032171] ? ktime_get_ts64+0x118/0x140
[ 51.032810] kunit_try_run_case+0x126/0x290
[ 51.033412] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.034022] ? __kasan_check_write+0x18/0x20
[ 51.034614] ? trace_preempt_on+0x20/0xa0
[ 51.035258] ? __kthread_parkme+0x4f/0xd0
[ 51.035775] ? preempt_count_sub+0x50/0x80
[ 51.036419] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.037039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.037936] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.038624] kthread+0x19e/0x1e0
[ 51.039189] ? __pfx_kthread+0x10/0x10
[ 51.039850] ret_from_fork+0x41/0x70
[ 51.040367] ? __pfx_kthread+0x10/0x10
[ 51.040841] ret_from_fork_asm+0x1b/0x30
[ 51.041505] </TASK>
[ 51.041911]
[ 51.042214] Allocated by task 224:
[ 51.042726] kasan_save_stack+0x3c/0x60
[ 51.043408] kasan_set_track+0x29/0x40
[ 51.043903] kasan_save_alloc_info+0x22/0x30
[ 51.044585] __kasan_kmalloc+0xb7/0xc0
[ 51.045215] kmalloc_trace+0x4c/0xb0
[ 51.045721] kasan_bitops_generic+0x8e/0x130
[ 51.046396] kunit_try_run_case+0x126/0x290
[ 51.047067] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.047643] kthread+0x19e/0x1e0
[ 51.048260] ret_from_fork+0x41/0x70
[ 51.048803] ret_from_fork_asm+0x1b/0x30
[ 51.049284]
[ 51.049548] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.049548] which belongs to the cache kmalloc-16 of size 16
[ 51.050911] The buggy address is located 8 bytes inside of
[ 51.050911] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.052069]
[ 51.052339] The buggy address belongs to the physical page:
[ 51.053121] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.053963] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.054657] page_type: 0xffffffff()
[ 51.055243] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.055919] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.056802] page dumped because: kasan: bad access detected
[ 51.057391]
[ 51.057666] Memory state around the buggy address:
[ 51.058200] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.059132] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.060004] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.060505] ^
[ 51.060959] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.061795] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.063247] ==================================================================
---
[ 50.725234] ==================================================================
[ 50.726026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 50.727011] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 50.727592]
[ 50.727837] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.728532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.729229] Call Trace:
[ 50.729528] <TASK>
[ 50.729828] dump_stack_lvl+0x4e/0x90
[ 50.730524] print_report+0xd2/0x660
[ 50.731168] ? __virt_addr_valid+0x156/0x1e0
[ 50.731829] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.732708] kasan_report+0xff/0x140
[ 50.733314] ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 50.734192] ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 50.735079] kasan_check_range+0x10c/0x1c0
[ 50.735756] __kasan_check_write+0x18/0x20
[ 50.736464] kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 50.737327] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 50.738251] ? kasan_set_track+0x29/0x40
[ 50.738907] ? kasan_save_alloc_info+0x22/0x30
[ 50.739656] ? __kasan_kmalloc+0xb7/0xc0
[ 50.740318] kasan_bitops_generic+0xa9/0x130
[ 50.741019] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 50.741689] ? ktime_get_ts64+0x118/0x140
[ 50.742343] kunit_try_run_case+0x126/0x290
[ 50.742948] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.743570] ? __kasan_check_write+0x18/0x20
[ 50.744187] ? trace_preempt_on+0x20/0xa0
[ 50.744706] ? __kthread_parkme+0x4f/0xd0
[ 50.745299] ? preempt_count_sub+0x50/0x80
[ 50.745829] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.746575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.747409] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.748151] kthread+0x19e/0x1e0
[ 50.748615] ? __pfx_kthread+0x10/0x10
[ 50.749242] ret_from_fork+0x41/0x70
[ 50.749842] ? __pfx_kthread+0x10/0x10
[ 50.750367] ret_from_fork_asm+0x1b/0x30
[ 50.751047] </TASK>
[ 50.751365]
[ 50.751659] Allocated by task 224:
[ 50.752089] kasan_save_stack+0x3c/0x60
[ 50.752664] kasan_set_track+0x29/0x40
[ 50.753146] kasan_save_alloc_info+0x22/0x30
[ 50.753762] __kasan_kmalloc+0xb7/0xc0
[ 50.754348] kmalloc_trace+0x4c/0xb0
[ 50.754941] kasan_bitops_generic+0x8e/0x130
[ 50.755466] kunit_try_run_case+0x126/0x290
[ 50.756118] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.756874] kthread+0x19e/0x1e0
[ 50.757858] ret_from_fork+0x41/0x70
[ 50.758340] ret_from_fork_asm+0x1b/0x30
[ 50.758819]
[ 50.759071] The buggy address belongs to the object at ffff8881024ffaa0
[ 50.759071] which belongs to the cache kmalloc-16 of size 16
[ 50.760798] The buggy address is located 8 bytes inside of
[ 50.760798] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 50.762335]
[ 50.762862] The buggy address belongs to the physical page:
[ 50.763459] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 50.764676] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.765329] page_type: 0xffffffff()
[ 50.765808] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 50.766702] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 50.767476] page dumped because: kasan: bad access detected
[ 50.768073]
[ 50.768375] Memory state around the buggy address:
[ 50.769029] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 50.769722] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 50.770529] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 50.771154] ^
[ 50.771721] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.772533] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.773348] ==================================================================
---
[ 50.669588] ==================================================================
[ 50.670735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 50.671618] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 50.673171]
[ 50.673850] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.674670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.675731] Call Trace:
[ 50.676136] <TASK>
[ 50.676471] dump_stack_lvl+0x4e/0x90
[ 50.677183] print_report+0xd2/0x660
[ 50.677987] ? __virt_addr_valid+0x156/0x1e0
[ 50.678596] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.679272] kasan_report+0xff/0x140
[ 50.679921] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 50.680771] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 50.682199] kasan_check_range+0x10c/0x1c0
[ 50.682830] __kasan_check_write+0x18/0x20
[ 50.683730] kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 50.685074] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 50.685972] ? kasan_set_track+0x29/0x40
[ 50.686664] ? kasan_save_alloc_info+0x22/0x30
[ 50.687430] ? __kasan_kmalloc+0xb7/0xc0
[ 50.688249] kasan_bitops_generic+0xa9/0x130
[ 50.688981] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 50.689769] ? ktime_get_ts64+0x118/0x140
[ 50.690533] kunit_try_run_case+0x126/0x290
[ 50.691293] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.692062] ? __kasan_check_write+0x18/0x20
[ 50.692817] ? trace_preempt_on+0x20/0xa0
[ 50.693964] ? __kthread_parkme+0x4f/0xd0
[ 50.694577] ? preempt_count_sub+0x50/0x80
[ 50.695439] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.696304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.697127] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.697732] kthread+0x19e/0x1e0
[ 50.698342] ? __pfx_kthread+0x10/0x10
[ 50.698959] ret_from_fork+0x41/0x70
[ 50.699551] ? __pfx_kthread+0x10/0x10
[ 50.700184] ret_from_fork_asm+0x1b/0x30
[ 50.700790] </TASK>
[ 50.701143]
[ 50.701431] Allocated by task 224:
[ 50.701932] kasan_save_stack+0x3c/0x60
[ 50.702476] kasan_set_track+0x29/0x40
[ 50.702970] kasan_save_alloc_info+0x22/0x30
[ 50.703621] __kasan_kmalloc+0xb7/0xc0
[ 50.704137] kmalloc_trace+0x4c/0xb0
[ 50.704720] kasan_bitops_generic+0x8e/0x130
[ 50.705389] kunit_try_run_case+0x126/0x290
[ 50.706033] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.706616] kthread+0x19e/0x1e0
[ 50.707200] ret_from_fork+0x41/0x70
[ 50.707789] ret_from_fork_asm+0x1b/0x30
[ 50.708319]
[ 50.708618] The buggy address belongs to the object at ffff8881024ffaa0
[ 50.708618] which belongs to the cache kmalloc-16 of size 16
[ 50.709817] The buggy address is located 8 bytes inside of
[ 50.709817] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 50.710702]
[ 50.710955] The buggy address belongs to the physical page:
[ 50.711381] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 50.712093] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.712584] page_type: 0xffffffff()
[ 50.713145] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 50.713986] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 50.714687] page dumped because: kasan: bad access detected
[ 50.715361]
[ 50.715658] Memory state around the buggy address:
[ 50.716362] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 50.717241] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 50.718113] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 50.718847] ^
[ 50.719388] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.720084] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.720936] ==================================================================
---
[ 50.776094] ==================================================================
[ 50.776822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 50.777748] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 50.778437]
[ 50.778721] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.780504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.781616] Call Trace:
[ 50.781939] <TASK>
[ 50.782332] dump_stack_lvl+0x4e/0x90
[ 50.782897] print_report+0xd2/0x660
[ 50.783455] ? __virt_addr_valid+0x156/0x1e0
[ 50.784087] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.784806] kasan_report+0xff/0x140
[ 50.786564] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 50.787532] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 50.788421] kasan_check_range+0x10c/0x1c0
[ 50.789131] __kasan_check_write+0x18/0x20
[ 50.789937] kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 50.790791] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 50.791943] ? kasan_set_track+0x29/0x40
[ 50.792705] ? kasan_save_alloc_info+0x22/0x30
[ 50.793530] ? __kasan_kmalloc+0xb7/0xc0
[ 50.794272] kasan_bitops_generic+0xa9/0x130
[ 50.794695] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 50.795673] ? ktime_get_ts64+0x118/0x140
[ 50.796404] kunit_try_run_case+0x126/0x290
[ 50.797133] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.797682] ? __kasan_check_write+0x18/0x20
[ 50.798600] ? trace_preempt_on+0x20/0xa0
[ 50.799309] ? __kthread_parkme+0x4f/0xd0
[ 50.800459] ? preempt_count_sub+0x50/0x80
[ 50.800976] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.801799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.803374] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.804335] kthread+0x19e/0x1e0
[ 50.805035] ? __pfx_kthread+0x10/0x10
[ 50.805794] ret_from_fork+0x41/0x70
[ 50.807142] ? __pfx_kthread+0x10/0x10
[ 50.807768] ret_from_fork_asm+0x1b/0x30
[ 50.808491] </TASK>
[ 50.808872]
[ 50.809186] Allocated by task 224:
[ 50.809675] kasan_save_stack+0x3c/0x60
[ 50.810949] kasan_set_track+0x29/0x40
[ 50.811421] kasan_save_alloc_info+0x22/0x30
[ 50.812399] __kasan_kmalloc+0xb7/0xc0
[ 50.812953] kmalloc_trace+0x4c/0xb0
[ 50.813534] kasan_bitops_generic+0x8e/0x130
[ 50.814294] kunit_try_run_case+0x126/0x290
[ 50.815491] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.816284] kthread+0x19e/0x1e0
[ 50.817134] ret_from_fork+0x41/0x70
[ 50.818234] ret_from_fork_asm+0x1b/0x30
[ 50.818705]
[ 50.819290] The buggy address belongs to the object at ffff8881024ffaa0
[ 50.819290] which belongs to the cache kmalloc-16 of size 16
[ 50.820038] The buggy address is located 8 bytes inside of
[ 50.820038] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 50.821740]
[ 50.822044] The buggy address belongs to the physical page:
[ 50.822613] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 50.824250] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.825521] page_type: 0xffffffff()
[ 50.825970] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 50.827060] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 50.828767] page dumped because: kasan: bad access detected
[ 50.829559]
[ 50.829938] Memory state around the buggy address:
[ 50.830537] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 50.831063] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 50.832341] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 50.833278] ^
[ 50.833933] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.834802] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.835500] ==================================================================
---
[ 50.895717] ==================================================================
[ 50.896695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 50.897860] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 50.899005]
[ 50.899378] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.900471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.901187] Call Trace:
[ 50.901783] <TASK>
[ 50.902304] dump_stack_lvl+0x4e/0x90
[ 50.903423] print_report+0xd2/0x660
[ 50.904321] ? __virt_addr_valid+0x156/0x1e0
[ 50.904616] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.904934] kasan_report+0xff/0x140
[ 50.905539] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 50.906430] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 50.907286] kasan_check_range+0x10c/0x1c0
[ 50.907900] __kasan_check_write+0x18/0x20
[ 50.908493] kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 50.909972] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 50.910700] ? kasan_set_track+0x29/0x40
[ 50.911192] ? kasan_save_alloc_info+0x22/0x30
[ 50.911844] ? __kasan_kmalloc+0xb7/0xc0
[ 50.912378] kasan_bitops_generic+0xa9/0x130
[ 50.913020] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 50.913638] ? ktime_get_ts64+0x118/0x140
[ 50.915129] kunit_try_run_case+0x126/0x290
[ 50.915815] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.916724] ? __kasan_check_write+0x18/0x20
[ 50.917430] ? trace_preempt_on+0x20/0xa0
[ 50.918082] ? __kthread_parkme+0x4f/0xd0
[ 50.918479] ? preempt_count_sub+0x50/0x80
[ 50.919043] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.920159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.920827] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.921500] kthread+0x19e/0x1e0
[ 50.921980] ? __pfx_kthread+0x10/0x10
[ 50.922572] ret_from_fork+0x41/0x70
[ 50.923391] ? __pfx_kthread+0x10/0x10
[ 50.924665] ret_from_fork_asm+0x1b/0x30
[ 50.925427] </TASK>
[ 50.925752]
[ 50.926057] Allocated by task 224:
[ 50.926446] kasan_save_stack+0x3c/0x60
[ 50.926959] kasan_set_track+0x29/0x40
[ 50.927554] kasan_save_alloc_info+0x22/0x30
[ 50.928862] __kasan_kmalloc+0xb7/0xc0
[ 50.929592] kmalloc_trace+0x4c/0xb0
[ 50.930346] kasan_bitops_generic+0x8e/0x130
[ 50.931112] kunit_try_run_case+0x126/0x290
[ 50.931610] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.932586] kthread+0x19e/0x1e0
[ 50.932940] ret_from_fork+0x41/0x70
[ 50.934079] ret_from_fork_asm+0x1b/0x30
[ 50.934578]
[ 50.935134] The buggy address belongs to the object at ffff8881024ffaa0
[ 50.935134] which belongs to the cache kmalloc-16 of size 16
[ 50.936651] The buggy address is located 8 bytes inside of
[ 50.936651] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 50.937890]
[ 50.938232] The buggy address belongs to the physical page:
[ 50.939367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 50.940477] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.941311] page_type: 0xffffffff()
[ 50.941762] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 50.943419] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 50.944286] page dumped because: kasan: bad access detected
[ 50.945074]
[ 50.945577] Memory state around the buggy address:
[ 50.946337] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 50.947392] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 50.948449] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 50.949467] ^
[ 50.950983] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.952023] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.953035] ==================================================================
---
[ 50.954386] ==================================================================
[ 50.955378] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 50.956858] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 50.957730]
[ 50.958255] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.960331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.961876] Call Trace:
[ 50.962182] <TASK>
[ 50.963598] dump_stack_lvl+0x4e/0x90
[ 50.964072] print_report+0xd2/0x660
[ 50.964353] ? __virt_addr_valid+0x156/0x1e0
[ 50.964630] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.965342] kasan_report+0xff/0x140
[ 50.965923] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 50.966694] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 50.968330] kasan_check_range+0x10c/0x1c0
[ 50.969127] __kasan_check_write+0x18/0x20
[ 50.970036] kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 50.970710] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 50.971756] ? kasan_set_track+0x29/0x40
[ 50.972579] ? kasan_save_alloc_info+0x22/0x30
[ 50.973374] ? __kasan_kmalloc+0xb7/0xc0
[ 50.973948] kasan_bitops_generic+0xa9/0x130
[ 50.974602] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 50.975501] ? ktime_get_ts64+0x118/0x140
[ 50.976520] kunit_try_run_case+0x126/0x290
[ 50.977235] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.977818] ? __kasan_check_write+0x18/0x20
[ 50.978530] ? trace_preempt_on+0x20/0xa0
[ 50.979288] ? __kthread_parkme+0x4f/0xd0
[ 50.979723] ? preempt_count_sub+0x50/0x80
[ 50.980654] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.981580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.982575] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.983286] kthread+0x19e/0x1e0
[ 50.983806] ? __pfx_kthread+0x10/0x10
[ 50.985045] ret_from_fork+0x41/0x70
[ 50.985597] ? __pfx_kthread+0x10/0x10
[ 50.986386] ret_from_fork_asm+0x1b/0x30
[ 50.987086] </TASK>
[ 50.987571]
[ 50.988075] Allocated by task 224:
[ 50.988484] kasan_save_stack+0x3c/0x60
[ 50.989250] kasan_set_track+0x29/0x40
[ 50.989611] kasan_save_alloc_info+0x22/0x30
[ 50.990032] __kasan_kmalloc+0xb7/0xc0
[ 50.990605] kmalloc_trace+0x4c/0xb0
[ 50.991245] kasan_bitops_generic+0x8e/0x130
[ 50.991810] kunit_try_run_case+0x126/0x290
[ 50.992613] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.993451] kthread+0x19e/0x1e0
[ 50.994118] ret_from_fork+0x41/0x70
[ 50.994633] ret_from_fork_asm+0x1b/0x30
[ 50.995176]
[ 50.995394] The buggy address belongs to the object at ffff8881024ffaa0
[ 50.995394] which belongs to the cache kmalloc-16 of size 16
[ 50.997035] The buggy address is located 8 bytes inside of
[ 50.997035] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 50.998912]
[ 50.999669] The buggy address belongs to the physical page:
[ 51.000318] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.000746] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.001311] page_type: 0xffffffff()
[ 51.001825] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.003141] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.004206] page dumped because: kasan: bad access detected
[ 51.004781]
[ 51.005078] Memory state around the buggy address:
[ 51.006044] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.007640] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.008563] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.009364] ^
[ 51.010064] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.011652] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.012345] ==================================================================
---
[ 50.837587] ==================================================================
[ 50.838527] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 50.840502] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 50.841350]
[ 50.841579] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.842870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.843632] Call Trace:
[ 50.844048] <TASK>
[ 50.844464] dump_stack_lvl+0x4e/0x90
[ 50.845445] print_report+0xd2/0x660
[ 50.846394] ? __virt_addr_valid+0x156/0x1e0
[ 50.847465] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.848163] kasan_report+0xff/0x140
[ 50.848727] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 50.849513] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 50.851194] kasan_check_range+0x10c/0x1c0
[ 50.851779] __kasan_check_write+0x18/0x20
[ 50.852276] kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 50.852607] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 50.853418] ? kasan_set_track+0x29/0x40
[ 50.854114] ? kasan_save_alloc_info+0x22/0x30
[ 50.854648] ? __kasan_kmalloc+0xb7/0xc0
[ 50.855425] kasan_bitops_generic+0xa9/0x130
[ 50.856509] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 50.857262] ? ktime_get_ts64+0x118/0x140
[ 50.857879] kunit_try_run_case+0x126/0x290
[ 50.859197] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.860005] ? __kasan_check_write+0x18/0x20
[ 50.860806] ? trace_preempt_on+0x20/0xa0
[ 50.861325] ? __kthread_parkme+0x4f/0xd0
[ 50.861836] ? preempt_count_sub+0x50/0x80
[ 50.862916] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.863651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.864826] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.865669] kthread+0x19e/0x1e0
[ 50.866413] ? __pfx_kthread+0x10/0x10
[ 50.867590] ret_from_fork+0x41/0x70
[ 50.868160] ? __pfx_kthread+0x10/0x10
[ 50.868737] ret_from_fork_asm+0x1b/0x30
[ 50.869694] </TASK>
[ 50.870280]
[ 50.870714] Allocated by task 224:
[ 50.871318] kasan_save_stack+0x3c/0x60
[ 50.872283] kasan_set_track+0x29/0x40
[ 50.872760] kasan_save_alloc_info+0x22/0x30
[ 50.873506] __kasan_kmalloc+0xb7/0xc0
[ 50.874319] kmalloc_trace+0x4c/0xb0
[ 50.874959] kasan_bitops_generic+0x8e/0x130
[ 50.875618] kunit_try_run_case+0x126/0x290
[ 50.876479] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.877226] kthread+0x19e/0x1e0
[ 50.877670] ret_from_fork+0x41/0x70
[ 50.878217] ret_from_fork_asm+0x1b/0x30
[ 50.878976]
[ 50.879359] The buggy address belongs to the object at ffff8881024ffaa0
[ 50.879359] which belongs to the cache kmalloc-16 of size 16
[ 50.880603] The buggy address is located 8 bytes inside of
[ 50.880603] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 50.882235]
[ 50.882542] The buggy address belongs to the physical page:
[ 50.883022] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 50.883694] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.884304] page_type: 0xffffffff()
[ 50.884953] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 50.885958] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 50.887064] page dumped because: kasan: bad access detected
[ 50.887707]
[ 50.888103] Memory state around the buggy address:
[ 50.888802] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 50.889714] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 50.890718] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 50.891752] ^
[ 50.892476] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.893511] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.894434] ==================================================================
Home
[ 51.527785] ==================================================================
[ 51.528575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 51.529962] Read of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.530941]
[ 51.531319] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.532370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.533411] Call Trace:
[ 51.533872] <TASK>
[ 51.534314] dump_stack_lvl+0x4e/0x90
[ 51.535062] print_report+0xd2/0x660
[ 51.535707] ? __virt_addr_valid+0x156/0x1e0
[ 51.536436] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.537269] kasan_report+0xff/0x140
[ 51.537743] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 51.538720] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 51.539589] __asan_load8+0x82/0xb0
[ 51.540295] kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 51.541024] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.541900] ? add_taint+0x2e/0xa0
[ 51.542460] kasan_bitops_generic+0xb4/0x130
[ 51.543206] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.543711] ? ktime_get_ts64+0x118/0x140
[ 51.544469] kunit_try_run_case+0x126/0x290
[ 51.545307] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.546080] ? __kasan_check_write+0x18/0x20
[ 51.546810] ? trace_preempt_on+0x20/0xa0
[ 51.547491] ? __kthread_parkme+0x4f/0xd0
[ 51.548078] ? preempt_count_sub+0x50/0x80
[ 51.548737] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.549497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.550336] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.551129] kthread+0x19e/0x1e0
[ 51.551726] ? __pfx_kthread+0x10/0x10
[ 51.552254] ret_from_fork+0x41/0x70
[ 51.552721] ? __pfx_kthread+0x10/0x10
[ 51.553297] ret_from_fork_asm+0x1b/0x30
[ 51.553824] </TASK>
[ 51.554231]
[ 51.554464] Allocated by task 224:
[ 51.554830] kasan_save_stack+0x3c/0x60
[ 51.555847] kasan_set_track+0x29/0x40
[ 51.556248] kasan_save_alloc_info+0x22/0x30
[ 51.557072] __kasan_kmalloc+0xb7/0xc0
[ 51.557769] kmalloc_trace+0x4c/0xb0
[ 51.558514] kasan_bitops_generic+0x8e/0x130
[ 51.559261] kunit_try_run_case+0x126/0x290
[ 51.560012] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.560856] kthread+0x19e/0x1e0
[ 51.561599] ret_from_fork+0x41/0x70
[ 51.562320] ret_from_fork_asm+0x1b/0x30
[ 51.563090]
[ 51.563566] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.563566] which belongs to the cache kmalloc-16 of size 16
[ 51.564861] The buggy address is located 8 bytes inside of
[ 51.564861] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.566302]
[ 51.566605] The buggy address belongs to the physical page:
[ 51.567523] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.568432] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.568727] page_type: 0xffffffff()
[ 51.569125] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.570139] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.570811] page dumped because: kasan: bad access detected
[ 51.571513]
[ 51.571777] Memory state around the buggy address:
[ 51.572492] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.573281] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.574178] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.574881] ^
[ 51.575347] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.576266] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.576951] ==================================================================
Home
[ 51.328256] ==================================================================
[ 51.329442] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 51.330469] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.331159]
[ 51.331598] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.332668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.333827] Call Trace:
[ 51.334232] <TASK>
[ 51.334580] dump_stack_lvl+0x4e/0x90
[ 51.335230] print_report+0xd2/0x660
[ 51.335857] ? __virt_addr_valid+0x156/0x1e0
[ 51.336526] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.337451] kasan_report+0xff/0x140
[ 51.338092] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 51.338909] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 51.339681] kasan_check_range+0x10c/0x1c0
[ 51.340256] __kasan_check_write+0x18/0x20
[ 51.340908] kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 51.341694] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.342427] ? add_taint+0x2e/0xa0
[ 51.343032] kasan_bitops_generic+0xb4/0x130
[ 51.343627] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.344250] ? ktime_get_ts64+0x118/0x140
[ 51.344864] kunit_try_run_case+0x126/0x290
[ 51.345413] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.346124] ? __kasan_check_write+0x18/0x20
[ 51.346712] ? trace_preempt_on+0x20/0xa0
[ 51.347311] ? __kthread_parkme+0x4f/0xd0
[ 51.347840] ? preempt_count_sub+0x50/0x80
[ 51.348445] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.349103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.349874] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.350533] kthread+0x19e/0x1e0
[ 51.351123] ? __pfx_kthread+0x10/0x10
[ 51.351688] ret_from_fork+0x41/0x70
[ 51.352281] ? __pfx_kthread+0x10/0x10
[ 51.352808] ret_from_fork_asm+0x1b/0x30
[ 51.353433] </TASK>
[ 51.353804]
[ 51.354130] Allocated by task 224:
[ 51.354528] kasan_save_stack+0x3c/0x60
[ 51.355100] kasan_set_track+0x29/0x40
[ 51.355667] kasan_save_alloc_info+0x22/0x30
[ 51.356211] __kasan_kmalloc+0xb7/0xc0
[ 51.356761] kmalloc_trace+0x4c/0xb0
[ 51.357298] kasan_bitops_generic+0x8e/0x130
[ 51.357934] kunit_try_run_case+0x126/0x290
[ 51.358564] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.359269] kthread+0x19e/0x1e0
[ 51.359790] ret_from_fork+0x41/0x70
[ 51.360439] ret_from_fork_asm+0x1b/0x30
[ 51.360956]
[ 51.361277] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.361277] which belongs to the cache kmalloc-16 of size 16
[ 51.362814] The buggy address is located 8 bytes inside of
[ 51.362814] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.364588]
[ 51.365036] The buggy address belongs to the physical page:
[ 51.365587] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.366623] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.367239] page_type: 0xffffffff()
[ 51.367767] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.368600] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.369286] page dumped because: kasan: bad access detected
[ 51.369900]
[ 51.370235] Memory state around the buggy address:
[ 51.370681] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.371533] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.372376] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.373403] ^
[ 51.373884] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.374632] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.375475] ==================================================================
---
[ 51.224900] ==================================================================
[ 51.225623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 51.226623] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.227419]
[ 51.227784] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.228703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.229620] Call Trace:
[ 51.230010] <TASK>
[ 51.230410] dump_stack_lvl+0x4e/0x90
[ 51.231070] print_report+0xd2/0x660
[ 51.231679] ? __virt_addr_valid+0x156/0x1e0
[ 51.232318] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.233185] kasan_report+0xff/0x140
[ 51.233761] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 51.234580] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 51.235465] kasan_check_range+0x10c/0x1c0
[ 51.236057] __kasan_check_write+0x18/0x20
[ 51.236782] kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 51.237656] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.238389] ? add_taint+0x2e/0xa0
[ 51.239005] kasan_bitops_generic+0xb4/0x130
[ 51.239649] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.240297] ? ktime_get_ts64+0x118/0x140
[ 51.241243] kunit_try_run_case+0x126/0x290
[ 51.242025] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.242759] ? __kasan_check_write+0x18/0x20
[ 51.243547] ? trace_preempt_on+0x20/0xa0
[ 51.244298] ? __kthread_parkme+0x4f/0xd0
[ 51.245027] ? preempt_count_sub+0x50/0x80
[ 51.245763] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.246446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.247364] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.248176] kthread+0x19e/0x1e0
[ 51.248849] ? __pfx_kthread+0x10/0x10
[ 51.249615] ret_from_fork+0x41/0x70
[ 51.250346] ? __pfx_kthread+0x10/0x10
[ 51.251109] ret_from_fork_asm+0x1b/0x30
[ 51.251881] </TASK>
[ 51.252450]
[ 51.252927] Allocated by task 224:
[ 51.253403] kasan_save_stack+0x3c/0x60
[ 51.253982] kasan_set_track+0x29/0x40
[ 51.254562] kasan_save_alloc_info+0x22/0x30
[ 51.255226] __kasan_kmalloc+0xb7/0xc0
[ 51.255814] kmalloc_trace+0x4c/0xb0
[ 51.256609] kasan_bitops_generic+0x8e/0x130
[ 51.257172] kunit_try_run_case+0x126/0x290
[ 51.257451] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.257759] kthread+0x19e/0x1e0
[ 51.258223] ret_from_fork+0x41/0x70
[ 51.258902] ret_from_fork_asm+0x1b/0x30
[ 51.259566]
[ 51.259946] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.259946] which belongs to the cache kmalloc-16 of size 16
[ 51.261353] The buggy address is located 8 bytes inside of
[ 51.261353] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.262558]
[ 51.263088] The buggy address belongs to the physical page:
[ 51.264028] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.265010] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.265589] page_type: 0xffffffff()
[ 51.266251] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.267478] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.268390] page dumped because: kasan: bad access detected
[ 51.269203]
[ 51.269421] Memory state around the buggy address:
[ 51.270459] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.271425] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.272377] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.273341] ^
[ 51.274074] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.275014] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.275977] ==================================================================
---
[ 51.175349] ==================================================================
[ 51.176105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 51.177300] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.178350]
[ 51.178504] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.179034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.179771] Call Trace:
[ 51.180252] <TASK>
[ 51.180669] dump_stack_lvl+0x4e/0x90
[ 51.181281] print_report+0xd2/0x660
[ 51.181878] ? __virt_addr_valid+0x156/0x1e0
[ 51.182577] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.183399] kasan_report+0xff/0x140
[ 51.184012] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 51.184823] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 51.185662] kasan_check_range+0x10c/0x1c0
[ 51.186289] __kasan_check_write+0x18/0x20
[ 51.186949] kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 51.187736] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.188586] ? add_taint+0x2e/0xa0
[ 51.189162] kasan_bitops_generic+0xb4/0x130
[ 51.189749] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.190400] ? ktime_get_ts64+0x118/0x140
[ 51.190959] kunit_try_run_case+0x126/0x290
[ 51.191612] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.192344] ? __kasan_check_write+0x18/0x20
[ 51.193008] ? trace_preempt_on+0x20/0xa0
[ 51.193617] ? __kthread_parkme+0x4f/0xd0
[ 51.194291] ? preempt_count_sub+0x50/0x80
[ 51.194925] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.195583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.196439] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.197229] kthread+0x19e/0x1e0
