Build

Regressions (compared to v6.6.69-223-g5652330123c6)

dragonboard-410c, perf

dragonboard-845c-compat, ltp-fs

dragonboard-845c, perf

e850-96, boot

e850-96, kselftest-ftrace

e850-96, perf

fvp-aemva, perf

qemu-arm64, boot

qemu-arm64, perf

qemu-armv7, ltp-sched

qemu-armv7, boot

qemu-armv7, ltp-sched

qemu-i386, kselftest-seccomp

qemu-x86_64-compat, ltp-sched

qemu-x86_64-compat, ltp-cve

qemu-x86_64-compat, ltp-syscalls

qemu-x86_64, perf

Fixes (compared to v6.6.69-223-g5652330123c6)

arm64, build

fvp-aemva, kselftest-exec

qemu-arm64-compat, ltp-fs

qemu-arm64, boot

qemu-arm64, ltp-fs

qemu-arm64, boot

qemu-armv7, ltp-fs

qemu-armv7, kselftest-seccomp

qemu-armv7, ltp-fs

qemu-i386, kselftest-net-mptcp

qemu-i386, perf

qemu-i386, ltp-hugetlb

qemu-x86_64-compat, ltp-fs

qemu-x86_64, ltp-sched

qemu-x86_64, kselftest-seccomp

qemu-x86_64, ltp-sched

Build Parser (compared to v6.6.69-223-g5652330123c6)

i386, log-parser-build-clang

i386, log-parser-build-gcc

mips, log-parser-build-clang

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.6.69-223-g5652330123c6)

dragonboard-845c, log-parser-boot

qemu-arm64, log-parser-boot

qemu-i386, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.6.69-223-g5652330123c6)

dragonboard-410c-compat, log-parser-test

dragonboard-410c, log-parser-test

dragonboard-845c-compat, log-parser-test

dragonboard-845c, log-parser-test

e850-96, log-parser-test

fvp-aemva, log-parser-test

qemu-arm64-compat, log-parser-test

qemu-arm64, log-parser-test

qemu-armv7, log-parser-test

qemu-i386, log-parser-test

qemu-riscv64, log-parser-test

qemu-x86_64-compat, log-parser-test

qemu-x86_64, log-parser-test

Test log snippets

test log snippet regressions 1

Home

perf_record_test fail

test log snippet regressions 2

Home

perf_report_test fail

test log snippet regressions 3

Home

fs_fill fs_fill

test log snippet regressions 4

Home

perf_record_test fail

test log snippet regressions 5

Home

perf_report_test fail

test log snippet regressions 6

Home

None

test log snippet regressions 7

Home

ftrace_ftracetest-ktap_ftrace__function_pid_filters fail

test log snippet regressions 8

Home

perf_record_test fail

test log snippet regressions 9

Home

perf_report_test fail

test log snippet regressions 10

Home

perf_record_test fail

test log snippet regressions 11

Home

perf_report_test fail

test log snippet regressions 12

Home

None

test log snippet regressions 13

Home

perf_record_test fail

test log snippet regressions 14

Home

perf_report_test fail

test log snippet regressions 15

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 265130us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 16

Home

None

test log snippet regressions 17

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 261201us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 18

Home

seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail

test log snippet regressions 19

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 263958us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 20

Home

cve-2017-5754 meltdown

test log snippet regressions 21

Home

epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 3115us with a timeout equal to zero

test log snippet regressions 22

Home

perf_record_test fail

test log snippet regressions 23

Home

perf_report_test fail

test log snippet build parser 1

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-713018.o: warning: relocation in read-only section `.text'

test log snippet build parser 2

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-3f6c93.o: warning: relocation in read-only section `.text'

test log snippet build parser 3

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-1c9a53.o: warning: relocation in read-only section `.text'

test log snippet build parser 4

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-c24a1a.o: warning: relocation in read-only section `.text'

test log snippet build parser 5

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccGkOaBq.o: warning: relocation in read-only section `.text'

test log snippet build parser 6

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cciMK30P.o: warning: relocation in read-only section `.text'

test log snippet build parser 7

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccj5LAGW.o: warning: relocation in read-only section `.text'

test log snippet build parser 8

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccoDn8dL.o: warning: relocation in read-only section `.text'

test log snippet build parser 9

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cctOsfM4.o: warning: relocation in read-only section `.text'

test log snippet build parser 10

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccT4R1Vh.o: warning: relocation in read-only section `.text'

test log snippet build parser 11

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccwpmCSn.o: warning: relocation in read-only section `.text'

test log snippet build parser 12

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cczLrXFW.o: warning: relocation in read-only section `.text'

test log snippet build parser 13

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccHWkk7f.o: warning: relocation in read-only section `.text'

test log snippet build parser 14

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccnr0PAx.o: warning: relocation in read-only section `.text'

test log snippet build parser 15

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccOfykyv.o: warning: relocation in read-only section `.text'

test log snippet build parser 16

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccQ9ioPE.o: warning: relocation in read-only section `.text'

test log snippet build parser 17

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccTyP51n.o: warning: relocation in read-only section `.text'

test log snippet build parser 18

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cculNzR1.o: warning: relocation in read-only section `.text'

test log snippet build parser 19

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccXGwcQB.o: warning: relocation in read-only section `.text'

test log snippet build parser 20

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cczR61kf.o: warning: relocation in read-only section `.text'

test log snippet build parser 21

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=mips CROSS_COMPILE=mips-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1
/builds/linux/fs/overlayfs/copy_up.c:1117:12: error: stack frame size (1040) exceeds limit (1024) in 'ovl_copy_up_flags' [-Werror,-Wframe-larger-than]
 1117 | static int ovl_copy_up_flags(struct dentry *dentry, int flags)
      |            ^

test log snippet build parser 22

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccXvJPIe.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 23

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccgmsGsf.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet boot parser 1

Home

------------[ cut here ]------------
[    4.387444] sd 0:0:0:1: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA
[    4.387454] sd 0:0:0:1: [sdb] Preferred minimum I/O size 786432 bytes
[    4.387459] sd 0:0:0:1: [sdb] Optimal transfer size 786432 bytes
[    4.390720]  sdb: sdb1 sdb2
[    4.395127] WARNING: CPU: 6 PID: 411 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[    4.395141] Modules linked in:
[    4.404619] sd 0:0:0:1: [sdb] Attached SCSI disk
[    4.410208]  rtc_pm8xxx qcom_vadc_common qcom_pon qcom_stats soundwire_bus ecc i2c_qcom_geni reset_qcom_pdc camcc_sdm845 drm_display_helper coresight_stm mc spi_geni_qcom gpi qcom_rng stm_core phy_qcom_qmp_combo phy_qcom_qmp_usb coresight_replicator
[    4.418824] pci 0000:00:00.0: BAR 14: assigned [mem 0x60300000-0x603fffff]
[    4.419094]  coresight_funnel typec
[    4.427517] pci 0000:00:00.0: BAR 0: assigned [mem 0x60400000-0x60400fff]
[    4.430584]  coresight_tmc
[    4.435236] pci 0000:01:00.0: BAR 0: assigned [mem 0x60300000-0x60301fff 64bit]
[    4.457433]  cfg80211 qcom_q6v5_mss phy_qcom_qusb2
[    4.464414] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    4.467863]  qrtr rfkill phy_qcom_qmp_ufs
[    4.474704] pci 0000:00:00.0:   bridge window [mem 0x60300000-0x603fffff]
[    4.477426]  coresight qcrypto authenc
[    4.484793] pci_bus 0000:00: resource 4 [io  0x0000-0xfffff]
[    4.489615]  libdes ufs_qcom phy_qcom_qmp_pcie
[    4.494877] pci_bus 0000:00: resource 5 [mem 0x60300000-0x60ffffff]
[    4.498909]  icc_osm_l3 qcom_q6v5_pas lmh qcom_wdt
[    4.505748] pci_bus 0000:01: resource 1 [mem 0x60300000-0x603fffff]
[    4.509522]  qcom_pil_info qcom_q6v5 slim_qcom_ngd_ctrl
[    4.515362] pcieport 0000:00:00.0: Adding to iommu group 9
[    4.519695]  qcom_sysmon slimbus pdr_interface display_connector qcom_common
[    4.526785] pcieport 0000:00:00.0: PME: Signaling with IRQ 169
[    4.530829]  qcom_glink_smem icc_bwmon llcc_qcom mdt_loader drm_kms_helper
[    4.537677] pcieport 0000:00:00.0: AER: enabled with IRQ 169
[    4.542399]  qmi_helpers drm backlight rmtfs_mem socinfo
[    4.548000] pci 0000:01:00.0: enabling device (0000 -> 0002)
[    4.555021] 
[    4.555025] CPU: 6 PID: 411 Comm: kworker/u16:8 Not tainted 6.6.72-rc1 #1
[    4.560969] pci 0000:01:00.0: quirk_usb_early_handoff+0x0/0xa28 took 12682 usecs
[    4.567812] Hardware name: Thundercomm Dragonboard 845c (DT)
[    4.567815] Workqueue: devfreq_wq devfreq_monitor
[    4.610854] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.617870] pc : blk_mq_unquiesce_queue+0x98/0xa0
[    4.622611] lr : blk_mq_unquiesce_queue+0x24/0xa0
[    4.627351] sp : ffff800081563bb0
[    4.630699] x29: ffff800081563bb0 x28: 0000000000000000 x27: ffff7b2d00303468
[    4.637891] x26: 0000000000000000 x25: 0000000000000000 x24: 00000000000f4240
[    4.645083] x23: 00000000f05c5362 x22: 0000000000000000 x21: ffff7b2d09028098
[    4.652274] x20: 0000000000000000 x19: ffff7b2d09028000 x18: ffff7b2d7d78d0ac
[    4.659466] x17: 0000000000090030 x16: 0000000000000000 x15: 0000000000000000
[    4.666656] x14: 0000000000000040 x13: 00000000000001fb x12: 0000000000000002
[    4.673847] x11: fffffffff37a2b79 x10: 0000000000000001 x9 : ffffffffffffffff
[    4.681037] x8 : ffff800081563b00 x7 : ffff7b2d00e6c090 x6 : ffff800081563b00
[    4.688226] x5 : fffffffff37a2b79 x4 : ffff7b2d074da000 x3 : 0000000000000001
[    4.695416] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[    4.702606] Call trace:
[    4.705084]  blk_mq_unquiesce_queue+0x98/0xa0
[    4.709483]  blk_mq_unquiesce_tagset+0x58/0x84
[    4.713967]  ufshcd_devfreq_scale+0x210/0x350
[    4.718370]  ufshcd_devfreq_target+0xf0/0x1a4
[    4.722767]  devfreq_set_target+0x90/0x194
[    4.726906]  devfreq_update_target+0xc0/0xd8
[    4.731217]  devfreq_monitor+0x34/0x9c
[    4.734999]  process_one_work+0x144/0x29c
[    4.739044]  worker_thread+0x324/0x43c
[    4.742826]  kthread+0x110/0x114
[    4.746082]  ret_from_fork+0x10/0x20
[    4.749697] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 2

Home

------------[ cut here ]------------
[    4.387444] sd 0:0:0:1: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA
[    4.387454] sd 0:0:0:1: [sdb] Preferred minimum I/O size 786432 bytes
[    4.387459] sd 0:0:0:1: [sdb] Optimal transfer size 786432 bytes
[    4.390720]  sdb: sdb1 sdb2
[    4.395127] WARNING: CPU: 6 PID: 411 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[    4.395141] Modules linked in:
[    4.404619] sd 0:0:0:1: [sdb] Attached SCSI disk
[    4.410208]  rtc_pm8xxx qcom_vadc_common qcom_pon qcom_stats soundwire_bus ecc i2c_qcom_geni reset_qcom_pdc camcc_sdm845 drm_display_helper coresight_stm mc spi_geni_qcom gpi qcom_rng stm_core phy_qcom_qmp_combo phy_qcom_qmp_usb coresight_replicator
[    4.418824] pci 0000:00:00.0: BAR 14: assigned [mem 0x60300000-0x603fffff]
[    4.419094]  coresight_funnel typec
[    4.427517] pci 0000:00:00.0: BAR 0: assigned [mem 0x60400000-0x60400fff]
[    4.430584]  coresight_tmc
[    4.435236] pci 0000:01:00.0: BAR 0: assigned [mem 0x60300000-0x60301fff 64bit]
[    4.457433]  cfg80211 qcom_q6v5_mss phy_qcom_qusb2
[    4.464414] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    4.467863]  qrtr rfkill phy_qcom_qmp_ufs
[    4.474704] pci 0000:00:00.0:   bridge window [mem 0x60300000-0x603fffff]
[    4.477426]  coresight qcrypto authenc
[    4.484793] pci_bus 0000:00: resource 4 [io  0x0000-0xfffff]
[    4.489615]  libdes ufs_qcom phy_qcom_qmp_pcie
[    4.494877] pci_bus 0000:00: resource 5 [mem 0x60300000-0x60ffffff]
[    4.498909]  icc_osm_l3 qcom_q6v5_pas lmh qcom_wdt
[    4.505748] pci_bus 0000:01: resource 1 [mem 0x60300000-0x603fffff]
[    4.509522]  qcom_pil_info qcom_q6v5 slim_qcom_ngd_ctrl
[    4.515362] pcieport 0000:00:00.0: Adding to iommu group 9
[    4.519695]  qcom_sysmon slimbus pdr_interface display_connector qcom_common
[    4.526785] pcieport 0000:00:00.0: PME: Signaling with IRQ 169
[    4.530829]  qcom_glink_smem icc_bwmon llcc_qcom mdt_loader drm_kms_helper
[    4.537677] pcieport 0000:00:00.0: AER: enabled with IRQ 169
[    4.542399]  qmi_helpers drm backlight rmtfs_mem socinfo
[    4.548000] pci 0000:01:00.0: enabling device (0000 -> 0002)
[    4.555021] 
[    4.555025] CPU: 6 PID: 411 Comm: kworker/u16:8 Not tainted 6.6.72-rc1 #1
[    4.560969] pci 0000:01:00.0: quirk_usb_early_handoff+0x0/0xa28 took 12682 usecs
[    4.567812] Hardware name: Thundercomm Dragonboard 845c (DT)
[    4.567815] Workqueue: devfreq_wq devfreq_monitor
[    4.610854] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.617870] pc : blk_mq_unquiesce_queue+0x98/0xa0
[    4.622611] lr : blk_mq_unquiesce_queue+0x24/0xa0
[    4.627351] sp : ffff800081563bb0
[    4.630699] x29: ffff800081563bb0 x28: 0000000000000000 x27: ffff7b2d00303468
[    4.637891] x26: 0000000000000000 x25: 0000000000000000 x24: 00000000000f4240
[    4.645083] x23: 00000000f05c5362 x22: 0000000000000000 x21: ffff7b2d09028098
[    4.652274] x20: 0000000000000000 x19: ffff7b2d09028000 x18: ffff7b2d7d78d0ac
[    4.659466] x17: 0000000000090030 x16: 0000000000000000 x15: 0000000000000000
[    4.666656] x14: 0000000000000040 x13: 00000000000001fb x12: 0000000000000002
[    4.673847] x11: fffffffff37a2b79 x10: 0000000000000001 x9 : ffffffffffffffff
[    4.681037] x8 : ffff800081563b00 x7 : ffff7b2d00e6c090 x6 : ffff800081563b00
[    4.688226] x5 : fffffffff37a2b79 x4 : ffff7b2d074da000 x3 : 0000000000000001
[    4.695416] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[    4.702606] Call trace:
[    4.705084]  blk_mq_unquiesce_queue+0x98/0xa0
[    4.709483]  blk_mq_unquiesce_tagset+0x58/0x84
[    4.713967]  ufshcd_devfreq_scale+0x210/0x350
[    4.718370]  ufshcd_devfreq_target+0xf0/0x1a4
[    4.722767]  devfreq_set_target+0x90/0x194
[    4.726906]  devfreq_update_target+0xc0/0xd8
[    4.731217]  devfreq_monitor+0x34/0x9c
[    4.734999]  process_one_work+0x144/0x29c
[    4.739044]  worker_thread+0x324/0x43c
[    4.742826]  kthread+0x110/0x114
[    4.746082]  ret_from_fork+0x10/0x20
[    4.749697] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

[  173.718804] ==================================================================
[  173.720889] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1f0
[  173.722517] Read of size 1 at addr ffff800080817c1f by task kunit_try_catch/187
[  173.724420] 
[  173.724953] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  173.727541] Hardware name: linux,dummy-virt (DT)
[  173.728690] Call trace:
[  173.729412]  dump_backtrace+0x9c/0x128
[  173.730517]  show_stack+0x20/0x38
[  173.731568]  dump_stack_lvl+0x60/0xb0
[  173.732686]  print_report+0x314/0x5d8
[  173.733768]  kasan_report+0xc8/0x118
[  173.735037]  __asan_load1+0x60/0x70
[  173.736283]  kasan_alloca_oob_left+0x108/0x1f0
[  173.737317]  kunit_try_run_case+0xf8/0x260
[  173.738847]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.740572]  kthread+0x18c/0x1a8
[  173.741563]  ret_from_fork+0x10/0x20
[  173.742680] 
[  173.743629] The buggy address belongs to stack of task kunit_try_catch/187
[  173.745928] 
[  173.746461] The buggy address belongs to the virtual mapping at
[  173.746461]  [ffff800080810000, ffff800080819000) created by:
[  173.746461]  kernel_clone+0xf8/0x540
[  173.750222] 
[  173.750690] The buggy address belongs to the physical page:
[  173.752379] page:0000000019a0e304 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106061
[  173.754186] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  173.756021] page_type: 0xffffffff()
[  173.756862] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  173.758770] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  173.760131] page dumped because: kasan: bad access detected
[  173.761522] 
[  173.762127] Memory state around the buggy address:
[  173.763382]  ffff800080817b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.765282]  ffff800080817b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.767235] >ffff800080817c00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[  173.768661]                             ^
[  173.769786]  ffff800080817c80: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[  173.771501]  ffff800080817d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[  173.773150] ==================================================================

test log snippet boot parser 4

Home

[  173.797325] ==================================================================
[  173.799550] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x114/0x200
[  173.800996] Read of size 1 at addr ffff800080887c2a by task kunit_try_catch/189
[  173.802826] 
[  173.803572] CPU: 1 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  173.805936] Hardware name: linux,dummy-virt (DT)
[  173.807496] Call trace:
[  173.808325]  dump_backtrace+0x9c/0x128
[  173.809633]  show_stack+0x20/0x38
[  173.810747]  dump_stack_lvl+0x60/0xb0
[  173.812034]  print_report+0x314/0x5d8
[  173.813028]  kasan_report+0xc8/0x118
[  173.814232]  __asan_load1+0x60/0x70
[  173.815651]  kasan_alloca_oob_right+0x114/0x200
[  173.817241]  kunit_try_run_case+0xf8/0x260
[  173.818698]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.820578]  kthread+0x18c/0x1a8
[  173.821799]  ret_from_fork+0x10/0x20
[  173.822976] 
[  173.823433] The buggy address belongs to stack of task kunit_try_catch/189
[  173.825563] 
[  173.826141] The buggy address belongs to the virtual mapping at
[  173.826141]  [ffff800080880000, ffff800080889000) created by:
[  173.826141]  kernel_clone+0xf8/0x540
[  173.829812] 
[  173.830401] The buggy address belongs to the physical page:
[  173.833259] page:000000009b09e6f5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7
[  173.835490] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  173.836796] page_type: 0xffffffff()
[  173.838138] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  173.840050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  173.842174] page dumped because: kasan: bad access detected
[  173.843604] 
[  173.844133] Memory state around the buggy address:
[  173.845576]  ffff800080887b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.846856]  ffff800080887b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.848715] >ffff800080887c00: ca ca ca ca 00 02 cb cb cb cb cb cb f1 f1 f1 f1
[  173.850270]                                   ^
[  173.851837]  ffff800080887c80: 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00
[  173.853584]  ffff800080887d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[  173.855320] ==================================================================

test log snippet boot parser 5

Home

[  177.082898] ==================================================================
[  177.084984] BUG: KASAN: double-free in kfree+0x74/0x138
[  177.086421] Free of addr ffff0000c5beef60 by task kunit_try_catch/211
[  177.088542] 
[  177.089175] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  177.091156] Hardware name: linux,dummy-virt (DT)
[  177.092361] Call trace:
[  177.093082]  dump_backtrace+0x9c/0x128
[  177.094249]  show_stack+0x20/0x38
[  177.095403]  dump_stack_lvl+0x60/0xb0
[  177.096687]  print_report+0xf8/0x5d8
[  177.097822]  kasan_report_invalid_free+0xb0/0xd8
[  177.099224]  __kasan_slab_free+0x134/0x170
[  177.100579]  __kmem_cache_free+0x170/0x2e0
[  177.101788]  kfree+0x74/0x138
[  177.102760]  kfree_sensitive+0x3c/0xb0
[  177.104022]  kmalloc_double_kzfree+0xc8/0x1d8
[  177.105324]  kunit_try_run_case+0xf8/0x260
[  177.106601]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.108306]  kthread+0x18c/0x1a8
[  177.109381]  ret_from_fork+0x10/0x20
[  177.110628] 
[  177.111262] Allocated by task 211:
[  177.112205]  kasan_save_stack+0x3c/0x68
[  177.113417]  kasan_set_track+0x2c/0x40
[  177.114595]  kasan_save_alloc_info+0x24/0x38
[  177.116162]  __kasan_kmalloc+0xd4/0xd8
[  177.117327]  kmalloc_trace+0x68/0x130
[  177.118416]  kmalloc_double_kzfree+0x9c/0x1d8
[  177.119694]  kunit_try_run_case+0xf8/0x260
[  177.121223]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.122682]  kthread+0x18c/0x1a8
[  177.123943]  ret_from_fork+0x10/0x20
[  177.125154] 
[  177.125671] Freed by task 211:
[  177.127084]  kasan_save_stack+0x3c/0x68
[  177.128498]  kasan_set_track+0x2c/0x40
[  177.129640]  kasan_save_free_info+0x38/0x60
[  177.130757]  __kasan_slab_free+0x100/0x170
[  177.132172]  __kmem_cache_free+0x170/0x2e0
[  177.133388]  kfree+0x74/0x138
[  177.134362]  kfree_sensitive+0x80/0xb0
[  177.135951]  kmalloc_double_kzfree+0xb8/0x1d8
[  177.137203]  kunit_try_run_case+0xf8/0x260
[  177.138380]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.139829]  kthread+0x18c/0x1a8
[  177.140882]  ret_from_fork+0x10/0x20
[  177.141965] 
[  177.142533] The buggy address belongs to the object at ffff0000c5beef60
[  177.142533]  which belongs to the cache kmalloc-16 of size 16
[  177.144910] The buggy address is located 0 bytes inside of
[  177.144910]  16-byte region [ffff0000c5beef60, ffff0000c5beef70)
[  177.148007] 
[  177.148551] The buggy address belongs to the physical page:
[  177.150041] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  177.152550] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  177.154323] page_type: 0xffffffff()
[  177.155744] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  177.156747] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  177.158575] page dumped because: kasan: bad access detected
[  177.159891] 
[  177.160448] Memory state around the buggy address:
[  177.162085]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  177.164244]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  177.165948] >ffff0000c5beef00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  177.167471]                                                        ^
[  177.169094]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.170802]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.172795] ==================================================================

test log snippet boot parser 6

Home

[  174.385440] ==================================================================
[  174.387925] BUG: KASAN: double-free in kmem_cache_double_free+0xe8/0x240
[  174.389865] Free of addr ffff0000c5f3d000 by task kunit_try_catch/195
[  174.391951] 
[  174.393078] CPU: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.395559] Hardware name: linux,dummy-virt (DT)
[  174.396865] Call trace:
[  174.397653]  dump_backtrace+0x9c/0x128
[  174.398796]  show_stack+0x20/0x38
[  174.400033]  dump_stack_lvl+0x60/0xb0
[  174.401312]  print_report+0xf8/0x5d8
[  174.402420]  kasan_report_invalid_free+0xb0/0xd8
[  174.403995]  __kasan_slab_free+0x134/0x170
[  174.405252]  kmem_cache_free+0x18c/0x3f8
[  174.406391]  kmem_cache_double_free+0xe8/0x240
[  174.407676]  kunit_try_run_case+0xf8/0x260
[  174.409484]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.411088]  kthread+0x18c/0x1a8
[  174.412376]  ret_from_fork+0x10/0x20
[  174.413503] 
[  174.414069] Allocated by task 195:
[  174.414999]  kasan_save_stack+0x3c/0x68
[  174.416422]  kasan_set_track+0x2c/0x40
[  174.417499]  kasan_save_alloc_info+0x24/0x38
[  174.418761]  __kasan_slab_alloc+0xa8/0xb0
[  174.420041]  kmem_cache_alloc+0x134/0x330
[  174.421386]  kmem_cache_double_free+0xb8/0x240
[  174.422694]  kunit_try_run_case+0xf8/0x260
[  174.424052]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.425554]  kthread+0x18c/0x1a8
[  174.426525]  ret_from_fork+0x10/0x20
[  174.427639] 
[  174.428879] Freed by task 195:
[  174.429772]  kasan_save_stack+0x3c/0x68
[  174.430950]  kasan_set_track+0x2c/0x40
[  174.432186]  kasan_save_free_info+0x38/0x60
[  174.433514]  __kasan_slab_free+0x100/0x170
[  174.434759]  kmem_cache_free+0x18c/0x3f8
[  174.436037]  kmem_cache_double_free+0xd4/0x240
[  174.437174]  kunit_try_run_case+0xf8/0x260
[  174.438393]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.439994]  kthread+0x18c/0x1a8
[  174.440937]  ret_from_fork+0x10/0x20
[  174.442185] 
[  174.442701] The buggy address belongs to the object at ffff0000c5f3d000
[  174.442701]  which belongs to the cache test_cache of size 200
[  174.445450] The buggy address is located 0 bytes inside of
[  174.445450]  200-byte region [ffff0000c5f3d000, ffff0000c5f3d0c8)
[  174.448324] 
[  174.448953] The buggy address belongs to the physical page:
[  174.450280] page:0000000075cee7be refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f3d
[  174.452533] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.454198] page_type: 0xffffffff()
[  174.455656] raw: 0bfffc0000000800 ffff0000c56d8500 dead000000000122 0000000000000000
[  174.457661] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  174.459330] page dumped because: kasan: bad access detected
[  174.460879] 
[  174.461366] Memory state around the buggy address:
[  174.462583]  ffff0000c5f3cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.464850]  ffff0000c5f3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.466518] >ffff0000c5f3d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  174.468319]                    ^
[  174.469403]  ffff0000c5f3d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  174.471112]  ffff0000c5f3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.473141] ==================================================================

test log snippet boot parser 7

Home

[  173.533413] ==================================================================
[  173.536153] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x168
[  173.537798] Read of size 1 at addr ffffdbbcf8074d0d by task kunit_try_catch/181
[  173.540080] 
[  173.540562] CPU: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  173.542437] Hardware name: linux,dummy-virt (DT)
[  173.544016] Call trace:
[  173.544744]  dump_backtrace+0x9c/0x128
[  173.545864]  show_stack+0x20/0x38
[  173.546876]  dump_stack_lvl+0x60/0xb0
[  173.548238]  print_report+0x314/0x5d8
[  173.549449]  kasan_report+0xc8/0x118
[  173.550577]  __asan_load1+0x60/0x70
[  173.552289]  kasan_global_oob_right+0xa8/0x168
[  173.553798]  kunit_try_run_case+0xf8/0x260
[  173.555395]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.557001]  kthread+0x18c/0x1a8
[  173.557760]  ret_from_fork+0x10/0x20
[  173.559048] 
[  173.560408] The buggy address belongs to the variable:
[  173.561506]  global_array+0xd/0x40
[  173.562613] 
[  173.563332] The buggy address belongs to the virtual mapping at
[  173.563332]  [ffffdbbcf6770000, ffffdbbcf8101000) created by:
[  173.563332]  paging_init+0x26c/0x968
[  173.566460] 
[  173.567077] The buggy address belongs to the physical page:
[  173.568480] page:00000000d0c19c13 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45674
[  173.570459] flags: 0x3fffc0000004000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  173.572216] page_type: 0xffffffff()
[  173.573587] raw: 03fffc0000004000 fffffc0000159d08 fffffc0000159d08 0000000000000000
[  173.575114] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  173.577064] page dumped because: kasan: bad access detected
[  173.578333] 
[  173.578893] Memory state around the buggy address:
[  173.580172]  ffffdbbcf8074c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.581832]  ffffdbbcf8074c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.583538] >ffffdbbcf8074d00: 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[  173.585184]                       ^
[  173.586157]  ffffdbbcf8074d80: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[  173.587840]  ffffdbbcf8074e00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[  173.589409] ==================================================================

test log snippet boot parser 8

Home

[  170.088228] ==================================================================
[  170.090788] BUG: KASAN: invalid-free in kfree+0x12c/0x138
[  170.092329] Free of addr ffff0000c5fb8001 by task kunit_try_catch/127
[  170.094342] 
[  170.095365] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.097274] Hardware name: linux,dummy-virt (DT)
[  170.098423] Call trace:
[  170.099096]  dump_backtrace+0x9c/0x128
[  170.100375]  show_stack+0x20/0x38
[  170.101353]  dump_stack_lvl+0x60/0xb0
[  170.102605]  print_report+0xf8/0x5d8
[  170.103775]  kasan_report_invalid_free+0xb0/0xd8
[  170.104979]  __kasan_kfree_large+0x54/0xa0
[  170.106251]  free_large_kmalloc+0x5c/0x100
[  170.107538]  kfree+0x12c/0x138
[  170.108990]  kmalloc_pagealloc_invalid_free+0xa8/0x1a8
[  170.110330]  kunit_try_run_case+0xf8/0x260
[  170.111702]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.113529]  kthread+0x18c/0x1a8
[  170.114541]  ret_from_fork+0x10/0x20
[  170.115686] 
[  170.116962] The buggy address belongs to the physical page:
[  170.118248] page:000000002fd1ef98 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb8
[  170.120645] head:000000002fd1ef98 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.122358] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  170.124366] page_type: 0xffffffff()
[  170.125556] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  170.127977] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  170.129525] page dumped because: kasan: bad access detected
[  170.130799] 
[  170.131258] Memory state around the buggy address:
[  170.132900]  ffff0000c5fb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.134971]  ffff0000c5fb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.136686] >ffff0000c5fb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.138379]                    ^
[  170.139514]  ffff0000c5fb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.141175]  ffff0000c5fb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.142844] ==================================================================

test log snippet boot parser 9

Home

[  174.517400] ==================================================================
[  174.519281] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xdc/0x230
[  174.522271] Free of addr ffff0000c60be001 by task kunit_try_catch/197
[  174.524649] 
[  174.525953] CPU: 1 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.527937] Hardware name: linux,dummy-virt (DT)
[  174.529337] Call trace:
[  174.530209]  dump_backtrace+0x9c/0x128
[  174.531415]  show_stack+0x20/0x38
[  174.533042]  dump_stack_lvl+0x60/0xb0
[  174.534677]  print_report+0xf8/0x5d8
[  174.536406]  kasan_report_invalid_free+0xb0/0xd8
[  174.538006]  __kasan_slab_free+0x164/0x170
[  174.539377]  kmem_cache_free+0x18c/0x3f8
[  174.540858]  kmem_cache_invalid_free+0xdc/0x230
[  174.542324]  kunit_try_run_case+0xf8/0x260
[  174.543637]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.545265]  kthread+0x18c/0x1a8
[  174.546258]  ret_from_fork+0x10/0x20
[  174.547315] 
[  174.548122] Allocated by task 197:
[  174.549183]  kasan_save_stack+0x3c/0x68
[  174.550833]  kasan_set_track+0x2c/0x40
[  174.552612]  kasan_save_alloc_info+0x24/0x38
[  174.554106]  __kasan_slab_alloc+0xa8/0xb0
[  174.555362]  kmem_cache_alloc+0x134/0x330
[  174.556751]  kmem_cache_invalid_free+0xb8/0x230
[  174.558110]  kunit_try_run_case+0xf8/0x260
[  174.559874]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.561411]  kthread+0x18c/0x1a8
[  174.562431]  ret_from_fork+0x10/0x20
[  174.563749] 
[  174.564627] The buggy address belongs to the object at ffff0000c60be000
[  174.564627]  which belongs to the cache test_cache of size 200
[  174.567355] The buggy address is located 1 bytes inside of
[  174.567355]  200-byte region [ffff0000c60be000, ffff0000c60be0c8)
[  174.569863] 
[  174.570391] The buggy address belongs to the physical page:
[  174.571771] page:00000000c0b61542 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060be
[  174.574194] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.575937] page_type: 0xffffffff()
[  174.576807] raw: 0bfffc0000000800 ffff0000c57388c0 dead000000000122 0000000000000000
[  174.578593] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  174.580056] page dumped because: kasan: bad access detected
[  174.581059] 
[  174.581805] Memory state around the buggy address:
[  174.583516]  ffff0000c60bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.584970]  ffff0000c60bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.586975] >ffff0000c60be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  174.588599]                    ^
[  174.589477]  ffff0000c60be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  174.591194]  ffff0000c60be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.593110] ==================================================================

test log snippet boot parser 10

Home

[  172.213455] ==================================================================
[  172.215267] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe0/0x1f0
[  172.218041] Read of size 18446744073709551614 at addr ffff0000c6055204 by task kunit_try_catch/159
[  172.220506] 
[  172.221196] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.222572] Hardware name: linux,dummy-virt (DT)
[  172.224206] Call trace:
[  172.225067]  dump_backtrace+0x9c/0x128
[  172.226184]  show_stack+0x20/0x38
[  172.227220]  dump_stack_lvl+0x60/0xb0
[  172.228417]  print_report+0xf8/0x5d8
[  172.229546]  kasan_report+0xc8/0x118
[  172.230668]  kasan_check_range+0xe8/0x190
[  172.231944]  __asan_memmove+0x3c/0x98
[  172.233264]  kmalloc_memmove_negative_size+0xe0/0x1f0
[  172.234651]  kunit_try_run_case+0xf8/0x260
[  172.236187]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.237663]  kthread+0x18c/0x1a8
[  172.238633]  ret_from_fork+0x10/0x20
[  172.240053] 
[  172.240564] Allocated by task 159:
[  172.241547]  kasan_save_stack+0x3c/0x68
[  172.242739]  kasan_set_track+0x2c/0x40
[  172.244033]  kasan_save_alloc_info+0x24/0x38
[  172.245348]  __kasan_kmalloc+0xd4/0xd8
[  172.246471]  kmalloc_trace+0x68/0x130
[  172.247498]  kmalloc_memmove_negative_size+0xa0/0x1f0
[  172.248918]  kunit_try_run_case+0xf8/0x260
[  172.250127]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.251889]  kthread+0x18c/0x1a8
[  172.253105]  ret_from_fork+0x10/0x20
[  172.254192] 
[  172.254767] The buggy address belongs to the object at ffff0000c6055200
[  172.254767]  which belongs to the cache kmalloc-64 of size 64
[  172.257378] The buggy address is located 4 bytes inside of
[  172.257378]  64-byte region [ffff0000c6055200, ffff0000c6055240)
[  172.259857] 
[  172.260352] The buggy address belongs to the physical page:
[  172.261682] page:00000000e6689584 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106055
[  172.264022] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.265692] page_type: 0xffffffff()
[  172.266884] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  172.268893] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  172.270502] page dumped because: kasan: bad access detected
[  172.271877] 
[  172.273118] Memory state around the buggy address:
[  172.274404]  ffff0000c6055100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  172.276297]  ffff0000c6055180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.277952] >ffff0000c6055200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  172.279650]                    ^
[  172.280325]  ffff0000c6055280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.281991]  ffff0000c6055300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.283842] ==================================================================

test log snippet boot parser 11

Home

[  176.191456] ==================================================================
[  176.192918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8
[  176.194658] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.196641] 
[  176.197273] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.199238] Hardware name: linux,dummy-virt (DT)
[  176.200384] Call trace:
[  176.201090]  dump_backtrace+0x9c/0x128
[  176.202189]  show_stack+0x20/0x38
[  176.203193]  dump_stack_lvl+0x60/0xb0
[  176.204335]  print_report+0xf8/0x5d8
[  176.205460]  kasan_report+0xc8/0x118
[  176.206563]  __asan_load8+0x9c/0xc0
[  176.207678]  kasan_bitops_modify.constprop.0+0x20c/0x6d8
[  176.209090]  kasan_bitops_generic+0xb4/0x148
[  176.210312]  kunit_try_run_case+0xf8/0x260
[  176.211490]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.212950]  kthread+0x18c/0x1a8
[  176.213940]  ret_from_fork+0x10/0x20
[  176.214996] 
[  176.215502] Allocated by task 207:
[  176.216481]  kasan_save_stack+0x3c/0x68
[  176.217615]  kasan_set_track+0x2c/0x40
[  176.218754]  kasan_save_alloc_info+0x24/0x38
[  176.220013]  __kasan_kmalloc+0xd4/0xd8
[  176.221159]  kmalloc_trace+0x68/0x130
[  176.222225]  kasan_bitops_generic+0x98/0x148
[  176.223451]  kunit_try_run_case+0xf8/0x260
[  176.224645]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.226096]  kthread+0x18c/0x1a8
[  176.227090]  ret_from_fork+0x10/0x20
[  176.228173] 
[  176.228655] The buggy address belongs to the object at ffff0000c5beef40
[  176.228655]  which belongs to the cache kmalloc-16 of size 16
[  176.231054] The buggy address is located 8 bytes inside of
[  176.231054]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.233487] 
[  176.234073] The buggy address belongs to the physical page:
[  176.235336] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.237268] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.238846] page_type: 0xffffffff()
[  176.239910] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.241564] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.243145] page dumped because: kasan: bad access detected
[  176.244432] 
[  176.244976] Memory state around the buggy address:
[  176.246205]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.247824]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.249401] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.250925]                                               ^
[  176.252257]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.253856]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.255368] ==================================================================
---
[  175.985140] ==================================================================
[  175.986591] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8
[  175.988708] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.990262] 
[  175.990923] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.993951] Hardware name: linux,dummy-virt (DT)
[  175.995124] Call trace:
[  175.995843]  dump_backtrace+0x9c/0x128
[  175.996997]  show_stack+0x20/0x38
[  175.998019]  dump_stack_lvl+0x60/0xb0
[  175.999181]  print_report+0xf8/0x5d8
[  176.000325]  kasan_report+0xc8/0x118
[  176.001443]  __asan_load8+0x9c/0xc0
[  176.002539]  kasan_bitops_modify.constprop.0+0x19c/0x6d8
[  176.003971]  kasan_bitops_generic+0xb4/0x148
[  176.005189]  kunit_try_run_case+0xf8/0x260
[  176.006383]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.007876]  kthread+0x18c/0x1a8
[  176.008860]  ret_from_fork+0x10/0x20
[  176.009948] 
[  176.010446] Allocated by task 207:
[  176.011382]  kasan_save_stack+0x3c/0x68
[  176.012534]  kasan_set_track+0x2c/0x40
[  176.013656]  kasan_save_alloc_info+0x24/0x38
[  176.014925]  __kasan_kmalloc+0xd4/0xd8
[  176.016073]  kmalloc_trace+0x68/0x130
[  176.017122]  kasan_bitops_generic+0x98/0x148
[  176.018329]  kunit_try_run_case+0xf8/0x260
[  176.019505]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.020974]  kthread+0x18c/0x1a8
[  176.021956]  ret_from_fork+0x10/0x20
[  176.023034] 
[  176.023553] The buggy address belongs to the object at ffff0000c5beef40
[  176.023553]  which belongs to the cache kmalloc-16 of size 16
[  176.025962] The buggy address is located 8 bytes inside of
[  176.025962]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.028435] 
[  176.028986] The buggy address belongs to the physical page:
[  176.030310] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.032284] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.033867] page_type: 0xffffffff()
[  176.034918] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.036633] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.038231] page dumped because: kasan: bad access detected
[  176.039499] 
[  176.040072] Memory state around the buggy address:
[  176.041286]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.042900]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.044506] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.046077]                                               ^
[  176.047378]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.049000]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.050543] ==================================================================
---
[  175.752680] ==================================================================
[  175.753889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8
[  175.756652] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.758620] 
[  175.759511] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.761918] Hardware name: linux,dummy-virt (DT)
[  175.763072] Call trace:
[  175.763679]  dump_backtrace+0x9c/0x128
[  175.765322]  show_stack+0x20/0x38
[  175.766423]  dump_stack_lvl+0x60/0xb0
[  175.767774]  print_report+0xf8/0x5d8
[  175.769030]  kasan_report+0xc8/0x118
[  175.770357]  __asan_load8+0x9c/0xc0
[  175.772350]  kasan_bitops_modify.constprop.0+0x130/0x6d8
[  175.774107]  kasan_bitops_generic+0xb4/0x148
[  175.775496]  kunit_try_run_case+0xf8/0x260
[  175.777155]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.779249]  kthread+0x18c/0x1a8
[  175.780285]  ret_from_fork+0x10/0x20
[  175.781467] 
[  175.782100] Allocated by task 207:
[  175.783242]  kasan_save_stack+0x3c/0x68
[  175.784266]  kasan_set_track+0x2c/0x40
[  175.785269]  kasan_save_alloc_info+0x24/0x38
[  175.787077]  __kasan_kmalloc+0xd4/0xd8
[  175.788229]  kmalloc_trace+0x68/0x130
[  175.789286]  kasan_bitops_generic+0x98/0x148
[  175.790565]  kunit_try_run_case+0xf8/0x260
[  175.791861]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.793306]  kthread+0x18c/0x1a8
[  175.794291]  ret_from_fork+0x10/0x20
[  175.795184] 
[  175.795631] The buggy address belongs to the object at ffff0000c5beef40
[  175.795631]  which belongs to the cache kmalloc-16 of size 16
[  175.798881] The buggy address is located 8 bytes inside of
[  175.798881]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  175.801449] 
[  175.802465] The buggy address belongs to the physical page:
[  175.804267] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  175.806482] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.808453] page_type: 0xffffffff()
[  175.810085] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  175.811823] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  175.813444] page dumped because: kasan: bad access detected
[  175.814673] 
[  175.815577] Memory state around the buggy address:
[  175.817130]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  175.818857]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  175.820769] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  175.822388]                                               ^
[  175.823990]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.825455]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  175.827460] ==================================================================
---
[  175.604239] ==================================================================
[  175.605846] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8
[  175.607989] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.609613] 
[  175.610243] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.612498] Hardware name: linux,dummy-virt (DT)
[  175.613814] Call trace:
[  175.614620]  dump_backtrace+0x9c/0x128
[  175.615816]  show_stack+0x20/0x38
[  175.616889]  dump_stack_lvl+0x60/0xb0
[  175.618088]  print_report+0xf8/0x5d8
[  175.619251]  kasan_report+0xc8/0x118
[  175.620572]  __asan_load8+0x9c/0xc0
[  175.621707]  kasan_bitops_modify.constprop.0+0xd0/0x6d8
[  175.623223]  kasan_bitops_generic+0xb4/0x148
[  175.624484]  kunit_try_run_case+0xf8/0x260
[  175.625514]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.627168]  kthread+0x18c/0x1a8
[  175.628346]  ret_from_fork+0x10/0x20
[  175.629532] 
[  175.630204] Allocated by task 207:
[  175.631154]  kasan_save_stack+0x3c/0x68
[  175.632524]  kasan_set_track+0x2c/0x40
[  175.633702]  kasan_save_alloc_info+0x24/0x38
[  175.635007]  __kasan_kmalloc+0xd4/0xd8
[  175.636185]  kmalloc_trace+0x68/0x130
[  175.637256]  kasan_bitops_generic+0x98/0x148
[  175.638545]  kunit_try_run_case+0xf8/0x260
[  175.639965]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.641417]  kthread+0x18c/0x1a8
[  175.642389]  ret_from_fork+0x10/0x20
[  175.643390] 
[  175.643880] The buggy address belongs to the object at ffff0000c5beef40
[  175.643880]  which belongs to the cache kmalloc-16 of size 16
[  175.647829] The buggy address is located 8 bytes inside of
[  175.647829]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  175.650423] 
[  175.651009] The buggy address belongs to the physical page:
[  175.652611] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  175.654530] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.656551] page_type: 0xffffffff()
[  175.657605] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  175.659305] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  175.660995] page dumped because: kasan: bad access detected
[  175.662288] 
[  175.662830] Memory state around the buggy address:
[  175.664061]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  175.665711]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  175.667533] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  175.668888]                                               ^
[  175.670058]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.672171]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  175.673885] ==================================================================

test log snippet boot parser 12

Home

[  175.676904] ==================================================================
[  175.678444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8
[  175.680992] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.683290] 
[  175.684488] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.686318] Hardware name: linux,dummy-virt (DT)
[  175.687433] Call trace:
[  175.688276]  dump_backtrace+0x9c/0x128
[  175.689386]  show_stack+0x20/0x38
[  175.690377]  dump_stack_lvl+0x60/0xb0
[  175.691783]  print_report+0xf8/0x5d8
[  175.692882]  kasan_report+0xc8/0x118
[  175.694004]  kasan_check_range+0xe8/0x190
[  175.695246]  __kasan_check_write+0x20/0x30
[  175.696755]  kasan_bitops_modify.constprop.0+0x100/0x6d8
[  175.698227]  kasan_bitops_generic+0xb4/0x148
[  175.699481]  kunit_try_run_case+0xf8/0x260
[  175.700686]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.702476]  kthread+0x18c/0x1a8
[  175.703604]  ret_from_fork+0x10/0x20
[  175.704793] 
[  175.705290] Allocated by task 207:
[  175.706259]  kasan_save_stack+0x3c/0x68
[  175.707504]  kasan_set_track+0x2c/0x40
[  175.708704]  kasan_save_alloc_info+0x24/0x38
[  175.710048]  __kasan_kmalloc+0xd4/0xd8
[  175.711276]  kmalloc_trace+0x68/0x130
[  175.712233]  kasan_bitops_generic+0x98/0x148
[  175.713444]  kunit_try_run_case+0xf8/0x260
[  175.714635]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.716513]  kthread+0x18c/0x1a8
[  175.717393]  ret_from_fork+0x10/0x20
[  175.718758] 
[  175.719409] The buggy address belongs to the object at ffff0000c5beef40
[  175.719409]  which belongs to the cache kmalloc-16 of size 16
[  175.722401] The buggy address is located 8 bytes inside of
[  175.722401]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  175.725178] 
[  175.725664] The buggy address belongs to the physical page:
[  175.727296] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  175.729444] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.730808] page_type: 0xffffffff()
[  175.731880] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  175.733640] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  175.735322] page dumped because: kasan: bad access detected
[  175.737502] 
[  175.738580] Memory state around the buggy address:
[  175.739888]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  175.741516]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  175.743518] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  175.744963]                                               ^
[  175.746237]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.748221]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  175.749775] ==================================================================
---
[  175.906132] ==================================================================
[  175.908804] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8
[  175.910561] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.912348] 
[  175.914117] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.916170] Hardware name: linux,dummy-virt (DT)
[  175.917354] Call trace:
[  175.918137]  dump_backtrace+0x9c/0x128
[  175.920085]  show_stack+0x20/0x38
[  175.921277]  dump_stack_lvl+0x60/0xb0
[  175.922687]  print_report+0xf8/0x5d8
[  175.923891]  kasan_report+0xc8/0x118
[  175.925045]  kasan_check_range+0xe8/0x190
[  175.926368]  __kasan_check_write+0x20/0x30
[  175.928307]  kasan_bitops_modify.constprop.0+0x194/0x6d8
[  175.930031]  kasan_bitops_generic+0xb4/0x148
[  175.931303]  kunit_try_run_case+0xf8/0x260
[  175.932549]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.934058]  kthread+0x18c/0x1a8
[  175.935055]  ret_from_fork+0x10/0x20
[  175.936168] 
[  175.936804] Allocated by task 207:
[  175.937677]  kasan_save_stack+0x3c/0x68
[  175.939297]  kasan_set_track+0x2c/0x40
[  175.940471]  kasan_save_alloc_info+0x24/0x38
[  175.941810]  __kasan_kmalloc+0xd4/0xd8
[  175.943007]  kmalloc_trace+0x68/0x130
[  175.944457]  kasan_bitops_generic+0x98/0x148
[  175.945644]  kunit_try_run_case+0xf8/0x260
[  175.946854]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.948541]  kthread+0x18c/0x1a8
[  175.949597]  ret_from_fork+0x10/0x20
[  175.950708] 
[  175.951301] The buggy address belongs to the object at ffff0000c5beef40
[  175.951301]  which belongs to the cache kmalloc-16 of size 16
[  175.953785] The buggy address is located 8 bytes inside of
[  175.953785]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  175.956195] 
[  175.956840] The buggy address belongs to the physical page:
[  175.958072] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  175.959864] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.961496] page_type: 0xffffffff()
[  175.962682] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  175.964749] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  175.966484] page dumped because: kasan: bad access detected
[  175.968041] 
[  175.969271] Memory state around the buggy address:
[  175.970689]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  175.973417]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  175.975052] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  175.976936]                                               ^
[  175.978467]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.980356]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  175.981959] ==================================================================
---
[  175.528263] ==================================================================
[  175.531273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8
[  175.532741] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.535257] 
[  175.535770] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.538065] Hardware name: linux,dummy-virt (DT)
[  175.539236] Call trace:
[  175.540251]  dump_backtrace+0x9c/0x128
[  175.541501]  show_stack+0x20/0x38
[  175.542565]  dump_stack_lvl+0x60/0xb0
[  175.543945]  print_report+0xf8/0x5d8
[  175.545201]  kasan_report+0xc8/0x118
[  175.546316]  kasan_check_range+0xe8/0x190
[  175.547676]  __kasan_check_write+0x20/0x30
[  175.548685]  kasan_bitops_modify.constprop.0+0xa4/0x6d8
[  175.550314]  kasan_bitops_generic+0xb4/0x148
[  175.552187]  kunit_try_run_case+0xf8/0x260
[  175.553427]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.554925]  kthread+0x18c/0x1a8
[  175.555929]  ret_from_fork+0x10/0x20
[  175.557050] 
[  175.557611] Allocated by task 207:
[  175.558526]  kasan_save_stack+0x3c/0x68
[  175.560133]  kasan_set_track+0x2c/0x40
[  175.561268]  kasan_save_alloc_info+0x24/0x38
[  175.562518]  __kasan_kmalloc+0xd4/0xd8
[  175.563630]  kmalloc_trace+0x68/0x130
[  175.565117]  kasan_bitops_generic+0x98/0x148
[  175.566335]  kunit_try_run_case+0xf8/0x260
[  175.567639]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.569017]  kthread+0x18c/0x1a8
[  175.570545]  ret_from_fork+0x10/0x20
[  175.571612] 
[  175.572229] The buggy address belongs to the object at ffff0000c5beef40
[  175.572229]  which belongs to the cache kmalloc-16 of size 16
[  175.574744] The buggy address is located 8 bytes inside of
[  175.574744]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  175.577291] 
[  175.577864] The buggy address belongs to the physical page:
[  175.579206] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  175.581060] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.582591] page_type: 0xffffffff()
[  175.584244] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  175.585891] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  175.587504] page dumped because: kasan: bad access detected
[  175.588498] 
[  175.589123] Memory state around the buggy address:
[  175.590527]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  175.592405]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  175.594018] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  175.595819]                                               ^
[  175.597180]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.598804]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  175.600507] ==================================================================
---
[  175.830715] ==================================================================
[  175.832224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8
[  175.834069] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  175.836564] 
[  175.837402] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.839395] Hardware name: linux,dummy-virt (DT)
[  175.840920] Call trace:
[  175.841800]  dump_backtrace+0x9c/0x128
[  175.843083]  show_stack+0x20/0x38
[  175.843901]  dump_stack_lvl+0x60/0xb0
[  175.845129]  print_report+0xf8/0x5d8
[  175.846253]  kasan_report+0xc8/0x118
[  175.847519]  kasan_check_range+0xe8/0x190
[  175.848763]  __kasan_check_write+0x20/0x30
[  175.850153]  kasan_bitops_modify.constprop.0+0x160/0x6d8
[  175.851346]  kasan_bitops_generic+0xb4/0x148
[  175.852401]  kunit_try_run_case+0xf8/0x260
[  175.853695]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.855460]  kthread+0x18c/0x1a8
[  175.857363]  ret_from_fork+0x10/0x20
[  175.858377] 
[  175.859094] Allocated by task 207:
[  175.860198]  kasan_save_stack+0x3c/0x68
[  175.861480]  kasan_set_track+0x2c/0x40
[  175.862657]  kasan_save_alloc_info+0x24/0x38
[  175.864071]  __kasan_kmalloc+0xd4/0xd8
[  175.865044]  kmalloc_trace+0x68/0x130
[  175.866439]  kasan_bitops_generic+0x98/0x148
[  175.867669]  kunit_try_run_case+0xf8/0x260
[  175.869020]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.870518]  kthread+0x18c/0x1a8
[  175.871452]  ret_from_fork+0x10/0x20
[  175.872640] 
[  175.873243] The buggy address belongs to the object at ffff0000c5beef40
[  175.873243]  which belongs to the cache kmalloc-16 of size 16
[  175.876573] The buggy address is located 8 bytes inside of
[  175.876573]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  175.879656] 
[  175.880244] The buggy address belongs to the physical page:
[  175.881826] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  175.883620] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.885671] page_type: 0xffffffff()
[  175.887319] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  175.889121] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  175.890486] page dumped because: kasan: bad access detected
[  175.891947] 
[  175.892589] Memory state around the buggy address:
[  175.893893]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  175.895779]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  175.897075] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  175.899001]                                               ^
[  175.900418]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.902061]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  175.903972] ==================================================================
---
[  176.123209] ==================================================================
[  176.124912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[  176.126649] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.128463] 
[  176.129065] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.130840] Hardware name: linux,dummy-virt (DT)
[  176.131931] Call trace:
[  176.132688]  dump_backtrace+0x9c/0x128
[  176.133802]  show_stack+0x20/0x38
[  176.134793]  dump_stack_lvl+0x60/0xb0
[  176.135930]  print_report+0xf8/0x5d8
[  176.137041]  kasan_report+0xc8/0x118
[  176.138165]  kasan_check_range+0xe8/0x190
[  176.139383]  __kasan_check_write+0x20/0x30
[  176.140505]  kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[  176.141907]  kasan_bitops_generic+0xb4/0x148
[  176.143137]  kunit_try_run_case+0xf8/0x260
[  176.144333]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.145771]  kthread+0x18c/0x1a8
[  176.146741]  ret_from_fork+0x10/0x20
[  176.147848] 
[  176.148400] Allocated by task 207:
[  176.149405]  kasan_save_stack+0x3c/0x68
[  176.150547]  kasan_set_track+0x2c/0x40
[  176.151674]  kasan_save_alloc_info+0x24/0x38
[  176.152945]  __kasan_kmalloc+0xd4/0xd8
[  176.154073]  kmalloc_trace+0x68/0x130
[  176.155142]  kasan_bitops_generic+0x98/0x148
[  176.156349]  kunit_try_run_case+0xf8/0x260
[  176.157511]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.158983]  kthread+0x18c/0x1a8
[  176.159986]  ret_from_fork+0x10/0x20
[  176.161071] 
[  176.161572] The buggy address belongs to the object at ffff0000c5beef40
[  176.161572]  which belongs to the cache kmalloc-16 of size 16
[  176.163972] The buggy address is located 8 bytes inside of
[  176.163972]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.166388] 
[  176.166928] The buggy address belongs to the physical page:
[  176.168188] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.170164] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.171711] page_type: 0xffffffff()
[  176.172761] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.174423] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.176071] page dumped because: kasan: bad access detected
[  176.177347] 
[  176.177905] Memory state around the buggy address:
[  176.179087]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.180748]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.182317] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.183885]                                               ^
[  176.185198]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.186846]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.188408] ==================================================================
---
[  176.053971] ==================================================================
[  176.055465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[  176.057175] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.059006] 
[  176.059589] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.061398] Hardware name: linux,dummy-virt (DT)
[  176.062503] Call trace:
[  176.063236]  dump_backtrace+0x9c/0x128
[  176.064332]  show_stack+0x20/0x38
[  176.065336]  dump_stack_lvl+0x60/0xb0
[  176.066467]  print_report+0xf8/0x5d8
[  176.067543]  kasan_report+0xc8/0x118
[  176.068685]  kasan_check_range+0xe8/0x190
[  176.069882]  __kasan_check_write+0x20/0x30
[  176.071013]  kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[  176.072400]  kasan_bitops_generic+0xb4/0x148
[  176.073577]  kunit_try_run_case+0xf8/0x260
[  176.074767]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.076206]  kthread+0x18c/0x1a8
[  176.077172]  ret_from_fork+0x10/0x20
[  176.078252] 
[  176.078758] Allocated by task 207:
[  176.079630]  kasan_save_stack+0x3c/0x68
[  176.080823]  kasan_set_track+0x2c/0x40
[  176.081933]  kasan_save_alloc_info+0x24/0x38
[  176.083208]  __kasan_kmalloc+0xd4/0xd8
[  176.084349]  kmalloc_trace+0x68/0x130
[  176.085391]  kasan_bitops_generic+0x98/0x148
[  176.086581]  kunit_try_run_case+0xf8/0x260
[  176.087803]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.089324]  kthread+0x18c/0x1a8
[  176.090959]  ret_from_fork+0x10/0x20
[  176.092073] 
[  176.092713] The buggy address belongs to the object at ffff0000c5beef40
[  176.092713]  which belongs to the cache kmalloc-16 of size 16
[  176.095294] The buggy address is located 8 bytes inside of
[  176.095294]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.097638] 
[  176.098259] The buggy address belongs to the physical page:
[  176.099557] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.101535] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.103140] page_type: 0xffffffff()
[  176.104282] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.106049] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.107664] page dumped because: kasan: bad access detected
[  176.109010] 
[  176.109557] Memory state around the buggy address:
[  176.110847]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.112476]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.114184] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.115752]                                               ^
[  176.117115]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.118775]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.120337] ==================================================================

test log snippet boot parser 13

Home

[  176.258271] ==================================================================
[  176.260115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[  176.262006] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.263680] 
[  176.264285] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.266082] Hardware name: linux,dummy-virt (DT)
[  176.267204] Call trace:
[  176.267885]  dump_backtrace+0x9c/0x128
[  176.268980]  show_stack+0x20/0x38
[  176.269990]  dump_stack_lvl+0x60/0xb0
[  176.271109]  print_report+0xf8/0x5d8
[  176.272245]  kasan_report+0xc8/0x118
[  176.273358]  kasan_check_range+0xe8/0x190
[  176.274553]  __kasan_check_write+0x20/0x30
[  176.275676]  kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[  176.277224]  kasan_bitops_generic+0xc0/0x148
[  176.278434]  kunit_try_run_case+0xf8/0x260
[  176.279623]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.281090]  kthread+0x18c/0x1a8
[  176.282053]  ret_from_fork+0x10/0x20
[  176.283140] 
[  176.283645] Allocated by task 207:
[  176.284605]  kasan_save_stack+0x3c/0x68
[  176.285766]  kasan_set_track+0x2c/0x40
[  176.286897]  kasan_save_alloc_info+0x24/0x38
[  176.288171]  __kasan_kmalloc+0xd4/0xd8
[  176.289287]  kmalloc_trace+0x68/0x130
[  176.290314]  kasan_bitops_generic+0x98/0x148
[  176.291498]  kunit_try_run_case+0xf8/0x260
[  176.292696]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.294154]  kthread+0x18c/0x1a8
[  176.295111]  ret_from_fork+0x10/0x20
[  176.296353] 
[  176.296901] The buggy address belongs to the object at ffff0000c5beef40
[  176.296901]  which belongs to the cache kmalloc-16 of size 16
[  176.299309] The buggy address is located 8 bytes inside of
[  176.299309]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.302746] 
[  176.303356] The buggy address belongs to the physical page:
[  176.304606] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.306538] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.308102] page_type: 0xffffffff()
[  176.309142] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.310845] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.312424] page dumped because: kasan: bad access detected
[  176.313676] 
[  176.314199] Memory state around the buggy address:
[  176.315416]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.317052]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.318666] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.320221]                                               ^
[  176.321555]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.323131]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.324687] ==================================================================
---
[  176.886604] ==================================================================
[  176.888199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[  176.890195] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.892077] 
[  176.892604] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.894510] Hardware name: linux,dummy-virt (DT)
[  176.895627] Call trace:
[  176.896379]  dump_backtrace+0x9c/0x128
[  176.897473]  show_stack+0x20/0x38
[  176.898487]  dump_stack_lvl+0x60/0xb0
[  176.899657]  print_report+0xf8/0x5d8
[  176.900811]  kasan_report+0xc8/0x118
[  176.901934]  kasan_check_range+0xe8/0x190
[  176.903166]  __kasan_check_write+0x20/0x30
[  176.904312]  kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[  176.905872]  kasan_bitops_generic+0xc0/0x148
[  176.907086]  kunit_try_run_case+0xf8/0x260
[  176.908291]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.909778]  kthread+0x18c/0x1a8
[  176.910778]  ret_from_fork+0x10/0x20
[  176.911880] 
[  176.912405] Allocated by task 207:
[  176.913318]  kasan_save_stack+0x3c/0x68
[  176.914486]  kasan_set_track+0x2c/0x40
[  176.915618]  kasan_save_alloc_info+0x24/0x38
[  176.916914]  __kasan_kmalloc+0xd4/0xd8
[  176.918096]  kmalloc_trace+0x68/0x130
[  176.919168]  kasan_bitops_generic+0x98/0x148
[  176.920388]  kunit_try_run_case+0xf8/0x260
[  176.921584]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.923052]  kthread+0x18c/0x1a8
[  176.924069]  ret_from_fork+0x10/0x20
[  176.925045] 
[  176.925553] The buggy address belongs to the object at ffff0000c5beef40
[  176.925553]  which belongs to the cache kmalloc-16 of size 16
[  176.929213] The buggy address is located 8 bytes inside of
[  176.929213]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.932121] 
[  176.932796] The buggy address belongs to the physical page:
[  176.934117] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.936116] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.937682] page_type: 0xffffffff()
[  176.938787] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.940505] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.942156] page dumped because: kasan: bad access detected
[  176.943449] 
[  176.944002] Memory state around the buggy address:
[  176.945212]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.946854]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.948467] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.950024]                                               ^
[  176.951359]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.952998]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.954543] ==================================================================
---
[  176.538891] ==================================================================
[  176.540570] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[  176.542428] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.544184] 
[  176.544874] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.546667] Hardware name: linux,dummy-virt (DT)
[  176.547822] Call trace:
[  176.548523]  dump_backtrace+0x9c/0x128
[  176.549631]  show_stack+0x20/0x38
[  176.550638]  dump_stack_lvl+0x60/0xb0
[  176.551802]  print_report+0xf8/0x5d8
[  176.552924]  kasan_report+0xc8/0x118
[  176.554048]  kasan_check_range+0xe8/0x190
[  176.555248]  __kasan_check_write+0x20/0x30
[  176.556431]  kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[  176.557962]  kasan_bitops_generic+0xc0/0x148
[  176.559190]  kunit_try_run_case+0xf8/0x260
[  176.560401]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.561844]  kthread+0x18c/0x1a8
[  176.562805]  ret_from_fork+0x10/0x20
[  176.563866] 
[  176.564181] Allocated by task 207:
[  176.564652]  kasan_save_stack+0x3c/0x68
[  176.565710]  kasan_set_track+0x2c/0x40
[  176.566822]  kasan_save_alloc_info+0x24/0x38
[  176.568107]  __kasan_kmalloc+0xd4/0xd8
[  176.569241]  kmalloc_trace+0x68/0x130
[  176.570294]  kasan_bitops_generic+0x98/0x148
[  176.571525]  kunit_try_run_case+0xf8/0x260
[  176.572713]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.574175]  kthread+0x18c/0x1a8
[  176.575172]  ret_from_fork+0x10/0x20
[  176.576292] 
[  176.576872] The buggy address belongs to the object at ffff0000c5beef40
[  176.576872]  which belongs to the cache kmalloc-16 of size 16
[  176.579257] The buggy address is located 8 bytes inside of
[  176.579257]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.581656] 
[  176.582300] The buggy address belongs to the physical page:
[  176.583567] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.585537] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.587103] page_type: 0xffffffff()
[  176.588150] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.589864] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.591402] page dumped because: kasan: bad access detected
[  176.592656] 
[  176.593232] Memory state around the buggy address:
[  176.594414]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.596034]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.597639] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.599187]                                               ^
[  176.600493]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.602138]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.603670] ==================================================================
---
[  176.399539] ==================================================================
[  176.401050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[  176.403058] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.404871] 
[  176.405524] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.408151] Hardware name: linux,dummy-virt (DT)
[  176.409183] Call trace:
[  176.410066]  dump_backtrace+0x9c/0x128
[  176.411290]  show_stack+0x20/0x38
[  176.412367]  dump_stack_lvl+0x60/0xb0
[  176.413556]  print_report+0xf8/0x5d8
[  176.414674]  kasan_report+0xc8/0x118
[  176.415903]  kasan_check_range+0xe8/0x190
[  176.417128]  __kasan_check_write+0x20/0x30
[  176.418269]  kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[  176.419825]  kasan_bitops_generic+0xc0/0x148
[  176.421033]  kunit_try_run_case+0xf8/0x260
[  176.422229]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.423672]  kthread+0x18c/0x1a8
[  176.424669]  ret_from_fork+0x10/0x20
[  176.425780] 
[  176.426331] Allocated by task 207:
[  176.427306]  kasan_save_stack+0x3c/0x68
[  176.428465]  kasan_set_track+0x2c/0x40
[  176.429602]  kasan_save_alloc_info+0x24/0x38
[  176.430792]  __kasan_kmalloc+0xd4/0xd8
[  176.431943]  kmalloc_trace+0x68/0x130
[  176.433015]  kasan_bitops_generic+0x98/0x148
[  176.434240]  kunit_try_run_case+0xf8/0x260
[  176.435414]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.436869]  kthread+0x18c/0x1a8
[  176.437856]  ret_from_fork+0x10/0x20
[  176.438957] 
[  176.439524] The buggy address belongs to the object at ffff0000c5beef40
[  176.439524]  which belongs to the cache kmalloc-16 of size 16
[  176.441863] The buggy address is located 8 bytes inside of
[  176.441863]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.444306] 
[  176.444929] The buggy address belongs to the physical page:
[  176.446160] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.448195] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.449819] page_type: 0xffffffff()
[  176.450860] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.452572] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.454207] page dumped because: kasan: bad access detected
[  176.455478] 
[  176.456071] Memory state around the buggy address:
[  176.457262]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.458894]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.460498] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.462080]                                               ^
[  176.463437]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.465104]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.466651] ==================================================================
---
[  176.678613] ==================================================================
[  176.680415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[  176.682301] Write of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.683925] 
[  176.684517] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.686387] Hardware name: linux,dummy-virt (DT)
[  176.687503] Call trace:
[  176.688263]  dump_backtrace+0x9c/0x128
[  176.689369]  show_stack+0x20/0x38
[  176.690381]  dump_stack_lvl+0x60/0xb0
[  176.691525]  print_report+0xf8/0x5d8
[  176.692665]  kasan_report+0xc8/0x118
[  176.693824]  kasan_check_range+0xe8/0x190
[  176.695062]  __kasan_check_write+0x20/0x30
[  176.696213]  kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[  176.697764]  kasan_bitops_generic+0xc0/0x148
[  176.698984]  kunit_try_run_case+0xf8/0x260
[  176.700194]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.701627]  kthread+0x18c/0x1a8
[  176.702600]  ret_from_fork+0x10/0x20
[  176.703695] 
[  176.704235] Allocated by task 207:
[  176.705134]  kasan_save_stack+0x3c/0x68
[  176.706295]  kasan_set_track+0x2c/0x40
[  176.707403]  kasan_save_alloc_info+0x24/0x38
[  176.708698]  __kasan_kmalloc+0xd4/0xd8
[  176.709862]  kmalloc_trace+0x68/0x130
[  176.710923]  kasan_bitops_generic+0x98/0x148
[  176.712117]  kunit_try_run_case+0xf8/0x260
[  176.713310]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.714771]  kthread+0x18c/0x1a8
[  176.715994]  ret_from_fork+0x10/0x20
[  176.716903] 
[  176.717424] The buggy address belongs to the object at ffff0000c5beef40
[  176.717424]  which belongs to the cache kmalloc-16 of size 16
[  176.720189] The buggy address is located 8 bytes inside of
[  176.720189]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.722652] 
[  176.723223] The buggy address belongs to the physical page:
[  176.724539] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.726538] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.728115] page_type: 0xffffffff()
[  176.729181] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.730890] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.732502] page dumped because: kasan: bad access detected
[  176.733769] 
[  176.734321] Memory state around the buggy address:
[  176.735531]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.737156]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.738773] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.740337]                                               ^
[  176.741657]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.743275]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.744852] ==================================================================

test log snippet boot parser 14

Home

[  176.608218] ==================================================================
[  176.609659] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[  176.611663] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.613557] 
[  176.614081] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.617250] Hardware name: linux,dummy-virt (DT)
[  176.619085] Call trace:
[  176.620010]  dump_backtrace+0x9c/0x128
[  176.621182]  show_stack+0x20/0x38
[  176.622240]  dump_stack_lvl+0x60/0xb0
[  176.623456]  print_report+0xf8/0x5d8
[  176.624677]  kasan_report+0xc8/0x118
[  176.625853]  __asan_load8+0x9c/0xc0
[  176.627030]  kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[  176.628622]  kasan_bitops_generic+0xc0/0x148
[  176.629964]  kunit_try_run_case+0xf8/0x260
[  176.631016]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.632585]  kthread+0x18c/0x1a8
[  176.633573]  ret_from_fork+0x10/0x20
[  176.634675] 
[  176.635258] Allocated by task 207:
[  176.636218]  kasan_save_stack+0x3c/0x68
[  176.637379]  kasan_set_track+0x2c/0x40
[  176.638523]  kasan_save_alloc_info+0x24/0x38
[  176.639813]  __kasan_kmalloc+0xd4/0xd8
[  176.640954]  kmalloc_trace+0x68/0x130
[  176.642019]  kasan_bitops_generic+0x98/0x148
[  176.643235]  kunit_try_run_case+0xf8/0x260
[  176.644460]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.645927]  kthread+0x18c/0x1a8
[  176.646915]  ret_from_fork+0x10/0x20
[  176.648027] 
[  176.648609] The buggy address belongs to the object at ffff0000c5beef40
[  176.648609]  which belongs to the cache kmalloc-16 of size 16
[  176.651008] The buggy address is located 8 bytes inside of
[  176.651008]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.653498] 
[  176.654089] The buggy address belongs to the physical page:
[  176.655424] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.657380] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.658956] page_type: 0xffffffff()
[  176.660057] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.661759] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.663391] page dumped because: kasan: bad access detected
[  176.664696] 
[  176.665273] Memory state around the buggy address:
[  176.666498]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.668113]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.669751] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.671302]                                               ^
[  176.672584]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.674201]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.675759] ==================================================================
---
[  176.816809] ==================================================================
[  176.818309] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[  176.820381] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.821862] 
[  176.823053] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.825097] Hardware name: linux,dummy-virt (DT)
[  176.826185] Call trace:
[  176.826940]  dump_backtrace+0x9c/0x128
[  176.828073]  show_stack+0x20/0x38
[  176.829099]  dump_stack_lvl+0x60/0xb0
[  176.830252]  print_report+0xf8/0x5d8
[  176.831387]  kasan_report+0xc8/0x118
[  176.832509]  __asan_load8+0x9c/0xc0
[  176.833610]  kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[  176.835202]  kasan_bitops_generic+0xc0/0x148
[  176.836473]  kunit_try_run_case+0xf8/0x260
[  176.837656]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.839121]  kthread+0x18c/0x1a8
[  176.840121]  ret_from_fork+0x10/0x20
[  176.841219] 
[  176.841794] Allocated by task 207:
[  176.842759]  kasan_save_stack+0x3c/0x68
[  176.843908]  kasan_set_track+0x2c/0x40
[  176.845024]  kasan_save_alloc_info+0x24/0x38
[  176.846298]  __kasan_kmalloc+0xd4/0xd8
[  176.847441]  kmalloc_trace+0x68/0x130
[  176.848511]  kasan_bitops_generic+0x98/0x148
[  176.849737]  kunit_try_run_case+0xf8/0x260
[  176.850938]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.852426]  kthread+0x18c/0x1a8
[  176.853432]  ret_from_fork+0x10/0x20
[  176.854516] 
[  176.855142] The buggy address belongs to the object at ffff0000c5beef40
[  176.855142]  which belongs to the cache kmalloc-16 of size 16
[  176.857649] The buggy address is located 8 bytes inside of
[  176.857649]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.860167] 
[  176.860817] The buggy address belongs to the physical page:
[  176.862085] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.864107] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.865709] page_type: 0xffffffff()
[  176.866953] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.868647] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.870265] page dumped because: kasan: bad access detected
[  176.871573] 
[  176.872229] Memory state around the buggy address:
[  176.873759]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.875340]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.877063] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.878870]                                               ^
[  176.880142]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.881811]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.883373] ==================================================================
---
[  176.747756] ==================================================================
[  176.749318] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[  176.751294] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.753099] 
[  176.753745] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.755517] Hardware name: linux,dummy-virt (DT)
[  176.756656] Call trace:
[  176.757399]  dump_backtrace+0x9c/0x128
[  176.758491]  show_stack+0x20/0x38
[  176.759499]  dump_stack_lvl+0x60/0xb0
[  176.760665]  print_report+0xf8/0x5d8
[  176.761811]  kasan_report+0xc8/0x118
[  176.762924]  __asan_load8+0x9c/0xc0
[  176.764069]  kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[  176.765621]  kasan_bitops_generic+0xc0/0x148
[  176.766840]  kunit_try_run_case+0xf8/0x260
[  176.768070]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.769509]  kthread+0x18c/0x1a8
[  176.770488]  ret_from_fork+0x10/0x20
[  176.771553] 
[  176.772143] Allocated by task 207:
[  176.773087]  kasan_save_stack+0x3c/0x68
[  176.774266]  kasan_set_track+0x2c/0x40
[  176.775405]  kasan_save_alloc_info+0x24/0x38
[  176.776682]  __kasan_kmalloc+0xd4/0xd8
[  176.777848]  kmalloc_trace+0x68/0x130
[  176.778922]  kasan_bitops_generic+0x98/0x148
[  176.780147]  kunit_try_run_case+0xf8/0x260
[  176.781348]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.782813]  kthread+0x18c/0x1a8
[  176.783816]  ret_from_fork+0x10/0x20
[  176.784924] 
[  176.785494] The buggy address belongs to the object at ffff0000c5beef40
[  176.785494]  which belongs to the cache kmalloc-16 of size 16
[  176.787956] The buggy address is located 8 bytes inside of
[  176.787956]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.790393] 
[  176.791036] The buggy address belongs to the physical page:
[  176.792338] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.794285] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.795884] page_type: 0xffffffff()
[  176.796986] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.798690] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.800332] page dumped because: kasan: bad access detected
[  176.801572] 
[  176.802105] Memory state around the buggy address:
[  176.803336]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.804978]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.806572] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.808149]                                               ^
[  176.809503]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.811127]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.812648] ==================================================================
---
[  176.469346] ==================================================================
[  176.470944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[  176.473039] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.474853] 
[  176.475534] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.477343] Hardware name: linux,dummy-virt (DT)
[  176.478481] Call trace:
[  176.479279]  dump_backtrace+0x9c/0x128
[  176.480416]  show_stack+0x20/0x38
[  176.481450]  dump_stack_lvl+0x60/0xb0
[  176.482643]  print_report+0xf8/0x5d8
[  176.483925]  kasan_report+0xc8/0x118
[  176.485144]  __asan_load8+0x9c/0xc0
[  176.486383]  kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[  176.488186]  kasan_bitops_generic+0xc0/0x148
[  176.489401]  kunit_try_run_case+0xf8/0x260
[  176.490697]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.492196]  kthread+0x18c/0x1a8
[  176.493209]  ret_from_fork+0x10/0x20
[  176.494363] 
[  176.494995] Allocated by task 207:
[  176.496000]  kasan_save_stack+0x3c/0x68
[  176.497184]  kasan_set_track+0x2c/0x40
[  176.498361]  kasan_save_alloc_info+0x24/0x38
[  176.499625]  __kasan_kmalloc+0xd4/0xd8
[  176.500803]  kmalloc_trace+0x68/0x130
[  176.501866]  kasan_bitops_generic+0x98/0x148
[  176.503097]  kunit_try_run_case+0xf8/0x260
[  176.504294]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.505714]  kthread+0x18c/0x1a8
[  176.506694]  ret_from_fork+0x10/0x20
[  176.507919] 
[  176.508459] The buggy address belongs to the object at ffff0000c5beef40
[  176.508459]  which belongs to the cache kmalloc-16 of size 16
[  176.510498] The buggy address is located 8 bytes inside of
[  176.510498]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.513502] 
[  176.514142] The buggy address belongs to the physical page:
[  176.515395] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.517347] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.518921] page_type: 0xffffffff()
[  176.519992] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.521691] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.523311] page dumped because: kasan: bad access detected
[  176.524628] 
[  176.525174] Memory state around the buggy address:
[  176.526440]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.528062]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.529693] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.531258]                                               ^
[  176.532601]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.534184]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.535808] ==================================================================
---
[  176.329080] ==================================================================
[  176.330487] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[  176.332429] Read of size 8 at addr ffff0000c5beef48 by task kunit_try_catch/207
[  176.334074] 
[  176.334695] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.336528] Hardware name: linux,dummy-virt (DT)
[  176.337633] Call trace:
[  176.338335]  dump_backtrace+0x9c/0x128
[  176.339456]  show_stack+0x20/0x38
[  176.340461]  dump_stack_lvl+0x60/0xb0
[  176.341599]  print_report+0xf8/0x5d8
[  176.342717]  kasan_report+0xc8/0x118
[  176.343860]  __asan_load8+0x9c/0xc0
[  176.345166]  kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[  176.346703]  kasan_bitops_generic+0xc0/0x148
[  176.347993]  kunit_try_run_case+0xf8/0x260
[  176.350935]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.352528]  kthread+0x18c/0x1a8
[  176.353385]  ret_from_fork+0x10/0x20
[  176.354694] 
[  176.355349] Allocated by task 207:
[  176.356358]  kasan_save_stack+0x3c/0x68
[  176.357513]  kasan_set_track+0x2c/0x40
[  176.358643]  kasan_save_alloc_info+0x24/0x38
[  176.359933]  __kasan_kmalloc+0xd4/0xd8
[  176.361069]  kmalloc_trace+0x68/0x130
[  176.362158]  kasan_bitops_generic+0x98/0x148
[  176.363347]  kunit_try_run_case+0xf8/0x260
[  176.364545]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  176.366006]  kthread+0x18c/0x1a8
[  176.366980]  ret_from_fork+0x10/0x20
[  176.368078] 
[  176.368622] The buggy address belongs to the object at ffff0000c5beef40
[  176.368622]  which belongs to the cache kmalloc-16 of size 16
[  176.370986] The buggy address is located 8 bytes inside of
[  176.370986]  allocated 9-byte region [ffff0000c5beef40, ffff0000c5beef49)
[  176.373347] 
[  176.374012] The buggy address belongs to the physical page:
[  176.375285] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  176.377248] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  176.378930] page_type: 0xffffffff()
[  176.380017] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  176.381704] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  176.383313] page dumped because: kasan: bad access detected
[  176.384598] 
[  176.385146] Memory state around the buggy address:
[  176.386373]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  176.388018]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  176.389614] >ffff0000c5beef00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  176.391161]                                               ^
[  176.392507]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  176.394146]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  176.395691] ==================================================================

test log snippet boot parser 15

Home

[  170.254893] ==================================================================
[  170.256937] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x1e0
[  170.258825] Write of size 1 at addr ffff0000c585df00 by task kunit_try_catch/133
[  170.261300] 
[  170.262086] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.263953] Hardware name: linux,dummy-virt (DT)
[  170.265159] Call trace:
[  170.265868]  dump_backtrace+0x9c/0x128
[  170.267186]  show_stack+0x20/0x38
[  170.268582]  dump_stack_lvl+0x60/0xb0
[  170.269968]  print_report+0xf8/0x5d8
[  170.271271]  kasan_report+0xc8/0x118
[  170.272501]  __asan_store1+0x60/0x70
[  170.273962]  kmalloc_large_oob_right+0xc8/0x1e0
[  170.275598]  kunit_try_run_case+0xf8/0x260
[  170.276998]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.278465]  kthread+0x18c/0x1a8
[  170.279683]  ret_from_fork+0x10/0x20
[  170.280842] 
[  170.281457] Allocated by task 133:
[  170.282428]  kasan_save_stack+0x3c/0x68
[  170.283577]  kasan_set_track+0x2c/0x40
[  170.285078]  kasan_save_alloc_info+0x24/0x38
[  170.286380]  __kasan_kmalloc+0xd4/0xd8
[  170.287823]  kmalloc_trace+0x68/0x130
[  170.288954]  kmalloc_large_oob_right+0x9c/0x1e0
[  170.290292]  kunit_try_run_case+0xf8/0x260
[  170.291868]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.293297]  kthread+0x18c/0x1a8
[  170.294377]  ret_from_fork+0x10/0x20
[  170.295662] 
[  170.296486] The buggy address belongs to the object at ffff0000c585c000
[  170.296486]  which belongs to the cache kmalloc-8k of size 8192
[  170.299251] The buggy address is located 0 bytes to the right of
[  170.299251]  allocated 7936-byte region [ffff0000c585c000, ffff0000c585df00)
[  170.302233] 
[  170.302884] The buggy address belongs to the physical page:
[  170.304216] page:00000000be39d8dd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105858
[  170.306244] head:00000000be39d8dd order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.307923] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.309577] page_type: 0xffffffff()
[  170.310898] raw: 0bfffc0000000840 ffff0000c0002280 dead000000000122 0000000000000000
[  170.313105] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  170.314814] page dumped because: kasan: bad access detected
[  170.316060] 
[  170.316926] Memory state around the buggy address:
[  170.318246]  ffff0000c585de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.319886]  ffff0000c585de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.321818] >ffff0000c585df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.323607]                    ^
[  170.324380]  ffff0000c585df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.326110]  ffff0000c585e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.327654] ==================================================================

test log snippet boot parser 16

Home

[  172.305782] ==================================================================
[  172.308319] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe0/0x1f8
[  172.310705] Read of size 64 at addr ffff0000c5f7ca84 by task kunit_try_catch/161
[  172.312513] 
[  172.313066] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.314894] Hardware name: linux,dummy-virt (DT)
[  172.316607] Call trace:
[  172.317475]  dump_backtrace+0x9c/0x128
[  172.318538]  show_stack+0x20/0x38
[  172.319560]  dump_stack_lvl+0x60/0xb0
[  172.321130]  print_report+0xf8/0x5d8
[  172.322083]  kasan_report+0xc8/0x118
[  172.323653]  kasan_check_range+0xe8/0x190
[  172.325166]  __asan_memmove+0x3c/0x98
[  172.326044]  kmalloc_memmove_invalid_size+0xe0/0x1f8
[  172.328304]  kunit_try_run_case+0xf8/0x260
[  172.329535]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.330967]  kthread+0x18c/0x1a8
[  172.332014]  ret_from_fork+0x10/0x20
[  172.332929] 
[  172.333368] Allocated by task 161:
[  172.334561]  kasan_save_stack+0x3c/0x68
[  172.336789]  kasan_set_track+0x2c/0x40
[  172.337932]  kasan_save_alloc_info+0x24/0x38
[  172.339308]  __kasan_kmalloc+0xd4/0xd8
[  172.340619]  kmalloc_trace+0x68/0x130
[  172.341648]  kmalloc_memmove_invalid_size+0xa0/0x1f8
[  172.342965]  kunit_try_run_case+0xf8/0x260
[  172.344129]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.345778]  kthread+0x18c/0x1a8
[  172.346760]  ret_from_fork+0x10/0x20
[  172.348067] 
[  172.348524] The buggy address belongs to the object at ffff0000c5f7ca80
[  172.348524]  which belongs to the cache kmalloc-64 of size 64
[  172.351196] The buggy address is located 4 bytes inside of
[  172.351196]  allocated 64-byte region [ffff0000c5f7ca80, ffff0000c5f7cac0)
[  172.354219] 
[  172.354810] The buggy address belongs to the physical page:
[  172.356117] page:00000000c9fbfb33 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[  172.358283] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.360222] page_type: 0xffffffff()
[  172.361290] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  172.363035] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  172.364790] page dumped because: kasan: bad access detected
[  172.366314] 
[  172.366785] Memory state around the buggy address:
[  172.367766]  ffff0000c5f7c980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  172.369939]  ffff0000c5f7ca00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  172.371837] >ffff0000c5f7ca80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  172.373405]                                            ^
[  172.374763]  ffff0000c5f7cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.376873]  ffff0000c5f7cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.378483] ==================================================================

test log snippet boot parser 17

Home

[  169.842528] ==================================================================
[  169.845017] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[  169.846619] Read of size 1 at addr ffff0000c6011000 by task kunit_try_catch/121
[  169.848258] 
[  169.849465] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  169.851293] Hardware name: linux,dummy-virt (DT)
[  169.852331] Call trace:
[  169.853159]  dump_backtrace+0x9c/0x128
[  169.854317]  show_stack+0x20/0x38
[  169.855345]  dump_stack_lvl+0x60/0xb0
[  169.856558]  print_report+0xf8/0x5d8
[  169.857801]  kasan_report+0xc8/0x118
[  169.858963]  __asan_load1+0x60/0x70
[  169.860460]  kmalloc_node_oob_right+0xd0/0x1f0
[  169.861658]  kunit_try_run_case+0xf8/0x260
[  169.862881]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.864437]  kthread+0x18c/0x1a8
[  169.865417]  ret_from_fork+0x10/0x20
[  169.866361] 
[  169.866821] Allocated by task 121:
[  169.868144]  kasan_save_stack+0x3c/0x68
[  169.869483]  kasan_set_track+0x2c/0x40
[  169.870689]  kasan_save_alloc_info+0x24/0x38
[  169.872336]  __kasan_kmalloc+0xd4/0xd8
[  169.873523]  kmalloc_node_trace+0x64/0x130
[  169.874763]  kmalloc_node_oob_right+0xa4/0x1f0
[  169.876159]  kunit_try_run_case+0xf8/0x260
[  169.877524]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.879148]  kthread+0x18c/0x1a8
[  169.880329]  ret_from_fork+0x10/0x20
[  169.881460] 
[  169.882009] The buggy address belongs to the object at ffff0000c6010000
[  169.882009]  which belongs to the cache kmalloc-4k of size 4096
[  169.884842] The buggy address is located 0 bytes to the right of
[  169.884842]  allocated 4096-byte region [ffff0000c6010000, ffff0000c6011000)
[  169.887939] 
[  169.888329] The buggy address belongs to the physical page:
[  169.889147] page:000000006e8c73fb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106010
[  169.891325] head:000000006e8c73fb order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  169.893137] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  169.894636] page_type: 0xffffffff()
[  169.896011] raw: 0bfffc0000000840 ffff0000c0002140 dead000000000122 0000000000000000
[  169.898139] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  169.900108] page dumped because: kasan: bad access detected
[  169.901465] 
[  169.902112] Memory state around the buggy address:
[  169.903408]  ffff0000c6010f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  169.905541]  ffff0000c6010f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  169.907328] >ffff0000c6011000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.908946]                    ^
[  169.910056]  ffff0000c6011080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.911829]  ffff0000c6011100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.913597] ==================================================================

test log snippet boot parser 18

Home

[  171.565338] ==================================================================
[  171.567881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x268
[  171.569173] Write of size 16 at addr ffff0000c5902340 by task kunit_try_catch/145
[  171.570952] 
[  171.571660] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.573968] Hardware name: linux,dummy-virt (DT)
[  171.575310] Call trace:
[  171.576234]  dump_backtrace+0x9c/0x128
[  171.577313]  show_stack+0x20/0x38
[  171.578452]  dump_stack_lvl+0x60/0xb0
[  171.579702]  print_report+0xf8/0x5d8
[  171.580820]  kasan_report+0xc8/0x118
[  171.582039]  __asan_store16+0xa4/0xa8
[  171.583453]  kmalloc_oob_16+0xf8/0x268
[  171.585045]  kunit_try_run_case+0xf8/0x260
[  171.586022]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.587669]  kthread+0x18c/0x1a8
[  171.588875]  ret_from_fork+0x10/0x20
[  171.590037] 
[  171.590587] Allocated by task 145:
[  171.591694]  kasan_save_stack+0x3c/0x68
[  171.593030]  kasan_set_track+0x2c/0x40
[  171.594217]  kasan_save_alloc_info+0x24/0x38
[  171.595681]  __kasan_kmalloc+0xd4/0xd8
[  171.596875]  kmalloc_trace+0x68/0x130
[  171.597952]  kmalloc_oob_16+0xa4/0x268
[  171.599044]  kunit_try_run_case+0xf8/0x260
[  171.600220]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.601881]  kthread+0x18c/0x1a8
[  171.602855]  ret_from_fork+0x10/0x20
[  171.604211] 
[  171.604827] The buggy address belongs to the object at ffff0000c5902340
[  171.604827]  which belongs to the cache kmalloc-16 of size 16
[  171.607321] The buggy address is located 0 bytes inside of
[  171.607321]  allocated 13-byte region [ffff0000c5902340, ffff0000c590234d)
[  171.609842] 
[  171.610435] The buggy address belongs to the physical page:
[  171.612014] page:000000000435baa8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105902
[  171.613571] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  171.615356] page_type: 0xffffffff()
[  171.616701] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  171.618249] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  171.619936] page dumped because: kasan: bad access detected
[  171.621486] 
[  171.622007] Memory state around the buggy address:
[  171.623313]  ffff0000c5902200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  171.625349]  ffff0000c5902280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  171.627242] >ffff0000c5902300: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[  171.628994]                                               ^
[  171.630323]  ffff0000c5902380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.632040]  ffff0000c5902400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.633508] ==================================================================

test log snippet boot parser 19

Home

[  171.765927] ==================================================================
[  171.767927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd4/0x1e8
[  171.769611] Write of size 128 at addr ffff0000c5ed2e00 by task kunit_try_catch/149
[  171.771236] 
[  171.771954] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.773849] Hardware name: linux,dummy-virt (DT)
[  171.774961] Call trace:
[  171.775613]  dump_backtrace+0x9c/0x128
[  171.776763]  show_stack+0x20/0x38
[  171.777775]  dump_stack_lvl+0x60/0xb0
[  171.778924]  print_report+0xf8/0x5d8
[  171.780060]  kasan_report+0xc8/0x118
[  171.781180]  kasan_check_range+0xe8/0x190
[  171.782390]  __asan_memset+0x34/0x78
[  171.783433]  kmalloc_oob_in_memset+0xd4/0x1e8
[  171.784668]  kunit_try_run_case+0xf8/0x260
[  171.785883]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.787335]  kthread+0x18c/0x1a8
[  171.788344]  ret_from_fork+0x10/0x20
[  171.789424] 
[  171.789952] Allocated by task 149:
[  171.790912]  kasan_save_stack+0x3c/0x68
[  171.792068]  kasan_set_track+0x2c/0x40
[  171.793207]  kasan_save_alloc_info+0x24/0x38
[  171.794455]  __kasan_kmalloc+0xd4/0xd8
[  171.795591]  kmalloc_trace+0x68/0x130
[  171.796683]  kmalloc_oob_in_memset+0xa0/0x1e8
[  171.797916]  kunit_try_run_case+0xf8/0x260
[  171.799126]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.800592]  kthread+0x18c/0x1a8
[  171.801558]  ret_from_fork+0x10/0x20
[  171.802633] 
[  171.803158] The buggy address belongs to the object at ffff0000c5ed2e00
[  171.803158]  which belongs to the cache kmalloc-128 of size 128
[  171.805632] The buggy address is located 0 bytes inside of
[  171.805632]  allocated 120-byte region [ffff0000c5ed2e00, ffff0000c5ed2e78)
[  171.808065] 
[  171.808605] The buggy address belongs to the physical page:
[  171.809905] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[  171.811916] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  171.813471] page_type: 0xffffffff()
[  171.814514] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  171.816251] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  171.817884] page dumped because: kasan: bad access detected
[  171.819155] 
[  171.819683] Memory state around the buggy address:
[  171.820934]  ffff0000c5ed2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  171.822515]  ffff0000c5ed2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.824123] >ffff0000c5ed2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  171.825645]                                                                 ^
[  171.827253]  ffff0000c5ed2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.828869]  ffff0000c5ed2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.830381] ==================================================================

test log snippet boot parser 20

Home

[  169.754951] ==================================================================
[  169.757235] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc8/0x1f0
[  169.758796] Read of size 1 at addr ffff0000c5beeedf by task kunit_try_catch/119
[  169.760641] 
[  169.761323] CPU: 1 PID: 119 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  169.762785] Hardware name: linux,dummy-virt (DT)
[  169.763365] Call trace:
[  169.763778]  dump_backtrace+0x9c/0x128
[  169.765050]  show_stack+0x20/0x38
[  169.766110]  dump_stack_lvl+0x60/0xb0
[  169.767309]  print_report+0xf8/0x5d8
[  169.768432]  kasan_report+0xc8/0x118
[  169.769513]  __asan_load1+0x60/0x70
[  169.770620]  kmalloc_oob_left+0xc8/0x1f0
[  169.771823]  kunit_try_run_case+0xf8/0x260
[  169.773069]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.774584]  kthread+0x18c/0x1a8
[  169.775620]  ret_from_fork+0x10/0x20
[  169.776749] 
[  169.777271] Allocated by task 29:
[  169.778157]  kasan_save_stack+0x3c/0x68
[  169.779305]  kasan_set_track+0x2c/0x40
[  169.780452]  kasan_save_alloc_info+0x24/0x38
[  169.781685]  __kasan_kmalloc+0xd4/0xd8
[  169.782824]  __kmalloc_node_track_caller+0x74/0x1d0
[  169.784111]  kvasprintf+0xcc/0x170
[  169.785140]  __kthread_create_on_node+0x11c/0x250
[  169.786435]  kthread_create_on_node+0xac/0xf0
[  169.787686]  create_worker+0x160/0x3b8
[  169.788778]  worker_thread+0x5d8/0x708
[  169.789858]  kthread+0x18c/0x1a8
[  169.790825]  ret_from_fork+0x10/0x20
[  169.791905] 
[  169.792444] The buggy address belongs to the object at ffff0000c5beeec0
[  169.792444]  which belongs to the cache kmalloc-16 of size 16
[  169.794805] The buggy address is located 19 bytes to the right of
[  169.794805]  allocated 12-byte region [ffff0000c5beeec0, ffff0000c5beeecc)
[  169.797287] 
[  169.797884] The buggy address belongs to the physical page:
[  169.799713] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  169.801755] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  169.803284] page_type: 0xffffffff()
[  169.805363] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  169.807046] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  169.809136] page dumped because: kasan: bad access detected
[  169.810054] 
[  169.810492] Memory state around the buggy address:
[  169.812491]  ffff0000c5beed80: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[  169.814115]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  169.816088] >ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[  169.817308]                                                     ^
[  169.819100]  ffff0000c5beef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.820854]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.822332] ==================================================================

test log snippet boot parser 21

Home

[  171.850562] ==================================================================
[  171.853141] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd8/0x1f0
[  171.854414] Write of size 2 at addr ffff0000c6054277 by task kunit_try_catch/151
[  171.856302] 
[  171.856944] CPU: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.859832] Hardware name: linux,dummy-virt (DT)
[  171.860673] Call trace:
[  171.861230]  dump_backtrace+0x9c/0x128
[  171.863872]  show_stack+0x20/0x38
[  171.864925]  dump_stack_lvl+0x60/0xb0
[  171.866178]  print_report+0xf8/0x5d8
[  171.867364]  kasan_report+0xc8/0x118
[  171.868774]  kasan_check_range+0xe8/0x190
[  171.869819]  __asan_memset+0x34/0x78
[  171.870887]  kmalloc_oob_memset_2+0xd8/0x1f0
[  171.872321]  kunit_try_run_case+0xf8/0x260
[  171.873344]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.874923]  kthread+0x18c/0x1a8
[  171.875862]  ret_from_fork+0x10/0x20
[  171.876946] 
[  171.877761] Allocated by task 151:
[  171.878865]  kasan_save_stack+0x3c/0x68
[  171.880139]  kasan_set_track+0x2c/0x40
[  171.881472]  kasan_save_alloc_info+0x24/0x38
[  171.882845]  __kasan_kmalloc+0xd4/0xd8
[  171.884040]  kmalloc_trace+0x68/0x130
[  171.885139]  kmalloc_oob_memset_2+0xa0/0x1f0
[  171.886631]  kunit_try_run_case+0xf8/0x260
[  171.888638]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.890164]  kthread+0x18c/0x1a8
[  171.891970]  ret_from_fork+0x10/0x20
[  171.893418] 
[  171.894010] The buggy address belongs to the object at ffff0000c6054200
[  171.894010]  which belongs to the cache kmalloc-128 of size 128
[  171.896803] The buggy address is located 119 bytes inside of
[  171.896803]  allocated 120-byte region [ffff0000c6054200, ffff0000c6054278)
[  171.899554] 
[  171.900655] The buggy address belongs to the physical page:
[  171.902281] page:00000000782541df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106054
[  171.904622] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  171.906239] page_type: 0xffffffff()
[  171.907741] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  171.909242] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  171.911082] page dumped because: kasan: bad access detected
[  171.912303] 
[  171.913005] Memory state around the buggy address:
[  171.914395]  ffff0000c6054100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  171.916284]  ffff0000c6054180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.918347] >ffff0000c6054200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  171.920239]                                                                 ^
[  171.921698]  ffff0000c6054280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.923392]  ffff0000c6054300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.925430] ==================================================================

test log snippet boot parser 22

Home

[  172.126654] ==================================================================
[  172.128753] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x1e8
[  172.130339] Write of size 16 at addr ffff0000c6054569 by task kunit_try_catch/157
[  172.131960] 
[  172.132642] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.134468] Hardware name: linux,dummy-virt (DT)
[  172.135569] Call trace:
[  172.136288]  dump_backtrace+0x9c/0x128
[  172.137350]  show_stack+0x20/0x38
[  172.138369]  dump_stack_lvl+0x60/0xb0
[  172.139497]  print_report+0xf8/0x5d8
[  172.140609]  kasan_report+0xc8/0x118
[  172.141737]  kasan_check_range+0xe8/0x190
[  172.142973]  __asan_memset+0x34/0x78
[  172.144009]  kmalloc_oob_memset_16+0xd8/0x1e8
[  172.145217]  kunit_try_run_case+0xf8/0x260
[  172.146421]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.147815]  kthread+0x18c/0x1a8
[  172.148809]  ret_from_fork+0x10/0x20
[  172.149913] 
[  172.150451] Allocated by task 157:
[  172.151363]  kasan_save_stack+0x3c/0x68
[  172.152515]  kasan_set_track+0x2c/0x40
[  172.153643]  kasan_save_alloc_info+0x24/0x38
[  172.154893]  __kasan_kmalloc+0xd4/0xd8
[  172.156025]  kmalloc_trace+0x68/0x130
[  172.157123]  kmalloc_oob_memset_16+0xa0/0x1e8
[  172.158329]  kunit_try_run_case+0xf8/0x260
[  172.159528]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.160982]  kthread+0x18c/0x1a8
[  172.161976]  ret_from_fork+0x10/0x20
[  172.163053] 
[  172.163546] The buggy address belongs to the object at ffff0000c6054500
[  172.163546]  which belongs to the cache kmalloc-128 of size 128
[  172.167046] The buggy address is located 105 bytes inside of
[  172.167046]  allocated 120-byte region [ffff0000c6054500, ffff0000c6054578)
[  172.169388] 
[  172.169904] The buggy address belongs to the physical page:
[  172.171091] page:00000000782541df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106054
[  172.173714] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.175309] page_type: 0xffffffff()
[  172.176332] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  172.178050] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  172.179662] page dumped because: kasan: bad access detected
[  172.180983] 
[  172.181512] Memory state around the buggy address:
[  172.182753]  ffff0000c6054400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  172.184351]  ffff0000c6054480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.185947] >ffff0000c6054500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  172.187455]                                                                 ^
[  172.189034]  ffff0000c6054580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.190653]  ffff0000c6054600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.192194] ==================================================================
---
[  172.042016] ==================================================================
[  172.044383] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8
[  172.045971] Write of size 8 at addr ffff0000c6054471 by task kunit_try_catch/155
[  172.047892] 
[  172.048590] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.050573] Hardware name: linux,dummy-virt (DT)
[  172.052171] Call trace:
[  172.053045]  dump_backtrace+0x9c/0x128
[  172.054155]  show_stack+0x20/0x38
[  172.055148]  dump_stack_lvl+0x60/0xb0
[  172.056290]  print_report+0xf8/0x5d8
[  172.057397]  kasan_report+0xc8/0x118
[  172.058493]  kasan_check_range+0xe8/0x190
[  172.059691]  __asan_memset+0x34/0x78
[  172.060770]  kmalloc_oob_memset_8+0xd8/0x1e8
[  172.061980]  kunit_try_run_case+0xf8/0x260
[  172.063166]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.064597]  kthread+0x18c/0x1a8
[  172.065531]  ret_from_fork+0x10/0x20
[  172.066612] 
[  172.067169] Allocated by task 155:
[  172.068081]  kasan_save_stack+0x3c/0x68
[  172.069230]  kasan_set_track+0x2c/0x40
[  172.070334]  kasan_save_alloc_info+0x24/0x38
[  172.071567]  __kasan_kmalloc+0xd4/0xd8
[  172.072692]  kmalloc_trace+0x68/0x130
[  172.073768]  kmalloc_oob_memset_8+0xa0/0x1e8
[  172.074941]  kunit_try_run_case+0xf8/0x260
[  172.076153]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.077560]  kthread+0x18c/0x1a8
[  172.078522]  ret_from_fork+0x10/0x20
[  172.079579] 
[  172.080124] The buggy address belongs to the object at ffff0000c6054400
[  172.080124]  which belongs to the cache kmalloc-128 of size 128
[  172.082438] The buggy address is located 113 bytes inside of
[  172.082438]  allocated 120-byte region [ffff0000c6054400, ffff0000c6054478)
[  172.084980] 
[  172.085542] The buggy address belongs to the physical page:
[  172.086799] page:00000000782541df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106054
[  172.088683] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.090247] page_type: 0xffffffff()
[  172.091316] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  172.093002] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  172.094575] page dumped because: kasan: bad access detected
[  172.095974] 
[  172.096580] Memory state around the buggy address:
[  172.097760]  ffff0000c6054300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  172.099314]  ffff0000c6054380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.100916] >ffff0000c6054400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  172.102401]                                                                 ^
[  172.103966]  ffff0000c6054480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.105528]  ffff0000c6054500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.107068] ==================================================================

test log snippet boot parser 23

Home

[  171.948835] ==================================================================
[  171.951335] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x1e8
[  171.952951] Write of size 4 at addr ffff0000c6048075 by task kunit_try_catch/153
[  171.954590] 
[  171.955170] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.957272] Hardware name: linux,dummy-virt (DT)
[  171.958274] Call trace:
[  171.959445]  dump_backtrace+0x9c/0x128
[  171.960442]  show_stack+0x20/0x38
[  171.961453]  dump_stack_lvl+0x60/0xb0
[  171.962589]  print_report+0xf8/0x5d8
[  171.963859]  kasan_report+0xc8/0x118
[  171.965099]  kasan_check_range+0xe8/0x190
[  171.966389]  __asan_memset+0x34/0x78
[  171.967835]  kmalloc_oob_memset_4+0xd8/0x1e8
[  171.968971]  kunit_try_run_case+0xf8/0x260
[  171.970239]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.971661]  kthread+0x18c/0x1a8
[  171.972899]  ret_from_fork+0x10/0x20
[  171.974296] 
[  171.975059] Allocated by task 153:
[  171.976450]  kasan_save_stack+0x3c/0x68
[  171.977762]  kasan_set_track+0x2c/0x40
[  171.978964]  kasan_save_alloc_info+0x24/0x38
[  171.980206]  __kasan_kmalloc+0xd4/0xd8
[  171.981391]  kmalloc_trace+0x68/0x130
[  171.982471]  kmalloc_oob_memset_4+0xa0/0x1e8
[  171.983946]  kunit_try_run_case+0xf8/0x260
[  171.985043]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.986589]  kthread+0x18c/0x1a8
[  171.987565]  ret_from_fork+0x10/0x20
[  171.988756] 
[  171.989334] The buggy address belongs to the object at ffff0000c6048000
[  171.989334]  which belongs to the cache kmalloc-128 of size 128
[  171.992170] The buggy address is located 117 bytes inside of
[  171.992170]  allocated 120-byte region [ffff0000c6048000, ffff0000c6048078)
[  171.996017] 
[  171.997084] The buggy address belongs to the physical page:
[  171.998375] page:0000000002e4fb2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106048
[  172.000409] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.001843] page_type: 0xffffffff()
[  172.002999] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  172.005062] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  172.006690] page dumped because: kasan: bad access detected
[  172.008230] 
[  172.008793] Memory state around the buggy address:
[  172.009972]  ffff0000c6047f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  172.012162]  ffff0000c6047f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  172.013861] >ffff0000c6048000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  172.015649]                                                                 ^
[  172.017367]  ffff0000c6048080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.018985]  ffff0000c6048100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.020747] ==================================================================

test log snippet boot parser 24

Home

[  169.510815] ==================================================================
[  169.513179] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x308
[  169.516331] Write of size 1 at addr ffff0000c5ed2373 by task kunit_try_catch/117
[  169.517694] 
[  169.518910] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G                 N 6.6.72-rc1 #1
[  169.521215] Hardware name: linux,dummy-virt (DT)
[  169.522805] Call trace:
[  169.523561]  dump_backtrace+0x9c/0x128
[  169.525346]  show_stack+0x20/0x38
[  169.526401]  dump_stack_lvl+0x60/0xb0
[  169.527836]  print_report+0xf8/0x5d8
[  169.528992]  kasan_report+0xc8/0x118
[  169.530157]  __asan_store1+0x60/0x70
[  169.531397]  kmalloc_oob_right+0xc8/0x308
[  169.533130]  kunit_try_run_case+0xf8/0x260
[  169.534408]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.536259]  kthread+0x18c/0x1a8
[  169.537239]  ret_from_fork+0x10/0x20
[  169.538745] 
[  169.539365] Allocated by task 117:
[  169.540439]  kasan_save_stack+0x3c/0x68
[  169.542160]  kasan_set_track+0x2c/0x40
[  169.544048]  kasan_save_alloc_info+0x24/0x38
[  169.545394]  __kasan_kmalloc+0xd4/0xd8
[  169.546743]  kmalloc_trace+0x68/0x130
[  169.547875]  kmalloc_oob_right+0xa0/0x308
[  169.549660]  kunit_try_run_case+0xf8/0x260
[  169.551150]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.552795]  kthread+0x18c/0x1a8
[  169.554164]  ret_from_fork+0x10/0x20
[  169.556370] 
[  169.557383] The buggy address belongs to the object at ffff0000c5ed2300
[  169.557383]  which belongs to the cache kmalloc-128 of size 128
[  169.560186] The buggy address is located 0 bytes to the right of
[  169.560186]  allocated 115-byte region [ffff0000c5ed2300, ffff0000c5ed2373)
[  169.562677] 
[  169.563619] The buggy address belongs to the physical page:
[  169.565549] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[  169.568834] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  169.570419] page_type: 0xffffffff()
[  169.572694] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  169.574505] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  169.576442] page dumped because: kasan: bad access detected
[  169.577451] 
[  169.578025] Memory state around the buggy address:
[  169.580287]  ffff0000c5ed2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  169.581980]  ffff0000c5ed2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.583705] >ffff0000c5ed2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  169.585553]                                                              ^
[  169.587518]  ffff0000c5ed2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.589157]  ffff0000c5ed2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.590715] ==================================================================

test log snippet boot parser 25

Home

[  169.673843] ==================================================================
[  169.675521] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x118/0x308
[  169.677079] Read of size 1 at addr ffff0000c5ed2380 by task kunit_try_catch/117
[  169.678612] 
[  169.679209] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  169.681132] Hardware name: linux,dummy-virt (DT)
[  169.682055] Call trace:
[  169.682636]  dump_backtrace+0x9c/0x128
[  169.683560]  show_stack+0x20/0x38
[  169.684551]  dump_stack_lvl+0x60/0xb0
[  169.685748]  print_report+0xf8/0x5d8
[  169.686890]  kasan_report+0xc8/0x118
[  169.688037]  __asan_load1+0x60/0x70
[  169.689130]  kmalloc_oob_right+0x118/0x308
[  169.690292]  kunit_try_run_case+0xf8/0x260
[  169.691477]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.692987]  kthread+0x18c/0x1a8
[  169.693948]  ret_from_fork+0x10/0x20
[  169.695012] 
[  169.695495] Allocated by task 117:
[  169.696479]  kasan_save_stack+0x3c/0x68
[  169.697995]  kasan_set_track+0x2c/0x40
[  169.700202]  kasan_save_alloc_info+0x24/0x38
[  169.701637]  __kasan_kmalloc+0xd4/0xd8
[  169.702868]  kmalloc_trace+0x68/0x130
[  169.703929]  kmalloc_oob_right+0xa0/0x308
[  169.705088]  kunit_try_run_case+0xf8/0x260
[  169.706286]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.707739]  kthread+0x18c/0x1a8
[  169.708709]  ret_from_fork+0x10/0x20
[  169.709807] 
[  169.710303] The buggy address belongs to the object at ffff0000c5ed2300
[  169.710303]  which belongs to the cache kmalloc-128 of size 128
[  169.712625] The buggy address is located 13 bytes to the right of
[  169.712625]  allocated 115-byte region [ffff0000c5ed2300, ffff0000c5ed2373)
[  169.715221] 
[  169.715825] The buggy address belongs to the physical page:
[  169.717144] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[  169.719098] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  169.720664] page_type: 0xffffffff()
[  169.721708] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  169.723414] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  169.725045] page dumped because: kasan: bad access detected
[  169.726321] 
[  169.726840] Memory state around the buggy address:
[  169.728058]  ffff0000c5ed2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.729661]  ffff0000c5ed2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  169.731323] >ffff0000c5ed2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.732857]                    ^
[  169.733768]  ffff0000c5ed2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.735356]  ffff0000c5ed2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.736891] ==================================================================

test log snippet boot parser 26

Home

[  169.599263] ==================================================================
[  169.600848] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xf0/0x308
[  169.603176] Write of size 1 at addr ffff0000c5ed2378 by task kunit_try_catch/117
[  169.605871] 
[  169.606660] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  169.608774] Hardware name: linux,dummy-virt (DT)
[  169.609868] Call trace:
[  169.610605]  dump_backtrace+0x9c/0x128
[  169.611800]  show_stack+0x20/0x38
[  169.612943]  dump_stack_lvl+0x60/0xb0
[  169.614140]  print_report+0xf8/0x5d8
[  169.615269]  kasan_report+0xc8/0x118
[  169.616418]  __asan_store1+0x60/0x70
[  169.617879]  kmalloc_oob_right+0xf0/0x308
[  169.619543]  kunit_try_run_case+0xf8/0x260
[  169.620744]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.622185]  kthread+0x18c/0x1a8
[  169.623337]  ret_from_fork+0x10/0x20
[  169.624274] 
[  169.625086] Allocated by task 117:
[  169.626052]  kasan_save_stack+0x3c/0x68
[  169.627394]  kasan_set_track+0x2c/0x40
[  169.628589]  kasan_save_alloc_info+0x24/0x38
[  169.629852]  __kasan_kmalloc+0xd4/0xd8
[  169.630964]  kmalloc_trace+0x68/0x130
[  169.632017]  kmalloc_oob_right+0xa0/0x308
[  169.633165]  kunit_try_run_case+0xf8/0x260
[  169.634379]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.635865]  kthread+0x18c/0x1a8
[  169.636922]  ret_from_fork+0x10/0x20
[  169.637999] 
[  169.638505] The buggy address belongs to the object at ffff0000c5ed2300
[  169.638505]  which belongs to the cache kmalloc-128 of size 128
[  169.641347] The buggy address is located 5 bytes to the right of
[  169.641347]  allocated 115-byte region [ffff0000c5ed2300, ffff0000c5ed2373)
[  169.644243] 
[  169.644877] The buggy address belongs to the physical page:
[  169.646159] page:00000000962b566f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed2
[  169.648622] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  169.650230] page_type: 0xffffffff()
[  169.651716] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  169.653383] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  169.655223] page dumped because: kasan: bad access detected
[  169.656801] 
[  169.657372] Memory state around the buggy address:
[  169.658581]  ffff0000c5ed2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  169.660286]  ffff0000c5ed2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.661554] >ffff0000c5ed2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  169.663779]                                                                 ^
[  169.665512]  ffff0000c5ed2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.667337]  ffff0000c5ed2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  169.668874] ==================================================================

test log snippet boot parser 27

Home

[  169.940982] ==================================================================
[  169.943938] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xac/0x1c0
[  169.945534] Write of size 1 at addr ffff0000c5f1600a by task kunit_try_catch/123
[  169.948063] 
[  169.948867] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  169.950986] Hardware name: linux,dummy-virt (DT)
[  169.952286] Call trace:
[  169.952961]  dump_backtrace+0x9c/0x128
[  169.953888]  show_stack+0x20/0x38
[  169.955152]  dump_stack_lvl+0x60/0xb0
[  169.956665]  print_report+0xf8/0x5d8
[  169.957967]  kasan_report+0xc8/0x118
[  169.959373]  __asan_store1+0x60/0x70
[  169.960620]  kmalloc_pagealloc_oob_right+0xac/0x1c0
[  169.962237]  kunit_try_run_case+0xf8/0x260
[  169.963808]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  169.965226]  kthread+0x18c/0x1a8
[  169.966039]  ret_from_fork+0x10/0x20
[  169.967444] 
[  169.968115] The buggy address belongs to the physical page:
[  169.969624] page:0000000020943f65 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f14
[  169.971923] head:0000000020943f65 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  169.973343] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  169.974889] page_type: 0xffffffff()
[  169.976447] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  169.978376] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  169.980738] page dumped because: kasan: bad access detected
[  169.981680] 
[  169.982254] Memory state around the buggy address:
[  169.983712]  ffff0000c5f15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  169.985364]  ffff0000c5f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  169.986995] >ffff0000c5f16000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  169.988453]                       ^
[  169.990096]  ffff0000c5f16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  169.991886]  ffff0000c5f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  169.993593] ==================================================================

test log snippet boot parser 28

Home

[  172.805229] ==================================================================
[  172.807333] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd8/0x268
[  172.809258] Read of size 1 at addr ffff0000c5f320c8 by task kunit_try_catch/175
[  172.810948] 
[  172.811490] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.813477] Hardware name: linux,dummy-virt (DT)
[  172.814581] Call trace:
[  172.815406]  dump_backtrace+0x9c/0x128
[  172.816786]  show_stack+0x20/0x38
[  172.817813]  dump_stack_lvl+0x60/0xb0
[  172.818976]  print_report+0xf8/0x5d8
[  172.820329]  kasan_report+0xc8/0x118
[  172.821547]  __asan_load1+0x60/0x70
[  172.822644]  kmem_cache_oob+0xd8/0x268
[  172.823832]  kunit_try_run_case+0xf8/0x260
[  172.825263]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.827217]  kthread+0x18c/0x1a8
[  172.828043]  ret_from_fork+0x10/0x20
[  172.829750] 
[  172.830334] Allocated by task 175:
[  172.831246]  kasan_save_stack+0x3c/0x68
[  172.832445]  kasan_set_track+0x2c/0x40
[  172.833601]  kasan_save_alloc_info+0x24/0x38
[  172.834882]  __kasan_slab_alloc+0xa8/0xb0
[  172.836110]  kmem_cache_alloc+0x134/0x330
[  172.837294]  kmem_cache_oob+0xb8/0x268
[  172.838415]  kunit_try_run_case+0xf8/0x260
[  172.839633]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.841125]  kthread+0x18c/0x1a8
[  172.842104]  ret_from_fork+0x10/0x20
[  172.843198] 
[  172.843782] The buggy address belongs to the object at ffff0000c5f32000
[  172.843782]  which belongs to the cache test_cache of size 200
[  172.846211] The buggy address is located 0 bytes to the right of
[  172.846211]  allocated 200-byte region [ffff0000c5f32000, ffff0000c5f320c8)
[  172.848855] 
[  172.849377] The buggy address belongs to the physical page:
[  172.850655] page:00000000d1f90efa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f32
[  172.852692] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.854311] page_type: 0xffffffff()
[  172.855413] raw: 0bfffc0000000800 ffff0000c5738780 dead000000000122 0000000000000000
[  172.857173] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  172.858804] page dumped because: kasan: bad access detected
[  172.860103] 
[  172.860626] Memory state around the buggy address:
[  172.861836]  ffff0000c5f31f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  172.863495]  ffff0000c5f32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  172.865139] >ffff0000c5f32080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  172.866681]                                               ^
[  172.868062]  ffff0000c5f32100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.869652]  ffff0000c5f32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.871194] ==================================================================

test log snippet boot parser 29

Home

[  170.521382] ==================================================================
[  170.523845] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590
[  170.526870] Write of size 1 at addr ffff0000c581dcc9 by task kunit_try_catch/137
[  170.528897] 
[  170.529599] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.531609] Hardware name: linux,dummy-virt (DT)
[  170.532775] Call trace:
[  170.533336]  dump_backtrace+0x9c/0x128
[  170.534700]  show_stack+0x20/0x38
[  170.536158]  dump_stack_lvl+0x60/0xb0
[  170.537753]  print_report+0xf8/0x5d8
[  170.539532]  kasan_report+0xc8/0x118
[  170.540778]  __asan_store1+0x60/0x70
[  170.541980]  krealloc_less_oob_helper+0x110/0x590
[  170.543332]  krealloc_less_oob+0x20/0x38
[  170.544944]  kunit_try_run_case+0xf8/0x260
[  170.546585]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.548326]  kthread+0x18c/0x1a8
[  170.549177]  ret_from_fork+0x10/0x20
[  170.550313] 
[  170.550946] Allocated by task 137:
[  170.551918]  kasan_save_stack+0x3c/0x68
[  170.553846]  kasan_set_track+0x2c/0x40
[  170.554898]  kasan_save_alloc_info+0x24/0x38
[  170.556471]  __kasan_krealloc+0x10c/0x140
[  170.557809]  krealloc+0x10c/0x1a0
[  170.558736]  krealloc_less_oob_helper+0xd4/0x590
[  170.560513]  krealloc_less_oob+0x20/0x38
[  170.561464]  kunit_try_run_case+0xf8/0x260
[  170.562490]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.564360]  kthread+0x18c/0x1a8
[  170.565414]  ret_from_fork+0x10/0x20
[  170.566684] 
[  170.567254] The buggy address belongs to the object at ffff0000c581dc00
[  170.567254]  which belongs to the cache kmalloc-256 of size 256
[  170.569872] The buggy address is located 0 bytes to the right of
[  170.569872]  allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[  170.573182] 
[  170.573775] The buggy address belongs to the physical page:
[  170.575369] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[  170.577153] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.579382] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.581539] page_type: 0xffffffff()
[  170.582662] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.584535] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.586027] page dumped because: kasan: bad access detected
[  170.587640] 
[  170.588163] Memory state around the buggy address:
[  170.589776]  ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.591639]  ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.593249] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  170.594907]                                               ^
[  170.596249]  ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.598047]  ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.599927] ==================================================================

test log snippet boot parser 30

Home

[  171.250488] ==================================================================
[  171.252180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590
[  171.253851] Write of size 1 at addr ffff0000c5f1a0ea by task kunit_try_catch/141
[  171.255525] 
[  171.256185] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.257998] Hardware name: linux,dummy-virt (DT)
[  171.259105] Call trace:
[  171.259838]  dump_backtrace+0x9c/0x128
[  171.260945]  show_stack+0x20/0x38
[  171.261932]  dump_stack_lvl+0x60/0xb0
[  171.263067]  print_report+0xf8/0x5d8
[  171.264196]  kasan_report+0xc8/0x118
[  171.265307]  __asan_store1+0x60/0x70
[  171.266422]  krealloc_less_oob_helper+0x1b8/0x590
[  171.267926]  krealloc_pagealloc_less_oob+0x20/0x38
[  171.269103]  kunit_try_run_case+0xf8/0x260
[  171.270175]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.271695]  kthread+0x18c/0x1a8
[  171.272673]  ret_from_fork+0x10/0x20
[  171.273779] 
[  171.274284] The buggy address belongs to the physical page:
[  171.275578] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[  171.277532] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.279274] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  171.280861] page_type: 0xffffffff()
[  171.281871] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  171.283555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  171.285238] page dumped because: kasan: bad access detected
[  171.286498] 
[  171.287067] Memory state around the buggy address:
[  171.288279]  ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.289897]  ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.291480] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  171.293013]                                                           ^
[  171.294516]  ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.296150]  ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.297686] ==================================================================

test log snippet boot parser 31

Home

[  171.198273] ==================================================================
[  171.199900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590
[  171.201474] Write of size 1 at addr ffff0000c5f1a0da by task kunit_try_catch/141
[  171.203479] 
[  171.204341] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.206654] Hardware name: linux,dummy-virt (DT)
[  171.207894] Call trace:
[  171.208446]  dump_backtrace+0x9c/0x128
[  171.210230]  show_stack+0x20/0x38
[  171.211297]  dump_stack_lvl+0x60/0xb0
[  171.212323]  print_report+0xf8/0x5d8
[  171.213453]  kasan_report+0xc8/0x118
[  171.214571]  __asan_store1+0x60/0x70
[  171.215684]  krealloc_less_oob_helper+0x18c/0x590
[  171.216982]  krealloc_pagealloc_less_oob+0x20/0x38
[  171.218252]  kunit_try_run_case+0xf8/0x260
[  171.219430]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.220883]  kthread+0x18c/0x1a8
[  171.221836]  ret_from_fork+0x10/0x20
[  171.222926] 
[  171.223420] The buggy address belongs to the physical page:
[  171.224664] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[  171.226586] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.228342] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  171.229890] page_type: 0xffffffff()
[  171.230899] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  171.232567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  171.234151] page dumped because: kasan: bad access detected
[  171.235334] 
[  171.235975] Memory state around the buggy address:
[  171.237152]  ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.238705]  ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.240333] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  171.241863]                                                     ^
[  171.243266]  ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.244845]  ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.246346] ==================================================================

test log snippet boot parser 32

Home

[  170.604526] ==================================================================
[  170.606246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590
[  170.608166] Write of size 1 at addr ffff0000c581dcd0 by task kunit_try_catch/137
[  170.610503] 
[  170.611584] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.613669] Hardware name: linux,dummy-virt (DT)
[  170.614891] Call trace:
[  170.615567]  dump_backtrace+0x9c/0x128
[  170.617645]  show_stack+0x20/0x38
[  170.618697]  dump_stack_lvl+0x60/0xb0
[  170.619929]  print_report+0xf8/0x5d8
[  170.621099]  kasan_report+0xc8/0x118
[  170.622241]  __asan_store1+0x60/0x70
[  170.623405]  krealloc_less_oob_helper+0x140/0x590
[  170.624521]  krealloc_less_oob+0x20/0x38
[  170.625708]  kunit_try_run_case+0xf8/0x260
[  170.626794]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.628200]  kthread+0x18c/0x1a8
[  170.629483]  ret_from_fork+0x10/0x20
[  170.630640] 
[  170.631715] Allocated by task 137:
[  170.632439]  kasan_save_stack+0x3c/0x68
[  170.633325]  kasan_set_track+0x2c/0x40
[  170.634679]  kasan_save_alloc_info+0x24/0x38
[  170.636215]  __kasan_krealloc+0x10c/0x140
[  170.637787]  krealloc+0x10c/0x1a0
[  170.638806]  krealloc_less_oob_helper+0xd4/0x590
[  170.640241]  krealloc_less_oob+0x20/0x38
[  170.641216]  kunit_try_run_case+0xf8/0x260
[  170.642482]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.644241]  kthread+0x18c/0x1a8
[  170.645234]  ret_from_fork+0x10/0x20
[  170.646417] 
[  170.647079] The buggy address belongs to the object at ffff0000c581dc00
[  170.647079]  which belongs to the cache kmalloc-256 of size 256
[  170.649673] The buggy address is located 7 bytes to the right of
[  170.649673]  allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[  170.653317] 
[  170.653892] The buggy address belongs to the physical page:
[  170.655115] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[  170.657385] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.659320] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.661078] page_type: 0xffffffff()
[  170.662252] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.664275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.666402] page dumped because: kasan: bad access detected
[  170.668220] 
[  170.668826] Memory state around the buggy address:
[  170.670481]  ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.672467]  ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.674580] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  170.676631]                                                  ^
[  170.678436]  ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.680391]  ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.682243] ==================================================================

test log snippet boot parser 33

Home

[  170.686678] ==================================================================
[  170.688354] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590
[  170.690454] Write of size 1 at addr ffff0000c581dcda by task kunit_try_catch/137
[  170.692871] 
[  170.693562] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.696374] Hardware name: linux,dummy-virt (DT)
[  170.697494] Call trace:
[  170.698434]  dump_backtrace+0x9c/0x128
[  170.699676]  show_stack+0x20/0x38
[  170.701008]  dump_stack_lvl+0x60/0xb0
[  170.701978]  print_report+0xf8/0x5d8
[  170.703293]  kasan_report+0xc8/0x118
[  170.704775]  __asan_store1+0x60/0x70
[  170.705748]  krealloc_less_oob_helper+0x18c/0x590
[  170.708243]  krealloc_less_oob+0x20/0x38
[  170.709582]  kunit_try_run_case+0xf8/0x260
[  170.710752]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.712277]  kthread+0x18c/0x1a8
[  170.713499]  ret_from_fork+0x10/0x20
[  170.714444] 
[  170.715284] Allocated by task 137:
[  170.716768]  kasan_save_stack+0x3c/0x68
[  170.717904]  kasan_set_track+0x2c/0x40
[  170.719219]  kasan_save_alloc_info+0x24/0x38
[  170.721166]  __kasan_krealloc+0x10c/0x140
[  170.722611]  krealloc+0x10c/0x1a0
[  170.723768]  krealloc_less_oob_helper+0xd4/0x590
[  170.724969]  krealloc_less_oob+0x20/0x38
[  170.726176]  kunit_try_run_case+0xf8/0x260
[  170.727394]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.729252]  kthread+0x18c/0x1a8
[  170.730379]  ret_from_fork+0x10/0x20
[  170.731297] 
[  170.732782] The buggy address belongs to the object at ffff0000c581dc00
[  170.732782]  which belongs to the cache kmalloc-256 of size 256
[  170.735510] The buggy address is located 17 bytes to the right of
[  170.735510]  allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[  170.738286] 
[  170.738895] The buggy address belongs to the physical page:
[  170.740646] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[  170.742629] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.744377] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.745670] page_type: 0xffffffff()
[  170.746712] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.748934] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.750601] page dumped because: kasan: bad access detected
[  170.752015] 
[  170.752857] Memory state around the buggy address:
[  170.754224]  ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.756754]  ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.758495] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  170.760459]                                                     ^
[  170.761530]  ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.763557]  ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.765538] ==================================================================

test log snippet boot parser 34

Home

[  170.847939] ==================================================================
[  170.849469] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590
[  170.851204] Write of size 1 at addr ffff0000c581dceb by task kunit_try_catch/137
[  170.853183] 
[  170.854032] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.856145] Hardware name: linux,dummy-virt (DT)
[  170.857398] Call trace:
[  170.858227]  dump_backtrace+0x9c/0x128
[  170.859351]  show_stack+0x20/0x38
[  170.860356]  dump_stack_lvl+0x60/0xb0
[  170.861498]  print_report+0xf8/0x5d8
[  170.862609]  kasan_report+0xc8/0x118
[  170.863775]  __asan_store1+0x60/0x70
[  170.864890]  krealloc_less_oob_helper+0x1e0/0x590
[  170.866051]  krealloc_less_oob+0x20/0x38
[  170.867362]  kunit_try_run_case+0xf8/0x260
[  170.868648]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.870559]  kthread+0x18c/0x1a8
[  170.871868]  ret_from_fork+0x10/0x20
[  170.873119] 
[  170.874188] Allocated by task 137:
[  170.875240]  kasan_save_stack+0x3c/0x68
[  170.876434]  kasan_set_track+0x2c/0x40
[  170.877590]  kasan_save_alloc_info+0x24/0x38
[  170.878854]  __kasan_krealloc+0x10c/0x140
[  170.880700]  krealloc+0x10c/0x1a0
[  170.881869]  krealloc_less_oob_helper+0xd4/0x590
[  170.883155]  krealloc_less_oob+0x20/0x38
[  170.884337]  kunit_try_run_case+0xf8/0x260
[  170.885566]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.887169]  kthread+0x18c/0x1a8
[  170.887961]  ret_from_fork+0x10/0x20
[  170.888961] 
[  170.889636] The buggy address belongs to the object at ffff0000c581dc00
[  170.889636]  which belongs to the cache kmalloc-256 of size 256
[  170.892626] The buggy address is located 34 bytes to the right of
[  170.892626]  allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[  170.895878] 
[  170.896610] The buggy address belongs to the physical page:
[  170.898196] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[  170.901003] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.902608] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.904432] page_type: 0xffffffff()
[  170.905688] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.907819] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.909334] page dumped because: kasan: bad access detected
[  170.910785] 
[  170.911541] Memory state around the buggy address:
[  170.912768]  ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.915296]  ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.917220] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  170.918899]                                                           ^
[  170.920621]  ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.922340]  ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.923917] ==================================================================

test log snippet boot parser 35

Home

[  171.080020] ==================================================================
[  171.083238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590
[  171.085263] Write of size 1 at addr ffff0000c5f1a0c9 by task kunit_try_catch/141
[  171.087447] 
[  171.088109] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.089826] Hardware name: linux,dummy-virt (DT)
[  171.091038] Call trace:
[  171.092094]  dump_backtrace+0x9c/0x128
[  171.093564]  show_stack+0x20/0x38
[  171.094961]  dump_stack_lvl+0x60/0xb0
[  171.096345]  print_report+0xf8/0x5d8
[  171.097561]  kasan_report+0xc8/0x118
[  171.098762]  __asan_store1+0x60/0x70
[  171.100071]  krealloc_less_oob_helper+0x110/0x590
[  171.102826]  krealloc_pagealloc_less_oob+0x20/0x38
[  171.104429]  kunit_try_run_case+0xf8/0x260
[  171.105710]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.107617]  kthread+0x18c/0x1a8
[  171.109224]  ret_from_fork+0x10/0x20
[  171.110191] 
[  171.110822] The buggy address belongs to the physical page:
[  171.112854] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[  171.115046] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.116940] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  171.118427] page_type: 0xffffffff()
[  171.120171] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  171.121915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  171.123894] page dumped because: kasan: bad access detected
[  171.124942] 
[  171.125662] Memory state around the buggy address:
[  171.127867]  ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.129714]  ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.132083] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  171.133873]                                               ^
[  171.135705]  ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.137526]  ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.139445] ==================================================================

test log snippet boot parser 36

Home

[  171.300478] ==================================================================
[  171.302400] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590
[  171.304175] Write of size 1 at addr ffff0000c5f1a0eb by task kunit_try_catch/141
[  171.305977] 
[  171.306551] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.308439] Hardware name: linux,dummy-virt (DT)
[  171.309571] Call trace:
[  171.310334]  dump_backtrace+0x9c/0x128
[  171.311430]  show_stack+0x20/0x38
[  171.312480]  dump_stack_lvl+0x60/0xb0
[  171.313611]  print_report+0xf8/0x5d8
[  171.314783]  kasan_report+0xc8/0x118
[  171.315882]  __asan_store1+0x60/0x70
[  171.317016]  krealloc_less_oob_helper+0x1e0/0x590
[  171.318293]  krealloc_pagealloc_less_oob+0x20/0x38
[  171.319594]  kunit_try_run_case+0xf8/0x260
[  171.320781]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.322244]  kthread+0x18c/0x1a8
[  171.323206]  ret_from_fork+0x10/0x20
[  171.324285] 
[  171.324854] The buggy address belongs to the physical page:
[  171.326138] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[  171.328097] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.329846] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  171.331392] page_type: 0xffffffff()
[  171.332441] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  171.334140] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  171.335750] page dumped because: kasan: bad access detected
[  171.337000] 
[  171.337495] Memory state around the buggy address:
[  171.338754]  ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.340376]  ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.341974] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  171.343539]                                                           ^
[  171.345049]  ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.346637]  ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.348178] ==================================================================

test log snippet boot parser 37

Home

[  171.144334] ==================================================================
[  171.146178] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590
[  171.149083] Write of size 1 at addr ffff0000c5f1a0d0 by task kunit_try_catch/141
[  171.150742] 
[  171.151906] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.153887] Hardware name: linux,dummy-virt (DT)
[  171.155111] Call trace:
[  171.156052]  dump_backtrace+0x9c/0x128
[  171.157171]  show_stack+0x20/0x38
[  171.158156]  dump_stack_lvl+0x60/0xb0
[  171.159343]  print_report+0xf8/0x5d8
[  171.160520]  kasan_report+0xc8/0x118
[  171.161620]  __asan_store1+0x60/0x70
[  171.162762]  krealloc_less_oob_helper+0x140/0x590
[  171.164126]  krealloc_pagealloc_less_oob+0x20/0x38
[  171.165472]  kunit_try_run_case+0xf8/0x260
[  171.166475]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.167750]  kthread+0x18c/0x1a8
[  171.168905]  ret_from_fork+0x10/0x20
[  171.170153] 
[  171.171241] The buggy address belongs to the physical page:
[  171.172259] page:00000000353e52a8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[  171.174111] head:00000000353e52a8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.176247] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  171.177893] page_type: 0xffffffff()
[  171.178924] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  171.180693] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  171.182315] page dumped because: kasan: bad access detected
[  171.183599] 
[  171.184181] Memory state around the buggy address:
[  171.185177]  ffff0000c5f19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.186625]  ffff0000c5f1a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.188909] >ffff0000c5f1a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  171.190532]                                                  ^
[  171.191933]  ffff0000c5f1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.192843]  ffff0000c5f1a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.194502] ==================================================================

test log snippet boot parser 38

Home

[  170.768343] ==================================================================
[  170.771315] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590
[  170.773688] Write of size 1 at addr ffff0000c581dcea by task kunit_try_catch/137
[  170.775347] 
[  170.775864] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.778486] Hardware name: linux,dummy-virt (DT)
[  170.779652] Call trace:
[  170.780324]  dump_backtrace+0x9c/0x128
[  170.781433]  show_stack+0x20/0x38
[  170.782443]  dump_stack_lvl+0x60/0xb0
[  170.783855]  print_report+0xf8/0x5d8
[  170.785147]  kasan_report+0xc8/0x118
[  170.786225]  __asan_store1+0x60/0x70
[  170.787348]  krealloc_less_oob_helper+0x1b8/0x590
[  170.788611]  krealloc_less_oob+0x20/0x38
[  170.789797]  kunit_try_run_case+0xf8/0x260
[  170.791402]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.793071]  kthread+0x18c/0x1a8
[  170.794491]  ret_from_fork+0x10/0x20
[  170.795553] 
[  170.796072] Allocated by task 137:
[  170.796894]  kasan_save_stack+0x3c/0x68
[  170.798046]  kasan_set_track+0x2c/0x40
[  170.799150]  kasan_save_alloc_info+0x24/0x38
[  170.800538]  __kasan_krealloc+0x10c/0x140
[  170.801589]  krealloc+0x10c/0x1a0
[  170.802814]  krealloc_less_oob_helper+0xd4/0x590
[  170.804303]  krealloc_less_oob+0x20/0x38
[  170.805467]  kunit_try_run_case+0xf8/0x260
[  170.806534]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.808467]  kthread+0x18c/0x1a8
[  170.809434]  ret_from_fork+0x10/0x20
[  170.810318] 
[  170.810890] The buggy address belongs to the object at ffff0000c581dc00
[  170.810890]  which belongs to the cache kmalloc-256 of size 256
[  170.814094] The buggy address is located 33 bytes to the right of
[  170.814094]  allocated 201-byte region [ffff0000c581dc00, ffff0000c581dcc9)
[  170.816950] 
[  170.817671] The buggy address belongs to the physical page:
[  170.819011] page:00000000deaf3f06 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10581c
[  170.820652] head:00000000deaf3f06 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.822828] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.824628] page_type: 0xffffffff()
[  170.826298] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.829104] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.830622] page dumped because: kasan: bad access detected
[  170.832062] 
[  170.832742] Memory state around the buggy address:
[  170.834085]  ffff0000c581db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.836080]  ffff0000c581dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.837341] >ffff0000c581dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  170.839525]                                                           ^
[  170.841099]  ffff0000c581dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.842661]  ffff0000c581dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.844160] ==================================================================

