c[?7l[2J[0mSeaBIOS (version 1.16.3-debian-1.16.3-2) Booting from ROM... early console in setup codc[?7l[2J[0me <5>[ 0.000000] Linux version 6.11.0-rc2-next-20240807 (tuxmake@tuxmake) (x86_64-linux-gnu-gcc (Debian 13.3.0-1) 13.3.0, GNU ld (GNU Binutils for Debian) 2.42.50.20240625) #1 SMP PREEMPT_DYNAMIC @1723006616 <6>[ 0.000000] Command line: console=ttyS0,115200 rootwait root=/dev/sda debug verbose console_msg_format=syslog systemd.log_level=warning rw earlycon <6>[ 0.000000] BIOS-provided physical RAM map: <6>[ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable <6>[ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x000000007ffdefff] usable <6>[ 0.000000] BIOS-e820: [mem 0x000000007ffdf000-0x000000007fffffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000017fffffff] usable <6>[ 0.000000] NX (Execute Disable) protection: active <6>[ 0.000000] APIC: Static calls initialized <6>[ 0.000000] SMBIOS 3.0.0 present. <6>[ 0.000000] DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <6>[ 0.000000] DMI: Memory slots populated: 1/1 <6>[ 0.000000] tsc: Fast TSC calibration using PIT <6>[ 0.000000] tsc: Detected 3393.587 MHz processor <7>[ 0.011811] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved <7>[ 0.012189] e820: remove [mem 0x000a0000-0x000fffff] usable <6>[ 0.012497] last_pfn = 0x180000 max_arch_pfn = 0x400000000 <6>[ 0.013265] MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs <6>[ 0.013523] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT <6>[ 0.014416] last_pfn = 0x7ffdf max_arch_pfn = 0x400000000 <6>[ 0.030654] found SMP MP-table at [mem 0x000f5480-0x000f548f] <6>[ 0.038385] ACPI: Early table checksum verification disabled <6>[ 0.038913] ACPI: RSDP 0x00000000000F52A0 000014 (v00 BOCHS ) <6>[ 0.039371] ACPI: RSDT 0x000000007FFE2346 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.040305] ACPI: FACP 0x000000007FFE2136 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.041377] ACPI: DSDT 0x000000007FFE0040 0020F6 (v01 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.041564] ACPI: FACS 0x000000007FFE0000 000040 <6>[ 0.041658] ACPI: APIC 0x000000007FFE222A 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.041713] ACPI: HPET 0x000000007FFE22AA 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.041765] ACPI: MCFG 0x000000007FFE22E2 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.041814] ACPI: WAET 0x000000007FFE231E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) <6>[ 0.041928] ACPI: Reserving FACP table memory at [mem 0x7ffe2136-0x7ffe2229] <6>[ 0.041993] ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe2135] <6>[ 0.042013] ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] <6>[ 0.042030] ACPI: Reserving APIC table memory at [mem 0x7ffe222a-0x7ffe22a9] <6>[ 0.042046] ACPI: Reserving HPET table memory at [mem 0x7ffe22aa-0x7ffe22e1] <6>[ 0.042062] ACPI: Reserving MCFG table memory at [mem 0x7ffe22e2-0x7ffe231d] <6>[ 0.042078] ACPI: Reserving WAET table memory at [mem 0x7ffe231e-0x7ffe2345] <6>[ 0.046964] No NUMA configuration found <6>[ 0.047012] Faking a node at [mem 0x0000000000000000-0x000000017fffffff] <6>[ 0.047992] NODE_DATA(0) allocated [mem 0x17fffc900-0x17fffffff] <6>[ 0.051849] Zone ranges: <6>[ 0.051895] DMA [mem 0x0000000000001000-0x0000000000ffffff] <6>[ 0.051991] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] <6>[ 0.052016] Normal [mem 0x0000000100000000-0x000000017fffffff] <6>[ 0.052042] Movable zone start for each node <6>[ 0.052077] Early memory node ranges <6>[ 0.052108] node 0: [mem 0x0000000000001000-0x000000000009efff] <6>[ 0.052274] node 0: [mem 0x0000000000100000-0x000000007ffdefff] <6>[ 0.052324] node 0: [mem 0x0000000100000000-0x000000017fffffff] <6>[ 0.052521] Initmem setup node 0 [mem 0x0000000000001000-0x000000017fffffff] <6>[ 0.055292] On node 0, zone DMA: 1 pages in unavailable ranges <6>[ 0.056948] On node 0, zone DMA: 97 pages in unavailable ranges <6>[ 0.467691] On node 0, zone Normal: 33 pages in unavailable ranges <6>[ 1.248822] kasan: KernelAddressSanitizer initialized <6>[ 1.249469] ACPI: PM-Timer IO Port: 0x608 <6>[ 1.250148] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) <6>[ 1.250903] IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 <6>[ 1.251143] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) <6>[ 1.251593] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) <6>[ 1.251687] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) <6>[ 1.251805] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) <6>[ 1.251828] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) <6>[ 1.252148] ACPI: Using ACPI (MADT) for SMP configuration information <6>[ 1.252286] ACPI: HPET id: 0x8086a201 base: 0xfed00000 <6>[ 1.252791] CPU topo: Max. logical packages: 1 <6>[ 1.252816] CPU topo: Max. logical dies: 1 <6>[ 1.252842] CPU topo: Max. dies per package: 1 <6>[ 1.252901] CPU topo: Max. threads per core: 1 <6>[ 1.253115] CPU topo: Num. cores per package: 2 <6>[ 1.253149] CPU topo: Num. threads per package: 2 <6>[ 1.253166] CPU topo: Allowing 2 present CPUs plus 0 hotplug CPUs <6>[ 1.254442] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] <6>[ 1.254508] PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] <6>[ 1.254555] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] <6>[ 1.254571] PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] <6>[ 1.254589] PM: hibernation: Registered nosave memory: [mem 0x7ffdf000-0x7fffffff] <6>[ 1.254604] PM: hibernation: Registered nosave memory: [mem 0x80000000-0xafffffff] <6>[ 1.254617] PM: hibernation: Registered nosave memory: [mem 0xb0000000-0xbfffffff] <6>[ 1.254630] PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfed1bfff] <6>[ 1.254643] PM: hibernation: Registered nosave memory: [mem 0xfed1c000-0xfed1ffff] <6>[ 1.254656] PM: hibernation: Registered nosave memory: [mem 0xfed20000-0xfffbffff] <6>[ 1.254669] PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] <6>[ 1.254819] [mem 0xc0000000-0xfed1bfff] available for PCI devices <6>[ 1.254912] Booting paravirtualized kernel on bare hardware <6>[ 1.255317] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns <6>[ 1.255969] setup_percpu: NR_CPUS:64 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 <6>[ 1.259272] percpu: Embedded 69 pages/cpu s244376 r8192 d30056 u1048576 <7>[ 1.259965] pcpu-alloc: s244376 r8192 d30056 u1048576 alloc=1*2097152 <7>[ 1.260085] pcpu-alloc: [0] 0 1 <5>[ 1.262364] Kernel command line: console=ttyS0,115200 rootwait root=/dev/sda debug verbose console_msg_format=syslog systemd.log_level=warning rw earlycon <5>[ 1.295902] Unknown kernel command line parameters "verbose", will be passed to user space. <6>[ 1.299546] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) <6>[ 1.301394] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) <6>[ 1.306101] Fallback order for Node 0: 0 <6>[ 1.306508] Built 1 zonelists, mobility grouping on. Total pages: 1048445 <6>[ 1.306554] Policy zone: Normal <6>[ 1.308613] mem auto-init: stack:all(zero), heap alloc:off, heap free:off <6>[ 1.308678] stackdepot: allocating hash table via alloc_large_system_hash <6>[ 1.308742] stackdepot hash table entries: 1048576 (order: 12, 16777216 bytes, linear) <6>[ 1.321360] software IO TLB: area num 2. <6>[ 1.820403] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 <6>[ 1.822935] Kernel/User page tables isolation: enabled <6>[ 1.829365] ftrace: allocating 63030 entries in 247 pages <6>[ 1.899041] ftrace: allocated 247 pages with 7 groups <6>[ 1.920230] Dynamic Preempt: voluntary <6>[ 1.928244] rcu: Preemptible hierarchical RCU implementation. <6>[ 1.928281] rcu: RCU event tracing is enabled. <6>[ 1.928321] rcu: RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=2. <6>[ 1.928504] Trampoline variant of Tasks RCU enabled. <6>[ 1.928521] Rude variant of Tasks RCU enabled. <6>[ 1.928688] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. <6>[ 1.928735] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 <6>[ 1.931344] RCU Tasks: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1. <6>[ 1.931387] RCU Tasks Rude: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1. <6>[ 2.021864] NR_IRQS: 4352, nr_irqs: 440, preallocated irqs: 16 <6>[ 2.035280] rcu: srcu_init: Setting srcu_struct sizes based on contention. <6>[ 2.043059] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) <6>[ 2.053516] Console: colour VGA+ 80x25 <6>[ 2.057127] printk: legacy console [ttyS0] enabled <6>[ 2.083734] ACPI: Core revision 20240322 <6>[ 2.093690] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns <6>[ 2.104910] APIC: Switch to symmetric I/O mode setup <6>[ 2.112006] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 <6>[ 2.118128] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x30eaa4671ec, max_idle_ns: 440795202126 ns <6>[ 2.119465] Calibrating delay loop (skipped), value calculated using timer frequency.. 6787.17 BogoMIPS (lpj=3393587) <6>[ 2.126149] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 <6>[ 2.126437] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 <6>[ 2.127309] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization <6>[ 2.127977] Spectre V2 : Mitigation: Retpolines <6>[ 2.128251] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch <6>[ 2.128654] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT <6>[ 2.128946] Speculative Store Bypass: Vulnerable <6>[ 2.129543] MDS: Vulnerable: Clear CPU buffers attempted, no microcode <6>[ 2.129877] MMIO Stale Data: Unknown: No mitigations <6>[ 2.134266] x86/fpu: x87 FPU will use FXSAVE <6>[ 2.438688] Freeing SMP alternatives memory: 52K <6>[ 2.439512] pid_max: default: 32768 minimum: 301 <6>[ 2.449211] LSM: initializing lsm=capability,selinux <6>[ 2.450631] SELinux: Initializing. <6>[ 2.458929] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) <6>[ 2.459574] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) <6>[ 2.614810] smpboot: CPU0: Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) <6>[ 2.639715] Performance Events: unsupported p6 CPU model 26 no PMU driver, software events only. <6>[ 2.641455] signal: max sigframe size: 1440 <6>[ 2.643570] rcu: Hierarchical SRCU implementation. <6>[ 2.643856] rcu: Max phase no-delay instances is 400. <6>[ 2.647930] Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level <6>[ 2.663765] smp: Bringing up secondary CPUs ... <6>[ 2.673940] smpboot: x86: Booting SMP configuration: <6>[ 2.674232] .... node #0, CPUs: #1 <6>[ 2.710296] smp: Brought up 1 node, 2 CPUs <6>[ 2.711011] smpboot: Total of 2 processors activated (13574.34 BogoMIPS) <6>[ 2.725894] Memory: 3388200K/4193780K available (65536K kernel code, 11516K rwdata, 14892K rodata, 7804K init, 3000K bss, 799932K reserved, 0K cma-reserved) <6>[ 2.748913] devtmpfs: initialized <6>[ 2.810302] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns <6>[ 2.811247] futex hash table entries: 512 (order: 3, 32768 bytes, linear) <6>[ 2.820791] PM: RTC time: 06:50:10, date: 2024-08-07 <6>[ 2.833608] NET: Registered PF_NETLINK/PF_ROUTE protocol family <6>[ 2.842063] audit: initializing netlink subsys (disabled) <5>[ 2.845473] audit: type=2000 audit(1723013409.742:1): state=initialized audit_enabled=0 res=1 <6>[ 2.851946] thermal_sys: Registered thermal governor 'step_wise' <6>[ 2.852040] thermal_sys: Registered thermal governor 'user_space' <6>[ 2.854096] cpuidle: using governor menu <6>[ 2.862594] PCI: ECAM [mem 0xb0000000-0xbfffffff] (base 0xb0000000) for domain 0000 [bus 00-ff] <6>[ 2.863192] PCI: ECAM [mem 0xb0000000-0xbfffffff] reserved as E820 entry <6>[ 2.866061] PCI: Using configuration type 1 for base access <4>[ 2.867331] mtrr: your CPUs had inconsistent fixed MTRR settings <4>[ 2.867543] mtrr: your CPUs had inconsistent variable MTRR settings <4>[ 2.868880] mtrr: your CPUs had inconsistent MTRRdefType settings <6>[ 2.869097] mtrr: probably your BIOS does not setup all CPUs. <6>[ 2.869399] mtrr: corrected configuration. <6>[ 2.872240] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. <6>[ 3.014360] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages <6>[ 3.014701] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page <6>[ 3.030093] cryptd: max_cpu_qlen set to 1000 <6>[ 3.037731] ACPI: Added _OSI(Module Device) <6>[ 3.038181] ACPI: Added _OSI(Processor Device) <6>[ 3.038357] ACPI: Added _OSI(3.0 _SCP Extensions) <6>[ 3.038533] ACPI: Added _OSI(Processor Aggregator Device) <6>[ 3.168161] ACPI: 1 ACPI AML tables successfully acquired and loaded <6>[ 3.217601] ACPI: Interpreter enabled <6>[ 3.219694] ACPI: PM: (supports S0 S3 S4 S5) <6>[ 3.219895] ACPI: Using IOAPIC for interrupt routing <6>[ 3.222938] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug <6>[ 3.223257] PCI: Using E820 reservations for host bridge windows <6>[ 3.229057] ACPI: Enabled 2 GPEs in block 00 to 3F <6>[ 3.378643] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) <6>[ 3.379476] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] <6>[ 3.386440] acpi PNP0A08:00: _OSC: platform does not support [LTR] <6>[ 3.395741] acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability] <6>[ 3.403962] PCI host bridge to bus 0000:00 <6>[ 3.404854] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] <6>[ 3.405221] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] <6>[ 3.405467] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] <6>[ 3.405774] pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] <6>[ 3.406106] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] <6>[ 3.406387] pci_bus 0000:00: root bus resource [mem 0x180000000-0x97fffffff window] <6>[ 3.407035] pci_bus 0000:00: root bus resource [bus 00-ff] <6>[ 3.409941] pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 conventional PCI endpoint <6>[ 3.420212] pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 conventional PCI endpoint <6>[ 3.421485] pci 0000:00:01.0: BAR 0 [mem 0xfd000000-0xfdffffff pref] <6>[ 3.423624] pci 0000:00:01.0: BAR 2 [mem 0xfebf0000-0xfebf0fff] <6>[ 3.426840] pci 0000:00:01.0: ROM [mem 0xfebe0000-0xfebeffff pref] <6>[ 3.427562] pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] <6>[ 3.432562] pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 conventional PCI endpoint <6>[ 3.433521] pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO <6>[ 3.438162] pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 conventional PCI endpoint <6>[ 3.440205] pci 0000:00:1f.2: BAR 4 [io 0xc040-0xc05f] <6>[ 3.441367] pci 0000:00:1f.2: BAR 5 [mem 0xfebf1000-0xfebf1fff] <6>[ 3.447302] pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 conventional PCI endpoint <6>[ 3.448611] pci 0000:00:1f.3: BAR 4 [io 0x0700-0x073f] <6>[ 3.467480] ACPI: PCI: Interrupt link LNKA configured for IRQ 10 <6>[ 3.473004] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 <6>[ 3.477621] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 <6>[ 3.482215] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 <6>[ 3.486939] ACPI: PCI: Interrupt link LNKE configured for IRQ 10 <6>[ 3.491536] ACPI: PCI: Interrupt link LNKF configured for IRQ 10 <6>[ 3.496235] ACPI: PCI: Interrupt link LNKG configured for IRQ 11 <6>[ 3.501122] ACPI: PCI: Interrupt link LNKH configured for IRQ 11 <6>[ 3.502478] ACPI: PCI: Interrupt link GSIA configured for IRQ 16 <6>[ 3.503380] ACPI: PCI: Interrupt link GSIB configured for IRQ 17 <6>[ 3.504260] ACPI: PCI: Interrupt link GSIC configured for IRQ 18 <6>[ 3.505174] ACPI: PCI: Interrupt link GSID configured for IRQ 19 <6>[ 3.506078] ACPI: PCI: Interrupt link GSIE configured for IRQ 20 <6>[ 3.507121] ACPI: PCI: Interrupt link GSIF configured for IRQ 21 <6>[ 3.508016] ACPI: PCI: Interrupt link GSIG configured for IRQ 22 <6>[ 3.508918] ACPI: PCI: Interrupt link GSIH configured for IRQ 23 <6>[ 3.526006] iommu: Default domain type: Translated <6>[ 3.526290] iommu: DMA domain TLB invalidation policy: lazy mode <5>[ 3.529958] SCSI subsystem initialized <7>[ 3.532915] libata version 3.00 loaded. <6>[ 3.535684] ACPI: bus type USB registered <6>[ 3.536824] usbcore: registered new interface driver usbfs <6>[ 3.537524] usbcore: registered new interface driver hub <6>[ 3.538295] usbcore: registered new device driver usb <6>[ 3.539415] mc: Linux media interface: v0.10 <6>[ 3.540073] videodev: Linux video capture interface: v2.00 <6>[ 3.540696] pps_core: LinuxPPS API ver. 1 registered <6>[ 3.540843] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <6>[ 3.541378] PTP clock support registered <6>[ 3.546045] Advanced Linux Sound Architecture Driver Initialized. <6>[ 3.565935] NetLabel: Initializing <6>[ 3.566162] NetLabel: domain hash size = 128 <6>[ 3.566351] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO <6>[ 3.568688] NetLabel: unlabeled traffic allowed by default <6>[ 3.578577] PCI: Using ACPI for IRQ routing <7>[ 3.586904] PCI: pci_cache_line_size set to 64 bytes <7>[ 3.587766] e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] <7>[ 3.588398] e820: reserve RAM buffer [mem 0x7ffdf000-0x7fffffff] <6>[ 3.591630] pci 0000:00:01.0: vgaarb: setting as boot VGA device <6>[ 3.591810] pci 0000:00:01.0: vgaarb: bridge control possible <6>[ 3.591810] pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none <6>[ 3.592840] vgaarb: loaded <6>[ 3.595458] hpet: 3 channels of 0 reserved for per-cpu timers <6>[ 3.596104] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 <6>[ 3.596524] hpet0: 3 comparators, 64-bit 100.000000 MHz counter <6>[ 3.607289] clocksource: Switched to clocksource tsc-early <5>[ 3.927624] VFS: Disk quotas dquot_6.6.0 <6>[ 3.928447] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) <6>[ 3.984531] pnp: PnP ACPI init <6>[ 3.995229] system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved <6>[ 4.009153] pnp: PnP ACPI: found 6 devices <6>[ 4.110992] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns <6>[ 4.112785] NET: Registered PF_INET protocol family <6>[ 4.115263] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) <6>[ 4.145459] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) <6>[ 4.146706] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) <6>[ 4.147751] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) <6>[ 4.149979] TCP bind hash table entries: 32768 (order: 8, 1048576 bytes, linear) <6>[ 4.153178] TCP: Hash tables configured (established 32768 bind 32768) <6>[ 4.161139] MPTCP token hash table entries: 4096 (order: 4, 98304 bytes, linear) <6>[ 4.162939] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) <6>[ 4.164220] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) <6>[ 4.169519] NET: Registered PF_UNIX/PF_LOCAL protocol family <6>[ 4.178998] RPC: Registered named UNIX socket transport module. <6>[ 4.179441] RPC: Registered udp transport module. <6>[ 4.179670] RPC: Registered tcp transport module. <6>[ 4.179877] RPC: Registered tcp-with-tls transport module. <6>[ 4.180090] RPC: Registered tcp NFSv4.1 backchannel transport module. <6>[ 4.190341] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] <6>[ 4.190987] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] <6>[ 4.191494] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] <6>[ 4.192107] pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] <6>[ 4.192696] pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] <6>[ 4.193126] pci_bus 0000:00: resource 9 [mem 0x180000000-0x97fffffff window] <6>[ 4.195899] PCI: CLS 0 bytes, default 64 <6>[ 4.198368] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) <6>[ 4.199360] software IO TLB: mapped [mem 0x000000007bfdf000-0x000000007ffdf000] (64MB) <3>[ 4.203694] kvm_intel: VMX not supported by CPU 0 <3>[ 4.204488] kvm_amd: CPU 0 isn't AMD or Hygon <6>[ 4.216707] CPU feature 'AVX registers' is not supported. <6>[ 4.218297] CPU feature 'AVX registers' is not supported. <6>[ 4.218511] AVX2 instructions are not detected. <6>[ 4.218971] AVX or AES-NI instructions are not detected. <6>[ 4.219166] AVX2 or AES-NI instructions are not detected. <6>[ 4.219476] CPU feature 'AVX registers' is not supported. <6>[ 4.219740] CPU feature 'AVX registers' is not supported. <6>[ 4.221025] PCLMULQDQ-NI instructions are not detected. <5>[ 4.231732] Initialise system trusted keyrings <6>[ 4.235841] workingset: timestamp_bits=40 max_order=20 bucket_order=0 <5>[ 4.253952] NFS: Registering the id_resolver key type <5>[ 4.254735] Key type id_resolver registered <5>[ 4.254893] Key type id_legacy registered <6>[ 4.256963] 9p: Installing v9fs 9p2000 file system support <6>[ 4.364476] NET: Registered PF_ALG protocol family <5>[ 4.365090] Key type asymmetric registered <5>[ 4.365319] Asymmetric key parser 'x509' registered <6>[ 4.366277] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) <6>[ 4.367404] io scheduler mq-deadline registered <6>[ 4.367732] io scheduler kyber registered <6>[ 4.374978] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 <6>[ 4.380160] ACPI: button: Power Button [PWRF] <6>[ 4.397119] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled <6>[ 4.416101] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A <6>[ 4.456098] Non-volatile memory driver v1.3 <6>[ 4.456470] Linux agpgart interface v0.103 <6>[ 4.463112] ACPI: bus type drm_connector registered <6>[ 4.527955] loop: module loaded <7>[ 4.532338] ahci 0000:00:1f.2: version 3.0 <6>[ 4.573506] ACPI: \_SB_.GSIA: Enabled at IRQ 16 <6>[ 4.589914] ahci 0000:00:1f.2: AHCI vers 0001.0000, 32 command slots, 1.5 Gbps, SATA mode <6>[ 4.590237] ahci 0000:00:1f.2: 6/6 ports implemented (port mask 0x3f) <6>[ 4.590496] ahci 0000:00:1f.2: flags: 64bit ncq only <6>[ 4.617176] scsi host0: ahci <6>[ 4.630691] scsi host1: ahci <6>[ 4.639724] scsi host2: ahci <6>[ 4.648542] scsi host3: ahci <6>[ 4.658377] scsi host4: ahci <6>[ 4.667401] scsi host5: ahci <6>[ 4.673887] ata1: SATA max UDMA/133 abar m4096@0xfebf1000 port 0xfebf1100 irq 24 lpm-pol 0 <6>[ 4.674885] ata2: SATA max UDMA/133 abar m4096@0xfebf1000 port 0xfebf1180 irq 24 lpm-pol 0 <6>[ 4.675762] ata3: SATA max UDMA/133 abar m4096@0xfebf1000 port 0xfebf1200 irq 24 lpm-pol 0 <6>[ 4.676555] ata4: SATA max UDMA/133 abar m4096@0xfebf1000 port 0xfebf1280 irq 24 lpm-pol 0 <6>[ 4.677434] ata5: SATA max UDMA/133 abar m4096@0xfebf1000 port 0xfebf1300 irq 24 lpm-pol 0 <6>[ 4.678330] ata6: SATA max UDMA/133 abar m4096@0xfebf1000 port 0xfebf1380 irq 24 lpm-pol 0 <6>[ 4.700333] e100: Intel(R) PRO/100 Network Driver <6>[ 4.700669] e100: Copyright(c) 1999-2006 Intel Corporation <6>[ 4.701153] e1000: Intel(R) PRO/1000 Network Driver <6>[ 4.701321] e1000: Copyright (c) 1999-2006 Intel Corporation. <6>[ 4.701869] e1000e: Intel(R) PRO/1000 Network Driver <6>[ 4.702063] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. <6>[ 4.702497] igb: Intel(R) Gigabit Ethernet Network Driver <6>[ 4.702746] igb: Copyright (c) 2007-2014 Intel Corporation. <6>[ 4.703247] sky2: driver version 1.30 <6>[ 4.711502] usbcore: registered new interface driver usblp <6>[ 4.712211] usbcore: registered new interface driver usb-storage <6>[ 4.713963] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 <6>[ 4.720427] serio: i8042 KBD port at 0x60,0x64 irq 1 <6>[ 4.721085] serio: i8042 AUX port at 0x60,0x64 irq 12 <6>[ 4.729648] rtc_cmos 00:04: RTC can wake from S4 <6>[ 4.736467] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 <6>[ 4.739218] rtc_cmos 00:04: registered as rtc0 <6>[ 4.742432] rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs <3>[ 4.744173] fail to initialize ptp_kvm <6>[ 4.746057] device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev <6>[ 4.746987] intel_pstate: CPU model not supported <6>[ 4.791342] i801_smbus 0000:00:1f.3: SMBus using PCI interrupt <6>[ 4.797237] i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD <6>[ 4.830933] kworker/u8:6 (76) used greatest stack depth: 29000 bytes left <4>[ 4.837037] ------------[ cut here ]------------ <4>[ 4.837314] WARNING: CPU: 0 PID: 68 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 4.838220] Modules linked in: <4>[ 4.838640] CPU: 0 UID: 0 PID: 68 Comm: kworker/u8:6 Not tainted 6.11.0-rc2-next-20240807 #1 <4>[ 4.838821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 4.839000] Workqueue: events_unbound call_usermodehelper_exec_work <4>[ 4.839158] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 4.839230] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 4.839304] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 4.839368] RAX: 0000000080000000 RBX: ffff88810162d780 RCX: ffff888154200000 <4>[ 4.839405] RDX: 000000000002afe0 RSI: ffffffff88ebc501 RDI: ffff88815422afe0 <4>[ 4.839440] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: ffffffff8c2015af <4>[ 4.839474] R10: ffffffff888672ec R11: ffffffff8c06791e R12: ffffea0004058a00 <4>[ 4.839507] R13: ffff88815422afe0 R14: 0000000000c80501 R15: 0000000000039408 <4>[ 4.839561] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 4.839652] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 4.839675] CR2: ffff888169a01000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 4.839752] Call Trace: <4>[ 4.839851] <4>[ 4.839988] ? show_regs+0x68/0x80 <4>[ 4.840052] ? __warn+0xd5/0x260 <4>[ 4.840069] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 4.840088] ? report_bug+0x278/0x2e0 <4>[ 4.840112] ? handle_bug+0x7b/0xa0 <4>[ 4.840128] ? exc_invalid_op+0x1c/0x50 <4>[ 4.840145] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 4.840165] ? sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 4.840183] ? irq_exit_rcu+0x9c/0xd0 <4>[ 4.840198] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 4.840217] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 4.840260] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 4.840291] rcu_core+0x683/0x1c80 <4>[ 4.840329] ? __pfx_rcu_core+0x10/0x10 <4>[ 4.840351] ? lapic_next_event+0x19/0x30 <4>[ 4.840367] ? handle_softirqs+0x18e/0x720 <4>[ 4.840386] rcu_core_si+0x12/0x20 <4>[ 4.840402] handle_softirqs+0x20c/0x720 <4>[ 4.840421] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 4.840440] irq_exit_rcu+0x9c/0xd0 <4>[ 4.840456] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 4.840483] <4>[ 4.840499] <4>[ 4.840509] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 4.840556] RIP: 0010:_raw_spin_unlock_irqrestore+0x3f/0x90 <4>[ 4.840637] Code: 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 39 c6 07 00 f7 c6 00 02 00 00 75 1b 01 00 00 00 e8 07 f5 87 fc 65 8b 05 a8 12 fb 73 85 c0 74 0e c9 <4>[ 4.840657] RSP: 0000:ffff888101d9f7c8 EFLAGS: 00000282 <4>[ 4.840674] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000000000 <4>[ 4.840685] RDX: 0000000000000000 RSI: ffffffff89e91e98 RDI: ffffffff8c08816f <4>[ 4.840696] RBP: ffff888101d9f7d8 R08: 0000000000000001 R09: 0000000000000000 <4>[ 4.840706] R10: ffff888101d9f730 R11: f57f623bad4421fd R12: 0000000000000246 <4>[ 4.840716] R13: ffff888101d9f850 R14: ffff888101d9f9a0 R15: ffff888101d9f850 <4>[ 4.840758] ? crng_make_state+0x198/0x1e0 <4>[ 4.840784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 4.840805] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 4.840823] crng_make_state+0x198/0x1e0 <4>[ 4.840843] _get_random_bytes+0x10f/0x1e0 <4>[ 4.840862] ? __pfx__get_random_bytes+0x10/0x10 <4>[ 4.840887] ? __pfx___alloc_pages_noprof+0x10/0x10 <4>[ 4.840909] get_random_u64+0x23a/0x350 <4>[ 4.840925] ? __pfx_get_random_u64+0x10/0x10 <4>[ 4.840941] ? copy_process+0x256e/0x5670 <4>[ 4.840958] ? kernel_clone+0xef/0x740 <4>[ 4.840977] copy_process+0x56e/0x5670 <4>[ 4.840995] ? timerqueue_add+0x164/0x340 <4>[ 4.841016] ? __pfx_copy_process+0x10/0x10 <4>[ 4.841038] ? _raw_spin_unlock_irqrestore+0x49/0x90 <4>[ 4.841057] kernel_clone+0xef/0x740 <4>[ 4.841072] ? __pfx_sched_balance_newidle+0x10/0x10 <4>[ 4.841092] ? __pfx_kernel_clone+0x10/0x10 <4>[ 4.841110] ? kernel_sigaction+0x9b/0x210 <4>[ 4.841128] ? __kasan_check_write+0x18/0x20 <4>[ 4.841148] user_mode_thread+0xaf/0xe0 <4>[ 4.841165] ? __pfx_user_mode_thread+0x10/0x10 <4>[ 4.841186] ? __pfx_call_usermodehelper_exec_async+0x10/0x10 <4>[ 4.841206] ? _raw_spin_unlock_irq+0x3c/0x80 <4>[ 4.841222] ? trace_preempt_on+0x20/0xc0 <4>[ 4.841241] call_usermodehelper_exec_work+0x60/0x150 <4>[ 4.841258] ? _raw_spin_unlock_irq+0x47/0x80 <4>[ 4.841275] process_one_work+0x5ee/0xf60 <4>[ 4.841291] ? __kasan_check_write+0x18/0x20 <4>[ 4.841313] worker_thread+0x720/0x12d0 <4>[ 4.841336] ? __pfx_worker_thread+0x10/0x10 <4>[ 4.841353] kthread+0x257/0x310 <4>[ 4.841370] ? __pfx_kthread+0x10/0x10 <4>[ 4.841388] ret_from_fork+0x41/0x80 <4>[ 4.841405] ? __pfx_kthread+0x10/0x10 <4>[ 4.841422] ret_from_fork_asm+0x1a/0x30 <4>[ 4.841459] <4>[ 4.841516] ---[ end trace 0000000000000000 ]--- <6>[ 4.860832] kworker/u8:6 (79) used greatest stack depth: 28856 bytes left <6>[ 4.864496] hid: raw HID events driver (C) Jiri Kosina <6>[ 4.871158] usbcore: registered new interface driver usbhid <6>[ 4.871415] usbhid: USB HID core driver <6>[ 4.888935] Initializing XFRM netlink socket <6>[ 4.890024] NET: Registered PF_INET6 protocol family <6>[ 4.903229] Segment Routing with IPv6 <6>[ 4.903918] In-situ OAM (IOAM) with IPv6 <6>[ 4.905909] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver <6>[ 4.913824] NET: Registered PF_PACKET protocol family <6>[ 4.916137] 9pnet: Installing 9P2000 support <5>[ 4.917033] Key type dns_resolver registered <6>[ 4.924251] IPI shorthand broadcast: enabled <6>[ 5.001460] ata6: SATA link down (SStatus 0 SControl 300) <6>[ 5.007231] ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) <6>[ 5.013073] ata5: SATA link down (SStatus 0 SControl 300) <6>[ 5.013746] ata2: SATA link down (SStatus 0 SControl 300) <6>[ 5.014250] ata4: SATA link down (SStatus 0 SControl 300) <6>[ 5.014962] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 300) <6>[ 5.021040] ata1.00: ATA-7: QEMU HARDDISK, 2.5+, max UDMA/100 <6>[ 5.022378] ata1.00: 5205184 sectors, multi 16: LBA48 NCQ (depth 32) <6>[ 5.024047] ata1.00: applying bridge limits <6>[ 5.028255] ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 <6>[ 5.028931] ata3.00: applying bridge limits <6>[ 5.031882] ata3.00: configured for UDMA/100 <6>[ 5.033759] ata1.00: configured for UDMA/100 <5>[ 5.052294] scsi 0:0:0:0: Direct-Access ATA QEMU HARDDISK 2.5+ PQ: 0 ANSI: 5 <5>[ 5.070979] sd 0:0:0:0: Attached scsi generic sg0 type 0 <5>[ 5.072192] sd 0:0:0:0: [sda] 5205184 512-byte logical blocks: (2.67 GB/2.48 GiB) <5>[ 5.073722] sd 0:0:0:0: [sda] Write Protect is off <7>[ 5.073976] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 <5>[ 5.074965] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA <6>[ 5.079990] sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes <5>[ 5.080873] scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 <6>[ 5.113874] sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray <6>[ 5.114466] cdrom: Uniform CD-ROM driver Revision: 3.20 <5>[ 5.123225] sd 0:0:0:0: [sda] Attached SCSI disk <7>[ 5.141643] sr 2:0:0:0: Attached scsi CD-ROM sr0 <5>[ 5.144872] sr 2:0:0:0: Attached scsi generic sg1 type 5 <6>[ 5.185974] sched_clock: Marking stable (5120031551, 65546136)->(5234226263, -48648576) <6>[ 5.194867] registered taskstats version 1 <5>[ 5.195126] Loading compiled-in X.509 certificates <6>[ 5.207847] tsc: Refined TSC clocksource calibration: 3393.586 MHz <6>[ 5.208637] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x30eaa33c043, max_idle_ns: 440795241837 ns <6>[ 5.211702] clocksource: Switched to clocksource tsc <6>[ 5.345986] Demotion targets for Node 0: null <6>[ 5.353070] PM: Magic number: 4:958:821 <6>[ 5.354370] printk: legacy console [netcon0] enabled <6>[ 5.354697] netconsole: network logging started <5>[ 5.358031] cfg80211: Loading compiled-in X.509 certificates for regulatory database <5>[ 5.383088] Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' <5>[ 5.384887] Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' <4>[ 5.390128] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 <6>[ 5.391115] cfg80211: failed to load regulatory.db <6>[ 5.391214] ALSA device list: <6>[ 5.391796] No soundcards found. <6>[ 5.392830] KTAP version 1 <6>[ 5.393095] 1..103 <6>[ 5.398893] KTAP version 1 <6>[ 5.399304] # Subtest: example_init <6>[ 5.400241] # module: kunit_example_test <6>[ 5.401179] # is_init: true <6>[ 5.401773] 1..1 <6>[ 5.406621] ok 1 example_init_test <6>[ 5.407360] ok 1 example_init <6>[ 5.408545] KTAP version 1 <6>[ 5.408959] # Subtest: time_test_cases <6>[ 5.409274] # module: time_test <6>[ 5.409370] 1..1 <3>[ 6.015042] psmouse serio1: pixart_ps2: init: Unable to query PixArt touchpad hardware. <6>[ 6.123395] input: ImExPS/2 PixArt clickpad as /devices/platform/i8042/serio1/input/input3 <6>[ 11.737713] # time64_to_tm_test_date_range.speed: slow <6>[ 11.738085] ok 1 time64_to_tm_test_date_range <6>[ 11.738557] ok 2 time_test_cases <4>[ 11.739197] ------------[ cut here ]------------ <4>[ 11.739328] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.739432] Modules linked in: <4>[ 11.740015] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W N 6.11.0-rc2-next-20240807 #1 <4>[ 11.740169] Tainted: [W]=WARN, [N]=TEST <4>[ 11.740195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 11.740221] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.740276] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 11.740312] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 11.740350] RAX: 0000000080000000 RBX: ffff88810293b480 RCX: ffff888154200000 <4>[ 11.740376] RDX: 000000000003afe0 RSI: ffffffff88ebc501 RDI: ffff88815423afe0 <4>[ 11.740400] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 11.740424] R10: 00000000ac9b86ac R11: 00000000000ff400 R12: ffffea00040a4e00 <4>[ 11.740447] R13: ffff88815423afe0 R14: 0000000000200001 R15: 0000000000039408 <4>[ 11.740470] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 11.740498] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 11.740522] CR2: 0000000000000000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 11.740545] Call Trace: <4>[ 11.740565] <4>[ 11.740595] ? show_regs+0x68/0x80 <4>[ 11.740721] ? __warn+0xd5/0x260 <4>[ 11.740764] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.740807] ? report_bug+0x278/0x2e0 <4>[ 11.740856] ? handle_bug+0x7b/0xa0 <4>[ 11.740891] ? exc_invalid_op+0x1c/0x50 <4>[ 11.740926] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 11.740974] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 11.741014] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.741064] rcu_core+0x683/0x1c80 <4>[ 11.741117] ? __pfx_rcu_core+0x10/0x10 <4>[ 11.741160] ? lapic_next_event+0x19/0x30 <4>[ 11.741195] ? handle_softirqs+0x18e/0x720 <4>[ 11.741237] rcu_core_si+0x12/0x20 <4>[ 11.741275] handle_softirqs+0x20c/0x720 <4>[ 11.741316] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 11.741359] irq_exit_rcu+0x9c/0xd0 <4>[ 11.741395] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 11.741438] <4>[ 11.741456] <4>[ 11.741475] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 11.741514] RIP: 0010:console_flush_all+0x77d/0xb70 <4>[ 11.741557] Code: c7 c5 e0 c6 51 8d 48 39 07 0f 83 6c fe ff ff 48 89 07 e9 64 fe ff ff e8 21 11 25 00 e9 dc fc ff ff e8 67 12 25 00 fb 4c 89 f0 <48> c1 e8 03 42 80 3c 38 00 0f 85 57 03 00 00 48 8b 85 40 ff ff ff <4>[ 11.741588] RSP: 0000:ffff88810030f720 EFLAGS: 00000296 <4>[ 11.741622] RAX: ffffffff8d97f998 RBX: ffffffff8d97f940 RCX: 0000000000000000 <4>[ 11.741738] RDX: 0000000000000000 RSI: ffffffff889d1060 RDI: ffffffff889d0ba9 <4>[ 11.741768] RBP: ffff88810030f800 R08: 0000000000000001 R09: ffffed1020061ed4 <4>[ 11.741791] R10: 0000000000000003 R11: 205d353830383337 R12: ffff88810030f7d8 <4>[ 11.741813] R13: ffffffff8d51c6e0 R14: ffffffff8d97f998 R15: dffffc0000000000 <4>[ 11.741851] ? console_unlock+0xb0/0x250 <4>[ 11.741889] ? console_flush_all+0x779/0xb70 <4>[ 11.741938] ? __pfx_console_flush_all+0x10/0x10 <4>[ 11.741984] ? __kasan_check_write+0x18/0x20 <4>[ 11.742028] console_unlock+0xb0/0x250 <4>[ 11.742064] ? __pfx_console_unlock+0x10/0x10 <4>[ 11.742099] ? string_stream_vadd+0x2f9/0x530 <4>[ 11.742137] ? __down_trylock_console_sem.isra.0+0x5d/0x70 <4>[ 11.742175] ? console_trylock+0x60/0x100 <4>[ 11.742210] ? trace_hardirqs_on+0x37/0xe0 <4>[ 11.742252] vprintk_emit+0x138/0x3e0 <4>[ 11.742294] vprintk_default+0x21/0x30 <4>[ 11.742331] vprintk+0x35/0x40 <4>[ 11.742366] _printk+0xc0/0xf0 <4>[ 11.742399] ? __pfx__printk+0x10/0x10 <4>[ 11.742435] ? kunit_run_case_catch_errors+0x191/0x320 <4>[ 11.742486] kunit_print_ok_not_ok+0x86/0x1e0 <4>[ 11.742530] kunit_run_tests+0xb04/0x1000 <4>[ 11.742589] ? __pfx_kunit_run_tests+0x10/0x10 <4>[ 11.742733] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 <4>[ 11.742783] ? __pfx_kunit_catch_run_case_cleanup+0x10/0x10 <4>[ 11.742859] ? trace_preempt_on+0x20/0xc0 <4>[ 11.742891] ? trace_preempt_off+0x20/0xc0 <4>[ 11.742946] ? string_stream_clear+0x35/0x210 <4>[ 11.742994] ? _raw_spin_unlock+0x41/0x70 <4>[ 11.743032] ? string_stream_clear+0x176/0x210 <4>[ 11.743072] __kunit_test_suites_init+0x130/0x1c0 <4>[ 11.743116] kunit_run_all_tests+0x3bf/0x400 <4>[ 11.743154] ? __pfx_kunit_run_all_tests+0x10/0x10 <4>[ 11.743190] ? kernel_init_freeable+0x450/0x6f0 <4>[ 11.743235] ? __kasan_slab_free+0x69/0x80 <4>[ 11.743275] ? kfree+0x21a/0x330 <4>[ 11.743307] ? blake2s_update+0xb1/0x1a0 <4>[ 11.743353] kernel_init_freeable+0x455/0x6f0 <4>[ 11.743393] ? __pfx_kernel_init+0x10/0x10 <4>[ 11.743430] kernel_init+0x23/0x1e0 <4>[ 11.743464] ret_from_fork+0x41/0x80 <4>[ 11.743501] ? __pfx_kernel_init+0x10/0x10 <4>[ 11.743535] ret_from_fork_asm+0x1a/0x30 <4>[ 11.743589] <4>[ 11.743607] ---[ end trace 0000000000000000 ]--- <6>[ 11.776449] KTAP version 1 <6>[ 11.776673] # Subtest: hw_breakpoint <6>[ 11.776870] # module: hw_breakpoint_test <6>[ 11.776946] 1..9 <6>[ 11.790818] kunit_try_catch (92) used greatest stack depth: 28840 bytes left <6>[ 11.796268] ok 1 test_one_cpu <6>[ 11.800206] kunit_try_catch (94) used greatest stack depth: 28392 bytes left <6>[ 11.801854] ok 2 test_many_cpus <6>[ 11.811297] ok 3 test_one_task_on_all_cpus <6>[ 11.818819] ok 4 test_two_tasks_on_all_cpus <6>[ 11.823104] ok 5 test_one_task_on_one_cpu <6>[ 11.829612] ok 6 test_one_task_mixed <6>[ 11.834989] ok 7 test_two_tasks_on_one_cpu <6>[ 11.838530] ok 8 test_two_tasks_on_one_all_cpus <6>[ 11.842276] ok 9 test_task_on_all_and_one_cpu <6>[ 11.842566] # hw_breakpoint: pass:9 fail:0 skip:0 total:9 <6>[ 11.842943] # Totals: pass:9 fail:0 skip:0 total:9 <6>[ 11.843196] ok 3 hw_breakpoint <6>[ 11.843975] KTAP version 1 <6>[ 11.844132] # Subtest: resource <6>[ 11.844297] # module: resource_kunit <6>[ 11.844344] 1..2 <6>[ 11.846941] ok 1 resource_test_union <6>[ 11.848599] ok 2 resource_test_intersection <6>[ 11.848901] # resource: pass:2 fail:0 skip:0 total:2 <6>[ 11.849090] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 11.849278] ok 4 resource <6>[ 11.849900] KTAP version 1 <6>[ 11.850028] # Subtest: sysctl_test <6>[ 11.850168] # module: sysctl_test <6>[ 11.850212] 1..11 <6>[ 11.852774] ok 1 sysctl_test_api_dointvec_null_tbl_data <6>[ 11.854184] ok 2 sysctl_test_api_dointvec_table_maxlen_unset <6>[ 11.855568] ok 3 sysctl_test_api_dointvec_table_len_is_zero <6>[ 11.857159] ok 4 sysctl_test_api_dointvec_table_read_but_position_set <6>[ 11.859042] ok 5 sysctl_test_dointvec_read_happy_single_positive <6>[ 11.860672] ok 6 sysctl_test_dointvec_read_happy_single_negative <6>[ 11.862758] ok 7 sysctl_test_dointvec_write_happy_single_positive <6>[ 11.864526] ok 8 sysctl_test_dointvec_write_happy_single_negative <6>[ 11.866826] ok 9 sysctl_test_api_dointvec_write_single_less_int_min <6>[ 11.869198] ok 10 sysctl_test_api_dointvec_write_single_greater_int_max <3>[ 11.870252] sysctl table check failed: foo/foo range value too large for proc_dou8vec_minmax <3>[ 11.871064] sysctl table check failed: foo/bar range value too large for proc_dou8vec_minmax <6>[ 11.872226] ok 11 sysctl_test_register_sysctl_sz_invalid_extra_value <6>[ 11.872293] # sysctl_test: pass:11 fail:0 skip:0 total:11 <6>[ 11.872565] # Totals: pass:11 fail:0 skip:0 total:11 <6>[ 11.873201] ok 5 sysctl_test <6>[ 11.875933] KTAP version 1 <6>[ 11.876261] # Subtest: kasan <6>[ 11.876471] # module: kasan_test <6>[ 11.876597] 1..72 <3>[ 11.877924] ================================================================== <3>[ 11.878498] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 <3>[ 11.878913] Write of size 1 at addr ffff88810276ab73 by task kunit_try_catch/139 <3>[ 11.879318] <3>[ 11.879632] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G W N 6.11.0-rc2-next-20240807 #1 <3>[ 11.880142] Tainted: [W]=WARN, [N]=TEST <3>[ 11.880333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 11.880829] Call Trace: <3>[ 11.881054] <3>[ 11.881171] dump_stack_lvl+0x73/0xb0 <3>[ 11.881404] print_report+0xd1/0x640 <3>[ 11.881583] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 11.881867] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 11.882181] kasan_report+0x102/0x140 <3>[ 11.882382] ? kmalloc_oob_right+0x6f2/0x7f0 <3>[ 11.882676] ? kmalloc_oob_right+0x6f2/0x7f0 <3>[ 11.882949] __asan_report_store1_noabort+0x1b/0x30 <3>[ 11.883167] kmalloc_oob_right+0x6f2/0x7f0 <3>[ 11.883456] ? __pfx_kmalloc_oob_right+0x10/0x10 <3>[ 11.883651] ? __schedule+0xbca/0x2590 <3>[ 11.883933] ? __pfx_read_tsc+0x10/0x10 <3>[ 11.884113] ? ktime_get_ts64+0x84/0x230 <3>[ 11.884377] kunit_try_run_case+0x1b3/0x490 <3>[ 11.884560] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.884889] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 11.885094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 11.885386] ? __kthread_parkme+0x82/0x160 <3>[ 11.885564] ? preempt_count_sub+0x50/0x80 <3>[ 11.885829] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.886084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 11.886339] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 11.886573] kthread+0x257/0x310 <3>[ 11.886848] ? __pfx_kthread+0x10/0x10 <3>[ 11.887031] ret_from_fork+0x41/0x80 <3>[ 11.887273] ? __pfx_kthread+0x10/0x10 <3>[ 11.887450] ret_from_fork_asm+0x1a/0x30 <3>[ 11.887692] <3>[ 11.887891] <3>[ 11.888085] Allocated by task 139: <4>[ 11.888393] kasan_save_stack+0x3d/0x60 <4>[ 11.888605] kasan_save_track+0x18/0x40 <4>[ 11.888808] kasan_save_alloc_info+0x3b/0x50 <4>[ 11.889076] __kasan_kmalloc+0xb7/0xc0 <4>[ 11.889292] __kmalloc_cache_noprof+0x162/0x350 <4>[ 11.889539] kmalloc_oob_right+0xaa/0x7f0 <4>[ 11.889841] kunit_try_run_case+0x1b3/0x490 <4>[ 11.890030] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 11.890350] kthread+0x257/0x310 <4>[ 11.890509] ret_from_fork+0x41/0x80 <4>[ 11.890718] ret_from_fork_asm+0x1a/0x30 <3>[ 11.890957] <3>[ 11.891178] The buggy address belongs to the object at ffff88810276ab00 <3>[ 11.891178] which belongs to the cache kmalloc-128 of size 128 <3>[ 11.891776] The buggy address is located 0 bytes to the right of <3>[ 11.891776] allocated 115-byte region [ffff88810276ab00, ffff88810276ab73) <3>[ 11.892418] <3>[ 11.892593] The buggy address belongs to the physical page: <4>[ 11.893090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276a <4>[ 11.893581] flags: 0x200000000000000(node=0|zone=2) <4>[ 11.894116] page_type: 0xfdffffff(slab) <4>[ 11.894841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 11.895136] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 11.895612] page dumped because: kasan: bad access detected <3>[ 11.895914] <3>[ 11.896029] Memory state around the buggy address: <3>[ 11.896479] ffff88810276aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 11.896899] ffff88810276aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.897222] >ffff88810276ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 11.897516] ^ <3>[ 11.897929] ffff88810276ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.898197] ffff88810276ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.898610] ================================================================== <4>[ 11.899202] Disabling lock debugging due to kernel taint <3>[ 11.899745] ================================================================== <3>[ 11.900087] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 <3>[ 11.900380] Write of size 1 at addr ffff88810276ab78 by task kunit_try_catch/139 <3>[ 11.900688] <3>[ 11.900864] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 11.901307] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 11.901502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 11.901952] Call Trace: <3>[ 11.902084] <3>[ 11.902222] dump_stack_lvl+0x73/0xb0 <3>[ 11.902498] print_report+0xd1/0x640 <3>[ 11.902673] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 11.902953] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 11.903190] kasan_report+0x102/0x140 <3>[ 11.903368] ? kmalloc_oob_right+0x6bf/0x7f0 <3>[ 11.903620] ? kmalloc_oob_right+0x6bf/0x7f0 <3>[ 11.903815] __asan_report_store1_noabort+0x1b/0x30 <3>[ 11.904123] kmalloc_oob_right+0x6bf/0x7f0 <3>[ 11.904310] ? __pfx_kmalloc_oob_right+0x10/0x10 <3>[ 11.904598] ? __schedule+0xbca/0x2590 <3>[ 11.904772] ? __pfx_read_tsc+0x10/0x10 <3>[ 11.905016] ? ktime_get_ts64+0x84/0x230 <3>[ 11.905194] kunit_try_run_case+0x1b3/0x490 <3>[ 11.905457] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.905647] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 11.905942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 11.906152] ? __kthread_parkme+0x82/0x160 <3>[ 11.906427] ? preempt_count_sub+0x50/0x80 <3>[ 11.906608] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.906889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 11.907155] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 11.907380] kthread+0x257/0x310 <3>[ 11.907624] ? __pfx_kthread+0x10/0x10 <3>[ 11.907797] ret_from_fork+0x41/0x80 <3>[ 11.908022] ? __pfx_kthread+0x10/0x10 <3>[ 11.908192] ret_from_fork_asm+0x1a/0x30 <3>[ 11.908444] <3>[ 11.908560] <3>[ 11.908646] Allocated by task 139: <4>[ 11.908879] kasan_save_stack+0x3d/0x60 <4>[ 11.909054] kasan_save_track+0x18/0x40 <4>[ 11.909291] kasan_save_alloc_info+0x3b/0x50 <4>[ 11.909470] __kasan_kmalloc+0xb7/0xc0 <4>[ 11.909700] __kmalloc_cache_noprof+0x162/0x350 <4>[ 11.909909] kmalloc_oob_right+0xaa/0x7f0 <4>[ 11.910168] kunit_try_run_case+0x1b3/0x490 <4>[ 11.910351] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 11.910651] kthread+0x257/0x310 <4>[ 11.910806] ret_from_fork+0x41/0x80 <4>[ 11.911009] ret_from_fork_asm+0x1a/0x30 <3>[ 11.911192] <3>[ 11.911306] The buggy address belongs to the object at ffff88810276ab00 <3>[ 11.911306] which belongs to the cache kmalloc-128 of size 128 <3>[ 11.911896] The buggy address is located 5 bytes to the right of <3>[ 11.911896] allocated 115-byte region [ffff88810276ab00, ffff88810276ab73) <3>[ 11.912404] <3>[ 11.912511] The buggy address belongs to the physical page: <4>[ 11.912748] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276a <4>[ 11.913060] flags: 0x200000000000000(node=0|zone=2) <4>[ 11.913253] page_type: 0xfdffffff(slab) <4>[ 11.913506] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 11.913803] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 11.914089] page dumped because: kasan: bad access detected <3>[ 11.914297] <3>[ 11.914431] Memory state around the buggy address: <3>[ 11.914715] ffff88810276aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 11.914993] ffff88810276aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.915271] >ffff88810276ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 11.915647] ^ <3>[ 11.915914] ffff88810276ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.916285] ffff88810276ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.916555] ================================================================== <3>[ 11.917450] ================================================================== <3>[ 11.917785] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 <3>[ 11.918113] Read of size 1 at addr ffff88810276ab80 by task kunit_try_catch/139 <3>[ 11.918470] <3>[ 11.918586] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 11.919061] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 11.919248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 11.919697] Call Trace: <3>[ 11.919833] <3>[ 11.919970] dump_stack_lvl+0x73/0xb0 <3>[ 11.920242] print_report+0xd1/0x640 <3>[ 11.920411] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 11.920678] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 11.920913] kasan_report+0x102/0x140 <3>[ 11.921097] ? kmalloc_oob_right+0x68c/0x7f0 <3>[ 11.921356] ? kmalloc_oob_right+0x68c/0x7f0 <3>[ 11.921543] __asan_report_load1_noabort+0x18/0x20 <3>[ 11.921846] kmalloc_oob_right+0x68c/0x7f0 <3>[ 11.922030] ? __pfx_kmalloc_oob_right+0x10/0x10 <3>[ 11.922323] ? __schedule+0xbca/0x2590 <3>[ 11.922493] ? __pfx_read_tsc+0x10/0x10 <3>[ 11.922746] ? ktime_get_ts64+0x84/0x230 <3>[ 11.922999] kunit_try_run_case+0x1b3/0x490 <3>[ 11.923183] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.923474] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 11.923663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 11.923975] ? __kthread_parkme+0x82/0x160 <3>[ 11.924155] ? preempt_count_sub+0x50/0x80 <3>[ 11.924428] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.924627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 11.924977] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 11.925210] kthread+0x257/0x310 <3>[ 11.925458] ? __pfx_kthread+0x10/0x10 <3>[ 11.925634] ret_from_fork+0x41/0x80 <3>[ 11.925865] ? __pfx_kthread+0x10/0x10 <3>[ 11.926046] ret_from_fork_asm+0x1a/0x30 <3>[ 11.926311] <3>[ 11.926423] <3>[ 11.926517] Allocated by task 139: <4>[ 11.926750] kasan_save_stack+0x3d/0x60 <4>[ 11.926952] kasan_save_track+0x18/0x40 <4>[ 11.927210] kasan_save_alloc_info+0x3b/0x50 <4>[ 11.927388] __kasan_kmalloc+0xb7/0xc0 <4>[ 11.927612] __kmalloc_cache_noprof+0x162/0x350 <4>[ 11.927800] kmalloc_oob_right+0xaa/0x7f0 <4>[ 11.928053] kunit_try_run_case+0x1b3/0x490 <4>[ 11.928233] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 11.928527] kthread+0x257/0x310 <4>[ 11.928689] ret_from_fork+0x41/0x80 <4>[ 11.928889] ret_from_fork_asm+0x1a/0x30 <3>[ 11.929078] <3>[ 11.929192] The buggy address belongs to the object at ffff88810276ab00 <3>[ 11.929192] which belongs to the cache kmalloc-128 of size 128 <3>[ 11.929794] The buggy address is located 13 bytes to the right of <3>[ 11.929794] allocated 115-byte region [ffff88810276ab00, ffff88810276ab73) <3>[ 11.930313] <3>[ 11.930425] The buggy address belongs to the physical page: <4>[ 11.930664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276a <4>[ 11.930986] flags: 0x200000000000000(node=0|zone=2) <4>[ 11.931179] page_type: 0xfdffffff(slab) <4>[ 11.931437] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 11.931746] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 11.932034] page dumped because: kasan: bad access detected <3>[ 11.932241] <3>[ 11.932376] Memory state around the buggy address: <3>[ 11.932659] ffff88810276aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.932941] ffff88810276ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 11.933324] >ffff88810276ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.933577] ^ <3>[ 11.933800] ffff88810276ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.934079] ffff88810276ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.934385] ================================================================== <6>[ 11.935565] kunit_try_catch (139) used greatest stack depth: 28240 bytes left <6>[ 11.937046] ok 1 kmalloc_oob_right <3>[ 11.938169] ================================================================== <3>[ 11.939022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x363/0x3c0 <3>[ 11.939521] Read of size 1 at addr ffff88810100083f by task kunit_try_catch/141 <4>[ 11.939885] ------------[ cut here ]------------ <3>[ 11.940126] <4>[ 11.940369] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.940458] Modules linked in: <4>[ 11.940526] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 11.940604] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 11.940630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 11.941036] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.941356] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 11.941431] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 11.941483] RAX: 0000000080000000 RBX: ffff8881029ed780 RCX: ffff888154200000 <4>[ 11.941521] RDX: 000000000003e000 RSI: ffffffff88ebc501 RDI: ffff88815423e000 <4>[ 11.941557] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 11.941592] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00040a7a00 <4>[ 11.941625] R13: ffff88815423e000 R14: 0000000088418401 R15: 0000000000039408 <4>[ 11.941661] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 11.942003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 11.942025] CR2: ffff888169a01000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 11.942055] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 11.942078] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 11.942102] Call Trace: <4>[ 11.942115] <4>[ 11.942131] ? show_regs+0x68/0x80 <4>[ 11.942166] ? __warn+0xd5/0x260 <4>[ 11.942212] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.942266] ? report_bug+0x278/0x2e0 <4>[ 11.942324] ? handle_bug+0x7b/0xa0 <4>[ 11.942371] ? exc_invalid_op+0x1c/0x50 <4>[ 11.942415] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 11.942473] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 11.942522] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 11.942579] rcu_core+0x683/0x1c80 <4>[ 11.942637] ? __pfx_rcu_core+0x10/0x10 <4>[ 11.942759] ? lapic_next_event+0x19/0x30 <4>[ 11.942786] ? handle_softirqs+0x18e/0x720 <4>[ 11.942808] rcu_core_si+0x12/0x20 <4>[ 11.942829] handle_softirqs+0x20c/0x720 <4>[ 11.942878] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 11.942944] irq_exit_rcu+0x9c/0xd0 <4>[ 11.942994] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 11.943045] <4>[ 11.943069] <4>[ 11.943093] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 11.943147] RIP: 0010:default_idle+0xf/0x20 <4>[ 11.943196] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 11.943256] RSP: 0000:ffffffff8d407df0 EFLAGS: 00000206 <4>[ 11.943302] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 11.943340] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 0000000000035854 <4>[ 11.943374] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 11.943411] R10: ffff888154a35723 R11: 0000000000016000 R12: 0000000000000000 <4>[ 11.943447] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 11.943491] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 11.943548] ? arch_cpu_idle+0xd/0x20 <4>[ 11.943591] default_idle_call+0x48/0x80 <4>[ 11.944122] do_idle+0x313/0x3c0 <4>[ 11.944152] ? __pfx_do_idle+0x10/0x10 <4>[ 11.944170] ? trace_preempt_on+0x20/0xc0 <4>[ 11.944189] ? schedule+0x86/0x310 <4>[ 11.944223] ? preempt_count_sub+0x50/0x80 <4>[ 11.944276] cpu_startup_entry+0x5c/0x70 <4>[ 11.944326] rest_init+0x11a/0x140 <4>[ 11.944369] ? acpi_subsystem_init+0x5d/0x150 <4>[ 11.944424] start_kernel+0x31b/0x400 <4>[ 11.944478] x86_64_start_reservations+0x1c/0x30 <4>[ 11.944532] x86_64_start_kernel+0xcf/0xe0 <4>[ 11.944582] common_startup_64+0x12c/0x138 <4>[ 11.944644] <4>[ 11.944667] ---[ end trace 0000000000000000 ]--- <3>[ 11.960726] CPU: 1 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 11.961077] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 11.961238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 11.961506] Call Trace: <3>[ 11.961618] <3>[ 11.961754] dump_stack_lvl+0x73/0xb0 <3>[ 11.961925] print_report+0xd1/0x640 <3>[ 11.962076] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 11.962250] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 11.962444] kasan_report+0x102/0x140 <3>[ 11.962592] ? kmalloc_oob_left+0x363/0x3c0 <3>[ 11.962819] ? kmalloc_oob_left+0x363/0x3c0 <3>[ 11.962999] __asan_report_load1_noabort+0x18/0x20 <3>[ 11.963180] kmalloc_oob_left+0x363/0x3c0 <3>[ 11.963330] ? __pfx_kmalloc_oob_left+0x10/0x10 <3>[ 11.963503] ? __schedule+0xbca/0x2590 <3>[ 11.963649] ? __pfx_read_tsc+0x10/0x10 <3>[ 11.963809] ? ktime_get_ts64+0x84/0x230 <3>[ 11.963958] kunit_try_run_case+0x1b3/0x490 <3>[ 11.964118] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.964281] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 11.964452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 11.964649] ? __kthread_parkme+0x82/0x160 <3>[ 11.964827] ? preempt_count_sub+0x50/0x80 <3>[ 11.964989] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.965163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 11.965371] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 11.965562] kthread+0x257/0x310 <3>[ 11.965743] ? __pfx_kthread+0x10/0x10 <3>[ 11.965885] ret_from_fork+0x41/0x80 <3>[ 11.966035] ? __pfx_kthread+0x10/0x10 <3>[ 11.966192] ret_from_fork_asm+0x1a/0x30 <3>[ 11.966379] <3>[ 11.966485] <3>[ 11.966571] Allocated by task 46: <4>[ 11.966884] kasan_save_stack+0x3d/0x60 <4>[ 11.967191] kasan_save_track+0x18/0x40 <4>[ 11.967430] kasan_save_alloc_info+0x3b/0x50 <4>[ 11.967687] __kasan_kmalloc+0xb7/0xc0 <4>[ 11.967949] __kmalloc_node_track_caller_noprof+0x1e8/0x450 <4>[ 11.968256] kvasprintf+0xc6/0x150 <4>[ 11.968479] kasprintf+0xb3/0xe0 <4>[ 11.968711] input_devnode+0x46/0x80 <4>[ 11.968975] device_get_devnode+0x145/0x2a0 <4>[ 11.969221] dev_uevent+0x397/0x690 <4>[ 11.969460] kobject_uevent_env+0x50d/0xff0 <4>[ 11.969735] kobject_uevent+0xf/0x20 <4>[ 11.969962] device_add+0xe49/0x1820 <4>[ 11.970192] cdev_device_add+0xfe/0x240 <4>[ 11.970439] evdev_connect+0x356/0x480 <4>[ 11.970704] input_attach_handler.isra.0+0x117/0x1f0 <4>[ 11.971006] input_register_device+0x724/0xe00 <4>[ 11.971268] psmouse_connect+0x6ed/0xe30 <4>[ 11.971513] serio_driver_probe+0x7a/0xb0 <4>[ 11.971809] really_probe+0x1d4/0x920 <4>[ 11.972051] __driver_probe_device+0x18f/0x3e0 <4>[ 11.972320] driver_probe_device+0x4f/0x130 <4>[ 11.972571] __driver_attach+0x1eb/0x4b0 <4>[ 11.972855] bus_for_each_dev+0x112/0x1a0 <4>[ 11.973096] driver_attach+0x41/0x60 <4>[ 11.973323] serio_handle_event+0x247/0x930 <4>[ 11.973572] process_one_work+0x5ee/0xf60 <4>[ 11.973883] worker_thread+0x720/0x12d0 <4>[ 11.974121] kthread+0x257/0x310 <4>[ 11.974340] ret_from_fork+0x41/0x80 <4>[ 11.974573] ret_from_fork_asm+0x1a/0x30 <3>[ 11.974913] <3>[ 11.975081] Freed by task 46: <4>[ 11.975309] kasan_save_stack+0x3d/0x60 <4>[ 11.975559] kasan_save_track+0x18/0x40 <4>[ 11.975833] kasan_save_free_info+0x3f/0x60 <4>[ 11.976094] __kasan_slab_free+0x5e/0x80 <4>[ 11.976342] kfree+0x21a/0x330 <4>[ 11.976552] dev_uevent+0x3e5/0x690 <4>[ 11.976832] kobject_uevent_env+0x50d/0xff0 <4>[ 11.977091] kobject_uevent+0xf/0x20 <4>[ 11.977323] device_add+0xe49/0x1820 <4>[ 11.977546] cdev_device_add+0xfe/0x240 <4>[ 11.977828] evdev_connect+0x356/0x480 <4>[ 11.978066] input_attach_handler.isra.0+0x117/0x1f0 <4>[ 11.978353] input_register_device+0x724/0xe00 <4>[ 11.978619] psmouse_connect+0x6ed/0xe30 <4>[ 11.978868] serio_driver_probe+0x7a/0xb0 <4>[ 11.979143] really_probe+0x1d4/0x920 <4>[ 11.979375] __driver_probe_device+0x18f/0x3e0 <4>[ 11.979638] driver_probe_device+0x4f/0x130 <4>[ 11.979905] __driver_attach+0x1eb/0x4b0 <4>[ 11.980140] bus_for_each_dev+0x112/0x1a0 <4>[ 11.980382] driver_attach+0x41/0x60 <4>[ 11.980620] serio_handle_event+0x247/0x930 <4>[ 11.980939] process_one_work+0x5ee/0xf60 <4>[ 11.981181] worker_thread+0x720/0x12d0 <4>[ 11.981409] kthread+0x257/0x310 <4>[ 11.981620] ret_from_fork+0x41/0x80 <4>[ 11.981857] ret_from_fork_asm+0x1a/0x30 <3>[ 11.982126] <3>[ 11.982266] The buggy address belongs to the object at ffff888101000820 <3>[ 11.982266] which belongs to the cache kmalloc-16 of size 16 <3>[ 11.982957] The buggy address is located 15 bytes to the right of <3>[ 11.982957] allocated 16-byte region [ffff888101000820, ffff888101000830) <3>[ 11.983563] <3>[ 11.983716] The buggy address belongs to the physical page: <4>[ 11.984065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101000 <4>[ 11.984478] flags: 0x200000000000000(node=0|zone=2) <4>[ 11.984817] page_type: 0xfdffffff(slab) <4>[ 11.985074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 11.985473] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 11.985896] page dumped because: kasan: bad access detected <3>[ 11.986182] <3>[ 11.986295] Memory state around the buggy address: <3>[ 11.986543] ffff888101000700: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc <3>[ 11.986973] ffff888101000780: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc <3>[ 11.987326] >ffff888101000800: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc <3>[ 11.987682] ^ <3>[ 11.987949] ffff888101000880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.988303] ffff888101000900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 11.988699] ================================================================== <6>[ 11.990293] ok 2 kmalloc_oob_left <3>[ 11.991173] ================================================================== <3>[ 11.991519] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x36b/0x3d0 <3>[ 11.991828] Read of size 1 at addr ffff8881029c9000 by task kunit_try_catch/143 <3>[ 11.992045] <3>[ 11.992152] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 11.992475] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 11.992651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 11.992915] Call Trace: <3>[ 11.993020] <3>[ 11.993122] dump_stack_lvl+0x73/0xb0 <3>[ 11.993274] print_report+0xd1/0x640 <3>[ 11.993465] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 11.993623] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 11.993835] kasan_report+0x102/0x140 <3>[ 11.993985] ? kmalloc_node_oob_right+0x36b/0x3d0 <3>[ 11.994152] ? kmalloc_node_oob_right+0x36b/0x3d0 <3>[ 11.994325] __asan_report_load1_noabort+0x18/0x20 <3>[ 11.994498] kmalloc_node_oob_right+0x36b/0x3d0 <3>[ 11.994675] ? __pfx_kmalloc_node_oob_right+0x10/0x10 <3>[ 11.994871] ? __schedule+0xbca/0x2590 <3>[ 11.995037] ? __pfx_read_tsc+0x10/0x10 <3>[ 11.995188] ? ktime_get_ts64+0x84/0x230 <3>[ 11.995341] kunit_try_run_case+0x1b3/0x490 <3>[ 11.995502] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.995695] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 11.995874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 11.996054] ? __kthread_parkme+0x82/0x160 <3>[ 11.996208] ? preempt_count_sub+0x50/0x80 <3>[ 11.996370] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 11.996539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 11.996783] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 11.996962] kthread+0x257/0x310 <3>[ 11.997119] ? __pfx_kthread+0x10/0x10 <3>[ 11.997258] ret_from_fork+0x41/0x80 <3>[ 11.997405] ? __pfx_kthread+0x10/0x10 <3>[ 11.997553] ret_from_fork_asm+0x1a/0x30 <3>[ 11.997765] <3>[ 11.997859] <3>[ 11.997942] Allocated by task 143: <4>[ 11.998076] kasan_save_stack+0x3d/0x60 <4>[ 11.998227] kasan_save_track+0x18/0x40 <4>[ 11.998372] kasan_save_alloc_info+0x3b/0x50 <4>[ 11.998528] __kasan_kmalloc+0xb7/0xc0 <4>[ 11.998703] __kmalloc_cache_node_noprof+0x181/0x370 <4>[ 11.998879] kmalloc_node_oob_right+0xac/0x3d0 <4>[ 11.999055] kunit_try_run_case+0x1b3/0x490 <4>[ 11.999207] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 11.999386] kthread+0x257/0x310 <4>[ 11.999514] ret_from_fork+0x41/0x80 <4>[ 11.999672] ret_from_fork_asm+0x1a/0x30 <3>[ 11.999822] <3>[ 11.999913] The buggy address belongs to the object at ffff8881029c8000 <3>[ 11.999913] which belongs to the cache kmalloc-4k of size 4096 <3>[ 12.000267] The buggy address is located 0 bytes to the right of <3>[ 12.000267] allocated 4096-byte region [ffff8881029c8000, ffff8881029c9000) <3>[ 12.000659] <3>[ 12.000743] The buggy address belongs to the physical page: <4>[ 12.000968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c8 <4>[ 12.001331] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.001575] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.001836] page_type: 0xfdffffff(slab) <4>[ 12.002031] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 <4>[ 12.002258] raw: 0000000000000000 0000000080040004 00000001fdffffff 0000000000000000 <4>[ 12.002521] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 <4>[ 12.002809] head: 0000000000000000 0000000080040004 00000001fdffffff 0000000000000000 <4>[ 12.003062] head: 0200000000000003 ffffea00040a7201 ffffffffffffffff 0000000000000000 <4>[ 12.003302] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.003544] page dumped because: kasan: bad access detected <3>[ 12.003804] <3>[ 12.003889] Memory state around the buggy address: <3>[ 12.004056] ffff8881029c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.004275] ffff8881029c8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.004498] >ffff8881029c9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.004777] ^ <3>[ 12.004911] ffff8881029c9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.005130] ffff8881029c9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.005342] ================================================================== <6>[ 12.007452] ok 3 kmalloc_node_oob_right <3>[ 12.008544] ================================================================== <3>[ 12.009005] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x318/0x370 <3>[ 12.009247] Write of size 1 at addr ffff888102025f00 by task kunit_try_catch/145 <3>[ 12.009465] <3>[ 12.009562] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.010069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.010238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.010504] Call Trace: <3>[ 12.010610] <3>[ 12.010741] dump_stack_lvl+0x73/0xb0 <3>[ 12.010903] print_report+0xd1/0x640 <3>[ 12.011062] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.011226] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.011412] kasan_report+0x102/0x140 <3>[ 12.011555] ? kmalloc_big_oob_right+0x318/0x370 <3>[ 12.011786] ? kmalloc_big_oob_right+0x318/0x370 <3>[ 12.011962] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.012132] kmalloc_big_oob_right+0x318/0x370 <3>[ 12.012297] ? __pfx_kmalloc_big_oob_right+0x10/0x10 <3>[ 12.012476] ? __schedule+0xbca/0x2590 <3>[ 12.012621] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.012808] ? ktime_get_ts64+0x84/0x230 <3>[ 12.012962] kunit_try_run_case+0x1b3/0x490 <3>[ 12.013120] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.013291] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.013458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.013635] ? __kthread_parkme+0x82/0x160 <3>[ 12.013850] ? preempt_count_sub+0x50/0x80 <3>[ 12.014002] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.014183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.014420] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.014644] kthread+0x257/0x310 <3>[ 12.014837] ? __pfx_kthread+0x10/0x10 <3>[ 12.015002] ret_from_fork+0x41/0x80 <3>[ 12.015149] ? __pfx_kthread+0x10/0x10 <3>[ 12.015300] ret_from_fork_asm+0x1a/0x30 <3>[ 12.015456] <3>[ 12.015546] <3>[ 12.015630] Allocated by task 145: <4>[ 12.015780] kasan_save_stack+0x3d/0x60 <4>[ 12.015923] kasan_save_track+0x18/0x40 <4>[ 12.016074] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.016229] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.016370] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.016538] kmalloc_big_oob_right+0xaa/0x370 <4>[ 12.016724] kunit_try_run_case+0x1b3/0x490 <4>[ 12.016874] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.017063] kthread+0x257/0x310 <4>[ 12.017196] ret_from_fork+0x41/0x80 <4>[ 12.017337] ret_from_fork_asm+0x1a/0x30 <3>[ 12.017486] <3>[ 12.017567] The buggy address belongs to the object at ffff888102024000 <3>[ 12.017567] which belongs to the cache kmalloc-8k of size 8192 <3>[ 12.018103] The buggy address is located 0 bytes to the right of <3>[ 12.018103] allocated 7936-byte region [ffff888102024000, ffff888102025f00) <3>[ 12.018498] <3>[ 12.018583] The buggy address belongs to the physical page: <4>[ 12.018765] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102020 <4>[ 12.019044] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.019276] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.019462] page_type: 0xfdffffff(slab) <4>[ 12.019608] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 <4>[ 12.019868] raw: 0000000000000000 0000000080020002 00000001fdffffff 0000000000000000 <4>[ 12.020100] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 <4>[ 12.020340] head: 0000000000000000 0000000080020002 00000001fdffffff 0000000000000000 <4>[ 12.020578] head: 0200000000000003 ffffea0004080801 ffffffffffffffff 0000000000000000 <4>[ 12.020901] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.021131] page dumped because: kasan: bad access detected <3>[ 12.021304] <3>[ 12.021374] Memory state around the buggy address: <3>[ 12.021536] ffff888102025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.021826] ffff888102025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.022040] >ffff888102025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.022269] ^ <3>[ 12.022394] ffff888102025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.022611] ffff888102026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.022871] ================================================================== <6>[ 12.025076] ok 4 kmalloc_big_oob_right <3>[ 12.025982] ================================================================== <3>[ 12.026408] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2eb/0x340 <3>[ 12.026700] Write of size 1 at addr ffff88810245a00a by task kunit_try_catch/147 <3>[ 12.027011] <3>[ 12.027097] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.027444] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.027606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.027872] Call Trace: <3>[ 12.027977] <3>[ 12.028081] dump_stack_lvl+0x73/0xb0 <3>[ 12.028238] print_report+0xd1/0x640 <3>[ 12.028380] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.028550] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.028714] kasan_report+0x102/0x140 <3>[ 12.028861] ? kmalloc_large_oob_right+0x2eb/0x340 <3>[ 12.029050] ? kmalloc_large_oob_right+0x2eb/0x340 <3>[ 12.029229] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.029413] kmalloc_large_oob_right+0x2eb/0x340 <3>[ 12.029578] ? __pfx_kmalloc_large_oob_right+0x10/0x10 <3>[ 12.029764] ? __schedule+0xbca/0x2590 <3>[ 12.029916] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.030072] ? ktime_get_ts64+0x84/0x230 <3>[ 12.030228] kunit_try_run_case+0x1b3/0x490 <3>[ 12.030385] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.030553] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.030719] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.030895] ? __kthread_parkme+0x82/0x160 <3>[ 12.031067] ? preempt_count_sub+0x50/0x80 <3>[ 12.031225] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.031392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.031591] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.031773] kthread+0x257/0x310 <3>[ 12.031910] ? __pfx_kthread+0x10/0x10 <3>[ 12.032058] ret_from_fork+0x41/0x80 <3>[ 12.032195] ? __pfx_kthread+0x10/0x10 <3>[ 12.032342] ret_from_fork_asm+0x1a/0x30 <3>[ 12.032500] <3>[ 12.032589] <3>[ 12.032695] The buggy address belongs to the physical page: <4>[ 12.032904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102458 <4>[ 12.033137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.033355] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.033538] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.033764] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.033983] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.034204] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.034422] head: 0200000000000002 ffffea0004091601 ffffffffffffffff 0000000000000000 <4>[ 12.034640] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.034873] page dumped because: kasan: bad access detected <3>[ 12.035050] <3>[ 12.035119] Memory state around the buggy address: <3>[ 12.035267] ffff888102459f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.035472] ffff888102459f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.035672] >ffff88810245a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.035874] ^ <3>[ 12.035993] ffff88810245a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.036192] ffff88810245a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.036393] ================================================================== <6>[ 12.038495] ok 5 kmalloc_large_oob_right <3>[ 12.039601] ================================================================== <3>[ 12.040231] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f3/0x340 <3>[ 12.040610] Read of size 1 at addr ffff88810297c000 by task kunit_try_catch/149 <3>[ 12.041034] <3>[ 12.041203] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.041743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.042009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.042450] Call Trace: <3>[ 12.042649] <3>[ 12.042846] dump_stack_lvl+0x73/0xb0 <3>[ 12.043118] print_report+0xd1/0x640 <3>[ 12.043340] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.043581] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.043873] kasan_report+0x102/0x140 <3>[ 12.044120] ? kmalloc_large_uaf+0x2f3/0x340 <3>[ 12.044396] ? kmalloc_large_uaf+0x2f3/0x340 <3>[ 12.044676] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.044973] kmalloc_large_uaf+0x2f3/0x340 <3>[ 12.045231] ? __pfx_kmalloc_large_uaf+0x10/0x10 <3>[ 12.045498] ? __schedule+0xbca/0x2590 <3>[ 12.045791] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.046049] ? ktime_get_ts64+0x84/0x230 <3>[ 12.046311] kunit_try_run_case+0x1b3/0x490 <3>[ 12.046582] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.046887] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.047173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.047460] ? __kthread_parkme+0x82/0x160 <3>[ 12.047781] ? preempt_count_sub+0x50/0x80 <3>[ 12.048053] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.048341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.048674] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.048995] kthread+0x257/0x310 <3>[ 12.049222] ? __pfx_kthread+0x10/0x10 <3>[ 12.049468] ret_from_fork+0x41/0x80 <3>[ 12.049738] ? __pfx_kthread+0x10/0x10 <3>[ 12.049984] ret_from_fork_asm+0x1a/0x30 <3>[ 12.050255] <3>[ 12.050425] <3>[ 12.050561] The buggy address belongs to the physical page: <4>[ 12.050940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10297c <4>[ 12.051334] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.051647] raw: 0200000000000000 ffffea00040a6008 ffff888154b3f040 0000000000000000 <4>[ 12.052070] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.052442] page dumped because: kasan: bad access detected <3>[ 12.052737] <3>[ 12.052852] Memory state around the buggy address: <3>[ 12.053087] ffff88810297bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.053400] ffff88810297bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.053762] >ffff88810297c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.054080] ^ <3>[ 12.054281] ffff88810297c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.054644] ffff88810297c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.055009] ================================================================== <6>[ 12.056797] ok 6 kmalloc_large_uaf <3>[ 12.057590] ================================================================== <3>[ 12.058207] BUG: KASAN: invalid-free in kfree+0x26c/0x330 <3>[ 12.058547] Free of addr ffff88810297c001 by task kunit_try_catch/151 <3>[ 12.058956] <3>[ 12.059111] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.059607] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.059886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.060269] Call Trace: <3>[ 12.060423] <3>[ 12.060566] dump_stack_lvl+0x73/0xb0 <3>[ 12.060834] print_report+0xd1/0x640 <3>[ 12.061043] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.061274] ? kfree+0x26c/0x330 <3>[ 12.061466] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.061717] ? kfree+0x26c/0x330 <3>[ 12.061924] kasan_report_invalid_free+0xc0/0xf0 <3>[ 12.062168] ? kfree+0x26c/0x330 <3>[ 12.062387] ? kfree+0x26c/0x330 <3>[ 12.062620] __kasan_kfree_large+0x86/0xd0 <3>[ 12.062933] free_large_kmalloc+0x3b/0xd0 <3>[ 12.063195] kfree+0x26c/0x330 <3>[ 12.063418] kmalloc_large_invalid_free+0x121/0x2b0 <3>[ 12.063722] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 <3>[ 12.064029] ? __schedule+0xbca/0x2590 <3>[ 12.064280] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.064532] ? ktime_get_ts64+0x84/0x230 <3>[ 12.064828] kunit_try_run_case+0x1b3/0x490 <3>[ 12.065092] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.065377] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.065667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.065960] ? __kthread_parkme+0x82/0x160 <3>[ 12.066218] ? preempt_count_sub+0x50/0x80 <3>[ 12.066486] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.066832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.067142] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.067422] kthread+0x257/0x310 <3>[ 12.067651] ? __pfx_kthread+0x10/0x10 <3>[ 12.067919] ret_from_fork+0x41/0x80 <3>[ 12.068167] ? __pfx_kthread+0x10/0x10 <3>[ 12.068429] ret_from_fork_asm+0x1a/0x30 <3>[ 12.068726] <3>[ 12.068900] <3>[ 12.069038] The buggy address belongs to the physical page: <4>[ 12.069321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10297c <4>[ 12.069755] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.070118] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.070436] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.070876] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.071272] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.071660] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.072060] head: 0200000000000002 ffffea00040a5f01 ffffffffffffffff 0000000000000000 <4>[ 12.072438] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.072856] page dumped because: kasan: bad access detected <3>[ 12.073142] <3>[ 12.073270] Memory state around the buggy address: <3>[ 12.073531] ffff88810297bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.073999] ffff88810297bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.074360] >ffff88810297c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.074696] ^ <3>[ 12.074889] ffff88810297c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.075248] ffff88810297c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.075638] ================================================================== <6>[ 12.076760] kunit_try_catch (151) used greatest stack depth: 28136 bytes left <6>[ 12.077268] ok 7 kmalloc_large_invalid_free <6>[ 12.079286] ok 8 page_alloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 12.080836] ================================================================== <3>[ 12.081300] BUG: KASAN: use-after-free in page_alloc_uaf+0x358/0x3d0 <3>[ 12.081512] Read of size 1 at addr ffff888102a90000 by task kunit_try_catch/155 <3>[ 12.081830] <3>[ 12.081936] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.082347] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.082524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.082854] Call Trace: <3>[ 12.083002] <3>[ 12.083126] dump_stack_lvl+0x73/0xb0 <3>[ 12.083324] print_report+0xd1/0x640 <3>[ 12.083506] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.083721] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.083923] kasan_report+0x102/0x140 <3>[ 12.084091] ? page_alloc_uaf+0x358/0x3d0 <3>[ 12.084268] ? page_alloc_uaf+0x358/0x3d0 <3>[ 12.084468] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.084739] page_alloc_uaf+0x358/0x3d0 <3>[ 12.084928] ? __pfx_page_alloc_uaf+0x10/0x10 <3>[ 12.085124] ? __schedule+0xbca/0x2590 <3>[ 12.085302] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.085497] ? ktime_get_ts64+0x84/0x230 <3>[ 12.085703] kunit_try_run_case+0x1b3/0x490 <3>[ 12.085915] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.086143] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.086358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.086577] ? __kthread_parkme+0x82/0x160 <3>[ 12.086812] ? preempt_count_sub+0x50/0x80 <3>[ 12.087013] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.087219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.087476] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.087763] kthread+0x257/0x310 <3>[ 12.087933] ? __pfx_kthread+0x10/0x10 <3>[ 12.088123] ret_from_fork+0x41/0x80 <3>[ 12.088312] ? __pfx_kthread+0x10/0x10 <3>[ 12.088493] ret_from_fork_asm+0x1a/0x30 <3>[ 12.088716] <3>[ 12.088824] <3>[ 12.088927] The buggy address belongs to the physical page: <4>[ 12.089130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a90 <4>[ 12.089408] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.089653] page_type: 0xbfffffff(buddy) <4>[ 12.089868] raw: 0200000000000000 ffff88817fffd460 ffff88817fffd460 0000000000000000 <4>[ 12.090167] raw: 0000000000000000 0000000000000004 00000000bfffffff 0000000000000000 <4>[ 12.090452] page dumped because: kasan: bad access detected <3>[ 12.090704] <3>[ 12.090809] Memory state around the buggy address: <3>[ 12.091023] ffff888102a8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.091328] ffff888102a8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.091614] >ffff888102a90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.091916] ^ <3>[ 12.092082] ffff888102a90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.092377] ffff888102a90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 12.092661] ================================================================== <6>[ 12.095317] ok 9 page_alloc_uaf <3>[ 12.096498] ================================================================== <3>[ 12.097094] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 <3>[ 12.097492] Write of size 1 at addr ffff888100a108eb by task kunit_try_catch/157 <3>[ 12.097904] <3>[ 12.098068] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.098568] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.099091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.099515] Call Trace: <3>[ 12.099719] <3>[ 12.099883] dump_stack_lvl+0x73/0xb0 <3>[ 12.100131] print_report+0xd1/0x640 <3>[ 12.100369] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.100638] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.100977] kasan_report+0x102/0x140 <3>[ 12.101220] ? krealloc_more_oob_helper+0x823/0x930 <3>[ 12.101506] ? krealloc_more_oob_helper+0x823/0x930 <3>[ 12.101870] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.102149] krealloc_more_oob_helper+0x823/0x930 <3>[ 12.102427] ? __schedule+0xbca/0x2590 <3>[ 12.102668] ? __pfx_krealloc_more_oob_helper+0x10/0x10 <3>[ 12.103010] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.103301] ? __switch_to+0x5d9/0xf60 <3>[ 12.103545] ? __schedule+0xbca/0x2590 <3>[ 12.103889] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.104146] krealloc_more_oob+0x1c/0x30 <3>[ 12.104393] kunit_try_run_case+0x1b3/0x490 <3>[ 12.104666] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.104951] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.105221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.105507] ? __kthread_parkme+0x82/0x160 <3>[ 12.105903] ? preempt_count_sub+0x50/0x80 <3>[ 12.106173] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.106449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.106941] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.107267] kthread+0x257/0x310 <3>[ 12.107483] ? __pfx_kthread+0x10/0x10 <3>[ 12.107728] ret_from_fork+0x41/0x80 <3>[ 12.107933] ? __pfx_kthread+0x10/0x10 <3>[ 12.108145] ret_from_fork_asm+0x1a/0x30 <3>[ 12.108377] <3>[ 12.108518] <3>[ 12.108629] Allocated by task 157: <4>[ 12.108836] kasan_save_stack+0x3d/0x60 <4>[ 12.109055] kasan_save_track+0x18/0x40 <4>[ 12.109262] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.109496] __kasan_krealloc+0x1a5/0x210 <4>[ 12.109800] krealloc_noprof+0xae/0x110 <4>[ 12.110052] krealloc_more_oob_helper+0x1aa/0x930 <4>[ 12.110322] krealloc_more_oob+0x1c/0x30 <4>[ 12.110567] kunit_try_run_case+0x1b3/0x490 <4>[ 12.110869] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.111180] kthread+0x257/0x310 <4>[ 12.111406] ret_from_fork+0x41/0x80 <4>[ 12.111640] ret_from_fork_asm+0x1a/0x30 <3>[ 12.111898] <3>[ 12.112035] The buggy address belongs to the object at ffff888100a10800 <3>[ 12.112035] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.112589] The buggy address is located 0 bytes to the right of <3>[ 12.112589] allocated 235-byte region [ffff888100a10800, ffff888100a108eb) <3>[ 12.113172] <3>[ 12.113318] The buggy address belongs to the physical page: <4>[ 12.113605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.114002] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.114366] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.114711] page_type: 0xfdffffff(slab) <4>[ 12.114953] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.115293] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.115637] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.115978] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.116316] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.116672] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.117003] page dumped because: kasan: bad access detected <3>[ 12.117255] <3>[ 12.117368] Memory state around the buggy address: <3>[ 12.117624] ffff888100a10780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.117984] ffff888100a10800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.118336] >ffff888100a10880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc <3>[ 12.118704] ^ <3>[ 12.119039] ffff888100a10900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.119384] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.119765] ================================================================== <3>[ 12.120498] ================================================================== <3>[ 12.120896] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.121282] Write of size 1 at addr ffff888100a108f0 by task kunit_try_catch/157 <3>[ 12.121646] <3>[ 12.121821] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.122275] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.122533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.123026] Call Trace: <3>[ 12.123215] <3>[ 12.123398] dump_stack_lvl+0x73/0xb0 <3>[ 12.123668] print_report+0xd1/0x640 <3>[ 12.123920] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.124185] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.124491] kasan_report+0x102/0x140 <3>[ 12.124785] ? krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.125079] ? krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.125369] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.125668] krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.125944] ? __schedule+0xbca/0x2590 <3>[ 12.126195] ? __pfx_krealloc_more_oob_helper+0x10/0x10 <3>[ 12.126497] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.126846] ? __switch_to+0x5d9/0xf60 <3>[ 12.127102] ? __schedule+0xbca/0x2590 <3>[ 12.127346] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.127600] krealloc_more_oob+0x1c/0x30 <3>[ 12.127865] kunit_try_run_case+0x1b3/0x490 <3>[ 12.128126] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.128406] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.128700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.129079] ? __kthread_parkme+0x82/0x160 <3>[ 12.129339] ? preempt_count_sub+0x50/0x80 <3>[ 12.129602] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.129915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.130213] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.130493] kthread+0x257/0x310 <3>[ 12.130729] ? __pfx_kthread+0x10/0x10 <3>[ 12.130949] ret_from_fork+0x41/0x80 <3>[ 12.131158] ? __pfx_kthread+0x10/0x10 <3>[ 12.131372] ret_from_fork_asm+0x1a/0x30 <3>[ 12.131625] <3>[ 12.131832] <3>[ 12.131968] Allocated by task 157: <4>[ 12.132193] kasan_save_stack+0x3d/0x60 <4>[ 12.132452] kasan_save_track+0x18/0x40 <4>[ 12.132714] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.132973] __kasan_krealloc+0x1a5/0x210 <4>[ 12.133209] krealloc_noprof+0xae/0x110 <4>[ 12.133449] krealloc_more_oob_helper+0x1aa/0x930 <4>[ 12.133753] krealloc_more_oob+0x1c/0x30 <4>[ 12.133991] kunit_try_run_case+0x1b3/0x490 <4>[ 12.134241] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.134548] kthread+0x257/0x310 <4>[ 12.134818] ret_from_fork+0x41/0x80 <4>[ 12.135062] ret_from_fork_asm+0x1a/0x30 <3>[ 12.135319] <3>[ 12.135440] The buggy address belongs to the object at ffff888100a10800 <3>[ 12.135440] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.135998] The buggy address is located 5 bytes to the right of <3>[ 12.135998] allocated 235-byte region [ffff888100a10800, ffff888100a108eb) <3>[ 12.136581] <3>[ 12.136750] The buggy address belongs to the physical page: <4>[ 12.137048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.137436] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.137847] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.138152] page_type: 0xfdffffff(slab) <4>[ 12.138404] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.138813] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.139204] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.139588] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.139994] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.140372] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.140765] page dumped because: kasan: bad access detected <3>[ 12.141049] <3>[ 12.141179] Memory state around the buggy address: <3>[ 12.141436] ffff888100a10780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.141838] ffff888100a10800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.142177] >ffff888100a10880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc <3>[ 12.142491] ^ <3>[ 12.142922] ffff888100a10900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.143276] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.143628] ================================================================== <6>[ 12.145901] ok 10 krealloc_more_oob <3>[ 12.146984] ================================================================== <3>[ 12.147568] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.148003] Write of size 1 at addr ffff888100a10ac9 by task kunit_try_catch/159 <3>[ 12.148374] <3>[ 12.148537] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.149090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.149333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.149752] Call Trace: <3>[ 12.149915] <3>[ 12.150059] dump_stack_lvl+0x73/0xb0 <3>[ 12.150283] print_report+0xd1/0x640 <3>[ 12.150491] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.150780] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.151114] kasan_report+0x102/0x140 <3>[ 12.151368] ? krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.151684] ? krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.152003] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.152293] krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.152577] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.152909] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.153206] ? __pfx_krealloc_less_oob+0x10/0x10 <3>[ 12.153483] krealloc_less_oob+0x1c/0x30 <3>[ 12.153780] kunit_try_run_case+0x1b3/0x490 <3>[ 12.154099] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.154388] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.154675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.154992] ? __kthread_parkme+0x82/0x160 <3>[ 12.155258] ? preempt_count_sub+0x50/0x80 <3>[ 12.155527] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.155845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.156177] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.156492] kthread+0x257/0x310 <3>[ 12.156743] ? __pfx_kthread+0x10/0x10 <3>[ 12.156963] ret_from_fork+0x41/0x80 <3>[ 12.157198] ? __pfx_kthread+0x10/0x10 <3>[ 12.157449] ret_from_fork_asm+0x1a/0x30 <3>[ 12.157762] <3>[ 12.157935] <3>[ 12.158078] Allocated by task 159: <4>[ 12.158297] kasan_save_stack+0x3d/0x60 <4>[ 12.158545] kasan_save_track+0x18/0x40 <4>[ 12.158828] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.159100] __kasan_krealloc+0x1a5/0x210 <4>[ 12.159347] krealloc_noprof+0xae/0x110 <4>[ 12.159588] krealloc_less_oob_helper+0x1ab/0x11d0 <4>[ 12.159869] krealloc_less_oob+0x1c/0x30 <4>[ 12.160107] kunit_try_run_case+0x1b3/0x490 <4>[ 12.160358] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.160664] kthread+0x257/0x310 <4>[ 12.160886] ret_from_fork+0x41/0x80 <4>[ 12.161118] ret_from_fork_asm+0x1a/0x30 <3>[ 12.161362] <3>[ 12.161507] The buggy address belongs to the object at ffff888100a10a00 <3>[ 12.161507] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.162127] The buggy address is located 0 bytes to the right of <3>[ 12.162127] allocated 201-byte region [ffff888100a10a00, ffff888100a10ac9) <3>[ 12.162723] <3>[ 12.162862] The buggy address belongs to the physical page: <4>[ 12.163157] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.163541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.163984] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.164285] page_type: 0xfdffffff(slab) <4>[ 12.164507] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.164932] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.165263] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.165596] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.165943] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.166278] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.166628] page dumped because: kasan: bad access detected <3>[ 12.166934] <3>[ 12.167078] Memory state around the buggy address: <3>[ 12.167347] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.167748] ffff888100a10a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.168107] >ffff888100a10a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 12.168453] ^ <3>[ 12.168790] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.169139] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.169484] ================================================================== <3>[ 12.170094] ================================================================== <3>[ 12.170460] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.170945] Write of size 1 at addr ffff888100a10ad0 by task kunit_try_catch/159 <3>[ 12.171310] <3>[ 12.171464] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.172013] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.172275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.172684] Call Trace: <3>[ 12.172848] <3>[ 12.173000] dump_stack_lvl+0x73/0xb0 <3>[ 12.173217] print_report+0xd1/0x640 <3>[ 12.173426] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.173691] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.173990] kasan_report+0x102/0x140 <3>[ 12.174211] ? krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.174474] ? krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.174772] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.175077] krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.175377] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.175694] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.176001] ? __pfx_krealloc_less_oob+0x10/0x10 <3>[ 12.176281] krealloc_less_oob+0x1c/0x30 <3>[ 12.176527] kunit_try_run_case+0x1b3/0x490 <3>[ 12.176838] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.177121] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.177408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.177716] ? __kthread_parkme+0x82/0x160 <3>[ 12.177988] ? preempt_count_sub+0x50/0x80 <3>[ 12.178253] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.178528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.178913] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.179235] kthread+0x257/0x310 <3>[ 12.179447] ? __pfx_kthread+0x10/0x10 <3>[ 12.179703] ret_from_fork+0x41/0x80 <3>[ 12.179948] ? __pfx_kthread+0x10/0x10 <3>[ 12.180199] ret_from_fork_asm+0x1a/0x30 <3>[ 12.180471] <3>[ 12.180658] <3>[ 12.180794] Allocated by task 159: <4>[ 12.181015] kasan_save_stack+0x3d/0x60 <4>[ 12.181269] kasan_save_track+0x18/0x40 <4>[ 12.181511] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.181820] __kasan_krealloc+0x1a5/0x210 <4>[ 12.182083] krealloc_noprof+0xae/0x110 <4>[ 12.182322] krealloc_less_oob_helper+0x1ab/0x11d0 <4>[ 12.182592] krealloc_less_oob+0x1c/0x30 <4>[ 12.182851] kunit_try_run_case+0x1b3/0x490 <4>[ 12.183116] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.183417] kthread+0x257/0x310 <4>[ 12.183631] ret_from_fork+0x41/0x80 <4>[ 12.183876] ret_from_fork_asm+0x1a/0x30 <3>[ 12.184124] <3>[ 12.184256] The buggy address belongs to the object at ffff888100a10a00 <3>[ 12.184256] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.184873] The buggy address is located 7 bytes to the right of <3>[ 12.184873] allocated 201-byte region [ffff888100a10a00, ffff888100a10ac9) <3>[ 12.185434] <3>[ 12.185568] The buggy address belongs to the physical page: <4>[ 12.185939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.186326] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.186739] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.187067] page_type: 0xfdffffff(slab) <4>[ 12.187315] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.187748] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.188156] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.188527] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.189031] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.189393] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.189772] page dumped because: kasan: bad access detected <3>[ 12.190022] <3>[ 12.190138] Memory state around the buggy address: <3>[ 12.190366] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.190705] ffff888100a10a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.191030] >ffff888100a10a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 12.191339] ^ <3>[ 12.191642] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.192004] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.192355] ================================================================== <3>[ 12.193016] ================================================================== <3>[ 12.193385] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.193821] Write of size 1 at addr ffff888100a10ada by task kunit_try_catch/159 <3>[ 12.194204] <3>[ 12.194361] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.194943] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.195213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.195648] Call Trace: <3>[ 12.195824] <3>[ 12.195974] dump_stack_lvl+0x73/0xb0 <3>[ 12.196195] print_report+0xd1/0x640 <3>[ 12.196404] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.196641] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.196931] kasan_report+0x102/0x140 <3>[ 12.197140] ? krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.197392] ? krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.197657] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.197921] krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.198173] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.198451] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.198810] ? __pfx_krealloc_less_oob+0x10/0x10 <3>[ 12.199107] krealloc_less_oob+0x1c/0x30 <3>[ 12.199359] kunit_try_run_case+0x1b3/0x490 <3>[ 12.199622] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.199925] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.200201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.200495] ? __kthread_parkme+0x82/0x160 <3>[ 12.200815] ? preempt_count_sub+0x50/0x80 <3>[ 12.201081] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.201365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.201724] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.202061] kthread+0x257/0x310 <3>[ 12.202282] ? __pfx_kthread+0x10/0x10 <3>[ 12.202530] ret_from_fork+0x41/0x80 <3>[ 12.202804] ? __pfx_kthread+0x10/0x10 <3>[ 12.203066] ret_from_fork_asm+0x1a/0x30 <3>[ 12.203342] <3>[ 12.203509] <3>[ 12.203644] Allocated by task 159: <4>[ 12.203858] kasan_save_stack+0x3d/0x60 <4>[ 12.204103] kasan_save_track+0x18/0x40 <4>[ 12.204341] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.204596] __kasan_krealloc+0x1a5/0x210 <4>[ 12.204851] krealloc_noprof+0xae/0x110 <4>[ 12.205088] krealloc_less_oob_helper+0x1ab/0x11d0 <4>[ 12.205358] krealloc_less_oob+0x1c/0x30 <4>[ 12.205600] kunit_try_run_case+0x1b3/0x490 <4>[ 12.205882] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.206174] kthread+0x257/0x310 <4>[ 12.206399] ret_from_fork+0x41/0x80 <4>[ 12.206625] ret_from_fork_asm+0x1a/0x30 <3>[ 12.206875] <3>[ 12.207026] The buggy address belongs to the object at ffff888100a10a00 <3>[ 12.207026] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.207589] The buggy address is located 17 bytes to the right of <3>[ 12.207589] allocated 201-byte region [ffff888100a10a00, ffff888100a10ac9) <3>[ 12.208154] <3>[ 12.208272] The buggy address belongs to the physical page: <4>[ 12.208563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.208999] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.209357] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.209674] page_type: 0xfdffffff(slab) <4>[ 12.209951] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.210337] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.210799] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.211189] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.211577] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.212034] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.212417] page dumped because: kasan: bad access detected <3>[ 12.212740] <3>[ 12.212888] Memory state around the buggy address: <3>[ 12.213163] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.213521] ffff888100a10a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.213964] >ffff888100a10a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 12.214308] ^ <3>[ 12.214586] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.215009] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.215342] ================================================================== <3>[ 12.216058] ================================================================== <3>[ 12.216470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.217006] Write of size 1 at addr ffff888100a10aea by task kunit_try_catch/159 <3>[ 12.217380] <3>[ 12.217543] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.218300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.218563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.219120] Call Trace: <3>[ 12.219306] <3>[ 12.219488] dump_stack_lvl+0x73/0xb0 <3>[ 12.219782] print_report+0xd1/0x640 <3>[ 12.220046] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.220323] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.220661] kasan_report+0x102/0x140 <3>[ 12.220946] ? krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.221251] ? krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.221559] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.221922] krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.222189] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.222499] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.222772] ? __pfx_krealloc_less_oob+0x10/0x10 <3>[ 12.223066] krealloc_less_oob+0x1c/0x30 <3>[ 12.223318] kunit_try_run_case+0x1b3/0x490 <3>[ 12.223592] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.223915] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.224197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.224500] ? __kthread_parkme+0x82/0x160 <3>[ 12.224842] ? preempt_count_sub+0x50/0x80 <3>[ 12.225115] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.225463] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.225882] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.226198] kthread+0x257/0x310 <3>[ 12.226432] ? __pfx_kthread+0x10/0x10 <3>[ 12.226694] ret_from_fork+0x41/0x80 <3>[ 12.226952] ? __pfx_kthread+0x10/0x10 <3>[ 12.227187] ret_from_fork_asm+0x1a/0x30 <3>[ 12.227441] <3>[ 12.227602] <3>[ 12.227769] Allocated by task 159: <4>[ 12.227987] kasan_save_stack+0x3d/0x60 <4>[ 12.228225] kasan_save_track+0x18/0x40 <4>[ 12.228462] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.228793] __kasan_krealloc+0x1a5/0x210 <4>[ 12.229062] krealloc_noprof+0xae/0x110 <4>[ 12.229302] krealloc_less_oob_helper+0x1ab/0x11d0 <4>[ 12.229566] krealloc_less_oob+0x1c/0x30 <4>[ 12.229852] kunit_try_run_case+0x1b3/0x490 <4>[ 12.230101] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.230399] kthread+0x257/0x310 <4>[ 12.230615] ret_from_fork+0x41/0x80 <4>[ 12.230869] ret_from_fork_asm+0x1a/0x30 <3>[ 12.231116] <3>[ 12.231232] The buggy address belongs to the object at ffff888100a10a00 <3>[ 12.231232] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.231789] The buggy address is located 33 bytes to the right of <3>[ 12.231789] allocated 201-byte region [ffff888100a10a00, ffff888100a10ac9) <3>[ 12.232336] <3>[ 12.232474] The buggy address belongs to the physical page: <4>[ 12.232826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.233229] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.233595] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.233941] page_type: 0xfdffffff(slab) <4>[ 12.234201] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.234579] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.235097] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.235478] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.235925] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.236316] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.236683] page dumped because: kasan: bad access detected <3>[ 12.237049] <3>[ 12.237209] Memory state around the buggy address: <3>[ 12.237469] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.238006] ffff888100a10a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.238374] >ffff888100a10a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 12.238765] ^ <3>[ 12.239115] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.239467] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.239884] ================================================================== <3>[ 12.240435] ================================================================== <3>[ 12.240900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.241297] Write of size 1 at addr ffff888100a10aeb by task kunit_try_catch/159 <3>[ 12.241658] <3>[ 12.241899] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.242409] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.242696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.243167] Call Trace: <3>[ 12.243359] <3>[ 12.243541] dump_stack_lvl+0x73/0xb0 <3>[ 12.243868] print_report+0xd1/0x640 <3>[ 12.244115] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.244389] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.244733] kasan_report+0x102/0x140 <3>[ 12.244988] ? krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.245283] ? krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.245584] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.245896] krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.246198] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.246506] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.246894] ? __pfx_krealloc_less_oob+0x10/0x10 <3>[ 12.247191] krealloc_less_oob+0x1c/0x30 <3>[ 12.247407] kunit_try_run_case+0x1b3/0x490 <3>[ 12.247637] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.247984] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.248240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.248496] ? __kthread_parkme+0x82/0x160 <3>[ 12.248763] ? preempt_count_sub+0x50/0x80 <3>[ 12.249014] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.249276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.249589] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.249961] kthread+0x257/0x310 <3>[ 12.250198] ? __pfx_kthread+0x10/0x10 <3>[ 12.250446] ret_from_fork+0x41/0x80 <3>[ 12.250714] ? __pfx_kthread+0x10/0x10 <3>[ 12.250994] ret_from_fork_asm+0x1a/0x30 <3>[ 12.251252] <3>[ 12.251417] <3>[ 12.251560] Allocated by task 159: <4>[ 12.251807] kasan_save_stack+0x3d/0x60 <4>[ 12.252055] kasan_save_track+0x18/0x40 <4>[ 12.252291] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.252546] __kasan_krealloc+0x1a5/0x210 <4>[ 12.252833] krealloc_noprof+0xae/0x110 <4>[ 12.253076] krealloc_less_oob_helper+0x1ab/0x11d0 <4>[ 12.253344] krealloc_less_oob+0x1c/0x30 <4>[ 12.253577] kunit_try_run_case+0x1b3/0x490 <4>[ 12.253889] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.254176] kthread+0x257/0x310 <4>[ 12.254365] ret_from_fork+0x41/0x80 <4>[ 12.254585] ret_from_fork_asm+0x1a/0x30 <3>[ 12.254895] <3>[ 12.255031] The buggy address belongs to the object at ffff888100a10a00 <3>[ 12.255031] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.255563] The buggy address is located 34 bytes to the right of <3>[ 12.255563] allocated 201-byte region [ffff888100a10a00, ffff888100a10ac9) <3>[ 12.256203] <3>[ 12.256323] The buggy address belongs to the physical page: <4>[ 12.256583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.257075] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.257457] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.257800] page_type: 0xfdffffff(slab) <4>[ 12.258067] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.258457] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.258953] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.259318] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.259636] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.260067] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.260432] page dumped because: kasan: bad access detected <3>[ 12.260752] <3>[ 12.260882] Memory state around the buggy address: <3>[ 12.261146] ffff888100a10980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.261502] ffff888100a10a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.261936] >ffff888100a10a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 12.262300] ^ <3>[ 12.262634] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.263076] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.263434] ================================================================== <6>[ 12.265284] ok 11 krealloc_less_oob <3>[ 12.266267] ================================================================== <3>[ 12.266895] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 <3>[ 12.267294] Write of size 1 at addr ffff8881029820eb by task kunit_try_catch/161 <3>[ 12.267671] <3>[ 12.267840] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.268321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.268558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.268935] Call Trace: <3>[ 12.269086] <3>[ 12.269233] dump_stack_lvl+0x73/0xb0 <3>[ 12.269451] print_report+0xd1/0x640 <3>[ 12.269659] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.269895] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.270172] kasan_report+0x102/0x140 <3>[ 12.270432] ? krealloc_more_oob_helper+0x823/0x930 <3>[ 12.270724] ? krealloc_more_oob_helper+0x823/0x930 <3>[ 12.271032] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.271319] krealloc_more_oob_helper+0x823/0x930 <3>[ 12.271597] ? __schedule+0xbca/0x2590 <3>[ 12.271847] ? __pfx_krealloc_more_oob_helper+0x10/0x10 <3>[ 12.272154] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.272449] ? __switch_to+0x5d9/0xf60 <3>[ 12.272695] ? __schedule+0xbca/0x2590 <3>[ 12.272948] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.273199] krealloc_large_more_oob+0x1c/0x30 <3>[ 12.273469] kunit_try_run_case+0x1b3/0x490 <3>[ 12.273734] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.274012] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.274301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.274563] ? __kthread_parkme+0x82/0x160 <3>[ 12.274788] ? preempt_count_sub+0x50/0x80 <3>[ 12.275044] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.275338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.275673] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.275976] kthread+0x257/0x310 <3>[ 12.276202] ? __pfx_kthread+0x10/0x10 <3>[ 12.276446] ret_from_fork+0x41/0x80 <3>[ 12.276678] ? __pfx_kthread+0x10/0x10 <3>[ 12.276927] ret_from_fork_asm+0x1a/0x30 <3>[ 12.277199] <3>[ 12.277365] <3>[ 12.277500] The buggy address belongs to the physical page: <4>[ 12.277778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.278161] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.278534] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.278858] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.279252] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.279614] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.279953] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.280289] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.280620] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.280944] page dumped because: kasan: bad access detected <3>[ 12.281193] <3>[ 12.281318] Memory state around the buggy address: <3>[ 12.281583] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.281944] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.282310] >ffff888102982080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe <3>[ 12.282661] ^ <3>[ 12.282997] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.283356] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.283705] ================================================================== <3>[ 12.285028] ================================================================== <3>[ 12.285394] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.285792] Write of size 1 at addr ffff8881029820f0 by task kunit_try_catch/161 <3>[ 12.286160] <3>[ 12.286314] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.286797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.287077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.287491] Call Trace: <3>[ 12.287668] <3>[ 12.287834] dump_stack_lvl+0x73/0xb0 <3>[ 12.288089] print_report+0xd1/0x640 <3>[ 12.288330] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.288595] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.288856] kasan_report+0x102/0x140 <3>[ 12.289096] ? krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.289389] ? krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.289687] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.289983] krealloc_more_oob_helper+0x7ed/0x930 <3>[ 12.290265] ? __schedule+0xbca/0x2590 <3>[ 12.290511] ? __pfx_krealloc_more_oob_helper+0x10/0x10 <3>[ 12.290815] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.291117] ? __switch_to+0x5d9/0xf60 <3>[ 12.291364] ? __schedule+0xbca/0x2590 <3>[ 12.291612] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.291856] krealloc_large_more_oob+0x1c/0x30 <3>[ 12.292126] kunit_try_run_case+0x1b3/0x490 <3>[ 12.292390] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.292674] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.292927] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.293180] ? __kthread_parkme+0x82/0x160 <3>[ 12.293402] ? preempt_count_sub+0x50/0x80 <3>[ 12.293630] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.293870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.294160] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.294427] kthread+0x257/0x310 <3>[ 12.294621] ? __pfx_kthread+0x10/0x10 <3>[ 12.294834] ret_from_fork+0x41/0x80 <3>[ 12.295047] ? __pfx_kthread+0x10/0x10 <3>[ 12.295265] ret_from_fork_asm+0x1a/0x30 <3>[ 12.295530] <3>[ 12.295708] <3>[ 12.295852] The buggy address belongs to the physical page: <4>[ 12.296149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.296545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.296912] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.297238] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.297620] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.297996] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.298381] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.298757] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.299140] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.299511] page dumped because: kasan: bad access detected <3>[ 12.299766] <3>[ 12.299876] Memory state around the buggy address: <3>[ 12.300104] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.300415] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.300724] >ffff888102982080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe <3>[ 12.301030] ^ <3>[ 12.301329] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.301643] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.301973] ================================================================== <6>[ 12.304332] ok 12 krealloc_large_more_oob <3>[ 12.305145] ================================================================== <3>[ 12.305754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.306159] Write of size 1 at addr ffff8881029820c9 by task kunit_try_catch/163 <3>[ 12.306522] <3>[ 12.306674] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.307174] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.307444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.307858] Call Trace: <3>[ 12.308043] <3>[ 12.308222] dump_stack_lvl+0x73/0xb0 <3>[ 12.308479] print_report+0xd1/0x640 <3>[ 12.308721] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.308979] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.309239] kasan_report+0x102/0x140 <3>[ 12.309485] ? krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.309772] ? krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.310081] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.310371] krealloc_less_oob_helper+0xd72/0x11d0 <3>[ 12.310649] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.310961] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.311270] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.311539] ? __switch_to+0x5d9/0xf60 <3>[ 12.311761] ? __schedule+0xbca/0x2590 <3>[ 12.311974] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.312195] krealloc_large_less_oob+0x1c/0x30 <3>[ 12.312426] kunit_try_run_case+0x1b3/0x490 <3>[ 12.312655] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.312896] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.313133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.313381] ? __kthread_parkme+0x82/0x160 <3>[ 12.313604] ? preempt_count_sub+0x50/0x80 <3>[ 12.313828] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.314094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.314441] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.314754] kthread+0x257/0x310 <3>[ 12.314992] ? __pfx_kthread+0x10/0x10 <3>[ 12.315235] ret_from_fork+0x41/0x80 <3>[ 12.315467] ? __pfx_kthread+0x10/0x10 <3>[ 12.315712] ret_from_fork_asm+0x1a/0x30 <3>[ 12.315983] <3>[ 12.316148] <3>[ 12.316284] The buggy address belongs to the physical page: <4>[ 12.316570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.316963] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.317325] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.317640] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.318027] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.318368] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.318704] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.319041] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.319380] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.319703] page dumped because: kasan: bad access detected <3>[ 12.319951] <3>[ 12.320062] Memory state around the buggy address: <3>[ 12.320292] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.320648] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.321012] >ffff888102982080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 12.321359] ^ <3>[ 12.321646] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.321993] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.322346] ================================================================== <3>[ 12.323320] ================================================================== <3>[ 12.323715] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.324110] Write of size 1 at addr ffff8881029820d0 by task kunit_try_catch/163 <3>[ 12.324467] <3>[ 12.324631] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.325146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.325419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.325842] Call Trace: <3>[ 12.326025] <3>[ 12.326190] dump_stack_lvl+0x73/0xb0 <3>[ 12.326415] print_report+0xd1/0x640 <3>[ 12.326660] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.326949] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.327220] kasan_report+0x102/0x140 <3>[ 12.327460] ? krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.327747] ? krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.328043] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.328333] krealloc_less_oob_helper+0xe25/0x11d0 <3>[ 12.328606] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.328898] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.329205] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.329486] ? __switch_to+0x5d9/0xf60 <3>[ 12.329706] ? __schedule+0xbca/0x2590 <3>[ 12.329933] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.330194] krealloc_large_less_oob+0x1c/0x30 <3>[ 12.330473] kunit_try_run_case+0x1b3/0x490 <3>[ 12.330735] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.331016] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.331288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.331580] ? __kthread_parkme+0x82/0x160 <3>[ 12.331837] ? preempt_count_sub+0x50/0x80 <3>[ 12.332094] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.332363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.332676] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.332975] kthread+0x257/0x310 <3>[ 12.333202] ? __pfx_kthread+0x10/0x10 <3>[ 12.333443] ret_from_fork+0x41/0x80 <3>[ 12.333668] ? __pfx_kthread+0x10/0x10 <3>[ 12.333911] ret_from_fork_asm+0x1a/0x30 <3>[ 12.334175] <3>[ 12.334330] <3>[ 12.334449] The buggy address belongs to the physical page: <4>[ 12.334698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.335049] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.335389] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.335676] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.336029] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.336377] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.336777] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.337194] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.337596] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.337961] page dumped because: kasan: bad access detected <3>[ 12.338262] <3>[ 12.338400] Memory state around the buggy address: <3>[ 12.338663] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.339049] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.339384] >ffff888102982080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 12.339722] ^ <3>[ 12.340025] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.340394] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.340751] ================================================================== <3>[ 12.341429] ================================================================== <3>[ 12.341907] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.342294] Write of size 1 at addr ffff8881029820da by task kunit_try_catch/163 <3>[ 12.342622] <3>[ 12.342750] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.343220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.343490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.343938] Call Trace: <3>[ 12.344131] <3>[ 12.344304] dump_stack_lvl+0x73/0xb0 <3>[ 12.344550] print_report+0xd1/0x640 <3>[ 12.344789] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.345051] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.345315] kasan_report+0x102/0x140 <3>[ 12.345572] ? krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.345865] ? krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.346172] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.346468] krealloc_less_oob_helper+0xec8/0x11d0 <3>[ 12.346761] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.347065] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.347353] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.347642] ? __switch_to+0x5d9/0xf60 <3>[ 12.347894] ? __schedule+0xbca/0x2590 <3>[ 12.348136] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.348385] krealloc_large_less_oob+0x1c/0x30 <3>[ 12.348654] kunit_try_run_case+0x1b3/0x490 <3>[ 12.348918] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.349193] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.349467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.349755] ? __kthread_parkme+0x82/0x160 <3>[ 12.350026] ? preempt_count_sub+0x50/0x80 <3>[ 12.350312] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.350586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.350926] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.351223] kthread+0x257/0x310 <3>[ 12.351430] ? __pfx_kthread+0x10/0x10 <3>[ 12.351649] ret_from_fork+0x41/0x80 <3>[ 12.351879] ? __pfx_kthread+0x10/0x10 <3>[ 12.352102] ret_from_fork_asm+0x1a/0x30 <3>[ 12.352355] <3>[ 12.352522] <3>[ 12.352660] The buggy address belongs to the physical page: <4>[ 12.352953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.353355] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.353719] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.354043] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.354420] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.354804] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.355203] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.355576] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.355955] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.356333] page dumped because: kasan: bad access detected <3>[ 12.356616] <3>[ 12.356747] Memory state around the buggy address: <3>[ 12.357003] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.357353] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.357697] >ffff888102982080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 12.358042] ^ <3>[ 12.358342] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.358699] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.359056] ================================================================== <3>[ 12.359850] ================================================================== <3>[ 12.360210] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.360585] Write of size 1 at addr ffff8881029820ea by task kunit_try_catch/163 <3>[ 12.360978] <3>[ 12.361136] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.361627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.361886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.362296] Call Trace: <3>[ 12.362479] <3>[ 12.362645] dump_stack_lvl+0x73/0xb0 <3>[ 12.362885] print_report+0xd1/0x640 <3>[ 12.363129] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.363397] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.363661] kasan_report+0x102/0x140 <3>[ 12.363906] ? krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.364202] ? krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.364506] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.364796] krealloc_less_oob_helper+0xe92/0x11d0 <3>[ 12.365078] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.365372] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.365666] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.365948] ? __switch_to+0x5d9/0xf60 <3>[ 12.366197] ? __schedule+0xbca/0x2590 <3>[ 12.366439] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.366690] krealloc_large_less_oob+0x1c/0x30 <3>[ 12.366969] kunit_try_run_case+0x1b3/0x490 <3>[ 12.367228] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.367508] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.367791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.368087] ? __kthread_parkme+0x82/0x160 <3>[ 12.368321] ? preempt_count_sub+0x50/0x80 <3>[ 12.368553] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.368801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.369086] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.369350] kthread+0x257/0x310 <3>[ 12.369543] ? __pfx_kthread+0x10/0x10 <3>[ 12.369753] ret_from_fork+0x41/0x80 <3>[ 12.369954] ? __pfx_kthread+0x10/0x10 <3>[ 12.370158] ret_from_fork_asm+0x1a/0x30 <3>[ 12.370381] <3>[ 12.370525] <3>[ 12.370654] The buggy address belongs to the physical page: <4>[ 12.370959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.371356] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.371727] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.372043] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.372418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.372801] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.373179] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.373558] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.373932] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.374293] page dumped because: kasan: bad access detected <3>[ 12.374575] <3>[ 12.374710] Memory state around the buggy address: <3>[ 12.374958] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.375267] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.375573] >ffff888102982080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 12.375877] ^ <3>[ 12.376172] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.376485] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.376796] ================================================================== <3>[ 12.377624] ================================================================== <3>[ 12.378071] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.378455] Write of size 1 at addr ffff8881029820eb by task kunit_try_catch/163 <3>[ 12.378824] <3>[ 12.378993] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.379505] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.379773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.380193] Call Trace: <3>[ 12.380383] <3>[ 12.380562] dump_stack_lvl+0x73/0xb0 <3>[ 12.380820] print_report+0xd1/0x640 <3>[ 12.381070] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.381337] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 12.381607] kasan_report+0x102/0x140 <3>[ 12.381848] ? krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.382141] ? krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.382440] __asan_report_store1_noabort+0x1b/0x30 <3>[ 12.382742] krealloc_less_oob_helper+0xd49/0x11d0 <3>[ 12.383023] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.383286] ? __pfx_krealloc_less_oob_helper+0x10/0x10 <3>[ 12.383578] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.383880] ? __switch_to+0x5d9/0xf60 <3>[ 12.384130] ? __schedule+0xbca/0x2590 <3>[ 12.384374] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.384621] krealloc_large_less_oob+0x1c/0x30 <3>[ 12.384887] kunit_try_run_case+0x1b3/0x490 <3>[ 12.385147] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.385433] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.385713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.386006] ? __kthread_parkme+0x82/0x160 <3>[ 12.386269] ? preempt_count_sub+0x50/0x80 <3>[ 12.386547] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.386814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.387133] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.387454] kthread+0x257/0x310 <3>[ 12.387696] ? __pfx_kthread+0x10/0x10 <3>[ 12.387940] ret_from_fork+0x41/0x80 <3>[ 12.388171] ? __pfx_kthread+0x10/0x10 <3>[ 12.388415] ret_from_fork_asm+0x1a/0x30 <3>[ 12.388679] <3>[ 12.388842] <3>[ 12.388982] The buggy address belongs to the physical page: <4>[ 12.389266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102980 <4>[ 12.389618] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.389939] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.390215] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.390549] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.390885] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 12.391236] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 12.391611] head: 0200000000000002 ffffea00040a6001 ffffffffffffffff 0000000000000000 <4>[ 12.392003] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.392366] page dumped because: kasan: bad access detected <3>[ 12.392647] <3>[ 12.392780] Memory state around the buggy address: <3>[ 12.393037] ffff888102981f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.393393] ffff888102982000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.393743] >ffff888102982080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 12.394082] ^ <3>[ 12.394416] ffff888102982100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.394764] ffff888102982180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 12.395106] ================================================================== <6>[ 12.397296] ok 13 krealloc_large_less_oob <3>[ 12.398888] ================================================================== <3>[ 12.399500] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0 <3>[ 12.399850] Read of size 1 at addr ffff888100a10c00 by task kunit_try_catch/165 <3>[ 12.400178] <3>[ 12.400312] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.400761] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.400997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.401404] Call Trace: <3>[ 12.401592] <3>[ 12.401777] dump_stack_lvl+0x73/0xb0 <3>[ 12.402042] print_report+0xd1/0x640 <3>[ 12.402299] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.402573] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.402882] kasan_report+0x102/0x140 <3>[ 12.403152] ? krealloc_uaf+0x1b9/0x5e0 <3>[ 12.403405] ? krealloc_uaf+0x1b9/0x5e0 <3>[ 12.403659] ? krealloc_uaf+0x1b9/0x5e0 <3>[ 12.403910] __kasan_check_byte+0x3d/0x50 <3>[ 12.404170] krealloc_noprof+0x35/0x110 <3>[ 12.404416] krealloc_uaf+0x1b9/0x5e0 <3>[ 12.404654] ? __pfx_krealloc_uaf+0x10/0x10 <3>[ 12.404911] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.405217] ? __pfx_krealloc_uaf+0x10/0x10 <3>[ 12.405489] kunit_try_run_case+0x1b3/0x490 <3>[ 12.405751] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.406025] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.406303] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.406587] ? __kthread_parkme+0x82/0x160 <3>[ 12.406845] ? preempt_count_sub+0x50/0x80 <3>[ 12.407130] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.407410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.407746] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.408056] kthread+0x257/0x310 <3>[ 12.408289] ? __pfx_kthread+0x10/0x10 <3>[ 12.408539] ret_from_fork+0x41/0x80 <3>[ 12.408780] ? __pfx_kthread+0x10/0x10 <3>[ 12.409030] ret_from_fork_asm+0x1a/0x30 <3>[ 12.409304] <3>[ 12.409460] <3>[ 12.409575] Allocated by task 165: <4>[ 12.409767] kasan_save_stack+0x3d/0x60 <4>[ 12.410005] kasan_save_track+0x18/0x40 <4>[ 12.410257] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.410527] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.410771] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.411072] krealloc_uaf+0xbc/0x5e0 <4>[ 12.411305] kunit_try_run_case+0x1b3/0x490 <4>[ 12.411566] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.411868] kthread+0x257/0x310 <4>[ 12.412087] ret_from_fork+0x41/0x80 <4>[ 12.412320] ret_from_fork_asm+0x1a/0x30 <3>[ 12.412565] <3>[ 12.412701] Freed by task 165: <4>[ 12.412896] kasan_save_stack+0x3d/0x60 <4>[ 12.413143] kasan_save_track+0x18/0x40 <4>[ 12.413390] kasan_save_free_info+0x3f/0x60 <4>[ 12.413652] __kasan_slab_free+0x5e/0x80 <4>[ 12.413903] kfree+0x21a/0x330 <4>[ 12.414111] krealloc_uaf+0x13e/0x5e0 <4>[ 12.414342] kunit_try_run_case+0x1b3/0x490 <4>[ 12.414603] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.414918] kthread+0x257/0x310 <4>[ 12.415129] ret_from_fork+0x41/0x80 <4>[ 12.415334] ret_from_fork_asm+0x1a/0x30 <3>[ 12.415546] <3>[ 12.415660] The buggy address belongs to the object at ffff888100a10c00 <3>[ 12.415660] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.416244] The buggy address is located 0 bytes inside of <3>[ 12.416244] freed 256-byte region [ffff888100a10c00, ffff888100a10d00) <3>[ 12.416743] <3>[ 12.416861] The buggy address belongs to the physical page: <4>[ 12.417121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.417475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.417835] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.418152] page_type: 0xfdffffff(slab) <4>[ 12.418415] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.418801] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.419185] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.419574] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.419967] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.420348] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.420720] page dumped because: kasan: bad access detected <3>[ 12.421002] <3>[ 12.421143] Memory state around the buggy address: <3>[ 12.421414] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.421779] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.422106] >ffff888100a10c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.422419] ^ <3>[ 12.422599] ffff888100a10c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.422923] ffff888100a10d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.423236] ================================================================== <3>[ 12.424088] ================================================================== <3>[ 12.424501] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53e/0x5e0 <3>[ 12.424876] Read of size 1 at addr ffff888100a10c00 by task kunit_try_catch/165 <3>[ 12.425249] <3>[ 12.425413] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.425911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.426176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.426594] Call Trace: <3>[ 12.426792] <3>[ 12.426998] dump_stack_lvl+0x73/0xb0 <3>[ 12.427274] print_report+0xd1/0x640 <3>[ 12.427542] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.427813] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.428141] kasan_report+0x102/0x140 <3>[ 12.428391] ? krealloc_uaf+0x53e/0x5e0 <3>[ 12.428643] ? krealloc_uaf+0x53e/0x5e0 <3>[ 12.428907] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.429198] krealloc_uaf+0x53e/0x5e0 <3>[ 12.429442] ? __pfx_krealloc_uaf+0x10/0x10 <3>[ 12.429709] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.430028] ? __pfx_krealloc_uaf+0x10/0x10 <3>[ 12.430301] kunit_try_run_case+0x1b3/0x490 <3>[ 12.430579] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.430862] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.431164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.431437] ? __kthread_parkme+0x82/0x160 <3>[ 12.431688] ? preempt_count_sub+0x50/0x80 <3>[ 12.431958] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.432250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.432601] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.432912] kthread+0x257/0x310 <3>[ 12.433138] ? __pfx_kthread+0x10/0x10 <3>[ 12.433387] ret_from_fork+0x41/0x80 <3>[ 12.433632] ? __pfx_kthread+0x10/0x10 <3>[ 12.433884] ret_from_fork_asm+0x1a/0x30 <3>[ 12.434150] <3>[ 12.434330] <3>[ 12.434464] Allocated by task 165: <4>[ 12.434655] kasan_save_stack+0x3d/0x60 <4>[ 12.434888] kasan_save_track+0x18/0x40 <4>[ 12.435154] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.435424] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.435671] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.435946] krealloc_uaf+0xbc/0x5e0 <4>[ 12.436192] kunit_try_run_case+0x1b3/0x490 <4>[ 12.436449] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.436763] kthread+0x257/0x310 <4>[ 12.436985] ret_from_fork+0x41/0x80 <4>[ 12.437214] ret_from_fork_asm+0x1a/0x30 <3>[ 12.437458] <3>[ 12.437601] Freed by task 165: <4>[ 12.437817] kasan_save_stack+0x3d/0x60 <4>[ 12.438066] kasan_save_track+0x18/0x40 <4>[ 12.438318] kasan_save_free_info+0x3f/0x60 <4>[ 12.438575] __kasan_slab_free+0x5e/0x80 <4>[ 12.438819] kfree+0x21a/0x330 <4>[ 12.439048] krealloc_uaf+0x13e/0x5e0 <4>[ 12.439283] kunit_try_run_case+0x1b3/0x490 <4>[ 12.439550] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.439833] kthread+0x257/0x310 <4>[ 12.440028] ret_from_fork+0x41/0x80 <4>[ 12.440233] ret_from_fork_asm+0x1a/0x30 <3>[ 12.440447] <3>[ 12.440563] The buggy address belongs to the object at ffff888100a10c00 <3>[ 12.440563] which belongs to the cache kmalloc-256 of size 256 <3>[ 12.441071] The buggy address is located 0 bytes inside of <3>[ 12.441071] freed 256-byte region [ffff888100a10c00, ffff888100a10d00) <3>[ 12.441564] <3>[ 12.441684] The buggy address belongs to the physical page: <4>[ 12.441941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 <4>[ 12.442312] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 12.442696] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 12.443009] page_type: 0xfdffffff(slab) <4>[ 12.443260] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.443636] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.444012] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 <4>[ 12.444405] head: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.444794] head: 0200000000000001 ffffea0004028401 ffffffffffffffff 0000000000000000 <4>[ 12.445190] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 12.445553] page dumped because: kasan: bad access detected <3>[ 12.445840] <3>[ 12.445974] Memory state around the buggy address: <3>[ 12.446244] ffff888100a10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.446570] ffff888100a10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.446885] >ffff888100a10c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.447213] ^ <3>[ 12.447394] ffff888100a10c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.447709] ffff888100a10d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.448022] ================================================================== <6>[ 12.449362] kunit_try_catch (165) used greatest stack depth: 28112 bytes left <6>[ 12.450579] ok 14 krealloc_uaf <3>[ 12.451788] ================================================================== <3>[ 12.452361] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x454/0x4a0 <3>[ 12.452727] Write of size 16 at addr ffff8881025808c0 by task kunit_try_catch/167 <3>[ 12.453054] <3>[ 12.453183] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.453606] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.453870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.454184] Call Trace: <3>[ 12.454287] <3>[ 12.454384] dump_stack_lvl+0x73/0xb0 <3>[ 12.454534] print_report+0xd1/0x640 <3>[ 12.454684] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.454861] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.455050] kasan_report+0x102/0x140 <3>[ 12.455183] ? kmalloc_oob_16+0x454/0x4a0 <3>[ 12.455325] ? kmalloc_oob_16+0x454/0x4a0 <3>[ 12.455469] __asan_report_store16_noabort+0x1b/0x30 <3>[ 12.455631] kmalloc_oob_16+0x454/0x4a0 <3>[ 12.455791] ? __pfx_kmalloc_oob_16+0x10/0x10 <3>[ 12.455942] ? __schedule+0xbca/0x2590 <3>[ 12.456078] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.456214] ? ktime_get_ts64+0x84/0x230 <3>[ 12.456351] kunit_try_run_case+0x1b3/0x490 <3>[ 12.456533] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.456809] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.457009] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.457234] ? __kthread_parkme+0x82/0x160 <3>[ 12.457442] ? preempt_count_sub+0x50/0x80 <3>[ 12.457638] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.457897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.458148] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.458372] kthread+0x257/0x310 <3>[ 12.458531] ? __pfx_kthread+0x10/0x10 <3>[ 12.458695] ret_from_fork+0x41/0x80 <3>[ 12.458850] ? __pfx_kthread+0x10/0x10 <3>[ 12.459033] ret_from_fork_asm+0x1a/0x30 <3>[ 12.459237] <3>[ 12.459357] <3>[ 12.459451] Allocated by task 167: <4>[ 12.459611] kasan_save_stack+0x3d/0x60 <4>[ 12.459833] kasan_save_track+0x18/0x40 <4>[ 12.460014] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.460190] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.460355] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.460570] kmalloc_oob_16+0xa9/0x4a0 <4>[ 12.460804] kunit_try_run_case+0x1b3/0x490 <4>[ 12.460970] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.461160] kthread+0x257/0x310 <4>[ 12.461289] ret_from_fork+0x41/0x80 <4>[ 12.461439] ret_from_fork_asm+0x1a/0x30 <3>[ 12.461581] <3>[ 12.461698] The buggy address belongs to the object at ffff8881025808c0 <3>[ 12.461698] which belongs to the cache kmalloc-16 of size 16 <3>[ 12.462153] The buggy address is located 0 bytes inside of <3>[ 12.462153] allocated 13-byte region [ffff8881025808c0, ffff8881025808cd) <3>[ 12.462594] <3>[ 12.462757] The buggy address belongs to the physical page: <4>[ 12.462980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 12.463288] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.463501] page_type: 0xfdffffff(slab) <4>[ 12.463739] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 12.464055] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 12.464378] page dumped because: kasan: bad access detected <3>[ 12.464616] <3>[ 12.464750] Memory state around the buggy address: <3>[ 12.464926] ffff888102580780: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc <3>[ 12.465169] ffff888102580800: 00 06 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 12.465376] >ffff888102580880: 00 06 fc fc 00 06 fc fc 00 05 fc fc 00 00 fc fc <3>[ 12.465601] ^ <3>[ 12.465905] ffff888102580900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.466205] ffff888102580980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.466487] ================================================================== <6>[ 12.468111] ok 15 kmalloc_oob_16 <3>[ 12.469125] ================================================================== <3>[ 12.469581] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0 <3>[ 12.469925] Read of size 16 at addr ffff888102580920 by task kunit_try_catch/169 <3>[ 12.470209] <3>[ 12.470313] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.470723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.470949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.471316] Call Trace: <3>[ 12.471441] <3>[ 12.471559] dump_stack_lvl+0x73/0xb0 <3>[ 12.471780] print_report+0xd1/0x640 <3>[ 12.471971] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.472198] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.472445] kasan_report+0x102/0x140 <3>[ 12.472627] ? kmalloc_uaf_16+0x47d/0x4c0 <3>[ 12.472815] ? kmalloc_uaf_16+0x47d/0x4c0 <3>[ 12.472990] __asan_report_load16_noabort+0x18/0x20 <3>[ 12.473184] kmalloc_uaf_16+0x47d/0x4c0 <3>[ 12.473356] ? __pfx_kmalloc_uaf_16+0x10/0x10 <3>[ 12.473542] ? __schedule+0xbca/0x2590 <3>[ 12.473746] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.473926] ? ktime_get_ts64+0x84/0x230 <3>[ 12.474105] kunit_try_run_case+0x1b3/0x490 <3>[ 12.474279] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.474486] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.474712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.474952] ? __kthread_parkme+0x82/0x160 <3>[ 12.475141] ? preempt_count_sub+0x50/0x80 <3>[ 12.475333] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.475534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.475817] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.476044] kthread+0x257/0x310 <3>[ 12.476199] ? __pfx_kthread+0x10/0x10 <3>[ 12.476381] ret_from_fork+0x41/0x80 <3>[ 12.476542] ? __pfx_kthread+0x10/0x10 <3>[ 12.476701] ret_from_fork_asm+0x1a/0x30 <3>[ 12.476867] <3>[ 12.476961] <3>[ 12.477038] Allocated by task 169: <4>[ 12.477189] kasan_save_stack+0x3d/0x60 <4>[ 12.477332] kasan_save_track+0x18/0x40 <4>[ 12.477468] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.477614] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.477772] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.477928] kmalloc_uaf_16+0x15c/0x4c0 <4>[ 12.478081] kunit_try_run_case+0x1b3/0x490 <4>[ 12.478262] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.478481] kthread+0x257/0x310 <4>[ 12.478643] ret_from_fork+0x41/0x80 <4>[ 12.478811] ret_from_fork_asm+0x1a/0x30 <3>[ 12.478988] <3>[ 12.479077] Freed by task 169: <4>[ 12.479227] kasan_save_stack+0x3d/0x60 <4>[ 12.479446] kasan_save_track+0x18/0x40 <4>[ 12.479695] kasan_save_free_info+0x3f/0x60 <4>[ 12.479933] __kasan_slab_free+0x5e/0x80 <4>[ 12.480159] kfree+0x21a/0x330 <4>[ 12.480353] kmalloc_uaf_16+0x1d7/0x4c0 <4>[ 12.480572] kunit_try_run_case+0x1b3/0x490 <4>[ 12.480832] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.481103] kthread+0x257/0x310 <4>[ 12.481298] ret_from_fork+0x41/0x80 <4>[ 12.481484] ret_from_fork_asm+0x1a/0x30 <3>[ 12.481695] <3>[ 12.481801] The buggy address belongs to the object at ffff888102580920 <3>[ 12.481801] which belongs to the cache kmalloc-16 of size 16 <3>[ 12.482270] The buggy address is located 0 bytes inside of <3>[ 12.482270] freed 16-byte region [ffff888102580920, ffff888102580930) <3>[ 12.482788] <3>[ 12.482933] The buggy address belongs to the physical page: <4>[ 12.483219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 12.483598] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.483878] page_type: 0xfdffffff(slab) <4>[ 12.484112] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 12.484471] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 12.484909] page dumped because: kasan: bad access detected <3>[ 12.485141] <3>[ 12.485239] Memory state around the buggy address: <3>[ 12.485448] ffff888102580800: 00 06 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 12.485770] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 12.486058] >ffff888102580900: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc <3>[ 12.486340] ^ <3>[ 12.486532] ffff888102580980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.486915] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.487251] ================================================================== <6>[ 12.489091] ok 16 kmalloc_uaf_16 <3>[ 12.489847] ================================================================== <3>[ 12.490299] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x160/0x320 <3>[ 12.490657] Write of size 128 at addr ffff888102770f00 by task kunit_try_catch/171 <3>[ 12.491036] <3>[ 12.491176] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.491673] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.491924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.492358] Call Trace: <3>[ 12.492539] <3>[ 12.492748] dump_stack_lvl+0x73/0xb0 <3>[ 12.493008] print_report+0xd1/0x640 <3>[ 12.493241] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.493489] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.493934] kasan_report+0x102/0x140 <3>[ 12.494154] ? kmalloc_oob_in_memset+0x160/0x320 <3>[ 12.494417] ? kmalloc_oob_in_memset+0x160/0x320 <3>[ 12.494708] kasan_check_range+0x10c/0x1c0 <3>[ 12.494973] __asan_memset+0x27/0x50 <3>[ 12.495202] kmalloc_oob_in_memset+0x160/0x320 <3>[ 12.495461] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 <3>[ 12.495802] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 <3>[ 12.496088] kunit_try_run_case+0x1b3/0x490 <3>[ 12.496338] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.496599] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.496871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.497097] ? __kthread_parkme+0x82/0x160 <3>[ 12.497325] ? preempt_count_sub+0x50/0x80 <3>[ 12.497529] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.497815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.498088] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.498348] kthread+0x257/0x310 <3>[ 12.498498] ? __pfx_kthread+0x10/0x10 <3>[ 12.498668] ret_from_fork+0x41/0x80 <3>[ 12.498836] ? __pfx_kthread+0x10/0x10 <3>[ 12.498990] ret_from_fork_asm+0x1a/0x30 <3>[ 12.499141] <3>[ 12.499229] <3>[ 12.499298] Allocated by task 171: <4>[ 12.499418] kasan_save_stack+0x3d/0x60 <4>[ 12.499567] kasan_save_track+0x18/0x40 <4>[ 12.499761] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.499928] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.500102] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.500298] kmalloc_oob_in_memset+0xad/0x320 <4>[ 12.500444] kunit_try_run_case+0x1b3/0x490 <4>[ 12.500584] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.500801] kthread+0x257/0x310 <4>[ 12.500941] ret_from_fork+0x41/0x80 <4>[ 12.501122] ret_from_fork_asm+0x1a/0x30 <3>[ 12.501256] <3>[ 12.501327] The buggy address belongs to the object at ffff888102770f00 <3>[ 12.501327] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.501814] The buggy address is located 0 bytes inside of <3>[ 12.501814] allocated 120-byte region [ffff888102770f00, ffff888102770f78) <3>[ 12.502383] <3>[ 12.502510] The buggy address belongs to the physical page: <4>[ 12.502808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102770 <4>[ 12.503127] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.503353] page_type: 0xfdffffff(slab) <4>[ 12.503582] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.504058] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.504410] page dumped because: kasan: bad access detected <3>[ 12.504658] <3>[ 12.504768] Memory state around the buggy address: <3>[ 12.505013] ffff888102770e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.505319] ffff888102770e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.505655] >ffff888102770f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 12.505999] ^ <3>[ 12.506337] ffff888102770f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.506722] ffff888102771000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.507086] ================================================================== <6>[ 12.508595] ok 17 kmalloc_oob_in_memset <3>[ 12.509181] ================================================================== <3>[ 12.509565] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330 <3>[ 12.509874] Write of size 2 at addr ffff8881028b3577 by task kunit_try_catch/173 <3>[ 12.510121] <3>[ 12.510217] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.510535] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.510773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.511150] Call Trace: <3>[ 12.511259] <3>[ 12.511371] dump_stack_lvl+0x73/0xb0 <3>[ 12.511533] print_report+0xd1/0x640 <3>[ 12.511688] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.511886] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.512075] kasan_report+0x102/0x140 <3>[ 12.512220] ? kmalloc_oob_memset_2+0x167/0x330 <3>[ 12.512450] ? kmalloc_oob_memset_2+0x167/0x330 <3>[ 12.512713] kasan_check_range+0x10c/0x1c0 <3>[ 12.512893] __asan_memset+0x27/0x50 <3>[ 12.513070] kmalloc_oob_memset_2+0x167/0x330 <3>[ 12.513278] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 <3>[ 12.513499] ? __schedule+0xbca/0x2590 <3>[ 12.513727] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.513920] ? ktime_get_ts64+0x84/0x230 <3>[ 12.514143] kunit_try_run_case+0x1b3/0x490 <3>[ 12.514334] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.514544] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.514809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.515052] ? __kthread_parkme+0x82/0x160 <3>[ 12.515217] ? preempt_count_sub+0x50/0x80 <3>[ 12.515398] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.515595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.515841] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.516037] kthread+0x257/0x310 <3>[ 12.516165] ? __pfx_kthread+0x10/0x10 <3>[ 12.516298] ret_from_fork+0x41/0x80 <3>[ 12.516425] ? __pfx_kthread+0x10/0x10 <3>[ 12.516604] ret_from_fork_asm+0x1a/0x30 <3>[ 12.516895] <3>[ 12.517052] <3>[ 12.517179] Allocated by task 173: <4>[ 12.517392] kasan_save_stack+0x3d/0x60 <4>[ 12.517636] kasan_save_track+0x18/0x40 <4>[ 12.517882] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.518133] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.518362] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.518626] kmalloc_oob_memset_2+0xad/0x330 <4>[ 12.518915] kunit_try_run_case+0x1b3/0x490 <4>[ 12.519158] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.519438] kthread+0x257/0x310 <4>[ 12.519659] ret_from_fork+0x41/0x80 <4>[ 12.519891] ret_from_fork_asm+0x1a/0x30 <3>[ 12.520121] <3>[ 12.520250] The buggy address belongs to the object at ffff8881028b3500 <3>[ 12.520250] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.520895] The buggy address is located 119 bytes inside of <3>[ 12.520895] allocated 120-byte region [ffff8881028b3500, ffff8881028b3578) <3>[ 12.521396] <3>[ 12.521474] The buggy address belongs to the physical page: <4>[ 12.521655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b3 <4>[ 12.521932] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.522147] page_type: 0xfdffffff(slab) <4>[ 12.522349] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.522670] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.523005] page dumped because: kasan: bad access detected <3>[ 12.523228] <3>[ 12.523300] Memory state around the buggy address: <3>[ 12.523501] ffff8881028b3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 12.523790] ffff8881028b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.524051] >ffff8881028b3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 12.524262] ^ <3>[ 12.524480] ffff8881028b3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.524800] ffff8881028b3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.525096] ================================================================== <6>[ 12.527587] ok 18 kmalloc_oob_memset_2 <3>[ 12.528547] ================================================================== <3>[ 12.529152] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330 <3>[ 12.529529] Write of size 4 at addr ffff888102772175 by task kunit_try_catch/175 <3>[ 12.529908] <3>[ 12.530048] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.530549] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.530847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.531212] Call Trace: <3>[ 12.531358] <3>[ 12.531490] dump_stack_lvl+0x73/0xb0 <3>[ 12.531718] print_report+0xd1/0x640 <3>[ 12.531929] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.532159] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.532396] kasan_report+0x102/0x140 <3>[ 12.532540] ? kmalloc_oob_memset_4+0x167/0x330 <3>[ 12.532737] ? kmalloc_oob_memset_4+0x167/0x330 <3>[ 12.532920] kasan_check_range+0x10c/0x1c0 <3>[ 12.533067] __asan_memset+0x27/0x50 <3>[ 12.533207] kmalloc_oob_memset_4+0x167/0x330 <3>[ 12.533363] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 <3>[ 12.533535] ? __schedule+0xbca/0x2590 <3>[ 12.533700] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.533854] ? ktime_get_ts64+0x84/0x230 <3>[ 12.534007] kunit_try_run_case+0x1b3/0x490 <3>[ 12.534167] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.534337] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.534497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.534683] ? __kthread_parkme+0x82/0x160 <3>[ 12.534875] ? preempt_count_sub+0x50/0x80 <3>[ 12.535054] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.535226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.535437] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.535641] kthread+0x257/0x310 <3>[ 12.535780] ? __pfx_kthread+0x10/0x10 <3>[ 12.535921] ret_from_fork+0x41/0x80 <3>[ 12.536075] ? __pfx_kthread+0x10/0x10 <3>[ 12.536218] ret_from_fork_asm+0x1a/0x30 <3>[ 12.536368] <3>[ 12.536464] <3>[ 12.536537] Allocated by task 175: <4>[ 12.536676] kasan_save_stack+0x3d/0x60 <4>[ 12.536825] kasan_save_track+0x18/0x40 <4>[ 12.536960] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.537103] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.537235] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.537390] kmalloc_oob_memset_4+0xad/0x330 <4>[ 12.537548] kunit_try_run_case+0x1b3/0x490 <4>[ 12.537720] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.537913] kthread+0x257/0x310 <4>[ 12.538039] ret_from_fork+0x41/0x80 <4>[ 12.538175] ret_from_fork_asm+0x1a/0x30 <3>[ 12.538310] <3>[ 12.538378] The buggy address belongs to the object at ffff888102772100 <3>[ 12.538378] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.538793] The buggy address is located 117 bytes inside of <3>[ 12.538793] allocated 120-byte region [ffff888102772100, ffff888102772178) <3>[ 12.539146] <3>[ 12.539221] The buggy address belongs to the physical page: <4>[ 12.539385] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102772 <4>[ 12.539630] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.539881] page_type: 0xfdffffff(slab) <4>[ 12.540017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.540260] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.540497] page dumped because: kasan: bad access detected <3>[ 12.540684] <3>[ 12.540763] Memory state around the buggy address: <3>[ 12.540910] ffff888102772000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 12.541125] ffff888102772080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.541344] >ffff888102772100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 12.541555] ^ <3>[ 12.541822] ffff888102772180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.542033] ffff888102772200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.542240] ================================================================== <6>[ 12.543913] ok 19 kmalloc_oob_memset_4 <3>[ 12.544806] ================================================================== <3>[ 12.545218] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330 <3>[ 12.545482] Write of size 8 at addr ffff8881028b3871 by task kunit_try_catch/177 <3>[ 12.545847] <3>[ 12.545953] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.546278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.546467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.546819] Call Trace: <3>[ 12.546933] <3>[ 12.547035] dump_stack_lvl+0x73/0xb0 <3>[ 12.547177] print_report+0xd1/0x640 <3>[ 12.547316] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.547480] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.547678] kasan_report+0x102/0x140 <3>[ 12.547831] ? kmalloc_oob_memset_8+0x167/0x330 <3>[ 12.547987] ? kmalloc_oob_memset_8+0x167/0x330 <3>[ 12.548147] kasan_check_range+0x10c/0x1c0 <3>[ 12.548294] __asan_memset+0x27/0x50 <3>[ 12.548434] kmalloc_oob_memset_8+0x167/0x330 <3>[ 12.548587] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 <3>[ 12.548828] ? irqentry_exit+0x2a/0x60 <3>[ 12.548970] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.549152] ? trace_hardirqs_on+0x37/0xe0 <3>[ 12.549301] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.549451] ? ktime_get_ts64+0x84/0x230 <3>[ 12.549585] kunit_try_run_case+0x1b3/0x490 <3>[ 12.549847] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.550043] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.550218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.550381] ? __kthread_parkme+0x82/0x160 <3>[ 12.550530] ? preempt_count_sub+0x50/0x80 <3>[ 12.550725] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.550931] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.551201] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.551428] kthread+0x257/0x310 <3>[ 12.551587] ? __pfx_kthread+0x10/0x10 <3>[ 12.551836] ret_from_fork+0x41/0x80 <3>[ 12.552019] ? __pfx_kthread+0x10/0x10 <3>[ 12.552211] ret_from_fork_asm+0x1a/0x30 <3>[ 12.552459] <3>[ 12.552571] <3>[ 12.552682] Allocated by task 177: <4>[ 12.552828] kasan_save_stack+0x3d/0x60 <4>[ 12.552968] kasan_save_track+0x18/0x40 <4>[ 12.553102] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.553257] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.553422] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.553592] kmalloc_oob_memset_8+0xad/0x330 <4>[ 12.553794] kunit_try_run_case+0x1b3/0x490 <4>[ 12.553944] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.554173] kthread+0x257/0x310 <4>[ 12.554334] ret_from_fork+0x41/0x80 <4>[ 12.554507] ret_from_fork_asm+0x1a/0x30 <3>[ 12.554723] <3>[ 12.554827] The buggy address belongs to the object at ffff8881028b3800 <3>[ 12.554827] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.555287] The buggy address is located 113 bytes inside of <3>[ 12.555287] allocated 120-byte region [ffff8881028b3800, ffff8881028b3878) <3>[ 12.555661] <3>[ 12.555761] The buggy address belongs to the physical page: <4>[ 12.555957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b3 <4>[ 12.556272] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.556504] page_type: 0xfdffffff(slab) <4>[ 12.556713] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.557011] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.557314] page dumped because: kasan: bad access detected <3>[ 12.557533] <3>[ 12.557626] Memory state around the buggy address: <3>[ 12.557837] ffff8881028b3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 12.558110] ffff8881028b3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.558386] >ffff8881028b3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 12.558670] ^ <3>[ 12.558965] ffff8881028b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.559217] ffff8881028b3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.559457] ================================================================== <6>[ 12.560960] ok 20 kmalloc_oob_memset_8 <3>[ 12.561564] ================================================================== <3>[ 12.562046] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330 <3>[ 12.562360] Write of size 16 at addr ffff8881028b3969 by task kunit_try_catch/179 <3>[ 12.562628] <3>[ 12.562741] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.563085] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.563257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.563517] Call Trace: <3>[ 12.563612] <3>[ 12.563729] dump_stack_lvl+0x73/0xb0 <3>[ 12.563887] print_report+0xd1/0x640 <3>[ 12.564020] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.564171] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.564348] kasan_report+0x102/0x140 <3>[ 12.564480] ? kmalloc_oob_memset_16+0x167/0x330 <3>[ 12.564665] ? kmalloc_oob_memset_16+0x167/0x330 <3>[ 12.564834] kasan_check_range+0x10c/0x1c0 <3>[ 12.564980] __asan_memset+0x27/0x50 <3>[ 12.565111] kmalloc_oob_memset_16+0x167/0x330 <3>[ 12.565267] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 <3>[ 12.565432] ? __schedule+0xbca/0x2590 <3>[ 12.565568] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.565759] ? ktime_get_ts64+0x84/0x230 <3>[ 12.565956] kunit_try_run_case+0x1b3/0x490 <3>[ 12.566136] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.566347] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.566573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.566812] ? __kthread_parkme+0x82/0x160 <3>[ 12.567009] ? preempt_count_sub+0x50/0x80 <3>[ 12.567213] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.567417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.567690] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.567912] kthread+0x257/0x310 <3>[ 12.568034] ? __pfx_kthread+0x10/0x10 <3>[ 12.568170] ret_from_fork+0x41/0x80 <3>[ 12.568303] ? __pfx_kthread+0x10/0x10 <3>[ 12.568439] ret_from_fork_asm+0x1a/0x30 <3>[ 12.568587] <3>[ 12.568741] <3>[ 12.568856] Allocated by task 179: <4>[ 12.568975] kasan_save_stack+0x3d/0x60 <4>[ 12.569128] kasan_save_track+0x18/0x40 <4>[ 12.569261] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.569423] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.569597] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.569844] kmalloc_oob_memset_16+0xad/0x330 <4>[ 12.570055] kunit_try_run_case+0x1b3/0x490 <4>[ 12.570240] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.570479] kthread+0x257/0x310 <4>[ 12.570656] ret_from_fork+0x41/0x80 <4>[ 12.570824] ret_from_fork_asm+0x1a/0x30 <3>[ 12.571006] <3>[ 12.571088] The buggy address belongs to the object at ffff8881028b3900 <3>[ 12.571088] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.571547] The buggy address is located 105 bytes inside of <3>[ 12.571547] allocated 120-byte region [ffff8881028b3900, ffff8881028b3978) <3>[ 12.571998] <3>[ 12.572077] The buggy address belongs to the physical page: <4>[ 12.572248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b3 <4>[ 12.572479] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.572652] page_type: 0xfdffffff(slab) <4>[ 12.572807] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.573026] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.573262] page dumped because: kasan: bad access detected <3>[ 12.573489] <3>[ 12.573575] Memory state around the buggy address: <3>[ 12.573807] ffff8881028b3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.574087] ffff8881028b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.574353] >ffff8881028b3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 12.574605] ^ <3>[ 12.574895] ffff8881028b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.575182] ffff8881028b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.575452] ================================================================== <6>[ 12.577103] ok 21 kmalloc_oob_memset_16 <3>[ 12.578173] ================================================================== <3>[ 12.578837] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x172/0x330 <3>[ 12.579256] Read of size 18446744073709551614 at addr ffff88810276fc04 by task kunit_try_catch/181 <3>[ 12.579775] <3>[ 12.579927] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.580425] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.580685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.581124] Call Trace: <3>[ 12.581294] <3>[ 12.581461] dump_stack_lvl+0x73/0xb0 <3>[ 12.581766] print_report+0xd1/0x640 <3>[ 12.581995] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.582209] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.582472] kasan_report+0x102/0x140 <3>[ 12.582649] ? kmalloc_memmove_negative_size+0x172/0x330 <3>[ 12.582921] ? kmalloc_memmove_negative_size+0x172/0x330 <3>[ 12.583167] kasan_check_range+0x10c/0x1c0 <3>[ 12.583316] __asan_memmove+0x27/0x70 <3>[ 12.583450] kmalloc_memmove_negative_size+0x172/0x330 <3>[ 12.583618] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 <3>[ 12.583854] ? __schedule+0xbca/0x2590 <3>[ 12.583997] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.584134] ? ktime_get_ts64+0x84/0x230 <3>[ 12.584272] kunit_try_run_case+0x1b3/0x490 <3>[ 12.584429] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.584584] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.584846] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.585045] ? __kthread_parkme+0x82/0x160 <3>[ 12.585225] ? preempt_count_sub+0x50/0x80 <3>[ 12.585396] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.585610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.585927] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.586195] kthread+0x257/0x310 <3>[ 12.586350] ? __pfx_kthread+0x10/0x10 <3>[ 12.586515] ret_from_fork+0x41/0x80 <3>[ 12.586719] ? __pfx_kthread+0x10/0x10 <3>[ 12.586911] ret_from_fork_asm+0x1a/0x30 <3>[ 12.587136] <3>[ 12.587268] <3>[ 12.587360] Allocated by task 181: <4>[ 12.587500] kasan_save_stack+0x3d/0x60 <4>[ 12.587693] kasan_save_track+0x18/0x40 <4>[ 12.587844] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.588022] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.588176] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.588351] kmalloc_memmove_negative_size+0xad/0x330 <4>[ 12.588570] kunit_try_run_case+0x1b3/0x490 <4>[ 12.588804] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.589035] kthread+0x257/0x310 <4>[ 12.589200] ret_from_fork+0x41/0x80 <4>[ 12.589373] ret_from_fork_asm+0x1a/0x30 <3>[ 12.589537] <3>[ 12.589625] The buggy address belongs to the object at ffff88810276fc00 <3>[ 12.589625] which belongs to the cache kmalloc-64 of size 64 <3>[ 12.590098] The buggy address is located 4 bytes inside of <3>[ 12.590098] 64-byte region [ffff88810276fc00, ffff88810276fc40) <3>[ 12.590503] <3>[ 12.590593] The buggy address belongs to the physical page: <4>[ 12.590856] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276f <4>[ 12.591172] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.591373] page_type: 0xfdffffff(slab) <4>[ 12.591521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 12.591856] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 12.592098] page dumped because: kasan: bad access detected <3>[ 12.592289] <3>[ 12.592362] Memory state around the buggy address: <3>[ 12.592542] ffff88810276fb00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.592850] ffff88810276fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.593131] >ffff88810276fc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc <3>[ 12.593392] ^ <3>[ 12.593529] ffff88810276fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.593784] ffff88810276fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.593989] ================================================================== <6>[ 12.595579] ok 22 kmalloc_memmove_negative_size <3>[ 12.596571] ================================================================== <3>[ 12.597105] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x170/0x330 <3>[ 12.597377] Read of size 64 at addr ffff8881028b5584 by task kunit_try_catch/183 <3>[ 12.597617] <3>[ 12.597735] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.598045] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.598199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.598472] Call Trace: <3>[ 12.598593] <3>[ 12.598744] dump_stack_lvl+0x73/0xb0 <3>[ 12.598915] print_report+0xd1/0x640 <3>[ 12.599067] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.599239] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.599429] kasan_report+0x102/0x140 <3>[ 12.599570] ? kmalloc_memmove_invalid_size+0x170/0x330 <3>[ 12.599816] ? kmalloc_memmove_invalid_size+0x170/0x330 <3>[ 12.600000] kasan_check_range+0x10c/0x1c0 <3>[ 12.600168] __asan_memmove+0x27/0x70 <3>[ 12.600320] kmalloc_memmove_invalid_size+0x170/0x330 <3>[ 12.600504] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 <3>[ 12.600775] ? __schedule+0xbca/0x2590 <3>[ 12.600978] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.601128] ? ktime_get_ts64+0x84/0x230 <3>[ 12.601303] kunit_try_run_case+0x1b3/0x490 <3>[ 12.601459] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.601627] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.601849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.602028] ? __kthread_parkme+0x82/0x160 <3>[ 12.602193] ? preempt_count_sub+0x50/0x80 <3>[ 12.602356] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.602513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.602757] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.602950] kthread+0x257/0x310 <3>[ 12.603076] ? __pfx_kthread+0x10/0x10 <3>[ 12.603209] ret_from_fork+0x41/0x80 <3>[ 12.603346] ? __pfx_kthread+0x10/0x10 <3>[ 12.603483] ret_from_fork_asm+0x1a/0x30 <3>[ 12.603626] <3>[ 12.603745] <3>[ 12.603817] Allocated by task 183: <4>[ 12.603935] kasan_save_stack+0x3d/0x60 <4>[ 12.604069] kasan_save_track+0x18/0x40 <4>[ 12.604199] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.604342] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.604470] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.604616] kmalloc_memmove_invalid_size+0xad/0x330 <4>[ 12.604796] kunit_try_run_case+0x1b3/0x490 <4>[ 12.604937] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.605103] kthread+0x257/0x310 <4>[ 12.605266] ret_from_fork+0x41/0x80 <4>[ 12.605449] ret_from_fork_asm+0x1a/0x30 <3>[ 12.605646] <3>[ 12.605759] The buggy address belongs to the object at ffff8881028b5580 <3>[ 12.605759] which belongs to the cache kmalloc-64 of size 64 <3>[ 12.606241] The buggy address is located 4 bytes inside of <3>[ 12.606241] allocated 64-byte region [ffff8881028b5580, ffff8881028b55c0) <3>[ 12.606779] <3>[ 12.606875] The buggy address belongs to the physical page: <4>[ 12.607108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b5 <4>[ 12.607427] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.607607] page_type: 0xfdffffff(slab) <4>[ 12.607777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 12.608004] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 12.608223] page dumped because: kasan: bad access detected <3>[ 12.608388] <3>[ 12.608457] Memory state around the buggy address: <3>[ 12.608610] ffff8881028b5480: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc <3>[ 12.608846] ffff8881028b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.609062] >ffff8881028b5580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc <3>[ 12.609304] ^ <3>[ 12.609530] ffff8881028b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.609885] ffff8881028b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.610162] ================================================================== <6>[ 12.611819] ok 23 kmalloc_memmove_invalid_size <3>[ 12.612591] ================================================================== <3>[ 12.613019] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380 <3>[ 12.613256] Read of size 1 at addr ffff888102580948 by task kunit_try_catch/185 <3>[ 12.613489] <3>[ 12.613584] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.613997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.614162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.614496] Call Trace: <3>[ 12.614630] <3>[ 12.614775] dump_stack_lvl+0x73/0xb0 <3>[ 12.614988] print_report+0xd1/0x640 <3>[ 12.615186] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.615396] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.615618] kasan_report+0x102/0x140 <3>[ 12.615803] ? kmalloc_uaf+0x322/0x380 <3>[ 12.615959] ? kmalloc_uaf+0x322/0x380 <3>[ 12.616107] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.616271] kmalloc_uaf+0x322/0x380 <3>[ 12.616420] ? __pfx_kmalloc_uaf+0x10/0x10 <3>[ 12.616609] ? __schedule+0xbca/0x2590 <3>[ 12.616779] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.616958] ? ktime_get_ts64+0x84/0x230 <3>[ 12.617166] kunit_try_run_case+0x1b3/0x490 <3>[ 12.617378] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.617582] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.617815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.618003] ? __kthread_parkme+0x82/0x160 <3>[ 12.618156] ? preempt_count_sub+0x50/0x80 <3>[ 12.618306] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.618521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.618829] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.619085] kthread+0x257/0x310 <3>[ 12.619263] ? __pfx_kthread+0x10/0x10 <3>[ 12.619440] ret_from_fork+0x41/0x80 <3>[ 12.619598] ? __pfx_kthread+0x10/0x10 <3>[ 12.619817] ret_from_fork_asm+0x1a/0x30 <3>[ 12.620007] <3>[ 12.620125] <3>[ 12.620218] Allocated by task 185: <4>[ 12.620359] kasan_save_stack+0x3d/0x60 <4>[ 12.620523] kasan_save_track+0x18/0x40 <4>[ 12.620700] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.620853] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.620997] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.621167] kmalloc_uaf+0xab/0x380 <4>[ 12.621313] kunit_try_run_case+0x1b3/0x490 <4>[ 12.621476] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.621720] kthread+0x257/0x310 <4>[ 12.621881] ret_from_fork+0x41/0x80 <4>[ 12.622031] ret_from_fork_asm+0x1a/0x30 <3>[ 12.622184] <3>[ 12.622265] Freed by task 185: <4>[ 12.622383] kasan_save_stack+0x3d/0x60 <4>[ 12.622531] kasan_save_track+0x18/0x40 <4>[ 12.622710] kasan_save_free_info+0x3f/0x60 <4>[ 12.622910] __kasan_slab_free+0x5e/0x80 <4>[ 12.623054] kfree+0x21a/0x330 <4>[ 12.623179] kmalloc_uaf+0x12d/0x380 <4>[ 12.623316] kunit_try_run_case+0x1b3/0x490 <4>[ 12.623466] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.623658] kthread+0x257/0x310 <4>[ 12.623797] ret_from_fork+0x41/0x80 <4>[ 12.623944] ret_from_fork_asm+0x1a/0x30 <3>[ 12.624095] <3>[ 12.624174] The buggy address belongs to the object at ffff888102580940 <3>[ 12.624174] which belongs to the cache kmalloc-16 of size 16 <3>[ 12.624527] The buggy address is located 8 bytes inside of <3>[ 12.624527] freed 16-byte region [ffff888102580940, ffff888102580950) <3>[ 12.624926] <3>[ 12.625008] The buggy address belongs to the physical page: <4>[ 12.625220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 12.625448] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.625616] page_type: 0xfdffffff(slab) <4>[ 12.625820] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 12.626077] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 12.626364] page dumped because: kasan: bad access detected <3>[ 12.626588] <3>[ 12.626688] Memory state around the buggy address: <3>[ 12.626878] ffff888102580800: 00 06 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 12.627106] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 12.627319] >ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc <3>[ 12.627541] ^ <3>[ 12.627757] ffff888102580980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.627977] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.628190] ================================================================== <6>[ 12.630060] ok 24 kmalloc_uaf <3>[ 12.630808] ================================================================== <3>[ 12.631168] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a4/0x360 <3>[ 12.631502] Write of size 33 at addr ffff8881028b5700 by task kunit_try_catch/187 <3>[ 12.631831] <3>[ 12.631937] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.632386] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.632598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.632973] Call Trace: <3>[ 12.633129] <3>[ 12.633283] dump_stack_lvl+0x73/0xb0 <3>[ 12.633495] print_report+0xd1/0x640 <3>[ 12.633730] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.633885] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.634146] kasan_report+0x102/0x140 <3>[ 12.634336] ? kmalloc_uaf_memset+0x1a4/0x360 <3>[ 12.634552] ? kmalloc_uaf_memset+0x1a4/0x360 <3>[ 12.634805] kasan_check_range+0x10c/0x1c0 <3>[ 12.635013] __asan_memset+0x27/0x50 <3>[ 12.635221] kmalloc_uaf_memset+0x1a4/0x360 <3>[ 12.635444] ? __pfx_kmalloc_uaf_memset+0x10/0x10 <3>[ 12.635701] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 12.635892] ? trace_hardirqs_on+0x37/0xe0 <3>[ 12.636146] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.636350] ? ktime_get_ts64+0x84/0x230 <3>[ 12.636549] kunit_try_run_case+0x1b3/0x490 <3>[ 12.636817] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.636990] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.637254] ? __kthread_parkme+0x82/0x160 <3>[ 12.637464] ? preempt_count_sub+0x50/0x80 <3>[ 12.637680] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.637941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.638192] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.638425] kthread+0x257/0x310 <3>[ 12.638606] ? __pfx_kthread+0x10/0x10 <3>[ 12.638836] ret_from_fork+0x41/0x80 <3>[ 12.639014] ? __pfx_kthread+0x10/0x10 <3>[ 12.639228] ret_from_fork_asm+0x1a/0x30 <3>[ 12.639434] <3>[ 12.639551] <3>[ 12.639705] Allocated by task 187: <4>[ 12.639862] kasan_save_stack+0x3d/0x60 <4>[ 12.640083] kasan_save_track+0x18/0x40 <4>[ 12.640270] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.640470] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.640667] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.640885] kmalloc_uaf_memset+0xaa/0x360 <4>[ 12.641078] kunit_try_run_case+0x1b3/0x490 <4>[ 12.641229] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.641478] kthread+0x257/0x310 <4>[ 12.641663] ret_from_fork+0x41/0x80 <4>[ 12.641806] ret_from_fork_asm+0x1a/0x30 <3>[ 12.642028] <3>[ 12.642126] Freed by task 187: <4>[ 12.642310] kasan_save_stack+0x3d/0x60 <4>[ 12.642498] kasan_save_track+0x18/0x40 <4>[ 12.642704] kasan_save_free_info+0x3f/0x60 <4>[ 12.642909] __kasan_slab_free+0x5e/0x80 <4>[ 12.643104] kfree+0x21a/0x330 <4>[ 12.643271] kmalloc_uaf_memset+0x12c/0x360 <4>[ 12.643468] kunit_try_run_case+0x1b3/0x490 <4>[ 12.643670] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.643857] kthread+0x257/0x310 <4>[ 12.644050] ret_from_fork+0x41/0x80 <4>[ 12.644240] ret_from_fork_asm+0x1a/0x30 <3>[ 12.644431] <3>[ 12.644549] The buggy address belongs to the object at ffff8881028b5700 <3>[ 12.644549] which belongs to the cache kmalloc-64 of size 64 <3>[ 12.645028] The buggy address is located 0 bytes inside of <3>[ 12.645028] freed 64-byte region [ffff8881028b5700, ffff8881028b5740) <3>[ 12.645444] <3>[ 12.645548] The buggy address belongs to the physical page: <4>[ 12.645834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b5 <4>[ 12.646132] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.646350] page_type: 0xfdffffff(slab) <4>[ 12.646543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 12.646848] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 12.647136] page dumped because: kasan: bad access detected <3>[ 12.647327] <3>[ 12.647404] Memory state around the buggy address: <3>[ 12.647555] ffff8881028b5600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.647821] ffff8881028b5680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.648022] >ffff8881028b5700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.648224] ^ <3>[ 12.648339] ffff8881028b5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.648547] ffff8881028b5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.648773] ================================================================== <6>[ 12.650298] ok 25 kmalloc_uaf_memset <3>[ 12.651357] ================================================================== <3>[ 12.651773] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4aa/0x520 <3>[ 12.652021] Read of size 1 at addr ffff88810276ff28 by task kunit_try_catch/189 <3>[ 12.652260] <3>[ 12.652346] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.652729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.652937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.653208] Call Trace: <3>[ 12.653309] <3>[ 12.653402] dump_stack_lvl+0x73/0xb0 <3>[ 12.653575] print_report+0xd1/0x640 <3>[ 12.653755] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.653926] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.654115] kasan_report+0x102/0x140 <3>[ 12.654269] ? kmalloc_uaf2+0x4aa/0x520 <3>[ 12.654409] ? kmalloc_uaf2+0x4aa/0x520 <3>[ 12.654588] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.654800] kmalloc_uaf2+0x4aa/0x520 <3>[ 12.654981] ? __pfx_kmalloc_uaf2+0x10/0x10 <3>[ 12.655139] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.655338] ? __switch_to+0x5d9/0xf60 <3>[ 12.655488] ? __schedule+0xbca/0x2590 <3>[ 12.655676] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.655839] ? ktime_get_ts64+0x84/0x230 <3>[ 12.656013] kunit_try_run_case+0x1b3/0x490 <3>[ 12.656191] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.656364] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.656564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.656790] ? __kthread_parkme+0x82/0x160 <3>[ 12.656994] ? preempt_count_sub+0x50/0x80 <3>[ 12.657156] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.657348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.657576] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.657847] kthread+0x257/0x310 <3>[ 12.658000] ? __pfx_kthread+0x10/0x10 <3>[ 12.658167] ret_from_fork+0x41/0x80 <3>[ 12.658317] ? __pfx_kthread+0x10/0x10 <3>[ 12.658471] ret_from_fork_asm+0x1a/0x30 <3>[ 12.658646] <3>[ 12.658790] <3>[ 12.658876] Allocated by task 189: <4>[ 12.659081] kasan_save_stack+0x3d/0x60 <4>[ 12.659244] kasan_save_track+0x18/0x40 <4>[ 12.659406] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.659617] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.659832] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.660026] kmalloc_uaf2+0xc7/0x520 <4>[ 12.660262] kunit_try_run_case+0x1b3/0x490 <4>[ 12.660488] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.660743] kthread+0x257/0x310 <4>[ 12.660886] ret_from_fork+0x41/0x80 <4>[ 12.661030] ret_from_fork_asm+0x1a/0x30 <3>[ 12.661194] <3>[ 12.661266] Freed by task 189: <4>[ 12.661384] kasan_save_stack+0x3d/0x60 <4>[ 12.661539] kasan_save_track+0x18/0x40 <4>[ 12.661737] kasan_save_free_info+0x3f/0x60 <4>[ 12.661926] __kasan_slab_free+0x5e/0x80 <4>[ 12.662105] kfree+0x21a/0x330 <4>[ 12.662243] kmalloc_uaf2+0x14d/0x520 <4>[ 12.662386] kunit_try_run_case+0x1b3/0x490 <4>[ 12.662577] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.662806] kthread+0x257/0x310 <4>[ 12.663010] ret_from_fork+0x41/0x80 <4>[ 12.663145] ret_from_fork_asm+0x1a/0x30 <3>[ 12.663290] <3>[ 12.663363] The buggy address belongs to the object at ffff88810276ff00 <3>[ 12.663363] which belongs to the cache kmalloc-64 of size 64 <3>[ 12.663838] The buggy address is located 40 bytes inside of <3>[ 12.663838] freed 64-byte region [ffff88810276ff00, ffff88810276ff40) <3>[ 12.664250] <3>[ 12.664341] The buggy address belongs to the physical page: <4>[ 12.664527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276f <4>[ 12.664867] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.665096] page_type: 0xfdffffff(slab) <4>[ 12.665301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 12.665613] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 12.665945] page dumped because: kasan: bad access detected <3>[ 12.666158] <3>[ 12.666234] Memory state around the buggy address: <3>[ 12.666417] ffff88810276fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.666707] ffff88810276fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.667017] >ffff88810276ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 12.667295] ^ <3>[ 12.667505] ffff88810276ff80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc <3>[ 12.667866] ffff888102770000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.668153] ================================================================== <6>[ 12.669801] ok 26 kmalloc_uaf2 <6>[ 12.671036] ok 27 kmalloc_uaf3 # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 12.671951] ================================================================== <3>[ 12.672409] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.672753] Read of size 1 at addr ffff888102580960 by task kunit_try_catch/193 <3>[ 12.673054] <3>[ 12.673165] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.673566] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.673817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.674176] Call Trace: <3>[ 12.674290] <3>[ 12.674383] dump_stack_lvl+0x73/0xb0 <3>[ 12.674534] print_report+0xd1/0x640 <3>[ 12.674705] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.674864] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.675075] kasan_report+0x102/0x140 <3>[ 12.675251] ? kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.675453] ? kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.675702] ? kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.675924] __kasan_check_byte+0x3d/0x50 <3>[ 12.676138] kfree_sensitive+0x22/0x90 <3>[ 12.676344] kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.676522] ? __pfx_kmalloc_double_kzfree+0x10/0x10 <3>[ 12.676732] ? __schedule+0xbca/0x2590 <3>[ 12.676906] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.677048] ? ktime_get_ts64+0x84/0x230 <3>[ 12.677200] kunit_try_run_case+0x1b3/0x490 <3>[ 12.677363] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.677545] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.677798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.678015] ? __kthread_parkme+0x82/0x160 <3>[ 12.678210] ? preempt_count_sub+0x50/0x80 <3>[ 12.678402] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.678611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.678910] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.679169] kthread+0x257/0x310 <3>[ 12.679325] ? __pfx_kthread+0x10/0x10 <3>[ 12.679514] ret_from_fork+0x41/0x80 <3>[ 12.679743] ? __pfx_kthread+0x10/0x10 <3>[ 12.679901] ret_from_fork_asm+0x1a/0x30 <3>[ 12.680057] <3>[ 12.680151] <3>[ 12.680228] Allocated by task 193: <4>[ 12.680357] kasan_save_stack+0x3d/0x60 <4>[ 12.680500] kasan_save_track+0x18/0x40 <4>[ 12.680671] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.680851] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.680987] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.681131] kmalloc_double_kzfree+0xaa/0x360 <4>[ 12.681315] kunit_try_run_case+0x1b3/0x490 <4>[ 12.681493] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.681747] kthread+0x257/0x310 <4>[ 12.681907] ret_from_fork+0x41/0x80 <4>[ 12.682083] ret_from_fork_asm+0x1a/0x30 <3>[ 12.682265] <3>[ 12.682357] Freed by task 193: <4>[ 12.682509] kasan_save_stack+0x3d/0x60 <4>[ 12.682707] kasan_save_track+0x18/0x40 <4>[ 12.682862] kasan_save_free_info+0x3f/0x60 <4>[ 12.683046] __kasan_slab_free+0x5e/0x80 <4>[ 12.683230] kfree+0x21a/0x330 <4>[ 12.683388] kfree_sensitive+0x67/0x90 <4>[ 12.683539] kmalloc_double_kzfree+0x12c/0x360 <4>[ 12.683761] kunit_try_run_case+0x1b3/0x490 <4>[ 12.683923] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.684136] kthread+0x257/0x310 <4>[ 12.684285] ret_from_fork+0x41/0x80 <4>[ 12.684447] ret_from_fork_asm+0x1a/0x30 <3>[ 12.684630] <3>[ 12.684744] The buggy address belongs to the object at ffff888102580960 <3>[ 12.684744] which belongs to the cache kmalloc-16 of size 16 <3>[ 12.685209] The buggy address is located 0 bytes inside of <3>[ 12.685209] freed 16-byte region [ffff888102580960, ffff888102580970) <3>[ 12.685679] <3>[ 12.685770] The buggy address belongs to the physical page: <4>[ 12.685994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 12.686310] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.686524] page_type: 0xfdffffff(slab) <4>[ 12.686734] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 12.687050] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 12.687354] page dumped because: kasan: bad access detected <3>[ 12.687594] <3>[ 12.687723] Memory state around the buggy address: <3>[ 12.687935] ffff888102580800: 00 06 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 12.688223] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 12.688509] >ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 12.688852] ^ <3>[ 12.689065] ffff888102580980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.689273] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.689478] ================================================================== <3>[ 12.689843] ================================================================== <3>[ 12.690101] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 <3>[ 12.690300] Free of addr ffff888102580960 by task kunit_try_catch/193 <3>[ 12.690490] <3>[ 12.690572] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.690934] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.691101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.691355] Call Trace: <3>[ 12.691449] <3>[ 12.691540] dump_stack_lvl+0x73/0xb0 <3>[ 12.691700] print_report+0xd1/0x640 <3>[ 12.691844] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.691989] ? kfree_sensitive+0x2e/0x90 <3>[ 12.692126] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.692308] ? kfree_sensitive+0x2e/0x90 <3>[ 12.692448] kasan_report_invalid_free+0xc0/0xf0 <3>[ 12.692606] ? kfree_sensitive+0x2e/0x90 <3>[ 12.692788] ? kfree_sensitive+0x2e/0x90 <3>[ 12.692929] ? kfree_sensitive+0x2e/0x90 <3>[ 12.693096] check_slab_allocation+0x115/0x140 <3>[ 12.693304] __kasan_slab_pre_free+0x28/0x40 <3>[ 12.693513] kfree+0xf1/0x330 <3>[ 12.693713] ? kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.693933] kfree_sensitive+0x2e/0x90 <3>[ 12.694109] kmalloc_double_kzfree+0x19d/0x360 <3>[ 12.694315] ? __pfx_kmalloc_double_kzfree+0x10/0x10 <3>[ 12.694534] ? __schedule+0xbca/0x2590 <3>[ 12.694786] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.694980] ? ktime_get_ts64+0x84/0x230 <3>[ 12.695173] kunit_try_run_case+0x1b3/0x490 <3>[ 12.695326] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.695481] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.695645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.695823] ? __kthread_parkme+0x82/0x160 <3>[ 12.695995] ? preempt_count_sub+0x50/0x80 <3>[ 12.696156] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.696315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.696562] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.696813] kthread+0x257/0x310 <3>[ 12.696981] ? __pfx_kthread+0x10/0x10 <3>[ 12.697156] ret_from_fork+0x41/0x80 <3>[ 12.697341] ? __pfx_kthread+0x10/0x10 <3>[ 12.697505] ret_from_fork_asm+0x1a/0x30 <3>[ 12.697727] <3>[ 12.697833] <3>[ 12.697932] Allocated by task 193: <4>[ 12.698087] kasan_save_stack+0x3d/0x60 <4>[ 12.698259] kasan_save_track+0x18/0x40 <4>[ 12.698427] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.698606] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.698800] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.698986] kmalloc_double_kzfree+0xaa/0x360 <4>[ 12.699173] kunit_try_run_case+0x1b3/0x490 <4>[ 12.699352] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.699566] kthread+0x257/0x310 <4>[ 12.699778] ret_from_fork+0x41/0x80 <4>[ 12.699970] ret_from_fork_asm+0x1a/0x30 <3>[ 12.700124] <3>[ 12.700199] Freed by task 193: <4>[ 12.700330] kasan_save_stack+0x3d/0x60 <4>[ 12.700499] kasan_save_track+0x18/0x40 <4>[ 12.700707] kasan_save_free_info+0x3f/0x60 <4>[ 12.700894] __kasan_slab_free+0x5e/0x80 <4>[ 12.701072] kfree+0x21a/0x330 <4>[ 12.701232] kfree_sensitive+0x67/0x90 <4>[ 12.701406] kmalloc_double_kzfree+0x12c/0x360 <4>[ 12.701599] kunit_try_run_case+0x1b3/0x490 <4>[ 12.701821] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.702043] kthread+0x257/0x310 <4>[ 12.702165] ret_from_fork+0x41/0x80 <4>[ 12.702332] ret_from_fork_asm+0x1a/0x30 <3>[ 12.702515] <3>[ 12.702616] The buggy address belongs to the object at ffff888102580960 <3>[ 12.702616] which belongs to the cache kmalloc-16 of size 16 <3>[ 12.703083] The buggy address is located 0 bytes inside of <3>[ 12.703083] 16-byte region [ffff888102580960, ffff888102580970) <3>[ 12.703483] <3>[ 12.703559] The buggy address belongs to the physical page: <4>[ 12.703805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 12.704089] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.704292] page_type: 0xfdffffff(slab) <4>[ 12.704489] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 12.704850] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 12.705137] page dumped because: kasan: bad access detected <3>[ 12.705364] <3>[ 12.705462] Memory state around the buggy address: <3>[ 12.705677] ffff888102580800: 00 06 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 12.705953] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 12.706235] >ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 12.706510] ^ <3>[ 12.706825] ffff888102580980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.707063] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.707274] ================================================================== <6>[ 12.708882] ok 28 kmalloc_double_kzfree <3>[ 12.709854] ================================================================== <3>[ 12.710249] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 <3>[ 12.710488] Read of size 1 at addr ffff8881028b7273 by task kunit_try_catch/195 <3>[ 12.710746] <3>[ 12.710836] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.711163] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.711331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.711591] Call Trace: <3>[ 12.711732] <3>[ 12.711849] dump_stack_lvl+0x73/0xb0 <3>[ 12.712004] print_report+0xd1/0x640 <3>[ 12.712144] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.712312] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.712504] kasan_report+0x102/0x140 <3>[ 12.712672] ? ksize_unpoisons_memory+0x81e/0x9b0 <3>[ 12.712835] ? ksize_unpoisons_memory+0x81e/0x9b0 <3>[ 12.713022] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.713195] ksize_unpoisons_memory+0x81e/0x9b0 <3>[ 12.713361] ? __pfx_ksize_unpoisons_memory+0x10/0x10 <3>[ 12.713542] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.713809] ? __switch_to+0x5d9/0xf60 <3>[ 12.713968] ? __schedule+0xbca/0x2590 <3>[ 12.714124] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.714275] ? ktime_get_ts64+0x84/0x230 <3>[ 12.714438] kunit_try_run_case+0x1b3/0x490 <3>[ 12.714600] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.714788] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.714966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.715140] ? __kthread_parkme+0x82/0x160 <3>[ 12.715297] ? preempt_count_sub+0x50/0x80 <3>[ 12.715454] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.715627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.715861] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.716059] kthread+0x257/0x310 <3>[ 12.716202] ? __pfx_kthread+0x10/0x10 <3>[ 12.716360] ret_from_fork+0x41/0x80 <3>[ 12.716505] ? __pfx_kthread+0x10/0x10 <3>[ 12.716670] ret_from_fork_asm+0x1a/0x30 <3>[ 12.716829] <3>[ 12.716938] <3>[ 12.717018] Allocated by task 195: <4>[ 12.717147] kasan_save_stack+0x3d/0x60 <4>[ 12.717300] kasan_save_track+0x18/0x40 <4>[ 12.717442] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.717598] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.717761] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.717937] ksize_unpoisons_memory+0xc8/0x9b0 <4>[ 12.718096] kunit_try_run_case+0x1b3/0x490 <4>[ 12.718254] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.718431] kthread+0x257/0x310 <4>[ 12.718563] ret_from_fork+0x41/0x80 <4>[ 12.718729] ret_from_fork_asm+0x1a/0x30 <3>[ 12.718880] <3>[ 12.718976] The buggy address belongs to the object at ffff8881028b7200 <3>[ 12.718976] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.719328] The buggy address is located 0 bytes to the right of <3>[ 12.719328] allocated 115-byte region [ffff8881028b7200, ffff8881028b7273) <3>[ 12.719720] <3>[ 12.719804] The buggy address belongs to the physical page: <4>[ 12.720026] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 <4>[ 12.720268] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.720436] page_type: 0xfdffffff(slab) <4>[ 12.720585] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.720856] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.721077] page dumped because: kasan: bad access detected <3>[ 12.721251] <3>[ 12.721329] Memory state around the buggy address: <3>[ 12.721489] ffff8881028b7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 12.721764] ffff8881028b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.721990] >ffff8881028b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 12.722216] ^ <3>[ 12.722438] ffff8881028b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.722681] ffff8881028b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.722889] ================================================================== <3>[ 12.723300] ================================================================== <3>[ 12.723549] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 <3>[ 12.723828] Read of size 1 at addr ffff8881028b7278 by task kunit_try_catch/195 <3>[ 12.724053] <3>[ 12.724148] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.724473] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.724643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.724916] Call Trace: <3>[ 12.725026] <3>[ 12.725131] dump_stack_lvl+0x73/0xb0 <3>[ 12.725292] print_report+0xd1/0x640 <3>[ 12.725440] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.725606] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.725821] kasan_report+0x102/0x140 <3>[ 12.725971] ? ksize_unpoisons_memory+0x7eb/0x9b0 <3>[ 12.726143] ? ksize_unpoisons_memory+0x7eb/0x9b0 <3>[ 12.726312] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.726482] ksize_unpoisons_memory+0x7eb/0x9b0 <3>[ 12.726663] ? __pfx_ksize_unpoisons_memory+0x10/0x10 <3>[ 12.726838] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.727032] ? __switch_to+0x5d9/0xf60 <3>[ 12.727181] ? __schedule+0xbca/0x2590 <3>[ 12.727328] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.727470] ? ktime_get_ts64+0x84/0x230 <3>[ 12.727671] kunit_try_run_case+0x1b3/0x490 <3>[ 12.727860] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.728107] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.728339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.728577] ? __kthread_parkme+0x82/0x160 <3>[ 12.728814] ? preempt_count_sub+0x50/0x80 <3>[ 12.729043] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.729295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.729636] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.729973] kthread+0x257/0x310 <3>[ 12.730188] ? __pfx_kthread+0x10/0x10 <3>[ 12.730409] ret_from_fork+0x41/0x80 <3>[ 12.730623] ? __pfx_kthread+0x10/0x10 <3>[ 12.730800] ret_from_fork_asm+0x1a/0x30 <3>[ 12.730982] <3>[ 12.731085] <3>[ 12.731169] Allocated by task 195: <4>[ 12.731312] kasan_save_stack+0x3d/0x60 <4>[ 12.731490] kasan_save_track+0x18/0x40 <4>[ 12.731733] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.731900] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.732046] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.732233] ksize_unpoisons_memory+0xc8/0x9b0 <4>[ 12.732389] kunit_try_run_case+0x1b3/0x490 <4>[ 12.732555] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.732807] kthread+0x257/0x310 <4>[ 12.732930] ret_from_fork+0x41/0x80 <4>[ 12.733075] ret_from_fork_asm+0x1a/0x30 <3>[ 12.733250] <3>[ 12.733333] The buggy address belongs to the object at ffff8881028b7200 <3>[ 12.733333] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.733750] The buggy address is located 5 bytes to the right of <3>[ 12.733750] allocated 115-byte region [ffff8881028b7200, ffff8881028b7273) <3>[ 12.734158] <3>[ 12.734252] The buggy address belongs to the physical page: <4>[ 12.734467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 <4>[ 12.734762] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.734952] page_type: 0xfdffffff(slab) <4>[ 12.735091] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.735329] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.735578] page dumped because: kasan: bad access detected <3>[ 12.735813] <3>[ 12.735888] Memory state around the buggy address: <3>[ 12.736059] ffff8881028b7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 12.736295] ffff8881028b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.736530] >ffff8881028b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 12.736788] ^ <3>[ 12.736998] ffff8881028b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.737239] ffff8881028b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.737462] ================================================================== <3>[ 12.737859] ================================================================== <3>[ 12.738103] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 <3>[ 12.738370] Read of size 1 at addr ffff8881028b727f by task kunit_try_catch/195 <3>[ 12.738683] <3>[ 12.738845] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.739204] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.739359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.739612] Call Trace: <3>[ 12.739770] <3>[ 12.739860] dump_stack_lvl+0x73/0xb0 <3>[ 12.740014] print_report+0xd1/0x640 <3>[ 12.740146] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.740288] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.740470] kasan_report+0x102/0x140 <3>[ 12.740605] ? ksize_unpoisons_memory+0x7b8/0x9b0 <3>[ 12.740863] ? ksize_unpoisons_memory+0x7b8/0x9b0 <3>[ 12.741035] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.741198] ksize_unpoisons_memory+0x7b8/0x9b0 <3>[ 12.741362] ? __pfx_ksize_unpoisons_memory+0x10/0x10 <3>[ 12.741531] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 12.741771] ? __switch_to+0x5d9/0xf60 <3>[ 12.741914] ? __schedule+0xbca/0x2590 <3>[ 12.742057] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.742194] ? ktime_get_ts64+0x84/0x230 <3>[ 12.742331] kunit_try_run_case+0x1b3/0x490 <3>[ 12.742484] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.742642] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.742842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.743056] ? __kthread_parkme+0x82/0x160 <3>[ 12.743281] ? preempt_count_sub+0x50/0x80 <3>[ 12.743512] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.743804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.744110] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.744396] kthread+0x257/0x310 <3>[ 12.744622] ? __pfx_kthread+0x10/0x10 <3>[ 12.744866] ret_from_fork+0x41/0x80 <3>[ 12.745013] ? __pfx_kthread+0x10/0x10 <3>[ 12.745148] ret_from_fork_asm+0x1a/0x30 <3>[ 12.745296] <3>[ 12.745383] <3>[ 12.745492] Allocated by task 195: <4>[ 12.745697] kasan_save_stack+0x3d/0x60 <4>[ 12.745852] kasan_save_track+0x18/0x40 <4>[ 12.745994] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.746141] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.746325] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.746513] ksize_unpoisons_memory+0xc8/0x9b0 <4>[ 12.746666] kunit_try_run_case+0x1b3/0x490 <4>[ 12.746816] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.746994] kthread+0x257/0x310 <4>[ 12.747104] ret_from_fork+0x41/0x80 <4>[ 12.747223] ret_from_fork_asm+0x1a/0x30 <3>[ 12.747359] <3>[ 12.747428] The buggy address belongs to the object at ffff8881028b7200 <3>[ 12.747428] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.747795] The buggy address is located 12 bytes to the right of <3>[ 12.747795] allocated 115-byte region [ffff8881028b7200, ffff8881028b7273) <3>[ 12.748154] <3>[ 12.748222] The buggy address belongs to the physical page: <4>[ 12.748391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 <4>[ 12.748618] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.748803] page_type: 0xfdffffff(slab) <4>[ 12.748951] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.749184] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.749406] page dumped because: kasan: bad access detected <3>[ 12.749569] <3>[ 12.749658] Memory state around the buggy address: <3>[ 12.749812] ffff8881028b7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 12.750022] ffff8881028b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.750240] >ffff8881028b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 12.750441] ^ <3>[ 12.750655] ffff8881028b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.750867] ffff8881028b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.751083] ================================================================== <6>[ 12.752569] ok 29 ksize_unpoisons_memory <3>[ 12.753302] ================================================================== <3>[ 12.753768] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0 <3>[ 12.754079] Read of size 1 at addr ffff8881028b7300 by task kunit_try_catch/197 <3>[ 12.754373] <3>[ 12.754554] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.755045] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.755310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.755680] Call Trace: <3>[ 12.755830] <3>[ 12.755985] dump_stack_lvl+0x73/0xb0 <3>[ 12.756177] print_report+0xd1/0x640 <3>[ 12.756409] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.756608] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.756951] kasan_report+0x102/0x140 <3>[ 12.757117] ? ksize_uaf+0x19e/0x6c0 <3>[ 12.757343] ? ksize_uaf+0x19e/0x6c0 <3>[ 12.757511] ? ksize_uaf+0x19e/0x6c0 <3>[ 12.757764] __kasan_check_byte+0x3d/0x50 <3>[ 12.757999] ksize+0x20/0x60 <3>[ 12.758160] ksize_uaf+0x19e/0x6c0 <3>[ 12.758373] ? __pfx_ksize_uaf+0x10/0x10 <3>[ 12.758559] ? __schedule+0xbca/0x2590 <3>[ 12.758827] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.759063] ? ktime_get_ts64+0x84/0x230 <3>[ 12.759288] kunit_try_run_case+0x1b3/0x490 <3>[ 12.759475] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.759752] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.760019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.760238] ? __kthread_parkme+0x82/0x160 <3>[ 12.760521] ? preempt_count_sub+0x50/0x80 <3>[ 12.760800] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.761013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.761368] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.761616] kthread+0x257/0x310 <3>[ 12.761866] ? __pfx_kthread+0x10/0x10 <3>[ 12.762043] ret_from_fork+0x41/0x80 <3>[ 12.762267] ? __pfx_kthread+0x10/0x10 <3>[ 12.762442] ret_from_fork_asm+0x1a/0x30 <3>[ 12.762697] <3>[ 12.762813] <3>[ 12.762968] Allocated by task 197: <4>[ 12.763205] kasan_save_stack+0x3d/0x60 <4>[ 12.763379] kasan_save_track+0x18/0x40 <4>[ 12.763613] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.763816] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.764079] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.764287] ksize_uaf+0xab/0x6c0 <4>[ 12.764517] kunit_try_run_case+0x1b3/0x490 <4>[ 12.764770] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.765011] kthread+0x257/0x310 <4>[ 12.765247] ret_from_fork+0x41/0x80 <4>[ 12.765422] ret_from_fork_asm+0x1a/0x30 <3>[ 12.765658] <3>[ 12.765779] Freed by task 197: <4>[ 12.765929] kasan_save_stack+0x3d/0x60 <4>[ 12.766189] kasan_save_track+0x18/0x40 <4>[ 12.766363] kasan_save_free_info+0x3f/0x60 <4>[ 12.766605] __kasan_slab_free+0x5e/0x80 <4>[ 12.766786] kfree+0x21a/0x330 <4>[ 12.767020] ksize_uaf+0x12d/0x6c0 <4>[ 12.767173] kunit_try_run_case+0x1b3/0x490 <4>[ 12.767396] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.767609] kthread+0x257/0x310 <4>[ 12.767860] ret_from_fork+0x41/0x80 <4>[ 12.768025] ret_from_fork_asm+0x1a/0x30 <3>[ 12.768241] <3>[ 12.768340] The buggy address belongs to the object at ffff8881028b7300 <3>[ 12.768340] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.768818] The buggy address is located 0 bytes inside of <3>[ 12.768818] freed 128-byte region [ffff8881028b7300, ffff8881028b7380) <3>[ 12.769349] <3>[ 12.769502] The buggy address belongs to the physical page: <4>[ 12.769791] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 <4>[ 12.770113] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.770319] page_type: 0xfdffffff(slab) <4>[ 12.770580] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.770938] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.771227] page dumped because: kasan: bad access detected <3>[ 12.771427] <3>[ 12.771556] Memory state around the buggy address: <3>[ 12.771828] ffff8881028b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.772199] ffff8881028b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.772471] >ffff8881028b7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.772845] ^ <3>[ 12.773059] ffff8881028b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.773330] ffff8881028b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.773691] ================================================================== <3>[ 12.774339] ================================================================== <3>[ 12.774678] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0 <3>[ 12.775062] Read of size 1 at addr ffff8881028b7300 by task kunit_try_catch/197 <3>[ 12.775355] <3>[ 12.775528] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.776043] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.776222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.776680] Call Trace: <3>[ 12.776803] <3>[ 12.776937] dump_stack_lvl+0x73/0xb0 <3>[ 12.777213] print_report+0xd1/0x640 <3>[ 12.777380] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.777652] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.777893] kasan_report+0x102/0x140 <3>[ 12.778072] ? ksize_uaf+0x600/0x6c0 <3>[ 12.778294] ? ksize_uaf+0x600/0x6c0 <3>[ 12.778459] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.778722] ksize_uaf+0x600/0x6c0 <3>[ 12.778934] ? __pfx_ksize_uaf+0x10/0x10 <3>[ 12.779117] ? __schedule+0xbca/0x2590 <3>[ 12.779366] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.779535] ? ktime_get_ts64+0x84/0x230 <3>[ 12.779777] kunit_try_run_case+0x1b3/0x490 <3>[ 12.780009] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.780194] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.780492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.780737] ? __kthread_parkme+0x82/0x160 <3>[ 12.780931] ? preempt_count_sub+0x50/0x80 <3>[ 12.781179] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.781372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.781701] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.781957] kthread+0x257/0x310 <3>[ 12.782112] ? __pfx_kthread+0x10/0x10 <3>[ 12.782330] ret_from_fork+0x41/0x80 <3>[ 12.782494] ? __pfx_kthread+0x10/0x10 <3>[ 12.782735] ret_from_fork_asm+0x1a/0x30 <3>[ 12.782968] <3>[ 12.783099] <3>[ 12.783177] Allocated by task 197: <4>[ 12.783401] kasan_save_stack+0x3d/0x60 <4>[ 12.783569] kasan_save_track+0x18/0x40 <4>[ 12.783821] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.784003] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.784264] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.784454] ksize_uaf+0xab/0x6c0 <4>[ 12.784688] kunit_try_run_case+0x1b3/0x490 <4>[ 12.784858] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.785163] kthread+0x257/0x310 <4>[ 12.785318] ret_from_fork+0x41/0x80 <4>[ 12.785516] ret_from_fork_asm+0x1a/0x30 <3>[ 12.785745] <3>[ 12.785885] Freed by task 197: <4>[ 12.786035] kasan_save_stack+0x3d/0x60 <4>[ 12.786237] kasan_save_track+0x18/0x40 <4>[ 12.786444] kasan_save_free_info+0x3f/0x60 <4>[ 12.786706] __kasan_slab_free+0x5e/0x80 <4>[ 12.786921] kfree+0x21a/0x330 <4>[ 12.787157] ksize_uaf+0x12d/0x6c0 <4>[ 12.787318] kunit_try_run_case+0x1b3/0x490 <4>[ 12.787542] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.787872] kthread+0x257/0x310 <4>[ 12.787999] ret_from_fork+0x41/0x80 <4>[ 12.788135] ret_from_fork_asm+0x1a/0x30 <3>[ 12.788288] <3>[ 12.788364] The buggy address belongs to the object at ffff8881028b7300 <3>[ 12.788364] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.788855] The buggy address is located 0 bytes inside of <3>[ 12.788855] freed 128-byte region [ffff8881028b7300, ffff8881028b7380) <3>[ 12.789322] <3>[ 12.789401] The buggy address belongs to the physical page: <4>[ 12.789584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 <4>[ 12.789877] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.790053] page_type: 0xfdffffff(slab) <4>[ 12.790208] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.790440] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.790708] page dumped because: kasan: bad access detected <3>[ 12.790888] <3>[ 12.790988] Memory state around the buggy address: <3>[ 12.791167] ffff8881028b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.791391] ffff8881028b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.791606] >ffff8881028b7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.791867] ^ <3>[ 12.791991] ffff8881028b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.792202] ffff8881028b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.792417] ================================================================== <3>[ 12.792867] ================================================================== <3>[ 12.793124] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0 <3>[ 12.793346] Read of size 1 at addr ffff8881028b7378 by task kunit_try_catch/197 <3>[ 12.793565] <3>[ 12.793675] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.794069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.794243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.794502] Call Trace: <3>[ 12.794605] <3>[ 12.794786] dump_stack_lvl+0x73/0xb0 <3>[ 12.794945] print_report+0xd1/0x640 <3>[ 12.795112] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.795345] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.795590] kasan_report+0x102/0x140 <3>[ 12.795798] ? ksize_uaf+0x5e6/0x6c0 <3>[ 12.796032] ? ksize_uaf+0x5e6/0x6c0 <3>[ 12.796216] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.796508] ksize_uaf+0x5e6/0x6c0 <3>[ 12.796700] ? __pfx_ksize_uaf+0x10/0x10 <3>[ 12.796974] ? __schedule+0xbca/0x2590 <3>[ 12.797160] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.797415] ? ktime_get_ts64+0x84/0x230 <3>[ 12.797611] kunit_try_run_case+0x1b3/0x490 <3>[ 12.797869] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.798109] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.798339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.798670] ? __kthread_parkme+0x82/0x160 <3>[ 12.798858] ? preempt_count_sub+0x50/0x80 <3>[ 12.799149] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.799340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.799695] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.799916] kthread+0x257/0x310 <3>[ 12.800166] ? __pfx_kthread+0x10/0x10 <3>[ 12.800337] ret_from_fork+0x41/0x80 <3>[ 12.800568] ? __pfx_kthread+0x10/0x10 <3>[ 12.800832] ret_from_fork_asm+0x1a/0x30 <3>[ 12.801027] <3>[ 12.801195] <3>[ 12.801343] Allocated by task 197: <4>[ 12.801499] kasan_save_stack+0x3d/0x60 <4>[ 12.801734] kasan_save_track+0x18/0x40 <4>[ 12.801895] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.802145] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.802313] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.802569] ksize_uaf+0xab/0x6c0 <4>[ 12.802832] kunit_try_run_case+0x1b3/0x490 <4>[ 12.803076] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.803255] kthread+0x257/0x310 <4>[ 12.803370] ret_from_fork+0x41/0x80 <4>[ 12.803491] ret_from_fork_asm+0x1a/0x30 <3>[ 12.803627] <3>[ 12.803750] Freed by task 197: <4>[ 12.803859] kasan_save_stack+0x3d/0x60 <4>[ 12.803990] kasan_save_track+0x18/0x40 <4>[ 12.804126] kasan_save_free_info+0x3f/0x60 <4>[ 12.804266] __kasan_slab_free+0x5e/0x80 <4>[ 12.804403] kfree+0x21a/0x330 <4>[ 12.804513] ksize_uaf+0x12d/0x6c0 <4>[ 12.804675] kunit_try_run_case+0x1b3/0x490 <4>[ 12.804840] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.805007] kthread+0x257/0x310 <4>[ 12.805126] ret_from_fork+0x41/0x80 <4>[ 12.805248] ret_from_fork_asm+0x1a/0x30 <3>[ 12.805383] <3>[ 12.805454] The buggy address belongs to the object at ffff8881028b7300 <3>[ 12.805454] which belongs to the cache kmalloc-128 of size 128 <3>[ 12.805876] The buggy address is located 120 bytes inside of <3>[ 12.805876] freed 128-byte region [ffff8881028b7300, ffff8881028b7380) <3>[ 12.806227] <3>[ 12.806304] The buggy address belongs to the physical page: <4>[ 12.806492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 <4>[ 12.806807] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.806982] page_type: 0xfdffffff(slab) <4>[ 12.807125] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 12.807350] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 12.807572] page dumped because: kasan: bad access detected <3>[ 12.807823] <3>[ 12.807945] Memory state around the buggy address: <3>[ 12.808196] ffff8881028b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.808413] ffff8881028b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.808615] >ffff8881028b7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.808870] ^ <3>[ 12.809146] ffff8881028b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.809424] ffff8881028b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.809750] ================================================================== <6>[ 12.811997] ok 30 ksize_uaf <3>[ 12.821757] ================================================================== <3>[ 12.822260] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 <3>[ 12.822557] Read of size 4 at addr ffff8881028b8040 by task swapper/1/0 <3>[ 12.822806] <3>[ 12.822925] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.823254] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.823433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.823745] Call Trace: <3>[ 12.823857] <3>[ 12.823971] dump_stack_lvl+0x73/0xb0 <3>[ 12.824139] print_report+0xd1/0x640 <3>[ 12.824324] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.824538] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.824767] kasan_report+0x102/0x140 <3>[ 12.824941] ? rcu_uaf_reclaim+0x50/0x60 <3>[ 12.825112] ? rcu_uaf_reclaim+0x50/0x60 <3>[ 12.825289] __asan_report_load4_noabort+0x18/0x20 <3>[ 12.825483] rcu_uaf_reclaim+0x50/0x60 <3>[ 12.825646] rcu_core+0x683/0x1c80 <3>[ 12.825798] ? __pfx_rcu_core+0x10/0x10 <3>[ 12.825960] ? lapic_next_event+0x19/0x30 <3>[ 12.826138] ? handle_softirqs+0x18e/0x720 <3>[ 12.826305] rcu_core_si+0x12/0x20 <3>[ 12.826447] handle_softirqs+0x20c/0x720 <3>[ 12.826618] ? __pfx_handle_softirqs+0x10/0x10 <3>[ 12.826799] irq_exit_rcu+0x9c/0xd0 <3>[ 12.826946] sysvec_apic_timer_interrupt+0x7e/0x90 <3>[ 12.827152] <3>[ 12.827269] <3>[ 12.827406] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <3>[ 12.827673] RIP: 0010:default_idle+0xf/0x20 <3>[ 12.827885] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <3>[ 12.828523] RSP: 0000:ffff888100867de0 EFLAGS: 00000206 <3>[ 12.828728] RAX: ffff888154b00000 RBX: ffff88810083bf00 RCX: ffffffff8c0688b5 <3>[ 12.828945] RDX: ffffed102a966ae5 RSI: 0000000000000004 RDI: 0000000000014ba4 <3>[ 12.829161] RBP: ffff888100867de8 R08: 0000000000000001 R09: ffffed102a966ae4 <3>[ 12.829389] R10: ffff888154b35723 R11: 0000000000000bdc R12: 0000000000000001 <3>[ 12.829602] R13: ffffed10201077e0 R14: ffffffff8df33488 R15: 0000000000000000 <3>[ 12.829834] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <3>[ 12.830020] ? arch_cpu_idle+0xd/0x20 <3>[ 12.830162] default_idle_call+0x48/0x80 <3>[ 12.830311] do_idle+0x313/0x3c0 <3>[ 12.830448] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.830624] ? __pfx_do_idle+0x10/0x10 <3>[ 12.830768] ? _raw_spin_unlock_irqrestore+0x49/0x90 <3>[ 12.830959] ? complete+0x15b/0x1d0 <3>[ 12.831140] cpu_startup_entry+0x5c/0x70 <3>[ 12.831326] start_secondary+0x214/0x290 <3>[ 12.831502] ? __pfx_start_secondary+0x10/0x10 <3>[ 12.831714] common_startup_64+0x12c/0x138 <3>[ 12.831920] <3>[ 12.832042] <3>[ 12.832146] Allocated by task 199: <4>[ 12.832273] kasan_save_stack+0x3d/0x60 <4>[ 12.832428] kasan_save_track+0x18/0x40 <4>[ 12.832563] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.832724] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.832861] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.833026] rcu_uaf+0xb1/0x330 <4>[ 12.833150] kunit_try_run_case+0x1b3/0x490 <4>[ 12.833305] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.833489] kthread+0x257/0x310 <4>[ 12.833616] ret_from_fork+0x41/0x80 <4>[ 12.833754] ret_from_fork_asm+0x1a/0x30 <3>[ 12.833900] <3>[ 12.833982] Freed by task 0: <4>[ 12.834093] kasan_save_stack+0x3d/0x60 <4>[ 12.834232] kasan_save_track+0x18/0x40 <4>[ 12.834373] kasan_save_free_info+0x3f/0x60 <4>[ 12.834532] __kasan_slab_free+0x5e/0x80 <4>[ 12.834674] kfree+0x21a/0x330 <4>[ 12.834798] rcu_uaf_reclaim+0x1f/0x60 <4>[ 12.834951] rcu_core+0x683/0x1c80 <4>[ 12.835077] rcu_core_si+0x12/0x20 <4>[ 12.835215] handle_softirqs+0x20c/0x720 <4>[ 12.835367] irq_exit_rcu+0x9c/0xd0 <4>[ 12.835503] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 12.835678] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <3>[ 12.835852] <3>[ 12.835951] Last potentially related work creation: <4>[ 12.836140] kasan_save_stack+0x3d/0x60 <4>[ 12.836307] __kasan_record_aux_stack+0xae/0xc0 <4>[ 12.836504] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 12.836723] __call_rcu_common.constprop.0+0x72/0xaa0 <4>[ 12.836965] call_rcu+0x12/0x20 <4>[ 12.837130] rcu_uaf+0x169/0x330 <4>[ 12.837280] kunit_try_run_case+0x1b3/0x490 <4>[ 12.837428] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.837634] kthread+0x257/0x310 <4>[ 12.837797] ret_from_fork+0x41/0x80 <4>[ 12.837971] ret_from_fork_asm+0x1a/0x30 <3>[ 12.838192] <3>[ 12.838305] The buggy address belongs to the object at ffff8881028b8040 <3>[ 12.838305] which belongs to the cache kmalloc-32 of size 32 <3>[ 12.838685] The buggy address is located 0 bytes inside of <3>[ 12.838685] freed 32-byte region [ffff8881028b8040, ffff8881028b8060) <3>[ 12.839063] <3>[ 12.839145] The buggy address belongs to the physical page: <4>[ 12.839323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b8 <4>[ 12.839567] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.839739] page_type: 0xfdffffff(slab) <4>[ 12.839883] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 12.840132] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 12.840371] page dumped because: kasan: bad access detected <3>[ 12.840546] <3>[ 12.840621] Memory state around the buggy address: <3>[ 12.840789] ffff8881028b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.841016] ffff8881028b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.841246] >ffff8881028b8000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 12.841459] ^ <3>[ 12.841634] ffff8881028b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.841855] ffff8881028b8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.842074] ================================================================== <6>[ 12.845349] ok 31 rcu_uaf <3>[ 12.848112] ================================================================== <3>[ 12.848553] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560 <3>[ 12.848851] Read of size 8 at addr ffff88810292e6c0 by task kunit_try_catch/201 <3>[ 12.849097] <3>[ 12.849185] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.849503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.849698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.849992] Call Trace: <3>[ 12.850091] <3>[ 12.850195] dump_stack_lvl+0x73/0xb0 <3>[ 12.850368] print_report+0xd1/0x640 <3>[ 12.850513] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.850761] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.850999] kasan_report+0x102/0x140 <3>[ 12.851158] ? workqueue_uaf+0x4d8/0x560 <3>[ 12.851322] ? workqueue_uaf+0x4d8/0x560 <3>[ 12.851490] __asan_report_load8_noabort+0x18/0x20 <3>[ 12.851701] workqueue_uaf+0x4d8/0x560 <3>[ 12.851847] ? __pfx_workqueue_uaf+0x10/0x10 <3>[ 12.852012] ? __schedule+0xbca/0x2590 <3>[ 12.852171] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.852328] ? ktime_get_ts64+0x84/0x230 <3>[ 12.852486] kunit_try_run_case+0x1b3/0x490 <3>[ 12.852666] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.852876] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.853056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.853245] ? __kthread_parkme+0x82/0x160 <3>[ 12.853410] ? preempt_count_sub+0x50/0x80 <3>[ 12.853581] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.853831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.854044] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.854235] kthread+0x257/0x310 <3>[ 12.854379] ? __pfx_kthread+0x10/0x10 <3>[ 12.854542] ret_from_fork+0x41/0x80 <3>[ 12.854712] ? __pfx_kthread+0x10/0x10 <3>[ 12.854858] ret_from_fork_asm+0x1a/0x30 <3>[ 12.855021] <3>[ 12.855118] <3>[ 12.855197] Allocated by task 201: <4>[ 12.855329] kasan_save_stack+0x3d/0x60 <4>[ 12.855482] kasan_save_track+0x18/0x40 <4>[ 12.855623] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.855790] __kasan_kmalloc+0xb7/0xc0 <4>[ 12.855929] __kmalloc_cache_noprof+0x162/0x350 <4>[ 12.856094] workqueue_uaf+0x153/0x560 <4>[ 12.856231] kunit_try_run_case+0x1b3/0x490 <4>[ 12.856379] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.856557] kthread+0x257/0x310 <4>[ 12.856707] ret_from_fork+0x41/0x80 <4>[ 12.856846] ret_from_fork_asm+0x1a/0x30 <3>[ 12.856993] <3>[ 12.857075] Freed by task 8: <4>[ 12.857185] kasan_save_stack+0x3d/0x60 <4>[ 12.857327] kasan_save_track+0x18/0x40 <4>[ 12.857472] kasan_save_free_info+0x3f/0x60 <4>[ 12.857628] __kasan_slab_free+0x5e/0x80 <4>[ 12.857838] kfree+0x21a/0x330 <4>[ 12.857961] workqueue_uaf_work+0x12/0x20 <4>[ 12.858098] process_one_work+0x5ee/0xf60 <4>[ 12.858235] worker_thread+0x720/0x12d0 <4>[ 12.858365] kthread+0x257/0x310 <4>[ 12.858484] ret_from_fork+0x41/0x80 <4>[ 12.858612] ret_from_fork_asm+0x1a/0x30 <3>[ 12.858794] <3>[ 12.858868] Last potentially related work creation: <4>[ 12.859032] kasan_save_stack+0x3d/0x60 <4>[ 12.859166] __kasan_record_aux_stack+0xae/0xc0 <4>[ 12.859313] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 12.859471] __queue_work+0x67e/0xf70 <4>[ 12.859601] queue_work_on+0x74/0xa0 <4>[ 12.859786] workqueue_uaf+0x26e/0x560 <4>[ 12.859920] kunit_try_run_case+0x1b3/0x490 <4>[ 12.860063] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.860223] kthread+0x257/0x310 <4>[ 12.860345] ret_from_fork+0x41/0x80 <4>[ 12.860467] ret_from_fork_asm+0x1a/0x30 <3>[ 12.860602] <3>[ 12.860731] The buggy address belongs to the object at ffff88810292e6c0 <3>[ 12.860731] which belongs to the cache kmalloc-32 of size 32 <3>[ 12.861072] The buggy address is located 0 bytes inside of <3>[ 12.861072] freed 32-byte region [ffff88810292e6c0, ffff88810292e6e0) <3>[ 12.861398] <3>[ 12.861469] The buggy address belongs to the physical page: <4>[ 12.861640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10292e <4>[ 12.861907] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.862063] page_type: 0xfdffffff(slab) <4>[ 12.862203] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 12.862420] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 12.862649] page dumped because: kasan: bad access detected <3>[ 12.862863] <3>[ 12.862950] Memory state around the buggy address: <3>[ 12.863101] ffff88810292e580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 12.863309] ffff88810292e600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 12.863513] >ffff88810292e680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 12.863801] ^ <3>[ 12.863967] ffff88810292e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.864173] ffff88810292e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.864372] ================================================================== <6>[ 12.866372] ok 32 workqueue_uaf <6>[ 12.868418] ok 33 kfree_via_page <6>[ 12.870512] ok 34 kfree_via_phys <3>[ 12.872517] ================================================================== <3>[ 12.872969] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3b2/0x4e0 <3>[ 12.873193] Read of size 1 at addr ffff888102ac10c8 by task kunit_try_catch/208 <3>[ 12.873403] <3>[ 12.873488] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.873873] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.874037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.874291] Call Trace: <3>[ 12.874396] <3>[ 12.874490] dump_stack_lvl+0x73/0xb0 <3>[ 12.874636] print_report+0xd1/0x640 <3>[ 12.874828] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.875015] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.875199] kasan_report+0x102/0x140 <3>[ 12.875337] ? kmem_cache_oob+0x3b2/0x4e0 <3>[ 12.875484] ? kmem_cache_oob+0x3b2/0x4e0 <3>[ 12.875633] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.875843] kmem_cache_oob+0x3b2/0x4e0 <3>[ 12.875985] ? __pfx_kmem_cache_oob+0x10/0x10 <3>[ 12.876136] ? __schedule+0xbca/0x2590 <3>[ 12.876276] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.876416] ? ktime_get_ts64+0x84/0x230 <3>[ 12.876562] kunit_try_run_case+0x1b3/0x490 <3>[ 12.876781] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.876944] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.877102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.877259] ? __kthread_parkme+0x82/0x160 <3>[ 12.877407] ? preempt_count_sub+0x50/0x80 <3>[ 12.877559] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.877809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.878025] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.878214] kthread+0x257/0x310 <3>[ 12.878346] ? __pfx_kthread+0x10/0x10 <3>[ 12.878484] ret_from_fork+0x41/0x80 <3>[ 12.878627] ? __pfx_kthread+0x10/0x10 <3>[ 12.878808] ret_from_fork_asm+0x1a/0x30 <3>[ 12.878979] <3>[ 12.879071] <3>[ 12.879144] Allocated by task 208: <4>[ 12.879268] kasan_save_stack+0x3d/0x60 <4>[ 12.879412] kasan_save_track+0x18/0x40 <4>[ 12.879551] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.879770] __kasan_slab_alloc+0x91/0xa0 <4>[ 12.879917] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 12.880079] kmem_cache_oob+0x121/0x4e0 <4>[ 12.880221] kunit_try_run_case+0x1b3/0x490 <4>[ 12.880370] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.880538] kthread+0x257/0x310 <4>[ 12.880699] ret_from_fork+0x41/0x80 <4>[ 12.880862] ret_from_fork_asm+0x1a/0x30 <3>[ 12.881003] <3>[ 12.881073] The buggy address belongs to the object at ffff888102ac1000 <3>[ 12.881073] which belongs to the cache test_cache of size 200 <3>[ 12.881434] The buggy address is located 0 bytes to the right of <3>[ 12.881434] allocated 200-byte region [ffff888102ac1000, ffff888102ac10c8) <3>[ 12.881868] <3>[ 12.881946] The buggy address belongs to the physical page: <4>[ 12.882119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac1 <4>[ 12.882361] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.882529] page_type: 0xfdffffff(slab) <4>[ 12.882728] raw: 0200000000000000 ffff8881029a7000 dead000000000122 0000000000000000 <4>[ 12.883025] raw: 0000000000000000 00000000800f000f 00000001fdffffff 0000000000000000 <4>[ 12.883247] page dumped because: kasan: bad access detected <3>[ 12.883416] <3>[ 12.883483] Memory state around the buggy address: <3>[ 12.883678] ffff888102ac0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.883899] ffff888102ac1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.884110] >ffff888102ac1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc <3>[ 12.884322] ^ <3>[ 12.884496] ffff888102ac1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.884769] ffff888102ac1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.884981] ================================================================== <6>[ 12.890536] ok 35 kmem_cache_oob <3>[ 12.892433] ================================================================== <3>[ 12.892963] BUG: KASAN: double-free in kmem_cache_double_free+0x1b1/0x430 <3>[ 12.893349] Free of addr ffff8881028ba000 by task kunit_try_catch/210 <3>[ 12.893610] <3>[ 12.893757] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.894061] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.894231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.894559] Call Trace: <3>[ 12.894755] <3>[ 12.894947] dump_stack_lvl+0x73/0xb0 <3>[ 12.895152] print_report+0xd1/0x640 <3>[ 12.895290] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.895442] ? kmem_cache_double_free+0x1b1/0x430 <3>[ 12.895596] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.895896] ? kmem_cache_double_free+0x1b1/0x430 <3>[ 12.896061] kasan_report_invalid_free+0xc0/0xf0 <3>[ 12.896222] ? kmem_cache_double_free+0x1b1/0x430 <3>[ 12.896384] ? kmem_cache_double_free+0x1b1/0x430 <3>[ 12.896542] check_slab_allocation+0x115/0x140 <3>[ 12.896758] ? kmem_cache_double_free+0x1b1/0x430 <3>[ 12.896919] __kasan_slab_pre_free+0x28/0x40 <3>[ 12.897065] kmem_cache_free+0xf0/0x340 <3>[ 12.897204] kmem_cache_double_free+0x1b1/0x430 <3>[ 12.897361] ? __pfx_kmem_cache_double_free+0x10/0x10 <3>[ 12.897525] ? __schedule+0xbca/0x2590 <3>[ 12.897686] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.897856] ? ktime_get_ts64+0x84/0x230 <3>[ 12.898000] kunit_try_run_case+0x1b3/0x490 <3>[ 12.898147] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.898306] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.898459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.898615] ? __kthread_parkme+0x82/0x160 <3>[ 12.898817] ? preempt_count_sub+0x50/0x80 <3>[ 12.898983] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.899136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.899323] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.899489] kthread+0x257/0x310 <3>[ 12.899610] ? __pfx_kthread+0x10/0x10 <3>[ 12.899858] ret_from_fork+0x41/0x80 <3>[ 12.900001] ? __pfx_kthread+0x10/0x10 <3>[ 12.900127] ret_from_fork_asm+0x1a/0x30 <3>[ 12.900274] <3>[ 12.900367] <3>[ 12.900437] Allocated by task 210: <4>[ 12.900556] kasan_save_stack+0x3d/0x60 <4>[ 12.900787] kasan_save_track+0x18/0x40 <4>[ 12.900928] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.901076] __kasan_slab_alloc+0x91/0xa0 <4>[ 12.901219] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 12.901368] kmem_cache_double_free+0x11b/0x430 <4>[ 12.901510] kunit_try_run_case+0x1b3/0x490 <4>[ 12.901667] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.901896] kthread+0x257/0x310 <4>[ 12.902017] ret_from_fork+0x41/0x80 <4>[ 12.902142] ret_from_fork_asm+0x1a/0x30 <3>[ 12.902271] <3>[ 12.902345] Freed by task 210: <4>[ 12.902455] kasan_save_stack+0x3d/0x60 <4>[ 12.902588] kasan_save_track+0x18/0x40 <4>[ 12.902822] kasan_save_free_info+0x3f/0x60 <4>[ 12.902987] __kasan_slab_free+0x5e/0x80 <4>[ 12.903120] kmem_cache_free+0x23a/0x340 <4>[ 12.903254] kmem_cache_double_free+0x136/0x430 <4>[ 12.903399] kunit_try_run_case+0x1b3/0x490 <4>[ 12.903537] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.903820] kthread+0x257/0x310 <4>[ 12.903990] ret_from_fork+0x41/0x80 <4>[ 12.904126] ret_from_fork_asm+0x1a/0x30 <3>[ 12.904265] <3>[ 12.904338] The buggy address belongs to the object at ffff8881028ba000 <3>[ 12.904338] which belongs to the cache test_cache of size 200 <3>[ 12.904762] The buggy address is located 0 bytes inside of <3>[ 12.904762] 200-byte region [ffff8881028ba000, ffff8881028ba0c8) <3>[ 12.905090] <3>[ 12.905166] The buggy address belongs to the physical page: <4>[ 12.905333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba <4>[ 12.905566] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.905822] page_type: 0xfdffffff(slab) <4>[ 12.905973] raw: 0200000000000000 ffff888100fb5280 dead000000000122 0000000000000000 <4>[ 12.906199] raw: 0000000000000000 00000000800f000f 00000001fdffffff 0000000000000000 <4>[ 12.906414] page dumped because: kasan: bad access detected <3>[ 12.906589] <3>[ 12.906705] Memory state around the buggy address: <3>[ 12.906909] ffff8881028b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.907121] ffff8881028b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.907331] >ffff8881028ba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.907536] ^ <3>[ 12.907687] ffff8881028ba080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc <3>[ 12.907996] ffff8881028ba100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.908208] ================================================================== <6>[ 12.913019] ok 36 kmem_cache_double_free <3>[ 12.914887] ================================================================== <3>[ 12.915274] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.915493] Free of addr ffff888102ac4001 by task kunit_try_catch/212 <3>[ 12.915759] <3>[ 12.915852] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.916155] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.916310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.916564] Call Trace: <3>[ 12.916706] <3>[ 12.916806] dump_stack_lvl+0x73/0xb0 <3>[ 12.916951] print_report+0xd1/0x640 <3>[ 12.917084] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.917242] ? kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.917402] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 12.917584] ? kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.917822] kasan_report_invalid_free+0xc0/0xf0 <3>[ 12.917992] ? kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.918165] ? kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.918325] check_slab_allocation+0x133/0x140 <3>[ 12.918482] ? kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.918690] __kasan_slab_pre_free+0x28/0x40 <3>[ 12.918857] kmem_cache_free+0xf0/0x340 <3>[ 12.919019] kmem_cache_invalid_free+0x1a7/0x420 <3>[ 12.919194] ? __pfx_kmem_cache_invalid_free+0x10/0x10 <3>[ 12.919372] ? __schedule+0xbca/0x2590 <3>[ 12.919515] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.919730] ? ktime_get_ts64+0x84/0x230 <3>[ 12.919985] kunit_try_run_case+0x1b3/0x490 <3>[ 12.920145] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.920307] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.920466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.920679] ? __kthread_parkme+0x82/0x160 <3>[ 12.920838] ? preempt_count_sub+0x50/0x80 <3>[ 12.920991] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.921152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.921353] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.921552] kthread+0x257/0x310 <3>[ 12.921739] ? __pfx_kthread+0x10/0x10 <3>[ 12.921883] ret_from_fork+0x41/0x80 <3>[ 12.922014] ? __pfx_kthread+0x10/0x10 <3>[ 12.922151] ret_from_fork_asm+0x1a/0x30 <3>[ 12.922301] <3>[ 12.922391] <3>[ 12.922462] Allocated by task 212: <4>[ 12.922586] kasan_save_stack+0x3d/0x60 <4>[ 12.922726] kasan_save_track+0x18/0x40 <4>[ 12.922860] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.923019] __kasan_slab_alloc+0x91/0xa0 <4>[ 12.923201] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 12.923351] kmem_cache_invalid_free+0x122/0x420 <4>[ 12.923506] kunit_try_run_case+0x1b3/0x490 <4>[ 12.923693] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.923871] kthread+0x257/0x310 <4>[ 12.923991] ret_from_fork+0x41/0x80 <4>[ 12.924122] ret_from_fork_asm+0x1a/0x30 <3>[ 12.924258] <3>[ 12.924331] The buggy address belongs to the object at ffff888102ac4000 <3>[ 12.924331] which belongs to the cache test_cache of size 200 <3>[ 12.924755] The buggy address is located 1 bytes inside of <3>[ 12.924755] 200-byte region [ffff888102ac4000, ffff888102ac40c8) <3>[ 12.925179] <3>[ 12.925253] The buggy address belongs to the physical page: <4>[ 12.925425] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 <4>[ 12.925695] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.925882] page_type: 0xfdffffff(slab) <4>[ 12.926025] raw: 0200000000000000 ffff8881029a7140 dead000000000122 0000000000000000 <4>[ 12.926248] raw: 0000000000000000 00000000800f000f 00000001fdffffff 0000000000000000 <4>[ 12.926459] page dumped because: kasan: bad access detected <3>[ 12.926618] <3>[ 12.926752] Memory state around the buggy address: <3>[ 12.926918] ffff888102ac3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.927136] ffff888102ac3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.927350] >ffff888102ac4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 12.927556] ^ <3>[ 12.927732] ffff888102ac4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc <3>[ 12.927971] ffff888102ac4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.928183] ================================================================== <6>[ 12.941410] ok 37 kmem_cache_invalid_free <3>[ 12.951076] ================================================================== <3>[ 12.951916] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x392/0x4c0 <3>[ 12.952255] Read of size 1 at addr ffff8881028bd000 by task kunit_try_catch/214 <3>[ 12.952543] <3>[ 12.952741] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.953175] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.953354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.953791] Call Trace: <3>[ 12.953986] <3>[ 12.954116] dump_stack_lvl+0x73/0xb0 <3>[ 12.954339] print_report+0xd1/0x640 <3>[ 12.954512] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.954771] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.955092] kasan_report+0x102/0x140 <3>[ 12.955290] ? kmem_cache_rcu_uaf+0x392/0x4c0 <3>[ 12.955572] ? kmem_cache_rcu_uaf+0x392/0x4c0 <3>[ 12.955918] __asan_report_load1_noabort+0x18/0x20 <3>[ 12.956228] kmem_cache_rcu_uaf+0x392/0x4c0 <3>[ 12.956462] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 <3>[ 12.956775] ? __schedule+0xbca/0x2590 <3>[ 12.956986] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.957272] ? ktime_get_ts64+0x84/0x230 <3>[ 12.957488] kunit_try_run_case+0x1b3/0x490 <3>[ 12.957789] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.958096] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.958348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.958585] ? __kthread_parkme+0x82/0x160 <3>[ 12.958828] ? preempt_count_sub+0x50/0x80 <3>[ 12.959121] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.959313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.959661] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.959879] kthread+0x257/0x310 <3>[ 12.960125] ? __pfx_kthread+0x10/0x10 <3>[ 12.960298] ret_from_fork+0x41/0x80 <3>[ 12.960535] ? __pfx_kthread+0x10/0x10 <3>[ 12.960768] ret_from_fork_asm+0x1a/0x30 <3>[ 12.961059] <3>[ 12.961175] <3>[ 12.961248] Allocated by task 214: <4>[ 12.961465] kasan_save_stack+0x3d/0x60 <4>[ 12.961694] kasan_save_track+0x18/0x40 <4>[ 12.961958] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.962140] __kasan_slab_alloc+0x91/0xa0 <4>[ 12.962385] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 12.962612] kmem_cache_rcu_uaf+0x122/0x4c0 <4>[ 12.962920] kunit_try_run_case+0x1b3/0x490 <4>[ 12.963090] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.963372] kthread+0x257/0x310 <4>[ 12.963534] ret_from_fork+0x41/0x80 <4>[ 12.963750] ret_from_fork_asm+0x1a/0x30 <3>[ 12.963926] <3>[ 12.964075] Freed by task 0: <4>[ 12.964243] kasan_save_stack+0x3d/0x60 <4>[ 12.964457] kasan_save_track+0x18/0x40 <4>[ 12.964639] kasan_save_free_info+0x3f/0x60 <4>[ 12.964933] __kasan_slab_free+0x5e/0x80 <4>[ 12.965109] slab_free_after_rcu_debug+0x10d/0x270 <4>[ 12.965380] rcu_core+0x683/0x1c80 <4>[ 12.965538] rcu_core_si+0x12/0x20 <4>[ 12.965787] handle_softirqs+0x20c/0x720 <4>[ 12.965973] irq_exit_rcu+0x9c/0xd0 <4>[ 12.966198] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 12.966402] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <3>[ 12.966703] <3>[ 12.966791] Last potentially related work creation: <4>[ 12.967055] kasan_save_stack+0x3d/0x60 <4>[ 12.967237] __kasan_record_aux_stack+0xae/0xc0 <4>[ 12.967508] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 12.967870] kmem_cache_free+0x12b/0x340 <4>[ 12.968049] kmem_cache_rcu_uaf+0x161/0x4c0 <4>[ 12.968327] kunit_try_run_case+0x1b3/0x490 <4>[ 12.968500] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.968787] kthread+0x257/0x310 <4>[ 12.968981] ret_from_fork+0x41/0x80 <4>[ 12.969253] ret_from_fork_asm+0x1a/0x30 <3>[ 12.969444] <3>[ 12.969575] The buggy address belongs to the object at ffff8881028bd000 <3>[ 12.969575] which belongs to the cache test_cache of size 200 <3>[ 12.970124] The buggy address is located 0 bytes inside of <3>[ 12.970124] freed 200-byte region [ffff8881028bd000, ffff8881028bd0c8) <3>[ 12.970588] <3>[ 12.970748] The buggy address belongs to the physical page: <4>[ 12.971071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bd <4>[ 12.971396] flags: 0x200000000000000(node=0|zone=2) <4>[ 12.971607] page_type: 0xfdffffff(slab) <4>[ 12.971899] raw: 0200000000000000 ffff888100fb53c0 dead000000000122 0000000000000000 <4>[ 12.972252] raw: 0000000000000000 00000000800f000f 00000001fdffffff 0000000000000000 <4>[ 12.972571] page dumped because: kasan: bad access detected <3>[ 12.972882] <3>[ 12.973014] Memory state around the buggy address: <3>[ 12.973226] ffff8881028bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.973618] ffff8881028bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.974001] >ffff8881028bd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 12.974291] ^ <3>[ 12.974529] ffff8881028bd080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc <3>[ 12.974889] ffff8881028bd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 12.975221] ================================================================== <6>[ 12.980389] ok 38 kmem_cache_rcu_uaf <3>[ 12.983833] ================================================================== <3>[ 12.984388] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x187/0x330 <3>[ 12.984802] Read of size 1 at addr ffff8881029a7280 by task kunit_try_catch/216 <3>[ 12.985121] <3>[ 12.985231] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 12.985657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 12.985893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 12.986214] Call Trace: <3>[ 12.986335] <3>[ 12.986466] dump_stack_lvl+0x73/0xb0 <3>[ 12.986669] print_report+0xd1/0x640 <3>[ 12.986877] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 12.987093] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 12.987323] kasan_report+0x102/0x140 <3>[ 12.987484] ? kmem_cache_double_destroy+0x187/0x330 <3>[ 12.987755] ? kmem_cache_double_destroy+0x187/0x330 <3>[ 12.988268] ? kmem_cache_double_destroy+0x187/0x330 <3>[ 12.988488] __kasan_check_byte+0x3d/0x50 <3>[ 12.988728] kmem_cache_destroy+0x25/0x1b0 <3>[ 12.988892] kmem_cache_double_destroy+0x187/0x330 <3>[ 12.989115] ? __pfx_kmem_cache_double_destroy+0x10/0x10 <3>[ 12.989317] ? __schedule+0xbca/0x2590 <3>[ 12.989468] ? __pfx_read_tsc+0x10/0x10 <3>[ 12.989627] ? ktime_get_ts64+0x84/0x230 <3>[ 12.989823] kunit_try_run_case+0x1b3/0x490 <3>[ 12.989990] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.990178] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 12.990375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 12.990574] ? __kthread_parkme+0x82/0x160 <3>[ 12.990835] ? preempt_count_sub+0x50/0x80 <3>[ 12.991036] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 12.991253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 12.991500] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 12.991810] kthread+0x257/0x310 <3>[ 12.992016] ? __pfx_kthread+0x10/0x10 <3>[ 12.992167] ret_from_fork+0x41/0x80 <3>[ 12.992310] ? __pfx_kthread+0x10/0x10 <3>[ 12.992460] ret_from_fork_asm+0x1a/0x30 <3>[ 12.992642] <3>[ 12.992786] <3>[ 12.992876] Allocated by task 216: <4>[ 12.993057] kasan_save_stack+0x3d/0x60 <4>[ 12.993258] kasan_save_track+0x18/0x40 <4>[ 12.993458] kasan_save_alloc_info+0x3b/0x50 <4>[ 12.993697] __kasan_slab_alloc+0x91/0xa0 <4>[ 12.993860] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 12.994017] kmem_cache_create_usercopy+0x138/0x220 <4>[ 12.994201] kmem_cache_create+0x1a/0x20 <4>[ 12.994355] kmem_cache_double_destroy+0x9d/0x330 <4>[ 12.994526] kunit_try_run_case+0x1b3/0x490 <4>[ 12.994772] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.994982] kthread+0x257/0x310 <4>[ 12.995141] ret_from_fork+0x41/0x80 <4>[ 12.995324] ret_from_fork_asm+0x1a/0x30 <3>[ 12.995549] <3>[ 12.995710] Freed by task 216: <4>[ 12.995911] kasan_save_stack+0x3d/0x60 <4>[ 12.996102] kasan_save_track+0x18/0x40 <4>[ 12.996246] kasan_save_free_info+0x3f/0x60 <4>[ 12.996389] __kasan_slab_free+0x5e/0x80 <4>[ 12.996527] kmem_cache_free+0x23a/0x340 <4>[ 12.996744] slab_kmem_cache_release+0x2e/0x40 <4>[ 12.997006] kmem_cache_release+0x16/0x20 <4>[ 12.997204] kobject_put+0x181/0x450 <4>[ 12.997459] sysfs_slab_release+0x16/0x20 <4>[ 12.997668] kmem_cache_destroy+0xe5/0x1b0 <4>[ 12.997850] kmem_cache_double_destroy+0x116/0x330 <4>[ 12.998011] kunit_try_run_case+0x1b3/0x490 <4>[ 12.998161] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 12.998330] kthread+0x257/0x310 <4>[ 12.998454] ret_from_fork+0x41/0x80 <4>[ 12.998606] ret_from_fork_asm+0x1a/0x30 <3>[ 12.998829] <3>[ 12.998924] The buggy address belongs to the object at ffff8881029a7280 <3>[ 12.998924] which belongs to the cache kmem_cache of size 208 <3>[ 12.999283] The buggy address is located 0 bytes inside of <3>[ 12.999283] freed 208-byte region [ffff8881029a7280, ffff8881029a7350) <3>[ 12.999693] <3>[ 12.999851] The buggy address belongs to the physical page: <4>[ 13.000077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a7 <4>[ 13.000320] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.000488] page_type: 0xfdffffff(slab) <4>[ 13.000656] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000 <4>[ 13.000923] raw: 0000000000000000 00000000800c000c 00000001fdffffff 0000000000000000 <4>[ 13.001146] page dumped because: kasan: bad access detected <3>[ 13.001330] <3>[ 13.001407] Memory state around the buggy address: <3>[ 13.001560] ffff8881029a7180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.001864] ffff8881029a7200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.002077] >ffff8881029a7280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.002358] ^ <3>[ 13.002587] ffff8881029a7300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc <3>[ 13.002973] ffff8881029a7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.003249] ================================================================== <6>[ 13.005132] ok 39 kmem_cache_double_destroy <6>[ 13.533589] ok 40 kmem_cache_accounted <6>[ 13.539387] ok 41 kmem_cache_bulk <3>[ 13.542604] ================================================================== <3>[ 13.543330] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 <3>[ 13.543893] Read of size 1 at addr ffff8881029a4c73 by task kunit_try_catch/222 <3>[ 13.544369] <3>[ 13.544540] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.545331] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.545659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.546218] Call Trace: <3>[ 13.546417] <3>[ 13.546609] dump_stack_lvl+0x73/0xb0 <3>[ 13.546950] print_report+0xd1/0x640 <3>[ 13.547229] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.547597] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 13.548033] kasan_report+0x102/0x140 <3>[ 13.548312] ? mempool_oob_right_helper+0x31a/0x380 <3>[ 13.548715] ? mempool_oob_right_helper+0x31a/0x380 <3>[ 13.549057] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.549387] mempool_oob_right_helper+0x31a/0x380 <3>[ 13.549732] ? __pfx_mempool_oob_right_helper+0x10/0x10 <3>[ 13.550094] ? update_load_avg+0x1c3/0x2110 <3>[ 13.550412] mempool_kmalloc_oob_right+0xb6/0x100 <3>[ 13.550798] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 <3>[ 13.551160] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.551501] ? __switch_to+0x5d9/0xf60 <3>[ 13.551839] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.552166] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.552470] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.552831] ? ktime_get_ts64+0x84/0x230 <3>[ 13.553121] kunit_try_run_case+0x1b3/0x490 <3>[ 13.553428] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.553794] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.554117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.554454] ? __kthread_parkme+0x82/0x160 <3>[ 13.554815] ? preempt_count_sub+0x50/0x80 <3>[ 13.555111] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.555437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.555867] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.556241] kthread+0x257/0x310 <3>[ 13.556495] ? __pfx_kthread+0x10/0x10 <3>[ 13.556827] ret_from_fork+0x41/0x80 <3>[ 13.557105] ? __pfx_kthread+0x10/0x10 <3>[ 13.557385] ret_from_fork_asm+0x1a/0x30 <3>[ 13.557692] <3>[ 13.557891] <3>[ 13.558036] Allocated by task 222: <4>[ 13.558283] kasan_save_stack+0x3d/0x60 <4>[ 13.558572] kasan_save_track+0x18/0x40 <4>[ 13.558889] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.559198] __kasan_mempool_unpoison_object+0x1ae/0x200 <4>[ 13.559554] remove_element+0x11e/0x190 <4>[ 13.559907] mempool_alloc_preallocated+0x4d/0x90 <4>[ 13.560247] mempool_oob_right_helper+0x8b/0x380 <4>[ 13.560561] mempool_kmalloc_oob_right+0xb6/0x100 <4>[ 13.560930] kunit_try_run_case+0x1b3/0x490 <4>[ 13.561228] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.561578] kthread+0x257/0x310 <4>[ 13.561848] ret_from_fork+0x41/0x80 <4>[ 13.562112] ret_from_fork_asm+0x1a/0x30 <3>[ 13.562382] <3>[ 13.562529] The buggy address belongs to the object at ffff8881029a4c00 <3>[ 13.562529] which belongs to the cache kmalloc-128 of size 128 <3>[ 13.563336] The buggy address is located 0 bytes to the right of <3>[ 13.563336] allocated 115-byte region [ffff8881029a4c00, ffff8881029a4c73) <3>[ 13.564156] <3>[ 13.564304] The buggy address belongs to the physical page: <4>[ 13.564708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 <4>[ 13.565195] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.565521] page_type: 0xfdffffff(slab) <4>[ 13.565894] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 13.566359] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 13.566873] page dumped because: kasan: bad access detected <3>[ 13.567248] <3>[ 13.567390] Memory state around the buggy address: <3>[ 13.567728] ffff8881029a4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.568167] ffff8881029a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.568599] >ffff8881029a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 13.569081] ^ <3>[ 13.569496] ffff8881029a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.569980] ffff8881029a4d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 13.570407] ================================================================== <6>[ 13.572265] kunit_try_catch (222) used greatest stack depth: 27992 bytes left <6>[ 13.573435] ok 42 mempool_kmalloc_oob_right <3>[ 13.574975] ================================================================== <3>[ 13.575550] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 <3>[ 13.576052] Read of size 1 at addr ffff888102992001 by task kunit_try_catch/224 <3>[ 13.576419] <3>[ 13.576574] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.577223] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.577507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.578064] Call Trace: <3>[ 13.578229] <3>[ 13.578377] dump_stack_lvl+0x73/0xb0 <3>[ 13.578606] print_report+0xd1/0x640 <3>[ 13.578928] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.579214] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.579509] kasan_report+0x102/0x140 <3>[ 13.579825] ? mempool_oob_right_helper+0x31a/0x380 <3>[ 13.580122] ? mempool_oob_right_helper+0x31a/0x380 <3>[ 13.580409] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.580719] mempool_oob_right_helper+0x31a/0x380 <3>[ 13.581019] ? __pfx_mempool_oob_right_helper+0x10/0x10 <3>[ 13.581320] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 <3>[ 13.581616] mempool_kmalloc_large_oob_right+0xb6/0x100 <3>[ 13.581979] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 <3>[ 13.582310] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.582609] ? __switch_to+0x5d9/0xf60 <3>[ 13.582883] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.583152] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.583422] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.583674] ? ktime_get_ts64+0x84/0x230 <3>[ 13.584008] kunit_try_run_case+0x1b3/0x490 <3>[ 13.584273] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.584545] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.584925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.585219] ? __kthread_parkme+0x82/0x160 <3>[ 13.585476] ? preempt_count_sub+0x50/0x80 <3>[ 13.585753] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.586054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.586365] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.586651] kthread+0x257/0x310 <3>[ 13.586880] ? __pfx_kthread+0x10/0x10 <3>[ 13.587112] ret_from_fork+0x41/0x80 <3>[ 13.587315] ? __pfx_kthread+0x10/0x10 <3>[ 13.587529] ret_from_fork_asm+0x1a/0x30 <3>[ 13.587910] <3>[ 13.588084] <3>[ 13.588225] The buggy address belongs to the physical page: <4>[ 13.588524] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102990 <4>[ 13.589040] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 13.589422] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 13.589750] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.590140] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.590519] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.591055] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.591433] head: 0200000000000002 ffffea00040a6401 ffffffffffffffff 0000000000000000 <4>[ 13.591870] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.592234] page dumped because: kasan: bad access detected <3>[ 13.592511] <3>[ 13.592646] Memory state around the buggy address: <3>[ 13.592967] ffff888102991f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.593317] ffff888102991f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.593671] >ffff888102992000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 13.594066] ^ <3>[ 13.594278] ffff888102992080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 13.594640] ffff888102992100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 13.595042] ================================================================== <6>[ 13.597392] ok 43 mempool_kmalloc_large_oob_right <3>[ 13.600847] ================================================================== <3>[ 13.602120] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 <3>[ 13.602967] Read of size 1 at addr ffff888102aca2bb by task kunit_try_catch/226 <3>[ 13.603740] <3>[ 13.603985] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.605170] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.605718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.606606] Call Trace: <3>[ 13.606983] <3>[ 13.607376] dump_stack_lvl+0x73/0xb0 <3>[ 13.607855] print_report+0xd1/0x640 <3>[ 13.608419] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.608904] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 13.609623] kasan_report+0x102/0x140 <3>[ 13.610107] ? mempool_oob_right_helper+0x31a/0x380 <3>[ 13.610699] ? mempool_oob_right_helper+0x31a/0x380 <3>[ 13.611301] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.611837] mempool_oob_right_helper+0x31a/0x380 <3>[ 13.612494] ? __pfx_mempool_oob_right_helper+0x10/0x10 <3>[ 13.613200] mempool_slab_oob_right+0xb1/0x100 <3>[ 13.613760] ? __pfx_mempool_slab_oob_right+0x10/0x10 <3>[ 13.614347] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.615007] ? __switch_to+0x5d9/0xf60 <3>[ 13.615476] ? __pfx_mempool_alloc_slab+0x10/0x10 <3>[ 13.616148] ? __pfx_mempool_free_slab+0x10/0x10 <3>[ 13.616679] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.617180] ? ktime_get_ts64+0x84/0x230 <3>[ 13.617709] kunit_try_run_case+0x1b3/0x490 <3>[ 13.618245] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.618785] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.619432] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.620133] ? __kthread_parkme+0x82/0x160 <3>[ 13.620653] ? preempt_count_sub+0x50/0x80 <3>[ 13.621211] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.621762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.622430] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.623117] kthread+0x257/0x310 <3>[ 13.623540] ? __pfx_kthread+0x10/0x10 <3>[ 13.624054] ret_from_fork+0x41/0x80 <3>[ 13.624489] ? __pfx_kthread+0x10/0x10 <3>[ 13.625012] ret_from_fork_asm+0x1a/0x30 <3>[ 13.625536] <3>[ 13.625975] <3>[ 13.626290] Allocated by task 226: <4>[ 13.626667] kasan_save_stack+0x3d/0x60 <4>[ 13.627225] kasan_save_track+0x18/0x40 <4>[ 13.627667] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.628150] __kasan_mempool_unpoison_object+0x1c0/0x200 <4>[ 13.628789] remove_element+0x11e/0x190 <4>[ 13.629228] mempool_alloc_preallocated+0x4d/0x90 <4>[ 13.629581] mempool_oob_right_helper+0x8b/0x380 <4>[ 13.629890] mempool_slab_oob_right+0xb1/0x100 <4>[ 13.630137] kunit_try_run_case+0x1b3/0x490 <4>[ 13.630369] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.630647] kthread+0x257/0x310 <4>[ 13.630862] ret_from_fork+0x41/0x80 <4>[ 13.631083] ret_from_fork_asm+0x1a/0x30 <3>[ 13.631304] <3>[ 13.631420] The buggy address belongs to the object at ffff888102aca240 <3>[ 13.631420] which belongs to the cache test_cache of size 123 <3>[ 13.632109] The buggy address is located 0 bytes to the right of <3>[ 13.632109] allocated 123-byte region [ffff888102aca240, ffff888102aca2bb) <3>[ 13.632751] <3>[ 13.632869] The buggy address belongs to the physical page: <4>[ 13.633156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aca <4>[ 13.633536] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.633868] page_type: 0xfdffffff(slab) <4>[ 13.634095] raw: 0200000000000000 ffff8881029a7640 dead000000000122 0000000000000000 <4>[ 13.634462] raw: 0000000000000000 0000000080150015 00000001fdffffff 0000000000000000 <4>[ 13.634908] page dumped because: kasan: bad access detected <3>[ 13.635198] <3>[ 13.635312] Memory state around the buggy address: <3>[ 13.635556] ffff888102aca180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.635995] ffff888102aca200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 <3>[ 13.636353] >ffff888102aca280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc <3>[ 13.636725] ^ <3>[ 13.637005] ffff888102aca300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.637365] ffff888102aca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.637747] ================================================================== <6>[ 13.643541] ok 44 mempool_slab_oob_right <3>[ 13.645357] ================================================================== <3>[ 13.646046] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400 <3>[ 13.646429] Read of size 1 at addr ffff888102acb100 by task kunit_try_catch/228 <3>[ 13.646788] <3>[ 13.646934] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.647448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.647708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.648127] Call Trace: <3>[ 13.648284] <3>[ 13.648433] dump_stack_lvl+0x73/0xb0 <3>[ 13.648663] print_report+0xd1/0x640 <3>[ 13.648880] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.649124] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 13.649413] kasan_report+0x102/0x140 <3>[ 13.649636] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.649882] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.650135] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.650395] mempool_uaf_helper+0x394/0x400 <3>[ 13.650634] ? __pfx_mempool_uaf_helper+0x10/0x10 <3>[ 13.650909] mempool_kmalloc_uaf+0xb3/0x100 <3>[ 13.651145] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 <3>[ 13.651405] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.651681] ? __switch_to+0x5d9/0xf60 <3>[ 13.651902] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.652145] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.652382] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.652602] ? ktime_get_ts64+0x84/0x230 <3>[ 13.652868] kunit_try_run_case+0x1b3/0x490 <3>[ 13.653119] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.653377] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.653633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.653897] ? __kthread_parkme+0x82/0x160 <3>[ 13.654144] ? preempt_count_sub+0x50/0x80 <3>[ 13.654390] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.654642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.654988] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.655251] kthread+0x257/0x310 <3>[ 13.655374] ? __pfx_kthread+0x10/0x10 <3>[ 13.655507] ret_from_fork+0x41/0x80 <3>[ 13.655635] ? __pfx_kthread+0x10/0x10 <3>[ 13.655774] ret_from_fork_asm+0x1a/0x30 <3>[ 13.655923] <3>[ 13.656013] <3>[ 13.656088] Allocated by task 228: <4>[ 13.656205] kasan_save_stack+0x3d/0x60 <4>[ 13.656338] kasan_save_track+0x18/0x40 <4>[ 13.656465] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.656608] __kasan_mempool_unpoison_object+0x1ae/0x200 <4>[ 13.656776] remove_element+0x11e/0x190 <4>[ 13.656908] mempool_alloc_preallocated+0x4d/0x90 <4>[ 13.657066] mempool_uaf_helper+0x97/0x400 <4>[ 13.657205] mempool_kmalloc_uaf+0xb3/0x100 <4>[ 13.657354] kunit_try_run_case+0x1b3/0x490 <4>[ 13.657489] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.657669] kthread+0x257/0x310 <4>[ 13.657786] ret_from_fork+0x41/0x80 <4>[ 13.657911] ret_from_fork_asm+0x1a/0x30 <3>[ 13.658041] <3>[ 13.658111] Freed by task 228: <4>[ 13.658224] kasan_save_stack+0x3d/0x60 <4>[ 13.658351] kasan_save_track+0x18/0x40 <4>[ 13.658486] kasan_save_free_info+0x3f/0x60 <4>[ 13.658620] __kasan_mempool_poison_object+0xe0/0x1f0 <4>[ 13.658793] mempool_free+0x2ec/0x380 <4>[ 13.658926] mempool_uaf_helper+0x11b/0x400 <4>[ 13.659066] mempool_kmalloc_uaf+0xb3/0x100 <4>[ 13.659205] kunit_try_run_case+0x1b3/0x490 <4>[ 13.659346] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.659517] kthread+0x257/0x310 <4>[ 13.659634] ret_from_fork+0x41/0x80 <4>[ 13.659757] ret_from_fork_asm+0x1a/0x30 <3>[ 13.659883] <3>[ 13.659950] The buggy address belongs to the object at ffff888102acb100 <3>[ 13.659950] which belongs to the cache kmalloc-128 of size 128 <3>[ 13.660280] The buggy address is located 0 bytes inside of <3>[ 13.660280] freed 128-byte region [ffff888102acb100, ffff888102acb180) <3>[ 13.660602] <3>[ 13.660670] The buggy address belongs to the physical page: <4>[ 13.660847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acb <4>[ 13.661127] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.661350] page_type: 0xfdffffff(slab) <4>[ 13.661575] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 13.661914] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 13.662212] page dumped because: kasan: bad access detected <3>[ 13.662420] <3>[ 13.662503] Memory state around the buggy address: <3>[ 13.662688] ffff888102acb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.662927] ffff888102acb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.663135] >ffff888102acb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.663337] ^ <3>[ 13.663454] ffff888102acb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.663726] ffff888102acb200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.664062] ================================================================== <6>[ 13.666025] ok 45 mempool_kmalloc_uaf <3>[ 13.667190] ================================================================== <3>[ 13.667818] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400 <3>[ 13.668192] Read of size 1 at addr ffff888102994000 by task kunit_try_catch/230 <3>[ 13.668562] <3>[ 13.668764] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.669275] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.669555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.670031] Call Trace: <3>[ 13.670221] <3>[ 13.670402] dump_stack_lvl+0x73/0xb0 <3>[ 13.670678] print_report+0xd1/0x640 <3>[ 13.670959] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.671240] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.671514] kasan_report+0x102/0x140 <3>[ 13.671788] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.672036] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.672279] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.672531] mempool_uaf_helper+0x394/0x400 <3>[ 13.672812] ? __pfx_mempool_uaf_helper+0x10/0x10 <3>[ 13.673075] mempool_kmalloc_large_uaf+0xb3/0x100 <3>[ 13.673344] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 <3>[ 13.673662] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.673994] ? __switch_to+0x5d9/0xf60 <3>[ 13.674258] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.674520] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.674916] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.675164] ? ktime_get_ts64+0x84/0x230 <3>[ 13.675426] kunit_try_run_case+0x1b3/0x490 <3>[ 13.675717] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.675997] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.676280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.676579] ? __kthread_parkme+0x82/0x160 <3>[ 13.676863] ? preempt_count_sub+0x50/0x80 <3>[ 13.677129] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.677397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.677799] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.678114] kthread+0x257/0x310 <3>[ 13.678342] ? __pfx_kthread+0x10/0x10 <3>[ 13.678586] ret_from_fork+0x41/0x80 <3>[ 13.678844] ? __pfx_kthread+0x10/0x10 <3>[ 13.679075] ret_from_fork_asm+0x1a/0x30 <3>[ 13.679324] <3>[ 13.679510] <3>[ 13.679672] The buggy address belongs to the physical page: <4>[ 13.679993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994 <4>[ 13.680399] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 13.680858] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 13.681177] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.681567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.682000] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.682402] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.682881] head: 0200000000000002 ffffea00040a6501 ffffffffffffffff 0000000000000000 <4>[ 13.683272] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.683659] page dumped because: kasan: bad access detected <3>[ 13.683964] <3>[ 13.684081] Memory state around the buggy address: <3>[ 13.684317] ffff888102993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.684650] ffff888102993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.684997] >ffff888102994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.685334] ^ <3>[ 13.685518] ffff888102994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.685953] ffff888102994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.686282] ================================================================== <6>[ 13.688128] ok 46 mempool_kmalloc_large_uaf <3>[ 13.690820] ================================================================== <3>[ 13.691458] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400 <3>[ 13.691933] Read of size 1 at addr ffff888102acd240 by task kunit_try_catch/232 <3>[ 13.692347] <3>[ 13.692504] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.693133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.693419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.694046] Call Trace: <3>[ 13.694245] <3>[ 13.694428] dump_stack_lvl+0x73/0xb0 <3>[ 13.694706] print_report+0xd1/0x640 <3>[ 13.694984] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.695262] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 13.695577] kasan_report+0x102/0x140 <3>[ 13.695856] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.696127] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.696411] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.696727] mempool_uaf_helper+0x394/0x400 <3>[ 13.697016] ? __pfx_mempool_uaf_helper+0x10/0x10 <3>[ 13.697313] ? dequeue_task_fair+0x714/0xbb0 <3>[ 13.697581] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 <3>[ 13.697977] mempool_slab_uaf+0xae/0x100 <3>[ 13.698256] ? __pfx_mempool_slab_uaf+0x10/0x10 <3>[ 13.698509] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.698841] ? __switch_to+0x5d9/0xf60 <3>[ 13.699130] ? __pfx_mempool_alloc_slab+0x10/0x10 <3>[ 13.699441] ? __pfx_mempool_free_slab+0x10/0x10 <3>[ 13.699753] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.700024] ? ktime_get_ts64+0x84/0x230 <3>[ 13.700292] kunit_try_run_case+0x1b3/0x490 <3>[ 13.700559] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.700914] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.701198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.701415] ? __kthread_parkme+0x82/0x160 <3>[ 13.701576] ? preempt_count_sub+0x50/0x80 <3>[ 13.701757] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.701931] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.702133] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.702330] kthread+0x257/0x310 <3>[ 13.702465] ? __pfx_kthread+0x10/0x10 <3>[ 13.702615] ret_from_fork+0x41/0x80 <3>[ 13.702788] ? __pfx_kthread+0x10/0x10 <3>[ 13.702947] ret_from_fork_asm+0x1a/0x30 <3>[ 13.703126] <3>[ 13.703233] <3>[ 13.703310] Allocated by task 232: <4>[ 13.703461] kasan_save_stack+0x3d/0x60 <4>[ 13.703624] kasan_save_track+0x18/0x40 <4>[ 13.703806] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.703995] __kasan_mempool_unpoison_object+0x1c0/0x200 <4>[ 13.704252] remove_element+0x11e/0x190 <4>[ 13.704456] mempool_alloc_preallocated+0x4d/0x90 <4>[ 13.704698] mempool_uaf_helper+0x97/0x400 <4>[ 13.704839] mempool_slab_uaf+0xae/0x100 <4>[ 13.704977] kunit_try_run_case+0x1b3/0x490 <4>[ 13.705118] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.705294] kthread+0x257/0x310 <4>[ 13.705417] ret_from_fork+0x41/0x80 <4>[ 13.705542] ret_from_fork_asm+0x1a/0x30 <3>[ 13.705712] <3>[ 13.705802] Freed by task 232: <4>[ 13.705908] kasan_save_stack+0x3d/0x60 <4>[ 13.706044] kasan_save_track+0x18/0x40 <4>[ 13.706182] kasan_save_free_info+0x3f/0x60 <4>[ 13.706330] __kasan_mempool_poison_object+0xe0/0x1f0 <4>[ 13.706495] mempool_free+0x2ec/0x380 <4>[ 13.706623] mempool_uaf_helper+0x11b/0x400 <4>[ 13.706802] mempool_slab_uaf+0xae/0x100 <4>[ 13.706965] kunit_try_run_case+0x1b3/0x490 <4>[ 13.707110] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.707281] kthread+0x257/0x310 <4>[ 13.707400] ret_from_fork+0x41/0x80 <4>[ 13.707535] ret_from_fork_asm+0x1a/0x30 <3>[ 13.707695] <3>[ 13.707789] The buggy address belongs to the object at ffff888102acd240 <3>[ 13.707789] which belongs to the cache test_cache of size 123 <3>[ 13.708122] The buggy address is located 0 bytes inside of <3>[ 13.708122] freed 123-byte region [ffff888102acd240, ffff888102acd2bb) <3>[ 13.708441] <3>[ 13.708512] The buggy address belongs to the physical page: <4>[ 13.708798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acd <4>[ 13.709481] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.709683] page_type: 0xfdffffff(slab) <4>[ 13.709954] raw: 0200000000000000 ffff8881029a7780 dead000000000122 0000000000000000 <4>[ 13.710260] raw: 0000000000000000 0000000080150015 00000001fdffffff 0000000000000000 <4>[ 13.710586] page dumped because: kasan: bad access detected <3>[ 13.710885] <3>[ 13.711052] Memory state around the buggy address: <3>[ 13.711325] ffff888102acd100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 13.711591] ffff888102acd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.711925] >ffff888102acd200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb <3>[ 13.712298] ^ <3>[ 13.712500] ffff888102acd280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 13.712871] ffff888102acd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.713232] ================================================================== <6>[ 13.717604] ok 47 mempool_slab_uaf <3>[ 13.719051] ================================================================== <3>[ 13.719644] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400 <3>[ 13.720015] Read of size 1 at addr ffff888102994000 by task kunit_try_catch/234 <3>[ 13.720387] <3>[ 13.720524] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.721226] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.721550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.722176] Call Trace: <3>[ 13.722392] <3>[ 13.722581] dump_stack_lvl+0x73/0xb0 <3>[ 13.722976] print_report+0xd1/0x640 <3>[ 13.723249] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.723547] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.723845] kasan_report+0x102/0x140 <3>[ 13.724070] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.724329] ? mempool_uaf_helper+0x394/0x400 <3>[ 13.724607] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.724958] mempool_uaf_helper+0x394/0x400 <3>[ 13.725287] ? __pfx_mempool_uaf_helper+0x10/0x10 <3>[ 13.725651] ? dequeue_task_fair+0x714/0xbb0 <3>[ 13.725987] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 <3>[ 13.726344] mempool_page_alloc_uaf+0xb1/0x100 <3>[ 13.726668] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 <3>[ 13.727067] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.727399] ? __switch_to+0x5d9/0xf60 <3>[ 13.727740] ? __pfx_mempool_alloc_pages+0x10/0x10 <3>[ 13.728114] ? __pfx_mempool_free_pages+0x10/0x10 <3>[ 13.728454] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.728813] ? ktime_get_ts64+0x84/0x230 <3>[ 13.729124] kunit_try_run_case+0x1b3/0x490 <3>[ 13.729438] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.729841] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.730193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.730556] ? __kthread_parkme+0x82/0x160 <3>[ 13.730945] ? preempt_count_sub+0x50/0x80 <3>[ 13.731265] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.731624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.732028] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.732387] kthread+0x257/0x310 <3>[ 13.732638] ? __pfx_kthread+0x10/0x10 <3>[ 13.732940] ret_from_fork+0x41/0x80 <3>[ 13.733240] ? __pfx_kthread+0x10/0x10 <3>[ 13.733534] ret_from_fork_asm+0x1a/0x30 <3>[ 13.733951] <3>[ 13.734163] <3>[ 13.734315] The buggy address belongs to the physical page: <4>[ 13.734520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994 <4>[ 13.734840] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.735046] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.735324] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.735590] page dumped because: kasan: bad access detected <3>[ 13.735847] <3>[ 13.735938] Memory state around the buggy address: <3>[ 13.736135] ffff888102993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.736384] ffff888102993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.736667] >ffff888102994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.736978] ^ <3>[ 13.737135] ffff888102994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.737384] ffff888102994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.737589] ================================================================== <6>[ 13.739076] ok 48 mempool_page_alloc_uaf <3>[ 13.740394] ================================================================== <3>[ 13.740882] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 <3>[ 13.741245] Free of addr ffff888102acb700 by task kunit_try_catch/236 <3>[ 13.741506] <3>[ 13.741676] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.742206] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.742395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.742818] Call Trace: <3>[ 13.743028] <3>[ 13.743157] dump_stack_lvl+0x73/0xb0 <3>[ 13.743369] print_report+0xd1/0x640 <3>[ 13.743539] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.743805] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.744085] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 13.744333] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.744555] kasan_report_invalid_free+0xc0/0xf0 <3>[ 13.744845] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.745069] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.745378] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.745590] check_slab_allocation+0x115/0x140 <3>[ 13.745824] __kasan_mempool_poison_object+0xa3/0x1f0 <3>[ 13.746130] mempool_free+0x2ec/0x380 <3>[ 13.746303] mempool_double_free_helper+0x185/0x370 <3>[ 13.746586] ? __pfx_mempool_double_free_helper+0x10/0x10 <3>[ 13.746857] ? irqentry_exit+0x2a/0x60 <3>[ 13.747041] ? sysvec_apic_timer_interrupt+0x4d/0x90 <3>[ 13.747326] mempool_kmalloc_double_free+0xb1/0x100 <3>[ 13.747534] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 <3>[ 13.747877] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.748055] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.748313] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 <3>[ 13.748549] kunit_try_run_case+0x1b3/0x490 <3>[ 13.748819] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.749030] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.749309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.749504] ? __kthread_parkme+0x82/0x160 <3>[ 13.749783] ? preempt_count_sub+0x50/0x80 <3>[ 13.750028] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.750217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.750569] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.750886] kthread+0x257/0x310 <3>[ 13.751057] ? __pfx_kthread+0x10/0x10 <3>[ 13.751280] ret_from_fork+0x41/0x80 <3>[ 13.751448] ? __pfx_kthread+0x10/0x10 <3>[ 13.751684] ret_from_fork_asm+0x1a/0x30 <3>[ 13.751932] <3>[ 13.752112] <3>[ 13.752259] Allocated by task 236: <4>[ 13.752416] kasan_save_stack+0x3d/0x60 <4>[ 13.752636] kasan_save_track+0x18/0x40 <4>[ 13.752813] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.753065] __kasan_mempool_unpoison_object+0x1ae/0x200 <4>[ 13.753265] remove_element+0x11e/0x190 <4>[ 13.753513] mempool_alloc_preallocated+0x4d/0x90 <4>[ 13.753759] mempool_double_free_helper+0x8b/0x370 <4>[ 13.754058] mempool_kmalloc_double_free+0xb1/0x100 <4>[ 13.754254] kunit_try_run_case+0x1b3/0x490 <4>[ 13.754519] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.754793] kthread+0x257/0x310 <4>[ 13.754963] ret_from_fork+0x41/0x80 <4>[ 13.755164] ret_from_fork_asm+0x1a/0x30 <3>[ 13.755353] <3>[ 13.755465] Freed by task 236: <4>[ 13.755691] kasan_save_stack+0x3d/0x60 <4>[ 13.755865] kasan_save_track+0x18/0x40 <4>[ 13.756105] kasan_save_free_info+0x3f/0x60 <4>[ 13.756283] __kasan_mempool_poison_object+0xe0/0x1f0 <4>[ 13.756562] mempool_free+0x2ec/0x380 <4>[ 13.756780] mempool_double_free_helper+0x10a/0x370 <4>[ 13.757077] mempool_kmalloc_double_free+0xb1/0x100 <4>[ 13.757262] kunit_try_run_case+0x1b3/0x490 <4>[ 13.757516] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.757792] kthread+0x257/0x310 <4>[ 13.757962] ret_from_fork+0x41/0x80 <4>[ 13.758154] ret_from_fork_asm+0x1a/0x30 <3>[ 13.758418] <3>[ 13.758523] The buggy address belongs to the object at ffff888102acb700 <3>[ 13.758523] which belongs to the cache kmalloc-128 of size 128 <3>[ 13.759074] The buggy address is located 0 bytes inside of <3>[ 13.759074] 128-byte region [ffff888102acb700, ffff888102acb780) <3>[ 13.759630] <3>[ 13.759759] The buggy address belongs to the physical page: <4>[ 13.760026] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acb <4>[ 13.760327] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.760518] page_type: 0xfdffffff(slab) <4>[ 13.760780] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 13.761119] raw: 0000000000000000 0000000080100010 00000001fdffffff 0000000000000000 <4>[ 13.761408] page dumped because: kasan: bad access detected <3>[ 13.761609] <3>[ 13.761769] Memory state around the buggy address: <3>[ 13.762053] ffff888102acb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.762329] ffff888102acb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.762741] >ffff888102acb700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.763035] ^ <3>[ 13.763197] ffff888102acb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.763526] ffff888102acb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.763922] ================================================================== <6>[ 13.765085] kunit_try_catch (236) used greatest stack depth: 27904 bytes left <6>[ 13.766496] ok 49 mempool_kmalloc_double_free <3>[ 13.767597] ================================================================== <3>[ 13.768404] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 <3>[ 13.769077] Free of addr ffff888102994000 by task kunit_try_catch/238 <3>[ 13.769565] <3>[ 13.769761] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.770429] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.770815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.771433] Call Trace: <3>[ 13.771648] <3>[ 13.771869] dump_stack_lvl+0x73/0xb0 <3>[ 13.772171] print_report+0xd1/0x640 <3>[ 13.772475] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.772875] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.773248] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.773510] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.773850] kasan_report_invalid_free+0xc0/0xf0 <3>[ 13.774178] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.774567] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.775017] __kasan_mempool_poison_object+0x1d9/0x1f0 <3>[ 13.775422] mempool_free+0x2ec/0x380 <3>[ 13.775697] mempool_double_free_helper+0x185/0x370 <3>[ 13.776070] ? __pfx_mempool_double_free_helper+0x10/0x10 <3>[ 13.776490] ? dequeue_task_fair+0x714/0xbb0 <3>[ 13.776831] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 <3>[ 13.777160] mempool_kmalloc_large_double_free+0xb1/0x100 <3>[ 13.777536] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 <3>[ 13.778036] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.778406] ? __switch_to+0x5d9/0xf60 <3>[ 13.778728] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.779082] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.779399] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.779627] ? ktime_get_ts64+0x84/0x230 <3>[ 13.779907] kunit_try_run_case+0x1b3/0x490 <3>[ 13.780210] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.780572] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.781016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.781359] ? __kthread_parkme+0x82/0x160 <3>[ 13.781618] ? preempt_count_sub+0x50/0x80 <3>[ 13.781958] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.782267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.782596] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.783013] kthread+0x257/0x310 <3>[ 13.783292] ? __pfx_kthread+0x10/0x10 <3>[ 13.783602] ret_from_fork+0x41/0x80 <3>[ 13.783922] ? __pfx_kthread+0x10/0x10 <3>[ 13.784247] ret_from_fork_asm+0x1a/0x30 <3>[ 13.784583] <3>[ 13.784825] <3>[ 13.785000] The buggy address belongs to the physical page: <4>[ 13.785372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994 <4>[ 13.785904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 13.786359] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 13.786769] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.787311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.787827] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.788320] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.788901] head: 0200000000000002 ffffea00040a6501 ffffffffffffffff 0000000000000000 <4>[ 13.789411] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.789959] page dumped because: kasan: bad access detected <3>[ 13.790338] <3>[ 13.790476] Memory state around the buggy address: <3>[ 13.790867] ffff888102993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.791320] ffff888102993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.791795] >ffff888102994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.792246] ^ <3>[ 13.792518] ffff888102994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.793015] ffff888102994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.793467] ================================================================== <6>[ 13.795445] ok 50 mempool_kmalloc_large_double_free <3>[ 13.796423] ================================================================== <3>[ 13.796955] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 <3>[ 13.797167] Free of addr ffff888102994000 by task kunit_try_catch/240 <3>[ 13.797358] <3>[ 13.797439] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.797779] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.797955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.798239] Call Trace: <3>[ 13.798370] <3>[ 13.798481] dump_stack_lvl+0x73/0xb0 <3>[ 13.798637] print_report+0xd1/0x640 <3>[ 13.798803] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.798969] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.799179] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.799368] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.799598] kasan_report_invalid_free+0xc0/0xf0 <3>[ 13.799865] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.800102] ? mempool_double_free_helper+0x185/0x370 <3>[ 13.800326] __kasan_mempool_poison_pages+0x115/0x130 <3>[ 13.800556] mempool_free+0x290/0x380 <3>[ 13.800784] mempool_double_free_helper+0x185/0x370 <3>[ 13.801026] ? __pfx_mempool_double_free_helper+0x10/0x10 <3>[ 13.801333] ? dequeue_task_fair+0x714/0xbb0 <3>[ 13.801540] mempool_page_alloc_double_free+0xac/0x100 <3>[ 13.801914] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 <3>[ 13.802144] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.802373] ? __switch_to+0x5d9/0xf60 <3>[ 13.802553] ? __pfx_mempool_alloc_pages+0x10/0x10 <3>[ 13.802811] ? __pfx_mempool_free_pages+0x10/0x10 <3>[ 13.803061] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.803257] ? ktime_get_ts64+0x84/0x230 <3>[ 13.803422] kunit_try_run_case+0x1b3/0x490 <3>[ 13.803631] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.803879] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.804090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.804309] ? __kthread_parkme+0x82/0x160 <3>[ 13.804512] ? preempt_count_sub+0x50/0x80 <3>[ 13.804728] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.804962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.805254] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.805469] kthread+0x257/0x310 <3>[ 13.805634] ? __pfx_kthread+0x10/0x10 <3>[ 13.805860] ret_from_fork+0x41/0x80 <3>[ 13.806030] ? __pfx_kthread+0x10/0x10 <3>[ 13.806204] ret_from_fork_asm+0x1a/0x30 <3>[ 13.806374] <3>[ 13.806478] <3>[ 13.806553] The buggy address belongs to the physical page: <4>[ 13.806761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994 <4>[ 13.807024] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.807231] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.807508] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.807858] page dumped because: kasan: bad access detected <3>[ 13.808078] <3>[ 13.808171] Memory state around the buggy address: <3>[ 13.808360] ffff888102993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.808616] ffff888102993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.808967] >ffff888102994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.809238] ^ <3>[ 13.809347] ffff888102994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.809550] ffff888102994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.809861] ================================================================== <6>[ 13.811730] ok 51 mempool_page_alloc_double_free <3>[ 13.812927] ================================================================== <3>[ 13.813671] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.814140] Free of addr ffff888102acbf01 by task kunit_try_catch/242 <3>[ 13.814581] <3>[ 13.814835] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.815452] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.815803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.816298] Call Trace: <3>[ 13.816464] <3>[ 13.816703] dump_stack_lvl+0x73/0xb0 <3>[ 13.817007] print_report+0xd1/0x640 <3>[ 13.817240] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.817576] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.817981] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 13.818336] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.818754] kasan_report_invalid_free+0xc0/0xf0 <3>[ 13.819097] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.819479] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.819912] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.820284] check_slab_allocation+0x133/0x140 <3>[ 13.820593] __kasan_mempool_poison_object+0xa3/0x1f0 <3>[ 13.820962] mempool_free+0x2ec/0x380 <3>[ 13.821249] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.821617] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 <3>[ 13.822029] ? ret_from_fork+0x41/0x80 <3>[ 13.822312] ? kthread+0x257/0x310 <3>[ 13.822586] ? ret_from_fork_asm+0x1a/0x30 <3>[ 13.822930] ? ret_from_fork_asm+0x1a/0x30 <3>[ 13.823238] mempool_kmalloc_invalid_free+0xb1/0x100 <3>[ 13.823571] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 <3>[ 13.824148] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.824485] ? __switch_to+0x5d9/0xf60 <3>[ 13.824838] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.825186] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.825495] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.825830] ? ktime_get_ts64+0x84/0x230 <3>[ 13.826183] kunit_try_run_case+0x1b3/0x490 <3>[ 13.826489] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.826861] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.827205] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.827540] ? __kthread_parkme+0x82/0x160 <3>[ 13.827930] ? preempt_count_sub+0x50/0x80 <3>[ 13.828225] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.828530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.828986] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.829326] kthread+0x257/0x310 <3>[ 13.829597] ? __pfx_kthread+0x10/0x10 <3>[ 13.829942] ret_from_fork+0x41/0x80 <3>[ 13.830186] ? __pfx_kthread+0x10/0x10 <3>[ 13.830458] ret_from_fork_asm+0x1a/0x30 <3>[ 13.830825] <3>[ 13.831043] <3>[ 13.831187] Allocated by task 242: <4>[ 13.831470] kasan_save_stack+0x3d/0x60 <4>[ 13.831807] kasan_save_track+0x18/0x40 <4>[ 13.832097] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.832414] __kasan_mempool_unpoison_object+0x1ae/0x200 <4>[ 13.832912] remove_element+0x11e/0x190 <4>[ 13.833238] mempool_alloc_preallocated+0x4d/0x90 <4>[ 13.833568] mempool_kmalloc_invalid_free_helper+0x84/0x2e0 <4>[ 13.833867] mempool_kmalloc_invalid_free+0xb1/0x100 <4>[ 13.834095] kunit_try_run_case+0x1b3/0x490 <4>[ 13.834310] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.834546] kthread+0x257/0x310 <4>[ 13.834745] ret_from_fork+0x41/0x80 <4>[ 13.834927] ret_from_fork_asm+0x1a/0x30 <3>[ 13.835110] <3>[ 13.835218] The buggy address belongs to the object at ffff888102acbf00 <3>[ 13.835218] which belongs to the cache kmalloc-128 of size 128 <3>[ 13.835575] The buggy address is located 1 bytes inside of <3>[ 13.835575] 128-byte region [ffff888102acbf00, ffff888102acbf80) <3>[ 13.835978] <3>[ 13.836050] The buggy address belongs to the physical page: <4>[ 13.836229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acb <4>[ 13.836479] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.836664] page_type: 0xfdffffff(slab) <4>[ 13.836830] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 <4>[ 13.837067] raw: 0000000000000000 0000000000100010 00000001fdffffff 0000000000000000 <4>[ 13.837301] page dumped because: kasan: bad access detected <3>[ 13.837479] <3>[ 13.837556] Memory state around the buggy address: <3>[ 13.837770] ffff888102acbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.837984] ffff888102acbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.838207] >ffff888102acbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.838459] ^ <3>[ 13.838592] ffff888102acbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.838955] ffff888102acc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 13.839208] ================================================================== <6>[ 13.841102] ok 52 mempool_kmalloc_invalid_free <3>[ 13.841895] ================================================================== <3>[ 13.842330] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.842580] Free of addr ffff888102b74001 by task kunit_try_catch/244 <3>[ 13.842881] <3>[ 13.842989] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.843364] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.843531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.843939] Call Trace: <3>[ 13.844093] <3>[ 13.844231] dump_stack_lvl+0x73/0xb0 <3>[ 13.844435] print_report+0xd1/0x640 <3>[ 13.844626] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.844863] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.845121] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.845314] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.845559] kasan_report_invalid_free+0xc0/0xf0 <3>[ 13.845854] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.846107] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.846378] __kasan_mempool_poison_object+0x154/0x1f0 <3>[ 13.846621] mempool_free+0x2ec/0x380 <3>[ 13.846843] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <3>[ 13.847117] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 <3>[ 13.847365] ? update_load_avg+0x1c3/0x2110 <3>[ 13.847568] mempool_kmalloc_large_invalid_free+0xb1/0x100 <3>[ 13.847869] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 <3>[ 13.848138] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.848354] ? __switch_to+0x5d9/0xf60 <3>[ 13.848524] ? __pfx_mempool_kmalloc+0x10/0x10 <3>[ 13.848730] ? __pfx_mempool_kfree+0x10/0x10 <3>[ 13.848914] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.849060] ? ktime_get_ts64+0x84/0x230 <3>[ 13.849209] kunit_try_run_case+0x1b3/0x490 <3>[ 13.849373] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.849529] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.849766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.849943] ? __kthread_parkme+0x82/0x160 <3>[ 13.850140] ? preempt_count_sub+0x50/0x80 <3>[ 13.850349] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.850557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.850877] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.851068] kthread+0x257/0x310 <3>[ 13.851195] ? __pfx_kthread+0x10/0x10 <3>[ 13.851332] ret_from_fork+0x41/0x80 <3>[ 13.851455] ? __pfx_kthread+0x10/0x10 <3>[ 13.851594] ret_from_fork_asm+0x1a/0x30 <3>[ 13.851798] <3>[ 13.851888] <3>[ 13.851976] The buggy address belongs to the physical page: <4>[ 13.852137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b74 <4>[ 13.852405] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 13.852725] flags: 