[ 51.197769] ? __pfx_kthread+0x10/0x10
[ 51.198365] ret_from_fork+0x41/0x70
[ 51.198978] ? __pfx_kthread+0x10/0x10
[ 51.199594] ret_from_fork_asm+0x1b/0x30
[ 51.200247] </TASK>
[ 51.200662]
[ 51.200987] Allocated by task 224:
[ 51.201741] kasan_save_stack+0x3c/0x60
[ 51.202558] kasan_set_track+0x29/0x40
[ 51.204028] kasan_save_alloc_info+0x22/0x30
[ 51.204646] __kasan_kmalloc+0xb7/0xc0
[ 51.205261] kmalloc_trace+0x4c/0xb0
[ 51.205880] kasan_bitops_generic+0x8e/0x130
[ 51.206476] kunit_try_run_case+0x126/0x290
[ 51.207180] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.207837] kthread+0x19e/0x1e0
[ 51.208444] ret_from_fork+0x41/0x70
[ 51.209056] ret_from_fork_asm+0x1b/0x30
[ 51.209734]
[ 51.210141] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.210141] which belongs to the cache kmalloc-16 of size 16
[ 51.211069] The buggy address is located 8 bytes inside of
[ 51.211069] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.212232]
[ 51.212576] The buggy address belongs to the physical page:
[ 51.213253] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.214370] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.215105] page_type: 0xffffffff()
[ 51.215627] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.216377] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.217321] page dumped because: kasan: bad access detected
[ 51.217962]
[ 51.218258] Memory state around the buggy address:
[ 51.218898] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.219631] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.220473] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.221280] ^
[ 51.221786] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.222598] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.223420] ==================================================================
---
[ 51.123167] ==================================================================
[ 51.123958] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 51.125294] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.125649]
[ 51.125833] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.126924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.128293] Call Trace:
[ 51.128581] <TASK>
[ 51.129313] dump_stack_lvl+0x4e/0x90
[ 51.130047] print_report+0xd2/0x660
[ 51.130743] ? __virt_addr_valid+0x156/0x1e0
[ 51.131352] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.132284] kasan_report+0xff/0x140
[ 51.132967] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 51.133988] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 51.134940] kasan_check_range+0x10c/0x1c0
[ 51.135681] __kasan_check_write+0x18/0x20
[ 51.136239] kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 51.137245] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.138056] ? add_taint+0x2e/0xa0
[ 51.138722] kasan_bitops_generic+0xb4/0x130
[ 51.139499] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.140292] ? ktime_get_ts64+0x118/0x140
[ 51.140964] kunit_try_run_case+0x126/0x290
[ 51.141654] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.142213] ? __kasan_check_write+0x18/0x20
[ 51.142749] ? trace_preempt_on+0x20/0xa0
[ 51.143287] ? __kthread_parkme+0x4f/0xd0
[ 51.143843] ? preempt_count_sub+0x50/0x80
[ 51.144552] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.145308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.146059] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.146889] kthread+0x19e/0x1e0
[ 51.147426] ? __pfx_kthread+0x10/0x10
[ 51.148063] ret_from_fork+0x41/0x70
[ 51.148639] ? __pfx_kthread+0x10/0x10
[ 51.149285] ret_from_fork_asm+0x1b/0x30
[ 51.150029] </TASK>
[ 51.150401]
[ 51.150677] Allocated by task 224:
[ 51.151196] kasan_save_stack+0x3c/0x60
[ 51.151749] kasan_set_track+0x29/0x40
[ 51.152346] kasan_save_alloc_info+0x22/0x30
[ 51.153062] __kasan_kmalloc+0xb7/0xc0
[ 51.153612] kmalloc_trace+0x4c/0xb0
[ 51.154200] kasan_bitops_generic+0x8e/0x130
[ 51.154896] kunit_try_run_case+0x126/0x290
[ 51.155574] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.156394] kthread+0x19e/0x1e0
[ 51.156967] ret_from_fork+0x41/0x70
[ 51.157592] ret_from_fork_asm+0x1b/0x30
[ 51.158146]
[ 51.158403] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.158403] which belongs to the cache kmalloc-16 of size 16
[ 51.159573] The buggy address is located 8 bytes inside of
[ 51.159573] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.160944]
[ 51.161262] The buggy address belongs to the physical page:
[ 51.161944] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.163122] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.163737] page_type: 0xffffffff()
[ 51.164190] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.165004] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.165651] page dumped because: kasan: bad access detected
[ 51.166414]
[ 51.166716] Memory state around the buggy address:
[ 51.167435] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.168395] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.169219] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.170059] ^
[ 51.170642] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.171458] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.172283] ==================================================================
---
[ 51.376786] ==================================================================
[ 51.377817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 51.378876] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.379600]
[ 51.379934] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.380719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.381740] Call Trace:
[ 51.382193] <TASK>
[ 51.382525] dump_stack_lvl+0x4e/0x90
[ 51.383166] print_report+0xd2/0x660
[ 51.383760] ? __virt_addr_valid+0x156/0x1e0
[ 51.384325] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.386092] kasan_report+0xff/0x140
[ 51.386530] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 51.387664] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 51.388439] kasan_check_range+0x10c/0x1c0
[ 51.389022] __kasan_check_write+0x18/0x20
[ 51.389621] kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 51.390312] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.391150] ? add_taint+0x2e/0xa0
[ 51.391719] kasan_bitops_generic+0xb4/0x130
[ 51.392341] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.393012] ? ktime_get_ts64+0x118/0x140
[ 51.393568] kunit_try_run_case+0x126/0x290
[ 51.394134] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.394810] ? __kasan_check_write+0x18/0x20
[ 51.395455] ? trace_preempt_on+0x20/0xa0
[ 51.396036] ? __kthread_parkme+0x4f/0xd0
[ 51.396590] ? preempt_count_sub+0x50/0x80
[ 51.397113] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.397791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.398596] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.399310] kthread+0x19e/0x1e0
[ 51.399857] ? __pfx_kthread+0x10/0x10
[ 51.400391] ret_from_fork+0x41/0x70
[ 51.401025] ? __pfx_kthread+0x10/0x10
[ 51.401617] ret_from_fork_asm+0x1b/0x30
[ 51.402273] </TASK>
[ 51.402563]
[ 51.402858] Allocated by task 224:
[ 51.403323] kasan_save_stack+0x3c/0x60
[ 51.404263] kasan_set_track+0x29/0x40
[ 51.405109] kasan_save_alloc_info+0x22/0x30
[ 51.405613] __kasan_kmalloc+0xb7/0xc0
[ 51.406187] kmalloc_trace+0x4c/0xb0
[ 51.406640] kasan_bitops_generic+0x8e/0x130
[ 51.407289] kunit_try_run_case+0x126/0x290
[ 51.407764] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.408525] kthread+0x19e/0x1e0
[ 51.410032] ret_from_fork+0x41/0x70
[ 51.410536] ret_from_fork_asm+0x1b/0x30
[ 51.411444]
[ 51.411647] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.411647] which belongs to the cache kmalloc-16 of size 16
[ 51.412810] The buggy address is located 8 bytes inside of
[ 51.412810] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.413960]
[ 51.414252] The buggy address belongs to the physical page:
[ 51.414737] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.415666] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.416377] page_type: 0xffffffff()
[ 51.416929] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.417756] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.418651] page dumped because: kasan: bad access detected
[ 51.419204]
[ 51.419494] Memory state around the buggy address:
[ 51.420145] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.420873] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.421628] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.422449] ^
[ 51.422941] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.423749] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.424569] ==================================================================
---
[ 51.277549] ==================================================================
[ 51.278280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 51.279973] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.281368]
[ 51.281600] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.282794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.283705] Call Trace:
[ 51.284187] <TASK>
[ 51.284599] dump_stack_lvl+0x4e/0x90
[ 51.285206] print_report+0xd2/0x660
[ 51.285813] ? __virt_addr_valid+0x156/0x1e0
[ 51.286435] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.287252] kasan_report+0xff/0x140
[ 51.287807] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 51.288647] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 51.289460] kasan_check_range+0x10c/0x1c0
[ 51.290103] __kasan_check_write+0x18/0x20
[ 51.290738] kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 51.291528] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.292444] ? add_taint+0x2e/0xa0
[ 51.293056] kasan_bitops_generic+0xb4/0x130
[ 51.293644] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.294377] ? ktime_get_ts64+0x118/0x140
[ 51.295012] kunit_try_run_case+0x126/0x290
[ 51.295673] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.296353] ? __kasan_check_write+0x18/0x20
[ 51.297038] ? trace_preempt_on+0x20/0xa0
[ 51.297612] ? __kthread_parkme+0x4f/0xd0
[ 51.298213] ? preempt_count_sub+0x50/0x80
[ 51.298755] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.299471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.300211] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.301070] kthread+0x19e/0x1e0
[ 51.301614] ? __pfx_kthread+0x10/0x10
[ 51.302184] ret_from_fork+0x41/0x70
[ 51.302768] ? __pfx_kthread+0x10/0x10
[ 51.303282] ret_from_fork_asm+0x1b/0x30
[ 51.304007] </TASK>
[ 51.304388]
[ 51.304708] Allocated by task 224:
[ 51.305082] kasan_save_stack+0x3c/0x60
[ 51.305714] kasan_set_track+0x29/0x40
[ 51.306297] kasan_save_alloc_info+0x22/0x30
[ 51.306684] __kasan_kmalloc+0xb7/0xc0
[ 51.307219] kmalloc_trace+0x4c/0xb0
[ 51.307836] kasan_bitops_generic+0x8e/0x130
[ 51.309633] kunit_try_run_case+0x126/0x290
[ 51.310324] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.310968] kthread+0x19e/0x1e0
[ 51.311469] ret_from_fork+0x41/0x70
[ 51.311897] ret_from_fork_asm+0x1b/0x30
[ 51.312518]
[ 51.312790] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.312790] which belongs to the cache kmalloc-16 of size 16
[ 51.314256] The buggy address is located 8 bytes inside of
[ 51.314256] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.315528]
[ 51.315883] The buggy address belongs to the physical page:
[ 51.316523] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.317523] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.318290] page_type: 0xffffffff()
[ 51.318856] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.319803] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.320629] page dumped because: kasan: bad access detected
[ 51.321275]
[ 51.321608] Memory state around the buggy address:
[ 51.322180] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.323067] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.323912] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.324665] ^
[ 51.325299] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.326096] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.326936] ==================================================================
---
[ 51.425691] ==================================================================
[ 51.426569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 51.428020] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.428897]
[ 51.429178] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.429982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.430949] Call Trace:
[ 51.431279] <TASK>
[ 51.431664] dump_stack_lvl+0x4e/0x90
[ 51.432295] print_report+0xd2/0x660
[ 51.432902] ? __virt_addr_valid+0x156/0x1e0
[ 51.433559] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.434344] kasan_report+0xff/0x140
[ 51.435291] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 51.436469] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 51.437242] kasan_check_range+0x10c/0x1c0
[ 51.437792] __kasan_check_write+0x18/0x20
[ 51.438416] kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 51.439261] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.440073] ? add_taint+0x2e/0xa0
[ 51.440633] kasan_bitops_generic+0xb4/0x130
[ 51.441319] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.442048] ? ktime_get_ts64+0x118/0x140
[ 51.442666] kunit_try_run_case+0x126/0x290
[ 51.443192] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.443869] ? __kasan_check_write+0x18/0x20
[ 51.444588] ? trace_preempt_on+0x20/0xa0
[ 51.445153] ? __kthread_parkme+0x4f/0xd0
[ 51.445677] ? preempt_count_sub+0x50/0x80
[ 51.446248] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.446934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.447639] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.448373] kthread+0x19e/0x1e0
[ 51.448915] ? __pfx_kthread+0x10/0x10
[ 51.449511] ret_from_fork+0x41/0x70
[ 51.450062] ? __pfx_kthread+0x10/0x10
[ 51.450646] ret_from_fork_asm+0x1b/0x30
[ 51.451222] </TASK>
[ 51.451594]
[ 51.451875] Allocated by task 224:
[ 51.452272] kasan_save_stack+0x3c/0x60
[ 51.452855] kasan_set_track+0x29/0x40
[ 51.453328] kasan_save_alloc_info+0x22/0x30
[ 51.453961] __kasan_kmalloc+0xb7/0xc0
[ 51.454435] kmalloc_trace+0x4c/0xb0
[ 51.455037] kasan_bitops_generic+0x8e/0x130
[ 51.455647] kunit_try_run_case+0x126/0x290
[ 51.456205] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.456792] kthread+0x19e/0x1e0
[ 51.457364] ret_from_fork+0x41/0x70
[ 51.457898] ret_from_fork_asm+0x1b/0x30
[ 51.458502]
[ 51.458812] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.458812] which belongs to the cache kmalloc-16 of size 16
[ 51.459892] The buggy address is located 8 bytes inside of
[ 51.459892] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.461120]
[ 51.461367] The buggy address belongs to the physical page:
[ 51.462052] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.463580] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.464396] page_type: 0xffffffff()
[ 51.465142] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.466141] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.467149] page dumped because: kasan: bad access detected
[ 51.467764]
[ 51.468067] Memory state around the buggy address:
[ 51.468563] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.469828] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.470754] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.471672] ^
[ 51.472494] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.473530] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.474453] ==================================================================
---
[ 51.578479] ==================================================================
[ 51.579322] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 51.580807] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.581631]
[ 51.582014] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.582890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.583847] Call Trace:
[ 51.584220] <TASK>
[ 51.584638] dump_stack_lvl+0x4e/0x90
[ 51.585897] print_report+0xd2/0x660
[ 51.586309] ? __virt_addr_valid+0x156/0x1e0
[ 51.587209] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.587845] kasan_report+0xff/0x140
[ 51.588433] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 51.589212] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 51.590140] kasan_check_range+0x10c/0x1c0
[ 51.590835] __kasan_check_write+0x18/0x20
[ 51.591416] kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 51.592287] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.593157] ? add_taint+0x2e/0xa0
[ 51.593724] kasan_bitops_generic+0xb4/0x130
[ 51.594331] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.595089] ? ktime_get_ts64+0x118/0x140
[ 51.595703] kunit_try_run_case+0x126/0x290
[ 51.596356] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.597046] ? __kasan_check_write+0x18/0x20
[ 51.597691] ? trace_preempt_on+0x20/0xa0
[ 51.598262] ? __kthread_parkme+0x4f/0xd0
[ 51.598849] ? preempt_count_sub+0x50/0x80
[ 51.599438] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.600155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.600977] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.601768] kthread+0x19e/0x1e0
[ 51.602309] ? __pfx_kthread+0x10/0x10
[ 51.602898] ret_from_fork+0x41/0x70
[ 51.603479] ? __pfx_kthread+0x10/0x10
[ 51.604075] ret_from_fork_asm+0x1b/0x30
[ 51.604787] </TASK>
[ 51.605177]
[ 51.605477] Allocated by task 224:
[ 51.606021] kasan_save_stack+0x3c/0x60
[ 51.606559] kasan_set_track+0x29/0x40
[ 51.607139] kasan_save_alloc_info+0x22/0x30
[ 51.607846] __kasan_kmalloc+0xb7/0xc0
[ 51.608343] kmalloc_trace+0x4c/0xb0
[ 51.608957] kasan_bitops_generic+0x8e/0x130
[ 51.609488] kunit_try_run_case+0x126/0x290
[ 51.610145] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.610739] kthread+0x19e/0x1e0
[ 51.611309] ret_from_fork+0x41/0x70
[ 51.611890] ret_from_fork_asm+0x1b/0x30
[ 51.612485]
[ 51.612734] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.612734] which belongs to the cache kmalloc-16 of size 16
[ 51.613932] The buggy address is located 8 bytes inside of
[ 51.613932] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.615223]
[ 51.615504] The buggy address belongs to the physical page:
[ 51.616254] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.617396] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.618246] page_type: 0xffffffff()
[ 51.619272] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.620023] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.620719] page dumped because: kasan: bad access detected
[ 51.621871]
[ 51.622169] Memory state around the buggy address:
[ 51.622821] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.623819] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.624536] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.625322] ^
[ 51.625805] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.626704] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.627580] ==================================================================
Home
[ 51.476299] ==================================================================
[ 51.477401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 51.478364] Read of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[ 51.478712]
[ 51.479051] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.480238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.481286] Call Trace:
[ 51.481945] <TASK>
[ 51.482431] dump_stack_lvl+0x4e/0x90
[ 51.483233] print_report+0xd2/0x660
[ 51.483903] ? __virt_addr_valid+0x156/0x1e0
[ 51.484536] ? kasan_complete_mode_report_info+0x2a/0x200
[ 51.485274] kasan_report+0xff/0x140
[ 51.485885] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 51.486783] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 51.487688] kasan_check_range+0x10c/0x1c0
[ 51.488490] __kasan_check_read+0x15/0x20
[ 51.489241] kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 51.490020] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 51.490864] ? add_taint+0x2e/0xa0
[ 51.491401] kasan_bitops_generic+0xb4/0x130
[ 51.492182] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 51.492833] ? ktime_get_ts64+0x118/0x140
[ 51.493508] kunit_try_run_case+0x126/0x290
[ 51.494265] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.494940] ? __kasan_check_write+0x18/0x20
[ 51.495529] ? trace_preempt_on+0x20/0xa0
[ 51.496314] ? __kthread_parkme+0x4f/0xd0
[ 51.497094] ? preempt_count_sub+0x50/0x80
[ 51.497661] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.498204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.499197] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.500303] kthread+0x19e/0x1e0
[ 51.500774] ? __pfx_kthread+0x10/0x10
[ 51.501370] ret_from_fork+0x41/0x70
[ 51.501877] ? __pfx_kthread+0x10/0x10
[ 51.502371] ret_from_fork_asm+0x1b/0x30
[ 51.503139] </TASK>
[ 51.503454]
[ 51.503665] Allocated by task 224:
[ 51.504784] kasan_save_stack+0x3c/0x60
[ 51.505454] kasan_set_track+0x29/0x40
[ 51.505930] kasan_save_alloc_info+0x22/0x30
[ 51.506525] __kasan_kmalloc+0xb7/0xc0
[ 51.506981] kmalloc_trace+0x4c/0xb0
[ 51.507568] kasan_bitops_generic+0x8e/0x130
[ 51.508396] kunit_try_run_case+0x126/0x290
[ 51.509072] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.509705] kthread+0x19e/0x1e0
[ 51.510472] ret_from_fork+0x41/0x70
[ 51.510947] ret_from_fork_asm+0x1b/0x30
[ 51.511558]
[ 51.512203] The buggy address belongs to the object at ffff8881024ffaa0
[ 51.512203] which belongs to the cache kmalloc-16 of size 16
[ 51.513634] The buggy address is located 8 bytes inside of
[ 51.513634] allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[ 51.514381]
[ 51.514864] The buggy address belongs to the physical page:
[ 51.515405] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 51.516932] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.517491] page_type: 0xffffffff()
[ 51.518128] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.519130] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.519960] page dumped because: kasan: bad access detected
[ 51.520570]
[ 51.520846] Memory state around the buggy address:
[ 51.521483] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 51.522414] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.523198] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 51.524035] ^
[ 51.524627] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.525495] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.526366] ==================================================================
Home
[ 46.955734] ==================================================================
[ 46.956743] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd0/0x1e0
[ 46.957630] Write of size 1 at addr ffff888101d3df00 by task kunit_try_catch/150
[ 46.958985]
[ 46.959878] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.961056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.962118] Call Trace:
[ 46.962468] <TASK>
[ 46.962878] dump_stack_lvl+0x4e/0x90
[ 46.963446] print_report+0xd2/0x660
[ 46.964092] ? __virt_addr_valid+0x156/0x1e0
[ 46.964673] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.965470] kasan_report+0xff/0x140
[ 46.966067] ? kmalloc_large_oob_right+0xd0/0x1e0
[ 46.966696] ? kmalloc_large_oob_right+0xd0/0x1e0
[ 46.967429] __asan_store1+0x69/0x70
[ 46.967975] kmalloc_large_oob_right+0xd0/0x1e0
[ 46.968529] ? __pfx_kmalloc_large_oob_right+0x10/0x10
[ 46.969342] ? __schedule+0x70b/0x1190
[ 46.970057] ? ktime_get_ts64+0x118/0x140
[ 46.970761] kunit_try_run_case+0x126/0x290
[ 46.971526] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.972116] ? __kasan_check_write+0x18/0x20
[ 46.972634] ? trace_preempt_on+0x20/0xa0
[ 46.973400] ? __kthread_parkme+0x4f/0xd0
[ 46.974092] ? preempt_count_sub+0x50/0x80
[ 46.974660] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.975235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.976070] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.976865] kthread+0x19e/0x1e0
[ 46.977429] ? __pfx_kthread+0x10/0x10
[ 46.978056] ret_from_fork+0x41/0x70
[ 46.978514] ? __pfx_kthread+0x10/0x10
[ 46.979161] ret_from_fork_asm+0x1b/0x30
[ 46.979732] </TASK>
[ 46.980100]
[ 46.980366] Allocated by task 150:
[ 46.980872] kasan_save_stack+0x3c/0x60
[ 46.981413] kasan_set_track+0x29/0x40
[ 46.981908] kasan_save_alloc_info+0x22/0x30
[ 46.982533] __kasan_kmalloc+0xb7/0xc0
[ 46.983109] kmalloc_trace+0x4c/0xb0
[ 46.983662] kmalloc_large_oob_right+0x9d/0x1e0
[ 46.984294] kunit_try_run_case+0x126/0x290
[ 46.984881] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.985447] kthread+0x19e/0x1e0
[ 46.985990] ret_from_fork+0x41/0x70
[ 46.986565] ret_from_fork_asm+0x1b/0x30
[ 46.987186]
[ 46.987485] The buggy address belongs to the object at ffff888101d3c000
[ 46.987485] which belongs to the cache kmalloc-8k of size 8192
[ 46.988609] The buggy address is located 0 bytes to the right of
[ 46.988609] allocated 7936-byte region [ffff888101d3c000, ffff888101d3df00)
[ 46.989879]
[ 46.990195] The buggy address belongs to the physical page:
[ 46.990837] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d38
[ 46.991921] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 46.992681] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 46.993474] page_type: 0xffffffff()
[ 46.994054] raw: 0200000000000840 ffff888100042280 dead000000000122 0000000000000000
[ 46.994812] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[ 46.995561] page dumped because: kasan: bad access detected
[ 46.996262]
[ 46.996537] Memory state around the buggy address:
[ 46.997114] ffff888101d3de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.997956] ffff888101d3de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.998581] >ffff888101d3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.999454] ^
[ 46.999986] ffff888101d3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.000803] ffff888101d3e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.002481] ==================================================================
Home
[ 48.348241] ==================================================================
[ 48.349645] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xea/0x1f0
[ 48.350513] Read of size 64 at addr ffff888102067504 by task kunit_try_catch/178
[ 48.351741]
[ 48.351985] CPU: 1 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.353230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.354275] Call Trace:
[ 48.354694] <TASK>
[ 48.355145] dump_stack_lvl+0x4e/0x90
[ 48.355830] print_report+0xd2/0x660
[ 48.356393] ? __virt_addr_valid+0x156/0x1e0
[ 48.357011] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.357641] kasan_report+0xff/0x140
[ 48.358318] ? kmalloc_memmove_invalid_size+0xea/0x1f0
[ 48.359092] ? kmalloc_memmove_invalid_size+0xea/0x1f0
[ 48.359874] kasan_check_range+0x10c/0x1c0
[ 48.360566] __asan_memmove+0x27/0x70
[ 48.361136] kmalloc_memmove_invalid_size+0xea/0x1f0
[ 48.361927] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[ 48.362917] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[ 48.363740] ? kunit_try_run_case+0x11b/0x290
[ 48.364379] kunit_try_run_case+0x126/0x290
[ 48.365031] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.365633] ? __kasan_check_write+0x18/0x20
[ 48.366264] ? trace_preempt_on+0x20/0xa0
[ 48.366923] ? __kthread_parkme+0x4f/0xd0
[ 48.367528] ? preempt_count_sub+0x50/0x80
[ 48.368146] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.368810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.369618] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.370369] kthread+0x19e/0x1e0
[ 48.370873] ? __pfx_kthread+0x10/0x10
[ 48.371484] ret_from_fork+0x41/0x70
[ 48.372057] ? __pfx_kthread+0x10/0x10
[ 48.372658] ret_from_fork_asm+0x1b/0x30
[ 48.373357] </TASK>
[ 48.373726]
[ 48.374068] Allocated by task 178:
[ 48.374521] kasan_save_stack+0x3c/0x60
[ 48.375078] kasan_set_track+0x29/0x40
[ 48.375664] kasan_save_alloc_info+0x22/0x30
[ 48.376244] __kasan_kmalloc+0xb7/0xc0
[ 48.376846] kmalloc_trace+0x4c/0xb0
[ 48.377353] kmalloc_memmove_invalid_size+0x9f/0x1f0
[ 48.378112] kunit_try_run_case+0x126/0x290
[ 48.378634] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.379489] kthread+0x19e/0x1e0
[ 48.380027] ret_from_fork+0x41/0x70
[ 48.380623] ret_from_fork_asm+0x1b/0x30
[ 48.381287]
[ 48.381543] The buggy address belongs to the object at ffff888102067500
[ 48.381543] which belongs to the cache kmalloc-64 of size 64
[ 48.382767] The buggy address is located 4 bytes inside of
[ 48.382767] allocated 64-byte region [ffff888102067500, ffff888102067540)
[ 48.384030]
[ 48.384363] The buggy address belongs to the physical page:
[ 48.385041] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[ 48.385812] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.386539] page_type: 0xffffffff()
[ 48.387124] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 48.388022] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 48.388763] page dumped because: kasan: bad access detected
[ 48.389356]
[ 48.389645] Memory state around the buggy address:
[ 48.390126] ffff888102067400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.391032] ffff888102067480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.391903] >ffff888102067500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 48.392576] ^
[ 48.393341] ffff888102067580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.394075] ffff888102067600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.394812] ==================================================================
Home
[ 46.692024] ==================================================================
[ 46.692986] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1f0
[ 46.694233] Read of size 1 at addr ffff888101d4f000 by task kunit_try_catch/138
[ 46.695502]
[ 46.696293] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.697238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.698338] Call Trace:
[ 46.698682] <TASK>
[ 46.699029] dump_stack_lvl+0x4e/0x90
[ 46.699540] print_report+0xd2/0x660
[ 46.700630] ? __virt_addr_valid+0x156/0x1e0
[ 46.701499] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.702430] kasan_report+0xff/0x140
[ 46.702931] ? kmalloc_node_oob_right+0xd4/0x1f0
[ 46.703655] ? kmalloc_node_oob_right+0xd4/0x1f0
[ 46.704289] __asan_load1+0x66/0x70
[ 46.704772] kmalloc_node_oob_right+0xd4/0x1f0
[ 46.706016] ? __pfx_kmalloc_node_oob_right+0x10/0x10
[ 46.706682] ? __schedule+0x70b/0x1190
[ 46.707394] ? ktime_get_ts64+0x118/0x140
[ 46.707906] kunit_try_run_case+0x126/0x290
[ 46.708563] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.709721] ? __kasan_check_write+0x18/0x20
[ 46.710326] ? trace_preempt_on+0x20/0xa0
[ 46.710863] ? __kthread_parkme+0x4f/0xd0
[ 46.711382] ? preempt_count_sub+0x50/0x80
[ 46.711990] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.712613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.714036] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.715102] kthread+0x19e/0x1e0
[ 46.715738] ? __pfx_kthread+0x10/0x10
[ 46.716270] ret_from_fork+0x41/0x70
[ 46.717238] ? __pfx_kthread+0x10/0x10
[ 46.718039] ret_from_fork_asm+0x1b/0x30
[ 46.718584] </TASK>
[ 46.719098]
[ 46.719397] Allocated by task 138:
[ 46.719914] kasan_save_stack+0x3c/0x60
[ 46.720430] kasan_set_track+0x29/0x40
[ 46.720918] kasan_save_alloc_info+0x22/0x30
[ 46.722267] __kasan_kmalloc+0xb7/0xc0
[ 46.722809] kmalloc_node_trace+0x49/0xb0
[ 46.723395] kmalloc_node_oob_right+0xa1/0x1f0
[ 46.724044] kunit_try_run_case+0x126/0x290
[ 46.724644] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.725462] kthread+0x19e/0x1e0
[ 46.725986] ret_from_fork+0x41/0x70
[ 46.726509] ret_from_fork_asm+0x1b/0x30
[ 46.727321]
[ 46.727560] The buggy address belongs to the object at ffff888101d4e000
[ 46.727560] which belongs to the cache kmalloc-4k of size 4096
[ 46.728901] The buggy address is located 0 bytes to the right of
[ 46.728901] allocated 4096-byte region [ffff888101d4e000, ffff888101d4f000)
[ 46.730758]
[ 46.731052] The buggy address belongs to the physical page:
[ 46.731646] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d48
[ 46.733529] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 46.734673] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 46.735584] page_type: 0xffffffff()
[ 46.736260] raw: 0200000000000840 ffff888100042140 dead000000000122 0000000000000000
[ 46.736904] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[ 46.737871] page dumped because: kasan: bad access detected
[ 46.738769]
[ 46.739311] Memory state around the buggy address:
[ 46.740210] ffff888101d4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.741156] ffff888101d4ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.742077] >ffff888101d4f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.742609] ^
[ 46.743513] ffff888101d4f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.744459] ffff888101d4f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.745427] ==================================================================
Home
[ 47.865167] ==================================================================
[ 47.866166] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf3/0x250
[ 47.866948] Write of size 16 at addr ffff88810148a960 by task kunit_try_catch/162
[ 47.867919]
[ 47.868275] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.869336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.870363] Call Trace:
[ 47.870707] <TASK>
[ 47.871057] dump_stack_lvl+0x4e/0x90
[ 47.871657] print_report+0xd2/0x660
[ 47.872174] ? __virt_addr_valid+0x156/0x1e0
[ 47.872858] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.873557] kasan_report+0xff/0x140
[ 47.874052] ? kmalloc_oob_16+0xf3/0x250
[ 47.874628] ? kmalloc_oob_16+0xf3/0x250
[ 47.875230] __asan_store16+0x6c/0xa0
[ 47.875832] kmalloc_oob_16+0xf3/0x250
[ 47.876423] ? __pfx_kmalloc_oob_16+0x10/0x10
[ 47.877069] ? __schedule+0x70b/0x1190
[ 47.877527] ? ktime_get_ts64+0x118/0x140
[ 47.878193] kunit_try_run_case+0x126/0x290
[ 47.878858] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.879478] ? __kasan_check_write+0x18/0x20
[ 47.880179] ? trace_preempt_on+0x20/0xa0
[ 47.880724] ? __kthread_parkme+0x4f/0xd0
[ 47.881329] ? preempt_count_sub+0x50/0x80
[ 47.881923] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.882533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.883239] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.884039] kthread+0x19e/0x1e0
[ 47.884508] ? __pfx_kthread+0x10/0x10
[ 47.885141] ret_from_fork+0x41/0x70
[ 47.885688] ? __pfx_kthread+0x10/0x10
[ 47.886287] ret_from_fork_asm+0x1b/0x30
[ 47.886919] </TASK>
[ 47.887276]
[ 47.887507] Allocated by task 162:
[ 47.888023] kasan_save_stack+0x3c/0x60
[ 47.888585] kasan_set_track+0x29/0x40
[ 47.889155] kasan_save_alloc_info+0x22/0x30
[ 47.889835] __kasan_kmalloc+0xb7/0xc0
[ 47.890273] kmalloc_trace+0x4c/0xb0
[ 47.890584] kmalloc_oob_16+0x8f/0x250
[ 47.890924] kunit_try_run_case+0x126/0x290
[ 47.891596] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.892533] kthread+0x19e/0x1e0
[ 47.893191] ret_from_fork+0x41/0x70
[ 47.893883] ret_from_fork_asm+0x1b/0x30
[ 47.894492]
[ 47.895016] The buggy address belongs to the object at ffff88810148a960
[ 47.895016] which belongs to the cache kmalloc-16 of size 16
[ 47.896519] The buggy address is located 0 bytes inside of
[ 47.896519] allocated 13-byte region [ffff88810148a960, ffff88810148a96d)
[ 47.898072]
[ 47.898293] The buggy address belongs to the physical page:
[ 47.899277] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[ 47.900432] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.901240] page_type: 0xffffffff()