test log snippet boot parser 39

Home

[  170.430541] ==================================================================
[  170.431910] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[  170.433199] Write of size 1 at addr ffff0000c3dbe4f0 by task kunit_try_catch/135
[  170.434978] 
[  170.435521] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.437574] Hardware name: linux,dummy-virt (DT)
[  170.438682] Call trace:
[  170.439967]  dump_backtrace+0x9c/0x128
[  170.441194]  show_stack+0x20/0x38
[  170.442238]  dump_stack_lvl+0x60/0xb0
[  170.443844]  print_report+0xf8/0x5d8
[  170.444917]  kasan_report+0xc8/0x118
[  170.446086]  __asan_store1+0x60/0x70
[  170.447100]  krealloc_more_oob_helper+0x168/0x380
[  170.448590]  krealloc_more_oob+0x20/0x38
[  170.449755]  kunit_try_run_case+0xf8/0x260
[  170.450907]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.452420]  kthread+0x18c/0x1a8
[  170.453542]  ret_from_fork+0x10/0x20
[  170.454458] 
[  170.454958] Allocated by task 135:
[  170.455760]  kasan_save_stack+0x3c/0x68
[  170.457136]  kasan_set_track+0x2c/0x40
[  170.458466]  kasan_save_alloc_info+0x24/0x38
[  170.459941]  __kasan_krealloc+0x10c/0x140
[  170.461281]  krealloc+0x10c/0x1a0
[  170.462084]  krealloc_more_oob_helper+0xd4/0x380
[  170.463367]  krealloc_more_oob+0x20/0x38
[  170.464773]  kunit_try_run_case+0xf8/0x260
[  170.466064]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.467802]  kthread+0x18c/0x1a8
[  170.468342]  ret_from_fork+0x10/0x20
[  170.468953] 
[  170.469251] The buggy address belongs to the object at ffff0000c3dbe400
[  170.469251]  which belongs to the cache kmalloc-256 of size 256
[  170.472424] The buggy address is located 5 bytes to the right of
[  170.472424]  allocated 235-byte region [ffff0000c3dbe400, ffff0000c3dbe4eb)
[  170.475101] 
[  170.476164] The buggy address belongs to the physical page:
[  170.477385] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[  170.479670] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.481413] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.483006] page_type: 0xffffffff()
[  170.483997] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.485752] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.487905] page dumped because: kasan: bad access detected
[  170.488923] 
[  170.489226] Memory state around the buggy address:
[  170.489905]  ffff0000c3dbe380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.491419]  ffff0000c3dbe400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.493073] >ffff0000c3dbe480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  170.494695]                                                              ^
[  170.496685]  ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.498329]  ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.499931] ==================================================================

test log snippet boot parser 40

Home

[  170.999078] ==================================================================
[  171.001070] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[  171.003072] Write of size 1 at addr ffff0000c5fba0f0 by task kunit_try_catch/139
[  171.005200] 
[  171.005694] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.008265] Hardware name: linux,dummy-virt (DT)
[  171.009285] Call trace:
[  171.009853]  dump_backtrace+0x9c/0x128
[  171.011114]  show_stack+0x20/0x38
[  171.012318]  dump_stack_lvl+0x60/0xb0
[  171.013590]  print_report+0xf8/0x5d8
[  171.014870]  kasan_report+0xc8/0x118
[  171.015883]  __asan_store1+0x60/0x70
[  171.017275]  krealloc_more_oob_helper+0x168/0x380
[  171.019305]  krealloc_pagealloc_more_oob+0x20/0x38
[  171.021427]  kunit_try_run_case+0xf8/0x260
[  171.022875]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.024662]  kthread+0x18c/0x1a8
[  171.025743]  ret_from_fork+0x10/0x20
[  171.026873] 
[  171.027621] The buggy address belongs to the physical page:
[  171.029606] page:000000002fd1ef98 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb8
[  171.031779] head:000000002fd1ef98 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.033670] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  171.035606] page_type: 0xffffffff()
[  171.037748] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  171.039914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  171.041532] page dumped because: kasan: bad access detected
[  171.043254] 
[  171.044249] Memory state around the buggy address:
[  171.045983]  ffff0000c5fb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.047853]  ffff0000c5fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.049810] >ffff0000c5fba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  171.051476]                                                              ^
[  171.053446]  ffff0000c5fba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.055377]  ffff0000c5fba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  171.056758] ==================================================================

test log snippet boot parser 41

Home

[  170.942414] ==================================================================
[  170.945166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[  170.946670] Write of size 1 at addr ffff0000c5fba0eb by task kunit_try_catch/139
[  170.948457] 
[  170.949166] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.951295] Hardware name: linux,dummy-virt (DT)
[  170.952935] Call trace:
[  170.953580]  dump_backtrace+0x9c/0x128
[  170.954700]  show_stack+0x20/0x38
[  170.955968]  dump_stack_lvl+0x60/0xb0
[  170.957248]  print_report+0xf8/0x5d8
[  170.958351]  kasan_report+0xc8/0x118
[  170.959399]  __asan_store1+0x60/0x70
[  170.961018]  krealloc_more_oob_helper+0x138/0x380
[  170.962247]  krealloc_pagealloc_more_oob+0x20/0x38
[  170.963826]  kunit_try_run_case+0xf8/0x260
[  170.965211]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.966682]  kthread+0x18c/0x1a8
[  170.967525]  ret_from_fork+0x10/0x20
[  170.968909] 
[  170.969538] The buggy address belongs to the physical page:
[  170.970866] page:000000002fd1ef98 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb8
[  170.973212] head:000000002fd1ef98 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.974906] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  170.977132] page_type: 0xffffffff()
[  170.978144] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  170.980101] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  170.981441] page dumped because: kasan: bad access detected
[  170.982651] 
[  170.983592] Memory state around the buggy address:
[  170.985226]  ffff0000c5fb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.987243]  ffff0000c5fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.989067] >ffff0000c5fba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  170.990613]                                                           ^
[  170.992272]  ffff0000c5fba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  170.993760]  ffff0000c5fba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  170.995714] ==================================================================

test log snippet boot parser 42

Home

[  170.352377] ==================================================================
[  170.354886] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[  170.356861] Write of size 1 at addr ffff0000c3dbe4eb by task kunit_try_catch/135
[  170.358694] 
[  170.359596] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.361416] Hardware name: linux,dummy-virt (DT)
[  170.362497] Call trace:
[  170.363565]  dump_backtrace+0x9c/0x128
[  170.364650]  show_stack+0x20/0x38
[  170.365638]  dump_stack_lvl+0x60/0xb0
[  170.366818]  print_report+0xf8/0x5d8
[  170.367977]  kasan_report+0xc8/0x118
[  170.369125]  __asan_store1+0x60/0x70
[  170.370296]  krealloc_more_oob_helper+0x138/0x380
[  170.371629]  krealloc_more_oob+0x20/0x38
[  170.372607]  kunit_try_run_case+0xf8/0x260
[  170.374149]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.375760]  kthread+0x18c/0x1a8
[  170.377428]  ret_from_fork+0x10/0x20
[  170.378578] 
[  170.379099] Allocated by task 135:
[  170.380155]  kasan_save_stack+0x3c/0x68
[  170.381349]  kasan_set_track+0x2c/0x40
[  170.382498]  kasan_save_alloc_info+0x24/0x38
[  170.383838]  __kasan_krealloc+0x10c/0x140
[  170.385017]  krealloc+0x10c/0x1a0
[  170.386259]  krealloc_more_oob_helper+0xd4/0x380
[  170.387342]  krealloc_more_oob+0x20/0x38
[  170.388616]  kunit_try_run_case+0xf8/0x260
[  170.389917]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.391433]  kthread+0x18c/0x1a8
[  170.392530]  ret_from_fork+0x10/0x20
[  170.394266] 
[  170.394970] The buggy address belongs to the object at ffff0000c3dbe400
[  170.394970]  which belongs to the cache kmalloc-256 of size 256
[  170.397693] The buggy address is located 0 bytes to the right of
[  170.397693]  allocated 235-byte region [ffff0000c3dbe400, ffff0000c3dbe4eb)
[  170.400713] 
[  170.401376] The buggy address belongs to the physical page:
[  170.402622] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[  170.404757] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  170.406443] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  170.408173] page_type: 0xffffffff()
[  170.409379] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  170.412693] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  170.414244] page dumped because: kasan: bad access detected
[  170.415831] 
[  170.416359] Memory state around the buggy address:
[  170.417579]  ffff0000c3dbe380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.419609]  ffff0000c3dbe400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  170.420813] >ffff0000c3dbe480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  170.421634]                                                           ^
[  170.423194]  ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.425029]  ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.426617] ==================================================================

test log snippet boot parser 43

Home

[  174.018926] ==================================================================
[  174.020574] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x150/0x378
[  174.022646] Read of size 1 at addr ffff0000c5f8387f by task kunit_try_catch/191
[  174.024297] 
[  174.024954] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.026906] Hardware name: linux,dummy-virt (DT)
[  174.028156] Call trace:
[  174.028902]  dump_backtrace+0x9c/0x128
[  174.030020]  show_stack+0x20/0x38
[  174.030999]  dump_stack_lvl+0x60/0xb0
[  174.032158]  print_report+0xf8/0x5d8
[  174.033263]  kasan_report+0xc8/0x118
[  174.034410]  __asan_load1+0x60/0x70
[  174.035514]  ksize_unpoisons_memory+0x150/0x378
[  174.036786]  kunit_try_run_case+0xf8/0x260
[  174.037972]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.039411]  kthread+0x18c/0x1a8
[  174.040386]  ret_from_fork+0x10/0x20
[  174.041429] 
[  174.042016] Allocated by task 191:
[  174.042916]  kasan_save_stack+0x3c/0x68
[  174.044104]  kasan_set_track+0x2c/0x40
[  174.045213]  kasan_save_alloc_info+0x24/0x38
[  174.046482]  __kasan_kmalloc+0xd4/0xd8
[  174.047628]  kmalloc_trace+0x68/0x130
[  174.048659]  ksize_unpoisons_memory+0xb0/0x378
[  174.049916]  kunit_try_run_case+0xf8/0x260
[  174.051112]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.052552]  kthread+0x18c/0x1a8
[  174.053526]  ret_from_fork+0x10/0x20
[  174.054595] 
[  174.055131] The buggy address belongs to the object at ffff0000c5f83800
[  174.055131]  which belongs to the cache kmalloc-128 of size 128
[  174.057754] The buggy address is located 12 bytes to the right of
[  174.057754]  allocated 115-byte region [ffff0000c5f83800, ffff0000c5f83873)
[  174.060441] 
[  174.060952] The buggy address belongs to the physical page:
[  174.062293] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[  174.064264] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.065831] page_type: 0xffffffff()
[  174.066860] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  174.068574] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  174.070195] page dumped because: kasan: bad access detected
[  174.071452] 
[  174.072048] Memory state around the buggy address:
[  174.073233]  ffff0000c5f83700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  174.074850]  ffff0000c5f83780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.076465] >ffff0000c5f83800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  174.078047]                                                                 ^
[  174.079644]  ffff0000c5f83880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.081304]  ffff0000c5f83900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.082864] ==================================================================

test log snippet boot parser 44

Home

[  173.881424] ==================================================================
[  173.884037] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x104/0x378
[  173.885805] Read of size 1 at addr ffff0000c5f83873 by task kunit_try_catch/191
[  173.887587] 
[  173.888259] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  173.890103] Hardware name: linux,dummy-virt (DT)
[  173.891250] Call trace:
[  173.892050]  dump_backtrace+0x9c/0x128
[  173.893172]  show_stack+0x20/0x38
[  173.894197]  dump_stack_lvl+0x60/0xb0
[  173.895363]  print_report+0xf8/0x5d8
[  173.896531]  kasan_report+0xc8/0x118
[  173.897682]  __asan_load1+0x60/0x70
[  173.898830]  ksize_unpoisons_memory+0x104/0x378
[  173.900112]  kunit_try_run_case+0xf8/0x260
[  173.901365]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.902835]  kthread+0x18c/0x1a8
[  173.903820]  ret_from_fork+0x10/0x20
[  173.904891] 
[  173.905392] Allocated by task 191:
[  173.906370]  kasan_save_stack+0x3c/0x68
[  173.907565]  kasan_set_track+0x2c/0x40
[  173.908692]  kasan_save_alloc_info+0x24/0x38
[  173.909946]  __kasan_kmalloc+0xd4/0xd8
[  173.911096]  kmalloc_trace+0x68/0x130
[  173.912156]  ksize_unpoisons_memory+0xb0/0x378
[  173.913438]  kunit_try_run_case+0xf8/0x260
[  173.914610]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.916097]  kthread+0x18c/0x1a8
[  173.917171]  ret_from_fork+0x10/0x20
[  173.919157] 
[  173.919611] The buggy address belongs to the object at ffff0000c5f83800
[  173.919611]  which belongs to the cache kmalloc-128 of size 128
[  173.922184] The buggy address is located 0 bytes to the right of
[  173.922184]  allocated 115-byte region [ffff0000c5f83800, ffff0000c5f83873)
[  173.924854] 
[  173.925395] The buggy address belongs to the physical page:
[  173.926696] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[  173.928673] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  173.930274] page_type: 0xffffffff()
[  173.931338] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  173.933097] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  173.934709] page dumped because: kasan: bad access detected
[  173.935996] 
[  173.936549] Memory state around the buggy address:
[  173.937758]  ffff0000c5f83700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  173.939374]  ffff0000c5f83780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  173.941016] >ffff0000c5f83800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  173.942553]                                                              ^
[  173.944151]  ffff0000c5f83880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  173.945782]  ffff0000c5f83900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  173.947342] ==================================================================

test log snippet boot parser 45

Home

[  173.950417] ==================================================================
[  173.952024] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x128/0x378
[  173.954111] Read of size 1 at addr ffff0000c5f83878 by task kunit_try_catch/191
[  173.956771] 
[  173.957275] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  173.959897] Hardware name: linux,dummy-virt (DT)
[  173.961255] Call trace:
[  173.962021]  dump_backtrace+0x9c/0x128
[  173.963196]  show_stack+0x20/0x38
[  173.964209]  dump_stack_lvl+0x60/0xb0
[  173.965355]  print_report+0xf8/0x5d8
[  173.966460]  kasan_report+0xc8/0x118
[  173.967558]  __asan_load1+0x60/0x70
[  173.968670]  ksize_unpoisons_memory+0x128/0x378
[  173.969948]  kunit_try_run_case+0xf8/0x260
[  173.971176]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.972626]  kthread+0x18c/0x1a8
[  173.973577]  ret_from_fork+0x10/0x20
[  173.974651] 
[  173.975228] Allocated by task 191:
[  173.976138]  kasan_save_stack+0x3c/0x68
[  173.977273]  kasan_set_track+0x2c/0x40
[  173.978399]  kasan_save_alloc_info+0x24/0x38
[  173.979658]  __kasan_kmalloc+0xd4/0xd8
[  173.980788]  kmalloc_trace+0x68/0x130
[  173.981886]  ksize_unpoisons_memory+0xb0/0x378
[  173.983113]  kunit_try_run_case+0xf8/0x260
[  173.984322]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.985754]  kthread+0x18c/0x1a8
[  173.986701]  ret_from_fork+0x10/0x20
[  173.987806] 
[  173.988349] The buggy address belongs to the object at ffff0000c5f83800
[  173.988349]  which belongs to the cache kmalloc-128 of size 128
[  173.990781] The buggy address is located 5 bytes to the right of
[  173.990781]  allocated 115-byte region [ffff0000c5f83800, ffff0000c5f83873)
[  173.993252] 
[  173.993841] The buggy address belongs to the physical page:
[  173.995127] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[  173.997086] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  173.998632] page_type: 0xffffffff()
[  173.999677] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  174.001378] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  174.002983] page dumped because: kasan: bad access detected
[  174.004230] 
[  174.004777] Memory state around the buggy address:
[  174.005975]  ffff0000c5f83700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  174.007566]  ffff0000c5f83780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.009166] >ffff0000c5f83800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  174.010711]                                                                 ^
[  174.012338]  ffff0000c5f83880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.013961]  ffff0000c5f83900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.015497] ==================================================================

test log snippet boot parser 46

Home

[  174.772081] ==================================================================
[  174.774841] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78
[  174.776365] Read of size 1 at addr ffff0000c5f7f918 by task kunit_try_catch/201
[  174.777760] 
[  174.778420] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.780683] Hardware name: linux,dummy-virt (DT)
[  174.781559] Call trace:
[  174.782254]  dump_backtrace+0x9c/0x128
[  174.783844]  show_stack+0x20/0x38
[  174.784892]  dump_stack_lvl+0x60/0xb0
[  174.786131]  print_report+0xf8/0x5d8
[  174.787391]  kasan_report+0xc8/0x118
[  174.788985]  __asan_load1+0x60/0x70
[  174.789915]  memchr+0x28/0x78
[  174.790464]  kasan_memchr+0xd4/0x1f0
[  174.791954]  kunit_try_run_case+0xf8/0x260
[  174.793179]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.794950]  kthread+0x18c/0x1a8
[  174.796015]  ret_from_fork+0x10/0x20
[  174.797009] 
[  174.797470] Allocated by task 201:
[  174.798581]  kasan_save_stack+0x3c/0x68
[  174.800100]  kasan_set_track+0x2c/0x40
[  174.801415]  kasan_save_alloc_info+0x24/0x38
[  174.802878]  __kasan_kmalloc+0xd4/0xd8
[  174.804307]  kmalloc_trace+0x68/0x130
[  174.805767]  kasan_memchr+0xa0/0x1f0
[  174.806419]  kunit_try_run_case+0xf8/0x260
[  174.808209]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.810085]  kthread+0x18c/0x1a8
[  174.811534]  ret_from_fork+0x10/0x20
[  174.812395] 
[  174.812866] The buggy address belongs to the object at ffff0000c5f7f900
[  174.812866]  which belongs to the cache kmalloc-32 of size 32
[  174.816671] The buggy address is located 0 bytes to the right of
[  174.816671]  allocated 24-byte region [ffff0000c5f7f900, ffff0000c5f7f918)
[  174.820119] 
[  174.821478] The buggy address belongs to the physical page:
[  174.822882] page:00000000ad3e6439 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7f
[  174.824946] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.826513] page_type: 0xffffffff()
[  174.827867] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  174.829703] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  174.831712] page dumped because: kasan: bad access detected
[  174.833555] 
[  174.834234] Memory state around the buggy address:
[  174.835934]  ffff0000c5f7f800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  174.838305]  ffff0000c5f7f880: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  174.840315] >ffff0000c5f7f900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.842105]                             ^
[  174.843334]  ffff0000c5f7f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.845339]  ffff0000c5f7fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.846628] ==================================================================

test log snippet boot parser 47

Home

[  174.870751] ==================================================================
[  174.872739] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[  174.874364] Read of size 1 at addr ffff0000c5f7f998 by task kunit_try_catch/203
[  174.876486] 
[  174.877070] CPU: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.878907] Hardware name: linux,dummy-virt (DT)
[  174.880054] Call trace:
[  174.880767]  dump_backtrace+0x9c/0x128
[  174.882121]  show_stack+0x20/0x38
[  174.883249]  dump_stack_lvl+0x60/0xb0
[  174.884709]  print_report+0xf8/0x5d8
[  174.885941]  kasan_report+0xc8/0x118
[  174.887066]  __asan_load1+0x60/0x70
[  174.888238]  memcmp+0x44/0xd0
[  174.889329]  kasan_memcmp+0xf0/0x208
[  174.890387]  kunit_try_run_case+0xf8/0x260
[  174.891835]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.893643]  kthread+0x18c/0x1a8
[  174.894642]  ret_from_fork+0x10/0x20
[  174.895887] 
[  174.896419] Allocated by task 203:
[  174.897277]  kasan_save_stack+0x3c/0x68
[  174.898426]  kasan_set_track+0x2c/0x40
[  174.899577]  kasan_save_alloc_info+0x24/0x38
[  174.900506]  __kasan_kmalloc+0xd4/0xd8
[  174.901746]  kmalloc_trace+0x68/0x130
[  174.903024]  kasan_memcmp+0xac/0x208
[  174.904171]  kunit_try_run_case+0xf8/0x260
[  174.906012]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.907633]  kthread+0x18c/0x1a8
[  174.908630]  ret_from_fork+0x10/0x20
[  174.910359] 
[  174.910875] The buggy address belongs to the object at ffff0000c5f7f980
[  174.910875]  which belongs to the cache kmalloc-32 of size 32
[  174.913903] The buggy address is located 0 bytes to the right of
[  174.913903]  allocated 24-byte region [ffff0000c5f7f980, ffff0000c5f7f998)
[  174.917072] 
[  174.917698] The buggy address belongs to the physical page:
[  174.919083] page:00000000ad3e6439 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7f
[  174.921608] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.923310] page_type: 0xffffffff()
[  174.924808] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  174.926570] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  174.928224] page dumped because: kasan: bad access detected
[  174.929704] 
[  174.930451] Memory state around the buggy address:
[  174.932271]  ffff0000c5f7f880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  174.933945]  ffff0000c5f7f900: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  174.935663] >ffff0000c5f7f980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.937339]                             ^
[  174.938451]  ffff0000c5f7fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.940478]  ffff0000c5f7fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.942084] ==================================================================

test log snippet boot parser 48

Home

[  175.230558] ==================================================================
[  175.231826] BUG: KASAN: slab-use-after-free in kasan_strings+0x150/0x478
[  175.236368] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.237996] 
[  175.238528] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.240145] Hardware name: linux,dummy-virt (DT)
[  175.241220] Call trace:
[  175.241865]  dump_backtrace+0x9c/0x128
[  175.242956]  show_stack+0x20/0x38
[  175.244045]  dump_stack_lvl+0x60/0xb0
[  175.245084]  print_report+0xf8/0x5d8
[  175.246288]  kasan_report+0xc8/0x118
[  175.247603]  __asan_load1+0x60/0x70
[  175.248838]  kasan_strings+0x150/0x478
[  175.249697]  kunit_try_run_case+0xf8/0x260
[  175.250986]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.252860]  kthread+0x18c/0x1a8
[  175.253648]  ret_from_fork+0x10/0x20
[  175.255003] 
[  175.255485] Allocated by task 205:
[  175.256824]  kasan_save_stack+0x3c/0x68
[  175.258022]  kasan_set_track+0x2c/0x40
[  175.259275]  kasan_save_alloc_info+0x24/0x38
[  175.261191]  __kasan_kmalloc+0xd4/0xd8
[  175.262684]  kmalloc_trace+0x68/0x130
[  175.263907]  kasan_strings+0xa0/0x478
[  175.264856]  kunit_try_run_case+0xf8/0x260
[  175.266105]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.267963]  kthread+0x18c/0x1a8
[  175.268740]  ret_from_fork+0x10/0x20
[  175.269498] 
[  175.269903] Freed by task 205:
[  175.270839]  kasan_save_stack+0x3c/0x68
[  175.272814]  kasan_set_track+0x2c/0x40
[  175.273907]  kasan_save_free_info+0x38/0x60
[  175.274634]  __kasan_slab_free+0x100/0x170
[  175.275993]  __kmem_cache_free+0x170/0x2e0
[  175.277582]  kfree+0x74/0x138
[  175.278884]  kasan_strings+0xbc/0x478
[  175.280182]  kunit_try_run_case+0xf8/0x260
[  175.281641]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.283257]  kthread+0x18c/0x1a8
[  175.284421]  ret_from_fork+0x10/0x20
[  175.285310] 
[  175.285619] The buggy address belongs to the object at ffff0000c5f79a40
[  175.285619]  which belongs to the cache kmalloc-32 of size 32
[  175.288524] The buggy address is located 16 bytes inside of
[  175.288524]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.291291] 
[  175.292021] The buggy address belongs to the physical page:
[  175.293253] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.296816] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.298622] page_type: 0xffffffff()
[  175.299825] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.302208] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.304008] page dumped because: kasan: bad access detected
[  175.305461] 
[  175.306111] Memory state around the buggy address:
[  175.307394]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.309156]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.310601] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.313125]                                                  ^
[  175.314816]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.316910]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.318616] ==================================================================

test log snippet boot parser 49

Home

[  175.230558] ==================================================================
[  175.231826] BUG: KASAN: slab-use-after-free in kasan_strings+0x150/0x478
[  175.236368] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.237996] 
[  175.238528] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.240145] Hardware name: linux,dummy-virt (DT)
[  175.241220] Call trace:
[  175.241865]  dump_backtrace+0x9c/0x128
[  175.242956]  show_stack+0x20/0x38
[  175.244045]  dump_stack_lvl+0x60/0xb0
[  175.245084]  print_report+0xf8/0x5d8
[  175.246288]  kasan_report+0xc8/0x118
[  175.247603]  __asan_load1+0x60/0x70
[  175.248838]  kasan_strings+0x150/0x478
[  175.249697]  kunit_try_run_case+0xf8/0x260
[  175.250986]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.252860]  kthread+0x18c/0x1a8
[  175.253648]  ret_from_fork+0x10/0x20
[  175.255003] 
[  175.255485] Allocated by task 205:
[  175.256824]  kasan_save_stack+0x3c/0x68
[  175.258022]  kasan_set_track+0x2c/0x40
[  175.259275]  kasan_save_alloc_info+0x24/0x38
[  175.261191]  __kasan_kmalloc+0xd4/0xd8
[  175.262684]  kmalloc_trace+0x68/0x130
[  175.263907]  kasan_strings+0xa0/0x478
[  175.264856]  kunit_try_run_case+0xf8/0x260
[  175.266105]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.267963]  kthread+0x18c/0x1a8
[  175.268740]  ret_from_fork+0x10/0x20
[  175.269498] 
[  175.269903] Freed by task 205:
[  175.270839]  kasan_save_stack+0x3c/0x68
[  175.272814]  kasan_set_track+0x2c/0x40
[  175.273907]  kasan_save_free_info+0x38/0x60
[  175.274634]  __kasan_slab_free+0x100/0x170
[  175.275993]  __kmem_cache_free+0x170/0x2e0
[  175.277582]  kfree+0x74/0x138
[  175.278884]  kasan_strings+0xbc/0x478
[  175.280182]  kunit_try_run_case+0xf8/0x260
[  175.281641]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.283257]  kthread+0x18c/0x1a8
[  175.284421]  ret_from_fork+0x10/0x20
[  175.285310] 
[  175.285619] The buggy address belongs to the object at ffff0000c5f79a40
[  175.285619]  which belongs to the cache kmalloc-32 of size 32
[  175.288524] The buggy address is located 16 bytes inside of
[  175.288524]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.291291] 
[  175.292021] The buggy address belongs to the physical page:
[  175.293253] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.296816] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.298622] page_type: 0xffffffff()
[  175.299825] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.302208] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.304008] page dumped because: kasan: bad access detected
[  175.305461] 
[  175.306111] Memory state around the buggy address:
[  175.307394]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.309156]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.310601] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.313125]                                                  ^
[  175.314816]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.316910]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.318616] ==================================================================

test log snippet boot parser 50

Home

[  176.988750] ==================================================================
[  176.991952] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xc8/0x1d8
[  176.993898] Read of size 1 at addr ffff0000c5beef60 by task kunit_try_catch/211
[  176.995543] 
[  176.996260] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  176.998189] Hardware name: linux,dummy-virt (DT)
[  176.999498] Call trace:
[  177.000280]  dump_backtrace+0x9c/0x128
[  177.001205]  show_stack+0x20/0x38
[  177.002283]  dump_stack_lvl+0x60/0xb0
[  177.003671]  print_report+0xf8/0x5d8
[  177.004913]  kasan_report+0xc8/0x118
[  177.006057]  __kasan_check_byte+0x54/0x70
[  177.007245]  kfree_sensitive+0x30/0xb0
[  177.008634]  kmalloc_double_kzfree+0xc8/0x1d8
[  177.009862]  kunit_try_run_case+0xf8/0x260
[  177.011068]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.012620]  kthread+0x18c/0x1a8
[  177.014333]  ret_from_fork+0x10/0x20
[  177.015525] 
[  177.016033] Allocated by task 211:
[  177.016771]  kasan_save_stack+0x3c/0x68
[  177.018148]  kasan_set_track+0x2c/0x40
[  177.019803]  kasan_save_alloc_info+0x24/0x38
[  177.021182]  __kasan_kmalloc+0xd4/0xd8
[  177.022394]  kmalloc_trace+0x68/0x130
[  177.023743]  kmalloc_double_kzfree+0x9c/0x1d8
[  177.025110]  kunit_try_run_case+0xf8/0x260
[  177.026363]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.027885]  kthread+0x18c/0x1a8
[  177.028923]  ret_from_fork+0x10/0x20
[  177.030063] 
[  177.030633] Freed by task 211:
[  177.031708]  kasan_save_stack+0x3c/0x68
[  177.033159]  kasan_set_track+0x2c/0x40
[  177.034153]  kasan_save_free_info+0x38/0x60
[  177.036390]  __kasan_slab_free+0x100/0x170
[  177.037624]  __kmem_cache_free+0x170/0x2e0
[  177.038831]  kfree+0x74/0x138
[  177.040081]  kfree_sensitive+0x80/0xb0
[  177.041156]  kmalloc_double_kzfree+0xb8/0x1d8
[  177.042343]  kunit_try_run_case+0xf8/0x260
[  177.043643]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.045180]  kthread+0x18c/0x1a8
[  177.046173]  ret_from_fork+0x10/0x20
[  177.047507] 
[  177.048175] The buggy address belongs to the object at ffff0000c5beef60
[  177.048175]  which belongs to the cache kmalloc-16 of size 16
[  177.050613] The buggy address is located 0 bytes inside of
[  177.050613]  freed 16-byte region [ffff0000c5beef60, ffff0000c5beef70)
[  177.053237] 
[  177.053712] The buggy address belongs to the physical page:
[  177.055050] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  177.057553] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  177.059442] page_type: 0xffffffff()
[  177.060555] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  177.062373] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  177.064556] page dumped because: kasan: bad access detected
[  177.065833] 
[  177.066385] Memory state around the buggy address:
[  177.067989]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  177.069636]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  177.071288] >ffff0000c5beef00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  177.073491]                                                        ^
[  177.075306]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.077375]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.078874] ==================================================================

test log snippet boot parser 51

Home

[  172.399918] ==================================================================
[  172.402261] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xc8/0x1d0
[  172.404239] Read of size 1 at addr ffff0000c5902388 by task kunit_try_catch/163
[  172.406352] 
[  172.407335] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.409622] Hardware name: linux,dummy-virt (DT)
[  172.410478] Call trace:
[  172.411411]  dump_backtrace+0x9c/0x128
[  172.413147]  show_stack+0x20/0x38
[  172.414211]  dump_stack_lvl+0x60/0xb0
[  172.415823]  print_report+0xf8/0x5d8
[  172.416903]  kasan_report+0xc8/0x118
[  172.418046]  __asan_load1+0x60/0x70
[  172.419543]  kmalloc_uaf+0xc8/0x1d0
[  172.421310]  kunit_try_run_case+0xf8/0x260
[  172.422585]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.424044]  kthread+0x18c/0x1a8
[  172.424851]  ret_from_fork+0x10/0x20
[  172.425794] 
[  172.426265] Allocated by task 163:
[  172.427107]  kasan_save_stack+0x3c/0x68
[  172.428820]  kasan_set_track+0x2c/0x40
[  172.430024]  kasan_save_alloc_info+0x24/0x38
[  172.431742]  __kasan_kmalloc+0xd4/0xd8
[  172.432944]  kmalloc_trace+0x68/0x130
[  172.434510]  kmalloc_uaf+0x9c/0x1d0
[  172.436114]  kunit_try_run_case+0xf8/0x260
[  172.437336]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.439019]  kthread+0x18c/0x1a8
[  172.440108]  ret_from_fork+0x10/0x20
[  172.441206] 
[  172.441888] Freed by task 163:
[  172.442742]  kasan_save_stack+0x3c/0x68
[  172.444207]  kasan_set_track+0x2c/0x40
[  172.445812]  kasan_save_free_info+0x38/0x60
[  172.446568]  __kasan_slab_free+0x100/0x170
[  172.448691]  __kmem_cache_free+0x170/0x2e0
[  172.450071]  kfree+0x74/0x138
[  172.451178]  kmalloc_uaf+0xb8/0x1d0
[  172.452073]  kunit_try_run_case+0xf8/0x260
[  172.454299]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.456108]  kthread+0x18c/0x1a8
[  172.457153]  ret_from_fork+0x10/0x20
[  172.458453] 
[  172.459413] The buggy address belongs to the object at ffff0000c5902380
[  172.459413]  which belongs to the cache kmalloc-16 of size 16
[  172.462687] The buggy address is located 8 bytes inside of
[  172.462687]  freed 16-byte region [ffff0000c5902380, ffff0000c5902390)
[  172.465805] 
[  172.466409] The buggy address belongs to the physical page:
[  172.467921] page:000000000435baa8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105902
[  172.469471] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.471753] page_type: 0xffffffff()
[  172.473113] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  172.474863] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  172.476523] page dumped because: kasan: bad access detected
[  172.477917] 
[  172.478468] Memory state around the buggy address:
[  172.480090]  ffff0000c5902280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  172.481716]  ffff0000c5902300: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[  172.483740] >ffff0000c5902380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.484942]                       ^
[  172.486009]  ffff0000c5902400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.488266]  ffff0000c5902480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.489675] ==================================================================

test log snippet boot parser 52

Home

[  172.632937] ==================================================================
[  172.635298] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x108/0x290
[  172.636937] Read of size 1 at addr ffff0000c5f7cc28 by task kunit_try_catch/167
[  172.639699] 
[  172.640229] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.641692] Hardware name: linux,dummy-virt (DT)
[  172.643910] Call trace:
[  172.644526]  dump_backtrace+0x9c/0x128
[  172.645981]  show_stack+0x20/0x38
[  172.647533]  dump_stack_lvl+0x60/0xb0
[  172.649156]  print_report+0xf8/0x5d8
[  172.650318]  kasan_report+0xc8/0x118
[  172.651571]  __asan_load1+0x60/0x70
[  172.653221]  kmalloc_uaf2+0x108/0x290
[  172.654277]  kunit_try_run_case+0xf8/0x260
[  172.655811]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.657276]  kthread+0x18c/0x1a8
[  172.658254]  ret_from_fork+0x10/0x20
[  172.659699] 
[  172.660911] Allocated by task 167:
[  172.661838]  kasan_save_stack+0x3c/0x68
[  172.662990]  kasan_set_track+0x2c/0x40
[  172.664202]  kasan_save_alloc_info+0x24/0x38
[  172.665542]  __kasan_kmalloc+0xd4/0xd8
[  172.666785]  kmalloc_trace+0x68/0x130
[  172.668175]  kmalloc_uaf2+0xb4/0x290
[  172.669070]  kunit_try_run_case+0xf8/0x260
[  172.670484]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.672280]  kthread+0x18c/0x1a8
[  172.673384]  ret_from_fork+0x10/0x20
[  172.674560] 
[  172.675097] Freed by task 167:
[  172.676407]  kasan_save_stack+0x3c/0x68
[  172.677410]  kasan_set_track+0x2c/0x40
[  172.678764]  kasan_save_free_info+0x38/0x60
[  172.680020]  __kasan_slab_free+0x100/0x170
[  172.681341]  __kmem_cache_free+0x170/0x2e0
[  172.682608]  kfree+0x74/0x138
[  172.683713]  kmalloc_uaf2+0xc8/0x290
[  172.684846]  kunit_try_run_case+0xf8/0x260
[  172.686151]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.688199]  kthread+0x18c/0x1a8
[  172.689153]  ret_from_fork+0x10/0x20
[  172.690244] 
[  172.690768] The buggy address belongs to the object at ffff0000c5f7cc00
[  172.690768]  which belongs to the cache kmalloc-64 of size 64
[  172.693568] The buggy address is located 40 bytes inside of
[  172.693568]  freed 64-byte region [ffff0000c5f7cc00, ffff0000c5f7cc40)
[  172.696232] 
[  172.697168] The buggy address belongs to the physical page:
[  172.698535] page:00000000c9fbfb33 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[  172.700778] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.702504] page_type: 0xffffffff()
[  172.703578] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  172.705641] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  172.707585] page dumped because: kasan: bad access detected
[  172.708577] 
[  172.709034] Memory state around the buggy address:
[  172.709953]  ffff0000c5f7cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.712117]  ffff0000c5f7cb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.714223] >ffff0000c5f7cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.715848]                                   ^
[  172.717455]  ffff0000c5f7cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.718740]  ffff0000c5f7cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.721011] ==================================================================

test log snippet boot parser 53

Home

[  171.656534] ==================================================================
[  171.658876] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x258
[  171.661259] Read of size 16 at addr ffff0000c5beef20 by task kunit_try_catch/147
[  171.662916] 
[  171.663611] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.665785] Hardware name: linux,dummy-virt (DT)
[  171.667021] Call trace:
[  171.667712]  dump_backtrace+0x9c/0x128
[  171.668945]  show_stack+0x20/0x38
[  171.669960]  dump_stack_lvl+0x60/0xb0
[  171.670993]  print_report+0xf8/0x5d8
[  171.672117]  kasan_report+0xc8/0x118
[  171.673257]  __asan_load16+0xa4/0xa8
[  171.674354]  kmalloc_uaf_16+0x100/0x258
[  171.676239]  kunit_try_run_case+0xf8/0x260
[  171.677405]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.678947]  kthread+0x18c/0x1a8
[  171.680168]  ret_from_fork+0x10/0x20
[  171.681233] 
[  171.681775] Allocated by task 147:
[  171.682668]  kasan_save_stack+0x3c/0x68
[  171.684017]  kasan_set_track+0x2c/0x40
[  171.685170]  kasan_save_alloc_info+0x24/0x38
[  171.686435]  __kasan_kmalloc+0xd4/0xd8
[  171.687716]  kmalloc_trace+0x68/0x130
[  171.689098]  kmalloc_uaf_16+0xcc/0x258
[  171.690140]  kunit_try_run_case+0xf8/0x260
[  171.691594]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.693089]  kthread+0x18c/0x1a8
[  171.694052]  ret_from_fork+0x10/0x20
[  171.695271] 
[  171.696153] Freed by task 147:
[  171.697337]  kasan_save_stack+0x3c/0x68
[  171.698487]  kasan_set_track+0x2c/0x40
[  171.700192]  kasan_save_free_info+0x38/0x60
[  171.701519]  __kasan_slab_free+0x100/0x170
[  171.702701]  __kmem_cache_free+0x170/0x2e0
[  171.703880]  kfree+0x74/0x138
[  171.704869]  kmalloc_uaf_16+0xe8/0x258
[  171.705882]  kunit_try_run_case+0xf8/0x260
[  171.707268]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.708714]  kthread+0x18c/0x1a8
[  171.709710]  ret_from_fork+0x10/0x20
[  171.710849] 
[  171.711612] The buggy address belongs to the object at ffff0000c5beef20
[  171.711612]  which belongs to the cache kmalloc-16 of size 16
[  171.713977] The buggy address is located 0 bytes inside of
[  171.713977]  freed 16-byte region [ffff0000c5beef20, ffff0000c5beef30)
[  171.717015] 
[  171.717462] The buggy address belongs to the physical page:
[  171.718576] page:000000005b649d22 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bee
[  171.720698] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  171.722408] page_type: 0xffffffff()
[  171.724113] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  171.725955] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  171.727643] page dumped because: kasan: bad access detected
[  171.729233] 
[  171.729796] Memory state around the buggy address:
[  171.731008]  ffff0000c5beee00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  171.732971]  ffff0000c5beee80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[  171.734597] >ffff0000c5beef00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[  171.736458]                                ^
[  171.737783]  ffff0000c5beef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.739839]  ffff0000c5bef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  171.741384] ==================================================================

test log snippet boot parser 54

Home

[  172.513477] ==================================================================
[  172.515891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd0/0x1d8
[  172.518399] Write of size 33 at addr ffff0000c5f7cb80 by task kunit_try_catch/165
[  172.519706] 
[  172.522000] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  172.523941] Hardware name: linux,dummy-virt (DT)
[  172.524818] Call trace:
[  172.525777]  dump_backtrace+0x9c/0x128
[  172.527216]  show_stack+0x20/0x38
[  172.528381]  dump_stack_lvl+0x60/0xb0
[  172.529585]  print_report+0xf8/0x5d8
[  172.530754]  kasan_report+0xc8/0x118
[  172.532040]  kasan_check_range+0xe8/0x190
[  172.533258]  __asan_memset+0x34/0x78
[  172.534467]  kmalloc_uaf_memset+0xd0/0x1d8
[  172.535870]  kunit_try_run_case+0xf8/0x260
[  172.536997]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.538565]  kthread+0x18c/0x1a8
[  172.540015]  ret_from_fork+0x10/0x20
[  172.541421] 
[  172.542051] Allocated by task 165:
[  172.543029]  kasan_save_stack+0x3c/0x68
[  172.544749]  kasan_set_track+0x2c/0x40
[  172.545912]  kasan_save_alloc_info+0x24/0x38
[  172.547256]  __kasan_kmalloc+0xd4/0xd8
[  172.548362]  kmalloc_trace+0x68/0x130
[  172.549694]  kmalloc_uaf_memset+0x9c/0x1d8
[  172.551146]  kunit_try_run_case+0xf8/0x260
[  172.552378]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.553575]  kthread+0x18c/0x1a8
[  172.554155]  ret_from_fork+0x10/0x20
[  172.554770] 
[  172.555846] Freed by task 165:
[  172.557647]  kasan_save_stack+0x3c/0x68
[  172.558981]  kasan_set_track+0x2c/0x40
[  172.560218]  kasan_save_free_info+0x38/0x60
[  172.561708]  __kasan_slab_free+0x100/0x170
[  172.563030]  __kmem_cache_free+0x170/0x2e0
[  172.564210]  kfree+0x74/0x138
[  172.565343]  kmalloc_uaf_memset+0xb8/0x1d8
[  172.566498]  kunit_try_run_case+0xf8/0x260
[  172.568201]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  172.569836]  kthread+0x18c/0x1a8
[  172.570865]  ret_from_fork+0x10/0x20
[  172.572057] 
[  172.572603] The buggy address belongs to the object at ffff0000c5f7cb80
[  172.572603]  which belongs to the cache kmalloc-64 of size 64
[  172.575195] The buggy address is located 0 bytes inside of
[  172.575195]  freed 64-byte region [ffff0000c5f7cb80, ffff0000c5f7cbc0)
[  172.578178] 
[  172.578738] The buggy address belongs to the physical page:
[  172.580167] page:00000000c9fbfb33 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[  172.582201] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  172.583604] page_type: 0xffffffff()
[  172.585336] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  172.587157] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  172.589269] page dumped because: kasan: bad access detected
[  172.590929] 
[  172.591920] Memory state around the buggy address:
[  172.593445]  ffff0000c5f7ca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.595161]  ffff0000c5f7cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.596957] >ffff0000c5f7cb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  172.598604]                    ^
[  172.599775]  ffff0000c5f7cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.601686]  ffff0000c5f7cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  172.603353] ==================================================================

test log snippet boot parser 55

Home

[  174.649711] ==================================================================
[  174.652502] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1b8
[  174.653881] Read of size 1 at addr ffff0000c56d8640 by task kunit_try_catch/199
[  174.656384] 
[  174.656912] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.659332] Hardware name: linux,dummy-virt (DT)
[  174.660581] Call trace:
[  174.661348]  dump_backtrace+0x9c/0x128
[  174.662493]  show_stack+0x20/0x38
[  174.663615]  dump_stack_lvl+0x60/0xb0
[  174.664914]  print_report+0xf8/0x5d8
[  174.666323]  kasan_report+0xc8/0x118
[  174.667987]  __kasan_check_byte+0x54/0x70
[  174.669302]  kmem_cache_destroy+0x30/0x178
[  174.670482]  kmem_cache_double_destroy+0xd0/0x1b8
[  174.672097]  kunit_try_run_case+0xf8/0x260
[  174.673392]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.675127]  kthread+0x18c/0x1a8
[  174.676229]  ret_from_fork+0x10/0x20
[  174.677375] 
[  174.678143] Allocated by task 199:
[  174.679115]  kasan_save_stack+0x3c/0x68
[  174.680557]  kasan_set_track+0x2c/0x40
[  174.681977]  kasan_save_alloc_info+0x24/0x38
[  174.683362]  __kasan_slab_alloc+0xa8/0xb0
[  174.684781]  kmem_cache_alloc+0x134/0x330
[  174.685951]  kmem_cache_create_usercopy+0x170/0x260
[  174.687296]  kmem_cache_create+0x24/0x38
[  174.688699]  kmem_cache_double_destroy+0xa4/0x1b8
[  174.690290]  kunit_try_run_case+0xf8/0x260
[  174.691593]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.693144]  kthread+0x18c/0x1a8
[  174.694326]  ret_from_fork+0x10/0x20
[  174.695664] 
[  174.696287] Freed by task 199:
[  174.697173]  kasan_save_stack+0x3c/0x68
[  174.698356]  kasan_set_track+0x2c/0x40
[  174.699844]  kasan_save_free_info+0x38/0x60
[  174.702025]  __kasan_slab_free+0x100/0x170
[  174.703299]  kmem_cache_free+0x18c/0x3f8
[  174.704491]  slab_kmem_cache_release+0x38/0x50
[  174.705743]  kmem_cache_release+0x1c/0x30
[  174.706922]  kobject_put+0x104/0x2d0
[  174.708169]  sysfs_slab_release+0x30/0x48
[  174.709363]  kmem_cache_destroy+0xd8/0x178
[  174.710580]  kmem_cache_double_destroy+0xc0/0x1b8
[  174.712152]  kunit_try_run_case+0xf8/0x260
[  174.713619]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.715263]  kthread+0x18c/0x1a8
[  174.716338]  ret_from_fork+0x10/0x20
[  174.717551] 
[  174.718197] The buggy address belongs to the object at ffff0000c56d8640
[  174.718197]  which belongs to the cache kmem_cache of size 208
[  174.721814] The buggy address is located 0 bytes inside of
[  174.721814]  freed 208-byte region [ffff0000c56d8640, ffff0000c56d8710)
[  174.725085] 
[  174.725883] The buggy address belongs to the physical page:
[  174.727400] page:00000000ee5f9298 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d8
[  174.730120] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.731448] page_type: 0xffffffff()
[  174.732686] raw: 0bfffc0000000800 ffff0000c0001000 dead000000000122 0000000000000000
[  174.734473] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[  174.736404] page dumped because: kasan: bad access detected
[  174.737363] 
[  174.737992] Memory state around the buggy address:
[  174.739206]  ffff0000c56d8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  174.740948]  ffff0000c56d8580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[  174.742543] >ffff0000c56d8600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[  174.744389]                                            ^
[  174.745508]  ffff0000c56d8680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  174.747339]  ffff0000c56d8700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.748927] ==================================================================

test log snippet boot parser 56

Home

[  171.458157] ==================================================================
[  171.459682] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x10c/0x2c0
[  171.461416] Read of size 1 at addr ffff0000c3dbe600 by task kunit_try_catch/143
[  171.463740] 
[  171.464579] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.466428] Hardware name: linux,dummy-virt (DT)
[  171.467903] Call trace:
[  171.468443]  dump_backtrace+0x9c/0x128
[  171.469583]  show_stack+0x20/0x38
[  171.470575]  dump_stack_lvl+0x60/0xb0
[  171.471780]  print_report+0xf8/0x5d8
[  171.473144]  kasan_report+0xc8/0x118
[  171.474257]  __asan_load1+0x60/0x70
[  171.475565]  krealloc_uaf+0x10c/0x2c0
[  171.476834]  kunit_try_run_case+0xf8/0x260
[  171.478174]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.480362]  kthread+0x18c/0x1a8
[  171.481374]  ret_from_fork+0x10/0x20
[  171.482458] 
[  171.483008] Allocated by task 143:
[  171.484119]  kasan_save_stack+0x3c/0x68
[  171.485206]  kasan_set_track+0x2c/0x40
[  171.486379]  kasan_save_alloc_info+0x24/0x38
[  171.487914]  __kasan_kmalloc+0xd4/0xd8
[  171.489016]  kmalloc_trace+0x68/0x130
[  171.490168]  krealloc_uaf+0xb0/0x2c0
[  171.491641]  kunit_try_run_case+0xf8/0x260
[  171.492939]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.494406]  kthread+0x18c/0x1a8
[  171.495499]  ret_from_fork+0x10/0x20
[  171.497129] 
[  171.497577] Freed by task 143:
[  171.498223]  kasan_save_stack+0x3c/0x68
[  171.499503]  kasan_set_track+0x2c/0x40
[  171.501018]  kasan_save_free_info+0x38/0x60
[  171.502327]  __kasan_slab_free+0x100/0x170
[  171.503595]  __kmem_cache_free+0x170/0x2e0
[  171.504908]  kfree+0x74/0x138
[  171.505853]  krealloc_uaf+0xcc/0x2c0
[  171.506924]  kunit_try_run_case+0xf8/0x260
[  171.508303]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.509792]  kthread+0x18c/0x1a8
[  171.510767]  ret_from_fork+0x10/0x20
[  171.511932] 
[  171.512473] The buggy address belongs to the object at ffff0000c3dbe600
[  171.512473]  which belongs to the cache kmalloc-256 of size 256
[  171.514968] The buggy address is located 0 bytes inside of
[  171.514968]  freed 256-byte region [ffff0000c3dbe600, ffff0000c3dbe700)
[  171.518234] 
[  171.519280] The buggy address belongs to the physical page:
[  171.520662] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[  171.522899] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.524917] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  171.526640] page_type: 0xffffffff()
[  171.527926] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  171.529582] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  171.531299] page dumped because: kasan: bad access detected
[  171.532496] 
[  171.533026] Memory state around the buggy address:
[  171.534240]  ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.536759]  ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.538494] >ffff0000c3dbe600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  171.540293]                    ^
[  171.541302]  ffff0000c3dbe680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  171.543033]  ffff0000c3dbe700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.544259] ==================================================================

test log snippet boot parser 57

Home

[  171.365703] ==================================================================
[  171.368459] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2c0
[  171.369779] Read of size 1 at addr ffff0000c3dbe600 by task kunit_try_catch/143
[  171.371295] 
[  171.372020] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  171.374509] Hardware name: linux,dummy-virt (DT)
[  171.375620] Call trace:
[  171.376371]  dump_backtrace+0x9c/0x128
[  171.377458]  show_stack+0x20/0x38
[  171.378465]  dump_stack_lvl+0x60/0xb0
[  171.379828]  print_report+0xf8/0x5d8
[  171.380995]  kasan_report+0xc8/0x118
[  171.382114]  __kasan_check_byte+0x54/0x70
[  171.383391]  krealloc+0x48/0x1a0
[  171.384236]  krealloc_uaf+0xe4/0x2c0
[  171.386448]  kunit_try_run_case+0xf8/0x260
[  171.388358]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.389762]  kthread+0x18c/0x1a8
[  171.390771]  ret_from_fork+0x10/0x20
[  171.391978] 
[  171.392512] Allocated by task 143:
[  171.393777]  kasan_save_stack+0x3c/0x68
[  171.395037]  kasan_set_track+0x2c/0x40
[  171.396459]  kasan_save_alloc_info+0x24/0x38
[  171.397566]  __kasan_kmalloc+0xd4/0xd8
[  171.398716]  kmalloc_trace+0x68/0x130
[  171.399970]  krealloc_uaf+0xb0/0x2c0
[  171.401040]  kunit_try_run_case+0xf8/0x260
[  171.402217]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.403920]  kthread+0x18c/0x1a8
[  171.404665]  ret_from_fork+0x10/0x20
[  171.405800] 
[  171.406417] Freed by task 143:
[  171.407519]  kasan_save_stack+0x3c/0x68
[  171.408703]  kasan_set_track+0x2c/0x40
[  171.409878]  kasan_save_free_info+0x38/0x60
[  171.411408]  __kasan_slab_free+0x100/0x170
[  171.412669]  __kmem_cache_free+0x170/0x2e0
[  171.413896]  kfree+0x74/0x138
[  171.414704]  krealloc_uaf+0xcc/0x2c0
[  171.416087]  kunit_try_run_case+0xf8/0x260
[  171.417328]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  171.418762]  kthread+0x18c/0x1a8
[  171.419740]  ret_from_fork+0x10/0x20
[  171.420883] 
[  171.421468] The buggy address belongs to the object at ffff0000c3dbe600
[  171.421468]  which belongs to the cache kmalloc-256 of size 256
[  171.424559] The buggy address is located 0 bytes inside of
[  171.424559]  freed 256-byte region [ffff0000c3dbe600, ffff0000c3dbe700)
[  171.427949] 
[  171.428980] The buggy address belongs to the physical page:
[  171.430311] page:00000000bc5204b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103dbe
[  171.432523] head:00000000bc5204b9 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  171.434308] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  171.436166] page_type: 0xffffffff()
[  171.437331] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  171.439697] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  171.441316] page dumped because: kasan: bad access detected
[  171.442610] 
[  171.443182] Memory state around the buggy address:
[  171.444393]  ffff0000c3dbe500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.446149]  ffff0000c3dbe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.447910] >ffff0000c3dbe600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  171.449572]                    ^
[  171.450318]  ffff0000c3dbe680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  171.452372]  ffff0000c3dbe700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  171.454284] ==================================================================

test log snippet boot parser 58

Home

[  174.190334] ==================================================================
[  174.192156] BUG: KASAN: slab-use-after-free in ksize_uaf+0xe8/0x2f0
[  174.193654] Read of size 1 at addr ffff0000c5f83b00 by task kunit_try_catch/193
[  174.195481] 
[  174.196084] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.198083] Hardware name: linux,dummy-virt (DT)
[  174.199860] Call trace:
[  174.200482]  dump_backtrace+0x9c/0x128
[  174.201605]  show_stack+0x20/0x38
[  174.202673]  dump_stack_lvl+0x60/0xb0
[  174.203886]  print_report+0xf8/0x5d8
[  174.204995]  kasan_report+0xc8/0x118
[  174.206156]  __asan_load1+0x60/0x70
[  174.207343]  ksize_uaf+0xe8/0x2f0
[  174.208360]  kunit_try_run_case+0xf8/0x260
[  174.209772]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.211635]  kthread+0x18c/0x1a8
[  174.212518]  ret_from_fork+0x10/0x20
[  174.213534] 
[  174.214207] Allocated by task 193:
[  174.215257]  kasan_save_stack+0x3c/0x68
[  174.216797]  kasan_set_track+0x2c/0x40
[  174.218070]  kasan_save_alloc_info+0x24/0x38
[  174.219494]  __kasan_kmalloc+0xd4/0xd8
[  174.220851]  kmalloc_trace+0x68/0x130
[  174.221793]  ksize_uaf+0x9c/0x2f0
[  174.222905]  kunit_try_run_case+0xf8/0x260
[  174.224319]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.225824]  kthread+0x18c/0x1a8
[  174.226797]  ret_from_fork+0x10/0x20
[  174.228247] 
[  174.228756] Freed by task 193:
[  174.229613]  kasan_save_stack+0x3c/0x68
[  174.230776]  kasan_set_track+0x2c/0x40
[  174.231927]  kasan_save_free_info+0x38/0x60
[  174.233211]  __kasan_slab_free+0x100/0x170
[  174.234551]  __kmem_cache_free+0x170/0x2e0
[  174.235716]  kfree+0x74/0x138
[  174.236648]  ksize_uaf+0xb8/0x2f0
[  174.238424]  kunit_try_run_case+0xf8/0x260
[  174.239685]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.241457]  kthread+0x18c/0x1a8
[  174.242448]  ret_from_fork+0x10/0x20
[  174.243844] 
[  174.244443] The buggy address belongs to the object at ffff0000c5f83b00
[  174.244443]  which belongs to the cache kmalloc-128 of size 128
[  174.247011] The buggy address is located 0 bytes inside of
[  174.247011]  freed 128-byte region [ffff0000c5f83b00, ffff0000c5f83b80)
[  174.249693] 
[  174.250353] The buggy address belongs to the physical page:
[  174.251932] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[  174.254163] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.255986] page_type: 0xffffffff()
[  174.257187] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  174.258931] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  174.260815] page dumped because: kasan: bad access detected
[  174.262065] 
[  174.262586] Memory state around the buggy address:
[  174.264049]  ffff0000c5f83a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  174.265582]  ffff0000c5f83a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.267271] >ffff0000c5f83b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  174.268803]                    ^
[  174.269675]  ffff0000c5f83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.271356]  ffff0000c5f83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.273536] ==================================================================

test log snippet boot parser 59

Home

[  174.277000] ==================================================================
[  174.278547] BUG: KASAN: slab-use-after-free in ksize_uaf+0x10c/0x2f0
[  174.280076] Read of size 1 at addr ffff0000c5f83b78 by task kunit_try_catch/193
[  174.281967] 
[  174.282574] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.285039] Hardware name: linux,dummy-virt (DT)
[  174.286287] Call trace:
[  174.286864]  dump_backtrace+0x9c/0x128
[  174.288320]  show_stack+0x20/0x38
[  174.289298]  dump_stack_lvl+0x60/0xb0
[  174.290477]  print_report+0xf8/0x5d8
[  174.291552]  kasan_report+0xc8/0x118
[  174.292771]  __asan_load1+0x60/0x70
[  174.293857]  ksize_uaf+0x10c/0x2f0
[  174.295052]  kunit_try_run_case+0xf8/0x260
[  174.296470]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.297950]  kthread+0x18c/0x1a8
[  174.298934]  ret_from_fork+0x10/0x20
[  174.299896] 
[  174.300508] Allocated by task 193:
[  174.301623]  kasan_save_stack+0x3c/0x68
[  174.302850]  kasan_set_track+0x2c/0x40
[  174.304541]  kasan_save_alloc_info+0x24/0x38
[  174.305878]  __kasan_kmalloc+0xd4/0xd8
[  174.307185]  kmalloc_trace+0x68/0x130
[  174.308288]  ksize_uaf+0x9c/0x2f0
[  174.309103]  kunit_try_run_case+0xf8/0x260
[  174.310401]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.311965]  kthread+0x18c/0x1a8
[  174.312993]  ret_from_fork+0x10/0x20
[  174.313882] 
[  174.314466] Freed by task 193:
[  174.315630]  kasan_save_stack+0x3c/0x68
[  174.316971]  kasan_set_track+0x2c/0x40
[  174.318119]  kasan_save_free_info+0x38/0x60
[  174.319437]  __kasan_slab_free+0x100/0x170
[  174.321335]  __kmem_cache_free+0x170/0x2e0
[  174.322446]  kfree+0x74/0x138
[  174.323670]  ksize_uaf+0xb8/0x2f0
[  174.324918]  kunit_try_run_case+0xf8/0x260
[  174.326159]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.327949]  kthread+0x18c/0x1a8
[  174.328936]  ret_from_fork+0x10/0x20
[  174.330075] 
[  174.330697] The buggy address belongs to the object at ffff0000c5f83b00
[  174.330697]  which belongs to the cache kmalloc-128 of size 128
[  174.333350] The buggy address is located 120 bytes inside of
[  174.333350]  freed 128-byte region [ffff0000c5f83b00, ffff0000c5f83b80)
[  174.336251] 
[  174.336807] The buggy address belongs to the physical page:
[  174.338117] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[  174.340637] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.342032] page_type: 0xffffffff()
[  174.343882] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  174.345514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  174.347185] page dumped because: kasan: bad access detected
[  174.348558] 
[  174.349321] Memory state around the buggy address:
[  174.350519]  ffff0000c5f83a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  174.352452]  ffff0000c5f83a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.354068] >ffff0000c5f83b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  174.355909]                                                                 ^
[  174.357675]  ffff0000c5f83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.359567]  ffff0000c5f83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.361065] ==================================================================

test log snippet boot parser 60

Home

[  174.100900] ==================================================================
[  174.103132] BUG: KASAN: slab-use-after-free in ksize_uaf+0xc8/0x2f0
[  174.105226] Read of size 1 at addr ffff0000c5f83b00 by task kunit_try_catch/193
[  174.106788] 
[  174.107493] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.109438] Hardware name: linux,dummy-virt (DT)
[  174.110533] Call trace:
[  174.111444]  dump_backtrace+0x9c/0x128
[  174.112616]  show_stack+0x20/0x38
[  174.113621]  dump_stack_lvl+0x60/0xb0
[  174.114802]  print_report+0xf8/0x5d8
[  174.116147]  kasan_report+0xc8/0x118
[  174.117455]  __kasan_check_byte+0x54/0x70
[  174.118644]  ksize+0x30/0x88
[  174.119612]  ksize_uaf+0xc8/0x2f0
[  174.120660]  kunit_try_run_case+0xf8/0x260
[  174.122127]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.123700]  kthread+0x18c/0x1a8
[  174.125391]  ret_from_fork+0x10/0x20
[  174.127313] 
[  174.128271] Allocated by task 193:
[  174.129014]  kasan_save_stack+0x3c/0x68
[  174.130300]  kasan_set_track+0x2c/0x40
[  174.131657]  kasan_save_alloc_info+0x24/0x38
[  174.132992]  __kasan_kmalloc+0xd4/0xd8
[  174.134151]  kmalloc_trace+0x68/0x130
[  174.135505]  ksize_uaf+0x9c/0x2f0
[  174.136587]  kunit_try_run_case+0xf8/0x260
[  174.137825]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.139354]  kthread+0x18c/0x1a8
[  174.140144]  ret_from_fork+0x10/0x20
[  174.141402] 
[  174.141956] Freed by task 193:
[  174.142807]  kasan_save_stack+0x3c/0x68
[  174.144042]  kasan_set_track+0x2c/0x40
[  174.145880]  kasan_save_free_info+0x38/0x60
[  174.147627]  __kasan_slab_free+0x100/0x170
[  174.148785]  __kmem_cache_free+0x170/0x2e0
[  174.150007]  kfree+0x74/0x138
[  174.150949]  ksize_uaf+0xb8/0x2f0
[  174.152275]  kunit_try_run_case+0xf8/0x260
[  174.153509]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.154980]  kthread+0x18c/0x1a8
[  174.155926]  ret_from_fork+0x10/0x20
[  174.157117] 
[  174.157625] The buggy address belongs to the object at ffff0000c5f83b00
[  174.157625]  which belongs to the cache kmalloc-128 of size 128
[  174.160604] The buggy address is located 0 bytes inside of
[  174.160604]  freed 128-byte region [ffff0000c5f83b00, ffff0000c5f83b80)
[  174.162954] 
[  174.164126] The buggy address belongs to the physical page:
[  174.165174] page:00000000e73b2def refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f83
[  174.167765] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  174.169629] page_type: 0xffffffff()
[  174.170657] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  174.172245] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  174.173604] page dumped because: kasan: bad access detected
[  174.174917] 
[  174.175433] Memory state around the buggy address:
[  174.176591]  ffff0000c5f83a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  174.178318]  ffff0000c5f83a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.180364] >ffff0000c5f83b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  174.182012]                    ^
[  174.182988]  ffff0000c5f83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.184826]  ffff0000c5f83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  174.186420] ==================================================================

test log snippet boot parser 61

Home

[  177.208076] ==================================================================
[  177.210498] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x30/0x50
[  177.212743] Read of size 4 at addr ffff0000c5f7fac0 by task swapper/0/0
[  177.214077] 
[  177.214672] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.6.72-rc1 #1
[  177.216467] Hardware name: linux,dummy-virt (DT)
[  177.217610] Call trace:
[  177.218345]  dump_backtrace+0x9c/0x128
[  177.219613]  show_stack+0x20/0x38
[  177.220637]  dump_stack_lvl+0x60/0xb0
[  177.221884]  print_report+0xf8/0x5d8
[  177.223274]  kasan_report+0xc8/0x118
[  177.224966]  __asan_load4+0x9c/0xc0
[  177.226282]  rcu_uaf_reclaim+0x30/0x50
[  177.227762]  rcu_core+0x448/0xf40
[  177.229093]  rcu_core_si+0x18/0x30
[  177.232411]  handle_softirqs+0x240/0x678
[  177.233809]  __do_softirq+0x1c/0x28
[  177.234703]  ____do_softirq+0x18/0x30
[  177.236353]  call_on_irq_stack+0x24/0x58
[  177.237376]  do_softirq_own_stack+0x24/0x38
[  177.238580]  irq_exit_rcu+0x110/0x160
[  177.239875]  el1_interrupt+0x38/0x58
[  177.240880]  el1h_64_irq_handler+0x18/0x28
[  177.242032]  el1h_64_irq+0x64/0x68
[  177.243008]  arch_local_irq_enable+0x4/0x8
[  177.244253]  do_idle+0x304/0x388
[  177.245317]  cpu_startup_entry+0x44/0x58
[  177.246502]  rest_init+0x11c/0x128
[  177.247544]  arch_call_rest_init+0x1c/0x28
[  177.249045]  start_kernel+0x2cc/0x390
[  177.250187]  __primary_switched+0xc0/0xd0
[  177.251590] 
[  177.252478] Allocated by task 213:
[  177.253230]  kasan_save_stack+0x3c/0x68
[  177.254521]  kasan_set_track+0x2c/0x40
[  177.255692]  kasan_save_alloc_info+0x24/0x38
[  177.257150]  __kasan_kmalloc+0xd4/0xd8
[  177.258308]  kmalloc_trace+0x68/0x130
[  177.259556]  rcu_uaf+0x9c/0x1e0
[  177.260689]  kunit_try_run_case+0xf8/0x260
[  177.261939]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.264051]  kthread+0x18c/0x1a8
[  177.265020]  ret_from_fork+0x10/0x20
[  177.266069] 
[  177.266589] Freed by task 0:
[  177.267572]  kasan_save_stack+0x3c/0x68
[  177.268932]  kasan_set_track+0x2c/0x40
[  177.270231]  kasan_save_free_info+0x38/0x60
[  177.271543]  __kasan_slab_free+0x100/0x170
[  177.272852]  __kmem_cache_free+0x170/0x2e0
[  177.273874]  kfree+0x74/0x138
[  177.275811]  rcu_uaf_reclaim+0x28/0x50
[  177.277375]  rcu_core+0x448/0xf40
[  177.278503]  rcu_core_si+0x18/0x30
[  177.279768]  handle_softirqs+0x240/0x678
[  177.280816]  __do_softirq+0x1c/0x28
[  177.281841] 
[  177.282420] Last potentially related work creation:
[  177.283357]  kasan_save_stack+0x3c/0x68
[  177.284579]  __kasan_record_aux_stack+0xb8/0xe8
[  177.286298]  kasan_record_aux_stack_noalloc+0x14/0x20
[  177.288007]  __call_rcu_common.constprop.0+0x58/0x598
[  177.289472]  call_rcu+0x18/0x30
[  177.290533]  rcu_uaf+0xd4/0x1e0
[  177.291774]  kunit_try_run_case+0xf8/0x260
[  177.293195]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.294684]  kthread+0x18c/0x1a8
[  177.295871]  ret_from_fork+0x10/0x20
[  177.296965] 
[  177.297481] The buggy address belongs to the object at ffff0000c5f7fac0
[  177.297481]  which belongs to the cache kmalloc-32 of size 32
[  177.300751] The buggy address is located 0 bytes inside of
[  177.300751]  freed 32-byte region [ffff0000c5f7fac0, ffff0000c5f7fae0)
[  177.303311] 
[  177.304608] The buggy address belongs to the physical page:
[  177.305892] page:00000000ad3e6439 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7f
[  177.308474] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  177.310109] page_type: 0xffffffff()
[  177.311884] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  177.313499] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  177.315207] page dumped because: kasan: bad access detected
[  177.316607] 
[  177.317122] Memory state around the buggy address:
[  177.318338]  ffff0000c5f7f980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  177.320371]  ffff0000c5f7fa00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  177.322134] >ffff0000c5f7fa80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  177.324136]                                            ^
[  177.325242]  ffff0000c5f7fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.326978]  ffff0000c5f7fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.328559] ==================================================================

test log snippet boot parser 62

Home

[  174.962806] ==================================================================
[  174.965438] BUG: KASAN: slab-use-after-free in strchr+0x20/0x80
[  174.966573] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  174.968921] 
[  174.969590] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.971607] Hardware name: linux,dummy-virt (DT)
[  174.973085] Call trace:
[  174.973979]  dump_backtrace+0x9c/0x128
[  174.975571]  show_stack+0x20/0x38
[  174.976662]  dump_stack_lvl+0x60/0xb0
[  174.977920]  print_report+0xf8/0x5d8
[  174.979129]  kasan_report+0xc8/0x118
[  174.980635]  __asan_load1+0x60/0x70
[  174.981818]  strchr+0x20/0x80
[  174.982839]  kasan_strings+0xdc/0x478
[  174.984173]  kunit_try_run_case+0xf8/0x260
[  174.986152]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.988286]  kthread+0x18c/0x1a8
[  174.989288]  ret_from_fork+0x10/0x20
[  174.990384] 
[  174.990908] Allocated by task 205:
[  174.991837]  kasan_save_stack+0x3c/0x68
[  174.992919]  kasan_set_track+0x2c/0x40
[  174.994103]  kasan_save_alloc_info+0x24/0x38
[  174.995611]  __kasan_kmalloc+0xd4/0xd8
[  174.996872]  kmalloc_trace+0x68/0x130
[  174.997967]  kasan_strings+0xa0/0x478
[  174.999458]  kunit_try_run_case+0xf8/0x260
[  175.000566]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.002019]  kthread+0x18c/0x1a8
[  175.003103]  ret_from_fork+0x10/0x20
[  175.004331] 
[  175.004795] Freed by task 205:
[  175.005492]  kasan_save_stack+0x3c/0x68
[  175.008008]  kasan_set_track+0x2c/0x40
[  175.009148]  kasan_save_free_info+0x38/0x60
[  175.010422]  __kasan_slab_free+0x100/0x170
[  175.011879]  __kmem_cache_free+0x170/0x2e0
[  175.013235]  kfree+0x74/0x138
[  175.014184]  kasan_strings+0xbc/0x478
[  175.015579]  kunit_try_run_case+0xf8/0x260
[  175.016825]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.018225]  kthread+0x18c/0x1a8
[  175.019253]  ret_from_fork+0x10/0x20
[  175.020230] 
[  175.020840] The buggy address belongs to the object at ffff0000c5f79a40
[  175.020840]  which belongs to the cache kmalloc-32 of size 32
[  175.024840] The buggy address is located 16 bytes inside of
[  175.024840]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.027200] 
[  175.028123] The buggy address belongs to the physical page:
[  175.029536] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.031461] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.033247] page_type: 0xffffffff()
[  175.034439] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.036544] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.038236] page dumped because: kasan: bad access detected
[  175.039853] 
[  175.040552] Memory state around the buggy address:
[  175.041849]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.043596]  ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  175.044980] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.047168]                                                  ^
[  175.048930]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.050565]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.052103] ==================================================================

test log snippet boot parser 63

Home

[  174.962806] ==================================================================
[  174.965438] BUG: KASAN: slab-use-after-free in strchr+0x20/0x80
[  174.966573] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  174.968921] 
[  174.969590] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  174.971607] Hardware name: linux,dummy-virt (DT)
[  174.973085] Call trace:
[  174.973979]  dump_backtrace+0x9c/0x128
[  174.975571]  show_stack+0x20/0x38
[  174.976662]  dump_stack_lvl+0x60/0xb0
[  174.977920]  print_report+0xf8/0x5d8
[  174.979129]  kasan_report+0xc8/0x118
[  174.980635]  __asan_load1+0x60/0x70
[  174.981818]  strchr+0x20/0x80
[  174.982839]  kasan_strings+0xdc/0x478
[  174.984173]  kunit_try_run_case+0xf8/0x260
[  174.986152]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  174.988286]  kthread+0x18c/0x1a8
[  174.989288]  ret_from_fork+0x10/0x20
[  174.990384] 
[  174.990908] Allocated by task 205:
[  174.991837]  kasan_save_stack+0x3c/0x68
[  174.992919]  kasan_set_track+0x2c/0x40
[  174.994103]  kasan_save_alloc_info+0x24/0x38
[  174.995611]  __kasan_kmalloc+0xd4/0xd8
[  174.996872]  kmalloc_trace+0x68/0x130
[  174.997967]  kasan_strings+0xa0/0x478
[  174.999458]  kunit_try_run_case+0xf8/0x260
[  175.000566]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.002019]  kthread+0x18c/0x1a8
[  175.003103]  ret_from_fork+0x10/0x20
[  175.004331] 
[  175.004795] Freed by task 205:
[  175.005492]  kasan_save_stack+0x3c/0x68
[  175.008008]  kasan_set_track+0x2c/0x40
[  175.009148]  kasan_save_free_info+0x38/0x60
[  175.010422]  __kasan_slab_free+0x100/0x170
[  175.011879]  __kmem_cache_free+0x170/0x2e0
[  175.013235]  kfree+0x74/0x138
[  175.014184]  kasan_strings+0xbc/0x478
[  175.015579]  kunit_try_run_case+0xf8/0x260
[  175.016825]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.018225]  kthread+0x18c/0x1a8
[  175.019253]  ret_from_fork+0x10/0x20
[  175.020230] 
[  175.020840] The buggy address belongs to the object at ffff0000c5f79a40
[  175.020840]  which belongs to the cache kmalloc-32 of size 32
[  175.024840] The buggy address is located 16 bytes inside of
[  175.024840]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.027200] 
[  175.028123] The buggy address belongs to the physical page:
[  175.029536] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.031461] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.033247] page_type: 0xffffffff()
[  175.034439] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.036544] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.038236] page dumped because: kasan: bad access detected
[  175.039853] 
[  175.040552] Memory state around the buggy address:
[  175.041849]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.043596]  ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  175.044980] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.047168]                                                  ^
[  175.048930]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.050565]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.052103] ==================================================================

test log snippet boot parser 64

Home

[  175.140125] ==================================================================
[  175.141844] BUG: KASAN: slab-use-after-free in strcmp+0x2c/0x78
[  175.144227] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.145861] 
[  175.146441] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.148343] Hardware name: linux,dummy-virt (DT)
[  175.149940] Call trace:
[  175.150653]  dump_backtrace+0x9c/0x128
[  175.151849]  show_stack+0x20/0x38
[  175.152891]  dump_stack_lvl+0x60/0xb0
[  175.154042]  print_report+0xf8/0x5d8
[  175.155587]  kasan_report+0xc8/0x118
[  175.156874]  __asan_load1+0x60/0x70
[  175.158025]  strcmp+0x2c/0x78
[  175.159037]  kasan_strings+0x12c/0x478
[  175.160649]  kunit_try_run_case+0xf8/0x260
[  175.161929]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.163449]  kthread+0x18c/0x1a8
[  175.164462]  ret_from_fork+0x10/0x20
[  175.166105] 
[  175.166653] Allocated by task 205:
[  175.168154]  kasan_save_stack+0x3c/0x68
[  175.169228]  kasan_set_track+0x2c/0x40
[  175.170375]  kasan_save_alloc_info+0x24/0x38
[  175.171783]  __kasan_kmalloc+0xd4/0xd8
[  175.173279]  kmalloc_trace+0x68/0x130
[  175.174343]  kasan_strings+0xa0/0x478
[  175.175839]  kunit_try_run_case+0xf8/0x260
[  175.176936]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.178405]  kthread+0x18c/0x1a8
[  175.179441]  ret_from_fork+0x10/0x20
[  175.180617] 
[  175.181089] Freed by task 205:
[  175.182023]  kasan_save_stack+0x3c/0x68
[  175.183437]  kasan_set_track+0x2c/0x40
[  175.184543]  kasan_save_free_info+0x38/0x60
[  175.185880]  __kasan_slab_free+0x100/0x170
[  175.187121]  __kmem_cache_free+0x170/0x2e0
[  175.188703]  kfree+0x74/0x138
[  175.189655]  kasan_strings+0xbc/0x478
[  175.190765]  kunit_try_run_case+0xf8/0x260
[  175.192007]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.193529]  kthread+0x18c/0x1a8
[  175.194445]  ret_from_fork+0x10/0x20
[  175.195753] 
[  175.196325] The buggy address belongs to the object at ffff0000c5f79a40
[  175.196325]  which belongs to the cache kmalloc-32 of size 32
[  175.198763] The buggy address is located 16 bytes inside of
[  175.198763]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.201214] 
[  175.202316] The buggy address belongs to the physical page:
[  175.204010] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.206077] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.207682] page_type: 0xffffffff()
[  175.208849] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.210887] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.212946] page dumped because: kasan: bad access detected
[  175.214290] 
[  175.214876] Memory state around the buggy address:
[  175.216015]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.218024]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.220124] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.221762]                                                  ^
[  175.223353]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.225358]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.227046] ==================================================================

test log snippet boot parser 65

Home

[  175.140125] ==================================================================
[  175.141844] BUG: KASAN: slab-use-after-free in strcmp+0x2c/0x78
[  175.144227] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.145861] 
[  175.146441] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.148343] Hardware name: linux,dummy-virt (DT)
[  175.149940] Call trace:
[  175.150653]  dump_backtrace+0x9c/0x128
[  175.151849]  show_stack+0x20/0x38
[  175.152891]  dump_stack_lvl+0x60/0xb0
[  175.154042]  print_report+0xf8/0x5d8
[  175.155587]  kasan_report+0xc8/0x118
[  175.156874]  __asan_load1+0x60/0x70
[  175.158025]  strcmp+0x2c/0x78
[  175.159037]  kasan_strings+0x12c/0x478
[  175.160649]  kunit_try_run_case+0xf8/0x260
[  175.161929]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.163449]  kthread+0x18c/0x1a8
[  175.164462]  ret_from_fork+0x10/0x20
[  175.166105] 
[  175.166653] Allocated by task 205:
[  175.168154]  kasan_save_stack+0x3c/0x68
[  175.169228]  kasan_set_track+0x2c/0x40
[  175.170375]  kasan_save_alloc_info+0x24/0x38
[  175.171783]  __kasan_kmalloc+0xd4/0xd8
[  175.173279]  kmalloc_trace+0x68/0x130
[  175.174343]  kasan_strings+0xa0/0x478
[  175.175839]  kunit_try_run_case+0xf8/0x260
[  175.176936]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.178405]  kthread+0x18c/0x1a8
[  175.179441]  ret_from_fork+0x10/0x20
[  175.180617] 
[  175.181089] Freed by task 205:
[  175.182023]  kasan_save_stack+0x3c/0x68
[  175.183437]  kasan_set_track+0x2c/0x40
[  175.184543]  kasan_save_free_info+0x38/0x60
[  175.185880]  __kasan_slab_free+0x100/0x170
[  175.187121]  __kmem_cache_free+0x170/0x2e0
[  175.188703]  kfree+0x74/0x138
[  175.189655]  kasan_strings+0xbc/0x478
[  175.190765]  kunit_try_run_case+0xf8/0x260
[  175.192007]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.193529]  kthread+0x18c/0x1a8
[  175.194445]  ret_from_fork+0x10/0x20
[  175.195753] 
[  175.196325] The buggy address belongs to the object at ffff0000c5f79a40
[  175.196325]  which belongs to the cache kmalloc-32 of size 32
[  175.198763] The buggy address is located 16 bytes inside of
[  175.198763]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.201214] 
[  175.202316] The buggy address belongs to the physical page:
[  175.204010] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.206077] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.207682] page_type: 0xffffffff()
[  175.208849] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.210887] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.212946] page dumped because: kasan: bad access detected
[  175.214290] 
[  175.214876] Memory state around the buggy address:
[  175.216015]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.218024]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.220124] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.221762]                                                  ^
[  175.223353]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.225358]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.227046] ==================================================================

test log snippet boot parser 66

Home

[  175.321201] ==================================================================
[  175.322867] BUG: KASAN: slab-use-after-free in strlen+0x18/0x68
[  175.324394] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.326288] 
[  175.326978] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.328965] Hardware name: linux,dummy-virt (DT)
[  175.330078] Call trace:
[  175.330693]  dump_backtrace+0x9c/0x128
[  175.332496]  show_stack+0x20/0x38
[  175.333349]  dump_stack_lvl+0x60/0xb0
[  175.334710]  print_report+0xf8/0x5d8
[  175.336099]  kasan_report+0xc8/0x118
[  175.337824]  __asan_load1+0x60/0x70
[  175.339449]  strlen+0x18/0x68
[  175.340804]  kasan_strings+0x17c/0x478
[  175.341897]  kunit_try_run_case+0xf8/0x260
[  175.343444]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.344752]  kthread+0x18c/0x1a8
[  175.346141]  ret_from_fork+0x10/0x20
[  175.347740] 
[  175.348277] Allocated by task 205:
[  175.349033]  kasan_save_stack+0x3c/0x68
[  175.350242]  kasan_set_track+0x2c/0x40
[  175.352052]  kasan_save_alloc_info+0x24/0x38
[  175.353465]  __kasan_kmalloc+0xd4/0xd8
[  175.354620]  kmalloc_trace+0x68/0x130
[  175.356055]  kasan_strings+0xa0/0x478
[  175.357267]  kunit_try_run_case+0xf8/0x260
[  175.358474]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.360156]  kthread+0x18c/0x1a8
[  175.361045]  ret_from_fork+0x10/0x20
[  175.361997] 
[  175.362656] Freed by task 205:
[  175.364041]  kasan_save_stack+0x3c/0x68
[  175.365296]  kasan_set_track+0x2c/0x40
[  175.366530]  kasan_save_free_info+0x38/0x60
[  175.367924]  __kasan_slab_free+0x100/0x170
[  175.368962]  __kmem_cache_free+0x170/0x2e0
[  175.370190]  kfree+0x74/0x138
[  175.371582]  kasan_strings+0xbc/0x478
[  175.372747]  kunit_try_run_case+0xf8/0x260
[  175.374009]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.375580]  kthread+0x18c/0x1a8
[  175.376576]  ret_from_fork+0x10/0x20
[  175.378302] 
[  175.379024] The buggy address belongs to the object at ffff0000c5f79a40
[  175.379024]  which belongs to the cache kmalloc-32 of size 32
[  175.381960] The buggy address is located 16 bytes inside of
[  175.381960]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.384790] 
[  175.385374] The buggy address belongs to the physical page:
[  175.386862] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.389642] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.391341] page_type: 0xffffffff()
[  175.393148] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.395819] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.397403] page dumped because: kasan: bad access detected
[  175.398765] 
[  175.399616] Memory state around the buggy address:
[  175.400938]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.403347]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.405330] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.406785]                                                  ^
[  175.408431]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.409904]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.411834] ==================================================================

test log snippet boot parser 67

Home

[  175.321201] ==================================================================
[  175.322867] BUG: KASAN: slab-use-after-free in strlen+0x18/0x68
[  175.324394] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.326288] 
[  175.326978] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.328965] Hardware name: linux,dummy-virt (DT)
[  175.330078] Call trace:
[  175.330693]  dump_backtrace+0x9c/0x128
[  175.332496]  show_stack+0x20/0x38
[  175.333349]  dump_stack_lvl+0x60/0xb0
[  175.334710]  print_report+0xf8/0x5d8
[  175.336099]  kasan_report+0xc8/0x118
[  175.337824]  __asan_load1+0x60/0x70
[  175.339449]  strlen+0x18/0x68
[  175.340804]  kasan_strings+0x17c/0x478
[  175.341897]  kunit_try_run_case+0xf8/0x260
[  175.343444]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.344752]  kthread+0x18c/0x1a8
[  175.346141]  ret_from_fork+0x10/0x20
[  175.347740] 
[  175.348277] Allocated by task 205:
[  175.349033]  kasan_save_stack+0x3c/0x68
[  175.350242]  kasan_set_track+0x2c/0x40
[  175.352052]  kasan_save_alloc_info+0x24/0x38
[  175.353465]  __kasan_kmalloc+0xd4/0xd8
[  175.354620]  kmalloc_trace+0x68/0x130
[  175.356055]  kasan_strings+0xa0/0x478
[  175.357267]  kunit_try_run_case+0xf8/0x260
[  175.358474]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.360156]  kthread+0x18c/0x1a8
[  175.361045]  ret_from_fork+0x10/0x20
[  175.361997] 
[  175.362656] Freed by task 205:
[  175.364041]  kasan_save_stack+0x3c/0x68
[  175.365296]  kasan_set_track+0x2c/0x40
[  175.366530]  kasan_save_free_info+0x38/0x60
[  175.367924]  __kasan_slab_free+0x100/0x170
[  175.368962]  __kmem_cache_free+0x170/0x2e0
[  175.370190]  kfree+0x74/0x138
[  175.371582]  kasan_strings+0xbc/0x478
[  175.372747]  kunit_try_run_case+0xf8/0x260
[  175.374009]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.375580]  kthread+0x18c/0x1a8
[  175.376576]  ret_from_fork+0x10/0x20
[  175.378302] 
[  175.379024] The buggy address belongs to the object at ffff0000c5f79a40
[  175.379024]  which belongs to the cache kmalloc-32 of size 32
[  175.381960] The buggy address is located 16 bytes inside of
[  175.381960]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.384790] 
[  175.385374] The buggy address belongs to the physical page:
[  175.386862] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.389642] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.391341] page_type: 0xffffffff()
[  175.393148] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.395819] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.397403] page dumped because: kasan: bad access detected
[  175.398765] 
[  175.399616] Memory state around the buggy address:
[  175.400938]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.403347]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.405330] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.406785]                                                  ^
[  175.408431]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.409904]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.411834] ==================================================================

test log snippet boot parser 68

Home

[  175.414653] ==================================================================
[  175.415928] BUG: KASAN: slab-use-after-free in strnlen+0x3c/0x68
[  175.417715] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.419611] 
[  175.420314] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.422044] Hardware name: linux,dummy-virt (DT)
[  175.422979] Call trace:
[  175.423867]  dump_backtrace+0x9c/0x128
[  175.425241]  show_stack+0x20/0x38
[  175.426286]  dump_stack_lvl+0x60/0xb0
[  175.427510]  print_report+0xf8/0x5d8
[  175.428854]  kasan_report+0xc8/0x118
[  175.430121]  __asan_load1+0x60/0x70
[  175.431501]  strnlen+0x3c/0x68
[  175.432861]  kasan_strings+0x1a4/0x478
[  175.434051]  kunit_try_run_case+0xf8/0x260
[  175.435877]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.437178]  kthread+0x18c/0x1a8
[  175.438745]  ret_from_fork+0x10/0x20
[  175.440134] 
[  175.440789] Allocated by task 205:
[  175.441674]  kasan_save_stack+0x3c/0x68
[  175.443242]  kasan_set_track+0x2c/0x40
[  175.444299]  kasan_save_alloc_info+0x24/0x38
[  175.446383]  __kasan_kmalloc+0xd4/0xd8
[  175.447644]  kmalloc_trace+0x68/0x130
[  175.449107]  kasan_strings+0xa0/0x478
[  175.450248]  kunit_try_run_case+0xf8/0x260
[  175.451683]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.453436]  kthread+0x18c/0x1a8
[  175.454608]  ret_from_fork+0x10/0x20
[  175.456104] 
[  175.456776] Freed by task 205:
[  175.458009]  kasan_save_stack+0x3c/0x68
[  175.459758]  kasan_set_track+0x2c/0x40
[  175.460760]  kasan_save_free_info+0x38/0x60
[  175.461541]  __kasan_slab_free+0x100/0x170
[  175.462954]  __kmem_cache_free+0x170/0x2e0
[  175.464900]  kfree+0x74/0x138
[  175.465988]  kasan_strings+0xbc/0x478
[  175.467341]  kunit_try_run_case+0xf8/0x260
[  175.468989]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.470689]  kthread+0x18c/0x1a8
[  175.472002]  ret_from_fork+0x10/0x20
[  175.473272] 
[  175.473853] The buggy address belongs to the object at ffff0000c5f79a40
[  175.473853]  which belongs to the cache kmalloc-32 of size 32
[  175.476940] The buggy address is located 16 bytes inside of
[  175.476940]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.479885] 
[  175.480382] The buggy address belongs to the physical page:
[  175.481584] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.483651] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.486137] page_type: 0xffffffff()
[  175.487369] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.489479] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.490981] page dumped because: kasan: bad access detected
[  175.492267] 
[  175.492715] Memory state around the buggy address:
[  175.493649]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.495830]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.498140] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.500452]                                                  ^
[  175.501857]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.503533]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.505254] ==================================================================

test log snippet boot parser 69

Home

[  175.414653] ==================================================================
[  175.415928] BUG: KASAN: slab-use-after-free in strnlen+0x3c/0x68
[  175.417715] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.419611] 
[  175.420314] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.422044] Hardware name: linux,dummy-virt (DT)
[  175.422979] Call trace:
[  175.423867]  dump_backtrace+0x9c/0x128
[  175.425241]  show_stack+0x20/0x38
[  175.426286]  dump_stack_lvl+0x60/0xb0
[  175.427510]  print_report+0xf8/0x5d8
[  175.428854]  kasan_report+0xc8/0x118
[  175.430121]  __asan_load1+0x60/0x70
[  175.431501]  strnlen+0x3c/0x68
[  175.432861]  kasan_strings+0x1a4/0x478
[  175.434051]  kunit_try_run_case+0xf8/0x260
[  175.435877]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.437178]  kthread+0x18c/0x1a8
[  175.438745]  ret_from_fork+0x10/0x20
[  175.440134] 
[  175.440789] Allocated by task 205:
[  175.441674]  kasan_save_stack+0x3c/0x68
[  175.443242]  kasan_set_track+0x2c/0x40
[  175.444299]  kasan_save_alloc_info+0x24/0x38
[  175.446383]  __kasan_kmalloc+0xd4/0xd8
[  175.447644]  kmalloc_trace+0x68/0x130
[  175.449107]  kasan_strings+0xa0/0x478
[  175.450248]  kunit_try_run_case+0xf8/0x260
[  175.451683]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.453436]  kthread+0x18c/0x1a8
[  175.454608]  ret_from_fork+0x10/0x20
[  175.456104] 
[  175.456776] Freed by task 205:
[  175.458009]  kasan_save_stack+0x3c/0x68
[  175.459758]  kasan_set_track+0x2c/0x40
[  175.460760]  kasan_save_free_info+0x38/0x60
[  175.461541]  __kasan_slab_free+0x100/0x170
[  175.462954]  __kmem_cache_free+0x170/0x2e0
[  175.464900]  kfree+0x74/0x138
[  175.465988]  kasan_strings+0xbc/0x478
[  175.467341]  kunit_try_run_case+0xf8/0x260
[  175.468989]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.470689]  kthread+0x18c/0x1a8
[  175.472002]  ret_from_fork+0x10/0x20
[  175.473272] 
[  175.473853] The buggy address belongs to the object at ffff0000c5f79a40
[  175.473853]  which belongs to the cache kmalloc-32 of size 32
[  175.476940] The buggy address is located 16 bytes inside of
[  175.476940]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.479885] 
[  175.480382] The buggy address belongs to the physical page:
[  175.481584] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.483651] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.486137] page_type: 0xffffffff()
[  175.487369] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.489479] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.490981] page dumped because: kasan: bad access detected
[  175.492267] 
[  175.492715] Memory state around the buggy address:
[  175.493649]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.495830]  ffff0000c5f79980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.498140] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.500452]                                                  ^
[  175.501857]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.503533]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.505254] ==================================================================

test log snippet boot parser 70

Home

[  175.056818] ==================================================================
[  175.058421] BUG: KASAN: slab-use-after-free in strrchr+0x28/0x58
[  175.060653] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.063024] 
[  175.063776] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.065645] Hardware name: linux,dummy-virt (DT)
[  175.066812] Call trace:
[  175.067444]  dump_backtrace+0x9c/0x128
[  175.068608]  show_stack+0x20/0x38
[  175.069604]  dump_stack_lvl+0x60/0xb0
[  175.070764]  print_report+0xf8/0x5d8
[  175.071865]  kasan_report+0xc8/0x118
[  175.072963]  __asan_load1+0x60/0x70
[  175.074056]  strrchr+0x28/0x58
[  175.075042]  kasan_strings+0x104/0x478
[  175.076150]  kunit_try_run_case+0xf8/0x260
[  175.077363]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.078808]  kthread+0x18c/0x1a8
[  175.079781]  ret_from_fork+0x10/0x20
[  175.080866] 
[  175.081473] Allocated by task 205:
[  175.082393]  kasan_save_stack+0x3c/0x68
[  175.083543]  kasan_set_track+0x2c/0x40
[  175.084700]  kasan_save_alloc_info+0x24/0x38
[  175.085966]  __kasan_kmalloc+0xd4/0xd8
[  175.087078]  kmalloc_trace+0x68/0x130
[  175.088162]  kasan_strings+0xa0/0x478
[  175.089210]  kunit_try_run_case+0xf8/0x260
[  175.090382]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.091846]  kthread+0x18c/0x1a8
[  175.092811]  ret_from_fork+0x10/0x20
[  175.093846] 
[  175.094307] Freed by task 205:
[  175.095230]  kasan_save_stack+0x3c/0x68
[  175.096392]  kasan_set_track+0x2c/0x40
[  175.097511]  kasan_save_free_info+0x38/0x60
[  175.098792]  __kasan_slab_free+0x100/0x170
[  175.100016]  __kmem_cache_free+0x170/0x2e0
[  175.101199]  kfree+0x74/0x138
[  175.102145]  kasan_strings+0xbc/0x478
[  175.103104]  kunit_try_run_case+0xf8/0x260
[  175.104377]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.105611]  kthread+0x18c/0x1a8
[  175.106496]  ret_from_fork+0x10/0x20
[  175.107551] 
[  175.108155] The buggy address belongs to the object at ffff0000c5f79a40
[  175.108155]  which belongs to the cache kmalloc-32 of size 32
[  175.110444] The buggy address is located 16 bytes inside of
[  175.110444]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.112851] 
[  175.113326] The buggy address belongs to the physical page:
[  175.114699] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.116620] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.118211] page_type: 0xffffffff()
[  175.119207] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.120905] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.122492] page dumped because: kasan: bad access detected
[  175.123762] 
[  175.124289] Memory state around the buggy address:
[  175.125520]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.127102]  ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  175.128688] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.130203]                                                  ^
[  175.131554]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.133142]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.134651] ==================================================================

test log snippet boot parser 71

Home

[  175.056818] ==================================================================
[  175.058421] BUG: KASAN: slab-use-after-free in strrchr+0x28/0x58
[  175.060653] Read of size 1 at addr ffff0000c5f79a50 by task kunit_try_catch/205
[  175.063024] 
[  175.063776] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  175.065645] Hardware name: linux,dummy-virt (DT)
[  175.066812] Call trace:
[  175.067444]  dump_backtrace+0x9c/0x128
[  175.068608]  show_stack+0x20/0x38
[  175.069604]  dump_stack_lvl+0x60/0xb0
[  175.070764]  print_report+0xf8/0x5d8
[  175.071865]  kasan_report+0xc8/0x118
[  175.072963]  __asan_load1+0x60/0x70
[  175.074056]  strrchr+0x28/0x58
[  175.075042]  kasan_strings+0x104/0x478
[  175.076150]  kunit_try_run_case+0xf8/0x260
[  175.077363]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.078808]  kthread+0x18c/0x1a8
[  175.079781]  ret_from_fork+0x10/0x20
[  175.080866] 
[  175.081473] Allocated by task 205:
[  175.082393]  kasan_save_stack+0x3c/0x68
[  175.083543]  kasan_set_track+0x2c/0x40
[  175.084700]  kasan_save_alloc_info+0x24/0x38
[  175.085966]  __kasan_kmalloc+0xd4/0xd8
[  175.087078]  kmalloc_trace+0x68/0x130
[  175.088162]  kasan_strings+0xa0/0x478
[  175.089210]  kunit_try_run_case+0xf8/0x260
[  175.090382]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.091846]  kthread+0x18c/0x1a8
[  175.092811]  ret_from_fork+0x10/0x20
[  175.093846] 
[  175.094307] Freed by task 205:
[  175.095230]  kasan_save_stack+0x3c/0x68
[  175.096392]  kasan_set_track+0x2c/0x40
[  175.097511]  kasan_save_free_info+0x38/0x60
[  175.098792]  __kasan_slab_free+0x100/0x170
[  175.100016]  __kmem_cache_free+0x170/0x2e0
[  175.101199]  kfree+0x74/0x138
[  175.102145]  kasan_strings+0xbc/0x478
[  175.103104]  kunit_try_run_case+0xf8/0x260
[  175.104377]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  175.105611]  kthread+0x18c/0x1a8
[  175.106496]  ret_from_fork+0x10/0x20
[  175.107551] 
[  175.108155] The buggy address belongs to the object at ffff0000c5f79a40
[  175.108155]  which belongs to the cache kmalloc-32 of size 32
[  175.110444] The buggy address is located 16 bytes inside of
[  175.110444]  freed 32-byte region [ffff0000c5f79a40, ffff0000c5f79a60)
[  175.112851] 
[  175.113326] The buggy address belongs to the physical page:
[  175.114699] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  175.116620] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  175.118211] page_type: 0xffffffff()
[  175.119207] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  175.120905] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  175.122492] page dumped because: kasan: bad access detected
[  175.123762] 
[  175.124289] Memory state around the buggy address:
[  175.125520]  ffff0000c5f79900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  175.127102]  ffff0000c5f79980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  175.128688] >ffff0000c5f79a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[  175.130203]                                                  ^
[  175.131554]  ffff0000c5f79a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.133142]  ffff0000c5f79b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  175.134651] ==================================================================

test log snippet boot parser 72

Home

[  177.370684] ==================================================================
[  177.373313] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x270
[  177.374921] Read of size 8 at addr ffff0000c5f79c00 by task kunit_try_catch/215
[  177.376807] 
[  177.377412] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  177.379321] Hardware name: linux,dummy-virt (DT)
[  177.380443] Call trace:
[  177.381279]  dump_backtrace+0x9c/0x128
[  177.382371]  show_stack+0x20/0x38
[  177.383650]  dump_stack_lvl+0x60/0xb0
[  177.384956]  print_report+0xf8/0x5d8
[  177.386052]  kasan_report+0xc8/0x118
[  177.387240]  __asan_load8+0x9c/0xc0
[  177.388143]  workqueue_uaf+0x14c/0x270
[  177.388828]  kunit_try_run_case+0xf8/0x260
[  177.390426]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.392216]  kthread+0x18c/0x1a8
[  177.393333]  ret_from_fork+0x10/0x20
[  177.394472] 
[  177.395463] Allocated by task 215:
[  177.396334]  kasan_save_stack+0x3c/0x68
[  177.397676]  kasan_set_track+0x2c/0x40
[  177.398811]  kasan_save_alloc_info+0x24/0x38
[  177.400225]  __kasan_kmalloc+0xd4/0xd8
[  177.401083]  kmalloc_trace+0x68/0x130
[  177.401673]  workqueue_uaf+0xd0/0x270
[  177.402310]  kunit_try_run_case+0xf8/0x260
[  177.403194]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.405293]  kthread+0x18c/0x1a8
[  177.406413]  ret_from_fork+0x10/0x20
[  177.407598] 
[  177.408429] Freed by task 24:
[  177.409331]  kasan_save_stack+0x3c/0x68
[  177.410548]  kasan_set_track+0x2c/0x40
[  177.411712]  kasan_save_free_info+0x38/0x60
[  177.413041]  __kasan_slab_free+0x100/0x170
[  177.414247]  __kmem_cache_free+0x170/0x2e0
[  177.416067]  kfree+0x74/0x138
[  177.416975]  workqueue_uaf_work+0x18/0x30
[  177.418118]  process_one_work+0x2a8/0x6d0
[  177.419301]  worker_thread+0x53c/0x708
[  177.420354]  kthread+0x18c/0x1a8
[  177.421244]  ret_from_fork+0x10/0x20
[  177.422382] 
[  177.422955] Last potentially related work creation:
[  177.424107]  kasan_save_stack+0x3c/0x68
[  177.425328]  __kasan_record_aux_stack+0xb8/0xe8
[  177.426640]  kasan_record_aux_stack_noalloc+0x14/0x20
[  177.428201]  __queue_work+0x260/0x800
[  177.429460]  queue_work_on+0xb4/0xf0
[  177.430574]  workqueue_uaf+0x12c/0x270
[  177.431915]  kunit_try_run_case+0xf8/0x260
[  177.433103]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.434614]  kthread+0x18c/0x1a8
[  177.435608]  ret_from_fork+0x10/0x20
[  177.436831] 
[  177.437467] The buggy address belongs to the object at ffff0000c5f79c00
[  177.437467]  which belongs to the cache kmalloc-32 of size 32
[  177.440361] The buggy address is located 0 bytes inside of
[  177.440361]  freed 32-byte region [ffff0000c5f79c00, ffff0000c5f79c20)
[  177.442790] 
[  177.443346] The buggy address belongs to the physical page:
[  177.444639] page:00000000b93f367f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f79
[  177.446658] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  177.448855] page_type: 0xffffffff()
[  177.449752] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  177.451454] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  177.453158] page dumped because: kasan: bad access detected
[  177.454502] 
[  177.455042] Memory state around the buggy address:
[  177.456687]  ffff0000c5f79b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  177.458442]  ffff0000c5f79b80: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[  177.460487] >ffff0000c5f79c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  177.462077]                    ^
[  177.463123]  ffff0000c5f79c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.464827]  ffff0000c5f79d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.466416] ==================================================================

test log snippet boot parser 73

Home

[  173.633556] ==================================================================
[  173.636966] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xbc/0x180
[  173.638445] Read of size 1 at addr ffff800080857cfa by task kunit_try_catch/185
[  173.640320] 
[  173.640843] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  173.643211] Hardware name: linux,dummy-virt (DT)
[  173.644332] Call trace:
[  173.645284]  dump_backtrace+0x9c/0x128
[  173.646508]  show_stack+0x20/0x38
[  173.647656]  dump_stack_lvl+0x60/0xb0
[  173.649023]  print_report+0x314/0x5d8
[  173.650178]  kasan_report+0xc8/0x118
[  173.651636]  __asan_load1+0x60/0x70
[  173.652707]  kasan_stack_oob+0xbc/0x180
[  173.653790]  kunit_try_run_case+0xf8/0x260
[  173.654981]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  173.656261]  kthread+0x18c/0x1a8
[  173.657385]  ret_from_fork+0x10/0x20
[  173.658694] 
[  173.659395] The buggy address belongs to stack of task kunit_try_catch/185
[  173.661611]  and is located at offset 138 in frame:
[  173.662859]  kasan_stack_oob+0x0/0x180
[  173.664414] 
[  173.665010] This frame has 4 objects:
[  173.666110]  [48, 49) '__assertion'
[  173.666320]  [64, 72) 'array'
[  173.667295]  [96, 112) '__assertion'
[  173.668418]  [128, 138) 'stack_array'
[  173.669386] 
[  173.670600] The buggy address belongs to the virtual mapping at
[  173.670600]  [ffff800080850000, ffff800080859000) created by:
[  173.670600]  kernel_clone+0xf8/0x540
[  173.673912] 
[  173.674522] The buggy address belongs to the physical page:
[  173.676017] page:00000000f50dcbb3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f3b
[  173.678433] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  173.679811] page_type: 0xffffffff()
[  173.681557] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  173.683356] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  173.684933] page dumped because: kasan: bad access detected
[  173.686163] 
[  173.686696] Memory state around the buggy address:
[  173.688077]  ffff800080857b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  173.689881]  ffff800080857c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
[  173.691869] >ffff800080857c80: f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02
[  173.693462]                                                                 ^
[  173.695145]  ffff800080857d00: f3 f3 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[  173.696883]  ffff800080857d80: 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00
[  173.698365] ==================================================================

test log snippet boot parser 74

Home

[  170.017584] ==================================================================
[  170.020235] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xac/0x1b0
[  170.021466] Read of size 1 at addr ffff0000c5f18000 by task kunit_try_catch/125
[  170.024257] 
[  170.024959] CPU: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.026823] Hardware name: linux,dummy-virt (DT)
[  170.028031] Call trace:
[  170.029232]  dump_backtrace+0x9c/0x128
[  170.030244]  show_stack+0x20/0x38
[  170.031312]  dump_stack_lvl+0x60/0xb0
[  170.032564]  print_report+0xf8/0x5d8
[  170.033687]  kasan_report+0xc8/0x118
[  170.034847]  __asan_load1+0x60/0x70
[  170.035996]  kmalloc_pagealloc_uaf+0xac/0x1b0
[  170.037283]  kunit_try_run_case+0xf8/0x260
[  170.038331]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.040474]  kthread+0x18c/0x1a8
[  170.041448]  ret_from_fork+0x10/0x20
[  170.042569] 
[  170.043244] The buggy address belongs to the physical page:
[  170.044997] page:00000000353e52a8 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f18
[  170.047338] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  170.048919] page_type: 0xffffffff()
[  170.049901] raw: 0bfffc0000000000 fffffc000317c708 ffff0000daa124f8 0000000000000000
[  170.051757] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  170.053799] page dumped because: kasan: bad access detected
[  170.055033] 
[  170.055635] Memory state around the buggy address:
[  170.056854]  ffff0000c5f17f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.058433]  ffff0000c5f17f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  170.060448] >ffff0000c5f18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.062633]                    ^
[  170.063557]  ffff0000c5f18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.065227]  ffff0000c5f18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.066832] ==================================================================

test log snippet boot parser 75

Home

[  170.185985] ==================================================================
[  170.188935] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x1e8
[  170.190450] Read of size 1 at addr ffff0000c6020000 by task kunit_try_catch/131
[  170.192507] 
[  170.193108] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  170.194975] Hardware name: linux,dummy-virt (DT)
[  170.196261] Call trace:
[  170.197068]  dump_backtrace+0x9c/0x128
[  170.198355]  show_stack+0x20/0x38
[  170.199559]  dump_stack_lvl+0x60/0xb0
[  170.200562]  print_report+0xf8/0x5d8
[  170.201635]  kasan_report+0xc8/0x118
[  170.202827]  __asan_load1+0x60/0x70
[  170.204151]  pagealloc_uaf+0xd4/0x1e8
[  170.205224]  kunit_try_run_case+0xf8/0x260
[  170.206446]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  170.208261]  kthread+0x18c/0x1a8
[  170.210009]  ret_from_fork+0x10/0x20
[  170.211397] 
[  170.211935] The buggy address belongs to the physical page:
[  170.213426] page:00000000411e1e3e refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020
[  170.215424] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  170.216939] page_type: 0xffffff7f(buddy)
[  170.218127] raw: 0bfffc0000000000 ffff0000ff5fc9c8 ffff0000ff5fc9c8 0000000000000000
[  170.220186] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[  170.221874] page dumped because: kasan: bad access detected
[  170.222851] 
[  170.223511] Memory state around the buggy address:
[  170.224999]  ffff0000c601ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.226741]  ffff0000c601ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.228848] >ffff0000c6020000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.230567]                    ^
[  170.232002]  ffff0000c6020080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.233660]  ffff0000c6020100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  170.235341] ==================================================================

test log snippet boot parser 76

Home

[  177.567811] ==================================================================
[  177.569351] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xec/0x320
[  177.570775] Read of size 1 at addr ffff8000800fd7f8 by task kunit_try_catch/220
[  177.573678] 
[  177.574597] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  177.577060] Hardware name: linux,dummy-virt (DT)
[  177.578296] Call trace:
[  177.579083]  dump_backtrace+0x9c/0x128
[  177.580210]  show_stack+0x20/0x38
[  177.581277]  dump_stack_lvl+0x60/0xb0
[  177.582477]  print_report+0x314/0x5d8
[  177.583681]  kasan_report+0xc8/0x118
[  177.584672]  __asan_load1+0x60/0x70
[  177.585715]  vmalloc_oob+0xec/0x320
[  177.587021]  kunit_try_run_case+0xf8/0x260
[  177.588324]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.589945]  kthread+0x18c/0x1a8
[  177.590884]  ret_from_fork+0x10/0x20
[  177.592225] 
[  177.592997] The buggy address belongs to the virtual mapping at
[  177.592997]  [ffff8000800fd000, ffff8000800ff000) created by:
[  177.592997]  vmalloc_oob+0x88/0x320
[  177.596591] 
[  177.597228] The buggy address belongs to the physical page:
[  177.598571] page:0000000087189a66 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ec
[  177.600607] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  177.602049] page_type: 0xffffffff()
[  177.603771] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  177.606214] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  177.608279] page dumped because: kasan: bad access detected
[  177.609816] 
[  177.610619] Memory state around the buggy address:
[  177.612055]  ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.613858]  ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.615527] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  177.617265]                                                                 ^
[  177.619593]  ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  177.621295]  ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  177.622869] ==================================================================

test log snippet boot parser 77

Home

[  177.506777] ==================================================================
[  177.510352] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x320
[  177.512119] Read of size 1 at addr ffff8000800fd7f3 by task kunit_try_catch/220
[  177.513835] 
[  177.514357] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  177.516360] Hardware name: linux,dummy-virt (DT)
[  177.517475] Call trace:
[  177.518223]  dump_backtrace+0x9c/0x128
[  177.519363]  show_stack+0x20/0x38
[  177.520380]  dump_stack_lvl+0x60/0xb0
[  177.521607]  print_report+0x314/0x5d8
[  177.522746]  kasan_report+0xc8/0x118
[  177.524065]  __asan_load1+0x60/0x70
[  177.525184]  vmalloc_oob+0xc8/0x320
[  177.526204]  kunit_try_run_case+0xf8/0x260
[  177.527574]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.530506]  kthread+0x18c/0x1a8
[  177.531621]  ret_from_fork+0x10/0x20
[  177.533000] 
[  177.533787] The buggy address belongs to the virtual mapping at
[  177.533787]  [ffff8000800fd000, ffff8000800ff000) created by:
[  177.533787]  vmalloc_oob+0x88/0x320
[  177.537402] 
[  177.538070] The buggy address belongs to the physical page:
[  177.539395] page:0000000087189a66 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ec
[  177.540585] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  177.541949] page_type: 0xffffffff()
[  177.543181] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  177.545056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  177.546684] page dumped because: kasan: bad access detected
[  177.548066] 
[  177.549226] Memory state around the buggy address:
[  177.550163]  ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.553244]  ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.555293] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  177.557469]                                                              ^
[  177.559154]  ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  177.560991]  ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  177.562622] ==================================================================

test log snippet boot parser 78

Home

------------[ cut here ]------------
[  315.033701] WARNING: CPU: 1 PID: 1424 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[  315.035479] Modules linked in:
[  315.035701] CPU: 1 PID: 1424 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.72-rc1 #1
[  315.037406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  315.038487] EIP: drm_rect_calc_hscale+0x54/0x68
[  315.039324] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[  315.040930] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[  315.041621] ESI: c1179d38 EDI: 7fffffff EBP: c2f81ebc ESP: c2f81eb8
[  315.042434] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  315.043179] CR0: 80050033 CR2: f59e8000 CR3: 1c034000 CR4: 000006d0
[  315.043541] DR0: dc093804 DR1: dc093809 DR2: dc09380a DR3: dc09380b
[  315.044595] DR6: ffff0ff0 DR7: 00000600
[  315.044843] Call Trace:
[  315.045164]  ? show_regs+0x52/0x5c
[  315.046083]  ? drm_rect_calc_hscale+0x54/0x68
[  315.046467]  ? __warn+0x89/0x15c
[  315.047214]  ? drm_rect_calc_hscale+0x54/0x68
[  315.047578]  ? drm_rect_calc_hscale+0x54/0x68
[  315.047799]  ? report_bug+0x189/0x1b0
[  315.048537]  ? drm_rect_calc_hscale+0x55/0x68
[  315.049200]  ? exc_overflow+0x50/0x50
[  315.049755]  ? handle_bug+0x56/0x90
[  315.050204]  ? exc_invalid_op+0x1b/0x70
[  315.050496]  ? dequeue_entity+0x172/0x570
[  315.051431]  ? sched_clock_cpu+0x75/0x3b4
[  315.051682]  ? handle_exception+0x133/0x133
[  315.052354]  ? exc_overflow+0x50/0x50
[  315.052576]  ? drm_rect_calc_hscale+0x54/0x68
[  315.053305]  ? exc_overflow+0x50/0x50
[  315.053964]  ? drm_rect_calc_hscale+0x54/0x68
[  315.054570]  drm_test_rect_calc_hscale+0x38/0xa8
[  315.055218]  ? ktime_get_ts64+0x4f/0x178
[  315.055502]  kunit_try_run_case+0x8a/0x1c4
[  315.056049]  ? ttwu_queue_wakelist+0xe3/0xe8
[  315.056846]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  315.057583]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  315.057798]  ? preempt_count_sub+0x54/0x78
[  315.057798]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  315.059278]  kthread+0xe0/0x108
[  315.059949]  ? kunit_try_catch_throw+0x1c/0x1c
[  315.060440]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.061097]  ret_from_fork+0x40/0x4c
[  315.061553]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.062117]  ret_from_fork_asm+0x12/0x18
[  315.062593]  entry_INT80_32+0xf0/0xf0
[  315.063000] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 79

Home

------------[ cut here ]------------
[  314.998590] WARNING: CPU: 0 PID: 1422 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[  314.999941] Modules linked in:
[  315.000668] CPU: 0 PID: 1422 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  315.002658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  315.003934] EIP: drm_rect_calc_hscale+0x54/0x68
[  315.004548] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[  315.007285] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[  315.007839] ESI: c1179d38 EDI: 7fffffff EBP: c2f8bebc ESP: c2f8beb8
[  315.008051] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  315.008051] CR0: 80050033 CR2: f59eafe0 CR3: 1c034000 CR4: 000006d0
[  315.009670] DR0: dc093800 DR1: dc093801 DR2: dc093803 DR3: dc093805
[  315.010245] DR6: ffff0ff0 DR7: 00000600
[  315.010963] Call Trace:
[  315.012294]  ? show_regs+0x52/0x5c
[  315.012674]  ? drm_rect_calc_hscale+0x54/0x68
[  315.013503]  ? __warn+0x89/0x15c
[  315.014014]  ? drm_rect_calc_hscale+0x54/0x68
[  315.014543]  ? drm_rect_calc_hscale+0x54/0x68
[  315.015027]  ? report_bug+0x189/0x1b0
[  315.015498]  ? drm_rect_calc_hscale+0x55/0x68
[  315.015905]  ? exc_overflow+0x50/0x50
[  315.016303]  ? handle_bug+0x56/0x90
[  315.016599]  ? exc_invalid_op+0x1b/0x70
[  315.017095]  ? dequeue_entity+0x172/0x570
[  315.017395]  ? clockevents_program_event+0xd8/0x160
[  315.018037]  ? handle_exception+0x133/0x133
[  315.018598]  ? exc_overflow+0x50/0x50
[  315.019170]  ? drm_rect_calc_hscale+0x54/0x68
[  315.020027]  ? exc_overflow+0x50/0x50
[  315.020320]  ? drm_rect_calc_hscale+0x54/0x68
[  315.020951]  drm_test_rect_calc_hscale+0x38/0xa8
[  315.021369]  ? ktime_get_ts64+0x4f/0x178
[  315.022002]  kunit_try_run_case+0x8a/0x1c4
[  315.022515]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  315.022938]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  315.023511]  ? preempt_count_sub+0x54/0x78
[  315.024073]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  315.024658]  kthread+0xe0/0x108
[  315.025137]  ? kunit_try_catch_throw+0x1c/0x1c
[  315.025559]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.026154]  ret_from_fork+0x40/0x4c
[  315.026469]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.027223]  ret_from_fork_asm+0x12/0x18
[  315.027899]  entry_INT80_32+0xf0/0xf0
[  315.028509] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 80

Home

------------[ cut here ]------------
[  315.079022] WARNING: CPU: 1 PID: 1434 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[  315.080084] Modules linked in:
[  315.080364] CPU: 1 PID: 1434 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.72-rc1 #1
[  315.080936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  315.081884] EIP: drm_rect_calc_vscale+0x50/0x70
[  315.082610] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[  315.084469] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[  315.085252] ESI: c1179d38 EDI: 7fffffff EBP: c2f6debc ESP: c2f6deb8
[  315.086197] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  315.087164] CR0: 80050033 CR2: f59e8000 CR3: 1c034000 CR4: 000006d0
[  315.087603] DR0: dc093804 DR1: dc093809 DR2: dc09380a DR3: dc09380b
[  315.088408] DR6: ffff0ff0 DR7: 00000600
[  315.088980] Call Trace:
[  315.089293]  ? show_regs+0x52/0x5c
[  315.089619]  ? drm_rect_calc_vscale+0x50/0x70
[  315.090210]  ? __warn+0x89/0x15c
[  315.090629]  ? drm_rect_calc_vscale+0x50/0x70
[  315.091318]  ? drm_rect_calc_vscale+0x50/0x70
[  315.092025]  ? report_bug+0x189/0x1b0
[  315.092295]  ? drm_rect_calc_vscale+0x51/0x70
[  315.093148]  ? exc_overflow+0x50/0x50
[  315.093473]  ? handle_bug+0x56/0x90
[  315.094093]  ? exc_invalid_op+0x1b/0x70
[  315.094361]  ? dequeue_entity+0x172/0x570
[  315.095233]  ? sched_clock_cpu+0x75/0x3b4
[  315.095565]  ? handle_exception+0x133/0x133
[  315.095952]  ? exc_overflow+0x50/0x50
[  315.096619]  ? drm_rect_calc_vscale+0x50/0x70
[  315.097310]  ? exc_overflow+0x50/0x50
[  315.097716]  ? drm_rect_calc_vscale+0x50/0x70
[  315.098363]  drm_test_rect_calc_vscale+0x38/0xac
[  315.098677]  ? ktime_get_ts64+0x4f/0x178
[  315.099255]  kunit_try_run_case+0x8a/0x1c4
[  315.099546]  ? ttwu_queue_wakelist+0xe3/0xe8
[  315.099958]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  315.100187]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  315.101069]  ? preempt_count_sub+0x54/0x78
[  315.101530]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  315.102344]  kthread+0xe0/0x108
[  315.102572]  ? kunit_try_catch_throw+0x1c/0x1c
[  315.103322]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.104190]  ret_from_fork+0x40/0x4c
[  315.104493]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.105339]  ret_from_fork_asm+0x12/0x18
[  315.106112]  entry_INT80_32+0xf0/0xf0
[  315.106528] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 81

Home

------------[ cut here ]------------
[  315.110797] WARNING: CPU: 0 PID: 1436 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[  315.112529] Modules linked in:
[  315.113113] CPU: 0 PID: 1436 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.72-rc1 #1
[  315.114067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  315.115458] EIP: drm_rect_calc_vscale+0x50/0x70
[  315.116293] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[  315.118302] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[  315.118622] ESI: c1179d38 EDI: 7fffffff EBP: c2f89ebc ESP: c2f89eb8
[  315.119155] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  315.119767] CR0: 80050033 CR2: f59eafe0 CR3: 1c034000 CR4: 000006d0
[  315.120217] DR0: dc093800 DR1: dc093801 DR2: dc093803 DR3: dc093805
[  315.120727] DR6: ffff0ff0 DR7: 00000600
[  315.120727] Call Trace:
[  315.120727]  ? show_regs+0x52/0x5c
[  315.121861]  ? drm_rect_calc_vscale+0x50/0x70
[  315.122066]  ? __warn+0x89/0x15c
[  315.122249]  ? drm_rect_calc_vscale+0x50/0x70
[  315.122488]  ? drm_rect_calc_vscale+0x50/0x70
[  315.122711]  ? report_bug+0x189/0x1b0
[  315.123188]  ? drm_rect_calc_vscale+0x51/0x70
[  315.123487]  ? exc_overflow+0x50/0x50
[  315.124267]  ? handle_bug+0x56/0x90
[  315.125112]  ? exc_invalid_op+0x1b/0x70
[  315.125694]  ? dequeue_entity+0x172/0x570
[  315.126457]  ? sched_clock_cpu+0x75/0x3b4
[  315.127081]  ? handle_exception+0x133/0x133
[  315.127081]  ? exc_overflow+0x50/0x50
[  315.129096]  ? drm_rect_calc_vscale+0x50/0x70
[  315.129541]  ? exc_overflow+0x50/0x50
[  315.130100]  ? drm_rect_calc_vscale+0x50/0x70
[  315.130469]  drm_test_rect_calc_vscale+0x38/0xac
[  315.131184]  ? ktime_get_ts64+0x4f/0x178
[  315.131651]  kunit_try_run_case+0x8a/0x1c4
[  315.132339]  ? ttwu_queue_wakelist+0xe3/0xe8
[  315.133144]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  315.133618]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  315.134090]  ? preempt_count_sub+0x54/0x78
[  315.134820]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  315.135524]  kthread+0xe0/0x108
[  315.135748]  ? kunit_try_catch_throw+0x1c/0x1c
[  315.135748]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.135748]  ret_from_fork+0x40/0x4c
[  315.135748]  ? kthread_complete_and_exit+0x1c/0x1c
[  315.135748]  ret_from_fork_asm+0x12/0x18
[  315.138709]  entry_INT80_32+0xf0/0xf0
[  315.139561] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 82

Home

------------[ cut here ]------------
[    6.850219] WARNING: CPU: 0 PID: 0 at kernel/smp.c:786 smp_call_function_many_cond+0x4b0/0x5dc
[    6.858917] Modules linked in:
[    6.861999] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[    6.868316] Hardware name: Generic DRA74X (Flattened Device Tree)
[    6.874420]  unwind_backtrace from show_stack+0x18/0x1c
[    6.879699]  show_stack from dump_stack_lvl+0x58/0x70
[    6.884796]  dump_stack_lvl from __warn+0x80/0x12c
[    6.889617]  __warn from warn_slowpath_fmt+0x18c/0x194
[    6.894805]  warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[    6.901824]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    6.908660]  smp_call_function from set_memory_valid+0x84/0xc0
[    6.914520]  set_memory_valid from kfence_guarded_free+0x16c/0x2e0
[    6.920745]  kfence_guarded_free from kmem_cache_free+0x24c/0x444
[    6.926879]  kmem_cache_free from rcu_core+0x2cc/0x998
[    6.932067]  rcu_core from handle_softirqs+0x15c/0x3dc
[    6.937255]  handle_softirqs from irq_exit+0xac/0xd4
[    6.942260]  irq_exit from __irq_svc+0x78/0x9c
[    6.946716] Exception stack(0xc2201f18 to 0xc2201f60)
[    6.951812] 1f00:                                                       00004b2c 00000001
[    6.960021] 1f20: 2da61000 00000000 c2210040 c248d6bc c2209f60 c2209fbc 00000000 00000000
[    6.968231] 1f40: 00000000 c20dea70 c248cf48 c2201f68 c14bd070 c14bd074 600b0013 ffffffff
[    6.976470]  __irq_svc from default_idle_call+0x20/0xc0
[    6.981719]  default_idle_call from do_idle+0x234/0x2c4
[    6.986968]  do_idle from cpu_startup_entry+0x30/0x34
[    6.992065]  cpu_startup_entry from rest_init+0xb4/0xb8
[    6.997314]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[    7.003295] ---[ end trace 0000000000000000 ]---

test log snippet test parser 1

Home

------------[ cut here ]------------
[  596.692317] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec pm8916_wdt venus_dec venus_enc videobuf2_dma_contig crct10dif_ce qcom_wcnss_pil adv7511 cec coresight_cpu_debug coresight_stm coresight_cti stm_core snd_soc_apq8016_sbc snd_soc_qcom_common snd_soc_msm8916_digital qrtr snd_soc_lpass_apq8016 snd_soc_lpass_cpu snd_soc_lpass_platform qcom_spmi_temp_alarm qcom_q6v5_mss qcom_pon qcom_pil_info rtc_pm8xxx qcom_q6v5 qcom_sysmon qcom_common qcom_spmi_vadc qcom_glink_smem qmi_helpers qcom_vadc_common snd_soc_msm8916_analog qnoc_msm8916 msm qcom_stats venus_core llcc_qcom qcom_camss ocmem gpu_sched v4l2_mem2mem videobuf2_dma_sg drm_dp_aux_bus mdt_loader videobuf2_v4l2 drm_display_helper videobuf2_memops videobuf2_common icc_smd_rpm qcom_rng rpmsg_ctrl rpmsg_char display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[  596.784269] CPU: 3 PID: 5673 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  596.789417] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  596.794872] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  596.801906] pc : cleanup_mnt+0xe4/0x158
[  596.808460] lr : cleanup_mnt+0x54/0x158
[  596.813492] sp : ffff80008c5bbcb0
[  596.818388] x29: ffff80008c5bbcb0 x28: 00000000000000c0 x27: 0000000000000004
[  596.823298] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  596.829268] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[  596.836278] x20: ffff8000824feac0 x19: ffff000003ca23c0 x18: 00000017552e4c99
[  596.843278] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  596.850366] x14: 0000000000000000 x13: ffff80008c5b8000 x12: ffff80008c5bc000
[  596.857462] x11: f80895e646098600 x10: 000000000000000f x9 : ffff7fffbd5fa000
[  596.864609] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  596.871759] x5 : 0000000080400019 x4 : ffff00003fab2e50 x3 : ffff80008c5bbc20
[  596.878884] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[  596.885969] Call trace:
[  596.892967]  cleanup_mnt+0xe4/0x158
[  596.897428]  __cleanup_mnt+0x20/0x38
[  596.901919]  task_work_run+0xb8/0xe0
[  596.906379]  do_notify_resume+0xa58/0xe98
[  596.910868]  el0_svc_compat+0x64/0x68
[  596.915371]  el0t_32_sync_handler+0x84/0xb8
[  596.919907]  el0t_32_sync+0x194/0x198
[  596.924354] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