0x200000000000040(head|node=0|zone=2) <4>[ 13.853006] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.853300] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.853563] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 13.853868] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.854137] head: 0200000000000002 ffffea00040add01 ffffffffffffffff 0000000000000000 <4>[ 13.854428] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.854727] page dumped because: kasan: bad access detected <3>[ 13.854963] <3>[ 13.855046] Memory state around the buggy address: <3>[ 13.855234] ffff888102b73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.855528] ffff888102b73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 13.855875] >ffff888102b74000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.856167] ^ <3>[ 13.856328] ffff888102b74080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.856619] ffff888102b74100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.857002] ================================================================== <4>[ 13.857515] ------------[ cut here ]------------ <4>[ 13.857884] WARNING: CPU: 0 PID: 244 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 13.857945] Modules linked in: <4>[ 13.857986] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 13.858040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 13.858059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 13.858085] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 13.858128] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 13.858166] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 13.858194] RAX: 0000000080000000 RBX: ffff888102b53480 RCX: ffff888154200000 <4>[ 13.858214] RDX: 0000000000060fe0 RSI: ffffffff88ebc501 RDI: ffff888154260fe0 <4>[ 13.858239] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 13.858257] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00040ad400 <4>[ 13.858273] R13: ffff888154260fe0 R14: 0000000000a80501 R15: 0000000000039408 <4>[ 13.858290] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 13.858309] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 13.858325] CR2: ffff888169a01000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 13.858346] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 13.858363] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 13.858383] Call Trace: <4>[ 13.858394] <4>[ 13.858406] ? show_regs+0x68/0x80 <4>[ 13.858436] ? __warn+0xd5/0x260 <4>[ 13.858454] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 13.858476] ? report_bug+0x278/0x2e0 <4>[ 13.858498] ? handle_bug+0x7b/0xa0 <4>[ 13.858517] ? exc_invalid_op+0x1c/0x50 <4>[ 13.858540] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 13.858567] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 13.858589] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 13.858614] rcu_core+0x683/0x1c80 <4>[ 13.858687] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 13.858720] ? __pfx_rcu_core+0x10/0x10 <4>[ 13.858748] rcu_core_si+0x12/0x20 <4>[ 13.858768] handle_softirqs+0x20c/0x720 <4>[ 13.858791] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 13.858813] irq_exit_rcu+0x9c/0xd0 <4>[ 13.858831] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 13.858854] <4>[ 13.858863] <4>[ 13.858873] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 13.858895] RIP: 0010:_raw_spin_unlock_irqrestore+0x3f/0x90 <4>[ 13.858929] Code: 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 39 c6 07 00 f7 c6 00 02 00 00 75 1b 01 00 00 00 e8 07 f5 87 fc 65 8b 05 a8 12 fb 73 85 c0 74 0e c9 <4>[ 13.858962] RSP: 0000:ffff888102b4fbc8 EFLAGS: 00000282 <4>[ 13.858982] RAX: 0000000000000000 RBX: ffff888102b4fd20 RCX: 0000000000000246 <4>[ 13.858999] RDX: 0000000000000000 RSI: ffffffff88d5ecf4 RDI: ffffffff8c08816f <4>[ 13.859015] RBP: ffff888102b4fbd8 R08: 0000000000000001 R09: fffffbfff1ce6a70 <4>[ 13.859031] R10: ffffffff8e735387 R11: 0000000000000001 R12: ffff888102b4fd24 <4>[ 13.859047] R13: ffff888102b74001 R14: ffff888102b4fd28 R15: 0000000000000002 <4>[ 13.859069] ? mempool_free+0x244/0x380 <4>[ 13.859088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 13.859112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 13.859134] mempool_free+0x244/0x380 <4>[ 13.859152] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 <4>[ 13.859177] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 <4>[ 13.859201] ? update_load_avg+0x1c3/0x2110 <4>[ 13.859225] mempool_kmalloc_large_invalid_free+0xb1/0x100 <4>[ 13.859251] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 <4>[ 13.859274] ? finish_task_switch.isra.0+0x153/0x700 <4>[ 13.859295] ? __switch_to+0x5d9/0xf60 <4>[ 13.859314] ? __pfx_mempool_kmalloc+0x10/0x10 <4>[ 13.859331] ? __pfx_mempool_kfree+0x10/0x10 <4>[ 13.859350] ? __pfx_read_tsc+0x10/0x10 <4>[ 13.859368] ? ktime_get_ts64+0x84/0x230 <4>[ 13.859387] kunit_try_run_case+0x1b3/0x490 <4>[ 13.859408] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 13.859429] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 13.859449] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 13.859472] ? __kthread_parkme+0x82/0x160 <4>[ 13.859492] ? preempt_count_sub+0x50/0x80 <4>[ 13.859514] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 13.859533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 13.859557] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.859580] kthread+0x257/0x310 <4>[ 13.859600] ? __pfx_kthread+0x10/0x10 <4>[ 13.859620] ret_from_fork+0x41/0x80 <4>[ 13.859684] ? __pfx_kthread+0x10/0x10 <4>[ 13.859711] ret_from_fork_asm+0x1a/0x30 <4>[ 13.859738] <4>[ 13.859749] ---[ end trace 0000000000000000 ]--- <6>[ 13.877413] ok 53 mempool_kmalloc_large_invalid_free <3>[ 13.878174] ================================================================== <3>[ 13.878795] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0 <3>[ 13.879169] Read of size 1 at addr ffffffff8e7a2a2d by task kunit_try_catch/246 <3>[ 13.879481] <3>[ 13.879626] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.880081] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.880259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.880571] Call Trace: <3>[ 13.880747] <3>[ 13.880884] dump_stack_lvl+0x73/0xb0 <3>[ 13.881038] print_report+0xd1/0x640 <3>[ 13.881192] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.881363] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.881530] kasan_report+0x102/0x140 <3>[ 13.881758] ? kasan_global_oob_right+0x288/0x2d0 <3>[ 13.881961] ? kasan_global_oob_right+0x288/0x2d0 <3>[ 13.882174] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.882387] kasan_global_oob_right+0x288/0x2d0 <3>[ 13.882597] ? __pfx_kasan_global_oob_right+0x10/0x10 <3>[ 13.883029] ? __schedule+0xbca/0x2590 <3>[ 13.883365] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.883685] ? ktime_get_ts64+0x84/0x230 <3>[ 13.883843] kunit_try_run_case+0x1b3/0x490 <3>[ 13.884008] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.884178] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.884343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.884518] ? __kthread_parkme+0x82/0x160 <3>[ 13.884703] ? preempt_count_sub+0x50/0x80 <3>[ 13.884903] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.885082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.885299] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.885495] kthread+0x257/0x310 <3>[ 13.885641] ? __pfx_kthread+0x10/0x10 <3>[ 13.885844] ret_from_fork+0x41/0x80 <3>[ 13.886012] ? __pfx_kthread+0x10/0x10 <3>[ 13.886164] ret_from_fork_asm+0x1a/0x30 <3>[ 13.886334] <3>[ 13.886441] <3>[ 13.886546] The buggy address belongs to the variable: <3>[ 13.886776] global_array+0xd/0x40 <3>[ 13.886952] <3>[ 13.887073] The buggy address belongs to the physical page: <4>[ 13.887274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1697a2 <4>[ 13.887533] flags: 0x200000000002000(reserved|node=0|zone=2) <4>[ 13.887796] raw: 0200000000002000 ffffea0005a5e888 ffffea0005a5e888 0000000000000000 <4>[ 13.888075] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 13.888317] page dumped because: kasan: bad access detected <3>[ 13.888501] <3>[ 13.888586] Memory state around the buggy address: <3>[ 13.888839] ffffffff8e7a2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.889073] ffffffff8e7a2980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.889336] >ffffffff8e7a2a00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 <3>[ 13.889559] ^ <3>[ 13.889804] ffffffff8e7a2a80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 <3>[ 13.890064] ffffffff8e7a2b00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 <3>[ 13.890291] ================================================================== <6>[ 13.891853] ok 54 kasan_global_oob_right <6>[ 13.893418] ok 55 kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y <3>[ 13.894980] ================================================================== <3>[ 13.896467] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2ae/0x300 <3>[ 13.897342] Read of size 1 at addr ffff888102a67d72 by task kunit_try_catch/250 <3>[ 13.897942] <3>[ 13.898148] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.899172] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.899642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.900557] Call Trace: <3>[ 13.900814] <3>[ 13.901049] dump_stack_lvl+0x73/0xb0 <3>[ 13.901565] print_report+0xd1/0x640 <3>[ 13.902018] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.902426] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.902869] kasan_report+0x102/0x140 <3>[ 13.903269] ? kasan_stack_oob+0x2ae/0x300 <3>[ 13.903622] ? kasan_stack_oob+0x2ae/0x300 <3>[ 13.904044] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.904510] kasan_stack_oob+0x2ae/0x300 <3>[ 13.904965] ? __pfx_kasan_stack_oob+0x10/0x10 <3>[ 13.905346] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.905886] ? __switch_to+0x5d9/0xf60 <3>[ 13.906293] ? __schedule+0xbca/0x2590 <3>[ 13.906660] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.907179] ? ktime_get_ts64+0x84/0x230 <3>[ 13.907559] kunit_try_run_case+0x1b3/0x490 <3>[ 13.907998] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.908407] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.908910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.909385] ? __kthread_parkme+0x82/0x160 <3>[ 13.909856] ? preempt_count_sub+0x50/0x80 <3>[ 13.910318] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.910760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.911221] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.911601] kthread+0x257/0x310 <3>[ 13.911903] ? __pfx_kthread+0x10/0x10 <3>[ 13.912197] ret_from_fork+0x41/0x80 <3>[ 13.912472] ? __pfx_kthread+0x10/0x10 <3>[ 13.912809] ret_from_fork_asm+0x1a/0x30 <3>[ 13.913122] <3>[ 13.913309] <3>[ 13.913563] The buggy address belongs to stack of task kunit_try_catch/250 <3>[ 13.914142] and is located at offset 138 in frame: <3>[ 13.914482] kasan_stack_oob+0x0/0x300 <3>[ 13.915055] <3>[ 13.915246] This frame has 4 objects: <3>[ 13.915642] [48, 49) '__assertion' <3>[ 13.915712] [64, 72) 'array' <3>[ 13.915978] [96, 112) '__assertion' <3>[ 13.916227] [128, 138) 'stack_array' <3>[ 13.916509] <3>[ 13.916979] The buggy address belongs to the physical page: <4>[ 13.917336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a67 <4>[ 13.917896] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.918336] raw: 0200000000000000 ffffea00040a99c8 ffffea00040a99c8 0000000000000000 <4>[ 13.918952] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.919468] page dumped because: kasan: bad access detected <3>[ 13.919881] <3>[ 13.920029] Memory state around the buggy address: <3>[ 13.920351] ffff888102a67c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.920856] ffff888102a67c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 <3>[ 13.921293] >ffff888102a67d00: f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3 <3>[ 13.921745] ^ <3>[ 13.922134] ffff888102a67d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 <3>[ 13.922480] ffff888102a67e00: f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 <3>[ 13.922933] ================================================================== <6>[ 13.924983] ok 56 kasan_stack_oob <3>[ 13.926069] ================================================================== <3>[ 13.926478] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x31f/0x380 <3>[ 13.926771] Read of size 1 at addr ffff888102b67c9f by task kunit_try_catch/252 <3>[ 13.927027] <3>[ 13.927108] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.927393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.927541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.927873] Call Trace: <3>[ 13.927971] <3>[ 13.928060] dump_stack_lvl+0x73/0xb0 <3>[ 13.928209] print_report+0xd1/0x640 <3>[ 13.928344] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.928486] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.928649] kasan_report+0x102/0x140 <3>[ 13.928854] ? kasan_alloca_oob_left+0x31f/0x380 <3>[ 13.929038] ? kasan_alloca_oob_left+0x31f/0x380 <3>[ 13.929215] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.929371] kasan_alloca_oob_left+0x31f/0x380 <3>[ 13.929530] ? dequeue_task_fair+0x714/0xbb0 <3>[ 13.929755] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.929950] ? __schedule+0xbca/0x2590 <3>[ 13.930093] ? trace_hardirqs_on+0x37/0xe0 <3>[ 13.930249] ? __pfx_kasan_alloca_oob_left+0x10/0x10 <3>[ 13.930409] ? __schedule+0xbca/0x2590 <3>[ 13.930539] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.930750] ? ktime_get_ts64+0x84/0x230 <3>[ 13.930923] kunit_try_run_case+0x1b3/0x490 <3>[ 13.931079] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.931232] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.931434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.931684] ? __kthread_parkme+0x82/0x160 <3>[ 13.931891] ? preempt_count_sub+0x50/0x80 <3>[ 13.932112] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.932328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.932601] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.932883] kthread+0x257/0x310 <3>[ 13.933061] ? __pfx_kthread+0x10/0x10 <3>[ 13.933245] ret_from_fork+0x41/0x80 <3>[ 13.933428] ? __pfx_kthread+0x10/0x10 <3>[ 13.933607] ret_from_fork_asm+0x1a/0x30 <3>[ 13.933877] <3>[ 13.934045] <3>[ 13.934158] The buggy address belongs to stack of task kunit_try_catch/252 <3>[ 13.934479] <3>[ 13.934576] The buggy address belongs to the physical page: <4>[ 13.934867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b67 <4>[ 13.935124] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.935304] raw: 0200000000000000 ffffea00040ad9c8 ffffea00040ad9c8 0000000000000000 <4>[ 13.935548] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.935840] page dumped because: kasan: bad access detected <3>[ 13.936021] <3>[ 13.936100] Memory state around the buggy address: <3>[ 13.936257] ffff888102b67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.936473] ffff888102b67c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.936691] >ffff888102b67c80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 <3>[ 13.937001] ^ <3>[ 13.937136] ffff888102b67d00: 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 <3>[ 13.937352] ffff888102b67d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 <3>[ 13.937566] ================================================================== <6>[ 13.939020] ok 57 kasan_alloca_oob_left <3>[ 13.940096] ================================================================== <3>[ 13.940737] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x328/0x390 <3>[ 13.941146] Read of size 1 at addr ffff888102a17caa by task kunit_try_catch/254 <3>[ 13.941517] <3>[ 13.941652] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.942163] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.942420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.942893] Call Trace: <3>[ 13.943069] <3>[ 13.943231] dump_stack_lvl+0x73/0xb0 <3>[ 13.943505] print_report+0xd1/0x640 <3>[ 13.943851] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.944134] ? kasan_addr_to_slab+0x11/0xb0 <3>[ 13.944391] kasan_report+0x102/0x140 <3>[ 13.944611] ? kasan_alloca_oob_right+0x328/0x390 <3>[ 13.944975] ? kasan_alloca_oob_right+0x328/0x390 <3>[ 13.945260] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.945531] kasan_alloca_oob_right+0x328/0x390 <3>[ 13.945876] ? irqentry_exit+0x2a/0x60 <3>[ 13.946116] ? insn_get_displacement+0x240/0x860 <3>[ 13.946379] ? trace_hardirqs_on+0x37/0xe0 <3>[ 13.946636] ? __pfx_kasan_alloca_oob_right+0x10/0x10 <3>[ 13.946975] ? __pfx_kasan_alloca_oob_right+0x10/0x10 <3>[ 13.947261] kunit_try_run_case+0x1b3/0x490 <3>[ 13.947511] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.947848] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.948118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.948402] ? __kthread_parkme+0x82/0x160 <3>[ 13.948638] ? preempt_count_sub+0x50/0x80 <3>[ 13.948908] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.949162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.949493] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.949836] kthread+0x257/0x310 <3>[ 13.950051] ? __pfx_kthread+0x10/0x10 <3>[ 13.950276] ret_from_fork+0x41/0x80 <3>[ 13.950501] ? __pfx_kthread+0x10/0x10 <3>[ 13.950741] ret_from_fork_asm+0x1a/0x30 <3>[ 13.951021] <3>[ 13.951176] <3>[ 13.951295] The buggy address belongs to stack of task kunit_try_catch/254 <3>[ 13.951648] <3>[ 13.951765] The buggy address belongs to the physical page: <4>[ 13.952083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a17 <4>[ 13.952566] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.952968] raw: 0200000000000000 ffffea00040a85c8 ffffea00040a85c8 0000000000000000 <4>[ 13.953443] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 13.953947] page dumped because: kasan: bad access detected <3>[ 13.954261] <3>[ 13.954401] Memory state around the buggy address: <3>[ 13.954805] ffff888102a17b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.955262] ffff888102a17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 13.955686] >ffff888102a17c80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 <3>[ 13.956149] ^ <3>[ 13.956477] ffff888102a17d00: 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 <3>[ 13.957055] ffff888102a17d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 <3>[ 13.957538] ================================================================== <6>[ 13.959477] ok 58 kasan_alloca_oob_right <3>[ 13.960419] ================================================================== <3>[ 13.961244] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90 <3>[ 13.961667] Read of size 1 at addr ffff8881028c0558 by task kunit_try_catch/256 <3>[ 13.962080] <3>[ 13.962248] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.962917] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.963196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.963713] Call Trace: <3>[ 13.963913] <3>[ 13.964115] dump_stack_lvl+0x73/0xb0 <3>[ 13.964418] print_report+0xd1/0x640 <3>[ 13.964726] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.965067] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 13.965445] kasan_report+0x102/0x140 <3>[ 13.965816] ? memchr+0x79/0x90 <3>[ 13.966090] ? memchr+0x79/0x90 <3>[ 13.966330] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.966639] memchr+0x79/0x90 <3>[ 13.966915] kasan_memchr+0x163/0x320 <3>[ 13.967162] ? __pfx_kasan_memchr+0x10/0x10 <3>[ 13.967447] ? __schedule+0xbca/0x2590 <3>[ 13.967741] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.968034] ? ktime_get_ts64+0x84/0x230 <3>[ 13.968294] kunit_try_run_case+0x1b3/0x490 <3>[ 13.968597] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.968943] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.969234] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.969561] ? __kthread_parkme+0x82/0x160 <3>[ 13.969853] ? preempt_count_sub+0x50/0x80 <3>[ 13.970125] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.970428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.970804] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.971165] kthread+0x257/0x310 <3>[ 13.971369] ? __pfx_kthread+0x10/0x10 <3>[ 13.971588] ret_from_fork+0x41/0x80 <3>[ 13.971836] ? __pfx_kthread+0x10/0x10 <3>[ 13.971974] ret_from_fork_asm+0x1a/0x30 <3>[ 13.972134] <3>[ 13.972234] <3>[ 13.972325] Allocated by task 256: <4>[ 13.972472] kasan_save_stack+0x3d/0x60 <4>[ 13.972653] kasan_save_track+0x18/0x40 <4>[ 13.972937] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.973124] __kasan_kmalloc+0xb7/0xc0 <4>[ 13.973304] __kmalloc_cache_noprof+0x162/0x350 <4>[ 13.973511] kasan_memchr+0xad/0x320 <4>[ 13.973733] kunit_try_run_case+0x1b3/0x490 <4>[ 13.973938] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.974168] kthread+0x257/0x310 <4>[ 13.974335] ret_from_fork+0x41/0x80 <4>[ 13.974507] ret_from_fork_asm+0x1a/0x30 <3>[ 13.974714] <3>[ 13.974820] The buggy address belongs to the object at ffff8881028c0540 <3>[ 13.974820] which belongs to the cache kmalloc-32 of size 32 <3>[ 13.975261] The buggy address is located 0 bytes to the right of <3>[ 13.975261] allocated 24-byte region [ffff8881028c0540, ffff8881028c0558) <3>[ 13.975780] <3>[ 13.975888] The buggy address belongs to the physical page: <4>[ 13.976111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 13.976422] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.976618] page_type: 0xfdffffff(slab) <4>[ 13.976839] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 13.977132] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 13.977409] page dumped because: kasan: bad access detected <3>[ 13.977612] <3>[ 13.977708] Memory state around the buggy address: <3>[ 13.977879] ffff8881028c0400: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 13.978144] ffff8881028c0480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 13.978407] >ffff8881028c0500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 13.978677] ^ <3>[ 13.978911] ffff8881028c0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.979115] ffff8881028c0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.979338] ================================================================== <6>[ 13.980505] ok 59 kasan_memchr <3>[ 13.981198] ================================================================== <3>[ 13.981526] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 <3>[ 13.981759] Read of size 1 at addr ffff888102acac18 by task kunit_try_catch/258 <3>[ 13.981979] <3>[ 13.982076] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.982383] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.982550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.982887] Call Trace: <3>[ 13.983010] <3>[ 13.983117] dump_stack_lvl+0x73/0xb0 <3>[ 13.983266] print_report+0xd1/0x640 <3>[ 13.983409] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.983570] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 13.983775] kasan_report+0x102/0x140 <3>[ 13.983910] ? memcmp+0x1b4/0x1d0 <3>[ 13.984055] ? memcmp+0x1b4/0x1d0 <3>[ 13.984184] __asan_report_load1_noabort+0x18/0x20 <3>[ 13.984346] memcmp+0x1b4/0x1d0 <3>[ 13.984480] kasan_memcmp+0x190/0x390 <3>[ 13.984620] ? __pfx_kasan_memcmp+0x10/0x10 <3>[ 13.984796] ? finish_task_switch.isra.0+0x153/0x700 <3>[ 13.984969] ? __switch_to+0x5d9/0xf60 <3>[ 13.985115] ? __schedule+0xbca/0x2590 <3>[ 13.985253] ? __pfx_read_tsc+0x10/0x10 <3>[ 13.985395] ? ktime_get_ts64+0x84/0x230 <3>[ 13.985550] kunit_try_run_case+0x1b3/0x490 <3>[ 13.985732] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.985916] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 13.986095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 13.986261] ? __kthread_parkme+0x82/0x160 <3>[ 13.986414] ? preempt_count_sub+0x50/0x80 <3>[ 13.986570] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 13.986789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 13.987001] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 13.987183] kthread+0x257/0x310 <3>[ 13.987314] ? __pfx_kthread+0x10/0x10 <3>[ 13.987451] ret_from_fork+0x41/0x80 <3>[ 13.987575] ? __pfx_kthread+0x10/0x10 <3>[ 13.987769] ret_from_fork_asm+0x1a/0x30 <3>[ 13.987932] <3>[ 13.988034] <3>[ 13.988112] Allocated by task 258: <4>[ 13.988263] kasan_save_stack+0x3d/0x60 <4>[ 13.988439] kasan_save_track+0x18/0x40 <4>[ 13.988571] kasan_save_alloc_info+0x3b/0x50 <4>[ 13.988776] __kasan_kmalloc+0xb7/0xc0 <4>[ 13.988919] __kmalloc_cache_noprof+0x162/0x350 <4>[ 13.989083] kasan_memcmp+0xb8/0x390 <4>[ 13.989221] kunit_try_run_case+0x1b3/0x490 <4>[ 13.989373] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 13.989552] kthread+0x257/0x310 <4>[ 13.989711] ret_from_fork+0x41/0x80 <4>[ 13.989843] ret_from_fork_asm+0x1a/0x30 <3>[ 13.989992] <3>[ 13.990074] The buggy address belongs to the object at ffff888102acac00 <3>[ 13.990074] which belongs to the cache kmalloc-32 of size 32 <3>[ 13.990413] The buggy address is located 0 bytes to the right of <3>[ 13.990413] allocated 24-byte region [ffff888102acac00, ffff888102acac18) <3>[ 13.990809] <3>[ 13.990883] The buggy address belongs to the physical page: <4>[ 13.991078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aca <4>[ 13.991312] flags: 0x200000000000000(node=0|zone=2) <4>[ 13.991481] page_type: 0xfdffffff(slab) <4>[ 13.991618] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 13.991890] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 13.992123] page dumped because: kasan: bad access detected <3>[ 13.992298] <3>[ 13.992368] Memory state around the buggy address: <3>[ 13.992537] ffff888102acab00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 13.992805] ffff888102acab80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 13.993031] >ffff888102acac00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.993253] ^ <3>[ 13.993399] ffff888102acac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.993646] ffff888102acad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 13.993879] ================================================================== <6>[ 13.995243] ok 60 kasan_memcmp <3>[ 13.996165] ================================================================== <3>[ 13.996594] BUG: KASAN: slab-use-after-free in strchr+0x9c/0xc0 <3>[ 13.996898] Read of size 1 at addr ffff8881028c0710 by task kunit_try_catch/260 <3>[ 13.997209] <3>[ 13.997375] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 13.997908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 13.998099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 13.998575] Call Trace: <3>[ 13.998789] <3>[ 13.998996] dump_stack_lvl+0x73/0xb0 <3>[ 13.999164] print_report+0xd1/0x640 <3>[ 13.999412] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 13.999611] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 13.999860] kasan_report+0x102/0x140 <3>[ 14.000126] ? strchr+0x9c/0xc0 <3>[ 14.000289] ? strchr+0x9c/0xc0 <3>[ 14.000498] __asan_report_load1_noabort+0x18/0x20 <3>[ 14.000780] strchr+0x9c/0xc0 <3>[ 14.000912] kasan_strings+0x1b1/0xb60 <3>[ 14.001183] ? __pfx_kasan_strings+0x10/0x10 <3>[ 14.001364] ? __schedule+0xbca/0x2590 <3>[ 14.001625] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.001802] ? ktime_get_ts64+0x84/0x230 <3>[ 14.002051] kunit_try_run_case+0x1b3/0x490 <3>[ 14.002290] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.002522] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.002854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.003126] ? __kthread_parkme+0x82/0x160 <3>[ 14.003335] ? preempt_count_sub+0x50/0x80 <3>[ 14.003635] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.003862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.004154] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.004416] kthread+0x257/0x310 <3>[ 14.004677] ? __pfx_kthread+0x10/0x10 <3>[ 14.004890] ret_from_fork+0x41/0x80 <3>[ 14.005146] ? __pfx_kthread+0x10/0x10 <3>[ 14.005396] ret_from_fork_asm+0x1a/0x30 <3>[ 14.005678] <3>[ 14.005886] <3>[ 14.006046] Allocated by task 260: <4>[ 14.006249] kasan_save_stack+0x3d/0x60 <4>[ 14.006540] kasan_save_track+0x18/0x40 <4>[ 14.006840] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.007084] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.007343] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.007560] kasan_strings+0xb3/0xb60 <4>[ 14.007810] kunit_try_run_case+0x1b3/0x490 <4>[ 14.008059] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.008293] kthread+0x257/0x310 <4>[ 14.008542] ret_from_fork+0x41/0x80 <4>[ 14.008778] ret_from_fork_asm+0x1a/0x30 <3>[ 14.009061] <3>[ 14.009168] Freed by task 260: <4>[ 14.009304] kasan_save_stack+0x3d/0x60 <4>[ 14.009591] kasan_save_track+0x18/0x40 <4>[ 14.009823] kasan_save_free_info+0x3f/0x60 <4>[ 14.010100] __kasan_slab_free+0x5e/0x80 <4>[ 14.010280] kfree+0x21a/0x330 <4>[ 14.010493] kasan_strings+0x13a/0xb60 <4>[ 14.010687] kunit_try_run_case+0x1b3/0x490 <4>[ 14.011018] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.011245] kthread+0x257/0x310 <4>[ 14.011496] ret_from_fork+0x41/0x80 <4>[ 14.011672] ret_from_fork_asm+0x1a/0x30 <3>[ 14.011933] <3>[ 14.012039] The buggy address belongs to the object at ffff8881028c0700 <3>[ 14.012039] which belongs to the cache kmalloc-32 of size 32 <3>[ 14.012599] The buggy address is located 16 bytes inside of <3>[ 14.012599] freed 32-byte region [ffff8881028c0700, ffff8881028c0720) <3>[ 14.013146] <3>[ 14.013255] The buggy address belongs to the physical page: <4>[ 14.013519] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 14.013914] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.014142] page_type: 0xfdffffff(slab) <4>[ 14.014425] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 14.014781] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 14.015120] page dumped because: kasan: bad access detected <3>[ 14.015342] <3>[ 14.015489] Memory state around the buggy address: <3>[ 14.015769] ffff8881028c0600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 14.016094] ffff8881028c0680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 14.016320] >ffff8881028c0700: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.016537] ^ <3>[ 14.016691] ffff8881028c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.016919] ffff8881028c0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.017137] ================================================================== <3>[ 14.017565] ================================================================== <3>[ 14.017910] BUG: KASAN: slab-use-after-free in strrchr+0x64/0x70 <3>[ 14.018106] Read of size 1 at addr ffff8881028c0710 by task kunit_try_catch/260 <3>[ 14.018333] <3>[ 14.018413] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.018758] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.018938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.019210] Call Trace: <3>[ 14.019318] <3>[ 14.019422] dump_stack_lvl+0x73/0xb0 <3>[ 14.019586] print_report+0xd1/0x640 <3>[ 14.019782] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.019952] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 14.020144] kasan_report+0x102/0x140 <3>[ 14.020292] ? strrchr+0x64/0x70 <3>[ 14.020428] ? strrchr+0x64/0x70 <3>[ 14.020565] __asan_report_load1_noabort+0x18/0x20 <3>[ 14.020793] strrchr+0x64/0x70 <3>[ 14.020971] kasan_strings+0x24c/0xb60 <3>[ 14.021114] ? __pfx_kasan_strings+0x10/0x10 <3>[ 14.021272] ? __schedule+0xbca/0x2590 <3>[ 14.021417] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.021560] ? ktime_get_ts64+0x84/0x230 <3>[ 14.021718] kunit_try_run_case+0x1b3/0x490 <3>[ 14.021911] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.022092] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.022263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.022443] ? __kthread_parkme+0x82/0x160 <3>[ 14.022601] ? preempt_count_sub+0x50/0x80 <3>[ 14.022807] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.022987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.023196] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.023385] kthread+0x257/0x310 <3>[ 14.023524] ? __pfx_kthread+0x10/0x10 <3>[ 14.023721] ret_from_fork+0x41/0x80 <3>[ 14.023882] ? __pfx_kthread+0x10/0x10 <3>[ 14.024029] ret_from_fork_asm+0x1a/0x30 <3>[ 14.024184] <3>[ 14.024279] <3>[ 14.024354] Allocated by task 260: <4>[ 14.024484] kasan_save_stack+0x3d/0x60 <4>[ 14.024653] kasan_save_track+0x18/0x40 <4>[ 14.024808] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.024984] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.025134] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.025300] kasan_strings+0xb3/0xb60 <4>[ 14.025444] kunit_try_run_case+0x1b3/0x490 <4>[ 14.025588] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.025833] kthread+0x257/0x310 <4>[ 14.025953] ret_from_fork+0x41/0x80 <4>[ 14.026092] ret_from_fork_asm+0x1a/0x30 <3>[ 14.026240] <3>[ 14.026314] Freed by task 260: <4>[ 14.026431] kasan_save_stack+0x3d/0x60 <4>[ 14.026581] kasan_save_track+0x18/0x40 <4>[ 14.026796] kasan_save_free_info+0x3f/0x60 <4>[ 14.026989] __kasan_slab_free+0x5e/0x80 <4>[ 14.027130] kfree+0x21a/0x330 <4>[ 14.027244] kasan_strings+0x13a/0xb60 <4>[ 14.027380] kunit_try_run_case+0x1b3/0x490 <4>[ 14.027520] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.027743] kthread+0x257/0x310 <4>[ 14.027899] ret_from_fork+0x41/0x80 <4>[ 14.028035] ret_from_fork_asm+0x1a/0x30 <3>[ 14.028180] <3>[ 14.028257] The buggy address belongs to the object at ffff8881028c0700 <3>[ 14.028257] which belongs to the cache kmalloc-32 of size 32 <3>[ 14.028603] The buggy address is located 16 bytes inside of <3>[ 14.028603] freed 32-byte region [ffff8881028c0700, ffff8881028c0720) <3>[ 14.028980] <3>[ 14.029061] The buggy address belongs to the physical page: <4>[ 14.029243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 14.029518] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.029765] page_type: 0xfdffffff(slab) <4>[ 14.030023] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 14.030267] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 14.030497] page dumped because: kasan: bad access detected <3>[ 14.030685] <3>[ 14.030765] Memory state around the buggy address: <3>[ 14.031068] ffff8881028c0600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 14.031307] ffff8881028c0680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 14.031532] >ffff8881028c0700: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.031808] ^ <3>[ 14.031937] ffff8881028c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.032160] ffff8881028c0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.032371] ================================================================== <3>[ 14.032722] ================================================================== <3>[ 14.032962] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0 <3>[ 14.033162] Read of size 1 at addr ffff8881028c0710 by task kunit_try_catch/260 <3>[ 14.033386] <3>[ 14.033466] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.033837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.034015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.034282] Call Trace: <3>[ 14.034387] <3>[ 14.034488] dump_stack_lvl+0x73/0xb0 <3>[ 14.034673] print_report+0xd1/0x640 <3>[ 14.034882] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.035053] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 14.035260] kasan_report+0x102/0x140 <3>[ 14.035415] ? strcmp+0xb0/0xc0 <3>[ 14.035554] ? strcmp+0xb0/0xc0 <3>[ 14.035734] __asan_report_load1_noabort+0x18/0x20 <3>[ 14.035917] strcmp+0xb0/0xc0 <3>[ 14.036043] kasan_strings+0x2e9/0xb60 <3>[ 14.036209] ? __pfx_kasan_strings+0x10/0x10 <3>[ 14.036378] ? __schedule+0xbca/0x2590 <3>[ 14.036536] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.036728] ? ktime_get_ts64+0x84/0x230 <3>[ 14.036915] kunit_try_run_case+0x1b3/0x490 <3>[ 14.037108] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.037303] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.037492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.037762] ? __kthread_parkme+0x82/0x160 <3>[ 14.037960] ? preempt_count_sub+0x50/0x80 <3>[ 14.038129] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.038319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.038552] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.038837] kthread+0x257/0x310 <3>[ 14.039004] ? __pfx_kthread+0x10/0x10 <3>[ 14.039188] ret_from_fork+0x41/0x80 <3>[ 14.039364] ? __pfx_kthread+0x10/0x10 <3>[ 14.039562] ret_from_fork_asm+0x1a/0x30 <3>[ 14.039873] <3>[ 14.039997] <3>[ 14.040141] Allocated by task 260: <4>[ 14.040369] kasan_save_stack+0x3d/0x60 <4>[ 14.040544] kasan_save_track+0x18/0x40 <4>[ 14.040794] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.040992] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.041253] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.041445] kasan_strings+0xb3/0xb60 <4>[ 14.041679] kunit_try_run_case+0x1b3/0x490 <4>[ 14.041896] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.042201] kthread+0x257/0x310 <4>[ 14.042357] ret_from_fork+0x41/0x80 <4>[ 14.042611] ret_from_fork_asm+0x1a/0x30 <3>[ 14.042842] <3>[ 14.042947] Freed by task 260: <4>[ 14.043081] kasan_save_stack+0x3d/0x60 <4>[ 14.043258] kasan_save_track+0x18/0x40 <4>[ 14.043427] kasan_save_free_info+0x3f/0x60 <4>[ 14.043602] __kasan_slab_free+0x5e/0x80 <4>[ 14.043843] kfree+0x21a/0x330 <4>[ 14.043987] kasan_strings+0x13a/0xb60 <4>[ 14.044133] kunit_try_run_case+0x1b3/0x490 <4>[ 14.044279] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.044482] kthread+0x257/0x310 <4>[ 14.044620] ret_from_fork+0x41/0x80 <4>[ 14.044807] ret_from_fork_asm+0x1a/0x30 <3>[ 14.044996] <3>[ 14.045085] The buggy address belongs to the object at ffff8881028c0700 <3>[ 14.045085] which belongs to the cache kmalloc-32 of size 32 <3>[ 14.045514] The buggy address is located 16 bytes inside of <3>[ 14.045514] freed 32-byte region [ffff8881028c0700, ffff8881028c0720) <3>[ 14.046005] <3>[ 14.046094] The buggy address belongs to the physical page: <4>[ 14.046309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 14.046625] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.046866] page_type: 0xfdffffff(slab) <4>[ 14.047050] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 14.047335] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 14.047622] page dumped because: kasan: bad access detected <3>[ 14.047867] <3>[ 14.047958] Memory state around the buggy address: <3>[ 14.048150] ffff8881028c0600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 14.048407] ffff8881028c0680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 14.048680] >ffff8881028c0700: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.048949] ^ <3>[ 14.049121] ffff8881028c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.049402] ffff8881028c0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.049710] ================================================================== <3>[ 14.050226] ================================================================== <3>[ 14.050518] BUG: KASAN: slab-use-after-free in kasan_strings+0xa0f/0xb60 <3>[ 14.050871] Read of size 1 at addr ffff8881028c0710 by task kunit_try_catch/260 <3>[ 14.051125] <3>[ 14.051206] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.051608] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.051866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.052219] Call Trace: <3>[ 14.052361] <3>[ 14.052491] dump_stack_lvl+0x73/0xb0 <3>[ 14.052680] print_report+0xd1/0x640 <3>[ 14.052845] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.053059] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 14.053298] kasan_report+0x102/0x140 <3>[ 14.053467] ? kasan_strings+0xa0f/0xb60 <3>[ 14.053672] ? kasan_strings+0xa0f/0xb60 <3>[ 14.053867] __asan_report_load1_noabort+0x18/0x20 <3>[ 14.054091] kasan_strings+0xa0f/0xb60 <3>[ 14.054288] ? __pfx_kasan_strings+0x10/0x10 <3>[ 14.054498] ? __schedule+0xbca/0x2590 <3>[ 14.054707] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.054895] ? ktime_get_ts64+0x84/0x230 <3>[ 14.055104] kunit_try_run_case+0x1b3/0x490 <3>[ 14.055312] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.055530] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.055803] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.056053] ? __kthread_parkme+0x82/0x160 <3>[ 14.056236] ? preempt_count_sub+0x50/0x80 <3>[ 14.056399] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.056600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.056900] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.057142] kthread+0x257/0x310 <3>[ 14.057335] ? __pfx_kthread+0x10/0x10 <3>[ 14.057530] ret_from_fork+0x41/0x80 <3>[ 14.057773] ? __pfx_kthread+0x10/0x10 <3>[ 14.057945] ret_from_fork_asm+0x1a/0x30 <3>[ 14.058094] <3>[ 14.058184] <3>[ 14.058253] Allocated by task 260: <4>[ 14.058368] kasan_save_stack+0x3d/0x60 <4>[ 14.058509] kasan_save_track+0x18/0x40 <4>[ 14.058693] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.058894] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.059039] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.059200] kasan_strings+0xb3/0xb60 <4>[ 14.059331] kunit_try_run_case+0x1b3/0x490 <4>[ 14.059484] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.059726] kthread+0x257/0x310 <4>[ 14.059857] ret_from_fork+0x41/0x80 <4>[ 14.059991] ret_from_fork_asm+0x1a/0x30 <3>[ 14.060117] <3>[ 14.060187] Freed by task 260: <4>[ 14.060296] kasan_save_stack+0x3d/0x60 <4>[ 14.060430] kasan_save_track+0x18/0x40 <4>[ 14.060561] kasan_save_free_info+0x3f/0x60 <4>[ 14.060793] __kasan_slab_free+0x5e/0x80 <4>[ 14.061113] kfree+0x21a/0x330 <4>[ 14.061237] kasan_strings+0x13a/0xb60 <4>[ 14.061380] kunit_try_run_case+0x1b3/0x490 <4>[ 14.061520] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.061776] kthread+0x257/0x310 <4>[ 14.061909] ret_from_fork+0x41/0x80 <4>[ 14.062042] ret_from_fork_asm+0x1a/0x30 <3>[ 14.062174] <3>[ 14.062244] The buggy address belongs to the object at ffff8881028c0700 <3>[ 14.062244] which belongs to the cache kmalloc-32 of size 32 <3>[ 14.062603] The buggy address is located 16 bytes inside of <3>[ 14.062603] freed 32-byte region [ffff8881028c0700, ffff8881028c0720) <3>[ 14.063093] <3>[ 14.063173] The buggy address belongs to the physical page: <4>[ 14.063337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 14.063569] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.063793] page_type: 0xfdffffff(slab) <4>[ 14.063944] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 14.064235] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 14.064536] page dumped because: kasan: bad access detected <3>[ 14.064867] <3>[ 14.064947] Memory state around the buggy address: <3>[ 14.065099] ffff8881028c0600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 14.065311] ffff8881028c0680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 14.065516] >ffff8881028c0700: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.065795] ^ <3>[ 14.065930] ffff8881028c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.066135] ffff8881028c0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.066361] ================================================================== <3>[ 14.066784] ================================================================== <3>[ 14.067025] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0 <3>[ 14.067214] Read of size 1 at addr ffff8881028c0710 by task kunit_try_catch/260 <3>[ 14.067430] <3>[ 14.067506] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.067881] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.068052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.068322] Call Trace: <3>[ 14.068421] <3>[ 14.068515] dump_stack_lvl+0x73/0xb0 <3>[ 14.068688] print_report+0xd1/0x640 <3>[ 14.068928] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.069101] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 14.069274] kasan_report+0x102/0x140 <3>[ 14.069406] ? strlen+0x8f/0xb0 <3>[ 14.069522] ? strlen+0x8f/0xb0 <3>[ 14.069696] __asan_report_load1_noabort+0x18/0x20 <3>[ 14.069871] strlen+0x8f/0xb0 <3>[ 14.070016] kasan_strings+0x432/0xb60 <3>[ 14.070198] ? __pfx_kasan_strings+0x10/0x10 <3>[ 14.070383] ? __schedule+0xbca/0x2590 <3>[ 14.070561] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.070815] ? ktime_get_ts64+0x84/0x230 <3>[ 14.070978] kunit_try_run_case+0x1b3/0x490 <3>[ 14.071131] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.071298] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.071461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.071636] ? __kthread_parkme+0x82/0x160 <3>[ 14.071856] ? preempt_count_sub+0x50/0x80 <3>[ 14.072004] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.072163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.072362] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.072546] kthread+0x257/0x310 <3>[ 14.072747] ? __pfx_kthread+0x10/0x10 <3>[ 14.072968] ret_from_fork+0x41/0x80 <3>[ 14.073105] ? __pfx_kthread+0x10/0x10 <3>[ 14.073237] ret_from_fork_asm+0x1a/0x30 <3>[ 14.073387] <3>[ 14.073479] <3>[ 14.073547] Allocated by task 260: <4>[ 14.073714] kasan_save_stack+0x3d/0x60 <4>[ 14.073887] kasan_save_track+0x18/0x40 <4>[ 14.074028] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.074177] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.074322] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.074489] kasan_strings+0xb3/0xb60 <4>[ 14.074620] kunit_try_run_case+0x1b3/0x490 <4>[ 14.074847] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.075046] kthread+0x257/0x310 <4>[ 14.075175] ret_from_fork+0x41/0x80 <4>[ 14.075303] ret_from_fork_asm+0x1a/0x30 <3>[ 14.075435] <3>[ 14.075501] Freed by task 260: <4>[ 14.075620] kasan_save_stack+0x3d/0x60 <4>[ 14.075834] kasan_save_track+0x18/0x40 <4>[ 14.075981] kasan_save_free_info+0x3f/0x60 <4>[ 14.076122] __kasan_slab_free+0x5e/0x80 <4>[ 14.076268] kfree+0x21a/0x330 <4>[ 14.076386] kasan_strings+0x13a/0xb60 <4>[ 14.076513] kunit_try_run_case+0x1b3/0x490 <4>[ 14.076723] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.076987] kthread+0x257/0x310 <4>[ 14.077109] ret_from_fork+0x41/0x80 <4>[ 14.077241] ret_from_fork_asm+0x1a/0x30 <3>[ 14.077375] <3>[ 14.077445] The buggy address belongs to the object at ffff8881028c0700 <3>[ 14.077445] which belongs to the cache kmalloc-32 of size 32 <3>[ 14.077935] The buggy address is located 16 bytes inside of <3>[ 14.077935] freed 32-byte region [ffff8881028c0700, ffff8881028c0720) <3>[ 14.078262] <3>[ 14.078361] The buggy address belongs to the physical page: <4>[ 14.078544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 14.078877] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.079046] page_type: 0xfdffffff(slab) <4>[ 14.079187] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 14.079414] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 14.079627] page dumped because: kasan: bad access detected <3>[ 14.079932] <3>[ 14.080007] Memory state around the buggy address: <3>[ 14.080156] ffff8881028c0600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 14.080364] ffff8881028c0680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 14.080588] >ffff8881028c0700: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.080940] ^ <3>[ 14.081073] ffff8881028c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.081294] ffff8881028c0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.081515] ================================================================== <3>[ 14.081914] ================================================================== <3>[ 14.082159] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 <3>[ 14.082386] Read of size 1 at addr ffff8881028c0710 by task kunit_try_catch/260 <3>[ 14.082741] <3>[ 14.082860] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.083204] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.083355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.083603] Call Trace: <3>[ 14.083796] <3>[ 14.083888] dump_stack_lvl+0x73/0xb0 <3>[ 14.084024] print_report+0xd1/0x640 <3>[ 14.084161] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.084316] ? kasan_complete_mode_report_info+0x64/0x200 <3>[ 14.084498] kasan_report+0x102/0x140 <3>[ 14.084630] ? strnlen+0x73/0x80 <3>[ 14.084877] ? strnlen+0x73/0x80 <3>[ 14.085015] __asan_report_load1_noabort+0x18/0x20 <3>[ 14.085181] strnlen+0x73/0x80 <3>[ 14.085304] kasan_strings+0x4cc/0xb60 <3>[ 14.085445] ? __pfx_kasan_strings+0x10/0x10 <3>[ 14.085598] ? __schedule+0xbca/0x2590 <3>[ 14.085796] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.085939] ? ktime_get_ts64+0x84/0x230 <3>[ 14.086078] kunit_try_run_case+0x1b3/0x490 <3>[ 14.086229] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.086383] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.086543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.086837] ? __kthread_parkme+0x82/0x160 <3>[ 14.087020] ? preempt_count_sub+0x50/0x80 <3>[ 14.087176] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.087350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.087538] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.087796] kthread+0x257/0x310 <3>[ 14.087929] ? __pfx_kthread+0x10/0x10 <3>[ 14.088078] ret_from_fork+0x41/0x80 <3>[ 14.088209] ? __pfx_kthread+0x10/0x10 <3>[ 14.088348] ret_from_fork_asm+0x1a/0x30 <3>[ 14.088494] <3>[ 14.088584] <3>[ 14.088701] Allocated by task 260: <4>[ 14.088897] kasan_save_stack+0x3d/0x60 <4>[ 14.089040] kasan_save_track+0x18/0x40 <4>[ 14.089171] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.089319] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.089451] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.089604] kasan_strings+0xb3/0xb60 <4>[ 14.089792] kunit_try_run_case+0x1b3/0x490 <4>[ 14.089936] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.090106] kthread+0x257/0x310 <4>[ 14.090222] ret_from_fork+0x41/0x80 <4>[ 14.090352] ret_from_fork_asm+0x1a/0x30 <3>[ 14.090486] <3>[ 14.090556] Freed by task 260: <4>[ 14.090703] kasan_save_stack+0x3d/0x60 <4>[ 14.090878] kasan_save_track+0x18/0x40 <4>[ 14.091026] kasan_save_free_info+0x3f/0x60 <4>[ 14.091169] __kasan_slab_free+0x5e/0x80 <4>[ 14.091297] kfree+0x21a/0x330 <4>[ 14.091413] kasan_strings+0x13a/0xb60 <4>[ 14.091541] kunit_try_run_case+0x1b3/0x490 <4>[ 14.091722] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.091918] kthread+0x257/0x310 <4>[ 14.092038] ret_from_fork+0x41/0x80 <4>[ 14.092167] ret_from_fork_asm+0x1a/0x30 <3>[ 14.092300] <3>[ 14.092369] The buggy address belongs to the object at ffff8881028c0700 <3>[ 14.092369] which belongs to the cache kmalloc-32 of size 32 <3>[ 14.092766] The buggy address is located 16 bytes inside of <3>[ 14.092766] freed 32-byte region [ffff8881028c0700, ffff8881028c0720) <3>[ 14.093179] <3>[ 14.093254] The buggy address belongs to the physical page: <4>[ 14.093416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c0 <4>[ 14.093676] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.093851] page_type: 0xfdffffff(slab) <4>[ 14.093987] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 <4>[ 14.094205] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 <4>[ 14.094448] page dumped because: kasan: bad access detected <3>[ 14.094608] <3>[ 14.094759] Memory state around the buggy address: <3>[ 14.094930] ffff8881028c0600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 14.095152] ffff8881028c0680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 14.095365] >ffff8881028c0700: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.095578] ^ <3>[ 14.095784] ffff8881028c0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.095998] ffff8881028c0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.096201] ================================================================== <6>[ 14.098314] ok 61 kasan_strings <3>[ 14.099380] ================================================================== <3>[ 14.099965] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 <3>[ 14.100219] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.100551] <3>[ 14.100643] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.101015] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.101173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.101433] Call Trace: <3>[ 14.101526] <3>[ 14.101632] dump_stack_lvl+0x73/0xb0 <3>[ 14.101842] print_report+0xd1/0x640 <3>[ 14.101976] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.102126] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.102306] kasan_report+0x102/0x140 <3>[ 14.102440] ? kasan_bitops_modify.constprop.0+0x102/0xd50 <3>[ 14.102632] ? kasan_bitops_modify.constprop.0+0x102/0xd50 <3>[ 14.102882] kasan_check_range+0x10c/0x1c0 <3>[ 14.103039] __kasan_check_write+0x18/0x20 <3>[ 14.103184] kasan_bitops_modify.constprop.0+0x102/0xd50 <3>[ 14.103352] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.103539] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.103784] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.103937] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.104086] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.104255] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.104388] ? ktime_get_ts64+0x84/0x230 <3>[ 14.104528] kunit_try_run_case+0x1b3/0x490 <3>[ 14.104742] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.104908] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.105066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.105234] ? __kthread_parkme+0x82/0x160 <3>[ 14.105399] ? preempt_count_sub+0x50/0x80 <3>[ 14.105553] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.105786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.105989] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.106165] kthread+0x257/0x310 <3>[ 14.106289] ? __pfx_kthread+0x10/0x10 <3>[ 14.106425] ret_from_fork+0x41/0x80 <3>[ 14.106556] ? __pfx_kthread+0x10/0x10 <3>[ 14.106781] ret_from_fork_asm+0x1a/0x30 <3>[ 14.106945] <3>[ 14.107040] <3>[ 14.107111] Allocated by task 262: <4>[ 14.107232] kasan_save_stack+0x3d/0x60 <4>[ 14.107373] kasan_save_track+0x18/0x40 <4>[ 14.107506] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.107693] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.107840] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.107993] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.108132] kunit_try_run_case+0x1b3/0x490 <4>[ 14.108273] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.108485] kthread+0x257/0x310 <4>[ 14.108602] ret_from_fork+0x41/0x80 <4>[ 14.108808] ret_from_fork_asm+0x1a/0x30 <3>[ 14.108982] <3>[ 14.109052] The buggy address belongs to the object at ffff888102580980 <3>[ 14.109052] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.109400] The buggy address is located 8 bytes inside of <3>[ 14.109400] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.109846] <3>[ 14.109947] The buggy address belongs to the physical page: <4>[ 14.110115] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.110374] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.110538] page_type: 0xfdffffff(slab) <4>[ 14.110755] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.110994] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.111206] page dumped because: kasan: bad access detected <3>[ 14.111374] <3>[ 14.111441] Memory state around the buggy address: <3>[ 14.111589] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.111869] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.112084] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.112295] ^ <3>[ 14.112416] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.112616] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.112872] ================================================================== <3>[ 14.113358] ================================================================== <3>[ 14.113634] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 <3>[ 14.114013] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.114246] <3>[ 14.114323] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.114621] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.114925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.115271] Call Trace: <3>[ 14.115376] <3>[ 14.115459] dump_stack_lvl+0x73/0xb0 <3>[ 14.115598] print_report+0xd1/0x640 <3>[ 14.115862] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.116050] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.116266] kasan_report+0x102/0x140 <3>[ 14.116420] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 <3>[ 14.116633] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 <3>[ 14.116972] kasan_check_range+0x10c/0x1c0 <3>[ 14.117146] __kasan_check_write+0x18/0x20 <3>[ 14.117314] kasan_bitops_modify.constprop.0+0x19d/0xd50 <3>[ 14.117487] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.117799] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.117981] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.118142] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.118291] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.118539] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.118828] ? ktime_get_ts64+0x84/0x230 <3>[ 14.119103] kunit_try_run_case+0x1b3/0x490 <3>[ 14.119254] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.119409] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.119567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.119810] ? __kthread_parkme+0x82/0x160 <3>[ 14.119964] ? preempt_count_sub+0x50/0x80 <3>[ 14.120118] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.120276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.120473] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.120672] kthread+0x257/0x310 <3>[ 14.120848] ? __pfx_kthread+0x10/0x10 <3>[ 14.120989] ret_from_fork+0x41/0x80 <3>[ 14.121118] ? __pfx_kthread+0x10/0x10 <3>[ 14.121255] ret_from_fork_asm+0x1a/0x30 <3>[ 14.121404] <3>[ 14.121489] <3>[ 14.121555] Allocated by task 262: <4>[ 14.121708] kasan_save_stack+0x3d/0x60 <4>[ 14.121898] kasan_save_track+0x18/0x40 <4>[ 14.122037] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.122181] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.122308] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.122459] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.122598] kunit_try_run_case+0x1b3/0x490 <4>[ 14.122889] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.123129] kthread+0x257/0x310 <4>[ 14.123301] ret_from_fork+0x41/0x80 <4>[ 14.123471] ret_from_fork_asm+0x1a/0x30 <3>[ 14.123636] <3>[ 14.123828] The buggy address belongs to the object at ffff888102580980 <3>[ 14.123828] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.124201] The buggy address is located 8 bytes inside of <3>[ 14.124201] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.124540] <3>[ 14.124609] The buggy address belongs to the physical page: <4>[ 14.124875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.125111] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.125273] page_type: 0xfdffffff(slab) <4>[ 14.125410] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.125631] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.125903] page dumped because: kasan: bad access detected <3>[ 14.126096] <3>[ 14.126166] Memory state around the buggy address: <3>[ 14.126329] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.126556] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.126839] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.127058] ^ <3>[ 14.127180] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.127386] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.127598] ================================================================== <3>[ 14.128111] ================================================================== <3>[ 14.128404] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 <3>[ 14.128782] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.129117] <3>[ 14.129201] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.129526] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.129814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.130115] Call Trace: <3>[ 14.130223] <3>[ 14.130327] dump_stack_lvl+0x73/0xb0 <3>[ 14.130481] print_report+0xd1/0x640 <3>[ 14.130629] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.130867] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.131077] kasan_report+0x102/0x140 <3>[ 14.131216] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 <3>[ 14.131398] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 <3>[ 14.131579] kasan_check_range+0x10c/0x1c0 <3>[ 14.131794] __kasan_check_write+0x18/0x20 <3>[ 14.131941] kasan_bitops_modify.constprop.0+0x23b/0xd50 <3>[ 14.132146] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.132391] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.132552] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.132748] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.132903] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.133092] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.133228] ? ktime_get_ts64+0x84/0x230 <3>[ 14.133390] kunit_try_run_case+0x1b3/0x490 <3>[ 14.133547] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.133825] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.134102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.134279] ? __kthread_parkme+0x82/0x160 <3>[ 14.134431] ? preempt_count_sub+0x50/0x80 <3>[ 14.134604] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.134867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.135108] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.135298] kthread+0x257/0x310 <3>[ 14.135432] ? __pfx_kthread+0x10/0x10 <3>[ 14.135578] ret_from_fork+0x41/0x80 <3>[ 14.135789] ? __pfx_kthread+0x10/0x10 <3>[ 14.135943] ret_from_fork_asm+0x1a/0x30 <3>[ 14.136098] <3>[ 14.136185] <3>[ 14.136250] Allocated by task 262: <4>[ 14.136364] kasan_save_stack+0x3d/0x60 <4>[ 14.136505] kasan_save_track+0x18/0x40 <4>[ 14.136666] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.136831] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.136955] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.137117] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.137249] kunit_try_run_case+0x1b3/0x490 <4>[ 14.137389] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.137635] kthread+0x257/0x310 <4>[ 14.137797] ret_from_fork+0x41/0x80 <4>[ 14.137929] ret_from_fork_asm+0x1a/0x30 <3>[ 14.138090] <3>[ 14.138168] The buggy address belongs to the object at ffff888102580980 <3>[ 14.138168] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.138573] The buggy address is located 8 bytes inside of <3>[ 14.138573] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.139230] <3>[ 14.139381] The buggy address belongs to the physical page: <4>[ 14.139597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.139920] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.140078] page_type: 0xfdffffff(slab) <4>[ 14.140212] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.140448] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.140707] page dumped because: kasan: bad access detected <3>[ 14.140892] <3>[ 14.140959] Memory state around the buggy address: <3>[ 14.141118] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.141328] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.141535] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.141895] ^ <3>[ 14.142031] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.142240] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.142451] ================================================================== <3>[ 14.142838] ================================================================== <3>[ 14.143098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 <3>[ 14.143340] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.143553] <3>[ 14.143653] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.144126] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.144278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.144533] Call Trace: <3>[ 14.144753] <3>[ 14.144859] dump_stack_lvl+0x73/0xb0 <3>[ 14.145093] print_report+0xd1/0x640 <3>[ 14.145290] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.145496] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.145753] kasan_report+0x102/0x140 <3>[ 14.145917] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 <3>[ 14.146202] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 <3>[ 14.146477] kasan_check_range+0x10c/0x1c0 <3>[ 14.146706] __kasan_check_write+0x18/0x20 <3>[ 14.146914] kasan_bitops_modify.constprop.0+0x2d6/0xd50 <3>[ 14.147147] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.147391] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.147607] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.147852] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.148060] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.148279] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.148472] ? ktime_get_ts64+0x84/0x230 <3>[ 14.148674] kunit_try_run_case+0x1b3/0x490 <3>[ 14.148894] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.149107] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.149321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.149553] ? __kthread_parkme+0x82/0x160 <3>[ 14.149847] ? preempt_count_sub+0x50/0x80 <3>[ 14.150065] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.150288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.150587] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.150875] kthread+0x257/0x310 <3>[ 14.151024] ? __pfx_kthread+0x10/0x10 <3>[ 14.151227] ret_from_fork+0x41/0x80 <3>[ 14.151443] ? __pfx_kthread+0x10/0x10 <3>[ 14.151656] ret_from_fork_asm+0x1a/0x30 <3>[ 14.151874] <3>[ 14.152013] <3>[ 14.152156] Allocated by task 262: <4>[ 14.152365] kasan_save_stack+0x3d/0x60 <4>[ 14.152592] kasan_save_track+0x18/0x40 <4>[ 14.152854] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.153065] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.153278] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.153498] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.153673] kunit_try_run_case+0x1b3/0x490 <4>[ 14.153951] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.154174] kthread+0x257/0x310 <4>[ 14.154343] ret_from_fork+0x41/0x80 <4>[ 14.154541] ret_from_fork_asm+0x1a/0x30 <3>[ 14.154773] <3>[ 14.154847] The buggy address belongs to the object at ffff888102580980 <3>[ 14.154847] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.155319] The buggy address is located 8 bytes inside of <3>[ 14.155319] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.155794] <3>[ 14.155873] The buggy address belongs to the physical page: <4>[ 14.156123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.156427] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.156661] page_type: 0xfdffffff(slab) <4>[ 14.156866] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.157153] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.157429] page dumped because: kasan: bad access detected <3>[ 14.157662] <3>[ 14.157747] Memory state around the buggy address: <3>[ 14.157981] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.158246] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.158518] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.158822] ^ <3>[ 14.159018] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.159285] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.159551] ================================================================== <3>[ 14.160007] ================================================================== <3>[ 14.160285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 <3>[ 14.160598] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.161007] <3>[ 14.161103] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.161575] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.161853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.162175] Call Trace: <3>[ 14.162317] <3>[ 14.162482] dump_stack_lvl+0x73/0xb0 <3>[ 14.162687] print_report+0xd1/0x640 <3>[ 14.162849] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.163117] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.163362] kasan_report+0x102/0x140 <3>[ 14.163564] ? kasan_bitops_modify.constprop.0+0x374/0xd50 <3>[ 14.163863] ? kasan_bitops_modify.constprop.0+0x374/0xd50 <3>[ 14.164099] kasan_check_range+0x10c/0x1c0 <3>[ 14.164299] __kasan_check_write+0x18/0x20 <3>[ 14.164507] kasan_bitops_modify.constprop.0+0x374/0xd50 <3>[ 14.164797] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.165064] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.165331] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.165541] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.165792] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.166035] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.166216] ? ktime_get_ts64+0x84/0x230 <3>[ 14.166441] kunit_try_run_case+0x1b3/0x490 <3>[ 14.166664] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.166895] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.167139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.167360] ? __kthread_parkme+0x82/0x160 <3>[ 14.167561] ? preempt_count_sub+0x50/0x80 <3>[ 14.167940] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.168242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.168448] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.168625] kthread+0x257/0x310 <3>[ 14.168796] ? __pfx_kthread+0x10/0x10 <3>[ 14.168940] ret_from_fork+0x41/0x80 <3>[ 14.169070] ? __pfx_kthread+0x10/0x10 <3>[ 14.169218] ret_from_fork_asm+0x1a/0x30 <3>[ 14.169362] <3>[ 14.169449] <3>[ 14.169527] Allocated by task 262: <4>[ 14.169646] kasan_save_stack+0x3d/0x60 <4>[ 14.169878] kasan_save_track+0x18/0x40 <4>[ 14.170003] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.170164] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.170293] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.170436] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.170582] kunit_try_run_case+0x1b3/0x490 <4>[ 14.170810] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.170989] kthread+0x257/0x310 <4>[ 14.171106] ret_from_fork+0x41/0x80 <4>[ 14.171252] ret_from_fork_asm+0x1a/0x30 <3>[ 14.171382] <3>[ 14.171450] The buggy address belongs to the object at ffff888102580980 <3>[ 14.171450] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.171855] The buggy address is located 8 bytes inside of <3>[ 14.171855] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.172200] <3>[ 14.172278] The buggy address belongs to the physical page: <4>[ 14.172463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.172803] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.173046] page_type: 0xfdffffff(slab) <4>[ 14.173201] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.173428] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.173643] page dumped because: kasan: bad access detected <3>[ 14.173958] <3>[ 14.174022] Memory state around the buggy address: <3>[ 14.174201] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.174529] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.174847] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.175176] ^ <3>[ 14.175386] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.175794] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.176147] ================================================================== <3>[ 14.176850] ================================================================== <3>[ 14.177180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 <3>[ 14.177524] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.177922] <3>[ 14.178056] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.178513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.178779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.179183] Call Trace: <3>[ 14.179340] <3>[ 14.179483] dump_stack_lvl+0x73/0xb0 <3>[ 14.179740] print_report+0xd1/0x640 <3>[ 14.179953] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.180149] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.180329] kasan_report+0x102/0x140 <3>[ 14.180474] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 <3>[ 14.180687] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 <3>[ 14.180894] kasan_check_range+0x10c/0x1c0 <3>[ 14.181052] __kasan_check_write+0x18/0x20 <3>[ 14.181207] kasan_bitops_modify.constprop.0+0x40f/0xd50 <3>[ 14.181403] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.181611] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.181811] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.181986] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.182141] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.182324] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.182499] ? ktime_get_ts64+0x84/0x230 <3>[ 14.182685] kunit_try_run_case+0x1b3/0x490 <3>[ 14.182869] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.183051] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.183227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.183400] ? __kthread_parkme+0x82/0x160 <3>[ 14.183556] ? preempt_count_sub+0x50/0x80 <3>[ 14.183739] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.183913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.184125] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.184308] kthread+0x257/0x310 <3>[ 14.184441] ? __pfx_kthread+0x10/0x10 <3>[ 14.184584] ret_from_fork+0x41/0x80 <3>[ 14.184742] ? __pfx_kthread+0x10/0x10 <3>[ 14.184902] ret_from_fork_asm+0x1a/0x30 <3>[ 14.185055] <3>[ 14.185159] <3>[ 14.185233] Allocated by task 262: <4>[ 14.185385] kasan_save_stack+0x3d/0x60 <4>[ 14.185565] kasan_save_track+0x18/0x40 <4>[ 14.185756] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.185912] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.186055] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.186243] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.186400] kunit_try_run_case+0x1b3/0x490 <4>[ 14.186557] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.186775] kthread+0x257/0x310 <4>[ 14.186915] ret_from_fork+0x41/0x80 <4>[ 14.187127] ret_from_fork_asm+0x1a/0x30 <3>[ 14.187284] <3>[ 14.187369] The buggy address belongs to the object at ffff888102580980 <3>[ 14.187369] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.187776] The buggy address is located 8 bytes inside of <3>[ 14.187776] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.188131] <3>[ 14.188225] The buggy address belongs to the physical page: <4>[ 14.188416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.188650] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.188828] page_type: 0xfdffffff(slab) <4>[ 14.188999] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.189254] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.189501] page dumped because: kasan: bad access detected <3>[ 14.189711] <3>[ 14.189790] Memory state around the buggy address: <3>[ 14.189960] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.190194] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.190418] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.190648] ^ <3>[ 14.190783] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.191019] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.191238] ================================================================== <3>[ 14.191614] ================================================================== <3>[ 14.191885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 <3>[ 14.192260] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.192612] <3>[ 14.192826] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.193221] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.193399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.193824] Call Trace: <3>[ 14.193989] <3>[ 14.194133] dump_stack_lvl+0x73/0xb0 <3>[ 14.194317] print_report+0xd1/0x640 <3>[ 14.194484] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.194713] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.194973] kasan_report+0x102/0x140 <3>[ 14.195141] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 <3>[ 14.195378] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 <3>[ 14.195622] kasan_check_range+0x10c/0x1c0 <3>[ 14.195870] __kasan_check_write+0x18/0x20 <3>[ 14.196047] kasan_bitops_modify.constprop.0+0x4ad/0xd50 <3>[ 14.196269] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.196531] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.196844] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.197128] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.197406] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.197743] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.198014] ? ktime_get_ts64+0x84/0x230 <3>[ 14.198286] kunit_try_run_case+0x1b3/0x490 <3>[ 14.198571] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.198858] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.199117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.199393] ? __kthread_parkme+0x82/0x160 <3>[ 14.199567] ? preempt_count_sub+0x50/0x80 <3>[ 14.199823] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.200032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.200284] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.200519] kthread+0x257/0x310 <3>[ 14.200718] ? __pfx_kthread+0x10/0x10 <3>[ 14.200907] ret_from_fork+0x41/0x80 <3>[ 14.201082] ? __pfx_kthread+0x10/0x10 <3>[ 14.201251] ret_from_fork_asm+0x1a/0x30 <3>[ 14.201440] <3>[ 14.201559] <3>[ 14.201665] Allocated by task 262: <4>[ 14.201844] kasan_save_stack+0x3d/0x60 <4>[ 14.202067] kasan_save_track+0x18/0x40 <4>[ 14.202243] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.202408] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.202576] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.202819] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.203044] kunit_try_run_case+0x1b3/0x490 <4>[ 14.203276] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.203559] kthread+0x257/0x310 <4>[ 14.203792] ret_from_fork+0x41/0x80 <4>[ 14.204010] ret_from_fork_asm+0x1a/0x30 <3>[ 14.204234] <3>[ 14.204358] The buggy address belongs to the object at ffff888102580980 <3>[ 14.204358] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.204911] The buggy address is located 8 bytes inside of <3>[ 14.204911] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.205395] <3>[ 14.205503] The buggy address belongs to the physical page: <4>[ 14.205790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.206111] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.206335] page_type: 0xfdffffff(slab) <4>[ 14.206533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.206968] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.207340] page dumped because: kasan: bad access detected <3>[ 14.207616] <3>[ 14.207758] Memory state around the buggy address: <3>[ 14.208002] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.208338] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.208683] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.208970] ^ <3>[ 14.209140] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.209432] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.209784] ================================================================== <3>[ 14.210275] ================================================================== <3>[ 14.210592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 <3>[ 14.211024] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.211383] <3>[ 14.211528] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.212040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.212291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.212706] Call Trace: <3>[ 14.212858] <3>[ 14.212995] dump_stack_lvl+0x73/0xb0 <3>[ 14.213197] print_report+0xd1/0x640 <3>[ 14.213387] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.213599] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.213856] kasan_report+0x102/0x140 <3>[ 14.214044] ? kasan_bitops_modify.constprop.0+0x548/0xd50 <3>[ 14.214289] ? kasan_bitops_modify.constprop.0+0x548/0xd50 <3>[ 14.214549] kasan_check_range+0x10c/0x1c0 <3>[ 14.214792] __kasan_check_write+0x18/0x20 <3>[ 14.215035] kasan_bitops_modify.constprop.0+0x548/0xd50 <3>[ 14.215317] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 <3>[ 14.215618] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.215902] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.216156] kasan_bitops_generic+0x117/0x1c0 <3>[ 14.216398] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.216680] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.216921] ? ktime_get_ts64+0x84/0x230 <3>[ 14.217156] kunit_try_run_case+0x1b3/0x490 <3>[ 14.217396] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.217665] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.217920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.218181] ? __kthread_parkme+0x82/0x160 <3>[ 14.218415] ? preempt_count_sub+0x50/0x80 <3>[ 14.218661] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.218946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.219263] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.219536] kthread+0x257/0x310 <3>[ 14.219745] ? __pfx_kthread+0x10/0x10 <3>[ 14.219974] ret_from_fork+0x41/0x80 <3>[ 14.220193] ? __pfx_kthread+0x10/0x10 <3>[ 14.220420] ret_from_fork_asm+0x1a/0x30 <3>[ 14.220681] <3>[ 14.220836] <3>[ 14.220957] Allocated by task 262: <4>[ 14.221164] kasan_save_stack+0x3d/0x60 <4>[ 14.221381] kasan_save_track+0x18/0x40 <4>[ 14.221587] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.221857] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.222049] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.222268] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.222482] kunit_try_run_case+0x1b3/0x490 <4>[ 14.222718] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.222987] kthread+0x257/0x310 <4>[ 14.223149] ret_from_fork+0x41/0x80 <4>[ 14.223277] ret_from_fork_asm+0x1a/0x30 <3>[ 14.223415] <3>[ 14.223487] The buggy address belongs to the object at ffff888102580980 <3>[ 14.223487] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.223890] The buggy address is located 8 bytes inside of <3>[ 14.223890] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.224218] <3>[ 14.224289] The buggy address belongs to the physical page: <4>[ 14.224458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.224706] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.224933] page_type: 0xfdffffff(slab) <4>[ 14.225171] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.225535] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.225918] page dumped because: kasan: bad access detected <3>[ 14.226193] <3>[ 14.226312] Memory state around the buggy address: <3>[ 14.226556] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.226954] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.227243] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.227525] ^ <3>[ 14.227713] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.228007] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.228298] ================================================================== <3>[ 14.228917] ================================================================== <3>[ 14.229273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 <3>[ 14.229739] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.230083] <3>[ 14.230222] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.230632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.230865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.231227] Call Trace: <3>[ 14.231371] <3>[ 14.231514] dump_stack_lvl+0x73/0xb0 <3>[ 14.231765] print_report+0xd1/0x640 <3>[ 14.231958] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.232181] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.232453] kasan_report+0x102/0x140 <3>[ 14.232703] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 <3>[ 14.233038] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 <3>[ 14.233350] kasan_check_range+0x10c/0x1c0 <3>[ 14.233578] __kasan_check_write+0x18/0x20 <3>[ 14.233835] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 <3>[ 14.234141] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.234428] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.234648] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.234853] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.235071] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.235298] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.235493] ? ktime_get_ts64+0x84/0x230 <3>[ 14.235730] kunit_try_run_case+0x1b3/0x490 <3>[ 14.235939] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.236160] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.236396] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.236673] ? __kthread_parkme+0x82/0x160 <3>[ 14.236921] ? preempt_count_sub+0x50/0x80 <3>[ 14.237161] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.237418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.237761] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.238044] kthread+0x257/0x310 <3>[ 14.238265] ? __pfx_kthread+0x10/0x10 <3>[ 14.238496] ret_from_fork+0x41/0x80 <3>[ 14.238710] ? __pfx_kthread+0x10/0x10 <3>[ 14.238972] ret_from_fork_asm+0x1a/0x30 <3>[ 14.239228] <3>[ 14.239373] <3>[ 14.239490] Allocated by task 262: <4>[ 14.239707] kasan_save_stack+0x3d/0x60 <4>[ 14.239937] kasan_save_track+0x18/0x40 <4>[ 14.240160] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.240411] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.240631] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.240884] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.241128] kunit_try_run_case+0x1b3/0x490 <4>[ 14.241364] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.241652] kthread+0x257/0x310 <4>[ 14.241853] ret_from_fork+0x41/0x80 <4>[ 14.242065] ret_from_fork_asm+0x1a/0x30 <3>[ 14.242283] <3>[ 14.242403] The buggy address belongs to the object at ffff888102580980 <3>[ 14.242403] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.242910] The buggy address is located 8 bytes inside of <3>[ 14.242910] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.243369] <3>[ 14.243477] The buggy address belongs to the physical page: <4>[ 14.243751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.244065] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.244225] page_type: 0xfdffffff(slab) <4>[ 14.244363] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.244585] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.244849] page dumped because: kasan: bad access detected <3>[ 14.245019] <3>[ 14.245085] Memory state around the buggy address: <3>[ 14.245231] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.245436] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.245644] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.245871] ^ <3>[ 14.245992] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.246196] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.246403] ================================================================== <3>[ 14.246784] ================================================================== <3>[ 14.247029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 <3>[ 14.247290] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.247505] <3>[ 14.247584] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.247909] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.248064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.248320] Call Trace: <3>[ 14.248419] <3>[ 14.248511] dump_stack_lvl+0x73/0xb0 <3>[ 14.248665] print_report+0xd1/0x640 <3>[ 14.248802] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.248954] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.249130] kasan_report+0x102/0x140 <3>[ 14.249264] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 <3>[ 14.249457] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 <3>[ 14.249684] kasan_check_range+0x10c/0x1c0 <3>[ 14.249831] __kasan_check_write+0x18/0x20 <3>[ 14.249972] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 <3>[ 14.250165] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.250361] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.250517] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.250708] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.250858] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.251029] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.251166] ? ktime_get_ts64+0x84/0x230 <3>[ 14.251308] kunit_try_run_case+0x1b3/0x490 <3>[ 14.251462] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.251622] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.251777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.251941] ? __kthread_parkme+0x82/0x160 <3>[ 14.252089] ? preempt_count_sub+0x50/0x80 <3>[ 14.252234] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.252398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.252595] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.252808] kthread+0x257/0x310 <3>[ 14.252939] ? __pfx_kthread+0x10/0x10 <3>[ 14.253074] ret_from_fork+0x41/0x80 <3>[ 14.253201] ? __pfx_kthread+0x10/0x10 <3>[ 14.253333] ret_from_fork_asm+0x1a/0x30 <3>[ 14.253479] <3>[ 14.253569] <3>[ 14.253646] Allocated by task 262: <4>[ 14.253770] kasan_save_stack+0x3d/0x60 <4>[ 14.253910] kasan_save_track+0x18/0x40 <4>[ 14.254044] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.254189] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.254320] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.254465] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.254610] kunit_try_run_case+0x1b3/0x490 <4>[ 14.254768] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.254953] kthread+0x257/0x310 <4>[ 14.255074] ret_from_fork+0x41/0x80 <4>[ 14.255199] ret_from_fork_asm+0x1a/0x30 <3>[ 14.255329] <3>[ 14.255398] The buggy address belongs to the object at ffff888102580980 <3>[ 14.255398] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.255755] The buggy address is located 8 bytes inside of <3>[ 14.255755] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.256074] <3>[ 14.256139] The buggy address belongs to the physical page: <4>[ 14.256297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.256521] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.256702] page_type: 0xfdffffff(slab) <4>[ 14.256844] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.257065] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.257278] page dumped because: kasan: bad access detected <3>[ 14.257443] <3>[ 14.257511] Memory state around the buggy address: <3>[ 14.257663] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.257870] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.258077] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.258281] ^ <3>[ 14.258399] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.258606] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.258825] ================================================================== <3>[ 14.259137] ================================================================== <3>[ 14.259357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 <3>[ 14.259607] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.259835] <3>[ 14.259912] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.260206] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.260361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.260608] Call Trace: <3>[ 14.260725] <3>[ 14.260811] dump_stack_lvl+0x73/0xb0 <3>[ 14.260949] print_report+0xd1/0x640 <3>[ 14.261081] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.261227] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.261395] kasan_report+0x102/0x140 <3>[ 14.261527] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 <3>[ 14.261751] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 <3>[ 14.261956] kasan_check_range+0x10c/0x1c0 <3>[ 14.262099] __kasan_check_write+0x18/0x20 <3>[ 14.262241] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 <3>[ 14.262431] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.262640] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.262798] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.262960] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.263110] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.263268] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.263406] ? ktime_get_ts64+0x84/0x230 <3>[ 14.263546] kunit_try_run_case+0x1b3/0x490 <3>[ 14.263736] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.263896] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.264052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.264216] ? __kthread_parkme+0x82/0x160 <3>[ 14.264363] ? preempt_count_sub+0x50/0x80 <3>[ 14.264507] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.264674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.264883] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.265058] kthread+0x257/0x310 <3>[ 14.265184] ? __pfx_kthread+0x10/0x10 <3>[ 14.265320] ret_from_fork+0x41/0x80 <3>[ 14.265453] ? __pfx_kthread+0x10/0x10 <3>[ 14.265586] ret_from_fork_asm+0x1a/0x30 <3>[ 14.265819] <3>[ 14.265907] <3>[ 14.265977] Allocated by task 262: <4>[ 14.266090] kasan_save_stack+0x3d/0x60 <4>[ 14.266228] kasan_save_track+0x18/0x40 <4>[ 14.266359] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.266498] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.266622] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.266778] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.266933] kunit_try_run_case+0x1b3/0x490 <4>[ 14.267081] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.267246] kthread+0x257/0x310 <4>[ 14.267365] ret_from_fork+0x41/0x80 <4>[ 14.267491] ret_from_fork_asm+0x1a/0x30 <3>[ 14.267633] <3>[ 14.267710] The buggy address belongs to the object at ffff888102580980 <3>[ 14.267710] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.268038] The buggy address is located 8 bytes inside of <3>[ 14.268038] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.268372] <3>[ 14.268441] The buggy address belongs to the physical page: <4>[ 14.268604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.268874] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.269027] page_type: 0xfdffffff(slab) <4>[ 14.269157] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.269378] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.269586] page dumped because: kasan: bad access detected <3>[ 14.269781] <3>[ 14.269851] Memory state around the buggy address: <3>[ 14.269990] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.270196] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.270399] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.270600] ^ <3>[ 14.270757] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.270974] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.271180] ================================================================== <3>[ 14.271473] ================================================================== <3>[ 14.271738] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 <3>[ 14.271999] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.272213] <3>[ 14.272287] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.272580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.272767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.273020] Call Trace: <3>[ 14.273112] <3>[ 14.273200] dump_stack_lvl+0x73/0xb0 <3>[ 14.273336] print_report+0xd1/0x640 <3>[ 14.273466] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.273614] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.273817] kasan_report+0x102/0x140 <3>[ 14.273952] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 <3>[ 14.274158] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 <3>[ 14.274357] kasan_check_range+0x10c/0x1c0 <3>[ 14.274500] __kasan_check_write+0x18/0x20 <3>[ 14.274653] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 <3>[ 14.274858] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.275077] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.275239] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.275386] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.275539] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.275754] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.275902] ? ktime_get_ts64+0x84/0x230 <3>[ 14.276042] kunit_try_run_case+0x1b3/0x490 <3>[ 14.276186] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.276348] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.276500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.276678] ? __kthread_parkme+0x82/0x160 <3>[ 14.276850] ? preempt_count_sub+0x50/0x80 <3>[ 14.276998] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.277157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.277356] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.277534] kthread+0x257/0x310 <3>[ 14.277671] ? __pfx_kthread+0x10/0x10 <3>[ 14.277823] ret_from_fork+0x41/0x80 <3>[ 14.277953] ? __pfx_kthread+0x10/0x10 <3>[ 14.278086] ret_from_fork_asm+0x1a/0x30 <3>[ 14.278234] <3>[ 14.278318] <3>[ 14.278387] Allocated by task 262: <4>[ 14.278508] kasan_save_stack+0x3d/0x60 <4>[ 14.278659] kasan_save_track+0x18/0x40 <4>[ 14.278819] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.278978] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.279113] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.279261] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.279408] kunit_try_run_case+0x1b3/0x490 <4>[ 14.279554] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.279778] kthread+0x257/0x310 <4>[ 14.279901] ret_from_fork+0x41/0x80 <4>[ 14.280032] ret_from_fork_asm+0x1a/0x30 <3>[ 14.280165] <3>[ 14.280240] The buggy address belongs to the object at ffff888102580980 <3>[ 14.280240] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.280568] The buggy address is located 8 bytes inside of <3>[ 14.280568] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.281007] <3>[ 14.281101] The buggy address belongs to the physical page: <4>[ 14.281308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.281600] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.281837] page_type: 0xfdffffff(slab) <4>[ 14.281982] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.282274] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.282527] page dumped because: kasan: bad access detected <3>[ 14.282741] <3>[ 14.282847] Memory state around the buggy address: <3>[ 14.283082] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.283374] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.283633] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.283895] ^ <3>[ 14.284033] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.284316] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.284564] ================================================================== <3>[ 14.284979] ================================================================== <3>[ 14.285237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 <3>[ 14.285574] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.285887] <3>[ 14.285973] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.286372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.286590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.286996] Call Trace: <3>[ 14.287102] <3>[ 14.287196] dump_stack_lvl+0x73/0xb0 <3>[ 14.287378] print_report+0xd1/0x640 <3>[ 14.287597] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.287798] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.288034] kasan_report+0x102/0x140 <3>[ 14.288175] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 <3>[ 14.288431] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 <3>[ 14.288691] kasan_check_range+0x10c/0x1c0 <3>[ 14.288848] __kasan_check_write+0x18/0x20 <3>[ 14.289011] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 <3>[ 14.289291] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.289543] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.289783] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.289933] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.290146] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.290334] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.290515] ? ktime_get_ts64+0x84/0x230 <3>[ 14.290712] kunit_try_run_case+0x1b3/0x490 <3>[ 14.290993] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.291164] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.291394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.291612] ? __kthread_parkme+0x82/0x160 <3>[ 14.291784] ? preempt_count_sub+0x50/0x80 <3>[ 14.291993] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.292187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.292390] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.292643] kthread+0x257/0x310 <3>[ 14.292779] ? __pfx_kthread+0x10/0x10 <3>[ 14.292975] ret_from_fork+0x41/0x80 <3>[ 14.293148] ? __pfx_kthread+0x10/0x10 <3>[ 14.293306] ret_from_fork_asm+0x1a/0x30 <3>[ 14.293493] <3>[ 14.293632] <3>[ 14.293728] Allocated by task 262: <4>[ 14.293901] kasan_save_stack+0x3d/0x60 <4>[ 14.294094] kasan_save_track+0x18/0x40 <4>[ 14.294238] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.294415] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.294614] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.294784] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.294982] kunit_try_run_case+0x1b3/0x490 <4>[ 14.295198] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.295374] kthread+0x257/0x310 <4>[ 14.295539] ret_from_fork+0x41/0x80 <4>[ 14.295771] ret_from_fork_asm+0x1a/0x30 <3>[ 14.295940] <3>[ 14.296045] The buggy address belongs to the object at ffff888102580980 <3>[ 14.296045] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.296447] The buggy address is located 8 bytes inside of <3>[ 14.296447] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.296946] <3>[ 14.297051] The buggy address belongs to the physical page: <4>[ 14.297292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.297550] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.297793] page_type: 0xfdffffff(slab) <4>[ 14.297944] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.298226] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.298497] page dumped because: kasan: bad access detected <3>[ 14.298722] <3>[ 14.298812] Memory state around the buggy address: <3>[ 14.298971] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.299231] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.299507] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.299785] ^ <3>[ 14.299917] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.300129] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.300431] ================================================================== <3>[ 14.300973] ================================================================== <3>[ 14.301323] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 <3>[ 14.301619] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.301958] <3>[ 14.302082] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.302474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.302694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.303076] Call Trace: <3>[ 14.303220] <3>[ 14.303339] dump_stack_lvl+0x73/0xb0 <3>[ 14.303529] print_report+0xd1/0x640 <3>[ 14.303733] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.303935] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.304178] kasan_report+0x102/0x140 <3>[ 14.304370] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 <3>[ 14.304638] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 <3>[ 14.304922] kasan_check_range+0x10c/0x1c0 <3>[ 14.305121] __kasan_check_write+0x18/0x20 <3>[ 14.305312] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 <3>[ 14.305576] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.305894] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.306102] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.306315] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.306519] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.306777] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.306970] ? ktime_get_ts64+0x84/0x230 <3>[ 14.307154] kunit_try_run_case+0x1b3/0x490 <3>[ 14.307349] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.307578] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.307827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.308054] ? __kthread_parkme+0x82/0x160 <3>[ 14.308259] ? preempt_count_sub+0x50/0x80 <3>[ 14.308457] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.308691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.308967] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.309213] kthread+0x257/0x310 <3>[ 14.309375] ? __pfx_kthread+0x10/0x10 <3>[ 14.309559] ret_from_fork+0x41/0x80 <3>[ 14.309782] ? __pfx_kthread+0x10/0x10 <3>[ 14.309979] ret_from_fork_asm+0x1a/0x30 <3>[ 14.310184] <3>[ 14.310302] <3>[ 14.310388] Allocated by task 262: <4>[ 14.310531] kasan_save_stack+0x3d/0x60 <4>[ 14.310749] kasan_save_track+0x18/0x40 <4>[ 14.310939] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.311124] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.311313] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.311508] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.311726] kunit_try_run_case+0x1b3/0x490 <4>[ 14.311923] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.312148] kthread+0x257/0x310 <4>[ 14.312307] ret_from_fork+0x41/0x80 <4>[ 14.312476] ret_from_fork_asm+0x1a/0x30 <3>[ 14.312717] <3>[ 14.312899] The buggy address belongs to the object at ffff888102580980 <3>[ 14.312899] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.313528] The buggy address is located 8 bytes inside of <3>[ 14.313528] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.313927] <3>[ 14.314001] The buggy address belongs to the physical page: <4>[ 14.314169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.314399] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.314562] page_type: 0xfdffffff(slab) <4>[ 14.314740] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.314974] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.315193] page dumped because: kasan: bad access detected <3>[ 14.315354] <3>[ 14.315421] Memory state around the buggy address: <3>[ 14.315566] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.315808] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.316029] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.316235] ^ <3>[ 14.316355] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.316555] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.316804] ================================================================== <3>[ 14.317152] ================================================================== <3>[ 14.317390] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 <3>[ 14.317666] Write of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.317893] <3>[ 14.317975] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.318274] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.318429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.318713] Call Trace: <3>[ 14.318812] <3>[ 14.318912] dump_stack_lvl+0x73/0xb0 <3>[ 14.319051] print_report+0xd1/0x640 <3>[ 14.319188] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.319343] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.319521] kasan_report+0x102/0x140 <3>[ 14.319670] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 <3>[ 14.319882] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 <3>[ 14.320083] kasan_check_range+0x10c/0x1c0 <3>[ 14.320225] __kasan_check_write+0x18/0x20 <3>[ 14.320370] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 <3>[ 14.320567] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.320837] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.321006] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.321154] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.321300] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.321466] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.321602] ? ktime_get_ts64+0x84/0x230 <3>[ 14.321821] kunit_try_run_case+0x1b3/0x490 <3>[ 14.321971] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.322127] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.322282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.322446] ? __kthread_parkme+0x82/0x160 <3>[ 14.322589] ? preempt_count_sub+0x50/0x80 <3>[ 14.322733] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.322922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.323118] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.323289] kthread+0x257/0x310 <3>[ 14.323413] ? __pfx_kthread+0x10/0x10 <3>[ 14.323546] ret_from_fork+0x41/0x80 <3>[ 14.323726] ? __pfx_kthread+0x10/0x10 <3>[ 14.323870] ret_from_fork_asm+0x1a/0x30 <3>[ 14.324021] <3>[ 14.324108] <3>[ 14.324180] Allocated by task 262: <4>[ 14.324300] kasan_save_stack+0x3d/0x60 <4>[ 14.324435] kasan_save_track+0x18/0x40 <4>[ 14.324572] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.324784] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.324931] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.325084] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.325228] kunit_try_run_case+0x1b3/0x490 <4>[ 14.325371] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.325542] kthread+0x257/0x310 <4>[ 14.325685] ret_from_fork+0x41/0x80 <4>[ 14.325826] ret_from_fork_asm+0x1a/0x30 <3>[ 14.325958] <3>[ 14.326027] The buggy address belongs to the object at ffff888102580980 <3>[ 14.326027] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.326359] The buggy address is located 8 bytes inside of <3>[ 14.326359] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.326725] <3>[ 14.326820] The buggy address belongs to the physical page: <4>[ 14.327008] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.327245] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.327397] page_type: 0xfdffffff(slab) <4>[ 14.327533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.327856] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.328094] page dumped because: kasan: bad access detected <3>[ 14.328253] <3>[ 14.328320] Memory state around the buggy address: <3>[ 14.328469] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.328693] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.328942] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.329150] ^ <3>[ 14.329273] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.329486] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.329743] ================================================================== <3>[ 14.330066] ================================================================== <3>[ 14.330297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 <3>[ 14.330557] Read of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.330838] <3>[ 14.330926] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.331226] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.331389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.331642] Call Trace: <3>[ 14.331770] <3>[ 14.331859] dump_stack_lvl+0x73/0xb0 <3>[ 14.332034] print_report+0xd1/0x640 <3>[ 14.332207] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.332414] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.332671] kasan_report+0x102/0x140 <3>[ 14.332872] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 <3>[ 14.333149] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 <3>[ 14.333395] kasan_check_range+0x10c/0x1c0 <3>[ 14.333596] __kasan_check_read+0x15/0x20 <3>[ 14.333868] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 <3>[ 14.334106] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.334356] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.334564] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.334810] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.335029] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.335262] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.335464] ? ktime_get_ts64+0x84/0x230 <3>[ 14.335663] kunit_try_run_case+0x1b3/0x490 <3>[ 14.335913] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.336126] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.336331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.336560] ? __kthread_parkme+0x82/0x160 <3>[ 14.336816] ? preempt_count_sub+0x50/0x80 <3>[ 14.337014] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.337240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.337492] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.337757] kthread+0x257/0x310 <3>[ 14.337911] ? __pfx_kthread+0x10/0x10 <3>[ 14.338048] ret_from_fork+0x41/0x80 <3>[ 14.338177] ? __pfx_kthread+0x10/0x10 <3>[ 14.338331] ret_from_fork_asm+0x1a/0x30 <3>[ 14.338524] <3>[ 14.338649] <3>[ 14.338739] Allocated by task 262: <4>[ 14.338888] kasan_save_stack+0x3d/0x60 <4>[ 14.339077] kasan_save_track+0x18/0x40 <4>[ 14.339253] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.339458] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.339636] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.339849] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.340034] kunit_try_run_case+0x1b3/0x490 <4>[ 14.340171] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.340360] kthread+0x257/0x310 <4>[ 14.340530] ret_from_fork+0x41/0x80 <4>[ 14.340760] ret_from_fork_asm+0x1a/0x30 <3>[ 14.340974] <3>[ 14.341059] The buggy address belongs to the object at ffff888102580980 <3>[ 14.341059] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.341516] The buggy address is located 8 bytes inside of <3>[ 14.341516] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.342064] <3>[ 14.342158] The buggy address belongs to the physical page: <4>[ 14.342376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.342631] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.342864] page_type: 0xfdffffff(slab) <4>[ 14.342998] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.343273] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.343561] page dumped because: kasan: bad access detected <3>[ 14.343812] <3>[ 14.343928] Memory state around the buggy address: <3>[ 14.344141] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.344440] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.344739] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.344964] ^ <3>[ 14.345089] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.345359] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.345604] ================================================================== <3>[ 14.346020] ================================================================== <3>[ 14.346266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 <3>[ 14.346513] Read of size 8 at addr ffff888102580988 by task kunit_try_catch/262 <3>[ 14.346851] <3>[ 14.346963] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.347358] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.347552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.347933] Call Trace: <3>[ 14.348061] <3>[ 14.348182] dump_stack_lvl+0x73/0xb0 <3>[ 14.348371] print_report+0xd1/0x640 <3>[ 14.348551] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.348785] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.349026] kasan_report+0x102/0x140 <3>[ 14.349211] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 <3>[ 14.349470] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 <3>[ 14.349789] __asan_report_load8_noabort+0x18/0x20 <3>[ 14.350034] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 <3>[ 14.350296] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 <3>[ 14.350529] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.350774] ? trace_hardirqs_on+0x37/0xe0 <3>[ 14.350973] kasan_bitops_generic+0x122/0x1c0 <3>[ 14.351180] ? __pfx_kasan_bitops_generic+0x10/0x10 <3>[ 14.351391] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.351581] ? ktime_get_ts64+0x84/0x230 <3>[ 14.351820] kunit_try_run_case+0x1b3/0x490 <3>[ 14.352035] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.352244] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.352445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.352680] ? __kthread_parkme+0x82/0x160 <3>[ 14.352891] ? preempt_count_sub+0x50/0x80 <3>[ 14.353092] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.353262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.353525] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.353792] kthread+0x257/0x310 <3>[ 14.353966] ? __pfx_kthread+0x10/0x10 <3>[ 14.354171] ret_from_fork+0x41/0x80 <3>[ 14.354356] ? __pfx_kthread+0x10/0x10 <3>[ 14.354536] ret_from_fork_asm+0x1a/0x30 <3>[ 14.354768] <3>[ 14.354879] <3>[ 14.354968] Allocated by task 262: <4>[ 14.355143] kasan_save_stack+0x3d/0x60 <4>[ 14.355324] kasan_save_track+0x18/0x40 <4>[ 14.355473] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.355695] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.355896] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.356130] kasan_bitops_generic+0x93/0x1c0 <4>[ 14.356322] kunit_try_run_case+0x1b3/0x490 <4>[ 14.356524] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.356820] kthread+0x257/0x310 <4>[ 14.356994] ret_from_fork+0x41/0x80 <4>[ 14.357172] ret_from_fork_asm+0x1a/0x30 <3>[ 14.357354] <3>[ 14.357439] The buggy address belongs to the object at ffff888102580980 <3>[ 14.357439] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.357935] The buggy address is located 8 bytes inside of <3>[ 14.357935] allocated 9-byte region [ffff888102580980, ffff888102580989) <3>[ 14.358380] <3>[ 14.358474] The buggy address belongs to the physical page: <4>[ 14.358723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102580 <4>[ 14.359062] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.359270] page_type: 0xfdffffff(slab) <4>[ 14.359468] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 <4>[ 14.359851] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 <4>[ 14.360149] page dumped because: kasan: bad access detected <3>[ 14.360364] <3>[ 14.360445] Memory state around the buggy address: <3>[ 14.360653] ffff888102580880: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc <3>[ 14.360953] ffff888102580900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.361249] >ffff888102580980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.361514] ^ <3>[ 14.361645] ffff888102580a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.361914] ffff888102580a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.362141] ================================================================== <6>[ 14.363995] ok 62 kasan_bitops_generic <6>[ 14.365436] ok 63 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 14.367265] ================================================================== <3>[ 14.368353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 <3>[ 14.368982] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.369588] <3>[ 14.369866] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.370601] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.371045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.371665] Call Trace: <3>[ 14.371961] <3>[ 14.372248] dump_stack_lvl+0x73/0xb0 <3>[ 14.372631] print_report+0xd1/0x640 <3>[ 14.373018] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.373425] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.373957] kasan_report+0x102/0x140 <3>[ 14.374325] ? kasan_atomics_helper+0x4bbe/0x5450 <3>[ 14.374769] ? kasan_atomics_helper+0x4bbe/0x5450 <3>[ 14.375208] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.375628] kasan_atomics_helper+0x4bbe/0x5450 <3>[ 14.376058] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.376462] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.376967] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.377391] kasan_atomics+0x1dd/0x310 <3>[ 14.377798] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.378194] ? __schedule+0xbca/0x2590 <3>[ 14.378563] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.379003] ? ktime_get_ts64+0x84/0x230 <3>[ 14.379385] kunit_try_run_case+0x1b3/0x490 <3>[ 14.379826] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.380236] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.380650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.381083] ? __kthread_parkme+0x82/0x160 <3>[ 14.381470] ? preempt_count_sub+0x50/0x80 <3>[ 14.381920] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.382335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.383008] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.383492] kthread+0x257/0x310 <3>[ 14.383838] ? __pfx_kthread+0x10/0x10 <3>[ 14.384220] ret_from_fork+0x41/0x80 <3>[ 14.384553] ? __pfx_kthread+0x10/0x10 <3>[ 14.384967] ret_from_fork_asm+0x1a/0x30 <3>[ 14.385357] <3>[ 14.385599] <3>[ 14.385833] Allocated by task 266: <4>[ 14.386205] kasan_save_stack+0x3d/0x60 <4>[ 14.386590] kasan_save_track+0x18/0x40 <4>[ 14.387044] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.387408] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.387768] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.388310] kasan_atomics+0x96/0x310 <4>[ 14.388678] kunit_try_run_case+0x1b3/0x490 <4>[ 14.389090] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.389551] kthread+0x257/0x310 <4>[ 14.389937] ret_from_fork+0x41/0x80 <4>[ 14.390284] ret_from_fork_asm+0x1a/0x30 <3>[ 14.390651] <3>[ 14.390826] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.390826] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.391798] The buggy address is located 0 bytes to the right of <3>[ 14.391798] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.392664] <3>[ 14.392926] The buggy address belongs to the physical page: <4>[ 14.393384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.394043] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.394459] page_type: 0xfdffffff(slab) <4>[ 14.394838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.395529] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.396072] page dumped because: kasan: bad access detected <3>[ 14.396584] <3>[ 14.396739] Memory state around the buggy address: <3>[ 14.397215] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.397739] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.398420] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.398955] ^ <3>[ 14.399389] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.400024] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.400537] ================================================================== <3>[ 14.402135] ================================================================== <3>[ 14.402648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 <3>[ 14.403285] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.403938] <3>[ 14.404141] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.404953] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.405352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.406084] Call Trace: <3>[ 14.406354] <3>[ 14.406636] dump_stack_lvl+0x73/0xb0 <3>[ 14.407076] print_report+0xd1/0x640 <3>[ 14.407440] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.407880] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.408336] kasan_report+0x102/0x140 <3>[ 14.408705] ? kasan_atomics_helper+0x4ba4/0x5450 <3>[ 14.409119] ? kasan_atomics_helper+0x4ba4/0x5450 <3>[ 14.409537] __asan_report_store4_noabort+0x1b/0x30 <3>[ 14.409995] kasan_atomics_helper+0x4ba4/0x5450 <3>[ 14.410394] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.410837] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.411264] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.411674] kasan_atomics+0x1dd/0x310 <3>[ 14.412056] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.412432] ? __schedule+0xbca/0x2590 <3>[ 14.412839] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.413201] ? ktime_get_ts64+0x84/0x230 <3>[ 14.413559] kunit_try_run_case+0x1b3/0x490 <3>[ 14.414027] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.414451] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.414916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.415354] ? __kthread_parkme+0x82/0x160 <3>[ 14.415770] ? preempt_count_sub+0x50/0x80 <3>[ 14.416161] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.416575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.417121] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.417576] kthread+0x257/0x310 <3>[ 14.417979] ? __pfx_kthread+0x10/0x10 <3>[ 14.418347] ret_from_fork+0x41/0x80 <3>[ 14.418784] ? __pfx_kthread+0x10/0x10 <3>[ 14.419171] ret_from_fork_asm+0x1a/0x30 <3>[ 14.419601] <3>[ 14.419858] <3>[ 14.420030] Allocated by task 266: <4>[ 14.420317] kasan_save_stack+0x3d/0x60 <4>[ 14.420619] kasan_save_track+0x18/0x40 <4>[ 14.420953] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.421267] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.421543] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.421881] kasan_atomics+0x96/0x310 <4>[ 14.422118] kunit_try_run_case+0x1b3/0x490 <4>[ 14.422438] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.422835] kthread+0x257/0x310 <4>[ 14.423054] ret_from_fork+0x41/0x80 <4>[ 14.423354] ret_from_fork_asm+0x1a/0x30 <3>[ 14.423658] <3>[ 14.423844] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.423844] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.424594] The buggy address is located 0 bytes to the right of <3>[ 14.424594] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.425376] <3>[ 14.425528] The buggy address belongs to the physical page: <4>[ 14.425966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.426464] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.426852] page_type: 0xfdffffff(slab) <4>[ 14.427178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.427626] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.428108] page dumped because: kasan: bad access detected <3>[ 14.428453] <3>[ 14.428579] Memory state around the buggy address: <3>[ 14.428962] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.429397] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.429851] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.430285] ^ <3>[ 14.430620] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.431112] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.431529] ================================================================== <3>[ 14.432320] ================================================================== <3>[ 14.432897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 <3>[ 14.433361] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.433846] <3>[ 14.434039] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.434648] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.435000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.435525] Call Trace: <3>[ 14.435788] <3>[ 14.435976] dump_stack_lvl+0x73/0xb0 <3>[ 14.436293] print_report+0xd1/0x640 <3>[ 14.436589] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.436979] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.437368] kasan_report+0x102/0x140 <3>[ 14.437687] ? kasan_atomics_helper+0x4b8a/0x5450 <3>[ 14.438068] ? kasan_atomics_helper+0x4b8a/0x5450 <3>[ 14.438421] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.438821] kasan_atomics_helper+0x4b8a/0x5450 <3>[ 14.439226] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.439543] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.439901] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.440213] kasan_atomics+0x1dd/0x310 <3>[ 14.440443] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.440834] ? __schedule+0xbca/0x2590 <3>[ 14.441117] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.441450] ? ktime_get_ts64+0x84/0x230 <3>[ 14.441790] kunit_try_run_case+0x1b3/0x490 <3>[ 14.442074] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.442451] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.442827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.443193] ? __kthread_parkme+0x82/0x160 <3>[ 14.443552] ? preempt_count_sub+0x50/0x80 <3>[ 14.443842] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.444014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.444276] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.444480] kthread+0x257/0x310 <3>[ 14.444637] ? __pfx_kthread+0x10/0x10 <3>[ 14.444816] ret_from_fork+0x41/0x80 <3>[ 14.444980] ? __pfx_kthread+0x10/0x10 <3>[ 14.445186] ret_from_fork_asm+0x1a/0x30 <3>[ 14.445339] <3>[ 14.445449] <3>[ 14.445570] Allocated by task 266: <4>[ 14.445833] kasan_save_stack+0x3d/0x60 <4>[ 14.445984] kasan_save_track+0x18/0x40 <4>[ 14.446180] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.446376] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.446533] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.446825] kasan_atomics+0x96/0x310 <4>[ 14.446992] kunit_try_run_case+0x1b3/0x490 <4>[ 14.447193] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.447417] kthread+0x257/0x310 <4>[ 14.447543] ret_from_fork+0x41/0x80 <4>[ 14.447792] ret_from_fork_asm+0x1a/0x30 <3>[ 14.447924] <3>[ 14.447995] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.447995] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.448401] The buggy address is located 0 bytes to the right of <3>[ 14.448401] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.448872] <3>[ 14.448944] The buggy address belongs to the physical page: <4>[ 14.449168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.449469] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.449641] page_type: 0xfdffffff(slab) <4>[ 14.449879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.450099] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.450379] page dumped because: kasan: bad access detected <3>[ 14.450560] <3>[ 14.450672] Memory state around the buggy address: <3>[ 14.450930] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.451134] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.451383] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.451659] ^ <3>[ 14.451844] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.452115] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.452353] ================================================================== <3>[ 14.452746] ================================================================== <3>[ 14.452999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 <3>[ 14.453303] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.453609] <3>[ 14.453806] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.454208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.454389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.454790] Call Trace: <3>[ 14.454906] <3>[ 14.454996] dump_stack_lvl+0x73/0xb0 <3>[ 14.455233] print_report+0xd1/0x640 <3>[ 14.455438] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.455609] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.455914] kasan_report+0x102/0x140 <3>[ 14.456061] ? kasan_atomics_helper+0x4b70/0x5450 <3>[ 14.456282] ? kasan_atomics_helper+0x4b70/0x5450 <3>[ 14.456449] __asan_report_store4_noabort+0x1b/0x30 <3>[ 14.456708] kasan_atomics_helper+0x4b70/0x5450 <3>[ 14.456905] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.457100] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.457336] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.457546] kasan_atomics+0x1dd/0x310 <3>[ 14.457842] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.457999] ? __schedule+0xbca/0x2590 <3>[ 14.458234] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.458411] ? ktime_get_ts64+0x84/0x230 <3>[ 14.458627] kunit_try_run_case+0x1b3/0x490 <3>[ 14.458809] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.459057] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.459256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.459497] ? __kthread_parkme+0x82/0x160 <3>[ 14.459668] ? preempt_count_sub+0x50/0x80 <3>[ 14.459904] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.460076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.460343] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.460570] kthread+0x257/0x310 <3>[ 14.460785] ? __pfx_kthread+0x10/0x10 <3>[ 14.460945] ret_from_fork+0x41/0x80 <3>[ 14.461115] ? __pfx_kthread+0x10/0x10 <3>[ 14.461322] ret_from_fork_asm+0x1a/0x30 <3>[ 14.461494] <3>[ 14.461619] <3>[ 14.461756] Allocated by task 266: <4>[ 14.461923] kasan_save_stack+0x3d/0x60 <4>[ 14.462087] kasan_save_track+0x18/0x40 <4>[ 14.462305] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.462511] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.462758] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.462970] kasan_atomics+0x96/0x310 <4>[ 14.463141] kunit_try_run_case+0x1b3/0x490 <4>[ 14.463308] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.463581] kthread+0x257/0x310 <4>[ 14.463813] ret_from_fork+0x41/0x80 <4>[ 14.464007] ret_from_fork_asm+0x1a/0x30 <3>[ 14.464201] <3>[ 14.464288] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.464288] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.464780] The buggy address is located 0 bytes to the right of <3>[ 14.464780] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.465204] <3>[ 14.465294] The buggy address belongs to the physical page: <4>[ 14.465531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.465871] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.466086] page_type: 0xfdffffff(slab) <4>[ 14.466292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.466590] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.466914] page dumped because: kasan: bad access detected <3>[ 14.467086] <3>[ 14.467161] Memory state around the buggy address: <3>[ 14.467376] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.467659] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.467930] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.468168] ^ <3>[ 14.468359] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.468573] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.468910] ================================================================== <3>[ 14.469263] ================================================================== <3>[ 14.469531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 <3>[ 14.469938] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.470150] <3>[ 14.470271] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.470642] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.470869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.471185] Call Trace: <3>[ 14.471294] <3>[ 14.471443] dump_stack_lvl+0x73/0xb0 <3>[ 14.471598] print_report+0xd1/0x640 <3>[ 14.471821] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.472012] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.472234] kasan_report+0x102/0x140 <3>[ 14.472410] ? kasan_atomics_helper+0x3e0/0x5450 <3>[ 14.472607] ? kasan_atomics_helper+0x3e0/0x5450 <3>[ 14.472860] kasan_check_range+0x10c/0x1c0 <3>[ 14.473026] __kasan_check_read+0x15/0x20 <3>[ 14.473233] kasan_atomics_helper+0x3e0/0x5450 <3>[ 14.473421] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.473630] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.473900] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.474073] kasan_atomics+0x1dd/0x310 <3>[ 14.474274] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.474500] ? __schedule+0xbca/0x2590 <3>[ 14.474677] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.474842] ? ktime_get_ts64+0x84/0x230 <3>[ 14.475070] kunit_try_run_case+0x1b3/0x490 <3>[ 14.475256] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.475453] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.475663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.475884] ? __kthread_parkme+0x82/0x160 <3>[ 14.476066] ? preempt_count_sub+0x50/0x80 <3>[ 14.476234] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.476446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.476691] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.476923] kthread+0x257/0x310 <3>[ 14.477070] ? __pfx_kthread+0x10/0x10 <3>[ 14.477225] ret_from_fork+0x41/0x80 <3>[ 14.477421] ? __pfx_kthread+0x10/0x10 <3>[ 14.477591] ret_from_fork_asm+0x1a/0x30 <3>[ 14.477825] <3>[ 14.477943] <3>[ 14.478039] Allocated by task 266: <4>[ 14.478195] kasan_save_stack+0x3d/0x60 <4>[ 14.478393] kasan_save_track+0x18/0x40 <4>[ 14.478564] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.478785] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.478981] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.479162] kasan_atomics+0x96/0x310 <4>[ 14.479306] kunit_try_run_case+0x1b3/0x490 <4>[ 14.479500] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.479739] kthread+0x257/0x310 <4>[ 14.479910] ret_from_fork+0x41/0x80 <4>[ 14.480042] ret_from_fork_asm+0x1a/0x30 <3>[ 14.480241] <3>[ 14.480318] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.480318] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.480724] The buggy address is located 0 bytes to the right of <3>[ 14.480724] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.481181] <3>[ 14.481257] The buggy address belongs to the physical page: <4>[ 14.481485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.481802] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.481954] page_type: 0xfdffffff(slab) <4>[ 14.482141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.482405] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.482659] page dumped because: kasan: bad access detected <3>[ 14.482932] <3>[ 14.483021] Memory state around the buggy address: <3>[ 14.483223] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.483465] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.483722] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.484007] ^ <3>[ 14.484201] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.484464] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.484728] ================================================================== <3>[ 14.485034] ================================================================== <3>[ 14.485287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 <3>[ 14.485607] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.485894] <3>[ 14.486018] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.486377] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.486569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.486918] Call Trace: <3>[ 14.487023] <3>[ 14.487143] dump_stack_lvl+0x73/0xb0 <3>[ 14.487352] print_report+0xd1/0x640 <3>[ 14.487534] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.487742] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.487974] kasan_report+0x102/0x140 <3>[ 14.488119] ? kasan_atomics_helper+0x4b56/0x5450 <3>[ 14.488338] ? kasan_atomics_helper+0x4b56/0x5450 <3>[ 14.488546] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.488791] kasan_atomics_helper+0x4b56/0x5450 <3>[ 14.488962] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.489174] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.489380] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.489591] kasan_atomics+0x1dd/0x310 <3>[ 14.489802] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.489958] ? __schedule+0xbca/0x2590 <3>[ 14.490149] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.490334] ? ktime_get_ts64+0x84/0x230 <3>[ 14.490500] kunit_try_run_case+0x1b3/0x490 <3>[ 14.490715] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.490952] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.491109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.491346] ? __kthread_parkme+0x82/0x160 <3>[ 14.491506] ? preempt_count_sub+0x50/0x80 <3>[ 14.491738] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.491918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.492170] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.492391] kthread+0x257/0x310 <3>[ 14.492545] ? __pfx_kthread+0x10/0x10 <3>[ 14.492766] ret_from_fork+0x41/0x80 <3>[ 14.492915] ? __pfx_kthread+0x10/0x10 <3>[ 14.493122] ret_from_fork_asm+0x1a/0x30 <3>[ 14.493279] <3>[ 14.493403] <3>[ 14.493513] Allocated by task 266: <4>[ 14.493724] kasan_save_stack+0x3d/0x60 <4>[ 14.493870] kasan_save_track+0x18/0x40 <4>[ 14.494055] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.494249] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.494395] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.494572] kasan_atomics+0x96/0x310 <4>[ 14.494798] kunit_try_run_case+0x1b3/0x490 <4>[ 14.494969] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.495195] kthread+0x257/0x310 <4>[ 14.495321] ret_from_fork+0x41/0x80 <4>[ 14.495503] ret_from_fork_asm+0x1a/0x30 <3>[ 14.495709] <3>[ 14.495823] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.495823] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.496213] The buggy address is located 0 bytes to the right of <3>[ 14.496213] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.496624] <3>[ 14.496750] The buggy address belongs to the physical page: <4>[ 14.496975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.497247] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.497438] page_type: 0xfdffffff(slab) <4>[ 14.497616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.497901] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.498175] page dumped because: kasan: bad access detected <3>[ 14.498373] <3>[ 14.498464] Memory state around the buggy address: <3>[ 14.498712] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.498961] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.499241] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.499470] ^ <3>[ 14.499624] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.499943] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.500183] ================================================================== <3>[ 14.500564] ================================================================== <3>[ 14.500875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 <3>[ 14.501191] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.501485] <3>[ 14.501575] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.502031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.502209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.502519] Call Trace: <3>[ 14.502616] <3>[ 14.502797] dump_stack_lvl+0x73/0xb0 <3>[ 14.502980] print_report+0xd1/0x640 <3>[ 14.503165] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.503377] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.503610] kasan_report+0x102/0x140 <3>[ 14.503814] ? kasan_atomics_helper+0x4a1/0x5450 <3>[ 14.503985] ? kasan_atomics_helper+0x4a1/0x5450 <3>[ 14.504231] kasan_check_range+0x10c/0x1c0 <3>[ 14.504428] __kasan_check_write+0x18/0x20 <3>[ 14.504631] kasan_atomics_helper+0x4a1/0x5450 <3>[ 14.504795] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.505041] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.505236] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.505475] kasan_atomics+0x1dd/0x310 <3>[ 14.505630] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.505880] ? __schedule+0xbca/0x2590 <3>[ 14.506026] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.506250] ? ktime_get_ts64+0x84/0x230 <3>[ 14.506444] kunit_try_run_case+0x1b3/0x490 <3>[ 14.506637] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.506829] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.507082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.507302] ? __kthread_parkme+0x82/0x160 <3>[ 14.507528] ? preempt_count_sub+0x50/0x80 <3>[ 14.507739] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.507943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.508211] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.508439] kthread+0x257/0x310 <3>[ 14.508590] ? __pfx_kthread+0x10/0x10 <3>[ 14.508827] ret_from_fork+0x41/0x80 <3>[ 14.508962] ? __pfx_kthread+0x10/0x10 <3>[ 14.509158] ret_from_fork_asm+0x1a/0x30 <3>[ 14.509379] <3>[ 14.509473] <3>[ 14.509549] Allocated by task 266: <4>[ 14.509770] kasan_save_stack+0x3d/0x60 <4>[ 14.509936] kasan_save_track+0x18/0x40 <4>[ 14.510093] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.510313] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.510469] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.510709] kasan_atomics+0x96/0x310 <4>[ 14.510853] kunit_try_run_case+0x1b3/0x490 <4>[ 14.511013] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.511264] kthread+0x257/0x310 <4>[ 14.511446] ret_from_fork+0x41/0x80 <4>[ 14.511605] ret_from_fork_asm+0x1a/0x30 <3>[ 14.511839] <3>[ 14.511923] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.511923] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.512352] The buggy address is located 0 bytes to the right of <3>[ 14.512352] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.512829] <3>[ 14.512918] The buggy address belongs to the physical page: <4>[ 14.513104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.513423] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.513620] page_type: 0xfdffffff(slab) <4>[ 14.513833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.514119] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.514391] page dumped because: kasan: bad access detected <3>[ 14.514606] <3>[ 14.514710] Memory state around the buggy address: <3>[ 14.514950] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.515197] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.515447] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.515720] ^ <3>[ 14.515914] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.516199] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.516454] ================================================================== <3>[ 14.516828] ================================================================== <3>[ 14.517082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 <3>[ 14.517375] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.517699] <3>[ 14.517834] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.518225] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.518428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.518784] Call Trace: <3>[ 14.518915] <3>[ 14.519018] dump_stack_lvl+0x73/0xb0 <3>[ 14.519254] print_report+0xd1/0x640 <3>[ 14.519467] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.519704] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.519924] kasan_report+0x102/0x140 <3>[ 14.520119] ? kasan_atomics_helper+0x4b3c/0x5450 <3>[ 14.520341] ? kasan_atomics_helper+0x4b3c/0x5450 <3>[ 14.520632] __asan_report_store4_noabort+0x1b/0x30 <3>[ 14.520905] kasan_atomics_helper+0x4b3c/0x5450 <3>[ 14.521132] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.521354] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.521597] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.521920] kasan_atomics+0x1dd/0x310 <3>[ 14.522130] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.522366] ? __schedule+0xbca/0x2590 <3>[ 14.522590] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.522843] ? ktime_get_ts64+0x84/0x230 <3>[ 14.523097] kunit_try_run_case+0x1b3/0x490 <3>[ 14.523351] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.523601] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.523926] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.524174] ? __kthread_parkme+0x82/0x160 <3>[ 14.524404] ? preempt_count_sub+0x50/0x80 <3>[ 14.524613] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.524911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.525177] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.525429] kthread+0x257/0x310 <3>[ 14.525646] ? __pfx_kthread+0x10/0x10 <3>[ 14.525836] ret_from_fork+0x41/0x80 <3>[ 14.526041] ? __pfx_kthread+0x10/0x10 <3>[ 14.526233] ret_from_fork_asm+0x1a/0x30 <3>[ 14.526477] <3>[ 14.526596] <3>[ 14.526726] Allocated by task 266: <4>[ 14.526931] kasan_save_stack+0x3d/0x60 <4>[ 14.527129] kasan_save_track+0x18/0x40 <4>[ 14.527311] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.527473] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.527628] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.527864] kasan_atomics+0x96/0x310 <4>[ 14.528012] kunit_try_run_case+0x1b3/0x490 <4>[ 14.528199] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.528420] kthread+0x257/0x310 <4>[ 14.528562] ret_from_fork+0x41/0x80 <4>[ 14.528735] ret_from_fork_asm+0x1a/0x30 <3>[ 14.528964] <3>[ 14.529062] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.529062] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.529428] The buggy address is located 0 bytes to the right of <3>[ 14.529428] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.529849] <3>[ 14.529951] The buggy address belongs to the physical page: <4>[ 14.530135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.530397] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.530599] page_type: 0xfdffffff(slab) <4>[ 14.530797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.531083] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.531326] page dumped because: kasan: bad access detected <3>[ 14.531508] <3>[ 14.531582] Memory state around the buggy address: <3>[ 14.531784] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.532015] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.532225] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.532428] ^ <3>[ 14.532580] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.532932] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.533224] ================================================================== <3>[ 14.533608] ================================================================== <3>[ 14.533957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 <3>[ 14.534265] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.534525] <3>[ 14.534616] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.535086] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.535299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.535646] Call Trace: <3>[ 14.535810] <3>[ 14.535941] dump_stack_lvl+0x73/0xb0 <3>[ 14.536130] print_report+0xd1/0x640 <3>[ 14.536276] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.536427] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.536606] kasan_report+0x102/0x140 <3>[ 14.536786] ? kasan_atomics_helper+0x566/0x5450 <3>[ 14.536996] ? kasan_atomics_helper+0x566/0x5450 <3>[ 14.537216] kasan_check_range+0x10c/0x1c0 <3>[ 14.537396] __kasan_check_write+0x18/0x20 <3>[ 14.537594] kasan_atomics_helper+0x566/0x5450 <3>[ 14.537827] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.538042] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.538286] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.538499] kasan_atomics+0x1dd/0x310 <3>[ 14.538694] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.538919] ? __schedule+0xbca/0x2590 <3>[ 14.539099] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.539252] ? ktime_get_ts64+0x84/0x230 <3>[ 14.539394] kunit_try_run_case+0x1b3/0x490 <3>[ 14.539576] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.539806] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.540019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.540230] ? __kthread_parkme+0x82/0x160 <3>[ 14.540417] ? preempt_count_sub+0x50/0x80 <3>[ 14.540615] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.540899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.541196] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.541443] kthread+0x257/0x310 <3>[ 14.541619] ? __pfx_kthread+0x10/0x10 <3>[ 14.541829] ret_from_fork+0x41/0x80 <3>[ 14.542016] ? __pfx_kthread+0x10/0x10 <3>[ 14.542183] ret_from_fork_asm+0x1a/0x30 <3>[ 14.542399] <3>[ 14.542571] <3>[ 14.542668] Allocated by task 266: <4>[ 14.542842] kasan_save_stack+0x3d/0x60 <4>[ 14.543007] kasan_save_track+0x18/0x40 <4>[ 14.543182] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.543386] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.543588] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.543856] kasan_atomics+0x96/0x310 <4>[ 14.544035] kunit_try_run_case+0x1b3/0x490 <4>[ 14.544190] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.544384] kthread+0x257/0x310 <4>[ 14.544522] ret_from_fork+0x41/0x80 <4>[ 14.544708] ret_from_fork_asm+0x1a/0x30 <3>[ 14.544856] <3>[ 14.544939] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.544939] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.545305] The buggy address is located 0 bytes to the right of <3>[ 14.545305] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.545842] <3>[ 14.545933] The buggy address belongs to the physical page: <4>[ 14.546150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.546396] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.546570] page_type: 0xfdffffff(slab) <4>[ 14.546768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.547090] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.547348] page dumped because: kasan: bad access detected <3>[ 14.547548] <3>[ 14.547652] Memory state around the buggy address: <3>[ 14.547884] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.548118] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.548370] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.548624] ^ <3>[ 