[ 47.901955] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 47.902788] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 47.903755] page dumped because: kasan: bad access detected
[ 47.904351]
[ 47.904628] Memory state around the buggy address:
[ 47.905591] ffff88810148a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 47.906477] ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[ 47.908048] >ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc 00 05 fc fc
[ 47.909107] ^
[ 47.909970] ffff88810148a980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.910870] ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.911800] ==================================================================
Home
[ 47.992539] ==================================================================
[ 47.993633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xda/0x1e0
[ 47.994677] Write of size 128 at addr ffff888102066f00 by task kunit_try_catch/166
[ 47.995419]
[ 47.995644] CPU: 1 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.996642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.997851] Call Trace:
[ 47.998327] <TASK>
[ 47.998792] dump_stack_lvl+0x4e/0x90
[ 47.999533] print_report+0xd2/0x660
[ 48.000223] ? __virt_addr_valid+0x156/0x1e0
[ 48.001036] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.001733] kasan_report+0xff/0x140
[ 48.002520] ? kmalloc_oob_in_memset+0xda/0x1e0
[ 48.003323] ? kmalloc_oob_in_memset+0xda/0x1e0
[ 48.004114] kasan_check_range+0x10c/0x1c0
[ 48.004851] __asan_memset+0x27/0x50
[ 48.005316] kmalloc_oob_in_memset+0xda/0x1e0
[ 48.005601] ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[ 48.006049] ? __schedule+0x70b/0x1190
[ 48.006563] ? ktime_get_ts64+0x118/0x140
[ 48.007154] kunit_try_run_case+0x126/0x290
[ 48.008016] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.008745] ? __kasan_check_write+0x18/0x20
[ 48.009426] ? trace_preempt_on+0x20/0xa0
[ 48.009804] ? __kthread_parkme+0x4f/0xd0
[ 48.010201] ? preempt_count_sub+0x50/0x80
[ 48.011008] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.011680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.012511] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.013327] kthread+0x19e/0x1e0
[ 48.013763] ? __pfx_kthread+0x10/0x10
[ 48.014371] ret_from_fork+0x41/0x70
[ 48.015063] ? __pfx_kthread+0x10/0x10
[ 48.015641] ret_from_fork_asm+0x1b/0x30
[ 48.016295] </TASK>
[ 48.016652]
[ 48.016920] Allocated by task 166:
[ 48.017546] kasan_save_stack+0x3c/0x60
[ 48.018149] kasan_set_track+0x29/0x40
[ 48.018688] kasan_save_alloc_info+0x22/0x30
[ 48.019400] __kasan_kmalloc+0xb7/0xc0
[ 48.019867] kmalloc_trace+0x4c/0xb0
[ 48.020450] kmalloc_oob_in_memset+0x9f/0x1e0
[ 48.021015] kunit_try_run_case+0x126/0x290
[ 48.021587] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.022379] kthread+0x19e/0x1e0
[ 48.022927] ret_from_fork+0x41/0x70
[ 48.023539] ret_from_fork_asm+0x1b/0x30
[ 48.024102]
[ 48.024409] The buggy address belongs to the object at ffff888102066f00
[ 48.024409] which belongs to the cache kmalloc-128 of size 128
[ 48.025667] The buggy address is located 0 bytes inside of
[ 48.025667] allocated 120-byte region [ffff888102066f00, ffff888102066f78)
[ 48.027100]
[ 48.027413] The buggy address belongs to the physical page:
[ 48.028045] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[ 48.029086] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.029886] page_type: 0xffffffff()
[ 48.030371] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 48.031447] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 48.032517] page dumped because: kasan: bad access detected
[ 48.033417]
[ 48.033912] Memory state around the buggy address:
[ 48.034560] ffff888102066e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.035485] ffff888102066e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.036416] >ffff888102066f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 48.037367] ^
[ 48.038282] ffff888102066f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.039207] ffff888102067000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 48.040128] ==================================================================
Home
[ 46.605539] ==================================================================
[ 46.606568] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcf/0x1f0
[ 46.607253] Read of size 1 at addr ffff8881024ffa5f by task kunit_try_catch/136
[ 46.607972]
[ 46.608352] CPU: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.609267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.610142] Call Trace:
[ 46.610533] <TASK>
[ 46.610970] dump_stack_lvl+0x4e/0x90
[ 46.612526] print_report+0xd2/0x660
[ 46.613239] ? __virt_addr_valid+0x156/0x1e0
[ 46.613818] ? kasan_complete_mode_report_info+0x64/0x200
[ 46.614435] kasan_report+0xff/0x140
[ 46.614984] ? kmalloc_oob_left+0xcf/0x1f0
[ 46.615837] ? kmalloc_oob_left+0xcf/0x1f0
[ 46.616415] __asan_load1+0x66/0x70
[ 46.617246] kmalloc_oob_left+0xcf/0x1f0
[ 46.618101] ? __pfx_kmalloc_oob_left+0x10/0x10
[ 46.618622] ? __pfx_kmalloc_oob_left+0x10/0x10
[ 46.619499] ? kunit_try_run_case+0x11b/0x290
[ 46.620119] kunit_try_run_case+0x126/0x290
[ 46.620695] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.621245] ? __kasan_check_write+0x18/0x20
[ 46.621906] ? trace_preempt_on+0x20/0xa0
[ 46.622706] ? __kthread_parkme+0x4f/0xd0
[ 46.623668] ? preempt_count_sub+0x50/0x80
[ 46.624313] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.625084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.625968] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.626615] kthread+0x19e/0x1e0
[ 46.627170] ? __pfx_kthread+0x10/0x10
[ 46.627677] ret_from_fork+0x41/0x70
[ 46.628256] ? __pfx_kthread+0x10/0x10
[ 46.628690] ret_from_fork_asm+0x1b/0x30
[ 46.629390] </TASK>
[ 46.629670]
[ 46.630041] Allocated by task 1:
[ 46.630443] kasan_save_stack+0x3c/0x60
[ 46.631698] kasan_set_track+0x29/0x40
[ 46.632351] kasan_save_alloc_info+0x22/0x30
[ 46.633307] __kasan_kmalloc+0xb7/0xc0
[ 46.634036] __kmalloc_node_track_caller+0x69/0x170
[ 46.634656] kvasprintf+0xc6/0x150
[ 46.635635] __kthread_create_on_node+0x128/0x260
[ 46.636476] kthread_create_on_node+0xa8/0xe0
[ 46.637269] cryptomgr_notify+0x406/0x450
[ 46.637882] notifier_call_chain+0x83/0x150
[ 46.638471] blocking_notifier_call_chain+0x55/0x80
[ 46.639286] crypto_alg_mod_lookup+0x15f/0x2a0
[ 46.639954] crypto_alloc_tfm_node+0x6e/0x120
[ 46.640793] crypto_alloc_sig+0x23/0x30
[ 46.641552] public_key_verify_signature+0x18c/0x3c0
[ 46.642379] x509_check_for_self_signed+0x16c/0x1e0
[ 46.643237] x509_cert_parse+0x319/0x380
[ 46.643825] x509_key_preparse+0x42/0x3b0
[ 46.644394] asymmetric_key_preparse+0x74/0xf0
[ 46.645546] __key_create_or_update+0x332/0x7b0
[ 46.646137] key_create_or_update+0x17/0x20
[ 46.646790] x509_load_certificate_list+0xe6/0x140
[ 46.647597] regulatory_init_db+0xb7/0x1d0
[ 46.648343] do_one_initcall+0xb3/0x340
[ 46.648884] kernel_init_freeable+0x2ae/0x470
[ 46.649610] kernel_init+0x23/0x1e0
[ 46.650582] ret_from_fork+0x41/0x70
[ 46.651195] ret_from_fork_asm+0x1b/0x30
[ 46.652076]
[ 46.652533] Freed by task 0:
[ 46.653178] kasan_save_stack+0x3c/0x60
[ 46.653749] kasan_set_track+0x29/0x40
[ 46.654269] kasan_save_free_info+0x2f/0x50
[ 46.655100] ____kasan_slab_free+0x172/0x1d0
[ 46.655692] __kasan_slab_free+0x16/0x20
[ 46.656698] __kmem_cache_free+0x190/0x310
[ 46.657688] kfree+0x7c/0x120
[ 46.658233] free_kthread_struct+0x78/0xa0
[ 46.658738] free_task+0x96/0xa0
[ 46.659444] __put_task_struct+0x1a2/0x1f0
[ 46.660333] delayed_put_task_struct+0xec/0x110
[ 46.661199] rcu_core+0x4be/0x1020
[ 46.662173] rcu_core_si+0x12/0x20
[ 46.662604] handle_softirqs+0x195/0x520
[ 46.663443] irq_exit_rcu+0x92/0xb0
[ 46.664107] sysvec_apic_timer_interrupt+0x80/0xa0
[ 46.664956] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 46.665491]
[ 46.665708] The buggy address belongs to the object at ffff8881024ffa40
[ 46.665708] which belongs to the cache kmalloc-16 of size 16
[ 46.667333] The buggy address is located 15 bytes to the right of
[ 46.667333] allocated 16-byte region [ffff8881024ffa40, ffff8881024ffa50)
[ 46.668705]
[ 46.669151] The buggy address belongs to the physical page:
[ 46.669865] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 46.671109] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.671989] page_type: 0xffffffff()
[ 46.672699] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 46.673980] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 46.675043] page dumped because: kasan: bad access detected
[ 46.676198]
[ 46.676461] Memory state around the buggy address:
[ 46.676841] ffff8881024ff900: 00 02 fc fc 00 03 fc fc 00 02 fc fc 00 05 fc fc
[ 46.677935] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 46.678707] >ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[ 46.679269] ^
[ 46.680048] ffff8881024ffa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.681310] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.682324] ==================================================================
Home
[ 48.228662] ==================================================================
[ 48.229982] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[ 48.230901] Write of size 16 at addr ffff888102069369 by task kunit_try_catch/174
[ 48.231817]
[ 48.232142] CPU: 1 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.233199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.234358] Call Trace:
[ 48.234793] <TASK>
[ 48.235246] dump_stack_lvl+0x4e/0x90
[ 48.235966] print_report+0xd2/0x660
[ 48.236621] ? __virt_addr_valid+0x156/0x1e0
[ 48.237328] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.238087] kasan_report+0xff/0x140
[ 48.238632] ? kmalloc_oob_memset_16+0xdd/0x1e0
[ 48.239402] ? kmalloc_oob_memset_16+0xdd/0x1e0
[ 48.240160] kasan_check_range+0x10c/0x1c0
[ 48.241109] __asan_memset+0x27/0x50
[ 48.241636] kmalloc_oob_memset_16+0xdd/0x1e0
[ 48.242204] ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[ 48.242930] ? __schedule+0x70b/0x1190
[ 48.243735] ? ktime_get_ts64+0x118/0x140
[ 48.244416] kunit_try_run_case+0x126/0x290
[ 48.245377] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.246091] ? __kasan_check_write+0x18/0x20
[ 48.246874] ? trace_preempt_on+0x20/0xa0
[ 48.247614] ? __kthread_parkme+0x4f/0xd0
[ 48.248257] ? preempt_count_sub+0x50/0x80
[ 48.248773] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.249731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.250571] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.251392] kthread+0x19e/0x1e0
[ 48.251943] ? __pfx_kthread+0x10/0x10
[ 48.252694] ret_from_fork+0x41/0x70
[ 48.253520] ? __pfx_kthread+0x10/0x10
[ 48.254244] ret_from_fork_asm+0x1b/0x30
[ 48.255016] </TASK>
[ 48.255530]
[ 48.255976] Allocated by task 174:
[ 48.256585] kasan_save_stack+0x3c/0x60
[ 48.257312] kasan_set_track+0x29/0x40
[ 48.257792] kasan_save_alloc_info+0x22/0x30
[ 48.258342] __kasan_kmalloc+0xb7/0xc0
[ 48.259276] kmalloc_trace+0x4c/0xb0
[ 48.259730] kmalloc_oob_memset_16+0x9f/0x1e0
[ 48.260262] kunit_try_run_case+0x126/0x290
[ 48.260889] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.261625] kthread+0x19e/0x1e0
[ 48.262207] ret_from_fork+0x41/0x70
[ 48.262724] ret_from_fork_asm+0x1b/0x30
[ 48.263693]
[ 48.264016] The buggy address belongs to the object at ffff888102069300
[ 48.264016] which belongs to the cache kmalloc-128 of size 128
[ 48.265550] The buggy address is located 105 bytes inside of
[ 48.265550] allocated 120-byte region [ffff888102069300, ffff888102069378)
[ 48.266706]
[ 48.267027] The buggy address belongs to the physical page:
[ 48.267530] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[ 48.268532] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.269291] page_type: 0xffffffff()
[ 48.269802] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 48.270650] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 48.271479] page dumped because: kasan: bad access detected
[ 48.272090]
[ 48.272426] Memory state around the buggy address:
[ 48.273088] ffff888102069200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.273808] ffff888102069280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.274673] >ffff888102069300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 48.275489] ^
[ 48.276299] ffff888102069380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.277135] ffff888102069400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.277909] ==================================================================
---
[ 48.170440] ==================================================================
[ 48.171660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[ 48.172556] Write of size 8 at addr ffff888102069271 by task kunit_try_catch/172
[ 48.173293]
[ 48.173600] CPU: 1 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.174543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.175281] Call Trace:
[ 48.175852] <TASK>
[ 48.176266] dump_stack_lvl+0x4e/0x90
[ 48.176920] print_report+0xd2/0x660
[ 48.177510] ? __virt_addr_valid+0x156/0x1e0
[ 48.178237] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.179079] kasan_report+0xff/0x140
[ 48.179824] ? kmalloc_oob_memset_8+0xdd/0x1e0
[ 48.180598] ? kmalloc_oob_memset_8+0xdd/0x1e0
[ 48.181428] kasan_check_range+0x10c/0x1c0
[ 48.182181] __asan_memset+0x27/0x50
[ 48.182857] kmalloc_oob_memset_8+0xdd/0x1e0
[ 48.183646] ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[ 48.184288] ? __schedule+0x70b/0x1190
[ 48.185080] ? ktime_get_ts64+0x118/0x140
[ 48.185826] kunit_try_run_case+0x126/0x290
[ 48.186444] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.187288] ? __kasan_check_write+0x18/0x20
[ 48.188048] ? trace_preempt_on+0x20/0xa0
[ 48.188785] ? __kthread_parkme+0x4f/0xd0
[ 48.189353] ? preempt_count_sub+0x50/0x80
[ 48.190206] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.190981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.191880] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.192605] kthread+0x19e/0x1e0
[ 48.193342] ? __pfx_kthread+0x10/0x10
[ 48.193974] ret_from_fork+0x41/0x70
[ 48.194490] ? __pfx_kthread+0x10/0x10
[ 48.195190] ret_from_fork_asm+0x1b/0x30
[ 48.195938] </TASK>
[ 48.196333]
[ 48.196497] Allocated by task 172:
[ 48.196696] kasan_save_stack+0x3c/0x60
[ 48.197200] kasan_set_track+0x29/0x40
[ 48.197842] kasan_save_alloc_info+0x22/0x30
[ 48.198710] __kasan_kmalloc+0xb7/0xc0
[ 48.199390] kmalloc_trace+0x4c/0xb0
[ 48.199977] kmalloc_oob_memset_8+0x9f/0x1e0
[ 48.200605] kunit_try_run_case+0x126/0x290
[ 48.201280] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.202123] kthread+0x19e/0x1e0
[ 48.202668] ret_from_fork+0x41/0x70
[ 48.203438] ret_from_fork_asm+0x1b/0x30
[ 48.204091]
[ 48.204316] The buggy address belongs to the object at ffff888102069200
[ 48.204316] which belongs to the cache kmalloc-128 of size 128
[ 48.206060] The buggy address is located 113 bytes inside of
[ 48.206060] allocated 120-byte region [ffff888102069200, ffff888102069278)
[ 48.207319]
[ 48.207545] The buggy address belongs to the physical page:
[ 48.208597] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[ 48.209388] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.210141] page_type: 0xffffffff()
[ 48.210583] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 48.211588] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 48.212381] page dumped because: kasan: bad access detected
[ 48.213134]
[ 48.213348] Memory state around the buggy address:
[ 48.214477] ffff888102069100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.215096] ffff888102069180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.215844] >ffff888102069200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 48.216588] ^
[ 48.217647] ffff888102069280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.218143] ffff888102069300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.218606] ==================================================================
---
[ 48.113533] ==================================================================
[ 48.114623] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[ 48.115602] Write of size 4 at addr ffff888102069175 by task kunit_try_catch/170
[ 48.116533]
[ 48.117040] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.117836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.118733] Call Trace:
[ 48.119188] <TASK>
[ 48.119629] dump_stack_lvl+0x4e/0x90
[ 48.120443] print_report+0xd2/0x660
[ 48.121086] ? __virt_addr_valid+0x156/0x1e0
[ 48.121705] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.122529] kasan_report+0xff/0x140
[ 48.123163] ? kmalloc_oob_memset_4+0xdd/0x1e0
[ 48.123688] ? kmalloc_oob_memset_4+0xdd/0x1e0
[ 48.124452] kasan_check_range+0x10c/0x1c0
[ 48.125128] __asan_memset+0x27/0x50
[ 48.125715] kmalloc_oob_memset_4+0xdd/0x1e0
[ 48.126379] ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[ 48.127076] ? __schedule+0x70b/0x1190
[ 48.127639] ? ktime_get_ts64+0x118/0x140
[ 48.128325] kunit_try_run_case+0x126/0x290
[ 48.129040] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.129663] ? __kasan_check_write+0x18/0x20
[ 48.130380] ? trace_preempt_on+0x20/0xa0
[ 48.131016] ? __kthread_parkme+0x4f/0xd0
[ 48.131597] ? preempt_count_sub+0x50/0x80
[ 48.132238] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.132907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.133682] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.134466] kthread+0x19e/0x1e0
[ 48.135045] ? __pfx_kthread+0x10/0x10
[ 48.135630] ret_from_fork+0x41/0x70
[ 48.136267] ? __pfx_kthread+0x10/0x10
[ 48.136865] ret_from_fork_asm+0x1b/0x30
[ 48.137498] </TASK>
[ 48.137933]
[ 48.138258] Allocated by task 170:
[ 48.138791] kasan_save_stack+0x3c/0x60
[ 48.139418] kasan_set_track+0x29/0x40
[ 48.140055] kasan_save_alloc_info+0x22/0x30
[ 48.140682] __kasan_kmalloc+0xb7/0xc0
[ 48.141314] kmalloc_trace+0x4c/0xb0
[ 48.141885] kmalloc_oob_memset_4+0x9f/0x1e0
[ 48.142550] kunit_try_run_case+0x126/0x290
[ 48.143165] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.143952] kthread+0x19e/0x1e0
[ 48.144435] ret_from_fork+0x41/0x70
[ 48.145083] ret_from_fork_asm+0x1b/0x30
[ 48.145675]
[ 48.146043] The buggy address belongs to the object at ffff888102069100
[ 48.146043] which belongs to the cache kmalloc-128 of size 128
[ 48.147293] The buggy address is located 117 bytes inside of
[ 48.147293] allocated 120-byte region [ffff888102069100, ffff888102069178)
[ 48.148504]
[ 48.148868] The buggy address belongs to the physical page:
[ 48.149619] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[ 48.150625] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.151383] page_type: 0xffffffff()
[ 48.151894] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 48.152691] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 48.153666] page dumped because: kasan: bad access detected
[ 48.154330]
[ 48.154648] Memory state around the buggy address:
[ 48.155229] ffff888102069000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.156028] ffff888102069080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.156860] >ffff888102069100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 48.157676] ^
[ 48.158463] ffff888102069180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.159303] ffff888102069200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.160108] ==================================================================
Home
[ 48.050182] ==================================================================
[ 48.051701] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[ 48.052492] Write of size 2 at addr ffff888102069077 by task kunit_try_catch/168
[ 48.053145]
[ 48.053464] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.054584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.055632] Call Trace:
[ 48.056231] <TASK>
[ 48.056598] dump_stack_lvl+0x4e/0x90
[ 48.057553] print_report+0xd2/0x660
[ 48.058340] ? __virt_addr_valid+0x156/0x1e0
[ 48.059032] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.059957] kasan_report+0xff/0x140
[ 48.060496] ? kmalloc_oob_memset_2+0xdd/0x1e0
[ 48.061281] ? kmalloc_oob_memset_2+0xdd/0x1e0
[ 48.062401] kasan_check_range+0x10c/0x1c0
[ 48.062933] __asan_memset+0x27/0x50
[ 48.063405] kmalloc_oob_memset_2+0xdd/0x1e0
[ 48.064191] ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[ 48.064968] ? __schedule+0x70b/0x1190
[ 48.065552] ? ktime_get_ts64+0x118/0x140
[ 48.066289] kunit_try_run_case+0x126/0x290
[ 48.067051] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.067683] ? __kasan_check_write+0x18/0x20
[ 48.068847] ? trace_preempt_on+0x20/0xa0
[ 48.069526] ? __kthread_parkme+0x4f/0xd0
[ 48.070115] ? preempt_count_sub+0x50/0x80
[ 48.070666] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.071380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.072382] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.073249] kthread+0x19e/0x1e0
[ 48.073802] ? __pfx_kthread+0x10/0x10
[ 48.074935] ret_from_fork+0x41/0x70
[ 48.075590] ? __pfx_kthread+0x10/0x10
[ 48.076253] ret_from_fork_asm+0x1b/0x30
[ 48.076849] </TASK>
[ 48.077209]
[ 48.077440] Allocated by task 168:
[ 48.077897] kasan_save_stack+0x3c/0x60
[ 48.078524] kasan_set_track+0x29/0x40
[ 48.079283] kasan_save_alloc_info+0x22/0x30
[ 48.079987] __kasan_kmalloc+0xb7/0xc0
[ 48.080522] kmalloc_trace+0x4c/0xb0
[ 48.081642] kmalloc_oob_memset_2+0x9f/0x1e0
[ 48.082168] kunit_try_run_case+0x126/0x290
[ 48.083140] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.084023] kthread+0x19e/0x1e0
[ 48.084512] ret_from_fork+0x41/0x70
[ 48.085245] ret_from_fork_asm+0x1b/0x30
[ 48.085737]
[ 48.086668] The buggy address belongs to the object at ffff888102069000
[ 48.086668] which belongs to the cache kmalloc-128 of size 128
[ 48.087733] The buggy address is located 119 bytes inside of
[ 48.087733] allocated 120-byte region [ffff888102069000, ffff888102069078)
[ 48.089287]
[ 48.089582] The buggy address belongs to the physical page:
[ 48.090267] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[ 48.091410] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.092085] page_type: 0xffffffff()
[ 48.092628] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 48.093489] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 48.094803] page dumped because: kasan: bad access detected
[ 48.095647]
[ 48.096126] Memory state around the buggy address:
[ 48.096742] ffff888102068f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.097713] ffff888102068f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.098728] >ffff888102069000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 48.099816] ^
[ 48.100987] ffff888102069080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.102046] ffff888102069100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.103238] ==================================================================
Home
[ 46.457061] ==================================================================
[ 46.458429] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcf/0x330
[ 46.459662] Write of size 1 at addr ffff888102066973 by task kunit_try_catch/134
[ 46.460453]
[ 46.461542] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G N 6.6.72-rc1 #1
[ 46.462644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.464112] Call Trace:
[ 46.464630] <TASK>
[ 46.465323] dump_stack_lvl+0x4e/0x90
[ 46.465985] print_report+0xd2/0x660
[ 46.466457] ? __virt_addr_valid+0x156/0x1e0
[ 46.467101] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.467916] kasan_report+0xff/0x140
[ 46.468363] ? kmalloc_oob_right+0xcf/0x330
[ 46.468873] ? kmalloc_oob_right+0xcf/0x330
[ 46.469522] __asan_store1+0x69/0x70
[ 46.469914] kmalloc_oob_right+0xcf/0x330
[ 46.470421] ? __pfx_kmalloc_oob_right+0x10/0x10
[ 46.471048] ? __schedule+0x70b/0x1190
[ 46.471554] ? ktime_get_ts64+0x118/0x140
[ 46.472191] kunit_try_run_case+0x126/0x290
[ 46.472859] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.473524] ? __kasan_check_write+0x18/0x20
[ 46.474190] ? trace_preempt_on+0x20/0xa0
[ 46.474802] ? __kthread_parkme+0x4f/0xd0
[ 46.475415] ? preempt_count_sub+0x50/0x80
[ 46.476081] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.476672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.477582] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.478369] kthread+0x19e/0x1e0
[ 46.478878] ? __pfx_kthread+0x10/0x10
[ 46.479309] ret_from_fork+0x41/0x70
[ 46.479793] ? __pfx_kthread+0x10/0x10
[ 46.480455] ret_from_fork_asm+0x1b/0x30
[ 46.481257] </TASK>
[ 46.481868]
[ 46.482282] Allocated by task 134:
[ 46.482912] kasan_save_stack+0x3c/0x60
[ 46.483545] kasan_set_track+0x29/0x40
[ 46.483957] kasan_save_alloc_info+0x22/0x30
[ 46.484695] __kasan_kmalloc+0xb7/0xc0
[ 46.485205] kmalloc_trace+0x4c/0xb0
[ 46.485827] kmalloc_oob_right+0x9f/0x330
[ 46.486389] kunit_try_run_case+0x126/0x290
[ 46.487029] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.487721] kthread+0x19e/0x1e0
[ 46.488243] ret_from_fork+0x41/0x70
[ 46.489049] ret_from_fork_asm+0x1b/0x30
[ 46.489625]
[ 46.490297] The buggy address belongs to the object at ffff888102066900
[ 46.490297] which belongs to the cache kmalloc-128 of size 128
[ 46.491673] The buggy address is located 0 bytes to the right of
[ 46.491673] allocated 115-byte region [ffff888102066900, ffff888102066973)
[ 46.493081]
[ 46.493605] The buggy address belongs to the physical page:
[ 46.494541] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[ 46.495623] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.496854] page_type: 0xffffffff()
[ 46.498148] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 46.498935] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 46.499533] page dumped because: kasan: bad access detected
[ 46.499899]
[ 46.500269] Memory state around the buggy address:
[ 46.501386] ffff888102066800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 46.502104] ffff888102066880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.502777] >ffff888102066900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 46.503495] ^
[ 46.504295] ffff888102066980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.505192] ffff888102066a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.506014] ==================================================================
Home
[ 46.553117] ==================================================================
[ 46.553808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x144/0x330
[ 46.554636] Read of size 1 at addr ffff888102066980 by task kunit_try_catch/134
[ 46.555518]
[ 46.555851] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.556662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.557574] Call Trace:
[ 46.557957] <TASK>
[ 46.558320] dump_stack_lvl+0x4e/0x90
[ 46.558966] print_report+0xd2/0x660
[ 46.559520] ? __virt_addr_valid+0x156/0x1e0
[ 46.560229] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.560908] kasan_report+0xff/0x140
[ 46.561467] ? kmalloc_oob_right+0x144/0x330
[ 46.562006] ? kmalloc_oob_right+0x144/0x330
[ 46.562638] __asan_load1+0x66/0x70
[ 46.563271] kmalloc_oob_right+0x144/0x330
[ 46.563816] ? __pfx_kmalloc_oob_right+0x10/0x10
[ 46.564493] ? __schedule+0x70b/0x1190
[ 46.565121] ? ktime_get_ts64+0x118/0x140
[ 46.565637] kunit_try_run_case+0x126/0x290
[ 46.566327] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.567051] ? __kasan_check_write+0x18/0x20
[ 46.567610] ? trace_preempt_on+0x20/0xa0
[ 46.568155] ? __kthread_parkme+0x4f/0xd0
[ 46.568800] ? preempt_count_sub+0x50/0x80
[ 46.569433] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.570126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.570822] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.571591] kthread+0x19e/0x1e0
[ 46.572156] ? __pfx_kthread+0x10/0x10
[ 46.572715] ret_from_fork+0x41/0x70
[ 46.573390] ? __pfx_kthread+0x10/0x10
[ 46.574019] ret_from_fork_asm+0x1b/0x30
[ 46.574591] </TASK>
[ 46.574930]
[ 46.575229] Allocated by task 134:
[ 46.575648] kasan_save_stack+0x3c/0x60
[ 46.576146] kasan_set_track+0x29/0x40
[ 46.576690] kasan_save_alloc_info+0x22/0x30
[ 46.577362] __kasan_kmalloc+0xb7/0xc0
[ 46.577897] kmalloc_trace+0x4c/0xb0
[ 46.578340] kmalloc_oob_right+0x9f/0x330
[ 46.578961] kunit_try_run_case+0x126/0x290
[ 46.579495] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.580298] kthread+0x19e/0x1e0
[ 46.580851] ret_from_fork+0x41/0x70
[ 46.581426] ret_from_fork_asm+0x1b/0x30
[ 46.581978]
[ 46.582284] The buggy address belongs to the object at ffff888102066900
[ 46.582284] which belongs to the cache kmalloc-128 of size 128
[ 46.583487] The buggy address is located 13 bytes to the right of
[ 46.583487] allocated 115-byte region [ffff888102066900, ffff888102066973)
[ 46.584734]
[ 46.585032] The buggy address belongs to the physical page:
[ 46.585682] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[ 46.586554] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.587262] page_type: 0xffffffff()
[ 46.587831] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 46.588660] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 46.589468] page dumped because: kasan: bad access detected
[ 46.590123]
[ 46.590411] Memory state around the buggy address:
[ 46.590949] ffff888102066880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.591682] ffff888102066900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 46.592480] >ffff888102066980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.593270] ^
[ 46.593624] ffff888102066a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.594489] ffff888102066a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.595226] ==================================================================
Home
[ 46.508543] ==================================================================
[ 46.509426] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x330
[ 46.510333] Write of size 1 at addr ffff888102066978 by task kunit_try_catch/134
[ 46.511277]
[ 46.511633] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.512640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.513850] Call Trace:
[ 46.514289] <TASK>
[ 46.514647] dump_stack_lvl+0x4e/0x90
[ 46.515359] print_report+0xd2/0x660
[ 46.515986] ? __virt_addr_valid+0x156/0x1e0
[ 46.516644] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.517171] kasan_report+0xff/0x140
[ 46.517684] ? kmalloc_oob_right+0x108/0x330
[ 46.518327] ? kmalloc_oob_right+0x108/0x330
[ 46.518869] __asan_store1+0x69/0x70
[ 46.519438] kmalloc_oob_right+0x108/0x330
[ 46.519946] ? __pfx_kmalloc_oob_right+0x10/0x10
[ 46.520628] ? __schedule+0x70b/0x1190
[ 46.521258] ? ktime_get_ts64+0x118/0x140
[ 46.521740] kunit_try_run_case+0x126/0x290
[ 46.522432] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.523195] ? __kasan_check_write+0x18/0x20
[ 46.523806] ? trace_preempt_on+0x20/0xa0
[ 46.524354] ? __kthread_parkme+0x4f/0xd0
[ 46.524903] ? preempt_count_sub+0x50/0x80
[ 46.525512] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.526143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.526859] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.527610] kthread+0x19e/0x1e0
[ 46.528190] ? __pfx_kthread+0x10/0x10
[ 46.528800] ret_from_fork+0x41/0x70
[ 46.529334] ? __pfx_kthread+0x10/0x10
[ 46.529869] ret_from_fork_asm+0x1b/0x30
[ 46.530486] </TASK>
[ 46.530881]
[ 46.531182] Allocated by task 134:
[ 46.531595] kasan_save_stack+0x3c/0x60
[ 46.532074] kasan_set_track+0x29/0x40
[ 46.532616] kasan_save_alloc_info+0x22/0x30
[ 46.533238] __kasan_kmalloc+0xb7/0xc0
[ 46.533807] kmalloc_trace+0x4c/0xb0
[ 46.534378] kmalloc_oob_right+0x9f/0x330
[ 46.534912] kunit_try_run_case+0x126/0x290
[ 46.535533] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.536299] kthread+0x19e/0x1e0
[ 46.536734] ret_from_fork+0x41/0x70
[ 46.537353] ret_from_fork_asm+0x1b/0x30
[ 46.537968]
[ 46.538272] The buggy address belongs to the object at ffff888102066900
[ 46.538272] which belongs to the cache kmalloc-128 of size 128
[ 46.539276] The buggy address is located 5 bytes to the right of
[ 46.539276] allocated 115-byte region [ffff888102066900, ffff888102066973)
[ 46.540654]
[ 46.541006] The buggy address belongs to the physical page:
[ 46.541477] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[ 46.542544] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.543218] page_type: 0xffffffff()
[ 46.543804] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 46.544750] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 46.545489] page dumped because: kasan: bad access detected
[ 46.546184]
[ 46.546476] Memory state around the buggy address:
[ 46.546978] ffff888102066800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 46.547850] ffff888102066880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.548597] >ffff888102066900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 46.549432] ^
[ 46.550169] ffff888102066980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.551010] ffff888102066a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.551733] ==================================================================
Home
[ 46.753642] ==================================================================
[ 46.754722] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 46.755562] Write of size 1 at addr ffff8881028d600a by task kunit_try_catch/140
[ 46.756502]
[ 46.756835] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.758313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.759263] Call Trace:
[ 46.759830] <TASK>
[ 46.760353] dump_stack_lvl+0x4e/0x90
[ 46.761143] print_report+0xd2/0x660
[ 46.761720] ? __virt_addr_valid+0x156/0x1e0
[ 46.762258] ? kasan_addr_to_slab+0x11/0xb0
[ 46.762969] kasan_report+0xff/0x140
[ 46.763602] ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 46.764195] ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 46.764791] __asan_store1+0x69/0x70
[ 46.765353] kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 46.766073] ? __pfx_kmalloc_pagealloc_oob_right+0x10/0x10
[ 46.766692] ? __schedule+0x70b/0x1190
[ 46.767256] ? ktime_get_ts64+0x118/0x140
[ 46.767877] kunit_try_run_case+0x126/0x290
[ 46.768530] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.769152] ? __kasan_check_write+0x18/0x20
[ 46.769828] ? trace_preempt_on+0x20/0xa0
[ 46.770344] ? __kthread_parkme+0x4f/0xd0
[ 46.770987] ? preempt_count_sub+0x50/0x80
[ 46.771571] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.772206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.773100] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.773711] kthread+0x19e/0x1e0
[ 46.774314] ? __pfx_kthread+0x10/0x10
[ 46.774861] ret_from_fork+0x41/0x70
[ 46.775402] ? __pfx_kthread+0x10/0x10
[ 46.776030] ret_from_fork_asm+0x1b/0x30
[ 46.776527] </TASK>
[ 46.776935]
[ 46.777290] The buggy address belongs to the physical page:
[ 46.778148] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d4
[ 46.779090] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 46.779866] flags: 0x200000000000040(head|node=0|zone=2)
[ 46.780399] page_type: 0xffffffff()
[ 46.780943] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 46.781715] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 46.782451] page dumped because: kasan: bad access detected
[ 46.783152]
[ 46.783383] Memory state around the buggy address:
[ 46.784023] ffff8881028d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.784667] ffff8881028d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.785536] >ffff8881028d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 46.786283] ^
[ 46.786739] ffff8881028d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 46.787615] ffff8881028d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 46.788370] ==================================================================
Home
[ 48.643643] ==================================================================