Home

------------[ cut here ]------------
[  596.692317] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec pm8916_wdt venus_dec venus_enc videobuf2_dma_contig crct10dif_ce qcom_wcnss_pil adv7511 cec coresight_cpu_debug coresight_stm coresight_cti stm_core snd_soc_apq8016_sbc snd_soc_qcom_common snd_soc_msm8916_digital qrtr snd_soc_lpass_apq8016 snd_soc_lpass_cpu snd_soc_lpass_platform qcom_spmi_temp_alarm qcom_q6v5_mss qcom_pon qcom_pil_info rtc_pm8xxx qcom_q6v5 qcom_sysmon qcom_common qcom_spmi_vadc qcom_glink_smem qmi_helpers qcom_vadc_common snd_soc_msm8916_analog qnoc_msm8916 msm qcom_stats venus_core llcc_qcom qcom_camss ocmem gpu_sched v4l2_mem2mem videobuf2_dma_sg drm_dp_aux_bus mdt_loader videobuf2_v4l2 drm_display_helper videobuf2_memops videobuf2_common icc_smd_rpm qcom_rng rpmsg_ctrl rpmsg_char display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[  596.784269] CPU: 3 PID: 5673 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  596.789417] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  596.794872] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  596.801906] pc : cleanup_mnt+0xe4/0x158
[  596.808460] lr : cleanup_mnt+0x54/0x158
[  596.813492] sp : ffff80008c5bbcb0
[  596.818388] x29: ffff80008c5bbcb0 x28: 00000000000000c0 x27: 0000000000000004
[  596.823298] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  596.829268] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[  596.836278] x20: ffff8000824feac0 x19: ffff000003ca23c0 x18: 00000017552e4c99
[  596.843278] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  596.850366] x14: 0000000000000000 x13: ffff80008c5b8000 x12: ffff80008c5bc000
[  596.857462] x11: f80895e646098600 x10: 000000000000000f x9 : ffff7fffbd5fa000
[  596.864609] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  596.871759] x5 : 0000000080400019 x4 : ffff00003fab2e50 x3 : ffff80008c5bbc20
[  596.878884] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[  596.885969] Call trace:
[  596.892967]  cleanup_mnt+0xe4/0x158
[  596.897428]  __cleanup_mnt+0x20/0x38
[  596.901919]  task_work_run+0xb8/0xe0
[  596.906379]  do_notify_resume+0xa58/0xe98
[  596.910868]  el0_svc_compat+0x64/0x68
[  596.915371]  el0t_32_sync_handler+0x84/0xb8
[  596.919907]  el0t_32_sync+0x194/0x198
[  596.924354] ---[ end trace 0000000000000000 ]---

test log snippet test parser 3

Home

------------[ cut here ]------------
[  630.287766] WARNING: CPU: 3 PID: 35730 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  630.330178] CPU: 3 PID: 35730 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  630.336972] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  630.343809] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  630.350686] pc : cleanup_mnt+0xe4/0x158
[  630.357575] lr : cleanup_mnt+0x54/0x158
[  630.364365] sp : ffff80008c70bcb0
[  630.371031] x29: ffff80008c70bcb0 x28: 00000000000000c0 x27: 0000000000000004
[  630.377840] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  630.384664] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[  630.391535] x20: ffff8000824feac0 x19: ffff0000044f1540 x18: 0000001a5bf3b390
[  630.398453] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  630.405362] x14: 0000000000000000 x13: ffff80008c708000 x12: ffff80008c70c000
[  630.412450] x11: 949ed383c6f76100 x10: 000000000000000f x9 : ffff7fffbd5fa000
[  630.419634] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  630.426730] x5 : 0000000080400034 x4 : ffff00002356e3c0 x3 : ffff80008c70bc20
[  630.433753] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[  630.440833] Call trace:
[  630.447854]  cleanup_mnt+0xe4/0x158
[  630.454562]  __cleanup_mnt+0x20/0x38
[  630.461302]  task_work_run+0xb8/0xe0
[  630.468051]  do_notify_resume+0xa58/0xe98
[  630.474840]  el0_svc+0x68/0x70
[  630.481649]  el0t_64_sync_handler+0x90/0x100
[  630.488425]  el0t_64_sync+0x190/0x198
[  630.495198] ---[ end trace 0000000000000000 ]---

test log snippet test parser 4

Home

------------[ cut here ]------------
[  630.287766] WARNING: CPU: 3 PID: 35730 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  630.330178] CPU: 3 PID: 35730 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  630.336972] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  630.343809] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  630.350686] pc : cleanup_mnt+0xe4/0x158
[  630.357575] lr : cleanup_mnt+0x54/0x158
[  630.364365] sp : ffff80008c70bcb0
[  630.371031] x29: ffff80008c70bcb0 x28: 00000000000000c0 x27: 0000000000000004
[  630.377840] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  630.384664] x23: ffff800082503460 x22: ffff8000824fe000 x21: 00000000ffffffff
[  630.391535] x20: ffff8000824feac0 x19: ffff0000044f1540 x18: 0000001a5bf3b390
[  630.398453] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  630.405362] x14: 0000000000000000 x13: ffff80008c708000 x12: ffff80008c70c000
[  630.412450] x11: 949ed383c6f76100 x10: 000000000000000f x9 : ffff7fffbd5fa000
[  630.419634] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  630.426730] x5 : 0000000080400034 x4 : ffff00002356e3c0 x3 : ffff80008c70bc20
[  630.433753] x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000004
[  630.440833] Call trace:
[  630.447854]  cleanup_mnt+0xe4/0x158
[  630.454562]  __cleanup_mnt+0x20/0x38
[  630.461302]  task_work_run+0xb8/0xe0
[  630.468051]  do_notify_resume+0xa58/0xe98
[  630.474840]  el0_svc+0x68/0x70
[  630.481649]  el0t_64_sync_handler+0x90/0x100
[  630.488425]  el0t_64_sync+0x190/0x198
[  630.495198] ---[ end trace 0000000000000000 ]---

test log snippet test parser 5

Home

------------[ cut here ]------------
[  617.602473] WARNING: CPU: 2 PID: 35735 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  617.669914] CPU: 2 PID: 35735 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  617.682958] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  617.696083] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  617.709312] pc : cleanup_mnt+0x11c/0x140
[  617.722545] lr : cleanup_mnt+0x20/0x140
[  617.735636] sp : ffff80008c8c3ca0
[  617.748513] x29: ffff80008c8c3ca0 x28: 0000000000000004 x27: 0000000000000000
[  617.761635] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  617.774792] x23: ffff000003c398e4 x22: ffff800082b4fb50 x21: ffff000003c39080
[  617.788067] x20: ffff00000515c500 x19: 0000000000000000 x18: 0000000000000000
[  617.801443] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000
[  617.814704] x14: 0000000000000000 x13: 0000000000000000 x12: ffff800082495e28
[  617.827894] x11: ffff800082485008 x10: 0000000000000002 x9 : ffff80008047a778
[  617.841160] x8 : ffff80008c8c3b38 x7 : 0000000000000000 x6 : 0000000000000000
[  617.854382] x5 : 0000000000000000 x4 : 0000000000000003 x3 : fffffbffeffe839c
[  617.867401] x2 : 0000000000000005 x1 : 0000000000000004 x0 : 00000000ffffffff
[  617.880305] Call trace:
[  617.893004]  cleanup_mnt+0x11c/0x140
[  617.905821]  __cleanup_mnt+0x1c/0x30
[  617.918680]  task_work_run+0x88/0xf8
[  617.931568]  do_notify_resume+0x214/0x1158
[  617.944539]  el0_svc+0xc8/0xe0
[  617.957544]  el0t_64_sync_handler+0x120/0x130
[  617.970502]  el0t_64_sync+0x190/0x198
[  617.983478] ---[ end trace 0000000000000000 ]---

test log snippet test parser 6

Home

------------[ cut here ]------------
[  617.602473] WARNING: CPU: 2 PID: 35735 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  617.669914] CPU: 2 PID: 35735 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  617.682958] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  617.696083] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  617.709312] pc : cleanup_mnt+0x11c/0x140
[  617.722545] lr : cleanup_mnt+0x20/0x140
[  617.735636] sp : ffff80008c8c3ca0
[  617.748513] x29: ffff80008c8c3ca0 x28: 0000000000000004 x27: 0000000000000000
[  617.761635] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  617.774792] x23: ffff000003c398e4 x22: ffff800082b4fb50 x21: ffff000003c39080
[  617.788067] x20: ffff00000515c500 x19: 0000000000000000 x18: 0000000000000000
[  617.801443] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000
[  617.814704] x14: 0000000000000000 x13: 0000000000000000 x12: ffff800082495e28
[  617.827894] x11: ffff800082485008 x10: 0000000000000002 x9 : ffff80008047a778
[  617.841160] x8 : ffff80008c8c3b38 x7 : 0000000000000000 x6 : 0000000000000000
[  617.854382] x5 : 0000000000000000 x4 : 0000000000000003 x3 : fffffbffeffe839c
[  617.867401] x2 : 0000000000000005 x1 : 0000000000000004 x0 : 00000000ffffffff
[  617.880305] Call trace:
[  617.893004]  cleanup_mnt+0x11c/0x140
[  617.905821]  __cleanup_mnt+0x1c/0x30
[  617.918680]  task_work_run+0x88/0xf8
[  617.931568]  do_notify_resume+0x214/0x1158
[  617.944539]  el0_svc+0xc8/0xe0
[  617.957544]  el0t_64_sync_handler+0x120/0x130
[  617.970502]  el0t_64_sync+0x190/0x198
[  617.983478] ---[ end trace 0000000000000000 ]---

test log snippet test parser 7

Home

------------[ cut here ]------------
[   60.928993] Modules linked in: snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug qcom_camss stm_core coresight_tmc adv7511 coresight_replicator venus_core coresight_cti coresight_funnel coresight_tpiu coresight videobuf2_dma_sg qrtr snd_soc_lpass_apq8016 cec snd_soc_lpass_cpu snd_soc_msm8916_digital v4l2_fwnode msm qcom_q6v5_mss v4l2_mem2mem snd_soc_lpass_platform snd_soc_apq8016_sbc v4l2_async snd_soc_qcom_common snd_soc_msm8916_analog qcom_spmi_temp_alarm videobuf2_memops rtc_pm8xxx qcom_pil_info qcom_pon videobuf2_v4l2 qcom_spmi_vadc qcom_q6v5 qcom_sysmon llcc_qcom qcom_vadc_common qcom_common ocmem videodev gpu_sched qcom_glink_smem mdt_loader drm_dp_aux_bus qmi_helpers videobuf2_common drm_display_helper qnoc_msm8916 mc qcom_rng qcom_stats display_connector phy_qcom_usb_hs drm_kms_helper icc_smd_rpm rpmsg_ctrl rpmsg_char socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[   61.035060] CPU: 3 PID: 1453 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   61.378004] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   61.539894] lr : kvmalloc_node+0x64/0x10c
[   61.744908] x29: ffff800085e9bcf0 x28: ffff00000c78f000 x27: 0000000000000000
[   61.776707] x23: ffff0000035702c0 x22: ffff80008036eca4 x21: 00000000ffffffff
[   62.115435] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   62.284292] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   62.485725] x5 : 0000000000000000 x4 : ffff00000c78f000 x3 : 0000000000000000
[   62.525072] Call trace:
[   62.847534]  kvmalloc_node+0xfc/0x10c
[   63.006113]  expand_files+0x78/0x318
[   63.214523]  __arm64_sys_dup3+0x20/0x30
[   63.248230]  el0_svc_common.constprop.0+0x40/0xe0
[   63.252830]  do_el0_svc+0x1c/0x28
[   63.257356]  el0_svc+0x38/0xc8
[   63.261816]  el0t_64_sync_handler+0x120/0x12c
[   63.266264]  el0t_64_sync+0x190/0x194
[   63.270632] ---[ end trace 0000000000000000 ]---

test log snippet test parser 8

Home

------------[ cut here ]------------
[   60.928993] Modules linked in: snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug qcom_camss stm_core coresight_tmc adv7511 coresight_replicator venus_core coresight_cti coresight_funnel coresight_tpiu coresight videobuf2_dma_sg qrtr snd_soc_lpass_apq8016 cec snd_soc_lpass_cpu snd_soc_msm8916_digital v4l2_fwnode msm qcom_q6v5_mss v4l2_mem2mem snd_soc_lpass_platform snd_soc_apq8016_sbc v4l2_async snd_soc_qcom_common snd_soc_msm8916_analog qcom_spmi_temp_alarm videobuf2_memops rtc_pm8xxx qcom_pil_info qcom_pon videobuf2_v4l2 qcom_spmi_vadc qcom_q6v5 qcom_sysmon llcc_qcom qcom_vadc_common qcom_common ocmem videodev gpu_sched qcom_glink_smem mdt_loader drm_dp_aux_bus qmi_helpers videobuf2_common drm_display_helper qnoc_msm8916 mc qcom_rng qcom_stats display_connector phy_qcom_usb_hs drm_kms_helper icc_smd_rpm rpmsg_ctrl rpmsg_char socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[   61.035060] CPU: 3 PID: 1453 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   61.378004] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   61.539894] lr : kvmalloc_node+0x64/0x10c
[   61.744908] x29: ffff800085e9bcf0 x28: ffff00000c78f000 x27: 0000000000000000
[   61.776707] x23: ffff0000035702c0 x22: ffff80008036eca4 x21: 00000000ffffffff
[   62.115435] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   62.284292] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   62.485725] x5 : 0000000000000000 x4 : ffff00000c78f000 x3 : 0000000000000000
[   62.525072] Call trace:
[   62.847534]  kvmalloc_node+0xfc/0x10c
[   63.006113]  expand_files+0x78/0x318
[   63.214523]  __arm64_sys_dup3+0x20/0x30
[   63.248230]  el0_svc_common.constprop.0+0x40/0xe0
[   63.252830]  do_el0_svc+0x1c/0x28
[   63.257356]  el0_svc+0x38/0xc8
[   63.261816]  el0t_64_sync_handler+0x120/0x12c
[   63.266264]  el0t_64_sync+0x190/0x194
[   63.270632] ---[ end trace 0000000000000000 ]---

test log snippet test parser 9

Home

------------[ cut here ]------------
[  401.952104] WARNING: CPU: 1 PID: 6452 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  401.993763] Modules linked in: overlay btrfs xor xor_neon raid6_pq z 0
[  401.994060]  qcom_sysmon display_connector qcom_common qcom_glink_smem mdt_loader drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[  402.063707] CPU: 1 PID: 6452 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  402.074479] Hardware name: Thundercomm Dragonboard 845c (DT)
[  402.084245] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  402.095308] pc : cleanup_mnt+0xe4/0x158
[  402.103176] lr : cleanup_mnt+0x54/0x158
[  402.110961] sp : ffff800084263cb0
[  402.118145] x29: ffff800084263cb0 x28: 00000000000000c0 x27: 0000000000000004
[  402.129213] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  402.140257] x23: ffffb5a601283460 x22: ffffb5a60127e000 x21: 00000000ffffffff
[  402.151326] x20: ffffb5a60127eac0 x19: ffff0b064346e8c0 x18: 0000000883f4a183
[  402.162401] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  402.173491] x14: 0000000000000000 x13: ffff800084260000 x12: ffff800084264000
[  402.184550] x11: 9472e6ac1a660500 x10: 00000000000000ff x9 : ffff5560bc34b000
[  402.195575] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 000000000011a5a8
[  402.206622] x5 : 0000000080150014 x4 : ffff0b06bd4c9e50 x3 : ffff800084263c20
[  402.217707] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[  402.228812] Call trace:
[  402.235194]  cleanup_mnt+0xe4/0x158
[  402.242616]  __cleanup_mnt+0x20/0x38
[  402.250108]  task_work_run+0xb8/0xe0
[  402.257611]  do_notify_resume+0xa58/0xe98
[  402.265488]  el0_svc_compat+0x64/0x68
[  402.272955]  el0t_32_sync_handler+0x84/0xb8
[  402.280894]  el0t_32_sync+0x194/0x198
[  402.288240] ---[ end trace 0000000000000000 ]---

test log snippet test parser 10

Home

------------[ cut here ]------------
[  401.952104] WARNING: CPU: 1 PID: 6452 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  401.993763] Modules linked in: overlay btrfs xor xor_neon raid6_pq z 0
[  401.994060]  qcom_sysmon display_connector qcom_common qcom_glink_smem mdt_loader drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[  402.063707] CPU: 1 PID: 6452 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  402.074479] Hardware name: Thundercomm Dragonboard 845c (DT)
[  402.084245] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  402.095308] pc : cleanup_mnt+0xe4/0x158
[  402.103176] lr : cleanup_mnt+0x54/0x158
[  402.110961] sp : ffff800084263cb0
[  402.118145] x29: ffff800084263cb0 x28: 00000000000000c0 x27: 0000000000000004
[  402.129213] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  402.140257] x23: ffffb5a601283460 x22: ffffb5a60127e000 x21: 00000000ffffffff
[  402.151326] x20: ffffb5a60127eac0 x19: ffff0b064346e8c0 x18: 0000000883f4a183
[  402.162401] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  402.173491] x14: 0000000000000000 x13: ffff800084260000 x12: ffff800084264000
[  402.184550] x11: 9472e6ac1a660500 x10: 00000000000000ff x9 : ffff5560bc34b000
[  402.195575] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 000000000011a5a8
[  402.206622] x5 : 0000000080150014 x4 : ffff0b06bd4c9e50 x3 : ffff800084263c20
[  402.217707] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[  402.228812] Call trace:
[  402.235194]  cleanup_mnt+0xe4/0x158
[  402.242616]  __cleanup_mnt+0x20/0x38
[  402.250108]  task_work_run+0xb8/0xe0
[  402.257611]  do_notify_resume+0xa58/0xe98
[  402.265488]  el0_svc_compat+0x64/0x68
[  402.272955]  el0t_32_sync_handler+0x84/0xb8
[  402.280894]  el0t_32_sync+0x194/0x198
[  402.288240] ---[ end trace 0000000000000000 ]---

test log snippet test parser 11

Home

------------[ cut here ]------------
[   51.910086] WARNING: CPU: 4 PID: 1860 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   51.951397] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec venus_dec venus_enc videobuf2_dma_contig mcp251xfd xhci_pci xhci_pci_renesas lontium_lt9611 can_dev venus_core v4l2_mem2mem ath10k_snoc qcom_camss videobuf2_dma_sg hci_uart v4l2_fwnode btqca v4l2_async ath10k_core videobuf2_v4l2 videobuf2_memops msm snd_soc_sdm845 btbcm ath ocmem videodev snd_soc_rt5663 qcom_spmi_adc5 gpu_sched snd_soc_qcom_common leds_qcom_lpg videobuf2_common snd_soc_rl6231 led_class_multicolor qcom_vadc_common crct10dif_ce qcom_spmi_temp_alarm rtc_pm8xxx qcom_pon drm_dp_aux_bus reset_qcom_pdc soundwire_bus qcom_stats bluetooth mac80211 camcc_sdm845 drm_display_helper ecdh_generic libarc4 ecc mc i2c_qcom_geni phy_qcom_qmp_combo spi_geni_qcom qcom_q6v5_mss coresight_stm typec gpi phy_qcom_qmp_usb qcom_rng stm_core coresight_replicator coresight_funnel phy_qcom_qusb2 qcrypto coresight_tmc cfg80211 phy_qcom_qmp_ufs authenc libdes rfkill coresight ufs_qcom phy_qcom_qmp_pcie lmh slim_qcom_ngd_ctrl qrtr slimbus
[   51.951540]  icc_osm_l3 icc_bwmon qcom_wdt pdr_interface display_connector llcc_qcom drm_kms_helper drm qcom_q6v5_pas qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[   52.130519] CPU: 4 PID: 1860 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   52.171121] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.211051] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   52.252382] pc : kvmalloc_node+0xe0/0xe8
[   52.290566] lr : kvmalloc_node+0x50/0xe8
[   52.328745] sp : ffff800088ec3ce0
[   52.366230] x29: ffff800088ec3cf0 x28: ffff5568c1ceb000 x27: 0000000000000000
[   52.407564] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   52.448892] x23: 0000000080000000 x22: ffffa92268d06d20 x21: 0000000200002000
[   52.490226] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   52.531548] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   52.572871] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   52.614196] x11: 0000000000000040 x10: 17983185dbed2800 x9 : 17983185dbed2800
[   52.655520] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   52.696846] x5 : 0000000000000000 x4 : ffff800088ec3ca0 x3 : 0000000000000000
[   52.738173] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   52.779498] Call trace:
[   52.815922]  kvmalloc_node+0xe0/0xe8
[   52.853407]  alloc_fdtable+0x7c/0x108
[   52.890897]  expand_files+0x114/0x2f0
[   52.928377]  ksys_dup3+0x60/0xf4
[   52.965861]  __arm64_sys_dup3+0x20/0x30
[   53.004039]  invoke_syscall+0x40/0x100
[   53.041527]  el0_svc_common+0xa8/0xd8
[   53.079014]  do_el0_svc+0x1c/0x28
[   53.116499]  el0_svc+0x38/0x64
[   53.153634]  el0t_64_sync_handler+0x90/0xfc
[   53.191821]  el0t_64_sync+0x190/0x194
[   53.229303] ---[ end trace 0000000000000000 ]---

test log snippet test parser 12

Home

------------[ cut here ]------------
[  402.920646] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_dec venus_enc lontium_lt9611 mcp251xfd xhci_pci videobuf2_dma_contig xhci_pci_renesas can_dev ath10k_snoc ath10k_core msm ath qcom_pon rtc_pm8xxx mac80211 snd_soc_sdm845 ocmem crct10dif_ce snd_soc_rt5663 leds_qcom_lpg gpu_sched snd_soc_qcom_common led_class_multicolor qcom_spmi_temp_alarm snd_soc_rl6231 qcom_spmi_adc5 drm_dp_aux_bus i2c_qcom_geni qcom_camss qcom_vadc_common drm_display_helper phy_qcom_qmp_combo qcom_stats soundwire_bus camcc_sdm845 videobuf2_dma_sg videobuf2_memops reset_qcom_pdc hci_uart slim_qcom_ngd_ctrl venus_core cfg80211 btqca btbcm v4l2_mem2mem videobuf2_v4l2 slimbus coresight_stm videobuf2_common bluetooth spi_geni_qcom typec phy_qcom_qmp_usb qcom_rng qcom_q6v5_mss gpi qrtr stm_core phy_qcom_qmp_ufs qcrypto ufs_qcom rfkill pdr_interface qcom_wdt lmh phy_qcom_qmp_pcie qcom_q6v5_pas qcom_pil_info icc_osm_l3 qcom_q6v5 display_connector
[  402.920901]  qcom_sysmon qcom_common qcom_glink_smem mdt_loader icc_bwmon llcc_qcom drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[  403.040678] CPU: 1 PID: 36469 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  403.050299] Hardware name: Thundercomm Dragonboard 845c (DT)
[  403.058841] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  403.068685] pc : cleanup_mnt+0xe4/0x158
[  403.075340] lr : cleanup_mnt+0x54/0x158
[  403.081939] sp : ffff800085f83cb0
[  403.087958] x29: ffff800085f83cb0 x28: 00000000000000c0 x27: 0000000000000004
[  403.097858] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  403.107734] x23: ffffb4cd3da83460 x22: ffffb4cd3da7e000 x21: 00000000ffffffff
[  403.117634] x20: ffffb4cd3da7eac0 x19: ffff2c1b0bc232c0 x18: 000000082fc3afac
[  403.127526] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  403.137443] x14: 0000000000000000 x13: ffff800085f80000 x12: ffff800085f84000
[  403.147328] x11: ce3eb58f2eae5e00 x10: 00000000000000ff x9 : ffff774e3fb4c000
[  403.157204] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 00000000000020f2
[  403.167082] x5 : 00000000000e4ea6 x4 : ffff2c1b7d4cae50 x3 : ffff800085f83c20
[  403.176989] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[  403.186914] Call trace:
[  403.192105]  cleanup_mnt+0xe4/0x158
[  403.198344]  __cleanup_mnt+0x20/0x38
[  403.204654]  task_work_run+0xb8/0xe0
[  403.210979]  do_notify_resume+0xa58/0xe98
[  403.217704]  el0_svc+0x68/0x70
[  403.223410]  el0t_64_sync_handler+0x90/0x100
[  403.230311]  el0t_64_sync+0x190/0x198
[  403.236550] ---[ end trace 0000000000000000 ]---

test log snippet test parser 13

Home

------------[ cut here ]------------
[  402.920646] Modules linked in: overlay btrfs xor xor_neon raid6_pq zstd_compress libcrc32c snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_dec venus_enc lontium_lt9611 mcp251xfd xhci_pci videobuf2_dma_contig xhci_pci_renesas can_dev ath10k_snoc ath10k_core msm ath qcom_pon rtc_pm8xxx mac80211 snd_soc_sdm845 ocmem crct10dif_ce snd_soc_rt5663 leds_qcom_lpg gpu_sched snd_soc_qcom_common led_class_multicolor qcom_spmi_temp_alarm snd_soc_rl6231 qcom_spmi_adc5 drm_dp_aux_bus i2c_qcom_geni qcom_camss qcom_vadc_common drm_display_helper phy_qcom_qmp_combo qcom_stats soundwire_bus camcc_sdm845 videobuf2_dma_sg videobuf2_memops reset_qcom_pdc hci_uart slim_qcom_ngd_ctrl venus_core cfg80211 btqca btbcm v4l2_mem2mem videobuf2_v4l2 slimbus coresight_stm videobuf2_common bluetooth spi_geni_qcom typec phy_qcom_qmp_usb qcom_rng qcom_q6v5_mss gpi qrtr stm_core phy_qcom_qmp_ufs qcrypto ufs_qcom rfkill pdr_interface qcom_wdt lmh phy_qcom_qmp_pcie qcom_q6v5_pas qcom_pil_info icc_osm_l3 qcom_q6v5 display_connector
[  402.920901]  qcom_sysmon qcom_common qcom_glink_smem mdt_loader icc_bwmon llcc_qcom drm_kms_helper qmi_helpers drm backlight socinfo rmtfs_mem
[  403.040678] CPU: 1 PID: 36469 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  403.050299] Hardware name: Thundercomm Dragonboard 845c (DT)
[  403.058841] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  403.068685] pc : cleanup_mnt+0xe4/0x158
[  403.075340] lr : cleanup_mnt+0x54/0x158
[  403.081939] sp : ffff800085f83cb0
[  403.087958] x29: ffff800085f83cb0 x28: 00000000000000c0 x27: 0000000000000004
[  403.097858] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  403.107734] x23: ffffb4cd3da83460 x22: ffffb4cd3da7e000 x21: 00000000ffffffff
[  403.117634] x20: ffffb4cd3da7eac0 x19: ffff2c1b0bc232c0 x18: 000000082fc3afac
[  403.127526] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  403.137443] x14: 0000000000000000 x13: ffff800085f80000 x12: ffff800085f84000
[  403.147328] x11: ce3eb58f2eae5e00 x10: 00000000000000ff x9 : ffff774e3fb4c000
[  403.157204] x8 : 0000000000000008 x7 : 0000000000000000 x6 : 00000000000020f2
[  403.167082] x5 : 00000000000e4ea6 x4 : ffff2c1b7d4cae50 x3 : ffff800085f83c20
[  403.176989] x2 : 0000000000000008 x1 : 0000000000000008 x0 : 0000000000000008
[  403.186914] Call trace:
[  403.192105]  cleanup_mnt+0xe4/0x158
[  403.198344]  __cleanup_mnt+0x20/0x38
[  403.204654]  task_work_run+0xb8/0xe0
[  403.210979]  do_notify_resume+0xa58/0xe98
[  403.217704]  el0_svc+0x68/0x70
[  403.223410]  el0t_64_sync_handler+0x90/0x100
[  403.230311]  el0t_64_sync+0x190/0x198
[  403.236550] ---[ end trace 0000000000000000 ]---

test log snippet test parser 14

Home

------------[ cut here ]------------
[  399.278066] WARNING: CPU: 1 PID: 36404 at fs/namespace.c:1245 cleanup_mnings 0
[  399.295472] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_enc venus_dec videobuf2_dma_contig mcp251xfd ath10k_snoc msm snd_soc_sdm845 ath10k_core can_dev lontium_lt9611 ath leds_qcom_lpg snd_soc_rt5663 qcom_spmi_adc5 ocmem hci_uart snd_soc_qcom_common qcom_camss venus_core btqca xhci_pci gpu_sched snd_soc_rl6231 videobuf2_dma_sg btbcm xhci_pci_renesas led_class_multicolor rtc_pm8xxx qcom_vadc_common qcom_spmi_temp_alarm qcom_pon v4l2_mem2mem soundwire_bus crct10dif_ce bluetooth mac80211 spi_geni_qcom qcom_stats videobuf2_memops phy_qcom_qmp_combo i2c_qcom_geni drm_dp_aux_bus videobuf2_v4l2 phy_qcom_qmp_usb reset_qcom_pdc typec drm_display_helper camcc_sdm845 videobuf2_common qcom_rng gpi qcom_q6v5_mss phy_qcom_qmp_ufs ufs_qcom qrtr cfg80211 qcrypto coresight_stm stm_core rfkill display_connector phy_qcom_qmp_pcie drm_kms_helper drm icc_osm_l3 qcom_wdt slim_qcom_ngd_ctrl slimbus qcom_q6v5_pas
[  399.295900]  pdr_interface lmh qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common llcc_qcom icc_bwmon qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[  399.435371] CPU: 1 PID: 36404 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  399.447975] Hardware name: Thundercomm Dragonboard 845c (DT)
[  399.459458] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  399.472237] pc : cleanup_mnt+0x11c/0x140
[  399.481875] lr : cleanup_mnt+0x20/0x140
[  399.491318] sp : ffff800085f2bca0
[  399.500141] x29: ffff800085f2bca0 x28: 0000000000000004 x27: 0000000000000000
[  399.512852] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  399.525544] x23: ffff7aab0862dae4 x22: ffffb4c740ccfb50 x21: ffff7aab0862d280
[  399.538271] x20: ffff7aab08757540 x19: 0000000000000000 x18: ffffb4c740bb7908
[  399.551016] x17: ffffb4c740bb78f0 x16: ffffb4c73e512610 x15: 00000000001e8480
[  399.563785] x14: ffff80008103b7d0 x13: 0000000160000008 x12: ffffb4c740615e28
[  399.576545] x11: ffffb4c740605008 x10: 0000000000000002 x9 : ffffb4c73e5fa778
[  399.589244] x8 : ffff800085f2bb38 x7 : 0000000000000000 x6 : 0000000000000000
[  399.601959] x5 : 0000000000000000 x4 : 0000000000000007 x3 : fffffbffeffec680
[  399.614714] x2 : 0000000000000009 x1 : 0000000000000008 x0 : 00000000ffffffff
[  399.627492] Call trace:
[  399.635537]  cleanup_mnt+0x11c/0x140
[  399.644708]  __cleanup_mnt+0x1c/0x30
[  399.653851]  task_work_run+0x88/0xf8
[  399.663013]  do_notify_resume+0x214/0x1158
[  399.672620]  el0_svc+0xc8/0xe0
[  399.681082]  el0t_64_sync_handler+0x120/0x130
[  399.690800]  el0t_64_sync+0x190/0x198
[  399.699717] ---[ end trace 0000000000000000 ]---

test log snippet test parser 15

Home

------------[ cut here ]------------
[  399.278066] WARNING: CPU: 1 PID: 36404 at fs/namespace.c:1245 cleanup_mnings 0
[  399.295472] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress snd_soc_hdmi_codec ax88179_178a usbnet fuse ip_tables x_tables venus_enc venus_dec videobuf2_dma_contig mcp251xfd ath10k_snoc msm snd_soc_sdm845 ath10k_core can_dev lontium_lt9611 ath leds_qcom_lpg snd_soc_rt5663 qcom_spmi_adc5 ocmem hci_uart snd_soc_qcom_common qcom_camss venus_core btqca xhci_pci gpu_sched snd_soc_rl6231 videobuf2_dma_sg btbcm xhci_pci_renesas led_class_multicolor rtc_pm8xxx qcom_vadc_common qcom_spmi_temp_alarm qcom_pon v4l2_mem2mem soundwire_bus crct10dif_ce bluetooth mac80211 spi_geni_qcom qcom_stats videobuf2_memops phy_qcom_qmp_combo i2c_qcom_geni drm_dp_aux_bus videobuf2_v4l2 phy_qcom_qmp_usb reset_qcom_pdc typec drm_display_helper camcc_sdm845 videobuf2_common qcom_rng gpi qcom_q6v5_mss phy_qcom_qmp_ufs ufs_qcom qrtr cfg80211 qcrypto coresight_stm stm_core rfkill display_connector phy_qcom_qmp_pcie drm_kms_helper drm icc_osm_l3 qcom_wdt slim_qcom_ngd_ctrl slimbus qcom_q6v5_pas
[  399.295900]  pdr_interface lmh qcom_pil_info qcom_q6v5 qcom_sysmon qcom_common llcc_qcom icc_bwmon qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem
[  399.435371] CPU: 1 PID: 36404 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  399.447975] Hardware name: Thundercomm Dragonboard 845c (DT)
[  399.459458] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  399.472237] pc : cleanup_mnt+0x11c/0x140
[  399.481875] lr : cleanup_mnt+0x20/0x140
[  399.491318] sp : ffff800085f2bca0
[  399.500141] x29: ffff800085f2bca0 x28: 0000000000000004 x27: 0000000000000000
[  399.512852] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  399.525544] x23: ffff7aab0862dae4 x22: ffffb4c740ccfb50 x21: ffff7aab0862d280
[  399.538271] x20: ffff7aab08757540 x19: 0000000000000000 x18: ffffb4c740bb7908
[  399.551016] x17: ffffb4c740bb78f0 x16: ffffb4c73e512610 x15: 00000000001e8480
[  399.563785] x14: ffff80008103b7d0 x13: 0000000160000008 x12: ffffb4c740615e28
[  399.576545] x11: ffffb4c740605008 x10: 0000000000000002 x9 : ffffb4c73e5fa778
[  399.589244] x8 : ffff800085f2bb38 x7 : 0000000000000000 x6 : 0000000000000000
[  399.601959] x5 : 0000000000000000 x4 : 0000000000000007 x3 : fffffbffeffec680
[  399.614714] x2 : 0000000000000009 x1 : 0000000000000008 x0 : 00000000ffffffff
[  399.627492] Call trace:
[  399.635537]  cleanup_mnt+0x11c/0x140
[  399.644708]  __cleanup_mnt+0x1c/0x30
[  399.653851]  task_work_run+0x88/0xf8
[  399.663013]  do_notify_resume+0x214/0x1158
[  399.672620]  el0_svc+0xc8/0xe0
[  399.681082]  el0t_64_sync_handler+0x120/0x130
[  399.690800]  el0t_64_sync+0x190/0x198
[  399.699717] ---[ end trace 0000000000000000 ]---

test log snippet test parser 16

Home

------------[ cut here ]------------
[   52.367101] WARNING: CPU: 4 PID: 1872 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[   52.408414] Modules linked in: fuse ip_tables x_tables snd_soc_hdmi_codec ax88179_178a usbnet hci_uart btqca venus_dec btbcm venus_enc xhci_pci mcp251xfd videobuf2_dma_contig xhci_pci_renesas can_dev lontium_lt9611 ath10k_snoc ath10k_core msm ath qcom_camss videobuf2_dma_sg v4l2_fwnode snd_soc_sdm845 v4l2_async venus_core ocmem leds_qcom_lpg gpu_sched led_class_multicolor snd_soc_rt5663 v4l2_mem2mem videobuf2_memops snd_soc_qcom_common bluetooth mac80211 videobuf2_v4l2 crct10dif_ce qcom_spmi_temp_alarm videodev ecdh_generic qcom_spmi_adc5 videobuf2_common libarc4 drm_dp_aux_bus snd_soc_rl6231 rtc_pm8xxx qcom_vadc_common qcom_pon qcom_stats soundwire_bus ecc i2c_qcom_geni reset_qcom_pdc camcc_sdm845 drm_display_helper coresight_stm mc spi_geni_qcom gpi qcom_rng stm_core phy_qcom_qmp_combo phy_qcom_qmp_usb coresight_replicator coresight_funnel typec coresight_tmc cfg80211 qcom_q6v5_mss phy_qcom_qusb2 qrtr rfkill phy_qcom_qmp_ufs coresight qcrypto authenc libdes ufs_qcom phy_qcom_qmp_pcie icc_osm_l3 qcom_q6v5_pas lmh
[   52.408590]  qcom_wdt qcom_pil_info qcom_q6v5 slim_qcom_ngd_ctrl qcom_sysmon slimbus pdr_interface display_connector qcom_common qcom_glink_smem icc_bwmon llcc_qcom mdt_loader drm_kms_helper qmi_helpers drm backlight rmtfs_mem socinfo
[   52.587538] CPU: 4 PID: 1872 Comm: unshare_test Tainted: G        W          6.6.72-rc1 #1
[   52.629896] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.669828] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   52.711157] pc : kvmalloc_node+0xfc/0x10c
[   52.749338] lr : kvmalloc_node+0x64/0x10c
[   52.787524] sp : ffff800088edbce0
[   52.825014] x29: ffff800088edbcf0 x28: ffff7b2d05469000 x27: 0000000000000000
[   52.866364] x26: 0000000000000000 x25: 0000000000000000 x24: ffff7b2d00136f40
[   52.907694] x23: ffff7b2d00136ec0 x22: ffffdf069eeeeca4 x21: 00000000ffffffff
[   52.949027] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   52.990362] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   53.031691] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   53.073026] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   53.114360] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[   53.155690] x5 : 0000000000000000 x4 : ffff7b2d05469000 x3 : 0000000000000000
[   53.197026] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   53.238364] Call trace:
[   53.274796]  kvmalloc_node+0xfc/0x10c
[   53.312290]  alloc_fdtable+0x94/0x114
[   53.349786]  expand_files+0x78/0x318
[   53.387274]  ksys_dup3+0x60/0x128
[   53.424766]  __arm64_sys_dup3+0x20/0x30
[   53.462957]  invoke_syscall+0x48/0x114
[   53.500440]  el0_svc_common.constprop.0+0x40/0xe0
[   53.539331]  do_el0_svc+0x1c/0x28
[   53.576811]  el0_svc+0x38/0xc8
[   53.613951]  el0t_64_sync_handler+0x120/0x12c
[   53.652140]  el0t_64_sync+0x190/0x194
[   53.689635] ---[ end trace 0000000000000000 ]---

test log snippet test parser 17

Home

------------[ cut here ]------------
[   51.378622] WARNING: CPU: 0 PID: 1424 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   51.378715] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[   51.379791] CPU: 0 PID: 1424 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   51.386560] Hardware name: WinLink E850-96 board (DT)
[   51.391594] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.398537] pc : kvmalloc_node+0xe0/0xe8
[   51.402443] lr : kvmalloc_node+0x50/0xe8
[   51.406351] sp : ffff800083ed3ce0
[   51.409647] x29: ffff800083ed3cf0 x28: ffff0008076c3000 x27: 0000000000000000
[   51.416765] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   51.423885] x23: 0000000080000000 x22: ffff800080306d20 x21: 0000000200002000
[   51.431001] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   51.438119] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.445239] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.452355] x11: 0000000000000040 x10: a2ab0f3bfcaf8e00 x9 : a2ab0f3bfcaf8e00
[   51.459473] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   51.466593] x5 : 0000000000000000 x4 : ffff800083ed3ca0 x3 : 0000000000000000
[   51.473709] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   51.480831] Call trace:
[   51.483262]  kvmalloc_node+0xe0/0xe8
[   51.486820]  alloc_fdtable+0x7c/0x108
[   51.490462]  expand_files+0x114/0x2f0
[   51.494108]  ksys_dup3+0x60/0xf4
[   51.497320]  __arm64_sys_dup3+0x20/0x30
[   51.501139]  invoke_syscall+0x40/0x100
[   51.504872]  el0_svc_common+0xa8/0xd8
[   51.508520]  do_el0_svc+0x1c/0x28
[   51.511816]  el0_svc+0x38/0x64
[   51.514854]  el0t_64_sync_handler+0x90/0xfc
[   51.519021]  el0t_64_sync+0x190/0x194
[   51.522671] ---[ end trace 0000000000000000 ]---

test log snippet test parser 18

Home

[    2.337660] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    2.345891] CPU: 3 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[    2.352138] Hardware name: WinLink E850-96 board (DT)
[    2.357174] Call trace:
[    2.359603]  dump_backtrace+0x108/0x190
[    2.363420]  show_stack+0x24/0x30
[    2.366718]  dump_stack_lvl+0x60/0x80
[    2.370364]  dump_stack+0x18/0x28
[    2.373663]  panic+0x150/0x368
[    2.376703]  mount_root_generic+0x298/0x2e8
[    2.380868]  mount_block_root+0x5c/0x78
[    2.384689]  mount_root+0x74/0xa8
[    2.387986]  prepare_namespace+0x8c/0xd8
[    2.391894]  kernel_init_freeable+0x108/0x160
[    2.396232]  kernel_init+0x2c/0x1c0
[    2.399706]  ret_from_fork+0x10/0x20
[    2.403267] SMP: stopping secondary CPUs
[    2.407179] Kernel Offset: disabled
[    2.410645] CPU features: 0x0,c0000000,00020143,0000721b
[    2.415938] Memory Limit: none
[    2.418983] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 19

Home

[    2.337660] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    2.345891] CPU: 3 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[    2.352138] Hardware name: WinLink E850-96 board (DT)
[    2.357174] Call trace:
[    2.359603]  dump_backtrace+0x108/0x190
[    2.363420]  show_stack+0x24/0x30
[    2.366718]  dump_stack_lvl+0x60/0x80
[    2.370364]  dump_stack+0x18/0x28
[    2.373663]  panic+0x150/0x368
[    2.376703]  mount_root_generic+0x298/0x2e8
[    2.380868]  mount_block_root+0x5c/0x78
[    2.384689]  mount_root+0x74/0xa8
[    2.387986]  prepare_namespace+0x8c/0xd8
[    2.391894]  kernel_init_freeable+0x108/0x160
[    2.396232]  kernel_init+0x2c/0x1c0
[    2.399706]  ret_from_fork+0x10/0x20
[    2.403267] SMP: stopping secondary CPUs
[    2.407179] Kernel Offset: disabled
[    2.410645] CPU features: 0x0,c0000000,00020143,0000721b
[    2.415938] Memory Limit: none
[    2.418983] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 20

Home

------------[ cut here ]------------
[   51.494506] WARNING: CPU: 3 PID: 1425 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[   51.497265] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[   51.504733] CPU: 3 PID: 1425 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   51.511502] Hardware name: WinLink E850-96 board (DT)
[   51.516536] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.523480] pc : kvmalloc_node+0xfc/0x10c
[   51.527471] lr : kvmalloc_node+0x64/0x10c
[   51.531466] sp : ffff800084133ce0
[   51.534762] x29: ffff800084133cf0 x28: ffff00080605f000 x27: 0000000000000000
[   51.541880] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0008012c3780
[   51.548998] x23: ffff0008012c3700 x22: ffff8000802eeca4 x21: 00000000ffffffff
[   51.556116] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   51.563234] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.570352] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.577470] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.584590] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[   51.591706] x5 : 0000000000000000 x4 : ffff00080605f000 x3 : 0000000000000000
[   51.598824] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.605946] Call trace:
[   51.608377]  kvmalloc_node+0xfc/0x10c
[   51.612020]  alloc_fdtable+0x94/0x114
[   51.615664]  expand_files+0x78/0x318
[   51.619223]  ksys_dup3+0x60/0x128
[   51.622523]  __arm64_sys_dup3+0x20/0x30
[   51.626341]  invoke_syscall+0x48/0x114
[   51.630074]  el0_svc_common.constprop.0+0x40/0xe0
[   51.634761]  do_el0_svc+0x1c/0x28
[   51.638059]  el0_svc+0x38/0xc8
[   51.641097]  el0t_64_sync_handler+0x120/0x12c
[   51.645438]  el0t_64_sync+0x190/0x194
[   51.649087] ---[ end trace 0000000000000000 ]---

test log snippet test parser 21

Home

[    1.854181] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    1.854188] CPU: 5 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[    1.854195] Hardware name: WinLink E850-96 board (DT)
[    1.854199] Call trace:
[    1.854204]  dump_backtrace+0x90/0xe8
[    1.854223]  show_stack+0x18/0x24
[    1.854236]  dump_stack_lvl+0x48/0x60
[    1.854248]  dump_stack+0x18/0x24
[    1.854257]  panic+0x324/0x380
[    1.854272]  mount_root_generic+0x260/0x330
[    1.854282]  mount_root+0x170/0x334
[    1.854290]  prepare_namespace+0x6c/0x2a4
[    1.854299]  kernel_init_freeable+0x244/0x284
[    1.854309]  kernel_init+0x24/0x1dc
[    1.854322]  ret_from_fork+0x10/0x20
[    1.854336] SMP: stopping secondary CPUs
[    1.859467] Kernel Offset: disabled
[    1.859471] CPU features: 0x0,c0000000,00020143,0000721b
[    1.859481] Memory Limit: none
[    1.945488] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 22

Home

[    1.854181] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    1.854188] CPU: 5 PID: 1 Comm: swapper/0 Not tainted 6.6.72-rc1 #1
[    1.854195] Hardware name: WinLink E850-96 board (DT)
[    1.854199] Call trace:
[    1.854204]  dump_backtrace+0x90/0xe8
[    1.854223]  show_stack+0x18/0x24
[    1.854236]  dump_stack_lvl+0x48/0x60
[    1.854248]  dump_stack+0x18/0x24
[    1.854257]  panic+0x324/0x380
[    1.854272]  mount_root_generic+0x260/0x330
[    1.854282]  mount_root+0x170/0x334
[    1.854290]  prepare_namespace+0x6c/0x2a4
[    1.854299]  kernel_init_freeable+0x244/0x284
[    1.854309]  kernel_init+0x24/0x1dc
[    1.854322]  ret_from_fork+0x10/0x20
[    1.854336] SMP: stopping secondary CPUs
[    1.859467] Kernel Offset: disabled
[    1.859471] CPU features: 0x0,c0000000,00020143,0000721b
[    1.859481] Memory Limit: none
[    1.945488] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 23

Home

------------[ cut here ]------------
[  309.059412] WARNING: CPU: 0 PID: 533 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  309.059550] Modules linked in: panel_simple arm_spe_pmu crct10dif_ce pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  309.059949] CPU: 0 PID: 533 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[  309.060065] Hardware name: FVP Base RevC (DT)
[  309.060132] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  309.060260] pc : kvmalloc_node+0xe0/0xe8
[  309.060356] lr : kvmalloc_node+0x50/0xe8
[  309.060451] sp : ffff800080b5bce0
[  309.060511] x29: ffff800080b5bcf0 x28: ffff000801092000 x27: 0000000000000000
[  309.060682] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  309.060848] x23: 0000000080000000 x22: 9cb0d7c64b706d20 x21: 0000000200002000
[  309.061018] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  309.061185] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  309.061349] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  309.061513] x11: 0000000000000040 x10: ffdec00d7c0edc00 x9 : ffdec00d7c0edc00
[  309.061680] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  309.061846] x5 : 0000000000000000 x4 : ffff800080b5bca0 x3 : 0000000000000000
[  309.062010] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  309.062173] Call trace:
[  309.062224]  kvmalloc_node+0xe0/0xe8
[  309.062324]  alloc_fdtable+0x7c/0x108
[  309.062459]  expand_files+0x114/0x2f0
[  309.062558]  ksys_dup3+0x60/0xf4
[  309.062654]  __arm64_sys_dup3+0x20/0x30
[  309.062756]  invoke_syscall+0x40/0x100
[  309.062882]  el0_svc_common+0xa8/0xd8
[  309.063007]  do_el0_svc+0x1c/0x28
[  309.063129]  el0_svc+0x38/0x64
[  309.063234]  el0t_64_sync_handler+0x90/0xfc
[  309.063348]  el0t_64_sync+0x190/0x194
[  309.063448] ---[ end trace 0000000000000000 ]---

test log snippet test parser 24

Home

------------[ cut here ]------------
[  352.742686] WARNING: CPU: 5 PID: 532 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  352.742829] Modules linked in: arm_spe_pmu panel_simple crct10dif_ce pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  352.743252] CPU: 5 PID: 532 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[  352.743372] Hardware name: FVP Base RevC (DT)
[  352.743445] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  352.743577] pc : kvmalloc_node+0xfc/0x10c
[  352.743671] lr : kvmalloc_node+0x64/0x10c
[  352.743773] sp : ffff800081a3bce0
[  352.743839] x29: ffff800081a3bcf0 x28: ffff0008022c3000 x27: 0000000000000000
[  352.744022] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000800b053c0
[  352.744200] x23: ffff000800b05340 x22: febcd7c64b6eeca4 x21: 00000000ffffffff
[  352.744384] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  352.744562] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  352.744737] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  352.744912] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  352.745087] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[  352.745260] x5 : 0000000000000000 x4 : ffff0008022c3000 x3 : 0000000000000000
[  352.745437] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  352.745612] Call trace:
[  352.745667]  kvmalloc_node+0xfc/0x10c
[  352.745766]  alloc_fdtable+0x94/0x114
[  352.745873]  expand_files+0x78/0x318
[  352.745981]  ksys_dup3+0x60/0x128
[  352.746089]  __arm64_sys_dup3+0x20/0x30
[  352.746204]  invoke_syscall+0x48/0x114
[  352.746336]  el0_svc_common.constprop.0+0x40/0xe0
[  352.746479]  do_el0_svc+0x1c/0x28
[  352.746608]  el0_svc+0x38/0xc8
[  352.746719]  el0t_64_sync_handler+0x120/0x12c
[  352.746845]  el0t_64_sync+0x190/0x194
[  352.746950] ---[ end trace 0000000000000000 ]---

test log snippet test parser 25

Home

------------[ cut here ]------------
[  356.803849] WARNING: CPU: 1 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  356.805937] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  356.809078] CPU: 1 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  356.809569] Hardware name: linux,dummy-virt (DT)
[  356.810382] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  356.811214] pc : cleanup_mnt+0xe4/0x158
[  356.811765] lr : cleanup_mnt+0x54/0x158
[  356.812535] sp : ffff80008b6d3cb0
[  356.813205] x29: ffff80008b6d3cb0 x28: 00000000000000c0 x27: 0000000000000004
[  356.814738] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  356.816278] x23: ffffa95a34a83460 x22: ffffa95a34a7e000 x21: 00000000ffffffff
[  356.817001] x20: ffffa95a34a7eac0 x19: ffff0000c2901000 x18: 0000000000000000
[  356.817988] x17: ffffa95a33b4e828 x16: 0000000000000000 x15: 0000000000000000
[  356.819281] x14: 0000000000000000 x13: ffff80008b6d0000 x12: ffff80008b6d4000
[  356.820471] x11: 71c8ee307f807a00 x10: 0000000000000003 x9 : ffff56a6cab9b000
[  356.821392] x8 : 0000000000000002 x7 : 0000000000000000 x6 : 000000000000000b
[  356.821777] x5 : 0000000080400035 x4 : fffffc00030a4b20 x3 : ffff80008b6d3c20
[  356.822732] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[  356.824616] Call trace:
[  356.825241]  cleanup_mnt+0xe4/0x158
[  356.825662]  __cleanup_mnt+0x20/0x38
[  356.825928]  task_work_run+0xb8/0xe0
[  356.827130]  do_notify_resume+0xa58/0xe98
[  356.827574]  el0_svc_compat+0x64/0x68
[  356.828489]  el0t_32_sync_handler+0x84/0xb8
[  356.829779]  el0t_32_sync+0x194/0x198
[  356.830333] ---[ end trace 0000000000000000 ]---

test log snippet test parser 26

Home

------------[ cut here ]------------
[  356.803849] WARNING: CPU: 1 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  356.805937] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  356.809078] CPU: 1 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  356.809569] Hardware name: linux,dummy-virt (DT)
[  356.810382] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  356.811214] pc : cleanup_mnt+0xe4/0x158
[  356.811765] lr : cleanup_mnt+0x54/0x158
[  356.812535] sp : ffff80008b6d3cb0
[  356.813205] x29: ffff80008b6d3cb0 x28: 00000000000000c0 x27: 0000000000000004
[  356.814738] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  356.816278] x23: ffffa95a34a83460 x22: ffffa95a34a7e000 x21: 00000000ffffffff
[  356.817001] x20: ffffa95a34a7eac0 x19: ffff0000c2901000 x18: 0000000000000000
[  356.817988] x17: ffffa95a33b4e828 x16: 0000000000000000 x15: 0000000000000000
[  356.819281] x14: 0000000000000000 x13: ffff80008b6d0000 x12: ffff80008b6d4000
[  356.820471] x11: 71c8ee307f807a00 x10: 0000000000000003 x9 : ffff56a6cab9b000
[  356.821392] x8 : 0000000000000002 x7 : 0000000000000000 x6 : 000000000000000b
[  356.821777] x5 : 0000000080400035 x4 : fffffc00030a4b20 x3 : ffff80008b6d3c20
[  356.822732] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[  356.824616] Call trace:
[  356.825241]  cleanup_mnt+0xe4/0x158
[  356.825662]  __cleanup_mnt+0x20/0x38
[  356.825928]  task_work_run+0xb8/0xe0
[  356.827130]  do_notify_resume+0xa58/0xe98
[  356.827574]  el0_svc_compat+0x64/0x68
[  356.828489]  el0t_32_sync_handler+0x84/0xb8
[  356.829779]  el0t_32_sync+0x194/0x198
[  356.830333] ---[ end trace 0000000000000000 ]---

test log snippet test parser 27

Home

------------[ cut here ]------------
[  373.881529] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  373.884310] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  373.888526] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  373.889444] Hardware name: linux,dummy-virt (DT)
[  373.891421] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  373.892374] pc : cleanup_mnt+0x11c/0x140
[  373.892692] lr : cleanup_mnt+0x20/0x140
[  373.893065] sp : ffff80008aee3cc0
[  373.893325] x29: ffff80008aee3cc0 x28: ffff0000c1f42100 x27: 0000000000000000
[  373.893945] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  373.895358] x23: ffffad307769ab58 x22: ffff0000c1f42100 x21: ffff0000c1f42964
[  373.896063] x20: ffff0000c28a6140 x19: 0000000000000000 x18: 0000000000000000
[  373.897667] x17: ffff52d0885c8000 x16: ffffad3074f089e0 x15: 0000000000000000
[  373.898549] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  373.899766] x11: 0000000100004802 x10: 0000000000000002 x9 : ffffad3074fe7428
[  373.900755] x8 : ffff80008aee3b48 x7 : 0000000000000000 x6 : 0000000000000000
[  373.902143] x5 : ffffad30770df000 x4 : 0000000000000001 x3 : fffffbffefff284c
[  373.902790] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[  373.904196] Call trace:
[  373.904486]  cleanup_mnt+0x11c/0x140
[  373.904853]  __cleanup_mnt+0x1c/0x30
[  373.905461]  task_work_run+0x80/0xe8
[  373.905816]  do_notify_resume+0x214/0xf30
[  373.907168]  el0_svc_compat+0x88/0xa0
[  373.907617]  el0t_32_sync_handler+0xb0/0x138
[  373.908718]  el0t_32_sync+0x194/0x198
[  373.909966] ---[ end trace 0000000000000000 ]---

test log snippet test parser 28

Home

------------[ cut here ]------------
[  373.881529] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  373.884310] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  373.888526] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  373.889444] Hardware name: linux,dummy-virt (DT)
[  373.891421] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  373.892374] pc : cleanup_mnt+0x11c/0x140
[  373.892692] lr : cleanup_mnt+0x20/0x140
[  373.893065] sp : ffff80008aee3cc0
[  373.893325] x29: ffff80008aee3cc0 x28: ffff0000c1f42100 x27: 0000000000000000
[  373.893945] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  373.895358] x23: ffffad307769ab58 x22: ffff0000c1f42100 x21: ffff0000c1f42964
[  373.896063] x20: ffff0000c28a6140 x19: 0000000000000000 x18: 0000000000000000
[  373.897667] x17: ffff52d0885c8000 x16: ffffad3074f089e0 x15: 0000000000000000
[  373.898549] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  373.899766] x11: 0000000100004802 x10: 0000000000000002 x9 : ffffad3074fe7428
[  373.900755] x8 : ffff80008aee3b48 x7 : 0000000000000000 x6 : 0000000000000000
[  373.902143] x5 : ffffad30770df000 x4 : 0000000000000001 x3 : fffffbffefff284c
[  373.902790] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[  373.904196] Call trace:
[  373.904486]  cleanup_mnt+0x11c/0x140
[  373.904853]  __cleanup_mnt+0x1c/0x30
[  373.905461]  task_work_run+0x80/0xe8
[  373.905816]  do_notify_resume+0x214/0xf30
[  373.907168]  el0_svc_compat+0x88/0xa0
[  373.907617]  el0t_32_sync_handler+0xb0/0x138
[  373.908718]  el0t_32_sync+0x194/0x198
[  373.909966] ---[ end trace 0000000000000000 ]---

test log snippet test parser 29

Home

------------[ cut here ]------------
[   54.301037] WARNING: CPU: 1 PID: 464 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   54.302642] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   54.306212] CPU: 1 PID: 464 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   54.306909] Hardware name: linux,dummy-virt (DT)
[   54.307724] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   54.308220] pc : kvmalloc_node+0xe0/0xe8
[   54.308637] lr : kvmalloc_node+0x50/0xe8
[   54.309028] sp : ffff80008082bce0
[   54.309563] x29: ffff80008082bcf0 x28: ffff0000c0beb000 x27: 0000000000000000
[   54.310330] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   54.310982] x23: 0000000080001000 x22: 5bb5a4bab7f06d20 x21: 0000000200002000
[   54.311709] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   54.312515] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   54.313098] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   54.313950] x11: 0000000000000040 x10: e1c6c458a70f8400 x9 : e1c6c458a70f8400
[   54.315195] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   54.315862] x5 : 0000000000000000 x4 : ffff80008082bca0 x3 : 0000000000000000
[   54.316805] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   54.317439] Call trace:
[   54.318000]  kvmalloc_node+0xe0/0xe8
[   54.319969]  alloc_fdtable+0x7c/0x108
[   54.320939]  expand_files+0x114/0x2f0
[   54.324360]  ksys_dup3+0x60/0xf4
[   54.324580]  __arm64_sys_dup3+0x20/0x30
[   54.324820]  invoke_syscall+0x40/0x100
[   54.325222]  el0_svc_common+0xa8/0xd8
[   54.325473]  do_el0_svc+0x1c/0x28
[   54.325710]  el0_svc+0x38/0x64
[   54.325912]  el0t_64_sync_handler+0x90/0xfc
[   54.326140]  el0t_64_sync+0x190/0x194
[   54.328838] ---[ end trace 0000000000000000 ]---

test log snippet test parser 30

Home

------------[ cut here ]------------
[  342.934763] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  342.937238] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  342.942179] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  342.943731] Hardware name: linux,dummy-virt (DT)
[  342.945030] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  342.945502] pc : cleanup_mnt+0xe4/0x158
[  342.945782] lr : cleanup_mnt+0x54/0x158
[  342.946043] sp : ffff80008ad1bcb0
[  342.946274] x29: ffff80008ad1bcb0 x28: 00000000000000c0 x27: 0000000000000004
[  342.950047] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  342.952314] x23: ffffc6079dc83460 x22: ffffc6079dc7e000 x21: 00000000ffffffff
[  342.953721] x20: ffffc6079dc7eac0 x19: ffff0000c6489b40 x18: 0000000000000000
[  342.954538] x17: ffffc6079cd4e828 x16: 0000000000000000 x15: 0000000000000000
[  342.955969] x14: 0000000000000000 x13: ffff80008ad18000 x12: ffff80008ad1c000
[  342.957198] x11: 0d7eb2ee421f6e00 x10: 0000000000000003 x9 : ffff39f96199b000
[  342.958125] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[  342.959643] x5 : 0000000000000000 x4 : ffff0000ff5b4e50 x3 : ffff80008ad1bc20
[  342.960639] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[  342.961859] Call trace:
[  342.962182]  cleanup_mnt+0xe4/0x158
[  342.963193]  __cleanup_mnt+0x20/0x38
[  342.963559]  task_work_run+0xb8/0xe0
[  342.964640]  do_notify_resume+0xa58/0xe98
[  342.965478]  el0_svc+0x68/0x70
[  342.966047]  el0t_64_sync_handler+0x90/0x100
[  342.966709]  el0t_64_sync+0x190/0x198
[  342.967875] ---[ end trace 0000000000000000 ]---

test log snippet test parser 31

Home

------------[ cut here ]------------
[  342.934763] WARNING: CPU: 0 PID: 11084 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  342.937238] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  342.942179] CPU: 0 PID: 11084 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  342.943731] Hardware name: linux,dummy-virt (DT)
[  342.945030] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  342.945502] pc : cleanup_mnt+0xe4/0x158
[  342.945782] lr : cleanup_mnt+0x54/0x158
[  342.946043] sp : ffff80008ad1bcb0
[  342.946274] x29: ffff80008ad1bcb0 x28: 00000000000000c0 x27: 0000000000000004
[  342.950047] x26: 0000000000000041 x25: 0000000000000000 x24: 0000000000000000
[  342.952314] x23: ffffc6079dc83460 x22: ffffc6079dc7e000 x21: 00000000ffffffff
[  342.953721] x20: ffffc6079dc7eac0 x19: ffff0000c6489b40 x18: 0000000000000000
[  342.954538] x17: ffffc6079cd4e828 x16: 0000000000000000 x15: 0000000000000000
[  342.955969] x14: 0000000000000000 x13: ffff80008ad18000 x12: ffff80008ad1c000
[  342.957198] x11: 0d7eb2ee421f6e00 x10: 0000000000000003 x9 : ffff39f96199b000
[  342.958125] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[  342.959643] x5 : 0000000000000000 x4 : ffff0000ff5b4e50 x3 : ffff80008ad1bc20
[  342.960639] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[  342.961859] Call trace:
[  342.962182]  cleanup_mnt+0xe4/0x158
[  342.963193]  __cleanup_mnt+0x20/0x38
[  342.963559]  task_work_run+0xb8/0xe0
[  342.964640]  do_notify_resume+0xa58/0xe98
[  342.965478]  el0_svc+0x68/0x70
[  342.966047]  el0t_64_sync_handler+0x90/0x100
[  342.966709]  el0t_64_sync+0x190/0x198
[  342.967875] ---[ end trace 0000000000000000 ]---

test log snippet test parser 32

Home

------------[ cut here ]------------
[  377.408463] WARNING: CPU: 0 PID: 11085 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  377.411074] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  377.415364] CPU: 0 PID: 11085 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  377.416224] Hardware name: linux,dummy-virt (DT)
[  377.417768] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  377.418940] pc : cleanup_mnt+0xe4/0x158
[  377.420543] lr : cleanup_mnt+0x54/0x158
[  377.421433] sp : ffff80008b0a3cb0
[  377.422222] x29: ffff80008b0a3cb0 x28: 00000000000000c0 x27: 0000000000000041
[  377.423444] x26: 0000000000000004 x25: 0000000000000000 x24: 0000000000000000
[  377.424859] x23: ffffb7cfb9c83458 x22: ffffb7cfb9c7e000 x21: 00000000ffffffff
[  377.426193] x20: ffffb7cfb9c7eac0 x19: ffff0000c361da00 x18: 0000000000000000
[  377.427677] x17: ffffb7cfb8d4e820 x16: 0000000000000000 x15: 0000000000000000
[  377.428157] x14: 0000000000000000 x13: ffff80008b0a0000 x12: ffff80008b0a4000
[  377.428587] x11: 1697607560e9c100 x10: 0000000000000003 x9 : ffff48314599b000
[  377.429047] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[  377.429454] x5 : 000000008040002d x4 : ffff0000ff5b4e50 x3 : ffff80008b0a3c20
[  377.429870] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[  377.430886] Call trace:
[  377.431330]  cleanup_mnt+0xe4/0x158
[  377.431844]  __cleanup_mnt+0x20/0x38
[  377.432503]  task_work_run+0xb8/0xe0
[  377.433034]  do_notify_resume+0xa08/0xe30
[  377.433481]  el0_svc+0x68/0x70
[  377.433842]  el0t_64_sync_handler+0x90/0x100
[  377.434875]  el0t_64_sync+0x190/0x198
[  377.435497] ---[ end trace 0000000000000000 ]---

test log snippet test parser 33

Home

------------[ cut here ]------------
[  377.408463] WARNING: CPU: 0 PID: 11085 at fs/namespace.c:1245 cleanup_mnt+0xe4/0x158
[  377.411074] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  377.415364] CPU: 0 PID: 11085 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  377.416224] Hardware name: linux,dummy-virt (DT)
[  377.417768] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  377.418940] pc : cleanup_mnt+0xe4/0x158
[  377.420543] lr : cleanup_mnt+0x54/0x158
[  377.421433] sp : ffff80008b0a3cb0
[  377.422222] x29: ffff80008b0a3cb0 x28: 00000000000000c0 x27: 0000000000000041
[  377.423444] x26: 0000000000000004 x25: 0000000000000000 x24: 0000000000000000
[  377.424859] x23: ffffb7cfb9c83458 x22: ffffb7cfb9c7e000 x21: 00000000ffffffff
[  377.426193] x20: ffffb7cfb9c7eac0 x19: ffff0000c361da00 x18: 0000000000000000
[  377.427677] x17: ffffb7cfb8d4e820 x16: 0000000000000000 x15: 0000000000000000
[  377.428157] x14: 0000000000000000 x13: ffff80008b0a0000 x12: ffff80008b0a4000
[  377.428587] x11: 1697607560e9c100 x10: 0000000000000003 x9 : ffff48314599b000
[  377.429047] x8 : 0000000000000002 x7 : 0000000000000001 x6 : 0000000000000000
[  377.429454] x5 : 000000008040002d x4 : ffff0000ff5b4e50 x3 : ffff80008b0a3c20
[  377.429870] x2 : 0000000000000002 x1 : 0000000000000002 x0 : 0000000000000002
[  377.430886] Call trace:
[  377.431330]  cleanup_mnt+0xe4/0x158
[  377.431844]  __cleanup_mnt+0x20/0x38
[  377.432503]  task_work_run+0xb8/0xe0
[  377.433034]  do_notify_resume+0xa08/0xe30
[  377.433481]  el0_svc+0x68/0x70
[  377.433842]  el0t_64_sync_handler+0x90/0x100
[  377.434875]  el0t_64_sync+0x190/0x198
[  377.435497] ---[ end trace 0000000000000000 ]---

test log snippet test parser 34

Home

------------[ cut here ]------------
[  245.912469] WARNING: CPU: 1 PID: 11082 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  245.915032] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  245.918390] CPU: 1 PID: 11082 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  245.919611] Hardware name: linux,dummy-virt (DT)
[  245.920442] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  245.920969] pc : cleanup_mnt+0x11c/0x140
[  245.921936] lr : cleanup_mnt+0x20/0x140
[  245.922460] sp : ffff800083c2fcc0
[  245.922844] x29: ffff800083c2fcc0 x28: ffff0000c3afd680 x27: 0000000000000000
[  245.923678] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  245.925548] x23: ffffc09bb8e37b58 x22: ffff0000c3afd680 x21: ffff0000c3afdee4
[  245.926055] x20: ffff0000c0ff6540 x19: 0000000000000000 x18: 0000000000000000
[  245.926730] x17: ffff3f65453b0000 x16: ffffc09bb64feba0 x15: 0000000000000000
[  245.928390] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  245.929566] x11: 00000000ffffcb07 x10: 0000000000000002 x9 : ffffc09bb65d9ee8
[  245.930466] x8 : ffff800083c2fb48 x7 : 0000000000000000 x6 : 0000000000000000
[  245.931513] x5 : ffffc09bb8839000 x4 : 0000000000000001 x3 : ffffffbfeff6996c
[  245.932457] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[  245.934108] Call trace:
[  245.934711]  cleanup_mnt+0x11c/0x140
[  245.935248]  __cleanup_mnt+0x1c/0x30
[  245.935790]  task_work_run+0x80/0xe8
[  245.936240]  do_notify_resume+0x204/0xeb8
[  245.936720]  el0_svc+0x12c/0x140
[  245.937004]  el0t_64_sync_handler+0x120/0x130
[  245.937307]  el0t_64_sync+0x190/0x198
[  245.937754] ---[ end trace 0000000000000000 ]---

test log snippet test parser 35

Home

------------[ cut here ]------------
[  245.912469] WARNING: CPU: 1 PID: 11082 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  245.915032] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  245.918390] CPU: 1 PID: 11082 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  245.919611] Hardware name: linux,dummy-virt (DT)
[  245.920442] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  245.920969] pc : cleanup_mnt+0x11c/0x140
[  245.921936] lr : cleanup_mnt+0x20/0x140
[  245.922460] sp : ffff800083c2fcc0
[  245.922844] x29: ffff800083c2fcc0 x28: ffff0000c3afd680 x27: 0000000000000000
[  245.923678] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  245.925548] x23: ffffc09bb8e37b58 x22: ffff0000c3afd680 x21: ffff0000c3afdee4
[  245.926055] x20: ffff0000c0ff6540 x19: 0000000000000000 x18: 0000000000000000
[  245.926730] x17: ffff3f65453b0000 x16: ffffc09bb64feba0 x15: 0000000000000000
[  245.928390] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  245.929566] x11: 00000000ffffcb07 x10: 0000000000000002 x9 : ffffc09bb65d9ee8
[  245.930466] x8 : ffff800083c2fb48 x7 : 0000000000000000 x6 : 0000000000000000
[  245.931513] x5 : ffffc09bb8839000 x4 : 0000000000000001 x3 : ffffffbfeff6996c
[  245.932457] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[  245.934108] Call trace:
[  245.934711]  cleanup_mnt+0x11c/0x140
[  245.935248]  __cleanup_mnt+0x1c/0x30
[  245.935790]  task_work_run+0x80/0xe8
[  245.936240]  do_notify_resume+0x204/0xeb8
[  245.936720]  el0_svc+0x12c/0x140
[  245.937004]  el0t_64_sync_handler+0x120/0x130
[  245.937307]  el0t_64_sync+0x190/0x198
[  245.937754] ---[ end trace 0000000000000000 ]---

test log snippet test parser 36

Home

------------[ cut here ]------------
[ 1017.354341] WARNING: CPU: 0 PID: 16929 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 1017.356987] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 1017.360424] CPU: 0 PID: 16929 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 1017.361139] Hardware name: linux,dummy-virt (DT)
[ 1017.362366] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 1017.363312] pc : cleanup_mnt+0x11c/0x140
[ 1017.364404] lr : cleanup_mnt+0x20/0x140
[ 1017.364728] sp : ffff80008a173ca0
[ 1017.364987] x29: ffff80008a173ca0 x28: 000000000000000c x27: 0000000000000000
[ 1017.365565] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 1017.367560] x23: ffff0000c749b9e4 x22: ffffb255c90cfb50 x21: ffff0000c749b180
[ 1017.368221] x20: ffff0000c342a000 x19: 0000000000000000 x18: 0000000000000000
[ 1017.368873] x17: ffff4dab36b98000 x16: ffffb255c6912610 x15: 0000000000000000
[ 1017.369426] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1017.371160] x11: 0000000000000040 x10: 0000000000000002 x9 : ffffb255c69fa778
[ 1017.371804] x8 : ffff80008a173b38 x7 : 0000000000000000 x6 : 0000000000000000
[ 1017.372357] x5 : 0000000000000000 x4 : 0000000000000001 x3 : fffffbffeffe8eb0
[ 1017.372938] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 1017.373788] Call trace:
[ 1017.374089]  cleanup_mnt+0x11c/0x140
[ 1017.374944]  __cleanup_mnt+0x1c/0x30
[ 1017.375570]  task_work_run+0x88/0xf8
[ 1017.375879]  do_notify_resume+0x214/0x1158
[ 1017.376541]  el0_svc+0xc8/0xe0
[ 1017.377112]  el0t_64_sync_handler+0x120/0x130
[ 1017.377539]  el0t_64_sync+0x190/0x198
[ 1017.378774] ---[ end trace 0000000000000000 ]---

test log snippet test parser 37

Home

------------[ cut here ]------------
[ 1017.354341] WARNING: CPU: 0 PID: 16929 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[ 1017.356987] Modules linked in: overlay btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 1017.360424] CPU: 0 PID: 16929 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[ 1017.361139] Hardware name: linux,dummy-virt (DT)
[ 1017.362366] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 1017.363312] pc : cleanup_mnt+0x11c/0x140
[ 1017.364404] lr : cleanup_mnt+0x20/0x140
[ 1017.364728] sp : ffff80008a173ca0
[ 1017.364987] x29: ffff80008a173ca0 x28: 000000000000000c x27: 0000000000000000
[ 1017.365565] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 1017.367560] x23: ffff0000c749b9e4 x22: ffffb255c90cfb50 x21: ffff0000c749b180
[ 1017.368221] x20: ffff0000c342a000 x19: 0000000000000000 x18: 0000000000000000
[ 1017.368873] x17: ffff4dab36b98000 x16: ffffb255c6912610 x15: 0000000000000000
[ 1017.369426] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1017.371160] x11: 0000000000000040 x10: 0000000000000002 x9 : ffffb255c69fa778
[ 1017.371804] x8 : ffff80008a173b38 x7 : 0000000000000000 x6 : 0000000000000000
[ 1017.372357] x5 : 0000000000000000 x4 : 0000000000000001 x3 : fffffbffeffe8eb0
[ 1017.372938] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[ 1017.373788] Call trace:
[ 1017.374089]  cleanup_mnt+0x11c/0x140
[ 1017.374944]  __cleanup_mnt+0x1c/0x30
[ 1017.375570]  task_work_run+0x88/0xf8
[ 1017.375879]  do_notify_resume+0x214/0x1158
[ 1017.376541]  el0_svc+0xc8/0xe0
[ 1017.377112]  el0t_64_sync_handler+0x120/0x130
[ 1017.377539]  el0t_64_sync+0x190/0x198
[ 1017.378774] ---[ end trace 0000000000000000 ]---

test log snippet test parser 38

Home

------------[ cut here ]------------
[   51.308056] WARNING: CPU: 1 PID: 466 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[   51.310507] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   51.313698] CPU: 1 PID: 466 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   51.314616] Hardware name: linux,dummy-virt (DT)
[   51.315895] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   51.316878] pc : kvmalloc_node+0xfc/0x10c
[   51.317672] lr : kvmalloc_node+0x64/0x10c
[   51.318236] sp : ffff800080803ce0
[   51.318598] x29: ffff800080803cf0 x28: ffff0000c0d4b000 x27: 0000000000000000
[   51.319970] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0bd1680
[   51.320908] x23: ffff0000c0bd1600 x22: cdd9d359722eeca4 x21: 00000000ffffffff
[   51.321948] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   51.322860] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.323810] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.324562] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.325676] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[   51.326590] x5 : 0000000000000000 x4 : ffff0000c0d4b000 x3 : 0000000000000000
[   51.327052] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.327697] Call trace:
[   51.328293]  kvmalloc_node+0xfc/0x10c
[   51.329015]  alloc_fdtable+0x94/0x114
[   51.330357]  expand_files+0x78/0x318
[   51.330813]  ksys_dup3+0x60/0x128
[   51.331560]  __arm64_sys_dup3+0x20/0x30
[   51.331969]  invoke_syscall+0x48/0x114
[   51.332377]  el0_svc_common.constprop.0+0x40/0xe0
[   51.332876]  do_el0_svc+0x1c/0x28
[   51.333463]  el0_svc+0x38/0xc8
[   51.334089]  el0t_64_sync_handler+0x120/0x12c
[   51.334967]  el0t_64_sync+0x190/0x194
[   51.335564] ---[ end trace 0000000000000000 ]---

test log snippet test parser 39

Home

------------[ cut here ]------------
[  327.479195] WARNING: CPU: 1 PID: 11083 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  327.481341] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  327.484625] CPU: 1 PID: 11083 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  327.485306] Hardware name: linux,dummy-virt (DT)
[  327.486081] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  327.486764] pc : cleanup_mnt+0x11c/0x140
[  327.487216] lr : cleanup_mnt+0x20/0x140
[  327.487637] sp : ffff8000898bbcc0
[  327.488020] x29: ffff8000898bbcc0 x28: ffff0000c2036300 x27: 0000000000000000
[  327.488838] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  327.489433] x23: ffffbaa5e209ab58 x22: ffff0000c2036300 x21: ffff0000c2036b64
[  327.490162] x20: ffff0000c653d640 x19: 0000000000000000 x18: 0000000000000000
[  327.490661] x17: ffff455b1dbe7000 x16: ffffbaa5df9089e0 x15: 00001e8480000000
[  327.491441] x14: 00000000003d0900 x13: 0000000000000000 x12: 003d090000000000
[  327.492121] x11: 0000000100001aae x10: 0000000000000002 x9 : ffffbaa5df9e7428
[  327.492730] x8 : ffff8000898bbb48 x7 : 0000000000000000 x6 : 0000000000000000
[  327.493597] x5 : ffffbaa5e1adf000 x4 : 0000000000000001 x3 : fffffbffefff2204
[  327.494248] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[  327.495061] Call trace:
[  327.495411]  cleanup_mnt+0x11c/0x140
[  327.495762]  __cleanup_mnt+0x1c/0x30
[  327.496197]  task_work_run+0x80/0xe8
[  327.496621]  do_notify_resume+0x214/0xf30
[  327.497055]  el0_svc+0xc8/0xe0
[  327.497446]  el0t_64_sync_handler+0x120/0x130
[  327.497758]  el0t_64_sync+0x190/0x198
[  327.498240] ---[ end trace 0000000000000000 ]---

test log snippet test parser 40

Home

------------[ cut here ]------------
[  327.479195] WARNING: CPU: 1 PID: 11083 at fs/namespace.c:1245 cleanup_mnt+0x11c/0x140
[  327.481341] Modules linked in: overlay crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[  327.484625] CPU: 1 PID: 11083 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  327.485306] Hardware name: linux,dummy-virt (DT)
[  327.486081] pstate: 63402009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  327.486764] pc : cleanup_mnt+0x11c/0x140
[  327.487216] lr : cleanup_mnt+0x20/0x140
[  327.487637] sp : ffff8000898bbcc0
[  327.488020] x29: ffff8000898bbcc0 x28: ffff0000c2036300 x27: 0000000000000000
[  327.488838] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  327.489433] x23: ffffbaa5e209ab58 x22: ffff0000c2036300 x21: ffff0000c2036b64
[  327.490162] x20: ffff0000c653d640 x19: 0000000000000000 x18: 0000000000000000
[  327.490661] x17: ffff455b1dbe7000 x16: ffffbaa5df9089e0 x15: 00001e8480000000
[  327.491441] x14: 00000000003d0900 x13: 0000000000000000 x12: 003d090000000000
[  327.492121] x11: 0000000100001aae x10: 0000000000000002 x9 : ffffbaa5df9e7428
[  327.492730] x8 : ffff8000898bbb48 x7 : 0000000000000000 x6 : 0000000000000000
[  327.493597] x5 : ffffbaa5e1adf000 x4 : 0000000000000001 x3 : fffffbffefff2204
[  327.494248] x2 : 0000000000000003 x1 : 0000000000000002 x0 : 00000000ffffffff
[  327.495061] Call trace:
[  327.495411]  cleanup_mnt+0x11c/0x140
[  327.495762]  __cleanup_mnt+0x1c/0x30
[  327.496197]  task_work_run+0x80/0xe8
[  327.496621]  do_notify_resume+0x214/0xf30
[  327.497055]  el0_svc+0xc8/0xe0
[  327.497446]  el0t_64_sync_handler+0x120/0x130
[  327.497758]  el0t_64_sync+0x190/0x198
[  327.498240] ---[ end trace 0000000000000000 ]---

test log snippet test parser 41

Home

------------[ cut here ]------------
[   52.486270] WARNING: CPU: 1 PID: 469 at mm/util.c:632 kvmalloc_node+0xfc/0x108
[   52.489069] Modules linked in:
[   52.490775] CPU: 1 PID: 469 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   52.491969] Hardware name: Generic DT based system
[   52.493736]  unwind_backtrace from show_stack+0x10/0x14
[   52.494602]  show_stack from dump_stack_lvl+0x48/0x54
[   52.495018]  dump_stack_lvl from __warn+0xd4/0x200
[   52.496319]  __warn from warn_slowpath_fmt+0x11c/0x168
[   52.497254]  warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[   52.498167]  kvmalloc_node from alloc_fdtable+0x78/0x104
[   52.499012]  alloc_fdtable from expand_files+0x134/0x304
[   52.499732]  expand_files from ksys_dup3+0x58/0xd0
[   52.500226]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   52.501115] Exception stack(0xfa1c9fa8 to 0xfa1c9ff0)
[   52.501593] 9fa0:                   00440bcd 00000001 00000002 2000003c 00000000 00000000
[   52.503200] 9fc0: 00440bcd 00000001 00442e6c 0000003f 0043e920 b6f6fce0 00000000 be9b23e0
[   52.503660] 9fe0: 0000003f be9b21b4 b6ecef43 b6e4c786
[   52.505084] ---[ end trace 0000000000000000 ]---

test log snippet test parser 42

Home

[  300.838075] BUG: Bad rss-counter state mm:b7eca513 type:MM_ANONPAGES val:1

test log snippet test parser 43

Home

[  300.838075] BUG: Bad rss-counter state mm:b7eca513 type:MM_ANONPAGES val:1

test log snippet test parser 44

Home

--- cut here ---
[  295.936571] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  295.944045] [00000023] *pgd=450a8003, *pmd=00000000
[  295.955367] Internal error: Oops: 206 [#1] SMP ARM
[  295.957497] Modules linked in:
[  295.960606] CPU: 0 PID: 327 Comm: sh Not tainted 6.6.72-rc1 #1
[  295.962070] Hardware name: Generic DT based system
[  295.964444] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  295.967880] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  295.969249] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a0070013
[  295.970737] sp : fa151df8  ip : 00e5eab0  fp : fa151e30
[  295.972193] r10: 00004dc0  r9 : c3001100  r8 : 00000000
[  295.973873] r7 : 00004dc0  r6 : edbda1b8  r5 : 00000040  r4 : 00000040
[  295.976243] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  295.978880] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  295.981204] Control: 30c5387d  Table: 450a5700  DAC: fffffffd
[  295.983114] Register r0 information: non-paged memory
[  295.986132] Register r1 information: NULL pointer
[  295.988088] Register r2 information: non-paged memory
[  295.990154] Register r3 information: non-paged memory
[  295.991119] Register r4 information: non-paged memory
[  295.993524] Register r5 information: non-paged memory
[  295.995627] Register r6 information: non-slab/vmalloc memory
[  295.997953] Register r7 information: non-paged memory
[  295.999629] Register r8 information: NULL pointer
[  296.001517] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  296.005304] Register r10 information: non-paged memory
[  296.006946] Register r11 information: 2-page vmalloc region starting at 0xfa150000 allocated at copy_process+0x164/0xdd8
[  296.010173] Register r12 information: non-paged memory
[  296.012114] Process sh (pid: 327, stack limit = 0xa30dea75)
[  296.014136] Stack: (0xfa151df8 to 0xfa152000)
[  296.016382] 1de0:                                                       c056079c c056079c
[  296.019033] 1e00: fa151e64 00000000 00000040 6b777109 6b777109 c3001100 00000040 00004dc0
[  296.021525] 1e20: c056079c 00000000 c056079c 00000000 fa151e60 c0414d54 c056079c 6b777109
[  296.024207] 1e40: 000000bb 000000ba c5098700 c4888000 c4687300 c207b5c4 c300e2d8 00000000
[  296.026694] 1e60: c300c098 c0414d54 00000000 000000f7 c300c090 00000000 fa151f78 c300c08c
[  296.030341] 1e80: c300c080 c0560434 00000044 6b777109 c26985c0 c26985c0 ffffffff 000f6000
[  296.033312] 1ea0: 000f6000 fa151f78 c416e928 00000004 fa151f70 c056be48 00000004 00000000
[  296.036630] 1ec0: c26985c0 000f6000 fa151f78 c416e928 fa151f70 c0570e14 000f6000 6b777109
[  296.039570] 1ee0: c416e900 c0570d70 00483c20 00000004 fa151f78 c0689078 fa151fa0 c055ea74
[  296.041923] 1f00: c0689474 c4888000 fa151f3c 00000004 00000004 c4888000 00000004 c0580bb0
[  296.044264] 1f20: c06b2de8 00000003 00000000 e1246ea0 c06b2f48 00000002 00000000 e1232d50
[  296.046259] 1f40: 00000044 e126ec30 00000044 6b777109 00000001 6b777109 c416e900 c416e900
[  296.048791] 1f60: 00483c20 fa151f78 00000004 00000004 fa151fa0 c0414d54 00000000 00000000
[  296.050843] 1f80: 00000004 6b777109 00483c20 00000004 00000001 00000004 c04003c4 c4888000
[  296.053215] 1fa0: 0048393c c0414d54 00483c20 00000004 00000001 00483c20 00000004 00000001
[  296.056440] 1fc0: 00483c20 00000004 00000001 00000004 00000004 7fffffff 00483584 0048393c
[  296.058930] 1fe0: 00000004 be9685e8 b6f082d3 b6e7d786 80070030 00000001 00000000 00000000
[  296.061621]  __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[  296.064515] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  296.071693] ---[ end trace 0000000000000000 ]---
--- cut here ---
[  300.777990] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.779269] [00000023] *pgd=449a5003, *pmd=00000000
[  300.780197] Internal error: Oops: 206 [#6] SMP ARM
[  300.780779] Modules linked in:
[  300.781721] CPU: 0 PID: 383 Comm: sh Tainted: G      D            6.6.72-rc1 #1
[  300.782200] Hardware name: Generic DT based system
[  300.783027] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.783852] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.784526] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a00e0113
[  300.784921] sp : fa175e18  ip : fa175dd8  fp : fa175e50
[  300.785355] r10: 00000cc0  r9 : c3001100  r8 : ffffffff
[  300.786318] r7 : 00000cc0  r6 : edbda1b8  r5 : c4648e00  r4 : 00000019
[  300.787218] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.787626] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.788811] Control: 30c5387d  Table: 4491cac0  DAC: fffffffd
[  300.789717] Register r0 information: non-paged memory
[  300.790875] Register r1 information: NULL pointer
[  300.791457] Register r2 information: non-paged memory
[  300.792298] Register r3 information: non-paged memory
[  300.793596] Register r4 information: non-paged memory
[  300.793970] Register r5 information: slab kmalloc-512 start c4648e00 pointer offset 0 size 512
[  300.795562] Register r6 information: non-slab/vmalloc memory
[  300.796513] Register r7 information: non-paged memory
[  300.797236] Register r8 information: non-paged memory
[  300.798289] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.799426] Register r10 information: non-paged memory
[  300.799808] Register r11 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[  300.800819] Register r12 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[  300.801741] Process sh (pid: 383, stack limit = 0x09f7a260)
[  300.802250] Stack: (0xfa175e18 to 0xfa176000)
[  300.802784] 5e00:                                                       00000000 fa175e64
[  300.803608] 5e20: 00000000 00000000 00000019 00000000 96ed0d77 00000cc0 c4648e00 c3001100
[  300.804517] 5e40: 464c457f c06ffc28 00000000 00000019 fa175e80 c0609944 c06ffc28 c40a4000
[  300.805258] 5e60: 00000120 c40a4050 c4648e00 c4648e5c 464c457f fffffff8 00000000 fffff000
[  300.805969] 5e80: fa175f08 c06ffc28 00000100 c41706c0 fa175ee0 c054a794 00000001 00000000
[  300.806895] 5ea0: 00000000 fa175eec 00000000 00000000 00000000 00000000 c41706c0 00000000
[  300.807761] 5ec0: 00000100 00000000 00000000 00000000 00000000 00004004 00000000 c40a4000
[  300.808269] 5ee0: 00000154 00000000 96ed0d77 c26b5fe0 c4648e00 c28e7b90 00000001 c26b13b0
[  300.809353] 5f00: fffffff8 fffffff8 fa175f50 c0694d0c 0000017f 0000017f c50d910c c50d8b00
[  300.809789] 5f20: 00000000 c4648e5c 00000100 00000000 96ed0d77 fffffff9 fffffff2 c4648e00
[  300.810203] 5f40: 004ed7a0 c50d8b00 c4580000 00000014 fa175f80 c06955cc ffffff9c 004eb5b0
[  300.810608] 5f60: 004ed74c 004ed74c 004eb5b0 004ed7a4 0000000b c04003c4 c50d8b00 0000000b
[  300.811043] 5f80: fa175fa0 c06951ec 00000000 c040d06c 004ed7a4 004eb5b0 004e4e4c 0000000b
[  300.814134] 5fa0: 004e8224 c04003b4 004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[  300.815098] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[  300.816859] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68 60070030 004ed7a4 00000000 00000000
[  300.817698]  __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[  300.818821]  __kmalloc from load_elf_binary+0x22c/0xab8
[  300.819751]  load_elf_binary from bprm_execve+0x254/0x598
[  300.820747]  bprm_execve from do_execveat_common+0x2d0/0x324
[  300.821435]  do_execveat_common from sys_execve+0x44/0x4c
[  300.821795]  sys_execve from __sys_trace_return+0x0/0x10
[  300.822564] Exception stack(0xfa175fa8 to 0xfa175ff0)
[  300.823694] 5fa0:                   004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[  300.824750] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[  300.825886] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68
[  300.827081] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.828877] ---[ end trace 0000000000000000 ]---
--- cut here ---
[  300.713684] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.715596] [00000023] *pgd=450af003, *pmd=00000000
[  300.717405] Internal error: Oops: 206 [#5] SMP ARM
[  300.718197] Modules linked in:
[  300.719170] CPU: 0 PID: 326 Comm: sh Tainted: G      D            6.6.72-rc1 #1
[  300.720596] Hardware name: Generic DT based system
[  300.721740] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.722608] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.722981] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a00e0013
[  300.723305] sp : fa14de18  ip : 00000000  fp : fa14de50
[  300.723582] r10: 00000cc0  r9 : c3001100  r8 : ffffffff
[  300.724437] r7 : 00000cc0  r6 : edbda1b8  r5 : c05813d8  r4 : 0000002c
[  300.725253] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.727692] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.728936] Control: 30c5387d  Table: 450a5600  DAC: fffffffd
[  300.729289] Register r0 information: non-paged memory
[  300.729688] Register r1 information: NULL pointer
[  300.729957] Register r2 information: non-paged memory
[  300.730240] Register r3 information: non-paged memory
[  300.730524] Register r4 information: non-paged memory
[  300.732037] Register r5 information: non-slab/vmalloc memory
[  300.733742] Register r6 information: non-slab/vmalloc memory
[  300.734742] Register r7 information: non-paged memory
[  300.736337] Register r8 information: non-paged memory
[  300.737440] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.739334] Register r10 information: non-paged memory
[  300.740502] Register r11 information: 2-page vmalloc region starting at 0xfa14c000 allocated at copy_process+0x164/0xdd8
[  300.742421] Register r12 information: NULL pointer
[  300.742972] Process sh (pid: 326, stack limit = 0x1f6003ab)
[  300.744498] Stack: (0xfa14de18 to 0xfa14e000)
[  300.745292] de00:                                                       0000000c c31421f8
[  300.746040] de20: fa14de78 0000002c 0000002c 00000002 821e08e6 00000cc0 c05813d8 c3001100
[  300.746454] de40: 00000024 c0554858 c0554f98 0000002c fa14de80 c0609944 c0554858 fa14df78
[  300.748173] de60: c0581464 00000000 c05813d8 00000000 00000024 00000001 c0554f98 c50f7e08
[  300.749193] de80: fa14deb8 c0554858 00000000 00000000 fa14df70 c2875b48 c262bb64 fa14df78
[  300.750934] dea0: c055e5bc 0048fad8 00000002 fa14df78 c41baf28 00000002 fa14df70 c05813c8
[  300.752368] dec0: fa14df70 c055e7c8 00000000 00000000 821e08e6 c41baf00 c055e5bc 0048fad8
[  300.753511] dee0: 00000002 fa14df78 c41baf28 00000004 fa14df70 c0689078 fa14dfa0 c055ea74
[  300.754701] df00: c0689474 c488c200 fa14df3c 00000004 00000002 c488c200 00000004 c0580bb0
[  300.756828] df20: c06b2de8 00000003 00000000 22cd7380 c06b2f48 00000002 00000000 22cc7910
[  300.757388] df40: 00000045 22e24010 00000045 821e08e6 00000001 821e08e6 c41baf00 c41baf00
[  300.757816] df60: 0048fad8 fa14df78 00000002 00000004 fa14dfa0 c0414d54 00000000 00000000
[  300.758218] df80: 00000002 821e08e6 0048fad8 00000002 00000001 00000004 c04003c4 c488c200
[  300.758621] dfa0: 0048f964 c0414d54 0048fad8 00000002 00000001 0048fad8 00000002 00000001
[  300.761518] dfc0: 0048fad8 00000002 00000001 00000004 00000002 7fffffff 0048f4a4 0048f964
[  300.762437] dfe0: 00000004 be8dd5e8 b6eca2d3 b6e3f786 80070030 00000001 00000000 00000000
[  300.765107]  __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[  300.765960]  __kmalloc from tracepoint_probe_unregister+0xfc/0x4c4
[  300.766639]  tracepoint_probe_unregister from unregister_ftrace_graph+0x94/0xa4
[  300.768319]  unregister_ftrace_graph from ftrace_profile_write+0x20c/0x298
[  300.768 309874]  ftrace_profile_write from vfs_write+0x110/0x3c8
[  300.770067]  vfs_write from r
[  300.771490] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.773100] ---[ end trace 0000000000000000 ]---
--- cut here ---
[  300.847414] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.848725] [00000023] *pgd=44279003, *pmd=00000000
[  300.849128] Internal error: Oops: 206 [#7] SMP ARM
[  300.849384] Modules linked in:
[  300.849575] CPU: 0 PID: 1 Comm: systemd Tainted: G      D            6.6.72-rc1 #1
[  300.851737] Hardware name: Generic DT based system
[  300.852669] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.853676] LRKilled is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.854900] pc : [<c065be18>]    lr : [
[  300.856055] sp : f0825d48  ip : 00000000  fp : f0825d80
[  300.857289] r10: 00000dc0  r9 : c3001100  r8 : ffffffff
[  300.858149] r7 : 00000dc0  r6 : edbda1b8  r5 : c47f6680  r4 : 00000028
[  300.858566] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.858848] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.859115] Control: 30c5387d  Table: 432674c0  DAC: fffffffd
[  300.859326] Register r0 information: non-paged memory
[  300.859537] Register r1 information: NULL pointer
[  300.859796] Register r2 information: non-paged memory
[  300.860099] Register r3 information: non-paged memory
[  300.861801] Register r4 information: non-paged memory
[  300.863448] Register r5 information: slab kmalloc-128 start c47f6680 pointer offset 0 size 128
[  300.865409] Register r6 information: non-slab/vmalloc memory
[  300.867051] Register r7 information: non-paged memory
[  300.867489] Register r8 information: non-paged memory
[  300.867785] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.868269] Register r10 information: non-paged memory
[  300.868650] Register r11 information: 2-page vmalloc region starting at 0xf0824000 allocated at copy_process+0x164/0xdd8
[  300.870576] Register r12 information: NULL pointer
[  300.871159] Process systemd (pid: 1, stack limit = 0x1294b5a9)
[  300.871748] Stack: (0xf0825d48 to 0xf0826000)
[  300.872309] 5d40:                   edbdae40 00000dc0 ffffffff c3002900 00000028 c065b9e4
[  300.873247] 5d60: d1de3daa c072dad4 c47f6680 c31bb25c c3001100 00000028 c072dad4 00000dc0
[  300.874212] 5d80: f0825db0 c0609e14 c072dad4 c06bce64 c4170600 c26977e8 c47f6680 c31bb25c
[  300.874882] 5da0: 00000000 c4816600 c4170600 c3e22340 f0825dd8 c072dad4 c3e22340 c3e22340
[  300.876019] 5dc0: c4170600 c417067c 00000041 c4170670 c072d8a4 c4170600 f0825e08 c06862ec
[  300.877213] 5de0: c26b4724 c4170600 f0825e08 c06a0ce0 00020000 f0825e80 00000000 00000041
[  300.878784] 5e00: c26b4724 00020000 f0825e78 c069af80 00000024 c3078658 f0825e70 000000e1
[  300.880504] 5e20: 00000000 c3002b80 f0825ea0 c0568af4 f0825e70 00000024 c3220000 c26a5da0
[  300.881929] 5e40: f0825e50 f0825e88 00000041 c0582128 00000000 c0582128 d1de3daa 00000000
[  300.882893] 5e60: 00000001 f0825e80 c3220000 f0825f40 c3220000 00000142 f0825f38 c069a454
[  300.883776] 5e80: c433eb50 c3c36550 6e32617e 0000000d c4898048 00000000 c33eb3d0 c38e8330
[  300.884810] 5ea0: c3e22340 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[  300.885451] 5ec0: 00000000 00000000 f0825ecc 00000000 00000000 00000000 00000000 00000000
[  300.886328] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c4898000
[  300.887730] 5f00: 00000000 00000002 ffffff9c 00000000 000041ed 00000000 000a0000 d1de3daa
[  300.889007] 5f20: c4898000 ffffff9c 0000000c fffff000 c04003c4 00000142 f0825f68 c0686f14
[  300.890554] 5f40: 00020000 00000000 00000004 00000100 00000001 d1de3daa 00636360 ffffff9c
[  300.892236] 5f60: 00000000 000a0000 f0825fa0 c06870b4 000a0000 00000000 00000000 00000000
[  300.893129] 5f80: 00000000 00000000 f0825fa0 d1de3daa 00636360 000a0000 00000000 00000142
[  300.894227] 5fa0: 00000000 c04003b4 00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[  300.895244] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[  300.896206] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786 00030030 ffffff9c 00000000 00000000
[  300.896851]  __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[  300.897847]  kmalloc_trace from kernfs_fop_open+0x230/0x328
[  300.899025]  kernfs_fop_open from do_dentry_open+0x1e8/0x524
[  300.899882]  do_dentry_open from path_openat+0xa9c/0xc6c
[  300.900421]  path_openat from do_filp_open+0x8c/0x11c
[  300.901201]  do_filp_open from do_sys_openat2+0xa0/0xf0
[  300.902114]  do_sys_openat2 from sys_openat+0x9c/0xb8
[  300.902554]  sys_openat from __sys_trace_return+0x0/0x10
[  300.903545] Exception stack(0xf0825fa8 to 0xf0825ff0)
[  300.904129] 5fa0:                   00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[  300.904999] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[  300.905812] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786
[  300.906118] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.908909] ---[ end trace 0000000000000000 ]---
--- cut here ---
[  296.214251] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  296.222261] [00000023] *pgd=450fc003, *pmd=00000000
[  296.231417] Internal error: Oops: 206 [#2] SMP ARM
[  296.232486] Modules linked in:
[  296.234056] CPU: 0 PID: 380 Comm: cat Tainted: G      D            6.6.72-rc1 #1
[  296.236995] Hardware name: Generic DT based system
[  296.238529] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  296.240509] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  296.242587] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a00d0013
[  296.244609] sp : fa179d40  ip : 015a9a80  fp : fa179d78
[  296.246686] r10: 00000dc0  r9 : c3001100  r8 : ffffffff
[  296.248444] r7 : 00000dc0  r6 : edbda1b8  r5 : c412b640  r4 : 00000010
[  296.250286] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  296.252727] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  296.255372] Control: 30c5387d  Table: 450f7d00  DAC: fffffffd
[  296.257941] Register r0 information: non-paged memory
[  296.259822] Register r1 information: NULL pointer
[  296.261444] Register r2 information: non-paged memory
[  296.263986] Register r3 information: non-paged memory
[  296.266479] Register r4 information: zero-size pointer
[  296.268359] Register r5 information: slab kmalloc-64 start c412b640 pointer offset 0 size 64
[  296.272124] Register r6 information: non-slab/vmalloc memory
[  296.274142] Register r7 information: non-paged memory
[  296.275768] Register r8 information: non-paged memory
[  296.277334] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  296.280529] Register r10 information: non-paged memory
[  296.282014] Register r11 information: 2-page vmalloc region starting at 0xfa178000 allocated at copy_process+0x164/0xdd8
[  296.285282] Register r12 information: non-paged memory
[  296.287727] Process cat (pid: 380, stack limit = 0xd44bc6fc)
[  296.289711] Stack: (0xfa179d40 to 0xfa17a000)
[  296.291216] 9d40: c0577d98 c0577d98 fa179dac 00000000 00000010 bb6785ad bb6785ad c0577d98
[  296.294116] 9d60: c412b640 c055e2d8 c3001100 00000010 c0577d98 00000dc0 fa179da8 c0414d54
[  296.297632] 9d80: c0577d98 bb6785ad c3900510 c4b70008 c412b640 c055e2d8 00000041 c416ea30
[  296.299798] 9da0: c0577cd0 c412b64c edbe1f50 c0414d54 00000044 c416e9c0 c412b650 c3900510
[  296.303388] 9dc0: c416e9c0 c416ea3c 00000041 c416ea30 c0577cd0 c416e9c0 fa179e08 c06862ec
[  296.305623] 9de0: 00000000 c0414d20 fa179e80 c416e9c0 00020000 fa179e80 00000000 00000041
[  296.308525] 9e00: c26b4724 00020000 fa179e78 c0414d54 bb6785ad c069a3f0 00000002 bb6785ad
[  296.310786] 9e20: c069a3f0 c0686f14 fa179f3c ffffff9c fa179f38 c04151ac c4db2100 fa179f40
[  296.312761] 9e40: fa179e50 fa179e88 00000041 00000000 00000000 bb6785ad bb6785ad 00000000
[  296.315952] 9e60: 00000001 fa179e80 c4db2100 fa179f40 c4db2100 00000142 fa179f38 c0414d54
[  296.318837] 9e80: c453ad90 c38e7330 5490dc95 00000009 c489f036 00000000 c33eb3d0 c38e8330
[  296.321258] 9ea0: c3900510 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[  296.323902] 9ec0: 00000000 00000000 fa179ecc 00000000 00000000 00000000 00000000 00000000
[  296.326267] 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c489f000
[  296.328499] 9f00: 00000000 00000002 ffffff9c 00000000 000041e8 00000000 c489f000 bb6785ad
[  296.330706] 9f20: c489f000 ffffff9c 00000003 fffff000 c04003c4 00000142 fa179f68 c0414d54
[  296.333038] 9f40: 00020000 00000000 00000004 00000100 00000001 bb6785ad bedfcd5f ffffff9c
[  296.335098] 9f60: 00000000 00020000 fa179fa0 c0414d54 00020000 00000000 00000000 00000000
[  296.337306] 9f80: 00000000 00000000 bedfcd5f bb6785ad 00020000 00000000 bedfcd5f 00000142
[  296.339376] 9fa0: 00485e38 c0414d54 00020000 00000000 ffffff9c bedfcd5f 00020000 00000000
[  296.342019] 9fc0: 00020000 00000000 bedfcd5f 00000142 00001000 00484834 00020000 00485e38
[  296.344042] 9fe0: 00000142 bedfc970 b6ebbdf7 b6e32786 200d0030 ffffff9c 00000000 00000000
[  296.346688]  __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[  296.348515] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  296.354985] ---[ end trace 0000000000000000 ]---
--- cut here ---
[  300.631961] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.633277] [00000023] *pgd=449a1003, *pmd=00000000
[  300.634761] Internal error: Oops: 206 [#4] SMP ARM
[  300.635210] Modules linked in:
[  300.635482] CPU: 0 PID: 314 Comm: sh Tainted: G      D            6.6.72-rc1 #1
[  300.637139] Hardware name: Generic DT based system
[  300.639824] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.640541] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.640851] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a0000013
[  300.641171] sp : fa0add48  ip : c4696038  fp : fa0add80
[  300.641441] r10: 00000cc0  r9 : c3001100  r8 : ffffffff
[  300.641824] r7 : 00000cc0  r6 : edbda1b8  r5 : c50d8000  r4 : 00000020
[  300.642975] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.643914] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.645003] Control: 30c5387d  Table: 445dd6c0  DAC: fffffffd
[  300.646074] Register r0 information: non-paged memory
[  300.646898] Register r1 information: NULL pointer
[  300.647194] Register r2 information: non-paged memory
[  300.648277] Register r3 information: non-paged memory
[  300.649340] Register r4 information: non-paged memory
[  300.650474] Register r5 information: slab task_struct start c50d8000 pointer offset 0 size 2816
[  300.651797] Register r6 information: non-slab/vmalloc memory
[  300.652116] Register r7 information: non-paged memory
[  300.653327] Register r8 information: non-paged memory
[  300.654048] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.655071] Register r10 information: non-paged memory
[  300.655373] Register r11 information: 2-page vmalloc region starting at 0xfa0ac000 allocated at copy_process+0x164/0xdd8
[  300.656693] Register r12 information: slab mm_struct start c4695e00 pointer offset 568 size 768
[  300.658128] Process sh (pid: 314, stack limit = 0xec2da698)
[  300.659399] Stack: (0xfa0add48 to 0xfa0ae000)
[  300.660616] dd40:                   c3002380 c0454874 c4695e00 c3078658 00000020 c06073e0
[  300.662102] dd60: dc7c6b63 c0420458 c50d8000 00000000 c3001100 00000020 c0420458 00000cc0
[  300.662831] dd80: fa0addb0 c0609e14 c0420458 c4961288 fa0addc0 c4695e00 c50d8000 00000000
[  300.663553] dda0: 00000000 c26276a8 c4695e00 c4695fb8 fa0addd0 c0420458 c4695e00 c50d8000
[  300.664733] ddc0: 00000000 00000000 c26276a8 c50d8000 fa0ade00 c04524a4 c0454874 c4695e00
[  300.666055] dde0: dc7c6b63 00000000 c50d8000 01200000 c330cc00 fa0adf30 c4695e00 c488ee00
[  300.667043] de00: fa0ade88 c045489c 60000093 00000000 c1684c30 00000000 c25d2f90 c49a46d4
[  300.668134] de20: 0000027e c057bb98 a0000013 c4826f40 c488ee00 000007e8 fa0ade48 c1684c30
[  300.669213] de40: c4007700 c45d5500 fa0ade68 c04c5534 a0000013 dc7c6b63 c4007700 c04547f4
[  300.669722] de60: c4007700 00000000 dc7c6b63 00000000 00000000 c488ee00 01200000 fa0adf30
[  300.671158] de80: c50d86f8 00000000 fa0adee8 c0453928 40000000 40000002 c50d865c c488f5d8
[  300.672488] dea0: 00000000 00000000 00000000 c50d8000 00000000 00000000 00000000 00000000
[  300.673784] dec0: 00000000 c32c2978 dc7c6b63 00000000 01200000 fa0adf30 00000000 fa0adf30
[  300.675280] dee0: 00000000 00000078 fa0adf28 c0455504 c25d2f90 c49a46d4 c04003c4 c488ee00
[  300.676123] df00: fa0adf18 c05d0f68 dc7c6b63 01200011 00000000 00000000 00000000 fa0adf30
[  300.677713] df20: 00000000 00000078 fa0adfa0 c0455ad4 01200000 00000000 00000000 b6f7dce8
[  300.678608] df40: 00000000 00000000 00000011 00000000 00000000 00000000 00000000 00000000
[  300.679438] df60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  300.680108] df80: 00000078 dc7c6b63 b6f7dce8 b6f7e180 00000001 00000078 c04003c4 c488ee00
[  300.680862] dfa0: 0043b91c c04003b4 b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[  300.681997] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[  300.683431] dfe0: 00000078 bef955d0 b6ee549f b6e7c786 20000030 01200011 00000000 00000000
[  300.684753]  __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[  300.685484]  kmalloc_trace from pgd_alloc+0x2c/0x1e4
[  300.686451]  pgd_alloc from mm_init+0x114/0x27c
[  300.687090]  mm_init from copy_mm+0x98/0x7c8
[  300.687558]  copy_mm from copy_process+0x618/0xdd8
[  300.688011]  copy_process from kernel_clone+0xa0/0x320
[  300.688394]  kernel_clone from sys_clone+0xa0/0xbc
[  300.689303]  sys_clone from __sys_trace_return+0x0/0x10
[  300.690767] Exception stack(0xfa0adfa8 to 0xfa0adff0)
[  300.691632] dfa0:                   b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[  300.692108] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[  300.692498] dfe0: 00000078 bef955d0 b6ee549f b6e7c786
[  300.693248] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.695600] ---[ end trace 0000000000000000 ]---
--- cut here ---
[  296.924328] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  296.931932] [00000023] *pgd=80000040204003, *pmd=00000000
[  296.940569] Internal error: Oops: 206 [#3] SMP ARM
[  296.941453] Modules linked in:
[  296.943906] CPU: 0 PID: 11 Comm: kworker/u4:0 Tainted: G      D            6.6.72-rc1 #1
[  296.945407] Hardware name: Generic DT based system
[  296.946181] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work
[  296.948809] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  296.949452] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  296.950457] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a0030013
[  296.952819] sp : f0875c10  ip : 033b3d50  fp : f0875c48
[  296.954419] r10: 00000d40  r9 : c3001100  r8 : ffffffff
[  296.956484] r7 : 00000d40  r6 : edbda1b8  r5 : 00000000  r4 : 00000040
[  296.957144] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  296.957892] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  296.960726] Control: 30c5387d  Table: 4491cac0  DAC: fffffffd
[  296.962855] Register r0 information: non-paged memory
[  296.964276] Register r1 information: NULL pointer
[  296.964896] Register r2 information: non-paged memory
[  296.965538] Register r3 information: non-paged memory
[  296.967845] Register r4 information: non-paged memory
[  296.969992] Register r5 information: NULL pointer
[  296.971937] Register r6 information: non-slab/vmalloc memory
[  296.973710] Register r7 information: non-paged memory
[  296.975900] Register r8 information: non-paged memory
[  296.977399] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  296.979819] Register r10 information: non-paged memory
[  296.982087] Register r11 information: 2-page vmalloc region starting at 0xf0874000 allocated at copy_process+0x164/0xdd8
[  296.985556] Register r12 information: non-paged memory
[  296.987650] Process kworker/u4:0 (pid: 11, stack limit = 0x658c46cb)
[  296.989120] Stack: (0xf0875c10 to 0xf0876000)
[  296.990551] 5c00:                                     c073ce34 c073ce34 f0875c7c 00000000
[  296.993262] 5c20: 00000040 987168bd 987168bd 00000d40 00000000 c3001100 00000000 c073ce34
[  296.995144] 5c40: 00000c40 00000040 f0875c78 c0414d54 c073ce34 987168bd c392f768 c392f690
[  296.996517] 5c60: 00000000 000000ee 00000000 00000000 00000c40 00000000 f0875cc8 c0414d54
[  296.999250] 5c80: 00000000 00000000 c0789c48 00000006 00000000 217ed860 00000045 217ff9b0
[  297.001255] 5ca0: 00000000 987168bd c392f768 c385d000 00000013 f0875e78 00000001 f0875d30
[  297.002390] 5cc0: c392f768 00000000 f0875de8 c0414d54 00000013 c057bc64 c3226e00 f0875d24
[  297.005183] 5ce0: c49a46d4 00000000 c057bc64 c3226e00 f0875d24 c49a46d4 00000000 00000000
[  297.007608] 5d00: 0000fc40 c0580bb0 f0875e60 f0875d60 c057bc64 c057bc64 c04ebd28 00000005
[  297.008389] 5d20: c4138000 217d6e10 00000045 217d7560 00000000 00000000 00000000 00000000
[  297.009142] 5d40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  297.010063] 5d60: 00000000 00000000 00030013 00000000 00000000 00000000 00000000 c3226e00
[  297.013180] 5d80: 00000000 00000000 00000000 00000000 c392f750 c0580bb0 f0875e60 f0875df0
[  297.016144] 5da0: c07599b8 c07599b8 c1680a70 00000005 00000000 217b9870 00000045 217c94b0
[  297.018396] 5dc0: 00000045 987168bd 00000013 00000013 f0875e78 00000001 c385d000 c392f768
[  297.019214] 5de0: c385d000 c392f750 f0875e60 c0414d54 c0743df0 c0580ac4 987168bd c0743df0
[  297.021401] 5e00: 00000003 987168bd c0743df0 c0744040 f0875eb4 c4362330 f0875eb0 c04151ac
[  297.023839] 5e20: 00000000 00000000 00000000 000000ee 00000712 00000000 0007a6ed 90000000
[  297.025620] 5e40: 987168bd c392f768 00000000 00000001 00000000 00000000 c206a8c7 c385d000
[  297.028207] 5e60: f0875eb0 c0414d54 00000045 987168bd c073b680 00000003 0007a6ed 00000000
[  297.028990] 5e80: 000000ee 00000001 00000000 00000000 987168bd c387215c 00000000 c385d000
[  297.030673] 5ea0: c4362330 c3872140 00000000 c28eb114 f0875ed8 c0414d54 00001000 f0875ee8
[  297.032865] 5ec0: 00000000 f0875ee8 c3872140 c4054b05 c392f768 c28eb114 f0875f10 c0414d54
[  297.035853] 5ee0: f0875f10 c04745e0 f0875ee8 f0875ee8 987168bd c300c900 c507f2d4 c392f964
[  297.037648] 5f00: c4054b05 c4054b00 c300e600 c4054b78 f0875f58 c0414d54 c1684b38 00000000
[  297.040018] 5f20: 00000000 214f4780 00000045 c300c918 c300c950 c300c92c c4054b05 c300e620
[  297.041153] 5f40: c300e620 c300c92c c300c92c c300e600 c300e620 c300c900 f0875f80 c0414d54
[  297.042522] 5f60: c3226e00 00000040 c32275ec c31c4a94 c31c4a80 c047c598 c300c900 c3226e00
[  297.044957] 5f80: f0875fa8 c048343c c3226e00 c31c4140 c048330c 00000000 00000000 00000000
[  297.047090] 5fa0: 00000000 00000000 00000000 c0400244 00000000 00000000 00000000 00000000
[  297.047856] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  297.048590] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[  297.052157]  __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[  297.054274] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  297.058056] ---[ end trace 0000000000000000 ]---

test log snippet test parser 45

Home

--- cut here ---
[  300.777990] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.779269] [00000023] *pgd=449a5003, *pmd=00000000
[  300.780197] Internal error: Oops: 206 [#6] SMP ARM
[  300.780779] Modules linked in:
[  300.781721] CPU: 0 PID: 383 Comm: sh Tainted: G      D            6.6.72-rc1 #1
[  300.782200] Hardware name: Generic DT based system
[  300.783027] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.783852] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.784526] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a00e0113
[  300.784921] sp : fa175e18  ip : fa175dd8  fp : fa175e50
[  300.785355] r10: 00000cc0  r9 : c3001100  r8 : ffffffff
[  300.786318] r7 : 00000cc0  r6 : edbda1b8  r5 : c4648e00  r4 : 00000019
[  300.787218] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.787626] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.788811] Control: 30c5387d  Table: 4491cac0  DAC: fffffffd
[  300.789717] Register r0 information: non-paged memory
[  300.790875] Register r1 information: NULL pointer
[  300.791457] Register r2 information: non-paged memory
[  300.792298] Register r3 information: non-paged memory
[  300.793596] Register r4 information: non-paged memory
[  300.793970] Register r5 information: slab kmalloc-512 start c4648e00 pointer offset 0 size 512
[  300.795562] Register r6 information: non-slab/vmalloc memory
[  300.796513] Register r7 information: non-paged memory
[  300.797236] Register r8 information: non-paged memory
[  300.798289] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.799426] Register r10 information: non-paged memory
[  300.799808] Register r11 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[  300.800819] Register r12 information: 2-page vmalloc region starting at 0xfa174000 allocated at copy_process+0x164/0xdd8
[  300.801741] Process sh (pid: 383, stack limit = 0x09f7a260)
[  300.802250] Stack: (0xfa175e18 to 0xfa176000)
[  300.802784] 5e00:                                                       00000000 fa175e64
[  300.803608] 5e20: 00000000 00000000 00000019 00000000 96ed0d77 00000cc0 c4648e00 c3001100
[  300.804517] 5e40: 464c457f c06ffc28 00000000 00000019 fa175e80 c0609944 c06ffc28 c40a4000
[  300.805258] 5e60: 00000120 c40a4050 c4648e00 c4648e5c 464c457f fffffff8 00000000 fffff000
[  300.805969] 5e80: fa175f08 c06ffc28 00000100 c41706c0 fa175ee0 c054a794 00000001 00000000
[  300.806895] 5ea0: 00000000 fa175eec 00000000 00000000 00000000 00000000 c41706c0 00000000
[  300.807761] 5ec0: 00000100 00000000 00000000 00000000 00000000 00004004 00000000 c40a4000
[  300.808269] 5ee0: 00000154 00000000 96ed0d77 c26b5fe0 c4648e00 c28e7b90 00000001 c26b13b0
[  300.809353] 5f00: fffffff8 fffffff8 fa175f50 c0694d0c 0000017f 0000017f c50d910c c50d8b00
[  300.809789] 5f20: 00000000 c4648e5c 00000100 00000000 96ed0d77 fffffff9 fffffff2 c4648e00
[  300.810203] 5f40: 004ed7a0 c50d8b00 c4580000 00000014 fa175f80 c06955cc ffffff9c 004eb5b0
[  300.810608] 5f60: 004ed74c 004ed74c 004eb5b0 004ed7a4 0000000b c04003c4 c50d8b00 0000000b
[  300.811043] 5f80: fa175fa0 c06951ec 00000000 c040d06c 004ed7a4 004eb5b0 004e4e4c 0000000b
[  300.814134] 5fa0: 004e8224 c04003b4 004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[  300.815098] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[  300.816859] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68 60070030 004ed7a4 00000000 00000000
[  300.817698]  __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[  300.818821]  __kmalloc from load_elf_binary+0x22c/0xab8
[  300.819751]  load_elf_binary from bprm_execve+0x254/0x598
[  300.820747]  bprm_execve from do_execveat_common+0x2d0/0x324
[  300.821435]  do_execveat_common from sys_execve+0x44/0x4c
[  300.821795]  sys_execve from __sys_trace_return+0x0/0x10
[  300.822564] Exception stack(0xfa175fa8 to 0xfa175ff0)
[  300.823694] 5fa0:                   004ed7a4 004eb5b0 004ed7a4 004eb5b0 004ed74c 00000000
[  300.824750] 5fc0: 004ed7a4 004eb5b0 004e4e4c 0000000b 004e7d54 004e4e4c 004ed74c 004e8224
[  300.825886] 5fe0: 004e7e48 be90274c 004d8c7f b6efca68
[  300.827081] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.828877] ---[ end trace 0000000000000000 ]---

test log snippet test parser 46

Home

--- cut here ---
[  296.924328] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  296.931932] [00000023] *pgd=80000040204003, *pmd=00000000
[  296.940569] Internal error: Oops: 206 [#3] SMP ARM
[  296.941453] Modules linked in:
[  296.943906] CPU: 0 PID: 11 Comm: kworker/u4:0 Tainted: G      D            6.6.72-rc1 #1
[  296.945407] Hardware name: Generic DT based system
[  296.946181] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work
[  296.948809] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  296.949452] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  296.950457] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a0030013
[  296.952819] sp : f0875c10  ip : 033b3d50  fp : f0875c48
[  296.954419] r10: 00000d40  r9 : c3001100  r8 : ffffffff
[  296.956484] r7 : 00000d40  r6 : edbda1b8  r5 : 00000000  r4 : 00000040
[  296.957144] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  296.957892] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  296.960726] Control: 30c5387d  Table: 4491cac0  DAC: fffffffd
[  296.962855] Register r0 information: non-paged memory
[  296.964276] Register r1 information: NULL pointer
[  296.964896] Register r2 information: non-paged memory
[  296.965538] Register r3 information: non-paged memory
[  296.967845] Register r4 information: non-paged memory
[  296.969992] Register r5 information: NULL pointer
[  296.971937] Register r6 information: non-slab/vmalloc memory
[  296.973710] Register r7 information: non-paged memory
[  296.975900] Register r8 information: non-paged memory
[  296.977399] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  296.979819] Register r10 information: non-paged memory
[  296.982087] Register r11 information: 2-page vmalloc region starting at 0xf0874000 allocated at copy_process+0x164/0xdd8
[  296.985556] Register r12 information: non-paged memory
[  296.987650] Process kworker/u4:0 (pid: 11, stack limit = 0x658c46cb)
[  296.989120] Stack: (0xf0875c10 to 0xf0876000)
[  296.990551] 5c00:                                     c073ce34 c073ce34 f0875c7c 00000000
[  296.993262] 5c20: 00000040 987168bd 987168bd 00000d40 00000000 c3001100 00000000 c073ce34
[  296.995144] 5c40: 00000c40 00000040 f0875c78 c0414d54 c073ce34 987168bd c392f768 c392f690
[  296.996517] 5c60: 00000000 000000ee 00000000 00000000 00000c40 00000000 f0875cc8 c0414d54
[  296.999250] 5c80: 00000000 00000000 c0789c48 00000006 00000000 217ed860 00000045 217ff9b0
[  297.001255] 5ca0: 00000000 987168bd c392f768 c385d000 00000013 f0875e78 00000001 f0875d30
[  297.002390] 5cc0: c392f768 00000000 f0875de8 c0414d54 00000013 c057bc64 c3226e00 f0875d24
[  297.005183] 5ce0: c49a46d4 00000000 c057bc64 c3226e00 f0875d24 c49a46d4 00000000 00000000
[  297.007608] 5d00: 0000fc40 c0580bb0 f0875e60 f0875d60 c057bc64 c057bc64 c04ebd28 00000005
[  297.008389] 5d20: c4138000 217d6e10 00000045 217d7560 00000000 00000000 00000000 00000000
[  297.009142] 5d40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  297.010063] 5d60: 00000000 00000000 00030013 00000000 00000000 00000000 00000000 c3226e00
[  297.013180] 5d80: 00000000 00000000 00000000 00000000 c392f750 c0580bb0 f0875e60 f0875df0
[  297.016144] 5da0: c07599b8 c07599b8 c1680a70 00000005 00000000 217b9870 00000045 217c94b0
[  297.018396] 5dc0: 00000045 987168bd 00000013 00000013 f0875e78 00000001 c385d000 c392f768
[  297.019214] 5de0: c385d000 c392f750 f0875e60 c0414d54 c0743df0 c0580ac4 987168bd c0743df0
[  297.021401] 5e00: 00000003 987168bd c0743df0 c0744040 f0875eb4 c4362330 f0875eb0 c04151ac
[  297.023839] 5e20: 00000000 00000000 00000000 000000ee 00000712 00000000 0007a6ed 90000000
[  297.025620] 5e40: 987168bd c392f768 00000000 00000001 00000000 00000000 c206a8c7 c385d000
[  297.028207] 5e60: f0875eb0 c0414d54 00000045 987168bd c073b680 00000003 0007a6ed 00000000
[  297.028990] 5e80: 000000ee 00000001 00000000 00000000 987168bd c387215c 00000000 c385d000
[  297.030673] 5ea0: c4362330 c3872140 00000000 c28eb114 f0875ed8 c0414d54 00001000 f0875ee8
[  297.032865] 5ec0: 00000000 f0875ee8 c3872140 c4054b05 c392f768 c28eb114 f0875f10 c0414d54
[  297.035853] 5ee0: f0875f10 c04745e0 f0875ee8 f0875ee8 987168bd c300c900 c507f2d4 c392f964
[  297.037648] 5f00: c4054b05 c4054b00 c300e600 c4054b78 f0875f58 c0414d54 c1684b38 00000000
[  297.040018] 5f20: 00000000 214f4780 00000045 c300c918 c300c950 c300c92c c4054b05 c300e620
[  297.041153] 5f40: c300e620 c300c92c c300c92c c300e600 c300e620 c300c900 f0875f80 c0414d54
[  297.042522] 5f60: c3226e00 00000040 c32275ec c31c4a94 c31c4a80 c047c598 c300c900 c3226e00
[  297.044957] 5f80: f0875fa8 c048343c c3226e00 c31c4140 c048330c 00000000 00000000 00000000
[  297.047090] 5fa0: 00000000 00000000 00000000 c0400244 00000000 00000000 00000000 00000000
[  297.047856] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  297.048590] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[  297.052157]  __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[  297.054274] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  297.058056] ---[ end trace 0000000000000000 ]---

test log snippet test parser 47

Home

--- cut here ---
[  300.847414] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.848725] [00000023] *pgd=44279003, *pmd=00000000
[  300.849128] Internal error: Oops: 206 [#7] SMP ARM
[  300.849384] Modules linked in:
[  300.849575] CPU: 0 PID: 1 Comm: systemd Tainted: G      D            6.6.72-rc1 #1
[  300.851737] Hardware name: Generic DT based system
[  300.852669] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.853676] LRKilled is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.854900] pc : [<c065be18>]    lr : [
[  300.856055] sp : f0825d48  ip : 00000000  fp : f0825d80
[  300.857289] r10: 00000dc0  r9 : c3001100  r8 : ffffffff
[  300.858149] r7 : 00000dc0  r6 : edbda1b8  r5 : c47f6680  r4 : 00000028
[  300.858566] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.858848] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.859115] Control: 30c5387d  Table: 432674c0  DAC: fffffffd
[  300.859326] Register r0 information: non-paged memory
[  300.859537] Register r1 information: NULL pointer
[  300.859796] Register r2 information: non-paged memory
[  300.860099] Register r3 information: non-paged memory
[  300.861801] Register r4 information: non-paged memory
[  300.863448] Register r5 information: slab kmalloc-128 start c47f6680 pointer offset 0 size 128
[  300.865409] Register r6 information: non-slab/vmalloc memory
[  300.867051] Register r7 information: non-paged memory
[  300.867489] Register r8 information: non-paged memory
[  300.867785] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.868269] Register r10 information: non-paged memory
[  300.868650] Register r11 information: 2-page vmalloc region starting at 0xf0824000 allocated at copy_process+0x164/0xdd8
[  300.870576] Register r12 information: NULL pointer
[  300.871159] Process systemd (pid: 1, stack limit = 0x1294b5a9)
[  300.871748] Stack: (0xf0825d48 to 0xf0826000)
[  300.872309] 5d40:                   edbdae40 00000dc0 ffffffff c3002900 00000028 c065b9e4
[  300.873247] 5d60: d1de3daa c072dad4 c47f6680 c31bb25c c3001100 00000028 c072dad4 00000dc0
[  300.874212] 5d80: f0825db0 c0609e14 c072dad4 c06bce64 c4170600 c26977e8 c47f6680 c31bb25c
[  300.874882] 5da0: 00000000 c4816600 c4170600 c3e22340 f0825dd8 c072dad4 c3e22340 c3e22340
[  300.876019] 5dc0: c4170600 c417067c 00000041 c4170670 c072d8a4 c4170600 f0825e08 c06862ec
[  300.877213] 5de0: c26b4724 c4170600 f0825e08 c06a0ce0 00020000 f0825e80 00000000 00000041
[  300.878784] 5e00: c26b4724 00020000 f0825e78 c069af80 00000024 c3078658 f0825e70 000000e1
[  300.880504] 5e20: 00000000 c3002b80 f0825ea0 c0568af4 f0825e70 00000024 c3220000 c26a5da0
[  300.881929] 5e40: f0825e50 f0825e88 00000041 c0582128 00000000 c0582128 d1de3daa 00000000
[  300.882893] 5e60: 00000001 f0825e80 c3220000 f0825f40 c3220000 00000142 f0825f38 c069a454
[  300.883776] 5e80: c433eb50 c3c36550 6e32617e 0000000d c4898048 00000000 c33eb3d0 c38e8330
[  300.884810] 5ea0: c3e22340 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[  300.885451] 5ec0: 00000000 00000000 f0825ecc 00000000 00000000 00000000 00000000 00000000
[  300.886328] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c4898000
[  300.887730] 5f00: 00000000 00000002 ffffff9c 00000000 000041ed 00000000 000a0000 d1de3daa
[  300.889007] 5f20: c4898000 ffffff9c 0000000c fffff000 c04003c4 00000142 f0825f68 c0686f14
[  300.890554] 5f40: 00020000 00000000 00000004 00000100 00000001 d1de3daa 00636360 ffffff9c
[  300.892236] 5f60: 00000000 000a0000 f0825fa0 c06870b4 000a0000 00000000 00000000 00000000
[  300.893129] 5f80: 00000000 00000000 f0825fa0 d1de3daa 00636360 000a0000 00000000 00000142
[  300.894227] 5fa0: 00000000 c04003b4 00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[  300.895244] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[  300.896206] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786 00030030 ffffff9c 00000000 00000000
[  300.896851]  __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[  300.897847]  kmalloc_trace from kernfs_fop_open+0x230/0x328
[  300.899025]  kernfs_fop_open from do_dentry_open+0x1e8/0x524
[  300.899882]  do_dentry_open from path_openat+0xa9c/0xc6c
[  300.900421]  path_openat from do_filp_open+0x8c/0x11c
[  300.901201]  do_filp_open from do_sys_openat2+0xa0/0xf0
[  300.902114]  do_sys_openat2 from sys_openat+0x9c/0xb8
[  300.902554]  sys_openat from __sys_trace_return+0x0/0x10
[  300.903545] Exception stack(0xf0825fa8 to 0xf0825ff0)
[  300.904129] 5fa0:                   00636360 000a0000 ffffff9c 00636360 000a0000 00000000
[  300.904999] 5fc0: 00636360 000a0000 00000000 00000142 00634648 b6d73258 bed7d710 00000000
[  300.905812] 5fe0: 00000142 bed7d5a8 b6a7ad0b b69f1786
[  300.906118] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.908909] ---[ end trace 0000000000000000 ]---

test log snippet test parser 48

Home

--- cut here ---
[  300.713684] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.715596] [00000023] *pgd=450af003, *pmd=00000000
[  300.717405] Internal error: Oops: 206 [#5] SMP ARM
[  300.718197] Modules linked in:
[  300.719170] CPU: 0 PID: 326 Comm: sh Tainted: G      D            6.6.72-rc1 #1
[  300.720596] Hardware name: Generic DT based system
[  300.721740] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.722608] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.722981] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a00e0013
[  300.723305] sp : fa14de18  ip : 00000000  fp : fa14de50
[  300.723582] r10: 00000cc0  r9 : c3001100  r8 : ffffffff
[  300.724437] r7 : 00000cc0  r6 : edbda1b8  r5 : c05813d8  r4 : 0000002c
[  300.725253] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.727692] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.728936] Control: 30c5387d  Table: 450a5600  DAC: fffffffd
[  300.729289] Register r0 information: non-paged memory
[  300.729688] Register r1 information: NULL pointer
[  300.729957] Register r2 information: non-paged memory
[  300.730240] Register r3 information: non-paged memory
[  300.730524] Register r4 information: non-paged memory
[  300.732037] Register r5 information: non-slab/vmalloc memory
[  300.733742] Register r6 information: non-slab/vmalloc memory
[  300.734742] Register r7 information: non-paged memory
[  300.736337] Register r8 information: non-paged memory
[  300.737440] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.739334] Register r10 information: non-paged memory
[  300.740502] Register r11 information: 2-page vmalloc region starting at 0xfa14c000 allocated at copy_process+0x164/0xdd8
[  300.742421] Register r12 information: NULL pointer
[  300.742972] Process sh (pid: 326, stack limit = 0x1f6003ab)
[  300.744498] Stack: (0xfa14de18 to 0xfa14e000)
[  300.745292] de00:                                                       0000000c c31421f8
[  300.746040] de20: fa14de78 0000002c 0000002c 00000002 821e08e6 00000cc0 c05813d8 c3001100
[  300.746454] de40: 00000024 c0554858 c0554f98 0000002c fa14de80 c0609944 c0554858 fa14df78
[  300.748173] de60: c0581464 00000000 c05813d8 00000000 00000024 00000001 c0554f98 c50f7e08
[  300.749193] de80: fa14deb8 c0554858 00000000 00000000 fa14df70 c2875b48 c262bb64 fa14df78
[  300.750934] dea0: c055e5bc 0048fad8 00000002 fa14df78 c41baf28 00000002 fa14df70 c05813c8
[  300.752368] dec0: fa14df70 c055e7c8 00000000 00000000 821e08e6 c41baf00 c055e5bc 0048fad8
[  300.753511] dee0: 00000002 fa14df78 c41baf28 00000004 fa14df70 c0689078 fa14dfa0 c055ea74
[  300.754701] df00: c0689474 c488c200 fa14df3c 00000004 00000002 c488c200 00000004 c0580bb0
[  300.756828] df20: c06b2de8 00000003 00000000 22cd7380 c06b2f48 00000002 00000000 22cc7910
[  300.757388] df40: 00000045 22e24010 00000045 821e08e6 00000001 821e08e6 c41baf00 c41baf00
[  300.757816] df60: 0048fad8 fa14df78 00000002 00000004 fa14dfa0 c0414d54 00000000 00000000
[  300.758218] df80: 00000002 821e08e6 0048fad8 00000002 00000001 00000004 c04003c4 c488c200
[  300.758621] dfa0: 0048f964 c0414d54 0048fad8 00000002 00000001 0048fad8 00000002 00000001
[  300.761518] dfc0: 0048fad8 00000002 00000001 00000004 00000002 7fffffff 0048f4a4 0048f964
[  300.762437] dfe0: 00000004 be8dd5e8 b6eca2d3 b6e3f786 80070030 00000001 00000000 00000000
[  300.765107]  __kmem_cache_alloc_node from __kmalloc+0xa8/0x1ac
[  300.765960]  __kmalloc from tracepoint_probe_unregister+0xfc/0x4c4
[  300.766639]  tracepoint_probe_unregister from unregister_ftrace_graph+0x94/0xa4
[  300.768319]  unregister_ftrace_graph from ftrace_profile_write+0x20c/0x298
[  300.768 309874]  ftrace_profile_write from vfs_write+0x110/0x3c8
[  300.770067]  vfs_write from r
[  300.771490] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.773100] ---[ end trace 0000000000000000 ]---

test log snippet test parser 49

Home

--- cut here ---
[  295.936571] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  295.944045] [00000023] *pgd=450a8003, *pmd=00000000
[  295.955367] Internal error: Oops: 206 [#1] SMP ARM
[  295.957497] Modules linked in:
[  295.960606] CPU: 0 PID: 327 Comm: sh Not tainted 6.6.72-rc1 #1
[  295.962070] Hardware name: Generic DT based system
[  295.964444] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  295.967880] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  295.969249] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a0070013
[  295.970737] sp : fa151df8  ip : 00e5eab0  fp : fa151e30
[  295.972193] r10: 00004dc0  r9 : c3001100  r8 : 00000000
[  295.973873] r7 : 00004dc0  r6 : edbda1b8  r5 : 00000040  r4 : 00000040
[  295.976243] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  295.978880] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  295.981204] Control: 30c5387d  Table: 450a5700  DAC: fffffffd
[  295.983114] Register r0 information: non-paged memory
[  295.986132] Register r1 information: NULL pointer
[  295.988088] Register r2 information: non-paged memory
[  295.990154] Register r3 information: non-paged memory
[  295.991119] Register r4 information: non-paged memory
[  295.993524] Register r5 information: non-paged memory
[  295.995627] Register r6 information: non-slab/vmalloc memory
[  295.997953] Register r7 information: non-paged memory
[  295.999629] Register r8 information: NULL pointer
[  296.001517] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  296.005304] Register r10 information: non-paged memory
[  296.006946] Register r11 information: 2-page vmalloc region starting at 0xfa150000 allocated at copy_process+0x164/0xdd8
[  296.010173] Register r12 information: non-paged memory
[  296.012114] Process sh (pid: 327, stack limit = 0xa30dea75)
[  296.014136] Stack: (0xfa151df8 to 0xfa152000)
[  296.016382] 1de0:                                                       c056079c c056079c
[  296.019033] 1e00: fa151e64 00000000 00000040 6b777109 6b777109 c3001100 00000040 00004dc0
[  296.021525] 1e20: c056079c 00000000 c056079c 00000000 fa151e60 c0414d54 c056079c 6b777109
[  296.024207] 1e40: 000000bb 000000ba c5098700 c4888000 c4687300 c207b5c4 c300e2d8 00000000
[  296.026694] 1e60: c300c098 c0414d54 00000000 000000f7 c300c090 00000000 fa151f78 c300c08c
[  296.030341] 1e80: c300c080 c0560434 00000044 6b777109 c26985c0 c26985c0 ffffffff 000f6000
[  296.033312] 1ea0: 000f6000 fa151f78 c416e928 00000004 fa151f70 c056be48 00000004 00000000
[  296.036630] 1ec0: c26985c0 000f6000 fa151f78 c416e928 fa151f70 c0570e14 000f6000 6b777109
[  296.039570] 1ee0: c416e900 c0570d70 00483c20 00000004 fa151f78 c0689078 fa151fa0 c055ea74
[  296.041923] 1f00: c0689474 c4888000 fa151f3c 00000004 00000004 c4888000 00000004 c0580bb0
[  296.044264] 1f20: c06b2de8 00000003 00000000 e1246ea0 c06b2f48 00000002 00000000 e1232d50
[  296.046259] 1f40: 00000044 e126ec30 00000044 6b777109 00000001 6b777109 c416e900 c416e900
[  296.048791] 1f60: 00483c20 fa151f78 00000004 00000004 fa151fa0 c0414d54 00000000 00000000
[  296.050843] 1f80: 00000004 6b777109 00483c20 00000004 00000001 00000004 c04003c4 c4888000
[  296.053215] 1fa0: 0048393c c0414d54 00483c20 00000004 00000001 00483c20 00000004 00000001
[  296.056440] 1fc0: 00483c20 00000004 00000001 00000004 00000004 7fffffff 00483584 0048393c
[  296.058930] 1fe0: 00000004 be9685e8 b6f082d3 b6e7d786 80070030 00000001 00000000 00000000
[  296.061621]  __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[  296.064515] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  296.071693] ---[ end trace 0000000000000000 ]---

test log snippet test parser 50

Home

--- cut here ---
[  300.631961] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  300.633277] [00000023] *pgd=449a1003, *pmd=00000000
[  300.634761] Internal error: Oops: 206 [#4] SMP ARM
[  300.635210] Modules linked in:
[  300.635482] CPU: 0 PID: 314 Comm: sh Tainted: G      D            6.6.72-rc1 #1
[  300.637139] Hardware name: Generic DT based system
[  300.639824] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  300.640541] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  300.640851] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a0000013
[  300.641171] sp : fa0add48  ip : c4696038  fp : fa0add80
[  300.641441] r10: 00000cc0  r9 : c3001100  r8 : ffffffff
[  300.641824] r7 : 00000cc0  r6 : edbda1b8  r5 : c50d8000  r4 : 00000020
[  300.642975] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  300.643914] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  300.645003] Control: 30c5387d  Table: 445dd6c0  DAC: fffffffd
[  300.646074] Register r0 information: non-paged memory
[  300.646898] Register r1 information: NULL pointer
[  300.647194] Register r2 information: non-paged memory
[  300.648277] Register r3 information: non-paged memory
[  300.649340] Register r4 information: non-paged memory
[  300.650474] Register r5 information: slab task_struct start c50d8000 pointer offset 0 size 2816
[  300.651797] Register r6 information: non-slab/vmalloc memory
[  300.652116] Register r7 information: non-paged memory
[  300.653327] Register r8 information: non-paged memory
[  300.654048] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  300.655071] Register r10 information: non-paged memory
[  300.655373] Register r11 information: 2-page vmalloc region starting at 0xfa0ac000 allocated at copy_process+0x164/0xdd8
[  300.656693] Register r12 information: slab mm_struct start c4695e00 pointer offset 568 size 768
[  300.658128] Process sh (pid: 314, stack limit = 0xec2da698)
[  300.659399] Stack: (0xfa0add48 to 0xfa0ae000)
[  300.660616] dd40:                   c3002380 c0454874 c4695e00 c3078658 00000020 c06073e0
[  300.662102] dd60: dc7c6b63 c0420458 c50d8000 00000000 c3001100 00000020 c0420458 00000cc0
[  300.662831] dd80: fa0addb0 c0609e14 c0420458 c4961288 fa0addc0 c4695e00 c50d8000 00000000
[  300.663553] dda0: 00000000 c26276a8 c4695e00 c4695fb8 fa0addd0 c0420458 c4695e00 c50d8000
[  300.664733] ddc0: 00000000 00000000 c26276a8 c50d8000 fa0ade00 c04524a4 c0454874 c4695e00
[  300.666055] dde0: dc7c6b63 00000000 c50d8000 01200000 c330cc00 fa0adf30 c4695e00 c488ee00
[  300.667043] de00: fa0ade88 c045489c 60000093 00000000 c1684c30 00000000 c25d2f90 c49a46d4
[  300.668134] de20: 0000027e c057bb98 a0000013 c4826f40 c488ee00 000007e8 fa0ade48 c1684c30
[  300.669213] de40: c4007700 c45d5500 fa0ade68 c04c5534 a0000013 dc7c6b63 c4007700 c04547f4
[  300.669722] de60: c4007700 00000000 dc7c6b63 00000000 00000000 c488ee00 01200000 fa0adf30
[  300.671158] de80: c50d86f8 00000000 fa0adee8 c0453928 40000000 40000002 c50d865c c488f5d8
[  300.672488] dea0: 00000000 00000000 00000000 c50d8000 00000000 00000000 00000000 00000000
[  300.673784] dec0: 00000000 c32c2978 dc7c6b63 00000000 01200000 fa0adf30 00000000 fa0adf30
[  300.675280] dee0: 00000000 00000078 fa0adf28 c0455504 c25d2f90 c49a46d4 c04003c4 c488ee00
[  300.676123] df00: fa0adf18 c05d0f68 dc7c6b63 01200011 00000000 00000000 00000000 fa0adf30
[  300.677713] df20: 00000000 00000078 fa0adfa0 c0455ad4 01200000 00000000 00000000 b6f7dce8
[  300.678608] df40: 00000000 00000000 00000011 00000000 00000000 00000000 00000000 00000000
[  300.679438] df60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  300.680108] df80: 00000078 dc7c6b63 b6f7dce8 b6f7e180 00000001 00000078 c04003c4 c488ee00
[  300.680862] dfa0: 0043b91c c04003b4 b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[  300.681997] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[  300.683431] dfe0: 00000078 bef955d0 b6ee549f b6e7c786 20000030 01200011 00000000 00000000
[  300.684753]  __kmem_cache_alloc_node from kmalloc_trace+0x40/0xcc
[  300.685484]  kmalloc_trace from pgd_alloc+0x2c/0x1e4
[  300.686451]  pgd_alloc from mm_init+0x114/0x27c
[  300.687090]  mm_init from copy_mm+0x98/0x7c8
[  300.687558]  copy_mm from copy_process+0x618/0xdd8
[  300.688011]  copy_process from kernel_clone+0xa0/0x320
[  300.688394]  kernel_clone from sys_clone+0xa0/0xbc
[  300.689303]  sys_clone from __sys_trace_return+0x0/0x10
[  300.690767] Exception stack(0xfa0adfa8 to 0xfa0adff0)
[  300.691632] dfa0:                   b6f7dce8 b6f7e180 01200011 00000000 00000000 00000000
[  300.692108] dfc0: b6f7dce8 b6f7e180 00000001 00000078 00000007 bef95718 004341f0 0043b91c
[  300.692498] dfe0: 00000078 bef955d0 b6ee549f b6e7c786
[  300.693248] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  300.695600] ---[ end trace 0000000000000000 ]---