14.548890] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.549171] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.549433] ================================================================== <3>[ 14.549818] ================================================================== <3>[ 14.550114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 <3>[ 14.550431] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.550766] <3>[ 14.550875] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.551312] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.551523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.551919] Call Trace: <3>[ 14.552049] <3>[ 14.552183] dump_stack_lvl+0x73/0xb0 <3>[ 14.552390] print_report+0xd1/0x640 <3>[ 14.552566] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.552799] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.553061] kasan_report+0x102/0x140 <3>[ 14.553246] ? kasan_atomics_helper+0x5ff/0x5450 <3>[ 14.553441] ? kasan_atomics_helper+0x5ff/0x5450 <3>[ 14.553658] kasan_check_range+0x10c/0x1c0 <3>[ 14.553855] __kasan_check_write+0x18/0x20 <3>[ 14.554009] kasan_atomics_helper+0x5ff/0x5450 <3>[ 14.554216] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.554403] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.554587] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.554862] kasan_atomics+0x1dd/0x310 <3>[ 14.555066] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.555251] ? __schedule+0xbca/0x2590 <3>[ 14.555424] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.555614] ? ktime_get_ts64+0x84/0x230 <3>[ 14.555840] kunit_try_run_case+0x1b3/0x490 <3>[ 14.556039] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.556225] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.556390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.556578] ? __kthread_parkme+0x82/0x160 <3>[ 14.556832] ? preempt_count_sub+0x50/0x80 <3>[ 14.556996] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.557169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.557367] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.557552] kthread+0x257/0x310 <3>[ 14.557704] ? __pfx_kthread+0x10/0x10 <3>[ 14.557882] ret_from_fork+0x41/0x80 <3>[ 14.558014] ? __pfx_kthread+0x10/0x10 <3>[ 14.558165] ret_from_fork_asm+0x1a/0x30 <3>[ 14.558314] <3>[ 14.558401] <3>[ 14.558480] Allocated by task 266: <4>[ 14.558611] kasan_save_stack+0x3d/0x60 <4>[ 14.558881] kasan_save_track+0x18/0x40 <4>[ 14.559052] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.559213] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.559348] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.559498] kasan_atomics+0x96/0x310 <4>[ 14.559664] kunit_try_run_case+0x1b3/0x490 <4>[ 14.559871] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.560045] kthread+0x257/0x310 <4>[ 14.560167] ret_from_fork+0x41/0x80 <4>[ 14.560311] ret_from_fork_asm+0x1a/0x30 <3>[ 14.560451] <3>[ 14.560534] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.560534] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.560967] The buggy address is located 0 bytes to the right of <3>[ 14.560967] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.561328] <3>[ 14.561416] The buggy address belongs to the physical page: <4>[ 14.561588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.561899] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.562140] page_type: 0xfdffffff(slab) <4>[ 14.562301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.562619] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.562991] page dumped because: kasan: bad access detected <3>[ 14.563238] <3>[ 14.563316] Memory state around the buggy address: <3>[ 14.563539] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.563868] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.564150] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.564427] ^ <3>[ 14.564666] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.564923] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.565236] ================================================================== <3>[ 14.565797] ================================================================== <3>[ 14.566172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 <3>[ 14.566489] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.566832] <3>[ 14.567014] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.567429] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.567613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.567961] Call Trace: <3>[ 14.568069] <3>[ 14.568252] dump_stack_lvl+0x73/0xb0 <3>[ 14.568429] print_report+0xd1/0x640 <3>[ 14.568593] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.568838] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.569075] kasan_report+0x102/0x140 <3>[ 14.569285] ? kasan_atomics_helper+0x698/0x5450 <3>[ 14.569543] ? kasan_atomics_helper+0x698/0x5450 <3>[ 14.569753] kasan_check_range+0x10c/0x1c0 <3>[ 14.569975] __kasan_check_write+0x18/0x20 <3>[ 14.570208] kasan_atomics_helper+0x698/0x5450 <3>[ 14.570402] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.570618] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.570881] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.571130] kasan_atomics+0x1dd/0x310 <3>[ 14.571335] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.571551] ? __schedule+0xbca/0x2590 <3>[ 14.571747] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.571946] ? ktime_get_ts64+0x84/0x230 <3>[ 14.572161] kunit_try_run_case+0x1b3/0x490 <3>[ 14.572353] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.572573] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.572810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.573047] ? __kthread_parkme+0x82/0x160 <3>[ 14.573239] ? preempt_count_sub+0x50/0x80 <3>[ 14.573427] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.573630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.573881] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.574124] kthread+0x257/0x310 <3>[ 14.574285] ? __pfx_kthread+0x10/0x10 <3>[ 14.574485] ret_from_fork+0x41/0x80 <3>[ 14.574672] ? __pfx_kthread+0x10/0x10 <3>[ 14.574854] ret_from_fork_asm+0x1a/0x30 <3>[ 14.575058] <3>[ 14.575178] <3>[ 14.575275] Allocated by task 266: <4>[ 14.575437] kasan_save_stack+0x3d/0x60 <4>[ 14.575620] kasan_save_track+0x18/0x40 <4>[ 14.575824] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.576071] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.576299] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.576551] kasan_atomics+0x96/0x310 <4>[ 14.576786] kunit_try_run_case+0x1b3/0x490 <4>[ 14.576990] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.577239] kthread+0x257/0x310 <4>[ 14.577435] ret_from_fork+0x41/0x80 <4>[ 14.577594] ret_from_fork_asm+0x1a/0x30 <3>[ 14.577773] <3>[ 14.577929] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.577929] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.578372] The buggy address is located 0 bytes to the right of <3>[ 14.578372] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.578864] <3>[ 14.578982] The buggy address belongs to the physical page: <4>[ 14.579244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.579541] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.579773] page_type: 0xfdffffff(slab) <4>[ 14.579949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.580252] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.580503] page dumped because: kasan: bad access detected <3>[ 14.580681] <3>[ 14.580754] Memory state around the buggy address: <3>[ 14.580905] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.581115] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.581328] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.581535] ^ <3>[ 14.581692] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.581916] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.582129] ================================================================== <3>[ 14.582940] ================================================================== <3>[ 14.583188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 <3>[ 14.583416] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.583639] <3>[ 14.583724] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.584057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.584239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.584568] Call Trace: <3>[ 14.584730] <3>[ 14.584854] dump_stack_lvl+0x73/0xb0 <3>[ 14.585093] print_report+0xd1/0x640 <3>[ 14.585279] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.585508] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.585773] kasan_report+0x102/0x140 <3>[ 14.586012] ? kasan_atomics_helper+0x730/0x5450 <3>[ 14.586239] ? kasan_atomics_helper+0x730/0x5450 <3>[ 14.586522] kasan_check_range+0x10c/0x1c0 <3>[ 14.586741] __kasan_check_write+0x18/0x20 <3>[ 14.586968] kasan_atomics_helper+0x730/0x5450 <3>[ 14.587234] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.587461] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.587694] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.587957] kasan_atomics+0x1dd/0x310 <3>[ 14.588134] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.588413] ? __schedule+0xbca/0x2590 <3>[ 14.588576] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.588803] ? ktime_get_ts64+0x84/0x230 <3>[ 14.589028] kunit_try_run_case+0x1b3/0x490 <3>[ 14.589237] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.589491] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.589693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.589925] ? __kthread_parkme+0x82/0x160 <3>[ 14.590115] ? preempt_count_sub+0x50/0x80 <3>[ 14.590378] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.590588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.590853] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.591173] kthread+0x257/0x310 <3>[ 14.591349] ? __pfx_kthread+0x10/0x10 <3>[ 14.591540] ret_from_fork+0x41/0x80 <3>[ 14.591764] ? __pfx_kthread+0x10/0x10 <3>[ 14.591927] ret_from_fork_asm+0x1a/0x30 <3>[ 14.592164] <3>[ 14.592263] <3>[ 14.592405] Allocated by task 266: <4>[ 14.592533] kasan_save_stack+0x3d/0x60 <4>[ 14.592772] kasan_save_track+0x18/0x40 <4>[ 14.592938] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.593138] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.593336] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.593548] kasan_atomics+0x96/0x310 <4>[ 14.593702] kunit_try_run_case+0x1b3/0x490 <4>[ 14.593970] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.594202] kthread+0x257/0x310 <4>[ 14.594421] ret_from_fork+0x41/0x80 <4>[ 14.594580] ret_from_fork_asm+0x1a/0x30 <3>[ 14.594728] <3>[ 14.594879] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.594879] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.595305] The buggy address is located 0 bytes to the right of <3>[ 14.595305] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.595796] <3>[ 14.595880] The buggy address belongs to the physical page: <4>[ 14.596068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.596422] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.596652] page_type: 0xfdffffff(slab) <4>[ 14.596865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.597221] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.597510] page dumped because: kasan: bad access detected <3>[ 14.597748] <3>[ 14.597853] Memory state around the buggy address: <3>[ 14.598060] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.598343] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.598637] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.598908] ^ <3>[ 14.599091] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.599378] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.599669] ================================================================== <3>[ 14.600182] ================================================================== <3>[ 14.600492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 <3>[ 14.600743] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.600969] <3>[ 14.601050] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.601375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.601576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.601918] Call Trace: <3>[ 14.602047] <3>[ 14.602170] dump_stack_lvl+0x73/0xb0 <3>[ 14.602345] print_report+0xd1/0x640 <3>[ 14.602512] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.602699] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.602942] kasan_report+0x102/0x140 <3>[ 14.603134] ? kasan_atomics_helper+0x7c8/0x5450 <3>[ 14.603350] ? kasan_atomics_helper+0x7c8/0x5450 <3>[ 14.603516] kasan_check_range+0x10c/0x1c0 <3>[ 14.603672] __kasan_check_write+0x18/0x20 <3>[ 14.603814] kasan_atomics_helper+0x7c8/0x5450 <3>[ 14.603973] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.604138] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.604301] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.604471] kasan_atomics+0x1dd/0x310 <3>[ 14.604613] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.604769] ? __schedule+0xbca/0x2590 <3>[ 14.604910] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.605051] ? ktime_get_ts64+0x84/0x230 <3>[ 14.605194] kunit_try_run_case+0x1b3/0x490 <3>[ 14.605345] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.605512] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.605709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.605935] ? __kthread_parkme+0x82/0x160 <3>[ 14.606105] ? preempt_count_sub+0x50/0x80 <3>[ 14.606289] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.606450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.606661] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.606855] kthread+0x257/0x310 <3>[ 14.607018] ? __pfx_kthread+0x10/0x10 <3>[ 14.607194] ret_from_fork+0x41/0x80 <3>[ 14.607371] ? __pfx_kthread+0x10/0x10 <3>[ 14.607554] ret_from_fork_asm+0x1a/0x30 <3>[ 14.607751] <3>[ 14.607863] <3>[ 14.607952] Allocated by task 266: <4>[ 14.608114] kasan_save_stack+0x3d/0x60 <4>[ 14.608298] kasan_save_track+0x18/0x40 <4>[ 14.608486] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.608699] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.608870] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.609038] kasan_atomics+0x96/0x310 <4>[ 14.609171] kunit_try_run_case+0x1b3/0x490 <4>[ 14.609352] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.609587] kthread+0x257/0x310 <4>[ 14.609768] ret_from_fork+0x41/0x80 <4>[ 14.609962] ret_from_fork_asm+0x1a/0x30 <3>[ 14.610148] <3>[ 14.610239] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.610239] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.610711] The buggy address is located 0 bytes to the right of <3>[ 14.610711] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.611226] <3>[ 14.611382] The buggy address belongs to the physical page: <4>[ 14.611602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.611958] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.612242] page_type: 0xfdffffff(slab) <4>[ 14.612461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.612818] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.613157] page dumped because: kasan: bad access detected <3>[ 14.613413] <3>[ 14.613566] Memory state around the buggy address: <3>[ 14.613797] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.614097] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.614415] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.614739] ^ <3>[ 14.614952] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.615277] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.615598] ================================================================== <3>[ 14.616283] ================================================================== <3>[ 14.616634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 <3>[ 14.616948] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.617257] <3>[ 14.617353] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.617779] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.618024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.618457] Call Trace: <3>[ 14.618631] <3>[ 14.618732] dump_stack_lvl+0x73/0xb0 <3>[ 14.618920] print_report+0xd1/0x640 <3>[ 14.619137] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.619355] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.619561] kasan_report+0x102/0x140 <3>[ 14.619764] ? kasan_atomics_helper+0x861/0x5450 <3>[ 14.620072] ? kasan_atomics_helper+0x861/0x5450 <3>[ 14.620393] kasan_check_range+0x10c/0x1c0 <3>[ 14.620683] __kasan_check_write+0x18/0x20 <3>[ 14.620970] kasan_atomics_helper+0x861/0x5450 <3>[ 14.621226] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.621501] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.621762] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.622022] kasan_atomics+0x1dd/0x310 <3>[ 14.622172] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.622333] ? __schedule+0xbca/0x2590 <3>[ 14.622479] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.622622] ? ktime_get_ts64+0x84/0x230 <3>[ 14.622810] kunit_try_run_case+0x1b3/0x490 <3>[ 14.623076] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.623365] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.623623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.623899] ? __kthread_parkme+0x82/0x160 <3>[ 14.624129] ? preempt_count_sub+0x50/0x80 <3>[ 14.624372] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.624642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.624958] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.625277] kthread+0x257/0x310 <3>[ 14.625516] ? __pfx_kthread+0x10/0x10 <3>[ 14.625739] ret_from_fork+0x41/0x80 <3>[ 14.625965] ? __pfx_kthread+0x10/0x10 <3>[ 14.626225] ret_from_fork_asm+0x1a/0x30 <3>[ 14.626474] <3>[ 14.626625] <3>[ 14.626773] Allocated by task 266: <4>[ 14.626994] kasan_save_stack+0x3d/0x60 <4>[ 14.627247] kasan_save_track+0x18/0x40 <4>[ 14.627457] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.627715] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.627865] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.628134] kasan_atomics+0x96/0x310 <4>[ 14.628340] kunit_try_run_case+0x1b3/0x490 <4>[ 14.628548] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.628809] kthread+0x257/0x310 <4>[ 14.629043] ret_from_fork+0x41/0x80 <4>[ 14.629250] ret_from_fork_asm+0x1a/0x30 <3>[ 14.629479] <3>[ 14.629584] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.629584] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.630109] The buggy address is located 0 bytes to the right of <3>[ 14.630109] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.630633] <3>[ 14.630789] The buggy address belongs to the physical page: <4>[ 14.631034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.631418] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.631648] page_type: 0xfdffffff(slab) <4>[ 14.631880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.632186] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.632494] page dumped because: kasan: bad access detected <3>[ 14.632748] <3>[ 14.632866] Memory state around the buggy address: <3>[ 14.633066] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.633391] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.633711] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.633996] ^ <3>[ 14.634263] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.634573] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.634890] ================================================================== <3>[ 14.635556] ================================================================== <3>[ 14.635926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 <3>[ 14.636245] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.636550] <3>[ 14.636650] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.637083] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.637324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.637665] Call Trace: <3>[ 14.637856] <3>[ 14.637968] dump_stack_lvl+0x73/0xb0 <3>[ 14.638197] print_report+0xd1/0x640 <3>[ 14.638425] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.638694] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.638980] kasan_report+0x102/0x140 <3>[ 14.639246] ? kasan_atomics_helper+0x8fa/0x5450 <3>[ 14.639489] ? kasan_atomics_helper+0x8fa/0x5450 <3>[ 14.639778] kasan_check_range+0x10c/0x1c0 <3>[ 14.639996] __kasan_check_write+0x18/0x20 <3>[ 14.640215] kasan_atomics_helper+0x8fa/0x5450 <3>[ 14.640490] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.640701] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.640944] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.641204] kasan_atomics+0x1dd/0x310 <3>[ 14.641364] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.641648] ? __schedule+0xbca/0x2590 <3>[ 14.641858] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.642113] ? ktime_get_ts64+0x84/0x230 <3>[ 14.642328] kunit_try_run_case+0x1b3/0x490 <3>[ 14.642588] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.642839] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.643078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.643366] ? __kthread_parkme+0x82/0x160 <3>[ 14.643603] ? preempt_count_sub+0x50/0x80 <3>[ 14.643824] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.644079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.644401] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.644640] kthread+0x257/0x310 <3>[ 14.644835] ? __pfx_kthread+0x10/0x10 <3>[ 14.645030] ret_from_fork+0x41/0x80 <3>[ 14.645287] ? __pfx_kthread+0x10/0x10 <3>[ 14.645477] ret_from_fork_asm+0x1a/0x30 <3>[ 14.645665] <3>[ 14.645849] <3>[ 14.645937] Allocated by task 266: <4>[ 14.646129] kasan_save_stack+0x3d/0x60 <4>[ 14.646327] kasan_save_track+0x18/0x40 <4>[ 14.646542] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.646782] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.646992] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.647219] kasan_atomics+0x96/0x310 <4>[ 14.647413] kunit_try_run_case+0x1b3/0x490 <4>[ 14.647606] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.647857] kthread+0x257/0x310 <4>[ 14.648042] ret_from_fork+0x41/0x80 <4>[ 14.648264] ret_from_fork_asm+0x1a/0x30 <3>[ 14.648454] <3>[ 14.648600] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.648600] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.649042] The buggy address is located 0 bytes to the right of <3>[ 14.649042] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.649521] <3>[ 14.649608] The buggy address belongs to the physical page: <4>[ 14.649784] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.650128] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.650342] page_type: 0xfdffffff(slab) <4>[ 14.650493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.650725] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.650960] page dumped because: kasan: bad access detected <3>[ 14.651187] <3>[ 14.651286] Memory state around the buggy address: <3>[ 14.651518] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.651795] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.652095] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.652385] ^ <3>[ 14.652623] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.652904] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.653208] ================================================================== <3>[ 14.653885] ================================================================== <3>[ 14.654182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 <3>[ 14.654422] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.654676] <3>[ 14.654779] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.655104] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.655263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.655534] Call Trace: <3>[ 14.655649] <3>[ 14.655756] dump_stack_lvl+0x73/0xb0 <3>[ 14.655908] print_report+0xd1/0x640 <3>[ 14.656065] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.656231] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.656430] kasan_report+0x102/0x140 <3>[ 14.656584] ? kasan_atomics_helper+0x993/0x5450 <3>[ 14.656756] ? kasan_atomics_helper+0x993/0x5450 <3>[ 14.656943] kasan_check_range+0x10c/0x1c0 <3>[ 14.657083] __kasan_check_write+0x18/0x20 <3>[ 14.657257] kasan_atomics_helper+0x993/0x5450 <3>[ 14.657429] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.657589] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.657769] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.657943] kasan_atomics+0x1dd/0x310 <3>[ 14.658124] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.658280] ? __schedule+0xbca/0x2590 <3>[ 14.658442] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.658580] ? ktime_get_ts64+0x84/0x230 <3>[ 14.658752] kunit_try_run_case+0x1b3/0x490 <3>[ 14.658923] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.659117] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.659301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.659548] ? __kthread_parkme+0x82/0x160 <3>[ 14.659757] ? preempt_count_sub+0x50/0x80 <3>[ 14.659972] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.660184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.660453] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.660689] kthread+0x257/0x310 <3>[ 14.660877] ? __pfx_kthread+0x10/0x10 <3>[ 14.661081] ret_from_fork+0x41/0x80 <3>[ 14.661277] ? __pfx_kthread+0x10/0x10 <3>[ 14.661476] ret_from_fork_asm+0x1a/0x30 <3>[ 14.661686] <3>[ 14.661806] <3>[ 14.661953] Allocated by task 266: <4>[ 14.662113] kasan_save_stack+0x3d/0x60 <4>[ 14.662341] kasan_save_track+0x18/0x40 <4>[ 14.662541] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.662748] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.662951] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.663176] kasan_atomics+0x96/0x310 <4>[ 14.663370] kunit_try_run_case+0x1b3/0x490 <4>[ 14.663574] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.663805] kthread+0x257/0x310 <4>[ 14.663943] ret_from_fork+0x41/0x80 <4>[ 14.664167] ret_from_fork_asm+0x1a/0x30 <3>[ 14.664366] <3>[ 14.664494] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.664494] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.664941] The buggy address is located 0 bytes to the right of <3>[ 14.664941] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.665392] <3>[ 14.665501] The buggy address belongs to the physical page: <4>[ 14.665742] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.666035] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.666252] page_type: 0xfdffffff(slab) <4>[ 14.666463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.666754] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.667041] page dumped because: kasan: bad access detected <3>[ 14.667263] <3>[ 14.667364] Memory state around the buggy address: <3>[ 14.667594] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.667861] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.668137] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.668404] ^ <3>[ 14.668611] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.668882] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.669161] ================================================================== <3>[ 14.669806] ================================================================== <3>[ 14.670198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 <3>[ 14.670477] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.670771] <3>[ 14.670947] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.671336] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.671551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.671864] Call Trace: <3>[ 14.672022] <3>[ 14.672173] dump_stack_lvl+0x73/0xb0 <3>[ 14.672375] print_report+0xd1/0x640 <3>[ 14.672571] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.672783] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.673022] kasan_report+0x102/0x140 <3>[ 14.673215] ? kasan_atomics_helper+0xa2c/0x5450 <3>[ 14.673434] ? kasan_atomics_helper+0xa2c/0x5450 <3>[ 14.673656] kasan_check_range+0x10c/0x1c0 <3>[ 14.673862] __kasan_check_write+0x18/0x20 <3>[ 14.674067] kasan_atomics_helper+0xa2c/0x5450 <3>[ 14.674285] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.674500] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.674731] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.674961] kasan_atomics+0x1dd/0x310 <3>[ 14.675159] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.675367] ? __schedule+0xbca/0x2590 <3>[ 14.675567] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.675769] ? ktime_get_ts64+0x84/0x230 <3>[ 14.675969] kunit_try_run_case+0x1b3/0x490 <3>[ 14.676181] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.676404] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.676621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.676850] ? __kthread_parkme+0x82/0x160 <3>[ 14.677057] ? preempt_count_sub+0x50/0x80 <3>[ 14.677263] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.677480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.677741] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.677980] kthread+0x257/0x310 <3>[ 14.678174] ? __pfx_kthread+0x10/0x10 <3>[ 14.678330] ret_from_fork+0x41/0x80 <3>[ 14.678481] ? __pfx_kthread+0x10/0x10 <3>[ 14.678629] ret_from_fork_asm+0x1a/0x30 <3>[ 14.678789] <3>[ 14.678882] <3>[ 14.678972] Allocated by task 266: <4>[ 14.679108] kasan_save_stack+0x3d/0x60 <4>[ 14.679262] kasan_save_track+0x18/0x40 <4>[ 14.679407] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.679562] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.679705] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.679864] kasan_atomics+0x96/0x310 <4>[ 14.680002] kunit_try_run_case+0x1b3/0x490 <4>[ 14.680156] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.680330] kthread+0x257/0x310 <4>[ 14.680464] ret_from_fork+0x41/0x80 <4>[ 14.680602] ret_from_fork_asm+0x1a/0x30 <3>[ 14.680754] <3>[ 14.680835] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.680835] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.681187] The buggy address is located 0 bytes to the right of <3>[ 14.681187] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.681554] <3>[ 14.681637] The buggy address belongs to the physical page: <4>[ 14.681823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.682073] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.682246] page_type: 0xfdffffff(slab) <4>[ 14.682398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.682637] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.682871] page dumped because: kasan: bad access detected <3>[ 14.683124] <3>[ 14.683219] Memory state around the buggy address: <3>[ 14.683403] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.683636] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.683868] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.684092] ^ <3>[ 14.684261] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.684518] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.684808] ================================================================== <3>[ 14.685405] ================================================================== <3>[ 14.685764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 <3>[ 14.686076] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.686403] <3>[ 14.686526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.686925] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.687148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.687521] Call Trace: <3>[ 14.687666] <3>[ 14.687799] dump_stack_lvl+0x73/0xb0 <3>[ 14.687997] print_report+0xd1/0x640 <3>[ 14.688191] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.688392] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.688636] kasan_report+0x102/0x140 <3>[ 14.688829] ? kasan_atomics_helper+0xac8/0x5450 <3>[ 14.689060] ? kasan_atomics_helper+0xac8/0x5450 <3>[ 14.689286] kasan_check_range+0x10c/0x1c0 <3>[ 14.689476] __kasan_check_write+0x18/0x20 <3>[ 14.689683] kasan_atomics_helper+0xac8/0x5450 <3>[ 14.689906] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.690125] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.690354] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.690582] kasan_atomics+0x1dd/0x310 <3>[ 14.690766] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.690985] ? __schedule+0xbca/0x2590 <3>[ 14.691178] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.691354] ? ktime_get_ts64+0x84/0x230 <3>[ 14.691548] kunit_try_run_case+0x1b3/0x490 <3>[ 14.691762] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.691976] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.692217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.692447] ? __kthread_parkme+0x82/0x160 <3>[ 14.692611] ? preempt_count_sub+0x50/0x80 <3>[ 14.692798] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.692982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.693196] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.693397] kthread+0x257/0x310 <3>[ 14.693538] ? __pfx_kthread+0x10/0x10 <3>[ 14.693690] ret_from_fork+0x41/0x80 <3>[ 14.693834] ? __pfx_kthread+0x10/0x10 <3>[ 14.693979] ret_from_fork_asm+0x1a/0x30 <3>[ 14.694144] <3>[ 14.694247] <3>[ 14.694322] Allocated by task 266: <4>[ 14.694451] kasan_save_stack+0x3d/0x60 <4>[ 14.694608] kasan_save_track+0x18/0x40 <4>[ 14.694760] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.694919] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.695066] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.695222] kasan_atomics+0x96/0x310 <4>[ 14.695359] kunit_try_run_case+0x1b3/0x490 <4>[ 14.695517] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.695695] kthread+0x257/0x310 <4>[ 14.695829] ret_from_fork+0x41/0x80 <4>[ 14.695969] ret_from_fork_asm+0x1a/0x30 <3>[ 14.696118] <3>[ 14.696194] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.696194] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.696552] The buggy address is located 0 bytes to the right of <3>[ 14.696552] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.696943] <3>[ 14.697023] The buggy address belongs to the physical page: <4>[ 14.697208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.697450] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.697628] page_type: 0xfdffffff(slab) <4>[ 14.697788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.698037] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.698262] page dumped because: kasan: bad access detected <3>[ 14.698450] <3>[ 14.698534] Memory state around the buggy address: <3>[ 14.698709] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.698941] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.699174] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.699397] ^ <3>[ 14.699555] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.699781] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.700008] ================================================================== <3>[ 14.700545] ================================================================== <3>[ 14.700867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 <3>[ 14.701142] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.701362] <3>[ 14.701462] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.701775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.701954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.702266] Call Trace: <3>[ 14.702375] <3>[ 14.702486] dump_stack_lvl+0x73/0xb0 <3>[ 14.702692] print_report+0xd1/0x640 <3>[ 14.702880] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.703050] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.703266] kasan_report+0x102/0x140 <3>[ 14.703457] ? kasan_atomics_helper+0xb6b/0x5450 <3>[ 14.703690] ? kasan_atomics_helper+0xb6b/0x5450 <3>[ 14.703896] kasan_check_range+0x10c/0x1c0 <3>[ 14.704086] __kasan_check_write+0x18/0x20 <3>[ 14.704291] kasan_atomics_helper+0xb6b/0x5450 <3>[ 14.704510] ? kasan_save_alloc_info+0x3b/0x50 <3>[ 14.704686] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.704867] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.705046] kasan_atomics+0x1dd/0x310 <3>[ 14.705197] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.705357] ? __schedule+0xbca/0x2590 <3>[ 14.705504] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.705651] ? ktime_get_ts64+0x84/0x230 <3>[ 14.705806] kunit_try_run_case+0x1b3/0x490 <3>[ 14.705966] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.706139] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.706301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.706485] ? __kthread_parkme+0x82/0x160 <3>[ 14.706638] ? preempt_count_sub+0x50/0x80 <3>[ 14.706801] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.706981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.707186] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.707386] kthread+0x257/0x310 <3>[ 14.707552] ? __pfx_kthread+0x10/0x10 <3>[ 14.707732] ret_from_fork+0x41/0x80 <3>[ 14.707908] ? __pfx_kthread+0x10/0x10 <3>[ 14.708098] ret_from_fork_asm+0x1a/0x30 <3>[ 14.708279] <3>[ 14.708372] <3>[ 14.708447] Allocated by task 266: <4>[ 14.708574] kasan_save_stack+0x3d/0x60 <4>[ 14.708729] kasan_save_track+0x18/0x40 <4>[ 14.708895] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.709048] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.709189] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.709352] kasan_atomics+0x96/0x310 <4>[ 14.709494] kunit_try_run_case+0x1b3/0x490 <4>[ 14.709645] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.709827] kthread+0x257/0x310 <4>[ 14.709960] ret_from_fork+0x41/0x80 <4>[ 14.710092] ret_from_fork_asm+0x1a/0x30 <3>[ 14.710241] <3>[ 14.710317] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.710317] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.710673] The buggy address is located 0 bytes to the right of <3>[ 14.710673] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.711053] <3>[ 14.711131] The buggy address belongs to the physical page: <4>[ 14.711314] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.711557] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.711730] page_type: 0xfdffffff(slab) <4>[ 14.711883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.712121] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.712350] page dumped because: kasan: bad access detected <3>[ 14.712528] <3>[ 14.712604] Memory state around the buggy address: <3>[ 14.712769] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.713022] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.713305] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.713596] ^ <3>[ 14.713819] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.714115] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.714406] ================================================================== <3>[ 14.715016] ================================================================== <3>[ 14.715265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 <3>[ 14.715552] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.715872] <3>[ 14.715981] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.716354] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.716547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.716812] Call Trace: <3>[ 14.716916] <3>[ 14.717012] dump_stack_lvl+0x73/0xb0 <3>[ 14.717161] print_report+0xd1/0x640 <3>[ 14.717303] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.717454] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.717659] kasan_report+0x102/0x140 <3>[ 14.717843] ? kasan_atomics_helper+0xc71/0x5450 <3>[ 14.718061] ? kasan_atomics_helper+0xc71/0x5450 <3>[ 14.718299] kasan_check_range+0x10c/0x1c0 <3>[ 14.718515] __kasan_check_write+0x18/0x20 <3>[ 14.718719] kasan_atomics_helper+0xc71/0x5450 <3>[ 14.718950] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.719193] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.719401] kasan_atomics+0x1dd/0x310 <3>[ 14.719545] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.719700] ? __schedule+0xbca/0x2590 <3>[ 14.719842] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.719986] ? ktime_get_ts64+0x84/0x230 <3>[ 14.720132] kunit_try_run_case+0x1b3/0x490 <3>[ 14.720287] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.720456] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.720630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.720858] ? __kthread_parkme+0x82/0x160 <3>[ 14.721038] ? preempt_count_sub+0x50/0x80 <3>[ 14.721188] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.721359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.721626] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.721874] kthread+0x257/0x310 <3>[ 14.722069] ? __pfx_kthread+0x10/0x10 <3>[ 14.722260] ret_from_fork+0x41/0x80 <3>[ 14.722500] ? __pfx_kthread+0x10/0x10 <3>[ 14.722687] ret_from_fork_asm+0x1a/0x30 <3>[ 14.722971] <3>[ 14.723093] <3>[ 14.723191] Allocated by task 266: <4>[ 14.723430] kasan_save_stack+0x3d/0x60 <4>[ 14.723607] kasan_save_track+0x18/0x40 <4>[ 14.723848] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.724046] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.724283] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.724498] kasan_atomics+0x96/0x310 <4>[ 14.724678] kunit_try_run_case+0x1b3/0x490 <4>[ 14.724865] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.725117] kthread+0x257/0x310 <4>[ 14.725287] ret_from_fork+0x41/0x80 <4>[ 14.725461] ret_from_fork_asm+0x1a/0x30 <3>[ 14.725651] <3>[ 14.725755] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.725755] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.726186] The buggy address is located 0 bytes to the right of <3>[ 14.726186] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.726623] <3>[ 14.726700] The buggy address belongs to the physical page: <4>[ 14.726871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.727134] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.727313] page_type: 0xfdffffff(slab) <4>[ 14.727466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.727704] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.727948] page dumped because: kasan: bad access detected <3>[ 14.728137] <3>[ 14.728218] Memory state around the buggy address: <3>[ 14.728383] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.728613] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.728837] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.729056] ^ <3>[ 14.729222] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.729443] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.729666] ================================================================== <3>[ 14.730133] ================================================================== <3>[ 14.730483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 <3>[ 14.730748] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.730986] <3>[ 14.731070] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.731371] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.731524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.731779] Call Trace: <3>[ 14.731881] <3>[ 14.732061] dump_stack_lvl+0x73/0xb0 <3>[ 14.732208] print_report+0xd1/0x640 <3>[ 14.732349] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.732504] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.732690] kasan_report+0x102/0x140 <3>[ 14.732831] ? kasan_atomics_helper+0x4a86/0x5450 <3>[ 14.732994] ? kasan_atomics_helper+0x4a86/0x5450 <3>[ 14.733157] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.733319] kasan_atomics_helper+0x4a86/0x5450 <3>[ 14.733481] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.733648] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.733814] kasan_atomics+0x1dd/0x310 <3>[ 14.733950] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.734106] ? __schedule+0xbca/0x2590 <3>[ 14.734244] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.734384] ? ktime_get_ts64+0x84/0x230 <3>[ 14.734528] kunit_try_run_case+0x1b3/0x490 <3>[ 14.734682] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.734844] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.735013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.735177] ? __kthread_parkme+0x82/0x160 <3>[ 14.735325] ? preempt_count_sub+0x50/0x80 <3>[ 14.735471] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.735635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.735829] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.735997] kthread+0x257/0x310 <3>[ 14.736121] ? __pfx_kthread+0x10/0x10 <3>[ 14.736311] ret_from_fork+0x41/0x80 <3>[ 14.736508] ? __pfx_kthread+0x10/0x10 <3>[ 14.736694] ret_from_fork_asm+0x1a/0x30 <3>[ 14.736900] <3>[ 14.737034] <3>[ 14.737130] Allocated by task 266: <4>[ 14.737289] kasan_save_stack+0x3d/0x60 <4>[ 14.737447] kasan_save_track+0x18/0x40 <4>[ 14.737596] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.737789] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.737958] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.738164] kasan_atomics+0x96/0x310 <4>[ 14.738332] kunit_try_run_case+0x1b3/0x490 <4>[ 14.738508] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.738724] kthread+0x257/0x310 <4>[ 14.738891] ret_from_fork+0x41/0x80 <4>[ 14.739099] ret_from_fork_asm+0x1a/0x30 <3>[ 14.739290] <3>[ 14.739387] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.739387] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.739834] The buggy address is located 0 bytes to the right of <3>[ 14.739834] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.740300] <3>[ 14.740397] The buggy address belongs to the physical page: <4>[ 14.740598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.740834] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.741014] page_type: 0xfdffffff(slab) <4>[ 14.741171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.741467] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.741739] page dumped because: kasan: bad access detected <3>[ 14.741952] <3>[ 14.742048] Memory state around the buggy address: <3>[ 14.742249] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.742495] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.742758] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.743069] ^ <3>[ 14.743267] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.743545] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.743817] ================================================================== <3>[ 14.744508] ================================================================== <3>[ 14.744853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 <3>[ 14.745179] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.745496] <3>[ 14.745612] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.746021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.746234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.746576] Call Trace: <3>[ 14.746691] <3>[ 14.746802] dump_stack_lvl+0x73/0xb0 <3>[ 14.747000] print_report+0xd1/0x640 <3>[ 14.747182] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.747392] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.747632] kasan_report+0x102/0x140 <3>[ 14.747811] ? kasan_atomics_helper+0xd48/0x5450 <3>[ 14.748010] ? kasan_atomics_helper+0xd48/0x5450 <3>[ 14.748218] kasan_check_range+0x10c/0x1c0 <3>[ 14.748405] __kasan_check_write+0x18/0x20 <3>[ 14.748598] kasan_atomics_helper+0xd48/0x5450 <3>[ 14.748804] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.749019] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.749253] kasan_atomics+0x1dd/0x310 <3>[ 14.749455] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.749628] ? __schedule+0xbca/0x2590 <3>[ 14.749814] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.750000] ? ktime_get_ts64+0x84/0x230 <3>[ 14.750191] kunit_try_run_case+0x1b3/0x490 <3>[ 14.750416] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.750659] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.750879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.751081] ? __kthread_parkme+0x82/0x160 <3>[ 14.751271] ? preempt_count_sub+0x50/0x80 <3>[ 14.751451] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.751665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.751921] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.752117] kthread+0x257/0x310 <3>[ 14.752259] ? __pfx_kthread+0x10/0x10 <3>[ 14.752436] ret_from_fork+0x41/0x80 <3>[ 14.752622] ? __pfx_kthread+0x10/0x10 <3>[ 14.752779] ret_from_fork_asm+0x1a/0x30 <3>[ 14.752935] <3>[ 14.753030] <3>[ 14.753105] Allocated by task 266: <4>[ 14.753239] kasan_save_stack+0x3d/0x60 <4>[ 14.753391] kasan_save_track+0x18/0x40 <4>[ 14.753526] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.753675] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.753824] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.753977] kasan_atomics+0x96/0x310 <4>[ 14.754108] kunit_try_run_case+0x1b3/0x490 <4>[ 14.754253] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.754436] kthread+0x257/0x310 <4>[ 14.754554] ret_from_fork+0x41/0x80 <4>[ 14.754702] ret_from_fork_asm+0x1a/0x30 <3>[ 14.754868] <3>[ 14.754958] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.754958] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.755330] The buggy address is located 0 bytes to the right of <3>[ 14.755330] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.755720] <3>[ 14.755808] The buggy address belongs to the physical page: <4>[ 14.756002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.756257] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.756435] page_type: 0xfdffffff(slab) <4>[ 14.756597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.756832] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.757082] page dumped because: kasan: bad access detected <3>[ 14.757278] <3>[ 14.757366] Memory state around the buggy address: <3>[ 14.757534] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.757764] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.758007] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.758232] ^ <3>[ 14.758399] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.758624] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.758849] ================================================================== <3>[ 14.759344] ================================================================== <3>[ 14.759664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 <3>[ 14.759898] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.760119] <3>[ 14.760206] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.760528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.760697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.760966] Call Trace: <3>[ 14.761077] <3>[ 14.761181] dump_stack_lvl+0x73/0xb0 <3>[ 14.761345] print_report+0xd1/0x640 <3>[ 14.761494] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.761662] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.761857] kasan_report+0x102/0x140 <3>[ 14.762008] ? kasan_atomics_helper+0xde1/0x5450 <3>[ 14.762184] ? kasan_atomics_helper+0xde1/0x5450 <3>[ 14.762362] kasan_check_range+0x10c/0x1c0 <3>[ 14.762528] __kasan_check_write+0x18/0x20 <3>[ 14.762689] kasan_atomics_helper+0xde1/0x5450 <3>[ 14.762867] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.763063] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.763250] kasan_atomics+0x1dd/0x310 <3>[ 14.763404] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.763568] ? __schedule+0xbca/0x2590 <3>[ 14.763722] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.763877] ? ktime_get_ts64+0x84/0x230 <3>[ 14.764036] kunit_try_run_case+0x1b3/0x490 <3>[ 14.764202] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.764378] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.764550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.764733] ? __kthread_parkme+0x82/0x160 <3>[ 14.764899] ? preempt_count_sub+0x50/0x80 <3>[ 14.765064] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.765243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.765451] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.765646] kthread+0x257/0x310 <3>[ 14.765785] ? __pfx_kthread+0x10/0x10 <3>[ 14.765937] ret_from_fork+0x41/0x80 <3>[ 14.766073] ? __pfx_kthread+0x10/0x10 <3>[ 14.766240] ret_from_fork_asm+0x1a/0x30 <3>[ 14.766405] <3>[ 14.766512] <3>[ 14.766594] Allocated by task 266: <4>[ 14.766735] kasan_save_stack+0x3d/0x60 <4>[ 14.766891] kasan_save_track+0x18/0x40 <4>[ 14.767048] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.767210] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.767362] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.767520] kasan_atomics+0x96/0x310 <4>[ 14.767672] kunit_try_run_case+0x1b3/0x490 <4>[ 14.767838] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.768023] kthread+0x257/0x310 <4>[ 14.768162] ret_from_fork+0x41/0x80 <4>[ 14.768305] ret_from_fork_asm+0x1a/0x30 <3>[ 14.768456] <3>[ 14.768538] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.768538] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.768900] The buggy address is located 0 bytes to the right of <3>[ 14.768900] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.769274] <3>[ 14.769353] The buggy address belongs to the physical page: <4>[ 14.769540] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.769802] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.769984] page_type: 0xfdffffff(slab) <4>[ 14.770131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.770375] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.770608] page dumped because: kasan: bad access detected <3>[ 14.770791] <3>[ 14.770881] Memory state around the buggy address: <3>[ 14.771060] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.771288] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.771531] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.771755] ^ <3>[ 14.771926] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.772159] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.772379] ================================================================== <3>[ 14.772890] ================================================================== <3>[ 14.773167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 <3>[ 14.773418] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.773674] <3>[ 14.773779] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.774099] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.774268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.774562] Call Trace: <3>[ 14.774681] <3>[ 14.774788] dump_stack_lvl+0x73/0xb0 <3>[ 14.774970] print_report+0xd1/0x640 <3>[ 14.775141] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.775316] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.775514] kasan_report+0x102/0x140 <3>[ 14.775672] ? kasan_atomics_helper+0xe79/0x5450 <3>[ 14.775849] ? kasan_atomics_helper+0xe79/0x5450 <3>[ 14.776028] kasan_check_range+0x10c/0x1c0 <3>[ 14.776193] __kasan_check_write+0x18/0x20 <3>[ 14.776356] kasan_atomics_helper+0xe79/0x5450 <3>[ 14.776534] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.776720] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.776908] kasan_atomics+0x1dd/0x310 <3>[ 14.777065] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.777231] ? __schedule+0xbca/0x2590 <3>[ 14.777382] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.777561] ? ktime_get_ts64+0x84/0x230 <3>[ 14.777723] kunit_try_run_case+0x1b3/0x490 <3>[ 14.777893] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.778080] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.778272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.778452] ? __kthread_parkme+0x82/0x160 <3>[ 14.778617] ? preempt_count_sub+0x50/0x80 <3>[ 14.778784] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.778974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.779198] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.779394] kthread+0x257/0x310 <3>[ 14.779535] ? __pfx_kthread+0x10/0x10 <3>[ 14.779691] ret_from_fork+0x41/0x80 <3>[ 14.779836] ? __pfx_kthread+0x10/0x10 <3>[ 14.779988] ret_from_fork_asm+0x1a/0x30 <3>[ 14.780155] <3>[ 14.780261] <3>[ 14.780343] Allocated by task 266: <4>[ 14.780470] kasan_save_stack+0x3d/0x60 <4>[ 14.780623] kasan_save_track+0x18/0x40 <4>[ 14.780778] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.780942] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.781092] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.781260] kasan_atomics+0x96/0x310 <4>[ 14.781408] kunit_try_run_case+0x1b3/0x490 <4>[ 14.781582] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.781781] kthread+0x257/0x310 <4>[ 14.781923] ret_from_fork+0x41/0x80 <4>[ 14.782072] ret_from_fork_asm+0x1a/0x30 <3>[ 14.782232] <3>[ 14.782322] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.782322] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.782690] The buggy address is located 0 bytes to the right of <3>[ 14.782690] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.783141] <3>[ 14.783240] The buggy address belongs to the physical page: <4>[ 14.783451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.783721] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.783909] page_type: 0xfdffffff(slab) <4>[ 14.784089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.784352] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.784586] page dumped because: kasan: bad access detected <3>[ 14.784779] <3>[ 14.784868] Memory state around the buggy address: <3>[ 14.785053] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.785311] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.785531] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.785759] ^ <3>[ 14.785925] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.786181] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.786424] ================================================================== <3>[ 14.786989] ================================================================== <3>[ 14.787403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 <3>[ 14.787645] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.787868] <3>[ 14.787955] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.788266] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.788448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.788719] Call Trace: <3>[ 14.788825] <3>[ 14.788942] dump_stack_lvl+0x73/0xb0 <3>[ 14.789087] print_report+0xd1/0x640 <3>[ 14.789237] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.789403] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.789596] kasan_report+0x102/0x140 <3>[ 14.789735] ? kasan_atomics_helper+0xf11/0x5450 <3>[ 14.789911] ? kasan_atomics_helper+0xf11/0x5450 <3>[ 14.790075] kasan_check_range+0x10c/0x1c0 <3>[ 14.790235] __kasan_check_write+0x18/0x20 <3>[ 14.790400] kasan_atomics_helper+0xf11/0x5450 <3>[ 14.790571] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.790765] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.790956] kasan_atomics+0x1dd/0x310 <3>[ 14.791116] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.791277] ? __schedule+0xbca/0x2590 <3>[ 14.791432] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.791577] ? ktime_get_ts64+0x84/0x230 <3>[ 14.791733] kunit_try_run_case+0x1b3/0x490 <3>[ 14.791898] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.792070] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.792232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.792419] ? __kthread_parkme+0x82/0x160 <3>[ 14.792580] ? preempt_count_sub+0x50/0x80 <3>[ 14.792736] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.792913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.793138] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.793376] kthread+0x257/0x310 <3>[ 14.793525] ? __pfx_kthread+0x10/0x10 <3>[ 14.793708] ret_from_fork+0x41/0x80 <3>[ 14.793880] ? __pfx_kthread+0x10/0x10 <3>[ 14.794059] ret_from_fork_asm+0x1a/0x30 <3>[ 14.794229] <3>[ 14.794341] <3>[ 14.794433] Allocated by task 266: <4>[ 14.794607] kasan_save_stack+0x3d/0x60 <4>[ 14.794796] kasan_save_track+0x18/0x40 <4>[ 14.794957] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.795138] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.795324] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.795500] kasan_atomics+0x96/0x310 <4>[ 14.795655] kunit_try_run_case+0x1b3/0x490 <4>[ 14.795817] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.796046] kthread+0x257/0x310 <4>[ 14.796182] ret_from_fork+0x41/0x80 <4>[ 14.796340] ret_from_fork_asm+0x1a/0x30 <3>[ 14.796506] <3>[ 14.796595] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.796595] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.796966] The buggy address is located 0 bytes to the right of <3>[ 14.796966] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.797351] <3>[ 14.797444] The buggy address belongs to the physical page: <4>[ 14.797637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.797907] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.798078] page_type: 0xfdffffff(slab) <4>[ 14.798255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.798526] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.798776] page dumped because: kasan: bad access detected <3>[ 14.798992] <3>[ 14.799075] Memory state around the buggy address: <3>[ 14.799261] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.799503] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.799740] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.799965] ^ <3>[ 14.800134] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.800388] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.800627] ================================================================== <3>[ 14.801117] ================================================================== <3>[ 14.801429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 <3>[ 14.801679] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.801917] <3>[ 14.802001] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.802370] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.802607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.802956] Call Trace: <3>[ 14.803060] <3>[ 14.803156] dump_stack_lvl+0x73/0xb0 <3>[ 14.803299] print_report+0xd1/0x640 <3>[ 14.803439] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.803588] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.803776] kasan_report+0x102/0x140 <3>[ 14.803912] ? kasan_atomics_helper+0xfaa/0x5450 <3>[ 14.804073] ? kasan_atomics_helper+0xfaa/0x5450 <3>[ 14.804242] kasan_check_range+0x10c/0x1c0 <3>[ 14.804395] __kasan_check_write+0x18/0x20 <3>[ 14.804544] kasan_atomics_helper+0xfaa/0x5450 <3>[ 14.804706] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.804902] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.805112] kasan_atomics+0x1dd/0x310 <3>[ 14.805277] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.805444] ? __schedule+0xbca/0x2590 <3>[ 14.805588] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.805729] ? ktime_get_ts64+0x84/0x230 <3>[ 14.805896] kunit_try_run_case+0x1b3/0x490 <3>[ 14.806063] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.806279] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.806508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.806741] ? __kthread_parkme+0x82/0x160 <3>[ 14.806919] ? preempt_count_sub+0x50/0x80 <3>[ 14.807132] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.807323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.807543] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.807758] kthread+0x257/0x310 <3>[ 14.807915] ? __pfx_kthread+0x10/0x10 <3>[ 14.808068] ret_from_fork+0x41/0x80 <3>[ 14.808228] ? __pfx_kthread+0x10/0x10 <3>[ 14.808367] ret_from_fork_asm+0x1a/0x30 <3>[ 14.808547] <3>[ 14.808670] <3>[ 14.808754] Allocated by task 266: <4>[ 14.808910] kasan_save_stack+0x3d/0x60 <4>[ 14.809100] kasan_save_track+0x18/0x40 <4>[ 14.809259] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.809411] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.809549] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.809698] kasan_atomics+0x96/0x310 <4>[ 14.809836] kunit_try_run_case+0x1b3/0x490 <4>[ 14.809982] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.810156] kthread+0x257/0x310 <4>[ 14.810280] ret_from_fork+0x41/0x80 <4>[ 14.810416] ret_from_fork_asm+0x1a/0x30 <3>[ 14.810570] <3>[ 14.810663] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.810663] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.811147] The buggy address is located 0 bytes to the right of <3>[ 14.811147] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.811642] <3>[ 14.811739] The buggy address belongs to the physical page: <4>[ 14.811973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.812284] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.812503] page_type: 0xfdffffff(slab) <4>[ 14.812690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.812985] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.813281] page dumped because: kasan: bad access detected <3>[ 14.813486] <3>[ 14.813558] Memory state around the buggy address: <3>[ 14.813705] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.813920] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.814124] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.814328] ^ <3>[ 14.814515] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.814783] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.815074] ================================================================== <3>[ 14.815597] ================================================================== <3>[ 14.816009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 <3>[ 14.816251] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.816470] <3>[ 14.816555] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.816847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.817001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.817259] Call Trace: <3>[ 14.817358] <3>[ 14.817449] dump_stack_lvl+0x73/0xb0 <3>[ 14.817588] print_report+0xd1/0x640 <3>[ 14.817731] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.817891] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.818077] kasan_report+0x102/0x140 <3>[ 14.818217] ? kasan_atomics_helper+0x4a38/0x5450 <3>[ 14.818385] ? kasan_atomics_helper+0x4a38/0x5450 <3>[ 14.818552] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.818720] kasan_atomics_helper+0x4a38/0x5450 <3>[ 14.818885] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.819069] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.819239] kasan_atomics+0x1dd/0x310 <3>[ 14.819379] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.819531] ? __schedule+0xbca/0x2590 <3>[ 14.819670] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.819840] ? ktime_get_ts64+0x84/0x230 <3>[ 14.820028] kunit_try_run_case+0x1b3/0x490 <3>[ 14.820219] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.820413] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.820615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.820842] ? __kthread_parkme+0x82/0x160 <3>[ 14.821034] ? preempt_count_sub+0x50/0x80 <3>[ 14.821244] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.821491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.821739] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.821999] kthread+0x257/0x310 <3>[ 14.822169] ? __pfx_kthread+0x10/0x10 <3>[ 14.822361] ret_from_fork+0x41/0x80 <3>[ 14.822552] ? __pfx_kthread+0x10/0x10 <3>[ 14.822765] ret_from_fork_asm+0x1a/0x30 <3>[ 14.823000] <3>[ 14.823123] <3>[ 14.823217] Allocated by task 266: <4>[ 14.823384] kasan_save_stack+0x3d/0x60 <4>[ 14.823564] kasan_save_track+0x18/0x40 <4>[ 14.823695] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.823830] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.823965] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.824141] kasan_atomics+0x96/0x310 <4>[ 14.824300] kunit_try_run_case+0x1b3/0x490 <4>[ 14.824501] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.824749] kthread+0x257/0x310 <4>[ 14.824923] ret_from_fork+0x41/0x80 <4>[ 14.825110] ret_from_fork_asm+0x1a/0x30 <3>[ 14.825312] <3>[ 14.825412] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.825412] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.825890] The buggy address is located 0 bytes to the right of <3>[ 14.825890] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.826413] <3>[ 14.826524] The buggy address belongs to the physical page: <4>[ 14.826764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.827105] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.827310] page_type: 0xfdffffff(slab) <4>[ 14.827508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.827812] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.828123] page dumped because: kasan: bad access detected <3>[ 14.828376] <3>[ 14.828478] Memory state around the buggy address: <3>[ 14.828685] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.828978] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.829262] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.829561] ^ <3>[ 14.829796] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.830123] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.830435] ================================================================== <3>[ 14.831122] ================================================================== <3>[ 14.831534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 <3>[ 14.831781] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.832007] <3>[ 14.832092] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.832396] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.832556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.832809] Call Trace: <3>[ 14.832913] <3>[ 14.833018] dump_stack_lvl+0x73/0xb0 <3>[ 14.833188] print_report+0xd1/0x640 <3>[ 14.833326] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.833497] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.833696] kasan_report+0x102/0x140 <3>[ 14.833851] ? kasan_atomics_helper+0x107a/0x5450 <3>[ 14.834037] ? kasan_atomics_helper+0x107a/0x5450 <3>[ 14.834236] kasan_check_range+0x10c/0x1c0 <3>[ 14.834398] __kasan_check_write+0x18/0x20 <3>[ 14.834552] kasan_atomics_helper+0x107a/0x5450 <3>[ 14.834731] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.834923] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.835111] kasan_atomics+0x1dd/0x310 <3>[ 14.835258] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.835422] ? __schedule+0xbca/0x2590 <3>[ 14.835567] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.835717] ? ktime_get_ts64+0x84/0x230 <3>[ 14.835868] kunit_try_run_case+0x1b3/0x490 <3>[ 14.836074] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.836244] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.836407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.836594] ? __kthread_parkme+0x82/0x160 <3>[ 14.836740] ? preempt_count_sub+0x50/0x80 <3>[ 14.836891] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.837068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.837265] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.837458] kthread+0x257/0x310 <3>[ 14.837596] ? __pfx_kthread+0x10/0x10 <3>[ 14.837743] ret_from_fork+0x41/0x80 <3>[ 14.837877] ? __pfx_kthread+0x10/0x10 <3>[ 14.838021] ret_from_fork_asm+0x1a/0x30 <3>[ 14.838178] <3>[ 14.838270] <3>[ 14.838345] Allocated by task 266: <4>[ 14.838504] kasan_save_stack+0x3d/0x60 <4>[ 14.838684] kasan_save_track+0x18/0x40 <4>[ 14.838854] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.839076] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.839263] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.839471] kasan_atomics+0x96/0x310 <4>[ 14.839655] kunit_try_run_case+0x1b3/0x490 <4>[ 14.839864] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.840083] kthread+0x257/0x310 <4>[ 14.840235] ret_from_fork+0x41/0x80 <4>[ 14.840400] ret_from_fork_asm+0x1a/0x30 <3>[ 14.840577] <3>[ 14.840670] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.840670] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.841051] The buggy address is located 0 bytes to the right of <3>[ 14.841051] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.841414] <3>[ 14.841514] The buggy address belongs to the physical page: <4>[ 14.841742] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.842010] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.842221] page_type: 0xfdffffff(slab) <4>[ 14.842409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.842743] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.843053] page dumped because: kasan: bad access detected <3>[ 14.843237] <3>[ 14.843311] Memory state around the buggy address: <3>[ 14.843471] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.843737] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.844016] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.844302] ^ <3>[ 14.844504] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.844796] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.845087] ================================================================== <3>[ 14.845603] ================================================================== <3>[ 14.846001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 <3>[ 14.846235] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.846448] <3>[ 14.846529] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.846831] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.847011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.847280] Call Trace: <3>[ 14.847379] <3>[ 14.847468] dump_stack_lvl+0x73/0xb0 <3>[ 14.847608] print_report+0xd1/0x640 <3>[ 14.847828] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.847995] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.848175] kasan_report+0x102/0x140 <3>[ 14.848366] ? kasan_atomics_helper+0x4a1e/0x5450 <3>[ 14.848597] ? kasan_atomics_helper+0x4a1e/0x5450 <3>[ 14.848865] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.849098] kasan_atomics_helper+0x4a1e/0x5450 <3>[ 14.849304] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.849535] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.849739] kasan_atomics+0x1dd/0x310 <3>[ 14.849920] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.850082] ? __schedule+0xbca/0x2590 <3>[ 14.850229] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.850382] ? ktime_get_ts64+0x84/0x230 <3>[ 14.850567] kunit_try_run_case+0x1b3/0x490 <3>[ 14.850761] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.850989] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.851213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.851447] ? __kthread_parkme+0x82/0x160 <3>[ 14.851657] ? preempt_count_sub+0x50/0x80 <3>[ 14.851854] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.852060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.852321] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.852577] kthread+0x257/0x310 <3>[ 14.852744] ? __pfx_kthread+0x10/0x10 <3>[ 14.852915] ret_from_fork+0x41/0x80 <3>[ 14.853095] ? __pfx_kthread+0x10/0x10 <3>[ 14.853234] ret_from_fork_asm+0x1a/0x30 <3>[ 14.853383] <3>[ 14.853475] <3>[ 14.853548] Allocated by task 266: <4>[ 14.853662] kasan_save_stack+0x3d/0x60 <4>[ 14.853835] kasan_save_track+0x18/0x40 <4>[ 14.854004] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.854188] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.854353] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.854547] kasan_atomics+0x96/0x310 <4>[ 14.854704] kunit_try_run_case+0x1b3/0x490 <4>[ 14.854909] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.855124] kthread+0x257/0x310 <4>[ 14.855277] ret_from_fork+0x41/0x80 <4>[ 14.855451] ret_from_fork_asm+0x1a/0x30 <3>[ 14.855639] <3>[ 14.855721] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.855721] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.856153] The buggy address is located 0 bytes to the right of <3>[ 14.856153] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.856634] <3>[ 14.856719] The buggy address belongs to the physical page: <4>[ 14.856958] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.857290] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.857466] page_type: 0xfdffffff(slab) <4>[ 14.857637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.857938] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.858246] page dumped because: kasan: bad access detected <3>[ 14.858472] <3>[ 14.858560] Memory state around the buggy address: <3>[ 14.858772] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.859072] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.859364] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.859648] ^ <3>[ 14.859857] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.860141] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.860410] ================================================================== <3>[ 14.861010] ================================================================== <3>[ 14.861350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 <3>[ 14.861594] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.861832] <3>[ 14.861913] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.862280] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.862490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.862835] Call Trace: <3>[ 14.862987] <3>[ 14.863121] dump_stack_lvl+0x73/0xb0 <3>[ 14.863311] print_report+0xd1/0x640 <3>[ 14.863510] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.863733] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.863977] kasan_report+0x102/0x140 <3>[ 14.864155] ? kasan_atomics_helper+0x1149/0x5450 <3>[ 14.864377] ? kasan_atomics_helper+0x1149/0x5450 <3>[ 14.864579] kasan_check_range+0x10c/0x1c0 <3>[ 14.864743] __kasan_check_write+0x18/0x20 <3>[ 14.864921] kasan_atomics_helper+0x1149/0x5450 <3>[ 14.865110] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.865313] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.865528] kasan_atomics+0x1dd/0x310 <3>[ 14.865709] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.865913] ? __schedule+0xbca/0x2590 <3>[ 14.866116] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.866311] ? ktime_get_ts64+0x84/0x230 <3>[ 14.866531] kunit_try_run_case+0x1b3/0x490 <3>[ 14.866758] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.866998] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.867214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.867462] ? __kthread_parkme+0x82/0x160 <3>[ 14.867692] ? preempt_count_sub+0x50/0x80 <3>[ 14.867895] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.868135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.868421] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.868677] kthread+0x257/0x310 <3>[ 14.868863] ? __pfx_kthread+0x10/0x10 <3>[ 14.869080] ret_from_fork+0x41/0x80 <3>[ 14.869290] ? __pfx_kthread+0x10/0x10 <3>[ 14.869495] ret_from_fork_asm+0x1a/0x30 <3>[ 14.869693] <3>[ 14.869824] <3>[ 14.869931] Allocated by task 266: <4>[ 14.870108] kasan_save_stack+0x3d/0x60 <4>[ 14.870307] kasan_save_track+0x18/0x40 <4>[ 14.870484] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.870649] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.870783] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.870946] kasan_atomics+0x96/0x310 <4>[ 14.871074] kunit_try_run_case+0x1b3/0x490 <4>[ 14.871258] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.871429] kthread+0x257/0x310 <4>[ 14.871559] ret_from_fork+0x41/0x80 <4>[ 14.871687] ret_from_fork_asm+0x1a/0x30 <3>[ 14.871827] <3>[ 14.871913] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.871913] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.872357] The buggy address is located 0 bytes to the right of <3>[ 14.872357] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.872834] <3>[ 14.872922] The buggy address belongs to the physical page: <4>[ 14.873142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.873450] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.873658] page_type: 0xfdffffff(slab) <4>[ 14.873861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.874105] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.874327] page dumped because: kasan: bad access detected <3>[ 14.874515] <3>[ 14.874600] Memory state around the buggy address: <3>[ 14.874786] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.875080] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.875371] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.875633] ^ <3>[ 14.875812] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.876051] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.876326] ================================================================== <3>[ 14.876840] ================================================================== <3>[ 14.877175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 <3>[ 14.877450] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.877749] <3>[ 14.877859] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.878242] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.878414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.878702] Call Trace: <3>[ 14.878842] <3>[ 14.878980] dump_stack_lvl+0x73/0xb0 <3>[ 14.879175] print_report+0xd1/0x640 <3>[ 14.879326] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.879484] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.879666] kasan_report+0x102/0x140 <3>[ 14.879807] ? kasan_atomics_helper+0x4a04/0x5450 <3>[ 14.879991] ? kasan_atomics_helper+0x4a04/0x5450 <3>[ 14.880215] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.880433] kasan_atomics_helper+0x4a04/0x5450 <3>[ 14.880649] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.880878] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.881107] kasan_atomics+0x1dd/0x310 <3>[ 14.881284] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.881477] ? __schedule+0xbca/0x2590 <3>[ 14.881682] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.881868] ? ktime_get_ts64+0x84/0x230 <3>[ 14.882068] kunit_try_run_case+0x1b3/0x490 <3>[ 14.882291] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.882518] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.882738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.882981] ? __kthread_parkme+0x82/0x160 <3>[ 14.883183] ? preempt_count_sub+0x50/0x80 <3>[ 14.883411] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.883647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.883936] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.884194] kthread+0x257/0x310 <3>[ 14.884368] ? __pfx_kthread+0x10/0x10 <3>[ 14.884564] ret_from_fork+0x41/0x80 <3>[ 14.884749] ? __pfx_kthread+0x10/0x10 <3>[ 14.884954] ret_from_fork_asm+0x1a/0x30 <3>[ 14.885165] <3>[ 14.885275] <3>[ 14.885355] Allocated by task 266: <4>[ 14.885502] kasan_save_stack+0x3d/0x60 <4>[ 14.885652] kasan_save_track+0x18/0x40 <4>[ 14.885843] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.886047] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.886219] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.886389] kasan_atomics+0x96/0x310 <4>[ 14.886558] kunit_try_run_case+0x1b3/0x490 <4>[ 14.886731] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.886938] kthread+0x257/0x310 <4>[ 14.887097] ret_from_fork+0x41/0x80 <4>[ 14.887261] ret_from_fork_asm+0x1a/0x30 <3>[ 14.887400] <3>[ 14.887472] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.887472] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.887828] The buggy address is located 0 bytes to the right of <3>[ 14.887828] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.888289] <3>[ 14.888364] The buggy address belongs to the physical page: <4>[ 14.888531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.888772] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.888933] page_type: 0xfdffffff(slab) <4>[ 14.889072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.889303] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.889532] page dumped because: kasan: bad access detected <3>[ 14.889704] <3>[ 14.889777] Memory state around the buggy address: <3>[ 14.889940] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.890150] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.890362] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.890569] ^ <3>[ 14.890729] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.890963] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.891176] ================================================================== <3>[ 14.891584] ================================================================== <3>[ 14.891880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 <3>[ 14.892136] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.892379] <3>[ 14.892460] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.892761] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.892916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.893181] Call Trace: <3>[ 14.893276] <3>[ 14.893379] dump_stack_lvl+0x73/0xb0 <3>[ 14.893534] print_report+0xd1/0x640 <3>[ 14.893683] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.893837] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.894026] kasan_report+0x102/0x140 <3>[ 14.894166] ? kasan_atomics_helper+0x1218/0x5450 <3>[ 14.894334] ? kasan_atomics_helper+0x1218/0x5450 <3>[ 14.894567] kasan_check_range+0x10c/0x1c0 <3>[ 14.894774] __kasan_check_write+0x18/0x20 <3>[ 14.894995] kasan_atomics_helper+0x1218/0x5450 <3>[ 14.895215] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.895450] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.895673] kasan_atomics+0x1dd/0x310 <3>[ 14.895870] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.896075] ? __schedule+0xbca/0x2590 <3>[ 14.896273] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.896477] ? ktime_get_ts64+0x84/0x230 <3>[ 14.896676] kunit_try_run_case+0x1b3/0x490 <3>[ 14.896883] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.897099] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.897313] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.897536] ? __kthread_parkme+0x82/0x160 <3>[ 14.897712] ? preempt_count_sub+0x50/0x80 <3>[ 14.897954] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.898177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.898483] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.898729] kthread+0x257/0x310 <3>[ 14.898872] ? __pfx_kthread+0x10/0x10 <3>[ 14.899110] ret_from_fork+0x41/0x80 <3>[ 14.899314] ? __pfx_kthread+0x10/0x10 <3>[ 14.899490] ret_from_fork_asm+0x1a/0x30 <3>[ 14.899729] <3>[ 14.899831] <3>[ 14.899976] Allocated by task 266: <4>[ 14.900173] kasan_save_stack+0x3d/0x60 <4>[ 14.900347] kasan_save_track+0x18/0x40 <4>[ 14.900572] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.900753] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.900973] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.901159] kasan_atomics+0x96/0x310 <4>[ 14.901374] kunit_try_run_case+0x1b3/0x490 <4>[ 14.901557] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.901805] kthread+0x257/0x310 <4>[ 14.901974] ret_from_fork+0x41/0x80 <4>[ 14.902184] ret_from_fork_asm+0x1a/0x30 <3>[ 14.902393] <3>[ 14.902537] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.902537] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.903067] The buggy address is located 0 bytes to the right of <3>[ 14.903067] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.903661] <3>[ 14.903803] The buggy address belongs to the physical page: <4>[ 14.904089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.904454] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.904718] page_type: 0xfdffffff(slab) <4>[ 14.904950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.905312] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.905671] page dumped because: kasan: bad access detected <3>[ 14.905952] <3>[ 14.906088] Memory state around the buggy address: <3>[ 14.906363] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.906681] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.906961] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.907191] ^ <3>[ 14.907362] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.907669] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.908030] ================================================================== <3>[ 14.908803] ================================================================== <3>[ 14.909229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 <3>[ 14.909476] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.909715] <3>[ 14.909806] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.910117] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.910272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.910537] Call Trace: <3>[ 14.910643] <3>[ 14.910740] dump_stack_lvl+0x73/0xb0 <3>[ 14.910892] print_report+0xd1/0x640 <3>[ 14.911043] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.911204] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.911395] kasan_report+0x102/0x140 <3>[ 14.911535] ? kasan_atomics_helper+0x49ea/0x5450 <3>[ 14.911699] ? kasan_atomics_helper+0x49ea/0x5450 <3>[ 14.911867] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.912046] kasan_atomics_helper+0x49ea/0x5450 <3>[ 14.912212] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.912385] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.912627] kasan_atomics+0x1dd/0x310 <3>[ 14.912839] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.913048] ? __schedule+0xbca/0x2590 <3>[ 14.913246] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.913423] ? ktime_get_ts64+0x84/0x230 <3>[ 14.913667] kunit_try_run_case+0x1b3/0x490 <3>[ 14.913881] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.914100] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.914322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.914551] ? __kthread_parkme+0x82/0x160 <3>[ 14.914757] ? preempt_count_sub+0x50/0x80 <3>[ 14.914983] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.915204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.915462] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.915708] kthread+0x257/0x310 <3>[ 14.915897] ? __pfx_kthread+0x10/0x10 <3>[ 14.916102] ret_from_fork+0x41/0x80 <3>[ 14.916268] ? __pfx_kthread+0x10/0x10 <3>[ 14.916492] ret_from_fork_asm+0x1a/0x30 <3>[ 14.916704] <3>[ 14.916853] <3>[ 14.916985] Allocated by task 266: <4>[ 14.917128] kasan_save_stack+0x3d/0x60 <4>[ 14.917366] kasan_save_track+0x18/0x40 <4>[ 14.917570] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.917779] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.917978] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.918191] kasan_atomics+0x96/0x310 <4>[ 14.918418] kunit_try_run_case+0x1b3/0x490 <4>[ 14.918657] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.918917] kthread+0x257/0x310 <4>[ 14.919096] ret_from_fork+0x41/0x80 <4>[ 14.919320] ret_from_fork_asm+0x1a/0x30 <3>[ 14.919526] <3>[ 14.919665] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.919665] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.920099] The buggy address is located 0 bytes to the right of <3>[ 14.920099] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.920552] <3>[ 14.920646] The buggy address belongs to the physical page: <4>[ 14.920900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.921195] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.921417] page_type: 0xfdffffff(slab) <4>[ 14.921642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.921917] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.922169] page dumped because: kasan: bad access detected <3>[ 14.922342] <3>[ 14.922415] Memory state around the buggy address: <3>[ 14.922574] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.922788] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.923010] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.923217] ^ <3>[ 14.923372] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.923584] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.923851] ================================================================== <3>[ 14.924729] ================================================================== <3>[ 14.924974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 <3>[ 14.925208] Write of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.925428] <3>[ 14.925515] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.925839] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.926002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.926262] Call Trace: <3>[ 14.926359] <3>[ 14.926455] dump_stack_lvl+0x73/0xb0 <3>[ 14.926596] print_report+0xd1/0x640 <3>[ 14.926735] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.926891] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.927089] kasan_report+0x102/0x140 <3>[ 14.927229] ? kasan_atomics_helper+0x12e7/0x5450 <3>[ 14.927399] ? kasan_atomics_helper+0x12e7/0x5450 <3>[ 14.927568] kasan_check_range+0x10c/0x1c0 <3>[ 14.927720] __kasan_check_write+0x18/0x20 <3>[ 14.927870] kasan_atomics_helper+0x12e7/0x5450 <3>[ 14.928026] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.928198] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.928369] kasan_atomics+0x1dd/0x310 <3>[ 14.928512] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.928662] ? __schedule+0xbca/0x2590 <3>[ 14.928805] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.928942] ? ktime_get_ts64+0x84/0x230 <3>[ 14.929086] kunit_try_run_case+0x1b3/0x490 <3>[ 14.929235] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.929397] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.929556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.929725] ? __kthread_parkme+0x82/0x160 <3>[ 14.929874] ? preempt_count_sub+0x50/0x80 <3>[ 14.930027] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.930181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.930374] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.930554] kthread+0x257/0x310 <3>[ 14.930680] ? __pfx_kthread+0x10/0x10 <3>[ 14.930820] ret_from_fork+0x41/0x80 <3>[ 14.930966] ? __pfx_kthread+0x10/0x10 <3>[ 14.931102] ret_from_fork_asm+0x1a/0x30 <3>[ 14.931253] <3>[ 14.931347] <3>[ 14.931421] Allocated by task 266: <4>[ 14.931546] kasan_save_stack+0x3d/0x60 <4>[ 14.931687] kasan_save_track+0x18/0x40 <4>[ 14.931822] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.931963] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.932098] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.932252] kasan_atomics+0x96/0x310 <4>[ 14.932386] kunit_try_run_case+0x1b3/0x490 <4>[ 14.932530] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.932706] kthread+0x257/0x310 <4>[ 14.932826] ret_from_fork+0x41/0x80 <4>[ 14.932958] ret_from_fork_asm+0x1a/0x30 <3>[ 14.933104] <3>[ 14.933185] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.933185] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.933523] The buggy address is located 0 bytes to the right of <3>[ 14.933523] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.933880] <3>[ 14.933956] The buggy address belongs to the physical page: <4>[ 14.934138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.934378] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.934544] page_type: 0xfdffffff(slab) <4>[ 14.934688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.934933] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.935214] page dumped because: kasan: bad access detected <3>[ 14.935437] <3>[ 14.935536] Memory state around the buggy address: <3>[ 14.935765] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.936037] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.936306] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.936567] ^ <3>[ 14.936772] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.937033] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.937288] ================================================================== <3>[ 14.937976] ================================================================== <3>[ 14.938314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 <3>[ 14.938577] Read of size 4 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.938812] <3>[ 14.938917] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.939218] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.939374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.939627] Call Trace: <3>[ 14.939734] <3>[ 14.939828] dump_stack_lvl+0x73/0xb0 <3>[ 14.940035] print_report+0xd1/0x640 <3>[ 14.940236] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.940448] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.940688] kasan_report+0x102/0x140 <3>[ 14.940884] ? kasan_atomics_helper+0x49d0/0x5450 <3>[ 14.941104] ? kasan_atomics_helper+0x49d0/0x5450 <3>[ 14.941337] __asan_report_load4_noabort+0x18/0x20 <3>[ 14.941604] kasan_atomics_helper+0x49d0/0x5450 <3>[ 14.941835] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.942066] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.942294] kasan_atomics+0x1dd/0x310 <3>[ 14.942498] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.942703] ? __schedule+0xbca/0x2590 <3>[ 14.942907] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.943061] ? ktime_get_ts64+0x84/0x230 <3>[ 14.943294] kunit_try_run_case+0x1b3/0x490 <3>[ 14.943502] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.943716] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.943913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.944164] ? __kthread_parkme+0x82/0x160 <3>[ 14.944368] ? preempt_count_sub+0x50/0x80 <3>[ 14.944574] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.944788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.945047] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.945285] kthread+0x257/0x310 <3>[ 14.945473] ? __pfx_kthread+0x10/0x10 <3>[ 14.945622] ret_from_fork+0x41/0x80 <3>[ 14.945850] ? __pfx_kthread+0x10/0x10 <3>[ 14.946043] ret_from_fork_asm+0x1a/0x30 <3>[ 14.946254] <3>[ 14.946401] <3>[ 14.946480] Allocated by task 266: <4>[ 14.946681] kasan_save_stack+0x3d/0x60 <4>[ 14.946884] kasan_save_track+0x18/0x40 <4>[ 14.947085] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.947283] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.947473] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.947678] kasan_atomics+0x96/0x310 <4>[ 14.947816] kunit_try_run_case+0x1b3/0x490 <4>[ 14.948042] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.948270] kthread+0x257/0x310 <4>[ 14.948436] ret_from_fork+0x41/0x80 <4>[ 14.948640] ret_from_fork_asm+0x1a/0x30 <3>[ 14.948837] <3>[ 14.948918] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.948918] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.949370] The buggy address is located 0 bytes to the right of <3>[ 14.949370] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.949815] <3>[ 14.949930] The buggy address belongs to the physical page: <4>[ 14.950162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.950448] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.950660] page_type: 0xfdffffff(slab) <4>[ 14.950853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.951141] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.951414] page dumped because: kasan: bad access detected <3>[ 14.951644] <3>[ 14.951754] Memory state around the buggy address: <3>[ 14.951973] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.952235] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.952494] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.952749] ^ <3>[ 14.952952] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.953214] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.953473] ================================================================== <3>[ 14.954041] ================================================================== <3>[ 14.954312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 <3>[ 14.954535] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.954772] <3>[ 14.954858] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.955169] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.955329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.955592] Call Trace: <3>[ 14.955694] <3>[ 14.955791] dump_stack_lvl+0x73/0xb0 <3>[ 14.955936] print_report+0xd1/0x640 <3>[ 14.956080] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.956234] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.956413] kasan_report+0x102/0x140 <3>[ 14.956552] ? kasan_atomics_helper+0x13b6/0x5450 <3>[ 14.956726] ? kasan_atomics_helper+0x13b6/0x5450 <3>[ 14.956891] kasan_check_range+0x10c/0x1c0 <3>[ 14.957037] __kasan_check_read+0x15/0x20 <3>[ 14.957183] kasan_atomics_helper+0x13b6/0x5450 <3>[ 14.957347] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.957513] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.957686] kasan_atomics+0x1dd/0x310 <3>[ 14.957828] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.957991] ? __schedule+0xbca/0x2590 <3>[ 14.958130] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.958269] ? ktime_get_ts64+0x84/0x230 <3>[ 14.958410] kunit_try_run_case+0x1b3/0x490 <3>[ 14.958564] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.958726] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.958884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.959070] ? __kthread_parkme+0x82/0x160 <3>[ 14.959221] ? preempt_count_sub+0x50/0x80 <3>[ 14.959375] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.959532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.959730] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.959910] kthread+0x257/0x310 <3>[ 14.960042] ? __pfx_kthread+0x10/0x10 <3>[ 14.960186] ret_from_fork+0x41/0x80 <3>[ 14.960323] ? __pfx_kthread+0x10/0x10 <3>[ 14.960465] ret_from_fork_asm+0x1a/0x30 <3>[ 14.960617] <3>[ 14.960710] <3>[ 14.960780] Allocated by task 266: <4>[ 14.960905] kasan_save_stack+0x3d/0x60 <4>[ 14.961043] kasan_save_track+0x18/0x40 <4>[ 14.961183] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.961330] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.961465] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.961619] kasan_atomics+0x96/0x310 <4>[ 14.961746] kunit_try_run_case+0x1b3/0x490 <4>[ 14.961887] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.962053] kthread+0x257/0x310 <4>[ 14.962180] ret_from_fork+0x41/0x80 <4>[ 14.962308] ret_from_fork_asm+0x1a/0x30 <3>[ 14.962444] <3>[ 14.962518] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.962518] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.962857] The buggy address is located 0 bytes to the right of <3>[ 14.962857] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.963212] <3>[ 14.963284] The buggy address belongs to the physical page: <4>[ 14.963451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.963678] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.963838] page_type: 0xfdffffff(slab) <4>[ 14.963975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.964197] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.964415] page dumped because: kasan: bad access detected <3>[ 14.964584] <3>[ 14.964653] Memory state around the buggy address: <3>[ 14.964798] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.965005] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.965210] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.965412] ^ <3>[ 14.965559] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.965768] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.965976] ================================================================== <3>[ 14.966355] ================================================================== <3>[ 14.966642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 <3>[ 14.966874] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.967098] <3>[ 14.967180] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.967474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.967625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.967877] Call Trace: <3>[ 14.967979] <3>[ 14.968070] dump_stack_lvl+0x73/0xb0 <3>[ 14.968208] print_report+0xd1/0x640 <3>[ 14.968346] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.968495] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.968682] kasan_report+0x102/0x140 <3>[ 14.968821] ? kasan_atomics_helper+0x4eb0/0x5450 <3>[ 14.968987] ? kasan_atomics_helper+0x4eb0/0x5450 <3>[ 14.969152] __asan_report_load8_noabort+0x18/0x20 <3>[ 14.969316] kasan_atomics_helper+0x4eb0/0x5450 <3>[ 14.969472] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.969640] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.969812] kasan_atomics+0x1dd/0x310 <3>[ 14.969955] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.970108] ? __schedule+0xbca/0x2590 <3>[ 14.970252] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.970393] ? ktime_get_ts64+0x84/0x230 <3>[ 14.970542] kunit_try_run_case+0x1b3/0x490 <3>[ 14.970694] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.970860] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.971027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.971198] ? __kthread_parkme+0x82/0x160 <3>[ 14.971350] ? preempt_count_sub+0x50/0x80 <3>[ 14.971508] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.971679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.971877] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.972058] kthread+0x257/0x310 <3>[ 14.972190] ? __pfx_kthread+0x10/0x10 <3>[ 14.972334] ret_from_fork+0x41/0x80 <3>[ 14.972472] ? __pfx_kthread+0x10/0x10 <3>[ 14.972616] ret_from_fork_asm+0x1a/0x30 <3>[ 14.972771] <3>[ 14.972864] <3>[ 14.972937] Allocated by task 266: <4>[ 14.973061] kasan_save_stack+0x3d/0x60 <4>[ 14.973203] kasan_save_track+0x18/0x40 <4>[ 14.973343] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.973491] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.973630] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.973790] kasan_atomics+0x96/0x310 <4>[ 14.973938] kunit_try_run_case+0x1b3/0x490 <4>[ 14.974088] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.974267] kthread+0x257/0x310 <4>[ 14.974389] ret_from_fork+0x41/0x80 <4>[ 14.974520] ret_from_fork_asm+0x1a/0x30 <3>[ 14.974664] <3>[ 14.974735] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.974735] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.975123] The buggy address is located 0 bytes to the right of <3>[ 14.975123] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.975596] <3>[ 14.975718] The buggy address belongs to the physical page: <4>[ 14.975967] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.976258] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.976478] page_type: 0xfdffffff(slab) <4>[ 14.976681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.976964] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.977241] page dumped because: kasan: bad access detected <3>[ 14.977466] <3>[ 14.977573] Memory state around the buggy address: <3>[ 14.977798] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.978065] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.978342] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.978609] ^ <3>[ 14.978816] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.979091] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.979355] ================================================================== <3>[ 14.979898] ================================================================== <3>[ 14.980248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 <3>[ 14.980572] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.980886] <3>[ 14.981049] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.981445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.981655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.981972] Call Trace: <3>[ 14.982136] <3>[ 14.982288] dump_stack_lvl+0x73/0xb0 <3>[ 14.982504] print_report+0xd1/0x640 <3>[ 14.982658] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.982911] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 14.983153] kasan_report+0x102/0x140 <3>[ 14.983344] ? kasan_atomics_helper+0x1468/0x5450 <3>[ 14.983525] ? kasan_atomics_helper+0x1468/0x5450 <3>[ 14.983701] kasan_check_range+0x10c/0x1c0 <3>[ 14.983929] __kasan_check_write+0x18/0x20 <3>[ 14.984087] kasan_atomics_helper+0x1468/0x5450 <3>[ 14.984346] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 14.984574] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 14.984801] kasan_atomics+0x1dd/0x310 <3>[ 14.985004] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 14.985216] ? __schedule+0xbca/0x2590 <3>[ 14.985417] ? __pfx_read_tsc+0x10/0x10 <3>[ 14.985619] ? ktime_get_ts64+0x84/0x230 <3>[ 14.985821] kunit_try_run_case+0x1b3/0x490 <3>[ 14.986035] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.986254] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 14.986475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 14.986704] ? __kthread_parkme+0x82/0x160 <3>[ 14.986921] ? preempt_count_sub+0x50/0x80 <3>[ 14.987138] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 14.987360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 14.987612] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 14.987850] kthread+0x257/0x310 <3>[ 14.988047] ? __pfx_kthread+0x10/0x10 <3>[ 14.988247] ret_from_fork+0x41/0x80 <3>[ 14.988422] ? __pfx_kthread+0x10/0x10 <3>[ 14.988645] ret_from_fork_asm+0x1a/0x30 <3>[ 14.988857] <3>[ 14.989011] <3>[ 14.989093] Allocated by task 266: <4>[ 14.989269] kasan_save_stack+0x3d/0x60 <4>[ 14.989505] kasan_save_track+0x18/0x40 <4>[ 14.989699] kasan_save_alloc_info+0x3b/0x50 <4>[ 14.989904] __kasan_kmalloc+0xb7/0xc0 <4>[ 14.990095] __kmalloc_cache_noprof+0x162/0x350 <4>[ 14.990309] kasan_atomics+0x96/0x310 <4>[ 14.990496] kunit_try_run_case+0x1b3/0x490 <4>[ 14.990695] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 14.990936] kthread+0x257/0x310 <4>[ 14.991115] ret_from_fork+0x41/0x80 <4>[ 14.991289] ret_from_fork_asm+0x1a/0x30 <3>[ 14.991502] <3>[ 14.991623] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 14.991623] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.992085] The buggy address is located 0 bytes to the right of <3>[ 14.992085] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 14.992543] <3>[ 14.992649] The buggy address belongs to the physical page: <4>[ 14.992928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 14.993240] flags: 0x200000000000000(node=0|zone=2) <4>[ 14.993464] page_type: 0xfdffffff(slab) <4>[ 14.993675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 14.993968] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 14.994249] page dumped because: kasan: bad access detected <3>[ 14.994481] <3>[ 14.994562] Memory state around the buggy address: <3>[ 14.994807] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.995104] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.995380] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 14.995648] ^ <3>[ 14.995861] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.996135] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.996400] ================================================================== <3>[ 14.996922] ================================================================== <3>[ 14.997312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 <3>[ 14.997619] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 14.997965] <3>[ 14.998137] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 14.998498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 14.998713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 14.999040] Call Trace: <3>[ 14.999205] <3>[ 14.999358] dump_stack_lvl+0x73/0xb0 <3>[ 14.999562] print_report+0xd1/0x640 <3>[ 14.999759] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 14.999972] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.000214] kasan_report+0x102/0x140 <3>[ 15.000408] ? kasan_atomics_helper+0x50d6/0x5450 <3>[ 15.000631] ? kasan_atomics_helper+0x50d6/0x5450 <3>[ 15.000857] __asan_report_store8_noabort+0x1b/0x30 <3>[ 15.001085] kasan_atomics_helper+0x50d6/0x5450 <3>[ 15.001304] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.001529] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.001756] kasan_atomics+0x1dd/0x310 <3>[ 15.001949] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.002156] ? __schedule+0xbca/0x2590 <3>[ 15.002350] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.002548] ? ktime_get_ts64+0x84/0x230 <3>[ 15.002747] kunit_try_run_case+0x1b3/0x490 <3>[ 15.002966] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.003188] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.003403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.003626] ? __kthread_parkme+0x82/0x160 <3>[ 15.003831] ? preempt_count_sub+0x50/0x80 <3>[ 15.004039] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.004259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.004511] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.004756] kthread+0x257/0x310 <3>[ 15.004942] ? __pfx_kthread+0x10/0x10 <3>[ 15.005138] ret_from_fork+0x41/0x80 <3>[ 15.005331] ? __pfx_kthread+0x10/0x10 <3>[ 15.005537] ret_from_fork_asm+0x1a/0x30 <3>[ 15.005749] <3>[ 15.005895] <3>[ 15.005972] Allocated by task 266: <4>[ 15.006191] kasan_save_stack+0x3d/0x60 <4>[ 15.006401] kasan_save_track+0x18/0x40 <4>[ 15.006591] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.006776] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.006936] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.007084] kasan_atomics+0x96/0x310 <4>[ 15.007224] kunit_try_run_case+0x1b3/0x490 <4>[ 15.007378] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.007617] kthread+0x257/0x310 <4>[ 15.007786] ret_from_fork+0x41/0x80 <4>[ 15.007958] ret_from_fork_asm+0x1a/0x30 <3>[ 15.008141] <3>[ 15.008218] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.008218] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.008552] The buggy address is located 0 bytes to the right of <3>[ 15.008552] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.008906] <3>[ 15.008995] The buggy address belongs to the physical page: <4>[ 15.009185] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.009499] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.009719] page_type: 0xfdffffff(slab) <4>[ 15.009883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.010132] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.010411] page dumped because: kasan: bad access detected <3>[ 15.010636] <3>[ 15.010724] Memory state around the buggy address: <3>[ 15.010916] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.011131] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.011338] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.011553] ^ <3>[ 15.011749] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.012008] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.012255] ================================================================== <3>[ 15.012853] ================================================================== <3>[ 15.013140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 <3>[ 15.013457] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.013773] <3>[ 15.013882] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.014270] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.014473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.014795] Call Trace: <3>[ 15.014934] <3>[ 15.015054] dump_stack_lvl+0x73/0xb0 <3>[ 15.015226] print_report+0xd1/0x640 <3>[ 15.015415] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.015617] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.015867] kasan_report+0x102/0x140 <3>[ 15.016066] ? kasan_atomics_helper+0x151e/0x5450 <3>[ 15.016286] ? kasan_atomics_helper+0x151e/0x5450 <3>[ 15.016496] kasan_check_range+0x10c/0x1c0 <3>[ 15.016663] __kasan_check_write+0x18/0x20 <3>[ 15.016843] kasan_atomics_helper+0x151e/0x5450 <3>[ 15.017013] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.017186] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.017389] kasan_atomics+0x1dd/0x310 <3>[ 15.017548] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.017729] ? __schedule+0xbca/0x2590 <3>[ 15.017880] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.018020] ? ktime_get_ts64+0x84/0x230 <3>[ 15.018170] kunit_try_run_case+0x1b3/0x490 <3>[ 15.018323] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.018503] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.018720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.018951] ? __kthread_parkme+0x82/0x160 <3>[ 15.019135] ? preempt_count_sub+0x50/0x80 <3>[ 15.019345] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.019578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.019853] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.020107] kthread+0x257/0x310 <3>[ 15.020260] ? __pfx_kthread+0x10/0x10 <3>[ 15.020452] ret_from_fork+0x41/0x80 <3>[ 15.020646] ? __pfx_kthread+0x10/0x10 <3>[ 15.020832] ret_from_fork_asm+0x1a/0x30 <3>[ 15.020995] <3>[ 15.021091] <3>[ 15.021167] Allocated by task 266: <4>[ 15.021307] kasan_save_stack+0x3d/0x60 <4>[ 15.021481] kasan_save_track+0x18/0x40 <4>[ 15.021634] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.021795] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.021960] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.022147] kasan_atomics+0x96/0x310 <4>[ 15.022307] kunit_try_run_case+0x1b3/0x490 <4>[ 15.022478] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.022684] kthread+0x257/0x310 <4>[ 15.022851] ret_from_fork+0x41/0x80 <4>[ 15.023018] ret_from_fork_asm+0x1a/0x30 <3>[ 15.023155] <3>[ 15.023229] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.023229] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.023571] The buggy address is located 0 bytes to the right of <3>[ 15.023571] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.023926] <3>[ 15.024001] The buggy address belongs to the physical page: <4>[ 15.024175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.024407] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.024613] page_type: 0xfdffffff(slab) <4>[ 15.024762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.024985] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.025202] page dumped because: kasan: bad access detected <3>[ 15.025377] <3>[ 15.025449] Memory state around the buggy address: <3>[ 15.025601] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.025820] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.026036] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.026262] ^ <3>[ 15.026462] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.026778] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.027069] ================================================================== <3>[ 15.027564] ================================================================== <3>[ 15.027891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 <3>[ 15.028221] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.028492] <3>[ 15.028581] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.028968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.029190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.029556] Call Trace: <3>[ 15.029692] <3>[ 15.029807] dump_stack_lvl+0x73/0xb0 <3>[ 15.029982] print_report+0xd1/0x640 <3>[ 15.030130] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.030312] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.030545] kasan_report+0x102/0x140 <3>[ 15.030708] ? kasan_atomics_helper+0x15b7/0x5450 <3>[ 15.030950] ? kasan_atomics_helper+0x15b7/0x5450 <3>[ 15.031147] kasan_check_range+0x10c/0x1c0 <3>[ 15.031343] __kasan_check_write+0x18/0x20 <3>[ 15.031567] kasan_atomics_helper+0x15b7/0x5450 <3>[ 15.031809] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.032051] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.032257] kasan_atomics+0x1dd/0x310 <3>[ 15.032456] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.032675] ? __schedule+0xbca/0x2590 <3>[ 15.032831] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.033016] ? ktime_get_ts64+0x84/0x230 <3>[ 15.033207] kunit_try_run_case+0x1b3/0x490 <3>[ 15.033388] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.033592] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.033785] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.033991] ? __kthread_parkme+0x82/0x160 <3>[ 15.034176] ? preempt_count_sub+0x50/0x80 <3>[ 15.034357] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.034550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.034815] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.035059] kthread+0x257/0x310 <3>[ 15.035230] ? __pfx_kthread+0x10/0x10 <3>[ 15.035412] ret_from_fork+0x41/0x80 <3>[ 15.035583] ? __pfx_kthread+0x10/0x10 <3>[ 15.035755] ret_from_fork_asm+0x1a/0x30 <3>[ 15.035929] <3>[ 15.036048] <3>[ 15.036145] Allocated by task 266: <4>[ 15.036306] kasan_save_stack+0x3d/0x60 <4>[ 15.036470] kasan_save_track+0x18/0x40 <4>[ 15.036629] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.036808] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.036945] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.037092] kasan_atomics+0x96/0x310 <4>[ 15.037231] kunit_try_run_case+0x1b3/0x490 <4>[ 15.037387] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.037603] kthread+0x257/0x310 <4>[ 15.037764] ret_from_fork+0x41/0x80 <4>[ 15.037930] ret_from_fork_asm+0x1a/0x30 <3>[ 15.038113] <3>[ 15.038213] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.038213] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.038665] The buggy address is located 0 bytes to the right of <3>[ 15.038665] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.039108] <3>[ 15.039192] The buggy address belongs to the physical page: <4>[ 15.039418] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.039726] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.039892] page_type: 0xfdffffff(slab) <4>[ 15.040067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.040383] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.040691] page dumped because: kasan: bad access detected <3>[ 15.040919] <3>[ 15.041004] Memory state around the buggy address: <3>[ 15.041210] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.041465] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.041728] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.042030] ^ <3>[ 15.042233] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.042500] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.042745] ================================================================== <3>[ 15.043321] ================================================================== <3>[ 15.043662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 <3>[ 15.043932] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.044151] <3>[ 15.044236] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.044558] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.044723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.044977] Call Trace: <3>[ 15.045084] <3>[ 15.045185] dump_stack_lvl+0x73/0xb0 <3>[ 15.045360] print_report+0xd1/0x640 <3>[ 15.045526] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.045741] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.046001] kasan_report+0x102/0x140 <3>[ 15.046174] ? kasan_atomics_helper+0x1650/0x5450 <3>[ 15.046381] ? kasan_atomics_helper+0x1650/0x5450 <3>[ 15.046576] kasan_check_range+0x10c/0x1c0 <3>[ 15.046755] __kasan_check_write+0x18/0x20 <3>[ 15.046956] kasan_atomics_helper+0x1650/0x5450 <3>[ 15.047187] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.047389] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.047622] kasan_atomics+0x1dd/0x310 <3>[ 15.047816] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.048014] ? __schedule+0xbca/0x2590 <3>[ 15.048173] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.048352] ? ktime_get_ts64+0x84/0x230 <3>[ 15.048522] kunit_try_run_case+0x1b3/0x490 <3>[ 15.048727] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.048965] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.049186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.049421] ? __kthread_parkme+0x82/0x160 <3>[ 15.049616] ? preempt_count_sub+0x50/0x80 <3>[ 15.049835] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.050065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.050314] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.050546] kthread+0x257/0x310 <3>[ 15.050716] ? __pfx_kthread+0x10/0x10 <3>[ 15.050889] ret_from_fork+0x41/0x80 <3>[ 15.051079] ? __pfx_kthread+0x10/0x10 <3>[ 15.051260] ret_from_fork_asm+0x1a/0x30 <3>[ 15.051445] <3>[ 15.051562] <3>[ 15.051649] Allocated by task 266: <4>[ 15.051805] kasan_save_stack+0x3d/0x60 <4>[ 15.051960] kasan_save_track+0x18/0x40 <4>[ 15.052090] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.052234] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.052365] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.052511] kasan_atomics+0x96/0x310 <4>[ 15.052636] kunit_try_run_case+0x1b3/0x490 <4>[ 15.052778] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.052966] kthread+0x257/0x310 <4>[ 15.053105] ret_from_fork+0x41/0x80 <4>[ 15.053247] ret_from_fork_asm+0x1a/0x30 <3>[ 15.053390] <3>[ 15.053487] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.053487] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.053947] The buggy address is located 0 bytes to the right of <3>[ 15.053947] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.054308] <3>[ 15.054383] The buggy address belongs to the physical page: <4>[ 15.054596] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.054921] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.055128] page_type: 0xfdffffff(slab) <4>[ 15.055284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.055513] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.055730] page dumped because: kasan: bad access detected <3>[ 15.055937] <3>[ 15.056025] Memory state around the buggy address: <3>[ 15.056203] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.056457] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.056730] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.057002] ^ <3>[ 15.057188] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.057431] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.057656] ================================================================== <3>[ 15.058191] ================================================================== <3>[ 15.058445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 <3>[ 15.058716] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.058965] <3>[ 15.059069] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.059378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.059550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.059820] Call Trace: <3>[ 15.059933] <3>[ 15.060028] dump_stack_lvl+0x73/0xb0 <3>[ 15.060186] print_report+0xd1/0x640 <3>[ 15.060335] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.060508] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.060703] kasan_report+0x102/0x140 <3>[ 15.060854] ? kasan_atomics_helper+0x16e8/0x5450 <3>[ 15.061035] ? kasan_atomics_helper+0x16e8/0x5450 <3>[ 15.061210] kasan_check_range+0x10c/0x1c0 <3>[ 15.061371] __kasan_check_write+0x18/0x20 <3>[ 15.061533] kasan_atomics_helper+0x16e8/0x5450 <3>[ 15.061706] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.061886] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.062088] kasan_atomics+0x1dd/0x310 <3>[ 15.062268] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.062454] ? __schedule+0xbca/0x2590 <3>[ 15.062642] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.062853] ? ktime_get_ts64+0x84/0x230 <3>[ 15.063080] kunit_try_run_case+0x1b3/0x490 <3>[ 15.063266] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.063478] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.063685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.063902] ? __kthread_parkme+0x82/0x160 <3>[ 15.064114] ? preempt_count_sub+0x50/0x80 <3>[ 15.064307] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.064479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.064728] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.064991] kthread+0x257/0x310 <3>[ 15.065178] ? __pfx_kthread+0x10/0x10 <3>[ 15.065383] ret_from_fork+0x41/0x80 <3>[ 15.065550] ? __pfx_kthread+0x10/0x10 <3>[ 15.065738] ret_from_fork_asm+0x1a/0x30 <3>[ 15.065925] <3>[ 15.066023] <3>[ 15.066091] Allocated by task 266: <4>[ 15.066227] kasan_save_stack+0x3d/0x60 <4>[ 15.066379] kasan_save_track+0x18/0x40 <4>[ 15.066531] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.066690] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.066844] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.067023] kasan_atomics+0x96/0x310 <4>[ 15.067166] kunit_try_run_case+0x1b3/0x490 <4>[ 15.067332] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.067524] kthread+0x257/0x310 <4>[ 15.067663] ret_from_fork+0x41/0x80 <4>[ 15.067812] ret_from_fork_asm+0x1a/0x30 <3>[ 15.067965] <3>[ 15.068053] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.068053] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.068411] The buggy address is located 0 bytes to the right of <3>[ 15.068411] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.068783] <3>[ 15.068869] The buggy address belongs to the physical page: <4>[ 15.069051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.069302] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.069475] page_type: 0xfdffffff(slab) <4>[ 15.069627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.069863] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.070106] page dumped because: kasan: bad access detected <3>[ 15.070284] <3>[ 15.070369] Memory state around the buggy address: <3>[ 15.070532] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.070749] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.070983] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.071205] ^ <3>[ 15.071370] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.071600] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.071828] ================================================================== <3>[ 15.072277] ================================================================== <3>[ 15.072565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 <3>[ 15.072820] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.073056] <3>[ 15.073154] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.073468] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.073641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.073915] Call Trace: <3>[ 15.074028] <3>[ 15.074133] dump_stack_lvl+0x73/0xb0 <3>[ 15.074294] print_report+0xd1/0x640 <3>[ 15.074442] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.074616] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.074813] kasan_report+0x102/0x140 <3>[ 15.074970] ? kasan_atomics_helper+0x1780/0x5450 <3>[ 15.075151] ? kasan_atomics_helper+0x1780/0x5450 <3>[ 15.075326] kasan_check_range+0x10c/0x1c0 <3>[ 15.075484] __kasan_check_write+0x18/0x20 <3>[ 15.075641] kasan_atomics_helper+0x1780/0x5450 <3>[ 15.075815] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.075996] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.076170] kasan_atomics+0x1dd/0x310 <3>[ 15.076317] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.076471] ? __schedule+0xbca/0x2590 <3>[ 15.076618] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.076766] ? ktime_get_ts64+0x84/0x230 <3>[ 15.076922] kunit_try_run_case+0x1b3/0x490 <3>[ 15.077082] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.077256] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.077428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.077607] ? __kthread_parkme+0x82/0x160 <3>[ 15.077802] ? preempt_count_sub+0x50/0x80 <3>[ 15.078002] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.078222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.078500] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.078749] kthread+0x257/0x310 <3>[ 15.078938] ? __pfx_kthread+0x10/0x10 <3>[ 15.079135] ret_from_fork+0x41/0x80 <3>[ 15.079313] ? __pfx_kthread+0x10/0x10 <3>[ 15.079505] ret_from_fork_asm+0x1a/0x30 <3>[ 15.079703] <3>[ 15.079826] <3>[ 15.079931] Allocated by task 266: <4>[ 15.080090] kasan_save_stack+0x3d/0x60 <4>[ 15.080275] kasan_save_track+0x18/0x40 <4>[ 15.080470] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.080683] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.080876] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.081087] kasan_atomics+0x96/0x310 <4>[ 15.081277] kunit_try_run_case+0x1b3/0x490 <4>[ 15.081464] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.081717] kthread+0x257/0x310 <4>[ 15.081896] ret_from_fork+0x41/0x80 <4>[ 15.082058] ret_from_fork_asm+0x1a/0x30 <3>[ 15.082226] <3>[ 15.082309] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.082309] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.082736] The buggy address is located 0 bytes to the right of <3>[ 15.082736] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.083219] <3>[ 15.083325] The buggy address belongs to the physical page: <4>[ 15.083561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.083891] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.084108] page_type: 0xfdffffff(slab) <4>[ 15.084303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.084592] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.084871] page dumped because: kasan: bad access detected <3>[ 15.085123] <3>[ 15.085224] Memory state around the buggy address: <3>[ 15.085423] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.085710] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.086009] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.086287] ^ <3>[ 15.086481] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.086772] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.087080] ================================================================== <3>[ 15.087614] ================================================================== <3>[ 15.087932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 <3>[ 15.088231] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.088519] <3>[ 15.088625] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.089020] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.089232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.089599] Call Trace: <3>[ 15.089748] <3>[ 15.089869] dump_stack_lvl+0x73/0xb0 <3>[ 15.090067] print_report+0xd1/0x640 <3>[ 15.090274] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.090503] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.090762] kasan_report+0x102/0x140 <3>[ 15.090959] ? kasan_atomics_helper+0x1819/0x5450 <3>[ 15.091195] ? kasan_atomics_helper+0x1819/0x5450 <3>[ 15.091432] kasan_check_range+0x10c/0x1c0 <3>[ 15.091655] __kasan_check_write+0x18/0x20 <3>[ 15.091862] kasan_atomics_helper+0x1819/0x5450 <3>[ 15.092070] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.092290] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.092501] kasan_atomics+0x1dd/0x310 <3>[ 15.092677] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.092876] ? __schedule+0xbca/0x2590 <3>[ 15.093039] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.093189] ? ktime_get_ts64+0x84/0x230 <3>[ 15.093337] kunit_try_run_case+0x1b3/0x490 <3>[ 15.093533] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.093700] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.093910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.094138] ? __kthread_parkme+0x82/0x160 <3>[ 15.094360] ? preempt_count_sub+0x50/0x80 <3>[ 15.094584] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.094822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.095098] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.095346] kthread+0x257/0x310 <3>[ 15.095535] ? __pfx_kthread+0x10/0x10 <3>[ 15.095737] ret_from_fork+0x41/0x80 <3>[ 15.095925] ? __pfx_kthread+0x10/0x10 <3>[ 15.096130] ret_from_fork_asm+0x1a/0x30 <3>[ 15.096324] <3>[ 15.096438] <3>[ 15.096530] Allocated by task 266: <4>[ 15.096698] kasan_save_stack+0x3d/0x60 <4>[ 15.096882] kasan_save_track+0x18/0x40 <4>[ 15.097057] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.097252] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.097439] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.097624] kasan_atomics+0x96/0x310 <4>[ 15.097752] kunit_try_run_case+0x1b3/0x490 <4>[ 15.097909] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.098127] kthread+0x257/0x310 <4>[ 15.098279] ret_from_fork+0x41/0x80 <4>[ 15.098413] ret_from_fork_asm+0x1a/0x30 <3>[ 15.098597] <3>[ 15.098673] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.098673] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.099007] The buggy address is located 0 bytes to the right of <3>[ 15.099007] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.099356] <3>[ 15.099427] The buggy address belongs to the physical page: <4>[ 15.099597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.099825] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.099983] page_type: 0xfdffffff(slab) <4>[ 15.100121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.100348] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.100605] page dumped because: kasan: bad access detected <3>[ 15.100827] <3>[ 15.100917] Memory state around the buggy address: <3>[ 15.101132] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.101416] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.101703] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.101978] ^ <3>[ 15.102149] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.102438] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.102732] ================================================================== <3>[ 15.103339] ================================================================== <3>[ 15.103650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 <3>[ 15.103969] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.104219] <3>[ 15.104322] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.104711] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.104925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.105269] Call Trace: <3>[ 15.105395] <3>[ 15.105523] dump_stack_lvl+0x73/0xb0 <3>[ 15.105714] print_report+0xd1/0x640 <3>[ 15.105877] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.106064] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.106293] kasan_report+0x102/0x140 <3>[ 15.106447] ? kasan_atomics_helper+0x18b2/0x5450 <3>[ 15.106615] ? kasan_atomics_helper+0x18b2/0x5450 <3>[ 15.106835] kasan_check_range+0x10c/0x1c0 <3>[ 15.107023] __kasan_check_write+0x18/0x20 <3>[ 15.107220] kasan_atomics_helper+0x18b2/0x5450 <3>[ 15.107444] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.107635] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.107815] kasan_atomics+0x1dd/0x310 <3>[ 15.107967] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.108116] ? __schedule+0xbca/0x2590 <3>[ 15.108267] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.108416] ? ktime_get_ts64+0x84/0x230 <3>[ 15.108564] kunit_try_run_case+0x1b3/0x490 <3>[ 15.108722] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.108949] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.109184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.109426] ? __kthread_parkme+0x82/0x160 <3>[ 15.109640] ? preempt_count_sub+0x50/0x80 <3>[ 15.109858] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.110088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.110344] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.110592] kthread+0x257/0x310 <3>[ 15.110784] ? __pfx_kthread+0x10/0x10 <3>[ 15.111001] ret_from_fork+0x41/0x80 <3>[ 15.111206] ? __pfx_kthread+0x10/0x10 <3>[ 15.111396] ret_from_fork_asm+0x1a/0x30 <3>[ 15.111627] <3>[ 15.111773] <3>[ 15.111859] Allocated by task 266: <4>[ 15.112056] kasan_save_stack+0x3d/0x60 <4>[ 15.112265] kasan_save_track+0x18/0x40 <4>[ 15.112460] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.112635] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.112856] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.113073] kasan_atomics+0x96/0x310 <4>[ 15.113261] kunit_try_run_case+0x1b3/0x490 <4>[ 15.113482] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.113731] kthread+0x257/0x310 <4>[ 15.113911] ret_from_fork+0x41/0x80 <4>[ 15.114100] ret_from_fork_asm+0x1a/0x30 <3>[ 15.114298] <3>[ 15.114428] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.114428] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.114862] The buggy address is located 0 bytes to the right of <3>[ 15.114862] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.115317] <3>[ 15.115430] The buggy address belongs to the physical page: <4>[ 15.115667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.115956] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.116182] page_type: 0xfdffffff(slab) <4>[ 15.116334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.116638] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.116907] page dumped because: kasan: bad access detected <3>[ 15.117127] <3>[ 15.117207] Memory state around the buggy address: <3>[ 15.117441] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.117703] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.117986] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.118249] ^ <3>[ 15.118460] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.118719] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.118996] ================================================================== <3>[ 15.119600] ================================================================== <3>[ 15.119968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 <3>[ 15.120254] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.120538] <3>[ 15.120708] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.121099] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.121309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.121618] Call Trace: <3>[ 15.121782] <3>[ 15.121936] dump_stack_lvl+0x73/0xb0 <3>[ 15.122138] print_report+0xd1/0x640 <3>[ 15.122334] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.122544] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.122783] kasan_report+0x102/0x140 <3>[ 15.122993] ? kasan_atomics_helper+0x194b/0x5450 <3>[ 15.123213] ? kasan_atomics_helper+0x194b/0x5450 <3>[ 15.123443] kasan_check_range+0x10c/0x1c0 <3>[ 15.123655] __kasan_check_write+0x18/0x20 <3>[ 15.123860] kasan_atomics_helper+0x194b/0x5450 <3>[ 15.124082] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.124310] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.124552] kasan_atomics+0x1dd/0x310 <3>[ 15.124753] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.124960] ? __schedule+0xbca/0x2590 <3>[ 15.125155] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.125349] ? ktime_get_ts64+0x84/0x230 <3>[ 15.125550] kunit_try_run_case+0x1b3/0x490 <3>[ 15.125781] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.126013] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.126187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.126459] ? __kthread_parkme+0x82/0x160 <3>[ 15.126692] ? preempt_count_sub+0x50/0x80 <3>[ 15.126940] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.127185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.127439] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.127684] kthread+0x257/0x310 <3>[ 15.127876] ? __pfx_kthread+0x10/0x10 <3>[ 15.128073] ret_from_fork+0x41/0x80 <3>[ 15.128288] ? __pfx_kthread+0x10/0x10 <3>[ 15.128492] ret_from_fork_asm+0x1a/0x30 <3>[ 15.128728] <3>[ 15.128834] <3>[ 15.128942] Allocated by task 266: <4>[ 15.129130] kasan_save_stack+0x3d/0x60 <4>[ 15.129304] kasan_save_track+0x18/0x40 <4>[ 15.129507] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.129695] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.129838] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.130017] kasan_atomics+0x96/0x310 <4>[ 15.130173] kunit_try_run_case+0x1b3/0x490 <4>[ 15.130337] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.130549] kthread+0x257/0x310 <4>[ 15.130673] ret_from_fork+0x41/0x80 <4>[ 15.130837] ret_from_fork_asm+0x1a/0x30 <3>[ 15.130998] <3>[ 15.131099] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.131099] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.131485] The buggy address is located 0 bytes to the right of <3>[ 15.131485] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.131886] <3>[ 15.131981] The buggy address belongs to the physical page: <4>[ 15.132181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.132447] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.132641] page_type: 0xfdffffff(slab) <4>[ 15.132795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.133049] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.133278] page dumped because: kasan: bad access detected <3>[ 15.133461] <3>[ 15.133554] Memory state around the buggy address: <3>[ 15.133727] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.133954] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.134176] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.134393] ^ <3>[ 15.134547] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.134785] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.135020] ================================================================== <3>[ 15.135502] ================================================================== <3>[ 15.135766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 <3>[ 15.136038] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.136271] <3>[ 15.136358] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.136695] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.136858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.137115] Call Trace: <3>[ 15.137230] <3>[ 15.137335] dump_stack_lvl+0x73/0xb0 <3>[ 15.137491] print_report+0xd1/0x640 <3>[ 15.137634] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.137790] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.137974] kasan_report+0x102/0x140 <3>[ 15.138115] ? kasan_atomics_helper+0x19e4/0x5450 <3>[ 15.138283] ? kasan_atomics_helper+0x19e4/0x5450 <3>[ 15.138452] kasan_check_range+0x10c/0x1c0 <3>[ 15.138603] __kasan_check_write+0x18/0x20 <3>[ 15.138751] kasan_atomics_helper+0x19e4/0x5450 <3>[ 15.138925] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.139119] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.139333] kasan_atomics+0x1dd/0x310 <3>[ 15.139516] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.139672] ? __schedule+0xbca/0x2590 <3>[ 15.139817] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.139962] ? ktime_get_ts64+0x84/0x230 <3>[ 15.140107] kunit_try_run_case+0x1b3/0x490 <3>[ 15.140257] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.140430] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.140590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.140765] ? __kthread_parkme+0x82/0x160 <3>[ 15.140917] ? preempt_count_sub+0x50/0x80 <3>[ 15.141070] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.141233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.141430] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.141611] kthread+0x257/0x310 <3>[ 15.141737] ? __pfx_kthread+0x10/0x10 <3>[ 15.141877] ret_from_fork+0x41/0x80 <3>[ 15.142008] ? __pfx_kthread+0x10/0x10 <3>[ 15.142148] ret_from_fork_asm+0x1a/0x30 <3>[ 15.142301] <3>[ 15.142398] <3>[ 15.142469] Allocated by task 266: <4>[ 15.142592] kasan_save_stack+0x3d/0x60 <4>[ 15.142732] kasan_save_track+0x18/0x40 <4>[ 15.142869] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.143029] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.143169] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.143327] kasan_atomics+0x96/0x310 <4>[ 15.143457] kunit_try_run_case+0x1b3/0x490 <4>[ 15.143598] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.143768] kthread+0x257/0x310 <4>[ 15.143890] ret_from_fork+0x41/0x80 <4>[ 15.144013] ret_from_fork_asm+0x1a/0x30 <3>[ 15.144148] <3>[ 15.144219] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.144219] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.144545] The buggy address is located 0 bytes to the right of <3>[ 15.144545] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.144889] <3>[ 15.144959] The buggy address belongs to the physical page: <4>[ 15.145121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.145354] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.145513] page_type: 0xfdffffff(slab) <4>[ 15.145655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.145881] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.146097] page dumped because: kasan: bad access detected <3>[ 15.146263] <3>[ 15.146332] Memory state around the buggy address: <3>[ 15.146478] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.146690] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.146921] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.147122] ^ <3>[ 15.147271] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.147476] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.147668] ================================================================== <3>[ 15.148236] ================================================================== <3>[ 15.148459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 <3>[ 15.148770] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.149006] <3>[ 15.149111] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.149417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.149574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.149837] Call Trace: <3>[ 15.149939] <3>[ 15.150034] dump_stack_lvl+0x73/0xb0 <3>[ 15.150177] print_report+0xd1/0x640 <3>[ 15.150318] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.150470] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.150652] kasan_report+0x102/0x140 <3>[ 15.150791] ? kasan_atomics_helper+0x1a80/0x5450 <3>[ 15.150973] ? kasan_atomics_helper+0x1a80/0x5450 <3>[ 15.151143] kasan_check_range+0x10c/0x1c0 <3>[ 15.151285] __kasan_check_write+0x18/0x20 <3>[ 15.151438] kasan_atomics_helper+0x1a80/0x5450 <3>[ 15.151601] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.151774] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.151943] kasan_atomics+0x1dd/0x310 <3>[ 15.152083] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.152234] ? __schedule+0xbca/0x2590 <3>[ 15.152375] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.152518] ? ktime_get_ts64+0x84/0x230 <3>[ 15.152660] kunit_try_run_case+0x1b3/0x490 <3>[ 15.152827] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.152994] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.153164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.153347] ? __kthread_parkme+0x82/0x160 <3>[ 15.153502] ? preempt_count_sub+0x50/0x80 <3>[ 15.153663] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.153834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.154031] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.154217] kthread+0x257/0x310 <3>[ 15.154348] ? __pfx_kthread+0x10/0x10 <3>[ 15.154506] ret_from_fork+0x41/0x80 <3>[ 15.154651] ? __pfx_kthread+0x10/0x10 <3>[ 15.154810] ret_from_fork_asm+0x1a/0x30 <3>[ 15.154987] <3>[ 15.155087] <3>[ 15.155176] Allocated by task 266: <4>[ 15.155309] kasan_save_stack+0x3d/0x60 <4>[ 15.155458] kasan_save_track+0x18/0x40 <4>[ 15.155604] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.155758] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.155906] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.156070] kasan_atomics+0x96/0x310 <4>[ 15.156214] kunit_try_run_case+0x1b3/0x490 <4>[ 15.156371] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.156555] kthread+0x257/0x310 <4>[ 15.156695] ret_from_fork+0x41/0x80 <4>[ 15.156829] ret_from_fork_asm+0x1a/0x30 <3>[ 15.156982] <3>[ 15.157061] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.157061] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.157418] The buggy address is located 0 bytes to the right of <3>[ 15.157418] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.157784] <3>[ 15.157864] The buggy address belongs to the physical page: <4>[ 15.158041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.158283] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.158450] page_type: 0xfdffffff(slab) <4>[ 15.158602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.158844] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.159087] page dumped because: kasan: bad access detected <3>[ 15.159276] <3>[ 15.159359] Memory state around the buggy address: <3>[ 15.159526] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.159752] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.159994] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.160210] ^ <3>[ 15.160376] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.160592] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.160811] ================================================================== <3>[ 15.161297] ================================================================== <3>[ 15.161552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 <3>[ 