[ 48.645053] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xdd/0x260
[ 48.646055] Read of size 1 at addr ffff88810284b0c8 by task kunit_try_catch/192
[ 48.646899]
[ 48.647298] CPU: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.648422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.649729] Call Trace:
[ 48.650298] <TASK>
[ 48.651073] dump_stack_lvl+0x4e/0x90
[ 48.652185] print_report+0xd2/0x660
[ 48.652731] ? __virt_addr_valid+0x156/0x1e0
[ 48.653666] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.654352] kasan_report+0xff/0x140
[ 48.655595] ? kmem_cache_oob+0xdd/0x260
[ 48.656127] ? kmem_cache_oob+0xdd/0x260
[ 48.656811] __asan_load1+0x66/0x70
[ 48.657520] kmem_cache_oob+0xdd/0x260
[ 48.658043] ? __pfx_kmem_cache_oob+0x10/0x10
[ 48.658645] ? __schedule+0x70b/0x1190
[ 48.659457] ? ktime_get_ts64+0x118/0x140
[ 48.660453] kunit_try_run_case+0x126/0x290
[ 48.661376] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.662055] ? __kasan_check_write+0x18/0x20
[ 48.662605] ? trace_preempt_on+0x20/0xa0
[ 48.663179] ? __kthread_parkme+0x4f/0xd0
[ 48.664043] ? preempt_count_sub+0x50/0x80
[ 48.664609] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.665592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.666483] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.667401] kthread+0x19e/0x1e0
[ 48.667911] ? __pfx_kthread+0x10/0x10
[ 48.668525] ret_from_fork+0x41/0x70
[ 48.669085] ? __pfx_kthread+0x10/0x10
[ 48.669609] ret_from_fork_asm+0x1b/0x30
[ 48.671085] </TASK>
[ 48.671389]
[ 48.671683] Allocated by task 192:
[ 48.672362] kasan_save_stack+0x3c/0x60
[ 48.672848] kasan_set_track+0x29/0x40
[ 48.673580] kasan_save_alloc_info+0x22/0x30
[ 48.674856] __kasan_slab_alloc+0x91/0xa0
[ 48.675425] kmem_cache_alloc+0x180/0x3b0
[ 48.675940] kmem_cache_oob+0xb6/0x260
[ 48.676527] kunit_try_run_case+0x126/0x290
[ 48.677321] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.678520] kthread+0x19e/0x1e0
[ 48.678859] ret_from_fork+0x41/0x70
[ 48.679428] ret_from_fork_asm+0x1b/0x30
[ 48.680194]
[ 48.680490] The buggy address belongs to the object at ffff88810284b000
[ 48.680490] which belongs to the cache test_cache of size 200
[ 48.681695] The buggy address is located 0 bytes to the right of
[ 48.681695] allocated 200-byte region [ffff88810284b000, ffff88810284b0c8)
[ 48.683639]
[ 48.684137] The buggy address belongs to the physical page:
[ 48.684672] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284b
[ 48.685809] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.686417] page_type: 0xffffffff()
[ 48.687412] raw: 0200000000000800 ffff888101ba1b40 dead000000000122 0000000000000000
[ 48.688579] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 48.689536] page dumped because: kasan: bad access detected
[ 48.690196]
[ 48.690490] Memory state around the buggy address:
[ 48.690984] ffff88810284af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.692564] ffff88810284b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 48.693455] >ffff88810284b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 48.694628] ^
[ 48.696146] ffff88810284b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.697106] ffff88810284b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.698239] ==================================================================
Home
[ 47.120683] ==================================================================
[ 47.121679] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[ 47.122581] Write of size 1 at addr ffff888100977ec9 by task kunit_try_catch/154
[ 47.123774]
[ 47.124153] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.124910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.125794] Call Trace:
[ 47.126215] <TASK>
[ 47.126524] dump_stack_lvl+0x4e/0x90
[ 47.127292] print_report+0xd2/0x660
[ 47.127856] ? __virt_addr_valid+0x156/0x1e0
[ 47.128520] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.129226] kasan_report+0xff/0x140
[ 47.129693] ? krealloc_less_oob_helper+0x146/0x660
[ 47.130391] ? krealloc_less_oob_helper+0x146/0x660
[ 47.131112] __asan_store1+0x69/0x70
[ 47.131687] krealloc_less_oob_helper+0x146/0x660
[ 47.132550] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.133337] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.134130] ? __schedule+0x70b/0x1190
[ 47.134626] ? ktime_get_ts64+0x118/0x140
[ 47.135173] krealloc_less_oob+0x1c/0x30
[ 47.135677] kunit_try_run_case+0x126/0x290
[ 47.136565] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.137364] ? __kasan_check_write+0x18/0x20
[ 47.138310] ? trace_preempt_on+0x20/0xa0
[ 47.139097] ? __kthread_parkme+0x4f/0xd0
[ 47.139578] ? preempt_count_sub+0x50/0x80
[ 47.140143] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.140813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.141621] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.142308] kthread+0x19e/0x1e0
[ 47.142857] ? __pfx_kthread+0x10/0x10
[ 47.143342] ret_from_fork+0x41/0x70
[ 47.143930] ? __pfx_kthread+0x10/0x10
[ 47.144494] ret_from_fork_asm+0x1b/0x30
[ 47.145161] </TASK>
[ 47.145469]
[ 47.145759] Allocated by task 154:
[ 47.146236] kasan_save_stack+0x3c/0x60
[ 47.146763] kasan_set_track+0x29/0x40
[ 47.147347] kasan_save_alloc_info+0x22/0x30
[ 47.147987] __kasan_krealloc+0x12f/0x180
[ 47.148506] krealloc+0xc1/0x140
[ 47.149218] krealloc_less_oob_helper+0xe5/0x660
[ 47.149758] krealloc_less_oob+0x1c/0x30
[ 47.150339] kunit_try_run_case+0x126/0x290
[ 47.151443] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.152018] kthread+0x19e/0x1e0
[ 47.152678] ret_from_fork+0x41/0x70
[ 47.153393] ret_from_fork_asm+0x1b/0x30
[ 47.154142]
[ 47.154405] The buggy address belongs to the object at ffff888100977e00
[ 47.154405] which belongs to the cache kmalloc-256 of size 256
[ 47.155571] The buggy address is located 0 bytes to the right of
[ 47.155571] allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[ 47.156673]
[ 47.157010] The buggy address belongs to the physical page:
[ 47.157655] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.158572] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.159467] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.160042] page_type: 0xffffffff()
[ 47.160603] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.161403] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.162219] page dumped because: kasan: bad access detected
[ 47.162759]
[ 47.163128] Memory state around the buggy address:
[ 47.163606] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.164373] ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.165219] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 47.165816] ^
[ 47.166490] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.167109] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.167960] ==================================================================
Home
[ 47.501120] ==================================================================
[ 47.502405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[ 47.502831] Write of size 1 at addr ffff8881028da0c9 by task kunit_try_catch/158
[ 47.503530]
[ 47.503842] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.504821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.506040] Call Trace:
[ 47.506439] <TASK>
[ 47.506789] dump_stack_lvl+0x4e/0x90
[ 47.507427] print_report+0xd2/0x660
[ 47.507983] ? __virt_addr_valid+0x156/0x1e0
[ 47.508925] ? kasan_addr_to_slab+0x11/0xb0
[ 47.509540] kasan_report+0xff/0x140
[ 47.510453] ? krealloc_less_oob_helper+0x146/0x660
[ 47.511410] ? krealloc_less_oob_helper+0x146/0x660
[ 47.512252] __asan_store1+0x69/0x70
[ 47.512711] krealloc_less_oob_helper+0x146/0x660
[ 47.513494] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.514404] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.515479] ? __schedule+0x70b/0x1190
[ 47.516528] ? ktime_get_ts64+0x118/0x140
[ 47.517065] krealloc_pagealloc_less_oob+0x1c/0x30
[ 47.517685] kunit_try_run_case+0x126/0x290
[ 47.518529] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.519729] ? __kasan_check_write+0x18/0x20
[ 47.520349] ? trace_preempt_on+0x20/0xa0
[ 47.521341] ? __kthread_parkme+0x4f/0xd0
[ 47.522328] ? preempt_count_sub+0x50/0x80
[ 47.522826] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.523579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.524591] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.525185] kthread+0x19e/0x1e0
[ 47.526123] ? __pfx_kthread+0x10/0x10
[ 47.526397] ret_from_fork+0x41/0x70
[ 47.526650] ? __pfx_kthread+0x10/0x10
[ 47.527039] ret_from_fork_asm+0x1b/0x30
[ 47.527532] </TASK>
[ 47.527920]
[ 47.528271] The buggy address belongs to the physical page:
[ 47.528886] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[ 47.529908] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.530775] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.531483] page_type: 0xffffffff()
[ 47.532295] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.533141] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.533968] page dumped because: kasan: bad access detected
[ 47.534925]
[ 47.535237] Memory state around the buggy address:
[ 47.536231] ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.537398] ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.538428] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 47.539795] ^
[ 47.540448] ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.541471] ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.542223] ==================================================================
Home
[ 47.169442] ==================================================================
[ 47.170068] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[ 47.170866] Write of size 1 at addr ffff888100977ed0 by task kunit_try_catch/154
[ 47.171682]
[ 47.172058] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.172811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.173759] Call Trace:
[ 47.174132] <TASK>
[ 47.174491] dump_stack_lvl+0x4e/0x90
[ 47.175088] print_report+0xd2/0x660
[ 47.175617] ? __virt_addr_valid+0x156/0x1e0
[ 47.176280] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.177094] kasan_report+0xff/0x140
[ 47.177567] ? krealloc_less_oob_helper+0x1a6/0x660
[ 47.178188] ? krealloc_less_oob_helper+0x1a6/0x660
[ 47.178867] __asan_store1+0x69/0x70
[ 47.179487] krealloc_less_oob_helper+0x1a6/0x660
[ 47.180380] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.182048] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.182892] ? __schedule+0x70b/0x1190
[ 47.183686] ? ktime_get_ts64+0x118/0x140
[ 47.184388] krealloc_less_oob+0x1c/0x30
[ 47.185052] kunit_try_run_case+0x126/0x290
[ 47.185719] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.186418] ? __kasan_check_write+0x18/0x20
[ 47.187147] ? trace_preempt_on+0x20/0xa0
[ 47.187813] ? __kthread_parkme+0x4f/0xd0
[ 47.188346] ? preempt_count_sub+0x50/0x80
[ 47.188926] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.189654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.190502] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.191348] kthread+0x19e/0x1e0
[ 47.191964] ? __pfx_kthread+0x10/0x10
[ 47.192567] ret_from_fork+0x41/0x70
[ 47.193218] ? __pfx_kthread+0x10/0x10
[ 47.193762] ret_from_fork_asm+0x1b/0x30
[ 47.194358] </TASK>
[ 47.194757]
[ 47.195031] Allocated by task 154:
[ 47.195521] kasan_save_stack+0x3c/0x60
[ 47.196193] kasan_set_track+0x29/0x40
[ 47.196683] kasan_save_alloc_info+0x22/0x30
[ 47.197375] __kasan_krealloc+0x12f/0x180
[ 47.198024] krealloc+0xc1/0x140
[ 47.198543] krealloc_less_oob_helper+0xe5/0x660
[ 47.199137] krealloc_less_oob+0x1c/0x30
[ 47.199751] kunit_try_run_case+0x126/0x290
[ 47.200374] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.201121] kthread+0x19e/0x1e0
[ 47.201709] ret_from_fork+0x41/0x70
[ 47.202268] ret_from_fork_asm+0x1b/0x30
[ 47.202893]
[ 47.203254] The buggy address belongs to the object at ffff888100977e00
[ 47.203254] which belongs to the cache kmalloc-256 of size 256
[ 47.204497] The buggy address is located 7 bytes to the right of
[ 47.204497] allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[ 47.205623]
[ 47.205952] The buggy address belongs to the physical page:
[ 47.206641] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.207518] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.208486] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.209879] page_type: 0xffffffff()
[ 47.210448] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.211484] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.212454] page dumped because: kasan: bad access detected
[ 47.213243]
[ 47.213525] Memory state around the buggy address:
[ 47.214294] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.215233] ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.216159] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 47.217063] ^
[ 47.217862] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.218872] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.219341] ==================================================================
Home
[ 47.674652] ==================================================================
[ 47.675592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[ 47.676426] Write of size 1 at addr ffff8881028da0eb by task kunit_try_catch/158
[ 47.677414]
[ 47.677730] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.678777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.679786] Call Trace:
[ 47.680209] <TASK>
[ 47.681105] dump_stack_lvl+0x4e/0x90
[ 47.681711] print_report+0xd2/0x660
[ 47.682160] ? __virt_addr_valid+0x156/0x1e0
[ 47.683117] ? kasan_addr_to_slab+0x11/0xb0
[ 47.683739] kasan_report+0xff/0x140
[ 47.684311] ? krealloc_less_oob_helper+0x294/0x660
[ 47.685103] ? krealloc_less_oob_helper+0x294/0x660
[ 47.685836] __asan_store1+0x69/0x70
[ 47.686281] krealloc_less_oob_helper+0x294/0x660
[ 47.687216] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.688692] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.689414] ? __schedule+0x70b/0x1190
[ 47.690059] ? ktime_get_ts64+0x118/0x140
[ 47.690666] krealloc_pagealloc_less_oob+0x1c/0x30
[ 47.691528] kunit_try_run_case+0x126/0x290
[ 47.692366] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.693551] ? __kasan_check_write+0x18/0x20
[ 47.694247] ? trace_preempt_on+0x20/0xa0
[ 47.694826] ? __kthread_parkme+0x4f/0xd0
[ 47.695567] ? preempt_count_sub+0x50/0x80
[ 47.696338] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.697081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.698520] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.699265] kthread+0x19e/0x1e0
[ 47.699895] ? __pfx_kthread+0x10/0x10
[ 47.700406] ret_from_fork+0x41/0x70
[ 47.701106] ? __pfx_kthread+0x10/0x10
[ 47.701726] ret_from_fork_asm+0x1b/0x30
[ 47.702370] </TASK>
[ 47.702717]
[ 47.703071] The buggy address belongs to the physical page:
[ 47.703674] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[ 47.704814] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.705446] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.706235] page_type: 0xffffffff()
[ 47.706833] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.707737] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.708634] page dumped because: kasan: bad access detected
[ 47.709256]
[ 47.709531] Memory state around the buggy address:
[ 47.710208] ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.711083] ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.712592] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 47.713623] ^
[ 47.714540] ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.715588] ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.716663] ==================================================================
Home
[ 47.591374] ==================================================================
[ 47.593375] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[ 47.594545] Write of size 1 at addr ffff8881028da0da by task kunit_try_catch/158
[ 47.595952]
[ 47.596726] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.597844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.598710] Call Trace:
[ 47.599160] <TASK>
[ 47.599530] dump_stack_lvl+0x4e/0x90
[ 47.600201] print_report+0xd2/0x660
[ 47.600832] ? __virt_addr_valid+0x156/0x1e0
[ 47.601550] ? kasan_addr_to_slab+0x11/0xb0
[ 47.602081] kasan_report+0xff/0x140
[ 47.602616] ? krealloc_less_oob_helper+0x21a/0x660
[ 47.603322] ? krealloc_less_oob_helper+0x21a/0x660
[ 47.604022] __asan_store1+0x69/0x70
[ 47.604628] krealloc_less_oob_helper+0x21a/0x660
[ 47.605235] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.606054] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.606680] ? __schedule+0x70b/0x1190
[ 47.607271] ? ktime_get_ts64+0x118/0x140
[ 47.607866] krealloc_pagealloc_less_oob+0x1c/0x30
[ 47.608525] kunit_try_run_case+0x126/0x290
[ 47.609218] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.609964] ? __kasan_check_write+0x18/0x20
[ 47.610606] ? trace_preempt_on+0x20/0xa0
[ 47.611090] ? __kthread_parkme+0x4f/0xd0
[ 47.611692] ? preempt_count_sub+0x50/0x80
[ 47.612352] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.613031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.613731] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.614636] kthread+0x19e/0x1e0
[ 47.615182] ? __pfx_kthread+0x10/0x10
[ 47.615808] ret_from_fork+0x41/0x70
[ 47.616513] ? __pfx_kthread+0x10/0x10
[ 47.617148] ret_from_fork_asm+0x1b/0x30
[ 47.617821] </TASK>
[ 47.618164]
[ 47.618386] The buggy address belongs to the physical page:
[ 47.619142] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[ 47.619913] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.620916] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.621502] page_type: 0xffffffff()
[ 47.621962] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.622946] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.623922] page dumped because: kasan: bad access detected
[ 47.624407]
[ 47.624715] Memory state around the buggy address:
[ 47.625595] ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.627104] ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.628237] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 47.629335] ^
[ 47.630172] ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.630920] ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.631657] ==================================================================
Home
[ 47.223131] ==================================================================
[ 47.223671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[ 47.224691] Write of size 1 at addr ffff888100977eda by task kunit_try_catch/154
[ 47.226365]
[ 47.226684] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.228560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.230491] Call Trace:
[ 47.231307] <TASK>
[ 47.231593] dump_stack_lvl+0x4e/0x90
[ 47.232220] print_report+0xd2/0x660
[ 47.232728] ? __virt_addr_valid+0x156/0x1e0
[ 47.233459] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.234265] kasan_report+0xff/0x140
[ 47.234696] ? krealloc_less_oob_helper+0x21a/0x660
[ 47.235517] ? krealloc_less_oob_helper+0x21a/0x660
[ 47.236240] __asan_store1+0x69/0x70
[ 47.236898] krealloc_less_oob_helper+0x21a/0x660
[ 47.237560] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.238377] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.238986] ? __schedule+0x70b/0x1190
[ 47.239610] ? ktime_get_ts64+0x118/0x140
[ 47.240289] krealloc_less_oob+0x1c/0x30
[ 47.240923] kunit_try_run_case+0x126/0x290
[ 47.241606] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.242362] ? __kasan_check_write+0x18/0x20
[ 47.243102] ? trace_preempt_on+0x20/0xa0
[ 47.243688] ? __kthread_parkme+0x4f/0xd0
[ 47.244367] ? preempt_count_sub+0x50/0x80
[ 47.245026] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.245742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.246701] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.247339] kthread+0x19e/0x1e0
[ 47.247838] ? __pfx_kthread+0x10/0x10
[ 47.248496] ret_from_fork+0x41/0x70
[ 47.249171] ? __pfx_kthread+0x10/0x10
[ 47.249841] ret_from_fork_asm+0x1b/0x30
[ 47.250554] </TASK>
[ 47.250984]
[ 47.251242] Allocated by task 154:
[ 47.251695] kasan_save_stack+0x3c/0x60
[ 47.252301] kasan_set_track+0x29/0x40
[ 47.252921] kasan_save_alloc_info+0x22/0x30
[ 47.253542] __kasan_krealloc+0x12f/0x180
[ 47.254209] krealloc+0xc1/0x140
[ 47.254719] krealloc_less_oob_helper+0xe5/0x660
[ 47.255397] krealloc_less_oob+0x1c/0x30
[ 47.256086] kunit_try_run_case+0x126/0x290
[ 47.256738] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.258243] kthread+0x19e/0x1e0
[ 47.259246] ret_from_fork+0x41/0x70
[ 47.259716] ret_from_fork_asm+0x1b/0x30
[ 47.260501]
[ 47.260839] The buggy address belongs to the object at ffff888100977e00
[ 47.260839] which belongs to the cache kmalloc-256 of size 256
[ 47.262791] The buggy address is located 17 bytes to the right of
[ 47.262791] allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[ 47.263912]
[ 47.264311] The buggy address belongs to the physical page:
[ 47.264793] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.265878] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.266698] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.267878] page_type: 0xffffffff()
[ 47.269161] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.269847] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.270708] page dumped because: kasan: bad access detected
[ 47.271744]
[ 47.271955] Memory state around the buggy address:
[ 47.272369] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.272914] ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.273812] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 47.274654] ^
[ 47.275396] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.276267] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.277118] ==================================================================
Home
[ 47.334648] ==================================================================
[ 47.335539] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[ 47.336475] Write of size 1 at addr ffff888100977eeb by task kunit_try_catch/154
[ 47.337918]
[ 47.338265] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.339314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.340655] Call Trace:
[ 47.341361] <TASK>
[ 47.341717] dump_stack_lvl+0x4e/0x90
[ 47.342294] print_report+0xd2/0x660
[ 47.342759] ? __virt_addr_valid+0x156/0x1e0
[ 47.343784] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.344642] kasan_report+0xff/0x140
[ 47.345061] ? krealloc_less_oob_helper+0x294/0x660
[ 47.346054] ? krealloc_less_oob_helper+0x294/0x660
[ 47.346835] __asan_store1+0x69/0x70
[ 47.347504] krealloc_less_oob_helper+0x294/0x660
[ 47.348354] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.349241] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.350030] ? __schedule+0x70b/0x1190
[ 47.350537] ? ktime_get_ts64+0x118/0x140
[ 47.351345] krealloc_less_oob+0x1c/0x30
[ 47.352034] kunit_try_run_case+0x126/0x290
[ 47.352768] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.353606] ? __kasan_check_write+0x18/0x20
[ 47.354127] ? trace_preempt_on+0x20/0xa0
[ 47.354711] ? __kthread_parkme+0x4f/0xd0
[ 47.355328] ? preempt_count_sub+0x50/0x80
[ 47.356147] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.356897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.357652] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.358766] kthread+0x19e/0x1e0
[ 47.359318] ? __pfx_kthread+0x10/0x10
[ 47.360160] ret_from_fork+0x41/0x70
[ 47.360873] ? __pfx_kthread+0x10/0x10
[ 47.361577] ret_from_fork_asm+0x1b/0x30
[ 47.362180] </TASK>
[ 47.362503]
[ 47.362708] Allocated by task 154:
[ 47.363061] kasan_save_stack+0x3c/0x60
[ 47.364375] kasan_set_track+0x29/0x40
[ 47.365048] kasan_save_alloc_info+0x22/0x30
[ 47.365762] __kasan_krealloc+0x12f/0x180
[ 47.366523] krealloc+0xc1/0x140
[ 47.367173] krealloc_less_oob_helper+0xe5/0x660
[ 47.367959] krealloc_less_oob+0x1c/0x30
[ 47.368445] kunit_try_run_case+0x126/0x290
[ 47.369321] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.369959] kthread+0x19e/0x1e0
[ 47.370587] ret_from_fork+0x41/0x70
[ 47.371742] ret_from_fork_asm+0x1b/0x30
[ 47.372334]
[ 47.372662] The buggy address belongs to the object at ffff888100977e00
[ 47.372662] which belongs to the cache kmalloc-256 of size 256
[ 47.373901] The buggy address is located 34 bytes to the right of
[ 47.373901] allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[ 47.375274]
[ 47.376247] The buggy address belongs to the physical page:
[ 47.377049] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.377736] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.378707] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.379728] page_type: 0xffffffff()
[ 47.380177] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.381228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.382399] page dumped because: kasan: bad access detected
[ 47.383064]
[ 47.383406] Memory state around the buggy address:
[ 47.384448] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.385121] ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.386117] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 47.386804] ^
[ 47.388205] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.389414] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.390171] ==================================================================
Home
[ 47.632675] ==================================================================
[ 47.633249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[ 47.634694] Write of size 1 at addr ffff8881028da0ea by task kunit_try_catch/158
[ 47.635670]
[ 47.635990] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.636971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.637937] Call Trace:
[ 47.638372] <TASK>
[ 47.638710] dump_stack_lvl+0x4e/0x90
[ 47.639239] print_report+0xd2/0x660
[ 47.639670] ? __virt_addr_valid+0x156/0x1e0
[ 47.640335] ? kasan_addr_to_slab+0x11/0xb0
[ 47.641252] kasan_report+0xff/0x140
[ 47.642489] ? krealloc_less_oob_helper+0x258/0x660
[ 47.643183] ? krealloc_less_oob_helper+0x258/0x660
[ 47.644176] __asan_store1+0x69/0x70
[ 47.644732] krealloc_less_oob_helper+0x258/0x660
[ 47.645408] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.646174] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.646897] ? __schedule+0x70b/0x1190
[ 47.647407] ? ktime_get_ts64+0x118/0x140
[ 47.648444] krealloc_pagealloc_less_oob+0x1c/0x30
[ 47.649221] kunit_try_run_case+0x126/0x290
[ 47.649842] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.650461] ? __kasan_check_write+0x18/0x20
[ 47.651182] ? trace_preempt_on+0x20/0xa0
[ 47.651704] ? __kthread_parkme+0x4f/0xd0
[ 47.652328] ? preempt_count_sub+0x50/0x80
[ 47.652973] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.653638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.654582] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.655900] kthread+0x19e/0x1e0
[ 47.656446] ? __pfx_kthread+0x10/0x10
[ 47.657214] ret_from_fork+0x41/0x70
[ 47.657715] ? __pfx_kthread+0x10/0x10
[ 47.658506] ret_from_fork_asm+0x1b/0x30
[ 47.659252] </TASK>
[ 47.659605]
[ 47.660046] The buggy address belongs to the physical page:
[ 47.660586] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[ 47.661677] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.663173] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.663959] page_type: 0xffffffff()
[ 47.664472] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.665434] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.666669] page dumped because: kasan: bad access detected
[ 47.667248]
[ 47.667539] Memory state around the buggy address:
[ 47.668322] ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.669227] ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.669972] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 47.670706] ^
[ 47.671564] ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.672917] ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.673560] ==================================================================
Home
[ 47.545368] ==================================================================
[ 47.546253] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[ 47.547345] Write of size 1 at addr ffff8881028da0d0 by task kunit_try_catch/158
[ 47.548590]
[ 47.549102] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.550175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.551249] Call Trace:
[ 47.551550] <TASK>
[ 47.552389] dump_stack_lvl+0x4e/0x90
[ 47.552886] print_report+0xd2/0x660
[ 47.553587] ? __virt_addr_valid+0x156/0x1e0
[ 47.554467] ? kasan_addr_to_slab+0x11/0xb0
[ 47.555116] kasan_report+0xff/0x140
[ 47.555780] ? krealloc_less_oob_helper+0x1a6/0x660
[ 47.556602] ? krealloc_less_oob_helper+0x1a6/0x660
[ 47.557747] __asan_store1+0x69/0x70
[ 47.558284] krealloc_less_oob_helper+0x1a6/0x660
[ 47.558870] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.559471] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.560286] ? __schedule+0x70b/0x1190
[ 47.560985] ? ktime_get_ts64+0x118/0x140
[ 47.561749] krealloc_pagealloc_less_oob+0x1c/0x30
[ 47.562593] kunit_try_run_case+0x126/0x290
[ 47.563198] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.563786] ? __kasan_check_write+0x18/0x20
[ 47.565149] ? trace_preempt_on+0x20/0xa0
[ 47.566055] ? __kthread_parkme+0x4f/0xd0
[ 47.566598] ? preempt_count_sub+0x50/0x80
[ 47.567196] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.568031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.568765] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.569524] kthread+0x19e/0x1e0
[ 47.569971] ? __pfx_kthread+0x10/0x10
[ 47.571182] ret_from_fork+0x41/0x70
[ 47.571797] ? __pfx_kthread+0x10/0x10
[ 47.572486] ret_from_fork_asm+0x1b/0x30
[ 47.573397] </TASK>
[ 47.574053]
[ 47.574547] The buggy address belongs to the physical page:
[ 47.575314] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[ 47.576952] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.577749] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.578724] page_type: 0xffffffff()
[ 47.579495] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.581205] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.581904] page dumped because: kasan: bad access detected
[ 47.582689]
[ 47.583225] Memory state around the buggy address:
[ 47.583819] ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.585457] ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.586270] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 47.587218] ^
[ 47.587538] ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.588244] ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.589363] ==================================================================
Home
[ 47.279558] ==================================================================
[ 47.280528] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[ 47.281838] Write of size 1 at addr ffff888100977eea by task kunit_try_catch/154
[ 47.282528]
[ 47.282844] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.283735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.284520] Call Trace:
[ 47.285709] <TASK>
[ 47.286131] dump_stack_lvl+0x4e/0x90
[ 47.286740] print_report+0xd2/0x660
[ 47.287297] ? __virt_addr_valid+0x156/0x1e0
[ 47.287984] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.288743] kasan_report+0xff/0x140
[ 47.290044] ? krealloc_less_oob_helper+0x258/0x660
[ 47.290638] ? krealloc_less_oob_helper+0x258/0x660
[ 47.291469] __asan_store1+0x69/0x70
[ 47.292114] krealloc_less_oob_helper+0x258/0x660
[ 47.292913] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 47.293576] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.294389] ? __schedule+0x70b/0x1190
[ 47.294816] ? ktime_get_ts64+0x118/0x140
[ 47.295477] krealloc_less_oob+0x1c/0x30
[ 47.296079] kunit_try_run_case+0x126/0x290
[ 47.296741] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.297475] ? __kasan_check_write+0x18/0x20
[ 47.298218] ? trace_preempt_on+0x20/0xa0
[ 47.298766] ? __kthread_parkme+0x4f/0xd0
[ 47.300086] ? preempt_count_sub+0x50/0x80
[ 47.300698] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.301314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.301967] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.302802] kthread+0x19e/0x1e0
[ 47.303377] ? __pfx_kthread+0x10/0x10
[ 47.304372] ret_from_fork+0x41/0x70
[ 47.305159] ? __pfx_kthread+0x10/0x10
[ 47.305690] ret_from_fork_asm+0x1b/0x30
[ 47.307066] </TASK>
[ 47.307650]
[ 47.308140] Allocated by task 154:
[ 47.308557] kasan_save_stack+0x3c/0x60
[ 47.309418] kasan_set_track+0x29/0x40
[ 47.310111] kasan_save_alloc_info+0x22/0x30
[ 47.310845] __kasan_krealloc+0x12f/0x180
[ 47.311421] krealloc+0xc1/0x140
[ 47.311777] krealloc_less_oob_helper+0xe5/0x660
[ 47.312660] krealloc_less_oob+0x1c/0x30
[ 47.313279] kunit_try_run_case+0x126/0x290
[ 47.314422] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.315288] kthread+0x19e/0x1e0
[ 47.316093] ret_from_fork+0x41/0x70
[ 47.316767] ret_from_fork_asm+0x1b/0x30
[ 47.317518]
[ 47.317811] The buggy address belongs to the object at ffff888100977e00
[ 47.317811] which belongs to the cache kmalloc-256 of size 256
[ 47.319406] The buggy address is located 33 bytes to the right of
[ 47.319406] allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[ 47.321250]
[ 47.321516] The buggy address belongs to the physical page:
[ 47.322268] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.323239] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.324136] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.324775] page_type: 0xffffffff()
[ 47.325424] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.326398] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.327171] page dumped because: kasan: bad access detected
[ 47.328018]
[ 47.328310] Memory state around the buggy address:
[ 47.328865] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.329801] ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.330736] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 47.331620] ^
[ 47.332421] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.333163] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.333634] ==================================================================
Home
[ 47.445835] ==================================================================
[ 47.447465] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.448194] Write of size 1 at addr ffff88810210a0f0 by task kunit_try_catch/156
[ 47.449649]
[ 47.449978] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.451606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.452717] Call Trace:
[ 47.453477] <TASK>
[ 47.454137] dump_stack_lvl+0x4e/0x90
[ 47.455278] print_report+0xd2/0x660
[ 47.455737] ? __virt_addr_valid+0x156/0x1e0
[ 47.456353] ? kasan_addr_to_slab+0x11/0xb0
[ 47.457680] kasan_report+0xff/0x140
[ 47.458114] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.458657] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.459725] __asan_store1+0x69/0x70
[ 47.460391] krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.461105] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 47.461748] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.462282] ? __schedule+0x70b/0x1190
[ 47.462722] ? ktime_get_ts64+0x118/0x140
[ 47.463358] krealloc_pagealloc_more_oob+0x1c/0x30
[ 47.464599] kunit_try_run_case+0x126/0x290
[ 47.465657] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.466542] ? __kasan_check_write+0x18/0x20
[ 47.467327] ? trace_preempt_on+0x20/0xa0
[ 47.468201] ? __kthread_parkme+0x4f/0xd0
[ 47.469284] ? preempt_count_sub+0x50/0x80