test log snippet test parser 51

Home

--- cut here ---
[  296.214251] Unable to handle kernel NULL pointer dereference at virtual address 00000023 when read
[  296.222261] [00000023] *pgd=450fc003, *pmd=00000000
[  296.231417] Internal error: Oops: 206 [#2] SMP ARM
[  296.232486] Modules linked in:
[  296.234056] CPU: 0 PID: 380 Comm: cat Tainted: G      D            6.6.72-rc1 #1
[  296.236995] Hardware name: Generic DT based system
[  296.238529] PC is at __kmem_cache_alloc_node+0x130/0x2cc
[  296.240509] LR is at __kmem_cache_alloc_node+0x4c/0x2cc
[  296.242587] pc : [<c065be18>]    lr : [<c065bd34>]    psr: a00d0013
[  296.244609] sp : fa179d40  ip : 015a9a80  fp : fa179d78
[  296.246686] r10: 00000dc0  r9 : c3001100  r8 : ffffffff
[  296.248444] r7 : 00000dc0  r6 : edbda1b8  r5 : c412b640  r4 : 00000010
[  296.250286] r3 : 00000020  r2 : 0000ac87  r1 : 00000000  r0 : 00000003
[  296.252727] Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  296.255372] Control: 30c5387d  Table: 450f7d00  DAC: fffffffd
[  296.257941] Register r0 information: non-paged memory
[  296.259822] Register r1 information: NULL pointer
[  296.261444] Register r2 information: non-paged memory
[  296.263986] Register r3 information: non-paged memory
[  296.266479] Register r4 information: zero-size pointer
[  296.268359] Register r5 information: slab kmalloc-64 start c412b640 pointer offset 0 size 64
[  296.272124] Register r6 information: non-slab/vmalloc memory
[  296.274142] Register r7 information: non-paged memory
[  296.275768] Register r8 information: non-paged memory
[  296.277334] Register r9 information: slab kmem_cache start c3001100 pointer offset 0 size 124
[  296.280529] Register r10 information: non-paged memory
[  296.282014] Register r11 information: 2-page vmalloc region starting at 0xfa178000 allocated at copy_process+0x164/0xdd8
[  296.285282] Register r12 information: non-paged memory
[  296.287727] Process cat (pid: 380, stack limit = 0xd44bc6fc)
[  296.289711] Stack: (0xfa179d40 to 0xfa17a000)
[  296.291216] 9d40: c0577d98 c0577d98 fa179dac 00000000 00000010 bb6785ad bb6785ad c0577d98
[  296.294116] 9d60: c412b640 c055e2d8 c3001100 00000010 c0577d98 00000dc0 fa179da8 c0414d54
[  296.297632] 9d80: c0577d98 bb6785ad c3900510 c4b70008 c412b640 c055e2d8 00000041 c416ea30
[  296.299798] 9da0: c0577cd0 c412b64c edbe1f50 c0414d54 00000044 c416e9c0 c412b650 c3900510
[  296.303388] 9dc0: c416e9c0 c416ea3c 00000041 c416ea30 c0577cd0 c416e9c0 fa179e08 c06862ec
[  296.305623] 9de0: 00000000 c0414d20 fa179e80 c416e9c0 00020000 fa179e80 00000000 00000041
[  296.308525] 9e00: c26b4724 00020000 fa179e78 c0414d54 bb6785ad c069a3f0 00000002 bb6785ad
[  296.310786] 9e20: c069a3f0 c0686f14 fa179f3c ffffff9c fa179f38 c04151ac c4db2100 fa179f40
[  296.312761] 9e40: fa179e50 fa179e88 00000041 00000000 00000000 bb6785ad bb6785ad 00000000
[  296.315952] 9e60: 00000001 fa179e80 c4db2100 fa179f40 c4db2100 00000142 fa179f38 c0414d54
[  296.318837] 9e80: c453ad90 c38e7330 5490dc95 00000009 c489f036 00000000 c33eb3d0 c38e8330
[  296.321258] 9ea0: c3900510 00000101 00000002 00000000 00000000 00000b84 00001244 00000000
[  296.323902] 9ec0: 00000000 00000000 fa179ecc 00000000 00000000 00000000 00000000 00000000
[  296.326267] 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c489f000
[  296.328499] 9f00: 00000000 00000002 ffffff9c 00000000 000041e8 00000000 c489f000 bb6785ad
[  296.330706] 9f20: c489f000 ffffff9c 00000003 fffff000 c04003c4 00000142 fa179f68 c0414d54
[  296.333038] 9f40: 00020000 00000000 00000004 00000100 00000001 bb6785ad bedfcd5f ffffff9c
[  296.335098] 9f60: 00000000 00020000 fa179fa0 c0414d54 00020000 00000000 00000000 00000000
[  296.337306] 9f80: 00000000 00000000 bedfcd5f bb6785ad 00020000 00000000 bedfcd5f 00000142
[  296.339376] 9fa0: 00485e38 c0414d54 00020000 00000000 ffffff9c bedfcd5f 00020000 00000000
[  296.342019] 9fc0: 00020000 00000000 bedfcd5f 00000142 00001000 00484834 00020000 00485e38
[  296.344042] 9fe0: 00000142 bedfc970 b6ebbdf7 b6e32786 200d0030 ffffff9c 00000000 00000000
[  296.346688]  __kmem_cache_alloc_node from return_to_handler+0x0/0x18
[  296.348515] Code: 15963008 13530000 0a000034 e599301c (e7936000) 
[  296.354985] ---[ end trace 0000000000000000 ]---

test log snippet test parser 52

Home

[  300.910357] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[  300.911353] CPU1: stopping
[  300.911521] CPU: 1 PID: 263 Comm: kirk Tainted: G      D            6.6.72-rc1 #1
[  300.911555] Hardware name: Generic DT based system
[  300.911637]  unwind_backtrace from show_stack+0x28/0x2c
[  300.911712]  show_stack from dump_stack_lvl+0x60/0x78
[  300.911749]  dump_stack_lvl from do_handle_IPI+0x1d4/0x1f0
[  300.911778]  do_handle_IPI from ipi_handler+0x28/0x30
[  300.911807]  ipi_handler from handle_percpu_devid_irq+0xcc/0x1c4
[  300.911841]  handle_percpu_devid_irq from generic_handle_domain_irq+0x44/0x54
[  300.911872]  generic_handle_domain_irq from gic_handle_irq+0x58/0xd4
[  300.911899]  gic_handle_irq from generic_handle_arch_irq+0x30/0x40
[  300.911926]  generic_handle_arch_irq from call_with_stack+0x18/0x20
[  300.911988]  call_with_stack from __irq_usr+0x70/0x80
[  300.912015] Exception stack(0xfa0a1fb0 to 0xfa0a1ff8)
[  300.912041] 1fa0:                                     80000000 b64d27c8 0048f9d8 b6341197
[  300.912066] 1fc0: b6b70988 b62fe168 b6b7098a b6edf470 005710c0 00000049 00000000 b6edf4a0
[  300.912087] 1fe0: 00541a70 beb39020 00000001 0010cece 200f0030 ffffffff
[  300.927534] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---

test log snippet test parser 53

Home

[  300.910357] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[  300.911353] CPU1: stopping
[  300.911521] CPU: 1 PID: 263 Comm: kirk Tainted: G      D            6.6.72-rc1 #1
[  300.911555] Hardware name: Generic DT based system
[  300.911637]  unwind_backtrace from show_stack+0x28/0x2c
[  300.911712]  show_stack from dump_stack_lvl+0x60/0x78
[  300.911749]  dump_stack_lvl from do_handle_IPI+0x1d4/0x1f0
[  300.911778]  do_handle_IPI from ipi_handler+0x28/0x30
[  300.911807]  ipi_handler from handle_percpu_devid_irq+0xcc/0x1c4
[  300.911841]  handle_percpu_devid_irq from generic_handle_domain_irq+0x44/0x54
[  300.911872]  generic_handle_domain_irq from gic_handle_irq+0x58/0xd4
[  300.911899]  gic_handle_irq from generic_handle_arch_irq+0x30/0x40
[  300.911926]  generic_handle_arch_irq from call_with_stack+0x18/0x20
[  300.911988]  call_with_stack from __irq_usr+0x70/0x80
[  300.912015] Exception stack(0xfa0a1fb0 to 0xfa0a1ff8)
[  300.912041] 1fa0:                                     80000000 b64d27c8 0048f9d8 b6341197
[  300.912066] 1fc0: b6b70988 b62fe168 b6b7098a b6edf470 005710c0 00000049 00000000 b6edf4a0
[  300.912087] 1fe0: 00541a70 beb39020 00000001 0010cece 200f0030 ffffffff
[  300.927534] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---

test log snippet test parser 54

Home

[  141.896590] ==================================================================
[  141.897747] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[  141.898789] Read of size 1 at addr fa08bd3f by task kunit_try_catch/181
[  141.899527] 
[  141.899749] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.900708] Hardware name: Generic DT based system
[  141.901319]  unwind_backtrace from show_stack+0x18/0x1c
[  141.902209]  show_stack from dump_stack_lvl+0x58/0x70
[  141.902902]  dump_stack_lvl from print_report+0x164/0x51c
[  141.903606]  print_report from kasan_report+0xc8/0x104
[  141.904400]  kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[  141.905206]  kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[  141.906160]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.907167]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.908156]  kthread from ret_from_fork+0x14/0x30
[  141.908786] Exception stack(0xfa08bfb0 to 0xfa08bff8)
[  141.909402] bfa0:                                     00000000 00000000 00000000 00000000
[  141.910489] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.911759] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.912492] 
[  141.912737] The buggy address belongs to stack of task kunit_try_catch/181
[  141.913488] 
[  141.913733] The buggy address belongs to the virtual mapping at
[  141.913733]  [fa088000, fa08d000) created by:
[  141.913733]  kernel_clone+0xcc/0x4b0
[  141.915319] 
[  141.915603] The buggy address belongs to the physical page:
[  141.916150] page:1138d978 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc86
[  141.917115] flags: 0x80000000(zone=2)
[  141.917659] page_type: 0xffffffff()
[  141.918140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  141.919058] raw: 00000000
[  141.919384] page dumped because: kasan: bad access detected
[  141.920117] 
[  141.920363] Memory state around the buggy address:
[  141.921005]  fa08bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.921636]  fa08bc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.922463] >fa08bd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  141.923142]                                 ^
[  141.923772]  fa08bd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  141.924478]  fa08be00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.925236] ==================================================================

test log snippet test parser 55

Home

[  141.896590] ==================================================================
[  141.897747] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[  141.898789] Read of size 1 at addr fa08bd3f by task kunit_try_catch/181
[  141.899527] 
[  141.899749] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.900708] Hardware name: Generic DT based system
[  141.901319]  unwind_backtrace from show_stack+0x18/0x1c
[  141.902209]  show_stack from dump_stack_lvl+0x58/0x70
[  141.902902]  dump_stack_lvl from print_report+0x164/0x51c
[  141.903606]  print_report from kasan_report+0xc8/0x104
[  141.904400]  kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[  141.905206]  kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[  141.906160]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.907167]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.908156]  kthread from ret_from_fork+0x14/0x30
[  141.908786] Exception stack(0xfa08bfb0 to 0xfa08bff8)
[  141.909402] bfa0:                                     00000000 00000000 00000000 00000000
[  141.910489] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.911759] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.912492] 
[  141.912737] The buggy address belongs to stack of task kunit_try_catch/181
[  141.913488] 
[  141.913733] The buggy address belongs to the virtual mapping at
[  141.913733]  [fa088000, fa08d000) created by:
[  141.913733]  kernel_clone+0xcc/0x4b0
[  141.915319] 
[  141.915603] The buggy address belongs to the physical page:
[  141.916150] page:1138d978 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc86
[  141.917115] flags: 0x80000000(zone=2)
[  141.917659] page_type: 0xffffffff()
[  141.918140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  141.919058] raw: 00000000
[  141.919384] page dumped because: kasan: bad access detected
[  141.920117] 
[  141.920363] Memory state around the buggy address:
[  141.921005]  fa08bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.921636]  fa08bc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.922463] >fa08bd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  141.923142]                                 ^
[  141.923772]  fa08bd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  141.924478]  fa08be00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.925236] ==================================================================

test log snippet test parser 56

Home

[  141.933318] ==================================================================
[  141.934346] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1dc
[  141.935062] Read of size 1 at addr fa093d4a by task kunit_try_catch/183
[  141.935734] 
[  141.935971] CPU: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.936891] Hardware name: Generic DT based system
[  141.937859]  unwind_backtrace from show_stack+0x18/0x1c
[  141.939224]  show_stack from dump_stack_lvl+0x58/0x70
[  141.940239]  dump_stack_lvl from print_report+0x164/0x51c
[  141.940945]  print_report from kasan_report+0xc8/0x104
[  141.941671]  kasan_report from kasan_alloca_oob_right+0xfc/0x1dc
[  141.942546]  kasan_alloca_oob_right from kunit_try_run_case+0x11c/0x2e4
[  141.943388]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.944316]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.945149]  kthread from ret_from_fork+0x14/0x30
[  141.945741] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  141.946322] 3fa0:                                     00000000 00000000 00000000 00000000
[  141.947443] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.948433] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.949043] 
[  141.949331] The buggy address belongs to stack of task kunit_try_catch/183
[  141.949977] 
[  141.950351] The buggy address belongs to the virtual mapping at
[  141.950351]  [fa090000, fa095000) created by:
[  141.950351]  kernel_clone+0xcc/0x4b0
[  141.951778] 
[  141.952077] The buggy address belongs to the physical page:
[  141.952622] page:7d160432 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc8a
[  141.953617] flags: 0x80000000(zone=2)
[  141.954065] page_type: 0xffffffff()
[  141.954667] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  141.955522] raw: 00000000
[  141.955849] page dumped because: kasan: bad access detected
[  141.956625] 
[  141.956870] Memory state around the buggy address:
[  141.957878]  fa093c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.958885]  fa093c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.959637] >fa093d00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  141.960600]                                       ^
[  141.961396]  fa093d80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  141.962330]  fa093e00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.963021] ==================================================================

test log snippet test parser 57

Home

[  141.933318] ==================================================================
[  141.934346] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1dc
[  141.935062] Read of size 1 at addr fa093d4a by task kunit_try_catch/183
[  141.935734] 
[  141.935971] CPU: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.936891] Hardware name: Generic DT based system
[  141.937859]  unwind_backtrace from show_stack+0x18/0x1c
[  141.939224]  show_stack from dump_stack_lvl+0x58/0x70
[  141.940239]  dump_stack_lvl from print_report+0x164/0x51c
[  141.940945]  print_report from kasan_report+0xc8/0x104
[  141.941671]  kasan_report from kasan_alloca_oob_right+0xfc/0x1dc
[  141.942546]  kasan_alloca_oob_right from kunit_try_run_case+0x11c/0x2e4
[  141.943388]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.944316]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.945149]  kthread from ret_from_fork+0x14/0x30
[  141.945741] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  141.946322] 3fa0:                                     00000000 00000000 00000000 00000000
[  141.947443] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.948433] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.949043] 
[  141.949331] The buggy address belongs to stack of task kunit_try_catch/183
[  141.949977] 
[  141.950351] The buggy address belongs to the virtual mapping at
[  141.950351]  [fa090000, fa095000) created by:
[  141.950351]  kernel_clone+0xcc/0x4b0
[  141.951778] 
[  141.952077] The buggy address belongs to the physical page:
[  141.952622] page:7d160432 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc8a
[  141.953617] flags: 0x80000000(zone=2)
[  141.954065] page_type: 0xffffffff()
[  141.954667] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  141.955522] raw: 00000000
[  141.955849] page dumped because: kasan: bad access detected
[  141.956625] 
[  141.956870] Memory state around the buggy address:
[  141.957878]  fa093c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.958885]  fa093c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.959637] >fa093d00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  141.960600]                                       ^
[  141.961396]  fa093d80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  141.962330]  fa093e00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.963021] ==================================================================

test log snippet test parser 58

Home

[  143.202190] ==================================================================
[  143.202890] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd0/0x1cc
[  143.203741] Free of addr c8fe9a80 by task kunit_try_catch/205
[  143.204345] 
[  143.204593] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.205458] Hardware name: Generic DT based system
[  143.206047]  unwind_backtrace from show_stack+0x18/0x1c
[  143.206878]  show_stack from dump_stack_lvl+0x58/0x70
[  143.207965]  dump_stack_lvl from print_report+0x164/0x51c
[  143.208697]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  143.209544]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  143.210413]  __kasan_slab_free from __kmem_cache_free+0x140/0x2a8
[  143.211461]  __kmem_cache_free from kmalloc_double_kzfree+0xd0/0x1cc
[  143.212371]  kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[  143.213330]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.214429]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.215266]  kthread from ret_from_fork+0x14/0x30
[  143.215837] Exception stack(0xfa103fb0 to 0xfa103ff8)
[  143.216432] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.217607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.218436] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.219271] 
[  143.219620] Allocated by task 205:
[  143.220214]  kasan_set_track+0x3c/0x5c
[  143.220927]  __kasan_kmalloc+0x8c/0x94
[  143.221371]  kmalloc_double_kzfree+0xa0/0x1cc
[  143.222282]  kunit_try_run_case+0x11c/0x2e4
[  143.222847]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.223616]  kthread+0x184/0x1a8
[  143.223991]  ret_from_fork+0x14/0x30
[  143.224580] 
[  143.224897] Freed by task 205:
[  143.225416]  kasan_set_track+0x3c/0x5c
[  143.226225]  kasan_save_free_info+0x30/0x3c
[  143.226735]  __kasan_slab_free+0xdc/0x124
[  143.227896]  __kmem_cache_free+0x140/0x2a8
[  143.228537]  kmalloc_double_kzfree+0xbc/0x1cc
[  143.229255]  kunit_try_run_case+0x11c/0x2e4
[  143.229944]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.230703]  kthread+0x184/0x1a8
[  143.231220]  ret_from_fork+0x14/0x30
[  143.231786] 
[  143.232110] The buggy address belongs to the object at c8fe9a80
[  143.232110]  which belongs to the cache kmalloc-64 of size 64
[  143.233537] The buggy address is located 0 bytes inside of
[  143.233537]  64-byte region [c8fe9a80, c8fe9ac0)
[  143.234734] 
[  143.234974] The buggy address belongs to the physical page:
[  143.235714] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[  143.236724] flags: 0x800(slab|zone=0)
[  143.237256] page_type: 0xffffffff()
[  143.238099] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.238885] raw: 00000000
[  143.239465] page dumped because: kasan: bad access detected
[  143.240043] 
[  143.240623] Memory state around the buggy address:
[  143.241295]  c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.242293]  c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.242975] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.243808]            ^
[  143.244190]  c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.244898]  c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.245655] ==================================================================

test log snippet test parser 59

Home

[  143.202190] ==================================================================
[  143.202890] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd0/0x1cc
[  143.203741] Free of addr c8fe9a80 by task kunit_try_catch/205
[  143.204345] 
[  143.204593] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.205458] Hardware name: Generic DT based system
[  143.206047]  unwind_backtrace from show_stack+0x18/0x1c
[  143.206878]  show_stack from dump_stack_lvl+0x58/0x70
[  143.207965]  dump_stack_lvl from print_report+0x164/0x51c
[  143.208697]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  143.209544]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  143.210413]  __kasan_slab_free from __kmem_cache_free+0x140/0x2a8
[  143.211461]  __kmem_cache_free from kmalloc_double_kzfree+0xd0/0x1cc
[  143.212371]  kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[  143.213330]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.214429]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.215266]  kthread from ret_from_fork+0x14/0x30
[  143.215837] Exception stack(0xfa103fb0 to 0xfa103ff8)
[  143.216432] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.217607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.218436] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.219271] 
[  143.219620] Allocated by task 205:
[  143.220214]  kasan_set_track+0x3c/0x5c
[  143.220927]  __kasan_kmalloc+0x8c/0x94
[  143.221371]  kmalloc_double_kzfree+0xa0/0x1cc
[  143.222282]  kunit_try_run_case+0x11c/0x2e4
[  143.222847]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.223616]  kthread+0x184/0x1a8
[  143.223991]  ret_from_fork+0x14/0x30
[  143.224580] 
[  143.224897] Freed by task 205:
[  143.225416]  kasan_set_track+0x3c/0x5c
[  143.226225]  kasan_save_free_info+0x30/0x3c
[  143.226735]  __kasan_slab_free+0xdc/0x124
[  143.227896]  __kmem_cache_free+0x140/0x2a8
[  143.228537]  kmalloc_double_kzfree+0xbc/0x1cc
[  143.229255]  kunit_try_run_case+0x11c/0x2e4
[  143.229944]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.230703]  kthread+0x184/0x1a8
[  143.231220]  ret_from_fork+0x14/0x30
[  143.231786] 
[  143.232110] The buggy address belongs to the object at c8fe9a80
[  143.232110]  which belongs to the cache kmalloc-64 of size 64
[  143.233537] The buggy address is located 0 bytes inside of
[  143.233537]  64-byte region [c8fe9a80, c8fe9ac0)
[  143.234734] 
[  143.234974] The buggy address belongs to the physical page:
[  143.235714] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[  143.236724] flags: 0x800(slab|zone=0)
[  143.237256] page_type: 0xffffffff()
[  143.238099] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.238885] raw: 00000000
[  143.239465] page dumped because: kasan: bad access detected
[  143.240043] 
[  143.240623] Memory state around the buggy address:
[  143.241295]  c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.242293]  c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.242975] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.243808]            ^
[  143.244190]  c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.244898]  c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.245655] ==================================================================

test log snippet test parser 60

Home

[  142.216033] ==================================================================
[  142.216964] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c
[  142.218110] Free of addr c8fe3000 by task kunit_try_catch/189
[  142.218664] 
[  142.219057] CPU: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.220000] Hardware name: Generic DT based system
[  142.220739]  unwind_backtrace from show_stack+0x18/0x1c
[  142.221562]  show_stack from dump_stack_lvl+0x58/0x70
[  142.222242]  dump_stack_lvl from print_report+0x164/0x51c
[  142.223047]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  142.223897]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  142.224773]  __kasan_slab_free from kmem_cache_free+0x170/0x41c
[  142.225636]  kmem_cache_free from kmem_cache_double_free+0xe4/0x23c
[  142.226510]  kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4
[  142.227517]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.228920]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.230040]  kthread from ret_from_fork+0x14/0x30
[  142.230800] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  142.231391] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.232269] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.233270] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.234017] 
[  142.234309] Allocated by task 189:
[  142.234680]  kasan_set_track+0x3c/0x5c
[  142.235241]  __kasan_slab_alloc+0x60/0x68
[  142.235974]  kmem_cache_alloc+0x1dc/0x574
[  142.236465]  kmem_cache_double_free+0xb0/0x23c
[  142.237284]  kunit_try_run_case+0x11c/0x2e4
[  142.238020]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.239059]  kthread+0x184/0x1a8
[  142.239656]  ret_from_fork+0x14/0x30
[  142.240213] 
[  142.240540] Freed by task 189:
[  142.240990]  kasan_set_track+0x3c/0x5c
[  142.241488]  kasan_save_free_info+0x30/0x3c
[  142.242032]  __kasan_slab_free+0xdc/0x124
[  142.242591]  kmem_cache_free+0x170/0x41c
[  142.243257]  kmem_cache_double_free+0xcc/0x23c
[  142.243752]  kunit_try_run_case+0x11c/0x2e4
[  142.244609]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.245460]  kthread+0x184/0x1a8
[  142.245889]  ret_from_fork+0x14/0x30
[  142.246372] 
[  142.246632] The buggy address belongs to the object at c8fe3000
[  142.246632]  which belongs to the cache test_cache of size 200
[  142.248226] The buggy address is located 0 bytes inside of
[  142.248226]  200-byte region [c8fe3000, c8fe30c8)
[  142.249878] 
[  142.250151] The buggy address belongs to the physical page:
[  142.250781] page:42624bb4 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe3
[  142.251658] flags: 0x800(slab|zone=0)
[  142.252242] page_type: 0xffffffff()
[  142.252683] raw: 00000800 c8915e00 00000122 00000000 00000000 800f000f ffffffff 00000001
[  142.253591] raw: 00000000
[  142.253942] page dumped because: kasan: bad access detected
[  142.254549] 
[  142.254786] Memory state around the buggy address:
[  142.255461]  c8fe2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.256256]  c8fe2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.256967] >c8fe3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.257982]            ^
[  142.258413]  c8fe3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  142.259308]  c8fe3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.260000] ==================================================================

test log snippet test parser 61

Home

[  142.216033] ==================================================================
[  142.216964] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c
[  142.218110] Free of addr c8fe3000 by task kunit_try_catch/189
[  142.218664] 
[  142.219057] CPU: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.220000] Hardware name: Generic DT based system
[  142.220739]  unwind_backtrace from show_stack+0x18/0x1c
[  142.221562]  show_stack from dump_stack_lvl+0x58/0x70
[  142.222242]  dump_stack_lvl from print_report+0x164/0x51c
[  142.223047]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  142.223897]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  142.224773]  __kasan_slab_free from kmem_cache_free+0x170/0x41c
[  142.225636]  kmem_cache_free from kmem_cache_double_free+0xe4/0x23c
[  142.226510]  kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4
[  142.227517]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.228920]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.230040]  kthread from ret_from_fork+0x14/0x30
[  142.230800] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  142.231391] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.232269] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.233270] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.234017] 
[  142.234309] Allocated by task 189:
[  142.234680]  kasan_set_track+0x3c/0x5c
[  142.235241]  __kasan_slab_alloc+0x60/0x68
[  142.235974]  kmem_cache_alloc+0x1dc/0x574
[  142.236465]  kmem_cache_double_free+0xb0/0x23c
[  142.237284]  kunit_try_run_case+0x11c/0x2e4
[  142.238020]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.239059]  kthread+0x184/0x1a8
[  142.239656]  ret_from_fork+0x14/0x30
[  142.240213] 
[  142.240540] Freed by task 189:
[  142.240990]  kasan_set_track+0x3c/0x5c
[  142.241488]  kasan_save_free_info+0x30/0x3c
[  142.242032]  __kasan_slab_free+0xdc/0x124
[  142.242591]  kmem_cache_free+0x170/0x41c
[  142.243257]  kmem_cache_double_free+0xcc/0x23c
[  142.243752]  kunit_try_run_case+0x11c/0x2e4
[  142.244609]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.245460]  kthread+0x184/0x1a8
[  142.245889]  ret_from_fork+0x14/0x30
[  142.246372] 
[  142.246632] The buggy address belongs to the object at c8fe3000
[  142.246632]  which belongs to the cache test_cache of size 200
[  142.248226] The buggy address is located 0 bytes inside of
[  142.248226]  200-byte region [c8fe3000, c8fe30c8)
[  142.249878] 
[  142.250151] The buggy address belongs to the physical page:
[  142.250781] page:42624bb4 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe3
[  142.251658] flags: 0x800(slab|zone=0)
[  142.252242] page_type: 0xffffffff()
[  142.252683] raw: 00000800 c8915e00 00000122 00000000 00000000 800f000f ffffffff 00000001
[  142.253591] raw: 00000000
[  142.253942] page dumped because: kasan: bad access detected
[  142.254549] 
[  142.254786] Memory state around the buggy address:
[  142.255461]  c8fe2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.256256]  c8fe2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.256967] >c8fe3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.257982]            ^
[  142.258413]  c8fe3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  142.259308]  c8fe3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.260000] ==================================================================

test log snippet test parser 62

Home

[  141.814780] ==================================================================
[  141.815999] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[  141.816758] Read of size 1 at addr c418402d by task kunit_try_catch/175
[  141.817852] 
[  141.818173] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.818852] Hardware name: Generic DT based system
[  141.819541]  unwind_backtrace from show_stack+0x18/0x1c
[  141.820255]  show_stack from dump_stack_lvl+0x58/0x70
[  141.820997]  dump_stack_lvl from print_report+0x164/0x51c
[  141.821730]  print_report from kasan_report+0xc8/0x104
[  141.822440]  kasan_report from kasan_global_oob_right+0xa0/0x150
[  141.823281]  kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4
[  141.824081]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.825076]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.825927]  kthread from ret_from_fork+0x14/0x30
[  141.826533] Exception stack(0xfa05bfb0 to 0xfa05bff8)
[  141.827172] bfa0:                                     00000000 00000000 00000000 00000000
[  141.828030] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.828994] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.829700] 
[  141.830025] The buggy address belongs to the variable:
[  141.830613]  global_array+0xd/0x40
[  141.831170] 
[  141.831450] The buggy address belongs to the physical page:
[  141.832099] page:20b71b86 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44184
[  141.833010] flags: 0x4000(reserved|zone=0)
[  141.833476] page_type: 0xffffffff()
[  141.834152] raw: 00004000 edc8c694 edc8c694 00000000 00000000 00000000 ffffffff 00000001
[  141.834983] raw: 00000000
[  141.835294] page dumped because: kasan: bad access detected
[  141.835988] 
[  141.836249] Memory state around the buggy address:
[  141.836826]  c4183f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.837516]  c4183f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.838341] >c4184000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[  141.839047]                           ^
[  141.839501]  c4184080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[  141.840272]  c4184100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[  141.840943] ==================================================================

test log snippet test parser 63

Home

[  141.814780] ==================================================================
[  141.815999] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[  141.816758] Read of size 1 at addr c418402d by task kunit_try_catch/175
[  141.817852] 
[  141.818173] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.818852] Hardware name: Generic DT based system
[  141.819541]  unwind_backtrace from show_stack+0x18/0x1c
[  141.820255]  show_stack from dump_stack_lvl+0x58/0x70
[  141.820997]  dump_stack_lvl from print_report+0x164/0x51c
[  141.821730]  print_report from kasan_report+0xc8/0x104
[  141.822440]  kasan_report from kasan_global_oob_right+0xa0/0x150
[  141.823281]  kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4
[  141.824081]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.825076]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.825927]  kthread from ret_from_fork+0x14/0x30
[  141.826533] Exception stack(0xfa05bfb0 to 0xfa05bff8)
[  141.827172] bfa0:                                     00000000 00000000 00000000 00000000
[  141.828030] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.828994] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.829700] 
[  141.830025] The buggy address belongs to the variable:
[  141.830613]  global_array+0xd/0x40
[  141.831170] 
[  141.831450] The buggy address belongs to the physical page:
[  141.832099] page:20b71b86 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44184
[  141.833010] flags: 0x4000(reserved|zone=0)
[  141.833476] page_type: 0xffffffff()
[  141.834152] raw: 00004000 edc8c694 edc8c694 00000000 00000000 00000000 ffffffff 00000001
[  141.834983] raw: 00000000
[  141.835294] page dumped because: kasan: bad access detected
[  141.835988] 
[  141.836249] Memory state around the buggy address:
[  141.836826]  c4183f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.837516]  c4183f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.838341] >c4184000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[  141.839047]                           ^
[  141.839501]  c4184080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[  141.840272]  c4184100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[  141.840943] ==================================================================

test log snippet test parser 64

Home

[  139.864772] ==================================================================
[  139.866195] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[  139.867033] Free of addr c8f14001 by task kunit_try_catch/121
[  139.868303] 
[  139.868700] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.869824] Hardware name: Generic DT based system
[  139.870501]  unwind_backtrace from show_stack+0x18/0x1c
[  139.870881]  show_stack from dump_stack_lvl+0x58/0x70
[  139.871336]  dump_stack_lvl from print_report+0x164/0x51c
[  139.872284]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  139.873197]  kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[  139.874218]  free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[  139.875203]  kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x11c/0x2e4
[  139.876174]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.877237]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.878355]  kthread from ret_from_fork+0x14/0x30
[  139.878885] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[  139.879546] bfa0:                                     00000000 00000000 00000000 00000000
[  139.880444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.881234] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.882002] 
[  139.882321] The buggy address belongs to the physical page:
[  139.882914] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  139.883765] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.884574] flags: 0x40(head|zone=0)
[  139.885027] page_type: 0xffffffff()
[  139.885601] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  139.886382] raw: 00000000
[  139.886781] page dumped because: kasan: bad access detected
[  139.887491] 
[  139.887699] Memory state around the buggy address:
[  139.888355]  c8f13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.889057]  c8f13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.889843] >c8f14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.890716]            ^
[  139.891081]  c8f14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.891768]  c8f14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.892521] ==================================================================

test log snippet test parser 65

Home

[  139.864772] ==================================================================
[  139.866195] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[  139.867033] Free of addr c8f14001 by task kunit_try_catch/121
[  139.868303] 
[  139.868700] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.869824] Hardware name: Generic DT based system
[  139.870501]  unwind_backtrace from show_stack+0x18/0x1c
[  139.870881]  show_stack from dump_stack_lvl+0x58/0x70
[  139.871336]  dump_stack_lvl from print_report+0x164/0x51c
[  139.872284]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  139.873197]  kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[  139.874218]  free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[  139.875203]  kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x11c/0x2e4
[  139.876174]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.877237]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.878355]  kthread from ret_from_fork+0x14/0x30
[  139.878885] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[  139.879546] bfa0:                                     00000000 00000000 00000000 00000000
[  139.880444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.881234] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.882002] 
[  139.882321] The buggy address belongs to the physical page:
[  139.882914] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  139.883765] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.884574] flags: 0x40(head|zone=0)
[  139.885027] page_type: 0xffffffff()
[  139.885601] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  139.886382] raw: 00000000
[  139.886781] page dumped because: kasan: bad access detected
[  139.887491] 
[  139.887699] Memory state around the buggy address:
[  139.888355]  c8f13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.889057]  c8f13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.889843] >c8f14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.890716]            ^
[  139.891081]  c8f14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.891768]  c8f14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.892521] ==================================================================

test log snippet test parser 66

Home

[  142.274972] ==================================================================
[  142.276014] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x23c
[  142.276823] Free of addr c8fe4001 by task kunit_try_catch/191
[  142.278463] 
[  142.278799] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.279704] Hardware name: Generic DT based system
[  142.280286]  unwind_backtrace from show_stack+0x18/0x1c
[  142.280989]  show_stack from dump_stack_lvl+0x58/0x70
[  142.281724]  dump_stack_lvl from print_report+0x164/0x51c
[  142.282544]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  142.283447]  kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[  142.284505]  __kasan_slab_free from kmem_cache_free+0x170/0x41c
[  142.285333]  kmem_cache_free from kmem_cache_invalid_free+0xd8/0x23c
[  142.286188]  kmem_cache_invalid_free from kunit_try_run_case+0x11c/0x2e4
[  142.287035]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.288031]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.289042]  kthread from ret_from_fork+0x14/0x30
[  142.289727] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[  142.290512] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.291505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.292599] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.293456] 
[  142.293730] Allocated by task 191:
[  142.294099]  kasan_set_track+0x3c/0x5c
[  142.294734]  __kasan_slab_alloc+0x60/0x68
[  142.295462]  kmem_cache_alloc+0x1dc/0x574
[  142.296032]  kmem_cache_invalid_free+0xb0/0x23c
[  142.296658]  kunit_try_run_case+0x11c/0x2e4
[  142.297273]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.297967]  kthread+0x184/0x1a8
[  142.298447]  ret_from_fork+0x14/0x30
[  142.298870] 
[  142.299182] The buggy address belongs to the object at c8fe4000
[  142.299182]  which belongs to the cache test_cache of size 200
[  142.300397] The buggy address is located 1 bytes inside of
[  142.300397]  200-byte region [c8fe4000, c8fe40c8)
[  142.301582] 
[  142.301800] The buggy address belongs to the physical page:
[  142.302564] page:a185f071 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe4
[  142.303396] flags: 0x800(slab|zone=0)
[  142.303868] page_type: 0xffffffff()
[  142.304373] raw: 00000800 c8915f00 00000122 00000000 00000000 800f000f ffffffff 00000001
[  142.305358] raw: 00000000
[  142.305771] page dumped because: kasan: bad access detected
[  142.306365] 
[  142.306639] Memory state around the buggy address:
[  142.307321]  c8fe3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.308059]  c8fe3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.309503] >c8fe4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  142.310147]            ^
[  142.310561]  c8fe4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  142.311167]  c8fe4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.311939] ==================================================================

test log snippet test parser 67

Home

[  142.274972] ==================================================================
[  142.276014] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x23c
[  142.276823] Free of addr c8fe4001 by task kunit_try_catch/191
[  142.278463] 
[  142.278799] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.279704] Hardware name: Generic DT based system
[  142.280286]  unwind_backtrace from show_stack+0x18/0x1c
[  142.280989]  show_stack from dump_stack_lvl+0x58/0x70
[  142.281724]  dump_stack_lvl from print_report+0x164/0x51c
[  142.282544]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  142.283447]  kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[  142.284505]  __kasan_slab_free from kmem_cache_free+0x170/0x41c
[  142.285333]  kmem_cache_free from kmem_cache_invalid_free+0xd8/0x23c
[  142.286188]  kmem_cache_invalid_free from kunit_try_run_case+0x11c/0x2e4
[  142.287035]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.288031]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.289042]  kthread from ret_from_fork+0x14/0x30
[  142.289727] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[  142.290512] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.291505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.292599] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.293456] 
[  142.293730] Allocated by task 191:
[  142.294099]  kasan_set_track+0x3c/0x5c
[  142.294734]  __kasan_slab_alloc+0x60/0x68
[  142.295462]  kmem_cache_alloc+0x1dc/0x574
[  142.296032]  kmem_cache_invalid_free+0xb0/0x23c
[  142.296658]  kunit_try_run_case+0x11c/0x2e4
[  142.297273]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.297967]  kthread+0x184/0x1a8
[  142.298447]  ret_from_fork+0x14/0x30
[  142.298870] 
[  142.299182] The buggy address belongs to the object at c8fe4000
[  142.299182]  which belongs to the cache test_cache of size 200
[  142.300397] The buggy address is located 1 bytes inside of
[  142.300397]  200-byte region [c8fe4000, c8fe40c8)
[  142.301582] 
[  142.301800] The buggy address belongs to the physical page:
[  142.302564] page:a185f071 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe4
[  142.303396] flags: 0x800(slab|zone=0)
[  142.303868] page_type: 0xffffffff()
[  142.304373] raw: 00000800 c8915f00 00000122 00000000 00000000 800f000f ffffffff 00000001
[  142.305358] raw: 00000000
[  142.305771] page dumped because: kasan: bad access detected
[  142.306365] 
[  142.306639] Memory state around the buggy address:
[  142.307321]  c8fe3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.308059]  c8fe3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.309503] >c8fe4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  142.310147]            ^
[  142.310561]  c8fe4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  142.311167]  c8fe4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.311939] ==================================================================

test log snippet test parser 68

Home

[  140.880159] ==================================================================
[  140.881031] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1f0
[  140.882045] Read of size 4294967294 at addr c8fa0984 by task kunit_try_catch/153
[  140.882769] 
[  140.883063] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.884050] Hardware name: Generic DT based system
[  140.884889]  unwind_backtrace from show_stack+0x18/0x1c
[  140.885685]  show_stack from dump_stack_lvl+0x58/0x70
[  140.886377]  dump_stack_lvl from print_report+0x164/0x51c
[  140.887107]  print_report from kasan_report+0xc8/0x104
[  140.887928]  kasan_report from kasan_check_range+0x14c/0x198
[  140.889025]  kasan_check_range from __asan_memmove+0x28/0x68
[  140.890016]  __asan_memmove from kmalloc_memmove_negative_size+0xe4/0x1f0
[  140.890879]  kmalloc_memmove_negative_size from kunit_try_run_case+0x11c/0x2e4
[  140.891814]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.892782]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.893682]  kthread from ret_from_fork+0x14/0x30
[  140.894285] Exception stack(0xf9fc3fb0 to 0xf9fc3ff8)
[  140.894859] 3fa0:                                     00000000 00000000 00000000 00000000
[  140.895734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.896769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.897449] 
[  140.897735] Allocated by task 153:
[  140.898109]  kasan_set_track+0x3c/0x5c
[  140.899510]  __kasan_kmalloc+0x8c/0x94
[  140.899905]  kmalloc_memmove_negative_size+0xa0/0x1f0
[  140.901249]  kunit_try_run_case+0x11c/0x2e4
[  140.901854]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.902591]  kthread+0x184/0x1a8
[  140.902988]  ret_from_fork+0x14/0x30
[  140.903521] 
[  140.903747] The buggy address belongs to the object at c8fa0980
[  140.903747]  which belongs to the cache kmalloc-64 of size 64
[  140.905036] The buggy address is located 4 bytes inside of
[  140.905036]  64-byte region [c8fa0980, c8fa09c0)
[  140.906039] 
[  140.906375] The buggy address belongs to the physical page:
[  140.906925] page:31e3ec12 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fa0
[  140.907743] flags: 0x800(slab|zone=0)
[  140.908613] page_type: 0xffffffff()
[  140.909367] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.910339] raw: 00000000
[  140.910668] page dumped because: kasan: bad access detected
[  140.911243] 
[  140.911494] Memory state around the buggy address:
[  140.912101]  c8fa0880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.912803]  c8fa0900: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  140.913686] >c8fa0980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  140.914376]            ^
[  140.914856]  c8fa0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.915532]  c8fa0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.916234] ==================================================================

test log snippet test parser 69

Home

[  140.880159] ==================================================================
[  140.881031] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1f0
[  140.882045] Read of size 4294967294 at addr c8fa0984 by task kunit_try_catch/153
[  140.882769] 
[  140.883063] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.884050] Hardware name: Generic DT based system
[  140.884889]  unwind_backtrace from show_stack+0x18/0x1c
[  140.885685]  show_stack from dump_stack_lvl+0x58/0x70
[  140.886377]  dump_stack_lvl from print_report+0x164/0x51c
[  140.887107]  print_report from kasan_report+0xc8/0x104
[  140.887928]  kasan_report from kasan_check_range+0x14c/0x198
[  140.889025]  kasan_check_range from __asan_memmove+0x28/0x68
[  140.890016]  __asan_memmove from kmalloc_memmove_negative_size+0xe4/0x1f0
[  140.890879]  kmalloc_memmove_negative_size from kunit_try_run_case+0x11c/0x2e4
[  140.891814]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.892782]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.893682]  kthread from ret_from_fork+0x14/0x30
[  140.894285] Exception stack(0xf9fc3fb0 to 0xf9fc3ff8)
[  140.894859] 3fa0:                                     00000000 00000000 00000000 00000000
[  140.895734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.896769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.897449] 
[  140.897735] Allocated by task 153:
[  140.898109]  kasan_set_track+0x3c/0x5c
[  140.899510]  __kasan_kmalloc+0x8c/0x94
[  140.899905]  kmalloc_memmove_negative_size+0xa0/0x1f0
[  140.901249]  kunit_try_run_case+0x11c/0x2e4
[  140.901854]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.902591]  kthread+0x184/0x1a8
[  140.902988]  ret_from_fork+0x14/0x30
[  140.903521] 
[  140.903747] The buggy address belongs to the object at c8fa0980
[  140.903747]  which belongs to the cache kmalloc-64 of size 64
[  140.905036] The buggy address is located 4 bytes inside of
[  140.905036]  64-byte region [c8fa0980, c8fa09c0)
[  140.906039] 
[  140.906375] The buggy address belongs to the physical page:
[  140.906925] page:31e3ec12 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fa0
[  140.907743] flags: 0x800(slab|zone=0)
[  140.908613] page_type: 0xffffffff()
[  140.909367] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.910339] raw: 00000000
[  140.910668] page dumped because: kasan: bad access detected
[  140.911243] 
[  140.911494] Memory state around the buggy address:
[  140.912101]  c8fa0880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.912803]  c8fa0900: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  140.913686] >c8fa0980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  140.914376]            ^
[  140.914856]  c8fa0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.915532]  c8fa0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.916234] ==================================================================

test log snippet test parser 70

Home

[  142.859832] ==================================================================
[  142.861730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[  142.862569] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.863198] 
[  142.863495] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.864366] Hardware name: Generic DT based system
[  142.864866]  unwind_backtrace from show_stack+0x18/0x1c
[  142.865652]  show_stack from dump_stack_lvl+0x58/0x70
[  142.866335]  dump_stack_lvl from print_report+0x164/0x51c
[  142.867015]  print_report from kasan_report+0xc8/0x104
[  142.867790]  kasan_report from kasan_bitops_generic+0x26c/0xc30
[  142.868651]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.869577]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.870604]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.871539]  kthread from ret_from_fork+0x14/0x30
[  142.872112] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.872784] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.873712] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.874623] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.875330] 
[  142.875577] Allocated by task 201:
[  142.875938]  kasan_set_track+0x3c/0x5c
[  142.876535]  __kasan_kmalloc+0x8c/0x94
[  142.877050]  kasan_bitops_generic+0xa0/0xc30
[  142.877877]  kunit_try_run_case+0x11c/0x2e4
[  142.878449]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.879220]  kthread+0x184/0x1a8
[  142.879605]  ret_from_fork+0x14/0x30
[  142.880261] 
[  142.880523] The buggy address belongs to the object at c8fe7800
[  142.880523]  which belongs to the cache kmalloc-64 of size 64
[  142.881661] The buggy address is located 4 bytes inside of
[  142.881661]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.882938] 
[  142.883256] The buggy address belongs to the physical page:
[  142.883852] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.884609] flags: 0x800(slab|zone=0)
[  142.885204] page_type: 0xffffffff()
[  142.885651] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.886452] raw: 00000000
[  142.886909] page dumped because: kasan: bad access detected
[  142.887555] 
[  142.888412] Memory state around the buggy address:
[  142.889113]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.889806]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.890551] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.891256]            ^
[  142.891626]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.892426]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.892975] ==================================================================
[  142.744699] ==================================================================
[  142.745586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[  142.746369] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.747767] 
[  142.748104] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.749172] Hardware name: Generic DT based system
[  142.749713]  unwind_backtrace from show_stack+0x18/0x1c
[  142.750636]  show_stack from dump_stack_lvl+0x58/0x70
[  142.751473]  dump_stack_lvl from print_report+0x164/0x51c
[  142.752339]  print_report from kasan_report+0xc8/0x104
[  142.753096]  kasan_report from kasan_check_range+0x14c/0x198
[  142.754011]  kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[  142.755057]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.756117]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.757306]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.758431]  kthread from ret_from_fork+0x14/0x30
[  142.759239] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.759886] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.760922] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.761877] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.762674] 
[  142.762963] Allocated by task 201:
[  142.763441]  kasan_set_track+0x3c/0x5c
[  142.764162]  __kasan_kmalloc+0x8c/0x94
[  142.764843]  kasan_bitops_generic+0xa0/0xc30
[  142.765500]  kunit_try_run_case+0x11c/0x2e4
[  142.766206]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.767036]  kthread+0x184/0x1a8
[  142.767807]  ret_from_fork+0x14/0x30
[  142.768371] 
[  142.768709] The buggy address belongs to the object at c8fe7800
[  142.768709]  which belongs to the cache kmalloc-64 of size 64
[  142.769991] The buggy address is located 4 bytes inside of
[  142.769991]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.771296] 
[  142.771674] The buggy address belongs to the physical page:
[  142.772314] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.773348] flags: 0x800(slab|zone=0)
[  142.773908] page_type: 0xffffffff()
[  142.774614] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.775652] raw: 00000000
[  142.776101] page dumped because: kasan: bad access detected
[  142.776874] 
[  142.777330] Memory state around the buggy address:
[  142.778144]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.778922]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.779672] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.780465]            ^
[  142.780957]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.781740]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.782558] ==================================================================
[  142.821019] ==================================================================
[  142.821753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[  142.822458] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.823491] 
[  142.823751] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.824905] Hardware name: Generic DT based system
[  142.825576]  unwind_backtrace from show_stack+0x18/0x1c
[  142.826449]  show_stack from dump_stack_lvl+0x58/0x70
[  142.827959]  dump_stack_lvl from print_report+0x164/0x51c
[  142.828777]  print_report from kasan_report+0xc8/0x104
[  142.829677]  kasan_report from kasan_bitops_generic+0x20c/0xc30
[  142.830594]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.831522]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.832517]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.833425]  kthread from ret_from_fork+0x14/0x30
[  142.834076] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.834759] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.835733] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.836681] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.837784] 
[  142.838181] Allocated by task 201:
[  142.838866]  kasan_set_track+0x3c/0x5c
[  142.839562]  __kasan_kmalloc+0x8c/0x94
[  142.840269]  kasan_bitops_generic+0xa0/0xc30
[  142.841047]  kunit_try_run_case+0x11c/0x2e4
[  142.841668]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.842585]  kthread+0x184/0x1a8
[  142.842908]  ret_from_fork+0x14/0x30
[  142.843511] 
[  142.843741] The buggy address belongs to the object at c8fe7800
[  142.843741]  which belongs to the cache kmalloc-64 of size 64
[  142.845012] The buggy address is located 4 bytes inside of
[  142.845012]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.846091] 
[  142.846404] The buggy address belongs to the physical page:
[  142.847104] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.848174] flags: 0x800(slab|zone=0)
[  142.848646] page_type: 0xffffffff()
[  142.849217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.850212] raw: 00000000
[  142.850575] page dumped because: kasan: bad access detected
[  142.851164] 
[  142.851461] Memory state around the buggy address:
[  142.852000]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.852746]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.853535] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.854269]            ^
[  142.854658]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.855460]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.856177] ==================================================================
[  142.709799] ==================================================================
[  142.710490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[  142.711337] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.712027] 
[  142.712346] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.713335] Hardware name: Generic DT based system
[  142.713852]  unwind_backtrace from show_stack+0x18/0x1c
[  142.714607]  show_stack from dump_stack_lvl+0x58/0x70
[  142.715274]  dump_stack_lvl from print_report+0x164/0x51c
[  142.715958]  print_report from kasan_report+0xc8/0x104
[  142.716634]  kasan_report from kasan_check_range+0x14c/0x198
[  142.718066]  kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[  142.718895]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.719875]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.720827]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.721691]  kthread from ret_from_fork+0x14/0x30
[  142.722297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.722867] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.723833] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.724756] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.725499] 
[  142.725752] Allocated by task 201:
[  142.726118]  kasan_set_track+0x3c/0x5c
[  142.726754]  __kasan_kmalloc+0x8c/0x94
[  142.727601]  kasan_bitops_generic+0xa0/0xc30
[  142.728368]  kunit_try_run_case+0x11c/0x2e4
[  142.729204]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.729913]  kthread+0x184/0x1a8
[  142.730485]  ret_from_fork+0x14/0x30
[  142.731025] 
[  142.731349] The buggy address belongs to the object at c8fe7800
[  142.731349]  which belongs to the cache kmalloc-64 of size 64
[  142.732639] The buggy address is located 4 bytes inside of
[  142.732639]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.733816] 
[  142.734092] The buggy address belongs to the physical page:
[  142.734607] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.735613] flags: 0x800(slab|zone=0)
[  142.736098] page_type: 0xffffffff()
[  142.736554] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.737580] raw: 00000000
[  142.737977] page dumped because: kasan: bad access detected
[  142.738781] 
[  142.739099] Memory state around the buggy address:
[  142.739687]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.740406]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.741146] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.741846]            ^
[  142.742164]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.742966]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.743733] ==================================================================
[  142.931907] ==================================================================
[  142.932892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[  142.933663] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.934476] 
[  142.934727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.935489] Hardware name: Generic DT based system
[  142.936168]  unwind_backtrace from show_stack+0x18/0x1c
[  142.936863]  show_stack from dump_stack_lvl+0x58/0x70
[  142.938285]  dump_stack_lvl from print_report+0x164/0x51c
[  142.939101]  print_report from kasan_report+0xc8/0x104
[  142.939805]  kasan_report from kasan_check_range+0x14c/0x198
[  142.940616]  kasan_check_range from kasan_bitops_generic+0x310/0xc30
[  142.941420]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.942291]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.943254]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.944103]  kthread from ret_from_fork+0x14/0x30
[  142.944819] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.945471] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.946349] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.947235] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.948238] 
[  142.948504] Allocated by task 201:
[  142.948810]  kasan_set_track+0x3c/0x5c
[  142.949091]  __kasan_kmalloc+0x8c/0x94
[  142.949571]  kasan_bitops_generic+0xa0/0xc30
[  142.950225]  kunit_try_run_case+0x11c/0x2e4
[  142.950935]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.951821]  kthread+0x184/0x1a8
[  142.952352]  ret_from_fork+0x14/0x30
[  142.952762] 
[  142.952992] The buggy address belongs to the object at c8fe7800
[  142.952992]  which belongs to the cache kmalloc-64 of size 64
[  142.954370] The buggy address is located 4 bytes inside of
[  142.954370]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.955467] 
[  142.955766] The buggy address belongs to the physical page:
[  142.956484] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.957762] flags: 0x800(slab|zone=0)
[  142.958462] page_type: 0xffffffff()
[  142.958937] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.959716] raw: 00000000
[  142.960105] page dumped because: kasan: bad access detected
[  142.960735] 
[  142.961052] Memory state around the buggy address:
[  142.961666]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.962491]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.963346] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.964316]            ^
[  142.964668]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.965497]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.966412] ==================================================================
[  142.968010] ==================================================================
[  142.969200] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[  142.969898] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.970457] 
[  142.970761] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.971709] Hardware name: Generic DT based system
[  142.972294]  unwind_backtrace from show_stack+0x18/0x1c
[  142.973052]  show_stack from dump_stack_lvl+0x58/0x70
[  142.973837]  dump_stack_lvl from print_report+0x164/0x51c
[  142.974641]  print_report from kasan_report+0xc8/0x104
[  142.975361]  kasan_report from kasan_bitops_generic+0x318/0xc30
[  142.976236]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.977301]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.978368]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.979228]  kthread from ret_from_fork+0x14/0x30
[  142.979793] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.980504] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.981345] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.982281] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.983149] 
[  142.983395] Allocated by task 201:
[  142.983776]  kasan_set_track+0x3c/0x5c
[  142.984405]  __kasan_kmalloc+0x8c/0x94
[  142.984858]  kasan_bitops_generic+0xa0/0xc30
[  142.985537]  kunit_try_run_case+0x11c/0x2e4
[  142.986076]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.986809]  kthread+0x184/0x1a8
[  142.987284]  ret_from_fork+0x14/0x30
[  142.987846] 
[  142.988067] The buggy address belongs to the object at c8fe7800
[  142.988067]  which belongs to the cache kmalloc-64 of size 64
[  142.989564] The buggy address is located 4 bytes inside of
[  142.989564]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.990678] 
[  142.990993] The buggy address belongs to the physical page:
[  142.991651] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.992585] flags: 0x800(slab|zone=0)
[  142.993089] page_type: 0xffffffff()
[  142.993552] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.994458] raw: 00000000
[  142.994923] page dumped because: kasan: bad access detected
[  142.995444] 
[  142.995815] Memory state around the buggy address:
[  142.996341]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.997310]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.998117] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.998809]            ^
[  142.999197]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.999881]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.000632] ==================================================================
[  142.634480] ==================================================================
[  142.636315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[  142.637021] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.638451] 
[  142.638726] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.639636] Hardware name: Generic DT based system
[  142.640424]  unwind_backtrace from show_stack+0x18/0x1c
[  142.641286]  show_stack from dump_stack_lvl+0x58/0x70
[  142.642003]  dump_stack_lvl from print_report+0x164/0x51c
[  142.642874]  print_report from kasan_report+0xc8/0x104
[  142.643635]  kasan_report from kasan_bitops_generic+0x100/0xc30
[  142.644520]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.645401]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.646353]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.647382]  kthread from ret_from_fork+0x14/0x30
[  142.648007] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.648711] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.650577] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.651409] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.652111] 
[  142.652413] Allocated by task 201:
[  142.652837]  kasan_set_track+0x3c/0x5c
[  142.653496]  __kasan_kmalloc+0x8c/0x94
[  142.654046]  kasan_bitops_generic+0xa0/0xc30
[  142.654617]  kunit_try_run_case+0x11c/0x2e4
[  142.655210]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.655796]  kthread+0x184/0x1a8
[  142.656304]  ret_from_fork+0x14/0x30
[  142.656777] 
[  142.657018] The buggy address belongs to the object at c8fe7800
[  142.657018]  which belongs to the cache kmalloc-64 of size 64
[  142.658541] The buggy address is located 4 bytes inside of
[  142.658541]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.659953] 
[  142.660384] The buggy address belongs to the physical page:
[  142.661251] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.662184] flags: 0x800(slab|zone=0)
[  142.662711] page_type: 0xffffffff()
[  142.663234] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.664151] raw: 00000000
[  142.664553] page dumped because: kasan: bad access detected
[  142.665367] 
[  142.665706] Memory state around the buggy address:
[  142.666461]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.667452]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.668460] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.669271]            ^
[  142.669744]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.670602]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.671490] ==================================================================
[  143.003618] ==================================================================
[  143.005544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[  143.006360] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.006964] 
[  143.007886] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.008893] Hardware name: Generic DT based system
[  143.009529]  unwind_backtrace from show_stack+0x18/0x1c
[  143.010161]  show_stack from dump_stack_lvl+0x58/0x70
[  143.010930]  dump_stack_lvl from print_report+0x164/0x51c
[  143.011779]  print_report from kasan_report+0xc8/0x104
[  143.012363]  kasan_report from kasan_bitops_generic+0x39c/0xc30
[  143.013257]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.014085]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.015079]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.015930]  kthread from ret_from_fork+0x14/0x30
[  143.016481] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.017430] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.018293] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.019177] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.019908] 
[  143.020224] Allocated by task 201:
[  143.020689]  kasan_set_track+0x3c/0x5c
[  143.021291]  __kasan_kmalloc+0x8c/0x94
[  143.021818]  kasan_bitops_generic+0xa0/0xc30
[  143.022451]  kunit_try_run_case+0x11c/0x2e4
[  143.022973]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.023734]  kthread+0x184/0x1a8
[  143.024163]  ret_from_fork+0x14/0x30
[  143.024703] 
[  143.025037] The buggy address belongs to the object at c8fe7800
[  143.025037]  which belongs to the cache kmalloc-64 of size 64
[  143.026213] The buggy address is located 4 bytes inside of
[  143.026213]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.027632] 
[  143.027910] The buggy address belongs to the physical page:
[  143.028487] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.029310] flags: 0x800(slab|zone=0)
[  143.029758] page_type: 0xffffffff()
[  143.030391] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.031288] raw: 00000000
[  143.031706] page dumped because: kasan: bad access detected
[  143.032343] 
[  143.032605] Memory state around the buggy address:
[  143.033220]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.033905]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.034682] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.035331]            ^
[  143.035789]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.036625]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.037605] ==================================================================
[  143.040827] ==================================================================
[  143.042762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[  143.043457] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.044336] 
[  143.044586] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.045369] Hardware name: Generic DT based system
[  143.046041]  unwind_backtrace from show_stack+0x18/0x1c
[  143.046856]  show_stack from dump_stack_lvl+0x58/0x70
[  143.048150]  dump_stack_lvl from print_report+0x164/0x51c
[  143.048859]  print_report from kasan_report+0xc8/0x104
[  143.049576]  kasan_report from kasan_bitops_generic+0x404/0xc30
[  143.050537]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.051390]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.052327]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.053199]  kthread from ret_from_fork+0x14/0x30
[  143.053827] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.054405] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.055354] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.056254] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.056940] 
[  143.057321] Allocated by task 201:
[  143.057761]  kasan_set_track+0x3c/0x5c
[  143.058276]  __kasan_kmalloc+0x8c/0x94
[  143.058820]  kasan_bitops_generic+0xa0/0xc30
[  143.059636]  kunit_try_run_case+0x11c/0x2e4
[  143.060229]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.060811]  kthread+0x184/0x1a8
[  143.061359]  ret_from_fork+0x14/0x30
[  143.061880] 
[  143.062233] The buggy address belongs to the object at c8fe7800
[  143.062233]  which belongs to the cache kmalloc-64 of size 64
[  143.063463] The buggy address is located 4 bytes inside of
[  143.063463]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.064610] 
[  143.064907] The buggy address belongs to the physical page:
[  143.065572] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.066425] flags: 0x800(slab|zone=0)
[  143.066997] page_type: 0xffffffff()
[  143.067728] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.068584] raw: 00000000
[  143.068963] page dumped because: kasan: bad access detected
[  143.069536] 
[  143.069891] Memory state around the buggy address:
[  143.070473]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.071151]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.071860] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.072575]            ^
[  143.072929]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.073718]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.074463] ==================================================================
[  142.783779] ==================================================================
[  142.784488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[  142.785420] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.786271] 
[  142.786654] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.788399] Hardware name: Generic DT based system
[  142.789019]  unwind_backtrace from show_stack+0x18/0x1c
[  142.789881]  show_stack from dump_stack_lvl+0x58/0x70
[  142.790658]  dump_stack_lvl from print_report+0x164/0x51c
[  142.791469]  print_report from kasan_report+0xc8/0x104
[  142.792275]  kasan_report from kasan_bitops_generic+0x1f8/0xc30
[  142.793156]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.794068]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.795074]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.796000]  kthread from ret_from_fork+0x14/0x30
[  142.796696] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.797391] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.798552] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.799597] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.800390] 
[  142.800696] Allocated by task 201:
[  142.801291]  kasan_set_track+0x3c/0x5c
[  142.801828]  __kasan_kmalloc+0x8c/0x94
[  142.802528]  kasan_bitops_generic+0xa0/0xc30
[  142.803162]  kunit_try_run_case+0x11c/0x2e4
[  142.803945]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.804678]  kthread+0x184/0x1a8
[  142.805154]  ret_from_fork+0x14/0x30
[  142.805783] 
[  142.806146] The buggy address belongs to the object at c8fe7800
[  142.806146]  which belongs to the cache kmalloc-64 of size 64
[  142.807760] The buggy address is located 4 bytes inside of
[  142.807760]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.809011] 
[  142.809380] The buggy address belongs to the physical page:
[  142.810047] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.811088] flags: 0x800(slab|zone=0)
[  142.811653] page_type: 0xffffffff()
[  142.812149] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.813227] raw: 00000000
[  142.813588] page dumped because: kasan: bad access detected
[  142.814276] 
[  142.814593] Memory state around the buggy address:
[  142.815103]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.816075]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.816946] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.817916]            ^
[  142.818274]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.818956]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.819797] ==================================================================
[  142.896310] ==================================================================
[  142.898416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[  142.899495] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.900240] 
[  142.900529] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.901763] Hardware name: Generic DT based system
[  142.902347]  unwind_backtrace from show_stack+0x18/0x1c
[  142.903071]  show_stack from dump_stack_lvl+0x58/0x70
[  142.903778]  dump_stack_lvl from print_report+0x164/0x51c
[  142.904588]  print_report from kasan_report+0xc8/0x104
[  142.905297]  kasan_report from kasan_bitops_generic+0x2d4/0xc30
[  142.906201]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.907013]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.908157]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.908995]  kthread from ret_from_fork+0x14/0x30
[  142.909621] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.910200] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.911054] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.912001] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.912741] 
[  142.912997] Allocated by task 201:
[  142.913451]  kasan_set_track+0x3c/0x5c
[  142.914069]  __kasan_kmalloc+0x8c/0x94
[  142.914582]  kasan_bitops_generic+0xa0/0xc30
[  142.915244]  kunit_try_run_case+0x11c/0x2e4
[  142.915798]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.916534]  kthread+0x184/0x1a8
[  142.916960]  ret_from_fork+0x14/0x30
[  142.917802] 
[  142.918033] The buggy address belongs to the object at c8fe7800
[  142.918033]  which belongs to the cache kmalloc-64 of size 64
[  142.919384] The buggy address is located 4 bytes inside of
[  142.919384]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.920563] 
[  142.920858] The buggy address belongs to the physical page:
[  142.921480] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.922254] flags: 0x800(slab|zone=0)
[  142.922805] page_type: 0xffffffff()
[  142.923217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.924095] raw: 00000000
[  142.924562] page dumped because: kasan: bad access detected
[  142.925196] 
[  142.925404] Memory state around the buggy address:
[  142.926118]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.926897]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.927884] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.928502]            ^
[  142.929011]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.929913]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.930808] ==================================================================
[  143.109989] ==================================================================
[  143.110692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[  143.111573] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.112198] 
[  143.112489] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.113412] Hardware name: Generic DT based system
[  143.114065]  unwind_backtrace from show_stack+0x18/0x1c
[  143.114900]  show_stack from dump_stack_lvl+0x58/0x70
[  143.115562]  dump_stack_lvl from print_report+0x164/0x51c
[  143.116264]  print_report from kasan_report+0xc8/0x104
[  143.116842]  kasan_report from kasan_check_range+0x14c/0x198
[  143.118306]  kasan_check_range from kasan_bitops_generic+0x478/0xc30
[  143.119228]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.120150]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.121095]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.121961]  kthread from ret_from_fork+0x14/0x30
[  143.122537] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.123180] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.124076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.125034] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.125840] 
[  143.126085] Allocated by task 201:
[  143.126473]  kasan_set_track+0x3c/0x5c
[  143.126980]  __kasan_kmalloc+0x8c/0x94
[  143.127827]  kasan_bitops_generic+0xa0/0xc30
[  143.128427]  kunit_try_run_case+0x11c/0x2e4
[  143.129019]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.129779]  kthread+0x184/0x1a8
[  143.130187]  ret_from_fork+0x14/0x30
[  143.130716] 
[  143.131013] The buggy address belongs to the object at c8fe7800
[  143.131013]  which belongs to the cache kmalloc-64 of size 64
[  143.132104] The buggy address is located 4 bytes inside of
[  143.132104]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.133353] 
[  143.133668] The buggy address belongs to the physical page:
[  143.134309] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.135223] flags: 0x800(slab|zone=0)
[  143.135641] page_type: 0xffffffff()
[  143.136209] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.137315] raw: 00000000
[  143.137613] page dumped because: kasan: bad access detected
[  143.138420] 
[  143.138655] Memory state around the buggy address:
[  143.139168]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.140165]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.140954] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.141643]            ^
[  143.141933]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.142764]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.143487] ==================================================================
[  142.675353] ==================================================================
[  142.677219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[  142.678700] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.679450] 
[  142.679727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.680552] Hardware name: Generic DT based system
[  142.681204]  unwind_backtrace from show_stack+0x18/0x1c
[  142.682083]  show_stack from dump_stack_lvl+0x58/0x70
[  142.682807]  dump_stack_lvl from print_report+0x164/0x51c
[  142.683533]  print_report from kasan_report+0xc8/0x104
[  142.684159]  kasan_report from kasan_bitops_generic+0x168/0xc30
[  142.685008]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.685868]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.686848]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.687686]  kthread from ret_from_fork+0x14/0x30
[  142.688297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.688867] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.689872] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.690751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.691507] 
[  142.691800] Allocated by task 201:
[  142.692229]  kasan_set_track+0x3c/0x5c
[  142.692818]  __kasan_kmalloc+0x8c/0x94
[  142.693370]  kasan_bitops_generic+0xa0/0xc30
[  142.693961]  kunit_try_run_case+0x11c/0x2e4
[  142.694531]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.695190]  kthread+0x184/0x1a8
[  142.695574]  ret_from_fork+0x14/0x30
[  142.696199] 
[  142.696419] The buggy address belongs to the object at c8fe7800
[  142.696419]  which belongs to the cache kmalloc-64 of size 64
[  142.697625] The buggy address is located 4 bytes inside of
[  142.697625]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.698905] 
[  142.699200] The buggy address belongs to the physical page:
[  142.699820] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.700747] flags: 0x800(slab|zone=0)
[  142.701254] page_type: 0xffffffff()
[  142.701661] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.702475] raw: 00000000
[  142.702994] page dumped because: kasan: bad access detected
[  142.703594] 
[  142.703817] Memory state around the buggy address:
[  142.704479]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.705171]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.705987] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.706663]            ^
[  142.706990]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.707993]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.708676] ==================================================================
[  143.075411] ==================================================================
[  143.076316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[  143.078057] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.078764] 
[  143.079038] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.079918] Hardware name: Generic DT based system
[  143.080457]  unwind_backtrace from show_stack+0x18/0x1c
[  143.081241]  show_stack from dump_stack_lvl+0x58/0x70
[  143.082037]  dump_stack_lvl from print_report+0x164/0x51c
[  143.082776]  print_report from kasan_report+0xc8/0x104
[  143.083452]  kasan_report from kasan_bitops_generic+0x43c/0xc30
[  143.084253]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.085036]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.086032]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.086895]  kthread from ret_from_fork+0x14/0x30
[  143.087523] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.088100] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.089237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.090174] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.090908] 
[  143.091165] Allocated by task 201:
[  143.091533]  kasan_set_track+0x3c/0x5c
[  143.092061]  __kasan_kmalloc+0x8c/0x94
[  143.092780]  kasan_bitops_generic+0xa0/0xc30
[  143.093343]  kunit_try_run_case+0x11c/0x2e4
[  143.093986]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.094622]  kthread+0x184/0x1a8
[  143.095163]  ret_from_fork+0x14/0x30
[  143.095749] 
[  143.095973] The buggy address belongs to the object at c8fe7800
[  143.095973]  which belongs to the cache kmalloc-64 of size 64
[  143.097552] The buggy address is located 4 bytes inside of
[  143.097552]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.098752] 
[  143.099051] The buggy address belongs to the physical page:
[  143.099668] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.100565] flags: 0x800(slab|zone=0)
[  143.101041] page_type: 0xffffffff()
[  143.101473] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.102449] raw: 00000000
[  143.102818] page dumped because: kasan: bad access detected
[  143.103511] 
[  143.103742] Memory state around the buggy address:
[  143.104430]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.105191]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.105877] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.106553]            ^
[  143.106847]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.107979]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.108717] ==================================================================

test log snippet test parser 71

Home

[  143.109989] ==================================================================
[  143.110692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[  143.111573] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.112198] 
[  143.112489] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.113412] Hardware name: Generic DT based system
[  143.114065]  unwind_backtrace from show_stack+0x18/0x1c
[  143.114900]  show_stack from dump_stack_lvl+0x58/0x70
[  143.115562]  dump_stack_lvl from print_report+0x164/0x51c
[  143.116264]  print_report from kasan_report+0xc8/0x104
[  143.116842]  kasan_report from kasan_check_range+0x14c/0x198
[  143.118306]  kasan_check_range from kasan_bitops_generic+0x478/0xc30
[  143.119228]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.120150]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.121095]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.121961]  kthread from ret_from_fork+0x14/0x30
[  143.122537] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.123180] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.124076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.125034] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.125840] 
[  143.126085] Allocated by task 201:
[  143.126473]  kasan_set_track+0x3c/0x5c
[  143.126980]  __kasan_kmalloc+0x8c/0x94
[  143.127827]  kasan_bitops_generic+0xa0/0xc30
[  143.128427]  kunit_try_run_case+0x11c/0x2e4
[  143.129019]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.129779]  kthread+0x184/0x1a8
[  143.130187]  ret_from_fork+0x14/0x30
[  143.130716] 
[  143.131013] The buggy address belongs to the object at c8fe7800
[  143.131013]  which belongs to the cache kmalloc-64 of size 64
[  143.132104] The buggy address is located 4 bytes inside of
[  143.132104]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.133353] 
[  143.133668] The buggy address belongs to the physical page:
[  143.134309] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.135223] flags: 0x800(slab|zone=0)
[  143.135641] page_type: 0xffffffff()
[  143.136209] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.137315] raw: 00000000
[  143.137613] page dumped because: kasan: bad access detected
[  143.138420] 
[  143.138655] Memory state around the buggy address:
[  143.139168]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.140165]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.140954] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.141643]            ^
[  143.141933]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.142764]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.143487] ==================================================================
---
[  142.709799] ==================================================================
[  142.710490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[  142.711337] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.712027] 
[  142.712346] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.713335] Hardware name: Generic DT based system
[  142.713852]  unwind_backtrace from show_stack+0x18/0x1c
[  142.714607]  show_stack from dump_stack_lvl+0x58/0x70
[  142.715274]  dump_stack_lvl from print_report+0x164/0x51c
[  142.715958]  print_report from kasan_report+0xc8/0x104
[  142.716634]  kasan_report from kasan_check_range+0x14c/0x198
[  142.718066]  kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[  142.718895]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.719875]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.720827]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.721691]  kthread from ret_from_fork+0x14/0x30
[  142.722297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.722867] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.723833] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.724756] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.725499] 
[  142.725752] Allocated by task 201:
[  142.726118]  kasan_set_track+0x3c/0x5c
[  142.726754]  __kasan_kmalloc+0x8c/0x94
[  142.727601]  kasan_bitops_generic+0xa0/0xc30
[  142.728368]  kunit_try_run_case+0x11c/0x2e4
[  142.729204]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.729913]  kthread+0x184/0x1a8
[  142.730485]  ret_from_fork+0x14/0x30
[  142.731025] 
[  142.731349] The buggy address belongs to the object at c8fe7800
[  142.731349]  which belongs to the cache kmalloc-64 of size 64
[  142.732639] The buggy address is located 4 bytes inside of
[  142.732639]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.733816] 
[  142.734092] The buggy address belongs to the physical page:
[  142.734607] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.735613] flags: 0x800(slab|zone=0)
[  142.736098] page_type: 0xffffffff()
[  142.736554] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.737580] raw: 00000000
[  142.737977] page dumped because: kasan: bad access detected
[  142.738781] 
[  142.739099] Memory state around the buggy address:
[  142.739687]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.740406]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.741146] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.741846]            ^
[  142.742164]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.742966]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.743733] ==================================================================
---
[  142.931907] ==================================================================
[  142.932892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[  142.933663] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.934476] 
[  142.934727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.935489] Hardware name: Generic DT based system
[  142.936168]  unwind_backtrace from show_stack+0x18/0x1c
[  142.936863]  show_stack from dump_stack_lvl+0x58/0x70
[  142.938285]  dump_stack_lvl from print_report+0x164/0x51c
[  142.939101]  print_report from kasan_report+0xc8/0x104
[  142.939805]  kasan_report from kasan_check_range+0x14c/0x198
[  142.940616]  kasan_check_range from kasan_bitops_generic+0x310/0xc30
[  142.941420]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.942291]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.943254]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.944103]  kthread from ret_from_fork+0x14/0x30
[  142.944819] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.945471] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.946349] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.947235] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.948238] 
[  142.948504] Allocated by task 201:
[  142.948810]  kasan_set_track+0x3c/0x5c
[  142.949091]  __kasan_kmalloc+0x8c/0x94
[  142.949571]  kasan_bitops_generic+0xa0/0xc30
[  142.950225]  kunit_try_run_case+0x11c/0x2e4
[  142.950935]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.951821]  kthread+0x184/0x1a8
[  142.952352]  ret_from_fork+0x14/0x30
[  142.952762] 
[  142.952992] The buggy address belongs to the object at c8fe7800
[  142.952992]  which belongs to the cache kmalloc-64 of size 64
[  142.954370] The buggy address is located 4 bytes inside of
[  142.954370]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.955467] 
[  142.955766] The buggy address belongs to the physical page:
[  142.956484] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.957762] flags: 0x800(slab|zone=0)
[  142.958462] page_type: 0xffffffff()
[  142.958937] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.959716] raw: 00000000
[  142.960105] page dumped because: kasan: bad access detected
[  142.960735] 
[  142.961052] Memory state around the buggy address:
[  142.961666]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.962491]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.963346] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.964316]            ^
[  142.964668]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.965497]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.966412] ==================================================================
---
[  142.744699] ==================================================================
[  142.745586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[  142.746369] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.747767] 
[  142.748104] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.749172] Hardware name: Generic DT based system
[  142.749713]  unwind_backtrace from show_stack+0x18/0x1c
[  142.750636]  show_stack from dump_stack_lvl+0x58/0x70
[  142.751473]  dump_stack_lvl from print_report+0x164/0x51c
[  142.752339]  print_report from kasan_report+0xc8/0x104
[  142.753096]  kasan_report from kasan_check_range+0x14c/0x198
[  142.754011]  kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[  142.755057]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.756117]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.757306]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.758431]  kthread from ret_from_fork+0x14/0x30
[  142.759239] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.759886] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.760922] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.761877] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.762674] 
[  142.762963] Allocated by task 201:
[  142.763441]  kasan_set_track+0x3c/0x5c
[  142.764162]  __kasan_kmalloc+0x8c/0x94
[  142.764843]  kasan_bitops_generic+0xa0/0xc30
[  142.765500]  kunit_try_run_case+0x11c/0x2e4
[  142.766206]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.767036]  kthread+0x184/0x1a8
[  142.767807]  ret_from_fork+0x14/0x30
[  142.768371] 
[  142.768709] The buggy address belongs to the object at c8fe7800
[  142.768709]  which belongs to the cache kmalloc-64 of size 64
[  142.769991] The buggy address is located 4 bytes inside of
[  142.769991]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.771296] 
[  142.771674] The buggy address belongs to the physical page:
[  142.772314] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.773348] flags: 0x800(slab|zone=0)
[  142.773908] page_type: 0xffffffff()
[  142.774614] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.775652] raw: 00000000
[  142.776101] page dumped because: kasan: bad access detected
[  142.776874] 
[  142.777330] Memory state around the buggy address:
[  142.778144]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.778922]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.779672] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.780465]            ^
[  142.780957]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.781740]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.782558] ==================================================================

test log snippet test parser 72

Home

[  142.821019] ==================================================================
[  142.821753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[  142.822458] Write of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.823491] 
[  142.823751] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.824905] Hardware name: Generic DT based system
[  142.825576]  unwind_backtrace from show_stack+0x18/0x1c
[  142.826449]  show_stack from dump_stack_lvl+0x58/0x70
[  142.827959]  dump_stack_lvl from print_report+0x164/0x51c
[  142.828777]  print_report from kasan_report+0xc8/0x104
[  142.829677]  kasan_report from kasan_bitops_generic+0x20c/0xc30
[  142.830594]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.831522]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.832517]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.833425]  kthread from ret_from_fork+0x14/0x30
[  142.834076] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.834759] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.835733] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.836681] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.837784] 
[  142.838181] Allocated by task 201:
[  142.838866]  kasan_set_track+0x3c/0x5c
[  142.839562]  __kasan_kmalloc+0x8c/0x94
[  142.840269]  kasan_bitops_generic+0xa0/0xc30
[  142.841047]  kunit_try_run_case+0x11c/0x2e4
[  142.841668]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.842585]  kthread+0x184/0x1a8
[  142.842908]  ret_from_fork+0x14/0x30
[  142.843511] 
[  142.843741] The buggy address belongs to the object at c8fe7800
[  142.843741]  which belongs to the cache kmalloc-64 of size 64
[  142.845012] The buggy address is located 4 bytes inside of
[  142.845012]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.846091] 
[  142.846404] The buggy address belongs to the physical page:
[  142.847104] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.848174] flags: 0x800(slab|zone=0)
[  142.848646] page_type: 0xffffffff()
[  142.849217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.850212] raw: 00000000
[  142.850575] page dumped because: kasan: bad access detected
[  142.851164] 
[  142.851461] Memory state around the buggy address:
[  142.852000]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.852746]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.853535] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.854269]            ^
[  142.854658]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.855460]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.856177] ==================================================================

test log snippet test parser 73

Home

[  142.859832] ==================================================================
[  142.861730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[  142.862569] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.863198] 
[  142.863495] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.864366] Hardware name: Generic DT based system
[  142.864866]  unwind_backtrace from show_stack+0x18/0x1c
[  142.865652]  show_stack from dump_stack_lvl+0x58/0x70
[  142.866335]  dump_stack_lvl from print_report+0x164/0x51c
[  142.867015]  print_report from kasan_report+0xc8/0x104
[  142.867790]  kasan_report from kasan_bitops_generic+0x26c/0xc30
[  142.868651]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.869577]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.870604]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.871539]  kthread from ret_from_fork+0x14/0x30
[  142.872112] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.872784] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.873712] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.874623] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.875330] 
[  142.875577] Allocated by task 201:
[  142.875938]  kasan_set_track+0x3c/0x5c
[  142.876535]  __kasan_kmalloc+0x8c/0x94
[  142.877050]  kasan_bitops_generic+0xa0/0xc30
[  142.877877]  kunit_try_run_case+0x11c/0x2e4
[  142.878449]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.879220]  kthread+0x184/0x1a8
[  142.879605]  ret_from_fork+0x14/0x30
[  142.880261] 
[  142.880523] The buggy address belongs to the object at c8fe7800
[  142.880523]  which belongs to the cache kmalloc-64 of size 64
[  142.881661] The buggy address is located 4 bytes inside of
[  142.881661]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.882938] 
[  142.883256] The buggy address belongs to the physical page:
[  142.883852] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.884609] flags: 0x800(slab|zone=0)
[  142.885204] page_type: 0xffffffff()
[  142.885651] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.886452] raw: 00000000
[  142.886909] page dumped because: kasan: bad access detected
[  142.887555] 
[  142.888412] Memory state around the buggy address:
[  142.889113]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.889806]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.890551] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.891256]            ^
[  142.891626]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.892426]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.892975] ==================================================================
---
[  142.968010] ==================================================================
[  142.969200] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[  142.969898] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.970457] 
[  142.970761] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.971709] Hardware name: Generic DT based system
[  142.972294]  unwind_backtrace from show_stack+0x18/0x1c
[  142.973052]  show_stack from dump_stack_lvl+0x58/0x70
[  142.973837]  dump_stack_lvl from print_report+0x164/0x51c
[  142.974641]  print_report from kasan_report+0xc8/0x104
[  142.975361]  kasan_report from kasan_bitops_generic+0x318/0xc30
[  142.976236]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.977301]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.978368]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.979228]  kthread from ret_from_fork+0x14/0x30
[  142.979793] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.980504] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.981345] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.982281] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.983149] 
[  142.983395] Allocated by task 201:
[  142.983776]  kasan_set_track+0x3c/0x5c
[  142.984405]  __kasan_kmalloc+0x8c/0x94
[  142.984858]  kasan_bitops_generic+0xa0/0xc30
[  142.985537]  kunit_try_run_case+0x11c/0x2e4
[  142.986076]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.986809]  kthread+0x184/0x1a8
[  142.987284]  ret_from_fork+0x14/0x30
[  142.987846] 
[  142.988067] The buggy address belongs to the object at c8fe7800
[  142.988067]  which belongs to the cache kmalloc-64 of size 64
[  142.989564] The buggy address is located 4 bytes inside of
[  142.989564]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.990678] 
[  142.990993] The buggy address belongs to the physical page:
[  142.991651] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.992585] flags: 0x800(slab|zone=0)
[  142.993089] page_type: 0xffffffff()
[  142.993552] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.994458] raw: 00000000
[  142.994923] page dumped because: kasan: bad access detected
[  142.995444] 
[  142.995815] Memory state around the buggy address:
[  142.996341]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.997310]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.998117] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.998809]            ^
[  142.999197]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.999881]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.000632] ==================================================================
---
[  142.634480] ==================================================================
[  142.636315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[  142.637021] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.638451] 
[  142.638726] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.639636] Hardware name: Generic DT based system
[  142.640424]  unwind_backtrace from show_stack+0x18/0x1c
[  142.641286]  show_stack from dump_stack_lvl+0x58/0x70
[  142.642003]  dump_stack_lvl from print_report+0x164/0x51c
[  142.642874]  print_report from kasan_report+0xc8/0x104
[  142.643635]  kasan_report from kasan_bitops_generic+0x100/0xc30
[  142.644520]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.645401]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.646353]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.647382]  kthread from ret_from_fork+0x14/0x30
[  142.648007] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.648711] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.650577] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.651409] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.652111] 
[  142.652413] Allocated by task 201:
[  142.652837]  kasan_set_track+0x3c/0x5c
[  142.653496]  __kasan_kmalloc+0x8c/0x94
[  142.654046]  kasan_bitops_generic+0xa0/0xc30
[  142.654617]  kunit_try_run_case+0x11c/0x2e4
[  142.655210]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.655796]  kthread+0x184/0x1a8
[  142.656304]  ret_from_fork+0x14/0x30
[  142.656777] 
[  142.657018] The buggy address belongs to the object at c8fe7800
[  142.657018]  which belongs to the cache kmalloc-64 of size 64
[  142.658541] The buggy address is located 4 bytes inside of
[  142.658541]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.659953] 
[  142.660384] The buggy address belongs to the physical page:
[  142.661251] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.662184] flags: 0x800(slab|zone=0)
[  142.662711] page_type: 0xffffffff()
[  142.663234] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.664151] raw: 00000000
[  142.664553] page dumped because: kasan: bad access detected
[  142.665367] 
[  142.665706] Memory state around the buggy address:
[  142.666461]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.667452]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.668460] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.669271]            ^
[  142.669744]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.670602]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.671490] ==================================================================
---
[  143.003618] ==================================================================
[  143.005544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[  143.006360] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.006964] 
[  143.007886] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.008893] Hardware name: Generic DT based system
[  143.009529]  unwind_backtrace from show_stack+0x18/0x1c
[  143.010161]  show_stack from dump_stack_lvl+0x58/0x70
[  143.010930]  dump_stack_lvl from print_report+0x164/0x51c
[  143.011779]  print_report from kasan_report+0xc8/0x104
[  143.012363]  kasan_report from kasan_bitops_generic+0x39c/0xc30
[  143.013257]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.014085]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.015079]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.015930]  kthread from ret_from_fork+0x14/0x30
[  143.016481] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.017430] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.018293] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.019177] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.019908] 
[  143.020224] Allocated by task 201:
[  143.020689]  kasan_set_track+0x3c/0x5c
[  143.021291]  __kasan_kmalloc+0x8c/0x94
[  143.021818]  kasan_bitops_generic+0xa0/0xc30
[  143.022451]  kunit_try_run_case+0x11c/0x2e4
[  143.022973]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.023734]  kthread+0x184/0x1a8
[  143.024163]  ret_from_fork+0x14/0x30
[  143.024703] 
[  143.025037] The buggy address belongs to the object at c8fe7800
[  143.025037]  which belongs to the cache kmalloc-64 of size 64
[  143.026213] The buggy address is located 4 bytes inside of
[  143.026213]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.027632] 
[  143.027910] The buggy address belongs to the physical page:
[  143.028487] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.029310] flags: 0x800(slab|zone=0)
[  143.029758] page_type: 0xffffffff()
[  143.030391] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.031288] raw: 00000000
[  143.031706] page dumped because: kasan: bad access detected
[  143.032343] 
[  143.032605] Memory state around the buggy address:
[  143.033220]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.033905]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.034682] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.035331]            ^
[  143.035789]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.036625]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.037605] ==================================================================
---
[  143.040827] ==================================================================
[  143.042762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[  143.043457] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.044336] 
[  143.044586] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.045369] Hardware name: Generic DT based system
[  143.046041]  unwind_backtrace from show_stack+0x18/0x1c
[  143.046856]  show_stack from dump_stack_lvl+0x58/0x70
[  143.048150]  dump_stack_lvl from print_report+0x164/0x51c
[  143.048859]  print_report from kasan_report+0xc8/0x104
[  143.049576]  kasan_report from kasan_bitops_generic+0x404/0xc30
[  143.050537]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.051390]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.052327]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.053199]  kthread from ret_from_fork+0x14/0x30
[  143.053827] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.054405] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.055354] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.056254] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.056940] 
[  143.057321] Allocated by task 201:
[  143.057761]  kasan_set_track+0x3c/0x5c
[  143.058276]  __kasan_kmalloc+0x8c/0x94
[  143.058820]  kasan_bitops_generic+0xa0/0xc30
[  143.059636]  kunit_try_run_case+0x11c/0x2e4
[  143.060229]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.060811]  kthread+0x184/0x1a8
[  143.061359]  ret_from_fork+0x14/0x30
[  143.061880] 
[  143.062233] The buggy address belongs to the object at c8fe7800
[  143.062233]  which belongs to the cache kmalloc-64 of size 64
[  143.063463] The buggy address is located 4 bytes inside of
[  143.063463]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.064610] 
[  143.064907] The buggy address belongs to the physical page:
[  143.065572] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.066425] flags: 0x800(slab|zone=0)
[  143.066997] page_type: 0xffffffff()
[  143.067728] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.068584] raw: 00000000
[  143.068963] page dumped because: kasan: bad access detected
[  143.069536] 
[  143.069891] Memory state around the buggy address:
[  143.070473]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.071151]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.071860] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.072575]            ^
[  143.072929]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.073718]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.074463] ==================================================================
---
[  142.783779] ==================================================================
[  142.784488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[  142.785420] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.786271] 
[  142.786654] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.788399] Hardware name: Generic DT based system
[  142.789019]  unwind_backtrace from show_stack+0x18/0x1c
[  142.789881]  show_stack from dump_stack_lvl+0x58/0x70
[  142.790658]  dump_stack_lvl from print_report+0x164/0x51c
[  142.791469]  print_report from kasan_report+0xc8/0x104
[  142.792275]  kasan_report from kasan_bitops_generic+0x1f8/0xc30
[  142.793156]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.794068]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.795074]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.796000]  kthread from ret_from_fork+0x14/0x30
[  142.796696] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.797391] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.798552] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.799597] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.800390] 
[  142.800696] Allocated by task 201:
[  142.801291]  kasan_set_track+0x3c/0x5c
[  142.801828]  __kasan_kmalloc+0x8c/0x94
[  142.802528]  kasan_bitops_generic+0xa0/0xc30
[  142.803162]  kunit_try_run_case+0x11c/0x2e4
[  142.803945]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.804678]  kthread+0x184/0x1a8
[  142.805154]  ret_from_fork+0x14/0x30
[  142.805783] 
[  142.806146] The buggy address belongs to the object at c8fe7800
[  142.806146]  which belongs to the cache kmalloc-64 of size 64
[  142.807760] The buggy address is located 4 bytes inside of
[  142.807760]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.809011] 
[  142.809380] The buggy address belongs to the physical page:
[  142.810047] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.811088] flags: 0x800(slab|zone=0)
[  142.811653] page_type: 0xffffffff()
[  142.812149] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.813227] raw: 00000000
[  142.813588] page dumped because: kasan: bad access detected
[  142.814276] 
[  142.814593] Memory state around the buggy address:
[  142.815103]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.816075]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.816946] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.817916]            ^
[  142.818274]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.818956]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.819797] ==================================================================
---
[  142.896310] ==================================================================
[  142.898416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[  142.899495] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.900240] 
[  142.900529] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.901763] Hardware name: Generic DT based system
[  142.902347]  unwind_backtrace from show_stack+0x18/0x1c
[  142.903071]  show_stack from dump_stack_lvl+0x58/0x70
[  142.903778]  dump_stack_lvl from print_report+0x164/0x51c
[  142.904588]  print_report from kasan_report+0xc8/0x104
[  142.905297]  kasan_report from kasan_bitops_generic+0x2d4/0xc30
[  142.906201]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.907013]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.908157]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.908995]  kthread from ret_from_fork+0x14/0x30
[  142.909621] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.910200] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.911054] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.912001] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.912741] 
[  142.912997] Allocated by task 201:
[  142.913451]  kasan_set_track+0x3c/0x5c
[  142.914069]  __kasan_kmalloc+0x8c/0x94
[  142.914582]  kasan_bitops_generic+0xa0/0xc30
[  142.915244]  kunit_try_run_case+0x11c/0x2e4
[  142.915798]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.916534]  kthread+0x184/0x1a8
[  142.916960]  ret_from_fork+0x14/0x30
[  142.917802] 
[  142.918033] The buggy address belongs to the object at c8fe7800
[  142.918033]  which belongs to the cache kmalloc-64 of size 64
[  142.919384] The buggy address is located 4 bytes inside of
[  142.919384]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.920563] 
[  142.920858] The buggy address belongs to the physical page:
[  142.921480] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.922254] flags: 0x800(slab|zone=0)
[  142.922805] page_type: 0xffffffff()
[  142.923217] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.924095] raw: 00000000
[  142.924562] page dumped because: kasan: bad access detected
[  142.925196] 
[  142.925404] Memory state around the buggy address:
[  142.926118]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.926897]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.927884] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.928502]            ^
[  142.929011]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.929913]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.930808] ==================================================================
---
[  142.675353] ==================================================================
[  142.677219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[  142.678700] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  142.679450] 
[  142.679727] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.680552] Hardware name: Generic DT based system
[  142.681204]  unwind_backtrace from show_stack+0x18/0x1c
[  142.682083]  show_stack from dump_stack_lvl+0x58/0x70
[  142.682807]  dump_stack_lvl from print_report+0x164/0x51c
[  142.683533]  print_report from kasan_report+0xc8/0x104
[  142.684159]  kasan_report from kasan_bitops_generic+0x168/0xc30
[  142.685008]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  142.685868]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.686848]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.687686]  kthread from ret_from_fork+0x14/0x30
[  142.688297] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  142.688867] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.689872] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.690751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.691507] 
[  142.691800] Allocated by task 201:
[  142.692229]  kasan_set_track+0x3c/0x5c
[  142.692818]  __kasan_kmalloc+0x8c/0x94
[  142.693370]  kasan_bitops_generic+0xa0/0xc30
[  142.693961]  kunit_try_run_case+0x11c/0x2e4
[  142.694531]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.695190]  kthread+0x184/0x1a8
[  142.695574]  ret_from_fork+0x14/0x30
[  142.696199] 
[  142.696419] The buggy address belongs to the object at c8fe7800
[  142.696419]  which belongs to the cache kmalloc-64 of size 64
[  142.697625] The buggy address is located 4 bytes inside of
[  142.697625]  allocated 5-byte region [c8fe7800, c8fe7805)
[  142.698905] 
[  142.699200] The buggy address belongs to the physical page:
[  142.699820] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.700747] flags: 0x800(slab|zone=0)
[  142.701254] page_type: 0xffffffff()
[  142.701661] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  142.702475] raw: 00000000
[  142.702994] page dumped because: kasan: bad access detected
[  142.703594] 
[  142.703817] Memory state around the buggy address:
[  142.704479]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.705171]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.705987] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.706663]            ^
[  142.706990]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.707993]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.708676] ==================================================================
---
[  143.075411] ==================================================================
[  143.076316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[  143.078057] Read of size 4 at addr c8fe7804 by task kunit_try_catch/201
[  143.078764] 
[  143.079038] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.079918] Hardware name: Generic DT based system
[  143.080457]  unwind_backtrace from show_stack+0x18/0x1c
[  143.081241]  show_stack from dump_stack_lvl+0x58/0x70
[  143.082037]  dump_stack_lvl from print_report+0x164/0x51c
[  143.082776]  print_report from kasan_report+0xc8/0x104
[  143.083452]  kasan_report from kasan_bitops_generic+0x43c/0xc30
[  143.084253]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  143.085036]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.086032]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.086895]  kthread from ret_from_fork+0x14/0x30
[  143.087523] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  143.088100] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.089237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.090174] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.090908] 
[  143.091165] Allocated by task 201:
[  143.091533]  kasan_set_track+0x3c/0x5c
[  143.092061]  __kasan_kmalloc+0x8c/0x94
[  143.092780]  kasan_bitops_generic+0xa0/0xc30
[  143.093343]  kunit_try_run_case+0x11c/0x2e4
[  143.093986]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.094622]  kthread+0x184/0x1a8
[  143.095163]  ret_from_fork+0x14/0x30
[  143.095749] 
[  143.095973] The buggy address belongs to the object at c8fe7800
[  143.095973]  which belongs to the cache kmalloc-64 of size 64
[  143.097552] The buggy address is located 4 bytes inside of
[  143.097552]  allocated 5-byte region [c8fe7800, c8fe7805)
[  143.098752] 
[  143.099051] The buggy address belongs to the physical page:
[  143.099668] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  143.100565] flags: 0x800(slab|zone=0)
[  143.101041] page_type: 0xffffffff()
[  143.101473] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  143.102449] raw: 00000000
[  143.102818] page dumped because: kasan: bad access detected
[  143.103511] 
[  143.103742] Memory state around the buggy address:
[  143.104430]  c8fe7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.105191]  c8fe7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.105877] >c8fe7800: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.106553]            ^
[  143.106847]  c8fe7880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.107979]  c8fe7900: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  143.108717] ==================================================================

test log snippet test parser 74

Home

[  139.939584] ==================================================================
[  139.940734] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1dc
[  139.941422] Write of size 1 at addr c8f79f00 by task kunit_try_catch/127
[  139.942101] 
[  139.942359] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.943328] Hardware name: Generic DT based system
[  139.943928]  unwind_backtrace from show_stack+0x18/0x1c
[  139.944679]  show_stack from dump_stack_lvl+0x58/0x70
[  139.945340]  dump_stack_lvl from print_report+0x164/0x51c
[  139.946013]  print_report from kasan_report+0xc8/0x104
[  139.946801]  kasan_report from kmalloc_large_oob_right+0xcc/0x1dc
[  139.947598]  kmalloc_large_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.948766]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.949715]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.950648]  kthread from ret_from_fork+0x14/0x30
[  139.951189] Exception stack(0xf9efbfb0 to 0xf9efbff8)
[  139.951818] bfa0:                                     00000000 00000000 00000000 00000000
[  139.952650] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.953620] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.954393] 
[  139.954649] Allocated by task 127:
[  139.955013]  kasan_set_track+0x3c/0x5c
[  139.955649]  __kasan_kmalloc+0x8c/0x94
[  139.956177]  kmalloc_large_oob_right+0xa0/0x1dc
[  139.956816]  kunit_try_run_case+0x11c/0x2e4
[  139.957693]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.958349]  kthread+0x184/0x1a8
[  139.958822]  ret_from_fork+0x14/0x30
[  139.959286] 
[  139.959633] The buggy address belongs to the object at c8f78000
[  139.959633]  which belongs to the cache kmalloc-8k of size 8192
[  139.960723] The buggy address is located 0 bytes to the right of
[  139.960723]  allocated 7936-byte region [c8f78000, c8f79f00)
[  139.961914] 
[  139.962216] The buggy address belongs to the physical page:
[  139.962879] page:b889f1d2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f78
[  139.963895] head:b889f1d2 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.964642] flags: 0x840(slab|head|zone=0)
[  139.965208] page_type: 0xffffffff()
[  139.965681] raw: 00000840 c4801a00 00000122 00000000 00000000 80020002 ffffffff 00000001
[  139.966472] raw: 00000000
[  139.966905] page dumped because: kasan: bad access detected
[  139.967884] 
[  139.968139] Memory state around the buggy address:
[  139.968696]  c8f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.969335]  c8f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.970249] >c8f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.970866]            ^
[  139.971325]  c8f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.972088]  c8f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.972924] ==================================================================

test log snippet test parser 75

Home

[  139.939584] ==================================================================
[  139.940734] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1dc
[  139.941422] Write of size 1 at addr c8f79f00 by task kunit_try_catch/127
[  139.942101] 
[  139.942359] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.943328] Hardware name: Generic DT based system
[  139.943928]  unwind_backtrace from show_stack+0x18/0x1c
[  139.944679]  show_stack from dump_stack_lvl+0x58/0x70
[  139.945340]  dump_stack_lvl from print_report+0x164/0x51c
[  139.946013]  print_report from kasan_report+0xc8/0x104
[  139.946801]  kasan_report from kmalloc_large_oob_right+0xcc/0x1dc
[  139.947598]  kmalloc_large_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.948766]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.949715]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.950648]  kthread from ret_from_fork+0x14/0x30
[  139.951189] Exception stack(0xf9efbfb0 to 0xf9efbff8)
[  139.951818] bfa0:                                     00000000 00000000 00000000 00000000
[  139.952650] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.953620] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.954393] 
[  139.954649] Allocated by task 127:
[  139.955013]  kasan_set_track+0x3c/0x5c
[  139.955649]  __kasan_kmalloc+0x8c/0x94
[  139.956177]  kmalloc_large_oob_right+0xa0/0x1dc
[  139.956816]  kunit_try_run_case+0x11c/0x2e4
[  139.957693]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.958349]  kthread+0x184/0x1a8
[  139.958822]  ret_from_fork+0x14/0x30
[  139.959286] 
[  139.959633] The buggy address belongs to the object at c8f78000
[  139.959633]  which belongs to the cache kmalloc-8k of size 8192
[  139.960723] The buggy address is located 0 bytes to the right of
[  139.960723]  allocated 7936-byte region [c8f78000, c8f79f00)
[  139.961914] 
[  139.962216] The buggy address belongs to the physical page:
[  139.962879] page:b889f1d2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f78
[  139.963895] head:b889f1d2 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.964642] flags: 0x840(slab|head|zone=0)
[  139.965208] page_type: 0xffffffff()
[  139.965681] raw: 00000840 c4801a00 00000122 00000000 00000000 80020002 ffffffff 00000001
[  139.966472] raw: 00000000
[  139.966905] page dumped because: kasan: bad access detected
[  139.967884] 
[  139.968139] Memory state around the buggy address:
[  139.968696]  c8f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.969335]  c8f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.970249] >c8f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.970866]            ^
[  139.971325]  c8f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.972088]  c8f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.972924] ==================================================================

test log snippet test parser 76

Home

[  140.923264] ==================================================================
[  140.924459] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e8
[  140.925209] Read of size 64 at addr c4ce1f84 by task kunit_try_catch/155
[  140.925933] 
[  140.926277] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.927475] Hardware name: Generic DT based system
[  140.928208]  unwind_backtrace from show_stack+0x18/0x1c
[  140.928907]  show_stack from dump_stack_lvl+0x58/0x70
[  140.929651]  dump_stack_lvl from print_report+0x164/0x51c
[  140.930525]  print_report from kasan_report+0xc8/0x104
[  140.931258]  kasan_report from kasan_check_range+0x14c/0x198
[  140.932026]  kasan_check_range from __asan_memmove+0x28/0x68
[  140.932889]  __asan_memmove from kmalloc_memmove_invalid_size+0xe4/0x1e8
[  140.933729]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x11c/0x2e4
[  140.934667]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.935653]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.936495]  kthread from ret_from_fork+0x14/0x30
[  140.937294] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[  140.937974] bfa0:                                     00000000 00000000 00000000 00000000
[  140.939023] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.939909] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.940657] 
[  140.940899] Allocated by task 155:
[  140.941280]  kasan_set_track+0x3c/0x5c
[  140.941876]  __kasan_kmalloc+0x8c/0x94
[  140.942359]  kmalloc_memmove_invalid_size+0xa0/0x1e8
[  140.943091]  kunit_try_run_case+0x11c/0x2e4
[  140.943739]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.944400]  kthread+0x184/0x1a8
[  140.944944]  ret_from_fork+0x14/0x30
[  140.945403] 
[  140.945764] The buggy address belongs to the object at c4ce1f80
[  140.945764]  which belongs to the cache kmalloc-64 of size 64
[  140.946939] The buggy address is located 4 bytes inside of
[  140.946939]  allocated 64-byte region [c4ce1f80, c4ce1fc0)
[  140.948299] 
[  140.948603] The buggy address belongs to the physical page:
[  140.949313] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  140.950282] flags: 0x800(slab|zone=0)
[  140.950757] page_type: 0xffffffff()
[  140.951343] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.952301] raw: 00000000
[  140.952612] page dumped because: kasan: bad access detected
[  140.953293] 
[  140.953538] Memory state around the buggy address:
[  140.954199]  c4ce1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.954945]  c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.955813] >c4ce1f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  140.956575]                                    ^
[  140.957394]  c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  140.958196]  c4ce2080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  140.958873] ==================================================================

test log snippet test parser 77

Home

[  140.923264] ==================================================================
[  140.924459] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e8
[  140.925209] Read of size 64 at addr c4ce1f84 by task kunit_try_catch/155
[  140.925933] 
[  140.926277] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.927475] Hardware name: Generic DT based system
[  140.928208]  unwind_backtrace from show_stack+0x18/0x1c
[  140.928907]  show_stack from dump_stack_lvl+0x58/0x70
[  140.929651]  dump_stack_lvl from print_report+0x164/0x51c
[  140.930525]  print_report from kasan_report+0xc8/0x104
[  140.931258]  kasan_report from kasan_check_range+0x14c/0x198
[  140.932026]  kasan_check_range from __asan_memmove+0x28/0x68
[  140.932889]  __asan_memmove from kmalloc_memmove_invalid_size+0xe4/0x1e8
[  140.933729]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x11c/0x2e4
[  140.934667]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.935653]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.936495]  kthread from ret_from_fork+0x14/0x30
[  140.937294] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[  140.937974] bfa0:                                     00000000 00000000 00000000 00000000
[  140.939023] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.939909] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.940657] 
[  140.940899] Allocated by task 155:
[  140.941280]  kasan_set_track+0x3c/0x5c
[  140.941876]  __kasan_kmalloc+0x8c/0x94
[  140.942359]  kmalloc_memmove_invalid_size+0xa0/0x1e8
[  140.943091]  kunit_try_run_case+0x11c/0x2e4
[  140.943739]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.944400]  kthread+0x184/0x1a8
[  140.944944]  ret_from_fork+0x14/0x30
[  140.945403] 
[  140.945764] The buggy address belongs to the object at c4ce1f80
[  140.945764]  which belongs to the cache kmalloc-64 of size 64
[  140.946939] The buggy address is located 4 bytes inside of
[  140.946939]  allocated 64-byte region [c4ce1f80, c4ce1fc0)
[  140.948299] 
[  140.948603] The buggy address belongs to the physical page:
[  140.949313] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  140.950282] flags: 0x800(slab|zone=0)
[  140.950757] page_type: 0xffffffff()
[  140.951343] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.952301] raw: 00000000
[  140.952612] page dumped because: kasan: bad access detected
[  140.953293] 
[  140.953538] Memory state around the buggy address:
[  140.954199]  c4ce1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.954945]  c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.955813] >c4ce1f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  140.956575]                                    ^
[  140.957394]  c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  140.958196]  c4ce2080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  140.958873] ==================================================================

test log snippet test parser 78

Home

[  139.756605] ==================================================================
[  139.758009] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e8
[  139.759591] Read of size 1 at addr c4ded000 by task kunit_try_catch/115
[  139.760350] 
[  139.760699] CPU: 1 PID: 115 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.761657] Hardware name: Generic DT based system
[  139.762220]  unwind_backtrace from show_stack+0x18/0x1c
[  139.763173]  show_stack from dump_stack_lvl+0x58/0x70
[  139.763877]  dump_stack_lvl from print_report+0x164/0x51c
[  139.764488]  print_report from kasan_report+0xc8/0x104
[  139.765355]  kasan_report from kmalloc_node_oob_right+0xd4/0x1e8
[  139.766391]  kmalloc_node_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.767338]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.768278]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.769234]  kthread from ret_from_fork+0x14/0x30
[  139.769762] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[  139.770359] bfa0:                                     00000000 00000000 00000000 00000000
[  139.771306] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.772147] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.772938] 
[  139.773167] Allocated by task 115:
[  139.773737]  kasan_set_track+0x3c/0x5c
[  139.774307]  __kasan_kmalloc+0x8c/0x94
[  139.774809]  kmalloc_node_oob_right+0xa4/0x1e8
[  139.775488]  kunit_try_run_case+0x11c/0x2e4
[  139.776095]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.776802]  kthread+0x184/0x1a8
[  139.777575]  ret_from_fork+0x14/0x30
[  139.778050] 
[  139.778333] The buggy address belongs to the object at c4dec000
[  139.778333]  which belongs to the cache kmalloc-4k of size 4096
[  139.779338] The buggy address is located 0 bytes to the right of
[  139.779338]  allocated 4096-byte region [c4dec000, c4ded000)
[  139.780479] 
[  139.780783] The buggy address belongs to the physical page:
[  139.781605] page:6270766f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44de8
[  139.782499] head:6270766f order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.783419] flags: 0x840(slab|head|zone=0)
[  139.783905] page_type: 0xffffffff()
[  139.784442] raw: 00000840 c4801900 00000122 00000000 00000000 80040004 ffffffff 00000001
[  139.785267] raw: 00000000
[  139.785635] page dumped because: kasan: bad access detected
[  139.786180] 
[  139.786528] Memory state around the buggy address:
[  139.787395]  c4decf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.788149]  c4decf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.788723] >c4ded000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.789658]            ^
[  139.790018]  c4ded080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.790590]  c4ded100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.791416] ==================================================================

test log snippet test parser 79

Home

[  139.756605] ==================================================================
[  139.758009] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e8
[  139.759591] Read of size 1 at addr c4ded000 by task kunit_try_catch/115
[  139.760350] 
[  139.760699] CPU: 1 PID: 115 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.761657] Hardware name: Generic DT based system
[  139.762220]  unwind_backtrace from show_stack+0x18/0x1c
[  139.763173]  show_stack from dump_stack_lvl+0x58/0x70
[  139.763877]  dump_stack_lvl from print_report+0x164/0x51c
[  139.764488]  print_report from kasan_report+0xc8/0x104
[  139.765355]  kasan_report from kmalloc_node_oob_right+0xd4/0x1e8
[  139.766391]  kmalloc_node_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.767338]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.768278]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.769234]  kthread from ret_from_fork+0x14/0x30
[  139.769762] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[  139.770359] bfa0:                                     00000000 00000000 00000000 00000000
[  139.771306] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.772147] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.772938] 
[  139.773167] Allocated by task 115:
[  139.773737]  kasan_set_track+0x3c/0x5c
[  139.774307]  __kasan_kmalloc+0x8c/0x94
[  139.774809]  kmalloc_node_oob_right+0xa4/0x1e8
[  139.775488]  kunit_try_run_case+0x11c/0x2e4
[  139.776095]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.776802]  kthread+0x184/0x1a8
[  139.777575]  ret_from_fork+0x14/0x30
[  139.778050] 
[  139.778333] The buggy address belongs to the object at c4dec000
[  139.778333]  which belongs to the cache kmalloc-4k of size 4096
[  139.779338] The buggy address is located 0 bytes to the right of
[  139.779338]  allocated 4096-byte region [c4dec000, c4ded000)
[  139.780479] 
[  139.780783] The buggy address belongs to the physical page:
[  139.781605] page:6270766f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44de8
[  139.782499] head:6270766f order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.783419] flags: 0x840(slab|head|zone=0)
[  139.783905] page_type: 0xffffffff()
[  139.784442] raw: 00000840 c4801900 00000122 00000000 00000000 80040004 ffffffff 00000001
[  139.785267] raw: 00000000
[  139.785635] page dumped because: kasan: bad access detected
[  139.786180] 
[  139.786528] Memory state around the buggy address:
[  139.787395]  c4decf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.788149]  c4decf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.788723] >c4ded000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.789658]            ^
[  139.790018]  c4ded080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.790590]  c4ded100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.791416] ==================================================================

test log snippet test parser 80

Home

[  140.566267] ==================================================================
[  140.567273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[  140.568298] Write of size 16 at addr c4ce1d80 by task kunit_try_catch/139
[  140.569841] 
[  140.570086] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.571045] Hardware name: Generic DT based system
[  140.571559]  unwind_backtrace from show_stack+0x18/0x1c
[  140.572468]  show_stack from dump_stack_lvl+0x58/0x70
[  140.573181]  dump_stack_lvl from print_report+0x164/0x51c
[  140.573887]  print_report from kasan_report+0xc8/0x104
[  140.574603]  kasan_report from kasan_check_range+0x14c/0x198
[  140.575406]  kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[  140.576197]  kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[  140.577056]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.578254]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.579137]  kthread from ret_from_fork+0x14/0x30
[  140.579839] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[  140.580445] bfa0:                                     00000000 00000000 00000000 00000000
[  140.581391] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.582276] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.583065] 
[  140.583335] Allocated by task 139:
[  140.583685]  kasan_set_track+0x3c/0x5c
[  140.584281]  __kasan_kmalloc+0x8c/0x94
[  140.584856]  kmalloc_oob_16+0xa0/0x24c
[  140.585521]  kunit_try_run_case+0x11c/0x2e4
[  140.586041]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.586801]  kthread+0x184/0x1a8
[  140.587231]  ret_from_fork+0x14/0x30
[  140.588142] 
[  140.588348] The buggy address belongs to the object at c4ce1d80
[  140.588348]  which belongs to the cache kmalloc-64 of size 64
[  140.589613] The buggy address is located 0 bytes inside of
[  140.589613]  allocated 13-byte region [c4ce1d80, c4ce1d8d)
[  140.590748] 
[  140.591003] The buggy address belongs to the physical page:
[  140.591574] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  140.592540] flags: 0x800(slab|zone=0)
[  140.593066] page_type: 0xffffffff()
[  140.593624] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.594415] raw: 00000000
[  140.594889] page dumped because: kasan: bad access detected
[  140.595430] 
[  140.595750] Memory state around the buggy address:
[  140.596291]  c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.596944]  c4ce1d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.597702] >c4ce1d80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.598443]               ^
[  140.598921]  c4ce1e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.600000]  c4ce1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.600851] ==================================================================

test log snippet test parser 81

Home

[  140.566267] ==================================================================
[  140.567273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[  140.568298] Write of size 16 at addr c4ce1d80 by task kunit_try_catch/139
[  140.569841] 
[  140.570086] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.571045] Hardware name: Generic DT based system
[  140.571559]  unwind_backtrace from show_stack+0x18/0x1c
[  140.572468]  show_stack from dump_stack_lvl+0x58/0x70
[  140.573181]  dump_stack_lvl from print_report+0x164/0x51c
[  140.573887]  print_report from kasan_report+0xc8/0x104
[  140.574603]  kasan_report from kasan_check_range+0x14c/0x198
[  140.575406]  kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[  140.576197]  kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[  140.577056]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.578254]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.579137]  kthread from ret_from_fork+0x14/0x30
[  140.579839] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[  140.580445] bfa0:                                     00000000 00000000 00000000 00000000
[  140.581391] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.582276] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.583065] 
[  140.583335] Allocated by task 139:
[  140.583685]  kasan_set_track+0x3c/0x5c
[  140.584281]  __kasan_kmalloc+0x8c/0x94
[  140.584856]  kmalloc_oob_16+0xa0/0x24c
[  140.585521]  kunit_try_run_case+0x11c/0x2e4
[  140.586041]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.586801]  kthread+0x184/0x1a8
[  140.587231]  ret_from_fork+0x14/0x30
[  140.588142] 
[  140.588348] The buggy address belongs to the object at c4ce1d80
[  140.588348]  which belongs to the cache kmalloc-64 of size 64
[  140.589613] The buggy address is located 0 bytes inside of
[  140.589613]  allocated 13-byte region [c4ce1d80, c4ce1d8d)
[  140.590748] 
[  140.591003] The buggy address belongs to the physical page:
[  140.591574] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  140.592540] flags: 0x800(slab|zone=0)
[  140.593066] page_type: 0xffffffff()
[  140.593624] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.594415] raw: 00000000
[  140.594889] page dumped because: kasan: bad access detected
[  140.595430] 
[  140.595750] Memory state around the buggy address:
[  140.596291]  c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.596944]  c4ce1d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.597702] >c4ce1d80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.598443]               ^
[  140.598921]  c4ce1e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.600000]  c4ce1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.600851] ==================================================================

test log snippet test parser 82

Home

[  140.655598] ==================================================================
[  140.656633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1dc
[  140.657454] Write of size 128 at addr c4ce0400 by task kunit_try_catch/143
[  140.658165] 
[  140.658473] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.659442] Hardware name: Generic DT based system
[  140.660013]  unwind_backtrace from show_stack+0x18/0x1c
[  140.660891]  show_stack from dump_stack_lvl+0x58/0x70
[  140.661657]  dump_stack_lvl from print_report+0x164/0x51c
[  140.662439]  print_report from kasan_report+0xc8/0x104
[  140.663166]  kasan_report from kasan_check_range+0x14c/0x198
[  140.664037]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.664798]  __asan_memset from kmalloc_oob_in_memset+0xd8/0x1dc
[  140.665540]  kmalloc_oob_in_memset from kunit_try_run_case+0x11c/0x2e4
[  140.666402]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.667377]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.668276]  kthread from ret_from_fork+0x14/0x30
[  140.669013] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[  140.669760] bfa0:                                     00000000 00000000 00000000 00000000
[  140.670811] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.671874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.672647] 
[  140.672966] Allocated by task 143:
[  140.673392]  kasan_set_track+0x3c/0x5c
[  140.673893]  __kasan_kmalloc+0x8c/0x94
[  140.674570]  kmalloc_oob_in_memset+0xa0/0x1dc
[  140.675142]  kunit_try_run_case+0x11c/0x2e4
[  140.675905]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.676628]  kthread+0x184/0x1a8
[  140.677082]  ret_from_fork+0x14/0x30
[  140.677590] 
[  140.677848] The buggy address belongs to the object at c4ce0400
[  140.677848]  which belongs to the cache kmalloc-128 of size 128
[  140.679081] The buggy address is located 0 bytes inside of
[  140.679081]  allocated 120-byte region [c4ce0400, c4ce0478)
[  140.680196] 
[  140.680520] The buggy address belongs to the physical page:
[  140.681249] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.682107] flags: 0x800(slab|zone=0)
[  140.682565] page_type: 0xffffffff()
[  140.683050] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.684044] raw: 00000000
[  140.684402] page dumped because: kasan: bad access detected
[  140.684992] 
[  140.685290] Memory state around the buggy address:
[  140.685841]  c4ce0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.686587]  c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.687762] >c4ce0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.688512]                                                         ^
[  140.689193]  c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.690764]  c4ce0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.691582] ==================================================================

test log snippet test parser 83

Home

[  140.655598] ==================================================================
[  140.656633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1dc
[  140.657454] Write of size 128 at addr c4ce0400 by task kunit_try_catch/143
[  140.658165] 
[  140.658473] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.659442] Hardware name: Generic DT based system
[  140.660013]  unwind_backtrace from show_stack+0x18/0x1c
[  140.660891]  show_stack from dump_stack_lvl+0x58/0x70
[  140.661657]  dump_stack_lvl from print_report+0x164/0x51c
[  140.662439]  print_report from kasan_report+0xc8/0x104
[  140.663166]  kasan_report from kasan_check_range+0x14c/0x198
[  140.664037]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.664798]  __asan_memset from kmalloc_oob_in_memset+0xd8/0x1dc
[  140.665540]  kmalloc_oob_in_memset from kunit_try_run_case+0x11c/0x2e4
[  140.666402]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.667377]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.668276]  kthread from ret_from_fork+0x14/0x30
[  140.669013] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[  140.669760] bfa0:                                     00000000 00000000 00000000 00000000
[  140.670811] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.671874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.672647] 
[  140.672966] Allocated by task 143:
[  140.673392]  kasan_set_track+0x3c/0x5c
[  140.673893]  __kasan_kmalloc+0x8c/0x94
[  140.674570]  kmalloc_oob_in_memset+0xa0/0x1dc
[  140.675142]  kunit_try_run_case+0x11c/0x2e4
[  140.675905]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.676628]  kthread+0x184/0x1a8
[  140.677082]  ret_from_fork+0x14/0x30
[  140.677590] 
[  140.677848] The buggy address belongs to the object at c4ce0400
[  140.677848]  which belongs to the cache kmalloc-128 of size 128
[  140.679081] The buggy address is located 0 bytes inside of
[  140.679081]  allocated 120-byte region [c4ce0400, c4ce0478)
[  140.680196] 
[  140.680520] The buggy address belongs to the physical page:
[  140.681249] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.682107] flags: 0x800(slab|zone=0)
[  140.682565] page_type: 0xffffffff()
[  140.683050] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.684044] raw: 00000000
[  140.684402] page dumped because: kasan: bad access detected
[  140.684992] 
[  140.685290] Memory state around the buggy address:
[  140.685841]  c4ce0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.686587]  c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.687762] >c4ce0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.688512]                                                         ^
[  140.689193]  c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.690764]  c4ce0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.691582] ==================================================================

test log snippet test parser 84

Home

[  139.705758] ==================================================================
[  139.706876] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1e0
[  139.707567] Read of size 1 at addr c4ce1cff by task kunit_try_catch/113
[  139.708328] 
[  139.708944] CPU: 1 PID: 113 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.709859] Hardware name: Generic DT based system
[  139.710355]  unwind_backtrace from show_stack+0x18/0x1c
[  139.711558]  show_stack from dump_stack_lvl+0x58/0x70
[  139.712304]  dump_stack_lvl from print_report+0x164/0x51c
[  139.713057]  print_report from kasan_report+0xc8/0x104
[  139.713747]  kasan_report from kmalloc_oob_left+0xcc/0x1e0
[  139.714534]  kmalloc_oob_left from kunit_try_run_case+0x11c/0x2e4
[  139.715298]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.716250]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.717107]  kthread from ret_from_fork+0x14/0x30
[  139.717994] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[  139.719266] bfa0:                                     00000000 00000000 00000000 00000000
[  139.720566] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.721483] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.722286] 
[  139.722709] Allocated by task 105:
[  139.723254]  kasan_set_track+0x3c/0x5c
[  139.723969]  __kasan_kmalloc+0x8c/0x94
[  139.724532]  kunit_add_action+0xa0/0x1e8
[  139.725085]  kunit_add_action_or_reset+0x18/0x30
[  139.725704]  kunit_kmalloc_array+0x44/0x60
[  139.726323]  sysctl_test_dointvec_write_happy_single_negative+0x14c/0x334
[  139.727083]  kunit_try_run_case+0x11c/0x2e4
[  139.728049]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.728755]  kthread+0x184/0x1a8
[  139.729261]  ret_from_fork+0x14/0x30
[  139.729759] 
[  139.730008] Freed by task 106:
[  139.730484]  kasan_set_track+0x3c/0x5c
[  139.731038]  kasan_save_free_info+0x30/0x3c
[  139.731549]  __kasan_slab_free+0xdc/0x124
[  139.732148]  __kmem_cache_free+0x140/0x2a8
[  139.732834]  kunit_cleanup+0x44/0x90
[  139.733364]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.734054]  kthread+0x184/0x1a8
[  139.734647]  ret_from_fork+0x14/0x30
[  139.735157] 
[  139.735459] The buggy address belongs to the object at c4ce1c80
[  139.735459]  which belongs to the cache kmalloc-64 of size 64
[  139.736586] The buggy address is located 63 bytes to the right of
[  139.736586]  allocated 64-byte region [c4ce1c80, c4ce1cc0)
[  139.738526] 
[  139.738944] The buggy address belongs to the physical page:
[  139.739709] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  139.740691] flags: 0x800(slab|zone=0)
[  139.741401] page_type: 0xffffffff()
[  139.741875] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  139.742738] raw: 00000000
[  139.743245] page dumped because: kasan: bad access detected
[  139.743894] 
[  139.744111] Memory state around the buggy address:
[  139.744774]  c4ce1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  139.745507]  c4ce1c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  139.746252] >c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  139.747136]                                                         ^
[  139.747722]  c4ce1d00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.748562]  c4ce1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.749594] ==================================================================

test log snippet test parser 85

Home

[  139.705758] ==================================================================
[  139.706876] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1e0
[  139.707567] Read of size 1 at addr c4ce1cff by task kunit_try_catch/113
[  139.708328] 
[  139.708944] CPU: 1 PID: 113 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.709859] Hardware name: Generic DT based system
[  139.710355]  unwind_backtrace from show_stack+0x18/0x1c
[  139.711558]  show_stack from dump_stack_lvl+0x58/0x70
[  139.712304]  dump_stack_lvl from print_report+0x164/0x51c
[  139.713057]  print_report from kasan_report+0xc8/0x104
[  139.713747]  kasan_report from kmalloc_oob_left+0xcc/0x1e0
[  139.714534]  kmalloc_oob_left from kunit_try_run_case+0x11c/0x2e4
[  139.715298]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.716250]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.717107]  kthread from ret_from_fork+0x14/0x30
[  139.717994] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[  139.719266] bfa0:                                     00000000 00000000 00000000 00000000
[  139.720566] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.721483] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.722286] 
[  139.722709] Allocated by task 105:
[  139.723254]  kasan_set_track+0x3c/0x5c
[  139.723969]  __kasan_kmalloc+0x8c/0x94
[  139.724532]  kunit_add_action+0xa0/0x1e8
[  139.725085]  kunit_add_action_or_reset+0x18/0x30
[  139.725704]  kunit_kmalloc_array+0x44/0x60
[  139.726323]  sysctl_test_dointvec_write_happy_single_negative+0x14c/0x334
[  139.727083]  kunit_try_run_case+0x11c/0x2e4
[  139.728049]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.728755]  kthread+0x184/0x1a8
[  139.729261]  ret_from_fork+0x14/0x30
[  139.729759] 
[  139.730008] Freed by task 106:
[  139.730484]  kasan_set_track+0x3c/0x5c
[  139.731038]  kasan_save_free_info+0x30/0x3c
[  139.731549]  __kasan_slab_free+0xdc/0x124
[  139.732148]  __kmem_cache_free+0x140/0x2a8
[  139.732834]  kunit_cleanup+0x44/0x90
[  139.733364]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.734054]  kthread+0x184/0x1a8
[  139.734647]  ret_from_fork+0x14/0x30
[  139.735157] 
[  139.735459] The buggy address belongs to the object at c4ce1c80
[  139.735459]  which belongs to the cache kmalloc-64 of size 64
[  139.736586] The buggy address is located 63 bytes to the right of
[  139.736586]  allocated 64-byte region [c4ce1c80, c4ce1cc0)
[  139.738526] 
[  139.738944] The buggy address belongs to the physical page:
[  139.739709] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  139.740691] flags: 0x800(slab|zone=0)
[  139.741401] page_type: 0xffffffff()
[  139.741875] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  139.742738] raw: 00000000
[  139.743245] page dumped because: kasan: bad access detected
[  139.743894] 
[  139.744111] Memory state around the buggy address:
[  139.744774]  c4ce1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  139.745507]  c4ce1c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  139.746252] >c4ce1c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  139.747136]                                                         ^
[  139.747722]  c4ce1d00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.748562]  c4ce1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.749594] ==================================================================

test log snippet test parser 86

Home

[  140.746324] ==================================================================
[  140.747448] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[  140.748223] Write of size 4 at addr c4ce0675 by task kunit_try_catch/147
[  140.749001] 
[  140.749467] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.750408] Hardware name: Generic DT based system
[  140.751206]  unwind_backtrace from show_stack+0x18/0x1c
[  140.752025]  show_stack from dump_stack_lvl+0x58/0x70
[  140.752813]  dump_stack_lvl from print_report+0x164/0x51c
[  140.753629]  print_report from kasan_report+0xc8/0x104
[  140.754478]  kasan_report from kasan_check_range+0x14c/0x198
[  140.755435]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.756365]  __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[  140.757451]  kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[  140.758944]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.759996]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.760877]  kthread from ret_from_fork+0x14/0x30
[  140.761453] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[  140.762209] bfa0:                                     00000000 00000000 00000000 00000000
[  140.763172] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.764137] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.764923] 
[  140.765254] Allocated by task 147:
[  140.765634]  kasan_set_track+0x3c/0x5c
[  140.766349]  __kasan_kmalloc+0x8c/0x94
[  140.767044]  kmalloc_oob_memset_4+0xa0/0x1e8
[  140.767679]  kunit_try_run_case+0x11c/0x2e4
[  140.768424]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.769264]  kthread+0x184/0x1a8
[  140.769731]  ret_from_fork+0x14/0x30
[  140.770406] 
[  140.770710] The buggy address belongs to the object at c4ce0600
[  140.770710]  which belongs to the cache kmalloc-128 of size 128
[  140.772049] The buggy address is located 117 bytes inside of
[  140.772049]  allocated 120-byte region [c4ce0600, c4ce0678)
[  140.773402] 
[  140.773780] The buggy address belongs to the physical page:
[  140.774508] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.775419] flags: 0x800(slab|zone=0)
[  140.776036] page_type: 0xffffffff()
[  140.776653] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.777823] raw: 00000000
[  140.778379] page dumped because: kasan: bad access detected
[  140.779827] 
[  140.780237] Memory state around the buggy address:
[  140.780795]  c4ce0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.781486]  c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.782359] >c4ce0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.783047]                                                         ^
[  140.783820]  c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.784443]  c4ce0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.785195] ==================================================================
[  140.793868] ==================================================================
[  140.794930] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[  140.795750] Write of size 8 at addr c4ce0771 by task kunit_try_catch/149
[  140.796362] 
[  140.796667] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.798453] Hardware name: Generic DT based system
[  140.799190]  unwind_backtrace from show_stack+0x18/0x1c
[  140.799875]  show_stack from dump_stack_lvl+0x58/0x70
[  140.800565]  dump_stack_lvl from print_report+0x164/0x51c
[  140.801358]  print_report from kasan_report+0xc8/0x104
[  140.802190]  kasan_report from kasan_check_range+0x14c/0x198
[  140.802937]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.803709]  __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[  140.804459]  kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[  140.805310]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.806253]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.807088]  kthread from ret_from_fork+0x14/0x30
[  140.807807] Exception stack(0xf9fa3fb0 to 0xf9fa3ff8)
[  140.808526] 3fa0:                                     00000000 00000000 00000000 00000000
[  140.809436] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.810319] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.810968] 
[  140.811279] Allocated by task 149:
[  140.811717]  kasan_set_track+0x3c/0x5c
[  140.812295]  __kasan_kmalloc+0x8c/0x94
[  140.812868]  kmalloc_oob_memset_8+0xa0/0x1e8
[  140.813445]  kunit_try_run_case+0x11c/0x2e4
[  140.813935]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.814739]  kthread+0x184/0x1a8
[  140.815204]  ret_from_fork+0x14/0x30
[  140.815777] 
[  140.816026] The buggy address belongs to the object at c4ce0700
[  140.816026]  which belongs to the cache kmalloc-128 of size 128
[  140.817701] The buggy address is located 113 bytes inside of
[  140.817701]  allocated 120-byte region [c4ce0700, c4ce0778)
[  140.818843] 
[  140.819094] The buggy address belongs to the physical page:
[  140.819716] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.820618] flags: 0x800(slab|zone=0)
[  140.821071] page_type: 0xffffffff()
[  140.821556] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.822475] raw: 00000000
[  140.822911] page dumped because: kasan: bad access detected
[  140.823546] 
[  140.823842] Memory state around the buggy address:
[  140.824389]  c4ce0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.824984]  c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.825778] >c4ce0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.826539]                                                         ^
[  140.827478]  c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.828230]  c4ce0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.828909] ==================================================================
[  140.836782] ==================================================================
[  140.838219] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[  140.839101] Write of size 16 at addr c4ce0869 by task kunit_try_catch/151
[  140.839954] 
[  140.840265] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.841463] Hardware name: Generic DT based system
[  140.842097]  unwind_backtrace from show_stack+0x18/0x1c
[  140.843029]  show_stack from dump_stack_lvl+0x58/0x70
[  140.843775]  dump_stack_lvl from print_report+0x164/0x51c
[  140.844580]  print_report from kasan_report+0xc8/0x104
[  140.845274]  kasan_report from kasan_check_range+0x14c/0x198
[  140.846086]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.846866]  __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[  140.847850]  kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[  140.848622]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.849622]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.850497]  kthread from ret_from_fork+0x14/0x30
[  140.851082] Exception stack(0xf9fb3fb0 to 0xf9fb3ff8)
[  140.851628] 3fa0:                                     00000000 00000000 00000000 00000000
[  140.852631] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.853632] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.854339] 
[  140.854596] Allocated by task 151:
[  140.855021]  kasan_set_track+0x3c/0x5c
[  140.855525]  __kasan_kmalloc+0x8c/0x94
[  140.856068]  kmalloc_oob_memset_16+0xa0/0x1e0
[  140.856652]  kunit_try_run_case+0x11c/0x2e4
[  140.857280]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.858101]  kthread+0x184/0x1a8
[  140.858732]  ret_from_fork+0x14/0x30
[  140.859384] 
[  140.859836] The buggy address belongs to the object at c4ce0800
[  140.859836]  which belongs to the cache kmalloc-128 of size 128
[  140.861037] The buggy address is located 105 bytes inside of
[  140.861037]  allocated 120-byte region [c4ce0800, c4ce0878)
[  140.861960] 
[  140.862292] The buggy address belongs to the physical page:
[  140.862916] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.863965] flags: 0x800(slab|zone=0)
[  140.864368] page_type: 0xffffffff()
[  140.865047] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.865917] raw: 00000000
[  140.866355] page dumped because: kasan: bad access detected
[  140.866998] 
[  140.867252] Memory state around the buggy address:
[  140.867839]  c4ce0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.868538]  c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.869553] >c4ce0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.870236]                                                         ^
[  140.870904]  c4ce0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.871774]  c4ce0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.872490] ==================================================================
[  140.701195] ==================================================================
[  140.702363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[  140.703005] Write of size 2 at addr c4ce0577 by task kunit_try_catch/145
[  140.703741] 
[  140.703962] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.704843] Hardware name: Generic DT based system
[  140.705566]  unwind_backtrace from show_stack+0x18/0x1c
[  140.706247]  show_stack from dump_stack_lvl+0x58/0x70
[  140.707020]  dump_stack_lvl from print_report+0x164/0x51c
[  140.707910]  print_report from kasan_report+0xc8/0x104
[  140.708717]  kasan_report from kasan_check_range+0x14c/0x198
[  140.709643]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.710414]  __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[  140.711179]  kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[  140.712005]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.713080]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.713947]  kthread from ret_from_fork+0x14/0x30
[  140.714566] Exception stack(0xf9f8bfb0 to 0xf9f8bff8)
[  140.715189] bfa0:                                     00000000 00000000 00000000 00000000
[  140.716111] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.716991] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.718389] 
[  140.718645] Allocated by task 145:
[  140.719149]  kasan_set_track+0x3c/0x5c
[  140.719857]  __kasan_kmalloc+0x8c/0x94
[  140.720486]  kmalloc_oob_memset_2+0xa0/0x1e4
[  140.721096]  kunit_try_run_case+0x11c/0x2e4
[  140.721825]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.722602]  kthread+0x184/0x1a8
[  140.723103]  ret_from_fork+0x14/0x30
[  140.723626] 
[  140.723995] The buggy address belongs to the object at c4ce0500
[  140.723995]  which belongs to the cache kmalloc-128 of size 128
[  140.725325] The buggy address is located 119 bytes inside of
[  140.725325]  allocated 120-byte region [c4ce0500, c4ce0578)
[  140.726686] 
[  140.727009] The buggy address belongs to the physical page:
[  140.727728] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.728658] flags: 0x800(slab|zone=0)
[  140.729283] page_type: 0xffffffff()
[  140.729806] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.730812] raw: 00000000
[  140.731198] page dumped because: kasan: bad access detected
[  140.731878] 
[  140.732211] Memory state around the buggy address:
[  140.732782]  c4ce0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.733610]  c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.734492] >c4ce0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.735239]                                                         ^
[  140.735915]  c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.736741]  c4ce0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.737529] ==================================================================

test log snippet test parser 87

Home

[  140.793868] ==================================================================
[  140.794930] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[  140.795750] Write of size 8 at addr c4ce0771 by task kunit_try_catch/149
[  140.796362] 
[  140.796667] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.798453] Hardware name: Generic DT based system
[  140.799190]  unwind_backtrace from show_stack+0x18/0x1c
[  140.799875]  show_stack from dump_stack_lvl+0x58/0x70
[  140.800565]  dump_stack_lvl from print_report+0x164/0x51c
[  140.801358]  print_report from kasan_report+0xc8/0x104
[  140.802190]  kasan_report from kasan_check_range+0x14c/0x198
[  140.802937]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.803709]  __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[  140.804459]  kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[  140.805310]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.806253]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.807088]  kthread from ret_from_fork+0x14/0x30
[  140.807807] Exception stack(0xf9fa3fb0 to 0xf9fa3ff8)
[  140.808526] 3fa0:                                     00000000 00000000 00000000 00000000
[  140.809436] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.810319] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.810968] 
[  140.811279] Allocated by task 149:
[  140.811717]  kasan_set_track+0x3c/0x5c
[  140.812295]  __kasan_kmalloc+0x8c/0x94
[  140.812868]  kmalloc_oob_memset_8+0xa0/0x1e8
[  140.813445]  kunit_try_run_case+0x11c/0x2e4
[  140.813935]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.814739]  kthread+0x184/0x1a8
[  140.815204]  ret_from_fork+0x14/0x30
[  140.815777] 
[  140.816026] The buggy address belongs to the object at c4ce0700
[  140.816026]  which belongs to the cache kmalloc-128 of size 128
[  140.817701] The buggy address is located 113 bytes inside of
[  140.817701]  allocated 120-byte region [c4ce0700, c4ce0778)
[  140.818843] 
[  140.819094] The buggy address belongs to the physical page:
[  140.819716] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.820618] flags: 0x800(slab|zone=0)
[  140.821071] page_type: 0xffffffff()
[  140.821556] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.822475] raw: 00000000
[  140.822911] page dumped because: kasan: bad access detected
[  140.823546] 
[  140.823842] Memory state around the buggy address:
[  140.824389]  c4ce0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.824984]  c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.825778] >c4ce0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.826539]                                                         ^
[  140.827478]  c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.828230]  c4ce0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.828909] ==================================================================
---
[  140.836782] ==================================================================
[  140.838219] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[  140.839101] Write of size 16 at addr c4ce0869 by task kunit_try_catch/151
[  140.839954] 
[  140.840265] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.841463] Hardware name: Generic DT based system
[  140.842097]  unwind_backtrace from show_stack+0x18/0x1c
[  140.843029]  show_stack from dump_stack_lvl+0x58/0x70
[  140.843775]  dump_stack_lvl from print_report+0x164/0x51c
[  140.844580]  print_report from kasan_report+0xc8/0x104
[  140.845274]  kasan_report from kasan_check_range+0x14c/0x198
[  140.846086]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.846866]  __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[  140.847850]  kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[  140.848622]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.849622]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.850497]  kthread from ret_from_fork+0x14/0x30
[  140.851082] Exception stack(0xf9fb3fb0 to 0xf9fb3ff8)
[  140.851628] 3fa0:                                     00000000 00000000 00000000 00000000
[  140.852631] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.853632] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.854339] 
[  140.854596] Allocated by task 151:
[  140.855021]  kasan_set_track+0x3c/0x5c
[  140.855525]  __kasan_kmalloc+0x8c/0x94
[  140.856068]  kmalloc_oob_memset_16+0xa0/0x1e0
[  140.856652]  kunit_try_run_case+0x11c/0x2e4
[  140.857280]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.858101]  kthread+0x184/0x1a8
[  140.858732]  ret_from_fork+0x14/0x30
[  140.859384] 
[  140.859836] The buggy address belongs to the object at c4ce0800
[  140.859836]  which belongs to the cache kmalloc-128 of size 128
[  140.861037] The buggy address is located 105 bytes inside of
[  140.861037]  allocated 120-byte region [c4ce0800, c4ce0878)
[  140.861960] 
[  140.862292] The buggy address belongs to the physical page:
[  140.862916] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.863965] flags: 0x800(slab|zone=0)
[  140.864368] page_type: 0xffffffff()
[  140.865047] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.865917] raw: 00000000
[  140.866355] page dumped because: kasan: bad access detected
[  140.866998] 
[  140.867252] Memory state around the buggy address:
[  140.867839]  c4ce0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.868538]  c4ce0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.869553] >c4ce0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.870236]                                                         ^
[  140.870904]  c4ce0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.871774]  c4ce0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.872490] ==================================================================