15.161807] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.162037] <3>[ 15.162128] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.162440] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.162608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.162945] Call Trace: <3>[ 15.163056] <3>[ 15.163164] dump_stack_lvl+0x73/0xb0 <3>[ 15.163319] print_report+0xd1/0x640 <3>[ 15.163477] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.163638] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.163827] kasan_report+0x102/0x140 <3>[ 15.163974] ? kasan_atomics_helper+0x1b23/0x5450 <3>[ 15.164150] ? kasan_atomics_helper+0x1b23/0x5450 <3>[ 15.164318] kasan_check_range+0x10c/0x1c0 <3>[ 15.164485] __kasan_check_write+0x18/0x20 <3>[ 15.164637] kasan_atomics_helper+0x1b23/0x5450 <3>[ 15.164814] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.164982] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.165161] kasan_atomics+0x1dd/0x310 <3>[ 15.165303] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.165464] ? __schedule+0xbca/0x2590 <3>[ 15.165611] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.165764] ? ktime_get_ts64+0x84/0x230 <3>[ 15.165921] kunit_try_run_case+0x1b3/0x490 <3>[ 15.166082] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.166260] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.166428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.166622] ? __kthread_parkme+0x82/0x160 <3>[ 15.166772] ? preempt_count_sub+0x50/0x80 <3>[ 15.166950] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.167126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.167338] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.167531] kthread+0x257/0x310 <3>[ 15.167667] ? __pfx_kthread+0x10/0x10 <3>[ 15.167818] ret_from_fork+0x41/0x80 <3>[ 15.167963] ? __pfx_kthread+0x10/0x10 <3>[ 15.168107] ret_from_fork_asm+0x1a/0x30 <3>[ 15.168267] <3>[ 15.168364] <3>[ 15.168442] Allocated by task 266: <4>[ 15.168570] kasan_save_stack+0x3d/0x60 <4>[ 15.168720] kasan_save_track+0x18/0x40 <4>[ 15.168866] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.169053] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.169296] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.169557] kasan_atomics+0x96/0x310 <4>[ 15.169738] kunit_try_run_case+0x1b3/0x490 <4>[ 15.169884] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.170060] kthread+0x257/0x310 <4>[ 15.170186] ret_from_fork+0x41/0x80 <4>[ 15.170316] ret_from_fork_asm+0x1a/0x30 <3>[ 15.170471] <3>[ 15.170547] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.170547] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.170914] The buggy address is located 0 bytes to the right of <3>[ 15.170914] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.171281] <3>[ 15.171369] The buggy address belongs to the physical page: <4>[ 15.171547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.171790] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.171961] page_type: 0xfdffffff(slab) <4>[ 15.172111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.172341] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.172571] page dumped because: kasan: bad access detected <3>[ 15.172746] <3>[ 15.172819] Memory state around the buggy address: <3>[ 15.172978] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.173197] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.173419] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.173633] ^ <3>[ 15.173792] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.174015] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.174275] ================================================================== <3>[ 15.174751] ================================================================== <3>[ 15.175001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 <3>[ 15.175285] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.175521] <3>[ 15.175602] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.175962] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.176144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.176423] Call Trace: <3>[ 15.176532] <3>[ 15.176650] dump_stack_lvl+0x73/0xb0 <3>[ 15.176810] print_report+0xd1/0x640 <3>[ 15.176967] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.177146] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.177356] kasan_report+0x102/0x140 <3>[ 15.177502] ? kasan_atomics_helper+0x1c19/0x5450 <3>[ 15.177700] ? kasan_atomics_helper+0x1c19/0x5450 <3>[ 15.177881] kasan_check_range+0x10c/0x1c0 <3>[ 15.178061] __kasan_check_write+0x18/0x20 <3>[ 15.178222] kasan_atomics_helper+0x1c19/0x5450 <3>[ 15.178419] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.178600] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.178798] kasan_atomics+0x1dd/0x310 <3>[ 15.178948] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.179135] ? __schedule+0xbca/0x2590 <3>[ 15.179276] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.179432] ? ktime_get_ts64+0x84/0x230 <3>[ 15.179609] kunit_try_run_case+0x1b3/0x490 <3>[ 15.179766] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.179950] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.180109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.180307] ? __kthread_parkme+0x82/0x160 <3>[ 15.180462] ? preempt_count_sub+0x50/0x80 <3>[ 15.180645] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.180813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.181043] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.181243] kthread+0x257/0x310 <3>[ 15.181378] ? __pfx_kthread+0x10/0x10 <3>[ 15.181549] ret_from_fork+0x41/0x80 <3>[ 15.181693] ? __pfx_kthread+0x10/0x10 <3>[ 15.181847] ret_from_fork_asm+0x1a/0x30 <3>[ 15.182032] <3>[ 15.182127] <3>[ 15.182202] Allocated by task 266: <4>[ 15.182351] kasan_save_stack+0x3d/0x60 <4>[ 15.182516] kasan_save_track+0x18/0x40 <4>[ 15.182656] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.182826] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.182980] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.183163] kasan_atomics+0x96/0x310 <4>[ 15.183302] kunit_try_run_case+0x1b3/0x490 <4>[ 15.183470] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.183645] kthread+0x257/0x310 <4>[ 15.183767] ret_from_fork+0x41/0x80 <4>[ 15.183896] ret_from_fork_asm+0x1a/0x30 <3>[ 15.184035] <3>[ 15.184111] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.184111] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.184449] The buggy address is located 0 bytes to the right of <3>[ 15.184449] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.184803] <3>[ 15.184875] The buggy address belongs to the physical page: <4>[ 15.185046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.185282] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.185442] page_type: 0xfdffffff(slab) <4>[ 15.185575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.185821] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.186058] page dumped because: kasan: bad access detected <3>[ 15.186228] <3>[ 15.186315] Memory state around the buggy address: <3>[ 15.186501] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.186737] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.186987] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.187230] ^ <3>[ 15.187406] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.187665] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.187900] ================================================================== <3>[ 15.188310] ================================================================== <3>[ 15.188539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 <3>[ 15.188904] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.189226] <3>[ 15.189346] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.189791] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.190017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.190334] Call Trace: <3>[ 15.190444] <3>[ 15.190572] dump_stack_lvl+0x73/0xb0 <3>[ 15.190773] print_report+0xd1/0x640 <3>[ 15.190948] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.191118] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.191314] kasan_report+0x102/0x140 <3>[ 15.191469] ? kasan_atomics_helper+0x4f32/0x5450 <3>[ 15.191641] ? kasan_atomics_helper+0x4f32/0x5450 <3>[ 15.191827] __asan_report_load8_noabort+0x18/0x20 <3>[ 15.192001] kasan_atomics_helper+0x4f32/0x5450 <3>[ 15.192178] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.192369] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.192552] kasan_atomics+0x1dd/0x310 <3>[ 15.192702] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.192868] ? __schedule+0xbca/0x2590 <3>[ 15.193016] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.193172] ? ktime_get_ts64+0x84/0x230 <3>[ 15.193318] kunit_try_run_case+0x1b3/0x490 <3>[ 15.193477] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.193655] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.193826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.194002] ? __kthread_parkme+0x82/0x160 <3>[ 15.194167] ? preempt_count_sub+0x50/0x80 <3>[ 15.194327] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.194498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.194707] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.194915] kthread+0x257/0x310 <3>[ 15.195052] ? __pfx_kthread+0x10/0x10 <3>[ 15.195205] ret_from_fork+0x41/0x80 <3>[ 15.195346] ? __pfx_kthread+0x10/0x10 <3>[ 15.195489] ret_from_fork_asm+0x1a/0x30 <3>[ 15.195646] <3>[ 15.195744] <3>[ 15.195817] Allocated by task 266: <4>[ 15.195945] kasan_save_stack+0x3d/0x60 <4>[ 15.196097] kasan_save_track+0x18/0x40 <4>[ 15.196244] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.196396] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.196538] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.196701] kasan_atomics+0x96/0x310 <4>[ 15.196843] kunit_try_run_case+0x1b3/0x490 <4>[ 15.197001] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.197189] kthread+0x257/0x310 <4>[ 15.197329] ret_from_fork+0x41/0x80 <4>[ 15.197470] ret_from_fork_asm+0x1a/0x30 <3>[ 15.197634] <3>[ 15.197715] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.197715] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.198083] The buggy address is located 0 bytes to the right of <3>[ 15.198083] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.198464] <3>[ 15.198546] The buggy address belongs to the physical page: <4>[ 15.198725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.198980] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.199166] page_type: 0xfdffffff(slab) <4>[ 15.199351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.199584] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.199809] page dumped because: kasan: bad access detected <3>[ 15.199986] <3>[ 15.200062] Memory state around the buggy address: <3>[ 15.200220] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.200438] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.200654] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.200860] ^ <3>[ 15.201020] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.201237] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.201457] ================================================================== <3>[ 15.201921] ================================================================== <3>[ 15.202156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 <3>[ 15.202376] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.202606] <3>[ 15.202701] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.203028] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.203187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.203448] Call Trace: <3>[ 15.203547] <3>[ 15.203635] dump_stack_lvl+0x73/0xb0 <3>[ 15.203778] print_report+0xd1/0x640 <3>[ 15.203914] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.204073] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.204248] kasan_report+0x102/0x140 <3>[ 15.204386] ? kasan_atomics_helper+0x1ce2/0x5450 <3>[ 15.204548] ? kasan_atomics_helper+0x1ce2/0x5450 <3>[ 15.204720] kasan_check_range+0x10c/0x1c0 <3>[ 15.204873] __kasan_check_write+0x18/0x20 <3>[ 15.205018] kasan_atomics_helper+0x1ce2/0x5450 <3>[ 15.205177] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.205342] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.205527] kasan_atomics+0x1dd/0x310 <3>[ 15.205667] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.205822] ? __schedule+0xbca/0x2590 <3>[ 15.205962] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.206111] ? ktime_get_ts64+0x84/0x230 <3>[ 15.206256] kunit_try_run_case+0x1b3/0x490 <3>[ 15.206420] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.206582] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.206742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.206926] ? __kthread_parkme+0x82/0x160 <3>[ 15.207075] ? preempt_count_sub+0x50/0x80 <3>[ 15.207222] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.207386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.207581] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.207762] kthread+0x257/0x310 <3>[ 15.207896] ? __pfx_kthread+0x10/0x10 <3>[ 15.208037] ret_from_fork+0x41/0x80 <3>[ 15.208175] ? __pfx_kthread+0x10/0x10 <3>[ 15.208319] ret_from_fork_asm+0x1a/0x30 <3>[ 15.208496] <3>[ 15.208600] <3>[ 15.208678] Allocated by task 266: <4>[ 15.208813] kasan_save_stack+0x3d/0x60 <4>[ 15.208971] kasan_save_track+0x18/0x40 <4>[ 15.209124] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.209279] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.209426] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.209607] kasan_atomics+0x96/0x310 <4>[ 15.209746] kunit_try_run_case+0x1b3/0x490 <4>[ 15.209906] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.210095] kthread+0x257/0x310 <4>[ 15.210234] ret_from_fork+0x41/0x80 <4>[ 15.210399] ret_from_fork_asm+0x1a/0x30 <3>[ 15.210546] <3>[ 15.210687] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.210687] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.211243] The buggy address is located 0 bytes to the right of <3>[ 15.211243] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.211631] <3>[ 15.211705] The buggy address belongs to the physical page: <4>[ 15.211874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.212116] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.212274] page_type: 0xfdffffff(slab) <4>[ 15.212409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.212633] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.212852] page dumped because: kasan: bad access detected <3>[ 15.213101] <3>[ 15.213180] Memory state around the buggy address: <3>[ 15.213348] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.213590] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.213837] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.214063] ^ <3>[ 15.214233] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.214481] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.214705] ================================================================== <3>[ 15.215266] ================================================================== <3>[ 15.215494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 <3>[ 15.215741] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.215974] <3>[ 15.216059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.216359] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.216523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.216794] Call Trace: <3>[ 15.216903] <3>[ 15.217004] dump_stack_lvl+0x73/0xb0 <3>[ 15.217158] print_report+0xd1/0x640 <3>[ 15.217305] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.217471] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.217659] kasan_report+0x102/0x140 <3>[ 15.217798] ? kasan_atomics_helper+0x1d7b/0x5450 <3>[ 15.217975] ? kasan_atomics_helper+0x1d7b/0x5450 <3>[ 15.218145] kasan_check_range+0x10c/0x1c0 <3>[ 15.218304] __kasan_check_write+0x18/0x20 <3>[ 15.218465] kasan_atomics_helper+0x1d7b/0x5450 <3>[ 15.218639] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.218816] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.219000] kasan_atomics+0x1dd/0x310 <3>[ 15.219153] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.219316] ? __schedule+0xbca/0x2590 <3>[ 15.219462] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.219612] ? ktime_get_ts64+0x84/0x230 <3>[ 15.219770] kunit_try_run_case+0x1b3/0x490 <3>[ 15.219954] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.220163] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.220335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.220562] ? __kthread_parkme+0x82/0x160 <3>[ 15.220744] ? preempt_count_sub+0x50/0x80 <3>[ 15.220898] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.221087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.221301] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.221504] kthread+0x257/0x310 <3>[ 15.221639] ? __pfx_kthread+0x10/0x10 <3>[ 15.221796] ret_from_fork+0x41/0x80 <3>[ 15.221933] ? __pfx_kthread+0x10/0x10 <3>[ 15.222119] ret_from_fork_asm+0x1a/0x30 <3>[ 15.222348] <3>[ 15.222485] <3>[ 15.222595] Allocated by task 266: <4>[ 15.222776] kasan_save_stack+0x3d/0x60 <4>[ 15.222986] kasan_save_track+0x18/0x40 <4>[ 15.223193] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.223421] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.223625] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.223819] kasan_atomics+0x96/0x310 <4>[ 15.223978] kunit_try_run_case+0x1b3/0x490 <4>[ 15.224146] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.224426] kthread+0x257/0x310 <4>[ 15.224618] ret_from_fork+0x41/0x80 <4>[ 15.224828] ret_from_fork_asm+0x1a/0x30 <3>[ 15.225059] <3>[ 15.225180] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.225180] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.225679] The buggy address is located 0 bytes to the right of <3>[ 15.225679] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.226062] <3>[ 15.226135] The buggy address belongs to the physical page: <4>[ 15.226315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.226549] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.226712] page_type: 0xfdffffff(slab) <4>[ 15.226853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.227102] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.227326] page dumped because: kasan: bad access detected <3>[ 15.227495] <3>[ 15.227563] Memory state around the buggy address: <3>[ 15.227712] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.227918] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.228128] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.228341] ^ <3>[ 15.228490] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.228703] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.228913] ================================================================== <3>[ 15.229289] ================================================================== <3>[ 15.229525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 <3>[ 15.229850] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.230093] <3>[ 15.230173] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.230474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.230634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.230890] Call Trace: <3>[ 15.231000] <3>[ 15.231095] dump_stack_lvl+0x73/0xb0 <3>[ 15.231246] print_report+0xd1/0x640 <3>[ 15.231384] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.231561] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.231763] kasan_report+0x102/0x140 <3>[ 15.231904] ? kasan_atomics_helper+0x1e13/0x5450 <3>[ 15.232075] ? kasan_atomics_helper+0x1e13/0x5450 <3>[ 15.232242] kasan_check_range+0x10c/0x1c0 <3>[ 15.232402] __kasan_check_write+0x18/0x20 <3>[ 15.232560] kasan_atomics_helper+0x1e13/0x5450 <3>[ 15.232730] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.232896] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.233068] kasan_atomics+0x1dd/0x310 <3>[ 15.233211] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.233365] ? __schedule+0xbca/0x2590 <3>[ 15.233520] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.233657] ? ktime_get_ts64+0x84/0x230 <3>[ 15.233797] kunit_try_run_case+0x1b3/0x490 <3>[ 15.233976] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.234155] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.234326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.234501] ? __kthread_parkme+0x82/0x160 <3>[ 15.234651] ? preempt_count_sub+0x50/0x80 <3>[ 15.234803] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.234973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.235170] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.235354] kthread+0x257/0x310 <3>[ 15.235498] ? __pfx_kthread+0x10/0x10 <3>[ 15.235650] ret_from_fork+0x41/0x80 <3>[ 15.235797] ? __pfx_kthread+0x10/0x10 <3>[ 15.235941] ret_from_fork_asm+0x1a/0x30 <3>[ 15.236122] <3>[ 15.236221] <3>[ 15.236300] Allocated by task 266: <4>[ 15.236426] kasan_save_stack+0x3d/0x60 <4>[ 15.236576] kasan_save_track+0x18/0x40 <4>[ 15.236722] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.236885] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.237027] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.237203] kasan_atomics+0x96/0x310 <4>[ 15.237342] kunit_try_run_case+0x1b3/0x490 <4>[ 15.237504] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.237686] kthread+0x257/0x310 <4>[ 15.237810] ret_from_fork+0x41/0x80 <4>[ 15.237944] ret_from_fork_asm+0x1a/0x30 <3>[ 15.238094] <3>[ 15.238181] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.238181] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.238537] The buggy address is located 0 bytes to the right of <3>[ 15.238537] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.238911] <3>[ 15.238992] The buggy address belongs to the physical page: <4>[ 15.239170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.239426] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.239611] page_type: 0xfdffffff(slab) <4>[ 15.239750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.239998] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.240250] page dumped because: kasan: bad access detected <3>[ 15.240433] <3>[ 15.240508] Memory state around the buggy address: <3>[ 15.240680] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.240905] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.241128] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.241353] ^ <3>[ 15.241520] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.241742] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.241962] ================================================================== <3>[ 15.242341] ================================================================== <3>[ 15.242688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 <3>[ 15.242965] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.243207] <3>[ 15.243289] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.243617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.243796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.244075] Call Trace: <3>[ 15.244191] <3>[ 15.244295] dump_stack_lvl+0x73/0xb0 <3>[ 15.244456] print_report+0xd1/0x640 <3>[ 15.244617] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.244785] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.244993] kasan_report+0x102/0x140 <3>[ 15.245167] ? kasan_atomics_helper+0x1eab/0x5450 <3>[ 15.245346] ? kasan_atomics_helper+0x1eab/0x5450 <3>[ 15.245528] kasan_check_range+0x10c/0x1c0 <3>[ 15.245698] __kasan_check_write+0x18/0x20 <3>[ 15.245897] kasan_atomics_helper+0x1eab/0x5450 <3>[ 15.246083] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.246283] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.246470] kasan_atomics+0x1dd/0x310 <3>[ 15.246629] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.246794] ? __schedule+0xbca/0x2590 <3>[ 15.246947] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.247102] ? ktime_get_ts64+0x84/0x230 <3>[ 15.247275] kunit_try_run_case+0x1b3/0x490 <3>[ 15.247442] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.247616] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.247788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.247969] ? __kthread_parkme+0x82/0x160 <3>[ 15.248127] ? preempt_count_sub+0x50/0x80 <3>[ 15.248288] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.248461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.248670] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.248857] kthread+0x257/0x310 <3>[ 15.248988] ? __pfx_kthread+0x10/0x10 <3>[ 15.249136] ret_from_fork+0x41/0x80 <3>[ 15.249278] ? __pfx_kthread+0x10/0x10 <3>[ 15.249435] ret_from_fork_asm+0x1a/0x30 <3>[ 15.249600] <3>[ 15.249701] <3>[ 15.249789] Allocated by task 266: <4>[ 15.249920] kasan_save_stack+0x3d/0x60 <4>[ 15.250075] kasan_save_track+0x18/0x40 <4>[ 15.250228] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.250388] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.250546] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.250719] kasan_atomics+0x96/0x310 <4>[ 15.250862] kunit_try_run_case+0x1b3/0x490 <4>[ 15.251045] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.251239] kthread+0x257/0x310 <4>[ 15.251392] ret_from_fork+0x41/0x80 <4>[ 15.251632] ret_from_fork_asm+0x1a/0x30 <3>[ 15.251858] <3>[ 15.251986] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.251986] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.252367] The buggy address is located 0 bytes to the right of <3>[ 15.252367] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.252768] <3>[ 15.252840] The buggy address belongs to the physical page: <4>[ 15.253056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.253319] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.253501] page_type: 0xfdffffff(slab) <4>[ 15.253654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.253905] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.254144] page dumped because: kasan: bad access detected <3>[ 15.254335] <3>[ 15.254406] Memory state around the buggy address: <3>[ 15.254571] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.254830] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.255096] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.255330] ^ <3>[ 15.255497] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.255737] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.255963] ================================================================== <3>[ 15.256380] ================================================================== <3>[ 15.256611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 <3>[ 15.256880] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.257126] <3>[ 15.257221] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.257557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.257717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.258013] Call Trace: <3>[ 15.258116] <3>[ 15.258225] dump_stack_lvl+0x73/0xb0 <3>[ 15.258402] print_report+0xd1/0x640 <3>[ 15.258545] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.258715] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.258955] kasan_report+0x102/0x140 <3>[ 15.259119] ? kasan_atomics_helper+0x1f44/0x5450 <3>[ 15.259319] ? kasan_atomics_helper+0x1f44/0x5450 <3>[ 15.259505] kasan_check_range+0x10c/0x1c0 <3>[ 15.259674] __kasan_check_write+0x18/0x20 <3>[ 15.259838] kasan_atomics_helper+0x1f44/0x5450 <3>[ 15.260032] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.260216] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.260407] kasan_atomics+0x1dd/0x310 <3>[ 15.260581] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.260767] ? __schedule+0xbca/0x2590 <3>[ 15.260927] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.261085] ? ktime_get_ts64+0x84/0x230 <3>[ 15.261251] kunit_try_run_case+0x1b3/0x490 <3>[ 15.261426] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.261614] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.261794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.261990] ? __kthread_parkme+0x82/0x160 <3>[ 15.262157] ? preempt_count_sub+0x50/0x80 <3>[ 15.262325] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.262514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.262728] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.262918] kthread+0x257/0x310 <3>[ 15.263072] ? __pfx_kthread+0x10/0x10 <3>[ 15.263235] ret_from_fork+0x41/0x80 <3>[ 15.263389] ? __pfx_kthread+0x10/0x10 <3>[ 15.263546] ret_from_fork_asm+0x1a/0x30 <3>[ 15.263726] <3>[ 15.263828] <3>[ 15.263901] Allocated by task 266: <4>[ 15.264037] kasan_save_stack+0x3d/0x60 <4>[ 15.264212] kasan_save_track+0x18/0x40 <4>[ 15.264372] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.264533] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.264687] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.264857] kasan_atomics+0x96/0x310 <4>[ 15.265011] kunit_try_run_case+0x1b3/0x490 <4>[ 15.265173] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.265374] kthread+0x257/0x310 <4>[ 15.265506] ret_from_fork+0x41/0x80 <4>[ 15.265649] ret_from_fork_asm+0x1a/0x30 <3>[ 15.265801] <3>[ 15.265892] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.265892] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.266253] The buggy address is located 0 bytes to the right of <3>[ 15.266253] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.266627] <3>[ 15.266716] The buggy address belongs to the physical page: <4>[ 15.266918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.267167] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.267326] page_type: 0xfdffffff(slab) <4>[ 15.267479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.267729] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.267965] page dumped because: kasan: bad access detected <3>[ 15.268138] <3>[ 15.268230] Memory state around the buggy address: <3>[ 15.268399] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.268639] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.268871] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.269097] ^ <3>[ 15.269256] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.269500] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.269716] ================================================================== <3>[ 15.270180] ================================================================== <3>[ 15.270574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 <3>[ 15.270830] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.271050] <3>[ 15.271134] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.271439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.271589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.271860] Call Trace: <3>[ 15.271959] <3>[ 15.272049] dump_stack_lvl+0x73/0xb0 <3>[ 15.272195] print_report+0xd1/0x640 <3>[ 15.272332] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.272491] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.272673] kasan_report+0x102/0x140 <3>[ 15.272811] ? kasan_atomics_helper+0x4f73/0x5450 <3>[ 15.272983] ? kasan_atomics_helper+0x4f73/0x5450 <3>[ 15.273156] __asan_report_load8_noabort+0x18/0x20 <3>[ 15.273336] kasan_atomics_helper+0x4f73/0x5450 <3>[ 15.273495] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.273685] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.273864] kasan_atomics+0x1dd/0x310 <3>[ 15.274001] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.274161] ? __schedule+0xbca/0x2590 <3>[ 15.274305] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.274451] ? ktime_get_ts64+0x84/0x230 <3>[ 15.274597] kunit_try_run_case+0x1b3/0x490 <3>[ 15.274745] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.274934] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.275117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.275311] ? __kthread_parkme+0x82/0x160 <3>[ 15.275483] ? preempt_count_sub+0x50/0x80 <3>[ 15.275646] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.275823] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.276032] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.276226] kthread+0x257/0x310 <3>[ 15.276356] ? __pfx_kthread+0x10/0x10 <3>[ 15.276506] ret_from_fork+0x41/0x80 <3>[ 15.276643] ? __pfx_kthread+0x10/0x10 <3>[ 15.276787] ret_from_fork_asm+0x1a/0x30 <3>[ 15.276955] <3>[ 15.277066] <3>[ 15.277142] Allocated by task 266: <4>[ 15.277277] kasan_save_stack+0x3d/0x60 <4>[ 15.277437] kasan_save_track+0x18/0x40 <4>[ 15.277591] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.277748] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.277889] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.278053] kasan_atomics+0x96/0x310 <4>[ 15.278186] kunit_try_run_case+0x1b3/0x490 <4>[ 15.278348] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.278530] kthread+0x257/0x310 <4>[ 15.278659] ret_from_fork+0x41/0x80 <4>[ 15.278802] ret_from_fork_asm+0x1a/0x30 <3>[ 15.278959] <3>[ 15.279040] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.279040] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.279407] The buggy address is located 0 bytes to the right of <3>[ 15.279407] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.279782] <3>[ 15.279867] The buggy address belongs to the physical page: <4>[ 15.280047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.280304] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.280490] page_type: 0xfdffffff(slab) <4>[ 15.280636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.280909] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.281126] page dumped because: kasan: bad access detected <3>[ 15.281304] <3>[ 15.281377] Memory state around the buggy address: <3>[ 15.281542] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.281774] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.281997] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.282228] ^ <3>[ 15.282370] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.282602] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.282829] ================================================================== <3>[ 15.283382] ================================================================== <3>[ 15.283645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 <3>[ 15.283881] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.284103] <3>[ 15.284190] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.284493] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.284637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.284907] Call Trace: <3>[ 15.285002] <3>[ 15.285094] dump_stack_lvl+0x73/0xb0 <3>[ 15.285239] print_report+0xd1/0x640 <3>[ 15.285381] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.285535] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.285747] kasan_report+0x102/0x140 <3>[ 15.285912] ? kasan_atomics_helper+0x2007/0x5450 <3>[ 15.286093] ? kasan_atomics_helper+0x2007/0x5450 <3>[ 15.286292] kasan_check_range+0x10c/0x1c0 <3>[ 15.286444] __kasan_check_write+0x18/0x20 <3>[ 15.286600] kasan_atomics_helper+0x2007/0x5450 <3>[ 15.286762] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.286941] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.287118] kasan_atomics+0x1dd/0x310 <3>[ 15.287267] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.287412] ? __schedule+0xbca/0x2590 <3>[ 15.287552] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.287690] ? ktime_get_ts64+0x84/0x230 <3>[ 15.287826] kunit_try_run_case+0x1b3/0x490 <3>[ 15.287974] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.288136] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.288304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.288475] ? __kthread_parkme+0x82/0x160 <3>[ 15.288629] ? preempt_count_sub+0x50/0x80 <3>[ 15.288786] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.288951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.289154] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.289326] kthread+0x257/0x310 <3>[ 15.289453] ? __pfx_kthread+0x10/0x10 <3>[ 15.289596] ret_from_fork+0x41/0x80 <3>[ 15.289725] ? __pfx_kthread+0x10/0x10 <3>[ 15.289862] ret_from_fork_asm+0x1a/0x30 <3>[ 15.290016] <3>[ 15.290105] <3>[ 15.290173] Allocated by task 266: <4>[ 15.290310] kasan_save_stack+0x3d/0x60 <4>[ 15.290459] kasan_save_track+0x18/0x40 <4>[ 15.290604] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.290747] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.290882] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.291047] kasan_atomics+0x96/0x310 <4>[ 15.291183] kunit_try_run_case+0x1b3/0x490 <4>[ 15.291327] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.291506] kthread+0x257/0x310 <4>[ 15.291628] ret_from_fork+0x41/0x80 <4>[ 15.291758] ret_from_fork_asm+0x1a/0x30 <3>[ 15.291889] <3>[ 15.291958] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.291958] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.292287] The buggy address is located 0 bytes to the right of <3>[ 15.292287] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.292641] <3>[ 15.292713] The buggy address belongs to the physical page: <4>[ 15.292879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.293116] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.293273] page_type: 0xfdffffff(slab) <4>[ 15.293419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.293652] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.293876] page dumped because: kasan: bad access detected <3>[ 15.294044] <3>[ 15.294117] Memory state around the buggy address: <3>[ 15.294265] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.294468] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.294688] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.294913] ^ <3>[ 15.295069] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.295281] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.295483] ================================================================== <3>[ 15.295790] ================================================================== <3>[ 15.296032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 <3>[ 15.296260] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.296477] <3>[ 15.296554] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.296875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.297039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.297288] Call Trace: <3>[ 15.297387] <3>[ 15.297477] dump_stack_lvl+0x73/0xb0 <3>[ 15.297617] print_report+0xd1/0x640 <3>[ 15.297753] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.297912] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.298094] kasan_report+0x102/0x140 <3>[ 15.298229] ? kasan_atomics_helper+0x4f9a/0x5450 <3>[ 15.298454] ? kasan_atomics_helper+0x4f9a/0x5450 <3>[ 15.298682] __asan_report_load8_noabort+0x18/0x20 <3>[ 15.298912] kasan_atomics_helper+0x4f9a/0x5450 <3>[ 15.299136] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.299367] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.299594] kasan_atomics+0x1dd/0x310 <3>[ 15.299773] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.300002] ? __schedule+0xbca/0x2590 <3>[ 15.300187] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.300400] ? ktime_get_ts64+0x84/0x230 <3>[ 15.300580] kunit_try_run_case+0x1b3/0x490 <3>[ 15.300815] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.301033] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.301250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.301476] ? __kthread_parkme+0x82/0x160 <3>[ 15.301681] ? preempt_count_sub+0x50/0x80 <3>[ 15.301885] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.302104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.302354] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.302591] kthread+0x257/0x310 <3>[ 15.302779] ? __pfx_kthread+0x10/0x10 <3>[ 15.302995] ret_from_fork+0x41/0x80 <3>[ 15.303152] ? __pfx_kthread+0x10/0x10 <3>[ 15.303393] ret_from_fork_asm+0x1a/0x30 <3>[ 15.303586] <3>[ 15.303764] <3>[ 15.303846] Allocated by task 266: <4>[ 15.304005] kasan_save_stack+0x3d/0x60 <4>[ 15.304248] kasan_save_track+0x18/0x40 <4>[ 15.304419] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.304651] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.304816] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.305056] kasan_atomics+0x96/0x310 <4>[ 15.305222] kunit_try_run_case+0x1b3/0x490 <4>[ 15.305451] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.305682] kthread+0x257/0x310 <4>[ 15.305870] ret_from_fork+0x41/0x80 <4>[ 15.306012] ret_from_fork_asm+0x1a/0x30 <3>[ 15.306238] <3>[ 15.306366] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.306366] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.306865] The buggy address is located 0 bytes to the right of <3>[ 15.306865] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.307330] <3>[ 15.307408] The buggy address belongs to the physical page: <4>[ 15.307674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.307957] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.308168] page_type: 0xfdffffff(slab) <4>[ 15.308364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.308652] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.308930] page dumped because: kasan: bad access detected <3>[ 15.309150] <3>[ 15.309227] Memory state around the buggy address: <3>[ 15.309466] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.309732] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.310003] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.310277] ^ <3>[ 15.310496] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.310762] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.311033] ================================================================== <3>[ 15.311708] ================================================================== <3>[ 15.311954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 <3>[ 15.312212] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.312451] <3>[ 15.312537] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.312869] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.313028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.313294] Call Trace: <3>[ 15.313395] <3>[ 15.313489] dump_stack_lvl+0x73/0xb0 <3>[ 15.313639] print_report+0xd1/0x640 <3>[ 15.313780] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.313935] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.314130] kasan_report+0x102/0x140 <3>[ 15.314284] ? kasan_atomics_helper+0x20c9/0x5450 <3>[ 15.314452] ? kasan_atomics_helper+0x20c9/0x5450 <3>[ 15.314616] kasan_check_range+0x10c/0x1c0 <3>[ 15.314773] __kasan_check_write+0x18/0x20 <3>[ 15.314929] kasan_atomics_helper+0x20c9/0x5450 <3>[ 15.315088] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.315269] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.315440] kasan_atomics+0x1dd/0x310 <3>[ 15.315581] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.315736] ? __schedule+0xbca/0x2590 <3>[ 15.315874] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.316025] ? ktime_get_ts64+0x84/0x230 <3>[ 15.316175] kunit_try_run_case+0x1b3/0x490 <3>[ 15.316327] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.316488] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.316654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.316824] ? __kthread_parkme+0x82/0x160 <3>[ 15.316970] ? preempt_count_sub+0x50/0x80 <3>[ 15.317116] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.317284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.317491] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.317677] kthread+0x257/0x310 <3>[ 15.317804] ? __pfx_kthread+0x10/0x10 <3>[ 15.317940] ret_from_fork+0x41/0x80 <3>[ 15.318074] ? __pfx_kthread+0x10/0x10 <3>[ 15.318213] ret_from_fork_asm+0x1a/0x30 <3>[ 15.318370] <3>[ 15.318460] <3>[ 15.318535] Allocated by task 266: <4>[ 15.318654] kasan_save_stack+0x3d/0x60 <4>[ 15.318793] kasan_save_track+0x18/0x40 <4>[ 15.318945] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.319095] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.319313] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.319554] kasan_atomics+0x96/0x310 <4>[ 15.319736] kunit_try_run_case+0x1b3/0x490 <4>[ 15.319921] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.320116] kthread+0x257/0x310 <4>[ 15.320241] ret_from_fork+0x41/0x80 <4>[ 15.320418] ret_from_fork_asm+0x1a/0x30 <3>[ 15.320603] <3>[ 15.320687] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.320687] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.321084] The buggy address is located 0 bytes to the right of <3>[ 15.321084] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.321471] <3>[ 15.321542] The buggy address belongs to the physical page: <4>[ 15.321716] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.321954] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.322185] page_type: 0xfdffffff(slab) <4>[ 15.322351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.322605] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.322834] page dumped because: kasan: bad access detected <3>[ 15.323023] <3>[ 15.323096] Memory state around the buggy address: <3>[ 15.323254] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.323473] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.323674] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.323882] ^ <3>[ 15.324021] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.324240] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.324432] ================================================================== <3>[ 15.324765] ================================================================== <3>[ 15.325006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 <3>[ 15.325226] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.325445] <3>[ 15.325521] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.325831] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.325974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.326231] Call Trace: <3>[ 15.326331] <3>[ 15.326422] dump_stack_lvl+0x73/0xb0 <3>[ 15.326557] print_report+0xd1/0x640 <3>[ 15.326690] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.326836] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.327019] kasan_report+0x102/0x140 <3>[ 15.327149] ? kasan_atomics_helper+0x4fb4/0x5450 <3>[ 15.327311] ? kasan_atomics_helper+0x4fb4/0x5450 <3>[ 15.327475] __asan_report_load8_noabort+0x18/0x20 <3>[ 15.327651] kasan_atomics_helper+0x4fb4/0x5450 <3>[ 15.327795] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.327977] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.328138] kasan_atomics+0x1dd/0x310 <3>[ 15.328265] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.328417] ? __schedule+0xbca/0x2590 <3>[ 15.328556] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.328690] ? ktime_get_ts64+0x84/0x230 <3>[ 15.328828] kunit_try_run_case+0x1b3/0x490 <3>[ 15.328981] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.329135] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.329286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.329449] ? __kthread_parkme+0x82/0x160 <3>[ 15.329596] ? preempt_count_sub+0x50/0x80 <3>[ 15.329744] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.329901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.330115] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.330299] kthread+0x257/0x310 <3>[ 15.330417] ? __pfx_kthread+0x10/0x10 <3>[ 15.330554] ret_from_fork+0x41/0x80 <3>[ 15.330679] ? __pfx_kthread+0x10/0x10 <3>[ 15.330809] ret_from_fork_asm+0x1a/0x30 <3>[ 15.330957] <3>[ 15.331046] <3>[ 15.331118] Allocated by task 266: <4>[ 15.331246] kasan_save_stack+0x3d/0x60 <4>[ 15.331380] kasan_save_track+0x18/0x40 <4>[ 15.331501] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.331640] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.331781] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.331941] kasan_atomics+0x96/0x310 <4>[ 15.332068] kunit_try_run_case+0x1b3/0x490 <4>[ 15.332218] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.332388] kthread+0x257/0x310 <4>[ 15.332510] ret_from_fork+0x41/0x80 <4>[ 15.332635] ret_from_fork_asm+0x1a/0x30 <3>[ 15.332773] <3>[ 15.332841] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.332841] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.333173] The buggy address is located 0 bytes to the right of <3>[ 15.333173] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.333512] <3>[ 15.333580] The buggy address belongs to the physical page: <4>[ 15.333770] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.334004] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.334151] page_type: 0xfdffffff(slab) <4>[ 15.334291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.334546] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.334756] page dumped because: kasan: bad access detected <3>[ 15.334917] <3>[ 15.334987] Memory state around the buggy address: <3>[ 15.335146] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.335350] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.335545] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.335755] ^ <3>[ 15.335901] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.336125] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.336324] ================================================================== <3>[ 15.336752] ================================================================== <3>[ 15.336969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 <3>[ 15.337186] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.337413] <3>[ 15.337489] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.337843] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.338023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.338311] Call Trace: <3>[ 15.338425] <3>[ 15.338517] dump_stack_lvl+0x73/0xb0 <3>[ 15.338681] print_report+0xd1/0x640 <3>[ 15.338816] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.338979] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.339163] kasan_report+0x102/0x140 <3>[ 15.339306] ? kasan_atomics_helper+0x218b/0x5450 <3>[ 15.339491] ? kasan_atomics_helper+0x218b/0x5450 <3>[ 15.339678] kasan_check_range+0x10c/0x1c0 <3>[ 15.339842] __kasan_check_write+0x18/0x20 <3>[ 15.340007] kasan_atomics_helper+0x218b/0x5450 <3>[ 15.340200] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.340397] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.340577] kasan_atomics+0x1dd/0x310 <3>[ 15.340711] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.340861] ? __schedule+0xbca/0x2590 <3>[ 15.340998] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.341148] ? ktime_get_ts64+0x84/0x230 <3>[ 15.341302] kunit_try_run_case+0x1b3/0x490 <3>[ 15.341457] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.341611] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.341775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.341944] ? __kthread_parkme+0x82/0x160 <3>[ 15.342078] ? preempt_count_sub+0x50/0x80 <3>[ 15.342219] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.342387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.342604] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.342806] kthread+0x257/0x310 <3>[ 15.342948] ? __pfx_kthread+0x10/0x10 <3>[ 15.343107] ret_from_fork+0x41/0x80 <3>[ 15.343255] ? __pfx_kthread+0x10/0x10 <3>[ 15.343412] ret_from_fork_asm+0x1a/0x30 <3>[ 15.343579] <3>[ 15.343686] <3>[ 15.343765] Allocated by task 266: <4>[ 15.343901] kasan_save_stack+0x3d/0x60 <4>[ 15.344068] kasan_save_track+0x18/0x40 <4>[ 15.344222] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.344379] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.344538] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.344701] kasan_atomics+0x96/0x310 <4>[ 15.344849] kunit_try_run_case+0x1b3/0x490 <4>[ 15.345021] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.345212] kthread+0x257/0x310 <4>[ 15.345320] ret_from_fork+0x41/0x80 <4>[ 15.345448] ret_from_fork_asm+0x1a/0x30 <3>[ 15.345605] <3>[ 15.345674] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.345674] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.346026] The buggy address is located 0 bytes to the right of <3>[ 15.346026] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.346378] <3>[ 15.346449] The buggy address belongs to the physical page: <4>[ 15.346621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.346853] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.347013] page_type: 0xfdffffff(slab) <4>[ 15.347156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.347392] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.347611] page dumped because: kasan: bad access detected <3>[ 15.347780] <3>[ 15.347850] Memory state around the buggy address: <3>[ 15.348007] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.348226] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.348436] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.348688] ^ <3>[ 15.348856] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.349093] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.349348] ================================================================== <3>[ 15.349711] ================================================================== <3>[ 15.350001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 <3>[ 15.350242] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.350484] <3>[ 15.350558] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.350878] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.351037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.351292] Call Trace: <3>[ 15.351387] <3>[ 15.351474] dump_stack_lvl+0x73/0xb0 <3>[ 15.351619] print_report+0xd1/0x640 <3>[ 15.351755] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.351912] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.352080] kasan_report+0x102/0x140 <3>[ 15.352221] ? kasan_atomics_helper+0x4fa7/0x5450 <3>[ 15.352389] ? kasan_atomics_helper+0x4fa7/0x5450 <3>[ 15.352580] __asan_report_load8_noabort+0x18/0x20 <3>[ 15.352761] kasan_atomics_helper+0x4fa7/0x5450 <3>[ 15.352915] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.353088] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.353268] kasan_atomics+0x1dd/0x310 <3>[ 15.353465] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.353638] ? __schedule+0xbca/0x2590 <3>[ 15.353787] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.353940] ? ktime_get_ts64+0x84/0x230 <3>[ 15.354100] kunit_try_run_case+0x1b3/0x490 <3>[ 15.354282] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.354475] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.354651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.354833] ? __kthread_parkme+0x82/0x160 <3>[ 15.354990] ? preempt_count_sub+0x50/0x80 <3>[ 15.355183] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.355375] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.355616] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.355833] kthread+0x257/0x310 <3>[ 15.355997] ? __pfx_kthread+0x10/0x10 <3>[ 15.356163] ret_from_fork+0x41/0x80 <3>[ 15.356327] ? __pfx_kthread+0x10/0x10 <3>[ 15.356497] ret_from_fork_asm+0x1a/0x30 <3>[ 15.356674] <3>[ 15.356791] <3>[ 15.356869] Allocated by task 266: <4>[ 15.357014] kasan_save_stack+0x3d/0x60 <4>[ 15.357185] kasan_save_track+0x18/0x40 <4>[ 15.357346] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.357518] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.357661] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.357836] kasan_atomics+0x96/0x310 <4>[ 15.357985] kunit_try_run_case+0x1b3/0x490 <4>[ 15.358152] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.358335] kthread+0x257/0x310 <4>[ 15.358470] ret_from_fork+0x41/0x80 <4>[ 15.358618] ret_from_fork_asm+0x1a/0x30 <3>[ 15.358783] <3>[ 15.358862] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.358862] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.359246] The buggy address is located 0 bytes to the right of <3>[ 15.359246] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.359637] <3>[ 15.359720] The buggy address belongs to the physical page: <4>[ 15.359903] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.360154] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.360327] page_type: 0xfdffffff(slab) <4>[ 15.360485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.360725] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.360976] page dumped because: kasan: bad access detected <3>[ 15.361162] <3>[ 15.361234] Memory state around the buggy address: <3>[ 15.361405] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.361653] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.361880] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.362099] ^ <3>[ 15.362267] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.362486] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.362712] ================================================================== <3>[ 15.363287] ================================================================== <3>[ 15.363530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 <3>[ 15.363794] Write of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.364042] <3>[ 15.364152] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.364474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.364644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.364916] Call Trace: <3>[ 15.365037] <3>[ 15.365139] dump_stack_lvl+0x73/0xb0 <3>[ 15.365314] print_report+0xd1/0x640 <3>[ 15.365474] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.365655] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.365862] kasan_report+0x102/0x140 <3>[ 15.366023] ? kasan_atomics_helper+0x224d/0x5450 <3>[ 15.366203] ? kasan_atomics_helper+0x224d/0x5450 <3>[ 15.366406] kasan_check_range+0x10c/0x1c0 <3>[ 15.366576] __kasan_check_write+0x18/0x20 <3>[ 15.366733] kasan_atomics_helper+0x224d/0x5450 <3>[ 15.366933] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.367125] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.367291] kasan_atomics+0x1dd/0x310 <3>[ 15.367443] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.367603] ? __schedule+0xbca/0x2590 <3>[ 15.367758] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.367915] ? ktime_get_ts64+0x84/0x230 <3>[ 15.368064] kunit_try_run_case+0x1b3/0x490 <3>[ 15.368243] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.368417] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.368598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.368786] ? __kthread_parkme+0x82/0x160 <3>[ 15.368952] ? preempt_count_sub+0x50/0x80 <3>[ 15.369113] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.369285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.369485] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.369678] kthread+0x257/0x310 <3>[ 15.369809] ? __pfx_kthread+0x10/0x10 <3>[ 15.369965] ret_from_fork+0x41/0x80 <3>[ 15.370114] ? __pfx_kthread+0x10/0x10 <3>[ 15.370269] ret_from_fork_asm+0x1a/0x30 <3>[ 15.370435] <3>[ 15.370532] <3>[ 15.370614] Allocated by task 266: <4>[ 15.370741] kasan_save_stack+0x3d/0x60 <4>[ 15.370880] kasan_save_track+0x18/0x40 <4>[ 15.371059] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.371218] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.371364] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.371530] kasan_atomics+0x96/0x310 <4>[ 15.371668] kunit_try_run_case+0x1b3/0x490 <4>[ 15.371825] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.372012] kthread+0x257/0x310 <4>[ 15.372140] ret_from_fork+0x41/0x80 <4>[ 15.372281] ret_from_fork_asm+0x1a/0x30 <3>[ 15.372434] <3>[ 15.372519] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.372519] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.372865] The buggy address is located 0 bytes to the right of <3>[ 15.372865] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.373243] <3>[ 15.373327] The buggy address belongs to the physical page: <4>[ 15.373534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.373790] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.373948] page_type: 0xfdffffff(slab) <4>[ 15.374096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.374341] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.374583] page dumped because: kasan: bad access detected <3>[ 15.374765] <3>[ 15.374843] Memory state around the buggy address: <3>[ 15.375026] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.375256] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.375487] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.375722] ^ <3>[ 15.375902] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.376134] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.376368] ================================================================== <3>[ 15.376820] ================================================================== <3>[ 15.377231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 <3>[ 15.377483] Read of size 8 at addr ffff8881028bfd30 by task kunit_try_catch/266 <3>[ 15.377718] <3>[ 15.377803] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.378103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.378269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.378553] Call Trace: <3>[ 15.378650] <3>[ 15.378750] dump_stack_lvl+0x73/0xb0 <3>[ 15.378890] print_report+0xd1/0x640 <3>[ 15.379040] ? __virt_addr_valid+0x1db/0x2d0 <3>[ 15.379193] ? kasan_complete_mode_report_info+0x2a/0x200 <3>[ 15.379384] kasan_report+0x102/0x140 <3>[ 15.379519] ? kasan_atomics_helper+0x5117/0x5450 <3>[ 15.379692] ? kasan_atomics_helper+0x5117/0x5450 <3>[ 15.379857] __asan_report_load8_noabort+0x18/0x20 <3>[ 15.380025] kasan_atomics_helper+0x5117/0x5450 <3>[ 15.380185] ? __pfx_kasan_atomics_helper+0x10/0x10 <3>[ 15.380350] ? __kmalloc_cache_noprof+0x162/0x350 <3>[ 15.380517] kasan_atomics+0x1dd/0x310 <3>[ 15.380660] ? __pfx_kasan_atomics+0x10/0x10 <3>[ 15.380807] ? __schedule+0xbca/0x2590 <3>[ 15.380947] ? __pfx_read_tsc+0x10/0x10 <3>[ 15.381087] ? ktime_get_ts64+0x84/0x230 <3>[ 15.381227] kunit_try_run_case+0x1b3/0x490 <3>[ 15.381386] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.381546] ? _raw_spin_lock_irqsave+0xa2/0x110 <3>[ 15.381707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <3>[ 15.381875] ? __kthread_parkme+0x82/0x160 <3>[ 15.382023] ? preempt_count_sub+0x50/0x80 <3>[ 15.382175] ? __pfx_kunit_try_run_case+0x10/0x10 <3>[ 15.382335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <3>[ 15.382533] kunit_generic_run_threadfn_adapter+0x85/0xf0 <3>[ 15.382705] kthread+0x257/0x310 <3>[ 15.382833] ? __pfx_kthread+0x10/0x10 <3>[ 15.382984] ret_from_fork+0x41/0x80 <3>[ 15.383113] ? __pfx_kthread+0x10/0x10 <3>[ 15.383252] ret_from_fork_asm+0x1a/0x30 <3>[ 15.383401] <3>[ 15.383492] <3>[ 15.383575] Allocated by task 266: <4>[ 15.383729] kasan_save_stack+0x3d/0x60 <4>[ 15.383888] kasan_save_track+0x18/0x40 <4>[ 15.384023] kasan_save_alloc_info+0x3b/0x50 <4>[ 15.384174] __kasan_kmalloc+0xb7/0xc0 <4>[ 15.384317] __kmalloc_cache_noprof+0x162/0x350 <4>[ 15.384483] kasan_atomics+0x96/0x310 <4>[ 15.384620] kunit_try_run_case+0x1b3/0x490 <4>[ 15.384788] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.384968] kthread+0x257/0x310 <4>[ 15.385107] ret_from_fork+0x41/0x80 <4>[ 15.385255] ret_from_fork_asm+0x1a/0x30 <3>[ 15.385409] <3>[ 15.385493] The buggy address belongs to the object at ffff8881028bfd00 <3>[ 15.385493] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.385846] The buggy address is located 0 bytes to the right of <3>[ 15.385846] allocated 48-byte region [ffff8881028bfd00, ffff8881028bfd30) <3>[ 15.386233] <3>[ 15.386320] The buggy address belongs to the physical page: <4>[ 15.386509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf <4>[ 15.386770] flags: 0x200000000000000(node=0|zone=2) <4>[ 15.386957] page_type: 0xfdffffff(slab) <4>[ 15.387112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 <4>[ 15.387368] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 <4>[ 15.387605] page dumped because: kasan: bad access detected <3>[ 15.387802] <3>[ 15.387874] Memory state around the buggy address: <3>[ 15.388058] ffff8881028bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.388299] ffff8881028bfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.388530] >ffff8881028bfd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 15.388754] ^ <3>[ 15.388921] ffff8881028bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.389152] ffff8881028bfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.389364] ================================================================== <6>[ 15.391953] ok 64 kasan_atomics <6>[ 15.394353] ok 65 vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 15.396214] ok 66 vmalloc_oob # SKIP Test requires CONFIG_KASAN_VMALLOC=y <6>[ 15.398265] ok 67 vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y <6>[ 15.400359] ok 68 vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y <6>[ 15.402391] ok 69 vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y <6>[ 15.404541] ok 70 match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 15.406517] ok 71 match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 15.408593] ok 72 match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 15.412508] # kasan: pass:60 fail:0 skip:12 total:72 <6>[ 15.413060] # Totals: pass:60 fail:0 skip:12 total:72 <6>[ 15.413297] ok 6 kasan <6>[ 15.415220] KTAP version 1 <6>[ 15.415414] # Subtest: kfence <6>[ 15.415535] 1..25 <6>[ 15.417296] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=left, cache=0 <3>[ 15.479989] ================================================================== <3>[ 15.480393] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x127/0x4e0 <3>[ 15.480393] <3>[ 15.480870] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#52): <4>[ 15.481350] test_out_of_bounds_read+0x127/0x4e0 <4>[ 15.481569] kunit_try_run_case+0x1b3/0x490 <4>[ 15.481755] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.481996] kthread+0x257/0x310 <4>[ 15.482181] ret_from_fork+0x41/0x80 <4>[ 15.482355] ret_from_fork_asm+0x1a/0x30 <3>[ 15.482555] <4>[ 15.482804] kfence-#52: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 15.482804] <4>[ 15.483283] allocated by task 284 on cpu 0 at 15.478978s: <4>[ 15.483722] test_alloc+0x35f/0x10e0 <4>[ 15.483926] test_out_of_bounds_read+0xee/0x4e0 <4>[ 15.484134] kunit_try_run_case+0x1b3/0x490 <4>[ 15.484319] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.484515] kthread+0x257/0x310 <4>[ 15.484642] ret_from_fork+0x41/0x80 <4>[ 15.484768] ret_from_fork_asm+0x1a/0x30 <3>[ 15.484946] <3>[ 15.485803] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.486107] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.486262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.486531] ================================================================== <6>[ 15.487466] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=right, cache=0 <3>[ 15.583091] ================================================================== <3>[ 15.583424] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x217/0x4e0 <3>[ 15.583424] <3>[ 15.583783] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#53): <4>[ 15.584046] test_out_of_bounds_read+0x217/0x4e0 <4>[ 15.584234] kunit_try_run_case+0x1b3/0x490 <4>[ 15.584418] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.584652] kthread+0x257/0x310 <4>[ 15.584818] ret_from_fork+0x41/0x80 <4>[ 15.585009] ret_from_fork_asm+0x1a/0x30 <3>[ 15.585225] <4>[ 15.585332] kfence-#53: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 15.585332] <4>[ 15.585721] allocated by task 284 on cpu 0 at 15.582992s: <4>[ 15.585993] test_alloc+0x35f/0x10e0 <4>[ 15.586187] test_out_of_bounds_read+0x1e3/0x4e0 <4>[ 15.586409] kunit_try_run_case+0x1b3/0x490 <4>[ 15.586621] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.586874] kthread+0x257/0x310 <4>[ 15.587062] ret_from_fork+0x41/0x80 <4>[ 15.587237] ret_from_fork_asm+0x1a/0x30 <3>[ 15.587436] <3>[ 15.587570] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.587955] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.588144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.588502] ================================================================== <6>[ 15.589416] kunit_try_catch (284) used greatest stack depth: 27072 bytes left <6>[ 15.590808] ok 1 test_out_of_bounds_read <6>[ 15.592031] # test_out_of_bounds_read-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 15.593698] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 <3>[ 15.895026] ================================================================== <3>[ 15.895344] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x127/0x4e0 <3>[ 15.895344] <3>[ 15.895651] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#56): <4>[ 15.895902] test_out_of_bounds_read+0x127/0x4e0 <4>[ 15.896119] kunit_try_run_case+0x1b3/0x490 <4>[ 15.896303] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.896524] kthread+0x257/0x310 <4>[ 15.896680] ret_from_fork+0x41/0x80 <4>[ 15.896839] ret_from_fork_asm+0x1a/0x30 <3>[ 15.897016] <4>[ 15.897104] kfence-#56: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 15.897104] <4>[ 15.897418] allocated by task 286 on cpu 0 at 15.894924s: <4>[ 15.897674] test_alloc+0x2a7/0x10e0 <4>[ 15.897851] test_out_of_bounds_read+0xee/0x4e0 <4>[ 15.898079] kunit_try_run_case+0x1b3/0x490 <4>[ 15.898265] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 15.898502] kthread+0x257/0x310 <4>[ 15.898668] ret_from_fork+0x41/0x80 <4>[ 15.898832] ret_from_fork_asm+0x1a/0x30 <3>[ 15.899030] <3>[ 15.899143] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 15.899525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 15.899743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 15.900100] ================================================================== <6>[ 15.900588] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 <3>[ 15.999046] ================================================================== <3>[ 15.999347] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x217/0x4e0 <3>[ 15.999347] <3>[ 15.999688] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#57): <4>[ 15.999937] test_out_of_bounds_read+0x217/0x4e0 <4>[ 16.000109] kunit_try_run_case+0x1b3/0x490 <4>[ 16.000261] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.000449] kthread+0x257/0x310 <4>[ 16.000587] ret_from_fork+0x41/0x80 <4>[ 16.000727] ret_from_fork_asm+0x1a/0x30 <3>[ 16.000875] <4>[ 16.000947] kfence-#57: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 16.000947] <4>[ 16.001224] allocated by task 286 on cpu 0 at 15.998999s: <4>[ 16.001419] test_alloc+0x2a7/0x10e0 <4>[ 16.001571] test_out_of_bounds_read+0x1e3/0x4e0 <4>[ 16.001742] kunit_try_run_case+0x1b3/0x490 <4>[ 16.001881] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.002059] kthread+0x257/0x310 <4>[ 16.002181] ret_from_fork+0x41/0x80 <4>[ 16.002314] ret_from_fork_asm+0x1a/0x30 <3>[ 16.002452] <3>[ 16.002539] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 16.002864] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 16.003032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 16.003376] ================================================================== <6>[ 16.014327] ok 2 test_out_of_bounds_read-memcache <6>[ 16.015373] # test_out_of_bounds_write: test_alloc: size=32, gfp=cc0, policy=left, cache=0 <3>[ 16.207046] ================================================================== <3>[ 16.207342] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10e/0x260 <3>[ 16.207342] <3>[ 16.207658] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#59): <4>[ 16.207988] test_out_of_bounds_write+0x10e/0x260 <4>[ 16.208258] kunit_try_run_case+0x1b3/0x490 <4>[ 16.208434] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.208670] kthread+0x257/0x310 <4>[ 16.208864] ret_from_fork+0x41/0x80 <4>[ 16.209044] ret_from_fork_asm+0x1a/0x30 <3>[ 16.209236] <4>[ 16.209323] kfence-#59: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 16.209323] <4>[ 16.209685] allocated by task 288 on cpu 1 at 16.206947s: <4>[ 16.209934] test_alloc+0x35f/0x10e0 <4>[ 16.210103] test_out_of_bounds_write+0xd5/0x260 <4>[ 16.210317] kunit_try_run_case+0x1b3/0x490 <4>[ 16.210509] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.210750] kthread+0x257/0x310 <4>[ 16.210931] ret_from_fork+0x41/0x80 <4>[ 16.211106] ret_from_fork_asm+0x1a/0x30 <3>[ 16.211273] <3>[ 16.211362] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 16.211732] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 16.211936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 16.212192] ================================================================== <6>[ 16.214053] ok 3 test_out_of_bounds_write <6>[ 16.214926] # test_out_of_bounds_write-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 16.218080] # test_out_of_bounds_write-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 <3>[ 16.623276] ================================================================== <3>[ 16.623597] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10e/0x260 <3>[ 16.623597] <3>[ 16.623903] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#63): <4>[ 16.624125] test_out_of_bounds_write+0x10e/0x260 <4>[ 16.624287] kunit_try_run_case+0x1b3/0x490 <4>[ 16.624437] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.624611] kthread+0x257/0x310 <4>[ 16.624731] ret_from_fork+0x41/0x80 <4>[ 16.624860] ret_from_fork_asm+0x1a/0x30 <3>[ 16.625000] <4>[ 16.625073] kfence-#63: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 16.625073] <4>[ 16.625396] allocated by task 290 on cpu 0 at 16.623210s: <4>[ 16.625588] test_alloc+0x2a7/0x10e0 <4>[ 16.625718] test_out_of_bounds_write+0xd5/0x260 <4>[ 16.625872] kunit_try_run_case+0x1b3/0x490 <4>[ 16.626016] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.626186] kthread+0x257/0x310 <4>[ 16.626307] ret_from_fork+0x41/0x80 <4>[ 16.626433] ret_from_fork_asm+0x1a/0x30 <3>[ 16.626568] <3>[ 16.626652] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 16.626966] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 16.627133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 16.627399] ================================================================== <6>[ 16.638716] ok 4 test_out_of_bounds_write-memcache <6>[ 16.639918] # test_use_after_free_read: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 16.727211] ================================================================== <3>[ 16.727546] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x12a/0x270 <3>[ 16.727546] <3>[ 16.727946] Use-after-free read at 0x(____ptrval____) (in kfence-#64): <4>[ 16.728235] test_use_after_free_read+0x12a/0x270 <4>[ 16.728463] kunit_try_run_case+0x1b3/0x490 <4>[ 16.728657] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.728877] kthread+0x257/0x310 <4>[ 16.729044] ret_from_fork+0x41/0x80 <4>[ 16.729210] ret_from_fork_asm+0x1a/0x30 <3>[ 16.729389] <4>[ 16.729481] kfence-#64: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 16.729481] <4>[ 16.729850] allocated by task 292 on cpu 1 at 16.727013s: <4>[ 16.730078] test_alloc+0x35f/0x10e0 <4>[ 16.730241] test_use_after_free_read+0xdd/0x270 <4>[ 16.730451] kunit_try_run_case+0x1b3/0x490 <4>[ 16.730639] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.730830] kthread+0x257/0x310 <4>[ 16.730964] ret_from_fork+0x41/0x80 <4>[ 16.731101] ret_from_fork_asm+0x1a/0x30 <4>[ 16.731248] <4>[ 16.731372] freed by task 292 on cpu 1 at 16.727092s: <4>[ 16.731575] test_use_after_free_read+0x1e9/0x270 <4>[ 16.731731] kunit_try_run_case+0x1b3/0x490 <4>[ 16.731904] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.732084] kthread+0x257/0x310 <4>[ 16.732209] ret_from_fork+0x41/0x80 <4>[ 16.732348] ret_from_fork_asm+0x1a/0x30 <3>[ 16.732509] <3>[ 16.732638] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 16.733048] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 16.733271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 16.733640] ================================================================== <6>[ 16.735495] ok 5 test_use_after_free_read <6>[ 16.736391] # test_use_after_free_read-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 16.737573] # test_use_after_free_read-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 16.831287] ================================================================== <3>[ 16.831590] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x12a/0x270 <3>[ 16.831590] <3>[ 16.831909] Use-after-free read at 0x(____ptrval____) (in kfence-#65): <4>[ 16.832113] test_use_after_free_read+0x12a/0x270 <4>[ 16.832273] kunit_try_run_case+0x1b3/0x490 <4>[ 16.832437] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.832624] kthread+0x257/0x310 <4>[ 16.832750] ret_from_fork+0x41/0x80 <4>[ 16.832881] ret_from_fork_asm+0x1a/0x30 <3>[ 16.833021] <4>[ 16.833093] kfence-#65: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 16.833093] <4>[ 16.833385] allocated by task 294 on cpu 0 at 16.831130s: <4>[ 16.833598] test_alloc+0x2a7/0x10e0 <4>[ 16.833751] test_use_after_free_read+0xdd/0x270 <4>[ 16.833944] kunit_try_run_case+0x1b3/0x490 <4>[ 16.834093] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.834326] kthread+0x257/0x310 <4>[ 16.834456] ret_from_fork+0x41/0x80 <4>[ 16.834584] ret_from_fork_asm+0x1a/0x30 <4>[ 16.834718] <4>[ 16.834790] freed by task 294 on cpu 0 at 16.831200s: <4>[ 16.834977] test_use_after_free_read+0xfc/0x270 <4>[ 16.835143] kunit_try_run_case+0x1b3/0x490 <4>[ 16.835291] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.835472] kthread+0x257/0x310 <4>[ 16.835604] ret_from_fork+0x41/0x80 <4>[ 16.835729] ret_from_fork_asm+0x1a/0x30 <3>[ 16.835859] <3>[ 16.835943] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 16.836233] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 16.836390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 16.836645] ================================================================== <6>[ 16.843150] ok 6 test_use_after_free_read-memcache <6>[ 16.844165] # test_double_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 16.935318] ================================================================== <3>[ 16.935652] BUG: KFENCE: invalid free in test_double_free+0x1d5/0x260 <3>[ 16.935652] <3>[ 16.935910] Invalid free of 0x(____ptrval____) (in kfence-#66): <4>[ 16.936119] test_double_free+0x1d5/0x260 <4>[ 16.936272] kunit_try_run_case+0x1b3/0x490 <4>[ 16.936421] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.936593] kthread+0x257/0x310 <4>[ 16.936714] ret_from_fork+0x41/0x80 <4>[ 16.936847] ret_from_fork_asm+0x1a/0x30 <3>[ 16.936983] <4>[ 16.937055] kfence-#66: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 16.937055] <4>[ 16.937340] allocated by task 296 on cpu 1 at 16.935054s: <4>[ 16.937528] test_alloc+0x35f/0x10e0 <4>[ 16.937660] test_double_free+0xdc/0x260 <4>[ 16.937799] kunit_try_run_case+0x1b3/0x490 <4>[ 16.937950] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.938124] kthread+0x257/0x310 <4>[ 16.938243] ret_from_fork+0x41/0x80 <4>[ 16.938371] ret_from_fork_asm+0x1a/0x30 <4>[ 16.938514] <4>[ 16.938584] freed by task 296 on cpu 1 at 16.935124s: <4>[ 16.938762] test_double_free+0x1e2/0x260 <4>[ 16.938921] kunit_try_run_case+0x1b3/0x490 <4>[ 16.939072] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 16.939246] kthread+0x257/0x310 <4>[ 16.939365] ret_from_fork+0x41/0x80 <4>[ 16.939495] ret_from_fork_asm+0x1a/0x30 <3>[ 16.939642] <3>[ 16.939730] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 16.940040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 16.940204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 16.940460] ================================================================== <6>[ 16.942246] ok 7 test_double_free <6>[ 16.943176] # test_double_free-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 16.944297] # test_double_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 17.039246] ================================================================== <3>[ 17.039549] BUG: KFENCE: invalid free in test_double_free+0x113/0x260 <3>[ 17.039549] <3>[ 17.039818] Invalid free of 0x(____ptrval____) (in kfence-#67): <4>[ 17.040012] test_double_free+0x113/0x260 <4>[ 17.040161] kunit_try_run_case+0x1b3/0x490 <4>[ 17.040349] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.040527] kthread+0x257/0x310 <4>[ 17.040682] ret_from_fork+0x41/0x80 <4>[ 17.040852] ret_from_fork_asm+0x1a/0x30 <3>[ 17.041016] <4>[ 17.041111] kfence-#67: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 17.041111] <4>[ 17.041417] allocated by task 298 on cpu 0 at 17.039070s: <4>[ 17.041644] test_alloc+0x2a7/0x10e0 <4>[ 17.041800] test_double_free+0xdc/0x260 <4>[ 17.041996] kunit_try_run_case+0x1b3/0x490 <4>[ 17.042193] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.042404] kthread+0x257/0x310 <4>[ 17.042563] ret_from_fork+0x41/0x80 <4>[ 17.042720] ret_from_fork_asm+0x1a/0x30 <4>[ 17.042928] <4>[ 17.043031] freed by task 298 on cpu 0 at 17.039133s: <4>[ 17.043262] test_double_free+0xfb/0x260 <4>[ 17.043439] kunit_try_run_case+0x1b3/0x490 <4>[ 17.043640] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.043868] kthread+0x257/0x310 <4>[ 17.044016] ret_from_fork+0x41/0x80 <4>[ 17.044162] ret_from_fork_asm+0x1a/0x30 <3>[ 17.044319] <3>[ 17.044417] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.044836] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.045065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.045436] ================================================================== <6>[ 17.052305] ok 8 test_double_free-memcache <6>[ 17.053795] # test_invalid_addr_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 17.143187] ================================================================== <3>[ 17.143476] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e3/0x260 <3>[ 17.143476] <3>[ 17.143737] Invalid free of 0x(____ptrval____) (in kfence-#68): <4>[ 17.143934] test_invalid_addr_free+0x1e3/0x260 <4>[ 17.144097] kunit_try_run_case+0x1b3/0x490 <4>[ 17.144248] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.144424] kthread+0x257/0x310 <4>[ 17.144549] ret_from_fork+0x41/0x80 <4>[ 17.144688] ret_from_fork_asm+0x1a/0x30 <3>[ 17.144828] <4>[ 17.144905] kfence-#68: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 17.144905] <4>[ 17.145185] allocated by task 300 on cpu 1 at 17.143060s: <4>[ 17.145361] test_alloc+0x35f/0x10e0 <4>[ 17.145485] test_invalid_addr_free+0xdc/0x260 <4>[ 17.145631] kunit_try_run_case+0x1b3/0x490 <4>[ 17.145770] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.145942] kthread+0x257/0x310 <4>[ 17.146061] ret_from_fork+0x41/0x80 <4>[ 17.146189] ret_from_fork_asm+0x1a/0x30 <3>[ 17.146321] <3>[ 17.146408] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.146840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.147076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.147383] ================================================================== <6>[ 17.149198] ok 9 test_invalid_addr_free <6>[ 17.150121] # test_invalid_addr_free-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 17.151377] # test_invalid_addr_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 17.247207] ================================================================== <3>[ 17.247536] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfc/0x260 <3>[ 17.247536] <3>[ 17.247934] Invalid free of 0x(____ptrval____) (in kfence-#69): <4>[ 17.248257] test_invalid_addr_free+0xfc/0x260 <4>[ 17.248525] kunit_try_run_case+0x1b3/0x490 <4>[ 17.248690] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.248878] kthread+0x257/0x310 <4>[ 17.249044] ret_from_fork+0x41/0x80 <4>[ 17.249200] ret_from_fork_asm+0x1a/0x30 <3>[ 17.249350] <4>[ 17.249434] kfence-#69: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 17.249434] <4>[ 17.249705] allocated by task 302 on cpu 0 at 17.247067s: <4>[ 17.249877] test_alloc+0x2a7/0x10e0 <4>[ 17.250026] test_invalid_addr_free+0xdc/0x260 <4>[ 17.250181] kunit_try_run_case+0x1b3/0x490 <4>[ 17.250329] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.250529] kthread+0x257/0x310 <4>[ 17.250667] ret_from_fork+0x41/0x80 <4>[ 17.250814] ret_from_fork_asm+0x1a/0x30 <3>[ 17.250962] <3>[ 17.251067] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.251409] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.251580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.251854] ================================================================== <6>[ 17.258431] ok 10 test_invalid_addr_free-memcache <6>[ 17.259498] # test_corruption: test_alloc: size=32, gfp=cc0, policy=left, cache=0 <3>[ 17.351317] ================================================================== <3>[ 17.351630] BUG: KFENCE: memory corruption in test_corruption+0x2d4/0x3e0 <3>[ 17.351630] <3>[ 17.351899] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#70): <4>[ 17.352460] test_corruption+0x2d4/0x3e0 <4>[ 17.352613] kunit_try_run_case+0x1b3/0x490 <4>[ 17.352754] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.352926] kthread+0x257/0x310 <4>[ 17.353052] ret_from_fork+0x41/0x80 <4>[ 17.353184] ret_from_fork_asm+0x1a/0x30 <3>[ 17.353327] <4>[ 17.353401] kfence-#70: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 17.353401] <4>[ 17.353673] allocated by task 304 on cpu 1 at 17.351084s: <4>[ 17.353852] test_alloc+0x35f/0x10e0 <4>[ 17.353983] test_corruption+0xe7/0x3e0 <4>[ 17.354120] kunit_try_run_case+0x1b3/0x490 <4>[ 17.354271] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.354442] kthread+0x257/0x310 <4>[ 17.354557] ret_from_fork+0x41/0x80 <4>[ 17.354689] ret_from_fork_asm+0x1a/0x30 <4>[ 17.354831] <4>[ 17.354916] freed by task 304 on cpu 1 at 17.351195s: <4>[ 17.355088] test_corruption+0x2d4/0x3e0 <4>[ 17.355227] kunit_try_run_case+0x1b3/0x490 <4>[ 17.355372] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.355562] kthread+0x257/0x310 <4>[ 17.355684] ret_from_fork+0x41/0x80 <4>[ 17.355815] ret_from_fork_asm+0x1a/0x30 <3>[ 17.355947] <3>[ 17.356027] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.356322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.356484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.356750] ================================================================== <6>[ 17.357129] # test_corruption: test_alloc: size=32, gfp=cc0, policy=right, cache=0 <3>[ 17.455242] ================================================================== <3>[ 17.455526] BUG: KFENCE: memory corruption in test_corruption+0x2e1/0x3e0 <3>[ 17.455526] <3>[ 17.455798] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#71): <4>[ 17.456070] test_corruption+0x2e1/0x3e0 <4>[ 17.456223] kunit_try_run_case+0x1b3/0x490 <4>[ 17.456379] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.456553] kthread+0x257/0x310 <4>[ 17.456683] ret_from_fork+0x41/0x80 <4>[ 17.456815] ret_from_fork_asm+0x1a/0x30 <3>[ 17.456951] <4>[ 17.457021] kfence-#71: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 17.457021] <4>[ 17.457299] allocated by task 304 on cpu 1 at 17.455026s: <4>[ 17.457553] test_alloc+0x35f/0x10e0 <4>[ 17.457694] test_corruption+0x1cc/0x3e0 <4>[ 17.457849] kunit_try_run_case+0x1b3/0x490 <4>[ 17.458015] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.458189] kthread+0x257/0x310 <4>[ 17.458315] ret_from_fork+0x41/0x80 <4>[ 17.458456] ret_from_fork_asm+0x1a/0x30 <4>[ 17.458586] <4>[ 17.458657] freed by task 304 on cpu 1 at 17.455129s: <4>[ 17.458822] test_corruption+0x2e1/0x3e0 <4>[ 17.458969] kunit_try_run_case+0x1b3/0x490 <4>[ 17.459111] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.459278] kthread+0x257/0x310 <4>[ 17.459399] ret_from_fork+0x41/0x80 <4>[ 17.459519] ret_from_fork_asm+0x1a/0x30 <3>[ 17.459655] <3>[ 17.459743] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.460052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.460207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.460478] ================================================================== <6>[ 17.462264] ok 11 test_corruption <6>[ 17.463154] # test_corruption-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 17.464279] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 <3>[ 17.663182] ================================================================== <3>[ 17.663478] BUG: KFENCE: memory corruption in test_corruption+0x132/0x3e0 <3>[ 17.663478] <3>[ 17.663749] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#73): <4>[ 17.664200] test_corruption+0x132/0x3e0 <4>[ 17.664387] kunit_try_run_case+0x1b3/0x490 <4>[ 17.664593] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.664842] kthread+0x257/0x310 <4>[ 17.665028] ret_from_fork+0x41/0x80 <4>[ 17.665227] ret_from_fork_asm+0x1a/0x30 <3>[ 17.665426] <4>[ 17.665520] kfence-#73: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 17.665520] <4>[ 17.665885] allocated by task 306 on cpu 0 at 17.663038s: <4>[ 17.666146] test_alloc+0x2a7/0x10e0 <4>[ 17.666333] test_corruption+0xe7/0x3e0 <4>[ 17.666526] kunit_try_run_case+0x1b3/0x490 <4>[ 17.666726] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.666978] kthread+0x257/0x310 <4>[ 17.667143] ret_from_fork+0x41/0x80 <4>[ 17.667306] ret_from_fork_asm+0x1a/0x30 <4>[ 17.667494] <4>[ 17.667582] freed by task 306 on cpu 0 at 17.663104s: <4>[ 17.667826] test_corruption+0x132/0x3e0 <4>[ 17.668002] kunit_try_run_case+0x1b3/0x490 <4>[ 17.668190] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.668422] kthread+0x257/0x310 <4>[ 17.668591] ret_from_fork+0x41/0x80 <4>[ 17.668774] ret_from_fork_asm+0x1a/0x30 <3>[ 17.668946] <3>[ 17.669041] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.669448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.669674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.670017] ================================================================== <6>[ 17.670415] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 <3>[ 17.871099] ================================================================== <3>[ 17.871484] BUG: KFENCE: memory corruption in test_corruption+0x217/0x3e0 <3>[ 17.871484] <3>[ 17.871855] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#75): <4>[ 17.872233] test_corruption+0x217/0x3e0 <4>[ 17.872428] kunit_try_run_case+0x1b3/0x490 <4>[ 17.872630] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.872875] kthread+0x257/0x310 <4>[ 17.873059] ret_from_fork+0x41/0x80 <4>[ 17.873228] ret_from_fork_asm+0x1a/0x30 <3>[ 17.873420] <4>[ 17.873521] kfence-#75: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 17.873521] <4>[ 17.873824] allocated by task 306 on cpu 0 at 17.870971s: <4>[ 17.874013] test_alloc+0x2a7/0x10e0 <4>[ 17.874160] test_corruption+0x1cc/0x3e0 <4>[ 17.874298] kunit_try_run_case+0x1b3/0x490 <4>[ 17.874433] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.874599] kthread+0x257/0x310 <4>[ 17.874717] ret_from_fork+0x41/0x80 <4>[ 17.874841] ret_from_fork_asm+0x1a/0x30 <4>[ 17.874994] <4>[ 17.875066] freed by task 306 on cpu 0 at 17.871031s: <4>[ 17.875242] test_corruption+0x217/0x3e0 <4>[ 17.875385] kunit_try_run_case+0x1b3/0x490 <4>[ 17.875524] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 17.875705] kthread+0x257/0x310 <4>[ 17.875824] ret_from_fork+0x41/0x80 <4>[ 17.875948] ret_from_fork_asm+0x1a/0x30 <3>[ 17.876085] <3>[ 17.876170] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 17.876540] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 17.876740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 17.877070] ================================================================== <6>[ 17.889942] ok 12 test_corruption-memcache <6>[ 17.891210] # test_free_bulk: test_alloc: size=261, gfp=cc0, policy=right, cache=0 <6>[ 18.287083] # test_free_bulk: test_alloc: size=261, gfp=cc0, policy=none, cache=0 <6>[ 18.287499] # test_free_bulk: test_alloc: size=261, gfp=cc0, policy=left, cache=0 <6>[ 18.391038] # test_free_bulk: test_alloc: size=261, gfp=cc0, policy=none, cache=0 <6>[ 18.391451] # test_free_bulk: test_alloc: size=261, gfp=cc0, policy=none, cache=0 <6>[ 18.392030] # test_free_bulk: test_alloc: size=123, gfp=cc0, policy=right, cache=0 <6>[ 18.495057] # test_free_bulk: test_alloc: size=123, gfp=cc0, policy=none, cache=0 <6>[ 18.495440] # test_free_bulk: test_alloc: size=123, gfp=cc0, policy=left, cache=0 <6>[ 18.702911] # test_free_bulk: test_alloc: size=123, gfp=cc0, policy=none, cache=0 <6>[ 18.703306] # test_free_bulk: test_alloc: size=123, gfp=cc0, policy=none, cache=0 <6>[ 18.703726] # test_free_bulk: test_alloc: size=127, gfp=cc0, policy=right, cache=0 <6>[ 19.014939] # test_free_bulk: test_alloc: size=127, gfp=cc0, policy=none, cache=0 <6>[ 19.015347] # test_free_bulk: test_alloc: size=127, gfp=cc0, policy=left, cache=0 <6>[ 19.222951] # test_free_bulk: test_alloc: size=127, gfp=cc0, policy=none, cache=0 <6>[ 19.223337] # test_free_bulk: test_alloc: size=127, gfp=cc0, policy=none, cache=0 <6>[ 19.223756] # test_free_bulk: test_alloc: size=238, gfp=cc0, policy=right, cache=0 <6>[ 19.950953] # test_free_bulk: test_alloc: size=238, gfp=cc0, policy=none, cache=0 <6>[ 19.951364] # test_free_bulk: test_alloc: size=238, gfp=cc0, policy=left, cache=0 <6>[ 20.158918] # test_free_bulk: test_alloc: size=238, gfp=cc0, policy=none, cache=0 <6>[ 20.159306] # test_free_bulk: test_alloc: size=238, gfp=cc0, policy=none, cache=0 <6>[ 20.159759] # test_free_bulk: test_alloc: size=129, gfp=cc0, policy=right, cache=0 <6>[ 20.262923] # test_free_bulk: test_alloc: size=129, gfp=cc0, policy=none, cache=0 <6>[ 20.263273] # test_free_bulk: test_alloc: size=129, gfp=cc0, policy=left, cache=0 <6>[ 20.678929] # test_free_bulk: test_alloc: size=129, gfp=cc0, policy=none, cache=0 <6>[ 20.679312] # test_free_bulk: test_alloc: size=129, gfp=cc0, policy=none, cache=0 <4>[ 20.679873] # test_free_bulk: Test should be marked slow (runtime: 2.788956823s) <6>[ 20.681472] ok 13 test_free_bulk <6>[ 20.683185] # test_free_bulk-memcache: setup_test_cache: size=33, ctor=0x0 <6>[ 20.685949] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=right, cache=1 <6>[ 20.887000] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=none, cache=1 <6>[ 20.887409] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=left, cache=1 <6>[ 20.990924] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=none, cache=1 <6>[ 20.991318] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=none, cache=1 <6>[ 21.005516] # test_free_bulk-memcache: setup_test_cache: size=217, ctor=ctor_set_x <6>[ 21.006607] # test_free_bulk-memcache: test_alloc: size=217, gfp=cc0, policy=right, cache=1 <6>[ 21.198916] # test_free_bulk-memcache: test_alloc: size=217, gfp=cc0, policy=none, cache=1 <6>[ 21.199334] # test_free_bulk-memcache: test_alloc: size=217, gfp=cc0, policy=left, cache=1 <6>[ 21.718840] # test_free_bulk-memcache: test_alloc: size=217, gfp=cc0, policy=none, cache=1 <6>[ 21.719254] # test_free_bulk-memcache: test_alloc: size=217, gfp=cc0, policy=none, cache=1 <6>[ 21.750952] # test_free_bulk-memcache: setup_test_cache: size=166, ctor=0x0 <6>[ 21.752285] # test_free_bulk-memcache: test_alloc: size=166, gfp=cc0, policy=right, cache=1 <6>[ 21.926861] # test_free_bulk-memcache: test_alloc: size=166, gfp=cc0, policy=none, cache=1 <6>[ 21.927366] # test_free_bulk-memcache: test_alloc: size=166, gfp=cc0, policy=left, cache=1 <6>[ 22.030939] # test_free_bulk-memcache: test_alloc: size=166, gfp=cc0, policy=none, cache=1 <6>[ 22.031521] # test_free_bulk-memcache: test_alloc: size=166, gfp=cc0, policy=none, cache=1 <6>[ 22.048088] # test_free_bulk-memcache: setup_test_cache: size=271, ctor=ctor_set_x <6>[ 22.049371] # test_free_bulk-memcache: test_alloc: size=271, gfp=cc0, policy=right, cache=1 <6>[ 22.238920] # test_free_bulk-memcache: test_alloc: size=271, gfp=cc0, policy=none, cache=1 <6>[ 22.239578] # test_free_bulk-memcache: test_alloc: size=271, gfp=cc0, policy=left, cache=1 <6>[ 22.342892] # test_free_bulk-memcache: test_alloc: size=271, gfp=cc0, policy=none, cache=1 <6>[ 22.343267] # test_free_bulk-memcache: test_alloc: size=271, gfp=cc0, policy=none, cache=1 <6>[ 22.361191] # test_free_bulk-memcache: setup_test_cache: size=42, ctor=0x0 <6>[ 22.362265] # test_free_bulk-memcache: test_alloc: size=42, gfp=cc0, policy=right, cache=1 <6>[ 22.446889] # test_free_bulk-memcache: test_alloc: size=42, gfp=cc0, policy=none, cache=1 <6>[ 22.447259] # test_free_bulk-memcache: test_alloc: size=42, gfp=cc0, policy=left, cache=1 <6>[ 22.550885] # test_free_bulk-memcache: test_alloc: size=42, gfp=cc0, policy=none, cache=1 <6>[ 22.551249] # test_free_bulk-memcache: test_alloc: size=42, gfp=cc0, policy=none, cache=1 <6>[ 22.563415] ok 14 test_free_bulk-memcache <6>[ 22.564705] ok 15 test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) <6>[ 22.566048] ok 16 test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) <6>[ 22.567407] # test_kmalloc_aligned_oob_read: test_alloc: size=73, gfp=cc0, policy=right, cache=0 <3>[ 22.655074] ================================================================== <3>[ 22.655345] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27f/0x570 <3>[ 22.655345] <3>[ 22.655679] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#121): <4>[ 22.656030] test_kmalloc_aligned_oob_read+0x27f/0x570 <4>[ 22.656295] kunit_try_run_case+0x1b3/0x490 <4>[ 22.656448] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 22.656709] kthread+0x257/0x310 <4>[ 22.656902] ret_from_fork+0x41/0x80 <4>[ 22.657149] ret_from_fork_asm+0x1a/0x30 <3>[ 22.657375] <4>[ 22.657453] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 <4>[ 22.657453] <4>[ 22.657847] allocated by task 316 on cpu 1 at 22.654873s: <4>[ 22.658127] test_alloc+0x35f/0x10e0 <4>[ 22.658317] test_kmalloc_aligned_oob_read+0x106/0x570 <4>[ 22.658537] kunit_try_run_case+0x1b3/0x490 <4>[ 22.658735] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 22.658970] kthread+0x257/0x310 <4>[ 22.659132] ret_from_fork+0x41/0x80 <4>[ 22.659339] ret_from_fork_asm+0x1a/0x30 <3>[ 22.659527] <3>[ 22.659647] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 22.660021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 22.660231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 22.660540] ================================================================== <6>[ 22.662430] ok 17 test_kmalloc_aligned_oob_read <6>[ 22.663072] # test_kmalloc_aligned_oob_write: test_alloc: size=73, gfp=cc0, policy=right, cache=0 <3>[ 23.175080] ================================================================== <3>[ 23.175378] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x251/0x340 <3>[ 23.175378] <3>[ 23.175695] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#126): <4>[ 23.176437] test_kmalloc_aligned_oob_write+0x251/0x340 <4>[ 23.176715] kunit_try_run_case+0x1b3/0x490 <4>[ 23.176928] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 23.177164] kthread+0x257/0x310 <4>[ 23.177327] ret_from_fork+0x41/0x80 <4>[ 23.177546] ret_from_fork_asm+0x1a/0x30 <3>[ 23.177717] <4>[ 23.177862] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 <4>[ 23.177862] <4>[ 23.178244] allocated by task 318 on cpu 1 at 23.174850s: <4>[ 23.178531] test_alloc+0x35f/0x10e0 <4>[ 23.178729] test_kmalloc_aligned_oob_write+0xc9/0x340 <4>[ 23.178969] kunit_try_run_case+0x1b3/0x490 <4>[ 23.179198] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 23.179434] kthread+0x257/0x310 <4>[ 23.179601] ret_from_fork+0x41/0x80 <4>[ 23.179842] ret_from_fork_asm+0x1a/0x30 <4>[ 23.179989] <4>[ 23.180135] freed by task 318 on cpu 1 at 23.174994s: <4>[ 23.180429] test_kmalloc_aligned_oob_write+0x251/0x340 <4>[ 23.180667] kunit_try_run_case+0x1b3/0x490 <4>[ 23.180872] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 23.181133] kthread+0x257/0x310 <4>[ 23.181323] ret_from_fork+0x41/0x80 <4>[ 23.181533] ret_from_fork_asm+0x1a/0x30 <3>[ 23.181738] <3>[ 23.181861] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 23.182308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 23.182532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 23.182883] ================================================================== <6>[ 23.184978] ok 18 test_kmalloc_aligned_oob_write <6>[ 23.185965] # test_shrink_memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 23.188951] # test_shrink_memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <6>[ 23.288542] ok 19 test_shrink_memcache <6>[ 23.289387] # test_memcache_ctor: setup_test_cache: size=32, ctor=ctor_set_x <6>[ 23.290686] # test_memcache_ctor: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <6>[ 23.394046] ok 20 test_memcache_ctor <3>[ 23.394932] ================================================================== <3>[ 23.395459] BUG: KFENCE: invalid read in test_invalid_access+0xf1/0x210 <3>[ 23.395459] <3>[ 23.395877] Invalid read at 0x(____ptrval____): <4>[ 23.396047] test_invalid_access+0xf1/0x210 <4>[ 23.396202] kunit_try_run_case+0x1b3/0x490 <4>[ 23.396458] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 23.396778] kthread+0x257/0x310 <4>[ 23.396954] ret_from_fork+0x41/0x80 <4>[ 23.397089] ret_from_fork_asm+0x1a/0x30 <3>[ 23.397239] <3>[ 23.397328] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 23.397634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 23.397810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 23.398081] ================================================================== <6>[ 23.399213] ok 21 test_invalid_access <6>[ 23.399854] # test_gfpzero: test_alloc: size=4096, gfp=cc0, policy=any, cache=0 <6>[ 23.487176] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 23.591129] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 23.695082] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 23.799122] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 23.903034] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.007091] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.110986] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.215052] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.319020] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.423222] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.527024] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.631030] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.735103] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.839030] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 24.943112] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.047074] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.150960] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.254978] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.359042] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.463064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.567078] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.671117] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.775025] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.879047] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.983172] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.087042] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.191047] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.295025] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.399036] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.503062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.607029] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.711036] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.814989] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.919032] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.023006] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.127157] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.231017] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.335047] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.439168] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.543084] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.647013] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.751041] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.855025] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.959016] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.063016] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.166972] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.270936] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.375040] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.479077] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.582992] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.687069] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.790929] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.895031] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.999034] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.102991] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.206983] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.310983] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.415058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.519027] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.623061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.727049] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.831056] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.935075] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.039039] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.143022] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.246977] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.351030] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.455108] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.559049] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.663025] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.767025] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.871116] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.975010] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.079057] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.183009] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.287047] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.390997] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.495048] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.599026] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.703013] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.806967] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.911069] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.015011] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.119083] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.223019] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.327021] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.430997] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.535089] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.639020] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.743075] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.847023] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.951034] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.055020] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.159011] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.262983] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.367003] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.471029] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.575083] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.678992] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.783003] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.886948] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.991035] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.094994] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.199034] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.303000] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.407068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.511027] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.614992] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.719034] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.823070] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.926971] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.031002] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.134952] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.239029] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.342996] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.447200] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.551045] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.654998] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.759004] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.863005] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.967040] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.071062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.175012] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.278945] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.382944] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.487078] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.591096] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.695100] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.799196] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.902993] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.007069] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.111094] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.215082] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.319060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.423062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.527198] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.630997] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.735032] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.839028] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.943097] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.047081] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.151078] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.255064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.359002] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.463055] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.567070] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.671112] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.775059] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.879083] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.983094] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.087133] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.191099] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.295077] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.399089] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.503125] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.607098] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.711105] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.815166] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.919064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.023196] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.127316] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.231045] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.335040] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.439153] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.543104] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.647000] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.751045] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.855028] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.959091] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.063063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.167006] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.271084] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.374987] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.479146] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.583080] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.687048] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.791090] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.895088] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.999083] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.103206] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.207106] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.311022] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.414940] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.519049] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.623097] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.727095] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.831136] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.935121] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.038967] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.143024] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.247080] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.351079] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.455104] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.559044] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.663033] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.767177] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.871068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.975053] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.079011] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.287058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.391072] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.495179] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.599046] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.703033] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.806973] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.910986] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.015081] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.119047] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.223066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.327160] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.431008] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.535105] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.639073] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.743115] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.847073] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.951307] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.055089] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.159042] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.263049] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.367108] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.471064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.575018] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.679053] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.783036] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.887098] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.991070] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.095158] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.199003] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.303037] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.407027] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.511035] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.615083] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.719079] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <4>[ 47.823306] # test_gfpzero: Test should be marked slow (runtime: 24.423512620s) <6>[ 47.824825] ok 22 test_gfpzero <6>[ 47.826368] # test_memcache_typesafe_by_rcu: setup_test_cache: size=32, ctor=0x0 <6>[ 47.828937] # test_memcache_typesafe_by_rcu: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <4>[ 47.945714] ------------[ cut here ]------------ <4>[ 47.945943] WARNING: CPU: 0 PID: 16 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 47.946000] Modules linked in: <4>[ 47.946035] CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 47.946073] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 47.946086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 47.946104] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 47.946132] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 47.946163] RSP: 0000:ffff888100837c60 EFLAGS: 00000202 <4>[ 47.946185] RAX: 0000000080000000 RBX: ffff888105030f30 RCX: ffff888154200000 <4>[ 47.946203] RDX: 0000000000106fe0 RSI: ffffffff88ebc501 RDI: ffff888154306fe0 <4>[ 47.946219] RBP: ffff888100837ca0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 47.946236] R10: 00000000650db5cf R11: 0000000000000000 R12: ffffea0004140c00 <4>[ 47.946251] R13: ffff888154306fe0 R14: 00000000002ac401 R15: 0000000000039408 <4>[ 47.946268] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 47.946287] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 47.946302] CR2: ffff88815420000a CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 47.946318] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 47.946334] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 47.946350] Call Trace: <4>[ 47.946362] <4>[ 47.946381] ? show_regs+0x68/0x80 <4>[ 47.946408] ? __warn+0xd5/0x260 <4>[ 47.946428] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 47.946451] ? report_bug+0x278/0x2e0 <4>[ 47.946477] ? handle_bug+0x7b/0xa0 <4>[ 47.946496] ? exc_invalid_op+0x1c/0x50 <4>[ 47.946515] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 47.946541] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 47.946564] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 47.946586] ? rcu_core_si+0x12/0x20 <4>[ 47.946611] rcu_core+0x683/0x1c80 <4>[ 47.946693] ? __pfx_rcu_core+0x10/0x10 <4>[ 47.946724] ? handle_softirqs+0x18e/0x720 <4>[ 47.946749] rcu_core_si+0x12/0x20 <4>[ 47.946769] handle_softirqs+0x20c/0x720 <4>[ 47.946791] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 47.946811] ? __pfx_run_ksoftirqd+0x10/0x10 <4>[ 47.946832] ? __pfx_run_ksoftirqd+0x10/0x10 <4>[ 47.946851] run_ksoftirqd+0x36/0x50 <4>[ 47.946870] smpboot_thread_fn+0x401/0x690 <4>[ 47.946903] ? __pfx_smpboot_thread_fn+0x10/0x10 <4>[ 47.946925] kthread+0x257/0x310 <4>[ 47.946948] ? __pfx_kthread+0x10/0x10 <4>[ 47.946968] ret_from_fork+0x41/0x80 <4>[ 47.946989] ? __pfx_kthread+0x10/0x10 <4>[ 47.947010] ret_from_fork_asm+0x1a/0x30 <4>[ 47.947039] <4>[ 47.947050] ---[ end trace 0000000000000000 ]--- <4>[ 48.048979] ------------[ cut here ]------------ <4>[ 48.049222] WARNING: CPU: 1 PID: 328 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 48.049281] Modules linked in: <4>[ 48.049317] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 48.049356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 48.049368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 48.049388] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 48.049416] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 48.049446] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 48.049468] RAX: 0000000080000000 RBX: ffff888100914048 RCX: ffff888154200000 <4>[ 48.049486] RDX: 0000000000108fe0 RSI: ffffffff88ebc501 RDI: ffff888154308fe0 <4>[ 48.049503] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 48.049533] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea0004024500 <4>[ 48.049566] R13: ffff888154308fe0 R14: 0000000000a18501 R15: 0000000000039408 <4>[ 48.049599] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 48.049718] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 48.049744] CR2: ffff8881542f5009 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 48.049779] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 48.049817] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 48.049851] Call Trace: <4>[ 48.049881] <4>[ 48.049915] ? show_regs+0x68/0x80 <4>[ 48.049945] ? __warn+0xd5/0x260 <4>[ 48.049966] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 48.049989] ? report_bug+0x278/0x2e0 <4>[ 48.050016] ? handle_bug+0x7b/0xa0 <4>[ 48.050036] ? exc_invalid_op+0x1c/0x50 <4>[ 48.050055] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 48.050081] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 48.050105] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 48.050127] ? rcu_core_si+0x12/0x20 <4>[ 48.050151] rcu_core+0x683/0x1c80 <4>[ 48.050177] ? __pfx_rcu_core+0x10/0x10 <4>[ 48.050199] ? lapic_next_event+0x19/0x30 <4>[ 48.050220] ? handle_softirqs+0x18e/0x720 <4>[ 48.050243] rcu_core_si+0x12/0x20 <4>[ 48.050263] handle_softirqs+0x20c/0x720 <4>[ 48.050285] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 48.050305] ? trace_preempt_on+0x20/0xc0 <4>[ 48.050326] ? irq_exit_rcu+0x20/0xd0 <4>[ 48.050347] irq_exit_rcu+0x9c/0xd0 <4>[ 48.050366] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 48.050390] <4>[ 48.050401] <4>[ 48.050411] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 48.050435] RIP: 0010:__call_rcu_common.constprop.0+0x2e2/0xaa0 <4>[ 48.050460] Code: 3c 02 00 0f 85 2c 06 00 00 48 8b 05 48 d2 c0 04 49 03 87 f0 00 00 00 49 39 c5 0f 8f 08 04 00 00 e8 83 5e 1e 00 fb 48 83 c4 30 <5b> 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 48 89 c7 48 89 45 c8 <4>[ 48.050487] RSP: 0000:ffff8881055e7aa8 EFLAGS: 00000282 <4>[ 48.050508] RAX: 0000000000000000 RBX: ffff88810093cf80 RCX: ffffffff88a3bf23 <4>[ 48.050525] RDX: 1ffff1102a967646 RSI: ffffffff88a3c7a2 RDI: ffffffff88a3bf8d <4>[ 48.050541] RBP: ffff8881055e7ad0 R08: 0000000000000000 R09: fffffbfff1be6691 <4>[ 48.050555] R10: ffffffff8df3348f R11: 0000000000000000 R12: ffff888154b3b230 <4>[ 48.050571] R13: 0000000000000292 R14: ffff888154b3b200 R15: ffff888154b3b140 <4>[ 48.050592] ? __call_rcu_common.constprop.0+0x273/0xaa0 <4>[ 48.050615] ? call_rcu+0x12/0x20 <4>[ 48.050682] ? __call_rcu_common.constprop.0+0x2dd/0xaa0 <4>[ 48.050714] ? test_alloc+0x2f1/0x10e0 <4>[ 48.050737] call_rcu+0x12/0x20 <4>[ 48.050756] kmem_cache_free+0x143/0x340 <4>[ 48.050781] test_alloc+0x2f1/0x10e0 <4>[ 48.050800] ? __kmem_cache_create+0x1b4/0x540 <4>[ 48.050825] ? __pfx_test_alloc+0x10/0x10 <4>[ 48.050846] ? kmem_cache_create+0x1a/0x20 <4>[ 48.050869] ? setup_test_cache.part.0+0x121/0x280 <4>[ 48.050899] ? __pfx_setup_test_cache.part.0+0x10/0x10 <4>[ 48.050921] ? __pfx_sched_balance_newidle+0x10/0x10 <4>[ 48.050949] test_memcache_typesafe_by_rcu+0x170/0x670 <4>[ 48.050973] ? __pfx_test_memcache_typesafe_by_rcu+0x10/0x10 <4>[ 48.050996] ? trace_preempt_off+0x20/0xc0 <4>[ 48.051014] ? test_init+0x4e/0x130 <4>[ 48.051034] ? __kasan_check_write+0x18/0x20 <4>[ 48.051055] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 48.051078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 48.051099] ? __pfx_test_memcache_typesafe_by_rcu+0x10/0x10 <4>[ 48.051123] ? strstr+0x10f/0x170 <4>[ 48.051141] ? __pfx_read_tsc+0x10/0x10 <4>[ 48.051160] ? ktime_get_ts64+0x84/0x230 <4>[ 48.051182] kunit_try_run_case+0x1b3/0x490 <4>[ 48.051207] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 48.051227] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 48.051250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 48.051271] ? __kthread_parkme+0x82/0x160 <4>[ 48.051292] ? preempt_count_sub+0x50/0x80 <4>[ 48.051316] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 48.051337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 48.051360] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.051383] kthread+0x257/0x310 <4>[ 48.051404] ? __pfx_kthread+0x10/0x10 <4>[ 48.051425] ret_from_fork+0x41/0x80 <4>[ 48.051445] ? __pfx_kthread+0x10/0x10 <4>[ 48.051465] ret_from_fork_asm+0x1a/0x30 <4>[ 48.051493] <4>[ 48.051504] ---[ end trace 0000000000000000 ]--- <3>[ 48.140249] ================================================================== <3>[ 48.140564] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ed/0x670 <3>[ 48.140564] <3>[ 48.140976] Use-after-free read at 0x(____ptrval____) (in kfence-#132): <4>[ 48.141300] test_memcache_typesafe_by_rcu+0x2ed/0x670 <4>[ 48.141547] kunit_try_run_case+0x1b3/0x490 <4>[ 48.141732] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.141991] kthread+0x257/0x310 <4>[ 48.142155] ret_from_fork+0x41/0x80 <4>[ 48.142376] ret_from_fork_asm+0x1a/0x30 <3>[ 48.142536] <4>[ 48.142669] kfence-#132: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test <4>[ 48.142669] <4>[ 48.143128] allocated by task 328 on cpu 1 at 48.136888s: <4>[ 48.143416] test_alloc+0x2a7/0x10e0 <4>[ 48.143612] test_memcache_typesafe_by_rcu+0x170/0x670 <4>[ 48.143870] kunit_try_run_case+0x1b3/0x490 <4>[ 48.144070] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.144319] kthread+0x257/0x310 <4>[ 48.144480] ret_from_fork+0x41/0x80 <4>[ 48.144701] ret_from_fork_asm+0x1a/0x30 <4>[ 48.144872] <4>[ 48.145017] freed by task 0 on cpu 1 at 48.139697s: <4>[ 48.145341] rcu_guarded_free+0x3f/0x60 <4>[ 48.145547] rcu_core+0x683/0x1c80 <4>[ 48.145685] rcu_core_si+0x12/0x20 <4>[ 48.145919] handle_softirqs+0x20c/0x720 <4>[ 48.146126] irq_exit_rcu+0x9c/0xd0 <4>[ 48.146323] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 48.146545] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 48.146781] default_idle+0xf/0x20 <4>[ 48.146948] default_idle_call+0x48/0x80 <4>[ 48.147180] do_idle+0x313/0x3c0 <4>[ 48.147363] cpu_startup_entry+0x5c/0x70 <4>[ 48.147588] start_secondary+0x214/0x290 <4>[ 48.147770] common_startup_64+0x12c/0x138 <3>[ 48.148009] <3>[ 48.148096] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 48.148503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 48.148728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 48.149081] ================================================================== <6>[ 48.150006] kunit_try_catch (328) used greatest stack depth: 27008 bytes left <3>[ 48.160058] ============================================================================= <3>[ 48.160329] BUG test (Tainted: G B W N): Objects remaining in test on __kmem_cache_shutdown() <3>[ 48.160803] ----------------------------------------------------------------------------- <3>[ 48.160803] <3>[ 48.161220] Slab 0x(____ptrval____) objects=56 used=1 fp=0x(____ptrval____) flags=0x200000000000200(workingset|node=0|zone=2) <4>[ 48.161729] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 48.162123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 48.162366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 48.162711] Call Trace: <4>[ 48.162861] <4>[ 48.163055] dump_stack_lvl+0x73/0xb0 <4>[ 48.163290] dump_stack+0x14/0x20 <4>[ 48.163436] slab_err+0x106/0x150 <4>[ 48.163703] __kmem_cache_shutdown+0x140/0x2e0 <4>[ 48.163911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 48.164192] kmem_cache_destroy+0x6f/0x1b0 <4>[ 48.164402] test_exit+0x1e/0x40 <4>[ 48.164600] kunit_try_run_case_cleanup+0xb5/0xf0 <4>[ 48.164864] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 <4>[ 48.165106] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.165349] kthread+0x257/0x310 <4>[ 48.165558] ? __pfx_kthread+0x10/0x10 <4>[ 48.165855] ret_from_fork+0x41/0x80 <4>[ 48.166106] ? __pfx_kthread+0x10/0x10 <4>[ 48.166303] ret_from_fork_asm+0x1a/0x30 <4>[ 48.166541] <3>[ 48.166913] Object 0x(____ptrval____) @offset=3888 <3>[ 48.167146] ============================================================================= <3>[ 48.167400] BUG test (Tainted: G B W N): Objects remaining in test on __kmem_cache_shutdown() <3>[ 48.167830] ----------------------------------------------------------------------------- <3>[ 48.167830] <3>[ 48.168164] Slab 0x(____ptrval____) objects=56 used=1 fp=0x(____ptrval____) flags=0x200000000000200(workingset|node=0|zone=2) <4>[ 48.168587] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 48.169048] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 48.169258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 48.169575] Call Trace: <4>[ 48.169677] <4>[ 48.169879] dump_stack_lvl+0x73/0xb0 <4>[ 48.170096] dump_stack+0x14/0x20 <4>[ 48.170269] slab_err+0x106/0x150 <4>[ 48.170493] __kmem_cache_shutdown+0x140/0x2e0 <4>[ 48.170737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 48.171040] kmem_cache_destroy+0x6f/0x1b0 <4>[ 48.171244] test_exit+0x1e/0x40 <4>[ 48.171447] kunit_try_run_case_cleanup+0xb5/0xf0 <4>[ 48.171694] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 <4>[ 48.171904] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.172133] kthread+0x257/0x310 <4>[ 48.172376] ? __pfx_kthread+0x10/0x10 <4>[ 48.172576] ret_from_fork+0x41/0x80 <4>[ 48.172816] ? __pfx_kthread+0x10/0x10 <4>[ 48.173026] ret_from_fork_asm+0x1a/0x30 <4>[ 48.173246] <3>[ 48.173365] Object 0x(____ptrval____) @offset=72 <4>[ 48.173953] ------------[ cut here ]------------ <4>[ 48.174143] kmem_cache_destroy test: Slab cache still has objects when called from test_exit+0x1e/0x40 <4>[ 48.174244] WARNING: CPU: 1 PID: 329 at mm/slab_common.c:601 kmem_cache_destroy+0x190/0x1b0 <4>[ 48.174284] Modules linked in: <4>[ 48.174313] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 48.174347] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 48.174360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 48.174383] RIP: 0010:kmem_cache_destroy+0x190/0x1b0 <4>[ 48.174445] Code: 48 89 de e8 62 c0 0d 00 e9 b6 fe ff ff 90 48 8b 53 60 48 8b 4d 08 48 c7 c6 40 6c 52 8c 48 c7 c7 b0 0c 09 8d e8 a1 a9 a6 ff 90 <0f> 0b 90 90 48 c7 c7 60 8b 6e 8d e8 b0 78 29 03 e8 cb ef a6 ff e9 <4>[ 48.174500] RSP: 0000:ffff888102edfe68 EFLAGS: 00000282 <4>[ 48.174527] RAX: 0000000000000000 RBX: ffff888102d708c0 RCX: 1ffffffff1aa38dc <4>[ 48.174545] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 <4>[ 48.174559] RBP: ffff888102edfe78 R08: 0000000000000000 R09: fffffbfff1aa38dc <4>[ 48.174574] R10: 0000000000000003 R11: 000000000000ddf8 R12: 0000000000000200 <4>[ 48.174590] R13: ffff888102955e80 R14: ffffffff89980410 R15: ffff88810030f7c8 <4>[ 48.174606] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 48.174692] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 48.174720] CR2: ffff88815430afe0 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 48.174760] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 48.174799] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 48.174833] Call Trace: <4>[ 48.174846] <4>[ 48.174861] ? show_regs+0x68/0x80 <4>[ 48.174894] ? __warn+0xd5/0x260 <4>[ 48.174917] ? kmem_cache_destroy+0x190/0x1b0 <4>[ 48.174940] ? report_bug+0x278/0x2e0 <4>[ 48.174964] ? handle_bug+0x7b/0xa0 <4>[ 48.174982] ? exc_invalid_op+0x1c/0x50 <4>[ 48.175002] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 48.175024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 48.175051] ? kmem_cache_destroy+0x190/0x1b0 <4>[ 48.175073] ? kmem_cache_destroy+0x18f/0x1b0 <4>[ 48.175094] test_exit+0x1e/0x40 <4>[ 48.175114] kunit_try_run_case_cleanup+0xb5/0xf0 <4>[ 48.175137] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 <4>[ 48.175159] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.175181] kthread+0x257/0x310 <4>[ 48.175201] ? __pfx_kthread+0x10/0x10 <4>[ 48.175221] ret_from_fork+0x41/0x80 <4>[ 48.175241] ? __pfx_kthread+0x10/0x10 <4>[ 48.175260] ret_from_fork_asm+0x1a/0x30 <4>[ 48.175287] <4>[ 48.175298] ---[ end trace 0000000000000000 ]--- <6>[ 48.185059] ok 23 test_memcache_typesafe_by_rcu <6>[ 48.186238] # test_krealloc: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 48.239883] ================================================================== <3>[ 48.240337] BUG: KFENCE: use-after-free read in test_krealloc+0x6fd/0xbe0 <3>[ 48.240337] <3>[ 48.240827] Use-after-free read at 0x(____ptrval____) (in kfence-#133): <4>[ 48.241193] test_krealloc+0x6fd/0xbe0 <4>[ 48.241435] kunit_try_run_case+0x1b3/0x490 <4>[ 48.241696] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.241994] kthread+0x257/0x310 <4>[ 48.242215] ret_from_fork+0x41/0x80 <4>[ 48.242448] ret_from_fork_asm+0x1a/0x30 <3>[ 48.242689] <4>[ 48.242814] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 <4>[ 48.242814] <4>[ 48.243319] allocated by task 330 on cpu 0 at 48.239026s: <4>[ 48.243646] test_alloc+0x35f/0x10e0 <4>[ 48.243879] test_krealloc+0xae/0xbe0 <4>[ 48.244128] kunit_try_run_case+0x1b3/0x490 <4>[ 48.244382] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.244683] kthread+0x257/0x310 <4>[ 48.244911] ret_from_fork+0x41/0x80 <4>[ 48.245166] ret_from_fork_asm+0x1a/0x30 <4>[ 48.245418] <4>[ 48.245555] freed by task 330 on cpu 0 at 48.239297s: <4>[ 48.245873] krealloc_noprof+0xc3/0x110 <4>[ 48.246123] test_krealloc+0x227/0xbe0 <4>[ 48.246363] kunit_try_run_case+0x1b3/0x490 <4>[ 48.246628] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 48.246935] kthread+0x257/0x310 <4>[ 48.247162] ret_from_fork+0x41/0x80 <4>[ 48.247412] ret_from_fork_asm+0x1a/0x30 <3>[ 48.247668] <3>[ 48.247817] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <3>[ 48.248381] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <3>[ 48.248673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <3>[ 48.249115] ================================================================== <6>[ 48.250111] kunit_try_catch (330) used greatest stack depth: 26960 bytes left <6>[ 48.250961] ok 24 test_krealloc <6>[ 48.251551] # test_memcache_alloc_bulk: setup_test_cache: size=32, ctor=0x0 <6>[ 48.351156] ok 25 test_memcache_alloc_bulk <6>[ 48.355847] # kfence: pass:23 fail:0 skip:2 total:25 <6>[ 48.356424] # Totals: pass:23 fail:0 skip:2 total:25 <6>[ 48.357127] ok 7 kfence <6>[ 48.358511] KTAP version 1 <6>[ 48.359027] # Subtest: exec <6>[ 48.359358] # module: exec <6>[ 48.359533] 1..1 <6>[ 48.362538] ok 1 exec_test_bprm_stack_limits <6>[ 48.362619] ok 8 exec <6>[ 48.363331] KTAP version 1 <6>[ 48.363488] # Subtest: binfmt_elf <6>[ 48.363780] # module: binfmt_elf <6>[ 48.363832] 1..1 <6>[ 48.366787] ok 1 total_mapping_size_test <6>[ 48.366858] ok 9 binfmt_elf <6>[ 48.367424] KTAP version 1 <6>[ 48.367725] # Subtest: compat_binfmt_elf <6>[ 48.367936] # module: compat_binfmt_elf <6>[ 48.368015] 1..1 <6>[ 48.370572] ok 1 total_mapping_size_test <6>[ 48.371322] ok 10 compat_binfmt_elf <6>[ 48.372819] KTAP version 1 <6>[ 48.373079] # Subtest: ext4_mballoc_test <6>[ 48.373493] # module: ext4 <6>[ 48.373800] 1..7 <6>[ 48.374736] KTAP version 1 <6>[ 48.375203] # Subtest: test_new_blocks_simple <6>[ 48.397171] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.402226] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.407412] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.409264] # test_new_blocks_simple: pass:3 fail:0 skip:0 total:3 <6>[ 48.409429] ok 1 test_new_blocks_simple <6>[ 48.410204] KTAP version 1 <6>[ 48.411193] # Subtest: test_free_blocks_simple <6>[ 48.416886] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.422823] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.430021] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.430429] # test_free_blocks_simple: pass:3 fail:0 skip:0 total:3 <6>[ 48.430505] ok 2 test_free_blocks_simple <6>[ 48.431053] KTAP version 1 <6>[ 48.431389] # Subtest: test_mb_generate_buddy <6>[ 48.438055] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.446026] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.453129] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.453497] # test_mb_generate_buddy: pass:3 fail:0 skip:0 total:3 <6>[ 48.453546] ok 3 test_mb_generate_buddy <6>[ 48.453918] KTAP version 1 <6>[ 48.454221] # Subtest: test_mb_mark_used <6>[ 48.459598] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.463960] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.466597] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.466597] # SKIP blocksize exceeds pagesize <6>[ 48.466730] # test_mb_mark_used: pass:2 fail:0 skip:1 total:3 <6>[ 48.467233] ok 4 test_mb_mark_used <6>[ 48.467477] KTAP version 1 <6>[ 48.467998] # Subtest: test_mb_free_blocks <6>[ 48.472395] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.476811] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.481295] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.481295] # SKIP blocksize exceeds pagesize <6>[ 48.481373] # test_mb_free_blocks: pass:2 fail:0 skip:1 total:3 <6>[ 48.482048] ok 5 test_mb_free_blocks <6>[ 48.482370] KTAP version 1 <6>[ 48.482739] # Subtest: test_mark_diskspace_used <6>[ 48.486263] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.491021] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.495157] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 48.495610] # test_mark_diskspace_used: pass:3 fail:0 skip:0 total:3 <6>[ 48.495726] ok 6 test_mark_diskspace_used <6>[ 48.495967] KTAP version 1 <6>[ 48.496280] # Subtest: test_mb_mark_used_cost <6>[ 78.617581] # test_mb_mark_used_cost: costed jiffies 3327 <6>[ 78.621578] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 108.756884] # test_mb_mark_used_cost: costed jiffies 3351 <6>[ 108.760083] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 108.764421] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 108.764421] # SKIP blocksize exceeds pagesize <6>[ 108.764516] # test_mb_mark_used_cost.speed: slow <6>[ 108.765136] # test_mb_mark_used_cost: pass:2 fail:0 skip:1 total:3 <6>[ 108.765357] ok 7 test_mb_mark_used_cost <6>[ 108.765751] # ext4_mballoc_test: pass:7 fail:0 skip:0 total:7 <6>[ 108.765995] # Totals: pass:18 fail:0 skip:3 total:21 <6>[ 108.766252] ok 11 ext4_mballoc_test <6>[ 108.766977] KTAP version 1 <6>[ 108.767112] # Subtest: ext4_inode_test <6>[ 108.767250] # module: ext4_inode_test <6>[ 108.767389] 1..1 <6>[ 108.768044] KTAP version 1 <6>[ 108.768229] # Subtest: inode_test_xtimestamp_decoding <6>[ 108.771076] ok 1 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits <6>[ 108.773021] ok 2 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits <6>[ 108.775449] ok 3 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits <6>[ 108.777404] ok 4 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits <6>[ 108.779587] ok 5 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on <6>[ 108.781163] ok 6 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on <6>[ 108.783396] ok 7 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on <6>[ 108.785999] ok 8 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on <6>[ 108.788106] ok 9 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on <6>[ 108.790081] ok 10 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on <6>[ 108.792178] ok 11 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on <6>[ 108.794189] ok 12 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on <6>[ 108.797149] ok 13 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns <6>[ 108.799495] ok 14 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns <6>[ 108.801184] ok 15 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on <6>[ 108.803253] ok 16 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on <6>[ 108.803574] # inode_test_xtimestamp_decoding: pass:16 fail:0 skip:0 total:16 <6>[ 108.804063] ok 1 inode_test_xtimestamp_decoding <6>[ 108.804373] # Totals: pass:16 fail:0 skip:0 total:16 <6>[ 108.804653] ok 12 ext4_inode_test <6>[ 108.805342] KTAP version 1 <6>[ 108.805465] # Subtest: fat_test <6>[ 108.805695] # module: fat_test <6>[ 108.805797] 1..3 <6>[ 108.807760] ok 1 fat_checksum_test <6>[ 108.807861] KTAP version 1 <6>[ 108.808119] # Subtest: fat_time_fat2unix_test <6>[ 108.811048] ok 1 Earliest possible UTC (1980-01-01 00:00:00) <6>[ 108.812981] ok 2 Latest possible UTC (2107-12-31 23:59:58) <6>[ 108.815300] ok 3 Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC) <6>[ 108.817831] ok 4 Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC) <6>[ 108.820275] ok 5 Leap Day / Year (1996-02-29 00:00:00) <6>[ 108.822310] ok 6 Year 2000 is leap year (2000-02-29 00:00:00) <6>[ 108.825362] ok 7 Year 2100 not leap year (2100-03-01 00:00:00) <6>[ 108.827183] ok 8 Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC) <6>[ 108.829431] ok 9 Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC) <6>[ 108.831997] ok 10 VFAT odd-second resolution (1999-12-31 23:59:59) <6>[ 108.834382] ok 11 VFAT 10ms resolution (1980-01-01 00:00:00:0010) <6>[ 108.835453] # fat_time_fat2unix_test: pass:11 fail:0 skip:0 total:11 <6>[ 108.836132] ok 2 fat_time_fat2unix_test <6>[ 108.836766] KTAP version 1 <6>[ 108.837246] # Subtest: fat_time_unix2fat_test <6>[ 108.839444] ok 1 Earliest possible UTC (1980-01-01 00:00:00) <6>[ 108.841341] ok 2 Latest possible UTC (2107-12-31 23:59:58) <6>[ 108.843351] ok 3 Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC) <6>[ 108.845460] ok 4 Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC) <6>[ 108.847255] ok 5 Leap Day / Year (1996-02-29 00:00:00) <6>[ 108.849412] ok 6 Year 2000 is leap year (2000-02-29 00:00:00) <6>[ 108.851110] ok 7 Year 2100 not leap year (2100-03-01 00:00:00) <6>[ 108.853048] ok 8 Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC) <6>[ 108.855034] ok 9 Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC) <6>[ 108.857189] ok 10 VFAT odd-second resolution (1999-12-31 23:59:59) <6>[ 108.859058] ok 11 VFAT 10ms resolution (1980-01-01 00:00:00:0010) <6>[ 108.859414] # fat_time_unix2fat_test: pass:11 fail:0 skip:0 total:11 <6>[ 108.859968] ok 3 fat_time_unix2fat_test <6>[ 108.860221] # fat_test: pass:3 fail:0 skip:0 total:3 <6>[ 108.860417] # Totals: pass:23 fail:0 skip:0 total:23 <6>[ 108.860608] ok 13 fat_test <6>[ 108.861390] KTAP version 1 <6>[ 108.861545] # Subtest: string <6>[ 108.861780] # module: string_kunit <6>[ 108.861838] 1..20 <6>[ 109.328257] ok 1 string_test_memset16 <6>[ 109.847301] ok 2 string_test_memset32 <6>[ 110.367149] ok 3 string_test_memset64 <6>[ 110.369794] ok 4 string_test_strchr <6>[ 110.372608] ok 5 string_test_strnchr <6>[ 110.375196] ok 6 string_test_strspn <6>[ 110.377685] ok 7 string_test_strcmp <6>[ 110.379962] ok 8 string_test_strcmp_long_strings <6>[ 110.382327] ok 9 string_test_strncmp <6>[ 110.385022] ok 10 string_test_strncmp_long_strings <6>[ 110.388298] ok 11 string_test_strcasecmp <6>[ 110.391205] ok 12 string_test_strcasecmp_long_strings <6>[ 110.394164] ok 13 string_test_strncasecmp <6>[ 110.397715] ok 14 string_test_strncasecmp_long_strings <6>[ 110.402021] ok 15 string_test_strscpy <6>[ 110.404246] ok 16 string_test_strcat <6>[ 110.408493] ok 17 string_test_strncat <6>[ 110.412181] ok 18 string_test_strlcat <6>[ 110.416301] ok 19 string_test_strtomem <6>[ 110.419261] ok 20 string_test_memtostr <6>[ 110.419835] # string: pass:20 fail:0 skip:0 total:20 <6>[ 110.420205] # Totals: pass:20 fail:0 skip:0 total:20 <6>[ 110.420586] ok 14 string <6>[ 110.422299] KTAP version 1 <6>[ 110.422605] # Subtest: string_helpers <6>[ 110.423293] # module: string_helpers_kunit <6>[ 110.423396] 1..3 <6>[ 110.427947] ok 1 test_get_size <6>[ 110.430332] ok 2 test_upper_lower <6>[ 110.525171] ok 3 test_unescape <6>[ 110.526314] # string_helpers: pass:3 fail:0 skip:0 total:3 <6>[ 110.526487] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 110.526748] ok 15 string_helpers <6>[ 110.527298] KTAP version 1 <6>[ 110.527421] # Subtest: cpumask <6>[ 110.527547] # module: cpumask_kunit <6>[ 110.527593] 1..6 <6>[ 110.529506] ok 1 test_cpumask_weight <6>[ 110.531018] ok 2 test_cpumask_first <6>[ 110.532432] ok 3 test_cpumask_last <6>[ 110.534013] ok 4 test_cpumask_next <6>[ 110.536216] ok 5 test_cpumask_iterators <6>[ 110.538437] ok 6 test_cpumask_iterators_builtin <6>[ 110.538843] # cpumask: pass:6 fail:0 skip:0 total:6 <6>[ 110.539079] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 110.539293] ok 16 cpumask <6>[ 110.539963] KTAP version 1 <6>[ 110.540091] # Subtest: iov_iter <6>[ 110.540210] # module: kunit_iov_iter <6>[ 110.540257] 1..12 <6>[ 110.585577] ok 1 iov_kunit_copy_to_kvec <6>[ 110.628188] ok 2 iov_kunit_copy_from_kvec <6>[ 110.663865] ok 3 iov_kunit_copy_to_bvec <6>[ 110.699339] ok 4 iov_kunit_copy_from_bvec <6>[ 110.770404] ok 5 iov_kunit_copy_to_folioq <6>[ 110.817033] ok 6 iov_kunit_copy_from_folioq <6>[ 110.862379] ok 7 iov_kunit_copy_to_xarray <4>[ 110.863770] ------------[ cut here ]------------ <4>[ 110.864252] WARNING: CPU: 1 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.864338] Modules linked in: <4>[ 110.864374] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 110.864407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 110.864418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 110.864438] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.864492] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 110.864522] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 110.864543] RAX: 0000000080000000 RBX: ffff888107349a40 RCX: ffff888154200000 <4>[ 110.864556] RDX: 0000000000124000 RSI: ffffffff88ebc501 RDI: ffff888154324000 <4>[ 110.864570] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 110.864592] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00041cd200 <4>[ 110.864614] R13: ffff888154324000 R14: 0000000000838501 R15: 0000000000039408 <4>[ 110.864627] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 110.864721] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 110.864759] CR2: ffff88815430afe0 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 110.864773] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 110.864786] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 110.864798] Call Trace: <4>[ 110.864809] <4>[ 110.864829] ? show_regs+0x68/0x80 <4>[ 110.864857] ? __warn+0xd5/0x260 <4>[ 110.864889] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.864916] ? report_bug+0x278/0x2e0 <4>[ 110.864942] ? handle_bug+0x7b/0xa0 <4>[ 110.864960] ? exc_invalid_op+0x1c/0x50 <4>[ 110.864977] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 110.865000] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 110.865029] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.865063] rcu_core+0x683/0x1c80 <4>[ 110.865090] ? __pfx_rcu_core+0x10/0x10 <4>[ 110.865111] ? lapic_next_event+0x19/0x30 <4>[ 110.865130] ? handle_softirqs+0x18e/0x720 <4>[ 110.865151] rcu_core_si+0x12/0x20 <4>[ 110.865184] handle_softirqs+0x20c/0x720 <4>[ 110.865211] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 110.865240] irq_exit_rcu+0x9c/0xd0 <4>[ 110.865257] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 110.865280] <4>[ 110.865290] <4>[ 110.865300] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 110.865321] RIP: 0010:default_idle+0xf/0x20 <4>[ 110.865339] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 110.865357] RSP: 0000:ffff888100867de0 EFLAGS: 00000212 <4>[ 110.865375] RAX: ffff888154b00000 RBX: ffff88810083bf00 RCX: ffffffff8c0688b5 <4>[ 110.865389] RDX: ffffed102a966ae5 RSI: 0000000000000004 RDI: 0000000000058e4c <4>[ 110.865403] RBP: ffff888100867de8 R08: 0000000000000001 R09: ffffed102a966ae4 <4>[ 110.865415] R10: ffff888154b35723 R11: 000000000004c800 R12: 0000000000000001 <4>[ 110.865427] R13: ffffed10201077e0 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 110.865443] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 110.865469] ? arch_cpu_idle+0xd/0x20 <4>[ 110.865487] default_idle_call+0x48/0x80 <4>[ 110.865504] do_idle+0x313/0x3c0 <4>[ 110.865524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 110.865545] ? __pfx_do_idle+0x10/0x10 <4>[ 110.865562] ? _raw_spin_unlock_irqrestore+0x49/0x90 <4>[ 110.865582] ? complete+0x15b/0x1d0 <4>[ 110.865603] cpu_startup_entry+0x5c/0x70 <4>[ 110.865663] start_secondary+0x214/0x290 <4>[ 110.865692] ? __pfx_start_secondary+0x10/0x10 <4>[ 110.865716] common_startup_64+0x12c/0x138 <4>[ 110.865742] <4>[ 110.865754] ---[ end trace 0000000000000000 ]--- <6>[ 110.925481] ok 8 iov_kunit_copy_from_xarray <6>[ 110.930558] ok 9 iov_kunit_extract_pages_kvec <6>[ 110.935596] ok 10 iov_kunit_extract_pages_bvec <6>[ 110.940719] ok 11 iov_kunit_extract_pages_folioq <6>[ 110.945240] ok 12 iov_kunit_extract_pages_xarray <6>[ 110.945495] # iov_iter: pass:12 fail:0 skip:0 total:12 <6>[ 110.946069] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 110.946295] ok 17 iov_iter <6>[ 110.947064] KTAP version 1 <6>[ 110.947201] # Subtest: hash <6>[ 110.947320] # module: test_hash <6>[ 110.947367] 1..2 <6>[ 110.952920] ok 1 test_string_or <4>[ 110.955732] ------------[ cut here ]------------ <4>[ 110.956065] WARNING: CPU: 1 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.956125] Modules linked in: <4>[ 110.956186] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 110.956257] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 110.956280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 110.956312] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.956362] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 110.956384] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 110.956403] RAX: 0000000080000000 RBX: ffff88810734bd40 RCX: ffff888154200000 <4>[ 110.956417] RDX: 0000000000126fe0 RSI: ffffffff88ebc501 RDI: ffff888154326fe0 <4>[ 110.956430] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 110.956442] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00041cd200 <4>[ 110.956454] R13: ffff888154326fe0 R14: 0000000000838501 R15: 0000000000039408 <4>[ 110.956471] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 110.956508] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 110.956540] CR2: ffff88815430afe0 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 110.956571] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 110.956589] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 110.956602] Call Trace: <4>[ 110.956614] <4>[ 110.956673] ? show_regs+0x68/0x80 <4>[ 110.956704] ? __warn+0xd5/0x260 <4>[ 110.956747] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.956773] ? report_bug+0x278/0x2e0 <4>[ 110.956800] ? handle_bug+0x7b/0xa0 <4>[ 110.956818] ? exc_invalid_op+0x1c/0x50 <4>[ 110.956836] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 110.956860] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 110.956880] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 110.956903] rcu_core+0x683/0x1c80 <4>[ 110.956927] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 110.956952] ? __pfx_rcu_core+0x10/0x10 <4>[ 110.956978] rcu_core_si+0x12/0x20 <4>[ 110.956997] handle_softirqs+0x20c/0x720 <4>[ 110.957019] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 110.957041] irq_exit_rcu+0x9c/0xd0 <4>[ 110.957058] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 110.957081] <4>[ 110.957091] <4>[ 110.957101] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 110.957121] RIP: 0010:default_idle+0xf/0x20 <4>[ 110.957140] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 110.957159] RSP: 0000:ffff888100867de0 EFLAGS: 00000212 <4>[ 110.957177] RAX: ffff888154b00000 RBX: ffff88810083bf00 RCX: ffffffff8c0688b5 <4>[ 110.957191] RDX: ffffed102a966ae5 RSI: 0000000000000004 RDI: 00000000000590bc <4>[ 110.957203] RBP: ffff888100867de8 R08: 0000000000000001 R09: ffffed102a966ae4 <4>[ 110.957215] R10: ffff888154b35723 R11: 000000000000ac00 R12: 0000000000000001 <4>[ 110.957227] R13: ffffed10201077e0 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 110.957245] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 110.957272] ? arch_cpu_idle+0xd/0x20 <4>[ 110.957290] default_idle_call+0x48/0x80 <4>[ 110.957307] do_idle+0x313/0x3c0 <4>[ 110.957326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 110.957347] ? __pfx_do_idle+0x10/0x10 <4>[ 110.957364] ? _raw_spin_unlock_irqrestore+0x49/0x90 <4>[ 110.957383] ? complete+0x15b/0x1d0 <4>[ 110.957405] cpu_startup_entry+0x5c/0x70 <4>[ 110.957424] start_secondary+0x214/0x290 <4>[ 110.957447] ? __pfx_start_secondary+0x10/0x10 <4>[ 110.957470] common_startup_64+0x12c/0x138 <4>[ 110.957496] <4>[ 110.957506] ---[ end trace 0000000000000000 ]--- <6>[ 111.022778] ok 2 test_hash_or <6>[ 111.022879] # hash: pass:2 fail:0 skip:0 total:2 <6>[ 111.023052] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 111.023231] ok 18 hash <6>[ 111.023785] KTAP version 1 <6>[ 111.023941] # Subtest: list_sort <6>[ 111.024084] # module: test_list_sort <6>[ 111.024131] 1..1 <6>[ 111.060251] ok 1 list_sort_test <6>[ 111.060436] ok 19 list_sort <6>[ 111.061732] KTAP version 1 <6>[ 111.061995] # Subtest: lib_sort <6>[ 111.062280] # module: test_sort <6>[ 111.062382] 1..1 <4>[ 111.064759] ------------[ cut here ]------------ <4>[ 111.064946] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 111.065011] Modules linked in: <4>[ 111.065045] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 111.065079] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 111.065090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 111.065105] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 111.065132] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 111.065152] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 111.065172] RAX: 0000000080000000 RBX: ffff88810324c600 RCX: ffff888154200000 <4>[ 111.065186] RDX: 0000000000128000 RSI: ffffffff88ebc501 RDI: ffff888154328000 <4>[ 111.065199] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 111.065212] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00040c9200 <4>[ 111.065223] R13: ffff888154328000 R14: 0000000088418401 R15: 0000000000039408 <4>[ 111.065236] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 111.065251] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 