[ 47.469733] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.470687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.471672] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.472386] kthread+0x19e/0x1e0
[ 47.472809] ? __pfx_kthread+0x10/0x10
[ 47.474107] ret_from_fork+0x41/0x70
[ 47.474618] ? __pfx_kthread+0x10/0x10
[ 47.475411] ret_from_fork_asm+0x1b/0x30
[ 47.475956] </TASK>
[ 47.476445]
[ 47.476743] The buggy address belongs to the physical page:
[ 47.477792] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102108
[ 47.479095] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.480107] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.480696] page_type: 0xffffffff()
[ 47.481579] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.482469] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.483511] page dumped because: kasan: bad access detected
[ 47.484322]
[ 47.484545] Memory state around the buggy address:
[ 47.485773] ffff888102109f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.486535] ffff88810210a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.487612] >ffff88810210a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 47.488627] ^
[ 47.489804] ffff88810210a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.490464] ffff88810210a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.491464] ==================================================================
Home
[ 47.063208] ==================================================================
[ 47.064186] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.065046] Write of size 1 at addr ffff888100977cf0 by task kunit_try_catch/152
[ 47.065879]
[ 47.066245] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.067338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.068441] Call Trace:
[ 47.068723] <TASK>
[ 47.069216] dump_stack_lvl+0x4e/0x90
[ 47.070180] print_report+0xd2/0x660
[ 47.070691] ? __virt_addr_valid+0x156/0x1e0
[ 47.071405] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.072282] kasan_report+0xff/0x140
[ 47.072841] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.073616] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.074078] __asan_store1+0x69/0x70
[ 47.074615] krealloc_more_oob_helper+0x1bb/0x3b0
[ 47.075274] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 47.076076] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.077053] ? __schedule+0x70b/0x1190
[ 47.077605] ? ktime_get_ts64+0x118/0x140
[ 47.078160] krealloc_more_oob+0x1c/0x30
[ 47.078644] kunit_try_run_case+0x126/0x290
[ 47.079209] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.079821] ? irqentry_exit+0x29/0x60
[ 47.080629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.081473] ? __kasan_record_aux_stack+0xb3/0xd0
[ 47.082192] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.083015] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.083823] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.084545] kthread+0x19e/0x1e0
[ 47.085074] ? __pfx_kthread+0x10/0x10
[ 47.085673] ret_from_fork+0x41/0x70
[ 47.086444] ? __pfx_kthread+0x10/0x10
[ 47.086912] ret_from_fork_asm+0x1b/0x30
[ 47.087666] </TASK>
[ 47.087914]
[ 47.088219] Allocated by task 152:
[ 47.088679] kasan_save_stack+0x3c/0x60
[ 47.089281] kasan_set_track+0x29/0x40
[ 47.089713] kasan_save_alloc_info+0x22/0x30
[ 47.090393] __kasan_krealloc+0x12f/0x180
[ 47.091018] krealloc+0xc1/0x140
[ 47.091424] krealloc_more_oob_helper+0xe2/0x3b0
[ 47.092114] krealloc_more_oob+0x1c/0x30
[ 47.092676] kunit_try_run_case+0x126/0x290
[ 47.093194] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.093964] kthread+0x19e/0x1e0
[ 47.094511] ret_from_fork+0x41/0x70
[ 47.095065] ret_from_fork_asm+0x1b/0x30
[ 47.095641]
[ 47.095980] The buggy address belongs to the object at ffff888100977c00
[ 47.095980] which belongs to the cache kmalloc-256 of size 256
[ 47.097146] The buggy address is located 5 bytes to the right of
[ 47.097146] allocated 235-byte region [ffff888100977c00, ffff888100977ceb)
[ 47.098452]
[ 47.098699] The buggy address belongs to the physical page:
[ 47.099412] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.100370] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.101141] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.101888] page_type: 0xffffffff()
[ 47.102337] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.103224] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.103952] page dumped because: kasan: bad access detected
[ 47.104603]
[ 47.104938] Memory state around the buggy address:
[ 47.105406] ffff888100977b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.106153] ffff888100977c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.106990] >ffff888100977c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 47.107803] ^
[ 47.108342] ffff888100977d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.109198] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.109839] ==================================================================
Home
[ 47.401487] ==================================================================
[ 47.402867] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[ 47.403745] Write of size 1 at addr ffff88810210a0eb by task kunit_try_catch/156
[ 47.405449]
[ 47.405784] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.406793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.408112] Call Trace:
[ 47.408560] <TASK>
[ 47.409109] dump_stack_lvl+0x4e/0x90
[ 47.409694] print_report+0xd2/0x660
[ 47.410364] ? __virt_addr_valid+0x156/0x1e0
[ 47.411308] ? kasan_addr_to_slab+0x11/0xb0
[ 47.412119] kasan_report+0xff/0x140
[ 47.412731] ? krealloc_more_oob_helper+0x179/0x3b0
[ 47.413501] ? krealloc_more_oob_helper+0x179/0x3b0
[ 47.414301] __asan_store1+0x69/0x70
[ 47.414906] krealloc_more_oob_helper+0x179/0x3b0
[ 47.415544] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 47.416445] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.417264] ? __schedule+0x70b/0x1190
[ 47.418015] ? ktime_get_ts64+0x118/0x140
[ 47.418501] krealloc_pagealloc_more_oob+0x1c/0x30
[ 47.419091] kunit_try_run_case+0x126/0x290
[ 47.419665] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.420284] ? __kasan_check_write+0x18/0x20
[ 47.420860] ? trace_preempt_on+0x20/0xa0
[ 47.421570] ? __kthread_parkme+0x4f/0xd0
[ 47.422347] ? preempt_count_sub+0x50/0x80
[ 47.423114] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.423918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.424821] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.425586] kthread+0x19e/0x1e0
[ 47.426369] ? __pfx_kthread+0x10/0x10
[ 47.427114] ret_from_fork+0x41/0x70
[ 47.427731] ? __pfx_kthread+0x10/0x10
[ 47.428267] ret_from_fork_asm+0x1b/0x30
[ 47.428778] </TASK>
[ 47.429427]
[ 47.429733] The buggy address belongs to the physical page:
[ 47.430599] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102108
[ 47.432076] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.432915] flags: 0x200000000000040(head|node=0|zone=2)
[ 47.433814] page_type: 0xffffffff()
[ 47.434371] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 47.435417] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 47.436303] page dumped because: kasan: bad access detected
[ 47.437211]
[ 47.437519] Memory state around the buggy address:
[ 47.438302] ffff888102109f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.439184] ffff88810210a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.439901] >ffff88810210a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 47.440895] ^
[ 47.442041] ffff88810210a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.442771] ffff88810210a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 47.443476] ==================================================================
Home
[ 47.012323] ==================================================================
[ 47.013540] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[ 47.014351] Write of size 1 at addr ffff888100977ceb by task kunit_try_catch/152
[ 47.015150]
[ 47.015480] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.016515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.017330] Call Trace:
[ 47.017801] <TASK>
[ 47.018208] dump_stack_lvl+0x4e/0x90
[ 47.018901] print_report+0xd2/0x660
[ 47.019499] ? __virt_addr_valid+0x156/0x1e0
[ 47.020214] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.020955] kasan_report+0xff/0x140
[ 47.021432] ? krealloc_more_oob_helper+0x179/0x3b0
[ 47.022198] ? krealloc_more_oob_helper+0x179/0x3b0
[ 47.022877] __asan_store1+0x69/0x70
[ 47.023435] krealloc_more_oob_helper+0x179/0x3b0
[ 47.024204] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 47.024895] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.025490] ? __schedule+0x70b/0x1190
[ 47.026155] ? ktime_get_ts64+0x118/0x140
[ 47.026835] krealloc_more_oob+0x1c/0x30
[ 47.027423] kunit_try_run_case+0x126/0x290
[ 47.028069] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.028726] ? irqentry_exit+0x29/0x60
[ 47.029354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.030204] ? __kasan_record_aux_stack+0xb3/0xd0
[ 47.030837] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.031467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.032345] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.033145] kthread+0x19e/0x1e0
[ 47.033713] ? __pfx_kthread+0x10/0x10
[ 47.034278] ret_from_fork+0x41/0x70
[ 47.034939] ? __pfx_kthread+0x10/0x10
[ 47.035478] ret_from_fork_asm+0x1b/0x30
[ 47.036150] </TASK>
[ 47.036447]
[ 47.036651] Allocated by task 152:
[ 47.037667] kasan_save_stack+0x3c/0x60
[ 47.038290] kasan_set_track+0x29/0x40
[ 47.038791] kasan_save_alloc_info+0x22/0x30
[ 47.039307] __kasan_krealloc+0x12f/0x180
[ 47.039797] krealloc+0xc1/0x140
[ 47.040566] krealloc_more_oob_helper+0xe2/0x3b0
[ 47.041305] krealloc_more_oob+0x1c/0x30
[ 47.042030] kunit_try_run_case+0x126/0x290
[ 47.042790] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.043601] kthread+0x19e/0x1e0
[ 47.044308] ret_from_fork+0x41/0x70
[ 47.044796] ret_from_fork_asm+0x1b/0x30
[ 47.045371]
[ 47.045512] The buggy address belongs to the object at ffff888100977c00
[ 47.045512] which belongs to the cache kmalloc-256 of size 256
[ 47.046955] The buggy address is located 0 bytes to the right of
[ 47.046955] allocated 235-byte region [ffff888100977c00, ffff888100977ceb)
[ 47.048138]
[ 47.048451] The buggy address belongs to the physical page:
[ 47.049451] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[ 47.050464] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.051275] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.051742] page_type: 0xffffffff()
[ 47.052367] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.053271] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.054040] page dumped because: kasan: bad access detected
[ 47.054711]
[ 47.055040] Memory state around the buggy address:
[ 47.055754] ffff888100977b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.056655] ffff888100977c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.057611] >ffff888100977c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 47.058384] ^
[ 47.059219] ffff888100977d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.060054] ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.060843] ==================================================================
Home
[ 49.502824] ==================================================================
[ 49.503977] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0
[ 49.505664] Read of size 1 at addr ffff88810284d373 by task kunit_try_catch/208
[ 49.506647]
[ 49.506833] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.508258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.509329] Call Trace:
[ 49.509677] <TASK>
[ 49.510239] dump_stack_lvl+0x4e/0x90
[ 49.511587] print_report+0xd2/0x660
[ 49.512176] ? __virt_addr_valid+0x156/0x1e0
[ 49.512702] ? kasan_complete_mode_report_info+0x2a/0x200
[ 49.513436] kasan_report+0xff/0x140
[ 49.513969] ? ksize_unpoisons_memory+0x10d/0x3b0
[ 49.514729] ? ksize_unpoisons_memory+0x10d/0x3b0
[ 49.515557] __asan_load1+0x66/0x70
[ 49.516285] ksize_unpoisons_memory+0x10d/0x3b0
[ 49.516885] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 49.517594] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 49.518454] ? __schedule+0x70b/0x1190
[ 49.519171] ? ktime_get_ts64+0x118/0x140
[ 49.519599] kunit_try_run_case+0x126/0x290
[ 49.520485] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.521316] ? __kasan_check_write+0x18/0x20
[ 49.521971] ? trace_preempt_on+0x20/0xa0
[ 49.522533] ? __kthread_parkme+0x4f/0xd0
[ 49.523471] ? preempt_count_sub+0x50/0x80
[ 49.524274] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.525289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.526274] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.527183] kthread+0x19e/0x1e0
[ 49.527677] ? __pfx_kthread+0x10/0x10
[ 49.528245] ret_from_fork+0x41/0x70
[ 49.528686] ? __pfx_kthread+0x10/0x10
[ 49.529240] ret_from_fork_asm+0x1b/0x30
[ 49.529728] </TASK>
[ 49.530037]
[ 49.530263] Allocated by task 208:
[ 49.530723] kasan_save_stack+0x3c/0x60
[ 49.532233] kasan_set_track+0x29/0x40
[ 49.532800] kasan_save_alloc_info+0x22/0x30
[ 49.533644] __kasan_kmalloc+0xb7/0xc0
[ 49.534400] kmalloc_trace+0x4c/0xb0
[ 49.535400] ksize_unpoisons_memory+0xb0/0x3b0
[ 49.535931] kunit_try_run_case+0x126/0x290
[ 49.536823] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.537729] kthread+0x19e/0x1e0
[ 49.538502] ret_from_fork+0x41/0x70
[ 49.539595] ret_from_fork_asm+0x1b/0x30
[ 49.540258]
[ 49.540763] The buggy address belongs to the object at ffff88810284d300
[ 49.540763] which belongs to the cache kmalloc-128 of size 128
[ 49.542410] The buggy address is located 0 bytes to the right of
[ 49.542410] allocated 115-byte region [ffff88810284d300, ffff88810284d373)
[ 49.543575]
[ 49.543794] The buggy address belongs to the physical page:
[ 49.544324] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[ 49.545692] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.546788] page_type: 0xffffffff()
[ 49.547481] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 49.548431] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 49.549337] page dumped because: kasan: bad access detected
[ 49.550010]
[ 49.550332] Memory state around the buggy address:
[ 49.550962] ffff88810284d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 49.551699] ffff88810284d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.552527] >ffff88810284d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 49.553289] ^
[ 49.553746] ffff88810284d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.554596] ffff88810284d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.555498] ==================================================================
Home
[ 49.615861] ==================================================================
[ 49.617064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0
[ 49.619236] Read of size 1 at addr ffff88810284d37f by task kunit_try_catch/208
[ 49.620349]
[ 49.620829] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.621711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.623141] Call Trace:
[ 49.623695] <TASK>
[ 49.624368] dump_stack_lvl+0x4e/0x90
[ 49.625231] print_report+0xd2/0x660
[ 49.626066] ? __virt_addr_valid+0x156/0x1e0
[ 49.627287] ? kasan_complete_mode_report_info+0x2a/0x200
[ 49.628204] kasan_report+0xff/0x140
[ 49.628703] ? ksize_unpoisons_memory+0x183/0x3b0
[ 49.629294] ? ksize_unpoisons_memory+0x183/0x3b0
[ 49.629886] __asan_load1+0x66/0x70
[ 49.630425] ksize_unpoisons_memory+0x183/0x3b0
[ 49.631491] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 49.632646] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 49.633297] ? __schedule+0x70b/0x1190
[ 49.633817] ? ktime_get_ts64+0x118/0x140
[ 49.635150] kunit_try_run_case+0x126/0x290
[ 49.635649] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.636687] ? __kasan_check_write+0x18/0x20
[ 49.637538] ? trace_preempt_on+0x20/0xa0
[ 49.638312] ? __kthread_parkme+0x4f/0xd0
[ 49.638812] ? preempt_count_sub+0x50/0x80
[ 49.639368] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.640325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.641838] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.642745] kthread+0x19e/0x1e0
[ 49.643578] ? __pfx_kthread+0x10/0x10
[ 49.644480] ret_from_fork+0x41/0x70
[ 49.645363] ? __pfx_kthread+0x10/0x10
[ 49.645672] ret_from_fork_asm+0x1b/0x30
[ 49.646302] </TASK>
[ 49.647205]
[ 49.647591] Allocated by task 208:
[ 49.648265] kasan_save_stack+0x3c/0x60
[ 49.648520] kasan_set_track+0x29/0x40
[ 49.648747] kasan_save_alloc_info+0x22/0x30
[ 49.649510] __kasan_kmalloc+0xb7/0xc0
[ 49.650039] kmalloc_trace+0x4c/0xb0
[ 49.651246] ksize_unpoisons_memory+0xb0/0x3b0
[ 49.652065] kunit_try_run_case+0x126/0x290
[ 49.652613] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.653207] kthread+0x19e/0x1e0
[ 49.653556] ret_from_fork+0x41/0x70
[ 49.654377] ret_from_fork_asm+0x1b/0x30
[ 49.655144]
[ 49.655478] The buggy address belongs to the object at ffff88810284d300
[ 49.655478] which belongs to the cache kmalloc-128 of size 128
[ 49.656714] The buggy address is located 12 bytes to the right of
[ 49.656714] allocated 115-byte region [ffff88810284d300, ffff88810284d373)
[ 49.659148]
[ 49.659504] The buggy address belongs to the physical page:
[ 49.660382] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[ 49.661444] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.662314] page_type: 0xffffffff()
[ 49.663118] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 49.664080] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 49.664434] page dumped because: kasan: bad access detected
[ 49.664691]
[ 49.664874] Memory state around the buggy address:
[ 49.665859] ffff88810284d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 49.667220] ffff88810284d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.668106] >ffff88810284d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 49.669232] ^
[ 49.670426] ffff88810284d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.671372] ffff88810284d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.672198] ==================================================================
Home
[ 49.556784] ==================================================================
[ 49.557662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0
[ 49.558548] Read of size 1 at addr ffff88810284d378 by task kunit_try_catch/208
[ 49.559272]
[ 49.559667] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.560563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.561280] Call Trace:
[ 49.561717] <TASK>
[ 49.562272] dump_stack_lvl+0x4e/0x90
[ 49.563223] print_report+0xd2/0x660
[ 49.564417] ? __virt_addr_valid+0x156/0x1e0
[ 49.565166] ? kasan_complete_mode_report_info+0x2a/0x200
[ 49.566537] kasan_report+0xff/0x140
[ 49.567598] ? ksize_unpoisons_memory+0x146/0x3b0
[ 49.568590] ? ksize_unpoisons_memory+0x146/0x3b0
[ 49.569611] __asan_load1+0x66/0x70
[ 49.570415] ksize_unpoisons_memory+0x146/0x3b0
[ 49.571138] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 49.571777] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 49.572385] ? __schedule+0x70b/0x1190
[ 49.573510] ? ktime_get_ts64+0x118/0x140
[ 49.574380] kunit_try_run_case+0x126/0x290
[ 49.575195] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.575578] ? __kasan_check_write+0x18/0x20
[ 49.576075] ? trace_preempt_on+0x20/0xa0
[ 49.577231] ? __kthread_parkme+0x4f/0xd0
[ 49.578258] ? preempt_count_sub+0x50/0x80
[ 49.578930] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.579784] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.580471] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.582144] kthread+0x19e/0x1e0
[ 49.582679] ? __pfx_kthread+0x10/0x10
[ 49.583466] ret_from_fork+0x41/0x70
[ 49.584270] ? __pfx_kthread+0x10/0x10
[ 49.584846] ret_from_fork_asm+0x1b/0x30
[ 49.585429] </TASK>
[ 49.586286]
[ 49.586931] Allocated by task 208:
[ 49.587584] kasan_save_stack+0x3c/0x60
[ 49.588300] kasan_set_track+0x29/0x40
[ 49.589219] kasan_save_alloc_info+0x22/0x30
[ 49.589750] __kasan_kmalloc+0xb7/0xc0
[ 49.590370] kmalloc_trace+0x4c/0xb0
[ 49.590620] ksize_unpoisons_memory+0xb0/0x3b0
[ 49.591703] kunit_try_run_case+0x126/0x290
[ 49.592673] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.593478] kthread+0x19e/0x1e0
[ 49.594544] ret_from_fork+0x41/0x70
[ 49.595077] ret_from_fork_asm+0x1b/0x30
[ 49.595834]
[ 49.596504] The buggy address belongs to the object at ffff88810284d300
[ 49.596504] which belongs to the cache kmalloc-128 of size 128
[ 49.598416] The buggy address is located 5 bytes to the right of
[ 49.598416] allocated 115-byte region [ffff88810284d300, ffff88810284d373)
[ 49.599822]
[ 49.600589] The buggy address belongs to the physical page:
[ 49.601252] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[ 49.602645] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.603478] page_type: 0xffffffff()
[ 49.604498] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 49.605551] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 49.606886] page dumped because: kasan: bad access detected
[ 49.607727]
[ 49.608281] Memory state around the buggy address:
[ 49.609248] ffff88810284d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 49.610258] ffff88810284d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.611631] >ffff88810284d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 49.612454] ^
[ 49.613544] ffff88810284d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.614631] ffff88810284d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.615324] ==================================================================
Home
[ 50.141717] ==================================================================
[ 50.142978] BUG: KASAN: slab-out-of-bounds in memchr+0x27/0x60
[ 50.143657] Read of size 1 at addr ffff888102840d18 by task kunit_try_catch/218
[ 50.145122]
[ 50.145492] CPU: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.146263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.147407] Call Trace:
[ 50.147848] <TASK>
[ 50.148250] dump_stack_lvl+0x4e/0x90
[ 50.148938] print_report+0xd2/0x660
[ 50.149514] ? __virt_addr_valid+0x156/0x1e0
[ 50.150274] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.151070] kasan_report+0xff/0x140
[ 50.151653] ? memchr+0x27/0x60
[ 50.152262] ? memchr+0x27/0x60
[ 50.152836] __asan_load1+0x66/0x70
[ 50.153267] memchr+0x27/0x60
[ 50.153808] kasan_memchr+0xdd/0x1f0
[ 50.154407] ? __pfx_kasan_memchr+0x10/0x10
[ 50.155421] ? __schedule+0x70b/0x1190
[ 50.156930] ? ktime_get_ts64+0x118/0x140
[ 50.157502] kunit_try_run_case+0x126/0x290
[ 50.158568] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.159478] ? __kasan_check_write+0x18/0x20
[ 50.160596] ? trace_preempt_on+0x20/0xa0
[ 50.161132] ? __kthread_parkme+0x4f/0xd0
[ 50.161605] ? preempt_count_sub+0x50/0x80
[ 50.162771] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.163544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.164551] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.165413] kthread+0x19e/0x1e0
[ 50.165669] ? __pfx_kthread+0x10/0x10
[ 50.166462] ret_from_fork+0x41/0x70
[ 50.167336] ? __pfx_kthread+0x10/0x10
[ 50.167914] ret_from_fork_asm+0x1b/0x30
[ 50.168685] </TASK>
[ 50.169333]
[ 50.169571] Allocated by task 218:
[ 50.170274] kasan_save_stack+0x3c/0x60
[ 50.170892] kasan_set_track+0x29/0x40
[ 50.171399] kasan_save_alloc_info+0x22/0x30
[ 50.172509] __kasan_kmalloc+0xb7/0xc0
[ 50.173147] kmalloc_trace+0x4c/0xb0
[ 50.173757] kasan_memchr+0x9f/0x1f0
[ 50.174232] kunit_try_run_case+0x126/0x290
[ 50.175215] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.175891] kthread+0x19e/0x1e0
[ 50.176546] ret_from_fork+0x41/0x70
[ 50.177249] ret_from_fork_asm+0x1b/0x30
[ 50.177879]
[ 50.178288] The buggy address belongs to the object at ffff888102840d00
[ 50.178288] which belongs to the cache kmalloc-32 of size 32
[ 50.180177] The buggy address is located 0 bytes to the right of
[ 50.180177] allocated 24-byte region [ffff888102840d00, ffff888102840d18)
[ 50.181688]
[ 50.181921] The buggy address belongs to the physical page:
[ 50.182327] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.184084] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.184675] page_type: 0xffffffff()
[ 50.185120] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.185869] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.186672] page dumped because: kasan: bad access detected
[ 50.187686]
[ 50.188274] Memory state around the buggy address:
[ 50.189152] ffff888102840c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.190123] ffff888102840c80: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 50.191374] >ffff888102840d00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.192346] ^
[ 50.193152] ffff888102840d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.194055] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.194861] ==================================================================
Home
[ 50.205594] ==================================================================
[ 50.206870] BUG: KASAN: slab-out-of-bounds in memcmp+0x3d/0xb0
[ 50.207515] Read of size 1 at addr ffff888102840d58 by task kunit_try_catch/220
[ 50.208751]
[ 50.209145] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.210035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.211129] Call Trace:
[ 50.211509] <TASK>
[ 50.211906] dump_stack_lvl+0x4e/0x90
[ 50.212554] print_report+0xd2/0x660
[ 50.213066] ? __virt_addr_valid+0x156/0x1e0
[ 50.213844] ? kasan_complete_mode_report_info+0x2a/0x200
[ 50.214604] kasan_report+0xff/0x140
[ 50.215177] ? memcmp+0x3d/0xb0
[ 50.215742] ? memcmp+0x3d/0xb0
[ 50.216227] __asan_load1+0x66/0x70
[ 50.216806] memcmp+0x3d/0xb0
[ 50.217324] kasan_memcmp+0x100/0x230
[ 50.218057] ? __pfx_kasan_memcmp+0x10/0x10
[ 50.218655] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 50.219273] ? ktime_get_ts64+0x118/0x140
[ 50.219966] kunit_try_run_case+0x126/0x290
[ 50.220592] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.221280] ? __kasan_check_write+0x18/0x20
[ 50.221916] ? trace_preempt_on+0x20/0xa0
[ 50.222534] ? __kthread_parkme+0x4f/0xd0
[ 50.223067] ? preempt_count_sub+0x50/0x80
[ 50.223629] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.224353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.225180] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.225857] kthread+0x19e/0x1e0
[ 50.226396] ? __pfx_kthread+0x10/0x10
[ 50.226896] ret_from_fork+0x41/0x70
[ 50.227468] ? __pfx_kthread+0x10/0x10
[ 50.228125] ret_from_fork_asm+0x1b/0x30
[ 50.228684] </TASK>
[ 50.229282]
[ 50.229587] Allocated by task 220:
[ 50.230210] kasan_save_stack+0x3c/0x60
[ 50.230770] kasan_set_track+0x29/0x40
[ 50.231242] kasan_save_alloc_info+0x22/0x30
[ 50.231743] __kasan_kmalloc+0xb7/0xc0
[ 50.232366] kmalloc_trace+0x4c/0xb0
[ 50.232980] kasan_memcmp+0xb0/0x230
[ 50.233594] kunit_try_run_case+0x126/0x290
[ 50.234432] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.234871] kthread+0x19e/0x1e0
[ 50.235500] ret_from_fork+0x41/0x70
[ 50.236109] ret_from_fork_asm+0x1b/0x30
[ 50.236796]
[ 50.237121] The buggy address belongs to the object at ffff888102840d40
[ 50.237121] which belongs to the cache kmalloc-32 of size 32
[ 50.238437] The buggy address is located 0 bytes to the right of
[ 50.238437] allocated 24-byte region [ffff888102840d40, ffff888102840d58)
[ 50.239845]
[ 50.240214] The buggy address belongs to the physical page:
[ 50.240828] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.242294] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.242825] page_type: 0xffffffff()
[ 50.243412] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.244246] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.245450] page dumped because: kasan: bad access detected
[ 50.246283]
[ 50.246571] Memory state around the buggy address:
[ 50.247159] ffff888102840c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.247891] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.248624] >ffff888102840d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 50.249450] ^
[ 50.250102] ffff888102840d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.250919] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.251595] ==================================================================
Home
[ 50.464164] ==================================================================
[ 50.465017] BUG: KASAN: slab-use-after-free in kasan_strings+0x19b/0x510
[ 50.465596] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[ 50.466599]
[ 50.466972] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.468071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.469210] Call Trace:
[ 50.469656] <TASK>
[ 50.470124] dump_stack_lvl+0x4e/0x90
[ 50.470720] print_report+0xd2/0x660
[ 50.471405] ? __virt_addr_valid+0x156/0x1e0
[ 50.472136] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.472876] kasan_report+0xff/0x140
[ 50.473559] ? kasan_strings+0x19b/0x510
[ 50.474203] ? kasan_strings+0x19b/0x510
[ 50.474860] __asan_load1+0x66/0x70
[ 50.475372] kasan_strings+0x19b/0x510
[ 50.476064] ? __pfx_kasan_strings+0x10/0x10
[ 50.476697] ? __schedule+0x70b/0x1190
[ 50.477354] ? ktime_get_ts64+0x118/0x140
[ 50.478162] kunit_try_run_case+0x126/0x290
[ 50.478747] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.479507] ? __kasan_check_write+0x18/0x20
[ 50.480208] ? trace_preempt_on+0x20/0xa0
[ 50.480907] ? __kthread_parkme+0x4f/0xd0
[ 50.481915] ? preempt_count_sub+0x50/0x80
[ 50.483217] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.484541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.485561] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.486297] kthread+0x19e/0x1e0
[ 50.487470] ? __pfx_kthread+0x10/0x10
[ 50.488048] ret_from_fork+0x41/0x70
[ 50.488654] ? __pfx_kthread+0x10/0x10
[ 50.489511] ret_from_fork_asm+0x1b/0x30
[ 50.490256] </TASK>
[ 50.490710]
[ 50.491160] Allocated by task 222:
[ 50.491591] kasan_save_stack+0x3c/0x60
[ 50.492944] kasan_set_track+0x29/0x40
[ 50.493488] kasan_save_alloc_info+0x22/0x30
[ 50.494356] __kasan_kmalloc+0xb7/0xc0
[ 50.495133] kmalloc_trace+0x4c/0xb0
[ 50.495696] kasan_strings+0x9f/0x510
[ 50.496274] kunit_try_run_case+0x126/0x290
[ 50.497014] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.497695] kthread+0x19e/0x1e0
[ 50.498867] ret_from_fork+0x41/0x70
[ 50.499412] ret_from_fork_asm+0x1b/0x30
[ 50.500137]
[ 50.500498] Freed by task 222:
[ 50.501122] kasan_save_stack+0x3c/0x60
[ 50.501797] kasan_set_track+0x29/0x40
[ 50.502551] kasan_save_free_info+0x2f/0x50
[ 50.503244] ____kasan_slab_free+0x172/0x1d0
[ 50.504019] __kasan_slab_free+0x16/0x20
[ 50.504601] __kmem_cache_free+0x190/0x310
[ 50.505330] kfree+0x7c/0x120
[ 50.505760] kasan_strings+0xc3/0x510
[ 50.506315] kunit_try_run_case+0x126/0x290
[ 50.506787] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.508226] kthread+0x19e/0x1e0
[ 50.509034] ret_from_fork+0x41/0x70
[ 50.509614] ret_from_fork_asm+0x1b/0x30
[ 50.510403]
[ 50.510707] The buggy address belongs to the object at ffff888102840dc0
[ 50.510707] which belongs to the cache kmalloc-32 of size 32
[ 50.512610] The buggy address is located 16 bytes inside of
[ 50.512610] freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[ 50.513801]
[ 50.514123] The buggy address belongs to the physical page:
[ 50.514799] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.516114] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.516703] page_type: 0xffffffff()
[ 50.517432] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.519074] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.520204] page dumped because: kasan: bad access detected
[ 50.520749]
[ 50.521092] Memory state around the buggy address:
[ 50.522197] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.523248] ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.524668] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.525600] ^
[ 50.526351] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.527166] ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.528244] ==================================================================
Home
[ 51.644401] ==================================================================
[ 51.646070] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd4/0x1d0
[ 51.647026] Read of size 1 at addr ffff88810148a9e0 by task kunit_try_catch/228
[ 51.648544]
[ 51.649158] CPU: 1 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.650166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.651306] Call Trace:
[ 51.651880] <TASK>
[ 51.652406] dump_stack_lvl+0x4e/0x90
[ 51.652860] print_report+0xd2/0x660
[ 51.653887] ? __virt_addr_valid+0x156/0x1e0
[ 51.654726] ? kasan_complete_mode_report_info+0x64/0x200
[ 51.655644] kasan_report+0xff/0x140
[ 51.656342] ? kmalloc_double_kzfree+0xd4/0x1d0
[ 51.657176] ? kmalloc_double_kzfree+0xd4/0x1d0
[ 51.658153] ? kmalloc_double_kzfree+0xd4/0x1d0
[ 51.658858] __kasan_check_byte+0x3d/0x50
[ 51.659381] kfree_sensitive+0x22/0x90
[ 51.659873] kmalloc_double_kzfree+0xd4/0x1d0
[ 51.660641] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 51.661217] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 51.662052] ? kunit_try_run_case+0x11b/0x290
[ 51.662855] kunit_try_run_case+0x126/0x290
[ 51.663462] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.664192] ? __kasan_check_write+0x18/0x20
[ 51.664929] ? trace_preempt_on+0x20/0xa0
[ 51.665409] ? __kthread_parkme+0x4f/0xd0
[ 51.666151] ? preempt_count_sub+0x50/0x80
[ 51.666740] ? __pfx_kunit_try_run_case+0x10/0x10
[ 51.667469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 51.668276] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.669104] kthread+0x19e/0x1e0
[ 51.669659] ? __pfx_kthread+0x10/0x10
[ 51.670317] ret_from_fork+0x41/0x70
[ 51.670975] ? __pfx_kthread+0x10/0x10
[ 51.671482] ret_from_fork_asm+0x1b/0x30
[ 51.672246] </TASK>
[ 51.672635]
[ 51.673010] Allocated by task 228:
[ 51.673397] kasan_save_stack+0x3c/0x60
[ 51.674058] kasan_set_track+0x29/0x40
[ 51.674565] kasan_save_alloc_info+0x22/0x30
[ 51.675296] __kasan_kmalloc+0xb7/0xc0
[ 51.675726] kmalloc_trace+0x4c/0xb0
[ 51.676405] kmalloc_double_kzfree+0x9d/0x1d0
[ 51.677088] kunit_try_run_case+0x126/0x290
[ 51.677581] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.678433] kthread+0x19e/0x1e0
[ 51.679089] ret_from_fork+0x41/0x70
[ 51.679520] ret_from_fork_asm+0x1b/0x30
[ 51.680215]
[ 51.680501] Freed by task 228:
[ 51.681040] kasan_save_stack+0x3c/0x60
[ 51.681487] kasan_set_track+0x29/0x40
[ 51.681960] kasan_save_free_info+0x2f/0x50
[ 51.682685] ____kasan_slab_free+0x172/0x1d0
[ 51.683430] __kasan_slab_free+0x16/0x20
[ 51.684063] __kmem_cache_free+0x190/0x310
[ 51.684559] kfree+0x7c/0x120
[ 51.685023] kfree_sensitive+0x67/0x90
[ 51.685583] kmalloc_double_kzfree+0xbd/0x1d0
[ 51.686185] kunit_try_run_case+0x126/0x290
[ 51.686800] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.687592] kthread+0x19e/0x1e0
[ 51.688211] ret_from_fork+0x41/0x70
[ 51.688742] ret_from_fork_asm+0x1b/0x30
[ 51.689472]
[ 51.689809] The buggy address belongs to the object at ffff88810148a9e0
[ 51.689809] which belongs to the cache kmalloc-16 of size 16
[ 51.690679] The buggy address is located 0 bytes inside of
[ 51.690679] freed 16-byte region [ffff88810148a9e0, ffff88810148a9f0)
[ 51.692149]
[ 51.692501] The buggy address belongs to the physical page:
[ 51.693130] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[ 51.693908] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.694674] page_type: 0xffffffff()
[ 51.695267] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 51.696217] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 51.696879] page dumped because: kasan: bad access detected