test log snippet test parser 88

Home

[  140.746324] ==================================================================
[  140.747448] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[  140.748223] Write of size 4 at addr c4ce0675 by task kunit_try_catch/147
[  140.749001] 
[  140.749467] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.750408] Hardware name: Generic DT based system
[  140.751206]  unwind_backtrace from show_stack+0x18/0x1c
[  140.752025]  show_stack from dump_stack_lvl+0x58/0x70
[  140.752813]  dump_stack_lvl from print_report+0x164/0x51c
[  140.753629]  print_report from kasan_report+0xc8/0x104
[  140.754478]  kasan_report from kasan_check_range+0x14c/0x198
[  140.755435]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.756365]  __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[  140.757451]  kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[  140.758944]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.759996]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.760877]  kthread from ret_from_fork+0x14/0x30
[  140.761453] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[  140.762209] bfa0:                                     00000000 00000000 00000000 00000000
[  140.763172] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.764137] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.764923] 
[  140.765254] Allocated by task 147:
[  140.765634]  kasan_set_track+0x3c/0x5c
[  140.766349]  __kasan_kmalloc+0x8c/0x94
[  140.767044]  kmalloc_oob_memset_4+0xa0/0x1e8
[  140.767679]  kunit_try_run_case+0x11c/0x2e4
[  140.768424]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.769264]  kthread+0x184/0x1a8
[  140.769731]  ret_from_fork+0x14/0x30
[  140.770406] 
[  140.770710] The buggy address belongs to the object at c4ce0600
[  140.770710]  which belongs to the cache kmalloc-128 of size 128
[  140.772049] The buggy address is located 117 bytes inside of
[  140.772049]  allocated 120-byte region [c4ce0600, c4ce0678)
[  140.773402] 
[  140.773780] The buggy address belongs to the physical page:
[  140.774508] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.775419] flags: 0x800(slab|zone=0)
[  140.776036] page_type: 0xffffffff()
[  140.776653] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.777823] raw: 00000000
[  140.778379] page dumped because: kasan: bad access detected
[  140.779827] 
[  140.780237] Memory state around the buggy address:
[  140.780795]  c4ce0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.781486]  c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.782359] >c4ce0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.783047]                                                         ^
[  140.783820]  c4ce0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.784443]  c4ce0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.785195] ==================================================================
---
[  140.701195] ==================================================================
[  140.702363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[  140.703005] Write of size 2 at addr c4ce0577 by task kunit_try_catch/145
[  140.703741] 
[  140.703962] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.704843] Hardware name: Generic DT based system
[  140.705566]  unwind_backtrace from show_stack+0x18/0x1c
[  140.706247]  show_stack from dump_stack_lvl+0x58/0x70
[  140.707020]  dump_stack_lvl from print_report+0x164/0x51c
[  140.707910]  print_report from kasan_report+0xc8/0x104
[  140.708717]  kasan_report from kasan_check_range+0x14c/0x198
[  140.709643]  kasan_check_range from __asan_memset+0x20/0x3c
[  140.710414]  __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[  140.711179]  kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[  140.712005]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.713080]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.713947]  kthread from ret_from_fork+0x14/0x30
[  140.714566] Exception stack(0xf9f8bfb0 to 0xf9f8bff8)
[  140.715189] bfa0:                                     00000000 00000000 00000000 00000000
[  140.716111] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.716991] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.718389] 
[  140.718645] Allocated by task 145:
[  140.719149]  kasan_set_track+0x3c/0x5c
[  140.719857]  __kasan_kmalloc+0x8c/0x94
[  140.720486]  kmalloc_oob_memset_2+0xa0/0x1e4
[  140.721096]  kunit_try_run_case+0x11c/0x2e4
[  140.721825]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.722602]  kthread+0x184/0x1a8
[  140.723103]  ret_from_fork+0x14/0x30
[  140.723626] 
[  140.723995] The buggy address belongs to the object at c4ce0500
[  140.723995]  which belongs to the cache kmalloc-128 of size 128
[  140.725325] The buggy address is located 119 bytes inside of
[  140.725325]  allocated 120-byte region [c4ce0500, c4ce0578)
[  140.726686] 
[  140.727009] The buggy address belongs to the physical page:
[  140.727728] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  140.728658] flags: 0x800(slab|zone=0)
[  140.729283] page_type: 0xffffffff()
[  140.729806] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.730812] raw: 00000000
[  140.731198] page dumped because: kasan: bad access detected
[  140.731878] 
[  140.732211] Memory state around the buggy address:
[  140.732782]  c4ce0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.733610]  c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.734492] >c4ce0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  140.735239]                                                         ^
[  140.735915]  c4ce0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.736741]  c4ce0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.737529] ==================================================================

test log snippet test parser 89

Home

[  139.665623] ==================================================================
[  139.666294] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320
[  139.667011] Read of size 1 at addr c4ce0380 by task kunit_try_catch/111
[  139.668255] 
[  139.668624] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.669695] Hardware name: Generic DT based system
[  139.670266]  unwind_backtrace from show_stack+0x18/0x1c
[  139.671000]  show_stack from dump_stack_lvl+0x58/0x70
[  139.671683]  dump_stack_lvl from print_report+0x164/0x51c
[  139.672419]  print_report from kasan_report+0xc8/0x104
[  139.673150]  kasan_report from kmalloc_oob_right+0x134/0x320
[  139.673900]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.674802]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.675744]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.676656]  kthread from ret_from_fork+0x14/0x30
[  139.677317] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[  139.678085] bfa0:                                     00000000 00000000 00000000 00000000
[  139.678959] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.679888] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.680629] 
[  139.680873] Allocated by task 111:
[  139.681257]  kasan_set_track+0x3c/0x5c
[  139.681906]  __kasan_kmalloc+0x8c/0x94
[  139.682435]  kmalloc_oob_right+0xa0/0x320
[  139.682957]  kunit_try_run_case+0x11c/0x2e4
[  139.683454]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.684245]  kthread+0x184/0x1a8
[  139.684673]  ret_from_fork+0x14/0x30
[  139.685262] 
[  139.685502] The buggy address belongs to the object at c4ce0300
[  139.685502]  which belongs to the cache kmalloc-128 of size 128
[  139.686813] The buggy address is located 13 bytes to the right of
[  139.686813]  allocated 115-byte region [c4ce0300, c4ce0373)
[  139.688525] 
[  139.688751] The buggy address belongs to the physical page:
[  139.689657] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  139.690514] flags: 0x800(slab|zone=0)
[  139.690931] page_type: 0xffffffff()
[  139.691559] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  139.692385] raw: 00000000
[  139.692798] page dumped because: kasan: bad access detected
[  139.693312] 
[  139.693684] Memory state around the buggy address:
[  139.694245]  c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.694951]  c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  139.695715] >c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.696435]            ^
[  139.696841]  c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.697705]  c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.699173] ==================================================================
[  139.584880] ==================================================================
[  139.586077] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320
[  139.586931] Write of size 1 at addr c4ce0373 by task kunit_try_catch/111
[  139.588471] 
[  139.589089] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G                 N 6.6.72-rc1 #1
[  139.590065] Hardware name: Generic DT based system
[  139.590827]  unwind_backtrace from show_stack+0x18/0x1c
[  139.591638]  show_stack from dump_stack_lvl+0x58/0x70
[  139.592462]  dump_stack_lvl from print_report+0x164/0x51c
[  139.593288]  print_report from kasan_report+0xc8/0x104
[  139.594058]  kasan_report from kmalloc_oob_right+0xcc/0x320
[  139.594950]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.595757]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.596765]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.598156]  kthread from ret_from_fork+0x14/0x30
[  139.598982] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[  139.599600] bfa0:                                     00000000 00000000 00000000 00000000
[  139.600484] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.601646] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.602517] 
[  139.602834] Allocated by task 111:
[  139.603487]  kasan_set_track+0x3c/0x5c
[  139.604078]  __kasan_kmalloc+0x8c/0x94
[  139.604648]  kmalloc_oob_right+0xa0/0x320
[  139.605168]  kunit_try_run_case+0x11c/0x2e4
[  139.605669]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.606511]  kthread+0x184/0x1a8
[  139.606977]  ret_from_fork+0x14/0x30
[  139.607492] 
[  139.607921] The buggy address belongs to the object at c4ce0300
[  139.607921]  which belongs to the cache kmalloc-128 of size 128
[  139.609422] The buggy address is located 0 bytes to the right of
[  139.609422]  allocated 115-byte region [c4ce0300, c4ce0373)
[  139.610777] 
[  139.611248] The buggy address belongs to the physical page:
[  139.612266] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  139.613844] flags: 0x800(slab|zone=0)
[  139.614880] page_type: 0xffffffff()
[  139.616000] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  139.616929] raw: 00000000
[  139.617514] page dumped because: kasan: bad access detected
[  139.618262] 
[  139.618582] Memory state around the buggy address:
[  139.619572]  c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.620373]  c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.621283] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  139.622057]                                                      ^
[  139.622943]  c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.623800]  c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.624494] ==================================================================
[  139.628883] ==================================================================
[  139.629606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320
[  139.630409] Write of size 1 at addr c4ce0378 by task kunit_try_catch/111
[  139.631076] 
[  139.631317] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.632229] Hardware name: Generic DT based system
[  139.632887]  unwind_backtrace from show_stack+0x18/0x1c
[  139.633649]  show_stack from dump_stack_lvl+0x58/0x70
[  139.634325]  dump_stack_lvl from print_report+0x164/0x51c
[  139.635117]  print_report from kasan_report+0xc8/0x104
[  139.635865]  kasan_report from kmalloc_oob_right+0x100/0x320
[  139.636634]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.637453]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.638676]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.639679]  kthread from ret_from_fork+0x14/0x30
[  139.640419] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[  139.641032] bfa0:                                     00000000 00000000 00000000 00000000
[  139.641894] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.642828] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.643643] 
[  139.643938] Allocated by task 111:
[  139.644446]  kasan_set_track+0x3c/0x5c
[  139.645001]  __kasan_kmalloc+0x8c/0x94
[  139.645599]  kmalloc_oob_right+0xa0/0x320
[  139.646095]  kunit_try_run_case+0x11c/0x2e4
[  139.646784]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.647676]  kthread+0x184/0x1a8
[  139.648683]  ret_from_fork+0x14/0x30
[  139.649232] 
[  139.649484] The buggy address belongs to the object at c4ce0300
[  139.649484]  which belongs to the cache kmalloc-128 of size 128
[  139.650774] The buggy address is located 5 bytes to the right of
[  139.650774]  allocated 115-byte region [c4ce0300, c4ce0373)
[  139.652048] 
[  139.652334] The buggy address belongs to the physical page:
[  139.653001] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  139.653933] flags: 0x800(slab|zone=0)
[  139.654485] page_type: 0xffffffff()
[  139.655001] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  139.655858] raw: 00000000
[  139.656350] page dumped because: kasan: bad access detected
[  139.656928] 
[  139.657296] Memory state around the buggy address:
[  139.658034]  c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.659032]  c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.659753] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  139.660477]                                                         ^
[  139.661212]  c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.661977]  c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.662677] ==================================================================

test log snippet test parser 90

Home

[  139.584880] ==================================================================
[  139.586077] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320
[  139.586931] Write of size 1 at addr c4ce0373 by task kunit_try_catch/111
[  139.588471] 
[  139.589089] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G                 N 6.6.72-rc1 #1
[  139.590065] Hardware name: Generic DT based system
[  139.590827]  unwind_backtrace from show_stack+0x18/0x1c
[  139.591638]  show_stack from dump_stack_lvl+0x58/0x70
[  139.592462]  dump_stack_lvl from print_report+0x164/0x51c
[  139.593288]  print_report from kasan_report+0xc8/0x104
[  139.594058]  kasan_report from kmalloc_oob_right+0xcc/0x320
[  139.594950]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.595757]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.596765]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.598156]  kthread from ret_from_fork+0x14/0x30
[  139.598982] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[  139.599600] bfa0:                                     00000000 00000000 00000000 00000000
[  139.600484] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.601646] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.602517] 
[  139.602834] Allocated by task 111:
[  139.603487]  kasan_set_track+0x3c/0x5c
[  139.604078]  __kasan_kmalloc+0x8c/0x94
[  139.604648]  kmalloc_oob_right+0xa0/0x320
[  139.605168]  kunit_try_run_case+0x11c/0x2e4
[  139.605669]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.606511]  kthread+0x184/0x1a8
[  139.606977]  ret_from_fork+0x14/0x30
[  139.607492] 
[  139.607921] The buggy address belongs to the object at c4ce0300
[  139.607921]  which belongs to the cache kmalloc-128 of size 128
[  139.609422] The buggy address is located 0 bytes to the right of
[  139.609422]  allocated 115-byte region [c4ce0300, c4ce0373)
[  139.610777] 
[  139.611248] The buggy address belongs to the physical page:
[  139.612266] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  139.613844] flags: 0x800(slab|zone=0)
[  139.614880] page_type: 0xffffffff()
[  139.616000] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  139.616929] raw: 00000000
[  139.617514] page dumped because: kasan: bad access detected
[  139.618262] 
[  139.618582] Memory state around the buggy address:
[  139.619572]  c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.620373]  c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.621283] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  139.622057]                                                      ^
[  139.622943]  c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.623800]  c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.624494] ==================================================================

test log snippet test parser 91

Home

[  139.665623] ==================================================================
[  139.666294] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320
[  139.667011] Read of size 1 at addr c4ce0380 by task kunit_try_catch/111
[  139.668255] 
[  139.668624] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.669695] Hardware name: Generic DT based system
[  139.670266]  unwind_backtrace from show_stack+0x18/0x1c
[  139.671000]  show_stack from dump_stack_lvl+0x58/0x70
[  139.671683]  dump_stack_lvl from print_report+0x164/0x51c
[  139.672419]  print_report from kasan_report+0xc8/0x104
[  139.673150]  kasan_report from kmalloc_oob_right+0x134/0x320
[  139.673900]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.674802]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.675744]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.676656]  kthread from ret_from_fork+0x14/0x30
[  139.677317] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[  139.678085] bfa0:                                     00000000 00000000 00000000 00000000
[  139.678959] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.679888] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.680629] 
[  139.680873] Allocated by task 111:
[  139.681257]  kasan_set_track+0x3c/0x5c
[  139.681906]  __kasan_kmalloc+0x8c/0x94
[  139.682435]  kmalloc_oob_right+0xa0/0x320
[  139.682957]  kunit_try_run_case+0x11c/0x2e4
[  139.683454]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.684245]  kthread+0x184/0x1a8
[  139.684673]  ret_from_fork+0x14/0x30
[  139.685262] 
[  139.685502] The buggy address belongs to the object at c4ce0300
[  139.685502]  which belongs to the cache kmalloc-128 of size 128
[  139.686813] The buggy address is located 13 bytes to the right of
[  139.686813]  allocated 115-byte region [c4ce0300, c4ce0373)
[  139.688525] 
[  139.688751] The buggy address belongs to the physical page:
[  139.689657] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  139.690514] flags: 0x800(slab|zone=0)
[  139.690931] page_type: 0xffffffff()
[  139.691559] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  139.692385] raw: 00000000
[  139.692798] page dumped because: kasan: bad access detected
[  139.693312] 
[  139.693684] Memory state around the buggy address:
[  139.694245]  c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.694951]  c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  139.695715] >c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.696435]            ^
[  139.696841]  c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.697705]  c4ce0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.699173] ==================================================================

test log snippet test parser 92

Home

[  139.628883] ==================================================================
[  139.629606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320
[  139.630409] Write of size 1 at addr c4ce0378 by task kunit_try_catch/111
[  139.631076] 
[  139.631317] CPU: 1 PID: 111 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.632229] Hardware name: Generic DT based system
[  139.632887]  unwind_backtrace from show_stack+0x18/0x1c
[  139.633649]  show_stack from dump_stack_lvl+0x58/0x70
[  139.634325]  dump_stack_lvl from print_report+0x164/0x51c
[  139.635117]  print_report from kasan_report+0xc8/0x104
[  139.635865]  kasan_report from kmalloc_oob_right+0x100/0x320
[  139.636634]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.637453]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.638676]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.639679]  kthread from ret_from_fork+0x14/0x30
[  139.640419] Exception stack(0xf9e8bfb0 to 0xf9e8bff8)
[  139.641032] bfa0:                                     00000000 00000000 00000000 00000000
[  139.641894] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.642828] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.643643] 
[  139.643938] Allocated by task 111:
[  139.644446]  kasan_set_track+0x3c/0x5c
[  139.645001]  __kasan_kmalloc+0x8c/0x94
[  139.645599]  kmalloc_oob_right+0xa0/0x320
[  139.646095]  kunit_try_run_case+0x11c/0x2e4
[  139.646784]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.647676]  kthread+0x184/0x1a8
[  139.648683]  ret_from_fork+0x14/0x30
[  139.649232] 
[  139.649484] The buggy address belongs to the object at c4ce0300
[  139.649484]  which belongs to the cache kmalloc-128 of size 128
[  139.650774] The buggy address is located 5 bytes to the right of
[  139.650774]  allocated 115-byte region [c4ce0300, c4ce0373)
[  139.652048] 
[  139.652334] The buggy address belongs to the physical page:
[  139.653001] page:7227c21f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce0
[  139.653933] flags: 0x800(slab|zone=0)
[  139.654485] page_type: 0xffffffff()
[  139.655001] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  139.655858] raw: 00000000
[  139.656350] page dumped because: kasan: bad access detected
[  139.656928] 
[  139.657296] Memory state around the buggy address:
[  139.658034]  c4ce0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  139.659032]  c4ce0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.659753] >c4ce0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  139.660477]                                                         ^
[  139.661212]  c4ce0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.661977]  c4ce0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.662677] ==================================================================

test log snippet test parser 93

Home

[  139.798376] ==================================================================
[  139.799514] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1bc
[  139.800333] Write of size 1 at addr c8f1600a by task kunit_try_catch/117
[  139.801019] 
[  139.801272] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.802172] Hardware name: Generic DT based system
[  139.802872]  unwind_backtrace from show_stack+0x18/0x1c
[  139.803554]  show_stack from dump_stack_lvl+0x58/0x70
[  139.804261]  dump_stack_lvl from print_report+0x164/0x51c
[  139.804880]  print_report from kasan_report+0xc8/0x104
[  139.805669]  kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1bc
[  139.806587]  kmalloc_pagealloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.807883]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.808904]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.809888]  kthread from ret_from_fork+0x14/0x30
[  139.810535] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[  139.811155] bfa0:                                     00000000 00000000 00000000 00000000
[  139.812006] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.812970] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.813671] 
[  139.813976] The buggy address belongs to the physical page:
[  139.814600] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  139.815520] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.816408] flags: 0x40(head|zone=0)
[  139.816850] page_type: 0xffffffff()
[  139.817354] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  139.818415] raw: 00000000
[  139.818757] page dumped because: kasan: bad access detected
[  139.819362] 
[  139.819700] Memory state around the buggy address:
[  139.820229]  c8f15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.820959]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.821705] >c8f16000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  139.822428]               ^
[  139.822835]  c8f16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  139.823722]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  139.824370] ==================================================================

test log snippet test parser 94

Home

[  139.798376] ==================================================================
[  139.799514] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1bc
[  139.800333] Write of size 1 at addr c8f1600a by task kunit_try_catch/117
[  139.801019] 
[  139.801272] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.802172] Hardware name: Generic DT based system
[  139.802872]  unwind_backtrace from show_stack+0x18/0x1c
[  139.803554]  show_stack from dump_stack_lvl+0x58/0x70
[  139.804261]  dump_stack_lvl from print_report+0x164/0x51c
[  139.804880]  print_report from kasan_report+0xc8/0x104
[  139.805669]  kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1bc
[  139.806587]  kmalloc_pagealloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  139.807883]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.808904]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.809888]  kthread from ret_from_fork+0x14/0x30
[  139.810535] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[  139.811155] bfa0:                                     00000000 00000000 00000000 00000000
[  139.812006] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.812970] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.813671] 
[  139.813976] The buggy address belongs to the physical page:
[  139.814600] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  139.815520] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  139.816408] flags: 0x40(head|zone=0)
[  139.816850] page_type: 0xffffffff()
[  139.817354] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  139.818415] raw: 00000000
[  139.818757] page dumped because: kasan: bad access detected
[  139.819362] 
[  139.819700] Memory state around the buggy address:
[  139.820229]  c8f15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.820959]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  139.821705] >c8f16000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  139.822428]               ^
[  139.822835]  c8f16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  139.823722]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  139.824370] ==================================================================

test log snippet test parser 95

Home

[  141.132303] ==================================================================
[  141.133407] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[  141.134074] Read of size 1 at addr c4ce60c8 by task kunit_try_catch/169
[  141.134837] 
[  141.135186] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.136274] Hardware name: Generic DT based system
[  141.136888]  unwind_backtrace from show_stack+0x18/0x1c
[  141.137790]  show_stack from dump_stack_lvl+0x58/0x70
[  141.138645]  dump_stack_lvl from print_report+0x164/0x51c
[  141.139450]  print_report from kasan_report+0xc8/0x104
[  141.140256]  kasan_report from kmem_cache_oob+0xd4/0x248
[  141.141026]  kmem_cache_oob from kunit_try_run_case+0x11c/0x2e4
[  141.141875]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.142908]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.143828]  kthread from ret_from_fork+0x14/0x30
[  141.144585] Exception stack(0xfa02bfb0 to 0xfa02bff8)
[  141.145287] bfa0:                                     00000000 00000000 00000000 00000000
[  141.146263] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.147378] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.148233] 
[  141.148376] Allocated by task 169:
[  141.148607]  kasan_set_track+0x3c/0x5c
[  141.148881]  __kasan_slab_alloc+0x60/0x68
[  141.149201]  kmem_cache_alloc+0x1dc/0x574
[  141.149840]  kmem_cache_oob+0xb0/0x248
[  141.150575]  kunit_try_run_case+0x11c/0x2e4
[  141.151262]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.152251]  kthread+0x184/0x1a8
[  141.152848]  ret_from_fork+0x14/0x30
[  141.153376] 
[  141.153758] The buggy address belongs to the object at c4ce6000
[  141.153758]  which belongs to the cache test_cache of size 200
[  141.155051] The buggy address is located 0 bytes to the right of
[  141.155051]  allocated 200-byte region [c4ce6000, c4ce60c8)
[  141.156384] 
[  141.156768] The buggy address belongs to the physical page:
[  141.157448] page:d4781242 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce6
[  141.158649] flags: 0x800(slab|zone=0)
[  141.159192] page_type: 0xffffffff()
[  141.159703] raw: 00000800 c4ce3000 00000122 00000000 00000000 800f000f ffffffff 00000001
[  141.160758] raw: 00000000
[  141.161162] page dumped because: kasan: bad access detected
[  141.161873] 
[  141.162248] Memory state around the buggy address:
[  141.162857]  c4ce5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.163788]  c4ce6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.164647] >c4ce6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  141.165404]                                       ^
[  141.165972]  c4ce6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.166810]  c4ce6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.167958] ==================================================================

test log snippet test parser 96

Home

[  141.132303] ==================================================================
[  141.133407] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[  141.134074] Read of size 1 at addr c4ce60c8 by task kunit_try_catch/169
[  141.134837] 
[  141.135186] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.136274] Hardware name: Generic DT based system
[  141.136888]  unwind_backtrace from show_stack+0x18/0x1c
[  141.137790]  show_stack from dump_stack_lvl+0x58/0x70
[  141.138645]  dump_stack_lvl from print_report+0x164/0x51c
[  141.139450]  print_report from kasan_report+0xc8/0x104
[  141.140256]  kasan_report from kmem_cache_oob+0xd4/0x248
[  141.141026]  kmem_cache_oob from kunit_try_run_case+0x11c/0x2e4
[  141.141875]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.142908]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.143828]  kthread from ret_from_fork+0x14/0x30
[  141.144585] Exception stack(0xfa02bfb0 to 0xfa02bff8)
[  141.145287] bfa0:                                     00000000 00000000 00000000 00000000
[  141.146263] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.147378] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.148233] 
[  141.148376] Allocated by task 169:
[  141.148607]  kasan_set_track+0x3c/0x5c
[  141.148881]  __kasan_slab_alloc+0x60/0x68
[  141.149201]  kmem_cache_alloc+0x1dc/0x574
[  141.149840]  kmem_cache_oob+0xb0/0x248
[  141.150575]  kunit_try_run_case+0x11c/0x2e4
[  141.151262]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.152251]  kthread+0x184/0x1a8
[  141.152848]  ret_from_fork+0x14/0x30
[  141.153376] 
[  141.153758] The buggy address belongs to the object at c4ce6000
[  141.153758]  which belongs to the cache test_cache of size 200
[  141.155051] The buggy address is located 0 bytes to the right of
[  141.155051]  allocated 200-byte region [c4ce6000, c4ce60c8)
[  141.156384] 
[  141.156768] The buggy address belongs to the physical page:
[  141.157448] page:d4781242 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce6
[  141.158649] flags: 0x800(slab|zone=0)
[  141.159192] page_type: 0xffffffff()
[  141.159703] raw: 00000800 c4ce3000 00000122 00000000 00000000 800f000f ffffffff 00000001
[  141.160758] raw: 00000000
[  141.161162] page dumped because: kasan: bad access detected
[  141.161873] 
[  141.162248] Memory state around the buggy address:
[  141.162857]  c4ce5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.163788]  c4ce6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.164647] >c4ce6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  141.165404]                                       ^
[  141.165972]  c4ce6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.166810]  c4ce6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.167958] ==================================================================

test log snippet test parser 97

Home

[  140.135101] ==================================================================
[  140.135950] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  140.136907] Write of size 1 at addr c4d5e4da by task kunit_try_catch/131
[  140.138004] 
[  140.138466] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.139660] Hardware name: Generic DT based system
[  140.140242]  unwind_backtrace from show_stack+0x18/0x1c
[  140.141350]  show_stack from dump_stack_lvl+0x58/0x70
[  140.142088]  dump_stack_lvl from print_report+0x164/0x51c
[  140.143043]  print_report from kasan_report+0xc8/0x104
[  140.143952]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  140.144832]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.145759]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.146742]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.147673]  kthread from ret_from_fork+0x14/0x30
[  140.148361] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.149025] bfa0:                                     00000000 00000000 00000000 00000000
[  140.149969] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.150859] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.151639] 
[  140.151936] Allocated by task 131:
[  140.152502]  kasan_set_track+0x3c/0x5c
[  140.153215]  __kasan_krealloc+0xe0/0x104
[  140.153852]  krealloc+0xd4/0x134
[  140.154403]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.155045]  kunit_try_run_case+0x11c/0x2e4
[  140.155666]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.156451]  kthread+0x184/0x1a8
[  140.156921]  ret_from_fork+0x14/0x30
[  140.157561] 
[  140.158035] The buggy address belongs to the object at c4d5e400
[  140.158035]  which belongs to the cache kmalloc-256 of size 256
[  140.160205] The buggy address is located 17 bytes to the right of
[  140.160205]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.161803] 
[  140.162216] The buggy address belongs to the physical page:
[  140.163226] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.163965] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.164782] flags: 0x840(slab|head|zone=0)
[  140.165394] page_type: 0xffffffff()
[  140.165814] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.166730] raw: 00000000
[  140.167061] page dumped because: kasan: bad access detected
[  140.167768] 
[  140.168001] Memory state around the buggy address:
[  140.168593]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.169353]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.170114] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.170857]                                             ^
[  140.171461]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.172251]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.172950] ==================================================================
[  140.357394] ==================================================================
[  140.358088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  140.358882] Write of size 1 at addr c8f160d0 by task kunit_try_catch/135
[  140.359661] 
[  140.359927] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.360854] Hardware name: Generic DT based system
[  140.361511]  unwind_backtrace from show_stack+0x18/0x1c
[  140.362204]  show_stack from dump_stack_lvl+0x58/0x70
[  140.362947]  dump_stack_lvl from print_report+0x164/0x51c
[  140.363670]  print_report from kasan_report+0xc8/0x104
[  140.364461]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  140.365333]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.366174]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.367051]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.367994]  kthread from ret_from_fork+0x14/0x30
[  140.368666] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.369315] bfa0:                                     00000000 00000000 00000000 00000000
[  140.370298] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.371194] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.372035] 
[  140.372331] The buggy address belongs to the physical page:
[  140.373043] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.373922] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.374718] flags: 0x40(head|zone=0)
[  140.375215] page_type: 0xffffffff()
[  140.375695] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.376465] raw: 00000000
[  140.376886] page dumped because: kasan: bad access detected
[  140.377533] 
[  140.377797] Memory state around the buggy address:
[  140.378479]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.379200]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.379962] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.380731]                                          ^
[  140.381368]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.382169]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.383034] ==================================================================
[  140.384088] ==================================================================
[  140.384650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  140.385790] Write of size 1 at addr c8f160da by task kunit_try_catch/135
[  140.386482] 
[  140.386782] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.387460] Hardware name: Generic DT based system
[  140.388116]  unwind_backtrace from show_stack+0x18/0x1c
[  140.389665]  show_stack from dump_stack_lvl+0x58/0x70
[  140.390959]  dump_stack_lvl from print_report+0x164/0x51c
[  140.392387]  print_report from kasan_report+0xc8/0x104
[  140.392974]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  140.393790]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.394655]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.395708]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.396720]  kthread from ret_from_fork+0x14/0x30
[  140.397338] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.397908] bfa0:                                     00000000 00000000 00000000 00000000
[  140.398914] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.399809] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.400505] 
[  140.400827] The buggy address belongs to the physical page:
[  140.401398] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.402191] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.403002] flags: 0x40(head|zone=0)
[  140.403467] page_type: 0xffffffff()
[  140.403919] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.404812] raw: 00000000
[  140.405158] page dumped because: kasan: bad access detected
[  140.405724] 
[  140.406014] Memory state around the buggy address:
[  140.406601]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.407303]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.408651] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.409640]                                             ^
[  140.410194]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.410995]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.411682] ==================================================================
[  140.439588] ==================================================================
[  140.440388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  140.441140] Write of size 1 at addr c8f160eb by task kunit_try_catch/135
[  140.441871] 
[  140.442195] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.442978] Hardware name: Generic DT based system
[  140.444060]  unwind_backtrace from show_stack+0x18/0x1c
[  140.445227]  show_stack from dump_stack_lvl+0x58/0x70
[  140.445870]  dump_stack_lvl from print_report+0x164/0x51c
[  140.446553]  print_report from kasan_report+0xc8/0x104
[  140.447289]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  140.448562]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.449455]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.450427]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.451267]  kthread from ret_from_fork+0x14/0x30
[  140.451874] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.452387] bfa0:                                     00000000 00000000 00000000 00000000
[  140.453348] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.454190] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.454953] 
[  140.455256] The buggy address belongs to the physical page:
[  140.455856] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.456684] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.457527] flags: 0x40(head|zone=0)
[  140.458091] page_type: 0xffffffff()
[  140.458558] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.459401] raw: 00000000
[  140.459862] page dumped because: kasan: bad access detected
[  140.460452] 
[  140.460701] Memory state around the buggy address:
[  140.461374]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.462085]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.462916] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.463605]                                                   ^
[  140.464264]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.464948]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.465667] ==================================================================
[  140.412685] ==================================================================
[  140.413391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  140.414013] Write of size 1 at addr c8f160ea by task kunit_try_catch/135
[  140.415268] 
[  140.415792] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.416636] Hardware name: Generic DT based system
[  140.417233]  unwind_backtrace from show_stack+0x18/0x1c
[  140.417893]  show_stack from dump_stack_lvl+0x58/0x70
[  140.418573]  dump_stack_lvl from print_report+0x164/0x51c
[  140.419414]  print_report from kasan_report+0xc8/0x104
[  140.420191]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  140.421008]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.421884]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.422887]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.423821]  kthread from ret_from_fork+0x14/0x30
[  140.424416] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.425023] bfa0:                                     00000000 00000000 00000000 00000000
[  140.425946] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.426801] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.427723] 
[  140.427949] The buggy address belongs to the physical page:
[  140.428878] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.429958] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.430757] flags: 0x40(head|zone=0)
[  140.431237] page_type: 0xffffffff()
[  140.431667] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.432475] raw: 00000000
[  140.432901] page dumped because: kasan: bad access detected
[  140.433401] 
[  140.433728] Memory state around the buggy address:
[  140.434313]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.435041]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.435771] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.436467]                                                   ^
[  140.437147]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.437864]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.438510] ==================================================================
[  140.213812] ==================================================================
[  140.214673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  140.215698] Write of size 1 at addr c4d5e4eb by task kunit_try_catch/131
[  140.216478] 
[  140.216851] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.218800] Hardware name: Generic DT based system
[  140.219438]  unwind_backtrace from show_stack+0x18/0x1c
[  140.220385]  show_stack from dump_stack_lvl+0x58/0x70
[  140.221177]  dump_stack_lvl from print_report+0x164/0x51c
[  140.222038]  print_report from kasan_report+0xc8/0x104
[  140.222819]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  140.223789]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.224665]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.225695]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.226607]  kthread from ret_from_fork+0x14/0x30
[  140.227295] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.227959] bfa0:                                     00000000 00000000 00000000 00000000
[  140.228913] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.229863] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.230658] 
[  140.230971] Allocated by task 131:
[  140.231588]  kasan_set_track+0x3c/0x5c
[  140.232199]  __kasan_krealloc+0xe0/0x104
[  140.232857]  krealloc+0xd4/0x134
[  140.233483]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.234215]  kunit_try_run_case+0x11c/0x2e4
[  140.234832]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.235606]  kthread+0x184/0x1a8
[  140.236089]  ret_from_fork+0x14/0x30
[  140.236677] 
[  140.236946] The buggy address belongs to the object at c4d5e400
[  140.236946]  which belongs to the cache kmalloc-256 of size 256
[  140.238898] The buggy address is located 34 bytes to the right of
[  140.238898]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.239983] 
[  140.240375] The buggy address belongs to the physical page:
[  140.241227] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.242171] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.243093] flags: 0x840(slab|head|zone=0)
[  140.243767] page_type: 0xffffffff()
[  140.244323] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.245290] raw: 00000000
[  140.245633] page dumped because: kasan: bad access detected
[  140.246378] 
[  140.246717] Memory state around the buggy address:
[  140.247364]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.248171]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.248918] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.249689]                                                   ^
[  140.250382]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.251168]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.251974] ==================================================================
[  140.062183] ==================================================================
[  140.063236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  140.064016] Write of size 1 at addr c4d5e4c9 by task kunit_try_catch/131
[  140.064710] 
[  140.064976] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.065786] Hardware name: Generic DT based system
[  140.066336]  unwind_backtrace from show_stack+0x18/0x1c
[  140.067021]  show_stack from dump_stack_lvl+0x58/0x70
[  140.067938]  dump_stack_lvl from print_report+0x164/0x51c
[  140.068711]  print_report from kasan_report+0xc8/0x104
[  140.069389]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  140.070182]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.071232]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.072163]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.072992]  kthread from ret_from_fork+0x14/0x30
[  140.073608] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.074248] bfa0:                                     00000000 00000000 00000000 00000000
[  140.074987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.075920] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.076629] 
[  140.076945] Allocated by task 131:
[  140.077491]  kasan_set_track+0x3c/0x5c
[  140.078154]  __kasan_krealloc+0xe0/0x104
[  140.078738]  krealloc+0xd4/0x134
[  140.079400]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.080030]  kunit_try_run_case+0x11c/0x2e4
[  140.080572]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.081372]  kthread+0x184/0x1a8
[  140.081887]  ret_from_fork+0x14/0x30
[  140.082385] 
[  140.082595] The buggy address belongs to the object at c4d5e400
[  140.082595]  which belongs to the cache kmalloc-256 of size 256
[  140.084056] The buggy address is located 0 bytes to the right of
[  140.084056]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.085164] 
[  140.085500] The buggy address belongs to the physical page:
[  140.086109] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.086960] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.087951] flags: 0x840(slab|head|zone=0)
[  140.088492] page_type: 0xffffffff()
[  140.088965] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.089809] raw: 00000000
[  140.090115] page dumped because: kasan: bad access detected
[  140.090728] 
[  140.090999] Memory state around the buggy address:
[  140.091630]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.092492]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.093264] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.093959]                                       ^
[  140.094510]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.095266]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.095960] ==================================================================
[  140.098485] ==================================================================
[  140.099407] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  140.100201] Write of size 1 at addr c4d5e4d0 by task kunit_try_catch/131
[  140.100870] 
[  140.101188] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.102114] Hardware name: Generic DT based system
[  140.102546]  unwind_backtrace from show_stack+0x18/0x1c
[  140.103406]  show_stack from dump_stack_lvl+0x58/0x70
[  140.104153]  dump_stack_lvl from print_report+0x164/0x51c
[  140.104816]  print_report from kasan_report+0xc8/0x104
[  140.105653]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  140.106537]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.107405]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.108452]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.109400]  kthread from ret_from_fork+0x14/0x30
[  140.109962] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.110671] bfa0:                                     00000000 00000000 00000000 00000000
[  140.111570] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.112507] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.113313] 
[  140.113540] Allocated by task 131:
[  140.114067]  kasan_set_track+0x3c/0x5c
[  140.114538]  __kasan_krealloc+0xe0/0x104
[  140.115196]  krealloc+0xd4/0x134
[  140.115603]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.116389]  kunit_try_run_case+0x11c/0x2e4
[  140.116963]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.117715]  kthread+0x184/0x1a8
[  140.118426]  ret_from_fork+0x14/0x30
[  140.118998] 
[  140.119709] The buggy address belongs to the object at c4d5e400
[  140.119709]  which belongs to the cache kmalloc-256 of size 256
[  140.121090] The buggy address is located 7 bytes to the right of
[  140.121090]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.122237] 
[  140.122514] The buggy address belongs to the physical page:
[  140.123335] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.124329] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.125172] flags: 0x840(slab|head|zone=0)
[  140.125728] page_type: 0xffffffff()
[  140.126166] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.127049] raw: 00000000
[  140.127453] page dumped because: kasan: bad access detected
[  140.128031] 
[  140.128453] Memory state around the buggy address:
[  140.129051]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.129918]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.130694] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.131560]                                          ^
[  140.132203]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.133035]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.133784] ==================================================================
[  140.174005] ==================================================================
[  140.174995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  140.176021] Write of size 1 at addr c4d5e4ea by task kunit_try_catch/131
[  140.176895] 
[  140.177716] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.179608] Hardware name: Generic DT based system
[  140.180144]  unwind_backtrace from show_stack+0x18/0x1c
[  140.180781]  show_stack from dump_stack_lvl+0x58/0x70
[  140.181614]  dump_stack_lvl from print_report+0x164/0x51c
[  140.182377]  print_report from kasan_report+0xc8/0x104
[  140.183031]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  140.183961]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.184850]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.185787]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.186638]  kthread from ret_from_fork+0x14/0x30
[  140.187314] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.187941] bfa0:                                     00000000 00000000 00000000 00000000
[  140.188883] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.189914] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.190690] 
[  140.190971] Allocated by task 131:
[  140.191551]  kasan_set_track+0x3c/0x5c
[  140.192082]  __kasan_krealloc+0xe0/0x104
[  140.192705]  krealloc+0xd4/0x134
[  140.193213]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.193904]  kunit_try_run_case+0x11c/0x2e4
[  140.194461]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.195318]  kthread+0x184/0x1a8
[  140.195830]  ret_from_fork+0x14/0x30
[  140.196275] 
[  140.196630] The buggy address belongs to the object at c4d5e400
[  140.196630]  which belongs to the cache kmalloc-256 of size 256
[  140.198487] The buggy address is located 33 bytes to the right of
[  140.198487]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.199753] 
[  140.199984] The buggy address belongs to the physical page:
[  140.201140] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.202071] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.202939] flags: 0x840(slab|head|zone=0)
[  140.203598] page_type: 0xffffffff()
[  140.204209] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.205195] raw: 00000000
[  140.205565] page dumped because: kasan: bad access detected
[  140.206258] 
[  140.206589] Memory state around the buggy address:
[  140.207233]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.208191]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.209032] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.209789]                                                   ^
[  140.210543]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.211363]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.212141] ==================================================================
[  140.325940] ==================================================================
[  140.327188] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  140.328288] Write of size 1 at addr c8f160c9 by task kunit_try_catch/135
[  140.328928] 
[  140.329325] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.330426] Hardware name: Generic DT based system
[  140.331026]  unwind_backtrace from show_stack+0x18/0x1c
[  140.331817]  show_stack from dump_stack_lvl+0x58/0x70
[  140.332587]  dump_stack_lvl from print_report+0x164/0x51c
[  140.333265]  print_report from kasan_report+0xc8/0x104
[  140.334051]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  140.334899]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.335786]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.336877]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.337831]  kthread from ret_from_fork+0x14/0x30
[  140.338782] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.339638] bfa0:                                     00000000 00000000 00000000 00000000
[  140.340533] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.341465] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.342158] 
[  140.342425] The buggy address belongs to the physical page:
[  140.342958] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.343908] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.344640] flags: 0x40(head|zone=0)
[  140.345144] page_type: 0xffffffff()
[  140.345585] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.346455] raw: 00000000
[  140.346892] page dumped because: kasan: bad access detected
[  140.347544] 
[  140.347784] Memory state around the buggy address:
[  140.348407]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.349227]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.350026] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.350785]                                       ^
[  140.351420]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.352115]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.352710] ==================================================================

test log snippet test parser 98

Home

[  140.384088] ==================================================================
[  140.384650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  140.385790] Write of size 1 at addr c8f160da by task kunit_try_catch/135
[  140.386482] 
[  140.386782] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.387460] Hardware name: Generic DT based system
[  140.388116]  unwind_backtrace from show_stack+0x18/0x1c
[  140.389665]  show_stack from dump_stack_lvl+0x58/0x70
[  140.390959]  dump_stack_lvl from print_report+0x164/0x51c
[  140.392387]  print_report from kasan_report+0xc8/0x104
[  140.392974]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  140.393790]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.394655]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.395708]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.396720]  kthread from ret_from_fork+0x14/0x30
[  140.397338] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.397908] bfa0:                                     00000000 00000000 00000000 00000000
[  140.398914] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.399809] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.400505] 
[  140.400827] The buggy address belongs to the physical page:
[  140.401398] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.402191] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.403002] flags: 0x40(head|zone=0)
[  140.403467] page_type: 0xffffffff()
[  140.403919] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.404812] raw: 00000000
[  140.405158] page dumped because: kasan: bad access detected
[  140.405724] 
[  140.406014] Memory state around the buggy address:
[  140.406601]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.407303]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.408651] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.409640]                                             ^
[  140.410194]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.410995]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.411682] ==================================================================

test log snippet test parser 99

Home

[  140.439588] ==================================================================
[  140.440388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  140.441140] Write of size 1 at addr c8f160eb by task kunit_try_catch/135
[  140.441871] 
[  140.442195] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.442978] Hardware name: Generic DT based system
[  140.444060]  unwind_backtrace from show_stack+0x18/0x1c
[  140.445227]  show_stack from dump_stack_lvl+0x58/0x70
[  140.445870]  dump_stack_lvl from print_report+0x164/0x51c
[  140.446553]  print_report from kasan_report+0xc8/0x104
[  140.447289]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  140.448562]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.449455]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.450427]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.451267]  kthread from ret_from_fork+0x14/0x30
[  140.451874] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.452387] bfa0:                                     00000000 00000000 00000000 00000000
[  140.453348] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.454190] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.454953] 
[  140.455256] The buggy address belongs to the physical page:
[  140.455856] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.456684] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.457527] flags: 0x40(head|zone=0)
[  140.458091] page_type: 0xffffffff()
[  140.458558] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.459401] raw: 00000000
[  140.459862] page dumped because: kasan: bad access detected
[  140.460452] 
[  140.460701] Memory state around the buggy address:
[  140.461374]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.462085]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.462916] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.463605]                                                   ^
[  140.464264]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.464948]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.465667] ==================================================================

test log snippet test parser 100

Home

[  140.098485] ==================================================================
[  140.099407] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  140.100201] Write of size 1 at addr c4d5e4d0 by task kunit_try_catch/131
[  140.100870] 
[  140.101188] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.102114] Hardware name: Generic DT based system
[  140.102546]  unwind_backtrace from show_stack+0x18/0x1c
[  140.103406]  show_stack from dump_stack_lvl+0x58/0x70
[  140.104153]  dump_stack_lvl from print_report+0x164/0x51c
[  140.104816]  print_report from kasan_report+0xc8/0x104
[  140.105653]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  140.106537]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.107405]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.108452]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.109400]  kthread from ret_from_fork+0x14/0x30
[  140.109962] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.110671] bfa0:                                     00000000 00000000 00000000 00000000
[  140.111570] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.112507] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.113313] 
[  140.113540] Allocated by task 131:
[  140.114067]  kasan_set_track+0x3c/0x5c
[  140.114538]  __kasan_krealloc+0xe0/0x104
[  140.115196]  krealloc+0xd4/0x134
[  140.115603]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.116389]  kunit_try_run_case+0x11c/0x2e4
[  140.116963]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.117715]  kthread+0x184/0x1a8
[  140.118426]  ret_from_fork+0x14/0x30
[  140.118998] 
[  140.119709] The buggy address belongs to the object at c4d5e400
[  140.119709]  which belongs to the cache kmalloc-256 of size 256
[  140.121090] The buggy address is located 7 bytes to the right of
[  140.121090]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.122237] 
[  140.122514] The buggy address belongs to the physical page:
[  140.123335] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.124329] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.125172] flags: 0x840(slab|head|zone=0)
[  140.125728] page_type: 0xffffffff()
[  140.126166] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.127049] raw: 00000000
[  140.127453] page dumped because: kasan: bad access detected
[  140.128031] 
[  140.128453] Memory state around the buggy address:
[  140.129051]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.129918]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.130694] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.131560]                                          ^
[  140.132203]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.133035]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.133784] ==================================================================

test log snippet test parser 101

Home

[  140.062183] ==================================================================
[  140.063236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  140.064016] Write of size 1 at addr c4d5e4c9 by task kunit_try_catch/131
[  140.064710] 
[  140.064976] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.065786] Hardware name: Generic DT based system
[  140.066336]  unwind_backtrace from show_stack+0x18/0x1c
[  140.067021]  show_stack from dump_stack_lvl+0x58/0x70
[  140.067938]  dump_stack_lvl from print_report+0x164/0x51c
[  140.068711]  print_report from kasan_report+0xc8/0x104
[  140.069389]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  140.070182]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.071232]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.072163]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.072992]  kthread from ret_from_fork+0x14/0x30
[  140.073608] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.074248] bfa0:                                     00000000 00000000 00000000 00000000
[  140.074987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.075920] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.076629] 
[  140.076945] Allocated by task 131:
[  140.077491]  kasan_set_track+0x3c/0x5c
[  140.078154]  __kasan_krealloc+0xe0/0x104
[  140.078738]  krealloc+0xd4/0x134
[  140.079400]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.080030]  kunit_try_run_case+0x11c/0x2e4
[  140.080572]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.081372]  kthread+0x184/0x1a8
[  140.081887]  ret_from_fork+0x14/0x30
[  140.082385] 
[  140.082595] The buggy address belongs to the object at c4d5e400
[  140.082595]  which belongs to the cache kmalloc-256 of size 256
[  140.084056] The buggy address is located 0 bytes to the right of
[  140.084056]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.085164] 
[  140.085500] The buggy address belongs to the physical page:
[  140.086109] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.086960] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.087951] flags: 0x840(slab|head|zone=0)
[  140.088492] page_type: 0xffffffff()
[  140.088965] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.089809] raw: 00000000
[  140.090115] page dumped because: kasan: bad access detected
[  140.090728] 
[  140.090999] Memory state around the buggy address:
[  140.091630]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.092492]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.093264] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.093959]                                       ^
[  140.094510]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.095266]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.095960] ==================================================================

test log snippet test parser 102

Home

[  140.174005] ==================================================================
[  140.174995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  140.176021] Write of size 1 at addr c4d5e4ea by task kunit_try_catch/131
[  140.176895] 
[  140.177716] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.179608] Hardware name: Generic DT based system
[  140.180144]  unwind_backtrace from show_stack+0x18/0x1c
[  140.180781]  show_stack from dump_stack_lvl+0x58/0x70
[  140.181614]  dump_stack_lvl from print_report+0x164/0x51c
[  140.182377]  print_report from kasan_report+0xc8/0x104
[  140.183031]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  140.183961]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.184850]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.185787]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.186638]  kthread from ret_from_fork+0x14/0x30
[  140.187314] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.187941] bfa0:                                     00000000 00000000 00000000 00000000
[  140.188883] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.189914] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.190690] 
[  140.190971] Allocated by task 131:
[  140.191551]  kasan_set_track+0x3c/0x5c
[  140.192082]  __kasan_krealloc+0xe0/0x104
[  140.192705]  krealloc+0xd4/0x134
[  140.193213]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.193904]  kunit_try_run_case+0x11c/0x2e4
[  140.194461]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.195318]  kthread+0x184/0x1a8
[  140.195830]  ret_from_fork+0x14/0x30
[  140.196275] 
[  140.196630] The buggy address belongs to the object at c4d5e400
[  140.196630]  which belongs to the cache kmalloc-256 of size 256
[  140.198487] The buggy address is located 33 bytes to the right of
[  140.198487]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.199753] 
[  140.199984] The buggy address belongs to the physical page:
[  140.201140] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.202071] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.202939] flags: 0x840(slab|head|zone=0)
[  140.203598] page_type: 0xffffffff()
[  140.204209] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.205195] raw: 00000000
[  140.205565] page dumped because: kasan: bad access detected
[  140.206258] 
[  140.206589] Memory state around the buggy address:
[  140.207233]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.208191]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.209032] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.209789]                                                   ^
[  140.210543]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.211363]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.212141] ==================================================================

test log snippet test parser 103

Home

[  140.135101] ==================================================================
[  140.135950] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  140.136907] Write of size 1 at addr c4d5e4da by task kunit_try_catch/131
[  140.138004] 
[  140.138466] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.139660] Hardware name: Generic DT based system
[  140.140242]  unwind_backtrace from show_stack+0x18/0x1c
[  140.141350]  show_stack from dump_stack_lvl+0x58/0x70
[  140.142088]  dump_stack_lvl from print_report+0x164/0x51c
[  140.143043]  print_report from kasan_report+0xc8/0x104
[  140.143952]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  140.144832]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.145759]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.146742]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.147673]  kthread from ret_from_fork+0x14/0x30
[  140.148361] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.149025] bfa0:                                     00000000 00000000 00000000 00000000
[  140.149969] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.150859] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.151639] 
[  140.151936] Allocated by task 131:
[  140.152502]  kasan_set_track+0x3c/0x5c
[  140.153215]  __kasan_krealloc+0xe0/0x104
[  140.153852]  krealloc+0xd4/0x134
[  140.154403]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.155045]  kunit_try_run_case+0x11c/0x2e4
[  140.155666]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.156451]  kthread+0x184/0x1a8
[  140.156921]  ret_from_fork+0x14/0x30
[  140.157561] 
[  140.158035] The buggy address belongs to the object at c4d5e400
[  140.158035]  which belongs to the cache kmalloc-256 of size 256
[  140.160205] The buggy address is located 17 bytes to the right of
[  140.160205]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.161803] 
[  140.162216] The buggy address belongs to the physical page:
[  140.163226] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.163965] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.164782] flags: 0x840(slab|head|zone=0)
[  140.165394] page_type: 0xffffffff()
[  140.165814] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.166730] raw: 00000000
[  140.167061] page dumped because: kasan: bad access detected
[  140.167768] 
[  140.168001] Memory state around the buggy address:
[  140.168593]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.169353]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.170114] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.170857]                                             ^
[  140.171461]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.172251]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.172950] ==================================================================

test log snippet test parser 104

Home

[  140.412685] ==================================================================
[  140.413391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  140.414013] Write of size 1 at addr c8f160ea by task kunit_try_catch/135
[  140.415268] 
[  140.415792] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.416636] Hardware name: Generic DT based system
[  140.417233]  unwind_backtrace from show_stack+0x18/0x1c
[  140.417893]  show_stack from dump_stack_lvl+0x58/0x70
[  140.418573]  dump_stack_lvl from print_report+0x164/0x51c
[  140.419414]  print_report from kasan_report+0xc8/0x104
[  140.420191]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  140.421008]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.421884]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.422887]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.423821]  kthread from ret_from_fork+0x14/0x30
[  140.424416] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.425023] bfa0:                                     00000000 00000000 00000000 00000000
[  140.425946] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.426801] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.427723] 
[  140.427949] The buggy address belongs to the physical page:
[  140.428878] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.429958] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.430757] flags: 0x40(head|zone=0)
[  140.431237] page_type: 0xffffffff()
[  140.431667] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.432475] raw: 00000000
[  140.432901] page dumped because: kasan: bad access detected
[  140.433401] 
[  140.433728] Memory state around the buggy address:
[  140.434313]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.435041]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.435771] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.436467]                                                   ^
[  140.437147]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.437864]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.438510] ==================================================================

test log snippet test parser 105

Home

[  140.357394] ==================================================================
[  140.358088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  140.358882] Write of size 1 at addr c8f160d0 by task kunit_try_catch/135
[  140.359661] 
[  140.359927] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.360854] Hardware name: Generic DT based system
[  140.361511]  unwind_backtrace from show_stack+0x18/0x1c
[  140.362204]  show_stack from dump_stack_lvl+0x58/0x70
[  140.362947]  dump_stack_lvl from print_report+0x164/0x51c
[  140.363670]  print_report from kasan_report+0xc8/0x104
[  140.364461]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  140.365333]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.366174]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.367051]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.367994]  kthread from ret_from_fork+0x14/0x30
[  140.368666] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.369315] bfa0:                                     00000000 00000000 00000000 00000000
[  140.370298] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.371194] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.372035] 
[  140.372331] The buggy address belongs to the physical page:
[  140.373043] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.373922] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.374718] flags: 0x40(head|zone=0)
[  140.375215] page_type: 0xffffffff()
[  140.375695] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.376465] raw: 00000000
[  140.376886] page dumped because: kasan: bad access detected
[  140.377533] 
[  140.377797] Memory state around the buggy address:
[  140.378479]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.379200]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.379962] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.380731]                                          ^
[  140.381368]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.382169]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.383034] ==================================================================

test log snippet test parser 106

Home

[  140.213812] ==================================================================
[  140.214673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  140.215698] Write of size 1 at addr c4d5e4eb by task kunit_try_catch/131
[  140.216478] 
[  140.216851] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.218800] Hardware name: Generic DT based system
[  140.219438]  unwind_backtrace from show_stack+0x18/0x1c
[  140.220385]  show_stack from dump_stack_lvl+0x58/0x70
[  140.221177]  dump_stack_lvl from print_report+0x164/0x51c
[  140.222038]  print_report from kasan_report+0xc8/0x104
[  140.222819]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  140.223789]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.224665]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.225695]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.226607]  kthread from ret_from_fork+0x14/0x30
[  140.227295] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  140.227959] bfa0:                                     00000000 00000000 00000000 00000000
[  140.228913] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.229863] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.230658] 
[  140.230971] Allocated by task 131:
[  140.231588]  kasan_set_track+0x3c/0x5c
[  140.232199]  __kasan_krealloc+0xe0/0x104
[  140.232857]  krealloc+0xd4/0x134
[  140.233483]  krealloc_less_oob_helper+0xd4/0x5f0
[  140.234215]  kunit_try_run_case+0x11c/0x2e4
[  140.234832]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.235606]  kthread+0x184/0x1a8
[  140.236089]  ret_from_fork+0x14/0x30
[  140.236677] 
[  140.236946] The buggy address belongs to the object at c4d5e400
[  140.236946]  which belongs to the cache kmalloc-256 of size 256
[  140.238898] The buggy address is located 34 bytes to the right of
[  140.238898]  allocated 201-byte region [c4d5e400, c4d5e4c9)
[  140.239983] 
[  140.240375] The buggy address belongs to the physical page:
[  140.241227] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.242171] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.243093] flags: 0x840(slab|head|zone=0)
[  140.243767] page_type: 0xffffffff()
[  140.244323] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.245290] raw: 00000000
[  140.245633] page dumped because: kasan: bad access detected
[  140.246378] 
[  140.246717] Memory state around the buggy address:
[  140.247364]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.248171]  c4d5e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.248918] >c4d5e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  140.249689]                                                   ^
[  140.250382]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.251168]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.251974] ==================================================================

test log snippet test parser 107

Home

[  140.325940] ==================================================================
[  140.327188] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  140.328288] Write of size 1 at addr c8f160c9 by task kunit_try_catch/135
[  140.328928] 
[  140.329325] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.330426] Hardware name: Generic DT based system
[  140.331026]  unwind_backtrace from show_stack+0x18/0x1c
[  140.331817]  show_stack from dump_stack_lvl+0x58/0x70
[  140.332587]  dump_stack_lvl from print_report+0x164/0x51c
[  140.333265]  print_report from kasan_report+0xc8/0x104
[  140.334051]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  140.334899]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.335786]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.336877]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.337831]  kthread from ret_from_fork+0x14/0x30
[  140.338782] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  140.339638] bfa0:                                     00000000 00000000 00000000 00000000
[  140.340533] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.341465] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.342158] 
[  140.342425] The buggy address belongs to the physical page:
[  140.342958] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.343908] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.344640] flags: 0x40(head|zone=0)
[  140.345144] page_type: 0xffffffff()
[  140.345585] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.346455] raw: 00000000
[  140.346892] page dumped because: kasan: bad access detected
[  140.347544] 
[  140.347784] Memory state around the buggy address:
[  140.348407]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.349227]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.350026] >c8f16080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  140.350785]                                       ^
[  140.351420]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.352115]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.352710] ==================================================================

test log snippet test parser 108

Home

[  139.981497] ==================================================================
[  139.982704] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  139.983540] Write of size 1 at addr c4d5e2eb by task kunit_try_catch/129
[  139.984266] 
[  139.984505] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.985535] Hardware name: Generic DT based system
[  139.986087]  unwind_backtrace from show_stack+0x18/0x1c
[  139.986771]  show_stack from dump_stack_lvl+0x58/0x70
[  139.987509]  dump_stack_lvl from print_report+0x164/0x51c
[  139.988719]  print_report from kasan_report+0xc8/0x104
[  139.989585]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  139.990469]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  139.991389]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.992451]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.993327]  kthread from ret_from_fork+0x14/0x30
[  139.993977] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[  139.994715] bfa0:                                     00000000 00000000 00000000 00000000
[  139.995684] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.996566] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.997369] 
[  139.997742] Allocated by task 129:
[  139.998153]  kasan_set_track+0x3c/0x5c
[  139.998757]  __kasan_krealloc+0xe0/0x104
[  139.999225]  krealloc+0xd4/0x134
[  139.999764]  krealloc_more_oob_helper+0xd4/0x384
[  140.000440]  kunit_try_run_case+0x11c/0x2e4
[  140.000947]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.001771]  kthread+0x184/0x1a8
[  140.002213]  ret_from_fork+0x14/0x30
[  140.002656] 
[  140.002925] The buggy address belongs to the object at c4d5e200
[  140.002925]  which belongs to the cache kmalloc-256 of size 256
[  140.004035] The buggy address is located 0 bytes to the right of
[  140.004035]  allocated 235-byte region [c4d5e200, c4d5e2eb)
[  140.005438] 
[  140.005743] The buggy address belongs to the physical page:
[  140.006435] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.007283] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.008065] flags: 0x840(slab|head|zone=0)
[  140.008571] page_type: 0xffffffff()
[  140.009052] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.009980] raw: 00000000
[  140.010291] page dumped because: kasan: bad access detected
[  140.010992] 
[  140.011320] Memory state around the buggy address:
[  140.011889]  c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.012722]  c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.013492] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  140.014284]                                                   ^
[  140.014815]  c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.015668]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.016326] ==================================================================
[  140.020582] ==================================================================
[  140.021319] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  140.022067] Write of size 1 at addr c4d5e2f0 by task kunit_try_catch/129
[  140.022819] 
[  140.023117] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.023846] Hardware name: Generic DT based system
[  140.024538]  unwind_backtrace from show_stack+0x18/0x1c
[  140.025414]  show_stack from dump_stack_lvl+0x58/0x70
[  140.026256]  dump_stack_lvl from print_report+0x164/0x51c
[  140.027103]  print_report from kasan_report+0xc8/0x104
[  140.028024]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  140.028879]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.029731]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.030708]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.031562]  kthread from ret_from_fork+0x14/0x30
[  140.032158] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[  140.032825] bfa0:                                     00000000 00000000 00000000 00000000
[  140.033664] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.034628] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.035325] 
[  140.035628] Allocated by task 129:
[  140.035980]  kasan_set_track+0x3c/0x5c
[  140.036623]  __kasan_krealloc+0xe0/0x104
[  140.037154]  krealloc+0xd4/0x134
[  140.037609]  krealloc_more_oob_helper+0xd4/0x384
[  140.038345]  kunit_try_run_case+0x11c/0x2e4
[  140.038924]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.039570]  kthread+0x184/0x1a8
[  140.040046]  ret_from_fork+0x14/0x30
[  140.040477] 
[  140.040852] The buggy address belongs to the object at c4d5e200
[  140.040852]  which belongs to the cache kmalloc-256 of size 256
[  140.042163] The buggy address is located 5 bytes to the right of
[  140.042163]  allocated 235-byte region [c4d5e200, c4d5e2eb)
[  140.043323] 
[  140.043622] The buggy address belongs to the physical page:
[  140.044204] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.045150] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.045916] flags: 0x840(slab|head|zone=0)
[  140.046354] page_type: 0xffffffff()
[  140.046978] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.047809] raw: 00000000
[  140.048228] page dumped because: kasan: bad access detected
[  140.048758] 
[  140.049156] Memory state around the buggy address:
[  140.049706]  c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.050395]  c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.051297] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  140.051944]                                                      ^
[  140.052836]  c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.053547]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.054234] ==================================================================
[  140.259318] ==================================================================
[  140.260606] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  140.261584] Write of size 1 at addr c8f160eb by task kunit_try_catch/133
[  140.262195] 
[  140.262491] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.263448] Hardware name: Generic DT based system
[  140.264037]  unwind_backtrace from show_stack+0x18/0x1c
[  140.265086]  show_stack from dump_stack_lvl+0x58/0x70
[  140.265955]  dump_stack_lvl from print_report+0x164/0x51c
[  140.266642]  print_report from kasan_report+0xc8/0x104
[  140.267390]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  140.268241]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.269236]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.270278]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.271308]  kthread from ret_from_fork+0x14/0x30
[  140.272000] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  140.272800] bfa0:                                     00000000 00000000 00000000 00000000
[  140.273782] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.274722] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.275530] 
[  140.275811] The buggy address belongs to the physical page:
[  140.276597] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.278016] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.278939] flags: 0x40(head|zone=0)
[  140.279410] page_type: 0xffffffff()
[  140.279986] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.281015] raw: 00000000
[  140.281393] page dumped because: kasan: bad access detected
[  140.282096] 
[  140.282415] Memory state around the buggy address:
[  140.282997]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.283956]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.284792] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  140.285578]                                                   ^
[  140.286377]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.287233]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.287985] ==================================================================
[  140.290296] ==================================================================
[  140.291019] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  140.291866] Write of size 1 at addr c8f160f0 by task kunit_try_catch/133
[  140.292745] 
[  140.293105] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.294100] Hardware name: Generic DT based system
[  140.294800]  unwind_backtrace from show_stack+0x18/0x1c
[  140.295630]  show_stack from dump_stack_lvl+0x58/0x70
[  140.296405]  dump_stack_lvl from print_report+0x164/0x51c
[  140.297385]  print_report from kasan_report+0xc8/0x104
[  140.298107]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  140.299470]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.300426]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.301485]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.302381]  kthread from ret_from_fork+0x14/0x30
[  140.303054] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  140.303768] bfa0:                                     00000000 00000000 00000000 00000000
[  140.304779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.305821] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.306642] 
[  140.307008] The buggy address belongs to the physical page:
[  140.307702] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.308786] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.309752] flags: 0x40(head|zone=0)
[  140.310255] page_type: 0xffffffff()
[  140.310832] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.311865] raw: 00000000
[  140.312253] page dumped because: kasan: bad access detected
[  140.312968] 
[  140.313373] Memory state around the buggy address:
[  140.314002]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.314813]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.315597] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  140.316374]                                                      ^
[  140.317109]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.317851]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.318860] ==================================================================

test log snippet test parser 109

Home

[  140.259318] ==================================================================
[  140.260606] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  140.261584] Write of size 1 at addr c8f160eb by task kunit_try_catch/133
[  140.262195] 
[  140.262491] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.263448] Hardware name: Generic DT based system
[  140.264037]  unwind_backtrace from show_stack+0x18/0x1c
[  140.265086]  show_stack from dump_stack_lvl+0x58/0x70
[  140.265955]  dump_stack_lvl from print_report+0x164/0x51c
[  140.266642]  print_report from kasan_report+0xc8/0x104
[  140.267390]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  140.268241]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.269236]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.270278]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.271308]  kthread from ret_from_fork+0x14/0x30
[  140.272000] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  140.272800] bfa0:                                     00000000 00000000 00000000 00000000
[  140.273782] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.274722] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.275530] 
[  140.275811] The buggy address belongs to the physical page:
[  140.276597] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.278016] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.278939] flags: 0x40(head|zone=0)
[  140.279410] page_type: 0xffffffff()
[  140.279986] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.281015] raw: 00000000
[  140.281393] page dumped because: kasan: bad access detected
[  140.282096] 
[  140.282415] Memory state around the buggy address:
[  140.282997]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.283956]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.284792] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  140.285578]                                                   ^
[  140.286377]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.287233]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.287985] ==================================================================

test log snippet test parser 110

Home

[  139.981497] ==================================================================
[  139.982704] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  139.983540] Write of size 1 at addr c4d5e2eb by task kunit_try_catch/129
[  139.984266] 
[  139.984505] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.985535] Hardware name: Generic DT based system
[  139.986087]  unwind_backtrace from show_stack+0x18/0x1c
[  139.986771]  show_stack from dump_stack_lvl+0x58/0x70
[  139.987509]  dump_stack_lvl from print_report+0x164/0x51c
[  139.988719]  print_report from kasan_report+0xc8/0x104
[  139.989585]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  139.990469]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  139.991389]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.992451]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.993327]  kthread from ret_from_fork+0x14/0x30
[  139.993977] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[  139.994715] bfa0:                                     00000000 00000000 00000000 00000000
[  139.995684] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.996566] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.997369] 
[  139.997742] Allocated by task 129:
[  139.998153]  kasan_set_track+0x3c/0x5c
[  139.998757]  __kasan_krealloc+0xe0/0x104
[  139.999225]  krealloc+0xd4/0x134
[  139.999764]  krealloc_more_oob_helper+0xd4/0x384
[  140.000440]  kunit_try_run_case+0x11c/0x2e4
[  140.000947]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.001771]  kthread+0x184/0x1a8
[  140.002213]  ret_from_fork+0x14/0x30
[  140.002656] 
[  140.002925] The buggy address belongs to the object at c4d5e200
[  140.002925]  which belongs to the cache kmalloc-256 of size 256
[  140.004035] The buggy address is located 0 bytes to the right of
[  140.004035]  allocated 235-byte region [c4d5e200, c4d5e2eb)
[  140.005438] 
[  140.005743] The buggy address belongs to the physical page:
[  140.006435] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.007283] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.008065] flags: 0x840(slab|head|zone=0)
[  140.008571] page_type: 0xffffffff()
[  140.009052] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.009980] raw: 00000000
[  140.010291] page dumped because: kasan: bad access detected
[  140.010992] 
[  140.011320] Memory state around the buggy address:
[  140.011889]  c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.012722]  c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.013492] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  140.014284]                                                   ^
[  140.014815]  c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.015668]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.016326] ==================================================================

test log snippet test parser 111

Home

[  140.020582] ==================================================================
[  140.021319] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  140.022067] Write of size 1 at addr c4d5e2f0 by task kunit_try_catch/129
[  140.022819] 
[  140.023117] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.023846] Hardware name: Generic DT based system
[  140.024538]  unwind_backtrace from show_stack+0x18/0x1c
[  140.025414]  show_stack from dump_stack_lvl+0x58/0x70
[  140.026256]  dump_stack_lvl from print_report+0x164/0x51c
[  140.027103]  print_report from kasan_report+0xc8/0x104
[  140.028024]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  140.028879]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.029731]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.030708]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.031562]  kthread from ret_from_fork+0x14/0x30
[  140.032158] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[  140.032825] bfa0:                                     00000000 00000000 00000000 00000000
[  140.033664] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.034628] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.035325] 
[  140.035628] Allocated by task 129:
[  140.035980]  kasan_set_track+0x3c/0x5c
[  140.036623]  __kasan_krealloc+0xe0/0x104
[  140.037154]  krealloc+0xd4/0x134
[  140.037609]  krealloc_more_oob_helper+0xd4/0x384
[  140.038345]  kunit_try_run_case+0x11c/0x2e4
[  140.038924]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.039570]  kthread+0x184/0x1a8
[  140.040046]  ret_from_fork+0x14/0x30
[  140.040477] 
[  140.040852] The buggy address belongs to the object at c4d5e200
[  140.040852]  which belongs to the cache kmalloc-256 of size 256
[  140.042163] The buggy address is located 5 bytes to the right of
[  140.042163]  allocated 235-byte region [c4d5e200, c4d5e2eb)
[  140.043323] 
[  140.043622] The buggy address belongs to the physical page:
[  140.044204] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.045150] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.045916] flags: 0x840(slab|head|zone=0)
[  140.046354] page_type: 0xffffffff()
[  140.046978] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.047809] raw: 00000000
[  140.048228] page dumped because: kasan: bad access detected
[  140.048758] 
[  140.049156] Memory state around the buggy address:
[  140.049706]  c4d5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.050395]  c4d5e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.051297] >c4d5e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  140.051944]                                                      ^
[  140.052836]  c4d5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.053547]  c4d5e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.054234] ==================================================================

test log snippet test parser 112

Home

[  140.290296] ==================================================================
[  140.291019] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  140.291866] Write of size 1 at addr c8f160f0 by task kunit_try_catch/133
[  140.292745] 
[  140.293105] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.294100] Hardware name: Generic DT based system
[  140.294800]  unwind_backtrace from show_stack+0x18/0x1c
[  140.295630]  show_stack from dump_stack_lvl+0x58/0x70
[  140.296405]  dump_stack_lvl from print_report+0x164/0x51c
[  140.297385]  print_report from kasan_report+0xc8/0x104
[  140.298107]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  140.299470]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  140.300426]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.301485]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.302381]  kthread from ret_from_fork+0x14/0x30
[  140.303054] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  140.303768] bfa0:                                     00000000 00000000 00000000 00000000
[  140.304779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.305821] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.306642] 
[  140.307008] The buggy address belongs to the physical page:
[  140.307702] page:16c72f45 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f14
[  140.308786] head:16c72f45 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.309752] flags: 0x40(head|zone=0)
[  140.310255] page_type: 0xffffffff()
[  140.310832] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  140.311865] raw: 00000000
[  140.312253] page dumped because: kasan: bad access detected
[  140.312968] 
[  140.313373] Memory state around the buggy address:
[  140.314002]  c8f15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.314813]  c8f16000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  140.315597] >c8f16080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  140.316374]                                                      ^
[  140.317109]  c8f16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.317851]  c8f16180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  140.318860] ==================================================================

test log snippet test parser 113

Home

[  141.969384] ==================================================================
[  141.970739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[  141.971555] Read of size 1 at addr c8e0b673 by task kunit_try_catch/185
[  141.972143] 
[  141.972480] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.973386] Hardware name: Generic DT based system
[  141.973950]  unwind_backtrace from show_stack+0x18/0x1c
[  141.974582]  show_stack from dump_stack_lvl+0x58/0x70
[  141.975423]  dump_stack_lvl from print_report+0x164/0x51c
[  141.976217]  print_report from kasan_report+0xc8/0x104
[  141.976889]  kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[  141.977966]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  141.978620]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.979684]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.980715]  kthread from ret_from_fork+0x14/0x30
[  141.982169] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[  141.982610] 3fa0:                                     00000000 00000000 00000000 00000000
[  141.983256] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.984053] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.984853] 
[  141.985097] Allocated by task 185:
[  141.985551]  kasan_set_track+0x3c/0x5c
[  141.986175]  __kasan_kmalloc+0x8c/0x94
[  141.986603]  ksize_unpoisons_memory+0xb4/0x3b4
[  141.987439]  kunit_try_run_case+0x11c/0x2e4
[  141.988739]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.989712]  kthread+0x184/0x1a8
[  141.990159]  ret_from_fork+0x14/0x30
[  141.990624] 
[  141.990850] The buggy address belongs to the object at c8e0b600
[  141.990850]  which belongs to the cache kmalloc-128 of size 128
[  141.992109] The buggy address is located 0 bytes to the right of
[  141.992109]  allocated 115-byte region [c8e0b600, c8e0b673)
[  141.993285] 
[  141.993582] The buggy address belongs to the physical page:
[  141.994228] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  141.995091] flags: 0x800(slab|zone=0)
[  141.995529] page_type: 0xffffffff()
[  141.996029] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  141.997030] raw: 00000000
[  141.997466] page dumped because: kasan: bad access detected
[  141.998151] 
[  141.998427] Memory state around the buggy address:
[  141.998890]  c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  141.999691]  c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.000443] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  142.001241]                                                      ^
[  142.001908]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.002630]  c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.003333] ==================================================================
[  142.043310] ==================================================================
[  142.043994] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[  142.044751] Read of size 1 at addr c8e0b67f by task kunit_try_catch/185
[  142.045449] 
[  142.045706] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.046643] Hardware name: Generic DT based system
[  142.047576]  unwind_backtrace from show_stack+0x18/0x1c
[  142.048343]  show_stack from dump_stack_lvl+0x58/0x70
[  142.048960]  dump_stack_lvl from print_report+0x164/0x51c
[  142.049820]  print_report from kasan_report+0xc8/0x104
[  142.050645]  kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[  142.051560]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  142.052405]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.053352]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.054227]  kthread from ret_from_fork+0x14/0x30
[  142.054884] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[  142.055549] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.056403] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.057267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.058597] 
[  142.058804] Allocated by task 185:
[  142.059330]  kasan_set_track+0x3c/0x5c
[  142.059818]  __kasan_kmalloc+0x8c/0x94
[  142.060394]  ksize_unpoisons_memory+0xb4/0x3b4
[  142.060905]  kunit_try_run_case+0x11c/0x2e4
[  142.061632]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.062412]  kthread+0x184/0x1a8
[  142.062909]  ret_from_fork+0x14/0x30
[  142.063367] 
[  142.063734] The buggy address belongs to the object at c8e0b600
[  142.063734]  which belongs to the cache kmalloc-128 of size 128
[  142.064920] The buggy address is located 12 bytes to the right of
[  142.064920]  allocated 115-byte region [c8e0b600, c8e0b673)
[  142.066151] 
[  142.066424] The buggy address belongs to the physical page:
[  142.066998] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.067863] flags: 0x800(slab|zone=0)
[  142.068454] page_type: 0xffffffff()
[  142.069116] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.070059] raw: 00000000
[  142.070413] page dumped because: kasan: bad access detected
[  142.071007] 
[  142.071561] Memory state around the buggy address:
[  142.072069]  c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  142.072734]  c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.073417] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  142.074248]                                                         ^
[  142.074921]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.075544]  c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.076192] ==================================================================
[  142.004551] ==================================================================
[  142.005262] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[  142.005922] Read of size 1 at addr c8e0b678 by task kunit_try_catch/185
[  142.006659] 
[  142.006897] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.007849] Hardware name: Generic DT based system
[  142.008708]  unwind_backtrace from show_stack+0x18/0x1c
[  142.009536]  show_stack from dump_stack_lvl+0x58/0x70
[  142.010197]  dump_stack_lvl from print_report+0x164/0x51c
[  142.011118]  print_report from kasan_report+0xc8/0x104
[  142.011871]  kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[  142.012961]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  142.013827]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.015076]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.016058]  kthread from ret_from_fork+0x14/0x30
[  142.016772] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[  142.017690] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.018607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.019731] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.020511] 
[  142.020843] Allocated by task 185:
[  142.021357]  kasan_set_track+0x3c/0x5c
[  142.022028]  __kasan_kmalloc+0x8c/0x94
[  142.022610]  ksize_unpoisons_memory+0xb4/0x3b4
[  142.023365]  kunit_try_run_case+0x11c/0x2e4
[  142.024159]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.024987]  kthread+0x184/0x1a8
[  142.025471]  ret_from_fork+0x14/0x30
[  142.026059] 
[  142.026324] The buggy address belongs to the object at c8e0b600
[  142.026324]  which belongs to the cache kmalloc-128 of size 128
[  142.027999] The buggy address is located 5 bytes to the right of
[  142.027999]  allocated 115-byte region [c8e0b600, c8e0b673)
[  142.029352] 
[  142.030112] The buggy address belongs to the physical page:
[  142.030967] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.031776] flags: 0x800(slab|zone=0)
[  142.032324] page_type: 0xffffffff()
[  142.032771] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.033754] raw: 00000000
[  142.034073] page dumped because: kasan: bad access detected
[  142.034725] 
[  142.034989] Memory state around the buggy address:
[  142.035594]  c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  142.036405]  c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.037138] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  142.037893]                                                         ^
[  142.038934]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.039577]  c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.040447] ==================================================================

test log snippet test parser 114

Home

[  142.043310] ==================================================================
[  142.043994] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[  142.044751] Read of size 1 at addr c8e0b67f by task kunit_try_catch/185
[  142.045449] 
[  142.045706] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.046643] Hardware name: Generic DT based system
[  142.047576]  unwind_backtrace from show_stack+0x18/0x1c
[  142.048343]  show_stack from dump_stack_lvl+0x58/0x70
[  142.048960]  dump_stack_lvl from print_report+0x164/0x51c
[  142.049820]  print_report from kasan_report+0xc8/0x104
[  142.050645]  kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[  142.051560]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  142.052405]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.053352]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.054227]  kthread from ret_from_fork+0x14/0x30
[  142.054884] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[  142.055549] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.056403] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.057267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.058597] 
[  142.058804] Allocated by task 185:
[  142.059330]  kasan_set_track+0x3c/0x5c
[  142.059818]  __kasan_kmalloc+0x8c/0x94
[  142.060394]  ksize_unpoisons_memory+0xb4/0x3b4
[  142.060905]  kunit_try_run_case+0x11c/0x2e4
[  142.061632]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.062412]  kthread+0x184/0x1a8
[  142.062909]  ret_from_fork+0x14/0x30
[  142.063367] 
[  142.063734] The buggy address belongs to the object at c8e0b600
[  142.063734]  which belongs to the cache kmalloc-128 of size 128
[  142.064920] The buggy address is located 12 bytes to the right of
[  142.064920]  allocated 115-byte region [c8e0b600, c8e0b673)
[  142.066151] 
[  142.066424] The buggy address belongs to the physical page:
[  142.066998] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.067863] flags: 0x800(slab|zone=0)
[  142.068454] page_type: 0xffffffff()
[  142.069116] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.070059] raw: 00000000
[  142.070413] page dumped because: kasan: bad access detected
[  142.071007] 
[  142.071561] Memory state around the buggy address:
[  142.072069]  c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  142.072734]  c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.073417] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  142.074248]                                                         ^
[  142.074921]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.075544]  c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.076192] ==================================================================

test log snippet test parser 115

Home

[  142.004551] ==================================================================
[  142.005262] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[  142.005922] Read of size 1 at addr c8e0b678 by task kunit_try_catch/185
[  142.006659] 
[  142.006897] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.007849] Hardware name: Generic DT based system
[  142.008708]  unwind_backtrace from show_stack+0x18/0x1c
[  142.009536]  show_stack from dump_stack_lvl+0x58/0x70
[  142.010197]  dump_stack_lvl from print_report+0x164/0x51c
[  142.011118]  print_report from kasan_report+0xc8/0x104
[  142.011871]  kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[  142.012961]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  142.013827]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.015076]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.016058]  kthread from ret_from_fork+0x14/0x30
[  142.016772] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[  142.017690] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.018607] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.019731] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.020511] 
[  142.020843] Allocated by task 185:
[  142.021357]  kasan_set_track+0x3c/0x5c
[  142.022028]  __kasan_kmalloc+0x8c/0x94
[  142.022610]  ksize_unpoisons_memory+0xb4/0x3b4
[  142.023365]  kunit_try_run_case+0x11c/0x2e4
[  142.024159]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.024987]  kthread+0x184/0x1a8
[  142.025471]  ret_from_fork+0x14/0x30
[  142.026059] 
[  142.026324] The buggy address belongs to the object at c8e0b600
[  142.026324]  which belongs to the cache kmalloc-128 of size 128
[  142.027999] The buggy address is located 5 bytes to the right of
[  142.027999]  allocated 115-byte region [c8e0b600, c8e0b673)
[  142.029352] 
[  142.030112] The buggy address belongs to the physical page:
[  142.030967] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.031776] flags: 0x800(slab|zone=0)
[  142.032324] page_type: 0xffffffff()
[  142.032771] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.033754] raw: 00000000
[  142.034073] page dumped because: kasan: bad access detected
[  142.034725] 
[  142.034989] Memory state around the buggy address:
[  142.035594]  c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  142.036405]  c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.037138] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  142.037893]                                                         ^
[  142.038934]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.039577]  c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.040447] ==================================================================

test log snippet test parser 116

Home

[  141.969384] ==================================================================
[  141.970739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[  141.971555] Read of size 1 at addr c8e0b673 by task kunit_try_catch/185
[  141.972143] 
[  141.972480] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.973386] Hardware name: Generic DT based system
[  141.973950]  unwind_backtrace from show_stack+0x18/0x1c
[  141.974582]  show_stack from dump_stack_lvl+0x58/0x70
[  141.975423]  dump_stack_lvl from print_report+0x164/0x51c
[  141.976217]  print_report from kasan_report+0xc8/0x104
[  141.976889]  kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[  141.977966]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  141.978620]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.979684]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.980715]  kthread from ret_from_fork+0x14/0x30
[  141.982169] Exception stack(0xf9d53fb0 to 0xf9d53ff8)
[  141.982610] 3fa0:                                     00000000 00000000 00000000 00000000
[  141.983256] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.984053] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.984853] 
[  141.985097] Allocated by task 185:
[  141.985551]  kasan_set_track+0x3c/0x5c
[  141.986175]  __kasan_kmalloc+0x8c/0x94
[  141.986603]  ksize_unpoisons_memory+0xb4/0x3b4
[  141.987439]  kunit_try_run_case+0x11c/0x2e4
[  141.988739]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.989712]  kthread+0x184/0x1a8
[  141.990159]  ret_from_fork+0x14/0x30
[  141.990624] 
[  141.990850] The buggy address belongs to the object at c8e0b600
[  141.990850]  which belongs to the cache kmalloc-128 of size 128
[  141.992109] The buggy address is located 0 bytes to the right of
[  141.992109]  allocated 115-byte region [c8e0b600, c8e0b673)
[  141.993285] 
[  141.993582] The buggy address belongs to the physical page:
[  141.994228] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  141.995091] flags: 0x800(slab|zone=0)
[  141.995529] page_type: 0xffffffff()
[  141.996029] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  141.997030] raw: 00000000
[  141.997466] page dumped because: kasan: bad access detected
[  141.998151] 
[  141.998427] Memory state around the buggy address:
[  141.998890]  c8e0b500: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  141.999691]  c8e0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.000443] >c8e0b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  142.001241]                                                      ^
[  142.001908]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.002630]  c8e0b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.003333] ==================================================================

test log snippet test parser 117

Home

[  142.396886] ==================================================================
[  142.398039] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[  142.398801] Read of size 1 at addr c8fe7598 by task kunit_try_catch/197
[  142.399408] 
[  142.399736] CPU: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.400774] Hardware name: Generic DT based system
[  142.401428]  unwind_backtrace from show_stack+0x18/0x1c
[  142.402214]  show_stack from dump_stack_lvl+0x58/0x70
[  142.402946]  dump_stack_lvl from print_report+0x164/0x51c
[  142.403716]  print_report from kasan_report+0xc8/0x104
[  142.404467]  kasan_report from memcmp+0x30/0xa0
[  142.405230]  memcmp from kasan_memcmp+0x100/0x210
[  142.405937]  kasan_memcmp from kunit_try_run_case+0x11c/0x2e4
[  142.406758]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.407801]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.409109]  kthread from ret_from_fork+0x14/0x30
[  142.410575] Exception stack(0xfa0d3fb0 to 0xfa0d3ff8)
[  142.411107] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.412025] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.412992] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.413732] 
[  142.414026] Allocated by task 197:
[  142.414483]  kasan_set_track+0x3c/0x5c
[  142.415035]  __kasan_kmalloc+0x8c/0x94
[  142.415667]  kasan_memcmp+0xb4/0x210
[  142.416261]  kunit_try_run_case+0x11c/0x2e4
[  142.416972]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.417693]  kthread+0x184/0x1a8
[  142.418094]  ret_from_fork+0x14/0x30
[  142.418685] 
[  142.418925] The buggy address belongs to the object at c8fe7580
[  142.418925]  which belongs to the cache kmalloc-64 of size 64
[  142.420262] The buggy address is located 0 bytes to the right of
[  142.420262]  allocated 24-byte region [c8fe7580, c8fe7598)
[  142.421488] 
[  142.421745] The buggy address belongs to the physical page:
[  142.422377] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.423375] flags: 0x800(slab|zone=0)
[  142.423960] page_type: 0xffffffff()
[  142.424689] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.425738] raw: 00000000
[  142.426312] page dumped because: kasan: bad access detected
[  142.426972] 
[  142.427705] Memory state around the buggy address:
[  142.428353]  c8fe7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.429017]  c8fe7500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.429941] >c8fe7580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.430998]                     ^
[  142.431738]  c8fe7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.432611]  c8fe7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.433357] ==================================================================

test log snippet test parser 118

Home

[  142.396886] ==================================================================
[  142.398039] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[  142.398801] Read of size 1 at addr c8fe7598 by task kunit_try_catch/197
[  142.399408] 
[  142.399736] CPU: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.400774] Hardware name: Generic DT based system
[  142.401428]  unwind_backtrace from show_stack+0x18/0x1c
[  142.402214]  show_stack from dump_stack_lvl+0x58/0x70
[  142.402946]  dump_stack_lvl from print_report+0x164/0x51c
[  142.403716]  print_report from kasan_report+0xc8/0x104
[  142.404467]  kasan_report from memcmp+0x30/0xa0
[  142.405230]  memcmp from kasan_memcmp+0x100/0x210
[  142.405937]  kasan_memcmp from kunit_try_run_case+0x11c/0x2e4
[  142.406758]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.407801]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.409109]  kthread from ret_from_fork+0x14/0x30
[  142.410575] Exception stack(0xfa0d3fb0 to 0xfa0d3ff8)
[  142.411107] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.412025] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.412992] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.413732] 
[  142.414026] Allocated by task 197:
[  142.414483]  kasan_set_track+0x3c/0x5c
[  142.415035]  __kasan_kmalloc+0x8c/0x94
[  142.415667]  kasan_memcmp+0xb4/0x210
[  142.416261]  kunit_try_run_case+0x11c/0x2e4
[  142.416972]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.417693]  kthread+0x184/0x1a8
[  142.418094]  ret_from_fork+0x14/0x30
[  142.418685] 
[  142.418925] The buggy address belongs to the object at c8fe7580
[  142.418925]  which belongs to the cache kmalloc-64 of size 64
[  142.420262] The buggy address is located 0 bytes to the right of
[  142.420262]  allocated 24-byte region [c8fe7580, c8fe7598)
[  142.421488] 
[  142.421745] The buggy address belongs to the physical page:
[  142.422377] page:5eaaf964 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe7
[  142.423375] flags: 0x800(slab|zone=0)
[  142.423960] page_type: 0xffffffff()
[  142.424689] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.425738] raw: 00000000
[  142.426312] page dumped because: kasan: bad access detected
[  142.426972] 
[  142.427705] Memory state around the buggy address:
[  142.428353]  c8fe7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.429017]  c8fe7500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.429941] >c8fe7580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.430998]                     ^
[  142.431738]  c8fe7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.432611]  c8fe7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.433357] ==================================================================

test log snippet test parser 119

Home

[  142.497279] ==================================================================
[  142.498715] BUG: KASAN: slab-use-after-free in kasan_strings+0x170/0x4ec
[  142.499487] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.500282] 
[  142.500608] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.501635] Hardware name: Generic DT based system
[  142.502156]  unwind_backtrace from show_stack+0x18/0x1c
[  142.503005]  show_stack from dump_stack_lvl+0x58/0x70
[  142.503777]  dump_stack_lvl from print_report+0x164/0x51c
[  142.504600]  print_report from kasan_report+0xc8/0x104
[  142.505358]  kasan_report from kasan_strings+0x170/0x4ec
[  142.506109]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.506923]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.508049]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.509004]  kthread from ret_from_fork+0x14/0x30
[  142.509700] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.510446] bfa0:                                     00000000 00000000 00000000 00000000
[  142.511427] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.512377] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.513251] 
[  142.513587] Allocated by task 199:
[  142.514159]  kasan_set_track+0x3c/0x5c
[  142.514730]  __kasan_kmalloc+0x8c/0x94
[  142.515345]  kasan_strings+0xa0/0x4ec
[  142.515947]  kunit_try_run_case+0x11c/0x2e4
[  142.516594]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.517504]  kthread+0x184/0x1a8
[  142.517917]  ret_from_fork+0x14/0x30
[  142.518502] 
[  142.518750] Freed by task 199:
[  142.519077]  kasan_set_track+0x3c/0x5c
[  142.520182]  kasan_save_free_info+0x30/0x3c
[  142.520785]  __kasan_slab_free+0xdc/0x124
[  142.521476]  __kmem_cache_free+0x140/0x2a8
[  142.522100]  kasan_strings+0xbc/0x4ec
[  142.522698]  kunit_try_run_case+0x11c/0x2e4
[  142.523354]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.524222]  kthread+0x184/0x1a8
[  142.524715]  ret_from_fork+0x14/0x30
[  142.525333] 
[  142.525685] The buggy address belongs to the object at c9008500
[  142.525685]  which belongs to the cache kmalloc-64 of size 64
[  142.526997] The buggy address is located 16 bytes inside of
[  142.526997]  freed 64-byte region [c9008500, c9008540)
[  142.528642] 
[  142.529022] The buggy address belongs to the physical page:
[  142.529901] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.530878] flags: 0x800(slab|zone=0)
[  142.531304] page_type: 0xffffffff()
[  142.531786] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.532610] raw: 00000000
[  142.533148] page dumped because: kasan: bad access detected
[  142.533961] 
[  142.534182] Memory state around the buggy address:
[  142.534827]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.535589]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.536304] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.537636]                  ^
[  142.538257]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.538992]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.539705] ==================================================================

test log snippet test parser 120

Home

[  142.497279] ==================================================================
[  142.498715] BUG: KASAN: slab-use-after-free in kasan_strings+0x170/0x4ec
[  142.499487] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.500282] 
[  142.500608] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.501635] Hardware name: Generic DT based system
[  142.502156]  unwind_backtrace from show_stack+0x18/0x1c
[  142.503005]  show_stack from dump_stack_lvl+0x58/0x70
[  142.503777]  dump_stack_lvl from print_report+0x164/0x51c
[  142.504600]  print_report from kasan_report+0xc8/0x104
[  142.505358]  kasan_report from kasan_strings+0x170/0x4ec
[  142.506109]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.506923]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.508049]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.509004]  kthread from ret_from_fork+0x14/0x30
[  142.509700] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.510446] bfa0:                                     00000000 00000000 00000000 00000000
[  142.511427] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.512377] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.513251] 
[  142.513587] Allocated by task 199:
[  142.514159]  kasan_set_track+0x3c/0x5c
[  142.514730]  __kasan_kmalloc+0x8c/0x94
[  142.515345]  kasan_strings+0xa0/0x4ec
[  142.515947]  kunit_try_run_case+0x11c/0x2e4
[  142.516594]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.517504]  kthread+0x184/0x1a8
[  142.517917]  ret_from_fork+0x14/0x30
[  142.518502] 
[  142.518750] Freed by task 199:
[  142.519077]  kasan_set_track+0x3c/0x5c
[  142.520182]  kasan_save_free_info+0x30/0x3c
[  142.520785]  __kasan_slab_free+0xdc/0x124
[  142.521476]  __kmem_cache_free+0x140/0x2a8
[  142.522100]  kasan_strings+0xbc/0x4ec
[  142.522698]  kunit_try_run_case+0x11c/0x2e4
[  142.523354]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.524222]  kthread+0x184/0x1a8
[  142.524715]  ret_from_fork+0x14/0x30
[  142.525333] 
[  142.525685] The buggy address belongs to the object at c9008500
[  142.525685]  which belongs to the cache kmalloc-64 of size 64
[  142.526997] The buggy address is located 16 bytes inside of
[  142.526997]  freed 64-byte region [c9008500, c9008540)
[  142.528642] 
[  142.529022] The buggy address belongs to the physical page:
[  142.529901] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.530878] flags: 0x800(slab|zone=0)
[  142.531304] page_type: 0xffffffff()
[  142.531786] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.532610] raw: 00000000
[  142.533148] page dumped because: kasan: bad access detected
[  142.533961] 
[  142.534182] Memory state around the buggy address:
[  142.534827]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.535589]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.536304] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.537636]                  ^
[  142.538257]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.538992]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.539705] ==================================================================

test log snippet test parser 121

Home

[  143.156682] ==================================================================
[  143.158315] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd0/0x1cc
[  143.159370] Read of size 1 at addr c8fe9a80 by task kunit_try_catch/205
[  143.159892] 
[  143.160306] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.161821] Hardware name: Generic DT based system
[  143.162517]  unwind_backtrace from show_stack+0x18/0x1c
[  143.163307]  show_stack from dump_stack_lvl+0x58/0x70
[  143.164205]  dump_stack_lvl from print_report+0x164/0x51c
[  143.164937]  print_report from kasan_report+0xc8/0x104
[  143.165727]  kasan_report from __kasan_check_byte+0x34/0x3c
[  143.166650]  __kasan_check_byte from kfree_sensitive+0x20/0x6c
[  143.167548]  kfree_sensitive from kmalloc_double_kzfree+0xd0/0x1cc
[  143.168345]  kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[  143.169300]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.170415]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.171302]  kthread from ret_from_fork+0x14/0x30
[  143.171883] Exception stack(0xfa103fb0 to 0xfa103ff8)
[  143.172486] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.173476] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.174273] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.174863] 
[  143.175194] Allocated by task 205:
[  143.175628]  kasan_set_track+0x3c/0x5c
[  143.176384]  __kasan_kmalloc+0x8c/0x94
[  143.177139]  kmalloc_double_kzfree+0xa0/0x1cc
[  143.177888]  kunit_try_run_case+0x11c/0x2e4
[  143.178500]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.179215]  kthread+0x184/0x1a8
[  143.179642]  ret_from_fork+0x14/0x30
[  143.180208] 
[  143.180437] Freed by task 205:
[  143.180952]  kasan_set_track+0x3c/0x5c
[  143.181761]  kasan_save_free_info+0x30/0x3c
[  143.182430]  __kasan_slab_free+0xdc/0x124
[  143.183080]  __kmem_cache_free+0x140/0x2a8
[  143.183723]  kmalloc_double_kzfree+0xbc/0x1cc
[  143.184257]  kunit_try_run_case+0x11c/0x2e4
[  143.184910]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.185680]  kthread+0x184/0x1a8
[  143.186186]  ret_from_fork+0x14/0x30
[  143.186663] 
[  143.187023] The buggy address belongs to the object at c8fe9a80
[  143.187023]  which belongs to the cache kmalloc-64 of size 64
[  143.188863] The buggy address is located 0 bytes inside of
[  143.188863]  freed 64-byte region [c8fe9a80, c8fe9ac0)
[  143.190099] 
[  143.190412] The buggy address belongs to the physical page:
[  143.191032] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[  143.192285] flags: 0x800(slab|zone=0)
[  143.192790] page_type: 0xffffffff()
[  143.193378] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.194205] raw: 00000000
[  143.194693] page dumped because: kasan: bad access detected
[  143.195334] 
[  143.195566] Memory state around the buggy address:
[  143.196164]  c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.196941]  c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.197590] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.199103]            ^
[  143.199479]  c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.200214]  c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.200892] ==================================================================

test log snippet test parser 122

Home

[  143.156682] ==================================================================
[  143.158315] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd0/0x1cc
[  143.159370] Read of size 1 at addr c8fe9a80 by task kunit_try_catch/205
[  143.159892] 
[  143.160306] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.161821] Hardware name: Generic DT based system
[  143.162517]  unwind_backtrace from show_stack+0x18/0x1c
[  143.163307]  show_stack from dump_stack_lvl+0x58/0x70
[  143.164205]  dump_stack_lvl from print_report+0x164/0x51c
[  143.164937]  print_report from kasan_report+0xc8/0x104
[  143.165727]  kasan_report from __kasan_check_byte+0x34/0x3c
[  143.166650]  __kasan_check_byte from kfree_sensitive+0x20/0x6c
[  143.167548]  kfree_sensitive from kmalloc_double_kzfree+0xd0/0x1cc
[  143.168345]  kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[  143.169300]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.170415]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.171302]  kthread from ret_from_fork+0x14/0x30
[  143.171883] Exception stack(0xfa103fb0 to 0xfa103ff8)
[  143.172486] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.173476] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.174273] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.174863] 
[  143.175194] Allocated by task 205:
[  143.175628]  kasan_set_track+0x3c/0x5c
[  143.176384]  __kasan_kmalloc+0x8c/0x94
[  143.177139]  kmalloc_double_kzfree+0xa0/0x1cc
[  143.177888]  kunit_try_run_case+0x11c/0x2e4
[  143.178500]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.179215]  kthread+0x184/0x1a8
[  143.179642]  ret_from_fork+0x14/0x30
[  143.180208] 
[  143.180437] Freed by task 205:
[  143.180952]  kasan_set_track+0x3c/0x5c
[  143.181761]  kasan_save_free_info+0x30/0x3c
[  143.182430]  __kasan_slab_free+0xdc/0x124
[  143.183080]  __kmem_cache_free+0x140/0x2a8
[  143.183723]  kmalloc_double_kzfree+0xbc/0x1cc
[  143.184257]  kunit_try_run_case+0x11c/0x2e4
[  143.184910]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.185680]  kthread+0x184/0x1a8
[  143.186186]  ret_from_fork+0x14/0x30
[  143.186663] 
[  143.187023] The buggy address belongs to the object at c8fe9a80
[  143.187023]  which belongs to the cache kmalloc-64 of size 64
[  143.188863] The buggy address is located 0 bytes inside of
[  143.188863]  freed 64-byte region [c8fe9a80, c8fe9ac0)
[  143.190099] 
[  143.190412] The buggy address belongs to the physical page:
[  143.191032] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[  143.192285] flags: 0x800(slab|zone=0)
[  143.192790] page_type: 0xffffffff()
[  143.193378] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.194205] raw: 00000000
[  143.194693] page dumped because: kasan: bad access detected
[  143.195334] 
[  143.195566] Memory state around the buggy address:
[  143.196164]  c8fe9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.196941]  c8fe9a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.197590] >c8fe9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.199103]            ^
[  143.199479]  c8fe9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.200214]  c8fe9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.200892] ==================================================================

test log snippet test parser 123

Home

[  140.967601] ==================================================================
[  140.968968] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd0/0x1d0
[  140.969635] Read of size 1 at addr c4ce2008 by task kunit_try_catch/157
[  140.970364] 
[  140.970662] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.971532] Hardware name: Generic DT based system
[  140.972083]  unwind_backtrace from show_stack+0x18/0x1c
[  140.973030]  show_stack from dump_stack_lvl+0x58/0x70
[  140.973697]  dump_stack_lvl from print_report+0x164/0x51c
[  140.974542]  print_report from kasan_report+0xc8/0x104
[  140.975227]  kasan_report from kmalloc_uaf+0xd0/0x1d0
[  140.975890]  kmalloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  140.976680]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.978331]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.979238]  kthread from ret_from_fork+0x14/0x30
[  140.979816] Exception stack(0xf9fdbfb0 to 0xf9fdbff8)
[  140.980385] bfa0:                                     00000000 00000000 00000000 00000000
[  140.981402] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.982340] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.983109] 
[  140.983489] Allocated by task 157:
[  140.983839]  kasan_set_track+0x3c/0x5c
[  140.984536]  __kasan_kmalloc+0x8c/0x94
[  140.985158]  kmalloc_uaf+0xa0/0x1d0
[  140.985688]  kunit_try_run_case+0x11c/0x2e4
[  140.986317]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.987290]  kthread+0x184/0x1a8
[  140.987812]  ret_from_fork+0x14/0x30
[  140.988426] 
[  140.988763] Freed by task 157:
[  140.989237]  kasan_set_track+0x3c/0x5c
[  140.989799]  kasan_save_free_info+0x30/0x3c
[  140.990560]  __kasan_slab_free+0xdc/0x124
[  140.991255]  __kmem_cache_free+0x140/0x2a8
[  140.991818]  kmalloc_uaf+0xbc/0x1d0
[  140.992341]  kunit_try_run_case+0x11c/0x2e4
[  140.992990]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.993832]  kthread+0x184/0x1a8
[  140.994330]  ret_from_fork+0x14/0x30
[  140.994925] 
[  140.995243] The buggy address belongs to the object at c4ce2000
[  140.995243]  which belongs to the cache kmalloc-64 of size 64
[  140.996539] The buggy address is located 8 bytes inside of
[  140.996539]  freed 64-byte region [c4ce2000, c4ce2040)
[  140.998172] 
[  140.998738] The buggy address belongs to the physical page:
[  140.999476] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[  141.000403] flags: 0x800(slab|zone=0)
[  141.000992] page_type: 0xffffffff()
[  141.001581] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  141.002595] raw: 00000000
[  141.002968] page dumped because: kasan: bad access detected
[  141.003659] 
[  141.004008] Memory state around the buggy address:
[  141.004634]  c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.005441]  c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.006269] >c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.007222]               ^
[  141.007635]  c4ce2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.008467]  c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.009254] ==================================================================
[  141.064051] ==================================================================
[  141.065287] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[  141.066009] Read of size 1 at addr c4ce2128 by task kunit_try_catch/161
[  141.066749] 
[  141.066992] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.069085] Hardware name: Generic DT based system
[  141.069853]  unwind_backtrace from show_stack+0x18/0x1c
[  141.070625]  show_stack from dump_stack_lvl+0x58/0x70
[  141.071338]  dump_stack_lvl from print_report+0x164/0x51c
[  141.072041]  print_report from kasan_report+0xc8/0x104
[  141.072748]  kasan_report from kmalloc_uaf2+0x104/0x274
[  141.073462]  kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[  141.074241]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.075182]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.076012]  kthread from ret_from_fork+0x14/0x30
[  141.076616] Exception stack(0xf9ffbfb0 to 0xf9ffbff8)
[  141.077391] bfa0:                                     00000000 00000000 00000000 00000000
[  141.078416] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.079020] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.079675] 
[  141.079901] Allocated by task 161:
[  141.080439]  kasan_set_track+0x3c/0x5c
[  141.081024]  __kasan_kmalloc+0x8c/0x94
[  141.081692]  kmalloc_uaf2+0xac/0x274
[  141.082139]  kunit_try_run_case+0x11c/0x2e4
[  141.082704]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.083290]  kthread+0x184/0x1a8
[  141.083844]  ret_from_fork+0x14/0x30
[  141.084441] 
[  141.084671] Freed by task 161:
[  141.085082]  kasan_set_track+0x3c/0x5c
[  141.085791]  kasan_save_free_info+0x30/0x3c
[  141.086436]  __kasan_slab_free+0xdc/0x124
[  141.086951]  __kmem_cache_free+0x140/0x2a8
[  141.087808]  kmalloc_uaf2+0xc0/0x274
[  141.088530]  kunit_try_run_case+0x11c/0x2e4
[  141.089043]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.089796]  kthread+0x184/0x1a8
[  141.090278]  ret_from_fork+0x14/0x30
[  141.090763] 
[  141.091030] The buggy address belongs to the object at c4ce2100
[  141.091030]  which belongs to the cache kmalloc-64 of size 64
[  141.092215] The buggy address is located 40 bytes inside of
[  141.092215]  freed 64-byte region [c4ce2100, c4ce2140)
[  141.093309] 
[  141.093605] The buggy address belongs to the physical page:
[  141.094238] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[  141.095046] flags: 0x800(slab|zone=0)
[  141.095757] page_type: 0xffffffff()
[  141.096438] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  141.097636] raw: 00000000
[  141.098039] page dumped because: kasan: bad access detected
[  141.099078] 
[  141.099332] Memory state around the buggy address:
[  141.100155]  c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.100811]  c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.101747] >c4ce2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.102538]                           ^
[  141.103103]  c4ce2180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  141.103966]  c4ce2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.104698] ==================================================================
[  140.608741] ==================================================================
[  140.609891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[  140.610847] Read of size 16 at addr c4ce1f00 by task kunit_try_catch/141
[  140.611488] 
[  140.611804] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.612733] Hardware name: Generic DT based system
[  140.613305]  unwind_backtrace from show_stack+0x18/0x1c
[  140.614111]  show_stack from dump_stack_lvl+0x58/0x70
[  140.614824]  dump_stack_lvl from print_report+0x164/0x51c
[  140.615588]  print_report from kasan_report+0xc8/0x104
[  140.616336]  kasan_report from kmalloc_uaf_16+0x100/0x240
[  140.617166]  kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[  140.617905]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.619165]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.620000]  kthread from ret_from_fork+0x14/0x30
[  140.620695] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[  140.621352] bfa0:                                     00000000 00000000 00000000 00000000
[  140.622287] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.623273] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.624257] 
[  140.624560] Allocated by task 141:
[  140.625004]  kasan_set_track+0x3c/0x5c
[  140.625683]  __kasan_kmalloc+0x8c/0x94
[  140.626230]  kmalloc_uaf_16+0xc8/0x240
[  140.626789]  kunit_try_run_case+0x11c/0x2e4
[  140.627608]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.628352]  kthread+0x184/0x1a8
[  140.628768]  ret_from_fork+0x14/0x30
[  140.629362] 
[  140.629603] Freed by task 141:
[  140.630071]  kasan_set_track+0x3c/0x5c
[  140.630614]  kasan_save_free_info+0x30/0x3c
[  140.631235]  __kasan_slab_free+0xdc/0x124
[  140.631819]  __kmem_cache_free+0x140/0x2a8
[  140.632511]  kmalloc_uaf_16+0xe4/0x240
[  140.632996]  kunit_try_run_case+0x11c/0x2e4
[  140.633596]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.634482]  kthread+0x184/0x1a8
[  140.634890]  ret_from_fork+0x14/0x30
[  140.635503] 
[  140.635792] The buggy address belongs to the object at c4ce1f00
[  140.635792]  which belongs to the cache kmalloc-64 of size 64
[  140.636970] The buggy address is located 0 bytes inside of
[  140.636970]  freed 64-byte region [c4ce1f00, c4ce1f40)
[  140.638392] 
[  140.638656] The buggy address belongs to the physical page:
[  140.639345] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  140.640043] flags: 0x800(slab|zone=0)
[  140.640655] page_type: 0xffffffff()
[  140.641235] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.641957] raw: 00000000
[  140.642364] page dumped because: kasan: bad access detected
[  140.643117] 
[  140.643360] Memory state around the buggy address:
[  140.644018]  c4ce1e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.644792]  c4ce1e80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.645441] >c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.646366]            ^
[  140.646706]  c4ce1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.647682]  c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  140.648249] ==================================================================

test log snippet test parser 124

Home

[  140.608741] ==================================================================
[  140.609891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[  140.610847] Read of size 16 at addr c4ce1f00 by task kunit_try_catch/141
[  140.611488] 
[  140.611804] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.612733] Hardware name: Generic DT based system
[  140.613305]  unwind_backtrace from show_stack+0x18/0x1c
[  140.614111]  show_stack from dump_stack_lvl+0x58/0x70
[  140.614824]  dump_stack_lvl from print_report+0x164/0x51c
[  140.615588]  print_report from kasan_report+0xc8/0x104
[  140.616336]  kasan_report from kmalloc_uaf_16+0x100/0x240
[  140.617166]  kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[  140.617905]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.619165]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.620000]  kthread from ret_from_fork+0x14/0x30
[  140.620695] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[  140.621352] bfa0:                                     00000000 00000000 00000000 00000000
[  140.622287] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.623273] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.624257] 
[  140.624560] Allocated by task 141:
[  140.625004]  kasan_set_track+0x3c/0x5c
[  140.625683]  __kasan_kmalloc+0x8c/0x94
[  140.626230]  kmalloc_uaf_16+0xc8/0x240
[  140.626789]  kunit_try_run_case+0x11c/0x2e4
[  140.627608]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.628352]  kthread+0x184/0x1a8
[  140.628768]  ret_from_fork+0x14/0x30
[  140.629362] 
[  140.629603] Freed by task 141:
[  140.630071]  kasan_set_track+0x3c/0x5c
[  140.630614]  kasan_save_free_info+0x30/0x3c
[  140.631235]  __kasan_slab_free+0xdc/0x124
[  140.631819]  __kmem_cache_free+0x140/0x2a8
[  140.632511]  kmalloc_uaf_16+0xe4/0x240
[  140.632996]  kunit_try_run_case+0x11c/0x2e4
[  140.633596]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.634482]  kthread+0x184/0x1a8
[  140.634890]  ret_from_fork+0x14/0x30
[  140.635503] 
[  140.635792] The buggy address belongs to the object at c4ce1f00
[  140.635792]  which belongs to the cache kmalloc-64 of size 64
[  140.636970] The buggy address is located 0 bytes inside of
[  140.636970]  freed 64-byte region [c4ce1f00, c4ce1f40)
[  140.638392] 
[  140.638656] The buggy address belongs to the physical page:
[  140.639345] page:979e0dfc refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce1
[  140.640043] flags: 0x800(slab|zone=0)
[  140.640655] page_type: 0xffffffff()
[  140.641235] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  140.641957] raw: 00000000
[  140.642364] page dumped because: kasan: bad access detected
[  140.643117] 
[  140.643360] Memory state around the buggy address:
[  140.644018]  c4ce1e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.644792]  c4ce1e80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.645441] >c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  140.646366]            ^
[  140.646706]  c4ce1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.647682]  c4ce2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  140.648249] ==================================================================

test log snippet test parser 125

Home

[  140.967601] ==================================================================
[  140.968968] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd0/0x1d0
[  140.969635] Read of size 1 at addr c4ce2008 by task kunit_try_catch/157
[  140.970364] 
[  140.970662] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.971532] Hardware name: Generic DT based system
[  140.972083]  unwind_backtrace from show_stack+0x18/0x1c
[  140.973030]  show_stack from dump_stack_lvl+0x58/0x70
[  140.973697]  dump_stack_lvl from print_report+0x164/0x51c
[  140.974542]  print_report from kasan_report+0xc8/0x104
[  140.975227]  kasan_report from kmalloc_uaf+0xd0/0x1d0
[  140.975890]  kmalloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  140.976680]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.978331]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.979238]  kthread from ret_from_fork+0x14/0x30
[  140.979816] Exception stack(0xf9fdbfb0 to 0xf9fdbff8)
[  140.980385] bfa0:                                     00000000 00000000 00000000 00000000
[  140.981402] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.982340] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.983109] 
[  140.983489] Allocated by task 157:
[  140.983839]  kasan_set_track+0x3c/0x5c
[  140.984536]  __kasan_kmalloc+0x8c/0x94
[  140.985158]  kmalloc_uaf+0xa0/0x1d0
[  140.985688]  kunit_try_run_case+0x11c/0x2e4
[  140.986317]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.987290]  kthread+0x184/0x1a8
[  140.987812]  ret_from_fork+0x14/0x30
[  140.988426] 
[  140.988763] Freed by task 157:
[  140.989237]  kasan_set_track+0x3c/0x5c
[  140.989799]  kasan_save_free_info+0x30/0x3c
[  140.990560]  __kasan_slab_free+0xdc/0x124
[  140.991255]  __kmem_cache_free+0x140/0x2a8
[  140.991818]  kmalloc_uaf+0xbc/0x1d0
[  140.992341]  kunit_try_run_case+0x11c/0x2e4
[  140.992990]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.993832]  kthread+0x184/0x1a8
[  140.994330]  ret_from_fork+0x14/0x30
[  140.994925] 
[  140.995243] The buggy address belongs to the object at c4ce2000
[  140.995243]  which belongs to the cache kmalloc-64 of size 64
[  140.996539] The buggy address is located 8 bytes inside of
[  140.996539]  freed 64-byte region [c4ce2000, c4ce2040)
[  140.998172] 
[  140.998738] The buggy address belongs to the physical page:
[  140.999476] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[  141.000403] flags: 0x800(slab|zone=0)
[  141.000992] page_type: 0xffffffff()
[  141.001581] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  141.002595] raw: 00000000
[  141.002968] page dumped because: kasan: bad access detected
[  141.003659] 
[  141.004008] Memory state around the buggy address:
[  141.004634]  c4ce1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.005441]  c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.006269] >c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.007222]               ^
[  141.007635]  c4ce2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.008467]  c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.009254] ==================================================================

test log snippet test parser 126

Home

[  141.064051] ==================================================================
[  141.065287] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[  141.066009] Read of size 1 at addr c4ce2128 by task kunit_try_catch/161
[  141.066749] 
[  141.066992] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.069085] Hardware name: Generic DT based system
[  141.069853]  unwind_backtrace from show_stack+0x18/0x1c
[  141.070625]  show_stack from dump_stack_lvl+0x58/0x70
[  141.071338]  dump_stack_lvl from print_report+0x164/0x51c
[  141.072041]  print_report from kasan_report+0xc8/0x104
[  141.072748]  kasan_report from kmalloc_uaf2+0x104/0x274
[  141.073462]  kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[  141.074241]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.075182]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.076012]  kthread from ret_from_fork+0x14/0x30
[  141.076616] Exception stack(0xf9ffbfb0 to 0xf9ffbff8)
[  141.077391] bfa0:                                     00000000 00000000 00000000 00000000
[  141.078416] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.079020] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.079675] 
[  141.079901] Allocated by task 161:
[  141.080439]  kasan_set_track+0x3c/0x5c
[  141.081024]  __kasan_kmalloc+0x8c/0x94
[  141.081692]  kmalloc_uaf2+0xac/0x274
[  141.082139]  kunit_try_run_case+0x11c/0x2e4
[  141.082704]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.083290]  kthread+0x184/0x1a8
[  141.083844]  ret_from_fork+0x14/0x30
[  141.084441] 
[  141.084671] Freed by task 161:
[  141.085082]  kasan_set_track+0x3c/0x5c
[  141.085791]  kasan_save_free_info+0x30/0x3c
[  141.086436]  __kasan_slab_free+0xdc/0x124
[  141.086951]  __kmem_cache_free+0x140/0x2a8
[  141.087808]  kmalloc_uaf2+0xc0/0x274
[  141.088530]  kunit_try_run_case+0x11c/0x2e4
[  141.089043]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.089796]  kthread+0x184/0x1a8
[  141.090278]  ret_from_fork+0x14/0x30
[  141.090763] 
[  141.091030] The buggy address belongs to the object at c4ce2100
[  141.091030]  which belongs to the cache kmalloc-64 of size 64
[  141.092215] The buggy address is located 40 bytes inside of
[  141.092215]  freed 64-byte region [c4ce2100, c4ce2140)
[  141.093309] 
[  141.093605] The buggy address belongs to the physical page:
[  141.094238] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[  141.095046] flags: 0x800(slab|zone=0)
[  141.095757] page_type: 0xffffffff()
[  141.096438] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  141.097636] raw: 00000000
[  141.098039] page dumped because: kasan: bad access detected
[  141.099078] 
[  141.099332] Memory state around the buggy address:
[  141.100155]  c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.100811]  c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.101747] >c4ce2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.102538]                           ^
[  141.103103]  c4ce2180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  141.103966]  c4ce2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.104698] ==================================================================

test log snippet test parser 127

Home

[  141.015804] ==================================================================
[  141.016916] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd8/0x1d4
[  141.018073] Write of size 33 at addr c4ce2080 by task kunit_try_catch/159
[  141.018969] 
[  141.019308] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.020474] Hardware name: Generic DT based system
[  141.021182]  unwind_backtrace from show_stack+0x18/0x1c
[  141.021883]  show_stack from dump_stack_lvl+0x58/0x70
[  141.022568]  dump_stack_lvl from print_report+0x164/0x51c
[  141.023414]  print_report from kasan_report+0xc8/0x104
[  141.024139]  kasan_report from kasan_check_range+0x14c/0x198
[  141.025001]  kasan_check_range from __asan_memset+0x20/0x3c
[  141.025853]  __asan_memset from kmalloc_uaf_memset+0xd8/0x1d4
[  141.026578]  kmalloc_uaf_memset from kunit_try_run_case+0x11c/0x2e4
[  141.027530]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.028433]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.029374]  kthread from ret_from_fork+0x14/0x30
[  141.029970] Exception stack(0xf9febfb0 to 0xf9febff8)
[  141.030480] bfa0:                                     00000000 00000000 00000000 00000000
[  141.031247] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.032185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.033025] 
[  141.033313] Allocated by task 159:
[  141.033705]  kasan_set_track+0x3c/0x5c
[  141.034237]  __kasan_kmalloc+0x8c/0x94
[  141.034782]  kmalloc_uaf_memset+0xa0/0x1d4
[  141.035419]  kunit_try_run_case+0x11c/0x2e4
[  141.035967]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.036814]  kthread+0x184/0x1a8
[  141.037579]  ret_from_fork+0x14/0x30
[  141.038029] 
[  141.038316] Freed by task 159:
[  141.038689]  kasan_set_track+0x3c/0x5c
[  141.039215]  kasan_save_free_info+0x30/0x3c
[  141.039724]  __kasan_slab_free+0xdc/0x124
[  141.040271]  __kmem_cache_free+0x140/0x2a8
[  141.041051]  kmalloc_uaf_memset+0xbc/0x1d4
[  141.041593]  kunit_try_run_case+0x11c/0x2e4
[  141.042066]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.042908]  kthread+0x184/0x1a8
[  141.043396]  ret_from_fork+0x14/0x30
[  141.043854] 
[  141.044163] The buggy address belongs to the object at c4ce2080
[  141.044163]  which belongs to the cache kmalloc-64 of size 64
[  141.045358] The buggy address is located 0 bytes inside of
[  141.045358]  freed 64-byte region [c4ce2080, c4ce20c0)
[  141.046535] 
[  141.046809] The buggy address belongs to the physical page:
[  141.047393] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[  141.048708] flags: 0x800(slab|zone=0)
[  141.049209] page_type: 0xffffffff()
[  141.049769] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  141.050529] raw: 00000000
[  141.050972] page dumped because: kasan: bad access detected
[  141.051680] 
[  141.051937] Memory state around the buggy address:
[  141.052403]  c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.053359]  c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.054034] >c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.054875]            ^
[  141.055246]  c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.055978]  c4ce2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.056707] ==================================================================

test log snippet test parser 128

Home

[  141.015804] ==================================================================
[  141.016916] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd8/0x1d4
[  141.018073] Write of size 33 at addr c4ce2080 by task kunit_try_catch/159
[  141.018969] 
[  141.019308] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.020474] Hardware name: Generic DT based system
[  141.021182]  unwind_backtrace from show_stack+0x18/0x1c
[  141.021883]  show_stack from dump_stack_lvl+0x58/0x70
[  141.022568]  dump_stack_lvl from print_report+0x164/0x51c
[  141.023414]  print_report from kasan_report+0xc8/0x104
[  141.024139]  kasan_report from kasan_check_range+0x14c/0x198
[  141.025001]  kasan_check_range from __asan_memset+0x20/0x3c
[  141.025853]  __asan_memset from kmalloc_uaf_memset+0xd8/0x1d4
[  141.026578]  kmalloc_uaf_memset from kunit_try_run_case+0x11c/0x2e4
[  141.027530]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.028433]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.029374]  kthread from ret_from_fork+0x14/0x30
[  141.029970] Exception stack(0xf9febfb0 to 0xf9febff8)
[  141.030480] bfa0:                                     00000000 00000000 00000000 00000000
[  141.031247] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.032185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.033025] 
[  141.033313] Allocated by task 159:
[  141.033705]  kasan_set_track+0x3c/0x5c
[  141.034237]  __kasan_kmalloc+0x8c/0x94
[  141.034782]  kmalloc_uaf_memset+0xa0/0x1d4
[  141.035419]  kunit_try_run_case+0x11c/0x2e4
[  141.035967]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.036814]  kthread+0x184/0x1a8
[  141.037579]  ret_from_fork+0x14/0x30
[  141.038029] 
[  141.038316] Freed by task 159:
[  141.038689]  kasan_set_track+0x3c/0x5c
[  141.039215]  kasan_save_free_info+0x30/0x3c
[  141.039724]  __kasan_slab_free+0xdc/0x124
[  141.040271]  __kmem_cache_free+0x140/0x2a8
[  141.041051]  kmalloc_uaf_memset+0xbc/0x1d4
[  141.041593]  kunit_try_run_case+0x11c/0x2e4
[  141.042066]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.042908]  kthread+0x184/0x1a8
[  141.043396]  ret_from_fork+0x14/0x30
[  141.043854] 
[  141.044163] The buggy address belongs to the object at c4ce2080
[  141.044163]  which belongs to the cache kmalloc-64 of size 64
[  141.045358] The buggy address is located 0 bytes inside of
[  141.045358]  freed 64-byte region [c4ce2080, c4ce20c0)
[  141.046535] 
[  141.046809] The buggy address belongs to the physical page:
[  141.047393] page:6cfcbdb2 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce2
[  141.048708] flags: 0x800(slab|zone=0)
[  141.049209] page_type: 0xffffffff()
[  141.049769] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  141.050529] raw: 00000000
[  141.050972] page dumped because: kasan: bad access detected
[  141.051680] 
[  141.051937] Memory state around the buggy address:
[  141.052403]  c4ce1f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.053359]  c4ce2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.054034] >c4ce2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  141.054875]            ^
[  141.055246]  c4ce2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.055978]  c4ce2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  141.056707] ==================================================================

test log snippet test parser 129

Home

[  142.334354] ==================================================================
[  142.335451] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1cc
[  142.336316] Read of size 1 at addr c8fe5000 by task kunit_try_catch/193
[  142.336919] 
[  142.337264] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.338952] Hardware name: Generic DT based system
[  142.339739]  unwind_backtrace from show_stack+0x18/0x1c
[  142.340615]  show_stack from dump_stack_lvl+0x58/0x70
[  142.341283]  dump_stack_lvl from print_report+0x164/0x51c
[  142.342050]  print_report from kasan_report+0xc8/0x104
[  142.342723]  kasan_report from __kasan_check_byte+0x34/0x3c
[  142.343460]  __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[  142.344366]  kmem_cache_destroy from kmem_cache_double_destroy+0xd0/0x1cc
[  142.345291]  kmem_cache_double_destroy from kunit_try_run_case+0x11c/0x2e4
[  142.346177]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.347143]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.347995]  kthread from ret_from_fork+0x14/0x30
[  142.348605] Exception stack(0xfa0b3fb0 to 0xfa0b3ff8)
[  142.349248] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.350195] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.351111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.351856] 
[  142.352095] Allocated by task 193:
[  142.352564]  kasan_set_track+0x3c/0x5c
[  142.353084]  __kasan_slab_alloc+0x60/0x68
[  142.353723]  kmem_cache_alloc+0x1dc/0x574
[  142.354351]  kmem_cache_create_usercopy+0x160/0x2a8
[  142.355190]  kmem_cache_create+0x28/0x30
[  142.355944]  kmem_cache_double_destroy+0xa0/0x1cc
[  142.356722]  kunit_try_run_case+0x11c/0x2e4
[  142.357611]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.358907]  kthread+0x184/0x1a8
[  142.359404]  ret_from_fork+0x14/0x30
[  142.359919] 
[  142.360239] Freed by task 193:
[  142.360637]  kasan_set_track+0x3c/0x5c
[  142.361204]  kasan_save_free_info+0x30/0x3c
[  142.361785]  __kasan_slab_free+0xdc/0x124
[  142.362382]  kmem_cache_free+0x170/0x41c
[  142.362891]  kobject_put+0xfc/0x320
[  142.363426]  kmem_cache_double_destroy+0xbc/0x1cc
[  142.364118]  kunit_try_run_case+0x11c/0x2e4
[  142.364634]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.365456]  kthread+0x184/0x1a8
[  142.365896]  ret_from_fork+0x14/0x30
[  142.366337] 
[  142.366632] The buggy address belongs to the object at c8fe5000
[  142.366632]  which belongs to the cache kmem_cache of size 132
[  142.367775] The buggy address is located 0 bytes inside of
[  142.367775]  freed 132-byte region [c8fe5000, c8fe5084)
[  142.368826] 
[  142.369141] The buggy address belongs to the physical page:
[  142.369896] page:0aebde9c refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe5
[  142.370756] flags: 0x800(slab|zone=0)
[  142.371362] page_type: 0xffffffff()
[  142.371790] raw: 00000800 c4801000 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.372712] raw: 00000000
[  142.373029] page dumped because: kasan: bad access detected
[  142.373761] 
[  142.374042] Memory state around the buggy address:
[  142.374669]  c8fe4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.375433]  c8fe4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.376151] >c8fe5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.376830]            ^
[  142.377789]  c8fe5080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.378538]  c8fe5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.379302] ==================================================================

test log snippet test parser 130

Home

[  142.334354] ==================================================================
[  142.335451] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1cc
[  142.336316] Read of size 1 at addr c8fe5000 by task kunit_try_catch/193
[  142.336919] 
[  142.337264] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.338952] Hardware name: Generic DT based system
[  142.339739]  unwind_backtrace from show_stack+0x18/0x1c
[  142.340615]  show_stack from dump_stack_lvl+0x58/0x70
[  142.341283]  dump_stack_lvl from print_report+0x164/0x51c
[  142.342050]  print_report from kasan_report+0xc8/0x104
[  142.342723]  kasan_report from __kasan_check_byte+0x34/0x3c
[  142.343460]  __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[  142.344366]  kmem_cache_destroy from kmem_cache_double_destroy+0xd0/0x1cc
[  142.345291]  kmem_cache_double_destroy from kunit_try_run_case+0x11c/0x2e4
[  142.346177]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.347143]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.347995]  kthread from ret_from_fork+0x14/0x30
[  142.348605] Exception stack(0xfa0b3fb0 to 0xfa0b3ff8)
[  142.349248] 3fa0:                                     00000000 00000000 00000000 00000000
[  142.350195] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.351111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.351856] 
[  142.352095] Allocated by task 193:
[  142.352564]  kasan_set_track+0x3c/0x5c
[  142.353084]  __kasan_slab_alloc+0x60/0x68
[  142.353723]  kmem_cache_alloc+0x1dc/0x574
[  142.354351]  kmem_cache_create_usercopy+0x160/0x2a8
[  142.355190]  kmem_cache_create+0x28/0x30
[  142.355944]  kmem_cache_double_destroy+0xa0/0x1cc
[  142.356722]  kunit_try_run_case+0x11c/0x2e4
[  142.357611]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.358907]  kthread+0x184/0x1a8
[  142.359404]  ret_from_fork+0x14/0x30
[  142.359919] 
[  142.360239] Freed by task 193:
[  142.360637]  kasan_set_track+0x3c/0x5c
[  142.361204]  kasan_save_free_info+0x30/0x3c
[  142.361785]  __kasan_slab_free+0xdc/0x124
[  142.362382]  kmem_cache_free+0x170/0x41c
[  142.362891]  kobject_put+0xfc/0x320
[  142.363426]  kmem_cache_double_destroy+0xbc/0x1cc
[  142.364118]  kunit_try_run_case+0x11c/0x2e4
[  142.364634]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.365456]  kthread+0x184/0x1a8
[  142.365896]  ret_from_fork+0x14/0x30
[  142.366337] 
[  142.366632] The buggy address belongs to the object at c8fe5000
[  142.366632]  which belongs to the cache kmem_cache of size 132
[  142.367775] The buggy address is located 0 bytes inside of
[  142.367775]  freed 132-byte region [c8fe5000, c8fe5084)
[  142.368826] 
[  142.369141] The buggy address belongs to the physical page:
[  142.369896] page:0aebde9c refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe5
[  142.370756] flags: 0x800(slab|zone=0)
[  142.371362] page_type: 0xffffffff()
[  142.371790] raw: 00000800 c4801000 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.372712] raw: 00000000
[  142.373029] page dumped because: kasan: bad access detected
[  142.373761] 
[  142.374042] Memory state around the buggy address:
[  142.374669]  c8fe4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.375433]  c8fe4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.376151] >c8fe5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.376830]            ^
[  142.377789]  c8fe5080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.378538]  c8fe5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.379302] ==================================================================

test log snippet test parser 131

Home

[  140.473571] ==================================================================
[  140.474691] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2b8
[  140.475346] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[  140.476100] 
[  140.476388] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.477192] Hardware name: Generic DT based system
[  140.477813]  unwind_backtrace from show_stack+0x18/0x1c
[  140.478440]  show_stack from dump_stack_lvl+0x58/0x70
[  140.479342]  dump_stack_lvl from print_report+0x164/0x51c
[  140.480034]  print_report from kasan_report+0xc8/0x104
[  140.480952]  kasan_report from __kasan_check_byte+0x34/0x3c
[  140.481742]  __kasan_check_byte from krealloc+0x30/0x134
[  140.482476]  krealloc from krealloc_uaf+0xe4/0x2b8
[  140.483176]  krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  140.483898]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.484827]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.485695]  kthread from ret_from_fork+0x14/0x30
[  140.486292] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  140.486831] bfa0:                                     00000000 00000000 00000000 00000000
[  140.488180] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.489320] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.489931] 
[  140.490239] Allocated by task 137:
[  140.490722]  kasan_set_track+0x3c/0x5c
[  140.491205]  __kasan_kmalloc+0x8c/0x94
[  140.491912]  krealloc_uaf+0xac/0x2b8
[  140.492522]  kunit_try_run_case+0x11c/0x2e4
[  140.493063]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.493776]  kthread+0x184/0x1a8
[  140.494223]  ret_from_fork+0x14/0x30
[  140.494893] 
[  140.495204] Freed by task 137:
[  140.495593]  kasan_set_track+0x3c/0x5c
[  140.496225]  kasan_save_free_info+0x30/0x3c
[  140.496779]  __kasan_slab_free+0xdc/0x124
[  140.497396]  __kmem_cache_free+0x140/0x2a8
[  140.497914]  krealloc_uaf+0xc8/0x2b8
[  140.498510]  kunit_try_run_case+0x11c/0x2e4
[  140.499062]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.499719]  kthread+0x184/0x1a8
[  140.500210]  ret_from_fork+0x14/0x30
[  140.500696] 
[  140.500991] The buggy address belongs to the object at c4d5e600
[  140.500991]  which belongs to the cache kmalloc-256 of size 256
[  140.502295] The buggy address is located 0 bytes inside of
[  140.502295]  freed 256-byte region [c4d5e600, c4d5e700)
[  140.503612] 
[  140.503860] The buggy address belongs to the physical page:
[  140.504791] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.505650] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.506481] flags: 0x840(slab|head|zone=0)
[  140.506948] page_type: 0xffffffff()
[  140.507617] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.508950] raw: 00000000
[  140.509283] page dumped because: kasan: bad access detected
[  140.509797] 
[  140.510168] Memory state around the buggy address:
[  140.510783]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.511475]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.512205] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.512932]            ^
[  140.513258]  c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.514098]  c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.514696] ==================================================================
[  140.518209] ==================================================================
[  140.518921] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x11c/0x2b8
[  140.519610] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[  140.520314] 
[  140.520575] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.521462] Hardware name: Generic DT based system
[  140.522109]  unwind_backtrace from show_stack+0x18/0x1c
[  140.522780]  show_stack from dump_stack_lvl+0x58/0x70
[  140.523587]  dump_stack_lvl from print_report+0x164/0x51c
[  140.524220]  print_report from kasan_report+0xc8/0x104
[  140.524967]  kasan_report from krealloc_uaf+0x11c/0x2b8
[  140.525635]  krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  140.526454]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.527800]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.528724]  kthread from ret_from_fork+0x14/0x30
[  140.529210] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  140.529895] bfa0:                                     00000000 00000000 00000000 00000000
[  140.530792] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.531711] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.532415] 
[  140.532671] Allocated by task 137:
[  140.533104]  kasan_set_track+0x3c/0x5c
[  140.533608]  __kasan_kmalloc+0x8c/0x94
[  140.534482]  krealloc_uaf+0xac/0x2b8
[  140.535110]  kunit_try_run_case+0x11c/0x2e4
[  140.535769]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.536632]  kthread+0x184/0x1a8
[  140.537238]  ret_from_fork+0x14/0x30
[  140.537788] 
[  140.538055] Freed by task 137:
[  140.538382]  kasan_set_track+0x3c/0x5c
[  140.539041]  kasan_save_free_info+0x30/0x3c
[  140.539679]  __kasan_slab_free+0xdc/0x124
[  140.540371]  __kmem_cache_free+0x140/0x2a8
[  140.541041]  krealloc_uaf+0xc8/0x2b8
[  140.541676]  kunit_try_run_case+0x11c/0x2e4
[  140.542318]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.543066]  kthread+0x184/0x1a8
[  140.543548]  ret_from_fork+0x14/0x30
[  140.544076] 
[  140.544445] The buggy address belongs to the object at c4d5e600
[  140.544445]  which belongs to the cache kmalloc-256 of size 256
[  140.545842] The buggy address is located 0 bytes inside of
[  140.545842]  freed 256-byte region [c4d5e600, c4d5e700)
[  140.547097] 
[  140.547447] The buggy address belongs to the physical page:
[  140.548368] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.549454] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.550433] flags: 0x840(slab|head|zone=0)
[  140.551082] page_type: 0xffffffff()
[  140.551786] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.552629] raw: 00000000
[  140.552998] page dumped because: kasan: bad access detected
[  140.553595] 
[  140.553828] Memory state around the buggy address:
[  140.554353]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.555076]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.555845] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.556601]            ^
[  140.556914]  c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.557643]  c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.558305] ==================================================================