111.065263] CR2: ffff88815430c000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 111.065275] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 111.065288] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 111.065301] Call Trace: <4>[ 111.065312] <4>[ 111.065331] ? show_regs+0x68/0x80 <4>[ 111.065357] ? __warn+0xd5/0x260 <4>[ 111.065375] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 111.065397] ? report_bug+0x278/0x2e0 <4>[ 111.065424] ? handle_bug+0x7b/0xa0 <4>[ 111.065443] ? exc_invalid_op+0x1c/0x50 <4>[ 111.065462] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 111.065487] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 111.065508] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 111.065532] rcu_core+0x683/0x1c80 <4>[ 111.065567] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 111.065593] ? __pfx_rcu_core+0x10/0x10 <4>[ 111.065668] rcu_core_si+0x12/0x20 <4>[ 111.065696] handle_softirqs+0x20c/0x720 <4>[ 111.065720] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 111.065743] irq_exit_rcu+0x9c/0xd0 <4>[ 111.065762] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 111.065786] <4>[ 111.065796] <4>[ 111.065806] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 111.065827] RIP: 0010:default_idle+0xf/0x20 <4>[ 111.065847] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 111.065864] RSP: 0000:ffffffff8d407df0 EFLAGS: 00000206 <4>[ 111.065881] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 111.065895] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 0000000000080904 <4>[ 111.065907] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 111.065920] R10: ffff888154a35723 R11: 000000000003a280 R12: 0000000000000000 <4>[ 111.065933] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 111.065951] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 111.065977] ? arch_cpu_idle+0xd/0x20 <4>[ 111.065996] default_idle_call+0x48/0x80 <4>[ 111.066015] do_idle+0x313/0x3c0 <4>[ 111.066036] ? __pfx_do_idle+0x10/0x10 <4>[ 111.066054] ? trace_preempt_on+0x20/0xc0 <4>[ 111.066074] ? schedule+0x86/0x310 <4>[ 111.066092] ? preempt_count_sub+0x50/0x80 <4>[ 111.066124] cpu_startup_entry+0x5c/0x70 <4>[ 111.066145] rest_init+0x11a/0x140 <4>[ 111.066161] ? acpi_subsystem_init+0x5d/0x150 <4>[ 111.066185] start_kernel+0x31b/0x400 <4>[ 111.066208] x86_64_start_reservations+0x1c/0x30 <4>[ 111.066228] x86_64_start_kernel+0xcf/0xe0 <4>[ 111.066248] common_startup_64+0x12c/0x138 <4>[ 111.066275] <4>[ 111.066285] ---[ end trace 0000000000000000 ]--- <6>[ 111.079571] ok 1 test_sort <6>[ 111.079798] ok 20 lib_sort <6>[ 111.080475] KTAP version 1 <6>[ 111.080712] # Subtest: kprobes_test <6>[ 111.080880] # module: test_kprobes <6>[ 111.080946] 1..7 <6>[ 111.106467] ok 1 test_kprobe <6>[ 111.165160] ok 2 test_kprobes <6>[ 111.187214] ok 3 test_kprobe_missed <6>[ 111.224439] ok 4 test_kretprobe <6>[ 111.353037] ok 5 test_kretprobes <6>[ 111.469404] ok 6 test_stacktrace_on_kretprobe <6>[ 111.668392] ok 7 test_stacktrace_on_nested_kretprobe <6>[ 111.669057] # kprobes_test: pass:7 fail:0 skip:0 total:7 <6>[ 111.669483] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 111.670089] ok 21 kprobes_test <6>[ 111.672034] KTAP version 1 <6>[ 111.672366] # Subtest: kunit_executor_test <6>[ 111.672796] # module: kunit <6>[ 111.672901] 1..8 <6>[ 111.676914] ok 1 parse_filter_test <6>[ 111.682091] ok 2 filter_suites_test <6>[ 111.686212] ok 3 filter_suites_test_glob_test <6>[ 111.690557] ok 4 filter_suites_to_empty_test <6>[ 111.696316] ok 5 parse_filter_attr_test <6>[ 111.702441] ok 6 filter_attr_test <6>[ 111.707188] ok 7 filter_attr_empty_test <6>[ 111.711472] ok 8 filter_attr_skip_test <6>[ 111.712414] # kunit_executor_test: pass:8 fail:0 skip:0 total:8 <6>[ 111.713017] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 111.713520] ok 22 kunit_executor_test <6>[ 111.715020] KTAP version 1 <6>[ 111.715271] # Subtest: kunit-try-catch-test <6>[ 111.715535] # module: kunit_test <6>[ 111.715761] 1..2 <6>[ 111.721542] ok 1 kunit_test_try_catch_successful_try_no_catch <6>[ 111.726269] ok 2 kunit_test_try_catch_unsuccessful_try_does_catch <6>[ 111.727019] # kunit-try-catch-test: pass:2 fail:0 skip:0 total:2 <6>[ 111.727601] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 111.728566] ok 23 kunit-try-catch-test <6>[ 111.729987] KTAP version 1 <6>[ 111.730244] # Subtest: kunit-resource-test <6>[ 111.730559] # module: kunit_test <6>[ 111.730801] 1..12 <6>[ 111.734399] ok 1 kunit_resource_test_init_resources <6>[ 111.737892] ok 2 kunit_resource_test_alloc_resource <6>[ 111.742536] ok 3 kunit_resource_test_destroy_resource <6>[ 111.747264] ok 4 kunit_resource_test_remove_resource <6>[ 111.751492] ok 5 kunit_resource_test_cleanup_resources <6>[ 111.756401] ok 6 kunit_resource_test_proper_free_ordering <6>[ 111.760373] ok 7 kunit_resource_test_static <6>[ 111.764756] ok 8 kunit_resource_test_named <6>[ 111.768262] ok 9 kunit_resource_test_action <6>[ 111.771484] ok 10 kunit_resource_test_remove_action <6>[ 111.774868] ok 11 kunit_resource_test_release_action <6>[ 111.777231] action_order_2 <6>[ 111.778142] action_order_2 <6>[ 111.778867] action_order_1 <6>[ 111.780964] ok 12 kunit_resource_test_action_ordering <6>[ 111.781247] # kunit-resource-test: pass:12 fail:0 skip:0 total:12 <6>[ 111.781597] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 111.782199] ok 24 kunit-resource-test <6>[ 111.783194] KTAP version 1 <6>[ 111.783416] # Subtest: kunit-log-test <6>[ 111.783740] # module: kunit_test <6>[ 111.783822] 1..2 <6>[ 111.786175] put this in log. <6>[ 111.786348] this too. <6>[ 111.786821] add to suite log. <6>[ 111.787139] along with this. <6>[ 111.789417] ok 1 kunit_log_test <6>[ 111.790367] # kunit_log_newline_test: Add newline <6>[ 111.792008] ok 2 kunit_log_newline_test <6>[ 111.792073] # kunit-log-test: pass:2 fail:0 skip:0 total:2 <6>[ 111.792321] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 111.792627] ok 25 kunit-log-test <6>[ 111.793337] KTAP version 1 <6>[ 111.793465] # Subtest: kunit_status <6>[ 111.793608] # module: kunit_test <6>[ 111.793711] 1..2 <6>[ 111.795173] ok 1 kunit_status_set_failure_test <6>[ 111.796467] ok 2 kunit_status_mark_skipped_test <6>[ 111.796724] # kunit_status: pass:2 fail:0 skip:0 total:2 <6>[ 111.796902] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 111.797150] ok 26 kunit_status <6>[ 111.797935] KTAP version 1 <6>[ 111.798099] # Subtest: kunit_current <6>[ 111.798272] # module: kunit_test <6>[ 111.798316] 1..2 <6>[ 111.800532] ok 1 kunit_current_test <3>[ 111.801718] # fake test: lib/kunit/kunit-test.c:722: This should make `fake` test fail. <6>[ 111.803216] ok 2 kunit_current_fail_test <6>[ 111.803605] # kunit_current: pass:2 fail:0 skip:0 total:2 <6>[ 111.803944] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 111.804166] ok 27 kunit_current <6>[ 111.804870] KTAP version 1 <6>[ 111.805028] # Subtest: kunit_device <6>[ 111.805163] # module: kunit_test <6>[ 111.805207] 1..3 <6>[ 111.810228] ok 1 kunit_device_test <6>[ 111.813247] ok 2 kunit_device_cleanup_test <6>[ 111.818351] ok 3 kunit_device_driver_test <6>[ 111.818567] # kunit_device: pass:3 fail:0 skip:0 total:3 <6>[ 111.818825] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 111.819087] ok 28 kunit_device <6>[ 111.819973] KTAP version 1 <6>[ 111.820103] # Subtest: kunit_fault <6>[ 111.820231] # module: kunit_test <6>[ 111.820277] 1..1 <4>[ 111.822884] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI <1>[ 111.822946] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] <4>[ 111.822984] CPU: 1 UID: 0 PID: 629 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-next-20240807 #1 <4>[ 111.823017] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST <4>[ 111.823027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 111.823040] RIP: 0010:kunit_test_null_dereference+0x52/0x160 <4>[ 111.823086] Code: 04 48 83 ec 60 48 c7 45 90 b3 8a b5 41 48 c7 45 98 39 a6 15 8d 48 c7 45 a0 10 a6 98 89 c7 02 f1 f1 f1 f1 c7 42 04 01 f3 f3 f3 <0f> b6 00 65 48 8b 14 25 28 00 00 00 48 89 55 e8 31 d2 84 c0 74 08 <4>[ 111.823106] RSP: 0000:ffff88810727fe40 EFLAGS: 00000282 <4>[ 111.823130] RAX: dffffc0000000000 RBX: ffff88810030fb20 RCX: ffff888107635e98 <4>[ 111.823145] RDX: ffffed1020e4ffc8 RSI: 0000000000000008 RDI: ffff88810030fb20 <4>[ 111.823157] RBP: ffff88810727feb0 R08: 0000000000000000 R09: ffffed1020c7e960 <4>[ 111.823169] R10: ffff8881063f4b07 R11: 0000000000000000 R12: 1ffff11020e4ffc8 <4>[ 111.823181] R13: ffffffff8998a610 R14: ffffffff89980410 R15: ffff888104e87b48 <4>[ 111.823193] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 111.823209] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 111.823221] CR2: dffffc0000000000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 111.823234] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 111.823246] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 111.823259] Call Trace: <4>[ 111.823269] <4>[ 111.823309] ? show_regs+0x68/0x80 <4>[ 111.823339] ? die_addr+0x45/0xb0 <4>[ 111.823359] ? exc_general_protection+0x15c/0x240 <4>[ 111.823389] ? asm_exc_general_protection+0x2b/0x30 <4>[ 111.823409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 111.823428] ? __pfx_kunit_test_null_dereference+0x10/0x10 <4>[ 111.823459] ? kunit_test_null_dereference+0x52/0x160 <4>[ 111.823483] ? __pfx_kunit_test_null_dereference+0x10/0x10 <4>[ 111.823504] ? __kasan_check_read+0x15/0x20 <4>[ 111.823524] ? __kthread_parkme+0x8f/0x160 <4>[ 111.823544] ? trace_preempt_on+0x20/0xc0 <4>[ 111.823563] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 111.823584] kthread+0x257/0x310 <4>[ 111.823603] ? __pfx_kthread+0x10/0x10 <4>[ 111.823639] ret_from_fork+0x41/0x80 <4>[ 111.823701] ? __pfx_kthread+0x10/0x10 <4>[ 111.823729] ret_from_fork_asm+0x1a/0x30 <4>[ 111.823760] <4>[ 111.823778] Modules linked in: <4>[ 111.824125] ---[ end trace 0000000000000000 ]--- <4>[ 111.832744] RIP: 0010:kunit_test_null_dereference+0x52/0x160 <4>[ 111.833011] Code: 04 48 83 ec 60 48 c7 45 90 b3 8a b5 41 48 c7 45 98 39 a6 15 8d 48 c7 45 a0 10 a6 98 89 c7 02 f1 f1 f1 f1 c7 42 04 01 f3 f3 f3 <0f> b6 00 65 48 8b 14 25 28 00 00 00 48 89 55 e8 31 d2 84 c0 74 08 <4>[ 111.833698] RSP: 0000:ffff88810727fe40 EFLAGS: 00000282 <4>[ 111.833939] RAX: dffffc0000000000 RBX: ffff88810030fb20 RCX: ffff888107635e98 <4>[ 111.834227] RDX: ffffed1020e4ffc8 RSI: 0000000000000008 RDI: ffff88810030fb20 <4>[ 111.834504] RBP: ffff88810727feb0 R08: 0000000000000000 R09: ffffed1020c7e960 <4>[ 111.834839] R10: ffff8881063f4b07 R11: 0000000000000000 R12: 1ffff11020e4ffc8 <4>[ 111.835137] R13: ffffffff8998a610 R14: ffffffff89980410 R15: ffff888104e87b48 <4>[ 111.835407] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 111.835772] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 111.836007] CR2: dffffc0000000000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 111.836283] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 111.836563] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <3>[ 111.837415] # kunit_test_fault_null_dereference: try faulted: last line seen lib/kunit/kunit-test.c:95 <6>[ 111.839828] ok 1 kunit_test_fault_null_dereference <6>[ 111.839902] ok 29 kunit_fault <6>[ 111.840526] KTAP version 1 <6>[ 111.840749] # Subtest: kunit_platform_device <6>[ 111.840959] # module: platform_test <6>[ 111.841008] 1..4 <6>[ 111.843192] ok 1 kunit_platform_device_alloc_test <6>[ 111.845963] ok 2 kunit_platform_device_add_test <4>[ 111.848159] sysfs: cannot create duplicate filename '/devices/platform/kunit-platform-add-2' <4>[ 111.848641] CPU: 0 UID: 0 PID: 636 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 111.849034] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 111.849257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 111.849598] Call Trace: <4>[ 111.849813] <4>[ 111.849922] dump_stack_lvl+0x96/0xb0 <4>[ 111.850083] dump_stack+0x14/0x20 <4>[ 111.850330] sysfs_warn_dup+0x7a/0xa0 <4>[ 111.850560] sysfs_create_dir_ns+0x20c/0x290 <4>[ 111.850809] ? __pfx_sysfs_create_dir_ns+0x10/0x10 <4>[ 111.851002] ? __kasan_check_write+0x18/0x20 <4>[ 111.851219] ? __pfx__raw_spin_lock+0x10/0x10 <4>[ 111.851456] ? trace_preempt_on+0x20/0xc0 <4>[ 111.851606] ? kobject_add_internal+0x1c3/0x9b0 <4>[ 111.851870] kobject_add_internal+0x222/0x9b0 <4>[ 111.852086] kobject_add+0x13b/0x200 <4>[ 111.852276] ? __pfx_kobject_add+0x10/0x10 <4>[ 111.852478] ? __kasan_kmalloc+0xb7/0xc0 <4>[ 111.852689] device_add+0x23d/0x1820 <4>[ 111.852882] ? __pfx_device_add+0x10/0x10 <4>[ 111.853079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 111.853298] ? trace_preempt_on+0x20/0xc0 <4>[ 111.853487] ? __kunit_add_resource+0x154/0x220 <4>[ 111.853745] ? preempt_count_sub+0x50/0x80 <4>[ 111.853900] platform_device_add+0x397/0x6f0 <4>[ 111.854122] kunit_platform_device_add+0x28/0x2f0 <4>[ 111.854382] kunit_platform_device_add_twice_fails_test+0x20b/0x460 <4>[ 111.854624] ? __pfx_kunit_platform_device_add_twice_fails_test+0x10/0x10 <4>[ 111.854924] ? __schedule+0xbca/0x2590 <4>[ 111.855080] ? __pfx_read_tsc+0x10/0x10 <4>[ 111.855318] ? ktime_get_ts64+0x84/0x230 <4>[ 111.855512] kunit_try_run_case+0x1b3/0x490 <4>[ 111.855769] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 111.855937] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 111.856182] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 111.856403] ? __kthread_parkme+0x82/0x160 <4>[ 111.856614] ? preempt_count_sub+0x50/0x80 <4>[ 111.856844] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 111.857054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 111.857300] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 111.857545] kthread+0x257/0x310 <4>[ 111.857758] ? __pfx_kthread+0x10/0x10 <4>[ 111.857903] ret_from_fork+0x41/0x80 <4>[ 111.858037] ? __pfx_kthread+0x10/0x10 <4>[ 111.858267] ret_from_fork_asm+0x1a/0x30 <4>[ 111.858535] <3>[ 111.859083] kobject: kobject_add_internal failed for kunit-platform-add-2 with -EEXIST, don't try to register things with the same name in the same directory. <6>[ 111.860992] ok 3 kunit_platform_device_add_twice_fails_test <6>[ 111.863272] ok 4 kunit_platform_device_add_cleans_up <6>[ 111.863513] # kunit_platform_device: pass:4 fail:0 skip:0 total:4 <6>[ 111.863868] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 111.864132] ok 30 kunit_platform_device <6>[ 111.865213] KTAP version 1 <6>[ 111.865342] # Subtest: kunit_platform_driver <6>[ 111.865491] # module: platform_test <6>[ 111.865535] 1..2 <6>[ 111.869949] ok 1 kunit_platform_driver_register_test <6>[ 111.874154] ok 2 kunit_platform_device_prepare_wait_for_probe_completes_when_already_probed <6>[ 111.875008] # kunit_platform_driver: pass:2 fail:0 skip:0 total:2 <6>[ 111.875486] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 111.876042] ok 31 kunit_platform_driver <6>[ 111.877335] KTAP version 1 <6>[ 111.877595] # Subtest: string-stream-test <6>[ 111.877970] # module: string_stream_test <6>[ 111.878071] 1..12 <6>[ 111.880594] ok 1 string_stream_managed_init_test <6>[ 111.883463] ok 2 string_stream_unmanaged_init_test <6>[ 111.886150] ok 3 string_stream_managed_free_test <6>[ 111.889218] ok 4 string_stream_resource_free_test <6>[ 111.896732] ok 5 string_stream_line_add_test <6>[ 111.907199] ok 6 string_stream_variable_length_line_test <6>[ 111.912659] ok 7 string_stream_append_test <6>[ 111.915910] ok 8 string_stream_append_auto_newline_test <6>[ 111.918252] ok 9 string_stream_append_empty_string_test <6>[ 111.920401] ok 10 string_stream_no_auto_newline_test <6>[ 111.923145] ok 11 string_stream_auto_newline_test <6>[ 112.089579] # string_stream_performance_test: Time elapsed: 159565 us <6>[ 112.090251] # string_stream_performance_test: Total string length: 573890 <6>[ 112.090679] # string_stream_performance_test: Bytes requested: 823930 <6>[ 112.091084] # string_stream_performance_test: Actual bytes allocated: 1048304 <6>[ 112.304463] ok 12 string_stream_performance_test <6>[ 112.306310] # string-stream-test: pass:12 fail:0 skip:0 total:12 <6>[ 112.306996] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 112.307449] ok 32 string-stream-test <6>[ 112.308999] KTAP version 1 <6>[ 112.309258] # Subtest: kunit-assert <6>[ 112.309530] # module: assert_test <4>[ 112.309753] ------------[ cut here ]------------ <6>[ 112.309773] 1..11 <4>[ 112.310296] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.310357] Modules linked in: <4>[ 112.310391] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 112.310427] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 112.310437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 112.310452] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.310479] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 112.310500] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 112.310520] RAX: 0000000080000000 RBX: ffff888105d65780 RCX: ffff888154200000 <4>[ 112.310534] RDX: 000000000013cfe0 RSI: ffffffff88ebc501 RDI: ffff88815433cfe0 <4>[ 112.310547] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 112.310560] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea0004175800 <4>[ 112.310573] R13: ffff88815433cfe0 R14: 0000000088418401 R15: 0000000000039408 <4>[ 112.310585] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 112.310600] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 112.310613] CR2: ffff88815430c000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 112.310679] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 112.310698] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 112.310713] Call Trace: <4>[ 112.310725] <4>[ 112.310744] ? show_regs+0x68/0x80 <4>[ 112.310770] ? __warn+0xd5/0x260 <4>[ 112.310787] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.310809] ? report_bug+0x278/0x2e0 <4>[ 112.310834] ? handle_bug+0x7b/0xa0 <4>[ 112.310852] ? exc_invalid_op+0x1c/0x50 <4>[ 112.310877] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 112.310903] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 112.310924] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.310948] rcu_core+0x683/0x1c80 <4>[ 112.310973] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 112.310997] ? __pfx_rcu_core+0x10/0x10 <4>[ 112.311023] rcu_core_si+0x12/0x20 <4>[ 112.311041] handle_softirqs+0x20c/0x720 <4>[ 112.311063] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 112.311084] irq_exit_rcu+0x9c/0xd0 <4>[ 112.311101] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 112.311121] <4>[ 112.311130] <4>[ 112.311140] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 112.311161] RIP: 0010:default_idle+0xf/0x20 <4>[ 112.311179] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 112.311196] RSP: 0000:ffffffff8d407df0 EFLAGS: 00000212 <4>[ 112.311213] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 112.311226] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 00000000000828fc <4>[ 112.311238] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 112.311250] R10: ffff888154a35723 R11: 000000000000e000 R12: 0000000000000000 <4>[ 112.311263] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 112.311280] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 112.311305] ? arch_cpu_idle+0xd/0x20 <4>[ 112.311322] default_idle_call+0x48/0x80 <4>[ 112.311339] do_idle+0x313/0x3c0 <4>[ 112.311359] ? __pfx_do_idle+0x10/0x10 <4>[ 112.311376] ? trace_preempt_on+0x20/0xc0 <4>[ 112.311395] ? schedule+0x86/0x310 <4>[ 112.311412] ? preempt_count_sub+0x50/0x80 <4>[ 112.311434] cpu_startup_entry+0x5c/0x70 <4>[ 112.311453] rest_init+0x11a/0x140 <4>[ 112.311469] ? acpi_subsystem_init+0x5d/0x150 <4>[ 112.311492] start_kernel+0x31b/0x400 <4>[ 112.311513] x86_64_start_reservations+0x1c/0x30 <4>[ 112.311533] x86_64_start_kernel+0xcf/0xe0 <4>[ 112.311552] common_startup_64+0x12c/0x138 <4>[ 112.311578] <4>[ 112.311588] ---[ end trace 0000000000000000 ]--- <6>[ 112.324421] ok 1 kunit_test_is_literal <6>[ 112.326508] ok 2 kunit_test_is_str_literal <6>[ 112.329936] ok 3 kunit_test_assert_prologue <6>[ 112.333105] ok 4 kunit_test_assert_print_msg <6>[ 112.335812] ok 5 kunit_test_unary_assert_format <6>[ 112.339526] ok 6 kunit_test_ptr_not_err_assert_format <6>[ 112.344428] ok 7 kunit_test_binary_assert_format <6>[ 112.348425] ok 8 kunit_test_binary_ptr_assert_format <6>[ 112.353318] ok 9 kunit_test_binary_str_assert_format <6>[ 112.359457] ok 10 kunit_test_assert_hexdump <6>[ 112.366126] ok 11 kunit_test_mem_assert_format <6>[ 112.366570] # kunit-assert: pass:11 fail:0 skip:0 total:11 <6>[ 112.367144] # Totals: pass:11 fail:0 skip:0 total:11 <6>[ 112.367555] ok 33 kunit-assert <6>[ 112.369331] # example: initializing suite <6>[ 112.369934] KTAP version 1 <6>[ 112.370185] # Subtest: example <6>[ 112.370435] # module: kunit_example_test <6>[ 112.370529] 1..9 <6>[ 112.372015] # example_simple_test: initializing <6>[ 112.373576] # example_simple_test: cleaning up <6>[ 112.374334] ok 1 example_simple_test <6>[ 112.375079] # example_skip_test: initializing <6>[ 112.375955] # example_skip_test: You should not see a line below. <6>[ 112.377102] # example_skip_test: cleaning up <6>[ 112.378104] ok 2 example_skip_test # SKIP this test should be skipped <6>[ 112.378917] # example_mark_skipped_test: initializing <6>[ 112.380376] # example_mark_skipped_test: You should see a line below. <6>[ 112.380583] # example_mark_skipped_test: You should see this line. <6>[ 112.382058] # example_mark_skipped_test: cleaning up <6>[ 112.383318] ok 3 example_mark_skipped_test # SKIP this test should be skipped <6>[ 112.384040] # example_all_expect_macros_test: initializing <6>[ 112.385613] # example_all_expect_macros_test: cleaning up <6>[ 112.386292] ok 4 example_all_expect_macros_test <6>[ 112.387078] # example_static_stub_test: initializing <6>[ 112.390314] # example_static_stub_test: cleaning up <6>[ 112.391146] ok 5 example_static_stub_test <6>[ 112.391752] # example_static_stub_using_fn_ptr_test: initializing <6>[ 112.393306] # example_static_stub_using_fn_ptr_test: cleaning up <6>[ 112.393958] ok 6 example_static_stub_using_fn_ptr_test <6>[ 112.394477] # example_priv_test: initializing <6>[ 112.397061] # example_priv_test: cleaning up <6>[ 112.397364] ok 7 example_priv_test <6>[ 112.397533] KTAP version 1 <6>[ 112.398222] # Subtest: example_params_test <6>[ 112.399126] # example_params_test: initializing <6>[ 112.400508] # example_params_test: cleaning up <6>[ 112.401286] ok 1 example value 3 # SKIP unsupported param value 3 <6>[ 112.401934] # example_params_test: initializing <6>[ 112.403425] # example_params_test: cleaning up <6>[ 112.404074] ok 2 example value 2 <6>[ 112.404566] # example_params_test: initializing <6>[ 112.406340] # example_params_test: cleaning up <6>[ 112.407076] ok 3 example value 1 <6>[ 112.407597] # example_params_test: initializing <6>[ 112.409163] # example_params_test: cleaning up <6>[ 112.409614] ok 4 example value 0 # SKIP unsupported param value 0 <6>[ 112.409774] # example_params_test: pass:2 fail:0 skip:2 total:4 <6>[ 112.410105] ok 8 example_params_test <6>[ 112.411514] # example_slow_test: initializing <6>[ 112.414880] # example_slow_test: cleaning up <6>[ 112.415179] # example_slow_test.speed: slow <6>[ 112.415287] ok 9 example_slow_test <6>[ 112.416048] # example: exiting suite <6>[ 112.416796] # example: pass:7 fail:0 skip:2 total:9 <6>[ 112.416880] # Totals: pass:8 fail:0 skip:4 total:12 <6>[ 112.417174] ok 34 example <6>[ 112.418003] KTAP version 1 <6>[ 112.418206] # Subtest: rational <6>[ 112.418402] # module: rational_test <6>[ 112.418495] 1..1 <6>[ 112.419036] KTAP version 1 <6>[ 112.419296] # Subtest: rational_test <6>[ 112.420950] ok 1 Exceeds bounds, semi-convergent term > 1/2 last term <6>[ 112.422506] ok 2 Exceeds bounds, semi-convergent term < 1/2 last term <6>[ 112.424233] ok 3 Closest to zero <6>[ 112.426287] ok 4 Closest to smallest non-zero <6>[ 112.428165] ok 5 Use convergent <6>[ 112.429585] ok 6 Exact answer <6>[ 112.430943] ok 7 Semiconvergent, numerator limit <6>[ 112.432147] ok 8 Semiconvergent, denominator limit <6>[ 112.432413] # rational_test: pass:8 fail:0 skip:0 total:8 <6>[ 112.432701] ok 1 rational_test <6>[ 112.432968] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 112.433136] ok 35 rational <6>[ 112.433618] KTAP version 1 <6>[ 112.434213] # Subtest: bitfields <6>[ 112.434413] # module: bitfield_kunit <6>[ 112.434496] 1..2 <6>[ 112.436252] ok 1 test_bitfields_constants <6>[ 112.438121] ok 2 test_bitfields_variables <6>[ 112.438446] # bitfields: pass:2 fail:0 skip:0 total:2 <6>[ 112.438814] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 112.439088] ok 36 bitfields <6>[ 112.439930] KTAP version 1 <6>[ 112.440085] # Subtest: checksum <6>[ 112.440257] # module: checksum_kunit <6>[ 112.440354] 1..5 <6>[ 112.493566] ok 1 test_csum_fixed_random_inputs <6>[ 112.619094] ok 2 test_csum_all_carry_inputs <6>[ 112.736783] ok 3 test_csum_no_carry_inputs <4>[ 112.738759] ------------[ cut here ]------------ <4>[ 112.739155] WARNING: CPU: 1 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.739259] Modules linked in: <4>[ 112.739319] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 112.739356] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 112.739366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 112.739381] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.739410] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 112.739431] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 112.739454] RAX: 0000000080000000 RBX: ffff888105ddf1c0 RCX: ffff888154200000 <4>[ 112.739483] RDX: 0000000000142fe0 RSI: ffffffff88ebc501 RDI: ffff888154342fe0 <4>[ 112.739507] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 112.739531] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea0004177600 <4>[ 112.739560] R13: ffff888154342fe0 R14: 0000000000838501 R15: 0000000000039408 <4>[ 112.739593] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 112.739697] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 112.739717] CR2: dffffc0000000000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 112.739732] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 112.739744] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 112.739757] Call Trace: <4>[ 112.739769] <4>[ 112.739787] ? show_regs+0x68/0x80 <4>[ 112.739814] ? __warn+0xd5/0x260 <4>[ 112.739832] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.739853] ? report_bug+0x278/0x2e0 <4>[ 112.739877] ? handle_bug+0x7b/0xa0 <4>[ 112.739894] ? exc_invalid_op+0x1c/0x50 <4>[ 112.739911] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 112.739936] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 112.739956] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 112.739978] rcu_core+0x683/0x1c80 <4>[ 112.740005] ? __pfx_rcu_core+0x10/0x10 <4>[ 112.740029] rcu_core_si+0x12/0x20 <4>[ 112.740048] handle_softirqs+0x20c/0x720 <4>[ 112.740069] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 112.740090] irq_exit_rcu+0x9c/0xd0 <4>[ 112.740107] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 112.740128] <4>[ 112.740137] <4>[ 112.740147] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 112.740166] RIP: 0010:default_idle+0xf/0x20 <4>[ 112.740184] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 112.740201] RSP: 0000:ffff888100867de0 EFLAGS: 00000216 <4>[ 112.740218] RAX: ffff888154b00000 RBX: ffff88810083bf00 RCX: ffffffff8c0688b5 <4>[ 112.740231] RDX: ffffed102a966ae5 RSI: 0000000000000004 RDI: 000000000005c80c <4>[ 112.740243] RBP: ffff888100867de8 R08: 0000000000000001 R09: ffffed102a966ae4 <4>[ 112.740255] R10: ffff888154b35723 R11: 000000000003a280 R12: 0000000000000001 <4>[ 112.740267] R13: ffffed10201077e0 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 112.740284] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 112.740310] ? arch_cpu_idle+0xd/0x20 <4>[ 112.740326] default_idle_call+0x48/0x80 <4>[ 112.740342] do_idle+0x313/0x3c0 <4>[ 112.740361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 112.740382] ? __pfx_do_idle+0x10/0x10 <4>[ 112.740399] ? _raw_spin_unlock_irqrestore+0x49/0x90 <4>[ 112.740418] ? complete+0x15b/0x1d0 <4>[ 112.740439] cpu_startup_entry+0x5c/0x70 <4>[ 112.740458] start_secondary+0x214/0x290 <4>[ 112.740477] ? __pfx_start_secondary+0x10/0x10 <4>[ 112.740501] common_startup_64+0x12c/0x138 <4>[ 112.740526] <4>[ 112.740536] ---[ end trace 0000000000000000 ]--- <6>[ 112.756733] ok 4 test_ip_fast_csum <6>[ 112.758323] ok 5 test_csum_ipv6_magic <6>[ 112.758531] # checksum: pass:5 fail:0 skip:0 total:5 <6>[ 112.758839] # Totals: pass:5 fail:0 skip:0 total:5 <6>[ 112.759144] ok 37 checksum <6>[ 112.760051] KTAP version 1 <6>[ 112.760212] # Subtest: list-kunit-test <6>[ 112.760393] # module: list_test <6>[ 112.760493] 1..39 <6>[ 112.762316] ok 1 list_test_list_init <6>[ 112.763812] ok 2 list_test_list_add <6>[ 112.765241] ok 3 list_test_list_add_tail <6>[ 112.766575] ok 4 list_test_list_del <6>[ 112.768571] ok 5 list_test_list_replace <6>[ 112.770219] ok 6 list_test_list_replace_init <6>[ 112.771955] ok 7 list_test_list_swap <6>[ 112.773572] ok 8 list_test_list_del_init <6>[ 112.775135] ok 9 list_test_list_del_init_careful <6>[ 112.776587] ok 10 list_test_list_move <6>[ 112.778149] ok 11 list_test_list_move_tail <6>[ 112.779982] ok 12 list_test_list_bulk_move_tail <6>[ 112.781484] ok 13 list_test_list_is_head <6>[ 112.783012] ok 14 list_test_list_is_first <6>[ 112.784484] ok 15 list_test_list_is_last <6>[ 112.787066] ok 16 list_test_list_empty <6>[ 112.788509] ok 17 list_test_list_empty_careful <6>[ 112.790328] ok 18 list_test_list_rotate_left <6>[ 112.792310] ok 19 list_test_list_rotate_to_front <6>[ 112.793802] ok 20 list_test_list_is_singular <6>[ 112.795459] ok 21 list_test_list_cut_position <6>[ 112.797209] ok 22 list_test_list_cut_before <6>[ 112.798956] ok 23 list_test_list_splice <6>[ 112.800373] ok 24 list_test_list_splice_tail <6>[ 112.802221] ok 25 list_test_list_splice_init <6>[ 112.803888] ok 26 list_test_list_splice_tail_init <6>[ 112.805525] ok 27 list_test_list_entry <6>[ 112.807083] ok 28 list_test_list_entry_is_head <6>[ 112.808517] ok 29 list_test_list_first_entry <6>[ 112.810243] ok 30 list_test_list_last_entry <6>[ 112.811887] ok 31 list_test_list_first_entry_or_null <6>[ 112.813603] ok 32 list_test_list_next_entry <6>[ 112.815392] ok 33 list_test_list_prev_entry <6>[ 112.816936] ok 34 list_test_list_for_each <6>[ 112.818792] ok 35 list_test_list_for_each_prev <6>[ 112.820290] ok 36 list_test_list_for_each_safe <6>[ 112.822034] ok 37 list_test_list_for_each_prev_safe <6>[ 112.824170] ok 38 list_test_list_for_each_entry <6>[ 112.826153] ok 39 list_test_list_for_each_entry_reverse <6>[ 112.826415] # list-kunit-test: pass:39 fail:0 skip:0 total:39 <6>[ 112.826751] # Totals: pass:39 fail:0 skip:0 total:39 <6>[ 112.827122] ok 38 list-kunit-test <6>[ 112.828159] KTAP version 1 <6>[ 112.828461] # Subtest: hlist <6>[ 112.828739] # module: list_test <6>[ 112.828791] 1..18 <6>[ 112.830435] ok 1 hlist_test_init <6>[ 112.831611] ok 2 hlist_test_unhashed <6>[ 112.833065] ok 3 hlist_test_unhashed_lockless <6>[ 112.834421] ok 4 hlist_test_del <6>[ 112.836589] ok 5 hlist_test_del_init <6>[ 112.838190] ok 6 hlist_test_add <6>[ 112.839698] ok 7 hlist_test_fake <6>[ 112.841285] ok 8 hlist_test_is_singular_node <6>[ 112.842532] ok 9 hlist_test_empty <6>[ 112.844226] ok 10 hlist_test_move_list <6>[ 112.845889] ok 11 hlist_test_entry <6>[ 112.847370] ok 12 hlist_test_entry_safe <6>[ 112.849037] ok 13 hlist_test_for_each <6>[ 112.850480] ok 14 hlist_test_for_each_safe <6>[ 112.852190] ok 15 hlist_test_for_each_entry <6>[ 112.854024] ok 16 hlist_test_for_each_entry_continue <6>[ 112.855916] ok 17 hlist_test_for_each_entry_from <6>[ 112.857772] ok 18 hlist_test_for_each_entry_safe <6>[ 112.858024] # hlist: pass:18 fail:0 skip:0 total:18 <6>[ 112.858367] # Totals: pass:18 fail:0 skip:0 total:18 <6>[ 112.858894] ok 39 hlist <6>[ 112.859714] KTAP version 1 <6>[ 112.859851] # Subtest: klist <6>[ 112.860000] # module: list_test <6>[ 112.860102] 1..8 <6>[ 112.862257] ok 1 klist_test_add_tail <6>[ 112.863604] ok 2 klist_test_add_head <6>[ 112.865336] ok 3 klist_test_add_behind <6>[ 112.867242] ok 4 klist_test_add_before <6>[ 112.869024] ok 5 klist_test_del_refcount_greater_than_zero <6>[ 112.870865] ok 6 klist_test_del_refcount_zero <6>[ 112.872552] ok 7 klist_test_remove <6>[ 112.874223] ok 8 klist_test_node_attached <6>[ 112.874415] # klist: pass:8 fail:0 skip:0 total:8 <6>[ 112.874584] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 112.875113] ok 40 klist <6>[ 112.875851] KTAP version 1 <6>[ 112.876031] # Subtest: hashtable <6>[ 112.876231] # module: hashtable_test <6>[ 112.876332] 1..9 <6>[ 112.877977] ok 1 hashtable_test_hash_init <6>[ 112.879120] ok 2 hashtable_test_hash_empty <6>[ 112.880603] ok 3 hashtable_test_hash_hashed <6>[ 112.882862] ok 4 hashtable_test_hash_add <6>[ 112.884325] ok 5 hashtable_test_hash_del <6>[ 112.886070] ok 6 hashtable_test_hash_for_each <6>[ 112.887881] ok 7 hashtable_test_hash_for_each_safe <6>[ 112.889814] ok 8 hashtable_test_hash_for_each_possible <6>[ 112.891612] ok 9 hashtable_test_hash_for_each_possible_safe <6>[ 112.891927] # hashtable: pass:9 fail:0 skip:0 total:9 <6>[ 112.892139] # Totals: pass:9 fail:0 skip:0 total:9 <6>[ 112.892337] ok 41 hashtable <6>[ 112.893101] KTAP version 1 <6>[ 112.893238] # Subtest: bits-test <6>[ 112.893361] # module: test_bits <6>[ 112.893406] 1..4 <6>[ 112.894802] ok 1 genmask_test <6>[ 112.896110] ok 2 genmask_ull_test <6>[ 112.897389] ok 3 genmask_u128_test <6>[ 112.898781] ok 4 genmask_input_check_test <6>[ 112.898987] # bits-test: pass:4 fail:0 skip:0 total:4 <6>[ 112.899132] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 112.899281] ok 42 bits-test <6>[ 112.900067] KTAP version 1 <6>[ 112.900175] # Subtest: cmdline <6>[ 112.900273] # module: cmdline_kunit <6>[ 112.900315] 1..4 <6>[ 112.902030] ok 1 cmdline_test_noint <6>[ 112.904090] ok 2 cmdline_test_lead_int <6>[ 112.906146] ok 3 cmdline_test_tail_int <6>[ 112.908265] ok 4 cmdline_test_range <6>[ 112.908489] # cmdline: pass:4 fail:0 skip:0 total:4 <6>[ 112.908863] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 112.909199] ok 43 cmdline <6>[ 112.910066] KTAP version 1 <6>[ 112.910209] # Subtest: slub_test <6>[ 112.910389] # module: slub_kunit <6>[ 112.910486] 1..3 <6>[ 112.923687] ok 1 test_clobber_zone <6>[ 112.930032] ok 2 test_clobber_redzone_free <6>[ 112.938610] ok 3 test_kmalloc_redzone_access <6>[ 112.939006] # slub_test: pass:3 fail:0 skip:0 total:3 <6>[ 112.939328] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 112.939556] ok 44 slub_test <6>[ 112.940339] KTAP version 1 <6>[ 112.940485] # Subtest: memcpy <6>[ 112.940725] # module: memcpy_kunit <6>[ 112.940817] 1..6 <6>[ 112.941904] # memset_test: ok: memset() direct assignment <6>[ 112.942388] # memset_test: ok: memset() complete overwrite <6>[ 112.943466] # memset_test: ok: memset() middle overwrite <6>[ 112.943933] # memset_test: ok: memset() argument side-effects <6>[ 112.944355] # memset_test: ok: memset() memset_after() <6>[ 112.944810] # memset_test: ok: memset() memset_startat() <6>[ 112.946186] ok 1 memset_test <6>[ 112.947244] # memcpy_test: ok: memcpy() static initializers <6>[ 112.948193] # memcpy_test: ok: memcpy() direct assignment <6>[ 112.948848] # memcpy_test: ok: memcpy() complete overwrite <6>[ 112.949360] # memcpy_test: ok: memcpy() middle overwrite <6>[ 112.949960] # memcpy_test: ok: memcpy() argument side-effects <6>[ 112.951116] ok 2 memcpy_test <6>[ 117.151949] # memcpy_large_test.speed: slow <6>[ 117.152222] ok 3 memcpy_large_test <6>[ 117.153174] # memmove_test: ok: memmove() static initializers <6>[ 117.153706] # memmove_test: ok: memmove() direct assignment <6>[ 117.154081] # memmove_test: ok: memmove() complete overwrite <6>[ 117.154412] # memmove_test: ok: memmove() middle overwrite <6>[ 117.154955] # memmove_test: ok: memmove() argument side-effects <6>[ 117.155262] # memmove_test: ok: memmove() overlapping write <6>[ 117.156285] # memmove_test.speed: slow <6>[ 117.156358] ok 4 memmove_test <6>[ 121.273672] # memmove_large_test.speed: slow <6>[ 121.273931] ok 5 memmove_large_test <6>[ 130.605086] # memmove_overlap_test.speed: slow <6>[ 130.605628] ok 6 memmove_overlap_test <6>[ 130.606221] # memcpy: pass:6 fail:0 skip:0 total:6 <6>[ 130.606565] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 130.607335] ok 45 memcpy <6>[ 130.608836] KTAP version 1 <6>[ 130.609101] # Subtest: is_signed_type <6>[ 130.609391] # module: is_signed_type_kunit <6>[ 130.609491] 1..1 <6>[ 130.611889] ok 1 is_signed_type_test <6>[ 130.611962] ok 46 is_signed_type <6>[ 130.612767] KTAP version 1 <6>[ 130.612889] # Subtest: overflow <6>[ 130.613027] # module: overflow_kunit <6>[ 130.613072] 1..22 <6>[ 130.617221] # u8_u8__u8_overflow_test: 18 u8_u8__u8 arithmetic tests finished <6>[ 130.619064] ok 1 u8_u8__u8_overflow_test <6>[ 130.622965] # s8_s8__s8_overflow_test: 19 s8_s8__s8 arithmetic tests finished <6>[ 130.625223] ok 2 s8_s8__s8_overflow_test <6>[ 130.629043] # u16_u16__u16_overflow_test: 17 u16_u16__u16 arithmetic tests finished <6>[ 130.631036] ok 3 u16_u16__u16_overflow_test <6>[ 130.635166] # s16_s16__s16_overflow_test: 17 s16_s16__s16 arithmetic tests finished <6>[ 130.637535] ok 4 s16_s16__s16_overflow_test <6>[ 130.639309] # u32_u32__u32_overflow_test: 17 u32_u32__u32 arithmetic tests finished <6>[ 130.640882] ok 5 u32_u32__u32_overflow_test <6>[ 130.644332] # s32_s32__s32_overflow_test: 17 s32_s32__s32 arithmetic tests finished <6>[ 130.646272] ok 6 s32_s32__s32_overflow_test <6>[ 130.650128] # u64_u64__u64_overflow_test: 17 u64_u64__u64 arithmetic tests finished <6>[ 130.652729] ok 7 u64_u64__u64_overflow_test <6>[ 130.655611] # s64_s64__s64_overflow_test: 21 s64_s64__s64 arithmetic tests finished <6>[ 130.657788] ok 8 s64_s64__s64_overflow_test <6>[ 130.661400] # u32_u32__int_overflow_test: 2 u32_u32__int arithmetic tests finished <6>[ 130.664010] ok 9 u32_u32__int_overflow_test <6>[ 130.667496] # u32_u32__u8_overflow_test: 3 u32_u32__u8 arithmetic tests finished <6>[ 130.669698] ok 10 u32_u32__u8_overflow_test <6>[ 130.673157] # u8_u8__int_overflow_test: 3 u8_u8__int arithmetic tests finished <6>[ 130.675192] ok 11 u8_u8__int_overflow_test <6>[ 130.677750] # int_int__u8_overflow_test: 3 int_int__u8 arithmetic tests finished <6>[ 130.679770] ok 12 int_int__u8_overflow_test <6>[ 130.680325] # shift_sane_test: 36 sane shift tests finished <6>[ 130.682070] ok 13 shift_sane_test <6>[ 130.683311] # shift_overflow_test: 25 overflow shift tests finished <6>[ 130.685476] ok 14 shift_overflow_test <6>[ 130.686047] # shift_truncate_test: 27 truncate shift tests finished <6>[ 130.687451] ok 15 shift_truncate_test <6>[ 130.688013] # shift_nonsense_test: 25 nonsense shift tests finished <6>[ 130.690359] ok 16 shift_nonsense_test <6>[ 130.694417] # overflow_allocation_test: 11 allocation overflow tests finished <6>[ 130.697078] ok 17 overflow_allocation_test <6>[ 130.700986] # overflow_size_helpers_test: 43 overflow size helper tests finished <6>[ 130.702733] ok 18 overflow_size_helpers_test <6>[ 130.705190] # overflows_type_test: 658 overflows_type() tests finished <6>[ 130.707111] ok 19 overflows_type_test <6>[ 130.710509] # same_type_test: 0 __same_type() tests finished <6>[ 130.712667] ok 20 same_type_test <6>[ 130.713394] # castable_to_type_test: 103 castable_to_type() tests finished <6>[ 130.714702] ok 21 castable_to_type_test <6>[ 130.715909] ok 22 DEFINE_FLEX_test <6>[ 130.716139] # overflow: pass:22 fail:0 skip:0 total:22 <6>[ 130.716430] # Totals: pass:22 fail:0 skip:0 total:22 <6>[ 130.716774] ok 47 overflow <6>[ 130.717938] KTAP version 1 <6>[ 130.718078] # Subtest: stackinit <6>[ 130.718264] # module: stackinit_kunit <6>[ 130.718365] 1..65 <6>[ 130.720175] ok 1 test_u8_zero <6>[ 130.721730] ok 2 test_u16_zero <6>[ 130.723317] ok 3 test_u32_zero <6>[ 130.725130] ok 4 test_u64_zero <6>[ 130.726959] ok 5 test_char_array_zero <6>[ 130.728484] ok 6 test_small_hole_zero <6>[ 130.730324] ok 7 test_big_hole_zero <6>[ 130.732113] ok 8 test_trailing_hole_zero <6>[ 130.733573] ok 9 test_packed_zero <6>[ 130.735414] ok 10 test_small_hole_dynamic_partial <6>[ 130.737205] ok 11 test_big_hole_dynamic_partial <6>[ 130.739056] ok 12 test_trailing_hole_dynamic_partial <6>[ 130.740603] ok 13 test_packed_dynamic_partial <6>[ 130.742329] ok 14 test_small_hole_assigned_dynamic_partial <6>[ 130.744417] ok 15 test_big_hole_assigned_dynamic_partial <6>[ 130.746259] ok 16 test_trailing_hole_assigned_dynamic_partial <6>[ 130.748053] ok 17 test_packed_assigned_dynamic_partial <6>[ 130.749511] ok 18 test_small_hole_static_partial <6>[ 130.751172] ok 19 test_big_hole_static_partial <6>[ 130.752866] ok 20 test_trailing_hole_static_partial <6>[ 130.754696] ok 21 test_packed_static_partial <6>[ 130.756471] ok 22 test_small_hole_static_all <6>[ 130.758884] ok 23 test_big_hole_static_all <6>[ 130.760996] ok 24 test_trailing_hole_static_all <6>[ 130.762546] ok 25 test_packed_static_all <6>[ 130.764308] ok 26 test_small_hole_dynamic_all <6>[ 130.766256] ok 27 test_big_hole_dynamic_all <6>[ 130.768044] ok 28 test_trailing_hole_dynamic_all <6>[ 130.769540] ok 29 test_packed_dynamic_all <6>[ 130.771483] ok 30 test_small_hole_runtime_partial <6>[ 130.773379] ok 31 test_big_hole_runtime_partial <6>[ 130.775195] ok 32 test_trailing_hole_runtime_partial <6>[ 130.777111] ok 33 test_packed_runtime_partial <6>[ 130.779014] ok 34 test_small_hole_runtime_all <6>[ 130.780831] ok 35 test_big_hole_runtime_all <6>[ 130.782406] ok 36 test_trailing_hole_runtime_all <6>[ 130.784025] ok 37 test_packed_runtime_all <6>[ 130.785491] ok 38 test_small_hole_assigned_static_partial <6>[ 130.787525] ok 39 test_big_hole_assigned_static_partial <6>[ 130.789394] ok 40 test_trailing_hole_assigned_static_partial <6>[ 130.791103] ok 41 test_packed_assigned_static_partial <6>[ 130.792749] ok 42 test_small_hole_assigned_static_all <6>[ 130.794322] ok 43 test_big_hole_assigned_static_all <6>[ 130.795924] ok 44 test_trailing_hole_assigned_static_all <6>[ 130.797382] ok 45 test_packed_assigned_static_all <6>[ 130.799233] ok 46 test_small_hole_assigned_dynamic_all <6>[ 130.807098] ok 47 test_big_hole_assigned_dynamic_all <6>[ 130.808981] ok 48 test_trailing_hole_assigned_dynamic_all <6>[ 130.810803] ok 49 test_packed_assigned_dynamic_all <6>[ 130.812489] ok 50 test_small_hole_assigned_copy # SKIP XFAIL uninit bytes: 3 <6>[ 130.814482] ok 51 test_big_hole_assigned_copy # SKIP XFAIL uninit bytes: 124 <6>[ 130.816816] ok 52 test_trailing_hole_assigned_copy # SKIP XFAIL uninit bytes: 7 <6>[ 130.818450] ok 53 test_packed_assigned_copy <6>[ 130.820026] ok 54 test_u8_none <6>[ 130.822026] ok 55 test_u16_none <6>[ 130.824362] ok 56 test_u32_none <6>[ 130.826003] ok 57 test_u64_none <6>[ 130.827431] ok 58 test_char_array_none <6>[ 130.829049] ok 59 test_switch_1_none # SKIP XFAIL uninit bytes: 80 <6>[ 130.830898] ok 60 test_switch_2_none # SKIP XFAIL uninit bytes: 80 <6>[ 130.832687] ok 61 test_small_hole_none <6>[ 130.834143] ok 62 test_big_hole_none <6>[ 130.835879] ok 63 test_trailing_hole_none <6>[ 130.837956] ok 64 test_packed_none <6>[ 130.839665] ok 65 test_user <6>[ 130.839880] # stackinit: pass:60 fail:0 skip:5 total:65 <6>[ 130.840021] # Totals: pass:60 fail:0 skip:5 total:65 <6>[ 130.840271] ok 48 stackinit <6>[ 130.841002] KTAP version 1 <6>[ 130.841132] # Subtest: fortify <6>[ 130.841268] # module: fortify_kunit <6>[ 130.841314] 1..26 <6>[ 130.843140] ok 1 fortify_test_known_sizes # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.844207] ok 2 fortify_test_control_flow_split # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.845596] ok 3 fortify_test_alloc_size_kmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.847282] ok 4 fortify_test_alloc_size_kmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.848899] ok 5 fortify_test_alloc_size_vmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.850458] ok 6 fortify_test_alloc_size_vmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.852047] ok 7 fortify_test_alloc_size_kvmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.853502] ok 8 fortify_test_alloc_size_kvmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.855474] ok 9 fortify_test_alloc_size_devm_kmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.858574] ok 10 fortify_test_alloc_size_devm_kmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.859903] ok 11 fortify_test_realloc_size # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.861464] ok 12 fortify_test_strlen # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.862858] ok 13 fortify_test_strnlen # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.864180] ok 14 fortify_test_strcpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.865816] ok 15 fortify_test_strncpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.867395] ok 16 fortify_test_strscpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.868972] ok 17 fortify_test_strcat # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.870423] ok 18 fortify_test_strncat # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.872027] ok 19 fortify_test_strlcat # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.873367] ok 20 fortify_test_memcpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.875099] ok 21 fortify_test_memmove # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.876488] ok 22 fortify_test_memscan # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.877961] ok 23 fortify_test_memchr # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.879238] ok 24 fortify_test_memchr_inv # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.880702] ok 25 fortify_test_memcmp # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.882114] ok 26 fortify_test_kmemdup # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 130.882420] # fortify: pass:0 fail:0 skip:26 total:26 <6>[ 130.882817] # Totals: pass:0 fail:0 skip:26 total:26 <6>[ 130.883030] ok 49 fortify # SKIP <6>[ 130.883561] KTAP version 1 <6>[ 130.883987] # Subtest: siphash <6>[ 130.884129] # module: siphash_kunit <6>[ 130.884177] 1..1 <6>[ 130.887836] ok 1 siphash_test <6>[ 130.887909] ok 50 siphash <6>[ 130.888424] KTAP version 1 <6>[ 130.888593] # Subtest: usercopy <6>[ 130.888856] # module: usercopy_kunit <6>[ 130.888906] 1..4 <6>[ 130.900837] ok 1 usercopy_test_valid <6>[ 130.904391] ok 2 usercopy_test_invalid <6>[ 131.003483] ok 3 usercopy_test_check_nonzero_user <6>[ 131.006769] ok 4 usercopy_test_copy_struct_from_user <6>[ 131.007056] # usercopy: pass:4 fail:0 skip:0 total:4 <6>[ 131.007245] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 131.007418] ok 51 usercopy <6>[ 131.008158] KTAP version 1 <6>[ 131.008331] # Subtest: drm_test_pick_cmdline <6>[ 131.008531] # module: drm <6>[ 131.008579] 1..2 <4>[ 131.015279] ------------[ cut here ]------------ <4>[ 131.015490] WARNING: CPU: 1 PID: 1164 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0 <4>[ 131.015544] Modules linked in: <4>[ 131.015578] CPU: 1 UID: 0 PID: 1164 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 131.015679] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 131.015694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 131.015709] RIP: 0010:__drm_connector_init+0xcdf/0x11c0 <4>[ 131.015738] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00 <4>[ 131.015760] RSP: 0000:ffff888107f17c38 EFLAGS: 00000246 <4>[ 131.015780] RAX: dffffc0000000000 RBX: ffffffff8c7b6b20 RCX: 0000000000000000 <4>[ 131.015794] RDX: 1ffffffff18f1bfe RSI: ffff888107dc8010 RDI: ffffffff8c78dff0 <4>[ 131.015807] RBP: ffff888107f17cb0 R08: 0000000000000000 R09: ffffffff8c7a2ba0 <4>[ 131.015820] R10: 0000000000000003 R11: ffffffff884044aa R12: ffff888107dc8010 <4>[ 131.015833] R13: ffff888100d75000 R14: 0000000000000000 R15: ffffffff8c78dfa0 <4>[ 131.015846] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 131.015860] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 131.015874] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 131.015886] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 131.015899] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 131.015912] Call Trace: <4>[ 131.015924] <4>[ 131.015943] ? show_regs+0x68/0x80 <4>[ 131.015968] ? __warn+0xd5/0x260 <4>[ 131.015985] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.016006] ? report_bug+0x278/0x2e0 <4>[ 131.016031] ? handle_bug+0x7b/0xa0 <4>[ 131.016049] ? exc_invalid_op+0x1c/0x50 <4>[ 131.016067] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 131.016088] ? ret_from_fork_asm+0x1a/0x30 <4>[ 131.016111] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.016130] ? __drmm_add_action+0x1a4/0x280 <4>[ 131.016150] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.016169] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.016191] drmm_connector_init+0xdc/0x170 <4>[ 131.016210] ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80 <4>[ 131.016235] drm_client_modeset_test_init+0x336/0x730 <4>[ 131.016258] ? __pfx_drm_client_modeset_test_init+0x10/0x10 <4>[ 131.016281] ? __schedule+0xbca/0x2590 <4>[ 131.016304] kunit_try_run_case+0x176/0x490 <4>[ 131.016327] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.016346] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 131.016366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 131.016385] ? __kthread_parkme+0x82/0x160 <4>[ 131.016405] ? preempt_count_sub+0x50/0x80 <4>[ 131.016429] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.016448] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 131.016467] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 131.016487] kthread+0x257/0x310 <4>[ 131.016505] ? __pfx_kthread+0x10/0x10 <4>[ 131.016524] ret_from_fork+0x41/0x80 <4>[ 131.016542] ? __pfx_kthread+0x10/0x10 <4>[ 131.016561] ret_from_fork_asm+0x1a/0x30 <4>[ 131.016587] <4>[ 131.016596] ---[ end trace 0000000000000000 ]--- <6>[ 131.043282] ok 1 drm_test_pick_cmdline_res_1920_1080_60 <6>[ 131.043453] KTAP version 1 <6>[ 131.044035] # Subtest: drm_test_pick_cmdline_named <4>[ 131.047230] ------------[ cut here ]------------ <4>[ 131.047560] WARNING: CPU: 0 PID: 1166 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0 <4>[ 131.047668] Modules linked in: <4>[ 131.047707] CPU: 0 UID: 0 PID: 1166 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 131.047744] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 131.047754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 131.047768] RIP: 0010:__drm_connector_init+0xcdf/0x11c0 <4>[ 131.047795] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00 <4>[ 131.047816] RSP: 0000:ffff888107337c38 EFLAGS: 00000246 <4>[ 131.047836] RAX: dffffc0000000000 RBX: ffffffff8c7b6b20 RCX: 0000000000000000 <4>[ 131.047850] RDX: 1ffffffff18f1bfe RSI: ffff888107154010 RDI: ffffffff8c78dff0 <4>[ 131.047863] RBP: ffff888107337cb0 R08: 0000000000000000 R09: ffffffff8c7a2ba0 <4>[ 131.047876] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888107154010 <4>[ 131.047888] R13: ffff888100d5f000 R14: 0000000000000000 R15: ffffffff8c78dfa0 <4>[ 131.047904] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 131.047927] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 131.047940] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 131.047954] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 131.047966] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 131.047979] Call Trace: <4>[ 131.047990] <4>[ 131.048009] ? show_regs+0x68/0x80 <4>[ 131.048036] ? __warn+0xd5/0x260 <4>[ 131.048055] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.048076] ? report_bug+0x278/0x2e0 <4>[ 131.048103] ? handle_bug+0x7b/0xa0 <4>[ 131.048122] ? exc_invalid_op+0x1c/0x50 <4>[ 131.048141] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 131.048168] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.048189] ? __drmm_add_action+0x1a4/0x280 <4>[ 131.048209] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.048229] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.048253] drmm_connector_init+0xdc/0x170 <4>[ 131.048273] ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80 <4>[ 131.048299] drm_client_modeset_test_init+0x336/0x730 <4>[ 131.048323] ? __pfx_drm_client_modeset_test_init+0x10/0x10 <4>[ 131.048347] ? __schedule+0xbca/0x2590 <4>[ 131.048371] kunit_try_run_case+0x176/0x490 <4>[ 131.048395] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.048415] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 131.048436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 131.048458] ? __kthread_parkme+0x82/0x160 <4>[ 131.048488] ? preempt_count_sub+0x50/0x80 <4>[ 131.048513] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.048533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 131.048554] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 131.048576] kthread+0x257/0x310 <4>[ 131.048596] ? __pfx_kthread+0x10/0x10 <4>[ 131.048672] ret_from_fork+0x41/0x80 <4>[ 131.048700] ? __pfx_kthread+0x10/0x10 <4>[ 131.048722] ret_from_fork_asm+0x1a/0x30 <4>[ 131.048751] <4>[ 131.048762] ---[ end trace 0000000000000000 ]--- <6>[ 131.064596] ok 1 NTSC <4>[ 131.067673] ------------[ cut here ]------------ <4>[ 131.067964] WARNING: CPU: 1 PID: 1168 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0 <4>[ 131.068022] Modules linked in: <4>[ 131.068056] CPU: 1 UID: 0 PID: 1168 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 131.068091] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 131.068102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 131.068117] RIP: 0010:__drm_connector_init+0xcdf/0x11c0 <4>[ 131.068157] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00 <4>[ 131.068186] RSP: 0000:ffff8881079efc38 EFLAGS: 00000246 <4>[ 131.068208] RAX: dffffc0000000000 RBX: ffffffff8c7b6b20 RCX: 0000000000000000 <4>[ 131.068221] RDX: 1ffffffff18f1bfe RSI: ffff8881030ba010 RDI: ffffffff8c78dff0 <4>[ 131.068234] RBP: ffff8881079efcb0 R08: 0000000000000000 R09: ffffffff8c7a2ba0 <4>[ 131.068246] R10: 0000000000000003 R11: 0000000000000000 R12: ffff8881030ba010 <4>[ 131.068258] R13: ffff888100d73000 R14: 0000000000000000 R15: ffffffff8c78dfa0 <4>[ 131.068272] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 131.068286] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 131.068299] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 131.068311] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 131.068323] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 131.068336] Call Trace: <4>[ 131.068347] <4>[ 131.068365] ? show_regs+0x68/0x80 <4>[ 131.068389] ? __warn+0xd5/0x260 <4>[ 131.068408] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.068432] ? report_bug+0x278/0x2e0 <4>[ 131.068467] ? handle_bug+0x7b/0xa0 <4>[ 131.068484] ? exc_invalid_op+0x1c/0x50 <4>[ 131.068503] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 131.068532] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.068555] ? __drmm_add_action+0x1a4/0x280 <4>[ 131.068576] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.068594] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.068655] drmm_connector_init+0xdc/0x170 <4>[ 131.068683] ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80 <4>[ 131.068712] drm_client_modeset_test_init+0x336/0x730 <4>[ 131.068734] ? __pfx_drm_client_modeset_test_init+0x10/0x10 <4>[ 131.068757] ? __schedule+0xbca/0x2590 <4>[ 131.068781] kunit_try_run_case+0x176/0x490 <4>[ 131.068813] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.068836] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 131.068871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 131.068893] ? __kthread_parkme+0x82/0x160 <4>[ 131.068922] ? preempt_count_sub+0x50/0x80 <4>[ 131.068954] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.068978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 131.069003] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 131.069024] kthread+0x257/0x310 <4>[ 131.069043] ? __pfx_kthread+0x10/0x10 <4>[ 131.069063] ret_from_fork+0x41/0x80 <4>[ 131.069082] ? __pfx_kthread+0x10/0x10 <4>[ 131.069111] ret_from_fork_asm+0x1a/0x30 <4>[ 131.069145] <4>[ 131.069155] ---[ end trace 0000000000000000 ]--- <6>[ 131.083682] ok 2 NTSC-J <4>[ 131.086475] ------------[ cut here ]------------ <4>[ 131.087000] WARNING: CPU: 1 PID: 1170 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0 <4>[ 131.087052] Modules linked in: <4>[ 131.087085] CPU: 1 UID: 0 PID: 1170 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 131.087119] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 131.087130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 131.087144] RIP: 0010:__drm_connector_init+0xcdf/0x11c0 <4>[ 131.087168] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00 <4>[ 131.087190] RSP: 0000:ffff888107337c38 EFLAGS: 00000246 <4>[ 131.087209] RAX: dffffc0000000000 RBX: ffffffff8c7b6b20 RCX: 0000000000000000 <4>[ 131.087226] RDX: 1ffffffff18f1bfe RSI: ffff888106f8c010 RDI: ffffffff8c78dff0 <4>[ 131.087240] RBP: ffff888107337cb0 R08: 0000000000000000 R09: ffffffff8c7a2ba0 <4>[ 131.087253] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888106f8c010 <4>[ 131.087265] R13: ffff888100d82000 R14: 0000000000000000 R15: ffffffff8c78dfa0 <4>[ 131.087277] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 131.087292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 131.087305] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 131.087317] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 131.087330] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 131.087346] Call Trace: <4>[ 131.087358] <4>[ 131.087375] ? show_regs+0x68/0x80 <4>[ 131.087402] ? __warn+0xd5/0x260 <4>[ 131.087420] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.087443] ? report_bug+0x278/0x2e0 <4>[ 131.087470] ? handle_bug+0x7b/0xa0 <4>[ 131.087488] ? exc_invalid_op+0x1c/0x50 <4>[ 131.087506] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 131.087532] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.087552] ? __drmm_add_action+0x1a4/0x280 <4>[ 131.087571] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.087590] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.087611] drmm_connector_init+0xdc/0x170 <4>[ 131.087688] ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80 <4>[ 131.087718] drm_client_modeset_test_init+0x336/0x730 <4>[ 131.087742] ? __pfx_drm_client_modeset_test_init+0x10/0x10 <4>[ 131.087766] ? __schedule+0xbca/0x2590 <4>[ 131.087800] kunit_try_run_case+0x176/0x490 <4>[ 131.087837] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.087856] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 131.087877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 131.087896] ? __kthread_parkme+0x82/0x160 <4>[ 131.087917] ? preempt_count_sub+0x50/0x80 <4>[ 131.087941] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.087959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 131.087979] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 131.088001] kthread+0x257/0x310 <4>[ 131.088021] ? __pfx_kthread+0x10/0x10 <4>[ 131.088041] ret_from_fork+0x41/0x80 <4>[ 131.088062] ? __pfx_kthread+0x10/0x10 <4>[ 131.088082] ret_from_fork_asm+0x1a/0x30 <4>[ 131.088110] <4>[ 131.088121] ---[ end trace 0000000000000000 ]--- <6>[ 131.103009] ok 3 PAL <4>[ 131.105938] ------------[ cut here ]------------ <4>[ 131.106244] WARNING: CPU: 0 PID: 1172 at drivers/gpu/drm/drm_connector.c:232 __drm_connector_init+0xcdf/0x11c0 <4>[ 131.106295] Modules linked in: <4>[ 131.106344] CPU: 0 UID: 0 PID: 1172 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 131.106405] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 131.106428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 131.106454] RIP: 0010:__drm_connector_init+0xcdf/0x11c0 <4>[ 131.106495] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ce 03 00 00 49 c7 84 24 78 07 00 00 00 00 00 00 e9 9e f4 ff ff 90 <0f> 0b 90 e9 6d f4 ff ff 49 8d bd 40 04 00 00 48 b8 00 00 00 00 00 <4>[ 131.106533] RSP: 0000:ffff888107f17c38 EFLAGS: 00000246 <4>[ 131.106578] RAX: dffffc0000000000 RBX: ffffffff8c7b6b20 RCX: 0000000000000000 <4>[ 131.106610] RDX: 1ffffffff18f1bfe RSI: ffff888106f9e010 RDI: ffffffff8c78dff0 <4>[ 131.106692] RBP: ffff888107f17cb0 R08: 0000000000000000 R09: ffffffff8c7a2ba0 <4>[ 131.106735] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888106f9e010 <4>[ 131.106762] R13: ffff888100d5d000 R14: 0000000000000000 R15: ffffffff8c78dfa0 <4>[ 131.106789] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 131.106810] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 131.106841] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 131.106875] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 131.106889] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 131.106902] Call Trace: <4>[ 131.106913] <4>[ 131.106938] ? show_regs+0x68/0x80 <4>[ 131.106983] ? __warn+0xd5/0x260 <4>[ 131.107018] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.107059] ? report_bug+0x278/0x2e0 <4>[ 131.107105] ? handle_bug+0x7b/0xa0 <4>[ 131.107148] ? exc_invalid_op+0x1c/0x50 <4>[ 131.107185] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 131.107239] ? __drm_connector_init+0xcdf/0x11c0 <4>[ 131.107284] ? __drmm_add_action+0x1a4/0x280 <4>[ 131.107324] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.107359] ? __pfx_drm_mode_config_init_release+0x10/0x10 <4>[ 131.107403] drmm_connector_init+0xdc/0x170 <4>[ 131.107448] ? __drm_kunit_helper_alloc_drm_device_with_driver+0x5d/0x80 <4>[ 131.107507] drm_client_modeset_test_init+0x336/0x730 <4>[ 131.107557] ? __pfx_drm_client_modeset_test_init+0x10/0x10 <4>[ 131.107612] ? __schedule+0xbca/0x2590 <4>[ 131.107753] kunit_try_run_case+0x176/0x490 <4>[ 131.107804] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.107849] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 131.107891] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 131.107942] ? __kthread_parkme+0x82/0x160 <4>[ 131.107989] ? preempt_count_sub+0x50/0x80 <4>[ 131.108048] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 131.108092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 131.108146] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 131.108185] kthread+0x257/0x310 <4>[ 131.108225] ? __pfx_kthread+0x10/0x10 <4>[ 131.108269] ret_from_fork+0x41/0x80 <4>[ 131.108314] ? __pfx_kthread+0x10/0x10 <4>[ 131.108364] ret_from_fork_asm+0x1a/0x30 <4>[ 131.108424] <4>[ 131.108445] ---[ end trace 0000000000000000 ]--- <6>[ 131.122578] ok 4 PAL-M <6>[ 131.122763] # drm_test_pick_cmdline_named: pass:4 fail:0 skip:0 total:4 <6>[ 131.122949] ok 2 drm_test_pick_cmdline_named <6>[ 131.123198] # drm_test_pick_cmdline: pass:2 fail:0 skip:0 total:2 <6>[ 131.123383] # Totals: pass:5 fail:0 skip:0 total:5 <6>[ 131.123592] ok 52 drm_test_pick_cmdline <6>[ 131.124417] # drm_buddy: Testing DRM buddy manager, with random_seed=0xa89471a3 <6>[ 131.124784] KTAP version 1 <6>[ 131.124909] # Subtest: drm_buddy <6>[ 131.125045] # module: drm_buddy_test <6>[ 131.125094] 1..7 <6>[ 131.129070] ok 1 drm_test_buddy_alloc_limit <6>[ 131.131116] ok 2 drm_test_buddy_alloc_optimistic <6>[ 131.134083] ok 3 drm_test_buddy_alloc_pessimistic <6>[ 131.136440] ok 4 drm_test_buddy_alloc_pathological <6>[ 131.140508] ok 5 drm_test_buddy_alloc_contiguous <6>[ 131.273056] ok 6 drm_test_buddy_alloc_clear <6>[ 131.274891] # drm_test_buddy_alloc_range_bias: mm_size=7340032, ps=1048576 <6>[ 131.282471] ok 7 drm_test_buddy_alloc_range_bias <6>[ 131.282557] # drm_buddy: pass:7 fail:0 skip:0 total:7 <6>[ 131.282969] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 131.283388] ok 53 drm_buddy <6>[ 131.284837] KTAP version 1 <6>[ 131.284965] # Subtest: drm_cmdline_parser <6>[ 131.285107] # module: drm_cmdline_parser_test <6>[ 131.285156] 1..40 <6>[ 131.288312] ok 1 drm_test_cmdline_force_d_only <6>[ 131.291513] ok 2 drm_test_cmdline_force_D_only_dvi <6>[ 131.294834] ok 3 drm_test_cmdline_force_D_only_hdmi <6>[ 131.297910] ok 4 drm_test_cmdline_force_D_only_not_digital <6>[ 131.300204] ok 5 drm_test_cmdline_force_e_only <6>[ 131.303329] ok 6 drm_test_cmdline_res <6>[ 131.306153] ok 7 drm_test_cmdline_res_vesa <6>[ 131.309232] ok 8 drm_test_cmdline_res_vesa_rblank <6>[ 131.311846] ok 9 drm_test_cmdline_res_rblank <6>[ 131.315248] ok 10 drm_test_cmdline_res_bpp <6>[ 131.317782] ok 11 drm_test_cmdline_res_refresh <6>[ 131.320369] ok 12 drm_test_cmdline_res_bpp_refresh <6>[ 131.323216] ok 13 drm_test_cmdline_res_bpp_refresh_interlaced <6>[ 131.326160] ok 14 drm_test_cmdline_res_bpp_refresh_margins <6>[ 131.329138] ok 15 drm_test_cmdline_res_bpp_refresh_force_off <6>[ 131.332376] ok 16 drm_test_cmdline_res_bpp_refresh_force_on <6>[ 131.338038] ok 17 drm_test_cmdline_res_bpp_refresh_force_on_analog <6>[ 131.340296] ok 18 drm_test_cmdline_res_bpp_refresh_force_on_digital <6>[ 131.343354] ok 19 drm_test_cmdline_res_bpp_refresh_interlaced_margins_force_on <6>[ 131.345981] ok 20 drm_test_cmdline_res_margins_force_on <6>[ 131.348498] ok 21 drm_test_cmdline_res_vesa_margins <6>[ 131.350945] ok 22 drm_test_cmdline_name <6>[ 131.352774] ok 23 drm_test_cmdline_name_bpp <6>[ 131.354766] ok 24 drm_test_cmdline_name_option <6>[ 131.357048] ok 25 drm_test_cmdline_name_bpp_option <6>[ 131.359233] ok 26 drm_test_cmdline_rotate_0 <6>[ 131.361443] ok 27 drm_test_cmdline_rotate_90 <6>[ 131.364106] ok 28 drm_test_cmdline_rotate_180 <6>[ 131.366537] ok 29 drm_test_cmdline_rotate_270 <6>[ 131.369007] ok 30 drm_test_cmdline_hmirror <6>[ 131.371463] ok 31 drm_test_cmdline_vmirror <6>[ 131.374778] ok 32 drm_test_cmdline_margin_options <6>[ 131.377161] ok 33 drm_test_cmdline_multiple_options <6>[ 131.380058] ok 34 drm_test_cmdline_bpp_extra_and_option <6>[ 131.382069] ok 35 drm_test_cmdline_extra_and_option <6>[ 131.384262] ok 36 drm_test_cmdline_freestanding_options <6>[ 131.385933] ok 37 drm_test_cmdline_freestanding_force_e_and_options <6>[ 131.387553] ok 38 drm_test_cmdline_panel_orientation <6>[ 131.388106] KTAP version 1 <6>[ 131.388526] # Subtest: drm_test_cmdline_invalid <6>[ 131.389698] ok 1 margin_only <6>[ 131.391224] ok 2 interlace_only <6>[ 131.392431] ok 3 res_missing_x <6>[ 131.393947] ok 4 res_missing_y <6>[ 131.395484] ok 5 res_bad_y <6>[ 131.396950] ok 6 res_missing_y_bpp <6>[ 131.398336] ok 7 res_bad_bpp <6>[ 131.399899] ok 8 res_bad_refresh <6>[ 131.401348] ok 9 res_bpp_refresh_force_on_off <6>[ 131.402918] ok 10 res_invalid_mode <6>[ 131.404232] ok 11 res_bpp_wrong_place_mode <6>[ 131.405727] ok 12 name_bpp_refresh <6>[ 131.407177] ok 13 name_refresh <6>[ 131.408494] ok 14 name_refresh_wrong_mode <6>[ 131.410206] ok 15 name_refresh_invalid_mode <6>[ 131.411589] ok 16 rotate_multiple <6>[ 131.413237] ok 17 rotate_invalid_val <6>[ 131.414573] ok 18 rotate_truncated <6>[ 131.416151] ok 19 invalid_option <6>[ 131.417865] ok 20 invalid_tv_option <6>[ 131.419463] ok 21 truncated_tv_option <6>[ 131.420138] # drm_test_cmdline_invalid: pass:21 fail:0 skip:0 total:21 <6>[ 131.420338] ok 39 drm_test_cmdline_invalid <6>[ 131.420813] KTAP version 1 <6>[ 131.421243] # Subtest: drm_test_cmdline_tv_options <6>[ 131.424411] ok 1 NTSC <6>[ 131.425754] ok 2 NTSC_443 <6>[ 131.427055] ok 3 NTSC_J <6>[ 131.428252] ok 4 PAL <6>[ 131.429602] ok 5 PAL_M <6>[ 131.431063] ok 6 PAL_N <6>[ 131.432324] ok 7 SECAM <6>[ 131.433804] ok 8 MONO_525 <6>[ 131.435258] ok 9 MONO_625 <6>[ 131.435445] # drm_test_cmdline_tv_options: pass:9 fail:0 skip:0 total:9 <6>[ 131.435615] ok 40 drm_test_cmdline_tv_options <6>[ 131.435950] # drm_cmdline_parser: pass:40 fail:0 skip:0 total:40 <6>[ 131.436142] # Totals: pass:68 fail:0 skip:0 total:68 <6>[ 131.436362] ok 54 drm_cmdline_parser <6>[ 131.437450] KTAP version 1 <6>[ 131.437710] # Subtest: drmm_connector_hdmi_init <6>[ 131.437920] # module: drm_connector_test <6>[ 131.437971] 1..19 <6>[ 131.447828] ok 1 drm_test_connector_hdmi_init_valid <6>[ 131.455590] ok 2 drm_test_connector_hdmi_init_bpc_8 <6>[ 131.463171] ok 3 drm_test_connector_hdmi_init_bpc_10 <6>[ 131.471171] ok 4 drm_test_connector_hdmi_init_bpc_12 <6>[ 131.482343] ok 5 drm_test_connector_hdmi_init_bpc_invalid <6>[ 131.491402] ok 6 drm_test_connector_hdmi_init_bpc_null <6>[ 131.501200] ok 7 drm_test_connector_hdmi_init_formats_empty <6>[ 131.509465] ok 8 drm_test_connector_hdmi_init_formats_no_rgb <6>[ 131.517878] ok 9 drm_test_connector_hdmi_init_null_ddc <6>[ 131.524737] ok 10 drm_test_connector_hdmi_init_null_product <6>[ 131.532923] ok 11 drm_test_connector_hdmi_init_null_vendor <6>[ 131.541975] ok 12 drm_test_connector_hdmi_init_product_length_exact <6>[ 131.550217] ok 13 drm_test_connector_hdmi_init_product_length_too_long <6>[ 131.559138] ok 14 drm_test_connector_hdmi_init_product_valid <6>[ 131.566140] ok 15 drm_test_connector_hdmi_init_vendor_length_exact <6>[ 131.573192] ok 16 drm_test_connector_hdmi_init_vendor_length_too_long <6>[ 131.580560] ok 17 drm_test_connector_hdmi_init_vendor_valid <6>[ 131.581247] KTAP version 1 <6>[ 131.581563] # Subtest: drm_test_connector_hdmi_init_type_valid <6>[ 131.589864] ok 1 HDMI-A <6>[ 131.598456] ok 2 HDMI-B <6>[ 131.598936] # drm_test_connector_hdmi_init_type_valid: pass:2 fail:0 skip:0 total:2 <6>[ 131.599097] ok 18 drm_test_connector_hdmi_init_type_valid <6>[ 131.599418] KTAP version 1 <6>[ 131.599876] # Subtest: drm_test_connector_hdmi_init_type_invalid <6>[ 131.606434] ok 1 Unknown <6>[ 131.613787] ok 2 VGA <6>[ 131.620146] ok 3 DVI-I <6>[ 131.626793] ok 4 DVI-D <6>[ 131.633912] ok 5 DVI-A <6>[ 131.641020] ok 6 Composite <6>[ 131.648442] ok 7 SVIDEO <6>[ 131.656218] ok 8 LVDS <6>[ 131.663588] ok 9 Component <6>[ 131.670114] ok 10 DIN <6>[ 131.677205] ok 11 DP <6>[ 131.683972] ok 12 TV <6>[ 131.691926] ok 13 eDP <6>[ 131.699457] ok 14 Virtual <6>[ 131.706943] ok 15 DSI <6>[ 131.715816] ok 16 DPI <6>[ 131.725086] ok 17 Writeback <6>[ 131.731989] ok 18 SPI <6>[ 131.738502] ok 19 USB <6>[ 131.738884] # drm_test_connector_hdmi_init_type_invalid: pass:19 fail:0 skip:0 total:19 <6>[ 131.739042] ok 19 drm_test_connector_hdmi_init_type_invalid <6>[ 131.739310] # drmm_connector_hdmi_init: pass:19 fail:0 skip:0 total:19 <6>[ 131.739549] # Totals: pass:38 fail:0 skip:0 total:38 <6>[ 131.739863] ok 55 drmm_connector_hdmi_init <6>[ 131.740444] KTAP version 1 <6>[ 131.740567] # Subtest: drmm_connector_init <6>[ 131.740804] # module: drm_connector_test <6>[ 131.740862] 1..3 <6>[ 131.747941] ok 1 drm_test_drmm_connector_init <6>[ 131.755568] ok 2 drm_test_drmm_connector_init_null_ddc <6>[ 131.755964] KTAP version 1 <6>[ 131.756254] # Subtest: drm_test_drmm_connector_init_type_valid <6>[ 131.762949] ok 1 Unknown <6>[ 131.770310] ok 2 VGA <6>[ 131.777076] ok 3 DVI-I <6>[ 131.783213] ok 4 DVI-D <6>[ 131.790029] ok 5 DVI-A <6>[ 131.796790] ok 6 Composite <6>[ 131.802992] ok 7 SVIDEO <6>[ 131.809386] ok 8 LVDS <6>[ 131.815817] ok 9 Component <6>[ 131.822203] ok 10 DIN <6>[ 131.828835] ok 11 DP <6>[ 131.835179] ok 12 HDMI-A <6>[ 131.841531] ok 13 HDMI-B <6>[ 131.848143] ok 14 TV <6>[ 131.856740] ok 15 eDP <6>[ 131.864551] ok 16 Virtual <6>[ 131.871048] ok 17 DSI <6>[ 131.877960] ok 18 DPI <6>[ 131.885925] ok 19 Writeback <6>[ 131.893365] ok 20 SPI <6>[ 131.901193] ok 21 USB <6>[ 131.901542] # drm_test_drmm_connector_init_type_valid: pass:21 fail:0 skip:0 total:21 <6>[ 131.901840] ok 3 drm_test_drmm_connector_init_type_valid <6>[ 131.902126] # drmm_connector_init: pass:3 fail:0 skip:0 total:3 <6>[ 131.902338] # Totals: pass:23 fail:0 skip:0 total:23 <6>[ 131.902542] ok 56 drmm_connector_init <6>[ 131.903249] KTAP version 1 <6>[ 131.903378] # Subtest: drm_connector_attach_broadcast_rgb_property <6>[ 131.903586] # module: drm_connector_test <6>[ 131.903681] 1..2 <6>[ 131.911461] ok 1 drm_test_drm_connector_attach_broadcast_rgb_property <6>[ 131.918544] ok 2 drm_test_drm_connector_attach_broadcast_rgb_property_hdmi_connector <6>[ 131.919049] # drm_connector_attach_broadcast_rgb_property: pass:2 fail:0 skip:0 total:2 <6>[ 131.919432] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 131.919807] ok 57 drm_connector_attach_broadcast_rgb_property <6>[ 131.920326] KTAP version 1 <6>[ 131.920453] # Subtest: drm_get_tv_mode_from_name <6>[ 131.920605] # module: drm_connector_test <6>[ 131.920735] 1..2 <6>[ 131.920997] KTAP version 1 <6>[ 131.921145] # Subtest: drm_test_get_tv_mode_from_name_valid <6>[ 131.922996] ok 1 NTSC <6>[ 131.924297] ok 2 NTSC-443 <6>[ 131.925595] ok 3 NTSC-J <6>[ 131.926833] ok 4 PAL <6>[ 131.928104] ok 5 PAL-M <6>[ 131.929469] ok 6 PAL-N <6>[ 131.930770] ok 7 SECAM <6>[ 131.932030] ok 8 Mono <6>[ 131.932268] # drm_test_get_tv_mode_from_name_valid: pass:8 fail:0 skip:0 total:8 <6>[ 131.932551] ok 1 drm_test_get_tv_mode_from_name_valid <6>[ 131.934364] ok 2 drm_test_get_tv_mode_from_name_truncated <6>[ 131.934588] # drm_get_tv_mode_from_name: pass:2 fail:0 skip:0 total:2 <6>[ 131.935075] # Totals: pass:9 fail:0 skip:0 total:9 <6>[ 131.935293] ok 58 drm_get_tv_mode_from_name <6>[ 131.935925] KTAP version 1 <6>[ 131.936050] # Subtest: drm_test_connector_hdmi_compute_mode_clock <6>[ 131.936234] # module: drm_connector_test <6>[ 131.936282] 1..12 <6>[ 131.944867] ok 1 drm_test_drm_hdmi_compute_mode_clock_rgb <6>[ 131.957291] ok 2 drm_test_drm_hdmi_compute_mode_clock_rgb_10bpc <6>[ 131.965908] ok 3 drm_test_drm_hdmi_compute_mode_clock_rgb_10bpc_vic_1 <6>[ 131.980064] ok 4 drm_test_drm_hdmi_compute_mode_clock_rgb_12bpc <6>[ 131.994343] ok 5 drm_test_drm_hdmi_compute_mode_clock_rgb_12bpc_vic_1 <6>[ 132.009320] ok 6 drm_test_drm_hdmi_compute_mode_clock_rgb_double <6>[ 132.010005] KTAP version 1 <6>[ 132.010589] # Subtest: drm_test_connector_hdmi_compute_mode_clock_yuv420_valid <6>[ 132.022225] ok 1 VIC 96 <6>[ 132.035130] ok 2 VIC 97 <6>[ 132.048416] ok 3 VIC 101 <6>[ 132.061698] ok 4 VIC 102 <6>[ 132.076428] ok 5 VIC 106 <6>[ 132.089480] ok 6 VIC 107 <6>[ 132.090150] # drm_test_connector_hdmi_compute_mode_clock_yuv420_valid: pass:6 fail:0 skip:0 total:6 <6>[ 132.090499] ok 7 drm_test_connector_hdmi_compute_mode_clock_yuv420_valid <6>[ 132.105396] ok 8 drm_test_connector_hdmi_compute_mode_clock_yuv420_10_bpc <6>[ 132.118553] ok 9 drm_test_connector_hdmi_compute_mode_clock_yuv420_12_bpc <6>[ 132.131014] ok 10 drm_test_connector_hdmi_compute_mode_clock_yuv422_8_bpc <6>[ 132.142984] ok 11 drm_test_connector_hdmi_compute_mode_clock_yuv422_10_bpc <6>[ 132.156035] ok 12 drm_test_connector_hdmi_compute_mode_clock_yuv422_12_bpc <6>[ 132.156550] # drm_test_connector_hdmi_compute_mode_clock: pass:12 fail:0 skip:0 total:12 <6>[ 132.157305] # Totals: pass:17 fail:0 skip:0 total:17 <6>[ 132.158024] ok 59 drm_test_connector_hdmi_compute_mode_clock <6>[ 132.159691] KTAP version 1 <6>[ 132.159928] # Subtest: drm_hdmi_connector_get_broadcast_rgb_name <6>[ 132.160278] # module: drm_connector_test <6>[ 132.160356] 1..2 <6>[ 132.160956] KTAP version 1 <6>[ 132.161232] # Subtest: drm_test_drm_hdmi_connector_get_broadcast_rgb_name <6>[ 132.163325] ok 1 Automatic <6>[ 132.165690] ok 2 Full <6>[ 132.167068] ok 3 Limited 16:235 <6>[ 132.167345] # drm_test_drm_hdmi_connector_get_broadcast_rgb_name: pass:3 fail:0 skip:0 total:3 <6>[ 132.167528] ok 1 drm_test_drm_hdmi_connector_get_broadcast_rgb_name <6>[ 132.169222] ok 2 drm_test_drm_hdmi_connector_get_broadcast_rgb_name_invalid <6>[ 132.169827] # drm_hdmi_connector_get_broadcast_rgb_name: pass:2 fail:0 skip:0 total:2 <6>[ 132.170546] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 132.172073] ok 60 drm_hdmi_connector_get_broadcast_rgb_name <6>[ 132.173467] KTAP version 1 <6>[ 132.173813] # Subtest: drm_hdmi_connector_get_output_format_name <6>[ 132.174383] # module: drm_connector_test <6>[ 132.174515] 1..2 <6>[ 132.175330] KTAP version 1 <6>[ 132.175802] # Subtest: drm_test_drm_hdmi_connector_get_output_format_name <6>[ 132.177525] ok 1 RGB <6>[ 132.179141] ok 2 YUV 4:2:0 <6>[ 132.181127] ok 3 YUV 4:2:2 <6>[ 132.182999] ok 4 YUV 4:4:4 <6>[ 132.183227] # drm_test_drm_hdmi_connector_get_output_format_name: pass:4 fail:0 skip:0 total:4 <6>[ 132.183398] ok 1 drm_test_drm_hdmi_connector_get_output_format_name <6>[ 132.185120] ok 2 drm_test_drm_hdmi_connector_get_output_format_name_invalid <6>[ 132.185458] # drm_hdmi_connector_get_output_format_name: pass:2 fail:0 skip:0 total:2 <6>[ 132.185947] # Totals: pass:5 fail:0 skip:0 total:5 <6>[ 132.186281] ok 61 drm_hdmi_connector_get_output_format_name <6>[ 132.187082] KTAP version 1 <6>[ 132.187239] # Subtest: drm_damage_helper <6>[ 132.187414] # module: drm_damage_helper_test <6>[ 132.187461] 1..21 <6>[ 132.191807] ok 1 drm_test_damage_iter_no_damage <6>[ 132.193119] ok 2 drm_test_damage_iter_no_damage_fractional_src <6>[ 132.194803] ok 3 drm_test_damage_iter_no_damage_src_moved <6>[ 132.196497] ok 4 drm_test_damage_iter_no_damage_fractional_src_moved <6>[ 132.198493] ok 5 drm_test_damage_iter_no_damage_not_visible <6>[ 132.200867] ok 6 drm_test_damage_iter_no_damage_no_crtc <6>[ 132.202528] ok 7 drm_test_damage_iter_no_damage_no_fb <6>[ 132.204575] ok 8 drm_test_damage_iter_simple_damage <6>[ 132.206356] ok 9 drm_test_damage_iter_single_damage <6>[ 132.208101] ok 10 drm_test_damage_iter_single_damage_intersect_src <6>[ 132.209873] ok 11 drm_test_damage_iter_single_damage_outside_src <6>[ 132.211597] ok 12 drm_test_damage_iter_single_damage_fractional_src <6>[ 132.213456] ok 13 drm_test_damage_iter_single_damage_intersect_fractional_src <6>[ 132.215441] ok 14 drm_test_damage_iter_single_damage_outside_fractional_src <6>[ 132.217224] ok 15 drm_test_damage_iter_single_damage_src_moved <6>[ 132.219189] ok 16 drm_test_damage_iter_single_damage_fractional_src_moved <6>[ 132.221061] ok 17 drm_test_damage_iter_damage <6>[ 132.223030] ok 18 drm_test_damage_iter_damage_one_intersect <6>[ 132.224599] ok 19 drm_test_damage_iter_damage_one_outside <6>[ 132.226430] ok 20 drm_test_damage_iter_damage_src_moved <6>[ 132.230551] ok 21 drm_test_damage_iter_damage_not_visible <6>[ 132.230978] # drm_damage_helper: pass:21 fail:0 skip:0 total:21 <6>[ 132.231233] # Totals: pass:21 fail:0 skip:0 total:21 <6>[ 132.231444] ok 62 drm_damage_helper <6>[ 132.232382] KTAP version 1 <6>[ 132.232538] # Subtest: drm_dp_mst_helper <6>[ 132.232816] # module: drm_dp_mst_helper_test <6>[ 132.232882] 1..3 <6>[ 132.233281] KTAP version 1 <6>[ 132.233490] # Subtest: drm_test_dp_mst_calc_pbn_mode <6>[ 132.235193] ok 1 Clock 154000 BPP 30 DSC disabled <6>[ 132.236535] ok 2 Clock 234000 BPP 30 DSC disabled <6>[ 132.238051] ok 3 Clock 297000 BPP 24 DSC disabled <6>[ 132.239372] ok 4 Clock 332880 BPP 24 DSC enabled <6>[ 132.240923] ok 5 Clock 324540 BPP 24 DSC enabled <6>[ 132.241255] # drm_test_dp_mst_calc_pbn_mode: pass:5 fail:0 skip:0 total:5 <6>[ 132.241541] ok 1 drm_test_dp_mst_calc_pbn_mode <6>[ 132.242063] KTAP version 1 <6>[ 132.242448] # Subtest: drm_test_dp_mst_calc_pbn_div <6>[ 132.243939] ok 1 Link rate 2000000 lane count 4 <6>[ 132.245454] ok 2 Link rate 2000000 lane count 2 <6>[ 132.247263] ok 3 Link rate 2000000 lane count 1 <6>[ 132.248823] ok 4 Link rate 1350000 lane count 4 <6>[ 132.250076] ok 5 Link rate 1350000 lane count 2 <6>[ 132.251586] ok 6 Link rate 1350000 lane count 1 <6>[ 132.253257] ok 7 Link rate 1000000 lane count 4 <6>[ 132.254611] ok 8 Link rate 1000000 lane count 2 <6>[ 132.256283] ok 9 Link rate 1000000 lane count 1 <6>[ 132.257805] ok 10 Link rate 810000 lane count 4 <6>[ 132.259308] ok 11 Link rate 810000 lane count 2 <6>[ 132.260926] ok 12 Link rate 810000 lane count 1 <6>[ 132.262259] ok 13 Link rate 540000 lane count 4 <6>[ 132.263608] ok 14 Link rate 540000 lane count 2 <6>[ 132.265111] ok 15 Link rate 540000 lane count 1 <6>[ 132.266425] ok 16 Link rate 270000 lane count 4 <6>[ 132.268047] ok 17 Link rate 270000 lane count 2 <6>[ 132.269501] ok 18 Link rate 270000 lane count 1 <6>[ 132.271302] ok 19 Link rate 162000 lane count 4 <6>[ 132.273056] ok 20 Link rate 162000 lane count 2 <6>[ 132.274305] ok 21 Link rate 162000 lane count 1 <6>[ 132.274762] # drm_test_dp_mst_calc_pbn_div: pass:21 fail:0 skip:0 total:21 <6>[ 132.275053] ok 2 drm_test_dp_mst_calc_pbn_div <6>[ 132.275436] KTAP version 1 <6>[ 132.276292] # Subtest: drm_test_dp_mst_sideband_msg_req_decode <6>[ 132.277979] ok 1 DP_ENUM_PATH_RESOURCES with port number <6>[ 132.279787] ok 2 DP_POWER_UP_PHY with port number <6>[ 132.281270] ok 3 DP_POWER_DOWN_PHY with port number <6>[ 132.283123] ok 4 DP_ALLOCATE_PAYLOAD with SDP stream sinks <6>[ 132.284541] ok 5 DP_ALLOCATE_PAYLOAD with port number <6>[ 132.286274] ok 6 DP_ALLOCATE_PAYLOAD with VCPI <6>[ 132.287797] ok 7 DP_ALLOCATE_PAYLOAD with PBN <6>[ 132.289735] ok 8 DP_QUERY_PAYLOAD with port number <6>[ 132.291318] ok 9 DP_QUERY_PAYLOAD with VCPI <6>[ 132.293127] ok 10 DP_REMOTE_DPCD_READ with port number <6>[ 132.294438] ok 11 DP_REMOTE_DPCD_READ with DPCD address <6>[ 132.296216] ok 12 DP_REMOTE_DPCD_READ with max number of bytes <6>[ 132.298075] ok 13 DP_REMOTE_DPCD_WRITE with port number <6>[ 132.299967] ok 14 DP_REMOTE_DPCD_WRITE with DPCD address <6>[ 132.301431] ok 15 DP_REMOTE_DPCD_WRITE with data array <6>[ 132.304361] ok 16 DP_REMOTE_I2C_READ with port number <6>[ 132.306321] ok 17 DP_REMOTE_I2C_READ with I2C device ID <6>[ 132.309067] ok 18 DP_REMOTE_I2C_READ with transactions array <6>[ 132.312110] ok 19 DP_REMOTE_I2C_WRITE with port number <6>[ 132.314398] ok 20 DP_REMOTE_I2C_WRITE with I2C device ID <6>[ 132.316481] ok 21 DP_REMOTE_I2C_WRITE with data array <6>[ 132.318894] ok 22 DP_QUERY_STREAM_ENC_STATUS with stream ID <6>[ 132.320515] ok 23 DP_QUERY_STREAM_ENC_STATUS with client ID <6>[ 132.322513] ok 24 DP_QUERY_STREAM_ENC_STATUS with stream event <6>[ 132.324103] ok 25 DP_QUERY_STREAM_ENC_STATUS with valid stream event <6>[ 132.325599] ok 26 DP_QUERY_STREAM_ENC_STATUS with stream behavior <6>[ 132.327235] ok 27 DP_QUERY_STREAM_ENC_STATUS with a valid stream behavior <6>[ 132.327591] # drm_test_dp_mst_sideband_msg_req_decode: pass:27 fail:0 skip:0 total:27 <6>[ 132.328127] ok 3 drm_test_dp_mst_sideband_msg_req_decode <6>[ 132.328488] # drm_dp_mst_helper: pass:3 fail:0 skip:0 total:3 <6>[ 132.328866] # Totals: pass:53 fail:0 skip:0 total:53 <6>[ 132.329151] ok 63 drm_dp_mst_helper <6>[ 132.329874] KTAP version 1 <6>[ 132.330048] # Subtest: drm_exec <6>[ 132.330223] # module: drm_exec_test <6>[ 132.330270] 1..7 <6>[ 132.342489] ok 1 sanitycheck <6>[ 132.351309] ok 2 test_lock <6>[ 132.357337] ok 3 test_lock_unlock <6>[ 132.367480] ok 4 test_duplicates <6>[ 132.379387] ok 5 test_prepare <6>[ 132.391356] ok 6 test_prepare_array <6>[ 132.398857] ok 7 test_multiple_loops <6>[ 132.399189] # drm_exec: pass:7 fail:0 skip:0 total:7 <6>[ 132.399495] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 132.400088] ok 64 drm_exec <6>[ 132.401190] KTAP version 1 <6>[ 132.401516] # Subtest: drm_format_helper_test <6>[ 132.402052] # module: drm_format_helper_test <6>[ 132.402165] 1..17 <6>[ 132.402936] KTAP version 1 <6>[ 132.403269] # Subtest: drm_test_fb_xrgb8888_to_gray8 <6>[ 132.405922] ok 1 single_pixel_source_buffer <6>[ 132.408555] ok 2 single_pixel_clip_rectangle <6>[ 132.410253] ok 3 well_known_colors <6>[ 132.412095] ok 4 destination_pitch <6>[ 132.412319] # drm_test_fb_xrgb8888_to_gray8: pass:4 fail:0 skip:0 total:4 <6>[ 132.412511] ok 1 drm_test_fb_xrgb8888_to_gray8 <6>[ 132.413031] KTAP version 1 <6>[ 132.413326] # Subtest: drm_test_fb_xrgb8888_to_rgb332 <6>[ 132.416068] ok 1 single_pixel_source_buffer <6>[ 132.417477] ok 2 single_pixel_clip_rectangle <6>[ 132.419004] ok 3 well_known_colors <6>[ 132.420380] ok 4 destination_pitch <6>[ 132.420935] # drm_test_fb_xrgb8888_to_rgb332: pass:4 fail:0 skip:0 total:4 <6>[ 132.421179] ok 2 drm_test_fb_xrgb8888_to_rgb332 <6>[ 132.421530] KTAP version 1 <6>[ 132.422022] # Subtest: drm_test_fb_xrgb8888_to_rgb565 <6>[ 132.424554] ok 1 single_pixel_source_buffer <6>[ 132.426346] ok 2 single_pixel_clip_rectangle <6>[ 132.428268] ok 3 well_known_colors <6>[ 132.429671] ok 4 destination_pitch <6>[ 132.429914] # drm_test_fb_xrgb8888_to_rgb565: pass:4 fail:0 skip:0 total:4 <6>[ 132.430130] ok 3 drm_test_fb_xrgb8888_to_rgb565 <6>[ 132.430483] KTAP version 1 <6>[ 132.431092] # Subtest: drm_test_fb_xrgb8888_to_xrgb1555 <6>[ 132.433069] ok 1 single_pixel_source_buffer <6>[ 132.434781] ok 2 single_pixel_clip_rectangle <6>[ 132.436130] ok 3 well_known_colors <6>[ 132.437764] ok 4 destination_pitch <6>[ 132.438021] # drm_test_fb_xrgb8888_to_xrgb1555: pass:4 fail:0 skip:0 total:4 <6>[ 132.438235] ok 4 drm_test_fb_xrgb8888_to_xrgb1555 <6>[ 132.438553] KTAP version 1 <6>[ 132.439119] # Subtest: drm_test_fb_xrgb8888_to_argb1555 <6>[ 132.441468] ok 1 single_pixel_source_buffer <6>[ 132.443454] ok 2 single_pixel_clip_rectangle <6>[ 132.445410] ok 3 well_known_colors <6>[ 132.447335] ok 4 destination_pitch <6>[ 132.447534] # drm_test_fb_xrgb8888_to_argb1555: pass:4 fail:0 skip:0 total:4 <6>[ 132.447836] ok 5 drm_test_fb_xrgb8888_to_argb1555 <6>[ 132.448180] KTAP version 1 <6>[ 132.448521] # Subtest: drm_test_fb_xrgb8888_to_rgba5551 <6>[ 132.451001] ok 1 single_pixel_source_buffer <6>[ 132.453039] ok 2 single_pixel_clip_rectangle <6>[ 132.455082] ok 3 well_known_colors <6>[ 132.456985] ok 4 destination_pitch <6>[ 132.457245] # drm_test_fb_xrgb8888_to_rgba5551: pass:4 fail:0 skip:0 total:4 <6>[ 132.457429] ok 6 drm_test_fb_xrgb8888_to_rgba5551 <6>[ 132.457994] KTAP version 1 <6>[ 132.458306] # Subtest: drm_test_fb_xrgb8888_to_rgb888 <6>[ 132.460873] ok 1 single_pixel_source_buffer <6>[ 132.462961] ok 2 single_pixel_clip_rectangle <6>[ 132.464494] ok 3 well_known_colors <6>[ 132.466034] ok 4 destination_pitch <6>[ 132.466276] # drm_test_fb_xrgb8888_to_rgb888: pass:4 fail:0 skip:0 total:4 <6>[ 132.466450] ok 7 drm_test_fb_xrgb8888_to_rgb888 <6>[ 132.467160] KTAP version 1 <6>[ 132.467510] # Subtest: drm_test_fb_xrgb8888_to_argb8888 <6>[ 132.470270] ok 1 single_pixel_source_buffer <6>[ 132.472869] ok 2 single_pixel_clip_rectangle <6>[ 132.474707] ok 3 well_known_colors <6>[ 132.476410] ok 4 destination_pitch <6>[ 132.476773] # drm_test_fb_xrgb8888_to_argb8888: pass:4 fail:0 skip:0 total:4 <6>[ 132.477033] ok 8 drm_test_fb_xrgb8888_to_argb8888 <6>[ 132.477364] KTAP version 1 <6>[ 132.477844] # Subtest: drm_test_fb_xrgb8888_to_xrgb2101010 <6>[ 132.480061] ok 1 single_pixel_source_buffer <6>[ 132.481757] ok 2 single_pixel_clip_rectangle <6>[ 132.483179] ok 3 well_known_colors <6>[ 132.484762] ok 4 destination_pitch <6>[ 132.484959] # drm_test_fb_xrgb8888_to_xrgb2101010: pass:4 fail:0 skip:0 total:4 <6>[ 132.485124] ok 9 drm_test_fb_xrgb8888_to_xrgb2101010 <6>[ 132.485477] KTAP version 1 <6>[ 132.485925] # Subtest: drm_test_fb_xrgb8888_to_argb2101010 <6>[ 132.488164] ok 1 single_pixel_source_buffer <6>[ 132.490060] ok 2 single_pixel_clip_rectangle <6>[ 132.491928] ok 3 well_known_colors <6>[ 132.493712] ok 4 destination_pitch <6>[ 132.493988] # drm_test_fb_xrgb8888_to_argb2101010: pass:4 fail:0 skip:0 total:4 <6>[ 132.494181] ok 10 drm_test_fb_xrgb8888_to_argb2101010 <6>[ 132.494469] KTAP version 1 <6>[ 132.494981] # Subtest: drm_test_fb_xrgb8888_to_mono <6>[ 132.497024] ok 1 single_pixel_source_buffer <6>[ 132.498491] ok 2 single_pixel_clip_rectangle <6>[ 132.499936] ok 3 well_known_colors <6>[ 132.501393] ok 4 destination_pitch <6>[ 132.501608] # drm_test_fb_xrgb8888_to_mono: pass:4 fail:0 skip:0 total:4 <6>[ 132.502107] ok 11 drm_test_fb_xrgb8888_to_mono <6>[ 132.502356] KTAP version 1 <6>[ 132.502704] # Subtest: drm_test_fb_swab <6>[ 132.505135] ok 1 single_pixel_source_buffer <6>[ 132.507041] ok 2 single_pixel_clip_rectangle <6>[ 132.508528] ok 3 well_known_colors <6>[ 132.510022] ok 4 destination_pitch <6>[ 132.510237] # drm_test_fb_swab: pass:4 fail:0 skip:0 total:4 <6>[ 132.510436] ok 12 drm_test_fb_swab <6>[ 132.510875] KTAP version 1 <6>[ 132.511172] # Subtest: drm_test_fb_xrgb8888_to_xbgr8888 <6>[ 132.513092] ok 1 single_pixel_source_buffer <6>[ 132.514457] ok 2 single_pixel_clip_rectangle <6>[ 132.516051] ok 3 well_known_colors <6>[ 132.517416] ok 4 destination_pitch <6>[ 132.517617] # drm_test_fb_xrgb8888_to_xbgr8888: pass:4 fail:0 skip:0 total:4 <6>[ 132.517988] ok 13 drm_test_fb_xrgb8888_to_xbgr8888 <6>[ 132.518244] KTAP version 1 <6>[ 132.518514] # Subtest: drm_test_fb_xrgb8888_to_abgr8888 <6>[ 132.520192] ok 1 single_pixel_source_buffer <6>[ 132.521863] ok 2 single_pixel_clip_rectangle <6>[ 132.523489] ok 3 well_known_colors <6>[ 132.525096] ok 4 destination_pitch <6>[ 132.525337] # drm_test_fb_xrgb8888_to_abgr8888: pass:4 fail:0 skip:0 total:4 <6>[ 132.525553] ok 14 drm_test_fb_xrgb8888_to_abgr8888 <6>[ 132.526404] KTAP version 1 <6>[ 132.526772] # Subtest: drm_test_fb_clip_offset <6>[ 132.528255] ok 1 pass through <6>[ 132.529491] ok 2 horizontal offset <6>[ 132.530711] ok 3 vertical offset <6>[ 132.531893] ok 4 horizontal and vertical offset <6>[ 132.533600] ok 5 horizontal offset (custom pitch) <6>[ 132.535015] ok 6 vertical offset (custom pitch) <6>[ 132.536300] ok 7 horizontal and vertical offset (custom pitch) <6>[ 132.536552] # drm_test_fb_clip_offset: pass:7 fail:0 skip:0 total:7 <6>[ 132.537050] ok 15 drm_test_fb_clip_offset <6>[ 132.537335] KTAP version 1 <6>[ 132.537663] # Subtest: drm_test_fb_build_fourcc_list <6>[ 132.544408] ok 1 no native formats <6>[ 132.550184] ok 2 XRGB8888 as native format <6>[ 132.556123] ok 3 remove duplicates <6>[ 132.562000] ok 4 convert alpha formats <6>[ 132.567227] ok 5 random formats <6>[ 132.567468] # drm_test_fb_build_fourcc_list: pass:5 fail:0 skip:0 total:5 <6>[ 132.567689] ok 16 drm_test_fb_build_fourcc_list <6>[ 132.568221] KTAP version 1 <6>[ 132.568498] # Subtest: drm_test_fb_memcpy <6>[ 132.571431] ok 1 single_pixel_source_buffer: XR24 little-endian (0x34325258) <6>[ 132.573143] ok 2 single_pixel_source_buffer: XRA8 little-endian (0x38415258) <6>[ 132.575097] ok 3 single_pixel_source_buffer: YU24 little-endian (0x34325559) <6>[ 132.576410] ok 4 single_pixel_clip_rectangle: XB24 little-endian (0x34324258) <6>[ 132.578137] ok 5 single_pixel_clip_rectangle: XRA8 little-endian (0x38415258) <6>[ 132.579896] ok 6 single_pixel_clip_rectangle: YU24 little-endian (0x34325559) <6>[ 132.581376] ok 7 well_known_colors: XB24 little-endian (0x34324258) <6>[ 132.583030] ok 8 well_known_colors: XRA8 little-endian (0x38415258) <6>[ 132.584932] ok 9 well_known_colors: YU24 little-endian (0x34325559) <6>[ 132.586401] ok 10 destination_pitch: XB24 little-endian (0x34324258) <4>[ 132.586819] ------------[ cut here ]------------ <4>[ 132.587250] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 132.587313] Modules linked in: <4>[ 132.587345] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 132.587381] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 132.587391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 132.587406] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 132.587432] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 132.587453] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 132.587473] RAX: 0000000080000000 RBX: ffff888106e16900 RCX: ffff888154200000 <4>[ 132.587486] RDX: 0000000000174000 RSI: ffffffff88ebc501 RDI: ffff888154374000 <4>[ 132.587500] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 132.587513] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00041b8400 <4>[ 132.587525] R13: ffff888154374000 R14: 0000000088418401 R15: 0000000000039408 <4>[ 132.587539] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 132.587554] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 132.587567] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 132.587584] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 132.587605] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 132.587619] Call Trace: <4>[ 132.587678] <4>[ 132.587698] ? show_regs+0x68/0x80 <4>[ 132.587725] ? __warn+0xd5/0x260 <4>[ 132.587743] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 132.587763] ? report_bug+0x278/0x2e0 <4>[ 132.587787] ? handle_bug+0x7b/0xa0 <4>[ 132.587805] ? exc_invalid_op+0x1c/0x50 <4>[ 132.587822] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 132.587846] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 132.587866] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 132.587889] rcu_core+0x683/0x1c80 <4>[ 132.587915] ? __pfx_rcu_core+0x10/0x10 <4>[ 132.587936] ? lapic_next_event+0x19/0x30 <4>[ 132.587954] ? handle_softirqs+0x18e/0x720 <4>[ 132.587975] rcu_core_si+0x12/0x20 <4>[ 132.587993] handle_softirqs+0x20c/0x720 <4>[ 132.588013] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 132.588035] irq_exit_rcu+0x9c/0xd0 <4>[ 132.588052] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 132.588074] <4>[ 132.588083] <4>[ 132.588093] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 132.588113] RIP: 0010:default_idle+0xf/0x20 <4>[ 132.588131] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 132.588148] RSP: 0000:ffffffff8d407df0 EFLAGS: 00000212 <4>[ 132.588165] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 132.588178] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 0000000000091d5c <4>[ 132.588191] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 132.588202] R10: ffff888154a35723 R11: 0000000000030400 R12: 0000000000000000 <4>[ 132.588214] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 132.588231] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 132.588256] ? arch_cpu_idle+0xd/0x20 <4>[ 132.588273] default_idle_call+0x48/0x80 <4>[ 132.588290] do_idle+0x313/0x3c0 <4>[ 132.588311] ? __pfx_do_idle+0x10/0x10 <4>[ 132.588329] ? trace_preempt_on+0x20/0xc0 <4>[ 132.588347] ? schedule+0x86/0x310 <4>[ 132.588364] ? preempt_count_sub+0x50/0x80 <4>[ 132.588386] cpu_startup_entry+0x5c/0x70 <4>[ 132.588404] rest_init+0x11a/0x140 <4>[ 132.588420] ? acpi_subsystem_init+0x5d/0x150 <4>[ 132.588442] start_kernel+0x31b/0x400 <4>[ 132.588464] x86_64_start_reservations+0x1c/0x30 <4>[ 132.588484] x86_64_start_kernel+0xcf/0xe0 <4>[ 132.588503] common_startup_64+0x12c/0x138 <4>[ 132.588529] <4>[ 132.588539] ---[ end trace 0000000000000000 ]--- <6>[ 132.601143] ok 11 destination_pitch: XRA8 little-endian (0x38415258) <6>[ 132.602898] ok 12 destination_pitch: YU24 little-endian (0x34325559) <6>[ 132.603212] # drm_test_fb_memcpy: pass:12 fail:0 skip:0 total:12 <6>[ 132.603497] ok 17 drm_test_fb_memcpy <6>[ 132.603989] # drm_format_helper_test: pass:17 fail:0 skip:0 total:17 <6>[ 132.604184] # Totals: pass:80 fail:0 skip:0 total:80 <6>[ 132.604426] ok 65 drm_format_helper_test <6>[ 132.605241] KTAP version 1 <6>[ 132.605368] # Subtest: drm_format <6>[ 132.605501] # module: drm_format_test <6>[ 132.605564] 1..18 <6>[ 132.607271] ok 1 drm_test_format_block_width_invalid <6>[ 132.608830] ok 2 drm_test_format_block_width_one_plane <6>[ 132.610316] ok 3 drm_test_format_block_width_two_plane <6>[ 132.611885] ok 4 drm_test_format_block_width_three_plane <6>[ 132.613475] ok 5 drm_test_format_block_width_tiled <6>[ 132.614999] ok 6 drm_test_format_block_height_invalid <6>[ 132.616460] ok 7 drm_test_format_block_height_one_plane <6>[ 132.618195] ok 8 drm_test_format_block_height_two_plane <6>[ 132.620051] ok 9 drm_test_format_block_height_three_plane <6>[ 132.621534] ok 10 drm_test_format_block_height_tiled <6>[ 132.623355] ok 11 drm_test_format_min_pitch_invalid <6>[ 132.625024] ok 12 drm_test_format_min_pitch_one_plane_8bpp <6>[ 132.626976] ok 13 drm_test_format_min_pitch_one_plane_16bpp <6>[ 132.628727] ok 14 drm_test_format_min_pitch_one_plane_24bpp <6>[ 132.630467] ok 15 drm_test_format_min_pitch_one_plane_32bpp <6>[ 132.632375] ok 16 drm_test_format_min_pitch_two_plane <6>[ 132.651710] ok 17 drm_test_format_min_pitch_three_plane_8bpp <6>[ 132.653449] ok 18 drm_test_format_min_pitch_tiled <6>[ 132.653787] # drm_format: pass:18 fail:0 skip:0 total:18 <6>[ 132.653998] # Totals: pass:18 fail:0 skip:0 total:18 <6>[ 132.654194] ok 66 drm_format <6>[ 132.654805] KTAP version 1 <6>[ 132.654946] # Subtest: drm_framebuffer <6>[ 132.655094] # module: drm_framebuffer_test <6>[ 132.655159] 1..1 <6>[ 132.655435] KTAP version 1 <6>[ 132.655587] # Subtest: drm_test_framebuffer_create <6>[ 132.657563] ok 1 ABGR8888 normal sizes <6>[ 132.659053] ok 2 ABGR8888 max sizes <6>[ 132.660464] ok 3 ABGR8888 pitch greater than min required <6>[ 132.661953] ok 4 ABGR8888 pitch less than min required <6>[ 132.663356] ok 5 ABGR8888 Invalid width <6>[ 132.664798] ok 6 ABGR8888 Invalid buffer handle <6>[ 132.666228] ok 7 No pixel format <6>[ 132.667769] ok 8 ABGR8888 Width 0 <6>[ 132.669405] ok 9 ABGR8888 Height 0 <6>[ 132.671172] ok 10 ABGR8888 Out of bound height * pitch combination <6>[ 132.672465] ok 11 ABGR8888 Large buffer offset <6>[ 132.674388] ok 12 ABGR8888 Set DRM_MODE_FB_MODIFIERS without modifiers <6>[ 132.675861] ok 13 ABGR8888 Valid buffer modifier <6>[ 132.677326] ok 14 ABGR8888 Invalid buffer modifier(DRM_FORMAT_MOD_SAMSUNG_64_32_TILE) <6>[ 132.678992] ok 15 ABGR8888 Extra pitches without DRM_MODE_FB_MODIFIERS <6>[ 132.680371] ok 16 ABGR8888 Extra pitches with DRM_MODE_FB_MODIFIERS <6>[ 132.682017] ok 17 NV12 Normal sizes <6>[ 132.683363] ok 18 NV12 Max sizes <6>[ 132.684807] ok 19 NV12 Invalid pitch <6>[ 132.686073] ok 20 NV12 Invalid modifier/missing DRM_MODE_FB_MODIFIERS flag <6>[ 132.687733] ok 21 NV12 different modifier per-plane <6>[ 132.689418] ok 22 NV12 with DRM_FORMAT_MOD_SAMSUNG_64_32_TILE <6>[ 132.690764] ok 23 NV12 Valid modifiers without DRM_MODE_FB_MODIFIERS <6>[ 132.692107] ok 24 NV12 Modifier for inexistent plane <6>[ 132.693528] ok 25 NV12 Handle for inexistent plane <6>[ 132.695205] ok 26 NV12 Handle for inexistent plane without DRM_MODE_FB_MODIFIERS <6>[ 132.696625] ok 27 YVU420 DRM_MODE_FB_MODIFIERS set without modifier <6>[ 132.698198] ok 28 YVU420 Normal sizes <6>[ 132.699624] ok 29 YVU420 Max sizes <6>[ 132.701198] ok 30 YVU420 Invalid pitch <6>[ 132.702409] ok 31 YVU420 Different pitches <6>[ 132.703895] ok 32 YVU420 Different buffer offsets/pitches <6>[ 132.705197] ok 33 YVU420 Modifier set just for plane 0, without DRM_MODE_FB_MODIFIERS <6>[ 132.706553] ok 34 YVU420 Modifier set just for planes 0, 1, without DRM_MODE_FB_MODIFIERS <6>[ 132.708353] ok 35 YVU420 Modifier set just for plane 0, 1, with DRM_MODE_FB_MODIFIERS <6>[ 132.710033] ok 36 YVU420 Valid modifier <6>[ 132.711551] ok 37 YVU420 Different modifiers per plane <6>[ 132.713211] ok 38 YVU420 Modifier for inexistent plane <6>[ 132.714699] ok 39 X0L2 Normal sizes <6>[ 132.716052] ok 40 X0L2 Max sizes <6>[ 132.717410] ok 41 X0L2 Invalid pitch <6>[ 132.718917] ok 42 X0L2 Pitch greater than minimum required <6>[ 132.720458] ok 43 X0L2 Handle for inexistent plane <6>[ 132.722144] ok 44 X0L2 Offset for inexistent plane, without DRM_MODE_FB_MODIFIERS set <6>[ 132.723580] ok 45 X0L2 Modifier without DRM_MODE_FB_MODIFIERS set <6>[ 132.725191] ok 46 X0L2 Valid modifier <6>[ 132.726585] ok 47 X0L2 Modifier for inexistent plane <6>[ 132.726895] # drm_test_framebuffer_create: pass:47 fail:0 skip:0 total:47 <6>[ 132.727187] ok 1 drm_test_framebuffer_create <6>[ 132.727509] # Totals: pass:47 fail:0 skip:0 total:47 <6>[ 132.727862] ok 67 drm_framebuffer <6>[ 132.728608] KTAP version 1 <6>[ 132.728861] # Subtest: drm_gem_shmem <6>[ 132.729065] # module: drm_gem_shmem_test <6>[ 132.729133] 1..8 <6>[ 132.739890] ok 1 drm_gem_shmem_test_obj_create <6>[ 132.747041] ok 2 drm_gem_shmem_test_obj_create_private <6>[ 132.761141] ok 3 drm_gem_shmem_test_pin_pages <6>[ 132.790104] ok 4 drm_gem_shmem_test_vmap <6>[ 132.803266] ok 5 drm_gem_shmem_test_get_pages_sgt <6>[ 132.819937] ok 6 drm_gem_shmem_test_get_sg_table <6>[ 132.826614] ok 7 drm_gem_shmem_test_madvise <6>[ 132.842775] ok 8 drm_gem_shmem_test_purge <6>[ 132.843147] # drm_gem_shmem: pass:8 fail:0 skip:0 total:8 <6>[ 132.843351] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 132.843544] ok 68 drm_gem_shmem <6>[ 132.844286] KTAP version 1 <6>[ 132.844405] # Subtest: drm_atomic_helper_connector_hdmi_check <6>[ 132.844589] # module: drm_hdmi_state_helper_test <6>[ 132.844696] 1..22 <6>[ 132.877709] ok 1 drm_test_check_broadcast_rgb_auto_cea_mode <6>[ 132.887228] ok 2 drm_test_check_broadcast_rgb_auto_cea_mode_vic_1 <6>[ 132.896346] ok 3 drm_test_check_broadcast_rgb_full_cea_mode <6>[ 132.904277] ok 4 drm_test_check_broadcast_rgb_full_cea_mode_vic_1 <6>[ 132.913171] ok 5 drm_test_check_broadcast_rgb_limited_cea_mode <6>[ 132.921626] ok 6 drm_test_check_broadcast_rgb_limited_cea_mode_vic_1 <6>[ 132.930457] ok 7 drm_test_check_broadcast_rgb_crtc_mode_changed <6>[ 132.938517] ok 8 drm_test_check_broadcast_rgb_crtc_mode_not_changed <6>[ 132.946979] ok 9 drm_test_check_hdmi_funcs_reject_rate <6>[ 132.955859] ok 10 drm_test_check_max_tmds_rate_bpc_fallback <6>[ 132.964758] ok 11 drm_test_check_max_tmds_rate_format_fallback <6>[ 132.974325] ok 12 drm_test_check_output_bpc_crtc_mode_changed <6>[ 132.982962] ok 13 drm_test_check_output_bpc_crtc_mode_not_changed <6>[ 132.991135] ok 14 drm_test_check_output_bpc_dvi <6>[ 133.000114] ok 15 drm_test_check_output_bpc_format_vic_1 <6>[ 133.008326] ok 16 drm_test_check_output_bpc_format_display_8bpc_only <6>[ 133.016775] ok 17 drm_test_check_output_bpc_format_display_rgb_only <6>[ 133.025138] ok 18 drm_test_check_output_bpc_format_driver_8bpc_only <6>[ 133.033407] ok 19 drm_test_check_output_bpc_format_driver_rgb_only <6>[ 133.041930] ok 20 drm_test_check_tmds_char_rate_rgb_8bpc <6>[ 133.050332] ok 21 drm_test_check_tmds_char_rate_rgb_10bpc <6>[ 133.058546] ok 22 drm_test_check_tmds_char_rate_rgb_12bpc <6>[ 133.058931] # drm_atomic_helper_connector_hdmi_check: pass:22 fail:0 skip:0 total:22 <6>[ 133.059196] # Totals: pass:22 fail:0 skip:0 total:22 <6>[ 133.059455] ok 69 drm_atomic_helper_connector_hdmi_check <6>[ 133.060099] KTAP version 1 <6>[ 133.060223] # Subtest: drm_atomic_helper_connector_hdmi_reset <6>[ 133.060429] # module: drm_hdmi_state_helper_test <6>[ 133.060487] 1..6 <6>[ 133.067672] ok 1 drm_test_check_broadcast_rgb_value <6>[ 133.074807] ok 2 drm_test_check_bpc_8_value <6>[ 133.082193] ok 3 drm_test_check_bpc_10_value <6>[ 133.088967] ok 4 drm_test_check_bpc_12_value <6>[ 133.095916] ok 5 drm_test_check_format_value <6>[ 133.102649] ok 6 drm_test_check_tmds_char_value <6>[ 133.102978] # drm_atomic_helper_connector_hdmi_reset: pass:6 fail:0 skip:0 total:6 <6>[ 133.103276] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 133.103790] ok 70 drm_atomic_helper_connector_hdmi_reset <6>[ 133.104433] KTAP version 1 <6>[ 133.104567] # Subtest: drm_managed <6>[ 133.104826] # module: drm_managed_test <6>[ 133.104880] 1..2 <6>[ 133.111406] [drm] Initialized (null) 0.0.0 for drm_test_managed_release_action.drm-kunit-mock-device on minor 0 <6>[ 133.121394] ok 1 drm_test_managed_release_action <6>[ 133.127249] [drm] Initialized (null) 0.0.0 for drm_test_managed_run_action.drm-kunit-mock-device on minor 0 <6>[ 133.132361] ok 2 drm_test_managed_run_action <6>[ 133.132461] # drm_managed: pass:2 fail:0 skip:0 total:2 <6>[ 133.132779] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 133.132989] ok 71 drm_managed <6>[ 133.133501] KTAP version 1 <6>[ 133.133683] # Subtest: drm_mm <6>[ 133.133823] # module: drm_mm_test <6>[ 133.133871] 1..6 <6>[ 133.136107] ok 1 drm_test_mm_init <6>[ 133.138282] ok 2 drm_test_mm_debug <6>[ 133.141378] ok 3 drm_test_mm_align32 <6>[ 133.144172] ok 4 drm_test_mm_align64 <6>[ 133.145918] ok 5 drm_test_mm_lowest <6>[ 133.147352] ok 6 drm_test_mm_highest <6>[ 133.147549] # drm_mm: pass:6 fail:0 skip:0 total:6 <6>[ 133.147821] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 133.148069] ok 72 drm_mm <6>[ 133.148888] KTAP version 1 <6>[ 133.149014] # Subtest: drm_modes_analog_tv <6>[ 133.149163] # module: drm_modes_test <6>[ 133.149210] 1..5 <6>[ 133.156120] ok 1 drm_test_modes_analog_tv_mono_576i <6>[ 133.161728] ok 2 drm_test_modes_analog_tv_ntsc_480i <6>[ 133.167188] ok 3 drm_test_modes_analog_tv_ntsc_480i_inlined <6>[ 133.172845] ok 4 drm_test_modes_analog_tv_pal_576i <6>[ 133.178591] ok 5 drm_test_modes_analog_tv_pal_576i_inlined <6>[ 133.178929] # drm_modes_analog_tv: pass:5 fail:0 skip:0 total:5 <6>[ 133.179134] # Totals: pass:5 fail:0 skip:0 total:5 <6>[ 133.179409] ok 73 drm_modes_analog_tv <6>[ 133.180120] KTAP version 1 <6>[ 133.180255] # Subtest: drm_plane_helper <6>[ 133.180392] # module: drm_plane_helper_test <6>[ 133.180438] 1..2 <6>[ 133.180867] KTAP version 1 <6>[ 133.181063] # Subtest: drm_test_check_plane_state <6>[ 133.184176] ok 1 clipping_simple <6>[ 133.185923] ok 2 clipping_rotate_reflect <6>[ 133.187374] ok 3 positioning_simple <6>[ 133.188850] ok 4 upscaling <6>[ 133.190453] ok 5 downscaling <6>[ 133.191983] ok 6 rounding1 <6>[ 133.193572] ok 7 rounding2 <6>[ 133.195112] ok 8 rounding3 <6>[ 133.196452] ok 9 rounding4 <6>[ 133.196812] # drm_test_check_plane_state: pass:9 fail:0 skip:0 total:9 <6>[ 133.196992] ok 1 drm_test_check_plane_state <6>[ 133.197262] KTAP version 1 <6>[ 133.197540] # Subtest: drm_test_check_invalid_plane_state <6>[ 133.199067] ok 1 positioning_invalid <6>[ 133.200515] ok 2 upscaling_invalid <6>[ 133.202022] ok 3 downscaling_invalid <6>[ 133.202267] # drm_test_check_invalid_plane_state: pass:3 fail:0 skip:0 total:3 <6>[ 133.202465] ok 2 drm_test_check_invalid_plane_state <6>[ 133.202878] # drm_plane_helper: pass:2 fail:0 skip:0 total:2 <6>[ 133.203084] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 133.203301] ok 74 drm_plane_helper <6>[ 133.204080] KTAP version 1 <6>[ 133.204204] # Subtest: drm_connector_helper_tv_get_modes <6>[ 133.204376] # module: drm_probe_helper_test <6>[ 133.204421] 1..1 <6>[ 133.204803] KTAP version 1 <6>[ 133.205007] # Subtest: drm_test_connector_helper_tv_get_modes_check <6>[ 133.212777] ok 1 None <6>[ 133.219887] ok 2 PAL <6>[ 133.226077] ok 3 NTSC <6>[ 133.233106] ok 4 Both, NTSC Default <6>[ 133.239421] ok 5 Both, PAL Default <6>[ 133.245802] ok 6 Both, NTSC Default, with PAL on command-line <6>[ 133.251883] ok 7 Both, PAL Default, with NTSC on command-line <6>[ 133.252228] # drm_test_connector_helper_tv_get_modes_check: pass:7 fail:0 skip:0 total:7 <6>[ 133.252501] ok 1 drm_test_connector_helper_tv_get_modes_check <6>[ 133.252895] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 133.253113] ok 75 drm_connector_helper_tv_get_modes <6>[ 133.253710] KTAP version 1 <6>[ 133.253835] # Subtest: drm_rect <6>[ 133.253968] # module: drm_rect_test <6>[ 133.254015] 1..9 <6>[ 133.255588] ok 1 drm_test_rect_clip_scaled_div_by_zero <6>[ 133.257118] ok 2 drm_test_rect_clip_scaled_not_clipped <6>[ 133.259329] ok 3 drm_test_rect_clip_scaled_clipped <6>[ 133.260707] ok 4 drm_test_rect_clip_scaled_signed_vs_unsigned <6>[ 133.260996] KTAP version 1 <6>[ 133.261300] # Subtest: drm_test_rect_intersect <6>[ 133.263091] ok 1 top-left x bottom-right: 2x2+1+1 x 2x2+0+0 <6>[ 133.264570] ok 2 top-right x bottom-left: 2x2+0+0 x 2x2+1-1 <6>[ 133.265944] ok 3 bottom-left x top-right: 2x2+1-1 x 2x2+0+0 <6>[ 133.267152] ok 4 bottom-right x top-left: 2x2+0+0 x 2x2+1+1 <6>[ 133.268698] ok 5 right x left: 2x1+0+0 x 3x1+1+0 <6>[ 133.270176] ok 6 left x right: 3x1+1+0 x 2x1+0+0 <6>[ 133.271383] ok 7 up x bottom: 1x2+0+0 x 1x3+0-1 <6>[ 133.272897] ok 8 bottom x up: 1x3+0-1 x 1x2+0+0 <6>[ 133.274299] ok 9 touching corner: 1x1+0+0 x 2x2+1+1 <6>[ 133.275497] ok 10 touching side: 1x1+0+0 x 1x1+1+0 <6>[ 133.276959] ok 11 equal rects: 2x2+0+0 x 2x2+0+0 <6>[ 133.278308] ok 12 inside another: 2x2+0+0 x 1x1+1+1 <6>[ 133.279574] ok 13 far away: 1x1+0+0 x 1x1+3+6 <6>[ 133.281152] ok 14 points intersecting: 0x0+5+10 x 0x0+5+10 <6>[ 133.282876] ok 15 points not intersecting: 0x0+0+0 x 0x0+5+10 <6>[ 133.283170] # drm_test_rect_intersect: pass:15 fail:0 skip:0 total:15 <6>[ 133.283398] ok 5 drm_test_rect_intersect <6>[ 133.283870] KTAP version 1 <6>[ 133.284169] # Subtest: drm_test_rect_calc_hscale <6>[ 133.285313] ok 1 normal use <6>[ 133.286907] ok 2 out of max range <6>[ 133.288334] ok 3 out of min range <6>[ 133.289571] ok 4 zero dst <4>[ 133.290716] ------------[ cut here ]------------ <4>[ 133.291039] WARNING: CPU: 1 PID: 2154 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x125/0x190 <4>[ 133.291092] Modules linked in: <4>[ 133.291125] CPU: 1 UID: 0 PID: 2154 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 133.291161] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 133.291171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 133.291198] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 <4>[ 133.291226] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d <4>[ 133.291246] RSP: 0000:ffff888106677ce8 EFLAGS: 00000286 <4>[ 133.291265] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 <4>[ 133.291279] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8c7f3ac0 <4>[ 133.291291] RBP: ffff888106677d10 R08: 0000000000000000 R09: ffffed1020b41160 <4>[ 133.291310] R10: ffff888105a08b07 R11: 0000000000000000 R12: ffffffff8c7f3aa8 <4>[ 133.291328] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888106677da8 <4>[ 133.291340] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 133.291355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 133.291368] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 133.291381] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 133.291394] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 133.291408] Call Trace: <4>[ 133.291418] <4>[ 133.291436] ? show_regs+0x68/0x80 <4>[ 133.291462] ? __warn+0xd5/0x260 <4>[ 133.291481] ? drm_rect_calc_hscale+0x125/0x190 <4>[ 133.291501] ? report_bug+0x278/0x2e0 <4>[ 133.291527] ? handle_bug+0x7b/0xa0 <4>[ 133.291544] ? exc_invalid_op+0x1c/0x50 <4>[ 133.291562] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 133.291588] ? drm_rect_calc_hscale+0x125/0x190 <4>[ 133.291608] ? trace_hardirqs_on+0x37/0xe0 <4>[ 133.291739] drm_test_rect_calc_hscale+0x109/0x270 <4>[ 133.291774] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 <4>[ 133.291799] ? __schedule+0xbca/0x2590 <4>[ 133.291831] ? __pfx_read_tsc+0x10/0x10 <4>[ 133.291855] ? ktime_get_ts64+0x84/0x230 <4>[ 133.291877] kunit_try_run_case+0x1b3/0x490 <4>[ 133.291902] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.291921] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 133.291942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 133.291961] ? __kthread_parkme+0x82/0x160 <4>[ 133.291982] ? preempt_count_sub+0x50/0x80 <4>[ 133.292006] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.292025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 133.292045] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 133.292065] kthread+0x257/0x310 <4>[ 133.292084] ? __pfx_kthread+0x10/0x10 <4>[ 133.292105] ret_from_fork+0x41/0x80 <4>[ 133.292125] ? __pfx_kthread+0x10/0x10 <4>[ 133.292144] ret_from_fork_asm+0x1a/0x30 <4>[ 133.292172] <4>[ 133.292182] ---[ end trace 0000000000000000 ]--- <6>[ 133.303203] ok 5 negative src <4>[ 133.304330] ------------[ cut here ]------------ <4>[ 133.305217] WARNING: CPU: 1 PID: 2156 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x125/0x190 <4>[ 133.305293] Modules linked in: <4>[ 133.305345] CPU: 1 UID: 0 PID: 2156 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 133.305408] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 133.305428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 133.305454] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 <4>[ 133.305501] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d <4>[ 133.305539] RSP: 0000:ffff888107cffce8 EFLAGS: 00000286 <4>[ 133.305577] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 <4>[ 133.305605] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8c7f3af8 <4>[ 133.305691] RBP: ffff888107cffd10 R08: 0000000000000000 R09: ffffed1020b411a0 <4>[ 133.305725] R10: ffff888105a08d07 R11: 0000000000000000 R12: ffffffff8c7f3ae0 <4>[ 133.305752] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888107cffda8 <4>[ 133.305781] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 133.305814] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 133.305844] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 133.305871] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 133.305898] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 133.305926] Call Trace: <4>[ 133.305949] <4>[ 133.305980] ? show_regs+0x68/0x80 <4>[ 133.306034] ? __warn+0xd5/0x260 <4>[ 133.306074] ? drm_rect_calc_hscale+0x125/0x190 <4>[ 133.306121] ? report_bug+0x278/0x2e0 <4>[ 133.306171] ? handle_bug+0x7b/0xa0 <4>[ 133.306215] ? exc_invalid_op+0x1c/0x50 <4>[ 133.306256] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 133.306313] ? drm_rect_calc_hscale+0x125/0x190 <4>[ 133.306355] ? trace_hardirqs_on+0x37/0xe0 <4>[ 133.306397] drm_test_rect_calc_hscale+0x109/0x270 <4>[ 133.306442] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 <4>[ 133.306495] ? __schedule+0xbca/0x2590 <4>[ 133.306543] ? __pfx_read_tsc+0x10/0x10 <4>[ 133.306584] ? ktime_get_ts64+0x84/0x230 <4>[ 133.306696] kunit_try_run_case+0x1b3/0x490 <4>[ 133.306756] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.306802] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 133.306851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 133.306909] ? __kthread_parkme+0x82/0x160 <4>[ 133.306957] ? preempt_count_sub+0x50/0x80 <4>[ 133.307011] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.307049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 133.307088] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 133.307128] kthread+0x257/0x310 <4>[ 133.307165] ? __pfx_kthread+0x10/0x10 <4>[ 133.307203] ret_from_fork+0x41/0x80 <4>[ 133.307238] ? __pfx_kthread+0x10/0x10 <4>[ 133.307275] ret_from_fork_asm+0x1a/0x30 <4>[ 133.307324] <4>[ 133.307343] ---[ end trace 0000000000000000 ]--- <6>[ 133.321680] ok 6 negative dst <6>[ 133.321847] # drm_test_rect_calc_hscale: pass:6 fail:0 skip:0 total:6 <6>[ 133.322049] ok 6 drm_test_rect_calc_hscale <6>[ 133.322366] KTAP version 1 <6>[ 133.323104] # Subtest: drm_test_rect_calc_vscale <6>[ 133.324684] ok 1 normal use <6>[ 133.326042] ok 2 out of max range <6>[ 133.327926] ok 3 out of min range <6>[ 133.329383] ok 4 zero dst <4>[ 133.330579] ------------[ cut here ]------------ <4>[ 133.331283] WARNING: CPU: 0 PID: 2166 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x130/0x190 <4>[ 133.331334] Modules linked in: <4>[ 133.331365] CPU: 0 UID: 0 PID: 2166 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 133.331399] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 133.331410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 133.331424] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 <4>[ 133.331449] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d <4>[ 133.331469] RSP: 0000:ffff888107ee7ce8 EFLAGS: 00000286 <4>[ 133.331511] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 <4>[ 133.331544] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffff8c7f3abc <4>[ 133.331577] RBP: ffff888107ee7d10 R08: 0000000000000000 R09: ffffed1020c9ea00 <4>[ 133.331603] R10: ffff8881064f5007 R11: 0000000000000000 R12: ffffffff8c7f3aa8 <4>[ 133.331680] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888107ee7da8 <4>[ 133.331700] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 133.331716] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 133.331730] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 133.331742] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 133.331755] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 133.331767] Call Trace: <4>[ 133.331778] <4>[ 133.331813] ? show_regs+0x68/0x80 <4>[ 133.331870] ? __warn+0xd5/0x260 <4>[ 133.331908] ? drm_rect_calc_vscale+0x130/0x190 <4>[ 133.331931] ? report_bug+0x278/0x2e0 <4>[ 133.331956] ? handle_bug+0x7b/0xa0 <4>[ 133.331974] ? exc_invalid_op+0x1c/0x50 <4>[ 133.331992] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 133.332018] ? drm_rect_calc_vscale+0x130/0x190 <4>[ 133.332038] ? trace_hardirqs_on+0x37/0xe0 <4>[ 133.332059] drm_test_rect_calc_vscale+0x109/0x270 <4>[ 133.332083] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 <4>[ 133.332104] ? __schedule+0xbca/0x2590 <4>[ 133.332124] ? __pfx_read_tsc+0x10/0x10 <4>[ 133.332141] ? ktime_get_ts64+0x84/0x230 <4>[ 133.332162] kunit_try_run_case+0x1b3/0x490 <4>[ 133.332185] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.332204] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 133.332224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 133.332244] ? __kthread_parkme+0x82/0x160 <4>[ 133.332263] ? preempt_count_sub+0x50/0x80 <4>[ 133.332286] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.332304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 133.332324] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 133.332344] kthread+0x257/0x310 <4>[ 133.332363] ? __pfx_kthread+0x10/0x10 <4>[ 133.332383] ret_from_fork+0x41/0x80 <4>[ 133.332400] ? __pfx_kthread+0x10/0x10 <4>[ 133.332420] ret_from_fork_asm+0x1a/0x30 <4>[ 133.332447] <4>[ 133.332457] ---[ end trace 0000000000000000 ]--- <6>[ 133.343218] ok 5 negative src <4>[ 133.344364] ------------[ cut here ]------------ <4>[ 133.344917] WARNING: CPU: 1 PID: 2168 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x130/0x190 <4>[ 133.344985] Modules linked in: <4>[ 133.345031] CPU: 1 UID: 0 PID: 2168 Comm: kunit_try_catch Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 133.345101] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 133.345123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 133.345151] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 <4>[ 133.345202] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d <4>[ 133.345241] RSP: 0000:ffff888107cffce8 EFLAGS: 00000286 <4>[ 133.345282] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 <4>[ 133.345308] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffff8c7f3af4 <4>[ 133.345331] RBP: ffff888107cffd10 R08: 0000000000000000 R09: ffffed1020b418a0 <4>[ 133.345356] R10: ffff888105a0c507 R11: 0000000000000000 R12: ffffffff8c7f3ae0 <4>[ 133.345379] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888107cffda8 <4>[ 133.345403] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 133.345431] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 133.345455] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 133.345479] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 133.345502] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 133.345526] Call Trace: <4>[ 133.345545] <4>[ 133.345569] ? show_regs+0x68/0x80 <4>[ 133.345610] ? __warn+0xd5/0x260 <4>[ 133.345716] ? drm_rect_calc_vscale+0x130/0x190 <4>[ 133.345764] ? report_bug+0x278/0x2e0 <4>[ 133.345807] ? handle_bug+0x7b/0xa0 <4>[ 133.345841] ? exc_invalid_op+0x1c/0x50 <4>[ 133.345875] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 133.345922] ? drm_rect_calc_vscale+0x130/0x190 <4>[ 133.345959] ? trace_hardirqs_on+0x37/0xe0 <4>[ 133.345996] drm_test_rect_calc_vscale+0x109/0x270 <4>[ 133.346038] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 <4>[ 133.346079] ? __schedule+0xbca/0x2590 <4>[ 133.346116] ? __pfx_read_tsc+0x10/0x10 <4>[ 133.346149] ? ktime_get_ts64+0x84/0x230 <4>[ 133.346187] kunit_try_run_case+0x1b3/0x490 <4>[ 133.346227] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.346261] ? _raw_spin_lock_irqsave+0xa2/0x110 <4>[ 133.346297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 <4>[ 133.346333] ? __kthread_parkme+0x82/0x160 <4>[ 133.346368] ? preempt_count_sub+0x50/0x80 <4>[ 133.346411] ? __pfx_kunit_try_run_case+0x10/0x10 <4>[ 133.346446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 <4>[ 133.346483] kunit_generic_run_threadfn_adapter+0x85/0xf0 <4>[ 133.346522] kthread+0x257/0x310 <4>[ 133.346557] ? __pfx_kthread+0x10/0x10 <4>[ 133.346595] ret_from_fork+0x41/0x80 <4>[ 133.346678] ? __pfx_kthread+0x10/0x10 <4>[ 133.346721] ret_from_fork_asm+0x1a/0x30 <4>[ 133.346771] <4>[ 133.346790] ---[ end trace 0000000000000000 ]--- <6>[ 133.361137] ok 6 negative dst <6>[ 133.361277] # drm_test_rect_calc_vscale: pass:6 fail:0 skip:0 total:6 <6>[ 133.361580] ok 7 drm_test_rect_calc_vscale <6>[ 133.362220] KTAP version 1 <6>[ 133.362703] # Subtest: drm_test_rect_rotate <6>[ 133.364116] ok 1 reflect-x <6>[ 133.365798] ok 2 reflect-y <6>[ 133.367418] ok 3 rotate-0 <6>[ 133.369053] ok 4 rotate-90 <6>[ 133.371118] ok 5 rotate-180 <6>[ 133.373022] ok 6 rotate-270 <6>[ 133.373351] # drm_test_rect_rotate: pass:6 fail:0 skip:0 total:6 <6>[ 133.373739] ok 8 drm_test_rect_rotate <6>[ 133.374163] KTAP version 1 <6>[ 133.374602] # Subtest: drm_test_rect_rotate_inv <6>[ 133.376083] ok 1 reflect-x <6>[ 133.377834] ok 2 reflect-y <6>[ 133.379333] ok 3 rotate-0 <6>[ 133.381501] ok 4 rotate-90 <6>[ 133.383211] ok 5 rotate-180 <6>[ 133.384920] ok 6 rotate-270 <6>[ 133.385102] # drm_test_rect_rotate_inv: pass:6 fail:0 skip:0 total:6 <6>[ 133.385254] ok 9 drm_test_rect_rotate_inv <6>[ 133.385552] # drm_rect: pass:9 fail:0 skip:0 total:9 <6>[ 133.385886] # Totals: pass:43 fail:0 skip:0 total:43 <6>[ 133.386087] ok 76 drm_rect <6>[ 133.386929] KTAP version 1 <6>[ 133.387068] # Subtest: qos-kunit-test <6>[ 133.387215] # module: qos_test <6>[ 133.387265] 1..3 <6>[ 133.390368] ok 1 freq_qos_test_min <6>[ 133.392464] ok 2 freq_qos_test_maxdef <6>[ 133.394557] ok 3 freq_qos_test_readd <6>[ 133.395382] # qos-kunit-test: pass:3 fail:0 skip:0 total:3 <6>[ 133.395721] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 133.396020] ok 77 qos-kunit-test <6>[ 133.397250] KTAP version 1 <6>[ 133.397455] # Subtest: regmap <6>[ 133.397816] # module: regmap_kunit <6>[ 133.397910] 1..36 <6>[ 133.398409] KTAP version 1 <6>[ 133.398728] # Subtest: basic_read_write <6>[ 133.409916] ok 1 none-default @0x0 <6>[ 133.419207] ok 2 flat-default @0x0 <6>[ 133.425545] ok 3 rbtree-default @0x0 <6>[ 133.431348] ok 4 maple-default @0x0 <6>[ 133.431847] # basic_read_write: pass:4 fail:0 skip:0 total:4 <6>[ 133.432166] ok 1 basic_read_write <6>[ 133.432771] KTAP version 1 <6>[ 133.433244] # Subtest: read_bypassed <6>[ 133.440586] ok 1 flat-default @0x0 <6>[ 133.451275] ok 2 flat-default @0x2001 <6>[ 133.458876] ok 3 flat-default @0x2002 <6>[ 133.465951] ok 4 flat-default @0x2003 <6>[ 133.471602] ok 5 flat-default @0x2004 <6>[ 133.478087] ok 6 rbtree-default @0x0 <6>[ 133.483179] ok 7 rbtree-default @0x2001 <6>[ 133.490041] ok 8 rbtree-default @0x2002 <6>[ 133.496144] ok 9 rbtree-default @0x2003 <6>[ 133.500889] ok 10 rbtree-default @0x2004 <6>[ 133.507796] ok 11 maple-default @0x0 <6>[ 133.512479] ok 12 maple-default @0x2001 <6>[ 133.517958] ok 13 maple-default @0x2002 <6>[ 133.524012] ok 14 maple-default @0x2003 <6>[ 133.529300] ok 15 maple-default @0x2004 <6>[ 133.529769] # read_bypassed: pass:15 fail:0 skip:0 total:15 <6>[ 133.530077] ok 2 read_bypassed <6>[ 133.530464] KTAP version 1 <6>[ 133.530954] # Subtest: read_bypassed_volatile <6>[ 133.538048] ok 1 flat-default @0x0 <6>[ 133.545314] ok 2 flat-default @0x2001 <6>[ 133.552500] ok 3 flat-default @0x2002 <6>[ 133.561445] ok 4 flat-default @0x2003 <6>[ 133.567117] ok 5 flat-default @0x2004 <6>[ 133.572541] ok 6 rbtree-default @0x0 <6>[ 133.579483] ok 7 rbtree-default @0x2001 <6>[ 133.586249] ok 8 rbtree-default @0x2002 <6>[ 133.593824] ok 9 rbtree-default @0x2003 <6>[ 133.598325] ok 10 rbtree-default @0x2004 <6>[ 133.603277] ok 11 maple-default @0x0 <6>[ 133.610499] ok 12 maple-default @0x2001 <6>[ 133.618388] ok 13 maple-default @0x2002 <6>[ 133.625936] ok 14 maple-default @0x2003 <6>[ 133.631531] ok 15 maple-default @0x2004 <6>[ 133.631884] # read_bypassed_volatile: pass:15 fail:0 skip:0 total:15 <6>[ 133.632099] ok 3 read_bypassed_volatile <6>[ 133.632385] KTAP version 1 <6>[ 133.633111] # Subtest: bulk_write <6>[ 133.638457] ok 1 none-default @0x0 <6>[ 133.647023] ok 2 flat-default @0x0 <6>[ 133.651492] ok 3 rbtree-default @0x0 <6>[ 133.657384] ok 4 maple-default @0x0 <6>[ 133.657586] # bulk_write: pass:4 fail:0 skip:0 total:4 <6>[ 133.657808] ok 4 bulk_write <6>[ 133.658090] KTAP version 1 <6>[ 133.658369] # Subtest: bulk_read <6>[ 133.664353] ok 1 none-default @0x0 <6>[ 133.671859] ok 2 flat-default @0x0 <6>[ 133.676399] ok 3 rbtree-default @0x0 <6>[ 133.679878] ok 4 maple-default @0x0 <6>[ 133.680102] # bulk_read: pass:4 fail:0 skip:0 total:4 <6>[ 133.680288] ok 5 bulk_read <6>[ 133.680525] KTAP version 1 <6>[ 133.681136] # Subtest: multi_write <6>[ 133.685167] ok 1 none-default @0x0 <6>[ 133.689304] ok 2 flat-default @0x0 <6>[ 133.692503] ok 3 rbtree-default @0x0 <6>[ 133.696071] ok 4 maple-default @0x0 <6>[ 133.696296] # multi_write: pass:4 fail:0 skip:0 total:4 <6>[ 133.696475] ok 6 multi_write <6>[ 133.696739] KTAP version 1 <6>[ 133.696984] # Subtest: multi_read <6>[ 133.701538] ok 1 none-default @0x0 <6>[ 133.705500] ok 2 flat-default @0x0 <6>[ 133.709816] ok 3 rbtree-default @0x0 <6>[ 133.713118] ok 4 maple-default @0x0 <6>[ 133.713358] # multi_read: pass:4 fail:0 skip:0 total:4 <6>[ 133.713532] ok 7 multi_read <6>[ 133.713849] KTAP version 1 <6>[ 133.714102] # Subtest: write_readonly <4>[ 133.715795] regmap_test write_readonly.regmap_test: No cache used with register defaults set! <6>[ 133.718450] ok 1 none-default @0x0 <6>[ 133.722458] ok 2 flat-default @0x0 <6>[ 133.726012] ok 3 rbtree-default @0x0 <6>[ 133.729499] ok 4 maple-default @0x0 <6>[ 133.730195] # write_readonly: pass:4 fail:0 skip:0 total:4 <6>[ 133.730421] ok 8 write_readonly <6>[ 133.730792] KTAP version 1 <6>[ 133.731124] # Subtest: read_writeonly <6>[ 133.735289] ok 1 none-default @0x0 <6>[ 133.739328] ok 2 flat-default @0x0 <6>[ 133.743528] ok 3 rbtree-default @0x0 <6>[ 133.747913] ok 4 maple-default @0x0 <6>[ 133.748176] # read_writeonly: pass:4 fail:0 skip:0 total:4 <6>[ 133.748413] ok 9 read_writeonly <6>[ 133.748745] KTAP version 1 <6>[ 133.749071] # Subtest: reg_defaults <4>[ 133.750609] regmap_test reg_defaults.regmap_test: No cache used with register defaults set! <6>[ 133.753712] ok 1 none-default @0x0 <6>[ 133.757379] ok 2 flat-default @0x0 <6>[ 133.760823] ok 3 rbtree-default @0x0 <6>[ 133.764454] ok 4 maple-default @0x0 <6>[ 133.764772] # reg_defaults: pass:4 fail:0 skip:0 total:4 <6>[ 133.764958] ok 10 reg_defaults <6>[ 133.765193] KTAP version 1 <6>[ 133.765450] # Subtest: reg_defaults_read_dev <4>[ 133.766983] regmap_test reg_defaults_read_dev.regmap_test: No cache used with register defaults set! <6>[ 133.769818] ok 1 none-default @0x0 <4>[ 133.771774] regmap_test reg_defaults_read_dev.regmap_test: No cache defaults, reading back from HW <6>[ 133.775373] ok 2 flat-default @0x0 <4>[ 133.777133] regmap_test reg_defaults_read_dev.regmap_test: No cache defaults, reading back from HW <6>[ 133.780170] ok 3 rbtree-default @0x0 <4>[ 133.781498] regmap_test reg_defaults_read_dev.regmap_test: No cache defaults, reading back from HW <6>[ 133.783577] ok 4 maple-default @0x0 <6>[ 133.784124] # reg_defaults_read_dev: pass:4 fail:0 skip:0 total:4 <6>[ 133.784374] ok 11 reg_defaults_read_dev <6>[ 133.784764] KTAP version 1 <6>[ 133.785119] # Subtest: register_patch <4>[ 133.786576] regmap_test register_patch.regmap_test: No cache used with register defaults set! <6>[ 133.789927] ok 1 none-default @0x0 <6>[ 133.793667] ok 2 flat-default @0x0 <6>[ 133.797537] ok 3 rbtree-default @0x0 <6>[ 133.800840] ok 4 maple-default @0x0 <6>[ 133.801093] # register_patch: pass:4 fail:0 skip:0 total:4 <6>[ 133.801304] ok 12 register_patch <6>[ 133.801563] KTAP version 1 <6>[ 133.802425] # Subtest: stride <4>[ 133.803997] regmap_test stride.regmap_test: No cache used with register defaults set! <6>[ 133.807163] ok 1 none-default @0x0 <6>[ 133.811303] ok 2 flat-default @0x0 <6>[ 133.814519] ok 3 rbtree-default @0x0 <6>[ 133.818223] ok 4 maple-default @0x0 <6>[ 133.818439] # stride: pass:4 fail:0 skip:0 total:4 <6>[ 133.818604] ok 13 stride <6>[ 133.818977] KTAP version 1 <6>[ 133.819323] # Subtest: basic_ranges <6>[ 133.826940] ok 1 none-default @0x0 <6>[ 133.831242] ok 2 flat-default @0x0 <6>[ 133.834514] ok 3 rbtree-default @0x0 <6>[ 133.837858] ok 4 maple-default @0x0 <6>[ 133.838112] # basic_ranges: pass:4 fail:0 skip:0 total:4 <6>[ 133.838329] ok 14 basic_ranges <6>[ 133.838591] KTAP version 1 <6>[ 133.839336] # Subtest: stress_insert <6>[ 133.845327] ok 1 none-default @0x0 <6>[ 133.850821] ok 2 flat-default @0x0 <6>[ 133.856848] ok 3 rbtree-default @0x0 <6>[ 133.879314] kunit_try_catch (2362) used greatest stack depth: 26752 bytes left <6>[ 133.881342] ok 4 maple-default @0x0 <6>[ 133.881420] # stress_insert: pass:4 fail:0 skip:0 total:4 <6>[ 133.881669] ok 15 stress_insert <6>[ 133.881940] KTAP version 1 <6>[ 133.882256] # Subtest: cache_bypass <6>[ 133.887018] ok 1 flat-default @0x0 <6>[ 133.892676] ok 2 flat-default @0x2001 <6>[ 133.898222] ok 3 flat-default @0x2002 <6>[ 133.903076] ok 4 flat-default @0x2003 <6>[ 133.909469] ok 5 flat-default @0x2004 <6>[ 133.913371] ok 6 rbtree-default @0x0 <6>[ 133.917590] ok 7 rbtree-default @0x2001 <6>[ 133.921851] ok 8 rbtree-default @0x2002 <6>[ 133.926088] ok 9 rbtree-default @0x2003 <6>[ 133.930222] ok 10 rbtree-default @0x2004 <6>[ 133.933261] ok 11 maple-default @0x0 <6>[ 133.937891] ok 12 maple-default @0x2001 <6>[ 133.941830] ok 13 maple-default @0x2002 <6>[ 133.946222] ok 14 maple-default @0x2003 <6>[ 133.950427] ok 15 maple-default @0x2004 <6>[ 133.950789] # cache_bypass: pass:15 fail:0 skip:0 total:15 <6>[ 133.951062] ok 16 cache_bypass <6>[ 133.951334] KTAP version 1 <6>[ 133.951715] # Subtest: cache_sync_marked_dirty <6>[ 133.957916] ok 1 flat-default @0x0 <6>[ 133.968468] ok 2 flat-default @0x2001 <6>[ 133.978939] ok 3 flat-default @0x2002 <6>[ 133.990285] ok 4 flat-default @0x2003 <6>[ 134.000806] ok 5 flat-default @0x2004 <6>[ 134.004559] ok 6 rbtree-default @0x0 <6>[ 134.009851] ok 7 rbtree-default @0x2001 <6>[ 134.014332] ok 8 rbtree-default @0x2002 <6>[ 134.019080] ok 9 rbtree-default @0x2003 <6>[ 134.023890] ok 10 rbtree-default @0x2004 <6>[ 134.028166] ok 11 maple-default @0x0 <6>[ 134.032832] ok 12 maple-default @0x2001 <6>[ 134.037231] ok 13 maple-default @0x2002 <6>[ 134.042219] ok 14 maple-default @0x2003 <6>[ 134.046538] ok 15 maple-default @0x2004 <6>[ 134.047101] # cache_sync_marked_dirty: pass:15 fail:0 skip:0 total:15 <6>[ 134.047361] ok 17 cache_sync_marked_dirty <6>[ 134.047753] KTAP version 1 <6>[ 134.048127] # Subtest: cache_sync_after_cache_only <6>[ 134.053290] ok 1 flat-default @0x0 <6>[ 134.064029] ok 2 flat-default @0x2001 <6>[ 134.074906] ok 3 flat-default @0x2002 <6>[ 134.085258] ok 4 flat-default @0x2003 <6>[ 134.096122] ok 5 flat-default @0x2004 <6>[ 134.099822] ok 6 rbtree-default @0x0 <6>[ 134.104272] ok 7 rbtree-default @0x2001 <6>[ 134.108930] ok 8 rbtree-default @0x2002 <6>[ 134.113558] ok 9 rbtree-default @0x2003 <6>[ 134.118430] ok 10 rbtree-default @0x2004 <6>[ 134.122335] ok 11 maple-default @0x0 <6>[ 134.127164] ok 12 maple-default @0x2001 <6>[ 134.131448] ok 13 maple-default @0x2002 <6>[ 134.135831] ok 14 maple-default @0x2003 <6>[ 134.140296] ok 15 maple-default @0x2004 <6>[ 134.140542] # cache_sync_after_cache_only: pass:15 fail:0 skip:0 total:15 <6>[ 134.140822] ok 18 cache_sync_after_cache_only <6>[ 134.141097] KTAP version 1 <6>[ 134.141437] # Subtest: cache_sync_defaults_marked_dirty <6>[ 134.146603] ok 1 flat-default @0x0 <6>[ 134.165965] ok 2 flat-default @0x2001 <6>[ 134.185344] ok 3 flat-default @0x2002 <6>[ 134.204862] ok 4 flat-default @0x2003 <6>[ 134.241468] ok 5 flat-default @0x2004 <6>[ 134.246447] ok 6 rbtree-default @0x0 <6>[ 134.254467] ok 7 rbtree-default @0x2001 <6>[ 134.261142] ok 8 rbtree-default @0x2002 <6>[ 134.265471] ok 9 rbtree-default @0x2003 <6>[ 134.270351] ok 10 rbtree-default @0x2004 <6>[ 134.273864] ok 11 maple-default @0x0 <6>[ 134.278556] ok 12 maple-default @0x2001 <6>[ 134.283817] ok 13 maple-default @0x2002 <6>[ 134.288388] ok 14 maple-default @0x2003 <6>[ 134.293019] ok 15 maple-default @0x2004 <6>[ 134.293244] # cache_sync_defaults_marked_dirty: pass:15 fail:0 skip:0 total:15 <6>[ 134.293424] ok 19 cache_sync_defaults_marked_dirty <6>[ 134.293922] KTAP version 1 <6>[ 134.294215] # Subtest: cache_sync_default_after_cache_only <6>[ 134.299375] ok 1 flat-default @0x0 <6>[ 134.315255] ok 2 flat-default @0x2001 <6>[ 134.331096] ok 3 flat-default @0x2002 <6>[ 134.346804] ok 4 flat-default @0x2003 <6>[ 134.362610] ok 5 flat-default @0x2004 <6>[ 134.367649] ok 6 rbtree-default @0x0 <6>[ 134.372389] ok 7 rbtree-default @0x2001 <6>[ 134.377106] ok 8 rbtree-default @0x2002 <6>[ 134.381517] ok 9 rbtree-default @0x2003 <6>[ 134.386266] ok 10 rbtree-default @0x2004 <6>[ 134.389693] ok 11 maple-default @0x0 <6>[ 134.394373] ok 12 maple-default @0x2001 <6>[ 134.398825] ok 13 maple-default @0x2002 <6>[ 134.403041] ok 14 maple-default @0x2003 <6>[ 134.407660] ok 15 maple-default @0x2004 <6>[ 134.407916] # cache_sync_default_after_cache_only: pass:15 fail:0 skip:0 total:15 <6>[ 134.408105] ok 20 cache_sync_default_after_cache_only <6>[ 134.408386] KTAP version 1 <6>[ 134.408751] # Subtest: cache_sync_readonly <6>[ 134.413860] ok 1 flat-default @0x0 <6>[ 134.425572] ok 2 flat-default @0x2001 <6>[ 134.437521] ok 3 flat-default @0x2002 <6>[ 134.449761] ok 4 flat-default @0x2003 <6>[ 134.461080] ok 5 flat-default @0x2004 <6>[ 134.465586] ok 6 rbtree-default @0x0 <6>[ 134.469881] ok 7 rbtree-default @0x2001 <6>[ 134.474721] ok 8 rbtree-default @0x2002 <6>[ 134.479112] ok 9 rbtree-default @0x2003 <6>[ 134.483481] ok 10 rbtree-default @0x2004 <6>[ 134.487522] ok 11 maple-default @0x0 <6>[ 134.492340] ok 12 maple-default @0x2001 <6>[ 134.497237] ok 13 maple-default @0x2002 <6>[ 134.501538] ok 14 maple-default @0x2003 <6>[ 134.506235] ok 15 maple-default @0x2004 <6>[ 134.506551] # cache_sync_readonly: pass:15 fail:0 skip:0 total:15 <6>[ 134.507037] ok 21 cache_sync_readonly <6>[ 134.507366] KTAP version 1 <6>[ 134.507807] # Subtest: cache_sync_patch <6>[ 134.512896] ok 1 flat-default @0x0 <6>[ 134.525123] ok 2 flat-default @0x2001 <6>[ 134.537735] ok 3 flat-default @0x2002 <6>[ 134.549943] ok 4 flat-default @0x2003 <6>[ 134.562838] ok 5 flat-default @0x2004 <6>[ 134.566625] ok 6 rbtree-default @0x0 <6>[ 134.572272] ok 7 rbtree-default @0x2001 <6>[ 134.577269] ok 8 rbtree-default @0x2002 <6>[ 134.581836] ok 9 rbtree-default @0x2003 <6>[ 134.586336] ok 10 rbtree-default @0x2004 <6>[ 134.590276] ok 11 maple-default @0x0 <6>[ 134.594349] ok 12 maple-default @0x2001 <6>[ 134.599148] ok 13 maple-default @0x2002 <6>[ 134.603334] ok 14 maple-default @0x2003 <6>[ 134.607532] ok 15 maple-default @0x2004 <6>[ 134.607935] # cache_sync_patch: pass:15 fail:0 skip:0 total:15 <6>[ 134.608184] ok 22 cache_sync_patch <6>[ 134.608571] KTAP version 1 <6>[ 134.609043] # Subtest: cache_drop <6>[ 134.612926] ok 1 rbtree-default @0x0 <6>[ 134.617180] ok 2 rbtree-default @0x2001 <6>[ 134.621537] ok 3 rbtree-default @0x2002 <6>[ 134.626355] ok 4 rbtree-default @0x2003 <6>[ 134.630498] ok 5 rbtree-default @0x2004 <6>[ 134.635290] ok 6 maple-default @0x0 <6>[ 134.639482] ok 7 maple-default @0x2001 <6>[ 134.643849] ok 8 maple-default @0x2002 <6>[ 134.647810] ok 9 maple-default @0x2003 <6>[ 134.652241] ok 10 maple-default @0x2004 <6>[ 134.652537] # cache_drop: pass:10 fail:0 skip:0 total:10 <6>[ 134.652978] ok 23 cache_drop <6>[ 134.653223] KTAP version 1 <6>[ 134.653532] # Subtest: cache_drop_with_non_contiguous_ranges <6>[ 134.658757] ok 1 rbtree-default @0x0 <6>[ 134.664305] ok 2 rbtree-default @0x2001 <6>[ 134.669311] ok 3 rbtree-default @0x2002 <6>[ 134.674479] ok 4 rbtree-default @0x2003 <6>[ 134.679676] ok 5 rbtree-default @0x2004 <6>[ 134.684677] ok 6 maple-default @0x0 <6>[ 134.690209] ok 7 maple-default @0x2001 <6>[ 134.695945] ok 8 maple-default @0x2002 <6>[ 134.701504] ok 9 maple-default @0x2003 <6>[ 134.707528] ok 10 maple-default @0x2004 <6>[ 134.707850] # cache_drop_with_non_contiguous_ranges: pass:10 fail:0 skip:0 total:10 <6>[ 134.708033] ok 24 cache_drop_with_non_contiguous_ranges <6>[ 134.708300] KTAP version 1 <6>[ 134.708594] # Subtest: cache_drop_all_and_sync_marked_dirty <6>[ 134.712988] ok 1 rbtree-default @0x0 <6>[ 134.717316] ok 2 rbtree-default @0x2001 <6>[ 134.721503] ok 3 rbtree-default @0x2002 <6>[ 134.725897] ok 4 rbtree-default @0x2003 <6>[ 134.730551] ok 5 rbtree-default @0x2004 <6>[ 134.734081] ok 6 maple-default @0x0 <6>[ 134.738252] ok 7 maple-default @0x2001 <6>[ 134.742497] ok 8 maple-default @0x2002 <6>[ 134.747059] ok 9 maple-default @0x2003 <6>[ 134.751562] ok 10 maple-default @0x2004 <6>[ 134.752048] # cache_drop_all_and_sync_marked_dirty: pass:10 fail:0 skip:0 total:10 <6>[ 134.752236] ok 25 cache_drop_all_and_sync_marked_dirty <6>[ 134.752503] KTAP version 1 <6>[ 134.752862] # Subtest: cache_drop_all_and_sync_no_defaults <6>[ 134.757029] ok 1 rbtree-default @0x0 <6>[ 134.761202] ok 2 rbtree-default @0x2001 <6>[ 134.765451] ok 3 rbtree-default @0x2002 <6>[ 134.770158] ok 4 rbtree-default @0x2003 <6>[ 134.774893] ok 5 rbtree-default @0x2004 <6>[ 134.778593] ok 6 maple-default @0x0 <6>[ 134.783230] ok 7 maple-default @0x2001 <6>[ 134.787835] ok 8 maple-default @0x2002 <6>[ 134.792660] ok 9 maple-default @0x2003 <6>[ 134.797362] ok 10 maple-default @0x2004 <6>[ 134.797709] # cache_drop_all_and_sync_no_defaults: pass:10 fail:0 skip:0 total:10 <6>[ 134.797901] ok 26 cache_drop_all_and_sync_no_defaults <6>[ 134.798224] KTAP version 1 <6>[ 134.798678] # Subtest: cache_drop_all_and_sync_has_defaults <6>[ 134.802543] ok 1 rbtree-default @0x0 <6>[ 134.807208] ok 2 rbtree-default @0x2001 <6>[ 134.811464] ok 3 rbtree-default @0x2002 <6>[ 134.816118] ok 4 rbtree-default @0x2003 <6>[ 134.820514] ok 5 rbtree-default @0x2004 <6>[ 134.824213] ok 6 maple-default @0x0 <6>[ 134.829026] ok 7 maple-default @0x2001 <6>[ 134.833774] ok 8 maple-default @0x2002 <6>[ 134.837979] ok 9 maple-default @0x2003 <6>[ 134.842063] ok 10 maple-default @0x2004 <6>[ 134.842424] # cache_drop_all_and_sync_has_defaults: pass:10 fail:0 skip:0 total:10 <6>[ 134.842804] ok 27 cache_drop_all_and_sync_has_defaults <6>[ 134.843151] KTAP version 1 <6>[ 134.843527] # Subtest: cache_present <6>[ 134.847400] ok 1 rbtree-default @0x0 <6>[ 134.852018] ok 2 rbtree-default @0x2001 <6>[ 134.856437] ok 3 rbtree-default @0x2002 <6>[ 134.860516] ok 4 rbtree-default @0x2003 <6>[ 134.864818] ok 5 rbtree-default @0x2004 <6>[ 134.868360] ok 6 maple-default @0x0 <6>[ 134.873115] ok 7 maple-default @0x2001 <6>[ 134.878171] ok 8 maple-default @0x2002 <6>[ 134.883149] ok 9 maple-default @0x2003 <6>[ 134.887879] ok 10 maple-default @0x2004 <6>[ 134.888136] # cache_present: pass:10 fail:0 skip:0 total:10 <6>[ 134.888325] ok 28 cache_present <6>[ 134.888770] KTAP version 1 <6>[ 134.889041] # Subtest: cache_range_window_reg <6>[ 134.894068] ok 1 flat-default @0x0 <6>[ 134.898264] ok 2 rbtree-default @0x0 <6>[ 134.902253] ok 3 maple-default @0x0 <6>[ 134.902608] # cache_range_window_reg: pass:3 fail:0 skip:0 total:3 <6>[ 134.903131] ok 29 cache_range_window_reg <6>[ 134.903486] KTAP version 1 <6>[ 134.903942] # Subtest: raw_read_defaults_single <4>[ 134.906300] regmap_test raw_read_defaults_single.regmap_test: No cache used with register defaults set! <6>[ 134.910139] ok 1 none-little @0x0 <4>[ 134.911850] regmap_test raw_read_defaults_single.regmap_test: No cache used with register defaults set! <6>[ 134.914493] ok 2 none-big @0x0 <6>[ 134.918845] ok 3 flat-little @0x0 <6>[ 134.923224] ok 4 flat-big @0x0 <6>[ 134.926918] ok 5 rbtree-little @0x0 <6>[ 134.930279] ok 6 rbtree-big @0x0 <6>[ 134.934123] ok 7 maple-little @0x0 <6>[ 134.937493] ok 8 maple-big @0x0 <6>[ 134.937808] # raw_read_defaults_single: pass:8 fail:0 skip:0 total:8 <6>[ 134.937976] ok 30 raw_read_defaults_single <6>[ 134.938226] KTAP version 1 <6>[ 134.938532] # Subtest: raw_read_defaults <4>[ 134.940068] regmap_test raw_read_defaults.regmap_test: No cache used with register defaults set! <6>[ 134.943783] ok 1 none-little @0x0 <4>[ 134.945294] regmap_test raw_read_defaults.regmap_test: No cache used with register defaults set! <6>[ 134.948127] ok 2 none-big @0x0 <6>[ 134.952573] ok 3 flat-little @0x0 <6>[ 134.956821] ok 4 flat-big @0x0 <6>[ 134.961047] ok 5 rbtree-little @0x0 <6>[ 134.964674] ok 6 rbtree-big @0x0 <6>[ 134.968122] ok 7 maple-little @0x0 <6>[ 134.972494] ok 8 maple-big @0x0 <6>[ 134.973526] # raw_read_defaults: pass:8 fail:0 skip:0 total:8 <6>[ 134.973800] ok 31 raw_read_defaults <6>[ 134.974039] KTAP version 1 <6>[ 134.974321] # Subtest: raw_write_read_single <4>[ 134.976184] regmap_test raw_write_read_single.regmap_test: No cache used with register defaults set! <6>[ 134.980005] ok 1 none-little @0x0 <4>[ 134.981489] regmap_test raw_write_read_single.regmap_test: No cache used with register defaults set! <6>[ 134.984408] ok 2 none-big @0x0 <6>[ 134.988800] ok 3 flat-little @0x0 <6>[ 134.993174] ok 4 flat-big @0x0 <6>[ 134.996848] ok 5 rbtree-little @0x0 <6>[ 135.000760] ok 6 rbtree-big @0x0 <6>[ 135.004115] ok 7 maple-little @0x0 <6>[ 135.007496] ok 8 maple-big @0x0 <6>[ 135.007794] # raw_write_read_single: pass:8 fail:0 skip:0 total:8 <6>[ 135.007978] ok 32 raw_write_read_single <6>[ 135.008270] KTAP version 1 <6>[ 135.008908] # Subtest: raw_write <4>[ 135.010842] regmap_test raw_write.regmap_test: No cache used with register defaults set! <6>[ 135.014746] ok 1 none-little @0x0 <4>[ 135.016376] regmap_test raw_write.regmap_test: No cache used with register defaults set! <6>[ 135.019833] ok 2 none-big @0x0 <6>[ 135.023901] ok 3 flat-little @0x0 <6>[ 135.028301] ok 4 flat-big @0x0 <6>[ 135.032601] ok 5 rbtree-little @0x0 <6>[ 135.035923] ok 6 rbtree-big @0x0 <6>[ 135.039613] ok 7 maple-little @0x0 <6>[ 135.043106] ok 8 maple-big @0x0 <6>[ 135.043330] # raw_write: pass:8 fail:0 skip:0 total:8 <6>[ 135.043499] ok 33 raw_write <6>[ 135.043885] KTAP version 1 <6>[ 135.044178] # Subtest: raw_noinc_write <4>[ 135.046045] regmap_test raw_noinc_write.regmap_test: No cache used with register defaults set! <6>[ 135.049685] ok 1 none-little @0x0 <4>[ 135.051126] regmap_test raw_noinc_write.regmap_test: No cache used with register defaults set! <6>[ 135.055502] ok 2 none-big @0x0 <6>[ 135.061220] ok 3 flat-little @0x0 <6>[ 135.067215] ok 4 flat-big @0x0 <6>[ 135.072467] ok 5 rbtree-little @0x0 <6>[ 135.077226] ok 6 rbtree-big @0x0 <6>[ 135.081559] ok 7 maple-little @0x0 <6>[ 135.086988] ok 8 maple-big @0x0 <6>[ 135.087313] # raw_noinc_write: pass:8 fail:0 skip:0 total:8 <6>[ 135.087499] ok 34 raw_noinc_write <6>[ 135.088044] KTAP version 1 <6>[ 135.088485] # Subtest: raw_sync <6>[ 135.094969] ok 1 flat-little @0x0 <6>[ 135.101426] ok 2 flat-big @0x0 <6>[ 135.106992] ok 3 rbtree-little @0x0 <6>[ 135.111985] ok 4 rbtree-big @0x0 <6>[ 135.116613] ok 5 maple-little @0x0 <6>[ 135.121119] ok 6 maple-big @0x0 <6>[ 135.121418] # raw_sync: pass:6 fail:0 skip:0 total:6 <6>[ 135.121591] ok 35 raw_sync <6>[ 135.121996] KTAP version 1 <6>[ 135.122244] # Subtest: raw_ranges <6>[ 135.128788] ok 1 flat-little @0x0 <6>[ 135.133778] ok 2 flat-big @0x0 <6>[ 135.138023] ok 3 rbtree-little @0x0 <6>[ 135.142179] ok 4 rbtree-big @0x0 <6>[ 135.145767] ok 5 maple-little @0x0 <6>[ 135.149353] ok 6 maple-big @0x0 <6>[ 135.149576] # raw_ranges: pass:6 fail:0 skip:0 total:6 <6>[ 135.149834] ok 36 raw_ranges <6>[ 135.150146] # regmap: pass:36 fail:0 skip:0 total:36 <6>[ 135.150363] # Totals: pass:302 fail:0 skip:0 total:302 <6>[ 135.150608] ok 78 regmap <6>[ 135.151500] KTAP version 1 <6>[ 135.151692] # Subtest: property-entry <6>[ 135.151832] # module: property_entry_test <6>[ 135.151880] 1..7 <6>[ 135.155598] ok 1 pe_test_uints <6>[ 135.159568] ok 2 pe_test_uint_arrays <6>[ 135.162395] ok 3 pe_test_strings <6>[ 135.164417] ok 4 pe_test_bool <6>[ 135.166223] ok 5 pe_test_move_inline_u8 <6>[ 135.168122] ok 6 pe_test_move_inline_str <6>[ 135.171848] ok 7 pe_test_reference <6>[ 135.172086] # property-entry: pass:7 fail:0 skip:0 total:7 <6>[ 135.172243] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 135.172461] ok 79 property-entry <6>[ 135.173435] KTAP version 1 <6>[ 135.173578] # Subtest: scsi_lib <6>[ 135.173792] # module: scsi_mod <6>[ 135.173844] 1..1 <6>[ 135.176910] ok 1 scsi_lib_test_check_passthough <6>[ 135.176992] ok 80 scsi_lib <6>[ 135.177458] KTAP version 1 <6>[ 135.177937] # Subtest: scsi_proto <6>[ 135.178110] # module: scsi_proto_test <6>[ 135.178158] 1..1 <6>[ 135.179527] ok 1 test_scsi_proto <6>[ 135.179596] ok 81 scsi_proto <6>[ 135.180251] KTAP version 1 <6>[ 135.180397] # Subtest: input_core <6>[ 135.180543] # module: input_test <6>[ 135.180591] 1..4 <6>[ 135.182479] input: Test input device as /devices/virtual/input/input4 <6>[ 135.188255] ok 1 input_test_polling <6>[ 135.190048] input: Test input device as /devices/virtual/input/input5 <6>[ 135.195167] ok 2 input_test_timestamp <6>[ 135.196522] input: Test input device as /devices/virtual/input/input6 <6>[ 135.201504] ok 3 input_test_match_device_id <6>[ 135.203013] input: Test input device as /devices/virtual/input/input7 <6>[ 135.207438] ok 4 input_test_grab <6>[ 135.207524] # input_core: pass:4 fail:0 skip:0 total:4 <6>[ 135.207839] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 135.208085] ok 82 input_core <6>[ 135.208704] KTAP version 1 <6>[ 135.208861] # Subtest: rtc_lib_test_cases <6>[ 135.209046] # module: lib_test <6>[ 135.209093] 1..2 <6>[ 135.243431] ok 1 rtc_time64_to_tm_test_date_range_1000 <6>[ 141.738464] # rtc_time64_to_tm_test_date_range_160000.speed: slow <6>[ 141.739063] ok 2 rtc_time64_to_tm_test_date_range_160000 <6>[ 141.739389] # rtc_lib_test_cases: pass:2 fail:0 skip:0 total:2 <6>[ 141.739741] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 141.740102] ok 83 rtc_lib_test_cases <6>[ 141.740988] KTAP version 1 <6>[ 141.741169] # Subtest: sound-core-test <6>[ 141.741404] # module: sound_kunit <6>[ 141.741486] 1..10 <6>[ 141.744159] ok 1 test_phys_format_size <6>[ 141.746487] ok 2 test_format_width <4>[ 141.746842] ------------[ cut here ]------------ <4>[ 141.746902] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 141.746975] Modules linked in: <4>[ 141.747010] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 141.747045] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 141.747057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 141.747071] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 141.747116] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 141.747150] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 141.747184] RAX: 0000000080000000 RBX: ffff8881034aabc0 RCX: ffff888154200000 <4>[ 141.747199] RDX: 00000000001aafe0 RSI: ffffffff88ebc501 RDI: ffff8881543aafe0 <4>[ 141.747212] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 141.747225] R10: 00000000ac9b86ac R11: 0000000000000000 R12: ffffea00040d2a00 <4>[ 141.747238] R13: ffff8881543aafe0 R14: 0000000000200001 R15: 0000000000039408 <4>[ 141.747251] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 141.747265] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 141.747278] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 141.747290] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 141.747304] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 141.747317] Call Trace: <4>[ 141.747329] <4>[ 141.747347] ? show_regs+0x68/0x80 <4>[ 141.747373] ? __warn+0xd5/0x260 <4>[ 141.747392] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 141.747414] ? report_bug+0x278/0x2e0 <4>[ 141.747439] ? handle_bug+0x7b/0xa0 <4>[ 141.747459] ? exc_invalid_op+0x1c/0x50 <4>[ 141.747478] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 141.747503] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 141.747525] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 141.747549] rcu_core+0x683/0x1c80 <4>[ 141.747577] ? __pfx_rcu_core+0x10/0x10 <4>[ 141.747598] ? lapic_next_event+0x19/0x30 <4>[ 141.747671] ? handle_softirqs+0x18e/0x720 <4>[ 141.747701] rcu_core_si+0x12/0x20 <4>[ 141.747723] handle_softirqs+0x20c/0x720 <4>[ 141.747746] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 141.747769] irq_exit_rcu+0x9c/0xd0 <4>[ 141.747787] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 141.747809] <4>[ 141.747820] <4>[ 141.747831] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 141.747852] RIP: 0010:console_flush_all+0x77d/0xb70 <4>[ 141.747875] Code: c7 c5 e0 c6 51 8d 48 39 07 0f 83 6c fe ff ff 48 89 07 e9 64 fe ff ff e8 21 11 25 00 e9 dc fc ff ff e8 67 12 25 00 fb 4c 89 f0 <48> c1 e8 03 42 80 3c 38 00 0f 85 57 03 00 00 48 8b 85 40 ff ff ff <4>[ 141.747893] RSP: 0000:ffff88810030f710 EFLAGS: 00000292 <4>[ 141.747911] RAX: ffffffff8d97f998 RBX: ffffffff8d97f940 RCX: 0000000000000000 <4>[ 141.747925] RDX: 0000000000000000 RSI: ffffffff889d1060 RDI: ffffffff889d0ba9 <4>[ 141.747937] RBP: ffff88810030f7f0 R08: 0000000000000001 R09: ffffed1020061ed2 <4>[ 141.747950] R10: 0000000000000003 R11: 205d393531343437 R12: ffff88810030f7c8 <4>[ 141.747962] R13: ffffffff8d51c6e0 R14: ffffffff8d97f998 R15: dffffc0000000000 <4>[ 141.747982] ? console_unlock+0xb0/0x250 <4>[ 141.748000] ? console_flush_all+0x779/0xb70 <4>[ 141.748026] ? __pfx_console_flush_all+0x10/0x10 <4>[ 141.748050] ? __kasan_check_write+0x18/0x20 <4>[ 141.748072] console_unlock+0xb0/0x250 <4>[ 141.748093] ? __pfx_console_unlock+0x10/0x10 <4>[ 141.748112] ? __down_trylock_console_sem.isra.0+0x5d/0x70 <4>[ 141.748133] ? console_trylock+0x60/0x100 <4>[ 141.748151] ? trace_hardirqs_on+0x37/0xe0 <4>[ 141.748173] vprintk_emit+0x138/0x3e0 <4>[ 141.748195] vprintk_default+0x21/0x30 <4>[ 141.748214] vprintk+0x35/0x40 <4>[ 141.748232] _printk+0xc0/0xf0 <4>[ 141.748250] ? __pfx__printk+0x10/0x10 <4>[ 141.748270] ? kunit_print_attr+0x137/0x370 <4>[ 141.748289] ? kunit_run_case_catch_errors+0x191/0x320 <4>[ 141.748315] kunit_print_ok_not_ok+0x196/0x1e0 <4>[ 141.748338] kunit_run_tests+0x7ac/0x1000 <4>[ 141.748367] ? __pfx_kunit_run_tests+0x10/0x10 <4>[ 141.748389] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 <4>[ 141.748410] ? __pfx_kunit_catch_run_case_cleanup+0x10/0x10 <4>[ 141.748446] ? trace_preempt_on+0x20/0xc0 <4>[ 141.748462] ? trace_preempt_off+0x20/0xc0 <4>[ 141.748478] ? string_stream_clear+0x35/0x210 <4>[ 141.748501] ? _raw_spin_unlock+0x41/0x70 <4>[ 141.748520] ? string_stream_clear+0x176/0x210 <4>[ 141.748540] __kunit_test_suites_init+0x130/0x1c0 <4>[ 141.748562] kunit_run_all_tests+0x3bf/0x400 <4>[ 141.748582] ? __pfx_kunit_run_all_tests+0x10/0x10 <4>[ 141.748601] ? kernel_init_freeable+0x450/0x6f0 <4>[ 141.748670] ? __kasan_slab_free+0x69/0x80 <4>[ 141.748697] ? kfree+0x21a/0x330 <4>[ 141.748714] ? blake2s_update+0xb1/0x1a0 <4>[ 141.748737] kernel_init_freeable+0x455/0x6f0 <4>[ 141.748759] ? __pfx_kernel_init+0x10/0x10 <4>[ 141.748778] kernel_init+0x23/0x1e0 <4>[ 141.748796] ret_from_fork+0x41/0x80 <4>[ 141.748816] ? __pfx_kernel_init+0x10/0x10 <4>[ 141.748834] ret_from_fork_asm+0x1a/0x30 <4>[ 141.748862] <4>[ 141.748873] ---[ end trace 0000000000000000 ]--- <6>[ 141.774432] ok 3 test_format_endianness <6>[ 141.776319] ok 4 test_format_signed <6>[ 141.780982] ok 5 test_format_fill_silence <6>[ 141.784098] ok 6 test_playback_avail <6>[ 141.787025] ok 7 test_capture_avail <6>[ 141.788478] # test_card_set_id: Testname <6>[ 141.789895] ok 8 test_card_set_id <6>[ 141.792598] ok 9 test_pcm_format_name <6>[ 141.795107] ok 10 test_card_add_component <6>[ 141.795541] # sound-core-test: pass:10 fail:0 skip:0 total:10 <6>[ 141.796155] # Totals: pass:10 fail:0 skip:0 total:10 <6>[ 141.796599] ok 84 sound-core-test <6>[ 141.799100] KTAP version 1 <6>[ 141.799384] # Subtest: snd-hda-scodec-cs35l56-test <6>[ 141.800199] # module: snd_hda_cirrus_scodec_test <6>[ 141.800303] 1..2 <6>[ 141.801047] KTAP version 1 <6>[ 141.801396] # Subtest: cirrus_scodec_test_spkid_parse <6>[ 141.815857] ok 1 amps:2 gpios_per_amp:1 num_amps_sharing:1 <6>[ 141.828016] ok 2 amps:2 gpios_per_amp:2 num_amps_sharing:1 <6>[ 141.842405] ok 3 amps:2 gpios_per_amp:3 num_amps_sharing:1 <6>[ 141.864439] ok 4 amps:2 gpios_per_amp:4 num_amps_sharing:1 <6>[ 141.877289] ok 5 amps:3 gpios_per_amp:1 num_amps_sharing:1 <6>[ 141.886723] ok 6 amps:3 gpios_per_amp:2 num_amps_sharing:1 <6>[ 141.898022] ok 7 amps:3 gpios_per_amp:3 num_amps_sharing:1 <6>[ 141.917266] ok 8 amps:3 gpios_per_amp:4 num_amps_sharing:1 <6>[ 141.925727] ok 9 amps:4 gpios_per_amp:1 num_amps_sharing:1 <6>[ 141.936436] ok 10 amps:4 gpios_per_amp:2 num_amps_sharing:1 <6>[ 141.949961] ok 11 amps:4 gpios_per_amp:3 num_amps_sharing:1 <6>[ 141.973941] ok 12 amps:4 gpios_per_amp:4 num_amps_sharing:1 <6>[ 141.981382] ok 13 amps:2 gpios_per_amp:1 num_amps_sharing:2 <6>[ 141.989559] ok 14 amps:2 gpios_per_amp:2 num_amps_sharing:2 <6>[ 141.998014] ok 15 amps:2 gpios_per_amp:3 num_amps_sharing:2 <6>[ 142.010598] ok 16 amps:2 gpios_per_amp:4 num_amps_sharing:2 <6>[ 142.018317] ok 17 amps:3 gpios_per_amp:1 num_amps_sharing:3 <6>[ 142.027254] ok 18 amps:3 gpios_per_amp:2 num_amps_sharing:3 <6>[ 142.036283] ok 19 amps:3 gpios_per_amp:3 num_amps_sharing:3 <6>[ 142.049541] ok 20 amps:3 gpios_per_amp:4 num_amps_sharing:3 <6>[ 142.057839] ok 21 amps:4 gpios_per_amp:1 num_amps_sharing:4 <6>[ 142.068356] ok 22 amps:4 gpios_per_amp:2 num_amps_sharing:4 <6>[ 142.079188] ok 23 amps:4 gpios_per_amp:3 num_amps_sharing:4 <6>[ 142.096317] ok 24 amps:4 gpios_per_amp:4 num_amps_sharing:4 <6>[ 142.104954] ok 25 amps:4 gpios_per_amp:1 num_amps_sharing:2 <6>[ 142.113984] ok 26 amps:4 gpios_per_amp:2 num_amps_sharing:2 <6>[ 142.124376] ok 27 amps:4 gpios_per_amp:3 num_amps_sharing:2 <6>[ 142.143859] ok 28 amps:4 gpios_per_amp:4 num_amps_sharing:2 <6>[ 