[ 51.697554]
[ 51.697889] Memory state around the buggy address:
[ 51.698529] ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[ 51.699327] ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc fa fb fc fc
[ 51.700201] >ffff88810148a980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 51.701084] ^
[ 51.701634] ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.702564] ffff88810148aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.703414] ==================================================================
Home
[ 48.549523] ==================================================================
[ 48.550753] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x122/0x2b0
[ 48.551585] Read of size 1 at addr ffff8881020676a8 by task kunit_try_catch/184
[ 48.552670]
[ 48.553115] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.554278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.555329] Call Trace:
[ 48.555973] <TASK>
[ 48.556547] dump_stack_lvl+0x4e/0x90
[ 48.557311] print_report+0xd2/0x660
[ 48.557989] ? __virt_addr_valid+0x156/0x1e0
[ 48.558751] ? kasan_complete_mode_report_info+0x64/0x200
[ 48.559608] kasan_report+0xff/0x140
[ 48.560317] ? kmalloc_uaf2+0x122/0x2b0
[ 48.560857] ? kmalloc_uaf2+0x122/0x2b0
[ 48.561326] __asan_load1+0x66/0x70
[ 48.562235] kmalloc_uaf2+0x122/0x2b0
[ 48.562695] ? __pfx_kmalloc_uaf2+0x10/0x10
[ 48.563482] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 48.564328] ? __schedule+0x70b/0x1190
[ 48.565034] ? ktime_get_ts64+0x118/0x140
[ 48.565771] kunit_try_run_case+0x126/0x290
[ 48.566553] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.567338] ? __kasan_check_write+0x18/0x20
[ 48.568111] ? trace_preempt_on+0x20/0xa0
[ 48.568716] ? __kthread_parkme+0x4f/0xd0
[ 48.569556] ? preempt_count_sub+0x50/0x80
[ 48.570290] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.571061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.571983] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.572865] kthread+0x19e/0x1e0
[ 48.573567] ? __pfx_kthread+0x10/0x10
[ 48.574144] ret_from_fork+0x41/0x70
[ 48.574414] ? __pfx_kthread+0x10/0x10
[ 48.574666] ret_from_fork_asm+0x1b/0x30
[ 48.575168] </TASK>
[ 48.575631]
[ 48.575936] Allocated by task 184:
[ 48.576602] kasan_save_stack+0x3c/0x60
[ 48.577272] kasan_set_track+0x29/0x40
[ 48.577907] kasan_save_alloc_info+0x22/0x30
[ 48.578592] __kasan_kmalloc+0xb7/0xc0
[ 48.579129] kmalloc_trace+0x4c/0xb0
[ 48.579647] kmalloc_uaf2+0xb0/0x2b0
[ 48.580228] kunit_try_run_case+0x126/0x290
[ 48.580822] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.581575] kthread+0x19e/0x1e0
[ 48.582166] ret_from_fork+0x41/0x70
[ 48.582727] ret_from_fork_asm+0x1b/0x30
[ 48.583290]
[ 48.583540] Freed by task 184:
[ 48.583972] kasan_save_stack+0x3c/0x60
[ 48.584614] kasan_set_track+0x29/0x40
[ 48.585232] kasan_save_free_info+0x2f/0x50
[ 48.585894] ____kasan_slab_free+0x172/0x1d0
[ 48.586504] __kasan_slab_free+0x16/0x20
[ 48.587121] __kmem_cache_free+0x190/0x310
[ 48.587640] kfree+0x7c/0x120
[ 48.588240] kmalloc_uaf2+0xd0/0x2b0
[ 48.588744] kunit_try_run_case+0x126/0x290
[ 48.589548] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.590279] kthread+0x19e/0x1e0
[ 48.590834] ret_from_fork+0x41/0x70
[ 48.591450] ret_from_fork_asm+0x1b/0x30
[ 48.592055]
[ 48.592365] The buggy address belongs to the object at ffff888102067680
[ 48.592365] which belongs to the cache kmalloc-64 of size 64
[ 48.593565] The buggy address is located 40 bytes inside of
[ 48.593565] freed 64-byte region [ffff888102067680, ffff8881020676c0)
[ 48.594872]
[ 48.595193] The buggy address belongs to the physical page:
[ 48.595710] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[ 48.596794] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.597382] page_type: 0xffffffff()
[ 48.597914] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 48.598839] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 48.599635] page dumped because: kasan: bad access detected
[ 48.600361]
[ 48.600619] Memory state around the buggy address:
[ 48.601219] ffff888102067580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.602120] ffff888102067600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.602869] >ffff888102067680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.603633] ^
[ 48.604290] ffff888102067700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 48.605131] ffff888102067780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.605946] ==================================================================
Home
[ 47.922462] ==================================================================
[ 47.923494] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x108/0x250
[ 47.924150] Read of size 16 at addr ffff88810148a9c0 by task kunit_try_catch/164
[ 47.924879]
[ 47.925371] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.927273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.928198] Call Trace:
[ 47.928807] <TASK>
[ 47.929314] dump_stack_lvl+0x4e/0x90
[ 47.930138] print_report+0xd2/0x660
[ 47.930824] ? __virt_addr_valid+0x156/0x1e0
[ 47.931539] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.932511] kasan_report+0xff/0x140
[ 47.933088] ? kmalloc_uaf_16+0x108/0x250
[ 47.933886] ? kmalloc_uaf_16+0x108/0x250
[ 47.934619] __asan_load16+0x69/0x90
[ 47.935344] kmalloc_uaf_16+0x108/0x250
[ 47.935806] ? __pfx_kmalloc_uaf_16+0x10/0x10
[ 47.936786] ? __pfx_kmalloc_uaf_16+0x10/0x10
[ 47.937556] ? kunit_try_run_case+0x11b/0x290
[ 47.938335] kunit_try_run_case+0x126/0x290
[ 47.939209] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.939578] ? __kasan_check_write+0x18/0x20
[ 47.940072] ? trace_preempt_on+0x20/0xa0
[ 47.940890] ? __kthread_parkme+0x4f/0xd0
[ 47.941464] ? preempt_count_sub+0x50/0x80
[ 47.941970] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.943380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.944194] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.945125] kthread+0x19e/0x1e0
[ 47.945788] ? __pfx_kthread+0x10/0x10
[ 47.946542] ret_from_fork+0x41/0x70
[ 47.947258] ? __pfx_kthread+0x10/0x10
[ 47.948152] ret_from_fork_asm+0x1b/0x30
[ 47.949099] </TASK>
[ 47.949404]
[ 47.949612] Allocated by task 164:
[ 47.950298] kasan_save_stack+0x3c/0x60
[ 47.951423] kasan_set_track+0x29/0x40
[ 47.951964] kasan_save_alloc_info+0x22/0x30
[ 47.952719] __kasan_kmalloc+0xb7/0xc0
[ 47.953213] kmalloc_trace+0x4c/0xb0
[ 47.953471] kmalloc_uaf_16+0xc9/0x250
[ 47.953701] kunit_try_run_case+0x126/0x290
[ 47.954206] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.954876] kthread+0x19e/0x1e0
[ 47.955732] ret_from_fork+0x41/0x70
[ 47.956268] ret_from_fork_asm+0x1b/0x30
[ 47.957501]
[ 47.957889] Freed by task 164:
[ 47.958381] kasan_save_stack+0x3c/0x60
[ 47.959056] kasan_set_track+0x29/0x40
[ 47.959648] kasan_save_free_info+0x2f/0x50
[ 47.960304] ____kasan_slab_free+0x172/0x1d0
[ 47.961167] __kasan_slab_free+0x16/0x20
[ 47.961838] __kmem_cache_free+0x190/0x310
[ 47.962424] kfree+0x7c/0x120
[ 47.962979] kmalloc_uaf_16+0xe9/0x250
[ 47.963460] kunit_try_run_case+0x126/0x290
[ 47.964083] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.964753] kthread+0x19e/0x1e0
[ 47.966075] ret_from_fork+0x41/0x70
[ 47.966570] ret_from_fork_asm+0x1b/0x30
[ 47.967309]
[ 47.967509] The buggy address belongs to the object at ffff88810148a9c0
[ 47.967509] which belongs to the cache kmalloc-16 of size 16
[ 47.968983] The buggy address is located 0 bytes inside of
[ 47.968983] freed 16-byte region [ffff88810148a9c0, ffff88810148a9d0)
[ 47.970400]
[ 47.971144] The buggy address belongs to the physical page:
[ 47.972322] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[ 47.973167] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.974474] page_type: 0xffffffff()
[ 47.974952] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 47.975624] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 47.976299] page dumped because: kasan: bad access detected
[ 47.976567]
[ 47.976691] Memory state around the buggy address:
[ 47.977086] ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[ 47.978415] ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc fa fb fc fc
[ 47.979591] >ffff88810148a980: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[ 47.980625] ^
[ 47.981319] ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.982569] ffff88810148aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.983464] ==================================================================
Home
[ 48.403033] ==================================================================
[ 48.405210] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd5/0x1d0
[ 48.405913] Read of size 1 at addr ffff8881024ffa88 by task kunit_try_catch/180
[ 48.407471]
[ 48.407819] CPU: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.408861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.410063] Call Trace:
[ 48.410760] <TASK>
[ 48.411154] dump_stack_lvl+0x4e/0x90
[ 48.411795] print_report+0xd2/0x660
[ 48.412362] ? __virt_addr_valid+0x156/0x1e0
[ 48.413202] ? kasan_complete_mode_report_info+0x64/0x200
[ 48.414246] kasan_report+0xff/0x140
[ 48.415020] ? kmalloc_uaf+0xd5/0x1d0
[ 48.415561] ? kmalloc_uaf+0xd5/0x1d0
[ 48.415904] __asan_load1+0x66/0x70
[ 48.416541] kmalloc_uaf+0xd5/0x1d0
[ 48.417135] ? __pfx_kmalloc_uaf+0x10/0x10
[ 48.417945] ? __schedule+0x70b/0x1190
[ 48.418640] ? ktime_get_ts64+0x118/0x140
[ 48.419375] kunit_try_run_case+0x126/0x290
[ 48.420514] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.421323] ? __kasan_check_write+0x18/0x20
[ 48.421926] ? trace_preempt_on+0x20/0xa0
[ 48.422709] ? __kthread_parkme+0x4f/0xd0
[ 48.423448] ? preempt_count_sub+0x50/0x80
[ 48.424281] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.425423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.426163] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.426865] kthread+0x19e/0x1e0
[ 48.427566] ? __pfx_kthread+0x10/0x10
[ 48.428713] ret_from_fork+0x41/0x70
[ 48.429294] ? __pfx_kthread+0x10/0x10
[ 48.429799] ret_from_fork_asm+0x1b/0x30
[ 48.430622] </TASK>
[ 48.431157]
[ 48.431440] Allocated by task 180:
[ 48.431868] kasan_save_stack+0x3c/0x60
[ 48.432337] kasan_set_track+0x29/0x40
[ 48.433626] kasan_save_alloc_info+0x22/0x30
[ 48.434392] __kasan_kmalloc+0xb7/0xc0
[ 48.434877] kmalloc_trace+0x4c/0xb0
[ 48.435545] kmalloc_uaf+0x9d/0x1d0
[ 48.436263] kunit_try_run_case+0x126/0x290
[ 48.436811] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.437450] kthread+0x19e/0x1e0
[ 48.437916] ret_from_fork+0x41/0x70
[ 48.439203] ret_from_fork_asm+0x1b/0x30
[ 48.439737]
[ 48.440217] Freed by task 180:
[ 48.440614] kasan_save_stack+0x3c/0x60
[ 48.441324] kasan_set_track+0x29/0x40
[ 48.441805] kasan_save_free_info+0x2f/0x50
[ 48.442404] ____kasan_slab_free+0x172/0x1d0
[ 48.443673] __kasan_slab_free+0x16/0x20
[ 48.444141] __kmem_cache_free+0x190/0x310
[ 48.444742] kfree+0x7c/0x120
[ 48.445384] kmalloc_uaf+0xbd/0x1d0
[ 48.446078] kunit_try_run_case+0x126/0x290
[ 48.446598] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.447264] kthread+0x19e/0x1e0
[ 48.447785] ret_from_fork+0x41/0x70
[ 48.448937] ret_from_fork_asm+0x1b/0x30
[ 48.449528]
[ 48.450022] The buggy address belongs to the object at ffff8881024ffa80
[ 48.450022] which belongs to the cache kmalloc-16 of size 16
[ 48.451327] The buggy address is located 8 bytes inside of
[ 48.451327] freed 16-byte region [ffff8881024ffa80, ffff8881024ffa90)
[ 48.453144]
[ 48.453367] The buggy address belongs to the physical page:
[ 48.453795] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[ 48.454791] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.455717] page_type: 0xffffffff()
[ 48.457090] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.458104] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.458852] page dumped because: kasan: bad access detected
[ 48.459663]
[ 48.460562] Memory state around the buggy address:
[ 48.461265] ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[ 48.462124] ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.463100] >ffff8881024ffa80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.463919] ^
[ 48.464573] ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.466052] ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.466917] ==================================================================
Home
[ 48.478153] ==================================================================
[ 48.479133] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xdb/0x1d0
[ 48.480486] Write of size 33 at addr ffff888102067600 by task kunit_try_catch/182
[ 48.482086]
[ 48.482325] CPU: 1 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 48.483469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.484404] Call Trace:
[ 48.484974] <TASK>
[ 48.485584] dump_stack_lvl+0x4e/0x90
[ 48.486382] print_report+0xd2/0x660
[ 48.487124] ? __virt_addr_valid+0x156/0x1e0
[ 48.487982] ? kasan_complete_mode_report_info+0x64/0x200
[ 48.488720] kasan_report+0xff/0x140
[ 48.489493] ? kmalloc_uaf_memset+0xdb/0x1d0
[ 48.490289] ? kmalloc_uaf_memset+0xdb/0x1d0
[ 48.491304] kasan_check_range+0x10c/0x1c0
[ 48.491980] __asan_memset+0x27/0x50
[ 48.492522] kmalloc_uaf_memset+0xdb/0x1d0
[ 48.493248] ? __pfx_kmalloc_uaf_memset+0x10/0x10
[ 48.493741] ? __schedule+0x70b/0x1190
[ 48.494342] ? ktime_get_ts64+0x118/0x140
[ 48.494903] kunit_try_run_case+0x126/0x290
[ 48.495608] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.496563] ? __kasan_check_write+0x18/0x20
[ 48.497253] ? trace_preempt_on+0x20/0xa0
[ 48.497988] ? __kthread_parkme+0x4f/0xd0
[ 48.499081] ? preempt_count_sub+0x50/0x80
[ 48.499588] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.500261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.500892] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.502106] kthread+0x19e/0x1e0
[ 48.502784] ? __pfx_kthread+0x10/0x10
[ 48.503339] ret_from_fork+0x41/0x70
[ 48.503987] ? __pfx_kthread+0x10/0x10
[ 48.504592] ret_from_fork_asm+0x1b/0x30
[ 48.505503] </TASK>
[ 48.506088]
[ 48.506306] Allocated by task 182:
[ 48.506676] kasan_save_stack+0x3c/0x60
[ 48.507134] kasan_set_track+0x29/0x40
[ 48.507548] kasan_save_alloc_info+0x22/0x30
[ 48.508969] __kasan_kmalloc+0xb7/0xc0
[ 48.509585] kmalloc_trace+0x4c/0xb0
[ 48.510471] kmalloc_uaf_memset+0x9d/0x1d0
[ 48.511224] kunit_try_run_case+0x126/0x290
[ 48.511742] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.512386] kthread+0x19e/0x1e0
[ 48.513373] ret_from_fork+0x41/0x70
[ 48.514104] ret_from_fork_asm+0x1b/0x30
[ 48.514677]
[ 48.514898] Freed by task 182:
[ 48.515867] kasan_save_stack+0x3c/0x60
[ 48.516670] kasan_set_track+0x29/0x40
[ 48.517245] kasan_save_free_info+0x2f/0x50
[ 48.518019] ____kasan_slab_free+0x172/0x1d0
[ 48.519011] __kasan_slab_free+0x16/0x20
[ 48.519709] __kmem_cache_free+0x190/0x310
[ 48.520386] kfree+0x7c/0x120
[ 48.520858] kmalloc_uaf_memset+0xbd/0x1d0
[ 48.521482] kunit_try_run_case+0x126/0x290
[ 48.522139] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.522725] kthread+0x19e/0x1e0
[ 48.523264] ret_from_fork+0x41/0x70
[ 48.523697] ret_from_fork_asm+0x1b/0x30
[ 48.524371]
[ 48.524652] The buggy address belongs to the object at ffff888102067600
[ 48.524652] which belongs to the cache kmalloc-64 of size 64
[ 48.525783] The buggy address is located 0 bytes inside of
[ 48.525783] freed 64-byte region [ffff888102067600, ffff888102067640)
[ 48.526955]
[ 48.527268] The buggy address belongs to the physical page:
[ 48.528028] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[ 48.528715] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.529549] page_type: 0xffffffff()
[ 48.530145] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 48.530928] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 48.531884] page dumped because: kasan: bad access detected
[ 48.532392]
[ 48.532637] Memory state around the buggy address:
[ 48.533330] ffff888102067500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.534254] ffff888102067580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.534971] >ffff888102067600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 48.535876] ^
[ 48.536388] ffff888102067680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.537024] ffff888102067700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.537931] ==================================================================
Home
[ 50.059139] ==================================================================
[ 50.060283] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xce/0x1d0
[ 50.061908] Read of size 1 at addr ffff88810206c140 by task kunit_try_catch/216
[ 50.063038]
[ 50.063362] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.064617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.065839] Call Trace:
[ 50.066162] <TASK>
[ 50.066924] dump_stack_lvl+0x4e/0x90
[ 50.067656] print_report+0xd2/0x660
[ 50.068455] ? __virt_addr_valid+0x156/0x1e0
[ 50.069339] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.070261] kasan_report+0xff/0x140
[ 50.070978] ? kmem_cache_double_destroy+0xce/0x1d0
[ 50.071614] ? kmem_cache_double_destroy+0xce/0x1d0
[ 50.072252] ? kmem_cache_double_destroy+0xce/0x1d0
[ 50.072846] __kasan_check_byte+0x3d/0x50
[ 50.074181] kmem_cache_destroy+0x25/0x170
[ 50.075011] kmem_cache_double_destroy+0xce/0x1d0
[ 50.075840] ? __pfx_kmem_cache_double_destroy+0x10/0x10
[ 50.076720] ? __schedule+0x70b/0x1190
[ 50.077482] ? ktime_get_ts64+0x118/0x140
[ 50.078252] kunit_try_run_case+0x126/0x290
[ 50.078761] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.079659] ? __kasan_check_write+0x18/0x20
[ 50.080444] ? trace_preempt_on+0x20/0xa0
[ 50.081129] ? __kthread_parkme+0x4f/0xd0
[ 50.081641] ? preempt_count_sub+0x50/0x80
[ 50.082566] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.083367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.084378] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.085061] kthread+0x19e/0x1e0
[ 50.085747] ? __pfx_kthread+0x10/0x10
[ 50.086495] ret_from_fork+0x41/0x70
[ 50.087234] ? __pfx_kthread+0x10/0x10
[ 50.088043] ret_from_fork_asm+0x1b/0x30
[ 50.088747] </TASK>
[ 50.089163]
[ 50.089655] Allocated by task 216:
[ 50.090575] kasan_save_stack+0x3c/0x60
[ 50.091307] kasan_set_track+0x29/0x40
[ 50.092005] kasan_save_alloc_info+0x22/0x30
[ 50.092723] __kasan_slab_alloc+0x91/0xa0
[ 50.093202] kmem_cache_alloc+0x180/0x3b0
[ 50.094189] kmem_cache_create_usercopy+0x13e/0x230
[ 50.095143] kmem_cache_create+0x1a/0x20
[ 50.095891] kmem_cache_double_destroy+0x97/0x1d0
[ 50.096683] kunit_try_run_case+0x126/0x290
[ 50.097469] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.098047] kthread+0x19e/0x1e0
[ 50.099359] ret_from_fork+0x41/0x70
[ 50.099830] ret_from_fork_asm+0x1b/0x30
[ 50.100351]
[ 50.100641] Freed by task 216:
[ 50.101120] kasan_save_stack+0x3c/0x60
[ 50.101670] kasan_set_track+0x29/0x40
[ 50.102966] kasan_save_free_info+0x2f/0x50
[ 50.103536] ____kasan_slab_free+0x172/0x1d0
[ 50.104146] __kasan_slab_free+0x16/0x20
[ 50.104587] kmem_cache_free+0x1a7/0x4b0
[ 50.105083] slab_kmem_cache_release+0x2e/0x40
[ 50.105741] kmem_cache_release+0x16/0x20
[ 50.106249] kobject_put+0xf6/0x250
[ 50.107424] sysfs_slab_release+0x24/0x30
[ 50.108348] kmem_cache_destroy+0xd2/0x170
[ 50.109174] kmem_cache_double_destroy+0xb7/0x1d0
[ 50.110070] kunit_try_run_case+0x126/0x290
[ 50.110807] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.111693] kthread+0x19e/0x1e0
[ 50.112112] ret_from_fork+0x41/0x70
[ 50.112493] ret_from_fork_asm+0x1b/0x30
[ 50.113521]
[ 50.114014] The buggy address belongs to the object at ffff88810206c140
[ 50.114014] which belongs to the cache kmem_cache of size 208
[ 50.115395] The buggy address is located 0 bytes inside of
[ 50.115395] freed 208-byte region [ffff88810206c140, ffff88810206c210)
[ 50.117295]
[ 50.117607] The buggy address belongs to the physical page:
[ 50.118447] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10206c
[ 50.119252] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.119549] page_type: 0xffffffff()
[ 50.119806] raw: 0200000000000800 ffff888100041000 dead000000000122 0000000000000000
[ 50.121802] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[ 50.122569] page dumped because: kasan: bad access detected
[ 50.123344]
[ 50.123620] Memory state around the buggy address:
[ 50.124490] ffff88810206c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 50.125929] ffff88810206c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 50.126785] >ffff88810206c100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 50.127739] ^
[ 50.128536] ffff88810206c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 50.129055] ffff88810206c200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.130191] ==================================================================
Home
[ 47.726338] ==================================================================
[ 47.727403] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xf1/0x2e0
[ 47.727770] Read of size 1 at addr ffff888100978000 by task kunit_try_catch/160
[ 47.729433]
[ 47.729767] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.730501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.731683] Call Trace:
[ 47.732163] <TASK>
[ 47.732526] dump_stack_lvl+0x4e/0x90
[ 47.733232] print_report+0xd2/0x660
[ 47.733871] ? __virt_addr_valid+0x156/0x1e0
[ 47.734567] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.735303] kasan_report+0xff/0x140
[ 47.735966] ? krealloc_uaf+0xf1/0x2e0
[ 47.736598] ? krealloc_uaf+0xf1/0x2e0
[ 47.737384] ? krealloc_uaf+0xf1/0x2e0
[ 47.738231] __kasan_check_byte+0x3d/0x50
[ 47.739124] krealloc+0x35/0x140
[ 47.739689] krealloc_uaf+0xf1/0x2e0
[ 47.740388] ? __pfx_krealloc_uaf+0x10/0x10
[ 47.740969] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.741837] ? __schedule+0x70b/0x1190
[ 47.742631] ? ktime_get_ts64+0x118/0x140
[ 47.743433] kunit_try_run_case+0x126/0x290
[ 47.744436] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.745107] ? __kasan_check_write+0x18/0x20
[ 47.745788] ? trace_preempt_on+0x20/0xa0
[ 47.746371] ? __kthread_parkme+0x4f/0xd0
[ 47.747152] ? preempt_count_sub+0x50/0x80
[ 47.747819] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.748680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.749564] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.750644] kthread+0x19e/0x1e0
[ 47.751367] ? __pfx_kthread+0x10/0x10
[ 47.752102] ret_from_fork+0x41/0x70
[ 47.752856] ? __pfx_kthread+0x10/0x10
[ 47.753606] ret_from_fork_asm+0x1b/0x30
[ 47.754405] </TASK>
[ 47.754649]
[ 47.755092] Allocated by task 160:
[ 47.756136] kasan_save_stack+0x3c/0x60
[ 47.756634] kasan_set_track+0x29/0x40
[ 47.757465] kasan_save_alloc_info+0x22/0x30
[ 47.758097] __kasan_kmalloc+0xb7/0xc0
[ 47.758534] kmalloc_trace+0x4c/0xb0
[ 47.758965] krealloc_uaf+0xb0/0x2e0
[ 47.759616] kunit_try_run_case+0x126/0x290
[ 47.760327] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.761139] kthread+0x19e/0x1e0
[ 47.761706] ret_from_fork+0x41/0x70
[ 47.762298] ret_from_fork_asm+0x1b/0x30
[ 47.763004]
[ 47.763299] Freed by task 160:
[ 47.763661] kasan_save_stack+0x3c/0x60
[ 47.764389] kasan_set_track+0x29/0x40
[ 47.765138] kasan_save_free_info+0x2f/0x50
[ 47.765839] ____kasan_slab_free+0x172/0x1d0
[ 47.766446] __kasan_slab_free+0x16/0x20
[ 47.767020] __kmem_cache_free+0x190/0x310
[ 47.767511] kfree+0x7c/0x120
[ 47.768091] krealloc_uaf+0xd0/0x2e0
[ 47.768722] kunit_try_run_case+0x126/0x290
[ 47.769538] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.770346] kthread+0x19e/0x1e0
[ 47.770919] ret_from_fork+0x41/0x70
[ 47.771341] ret_from_fork_asm+0x1b/0x30
[ 47.772159]
[ 47.772492] The buggy address belongs to the object at ffff888100978000
[ 47.772492] which belongs to the cache kmalloc-256 of size 256
[ 47.774073] The buggy address is located 0 bytes inside of
[ 47.774073] freed 256-byte region [ffff888100978000, ffff888100978100)
[ 47.775264]
[ 47.775654] The buggy address belongs to the physical page:
[ 47.776396] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100978
[ 47.777495] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.778546] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.779343] page_type: 0xffffffff()
[ 47.780012] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.780927] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.781838] page dumped because: kasan: bad access detected
[ 47.782602]
[ 47.782965] Memory state around the buggy address:
[ 47.783579] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.784402] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.785294] >ffff888100978000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.786116] ^
[ 47.786543] ffff888100978080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.787427] ffff888100978100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.788266] ==================================================================
Home
[ 47.790326] ==================================================================
[ 47.791681] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x131/0x2e0
[ 47.792746] Read of size 1 at addr ffff888100978000 by task kunit_try_catch/160
[ 47.794067]
[ 47.794485] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 47.795690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.796973] Call Trace:
[ 47.797602] <TASK>
[ 47.798039] dump_stack_lvl+0x4e/0x90
[ 47.798820] print_report+0xd2/0x660
[ 47.799565] ? __virt_addr_valid+0x156/0x1e0
[ 47.800412] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.801815] kasan_report+0xff/0x140
[ 47.802462] ? krealloc_uaf+0x131/0x2e0
[ 47.803298] ? krealloc_uaf+0x131/0x2e0
[ 47.804146] __asan_load1+0x66/0x70
[ 47.804696] krealloc_uaf+0x131/0x2e0
[ 47.805260] ? __pfx_krealloc_uaf+0x10/0x10
[ 47.805761] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.806451] ? __schedule+0x70b/0x1190
[ 47.807564] ? ktime_get_ts64+0x118/0x140
[ 47.808195] kunit_try_run_case+0x126/0x290
[ 47.809125] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.809787] ? __kasan_check_write+0x18/0x20
[ 47.810476] ? trace_preempt_on+0x20/0xa0
[ 47.811309] ? __kthread_parkme+0x4f/0xd0
[ 47.812510] ? preempt_count_sub+0x50/0x80
[ 47.812971] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.813666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.814483] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.815243] kthread+0x19e/0x1e0
[ 47.815848] ? __pfx_kthread+0x10/0x10
[ 47.816629] ret_from_fork+0x41/0x70
[ 47.817552] ? __pfx_kthread+0x10/0x10
[ 47.818163] ret_from_fork_asm+0x1b/0x30
[ 47.819141] </TASK>
[ 47.819574]
[ 47.819990] Allocated by task 160:
[ 47.820599] kasan_save_stack+0x3c/0x60
[ 47.821044] kasan_set_track+0x29/0x40
[ 47.821511] kasan_save_alloc_info+0x22/0x30
[ 47.822112] __kasan_kmalloc+0xb7/0xc0
[ 47.822666] kmalloc_trace+0x4c/0xb0
[ 47.823321] krealloc_uaf+0xb0/0x2e0
[ 47.823710] kunit_try_run_case+0x126/0x290
[ 47.824455] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.825375] kthread+0x19e/0x1e0
[ 47.826108] ret_from_fork+0x41/0x70
[ 47.826938] ret_from_fork_asm+0x1b/0x30
[ 47.827520]
[ 47.827973] Freed by task 160:
[ 47.828607] kasan_save_stack+0x3c/0x60
[ 47.829117] kasan_set_track+0x29/0x40
[ 47.829684] kasan_save_free_info+0x2f/0x50
[ 47.830467] ____kasan_slab_free+0x172/0x1d0
[ 47.831288] __kasan_slab_free+0x16/0x20
[ 47.832126] __kmem_cache_free+0x190/0x310
[ 47.832874] kfree+0x7c/0x120
[ 47.833493] krealloc_uaf+0xd0/0x2e0
[ 47.834489] kunit_try_run_case+0x126/0x290
[ 47.835025] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.835770] kthread+0x19e/0x1e0
[ 47.836262] ret_from_fork+0x41/0x70
[ 47.836776] ret_from_fork_asm+0x1b/0x30
[ 47.837459]
[ 47.837784] The buggy address belongs to the object at ffff888100978000
[ 47.837784] which belongs to the cache kmalloc-256 of size 256
[ 47.839306] The buggy address is located 0 bytes inside of
[ 47.839306] freed 256-byte region [ffff888100978000, ffff888100978100)
[ 47.840611]
[ 47.841515] The buggy address belongs to the physical page:
[ 47.842137] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100978
[ 47.843490] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.844496] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 47.845307] page_type: 0xffffffff()
[ 47.845797] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 47.847109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.847857] page dumped because: kasan: bad access detected
[ 47.848626]
[ 47.849073] Memory state around the buggy address:
[ 47.849668] ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.850525] ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.851476] >ffff888100978000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.852707] ^
[ 47.853160] ffff888100978080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.854289] ffff888100978100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.855187] ==================================================================
Home
[ 49.811685] ==================================================================
[ 49.812503] BUG: KASAN: slab-use-after-free in ksize_uaf+0x140/0x310
[ 49.813478] Read of size 1 at addr ffff88810284d678 by task kunit_try_catch/210
[ 49.814700]
[ 49.815165] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.816250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.817090] Call Trace:
[ 49.817561] <TASK>
[ 49.818028] dump_stack_lvl+0x4e/0x90
[ 49.818852] print_report+0xd2/0x660
[ 49.819499] ? __virt_addr_valid+0x156/0x1e0
[ 49.820142] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.821667] kasan_report+0xff/0x140
[ 49.822350] ? ksize_uaf+0x140/0x310
[ 49.822609] ? ksize_uaf+0x140/0x310
[ 49.822959] __asan_load1+0x66/0x70
[ 49.823858] ksize_uaf+0x140/0x310
[ 49.824481] ? __pfx_ksize_uaf+0x10/0x10
[ 49.825145] ? __schedule+0x70b/0x1190
[ 49.826379] ? ktime_get_ts64+0x118/0x140
[ 49.826808] kunit_try_run_case+0x126/0x290
[ 49.827781] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.828577] ? __kasan_check_write+0x18/0x20
[ 49.829368] ? trace_preempt_on+0x20/0xa0
[ 49.830482] ? __kthread_parkme+0x4f/0xd0
[ 49.830863] ? preempt_count_sub+0x50/0x80
[ 49.831763] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.832384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.833082] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.833753] kthread+0x19e/0x1e0
[ 49.835098] ? __pfx_kthread+0x10/0x10
[ 49.835787] ret_from_fork+0x41/0x70
[ 49.836535] ? __pfx_kthread+0x10/0x10
[ 49.837299] ret_from_fork_asm+0x1b/0x30
[ 49.838450] </TASK>
[ 49.838810]
[ 49.839165] Allocated by task 210:
[ 49.839820] kasan_save_stack+0x3c/0x60
[ 49.840532] kasan_set_track+0x29/0x40
[ 49.841022] kasan_save_alloc_info+0x22/0x30
[ 49.841633] __kasan_kmalloc+0xb7/0xc0
[ 49.842144] kmalloc_trace+0x4c/0xb0
[ 49.842531] ksize_uaf+0x9d/0x310
[ 49.842974] kunit_try_run_case+0x126/0x290
[ 49.843607] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.844424] kthread+0x19e/0x1e0
[ 49.845028] ret_from_fork+0x41/0x70
[ 49.845601] ret_from_fork_asm+0x1b/0x30
[ 49.846275]
[ 49.846568] Freed by task 210:
[ 49.847048] kasan_save_stack+0x3c/0x60
[ 49.847549] kasan_set_track+0x29/0x40
[ 49.848135] kasan_save_free_info+0x2f/0x50
[ 49.848751] ____kasan_slab_free+0x172/0x1d0
[ 49.849232] __kasan_slab_free+0x16/0x20
[ 49.849881] __kmem_cache_free+0x190/0x310
[ 49.850347] kfree+0x7c/0x120
[ 49.850735] ksize_uaf+0xbd/0x310
[ 49.851325] kunit_try_run_case+0x126/0x290
[ 49.852045] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.852850] kthread+0x19e/0x1e0
[ 49.853348] ret_from_fork+0x41/0x70
[ 49.854010] ret_from_fork_asm+0x1b/0x30
[ 49.854607]
[ 49.854929] The buggy address belongs to the object at ffff88810284d600
[ 49.854929] which belongs to the cache kmalloc-128 of size 128
[ 49.856371] The buggy address is located 120 bytes inside of
[ 49.856371] freed 128-byte region [ffff88810284d600, ffff88810284d680)
[ 49.857183]
[ 49.857410] The buggy address belongs to the physical page:
[ 49.857691] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[ 49.858838] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.860127] page_type: 0xffffffff()
[ 49.860647] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 49.861476] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 49.862171] page dumped because: kasan: bad access detected
[ 49.862826]
[ 49.863200] Memory state around the buggy address:
[ 49.863887] ffff88810284d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 49.864690] ffff88810284d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.865637] >ffff88810284d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.866591] ^
[ 49.867273] ffff88810284d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.868121] ffff88810284d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.869048] ==================================================================
Home
[ 49.683434] ==================================================================
[ 49.684429] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd4/0x310
[ 49.685113] Read of size 1 at addr ffff88810284d600 by task kunit_try_catch/210
[ 49.686091]
[ 49.686569] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.687269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.688540] Call Trace:
[ 49.689153] <TASK>
[ 49.689793] dump_stack_lvl+0x4e/0x90
[ 49.690325] print_report+0xd2/0x660
[ 49.691253] ? __virt_addr_valid+0x156/0x1e0
[ 49.692116] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.693014] kasan_report+0xff/0x140
[ 49.693475] ? ksize_uaf+0xd4/0x310
[ 49.694054] ? ksize_uaf+0xd4/0x310
[ 49.694530] ? ksize_uaf+0xd4/0x310
[ 49.695102] __kasan_check_byte+0x3d/0x50
[ 49.695601] ksize+0x20/0x60
[ 49.695983] ksize_uaf+0xd4/0x310
[ 49.696530] ? __pfx_ksize_uaf+0x10/0x10
[ 49.697145] ? __schedule+0x70b/0x1190
[ 49.697746] ? ktime_get_ts64+0x118/0x140
[ 49.698405] kunit_try_run_case+0x126/0x290
[ 49.698960] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.699635] ? __kasan_check_write+0x18/0x20
[ 49.700303] ? trace_preempt_on+0x20/0xa0
[ 49.701597] ? __kthread_parkme+0x4f/0xd0
[ 49.702065] ? preempt_count_sub+0x50/0x80
[ 49.702742] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.703609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.704583] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.705578] kthread+0x19e/0x1e0
[ 49.706644] ? __pfx_kthread+0x10/0x10
[ 49.707293] ret_from_fork+0x41/0x70
[ 49.707753] ? __pfx_kthread+0x10/0x10
[ 49.708265] ret_from_fork_asm+0x1b/0x30
[ 49.708780] </TASK>
[ 49.709722]
[ 49.709928] Allocated by task 210:
[ 49.710235] kasan_save_stack+0x3c/0x60
[ 49.710647] kasan_set_track+0x29/0x40
[ 49.711921] kasan_save_alloc_info+0x22/0x30
[ 49.712421] __kasan_kmalloc+0xb7/0xc0
[ 49.712853] kmalloc_trace+0x4c/0xb0
[ 49.713326] ksize_uaf+0x9d/0x310
[ 49.713912] kunit_try_run_case+0x126/0x290
[ 49.714390] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.714710] kthread+0x19e/0x1e0
[ 49.715238] ret_from_fork+0x41/0x70
[ 49.715800] ret_from_fork_asm+0x1b/0x30
[ 49.716779]
[ 49.717403] Freed by task 210:
[ 49.718073] kasan_save_stack+0x3c/0x60
[ 49.718734] kasan_set_track+0x29/0x40
[ 49.719379] kasan_save_free_info+0x2f/0x50
[ 49.719973] ____kasan_slab_free+0x172/0x1d0
[ 49.720745] __kasan_slab_free+0x16/0x20
[ 49.721517] __kmem_cache_free+0x190/0x310
[ 49.722296] kfree+0x7c/0x120
[ 49.722946] ksize_uaf+0xbd/0x310
[ 49.723547] kunit_try_run_case+0x126/0x290
[ 49.724255] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.725140] kthread+0x19e/0x1e0
[ 49.725712] ret_from_fork+0x41/0x70
[ 49.726452] ret_from_fork_asm+0x1b/0x30
[ 49.727449]
[ 49.727842] The buggy address belongs to the object at ffff88810284d600
[ 49.727842] which belongs to the cache kmalloc-128 of size 128
[ 49.728965] The buggy address is located 0 bytes inside of