test log snippet test parser 132

Home

[  140.473571] ==================================================================
[  140.474691] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2b8
[  140.475346] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[  140.476100] 
[  140.476388] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.477192] Hardware name: Generic DT based system
[  140.477813]  unwind_backtrace from show_stack+0x18/0x1c
[  140.478440]  show_stack from dump_stack_lvl+0x58/0x70
[  140.479342]  dump_stack_lvl from print_report+0x164/0x51c
[  140.480034]  print_report from kasan_report+0xc8/0x104
[  140.480952]  kasan_report from __kasan_check_byte+0x34/0x3c
[  140.481742]  __kasan_check_byte from krealloc+0x30/0x134
[  140.482476]  krealloc from krealloc_uaf+0xe4/0x2b8
[  140.483176]  krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  140.483898]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.484827]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.485695]  kthread from ret_from_fork+0x14/0x30
[  140.486292] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  140.486831] bfa0:                                     00000000 00000000 00000000 00000000
[  140.488180] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.489320] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.489931] 
[  140.490239] Allocated by task 137:
[  140.490722]  kasan_set_track+0x3c/0x5c
[  140.491205]  __kasan_kmalloc+0x8c/0x94
[  140.491912]  krealloc_uaf+0xac/0x2b8
[  140.492522]  kunit_try_run_case+0x11c/0x2e4
[  140.493063]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.493776]  kthread+0x184/0x1a8
[  140.494223]  ret_from_fork+0x14/0x30
[  140.494893] 
[  140.495204] Freed by task 137:
[  140.495593]  kasan_set_track+0x3c/0x5c
[  140.496225]  kasan_save_free_info+0x30/0x3c
[  140.496779]  __kasan_slab_free+0xdc/0x124
[  140.497396]  __kmem_cache_free+0x140/0x2a8
[  140.497914]  krealloc_uaf+0xc8/0x2b8
[  140.498510]  kunit_try_run_case+0x11c/0x2e4
[  140.499062]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.499719]  kthread+0x184/0x1a8
[  140.500210]  ret_from_fork+0x14/0x30
[  140.500696] 
[  140.500991] The buggy address belongs to the object at c4d5e600
[  140.500991]  which belongs to the cache kmalloc-256 of size 256
[  140.502295] The buggy address is located 0 bytes inside of
[  140.502295]  freed 256-byte region [c4d5e600, c4d5e700)
[  140.503612] 
[  140.503860] The buggy address belongs to the physical page:
[  140.504791] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.505650] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.506481] flags: 0x840(slab|head|zone=0)
[  140.506948] page_type: 0xffffffff()
[  140.507617] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.508950] raw: 00000000
[  140.509283] page dumped because: kasan: bad access detected
[  140.509797] 
[  140.510168] Memory state around the buggy address:
[  140.510783]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.511475]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.512205] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.512932]            ^
[  140.513258]  c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.514098]  c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.514696] ==================================================================

test log snippet test parser 133

Home

[  140.518209] ==================================================================
[  140.518921] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x11c/0x2b8
[  140.519610] Read of size 1 at addr c4d5e600 by task kunit_try_catch/137
[  140.520314] 
[  140.520575] CPU: 1 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  140.521462] Hardware name: Generic DT based system
[  140.522109]  unwind_backtrace from show_stack+0x18/0x1c
[  140.522780]  show_stack from dump_stack_lvl+0x58/0x70
[  140.523587]  dump_stack_lvl from print_report+0x164/0x51c
[  140.524220]  print_report from kasan_report+0xc8/0x104
[  140.524967]  kasan_report from krealloc_uaf+0x11c/0x2b8
[  140.525635]  krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  140.526454]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.527800]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  140.528724]  kthread from ret_from_fork+0x14/0x30
[  140.529210] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  140.529895] bfa0:                                     00000000 00000000 00000000 00000000
[  140.530792] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  140.531711] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  140.532415] 
[  140.532671] Allocated by task 137:
[  140.533104]  kasan_set_track+0x3c/0x5c
[  140.533608]  __kasan_kmalloc+0x8c/0x94
[  140.534482]  krealloc_uaf+0xac/0x2b8
[  140.535110]  kunit_try_run_case+0x11c/0x2e4
[  140.535769]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.536632]  kthread+0x184/0x1a8
[  140.537238]  ret_from_fork+0x14/0x30
[  140.537788] 
[  140.538055] Freed by task 137:
[  140.538382]  kasan_set_track+0x3c/0x5c
[  140.539041]  kasan_save_free_info+0x30/0x3c
[  140.539679]  __kasan_slab_free+0xdc/0x124
[  140.540371]  __kmem_cache_free+0x140/0x2a8
[  140.541041]  krealloc_uaf+0xc8/0x2b8
[  140.541676]  kunit_try_run_case+0x11c/0x2e4
[  140.542318]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  140.543066]  kthread+0x184/0x1a8
[  140.543548]  ret_from_fork+0x14/0x30
[  140.544076] 
[  140.544445] The buggy address belongs to the object at c4d5e600
[  140.544445]  which belongs to the cache kmalloc-256 of size 256
[  140.545842] The buggy address is located 0 bytes inside of
[  140.545842]  freed 256-byte region [c4d5e600, c4d5e700)
[  140.547097] 
[  140.547447] The buggy address belongs to the physical page:
[  140.548368] page:fe49e59f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d5e
[  140.549454] head:fe49e59f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  140.550433] flags: 0x840(slab|head|zone=0)
[  140.551082] page_type: 0xffffffff()
[  140.551786] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  140.552629] raw: 00000000
[  140.552998] page dumped because: kasan: bad access detected
[  140.553595] 
[  140.553828] Memory state around the buggy address:
[  140.554353]  c4d5e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.555076]  c4d5e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.555845] >c4d5e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.556601]            ^
[  140.556914]  c4d5e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  140.557643]  c4d5e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  140.558305] ==================================================================

test log snippet test parser 134

Home

[  142.124787] ==================================================================
[  142.125413] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[  142.126401] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[  142.127802] 
[  142.128168] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.129159] Hardware name: Generic DT based system
[  142.129743]  unwind_backtrace from show_stack+0x18/0x1c
[  142.130452]  show_stack from dump_stack_lvl+0x58/0x70
[  142.131193]  dump_stack_lvl from print_report+0x164/0x51c
[  142.132167]  print_report from kasan_report+0xc8/0x104
[  142.132949]  kasan_report from ksize_uaf+0xfc/0x308
[  142.133669]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  142.134536]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.135522]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.136376]  kthread from ret_from_fork+0x14/0x30
[  142.137224] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[  142.137792] bfa0:                                     00000000 00000000 00000000 00000000
[  142.138706] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.139966] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.140717] 
[  142.140958] Allocated by task 187:
[  142.141406]  kasan_set_track+0x3c/0x5c
[  142.141939]  __kasan_kmalloc+0x8c/0x94
[  142.142570]  ksize_uaf+0xa0/0x308
[  142.143022]  kunit_try_run_case+0x11c/0x2e4
[  142.143615]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.144323]  kthread+0x184/0x1a8
[  142.144739]  ret_from_fork+0x14/0x30
[  142.145233] 
[  142.145526] Freed by task 187:
[  142.146046]  kasan_set_track+0x3c/0x5c
[  142.146578]  kasan_save_free_info+0x30/0x3c
[  142.147346]  __kasan_slab_free+0xdc/0x124
[  142.148490]  __kmem_cache_free+0x140/0x2a8
[  142.149164]  ksize_uaf+0xbc/0x308
[  142.149585]  kunit_try_run_case+0x11c/0x2e4
[  142.150206]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.151007]  kthread+0x184/0x1a8
[  142.151542]  ret_from_fork+0x14/0x30
[  142.151964] 
[  142.152318] The buggy address belongs to the object at c8e0b700
[  142.152318]  which belongs to the cache kmalloc-128 of size 128
[  142.153524] The buggy address is located 0 bytes inside of
[  142.153524]  freed 128-byte region [c8e0b700, c8e0b780)
[  142.154621] 
[  142.154916] The buggy address belongs to the physical page:
[  142.155532] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.156318] flags: 0x800(slab|zone=0)
[  142.156889] page_type: 0xffffffff()
[  142.157323] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.158843] raw: 00000000
[  142.159318] page dumped because: kasan: bad access detected
[  142.160202] 
[  142.160450] Memory state around the buggy address:
[  142.160891]  c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.161572]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.162338] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.162939]            ^
[  142.163398]  c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.164021]  c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.164800] ==================================================================
[  142.081937] ==================================================================
[  142.082973] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[  142.083683] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[  142.084405] 
[  142.084747] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.085557] Hardware name: Generic DT based system
[  142.086222]  unwind_backtrace from show_stack+0x18/0x1c
[  142.086867]  show_stack from dump_stack_lvl+0x58/0x70
[  142.087575]  dump_stack_lvl from print_report+0x164/0x51c
[  142.088591]  print_report from kasan_report+0xc8/0x104
[  142.089314]  kasan_report from __kasan_check_byte+0x34/0x3c
[  142.089988]  __kasan_check_byte from ksize+0x20/0x3c
[  142.090942]  ksize from ksize_uaf+0xd0/0x308
[  142.091664]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  142.092394]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.093448]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.094303]  kthread from ret_from_fork+0x14/0x30
[  142.094974] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[  142.095592] bfa0:                                     00000000 00000000 00000000 00000000
[  142.096498] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.097701] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.098226] 
[  142.098418] Allocated by task 187:
[  142.098723]  kasan_set_track+0x3c/0x5c
[  142.099114]  __kasan_kmalloc+0x8c/0x94
[  142.100274]  ksize_uaf+0xa0/0x308
[  142.100848]  kunit_try_run_case+0x11c/0x2e4
[  142.101515]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.102395]  kthread+0x184/0x1a8
[  142.102820]  ret_from_fork+0x14/0x30
[  142.103232] 
[  142.103440] Freed by task 187:
[  142.103977]  kasan_set_track+0x3c/0x5c
[  142.104750]  kasan_save_free_info+0x30/0x3c
[  142.105440]  __kasan_slab_free+0xdc/0x124
[  142.105971]  __kmem_cache_free+0x140/0x2a8
[  142.106443]  ksize_uaf+0xbc/0x308
[  142.107651]  kunit_try_run_case+0x11c/0x2e4
[  142.108213]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.108918]  kthread+0x184/0x1a8
[  142.109333]  ret_from_fork+0x14/0x30
[  142.109881] 
[  142.110107] The buggy address belongs to the object at c8e0b700
[  142.110107]  which belongs to the cache kmalloc-128 of size 128
[  142.111710] The buggy address is located 0 bytes inside of
[  142.111710]  freed 128-byte region [c8e0b700, c8e0b780)
[  142.113009] 
[  142.113289] The buggy address belongs to the physical page:
[  142.113853] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.114803] flags: 0x800(slab|zone=0)
[  142.115353] page_type: 0xffffffff()
[  142.115899] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.116910] raw: 00000000
[  142.117357] page dumped because: kasan: bad access detected
[  142.118154] 
[  142.118356] Memory state around the buggy address:
[  142.119253]  c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.120089]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.120830] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.121537]            ^
[  142.121931]  c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.122682]  c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.123632] ==================================================================
[  142.165980] ==================================================================
[  142.166667] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[  142.167374] Read of size 1 at addr c8e0b778 by task kunit_try_catch/187
[  142.168411] 
[  142.168652] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.169362] Hardware name: Generic DT based system
[  142.170698]  unwind_backtrace from show_stack+0x18/0x1c
[  142.171602]  show_stack from dump_stack_lvl+0x58/0x70
[  142.172660]  dump_stack_lvl from print_report+0x164/0x51c
[  142.173389]  print_report from kasan_report+0xc8/0x104
[  142.174073]  kasan_report from ksize_uaf+0x12c/0x308
[  142.174806]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  142.175585]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.176520]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.177596]  kthread from ret_from_fork+0x14/0x30
[  142.178185] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[  142.178706] bfa0:                                     00000000 00000000 00000000 00000000
[  142.179989] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.180891] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.181549] 
[  142.181860] Allocated by task 187:
[  142.182245]  kasan_set_track+0x3c/0x5c
[  142.182833]  __kasan_kmalloc+0x8c/0x94
[  142.183434]  ksize_uaf+0xa0/0x308
[  142.183964]  kunit_try_run_case+0x11c/0x2e4
[  142.184607]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.185347]  kthread+0x184/0x1a8
[  142.185753]  ret_from_fork+0x14/0x30
[  142.186314] 
[  142.186570] Freed by task 187:
[  142.186892]  kasan_set_track+0x3c/0x5c
[  142.188170]  kasan_save_free_info+0x30/0x3c
[  142.188730]  __kasan_slab_free+0xdc/0x124
[  142.189372]  __kmem_cache_free+0x140/0x2a8
[  142.189902]  ksize_uaf+0xbc/0x308
[  142.190361]  kunit_try_run_case+0x11c/0x2e4
[  142.191056]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.191622]  kthread+0x184/0x1a8
[  142.192162]  ret_from_fork+0x14/0x30
[  142.192779] 
[  142.193004] The buggy address belongs to the object at c8e0b700
[  142.193004]  which belongs to the cache kmalloc-128 of size 128
[  142.194268] The buggy address is located 120 bytes inside of
[  142.194268]  freed 128-byte region [c8e0b700, c8e0b780)
[  142.195430] 
[  142.195748] The buggy address belongs to the physical page:
[  142.196341] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.197655] flags: 0x800(slab|zone=0)
[  142.198145] page_type: 0xffffffff()
[  142.198702] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.199629] raw: 00000000
[  142.200069] page dumped because: kasan: bad access detected
[  142.201040] 
[  142.201419] Memory state around the buggy address:
[  142.201881]  c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.202675]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.203444] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.204163]                                                         ^
[  142.204804]  c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.205611]  c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.206220] ==================================================================

test log snippet test parser 135

Home

[  142.165980] ==================================================================
[  142.166667] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[  142.167374] Read of size 1 at addr c8e0b778 by task kunit_try_catch/187
[  142.168411] 
[  142.168652] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.169362] Hardware name: Generic DT based system
[  142.170698]  unwind_backtrace from show_stack+0x18/0x1c
[  142.171602]  show_stack from dump_stack_lvl+0x58/0x70
[  142.172660]  dump_stack_lvl from print_report+0x164/0x51c
[  142.173389]  print_report from kasan_report+0xc8/0x104
[  142.174073]  kasan_report from ksize_uaf+0x12c/0x308
[  142.174806]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  142.175585]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.176520]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.177596]  kthread from ret_from_fork+0x14/0x30
[  142.178185] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[  142.178706] bfa0:                                     00000000 00000000 00000000 00000000
[  142.179989] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.180891] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.181549] 
[  142.181860] Allocated by task 187:
[  142.182245]  kasan_set_track+0x3c/0x5c
[  142.182833]  __kasan_kmalloc+0x8c/0x94
[  142.183434]  ksize_uaf+0xa0/0x308
[  142.183964]  kunit_try_run_case+0x11c/0x2e4
[  142.184607]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.185347]  kthread+0x184/0x1a8
[  142.185753]  ret_from_fork+0x14/0x30
[  142.186314] 
[  142.186570] Freed by task 187:
[  142.186892]  kasan_set_track+0x3c/0x5c
[  142.188170]  kasan_save_free_info+0x30/0x3c
[  142.188730]  __kasan_slab_free+0xdc/0x124
[  142.189372]  __kmem_cache_free+0x140/0x2a8
[  142.189902]  ksize_uaf+0xbc/0x308
[  142.190361]  kunit_try_run_case+0x11c/0x2e4
[  142.191056]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.191622]  kthread+0x184/0x1a8
[  142.192162]  ret_from_fork+0x14/0x30
[  142.192779] 
[  142.193004] The buggy address belongs to the object at c8e0b700
[  142.193004]  which belongs to the cache kmalloc-128 of size 128
[  142.194268] The buggy address is located 120 bytes inside of
[  142.194268]  freed 128-byte region [c8e0b700, c8e0b780)
[  142.195430] 
[  142.195748] The buggy address belongs to the physical page:
[  142.196341] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.197655] flags: 0x800(slab|zone=0)
[  142.198145] page_type: 0xffffffff()
[  142.198702] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.199629] raw: 00000000
[  142.200069] page dumped because: kasan: bad access detected
[  142.201040] 
[  142.201419] Memory state around the buggy address:
[  142.201881]  c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.202675]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.203444] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.204163]                                                         ^
[  142.204804]  c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.205611]  c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.206220] ==================================================================

test log snippet test parser 136

Home

[  142.081937] ==================================================================
[  142.082973] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[  142.083683] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[  142.084405] 
[  142.084747] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.085557] Hardware name: Generic DT based system
[  142.086222]  unwind_backtrace from show_stack+0x18/0x1c
[  142.086867]  show_stack from dump_stack_lvl+0x58/0x70
[  142.087575]  dump_stack_lvl from print_report+0x164/0x51c
[  142.088591]  print_report from kasan_report+0xc8/0x104
[  142.089314]  kasan_report from __kasan_check_byte+0x34/0x3c
[  142.089988]  __kasan_check_byte from ksize+0x20/0x3c
[  142.090942]  ksize from ksize_uaf+0xd0/0x308
[  142.091664]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  142.092394]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.093448]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.094303]  kthread from ret_from_fork+0x14/0x30
[  142.094974] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[  142.095592] bfa0:                                     00000000 00000000 00000000 00000000
[  142.096498] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.097701] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.098226] 
[  142.098418] Allocated by task 187:
[  142.098723]  kasan_set_track+0x3c/0x5c
[  142.099114]  __kasan_kmalloc+0x8c/0x94
[  142.100274]  ksize_uaf+0xa0/0x308
[  142.100848]  kunit_try_run_case+0x11c/0x2e4
[  142.101515]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.102395]  kthread+0x184/0x1a8
[  142.102820]  ret_from_fork+0x14/0x30
[  142.103232] 
[  142.103440] Freed by task 187:
[  142.103977]  kasan_set_track+0x3c/0x5c
[  142.104750]  kasan_save_free_info+0x30/0x3c
[  142.105440]  __kasan_slab_free+0xdc/0x124
[  142.105971]  __kmem_cache_free+0x140/0x2a8
[  142.106443]  ksize_uaf+0xbc/0x308
[  142.107651]  kunit_try_run_case+0x11c/0x2e4
[  142.108213]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.108918]  kthread+0x184/0x1a8
[  142.109333]  ret_from_fork+0x14/0x30
[  142.109881] 
[  142.110107] The buggy address belongs to the object at c8e0b700
[  142.110107]  which belongs to the cache kmalloc-128 of size 128
[  142.111710] The buggy address is located 0 bytes inside of
[  142.111710]  freed 128-byte region [c8e0b700, c8e0b780)
[  142.113009] 
[  142.113289] The buggy address belongs to the physical page:
[  142.113853] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.114803] flags: 0x800(slab|zone=0)
[  142.115353] page_type: 0xffffffff()
[  142.115899] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.116910] raw: 00000000
[  142.117357] page dumped because: kasan: bad access detected
[  142.118154] 
[  142.118356] Memory state around the buggy address:
[  142.119253]  c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.120089]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.120830] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.121537]            ^
[  142.121931]  c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.122682]  c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.123632] ==================================================================

test log snippet test parser 137

Home

[  142.124787] ==================================================================
[  142.125413] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[  142.126401] Read of size 1 at addr c8e0b700 by task kunit_try_catch/187
[  142.127802] 
[  142.128168] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.129159] Hardware name: Generic DT based system
[  142.129743]  unwind_backtrace from show_stack+0x18/0x1c
[  142.130452]  show_stack from dump_stack_lvl+0x58/0x70
[  142.131193]  dump_stack_lvl from print_report+0x164/0x51c
[  142.132167]  print_report from kasan_report+0xc8/0x104
[  142.132949]  kasan_report from ksize_uaf+0xfc/0x308
[  142.133669]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  142.134536]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.135522]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.136376]  kthread from ret_from_fork+0x14/0x30
[  142.137224] Exception stack(0xf9d5bfb0 to 0xf9d5bff8)
[  142.137792] bfa0:                                     00000000 00000000 00000000 00000000
[  142.138706] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.139966] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.140717] 
[  142.140958] Allocated by task 187:
[  142.141406]  kasan_set_track+0x3c/0x5c
[  142.141939]  __kasan_kmalloc+0x8c/0x94
[  142.142570]  ksize_uaf+0xa0/0x308
[  142.143022]  kunit_try_run_case+0x11c/0x2e4
[  142.143615]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.144323]  kthread+0x184/0x1a8
[  142.144739]  ret_from_fork+0x14/0x30
[  142.145233] 
[  142.145526] Freed by task 187:
[  142.146046]  kasan_set_track+0x3c/0x5c
[  142.146578]  kasan_save_free_info+0x30/0x3c
[  142.147346]  __kasan_slab_free+0xdc/0x124
[  142.148490]  __kmem_cache_free+0x140/0x2a8
[  142.149164]  ksize_uaf+0xbc/0x308
[  142.149585]  kunit_try_run_case+0x11c/0x2e4
[  142.150206]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.151007]  kthread+0x184/0x1a8
[  142.151542]  ret_from_fork+0x14/0x30
[  142.151964] 
[  142.152318] The buggy address belongs to the object at c8e0b700
[  142.152318]  which belongs to the cache kmalloc-128 of size 128
[  142.153524] The buggy address is located 0 bytes inside of
[  142.153524]  freed 128-byte region [c8e0b700, c8e0b780)
[  142.154621] 
[  142.154916] The buggy address belongs to the physical page:
[  142.155532] page:53fa0ed7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e0b
[  142.156318] flags: 0x800(slab|zone=0)
[  142.156889] page_type: 0xffffffff()
[  142.157323] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  142.158843] raw: 00000000
[  142.159318] page dumped because: kasan: bad access detected
[  142.160202] 
[  142.160450] Memory state around the buggy address:
[  142.160891]  c8e0b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.161572]  c8e0b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.162338] >c8e0b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  142.162939]            ^
[  142.163398]  c8e0b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.164021]  c8e0b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.164800] ==================================================================

test log snippet test parser 138

Home

[  143.277876] ==================================================================
[  143.278950] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x24/0x2c
[  143.279853] Read of size 4 at addr c8fe9d00 by task swapper/0/0
[  143.280433] 
[  143.280753] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.6.72-rc1 #1
[  143.281458] Hardware name: Generic DT based system
[  143.282094]  unwind_backtrace from show_stack+0x18/0x1c
[  143.282704]  show_stack from dump_stack_lvl+0x58/0x70
[  143.283542]  dump_stack_lvl from print_report+0x164/0x51c
[  143.284272]  print_report from kasan_report+0xc8/0x104
[  143.285063]  kasan_report from rcu_uaf_reclaim+0x24/0x2c
[  143.285768]  rcu_uaf_reclaim from rcu_core+0x418/0xc84
[  143.286415]  rcu_core from handle_softirqs+0x23c/0x5fc
[  143.287084]  handle_softirqs from irq_exit+0xec/0x138
[  143.287874]  irq_exit from __irq_svc+0x78/0x9c
[  143.288943] Exception stack(0xc3603ec0 to 0xc3603f08)
[  143.289907] 3ec0: e7b62fd0 00000000 e7b62fd0 00000000 c3614a00 c360bf60 00000000 c360bfbc
[  143.290808] 3ee0: b76c07e4 00000000 00000000 c3603f80 00000000 c3603f10 c04dc04c c04d367c
[  143.292033] 3f00: 60000013 ffffffff
[  143.292474]  __irq_svc from arch_local_irq_enable+0x4/0x8
[  143.293107]  arch_local_irq_enable from do_idle+0x2d8/0x380
[  143.293896]  do_idle from cpu_startup_entry+0x38/0x3c
[  143.294621]  cpu_startup_entry from rest_init+0xdc/0xe0
[  143.295338]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[  143.296206] 
[  143.296492] Allocated by task 207:
[  143.296885]  kasan_set_track+0x3c/0x5c
[  143.297432]  __kasan_kmalloc+0x8c/0x94
[  143.298033]  rcu_uaf+0xa0/0x1dc
[  143.298497]  kunit_try_run_case+0x11c/0x2e4
[  143.298996]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.299787]  kthread+0x184/0x1a8
[  143.300244]  ret_from_fork+0x14/0x30
[  143.300886] 
[  143.301116] Freed by task 0:
[  143.301519]  kasan_set_track+0x3c/0x5c
[  143.301985]  kasan_save_free_info+0x30/0x3c
[  143.302715]  __kasan_slab_free+0xdc/0x124
[  143.303182]  __kmem_cache_free+0x140/0x2a8
[  143.303898]  rcu_uaf_reclaim+0x1c/0x2c
[  143.304357]  rcu_core+0x418/0xc84
[  143.304974]  handle_softirqs+0x23c/0x5fc
[  143.305520]  irq_exit+0xec/0x138
[  143.306114]  __irq_svc+0x78/0x9c
[  143.306511]  arch_local_irq_enable+0x4/0x8
[  143.307156]  do_idle+0x2d8/0x380
[  143.308368]  cpu_startup_entry+0x38/0x3c
[  143.308909]  rest_init+0xdc/0xe0
[  143.309412]  arch_post_acpi_subsys_init+0x0/0x18
[  143.309986] 
[  143.310364] Last potentially related work creation:
[  143.310840]  kasan_save_stack+0x30/0x4c
[  143.311468]  __kasan_record_aux_stack+0x84/0x8c
[  143.312158]  __call_rcu_common.constprop.0+0x44/0x59c
[  143.312959]  rcu_uaf+0xdc/0x1dc
[  143.313443]  kunit_try_run_case+0x11c/0x2e4
[  143.313983]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.314690]  kthread+0x184/0x1a8
[  143.315118]  ret_from_fork+0x14/0x30
[  143.315744] 
[  143.315994] The buggy address belongs to the object at c8fe9d00
[  143.315994]  which belongs to the cache kmalloc-64 of size 64
[  143.317281] The buggy address is located 0 bytes inside of
[  143.317281]  freed 64-byte region [c8fe9d00, c8fe9d40)
[  143.318451] 
[  143.318736] The buggy address belongs to the physical page:
[  143.319311] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[  143.320355] flags: 0x800(slab|zone=0)
[  143.320790] page_type: 0xffffffff()
[  143.321385] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.322264] raw: 00000000
[  143.322792] page dumped because: kasan: bad access detected
[  143.323404] 
[  143.323785] Memory state around the buggy address:
[  143.324357]  c8fe9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.325090]  c8fe9c80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.325990] >c8fe9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.326667]            ^
[  143.327085]  c8fe9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.327805]  c8fe9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.328524] ==================================================================

test log snippet test parser 139

Home

[  143.277876] ==================================================================
[  143.278950] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x24/0x2c
[  143.279853] Read of size 4 at addr c8fe9d00 by task swapper/0/0
[  143.280433] 
[  143.280753] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.6.72-rc1 #1
[  143.281458] Hardware name: Generic DT based system
[  143.282094]  unwind_backtrace from show_stack+0x18/0x1c
[  143.282704]  show_stack from dump_stack_lvl+0x58/0x70
[  143.283542]  dump_stack_lvl from print_report+0x164/0x51c
[  143.284272]  print_report from kasan_report+0xc8/0x104
[  143.285063]  kasan_report from rcu_uaf_reclaim+0x24/0x2c
[  143.285768]  rcu_uaf_reclaim from rcu_core+0x418/0xc84
[  143.286415]  rcu_core from handle_softirqs+0x23c/0x5fc
[  143.287084]  handle_softirqs from irq_exit+0xec/0x138
[  143.287874]  irq_exit from __irq_svc+0x78/0x9c
[  143.288943] Exception stack(0xc3603ec0 to 0xc3603f08)
[  143.289907] 3ec0: e7b62fd0 00000000 e7b62fd0 00000000 c3614a00 c360bf60 00000000 c360bfbc
[  143.290808] 3ee0: b76c07e4 00000000 00000000 c3603f80 00000000 c3603f10 c04dc04c c04d367c
[  143.292033] 3f00: 60000013 ffffffff
[  143.292474]  __irq_svc from arch_local_irq_enable+0x4/0x8
[  143.293107]  arch_local_irq_enable from do_idle+0x2d8/0x380
[  143.293896]  do_idle from cpu_startup_entry+0x38/0x3c
[  143.294621]  cpu_startup_entry from rest_init+0xdc/0xe0
[  143.295338]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[  143.296206] 
[  143.296492] Allocated by task 207:
[  143.296885]  kasan_set_track+0x3c/0x5c
[  143.297432]  __kasan_kmalloc+0x8c/0x94
[  143.298033]  rcu_uaf+0xa0/0x1dc
[  143.298497]  kunit_try_run_case+0x11c/0x2e4
[  143.298996]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.299787]  kthread+0x184/0x1a8
[  143.300244]  ret_from_fork+0x14/0x30
[  143.300886] 
[  143.301116] Freed by task 0:
[  143.301519]  kasan_set_track+0x3c/0x5c
[  143.301985]  kasan_save_free_info+0x30/0x3c
[  143.302715]  __kasan_slab_free+0xdc/0x124
[  143.303182]  __kmem_cache_free+0x140/0x2a8
[  143.303898]  rcu_uaf_reclaim+0x1c/0x2c
[  143.304357]  rcu_core+0x418/0xc84
[  143.304974]  handle_softirqs+0x23c/0x5fc
[  143.305520]  irq_exit+0xec/0x138
[  143.306114]  __irq_svc+0x78/0x9c
[  143.306511]  arch_local_irq_enable+0x4/0x8
[  143.307156]  do_idle+0x2d8/0x380
[  143.308368]  cpu_startup_entry+0x38/0x3c
[  143.308909]  rest_init+0xdc/0xe0
[  143.309412]  arch_post_acpi_subsys_init+0x0/0x18
[  143.309986] 
[  143.310364] Last potentially related work creation:
[  143.310840]  kasan_save_stack+0x30/0x4c
[  143.311468]  __kasan_record_aux_stack+0x84/0x8c
[  143.312158]  __call_rcu_common.constprop.0+0x44/0x59c
[  143.312959]  rcu_uaf+0xdc/0x1dc
[  143.313443]  kunit_try_run_case+0x11c/0x2e4
[  143.313983]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.314690]  kthread+0x184/0x1a8
[  143.315118]  ret_from_fork+0x14/0x30
[  143.315744] 
[  143.315994] The buggy address belongs to the object at c8fe9d00
[  143.315994]  which belongs to the cache kmalloc-64 of size 64
[  143.317281] The buggy address is located 0 bytes inside of
[  143.317281]  freed 64-byte region [c8fe9d00, c8fe9d40)
[  143.318451] 
[  143.318736] The buggy address belongs to the physical page:
[  143.319311] page:e4a27790 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fe9
[  143.320355] flags: 0x800(slab|zone=0)
[  143.320790] page_type: 0xffffffff()
[  143.321385] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.322264] raw: 00000000
[  143.322792] page dumped because: kasan: bad access detected
[  143.323404] 
[  143.323785] Memory state around the buggy address:
[  143.324357]  c8fe9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.325090]  c8fe9c80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.325990] >c8fe9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.326667]            ^
[  143.327085]  c8fe9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.327805]  c8fe9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.328524] ==================================================================

test log snippet test parser 140

Home

[  142.450213] ==================================================================
[  142.452309] BUG: KASAN: slab-use-after-free in strcmp+0x20/0x54
[  142.453094] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.454035] 
[  142.454306] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.455051] Hardware name: Generic DT based system
[  142.455906]  unwind_backtrace from show_stack+0x18/0x1c
[  142.456720]  show_stack from dump_stack_lvl+0x58/0x70
[  142.457840]  dump_stack_lvl from print_report+0x164/0x51c
[  142.458897]  print_report from kasan_report+0xc8/0x104
[  142.459657]  kasan_report from strcmp+0x20/0x54
[  142.460418]  strcmp from kasan_strings+0x140/0x4ec
[  142.461219]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.462047]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.463029]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.463972]  kthread from ret_from_fork+0x14/0x30
[  142.464628] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.465345] bfa0:                                     00000000 00000000 00000000 00000000
[  142.466333] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.467473] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.468682] 
[  142.468874] Allocated by task 199:
[  142.469195]  kasan_set_track+0x3c/0x5c
[  142.469597]  __kasan_kmalloc+0x8c/0x94
[  142.469984]  kasan_strings+0xa0/0x4ec
[  142.471404]  kunit_try_run_case+0x11c/0x2e4
[  142.472182]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.473065]  kthread+0x184/0x1a8
[  142.473852]  ret_from_fork+0x14/0x30
[  142.474525] 
[  142.474738] Freed by task 199:
[  142.475342]  kasan_set_track+0x3c/0x5c
[  142.476056]  kasan_save_free_info+0x30/0x3c
[  142.476640]  __kasan_slab_free+0xdc/0x124
[  142.477619]  __kmem_cache_free+0x140/0x2a8
[  142.478597]  kasan_strings+0xbc/0x4ec
[  142.479099]  kunit_try_run_case+0x11c/0x2e4
[  142.479744]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.480499]  kthread+0x184/0x1a8
[  142.481013]  ret_from_fork+0x14/0x30
[  142.481581] 
[  142.481935] The buggy address belongs to the object at c9008500
[  142.481935]  which belongs to the cache kmalloc-64 of size 64
[  142.483312] The buggy address is located 16 bytes inside of
[  142.483312]  freed 64-byte region [c9008500, c9008540)
[  142.484626] 
[  142.484903] The buggy address belongs to the physical page:
[  142.485703] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.486712] flags: 0x800(slab|zone=0)
[  142.487607] page_type: 0xffffffff()
[  142.488208] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.489221] raw: 00000000
[  142.489672] page dumped because: kasan: bad access detected
[  142.490350] 
[  142.490666] Memory state around the buggy address:
[  142.491201]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.492065]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.492885] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.493743]                  ^
[  142.494189]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.494991]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.495738] ==================================================================

test log snippet test parser 141

Home

[  142.450213] ==================================================================
[  142.452309] BUG: KASAN: slab-use-after-free in strcmp+0x20/0x54
[  142.453094] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.454035] 
[  142.454306] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.455051] Hardware name: Generic DT based system
[  142.455906]  unwind_backtrace from show_stack+0x18/0x1c
[  142.456720]  show_stack from dump_stack_lvl+0x58/0x70
[  142.457840]  dump_stack_lvl from print_report+0x164/0x51c
[  142.458897]  print_report from kasan_report+0xc8/0x104
[  142.459657]  kasan_report from strcmp+0x20/0x54
[  142.460418]  strcmp from kasan_strings+0x140/0x4ec
[  142.461219]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.462047]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.463029]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.463972]  kthread from ret_from_fork+0x14/0x30
[  142.464628] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.465345] bfa0:                                     00000000 00000000 00000000 00000000
[  142.466333] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.467473] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.468682] 
[  142.468874] Allocated by task 199:
[  142.469195]  kasan_set_track+0x3c/0x5c
[  142.469597]  __kasan_kmalloc+0x8c/0x94
[  142.469984]  kasan_strings+0xa0/0x4ec
[  142.471404]  kunit_try_run_case+0x11c/0x2e4
[  142.472182]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.473065]  kthread+0x184/0x1a8
[  142.473852]  ret_from_fork+0x14/0x30
[  142.474525] 
[  142.474738] Freed by task 199:
[  142.475342]  kasan_set_track+0x3c/0x5c
[  142.476056]  kasan_save_free_info+0x30/0x3c
[  142.476640]  __kasan_slab_free+0xdc/0x124
[  142.477619]  __kmem_cache_free+0x140/0x2a8
[  142.478597]  kasan_strings+0xbc/0x4ec
[  142.479099]  kunit_try_run_case+0x11c/0x2e4
[  142.479744]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.480499]  kthread+0x184/0x1a8
[  142.481013]  ret_from_fork+0x14/0x30
[  142.481581] 
[  142.481935] The buggy address belongs to the object at c9008500
[  142.481935]  which belongs to the cache kmalloc-64 of size 64
[  142.483312] The buggy address is located 16 bytes inside of
[  142.483312]  freed 64-byte region [c9008500, c9008540)
[  142.484626] 
[  142.484903] The buggy address belongs to the physical page:
[  142.485703] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.486712] flags: 0x800(slab|zone=0)
[  142.487607] page_type: 0xffffffff()
[  142.488208] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.489221] raw: 00000000
[  142.489672] page dumped because: kasan: bad access detected
[  142.490350] 
[  142.490666] Memory state around the buggy address:
[  142.491201]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.492065]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.492885] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.493743]                  ^
[  142.494189]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.494991]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.495738] ==================================================================

test log snippet test parser 142

Home

[  142.540784] ==================================================================
[  142.541802] BUG: KASAN: slab-use-after-free in strlen+0xc/0x44
[  142.542331] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.543232] 
[  142.543445] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.544658] Hardware name: Generic DT based system
[  142.545285]  unwind_backtrace from show_stack+0x18/0x1c
[  142.545989]  show_stack from dump_stack_lvl+0x58/0x70
[  142.546656]  dump_stack_lvl from print_report+0x164/0x51c
[  142.547420]  print_report from kasan_report+0xc8/0x104
[  142.548084]  kasan_report from strlen+0xc/0x44
[  142.548946]  strlen from kasan_strings+0x1a8/0x4ec
[  142.550068]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.550876]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.551986]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.552952]  kthread from ret_from_fork+0x14/0x30
[  142.553603] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.554160] bfa0:                                     00000000 00000000 00000000 00000000
[  142.554999] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.556067] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.556931] 
[  142.557214] Allocated by task 199:
[  142.557643]  kasan_set_track+0x3c/0x5c
[  142.558116]  __kasan_kmalloc+0x8c/0x94
[  142.558797]  kasan_strings+0xa0/0x4ec
[  142.559775]  kunit_try_run_case+0x11c/0x2e4
[  142.560602]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.561293]  kthread+0x184/0x1a8
[  142.561735]  ret_from_fork+0x14/0x30
[  142.562208] 
[  142.562452] Freed by task 199:
[  142.562927]  kasan_set_track+0x3c/0x5c
[  142.563602]  kasan_save_free_info+0x30/0x3c
[  142.564427]  __kasan_slab_free+0xdc/0x124
[  142.565196]  __kmem_cache_free+0x140/0x2a8
[  142.565870]  kasan_strings+0xbc/0x4ec
[  142.566175]  kunit_try_run_case+0x11c/0x2e4
[  142.566841]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.568155]  kthread+0x184/0x1a8
[  142.568634]  ret_from_fork+0x14/0x30
[  142.569197] 
[  142.569480] The buggy address belongs to the object at c9008500
[  142.569480]  which belongs to the cache kmalloc-64 of size 64
[  142.570671] The buggy address is located 16 bytes inside of
[  142.570671]  freed 64-byte region [c9008500, c9008540)
[  142.571954] 
[  142.572335] The buggy address belongs to the physical page:
[  142.572931] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.574108] flags: 0x800(slab|zone=0)
[  142.574822] page_type: 0xffffffff()
[  142.575566] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.576567] raw: 00000000
[  142.577311] page dumped because: kasan: bad access detected
[  142.578249] 
[  142.578569] Memory state around the buggy address:
[  142.579069]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.579837]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.580515] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.581213]                  ^
[  142.581538]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.582319]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.583063] ==================================================================

test log snippet test parser 143

Home

[  142.540784] ==================================================================
[  142.541802] BUG: KASAN: slab-use-after-free in strlen+0xc/0x44
[  142.542331] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.543232] 
[  142.543445] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.544658] Hardware name: Generic DT based system
[  142.545285]  unwind_backtrace from show_stack+0x18/0x1c
[  142.545989]  show_stack from dump_stack_lvl+0x58/0x70
[  142.546656]  dump_stack_lvl from print_report+0x164/0x51c
[  142.547420]  print_report from kasan_report+0xc8/0x104
[  142.548084]  kasan_report from strlen+0xc/0x44
[  142.548946]  strlen from kasan_strings+0x1a8/0x4ec
[  142.550068]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.550876]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.551986]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.552952]  kthread from ret_from_fork+0x14/0x30
[  142.553603] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.554160] bfa0:                                     00000000 00000000 00000000 00000000
[  142.554999] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.556067] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.556931] 
[  142.557214] Allocated by task 199:
[  142.557643]  kasan_set_track+0x3c/0x5c
[  142.558116]  __kasan_kmalloc+0x8c/0x94
[  142.558797]  kasan_strings+0xa0/0x4ec
[  142.559775]  kunit_try_run_case+0x11c/0x2e4
[  142.560602]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.561293]  kthread+0x184/0x1a8
[  142.561735]  ret_from_fork+0x14/0x30
[  142.562208] 
[  142.562452] Freed by task 199:
[  142.562927]  kasan_set_track+0x3c/0x5c
[  142.563602]  kasan_save_free_info+0x30/0x3c
[  142.564427]  __kasan_slab_free+0xdc/0x124
[  142.565196]  __kmem_cache_free+0x140/0x2a8
[  142.565870]  kasan_strings+0xbc/0x4ec
[  142.566175]  kunit_try_run_case+0x11c/0x2e4
[  142.566841]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.568155]  kthread+0x184/0x1a8
[  142.568634]  ret_from_fork+0x14/0x30
[  142.569197] 
[  142.569480] The buggy address belongs to the object at c9008500
[  142.569480]  which belongs to the cache kmalloc-64 of size 64
[  142.570671] The buggy address is located 16 bytes inside of
[  142.570671]  freed 64-byte region [c9008500, c9008540)
[  142.571954] 
[  142.572335] The buggy address belongs to the physical page:
[  142.572931] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.574108] flags: 0x800(slab|zone=0)
[  142.574822] page_type: 0xffffffff()
[  142.575566] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.576567] raw: 00000000
[  142.577311] page dumped because: kasan: bad access detected
[  142.578249] 
[  142.578569] Memory state around the buggy address:
[  142.579069]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.579837]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.580515] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.581213]                  ^
[  142.581538]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.582319]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.583063] ==================================================================

test log snippet test parser 144

Home

[  142.583963] ==================================================================
[  142.584927] BUG: KASAN: slab-use-after-free in strnlen+0x30/0x58
[  142.585680] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.586443] 
[  142.586732] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.588382] Hardware name: Generic DT based system
[  142.588983]  unwind_backtrace from show_stack+0x18/0x1c
[  142.589891]  show_stack from dump_stack_lvl+0x58/0x70
[  142.590536]  dump_stack_lvl from print_report+0x164/0x51c
[  142.591368]  print_report from kasan_report+0xc8/0x104
[  142.592155]  kasan_report from strnlen+0x30/0x58
[  142.592808]  strnlen from kasan_strings+0x1dc/0x4ec
[  142.593444]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.594261]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.595253]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.596092]  kthread from ret_from_fork+0x14/0x30
[  142.596687] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.597806] bfa0:                                     00000000 00000000 00000000 00000000
[  142.598747] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.599757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.600469] 
[  142.600714] Allocated by task 199:
[  142.601093]  kasan_set_track+0x3c/0x5c
[  142.601706]  __kasan_kmalloc+0x8c/0x94
[  142.602226]  kasan_strings+0xa0/0x4ec
[  142.602672]  kunit_try_run_case+0x11c/0x2e4
[  142.603343]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.604079]  kthread+0x184/0x1a8
[  142.604486]  ret_from_fork+0x14/0x30
[  142.605071] 
[  142.605336] Freed by task 199:
[  142.605782]  kasan_set_track+0x3c/0x5c
[  142.606301]  kasan_save_free_info+0x30/0x3c
[  142.606788]  __kasan_slab_free+0xdc/0x124
[  142.607438]  __kmem_cache_free+0x140/0x2a8
[  142.608442]  kasan_strings+0xbc/0x4ec
[  142.609178]  kunit_try_run_case+0x11c/0x2e4
[  142.609674]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.610605]  kthread+0x184/0x1a8
[  142.611192]  ret_from_fork+0x14/0x30
[  142.611711] 
[  142.612050] The buggy address belongs to the object at c9008500
[  142.612050]  which belongs to the cache kmalloc-64 of size 64
[  142.613402] The buggy address is located 16 bytes inside of
[  142.613402]  freed 64-byte region [c9008500, c9008540)
[  142.614699] 
[  142.614944] The buggy address belongs to the physical page:
[  142.615709] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.616683] flags: 0x800(slab|zone=0)
[  142.617211] page_type: 0xffffffff()
[  142.618293] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.619179] raw: 00000000
[  142.619595] page dumped because: kasan: bad access detected
[  142.620238] 
[  142.620582] Memory state around the buggy address:
[  142.621319]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.622093]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.622979] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.623787]                  ^
[  142.624261]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.625083]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.625919] ==================================================================

test log snippet test parser 145

Home

[  142.583963] ==================================================================
[  142.584927] BUG: KASAN: slab-use-after-free in strnlen+0x30/0x58
[  142.585680] Read of size 1 at addr c9008510 by task kunit_try_catch/199
[  142.586443] 
[  142.586732] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  142.588382] Hardware name: Generic DT based system
[  142.588983]  unwind_backtrace from show_stack+0x18/0x1c
[  142.589891]  show_stack from dump_stack_lvl+0x58/0x70
[  142.590536]  dump_stack_lvl from print_report+0x164/0x51c
[  142.591368]  print_report from kasan_report+0xc8/0x104
[  142.592155]  kasan_report from strnlen+0x30/0x58
[  142.592808]  strnlen from kasan_strings+0x1dc/0x4ec
[  142.593444]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  142.594261]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.595253]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  142.596092]  kthread from ret_from_fork+0x14/0x30
[  142.596687] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  142.597806] bfa0:                                     00000000 00000000 00000000 00000000
[  142.598747] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  142.599757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  142.600469] 
[  142.600714] Allocated by task 199:
[  142.601093]  kasan_set_track+0x3c/0x5c
[  142.601706]  __kasan_kmalloc+0x8c/0x94
[  142.602226]  kasan_strings+0xa0/0x4ec
[  142.602672]  kunit_try_run_case+0x11c/0x2e4
[  142.603343]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.604079]  kthread+0x184/0x1a8
[  142.604486]  ret_from_fork+0x14/0x30
[  142.605071] 
[  142.605336] Freed by task 199:
[  142.605782]  kasan_set_track+0x3c/0x5c
[  142.606301]  kasan_save_free_info+0x30/0x3c
[  142.606788]  __kasan_slab_free+0xdc/0x124
[  142.607438]  __kmem_cache_free+0x140/0x2a8
[  142.608442]  kasan_strings+0xbc/0x4ec
[  142.609178]  kunit_try_run_case+0x11c/0x2e4
[  142.609674]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  142.610605]  kthread+0x184/0x1a8
[  142.611192]  ret_from_fork+0x14/0x30
[  142.611711] 
[  142.612050] The buggy address belongs to the object at c9008500
[  142.612050]  which belongs to the cache kmalloc-64 of size 64
[  142.613402] The buggy address is located 16 bytes inside of
[  142.613402]  freed 64-byte region [c9008500, c9008540)
[  142.614699] 
[  142.614944] The buggy address belongs to the physical page:
[  142.615709] page:722af14a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x49008
[  142.616683] flags: 0x800(slab|zone=0)
[  142.617211] page_type: 0xffffffff()
[  142.618293] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  142.619179] raw: 00000000
[  142.619595] page dumped because: kasan: bad access detected
[  142.620238] 
[  142.620582] Memory state around the buggy address:
[  142.621319]  c9008400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.622093]  c9008480: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  142.622979] >c9008500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  142.623787]                  ^
[  142.624261]  c9008580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  142.625083]  c9008600: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  142.625919] ==================================================================

test log snippet test parser 146

Home

[  143.339197] ==================================================================
[  143.340476] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x264
[  143.341257] Read of size 4 at addr c8fea080 by task kunit_try_catch/209
[  143.342019] 
[  143.342309] CPU: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.343413] Hardware name: Generic DT based system
[  143.343872]  unwind_backtrace from show_stack+0x18/0x1c
[  143.344649]  show_stack from dump_stack_lvl+0x58/0x70
[  143.345362]  dump_stack_lvl from print_report+0x164/0x51c
[  143.346117]  print_report from kasan_report+0xc8/0x104
[  143.346760]  kasan_report from workqueue_uaf+0x14c/0x264
[  143.347631]  workqueue_uaf from kunit_try_run_case+0x11c/0x2e4
[  143.348887]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.349875]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.350729]  kthread from ret_from_fork+0x14/0x30
[  143.351310] Exception stack(0xfa11bfb0 to 0xfa11bff8)
[  143.351934] bfa0:                                     00000000 00000000 00000000 00000000
[  143.352779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.353798] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.354490] 
[  143.354783] Allocated by task 209:
[  143.355172]  kasan_set_track+0x3c/0x5c
[  143.355690]  __kasan_kmalloc+0x8c/0x94
[  143.356200]  workqueue_uaf+0xcc/0x264
[  143.356714]  kunit_try_run_case+0x11c/0x2e4
[  143.357406]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.358265]  kthread+0x184/0x1a8
[  143.358867]  ret_from_fork+0x14/0x30
[  143.359874] 
[  143.360223] Freed by task 63:
[  143.360695]  kasan_set_track+0x3c/0x5c
[  143.361263]  kasan_save_free_info+0x30/0x3c
[  143.361784]  __kasan_slab_free+0xdc/0x124
[  143.362426]  __kmem_cache_free+0x140/0x2a8
[  143.363309]  process_one_work+0x2e4/0x678
[  143.363822]  worker_thread+0x4d8/0x828
[  143.364465]  kthread+0x184/0x1a8
[  143.364941]  ret_from_fork+0x14/0x30
[  143.365453] 
[  143.365709] Last potentially related work creation:
[  143.366255]  kasan_save_stack+0x30/0x4c
[  143.366908]  __kasan_record_aux_stack+0x84/0x8c
[  143.367709]  __queue_work+0x2a8/0x9b8
[  143.368473]  queue_work_on+0x98/0x9c
[  143.369007]  workqueue_uaf+0x128/0x264
[  143.369557]  kunit_try_run_case+0x11c/0x2e4
[  143.370190]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.370873]  kthread+0x184/0x1a8
[  143.371284]  ret_from_fork+0x14/0x30
[  143.371921] 
[  143.372178] The buggy address belongs to the object at c8fea080
[  143.372178]  which belongs to the cache kmalloc-64 of size 64
[  143.373351] The buggy address is located 0 bytes inside of
[  143.373351]  freed 64-byte region [c8fea080, c8fea0c0)
[  143.374534] 
[  143.374814] The buggy address belongs to the physical page:
[  143.375538] page:3f561fb6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fea
[  143.376439] flags: 0x800(slab|zone=0)
[  143.376884] page_type: 0xffffffff()
[  143.377408] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.378466] raw: 00000000
[  143.378950] page dumped because: kasan: bad access detected
[  143.379629] 
[  143.379921] Memory state around the buggy address:
[  143.380509]  c8fe9f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.381195]  c8fea000: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[  143.382233] >c8fea080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.383060]            ^
[  143.383477]  c8fea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.384273]  c8fea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.385034] ==================================================================

test log snippet test parser 147

Home

[  143.339197] ==================================================================
[  143.340476] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x264
[  143.341257] Read of size 4 at addr c8fea080 by task kunit_try_catch/209
[  143.342019] 
[  143.342309] CPU: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.343413] Hardware name: Generic DT based system
[  143.343872]  unwind_backtrace from show_stack+0x18/0x1c
[  143.344649]  show_stack from dump_stack_lvl+0x58/0x70
[  143.345362]  dump_stack_lvl from print_report+0x164/0x51c
[  143.346117]  print_report from kasan_report+0xc8/0x104
[  143.346760]  kasan_report from workqueue_uaf+0x14c/0x264
[  143.347631]  workqueue_uaf from kunit_try_run_case+0x11c/0x2e4
[  143.348887]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.349875]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.350729]  kthread from ret_from_fork+0x14/0x30
[  143.351310] Exception stack(0xfa11bfb0 to 0xfa11bff8)
[  143.351934] bfa0:                                     00000000 00000000 00000000 00000000
[  143.352779] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.353798] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.354490] 
[  143.354783] Allocated by task 209:
[  143.355172]  kasan_set_track+0x3c/0x5c
[  143.355690]  __kasan_kmalloc+0x8c/0x94
[  143.356200]  workqueue_uaf+0xcc/0x264
[  143.356714]  kunit_try_run_case+0x11c/0x2e4
[  143.357406]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.358265]  kthread+0x184/0x1a8
[  143.358867]  ret_from_fork+0x14/0x30
[  143.359874] 
[  143.360223] Freed by task 63:
[  143.360695]  kasan_set_track+0x3c/0x5c
[  143.361263]  kasan_save_free_info+0x30/0x3c
[  143.361784]  __kasan_slab_free+0xdc/0x124
[  143.362426]  __kmem_cache_free+0x140/0x2a8
[  143.363309]  process_one_work+0x2e4/0x678
[  143.363822]  worker_thread+0x4d8/0x828
[  143.364465]  kthread+0x184/0x1a8
[  143.364941]  ret_from_fork+0x14/0x30
[  143.365453] 
[  143.365709] Last potentially related work creation:
[  143.366255]  kasan_save_stack+0x30/0x4c
[  143.366908]  __kasan_record_aux_stack+0x84/0x8c
[  143.367709]  __queue_work+0x2a8/0x9b8
[  143.368473]  queue_work_on+0x98/0x9c
[  143.369007]  workqueue_uaf+0x128/0x264
[  143.369557]  kunit_try_run_case+0x11c/0x2e4
[  143.370190]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.370873]  kthread+0x184/0x1a8
[  143.371284]  ret_from_fork+0x14/0x30
[  143.371921] 
[  143.372178] The buggy address belongs to the object at c8fea080
[  143.372178]  which belongs to the cache kmalloc-64 of size 64
[  143.373351] The buggy address is located 0 bytes inside of
[  143.373351]  freed 64-byte region [c8fea080, c8fea0c0)
[  143.374534] 
[  143.374814] The buggy address belongs to the physical page:
[  143.375538] page:3f561fb6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fea
[  143.376439] flags: 0x800(slab|zone=0)
[  143.376884] page_type: 0xffffffff()
[  143.377408] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  143.378466] raw: 00000000
[  143.378950] page dumped because: kasan: bad access detected
[  143.379629] 
[  143.379921] Memory state around the buggy address:
[  143.380509]  c8fe9f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.381195]  c8fea000: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[  143.382233] >c8fea080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  143.383060]            ^
[  143.383477]  c8fea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.384273]  c8fea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  143.385034] ==================================================================

test log snippet test parser 148

Home

[  141.856169] ==================================================================
[  141.857551] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x174
[  141.859052] Read of size 1 at addr fa07be0a by task kunit_try_catch/179
[  141.859823] 
[  141.860144] CPU: 1 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.861172] Hardware name: Generic DT based system
[  141.861707]  unwind_backtrace from show_stack+0x18/0x1c
[  141.862392]  show_stack from dump_stack_lvl+0x58/0x70
[  141.863244]  dump_stack_lvl from print_report+0x164/0x51c
[  141.863994]  print_report from kasan_report+0xc8/0x104
[  141.864748]  kasan_report from kasan_stack_oob+0xc0/0x174
[  141.865547]  kasan_stack_oob from kunit_try_run_case+0x11c/0x2e4
[  141.866454]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.867402]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.868285]  kthread from ret_from_fork+0x14/0x30
[  141.868873] Exception stack(0xfa07bfb0 to 0xfa07bff8)
[  141.869465] bfa0:                                     00000000 00000000 00000000 00000000
[  141.870530] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.871509] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.872199] 
[  141.872565] The buggy address belongs to stack of task kunit_try_catch/179
[  141.873344]  and is located at offset 106 in frame:
[  141.873979]  kasan_stack_oob+0x0/0x174
[  141.875041] 
[  141.875315] This frame has 4 objects:
[  141.875842]  [32, 33) '__assertion'
[  141.875953]  [48, 52) 'array'
[  141.876457]  [64, 72) '__assertion'
[  141.876885]  [96, 106) 'stack_array'
[  141.877331] 
[  141.878162] The buggy address belongs to the virtual mapping at
[  141.878162]  [fa078000, fa07d000) created by:
[  141.878162]  kernel_clone+0xcc/0x4b0
[  141.879643] 
[  141.880102] The buggy address belongs to the physical page:
[  141.880922] page:03b3ba91 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc7e
[  141.881794] flags: 0x80000000(zone=2)
[  141.882251] page_type: 0xffffffff()
[  141.882722] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  141.883659] raw: 00000000
[  141.883971] page dumped because: kasan: bad access detected
[  141.884707] 
[  141.884923] Memory state around the buggy address:
[  141.885589]  fa07bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.886331]  fa07bd80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[  141.887083] >fa07be00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.887780]               ^
[  141.888189]  fa07be80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  141.888859]  fa07bf00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.889568] ==================================================================

test log snippet test parser 149

Home

[  141.856169] ==================================================================
[  141.857551] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x174
[  141.859052] Read of size 1 at addr fa07be0a by task kunit_try_catch/179
[  141.859823] 
[  141.860144] CPU: 1 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  141.861172] Hardware name: Generic DT based system
[  141.861707]  unwind_backtrace from show_stack+0x18/0x1c
[  141.862392]  show_stack from dump_stack_lvl+0x58/0x70
[  141.863244]  dump_stack_lvl from print_report+0x164/0x51c
[  141.863994]  print_report from kasan_report+0xc8/0x104
[  141.864748]  kasan_report from kasan_stack_oob+0xc0/0x174
[  141.865547]  kasan_stack_oob from kunit_try_run_case+0x11c/0x2e4
[  141.866454]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  141.867402]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  141.868285]  kthread from ret_from_fork+0x14/0x30
[  141.868873] Exception stack(0xfa07bfb0 to 0xfa07bff8)
[  141.869465] bfa0:                                     00000000 00000000 00000000 00000000
[  141.870530] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  141.871509] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  141.872199] 
[  141.872565] The buggy address belongs to stack of task kunit_try_catch/179
[  141.873344]  and is located at offset 106 in frame:
[  141.873979]  kasan_stack_oob+0x0/0x174
[  141.875041] 
[  141.875315] This frame has 4 objects:
[  141.875842]  [32, 33) '__assertion'
[  141.875953]  [48, 52) 'array'
[  141.876457]  [64, 72) '__assertion'
[  141.876885]  [96, 106) 'stack_array'
[  141.877331] 
[  141.878162] The buggy address belongs to the virtual mapping at
[  141.878162]  [fa078000, fa07d000) created by:
[  141.878162]  kernel_clone+0xcc/0x4b0
[  141.879643] 
[  141.880102] The buggy address belongs to the physical page:
[  141.880922] page:03b3ba91 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc7e
[  141.881794] flags: 0x80000000(zone=2)
[  141.882251] page_type: 0xffffffff()
[  141.882722] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  141.883659] raw: 00000000
[  141.883971] page dumped because: kasan: bad access detected
[  141.884707] 
[  141.884923] Memory state around the buggy address:
[  141.885589]  fa07bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  141.886331]  fa07bd80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[  141.887083] >fa07be00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.887780]               ^
[  141.888189]  fa07be80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  141.888859]  fa07bf00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  141.889568] ==================================================================

test log snippet test parser 150

Home

[  139.831567] ==================================================================
[  139.832804] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb4/0x1ac
[  139.833473] Read of size 1 at addr c8ec8000 by task kunit_try_catch/119
[  139.834138] 
[  139.834445] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.835314] Hardware name: Generic DT based system
[  139.835886]  unwind_backtrace from show_stack+0x18/0x1c
[  139.836748]  show_stack from dump_stack_lvl+0x58/0x70
[  139.837777]  dump_stack_lvl from print_report+0x164/0x51c
[  139.838757]  print_report from kasan_report+0xc8/0x104
[  139.839429]  kasan_report from kmalloc_pagealloc_uaf+0xb4/0x1ac
[  139.840011]  kmalloc_pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  139.842030]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.843063]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.843959]  kthread from ret_from_fork+0x14/0x30
[  139.844589] Exception stack(0xf9ec3fb0 to 0xf9ec3ff8)
[  139.845143] 3fa0:                                     00000000 00000000 00000000 00000000
[  139.846055] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.846909] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.847939] 
[  139.848654] The buggy address belongs to the physical page:
[  139.849309] page:9c6d4078 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48ec8
[  139.850519] flags: 0x0(zone=0)
[  139.850930] page_type: 0xffffffff()
[  139.851471] raw: 00000000 edd3a4b4 e7b68e84 00000000 00000000 00000000 ffffffff 00000000
[  139.852270] raw: 00000000
[  139.852788] page dumped because: kasan: bad access detected
[  139.853469] 
[  139.853764] Memory state around the buggy address:
[  139.854364]  c8ec7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.855102]  c8ec7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.855881] >c8ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.856610]            ^
[  139.857012]  c8ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.857897]  c8ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.859040] ==================================================================

test log snippet test parser 151

Home

[  139.831567] ==================================================================
[  139.832804] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb4/0x1ac
[  139.833473] Read of size 1 at addr c8ec8000 by task kunit_try_catch/119
[  139.834138] 
[  139.834445] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.835314] Hardware name: Generic DT based system
[  139.835886]  unwind_backtrace from show_stack+0x18/0x1c
[  139.836748]  show_stack from dump_stack_lvl+0x58/0x70
[  139.837777]  dump_stack_lvl from print_report+0x164/0x51c
[  139.838757]  print_report from kasan_report+0xc8/0x104
[  139.839429]  kasan_report from kmalloc_pagealloc_uaf+0xb4/0x1ac
[  139.840011]  kmalloc_pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  139.842030]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.843063]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.843959]  kthread from ret_from_fork+0x14/0x30
[  139.844589] Exception stack(0xf9ec3fb0 to 0xf9ec3ff8)
[  139.845143] 3fa0:                                     00000000 00000000 00000000 00000000
[  139.846055] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.846909] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.847939] 
[  139.848654] The buggy address belongs to the physical page:
[  139.849309] page:9c6d4078 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48ec8
[  139.850519] flags: 0x0(zone=0)
[  139.850930] page_type: 0xffffffff()
[  139.851471] raw: 00000000 edd3a4b4 e7b68e84 00000000 00000000 00000000 ffffffff 00000000
[  139.852270] raw: 00000000
[  139.852788] page dumped because: kasan: bad access detected
[  139.853469] 
[  139.853764] Memory state around the buggy address:
[  139.854364]  c8ec7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.855102]  c8ec7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  139.855881] >c8ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.856610]            ^
[  139.857012]  c8ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.857897]  c8ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.859040] ==================================================================

test log snippet test parser 152

Home

[  139.905761] ==================================================================
[  139.907018] BUG: KASAN: use-after-free in pagealloc_uaf+0xc8/0x1cc
[  139.907766] Read of size 1 at addr c8f80000 by task kunit_try_catch/125
[  139.909669] 
[  139.910099] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.911211] Hardware name: Generic DT based system
[  139.911748]  unwind_backtrace from show_stack+0x18/0x1c
[  139.912691]  show_stack from dump_stack_lvl+0x58/0x70
[  139.913388]  dump_stack_lvl from print_report+0x164/0x51c
[  139.914234]  print_report from kasan_report+0xc8/0x104
[  139.914908]  kasan_report from pagealloc_uaf+0xc8/0x1cc
[  139.915561]  pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  139.916333]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.917545]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.918386]  kthread from ret_from_fork+0x14/0x30
[  139.918970] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[  139.919566] bfa0:                                     00000000 00000000 00000000 00000000
[  139.920413] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.921368] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.922109] 
[  139.922454] The buggy address belongs to the physical page:
[  139.923100] page:643ab6e7 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f80
[  139.923856] flags: 0x0(zone=0)
[  139.924351] page_type: 0xffffff7f(buddy)
[  139.924934] raw: 00000000 c40f83ac c40f83ac 00000000 00000000 00000007 ffffff7f 00000000
[  139.925934] raw: 00000000
[  139.926367] page dumped because: kasan: bad access detected
[  139.927076] 
[  139.927335] Memory state around the buggy address:
[  139.927939]  c8f7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.928975]  c8f7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.929727] >c8f80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.930425]            ^
[  139.930809]  c8f80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.931585]  c8f80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.932338] ==================================================================

test log snippet test parser 153

Home

[  139.905761] ==================================================================
[  139.907018] BUG: KASAN: use-after-free in pagealloc_uaf+0xc8/0x1cc
[  139.907766] Read of size 1 at addr c8f80000 by task kunit_try_catch/125
[  139.909669] 
[  139.910099] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  139.911211] Hardware name: Generic DT based system
[  139.911748]  unwind_backtrace from show_stack+0x18/0x1c
[  139.912691]  show_stack from dump_stack_lvl+0x58/0x70
[  139.913388]  dump_stack_lvl from print_report+0x164/0x51c
[  139.914234]  print_report from kasan_report+0xc8/0x104
[  139.914908]  kasan_report from pagealloc_uaf+0xc8/0x1cc
[  139.915561]  pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  139.916333]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  139.917545]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  139.918386]  kthread from ret_from_fork+0x14/0x30
[  139.918970] Exception stack(0xf9eebfb0 to 0xf9eebff8)
[  139.919566] bfa0:                                     00000000 00000000 00000000 00000000
[  139.920413] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  139.921368] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  139.922109] 
[  139.922454] The buggy address belongs to the physical page:
[  139.923100] page:643ab6e7 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f80
[  139.923856] flags: 0x0(zone=0)
[  139.924351] page_type: 0xffffff7f(buddy)
[  139.924934] raw: 00000000 c40f83ac c40f83ac 00000000 00000000 00000007 ffffff7f 00000000
[  139.925934] raw: 00000000
[  139.926367] page dumped because: kasan: bad access detected
[  139.927076] 
[  139.927335] Memory state around the buggy address:
[  139.927939]  c8f7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.928975]  c8f7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.929727] >c8f80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.930425]            ^
[  139.930809]  c8f80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.931585]  c8f80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  139.932338] ==================================================================

test log snippet test parser 154

Home

[  143.398212] ==================================================================
[  143.399754] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x300
[  143.400610] Read of size 1 at addr f18f57f3 by task kunit_try_catch/214
[  143.401377] 
[  143.401662] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.402645] Hardware name: Generic DT based system
[  143.403144]  unwind_backtrace from show_stack+0x18/0x1c
[  143.404050]  show_stack from dump_stack_lvl+0x58/0x70
[  143.404848]  dump_stack_lvl from print_report+0x164/0x51c
[  143.405636]  print_report from kasan_report+0xc8/0x104
[  143.406321]  kasan_report from vmalloc_oob+0xd8/0x300
[  143.407082]  vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[  143.407842]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.409057]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.409850]  kthread from ret_from_fork+0x14/0x30
[  143.410928] Exception stack(0xfa143fb0 to 0xfa143ff8)
[  143.411643] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.412691] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.413743] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.414548] 
[  143.414894] The buggy address belongs to the virtual mapping at
[  143.414894]  [f18f5000, f18f7000) created by:
[  143.414894]  vmalloc_oob+0x88/0x300
[  143.416354] 
[  143.416789] The buggy address belongs to the physical page:
[  143.417796] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[  143.418819] flags: 0x80000000(zone=2)
[  143.419288] page_type: 0xffffffff()
[  143.419730] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  143.420851] raw: 00000000
[  143.421232] page dumped because: kasan: bad access detected
[  143.421963] 
[  143.422348] Memory state around the buggy address:
[  143.422926]  f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.423866]  f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.424794] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  143.425575]                                                      ^
[  143.426367]  f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.427206]  f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.427890] ==================================================================
[  143.430554] ==================================================================
[  143.431280] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x10c/0x300
[  143.431985] Read of size 1 at addr f18f57f8 by task kunit_try_catch/214
[  143.432577] 
[  143.432889] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.433902] Hardware name: Generic DT based system
[  143.434496]  unwind_backtrace from show_stack+0x18/0x1c
[  143.435205]  show_stack from dump_stack_lvl+0x58/0x70
[  143.435894]  dump_stack_lvl from print_report+0x164/0x51c
[  143.436657]  print_report from kasan_report+0xc8/0x104
[  143.437588]  kasan_report from vmalloc_oob+0x10c/0x300
[  143.438417]  vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[  143.439178]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.440082]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.441046]  kthread from ret_from_fork+0x14/0x30
[  143.441725] Exception stack(0xfa143fb0 to 0xfa143ff8)
[  143.442344] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.443375] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.444316] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.445161] 
[  143.445443] The buggy address belongs to the virtual mapping at
[  143.445443]  [f18f5000, f18f7000) created by:
[  143.445443]  vmalloc_oob+0x88/0x300
[  143.446951] 
[  143.447346] The buggy address belongs to the physical page:
[  143.448038] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[  143.448875] flags: 0x80000000(zone=2)
[  143.449677] page_type: 0xffffffff()
[  143.450348] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  143.451343] raw: 00000000
[  143.451723] page dumped because: kasan: bad access detected
[  143.452273] 
[  143.452582] Memory state around the buggy address:
[  143.453319]  f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.453972]  f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.454738] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  143.455593]                                                         ^
[  143.456249]  f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.457169]  f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.458005] ==================================================================

test log snippet test parser 155

Home

[  143.430554] ==================================================================
[  143.431280] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x10c/0x300
[  143.431985] Read of size 1 at addr f18f57f8 by task kunit_try_catch/214
[  143.432577] 
[  143.432889] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.433902] Hardware name: Generic DT based system
[  143.434496]  unwind_backtrace from show_stack+0x18/0x1c
[  143.435205]  show_stack from dump_stack_lvl+0x58/0x70
[  143.435894]  dump_stack_lvl from print_report+0x164/0x51c
[  143.436657]  print_report from kasan_report+0xc8/0x104
[  143.437588]  kasan_report from vmalloc_oob+0x10c/0x300
[  143.438417]  vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[  143.439178]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.440082]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.441046]  kthread from ret_from_fork+0x14/0x30
[  143.441725] Exception stack(0xfa143fb0 to 0xfa143ff8)
[  143.442344] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.443375] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.444316] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.445161] 
[  143.445443] The buggy address belongs to the virtual mapping at
[  143.445443]  [f18f5000, f18f7000) created by:
[  143.445443]  vmalloc_oob+0x88/0x300
[  143.446951] 
[  143.447346] The buggy address belongs to the physical page:
[  143.448038] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[  143.448875] flags: 0x80000000(zone=2)
[  143.449677] page_type: 0xffffffff()
[  143.450348] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  143.451343] raw: 00000000
[  143.451723] page dumped because: kasan: bad access detected
[  143.452273] 
[  143.452582] Memory state around the buggy address:
[  143.453319]  f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.453972]  f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.454738] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  143.455593]                                                         ^
[  143.456249]  f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.457169]  f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.458005] ==================================================================

test log snippet test parser 156

Home

[  143.398212] ==================================================================
[  143.399754] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x300
[  143.400610] Read of size 1 at addr f18f57f3 by task kunit_try_catch/214
[  143.401377] 
[  143.401662] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[  143.402645] Hardware name: Generic DT based system
[  143.403144]  unwind_backtrace from show_stack+0x18/0x1c
[  143.404050]  show_stack from dump_stack_lvl+0x58/0x70
[  143.404848]  dump_stack_lvl from print_report+0x164/0x51c
[  143.405636]  print_report from kasan_report+0xc8/0x104
[  143.406321]  kasan_report from vmalloc_oob+0xd8/0x300
[  143.407082]  vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[  143.407842]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  143.409057]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  143.409850]  kthread from ret_from_fork+0x14/0x30
[  143.410928] Exception stack(0xfa143fb0 to 0xfa143ff8)
[  143.411643] 3fa0:                                     00000000 00000000 00000000 00000000
[  143.412691] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  143.413743] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  143.414548] 
[  143.414894] The buggy address belongs to the virtual mapping at
[  143.414894]  [f18f5000, f18f7000) created by:
[  143.414894]  vmalloc_oob+0x88/0x300
[  143.416354] 
[  143.416789] The buggy address belongs to the physical page:
[  143.417796] page:0e979113 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc3f
[  143.418819] flags: 0x80000000(zone=2)
[  143.419288] page_type: 0xffffffff()
[  143.419730] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  143.420851] raw: 00000000
[  143.421232] page dumped because: kasan: bad access detected
[  143.421963] 
[  143.422348] Memory state around the buggy address:
[  143.422926]  f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.423866]  f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  143.424794] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  143.425575]                                                      ^
[  143.426367]  f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.427206]  f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  143.427890] ==================================================================

test log snippet test parser 157

Home

------------[ cut here ]------------
[   49.228250] WARNING: CPU: 0 PID: 470 at mm/util.c:632 kvmalloc_node+0xf4/0xf8
[   49.229544] Modules linked in:
[   49.231588] CPU: 0 PID: 470 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   49.232527] Hardware name: Generic DT based system
[   49.234276]  unwind_backtrace from show_stack+0x10/0x14
[   49.235022]  show_stack from dump_stack_lvl+0x40/0x4c
[   49.235609]  dump_stack_lvl from __warn+0x78/0x124
[   49.236316]  __warn from warn_slowpath_fmt+0x184/0x18c
[   49.236953]  warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[   49.237449]  kvmalloc_node from alloc_fdtable+0x88/0x104
[   49.237821]  alloc_fdtable from expand_files+0x78/0x2f4
[   49.238758]  expand_files from ksys_dup3+0x58/0xe0
[   49.239081]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   49.239674] Exception stack(0xfa211fa8 to 0xfa211ff0)
[   49.240191] 1fa0:                   be8512bc 004a0000 00000002 2000003c 00000000 2000003c
[   49.240570] 1fc0: be8512bc 004a0000 0049ff0c 0000003f 00482edd b6fbdce0 00000000 0049ff0c
[   49.242105] 1fe0: 0000003f be8510e4 b6f1cf43 b6e9a786
[   49.243602] ---[ end trace 0000000000000000 ]---

test log snippet test parser 158

Home

------------[ cut here ]------------
[   34.110417] WARNING: CPU: 1 PID: 475 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[   34.112477] Modules linked in:
[   34.113651] CPU: 1 PID: 475 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   34.114382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.116267] EIP: kvmalloc_node+0xd1/0xe0
[   34.116638] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 b2 de 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[   34.117357] EAX: 00000000 EBX: 80001000 ECX: d8fbd4ed EDX: 00000000
[   34.117633] ESI: 00400cc0 EDI: ffffffff EBP: c22c9eb8 ESP: c22c9ea4
[   34.118545] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   34.119796] CR0: 80050033 CR2: b7ddde40 CR3: 02392000 CR4: 000006d0
[   34.120495] Call Trace:
[   34.123642]  ? show_regs+0x4e/0x60
[   34.123969]  ? kvmalloc_node+0xd1/0xe0
[   34.124140]  ? __warn+0xa5/0x180
[   34.125536]  ? kvmalloc_node+0xd1/0xe0
[   34.125967]  ? kvmalloc_node+0xd1/0xe0
[   34.126353]  ? report_bug+0x11e/0x1b0
[   34.126925]  ? exc_overflow+0x38/0x38
[   34.127696]  ? handle_bug+0x48/0x68
[   34.128020]  ? exc_invalid_op+0x17/0x3c
[   34.129480]  ? handle_exception+0x133/0x133
[   34.129926]  ? kvmalloc_node+0x3d/0xe0
[   34.130123]  ? exc_overflow+0x38/0x38
[   34.131673]  ? kvmalloc_node+0xd1/0xe0
[   34.132121]  ? exc_overflow+0x38/0x38
[   34.132980]  ? kvmalloc_node+0xd1/0xe0
[   34.134308]  ? security_task_setrlimit+0x36/0x50
[   34.135302]  alloc_fdtable+0x70/0xf0
[   34.137006]  ? do_prlimit+0x11f/0x170
[   34.137200]  expand_files+0x101/0x2b0
[   34.137369]  ? __ia32_sys_prlimit64+0x20e/0x2c0
[   34.137571]  ksys_dup3+0x5b/0xb0
[   34.137731]  __ia32_sys_dup2+0x16/0x70
[   34.139050]  ia32_sys_call+0x273a/0x27d0
[   34.139229]  __do_fast_syscall_32+0x6c/0xb4
[   34.139420]  ? exit_to_user_mode_prepare+0x29/0xc0
[   34.139614]  do_fast_syscall_32+0x29/0x5c
[   34.139802]  do_SYSENTER_32+0x12/0x14
[   34.139966]  entry_SYSENTER_32+0x98/0xf9
[   34.140349] EIP: 0xb7f7f539
[   34.140880] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[   34.142082] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7f64e14
[   34.142515] ESI: 00424124 EDI: bffbd2a0 EBP: bffbd2b8 ESP: bffbd038
[   34.143242] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   34.145049] ---[ end trace 0000000000000000 ]---

test log snippet test parser 159

Home

------------[ cut here ]------------
[   32.120268] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xd8/0xe0
[   32.121576] Modules linked in:
[   32.122886] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   32.123292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.124007] EIP: kvmalloc_node+0xd8/0xe0
[   32.124418] Code: ff 2d 00 20 80 00 89 04 24 89 d8 e8 fe 22 03 00 8b 5d f4 8b 75 f8 8b 7d fc 89 ec 5d c3 90 81 e6 00 20 00 00 0f 85 49 ff ff ff <0f> 0b e9 42 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[   32.127174] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[   32.127478] ESI: 00000000 EDI: ffffffff EBP: c1f0bef0 ESP: c1f0becc
[   32.127983] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   32.129080] CR0: 80050033 CR2: b7e877d0 CR3: 022d0000 CR4: 000006d0
[   32.130126] Call Trace:
[   32.131832]  ? show_regs+0x4d/0x54
[   32.132075]  ? kvmalloc_node+0xd8/0xe0
[   32.132225]  ? __warn+0x84/0x150
[   32.132363]  ? kvmalloc_node+0xd8/0xe0
[   32.132572]  ? kvmalloc_node+0xd8/0xe0
[   32.132942]  ? report_bug+0x189/0x1b0
[   32.133392]  ? kvmalloc_node+0xd9/0xe0
[   32.133941]  ? exc_overflow+0x50/0x50
[   32.134331]  ? handle_bug+0x56/0x90
[   32.134578]  ? exc_invalid_op+0x1b/0x70
[   32.134726]  ? kvmalloc_node+0x59/0xe0
[   32.134871]  ? handle_exception+0x133/0x133
[   32.135108]  ? exc_overflow+0x50/0x50
[   32.135272]  ? kvmalloc_node+0xd8/0xe0
[   32.135425]  ? exc_overflow+0x50/0x50
[   32.136152]  ? kvmalloc_node+0xd8/0xe0
[   32.136428]  ? kmalloc_trace+0x2b/0xa0
[   32.138019]  ? alloc_fdtable+0x42/0xd8
[   32.138286]  ? finish_task_switch.isra.0+0x73/0x254
[   32.139242]  ? __switch_to_asm+0x3b/0xf0
[   32.140183]  ? __switch_to_asm+0x35/0xf0
[   32.140485]  alloc_fdtable+0x67/0xd8
[   32.141171]  expand_files+0x55/0x81c
[   32.141457]  ksys_dup3+0x5a/0xe4
[   32.142374]  __ia32_sys_dup2+0x19/0x70
[   32.142561]  ia32_sys_call+0x1d96/0x2738
[   32.143729]  __do_fast_syscall_32+0x45/0xac
[   32.144010]  do_fast_syscall_32+0x32/0x74
[   32.144260]  do_SYSENTER_32+0x15/0x24
[   32.145365]  entry_SYSENTER_32+0x98/0xf9
[   32.145922] EIP: 0xb7fc3579
[   32.146442] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   32.147429] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7fa8e14
[   32.148578] ESI: 004235cc EDI: bfa5cb00 EBP: bfa5cc78 ESP: bfa5ca68
[   32.149636] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   32.150625] ---[ end trace 0000000000000000 ]---

test log snippet test parser 160

Home

------------[ cut here ]------------
[  344.490389] WARNING: CPU: 0 PID: 11385 at fs/namespace.c:1245 cleanup_mnt+0x118/0x18c
[  344.490647] Modules linked in: overlay drm backlight i2c_core drm_panel_orientation_quirks dm_mod ip_tables x_tables
[  344.491208] CPU: 0 PID: 11385 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  344.491269] Hardware name: riscv-virtio,qemu (DT)
[  344.491486] epc : cleanup_mnt+0x118/0x18c
[  344.491578]  ra : __cleanup_mnt+0x1c/0x24
[  344.491619] epc : ffffffff802ebb58 ra : ffffffff802eba38 sp : ff20000001a6bdd0
[  344.491655]  gp : ffffffff81a3d2e8 tp : ff60000082600000 t0 : fffc000000000000
[  344.491688]  t1 : 00000000000000fd t2 : 0000000000000002 s0 : ff20000001a6be00
[  344.491719]  s1 : 0000000000000003 a0 : ffffffffffffffff a1 : 0000000000000000
[  344.491753]  a2 : 0000000000000000 a3 : 000000000000003f a4 : ffffffff81a7e0b0
[  344.491786]  a5 : fffffffffffffffc a6 : ffffffffffffffff a7 : 0000000000001000
[  344.491815]  s2 : ff60000082960000 s3 : ff60000082600830 s4 : ffffffff81a4f860
[  344.491847]  s5 : ff60000082960180 s6 : ffffffff81342492 s7 : 0000000000002000
[  344.491881]  s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[  344.491937]  s11: 0000000000000008 t3 : 00000007fffffff8 t4 : ff60000085bd26c8
[  344.491967]  t5 : 0000000000000000 t6 : 0000000000001551
[  344.491997] status: 0000000200000120 badaddr: ffffffff802ebb58 cause: 0000000000000003
[  344.492166] [<ffffffff802ebb58>] cleanup_mnt+0x118/0x18c
[  344.492372] [<ffffffff802eba38>] __cleanup_mnt+0x1c/0x24
[  344.492402] [<ffffffff80056852>] task_work_run+0x92/0xc4
[  344.492437] [<ffffffff800c1a9a>] exit_to_user_mode_loop+0xd8/0xec
[  344.492463] [<ffffffff800c157e>] exit_to_user_mode_prepare+0x24/0x2c
[  344.492486] [<ffffffff80bbad30>] syscall_exit_to_user_mode+0x26/0x38
[  344.492520] [<ffffffff80bbaa20>] do_trap_ecall_u+0x60/0xa0
[  344.492577] [<ffffffff80bc57d8>] ret_from_exception+0x0/0x64
[  344.492753] ---[ end trace 0000000000000000 ]---

test log snippet test parser 161

Home

------------[ cut here ]------------
[  344.490389] WARNING: CPU: 0 PID: 11385 at fs/namespace.c:1245 cleanup_mnt+0x118/0x18c
[  344.490647] Modules linked in: overlay drm backlight i2c_core drm_panel_orientation_quirks dm_mod ip_tables x_tables
[  344.491208] CPU: 0 PID: 11385 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  344.491269] Hardware name: riscv-virtio,qemu (DT)
[  344.491486] epc : cleanup_mnt+0x118/0x18c
[  344.491578]  ra : __cleanup_mnt+0x1c/0x24
[  344.491619] epc : ffffffff802ebb58 ra : ffffffff802eba38 sp : ff20000001a6bdd0
[  344.491655]  gp : ffffffff81a3d2e8 tp : ff60000082600000 t0 : fffc000000000000
[  344.491688]  t1 : 00000000000000fd t2 : 0000000000000002 s0 : ff20000001a6be00
[  344.491719]  s1 : 0000000000000003 a0 : ffffffffffffffff a1 : 0000000000000000
[  344.491753]  a2 : 0000000000000000 a3 : 000000000000003f a4 : ffffffff81a7e0b0
[  344.491786]  a5 : fffffffffffffffc a6 : ffffffffffffffff a7 : 0000000000001000
[  344.491815]  s2 : ff60000082960000 s3 : ff60000082600830 s4 : ffffffff81a4f860
[  344.491847]  s5 : ff60000082960180 s6 : ffffffff81342492 s7 : 0000000000002000
[  344.491881]  s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[  344.491937]  s11: 0000000000000008 t3 : 00000007fffffff8 t4 : ff60000085bd26c8
[  344.491967]  t5 : 0000000000000000 t6 : 0000000000001551
[  344.491997] status: 0000000200000120 badaddr: ffffffff802ebb58 cause: 0000000000000003
[  344.492166] [<ffffffff802ebb58>] cleanup_mnt+0x118/0x18c
[  344.492372] [<ffffffff802eba38>] __cleanup_mnt+0x1c/0x24
[  344.492402] [<ffffffff80056852>] task_work_run+0x92/0xc4
[  344.492437] [<ffffffff800c1a9a>] exit_to_user_mode_loop+0xd8/0xec
[  344.492463] [<ffffffff800c157e>] exit_to_user_mode_prepare+0x24/0x2c
[  344.492486] [<ffffffff80bbad30>] syscall_exit_to_user_mode+0x26/0x38
[  344.492520] [<ffffffff80bbaa20>] do_trap_ecall_u+0x60/0xa0
[  344.492577] [<ffffffff80bc57d8>] ret_from_exception+0x0/0x64
[  344.492753] ---[ end trace 0000000000000000 ]---

test log snippet test parser 162

Home

------------[ cut here ]------------
[  125.773548] event 'ma_read' has unsafe pointer field 'fn'
[  125.774851] WARNING: CPU: 1 PID: 309 at kernel/trace/trace.c:3881 ignore_event+0x1f8/0x214
[  125.775012] Modules linked in: drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[  125.775477] CPU: 1 PID: 309 Comm: cat Not tainted 6.6.72-rc1 #1
[  125.775511] Hardware name: riscv-virtio,qemu (DT)
[  125.775590] epc : ignore_event+0x1f8/0x214
[  125.775623]  ra : ignore_event+0x1f8/0x214
[  125.775670] epc : ffffffff8012b93c ra : ffffffff8012b93c sp : ff200000004b3c00
[  125.775686]  gp : ffffffff81a320e8 tp : ff60000086d2c600 t0 : ffffffff8182d538
[  125.775702]  t1 : 000000000000002d t2 : 205b2d2d2d2d2d2d s0 : ff200000004b3c70
[  125.775716]  s1 : ff6000008014f150 a0 : 000000000000002d a1 : 0000000000000001
[  125.775729]  a2 : 0000000000000000 a3 : 0000000000000008 a4 : 0000000000000000
[  125.775742]  a5 : 0000000000000000 a6 : ffffffffffffe000 a7 : 0000000000000010
[  125.775756]  s2 : ffffffff81600c80 s3 : ff600000862ec0a0 s4 : ffffffff819bf810
[  125.775771]  s5 : ff600000862ed0d8 s6 : ff60000087323018 s7 : ff600000862ed0a0
[  125.775788]  s8 : ffffffff81000000 s9 : ffffffff81600000 s10: ffffffff819cbe68
[  125.775805]  s11: ff600000862ee000 t3 : ffffffff81a48742 t4 : ffffffff81a48742
[  125.775822]  t5 : ffffffff81a48748 t6 : ff200000004b3a18
[  125.775836] status: 0000000200000120 badaddr: ffffffff8012b93c cause: 0000000000000003
[  125.775892] [<ffffffff8012b93c>] ignore_event+0x1f8/0x214
[  125.775919] [<ffffffff80130b66>] trace_event_printf+0x36/0x80
[  125.775946] [<ffffffff80ba4b24>] trace_raw_output_ma_read+0x5e/0x7a
[  125.776230] [<ffffffff8012cf58>] print_trace_line+0x1d8/0x4a8
[  125.776252] [<ffffffff8012d81c>] tracing_read_pipe+0x168/0x302
[  125.776272] [<ffffffff802aa6ea>] vfs_read+0xac/0x27c
[  125.776303] [<ffffffff802ab0c6>] ksys_read+0x68/0xec
[  125.776327] [<ffffffff802ab16a>] __riscv_sys_read+0x20/0x28
[  125.776352] [<ffffffff80bcfd1c>] do_trap_ecall_u+0x12a/0x13c
[  125.776382] [<ffffffff80bdb9c8>] ret_from_exception+0x0/0x64
[  125.776523] ---[ end trace 0000000000000000 ]---

test log snippet test parser 163

Home

------------[ cut here ]------------
[  323.346314] WARNING: CPU: 0 PID: 11383 at fs/namespace.c:1245 cleanup_mnt+0x116/0x12a
[  323.346544] Modules linked in: overlay drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[  323.347022] CPU: 0 PID: 11383 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  323.347077] Hardware name: riscv-virtio,qemu (DT)
[  323.347282] epc : cleanup_mnt+0x116/0x12a
[  323.347377]  ra : cleanup_mnt+0x1c/0x12a
[  323.347436] epc : ffffffff802d2a6e ra : ffffffff802d2974 sp : ff20000001e8bdd0
[  323.347470]  gp : ffffffff81a320e8 tp : ff60000082500000 t0 : 0000000000000001
[  323.347501]  t1 : 000000000000ffff t2 : ffffffffffffffc0 s0 : ff20000001e8be00
[  323.347535]  s1 : 0000000000000000 a0 : ffffffffffffffff a1 : 0000000000000003
[  323.347567]  a2 : fffffffe820c6bbc a3 : ff6000017df2d000 a4 : 0000000000000001
[  323.347599]  a5 : 0000000000000000 a6 : ffffffff81a72f58 a7 : 0000000000000001
[  323.347630]  s2 : ff600000839d6780 s3 : ff60000082500830 s4 : ff600000825008a0
[  323.347662]  s5 : ff60000082501000 s6 : ff60000082500000 s7 : ffffffff81a44810
[  323.347692]  s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[  323.347723]  s11: 0000000000000008 t3 : 00000000ffffffff t4 : 0000000000000040
[  323.347752]  t5 : 00000000fa83b2da t6 : 000000000004f515
[  323.347791] status: 0000000200000120 badaddr: ffffffff802d2a6e cause: 0000000000000003
[  323.347903] [<ffffffff802d2a6e>] cleanup_mnt+0x116/0x12a
[  323.348043] [<ffffffff802d2aec>] __cleanup_mnt+0x1c/0x24
[  323.348069] [<ffffffff800557a4>] task_work_run+0x80/0xc0
[  323.348101] [<ffffffff800be790>] exit_to_user_mode_loop.isra.0+0x106/0x10a
[  323.348128] [<ffffffff80bd0112>] syscall_exit_to_user_mode+0x5a/0x76
[  323.348163] [<ffffffff80bcfc3e>] do_trap_ecall_u+0x4c/0x13c
[  323.348188] [<ffffffff80bdb9c8>] ret_from_exception+0x0/0x64
[  323.348347] ---[ end trace 0000000000000000 ]---

test log snippet test parser 164

Home

------------[ cut here ]------------
[  323.346314] WARNING: CPU: 0 PID: 11383 at fs/namespace.c:1245 cleanup_mnt+0x116/0x12a
[  323.346544] Modules linked in: overlay drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[  323.347022] CPU: 0 PID: 11383 Comm: execveat03 Not tainted 6.6.72-rc1 #1
[  323.347077] Hardware name: riscv-virtio,qemu (DT)
[  323.347282] epc : cleanup_mnt+0x116/0x12a
[  323.347377]  ra : cleanup_mnt+0x1c/0x12a
[  323.347436] epc : ffffffff802d2a6e ra : ffffffff802d2974 sp : ff20000001e8bdd0
[  323.347470]  gp : ffffffff81a320e8 tp : ff60000082500000 t0 : 0000000000000001
[  323.347501]  t1 : 000000000000ffff t2 : ffffffffffffffc0 s0 : ff20000001e8be00
[  323.347535]  s1 : 0000000000000000 a0 : ffffffffffffffff a1 : 0000000000000003
[  323.347567]  a2 : fffffffe820c6bbc a3 : ff6000017df2d000 a4 : 0000000000000001
[  323.347599]  a5 : 0000000000000000 a6 : ffffffff81a72f58 a7 : 0000000000000001
[  323.347630]  s2 : ff600000839d6780 s3 : ff60000082500830 s4 : ff600000825008a0
[  323.347662]  s5 : ff60000082501000 s6 : ff60000082500000 s7 : ffffffff81a44810
[  323.347692]  s8 : 0000000000000000 s9 : 000000000000000f s10: 0000000000000000
[  323.347723]  s11: 0000000000000008 t3 : 00000000ffffffff t4 : 0000000000000040
[  323.347752]  t5 : 00000000fa83b2da t6 : 000000000004f515
[  323.347791] status: 0000000200000120 badaddr: ffffffff802d2a6e cause: 0000000000000003
[  323.347903] [<ffffffff802d2a6e>] cleanup_mnt+0x116/0x12a
[  323.348043] [<ffffffff802d2aec>] __cleanup_mnt+0x1c/0x24
[  323.348069] [<ffffffff800557a4>] task_work_run+0x80/0xc0
[  323.348101] [<ffffffff800be790>] exit_to_user_mode_loop.isra.0+0x106/0x10a
[  323.348128] [<ffffffff80bd0112>] syscall_exit_to_user_mode+0x5a/0x76
[  323.348163] [<ffffffff80bcfc3e>] do_trap_ecall_u+0x4c/0x13c
[  323.348188] [<ffffffff80bdb9c8>] ret_from_exception+0x0/0x64
[  323.348347] ---[ end trace 0000000000000000 ]---

test log snippet test parser 165

Home

[   82.504461] Kernel panic - not syncing: Fatal exception in interrupt
[   82.504467]  ? down_write+0x53/0x70
[   82.504507]  ? up_write+0x5/0x70
[   82.504559]  ? up_write+0x5/0x70
[   82.504604]  ? free_pgtables+0xa7/0x190
[   82.504688]  exit_mmap+0x279/0x4a0
[   82.504878]  __mmput+0x47/0x110
[   82.504919]  mmput+0x27/0x30
[   82.504968]  exit_mm+0xe1/0x160
[   82.505032]  do_exit+0x247/0x970
[   82.505060]  ? _raw_spin_unlock_irq+0x20/0x40
[   82.505092]  ? preempt_count_sub+0x63/0x80
[   82.505152]  do_group_exit+0x92/0xa0
[   82.505209]  __ia32_sys_exit_group+0x1b/0x20
[   82.505243]  ia32_sys_call+0x2615/0x3010
[   82.505275]  __do_fast_syscall_32+0xb4/0x110
[   82.505314]  ? irqentry_exit_to_user_mode+0x17/0x20
[   82.505367]  do_fast_syscall_32+0x37/0x80
[   82.505410]  do_SYSENTER_32+0x1f/0x30
[   82.505443]  entry_SYSENTER_compat_after_hwframe+0x85/0x97
[   82.505473] RIP: 0023:0xf7f26539
[   82.505531] Code: Unable to access opcode bytes at 0xf7f2650f.
[   82.505545] RSP: 002b:00000000ffd15398 EFLAGS: 00000206 ORIG_RAX: 00000000000000fc
[   82.505584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000ffffffb8
[   82.505603] RDX: 00000000000000fc RSI: 0000000000000003 RDI: 0000000000000004
[   82.505620] RBP: 00000000ffd154c8 R08: 0000000000000000 R09: 0000000000000000
[   82.505637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
[   82.505654] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   82.505778]  </TASK>
[   82.505791] Modules linked in:
[   82.505852] ---[ end trace 0000000000000000 ]---
[   82.505872] RIP: 0010:up_write+0x5/0x70
[   82.505906] Code: eb dd f0 48 83 63 08 fd eb e7 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f <1f> 44 00 00 55 48 89 e5 53 48 89 fb bf 01 00 00 00 e8 f5 6c fc ff
[   82.505928] RSP: 0018:ffffa994c0817b78 EFLAGS: 00000286
[   82.505969] RAX: 0000000080000000 RBX: ffffa259c0051a40 RCX: 0000000080000001
[   82.505990] RDX: 0000000000000c01 RSI: ffffffffab571c23 RDI: ffffa259c43bc820
[   82.506006] RBP: ffffa994c0817be8 R08: ffffa994c0817a68 R09: 0000000000000000
[   82.506024] R10: 00000000f7eff000 R11: 00000000f7eff000 R12: ffffa259c0051a40
[   82.506042] R13: 00000000f7eff000 R14: ffffa259c27d02a0 R15: 000000000000000c
[   82.506060] FS:  0000000000000000(0000) GS:ffffa25a3bc00000(0000) knlGS:0000000000000000
[   82.506086] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[   82.506105] CR2: 00000000ffd1547c CR3: 000000005ce40000 CR4: 00000000000006f0
[   85.859705] Shutting down cpus with NMI
[   85.861849] Kernel Offset: 0x29200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   85.911969] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

test log snippet test parser 166

Home

[   82.504461] Kernel panic - not syncing: Fatal exception in interrupt
[   82.504467]  ? down_write+0x53/0x70
[   82.504507]  ? up_write+0x5/0x70
[   82.504559]  ? up_write+0x5/0x70
[   82.504604]  ? free_pgtables+0xa7/0x190
[   82.504688]  exit_mmap+0x279/0x4a0
[   82.504878]  __mmput+0x47/0x110
[   82.504919]  mmput+0x27/0x30
[   82.504968]  exit_mm+0xe1/0x160
[   82.505032]  do_exit+0x247/0x970
[   82.505060]  ? _raw_spin_unlock_irq+0x20/0x40
[   82.505092]  ? preempt_count_sub+0x63/0x80
[   82.505152]  do_group_exit+0x92/0xa0
[   82.505209]  __ia32_sys_exit_group+0x1b/0x20
[   82.505243]  ia32_sys_call+0x2615/0x3010
[   82.505275]  __do_fast_syscall_32+0xb4/0x110
[   82.505314]  ? irqentry_exit_to_user_mode+0x17/0x20
[   82.505367]  do_fast_syscall_32+0x37/0x80
[   82.505410]  do_SYSENTER_32+0x1f/0x30
[   82.505443]  entry_SYSENTER_compat_after_hwframe+0x85/0x97
[   82.505473] RIP: 0023:0xf7f26539
[   82.505531] Code: Unable to access opcode bytes at 0xf7f2650f.
[   82.505545] RSP: 002b:00000000ffd15398 EFLAGS: 00000206 ORIG_RAX: 00000000000000fc
[   82.505584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000ffffffb8
[   82.505603] RDX: 00000000000000fc RSI: 0000000000000003 RDI: 0000000000000004
[   82.505620] RBP: 00000000ffd154c8 R08: 0000000000000000 R09: 0000000000000000
[   82.505637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
[   82.505654] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   82.505778]  </TASK>
[   82.505791] Modules linked in:
[   82.505852] ---[ end trace 0000000000000000 ]---
[   82.505872] RIP: 0010:up_write+0x5/0x70
[   82.505906] Code: eb dd f0 48 83 63 08 fd eb e7 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f <1f> 44 00 00 55 48 89 e5 53 48 89 fb bf 01 00 00 00 e8 f5 6c fc ff
[   82.505928] RSP: 0018:ffffa994c0817b78 EFLAGS: 00000286
[   82.505969] RAX: 0000000080000000 RBX: ffffa259c0051a40 RCX: 0000000080000001
[   82.505990] RDX: 0000000000000c01 RSI: ffffffffab571c23 RDI: ffffa259c43bc820
[   82.506006] RBP: ffffa994c0817be8 R08: ffffa994c0817a68 R09: 0000000000000000
[   82.506024] R10: 00000000f7eff000 R11: 00000000f7eff000 R12: ffffa259c0051a40
[   82.506042] R13: 00000000f7eff000 R14: ffffa259c27d02a0 R15: 000000000000000c
[   82.506060] FS:  0000000000000000(0000) GS:ffffa25a3bc00000(0000) knlGS:0000000000000000
[   82.506086] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[   82.506105] CR2: 00000000ffd1547c CR3: 000000005ce40000 CR4: 00000000000006f0
[   85.859705] Shutting down cpus with NMI
[   85.861849] Kernel Offset: 0x29200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   85.911969] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

test log snippet test parser 167

Home

------------[ cut here ]------------
[   52.791053] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xde/0xf0
[   52.793551] Modules linked in:
[   52.795373] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   52.795822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.797860] RIP: 0010:kvmalloc_node+0xde/0xf0
[   52.798334] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 16 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 <0f> 0b 31 c0 eb e5 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90
[   52.798949] RSP: 0018:ffffad80405d7db0 EFLAGS: 00010246
[   52.799225] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   52.799472] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa5445788
[   52.799916] RBP: ffffad80405d7dc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[   52.800491] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[   52.801084] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[   52.801988] FS:  00007faf84374740(0000) GS:ffff89567bd00000(0000) knlGS:0000000000000000
[   52.803728] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   52.804221] CR2: 00007faf844fb942 CR3: 0000000101bcc000 CR4: 00000000000006e0
[   52.805111] Call Trace:
[   52.808182]  <TASK>
[   52.808933]  ? show_regs+0x5c/0x70
[   52.809260]  ? __warn+0xc9/0x1d0
[   52.809877]  ? kvmalloc_node+0xde/0xf0
[   52.810205]  ? report_bug+0x152/0x200
[   52.810985]  ? handle_bug+0x68/0x90
[   52.811183]  ? exc_invalid_op+0x1f/0x50
[   52.811336]  ? asm_exc_invalid_op+0x1f/0x30
[   52.813177]  ? kvmalloc_node+0x48/0xf0
[   52.813779]  ? kvmalloc_node+0xde/0xf0
[   52.814388]  alloc_fdtable+0x7a/0x120
[   52.815009]  expand_files+0x11a/0x310
[   52.815325]  ? do_prlimit+0x120/0x160
[   52.815609]  ksys_dup3+0x75/0xe0
[   52.815836]  __x64_sys_dup2+0x25/0x90
[   52.816304]  x64_sys_call+0x256b/0x2d20
[   52.817342]  do_syscall_64+0x55/0xb0
[   52.817741]  ? exc_page_fault+0x65/0xc0
[   52.818742]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   52.820493] RIP: 0033:0x7faf8446cc17
[   52.821220] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   52.822296] RSP: 002b:00007fffc6ec73c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   52.822846] RAX: ffffffffffffffda RBX: 00007fffc6ec7c28 RCX: 00007faf8446cc17
[   52.823348] RDX: 00007fffc6ec7548 RSI: 0000000040000038 RDI: 0000000000000002
[   52.824319] RBP: 00007fffc6ec75e0 R08: 0000000000000064 R09: 0000000000000000
[   52.824686] R10: 00007faf84389170 R11: 0000000000000202 R12: 0000000000000000
[   52.825120] R13: 00007fffc6ec7c38 R14: 00007faf845a2000 R15: 000055dc20b96cf8
[   52.827255]  </TASK>
[   52.827779] ---[ end trace 0000000000000000 ]---

test log snippet test parser 168

Home

[   49.391415] ==================================================================
[   49.393142] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfe/0x1f0
[   49.394644] Read of size 1 at addr ffff888102ad7cbf by task kunit_try_catch/204
[   49.395613] 
[   49.396425] CPU: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.397636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.398784] Call Trace:
[   49.399212]  <TASK>
[   49.399585]  dump_stack_lvl+0x4e/0x90
[   49.400693]  print_report+0xd2/0x660
[   49.401564]  ? __virt_addr_valid+0x156/0x1e0
[   49.402428]  ? kasan_addr_to_slab+0x11/0xb0
[   49.403220]  kasan_report+0xff/0x140
[   49.404035]  ? kasan_alloca_oob_left+0xfe/0x1f0
[   49.404458]  ? kasan_alloca_oob_left+0xfe/0x1f0
[   49.404757]  __asan_load1+0x66/0x70
[   49.405682]  kasan_alloca_oob_left+0xfe/0x1f0
[   49.406612]  ? irqentry_exit+0x29/0x60
[   49.407342]  ? inat_get_escape_attribute+0x10/0xb0
[   49.408151]  ? trace_hardirqs_on+0x37/0xd0
[   49.408896]  ? irqentry_exit+0x29/0x60
[   49.409482]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   49.410179]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   49.410833]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   49.411755]  ? kunit_try_run_case+0x11b/0x290
[   49.412362]  kunit_try_run_case+0x126/0x290
[   49.413516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.413987]  ? __kasan_check_write+0x18/0x20
[   49.414651]  ? trace_preempt_on+0x20/0xa0
[   49.415522]  ? __kthread_parkme+0x4f/0xd0
[   49.416268]  ? preempt_count_sub+0x50/0x80
[   49.417529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.418254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.418616]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.419447]  kthread+0x19e/0x1e0
[   49.420245]  ? __pfx_kthread+0x10/0x10
[   49.420947]  ret_from_fork+0x41/0x70
[   49.421610]  ? __pfx_kthread+0x10/0x10
[   49.422046]  ret_from_fork_asm+0x1b/0x30
[   49.422551]  </TASK>
[   49.422957] 
[   49.423315] The buggy address belongs to stack of task kunit_try_catch/204
[   49.424079] 
[   49.424655] The buggy address belongs to the physical page:
[   49.425545] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad7
[   49.427031] flags: 0x200000000000000(node=0|zone=2)
[   49.427946] page_type: 0xffffffff()
[   49.428414] raw: 0200000000000000 ffffea00040ab5c8 ffffea00040ab5c8 0000000000000000
[   49.429822] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   49.430592] page dumped because: kasan: bad access detected
[   49.431672] 
[   49.432120] Memory state around the buggy address:
[   49.432690]  ffff888102ad7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.434248]  ffff888102ad7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.435847] >ffff888102ad7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   49.436543]                                         ^
[   49.437312]  ffff888102ad7d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[   49.437844]  ffff888102ad7d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[   49.439081] ==================================================================

test log snippet test parser 169

Home

[   49.450776] ==================================================================
[   49.451918] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x107/0x1f0
[   49.452800] Read of size 1 at addr ffff888102affcca by task kunit_try_catch/206
[   49.453955] 
[   49.454512] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.455709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.456939] Call Trace:
[   49.457642]  <TASK>
[   49.458113]  dump_stack_lvl+0x4e/0x90
[   49.458848]  print_report+0xd2/0x660
[   49.459486]  ? __virt_addr_valid+0x156/0x1e0
[   49.460250]  ? kasan_addr_to_slab+0x11/0xb0
[   49.460856]  kasan_report+0xff/0x140
[   49.461497]  ? kasan_alloca_oob_right+0x107/0x1f0
[   49.462160]  ? kasan_alloca_oob_right+0x107/0x1f0
[   49.462882]  __asan_load1+0x66/0x70
[   49.463505]  kasan_alloca_oob_right+0x107/0x1f0
[   49.464186]  ? trace_event_raw_event_ipi_handler+0xf0/0x130
[   49.465058]  ? __schedule+0x70b/0x1190
[   49.465712]  ? trace_hardirqs_on+0x37/0xd0
[   49.466448]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   49.467540]  ? __schedule+0x70b/0x1190
[   49.468199]  ? ktime_get_ts64+0x118/0x140
[   49.468897]  kunit_try_run_case+0x126/0x290
[   49.469531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.470464]  ? __kasan_check_write+0x18/0x20
[   49.471141]  ? trace_preempt_on+0x20/0xa0
[   49.471727]  ? __kthread_parkme+0x4f/0xd0
[   49.472430]  ? preempt_count_sub+0x50/0x80
[   49.473134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.473739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.474469]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.475294]  kthread+0x19e/0x1e0
[   49.475918]  ? __pfx_kthread+0x10/0x10
[   49.476554]  ret_from_fork+0x41/0x70
[   49.477244]  ? __pfx_kthread+0x10/0x10
[   49.477880]  ret_from_fork_asm+0x1b/0x30
[   49.478596]  </TASK>
[   49.479065] 
[   49.479391] The buggy address belongs to stack of task kunit_try_catch/206
[   49.480329] 
[   49.480643] The buggy address belongs to the physical page:
[   49.481467] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aff
[   49.482715] flags: 0x200000000000000(node=0|zone=2)
[   49.483597] page_type: 0xffffffff()
[   49.484254] raw: 0200000000000000 ffffea00040abfc8 ffffea00040abfc8 0000000000000000
[   49.485233] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   49.485964] page dumped because: kasan: bad access detected
[   49.486588] 
[   49.486874] Memory state around the buggy address:
[   49.487536]  ffff888102affb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.488569]  ffff888102affc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.489541] >ffff888102affc80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   49.490429]                                               ^
[   49.491183]  ffff888102affd00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[   49.491837]  ffff888102affd80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[   49.492543] ==================================================================

test log snippet test parser 170

Home

[   51.704635] ==================================================================
[   51.705479] BUG: KASAN: double-free in kfree+0x7c/0x120
[   51.706171] Free of addr ffff88810148a9e0 by task kunit_try_catch/228
[   51.707010] 
[   51.707324] CPU: 1 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.708097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.709212] Call Trace:
[   51.709593]  <TASK>
[   51.710020]  dump_stack_lvl+0x4e/0x90
[   51.710616]  print_report+0xd2/0x660
[   51.711076]  ? __virt_addr_valid+0x156/0x1e0
[   51.711728]  ? kfree+0x7c/0x120
[   51.712360]  ? kasan_complete_mode_report_info+0x64/0x200
[   51.713190]  ? kfree+0x7c/0x120
[   51.713779]  kasan_report_invalid_free+0xcf/0x100
[   51.714533]  ? kfree+0x7c/0x120
[   51.715038]  ? kfree+0x7c/0x120
[   51.715586]  ____kasan_slab_free+0x19c/0x1d0
[   51.716335]  ? kfree_sensitive+0x2e/0x90
[   51.716957]  __kasan_slab_free+0x16/0x20
[   51.717538]  __kmem_cache_free+0x190/0x310
[   51.718316]  kfree+0x7c/0x120
[   51.718869]  kfree_sensitive+0x2e/0x90
[   51.719428]  kmalloc_double_kzfree+0xd4/0x1d0
[   51.720198]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   51.720698]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   51.721493]  ? kunit_try_run_case+0x11b/0x290
[   51.722230]  kunit_try_run_case+0x126/0x290
[   51.722917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.723619]  ? __kasan_check_write+0x18/0x20
[   51.724228]  ? trace_preempt_on+0x20/0xa0
[   51.724701]  ? __kthread_parkme+0x4f/0xd0
[   51.725474]  ? preempt_count_sub+0x50/0x80
[   51.726139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.726919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.727799]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.728519]  kthread+0x19e/0x1e0
[   51.729180]  ? __pfx_kthread+0x10/0x10
[   51.729630]  ret_from_fork+0x41/0x70
[   51.730224]  ? __pfx_kthread+0x10/0x10
[   51.730936]  ret_from_fork_asm+0x1b/0x30
[   51.731611]  </TASK>
[   51.732115] 
[   51.732426] Allocated by task 228:
[   51.733034]  kasan_save_stack+0x3c/0x60
[   51.733485]  kasan_set_track+0x29/0x40
[   51.733923]  kasan_save_alloc_info+0x22/0x30
[   51.734579]  __kasan_kmalloc+0xb7/0xc0
[   51.735195]  kmalloc_trace+0x4c/0xb0
[   51.735786]  kmalloc_double_kzfree+0x9d/0x1d0
[   51.736477]  kunit_try_run_case+0x126/0x290
[   51.737172]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.737877]  kthread+0x19e/0x1e0
[   51.738428]  ret_from_fork+0x41/0x70
[   51.739138]  ret_from_fork_asm+0x1b/0x30
[   51.739628] 
[   51.739927] Freed by task 228:
[   51.740283]  kasan_save_stack+0x3c/0x60
[   51.740944]  kasan_set_track+0x29/0x40
[   51.741538]  kasan_save_free_info+0x2f/0x50
[   51.742211]  ____kasan_slab_free+0x172/0x1d0
[   51.742848]  __kasan_slab_free+0x16/0x20
[   51.743470]  __kmem_cache_free+0x190/0x310
[   51.744149]  kfree+0x7c/0x120
[   51.744623]  kfree_sensitive+0x67/0x90
[   51.745101]  kmalloc_double_kzfree+0xbd/0x1d0
[   51.745710]  kunit_try_run_case+0x126/0x290
[   51.746415]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.747235]  kthread+0x19e/0x1e0
[   51.749355]  ret_from_fork+0x41/0x70
[   51.750009]  ret_from_fork_asm+0x1b/0x30
[   51.750503] 
[   51.750792] The buggy address belongs to the object at ffff88810148a9e0
[   51.750792]  which belongs to the cache kmalloc-16 of size 16
[   51.751834] The buggy address is located 0 bytes inside of
[   51.751834]  16-byte region [ffff88810148a9e0, ffff88810148a9f0)
[   51.753051] 
[   51.753354] The buggy address belongs to the physical page:
[   51.753799] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[   51.754734] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.755434] page_type: 0xffffffff()
[   51.755987] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.756920] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.757729] page dumped because: kasan: bad access detected
[   51.758301] 
[   51.758630] Memory state around the buggy address:
[   51.759303]  ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[   51.760197]  ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc fa fb fc fc
[   51.760936] >ffff88810148a980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.761708]                                                        ^
[   51.762383]  ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.763011]  ffff88810148aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.763706] ==================================================================

test log snippet test parser 171

Home

[   49.884659] ==================================================================
[   49.885660] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x250
[   49.886751] Free of addr ffff88810206f000 by task kunit_try_catch/212
[   49.887560] 
[   49.887851] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.889017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.889819] Call Trace:
[   49.890252]  <TASK>
[   49.890668]  dump_stack_lvl+0x4e/0x90
[   49.891339]  print_report+0xd2/0x660
[   49.891865]  ? __virt_addr_valid+0x156/0x1e0
[   49.892480]  ? kmem_cache_double_free+0xeb/0x250
[   49.893330]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.894594]  ? kmem_cache_double_free+0xeb/0x250
[   49.895481]  kasan_report_invalid_free+0xcf/0x100
[   49.896094]  ? kmem_cache_double_free+0xeb/0x250
[   49.897065]  ? kmem_cache_double_free+0xeb/0x250
[   49.897631]  ____kasan_slab_free+0x19c/0x1d0
[   49.898564]  ? kmem_cache_double_free+0xeb/0x250
[   49.899337]  __kasan_slab_free+0x16/0x20
[   49.900207]  kmem_cache_free+0x1a7/0x4b0
[   49.900974]  kmem_cache_double_free+0xeb/0x250
[   49.901589]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   49.902326]  ? __schedule+0x70b/0x1190
[   49.902837]  ? irqentry_exit+0x29/0x60
[   49.903377]  ? ktime_get_ts64+0x118/0x140
[   49.904675]  kunit_try_run_case+0x126/0x290
[   49.905217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.905810]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   49.906441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.907217]  ? kunit_generic_run_threadfn_adapter+0x29/0x50
[   49.907878]  ? __kthread_parkme+0xaa/0xd0
[   49.909215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.909732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.910390]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.911685]  kthread+0x19e/0x1e0
[   49.912299]  ? __pfx_kthread+0x10/0x10
[   49.913103]  ret_from_fork+0x41/0x70
[   49.913676]  ? __pfx_kthread+0x10/0x10
[   49.914580]  ret_from_fork_asm+0x1b/0x30
[   49.915221]  </TASK>
[   49.915504] 
[   49.915713] Allocated by task 212:
[   49.916099]  kasan_save_stack+0x3c/0x60
[   49.916538]  kasan_set_track+0x29/0x40
[   49.918174]  kasan_save_alloc_info+0x22/0x30
[   49.918797]  __kasan_slab_alloc+0x91/0xa0
[   49.919457]  kmem_cache_alloc+0x180/0x3b0
[   49.920154]  kmem_cache_double_free+0xba/0x250
[   49.921037]  kunit_try_run_case+0x126/0x290
[   49.921626]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.922308]  kthread+0x19e/0x1e0
[   49.922816]  ret_from_fork+0x41/0x70
[   49.923421]  ret_from_fork_asm+0x1b/0x30
[   49.924639] 
[   49.924869] Freed by task 212:
[   49.925313]  kasan_save_stack+0x3c/0x60
[   49.925906]  kasan_set_track+0x29/0x40
[   49.926442]  kasan_save_free_info+0x2f/0x50
[   49.927072]  ____kasan_slab_free+0x172/0x1d0
[   49.927559]  __kasan_slab_free+0x16/0x20
[   49.928919]  kmem_cache_free+0x1a7/0x4b0
[   49.929421]  kmem_cache_double_free+0xd1/0x250
[   49.930130]  kunit_try_run_case+0x126/0x290
[   49.930629]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.931756]  kthread+0x19e/0x1e0
[   49.933007]  ret_from_fork+0x41/0x70
[   49.933505]  ret_from_fork_asm+0x1b/0x30
[   49.933964] 
[   49.934500] The buggy address belongs to the object at ffff88810206f000
[   49.934500]  which belongs to the cache test_cache of size 200
[   49.935561] The buggy address is located 0 bytes inside of
[   49.935561]  200-byte region [ffff88810206f000, ffff88810206f0c8)
[   49.936870] 
[   49.937728] The buggy address belongs to the physical page:
[   49.938713] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10206f
[   49.940118] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.940695] page_type: 0xffffffff()
[   49.941517] raw: 0200000000000800 ffff88810206c000 dead000000000122 0000000000000000
[   49.942513] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   49.943809] page dumped because: kasan: bad access detected
[   49.944389] 
[   49.944598] Memory state around the buggy address:
[   49.945131]  ffff88810206ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.946082]  ffff88810206ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.947715] >ffff88810206f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.948640]                    ^
[   49.948956]  ffff88810206f080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   49.950107]  ffff88810206f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.951222] ==================================================================

test log snippet test parser 172

Home

[   49.279580] ==================================================================
[   49.280841] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170
[   49.282201] Read of size 1 at addr ffffffff9afa96ed by task kunit_try_catch/198
[   49.282848] 
[   49.283224] CPU: 1 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.285222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.286510] Call Trace:
[   49.287220]  <TASK>
[   49.287506]  dump_stack_lvl+0x4e/0x90
[   49.288687]  print_report+0xd2/0x660
[   49.289329]  ? __virt_addr_valid+0x156/0x1e0
[   49.290337]  ? kasan_addr_to_slab+0x11/0xb0
[   49.291216]  kasan_report+0xff/0x140
[   49.291666]  ? kasan_global_oob_right+0xa3/0x170
[   49.292695]  ? kasan_global_oob_right+0xa3/0x170
[   49.293359]  __asan_load1+0x66/0x70
[   49.294233]  kasan_global_oob_right+0xa3/0x170
[   49.295009]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   49.295447]  ? ktime_get_ts64+0x118/0x140
[   49.295732]  kunit_try_run_case+0x126/0x290
[   49.296860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.297563]  ? __kasan_check_write+0x18/0x20
[   49.298630]  ? trace_preempt_on+0x20/0xa0
[   49.299403]  ? __kthread_parkme+0x4f/0xd0
[   49.300375]  ? preempt_count_sub+0x50/0x80
[   49.301097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.301673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.302702]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.304032]  kthread+0x19e/0x1e0
[   49.304529]  ? __pfx_kthread+0x10/0x10
[   49.305458]  ret_from_fork+0x41/0x70
[   49.306082]  ? __pfx_kthread+0x10/0x10
[   49.306541]  ret_from_fork_asm+0x1b/0x30
[   49.308047]  </TASK>
[   49.308652] 
[   49.309147] The buggy address belongs to the variable:
[   49.309898]  global_array+0xd/0x40
[   49.310644] 
[   49.311223] The buggy address belongs to the physical page:
[   49.311839] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x297a9
[   49.312663] flags: 0x100000000004000(reserved|node=0|zone=1)
[   49.313686] page_type: 0xffffffff()
[   49.314518] raw: 0100000000004000 ffffea0000a5ea48 ffffea0000a5ea48 0000000000000000
[   49.315677] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   49.316614] page dumped because: kasan: bad access detected
[   49.317136] 
[   49.317553] Memory state around the buggy address:
[   49.318294]  ffffffff9afa9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.319615]  ffffffff9afa9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.320642] >ffffffff9afa9680: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   49.321510]                                                           ^
[   49.322526]  ffffffff9afa9700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   49.323346]  ffffffff9afa9780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   49.324140] ==================================================================

test log snippet test parser 173

Home

[   46.845420] ==================================================================
[   46.846745] BUG: KASAN: invalid-free in kfree+0xfb/0x120
[   46.848148] Free of addr ffff888102108001 by task kunit_try_catch/144
[   46.849254] 
[   46.849647] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.851418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.852462] Call Trace:
[   46.852840]  <TASK>
[   46.853444]  dump_stack_lvl+0x4e/0x90
[   46.854103]  print_report+0xd2/0x660
[   46.855076]  ? __virt_addr_valid+0x156/0x1e0
[   46.855785]  ? kfree+0xfb/0x120
[   46.856400]  ? kasan_addr_to_slab+0x11/0xb0
[   46.857016]  ? kfree+0xfb/0x120
[   46.857563]  kasan_report_invalid_free+0xcf/0x100
[   46.858167]  ? kfree+0xfb/0x120
[   46.859177]  ? kfree+0xfb/0x120
[   46.859802]  __kasan_kfree_large+0x86/0xd0
[   46.860749]  free_large_kmalloc+0x46/0xd0
[   46.861478]  kfree+0xfb/0x120
[   46.861918]  kmalloc_pagealloc_invalid_free+0xa9/0x1a0
[   46.863171]  ? __pfx_kmalloc_pagealloc_invalid_free+0x10/0x10
[   46.864117]  ? ktime_get_ts64+0x118/0x140
[   46.864640]  kunit_try_run_case+0x126/0x290
[   46.865473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.866345]  ? __kasan_check_write+0x18/0x20
[   46.867024]  ? trace_preempt_on+0x20/0xa0
[   46.867554]  ? __kthread_parkme+0x4f/0xd0
[   46.868123]  ? preempt_count_sub+0x50/0x80
[   46.868748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.869601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.870580]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.871392]  kthread+0x19e/0x1e0
[   46.872205]  ? __pfx_kthread+0x10/0x10
[   46.872883]  ret_from_fork+0x41/0x70
[   46.873433]  ? __pfx_kthread+0x10/0x10
[   46.874037]  ret_from_fork_asm+0x1b/0x30
[   46.875055]  </TASK>
[   46.875299] 
[   46.875793] The buggy address belongs to the physical page:
[   46.876697] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102108
[   46.878052] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.879074] flags: 0x200000000000040(head|node=0|zone=2)
[   46.880177] page_type: 0xffffffff()
[   46.880504] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   46.881464] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.882586] page dumped because: kasan: bad access detected
[   46.883422] 
[   46.884018] Memory state around the buggy address:
[   46.884592]  ffff888102107f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.885155]  ffff888102107f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.886632] >ffff888102108000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.887337]                    ^
[   46.887742]  ffff888102108080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.888773]  ffff888102108100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.889784] ==================================================================

test log snippet test parser 174

Home

[   49.972491] ==================================================================
[   49.973493] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x260
[   49.975178] Free of addr ffff888102850001 by task kunit_try_catch/214
[   49.976487] 
[   49.977016] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.977692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.979103] Call Trace:
[   49.979533]  <TASK>
[   49.980078]  dump_stack_lvl+0x4e/0x90
[   49.980619]  print_report+0xd2/0x660
[   49.981508]  ? __virt_addr_valid+0x156/0x1e0
[   49.982258]  ? kmem_cache_invalid_free+0xe4/0x260
[   49.982854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.984228]  ? kmem_cache_invalid_free+0xe4/0x260
[   49.984866]  kasan_report_invalid_free+0xcf/0x100
[   49.985470]  ? kmem_cache_invalid_free+0xe4/0x260
[   49.986322]  ? kmem_cache_invalid_free+0xe4/0x260
[   49.986886]  ____kasan_slab_free+0x1c0/0x1d0
[   49.987722]  ? kmem_cache_invalid_free+0xe4/0x260
[   49.988176]  __kasan_slab_free+0x16/0x20
[   49.988700]  kmem_cache_free+0x1a7/0x4b0
[   49.989196]  kmem_cache_invalid_free+0xe4/0x260
[   49.990219]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   49.991090]  ? __schedule+0x70b/0x1190
[   49.991621]  ? ktime_get_ts64+0x118/0x140
[   49.992429]  kunit_try_run_case+0x126/0x290
[   49.992979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.994023]  ? __kasan_check_write+0x18/0x20
[   49.994640]  ? trace_preempt_on+0x20/0xa0
[   49.995229]  ? __kthread_parkme+0x4f/0xd0
[   49.995947]  ? preempt_count_sub+0x50/0x80
[   49.996704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.997366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.998493]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.999351]  kthread+0x19e/0x1e0
[   50.000063]  ? __pfx_kthread+0x10/0x10
[   50.000696]  ret_from_fork+0x41/0x70
[   50.001276]  ? __pfx_kthread+0x10/0x10
[   50.001734]  ret_from_fork_asm+0x1b/0x30
[   50.003023]  </TASK>
[   50.003398] 
[   50.003626] Allocated by task 214:
[   50.004437]  kasan_save_stack+0x3c/0x60
[   50.005294]  kasan_set_track+0x29/0x40
[   50.006441]  kasan_save_alloc_info+0x22/0x30
[   50.006976]  __kasan_slab_alloc+0x91/0xa0
[   50.007745]  kmem_cache_alloc+0x180/0x3b0
[   50.008317]  kmem_cache_invalid_free+0xbd/0x260
[   50.009448]  kunit_try_run_case+0x126/0x290
[   50.010052]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.011360]  kthread+0x19e/0x1e0
[   50.011813]  ret_from_fork+0x41/0x70
[   50.012588]  ret_from_fork_asm+0x1b/0x30
[   50.013468] 
[   50.013693] The buggy address belongs to the object at ffff888102850000
[   50.013693]  which belongs to the cache test_cache of size 200
[   50.014926] The buggy address is located 1 bytes inside of
[   50.014926]  200-byte region [ffff888102850000, ffff8881028500c8)
[   50.017243] 
[   50.017562] The buggy address belongs to the physical page:
[   50.018408] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[   50.020033] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.020693] page_type: 0xffffffff()
[   50.021198] raw: 0200000000000800 ffff888101ba1dc0 dead000000000122 0000000000000000
[   50.022161] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   50.023600] page dumped because: kasan: bad access detected
[   50.024466] 
[   50.024842] Memory state around the buggy address:
[   50.025878]  ffff88810284ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.026756]  ffff88810284ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.027639] >ffff888102850000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.028601]                    ^
[   50.029235]  ffff888102850080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   50.029964]  ffff888102850100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.031144] ==================================================================

test log snippet test parser 175

Home

[   48.288558] ==================================================================
[   48.289629] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xeb/0x1f0
[   48.290607] Read of size 18446744073709551614 at addr ffff888102067484 by task kunit_try_catch/176
[   48.291551] 
[   48.291883] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.293159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.294130] Call Trace:
[   48.294597]  <TASK>
[   48.295174]  dump_stack_lvl+0x4e/0x90
[   48.295788]  print_report+0xd2/0x660
[   48.296328]  ? __virt_addr_valid+0x156/0x1e0
[   48.296887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.297721]  kasan_report+0xff/0x140
[   48.298240]  ? kmalloc_memmove_negative_size+0xeb/0x1f0
[   48.298903]  ? kmalloc_memmove_negative_size+0xeb/0x1f0
[   48.299640]  kasan_check_range+0x10c/0x1c0
[   48.300254]  __asan_memmove+0x27/0x70
[   48.300860]  kmalloc_memmove_negative_size+0xeb/0x1f0
[   48.301487]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   48.302289]  ? __schedule+0x70b/0x1190
[   48.302796]  ? ktime_get_ts64+0x118/0x140
[   48.303443]  kunit_try_run_case+0x126/0x290
[   48.304071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.304733]  ? __kasan_check_write+0x18/0x20
[   48.305361]  ? trace_preempt_on+0x20/0xa0
[   48.305944]  ? __kthread_parkme+0x4f/0xd0
[   48.306482]  ? preempt_count_sub+0x50/0x80
[   48.307118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.307830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.308594]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.309303]  kthread+0x19e/0x1e0
[   48.309889]  ? __pfx_kthread+0x10/0x10
[   48.310441]  ret_from_fork+0x41/0x70
[   48.310982]  ? __pfx_kthread+0x10/0x10
[   48.311570]  ret_from_fork_asm+0x1b/0x30
[   48.312242]  </TASK>
[   48.312600] 
[   48.313648] Allocated by task 176:
[   48.314515]  kasan_save_stack+0x3c/0x60
[   48.315125]  kasan_set_track+0x29/0x40
[   48.315670]  kasan_save_alloc_info+0x22/0x30
[   48.316241]  __kasan_kmalloc+0xb7/0xc0
[   48.316833]  kmalloc_trace+0x4c/0xb0
[   48.317408]  kmalloc_memmove_negative_size+0x9f/0x1f0
[   48.318096]  kunit_try_run_case+0x126/0x290
[   48.318588]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.319367]  kthread+0x19e/0x1e0
[   48.319942]  ret_from_fork+0x41/0x70
[   48.320469]  ret_from_fork_asm+0x1b/0x30
[   48.320955] 
[   48.321975] The buggy address belongs to the object at ffff888102067480
[   48.321975]  which belongs to the cache kmalloc-64 of size 64
[   48.323364] The buggy address is located 4 bytes inside of
[   48.323364]  64-byte region [ffff888102067480, ffff8881020674c0)
[   48.324920] 
[   48.325211] The buggy address belongs to the physical page:
[   48.326113] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[   48.327152] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.327943] page_type: 0xffffffff()
[   48.328428] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   48.329480] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   48.330424] page dumped because: kasan: bad access detected
[   48.331289] 
[   48.331603] Memory state around the buggy address:
[   48.332313]  ffff888102067380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.333383]  ffff888102067400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.334252] >ffff888102067480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   48.335162]                    ^
[   48.335817]  ffff888102067500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.336601]  ffff888102067580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.337582] ==================================================================