142.144326] # cirrus_scodec_test_spkid_parse: pass:28 fail:0 skip:0 total:28 <6>[ 142.144580] ok 1 cirrus_scodec_test_spkid_parse <6>[ 142.151650] ok 2 cirrus_scodec_test_no_spkid <6>[ 142.152490] # snd-hda-scodec-cs35l56-test: pass:2 fail:0 skip:0 total:2 <6>[ 142.152976] # Totals: pass:29 fail:0 skip:0 total:29 <6>[ 142.153240] ok 85 snd-hda-scodec-cs35l56-test <6>[ 142.153861] KTAP version 1 <6>[ 142.154031] # Subtest: dev-addr-list-test <6>[ 142.154240] # module: dev_addr_lists_test <6>[ 142.154289] 1..6 <6>[ 142.198256] ok 1 dev_addr_test_basic <6>[ 142.230667] ok 2 dev_addr_test_sync_one <6>[ 142.261685] ok 3 dev_addr_test_add_del <6>[ 142.283385] ok 4 dev_addr_test_del_main <6>[ 142.322552] ok 5 dev_addr_test_add_set <6>[ 142.344071] ok 6 dev_addr_test_add_excl <6>[ 142.344585] # dev-addr-list-test: pass:6 fail:0 skip:0 total:6 <6>[ 142.345090] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 142.345533] ok 86 dev-addr-list-test <6>[ 142.346923] KTAP version 1 <6>[ 142.347212] # Subtest: net_core <6>[ 142.347502] # module: net_test <6>[ 142.347602] 1..2 <6>[ 142.348269] KTAP version 1 <6>[ 142.348605] # Subtest: gso_test_func <6>[ 142.355538] ok 1 no_gso <6>[ 142.357964] ok 2 linear <6>[ 142.363297] ok 3 frags <6>[ 142.366057] ok 4 frags_pure <6>[ 142.369275] ok 5 gso_partial <6>[ 142.373401] ok 6 frag_list <6>[ 142.376127] ok 7 frag_list_pure <6>[ 142.379296] ok 8 frag_list_non_uniform <6>[ 142.381797] ok 9 gso_by_frags <6>[ 142.382261] # gso_test_func: pass:9 fail:0 skip:0 total:9 <6>[ 142.382604] ok 1 gso_test_func <6>[ 142.383818] KTAP version 1 <6>[ 142.384354] # Subtest: ip_tunnel_flags_test_run <6>[ 142.386911] ok 1 compat <6>[ 142.388978] ok 2 conflict <6>[ 142.390455] ok 3 new <6>[ 142.390790] # ip_tunnel_flags_test_run: pass:3 fail:0 skip:0 total:3 <6>[ 142.390982] ok 2 ip_tunnel_flags_test_run <6>[ 142.391252] # net_core: pass:2 fail:0 skip:0 total:2 <6>[ 142.391448] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 142.391702] ok 87 net_core <6>[ 142.392232] KTAP version 1 <6>[ 142.392377] # Subtest: RFC 3961 tests <6>[ 142.392508] 1..1 <6>[ 142.392871] KTAP version 1 <6>[ 142.393026] # Subtest: RFC 3961 n-fold <6>[ 142.395706] ok 1 64-fold("012345") <6>[ 142.397553] ok 2 56-fold("password") <6>[ 142.399266] ok 3 64-fold("Rough Consensus, and Running Code") <6>[ 142.401809] ok 4 168-fold("password") <6>[ 142.403791] ok 5 192-fold("MASSACHVSETTS INSTITVTE OF TECHNOLOGY") <6>[ 142.405386] ok 6 168-fold("Q") <6>[ 142.407799] ok 7 168-fold("ba") <6>[ 142.409891] ok 8 64-fold("kerberos") <6>[ 142.411838] ok 9 128-fold("kerberos") <6>[ 142.413622] ok 10 168-fold("kerberos") <6>[ 142.415582] ok 11 256-fold("kerberos") <6>[ 142.415903] # RFC 3961 n-fold: pass:11 fail:0 skip:0 total:11 <6>[ 142.416087] ok 1 RFC 3961 n-fold <6>[ 142.416310] # Totals: pass:11 fail:0 skip:0 total:11 <6>[ 142.416484] ok 88 RFC 3961 tests <6>[ 142.417399] KTAP version 1 <6>[ 142.417544] # Subtest: RFC 3962 suite <6>[ 142.417783] 1..1 <6>[ 142.417936] KTAP version 1 <6>[ 142.418116] # Subtest: RFC 3962 encryption <6>[ 142.450149] ok 1 Encrypt with aes128-cts-hmac-sha1-96 case 1 <6>[ 142.452093] ok 2 Encrypt with aes128-cts-hmac-sha1-96 case 2 <6>[ 142.453800] ok 3 Encrypt with aes128-cts-hmac-sha1-96 case 3 <6>[ 142.456075] ok 4 Encrypt with aes128-cts-hmac-sha1-96 case 4 <6>[ 142.457771] ok 5 Encrypt with aes128-cts-hmac-sha1-96 case 5 <6>[ 142.459473] ok 6 Encrypt with aes128-cts-hmac-sha1-96 case 6 <6>[ 142.459892] # RFC 3962 encryption: pass:6 fail:0 skip:0 total:6 <6>[ 142.460196] ok 1 RFC 3962 encryption <6>[ 142.460507] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 142.461050] ok 89 RFC 3962 suite <6>[ 142.461556] KTAP version 1 <6>[ 142.461786] # Subtest: RFC 6803 suite <6>[ 142.461927] 1..3 <6>[ 142.462054] KTAP version 1 <6>[ 142.462222] # Subtest: RFC 6803 key derivation <6>[ 142.463500] ok 1 Derive Kc subkey for camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.465086] ok 2 Derive Ke subkey for camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.466536] ok 3 Derive Ki subkey for camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.468984] ok 4 Derive Kc subkey for camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.470351] ok 5 Derive Ke subkey for camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.472009] ok 6 Derive Ki subkey for camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.472484] # RFC 6803 key derivation: pass:0 fail:0 skip:6 total:6 <6>[ 142.473247] ok 1 RFC 6803 key derivation # SKIP <6>[ 142.473605] KTAP version 1 <6>[ 142.474120] # Subtest: RFC 6803 checksum <6>[ 142.475377] ok 1 camellia128-cts-cmac checksum test 1 # SKIP Encryption type is not available <6>[ 142.476576] ok 2 camellia128-cts-cmac checksum test 2 # SKIP Encryption type is not available <6>[ 142.478050] ok 3 camellia256-cts-cmac checksum test 3 # SKIP Encryption type is not available <6>[ 142.479599] ok 4 camellia256-cts-cmac checksum test 4 # SKIP Encryption type is not available <6>[ 142.480113] # RFC 6803 checksum: pass:0 fail:0 skip:4 total:4 <6>[ 142.480482] ok 2 RFC 6803 checksum # SKIP <6>[ 142.481014] KTAP version 1 <6>[ 142.481375] # Subtest: RFC 6803 encryption <6>[ 142.482881] ok 1 Encrypt empty plaintext with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.484278] ok 2 Encrypt 1 byte with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.485716] ok 3 Encrypt 9 bytes with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.487357] ok 4 Encrypt 13 bytes with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.488934] ok 5 Encrypt 30 bytes with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.490229] ok 6 Encrypt empty plaintext with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.491747] ok 7 Encrypt 1 byte with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.493351] ok 8 Encrypt 9 bytes with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.495045] ok 9 Encrypt 13 bytes with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.496420] ok 10 Encrypt 30 bytes with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.497069] # RFC 6803 encryption: pass:0 fail:0 skip:10 total:10 <6>[ 142.497395] ok 3 RFC 6803 encryption # SKIP <6>[ 142.497733] # RFC 6803 suite: pass:0 fail:0 skip:3 total:3 <6>[ 142.497934] # Totals: pass:0 fail:0 skip:20 total:20 <6>[ 142.498142] ok 90 RFC 6803 suite # SKIP <6>[ 142.498936] KTAP version 1 <6>[ 142.499121] # Subtest: RFC 8009 suite <6>[ 142.499268] 1..3 <6>[ 142.499477] KTAP version 1 <6>[ 142.499697] # Subtest: RFC 8009 key derivation <6>[ 142.500868] ok 1 Derive Kc subkey for aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.502435] ok 2 Derive Ke subkey for aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.503980] ok 3 Derive Ki subkey for aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.505457] ok 4 Derive Kc subkey for aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.507195] ok 5 Derive Ke subkey for aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.508872] ok 6 Derive Ki subkey for aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.509389] # RFC 8009 key derivation: pass:0 fail:0 skip:6 total:6 <6>[ 142.511207] ok 1 RFC 8009 key derivation # SKIP <6>[ 142.511598] KTAP version 1 <6>[ 142.512000] # Subtest: RFC 8009 checksum <6>[ 142.513273] ok 1 Checksum with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.514795] ok 2 Checksum with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.515170] # RFC 8009 checksum: pass:0 fail:0 skip:2 total:2 <6>[ 142.515459] ok 2 RFC 8009 checksum # SKIP <6>[ 142.515827] KTAP version 1 <6>[ 142.516132] # Subtest: RFC 8009 encryption <6>[ 142.517241] ok 1 Encrypt empty plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.518747] ok 2 Encrypt short plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.520061] ok 3 Encrypt block plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.521363] ok 4 Encrypt long plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.522958] ok 5 Encrypt empty plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.524500] ok 6 Encrypt short plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.526134] ok 7 Encrypt block plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.528403] ok 8 Encrypt long plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.528954] # RFC 8009 encryption: pass:0 fail:0 skip:8 total:8 <6>[ 142.529368] ok 3 RFC 8009 encryption # SKIP <6>[ 142.529921] # RFC 8009 suite: pass:0 fail:0 skip:3 total:3 <6>[ 142.530128] # Totals: pass:0 fail:0 skip:16 total:16 <6>[ 142.530368] ok 91 RFC 8009 suite # SKIP <6>[ 142.531038] KTAP version 1 <6>[ 142.531161] # Subtest: Encryption test suite <6>[ 142.531306] 1..1 <6>[ 142.531451] KTAP version 1 <6>[ 142.531592] # Subtest: Encryption self-tests <6>[ 142.536370] ok 1 aes128-cts-hmac-sha1-96 encryption self-test <6>[ 142.538106] ok 2 aes256-cts-hmac-sha1-96 encryption self-test <6>[ 142.539500] ok 3 camellia128-cts-cmac encryption self-test # SKIP Encryption type is not available <6>[ 142.540937] ok 4 camellia256-cts-cmac encryption self-test # SKIP Encryption type is not available <6>[ 142.542314] ok 5 aes128-cts-hmac-sha256-128 encryption self-test # SKIP Encryption type is not available <6>[ 142.543919] ok 6 aes256-cts-hmac-sha384-192 encryption self-test # SKIP Encryption type is not available <6>[ 142.544322] # Encryption self-tests: pass:2 fail:0 skip:4 total:6 <6>[ 142.544836] ok 1 Encryption self-tests <6>[ 142.545057] # Totals: pass:2 fail:0 skip:4 total:6 <6>[ 142.545220] ok 92 Encryption test suite <6>[ 142.546016] KTAP version 1 <6>[ 142.546142] # Subtest: cfg80211-element-defragmentation <6>[ 142.546309] # module: cfg80211_tests <6>[ 142.546356] 1..4 <6>[ 142.549223] ok 1 defragment_0 <6>[ 142.551045] ok 2 defragment_1 <6>[ 142.553251] ok 3 defragment_2 <6>[ 142.555337] ok 4 defragment_at_end <6>[ 142.555516] # cfg80211-element-defragmentation: pass:4 fail:0 skip:0 total:4 <6>[ 142.555746] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 142.555977] ok 93 cfg80211-element-defragmentation <6>[ 142.556467] KTAP version 1 <6>[ 142.556575] # Subtest: cfg80211-scan-6ghz <6>[ 142.556910] # module: cfg80211_tests <6>[ 142.556958] 1..1 <6>[ 142.557238] KTAP version 1 <6>[ 142.557454] # Subtest: test_cfg80211_parse_colocated_ap <6>[ 142.560408] ok 1 wrong_band <6>[ 142.562333] ok 2 wrong_type <6>[ 142.564174] ok 3 colocated_invalid_len_short <6>[ 142.565686] ok 4 colocated_invalid_len_short_mld <6>[ 142.567686] ok 5 colocated_non_mld <6>[ 142.569169] ok 6 colocated_non_mld_invalid_bssid <6>[ 142.570580] ok 7 colocated_mld <6>[ 142.572145] ok 8 colocated_mld <6>[ 142.573746] ok 9 colocated_disabled_mld <6>[ 142.573966] # test_cfg80211_parse_colocated_ap: pass:9 fail:0 skip:0 total:9 <6>[ 142.574154] ok 1 test_cfg80211_parse_colocated_ap <6>[ 142.574399] # Totals: pass:9 fail:0 skip:0 total:9 <6>[ 142.574588] ok 94 cfg80211-scan-6ghz <6>[ 142.575363] KTAP version 1 <6>[ 142.575501] # Subtest: cfg80211-inform-bss <6>[ 142.575928] # module: cfg80211_tests <6>[ 142.575978] 1..2 <6>[ 142.582078] ok 1 test_inform_bss_ssid_only <6>[ 142.582223] KTAP version 1 <6>[ 142.582605] # Subtest: test_inform_bss_ml_sta <6>[ 142.588095] ok 1 zero_mld_id <6>[ 142.590575] ok 2 zero_mld_id_with_oper_class <6>[ 142.594164] ok 3 mld_id_eq_1 <6>[ 142.596472] ok 4 mld_id_eq_1_with_oper_class <6>[ 142.599168] ok 5 nstr <6>[ 142.599428] # test_inform_bss_ml_sta: pass:5 fail:0 skip:0 total:5 <6>[ 142.599762] ok 2 test_inform_bss_ml_sta <6>[ 142.600117] # cfg80211-inform-bss: pass:2 fail:0 skip:0 total:2 <6>[ 142.600310] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 142.600808] ok 95 cfg80211-inform-bss <6>[ 142.601573] KTAP version 1 <6>[ 142.601797] # Subtest: cfg80211-ie-generation <6>[ 142.602061] # module: cfg80211_tests <6>[ 142.602135] 1..2 <6>[ 142.602485] KTAP version 1 <6>[ 142.602721] # Subtest: test_gen_new_ie <6>[ 142.606315] ok 1 ML not inherited <6>[ 142.608372] ok 2 fragments are ignored if previous len not 255 <6>[ 142.611209] ok 3 fragments inherited <6>[ 142.613176] ok 4 fragments copied <6>[ 142.615069] ok 5 multiple elements inherit <6>[ 142.617460] ok 6 one child element overrides <6>[ 142.619873] ok 7 empty elements from parent <6>[ 142.622596] ok 8 empty elements from child <6>[ 142.624963] ok 9 invalid extended elements ignored <6>[ 142.627258] ok 10 multiple extended elements <6>[ 142.629488] ok 11 non-inherit element <6>[ 142.629872] # test_gen_new_ie: pass:11 fail:0 skip:0 total:11 <6>[ 142.630073] ok 1 test_gen_new_ie <6>[ 142.632499] ok 2 test_gen_new_ie_malformed <6>[ 142.633312] # cfg80211-ie-generation: pass:2 fail:0 skip:0 total:2 <6>[ 142.633766] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 142.634152] ok 96 cfg80211-ie-generation <6>[ 142.635124] KTAP version 1 <6>[ 142.635351] # Subtest: cfg80211-chandef-compat <6>[ 142.635700] # module: cfg80211_tests <6>[ 142.635794] 1..1 <6>[ 142.636243] KTAP version 1 <6>[ 142.636516] # Subtest: test_chandef_compat <6>[ 142.639199] ok 1 identical non-HT <6>[ 142.641287] ok 2 identical 20 MHz <6>[ 142.642800] ok 3 identical 40 MHz <6>[ 142.644137] ok 4 identical 80 MHz <6>[ 142.645920] ok 5 identical 160 MHz <6>[ 142.648454] ok 6 identical 320 MHz <6>[ 142.650334] ok 7 20 MHz in 320 MHz <6>[ 142.652464] ok 8 different 20 MHz <6>[ 142.654190] ok 9 different primary 320 MHz <6>[ 142.658097] ok 10 matching primary 160 MHz <6>[ 142.660870] ok 11 matching primary 160 MHz & punctured secondary 160 Mhz <6>[ 142.662975] ok 12 matching primary 160 MHz & punctured matching <6>[ 142.664937] ok 13 matching primary 160 MHz & punctured not matching <6>[ 142.665204] # test_chandef_compat: pass:13 fail:0 skip:0 total:13 <6>[ 142.665540] ok 1 test_chandef_compat <6>[ 142.666026] # Totals: pass:13 fail:0 skip:0 total:13 <6>[ 142.666188] ok 97 cfg80211-chandef-compat <6>[ 142.666859] KTAP version 1 <6>[ 142.667039] # Subtest: mac80211-element-parsing <6>[ 142.667201] # module: mac80211_tests <6>[ 142.667248] 1..1 <6>[ 142.673030] ok 1 mle_defrag <6>[ 142.673170] ok 98 mac80211-element-parsing <6>[ 142.674114] KTAP version 1 <6>[ 142.674330] # Subtest: mac80211-mfp <6>[ 142.674588] # module: mac80211_tests <6>[ 142.674876] 1..1 <6>[ 142.675342] KTAP version 1 <6>[ 142.675742] # Subtest: accept_mfp <6>[ 142.678336] ok 1 public action: accept unicast from unknown peer <6>[ 142.680206] ok 2 public action: accept multicast from unknown peer <6>[ 142.682444] ok 3 public action: accept unicast without MFP <6>[ 142.685235] ok 4 public action: accept multicast without MFP <6>[ 142.687397] ok 5 public action: drop unicast with MFP <6>[ 142.689167] ok 6 public action: accept multicast with MFP <6>[ 142.691217] ok 7 protected dual: drop unicast from unknown peer <6>[ 142.693014] ok 8 protected dual: drop multicast from unknown peer <6>[ 142.695513] ok 9 protected dual: drop unicast without MFP <6>[ 142.697835] ok 10 protected dual: drop multicast without MFP <6>[ 142.700025] ok 11 protected dual: drop undecrypted unicast with MFP <6>[ 142.702382] ok 12 protected dual: drop undecrypted multicast with MFP <6>[ 142.704462] ok 13 protected dual: accept unicast with MFP <6>[ 142.707184] ok 14 protected dual: accept multicast with MFP <6>[ 142.709405] ok 15 deauth: accept unicast with MFP but w/o key <6>[ 142.711545] ok 16 disassoc: accept unicast with MFP but w/o key <6>[ 142.713916] ok 17 BA action: drop unicast before assoc <6>[ 142.716093] ok 18 BA action: drop unprotected after assoc <6>[ 142.718467] ok 19 BA action: accept unprotected without MFP <6>[ 142.720943] ok 20 BA action: drop unprotected with MFP <6>[ 142.721307] # accept_mfp: pass:20 fail:0 skip:0 total:20 <6>[ 142.721696] ok 1 accept_mfp <6>[ 142.722015] # Totals: pass:20 fail:0 skip:0 total:20 <6>[ 142.722205] ok 99 mac80211-mfp <6>[ 142.723087] KTAP version 1 <6>[ 142.723294] # Subtest: mac80211-tpe <6>[ 142.723542] # module: mac80211_tests <6>[ 142.723669] 1..2 <6>[ 142.724091] KTAP version 1 <6>[ 142.724282] # Subtest: subchan_offset <6>[ 142.726150] ok 1 identical 20 MHz <6>[ 142.728105] ok 2 identical 40 MHz <6>[ 142.730281] ok 3 identical 80+80 MHz <6>[ 142.734629] ok 4 identical 320 MHz <6>[ 142.736833] ok 5 lower 160 MHz of 320 MHz <6>[ 142.738377] ok 6 upper 160 MHz of 320 MHz <6>[ 142.740153] ok 7 upper 160 MHz of 320 MHz, go to 40 <6>[ 142.742799] ok 8 secondary 80 above primary in 80+80 MHz <6>[ 142.744958] ok 9 secondary 80 below primary in 80+80 MHz <6>[ 142.747562] ok 10 secondary 80 below primary in 80+80 MHz, go to 20 <6>[ 142.748313] # subchan_offset: pass:10 fail:0 skip:0 total:10 <6>[ 142.748861] ok 1 subchan_offset <6>[ 142.749322] KTAP version 1 <6>[ 142.749892] # Subtest: psd_reorder <6>[ 142.752789] ok 1 no changes, 320 MHz <6>[ 142.754295] ok 2 no changes, 320 MHz, 160 MHz used, n=0 <6>[ 142.755944] ok 3 320 MHz, HE is 80, used 160, all lower <6>[ 142.758186] ok 4 320 MHz, HE is 80, used 160, all upper <6>[ 142.760278] ok 5 320 MHz, HE is 80, used 160, split <6>[ 142.761486] # psd_reorder: pass:5 fail:0 skip:0 total:5 <6>[ 142.762038] ok 2 psd_reorder <6>[ 142.762417] # mac80211-tpe: pass:2 fail:0 skip:0 total:2 <6>[ 142.762804] # Totals: pass:15 fail:0 skip:0 total:15 <6>[ 142.763169] ok 100 mac80211-tpe <6>[ 142.764124] KTAP version 1 <6>[ 142.764326] # Subtest: mptcp-crypto <6>[ 142.764576] # module: mptcp_crypto_test <6>[ 142.764848] 1..1 <6>[ 142.768687] ok 1 mptcp_crypto_test_basic <6>[ 142.768758] ok 101 mptcp-crypto <6>[ 142.769479] KTAP version 1 <6>[ 142.769826] # Subtest: mptcp-token <6>[ 142.770061] # module: mptcp_token_test <6>[ 142.770157] 1..4 <6>[ 142.772895] ok 1 mptcp_token_test_req_basic <6>[ 142.776085] ok 2 mptcp_token_test_msk_basic <6>[ 142.778485] ok 3 mptcp_token_test_accept <6>[ 142.780984] ok 4 mptcp_token_test_destroyed <6>[ 142.781246] # mptcp-token: pass:4 fail:0 skip:0 total:4 <6>[ 142.781578] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 142.782169] ok 102 mptcp-token <6>[ 142.783112] KTAP version 1 <6>[ 142.783332] # Subtest: Handshake API tests <6>[ 142.783521] 1..11 <6>[ 142.783837] KTAP version 1 <6>[ 142.784150] # Subtest: req_alloc API fuzzing <6>[ 142.786241] ok 1 handshake_req_alloc NULL proto <6>[ 142.788161] ok 2 handshake_req_alloc CLASS_NONE <6>[ 142.790156] ok 3 handshake_req_alloc CLASS_MAX <6>[ 142.791778] ok 4 handshake_req_alloc no callbacks <6>[ 142.795030] ok 5 handshake_req_alloc no done callback <6>[ 142.796903] ok 6 handshake_req_alloc excessive privsize <6>[ 142.798753] ok 7 handshake_req_alloc all good <6>[ 142.799035] # req_alloc API fuzzing: pass:7 fail:0 skip:0 total:7 <6>[ 142.799237] ok 1 req_alloc API fuzzing <6>[ 142.804411] ok 2 req_submit NULL req arg <6>[ 142.806457] ok 3 req_submit NULL sock arg <6>[ 142.808993] ok 4 req_submit NULL sock->file <6>[ 142.814057] ok 5 req_lookup works <6>[ 142.816512] ok 6 req_submit max pending <6>[ 142.819243] ok 7 req_submit multiple <6>[ 142.822046] ok 8 req_cancel before accept <6>[ 142.824548] ok 9 req_cancel after accept <6>[ 142.827592] ok 10 req_cancel after done <6>[ 142.830852] ok 11 req_destroy works <6>[ 142.831127] # Handshake API tests: pass:11 fail:0 skip:0 total:11 <6>[ 142.831424] # Totals: pass:17 fail:0 skip:0 total:17 <6>[ 142.832073] ok 103 Handshake API tests <6>[ 142.845463] md: Waiting for all devices to be available before autodetect <6>[ 142.846115] md: If you don't use raid, use raid=noautodetect <6>[ 142.846488] md: Autodetecting RAID arrays. <6>[ 142.846817] md: autorun ... <6>[ 142.847016] md: ... autorun DONE. <6>[ 142.901787] EXT4-fs (sda): mounted filesystem 4765b28f-6bf8-4076-a1c9-63cfe0d3f681 r/w with ordered data mode. Quota mode: none. <6>[ 142.903912] VFS: Mounted root (ext4 filesystem) on device 8:0. <6>[ 142.910560] devtmpfs: mounted <6>[ 143.107198] Freeing unused kernel image (initmem) memory: 7804K <6>[ 143.108384] Write protecting the kernel read-only data: 81920k <6>[ 143.112578] Freeing unused kernel image (rodata/data gap) memory: 1492K <6>[ 143.287850] x86/mm: Checked W+X mappings: passed, no W+X pages found. <6>[ 143.288819] x86/mm: Checking user space page tables <6>[ 143.453827] x86/mm: Checked W+X mappings: passed, no W+X pages found. <6>[ 143.455206] Run /sbin/init as init process <7>[ 143.455791] with arguments: <7>[ 143.456069] /sbin/init <7>[ 143.456303] verbose <7>[ 143.456516] with environment: <7>[ 143.456830] HOME=/ <7>[ 143.457039] TERM=linux <4>[ 143.931809] ------------[ cut here ]------------ <4>[ 143.932229] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 143.932333] Modules linked in: <4>[ 143.932393] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 143.932462] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 143.932484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 143.932512] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 143.932565] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 143.932605] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 143.932758] RAX: 0000000080000000 RBX: ffff888102041e00 RCX: ffff888154200000 <4>[ 143.932794] RDX: 00000000001cefe0 RSI: ffffffff88ebc501 RDI: ffff8881543cefe0 <4>[ 143.932824] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 143.932853] R10: 0000000029f6378d R11: 0000000000000026 R12: ffffea0004081040 <4>[ 143.932882] R13: ffff8881543cefe0 R14: 0000000088418401 R15: 0000000000039408 <4>[ 143.932981] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 143.933021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 143.933050] CR2: 00007ffff7ffe000 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 143.933079] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 143.933107] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 143.933135] Call Trace: <4>[ 143.933158] <4>[ 143.933185] ? show_regs+0x68/0x80 <4>[ 143.933258] ? __warn+0xd5/0x260 <4>[ 143.933298] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 143.933343] ? report_bug+0x278/0x2e0 <4>[ 143.933397] ? handle_bug+0x7b/0xa0 <4>[ 143.933437] ? exc_invalid_op+0x1c/0x50 <4>[ 143.933477] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 143.933530] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 143.933576] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 143.933636] ? rcu_core_si+0x12/0x20 <4>[ 143.933815] rcu_core+0x683/0x1c80 <4>[ 143.933886] ? __pfx_rcu_core+0x10/0x10 <4>[ 143.933932] ? lapic_next_event+0x19/0x30 <4>[ 143.933970] ? handle_softirqs+0x18e/0x720 <4>[ 143.934017] rcu_core_si+0x12/0x20 <4>[ 143.934056] handle_softirqs+0x20c/0x720 <4>[ 143.934101] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 143.934147] irq_exit_rcu+0x9c/0xd0 <4>[ 143.934186] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 143.934236] <4>[ 143.934259] <4>[ 143.934281] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 143.934327] RIP: 0010:default_idle+0xf/0x20 <4>[ 143.934384] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 143.934424] RSP: 0000:ffffffff8d407df0 EFLAGS: 00000202 <4>[ 143.934461] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 143.934490] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 00000000000b4924 <4>[ 143.934517] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 143.934544] R10: ffff888154a35723 R11: 0000000000021c00 R12: 0000000000000000 <4>[ 143.934571] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 143.934611] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 143.934741] ? arch_cpu_idle+0xd/0x20 <4>[ 143.934789] default_idle_call+0x48/0x80 <4>[ 143.934830] do_idle+0x313/0x3c0 <4>[ 143.934904] ? __pfx_do_idle+0x10/0x10 <4>[ 143.934960] cpu_startup_entry+0x5c/0x70 <4>[ 143.935000] rest_init+0x11a/0x140 <4>[ 143.935037] ? acpi_subsystem_init+0x5d/0x150 <4>[ 143.935087] start_kernel+0x31b/0x400 <4>[ 143.935135] x86_64_start_reservations+0x1c/0x30 <4>[ 143.935178] x86_64_start_kernel+0xcf/0xe0 <4>[ 143.935221] common_startup_64+0x12c/0x138 <4>[ 143.935277] <4>[ 143.935300] ---[ end trace 0000000000000000 ]--- SELinux: Could not open policy file <= /etc/selinux/targeted/policy/policy.33: No such file or directory <4>[ 144.151853] ------------[ cut here ]------------ <4>[ 144.152077] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.152139] Modules linked in: <4>[ 144.152174] CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 144.152210] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 144.152220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 144.152235] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.152263] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 144.152284] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 144.152303] RAX: 0000000080000000 RBX: ffff888104d26500 RCX: ffff888154200000 <4>[ 144.152317] RDX: 00000000001d2fe0 RSI: ffffffff88ebc501 RDI: ffff8881543d2fe0 <4>[ 144.152330] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 144.152343] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea0004134980 <4>[ 144.152356] R13: ffff8881543d2fe0 R14: 0000000000200001 R15: 0000000000039408 <4>[ 144.152369] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 144.152386] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 144.152398] CR2: 0000557d0aaac098 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 144.152410] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 144.152422] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 144.152435] Call Trace: <4>[ 144.152446] <4>[ 144.152459] ? show_regs+0x68/0x80 <4>[ 144.152484] ? __warn+0xd5/0x260 <4>[ 144.152502] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.152523] ? report_bug+0x278/0x2e0 <4>[ 144.152548] ? handle_bug+0x7b/0xa0 <4>[ 144.152566] ? exc_invalid_op+0x1c/0x50 <4>[ 144.152584] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 144.152608] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 144.152685] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.152714] ? rcu_core_si+0x12/0x20 <4>[ 144.152738] rcu_core+0x683/0x1c80 <4>[ 144.152763] ? __pfx_rcu_core+0x10/0x10 <4>[ 144.152785] ? lapic_next_event+0x19/0x30 <4>[ 144.152803] ? handle_softirqs+0x18e/0x720 <4>[ 144.152824] rcu_core_si+0x12/0x20 <4>[ 144.152843] handle_softirqs+0x20c/0x720 <4>[ 144.152863] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 144.152881] ? trace_preempt_on+0x20/0xc0 <4>[ 144.152900] ? irq_exit_rcu+0x20/0xd0 <4>[ 144.152919] irq_exit_rcu+0x9c/0xd0 <4>[ 144.152936] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 144.152959] <4>[ 144.152968] <4>[ 144.152978] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 144.152999] RIP: 0010:x64_sys_call+0x1e39/0x2060 <4>[ 144.153021] Code: 0b 6d 00 5d c3 cc cc cc cc e8 a3 c6 4e 00 5d c3 cc cc cc cc e8 f8 ee 2b 00 5d c3 cc cc cc cc e8 4d fd ce 00 5d c3 cc cc cc cc 02 e7 ba 00 5d c3 cc cc cc cc e8 d7 0e f0 02 5d c3 cc cc cc cc <4>[ 144.153038] RSP: 0018:ffff88810030ff18 EFLAGS: 00000246 <4>[ 144.153057] RAX: ffffffffffffffff RBX: ffff88810030ff58 RCX: 0000000000000000 <4>[ 144.153070] RDX: 0000000000000000 RSI: 0000000000000101 RDI: ffff88810030ff58 <4>[ 144.153082] RBP: ffff88810030ff18 R08: 0000000000000000 R09: 0000000000000000 <4>[ 144.153093] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000101 <4>[ 144.153105] R13: 0000000000000101 R14: ffff888100300000 R15: 0000000000000000 <4>[ 144.153126] do_syscall_64+0xb2/0x1d0 <4>[ 144.153146] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 144.153165] RIP: 0033:0x7f1fd4b1928c <4>[ 144.153309] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 144.153334] RSP: 002b:00007ffe248ce480 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 144.153363] RAX: ffffffffffffffda RBX: 0000557d0aaa43a0 RCX: 00007f1fd4b1928c <4>[ 144.153377] RDX: 00000000000b0000 RSI: 0000557d0aaa99d3 RDI: 0000000000000004 <4>[ 144.153389] RBP: 0000000000000000 R08: 0000557d0aaa99c0 R09: 0000000000000006 <4>[ 144.153401] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000028 <4>[ 144.153413] R13: 0000000000000005 R14: 00000000fffffff7 R15: 0000000000000000 <4>[ 144.153435] <4>[ 144.153445] ---[ end trace 0000000000000000 ]--- <4>[ 144.352108] ------------[ cut here ]------------ <4>[ 144.354172] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.354248] Modules linked in: <4>[ 144.354284] CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 144.354320] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 144.354332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 144.354346] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.354372] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 144.354393] RSP: 0000:ffff88810030fcf0 EFLAGS: 00000202 <4>[ 144.354411] RAX: 0000000080000000 RBX: ffff8881082a03c0 RCX: ffff888154200000 <4>[ 144.354425] RDX: 00000000001d6fe0 RSI: ffffffff88ebc501 RDI: ffff8881543d6fe0 <4>[ 144.354437] RBP: ffff88810030fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 144.354450] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea000420a800 <4>[ 144.354462] R13: ffff8881543d6fe0 R14: 0000000000200001 R15: 0000000000039408 <4>[ 144.354475] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 144.354489] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 144.354502] CR2: 0000557ce641a4f0 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 144.354515] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 144.354527] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 144.354540] Call Trace: <4>[ 144.354552] <4>[ 144.354568] ? show_regs+0x68/0x80 <4>[ 144.354593] ? __warn+0xd5/0x260 <4>[ 144.354668] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.354696] ? report_bug+0x278/0x2e0 <4>[ 144.354723] ? handle_bug+0x7b/0xa0 <4>[ 144.354742] ? exc_invalid_op+0x1c/0x50 <4>[ 144.354761] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 144.354786] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 144.354807] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.354828] ? rcu_core_si+0x12/0x20 <4>[ 144.354852] rcu_core+0x683/0x1c80 <4>[ 144.354890] ? __pfx_rcu_core+0x10/0x10 <4>[ 144.354912] ? lapic_next_event+0x19/0x30 <4>[ 144.354931] ? handle_softirqs+0x18e/0x720 <4>[ 144.354953] rcu_core_si+0x12/0x20 <4>[ 144.354972] handle_softirqs+0x20c/0x720 <4>[ 144.354992] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 144.355010] ? trace_preempt_on+0x20/0xc0 <4>[ 144.355029] ? irq_exit_rcu+0x20/0xd0 <4>[ 144.355048] irq_exit_rcu+0x9c/0xd0 <4>[ 144.355065] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 144.355086] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 144.355106] RIP: 0033:0x7f1fd47f42bc <4>[ 144.355129] Code: 32 01 00 00 48 85 ed 0f 84 51 01 00 00 4d 85 ff 0f 84 68 01 00 00 83 fb 9c 75 5b 85 d2 75 57 48 89 ee 4c 89 e7 e8 a4 51 e9 ff <48> 89 c5 48 85 ed 0f 84 a0 01 00 00 41 83 e5 01 0f 85 de 00 00 00 <4>[ 144.355146] RSP: 002b:00007ffe248ce710 EFLAGS: 00000246 <4>[ 144.355163] RAX: 0000557d0aaa32a0 RBX: 00000000ffffff9c RCX: 00007f1fd4b1911e <4>[ 144.355176] RDX: 0000000000000000 RSI: 000000000000002c RDI: 00007f1fd48ec5d4 <4>[ 144.355188] RBP: 00007f1fd48ec5d3 R08: 0000000000000008 R09: 0000000000000001 <4>[ 144.355199] R10: 0000000000000000 R11: 0000000000000202 R12: 00007f1fd48fd622 <4>[ 144.355211] R13: 0000000000000001 R14: 0000000000000000 R15: 00007ffe248ce810 <4>[ 144.355232] <4>[ 144.355242] ---[ end trace 0000000000000000 ]--- c[!p]104[?7h Welcome to [1mDebian GNU/Linux trixie/sid[0m! <5>[ 144.763082] random: crng init done <4>[ 144.869774] ------------[ cut here ]------------ <4>[ 144.870033] WARNING: CPU: 0 PID: 3288 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.870093] Modules linked in: <4>[ 144.870136] CPU: 0 UID: 0 PID: 3288 Comm: systemd-cryptse Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 144.870172] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 144.870182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 144.870196] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.870224] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 144.870245] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 144.870265] RAX: 0000000080000000 RBX: ffff888107b04d48 RCX: ffff888154200000 <4>[ 144.870278] RDX: 00000000001e0fe0 RSI: ffffffff88ebc501 RDI: ffff8881543e0fe0 <4>[ 144.870291] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 144.870303] R10: 0000000029f6378d R11: 0000000000064068 R12: ffffea00041ec100 <4>[ 144.870315] R13: ffff8881543e0fe0 R14: 000000000041c401 R15: 0000000000039408 <4>[ 144.870328] FS: 00007f1fd4386940(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 144.870343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 144.870356] CR2: 00007f1fd4b8f440 CR3: 0000000101c92000 CR4: 00000000000006f0 <4>[ 144.870369] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 144.870381] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 144.870394] Call Trace: <4>[ 144.870406] <4>[ 144.870418] ? show_regs+0x68/0x80 <4>[ 144.870465] ? __warn+0xd5/0x260 <4>[ 144.870486] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.870508] ? report_bug+0x278/0x2e0 <4>[ 144.870534] ? handle_bug+0x7b/0xa0 <4>[ 144.870552] ? exc_invalid_op+0x1c/0x50 <4>[ 144.870570] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 144.870595] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 144.870615] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 144.870716] ? rcu_core_si+0x12/0x20 <4>[ 144.870759] rcu_core+0x683/0x1c80 <4>[ 144.870790] ? __pfx_rcu_core+0x10/0x10 <4>[ 144.870811] ? lapic_next_event+0x19/0x30 <4>[ 144.870833] ? handle_softirqs+0x18e/0x720 <4>[ 144.870853] rcu_core_si+0x12/0x20 <4>[ 144.870882] handle_softirqs+0x20c/0x720 <4>[ 144.870902] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 144.870921] ? trace_preempt_on+0x20/0xc0 <4>[ 144.870940] ? irq_exit_rcu+0x20/0xd0 <4>[ 144.870959] irq_exit_rcu+0x9c/0xd0 <4>[ 144.870977] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 144.870999] <4>[ 144.871010] <4>[ 144.871020] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 144.871041] RIP: 0010:mas_wr_node_store+0x419/0x17c0 <4>[ 144.871062] Code: 0f b6 53 3d 48 89 c6 48 89 85 00 fe ff ff 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 48 c1 e2 03 80 3c 06 00 0f 85 fb 0e 00 00 <49> 8b 74 24 28 4c 89 ef 48 89 8d 18 fe ff ff e8 e3 82 f3 fc 4d 8d <4>[ 144.871078] RSP: 0018:ffff888105d1f508 EFLAGS: 00000246 <4>[ 144.871096] RAX: dffffc0000000000 RBX: ffff888105d1f920 RCX: ffff888100c29e00 <4>[ 144.871110] RDX: 0000000000000000 RSI: 1ffff11020ba3efd RDI: ffff888100c29e80 <4>[ 144.871122] RBP: ffff888105d1f710 R08: 0000000000000001 R09: 0000000000000000 <4>[ 144.871133] R10: ffff888100c29e00 R11: 0000000000000000 R12: ffff888105d1f7c0 <4>[ 144.871144] R13: ffff888100c29e08 R14: ffff888105d1f95d R15: ffff888105d1f588 <4>[ 144.871167] ? mas_wr_node_store+0xb1b/0x17c0 <4>[ 144.871190] ? __pfx_mas_wr_node_store+0x10/0x10 <4>[ 144.871234] mas_wr_store_entry+0x416/0x13b0 <4>[ 144.871257] ? mas_preallocate+0x239/0xe70 <4>[ 144.871276] mas_store_prealloc+0xab/0x1e0 <4>[ 144.871294] ? __pfx_mas_store_prealloc+0x10/0x10 <4>[ 144.871312] ? down_write+0xdc/0x140 <4>[ 144.871334] ? trace_preempt_on+0x20/0xc0 <4>[ 144.871350] ? up_write+0x74/0xb0 <4>[ 144.871368] ? preempt_count_sub+0x50/0x80 <4>[ 144.871391] mmap_region+0xcdd/0x1f10 <4>[ 144.871415] ? thp_get_unmapped_area_vmflags+0xd0/0x290 <4>[ 144.871437] ? __pfx_mmap_region+0x10/0x10 <4>[ 144.871460] ? __get_unmapped_area+0x199/0x2d0 <4>[ 144.871479] ? trace_preempt_on+0x20/0xc0 <4>[ 144.871497] do_mmap+0x66b/0xd40 <4>[ 144.871516] ? __pfx_down_write_killable+0x10/0x10 <4>[ 144.871537] vm_mmap_pgoff+0x1a5/0x320 <4>[ 144.871557] ? trace_hardirqs_on+0x37/0xe0 <4>[ 144.871577] ? __pfx_vm_mmap_pgoff+0x10/0x10 <4>[ 144.871595] ? trace_hardirqs_on+0x37/0xe0 <4>[ 144.871614] ? get_random_u64+0x24f/0x350 <4>[ 144.871695] vm_mmap+0x31/0x50 <4>[ 144.871721] elf_load+0x2e5/0x700 <4>[ 144.871746] load_elf_binary+0xe61/0x4800 <4>[ 144.871765] ? __kernel_read+0x556/0xbc0 <4>[ 144.871804] ? __pfx_load_elf_binary+0x10/0x10 <4>[ 144.871825] ? load_misc_binary+0x6b7/0xb40 <4>[ 144.871846] ? trace_preempt_on+0x20/0xc0 <4>[ 144.871862] ? bprm_execve+0x60b/0x1520 <4>[ 144.871885] bprm_execve+0x62d/0x1520 <4>[ 144.871903] ? __pfx_get_arg_page+0x10/0x10 <4>[ 144.871926] ? __pfx_bprm_execve+0x10/0x10 <4>[ 144.871949] do_execveat_common.isra.0+0x3d4/0x550 <4>[ 144.871970] __x64_sys_execve+0x91/0xc0 <4>[ 144.871988] x64_sys_call+0x19a5/0x2060 <4>[ 144.872008] do_syscall_64+0xb2/0x1d0 <4>[ 144.872027] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 144.872046] RIP: 0033:0x7f1fd4af1207 <4>[ 144.872118] Code: Unable to access opcode bytes at 0x7f1fd4af11dd. <4>[ 144.872132] RSP: 002b:00007ffe248ce5f8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b <4>[ 144.872154] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1fd4af1207 <4>[ 144.872166] RDX: 0000557d0aaae4a0 RSI: 00007ffe248ce760 RDI: 0000557d0aaaaf80 <4>[ 144.872179] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000004 <4>[ 144.872190] R10: 00007ffe248ce760 R11: 0000000000000206 R12: 00000000fffffff7 <4>[ 144.872203] R13: 0000557d0aaaaf80 R14: 0000557d0aab2538 R15: 00007ffe248ce760 <4>[ 144.872225] <4>[ 144.872235] ---[ end trace 0000000000000000 ]--- <4>[ 145.388733] ------------[ cut here ]------------ <4>[ 145.389861] WARNING: CPU: 0 PID: 3297 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 145.389943] Modules linked in: <4>[ 145.389978] CPU: 0 UID: 0 PID: 3297 Comm: systemd-ssh-gen Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 145.390014] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 145.390024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 145.390039] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 145.390066] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 145.390087] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 145.390106] RAX: 0000000080000000 RBX: ffff888104f33660 RCX: ffff888154200000 <4>[ 145.390120] RDX: 00000000001eafe0 RSI: ffffffff88ebc501 RDI: ffff8881543eafe0 <4>[ 145.390133] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 145.390146] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea000413ccc0 <4>[ 145.390158] R13: ffff8881543eafe0 R14: 0000000000a84401 R15: 0000000000039408 <4>[ 145.390171] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 145.390186] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 145.390199] CR2: 00007fb0ce9f69e0 CR3: 0000000103c2e000 CR4: 00000000000006f0 <4>[ 145.390213] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 145.390226] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 145.390238] Call Trace: <4>[ 145.390251] <4>[ 145.390266] ? show_regs+0x68/0x80 <4>[ 145.390292] ? __warn+0xd5/0x260 <4>[ 145.390310] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 145.390332] ? report_bug+0x278/0x2e0 <4>[ 145.390358] ? handle_bug+0x7b/0xa0 <4>[ 145.390376] ? exc_invalid_op+0x1c/0x50 <4>[ 145.390395] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 145.390423] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 145.390462] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 145.390498] ? rcu_core_si+0x12/0x20 <4>[ 145.390542] rcu_core+0x683/0x1c80 <4>[ 145.390588] ? __pfx_rcu_core+0x10/0x10 <4>[ 145.390718] ? lapic_next_event+0x19/0x30 <4>[ 145.390750] ? handle_softirqs+0x18e/0x720 <4>[ 145.390775] rcu_core_si+0x12/0x20 <4>[ 145.390796] handle_softirqs+0x20c/0x720 <4>[ 145.390819] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 145.390837] ? trace_preempt_on+0x20/0xc0 <4>[ 145.390855] ? irq_exit_rcu+0x20/0xd0 <4>[ 145.390886] irq_exit_rcu+0x9c/0xd0 <4>[ 145.390905] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 145.390928] <4>[ 145.390937] <4>[ 145.390947] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 145.390970] RIP: 0010:do_user_addr_fault+0x172/0x930 <4>[ 145.390991] Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 0c 07 00 00 f6 83 91 00 00 00 02 0f 84 ee 01 00 00 e8 d4 62 4a 00 fb 0f 1f 44 00 00 <45> 31 c9 41 f6 c4 40 b8 15 02 00 00 48 8b 55 d0 41 0f 95 c1 41 81 <4>[ 145.391008] RSP: 0000:ffff888107adfed0 EFLAGS: 00000292 <4>[ 145.391028] RAX: 0000000000000000 RBX: ffff888107adff58 RCX: 0000000000000000 <4>[ 145.391042] RDX: 1ffff11020f5bffd RSI: ffffffff8c067e9a RDI: ffffffff8877bb3c <4>[ 145.391054] RBP: ffff888107adff18 R08: 0000000000000000 R09: 0000000000000000 <4>[ 145.391066] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000007 <4>[ 145.391077] R13: 00007fb0ce9f69e0 R14: ffff888107ac6e40 R15: ffff888107a7f8c0 <4>[ 145.391097] ? exc_page_fault+0x6a/0xf0 <4>[ 145.391118] ? do_user_addr_fault+0x16c/0x930 <4>[ 145.391138] ? trace_hardirqs_off_finish+0x39/0xe0 <4>[ 145.391160] exc_page_fault+0x6a/0xf0 <4>[ 145.391181] asm_exc_page_fault+0x2b/0x30 <4>[ 145.391201] RIP: 0033:0x7fb0cea744f5 <4>[ 145.391225] Code: 0f 84 af 00 00 00 41 f6 85 36 03 00 00 20 0f 85 a1 00 00 00 49 8b 45 60 48 85 c0 74 04 48 01 70 08 49 8b 45 58 48 85 c0 74 04 <48> 01 70 08 49 8b 45 68 48 85 c0 74 04 48 01 70 08 49 8b 45 70 48 <4>[ 145.391243] RSP: 002b:00007fffb8e31d10 EFLAGS: 00000206 <4>[ 145.391258] RAX: 00007fb0ce9f69d8 RBX: 000000006ffffdff RCX: 00007fb0cea65290 <4>[ 145.391271] RDX: 00007fb0ce9f6ac8 RSI: 00007fb0ce600000 RDI: 000000006fffffff <4>[ 145.391283] RBP: 00007fffb8e31e60 R08: 0000000000000006 R09: 0000000070000025 <4>[ 145.391295] R10: 00007fffb8e31f48 R11: 0000000000000035 R12: 00000000effffef5 <4>[ 145.391306] R13: 00007fb0cea65250 R14: 00007fffb8e31f00 R15: 000000000000002c <4>[ 145.391327] <4>[ 145.391337] ---[ end trace 0000000000000000 ]--- <6>[ 145.587949] systemd-fstab-g (3290) used greatest stack depth: 26040 bytes left <4>[ 146.020784] ------------[ cut here ]------------ <4>[ 146.021007] WARNING: CPU: 1 PID: 3292 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.021060] Modules linked in: <4>[ 146.021092] CPU: 1 UID: 0 PID: 3292 Comm: systemd-gpt-aut Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 146.021126] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 146.021137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 146.021151] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.021179] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 146.021199] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 146.021217] RAX: 0000000080000000 RBX: ffff888107d43280 RCX: ffff888154200000 <4>[ 146.021231] RDX: 00000000001f6fe0 RSI: ffffffff88ebc501 RDI: ffff8881543f6fe0 <4>[ 146.021244] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 146.021256] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea00041f50c0 <4>[ 146.021269] R13: ffff8881543f6fe0 R14: 0000000000a84401 R15: 0000000000039408 <4>[ 146.021281] FS: 00007f22ed18c940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 146.021296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 146.021308] CR2: 00007fe51bcb7270 CR3: 000000010784a000 CR4: 00000000000006f0 <4>[ 146.021320] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 146.021332] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 146.021345] Call Trace: <4>[ 146.021356] <4>[ 146.021369] ? show_regs+0x68/0x80 <4>[ 146.021393] ? __warn+0xd5/0x260 <4>[ 146.021411] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.021433] ? report_bug+0x278/0x2e0 <4>[ 146.021458] ? handle_bug+0x7b/0xa0 <4>[ 146.021477] ? exc_invalid_op+0x1c/0x50 <4>[ 146.021494] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 146.021519] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 146.021541] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.021561] ? rcu_core_si+0x12/0x20 <4>[ 146.021585] rcu_core+0x683/0x1c80 <4>[ 146.021608] ? __pfx_rcu_core+0x10/0x10 <4>[ 146.021695] ? lapic_next_event+0x19/0x30 <4>[ 146.021723] ? handle_softirqs+0x18e/0x720 <4>[ 146.021745] rcu_core_si+0x12/0x20 <4>[ 146.021765] handle_softirqs+0x20c/0x720 <4>[ 146.021786] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 146.021804] ? trace_preempt_on+0x20/0xc0 <4>[ 146.021822] ? irq_exit_rcu+0x20/0xd0 <4>[ 146.021842] irq_exit_rcu+0x9c/0xd0 <4>[ 146.021859] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 146.021881] <4>[ 146.021891] <4>[ 146.021901] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 146.021922] RIP: 0010:strncpy_from_user+0x0/0x220 <4>[ 146.021946] Code: 8b 95 38 ff ff ff 48 8b 8d 40 ff ff ff 44 0f b6 85 48 ff ff ff e9 9d f5 ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 85 d2 0f 8e 9f 01 00 00 55 48 89 e5 41 57 49 89 f7 <4>[ 146.021964] RSP: 0018:ffff88810749fd38 EFLAGS: 00000246 <4>[ 146.021981] RAX: dffffc0000000000 RBX: ffff888105ea5500 RCX: ffff888153263660 <4>[ 146.021994] RDX: 0000000000000fe0 RSI: 0000562f06d97fb0 RDI: ffff888105ea5520 <4>[ 146.022006] RBP: ffff88810749fd70 R08: ffff888107ac5e80 R09: 0000000000000001 <4>[ 146.022017] R10: 000000009142a126 R11: 0000000000000000 R12: 0000562f06d97fb0 <4>[ 146.022029] R13: 0000000000000000 R14: ffffffff8d1ba9d8 R15: ffff888105ea5520 <4>[ 146.022051] ? getname_flags.part.0+0x8d/0x4a0 <4>[ 146.022076] getname+0x7b/0xb0 <4>[ 146.022094] do_sys_openat2+0xfa/0x190 <4>[ 146.022114] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 146.022136] ? call_rcu+0x12/0x20 <4>[ 146.022153] ? kmem_cache_free+0x143/0x340 <4>[ 146.022177] __x64_sys_openat+0x12c/0x210 <4>[ 146.022195] ? __fput+0x581/0xad0 <4>[ 146.022212] ? trace_preempt_on+0x20/0xc0 <4>[ 146.022228] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 146.022249] ? do_syscall_64+0xbf/0x1d0 <4>[ 146.022266] ? do_syscall_64+0x7e/0x1d0 <4>[ 146.022282] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.022304] x64_sys_call+0x1e3e/0x2060 <4>[ 146.022324] do_syscall_64+0xb2/0x1d0 <4>[ 146.022342] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.022361] RIP: 0033:0x7f22ed51928c <4>[ 146.022384] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 146.022400] RSP: 002b:00007ffdb366ee90 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 146.022420] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f22ed51928c <4>[ 146.022431] RDX: 00000000002a0000 RSI: 0000562f06d97fb0 RDI: 0000000000000008 <4>[ 146.022443] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000002 <4>[ 146.022454] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffdb366efa0 <4>[ 146.022465] R13: 0000000000000008 R14: 0000562f06d97fb0 R15: 0000000000000000 <4>[ 146.022486] <4>[ 146.022496] ---[ end trace 0000000000000000 ]--- <4>[ 146.228813] ------------[ cut here ]------------ <4>[ 146.229180] WARNING: CPU: 1 PID: 3299 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.229241] Modules linked in: <4>[ 146.229277] CPU: 1 UID: 0 PID: 3299 Comm: systemd-sysv-ge Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 146.229311] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 146.229321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 146.229336] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.229363] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 146.229383] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 146.229402] RAX: 0000000080000000 RBX: ffff8881080b8780 RCX: ffff888154200000 <4>[ 146.229416] RDX: 00000000001fa000 RSI: ffffffff88ebc501 RDI: ffff8881543fa000 <4>[ 146.229429] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 146.229441] R10: 0000000029f6378d R11: 00000000000d2400 R12: ffffea0004202e00 <4>[ 146.229453] R13: ffff8881543fa000 R14: 0000000000a80001 R15: 0000000000039408 <4>[ 146.229465] FS: 00007fe51bb85940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 146.229480] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 146.229492] CR2: 000056068cae6598 CR3: 0000000105fe8000 CR4: 00000000000006f0 <4>[ 146.229505] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 146.229518] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 146.229530] Call Trace: <4>[ 146.229540] <4>[ 146.229553] ? show_regs+0x68/0x80 <4>[ 146.229579] ? __warn+0xd5/0x260 <4>[ 146.229596] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.229685] ? report_bug+0x278/0x2e0 <4>[ 146.229737] ? handle_bug+0x7b/0xa0 <4>[ 146.229785] ? exc_invalid_op+0x1c/0x50 <4>[ 146.229822] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 146.229871] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 146.229918] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.229948] ? rcu_core_si+0x12/0x20 <4>[ 146.229971] rcu_core+0x683/0x1c80 <4>[ 146.229997] ? __pfx_rcu_core+0x10/0x10 <4>[ 146.230018] ? lapic_next_event+0x19/0x30 <4>[ 146.230036] ? handle_softirqs+0x18e/0x720 <4>[ 146.230057] rcu_core_si+0x12/0x20 <4>[ 146.230075] handle_softirqs+0x20c/0x720 <4>[ 146.230096] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 146.230113] ? trace_preempt_on+0x20/0xc0 <4>[ 146.230132] ? irq_exit_rcu+0x20/0xd0 <4>[ 146.230151] irq_exit_rcu+0x9c/0xd0 <4>[ 146.230169] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 146.230190] <4>[ 146.230200] <4>[ 146.230210] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 146.230231] RIP: 0010:__rcu_read_unlock+0x83/0xb0 <4>[ 146.230252] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 25 8b 83 48 04 00 00 85 c0 75 0a <48> 8b 5d f8 c9 c3 cc cc cc cc 48 89 df e8 5b fb ff ff eb ec e8 b4 <4>[ 146.230269] RSP: 0018:ffff888103c87868 EFLAGS: 00000246 <4>[ 146.230286] RAX: 0000000000000000 RBX: ffff888107ac0000 RCX: 1ffffffff1be5c18 <4>[ 146.230299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888107ac0448 <4>[ 146.230310] RBP: ffff888103c87870 R08: ffff888107ac0000 R09: ffff888103c87950 <4>[ 146.230322] R10: ffff888103c87910 R11: 0000000000000000 R12: dffffc0000000000 <4>[ 146.230334] R13: 0000000000000000 R14: ffffffff8d682b38 R15: ffff888107ac0000 <4>[ 146.230355] ? preempt_count_sub+0x50/0x80 <4>[ 146.230378] __is_insn_slot_addr+0x92/0xe0 <4>[ 146.230400] kernel_text_address+0xc0/0x150 <4>[ 146.230418] ? __unwind_start+0x1fc/0x390 <4>[ 146.230438] __kernel_text_address+0x16/0x50 <4>[ 146.230456] unwind_get_return_address+0x65/0xb0 <4>[ 146.230475] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 146.230495] arch_stack_walk+0xac/0x100 <4>[ 146.230520] stack_trace_save+0x97/0xd0 <4>[ 146.230538] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 146.230560] kasan_save_stack+0x3d/0x60 <4>[ 146.230580] ? kasan_save_stack+0x3d/0x60 <4>[ 146.230599] ? kasan_save_track+0x18/0x40 <4>[ 146.230672] ? kasan_save_alloc_info+0x3b/0x50 <4>[ 146.230697] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 146.230715] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 146.230734] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 146.230754] ? getname+0x7b/0xb0 <4>[ 146.230769] ? do_sys_openat2+0xfa/0x190 <4>[ 146.230787] ? __x64_sys_openat+0x12c/0x210 <4>[ 146.230806] ? x64_sys_call+0x1e3e/0x2060 <4>[ 146.230825] ? do_syscall_64+0xb2/0x1d0 <4>[ 146.230841] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.230890] kasan_save_track+0x18/0x40 <4>[ 146.230913] kasan_save_alloc_info+0x3b/0x50 <4>[ 146.230932] __kasan_slab_alloc+0x91/0xa0 <4>[ 146.230954] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 146.230977] getname_flags.part.0+0x4f/0x4a0 <4>[ 146.230998] getname+0x7b/0xb0 <4>[ 146.231014] do_sys_openat2+0xfa/0x190 <4>[ 146.231034] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 146.231054] ? call_rcu+0x12/0x20 <4>[ 146.231072] ? kmem_cache_free+0x143/0x340 <4>[ 146.231093] __x64_sys_openat+0x12c/0x210 <4>[ 146.231111] ? __fput+0x581/0xad0 <4>[ 146.231128] ? trace_preempt_on+0x20/0xc0 <4>[ 146.231145] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 146.231166] ? do_syscall_64+0xbf/0x1d0 <4>[ 146.231183] ? do_syscall_64+0x7e/0x1d0 <4>[ 146.231200] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.231221] x64_sys_call+0x1e3e/0x2060 <4>[ 146.231239] do_syscall_64+0xb2/0x1d0 <4>[ 146.231257] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.231276] RIP: 0033:0x7fe51bf1928c <4>[ 146.231299] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 146.231316] RSP: 002b:00007ffc782b07e0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 146.231337] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe51bf1928c <4>[ 146.231350] RDX: 00000000002a0000 RSI: 000056068cae5570 RDI: 0000000000000007 <4>[ 146.231362] RBP: 0000000000000000 R08: 000000000000fefe R09: 0000000000000004 <4>[ 146.231373] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffc782b08f0 <4>[ 146.231384] R13: 0000000000000007 R14: 000056068cae5570 R15: 0000000000000000 <4>[ 146.231404] <4>[ 146.231415] ---[ end trace 0000000000000000 ]--- <6>[ 146.259127] systemd-gpt-aut (3292) used greatest stack depth: 25928 bytes left <4>[ 146.334713] ------------[ cut here ]------------ <4>[ 146.334972] WARNING: CPU: 1 PID: 3286 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.335030] Modules linked in: <4>[ 146.335065] CPU: 1 UID: 0 PID: 3286 Comm: (sd-gens) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 146.335100] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 146.335111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 146.335124] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.335151] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 146.335172] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 146.335192] RAX: 0000000080000000 RBX: ffff88810752b480 RCX: ffff888154200000 <4>[ 146.335206] RDX: 00000000001fc000 RSI: ffffffff88ebc501 RDI: ffff8881543fc000 <4>[ 146.335218] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 146.335231] R10: 00000000ac9b86ac R11: ffffffff8d64a2e0 R12: ffffea00041d4a00 <4>[ 146.335243] R13: ffff8881543fc000 R14: 000000000041c401 R15: 0000000000039408 <4>[ 146.335256] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 146.335271] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 146.335283] CR2: 0000557d0aaaf240 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 146.335295] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 146.335307] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 146.335321] Call Trace: <4>[ 146.335332] <4>[ 146.335345] ? show_regs+0x68/0x80 <4>[ 146.335372] ? __warn+0xd5/0x260 <4>[ 146.335390] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.335413] ? report_bug+0x278/0x2e0 <4>[ 146.335438] ? handle_bug+0x7b/0xa0 <4>[ 146.335457] ? exc_invalid_op+0x1c/0x50 <4>[ 146.335475] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 146.335499] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 146.335521] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.335545] rcu_core+0x683/0x1c80 <4>[ 146.335573] ? __pfx_rcu_core+0x10/0x10 <4>[ 146.335595] ? lapic_next_event+0x19/0x30 <4>[ 146.335614] ? handle_softirqs+0x18e/0x720 <4>[ 146.335712] rcu_core_si+0x12/0x20 <4>[ 146.335740] handle_softirqs+0x20c/0x720 <4>[ 146.335763] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 146.335781] ? trace_preempt_on+0x20/0xc0 <4>[ 146.335801] ? irq_exit_rcu+0x20/0xd0 <4>[ 146.335820] irq_exit_rcu+0x9c/0xd0 <4>[ 146.335839] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 146.335881] <4>[ 146.335899] <4>[ 146.335921] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 146.335950] RIP: 0010:kasan_quarantine_put+0x80/0x1d0 <4>[ 146.335975] Code: 8b 48 08 48 89 19 48 89 58 08 48 c7 03 00 00 00 00 48 03 50 10 48 89 50 10 48 89 d3 48 81 fa 00 00 10 00 77 4d 4d 85 ed 75 40 01 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 57 <4>[ 146.335992] RSP: 0018:ffff888105d17b18 EFLAGS: 00000286 <4>[ 146.336010] RAX: 0000000000000000 RBX: 00000000000ed828 RCX: ffff888104d771c0 <4>[ 146.336023] RDX: 00000000000ed828 RSI: ffffffff88f2e1d9 RDI: ffffffff88f32795 <4>[ 146.336035] RBP: ffff888105d17b40 R08: ffff88810751ee40 R09: 0000000000000001 <4>[ 146.336047] R10: 00000000c58b6452 R11: ffff888105d17c50 R12: ffff8881002a18c0 <4>[ 146.336059] R13: 0000000000000200 R14: ffffea00041756c0 R15: 0000000000000000 <4>[ 146.336077] ? __kasan_slab_free+0x69/0x80 <4>[ 146.336098] ? kasan_quarantine_put+0xc5/0x1d0 <4>[ 146.336120] ? kasan_quarantine_put+0xc5/0x1d0 <4>[ 146.336141] __kasan_slab_free+0x69/0x80 <4>[ 146.336161] ? __vm_area_free+0x4b/0x60 <4>[ 146.336181] kmem_cache_free+0x23a/0x340 <4>[ 146.336204] __vm_area_free+0x4b/0x60 <4>[ 146.336224] remove_vma+0xe0/0x120 <4>[ 146.336246] exit_mmap+0x342/0x750 <4>[ 146.336269] ? __pfx_exit_mmap+0x10/0x10 <4>[ 146.336292] ? preempt_count_sub+0x50/0x80 <4>[ 146.336324] __mmput+0xa3/0x320 <4>[ 146.336343] mmput+0x42/0x50 <4>[ 146.336361] do_exit+0x7c7/0x28f0 <4>[ 146.336383] ? __pfx_do_exit+0x10/0x10 <4>[ 146.336402] ? trace_preempt_on+0x20/0xc0 <4>[ 146.336419] ? do_group_exit+0x183/0x270 <4>[ 146.336441] do_group_exit+0xbb/0x270 <4>[ 146.336461] __x64_sys_exit_group+0x42/0x50 <4>[ 146.336482] x64_sys_call+0x2059/0x2060 <4>[ 146.336502] do_syscall_64+0xb2/0x1d0 <4>[ 146.336521] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.336540] RIP: 0033:0x7f1fd4af0725 <4>[ 146.336576] Code: Unable to access opcode bytes at 0x7f1fd4af06fb. <4>[ 146.336589] RSP: 002b:00007ffe248ce7e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 <4>[ 146.336611] RAX: ffffffffffffffda RBX: 0000557d0aab51c0 RCX: 00007f1fd4af0725 <4>[ 146.336677] RDX: 00000000000000e7 RSI: fffffffffffffe90 RDI: 0000000000000000 <4>[ 146.336693] RBP: 0000557d0aaaf0b0 R08: 000055785d7a4ce2 R09: 0000000000000007 <4>[ 146.336705] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 <4>[ 146.336716] R13: 0000557d0aab5358 R14: 0000557d0aab5448 R15: 0000557d0aab5358 <4>[ 146.336738] <4>[ 146.336750] ---[ end trace 0000000000000000 ]--- <4>[ 146.449886] ------------[ cut here ]------------ <4>[ 146.450128] WARNING: CPU: 0 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.450187] Modules linked in: <4>[ 146.450222] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 146.450257] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 146.450268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 146.450283] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.450310] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 146.450330] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 146.450350] RAX: 0000000080000000 RBX: ffff888108457140 RCX: ffff888154200000 <4>[ 146.450364] RDX: 00000000001fe000 RSI: ffffffff88ebc501 RDI: ffff8881543fe000 <4>[ 146.450376] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 146.450389] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00042115c0 <4>[ 146.450402] R13: ffff8881543fe000 R14: 0000000000200001 R15: 0000000000039408 <4>[ 146.450414] FS: 00007f1fd4386940(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 146.450429] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 146.450441] CR2: 0000557d0aac0000 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 146.450454] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 146.450466] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 146.450479] Call Trace: <4>[ 146.450491] <4>[ 146.450503] ? show_regs+0x68/0x80 <4>[ 146.450528] ? __warn+0xd5/0x260 <4>[ 146.450546] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.450567] ? report_bug+0x278/0x2e0 <4>[ 146.450593] ? handle_bug+0x7b/0xa0 <4>[ 146.450684] ? exc_invalid_op+0x1c/0x50 <4>[ 146.450713] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 146.450740] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 146.450760] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.450781] ? rcu_core_si+0x12/0x20 <4>[ 146.450804] rcu_core+0x683/0x1c80 <4>[ 146.450830] ? __pfx_rcu_core+0x10/0x10 <4>[ 146.450851] ? lapic_next_event+0x19/0x30 <4>[ 146.450883] ? handle_softirqs+0x18e/0x720 <4>[ 146.450905] rcu_core_si+0x12/0x20 <4>[ 146.450925] handle_softirqs+0x20c/0x720 <4>[ 146.450947] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 146.450967] ? trace_preempt_on+0x20/0xc0 <4>[ 146.450985] ? irq_exit_rcu+0x20/0xd0 <4>[ 146.451003] irq_exit_rcu+0x9c/0xd0 <4>[ 146.451022] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 146.451044] <4>[ 146.451055] <4>[ 146.451065] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 146.451086] RIP: 0010:__is_insn_slot_addr+0x77/0xe0 <4>[ 146.451107] Code: 00 fc ff df 48 8d 7b 10 48 89 f8 48 c1 e8 03 42 80 3c 20 00 75 59 48 8b 43 10 49 39 c5 72 0b 48 05 00 10 00 00 49 39 c5 72 2c <48> 89 d8 48 c1 e8 03 42 80 3c 20 00 75 3e 48 8b 1b 4c 39 f3 75 c4 <4>[ 146.451124] RSP: 0018:ffff88810030f998 EFLAGS: 00000207 <4>[ 146.451142] RAX: ffffffffc02c8000 RBX: ffff88810560bc00 RCX: 1ffffffff1be5c18 <4>[ 146.451155] RDX: 1ffffffff1ad0567 RSI: 0000000000000000 RDI: ffff88810560bc10 <4>[ 146.451167] RBP: ffff88810030f9b8 R08: ffff888100300000 R09: ffff88810030fa68 <4>[ 146.451180] R10: ffff88810030fa28 R11: 0000000000000010 R12: dffffc0000000000 <4>[ 146.451193] R13: 0000000000000000 R14: ffffffff8d682b38 R15: ffff888100300000 <4>[ 146.451242] ? 0xffffffffc02c8000 <4>[ 146.451286] ? __is_insn_slot_addr+0x23/0xe0 <4>[ 146.451309] kernel_text_address+0xc0/0x150 <4>[ 146.451329] ? __unwind_start+0x1fc/0x390 <4>[ 146.451350] __kernel_text_address+0x16/0x50 <4>[ 146.451370] unwind_get_return_address+0x65/0xb0 <4>[ 146.451391] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 146.451413] arch_stack_walk+0xac/0x100 <4>[ 146.451439] stack_trace_save+0x97/0xd0 <4>[ 146.451459] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 146.451481] ? kasan_save_stack+0x4d/0x60 <4>[ 146.451500] ? kasan_save_stack+0x3d/0x60 <4>[ 146.451517] ? __kasan_record_aux_stack+0xae/0xc0 <4>[ 146.451535] kasan_save_stack+0x3d/0x60 <4>[ 146.451553] ? kasan_save_stack+0x3d/0x60 <4>[ 146.451571] ? kasan_save_track+0x18/0x40 <4>[ 146.451588] ? kasan_save_free_info+0x3f/0x60 <4>[ 146.451607] ? __kasan_slab_free+0x5e/0x80 <4>[ 146.451687] ? kmem_cache_free+0x23a/0x340 <4>[ 146.451716] ? security_file_free+0xa0/0xd0 <4>[ 146.451738] ? __fput+0x484/0xad0 <4>[ 146.451755] ? __fput_sync+0x38/0x50 <4>[ 146.451772] ? __x64_sys_close+0x81/0xe0 <4>[ 146.451790] ? x64_sys_call+0x17ab/0x2060 <4>[ 146.451810] ? do_syscall_64+0xb2/0x1d0 <4>[ 146.451825] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.451866] kasan_save_track+0x18/0x40 <4>[ 146.451886] kasan_save_free_info+0x3f/0x60 <4>[ 146.451905] __kasan_slab_free+0x5e/0x80 <4>[ 146.451925] ? security_file_free+0xa0/0xd0 <4>[ 146.451943] kmem_cache_free+0x23a/0x340 <4>[ 146.451962] ? dput+0x195/0x450 <4>[ 146.451984] security_file_free+0xa0/0xd0 <4>[ 146.452003] __fput+0x484/0xad0 <4>[ 146.452020] ? trace_preempt_on+0x20/0xc0 <4>[ 146.452037] ? file_close_fd+0x67/0x80 <4>[ 146.452058] __fput_sync+0x38/0x50 <4>[ 146.452077] __x64_sys_close+0x81/0xe0 <4>[ 146.452098] x64_sys_call+0x17ab/0x2060 <4>[ 146.452118] do_syscall_64+0xb2/0x1d0 <4>[ 146.452136] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 146.452155] RIP: 0033:0x7f1fd4b15100 <4>[ 146.452175] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 69 42 0e 00 00 74 17 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c <4>[ 146.452192] RSP: 002b:00007ffe248cdfd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 <4>[ 146.452214] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 00007f1fd4b15100 <4>[ 146.452226] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 0000000000000015 <4>[ 146.452238] RBP: 00007f1fd43867d0 R08: 0000000000000002 R09: 0000000000000001 <4>[ 146.452250] R10: 0000000000000014 R11: 0000000000000202 R12: 0000000000000000 <4>[ 146.452261] R13: 0000000000000015 R14: 0000000000000000 R15: 0000000000000000 <4>[ 146.452281] <4>[ 146.452290] ---[ end trace 0000000000000000 ]--- <4>[ 146.655810] ------------[ cut here ]------------ <4>[ 146.657570] WARNING: CPU: 0 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.657754] Modules linked in: <4>[ 146.657803] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 146.657849] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 146.657861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 146.657875] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.657905] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 146.657927] RSP: 0000:ffff88810030fcf0 EFLAGS: 00000202 <4>[ 146.657946] RAX: 0000000080000000 RBX: ffff888107bba8c0 RCX: ffff888154200000 <4>[ 146.657960] RDX: 000000000000a000 RSI: ffffffff88ebc501 RDI: ffff88815420a000 <4>[ 146.657973] RBP: ffff88810030fd30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 146.657986] R10: 00000000decdbdba R11: ffffffff8d64a2e0 R12: ffffea00041eee80 <4>[ 146.657999] R13: ffff88815420a000 R14: 0000000000200001 R15: 0000000000039408 <4>[ 146.658012] FS: 00007f1fd4386940(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 146.658027] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 146.658040] CR2: 00007f1fd4856980 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 146.658053] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 146.658066] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 146.658079] Call Trace: <4>[ 146.658092] <4>[ 146.658108] ? show_regs+0x68/0x80 <4>[ 146.658133] ? __warn+0xd5/0x260 <4>[ 146.658152] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.658173] ? report_bug+0x278/0x2e0 <4>[ 146.658199] ? handle_bug+0x7b/0xa0 <4>[ 146.658217] ? exc_invalid_op+0x1c/0x50 <4>[ 146.658236] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 146.658259] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 146.658280] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.658300] ? rcu_core_si+0x12/0x20 <4>[ 146.658324] rcu_core+0x683/0x1c80 <4>[ 146.658349] ? __pfx_rcu_core+0x10/0x10 <4>[ 146.658371] ? lapic_next_event+0x19/0x30 <4>[ 146.658389] ? handle_softirqs+0x18e/0x720 <4>[ 146.658411] rcu_core_si+0x12/0x20 <4>[ 146.658429] handle_softirqs+0x20c/0x720 <4>[ 146.658449] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 146.658468] ? trace_preempt_on+0x20/0xc0 <4>[ 146.658487] ? irq_exit_rcu+0x20/0xd0 <4>[ 146.658507] irq_exit_rcu+0x9c/0xd0 <4>[ 146.658525] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 146.658546] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 146.658567] RIP: 0033:0x7f1fd4d20ca0 <4>[ 146.658590] Code: c0 0f 88 38 ff ff ff 4c 8b a3 30 03 00 00 4d 85 e4 75 38 e9 a2 00 00 00 66 90 85 c0 7e 28 48 8b b7 b0 00 00 00 48 85 f6 74 1c 01 00 00 00 ba 01 00 00 00 48 89 df e8 2e e6 f2 ff 89 c5 85 c0 <4>[ 146.658611] RSP: 002b:00007ffe248cde60 EFLAGS: 00000202 <4>[ 146.658703] RAX: 0000557d0aaafd62 RBX: 0000557d0aad62b0 RCX: 0000000000020000 <4>[ 146.658720] RDX: 0000000000000000 RSI: 0000557d0aaafd62 RDI: 0000557d0aaafd60 <4>[ 146.658733] RBP: 0000000000000001 R08: 0000000000000002 R09: 0000000000000000 <4>[ 146.658744] R10: 0000000000000000 R11: 0000000000000000 R12: 0000557d0aaddb80 <4>[ 146.658756] R13: 00007ffe248ce430 R14: 0000000000000000 R15: 0000557d0aad62b0 <4>[ 146.658779] <4>[ 146.658790] ---[ end trace 0000000000000000 ]--- <4>[ 146.957745] ------------[ cut here ]------------ <4>[ 146.958453] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.959994] Modules linked in: <4>[ 146.960086] CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 146.960146] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 146.960158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 146.960172] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.960216] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 146.960237] RSP: 0000:ffff88810030fcf0 EFLAGS: 00000202 <4>[ 146.960258] RAX: 0000000080000000 RBX: ffff88810827fb40 RCX: ffff888154200000 <4>[ 146.960272] RDX: 0000000000014000 RSI: ffffffff88ebc501 RDI: ffff888154214000 <4>[ 146.960285] RBP: ffff88810030fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 146.960300] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004209fc0 <4>[ 146.960327] R13: ffff888154214000 R14: 0000000000200001 R15: 0000000000039408 <4>[ 146.960351] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 146.960378] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 146.960402] CR2: 0000557d0ab2d1f8 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 146.960429] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 146.960458] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 146.960481] Call Trace: <4>[ 146.960502] <4>[ 146.960529] ? show_regs+0x68/0x80 <4>[ 146.960571] ? __warn+0xd5/0x260 <4>[ 146.960603] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.960749] ? report_bug+0x278/0x2e0 <4>[ 146.960801] ? handle_bug+0x7b/0xa0 <4>[ 146.960835] ? exc_invalid_op+0x1c/0x50 <4>[ 146.960868] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 146.960911] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 146.960949] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 146.960985] ? rcu_core_si+0x12/0x20 <4>[ 146.961026] rcu_core+0x683/0x1c80 <4>[ 146.961069] ? __pfx_rcu_core+0x10/0x10 <4>[ 146.961107] ? lapic_next_event+0x19/0x30 <4>[ 146.961137] ? handle_softirqs+0x18e/0x720 <4>[ 146.961176] rcu_core_si+0x12/0x20 <4>[ 146.961215] handle_softirqs+0x20c/0x720 <4>[ 146.961256] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 146.961294] ? trace_preempt_on+0x20/0xc0 <4>[ 146.961332] ? irq_exit_rcu+0x20/0xd0 <4>[ 146.961371] irq_exit_rcu+0x9c/0xd0 <4>[ 146.961407] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 146.961451] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 146.961490] RIP: 0033:0x7f1fd47fac50 <4>[ 146.961533] Code: d0 4c 0f af fa 39 c3 0f 83 1b 01 00 00 89 da 45 31 ed 48 8d 44 15 00 42 0f b6 0c 38 49 8d 46 08 48 89 44 24 08 80 f9 ff 75 2c cb 00 00 00 0f 1f 00 41 8b 76 24 31 d2 41 83 c5 01 f7 f6 89 d2 <4>[ 146.961566] RSP: 002b:00007ffe248cdca0 EFLAGS: 00000246 <4>[ 146.961602] RAX: 0000557d0aabd010 RBX: 000000000000000c RCX: 00000000000000ff <4>[ 146.961716] RDX: 000000000000000c RSI: 000000000000000c RDI: 0000557d0aabd008 <4>[ 146.961750] RBP: 0000557d0ab1da60 R08: 574004a9e1275c2f R09: f108aee73460f53a <4>[ 146.961777] R10: 42f866de714d7be3 R11: 0000000000000019 R12: 00007f1fd49e2760 <4>[ 146.961800] R13: 0000000000000000 R14: 0000557d0aabd008 R15: 00000000000001e0 <4>[ 146.961843] <4>[ 146.961867] ---[ end trace 0000000000000000 ]--- <4>[ 147.269756] ------------[ cut here ]------------ <4>[ 147.270000] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 147.270108] Modules linked in: <4>[ 147.270796] CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 147.270882] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 147.270894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 147.270909] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 147.270953] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 147.270974] RSP: 0000:ffff88810030fcf0 EFLAGS: 00000202 <4>[ 147.271004] RAX: 0000000080000000 RBX: ffff8881011b0b40 RCX: ffff888154200000 <4>[ 147.271019] RDX: 000000000002c000 RSI: ffffffff88ebc501 RDI: ffff88815422c000 <4>[ 147.271031] RBP: ffff88810030fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 147.271044] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004046c00 <4>[ 147.271057] R13: ffff88815422c000 R14: 0000000000200001 R15: 0000000000039408 <4>[ 147.271071] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 147.271086] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 147.271099] CR2: 0000557d0ab5d0c8 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 147.271112] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 147.271125] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 147.271139] Call Trace: <4>[ 147.271151] <4>[ 147.271168] ? show_regs+0x68/0x80 <4>[ 147.271194] ? __warn+0xd5/0x260 <4>[ 147.271212] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 147.271234] ? report_bug+0x278/0x2e0 <4>[ 147.271258] ? handle_bug+0x7b/0xa0 <4>[ 147.271275] ? exc_invalid_op+0x1c/0x50 <4>[ 147.271294] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 147.271319] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 147.271340] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 147.271368] ? rcu_core_si+0x12/0x20 <4>[ 147.271392] rcu_core+0x683/0x1c80 <4>[ 147.271417] ? __pfx_rcu_core+0x10/0x10 <4>[ 147.271438] ? lapic_next_event+0x19/0x30 <4>[ 147.271457] ? handle_softirqs+0x18e/0x720 <4>[ 147.271478] rcu_core_si+0x12/0x20 <4>[ 147.271496] handle_softirqs+0x20c/0x720 <4>[ 147.271517] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 147.271534] ? trace_preempt_on+0x20/0xc0 <4>[ 147.271552] ? irq_exit_rcu+0x20/0xd0 <4>[ 147.271572] irq_exit_rcu+0x9c/0xd0 <4>[ 147.271589] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 147.271741] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 147.271770] RIP: 0033:0x7f1fd481eec0 <4>[ 147.271794] Code: 0d dd f9 13 00 ba 23 00 00 00 48 8d 35 2a 01 0e 00 48 8d 3d 6d 3e 0e 00 e8 0d 66 e6 ff 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1e fa 48 83 ec 08 48 85 ff 74 33 48 85 f6 74 4e f3 0f 6f 06 <4>[ 147.271813] RSP: 002b:00007ffe248cd748 EFLAGS: 00000202 <4>[ 147.271831] RAX: 00007f1fd4a00040 RBX: 0000557d0aabcf98 RCX: 0000000000000010 <4>[ 147.271846] RDX: 0000000000000000 RSI: 0000557d0aabcfa8 RDI: 00007ffe248cd750 <4>[ 147.271859] RBP: 00007ffe248cd750 R08: 0000000000000000 R09: 000000000000003c <4>[ 147.271870] R10: 0000000000000007 R11: 0000000000000202 R12: 0000557d0ab3f1c0 <4>[ 147.271882] R13: 0000557d0ab5d8e0 R14: 000000000000003c R15: 0000000000000001 <4>[ 147.271910] <4>[ 147.271922] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Created slice [0;1;39msystem-getty.slice[0m - Slice /system/getty. [[0;32m OK [0m] Created slice [0;1;39msystem-modprobe.slice[0m - Slice /system/modprobe. [[0;32m OK [0m] Created slice [0;1;39msystem-serial\x2dget…slice[0m - Slice /system/serial-getty. [[0;32m OK [0m] Created slice [0;1;39muser.slice[0m - User and Session Slice. [[0;32m OK [0m] Started [0;1;39msystemd-ask-password-conso…[0mequests to Console Directory Watch. [[0;32m OK [0m] Started [0;1;39msystemd-ask-password-wall.…[0md Requests to Wall Directory Watch. [[0;32m OK [0m] Set up automount [0;1;39mproc-sys-fs-binfm…[0mormats File System Automount Point. Expecting device [0;1;39mdev-ttyS0.device[0m - /dev/ttyS0... [[0;32m OK [0m] Reached target [0;1;39mcryptsetup.target[0m - Local Encrypted Volumes. [[0;32m OK [0m] Reached target [0;1;39mintegritysetup.targ…[0m Local Integrity Protected Volumes. [[0;32m OK [0m] Reached target [0;1;39mpaths.target[0m - Path Units. [[0;32m OK [0m] Reached target [0;1;39mremote-fs.target[0m - Remote File Systems. [[0;32m OK [0m] Reached target [0;1;39mslices.target[0m - Slice Units. [[0;32m OK [0m] Reached target [0;1;39mswap.target[0m - Swaps. [[0;32m OK [0m] Reached target [0;1;39mveritysetup.target[0m - Local Verity Protected Volumes. [[0;32m OK [0m] Listening on [0;1;39msystemd-creds.socket[0m - Credential Encryption/Decryption. [[0;32m OK [0m] Listening on [0;1;39msystemd-initctl.socke…[0m- initctl Compatibility Named Pipe. [[0;32m OK [0m] Listening on [0;1;39msystemd-journald-dev-…socket[0m - Journal Socket (/dev/log). [[0;32m OK [0m] Listening on [0;1;39msystemd-journald.socket[0m - Journal Sockets. [[0;32m OK [0m] Listening on [0;1;39msystemd-udevd-control.socket[0m - udev Control Socket. [[0;32m OK [0m] Listening on [0;1;39msystemd-udevd-kernel.socket[0m - udev Kernel Socket. Mounting [0;1;39mdev-hugepages.mount[0m - Huge Pages File System... Mounting [0;1;39mdev-mqueue.mount[0m - POSIX Message Queue File System... Mounting [0;1;39mrun-lock.mount[0m - Legacy Locks Directory /run/lock... Mounting [0;1;39msys-kernel-debug.mount[0m - Kernel Debug File System... Mounting [0;1;39msys-kernel-tracing.mount[0m - Kernel Trace File System... Mounting [0;1;39mtmp.mount[0m - Temporary Directory /tmp... Starting [0;1;39mkmod-static-nodes.service[0m…eate List of Static Device Nodes... Starting [0;1;39mmodprobe@configfs.service[0m - Load Kernel Module configfs... Starting [0;1;39mmodprobe@dm_mod.service[0m - Load Kernel Module dm_mod... Starting [0;1;39mmodprobe@drm.service[0m - Load Kernel Module drm... Starting [0;1;39mmodprobe@efi_pstore.servi…[0m - Load Kernel Module efi_pstore... <4>[ 149.451889] ------------[ cut here ]------------ <4>[ 149.452118] WARNING: CPU: 1 PID: 3306 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.452188] Modules linked in: <4>[ 149.452680] CPU: 1 UID: 0 PID: 3306 Comm: mount Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 149.452774] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 149.452786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 149.452800] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.452846] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 149.452866] RSP: 0000:ffff88810654fcf0 EFLAGS: 00000202 <4>[ 149.452897] RAX: 0000000080000000 RBX: ffff888108201dd0 RCX: ffff888154200000 <4>[ 149.452912] RDX: 0000000000062fe0 RSI: ffffffff88ebc501 RDI: ffff888154262fe0 <4>[ 149.452924] RBP: ffff88810654fd30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 149.452937] R10: 00000000decdbdba R11: 0000000000000036 R12: ffffea0004208040 <4>[ 149.452950] R13: ffff888154262fe0 R14: 0000000000490501 R15: 0000000000039408 <4>[ 149.452963] FS: 00007fc164e9b800(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 149.452979] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 149.452992] CR2: 00007f47946af080 CR3: 0000000108602000 CR4: 00000000000006f0 <4>[ 149.453005] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 149.453018] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 149.453031] Call Trace: <4>[ 149.453043] <4>[ 149.453057] ? show_regs+0x68/0x80 <4>[ 149.453083] ? __warn+0xd5/0x260 <4>[ 149.453101] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.453123] ? report_bug+0x278/0x2e0 <4>[ 149.453149] ? handle_bug+0x7b/0xa0 <4>[ 149.453168] ? exc_invalid_op+0x1c/0x50 <4>[ 149.453185] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 149.453209] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 149.453232] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.453253] ? rcu_core_si+0x12/0x20 <4>[ 149.453277] rcu_core+0x683/0x1c80 <4>[ 149.453301] ? __pfx_rcu_core+0x10/0x10 <4>[ 149.453322] ? lapic_next_event+0x19/0x30 <4>[ 149.453341] ? handle_softirqs+0x18e/0x720 <4>[ 149.453363] rcu_core_si+0x12/0x20 <4>[ 149.453382] handle_softirqs+0x20c/0x720 <4>[ 149.453402] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 149.453421] ? trace_preempt_on+0x20/0xc0 <4>[ 149.453441] ? irq_exit_rcu+0x20/0xd0 <4>[ 149.453460] irq_exit_rcu+0x9c/0xd0 <4>[ 149.453477] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 149.453498] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 149.453517] RIP: 0033:0x7fc16510e440 <4>[ 149.453541] Code: 8b 04 82 29 c8 c3 31 c0 c3 90 0f b6 0e 0f b6 07 48 8d 15 93 a0 00 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 <89> f1 89 f8 48 83 e1 3f 48 83 e0 3f 83 f9 30 77 3f 83 f8 30 77 3a <4>[ 149.453558] RSP: 002b:00007fff4562eba8 EFLAGS: 00000202 <4>[ 149.453574] RAX: 0000000000000000 RBX: 000056010197a090 RCX: 0000000000000000 <4>[ 149.453587] RDX: 000056010197a100 RSI: 00007fc165208f42 RDI: 000056010197a0d0 <4>[ 149.453599] RBP: 0000560101979ed0 R08: 0000000000000008 R09: 0000000000000001 <4>[ 149.453699] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 <4>[ 149.453723] R13: 00007fff4562ebc0 R14: 00007fff4562ebb8 R15: 00007fc165208f42 <4>[ 149.453746] <4>[ 149.453758] ---[ end trace 0000000000000000 ]--- <4>[ 149.555775] ------------[ cut here ]------------ <4>[ 149.556020] WARNING: CPU: 1 PID: 3313 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.556077] Modules linked in: <4>[ 149.556154] CPU: 1 UID: 0 PID: 3313 Comm: 9 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 149.556495] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 149.556519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 149.556693] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.556781] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 149.556805] RSP: 0000:ffff888105b0fcf0 EFLAGS: 00000202 <4>[ 149.556836] RAX: 0000000080000000 RBX: ffff888104654dc0 RCX: ffff888154200000 <4>[ 149.556852] RDX: 0000000000064fe0 RSI: ffffffff88ebc501 RDI: ffff888154264fe0 <4>[ 149.556865] RBP: ffff888105b0fd30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 149.556879] R10: 00000000decdbdba R11: ffffffff8d64a2e0 R12: ffffea0004119500 <4>[ 149.556892] R13: ffff888154264fe0 R14: 0000000000c80001 R15: 0000000000039408 <4>[ 149.556905] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 149.556920] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 149.556932] CR2: 00007f3226cbd020 CR3: 0000000105a68000 CR4: 00000000000006f0 <4>[ 149.556945] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 149.556958] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 149.556971] Call Trace: <4>[ 149.556984] <4>[ 149.556998] ? show_regs+0x68/0x80 <4>[ 149.557024] ? __warn+0xd5/0x260 <4>[ 149.557043] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.557064] ? report_bug+0x278/0x2e0 <4>[ 149.557090] ? handle_bug+0x7b/0xa0 <4>[ 149.557107] ? exc_invalid_op+0x1c/0x50 <4>[ 149.557126] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 149.557151] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 149.557173] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 149.557194] ? rcu_core_si+0x12/0x20 <4>[ 149.557218] rcu_core+0x683/0x1c80 <4>[ 149.557243] ? __pfx_rcu_core+0x10/0x10 <4>[ 149.557265] ? lapic_next_event+0x19/0x30 <4>[ 149.557284] ? handle_softirqs+0x18e/0x720 <4>[ 149.557306] rcu_core_si+0x12/0x20 <4>[ 149.557325] handle_softirqs+0x20c/0x720 <4>[ 149.557346] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 149.557365] ? trace_preempt_on+0x20/0xc0 <4>[ 149.557383] ? irq_exit_rcu+0x20/0xd0 <4>[ 149.557404] irq_exit_rcu+0x9c/0xd0 <4>[ 149.557422] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 149.557444] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 149.557464] RIP: 0033:0x7f3226cc85b0 <4>[ 149.557488] Code: e8 00 00 00 44 89 4c 24 40 eb 13 0f 1f 80 00 00 00 00 49 83 c6 04 a8 01 0f 85 3a 07 00 00 41 8b 06 89 c2 44 31 e2 d1 ea 75 e8 <48> 83 ec 08 4c 89 f0 48 2b 85 28 03 00 00 41 57 48 c1 f8 02 89 c2 <4>[ 149.557505] RSP: 002b:00007ffd119a2220 EFLAGS: 00000247 <4>[ 149.557522] RAX: 000000006e43a319 RBX: 00007f3226cbd320 RCX: 000000006e43a318 <4>[ 149.557535] RDX: 0000000000000000 RSI: 00007f3226cbd1d0 RDI: 0000000000000003 <4>[ 149.557547] RBP: 00007f3226cf2890 R08: 00007f3226cbd320 R09: 0000000000000000 <4>[ 149.557559] R10: 0000000000000001 R11: 00007f3226cf2890 R12: 000000006e43a318 <4>[ 149.557571] R13: 00007f3226cbd1d0 R14: 00007f3226cbd1bc R15: 00007ffd119a2294 <4>[ 149.557594] <4>[ 149.557605] ---[ end trace 0000000000000000 ]--- Starting [0;1;39mmodprobe@fuse.service[0m - Load Kernel Module fuse... Starting [0;1;39mmodprobe@loop.service[0m - Load Kernel Module loop... <28>[ 149.648439] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. <28>[ 149.649507] systemd[1]: systemd-journald.service: (This warning is only shown for the first unit using IP firewalling.) Starting [0;1;39msystemd-journald.service[0m - Journal Service... Starting [0;1;39msystemd-modules-load.service[0m - Load Kernel Modules... <4>[ 150.075701] ------------[ cut here ]------------ <4>[ 150.075965] WARNING: CPU: 1 PID: 3311 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.076026] Modules linked in: <4>[ 150.076062] CPU: 1 UID: 0 PID: 3311 Comm: (modprobe) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 150.076100] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 150.076111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 150.076125] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.076153] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 150.076174] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 150.076193] RAX: 0000000080000000 RBX: ffff8881047e0990 RCX: ffff888154200000 <4>[ 150.076207] RDX: 0000000000070000 RSI: ffffffff88ebc501 RDI: ffff888154270000 <4>[ 150.076220] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 150.076233] R10: ffffffff8df3348f R11: 00000000000c8400 R12: ffffea000411f800 <4>[ 150.076246] R13: ffff888154270000 R14: 0000000000490001 R15: 0000000000039408 <4>[ 150.076258] FS: 00007f4f7d99bdc0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 150.076273] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 150.076285] CR2: 00007f4f7e497080 CR3: 0000000108b66000 CR4: 00000000000006f0 <4>[ 150.076298] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 150.076311] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 150.076324] Call Trace: <4>[ 150.076335] <4>[ 150.076347] ? show_regs+0x68/0x80 <4>[ 150.076372] ? __warn+0xd5/0x260 <4>[ 150.076392] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.076414] ? report_bug+0x278/0x2e0 <4>[ 150.076439] ? handle_bug+0x7b/0xa0 <4>[ 150.076458] ? exc_invalid_op+0x1c/0x50 <4>[ 150.076475] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 150.076501] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 150.076522] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.076543] ? rcu_core_si+0x12/0x20 <4>[ 150.076567] rcu_core+0x683/0x1c80 <4>[ 150.076591] ? __pfx_rcu_core+0x10/0x10 <4>[ 150.076612] ? lapic_next_event+0x19/0x30 <4>[ 150.076694] ? handle_softirqs+0x18e/0x720 <4>[ 150.076723] rcu_core_si+0x12/0x20 <4>[ 150.076749] handle_softirqs+0x20c/0x720 <4>[ 150.076770] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 150.076789] ? trace_preempt_on+0x20/0xc0 <4>[ 150.076808] ? irq_exit_rcu+0x20/0xd0 <4>[ 150.076826] irq_exit_rcu+0x9c/0xd0 <4>[ 150.076845] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 150.076866] <4>[ 150.076877] <4>[ 150.076887] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 150.076908] RIP: 0010:arch_stack_walk+0x9a/0x100 <4>[ 150.076929] Code: fe 48 89 df e8 d7 1d 07 00 8b 95 60 ff ff ff 85 d2 75 21 eb 2f 4c 89 ef 2e e8 42 89 98 03 84 c0 74 22 48 89 df e8 c6 14 07 00 <8b> 85 60 ff ff ff 85 c0 74 10 48 89 df e8 14 0a 07 00 48 89 c6 48 <4>[ 150.076947] RSP: 0018:ffff8881046ef500 EFLAGS: 00000282 <4>[ 150.076963] RAX: 0000000000000001 RBX: ffff8881046ef500 RCX: ffff8881046ef528 <4>[ 150.076976] RDX: ffff8881046ef568 RSI: 1ffff11020e9a15d RDI: ffff8881046ef558 <4>[ 150.076989] RBP: ffff8881046ef5a0 R08: ffff8881074d0000 R09: ffff8881046ef548 <4>[ 150.077001] R10: ffff8881046ef508 R11: 0000000000000005 R12: ffffffff88a77e00 <4>[ 150.077013] R13: ffff8881046ef5d0 R14: 0000000000000000 R15: ffff8881074d0000 <4>[ 150.077028] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 150.077059] ? __mmput+0xa3/0x320 <4>[ 150.077081] stack_trace_save+0x97/0xd0 <4>[ 150.077098] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 150.077117] ? stack_depot_save_flags+0x2c/0x6d0 <4>[ 150.077139] ? kasan_save_stack+0x4d/0x60 <4>[ 150.077160] ? kasan_save_stack+0x3d/0x60 <4>[ 150.077181] kasan_save_stack+0x3d/0x60 <4>[ 150.077199] ? kasan_save_stack+0x3d/0x60 <4>[ 150.077216] ? kasan_save_track+0x18/0x40 <4>[ 150.077234] ? kasan_save_free_info+0x3f/0x60 <4>[ 150.077251] ? __kasan_slab_free+0x5e/0x80 <4>[ 150.077268] ? kmem_cache_free+0x23a/0x340 <4>[ 150.077285] ? __vm_area_free+0x3c/0x60 <4>[ 150.077303] ? remove_vma+0xe0/0x120 <4>[ 150.077322] ? exit_mmap+0x342/0x750 <4>[ 150.077362] kasan_save_track+0x18/0x40 <4>[ 150.077381] kasan_save_free_info+0x3f/0x60 <4>[ 150.077400] __kasan_slab_free+0x5e/0x80 <4>[ 150.077419] ? __vm_area_free+0x3c/0x60 <4>[ 150.077436] kmem_cache_free+0x23a/0x340 <4>[ 150.077459] __vm_area_free+0x3c/0x60 <4>[ 150.077477] remove_vma+0xe0/0x120 <4>[ 150.077497] exit_mmap+0x342/0x750 <4>[ 150.077517] ? __pfx_exit_mmap+0x10/0x10 <4>[ 150.077535] ? selinux_inode_permission+0x2d3/0x4c0 <4>[ 150.077573] __mmput+0xa3/0x320 <4>[ 150.077592] mmput+0x42/0x50 <4>[ 150.077609] begin_new_exec+0xf62/0x2a20 <4>[ 150.077686] load_elf_binary+0x660/0x4800 <4>[ 150.077713] ? __kernel_read+0x556/0xbc0 <4>[ 150.077735] ? __pfx___kernel_read+0x10/0x10 <4>[ 150.077754] ? trace_preempt_on+0x20/0xc0 <4>[ 150.077772] ? inode_security+0x48/0xe0 <4>[ 150.077797] ? __pfx_load_elf_binary+0x10/0x10 <4>[ 150.077816] ? load_misc_binary+0x6b7/0xb40 <4>[ 150.077837] ? trace_preempt_on+0x20/0xc0 <4>[ 150.077853] ? bprm_execve+0x60b/0x1520 <4>[ 150.077876] bprm_execve+0x62d/0x1520 <4>[ 150.077894] ? __pfx_get_arg_page+0x10/0x10 <4>[ 150.077916] ? __pfx_bprm_execve+0x10/0x10 <4>[ 150.077940] do_execveat_common.isra.0+0x3d4/0x550 <4>[ 150.077957] ? irqentry_exit_to_user_mode+0x48/0x150 <4>[ 150.077980] __x64_sys_execve+0x91/0xc0 <4>[ 150.077999] x64_sys_call+0x19a5/0x2060 <4>[ 150.078019] do_syscall_64+0xb2/0x1d0 <4>[ 150.078038] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 150.078056] RIP: 0033:0x7f4f7daf1207 <4>[ 150.078099] Code: Unable to access opcode bytes at 0x7f4f7daf11dd. <4>[ 150.078111] RSP: 002b:00007fff31724548 EFLAGS: 00000206 ORIG_RAX: 000000000000003b <4>[ 150.078133] RAX: ffffffffffffffda RBX: 00007fff31724cd0 RCX: 00007f4f7daf1207 <4>[ 150.078146] RDX: 0000558d058808b0 RSI: 0000558d05880ad0 RDI: 0000558d058809d0 <4>[ 150.078158] RBP: 00007fff31724880 R08: 0000000000000000 R09: 0000000000000000 <4>[ 150.078170] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 <4>[ 150.078181] R13: 0000000000000000 R14: 00007fff31724bc0 R15: 00007fff317248cc <4>[ 150.078201] <4>[ 150.078212] ---[ end trace 0000000000000000 ]--- Starting [0;1;39msystemd-remount-fs.servic…[0munt Root and Kernel File Systems... Starting [0;1;39msystemd-udev-load-credent…[0mLoad udev Rules from Credentials... Starting [0;1;39msystemd-udev-trigger.service[0m - Coldplug All udev Devices... <4>[ 150.603740] ------------[ cut here ]------------ <4>[ 150.604009] WARNING: CPU: 1 PID: 3317 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.604065] Modules linked in: <4>[ 150.604100] CPU: 1 UID: 0 PID: 3317 Comm: (mount-fs) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 150.604133] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 150.604143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 150.604220] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.604424] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 150.604800] RSP: 0000:ffff88810372fcf0 EFLAGS: 00000202 <4>[ 150.604879] RAX: 0000000080000000 RBX: ffff8881047dc640 RCX: ffff888154200000 <4>[ 150.604902] RDX: 000000000007afe0 RSI: ffffffff88ebc501 RDI: ffff88815427afe0 <4>[ 150.604915] RBP: ffff88810372fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 150.604928] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea000411f700 <4>[ 150.604941] R13: ffff88815427afe0 R14: 0000000000634401 R15: 0000000000039408 <4>[ 150.604954] FS: 00007ffbade01dc0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 150.604974] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 150.604987] CR2: 00007ffbadd2f4a0 CR3: 0000000106802000 CR4: 00000000000006f0 <4>[ 150.605000] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 150.605012] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 150.605025] Call Trace: <4>[ 150.605037] <4>[ 150.605053] ? show_regs+0x68/0x80 <4>[ 150.605091] ? __warn+0xd5/0x260 <4>[ 150.605109] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.605131] ? report_bug+0x278/0x2e0 <4>[ 150.605157] ? handle_bug+0x7b/0xa0 <4>[ 150.605174] ? exc_invalid_op+0x1c/0x50 <4>[ 150.605193] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 150.605217] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 150.605237] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 150.605258] ? rcu_core_si+0x12/0x20 <4>[ 150.605282] rcu_core+0x683/0x1c80 <4>[ 150.605306] ? __pfx_rcu_core+0x10/0x10 <4>[ 150.605327] ? lapic_next_event+0x19/0x30 <4>[ 150.605345] ? handle_softirqs+0x18e/0x720 <4>[ 150.605367] rcu_core_si+0x12/0x20 <4>[ 150.605384] handle_softirqs+0x20c/0x720 <4>[ 150.605405] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 150.605423] ? trace_preempt_on+0x20/0xc0 <4>[ 150.605443] ? irq_exit_rcu+0x20/0xd0 <4>[ 150.605461] irq_exit_rcu+0x9c/0xd0 <4>[ 150.605479] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 150.605501] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 150.605521] RIP: 0033:0x7ffbadc42292 <4>[ 150.605546] Code: 0f 1f 84 00 00 00 00 00 48 89 d8 4c 29 e0 48 39 e8 73 45 80 3b 00 74 35 48 89 ee 48 89 df 48 29 c6 e8 c2 3f e4 ff 85 c0 78 23 <48> 98 48 01 c3 48 83 fd ff 75 d3 80 3b 00 74 1e 48 c7 c6 ff ff ff <4>[ 150.605567] RSP: 002b:00007ffe3f92a170 EFLAGS: 00000202 <4>[ 150.605585] RAX: 0000000000000001 RBX: 000055d4cb98f7e5 RCX: 8000000000000000 <4>[ 150.605598] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 000055d4cb98f7e5 <4>[ 150.605611] RBP: ffffffffffffffff R08: 0000000000000020 R09: 00007ffbadff1b20 <4>[ 150.605698] R10: 00007ffe3f92a110 R11: 0000000000000246 R12: 000055d4cb98f7e5 <4>[ 150.605716] R13: 0000000000000000 R14: 00007ffe3f92a5b0 R15: 00007ffe3f92a58c <4>[ 150.605740] <4>[ 150.605751] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Mounted [0;1;39mdev-hugepages.mount[0m - Huge Pages File System. [[0;32m OK [0m] Mounted [0;1;39mdev-mqueue.mount[0m - POSIX Message Queue File System. [[0;32m OK [0m] Mounted [0;1;39mrun-lock.mount[0m - Legacy Locks Directory /run/lock. [[0;32m OK [0m] Mounted [0;1;39msys-kernel-debug.mount[0m - Kernel Debug File System. [[0;32m OK [0m] Mounted [0;1;39msys-kernel-tracing.mount[0m - Kernel Trace File System. [[0;32m OK [0m] Mounted [0;1;39mtmp.mount[0m - Temporary Directory /tmp. [[0;32m OK [0m] Finished [0;1;39mkmod-static-nodes.service[0m…Create List of Static Device Nodes. [[0;32m OK [0m] Finished [0;1;39mmodprobe@configfs.service[0m - Load Kernel Module configfs. <4>[ 151.335737] ------------[ cut here ]------------ <4>[ 151.335970] WARNING: CPU: 0 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 151.336027] Modules linked in: <4>[ 151.336060] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 151.336095] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 151.336105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 151.336120] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 151.336148] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 151.336198] RSP: 0000:ffff88810030fcf0 EFLAGS: 00000202 <4>[ 151.336271] RAX: 0000000080000000 RBX: ffff888108579900 RCX: ffff888154200000 <4>[ 151.336308] RDX: 0000000000088fe0 RSI: ffffffff88ebc501 RDI: ffff888154288fe0 <4>[ 151.336344] RBP: ffff88810030fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 151.336379] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004215e40 <4>[ 151.336416] R13: ffff888154288fe0 R14: 0000000000200001 R15: 0000000000039408 <4>[ 151.336471] FS: 00007f1fd4386940(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 151.336519] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 151.336542] CR2: 00007f5af0df3080 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 151.336573] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 151.336594] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 151.336670] Call Trace: <4>[ 151.336727] <4>[ 151.336745] ? show_regs+0x68/0x80 <4>[ 151.336791] ? __warn+0xd5/0x260 <4>[ 151.336811] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 151.336832] ? report_bug+0x278/0x2e0 <4>[ 151.336857] ? handle_bug+0x7b/0xa0 <4>[ 151.336875] ? exc_invalid_op+0x1c/0x50 <4>[ 151.336894] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 151.336918] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 151.336939] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 151.336960] ? rcu_core_si+0x12/0x20 <4>[ 151.336983] rcu_core+0x683/0x1c80 <4>[ 151.337008] ? __pfx_rcu_core+0x10/0x10 <4>[ 151.337028] ? lapic_next_event+0x19/0x30 <4>[ 151.337047] ? handle_softirqs+0x18e/0x720 <4>[ 151.337069] rcu_core_si+0x12/0x20 <4>[ 151.337088] handle_softirqs+0x20c/0x720 <4>[ 151.337108] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 151.337126] ? trace_preempt_on+0x20/0xc0 <4>[ 151.337145] ? irq_exit_rcu+0x20/0xd0 <4>[ 151.337164] irq_exit_rcu+0x9c/0xd0 <4>[ 151.337181] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 151.337203] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 151.337223] RIP: 0033:0x7f1fd4d4bb57 <4>[ 151.337250] Code: 40 48 85 ed 0f 85 e8 02 00 00 66 0f 1f 84 00 00 00 00 00 48 8b 84 24 a8 04 00 00 64 48 2b 04 25 28 00 00 00 0f 85 26 03 00 00 <48> 81 c4 b8 04 00 00 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 80 00 <4>[ 151.337270] RSP: 002b:00007ffe248cdf40 EFLAGS: 00000246 <4>[ 151.337298] RAX: 0000000000000000 RBX: 0000557d0ab898a0 RCX: 0000000000000000 <4>[ 151.337312] RDX: 0000000000000010 RSI: 000000000000000f RDI: 000000000000000f <4>[ 151.337324] RBP: 00007ffe248cdfa8 R08: 7fa474d64c56a2d1 R09: d9f0db21092cd735 <4>[ 151.337337] R10: e36fbf4ddc5f39c9 R11: 0000557d0abc6cb0 R12: 0000557d0ab71298 <4>[ 151.337350] R13: 0000000000000010 R14: 0000000000000000 R15: 00000000ffffffff <4>[ 151.337370] <4>[ 151.337381] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39mmodprobe@dm_mod.service[0m - Load Kernel Module dm_mod. [[0;32m OK [0m] Finished [0;1;39mmodprobe@drm.service[0m - Load Kernel Module drm. [[0;32m OK [0m] Finished [0;1;39mmodprobe@efi_pstore.service[0m - Load Kernel Module efi_pstore. [[0;32m OK [0m] Finished [0;1;39mmodprobe@fuse.service[0m - Load Kernel Module fuse. [[0;32m OK [0m] Finished [0;1;39mmodprobe@loop.service[0m - Load Kernel Module loop. [[0;32m OK [0m] Finished [0;1;39msystemd-modules-load.service[0m - Load Kernel Modules. [[0;32m OK [0m] Finished [0;1;39msystemd-remount-fs.servic…[0mmount Root and Kernel File Systems. [[0;32m OK [0m] Finished [0;1;39msystemd-udev-load-credent…[0m- Load udev Rules from Credentials. Starting [0;1;39msystemd-random-seed.service[0m - Load/Save OS Random Seed... Starting [0;1;39msystemd-sysctl.service[0m - Apply Kernel Variables... <4>[ 152.170948] ------------[ cut here ]------------ <4>[ 152.171339] WARNING: CPU: 0 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.171398] Modules linked in: <4>[ 152.171434] CPU: 0 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 152.171469] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 152.171480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 152.171494] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.171530] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 152.171556] RSP: 0000:ffff888108b4fcf0 EFLAGS: 00000202 <4>[ 152.171576] RAX: 0000000080000000 RBX: ffff88810446e3c0 RCX: ffff888154200000 <4>[ 152.171590] RDX: 0000000000098fe0 RSI: ffffffff88ebc501 RDI: ffff888154298fe0 <4>[ 152.171608] RBP: ffff888108b4fd30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 152.171864] R10: 00000000decdbdba R11: ffff888100322048 R12: ffffea0004111b80 <4>[ 152.171922] R13: ffff888154298fe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 152.171939] FS: 00007fddb46f08c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 152.171956] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 152.171969] CR2: 00007fdf2d0a0000 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 152.171982] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 152.171994] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Startin<4>[ 152.172006] Call Trace: g [0;1;39msystemd-tmpfiles-setu<4>[ 152.172019] p-de…[0m Devi<4>[ 152.172033] ? show_regs+0x68/0x80 ce Nodes in /dev gracefully... <4>[ 152.172072] ? __warn+0xd5/0x260 <4>[ 152.172093] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.172116] ? report_bug+0x278/0x2e0 <4>[ 152.172141] ? handle_bug+0x7b/0xa0 <4>[ 152.172160] ? exc_invalid_op+0x1c/0x50 <4>[ 152.172178] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 152.172203] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 152.172223] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.172243] ? rcu_core_si+0x12/0x20 <4>[ 152.172267] rcu_core+0x683/0x1c80 <4>[ 152.172290] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 152.172316] ? __pfx_rcu_core+0x10/0x10 <4>[ 152.172342] rcu_core_si+0x12/0x20 <4>[ 152.172362] handle_softirqs+0x20c/0x720 <4>[ 152.172385] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 152.172405] ? trace_preempt_on+0x20/0xc0 <4>[ 152.172423] ? irq_exit_rcu+0x20/0xd0 <4>[ 152.172443] irq_exit_rcu+0x9c/0xd0 <4>[ 152.172463] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 152.172487] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 152.172510] RIP: 0033:0x55fa8bd9b784 <4>[ 152.172536] Code: 29 00 48 8d 35 10 ac 03 00 89 df 31 c0 e8 e4 af f5 ff 89 c5 85 c0 78 26 89 df 89 c6 e8 95 fc ff ff 89 c3 89 ef e8 cc 01 ff ff <44> 89 e7 e8 c4 01 ff ff 89 d8 5b 5d 41 5c c3 0f 1f 44 00 00 e8 73 <4>[ 152.172558] RSP: 002b:00007ffe17fac720 EFLAGS: 00000202 <4>[ 152.172588] RAX: 00000000fffffff7 RBX: 0000000000000001 RCX: 00007fddb488a100 <4>[ 152.172601] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000007 <4>[ 152.172613] RBP: 0000000000000007 R08: 00007ffe17fac4e0 R09: 0000000000000001 <4>[ 152.172725] R10: 0000000000001101 R11: 0000000000000202 R12: 00000000fffffff7 <4>[ 152.172746] R13: 0000000000000000 R14: 000055fabd8c8ea1 R15: 0000000000000006 <4>[ 152.172770] <4>[ 152.172781] ---[ end trace 0000000000000000 ]--- <4>[ 152.275742] ------------[ cut here ]------------ <4>[ 152.276005] WARNING: CPU: 0 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.276060] Modules linked in: <4>[ 152.276095] CPU: 0 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 152.276130] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 152.276140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 152.276154] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.276182] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 152.276203] RSP: 0000:ffff888108b4fcf0 EFLAGS: 00000202 <4>[ 152.276222] RAX: 0000000080000000 RBX: ffff888107494a00 RCX: ffff888154200000 <4>[ 152.276237] RDX: 000000000009afe0 RSI: ffffffff88ebc501 RDI: ffff88815429afe0 <4>[ 152.276250] RBP: ffff888108b4fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 152.276263] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00041d2500 <4>[ 152.276276] R13: ffff88815429afe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 152.276289] FS: 00007fddb46f08c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 152.276304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 152.276317] CR2: 00007fdf2dbe5008 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 152.276330] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 152.276343] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 152.276407] Call Trace: <4>[ 152.276514] <4>[ 152.276687] ? show_regs+0x68/0x80 <4>[ 152.276775] ? __warn+0xd5/0x260 <4>[ 152.276801] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.276824] ? report_bug+0x278/0x2e0 <4>[ 152.276850] ? handle_bug+0x7b/0xa0 <4>[ 152.276870] ? exc_invalid_op+0x1c/0x50 <4>[ 152.276888] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 152.276913] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 152.276934] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.276955] ? rcu_core_si+0x12/0x20 <4>[ 152.276979] rcu_core+0x683/0x1c80 <4>[ 152.277006] ? __pfx_rcu_core+0x10/0x10 <4>[ 152.277031] ? lapic_next_event+0x19/0x30 <4>[ 152.277050] ? handle_softirqs+0x18e/0x720 <4>[ 152.277073] rcu_core_si+0x12/0x20 <4>[ 152.277095] handle_softirqs+0x20c/0x720 <4>[ 152.277123] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 152.277142] ? trace_preempt_on+0x20/0xc0 <4>[ 152.277162] ? irq_exit_rcu+0x20/0xd0 <4>[ 152.277181] irq_exit_rcu+0x9c/0xd0 <4>[ 152.277199] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 152.277221] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 152.277243] RIP: 0033:0x55fa8bd91fa0 <4>[ 152.277270] Code: 00 ba a3 00 00 00 48 8d 35 6f b8 03 00 48 8d 3d a7 4d 04 00 e8 51 f6 ff ff bb ea ff ff ff eb a4 e8 25 4e f6 ff 0f 1f 44 00 00 0f 1e fa 49 89 f2 48 85 ff 0f 84 00 04 00 00 41 54 49 89 f9 55 <4>[ 152.277291] RSP: 002b:00007ffe17facc48 EFLAGS: 00000206 <4>[ 152.277320] RAX: 00000000fffffffe RBX: 0000000000000000 RCX: 000000000000001c <4>[ 152.277334] RDX: 000055fabd8b29f3 RSI: 00007ffe17facc50 RDI: 0000000000000000 <4>[ 152.277347] RBP: 000055fabd8b29f3 R08: 000000000000e000 R09: 0000000000000005 <4>[ 152.277359] R10: 0000000000000007 R11: 000055fabd8ca910 R12: 00007ffe17facc50 <4>[ 152.277372] R13: 000055fa8be23ac0 R14: 000055fabd8b2920 R15: 00007ffe17facce0 <4>[ 152.277395] <4>[ 152.277405] ---[ end trace 0000000000000000 ]--- <4>[ 152.692735] ------------[ cut here ]------------ <4>[ 152.692964] WARNING: CPU: 0 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.693020] Modules linked in: <4>[ 152.693056] CPU: 0 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 152.693090] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 152.693100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 152.693116] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.693145] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 152.693167] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 152.693186] RAX: 0000000080000000 RBX: ffff888105d7d3c0 RCX: ffff888154200000 <4>[ 152.693201] RDX: 00000000000a0000 RSI: ffffffff88ebc501 RDI: ffff8881542a0000 <4>[ 152.693213] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 152.693227] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004175f40 <4>[ 152.693239] R13: ffff8881542a0000 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 152.693252] FS: 00007fddb46f08c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 152.693267] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 152.693280] CR2: 00007f9460bfd548 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 152.693292] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 152.693304] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 152.693317] Call Trace: <4>[ 152.693329] <4>[ 152.693343] ? show_regs+0x68/0x80 <4>[ 152.693370] ? __warn+0xd5/0x260 <4>[ 152.693398] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.693421] ? report_bug+0x278/0x2e0 <4>[ 152.693449] ? handle_bug+0x7b/0xa0 <4>[ 152.693474] ? exc_invalid_op+0x1c/0x50 <4>[ 152.693493] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 152.693518] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 152.693541] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.693562] ? rcu_core_si+0x12/0x20 <4>[ 152.693586] rcu_core+0x683/0x1c80 <4>[ 152.693613] ? __pfx_rcu_core+0x10/0x10 <4>[ 152.693727] ? lapic_next_event+0x19/0x30 <4>[ 152.693763] ? handle_softirqs+0x18e/0x720 <4>[ 152.693788] rcu_core_si+0x12/0x20 <4>[ 152.693814] handle_softirqs+0x20c/0x720 <4>[ 152.693839] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 152.693860] ? trace_preempt_on+0x20/0xc0 <4>[ 152.693879] ? irq_exit_rcu+0x20/0xd0 <4>[ 152.693900] irq_exit_rcu+0x9c/0xd0 <4>[ 152.693920] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 152.693945] <4>[ 152.693955] <4>[ 152.693966] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 152.693988] RIP: 0010:__kernel_text_address+0x0/0x50 <4>[ 152.694011] Code: 0e 2b 00 0f b6 c0 eb c4 48 c7 c7 c4 e0 f2 8d e8 56 ec 65 00 e9 21 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 8a fe ff ff <4>[ 152.694031] RSP: 0018:ffff888108b4f470 EFLAGS: 00000246 <4>[ 152.694051] RAX: dffffc0000000000 RBX: ffff888108b4f498 RCX: ffff888108b4f4c0 <4>[ 152.694065] RDX: 1ffff11021169e9e RSI: 1ffff11021178f25 RDI: ffffffff8c200130 <4>[ 152.694078] RBP: ffff888108b4f488 R08: ffff888108bc6e40 R09: ffff888108b4f4e0 <4>[ 152.694091] R10: ffff888108b4f4a0 R11: ffff888108b4fc60 R12: ffff888108b4f4f0 <4>[ 152.694104] R13: ffff888108b4f568 R14: 0000000000000000 R15: ffff888108bc6e40 <4>[ 152.694123] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 152.694148] ? unwind_get_return_address+0x65/0xb0 <4>[ 152.694169] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 152.694190] arch_stack_walk+0xac/0x100 <4>[ 152.694212] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 152.694236] stack_trace_save+0x97/0xd0 <4>[ 152.694256] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 152.694274] ? arch_stack_walk+0xac/0x100 <4>[ 152.694296] kasan_save_stack+0x3d/0x60 <4>[ 152.694317] ? kasan_save_stack+0x3d/0x60 <4>[ 152.694335] ? kasan_save_track+0x18/0x40 <4>[ 152.694353] ? kasan_save_alloc_info+0x3b/0x50 <4>[ 152.694370] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 152.694388] ? kmem_cache_alloc_lru_noprof+0x106/0x350 <4>[ 152.694406] ? __d_alloc+0x34/0x890 <4>[ 152.694425] ? d_alloc+0x45/0x210 <4>[ 152.694441] ? d_alloc_parallel+0xe1/0xb30 <4>[ 152.694459] ? __lookup_slow+0x109/0x340 <4>[ 152.694477] ? walk_component+0x2bd/0x4f0 <4>[ 152.694496] ? path_lookupat+0x117/0x680 <4>[ 152.694512] ? filename_lookup+0x184/0x500 <4>[ 152.694528] ? user_path_at+0x3e/0x60 <4>[ 152.694545] ? do_faccessat+0x2f8/0xac0 <4>[ 152.694562] ? __x64_sys_faccessat2+0x9a/0x100 <4>[ 152.694581] ? x64_sys_call+0x182f/0x2060 <4>[ 152.694599] ? do_syscall_64+0xb2/0x1d0 <4>[ 152.694687] kasan_save_track+0x18/0x40 <4>[ 152.694716] kasan_save_alloc_info+0x3b/0x50 <4>[ 152.694737] __kasan_slab_alloc+0x91/0xa0 <4>[ 152.694759] kmem_cache_alloc_lru_noprof+0x106/0x350 <4>[ 152.694785] __d_alloc+0x34/0x890 <4>[ 152.694804] ? __is_insn_slot_addr+0x92/0xe0 <4>[ 152.694827] d_alloc+0x45/0x210 <4>[ 152.694845] ? __kernel_text_address+0x16/0x50 <4>[ 152.694876] d_alloc_parallel+0xe1/0xb30 <4>[ 152.694898] ? __asan_memcpy+0x51/0x70 <4>[ 152.694919] ? avc_has_perm_noaudit+0x98/0x130 <4>[ 152.694945] ? __pfx_d_alloc_parallel+0x10/0x10 <4>[ 152.694967] ? __pfx_selinux_inode_permission+0x10/0x10 <4>[ 152.694991] ? trace_preempt_on+0x20/0xc0 <4>[ 152.695008] ? up_read+0x4e/0xd0 <4>[ 152.695030] __lookup_slow+0x109/0x340 <4>[ 152.695050] ? preempt_count_sub+0x50/0x80 <4>[ 152.695073] ? __pfx___lookup_slow+0x10/0x10 <4>[ 152.695097] ? lookup_fast+0x139/0x450 <4>[ 152.695118] walk_component+0x2bd/0x4f0 <4>[ 152.695141] path_lookupat+0x117/0x680 <4>[ 152.695161] filename_lookup+0x184/0x500 <4>[ 152.695182] ? __pfx_filename_lookup+0x10/0x10 <4>[ 152.695215] ? __kasan_check_write+0x18/0x20 <4>[ 152.695234] ? getname_flags.part.0+0xb1/0x4a0 <4>[ 152.695252] ? __pfx_map_id_range_down+0x10/0x10 <4>[ 152.695278] user_path_at+0x3e/0x60 <4>[ 152.695299] do_faccessat+0x2f8/0xac0 <4>[ 152.695321] ? __pfx_do_faccessat+0x10/0x10 <4>[ 152.695340] ? trace_preempt_on+0x20/0xc0 <4>[ 152.695359] ? syscall_exit_to_user_mode+0x75/0x1a0 <4>[ 152.695383] __x64_sys_faccessat2+0x9a/0x100 <4>[ 152.695403] ? trace_hardirqs_on+0x37/0xe0 <4>[ 152.695421] x64_sys_call+0x182f/0x2060 <4>[ 152.695441] do_syscall_64+0xb2/0x1d0 <4>[ 152.695461] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 152.695483] RIP: 0033:0x7fddb488a53e <4>[ 152.695508] Code: ca 41 54 55 89 d5 53 89 cb 48 81 ec a8 00 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 98 00 00 00 31 c0 b8 b7 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 06 01 00 00 89 c2 85 c0 0f 84 ac 00 00 00 <4>[ 152.695527] RSP: 002b:00007ffe17faca10 EFLAGS: 00000246 ORIG_RAX: 00000000000001b7 <4>[ 152.695550] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fddb488a53e <4>[ 152.695565] RDX: 0000000000000000 RSI: 000055fa8bdcd643 RDI: 0000000000000009 <4>[ 152.695577] RBP: 0000000000000000 R08: 0000000000000009 R09: 00000000000000ff <4>[ 152.695590] R10: 0000000000000000 R11: 0000000000000246 R12: 000055fa8bdcd3d4 <4>[ 152.695602] R13: 000055fabd8d2fb0 R14: 00007ffe17facc20 R15: 000055fabd8d2fb0 <4>[ 152.695679] <4>[ 152.695695] ---[ end trace 0000000000000000 ]--- <4>[ 152.798742] ------------[ cut here ]------------ <4>[ 152.799045] WARNING: CPU: 0 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.799101] Modules linked in: <4>[ 152.799136] CPU: 0 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 152.799171] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 152.799183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 152.799199] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.799226] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 152.799249] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 152.799269] RAX: 0000000080000000 RBX: ffff888108120500 RCX: ffff888154200000 <4>[ 152.799284] RDX: 00000000000a6fe0 RSI: ffffffff88ebc501 RDI: ffff8881542a6fe0 <4>[ 152.799297] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 152.799310] R10: ffffffff8df3348f R11: 00000000000cd400 R12: ffffea0004204800 <4>[ 152.799323] R13: ffff8881542a6fe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 152.799336] FS: 00007fddb46f08c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 152.799352] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 152.799366] CR2: 00007f1299a3b00c CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 152.799388] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 152.799401] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 152.799415] Call Trace: <4>[ 152.799428] <4>[ 152.799441] ? show_regs+0x68/0x80 <4>[ 152.799473] ? __warn+0xd5/0x260 <4>[ 152.799492] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.799514] ? report_bug+0x278/0x2e0 <4>[ 152.799539] ? handle_bug+0x7b/0xa0 <4>[ 152.799557] ? exc_invalid_op+0x1c/0x50 <4>[ 152.799576] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 152.799601] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 152.799697] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 152.799731] ? rcu_core_si+0x12/0x20 <4>[ 152.799761] rcu_core+0x683/0x1c80 <4>[ 152.799787] ? __pfx_rcu_core+0x10/0x10 <4>[ 152.799810] ? lapic_next_event+0x19/0x30 <4>[ 152.799829] ? handle_softirqs+0x18e/0x720 <4>[ 152.799851] rcu_core_si+0x12/0x20 <4>[ 152.799870] handle_softirqs+0x20c/0x720 <4>[ 152.799891] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 152.799910] ? trace_preempt_on+0x20/0xc0 <4>[ 152.799929] ? irq_exit_rcu+0x20/0xd0 <4>[ 152.799949] irq_exit_rcu+0x9c/0xd0 <4>[ 152.799968] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 152.799990] <4>[ 152.800001] <4>[ 152.800011] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 152.800032] RIP: 0010:kasan_check_range+0x160/0x1c0 <4>[ 152.800055] Code: 80 38 00 74 ef 4f 8d 5c 25 00 48 89 c2 48 85 c0 75 9d 48 89 da 4c 89 d8 4c 29 da e9 3a ff ff ff 48 85 d2 74 98 4c 01 e2 eb 09 <48> 83 c0 01 48 39 d0 74 8a 80 38 00 74 f2 e9 65 ff ff ff b8 01 00 <4>[ 152.800074] RSP: 0018:ffff888108b4fd40 EFLAGS: 00000246 <4>[ 152.800092] RAX: ffffed1020bdacc2 RBX: ffffed1020bdacc3 RCX: ffffffff88fec925 <4>[ 152.800106] RDX: ffffed1020bdacc3 RSI: 0000000000000004 RDI: ffff888105ed6610 <4>[ 152.800118] RBP: ffff888108b4fd58 R08: 0000000000000000 R09: ffffed1020bdacc2 <4>[ 152.800130] R10: ffff888105ed6613 R11: ffff888108b4fc10 R12: ffffed1020bdacc2 <4>[ 152.800142] R13: ffff888105ed6600 R14: 0000000000000007 R15: dffffc0000000000 <4>[ 152.800159] ? putname+0x35/0x130 <4>[ 152.800187] __kasan_check_read+0x15/0x20 <4>[ 152.800208] putname+0x35/0x130 <4>[ 152.800227] do_sys_openat2+0x12b/0x190 <4>[ 152.800248] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 152.800270] ? call_rcu+0x12/0x20 <4>[ 152.800289] ? kmem_cache_free+0x143/0x340 <4>[ 152.800311] __x64_sys_openat+0x12c/0x210 <4>[ 152.800330] ? __fput+0x581/0xad0 <4>[ 152.800349] ? trace_preempt_on+0x20/0xc0 <4>[ 152.800365] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 152.800387] ? do_syscall_64+0xbf/0x1d0 <4>[ 152.800404] ? do_syscall_64+0x7e/0x1d0 <4>[ 152.800421] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 152.800442] x64_sys_call+0x1e3e/0x2060 <4>[ 152.800463] do_syscall_64+0xb2/0x1d0 <4>[ 152.800483] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 152.800503] RIP: 0033:0x7fddb488e28c <4>[ 152.800527] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 152.800545] RSP: 002b:00007ffe17fac6b0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 152.800567] RAX: ffffffffffffffda RBX: 000055fabd8d58d0 RCX: 00007fddb488e28c <4>[ 152.800580] RDX: 00000000002a0000 RSI: 000055fabd8d58d0 RDI: 0000000000000007 <4>[ 152.800592] RBP: 0000000000000000 R08: 000000000000c000 R09: 0000000000000000 <4>[ 152.800604] R10: 0000000000000000 R11: 0000000000000202 R12: 000055fabd8d5890 <4>[ 152.800667] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 152.800695] <4>[ 152.800706] ---[ end trace 0000000000000000 ]--- <4>[ 153.002735] ------------[ cut here ]------------ <4>[ 153.002992] WARNING: CPU: 1 PID: 3315 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.003048] Modules linked in: <4>[ 153.003082] CPU: 1 UID: 0 PID: 3315 Comm: systemd-journal Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 153.003119] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 153.003129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 153.003143] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.003170] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 153.003192] RSP: 0000:ffff888103b47cf0 EFLAGS: 00000202 <4>[ 153.003212] RAX: 0000000080000000 RBX: ffff888107b9f280 RCX: ffff888154200000 <4>[ 153.003226] RDX: 00000000000a4000 RSI: ffffffff88ebc501 RDI: ffff8881542a4000 <4>[ 153.003239] RBP: ffff888103b47d30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 153.003252] R10: ffffffff8df3348f R11: 00000000000c8800 R12: ffffea00041ee7c0 <4>[ 153.003264] R13: ffff8881542a4000 R14: 0000000008a80501 R15: 0000000000039408 <4>[ 153.003277] FS: 00007fd13060a940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 153.003292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 153.003304] CR2: 00007fd12f0be010 CR3: 000000010255c000 CR4: 00000000000006f0 <4>[ 153.003317] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 153.003329] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 153.003343] Call Trace: <4>[ 153.003356] <4>[ 153.003387] ? show_regs+0x68/0x80 <4>[ 153.003463] ? __warn+0xd5/0x260 <4>[ 153.003482] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.003505] ? report_bug+0x278/0x2e0 <4>[ 153.003530] ? handle_bug+0x7b/0xa0 <4>[ 153.003548] ? exc_invalid_op+0x1c/0x50 <4>[ 153.003567] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 153.003591] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 153.003709] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.003792] ? rcu_core_si+0x12/0x20 <4>[ 153.003822] rcu_core+0x683/0x1c80 <4>[ 153.003849] ? __pfx_rcu_core+0x10/0x10 <4>[ 153.003872] ? lapic_next_event+0x19/0x30 <4>[ 153.003891] ? handle_softirqs+0x18e/0x720 <4>[ 153.003913] rcu_core_si+0x12/0x20 <4>[ 153.003933] handle_softirqs+0x20c/0x720 <4>[ 153.003956] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 153.003975] ? trace_preempt_on+0x20/0xc0 <4>[ 153.003994] ? irq_exit_rcu+0x20/0xd0 <4>[ 153.004015] irq_exit_rcu+0x9c/0xd0 <4>[ 153.004033] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 153.004056] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 153.004077] RIP: 0033:0x7fd1300bf0bc <4>[ 153.004104] Code: 6c 17 e0 0f 11 74 17 d0 0f 11 7c 17 c0 c3 48 89 f9 48 29 f1 48 39 d1 0f 82 91 00 00 00 48 3b 15 7a 91 13 00 0f 87 24 01 00 00 <4c> 8d 04 11 49 31 c8 49 c1 e8 3f 81 e1 00 0f 00 00 44 01 c1 74 73 <4>[ 153.004126] RSP: 002b:00007ffd53fafda8 EFLAGS: 00000287 <4>[ 153.004156] RAX: 00007ffd53faff00 RBX: 00007fd1304a6580 RCX: 0000000000000150 <4>[ 153.004171] RDX: 0000000000000090 RSI: 00007ffd53fafdb0 RDI: 00007ffd53faff00 <4>[ 153.004184] RBP: 00007ffd53fafef0 R08: 0000000000000000 R09: 00007ffd53fb002c <4>[ 153.004197] R10: 00007ffd53fafdb0 R11: 00007ffd53fb0060 R12: 00000000000000b0 <4>[ 153.004210] R13: 000055d09a1d7ca0 R14: 0000000000000010 R15: 0000000000000000 <4>[ 153.004232] <4>[ 153.004243] ---[ end trace 0000000000000000 ]--- <4>[ 153.108738] ------------[ cut here ]------------ <4>[ 153.109018] WARNING: CPU: 0 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.109075] Modules linked in: <4>[ 153.109111] CPU: 0 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 153.109147] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 153.109157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 153.109173] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.109200] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 153.109222] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 153.109242] RAX: 0000000080000000 RBX: ffff88810805f140 RCX: ffff888154200000 <4>[ 153.109255] RDX: 00000000000aa000 RSI: ffffffff88ebc501 RDI: ffff8881542aa000 <4>[ 153.109268] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 153.109281] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00042017c0 <4>[ 153.109294] R13: ffff8881542aa000 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 153.109307] FS: 00007fddb46f08c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 153.109322] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 153.109335] CR2: 00007f0d5cfb3008 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 153.109349] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 153.109361] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 153.109376] Call Trace: <4>[ 153.109400] <4>[ 153.109417] ? show_regs+0x68/0x80 <4>[ 153.109444] ? __warn+0xd5/0x260 <4>[ 153.109472] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.109496] ? report_bug+0x278/0x2e0 <4>[ 153.109524] ? handle_bug+0x7b/0xa0 <4>[ 153.109555] ? exc_invalid_op+0x1c/0x50 <4>[ 153.109584] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 153.109611] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 153.109718] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 153.109749] ? rcu_core_si+0x12/0x20 <4>[ 153.109775] rcu_core+0x683/0x1c80 <4>[ 153.109808] ? __pfx_rcu_core+0x10/0x10 <4>[ 153.109831] ? lapic_next_event+0x19/0x30 <4>[ 153.109851] ? handle_softirqs+0x18e/0x720 <4>[ 153.109873] rcu_core_si+0x12/0x20 <4>[ 153.109893] handle_softirqs+0x20c/0x720 <4>[ 153.109915] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 153.109934] ? trace_preempt_on+0x20/0xc0 <4>[ 153.109953] ? irq_exit_rcu+0x20/0xd0 <4>[ 153.109973] irq_exit_rcu+0x9c/0xd0 <4>[ 153.109991] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 153.110015] <4>[ 153.110024] <4>[ 153.110035] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 153.110056] RIP: 0010:kmem_cache_alloc_noprof+0x96/0x340 <4>[ 153.110080] Code: 02 00 00 48 c7 44 24 10 00 00 00 00 49 8b 04 24 65 48 03 05 44 3b 16 77 48 8b 50 08 48 83 78 10 00 4c 8b 30 0f 84 11 02 00 00 <4d> 85 f6 0f 84 08 02 00 00 41 8b 44 24 28 49 8b 34 24 48 8d 4a 40 <4>[ 153.110099] RSP: 0018:ffff888108b4fd70 EFLAGS: 00000286 <4>[ 153.110117] RAX: ffff888154a3f4f0 RBX: 0000000000000000 RCX: 0000000000001000 <4>[ 153.110131] RDX: 00000000000740c0 RSI: 0000000000000cc0 RDI: ffff8881002a2dc0 <4>[ 153.110144] RBP: ffff888108b4fdb8 R08: 1ffff11021169ff9 R09: 0000000000001000 <4>[ 153.110157] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881002a2dc0 <4>[ 153.110168] R13: 0000000000000cc0 R14: ffff888107c13300 R15: ffffffff88fee4cf <4>[ 153.110182] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 153.110215] getname_flags.part.0+0x4f/0x4a0 <4>[ 153.110239] getname_flags+0x81/0xc0 <4>[ 153.110259] do_readlinkat+0xb3/0x360 <4>[ 153.110282] ? __pfx_do_readlinkat+0x10/0x10 <4>[ 153.110299] ? trace_preempt_on+0x20/0xc0 <4>[ 153.110320] ? syscall_exit_to_user_mode+0x75/0x1a0 <4>[ 153.110343] __x64_sys_readlinkat+0x9a/0x100 <4>[ 153.110363] ? trace_hardirqs_on+0x37/0xe0 <4>[ 153.110380] x64_sys_call+0x17f8/0x2060 <4>[ 153.110401] do_syscall_64+0xb2/0x1d0 <4>[ 153.110420] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 153.110441] RIP: 0033:0x7fddb488eaea <4>[ 153.110463] Code: 48 8b 15 39 73 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 0b 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 06 73 0d 00 f7 d8 64 89 01 48 <4>[ 153.110480] RSP: 002b:00007ffe17facb08 EFLAGS: 00000202 ORIG_RAX: 000000000000010b <4>[ 153.110501] RAX: ffffffffffffffda RBX: 000055fabd8dacd0 RCX: 00007fddb488eaea <4>[ 153.110515] RDX: 000055fabd8dacd0 RSI: 00007ffe17facb90 RDI: 00000000ffffff9c <4>[ 153.110527] RBP: 0000000000001000 R08: 0000000000000000 R09: 0000000000000001 <4>[ 153.110538] R10: 0000000000001000 R11: 0000000000000202 R12: 0000000000000033 <4>[ 153.110550] R13: 00007ffe17facb90 R14: 00000000ffffff9c R15: 00007ffe17facb60 <4>[ 153.110571] <4>[ 153.110582] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-random-seed.service[0m - Load/Save OS Random Seed. [[0;32m OK [0m] Finished [0;1;39msystemd-sysctl.service[0m - Apply Kernel Variables. [[0;32m OK [0m] Finished [0;1;39msystemd-tmpfiles-setup-de…[0mic Device Nodes in /dev gracefully. Starting [0;1;39msystemd-sysusers.service[0m - Create System Users... <4>[ 154.148769] ------------[ cut here ]------------ <4>[ 154.149063] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.149127] Modules linked in: <4>[ 154.149162] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 154.149198] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 154.149209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 154.149223] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.149252] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 154.149274] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 154.149294] RAX: 0000000080000000 RBX: ffff888107fef000 RCX: ffff888154200000 <4>[ 154.149309] RDX: 00000000000befe0 RSI: ffffffff88ebc501 RDI: ffff8881542befe0 <4>[ 154.149321] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 154.149334] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00041ffbc0 <4>[ 154.149346] R13: ffff8881542befe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 154.149359] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 154.149375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 154.149387] CR2: 000055fabd8f32a8 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 154.149400] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 154.149413] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 154.149425] Call Trace: <4>[ 154.149437] <4>[ 154.149450] ? show_regs+0x68/0x80 <4>[ 154.149476] ? __warn+0xd5/0x260 <4>[ 154.149494] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.149517] ? report_bug+0x278/0x2e0 <4>[ 154.149543] ? handle_bug+0x7b/0xa0 <4>[ 154.149562] ? exc_invalid_op+0x1c/0x50 <4>[ 154.149580] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 154.149606] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 154.149739] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.149792] ? rcu_core_si+0x12/0x20 <4>[ 154.149839] rcu_core+0x683/0x1c80 <4>[ 154.149892] ? __pfx_rcu_core+0x10/0x10 <4>[ 154.149935] ? lapic_next_event+0x19/0x30 <4>[ 154.149956] ? handle_softirqs+0x18e/0x720 <4>[ 154.149978] rcu_core_si+0x12/0x20 <4>[ 154.149998] handle_softirqs+0x20c/0x720 <4>[ 154.150019] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 154.150038] ? trace_preempt_on+0x20/0xc0 <4>[ 154.150058] ? irq_exit_rcu+0x20/0xd0 <4>[ 154.150079] irq_exit_rcu+0x9c/0xd0 <4>[ 154.150097] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 154.150119] <4>[ 154.150130] <4>[ 154.150139] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 154.150161] RIP: 0010:__kasan_record_aux_stack+0x14/0xc0 <4>[ 154.150184] Code: cc 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 55 41 54 41 89 f4 53 48 89 fb e8 ec ce ff ff <48> 89 da 48 89 c6 48 8b 05 ef 39 00 05 48 29 c2 48 81 fa ff ff 1f <4>[ 154.150203] RSP: 0018:ffff888108b4fdd8 EFLAGS: 00000246 <4>[ 154.150222] RAX: ffffea0004093fc0 RBX: ffff8881024ff500 RCX: 0000000000000028 <4>[ 154.150236] RDX: 0000000000000000 RSI: ffffffff8878285b RDI: ffffffff8878285b <4>[ 154.150249] RBP: ffff888108b4fdf0 R08: ffff888108bc6e40 R09: 0000000000000001 <4>[ 154.150261] R10: ffff888108b4fe10 R11: 0000000000000005 R12: 0000000000000000 <4>[ 154.150273] R13: ffff8881002a3280 R14: ffffea0004093fc0 R15: 0000000000000000 <4>[ 154.150292] ? __virt_addr_valid+0x1db/0x2d0 <4>[ 154.150313] ? __virt_addr_valid+0x1db/0x2d0 <4>[ 154.150334] ? __kasan_record_aux_stack+0x14/0xc0 <4>[ 154.150355] ? __fput+0x581/0xad0 <4>[ 154.150375] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 154.150396] kmem_cache_free+0x12b/0x340 <4>[ 154.150419] __fput+0x581/0xad0 <4>[ 154.150437] ? trace_preempt_on+0x20/0xc0 <4>[ 154.150454] ? file_close_fd+0x67/0x80 <4>[ 154.150477] __fput_sync+0x38/0x50 <4>[ 154.150496] __x64_sys_close+0x81/0xe0 <4>[ 154.150518] x64_sys_call+0x17ab/0x2060 <4>[ 154.150538] do_syscall_64+0xb2/0x1d0 <4>[ 154.150558] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 154.150578] RIP: 0033:0x7fddb488a100 <4>[ 154.150601] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 69 42 0e 00 00 74 17 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c <4>[ 154.150680] RSP: 002b:00007ffe17fac7d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 <4>[ 154.150708] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00007fddb488a100 <4>[ 154.150722] RDX: 000055ffe224fd01 RSI: 000055fabd8f1ed0 RDI: 0000000000000007 <4>[ 154.150734] RBP: 00007fddb46f0690 R08: 0000000000000003 R09: 0000000000000002 <4>[ 154.150745] R10: 0000000000000007 R11: 0000000000000202 R12: 0000000000000000 <4>[ 154.150757] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 154.150778] <4>[ 154.150789] ---[ end trace 0000000000000000 ]--- <4>[ 154.250739] ------------[ cut here ]------------ <4>[ 154.250987] WARNING: CPU: 0 PID: 3327 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.251046] Modules linked in: <4>[ 154.251081] CPU: 0 UID: 0 PID: 3327 Comm: 9 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 154.251116] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 154.251127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 154.251142] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.251170] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 154.251192] RSP: 0000:ffff888106627cf0 EFLAGS: 00000202 <4>[ 154.251212] RAX: 0000000080000000 RBX: ffff8881022d38c0 RCX: ffff888154200000 <4>[ 154.251226] RDX: 00000000000c2000 RSI: ffffffff88ebc501 RDI: ffff8881542c2000 <4>[ 154.251239] RBP: ffff888106627d30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 154.251253] R10: ffffffff8df3348f R11: 0000000000000034 R12: ffffea000408b4c0 <4>[ 154.251268] R13: ffff8881542c2000 R14: 0000000000630501 R15: 0000000000039408 <4>[ 154.251281] FS: 00007f95ce40fdc0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 154.251297] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 154.251311] CR2: 00005588dfa70538 CR3: 000000010625a000 CR4: 00000000000006f0 <4>[ 154.251324] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 154.251336] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 154.251350] Call Trace: <4>[ 154.251363] <4>[ 154.251379] ? show_regs+0x68/0x80 <4>[ 154.251406] ? __warn+0xd5/0x260 <4>[ 154.251443] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.251486] ? report_bug+0x278/0x2e0 <4>[ 154.251538] ? handle_bug+0x7b/0xa0 <4>[ 154.251581] ? exc_invalid_op+0x1c/0x50 <4>[ 154.251720] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 154.251851] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 154.251881] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 154.251903] ? rcu_core_si+0x12/0x20 <4>[ 154.251931] rcu_core+0x683/0x1c80 <4>[ 154.251958] ? __pfx_rcu_core+0x10/0x10 <4>[ 154.251981] ? lapic_next_event+0x19/0x30 <4>[ 154.252002] ? handle_softirqs+0x18e/0x720 <4>[ 154.252026] rcu_core_si+0x12/0x20 <4>[ 154.252046] handle_softirqs+0x20c/0x720 <4>[ 154.252068] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 154.252089] ? trace_preempt_on+0x20/0xc0 <4>[ 154.252108] ? irq_exit_rcu+0x20/0xd0 <4>[ 154.252127] irq_exit_rcu+0x9c/0xd0 <4>[ 154.252146] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 154.252169] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 154.252192] RIP: 0033:0x7f95ce1e60ab <4>[ 154.252220] Code: 2b c2 e9 ff 48 89 c5 eb 21 66 0f 1f 44 00 00 4c 89 e7 e8 f8 f0 e9 ff 48 89 de 89 c7 e8 7e 07 ea ff 85 c0 79 1e 83 f8 fe 75 25 45 00 00 00 00 00 4c 89 e7 e8 56 f6 e9 ff 48 89 c3 48 85 c0 75 <4>[ 154.252242] RSP: 002b:00007ffca1f1d370 EFLAGS: 00000203 <4>[ 154.252272] RAX: 00007f95ce40fb68 RBX: 0000000000000007 RCX: 00007f95ce4a9c86 <4>[ 154.252288] RDX: 000000007fffffff RSI: 0000000000000081 RDI: 00005588dfa674f0 <4>[ 154.252301] RBP: 00007f95ce40fb68 R08: 0000000000000000 R09: 0000000000000001 <4>[ 154.252313] R10: 0000000000000000 R11: 0000000000000246 R12: 00005588dfa674f0 <4>[ 154.252326] R13: 00005588dfa6f548 R14: 00007ffca1f1d410 R15: 00007ffca1f1d4a0 <4>[ 154.252349] <4>[ 154.252359] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-sysusers.service[0m - Create System Users. Starting [0;1;39msystemd-tmpfiles-setup-de…[0meate Static Device Nodes in /dev... [[0;32m OK [0m] Started [0;1;39msystemd-journald.service[0m - Journal Service. <4>[ 155.292707] ------------[ cut here ]------------ <4>[ 155.292936] WARNING: CPU: 1 PID: 3336 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.292993] Modules linked in: <4>[ 155.293030] CPU: 1 UID: 0 PID: 3336 Comm: (sd-close) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 155.293066] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 155.293077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 155.293091] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.293119] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 155.293141] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 155.293162] RAX: 0000000080000000 RBX: ffff88810322d3c0 RCX: ffff888154200000 <4>[ 155.293176] RDX: 00000000000d2000 RSI: ffffffff88ebc501 RDI: ffff8881542d2000 <4>[ 155.293190] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 155.293205] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00040c8b40 <4>[ 155.293219] R13: ffff8881542d2000 R14: 0000000000c80501 R15: 0000000000039408 <4>[ 155.293233] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 155.293249] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 155.293263] CR2: 000055fabd90d098 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 155.293276] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 155.293290] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 155.293304] Call Trace: <4>[ 155.293316] <4>[ 155.293330] ? show_regs+0x68/0x80 <4>[ 155.293357] ? __warn+0xd5/0x260 <4>[ 155.293377] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.293401] ? report_bug+0x278/0x2e0 <4>[ 155.293427] ? handle_bug+0x7b/0xa0 <4>[ 155.293446] ? exc_invalid_op+0x1c/0x50 <4>[ 155.293465] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 155.293490] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 155.293513] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.293535] ? rcu_core_si+0x12/0x20 <4>[ 155.293561] rcu_core+0x683/0x1c80 <4>[ 155.293586] ? __pfx_rcu_core+0x10/0x10 <4>[ 155.293610] ? lapic_next_event+0x19/0x30 <4>[ 155.293747] ? handle_softirqs+0x18e/0x720 <4>[ 155.293779] rcu_core_si+0x12/0x20 <4>[ 155.293800] handle_softirqs+0x20c/0x720 <4>[ 155.293823] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 155.293842] ? trace_preempt_on+0x20/0xc0 <4>[ 155.293862] ? irq_exit_rcu+0x20/0xd0 <4>[ 155.293882] irq_exit_rcu+0x9c/0xd0 <4>[ 155.293901] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 155.293925] <4>[ 155.293934] <4>[ 155.293949] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 155.293979] RIP: 0010:kmem_cache_free+0x2ac/0x340 <4>[ 155.294003] Code: 8b 65 08 e9 c1 fd ff ff 4c 8d 72 ff e9 fb fd ff ff 49 83 e0 f8 b9 01 00 00 00 4c 89 f6 4c 89 ef 48 8d 54 24 10 e8 74 0c 0e 00 <48> 8b 5c 24 10 e9 04 fe ff ff 41 8b 4d 50 41 39 4d 28 72 03 83 c1 <4>[ 155.294022] RSP: 0018:ffff88810a8dfa50 EFLAGS: 00000286 <4>[ 155.294042] RAX: ffff88810a8dfa68 RBX: ffff888100ece060 RCX: 00000000ffffff98 <4>[ 155.294056] RDX: 0000000000000000 RSI: ffffffff88f9dbc0 RDI: ffff888107cc3388 <4>[ 155.294069] RBP: ffff88810a8dfa98 R08: ffff88810243cc00 R09: 1ffff11020457751 <4>[ 155.294082] R10: ffff888107d01ab7 R11: 0000000000000005 R12: ffffffff88e6ecd7 <4>[ 155.294094] R13: ffff8881002a1000 R14: ffffea000403b380 R15: dffffc0000000000 <4>[ 155.294110] ? unlink_anon_vmas+0x117/0x5e0 <4>[ 155.294135] ? __memcg_slab_free_hook+0x260/0x4b0 <4>[ 155.294163] unlink_anon_vmas+0x117/0x5e0 <4>[ 155.294199] free_pgtables+0x355/0x990 <4>[ 155.294238] ? __pfx_free_pgtables+0x10/0x10 <4>[ 155.294259] ? trace_preempt_on+0x20/0xc0 <4>[ 155.294278] ? down_write+0xdc/0x140 <4>[ 155.294300] ? __pfx_down_write+0x10/0x10 <4>[ 155.294319] ? up_read+0x4e/0xd0 <4>[ 155.294340] ? preempt_count_sub+0x50/0x80 <4>[ 155.294365] exit_mmap+0x276/0x750 <4>[ 155.294389] ? __pfx_exit_mmap+0x10/0x10 <4>[ 155.294412] ? preempt_count_sub+0x50/0x80 <4>[ 155.294444] __mmput+0xa3/0x320 <4>[ 155.294465] mmput+0x42/0x50 <4>[ 155.294484] do_exit+0x7c7/0x28f0 <4>[ 155.294507] ? __pfx_do_exit+0x10/0x10 <4>[ 155.294528] ? syscall_exit_to_user_mode+0x75/0x1a0 <4>[ 155.294550] ? do_syscall_64+0xbf/0x1d0 <4>[ 155.294570] __x64_sys_exit+0x46/0x50 <4>[ 155.294592] x64_sys_call+0x1456/0x2060 <4>[ 155.294614] do_syscall_64+0xb2/0x1d0 <4>[ 155.294697] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 155.294723] RIP: 0033:0x7f1fd4b2688a <4>[ 155.294748] Code: Unable to access opcode bytes at 0x7f1fd4b26860. <4>[ 155.294759] RSP: 002b:00007ffe248cd000 EFLAGS: 00000246 ORIG_RAX: 000000000000003c <4>[ 155.294783] RAX: ffffffffffffffda RBX: 00007f1fd4695560 RCX: 00007f1fd4b2688a <4>[ 155.294797] RDX: 0000000000000000 RSI: 00007f1fd48ea2d7 RDI: 0000000000000000 <4>[ 155.294810] RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000007 <4>[ 155.294822] R10: 00007f1fd4b26872 R11: 0000000000000246 R12: 000000000000002d <4>[ 155.294834] R13: 0000000000000411 R14: 0000557d0aaddc60 R15: 0000000000000000 <4>[ 155.294855] <4>[ 155.294876] ---[ end trace 0000000000000000 ]--- <4>[ 155.917126] ------------[ cut here ]------------ <4>[ 155.917365] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.917422] Modules linked in: <4>[ 155.917458] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 155.917496] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 155.917507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 155.917522] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.917550] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 155.917572] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 155.917594] RAX: 0000000080000000 RBX: ffff888103238000 RCX: ffff888154200000 <4>[ 155.917609] RDX: 00000000000e2fe0 RSI: ffffffff88ebc501 RDI: ffff8881542e2fe0 <4>[ 155.917750] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 155.917772] R10: 0000000029f6378d R11: 00000000000000e3 R12: ffffea00040c8e00 <4>[ 155.917786] R13: ffff8881542e2fe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 155.917800] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 155.917816] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 155.917829] CR2: 00007f1fd4b150f0 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 155.917842] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 155.917855] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 155.917868] Call Trace: <4>[ 155.917881] <4>[ 155.917894] ? show_regs+0x68/0x80 <4>[ 155.917924] ? __warn+0xd5/0x260 <4>[ 155.917943] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.917967] ? report_bug+0x278/0x2e0 <4>[ 155.917995] ? handle_bug+0x7b/0xa0 <4>[ 155.918014] ? exc_invalid_op+0x1c/0x50 <4>[ 155.918035] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 155.918061] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 155.918084] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 155.918106] ? rcu_core_si+0x12/0x20 <4>[ 155.918131] rcu_core+0x683/0x1c80 <4>[ 155.918157] ? __pfx_rcu_core+0x10/0x10 <4>[ 155.918178] ? lapic_next_event+0x19/0x30 <4>[ 155.918198] ? handle_softirqs+0x18e/0x720 <4>[ 155.918221] rcu_core_si+0x12/0x20 <4>[ 155.918240] handle_softirqs+0x20c/0x720 <4>[ 155.918263] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 155.918283] ? trace_preempt_on+0x20/0xc0 <4>[ 155.918304] ? irq_exit_rcu+0x20/0xd0 <4>[ 155.918324] irq_exit_rcu+0x9c/0xd0 <4>[ 155.918344] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 155.918368] <4>[ 155.918378] <4>[ 155.918389] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 155.918410] RIP: 0010:__is_insn_slot_addr+0x63/0xe0 <4>[ 155.918431] Code: 85 8f 00 00 00 48 8b 5b 38 4c 39 f3 74 46 49 bc 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 f8 48 c1 e8 03 42 80 3c 20 00 75 59 <48> 8b 43 10 49 39 c5 72 0b 48 05 00 10 00 00 49 39 c5 72 2c 48 89 <4>[ 155.918450] RSP: 0018:ffff888108b4f940 EFLAGS: 00000246 <4>[ 155.918469] RAX: 1ffff11020b9d722 RBX: ffff888105ceb900 RCX: 1ffffffff1be5c18 <4>[ 155.918483] RDX: 1ffffffff1ad0557 RSI: 0000000000000000 RDI: ffff888105ceb910 <4>[ 155.918496] RBP: ffff888108b4f960 R08: ffff888108bc6e40 R09: ffff888108b4fa10 <4>[ 155.918509] R10: ffff888108b4f9d0 R11: 0000000000000005 R12: dffffc0000000000 <4>[ 155.918522] R13: 0000000000000000 R14: ffffffff8d682ab8 R15: ffff888108bc6e40 <4>[ 155.918546] kernel_text_address+0xa9/0x150 <4>[ 155.918568] ? __unwind_start+0x1fc/0x390 <4>[ 155.918589] __kernel_text_address+0x16/0x50 <4>[ 155.918610] unwind_get_return_address+0x65/0xb0 <4>[ 155.918697] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 155.918727] arch_stack_walk+0xac/0x100 <4>[ 155.918754] stack_trace_save+0x97/0xd0 <4>[ 155.918773] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 155.918795] ? stack_trace_save+0x97/0xd0 <4>[ 155.918814] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 155.918832] ? __asan_memcpy+0x51/0x70 <4>[ 155.918853] kasan_save_stack+0x3d/0x60 <4>[ 155.918886] ? kasan_save_stack+0x3d/0x60 <4>[ 155.918904] ? kasan_save_track+0x18/0x40 <4>[ 155.918922] ? kasan_save_alloc_info+0x3b/0x50 <4>[ 155.918940] ? __kasan_kmalloc+0xb7/0xc0 <4>[ 155.918959] ? __kmalloc_cache_noprof+0x162/0x350 <4>[ 155.918978] ? kmem_cache_free+0x115/0x340 <4>[ 155.918997] ? __fput+0x581/0xad0 <4>[ 155.919017] ? __fput_sync+0x38/0x50 <4>[ 155.919035] ? __x64_sys_close+0x81/0xe0 <4>[ 155.919055] ? x64_sys_call+0x17ab/0x2060 <4>[ 155.919076] ? do_syscall_64+0xb2/0x1d0 <4>[ 155.919092] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 155.919132] kasan_save_track+0x18/0x40 <4>[ 155.919153] kasan_save_alloc_info+0x3b/0x50 <4>[ 155.919175] __kasan_kmalloc+0xb7/0xc0 <4>[ 155.919197] __kmalloc_cache_noprof+0x162/0x350 <4>[ 155.919219] ? __fput+0x581/0xad0 <4>[ 155.919239] kmem_cache_free+0x115/0x340 <4>[ 155.919260] ? kmem_cache_free+0x115/0x340 <4>[ 155.919283] __fput+0x581/0xad0 <4>[ 155.919301] ? trace_preempt_on+0x20/0xc0 <4>[ 155.919320] ? file_close_fd+0x67/0x80 <4>[ 155.919343] __fput_sync+0x38/0x50 <4>[ 155.919364] __x64_sys_close+0x81/0xe0 <4>[ 155.919385] x64_sys_call+0x17ab/0x2060 <4>[ 155.919405] do_syscall_64+0xb2/0x1d0 <4>[ 155.919425] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 155.919445] RIP: 0033:0x7fddb488a100 <4>[ 155.919469] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 69 42 0e 00 00 74 17 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c <4>[ 155.919488] RSP: 002b:00007ffe17fac7d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 <4>[ 155.919510] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00007fddb488a100 <4>[ 155.919524] RDX: 0000000000000018 RSI: 000055fa8bdcf200 RDI: 0000000000000007 <4>[ 155.919536] RBP: 00007fddb46f0690 R08: 0000000000000000 R09: 0000000000000000 <4>[ 155.919548] R10: 00007fddb4904b10 R11: 0000000000000202 R12: 0000000000000000 <4>[ 155.919559] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 155.919580] <4>[ 155.919591] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-tmpfiles-setup-de…[0mCreate Static Device Nodes in /dev. [[0;32m OK [0m] Reached target [0;1;39mlocal-fs-pre.target[0m…Preparation for Local File Systems. [[0;32m OK [0m] Reached target [0;1;39mlocal-fs.target[0m - Local File Systems. [[0;32m OK [0m] Listening on [0;1;39msystemd-sysext.socket[0m… System Extension Image Management. Starting [0;1;39mldconfig.service[0m - Rebuild Dynamic Linker Cache... Starting [0;1;39msystemd-binfmt.service[0m - Set Up Additional Binary Formats... <4>[ 156.331732] ------------[ cut here ]------------ <4>[ 156.331983] WARNING: CPU: 1 PID: 3354 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.332041] Modules linked in: <4>[ 156.332079] CPU: 1 UID: 0 PID: 3354 Comm: 9 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 156.332115] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 156.332126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 156.332141] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.332170] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 156.332193] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 156.332214] RAX: 0000000080000000 RBX: ffff88810248f640 RCX: ffff888154200000 <4>[ 156.332229] RDX: 00000000000e6fe0 RSI: ffffffff88ebc501 RDI: ffff8881542e6fe0 <4>[ 156.332243] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 156.332256] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00040923c0 <4>[ 156.332269] R13: ffff8881542e6fe0 R14: 0000000000c18501 R15: 0000000000039408 <4>[ 156.332283] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 156.332299] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 156.332313] CR2: 00007f2d92c270f0 CR3: 00000001029fe000 CR4: 00000000000006f0 <4>[ 156.332326] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 156.332339] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 156.332352] Call Trace: <4>[ 156.332364] <4>[ 156.332378] ? show_regs+0x68/0x80 <4>[ 156.332403] ? __warn+0xd5/0x260 <4>[ 156.332423] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.332446] ? report_bug+0x278/0x2e0 <4>[ 156.332474] ? handle_bug+0x7b/0xa0 <4>[ 156.332493] ? exc_invalid_op+0x1c/0x50 <4>[ 156.332512] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 156.332538] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 156.332562] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.332585] ? rcu_core_si+0x12/0x20 <4>[ 156.332610] rcu_core+0x683/0x1c80 <4>[ 156.332777] ? __pfx_rcu_core+0x10/0x10 <4>[ 156.332835] ? lapic_next_event+0x19/0x30 <4>[ 156.332878] ? handle_softirqs+0x18e/0x720 <4>[ 156.332922] rcu_core_si+0x12/0x20 <4>[ 156.332962] handle_softirqs+0x20c/0x720 <4>[ 156.333002] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 156.333042] ? trace_preempt_on+0x20/0xc0 <4>[ 156.333081] ? irq_exit_rcu+0x20/0xd0 <4>[ 156.333115] irq_exit_rcu+0x9c/0xd0 <4>[ 156.333153] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 156.333195] <4>[ 156.333213] <4>[ 156.333232] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 156.333270] RIP: 0010:map_vdso+0x109/0x420 <4>[ 156.333312] Code: 49 89 c1 48 3d 00 f0 ff ff 0f 87 12 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a4 02 00 00 <48> 8b 55 c8 4d 89 ce 4d 2b 74 24 38 48 b8 00 00 00 00 00 fc ff df <4>[ 156.333343] RSP: 0018:ffff88810777fb68 EFLAGS: 00000246 <4>[ 156.333379] RAX: dffffc0000000000 RBX: ffff88810374a840 RCX: ffffffff88e40eea <4>[ 156.333403] RDX: 1ffffffff188087f RSI: 0000000000000008 RDI: 00007f2d92bee000 <4>[ 156.333416] RBP: ffff88810777fbb0 R08: 0000000000000000 R09: 00007f2d92bee000 <4>[ 156.333429] R10: ffff888102d1af47 R11: ffff88810777f880 R12: ffffffff8c4043c0 <4>[ 156.333442] R13: ffff88810374a8e8 R14: 0000000000000000 R15: ffffffff8c4043f8 <4>[ 156.333460] ? __get_unmapped_area+0x14a/0x2d0 <4>[ 156.333490] ? map_vdso+0xdf/0x420 <4>[ 156.333513] arch_setup_additional_pages+0x2c/0x40 <4>[ 156.333535] load_elf_binary+0x187d/0x4800 <4>[ 156.333559] ? __kernel_read+0x556/0xbc0 <4>[ 156.333591] ? __pfx_load_elf_binary+0x10/0x10 <4>[ 156.333612] ? load_misc_binary+0x6b7/0xb40 <4>[ 156.333716] ? trace_preempt_on+0x20/0xc0 <4>[ 156.333742] ? bprm_execve+0x60b/0x1520 <4>[ 156.333768] bprm_execve+0x62d/0x1520 <4>[ 156.333790] ? __pfx_get_arg_page+0x10/0x10 <4>[ 156.333814] ? __pfx_bprm_execve+0x10/0x10 <4>[ 156.333840] do_execveat_common.isra.0+0x3d4/0x550 <4>[ 156.333859] ? irqentry_exit_to_user_mode+0x48/0x150 <4>[ 156.333885] __x64_sys_execve+0x91/0xc0 <4>[ 156.333906] x64_sys_call+0x19a5/0x2060 <4>[ 156.333926] do_syscall_64+0xb2/0x1d0 <4>[ 156.333947] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 156.333968] RIP: 0033:0x7f1fd4af1207 <4>[ 156.334011] Code: Unable to access opcode bytes at 0x7f1fd4af11dd. <4>[ 156.334049] RSP: 002b:00007f1fd4385e68 EFLAGS: 00000202 ORIG_RAX: 000000000000003b <4>[ 156.334074] RAX: ffffffffffffffda RBX: 00007ffe248ce020 RCX: 00007f1fd4af1207 <4>[ 156.334088] RDX: 00007ffe248ced50 RSI: 00007ffe248ce2f0 RDI: 00007ffe248ce2d0 <4>[ 156.334101] RBP: 00007f1fd4385ff0 R08: 00007ffe248cdd60 R09: 0000000000000000 <4>[ 156.334114] R10: 0000000000000008 R11: 0000000000000202 R12: 00007ffe248cdd60 <4>[ 156.334126] R13: 0000000000000040 R14: 0000000000000001 R15: 00007f1fd4385f20 <4>[ 156.334148] <4>[ 156.334160] ---[ end trace 0000000000000000 ]--- Starting [0;1;39msystemd-journal-flush.ser…[0msh Journal to Persistent Storage... <4>[ 156.435854] ------------[ cut here ]------------ <4>[ 156.436137] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.436195] Modules linked in: <4>[ 156.436229] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 156.436264] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 156.436275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 156.436290] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.436318] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 156.436339] RSP: 0000:ffff888108b4fcf0 EFLAGS: 00000202 <4>[ 156.436359] RAX: 0000000080000000 RBX: ffff888107762c80 RCX: ffff888154200000 <4>[ 156.436373] RDX: 00000000000eafe0 RSI: ffffffff88ebc501 RDI: ffff8881542eafe0 <4>[ 156.436386] RBP: ffff888108b4fd30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 156.436400] R10: 00000000e40fa532 R11: 0000000000000005 R12: ffffea00041dd880 <4>[ 156.436413] R13: ffff8881542eafe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 156.436426] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 156.436441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 156.436454] CR2: 00007fd12f1d9000 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 156.436467] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 156.436480] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 156.436493] Call Trace: <4>[ 156.436505] <4>[ 156.436528] ? show_regs+0x68/0x80 <4>[ 156.436559] ? __warn+0xd5/0x260 <4>[ 156.436576] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.436602] ? report_bug+0x278/0x2e0 <4>[ 156.436760] ? handle_bug+0x7b/0xa0 <4>[ 156.436843] ? exc_invalid_op+0x1c/0x50 <4>[ 156.436864] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 156.436903] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 156.436927] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.436949] ? rcu_core_si+0x12/0x20 <4>[ 156.436973] rcu_core+0x683/0x1c80 <4>[ 156.436999] ? __pfx_rcu_core+0x10/0x10 <4>[ 156.437021] ? lapic_next_event+0x19/0x30 <4>[ 156.437040] ? handle_softirqs+0x18e/0x720 <4>[ 156.437062] rcu_core_si+0x12/0x20 <4>[ 156.437081] handle_softirqs+0x20c/0x720 <4>[ 156.437103] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 156.437122] ? trace_preempt_on+0x20/0xc0 <4>[ 156.437142] ? irq_exit_rcu+0x20/0xd0 <4>[ 156.437162] irq_exit_rcu+0x9c/0xd0 <4>[ 156.437181] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 156.437203] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 156.437226] RIP: 0033:0x55fa8bd8f533 <4>[ 156.437253] Code: 00 00 00 48 8d 35 41 7e 04 00 48 8d 3d 26 92 05 00 e8 c1 20 00 00 90 8b 7c 24 0c ba 00 00 2a 00 48 89 de 31 c0 e8 1d 72 f6 ff <89> c5 85 c0 0f 88 b5 09 00 00 48 8b 74 24 18 89 ef e8 c7 74 f6 ff <4>[ 156.437275] RSP: 002b:00007ffe17fac810 EFLAGS: 00000202 <4>[ 156.437306] RAX: 0000000000000009 RBX: 000055fabd91f610 RCX: 00007fddb488e28c <4>[ 156.437319] RDX: 0000000000000000 RSI: 000055fabd91f610 RDI: 0000000000000007 <4>[ 156.437331] RBP: 0000000000000000 R08: 000000000000c0c0 R09: 0000000000000002 <4>[ 156.437343] R10: 0000000000000000 R11: 0000000000000202 R12: 000055fabd91f310 <4>[ 156.437356] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 156.437376] <4>[ 156.437388] ---[ end trace 0000000000000000 ]--- Starting [0;1;39msystemd-udevd.service[0m - R…ager for Device Events and Files... <4>[ 156.646746] ------------[ cut here ]------------ <4>[ 156.647028] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.647085] Modules linked in: <4>[ 156.647122] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 156.647159] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 156.647169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 156.647183] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.647212] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 156.647233] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 156.647255] RAX: 0000000080000000 RBX: ffff888107d998c0 RCX: ffff888154200000 <4>[ 156.647269] RDX: 00000000000ecfe0 RSI: ffffffff88ebc501 RDI: ffff8881542ecfe0 <4>[ 156.647293] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 156.647318] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00041f6640 <4>[ 156.647331] R13: ffff8881542ecfe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 156.647344] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 156.647360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 156.647373] CR2: 000055fabd925c48 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 156.647387] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 156.647399] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 156.647412] Call Trace: <4>[ 156.647425] <4>[ 156.647442] ? show_regs+0x68/0x80 <4>[ 156.647469] ? __warn+0xd5/0x260 <4>[ 156.647487] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.647510] ? report_bug+0x278/0x2e0 <4>[ 156.647550] ? handle_bug+0x7b/0xa0 <4>[ 156.647570] ? exc_invalid_op+0x1c/0x50 <4>[ 156.647589] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 156.647614] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 156.647751] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.647783] ? rcu_core_si+0x12/0x20 <4>[ 156.647809] rcu_core+0x683/0x1c80 <4>[ 