[ 49.728965] freed 128-byte region [ffff88810284d600, ffff88810284d680)
[ 49.730621]
[ 49.730979] The buggy address belongs to the physical page:
[ 49.731864] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[ 49.733138] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.733935] page_type: 0xffffffff()
[ 49.734557] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 49.735498] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 49.736490] page dumped because: kasan: bad access detected
[ 49.737285]
[ 49.737484] Memory state around the buggy address:
[ 49.738242] ffff88810284d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 49.739247] ffff88810284d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.739987] >ffff88810284d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.740750] ^
[ 49.741943] ffff88810284d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.742644] ffff88810284d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.743391] ==================================================================
Home
[ 49.744747] ==================================================================
[ 49.745350] BUG: KASAN: slab-use-after-free in ksize_uaf+0x108/0x310
[ 49.747131] Read of size 1 at addr ffff88810284d600 by task kunit_try_catch/210
[ 49.748008]
[ 49.748334] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.749304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.750981] Call Trace:
[ 49.751279] <TASK>
[ 49.751650] dump_stack_lvl+0x4e/0x90
[ 49.752335] print_report+0xd2/0x660
[ 49.752817] ? __virt_addr_valid+0x156/0x1e0
[ 49.753521] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.755135] kasan_report+0xff/0x140
[ 49.755653] ? ksize_uaf+0x108/0x310
[ 49.756152] ? ksize_uaf+0x108/0x310
[ 49.756653] __asan_load1+0x66/0x70
[ 49.757194] ksize_uaf+0x108/0x310
[ 49.757628] ? __pfx_ksize_uaf+0x10/0x10
[ 49.758261] ? __schedule+0x70b/0x1190
[ 49.759045] ? ktime_get_ts64+0x118/0x140
[ 49.759683] kunit_try_run_case+0x126/0x290
[ 49.761165] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.761737] ? __kasan_check_write+0x18/0x20
[ 49.762311] ? trace_preempt_on+0x20/0xa0
[ 49.763268] ? __kthread_parkme+0x4f/0xd0
[ 49.763902] ? preempt_count_sub+0x50/0x80
[ 49.764666] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.765474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.767205] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.768019] kthread+0x19e/0x1e0
[ 49.768503] ? __pfx_kthread+0x10/0x10
[ 49.769167] ret_from_fork+0x41/0x70
[ 49.769707] ? __pfx_kthread+0x10/0x10
[ 49.770372] ret_from_fork_asm+0x1b/0x30
[ 49.771338] </TASK>
[ 49.771591]
[ 49.771919] Allocated by task 210:
[ 49.772879] kasan_save_stack+0x3c/0x60
[ 49.773590] kasan_set_track+0x29/0x40
[ 49.774064] kasan_save_alloc_info+0x22/0x30
[ 49.774715] __kasan_kmalloc+0xb7/0xc0
[ 49.775260] kmalloc_trace+0x4c/0xb0
[ 49.775661] ksize_uaf+0x9d/0x310
[ 49.776416] kunit_try_run_case+0x126/0x290
[ 49.777436] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.778286] kthread+0x19e/0x1e0
[ 49.779569] ret_from_fork+0x41/0x70
[ 49.780342] ret_from_fork_asm+0x1b/0x30
[ 49.781071]
[ 49.781548] Freed by task 210:
[ 49.782218] kasan_save_stack+0x3c/0x60
[ 49.782655] kasan_set_track+0x29/0x40
[ 49.783948] kasan_save_free_info+0x2f/0x50
[ 49.784398] ____kasan_slab_free+0x172/0x1d0
[ 49.785317] __kasan_slab_free+0x16/0x20
[ 49.785941] __kmem_cache_free+0x190/0x310
[ 49.786530] kfree+0x7c/0x120
[ 49.787332] ksize_uaf+0xbd/0x310
[ 49.788089] kunit_try_run_case+0x126/0x290
[ 49.788747] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.789563] kthread+0x19e/0x1e0
[ 49.790090] ret_from_fork+0x41/0x70
[ 49.790699] ret_from_fork_asm+0x1b/0x30
[ 49.791733]
[ 49.792041] The buggy address belongs to the object at ffff88810284d600
[ 49.792041] which belongs to the cache kmalloc-128 of size 128
[ 49.793139] The buggy address is located 0 bytes inside of
[ 49.793139] freed 128-byte region [ffff88810284d600, ffff88810284d680)
[ 49.794866]
[ 49.795816] The buggy address belongs to the physical page:
[ 49.796415] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[ 49.797426] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.798166] page_type: 0xffffffff()
[ 49.798576] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 49.800298] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 49.801002] page dumped because: kasan: bad access detected
[ 49.801602]
[ 49.801875] Memory state around the buggy address:
[ 49.803158] ffff88810284d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 49.804448] ffff88810284d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.805415] >ffff88810284d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.806344] ^
[ 49.807339] ffff88810284d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.808484] ffff88810284d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.809346] ==================================================================
Home
[ 51.780503] ==================================================================
[ 51.781584] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x27/0x40
[ 51.782964] Read of size 4 at addr ffff888102065b00 by task swapper/1/0
[ 51.783712]
[ 51.784119] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B N 6.6.72-rc1 #1
[ 51.785075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.786094] Call Trace:
[ 51.786486] <IRQ>
[ 51.786824] dump_stack_lvl+0x4e/0x90
[ 51.787508] print_report+0xd2/0x660
[ 51.788131] ? __virt_addr_valid+0x156/0x1e0
[ 51.789048] ? kasan_complete_mode_report_info+0x64/0x200
[ 51.789696] kasan_report+0xff/0x140
[ 51.790154] ? rcu_uaf_reclaim+0x27/0x40
[ 51.790600] ? rcu_uaf_reclaim+0x27/0x40
[ 51.791324] ? __pfx_rcu_uaf_reclaim+0x10/0x10
[ 51.792076] __asan_load4+0x85/0xb0
[ 51.792673] rcu_uaf_reclaim+0x27/0x40
[ 51.793334] rcu_core+0x4be/0x1020
[ 51.793965] ? rcu_core+0x3ef/0x1020
[ 51.794627] ? __pfx_rcu_core+0x10/0x10
[ 51.795296] rcu_core_si+0x12/0x20
[ 51.795717] handle_softirqs+0x195/0x520
[ 51.796218] ? __pfx_handle_softirqs+0x10/0x10
[ 51.796716] irq_exit_rcu+0x92/0xb0
[ 51.797983] sysvec_apic_timer_interrupt+0x80/0xa0
[ 51.798538] </IRQ>
[ 51.798922] <TASK>
[ 51.799296] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 51.800152] RIP: 0010:default_idle+0xf/0x20
[ 51.801049] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d d3 e3 28 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 51.802887] RSP: 0000:ffff88810082fde8 EFLAGS: 00010206
[ 51.803795] RAX: ffff88815b5342c0 RBX: ffff888100811f00 RCX: ffffffff98dc96d8
[ 51.804618] RDX: ffffed102b6a6859 RSI: 0000000000000004 RDI: 000000000000e794
[ 51.805462] RBP: ffff88810082fdf0 R08: 0000000000000001 R09: ffffed102b6a6858
[ 51.806281] R10: ffff88815b5342c3 R11: ffffffff9700325b R12: 0000000000000001
[ 51.807157] R13: ffffffff9a814c50 R14: 0000000000000000 R15: ffff888100811f00
[ 51.808061] ? ret_from_fork_asm+0x1b/0x30
[ 51.808658] ? ct_kernel_exit.constprop.0+0xa8/0xd0
[ 51.809396] ? arch_cpu_idle+0xd/0x20
[ 51.810056] default_idle_call+0x42/0x70
[ 51.810597] do_idle+0x2ba/0x310
[ 51.811205] ? __pfx_do_idle+0x10/0x10
[ 51.811797] ? _raw_spin_unlock_irqrestore+0x31/0x60
[ 51.812430] ? complete+0xb8/0xd0
[ 51.813024] cpu_startup_entry+0x3c/0x40
[ 51.813559] start_secondary+0x1ac/0x1d0
[ 51.814215] ? __pfx_start_secondary+0x10/0x10
[ 51.814794] secondary_startup_64_no_verify+0x178/0x17b
[ 51.815562] </TASK>
[ 51.815897]
[ 51.816202] Allocated by task 230:
[ 51.816641] kasan_save_stack+0x3c/0x60
[ 51.817136] kasan_set_track+0x29/0x40
[ 51.817696] kasan_save_alloc_info+0x22/0x30
[ 51.818325] __kasan_kmalloc+0xb7/0xc0
[ 51.818892] kmalloc_trace+0x4c/0xb0
[ 51.819475] rcu_uaf+0x9b/0x1e0
[ 51.820013] kunit_try_run_case+0x126/0x290
[ 51.820514] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.821300] kthread+0x19e/0x1e0
[ 51.821797] ret_from_fork+0x41/0x70
[ 51.822279] ret_from_fork_asm+0x1b/0x30
[ 51.822915]
[ 51.823267] Freed by task 0:
[ 51.823675] kasan_save_stack+0x3c/0x60
[ 51.824160] kasan_set_track+0x29/0x40
[ 51.824713] kasan_save_free_info+0x2f/0x50
[ 51.825373] ____kasan_slab_free+0x172/0x1d0
[ 51.825947] __kasan_slab_free+0x16/0x20
[ 51.826530] __kmem_cache_free+0x190/0x310
[ 51.827167] kfree+0x7c/0x120
[ 51.827625] rcu_uaf_reclaim+0x1f/0x40
[ 51.828131] rcu_core+0x4be/0x1020
[ 51.828667] rcu_core_si+0x12/0x20
[ 51.829255] handle_softirqs+0x195/0x520
[ 51.829858] irq_exit_rcu+0x92/0xb0
[ 51.830408] sysvec_apic_timer_interrupt+0x80/0xa0
[ 51.831043] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 51.831730]
[ 51.832124] Last potentially related work creation:
[ 51.832668] kasan_save_stack+0x3c/0x60
[ 51.833329] __kasan_record_aux_stack+0xb3/0xd0
[ 51.833923] kasan_record_aux_stack_noalloc+0xf/0x20
[ 51.834659] __call_rcu_common.constprop.0+0x4c/0x5e0
[ 51.835405] call_rcu+0x12/0x20
[ 51.835936] rcu_uaf+0xdd/0x1e0
[ 51.836366] kunit_try_run_case+0x126/0x290
[ 51.837041] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.837815] kthread+0x19e/0x1e0
[ 51.838261] ret_from_fork+0x41/0x70
[ 51.838855] ret_from_fork_asm+0x1b/0x30
[ 51.839470]
[ 51.839795] The buggy address belongs to the object at ffff888102065b00
[ 51.839795] which belongs to the cache kmalloc-32 of size 32
[ 51.841067] The buggy address is located 0 bytes inside of
[ 51.841067] freed 32-byte region [ffff888102065b00, ffff888102065b20)
[ 51.842203]
[ 51.842501] The buggy address belongs to the physical page:
[ 51.843252] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102065
[ 51.844242] flags: 0x200000000000800(slab|node=0|zone=2)
[ 51.844864] page_type: 0xffffffff()
[ 51.845391] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 51.846247] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 51.847096] page dumped because: kasan: bad access detected
[ 51.847621]
[ 51.847966] Memory state around the buggy address:
[ 51.848465] ffff888102065a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 51.849305] ffff888102065a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 51.850097] >ffff888102065b00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.850859] ^
[ 51.851314] ffff888102065b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.852086] ffff888102065c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 51.852866] ==================================================================
Home
[ 50.262529] ==================================================================
[ 50.263734] BUG: KASAN: slab-use-after-free in strchr+0x18/0x60
[ 50.264750] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[ 50.265582]
[ 50.265920] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.267218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.268149] Call Trace:
[ 50.268438] <TASK>
[ 50.268715] dump_stack_lvl+0x4e/0x90
[ 50.269399] print_report+0xd2/0x660
[ 50.269900] ? __virt_addr_valid+0x156/0x1e0
[ 50.270627] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.271518] kasan_report+0xff/0x140
[ 50.272129] ? strchr+0x18/0x60
[ 50.272616] ? strchr+0x18/0x60
[ 50.273225] __asan_load1+0x66/0x70
[ 50.273869] strchr+0x18/0x60
[ 50.274606] kasan_strings+0xdf/0x510
[ 50.275740] ? __pfx_kasan_strings+0x10/0x10
[ 50.276386] ? __schedule+0x70b/0x1190
[ 50.277258] ? ktime_get_ts64+0x118/0x140
[ 50.278122] kunit_try_run_case+0x126/0x290
[ 50.278825] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.279648] ? __kasan_check_write+0x18/0x20
[ 50.280375] ? trace_preempt_on+0x20/0xa0
[ 50.281582] ? __kthread_parkme+0x4f/0xd0
[ 50.282410] ? preempt_count_sub+0x50/0x80
[ 50.283420] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.284031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.285053] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.285590] kthread+0x19e/0x1e0
[ 50.286701] ? __pfx_kthread+0x10/0x10
[ 50.287522] ret_from_fork+0x41/0x70
[ 50.288314] ? __pfx_kthread+0x10/0x10
[ 50.289206] ret_from_fork_asm+0x1b/0x30
[ 50.289754] </TASK>
[ 50.291055]
[ 50.291497] Allocated by task 222:
[ 50.292280] kasan_save_stack+0x3c/0x60
[ 50.292687] kasan_set_track+0x29/0x40
[ 50.293508] kasan_save_alloc_info+0x22/0x30
[ 50.294279] __kasan_kmalloc+0xb7/0xc0
[ 50.295011] kmalloc_trace+0x4c/0xb0
[ 50.295650] kasan_strings+0x9f/0x510
[ 50.296094] kunit_try_run_case+0x126/0x290
[ 50.296786] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.297677] kthread+0x19e/0x1e0
[ 50.298501] ret_from_fork+0x41/0x70
[ 50.299202] ret_from_fork_asm+0x1b/0x30
[ 50.299466]
[ 50.299713] Freed by task 222:
[ 50.300230] kasan_save_stack+0x3c/0x60
[ 50.301023] kasan_set_track+0x29/0x40
[ 50.301506] kasan_save_free_info+0x2f/0x50
[ 50.302340] ____kasan_slab_free+0x172/0x1d0
[ 50.303404] __kasan_slab_free+0x16/0x20
[ 50.304436] __kmem_cache_free+0x190/0x310
[ 50.305184] kfree+0x7c/0x120
[ 50.305746] kasan_strings+0xc3/0x510
[ 50.306440] kunit_try_run_case+0x126/0x290
[ 50.307711] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.308483] kthread+0x19e/0x1e0
[ 50.309206] ret_from_fork+0x41/0x70
[ 50.310188] ret_from_fork_asm+0x1b/0x30
[ 50.311312]
[ 50.311549] The buggy address belongs to the object at ffff888102840dc0
[ 50.311549] which belongs to the cache kmalloc-32 of size 32
[ 50.313259] The buggy address is located 16 bytes inside of
[ 50.313259] freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[ 50.314857]
[ 50.315335] The buggy address belongs to the physical page:
[ 50.316121] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.317820] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.318443] page_type: 0xffffffff()
[ 50.319203] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.320105] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.321466] page dumped because: kasan: bad access detected
[ 50.322174]
[ 50.322366] Memory state around the buggy address:
[ 50.322671] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.323450] ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.324299] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.325787] ^
[ 50.326426] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.327010] ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.327684] ==================================================================
Home
[ 50.397387] ==================================================================
[ 50.398238] BUG: KASAN: slab-use-after-free in strcmp+0x26/0x60
[ 50.399072] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[ 50.399952]
[ 50.400433] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.401604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.402763] Call Trace:
[ 50.403844] <TASK>
[ 50.404414] dump_stack_lvl+0x4e/0x90
[ 50.405388] print_report+0xd2/0x660
[ 50.406118] ? __virt_addr_valid+0x156/0x1e0
[ 50.406734] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.407500] kasan_report+0xff/0x140
[ 50.408310] ? strcmp+0x26/0x60
[ 50.408643] ? strcmp+0x26/0x60
[ 50.409400] __asan_load1+0x66/0x70
[ 50.410049] strcmp+0x26/0x60
[ 50.410563] kasan_strings+0x161/0x510
[ 50.411203] ? __pfx_kasan_strings+0x10/0x10
[ 50.411939] ? __schedule+0x70b/0x1190
[ 50.412545] ? ktime_get_ts64+0x118/0x140
[ 50.413478] kunit_try_run_case+0x126/0x290
[ 50.414222] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.414659] ? __kasan_check_write+0x18/0x20
[ 50.415523] ? trace_preempt_on+0x20/0xa0
[ 50.416509] ? __kthread_parkme+0x4f/0xd0
[ 50.417251] ? preempt_count_sub+0x50/0x80
[ 50.417854] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.418638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.420129] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.420934] kthread+0x19e/0x1e0
[ 50.421620] ? __pfx_kthread+0x10/0x10
[ 50.422301] ret_from_fork+0x41/0x70
[ 50.423068] ? __pfx_kthread+0x10/0x10
[ 50.423606] ret_from_fork_asm+0x1b/0x30
[ 50.424882] </TASK>
[ 50.425226]
[ 50.425513] Allocated by task 222:
[ 50.426231] kasan_save_stack+0x3c/0x60
[ 50.426712] kasan_set_track+0x29/0x40
[ 50.427465] kasan_save_alloc_info+0x22/0x30
[ 50.428164] __kasan_kmalloc+0xb7/0xc0
[ 50.428761] kmalloc_trace+0x4c/0xb0
[ 50.429355] kasan_strings+0x9f/0x510
[ 50.430645] kunit_try_run_case+0x126/0x290
[ 50.431114] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.432163] kthread+0x19e/0x1e0
[ 50.432734] ret_from_fork+0x41/0x70
[ 50.433490] ret_from_fork_asm+0x1b/0x30
[ 50.434129]
[ 50.434338] Freed by task 222:
[ 50.434848] kasan_save_stack+0x3c/0x60
[ 50.435251] kasan_set_track+0x29/0x40
[ 50.435814] kasan_save_free_info+0x2f/0x50
[ 50.436405] ____kasan_slab_free+0x172/0x1d0
[ 50.437029] __kasan_slab_free+0x16/0x20
[ 50.437551] __kmem_cache_free+0x190/0x310
[ 50.438670] kfree+0x7c/0x120
[ 50.439380] kasan_strings+0xc3/0x510
[ 50.440078] kunit_try_run_case+0x126/0x290
[ 50.440464] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.441795] kthread+0x19e/0x1e0
[ 50.442511] ret_from_fork+0x41/0x70
[ 50.443317] ret_from_fork_asm+0x1b/0x30
[ 50.444486]
[ 50.444743] The buggy address belongs to the object at ffff888102840dc0
[ 50.444743] which belongs to the cache kmalloc-32 of size 32
[ 50.446567] The buggy address is located 16 bytes inside of
[ 50.446567] freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[ 50.448537]
[ 50.448839] The buggy address belongs to the physical page:
[ 50.449947] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.451719] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.452326] page_type: 0xffffffff()
[ 50.453085] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.453868] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.454611] page dumped because: kasan: bad access detected
[ 50.455645]
[ 50.456249] Memory state around the buggy address:
[ 50.457190] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.458570] ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.459474] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.460149] ^
[ 50.460702] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.461412] ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.462262] ==================================================================
Home
[ 50.531292] ==================================================================
[ 50.532198] BUG: KASAN: slab-use-after-free in strlen+0x13/0x50
[ 50.532880] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[ 50.533703]
[ 50.533970] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.534844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.535976] Call Trace:
[ 50.536400] <TASK>
[ 50.537078] dump_stack_lvl+0x4e/0x90
[ 50.537711] print_report+0xd2/0x660
[ 50.538520] ? __virt_addr_valid+0x156/0x1e0
[ 50.540027] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.540754] kasan_report+0xff/0x140
[ 50.541464] ? strlen+0x13/0x50
[ 50.541955] ? strlen+0x13/0x50
[ 50.542666] __asan_load1+0x66/0x70
[ 50.543314] strlen+0x13/0x50
[ 50.544079] kasan_strings+0x1dc/0x510
[ 50.544582] ? __pfx_kasan_strings+0x10/0x10
[ 50.545870] ? __schedule+0x70b/0x1190
[ 50.546391] ? ktime_get_ts64+0x118/0x140
[ 50.546680] kunit_try_run_case+0x126/0x290
[ 50.547724] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.548612] ? __kasan_check_write+0x18/0x20
[ 50.549501] ? trace_preempt_on+0x20/0xa0
[ 50.550401] ? __kthread_parkme+0x4f/0xd0
[ 50.551361] ? preempt_count_sub+0x50/0x80
[ 50.552133] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.552766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.553533] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.554542] kthread+0x19e/0x1e0
[ 50.555303] ? __pfx_kthread+0x10/0x10
[ 50.555740] ret_from_fork+0x41/0x70
[ 50.556321] ? __pfx_kthread+0x10/0x10
[ 50.556903] ret_from_fork_asm+0x1b/0x30
[ 50.558129] </TASK>
[ 50.558444]
[ 50.558677] Allocated by task 222:
[ 50.559146] kasan_save_stack+0x3c/0x60
[ 50.559683] kasan_set_track+0x29/0x40
[ 50.560177] kasan_save_alloc_info+0x22/0x30
[ 50.560751] __kasan_kmalloc+0xb7/0xc0
[ 50.561274] kmalloc_trace+0x4c/0xb0
[ 50.561767] kasan_strings+0x9f/0x510
[ 50.562518] kunit_try_run_case+0x126/0x290
[ 50.563268] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.564124] kthread+0x19e/0x1e0
[ 50.564657] ret_from_fork+0x41/0x70
[ 50.565290] ret_from_fork_asm+0x1b/0x30
[ 50.565872]
[ 50.566121] Freed by task 222:
[ 50.566560] kasan_save_stack+0x3c/0x60
[ 50.568037] kasan_set_track+0x29/0x40
[ 50.568553] kasan_save_free_info+0x2f/0x50
[ 50.569210] ____kasan_slab_free+0x172/0x1d0
[ 50.569929] __kasan_slab_free+0x16/0x20
[ 50.570576] __kmem_cache_free+0x190/0x310
[ 50.571060] kfree+0x7c/0x120
[ 50.571680] kasan_strings+0xc3/0x510
[ 50.572710] kunit_try_run_case+0x126/0x290
[ 50.573160] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.574287] kthread+0x19e/0x1e0
[ 50.574694] ret_from_fork+0x41/0x70
[ 50.575265] ret_from_fork_asm+0x1b/0x30
[ 50.575763]
[ 50.576458] The buggy address belongs to the object at ffff888102840dc0
[ 50.576458] which belongs to the cache kmalloc-32 of size 32
[ 50.577740] The buggy address is located 16 bytes inside of
[ 50.577740] freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[ 50.578666]
[ 50.578881] The buggy address belongs to the physical page:
[ 50.580098] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.581487] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.582233] page_type: 0xffffffff()
[ 50.582641] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.584376] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.585416] page dumped because: kasan: bad access detected
[ 50.586275]
[ 50.586781] Memory state around the buggy address:
[ 50.587309] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.588881] ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.590269] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.590906] ^
[ 50.591941] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.593017] ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.593706] ==================================================================
Home
[ 50.595354] ==================================================================
[ 50.596424] BUG: KASAN: slab-use-after-free in strnlen+0x31/0x50
[ 50.598017] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[ 50.599102]
[ 50.599402] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.600116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.601510] Call Trace:
[ 50.602426] <TASK>
[ 50.602988] dump_stack_lvl+0x4e/0x90
[ 50.603890] print_report+0xd2/0x660
[ 50.604486] ? __virt_addr_valid+0x156/0x1e0
[ 50.605033] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.605680] kasan_report+0xff/0x140
[ 50.606360] ? strnlen+0x31/0x50
[ 50.607126] ? strnlen+0x31/0x50
[ 50.607727] __asan_load1+0x66/0x70
[ 50.609097] strnlen+0x31/0x50
[ 50.609594] kasan_strings+0x21b/0x510
[ 50.610312] ? __pfx_kasan_strings+0x10/0x10
[ 50.610978] ? __schedule+0x70b/0x1190
[ 50.611587] ? ktime_get_ts64+0x118/0x140
[ 50.612348] kunit_try_run_case+0x126/0x290
[ 50.613025] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.613742] ? __kasan_check_write+0x18/0x20
[ 50.615075] ? trace_preempt_on+0x20/0xa0
[ 50.615541] ? __kthread_parkme+0x4f/0xd0
[ 50.616229] ? preempt_count_sub+0x50/0x80
[ 50.616773] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.617410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.618300] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.619212] kthread+0x19e/0x1e0
[ 50.619702] ? __pfx_kthread+0x10/0x10
[ 50.620819] ret_from_fork+0x41/0x70
[ 50.621687] ? __pfx_kthread+0x10/0x10
[ 50.622273] ret_from_fork_asm+0x1b/0x30
[ 50.623632] </TASK>
[ 50.623958]
[ 50.624408] Allocated by task 222:
[ 50.625265] kasan_save_stack+0x3c/0x60
[ 50.625670] kasan_set_track+0x29/0x40
[ 50.626035] kasan_save_alloc_info+0x22/0x30
[ 50.626529] __kasan_kmalloc+0xb7/0xc0
[ 50.627533] kmalloc_trace+0x4c/0xb0
[ 50.628265] kasan_strings+0x9f/0x510
[ 50.628729] kunit_try_run_case+0x126/0x290
[ 50.629205] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.630303] kthread+0x19e/0x1e0
[ 50.631462] ret_from_fork+0x41/0x70
[ 50.632256] ret_from_fork_asm+0x1b/0x30
[ 50.632520]
[ 50.632648] Freed by task 222:
[ 50.632902] kasan_save_stack+0x3c/0x60
[ 50.634287] kasan_set_track+0x29/0x40
[ 50.634908] kasan_save_free_info+0x2f/0x50
[ 50.635316] ____kasan_slab_free+0x172/0x1d0
[ 50.635806] __kasan_slab_free+0x16/0x20
[ 50.636335] __kmem_cache_free+0x190/0x310
[ 50.636948] kfree+0x7c/0x120
[ 50.637508] kasan_strings+0xc3/0x510
[ 50.638381] kunit_try_run_case+0x126/0x290
[ 50.639545] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.640581] kthread+0x19e/0x1e0
[ 50.641676] ret_from_fork+0x41/0x70
[ 50.642425] ret_from_fork_asm+0x1b/0x30
[ 50.643172]
[ 50.643471] The buggy address belongs to the object at ffff888102840dc0
[ 50.643471] which belongs to the cache kmalloc-32 of size 32
[ 50.645038] The buggy address is located 16 bytes inside of
[ 50.645038] freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[ 50.646664]
[ 50.646978] The buggy address belongs to the physical page:
[ 50.647642] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.649258] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.650068] page_type: 0xffffffff()
[ 50.650575] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.651612] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.653084] page dumped because: kasan: bad access detected
[ 50.653763]
[ 50.654294] Memory state around the buggy address:
[ 50.655124] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.656123] ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.657137] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.658199] ^
[ 50.659277] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.660213] ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.660542] ==================================================================
Home
[ 50.329433] ==================================================================
[ 50.330557] BUG: KASAN: slab-use-after-free in strrchr+0x1e/0x40
[ 50.331395] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[ 50.332623]
[ 50.333013] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 50.334508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.335473] Call Trace:
[ 50.335739] <TASK>
[ 50.336425] dump_stack_lvl+0x4e/0x90
[ 50.337325] print_report+0xd2/0x660
[ 50.337830] ? __virt_addr_valid+0x156/0x1e0
[ 50.338690] ? kasan_complete_mode_report_info+0x64/0x200
[ 50.339480] kasan_report+0xff/0x140
[ 50.340414] ? strrchr+0x1e/0x40
[ 50.341106] ? strrchr+0x1e/0x40
[ 50.341724] __asan_load1+0x66/0x70
[ 50.342255] strrchr+0x1e/0x40
[ 50.342683] kasan_strings+0x11f/0x510
[ 50.343220] ? __pfx_kasan_strings+0x10/0x10
[ 50.344244] ? __schedule+0x70b/0x1190
[ 50.344630] ? ktime_get_ts64+0x118/0x140
[ 50.345534] kunit_try_run_case+0x126/0x290
[ 50.346339] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.346981] ? __kasan_check_write+0x18/0x20
[ 50.347661] ? trace_preempt_on+0x20/0xa0
[ 50.348321] ? __kthread_parkme+0x4f/0xd0
[ 50.349361] ? preempt_count_sub+0x50/0x80
[ 50.349688] ? __pfx_kunit_try_run_case+0x10/0x10
[ 50.350510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 50.351452] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.352296] kthread+0x19e/0x1e0
[ 50.352551] ? __pfx_kthread+0x10/0x10
[ 50.352898] ret_from_fork+0x41/0x70
[ 50.353579] ? __pfx_kthread+0x10/0x10
[ 50.354300] ret_from_fork_asm+0x1b/0x30
[ 50.354798] </TASK>
[ 50.355272]
[ 50.355625] Allocated by task 222:
[ 50.356866] kasan_save_stack+0x3c/0x60
[ 50.357669] kasan_set_track+0x29/0x40
[ 50.358303] kasan_save_alloc_info+0x22/0x30
[ 50.359074] __kasan_kmalloc+0xb7/0xc0
[ 50.359426] kmalloc_trace+0x4c/0xb0
[ 50.359869] kasan_strings+0x9f/0x510
[ 50.360471] kunit_try_run_case+0x126/0x290
[ 50.361170] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.362037] kthread+0x19e/0x1e0
[ 50.362621] ret_from_fork+0x41/0x70
[ 50.363355] ret_from_fork_asm+0x1b/0x30
[ 50.364453]
[ 50.364669] Freed by task 222:
[ 50.364947] kasan_save_stack+0x3c/0x60
[ 50.366320] kasan_set_track+0x29/0x40
[ 50.366986] kasan_save_free_info+0x2f/0x50
[ 50.367706] ____kasan_slab_free+0x172/0x1d0
[ 50.368407] __kasan_slab_free+0x16/0x20
[ 50.369223] __kmem_cache_free+0x190/0x310
[ 50.369930] kfree+0x7c/0x120
[ 50.371266] kasan_strings+0xc3/0x510
[ 50.371901] kunit_try_run_case+0x126/0x290
[ 50.372644] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.373584] kthread+0x19e/0x1e0
[ 50.374256] ret_from_fork+0x41/0x70
[ 50.374845] ret_from_fork_asm+0x1b/0x30
[ 50.375649]
[ 50.375920] The buggy address belongs to the object at ffff888102840dc0
[ 50.375920] which belongs to the cache kmalloc-32 of size 32
[ 50.377882] The buggy address is located 16 bytes inside of
[ 50.377882] freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[ 50.379545]
[ 50.380701] The buggy address belongs to the physical page:
[ 50.381425] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[ 50.382588] flags: 0x200000000000800(slab|node=0|zone=2)
[ 50.383478] page_type: 0xffffffff()
[ 50.384314] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 50.386114] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 50.387159] page dumped because: kasan: bad access detected
[ 50.387752]
[ 50.388149] Memory state around the buggy address:
[ 50.389173] ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.390297] ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.391378] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 50.392029] ^
[ 50.392590] ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.393552] ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 50.394534] ==================================================================
Home
[ 49.341443] ==================================================================
[ 49.342945] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc1/0x190
[ 49.343786] Read of size 1 at addr ffff888102adfd9a by task kunit_try_catch/202
[ 49.344688]
[ 49.345354] CPU: 1 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 49.346970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.347846] Call Trace:
[ 49.348197] <TASK>
[ 49.348582] dump_stack_lvl+0x4e/0x90
[ 49.349289] print_report+0xd2/0x660
[ 49.349839] ? __virt_addr_valid+0x156/0x1e0
[ 49.350515] ? kasan_addr_to_slab+0x11/0xb0
[ 49.351128] kasan_report+0xff/0x140
[ 49.351681] ? kasan_stack_oob+0xc1/0x190
[ 49.352336] ? kasan_stack_oob+0xc1/0x190
[ 49.352931] __asan_load1+0x66/0x70
[ 49.353428] kasan_stack_oob+0xc1/0x190
[ 49.353975] ? __pfx_kasan_stack_oob+0x10/0x10
[ 49.354648] ? __schedule+0x70b/0x1190
[ 49.355248] ? ktime_get_ts64+0x118/0x140
[ 49.355853] kunit_try_run_case+0x126/0x290
[ 49.356527] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.357248] ? __kasan_check_write+0x18/0x20
[ 49.357947] ? trace_preempt_on+0x20/0xa0
[ 49.358580] ? __kthread_parkme+0x4f/0xd0
[ 49.359112] ? preempt_count_sub+0x50/0x80
[ 49.359729] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.360416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.361299] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.362015] kthread+0x19e/0x1e0
[ 49.362559] ? __pfx_kthread+0x10/0x10
[ 49.363121] ret_from_fork+0x41/0x70
[ 49.363628] ? __pfx_kthread+0x10/0x10
[ 49.364248] ret_from_fork_asm+0x1b/0x30
[ 49.364930] </TASK>
[ 49.365311]
[ 49.365718] The buggy address belongs to stack of task kunit_try_catch/202
[ 49.366592] and is located at offset 138 in frame:
[ 49.367276] kasan_stack_oob+0x0/0x190
[ 49.368151]
[ 49.368506] This frame has 4 objects:
[ 49.369200] [48, 49) '__assertion'
[ 49.369347] [64, 72) 'array'
[ 49.369883] [96, 112) '__assertion'
[ 49.370386] [128, 138) 'stack_array'
[ 49.370910]
[ 49.371529] The buggy address belongs to the physical page:
[ 49.372203] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102adf
[ 49.373173] flags: 0x200000000000000(node=0|zone=2)
[ 49.373729] page_type: 0xffffffff()
[ 49.374195] raw: 0200000000000000 ffffea00040ab7c8 ffffea00040ab7c8 0000000000000000
[ 49.375138] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 49.375909] page dumped because: kasan: bad access detected
[ 49.376470]
[ 49.376800] Memory state around the buggy address:
[ 49.377268] ffff888102adfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.378104] ffff888102adfd00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[ 49.378872] >ffff888102adfd80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 f1
[ 49.379574] ^
[ 49.380119] ffff888102adfe00: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[ 49.380807] ffff888102adfe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 49.381541] ==================================================================
Home
[ 46.798370] ==================================================================
[ 46.799414] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 46.800140] Read of size 1 at addr ffff8881028d4000 by task kunit_try_catch/142
[ 46.801903]
[ 46.802149] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.803204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.804156] Call Trace:
[ 46.804508] <TASK>
[ 46.805535] dump_stack_lvl+0x4e/0x90
[ 46.806248] print_report+0xd2/0x660
[ 46.806735] ? __virt_addr_valid+0x156/0x1e0
[ 46.807430] ? kasan_addr_to_slab+0x11/0xb0
[ 46.807969] kasan_report+0xff/0x140
[ 46.808528] ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 46.809737] ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 46.810409] __asan_load1+0x66/0x70
[ 46.810960] kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 46.811586] ? __pfx_kmalloc_pagealloc_uaf+0x10/0x10
[ 46.812257] ? __schedule+0x70b/0x1190
[ 46.813497] ? ktime_get_ts64+0x118/0x140
[ 46.814020] kunit_try_run_case+0x126/0x290
[ 46.814601] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.815431] ? __kasan_check_write+0x18/0x20
[ 46.816157] ? trace_preempt_on+0x20/0xa0
[ 46.816840] ? __kthread_parkme+0x4f/0xd0
[ 46.817343] ? preempt_count_sub+0x50/0x80
[ 46.817873] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.818894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.819558] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.820329] kthread+0x19e/0x1e0
[ 46.820890] ? __pfx_kthread+0x10/0x10
[ 46.821535] ret_from_fork+0x41/0x70
[ 46.822278] ? __pfx_kthread+0x10/0x10
[ 46.822707] ret_from_fork_asm+0x1b/0x30
[ 46.823206] </TASK>
[ 46.823592]
[ 46.823890] The buggy address belongs to the physical page:
[ 46.825103] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d4
[ 46.826400] flags: 0x200000000000000(node=0|zone=2)
[ 46.826835] page_type: 0xffffffff()
[ 46.827382] raw: 0200000000000000 ffffea00040a3608 ffff88815b53c8b8 0000000000000000
[ 46.828410] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 46.829351] page dumped because: kasan: bad access detected
[ 46.830078]
[ 46.830472] Memory state around the buggy address:
[ 46.831056] ffff8881028d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.832166] ffff8881028d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.833078] >ffff8881028d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.833572] ^
[ 46.834119] ffff8881028d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.835086] ffff8881028d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.836074] ==================================================================
Home
[ 46.907463] ==================================================================
[ 46.908565] BUG: KASAN: use-after-free in pagealloc_uaf+0xe9/0x1f0
[ 46.909150] Read of size 1 at addr ffff8881029b0000 by task kunit_try_catch/148
[ 46.909690]
[ 46.910281] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 46.912300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.913264] Call Trace:
[ 46.913532] <TASK>
[ 46.914162] dump_stack_lvl+0x4e/0x90
[ 46.914912] print_report+0xd2/0x660
[ 46.915534] ? __virt_addr_valid+0x156/0x1e0
[ 46.916270] ? kasan_addr_to_slab+0x11/0xb0
[ 46.916843] kasan_report+0xff/0x140
[ 46.917598] ? pagealloc_uaf+0xe9/0x1f0
[ 46.918143] ? pagealloc_uaf+0xe9/0x1f0