test log snippet test parser 176

Home

[   51.064612] ==================================================================
[   51.065525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   51.066447] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.067204] 
[   51.067425] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.068260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.069317] Call Trace:
[   51.069727]  <TASK>
[   51.070179]  dump_stack_lvl+0x4e/0x90
[   51.070853]  print_report+0xd2/0x660
[   51.071394]  ? __virt_addr_valid+0x156/0x1e0
[   51.072110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.072629]  kasan_report+0xff/0x140
[   51.073184]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   51.074012]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   51.074828]  kasan_check_range+0x10c/0x1c0
[   51.075488]  __kasan_check_write+0x18/0x20
[   51.076087]  kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   51.076691]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   51.077543]  ? kasan_set_track+0x29/0x40
[   51.078176]  ? kasan_save_alloc_info+0x22/0x30
[   51.078827]  ? __kasan_kmalloc+0xb7/0xc0
[   51.079320]  kasan_bitops_generic+0xa9/0x130
[   51.080020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.080557]  ? ktime_get_ts64+0x118/0x140
[   51.081143]  kunit_try_run_case+0x126/0x290
[   51.081788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.082512]  ? __kasan_check_write+0x18/0x20
[   51.083265]  ? trace_preempt_on+0x20/0xa0
[   51.083906]  ? __kthread_parkme+0x4f/0xd0
[   51.084498]  ? preempt_count_sub+0x50/0x80
[   51.085160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.085877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.086676]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.088899]  kthread+0x19e/0x1e0
[   51.089574]  ? __pfx_kthread+0x10/0x10
[   51.090209]  ret_from_fork+0x41/0x70
[   51.090660]  ? __pfx_kthread+0x10/0x10
[   51.091252]  ret_from_fork_asm+0x1b/0x30
[   51.092050]  </TASK>
[   51.092439] 
[   51.092735] Allocated by task 224:
[   51.093616]  kasan_save_stack+0x3c/0x60
[   51.095098]  kasan_set_track+0x29/0x40
[   51.095478]  kasan_save_alloc_info+0x22/0x30
[   51.096183]  __kasan_kmalloc+0xb7/0xc0
[   51.096785]  kmalloc_trace+0x4c/0xb0
[   51.097939]  kasan_bitops_generic+0x8e/0x130
[   51.099228]  kunit_try_run_case+0x126/0x290
[   51.100038]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.100725]  kthread+0x19e/0x1e0
[   51.101597]  ret_from_fork+0x41/0x70
[   51.102978]  ret_from_fork_asm+0x1b/0x30
[   51.103487] 
[   51.103698] The buggy address belongs to the object at ffff8881024ffaa0
[   51.103698]  which belongs to the cache kmalloc-16 of size 16
[   51.105488] The buggy address is located 8 bytes inside of
[   51.105488]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.107322] 
[   51.107621] The buggy address belongs to the physical page:
[   51.108354] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.109372] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.110356] page_type: 0xffffffff()
[   51.110877] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.111673] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.112628] page dumped because: kasan: bad access detected
[   51.113364] 
[   51.114048] Memory state around the buggy address:
[   51.114780]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.116119]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.117063] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.117768]                                   ^
[   51.118970]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.119782]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.120839] ==================================================================
---
[   51.013694] ==================================================================
[   51.014478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   51.015524] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.016341] 
[   51.016593] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.018270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.018670] Call Trace:
[   51.018922]  <TASK>
[   51.020011]  dump_stack_lvl+0x4e/0x90
[   51.020609]  print_report+0xd2/0x660
[   51.021275]  ? __virt_addr_valid+0x156/0x1e0
[   51.021952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.022907]  kasan_report+0xff/0x140
[   51.023569]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   51.024409]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   51.025390]  kasan_check_range+0x10c/0x1c0
[   51.025858]  __kasan_check_write+0x18/0x20
[   51.026858]  kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   51.027691]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   51.028599]  ? kasan_set_track+0x29/0x40
[   51.029340]  ? kasan_save_alloc_info+0x22/0x30
[   51.029784]  ? __kasan_kmalloc+0xb7/0xc0
[   51.030348]  kasan_bitops_generic+0xa9/0x130
[   51.031429]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.032171]  ? ktime_get_ts64+0x118/0x140
[   51.032810]  kunit_try_run_case+0x126/0x290
[   51.033412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.034022]  ? __kasan_check_write+0x18/0x20
[   51.034614]  ? trace_preempt_on+0x20/0xa0
[   51.035258]  ? __kthread_parkme+0x4f/0xd0
[   51.035775]  ? preempt_count_sub+0x50/0x80
[   51.036419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.037039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.037936]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.038624]  kthread+0x19e/0x1e0
[   51.039189]  ? __pfx_kthread+0x10/0x10
[   51.039850]  ret_from_fork+0x41/0x70
[   51.040367]  ? __pfx_kthread+0x10/0x10
[   51.040841]  ret_from_fork_asm+0x1b/0x30
[   51.041505]  </TASK>
[   51.041911] 
[   51.042214] Allocated by task 224:
[   51.042726]  kasan_save_stack+0x3c/0x60
[   51.043408]  kasan_set_track+0x29/0x40
[   51.043903]  kasan_save_alloc_info+0x22/0x30
[   51.044585]  __kasan_kmalloc+0xb7/0xc0
[   51.045215]  kmalloc_trace+0x4c/0xb0
[   51.045721]  kasan_bitops_generic+0x8e/0x130
[   51.046396]  kunit_try_run_case+0x126/0x290
[   51.047067]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.047643]  kthread+0x19e/0x1e0
[   51.048260]  ret_from_fork+0x41/0x70
[   51.048803]  ret_from_fork_asm+0x1b/0x30
[   51.049284] 
[   51.049548] The buggy address belongs to the object at ffff8881024ffaa0
[   51.049548]  which belongs to the cache kmalloc-16 of size 16
[   51.050911] The buggy address is located 8 bytes inside of
[   51.050911]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.052069] 
[   51.052339] The buggy address belongs to the physical page:
[   51.053121] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.053963] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.054657] page_type: 0xffffffff()
[   51.055243] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.055919] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.056802] page dumped because: kasan: bad access detected
[   51.057391] 
[   51.057666] Memory state around the buggy address:
[   51.058200]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.059132]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.060004] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.060505]                                   ^
[   51.060959]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.061795]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.063247] ==================================================================
---
[   50.725234] ==================================================================
[   50.726026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0
[   50.727011] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   50.727592] 
[   50.727837] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.728532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.729229] Call Trace:
[   50.729528]  <TASK>
[   50.729828]  dump_stack_lvl+0x4e/0x90
[   50.730524]  print_report+0xd2/0x660
[   50.731168]  ? __virt_addr_valid+0x156/0x1e0
[   50.731829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.732708]  kasan_report+0xff/0x140
[   50.733314]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   50.734192]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   50.735079]  kasan_check_range+0x10c/0x1c0
[   50.735756]  __kasan_check_write+0x18/0x20
[   50.736464]  kasan_bitops_modify.constprop.0+0xda/0x5e0
[   50.737327]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   50.738251]  ? kasan_set_track+0x29/0x40
[   50.738907]  ? kasan_save_alloc_info+0x22/0x30
[   50.739656]  ? __kasan_kmalloc+0xb7/0xc0
[   50.740318]  kasan_bitops_generic+0xa9/0x130
[   50.741019]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.741689]  ? ktime_get_ts64+0x118/0x140
[   50.742343]  kunit_try_run_case+0x126/0x290
[   50.742948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.743570]  ? __kasan_check_write+0x18/0x20
[   50.744187]  ? trace_preempt_on+0x20/0xa0
[   50.744706]  ? __kthread_parkme+0x4f/0xd0
[   50.745299]  ? preempt_count_sub+0x50/0x80
[   50.745829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.746575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.747409]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.748151]  kthread+0x19e/0x1e0
[   50.748615]  ? __pfx_kthread+0x10/0x10
[   50.749242]  ret_from_fork+0x41/0x70
[   50.749842]  ? __pfx_kthread+0x10/0x10
[   50.750367]  ret_from_fork_asm+0x1b/0x30
[   50.751047]  </TASK>
[   50.751365] 
[   50.751659] Allocated by task 224:
[   50.752089]  kasan_save_stack+0x3c/0x60
[   50.752664]  kasan_set_track+0x29/0x40
[   50.753146]  kasan_save_alloc_info+0x22/0x30
[   50.753762]  __kasan_kmalloc+0xb7/0xc0
[   50.754348]  kmalloc_trace+0x4c/0xb0
[   50.754941]  kasan_bitops_generic+0x8e/0x130
[   50.755466]  kunit_try_run_case+0x126/0x290
[   50.756118]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.756874]  kthread+0x19e/0x1e0
[   50.757858]  ret_from_fork+0x41/0x70
[   50.758340]  ret_from_fork_asm+0x1b/0x30
[   50.758819] 
[   50.759071] The buggy address belongs to the object at ffff8881024ffaa0
[   50.759071]  which belongs to the cache kmalloc-16 of size 16
[   50.760798] The buggy address is located 8 bytes inside of
[   50.760798]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   50.762335] 
[   50.762862] The buggy address belongs to the physical page:
[   50.763459] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   50.764676] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.765329] page_type: 0xffffffff()
[   50.765808] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   50.766702] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   50.767476] page dumped because: kasan: bad access detected
[   50.768073] 
[   50.768375] Memory state around the buggy address:
[   50.769029]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   50.769722]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.770529] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.771154]                                   ^
[   50.771721]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.772533]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.773348] ==================================================================
---
[   50.669588] ==================================================================
[   50.670735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   50.671618] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   50.673171] 
[   50.673850] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.674670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.675731] Call Trace:
[   50.676136]  <TASK>
[   50.676471]  dump_stack_lvl+0x4e/0x90
[   50.677183]  print_report+0xd2/0x660
[   50.677987]  ? __virt_addr_valid+0x156/0x1e0
[   50.678596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.679272]  kasan_report+0xff/0x140
[   50.679921]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   50.680771]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   50.682199]  kasan_check_range+0x10c/0x1c0
[   50.682830]  __kasan_check_write+0x18/0x20
[   50.683730]  kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   50.685074]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   50.685972]  ? kasan_set_track+0x29/0x40
[   50.686664]  ? kasan_save_alloc_info+0x22/0x30
[   50.687430]  ? __kasan_kmalloc+0xb7/0xc0
[   50.688249]  kasan_bitops_generic+0xa9/0x130
[   50.688981]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.689769]  ? ktime_get_ts64+0x118/0x140
[   50.690533]  kunit_try_run_case+0x126/0x290
[   50.691293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.692062]  ? __kasan_check_write+0x18/0x20
[   50.692817]  ? trace_preempt_on+0x20/0xa0
[   50.693964]  ? __kthread_parkme+0x4f/0xd0
[   50.694577]  ? preempt_count_sub+0x50/0x80
[   50.695439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.696304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.697127]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.697732]  kthread+0x19e/0x1e0
[   50.698342]  ? __pfx_kthread+0x10/0x10
[   50.698959]  ret_from_fork+0x41/0x70
[   50.699551]  ? __pfx_kthread+0x10/0x10
[   50.700184]  ret_from_fork_asm+0x1b/0x30
[   50.700790]  </TASK>
[   50.701143] 
[   50.701431] Allocated by task 224:
[   50.701932]  kasan_save_stack+0x3c/0x60
[   50.702476]  kasan_set_track+0x29/0x40
[   50.702970]  kasan_save_alloc_info+0x22/0x30
[   50.703621]  __kasan_kmalloc+0xb7/0xc0
[   50.704137]  kmalloc_trace+0x4c/0xb0
[   50.704720]  kasan_bitops_generic+0x8e/0x130
[   50.705389]  kunit_try_run_case+0x126/0x290
[   50.706033]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.706616]  kthread+0x19e/0x1e0
[   50.707200]  ret_from_fork+0x41/0x70
[   50.707789]  ret_from_fork_asm+0x1b/0x30
[   50.708319] 
[   50.708618] The buggy address belongs to the object at ffff8881024ffaa0
[   50.708618]  which belongs to the cache kmalloc-16 of size 16
[   50.709817] The buggy address is located 8 bytes inside of
[   50.709817]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   50.710702] 
[   50.710955] The buggy address belongs to the physical page:
[   50.711381] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   50.712093] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.712584] page_type: 0xffffffff()
[   50.713145] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   50.713986] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   50.714687] page dumped because: kasan: bad access detected
[   50.715361] 
[   50.715658] Memory state around the buggy address:
[   50.716362]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   50.717241]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.718113] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.718847]                                   ^
[   50.719388]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.720084]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.720936] ==================================================================
---
[   50.776094] ==================================================================
[   50.776822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   50.777748] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   50.778437] 
[   50.778721] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.780504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.781616] Call Trace:
[   50.781939]  <TASK>
[   50.782332]  dump_stack_lvl+0x4e/0x90
[   50.782897]  print_report+0xd2/0x660
[   50.783455]  ? __virt_addr_valid+0x156/0x1e0
[   50.784087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.784806]  kasan_report+0xff/0x140
[   50.786564]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   50.787532]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   50.788421]  kasan_check_range+0x10c/0x1c0
[   50.789131]  __kasan_check_write+0x18/0x20
[   50.789937]  kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   50.790791]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   50.791943]  ? kasan_set_track+0x29/0x40
[   50.792705]  ? kasan_save_alloc_info+0x22/0x30
[   50.793530]  ? __kasan_kmalloc+0xb7/0xc0
[   50.794272]  kasan_bitops_generic+0xa9/0x130
[   50.794695]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.795673]  ? ktime_get_ts64+0x118/0x140
[   50.796404]  kunit_try_run_case+0x126/0x290
[   50.797133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.797682]  ? __kasan_check_write+0x18/0x20
[   50.798600]  ? trace_preempt_on+0x20/0xa0
[   50.799309]  ? __kthread_parkme+0x4f/0xd0
[   50.800459]  ? preempt_count_sub+0x50/0x80
[   50.800976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.801799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.803374]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.804335]  kthread+0x19e/0x1e0
[   50.805035]  ? __pfx_kthread+0x10/0x10
[   50.805794]  ret_from_fork+0x41/0x70
[   50.807142]  ? __pfx_kthread+0x10/0x10
[   50.807768]  ret_from_fork_asm+0x1b/0x30
[   50.808491]  </TASK>
[   50.808872] 
[   50.809186] Allocated by task 224:
[   50.809675]  kasan_save_stack+0x3c/0x60
[   50.810949]  kasan_set_track+0x29/0x40
[   50.811421]  kasan_save_alloc_info+0x22/0x30
[   50.812399]  __kasan_kmalloc+0xb7/0xc0
[   50.812953]  kmalloc_trace+0x4c/0xb0
[   50.813534]  kasan_bitops_generic+0x8e/0x130
[   50.814294]  kunit_try_run_case+0x126/0x290
[   50.815491]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.816284]  kthread+0x19e/0x1e0
[   50.817134]  ret_from_fork+0x41/0x70
[   50.818234]  ret_from_fork_asm+0x1b/0x30
[   50.818705] 
[   50.819290] The buggy address belongs to the object at ffff8881024ffaa0
[   50.819290]  which belongs to the cache kmalloc-16 of size 16
[   50.820038] The buggy address is located 8 bytes inside of
[   50.820038]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   50.821740] 
[   50.822044] The buggy address belongs to the physical page:
[   50.822613] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   50.824250] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.825521] page_type: 0xffffffff()
[   50.825970] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   50.827060] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   50.828767] page dumped because: kasan: bad access detected
[   50.829559] 
[   50.829938] Memory state around the buggy address:
[   50.830537]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   50.831063]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.832341] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.833278]                                   ^
[   50.833933]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.834802]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.835500] ==================================================================
---
[   50.895717] ==================================================================
[   50.896695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   50.897860] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   50.899005] 
[   50.899378] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.900471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.901187] Call Trace:
[   50.901783]  <TASK>
[   50.902304]  dump_stack_lvl+0x4e/0x90
[   50.903423]  print_report+0xd2/0x660
[   50.904321]  ? __virt_addr_valid+0x156/0x1e0
[   50.904616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.904934]  kasan_report+0xff/0x140
[   50.905539]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   50.906430]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   50.907286]  kasan_check_range+0x10c/0x1c0
[   50.907900]  __kasan_check_write+0x18/0x20
[   50.908493]  kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   50.909972]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   50.910700]  ? kasan_set_track+0x29/0x40
[   50.911192]  ? kasan_save_alloc_info+0x22/0x30
[   50.911844]  ? __kasan_kmalloc+0xb7/0xc0
[   50.912378]  kasan_bitops_generic+0xa9/0x130
[   50.913020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.913638]  ? ktime_get_ts64+0x118/0x140
[   50.915129]  kunit_try_run_case+0x126/0x290
[   50.915815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.916724]  ? __kasan_check_write+0x18/0x20
[   50.917430]  ? trace_preempt_on+0x20/0xa0
[   50.918082]  ? __kthread_parkme+0x4f/0xd0
[   50.918479]  ? preempt_count_sub+0x50/0x80
[   50.919043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.920159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.920827]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.921500]  kthread+0x19e/0x1e0
[   50.921980]  ? __pfx_kthread+0x10/0x10
[   50.922572]  ret_from_fork+0x41/0x70
[   50.923391]  ? __pfx_kthread+0x10/0x10
[   50.924665]  ret_from_fork_asm+0x1b/0x30
[   50.925427]  </TASK>
[   50.925752] 
[   50.926057] Allocated by task 224:
[   50.926446]  kasan_save_stack+0x3c/0x60
[   50.926959]  kasan_set_track+0x29/0x40
[   50.927554]  kasan_save_alloc_info+0x22/0x30
[   50.928862]  __kasan_kmalloc+0xb7/0xc0
[   50.929592]  kmalloc_trace+0x4c/0xb0
[   50.930346]  kasan_bitops_generic+0x8e/0x130
[   50.931112]  kunit_try_run_case+0x126/0x290
[   50.931610]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.932586]  kthread+0x19e/0x1e0
[   50.932940]  ret_from_fork+0x41/0x70
[   50.934079]  ret_from_fork_asm+0x1b/0x30
[   50.934578] 
[   50.935134] The buggy address belongs to the object at ffff8881024ffaa0
[   50.935134]  which belongs to the cache kmalloc-16 of size 16
[   50.936651] The buggy address is located 8 bytes inside of
[   50.936651]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   50.937890] 
[   50.938232] The buggy address belongs to the physical page:
[   50.939367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   50.940477] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.941311] page_type: 0xffffffff()
[   50.941762] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   50.943419] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   50.944286] page dumped because: kasan: bad access detected
[   50.945074] 
[   50.945577] Memory state around the buggy address:
[   50.946337]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   50.947392]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.948449] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.949467]                                   ^
[   50.950983]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.952023]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.953035] ==================================================================
---
[   50.954386] ==================================================================
[   50.955378] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   50.956858] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   50.957730] 
[   50.958255] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.960331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.961876] Call Trace:
[   50.962182]  <TASK>
[   50.963598]  dump_stack_lvl+0x4e/0x90
[   50.964072]  print_report+0xd2/0x660
[   50.964353]  ? __virt_addr_valid+0x156/0x1e0
[   50.964630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.965342]  kasan_report+0xff/0x140
[   50.965923]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   50.966694]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   50.968330]  kasan_check_range+0x10c/0x1c0
[   50.969127]  __kasan_check_write+0x18/0x20
[   50.970036]  kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   50.970710]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   50.971756]  ? kasan_set_track+0x29/0x40
[   50.972579]  ? kasan_save_alloc_info+0x22/0x30
[   50.973374]  ? __kasan_kmalloc+0xb7/0xc0
[   50.973948]  kasan_bitops_generic+0xa9/0x130
[   50.974602]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.975501]  ? ktime_get_ts64+0x118/0x140
[   50.976520]  kunit_try_run_case+0x126/0x290
[   50.977235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.977818]  ? __kasan_check_write+0x18/0x20
[   50.978530]  ? trace_preempt_on+0x20/0xa0
[   50.979288]  ? __kthread_parkme+0x4f/0xd0
[   50.979723]  ? preempt_count_sub+0x50/0x80
[   50.980654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.981580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.982575]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.983286]  kthread+0x19e/0x1e0
[   50.983806]  ? __pfx_kthread+0x10/0x10
[   50.985045]  ret_from_fork+0x41/0x70
[   50.985597]  ? __pfx_kthread+0x10/0x10
[   50.986386]  ret_from_fork_asm+0x1b/0x30
[   50.987086]  </TASK>
[   50.987571] 
[   50.988075] Allocated by task 224:
[   50.988484]  kasan_save_stack+0x3c/0x60
[   50.989250]  kasan_set_track+0x29/0x40
[   50.989611]  kasan_save_alloc_info+0x22/0x30
[   50.990032]  __kasan_kmalloc+0xb7/0xc0
[   50.990605]  kmalloc_trace+0x4c/0xb0
[   50.991245]  kasan_bitops_generic+0x8e/0x130
[   50.991810]  kunit_try_run_case+0x126/0x290
[   50.992613]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.993451]  kthread+0x19e/0x1e0
[   50.994118]  ret_from_fork+0x41/0x70
[   50.994633]  ret_from_fork_asm+0x1b/0x30
[   50.995176] 
[   50.995394] The buggy address belongs to the object at ffff8881024ffaa0
[   50.995394]  which belongs to the cache kmalloc-16 of size 16
[   50.997035] The buggy address is located 8 bytes inside of
[   50.997035]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   50.998912] 
[   50.999669] The buggy address belongs to the physical page:
[   51.000318] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.000746] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.001311] page_type: 0xffffffff()
[   51.001825] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.003141] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.004206] page dumped because: kasan: bad access detected
[   51.004781] 
[   51.005078] Memory state around the buggy address:
[   51.006044]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.007640]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.008563] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.009364]                                   ^
[   51.010064]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.011652]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.012345] ==================================================================
---
[   50.837587] ==================================================================
[   50.838527] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   50.840502] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   50.841350] 
[   50.841579] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.842870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.843632] Call Trace:
[   50.844048]  <TASK>
[   50.844464]  dump_stack_lvl+0x4e/0x90
[   50.845445]  print_report+0xd2/0x660
[   50.846394]  ? __virt_addr_valid+0x156/0x1e0
[   50.847465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.848163]  kasan_report+0xff/0x140
[   50.848727]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   50.849513]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   50.851194]  kasan_check_range+0x10c/0x1c0
[   50.851779]  __kasan_check_write+0x18/0x20
[   50.852276]  kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   50.852607]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   50.853418]  ? kasan_set_track+0x29/0x40
[   50.854114]  ? kasan_save_alloc_info+0x22/0x30
[   50.854648]  ? __kasan_kmalloc+0xb7/0xc0
[   50.855425]  kasan_bitops_generic+0xa9/0x130
[   50.856509]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.857262]  ? ktime_get_ts64+0x118/0x140
[   50.857879]  kunit_try_run_case+0x126/0x290
[   50.859197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.860005]  ? __kasan_check_write+0x18/0x20
[   50.860806]  ? trace_preempt_on+0x20/0xa0
[   50.861325]  ? __kthread_parkme+0x4f/0xd0
[   50.861836]  ? preempt_count_sub+0x50/0x80
[   50.862916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.863651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.864826]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.865669]  kthread+0x19e/0x1e0
[   50.866413]  ? __pfx_kthread+0x10/0x10
[   50.867590]  ret_from_fork+0x41/0x70
[   50.868160]  ? __pfx_kthread+0x10/0x10
[   50.868737]  ret_from_fork_asm+0x1b/0x30
[   50.869694]  </TASK>
[   50.870280] 
[   50.870714] Allocated by task 224:
[   50.871318]  kasan_save_stack+0x3c/0x60
[   50.872283]  kasan_set_track+0x29/0x40
[   50.872760]  kasan_save_alloc_info+0x22/0x30
[   50.873506]  __kasan_kmalloc+0xb7/0xc0
[   50.874319]  kmalloc_trace+0x4c/0xb0
[   50.874959]  kasan_bitops_generic+0x8e/0x130
[   50.875618]  kunit_try_run_case+0x126/0x290
[   50.876479]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.877226]  kthread+0x19e/0x1e0
[   50.877670]  ret_from_fork+0x41/0x70
[   50.878217]  ret_from_fork_asm+0x1b/0x30
[   50.878976] 
[   50.879359] The buggy address belongs to the object at ffff8881024ffaa0
[   50.879359]  which belongs to the cache kmalloc-16 of size 16
[   50.880603] The buggy address is located 8 bytes inside of
[   50.880603]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   50.882235] 
[   50.882542] The buggy address belongs to the physical page:
[   50.883022] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   50.883694] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.884304] page_type: 0xffffffff()
[   50.884953] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   50.885958] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   50.887064] page dumped because: kasan: bad access detected
[   50.887707] 
[   50.888103] Memory state around the buggy address:
[   50.888802]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   50.889714]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.890718] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.891752]                                   ^
[   50.892476]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.893511]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.894434] ==================================================================

test log snippet test parser 177

Home

[   51.527785] ==================================================================
[   51.528575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.529962] Read of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.530941] 
[   51.531319] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.532370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.533411] Call Trace:
[   51.533872]  <TASK>
[   51.534314]  dump_stack_lvl+0x4e/0x90
[   51.535062]  print_report+0xd2/0x660
[   51.535707]  ? __virt_addr_valid+0x156/0x1e0
[   51.536436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.537269]  kasan_report+0xff/0x140
[   51.537743]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.538720]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.539589]  __asan_load8+0x82/0xb0
[   51.540295]  kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.541024]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.541900]  ? add_taint+0x2e/0xa0
[   51.542460]  kasan_bitops_generic+0xb4/0x130
[   51.543206]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.543711]  ? ktime_get_ts64+0x118/0x140
[   51.544469]  kunit_try_run_case+0x126/0x290
[   51.545307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.546080]  ? __kasan_check_write+0x18/0x20
[   51.546810]  ? trace_preempt_on+0x20/0xa0
[   51.547491]  ? __kthread_parkme+0x4f/0xd0
[   51.548078]  ? preempt_count_sub+0x50/0x80
[   51.548737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.549497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.550336]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.551129]  kthread+0x19e/0x1e0
[   51.551726]  ? __pfx_kthread+0x10/0x10
[   51.552254]  ret_from_fork+0x41/0x70
[   51.552721]  ? __pfx_kthread+0x10/0x10
[   51.553297]  ret_from_fork_asm+0x1b/0x30
[   51.553824]  </TASK>
[   51.554231] 
[   51.554464] Allocated by task 224:
[   51.554830]  kasan_save_stack+0x3c/0x60
[   51.555847]  kasan_set_track+0x29/0x40
[   51.556248]  kasan_save_alloc_info+0x22/0x30
[   51.557072]  __kasan_kmalloc+0xb7/0xc0
[   51.557769]  kmalloc_trace+0x4c/0xb0
[   51.558514]  kasan_bitops_generic+0x8e/0x130
[   51.559261]  kunit_try_run_case+0x126/0x290
[   51.560012]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.560856]  kthread+0x19e/0x1e0
[   51.561599]  ret_from_fork+0x41/0x70
[   51.562320]  ret_from_fork_asm+0x1b/0x30
[   51.563090] 
[   51.563566] The buggy address belongs to the object at ffff8881024ffaa0
[   51.563566]  which belongs to the cache kmalloc-16 of size 16
[   51.564861] The buggy address is located 8 bytes inside of
[   51.564861]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.566302] 
[   51.566605] The buggy address belongs to the physical page:
[   51.567523] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.568432] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.568727] page_type: 0xffffffff()
[   51.569125] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.570139] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.570811] page dumped because: kasan: bad access detected
[   51.571513] 
[   51.571777] Memory state around the buggy address:
[   51.572492]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.573281]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.574178] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.574881]                                   ^
[   51.575347]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.576266]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.576951] ==================================================================

test log snippet test parser 178

Home

[   51.328256] ==================================================================
[   51.329442] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.330469] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.331159] 
[   51.331598] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.332668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.333827] Call Trace:
[   51.334232]  <TASK>
[   51.334580]  dump_stack_lvl+0x4e/0x90
[   51.335230]  print_report+0xd2/0x660
[   51.335857]  ? __virt_addr_valid+0x156/0x1e0
[   51.336526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.337451]  kasan_report+0xff/0x140
[   51.338092]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.338909]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.339681]  kasan_check_range+0x10c/0x1c0
[   51.340256]  __kasan_check_write+0x18/0x20
[   51.340908]  kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.341694]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.342427]  ? add_taint+0x2e/0xa0
[   51.343032]  kasan_bitops_generic+0xb4/0x130
[   51.343627]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.344250]  ? ktime_get_ts64+0x118/0x140
[   51.344864]  kunit_try_run_case+0x126/0x290
[   51.345413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.346124]  ? __kasan_check_write+0x18/0x20
[   51.346712]  ? trace_preempt_on+0x20/0xa0
[   51.347311]  ? __kthread_parkme+0x4f/0xd0
[   51.347840]  ? preempt_count_sub+0x50/0x80
[   51.348445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.349103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.349874]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.350533]  kthread+0x19e/0x1e0
[   51.351123]  ? __pfx_kthread+0x10/0x10
[   51.351688]  ret_from_fork+0x41/0x70
[   51.352281]  ? __pfx_kthread+0x10/0x10
[   51.352808]  ret_from_fork_asm+0x1b/0x30
[   51.353433]  </TASK>
[   51.353804] 
[   51.354130] Allocated by task 224:
[   51.354528]  kasan_save_stack+0x3c/0x60
[   51.355100]  kasan_set_track+0x29/0x40
[   51.355667]  kasan_save_alloc_info+0x22/0x30
[   51.356211]  __kasan_kmalloc+0xb7/0xc0
[   51.356761]  kmalloc_trace+0x4c/0xb0
[   51.357298]  kasan_bitops_generic+0x8e/0x130
[   51.357934]  kunit_try_run_case+0x126/0x290
[   51.358564]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.359269]  kthread+0x19e/0x1e0
[   51.359790]  ret_from_fork+0x41/0x70
[   51.360439]  ret_from_fork_asm+0x1b/0x30
[   51.360956] 
[   51.361277] The buggy address belongs to the object at ffff8881024ffaa0
[   51.361277]  which belongs to the cache kmalloc-16 of size 16
[   51.362814] The buggy address is located 8 bytes inside of
[   51.362814]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.364588] 
[   51.365036] The buggy address belongs to the physical page:
[   51.365587] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.366623] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.367239] page_type: 0xffffffff()
[   51.367767] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.368600] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.369286] page dumped because: kasan: bad access detected
[   51.369900] 
[   51.370235] Memory state around the buggy address:
[   51.370681]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.371533]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.372376] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.373403]                                   ^
[   51.373884]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.374632]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.375475] ==================================================================
---
[   51.224900] ==================================================================
[   51.225623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.226623] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.227419] 
[   51.227784] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.228703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.229620] Call Trace:
[   51.230010]  <TASK>
[   51.230410]  dump_stack_lvl+0x4e/0x90
[   51.231070]  print_report+0xd2/0x660
[   51.231679]  ? __virt_addr_valid+0x156/0x1e0
[   51.232318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.233185]  kasan_report+0xff/0x140
[   51.233761]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.234580]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.235465]  kasan_check_range+0x10c/0x1c0
[   51.236057]  __kasan_check_write+0x18/0x20
[   51.236782]  kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.237656]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.238389]  ? add_taint+0x2e/0xa0
[   51.239005]  kasan_bitops_generic+0xb4/0x130
[   51.239649]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.240297]  ? ktime_get_ts64+0x118/0x140
[   51.241243]  kunit_try_run_case+0x126/0x290
[   51.242025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.242759]  ? __kasan_check_write+0x18/0x20
[   51.243547]  ? trace_preempt_on+0x20/0xa0
[   51.244298]  ? __kthread_parkme+0x4f/0xd0
[   51.245027]  ? preempt_count_sub+0x50/0x80
[   51.245763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.246446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.247364]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.248176]  kthread+0x19e/0x1e0
[   51.248849]  ? __pfx_kthread+0x10/0x10
[   51.249615]  ret_from_fork+0x41/0x70
[   51.250346]  ? __pfx_kthread+0x10/0x10
[   51.251109]  ret_from_fork_asm+0x1b/0x30
[   51.251881]  </TASK>
[   51.252450] 
[   51.252927] Allocated by task 224:
[   51.253403]  kasan_save_stack+0x3c/0x60
[   51.253982]  kasan_set_track+0x29/0x40
[   51.254562]  kasan_save_alloc_info+0x22/0x30
[   51.255226]  __kasan_kmalloc+0xb7/0xc0
[   51.255814]  kmalloc_trace+0x4c/0xb0
[   51.256609]  kasan_bitops_generic+0x8e/0x130
[   51.257172]  kunit_try_run_case+0x126/0x290
[   51.257451]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.257759]  kthread+0x19e/0x1e0
[   51.258223]  ret_from_fork+0x41/0x70
[   51.258902]  ret_from_fork_asm+0x1b/0x30
[   51.259566] 
[   51.259946] The buggy address belongs to the object at ffff8881024ffaa0
[   51.259946]  which belongs to the cache kmalloc-16 of size 16
[   51.261353] The buggy address is located 8 bytes inside of
[   51.261353]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.262558] 
[   51.263088] The buggy address belongs to the physical page:
[   51.264028] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.265010] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.265589] page_type: 0xffffffff()
[   51.266251] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.267478] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.268390] page dumped because: kasan: bad access detected
[   51.269203] 
[   51.269421] Memory state around the buggy address:
[   51.270459]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.271425]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.272377] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.273341]                                   ^
[   51.274074]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.275014]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.275977] ==================================================================
---
[   51.175349] ==================================================================
[   51.176105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.177300] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.178350] 
[   51.178504] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.179034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.179771] Call Trace:
[   51.180252]  <TASK>
[   51.180669]  dump_stack_lvl+0x4e/0x90
[   51.181281]  print_report+0xd2/0x660
[   51.181878]  ? __virt_addr_valid+0x156/0x1e0
[   51.182577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.183399]  kasan_report+0xff/0x140
[   51.184012]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.184823]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.185662]  kasan_check_range+0x10c/0x1c0
[   51.186289]  __kasan_check_write+0x18/0x20
[   51.186949]  kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.187736]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.188586]  ? add_taint+0x2e/0xa0
[   51.189162]  kasan_bitops_generic+0xb4/0x130
[   51.189749]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.190400]  ? ktime_get_ts64+0x118/0x140
[   51.190959]  kunit_try_run_case+0x126/0x290
[   51.191612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.192344]  ? __kasan_check_write+0x18/0x20
[   51.193008]  ? trace_preempt_on+0x20/0xa0
[   51.193617]  ? __kthread_parkme+0x4f/0xd0
[   51.194291]  ? preempt_count_sub+0x50/0x80
[   51.194925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.195583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.196439]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.197229]  kthread+0x19e/0x1e0
[   51.197769]  ? __pfx_kthread+0x10/0x10
[   51.198365]  ret_from_fork+0x41/0x70
[   51.198978]  ? __pfx_kthread+0x10/0x10
[   51.199594]  ret_from_fork_asm+0x1b/0x30
[   51.200247]  </TASK>
[   51.200662] 
[   51.200987] Allocated by task 224:
[   51.201741]  kasan_save_stack+0x3c/0x60
[   51.202558]  kasan_set_track+0x29/0x40
[   51.204028]  kasan_save_alloc_info+0x22/0x30
[   51.204646]  __kasan_kmalloc+0xb7/0xc0
[   51.205261]  kmalloc_trace+0x4c/0xb0
[   51.205880]  kasan_bitops_generic+0x8e/0x130
[   51.206476]  kunit_try_run_case+0x126/0x290
[   51.207180]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.207837]  kthread+0x19e/0x1e0
[   51.208444]  ret_from_fork+0x41/0x70
[   51.209056]  ret_from_fork_asm+0x1b/0x30
[   51.209734] 
[   51.210141] The buggy address belongs to the object at ffff8881024ffaa0
[   51.210141]  which belongs to the cache kmalloc-16 of size 16
[   51.211069] The buggy address is located 8 bytes inside of
[   51.211069]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.212232] 
[   51.212576] The buggy address belongs to the physical page:
[   51.213253] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.214370] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.215105] page_type: 0xffffffff()
[   51.215627] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.216377] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.217321] page dumped because: kasan: bad access detected
[   51.217962] 
[   51.218258] Memory state around the buggy address:
[   51.218898]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.219631]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.220473] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.221280]                                   ^
[   51.221786]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.222598]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.223420] ==================================================================
---
[   51.123167] ==================================================================
[   51.123958] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.125294] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.125649] 
[   51.125833] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.126924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.128293] Call Trace:
[   51.128581]  <TASK>
[   51.129313]  dump_stack_lvl+0x4e/0x90
[   51.130047]  print_report+0xd2/0x660
[   51.130743]  ? __virt_addr_valid+0x156/0x1e0
[   51.131352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.132284]  kasan_report+0xff/0x140
[   51.132967]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.133988]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.134940]  kasan_check_range+0x10c/0x1c0
[   51.135681]  __kasan_check_write+0x18/0x20
[   51.136239]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.137245]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.138056]  ? add_taint+0x2e/0xa0
[   51.138722]  kasan_bitops_generic+0xb4/0x130
[   51.139499]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.140292]  ? ktime_get_ts64+0x118/0x140
[   51.140964]  kunit_try_run_case+0x126/0x290
[   51.141654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.142213]  ? __kasan_check_write+0x18/0x20
[   51.142749]  ? trace_preempt_on+0x20/0xa0
[   51.143287]  ? __kthread_parkme+0x4f/0xd0
[   51.143843]  ? preempt_count_sub+0x50/0x80
[   51.144552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.145308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.146059]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.146889]  kthread+0x19e/0x1e0
[   51.147426]  ? __pfx_kthread+0x10/0x10
[   51.148063]  ret_from_fork+0x41/0x70
[   51.148639]  ? __pfx_kthread+0x10/0x10
[   51.149285]  ret_from_fork_asm+0x1b/0x30
[   51.150029]  </TASK>
[   51.150401] 
[   51.150677] Allocated by task 224:
[   51.151196]  kasan_save_stack+0x3c/0x60
[   51.151749]  kasan_set_track+0x29/0x40
[   51.152346]  kasan_save_alloc_info+0x22/0x30
[   51.153062]  __kasan_kmalloc+0xb7/0xc0
[   51.153612]  kmalloc_trace+0x4c/0xb0
[   51.154200]  kasan_bitops_generic+0x8e/0x130
[   51.154896]  kunit_try_run_case+0x126/0x290
[   51.155574]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.156394]  kthread+0x19e/0x1e0
[   51.156967]  ret_from_fork+0x41/0x70
[   51.157592]  ret_from_fork_asm+0x1b/0x30
[   51.158146] 
[   51.158403] The buggy address belongs to the object at ffff8881024ffaa0
[   51.158403]  which belongs to the cache kmalloc-16 of size 16
[   51.159573] The buggy address is located 8 bytes inside of
[   51.159573]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.160944] 
[   51.161262] The buggy address belongs to the physical page:
[   51.161944] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.163122] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.163737] page_type: 0xffffffff()
[   51.164190] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.165004] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.165651] page dumped because: kasan: bad access detected
[   51.166414] 
[   51.166716] Memory state around the buggy address:
[   51.167435]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.168395]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.169219] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.170059]                                   ^
[   51.170642]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.171458]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.172283] ==================================================================
---
[   51.376786] ==================================================================
[   51.377817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.378876] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.379600] 
[   51.379934] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.380719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.381740] Call Trace:
[   51.382193]  <TASK>
[   51.382525]  dump_stack_lvl+0x4e/0x90
[   51.383166]  print_report+0xd2/0x660
[   51.383760]  ? __virt_addr_valid+0x156/0x1e0
[   51.384325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.386092]  kasan_report+0xff/0x140
[   51.386530]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.387664]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.388439]  kasan_check_range+0x10c/0x1c0
[   51.389022]  __kasan_check_write+0x18/0x20
[   51.389621]  kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.390312]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.391150]  ? add_taint+0x2e/0xa0
[   51.391719]  kasan_bitops_generic+0xb4/0x130
[   51.392341]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.393012]  ? ktime_get_ts64+0x118/0x140
[   51.393568]  kunit_try_run_case+0x126/0x290
[   51.394134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.394810]  ? __kasan_check_write+0x18/0x20
[   51.395455]  ? trace_preempt_on+0x20/0xa0
[   51.396036]  ? __kthread_parkme+0x4f/0xd0
[   51.396590]  ? preempt_count_sub+0x50/0x80
[   51.397113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.397791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.398596]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.399310]  kthread+0x19e/0x1e0
[   51.399857]  ? __pfx_kthread+0x10/0x10
[   51.400391]  ret_from_fork+0x41/0x70
[   51.401025]  ? __pfx_kthread+0x10/0x10
[   51.401617]  ret_from_fork_asm+0x1b/0x30
[   51.402273]  </TASK>
[   51.402563] 
[   51.402858] Allocated by task 224:
[   51.403323]  kasan_save_stack+0x3c/0x60
[   51.404263]  kasan_set_track+0x29/0x40
[   51.405109]  kasan_save_alloc_info+0x22/0x30
[   51.405613]  __kasan_kmalloc+0xb7/0xc0
[   51.406187]  kmalloc_trace+0x4c/0xb0
[   51.406640]  kasan_bitops_generic+0x8e/0x130
[   51.407289]  kunit_try_run_case+0x126/0x290
[   51.407764]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.408525]  kthread+0x19e/0x1e0
[   51.410032]  ret_from_fork+0x41/0x70
[   51.410536]  ret_from_fork_asm+0x1b/0x30
[   51.411444] 
[   51.411647] The buggy address belongs to the object at ffff8881024ffaa0
[   51.411647]  which belongs to the cache kmalloc-16 of size 16
[   51.412810] The buggy address is located 8 bytes inside of
[   51.412810]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.413960] 
[   51.414252] The buggy address belongs to the physical page:
[   51.414737] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.415666] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.416377] page_type: 0xffffffff()
[   51.416929] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.417756] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.418651] page dumped because: kasan: bad access detected
[   51.419204] 
[   51.419494] Memory state around the buggy address:
[   51.420145]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.420873]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.421628] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.422449]                                   ^
[   51.422941]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.423749]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.424569] ==================================================================
---
[   51.277549] ==================================================================
[   51.278280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.279973] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.281368] 
[   51.281600] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.282794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.283705] Call Trace:
[   51.284187]  <TASK>
[   51.284599]  dump_stack_lvl+0x4e/0x90
[   51.285206]  print_report+0xd2/0x660
[   51.285813]  ? __virt_addr_valid+0x156/0x1e0
[   51.286435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.287252]  kasan_report+0xff/0x140
[   51.287807]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.288647]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.289460]  kasan_check_range+0x10c/0x1c0
[   51.290103]  __kasan_check_write+0x18/0x20
[   51.290738]  kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.291528]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.292444]  ? add_taint+0x2e/0xa0
[   51.293056]  kasan_bitops_generic+0xb4/0x130
[   51.293644]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.294377]  ? ktime_get_ts64+0x118/0x140
[   51.295012]  kunit_try_run_case+0x126/0x290
[   51.295673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.296353]  ? __kasan_check_write+0x18/0x20
[   51.297038]  ? trace_preempt_on+0x20/0xa0
[   51.297612]  ? __kthread_parkme+0x4f/0xd0
[   51.298213]  ? preempt_count_sub+0x50/0x80
[   51.298755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.299471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.300211]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.301070]  kthread+0x19e/0x1e0
[   51.301614]  ? __pfx_kthread+0x10/0x10
[   51.302184]  ret_from_fork+0x41/0x70
[   51.302768]  ? __pfx_kthread+0x10/0x10
[   51.303282]  ret_from_fork_asm+0x1b/0x30
[   51.304007]  </TASK>
[   51.304388] 
[   51.304708] Allocated by task 224:
[   51.305082]  kasan_save_stack+0x3c/0x60
[   51.305714]  kasan_set_track+0x29/0x40
[   51.306297]  kasan_save_alloc_info+0x22/0x30
[   51.306684]  __kasan_kmalloc+0xb7/0xc0
[   51.307219]  kmalloc_trace+0x4c/0xb0
[   51.307836]  kasan_bitops_generic+0x8e/0x130
[   51.309633]  kunit_try_run_case+0x126/0x290
[   51.310324]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.310968]  kthread+0x19e/0x1e0
[   51.311469]  ret_from_fork+0x41/0x70
[   51.311897]  ret_from_fork_asm+0x1b/0x30
[   51.312518] 
[   51.312790] The buggy address belongs to the object at ffff8881024ffaa0
[   51.312790]  which belongs to the cache kmalloc-16 of size 16
[   51.314256] The buggy address is located 8 bytes inside of
[   51.314256]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.315528] 
[   51.315883] The buggy address belongs to the physical page:
[   51.316523] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.317523] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.318290] page_type: 0xffffffff()
[   51.318856] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.319803] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.320629] page dumped because: kasan: bad access detected
[   51.321275] 
[   51.321608] Memory state around the buggy address:
[   51.322180]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.323067]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.323912] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.324665]                                   ^
[   51.325299]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.326096]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.326936] ==================================================================
---
[   51.425691] ==================================================================
[   51.426569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.428020] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.428897] 
[   51.429178] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.429982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.430949] Call Trace:
[   51.431279]  <TASK>
[   51.431664]  dump_stack_lvl+0x4e/0x90
[   51.432295]  print_report+0xd2/0x660
[   51.432902]  ? __virt_addr_valid+0x156/0x1e0
[   51.433559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.434344]  kasan_report+0xff/0x140
[   51.435291]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.436469]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.437242]  kasan_check_range+0x10c/0x1c0
[   51.437792]  __kasan_check_write+0x18/0x20
[   51.438416]  kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.439261]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.440073]  ? add_taint+0x2e/0xa0
[   51.440633]  kasan_bitops_generic+0xb4/0x130
[   51.441319]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.442048]  ? ktime_get_ts64+0x118/0x140
[   51.442666]  kunit_try_run_case+0x126/0x290
[   51.443192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.443869]  ? __kasan_check_write+0x18/0x20
[   51.444588]  ? trace_preempt_on+0x20/0xa0
[   51.445153]  ? __kthread_parkme+0x4f/0xd0
[   51.445677]  ? preempt_count_sub+0x50/0x80
[   51.446248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.446934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.447639]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.448373]  kthread+0x19e/0x1e0
[   51.448915]  ? __pfx_kthread+0x10/0x10
[   51.449511]  ret_from_fork+0x41/0x70
[   51.450062]  ? __pfx_kthread+0x10/0x10
[   51.450646]  ret_from_fork_asm+0x1b/0x30
[   51.451222]  </TASK>
[   51.451594] 
[   51.451875] Allocated by task 224:
[   51.452272]  kasan_save_stack+0x3c/0x60
[   51.452855]  kasan_set_track+0x29/0x40
[   51.453328]  kasan_save_alloc_info+0x22/0x30
[   51.453961]  __kasan_kmalloc+0xb7/0xc0
[   51.454435]  kmalloc_trace+0x4c/0xb0
[   51.455037]  kasan_bitops_generic+0x8e/0x130
[   51.455647]  kunit_try_run_case+0x126/0x290
[   51.456205]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.456792]  kthread+0x19e/0x1e0
[   51.457364]  ret_from_fork+0x41/0x70
[   51.457898]  ret_from_fork_asm+0x1b/0x30
[   51.458502] 
[   51.458812] The buggy address belongs to the object at ffff8881024ffaa0
[   51.458812]  which belongs to the cache kmalloc-16 of size 16
[   51.459892] The buggy address is located 8 bytes inside of
[   51.459892]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.461120] 
[   51.461367] The buggy address belongs to the physical page:
[   51.462052] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.463580] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.464396] page_type: 0xffffffff()
[   51.465142] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.466141] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.467149] page dumped because: kasan: bad access detected
[   51.467764] 
[   51.468067] Memory state around the buggy address:
[   51.468563]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.469828]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.470754] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.471672]                                   ^
[   51.472494]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.473530]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.474453] ==================================================================
---
[   51.578479] ==================================================================
[   51.579322] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.580807] Write of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.581631] 
[   51.582014] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.582890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.583847] Call Trace:
[   51.584220]  <TASK>
[   51.584638]  dump_stack_lvl+0x4e/0x90
[   51.585897]  print_report+0xd2/0x660
[   51.586309]  ? __virt_addr_valid+0x156/0x1e0
[   51.587209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.587845]  kasan_report+0xff/0x140
[   51.588433]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.589212]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.590140]  kasan_check_range+0x10c/0x1c0
[   51.590835]  __kasan_check_write+0x18/0x20
[   51.591416]  kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.592287]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.593157]  ? add_taint+0x2e/0xa0
[   51.593724]  kasan_bitops_generic+0xb4/0x130
[   51.594331]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.595089]  ? ktime_get_ts64+0x118/0x140
[   51.595703]  kunit_try_run_case+0x126/0x290
[   51.596356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.597046]  ? __kasan_check_write+0x18/0x20
[   51.597691]  ? trace_preempt_on+0x20/0xa0
[   51.598262]  ? __kthread_parkme+0x4f/0xd0
[   51.598849]  ? preempt_count_sub+0x50/0x80
[   51.599438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.600155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.600977]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.601768]  kthread+0x19e/0x1e0
[   51.602309]  ? __pfx_kthread+0x10/0x10
[   51.602898]  ret_from_fork+0x41/0x70
[   51.603479]  ? __pfx_kthread+0x10/0x10
[   51.604075]  ret_from_fork_asm+0x1b/0x30
[   51.604787]  </TASK>
[   51.605177] 
[   51.605477] Allocated by task 224:
[   51.606021]  kasan_save_stack+0x3c/0x60
[   51.606559]  kasan_set_track+0x29/0x40
[   51.607139]  kasan_save_alloc_info+0x22/0x30
[   51.607846]  __kasan_kmalloc+0xb7/0xc0
[   51.608343]  kmalloc_trace+0x4c/0xb0
[   51.608957]  kasan_bitops_generic+0x8e/0x130
[   51.609488]  kunit_try_run_case+0x126/0x290
[   51.610145]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.610739]  kthread+0x19e/0x1e0
[   51.611309]  ret_from_fork+0x41/0x70
[   51.611890]  ret_from_fork_asm+0x1b/0x30
[   51.612485] 
[   51.612734] The buggy address belongs to the object at ffff8881024ffaa0
[   51.612734]  which belongs to the cache kmalloc-16 of size 16
[   51.613932] The buggy address is located 8 bytes inside of
[   51.613932]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.615223] 
[   51.615504] The buggy address belongs to the physical page:
[   51.616254] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.617396] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.618246] page_type: 0xffffffff()
[   51.619272] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.620023] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.620719] page dumped because: kasan: bad access detected
[   51.621871] 
[   51.622169] Memory state around the buggy address:
[   51.622821]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.623819]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.624536] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.625322]                                   ^
[   51.625805]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.626704]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.627580] ==================================================================

test log snippet test parser 179

Home

[   51.476299] ==================================================================
[   51.477401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.478364] Read of size 8 at addr ffff8881024ffaa8 by task kunit_try_catch/224
[   51.478712] 
[   51.479051] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.480238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.481286] Call Trace:
[   51.481945]  <TASK>
[   51.482431]  dump_stack_lvl+0x4e/0x90
[   51.483233]  print_report+0xd2/0x660
[   51.483903]  ? __virt_addr_valid+0x156/0x1e0
[   51.484536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.485274]  kasan_report+0xff/0x140
[   51.485885]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.486783]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.487688]  kasan_check_range+0x10c/0x1c0
[   51.488490]  __kasan_check_read+0x15/0x20
[   51.489241]  kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.490020]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.490864]  ? add_taint+0x2e/0xa0
[   51.491401]  kasan_bitops_generic+0xb4/0x130
[   51.492182]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.492833]  ? ktime_get_ts64+0x118/0x140
[   51.493508]  kunit_try_run_case+0x126/0x290
[   51.494265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.494940]  ? __kasan_check_write+0x18/0x20
[   51.495529]  ? trace_preempt_on+0x20/0xa0
[   51.496314]  ? __kthread_parkme+0x4f/0xd0
[   51.497094]  ? preempt_count_sub+0x50/0x80
[   51.497661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.498204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.499197]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.500303]  kthread+0x19e/0x1e0
[   51.500774]  ? __pfx_kthread+0x10/0x10
[   51.501370]  ret_from_fork+0x41/0x70
[   51.501877]  ? __pfx_kthread+0x10/0x10
[   51.502371]  ret_from_fork_asm+0x1b/0x30
[   51.503139]  </TASK>
[   51.503454] 
[   51.503665] Allocated by task 224:
[   51.504784]  kasan_save_stack+0x3c/0x60
[   51.505454]  kasan_set_track+0x29/0x40
[   51.505930]  kasan_save_alloc_info+0x22/0x30
[   51.506525]  __kasan_kmalloc+0xb7/0xc0
[   51.506981]  kmalloc_trace+0x4c/0xb0
[   51.507568]  kasan_bitops_generic+0x8e/0x130
[   51.508396]  kunit_try_run_case+0x126/0x290
[   51.509072]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.509705]  kthread+0x19e/0x1e0
[   51.510472]  ret_from_fork+0x41/0x70
[   51.510947]  ret_from_fork_asm+0x1b/0x30
[   51.511558] 
[   51.512203] The buggy address belongs to the object at ffff8881024ffaa0
[   51.512203]  which belongs to the cache kmalloc-16 of size 16
[   51.513634] The buggy address is located 8 bytes inside of
[   51.513634]  allocated 9-byte region [ffff8881024ffaa0, ffff8881024ffaa9)
[   51.514381] 
[   51.514864] The buggy address belongs to the physical page:
[   51.515405] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   51.516932] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.517491] page_type: 0xffffffff()
[   51.518128] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.519130] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.519960] page dumped because: kasan: bad access detected
[   51.520570] 
[   51.520846] Memory state around the buggy address:
[   51.521483]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   51.522414]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.523198] >ffff8881024ffa80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.524035]                                   ^
[   51.524627]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.525495]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.526366] ==================================================================

test log snippet test parser 180

Home

[   46.955734] ==================================================================
[   46.956743] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd0/0x1e0
[   46.957630] Write of size 1 at addr ffff888101d3df00 by task kunit_try_catch/150
[   46.958985] 
[   46.959878] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.961056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.962118] Call Trace:
[   46.962468]  <TASK>
[   46.962878]  dump_stack_lvl+0x4e/0x90
[   46.963446]  print_report+0xd2/0x660
[   46.964092]  ? __virt_addr_valid+0x156/0x1e0
[   46.964673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.965470]  kasan_report+0xff/0x140
[   46.966067]  ? kmalloc_large_oob_right+0xd0/0x1e0
[   46.966696]  ? kmalloc_large_oob_right+0xd0/0x1e0
[   46.967429]  __asan_store1+0x69/0x70
[   46.967975]  kmalloc_large_oob_right+0xd0/0x1e0
[   46.968529]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   46.969342]  ? __schedule+0x70b/0x1190
[   46.970057]  ? ktime_get_ts64+0x118/0x140
[   46.970761]  kunit_try_run_case+0x126/0x290
[   46.971526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.972116]  ? __kasan_check_write+0x18/0x20
[   46.972634]  ? trace_preempt_on+0x20/0xa0
[   46.973400]  ? __kthread_parkme+0x4f/0xd0
[   46.974092]  ? preempt_count_sub+0x50/0x80
[   46.974660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.975235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.976070]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.976865]  kthread+0x19e/0x1e0
[   46.977429]  ? __pfx_kthread+0x10/0x10
[   46.978056]  ret_from_fork+0x41/0x70
[   46.978514]  ? __pfx_kthread+0x10/0x10
[   46.979161]  ret_from_fork_asm+0x1b/0x30
[   46.979732]  </TASK>
[   46.980100] 
[   46.980366] Allocated by task 150:
[   46.980872]  kasan_save_stack+0x3c/0x60
[   46.981413]  kasan_set_track+0x29/0x40
[   46.981908]  kasan_save_alloc_info+0x22/0x30
[   46.982533]  __kasan_kmalloc+0xb7/0xc0
[   46.983109]  kmalloc_trace+0x4c/0xb0
[   46.983662]  kmalloc_large_oob_right+0x9d/0x1e0
[   46.984294]  kunit_try_run_case+0x126/0x290
[   46.984881]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.985447]  kthread+0x19e/0x1e0
[   46.985990]  ret_from_fork+0x41/0x70
[   46.986565]  ret_from_fork_asm+0x1b/0x30
[   46.987186] 
[   46.987485] The buggy address belongs to the object at ffff888101d3c000
[   46.987485]  which belongs to the cache kmalloc-8k of size 8192
[   46.988609] The buggy address is located 0 bytes to the right of
[   46.988609]  allocated 7936-byte region [ffff888101d3c000, ffff888101d3df00)
[   46.989879] 
[   46.990195] The buggy address belongs to the physical page:
[   46.990837] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d38
[   46.991921] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.992681] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   46.993474] page_type: 0xffffffff()
[   46.994054] raw: 0200000000000840 ffff888100042280 dead000000000122 0000000000000000
[   46.994812] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   46.995561] page dumped because: kasan: bad access detected
[   46.996262] 
[   46.996537] Memory state around the buggy address:
[   46.997114]  ffff888101d3de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.997956]  ffff888101d3de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.998581] >ffff888101d3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.999454]                    ^
[   46.999986]  ffff888101d3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.000803]  ffff888101d3e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.002481] ==================================================================

test log snippet test parser 181

Home

[   48.348241] ==================================================================
[   48.349645] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xea/0x1f0
[   48.350513] Read of size 64 at addr ffff888102067504 by task kunit_try_catch/178
[   48.351741] 
[   48.351985] CPU: 1 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.353230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.354275] Call Trace:
[   48.354694]  <TASK>
[   48.355145]  dump_stack_lvl+0x4e/0x90
[   48.355830]  print_report+0xd2/0x660
[   48.356393]  ? __virt_addr_valid+0x156/0x1e0
[   48.357011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.357641]  kasan_report+0xff/0x140
[   48.358318]  ? kmalloc_memmove_invalid_size+0xea/0x1f0
[   48.359092]  ? kmalloc_memmove_invalid_size+0xea/0x1f0
[   48.359874]  kasan_check_range+0x10c/0x1c0
[   48.360566]  __asan_memmove+0x27/0x70
[   48.361136]  kmalloc_memmove_invalid_size+0xea/0x1f0
[   48.361927]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   48.362917]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   48.363740]  ? kunit_try_run_case+0x11b/0x290
[   48.364379]  kunit_try_run_case+0x126/0x290
[   48.365031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.365633]  ? __kasan_check_write+0x18/0x20
[   48.366264]  ? trace_preempt_on+0x20/0xa0
[   48.366923]  ? __kthread_parkme+0x4f/0xd0
[   48.367528]  ? preempt_count_sub+0x50/0x80
[   48.368146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.368810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.369618]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.370369]  kthread+0x19e/0x1e0
[   48.370873]  ? __pfx_kthread+0x10/0x10
[   48.371484]  ret_from_fork+0x41/0x70
[   48.372057]  ? __pfx_kthread+0x10/0x10
[   48.372658]  ret_from_fork_asm+0x1b/0x30
[   48.373357]  </TASK>
[   48.373726] 
[   48.374068] Allocated by task 178:
[   48.374521]  kasan_save_stack+0x3c/0x60
[   48.375078]  kasan_set_track+0x29/0x40
[   48.375664]  kasan_save_alloc_info+0x22/0x30
[   48.376244]  __kasan_kmalloc+0xb7/0xc0
[   48.376846]  kmalloc_trace+0x4c/0xb0
[   48.377353]  kmalloc_memmove_invalid_size+0x9f/0x1f0
[   48.378112]  kunit_try_run_case+0x126/0x290
[   48.378634]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.379489]  kthread+0x19e/0x1e0
[   48.380027]  ret_from_fork+0x41/0x70
[   48.380623]  ret_from_fork_asm+0x1b/0x30
[   48.381287] 
[   48.381543] The buggy address belongs to the object at ffff888102067500
[   48.381543]  which belongs to the cache kmalloc-64 of size 64
[   48.382767] The buggy address is located 4 bytes inside of
[   48.382767]  allocated 64-byte region [ffff888102067500, ffff888102067540)
[   48.384030] 
[   48.384363] The buggy address belongs to the physical page:
[   48.385041] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[   48.385812] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.386539] page_type: 0xffffffff()
[   48.387124] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   48.388022] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   48.388763] page dumped because: kasan: bad access detected
[   48.389356] 
[   48.389645] Memory state around the buggy address:
[   48.390126]  ffff888102067400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.391032]  ffff888102067480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.391903] >ffff888102067500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   48.392576]                                            ^
[   48.393341]  ffff888102067580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.394075]  ffff888102067600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.394812] ==================================================================

test log snippet test parser 182

Home

[   46.692024] ==================================================================
[   46.692986] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1f0
[   46.694233] Read of size 1 at addr ffff888101d4f000 by task kunit_try_catch/138
[   46.695502] 
[   46.696293] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.697238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.698338] Call Trace:
[   46.698682]  <TASK>
[   46.699029]  dump_stack_lvl+0x4e/0x90
[   46.699540]  print_report+0xd2/0x660
[   46.700630]  ? __virt_addr_valid+0x156/0x1e0
[   46.701499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.702430]  kasan_report+0xff/0x140
[   46.702931]  ? kmalloc_node_oob_right+0xd4/0x1f0
[   46.703655]  ? kmalloc_node_oob_right+0xd4/0x1f0
[   46.704289]  __asan_load1+0x66/0x70
[   46.704772]  kmalloc_node_oob_right+0xd4/0x1f0
[   46.706016]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   46.706682]  ? __schedule+0x70b/0x1190
[   46.707394]  ? ktime_get_ts64+0x118/0x140
[   46.707906]  kunit_try_run_case+0x126/0x290
[   46.708563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.709721]  ? __kasan_check_write+0x18/0x20
[   46.710326]  ? trace_preempt_on+0x20/0xa0
[   46.710863]  ? __kthread_parkme+0x4f/0xd0
[   46.711382]  ? preempt_count_sub+0x50/0x80
[   46.711990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.712613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.714036]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.715102]  kthread+0x19e/0x1e0
[   46.715738]  ? __pfx_kthread+0x10/0x10
[   46.716270]  ret_from_fork+0x41/0x70
[   46.717238]  ? __pfx_kthread+0x10/0x10
[   46.718039]  ret_from_fork_asm+0x1b/0x30
[   46.718584]  </TASK>
[   46.719098] 
[   46.719397] Allocated by task 138:
[   46.719914]  kasan_save_stack+0x3c/0x60
[   46.720430]  kasan_set_track+0x29/0x40
[   46.720918]  kasan_save_alloc_info+0x22/0x30
[   46.722267]  __kasan_kmalloc+0xb7/0xc0
[   46.722809]  kmalloc_node_trace+0x49/0xb0
[   46.723395]  kmalloc_node_oob_right+0xa1/0x1f0
[   46.724044]  kunit_try_run_case+0x126/0x290
[   46.724644]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.725462]  kthread+0x19e/0x1e0
[   46.725986]  ret_from_fork+0x41/0x70
[   46.726509]  ret_from_fork_asm+0x1b/0x30
[   46.727321] 
[   46.727560] The buggy address belongs to the object at ffff888101d4e000
[   46.727560]  which belongs to the cache kmalloc-4k of size 4096
[   46.728901] The buggy address is located 0 bytes to the right of
[   46.728901]  allocated 4096-byte region [ffff888101d4e000, ffff888101d4f000)
[   46.730758] 
[   46.731052] The buggy address belongs to the physical page:
[   46.731646] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d48
[   46.733529] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.734673] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   46.735584] page_type: 0xffffffff()
[   46.736260] raw: 0200000000000840 ffff888100042140 dead000000000122 0000000000000000
[   46.736904] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   46.737871] page dumped because: kasan: bad access detected
[   46.738769] 
[   46.739311] Memory state around the buggy address:
[   46.740210]  ffff888101d4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.741156]  ffff888101d4ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.742077] >ffff888101d4f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.742609]                    ^
[   46.743513]  ffff888101d4f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.744459]  ffff888101d4f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.745427] ==================================================================

test log snippet test parser 183

Home

[   47.865167] ==================================================================
[   47.866166] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf3/0x250
[   47.866948] Write of size 16 at addr ffff88810148a960 by task kunit_try_catch/162
[   47.867919] 
[   47.868275] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.869336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.870363] Call Trace:
[   47.870707]  <TASK>
[   47.871057]  dump_stack_lvl+0x4e/0x90
[   47.871657]  print_report+0xd2/0x660
[   47.872174]  ? __virt_addr_valid+0x156/0x1e0
[   47.872858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.873557]  kasan_report+0xff/0x140
[   47.874052]  ? kmalloc_oob_16+0xf3/0x250
[   47.874628]  ? kmalloc_oob_16+0xf3/0x250
[   47.875230]  __asan_store16+0x6c/0xa0
[   47.875832]  kmalloc_oob_16+0xf3/0x250
[   47.876423]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   47.877069]  ? __schedule+0x70b/0x1190
[   47.877527]  ? ktime_get_ts64+0x118/0x140
[   47.878193]  kunit_try_run_case+0x126/0x290
[   47.878858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.879478]  ? __kasan_check_write+0x18/0x20
[   47.880179]  ? trace_preempt_on+0x20/0xa0
[   47.880724]  ? __kthread_parkme+0x4f/0xd0
[   47.881329]  ? preempt_count_sub+0x50/0x80
[   47.881923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.882533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.883239]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.884039]  kthread+0x19e/0x1e0
[   47.884508]  ? __pfx_kthread+0x10/0x10
[   47.885141]  ret_from_fork+0x41/0x70
[   47.885688]  ? __pfx_kthread+0x10/0x10
[   47.886287]  ret_from_fork_asm+0x1b/0x30
[   47.886919]  </TASK>
[   47.887276] 
[   47.887507] Allocated by task 162:
[   47.888023]  kasan_save_stack+0x3c/0x60
[   47.888585]  kasan_set_track+0x29/0x40
[   47.889155]  kasan_save_alloc_info+0x22/0x30
[   47.889835]  __kasan_kmalloc+0xb7/0xc0
[   47.890273]  kmalloc_trace+0x4c/0xb0
[   47.890584]  kmalloc_oob_16+0x8f/0x250
[   47.890924]  kunit_try_run_case+0x126/0x290
[   47.891596]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.892533]  kthread+0x19e/0x1e0
[   47.893191]  ret_from_fork+0x41/0x70
[   47.893883]  ret_from_fork_asm+0x1b/0x30
[   47.894492] 
[   47.895016] The buggy address belongs to the object at ffff88810148a960
[   47.895016]  which belongs to the cache kmalloc-16 of size 16
[   47.896519] The buggy address is located 0 bytes inside of
[   47.896519]  allocated 13-byte region [ffff88810148a960, ffff88810148a96d)
[   47.898072] 
[   47.898293] The buggy address belongs to the physical page:
[   47.899277] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[   47.900432] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.901240] page_type: 0xffffffff()
[   47.901955] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   47.902788] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   47.903755] page dumped because: kasan: bad access detected
[   47.904351] 
[   47.904628] Memory state around the buggy address:
[   47.905591]  ffff88810148a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.906477]  ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[   47.908048] >ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc 00 05 fc fc
[   47.909107]                                                           ^
[   47.909970]  ffff88810148a980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.910870]  ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.911800] ==================================================================

test log snippet test parser 184

Home

[   47.992539] ==================================================================
[   47.993633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xda/0x1e0
[   47.994677] Write of size 128 at addr ffff888102066f00 by task kunit_try_catch/166
[   47.995419] 
[   47.995644] CPU: 1 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.996642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.997851] Call Trace:
[   47.998327]  <TASK>
[   47.998792]  dump_stack_lvl+0x4e/0x90
[   47.999533]  print_report+0xd2/0x660
[   48.000223]  ? __virt_addr_valid+0x156/0x1e0
[   48.001036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.001733]  kasan_report+0xff/0x140
[   48.002520]  ? kmalloc_oob_in_memset+0xda/0x1e0
[   48.003323]  ? kmalloc_oob_in_memset+0xda/0x1e0
[   48.004114]  kasan_check_range+0x10c/0x1c0
[   48.004851]  __asan_memset+0x27/0x50
[   48.005316]  kmalloc_oob_in_memset+0xda/0x1e0
[   48.005601]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   48.006049]  ? __schedule+0x70b/0x1190
[   48.006563]  ? ktime_get_ts64+0x118/0x140
[   48.007154]  kunit_try_run_case+0x126/0x290
[   48.008016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.008745]  ? __kasan_check_write+0x18/0x20
[   48.009426]  ? trace_preempt_on+0x20/0xa0
[   48.009804]  ? __kthread_parkme+0x4f/0xd0
[   48.010201]  ? preempt_count_sub+0x50/0x80
[   48.011008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.011680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.012511]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.013327]  kthread+0x19e/0x1e0
[   48.013763]  ? __pfx_kthread+0x10/0x10
[   48.014371]  ret_from_fork+0x41/0x70
[   48.015063]  ? __pfx_kthread+0x10/0x10
[   48.015641]  ret_from_fork_asm+0x1b/0x30
[   48.016295]  </TASK>
[   48.016652] 
[   48.016920] Allocated by task 166:
[   48.017546]  kasan_save_stack+0x3c/0x60
[   48.018149]  kasan_set_track+0x29/0x40
[   48.018688]  kasan_save_alloc_info+0x22/0x30
[   48.019400]  __kasan_kmalloc+0xb7/0xc0
[   48.019867]  kmalloc_trace+0x4c/0xb0
[   48.020450]  kmalloc_oob_in_memset+0x9f/0x1e0
[   48.021015]  kunit_try_run_case+0x126/0x290
[   48.021587]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.022379]  kthread+0x19e/0x1e0
[   48.022927]  ret_from_fork+0x41/0x70
[   48.023539]  ret_from_fork_asm+0x1b/0x30
[   48.024102] 
[   48.024409] The buggy address belongs to the object at ffff888102066f00
[   48.024409]  which belongs to the cache kmalloc-128 of size 128
[   48.025667] The buggy address is located 0 bytes inside of
[   48.025667]  allocated 120-byte region [ffff888102066f00, ffff888102066f78)
[   48.027100] 
[   48.027413] The buggy address belongs to the physical page:
[   48.028045] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[   48.029086] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.029886] page_type: 0xffffffff()
[   48.030371] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   48.031447] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   48.032517] page dumped because: kasan: bad access detected
[   48.033417] 
[   48.033912] Memory state around the buggy address:
[   48.034560]  ffff888102066e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.035485]  ffff888102066e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.036416] >ffff888102066f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.037367]                                                                 ^
[   48.038282]  ffff888102066f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.039207]  ffff888102067000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   48.040128] ==================================================================

test log snippet test parser 185

Home

[   46.605539] ==================================================================
[   46.606568] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcf/0x1f0
[   46.607253] Read of size 1 at addr ffff8881024ffa5f by task kunit_try_catch/136
[   46.607972] 
[   46.608352] CPU: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.609267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.610142] Call Trace:
[   46.610533]  <TASK>
[   46.610970]  dump_stack_lvl+0x4e/0x90
[   46.612526]  print_report+0xd2/0x660
[   46.613239]  ? __virt_addr_valid+0x156/0x1e0
[   46.613818]  ? kasan_complete_mode_report_info+0x64/0x200
[   46.614435]  kasan_report+0xff/0x140
[   46.614984]  ? kmalloc_oob_left+0xcf/0x1f0
[   46.615837]  ? kmalloc_oob_left+0xcf/0x1f0
[   46.616415]  __asan_load1+0x66/0x70
[   46.617246]  kmalloc_oob_left+0xcf/0x1f0
[   46.618101]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   46.618622]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   46.619499]  ? kunit_try_run_case+0x11b/0x290
[   46.620119]  kunit_try_run_case+0x126/0x290
[   46.620695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.621245]  ? __kasan_check_write+0x18/0x20
[   46.621906]  ? trace_preempt_on+0x20/0xa0
[   46.622706]  ? __kthread_parkme+0x4f/0xd0
[   46.623668]  ? preempt_count_sub+0x50/0x80
[   46.624313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.625084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.625968]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.626615]  kthread+0x19e/0x1e0
[   46.627170]  ? __pfx_kthread+0x10/0x10
[   46.627677]  ret_from_fork+0x41/0x70
[   46.628256]  ? __pfx_kthread+0x10/0x10
[   46.628690]  ret_from_fork_asm+0x1b/0x30
[   46.629390]  </TASK>
[   46.629670] 
[   46.630041] Allocated by task 1:
[   46.630443]  kasan_save_stack+0x3c/0x60
[   46.631698]  kasan_set_track+0x29/0x40
[   46.632351]  kasan_save_alloc_info+0x22/0x30
[   46.633307]  __kasan_kmalloc+0xb7/0xc0
[   46.634036]  __kmalloc_node_track_caller+0x69/0x170
[   46.634656]  kvasprintf+0xc6/0x150
[   46.635635]  __kthread_create_on_node+0x128/0x260
[   46.636476]  kthread_create_on_node+0xa8/0xe0
[   46.637269]  cryptomgr_notify+0x406/0x450
[   46.637882]  notifier_call_chain+0x83/0x150
[   46.638471]  blocking_notifier_call_chain+0x55/0x80
[   46.639286]  crypto_alg_mod_lookup+0x15f/0x2a0
[   46.639954]  crypto_alloc_tfm_node+0x6e/0x120
[   46.640793]  crypto_alloc_sig+0x23/0x30
[   46.641552]  public_key_verify_signature+0x18c/0x3c0
[   46.642379]  x509_check_for_self_signed+0x16c/0x1e0
[   46.643237]  x509_cert_parse+0x319/0x380
[   46.643825]  x509_key_preparse+0x42/0x3b0
[   46.644394]  asymmetric_key_preparse+0x74/0xf0
[   46.645546]  __key_create_or_update+0x332/0x7b0
[   46.646137]  key_create_or_update+0x17/0x20
[   46.646790]  x509_load_certificate_list+0xe6/0x140
[   46.647597]  regulatory_init_db+0xb7/0x1d0
[   46.648343]  do_one_initcall+0xb3/0x340
[   46.648884]  kernel_init_freeable+0x2ae/0x470
[   46.649610]  kernel_init+0x23/0x1e0
[   46.650582]  ret_from_fork+0x41/0x70
[   46.651195]  ret_from_fork_asm+0x1b/0x30
[   46.652076] 
[   46.652533] Freed by task 0:
[   46.653178]  kasan_save_stack+0x3c/0x60
[   46.653749]  kasan_set_track+0x29/0x40
[   46.654269]  kasan_save_free_info+0x2f/0x50
[   46.655100]  ____kasan_slab_free+0x172/0x1d0
[   46.655692]  __kasan_slab_free+0x16/0x20
[   46.656698]  __kmem_cache_free+0x190/0x310
[   46.657688]  kfree+0x7c/0x120
[   46.658233]  free_kthread_struct+0x78/0xa0
[   46.658738]  free_task+0x96/0xa0
[   46.659444]  __put_task_struct+0x1a2/0x1f0
[   46.660333]  delayed_put_task_struct+0xec/0x110
[   46.661199]  rcu_core+0x4be/0x1020
[   46.662173]  rcu_core_si+0x12/0x20
[   46.662604]  handle_softirqs+0x195/0x520
[   46.663443]  irq_exit_rcu+0x92/0xb0
[   46.664107]  sysvec_apic_timer_interrupt+0x80/0xa0
[   46.664956]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   46.665491] 
[   46.665708] The buggy address belongs to the object at ffff8881024ffa40
[   46.665708]  which belongs to the cache kmalloc-16 of size 16
[   46.667333] The buggy address is located 15 bytes to the right of
[   46.667333]  allocated 16-byte region [ffff8881024ffa40, ffff8881024ffa50)
[   46.668705] 
[   46.669151] The buggy address belongs to the physical page:
[   46.669865] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   46.671109] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.671989] page_type: 0xffffffff()
[   46.672699] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   46.673980] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   46.675043] page dumped because: kasan: bad access detected
[   46.676198] 
[   46.676461] Memory state around the buggy address:
[   46.676841]  ffff8881024ff900: 00 02 fc fc 00 03 fc fc 00 02 fc fc 00 05 fc fc
[   46.677935]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   46.678707] >ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   46.679269]                                                     ^
[   46.680048]  ffff8881024ffa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.681310]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.682324] ==================================================================

test log snippet test parser 186

Home

[   48.228662] ==================================================================
[   48.229982] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[   48.230901] Write of size 16 at addr ffff888102069369 by task kunit_try_catch/174
[   48.231817] 
[   48.232142] CPU: 1 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.233199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.234358] Call Trace:
[   48.234793]  <TASK>
[   48.235246]  dump_stack_lvl+0x4e/0x90
[   48.235966]  print_report+0xd2/0x660
[   48.236621]  ? __virt_addr_valid+0x156/0x1e0
[   48.237328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.238087]  kasan_report+0xff/0x140
[   48.238632]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   48.239402]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   48.240160]  kasan_check_range+0x10c/0x1c0
[   48.241109]  __asan_memset+0x27/0x50
[   48.241636]  kmalloc_oob_memset_16+0xdd/0x1e0
[   48.242204]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   48.242930]  ? __schedule+0x70b/0x1190
[   48.243735]  ? ktime_get_ts64+0x118/0x140
[   48.244416]  kunit_try_run_case+0x126/0x290
[   48.245377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.246091]  ? __kasan_check_write+0x18/0x20
[   48.246874]  ? trace_preempt_on+0x20/0xa0
[   48.247614]  ? __kthread_parkme+0x4f/0xd0
[   48.248257]  ? preempt_count_sub+0x50/0x80
[   48.248773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.249731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.250571]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.251392]  kthread+0x19e/0x1e0
[   48.251943]  ? __pfx_kthread+0x10/0x10
[   48.252694]  ret_from_fork+0x41/0x70
[   48.253520]  ? __pfx_kthread+0x10/0x10
[   48.254244]  ret_from_fork_asm+0x1b/0x30
[   48.255016]  </TASK>
[   48.255530] 
[   48.255976] Allocated by task 174:
[   48.256585]  kasan_save_stack+0x3c/0x60
[   48.257312]  kasan_set_track+0x29/0x40
[   48.257792]  kasan_save_alloc_info+0x22/0x30
[   48.258342]  __kasan_kmalloc+0xb7/0xc0
[   48.259276]  kmalloc_trace+0x4c/0xb0
[   48.259730]  kmalloc_oob_memset_16+0x9f/0x1e0
[   48.260262]  kunit_try_run_case+0x126/0x290
[   48.260889]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.261625]  kthread+0x19e/0x1e0
[   48.262207]  ret_from_fork+0x41/0x70
[   48.262724]  ret_from_fork_asm+0x1b/0x30
[   48.263693] 
[   48.264016] The buggy address belongs to the object at ffff888102069300
[   48.264016]  which belongs to the cache kmalloc-128 of size 128
[   48.265550] The buggy address is located 105 bytes inside of
[   48.265550]  allocated 120-byte region [ffff888102069300, ffff888102069378)
[   48.266706] 
[   48.267027] The buggy address belongs to the physical page:
[   48.267530] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[   48.268532] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.269291] page_type: 0xffffffff()
[   48.269802] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   48.270650] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   48.271479] page dumped because: kasan: bad access detected
[   48.272090] 
[   48.272426] Memory state around the buggy address:
[   48.273088]  ffff888102069200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.273808]  ffff888102069280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.274673] >ffff888102069300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.275489]                                                                 ^
[   48.276299]  ffff888102069380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.277135]  ffff888102069400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.277909] ==================================================================
---
[   48.170440] ==================================================================
[   48.171660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[   48.172556] Write of size 8 at addr ffff888102069271 by task kunit_try_catch/172
[   48.173293] 
[   48.173600] CPU: 1 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.174543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.175281] Call Trace:
[   48.175852]  <TASK>
[   48.176266]  dump_stack_lvl+0x4e/0x90
[   48.176920]  print_report+0xd2/0x660
[   48.177510]  ? __virt_addr_valid+0x156/0x1e0
[   48.178237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.179079]  kasan_report+0xff/0x140
[   48.179824]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   48.180598]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   48.181428]  kasan_check_range+0x10c/0x1c0
[   48.182181]  __asan_memset+0x27/0x50
[   48.182857]  kmalloc_oob_memset_8+0xdd/0x1e0
[   48.183646]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   48.184288]  ? __schedule+0x70b/0x1190
[   48.185080]  ? ktime_get_ts64+0x118/0x140
[   48.185826]  kunit_try_run_case+0x126/0x290
[   48.186444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.187288]  ? __kasan_check_write+0x18/0x20
[   48.188048]  ? trace_preempt_on+0x20/0xa0
[   48.188785]  ? __kthread_parkme+0x4f/0xd0
[   48.189353]  ? preempt_count_sub+0x50/0x80
[   48.190206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.190981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.191880]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.192605]  kthread+0x19e/0x1e0
[   48.193342]  ? __pfx_kthread+0x10/0x10
[   48.193974]  ret_from_fork+0x41/0x70
[   48.194490]  ? __pfx_kthread+0x10/0x10
[   48.195190]  ret_from_fork_asm+0x1b/0x30
[   48.195938]  </TASK>
[   48.196333] 
[   48.196497] Allocated by task 172:
[   48.196696]  kasan_save_stack+0x3c/0x60
[   48.197200]  kasan_set_track+0x29/0x40
[   48.197842]  kasan_save_alloc_info+0x22/0x30
[   48.198710]  __kasan_kmalloc+0xb7/0xc0
[   48.199390]  kmalloc_trace+0x4c/0xb0
[   48.199977]  kmalloc_oob_memset_8+0x9f/0x1e0
[   48.200605]  kunit_try_run_case+0x126/0x290
[   48.201280]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.202123]  kthread+0x19e/0x1e0
[   48.202668]  ret_from_fork+0x41/0x70
[   48.203438]  ret_from_fork_asm+0x1b/0x30
[   48.204091] 
[   48.204316] The buggy address belongs to the object at ffff888102069200
[   48.204316]  which belongs to the cache kmalloc-128 of size 128
[   48.206060] The buggy address is located 113 bytes inside of
[   48.206060]  allocated 120-byte region [ffff888102069200, ffff888102069278)
[   48.207319] 
[   48.207545] The buggy address belongs to the physical page:
[   48.208597] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[   48.209388] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.210141] page_type: 0xffffffff()
[   48.210583] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   48.211588] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   48.212381] page dumped because: kasan: bad access detected
[   48.213134] 
[   48.213348] Memory state around the buggy address:
[   48.214477]  ffff888102069100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.215096]  ffff888102069180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.215844] >ffff888102069200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.216588]                                                                 ^
[   48.217647]  ffff888102069280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.218143]  ffff888102069300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.218606] ==================================================================
---
[   48.113533] ==================================================================
[   48.114623] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[   48.115602] Write of size 4 at addr ffff888102069175 by task kunit_try_catch/170
[   48.116533] 
[   48.117040] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.117836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.118733] Call Trace:
[   48.119188]  <TASK>
[   48.119629]  dump_stack_lvl+0x4e/0x90
[   48.120443]  print_report+0xd2/0x660
[   48.121086]  ? __virt_addr_valid+0x156/0x1e0
[   48.121705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.122529]  kasan_report+0xff/0x140
[   48.123163]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   48.123688]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   48.124452]  kasan_check_range+0x10c/0x1c0
[   48.125128]  __asan_memset+0x27/0x50
[   48.125715]  kmalloc_oob_memset_4+0xdd/0x1e0
[   48.126379]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   48.127076]  ? __schedule+0x70b/0x1190
[   48.127639]  ? ktime_get_ts64+0x118/0x140
[   48.128325]  kunit_try_run_case+0x126/0x290
[   48.129040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.129663]  ? __kasan_check_write+0x18/0x20
[   48.130380]  ? trace_preempt_on+0x20/0xa0
[   48.131016]  ? __kthread_parkme+0x4f/0xd0
[   48.131597]  ? preempt_count_sub+0x50/0x80
[   48.132238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.132907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.133682]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.134466]  kthread+0x19e/0x1e0
[   48.135045]  ? __pfx_kthread+0x10/0x10
[   48.135630]  ret_from_fork+0x41/0x70
[   48.136267]  ? __pfx_kthread+0x10/0x10
[   48.136865]  ret_from_fork_asm+0x1b/0x30
[   48.137498]  </TASK>
[   48.137933] 
[   48.138258] Allocated by task 170:
[   48.138791]  kasan_save_stack+0x3c/0x60
[   48.139418]  kasan_set_track+0x29/0x40
[   48.140055]  kasan_save_alloc_info+0x22/0x30
[   48.140682]  __kasan_kmalloc+0xb7/0xc0
[   48.141314]  kmalloc_trace+0x4c/0xb0
[   48.141885]  kmalloc_oob_memset_4+0x9f/0x1e0
[   48.142550]  kunit_try_run_case+0x126/0x290
[   48.143165]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.143952]  kthread+0x19e/0x1e0
[   48.144435]  ret_from_fork+0x41/0x70
[   48.145083]  ret_from_fork_asm+0x1b/0x30
[   48.145675] 
[   48.146043] The buggy address belongs to the object at ffff888102069100
[   48.146043]  which belongs to the cache kmalloc-128 of size 128
[   48.147293] The buggy address is located 117 bytes inside of
[   48.147293]  allocated 120-byte region [ffff888102069100, ffff888102069178)
[   48.148504] 
[   48.148868] The buggy address belongs to the physical page:
[   48.149619] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[   48.150625] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.151383] page_type: 0xffffffff()
[   48.151894] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   48.152691] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   48.153666] page dumped because: kasan: bad access detected
[   48.154330] 
[   48.154648] Memory state around the buggy address:
[   48.155229]  ffff888102069000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.156028]  ffff888102069080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.156860] >ffff888102069100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.157676]                                                                 ^
[   48.158463]  ffff888102069180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.159303]  ffff888102069200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.160108] ==================================================================

test log snippet test parser 187

Home

[   48.050182] ==================================================================
[   48.051701] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[   48.052492] Write of size 2 at addr ffff888102069077 by task kunit_try_catch/168
[   48.053145] 
[   48.053464] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.054584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.055632] Call Trace:
[   48.056231]  <TASK>
[   48.056598]  dump_stack_lvl+0x4e/0x90
[   48.057553]  print_report+0xd2/0x660
[   48.058340]  ? __virt_addr_valid+0x156/0x1e0
[   48.059032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.059957]  kasan_report+0xff/0x140
[   48.060496]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   48.061281]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   48.062401]  kasan_check_range+0x10c/0x1c0
[   48.062933]  __asan_memset+0x27/0x50
[   48.063405]  kmalloc_oob_memset_2+0xdd/0x1e0
[   48.064191]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   48.064968]  ? __schedule+0x70b/0x1190
[   48.065552]  ? ktime_get_ts64+0x118/0x140
[   48.066289]  kunit_try_run_case+0x126/0x290
[   48.067051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.067683]  ? __kasan_check_write+0x18/0x20
[   48.068847]  ? trace_preempt_on+0x20/0xa0
[   48.069526]  ? __kthread_parkme+0x4f/0xd0
[   48.070115]  ? preempt_count_sub+0x50/0x80
[   48.070666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.071380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.072382]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.073249]  kthread+0x19e/0x1e0
[   48.073802]  ? __pfx_kthread+0x10/0x10
[   48.074935]  ret_from_fork+0x41/0x70
[   48.075590]  ? __pfx_kthread+0x10/0x10
[   48.076253]  ret_from_fork_asm+0x1b/0x30
[   48.076849]  </TASK>
[   48.077209] 
[   48.077440] Allocated by task 168:
[   48.077897]  kasan_save_stack+0x3c/0x60
[   48.078524]  kasan_set_track+0x29/0x40
[   48.079283]  kasan_save_alloc_info+0x22/0x30
[   48.079987]  __kasan_kmalloc+0xb7/0xc0
[   48.080522]  kmalloc_trace+0x4c/0xb0
[   48.081642]  kmalloc_oob_memset_2+0x9f/0x1e0
[   48.082168]  kunit_try_run_case+0x126/0x290
[   48.083140]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.084023]  kthread+0x19e/0x1e0
[   48.084512]  ret_from_fork+0x41/0x70
[   48.085245]  ret_from_fork_asm+0x1b/0x30
[   48.085737] 
[   48.086668] The buggy address belongs to the object at ffff888102069000
[   48.086668]  which belongs to the cache kmalloc-128 of size 128
[   48.087733] The buggy address is located 119 bytes inside of
[   48.087733]  allocated 120-byte region [ffff888102069000, ffff888102069078)
[   48.089287] 
[   48.089582] The buggy address belongs to the physical page:
[   48.090267] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102069
[   48.091410] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.092085] page_type: 0xffffffff()
[   48.092628] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   48.093489] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   48.094803] page dumped because: kasan: bad access detected
[   48.095647] 
[   48.096126] Memory state around the buggy address:
[   48.096742]  ffff888102068f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.097713]  ffff888102068f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.098728] >ffff888102069000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.099816]                                                                 ^
[   48.100987]  ffff888102069080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.102046]  ffff888102069100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.103238] ==================================================================

test log snippet test parser 188

Home

[   46.457061] ==================================================================
[   46.458429] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcf/0x330
[   46.459662] Write of size 1 at addr ffff888102066973 by task kunit_try_catch/134
[   46.460453] 
[   46.461542] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G                 N 6.6.72-rc1 #1
[   46.462644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.464112] Call Trace:
[   46.464630]  <TASK>
[   46.465323]  dump_stack_lvl+0x4e/0x90
[   46.465985]  print_report+0xd2/0x660
[   46.466457]  ? __virt_addr_valid+0x156/0x1e0
[   46.467101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.467916]  kasan_report+0xff/0x140
[   46.468363]  ? kmalloc_oob_right+0xcf/0x330
[   46.468873]  ? kmalloc_oob_right+0xcf/0x330
[   46.469522]  __asan_store1+0x69/0x70
[   46.469914]  kmalloc_oob_right+0xcf/0x330
[   46.470421]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   46.471048]  ? __schedule+0x70b/0x1190
[   46.471554]  ? ktime_get_ts64+0x118/0x140
[   46.472191]  kunit_try_run_case+0x126/0x290
[   46.472859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.473524]  ? __kasan_check_write+0x18/0x20
[   46.474190]  ? trace_preempt_on+0x20/0xa0
[   46.474802]  ? __kthread_parkme+0x4f/0xd0
[   46.475415]  ? preempt_count_sub+0x50/0x80
[   46.476081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.476672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.477582]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.478369]  kthread+0x19e/0x1e0
[   46.478878]  ? __pfx_kthread+0x10/0x10
[   46.479309]  ret_from_fork+0x41/0x70
[   46.479793]  ? __pfx_kthread+0x10/0x10
[   46.480455]  ret_from_fork_asm+0x1b/0x30
[   46.481257]  </TASK>
[   46.481868] 
[   46.482282] Allocated by task 134:
[   46.482912]  kasan_save_stack+0x3c/0x60
[   46.483545]  kasan_set_track+0x29/0x40
[   46.483957]  kasan_save_alloc_info+0x22/0x30
[   46.484695]  __kasan_kmalloc+0xb7/0xc0
[   46.485205]  kmalloc_trace+0x4c/0xb0
[   46.485827]  kmalloc_oob_right+0x9f/0x330
[   46.486389]  kunit_try_run_case+0x126/0x290
[   46.487029]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.487721]  kthread+0x19e/0x1e0
[   46.488243]  ret_from_fork+0x41/0x70
[   46.489049]  ret_from_fork_asm+0x1b/0x30
[   46.489625] 
[   46.490297] The buggy address belongs to the object at ffff888102066900
[   46.490297]  which belongs to the cache kmalloc-128 of size 128
[   46.491673] The buggy address is located 0 bytes to the right of
[   46.491673]  allocated 115-byte region [ffff888102066900, ffff888102066973)
[   46.493081] 
[   46.493605] The buggy address belongs to the physical page:
[   46.494541] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[   46.495623] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.496854] page_type: 0xffffffff()
[   46.498148] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   46.498935] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.499533] page dumped because: kasan: bad access detected
[   46.499899] 
[   46.500269] Memory state around the buggy address:
[   46.501386]  ffff888102066800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.502104]  ffff888102066880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.502777] >ffff888102066900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.503495]                                                              ^
[   46.504295]  ffff888102066980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.505192]  ffff888102066a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.506014] ==================================================================

test log snippet test parser 189

Home

[   46.553117] ==================================================================
[   46.553808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x144/0x330
[   46.554636] Read of size 1 at addr ffff888102066980 by task kunit_try_catch/134
[   46.555518] 
[   46.555851] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.556662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.557574] Call Trace:
[   46.557957]  <TASK>
[   46.558320]  dump_stack_lvl+0x4e/0x90
[   46.558966]  print_report+0xd2/0x660
[   46.559520]  ? __virt_addr_valid+0x156/0x1e0
[   46.560229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.560908]  kasan_report+0xff/0x140
[   46.561467]  ? kmalloc_oob_right+0x144/0x330
[   46.562006]  ? kmalloc_oob_right+0x144/0x330
[   46.562638]  __asan_load1+0x66/0x70
[   46.563271]  kmalloc_oob_right+0x144/0x330
[   46.563816]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   46.564493]  ? __schedule+0x70b/0x1190
[   46.565121]  ? ktime_get_ts64+0x118/0x140
[   46.565637]  kunit_try_run_case+0x126/0x290
[   46.566327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.567051]  ? __kasan_check_write+0x18/0x20
[   46.567610]  ? trace_preempt_on+0x20/0xa0
[   46.568155]  ? __kthread_parkme+0x4f/0xd0
[   46.568800]  ? preempt_count_sub+0x50/0x80
[   46.569433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.570126]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.570822]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.571591]  kthread+0x19e/0x1e0
[   46.572156]  ? __pfx_kthread+0x10/0x10
[   46.572715]  ret_from_fork+0x41/0x70
[   46.573390]  ? __pfx_kthread+0x10/0x10
[   46.574019]  ret_from_fork_asm+0x1b/0x30
[   46.574591]  </TASK>
[   46.574930] 
[   46.575229] Allocated by task 134:
[   46.575648]  kasan_save_stack+0x3c/0x60
[   46.576146]  kasan_set_track+0x29/0x40
[   46.576690]  kasan_save_alloc_info+0x22/0x30
[   46.577362]  __kasan_kmalloc+0xb7/0xc0
[   46.577897]  kmalloc_trace+0x4c/0xb0
[   46.578340]  kmalloc_oob_right+0x9f/0x330
[   46.578961]  kunit_try_run_case+0x126/0x290
[   46.579495]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.580298]  kthread+0x19e/0x1e0
[   46.580851]  ret_from_fork+0x41/0x70
[   46.581426]  ret_from_fork_asm+0x1b/0x30
[   46.581978] 
[   46.582284] The buggy address belongs to the object at ffff888102066900
[   46.582284]  which belongs to the cache kmalloc-128 of size 128
[   46.583487] The buggy address is located 13 bytes to the right of
[   46.583487]  allocated 115-byte region [ffff888102066900, ffff888102066973)
[   46.584734] 
[   46.585032] The buggy address belongs to the physical page:
[   46.585682] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[   46.586554] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.587262] page_type: 0xffffffff()
[   46.587831] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   46.588660] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.589468] page dumped because: kasan: bad access detected
[   46.590123] 
[   46.590411] Memory state around the buggy address:
[   46.590949]  ffff888102066880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.591682]  ffff888102066900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.592480] >ffff888102066980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.593270]                    ^
[   46.593624]  ffff888102066a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.594489]  ffff888102066a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.595226] ==================================================================

test log snippet test parser 190

Home

[   46.508543] ==================================================================
[   46.509426] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x330
[   46.510333] Write of size 1 at addr ffff888102066978 by task kunit_try_catch/134
[   46.511277] 
[   46.511633] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.512640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.513850] Call Trace:
[   46.514289]  <TASK>
[   46.514647]  dump_stack_lvl+0x4e/0x90
[   46.515359]  print_report+0xd2/0x660
[   46.515986]  ? __virt_addr_valid+0x156/0x1e0
[   46.516644]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.517171]  kasan_report+0xff/0x140
[   46.517684]  ? kmalloc_oob_right+0x108/0x330
[   46.518327]  ? kmalloc_oob_right+0x108/0x330
[   46.518869]  __asan_store1+0x69/0x70
[   46.519438]  kmalloc_oob_right+0x108/0x330
[   46.519946]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   46.520628]  ? __schedule+0x70b/0x1190
[   46.521258]  ? ktime_get_ts64+0x118/0x140
[   46.521740]  kunit_try_run_case+0x126/0x290
[   46.522432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.523195]  ? __kasan_check_write+0x18/0x20
[   46.523806]  ? trace_preempt_on+0x20/0xa0
[   46.524354]  ? __kthread_parkme+0x4f/0xd0
[   46.524903]  ? preempt_count_sub+0x50/0x80
[   46.525512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.526143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.526859]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.527610]  kthread+0x19e/0x1e0
[   46.528190]  ? __pfx_kthread+0x10/0x10
[   46.528800]  ret_from_fork+0x41/0x70
[   46.529334]  ? __pfx_kthread+0x10/0x10
[   46.529869]  ret_from_fork_asm+0x1b/0x30
[   46.530486]  </TASK>
[   46.530881] 
[   46.531182] Allocated by task 134:
[   46.531595]  kasan_save_stack+0x3c/0x60
[   46.532074]  kasan_set_track+0x29/0x40
[   46.532616]  kasan_save_alloc_info+0x22/0x30
[   46.533238]  __kasan_kmalloc+0xb7/0xc0
[   46.533807]  kmalloc_trace+0x4c/0xb0
[   46.534378]  kmalloc_oob_right+0x9f/0x330
[   46.534912]  kunit_try_run_case+0x126/0x290
[   46.535533]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.536299]  kthread+0x19e/0x1e0
[   46.536734]  ret_from_fork+0x41/0x70
[   46.537353]  ret_from_fork_asm+0x1b/0x30
[   46.537968] 
[   46.538272] The buggy address belongs to the object at ffff888102066900
[   46.538272]  which belongs to the cache kmalloc-128 of size 128
[   46.539276] The buggy address is located 5 bytes to the right of
[   46.539276]  allocated 115-byte region [ffff888102066900, ffff888102066973)
[   46.540654] 
[   46.541006] The buggy address belongs to the physical page:
[   46.541477] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102066
[   46.542544] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.543218] page_type: 0xffffffff()
[   46.543804] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   46.544750] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.545489] page dumped because: kasan: bad access detected
[   46.546184] 
[   46.546476] Memory state around the buggy address:
[   46.546978]  ffff888102066800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.547850]  ffff888102066880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.548597] >ffff888102066900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.549432]                                                                 ^
[   46.550169]  ffff888102066980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.551010]  ffff888102066a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.551733] ==================================================================

test log snippet test parser 191

Home

[   46.753642] ==================================================================
[   46.754722] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xab/0x1c0
[   46.755562] Write of size 1 at addr ffff8881028d600a by task kunit_try_catch/140
[   46.756502] 
[   46.756835] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.758313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.759263] Call Trace:
[   46.759830]  <TASK>
[   46.760353]  dump_stack_lvl+0x4e/0x90
[   46.761143]  print_report+0xd2/0x660
[   46.761720]  ? __virt_addr_valid+0x156/0x1e0
[   46.762258]  ? kasan_addr_to_slab+0x11/0xb0
[   46.762969]  kasan_report+0xff/0x140
[   46.763602]  ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[   46.764195]  ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[   46.764791]  __asan_store1+0x69/0x70
[   46.765353]  kmalloc_pagealloc_oob_right+0xab/0x1c0
[   46.766073]  ? __pfx_kmalloc_pagealloc_oob_right+0x10/0x10
[   46.766692]  ? __schedule+0x70b/0x1190
[   46.767256]  ? ktime_get_ts64+0x118/0x140
[   46.767877]  kunit_try_run_case+0x126/0x290
[   46.768530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.769152]  ? __kasan_check_write+0x18/0x20
[   46.769828]  ? trace_preempt_on+0x20/0xa0
[   46.770344]  ? __kthread_parkme+0x4f/0xd0
[   46.770987]  ? preempt_count_sub+0x50/0x80
[   46.771571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.772206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.773100]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.773711]  kthread+0x19e/0x1e0
[   46.774314]  ? __pfx_kthread+0x10/0x10
[   46.774861]  ret_from_fork+0x41/0x70
[   46.775402]  ? __pfx_kthread+0x10/0x10
[   46.776030]  ret_from_fork_asm+0x1b/0x30
[   46.776527]  </TASK>
[   46.776935] 
[   46.777290] The buggy address belongs to the physical page:
[   46.778148] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d4
[   46.779090] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.779866] flags: 0x200000000000040(head|node=0|zone=2)
[   46.780399] page_type: 0xffffffff()
[   46.780943] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   46.781715] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.782451] page dumped because: kasan: bad access detected
[   46.783152] 
[   46.783383] Memory state around the buggy address:
[   46.784023]  ffff8881028d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.784667]  ffff8881028d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.785536] >ffff8881028d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.786283]                       ^
[   46.786739]  ffff8881028d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.787615]  ffff8881028d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.788370] ==================================================================

test log snippet test parser 192

Home

[   48.643643] ==================================================================
[   48.645053] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xdd/0x260
[   48.646055] Read of size 1 at addr ffff88810284b0c8 by task kunit_try_catch/192
[   48.646899] 
[   48.647298] CPU: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.648422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.649729] Call Trace:
[   48.650298]  <TASK>
[   48.651073]  dump_stack_lvl+0x4e/0x90
[   48.652185]  print_report+0xd2/0x660
[   48.652731]  ? __virt_addr_valid+0x156/0x1e0
[   48.653666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.654352]  kasan_report+0xff/0x140
[   48.655595]  ? kmem_cache_oob+0xdd/0x260
[   48.656127]  ? kmem_cache_oob+0xdd/0x260
[   48.656811]  __asan_load1+0x66/0x70
[   48.657520]  kmem_cache_oob+0xdd/0x260
[   48.658043]  ? __pfx_kmem_cache_oob+0x10/0x10
[   48.658645]  ? __schedule+0x70b/0x1190
[   48.659457]  ? ktime_get_ts64+0x118/0x140
[   48.660453]  kunit_try_run_case+0x126/0x290
[   48.661376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.662055]  ? __kasan_check_write+0x18/0x20
[   48.662605]  ? trace_preempt_on+0x20/0xa0
[   48.663179]  ? __kthread_parkme+0x4f/0xd0
[   48.664043]  ? preempt_count_sub+0x50/0x80
[   48.664609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.665592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.666483]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.667401]  kthread+0x19e/0x1e0
[   48.667911]  ? __pfx_kthread+0x10/0x10
[   48.668525]  ret_from_fork+0x41/0x70
[   48.669085]  ? __pfx_kthread+0x10/0x10
[   48.669609]  ret_from_fork_asm+0x1b/0x30
[   48.671085]  </TASK>
[   48.671389] 
[   48.671683] Allocated by task 192:
[   48.672362]  kasan_save_stack+0x3c/0x60
[   48.672848]  kasan_set_track+0x29/0x40
[   48.673580]  kasan_save_alloc_info+0x22/0x30
[   48.674856]  __kasan_slab_alloc+0x91/0xa0
[   48.675425]  kmem_cache_alloc+0x180/0x3b0
[   48.675940]  kmem_cache_oob+0xb6/0x260
[   48.676527]  kunit_try_run_case+0x126/0x290
[   48.677321]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.678520]  kthread+0x19e/0x1e0
[   48.678859]  ret_from_fork+0x41/0x70
[   48.679428]  ret_from_fork_asm+0x1b/0x30
[   48.680194] 
[   48.680490] The buggy address belongs to the object at ffff88810284b000
[   48.680490]  which belongs to the cache test_cache of size 200
[   48.681695] The buggy address is located 0 bytes to the right of
[   48.681695]  allocated 200-byte region [ffff88810284b000, ffff88810284b0c8)
[   48.683639] 
[   48.684137] The buggy address belongs to the physical page:
[   48.684672] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284b
[   48.685809] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.686417] page_type: 0xffffffff()
[   48.687412] raw: 0200000000000800 ffff888101ba1b40 dead000000000122 0000000000000000
[   48.688579] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   48.689536] page dumped because: kasan: bad access detected
[   48.690196] 
[   48.690490] Memory state around the buggy address:
[   48.690984]  ffff88810284af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.692564]  ffff88810284b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.693455] >ffff88810284b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   48.694628]                                               ^
[   48.696146]  ffff88810284b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.697106]  ffff88810284b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.698239] ==================================================================

test log snippet test parser 193

Home

[   47.120683] ==================================================================
[   47.121679] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[   47.122581] Write of size 1 at addr ffff888100977ec9 by task kunit_try_catch/154
[   47.123774] 
[   47.124153] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.124910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.125794] Call Trace:
[   47.126215]  <TASK>
[   47.126524]  dump_stack_lvl+0x4e/0x90
[   47.127292]  print_report+0xd2/0x660
[   47.127856]  ? __virt_addr_valid+0x156/0x1e0
[   47.128520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.129226]  kasan_report+0xff/0x140
[   47.129693]  ? krealloc_less_oob_helper+0x146/0x660
[   47.130391]  ? krealloc_less_oob_helper+0x146/0x660
[   47.131112]  __asan_store1+0x69/0x70
[   47.131687]  krealloc_less_oob_helper+0x146/0x660
[   47.132550]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.133337]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.134130]  ? __schedule+0x70b/0x1190
[   47.134626]  ? ktime_get_ts64+0x118/0x140
[   47.135173]  krealloc_less_oob+0x1c/0x30
[   47.135677]  kunit_try_run_case+0x126/0x290
[   47.136565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.137364]  ? __kasan_check_write+0x18/0x20
[   47.138310]  ? trace_preempt_on+0x20/0xa0
[   47.139097]  ? __kthread_parkme+0x4f/0xd0
[   47.139578]  ? preempt_count_sub+0x50/0x80
[   47.140143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.140813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.141621]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.142308]  kthread+0x19e/0x1e0
[   47.142857]  ? __pfx_kthread+0x10/0x10
[   47.143342]  ret_from_fork+0x41/0x70
[   47.143930]  ? __pfx_kthread+0x10/0x10
[   47.144494]  ret_from_fork_asm+0x1b/0x30
[   47.145161]  </TASK>
[   47.145469] 
[   47.145759] Allocated by task 154:
[   47.146236]  kasan_save_stack+0x3c/0x60
[   47.146763]  kasan_set_track+0x29/0x40
[   47.147347]  kasan_save_alloc_info+0x22/0x30
[   47.147987]  __kasan_krealloc+0x12f/0x180
[   47.148506]  krealloc+0xc1/0x140
[   47.149218]  krealloc_less_oob_helper+0xe5/0x660
[   47.149758]  krealloc_less_oob+0x1c/0x30
[   47.150339]  kunit_try_run_case+0x126/0x290
[   47.151443]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.152018]  kthread+0x19e/0x1e0
[   47.152678]  ret_from_fork+0x41/0x70
[   47.153393]  ret_from_fork_asm+0x1b/0x30
[   47.154142] 
[   47.154405] The buggy address belongs to the object at ffff888100977e00
[   47.154405]  which belongs to the cache kmalloc-256 of size 256
[   47.155571] The buggy address is located 0 bytes to the right of
[   47.155571]  allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[   47.156673] 
[   47.157010] The buggy address belongs to the physical page:
[   47.157655] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.158572] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.159467] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.160042] page_type: 0xffffffff()
[   47.160603] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.161403] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.162219] page dumped because: kasan: bad access detected
[   47.162759] 
[   47.163128] Memory state around the buggy address:
[   47.163606]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.164373]  ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.165219] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.165816]                                               ^
[   47.166490]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.167109]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.167960] ==================================================================

test log snippet test parser 194

Home

[   47.501120] ==================================================================
[   47.502405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[   47.502831] Write of size 1 at addr ffff8881028da0c9 by task kunit_try_catch/158
[   47.503530] 
[   47.503842] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.504821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.506040] Call Trace:
[   47.506439]  <TASK>
[   47.506789]  dump_stack_lvl+0x4e/0x90
[   47.507427]  print_report+0xd2/0x660
[   47.507983]  ? __virt_addr_valid+0x156/0x1e0
[   47.508925]  ? kasan_addr_to_slab+0x11/0xb0
[   47.509540]  kasan_report+0xff/0x140
[   47.510453]  ? krealloc_less_oob_helper+0x146/0x660
[   47.511410]  ? krealloc_less_oob_helper+0x146/0x660
[   47.512252]  __asan_store1+0x69/0x70
[   47.512711]  krealloc_less_oob_helper+0x146/0x660
[   47.513494]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.514404]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.515479]  ? __schedule+0x70b/0x1190
[   47.516528]  ? ktime_get_ts64+0x118/0x140
[   47.517065]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.517685]  kunit_try_run_case+0x126/0x290
[   47.518529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.519729]  ? __kasan_check_write+0x18/0x20
[   47.520349]  ? trace_preempt_on+0x20/0xa0
[   47.521341]  ? __kthread_parkme+0x4f/0xd0
[   47.522328]  ? preempt_count_sub+0x50/0x80
[   47.522826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.523579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.524591]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.525185]  kthread+0x19e/0x1e0
[   47.526123]  ? __pfx_kthread+0x10/0x10
[   47.526397]  ret_from_fork+0x41/0x70
[   47.526650]  ? __pfx_kthread+0x10/0x10
[   47.527039]  ret_from_fork_asm+0x1b/0x30
[   47.527532]  </TASK>
[   47.527920] 
[   47.528271] The buggy address belongs to the physical page:
[   47.528886] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   47.529908] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.530775] flags: 0x200000000000040(head|node=0|zone=2)
[   47.531483] page_type: 0xffffffff()
[   47.532295] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.533141] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.533968] page dumped because: kasan: bad access detected
[   47.534925] 
[   47.535237] Memory state around the buggy address:
[   47.536231]  ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.537398]  ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.538428] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.539795]                                               ^
[   47.540448]  ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.541471]  ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.542223] ==================================================================

test log snippet test parser 195

Home

[   47.169442] ==================================================================
[   47.170068] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[   47.170866] Write of size 1 at addr ffff888100977ed0 by task kunit_try_catch/154
[   47.171682] 
[   47.172058] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.172811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.173759] Call Trace:
[   47.174132]  <TASK>
[   47.174491]  dump_stack_lvl+0x4e/0x90
[   47.175088]  print_report+0xd2/0x660
[   47.175617]  ? __virt_addr_valid+0x156/0x1e0
[   47.176280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.177094]  kasan_report+0xff/0x140
[   47.177567]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.178188]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.178867]  __asan_store1+0x69/0x70
[   47.179487]  krealloc_less_oob_helper+0x1a6/0x660
[   47.180380]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.182048]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.182892]  ? __schedule+0x70b/0x1190
[   47.183686]  ? ktime_get_ts64+0x118/0x140
[   47.184388]  krealloc_less_oob+0x1c/0x30
[   47.185052]  kunit_try_run_case+0x126/0x290
[   47.185719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.186418]  ? __kasan_check_write+0x18/0x20
[   47.187147]  ? trace_preempt_on+0x20/0xa0
[   47.187813]  ? __kthread_parkme+0x4f/0xd0
[   47.188346]  ? preempt_count_sub+0x50/0x80
[   47.188926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.189654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.190502]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.191348]  kthread+0x19e/0x1e0
[   47.191964]  ? __pfx_kthread+0x10/0x10
[   47.192567]  ret_from_fork+0x41/0x70
[   47.193218]  ? __pfx_kthread+0x10/0x10
[   47.193762]  ret_from_fork_asm+0x1b/0x30
[   47.194358]  </TASK>
[   47.194757] 
[   47.195031] Allocated by task 154:
[   47.195521]  kasan_save_stack+0x3c/0x60
[   47.196193]  kasan_set_track+0x29/0x40
[   47.196683]  kasan_save_alloc_info+0x22/0x30
[   47.197375]  __kasan_krealloc+0x12f/0x180
[   47.198024]  krealloc+0xc1/0x140
[   47.198543]  krealloc_less_oob_helper+0xe5/0x660
[   47.199137]  krealloc_less_oob+0x1c/0x30
[   47.199751]  kunit_try_run_case+0x126/0x290
[   47.200374]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.201121]  kthread+0x19e/0x1e0
[   47.201709]  ret_from_fork+0x41/0x70
[   47.202268]  ret_from_fork_asm+0x1b/0x30
[   47.202893] 
[   47.203254] The buggy address belongs to the object at ffff888100977e00
[   47.203254]  which belongs to the cache kmalloc-256 of size 256
[   47.204497] The buggy address is located 7 bytes to the right of
[   47.204497]  allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[   47.205623] 
[   47.205952] The buggy address belongs to the physical page:
[   47.206641] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.207518] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.208486] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.209879] page_type: 0xffffffff()
[   47.210448] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.211484] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.212454] page dumped because: kasan: bad access detected
[   47.213243] 
[   47.213525] Memory state around the buggy address:
[   47.214294]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.215233]  ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.216159] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.217063]                                                  ^
[   47.217862]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.218872]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.219341] ==================================================================

test log snippet test parser 196

Home

[   47.674652] ==================================================================
[   47.675592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[   47.676426] Write of size 1 at addr ffff8881028da0eb by task kunit_try_catch/158
[   47.677414] 
[   47.677730] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.678777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.679786] Call Trace:
[   47.680209]  <TASK>
[   47.681105]  dump_stack_lvl+0x4e/0x90
[   47.681711]  print_report+0xd2/0x660
[   47.682160]  ? __virt_addr_valid+0x156/0x1e0
[   47.683117]  ? kasan_addr_to_slab+0x11/0xb0
[   47.683739]  kasan_report+0xff/0x140
[   47.684311]  ? krealloc_less_oob_helper+0x294/0x660
[   47.685103]  ? krealloc_less_oob_helper+0x294/0x660
[   47.685836]  __asan_store1+0x69/0x70
[   47.686281]  krealloc_less_oob_helper+0x294/0x660
[   47.687216]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.688692]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.689414]  ? __schedule+0x70b/0x1190
[   47.690059]  ? ktime_get_ts64+0x118/0x140
[   47.690666]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.691528]  kunit_try_run_case+0x126/0x290
[   47.692366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.693551]  ? __kasan_check_write+0x18/0x20
[   47.694247]  ? trace_preempt_on+0x20/0xa0
[   47.694826]  ? __kthread_parkme+0x4f/0xd0
[   47.695567]  ? preempt_count_sub+0x50/0x80
[   47.696338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.697081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.698520]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.699265]  kthread+0x19e/0x1e0
[   47.699895]  ? __pfx_kthread+0x10/0x10
[   47.700406]  ret_from_fork+0x41/0x70
[   47.701106]  ? __pfx_kthread+0x10/0x10
[   47.701726]  ret_from_fork_asm+0x1b/0x30
[   47.702370]  </TASK>
[   47.702717] 
[   47.703071] The buggy address belongs to the physical page:
[   47.703674] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   47.704814] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.705446] flags: 0x200000000000040(head|node=0|zone=2)
[   47.706235] page_type: 0xffffffff()
[   47.706833] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.707737] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.708634] page dumped because: kasan: bad access detected
[   47.709256] 
[   47.709531] Memory state around the buggy address:
[   47.710208]  ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.711083]  ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.712592] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.713623]                                                           ^
[   47.714540]  ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.715588]  ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.716663] ==================================================================

test log snippet test parser 197

Home

[   47.591374] ==================================================================
[   47.593375] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[   47.594545] Write of size 1 at addr ffff8881028da0da by task kunit_try_catch/158
[   47.595952] 
[   47.596726] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.597844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.598710] Call Trace:
[   47.599160]  <TASK>
[   47.599530]  dump_stack_lvl+0x4e/0x90
[   47.600201]  print_report+0xd2/0x660
[   47.600832]  ? __virt_addr_valid+0x156/0x1e0
[   47.601550]  ? kasan_addr_to_slab+0x11/0xb0
[   47.602081]  kasan_report+0xff/0x140
[   47.602616]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.603322]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.604022]  __asan_store1+0x69/0x70
[   47.604628]  krealloc_less_oob_helper+0x21a/0x660
[   47.605235]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.606054]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.606680]  ? __schedule+0x70b/0x1190
[   47.607271]  ? ktime_get_ts64+0x118/0x140
[   47.607866]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.608525]  kunit_try_run_case+0x126/0x290
[   47.609218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.609964]  ? __kasan_check_write+0x18/0x20
[   47.610606]  ? trace_preempt_on+0x20/0xa0
[   47.611090]  ? __kthread_parkme+0x4f/0xd0
[   47.611692]  ? preempt_count_sub+0x50/0x80
[   47.612352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.613031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.613731]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.614636]  kthread+0x19e/0x1e0
[   47.615182]  ? __pfx_kthread+0x10/0x10
[   47.615808]  ret_from_fork+0x41/0x70
[   47.616513]  ? __pfx_kthread+0x10/0x10
[   47.617148]  ret_from_fork_asm+0x1b/0x30
[   47.617821]  </TASK>
[   47.618164] 
[   47.618386] The buggy address belongs to the physical page:
[   47.619142] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   47.619913] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.620916] flags: 0x200000000000040(head|node=0|zone=2)
[   47.621502] page_type: 0xffffffff()
[   47.621962] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.622946] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.623922] page dumped because: kasan: bad access detected
[   47.624407] 
[   47.624715] Memory state around the buggy address:
[   47.625595]  ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.627104]  ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.628237] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.629335]                                                     ^
[   47.630172]  ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.630920]  ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.631657] ==================================================================

test log snippet test parser 198

Home

[   47.223131] ==================================================================
[   47.223671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[   47.224691] Write of size 1 at addr ffff888100977eda by task kunit_try_catch/154
[   47.226365] 
[   47.226684] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.228560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.230491] Call Trace:
[   47.231307]  <TASK>
[   47.231593]  dump_stack_lvl+0x4e/0x90
[   47.232220]  print_report+0xd2/0x660
[   47.232728]  ? __virt_addr_valid+0x156/0x1e0
[   47.233459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.234265]  kasan_report+0xff/0x140
[   47.234696]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.235517]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.236240]  __asan_store1+0x69/0x70
[   47.236898]  krealloc_less_oob_helper+0x21a/0x660
[   47.237560]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.238377]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.238986]  ? __schedule+0x70b/0x1190
[   47.239610]  ? ktime_get_ts64+0x118/0x140
[   47.240289]  krealloc_less_oob+0x1c/0x30
[   47.240923]  kunit_try_run_case+0x126/0x290
[   47.241606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.242362]  ? __kasan_check_write+0x18/0x20
[   47.243102]  ? trace_preempt_on+0x20/0xa0
[   47.243688]  ? __kthread_parkme+0x4f/0xd0
[   47.244367]  ? preempt_count_sub+0x50/0x80
[   47.245026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.245742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.246701]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.247339]  kthread+0x19e/0x1e0
[   47.247838]  ? __pfx_kthread+0x10/0x10
[   47.248496]  ret_from_fork+0x41/0x70
[   47.249171]  ? __pfx_kthread+0x10/0x10
[   47.249841]  ret_from_fork_asm+0x1b/0x30
[   47.250554]  </TASK>
[   47.250984] 
[   47.251242] Allocated by task 154:
[   47.251695]  kasan_save_stack+0x3c/0x60
[   47.252301]  kasan_set_track+0x29/0x40
[   47.252921]  kasan_save_alloc_info+0x22/0x30
[   47.253542]  __kasan_krealloc+0x12f/0x180
[   47.254209]  krealloc+0xc1/0x140
[   47.254719]  krealloc_less_oob_helper+0xe5/0x660
[   47.255397]  krealloc_less_oob+0x1c/0x30
[   47.256086]  kunit_try_run_case+0x126/0x290
[   47.256738]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.258243]  kthread+0x19e/0x1e0
[   47.259246]  ret_from_fork+0x41/0x70
[   47.259716]  ret_from_fork_asm+0x1b/0x30
[   47.260501] 
[   47.260839] The buggy address belongs to the object at ffff888100977e00
[   47.260839]  which belongs to the cache kmalloc-256 of size 256
[   47.262791] The buggy address is located 17 bytes to the right of
[   47.262791]  allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[   47.263912] 
[   47.264311] The buggy address belongs to the physical page:
[   47.264793] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.265878] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.266698] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.267878] page_type: 0xffffffff()
[   47.269161] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.269847] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.270708] page dumped because: kasan: bad access detected
[   47.271744] 
[   47.271955] Memory state around the buggy address:
[   47.272369]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.272914]  ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.273812] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.274654]                                                     ^
[   47.275396]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.276267]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.277118] ==================================================================

test log snippet test parser 199

Home

[   47.334648] ==================================================================
[   47.335539] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[   47.336475] Write of size 1 at addr ffff888100977eeb by task kunit_try_catch/154
[   47.337918] 
[   47.338265] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.339314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.340655] Call Trace:
[   47.341361]  <TASK>
[   47.341717]  dump_stack_lvl+0x4e/0x90
[   47.342294]  print_report+0xd2/0x660
[   47.342759]  ? __virt_addr_valid+0x156/0x1e0
[   47.343784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.344642]  kasan_report+0xff/0x140
[   47.345061]  ? krealloc_less_oob_helper+0x294/0x660
[   47.346054]  ? krealloc_less_oob_helper+0x294/0x660
[   47.346835]  __asan_store1+0x69/0x70
[   47.347504]  krealloc_less_oob_helper+0x294/0x660
[   47.348354]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.349241]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.350030]  ? __schedule+0x70b/0x1190
[   47.350537]  ? ktime_get_ts64+0x118/0x140
[   47.351345]  krealloc_less_oob+0x1c/0x30
[   47.352034]  kunit_try_run_case+0x126/0x290
[   47.352768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.353606]  ? __kasan_check_write+0x18/0x20
[   47.354127]  ? trace_preempt_on+0x20/0xa0
[   47.354711]  ? __kthread_parkme+0x4f/0xd0
[   47.355328]  ? preempt_count_sub+0x50/0x80
[   47.356147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.356897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.357652]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.358766]  kthread+0x19e/0x1e0
[   47.359318]  ? __pfx_kthread+0x10/0x10
[   47.360160]  ret_from_fork+0x41/0x70
[   47.360873]  ? __pfx_kthread+0x10/0x10
[   47.361577]  ret_from_fork_asm+0x1b/0x30
[   47.362180]  </TASK>
[   47.362503] 
[   47.362708] Allocated by task 154:
[   47.363061]  kasan_save_stack+0x3c/0x60
[   47.364375]  kasan_set_track+0x29/0x40
[   47.365048]  kasan_save_alloc_info+0x22/0x30
[   47.365762]  __kasan_krealloc+0x12f/0x180
[   47.366523]  krealloc+0xc1/0x140
[   47.367173]  krealloc_less_oob_helper+0xe5/0x660
[   47.367959]  krealloc_less_oob+0x1c/0x30
[   47.368445]  kunit_try_run_case+0x126/0x290
[   47.369321]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.369959]  kthread+0x19e/0x1e0
[   47.370587]  ret_from_fork+0x41/0x70
[   47.371742]  ret_from_fork_asm+0x1b/0x30
[   47.372334] 
[   47.372662] The buggy address belongs to the object at ffff888100977e00
[   47.372662]  which belongs to the cache kmalloc-256 of size 256
[   47.373901] The buggy address is located 34 bytes to the right of
[   47.373901]  allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[   47.375274] 
[   47.376247] The buggy address belongs to the physical page:
[   47.377049] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.377736] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.378707] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.379728] page_type: 0xffffffff()
[   47.380177] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.381228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.382399] page dumped because: kasan: bad access detected
[   47.383064] 
[   47.383406] Memory state around the buggy address:
[   47.384448]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.385121]  ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.386117] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.386804]                                                           ^
[   47.388205]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.389414]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.390171] ==================================================================

test log snippet test parser 200

Home

[   47.632675] ==================================================================
[   47.633249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[   47.634694] Write of size 1 at addr ffff8881028da0ea by task kunit_try_catch/158
[   47.635670] 
[   47.635990] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.636971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.637937] Call Trace:
[   47.638372]  <TASK>
[   47.638710]  dump_stack_lvl+0x4e/0x90
[   47.639239]  print_report+0xd2/0x660
[   47.639670]  ? __virt_addr_valid+0x156/0x1e0
[   47.640335]  ? kasan_addr_to_slab+0x11/0xb0
[   47.641252]  kasan_report+0xff/0x140
[   47.642489]  ? krealloc_less_oob_helper+0x258/0x660
[   47.643183]  ? krealloc_less_oob_helper+0x258/0x660
[   47.644176]  __asan_store1+0x69/0x70
[   47.644732]  krealloc_less_oob_helper+0x258/0x660
[   47.645408]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.646174]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.646897]  ? __schedule+0x70b/0x1190
[   47.647407]  ? ktime_get_ts64+0x118/0x140
[   47.648444]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.649221]  kunit_try_run_case+0x126/0x290
[   47.649842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.650461]  ? __kasan_check_write+0x18/0x20
[   47.651182]  ? trace_preempt_on+0x20/0xa0
[   47.651704]  ? __kthread_parkme+0x4f/0xd0
[   47.652328]  ? preempt_count_sub+0x50/0x80
[   47.652973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.653638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.654582]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.655900]  kthread+0x19e/0x1e0
[   47.656446]  ? __pfx_kthread+0x10/0x10
[   47.657214]  ret_from_fork+0x41/0x70
[   47.657715]  ? __pfx_kthread+0x10/0x10
[   47.658506]  ret_from_fork_asm+0x1b/0x30
[   47.659252]  </TASK>
[   47.659605] 
[   47.660046] The buggy address belongs to the physical page:
[   47.660586] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   47.661677] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.663173] flags: 0x200000000000040(head|node=0|zone=2)
[   47.663959] page_type: 0xffffffff()
[   47.664472] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.665434] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.666669] page dumped because: kasan: bad access detected
[   47.667248] 
[   47.667539] Memory state around the buggy address:
[   47.668322]  ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.669227]  ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.669972] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.670706]                                                           ^
[   47.671564]  ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.672917]  ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.673560] ==================================================================

test log snippet test parser 201

Home

[   47.545368] ==================================================================
[   47.546253] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[   47.547345] Write of size 1 at addr ffff8881028da0d0 by task kunit_try_catch/158
[   47.548590] 
[   47.549102] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.550175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.551249] Call Trace:
[   47.551550]  <TASK>
[   47.552389]  dump_stack_lvl+0x4e/0x90
[   47.552886]  print_report+0xd2/0x660
[   47.553587]  ? __virt_addr_valid+0x156/0x1e0
[   47.554467]  ? kasan_addr_to_slab+0x11/0xb0
[   47.555116]  kasan_report+0xff/0x140
[   47.555780]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.556602]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.557747]  __asan_store1+0x69/0x70
[   47.558284]  krealloc_less_oob_helper+0x1a6/0x660
[   47.558870]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.559471]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.560286]  ? __schedule+0x70b/0x1190
[   47.560985]  ? ktime_get_ts64+0x118/0x140
[   47.561749]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.562593]  kunit_try_run_case+0x126/0x290
[   47.563198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.563786]  ? __kasan_check_write+0x18/0x20
[   47.565149]  ? trace_preempt_on+0x20/0xa0
[   47.566055]  ? __kthread_parkme+0x4f/0xd0
[   47.566598]  ? preempt_count_sub+0x50/0x80
[   47.567196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.568031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.568765]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.569524]  kthread+0x19e/0x1e0
[   47.569971]  ? __pfx_kthread+0x10/0x10
[   47.571182]  ret_from_fork+0x41/0x70
[   47.571797]  ? __pfx_kthread+0x10/0x10
[   47.572486]  ret_from_fork_asm+0x1b/0x30
[   47.573397]  </TASK>
[   47.574053] 
[   47.574547] The buggy address belongs to the physical page:
[   47.575314] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   47.576952] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.577749] flags: 0x200000000000040(head|node=0|zone=2)
[   47.578724] page_type: 0xffffffff()
[   47.579495] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.581205] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.581904] page dumped because: kasan: bad access detected
[   47.582689] 
[   47.583225] Memory state around the buggy address:
[   47.583819]  ffff8881028d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.585457]  ffff8881028da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.586270] >ffff8881028da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.587218]                                                  ^
[   47.587538]  ffff8881028da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.588244]  ffff8881028da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.589363] ==================================================================

test log snippet test parser 202

Home

[   47.279558] ==================================================================
[   47.280528] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[   47.281838] Write of size 1 at addr ffff888100977eea by task kunit_try_catch/154
[   47.282528] 
[   47.282844] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.283735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.284520] Call Trace:
[   47.285709]  <TASK>
[   47.286131]  dump_stack_lvl+0x4e/0x90
[   47.286740]  print_report+0xd2/0x660
[   47.287297]  ? __virt_addr_valid+0x156/0x1e0
[   47.287984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.288743]  kasan_report+0xff/0x140
[   47.290044]  ? krealloc_less_oob_helper+0x258/0x660
[   47.290638]  ? krealloc_less_oob_helper+0x258/0x660
[   47.291469]  __asan_store1+0x69/0x70
[   47.292114]  krealloc_less_oob_helper+0x258/0x660
[   47.292913]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.293576]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.294389]  ? __schedule+0x70b/0x1190
[   47.294816]  ? ktime_get_ts64+0x118/0x140
[   47.295477]  krealloc_less_oob+0x1c/0x30
[   47.296079]  kunit_try_run_case+0x126/0x290
[   47.296741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.297475]  ? __kasan_check_write+0x18/0x20
[   47.298218]  ? trace_preempt_on+0x20/0xa0
[   47.298766]  ? __kthread_parkme+0x4f/0xd0
[   47.300086]  ? preempt_count_sub+0x50/0x80
[   47.300698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.301314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.301967]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.302802]  kthread+0x19e/0x1e0
[   47.303377]  ? __pfx_kthread+0x10/0x10
[   47.304372]  ret_from_fork+0x41/0x70
[   47.305159]  ? __pfx_kthread+0x10/0x10
[   47.305690]  ret_from_fork_asm+0x1b/0x30
[   47.307066]  </TASK>
[   47.307650] 
[   47.308140] Allocated by task 154:
[   47.308557]  kasan_save_stack+0x3c/0x60
[   47.309418]  kasan_set_track+0x29/0x40
[   47.310111]  kasan_save_alloc_info+0x22/0x30
[   47.310845]  __kasan_krealloc+0x12f/0x180
[   47.311421]  krealloc+0xc1/0x140
[   47.311777]  krealloc_less_oob_helper+0xe5/0x660
[   47.312660]  krealloc_less_oob+0x1c/0x30
[   47.313279]  kunit_try_run_case+0x126/0x290
[   47.314422]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.315288]  kthread+0x19e/0x1e0
[   47.316093]  ret_from_fork+0x41/0x70
[   47.316767]  ret_from_fork_asm+0x1b/0x30
[   47.317518] 
[   47.317811] The buggy address belongs to the object at ffff888100977e00
[   47.317811]  which belongs to the cache kmalloc-256 of size 256
[   47.319406] The buggy address is located 33 bytes to the right of
[   47.319406]  allocated 201-byte region [ffff888100977e00, ffff888100977ec9)
[   47.321250] 
[   47.321516] The buggy address belongs to the physical page:
[   47.322268] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.323239] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.324136] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.324775] page_type: 0xffffffff()
[   47.325424] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.326398] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.327171] page dumped because: kasan: bad access detected
[   47.328018] 
[   47.328310] Memory state around the buggy address:
[   47.328865]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.329801]  ffff888100977e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.330736] >ffff888100977e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.331620]                                                           ^
[   47.332421]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.333163]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.333634] ==================================================================

test log snippet test parser 203

Home

[   47.445835] ==================================================================
[   47.447465] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[   47.448194] Write of size 1 at addr ffff88810210a0f0 by task kunit_try_catch/156
[   47.449649] 
[   47.449978] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.451606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.452717] Call Trace:
[   47.453477]  <TASK>
[   47.454137]  dump_stack_lvl+0x4e/0x90
[   47.455278]  print_report+0xd2/0x660
[   47.455737]  ? __virt_addr_valid+0x156/0x1e0
[   47.456353]  ? kasan_addr_to_slab+0x11/0xb0
[   47.457680]  kasan_report+0xff/0x140
[   47.458114]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.458657]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.459725]  __asan_store1+0x69/0x70
[   47.460391]  krealloc_more_oob_helper+0x1bb/0x3b0
[   47.461105]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.461748]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.462282]  ? __schedule+0x70b/0x1190
[   47.462722]  ? ktime_get_ts64+0x118/0x140
[   47.463358]  krealloc_pagealloc_more_oob+0x1c/0x30
[   47.464599]  kunit_try_run_case+0x126/0x290
[   47.465657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.466542]  ? __kasan_check_write+0x18/0x20
[   47.467327]  ? trace_preempt_on+0x20/0xa0
[   47.468201]  ? __kthread_parkme+0x4f/0xd0
[   47.469284]  ? preempt_count_sub+0x50/0x80
[   47.469733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.470687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.471672]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.472386]  kthread+0x19e/0x1e0
[   47.472809]  ? __pfx_kthread+0x10/0x10
[   47.474107]  ret_from_fork+0x41/0x70
[   47.474618]  ? __pfx_kthread+0x10/0x10
[   47.475411]  ret_from_fork_asm+0x1b/0x30
[   47.475956]  </TASK>
[   47.476445] 
[   47.476743] The buggy address belongs to the physical page:
[   47.477792] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102108
[   47.479095] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.480107] flags: 0x200000000000040(head|node=0|zone=2)
[   47.480696] page_type: 0xffffffff()
[   47.481579] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.482469] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.483511] page dumped because: kasan: bad access detected
[   47.484322] 
[   47.484545] Memory state around the buggy address:
[   47.485773]  ffff888102109f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.486535]  ffff88810210a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.487612] >ffff88810210a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   47.488627]                                                              ^
[   47.489804]  ffff88810210a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.490464]  ffff88810210a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.491464] ==================================================================

test log snippet test parser 204

Home

[   47.063208] ==================================================================
[   47.064186] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[   47.065046] Write of size 1 at addr ffff888100977cf0 by task kunit_try_catch/152
[   47.065879] 
[   47.066245] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.067338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.068441] Call Trace:
[   47.068723]  <TASK>
[   47.069216]  dump_stack_lvl+0x4e/0x90
[   47.070180]  print_report+0xd2/0x660
[   47.070691]  ? __virt_addr_valid+0x156/0x1e0
[   47.071405]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.072282]  kasan_report+0xff/0x140
[   47.072841]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.073616]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.074078]  __asan_store1+0x69/0x70
[   47.074615]  krealloc_more_oob_helper+0x1bb/0x3b0
[   47.075274]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.076076]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.077053]  ? __schedule+0x70b/0x1190
[   47.077605]  ? ktime_get_ts64+0x118/0x140
[   47.078160]  krealloc_more_oob+0x1c/0x30
[   47.078644]  kunit_try_run_case+0x126/0x290
[   47.079209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.079821]  ? irqentry_exit+0x29/0x60
[   47.080629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.081473]  ? __kasan_record_aux_stack+0xb3/0xd0
[   47.082192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.083015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.083823]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.084545]  kthread+0x19e/0x1e0
[   47.085074]  ? __pfx_kthread+0x10/0x10
[   47.085673]  ret_from_fork+0x41/0x70
[   47.086444]  ? __pfx_kthread+0x10/0x10
[   47.086912]  ret_from_fork_asm+0x1b/0x30
[   47.087666]  </TASK>
[   47.087914] 
[   47.088219] Allocated by task 152:
[   47.088679]  kasan_save_stack+0x3c/0x60
[   47.089281]  kasan_set_track+0x29/0x40
[   47.089713]  kasan_save_alloc_info+0x22/0x30
[   47.090393]  __kasan_krealloc+0x12f/0x180
[   47.091018]  krealloc+0xc1/0x140
[   47.091424]  krealloc_more_oob_helper+0xe2/0x3b0
[   47.092114]  krealloc_more_oob+0x1c/0x30
[   47.092676]  kunit_try_run_case+0x126/0x290
[   47.093194]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.093964]  kthread+0x19e/0x1e0
[   47.094511]  ret_from_fork+0x41/0x70
[   47.095065]  ret_from_fork_asm+0x1b/0x30
[   47.095641] 
[   47.095980] The buggy address belongs to the object at ffff888100977c00
[   47.095980]  which belongs to the cache kmalloc-256 of size 256
[   47.097146] The buggy address is located 5 bytes to the right of
[   47.097146]  allocated 235-byte region [ffff888100977c00, ffff888100977ceb)
[   47.098452] 
[   47.098699] The buggy address belongs to the physical page:
[   47.099412] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.100370] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.101141] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.101888] page_type: 0xffffffff()
[   47.102337] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.103224] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.103952] page dumped because: kasan: bad access detected
[   47.104603] 
[   47.104938] Memory state around the buggy address:
[   47.105406]  ffff888100977b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.106153]  ffff888100977c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.106990] >ffff888100977c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   47.107803]                                                              ^
[   47.108342]  ffff888100977d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.109198]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.109839] ==================================================================

test log snippet test parser 205

Home

[   47.401487] ==================================================================
[   47.402867] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[   47.403745] Write of size 1 at addr ffff88810210a0eb by task kunit_try_catch/156
[   47.405449] 
[   47.405784] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.406793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.408112] Call Trace:
[   47.408560]  <TASK>
[   47.409109]  dump_stack_lvl+0x4e/0x90
[   47.409694]  print_report+0xd2/0x660
[   47.410364]  ? __virt_addr_valid+0x156/0x1e0
[   47.411308]  ? kasan_addr_to_slab+0x11/0xb0
[   47.412119]  kasan_report+0xff/0x140
[   47.412731]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.413501]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.414301]  __asan_store1+0x69/0x70
[   47.414906]  krealloc_more_oob_helper+0x179/0x3b0
[   47.415544]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.416445]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.417264]  ? __schedule+0x70b/0x1190
[   47.418015]  ? ktime_get_ts64+0x118/0x140
[   47.418501]  krealloc_pagealloc_more_oob+0x1c/0x30
[   47.419091]  kunit_try_run_case+0x126/0x290
[   47.419665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.420284]  ? __kasan_check_write+0x18/0x20
[   47.420860]  ? trace_preempt_on+0x20/0xa0
[   47.421570]  ? __kthread_parkme+0x4f/0xd0
[   47.422347]  ? preempt_count_sub+0x50/0x80
[   47.423114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.423918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.424821]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.425586]  kthread+0x19e/0x1e0
[   47.426369]  ? __pfx_kthread+0x10/0x10
[   47.427114]  ret_from_fork+0x41/0x70
[   47.427731]  ? __pfx_kthread+0x10/0x10
[   47.428267]  ret_from_fork_asm+0x1b/0x30
[   47.428778]  </TASK>
[   47.429427] 
[   47.429733] The buggy address belongs to the physical page:
[   47.430599] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102108
[   47.432076] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.432915] flags: 0x200000000000040(head|node=0|zone=2)
[   47.433814] page_type: 0xffffffff()
[   47.434371] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.435417] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.436303] page dumped because: kasan: bad access detected
[   47.437211] 
[   47.437519] Memory state around the buggy address:
[   47.438302]  ffff888102109f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.439184]  ffff88810210a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.439901] >ffff88810210a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   47.440895]                                                           ^
[   47.442041]  ffff88810210a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.442771]  ffff88810210a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.443476] ==================================================================

test log snippet test parser 206

Home

[   47.012323] ==================================================================
[   47.013540] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[   47.014351] Write of size 1 at addr ffff888100977ceb by task kunit_try_catch/152
[   47.015150] 
[   47.015480] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.016515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.017330] Call Trace:
[   47.017801]  <TASK>
[   47.018208]  dump_stack_lvl+0x4e/0x90
[   47.018901]  print_report+0xd2/0x660
[   47.019499]  ? __virt_addr_valid+0x156/0x1e0
[   47.020214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.020955]  kasan_report+0xff/0x140
[   47.021432]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.022198]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.022877]  __asan_store1+0x69/0x70
[   47.023435]  krealloc_more_oob_helper+0x179/0x3b0
[   47.024204]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.024895]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.025490]  ? __schedule+0x70b/0x1190
[   47.026155]  ? ktime_get_ts64+0x118/0x140
[   47.026835]  krealloc_more_oob+0x1c/0x30
[   47.027423]  kunit_try_run_case+0x126/0x290
[   47.028069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.028726]  ? irqentry_exit+0x29/0x60
[   47.029354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.030204]  ? __kasan_record_aux_stack+0xb3/0xd0
[   47.030837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.031467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.032345]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.033145]  kthread+0x19e/0x1e0
[   47.033713]  ? __pfx_kthread+0x10/0x10
[   47.034278]  ret_from_fork+0x41/0x70
[   47.034939]  ? __pfx_kthread+0x10/0x10
[   47.035478]  ret_from_fork_asm+0x1b/0x30
[   47.036150]  </TASK>
[   47.036447] 
[   47.036651] Allocated by task 152:
[   47.037667]  kasan_save_stack+0x3c/0x60
[   47.038290]  kasan_set_track+0x29/0x40
[   47.038791]  kasan_save_alloc_info+0x22/0x30
[   47.039307]  __kasan_krealloc+0x12f/0x180
[   47.039797]  krealloc+0xc1/0x140
[   47.040566]  krealloc_more_oob_helper+0xe2/0x3b0
[   47.041305]  krealloc_more_oob+0x1c/0x30
[   47.042030]  kunit_try_run_case+0x126/0x290
[   47.042790]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.043601]  kthread+0x19e/0x1e0
[   47.044308]  ret_from_fork+0x41/0x70
[   47.044796]  ret_from_fork_asm+0x1b/0x30
[   47.045371] 
[   47.045512] The buggy address belongs to the object at ffff888100977c00
[   47.045512]  which belongs to the cache kmalloc-256 of size 256
[   47.046955] The buggy address is located 0 bytes to the right of
[   47.046955]  allocated 235-byte region [ffff888100977c00, ffff888100977ceb)
[   47.048138] 
[   47.048451] The buggy address belongs to the physical page:
[   47.049451] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   47.050464] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.051275] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.051742] page_type: 0xffffffff()
[   47.052367] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.053271] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.054040] page dumped because: kasan: bad access detected
[   47.054711] 
[   47.055040] Memory state around the buggy address:
[   47.055754]  ffff888100977b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.056655]  ffff888100977c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.057611] >ffff888100977c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   47.058384]                                                           ^
[   47.059219]  ffff888100977d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.060054]  ffff888100977d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.060843] ==================================================================

test log snippet test parser 207

Home

[   49.502824] ==================================================================
[   49.503977] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0
[   49.505664] Read of size 1 at addr ffff88810284d373 by task kunit_try_catch/208
[   49.506647] 
[   49.506833] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.508258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.509329] Call Trace:
[   49.509677]  <TASK>
[   49.510239]  dump_stack_lvl+0x4e/0x90
[   49.511587]  print_report+0xd2/0x660
[   49.512176]  ? __virt_addr_valid+0x156/0x1e0
[   49.512702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.513436]  kasan_report+0xff/0x140
[   49.513969]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   49.514729]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   49.515557]  __asan_load1+0x66/0x70
[   49.516285]  ksize_unpoisons_memory+0x10d/0x3b0
[   49.516885]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   49.517594]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   49.518454]  ? __schedule+0x70b/0x1190
[   49.519171]  ? ktime_get_ts64+0x118/0x140
[   49.519599]  kunit_try_run_case+0x126/0x290
[   49.520485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.521316]  ? __kasan_check_write+0x18/0x20
[   49.521971]  ? trace_preempt_on+0x20/0xa0
[   49.522533]  ? __kthread_parkme+0x4f/0xd0
[   49.523471]  ? preempt_count_sub+0x50/0x80
[   49.524274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.525289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.526274]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.527183]  kthread+0x19e/0x1e0
[   49.527677]  ? __pfx_kthread+0x10/0x10
[   49.528245]  ret_from_fork+0x41/0x70
[   49.528686]  ? __pfx_kthread+0x10/0x10
[   49.529240]  ret_from_fork_asm+0x1b/0x30
[   49.529728]  </TASK>
[   49.530037] 
[   49.530263] Allocated by task 208:
[   49.530723]  kasan_save_stack+0x3c/0x60
[   49.532233]  kasan_set_track+0x29/0x40
[   49.532800]  kasan_save_alloc_info+0x22/0x30
[   49.533644]  __kasan_kmalloc+0xb7/0xc0
[   49.534400]  kmalloc_trace+0x4c/0xb0
[   49.535400]  ksize_unpoisons_memory+0xb0/0x3b0
[   49.535931]  kunit_try_run_case+0x126/0x290
[   49.536823]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.537729]  kthread+0x19e/0x1e0
[   49.538502]  ret_from_fork+0x41/0x70
[   49.539595]  ret_from_fork_asm+0x1b/0x30
[   49.540258] 
[   49.540763] The buggy address belongs to the object at ffff88810284d300
[   49.540763]  which belongs to the cache kmalloc-128 of size 128
[   49.542410] The buggy address is located 0 bytes to the right of
[   49.542410]  allocated 115-byte region [ffff88810284d300, ffff88810284d373)
[   49.543575] 
[   49.543794] The buggy address belongs to the physical page:
[   49.544324] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[   49.545692] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.546788] page_type: 0xffffffff()
[   49.547481] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.548431] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.549337] page dumped because: kasan: bad access detected
[   49.550010] 
[   49.550332] Memory state around the buggy address:
[   49.550962]  ffff88810284d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   49.551699]  ffff88810284d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.552527] >ffff88810284d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   49.553289]                                                              ^
[   49.553746]  ffff88810284d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.554596]  ffff88810284d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.555498] ==================================================================

test log snippet test parser 208

Home

[   49.615861] ==================================================================
[   49.617064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0
[   49.619236] Read of size 1 at addr ffff88810284d37f by task kunit_try_catch/208
[   49.620349] 
[   49.620829] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.621711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.623141] Call Trace:
[   49.623695]  <TASK>
[   49.624368]  dump_stack_lvl+0x4e/0x90
[   49.625231]  print_report+0xd2/0x660
[   49.626066]  ? __virt_addr_valid+0x156/0x1e0
[   49.627287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.628204]  kasan_report+0xff/0x140
[   49.628703]  ? ksize_unpoisons_memory+0x183/0x3b0
[   49.629294]  ? ksize_unpoisons_memory+0x183/0x3b0
[   49.629886]  __asan_load1+0x66/0x70
[   49.630425]  ksize_unpoisons_memory+0x183/0x3b0
[   49.631491]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   49.632646]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   49.633297]  ? __schedule+0x70b/0x1190
[   49.633817]  ? ktime_get_ts64+0x118/0x140
[   49.635150]  kunit_try_run_case+0x126/0x290
[   49.635649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.636687]  ? __kasan_check_write+0x18/0x20
[   49.637538]  ? trace_preempt_on+0x20/0xa0
[   49.638312]  ? __kthread_parkme+0x4f/0xd0
[   49.638812]  ? preempt_count_sub+0x50/0x80
[   49.639368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.640325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.641838]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.642745]  kthread+0x19e/0x1e0
[   49.643578]  ? __pfx_kthread+0x10/0x10
[   49.644480]  ret_from_fork+0x41/0x70
[   49.645363]  ? __pfx_kthread+0x10/0x10
[   49.645672]  ret_from_fork_asm+0x1b/0x30
[   49.646302]  </TASK>
[   49.647205] 
[   49.647591] Allocated by task 208:
[   49.648265]  kasan_save_stack+0x3c/0x60
[   49.648520]  kasan_set_track+0x29/0x40
[   49.648747]  kasan_save_alloc_info+0x22/0x30
[   49.649510]  __kasan_kmalloc+0xb7/0xc0
[   49.650039]  kmalloc_trace+0x4c/0xb0
[   49.651246]  ksize_unpoisons_memory+0xb0/0x3b0
[   49.652065]  kunit_try_run_case+0x126/0x290
[   49.652613]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.653207]  kthread+0x19e/0x1e0
[   49.653556]  ret_from_fork+0x41/0x70
[   49.654377]  ret_from_fork_asm+0x1b/0x30
[   49.655144] 
[   49.655478] The buggy address belongs to the object at ffff88810284d300
[   49.655478]  which belongs to the cache kmalloc-128 of size 128
[   49.656714] The buggy address is located 12 bytes to the right of
[   49.656714]  allocated 115-byte region [ffff88810284d300, ffff88810284d373)
[   49.659148] 
[   49.659504] The buggy address belongs to the physical page:
[   49.660382] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[   49.661444] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.662314] page_type: 0xffffffff()
[   49.663118] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.664080] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.664434] page dumped because: kasan: bad access detected
[   49.664691] 
[   49.664874] Memory state around the buggy address:
[   49.665859]  ffff88810284d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   49.667220]  ffff88810284d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.668106] >ffff88810284d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   49.669232]                                                                 ^
[   49.670426]  ffff88810284d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.671372]  ffff88810284d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.672198] ==================================================================

test log snippet test parser 209

Home

[   49.556784] ==================================================================
[   49.557662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0
[   49.558548] Read of size 1 at addr ffff88810284d378 by task kunit_try_catch/208
[   49.559272] 
[   49.559667] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.560563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.561280] Call Trace:
[   49.561717]  <TASK>
[   49.562272]  dump_stack_lvl+0x4e/0x90
[   49.563223]  print_report+0xd2/0x660
[   49.564417]  ? __virt_addr_valid+0x156/0x1e0
[   49.565166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.566537]  kasan_report+0xff/0x140
[   49.567598]  ? ksize_unpoisons_memory+0x146/0x3b0
[   49.568590]  ? ksize_unpoisons_memory+0x146/0x3b0
[   49.569611]  __asan_load1+0x66/0x70
[   49.570415]  ksize_unpoisons_memory+0x146/0x3b0
[   49.571138]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   49.571777]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   49.572385]  ? __schedule+0x70b/0x1190
[   49.573510]  ? ktime_get_ts64+0x118/0x140
[   49.574380]  kunit_try_run_case+0x126/0x290
[   49.575195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.575578]  ? __kasan_check_write+0x18/0x20
[   49.576075]  ? trace_preempt_on+0x20/0xa0
[   49.577231]  ? __kthread_parkme+0x4f/0xd0
[   49.578258]  ? preempt_count_sub+0x50/0x80
[   49.578930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.579784]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.580471]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.582144]  kthread+0x19e/0x1e0
[   49.582679]  ? __pfx_kthread+0x10/0x10
[   49.583466]  ret_from_fork+0x41/0x70
[   49.584270]  ? __pfx_kthread+0x10/0x10
[   49.584846]  ret_from_fork_asm+0x1b/0x30
[   49.585429]  </TASK>
[   49.586286] 
[   49.586931] Allocated by task 208:
[   49.587584]  kasan_save_stack+0x3c/0x60
[   49.588300]  kasan_set_track+0x29/0x40
[   49.589219]  kasan_save_alloc_info+0x22/0x30
[   49.589750]  __kasan_kmalloc+0xb7/0xc0
[   49.590370]  kmalloc_trace+0x4c/0xb0
[   49.590620]  ksize_unpoisons_memory+0xb0/0x3b0
[   49.591703]  kunit_try_run_case+0x126/0x290
[   49.592673]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.593478]  kthread+0x19e/0x1e0
[   49.594544]  ret_from_fork+0x41/0x70
[   49.595077]  ret_from_fork_asm+0x1b/0x30
[   49.595834] 
[   49.596504] The buggy address belongs to the object at ffff88810284d300
[   49.596504]  which belongs to the cache kmalloc-128 of size 128
[   49.598416] The buggy address is located 5 bytes to the right of
[   49.598416]  allocated 115-byte region [ffff88810284d300, ffff88810284d373)
[   49.599822] 
[   49.600589] The buggy address belongs to the physical page:
[   49.601252] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[   49.602645] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.603478] page_type: 0xffffffff()
[   49.604498] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.605551] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.606886] page dumped because: kasan: bad access detected
[   49.607727] 
[   49.608281] Memory state around the buggy address:
[   49.609248]  ffff88810284d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   49.610258]  ffff88810284d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.611631] >ffff88810284d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   49.612454]                                                                 ^
[   49.613544]  ffff88810284d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.614631]  ffff88810284d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.615324] ==================================================================

test log snippet test parser 210

Home

[   50.141717] ==================================================================
[   50.142978] BUG: KASAN: slab-out-of-bounds in memchr+0x27/0x60
[   50.143657] Read of size 1 at addr ffff888102840d18 by task kunit_try_catch/218
[   50.145122] 
[   50.145492] CPU: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.146263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.147407] Call Trace:
[   50.147848]  <TASK>
[   50.148250]  dump_stack_lvl+0x4e/0x90
[   50.148938]  print_report+0xd2/0x660
[   50.149514]  ? __virt_addr_valid+0x156/0x1e0
[   50.150274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.151070]  kasan_report+0xff/0x140
[   50.151653]  ? memchr+0x27/0x60
[   50.152262]  ? memchr+0x27/0x60
[   50.152836]  __asan_load1+0x66/0x70
[   50.153267]  memchr+0x27/0x60
[   50.153808]  kasan_memchr+0xdd/0x1f0
[   50.154407]  ? __pfx_kasan_memchr+0x10/0x10
[   50.155421]  ? __schedule+0x70b/0x1190
[   50.156930]  ? ktime_get_ts64+0x118/0x140
[   50.157502]  kunit_try_run_case+0x126/0x290
[   50.158568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.159478]  ? __kasan_check_write+0x18/0x20
[   50.160596]  ? trace_preempt_on+0x20/0xa0
[   50.161132]  ? __kthread_parkme+0x4f/0xd0
[   50.161605]  ? preempt_count_sub+0x50/0x80
[   50.162771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.163544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.164551]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.165413]  kthread+0x19e/0x1e0
[   50.165669]  ? __pfx_kthread+0x10/0x10
[   50.166462]  ret_from_fork+0x41/0x70
[   50.167336]  ? __pfx_kthread+0x10/0x10
[   50.167914]  ret_from_fork_asm+0x1b/0x30
[   50.168685]  </TASK>
[   50.169333] 
[   50.169571] Allocated by task 218:
[   50.170274]  kasan_save_stack+0x3c/0x60
[   50.170892]  kasan_set_track+0x29/0x40
[   50.171399]  kasan_save_alloc_info+0x22/0x30
[   50.172509]  __kasan_kmalloc+0xb7/0xc0
[   50.173147]  kmalloc_trace+0x4c/0xb0
[   50.173757]  kasan_memchr+0x9f/0x1f0
[   50.174232]  kunit_try_run_case+0x126/0x290
[   50.175215]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.175891]  kthread+0x19e/0x1e0
[   50.176546]  ret_from_fork+0x41/0x70
[   50.177249]  ret_from_fork_asm+0x1b/0x30
[   50.177879] 
[   50.178288] The buggy address belongs to the object at ffff888102840d00
[   50.178288]  which belongs to the cache kmalloc-32 of size 32
[   50.180177] The buggy address is located 0 bytes to the right of
[   50.180177]  allocated 24-byte region [ffff888102840d00, ffff888102840d18)
[   50.181688] 
[   50.181921] The buggy address belongs to the physical page:
[   50.182327] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.184084] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.184675] page_type: 0xffffffff()
[   50.185120] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.185869] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.186672] page dumped because: kasan: bad access detected
[   50.187686] 
[   50.188274] Memory state around the buggy address:
[   50.189152]  ffff888102840c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.190123]  ffff888102840c80: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   50.191374] >ffff888102840d00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.192346]                             ^
[   50.193152]  ffff888102840d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.194055]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.194861] ==================================================================

test log snippet test parser 211

Home

[   50.205594] ==================================================================
[   50.206870] BUG: KASAN: slab-out-of-bounds in memcmp+0x3d/0xb0
[   50.207515] Read of size 1 at addr ffff888102840d58 by task kunit_try_catch/220
[   50.208751] 
[   50.209145] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.210035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.211129] Call Trace:
[   50.211509]  <TASK>
[   50.211906]  dump_stack_lvl+0x4e/0x90
[   50.212554]  print_report+0xd2/0x660
[   50.213066]  ? __virt_addr_valid+0x156/0x1e0
[   50.213844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.214604]  kasan_report+0xff/0x140
[   50.215177]  ? memcmp+0x3d/0xb0
[   50.215742]  ? memcmp+0x3d/0xb0
[   50.216227]  __asan_load1+0x66/0x70
[   50.216806]  memcmp+0x3d/0xb0
[   50.217324]  kasan_memcmp+0x100/0x230
[   50.218057]  ? __pfx_kasan_memcmp+0x10/0x10
[   50.218655]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   50.219273]  ? ktime_get_ts64+0x118/0x140
[   50.219966]  kunit_try_run_case+0x126/0x290
[   50.220592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.221280]  ? __kasan_check_write+0x18/0x20
[   50.221916]  ? trace_preempt_on+0x20/0xa0
[   50.222534]  ? __kthread_parkme+0x4f/0xd0
[   50.223067]  ? preempt_count_sub+0x50/0x80
[   50.223629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.224353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.225180]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.225857]  kthread+0x19e/0x1e0
[   50.226396]  ? __pfx_kthread+0x10/0x10
[   50.226896]  ret_from_fork+0x41/0x70
[   50.227468]  ? __pfx_kthread+0x10/0x10
[   50.228125]  ret_from_fork_asm+0x1b/0x30
[   50.228684]  </TASK>
[   50.229282] 
[   50.229587] Allocated by task 220:
[   50.230210]  kasan_save_stack+0x3c/0x60
[   50.230770]  kasan_set_track+0x29/0x40
[   50.231242]  kasan_save_alloc_info+0x22/0x30
[   50.231743]  __kasan_kmalloc+0xb7/0xc0
[   50.232366]  kmalloc_trace+0x4c/0xb0
[   50.232980]  kasan_memcmp+0xb0/0x230
[   50.233594]  kunit_try_run_case+0x126/0x290
[   50.234432]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.234871]  kthread+0x19e/0x1e0
[   50.235500]  ret_from_fork+0x41/0x70
[   50.236109]  ret_from_fork_asm+0x1b/0x30
[   50.236796] 
[   50.237121] The buggy address belongs to the object at ffff888102840d40
[   50.237121]  which belongs to the cache kmalloc-32 of size 32
[   50.238437] The buggy address is located 0 bytes to the right of
[   50.238437]  allocated 24-byte region [ffff888102840d40, ffff888102840d58)
[   50.239845] 
[   50.240214] The buggy address belongs to the physical page:
[   50.240828] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.242294] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.242825] page_type: 0xffffffff()
[   50.243412] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.244246] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.245450] page dumped because: kasan: bad access detected
[   50.246283] 
[   50.246571] Memory state around the buggy address:
[   50.247159]  ffff888102840c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.247891]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.248624] >ffff888102840d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.249450]                                                     ^
[   50.250102]  ffff888102840d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.250919]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.251595] ==================================================================

test log snippet test parser 212

Home

[   50.464164] ==================================================================
[   50.465017] BUG: KASAN: slab-use-after-free in kasan_strings+0x19b/0x510
[   50.465596] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[   50.466599] 
[   50.466972] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.468071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.469210] Call Trace:
[   50.469656]  <TASK>
[   50.470124]  dump_stack_lvl+0x4e/0x90
[   50.470720]  print_report+0xd2/0x660
[   50.471405]  ? __virt_addr_valid+0x156/0x1e0
[   50.472136]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.472876]  kasan_report+0xff/0x140
[   50.473559]  ? kasan_strings+0x19b/0x510
[   50.474203]  ? kasan_strings+0x19b/0x510
[   50.474860]  __asan_load1+0x66/0x70
[   50.475372]  kasan_strings+0x19b/0x510
[   50.476064]  ? __pfx_kasan_strings+0x10/0x10
[   50.476697]  ? __schedule+0x70b/0x1190
[   50.477354]  ? ktime_get_ts64+0x118/0x140
[   50.478162]  kunit_try_run_case+0x126/0x290
[   50.478747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.479507]  ? __kasan_check_write+0x18/0x20
[   50.480208]  ? trace_preempt_on+0x20/0xa0
[   50.480907]  ? __kthread_parkme+0x4f/0xd0
[   50.481915]  ? preempt_count_sub+0x50/0x80
[   50.483217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.484541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.485561]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.486297]  kthread+0x19e/0x1e0
[   50.487470]  ? __pfx_kthread+0x10/0x10
[   50.488048]  ret_from_fork+0x41/0x70
[   50.488654]  ? __pfx_kthread+0x10/0x10
[   50.489511]  ret_from_fork_asm+0x1b/0x30
[   50.490256]  </TASK>
[   50.490710] 
[   50.491160] Allocated by task 222:
[   50.491591]  kasan_save_stack+0x3c/0x60
[   50.492944]  kasan_set_track+0x29/0x40
[   50.493488]  kasan_save_alloc_info+0x22/0x30
[   50.494356]  __kasan_kmalloc+0xb7/0xc0
[   50.495133]  kmalloc_trace+0x4c/0xb0
[   50.495696]  kasan_strings+0x9f/0x510
[   50.496274]  kunit_try_run_case+0x126/0x290
[   50.497014]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.497695]  kthread+0x19e/0x1e0
[   50.498867]  ret_from_fork+0x41/0x70
[   50.499412]  ret_from_fork_asm+0x1b/0x30
[   50.500137] 
[   50.500498] Freed by task 222:
[   50.501122]  kasan_save_stack+0x3c/0x60
[   50.501797]  kasan_set_track+0x29/0x40
[   50.502551]  kasan_save_free_info+0x2f/0x50
[   50.503244]  ____kasan_slab_free+0x172/0x1d0
[   50.504019]  __kasan_slab_free+0x16/0x20
[   50.504601]  __kmem_cache_free+0x190/0x310
[   50.505330]  kfree+0x7c/0x120
[   50.505760]  kasan_strings+0xc3/0x510
[   50.506315]  kunit_try_run_case+0x126/0x290
[   50.506787]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.508226]  kthread+0x19e/0x1e0
[   50.509034]  ret_from_fork+0x41/0x70
[   50.509614]  ret_from_fork_asm+0x1b/0x30
[   50.510403] 
[   50.510707] The buggy address belongs to the object at ffff888102840dc0
[   50.510707]  which belongs to the cache kmalloc-32 of size 32
[   50.512610] The buggy address is located 16 bytes inside of
[   50.512610]  freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[   50.513801] 
[   50.514123] The buggy address belongs to the physical page:
[   50.514799] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.516114] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.516703] page_type: 0xffffffff()
[   50.517432] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.519074] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.520204] page dumped because: kasan: bad access detected
[   50.520749] 
[   50.521092] Memory state around the buggy address:
[   50.522197]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.523248]  ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.524668] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.525600]                                                  ^
[   50.526351]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.527166]  ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.528244] ==================================================================

test log snippet test parser 213

Home

[   51.644401] ==================================================================
[   51.646070] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd4/0x1d0
[   51.647026] Read of size 1 at addr ffff88810148a9e0 by task kunit_try_catch/228
[   51.648544] 
[   51.649158] CPU: 1 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.650166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.651306] Call Trace:
[   51.651880]  <TASK>
[   51.652406]  dump_stack_lvl+0x4e/0x90
[   51.652860]  print_report+0xd2/0x660
[   51.653887]  ? __virt_addr_valid+0x156/0x1e0
[   51.654726]  ? kasan_complete_mode_report_info+0x64/0x200
[   51.655644]  kasan_report+0xff/0x140
[   51.656342]  ? kmalloc_double_kzfree+0xd4/0x1d0
[   51.657176]  ? kmalloc_double_kzfree+0xd4/0x1d0
[   51.658153]  ? kmalloc_double_kzfree+0xd4/0x1d0
[   51.658858]  __kasan_check_byte+0x3d/0x50
[   51.659381]  kfree_sensitive+0x22/0x90
[   51.659873]  kmalloc_double_kzfree+0xd4/0x1d0
[   51.660641]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   51.661217]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   51.662052]  ? kunit_try_run_case+0x11b/0x290
[   51.662855]  kunit_try_run_case+0x126/0x290
[   51.663462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.664192]  ? __kasan_check_write+0x18/0x20
[   51.664929]  ? trace_preempt_on+0x20/0xa0
[   51.665409]  ? __kthread_parkme+0x4f/0xd0
[   51.666151]  ? preempt_count_sub+0x50/0x80
[   51.666740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.667469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.668276]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.669104]  kthread+0x19e/0x1e0
[   51.669659]  ? __pfx_kthread+0x10/0x10
[   51.670317]  ret_from_fork+0x41/0x70
[   51.670975]  ? __pfx_kthread+0x10/0x10
[   51.671482]  ret_from_fork_asm+0x1b/0x30
[   51.672246]  </TASK>
[   51.672635] 
[   51.673010] Allocated by task 228:
[   51.673397]  kasan_save_stack+0x3c/0x60
[   51.674058]  kasan_set_track+0x29/0x40
[   51.674565]  kasan_save_alloc_info+0x22/0x30
[   51.675296]  __kasan_kmalloc+0xb7/0xc0
[   51.675726]  kmalloc_trace+0x4c/0xb0
[   51.676405]  kmalloc_double_kzfree+0x9d/0x1d0
[   51.677088]  kunit_try_run_case+0x126/0x290
[   51.677581]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.678433]  kthread+0x19e/0x1e0
[   51.679089]  ret_from_fork+0x41/0x70
[   51.679520]  ret_from_fork_asm+0x1b/0x30
[   51.680215] 
[   51.680501] Freed by task 228:
[   51.681040]  kasan_save_stack+0x3c/0x60
[   51.681487]  kasan_set_track+0x29/0x40
[   51.681960]  kasan_save_free_info+0x2f/0x50
[   51.682685]  ____kasan_slab_free+0x172/0x1d0
[   51.683430]  __kasan_slab_free+0x16/0x20
[   51.684063]  __kmem_cache_free+0x190/0x310
[   51.684559]  kfree+0x7c/0x120
[   51.685023]  kfree_sensitive+0x67/0x90
[   51.685583]  kmalloc_double_kzfree+0xbd/0x1d0
[   51.686185]  kunit_try_run_case+0x126/0x290
[   51.686800]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.687592]  kthread+0x19e/0x1e0
[   51.688211]  ret_from_fork+0x41/0x70
[   51.688742]  ret_from_fork_asm+0x1b/0x30
[   51.689472] 
[   51.689809] The buggy address belongs to the object at ffff88810148a9e0
[   51.689809]  which belongs to the cache kmalloc-16 of size 16
[   51.690679] The buggy address is located 0 bytes inside of
[   51.690679]  freed 16-byte region [ffff88810148a9e0, ffff88810148a9f0)
[   51.692149] 
[   51.692501] The buggy address belongs to the physical page:
[   51.693130] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[   51.693908] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.694674] page_type: 0xffffffff()
[   51.695267] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.696217] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.696879] page dumped because: kasan: bad access detected
[   51.697554] 
[   51.697889] Memory state around the buggy address:
[   51.698529]  ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[   51.699327]  ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc fa fb fc fc
[   51.700201] >ffff88810148a980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.701084]                                                        ^
[   51.701634]  ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.702564]  ffff88810148aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.703414] ==================================================================

test log snippet test parser 214

Home

[   48.549523] ==================================================================
[   48.550753] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x122/0x2b0
[   48.551585] Read of size 1 at addr ffff8881020676a8 by task kunit_try_catch/184
[   48.552670] 
[   48.553115] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.554278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.555329] Call Trace:
[   48.555973]  <TASK>
[   48.556547]  dump_stack_lvl+0x4e/0x90
[   48.557311]  print_report+0xd2/0x660
[   48.557989]  ? __virt_addr_valid+0x156/0x1e0
[   48.558751]  ? kasan_complete_mode_report_info+0x64/0x200
[   48.559608]  kasan_report+0xff/0x140
[   48.560317]  ? kmalloc_uaf2+0x122/0x2b0
[   48.560857]  ? kmalloc_uaf2+0x122/0x2b0
[   48.561326]  __asan_load1+0x66/0x70
[   48.562235]  kmalloc_uaf2+0x122/0x2b0
[   48.562695]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   48.563482]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   48.564328]  ? __schedule+0x70b/0x1190
[   48.565034]  ? ktime_get_ts64+0x118/0x140
[   48.565771]  kunit_try_run_case+0x126/0x290
[   48.566553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.567338]  ? __kasan_check_write+0x18/0x20
[   48.568111]  ? trace_preempt_on+0x20/0xa0
[   48.568716]  ? __kthread_parkme+0x4f/0xd0
[   48.569556]  ? preempt_count_sub+0x50/0x80
[   48.570290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.571061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.571983]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.572865]  kthread+0x19e/0x1e0
[   48.573567]  ? __pfx_kthread+0x10/0x10
[   48.574144]  ret_from_fork+0x41/0x70
[   48.574414]  ? __pfx_kthread+0x10/0x10
[   48.574666]  ret_from_fork_asm+0x1b/0x30
[   48.575168]  </TASK>
[   48.575631] 
[   48.575936] Allocated by task 184:
[   48.576602]  kasan_save_stack+0x3c/0x60
[   48.577272]  kasan_set_track+0x29/0x40
[   48.577907]  kasan_save_alloc_info+0x22/0x30
[   48.578592]  __kasan_kmalloc+0xb7/0xc0
[   48.579129]  kmalloc_trace+0x4c/0xb0
[   48.579647]  kmalloc_uaf2+0xb0/0x2b0
[   48.580228]  kunit_try_run_case+0x126/0x290
[   48.580822]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.581575]  kthread+0x19e/0x1e0
[   48.582166]  ret_from_fork+0x41/0x70
[   48.582727]  ret_from_fork_asm+0x1b/0x30
[   48.583290] 
[   48.583540] Freed by task 184:
[   48.583972]  kasan_save_stack+0x3c/0x60
[   48.584614]  kasan_set_track+0x29/0x40
[   48.585232]  kasan_save_free_info+0x2f/0x50
[   48.585894]  ____kasan_slab_free+0x172/0x1d0
[   48.586504]  __kasan_slab_free+0x16/0x20
[   48.587121]  __kmem_cache_free+0x190/0x310
[   48.587640]  kfree+0x7c/0x120
[   48.588240]  kmalloc_uaf2+0xd0/0x2b0
[   48.588744]  kunit_try_run_case+0x126/0x290
[   48.589548]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.590279]  kthread+0x19e/0x1e0
[   48.590834]  ret_from_fork+0x41/0x70
[   48.591450]  ret_from_fork_asm+0x1b/0x30
[   48.592055] 
[   48.592365] The buggy address belongs to the object at ffff888102067680
[   48.592365]  which belongs to the cache kmalloc-64 of size 64
[   48.593565] The buggy address is located 40 bytes inside of
[   48.593565]  freed 64-byte region [ffff888102067680, ffff8881020676c0)
[   48.594872] 
[   48.595193] The buggy address belongs to the physical page:
[   48.595710] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[   48.596794] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.597382] page_type: 0xffffffff()
[   48.597914] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   48.598839] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   48.599635] page dumped because: kasan: bad access detected
[   48.600361] 
[   48.600619] Memory state around the buggy address:
[   48.601219]  ffff888102067580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.602120]  ffff888102067600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.602869] >ffff888102067680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.603633]                                   ^
[   48.604290]  ffff888102067700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   48.605131]  ffff888102067780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.605946] ==================================================================

test log snippet test parser 215

Home

[   47.922462] ==================================================================
[   47.923494] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x108/0x250
[   47.924150] Read of size 16 at addr ffff88810148a9c0 by task kunit_try_catch/164
[   47.924879] 
[   47.925371] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.927273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.928198] Call Trace:
[   47.928807]  <TASK>
[   47.929314]  dump_stack_lvl+0x4e/0x90
[   47.930138]  print_report+0xd2/0x660
[   47.930824]  ? __virt_addr_valid+0x156/0x1e0
[   47.931539]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.932511]  kasan_report+0xff/0x140
[   47.933088]  ? kmalloc_uaf_16+0x108/0x250
[   47.933886]  ? kmalloc_uaf_16+0x108/0x250
[   47.934619]  __asan_load16+0x69/0x90
[   47.935344]  kmalloc_uaf_16+0x108/0x250
[   47.935806]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   47.936786]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   47.937556]  ? kunit_try_run_case+0x11b/0x290
[   47.938335]  kunit_try_run_case+0x126/0x290
[   47.939209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.939578]  ? __kasan_check_write+0x18/0x20
[   47.940072]  ? trace_preempt_on+0x20/0xa0
[   47.940890]  ? __kthread_parkme+0x4f/0xd0
[   47.941464]  ? preempt_count_sub+0x50/0x80
[   47.941970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.943380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.944194]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.945125]  kthread+0x19e/0x1e0
[   47.945788]  ? __pfx_kthread+0x10/0x10
[   47.946542]  ret_from_fork+0x41/0x70
[   47.947258]  ? __pfx_kthread+0x10/0x10
[   47.948152]  ret_from_fork_asm+0x1b/0x30
[   47.949099]  </TASK>
[   47.949404] 
[   47.949612] Allocated by task 164:
[   47.950298]  kasan_save_stack+0x3c/0x60
[   47.951423]  kasan_set_track+0x29/0x40
[   47.951964]  kasan_save_alloc_info+0x22/0x30
[   47.952719]  __kasan_kmalloc+0xb7/0xc0
[   47.953213]  kmalloc_trace+0x4c/0xb0
[   47.953471]  kmalloc_uaf_16+0xc9/0x250
[   47.953701]  kunit_try_run_case+0x126/0x290
[   47.954206]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.954876]  kthread+0x19e/0x1e0
[   47.955732]  ret_from_fork+0x41/0x70
[   47.956268]  ret_from_fork_asm+0x1b/0x30
[   47.957501] 
[   47.957889] Freed by task 164:
[   47.958381]  kasan_save_stack+0x3c/0x60
[   47.959056]  kasan_set_track+0x29/0x40
[   47.959648]  kasan_save_free_info+0x2f/0x50
[   47.960304]  ____kasan_slab_free+0x172/0x1d0
[   47.961167]  __kasan_slab_free+0x16/0x20
[   47.961838]  __kmem_cache_free+0x190/0x310
[   47.962424]  kfree+0x7c/0x120
[   47.962979]  kmalloc_uaf_16+0xe9/0x250
[   47.963460]  kunit_try_run_case+0x126/0x290
[   47.964083]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.964753]  kthread+0x19e/0x1e0
[   47.966075]  ret_from_fork+0x41/0x70
[   47.966570]  ret_from_fork_asm+0x1b/0x30
[   47.967309] 
[   47.967509] The buggy address belongs to the object at ffff88810148a9c0
[   47.967509]  which belongs to the cache kmalloc-16 of size 16
[   47.968983] The buggy address is located 0 bytes inside of
[   47.968983]  freed 16-byte region [ffff88810148a9c0, ffff88810148a9d0)
[   47.970400] 
[   47.971144] The buggy address belongs to the physical page:
[   47.972322] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10148a
[   47.973167] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.974474] page_type: 0xffffffff()
[   47.974952] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   47.975624] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   47.976299] page dumped because: kasan: bad access detected
[   47.976567] 
[   47.976691] Memory state around the buggy address:
[   47.977086]  ffff88810148a880: fa fb fc fc fa fb fc fc fa fb fc fc 00 06 fc fc
[   47.978415]  ffff88810148a900: 00 06 fc fc 00 06 fc fc 00 05 fc fc fa fb fc fc
[   47.979591] >ffff88810148a980: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   47.980625]                                            ^
[   47.981319]  ffff88810148aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.982569]  ffff88810148aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.983464] ==================================================================

test log snippet test parser 216

Home

[   48.403033] ==================================================================
[   48.405210] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd5/0x1d0
[   48.405913] Read of size 1 at addr ffff8881024ffa88 by task kunit_try_catch/180
[   48.407471] 
[   48.407819] CPU: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.408861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.410063] Call Trace:
[   48.410760]  <TASK>
[   48.411154]  dump_stack_lvl+0x4e/0x90
[   48.411795]  print_report+0xd2/0x660
[   48.412362]  ? __virt_addr_valid+0x156/0x1e0
[   48.413202]  ? kasan_complete_mode_report_info+0x64/0x200
[   48.414246]  kasan_report+0xff/0x140
[   48.415020]  ? kmalloc_uaf+0xd5/0x1d0
[   48.415561]  ? kmalloc_uaf+0xd5/0x1d0
[   48.415904]  __asan_load1+0x66/0x70
[   48.416541]  kmalloc_uaf+0xd5/0x1d0
[   48.417135]  ? __pfx_kmalloc_uaf+0x10/0x10
[   48.417945]  ? __schedule+0x70b/0x1190
[   48.418640]  ? ktime_get_ts64+0x118/0x140
[   48.419375]  kunit_try_run_case+0x126/0x290
[   48.420514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.421323]  ? __kasan_check_write+0x18/0x20
[   48.421926]  ? trace_preempt_on+0x20/0xa0
[   48.422709]  ? __kthread_parkme+0x4f/0xd0
[   48.423448]  ? preempt_count_sub+0x50/0x80
[   48.424281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.425423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.426163]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.426865]  kthread+0x19e/0x1e0
[   48.427566]  ? __pfx_kthread+0x10/0x10
[   48.428713]  ret_from_fork+0x41/0x70
[   48.429294]  ? __pfx_kthread+0x10/0x10
[   48.429799]  ret_from_fork_asm+0x1b/0x30
[   48.430622]  </TASK>
[   48.431157] 
[   48.431440] Allocated by task 180:
[   48.431868]  kasan_save_stack+0x3c/0x60
[   48.432337]  kasan_set_track+0x29/0x40
[   48.433626]  kasan_save_alloc_info+0x22/0x30
[   48.434392]  __kasan_kmalloc+0xb7/0xc0
[   48.434877]  kmalloc_trace+0x4c/0xb0
[   48.435545]  kmalloc_uaf+0x9d/0x1d0
[   48.436263]  kunit_try_run_case+0x126/0x290
[   48.436811]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.437450]  kthread+0x19e/0x1e0
[   48.437916]  ret_from_fork+0x41/0x70
[   48.439203]  ret_from_fork_asm+0x1b/0x30
[   48.439737] 
[   48.440217] Freed by task 180:
[   48.440614]  kasan_save_stack+0x3c/0x60
[   48.441324]  kasan_set_track+0x29/0x40
[   48.441805]  kasan_save_free_info+0x2f/0x50
[   48.442404]  ____kasan_slab_free+0x172/0x1d0
[   48.443673]  __kasan_slab_free+0x16/0x20
[   48.444141]  __kmem_cache_free+0x190/0x310
[   48.444742]  kfree+0x7c/0x120
[   48.445384]  kmalloc_uaf+0xbd/0x1d0
[   48.446078]  kunit_try_run_case+0x126/0x290
[   48.446598]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.447264]  kthread+0x19e/0x1e0
[   48.447785]  ret_from_fork+0x41/0x70
[   48.448937]  ret_from_fork_asm+0x1b/0x30
[   48.449528] 
[   48.450022] The buggy address belongs to the object at ffff8881024ffa80
[   48.450022]  which belongs to the cache kmalloc-16 of size 16
[   48.451327] The buggy address is located 8 bytes inside of
[   48.451327]  freed 16-byte region [ffff8881024ffa80, ffff8881024ffa90)
[   48.453144] 
[   48.453367] The buggy address belongs to the physical page:
[   48.453795] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024ff
[   48.454791] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.455717] page_type: 0xffffffff()
[   48.457090] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.458104] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.458852] page dumped because: kasan: bad access detected
[   48.459663] 
[   48.460562] Memory state around the buggy address:
[   48.461265]  ffff8881024ff980: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   48.462124]  ffff8881024ffa00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.463100] >ffff8881024ffa80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.463919]                       ^
[   48.464573]  ffff8881024ffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.466052]  ffff8881024ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.466917] ==================================================================

test log snippet test parser 217

Home

[   48.478153] ==================================================================
[   48.479133] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xdb/0x1d0
[   48.480486] Write of size 33 at addr ffff888102067600 by task kunit_try_catch/182
[   48.482086] 
[   48.482325] CPU: 1 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   48.483469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.484404] Call Trace:
[   48.484974]  <TASK>
[   48.485584]  dump_stack_lvl+0x4e/0x90
[   48.486382]  print_report+0xd2/0x660
[   48.487124]  ? __virt_addr_valid+0x156/0x1e0
[   48.487982]  ? kasan_complete_mode_report_info+0x64/0x200
[   48.488720]  kasan_report+0xff/0x140
[   48.489493]  ? kmalloc_uaf_memset+0xdb/0x1d0
[   48.490289]  ? kmalloc_uaf_memset+0xdb/0x1d0
[   48.491304]  kasan_check_range+0x10c/0x1c0
[   48.491980]  __asan_memset+0x27/0x50
[   48.492522]  kmalloc_uaf_memset+0xdb/0x1d0
[   48.493248]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   48.493741]  ? __schedule+0x70b/0x1190
[   48.494342]  ? ktime_get_ts64+0x118/0x140
[   48.494903]  kunit_try_run_case+0x126/0x290
[   48.495608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.496563]  ? __kasan_check_write+0x18/0x20
[   48.497253]  ? trace_preempt_on+0x20/0xa0
[   48.497988]  ? __kthread_parkme+0x4f/0xd0
[   48.499081]  ? preempt_count_sub+0x50/0x80
[   48.499588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.500261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.500892]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.502106]  kthread+0x19e/0x1e0
[   48.502784]  ? __pfx_kthread+0x10/0x10
[   48.503339]  ret_from_fork+0x41/0x70
[   48.503987]  ? __pfx_kthread+0x10/0x10
[   48.504592]  ret_from_fork_asm+0x1b/0x30
[   48.505503]  </TASK>
[   48.506088] 
[   48.506306] Allocated by task 182:
[   48.506676]  kasan_save_stack+0x3c/0x60
[   48.507134]  kasan_set_track+0x29/0x40
[   48.507548]  kasan_save_alloc_info+0x22/0x30
[   48.508969]  __kasan_kmalloc+0xb7/0xc0
[   48.509585]  kmalloc_trace+0x4c/0xb0
[   48.510471]  kmalloc_uaf_memset+0x9d/0x1d0
[   48.511224]  kunit_try_run_case+0x126/0x290
[   48.511742]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.512386]  kthread+0x19e/0x1e0
[   48.513373]  ret_from_fork+0x41/0x70
[   48.514104]  ret_from_fork_asm+0x1b/0x30
[   48.514677] 
[   48.514898] Freed by task 182:
[   48.515867]  kasan_save_stack+0x3c/0x60
[   48.516670]  kasan_set_track+0x29/0x40
[   48.517245]  kasan_save_free_info+0x2f/0x50
[   48.518019]  ____kasan_slab_free+0x172/0x1d0
[   48.519011]  __kasan_slab_free+0x16/0x20
[   48.519709]  __kmem_cache_free+0x190/0x310
[   48.520386]  kfree+0x7c/0x120
[   48.520858]  kmalloc_uaf_memset+0xbd/0x1d0
[   48.521482]  kunit_try_run_case+0x126/0x290
[   48.522139]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.522725]  kthread+0x19e/0x1e0
[   48.523264]  ret_from_fork+0x41/0x70
[   48.523697]  ret_from_fork_asm+0x1b/0x30
[   48.524371] 
[   48.524652] The buggy address belongs to the object at ffff888102067600
[   48.524652]  which belongs to the cache kmalloc-64 of size 64
[   48.525783] The buggy address is located 0 bytes inside of
[   48.525783]  freed 64-byte region [ffff888102067600, ffff888102067640)
[   48.526955] 
[   48.527268] The buggy address belongs to the physical page:
[   48.528028] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102067
[   48.528715] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.529549] page_type: 0xffffffff()
[   48.530145] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   48.530928] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   48.531884] page dumped because: kasan: bad access detected
[   48.532392] 
[   48.532637] Memory state around the buggy address:
[   48.533330]  ffff888102067500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.534254]  ffff888102067580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.534971] >ffff888102067600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.535876]                    ^
[   48.536388]  ffff888102067680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.537024]  ffff888102067700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.537931] ==================================================================

test log snippet test parser 218

Home

[   50.059139] ==================================================================
[   50.060283] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xce/0x1d0
[   50.061908] Read of size 1 at addr ffff88810206c140 by task kunit_try_catch/216
[   50.063038] 
[   50.063362] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.064617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.065839] Call Trace:
[   50.066162]  <TASK>
[   50.066924]  dump_stack_lvl+0x4e/0x90
[   50.067656]  print_report+0xd2/0x660
[   50.068455]  ? __virt_addr_valid+0x156/0x1e0
[   50.069339]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.070261]  kasan_report+0xff/0x140
[   50.070978]  ? kmem_cache_double_destroy+0xce/0x1d0
[   50.071614]  ? kmem_cache_double_destroy+0xce/0x1d0
[   50.072252]  ? kmem_cache_double_destroy+0xce/0x1d0
[   50.072846]  __kasan_check_byte+0x3d/0x50
[   50.074181]  kmem_cache_destroy+0x25/0x170
[   50.075011]  kmem_cache_double_destroy+0xce/0x1d0
[   50.075840]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   50.076720]  ? __schedule+0x70b/0x1190
[   50.077482]  ? ktime_get_ts64+0x118/0x140
[   50.078252]  kunit_try_run_case+0x126/0x290
[   50.078761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.079659]  ? __kasan_check_write+0x18/0x20
[   50.080444]  ? trace_preempt_on+0x20/0xa0
[   50.081129]  ? __kthread_parkme+0x4f/0xd0
[   50.081641]  ? preempt_count_sub+0x50/0x80
[   50.082566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.083367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.084378]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.085061]  kthread+0x19e/0x1e0
[   50.085747]  ? __pfx_kthread+0x10/0x10
[   50.086495]  ret_from_fork+0x41/0x70
[   50.087234]  ? __pfx_kthread+0x10/0x10
[   50.088043]  ret_from_fork_asm+0x1b/0x30
[   50.088747]  </TASK>
[   50.089163] 
[   50.089655] Allocated by task 216:
[   50.090575]  kasan_save_stack+0x3c/0x60
[   50.091307]  kasan_set_track+0x29/0x40
[   50.092005]  kasan_save_alloc_info+0x22/0x30
[   50.092723]  __kasan_slab_alloc+0x91/0xa0
[   50.093202]  kmem_cache_alloc+0x180/0x3b0
[   50.094189]  kmem_cache_create_usercopy+0x13e/0x230
[   50.095143]  kmem_cache_create+0x1a/0x20
[   50.095891]  kmem_cache_double_destroy+0x97/0x1d0
[   50.096683]  kunit_try_run_case+0x126/0x290
[   50.097469]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.098047]  kthread+0x19e/0x1e0
[   50.099359]  ret_from_fork+0x41/0x70
[   50.099830]  ret_from_fork_asm+0x1b/0x30
[   50.100351] 
[   50.100641] Freed by task 216:
[   50.101120]  kasan_save_stack+0x3c/0x60
[   50.101670]  kasan_set_track+0x29/0x40
[   50.102966]  kasan_save_free_info+0x2f/0x50
[   50.103536]  ____kasan_slab_free+0x172/0x1d0
[   50.104146]  __kasan_slab_free+0x16/0x20
[   50.104587]  kmem_cache_free+0x1a7/0x4b0
[   50.105083]  slab_kmem_cache_release+0x2e/0x40
[   50.105741]  kmem_cache_release+0x16/0x20
[   50.106249]  kobject_put+0xf6/0x250
[   50.107424]  sysfs_slab_release+0x24/0x30
[   50.108348]  kmem_cache_destroy+0xd2/0x170
[   50.109174]  kmem_cache_double_destroy+0xb7/0x1d0
[   50.110070]  kunit_try_run_case+0x126/0x290
[   50.110807]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.111693]  kthread+0x19e/0x1e0
[   50.112112]  ret_from_fork+0x41/0x70
[   50.112493]  ret_from_fork_asm+0x1b/0x30
[   50.113521] 
[   50.114014] The buggy address belongs to the object at ffff88810206c140
[   50.114014]  which belongs to the cache kmem_cache of size 208
[   50.115395] The buggy address is located 0 bytes inside of
[   50.115395]  freed 208-byte region [ffff88810206c140, ffff88810206c210)
[   50.117295] 
[   50.117607] The buggy address belongs to the physical page:
[   50.118447] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10206c
[   50.119252] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.119549] page_type: 0xffffffff()
[   50.119806] raw: 0200000000000800 ffff888100041000 dead000000000122 0000000000000000
[   50.121802] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[   50.122569] page dumped because: kasan: bad access detected
[   50.123344] 
[   50.123620] Memory state around the buggy address:
[   50.124490]  ffff88810206c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.125929]  ffff88810206c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   50.126785] >ffff88810206c100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   50.127739]                                            ^
[   50.128536]  ffff88810206c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.129055]  ffff88810206c200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.130191] ==================================================================

test log snippet test parser 219

Home

[   47.726338] ==================================================================
[   47.727403] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xf1/0x2e0
[   47.727770] Read of size 1 at addr ffff888100978000 by task kunit_try_catch/160
[   47.729433] 
[   47.729767] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.730501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.731683] Call Trace:
[   47.732163]  <TASK>
[   47.732526]  dump_stack_lvl+0x4e/0x90
[   47.733232]  print_report+0xd2/0x660
[   47.733871]  ? __virt_addr_valid+0x156/0x1e0
[   47.734567]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.735303]  kasan_report+0xff/0x140
[   47.735966]  ? krealloc_uaf+0xf1/0x2e0
[   47.736598]  ? krealloc_uaf+0xf1/0x2e0
[   47.737384]  ? krealloc_uaf+0xf1/0x2e0
[   47.738231]  __kasan_check_byte+0x3d/0x50
[   47.739124]  krealloc+0x35/0x140
[   47.739689]  krealloc_uaf+0xf1/0x2e0
[   47.740388]  ? __pfx_krealloc_uaf+0x10/0x10
[   47.740969]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.741837]  ? __schedule+0x70b/0x1190
[   47.742631]  ? ktime_get_ts64+0x118/0x140
[   47.743433]  kunit_try_run_case+0x126/0x290
[   47.744436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.745107]  ? __kasan_check_write+0x18/0x20
[   47.745788]  ? trace_preempt_on+0x20/0xa0
[   47.746371]  ? __kthread_parkme+0x4f/0xd0
[   47.747152]  ? preempt_count_sub+0x50/0x80
[   47.747819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.748680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.749564]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.750644]  kthread+0x19e/0x1e0
[   47.751367]  ? __pfx_kthread+0x10/0x10
[   47.752102]  ret_from_fork+0x41/0x70
[   47.752856]  ? __pfx_kthread+0x10/0x10
[   47.753606]  ret_from_fork_asm+0x1b/0x30
[   47.754405]  </TASK>
[   47.754649] 
[   47.755092] Allocated by task 160:
[   47.756136]  kasan_save_stack+0x3c/0x60
[   47.756634]  kasan_set_track+0x29/0x40
[   47.757465]  kasan_save_alloc_info+0x22/0x30
[   47.758097]  __kasan_kmalloc+0xb7/0xc0
[   47.758534]  kmalloc_trace+0x4c/0xb0
[   47.758965]  krealloc_uaf+0xb0/0x2e0
[   47.759616]  kunit_try_run_case+0x126/0x290
[   47.760327]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.761139]  kthread+0x19e/0x1e0
[   47.761706]  ret_from_fork+0x41/0x70
[   47.762298]  ret_from_fork_asm+0x1b/0x30
[   47.763004] 
[   47.763299] Freed by task 160:
[   47.763661]  kasan_save_stack+0x3c/0x60
[   47.764389]  kasan_set_track+0x29/0x40
[   47.765138]  kasan_save_free_info+0x2f/0x50
[   47.765839]  ____kasan_slab_free+0x172/0x1d0
[   47.766446]  __kasan_slab_free+0x16/0x20
[   47.767020]  __kmem_cache_free+0x190/0x310
[   47.767511]  kfree+0x7c/0x120
[   47.768091]  krealloc_uaf+0xd0/0x2e0
[   47.768722]  kunit_try_run_case+0x126/0x290
[   47.769538]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.770346]  kthread+0x19e/0x1e0
[   47.770919]  ret_from_fork+0x41/0x70
[   47.771341]  ret_from_fork_asm+0x1b/0x30
[   47.772159] 
[   47.772492] The buggy address belongs to the object at ffff888100978000
[   47.772492]  which belongs to the cache kmalloc-256 of size 256
[   47.774073] The buggy address is located 0 bytes inside of
[   47.774073]  freed 256-byte region [ffff888100978000, ffff888100978100)
[   47.775264] 
[   47.775654] The buggy address belongs to the physical page:
[   47.776396] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100978
[   47.777495] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.778546] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.779343] page_type: 0xffffffff()
[   47.780012] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.780927] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.781838] page dumped because: kasan: bad access detected
[   47.782602] 
[   47.782965] Memory state around the buggy address:
[   47.783579]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.784402]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.785294] >ffff888100978000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.786116]                    ^
[   47.786543]  ffff888100978080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.787427]  ffff888100978100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.788266] ==================================================================

test log snippet test parser 220

Home

[   47.790326] ==================================================================
[   47.791681] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x131/0x2e0
[   47.792746] Read of size 1 at addr ffff888100978000 by task kunit_try_catch/160
[   47.794067] 
[   47.794485] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   47.795690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.796973] Call Trace:
[   47.797602]  <TASK>
[   47.798039]  dump_stack_lvl+0x4e/0x90
[   47.798820]  print_report+0xd2/0x660
[   47.799565]  ? __virt_addr_valid+0x156/0x1e0
[   47.800412]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.801815]  kasan_report+0xff/0x140
[   47.802462]  ? krealloc_uaf+0x131/0x2e0
[   47.803298]  ? krealloc_uaf+0x131/0x2e0
[   47.804146]  __asan_load1+0x66/0x70
[   47.804696]  krealloc_uaf+0x131/0x2e0
[   47.805260]  ? __pfx_krealloc_uaf+0x10/0x10
[   47.805761]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.806451]  ? __schedule+0x70b/0x1190
[   47.807564]  ? ktime_get_ts64+0x118/0x140
[   47.808195]  kunit_try_run_case+0x126/0x290
[   47.809125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.809787]  ? __kasan_check_write+0x18/0x20
[   47.810476]  ? trace_preempt_on+0x20/0xa0
[   47.811309]  ? __kthread_parkme+0x4f/0xd0
[   47.812510]  ? preempt_count_sub+0x50/0x80
[   47.812971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.813666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.814483]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.815243]  kthread+0x19e/0x1e0
[   47.815848]  ? __pfx_kthread+0x10/0x10
[   47.816629]  ret_from_fork+0x41/0x70
[   47.817552]  ? __pfx_kthread+0x10/0x10
[   47.818163]  ret_from_fork_asm+0x1b/0x30
[   47.819141]  </TASK>
[   47.819574] 
[   47.819990] Allocated by task 160:
[   47.820599]  kasan_save_stack+0x3c/0x60
[   47.821044]  kasan_set_track+0x29/0x40
[   47.821511]  kasan_save_alloc_info+0x22/0x30
[   47.822112]  __kasan_kmalloc+0xb7/0xc0
[   47.822666]  kmalloc_trace+0x4c/0xb0
[   47.823321]  krealloc_uaf+0xb0/0x2e0
[   47.823710]  kunit_try_run_case+0x126/0x290
[   47.824455]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.825375]  kthread+0x19e/0x1e0
[   47.826108]  ret_from_fork+0x41/0x70
[   47.826938]  ret_from_fork_asm+0x1b/0x30
[   47.827520] 
[   47.827973] Freed by task 160:
[   47.828607]  kasan_save_stack+0x3c/0x60
[   47.829117]  kasan_set_track+0x29/0x40
[   47.829684]  kasan_save_free_info+0x2f/0x50
[   47.830467]  ____kasan_slab_free+0x172/0x1d0
[   47.831288]  __kasan_slab_free+0x16/0x20
[   47.832126]  __kmem_cache_free+0x190/0x310
[   47.832874]  kfree+0x7c/0x120
[   47.833493]  krealloc_uaf+0xd0/0x2e0
[   47.834489]  kunit_try_run_case+0x126/0x290
[   47.835025]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.835770]  kthread+0x19e/0x1e0
[   47.836262]  ret_from_fork+0x41/0x70
[   47.836776]  ret_from_fork_asm+0x1b/0x30
[   47.837459] 
[   47.837784] The buggy address belongs to the object at ffff888100978000
[   47.837784]  which belongs to the cache kmalloc-256 of size 256
[   47.839306] The buggy address is located 0 bytes inside of
[   47.839306]  freed 256-byte region [ffff888100978000, ffff888100978100)
[   47.840611] 
[   47.841515] The buggy address belongs to the physical page:
[   47.842137] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100978
[   47.843490] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.844496] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.845307] page_type: 0xffffffff()
[   47.845797] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.847109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.847857] page dumped because: kasan: bad access detected
[   47.848626] 
[   47.849073] Memory state around the buggy address:
[   47.849668]  ffff888100977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.850525]  ffff888100977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.851476] >ffff888100978000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.852707]                    ^
[   47.853160]  ffff888100978080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.854289]  ffff888100978100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.855187] ==================================================================

test log snippet test parser 221

Home

[   49.811685] ==================================================================
[   49.812503] BUG: KASAN: slab-use-after-free in ksize_uaf+0x140/0x310
[   49.813478] Read of size 1 at addr ffff88810284d678 by task kunit_try_catch/210
[   49.814700] 
[   49.815165] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.816250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.817090] Call Trace:
[   49.817561]  <TASK>
[   49.818028]  dump_stack_lvl+0x4e/0x90
[   49.818852]  print_report+0xd2/0x660
[   49.819499]  ? __virt_addr_valid+0x156/0x1e0
[   49.820142]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.821667]  kasan_report+0xff/0x140
[   49.822350]  ? ksize_uaf+0x140/0x310
[   49.822609]  ? ksize_uaf+0x140/0x310
[   49.822959]  __asan_load1+0x66/0x70
[   49.823858]  ksize_uaf+0x140/0x310
[   49.824481]  ? __pfx_ksize_uaf+0x10/0x10
[   49.825145]  ? __schedule+0x70b/0x1190
[   49.826379]  ? ktime_get_ts64+0x118/0x140
[   49.826808]  kunit_try_run_case+0x126/0x290
[   49.827781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.828577]  ? __kasan_check_write+0x18/0x20
[   49.829368]  ? trace_preempt_on+0x20/0xa0
[   49.830482]  ? __kthread_parkme+0x4f/0xd0
[   49.830863]  ? preempt_count_sub+0x50/0x80
[   49.831763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.832384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.833082]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.833753]  kthread+0x19e/0x1e0
[   49.835098]  ? __pfx_kthread+0x10/0x10
[   49.835787]  ret_from_fork+0x41/0x70
[   49.836535]  ? __pfx_kthread+0x10/0x10
[   49.837299]  ret_from_fork_asm+0x1b/0x30
[   49.838450]  </TASK>
[   49.838810] 
[   49.839165] Allocated by task 210:
[   49.839820]  kasan_save_stack+0x3c/0x60
[   49.840532]  kasan_set_track+0x29/0x40
[   49.841022]  kasan_save_alloc_info+0x22/0x30
[   49.841633]  __kasan_kmalloc+0xb7/0xc0
[   49.842144]  kmalloc_trace+0x4c/0xb0
[   49.842531]  ksize_uaf+0x9d/0x310
[   49.842974]  kunit_try_run_case+0x126/0x290
[   49.843607]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.844424]  kthread+0x19e/0x1e0
[   49.845028]  ret_from_fork+0x41/0x70
[   49.845601]  ret_from_fork_asm+0x1b/0x30
[   49.846275] 
[   49.846568] Freed by task 210:
[   49.847048]  kasan_save_stack+0x3c/0x60
[   49.847549]  kasan_set_track+0x29/0x40
[   49.848135]  kasan_save_free_info+0x2f/0x50
[   49.848751]  ____kasan_slab_free+0x172/0x1d0
[   49.849232]  __kasan_slab_free+0x16/0x20
[   49.849881]  __kmem_cache_free+0x190/0x310
[   49.850347]  kfree+0x7c/0x120
[   49.850735]  ksize_uaf+0xbd/0x310
[   49.851325]  kunit_try_run_case+0x126/0x290
[   49.852045]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.852850]  kthread+0x19e/0x1e0
[   49.853348]  ret_from_fork+0x41/0x70
[   49.854010]  ret_from_fork_asm+0x1b/0x30
[   49.854607] 
[   49.854929] The buggy address belongs to the object at ffff88810284d600
[   49.854929]  which belongs to the cache kmalloc-128 of size 128
[   49.856371] The buggy address is located 120 bytes inside of
[   49.856371]  freed 128-byte region [ffff88810284d600, ffff88810284d680)
[   49.857183] 
[   49.857410] The buggy address belongs to the physical page:
[   49.857691] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[   49.858838] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.860127] page_type: 0xffffffff()
[   49.860647] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.861476] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.862171] page dumped because: kasan: bad access detected
[   49.862826] 
[   49.863200] Memory state around the buggy address:
[   49.863887]  ffff88810284d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   49.864690]  ffff88810284d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.865637] >ffff88810284d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.866591]                                                                 ^
[   49.867273]  ffff88810284d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.868121]  ffff88810284d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.869048] ==================================================================

test log snippet test parser 222

Home

[   49.683434] ==================================================================
[   49.684429] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd4/0x310
[   49.685113] Read of size 1 at addr ffff88810284d600 by task kunit_try_catch/210
[   49.686091] 
[   49.686569] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.687269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.688540] Call Trace:
[   49.689153]  <TASK>
[   49.689793]  dump_stack_lvl+0x4e/0x90
[   49.690325]  print_report+0xd2/0x660
[   49.691253]  ? __virt_addr_valid+0x156/0x1e0
[   49.692116]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.693014]  kasan_report+0xff/0x140
[   49.693475]  ? ksize_uaf+0xd4/0x310
[   49.694054]  ? ksize_uaf+0xd4/0x310
[   49.694530]  ? ksize_uaf+0xd4/0x310
[   49.695102]  __kasan_check_byte+0x3d/0x50
[   49.695601]  ksize+0x20/0x60
[   49.695983]  ksize_uaf+0xd4/0x310
[   49.696530]  ? __pfx_ksize_uaf+0x10/0x10
[   49.697145]  ? __schedule+0x70b/0x1190
[   49.697746]  ? ktime_get_ts64+0x118/0x140
[   49.698405]  kunit_try_run_case+0x126/0x290
[   49.698960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.699635]  ? __kasan_check_write+0x18/0x20
[   49.700303]  ? trace_preempt_on+0x20/0xa0
[   49.701597]  ? __kthread_parkme+0x4f/0xd0
[   49.702065]  ? preempt_count_sub+0x50/0x80
[   49.702742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.703609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.704583]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.705578]  kthread+0x19e/0x1e0
[   49.706644]  ? __pfx_kthread+0x10/0x10
[   49.707293]  ret_from_fork+0x41/0x70
[   49.707753]  ? __pfx_kthread+0x10/0x10
[   49.708265]  ret_from_fork_asm+0x1b/0x30
[   49.708780]  </TASK>
[   49.709722] 
[   49.709928] Allocated by task 210:
[   49.710235]  kasan_save_stack+0x3c/0x60
[   49.710647]  kasan_set_track+0x29/0x40
[   49.711921]  kasan_save_alloc_info+0x22/0x30
[   49.712421]  __kasan_kmalloc+0xb7/0xc0
[   49.712853]  kmalloc_trace+0x4c/0xb0
[   49.713326]  ksize_uaf+0x9d/0x310
[   49.713912]  kunit_try_run_case+0x126/0x290
[   49.714390]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.714710]  kthread+0x19e/0x1e0
[   49.715238]  ret_from_fork+0x41/0x70
[   49.715800]  ret_from_fork_asm+0x1b/0x30
[   49.716779] 
[   49.717403] Freed by task 210:
[   49.718073]  kasan_save_stack+0x3c/0x60
[   49.718734]  kasan_set_track+0x29/0x40
[   49.719379]  kasan_save_free_info+0x2f/0x50
[   49.719973]  ____kasan_slab_free+0x172/0x1d0
[   49.720745]  __kasan_slab_free+0x16/0x20
[   49.721517]  __kmem_cache_free+0x190/0x310
[   49.722296]  kfree+0x7c/0x120
[   49.722946]  ksize_uaf+0xbd/0x310
[   49.723547]  kunit_try_run_case+0x126/0x290
[   49.724255]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.725140]  kthread+0x19e/0x1e0
[   49.725712]  ret_from_fork+0x41/0x70
[   49.726452]  ret_from_fork_asm+0x1b/0x30
[   49.727449] 
[   49.727842] The buggy address belongs to the object at ffff88810284d600
[   49.727842]  which belongs to the cache kmalloc-128 of size 128
[   49.728965] The buggy address is located 0 bytes inside of
[   49.728965]  freed 128-byte region [ffff88810284d600, ffff88810284d680)
[   49.730621] 
[   49.730979] The buggy address belongs to the physical page:
[   49.731864] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[   49.733138] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.733935] page_type: 0xffffffff()
[   49.734557] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.735498] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.736490] page dumped because: kasan: bad access detected
[   49.737285] 
[   49.737484] Memory state around the buggy address:
[   49.738242]  ffff88810284d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   49.739247]  ffff88810284d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.739987] >ffff88810284d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.740750]                    ^
[   49.741943]  ffff88810284d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.742644]  ffff88810284d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.743391] ==================================================================

test log snippet test parser 223

Home

[   49.744747] ==================================================================
[   49.745350] BUG: KASAN: slab-use-after-free in ksize_uaf+0x108/0x310
[   49.747131] Read of size 1 at addr ffff88810284d600 by task kunit_try_catch/210
[   49.748008] 
[   49.748334] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.749304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.750981] Call Trace:
[   49.751279]  <TASK>
[   49.751650]  dump_stack_lvl+0x4e/0x90
[   49.752335]  print_report+0xd2/0x660
[   49.752817]  ? __virt_addr_valid+0x156/0x1e0
[   49.753521]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.755135]  kasan_report+0xff/0x140
[   49.755653]  ? ksize_uaf+0x108/0x310
[   49.756152]  ? ksize_uaf+0x108/0x310
[   49.756653]  __asan_load1+0x66/0x70
[   49.757194]  ksize_uaf+0x108/0x310
[   49.757628]  ? __pfx_ksize_uaf+0x10/0x10
[   49.758261]  ? __schedule+0x70b/0x1190
[   49.759045]  ? ktime_get_ts64+0x118/0x140
[   49.759683]  kunit_try_run_case+0x126/0x290
[   49.761165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.761737]  ? __kasan_check_write+0x18/0x20
[   49.762311]  ? trace_preempt_on+0x20/0xa0
[   49.763268]  ? __kthread_parkme+0x4f/0xd0
[   49.763902]  ? preempt_count_sub+0x50/0x80
[   49.764666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.765474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.767205]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.768019]  kthread+0x19e/0x1e0
[   49.768503]  ? __pfx_kthread+0x10/0x10
[   49.769167]  ret_from_fork+0x41/0x70
[   49.769707]  ? __pfx_kthread+0x10/0x10
[   49.770372]  ret_from_fork_asm+0x1b/0x30
[   49.771338]  </TASK>
[   49.771591] 
[   49.771919] Allocated by task 210:
[   49.772879]  kasan_save_stack+0x3c/0x60
[   49.773590]  kasan_set_track+0x29/0x40
[   49.774064]  kasan_save_alloc_info+0x22/0x30
[   49.774715]  __kasan_kmalloc+0xb7/0xc0
[   49.775260]  kmalloc_trace+0x4c/0xb0
[   49.775661]  ksize_uaf+0x9d/0x310
[   49.776416]  kunit_try_run_case+0x126/0x290
[   49.777436]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.778286]  kthread+0x19e/0x1e0
[   49.779569]  ret_from_fork+0x41/0x70
[   49.780342]  ret_from_fork_asm+0x1b/0x30
[   49.781071] 
[   49.781548] Freed by task 210:
[   49.782218]  kasan_save_stack+0x3c/0x60
[   49.782655]  kasan_set_track+0x29/0x40
[   49.783948]  kasan_save_free_info+0x2f/0x50
[   49.784398]  ____kasan_slab_free+0x172/0x1d0
[   49.785317]  __kasan_slab_free+0x16/0x20
[   49.785941]  __kmem_cache_free+0x190/0x310
[   49.786530]  kfree+0x7c/0x120
[   49.787332]  ksize_uaf+0xbd/0x310
[   49.788089]  kunit_try_run_case+0x126/0x290
[   49.788747]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.789563]  kthread+0x19e/0x1e0
[   49.790090]  ret_from_fork+0x41/0x70
[   49.790699]  ret_from_fork_asm+0x1b/0x30
[   49.791733] 
[   49.792041] The buggy address belongs to the object at ffff88810284d600
[   49.792041]  which belongs to the cache kmalloc-128 of size 128
[   49.793139] The buggy address is located 0 bytes inside of
[   49.793139]  freed 128-byte region [ffff88810284d600, ffff88810284d680)
[   49.794866] 
[   49.795816] The buggy address belongs to the physical page:
[   49.796415] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284d
[   49.797426] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.798166] page_type: 0xffffffff()
[   49.798576] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.800298] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.801002] page dumped because: kasan: bad access detected
[   49.801602] 
[   49.801875] Memory state around the buggy address:
[   49.803158]  ffff88810284d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   49.804448]  ffff88810284d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.805415] >ffff88810284d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.806344]                    ^
[   49.807339]  ffff88810284d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.808484]  ffff88810284d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.809346] ==================================================================

test log snippet test parser 224

Home

[   51.780503] ==================================================================
[   51.781584] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x27/0x40
[   51.782964] Read of size 4 at addr ffff888102065b00 by task swapper/1/0
[   51.783712] 
[   51.784119] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.6.72-rc1 #1
[   51.785075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.786094] Call Trace:
[   51.786486]  <IRQ>
[   51.786824]  dump_stack_lvl+0x4e/0x90
[   51.787508]  print_report+0xd2/0x660
[   51.788131]  ? __virt_addr_valid+0x156/0x1e0
[   51.789048]  ? kasan_complete_mode_report_info+0x64/0x200
[   51.789696]  kasan_report+0xff/0x140
[   51.790154]  ? rcu_uaf_reclaim+0x27/0x40
[   51.790600]  ? rcu_uaf_reclaim+0x27/0x40
[   51.791324]  ? __pfx_rcu_uaf_reclaim+0x10/0x10
[   51.792076]  __asan_load4+0x85/0xb0
[   51.792673]  rcu_uaf_reclaim+0x27/0x40
[   51.793334]  rcu_core+0x4be/0x1020
[   51.793965]  ? rcu_core+0x3ef/0x1020
[   51.794627]  ? __pfx_rcu_core+0x10/0x10
[   51.795296]  rcu_core_si+0x12/0x20
[   51.795717]  handle_softirqs+0x195/0x520
[   51.796218]  ? __pfx_handle_softirqs+0x10/0x10
[   51.796716]  irq_exit_rcu+0x92/0xb0
[   51.797983]  sysvec_apic_timer_interrupt+0x80/0xa0
[   51.798538]  </IRQ>
[   51.798922]  <TASK>
[   51.799296]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   51.800152] RIP: 0010:default_idle+0xf/0x20
[   51.801049] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d d3 e3 28 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   51.802887] RSP: 0000:ffff88810082fde8 EFLAGS: 00010206
[   51.803795] RAX: ffff88815b5342c0 RBX: ffff888100811f00 RCX: ffffffff98dc96d8
[   51.804618] RDX: ffffed102b6a6859 RSI: 0000000000000004 RDI: 000000000000e794
[   51.805462] RBP: ffff88810082fdf0 R08: 0000000000000001 R09: ffffed102b6a6858
[   51.806281] R10: ffff88815b5342c3 R11: ffffffff9700325b R12: 0000000000000001
[   51.807157] R13: ffffffff9a814c50 R14: 0000000000000000 R15: ffff888100811f00
[   51.808061]  ? ret_from_fork_asm+0x1b/0x30
[   51.808658]  ? ct_kernel_exit.constprop.0+0xa8/0xd0
[   51.809396]  ? arch_cpu_idle+0xd/0x20
[   51.810056]  default_idle_call+0x42/0x70
[   51.810597]  do_idle+0x2ba/0x310
[   51.811205]  ? __pfx_do_idle+0x10/0x10
[   51.811797]  ? _raw_spin_unlock_irqrestore+0x31/0x60
[   51.812430]  ? complete+0xb8/0xd0
[   51.813024]  cpu_startup_entry+0x3c/0x40
[   51.813559]  start_secondary+0x1ac/0x1d0
[   51.814215]  ? __pfx_start_secondary+0x10/0x10
[   51.814794]  secondary_startup_64_no_verify+0x178/0x17b
[   51.815562]  </TASK>
[   51.815897] 
[   51.816202] Allocated by task 230:
[   51.816641]  kasan_save_stack+0x3c/0x60
[   51.817136]  kasan_set_track+0x29/0x40
[   51.817696]  kasan_save_alloc_info+0x22/0x30
[   51.818325]  __kasan_kmalloc+0xb7/0xc0
[   51.818892]  kmalloc_trace+0x4c/0xb0
[   51.819475]  rcu_uaf+0x9b/0x1e0
[   51.820013]  kunit_try_run_case+0x126/0x290
[   51.820514]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.821300]  kthread+0x19e/0x1e0
[   51.821797]  ret_from_fork+0x41/0x70
[   51.822279]  ret_from_fork_asm+0x1b/0x30
[   51.822915] 
[   51.823267] Freed by task 0:
[   51.823675]  kasan_save_stack+0x3c/0x60
[   51.824160]  kasan_set_track+0x29/0x40
[   51.824713]  kasan_save_free_info+0x2f/0x50
[   51.825373]  ____kasan_slab_free+0x172/0x1d0
[   51.825947]  __kasan_slab_free+0x16/0x20
[   51.826530]  __kmem_cache_free+0x190/0x310
[   51.827167]  kfree+0x7c/0x120
[   51.827625]  rcu_uaf_reclaim+0x1f/0x40
[   51.828131]  rcu_core+0x4be/0x1020
[   51.828667]  rcu_core_si+0x12/0x20
[   51.829255]  handle_softirqs+0x195/0x520
[   51.829858]  irq_exit_rcu+0x92/0xb0
[   51.830408]  sysvec_apic_timer_interrupt+0x80/0xa0
[   51.831043]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   51.831730] 
[   51.832124] Last potentially related work creation:
[   51.832668]  kasan_save_stack+0x3c/0x60
[   51.833329]  __kasan_record_aux_stack+0xb3/0xd0
[   51.833923]  kasan_record_aux_stack_noalloc+0xf/0x20
[   51.834659]  __call_rcu_common.constprop.0+0x4c/0x5e0
[   51.835405]  call_rcu+0x12/0x20
[   51.835936]  rcu_uaf+0xdd/0x1e0
[   51.836366]  kunit_try_run_case+0x126/0x290
[   51.837041]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.837815]  kthread+0x19e/0x1e0
[   51.838261]  ret_from_fork+0x41/0x70
[   51.838855]  ret_from_fork_asm+0x1b/0x30
[   51.839470] 
[   51.839795] The buggy address belongs to the object at ffff888102065b00
[   51.839795]  which belongs to the cache kmalloc-32 of size 32
[   51.841067] The buggy address is located 0 bytes inside of
[   51.841067]  freed 32-byte region [ffff888102065b00, ffff888102065b20)
[   51.842203] 
[   51.842501] The buggy address belongs to the physical page:
[   51.843252] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102065
[   51.844242] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.844864] page_type: 0xffffffff()
[   51.845391] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   51.846247] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   51.847096] page dumped because: kasan: bad access detected
[   51.847621] 
[   51.847966] Memory state around the buggy address:
[   51.848465]  ffff888102065a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.849305]  ffff888102065a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.850097] >ffff888102065b00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   51.850859]                    ^
[   51.851314]  ffff888102065b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.852086]  ffff888102065c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.852866] ==================================================================

test log snippet test parser 225

Home

[   50.262529] ==================================================================
[   50.263734] BUG: KASAN: slab-use-after-free in strchr+0x18/0x60
[   50.264750] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[   50.265582] 
[   50.265920] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.267218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.268149] Call Trace:
[   50.268438]  <TASK>
[   50.268715]  dump_stack_lvl+0x4e/0x90
[   50.269399]  print_report+0xd2/0x660
[   50.269900]  ? __virt_addr_valid+0x156/0x1e0
[   50.270627]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.271518]  kasan_report+0xff/0x140
[   50.272129]  ? strchr+0x18/0x60
[   50.272616]  ? strchr+0x18/0x60
[   50.273225]  __asan_load1+0x66/0x70
[   50.273869]  strchr+0x18/0x60
[   50.274606]  kasan_strings+0xdf/0x510
[   50.275740]  ? __pfx_kasan_strings+0x10/0x10
[   50.276386]  ? __schedule+0x70b/0x1190
[   50.277258]  ? ktime_get_ts64+0x118/0x140
[   50.278122]  kunit_try_run_case+0x126/0x290
[   50.278825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.279648]  ? __kasan_check_write+0x18/0x20
[   50.280375]  ? trace_preempt_on+0x20/0xa0
[   50.281582]  ? __kthread_parkme+0x4f/0xd0
[   50.282410]  ? preempt_count_sub+0x50/0x80
[   50.283420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.284031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.285053]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.285590]  kthread+0x19e/0x1e0
[   50.286701]  ? __pfx_kthread+0x10/0x10
[   50.287522]  ret_from_fork+0x41/0x70
[   50.288314]  ? __pfx_kthread+0x10/0x10
[   50.289206]  ret_from_fork_asm+0x1b/0x30
[   50.289754]  </TASK>
[   50.291055] 
[   50.291497] Allocated by task 222:
[   50.292280]  kasan_save_stack+0x3c/0x60
[   50.292687]  kasan_set_track+0x29/0x40
[   50.293508]  kasan_save_alloc_info+0x22/0x30
[   50.294279]  __kasan_kmalloc+0xb7/0xc0
[   50.295011]  kmalloc_trace+0x4c/0xb0
[   50.295650]  kasan_strings+0x9f/0x510
[   50.296094]  kunit_try_run_case+0x126/0x290
[   50.296786]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.297677]  kthread+0x19e/0x1e0
[   50.298501]  ret_from_fork+0x41/0x70
[   50.299202]  ret_from_fork_asm+0x1b/0x30
[   50.299466] 
[   50.299713] Freed by task 222:
[   50.300230]  kasan_save_stack+0x3c/0x60
[   50.301023]  kasan_set_track+0x29/0x40
[   50.301506]  kasan_save_free_info+0x2f/0x50
[   50.302340]  ____kasan_slab_free+0x172/0x1d0
[   50.303404]  __kasan_slab_free+0x16/0x20
[   50.304436]  __kmem_cache_free+0x190/0x310
[   50.305184]  kfree+0x7c/0x120
[   50.305746]  kasan_strings+0xc3/0x510
[   50.306440]  kunit_try_run_case+0x126/0x290
[   50.307711]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.308483]  kthread+0x19e/0x1e0
[   50.309206]  ret_from_fork+0x41/0x70
[   50.310188]  ret_from_fork_asm+0x1b/0x30
[   50.311312] 
[   50.311549] The buggy address belongs to the object at ffff888102840dc0
[   50.311549]  which belongs to the cache kmalloc-32 of size 32
[   50.313259] The buggy address is located 16 bytes inside of
[   50.313259]  freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[   50.314857] 
[   50.315335] The buggy address belongs to the physical page:
[   50.316121] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.317820] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.318443] page_type: 0xffffffff()
[   50.319203] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.320105] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.321466] page dumped because: kasan: bad access detected
[   50.322174] 
[   50.322366] Memory state around the buggy address:
[   50.322671]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.323450]  ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.324299] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.325787]                                                  ^
[   50.326426]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.327010]  ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.327684] ==================================================================

test log snippet test parser 226

Home

[   50.397387] ==================================================================
[   50.398238] BUG: KASAN: slab-use-after-free in strcmp+0x26/0x60
[   50.399072] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[   50.399952] 
[   50.400433] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.401604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.402763] Call Trace:
[   50.403844]  <TASK>
[   50.404414]  dump_stack_lvl+0x4e/0x90
[   50.405388]  print_report+0xd2/0x660
[   50.406118]  ? __virt_addr_valid+0x156/0x1e0
[   50.406734]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.407500]  kasan_report+0xff/0x140
[   50.408310]  ? strcmp+0x26/0x60
[   50.408643]  ? strcmp+0x26/0x60
[   50.409400]  __asan_load1+0x66/0x70
[   50.410049]  strcmp+0x26/0x60
[   50.410563]  kasan_strings+0x161/0x510
[   50.411203]  ? __pfx_kasan_strings+0x10/0x10
[   50.411939]  ? __schedule+0x70b/0x1190
[   50.412545]  ? ktime_get_ts64+0x118/0x140
[   50.413478]  kunit_try_run_case+0x126/0x290
[   50.414222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.414659]  ? __kasan_check_write+0x18/0x20
[   50.415523]  ? trace_preempt_on+0x20/0xa0
[   50.416509]  ? __kthread_parkme+0x4f/0xd0
[   50.417251]  ? preempt_count_sub+0x50/0x80
[   50.417854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.418638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.420129]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.420934]  kthread+0x19e/0x1e0
[   50.421620]  ? __pfx_kthread+0x10/0x10
[   50.422301]  ret_from_fork+0x41/0x70
[   50.423068]  ? __pfx_kthread+0x10/0x10
[   50.423606]  ret_from_fork_asm+0x1b/0x30
[   50.424882]  </TASK>
[   50.425226] 
[   50.425513] Allocated by task 222:
[   50.426231]  kasan_save_stack+0x3c/0x60
[   50.426712]  kasan_set_track+0x29/0x40
[   50.427465]  kasan_save_alloc_info+0x22/0x30
[   50.428164]  __kasan_kmalloc+0xb7/0xc0
[   50.428761]  kmalloc_trace+0x4c/0xb0
[   50.429355]  kasan_strings+0x9f/0x510
[   50.430645]  kunit_try_run_case+0x126/0x290
[   50.431114]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.432163]  kthread+0x19e/0x1e0
[   50.432734]  ret_from_fork+0x41/0x70
[   50.433490]  ret_from_fork_asm+0x1b/0x30
[   50.434129] 
[   50.434338] Freed by task 222:
[   50.434848]  kasan_save_stack+0x3c/0x60
[   50.435251]  kasan_set_track+0x29/0x40
[   50.435814]  kasan_save_free_info+0x2f/0x50
[   50.436405]  ____kasan_slab_free+0x172/0x1d0
[   50.437029]  __kasan_slab_free+0x16/0x20
[   50.437551]  __kmem_cache_free+0x190/0x310
[   50.438670]  kfree+0x7c/0x120
[   50.439380]  kasan_strings+0xc3/0x510
[   50.440078]  kunit_try_run_case+0x126/0x290
[   50.440464]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.441795]  kthread+0x19e/0x1e0
[   50.442511]  ret_from_fork+0x41/0x70
[   50.443317]  ret_from_fork_asm+0x1b/0x30
[   50.444486] 
[   50.444743] The buggy address belongs to the object at ffff888102840dc0
[   50.444743]  which belongs to the cache kmalloc-32 of size 32
[   50.446567] The buggy address is located 16 bytes inside of
[   50.446567]  freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[   50.448537] 
[   50.448839] The buggy address belongs to the physical page:
[   50.449947] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.451719] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.452326] page_type: 0xffffffff()
[   50.453085] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.453868] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.454611] page dumped because: kasan: bad access detected
[   50.455645] 
[   50.456249] Memory state around the buggy address:
[   50.457190]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.458570]  ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.459474] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.460149]                                                  ^
[   50.460702]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.461412]  ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.462262] ==================================================================

test log snippet test parser 227

Home

[   50.531292] ==================================================================
[   50.532198] BUG: KASAN: slab-use-after-free in strlen+0x13/0x50
[   50.532880] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[   50.533703] 
[   50.533970] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.534844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.535976] Call Trace:
[   50.536400]  <TASK>
[   50.537078]  dump_stack_lvl+0x4e/0x90
[   50.537711]  print_report+0xd2/0x660
[   50.538520]  ? __virt_addr_valid+0x156/0x1e0
[   50.540027]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.540754]  kasan_report+0xff/0x140
[   50.541464]  ? strlen+0x13/0x50
[   50.541955]  ? strlen+0x13/0x50
[   50.542666]  __asan_load1+0x66/0x70
[   50.543314]  strlen+0x13/0x50
[   50.544079]  kasan_strings+0x1dc/0x510
[   50.544582]  ? __pfx_kasan_strings+0x10/0x10
[   50.545870]  ? __schedule+0x70b/0x1190
[   50.546391]  ? ktime_get_ts64+0x118/0x140
[   50.546680]  kunit_try_run_case+0x126/0x290
[   50.547724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.548612]  ? __kasan_check_write+0x18/0x20
[   50.549501]  ? trace_preempt_on+0x20/0xa0
[   50.550401]  ? __kthread_parkme+0x4f/0xd0
[   50.551361]  ? preempt_count_sub+0x50/0x80
[   50.552133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.552766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.553533]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.554542]  kthread+0x19e/0x1e0
[   50.555303]  ? __pfx_kthread+0x10/0x10
[   50.555740]  ret_from_fork+0x41/0x70
[   50.556321]  ? __pfx_kthread+0x10/0x10
[   50.556903]  ret_from_fork_asm+0x1b/0x30
[   50.558129]  </TASK>
[   50.558444] 
[   50.558677] Allocated by task 222:
[   50.559146]  kasan_save_stack+0x3c/0x60
[   50.559683]  kasan_set_track+0x29/0x40
[   50.560177]  kasan_save_alloc_info+0x22/0x30
[   50.560751]  __kasan_kmalloc+0xb7/0xc0
[   50.561274]  kmalloc_trace+0x4c/0xb0
[   50.561767]  kasan_strings+0x9f/0x510
[   50.562518]  kunit_try_run_case+0x126/0x290
[   50.563268]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.564124]  kthread+0x19e/0x1e0
[   50.564657]  ret_from_fork+0x41/0x70
[   50.565290]  ret_from_fork_asm+0x1b/0x30
[   50.565872] 
[   50.566121] Freed by task 222:
[   50.566560]  kasan_save_stack+0x3c/0x60
[   50.568037]  kasan_set_track+0x29/0x40
[   50.568553]  kasan_save_free_info+0x2f/0x50
[   50.569210]  ____kasan_slab_free+0x172/0x1d0
[   50.569929]  __kasan_slab_free+0x16/0x20
[   50.570576]  __kmem_cache_free+0x190/0x310
[   50.571060]  kfree+0x7c/0x120
[   50.571680]  kasan_strings+0xc3/0x510
[   50.572710]  kunit_try_run_case+0x126/0x290
[   50.573160]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.574287]  kthread+0x19e/0x1e0
[   50.574694]  ret_from_fork+0x41/0x70
[   50.575265]  ret_from_fork_asm+0x1b/0x30
[   50.575763] 
[   50.576458] The buggy address belongs to the object at ffff888102840dc0
[   50.576458]  which belongs to the cache kmalloc-32 of size 32
[   50.577740] The buggy address is located 16 bytes inside of
[   50.577740]  freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[   50.578666] 
[   50.578881] The buggy address belongs to the physical page:
[   50.580098] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.581487] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.582233] page_type: 0xffffffff()
[   50.582641] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.584376] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.585416] page dumped because: kasan: bad access detected
[   50.586275] 
[   50.586781] Memory state around the buggy address:
[   50.587309]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.588881]  ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.590269] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.590906]                                                  ^
[   50.591941]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.593017]  ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.593706] ==================================================================

test log snippet test parser 228

Home

[   50.595354] ==================================================================
[   50.596424] BUG: KASAN: slab-use-after-free in strnlen+0x31/0x50
[   50.598017] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[   50.599102] 
[   50.599402] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.600116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.601510] Call Trace:
[   50.602426]  <TASK>
[   50.602988]  dump_stack_lvl+0x4e/0x90
[   50.603890]  print_report+0xd2/0x660
[   50.604486]  ? __virt_addr_valid+0x156/0x1e0
[   50.605033]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.605680]  kasan_report+0xff/0x140
[   50.606360]  ? strnlen+0x31/0x50
[   50.607126]  ? strnlen+0x31/0x50
[   50.607727]  __asan_load1+0x66/0x70
[   50.609097]  strnlen+0x31/0x50
[   50.609594]  kasan_strings+0x21b/0x510
[   50.610312]  ? __pfx_kasan_strings+0x10/0x10
[   50.610978]  ? __schedule+0x70b/0x1190
[   50.611587]  ? ktime_get_ts64+0x118/0x140
[   50.612348]  kunit_try_run_case+0x126/0x290
[   50.613025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.613742]  ? __kasan_check_write+0x18/0x20
[   50.615075]  ? trace_preempt_on+0x20/0xa0
[   50.615541]  ? __kthread_parkme+0x4f/0xd0
[   50.616229]  ? preempt_count_sub+0x50/0x80
[   50.616773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.617410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.618300]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.619212]  kthread+0x19e/0x1e0
[   50.619702]  ? __pfx_kthread+0x10/0x10
[   50.620819]  ret_from_fork+0x41/0x70
[   50.621687]  ? __pfx_kthread+0x10/0x10
[   50.622273]  ret_from_fork_asm+0x1b/0x30
[   50.623632]  </TASK>
[   50.623958] 
[   50.624408] Allocated by task 222:
[   50.625265]  kasan_save_stack+0x3c/0x60
[   50.625670]  kasan_set_track+0x29/0x40
[   50.626035]  kasan_save_alloc_info+0x22/0x30
[   50.626529]  __kasan_kmalloc+0xb7/0xc0
[   50.627533]  kmalloc_trace+0x4c/0xb0
[   50.628265]  kasan_strings+0x9f/0x510
[   50.628729]  kunit_try_run_case+0x126/0x290
[   50.629205]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.630303]  kthread+0x19e/0x1e0
[   50.631462]  ret_from_fork+0x41/0x70
[   50.632256]  ret_from_fork_asm+0x1b/0x30
[   50.632520] 
[   50.632648] Freed by task 222:
[   50.632902]  kasan_save_stack+0x3c/0x60
[   50.634287]  kasan_set_track+0x29/0x40
[   50.634908]  kasan_save_free_info+0x2f/0x50
[   50.635316]  ____kasan_slab_free+0x172/0x1d0
[   50.635806]  __kasan_slab_free+0x16/0x20
[   50.636335]  __kmem_cache_free+0x190/0x310
[   50.636948]  kfree+0x7c/0x120
[   50.637508]  kasan_strings+0xc3/0x510
[   50.638381]  kunit_try_run_case+0x126/0x290
[   50.639545]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.640581]  kthread+0x19e/0x1e0
[   50.641676]  ret_from_fork+0x41/0x70
[   50.642425]  ret_from_fork_asm+0x1b/0x30
[   50.643172] 
[   50.643471] The buggy address belongs to the object at ffff888102840dc0
[   50.643471]  which belongs to the cache kmalloc-32 of size 32
[   50.645038] The buggy address is located 16 bytes inside of
[   50.645038]  freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[   50.646664] 
[   50.646978] The buggy address belongs to the physical page:
[   50.647642] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.649258] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.650068] page_type: 0xffffffff()
[   50.650575] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.651612] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.653084] page dumped because: kasan: bad access detected
[   50.653763] 
[   50.654294] Memory state around the buggy address:
[   50.655124]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.656123]  ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.657137] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.658199]                                                  ^
[   50.659277]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.660213]  ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.660542] ==================================================================

test log snippet test parser 229

Home

[   50.329433] ==================================================================
[   50.330557] BUG: KASAN: slab-use-after-free in strrchr+0x1e/0x40
[   50.331395] Read of size 1 at addr ffff888102840dd0 by task kunit_try_catch/222
[   50.332623] 
[   50.333013] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   50.334508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.335473] Call Trace:
[   50.335739]  <TASK>
[   50.336425]  dump_stack_lvl+0x4e/0x90
[   50.337325]  print_report+0xd2/0x660
[   50.337830]  ? __virt_addr_valid+0x156/0x1e0
[   50.338690]  ? kasan_complete_mode_report_info+0x64/0x200
[   50.339480]  kasan_report+0xff/0x140
[   50.340414]  ? strrchr+0x1e/0x40
[   50.341106]  ? strrchr+0x1e/0x40
[   50.341724]  __asan_load1+0x66/0x70
[   50.342255]  strrchr+0x1e/0x40
[   50.342683]  kasan_strings+0x11f/0x510
[   50.343220]  ? __pfx_kasan_strings+0x10/0x10
[   50.344244]  ? __schedule+0x70b/0x1190
[   50.344630]  ? ktime_get_ts64+0x118/0x140
[   50.345534]  kunit_try_run_case+0x126/0x290
[   50.346339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.346981]  ? __kasan_check_write+0x18/0x20
[   50.347661]  ? trace_preempt_on+0x20/0xa0
[   50.348321]  ? __kthread_parkme+0x4f/0xd0
[   50.349361]  ? preempt_count_sub+0x50/0x80
[   50.349688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.350510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.351452]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.352296]  kthread+0x19e/0x1e0
[   50.352551]  ? __pfx_kthread+0x10/0x10
[   50.352898]  ret_from_fork+0x41/0x70
[   50.353579]  ? __pfx_kthread+0x10/0x10
[   50.354300]  ret_from_fork_asm+0x1b/0x30
[   50.354798]  </TASK>
[   50.355272] 
[   50.355625] Allocated by task 222:
[   50.356866]  kasan_save_stack+0x3c/0x60
[   50.357669]  kasan_set_track+0x29/0x40
[   50.358303]  kasan_save_alloc_info+0x22/0x30
[   50.359074]  __kasan_kmalloc+0xb7/0xc0
[   50.359426]  kmalloc_trace+0x4c/0xb0
[   50.359869]  kasan_strings+0x9f/0x510
[   50.360471]  kunit_try_run_case+0x126/0x290
[   50.361170]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.362037]  kthread+0x19e/0x1e0
[   50.362621]  ret_from_fork+0x41/0x70
[   50.363355]  ret_from_fork_asm+0x1b/0x30
[   50.364453] 
[   50.364669] Freed by task 222:
[   50.364947]  kasan_save_stack+0x3c/0x60
[   50.366320]  kasan_set_track+0x29/0x40
[   50.366986]  kasan_save_free_info+0x2f/0x50
[   50.367706]  ____kasan_slab_free+0x172/0x1d0
[   50.368407]  __kasan_slab_free+0x16/0x20
[   50.369223]  __kmem_cache_free+0x190/0x310
[   50.369930]  kfree+0x7c/0x120
[   50.371266]  kasan_strings+0xc3/0x510
[   50.371901]  kunit_try_run_case+0x126/0x290
[   50.372644]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.373584]  kthread+0x19e/0x1e0
[   50.374256]  ret_from_fork+0x41/0x70
[   50.374845]  ret_from_fork_asm+0x1b/0x30
[   50.375649] 
[   50.375920] The buggy address belongs to the object at ffff888102840dc0
[   50.375920]  which belongs to the cache kmalloc-32 of size 32
[   50.377882] The buggy address is located 16 bytes inside of
[   50.377882]  freed 32-byte region [ffff888102840dc0, ffff888102840de0)
[   50.379545] 
[   50.380701] The buggy address belongs to the physical page:
[   50.381425] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840
[   50.382588] flags: 0x200000000000800(slab|node=0|zone=2)
[   50.383478] page_type: 0xffffffff()
[   50.384314] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   50.386114] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   50.387159] page dumped because: kasan: bad access detected
[   50.387752] 
[   50.388149] Memory state around the buggy address:
[   50.389173]  ffff888102840c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.390297]  ffff888102840d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.391378] >ffff888102840d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.392029]                                                  ^
[   50.392590]  ffff888102840e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.393552]  ffff888102840e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.394534] ==================================================================

test log snippet test parser 230

Home

[   49.341443] ==================================================================
[   49.342945] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc1/0x190
[   49.343786] Read of size 1 at addr ffff888102adfd9a by task kunit_try_catch/202
[   49.344688] 
[   49.345354] CPU: 1 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   49.346970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.347846] Call Trace:
[   49.348197]  <TASK>
[   49.348582]  dump_stack_lvl+0x4e/0x90
[   49.349289]  print_report+0xd2/0x660
[   49.349839]  ? __virt_addr_valid+0x156/0x1e0
[   49.350515]  ? kasan_addr_to_slab+0x11/0xb0
[   49.351128]  kasan_report+0xff/0x140
[   49.351681]  ? kasan_stack_oob+0xc1/0x190
[   49.352336]  ? kasan_stack_oob+0xc1/0x190
[   49.352931]  __asan_load1+0x66/0x70
[   49.353428]  kasan_stack_oob+0xc1/0x190
[   49.353975]  ? __pfx_kasan_stack_oob+0x10/0x10
[   49.354648]  ? __schedule+0x70b/0x1190
[   49.355248]  ? ktime_get_ts64+0x118/0x140
[   49.355853]  kunit_try_run_case+0x126/0x290
[   49.356527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.357248]  ? __kasan_check_write+0x18/0x20
[   49.357947]  ? trace_preempt_on+0x20/0xa0
[   49.358580]  ? __kthread_parkme+0x4f/0xd0
[   49.359112]  ? preempt_count_sub+0x50/0x80
[   49.359729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.360416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.361299]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.362015]  kthread+0x19e/0x1e0
[   49.362559]  ? __pfx_kthread+0x10/0x10
[   49.363121]  ret_from_fork+0x41/0x70
[   49.363628]  ? __pfx_kthread+0x10/0x10
[   49.364248]  ret_from_fork_asm+0x1b/0x30
[   49.364930]  </TASK>
[   49.365311] 
[   49.365718] The buggy address belongs to stack of task kunit_try_catch/202
[   49.366592]  and is located at offset 138 in frame:
[   49.367276]  kasan_stack_oob+0x0/0x190
[   49.368151] 
[   49.368506] This frame has 4 objects:
[   49.369200]  [48, 49) '__assertion'
[   49.369347]  [64, 72) 'array'
[   49.369883]  [96, 112) '__assertion'
[   49.370386]  [128, 138) 'stack_array'
[   49.370910] 
[   49.371529] The buggy address belongs to the physical page:
[   49.372203] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102adf
[   49.373173] flags: 0x200000000000000(node=0|zone=2)
[   49.373729] page_type: 0xffffffff()
[   49.374195] raw: 0200000000000000 ffffea00040ab7c8 ffffea00040ab7c8 0000000000000000
[   49.375138] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   49.375909] page dumped because: kasan: bad access detected
[   49.376470] 
[   49.376800] Memory state around the buggy address:
[   49.377268]  ffff888102adfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.378104]  ffff888102adfd00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[   49.378872] >ffff888102adfd80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 f1
[   49.379574]                             ^
[   49.380119]  ffff888102adfe00: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   49.380807]  ffff888102adfe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.381541] ==================================================================

test log snippet test parser 231

Home

[   46.798370] ==================================================================
[   46.799414] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xaf/0x1b0
[   46.800140] Read of size 1 at addr ffff8881028d4000 by task kunit_try_catch/142
[   46.801903] 
[   46.802149] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.803204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.804156] Call Trace:
[   46.804508]  <TASK>
[   46.805535]  dump_stack_lvl+0x4e/0x90
[   46.806248]  print_report+0xd2/0x660
[   46.806735]  ? __virt_addr_valid+0x156/0x1e0
[   46.807430]  ? kasan_addr_to_slab+0x11/0xb0
[   46.807969]  kasan_report+0xff/0x140
[   46.808528]  ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[   46.809737]  ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[   46.810409]  __asan_load1+0x66/0x70
[   46.810960]  kmalloc_pagealloc_uaf+0xaf/0x1b0
[   46.811586]  ? __pfx_kmalloc_pagealloc_uaf+0x10/0x10
[   46.812257]  ? __schedule+0x70b/0x1190
[   46.813497]  ? ktime_get_ts64+0x118/0x140
[   46.814020]  kunit_try_run_case+0x126/0x290
[   46.814601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.815431]  ? __kasan_check_write+0x18/0x20
[   46.816157]  ? trace_preempt_on+0x20/0xa0
[   46.816840]  ? __kthread_parkme+0x4f/0xd0
[   46.817343]  ? preempt_count_sub+0x50/0x80
[   46.817873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.818894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.819558]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.820329]  kthread+0x19e/0x1e0
[   46.820890]  ? __pfx_kthread+0x10/0x10
[   46.821535]  ret_from_fork+0x41/0x70
[   46.822278]  ? __pfx_kthread+0x10/0x10
[   46.822707]  ret_from_fork_asm+0x1b/0x30
[   46.823206]  </TASK>
[   46.823592] 
[   46.823890] The buggy address belongs to the physical page:
[   46.825103] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d4
[   46.826400] flags: 0x200000000000000(node=0|zone=2)
[   46.826835] page_type: 0xffffffff()
[   46.827382] raw: 0200000000000000 ffffea00040a3608 ffff88815b53c8b8 0000000000000000
[   46.828410] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   46.829351] page dumped because: kasan: bad access detected
[   46.830078] 
[   46.830472] Memory state around the buggy address:
[   46.831056]  ffff8881028d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.832166]  ffff8881028d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.833078] >ffff8881028d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.833572]                    ^
[   46.834119]  ffff8881028d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.835086]  ffff8881028d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.836074] ==================================================================

test log snippet test parser 232

Home

[   46.907463] ==================================================================
[   46.908565] BUG: KASAN: use-after-free in pagealloc_uaf+0xe9/0x1f0
[   46.909150] Read of size 1 at addr ffff8881029b0000 by task kunit_try_catch/148
[   46.909690] 
[   46.910281] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   46.912300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.913264] Call Trace:
[   46.913532]  <TASK>
[   46.914162]  dump_stack_lvl+0x4e/0x90
[   46.914912]  print_report+0xd2/0x660
[   46.915534]  ? __virt_addr_valid+0x156/0x1e0
[   46.916270]  ? kasan_addr_to_slab+0x11/0xb0
[   46.916843]  kasan_report+0xff/0x140
[   46.917598]  ? pagealloc_uaf+0xe9/0x1f0
[   46.918143]  ? pagealloc_uaf+0xe9/0x1f0
[   46.918758]  __asan_load1+0x66/0x70
[   46.919681]  pagealloc_uaf+0xe9/0x1f0
[   46.920466]  ? __pfx_pagealloc_uaf+0x10/0x10
[   46.921136]  ? __schedule+0x70b/0x1190
[   46.921705]  ? ktime_get_ts64+0x118/0x140
[   46.922401]  kunit_try_run_case+0x126/0x290
[   46.923076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.923598]  ? __kasan_check_write+0x18/0x20
[   46.924618]  ? trace_preempt_on+0x20/0xa0
[   46.925320]  ? __kthread_parkme+0x4f/0xd0
[   46.926259]  ? preempt_count_sub+0x50/0x80
[   46.927041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.927620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.928818]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.929668]  kthread+0x19e/0x1e0
[   46.930397]  ? __pfx_kthread+0x10/0x10
[   46.931034]  ret_from_fork+0x41/0x70
[   46.931646]  ? __pfx_kthread+0x10/0x10
[   46.932307]  ret_from_fork_asm+0x1b/0x30
[   46.933035]  </TASK>
[   46.933394] 
[   46.933921] The buggy address belongs to the physical page:
[   46.934519] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b0
[   46.936025] flags: 0x200000000000000(node=0|zone=2)
[   46.936784] page_type: 0xffffff7f(buddy)
[   46.937618] raw: 0200000000000000 ffff88817fffab60 ffff88817fffab60 0000000000000000
[   46.938711] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[   46.939522] page dumped because: kasan: bad access detected
[   46.940561] 
[   46.941327] Memory state around the buggy address:
[   46.941830]  ffff8881029aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.942482]  ffff8881029aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.943035] >ffff8881029b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.943928]                    ^
[   46.944701]  ffff8881029b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.945917]  ffff8881029b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.947097] ==================================================================

test log snippet test parser 233

Home

[   53.218281] ==================================================================
[   53.218719] BUG: KFENCE: invalid free in test_double_free+0xff/0x1d0
[   53.218719] 
[   53.219446] Invalid free of 0x(____ptrval____) (in kfence-#161):
[   53.220354]  test_double_free+0xff/0x1d0
[   53.221096]  kunit_try_run_case+0x126/0x290
[   53.221828]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.222763]  kthread+0x19e/0x1e0
[   53.223365]  ret_from_fork+0x41/0x70
[   53.224088]  ret_from_fork_asm+0x1b/0x30
[   53.224802] 
[   53.225151] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   53.225151] 
[   53.226073] allocated by task 263 on cpu 1 at 53.217745s:
[   53.226861]  test_alloc+0x1e8/0x8d0
[   53.227314]  test_double_free+0xd0/0x1d0
[   53.228082]  kunit_try_run_case+0x126/0x290
[   53.228984]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.229670]  kthread+0x19e/0x1e0
[   53.230371]  ret_from_fork+0x41/0x70
[   53.230884]  ret_from_fork_asm+0x1b/0x30
[   53.231501] 
[   53.231829] freed by task 263 on cpu 1 at 53.218030s:
[   53.232487]  test_double_free+0xeb/0x1d0
[   53.233022]  kunit_try_run_case+0x126/0x290
[   53.233544]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.234327]  kthread+0x19e/0x1e0
[   53.235138]  ret_from_fork+0x41/0x70
[   53.235835]  ret_from_fork_asm+0x1b/0x30
[   53.236562] 
[   53.237238] CPU: 1 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.238064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.239121] ==================================================================

test log snippet test parser 234

Home

[   53.114390] ==================================================================
[   53.115197] BUG: KFENCE: invalid free in test_double_free+0x16a/0x1d0
[   53.115197] 
[   53.116504] Invalid free of 0x(____ptrval____) (in kfence-#160):
[   53.117353]  test_double_free+0x16a/0x1d0
[   53.117974]  kunit_try_run_case+0x126/0x290
[   53.118544]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.119119]  kthread+0x19e/0x1e0
[   53.119540]  ret_from_fork+0x41/0x70
[   53.120091]  ret_from_fork_asm+0x1b/0x30
[   53.120684] 
[   53.120985] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   53.120985] 
[   53.121945] allocated by task 261 on cpu 1 at 53.113680s:
[   53.122591]  test_alloc+0x2a0/0x8d0
[   53.123149]  test_double_free+0xd0/0x1d0
[   53.123742]  kunit_try_run_case+0x126/0x290
[   53.124218]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.124958]  kthread+0x19e/0x1e0
[   53.125486]  ret_from_fork+0x41/0x70
[   53.126074]  ret_from_fork_asm+0x1b/0x30
[   53.126636] 
[   53.126940] freed by task 261 on cpu 1 at 53.113833s:
[   53.127576]  test_double_free+0x156/0x1d0
[   53.128206]  kunit_try_run_case+0x126/0x290
[   53.128811]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.129486]  kthread+0x19e/0x1e0
[   53.130016]  ret_from_fork+0x41/0x70
[   53.130487]  ret_from_fork_asm+0x1b/0x30
[   53.131092] 
[   53.131397] CPU: 1 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.132346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.133155] ==================================================================

test log snippet test parser 235

Home

[   53.321976] ==================================================================
[   53.322743] BUG: KFENCE: invalid free in test_invalid_addr_free+0x157/0x1d0
[   53.322743] 
[   53.323575] Invalid free of 0x(____ptrval____) (in kfence-#162):
[   53.324421]  test_invalid_addr_free+0x157/0x1d0
[   53.325163]  kunit_try_run_case+0x126/0x290
[   53.325895]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.326738]  kthread+0x19e/0x1e0
[   53.327427]  ret_from_fork+0x41/0x70
[   53.328054]  ret_from_fork_asm+0x1b/0x30
[   53.328639] 
[   53.329001] kfence-#162: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   53.329001] 
[   53.329918] allocated by task 265 on cpu 1 at 53.321665s:
[   53.330666]  test_alloc+0x2a0/0x8d0
[   53.331301]  test_invalid_addr_free+0xd0/0x1d0
[   53.331971]  kunit_try_run_case+0x126/0x290
[   53.332621]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.333305]  kthread+0x19e/0x1e0
[   53.333817]  ret_from_fork+0x41/0x70
[   53.334421]  ret_from_fork_asm+0x1b/0x30
[   53.335000] 
[   53.335348] CPU: 1 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.336276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.337268] ==================================================================

test log snippet test parser 236

Home

[   53.425804] ==================================================================
[   53.426552] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x1d0
[   53.426552] 
[   53.427400] Invalid free of 0x(____ptrval____) (in kfence-#163):
[   53.428113]  test_invalid_addr_free+0xec/0x1d0
[   53.428643]  kunit_try_run_case+0x126/0x290
[   53.429207]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.429960]  kthread+0x19e/0x1e0
[   53.430512]  ret_from_fork+0x41/0x70
[   53.431067]  ret_from_fork_asm+0x1b/0x30
[   53.431559] 
[   53.431868] kfence-#163: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   53.431868] 
[   53.432721] allocated by task 267 on cpu 0 at 53.425544s:
[   53.433485]  test_alloc+0x1e8/0x8d0
[   53.433912]  test_invalid_addr_free+0xd0/0x1d0
[   53.434966]  kunit_try_run_case+0x126/0x290
[   53.435796]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.436387]  kthread+0x19e/0x1e0
[   53.437191]  ret_from_fork+0x41/0x70
[   53.437861]  ret_from_fork_asm+0x1b/0x30
[   53.438391] 
[   53.438707] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.439537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.440516] ==================================================================

test log snippet test parser 237

Home

[   58.123600] ==================================================================
[   58.124710] BUG: KFENCE: invalid read in test_invalid_access+0xba/0x150
[   58.124710] 
[   58.125660] Invalid read at 0x(____ptrval____):
[   58.126575]  test_invalid_access+0xba/0x150
[   58.127696]  kunit_try_run_case+0x126/0x290
[   58.128338]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   58.129031]  kthread+0x19e/0x1e0
[   58.129490]  ret_from_fork+0x41/0x70
[   58.130091]  ret_from_fork_asm+0x1b/0x30
[   58.130628] 
[   58.131069] CPU: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   58.132083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   58.133020] ==================================================================

test log snippet test parser 238

Home

[   53.634356] ==================================================================
[   53.635207] BUG: KFENCE: memory corruption in test_corruption+0x1c0/0x280
[   53.635207] 
[   53.635907] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#165):
[   53.638006]  test_corruption+0x1c0/0x280
[   53.638760]  kunit_try_run_case+0x126/0x290
[   53.639521]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.640374]  kthread+0x19e/0x1e0
[   53.641058]  ret_from_fork+0x41/0x70
[   53.641758]  ret_from_fork_asm+0x1b/0x30
[   53.642487] 
[   53.642763] kfence-#165: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   53.642763] 
[   53.643556] allocated by task 269 on cpu 1 at 53.633771s:
[   53.644440]  test_alloc+0x2a0/0x8d0
[   53.644963]  test_corruption+0xdb/0x280
[   53.645461]  kunit_try_run_case+0x126/0x290
[   53.646169]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.646928]  kthread+0x19e/0x1e0
[   53.647454]  ret_from_fork+0x41/0x70
[   53.648032]  ret_from_fork_asm+0x1b/0x30
[   53.648522] 
[   53.648845] freed by task 269 on cpu 1 at 53.633926s:
[   53.649602]  test_corruption+0x1c0/0x280
[   53.650223]  kunit_try_run_case+0x126/0x290
[   53.650702]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.651363]  kthread+0x19e/0x1e0
[   53.651809]  ret_from_fork+0x41/0x70
[   53.652367]  ret_from_fork_asm+0x1b/0x30
[   53.652808] 
[   53.653174] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.654204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.655207] ==================================================================

test log snippet test parser 239

Home

[   54.050110] ==================================================================
[   54.050847] BUG: KFENCE: memory corruption in test_corruption+0x160/0x280
[   54.050847] 
[   54.051545] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#169):
[   54.052595]  test_corruption+0x160/0x280
[   54.053276]  kunit_try_run_case+0x126/0x290
[   54.053851]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   54.054547]  kthread+0x19e/0x1e0
[   54.055294]  ret_from_fork+0x41/0x70
[   54.056274]  ret_from_fork_asm+0x1b/0x30
[   54.056816] 
[   54.057245] kfence-#169: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   54.057245] 
[   54.058532] allocated by task 271 on cpu 0 at 54.049661s:
[   54.059354]  test_alloc+0x1e8/0x8d0
[   54.059809]  test_corruption+0x133/0x280
[   54.060338]  kunit_try_run_case+0x126/0x290
[   54.061137]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   54.061803]  kthread+0x19e/0x1e0
[   54.062222]  ret_from_fork+0x41/0x70
[   54.062770]  ret_from_fork_asm+0x1b/0x30
[   54.063382] 
[   54.063676] freed by task 271 on cpu 0 at 54.049833s:
[   54.064443]  test_corruption+0x160/0x280
[   54.065157]  kunit_try_run_case+0x126/0x290
[   54.065629]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   54.066643]  kthread+0x19e/0x1e0
[   54.067218]  ret_from_fork+0x41/0x70
[   54.067695]  ret_from_fork_asm+0x1b/0x30
[   54.068413] 
[   54.068759] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   54.069588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   54.070388] ==================================================================

test log snippet test parser 240

Home

[   53.946180] ==================================================================
[   53.946928] BUG: KFENCE: memory corruption in test_corruption+0x10c/0x280
[   53.946928] 
[   53.947677] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#168):
[   53.949304]  test_corruption+0x10c/0x280
[   53.950207]  kunit_try_run_case+0x126/0x290
[   53.950745]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.951577]  kthread+0x19e/0x1e0
[   53.952188]  ret_from_fork+0x41/0x70
[   53.952835]  ret_from_fork_asm+0x1b/0x30
[   53.953383] 
[   53.953687] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   53.953687] 
[   53.954621] allocated by task 271 on cpu 0 at 53.945716s:
[   53.955276]  test_alloc+0x1e8/0x8d0
[   53.955878]  test_corruption+0xdb/0x280
[   53.956501]  kunit_try_run_case+0x126/0x290
[   53.957178]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.957854]  kthread+0x19e/0x1e0
[   53.958429]  ret_from_fork+0x41/0x70
[   53.958967]  ret_from_fork_asm+0x1b/0x30
[   53.959452] 
[   53.959811] freed by task 271 on cpu 0 at 53.946007s:
[   53.960590]  test_corruption+0x10c/0x280
[   53.961232]  kunit_try_run_case+0x126/0x290
[   53.961828]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.962544]  kthread+0x19e/0x1e0
[   53.963078]  ret_from_fork+0x41/0x70
[   53.963635]  ret_from_fork_asm+0x1b/0x30
[   53.964306] 
[   53.964582] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.965359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.966251] ==================================================================

test log snippet test parser 241

Home

[   53.738339] ==================================================================
[   53.739153] BUG: KFENCE: memory corruption in test_corruption+0x20f/0x280
[   53.739153] 
[   53.739887] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#166):
[   53.740939]  test_corruption+0x20f/0x280
[   53.741648]  kunit_try_run_case+0x126/0x290
[   53.742373]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.743088]  kthread+0x19e/0x1e0
[   53.744187]  ret_from_fork+0x41/0x70
[   53.744916]  ret_from_fork_asm+0x1b/0x30
[   53.745486] 
[   53.746039] kfence-#166: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   53.746039] 
[   53.747167] allocated by task 269 on cpu 1 at 53.737773s:
[   53.748259]  test_alloc+0x2a0/0x8d0
[   53.748725]  test_corruption+0x133/0x280
[   53.749240]  kunit_try_run_case+0x126/0x290
[   53.749734]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.750839]  kthread+0x19e/0x1e0
[   53.751512]  ret_from_fork+0x41/0x70
[   53.752234]  ret_from_fork_asm+0x1b/0x30
[   53.753250] 
[   53.753463] freed by task 269 on cpu 1 at 53.738037s:
[   53.754252]  test_corruption+0x20f/0x280
[   53.754725]  kunit_try_run_case+0x126/0x290
[   53.755568]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.756431]  kthread+0x19e/0x1e0
[   53.757131]  ret_from_fork+0x41/0x70
[   53.757818]  ret_from_fork_asm+0x1b/0x30
[   53.758558] 
[   53.759132] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.760120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.761220] ==================================================================

test log snippet test parser 242

Home

[   57.898258] ==================================================================
[   57.898932] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x158/0x1f0
[   57.898932] 
[   57.899815] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . ] (in kfence-#206):
[   57.901297]  test_kmalloc_aligned_oob_write+0x158/0x1f0
[   57.902059]  kunit_try_run_case+0x126/0x290
[   57.902737]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   57.903472]  kthread+0x19e/0x1e0
[   57.903944]  ret_from_fork+0x41/0x70
[   57.904475]  ret_from_fork_asm+0x1b/0x30
[   57.905126] 
[   57.905431] kfence-#206: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   57.905431] 
[   57.906332] allocated by task 283 on cpu 0 at 57.897683s:
[   57.907141]  test_alloc+0x2a0/0x8d0
[   57.907754]  test_kmalloc_aligned_oob_write+0xc0/0x1f0
[   57.908506]  kunit_try_run_case+0x126/0x290
[   57.909128]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   57.909864]  kthread+0x19e/0x1e0
[   57.910406]  ret_from_fork+0x41/0x70
[   57.911016]  ret_from_fork_asm+0x1b/0x30
[   57.911641] 
[   57.912007] freed by task 283 on cpu 0 at 57.897976s:
[   57.912774]  test_kmalloc_aligned_oob_write+0x158/0x1f0
[   57.913589]  kunit_try_run_case+0x126/0x290
[   57.914269]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   57.914970]  kthread+0x19e/0x1e0
[   57.915532]  ret_from_fork+0x41/0x70
[   57.916143]  ret_from_fork_asm+0x1b/0x30
[   57.916700] 
[   57.917051] CPU: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   57.917974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   57.918821] ==================================================================

test log snippet test parser 243

Home

[   57.689854] ==================================================================
[   57.690601] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x12a/0x250
[   57.690601] 
[   57.691914] Out-of-bounds read at 0x(____ptrval____) (81B right of kfence-#204):
[   57.692677]  test_kmalloc_aligned_oob_read+0x12a/0x250
[   57.693322]  kunit_try_run_case+0x126/0x290
[   57.693668]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   57.694285]  kthread+0x19e/0x1e0
[   57.695021]  ret_from_fork+0x41/0x70
[   57.695728]  ret_from_fork_asm+0x1b/0x30
[   57.696547] 
[   57.696771] kfence-#204: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   57.696771] 
[   57.698168] allocated by task 281 on cpu 0 at 57.689620s:
[   57.699002]  test_alloc+0x2a0/0x8d0
[   57.699595]  test_kmalloc_aligned_oob_read+0xda/0x250
[   57.700535]  kunit_try_run_case+0x126/0x290
[   57.701247]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   57.701567]  kthread+0x19e/0x1e0
[   57.701867]  ret_from_fork+0x41/0x70
[   57.702316]  ret_from_fork_asm+0x1b/0x30
[   57.702893] 
[   57.703259] CPU: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   57.704070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   57.705149] ==================================================================

test log snippet test parser 244

Home

[   52.282080] ==================================================================
[   52.282936] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[   52.282936] 
[   52.284563] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#152):
[   52.285365]  test_out_of_bounds_read+0x151/0x290
[   52.285838]  kunit_try_run_case+0x126/0x290
[   52.286295]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.286758]  kthread+0x19e/0x1e0
[   52.288681]  ret_from_fork+0x41/0x70
[   52.289216]  ret_from_fork_asm+0x1b/0x30
[   52.289638] 
[   52.289850] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   52.289850] 
[   52.292041] allocated by task 249 on cpu 1 at 52.281800s:
[   52.292623]  test_alloc+0x2a0/0x8d0
[   52.293019]  test_out_of_bounds_read+0x138/0x290
[   52.293597]  kunit_try_run_case+0x126/0x290
[   52.294177]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.295049]  kthread+0x19e/0x1e0
[   52.295645]  ret_from_fork+0x41/0x70
[   52.296341]  ret_from_fork_asm+0x1b/0x30
[   52.297023] 
[   52.297387] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.298327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.299539] ==================================================================

test log snippet test parser 245

Home

[   52.178219] ==================================================================
[   52.179111] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[   52.179111] 
[   52.180222] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#151):
[   52.181252]  test_out_of_bounds_read+0xeb/0x290
[   52.181979]  kunit_try_run_case+0x126/0x290
[   52.182561]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.183405]  kthread+0x19e/0x1e0
[   52.184018]  ret_from_fork+0x41/0x70
[   52.184596]  ret_from_fork_asm+0x1b/0x30
[   52.185209] 
[   52.185518] kfence-#151: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   52.185518] 
[   52.186475] allocated by task 249 on cpu 1 at 52.177754s:
[   52.187358]  test_alloc+0x2a0/0x8d0
[   52.187875]  test_out_of_bounds_read+0xdb/0x290
[   52.188605]  kunit_try_run_case+0x126/0x290
[   52.189283]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.189904]  kthread+0x19e/0x1e0
[   52.190492]  ret_from_fork+0x41/0x70
[   52.191117]  ret_from_fork_asm+0x1b/0x30
[   52.191759] 
[   52.192136] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.193098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.194095] ==================================================================

test log snippet test parser 246

Home

[   52.489896] ==================================================================
[   52.490695] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[   52.490695] 
[   52.491621] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#154):
[   52.492380]  test_out_of_bounds_read+0x151/0x290
[   52.492882]  kunit_try_run_case+0x126/0x290
[   52.493357]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.493883]  kthread+0x19e/0x1e0
[   52.494491]  ret_from_fork+0x41/0x70
[   52.495139]  ret_from_fork_asm+0x1b/0x30
[   52.495789] 
[   52.496137] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   52.496137] 
[   52.497240] allocated by task 251 on cpu 1 at 52.489811s:
[   52.498037]  test_alloc+0x1e8/0x8d0
[   52.498600]  test_out_of_bounds_read+0x138/0x290
[   52.499318]  kunit_try_run_case+0x126/0x290
[   52.500088]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.500711]  kthread+0x19e/0x1e0
[   52.501156]  ret_from_fork+0x41/0x70
[   52.501613]  ret_from_fork_asm+0x1b/0x30
[   52.502164] 
[   52.502423] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.503669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.504589] ==================================================================

test log snippet test parser 247

Home

[   52.385890] ==================================================================
[   52.386701] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[   52.386701] 
[   52.387616] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#153):
[   52.388384]  test_out_of_bounds_read+0xeb/0x290
[   52.388852]  kunit_try_run_case+0x126/0x290
[   52.389301]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.389821]  kthread+0x19e/0x1e0
[   52.390414]  ret_from_fork+0x41/0x70
[   52.391065]  ret_from_fork_asm+0x1b/0x30
[   52.391689] 
[   52.392065] kfence-#153: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   52.392065] 
[   52.393175] allocated by task 251 on cpu 1 at 52.385791s:
[   52.394082]  test_alloc+0x1e8/0x8d0
[   52.394644]  test_out_of_bounds_read+0xdb/0x290
[   52.395201]  kunit_try_run_case+0x126/0x290
[   52.395845]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.396479]  kthread+0x19e/0x1e0
[   52.397064]  ret_from_fork+0x41/0x70
[   52.397570]  ret_from_fork_asm+0x1b/0x30
[   52.398207] 
[   52.398527] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.399369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.400244] ==================================================================

test log snippet test parser 248

Home

[   52.801803] ==================================================================
[   52.802550] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[   52.802550] 
[   52.803427] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#157):
[   52.804382]  test_out_of_bounds_write+0xd9/0x1a0
[   52.805531]  kunit_try_run_case+0x126/0x290
[   52.806106]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.807169]  kthread+0x19e/0x1e0
[   52.807830]  ret_from_fork+0x41/0x70
[   52.808533]  ret_from_fork_asm+0x1b/0x30
[   52.809367] 
[   52.809826] kfence-#157: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   52.809826] 
[   52.810687] allocated by task 255 on cpu 0 at 52.801672s:
[   52.811416]  test_alloc+0x1e8/0x8d0
[   52.812016]  test_out_of_bounds_write+0xc9/0x1a0
[   52.812630]  kunit_try_run_case+0x126/0x290
[   52.813216]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.813855]  kthread+0x19e/0x1e0
[   52.814388]  ret_from_fork+0x41/0x70
[   52.815003]  ret_from_fork_asm+0x1b/0x30
[   52.815474] 
[   52.815795] CPU: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.816710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.817535] ==================================================================

test log snippet test parser 249

Home

[   52.593858] ==================================================================
[   52.594605] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[   52.594605] 
[   52.595452] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#155):
[   52.595854]  test_out_of_bounds_write+0xd9/0x1a0
[   52.596639]  kunit_try_run_case+0x126/0x290
[   52.597362]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.598229]  kthread+0x19e/0x1e0
[   52.598854]  ret_from_fork+0x41/0x70
[   52.599505]  ret_from_fork_asm+0x1b/0x30
[   52.600209] 
[   52.600567] kfence-#155: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   52.600567] 
[   52.601677] allocated by task 253 on cpu 0 at 52.593660s:
[   52.602327]  test_alloc+0x2a0/0x8d0
[   52.602805]  test_out_of_bounds_write+0xc9/0x1a0
[   52.603812]  kunit_try_run_case+0x126/0x290
[   52.604393]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.605033]  kthread+0x19e/0x1e0
[   52.605517]  ret_from_fork+0x41/0x70
[   52.606282]  ret_from_fork_asm+0x1b/0x30
[   52.606779] 
[   52.607399] CPU: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.608323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.609357] ==================================================================

test log snippet test parser 250

Home

[   78.802544] ==================================================================
[   78.803452] BUG: KFENCE: use-after-free read in test_krealloc+0x2e9/0x530
[   78.803452] 
[   78.804205] Use-after-free read at 0x(____ptrval____) (in kfence-#211):
[   78.805014]  test_krealloc+0x2e9/0x530
[   78.805574]  kunit_try_run_case+0x126/0x290
[   78.806112]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.806833]  kthread+0x19e/0x1e0
[   78.807304]  ret_from_fork+0x41/0x70
[   78.807873]  ret_from_fork_asm+0x1b/0x30
[   78.808438] 
[   78.808727] kfence-#211: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   78.808727] 
[   78.809715] allocated by task 295 on cpu 0 at 78.801721s:
[   78.810488]  test_alloc+0x2a0/0x8d0
[   78.811029]  test_krealloc+0xb1/0x530
[   78.811593]  kunit_try_run_case+0x126/0x290
[   78.812236]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.812864]  kthread+0x19e/0x1e0
[   78.813382]  ret_from_fork+0x41/0x70
[   78.814014]  ret_from_fork_asm+0x1b/0x30
[   78.814541] 
[   78.814768] freed by task 295 on cpu 0 at 78.802203s:
[   78.815371]  krealloc+0x83/0x140
[   78.815858]  test_krealloc+0x137/0x530
[   78.816467]  kunit_try_run_case+0x126/0x290
[   78.817114]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.817878]  kthread+0x19e/0x1e0
[   78.818408]  ret_from_fork+0x41/0x70
[   78.818966]  ret_from_fork_asm+0x1b/0x30
[   78.819416] 
[   78.819663] CPU: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   78.820602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   78.821537] ==================================================================

test log snippet test parser 251

Home

[   78.703364] ==================================================================
[   78.704123] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x14f/0x370
[   78.704123] 
[   78.705266] Use-after-free read at 0x(____ptrval____) (in kfence-#210):
[   78.706023]  test_memcache_typesafe_by_rcu+0x14f/0x370
[   78.706787]  kunit_try_run_case+0x126/0x290
[   78.707413]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.708181]  kthread+0x19e/0x1e0
[   78.708591]  ret_from_fork+0x41/0x70
[   78.709105]  ret_from_fork_asm+0x1b/0x30
[   78.709686] 
[   78.710053] kfence-#210: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   78.710053] 
[   78.710813] allocated by task 293 on cpu 0 at 78.697781s:
[   78.711383]  test_alloc+0x1e8/0x8d0
[   78.711953]  test_memcache_typesafe_by_rcu+0xec/0x370
[   78.712642]  kunit_try_run_case+0x126/0x290
[   78.713294]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.714103]  kthread+0x19e/0x1e0
[   78.714520]  ret_from_fork+0x41/0x70
[   78.715131]  ret_from_fork_asm+0x1b/0x30
[   78.715700] 
[   78.715968] freed by task 0 on cpu 0 at 78.703051s:
[   78.717138]  rcu_guarded_free+0x2e/0x40
[   78.717696]  rcu_core+0x4be/0x1020
[   78.718257]  rcu_core_si+0x12/0x20
[   78.718787]  handle_softirqs+0x195/0x520
[   78.719365]  irq_exit_rcu+0x92/0xb0
[   78.719861]  sysvec_apic_timer_interrupt+0x80/0xa0
[   78.720533]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   78.721231]  default_idle+0xf/0x20
[   78.721701]  default_idle_call+0x42/0x70
[   78.722270]  do_idle+0x2ba/0x310
[   78.722717]  cpu_startup_entry+0x3c/0x40
[   78.723339]  rest_init+0xe9/0xf0
[   78.723872]  arch_call_rest_init+0x17/0x50
[   78.724333]  start_kernel+0x2e3/0x3c0
[   78.724920]  x86_64_start_reservations+0x1c/0x30
[   78.725548]  x86_64_start_kernel+0xcf/0xe0
[   78.726131]  secondary_startup_64_no_verify+0x178/0x17b
[   78.726847] 
[   78.727190] CPU: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   78.728065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   78.728945] ==================================================================

test log snippet test parser 252

Home

[   52.906601] ==================================================================
[   52.907335] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[   52.907335] 
[   52.908189] Use-after-free read at 0x(____ptrval____) (in kfence-#158):
[   52.909567]  test_use_after_free_read+0xf7/0x1a0
[   52.910068]  kunit_try_run_case+0x126/0x290
[   52.910731]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.911626]  kthread+0x19e/0x1e0
[   52.912324]  ret_from_fork+0x41/0x70
[   52.913241]  ret_from_fork_asm+0x1b/0x30
[   52.913710] 
[   52.914065] kfence-#158: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   52.914065] 
[   52.915098] allocated by task 257 on cpu 1 at 52.906315s:
[   52.915870]  test_alloc+0x2a0/0x8d0
[   52.916386]  test_use_after_free_read+0xd0/0x1a0
[   52.917393]  kunit_try_run_case+0x126/0x290
[   52.918064]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.919233]  kthread+0x19e/0x1e0
[   52.919658]  ret_from_fork+0x41/0x70
[   52.920149]  ret_from_fork_asm+0x1b/0x30
[   52.920622] 
[   52.920893] freed by task 257 on cpu 1 at 52.906449s:
[   52.922047]  test_use_after_free_read+0x14b/0x1a0
[   52.922604]  kunit_try_run_case+0x126/0x290
[   52.923299]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   52.924068]  kthread+0x19e/0x1e0
[   52.924649]  ret_from_fork+0x41/0x70
[   52.925269]  ret_from_fork_asm+0x1b/0x30
[   52.925741] 
[   52.926232] CPU: 1 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   52.927134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.928148] ==================================================================

test log snippet test parser 253

Home

[   53.010035] ==================================================================
[   53.010763] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[   53.010763] 
[   53.011542] Use-after-free read at 0x(____ptrval____) (in kfence-#159):
[   53.012312]  test_use_after_free_read+0xf7/0x1a0
[   53.012985]  kunit_try_run_case+0x126/0x290
[   53.013645]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.014402]  kthread+0x19e/0x1e0
[   53.014893]  ret_from_fork+0x41/0x70
[   53.015405]  ret_from_fork_asm+0x1b/0x30
[   53.016031] 
[   53.016340] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   53.016340] 
[   53.017845] allocated by task 259 on cpu 0 at 53.009613s:
[   53.018594]  test_alloc+0x1e8/0x8d0
[   53.019172]  test_use_after_free_read+0xd0/0x1a0
[   53.019675]  kunit_try_run_case+0x126/0x290
[   53.020325]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.020914]  kthread+0x19e/0x1e0
[   53.021463]  ret_from_fork+0x41/0x70
[   53.022030]  ret_from_fork_asm+0x1b/0x30
[   53.022480] 
[   53.022772] freed by task 259 on cpu 0 at 53.009738s:
[   53.023625]  test_use_after_free_read+0xeb/0x1a0
[   53.024280]  kunit_try_run_case+0x126/0x290
[   53.024812]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   53.025536]  kthread+0x19e/0x1e0
[   53.025935]  ret_from_fork+0x41/0x70
[   53.026535]  ret_from_fork_asm+0x1b/0x30
[   53.027162] 
[   53.027483] CPU: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   53.028380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   53.029358] ==================================================================

test log snippet test parser 254

Home

[   51.871540] ==================================================================
[   51.872640] BUG: KFENCE: use-after-free read in workqueue_uaf+0x166/0x2a0
[   51.872640] 
[   51.874234] Use-after-free read at 0x(____ptrval____) (in kfence-#148):
[   51.875810]  workqueue_uaf+0x166/0x2a0
[   51.876384]  kunit_try_run_case+0x126/0x290
[   51.876949]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.877818]  kthread+0x19e/0x1e0
[   51.878359]  ret_from_fork+0x41/0x70
[   51.878930]  ret_from_fork_asm+0x1b/0x30
[   51.880220] 
[   51.880666] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   51.880666] 
[   51.881958] allocated by task 232 on cpu 1 at 51.866383s:
[   51.883678]  __kmem_cache_alloc_node+0x329/0x380
[   51.884560]  kmalloc_trace+0x2e/0xb0
[   51.885141]  workqueue_uaf+0xdb/0x2a0
[   51.885607]  kunit_try_run_case+0x126/0x290
[   51.886236]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.887952]  kthread+0x19e/0x1e0
[   51.888388]  ret_from_fork+0x41/0x70
[   51.889197]  ret_from_fork_asm+0x1b/0x30
[   51.889871] 
[   51.890268] freed by task 23 on cpu 1 at 51.867646s:
[   51.892054]  workqueue_uaf_work+0x12/0x20
[   51.892563]  process_one_work+0x2fb/0x640
[   51.893386]  worker_thread+0x521/0x780
[   51.894293]  kthread+0x19e/0x1e0
[   51.894952]  ret_from_fork+0x41/0x70
[   51.896005]  ret_from_fork_asm+0x1b/0x30
[   51.896482] 
[   51.896879] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.897947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.899139] ==================================================================

test log snippet test parser 255

Home

[   51.871540] ==================================================================
[   51.872640] BUG: KFENCE: use-after-free read in workqueue_uaf+0x166/0x2a0
[   51.872640] 
[   51.874234] Use-after-free read at 0x(____ptrval____) (in kfence-#148):
[   51.875810]  workqueue_uaf+0x166/0x2a0
[   51.876384]  kunit_try_run_case+0x126/0x290
[   51.876949]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.877818]  kthread+0x19e/0x1e0
[   51.878359]  ret_from_fork+0x41/0x70
[   51.878930]  ret_from_fork_asm+0x1b/0x30
[   51.880220] 
[   51.880666] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   51.880666] 
[   51.881958] allocated by task 232 on cpu 1 at 51.866383s:
[   51.883678]  __kmem_cache_alloc_node+0x329/0x380
[   51.884560]  kmalloc_trace+0x2e/0xb0
[   51.885141]  workqueue_uaf+0xdb/0x2a0
[   51.885607]  kunit_try_run_case+0x126/0x290
[   51.886236]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.887952]  kthread+0x19e/0x1e0
[   51.888388]  ret_from_fork+0x41/0x70
[   51.889197]  ret_from_fork_asm+0x1b/0x30
[   51.889871] 
[   51.890268] freed by task 23 on cpu 1 at 51.867646s:
[   51.892054]  workqueue_uaf_work+0x12/0x20
[   51.892563]  process_one_work+0x2fb/0x640
[   51.893386]  worker_thread+0x521/0x780
[   51.894293]  kthread+0x19e/0x1e0
[   51.894952]  ret_from_fork+0x41/0x70
[   51.896005]  ret_from_fork_asm+0x1b/0x30
[   51.896482] 
[   51.896879] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.6.72-rc1 #1
[   51.897947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.899139] ==================================================================

test log snippet test parser 256

Home

------------[ cut here ]------------
[   52.003022] WARNING: CPU: 0 PID: 477 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[   52.004124] Modules linked in:
[   52.004680] CPU: 0 PID: 477 Comm: unshare_test Not tainted 6.6.72-rc1 #1
[   52.004997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.006027] RIP: 0010:kvmalloc_node+0xd1/0xe0
[   52.007363] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[   52.009372] RSP: 0018:ffffa8d7005ffe00 EFLAGS: 00010246
[   52.010200] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   52.010976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[   52.011638] RBP: ffffa8d7005ffe18 R08: 0000000000000040 R09: 0000000000000000
[   52.012343] R10: 0000000000000038 R11: ffff9c57c2251c00 R12: 0000000200002000
[   52.012751] R13: 00000000ffffffff R14: ffff9c57c01c53c0 R15: ffff9c57c01c5340
[   52.013247] FS:  00007f3e363d0740(0000) GS:ffff9c583bc00000(0000) knlGS:0000000000000000
[   52.015028] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   52.015246] CR2: 00007f3e36574680 CR3: 00000001022d2000 CR4: 00000000000006f0
[   52.016044] Call Trace:
[   52.017601]  <TASK>
[   52.019127]  ? show_regs+0x64/0x70
[   52.019555]  ? __warn+0x88/0x150
[   52.019909]  ? kvmalloc_node+0xd1/0xe0
[   52.020073]  ? report_bug+0x171/0x1a0
[   52.020227]  ? handle_bug+0x5b/0x90
[   52.020513]  ? exc_invalid_op+0x1c/0x70
[   52.020939]  ? asm_exc_invalid_op+0x1f/0x30
[   52.021754]  ? kvmalloc_node+0xd1/0xe0
[   52.022632]  alloc_fdtable+0x74/0x100
[   52.023574]  expand_files+0x62/0x300
[   52.023874]  ? do_prlimit+0x132/0x210
[   52.024394]  ksys_dup3+0x70/0x110
[   52.025206]  __x64_sys_dup2+0x2a/0xa0
[   52.025505]  x64_sys_call+0x1b43/0x1c90
[   52.025688]  do_syscall_64+0x39/0x90
[   52.025891]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   52.027442] RIP: 0033:0x7f3e364c8c17
[   52.028827] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   52.030502] RSP: 002b:00007fffa544bd18 EFLAGS: 00000206 ORIG_RAX: 0000000000000021
[   52.031306] RAX: ffffffffffffffda RBX: 00007fffa544c578 RCX: 00007f3e364c8c17
[   52.032540] RDX: 00007fffa544bd40 RSI: 0000000040000038 RDI: 0000000000000002
[   52.033239] RBP: 00007fffa544bf40 R08: 0000000000000064 R09: 0000000000000000
[   52.033570] R10: 00007f3e363e5170 R11: 0000000000000206 R12: 0000000000000000
[   52.033774] R13: 00007fffa544c588 R14: 00007f3e365fe000 R15: 00005636bbb48dd8
[   52.034080]  </TASK>
[   52.034580] ---[ end trace 0000000000000000 ]---