[ 46.918758] __asan_load1+0x66/0x70
[ 46.919681] pagealloc_uaf+0xe9/0x1f0
[ 46.920466] ? __pfx_pagealloc_uaf+0x10/0x10
[ 46.921136] ? __schedule+0x70b/0x1190
[ 46.921705] ? ktime_get_ts64+0x118/0x140
[ 46.922401] kunit_try_run_case+0x126/0x290
[ 46.923076] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.923598] ? __kasan_check_write+0x18/0x20
[ 46.924618] ? trace_preempt_on+0x20/0xa0
[ 46.925320] ? __kthread_parkme+0x4f/0xd0
[ 46.926259] ? preempt_count_sub+0x50/0x80
[ 46.927041] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.927620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.928818] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.929668] kthread+0x19e/0x1e0
[ 46.930397] ? __pfx_kthread+0x10/0x10
[ 46.931034] ret_from_fork+0x41/0x70
[ 46.931646] ? __pfx_kthread+0x10/0x10
[ 46.932307] ret_from_fork_asm+0x1b/0x30
[ 46.933035] </TASK>
[ 46.933394]
[ 46.933921] The buggy address belongs to the physical page:
[ 46.934519] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b0
[ 46.936025] flags: 0x200000000000000(node=0|zone=2)
[ 46.936784] page_type: 0xffffff7f(buddy)
[ 46.937618] raw: 0200000000000000 ffff88817fffab60 ffff88817fffab60 0000000000000000
[ 46.938711] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[ 46.939522] page dumped because: kasan: bad access detected
[ 46.940561]
[ 46.941327] Memory state around the buggy address:
[ 46.941830] ffff8881029aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.942482] ffff8881029aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.943035] >ffff8881029b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.943928] ^
[ 46.944701] ffff8881029b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.945917] ffff8881029b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 46.947097] ==================================================================
Home
[ 53.218281] ==================================================================
[ 53.218719] BUG: KFENCE: invalid free in test_double_free+0xff/0x1d0
[ 53.218719]
[ 53.219446] Invalid free of 0x(____ptrval____) (in kfence-#161):
[ 53.220354] test_double_free+0xff/0x1d0
[ 53.221096] kunit_try_run_case+0x126/0x290
[ 53.221828] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.222763] kthread+0x19e/0x1e0
[ 53.223365] ret_from_fork+0x41/0x70
[ 53.224088] ret_from_fork_asm+0x1b/0x30
[ 53.224802]
[ 53.225151] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 53.225151]
[ 53.226073] allocated by task 263 on cpu 1 at 53.217745s:
[ 53.226861] test_alloc+0x1e8/0x8d0
[ 53.227314] test_double_free+0xd0/0x1d0
[ 53.228082] kunit_try_run_case+0x126/0x290
[ 53.228984] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.229670] kthread+0x19e/0x1e0
[ 53.230371] ret_from_fork+0x41/0x70
[ 53.230884] ret_from_fork_asm+0x1b/0x30
[ 53.231501]
[ 53.231829] freed by task 263 on cpu 1 at 53.218030s:
[ 53.232487] test_double_free+0xeb/0x1d0
[ 53.233022] kunit_try_run_case+0x126/0x290
[ 53.233544] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.234327] kthread+0x19e/0x1e0
[ 53.235138] ret_from_fork+0x41/0x70
[ 53.235835] ret_from_fork_asm+0x1b/0x30
[ 53.236562]
[ 53.237238] CPU: 1 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.238064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.239121] ==================================================================
Home
[ 53.114390] ==================================================================
[ 53.115197] BUG: KFENCE: invalid free in test_double_free+0x16a/0x1d0
[ 53.115197]
[ 53.116504] Invalid free of 0x(____ptrval____) (in kfence-#160):
[ 53.117353] test_double_free+0x16a/0x1d0
[ 53.117974] kunit_try_run_case+0x126/0x290
[ 53.118544] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.119119] kthread+0x19e/0x1e0
[ 53.119540] ret_from_fork+0x41/0x70
[ 53.120091] ret_from_fork_asm+0x1b/0x30
[ 53.120684]
[ 53.120985] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 53.120985]
[ 53.121945] allocated by task 261 on cpu 1 at 53.113680s:
[ 53.122591] test_alloc+0x2a0/0x8d0
[ 53.123149] test_double_free+0xd0/0x1d0
[ 53.123742] kunit_try_run_case+0x126/0x290
[ 53.124218] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.124958] kthread+0x19e/0x1e0
[ 53.125486] ret_from_fork+0x41/0x70
[ 53.126074] ret_from_fork_asm+0x1b/0x30
[ 53.126636]
[ 53.126940] freed by task 261 on cpu 1 at 53.113833s:
[ 53.127576] test_double_free+0x156/0x1d0
[ 53.128206] kunit_try_run_case+0x126/0x290
[ 53.128811] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.129486] kthread+0x19e/0x1e0
[ 53.130016] ret_from_fork+0x41/0x70
[ 53.130487] ret_from_fork_asm+0x1b/0x30
[ 53.131092]
[ 53.131397] CPU: 1 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.132346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.133155] ==================================================================
Home
[ 53.321976] ==================================================================
[ 53.322743] BUG: KFENCE: invalid free in test_invalid_addr_free+0x157/0x1d0
[ 53.322743]
[ 53.323575] Invalid free of 0x(____ptrval____) (in kfence-#162):
[ 53.324421] test_invalid_addr_free+0x157/0x1d0
[ 53.325163] kunit_try_run_case+0x126/0x290
[ 53.325895] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.326738] kthread+0x19e/0x1e0
[ 53.327427] ret_from_fork+0x41/0x70
[ 53.328054] ret_from_fork_asm+0x1b/0x30
[ 53.328639]
[ 53.329001] kfence-#162: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 53.329001]
[ 53.329918] allocated by task 265 on cpu 1 at 53.321665s:
[ 53.330666] test_alloc+0x2a0/0x8d0
[ 53.331301] test_invalid_addr_free+0xd0/0x1d0
[ 53.331971] kunit_try_run_case+0x126/0x290
[ 53.332621] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.333305] kthread+0x19e/0x1e0
[ 53.333817] ret_from_fork+0x41/0x70
[ 53.334421] ret_from_fork_asm+0x1b/0x30
[ 53.335000]
[ 53.335348] CPU: 1 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.336276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.337268] ==================================================================
Home
[ 53.425804] ==================================================================
[ 53.426552] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x1d0
[ 53.426552]
[ 53.427400] Invalid free of 0x(____ptrval____) (in kfence-#163):
[ 53.428113] test_invalid_addr_free+0xec/0x1d0
[ 53.428643] kunit_try_run_case+0x126/0x290
[ 53.429207] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.429960] kthread+0x19e/0x1e0
[ 53.430512] ret_from_fork+0x41/0x70
[ 53.431067] ret_from_fork_asm+0x1b/0x30
[ 53.431559]
[ 53.431868] kfence-#163: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 53.431868]
[ 53.432721] allocated by task 267 on cpu 0 at 53.425544s:
[ 53.433485] test_alloc+0x1e8/0x8d0
[ 53.433912] test_invalid_addr_free+0xd0/0x1d0
[ 53.434966] kunit_try_run_case+0x126/0x290
[ 53.435796] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.436387] kthread+0x19e/0x1e0
[ 53.437191] ret_from_fork+0x41/0x70
[ 53.437861] ret_from_fork_asm+0x1b/0x30
[ 53.438391]
[ 53.438707] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.439537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.440516] ==================================================================
Home
[ 58.123600] ==================================================================
[ 58.124710] BUG: KFENCE: invalid read in test_invalid_access+0xba/0x150
[ 58.124710]
[ 58.125660] Invalid read at 0x(____ptrval____):
[ 58.126575] test_invalid_access+0xba/0x150
[ 58.127696] kunit_try_run_case+0x126/0x290
[ 58.128338] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 58.129031] kthread+0x19e/0x1e0
[ 58.129490] ret_from_fork+0x41/0x70
[ 58.130091] ret_from_fork_asm+0x1b/0x30
[ 58.130628]
[ 58.131069] CPU: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 58.132083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 58.133020] ==================================================================
Home
[ 53.634356] ==================================================================
[ 53.635207] BUG: KFENCE: memory corruption in test_corruption+0x1c0/0x280
[ 53.635207]
[ 53.635907] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#165):
[ 53.638006] test_corruption+0x1c0/0x280
[ 53.638760] kunit_try_run_case+0x126/0x290
[ 53.639521] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.640374] kthread+0x19e/0x1e0
[ 53.641058] ret_from_fork+0x41/0x70
[ 53.641758] ret_from_fork_asm+0x1b/0x30
[ 53.642487]
[ 53.642763] kfence-#165: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 53.642763]
[ 53.643556] allocated by task 269 on cpu 1 at 53.633771s:
[ 53.644440] test_alloc+0x2a0/0x8d0
[ 53.644963] test_corruption+0xdb/0x280
[ 53.645461] kunit_try_run_case+0x126/0x290
[ 53.646169] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.646928] kthread+0x19e/0x1e0
[ 53.647454] ret_from_fork+0x41/0x70
[ 53.648032] ret_from_fork_asm+0x1b/0x30
[ 53.648522]
[ 53.648845] freed by task 269 on cpu 1 at 53.633926s:
[ 53.649602] test_corruption+0x1c0/0x280
[ 53.650223] kunit_try_run_case+0x126/0x290
[ 53.650702] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.651363] kthread+0x19e/0x1e0
[ 53.651809] ret_from_fork+0x41/0x70
[ 53.652367] ret_from_fork_asm+0x1b/0x30
[ 53.652808]
[ 53.653174] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.654204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.655207] ==================================================================
Home
[ 54.050110] ==================================================================
[ 54.050847] BUG: KFENCE: memory corruption in test_corruption+0x160/0x280
[ 54.050847]
[ 54.051545] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#169):
[ 54.052595] test_corruption+0x160/0x280
[ 54.053276] kunit_try_run_case+0x126/0x290
[ 54.053851] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 54.054547] kthread+0x19e/0x1e0
[ 54.055294] ret_from_fork+0x41/0x70
[ 54.056274] ret_from_fork_asm+0x1b/0x30
[ 54.056816]
[ 54.057245] kfence-#169: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 54.057245]
[ 54.058532] allocated by task 271 on cpu 0 at 54.049661s:
[ 54.059354] test_alloc+0x1e8/0x8d0
[ 54.059809] test_corruption+0x133/0x280
[ 54.060338] kunit_try_run_case+0x126/0x290
[ 54.061137] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 54.061803] kthread+0x19e/0x1e0
[ 54.062222] ret_from_fork+0x41/0x70
[ 54.062770] ret_from_fork_asm+0x1b/0x30
[ 54.063382]
[ 54.063676] freed by task 271 on cpu 0 at 54.049833s:
[ 54.064443] test_corruption+0x160/0x280
[ 54.065157] kunit_try_run_case+0x126/0x290
[ 54.065629] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 54.066643] kthread+0x19e/0x1e0
[ 54.067218] ret_from_fork+0x41/0x70
[ 54.067695] ret_from_fork_asm+0x1b/0x30
[ 54.068413]
[ 54.068759] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 54.069588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 54.070388] ==================================================================
Home
[ 53.946180] ==================================================================
[ 53.946928] BUG: KFENCE: memory corruption in test_corruption+0x10c/0x280
[ 53.946928]
[ 53.947677] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#168):
[ 53.949304] test_corruption+0x10c/0x280
[ 53.950207] kunit_try_run_case+0x126/0x290
[ 53.950745] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.951577] kthread+0x19e/0x1e0
[ 53.952188] ret_from_fork+0x41/0x70
[ 53.952835] ret_from_fork_asm+0x1b/0x30
[ 53.953383]
[ 53.953687] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 53.953687]
[ 53.954621] allocated by task 271 on cpu 0 at 53.945716s:
[ 53.955276] test_alloc+0x1e8/0x8d0
[ 53.955878] test_corruption+0xdb/0x280
[ 53.956501] kunit_try_run_case+0x126/0x290
[ 53.957178] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.957854] kthread+0x19e/0x1e0
[ 53.958429] ret_from_fork+0x41/0x70
[ 53.958967] ret_from_fork_asm+0x1b/0x30
[ 53.959452]
[ 53.959811] freed by task 271 on cpu 0 at 53.946007s:
[ 53.960590] test_corruption+0x10c/0x280
[ 53.961232] kunit_try_run_case+0x126/0x290
[ 53.961828] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.962544] kthread+0x19e/0x1e0
[ 53.963078] ret_from_fork+0x41/0x70
[ 53.963635] ret_from_fork_asm+0x1b/0x30
[ 53.964306]
[ 53.964582] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.965359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.966251] ==================================================================
Home
[ 53.738339] ==================================================================
[ 53.739153] BUG: KFENCE: memory corruption in test_corruption+0x20f/0x280
[ 53.739153]
[ 53.739887] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#166):
[ 53.740939] test_corruption+0x20f/0x280
[ 53.741648] kunit_try_run_case+0x126/0x290
[ 53.742373] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.743088] kthread+0x19e/0x1e0
[ 53.744187] ret_from_fork+0x41/0x70
[ 53.744916] ret_from_fork_asm+0x1b/0x30
[ 53.745486]
[ 53.746039] kfence-#166: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 53.746039]
[ 53.747167] allocated by task 269 on cpu 1 at 53.737773s:
[ 53.748259] test_alloc+0x2a0/0x8d0
[ 53.748725] test_corruption+0x133/0x280
[ 53.749240] kunit_try_run_case+0x126/0x290
[ 53.749734] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.750839] kthread+0x19e/0x1e0
[ 53.751512] ret_from_fork+0x41/0x70
[ 53.752234] ret_from_fork_asm+0x1b/0x30
[ 53.753250]
[ 53.753463] freed by task 269 on cpu 1 at 53.738037s:
[ 53.754252] test_corruption+0x20f/0x280
[ 53.754725] kunit_try_run_case+0x126/0x290
[ 53.755568] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.756431] kthread+0x19e/0x1e0
[ 53.757131] ret_from_fork+0x41/0x70
[ 53.757818] ret_from_fork_asm+0x1b/0x30
[ 53.758558]
[ 53.759132] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.760120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.761220] ==================================================================
Home
[ 57.898258] ==================================================================
[ 57.898932] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x158/0x1f0
[ 57.898932]
[ 57.899815] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . ] (in kfence-#206):
[ 57.901297] test_kmalloc_aligned_oob_write+0x158/0x1f0
[ 57.902059] kunit_try_run_case+0x126/0x290
[ 57.902737] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 57.903472] kthread+0x19e/0x1e0
[ 57.903944] ret_from_fork+0x41/0x70
[ 57.904475] ret_from_fork_asm+0x1b/0x30
[ 57.905126]
[ 57.905431] kfence-#206: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[ 57.905431]
[ 57.906332] allocated by task 283 on cpu 0 at 57.897683s:
[ 57.907141] test_alloc+0x2a0/0x8d0
[ 57.907754] test_kmalloc_aligned_oob_write+0xc0/0x1f0
[ 57.908506] kunit_try_run_case+0x126/0x290
[ 57.909128] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 57.909864] kthread+0x19e/0x1e0
[ 57.910406] ret_from_fork+0x41/0x70
[ 57.911016] ret_from_fork_asm+0x1b/0x30
[ 57.911641]
[ 57.912007] freed by task 283 on cpu 0 at 57.897976s:
[ 57.912774] test_kmalloc_aligned_oob_write+0x158/0x1f0
[ 57.913589] kunit_try_run_case+0x126/0x290
[ 57.914269] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 57.914970] kthread+0x19e/0x1e0
[ 57.915532] ret_from_fork+0x41/0x70
[ 57.916143] ret_from_fork_asm+0x1b/0x30
[ 57.916700]
[ 57.917051] CPU: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 57.917974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 57.918821] ==================================================================
Home
[ 57.689854] ==================================================================
[ 57.690601] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x12a/0x250
[ 57.690601]
[ 57.691914] Out-of-bounds read at 0x(____ptrval____) (81B right of kfence-#204):
[ 57.692677] test_kmalloc_aligned_oob_read+0x12a/0x250
[ 57.693322] kunit_try_run_case+0x126/0x290
[ 57.693668] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 57.694285] kthread+0x19e/0x1e0
[ 57.695021] ret_from_fork+0x41/0x70
[ 57.695728] ret_from_fork_asm+0x1b/0x30
[ 57.696547]
[ 57.696771] kfence-#204: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[ 57.696771]
[ 57.698168] allocated by task 281 on cpu 0 at 57.689620s:
[ 57.699002] test_alloc+0x2a0/0x8d0
[ 57.699595] test_kmalloc_aligned_oob_read+0xda/0x250
[ 57.700535] kunit_try_run_case+0x126/0x290
[ 57.701247] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 57.701567] kthread+0x19e/0x1e0
[ 57.701867] ret_from_fork+0x41/0x70
[ 57.702316] ret_from_fork_asm+0x1b/0x30
[ 57.702893]
[ 57.703259] CPU: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 57.704070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 57.705149] ==================================================================
Home
[ 52.282080] ==================================================================
[ 52.282936] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[ 52.282936]
[ 52.284563] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#152):
[ 52.285365] test_out_of_bounds_read+0x151/0x290
[ 52.285838] kunit_try_run_case+0x126/0x290
[ 52.286295] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.286758] kthread+0x19e/0x1e0
[ 52.288681] ret_from_fork+0x41/0x70
[ 52.289216] ret_from_fork_asm+0x1b/0x30
[ 52.289638]
[ 52.289850] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 52.289850]
[ 52.292041] allocated by task 249 on cpu 1 at 52.281800s:
[ 52.292623] test_alloc+0x2a0/0x8d0
[ 52.293019] test_out_of_bounds_read+0x138/0x290
[ 52.293597] kunit_try_run_case+0x126/0x290
[ 52.294177] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.295049] kthread+0x19e/0x1e0
[ 52.295645] ret_from_fork+0x41/0x70
[ 52.296341] ret_from_fork_asm+0x1b/0x30
[ 52.297023]
[ 52.297387] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.298327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.299539] ==================================================================
Home
[ 52.178219] ==================================================================
[ 52.179111] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[ 52.179111]
[ 52.180222] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#151):
[ 52.181252] test_out_of_bounds_read+0xeb/0x290
[ 52.181979] kunit_try_run_case+0x126/0x290
[ 52.182561] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.183405] kthread+0x19e/0x1e0
[ 52.184018] ret_from_fork+0x41/0x70
[ 52.184596] ret_from_fork_asm+0x1b/0x30
[ 52.185209]
[ 52.185518] kfence-#151: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 52.185518]
[ 52.186475] allocated by task 249 on cpu 1 at 52.177754s:
[ 52.187358] test_alloc+0x2a0/0x8d0
[ 52.187875] test_out_of_bounds_read+0xdb/0x290
[ 52.188605] kunit_try_run_case+0x126/0x290
[ 52.189283] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.189904] kthread+0x19e/0x1e0
[ 52.190492] ret_from_fork+0x41/0x70
[ 52.191117] ret_from_fork_asm+0x1b/0x30
[ 52.191759]
[ 52.192136] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.193098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.194095] ==================================================================
Home
[ 52.489896] ==================================================================
[ 52.490695] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[ 52.490695]
[ 52.491621] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#154):
[ 52.492380] test_out_of_bounds_read+0x151/0x290
[ 52.492882] kunit_try_run_case+0x126/0x290
[ 52.493357] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.493883] kthread+0x19e/0x1e0
[ 52.494491] ret_from_fork+0x41/0x70
[ 52.495139] ret_from_fork_asm+0x1b/0x30
[ 52.495789]
[ 52.496137] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 52.496137]
[ 52.497240] allocated by task 251 on cpu 1 at 52.489811s:
[ 52.498037] test_alloc+0x1e8/0x8d0
[ 52.498600] test_out_of_bounds_read+0x138/0x290
[ 52.499318] kunit_try_run_case+0x126/0x290
[ 52.500088] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.500711] kthread+0x19e/0x1e0
[ 52.501156] ret_from_fork+0x41/0x70
[ 52.501613] ret_from_fork_asm+0x1b/0x30
[ 52.502164]
[ 52.502423] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.503669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.504589] ==================================================================
Home
[ 52.385890] ==================================================================
[ 52.386701] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[ 52.386701]
[ 52.387616] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#153):
[ 52.388384] test_out_of_bounds_read+0xeb/0x290
[ 52.388852] kunit_try_run_case+0x126/0x290
[ 52.389301] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.389821] kthread+0x19e/0x1e0
[ 52.390414] ret_from_fork+0x41/0x70
[ 52.391065] ret_from_fork_asm+0x1b/0x30
[ 52.391689]
[ 52.392065] kfence-#153: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 52.392065]
[ 52.393175] allocated by task 251 on cpu 1 at 52.385791s:
[ 52.394082] test_alloc+0x1e8/0x8d0
[ 52.394644] test_out_of_bounds_read+0xdb/0x290
[ 52.395201] kunit_try_run_case+0x126/0x290
[ 52.395845] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.396479] kthread+0x19e/0x1e0
[ 52.397064] ret_from_fork+0x41/0x70
[ 52.397570] ret_from_fork_asm+0x1b/0x30
[ 52.398207]
[ 52.398527] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.399369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.400244] ==================================================================
Home
[ 52.801803] ==================================================================
[ 52.802550] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[ 52.802550]
[ 52.803427] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#157):
[ 52.804382] test_out_of_bounds_write+0xd9/0x1a0
[ 52.805531] kunit_try_run_case+0x126/0x290
[ 52.806106] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.807169] kthread+0x19e/0x1e0
[ 52.807830] ret_from_fork+0x41/0x70
[ 52.808533] ret_from_fork_asm+0x1b/0x30
[ 52.809367]
[ 52.809826] kfence-#157: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 52.809826]
[ 52.810687] allocated by task 255 on cpu 0 at 52.801672s:
[ 52.811416] test_alloc+0x1e8/0x8d0
[ 52.812016] test_out_of_bounds_write+0xc9/0x1a0
[ 52.812630] kunit_try_run_case+0x126/0x290
[ 52.813216] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.813855] kthread+0x19e/0x1e0
[ 52.814388] ret_from_fork+0x41/0x70
[ 52.815003] ret_from_fork_asm+0x1b/0x30
[ 52.815474]
[ 52.815795] CPU: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.816710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.817535] ==================================================================
Home
[ 52.593858] ==================================================================
[ 52.594605] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[ 52.594605]
[ 52.595452] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#155):
[ 52.595854] test_out_of_bounds_write+0xd9/0x1a0
[ 52.596639] kunit_try_run_case+0x126/0x290
[ 52.597362] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.598229] kthread+0x19e/0x1e0
[ 52.598854] ret_from_fork+0x41/0x70
[ 52.599505] ret_from_fork_asm+0x1b/0x30
[ 52.600209]
[ 52.600567] kfence-#155: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 52.600567]
[ 52.601677] allocated by task 253 on cpu 0 at 52.593660s:
[ 52.602327] test_alloc+0x2a0/0x8d0
[ 52.602805] test_out_of_bounds_write+0xc9/0x1a0
[ 52.603812] kunit_try_run_case+0x126/0x290
[ 52.604393] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.605033] kthread+0x19e/0x1e0
[ 52.605517] ret_from_fork+0x41/0x70
[ 52.606282] ret_from_fork_asm+0x1b/0x30
[ 52.606779]
[ 52.607399] CPU: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.608323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.609357] ==================================================================
Home
[ 78.802544] ==================================================================
[ 78.803452] BUG: KFENCE: use-after-free read in test_krealloc+0x2e9/0x530
[ 78.803452]
[ 78.804205] Use-after-free read at 0x(____ptrval____) (in kfence-#211):
[ 78.805014] test_krealloc+0x2e9/0x530
[ 78.805574] kunit_try_run_case+0x126/0x290
[ 78.806112] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.806833] kthread+0x19e/0x1e0
[ 78.807304] ret_from_fork+0x41/0x70
[ 78.807873] ret_from_fork_asm+0x1b/0x30
[ 78.808438]
[ 78.808727] kfence-#211: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 78.808727]
[ 78.809715] allocated by task 295 on cpu 0 at 78.801721s:
[ 78.810488] test_alloc+0x2a0/0x8d0
[ 78.811029] test_krealloc+0xb1/0x530
[ 78.811593] kunit_try_run_case+0x126/0x290
[ 78.812236] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.812864] kthread+0x19e/0x1e0
[ 78.813382] ret_from_fork+0x41/0x70
[ 78.814014] ret_from_fork_asm+0x1b/0x30
[ 78.814541]
[ 78.814768] freed by task 295 on cpu 0 at 78.802203s:
[ 78.815371] krealloc+0x83/0x140
[ 78.815858] test_krealloc+0x137/0x530
[ 78.816467] kunit_try_run_case+0x126/0x290
[ 78.817114] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.817878] kthread+0x19e/0x1e0
[ 78.818408] ret_from_fork+0x41/0x70
[ 78.818966] ret_from_fork_asm+0x1b/0x30
[ 78.819416]
[ 78.819663] CPU: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 78.820602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 78.821537] ==================================================================
Home
[ 78.703364] ==================================================================
[ 78.704123] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x14f/0x370
[ 78.704123]
[ 78.705266] Use-after-free read at 0x(____ptrval____) (in kfence-#210):
[ 78.706023] test_memcache_typesafe_by_rcu+0x14f/0x370
[ 78.706787] kunit_try_run_case+0x126/0x290
[ 78.707413] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.708181] kthread+0x19e/0x1e0
[ 78.708591] ret_from_fork+0x41/0x70
[ 78.709105] ret_from_fork_asm+0x1b/0x30
[ 78.709686]
[ 78.710053] kfence-#210: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 78.710053]
[ 78.710813] allocated by task 293 on cpu 0 at 78.697781s:
[ 78.711383] test_alloc+0x1e8/0x8d0
[ 78.711953] test_memcache_typesafe_by_rcu+0xec/0x370
[ 78.712642] kunit_try_run_case+0x126/0x290
[ 78.713294] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.714103] kthread+0x19e/0x1e0
[ 78.714520] ret_from_fork+0x41/0x70
[ 78.715131] ret_from_fork_asm+0x1b/0x30
[ 78.715700]
[ 78.715968] freed by task 0 on cpu 0 at 78.703051s:
[ 78.717138] rcu_guarded_free+0x2e/0x40
[ 78.717696] rcu_core+0x4be/0x1020
[ 78.718257] rcu_core_si+0x12/0x20
[ 78.718787] handle_softirqs+0x195/0x520
[ 78.719365] irq_exit_rcu+0x92/0xb0
[ 78.719861] sysvec_apic_timer_interrupt+0x80/0xa0
[ 78.720533] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 78.721231] default_idle+0xf/0x20
[ 78.721701] default_idle_call+0x42/0x70
[ 78.722270] do_idle+0x2ba/0x310
[ 78.722717] cpu_startup_entry+0x3c/0x40
[ 78.723339] rest_init+0xe9/0xf0
[ 78.723872] arch_call_rest_init+0x17/0x50
[ 78.724333] start_kernel+0x2e3/0x3c0
[ 78.724920] x86_64_start_reservations+0x1c/0x30
[ 78.725548] x86_64_start_kernel+0xcf/0xe0
[ 78.726131] secondary_startup_64_no_verify+0x178/0x17b
[ 78.726847]
[ 78.727190] CPU: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 78.728065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 78.728945] ==================================================================
Home
[ 52.906601] ==================================================================
[ 52.907335] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[ 52.907335]
[ 52.908189] Use-after-free read at 0x(____ptrval____) (in kfence-#158):
[ 52.909567] test_use_after_free_read+0xf7/0x1a0
[ 52.910068] kunit_try_run_case+0x126/0x290
[ 52.910731] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.911626] kthread+0x19e/0x1e0
[ 52.912324] ret_from_fork+0x41/0x70
[ 52.913241] ret_from_fork_asm+0x1b/0x30
[ 52.913710]
[ 52.914065] kfence-#158: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 52.914065]
[ 52.915098] allocated by task 257 on cpu 1 at 52.906315s:
[ 52.915870] test_alloc+0x2a0/0x8d0
[ 52.916386] test_use_after_free_read+0xd0/0x1a0
[ 52.917393] kunit_try_run_case+0x126/0x290
[ 52.918064] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.919233] kthread+0x19e/0x1e0
[ 52.919658] ret_from_fork+0x41/0x70
[ 52.920149] ret_from_fork_asm+0x1b/0x30
[ 52.920622]
[ 52.920893] freed by task 257 on cpu 1 at 52.906449s:
[ 52.922047] test_use_after_free_read+0x14b/0x1a0
[ 52.922604] kunit_try_run_case+0x126/0x290
[ 52.923299] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 52.924068] kthread+0x19e/0x1e0
[ 52.924649] ret_from_fork+0x41/0x70
[ 52.925269] ret_from_fork_asm+0x1b/0x30
[ 52.925741]
[ 52.926232] CPU: 1 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 52.927134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.928148] ==================================================================
Home
[ 53.010035] ==================================================================
[ 53.010763] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[ 53.010763]
[ 53.011542] Use-after-free read at 0x(____ptrval____) (in kfence-#159):
[ 53.012312] test_use_after_free_read+0xf7/0x1a0
[ 53.012985] kunit_try_run_case+0x126/0x290
[ 53.013645] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.014402] kthread+0x19e/0x1e0
[ 53.014893] ret_from_fork+0x41/0x70
[ 53.015405] ret_from_fork_asm+0x1b/0x30
[ 53.016031]
[ 53.016340] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 53.016340]
[ 53.017845] allocated by task 259 on cpu 0 at 53.009613s:
[ 53.018594] test_alloc+0x1e8/0x8d0
[ 53.019172] test_use_after_free_read+0xd0/0x1a0
[ 53.019675] kunit_try_run_case+0x126/0x290
[ 53.020325] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.020914] kthread+0x19e/0x1e0
[ 53.021463] ret_from_fork+0x41/0x70
[ 53.022030] ret_from_fork_asm+0x1b/0x30
[ 53.022480]
[ 53.022772] freed by task 259 on cpu 0 at 53.009738s:
[ 53.023625] test_use_after_free_read+0xeb/0x1a0
[ 53.024280] kunit_try_run_case+0x126/0x290
[ 53.024812] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 53.025536] kthread+0x19e/0x1e0
[ 53.025935] ret_from_fork+0x41/0x70
[ 53.026535] ret_from_fork_asm+0x1b/0x30
[ 53.027162]
[ 53.027483] CPU: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 53.028380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 53.029358] ==================================================================
Home
[ 51.871540] ==================================================================
[ 51.872640] BUG: KFENCE: use-after-free read in workqueue_uaf+0x166/0x2a0
[ 51.872640]
[ 51.874234] Use-after-free read at 0x(____ptrval____) (in kfence-#148):
[ 51.875810] workqueue_uaf+0x166/0x2a0
[ 51.876384] kunit_try_run_case+0x126/0x290
[ 51.876949] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.877818] kthread+0x19e/0x1e0
[ 51.878359] ret_from_fork+0x41/0x70
[ 51.878930] ret_from_fork_asm+0x1b/0x30
[ 51.880220]
[ 51.880666] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 51.880666]
[ 51.881958] allocated by task 232 on cpu 1 at 51.866383s:
[ 51.883678] __kmem_cache_alloc_node+0x329/0x380
[ 51.884560] kmalloc_trace+0x2e/0xb0
[ 51.885141] workqueue_uaf+0xdb/0x2a0
[ 51.885607] kunit_try_run_case+0x126/0x290
[ 51.886236] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.887952] kthread+0x19e/0x1e0
[ 51.888388] ret_from_fork+0x41/0x70
[ 51.889197] ret_from_fork_asm+0x1b/0x30
[ 51.889871]
[ 51.890268] freed by task 23 on cpu 1 at 51.867646s:
[ 51.892054] workqueue_uaf_work+0x12/0x20
[ 51.892563] process_one_work+0x2fb/0x640
[ 51.893386] worker_thread+0x521/0x780
[ 51.894293] kthread+0x19e/0x1e0
[ 51.894952] ret_from_fork+0x41/0x70
[ 51.896005] ret_from_fork_asm+0x1b/0x30
[ 51.896482]
[ 51.896879] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.897947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.899139] ==================================================================
Home
[ 51.871540] ==================================================================
[ 51.872640] BUG: KFENCE: use-after-free read in workqueue_uaf+0x166/0x2a0
[ 51.872640]
[ 51.874234] Use-after-free read at 0x(____ptrval____) (in kfence-#148):
[ 51.875810] workqueue_uaf+0x166/0x2a0
[ 51.876384] kunit_try_run_case+0x126/0x290
[ 51.876949] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.877818] kthread+0x19e/0x1e0
[ 51.878359] ret_from_fork+0x41/0x70
[ 51.878930] ret_from_fork_asm+0x1b/0x30
[ 51.880220]
[ 51.880666] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 51.880666]
[ 51.881958] allocated by task 232 on cpu 1 at 51.866383s:
[ 51.883678] __kmem_cache_alloc_node+0x329/0x380
[ 51.884560] kmalloc_trace+0x2e/0xb0
[ 51.885141] workqueue_uaf+0xdb/0x2a0
[ 51.885607] kunit_try_run_case+0x126/0x290
[ 51.886236] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.887952] kthread+0x19e/0x1e0
[ 51.888388] ret_from_fork+0x41/0x70
[ 51.889197] ret_from_fork_asm+0x1b/0x30
[ 51.889871]
[ 51.890268] freed by task 23 on cpu 1 at 51.867646s:
[ 51.892054] workqueue_uaf_work+0x12/0x20
[ 51.892563] process_one_work+0x2fb/0x640
[ 51.893386] worker_thread+0x521/0x780
[ 51.894293] kthread+0x19e/0x1e0
[ 51.894952] ret_from_fork+0x41/0x70
[ 51.896005] ret_from_fork_asm+0x1b/0x30
[ 51.896482]
[ 51.896879] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.6.72-rc1 #1
[ 51.897947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.899139] ==================================================================
Home
------------[ cut here ]------------
[ 52.003022] WARNING: CPU: 0 PID: 477 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 52.004124] Modules linked in:
[ 52.004680] CPU: 0 PID: 477 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[ 52.004997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.006027] RIP: 0010:kvmalloc_node+0xd1/0xe0
[ 52.007363] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[ 52.009372] RSP: 0018:ffffa8d7005ffe00 EFLAGS: 00010246
[ 52.010200] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 52.010976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[ 52.011638] RBP: ffffa8d7005ffe18 R08: 0000000000000040 R09: 0000000000000000
[ 52.012343] R10: 0000000000000038 R11: ffff9c57c2251c00 R12: 0000000200002000
[ 52.012751] R13: 00000000ffffffff R14: ffff9c57c01c53c0 R15: ffff9c57c01c5340
[ 52.013247] FS: 00007f3e363d0740(0000) GS:ffff9c583bc00000(0000) knlGS:0000000000000000
[ 52.015028] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 52.015246] CR2: 00007f3e36574680 CR3: 00000001022d2000 CR4: 00000000000006f0
[ 52.016044] Call Trace:
[ 52.017601] <TASK>
[ 52.019127] ? show_regs+0x64/0x70
[ 52.019555] ? __warn+0x88/0x150
[ 52.019909] ? kvmalloc_node+0xd1/0xe0
[ 52.020073] ? report_bug+0x171/0x1a0
[ 52.020227] ? handle_bug+0x5b/0x90
[ 52.020513] ? exc_invalid_op+0x1c/0x70
[ 52.020939] ? asm_exc_invalid_op+0x1f/0x30
[ 52.021754] ? kvmalloc_node+0xd1/0xe0
[ 52.022632] alloc_fdtable+0x74/0x100
[ 52.023574] expand_files+0x62/0x300
[ 52.023874] ? do_prlimit+0x132/0x210
[ 52.024394] ksys_dup3+0x70/0x110
[ 52.025206] __x64_sys_dup2+0x2a/0xa0
[ 52.025505] x64_sys_call+0x1b43/0x1c90
[ 52.025688] do_syscall_64+0x39/0x90
[ 52.025891] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 52.027442] RIP: 0033:0x7f3e364c8c17
[ 52.028827] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 52.030502] RSP: 002b:00007fffa544bd18 EFLAGS: 00000206 ORIG_RAX: 0000000000000021
[ 52.031306] RAX: ffffffffffffffda RBX: 00007fffa544c578 RCX: 00007f3e364c8c17
[ 52.032540] RDX: 00007fffa544bd40 RSI: 0000000040000038 RDI: 0000000000000002
[ 52.033239] RBP: 00007fffa544bf40 R08: 0000000000000064 R09: 0000000000000000
[ 52.033570] R10: 00007f3e363e5170 R11: 0000000000000206 R12: 0000000000000000
[ 52.033774] R13: 00007fffa544c588 R14: 00007f3e365fe000 R15: 00005636bbb48dd8
[ 52.034080] </TASK>
[ 52.034580] ---[ end trace 0000000000000000 ]---