156.647836] ? __pfx_rcu_core+0x10/0x10 <4>[ 156.647858] ? lapic_next_event+0x19/0x30 <4>[ 156.647878] ? handle_softirqs+0x18e/0x720 <4>[ 156.647902] rcu_core_si+0x12/0x20 <4>[ 156.647922] handle_softirqs+0x20c/0x720 <4>[ 156.647944] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 156.647964] ? trace_preempt_on+0x20/0xc0 <4>[ 156.647984] ? irq_exit_rcu+0x20/0xd0 <4>[ 156.648006] irq_exit_rcu+0x9c/0xd0 <4>[ 156.648025] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 156.648048] <4>[ 156.648058] <4>[ 156.648070] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 156.648092] RIP: 0010:do_syscall_64+0x83/0x1d0 <4>[ 156.648112] Code: 35 02 5f fd 73 49 8b 46 20 48 05 58 7f 00 00 48 39 c3 0f 85 48 01 00 00 90 e8 e9 e9 bb fc 90 90 e8 f2 e8 bb fc fb 49 8b 56 08 c2 3f 0f 85 f7 00 00 00 90 90 41 81 fc ce 01 00 00 0f 87 fe 00 <4>[ 156.648132] RSP: 0018:ffff888108b4ff28 EFLAGS: 00000282 <4>[ 156.648152] RAX: 0000000000000000 RBX: ffff888108b4ff58 RCX: 0000000000000000 <4>[ 156.648165] RDX: 0000000000000000 RSI: ffffffff8c200130 RDI: ffffffff8c06351e <4>[ 156.648179] RBP: ffff888108b4ff48 R08: 0000000000000000 R09: 0000000000000000 <4>[ 156.648190] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000003 <4>[ 156.648201] R13: 0000000000000003 R14: ffff888108bc6e40 R15: 0000000000000000 <4>[ 156.648219] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 156.648241] ? do_syscall_64+0x7e/0x1d0 <4>[ 156.648261] ? do_syscall_64+0x7e/0x1d0 <4>[ 156.648280] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 156.648300] RIP: 0033:0x7fddb488a100 <4>[ 156.648323] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 69 42 0e 00 00 74 17 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c <4>[ 156.648341] RSP: 002b:00007ffe17fac728 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 <4>[ 156.648362] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007fddb488a100 <4>[ 156.648376] RDX: 0000000000000018 RSI: 000055fa8bdcf200 RDI: 0000000000000009 <4>[ 156.648387] RBP: 00007fddb46f0690 R08: 0000000000000000 R09: 0000000000000000 <4>[ 156.648399] R10: 00007fddb4904cb0 R11: 0000000000000202 R12: 0000000000000002 <4>[ 156.648410] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 156.648431] <4>[ 156.648441] ---[ end trace 0000000000000000 ]--- <4>[ 156.852721] ------------[ cut here ]------------ <4>[ 156.852949] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.853009] Modules linked in: <4>[ 156.853044] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 156.853082] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 156.853094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 156.853108] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.853138] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 156.853161] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 156.853182] RAX: 0000000080000000 RBX: ffff888104f59dc0 RCX: ffff888154200000 <4>[ 156.853197] RDX: 00000000000f0000 RSI: ffffffff88ebc501 RDI: ffff8881542f0000 <4>[ 156.853211] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 156.853225] R10: ffffffff8df3348f R11: 00000000000c8000 R12: ffffea000413d640 <4>[ 156.853238] R13: ffff8881542f0000 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 156.853253] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 156.853270] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 156.853283] CR2: 00007f467b146000 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 156.853296] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 156.853309] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 156.853322] Call Trace: <4>[ 156.853335] <4>[ 156.853349] ? show_regs+0x68/0x80 <4>[ 156.853375] ? __warn+0xd5/0x260 <4>[ 156.853396] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.853420] ? report_bug+0x278/0x2e0 <4>[ 156.853446] ? handle_bug+0x7b/0xa0 <4>[ 156.853467] ? exc_invalid_op+0x1c/0x50 <4>[ 156.853486] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 156.853513] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 156.853536] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.853557] ? rcu_core_si+0x12/0x20 <4>[ 156.853583] rcu_core+0x683/0x1c80 <4>[ 156.853609] ? __pfx_rcu_core+0x10/0x10 <4>[ 156.853763] ? lapic_next_event+0x19/0x30 <4>[ 156.853793] ? handle_softirqs+0x18e/0x720 <4>[ 156.853817] rcu_core_si+0x12/0x20 <4>[ 156.853838] handle_softirqs+0x20c/0x720 <4>[ 156.853861] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 156.853880] ? trace_preempt_on+0x20/0xc0 <4>[ 156.853900] ? irq_exit_rcu+0x20/0xd0 <4>[ 156.853921] irq_exit_rcu+0x9c/0xd0 <4>[ 156.853941] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 156.853964] <4>[ 156.853974] <4>[ 156.853985] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 156.854006] RIP: 0010:kasan_byte_accessible+0x0/0x30 <4>[ 156.854030] Code: 01 00 00 00 48 89 e5 48 8b 4d 08 e8 ea fd ff ff 5d c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 48 c1 ef 03 48 01 c7 0f <4>[ 156.854048] RSP: 0018:ffff888108b4fd38 EFLAGS: 00000246 <4>[ 156.854068] RAX: ffff8881012ad500 RBX: ffffffff88fec9d8 RCX: ffff8881012ae600 <4>[ 156.854082] RDX: 0000000000000000 RSI: ffff8881012ad500 RDI: ffff8881012ad500 <4>[ 156.854095] RBP: ffff888108b4fd50 R08: ffffea000404aa00 R09: 0000000000001100 <4>[ 156.854107] R10: ffff8881012ad513 R11: ffff888104ff930e R12: ffff8881012ad500 <4>[ 156.854121] R13: ffff8881002a2dc0 R14: ffffea000404aa00 R15: 0000000000000000 <4>[ 156.854137] ? putname+0xe8/0x130 <4>[ 156.854164] ? check_slab_allocation+0xc9/0x140 <4>[ 156.854187] ? putname+0xe8/0x130 <4>[ 156.854205] __kasan_slab_pre_free+0x28/0x40 <4>[ 156.854227] kmem_cache_free+0xf0/0x340 <4>[ 156.854247] ? __kasan_check_write+0x18/0x20 <4>[ 156.854271] putname+0xe8/0x130 <4>[ 156.854292] user_path_at+0x49/0x60 <4>[ 156.854312] do_faccessat+0x2f8/0xac0 <4>[ 156.854335] ? __pfx_do_faccessat+0x10/0x10 <4>[ 156.854354] ? trace_preempt_on+0x20/0xc0 <4>[ 156.854376] ? syscall_exit_to_user_mode+0x75/0x1a0 <4>[ 156.854400] __x64_sys_faccessat2+0x9a/0x100 <4>[ 156.854421] ? trace_hardirqs_on+0x37/0xe0 <4>[ 156.854440] x64_sys_call+0x182f/0x2060 <4>[ 156.854462] do_syscall_64+0xb2/0x1d0 <4>[ 156.854483] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 156.854503] RIP: 0033:0x7fddb488a53e <4>[ 156.854527] Code: ca 41 54 55 89 d5 53 89 cb 48 81 ec a8 00 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 98 00 00 00 31 c0 b8 b7 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 06 01 00 00 89 c2 85 c0 0f 84 ac 00 00 00 <4>[ 156.854545] RSP: 002b:00007ffe17facaf0 EFLAGS: 00000246 ORIG_RAX: 00000000000001b7 <4>[ 156.854568] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fddb488a53e <4>[ 156.854582] RDX: 0000000000000000 RSI: 000055fa8bdcd643 RDI: 0000000000000009 <4>[ 156.854594] RBP: 0000000000000000 R08: 0000000000000009 R09: 00000000000000ff <4>[ 156.854605] R10: 0000000000000000 R11: 0000000000000246 R12: 000055fa8bdcd3d4 <4>[ 156.854680] R13: 00007ffe17facce0 R14: 000055fabd8b2920 R15: 00007ffe17facd00 <4>[ 156.854709] <4>[ 156.854721] ---[ end trace 0000000000000000 ]--- <4>[ 156.955743] ------------[ cut here ]------------ <4>[ 156.956042] WARNING: CPU: 0 PID: 3352 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.956101] Modules linked in: <4>[ 156.956137] CPU: 0 UID: 0 PID: 3352 Comm: ldconfig Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 156.956174] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 156.956185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 156.956199] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.956227] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 156.956247] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 156.956267] RAX: 0000000080000000 RBX: ffff888103318c00 RCX: ffff888154200000 <4>[ 156.956280] RDX: 00000000000f4fe0 RSI: ffffffff88ebc501 RDI: ffff8881542f4fe0 <4>[ 156.956293] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 156.956306] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00040cc600 <4>[ 156.956318] R13: ffff8881542f4fe0 R14: 0000000000c1c401 R15: 0000000000039408 <4>[ 156.956331] FS: 000055557c8df3c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 156.956347] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 156.956359] CR2: 00007f2d92840000 CR3: 00000001031fc000 CR4: 00000000000006f0 <4>[ 156.956372] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 156.956384] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 156.956397] Call Trace: <4>[ 156.956409] <4>[ 156.956423] ? show_regs+0x68/0x80 <4>[ 156.956448] ? __warn+0xd5/0x260 <4>[ 156.956465] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.956486] ? report_bug+0x278/0x2e0 <4>[ 156.956512] ? handle_bug+0x7b/0xa0 <4>[ 156.956531] ? exc_invalid_op+0x1c/0x50 <4>[ 156.956550] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 156.956574] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 156.956595] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 156.956616] ? rcu_core_si+0x12/0x20 <4>[ 156.956745] rcu_core+0x683/0x1c80 <4>[ 156.956801] ? __pfx_rcu_core+0x10/0x10 <4>[ 156.956845] ? lapic_next_event+0x19/0x30 <4>[ 156.956867] ? handle_softirqs+0x18e/0x720 <4>[ 156.956889] rcu_core_si+0x12/0x20 <4>[ 156.956908] handle_softirqs+0x20c/0x720 <4>[ 156.956929] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 156.956947] ? trace_preempt_on+0x20/0xc0 <4>[ 156.956966] ? irq_exit_rcu+0x20/0xd0 <4>[ 156.956985] irq_exit_rcu+0x9c/0xd0 <4>[ 156.957003] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 156.957026] <4>[ 156.957036] <4>[ 156.957046] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 156.957067] RIP: 0010:__unwind_start+0x1d4/0x390 <4>[ 156.957089] Code: b6 04 02 84 c0 74 08 3c 03 0f 8e ad 01 00 00 41 8b 17 49 8d 47 08 49 8d 77 10 48 89 45 d0 48 89 75 c8 85 d2 0f 84 ba 00 00 00 <48> c1 e8 03 48 c1 ee 03 49 be 00 00 00 00 00 fc ff df 49 89 c5 49 <4>[ 156.957108] RSP: 0018:ffff88810a607708 EFLAGS: 00000202 <4>[ 156.957128] RAX: ffff88810a607760 RBX: ffff88810a6077f8 RCX: 1ffff110214c0ef6 <4>[ 156.957142] RDX: 0000000000000001 RSI: ffff88810a607768 RDI: ffff88810a6077b0 <4>[ 156.957154] RBP: ffff88810a607748 R08: ffff888102d1cec0 R09: 0000000000000001 <4>[ 156.957167] R10: ffff88810a607760 R11: 0000000000000000 R12: 0000000000000000 <4>[ 156.957179] R13: ffff888102d1cec0 R14: ffff88810a607748 R15: ffff88810a607758 <4>[ 156.957202] ? __unwind_start+0x198/0x390 <4>[ 156.957223] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 156.957245] arch_stack_walk+0x79/0x100 <4>[ 156.957267] ? arch_stack_walk+0x79/0x100 <4>[ 156.957286] stack_trace_save+0x97/0xd0 <4>[ 156.957304] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 156.957323] ? stack_depot_save_flags+0x2c/0x6d0 <4>[ 156.957348] kasan_save_stack+0x3d/0x60 <4>[ 156.957393] kasan_save_track+0x18/0x40 <4>[ 156.957411] kasan_save_alloc_info+0x3b/0x50 <4>[ 156.957430] __kasan_slab_alloc+0x91/0xa0 <4>[ 156.957450] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 156.957473] vm_area_alloc+0xe4/0x1c0 <4>[ 156.957493] mmap_region+0x319/0x1f10 <4>[ 156.957518] ? thp_get_unmapped_area_vmflags+0xd0/0x290 <4>[ 156.957539] ? __pfx_mmap_region+0x10/0x10 <4>[ 156.957557] ? __pfx_selinux_inode_getattr+0x10/0x10 <4>[ 156.957599] ? __get_unmapped_area+0x199/0x2d0 <4>[ 156.957692] ? trace_preempt_on+0x20/0xc0 <4>[ 156.957722] do_mmap+0x66b/0xd40 <4>[ 156.957743] ? __pfx_down_write_killable+0x10/0x10 <4>[ 156.957766] vm_mmap_pgoff+0x1a5/0x320 <4>[ 156.957788] ? do_sys_openat2+0x12b/0x190 <4>[ 156.957812] ? __pfx_vm_mmap_pgoff+0x10/0x10 <4>[ 156.957838] ksys_mmap_pgoff+0x306/0x4c0 <4>[ 156.957860] __x64_sys_mmap+0xf6/0x1b0 <4>[ 156.957879] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 156.957901] x64_sys_call+0x1bc0/0x2060 <4>[ 156.957921] do_syscall_64+0xb2/0x1d0 <4>[ 156.957939] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 156.957958] RIP: 0033:0x7f7d2a061ed2 <4>[ 156.957982] Code: 00 00 00 0f 1f 44 00 00 41 f7 c1 ff 0f 00 00 75 27 55 89 cd 53 48 89 fb 48 85 ff 74 3b 41 89 ea 48 89 df b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 6e 5b 5d c3 0f 1f 00 48 c7 c0 b0 ff ff ff 64 <4>[ 156.957999] RSP: 002b:00007ffe5cc7dde8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 <4>[ 156.958022] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7d2a061ed2 <4>[ 156.958035] RDX: 0000000000000001 RSI: 000000000008a8f0 RDI: 0000000000000000 <4>[ 156.958047] RBP: 0000000000000001 R08: 0000000000000004 R09: 0000000000000000 <4>[ 156.958059] R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffe5cc7df58 <4>[ 156.958070] R13: 00007ffe5cc7df40 R14: 000055557c8fcebb R15: 000055557c8e59c0 <4>[ 156.958092] <4>[ 156.958102] ---[ end trace 0000000000000000 ]--- <4>[ 157.163730] ------------[ cut here ]------------ <4>[ 157.163980] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.164039] Modules linked in: <4>[ 157.164074] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 157.164111] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 157.164122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 157.164137] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.164166] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 157.164189] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 157.164210] RAX: 0000000080000000 RBX: ffff888106e4e500 RCX: ffff888154200000 <4>[ 157.164225] RDX: 00000000000f8fe0 RSI: ffffffff88ebc501 RDI: ffff8881542f8fe0 <4>[ 157.164239] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 157.164252] R10: ffffffff8df3348f R11: 00000000000c8000 R12: ffffea00041b9380 <4>[ 157.164266] R13: ffff8881542f8fe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 157.164279] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 157.164295] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 157.164307] CR2: 00007f467b98f440 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 157.164320] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 157.164334] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 157.164346] Call Trace: <4>[ 157.164359] <4>[ 157.164373] ? show_regs+0x68/0x80 <4>[ 157.164418] ? __warn+0xd5/0x260 <4>[ 157.164455] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.164497] ? report_bug+0x278/0x2e0 <4>[ 157.164546] ? handle_bug+0x7b/0xa0 <4>[ 157.164592] ? exc_invalid_op+0x1c/0x50 <4>[ 157.164788] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 157.164826] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 157.164851] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.164874] ? rcu_core_si+0x12/0x20 <4>[ 157.164898] rcu_core+0x683/0x1c80 <4>[ 157.164924] ? __pfx_rcu_core+0x10/0x10 <4>[ 157.164947] ? lapic_next_event+0x19/0x30 <4>[ 157.164966] ? handle_softirqs+0x18e/0x720 <4>[ 157.164989] rcu_core_si+0x12/0x20 <4>[ 157.165009] handle_softirqs+0x20c/0x720 <4>[ 157.165031] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 157.165050] ? trace_preempt_on+0x20/0xc0 <4>[ 157.165071] ? irq_exit_rcu+0x20/0xd0 <4>[ 157.165092] irq_exit_rcu+0x9c/0xd0 <4>[ 157.165111] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 157.165135] <4>[ 157.165145] <4>[ 157.165156] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 157.165178] RIP: 0010:kmem_cache_free+0xba/0x340 <4>[ 157.165203] Code: 46 30 48 89 5c 24 10 25 00 00 00 82 3d 00 00 00 80 b8 00 00 00 00 4c 0f 45 f0 66 90 4d 8b 46 38 49 83 f8 07 0f 87 d9 01 00 00 <0f> 1f 44 00 00 45 31 ff 48 8b 05 f7 7c 07 05 48 89 da 48 29 c2 48 <4>[ 157.165223] RSP: 0018:ffff888108b4fd20 EFLAGS: 00000297 <4>[ 157.165244] RAX: 0000000000000000 RBX: ffff888101f26600 RCX: ffffffff88fec967 <4>[ 157.165259] RDX: ffffea000407c801 RSI: ffff888101f26600 RDI: ffff8881002a2dc0 <4>[ 157.165272] RBP: ffff888108b4fd68 R08: 0000000000000000 R09: ffffed10203e4cc2 <4>[ 157.165284] R10: ffff888101f26613 R11: ffff888108b4fc10 R12: ffffffff88fec9d8 <4>[ 157.165297] R13: ffff8881002a2dc0 R14: ffffea000407c800 R15: dffffc0000000000 <4>[ 157.165313] ? putname+0xe8/0x130 <4>[ 157.165337] ? putname+0x77/0x130 <4>[ 157.165360] ? fd_install+0x184/0x380 <4>[ 157.165383] putname+0xe8/0x130 <4>[ 157.165404] do_sys_openat2+0x12b/0x190 <4>[ 157.165427] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 157.165450] ? putname+0xe8/0x130 <4>[ 157.165472] __x64_sys_openat+0x12c/0x210 <4>[ 157.165492] ? __pfx_do_readlinkat+0x10/0x10 <4>[ 157.165510] ? trace_preempt_on+0x20/0xc0 <4>[ 157.165530] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 157.165552] ? do_syscall_64+0xbf/0x1d0 <4>[ 157.165571] ? do_syscall_64+0x7e/0x1d0 <4>[ 157.165589] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.165662] x64_sys_call+0x1e3e/0x2060 <4>[ 157.165692] do_syscall_64+0xb2/0x1d0 <4>[ 157.165713] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.165733] RIP: 0033:0x7fddb488e11e <4>[ 157.165758] Code: 83 e2 40 75 4f 89 f0 f7 d0 a9 00 00 41 00 74 44 80 3d 55 02 0e 00 00 74 68 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8e 00 00 00 48 8b 54 24 28 64 48 2b 14 25 <4>[ 157.165776] RSP: 002b:00007ffe17facac0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 157.165801] RAX: ffffffffffffffda RBX: 0000000000290000 RCX: 00007fddb488e11e <4>[ 157.165815] RDX: 0000000000290000 RSI: 000055fa8bdcf2ba RDI: 00000000ffffff9c <4>[ 157.165827] RBP: 000055fa8bdcf2ba R08: 0000000000000020 R09: 00007fddb4966b20 <4>[ 157.165839] R10: 0000000000000000 R11: 0000000000000202 R12: 000055fabd8ba6e1 <4>[ 157.165851] R13: 0000000000000000 R14: 000055fabd8ba6e0 R15: 000055fa8bdcf2ba <4>[ 157.165874] <4>[ 157.165885] ---[ end trace 0000000000000000 ]--- <4>[ 157.474796] ------------[ cut here ]------------ <4>[ 157.475051] WARNING: CPU: 1 PID: 3355 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.475111] Modules linked in: <4>[ 157.475147] CPU: 1 UID: 0 PID: 3355 Comm: (md-udevd) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 157.475184] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 157.475196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 157.475210] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.475240] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 157.475263] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 157.475284] RAX: 0000000080000000 RBX: ffff888101ca88c0 RCX: ffff888154200000 <4>[ 157.475299] RDX: 00000000000fe000 RSI: ffffffff88ebc501 RDI: ffff8881542fe000 <4>[ 157.475320] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 157.475341] R10: 0000000029f6378d R11: 0000000000000005 R12: ffffea0004072a00 <4>[ 157.475354] R13: ffff8881542fe000 R14: 0000000000c18501 R15: 0000000000039408 <4>[ 157.475369] FS: 00007f467bc3cdc0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 157.475386] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 157.475406] CR2: 00007f7d29fa5970 CR3: 0000000103c28000 CR4: 00000000000006f0 <4>[ 157.475419] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 157.475432] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 157.475445] Call Trace: <4>[ 157.475462] <4>[ 157.475484] ? show_regs+0x68/0x80 <4>[ 157.475529] ? __warn+0xd5/0x260 <4>[ 157.475568] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.475611] ? report_bug+0x278/0x2e0 <4>[ 157.475803] ? handle_bug+0x7b/0xa0 <4>[ 157.475861] ? exc_invalid_op+0x1c/0x50 <4>[ 157.475891] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 157.475919] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 157.475943] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.475969] rcu_core+0x683/0x1c80 <4>[ 157.475998] ? __pfx_rcu_core+0x10/0x10 <4>[ 157.476021] ? lapic_next_event+0x19/0x30 <4>[ 157.476041] ? handle_softirqs+0x18e/0x720 <4>[ 157.476073] rcu_core_si+0x12/0x20 <4>[ 157.476099] handle_softirqs+0x20c/0x720 <4>[ 157.476122] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 157.476141] ? trace_preempt_on+0x20/0xc0 <4>[ 157.476162] ? irq_exit_rcu+0x20/0xd0 <4>[ 157.476183] irq_exit_rcu+0x9c/0xd0 <4>[ 157.476203] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 157.476226] <4>[ 157.476237] <4>[ 157.476249] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 157.476270] RIP: 0010:__memcg_slab_post_alloc_hook+0x0/0xc10 <4>[ 157.476297] Code: 44 00 00 55 ba 01 00 00 00 48 89 e5 e8 a9 8a ff ff 5d c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 49 89 fe 41 55 <4>[ 157.476325] RSP: 0018:ffff888107bf79b8 EFLAGS: 00000246 <4>[ 157.476347] RAX: ffff888107decc80 RBX: 0000000000000001 RCX: 0000000000000001 <4>[ 157.476361] RDX: 0000000000000dc0 RSI: 0000000000000000 RDI: ffff8881002a3280 <4>[ 157.476374] RBP: ffff888107bf7a08 R08: ffff888107bf79d0 R09: 0000000000000000 <4>[ 157.476387] R10: ffff888107decc80 R11: ffff88810032a784 R12: ffff8881002a3280 <4>[ 157.476400] R13: 0000000000000dc0 R14: ffff888107decc80 R15: 00000000000000e8 <4>[ 157.476423] ? kmem_cache_alloc_noprof+0x31c/0x340 <4>[ 157.476461] alloc_empty_file+0x58/0x170 <4>[ 157.476492] path_openat+0xef/0x3e30 <4>[ 157.476512] ? kasan_save_stack+0x4d/0x60 <4>[ 157.476532] ? kasan_save_stack+0x3d/0x60 <4>[ 157.476550] ? kasan_save_track+0x18/0x40 <4>[ 157.476570] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 157.476589] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 157.476609] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 157.476690] ? getname+0x7b/0xb0 <4>[ 157.476714] ? do_sys_openat2+0xfa/0x190 <4>[ 157.476734] ? __x64_sys_openat+0x12c/0x210 <4>[ 157.476755] ? do_syscall_64+0xb2/0x1d0 <4>[ 157.476773] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.476796] ? __pfx_path_openat+0x10/0x10 <4>[ 157.476823] do_filp_open+0x19c/0x3b0 <4>[ 157.476844] ? __pfx_do_filp_open+0x10/0x10 <4>[ 157.476881] do_sys_openat2+0x145/0x190 <4>[ 157.476902] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 157.476925] ? call_rcu+0x12/0x20 <4>[ 157.476946] ? kmem_cache_free+0x143/0x340 <4>[ 157.476969] __x64_sys_openat+0x12c/0x210 <4>[ 157.476989] ? __fput+0x581/0xad0 <4>[ 157.477007] ? trace_preempt_on+0x20/0xc0 <4>[ 157.477026] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 157.477049] ? do_syscall_64+0xbf/0x1d0 <4>[ 157.477068] ? do_syscall_64+0x7e/0x1d0 <4>[ 157.477086] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.477108] x64_sys_call+0x1e3e/0x2060 <4>[ 157.477131] do_syscall_64+0xb2/0x1d0 <4>[ 157.477152] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.477172] RIP: 0033:0x7f467b91928c <4>[ 157.477197] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 157.477215] RSP: 002b:00007ffe4107fc50 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 157.477239] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f467b91928c <4>[ 157.477253] RDX: 0000000000290000 RSI: 000055f8e6317900 RDI: 0000000000000003 <4>[ 157.477266] RBP: 0000000000000000 R08: 0000000000000020 R09: 00007f467b6f8d33 <4>[ 157.477278] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffe4107fd60 <4>[ 157.477290] R13: 00000000fffffff7 R14: 0000000000000003 R15: 00007f467b6fee42 <4>[ 157.477318] <4>[ 157.477336] ---[ end trace 0000000000000000 ]--- <4>[ 157.580778] ------------[ cut here ]------------ <4>[ 157.581048] WARNING: CPU: 1 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.581108] Modules linked in: <4>[ 157.581141] CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 157.581178] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 157.581189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 157.581203] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.581230] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 157.581252] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 157.581272] RAX: 0000000080000000 RBX: ffff888105177c80 RCX: ffff888154200000 <4>[ 157.581288] RDX: 0000000000100fe0 RSI: ffffffff88ebc501 RDI: ffff888154300fe0 <4>[ 157.581301] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 157.581315] R10: 0000000029f6378d R11: 00000000000000e6 R12: ffffea0004145dc0 <4>[ 157.581327] R13: ffff888154300fe0 R14: 0000000000200001 R15: 0000000000039408 <4>[ 157.581342] FS: 00007f1fd4386940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 157.581358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 157.581372] CR2: 00007f467b54b320 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 157.581386] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 157.581400] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 157.581413] Call Trace: <4>[ 157.581424] <4>[ 157.581440] ? show_regs+0x68/0x80 <4>[ 157.581486] ? __warn+0xd5/0x260 <4>[ 157.581522] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.581568] ? report_bug+0x278/0x2e0 <4>[ 157.581718] ? handle_bug+0x7b/0xa0 <4>[ 157.581777] ? exc_invalid_op+0x1c/0x50 <4>[ 157.581827] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 157.581871] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 157.581895] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.581918] ? rcu_core_si+0x12/0x20 <4>[ 157.581942] rcu_core+0x683/0x1c80 <4>[ 157.581968] ? __pfx_rcu_core+0x10/0x10 <4>[ 157.581990] ? lapic_next_event+0x19/0x30 <4>[ 157.582010] ? handle_softirqs+0x18e/0x720 <4>[ 157.582032] rcu_core_si+0x12/0x20 <4>[ 157.582051] handle_softirqs+0x20c/0x720 <4>[ 157.582073] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 157.582093] ? trace_preempt_on+0x20/0xc0 <4>[ 157.582113] ? irq_exit_rcu+0x20/0xd0 <4>[ 157.582135] irq_exit_rcu+0x9c/0xd0 <4>[ 157.582154] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 157.582178] <4>[ 157.582190] <4>[ 157.582202] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 157.582224] RIP: 0010:kmem_cache_alloc_noprof+0x96/0x340 <4>[ 157.582249] Code: 02 00 00 48 c7 44 24 10 00 00 00 00 49 8b 04 24 65 48 03 05 44 3b 16 77 48 8b 50 08 48 83 78 10 00 4c 8b 30 0f 84 11 02 00 00 <4d> 85 f6 0f 84 08 02 00 00 41 8b 44 24 28 49 8b 34 24 48 8d 4a 40 <4>[ 157.582268] RSP: 0018:ffff88810030fce0 EFLAGS: 00000286 <4>[ 157.582289] RAX: ffff888154b3f4f0 RBX: 0000000000000000 RCX: 0000000000000000 <4>[ 157.582302] RDX: 0000000000169881 RSI: 0000000000000cc0 RDI: ffff8881002a2dc0 <4>[ 157.582314] RBP: ffff88810030fd30 R08: 0000000000000000 R09: 0000000000001000 <4>[ 157.582326] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881002a2dc0 <4>[ 157.582338] R13: 0000000000000cc0 R14: ffff8881024f2200 R15: ffffffff88fee4cf <4>[ 157.582352] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 157.582387] getname_flags.part.0+0x4f/0x4a0 <4>[ 157.582410] getname+0x7b/0xb0 <4>[ 157.582429] do_sys_openat2+0xfa/0x190 <4>[ 157.582451] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 157.582474] ? call_rcu+0x12/0x20 <4>[ 157.582493] ? kmem_cache_free+0x143/0x340 <4>[ 157.582516] __x64_sys_openat+0x12c/0x210 <4>[ 157.582535] ? __fput+0x581/0xad0 <4>[ 157.582554] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 157.582576] ? do_syscall_64+0xbf/0x1d0 <4>[ 157.582594] ? do_syscall_64+0x7e/0x1d0 <4>[ 157.582611] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.582696] x64_sys_call+0x1e3e/0x2060 <4>[ 157.582725] do_syscall_64+0xb2/0x1d0 <4>[ 157.582745] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.582766] RIP: 0033:0x7f1fd4b1928c <4>[ 157.582790] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 157.582808] RSP: 002b:00007ffe248ce100 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 157.582832] RAX: ffffffffffffffda RBX: 0000000000000080 RCX: 00007f1fd4b1928c <4>[ 157.582846] RDX: 0000000000080101 RSI: 0000557d0ab5d180 RDI: 00000000ffffff9c <4>[ 157.582866] RBP: 00007ffe248ce270 R08: 0000000000000000 R09: 0000000000000004 <4>[ 157.582882] R10: 0000000000000000 R11: 0000000000000202 R12: 0000557d0ab5d180 <4>[ 157.582894] R13: 00007ffe248ce270 R14: 00000000ffffff9c R15: 0000000000000000 <4>[ 157.582916] <4>[ 157.582927] ---[ end trace 0000000000000000 ]--- <4>[ 157.683789] ------------[ cut here ]------------ <4>[ 157.684118] WARNING: CPU: 0 PID: 3354 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.684181] Modules linked in: <4>[ 157.684219] CPU: 0 UID: 0 PID: 3354 Comm: journalctl Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 157.684254] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 157.684264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 157.684279] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.684308] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 157.684330] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 157.684350] RAX: 0000000080000000 RBX: ffff888102300100 RCX: ffff888154200000 <4>[ 157.684365] RDX: 0000000000102fe0 RSI: ffffffff88ebc501 RDI: ffff888154302fe0 <4>[ 157.684378] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 157.684391] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea000408c000 <4>[ 157.684404] R13: ffff888154302fe0 R14: 0000000000c18501 R15: 0000000000039408 <4>[ 157.684417] FS: 00007f3f24bc7940(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 157.684432] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 157.684445] CR2: 00005634dd908028 CR3: 0000000100a16000 CR4: 00000000000006f0 <4>[ 157.684458] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 157.684470] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 157.684483] Call Trace: <4>[ 157.684495] <4>[ 157.684508] ? show_regs+0x68/0x80 <4>[ 157.684534] ? __warn+0xd5/0x260 <4>[ 157.684552] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.684574] ? report_bug+0x278/0x2e0 <4>[ 157.684600] ? handle_bug+0x7b/0xa0 <4>[ 157.684700] ? exc_invalid_op+0x1c/0x50 <4>[ 157.684729] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 157.684755] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 157.684776] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 157.684797] ? rcu_core_si+0x12/0x20 <4>[ 157.684822] rcu_core+0x683/0x1c80 <4>[ 157.684847] ? __pfx_rcu_core+0x10/0x10 <4>[ 157.684869] ? lapic_next_event+0x19/0x30 <4>[ 157.684888] ? handle_softirqs+0x18e/0x720 <4>[ 157.684911] rcu_core_si+0x12/0x20 <4>[ 157.684929] handle_softirqs+0x20c/0x720 <4>[ 157.684950] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 157.684968] ? trace_preempt_on+0x20/0xc0 <4>[ 157.684987] ? irq_exit_rcu+0x20/0xd0 <4>[ 157.685006] irq_exit_rcu+0x9c/0xd0 <4>[ 157.685024] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 157.685047] <4>[ 157.685057] <4>[ 157.685067] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 157.685089] RIP: 0010:__virt_addr_valid+0xfc/0x2d0 <4>[ 157.685112] Code: 89 e5 49 c1 ed 23 e9 1b 01 00 00 48 c7 c0 80 84 79 8e 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 a9 01 00 00 <48> 8b 05 fd 5c 01 06 48 85 c0 0f 84 f9 00 00 00 4e 8d 2c e8 48 b8 <4>[ 157.685131] RSP: 0018:ffff88810777f940 EFLAGS: 00000246 <4>[ 157.685149] RAX: 1ffffffff1cf3090 RBX: 0000000000000020 RCX: 0000000000000028 <4>[ 157.685162] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffff8881878ecdc0 <4>[ 157.685175] RBP: ffff88810777f960 R08: ffff888102d1af40 R09: 0000000000000001 <4>[ 157.685187] R10: ffff88810777f9c0 R11: 0000000000000005 R12: 00000001078ecdc0 <4>[ 157.685199] R13: 0000000000000000 R14: ffffea00041e3b00 R15: 0000000000000000 <4>[ 157.685222] kasan_addr_to_slab+0x11/0xb0 <4>[ 157.685245] __kasan_record_aux_stack+0x14/0xc0 <4>[ 157.685264] ? fput+0x261/0x2d0 <4>[ 157.685283] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 157.685302] kmem_cache_free+0x12b/0x340 <4>[ 157.685325] fput+0x261/0x2d0 <4>[ 157.685344] path_openat+0x1e1a/0x3e30 <4>[ 157.685362] ? kasan_save_stack+0x4d/0x60 <4>[ 157.685380] ? kasan_save_track+0x18/0x40 <4>[ 157.685398] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 157.685417] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 157.685436] ? do_sys_openat2+0xfa/0x190 <4>[ 157.685455] ? __x64_sys_openat+0x12c/0x210 <4>[ 157.685474] ? do_syscall_64+0xb2/0x1d0 <4>[ 157.685490] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.685512] ? __pfx_path_openat+0x10/0x10 <4>[ 157.685537] do_filp_open+0x19c/0x3b0 <4>[ 157.685556] ? __pfx_do_filp_open+0x10/0x10 <4>[ 157.685592] do_sys_openat2+0x145/0x190 <4>[ 157.685659] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 157.685691] ? handle_mm_fault+0x3bd/0x4c0 <4>[ 157.685712] __x64_sys_openat+0x12c/0x210 <4>[ 157.685731] ? trace_preempt_on+0x20/0xc0 <4>[ 157.685750] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 157.685769] ? preempt_count_sub+0x50/0x80 <4>[ 157.685791] ? trace_hardirqs_on_prepare+0x37/0xe0 <4>[ 157.685809] ? do_syscall_64+0x7e/0x1d0 <4>[ 157.685826] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.685846] x64_sys_call+0x1e3e/0x2060 <4>[ 157.685867] do_syscall_64+0xb2/0x1d0 <4>[ 157.685885] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 157.685904] RIP: 0033:0x7f3f24d1a82e <4>[ 157.685929] Code: 00 48 89 44 24 18 31 c0 41 83 e2 40 75 3e 89 f0 f7 d0 a9 00 00 41 00 74 33 89 f2 b8 01 01 00 00 48 89 fe bf 9c ff ff ff 0f 05 <48> 3d 00 f0 ff ff 77 42 48 8b 54 24 18 64 48 2b 14 25 28 00 00 00 <4>[ 157.685946] RSP: 002b:00007fff42a9e5d0 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 <4>[ 157.685969] RAX: ffffffffffffffda RBX: 00005634dd908030 RCX: 00007f3f24d1a82e <4>[ 157.685983] RDX: 0000000000080000 RSI: 00005634dd908000 RDI: 00000000ffffff9c <4>[ 157.685996] RBP: 00007fff42a9e710 R08: 0000000000000001 R09: 0000000000000000 <4>[ 157.686008] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008 <4>[ 157.686020] R13: 0000000000000008 R14: 00005634dd907fd0 R15: 0000000000000001 <4>[ 157.686041] <4>[ 157.686051] ---[ end trace 0000000000000000 ]--- Mounting [0;1;39mproc-sys-fs-binfmt_misc.m…[0mcutable File Formats File System... [[0m[0;31m* [0m] (1 of 7) Job systemd-udev-trigger.s…ice/start running (10s / no limit) <4>[ 158.626748] ------------[ cut here ]------------ <4>[ 158.626991] WARNING: CPU: 1 PID: 3356 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 158.627048] Modules linked in: <4>[ 158.627083] CPU: 1 UID: 0 PID: 3356 Comm: mount Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 158.627118] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 158.627129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 158.627144] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 158.627172] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 158.627194] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 158.627214] RAX: 0000000080000000 RBX: ffff8881065de000 RCX: ffff888154200000 <4>[ 158.627228] RDX: 000000000011cfe0 RSI: ffffffff88ebc501 RDI: ffff88815431cfe0 <4>[ 158.627241] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 158.627253] R10: 0000000029f6378d R11: 00000000000cdc00 R12: ffffea0004197780 <4>[ 158.627266] R13: ffff88815431cfe0 R14: 0000000000c88001 R15: 0000000000039408 <4>[ 158.627279] FS: 00007ff234136800(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 158.627294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 158.627308] CR2: 00007ff23430a710 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 158.627320] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 158.627333] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 158.627347] Call Trace: <4>[ 158.627358] <4>[ 158.627370] ? show_regs+0x68/0x80 <4>[ 158.627395] ? __warn+0xd5/0x260 <4>[ 158.627413] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 158.627437] ? report_bug+0x278/0x2e0 <4>[ 158.627463] ? handle_bug+0x7b/0xa0 <4>[ 158.627482] ? exc_invalid_op+0x1c/0x50 <4>[ 158.627500] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 158.627525] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 158.627547] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 158.627569] ? rcu_core_si+0x12/0x20 <4>[ 158.627594] rcu_core+0x683/0x1c80 <4>[ 158.627618] ? __pfx_rcu_core+0x10/0x10 <4>[ 158.627734] ? lapic_next_event+0x19/0x30 <4>[ 158.627762] ? handle_softirqs+0x18e/0x720 <4>[ 158.627785] rcu_core_si+0x12/0x20 <4>[ 158.627806] handle_softirqs+0x20c/0x720 <4>[ 158.627827] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 158.627850] irq_exit_rcu+0x9c/0xd0 <4>[ 158.627868] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 158.627891] <4>[ 158.627900] <4>[ 158.627910] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 158.627931] RIP: 0010:stack_depot_save_flags+0x166/0x6d0 <4>[ 158.627957] Code: e1 04 48 03 0d c3 b6 ce 04 65 ff 05 bc 5f 55 76 4c 8b 21 49 39 cc 75 12 e9 95 00 00 00 4d 8b 24 24 4c 39 e1 0f 84 9e 01 00 00 <41> 39 5c 24 10 75 ec 45 3b 7c 24 14 75 e5 31 c0 49 8b 54 c4 20 49 <4>[ 158.627975] RSP: 0018:ffff888103917a00 EFLAGS: 00000283 <4>[ 158.627994] RAX: 00000000315df717 RBX: 00000000315df717 RCX: ffff888153ff7170 <4>[ 158.628007] RDX: ffffffff8c200130 RSI: 000000001b826ec9 RDI: 00000000e441ceee <4>[ 158.628020] RBP: ffff888103917a48 R08: ffff888105d88000 R09: 0000000000000001 <4>[ 158.628032] R10: 00000000ad4f152a R11: 0000000000000005 R12: ffff888103a58750 <4>[ 158.628044] R13: 000000000000000e R14: ffff888103917a58 R15: 000000000000000e <4>[ 158.628061] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 158.628086] ? kasan_record_aux_stack+0x12/0x20 <4>[ 158.628107] ? task_work_add+0x1d6/0x2c0 <4>[ 158.628127] ? kvfree+0x31/0x40 <4>[ 158.628147] kasan_save_stack+0x4d/0x60 <4>[ 158.628168] ? kasan_save_stack+0x3d/0x60 <4>[ 158.628187] ? kasan_save_track+0x18/0x40 <4>[ 158.628204] ? kasan_save_free_info+0x3f/0x60 <4>[ 158.628222] ? __kasan_slab_free+0x5e/0x80 <4>[ 158.628240] ? kfree+0x21a/0x330 <4>[ 158.628256] ? kvfree+0x31/0x40 <4>[ 158.628273] ? put_files_struct+0x1f7/0x320 <4>[ 158.628295] ? exit_files+0x82/0xb0 <4>[ 158.628313] ? do_exit+0x826/0x28f0 <4>[ 158.628331] ? do_group_exit+0xbb/0x270 <4>[ 158.628350] ? __x64_sys_exit_group+0x42/0x50 <4>[ 158.628369] ? x64_sys_call+0x2059/0x2060 <4>[ 158.628388] ? do_syscall_64+0xb2/0x1d0 <4>[ 158.628405] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 158.628445] kasan_save_track+0x18/0x40 <4>[ 158.628465] kasan_save_free_info+0x3f/0x60 <4>[ 158.628486] __kasan_slab_free+0x5e/0x80 <4>[ 158.628506] kfree+0x21a/0x330 <4>[ 158.628528] kvfree+0x31/0x40 <4>[ 158.628547] put_files_struct+0x1f7/0x320 <4>[ 158.628572] exit_files+0x82/0xb0 <4>[ 158.628593] do_exit+0x826/0x28f0 <4>[ 158.628612] ? trace_preempt_off+0x20/0xc0 <4>[ 158.628695] ? do_group_exit+0x11a/0x270 <4>[ 158.628724] ? __pfx_do_exit+0x10/0x10 <4>[ 158.628745] ? _raw_spin_unlock_irq+0x3c/0x80 <4>[ 158.628765] ? trace_preempt_on+0x20/0xc0 <4>[ 158.628782] ? do_group_exit+0x183/0x270 <4>[ 158.628805] do_group_exit+0xbb/0x270 <4>[ 158.628828] __x64_sys_exit_group+0x42/0x50 <4>[ 158.628848] x64_sys_call+0x2059/0x2060 <4>[ 158.628867] do_syscall_64+0xb2/0x1d0 <4>[ 158.628886] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 158.628906] RIP: 0033:0x7ff23430a725 <4>[ 158.628928] Code: Unable to access opcode bytes at 0x7ff23430a6fb. <4>[ 158.628940] RSP: 002b:00007ffd94c415d8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 <4>[ 158.628961] RAX: ffffffffffffffda RBX: 00007ff23440cfa8 RCX: 00007ff23430a725 <4>[ 158.628974] RDX: 00000000000000e7 RSI: fffffffffffffe98 RDI: 0000000000000000 <4>[ 158.628986] RBP: 0000000000000002 R08: 00007ffd94c41580 R09: 0000000000000007 <4>[ 158.628998] R10: 0000000000000007 R11: 0000000000000202 R12: 0000000000000000 <4>[ 158.629010] R13: 0000000000000000 R14: 00007ff23440b680 R15: 00007ff23440cfc0 <4>[ 158.629031] <4>[ 158.629042] ---[ end trace 0000000000000000 ]--- M [K[[0;32m OK [0m] Mounted [0;1;39mproc-sys-fs-binfmt_misc.mo…[0mxecutable File Formats File System. [K[[0;32m OK [0m] Finished [0;1;39msystemd-binfmt.service[0m - Set Up Additional Binary Formats. [[0;32m OK [0m] Finished [0;1;39mldconfig.service[0m - Rebuild Dynamic Linker Cache. <4>[ 159.458829] ------------[ cut here ]------------ <4>[ 159.459095] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.459153] Modules linked in: <4>[ 159.459190] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 159.459226] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 159.459237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 159.459251] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.459281] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 159.459303] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 159.459323] RAX: 0000000080000000 RBX: ffff888108150c80 RCX: ffff888154200000 <4>[ 159.459337] RDX: 0000000000130000 RSI: ffffffff88ebc501 RDI: ffff888154330000 <4>[ 159.459350] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 159.459363] R10: 0000000029f6378d R11: ffff888100322448 R12: ffffea0004205400 <4>[ 159.459376] R13: ffff888154330000 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 159.459389] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 159.459404] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 159.459417] CR2: 000055fabd980118 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 159.459430] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 159.459443] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 159.459457] Call Trace: <4>[ 159.459467] <4>[ 159.459481] ? show_regs+0x68/0x80 <4>[ 159.459506] ? __warn+0xd5/0x260 <4>[ 159.459525] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.459547] ? report_bug+0x278/0x2e0 <4>[ 159.459573] ? handle_bug+0x7b/0xa0 <4>[ 159.459592] ? exc_invalid_op+0x1c/0x50 <4>[ 159.459610] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 159.459717] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 159.459746] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.459776] ? rcu_core_si+0x12/0x20 <4>[ 159.459803] rcu_core+0x683/0x1c80 <4>[ 159.459826] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 159.459851] ? __pfx_rcu_core+0x10/0x10 <4>[ 159.459877] rcu_core_si+0x12/0x20 <4>[ 159.459896] handle_softirqs+0x20c/0x720 <4>[ 159.459920] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 159.459939] ? trace_preempt_on+0x20/0xc0 <4>[ 159.459958] ? irq_exit_rcu+0x20/0xd0 <4>[ 159.459977] irq_exit_rcu+0x9c/0xd0 <4>[ 159.459995] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 159.460018] <4>[ 159.460028] <4>[ 159.460039] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 159.460060] RIP: 0010:avc_lookup+0xc2/0x1b0 <4>[ 159.460083] Code: 81 00 00 00 48 83 e8 28 48 85 c0 74 78 48 89 c2 48 c1 ea 03 0f b6 14 1a 84 d2 74 09 80 fa 03 0f 8e 90 00 00 00 44 3b 20 75 b8 <48> 8d 78 08 48 89 fa 48 c1 ea 03 0f b6 14 1a 84 d2 74 09 80 fa 01 <4>[ 159.460101] RSP: 0018:ffff888108b4f798 EFLAGS: 00000246 <4>[ 159.460120] RAX: ffff88810097b4e0 RBX: dffffc0000000000 RCX: 0000000010000000 <4>[ 159.460136] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffffffff8e7b35a0 <4>[ 159.460149] RBP: ffff888108b4f7c0 R08: 0000000000000000 R09: ffff888108b4f860 <4>[ 159.460161] R10: 0000000000000007 R11: ffff888108b4fc10 R12: 0000000000000007 <4>[ 159.460174] R13: 0000000000000007 R14: 0000000000000008 R15: ffff888108b4f860 <4>[ 159.460198] avc_has_perm_noaudit+0x44/0x130 <4>[ 159.460223] selinux_inode_permission+0x2d3/0x4c0 <4>[ 159.460247] ? __pfx_selinux_inode_permission+0x10/0x10 <4>[ 159.460275] security_inode_permission+0x9b/0xe0 <4>[ 159.460296] inode_permission+0x122/0x4c0 <4>[ 159.460320] link_path_walk.part.0.constprop.0+0x18f/0xba0 <4>[ 159.460348] path_lookupat+0x6c/0x680 <4>[ 159.460368] path_openat+0x2543/0x3e30 <4>[ 159.460386] ? kasan_save_stack+0x4d/0x60 <4>[ 159.460406] ? kasan_save_track+0x18/0x40 <4>[ 159.460425] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 159.460445] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 159.460464] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 159.460483] ? getname+0x7b/0xb0 <4>[ 159.460498] ? do_sys_openat2+0xfa/0x190 <4>[ 159.460517] ? __x64_sys_openat+0x12c/0x210 <4>[ 159.460536] ? do_syscall_64+0xb2/0x1d0 <4>[ 159.460552] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.460576] ? __pfx_path_openat+0x10/0x10 <4>[ 159.460601] do_filp_open+0x19c/0x3b0 <4>[ 159.460681] ? __pfx_do_filp_open+0x10/0x10 <4>[ 159.460726] do_sys_openat2+0x145/0x190 <4>[ 159.460747] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 159.460774] __x64_sys_openat+0x12c/0x210 <4>[ 159.460793] ? __fput+0x581/0xad0 <4>[ 159.460810] ? trace_preempt_on+0x20/0xc0 <4>[ 159.460836] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 159.460857] ? do_syscall_64+0xbf/0x1d0 <4>[ 159.460874] ? do_syscall_64+0x7e/0x1d0 <4>[ 159.460891] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.460912] x64_sys_call+0x1e3e/0x2060 <4>[ 159.460933] do_syscall_64+0xb2/0x1d0 <4>[ 159.460952] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.460972] RIP: 0033:0x7fddb488e11e <4>[ 159.460997] Code: 83 e2 40 75 4f 89 f0 f7 d0 a9 00 00 41 00 74 44 80 3d 55 02 0e 00 00 74 68 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8e 00 00 00 48 8b 54 24 28 64 48 2b 14 25 <4>[ 159.461015] RSP: 002b:00007ffe17faca10 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 159.461038] RAX: ffffffffffffffda RBX: 0000000000280100 RCX: 00007fddb488e11e <4>[ 159.461052] RDX: 0000000000280100 RSI: 00007ffe17faca90 RDI: 00000000ffffff9c <4>[ 159.461064] RBP: 00007ffe17faca90 R08: 0000000000000069 R09: 0000000000000000 <4>[ 159.461076] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 <4>[ 159.461088] R13: 00007ffe17facce0 R14: 000055fabd964d90 R15: 00007ffe17facd00 <4>[ 159.461110] <4>[ 159.461122] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Started [0;1;39msystemd-udevd.service[0m - Ru…anager for Device Events and Files. <6>[ 159.625162] journal-offline (3359) used greatest stack depth: 25864 bytes left <4>[ 159.772754] ------------[ cut here ]------------ <4>[ 159.773069] WARNING: CPU: 0 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.773158] Modules linked in: <4>[ 159.773222] CPU: 0 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 159.773288] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 159.773311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 159.773340] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.773375] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 159.773398] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 159.773420] RAX: 0000000080000000 RBX: ffff888104588c80 RCX: ffff888154200000 <4>[ 159.773435] RDX: 000000000013afe0 RSI: ffffffff88ebc501 RDI: ffff88815433afe0 <4>[ 159.773448] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 159.773462] R10: 0000000029f6378d R11: 00000000000d7c00 R12: ffffea0004116200 <4>[ 159.773474] R13: ffff88815433afe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 159.773486] FS: 00007fddb46f08c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 159.773520] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 159.773552] CR2: 000055fabd992228 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 159.773584] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 159.773700] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 159.773725] Call Trace: <4>[ 159.773737] <4>[ 159.773750] ? show_regs+0x68/0x80 <4>[ 159.773778] ? __warn+0xd5/0x260 <4>[ 159.773796] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.773818] ? report_bug+0x278/0x2e0 <4>[ 159.773844] ? handle_bug+0x7b/0xa0 <4>[ 159.773862] ? exc_invalid_op+0x1c/0x50 <4>[ 159.773881] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 159.773906] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 159.773926] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.773947] ? rcu_core_si+0x12/0x20 <4>[ 159.773971] rcu_core+0x683/0x1c80 <4>[ 159.773996] ? __pfx_rcu_core+0x10/0x10 <4>[ 159.774017] ? lapic_next_event+0x19/0x30 <4>[ 159.774036] ? handle_softirqs+0x18e/0x720 <4>[ 159.774057] rcu_core_si+0x12/0x20 <4>[ 159.774076] handle_softirqs+0x20c/0x720 <4>[ 159.774096] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 159.774114] ? trace_preempt_on+0x20/0xc0 <4>[ 159.774133] ? irq_exit_rcu+0x20/0xd0 <4>[ 159.774152] irq_exit_rcu+0x9c/0xd0 <4>[ 159.774170] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 159.774191] <4>[ 159.774201] <4>[ 159.774211] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 159.774232] RIP: 0010:update_stack_state+0xf6/0x660 <4>[ 159.774254] Code: 89 45 a0 41 80 7d 00 00 0f 85 e9 03 00 00 41 80 3c 24 00 48 8b 4b 08 0f 85 be 03 00 00 48 8b 73 10 85 c0 74 24 49 39 ce 72 1f <49> 39 f6 73 1a 48 8b 55 d0 49 8d 3c 16 48 39 f9 0f 92 c1 48 39 fe <4>[ 159.774271] RSP: 0018:ffff888108b4f830 EFLAGS: 00000202 <4>[ 159.774290] RAX: 0000000000000001 RBX: ffff888108b4f908 RCX: ffff888108b48000 <4>[ 159.774303] RDX: ffff888108b4fcd0 RSI: ffff888108b50000 RDI: ffff888108b4f950 <4>[ 159.774316] RBP: ffff888108b4f8a0 R08: ffff888108b4f918 R09: ffff888108b4f950 <4>[ 159.774329] R10: ffff888108b4f910 R11: 0000000000000000 R12: ffffed1021169f23 <4>[ 159.774341] R13: ffffed1021169f22 R14: ffff888108b4fcd0 R15: dffffc0000000000 <4>[ 159.774370] unwind_next_frame+0x18f/0x8e0 <4>[ 159.774390] ? __unwind_start+0x1fc/0x390 <4>[ 159.774410] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 159.774431] arch_stack_walk+0x9a/0x100 <4>[ 159.774453] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 159.774476] stack_trace_save+0x97/0xd0 <4>[ 159.774494] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 159.774514] ? stack_trace_save+0x97/0xd0 <4>[ 159.774532] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 159.774551] kasan_save_stack+0x3d/0x60 <4>[ 159.774569] ? kasan_save_stack+0x3d/0x60 <4>[ 159.774587] ? kasan_save_track+0x18/0x40 <4>[ 159.774605] ? kasan_save_alloc_info+0x3b/0x50 <4>[ 159.774669] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 159.774719] kasan_save_track+0x18/0x40 <4>[ 159.774741] kasan_save_alloc_info+0x3b/0x50 <4>[ 159.774761] __kasan_slab_alloc+0x91/0xa0 <4>[ 159.774783] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 159.774807] getname_flags.part.0+0x4f/0x4a0 <4>[ 159.774831] getname+0x7b/0xb0 <4>[ 159.774850] do_sys_openat2+0xfa/0x190 <4>[ 159.774882] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 159.774908] __x64_sys_openat+0x12c/0x210 <4>[ 159.774927] ? __fput+0x581/0xad0 <4>[ 159.774944] ? trace_preempt_on+0x20/0xc0 <4>[ 159.774961] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 159.774982] ? do_syscall_64+0xbf/0x1d0 <4>[ 159.774999] ? do_syscall_64+0x7e/0x1d0 <4>[ 159.775016] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.775038] x64_sys_call+0x1e3e/0x2060 <4>[ 159.775060] do_syscall_64+0xb2/0x1d0 <4>[ 159.775078] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.775097] RIP: 0033:0x7fddb488e11e <4>[ 159.775122] Code: 83 e2 40 75 4f 89 f0 f7 d0 a9 00 00 41 00 74 44 80 3d 55 02 0e 00 00 74 68 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8e 00 00 00 48 8b 54 24 28 64 48 2b 14 25 <4>[ 159.775139] RSP: 002b:00007ffe17fac760 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 159.775162] RAX: ffffffffffffffda RBX: 0000000000290000 RCX: 00007fddb488e11e <4>[ 159.775176] RDX: 0000000000290000 RSI: 000055fa8bdcf2ba RDI: 00000000ffffff9c <4>[ 159.775189] RBP: 000055fa8bdcf2ba R08: 0000000000000020 R09: 0000000000000001 <4>[ 159.775202] R10: 0000000000000000 R11: 0000000000000202 R12: 000055fabd991c00 <4>[ 159.775215] R13: 0000000000000000 R14: 000055fabd990601 R15: 0000000000000006 <4>[ 159.775236] <4>[ 159.775247] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-journal-flush.ser…[0mlush Journal to Persistent Storage. <4>[ 159.875781] ------------[ cut here ]------------ <4>[ 159.876071] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.876136] Modules linked in: <4>[ 159.876172] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 159.876216] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 159.876228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 159.876242] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.876279] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 159.876301] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 159.876321] RAX: 0000000080000000 RBX: ffff888102a8a640 RCX: ffff888154200000 <4>[ 159.876336] RDX: 0000000000140fe0 RSI: ffffffff88ebc501 RDI: ffff888154340fe0 <4>[ 159.876364] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 159.876378] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea00040aa280 <4>[ 159.876396] R13: ffff888154340fe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 159.876424] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 159.876441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 159.876454] CR2: 000055fabd9951b8 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 159.876467] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 159.876481] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 159.876495] Call Trace: <4>[ 159.876506] <4>[ 159.876520] ? show_regs+0x68/0x80 <4>[ 159.876549] ? __warn+0xd5/0x260 <4>[ 159.876569] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.876593] ? report_bug+0x278/0x2e0 <4>[ 159.876619] ? handle_bug+0x7b/0xa0 <4>[ 159.876764] ? exc_invalid_op+0x1c/0x50 <4>[ 159.876795] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 159.876823] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 159.876847] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 159.876869] ? rcu_core_si+0x12/0x20 <4>[ 159.876895] rcu_core+0x683/0x1c80 <4>[ 159.876921] ? __pfx_rcu_core+0x10/0x10 <4>[ 159.876943] ? lapic_next_event+0x19/0x30 <4>[ 159.876962] ? handle_softirqs+0x18e/0x720 <4>[ 159.876985] rcu_core_si+0x12/0x20 <4>[ 159.877005] handle_softirqs+0x20c/0x720 <4>[ 159.877026] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 159.877045] ? trace_preempt_on+0x20/0xc0 <4>[ 159.877066] ? irq_exit_rcu+0x20/0xd0 <4>[ 159.877087] irq_exit_rcu+0x9c/0xd0 <4>[ 159.877105] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 159.877129] <4>[ 159.877139] <4>[ 159.877150] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 159.877172] RIP: 0010:do_syscall_64+0x83/0x1d0 <4>[ 159.877192] Code: 35 02 5f fd 73 49 8b 46 20 48 05 58 7f 00 00 48 39 c3 0f 85 48 01 00 00 90 e8 e9 e9 bb fc 90 90 e8 f2 e8 bb fc fb 49 8b 56 08 c2 3f 0f 85 f7 00 00 00 90 90 41 81 fc ce 01 00 00 0f 87 fe 00 <4>[ 159.877210] RSP: 0018:ffff888108b4ff28 EFLAGS: 00000282 <4>[ 159.877228] RAX: 0000000000000000 RBX: ffff888108b4ff58 RCX: 0000000000000000 <4>[ 159.877242] RDX: 0000000000000000 RSI: ffffffff8c200130 RDI: ffffffff8c06351e <4>[ 159.877255] RBP: ffff888108b4ff48 R08: 0000000000000000 R09: 0000000000000000 <4>[ 159.877268] R10: 0000000000000000 R11: 0000000000000000 R12: 000000000000014c <4>[ 159.877279] R13: 000000000000014c R14: ffff888108bc6e40 R15: 0000000000000000 <4>[ 159.877298] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.877320] ? do_syscall_64+0x7e/0x1d0 <4>[ 159.877340] ? do_syscall_64+0x7e/0x1d0 <4>[ 159.877358] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 159.877378] RIP: 0033:0x7fddb488eeda <4>[ 159.877401] Code: 48 8b 05 49 6f 0d 00 ba ff ff ff ff 64 c7 00 16 00 00 00 e9 a5 fd ff ff e8 23 bb 01 00 0f 1f 00 41 89 ca b8 4c 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 2e 89 c1 85 c0 74 0f 48 8b 05 11 6f 0d 00 64 <4>[ 159.877418] RSP: 002b:00007ffe17fac498 EFLAGS: 00000246 ORIG_RAX: 000000000000014c <4>[ 159.877438] RAX: ffffffffffffffda RBX: 00007ffe17fac580 RCX: 00007fddb488eeda <4>[ 159.877451] RDX: 0000000000001000 RSI: 000055fa8bdd8848 RDI: 0000000000000007 <4>[ 159.877464] RBP: 0000000000000007 R08: 00007ffe17fac580 R09: 0000000000000001 <4>[ 159.877475] R10: 0000000000001101 R11: 0000000000000246 R12: 000055fa8bdd8848 <4>[ 159.877488] R13: 0000000000001000 R14: 00007ffe17fac4a0 R15: 0000000000000006 <4>[ 159.877508] <4>[ 159.877519] ---[ end trace 0000000000000000 ]--- Starting [0;1;39msystemd-tmpfiles-setup.se…[0me Volatile Files and Directories... <4>[ 160.187757] ------------[ cut here ]------------ <4>[ 160.188002] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.188062] Modules linked in: <4>[ 160.188096] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 160.188132] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 160.188144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 160.188158] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.188186] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 160.188207] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 160.188226] RAX: 0000000080000000 RBX: ffff888107620b40 RCX: ffff888154200000 <4>[ 160.188240] RDX: 0000000000148fe0 RSI: ffffffff88ebc501 RDI: ffff888154348fe0 <4>[ 160.188253] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 160.188267] R10: 0000000029f6378d R11: 00000000000c9000 R12: ffffea00041d8800 <4>[ 160.188280] R13: ffff888154348fe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 160.188293] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 160.188308] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 160.188322] CR2: 000055fabd9aa078 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 160.188334] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 160.188347] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 160.188360] Call Trace: <4>[ 160.188371] <4>[ 160.188385] ? show_regs+0x68/0x80 <4>[ 160.188412] ? __warn+0xd5/0x260 <4>[ 160.188431] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.188454] ? report_bug+0x278/0x2e0 <4>[ 160.188481] ? handle_bug+0x7b/0xa0 <4>[ 160.188499] ? exc_invalid_op+0x1c/0x50 <4>[ 160.188518] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 160.188543] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 160.188565] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.188587] ? rcu_core_si+0x12/0x20 <4>[ 160.188611] rcu_core+0x683/0x1c80 <4>[ 160.188762] ? __pfx_rcu_core+0x10/0x10 <4>[ 160.188796] ? lapic_next_event+0x19/0x30 <4>[ 160.188815] ? handle_softirqs+0x18e/0x720 <4>[ 160.188838] rcu_core_si+0x12/0x20 <4>[ 160.188857] handle_softirqs+0x20c/0x720 <4>[ 160.188879] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 160.188898] ? trace_preempt_on+0x20/0xc0 <4>[ 160.188918] ? irq_exit_rcu+0x20/0xd0 <4>[ 160.188938] irq_exit_rcu+0x9c/0xd0 <4>[ 160.188956] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 160.188979] <4>[ 160.188989] <4>[ 160.188999] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 160.189020] RIP: 0010:__call_rcu_common.constprop.0+0x0/0xaa0 <4>[ 160.189043] Code: 48 89 df e8 12 5a 4f 00 e9 24 ff ff ff e8 08 5a 4f 00 e9 fb fe ff ff 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <0f> 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 49 89 f4 53 48 <4>[ 160.189061] RSP: 0018:ffff888108b4fdf8 EFLAGS: 00000282 <4>[ 160.189080] RAX: ffff888107628ac0 RBX: ffff888104d50a00 RCX: ffff888153480060 <4>[ 160.189093] RDX: ffffffff8c200130 RSI: ffffffff88ebc510 RDI: ffff888107628ac0 <4>[ 160.189106] RBP: ffff888108b4fe00 R08: ffff888108bc6e40 R09: 0000000000000000 <4>[ 160.189118] R10: 00000000fef9fae0 R11: 0000000000000005 R12: ffffffff88fc84e1 <4>[ 160.189130] R13: ffff8881002a3280 R14: ffffea0004135400 R15: 0000000000000000 <4>[ 160.189146] ? __fput+0x581/0xad0 <4>[ 160.189170] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 160.189190] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 <4>[ 160.189214] ? call_rcu+0x12/0x20 <4>[ 160.189232] kmem_cache_free+0x143/0x340 <4>[ 160.189255] __fput+0x581/0xad0 <4>[ 160.189274] ? trace_preempt_on+0x20/0xc0 <4>[ 160.189292] ? file_close_fd+0x67/0x80 <4>[ 160.189315] __fput_sync+0x38/0x50 <4>[ 160.189335] __x64_sys_close+0x81/0xe0 <4>[ 160.189356] x64_sys_call+0x17ab/0x2060 <4>[ 160.189378] do_syscall_64+0xb2/0x1d0 <4>[ 160.189398] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 160.189418] RIP: 0033:0x7fddb488a100 <4>[ 160.189442] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 69 42 0e 00 00 74 17 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c <4>[ 160.189459] RSP: 002b:00007ffe17fac728 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 <4>[ 160.189479] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00007fddb488a100 <4>[ 160.189492] RDX: 0000000000000018 RSI: 000055fa8bdcf200 RDI: 0000000000000007 <4>[ 160.189505] RBP: 00007fddb46f0690 R08: 0000000000000000 R09: 0000000000000000 <4>[ 160.189517] R10: 00007fddb4904b10 R11: 0000000000000202 R12: 0000000000000002 <4>[ 160.189528] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 160.189549] <4>[ 160.189560] ---[ end trace 0000000000000000 ]--- <4>[ 160.293744] ------------[ cut here ]------------ <4>[ 160.294050] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.294134] Modules linked in: <4>[ 160.294187] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 160.294236] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 160.294253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 160.294274] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.294317] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 160.294349] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 160.294380] RAX: 0000000080000000 RBX: ffff8881034cf140 RCX: ffff888154200000 <4>[ 160.294401] RDX: 000000000014afe0 RSI: ffffffff88ebc501 RDI: ffff88815434afe0 <4>[ 160.294421] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 160.294439] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea00040d33c0 <4>[ 160.294458] R13: ffff88815434afe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 160.294478] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 160.294501] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 160.294520] CR2: 000055fabd9ae0e8 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 160.294540] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 160.294559] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 160.294579] Call Trace: <4>[ 160.294596] <4>[ 160.294734] ? show_regs+0x68/0x80 <4>[ 160.294774] ? __warn+0xd5/0x260 <4>[ 160.294799] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.294829] ? report_bug+0x278/0x2e0 <4>[ 160.294868] ? handle_bug+0x7b/0xa0 <4>[ 160.294889] ? exc_invalid_op+0x1c/0x50 <4>[ 160.294909] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 160.294935] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 160.294959] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.294981] ? rcu_core_si+0x12/0x20 <4>[ 160.295006] rcu_core+0x683/0x1c80 <4>[ 160.295031] ? __pfx_rcu_core+0x10/0x10 <4>[ 160.295055] ? lapic_next_event+0x19/0x30 <4>[ 160.295077] ? handle_softirqs+0x18e/0x720 <4>[ 160.295100] rcu_core_si+0x12/0x20 <4>[ 160.295121] handle_softirqs+0x20c/0x720 <4>[ 160.295143] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 160.295163] ? trace_preempt_on+0x20/0xc0 <4>[ 160.295184] ? irq_exit_rcu+0x20/0xd0 <4>[ 160.295204] irq_exit_rcu+0x9c/0xd0 <4>[ 160.295224] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 160.295247] <4>[ 160.295257] <4>[ 160.295267] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 160.295289] RIP: 0010:__kmalloc_cache_noprof+0x9d/0x350 <4>[ 160.295314] Code: 11 02 00 00 48 c7 45 c0 00 00 00 00 49 8b 04 24 65 48 03 05 fd 8a 16 77 48 8b 50 08 48 83 78 10 00 4c 8b 00 0f 84 13 02 00 00 <4d> 85 c0 0f 84 0a 02 00 00 41 8b 44 24 28 49 8b 34 24 48 8d 4a 40 <4>[ 160.295334] RSP: 0018:ffff888108b4fda0 EFLAGS: 00000282 <4>[ 160.295353] RAX: ffff888154b3db60 RBX: ffff8881082a1780 RCX: ffff8881082a1dc0 <4>[ 160.295369] RDX: 00000000005f0441 RSI: 0000000000002800 RDI: ffff888100041780 <4>[ 160.295382] RBP: ffff888108b4fdf0 R08: ffff888104452100 R09: 0000000000000140 <4>[ 160.295395] R10: ffff888108b4fe10 R11: 0000000000000005 R12: ffff888100041780 <4>[ 160.295408] R13: 0000000000002800 R14: 0000000000000018 R15: ffffffff88ebcb55 <4>[ 160.295421] ? kmem_cache_free+0x115/0x340 <4>[ 160.295453] ? __fput+0x581/0xad0 <4>[ 160.295475] kmem_cache_free+0x115/0x340 <4>[ 160.295497] ? kmem_cache_free+0x115/0x340 <4>[ 160.295520] __fput+0x581/0xad0 <4>[ 160.295539] ? trace_preempt_on+0x20/0xc0 <4>[ 160.295559] ? file_close_fd+0x67/0x80 <4>[ 160.295582] __fput_sync+0x38/0x50 <4>[ 160.295602] __x64_sys_close+0x81/0xe0 <4>[ 160.295690] x64_sys_call+0x17ab/0x2060 <4>[ 160.295722] do_syscall_64+0xb2/0x1d0 <4>[ 160.295743] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 160.295763] RIP: 0033:0x7fddb488a100 <4>[ 160.295789] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 69 42 0e 00 00 74 17 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c <4>[ 160.295807] RSP: 002b:00007ffe17fac7d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 <4>[ 160.295830] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00007fddb488a100 <4>[ 160.295843] RDX: 0000000000000018 RSI: 000055fa8bdcf200 RDI: 0000000000000007 <4>[ 160.295855] RBP: 00007fddb46f0690 R08: 0000000000000000 R09: 0000000000000000 <4>[ 160.295868] R10: 00007fddb4904b10 R11: 0000000000000202 R12: 0000000000000000 <4>[ 160.295881] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 160.295903] <4>[ 160.295913] ---[ end trace 0000000000000000 ]--- <4>[ 160.398773] ------------[ cut here ]------------ <4>[ 160.399021] WARNING: CPU: 1 PID: 3319 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.399079] Modules linked in: <4>[ 160.399115] CPU: 1 UID: 0 PID: 3319 Comm: udevadm Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 160.399151] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 160.399162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 160.399177] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.399205] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 160.399226] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 160.399247] RAX: 0000000080000000 RBX: ffff888107a0cc80 RCX: ffff888154200000 <4>[ 160.399260] RDX: 000000000014cfe0 RSI: ffffffff88ebc501 RDI: ffff88815434cfe0 <4>[ 160.399274] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 160.399286] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea00041e8300 <4>[ 160.399299] R13: ffff88815434cfe0 R14: 0000000008a84401 R15: 0000000000039408 <4>[ 160.399311] FS: 00007fddb46f08c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 160.399327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 160.399339] CR2: 000055fabd9b2118 CR3: 0000000103b66000 CR4: 00000000000006f0 <4>[ 160.399351] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 160.399364] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 160.399376] Call Trace: <4>[ 160.399387] <4>[ 160.399400] ? show_regs+0x68/0x80 <4>[ 160.399435] ? __warn+0xd5/0x260 <4>[ 160.399455] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.399478] ? report_bug+0x278/0x2e0 <4>[ 160.399510] ? handle_bug+0x7b/0xa0 <4>[ 160.399529] ? exc_invalid_op+0x1c/0x50 <4>[ 160.399548] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 160.399573] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 160.399595] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 160.399740] ? rcu_core_si+0x12/0x20 <4>[ 160.399776] rcu_core+0x683/0x1c80 <4>[ 160.399810] ? __pfx_rcu_core+0x10/0x10 <4>[ 160.399831] ? lapic_next_event+0x19/0x30 <4>[ 160.399851] ? handle_softirqs+0x18e/0x720 <4>[ 160.399874] rcu_core_si+0x12/0x20 <4>[ 160.399894] handle_softirqs+0x20c/0x720 <4>[ 160.399915] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 160.399933] ? trace_preempt_on+0x20/0xc0 <4>[ 160.399955] ? irq_exit_rcu+0x20/0xd0 <4>[ 160.399975] irq_exit_rcu+0x9c/0xd0 <4>[ 160.399995] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 160.400018] <4>[ 160.400029] <4>[ 160.400038] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 160.400060] RIP: 0010:unwind_get_return_address+0x5c/0xb0 <4>[ 160.400085] Code: 85 c0 75 0b 5b 31 c0 41 5c 5d c3 cc cc cc cc 48 b8 00 00 00 00 00 fc ff df 4c 8d 63 58 4c 89 e2 48 c1 ea 03 80 3c 02 00 75 38 <48> 8b 7b 58 e8 1b 03 16 00 85 c0 74 cd 48 b8 00 00 00 00 00 fc ff <4>[ 160.400103] RSP: 0018:ffff888108b4f8e8 EFLAGS: 00000246 <4>[ 160.400122] RAX: dffffc0000000000 RBX: ffff888108b4f908 RCX: ffff888108b4f930 <4>[ 160.400136] RDX: 1ffff11021169f2c RSI: 1ffff11021178f25 RDI: ffff888108b4f908 <4>[ 160.400149] RBP: ffff888108b4f8f8 R08: ffff888108bc6e40 R09: ffff888108b4f950 <4>[ 160.400162] R10: ffff888108b4f910 R11: 0000000000000000 R12: ffff888108b4f960 <4>[ 160.400174] R13: ffff888108b4f9d8 R14: 0000000000000000 R15: ffff888108bc6e40 <4>[ 160.400197] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 160.400220] arch_stack_walk+0xac/0x100 <4>[ 160.400243] ? x64_sys_call+0x1e3e/0x2060 <4>[ 160.400267] stack_trace_save+0x97/0xd0 <4>[ 160.400286] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 160.400310] kasan_save_stack+0x3d/0x60 <4>[ 160.400332] ? kasan_save_stack+0x3d/0x60 <4>[ 160.400351] ? kasan_save_track+0x18/0x40 <4>[ 160.400370] ? kasan_save_alloc_info+0x3b/0x50 <4>[ 160.400388] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 160.400407] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 160.400425] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 160.400446] ? getname+0x7b/0xb0 <4>[ 160.400462] ? do_sys_openat2+0xfa/0x190 <4>[ 160.400480] ? __x64_sys_openat+0x12c/0x210 <4>[ 160.400520] kasan_save_track+0x18/0x40 <4>[ 160.400542] kasan_save_alloc_info+0x3b/0x50 <4>[ 160.400562] __kasan_slab_alloc+0x91/0xa0 <4>[ 160.400583] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 160.400612] getname_flags.part.0+0x4f/0x4a0 <4>[ 160.400710] getname+0x7b/0xb0 <4>[ 160.400736] do_sys_openat2+0xfa/0x190 <4>[ 160.400758] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 160.400780] ? call_rcu+0x12/0x20 <4>[ 160.400798] ? kmem_cache_free+0x143/0x340 <4>[ 160.400822] __x64_sys_openat+0x12c/0x210 <4>[ 160.400840] ? __fput+0x581/0xad0 <4>[ 160.400859] ? trace_preempt_on+0x20/0xc0 <4>[ 160.400878] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 160.400899] ? do_syscall_64+0xbf/0x1d0 <4>[ 160.400917] ? do_syscall_64+0x7e/0x1d0 <4>[ 160.400935] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 160.400959] x64_sys_call+0x1e3e/0x2060 <4>[ 160.400979] do_syscall_64+0xb2/0x1d0 <4>[ 160.400998] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 160.401019] RIP: 0033:0x7fddb488e28c <4>[ 160.401044] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 160.401061] RSP: 002b:00007ffe17fac790 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 160.401083] RAX: ffffffffffffffda RBX: 000055fabd9b1790 RCX: 00007fddb488e28c <4>[ 160.401096] RDX: 00000000002a0000 RSI: 000055fabd9b1790 RDI: 0000000000000007 <4>[ 160.401109] RBP: 0000000000000000 R08: 000000000000feff R09: 0000000000000001 <4>[ 160.401121] R10: 0000000000000000 R11: 0000000000000202 R12: 000055fabd9b1750 <4>[ 160.401134] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008 <4>[ 160.401154] <4>[ 160.401164] ---[ end trace 0000000000000000 ]--- <4>[ 161.124767] ------------[ cut here ]------------ <4>[ 161.125002] WARNING: CPU: 1 PID: 3362 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.125092] Modules linked in: <4>[ 161.125154] CPU: 1 UID: 0 PID: 3362 Comm: systemd-tmpfile Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 161.125215] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 161.125232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 161.125256] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.125302] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 161.125338] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 161.125372] RAX: 0000000080000000 RBX: ffff888107ab4500 RCX: ffff888154200000 <4>[ 161.125396] RDX: 0000000000160fe0 RSI: ffffffff88ebc501 RDI: ffff888154360fe0 <4>[ 161.125418] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 161.125440] R10: 0000000029f6378d R11: 00000000000c0000 R12: ffffea00041ead00 <4>[ 161.125462] R13: ffff888154360fe0 R14: 0000000000c80501 R15: 0000000000039408 <4>[ 161.125483] FS: 00007f30f0d85940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 161.125509] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 161.125536] CR2: 000055bdc0b94010 CR3: 00000001077ba000 CR4: 00000000000006f0 <4>[ 161.125553] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 161.125566] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 161.125579] Call Trace: <4>[ 161.125592] <4>[ 161.125607] ? show_regs+0x68/0x80 <4>[ 161.125774] ? __warn+0xd5/0x260 <4>[ 161.125801] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.125838] ? report_bug+0x278/0x2e0 <4>[ 161.125866] ? handle_bug+0x7b/0xa0 <4>[ 161.125885] ? exc_invalid_op+0x1c/0x50 <4>[ 161.125903] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 161.125929] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 161.125951] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.125973] ? rcu_core_si+0x12/0x20 <4>[ 161.125997] rcu_core+0x683/0x1c80 <4>[ 161.126022] ? __pfx_rcu_core+0x10/0x10 <4>[ 161.126044] ? lapic_next_event+0x19/0x30 <4>[ 161.126063] ? handle_softirqs+0x18e/0x720 <4>[ 161.126085] rcu_core_si+0x12/0x20 <4>[ 161.126103] handle_softirqs+0x20c/0x720 <4>[ 161.126125] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 161.126147] irq_exit_rcu+0x9c/0xd0 <4>[ 161.126165] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 161.126188] <4>[ 161.126198] <4>[ 161.126208] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 161.126230] RIP: 0010:expand_files+0xcb/0x900 <4>[ 161.126254] Code: 85 fd 06 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 63 20 4c 89 e2 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 76 05 00 00 <45> 3b 2c 24 0f 82 c8 05 00 00 48 8d 43 04 48 89 c2 48 89 85 30 ff <4>[ 161.126272] RSP: 0018:ffff888107117be0 EFLAGS: 00000246 <4>[ 161.126291] RAX: 0000000000000000 RBX: ffff88810032a3c0 RCX: 0000000000000005 <4>[ 161.126304] RDX: 1ffff11020812e90 RSI: 0000000000000005 RDI: ffff88810032a3c0 <4>[ 161.126316] RBP: ffff888107117ce8 R08: ffff88810032a3e0 R09: ffffed1020e22f93 <4>[ 161.126330] R10: 0000000000000080 R11: ffff88810032a444 R12: ffff888104097480 <4>[ 161.126342] R13: 0000000000000005 R14: ffff888107117cc0 R15: ffff888104097480 <4>[ 161.126368] ? __pfx_expand_files+0x10/0x10 <4>[ 161.126391] ? alloc_fd+0x6d/0x580 <4>[ 161.126412] ? __kasan_check_write+0x18/0x20 <4>[ 161.126434] ? _raw_spin_lock+0x8c/0xe0 <4>[ 161.126454] ? __pfx__raw_spin_lock+0x10/0x10 <4>[ 161.126473] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 161.126497] alloc_fd+0xbe/0x580 <4>[ 161.126523] get_unused_fd_flags+0x6d/0xa0 <4>[ 161.126544] do_sys_openat2+0x11c/0x190 <4>[ 161.126565] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 161.126587] ? call_rcu+0x12/0x20 <4>[ 161.126608] ? kmem_cache_free+0x143/0x340 <4>[ 161.126686] __x64_sys_openat+0x12c/0x210 <4>[ 161.126712] ? __fput+0x581/0xad0 <4>[ 161.126730] ? trace_preempt_on+0x20/0xc0 <4>[ 161.126751] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 161.126772] ? do_syscall_64+0xbf/0x1d0 <4>[ 161.126792] ? do_syscall_64+0x7e/0x1d0 <4>[ 161.126809] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.126831] x64_sys_call+0x1e3e/0x2060 <4>[ 161.126853] do_syscall_64+0xb2/0x1d0 <4>[ 161.126884] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.126904] RIP: 0033:0x7f30f110e28c <4>[ 161.126930] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 161.126949] RSP: 002b:00007ffc09406120 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 161.126969] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f30f110e28c <4>[ 161.126983] RDX: 00000000002a0000 RSI: 000056047c9b0040 RDI: 0000000000000007 <4>[ 161.126995] RBP: 0000000000000086 R08: 00000000000000e0 R09: 0000000000000000 <4>[ 161.127007] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffc09406230 <4>[ 161.127018] R13: 0000000000000007 R14: 000056047c9b0040 R15: 0000000000000000 <4>[ 161.127039] <4>[ 161.127050] ---[ end trace 0000000000000000 ]--- <4>[ 161.228753] ------------[ cut here ]------------ <4>[ 161.229024] WARNING: CPU: 0 PID: 3366 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.229079] Modules linked in: <4>[ 161.229114] CPU: 0 UID: 0 PID: 3366 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 161.229150] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 161.229161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 161.229175] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.229202] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 161.229224] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 161.229243] RAX: 0000000080000000 RBX: ffff8881085cf780 RCX: ffff888154200000 <4>[ 161.229257] RDX: 0000000000162fe0 RSI: ffffffff88ebc501 RDI: ffff888154362fe0 <4>[ 161.229270] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 161.229284] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea00042173c0 <4>[ 161.229298] R13: ffff888154362fe0 R14: 0000000000c88501 R15: 0000000000039408 <4>[ 161.229311] FS: 00007f861bd4e8c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 161.229328] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 161.229341] CR2: 00007fd12e881a58 CR3: 00000001067de000 CR4: 00000000000006f0 <4>[ 161.229355] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 161.229368] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 161.229382] Call Trace: <4>[ 161.229393] <4>[ 161.229407] ? show_regs+0x68/0x80 <4>[ 161.229434] ? __warn+0xd5/0x260 <4>[ 161.229452] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.229474] ? report_bug+0x278/0x2e0 <4>[ 161.229501] ? handle_bug+0x7b/0xa0 <4>[ 161.229520] ? exc_invalid_op+0x1c/0x50 <4>[ 161.229539] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 161.229565] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 161.229586] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.229607] ? rcu_core_si+0x12/0x20 <4>[ 161.229707] rcu_core+0x683/0x1c80 <4>[ 161.229740] ? __pfx_rcu_core+0x10/0x10 <4>[ 161.229763] ? lapic_next_event+0x19/0x30 <4>[ 161.229784] ? handle_softirqs+0x18e/0x720 <4>[ 161.229806] rcu_core_si+0x12/0x20 <4>[ 161.229826] handle_softirqs+0x20c/0x720 <4>[ 161.229848] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 161.229866] ? trace_preempt_on+0x20/0xc0 <4>[ 161.229886] ? irq_exit_rcu+0x20/0xd0 <4>[ 161.229905] irq_exit_rcu+0x9c/0xd0 <4>[ 161.229923] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 161.229947] <4>[ 161.229957] <4>[ 161.229967] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 161.229988] RIP: 0010:__kernel_text_address+0x16/0x50 <4>[ 161.230012] Code: ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 8a fe ff ff <85> c0 75 1f 48 81 fb 00 10 fa 8d 72 0c 31 c0 48 81 fb bf b7 0f 8e <4>[ 161.230031] RSP: 0018:ffff88810a4ff568 EFLAGS: 00000287 <4>[ 161.230050] RAX: 0000000000000001 RBX: ffffffff8840632e RCX: ffff88810a4ff5c8 <4>[ 161.230063] RDX: 1ffff1102149febf RSI: 1ffff11020bb193d RDI: ffffffff8840632e <4>[ 161.230077] RBP: ffff88810a4ff570 R08: ffff888105d8bf00 R09: ffff88810a4ff5e8 <4>[ 161.230090] R10: ffff88810a4ff5a8 R11: 0000000000000005 R12: ffff88810a4ff5f8 <4>[ 161.230103] R13: ffff88810a4ff670 R14: 0000000000000000 R15: ffff888105d8bf00 <4>[ 161.230119] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.230144] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.230165] ? __kernel_text_address+0x16/0x50 <4>[ 161.230185] unwind_get_return_address+0x65/0xb0 <4>[ 161.230207] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 161.230229] arch_stack_walk+0xac/0x100 <4>[ 161.230251] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.230273] stack_trace_save+0x97/0xd0 <4>[ 161.230291] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 161.230313] ? stack_trace_save+0x97/0xd0 <4>[ 161.230332] kasan_save_stack+0x3d/0x60 <4>[ 161.230352] ? kasan_save_stack+0x3d/0x60 <4>[ 161.230370] ? __kasan_record_aux_stack+0xae/0xc0 <4>[ 161.230387] ? kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 161.230405] ? __call_rcu_common.constprop.0+0x72/0xaa0 <4>[ 161.230425] ? call_rcu+0x12/0x20 <4>[ 161.230441] ? kmem_cache_free+0x143/0x340 <4>[ 161.230459] ? fput+0x261/0x2d0 <4>[ 161.230477] ? path_openat+0x1e1a/0x3e30 <4>[ 161.230494] ? do_filp_open+0x19c/0x3b0 <4>[ 161.230510] ? do_sys_openat2+0x145/0x190 <4>[ 161.230529] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.230568] __kasan_record_aux_stack+0xae/0xc0 <4>[ 161.230587] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 <4>[ 161.230608] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 161.230688] __call_rcu_common.constprop.0+0x72/0xaa0 <4>[ 161.230718] ? fput+0x261/0x2d0 <4>[ 161.230737] call_rcu+0x12/0x20 <4>[ 161.230756] kmem_cache_free+0x143/0x340 <4>[ 161.230779] fput+0x261/0x2d0 <4>[ 161.230798] path_openat+0x1e1a/0x3e30 <4>[ 161.230814] ? kasan_save_stack+0x4d/0x60 <4>[ 161.230833] ? kasan_save_track+0x18/0x40 <4>[ 161.230852] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 161.230880] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 161.230900] ? do_sys_openat2+0xfa/0x190 <4>[ 161.230919] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.230938] ? do_syscall_64+0xb2/0x1d0 <4>[ 161.230956] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.230979] ? __pfx_path_openat+0x10/0x10 <4>[ 161.231005] do_filp_open+0x19c/0x3b0 <4>[ 161.231024] ? __pfx_do_filp_open+0x10/0x10 <4>[ 161.231061] do_sys_openat2+0x145/0x190 <4>[ 161.231080] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 161.231101] ? __pfx___seccomp_filter+0x10/0x10 <4>[ 161.231125] __x64_sys_openat+0x12c/0x210 <4>[ 161.231144] ? __fput+0x581/0xad0 <4>[ 161.231162] ? trace_preempt_on+0x20/0xc0 <4>[ 161.231180] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 161.231201] ? __secure_computing+0x183/0x2b0 <4>[ 161.231223] x64_sys_call+0x1e3e/0x2060 <4>[ 161.231241] do_syscall_64+0xb2/0x1d0 <4>[ 161.231260] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.231280] RIP: 0033:0x7f861beec28c <4>[ 161.231304] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 161.231323] RSP: 002b:00007fff17207130 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 161.231345] RAX: ffffffffffffffda RBX: 000055bdc0b5d100 RCX: 00007f861beec28c <4>[ 161.231359] RDX: 0000000000080100 RSI: 00007fff172071e0 RDI: 00000000ffffff9c <4>[ 161.231372] RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000000 <4>[ 161.231384] R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff17207230 <4>[ 161.231397] R13: 00007fff17207220 R14: 00007fff1720b3e0 R15: 000055bdc0b95180 <4>[ 161.231419] <4>[ 161.231429] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-udev-trigger.service[0m - Coldplug All udev Devices. <4>[ 161.436793] ------------[ cut here ]------------ <4>[ 161.437072] WARNING: CPU: 1 PID: 3362 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.437130] Modules linked in: <4>[ 161.437164] CPU: 1 UID: 0 PID: 3362 Comm: systemd-tmpfile Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 161.437201] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 161.437212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 161.437227] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.437255] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 161.437277] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 161.437296] RAX: 0000000080000000 RBX: ffff888101222b40 RCX: ffff888154200000 <4>[ 161.437311] RDX: 0000000000166fe0 RSI: ffffffff88ebc501 RDI: ffff888154366fe0 <4>[ 161.437324] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 161.437338] R10: 0000000029f6378d R11: 0000000000000005 R12: ffffea0004048880 <4>[ 161.437350] R13: ffff888154366fe0 R14: 0000000000c80501 R15: 0000000000039408 <4>[ 161.437363] FS: 00007f30f0d85940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 161.437379] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 161.437392] CR2: 000055bdc0b67e80 CR3: 00000001077ba000 CR4: 00000000000006f0 <4>[ 161.437405] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 161.437418] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 161.437431] Call Trace: <4>[ 161.437443] <4>[ 161.437456] ? show_regs+0x68/0x80 <4>[ 161.437480] ? __warn+0xd5/0x260 <4>[ 161.437499] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.437521] ? report_bug+0x278/0x2e0 <4>[ 161.437547] ? handle_bug+0x7b/0xa0 <4>[ 161.437566] ? exc_invalid_op+0x1c/0x50 <4>[ 161.437585] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 161.437610] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 161.437758] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.437792] ? rcu_core_si+0x12/0x20 <4>[ 161.437816] rcu_core+0x683/0x1c80 <4>[ 161.437841] ? __pfx_rcu_core+0x10/0x10 <4>[ 161.437863] ? lapic_next_event+0x19/0x30 <4>[ 161.437882] ? handle_softirqs+0x18e/0x720 <4>[ 161.437904] rcu_core_si+0x12/0x20 <4>[ 161.437922] handle_softirqs+0x20c/0x720 <4>[ 161.437943] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 161.437964] irq_exit_rcu+0x9c/0xd0 <4>[ 161.437983] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 161.438006] <4>[ 161.438015] <4>[ 161.438026] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 161.438048] RIP: 0010:in_lock_functions+0x0/0x20 <4>[ 161.438072] Code: bd 28 ff ff ff e9 62 fd ff ff e8 eb 66 6b 03 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 31 c0 48 81 ff 70 7a 08 8c 72 0c 31 c0 48 81 ff fb a3 <4>[ 161.438091] RSP: 0018:ffff888107117460 EFLAGS: 00000246 <4>[ 161.438110] RAX: 0000000000000001 RBX: ffffffff88a6e6af RCX: 1ffffffff1be5c18 <4>[ 161.438124] RDX: 0000000000000000 RSI: 1ffff11020f985ec RDI: ffffffff88a6e6af <4>[ 161.438136] RBP: ffff888107117470 R08: ffff888107cc2f40 R09: ffff888107117548 <4>[ 161.438149] R10: ffff888107117508 R11: ffff8881007f6c00 R12: 0000000000000000 <4>[ 161.438161] R13: ffff8881071175d0 R14: 0000000000000000 R15: ffff888107cc2f40 <4>[ 161.438177] ? is_module_text_address+0x1f/0x160 <4>[ 161.438204] ? is_module_text_address+0x1f/0x160 <4>[ 161.438226] ? preempt_count_add+0x36/0x80 <4>[ 161.438247] is_module_text_address+0x1f/0x160 <4>[ 161.438269] kernel_text_address+0x8a/0x150 <4>[ 161.438288] ? __unwind_start+0x1fc/0x390 <4>[ 161.438308] __kernel_text_address+0x16/0x50 <4>[ 161.438328] unwind_get_return_address+0x65/0xb0 <4>[ 161.438347] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 161.438366] arch_stack_walk+0xac/0x100 <4>[ 161.438390] ? kfree_link+0x12/0x20 <4>[ 161.438411] stack_trace_save+0x97/0xd0 <4>[ 161.438429] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 161.438452] kasan_save_stack+0x3d/0x60 <4>[ 161.438472] ? kasan_save_stack+0x3d/0x60 <4>[ 161.438490] ? kasan_save_track+0x18/0x40 <4>[ 161.438509] ? kasan_save_free_info+0x3f/0x60 <4>[ 161.438526] ? __kasan_slab_free+0x5e/0x80 <4>[ 161.438545] ? kfree+0x21a/0x330 <4>[ 161.438561] ? kfree_link+0x12/0x20 <4>[ 161.438577] ? walk_component+0x151/0x4f0 <4>[ 161.438598] ? link_path_walk.part.0.constprop.0+0x3fe/0xba0 <4>[ 161.438689] ? path_lookupat+0x6c/0x680 <4>[ 161.438720] ? path_openat+0x2543/0x3e30 <4>[ 161.438737] ? do_filp_open+0x19c/0x3b0 <4>[ 161.438753] ? do_sys_openat2+0x145/0x190 <4>[ 161.438773] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.438791] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.438811] ? do_syscall_64+0xb2/0x1d0 <4>[ 161.438827] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.438876] kasan_save_track+0x18/0x40 <4>[ 161.438898] kasan_save_free_info+0x3f/0x60 <4>[ 161.438930] __kasan_slab_free+0x5e/0x80 <4>[ 161.438969] kfree+0x21a/0x330 <4>[ 161.439010] ? __pfx_kfree_link+0x10/0x10 <4>[ 161.439051] kfree_link+0x12/0x20 <4>[ 161.439086] walk_component+0x151/0x4f0 <4>[ 161.439127] link_path_walk.part.0.constprop.0+0x3fe/0xba0 <4>[ 161.439176] path_lookupat+0x6c/0x680 <4>[ 161.439214] path_openat+0x2543/0x3e30 <4>[ 161.439245] ? kasan_save_stack+0x4d/0x60 <4>[ 161.439280] ? kasan_save_track+0x18/0x40 <4>[ 161.439314] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 161.439348] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 161.439383] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 161.439416] ? getname+0x7b/0xb0 <4>[ 161.439446] ? do_sys_openat2+0xfa/0x190 <4>[ 161.439479] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.439514] ? do_syscall_64+0xb2/0x1d0 <4>[ 161.439544] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.439587] ? __pfx_path_openat+0x10/0x10 <4>[ 161.439717] do_filp_open+0x19c/0x3b0 <4>[ 161.439767] ? __pfx_do_filp_open+0x10/0x10 <4>[ 161.439814] ? __pfx_kfree_link+0x10/0x10 <4>[ 161.439870] do_sys_openat2+0x145/0x190 <4>[ 161.439908] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 161.439956] __x64_sys_openat+0x12c/0x210 <4>[ 161.439991] ? __fput+0x581/0xad0 <4>[ 161.440022] ? trace_preempt_on+0x20/0xc0 <4>[ 161.440058] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 161.440097] ? do_syscall_64+0xbf/0x1d0 <4>[ 161.440130] ? do_syscall_64+0x7e/0x1d0 <4>[ 161.440162] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.440202] x64_sys_call+0x1e3e/0x2060 <4>[ 161.440238] do_syscall_64+0xb2/0x1d0 <4>[ 161.440273] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.440309] RIP: 0033:0x7f30f110e11e <4>[ 161.440350] Code: 83 e2 40 75 4f 89 f0 f7 d0 a9 00 00 41 00 74 44 80 3d 55 02 0e 00 00 74 68 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8e 00 00 00 48 8b 54 24 28 64 48 2b 14 25 <4>[ 161.440382] RSP: 002b:00007ffc09405fc0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 161.440423] RAX: ffffffffffffffda RBX: 0000000000280100 RCX: 00007f30f110e11e <4>[ 161.440449] RDX: 0000000000280100 RSI: 00007ffc09406040 RDI: 00000000ffffff9c <4>[ 161.440471] RBP: 00007ffc09406040 R08: 0000000000000069 R09: 0000000000000000 <4>[ 161.440494] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 <4>[ 161.440517] R13: 0000000000000007 R14: 000056047c9b0c00 R15: 0000000000000000 <4>[ 161.440554] <4>[ 161.440574] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-tmpfiles-setup.se…[0mate Volatile Files and Directories. Starting [0;1;39msystemd-journal-catalog-u…ervice[0m - Rebuild Journal Catalog... Starting [0;1;39msystemd-update-utmp.servi…[0mord System Boot/Shutdown in UTMP... <4>[ 161.850808] ------------[ cut here ]------------ <4>[ 161.851050] WARNING: CPU: 1 PID: 3367 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.851108] Modules linked in: <4>[ 161.851143] CPU: 1 UID: 0 PID: 3367 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 161.851180] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 161.851191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 161.851206] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.851236] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 161.851257] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 161.851277] RAX: 0000000080000000 RBX: ffff888107171640 RCX: ffff888154200000 <4>[ 161.851291] RDX: 0000000000170fe0 RSI: ffffffff88ebc501 RDI: ffff888154370fe0 <4>[ 161.851305] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 161.851318] R10: 0000000029f6378d R11: 00000000000d2c00 R12: ffffea00041c5c40 <4>[ 161.851330] R13: ffff888154370fe0 R14: 0000000000c8c401 R15: 0000000000039408 <4>[ 161.851343] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 161.851359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 161.851372] CR2: 000055bdc0b5ae18 CR3: 0000000105a0c000 CR4: 00000000000006f0 <4>[ 161.851385] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 161.851399] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 161.851412] Call Trace: <4>[ 161.851424] <4>[ 161.851436] ? show_regs+0x68/0x80 <4>[ 161.851463] ? __warn+0xd5/0x260 <4>[ 161.851481] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.851505] ? report_bug+0x278/0x2e0 <4>[ 161.851531] ? handle_bug+0x7b/0xa0 <4>[ 161.851550] ? exc_invalid_op+0x1c/0x50 <4>[ 161.851577] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 161.851604] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 161.851787] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.851826] ? rcu_core_si+0x12/0x20 <4>[ 161.851852] rcu_core+0x683/0x1c80 <4>[ 161.851878] ? __pfx_rcu_core+0x10/0x10 <4>[ 161.851900] ? lapic_next_event+0x19/0x30 <4>[ 161.851919] ? handle_softirqs+0x18e/0x720 <4>[ 161.851941] rcu_core_si+0x12/0x20 <4>[ 161.851960] handle_softirqs+0x20c/0x720 <4>[ 161.851981] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 161.852000] ? trace_preempt_on+0x20/0xc0 <4>[ 161.852019] ? irq_exit_rcu+0x20/0xd0 <4>[ 161.852038] irq_exit_rcu+0x9c/0xd0 <4>[ 161.852056] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 161.852080] <4>[ 161.852090] <4>[ 161.852100] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 161.852122] RIP: 0010:ftrace_ops_trampoline+0xb0/0x120 <4>[ 161.852147] Code: 78 08 48 89 fa 48 c1 ea 03 42 80 3c 22 00 75 5c 48 8b 40 08 48 3d 80 38 f3 8d 74 05 48 85 c0 75 85 65 ff 0d ca 04 49 77 74 29 <31> c0 48 83 c4 08 5b 41 5c 41 5d 5d c3 cc cc cc cc 49 01 d5 4c 39 <4>[ 161.852167] RSP: 0018:ffff888104f1f508 EFLAGS: 00000286 <4>[ 161.852187] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1ffffffff1be5c18 <4>[ 161.852201] RDX: 1ffffffff1be6711 RSI: ffffffff88a6e793 RDI: ffffffff8df33888 <4>[ 161.852214] RBP: ffff888104f1f528 R08: ffff888105d8cec0 R09: ffff888104f1f5e8 <4>[ 161.852226] R10: ffff888104f1f5a8 R11: 0000000000000005 R12: dffffc0000000000 <4>[ 161.852240] R13: 0000000000000000 R14: 0000000000000000 R15: ffff888105d8cec0 <4>[ 161.852259] ? is_module_text_address+0x103/0x160 <4>[ 161.852289] is_ftrace_trampoline+0xd/0x20 <4>[ 161.852310] kernel_text_address+0x96/0x150 <4>[ 161.852329] ? __unwind_start+0x1fc/0x390 <4>[ 161.852349] __kernel_text_address+0x16/0x50 <4>[ 161.852369] unwind_get_return_address+0x65/0xb0 <4>[ 161.852389] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 161.852409] arch_stack_walk+0xac/0x100 <4>[ 161.852435] stack_trace_save+0x97/0xd0 <4>[ 161.852453] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 161.852475] ? stack_trace_save+0x97/0xd0 <4>[ 161.852493] kasan_save_stack+0x3d/0x60 <4>[ 161.852514] ? kasan_save_stack+0x3d/0x60 <4>[ 161.852532] ? __kasan_record_aux_stack+0xae/0xc0 <4>[ 161.852549] ? kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 161.852568] ? __call_rcu_common.constprop.0+0x72/0xaa0 <4>[ 161.852587] ? call_rcu+0x12/0x20 <4>[ 161.852603] ? kmem_cache_free+0x143/0x340 <4>[ 161.852691] ? fput+0x261/0x2d0 <4>[ 161.852718] ? path_openat+0x1e1a/0x3e30 <4>[ 161.852736] ? do_filp_open+0x19c/0x3b0 <4>[ 161.852752] ? do_sys_openat2+0x145/0x190 <4>[ 161.852771] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.852790] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.852809] ? do_syscall_64+0xb2/0x1d0 <4>[ 161.852825] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.852865] __kasan_record_aux_stack+0xae/0xc0 <4>[ 161.852886] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 <4>[ 161.852907] kasan_record_aux_stack_noalloc+0xf/0x20 <4>[ 161.852928] __call_rcu_common.constprop.0+0x72/0xaa0 <4>[ 161.852952] ? fput+0x261/0x2d0 <4>[ 161.852970] call_rcu+0x12/0x20 <4>[ 161.852989] kmem_cache_free+0x143/0x340 <4>[ 161.853012] fput+0x261/0x2d0 <4>[ 161.853030] path_openat+0x1e1a/0x3e30 <4>[ 161.853048] ? kasan_save_stack+0x4d/0x60 <4>[ 161.853067] ? kasan_save_track+0x18/0x40 <4>[ 161.853086] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 161.853106] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 161.853126] ? do_sys_openat2+0xfa/0x190 <4>[ 161.853145] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.853164] ? do_syscall_64+0xb2/0x1d0 <4>[ 161.853181] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.853204] ? __pfx_path_openat+0x10/0x10 <4>[ 161.853230] do_filp_open+0x19c/0x3b0 <4>[ 161.853248] ? __pfx_do_filp_open+0x10/0x10 <4>[ 161.853285] do_sys_openat2+0x145/0x190 <4>[ 161.853306] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 161.853328] ? __pfx___seccomp_filter+0x10/0x10 <4>[ 161.853351] __x64_sys_openat+0x12c/0x210 <4>[ 161.853371] ? __fput+0x581/0xad0 <4>[ 161.853388] ? trace_preempt_on+0x20/0xc0 <4>[ 161.853405] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 161.853426] ? __secure_computing+0x183/0x2b0 <4>[ 161.853449] x64_sys_call+0x1e3e/0x2060 <4>[ 161.853468] do_syscall_64+0xb2/0x1d0 <4>[ 161.853487] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.853507] RIP: 0033:0x7f861beec28c <4>[ 161.853533] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 161.853552] RSP: 002b:00007fff17207130 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 161.853574] RAX: ffffffffffffffda RBX: 000055bdc0b5d370 RCX: 00007f861beec28c <4>[ 161.853587] RDX: 0000000000080100 RSI: 00007fff172071e0 RDI: 00000000ffffff9c <4>[ 161.853600] RBP: ffffffffffffffff R08: 0000000000000000 R09: 000000000000000f <4>[ 161.853612] R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff17207230 <4>[ 161.853683] R13: 00007fff17207220 R14: 00007fff1720b3e0 R15: 000055bdc0b966b0 <4>[ 161.853710] <4>[ 161.853722] ---[ end trace 0000000000000000 ]--- <4>[ 161.957776] ------------[ cut here ]------------ <4>[ 161.958013] WARNING: CPU: 1 PID: 3355 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.958068] Modules linked in: <4>[ 161.958103] CPU: 1 UID: 0 PID: 3355 Comm: systemd-udevd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 161.958138] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 161.958148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 161.958163] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.958191] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 161.958213] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 161.958233] RAX: 0000000080000000 RBX: ffff888107a068c0 RCX: ffff888154200000 <4>[ 161.958247] RDX: 0000000000172fe0 RSI: ffffffff88ebc501 RDI: ffff888154372fe0 <4>[ 161.958260] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 161.958273] R10: 00000000d0eafde8 R11: 0000000000000005 R12: ffffea00041e8180 <4>[ 161.958285] R13: ffff888154372fe0 R14: 0000000000c18501 R15: 0000000000039408 <4>[ 161.958298] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 161.958313] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 161.958327] CR2: 000055bdc0bab5a8 CR3: 0000000107f3a000 CR4: 00000000000006f0 <4>[ 161.958340] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 161.958353] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 161.958367] Call Trace: <4>[ 161.958378] <4>[ 161.958390] ? show_regs+0x68/0x80 <4>[ 161.958430] ? __warn+0xd5/0x260 <4>[ 161.958463] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.958486] ? report_bug+0x278/0x2e0 <4>[ 161.958512] ? handle_bug+0x7b/0xa0 <4>[ 161.958531] ? exc_invalid_op+0x1c/0x50 <4>[ 161.958548] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 161.958574] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 161.958596] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 161.958617] ? rcu_core_si+0x12/0x20 <4>[ 161.958734] rcu_core+0x683/0x1c80 <4>[ 161.958776] ? __pfx_rcu_core+0x10/0x10 <4>[ 161.958800] ? lapic_next_event+0x19/0x30 <4>[ 161.958819] ? handle_softirqs+0x18e/0x720 <4>[ 161.958842] rcu_core_si+0x12/0x20 <4>[ 161.958870] handle_softirqs+0x20c/0x720 <4>[ 161.958891] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 161.958910] ? trace_preempt_on+0x20/0xc0 <4>[ 161.958929] ? irq_exit_rcu+0x20/0xd0 <4>[ 161.958949] irq_exit_rcu+0x9c/0xd0 <4>[ 161.958967] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 161.958989] <4>[ 161.958999] <4>[ 161.959009] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 161.959031] RIP: 0010:__kernel_text_address+0x16/0x50 <4>[ 161.959055] Code: ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 8a fe ff ff <85> c0 75 1f 48 81 fb 00 10 fa 8d 72 0c 31 c0 48 81 fb bf b7 0f 8e <4>[ 161.959074] RSP: 0018:ffff888107bf7530 EFLAGS: 00000287 <4>[ 161.959093] RAX: 0000000000000001 RBX: ffffffff8840632e RCX: ffff888107bf7590 <4>[ 161.959106] RDX: 1ffff11020f7eeb8 RSI: 1ffff110205a354d RDI: ffffffff8840632e <4>[ 161.959118] RBP: ffff888107bf7538 R08: ffff888102d19f80 R09: ffff888107bf75b0 <4>[ 161.959132] R10: ffff888107bf7570 R11: ffff88810032a784 R12: ffff888107bf75c0 <4>[ 161.959144] R13: ffff888107bf7638 R14: 0000000000000000 R15: ffff888102d19f80 <4>[ 161.959161] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.959185] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.959208] unwind_get_return_address+0x65/0xb0 <4>[ 161.959229] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 161.959250] arch_stack_walk+0xac/0x100 <4>[ 161.959272] ? x64_sys_call+0x1e3e/0x2060 <4>[ 161.959292] stack_trace_save+0x97/0xd0 <4>[ 161.959311] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 161.959334] kasan_save_stack+0x3d/0x60 <4>[ 161.959354] ? kasan_save_stack+0x3d/0x60 <4>[ 161.959372] ? kasan_save_track+0x18/0x40 <4>[ 161.959389] ? kasan_save_alloc_info+0x3b/0x50 <4>[ 161.959407] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 161.959425] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 161.959443] ? security_file_alloc+0x3e/0x210 <4>[ 161.959464] ? init_file+0x92/0x2a0 <4>[ 161.959482] ? alloc_empty_file+0x72/0x170 <4>[ 161.959500] ? path_openat+0xef/0x3e30 <4>[ 161.959517] ? do_filp_open+0x19c/0x3b0 <4>[ 161.959534] ? do_sys_openat2+0x145/0x190 <4>[ 161.959552] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.959592] kasan_save_track+0x18/0x40 <4>[ 161.959612] kasan_save_alloc_info+0x3b/0x50 <4>[ 161.959698] __kasan_slab_alloc+0x91/0xa0 <4>[ 161.959727] kmem_cache_alloc_noprof+0x101/0x340 <4>[ 161.959749] ? __memcg_slab_post_alloc_hook+0x52a/0xc10 <4>[ 161.959773] security_file_alloc+0x3e/0x210 <4>[ 161.959794] init_file+0x92/0x2a0 <4>[ 161.959813] alloc_empty_file+0x72/0x170 <4>[ 161.959834] path_openat+0xef/0x3e30 <4>[ 161.959851] ? kasan_save_stack+0x4d/0x60 <4>[ 161.959869] ? kasan_save_stack+0x3d/0x60 <4>[ 161.959886] ? kasan_save_track+0x18/0x40 <4>[ 161.959906] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 161.959947] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 161.959971] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 161.959991] ? getname+0x7b/0xb0 <4>[ 161.960007] ? do_sys_openat2+0xfa/0x190 <4>[ 161.960025] ? __x64_sys_openat+0x12c/0x210 <4>[ 161.960045] ? do_syscall_64+0xb2/0x1d0 <4>[ 161.960061] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.960084] ? __pfx_path_openat+0x10/0x10 <4>[ 161.960110] do_filp_open+0x19c/0x3b0 <4>[ 161.960129] ? __pfx_do_filp_open+0x10/0x10 <4>[ 161.960166] do_sys_openat2+0x145/0x190 <4>[ 161.960185] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 161.960207] ? __pfx___seccomp_filter+0x10/0x10 <4>[ 161.960231] __x64_sys_openat+0x12c/0x210 <4>[ 161.960249] ? __fput+0x581/0xad0 <4>[ 161.960267] ? trace_preempt_on+0x20/0xc0 <4>[ 161.960284] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 161.960306] ? __secure_computing+0x183/0x2b0 <4>[ 161.960328] x64_sys_call+0x1e3e/0x2060 <4>[ 161.960347] do_syscall_64+0xb2/0x1d0 <4>[ 161.960365] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 161.960385] RIP: 0033:0x7f861beec11e <4>[ 161.960409] Code: 83 e2 40 75 4f 89 f0 f7 d0 a9 00 00 41 00 74 44 80 3d 55 02 0e 00 00 74 68 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8e 00 00 00 48 8b 54 24 28 64 48 2b 14 25 <4>[ 161.960427] RSP: 002b:00007fff1720f2b0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 161.960450] RAX: ffffffffffffffda RBX: 0000000000290000 RCX: 00007f861beec11e <4>[ 161.960463] RDX: 0000000000290000 RSI: 000055bda9d312ba RDI: 00000000ffffff9c <4>[ 161.960476] RBP: 000055bda9d312ba R08: 000000000000fef0 R09: 00007f861bfc4ac0 <4>[ 161.960489] R10: 0000000000000000 R11: 0000000000000202 R12: 000055bdc0b5ae11 <4>[ 161.960501] R13: 0000000000000001 R14: 000055bdc0b5ae10 R15: 000055bda9d312ba <4>[ 161.960522] <4>[ 161.960533] ---[ end trace 0000000000000000 ]--- <4>[ 162.163729] ------------[ cut here ]------------ <4>[ 162.164055] WARNING: CPU: 1 PID: 3377 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 162.164112] Modules linked in: <4>[ 162.164148] CPU: 1 UID: 0 PID: 3377 Comm: (ate-utmp) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 162.164183] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 162.164194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 162.164208] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 162.164237] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 162.164258] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 162.164277] RAX: 0000000080000000 RBX: ffff888105588660 RCX: ffff888154200000 <4>[ 162.164292] RDX: 0000000000178fe0 RSI: ffffffff88ebc501 RDI: ffff888154378fe0 <4>[ 162.164305] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 162.164319] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004156200 <4>[ 162.164331] R13: ffff888154378fe0 R14: 0000000000694401 R15: 0000000000039408 <4>[ 162.164345] FS: 00007f075482adc0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 162.164361] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 162.164377] CR2: 00007f07553c1080 CR3: 0000000105664000 CR4: 00000000000006f0 <4>[ 162.164402] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 162.164427] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 162.164440] Call Trace: <4>[ 162.164452] <4>[ 162.164466] ? show_regs+0x68/0x80 <4>[ 162.164493] ? __warn+0xd5/0x260 <4>[ 162.164510] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 162.164534] ? report_bug+0x278/0x2e0 <4>[ 162.164560] ? handle_bug+0x7b/0xa0 <4>[ 162.164579] ? exc_invalid_op+0x1c/0x50 <4>[ 162.164597] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 162.164757] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 162.164791] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 162.164815] ? rcu_core_si+0x12/0x20 <4>[ 162.164839] rcu_core+0x683/0x1c80 <4>[ 162.164865] ? __pfx_rcu_core+0x10/0x10 <4>[ 162.164887] ? lapic_next_event+0x19/0x30 <4>[ 162.164906] ? handle_softirqs+0x18e/0x720 <4>[ 162.164928] rcu_core_si+0x12/0x20 <4>[ 162.164947] handle_softirqs+0x20c/0x720 <4>[ 162.164978] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 162.164996] ? trace_preempt_on+0x20/0xc0 <4>[ 162.165016] ? irq_exit_rcu+0x20/0xd0 <4>[ 162.165035] irq_exit_rcu+0x9c/0xd0 <4>[ 162.165053] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 162.165076] <4>[ 162.165086] <4>[ 162.165096] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 162.165118] RIP: 0010:__kernel_text_address+0x0/0x50 <4>[ 162.165141] Code: 0e 2b 00 0f b6 c0 eb c4 48 c7 c7 c4 e0 f2 8d e8 56 ec 65 00 e9 21 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 8a fe ff ff <4>[ 162.165159] RSP: 0018:ffff888100cd74d8 EFLAGS: 00000246 <4>[ 162.165178] RAX: dffffc0000000000 RBX: ffff888100cd7500 RCX: ffff888100cd7528 <4>[ 162.165192] RDX: 1ffff1102019aeab RSI: 1ffff11020ad2f25 RDI: ffffffff88e423e2 <4>[ 162.165205] RBP: ffff888100cd74f0 R08: ffff888105696e40 R09: ffff888100cd7548 <4>[ 162.165217] R10: ffff888100cd7508 R11: 0000000000000005 R12: ffff888100cd7558 <4>[ 162.165230] R13: ffff888100cd75d0 R14: 0000000000000000 R15: ffff888105696e40 <4>[ 162.165249] ? exit_mmap+0x342/0x750 <4>[ 162.165273] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 162.165294] ? unwind_get_return_address+0x65/0xb0 <4>[ 162.165314] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 162.165334] arch_stack_walk+0xac/0x100 <4>[ 162.165355] ? exit_mmap+0x342/0x750 <4>[ 162.165377] stack_trace_save+0x97/0xd0 <4>[ 162.165395] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 162.165414] ? stack_depot_save_flags+0x2c/0x6d0 <4>[ 162.165437] ? kasan_save_stack+0x4d/0x60 <4>[ 162.165458] ? kasan_save_stack+0x3d/0x60 <4>[ 162.165479] kasan_save_stack+0x3d/0x60 <4>[ 162.165497] ? kasan_save_stack+0x3d/0x60 <4>[ 162.165514] ? kasan_save_track+0x18/0x40 <4>[ 162.165532] ? kasan_save_free_info+0x3f/0x60 <4>[ 162.165549] ? __kasan_slab_free+0x5e/0x80 <4>[ 162.165567] ? kmem_cache_free+0x23a/0x340 <4>[ 162.165588] ? __vm_area_free+0x4b/0x60 <4>[ 162.165680] ? remove_vma+0xe0/0x120 <4>[ 162.165729] kasan_save_track+0x18/0x40 <4>[ 162.165750] kasan_save_free_info+0x3f/0x60 <4>[ 162.165770] __kasan_slab_free+0x5e/0x80 <4>[ 162.165790] ? __vm_area_free+0x4b/0x60 <4>[ 162.165808] kmem_cache_free+0x23a/0x340 <4>[ 162.165831] __vm_area_free+0x4b/0x60 <4>[ 162.165849] remove_vma+0xe0/0x120 <4>[ 162.165869] exit_mmap+0x342/0x750 <4>[ 162.165890] ? __pfx_exit_mmap+0x10/0x10 <4>[ 162.165909] ? selinux_inode_permission+0x2d3/0x4c0 <4>[ 162.165946] __mmput+0xa3/0x320 <4>[ 162.165966] mmput+0x42/0x50 <4>[ 162.165983] begin_new_exec+0xf62/0x2a20 <4>[ 162.166008] load_elf_binary+0x660/0x4800 <4>[ 162.166030] ? __kernel_read+0x556/0xbc0 <4>[ 162.166050] ? __pfx___kernel_read+0x10/0x10 <4>[ 162.166068] ? trace_preempt_on+0x20/0xc0 <4>[ 162.166086] ? inode_security+0x48/0xe0 <4>[ 162.166110] ? __pfx_load_elf_binary+0x10/0x10 <4>[ 162.166131] ? load_misc_binary+0x6b7/0xb40 <4>[ 162.166151] ? trace_preempt_on+0x20/0xc0 <4>[ 162.166168] ? bprm_execve+0x60b/0x1520 <4>[ 162.166191] bprm_execve+0x62d/0x1520 <4>[ 162.166211] ? __pfx_get_arg_page+0x10/0x10 <4>[ 162.166234] ? __pfx_bprm_execve+0x10/0x10 <4>[ 162.166259] do_execveat_common.isra.0+0x3d4/0x550 <4>[ 162.166276] ? irqentry_exit_to_user_mode+0x48/0x150 <4>[ 162.166301] __x64_sys_execve+0x91/0xc0 <4>[ 162.166320] x64_sys_call+0x19a5/0x2060 <4>[ 162.166341] do_syscall_64+0xb2/0x1d0 <4>[ 162.166361] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 162.166381] RIP: 0033:0x7f0754ef1207 <4>[ 162.166425] Code: Unable to access opcode bytes at 0x7f0754ef11dd. <4>[ 162.166438] RSP: 002b:00007ffe33c266e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b <4>[ 162.166460] RAX: ffffffffffffffda RBX: 00007ffe33c26e70 RCX: 00007f0754ef1207 <4>[ 162.166474] RDX: 00005566dc10a840 RSI: 00005566dc10a960 RDI: 00005566dc10a980 <4>[ 162.166487] RBP: 00007ffe33c26a20 R08: 0000000000000000 R09: 0000000000000000 <4>[ 162.166499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 <4>[ 162.166511] R13: 0000000000000000 R14: 00007ffe33c26d60 R15: 00007ffe33c26a6c <4>[ 162.166532] <4>[ 162.166542] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-update-utmp.servi…[0mecord System Boot/Shutdown in UTMP. <6>[ 162.785346] journalctl (3376) used greatest stack depth: 24712 bytes left [[0;32m OK [0m] Finished [0;1;39msystemd-journal-catalog-u….service[0m - Rebuild Journal Catalog. Starting [0;1;39msystemd-update-done.service[0m - Update is Completed... <4>[ 163.205770] ------------[ cut here ]------------ <4>[ 163.206010] WARNING: CPU: 1 PID: 3372 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.206066] Modules linked in: <4>[ 163.206101] CPU: 1 UID: 0 PID: 3372 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 163.206136] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 163.206146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 163.206160] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.206187] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 163.206210] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 163.206230] RAX: 0000000080000000 RBX: ffff88810607e000 RCX: ffff888154200000 <4>[ 163.206245] RDX: 000000000018efe0 RSI: ffffffff88ebc501 RDI: ffff88815438efe0 <4>[ 163.206258] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 163.206272] R10: ffffffff8df3348f R11: ffff888100322448 R12: ffffea0004181f80 <4>[ 163.206285] R13: ffff88815438efe0 R14: 0000000000c1c401 R15: 0000000000039408 <4>[ 163.206298] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 163.206313] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 163.206327] CR2: 000055bda9daf0a0 CR3: 00000001082ec000 CR4: 00000000000006f0 <4>[ 163.206339] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 163.206352] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 163.206365] Call Trace: <4>[ 163.206378] <4>[ 163.206390] ? show_regs+0x68/0x80 <4>[ 163.206415] ? __warn+0xd5/0x260 <4>[ 163.206432] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.206455] ? report_bug+0x278/0x2e0 <4>[ 163.206481] ? handle_bug+0x7b/0xa0 <4>[ 163.206500] ? exc_invalid_op+0x1c/0x50 <4>[ 163.206518] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 163.206544] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 163.206566] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.206587] ? rcu_core_si+0x12/0x20 <4>[ 163.206611] rcu_core+0x683/0x1c80 <4>[ 163.206766] ? __pfx_sched_balance_domains+0x10/0x10 <4>[ 163.206800] ? __pfx_rcu_core+0x10/0x10 <4>[ 163.206826] rcu_core_si+0x12/0x20 <4>[ 163.206845] handle_softirqs+0x20c/0x720 <4>[ 163.206879] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 163.206902] irq_exit_rcu+0x9c/0xd0 <4>[ 163.206932] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 163.206955] <4>[ 163.206965] <4>[ 163.206975] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 163.206997] RIP: 0010:mas_alloc_cyclic+0x8f1/0x1c30 <4>[ 163.207019] Code: 84 c0 0f 84 4b f9 ff ff 48 8d 53 3d 48 89 d0 48 89 d1 48 c1 e8 03 83 e1 07 42 0f b6 04 20 38 c8 7f 08 84 c0 0f 85 f1 09 00 00 <0f> b6 43 3d 4d 8b 7e 88 49 83 7e b8 00 41 88 46 94 4d 89 7e a0 0f <4>[ 163.207038] RSP: 0018:ffff88810119f9f8 EFLAGS: 00000246 <4>[ 163.207057] RAX: 0000000000000000 RBX: ffff88810119fbb8 RCX: 0000000000000005 <4>[ 163.207070] RDX: ffff88810119fbf5 RSI: ffff88810006c208 RDI: ffff88810119fbf5 <4>[ 163.207083] RBP: ffff88810119fb70 R08: ffff888104a91f00 R09: ffffed1020233f58 <4>[ 163.207096] R10: ffff88810119fbb8 R11: 1ffff11020233f5a R12: dffffc0000000000 <4>[ 163.207108] R13: ffff88810119fab8 R14: ffff88810119fb48 R15: 0000000000000000 <4>[ 163.207129] ? mas_alloc_cyclic+0x8c7/0x1c30 <4>[ 163.207156] ? __pfx_mas_alloc_cyclic+0x10/0x10 <4>[ 163.207180] ? __pfx__raw_spin_lock+0x10/0x10 <4>[ 163.207200] ? __kasan_slab_free+0x69/0x80 <4>[ 163.207224] mtree_alloc_cyclic+0x11a/0x1c0 <4>[ 163.207245] ? __pfx_mtree_alloc_cyclic+0x10/0x10 <4>[ 163.207271] simple_offset_add+0xc3/0x140 <4>[ 163.207293] ? __pfx_simple_offset_add+0x10/0x10 <4>[ 163.207313] ? __shmem_get_inode+0x7e6/0xbf0 <4>[ 163.207336] shmem_symlink+0x178/0x580 <4>[ 163.207357] ? __pfx_shmem_symlink+0x10/0x10 <4>[ 163.207377] ? selinux_inode_symlink+0x17/0x20 <4>[ 163.207402] vfs_symlink+0x34c/0x5c0 <4>[ 163.207426] do_symlinkat+0x13f/0x2c0 <4>[ 163.207443] ? strncpy_from_user+0x4c/0x220 <4>[ 163.207467] ? __pfx_do_symlinkat+0x10/0x10 <4>[ 163.207484] ? __kasan_check_write+0x18/0x20 <4>[ 163.207508] __x64_sys_symlinkat+0x99/0xc0 <4>[ 163.207528] x64_sys_call+0x5cc/0x2060 <4>[ 163.207547] do_syscall_64+0xb2/0x1d0 <4>[ 163.207566] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 163.207585] RIP: 0033:0x7f861beecf67 <4>[ 163.207608] Code: 77 01 c3 48 8b 15 b9 6e 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 89 6e 0d 00 f7 d8 64 89 01 48 <4>[ 163.207685] RSP: 002b:00007fff1720f348 EFLAGS: 00000246 ORIG_RAX: 000000000000010a <4>[ 163.207713] RAX: ffffffffffffffda RBX: 000055bdc0b9b4c0 RCX: 00007f861beecf67 <4>[ 163.207726] RDX: 000055bdc0b9a990 RSI: 00000000ffffff9c RDI: 000055bdc0b9b030 <4>[ 163.207739] RBP: 000055bdc0b9a1b0 R08: 0000000000000004 R09: 0000000000000003 <4>[ 163.207751] R10: 0000000000000007 R11: 0000000000000246 R12: 000055bdc0b9b030 <4>[ 163.207762] R13: 000055bdc0b9b865 R14: 0000000000000000 R15: 0000000000000000 <4>[ 163.207784] <4>[ 163.207794] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-update-done.service[0m - Update is Completed. [[0;32m OK [0m] Reached target [0;1;39msysinit.target[0m - System Initialization. [[0;32m OK [0m] Started [0;1;39mapt-daily.timer[0m - Daily apt download activities. [[0;32m OK [0m] Started [0;1;39mapt-daily-upgrade.timer[0m - …y apt upgrade and clean activities. [[0;32m OK [0m] Started [0;1;39mdpkg-db-backup.timer[0m - Daily dpkg database backup timer. [[0;32m OK [0m] Started [0;1;39me2scrub_all.timer[0m - Period…Metadata Check for All Filesystems. <4>[ 163.412759] ------------[ cut here ]------------ <4>[ 163.413019] WARNING: CPU: 1 PID: 3365 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.413076] Modules linked in: <4>[ 163.413111] CPU: 1 UID: 0 PID: 3365 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 163.413146] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 163.413157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 163.413172] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.413199] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 163.413220] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 163.413239] RAX: 0000000080000000 RBX: ffff888104febdc0 RCX: ffff888154200000 <4>[ 163.413253] RDX: 0000000000192000 RSI: ffffffff88ebc501 RDI: ffff888154392000 <4>[ 163.413266] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 163.413279] R10: 0000000029f6378d R11: 00000000000ee353 R12: ffffea000413fac0 <4>[ 163.413292] R13: ffff888154392000 R14: 0000000000c88501 R15: 0000000000039408 <4>[ 163.413307] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 163.413337] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 163.413351] CR2: 00007fd5fb774238 CR3: 0000000104478000 CR4: 00000000000006f0 <4>[ 163.413364] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 163.413377] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 163.413392] Call Trace: <4>[ 163.413413] <4>[ 163.413427] ? show_regs+0x68/0x80 <4>[ 163.413453] ? __warn+0xd5/0x260 <4>[ 163.413471] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.413494] ? report_bug+0x278/0x2e0 <4>[ 163.413519] ? handle_bug+0x7b/0xa0 <4>[ 163.413537] ? exc_invalid_op+0x1c/0x50 <4>[ 163.413555] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 163.413581] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 163.413603] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.413737] ? rcu_core_si+0x12/0x20 <4>[ 163.413772] rcu_core+0x683/0x1c80 <4>[ 163.413798] ? __pfx_rcu_core+0x10/0x10 <4>[ 163.413821] ? lapic_next_event+0x19/0x30 <4>[ 163.413841] ? handle_softirqs+0x18e/0x720 <4>[ 163.413864] rcu_core_si+0x12/0x20 <4>[ 163.413883] handle_softirqs+0x20c/0x720 <4>[ 163.413904] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 163.413924] ? trace_preempt_on+0x20/0xc0 <4>[ 163.413943] ? irq_exit_rcu+0x20/0xd0 <4>[ 163.413963] irq_exit_rcu+0x9c/0xd0 <4>[ 163.413981] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 163.414003] <4>[ 163.414014] <4>[ 163.414024] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 163.414045] RIP: 0010:d_set_d_op+0x2a3/0x410 <4>[ 163.414067] Code: 48 83 7e 60 00 74 23 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 0f b6 04 02 84 c0 74 04 3c 03 7e 3c 81 0b 00 00 00 04 <48> 83 c4 08 5b 41 5d 41 5e 5d c3 cc cc cc cc 90 0f 0b 90 e9 88 fd <4>[ 163.414085] RSP: 0018:ffff8881078e79f8 EFLAGS: 00000246 <4>[ 163.414103] RAX: dffffc0000000000 RBX: ffff8881049e0f00 RCX: ffff88810396d840 <4>[ 163.414117] RDX: 1ffffffff18aee1c RSI: ffffffff8c577080 RDI: ffffffff8c5770e0 <4>[ 163.414130] RBP: ffff8881078e7a18 R08: 0000000000000000 R09: 0000000000000000 <4>[ 163.414143] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888100d57000 <4>[ 163.414155] R13: 0000000010000000 R14: ffff8881049e0f60 R15: ffff8881049e0f00 <4>[ 163.414178] ? selinux_inode_create+0x17/0x20 <4>[ 163.414205] simple_lookup+0xc7/0xf0 <4>[ 163.414226] ? __pfx_simple_lookup+0x10/0x10 <4>[ 163.414246] path_openat+0x1575/0x3e30 <4>[ 163.414266] ? vfs_iocb_iter_read+0x240/0x4c0 <4>[ 163.414289] ? __pfx_path_openat+0x10/0x10 <4>[ 163.414325] do_filp_open+0x19c/0x3b0 <4>[ 163.414354] ? __pfx_do_filp_open+0x10/0x10 <4>[ 163.414391] do_sys_openat2+0x145/0x190 <4>[ 163.414423] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 163.414446] ? __pfx___seccomp_filter+0x10/0x10 <4>[ 163.414471] __x64_sys_openat+0x12c/0x210 <4>[ 163.414490] ? __fput+0x581/0xad0 <4>[ 163.414518] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 163.414542] ? __secure_computing+0x183/0x2b0 <4>[ 163.414565] x64_sys_call+0x1e3e/0x2060 <4>[ 163.414588] do_syscall_64+0xb2/0x1d0 <4>[ 163.414607] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 163.414689] RIP: 0033:0x7f861beec28c <4>[ 163.414718] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 163.414735] RSP: 002b:00007fff1720f3a0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 163.414756] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f861beec28c <4>[ 163.414769] RDX: 00000000000801c2 RSI: 000055bdc0b94240 RDI: 00000000ffffff9c <4>[ 163.414781] RBP: 00007fff1720f488 R08: 0000000000000006 R09: 0000000000000005 <4>[ 163.414792] R10: 0000000000000180 R11: 0000000000000202 R12: 00007fff1720f480 <4>[ 163.414804] R13: 00007fff1720f560 R14: 000055bdc0b94240 R15: 00007fff1720f550 <4>[ 163.414826] <4>[ 163.414837] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Started [0;1;39mfstrim.timer[0m - Discard unused filesystem blocks once a week. [[0;32m OK [0m] Started [0;1;39mlogrotate.timer[0m - Daily rotation of log files. [[0;32m OK [0m] Started [0;1;39msystemd-tmpfiles-clean.tim…[0my Cleanup of Temporary Directories. [[0;32m OK [0m] Reached target [0;1;39mtimers.target[0m - Timer Units. [[0;32m OK [0m] Listening on [0;1;39mdbus.socket[0m - D-Bus System Message Bus Socket. [[0;32m OK [0m] Listening on [0;1;39msystemd-hostnamed.socket[0m - Hostname Service Socket. [[0;32m OK [0m] Reached target [0;1;39msockets.target[0m - Socket Units. [[0;32m OK [0m] Reached target [0;1;39mbasic.target[0m - Basic System. [[0;32m OK [0m] Started [0;1;39mcron.service[0m - Regular background program processing daemon. Starting [0;1;39mdbus.service[0m - D-Bus System Message Bus... Starting [0;1;39me2scrub_reap.service[0m - Re…ne ext4 Metadata Check Snapshots... <4>[ 163.827759] ------------[ cut here ]------------ <4>[ 163.828005] WARNING: CPU: 1 PID: 3383 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.828060] Modules linked in: <4>[ 163.828095] CPU: 1 UID: 0 PID: 3383 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 163.828130] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 163.828140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 163.828154] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.828181] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 163.828202] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 163.828221] RAX: 0000000080000000 RBX: ffff8881050e9b40 RCX: ffff888154200000 <4>[ 163.828234] RDX: 000000000019cfe0 RSI: ffffffff88ebc501 RDI: ffff88815439cfe0 <4>[ 163.828247] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 163.828260] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004143a40 <4>[ 163.828273] R13: ffff88815439cfe0 R14: 00000000002b8501 R15: 0000000000039408 <4>[ 163.828285] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 163.828300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 163.828312] CR2: 00007fd5faf0d008 CR3: 0000000105dae000 CR4: 00000000000006f0 <4>[ 163.828325] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 163.828338] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 163.828350] Call Trace: <4>[ 163.828366] <4>[ 163.828389] ? show_regs+0x68/0x80 <4>[ 163.828429] ? __warn+0xd5/0x260 <4>[ 163.828448] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.828469] ? report_bug+0x278/0x2e0 <4>[ 163.828501] ? handle_bug+0x7b/0xa0 <4>[ 163.828521] ? exc_invalid_op+0x1c/0x50 <4>[ 163.828538] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 163.828563] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 163.828585] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 163.828606] ? rcu_core_si+0x12/0x20 <4>[ 163.828751] rcu_core+0x683/0x1c80 <4>[ 163.828786] ? __pfx_rcu_core+0x10/0x10 <4>[ 163.828816] ? lapic_next_event+0x19/0x30 <4>[ 163.828837] ? handle_softirqs+0x18e/0x720 <4>[ 163.828859] rcu_core_si+0x12/0x20 <4>[ 163.828879] handle_softirqs+0x20c/0x720 <4>[ 163.828901] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 163.828921] ? trace_preempt_on+0x20/0xc0 <4>[ 163.828940] ? irq_exit_rcu+0x20/0xd0 <4>[ 163.828959] irq_exit_rcu+0x9c/0xd0 <4>[ 163.828977] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 163.829000] <4>[ 163.829010] <4>[ 163.829020] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 163.829042] RIP: 0010:vfs_fstat+0x56/0xa0 <4>[ 163.829064] Code: 76 60 4d 8d bd 98 00 00 00 49 89 c4 4c 89 ff e8 a0 dd 65 00 85 c0 75 12 31 c9 ba ff 07 00 00 4c 89 f6 4c 89 ff e8 9a d1 ff ff <41> 83 e4 01 75 12 48 83 c4 08 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc <4>[ 163.829081] RSP: 0018:ffff8881060c7d18 EFLAGS: 00000282 <4>[ 163.829100] RAX: 0000000000000000 RBX: 000000000000001d RCX: 1ffff1102013d4b4 <4>[ 163.829112] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881009ea5a0 <4>[ 163.829124] RBP: ffff8881060c7d40 R08: 0000000000000000 R09: ffffffff8d743000 <4>[ 163.829137] R10: ffff8881060c7da4 R11: 0000000000000000 R12: ffff888106207000 <4>[ 163.829148] R13: ffff888106207000 R14: ffff8881060c7da0 R15: ffff888106207098 <4>[ 163.829172] ? vfs_fstat+0x56/0xa0 <4>[ 163.829191] ? kmem_cache_free+0x23a/0x340 <4>[ 163.829211] vfs_fstatat+0xa3/0xc0 <4>[ 163.829230] __do_sys_newfstatat+0x9f/0x100 <4>[ 163.829251] ? __pfx___do_sys_newfstatat+0x10/0x10 <4>[ 163.829279] ? __x64_sys_openat+0x12c/0x210 <4>[ 163.829300] ? __fput+0x581/0xad0 <4>[ 163.829316] ? trace_preempt_on+0x20/0xc0 <4>[ 163.829339] __x64_sys_newfstatat+0x9a/0x100 <4>[ 163.829360] ? syscall_trace_enter+0x9c/0x1b0 <4>[ 163.829377] ? trace_hardirqs_on+0x37/0xe0 <4>[ 163.829394] x64_sys_call+0x1fd5/0x2060 <4>[ 163.829414] do_syscall_64+0xb2/0x1d0 <4>[ 163.829433] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 163.829453] RIP: 0033:0x7f861bee8d1a <4>[ 163.829475] Code: 48 8b 05 09 b1 0d 00 64 c7 00 09 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 d1 b0 0d 00 f7 <4>[ 163.829491] RSP: 002b:00007fff1720f388 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 <4>[ 163.829511] RAX: ffffffffffffffda RBX: 0000000000200000 RCX: 00007f861bee8d1a <4>[ 163.829525] RDX: 00007fff1720f3b0 RSI: 00007f861bf85bd5 RDI: 000000000000001d <4>[ 163.829537] RBP: 000055bdc0ba6d20 R08: 0000000000000000 R09: 0000000000000000 <4>[ 163.829548] R10: 0000000000001000 R11: 0000000000000206 R12: 0000000000280000 <4>[ 163.829560] R13: 000000000000001d R14: 00007fff1720f3b0 R15: 000055bdc0b95b20 <4>[ 163.829580] <4>[ 163.829591] ---[ end trace 0000000000000000 ]--- Starting [0;1;39msystemd-logind.service[0m - User Login Management... <4>[ 164.036784] ------------[ cut here ]------------ <4>[ 164.037051] WARNING: CPU: 1 PID: 3388 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.037108] Modules linked in: <4>[ 164.037144] CPU: 1 UID: 0 PID: 3388 Comm: systemd-sysctl Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 164.037181] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 164.037191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 164.037206] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.037232] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 164.037252] RSP: 0000:ffff88810605fcf0 EFLAGS: 00000202 <4>[ 164.037271] RAX: 0000000080000000 RBX: ffff8881022768c0 RCX: ffff888154200000 <4>[ 164.037285] RDX: 00000000001a2000 RSI: ffffffff88ebc501 RDI: ffff8881543a2000 <4>[ 164.037298] RBP: ffff88810605fd30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 164.037310] R10: ffffffff8df3348f R11: 00000000000cd800 R12: ffffea0004089d80 <4>[ 164.037325] R13: ffff8881543a2000 R14: 0000000000630501 R15: 0000000000039408 <4>[ 164.037351] FS: 00007fd5fa85a940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 164.037379] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 164.037393] CR2: 00007fd5fb7d0000 CR3: 000000010006e000 CR4: 00000000000006f0 <4>[ 164.037406] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 164.037419] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 164.037432] Call Trace: <4>[ 164.037447] <4>[ 164.037465] ? show_regs+0x68/0x80 <4>[ 164.037491] ? __warn+0xd5/0x260 <4>[ 164.037510] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.037532] ? report_bug+0x278/0x2e0 <4>[ 164.037559] ? handle_bug+0x7b/0xa0 <4>[ 164.037578] ? exc_invalid_op+0x1c/0x50 <4>[ 164.037596] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 164.037621] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 164.037812] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.037899] ? rcu_core_si+0x12/0x20 <4>[ 164.037927] rcu_core+0x683/0x1c80 <4>[ 164.037953] ? __pfx_rcu_core+0x10/0x10 <4>[ 164.037976] ? lapic_next_event+0x19/0x30 <4>[ 164.037996] ? handle_softirqs+0x18e/0x720 <4>[ 164.038018] rcu_core_si+0x12/0x20 <4>[ 164.038037] handle_softirqs+0x20c/0x720 <4>[ 164.038059] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 164.038078] ? trace_preempt_on+0x20/0xc0 <4>[ 164.038096] ? irq_exit_rcu+0x20/0xd0 <4>[ 164.038117] irq_exit_rcu+0x9c/0xd0 <4>[ 164.038134] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 164.038157] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 164.038178] RIP: 0033:0x7fd5fb7f3601 <4>[ 164.038206] Code: 51 55 53 50 44 8b 84 24 10 01 00 00 8b 8c 24 00 01 00 00 48 8b 94 24 f8 00 00 00 48 8b 74 24 40 48 8b 7c 24 38 e8 6f fa ff ff <48> 83 c4 30 48 85 c0 0f 85 c7 07 00 00 41 8b 06 eb 85 0f 1f 44 00 <4>[ 164.038228] RSP: 002b:00007ffdf10b7160 EFLAGS: 00000246 <4>[ 164.038258] RAX: 00007fd5fb032428 RBX: 00007fd5fb035c68 RCX: 0000000000000000 <4>[ 164.038273] RDX: 0000000000000007 RSI: 00007fd5fb777680 RDI: 00007fd5fb03dc8d <4>[ 164.038286] RBP: 00007fd5fb7e27a0 R08: 0000000000000000 R09: 000000000000000d <4>[ 164.038298] R10: fffffffffffffc9d R11: 00007fd5fb7e3210 R12: 00000000f07985d2 <4>[ 164.038311] R13: 00007fd5fb023ba8 R14: 00007fd5fb023248 R15: 00007ffdf10b7204 <4>[ 164.038335] <4>[ 164.038346] ---[ end trace 0000000000000000 ]--- Starting [0;1;39msystemd-user-sessions.service[0m - Permit User Sessions... [[0;32m OK [0m] Found device [0;1;39mdev-ttyS0.device[0m - /dev/ttyS0. <4>[ 164.557727] ------------[ cut here ]------------ <4>[ 164.557961] WARNING: CPU: 1 PID: 3388 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.558017] Modules linked in: <4>[ 164.558051] CPU: 1 UID: 0 PID: 3388 Comm: systemd-sysctl Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 164.558086] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 164.558097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 164.558111] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.558138] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 164.558159] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 164.558178] RAX: 0000000080000000 RBX: ffff888105579b40 RCX: ffff888154200000 <4>[ 164.558192] RDX: 00000000001b0fe0 RSI: ffffffff88ebc501 RDI: ffff8881543b0fe0 <4>[ 164.558205] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 164.558218] R10: ffffffff8df3348f R11: 00000000000af800 R12: ffffea0004155e40 <4>[ 164.558231] R13: ffff8881543b0fe0 R14: 0000000000630501 R15: 0000000000039408 <4>[ 164.558244] FS: 00007fd5fa85a940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 164.558260] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 164.558273] CR2: 00007fd5fb4402c0 CR3: 000000010006e000 CR4: 00000000000006f0 <4>[ 164.558286] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 164.558299] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 164.558323] Call Trace: <4>[ 164.558350] <4>[ 164.558367] ? show_regs+0x68/0x80 <4>[ 164.558394] ? __warn+0xd5/0x260 <4>[ 164.558424] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.558448] ? report_bug+0x278/0x2e0 <4>[ 164.558474] ? handle_bug+0x7b/0xa0 <4>[ 164.558500] ? exc_invalid_op+0x1c/0x50 <4>[ 164.558521] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 164.558547] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 164.558600] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 164.558753] ? rcu_core_si+0x12/0x20 <4>[ 164.558829] rcu_core+0x683/0x1c80 <4>[ 164.558865] ? __pfx_rcu_core+0x10/0x10 <4>[ 164.558893] ? lapic_next_event+0x19/0x30 <4>[ 164.558915] ? handle_softirqs+0x18e/0x720 <4>[ 164.558937] rcu_core_si+0x12/0x20 <4>[ 164.558957] handle_softirqs+0x20c/0x720 <4>[ 164.558978] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 164.559001] irq_exit_rcu+0x9c/0xd0 <4>[ 164.559021] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 164.559045] <4>[ 164.559056] <4>[ 164.559067] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 164.559089] RIP: 0010:_raw_spin_lock_irqsave+0x0/0x110 <4>[ 164.559118] Code: e8 e5 8d b9 fc eb 88 48 89 df 41 89 45 c0 e8 87 10 00 00 eb b6 e8 90 f0 fd ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 <4>[ 164.559140] RSP: 0000:ffff88810605faf8 EFLAGS: 00000202 <4>[ 164.559169] RAX: 0000000000000018 RBX: ffff8881037488f0 RCX: 0000000000000028 <4>[ 164.559184] RDX: 0000000000000020 RSI: 0000000000000010 RDI: ffff8881037488f0 <4>[ 164.559197] RBP: ffff88810605fb40 R08: ffff888100e09c40 R09: fffff94000849786 <4>[ 164.559210] R10: ffffea000424bc37 R11: ffff88810605fda8 R12: 0000000000000010 <4>[ 164.559222] R13: ffff888103748910 R14: 0000000000000018 R15: 0000000000000018 <4>[ 164.559244] ? set_pte_range+0x1a5/0x3e0 <4>[ 164.559267] ? percpu_counter_add_batch+0x8a/0x1b0 <4>[ 164.559295] filemap_map_pages+0xad0/0x1060 <4>[ 164.559340] ? __pfx_filemap_map_pages+0x10/0x10 <4>[ 164.559365] ? __pfx_pte_offset_map_nolock+0x10/0x10 <4>[ 164.559397] __handle_mm_fault+0x21a5/0x3170 <4>[ 164.559421] ? down_read_trylock+0x16b/0x200 <4>[ 164.559444] ? preempt_count_sub+0x50/0x80 <4>[ 164.559468] ? __pfx___handle_mm_fault+0x10/0x10 <4>[ 164.559492] ? __pfx_lock_vma_under_rcu+0x10/0x10 <4>[ 164.559517] handle_mm_fault+0x258/0x4c0 <4>[ 164.559536] ? exc_page_fault+0x6a/0xf0 <4>[ 164.559559] do_user_addr_fault+0x23e/0x930 <4>[ 164.559581] exc_page_fault+0x6a/0xf0 <4>[ 164.559602] asm_exc_page_fault+0x2b/0x30 <4>[ 164.559728] RIP: 0033:0x7fd5fb4402c0 <4>[ 164.559759] Code: 2b 14 25 28 00 00 00 75 0e 48 81 c4 c8 00 00 00 5b 5d 41 5c 41 5d c3 e8 8e 90 e4 ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 0f 1e fa 41 54 55 53 48 85 ff 74 37 48 89 f5 48 85 f6 74 4e 48 <4>[ 164.559778] RSP: 002b:00007ffdf10b7598 EFLAGS: 00000216 <4>[ 164.559798] RAX: 000000000000006e RBX: 00007ffdf10b8e0b RCX: 0000000000000000 <4>[ 164.559811] RDX: 00007ffdf10b7630 RSI: 00007fd5fb4fe90c RDI: 00007ffdf10b8e0b <4>[ 164.559824] RBP: 00007fd5fb4fe90c R08: 000000000000ffff R09: 00007fd5fb1f8820 <4>[ 164.559837] R10: 00007fd5fb192790 R11: 0000000000000000 R12: 00007ffdf10b7628 <4>[ 164.559849] R13: 0000000000000001 R14: 00007ffdf10b7630 R15: 00007fd5fb1f8801 <4>[ 164.559872] <4>[ 164.559883] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Started [0;1;39mdbus.service[0m - D-Bus System Message Bus. [[0;32m OK [0m] Finished [0;1;39msystemd-user-sessions.service[0m - Permit User Sessions. <4>[ 165.597741] ------------[ cut here ]------------ <4>[ 165.597979] WARNING: CPU: 0 PID: 3396 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.598038] Modules linked in: <4>[ 165.598073] CPU: 0 UID: 0 PID: 3396 Comm: (d-logind) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 165.598111] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 165.598122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 165.598137] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.598166] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 165.598189] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 165.598211] RAX: 0000000080000000 RBX: ffff8881020178c0 RCX: ffff888154200000 <4>[ 165.598226] RDX: 00000000001d4fe0 RSI: ffffffff88ebc501 RDI: ffff8881543d4fe0 <4>[ 165.598239] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 165.598252] R10: ffffffff8df3348f R11: 00000000000000f6 R12: ffffea00040805c0 <4>[ 165.598265] R13: ffff8881543d4fe0 R14: 0000000000630501 R15: 0000000000039408 <4>[ 165.598278] FS: 00007fdb66a2cdc0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 165.598294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 165.598307] CR2: 000055bdc0b9cc08 CR3: 00000001010f4000 CR4: 00000000000006f0 <4>[ 165.598320] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 165.598333] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 165.598347] Call Trace: <4>[ 165.598359] <4>[ 165.598372] ? show_regs+0x68/0x80 <4>[ 165.598400] ? __warn+0xd5/0x260 <4>[ 165.598419] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.598442] ? report_bug+0x278/0x2e0 <4>[ 165.598471] ? handle_bug+0x7b/0xa0 <4>[ 165.598491] ? exc_invalid_op+0x1c/0x50 <4>[ 165.598511] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 165.598538] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 165.598562] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.598586] ? rcu_core_si+0x12/0x20 <4>[ 165.598611] rcu_core+0x683/0x1c80 <4>[ 165.598743] ? __pfx_rcu_core+0x10/0x10 <4>[ 165.598778] ? lapic_next_event+0x19/0x30 <4>[ 165.598800] ? handle_softirqs+0x18e/0x720 <4>[ 165.598824] rcu_core_si+0x12/0x20 <4>[ 165.598843] handle_softirqs+0x20c/0x720 <4>[ 165.598874] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 165.598895] ? trace_preempt_on+0x20/0xc0 <4>[ 165.598923] ? irq_exit_rcu+0x20/0xd0 <4>[ 165.598945] irq_exit_rcu+0x9c/0xd0 <4>[ 165.598965] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 165.598989] <4>[ 165.599000] <4>[ 165.599011] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 165.599033] RIP: 0010:obj_cgroup_charge+0x6d/0x560 <4>[ 165.599058] Code: 03 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 75 04 00 00 49 8b 45 10 49 39 c4 0f 84 4c 01 00 00 <49> 89 df 81 e3 ff 0f 00 00 49 c1 ef 0c 83 fb 01 44 89 f8 83 d8 ff <4>[ 165.599078] RSP: 0018:ffff888106e978f0 EFLAGS: 00000296 <4>[ 165.599097] RAX: 0000000000000000 RBX: 0000000000000148 RCX: 1ffffffff1be68c2 <4>[ 165.599112] RDX: 1ffff1102a946d78 RSI: ffffffff88f9cf50 RDI: ffffffff88f9c9e0 <4>[ 165.599125] RBP: ffff888106e97938 R08: ffff888106e979d0 R09: 0000000000000000 <4>[ 165.599138] R10: ffff888103ce3780 R11: ffff88810717fb04 R12: ffff888107a05d80 <4>[ 165.599151] R13: ffff888154a36ba0 R14: 0000000000000dc0 R15: 0000000000000000 <4>[ 165.599170] ? __memcg_slab_post_alloc_hook+0x210/0xc10 <4>[ 165.599194] ? obj_cgroup_charge+0x240/0x560 <4>[ 165.599220] __memcg_slab_post_alloc_hook+0x210/0xc10 <4>[ 165.599252] kmem_cache_alloc_noprof+0x31c/0x340 <4>[ 165.599278] alloc_empty_file+0x58/0x170 <4>[ 165.599299] path_openat+0xef/0x3e30 <4>[ 165.599319] ? kasan_save_stack+0x4d/0x60 <4>[ 165.599340] ? kasan_save_stack+0x3d/0x60 <4>[ 165.599358] ? kasan_save_track+0x18/0x40 <4>[ 165.599377] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 165.599397] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 165.599416] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 165.599437] ? getname+0x7b/0xb0 <4>[ 165.599452] ? do_sys_openat2+0xfa/0x190 <4>[ 165.599472] ? __x64_sys_openat+0x12c/0x210 <4>[ 165.599491] ? do_syscall_64+0xb2/0x1d0 <4>[ 165.599510] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 165.599534] ? __pfx_path_openat+0x10/0x10 <4>[ 165.599561] do_filp_open+0x19c/0x3b0 <4>[ 165.599584] ? __pfx_do_filp_open+0x10/0x10 <4>[ 165.599672] do_sys_openat2+0x145/0x190 <4>[ 165.599704] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 165.599731] ? call_rcu+0x12/0x20 <4>[ 165.599751] ? kmem_cache_free+0x143/0x340 <4>[ 165.599776] __x64_sys_openat+0x12c/0x210 <4>[ 165.599795] ? __fput+0x581/0xad0 <4>[ 165.599813] ? trace_preempt_on+0x20/0xc0 <4>[ 165.599831] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 165.599852] ? do_syscall_64+0xbf/0x1d0 <4>[ 165.599873] ? do_syscall_64+0x7e/0x1d0 <4>[ 165.599890] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 165.599913] x64_sys_call+0x1e3e/0x2060 <4>[ 165.599935] do_syscall_64+0xb2/0x1d0 <4>[ 165.599957] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 165.599978] RIP: 0033:0x7fdb6671911e <4>[ 165.600002] Code: 83 e2 40 75 4f 89 f0 f7 d0 a9 00 00 41 00 74 44 80 3d 55 02 0e 00 00 74 68 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8e 00 00 00 48 8b 54 24 28 64 48 2b 14 25 <4>[ 165.600020] RSP: 002b:00007ffcc1c642e0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 165.600042] RAX: ffffffffffffffda RBX: 00000000002a0000 RCX: 00007fdb6671911e <4>[ 165.600056] RDX: 00000000002a0000 RSI: 000055c149b5fd90 RDI: 00000000ffffff9c <4>[ 165.600068] RBP: 000055c149b5fd90 R08: 0000000000000000 R09: 0000000000000000 <4>[ 165.600080] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 <4>[ 165.600092] R13: 0000000000005000 R14: 0000000000000000 R15: 0000000000000007 <4>[ 165.600113] <4>[ 165.600125] ---[ end trace 0000000000000000 ]--- <4>[ 165.699772] ------------[ cut here ]------------ <4>[ 165.700032] WARNING: CPU: 0 PID: 3396 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.700089] Modules linked in: <4>[ 165.700126] CPU: 0 UID: 0 PID: 3396 Comm: (d-logind) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 165.700163] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 165.700175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 165.700189] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.700219] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 165.700241] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 165.700262] RAX: 0000000080000000 RBX: ffff8881011e9c80 RCX: ffff888154200000 <4>[ 165.700277] RDX: 00000000001d8fe0 RSI: ffffffff88ebc501 RDI: ffff8881543d8fe0 <4>[ 165.700291] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 165.700303] R10: 0000000029f6378d R11: 0000000000000005 R12: ffffea0004047a40 <4>[ 165.700316] R13: ffff8881543d8fe0 R14: 0000000000630501 R15: 0000000000039408 <4>[ 165.700330] FS: 00007fdb66a2cdc0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 165.700345] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 165.700357] CR2: 00007fff17205ff8 CR3: 00000001010f4000 CR4: 00000000000006f0 <4>[ 165.700369] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 165.700382] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 165.700395] Call Trace: <4>[ 165.700406] <4>[ 165.700421] ? show_regs+0x68/0x80 <4>[ 165.700454] ? __warn+0xd5/0x260 <4>[ 165.700476] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.700498] ? report_bug+0x278/0x2e0 <4>[ 165.700527] ? handle_bug+0x7b/0xa0 <4>[ 165.700547] ? exc_invalid_op+0x1c/0x50 <4>[ 165.700567] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 165.700594] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 165.700692] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 165.700725] ? rcu_core_si+0x12/0x20 <4>[ 165.700752] rcu_core+0x683/0x1c80 <4>[ 165.700779] ? __pfx_rcu_core+0x10/0x10 <4>[ 165.700803] ? lapic_next_event+0x19/0x30 <4>[ 165.700824] ? handle_softirqs+0x18e/0x720 <4>[ 165.700847] rcu_core_si+0x12/0x20 <4>[ 165.700867] handle_softirqs+0x20c/0x720 <4>[ 165.700890] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 165.700909] ? trace_preempt_on+0x20/0xc0 <4>[ 165.700930] ? irq_exit_rcu+0x20/0xd0 <4>[ 165.700951] irq_exit_rcu+0x9c/0xd0 <4>[ 165.700971] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 165.701006] <4>[ 165.701017] <4>[ 165.701027] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 165.701049] RIP: 0010:stack_trace_consume_entry+0xe7/0x180 <4>[ 165.701082] Code: a0 00 00 00 41 8d 44 24 01 89 43 10 48 8b 03 4e 8d 24 e0 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 75 68 <49> 89 34 24 8b 43 08 39 43 10 0f 92 c0 48 83 c4 08 5b 41 5c 5d c3 <4>[ 165.701100] RSP: 0018:ffff888106e976f8 EFLAGS: 00000246 <4>[ 165.701120] RAX: dffffc0000000000 RBX: ffff888106e977f0 RCX: ffff888106e97748 <4>[ 165.701134] RDX: 1ffff11020dd2f13 RSI: ffffffff88fff181 RDI: ffff888106e977fc <4>[ 165.701147] RBP: ffff888106e97710 R08: ffff888103630fc0 R09: ffff888106e97768 <4>[ 165.701159] R10: ffff888106e97728 R11: ffff8881007f6c00 R12: ffff888106e97898 <4>[ 165.701172] R13: ffff888106e977f0 R14: 0000000000000000 R15: ffff888103630fc0 <4>[ 165.701192] ? walk_component+0x151/0x4f0 <4>[ 165.701221] ? unwind_get_return_address+0x65/0xb0 <4>[ 165.701243] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 165.701263] arch_stack_walk+0x8e/0x100 <4>[ 165.701286] ? walk_component+0x151/0x4f0 <4>[ 165.701308] ? kfree_link+0x12/0x20 <4>[ 165.701329] stack_trace_save+0x97/0xd0 <4>[ 165.701348] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 165.701375] kasan_save_stack+0x3d/0x60 <4>[ 165.701395] ? kasan_save_stack+0x3d/0x60 <4>[ 165.701414] ? kasan_save_track+0x18/0x40 <4>[ 165.701432] ? kasan_save_free_info+0x3f/0x60 <4>[ 165.701450] ? __kasan_slab_free+0x5e/0x80 <4>[ 165.701469] ? kfree+0x21a/0x330 <4>[ 165.701486] ? kfree_link+0x12/0x20 <4>[ 165.701525] kasan_save_track+0x18/0x40 <4>[ 165.701555] kasan_save_free_info+0x3f/0x60 <4>[ 165.701576] __kasan_slab_free+0x5e/0x80 <4>[ 165.701598] kfree+0x21a/0x330 <4>[ 165.701667] ? __pfx_kfree_link+0x10/0x10 <4>[ 165.701696] kfree_link+0x12/0x20 <4>[ 165.701716] walk_component+0x151/0x4f0 <4>[ 165.701738] link_path_walk.part.0.constprop.0+0x3fe/0xba0 <4>[ 165.701768] path_lookupat+0x6c/0x680 <4>[ 165.701788] filename_lookup+0x184/0x500 <4>[ 165.701808] ? __pfx_filename_lookup+0x10/0x10 <4>[ 165.701832] ? __pfx_kfree_link+0x10/0x10 <4>[ 165.701857] ? __kasan_check_write+0x18/0x20 <4>[ 165.701878] ? getname_flags.part.0+0xb1/0x4a0 <4>[ 165.701903] user_path_at+0x3e/0x60 <4>[ 165.701921] __x64_sys_mount+0x1d0/0x2d0 <4>[ 165.701942] ? __pfx___x64_sys_mount+0x10/0x10 <4>[ 165.701962] ? do_syscall_64+0xbf/0x1d0 <4>[ 165.701982] ? do_syscall_64+0x7e/0x1d0 <4>[ 165.702003] x64_sys_call+0x183a/0x2060 <4>[ 165.702025] do_syscall_64+0xb2/0x1d0 <4>[ 165.702046] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 165.702066] RIP: 0033:0x7fdb66727bea <4>[ 165.702092] Code: 48 8b 0d 39 92 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 06 92 0c 00 f7 d8 64 89 01 48 <4>[ 165.702119] RSP: 002b:00007ffcc1c642f8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 <4>[ 165.702143] RAX: ffffffffffffffda RBX: 00007ffcc1c646a0 RCX: 00007fdb66727bea <4>[ 165.702156] RDX: 0000000000000000 RSI: 00007ffcc1c64300 RDI: 00007ffcc1c646a0 <4>[ 165.702169] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 <4>[ 165.702180] R10: 0000000000005000 R11: 0000000000000206 R12: 0000000000005000 <4>[ 165.702192] R13: 00007ffcc1c64300 R14: 0000000000000000 R15: 0000000000000007 <4>[ 165.702213] <4>[ 165.702224] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Started [0;1;39mgetty@tty1.service[0m - Getty on tty1. [[0;32m OK [0m] Started [0;1;39mserial-getty@ttyS0.service[0m - Serial Getty on ttyS0. [[0;32m OK [0m] Reached target [0;1;39mgetty.target[0m - Login Prompts. [[0;32m OK [0m] Finished [0;1;39me2scrub_reap.service[0m - Re…line ext4 Metadata Check Snapshots. <4>[ 166.428793] ------------[ cut here ]------------ <4>[ 166.429078] WARNING: CPU: 1 PID: 3402 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.429140] Modules linked in: <4>[ 166.429177] CPU: 1 UID: 0 PID: 3402 Comm: 9 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 166.429212] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 166.429221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 166.429235] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.429264] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 166.429286] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 166.429307] RAX: 0000000080000000 RBX: ffff888107e938c0 RCX: ffff888154200000 <4>[ 166.429321] RDX: 00000000001ec000 RSI: ffffffff88ebc501 RDI: ffff8881543ec000 <4>[ 166.429334] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 166.429347] R10: 00000000d0eafde8 R11: 0000000000000005 R12: ffffea00041fa4c0 <4>[ 166.429360] R13: ffff8881543ec000 R14: 0000000000c80001 R15: 0000000000039408 <4>[ 166.429374] FS: 00007fa9ad828dc0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 166.429389] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 166.429402] CR2: 00007fa9addf9000 CR3: 0000000108560000 CR4: 00000000000006f0 <4>[ 166.429413] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 166.429427] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 166.429440] Call Trace: <4>[ 166.429451] <4>[ 166.429464] ? show_regs+0x68/0x80 <4>[ 166.429489] ? __warn+0xd5/0x260 <4>[ 166.429506] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.429529] ? report_bug+0x278/0x2e0 <4>[ 166.429561] ? handle_bug+0x7b/0xa0 <4>[ 166.429592] ? exc_invalid_op+0x1c/0x50 <4>[ 166.429824] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 166.429908] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 166.429936] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.429961] rcu_core+0x683/0x1c80 <4>[ 166.429989] ? __pfx_rcu_core+0x10/0x10 <4>[ 166.430011] ? lapic_next_event+0x19/0x30 <4>[ 166.430031] ? handle_softirqs+0x18e/0x720 <4>[ 166.430052] rcu_core_si+0x12/0x20 <4>[ 166.430072] handle_softirqs+0x20c/0x720 <4>[ 166.430092] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 166.430114] irq_exit_rcu+0x9c/0xd0 <4>[ 166.430132] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 166.430155] <4>[ 166.430166] <4>[ 166.430177] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 166.430198] RIP: 0010:ptep_clear_flush+0x0/0x130 <4>[ 166.430227] Code: 5d f8 c9 c3 cc cc cc cc e8 fd fb 0c 00 eb b3 48 89 df e8 13 fd 0c 00 eb de 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 <4>[ 166.430249] RSP: 0000:ffff888102f4fbb8 EFLAGS: 00000246 <4>[ 166.430281] RAX: dffffc0000000000 RBX: ffff888102f4fde8 RCX: 1ffff110205e9fb5 <4>[ 166.430296] RDX: ffff8881064f1fc8 RSI: 00007fa9addf9000 RDI: ffff88810448f700 <4>[ 166.430310] RBP: ffff888102f4fcf0 R08: 0000000000000000 R09: fffff94000b4d260 <4>[ 166.430322] R10: ffffea0005a69307 R11: 00000000000889c6 R12: ffffea0005a69300 <4>[ 166.430335] R13: 800000010a297067 R14: ffffea000428a5c0 R15: ffff888102f4fd90 <4>[ 166.430358] ? do_wp_page+0xe67/0x2b40 <4>[ 166.430380] ? sched_clock_cpu+0x6e/0x500 <4>[ 166.430401] ? _raw_spin_unlock_irq+0x47/0x80 <4>[ 166.430427] ? __pfx_do_wp_page+0x10/0x10 <4>[ 166.430446] ? __handle_mm_fault+0xa0c/0x3170 <4>[ 166.430467] ? __pfx__raw_spin_lock+0x10/0x10 <4>[ 166.430490] __handle_mm_fault+0x11db/0x3170 <4>[ 166.430509] ? down_read_trylock+0x16b/0x200 <4>[ 166.430528] ? preempt_count_sub+0x50/0x80 <4>[ 166.430552] ? __pfx___handle_mm_fault+0x10/0x10 <4>[ 166.430575] ? __pfx_lock_vma_under_rcu+0x10/0x10 <4>[ 166.430599] handle_mm_fault+0x258/0x4c0 <4>[ 166.430724] ? exc_page_fault+0x6a/0xf0 <4>[ 166.430754] do_user_addr_fault+0x23e/0x930 <4>[ 166.430778] exc_page_fault+0x6a/0xf0 <4>[ 166.430799] asm_exc_page_fault+0x2b/0x30 <4>[ 166.430818] RIP: 0033:0x7fa9ae3d2963 <4>[ 166.430843] Code: 00 49 83 fd 25 0f 87 4c 07 00 00 48 8d 3d d5 77 01 00 4a 63 04 af 48 01 f8 ff e0 0f 1f 40 00 4c 03 4b 10 48 8b 85 78 ff ff ff <4c> 89 08 8b 43 08 48 83 f8 07 0f 84 75 02 00 00 48 8b 85 70 ff ff <4>[ 166.430870] RSP: 002b:00007ffc297cf770 EFLAGS: 00000207 <4>[ 166.430890] RAX: 00007fa9addf9000 RBX: 00007fa9ada74270 RCX: 000000000000000f <4>[ 166.430903] RDX: 00007fa9ada15800 RSI: 0000000000000001 RDI: 00007fa9ae3ea120 <4>[ 166.430916] RBP: 00007ffc297cf890 R08: 0000000000000000 R09: 00007fa9adb5d9f0 <4>[ 166.430928] R10: 00007fa9ad854850 R11: 00007fa9ae3bc7b0 R12: 00007fa9ada15840 <4>[ 166.430940] R13: 0000000000000007 R14: 0000071d00000007 R15: 00007fa9ae3bc7b0 <4>[ 166.430961] <4>[ 166.430972] ---[ end trace 0000000000000000 ]--- <4>[ 166.946785] ------------[ cut here ]------------ <4>[ 166.946850] WARNING: CPU: 1 PID: 3392 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.946919] Modules linked in: <4>[ 166.946956] CPU: 1 UID: 0 PID: 3392 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 166.946991] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 166.947000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 166.947015] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.947043] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 166.947064] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 166.947083] RAX: 0000000080000000 RBX: ffff8881024a73c0 RCX: ffff888154200000 <4>[ 166.947097] RDX: 00000000001f4000 RSI: ffffffff88ebc501 RDI: ffff8881543f4000 <4>[ 166.947111] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 166.947125] R10: 0000000029f6378d R11: 000000000005e800 R12: ffffea00040929c0 <4>[ 166.947137] R13: ffff8881543f4000 R14: 0000000000634401 R15: 0000000000039408 <4>[ 166.947150] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 166.947165] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 166.947179] CR2: 00007fff172083f8 CR3: 00000001041be000 CR4: 00000000000006f0 <4>[ 166.947191] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 166.947204] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 166.947218] Call Trace: <4>[ 166.947229] <4>[ 166.947241] ? show_regs+0x68/0x80 <4>[ 166.947267] ? __warn+0xd5/0x260 <4>[ 166.947285] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.947307] ? report_bug+0x278/0x2e0 <4>[ 166.947335] ? handle_bug+0x7b/0xa0 <4>[ 166.947354] ? exc_invalid_op+0x1c/0x50 <4>[ 166.947372] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 166.947398] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 166.947420] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 166.947442] ? rcu_core_si+0x12/0x20 <4>[ 166.947466] rcu_core+0x683/0x1c80 <4>[ 166.947491] ? __pfx_rcu_core+0x10/0x10 <4>[ 166.947513] ? lapic_next_event+0x19/0x30 <4>[ 166.947532] ? handle_softirqs+0x18e/0x720 <4>[ 166.947554] rcu_core_si+0x12/0x20 <4>[ 166.947573] handle_softirqs+0x20c/0x720 <4>[ 166.947594] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 166.947728] ? trace_preempt_on+0x20/0xc0 <4>[ 166.947757] ? irq_exit_rcu+0x20/0xd0 <4>[ 166.947778] irq_exit_rcu+0x9c/0xd0 <4>[ 166.947796] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 166.947818] <4>[ 166.947828] <4>[ 166.947838] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 166.947859] RIP: 0010:selinux_sb_statfs+0x1cd/0x2d0 <4>[ 166.947883] Code: 63 05 6b 71 b6 03 45 8b 6d 04 49 01 c4 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 0f b6 04 02 84 c0 74 04 3c 03 7e 57 <41> 8b 34 24 ba 06 00 00 00 b9 08 00 00 00 44 89 ef e8 ed ca fe ff <4>[ 166.947900] RSP: 0018:ffff88810a89fca8 EFLAGS: 00000246 <4>[ 166.947918] RAX: 0000000000000000 RBX: 1ffff11021513f96 RCX: 0000000000000000 <4>[ 166.947932] RDX: 1ffff110209ff260 RSI: 0000000000000000 RDI: ffff8881026bf904 <4>[ 166.947944] RBP: ffff88810a89fd50 R08: ffff88810a89fcd0 R09: 0000000000000000 <4>[ 166.947957] R10: ffff88810a89fe10 R11: 0000000000000000 R12: ffff888104ff9300 <4>[ 166.947970] R13: 0000000000000007 R14: ffff888106554900 R15: 0000000000000000 <4>[ 166.947993] ? __pfx_selinux_sb_statfs+0x10/0x10 <4>[ 166.948016] ? __kasan_slab_free+0x69/0x80 <4>[ 166.948038] ? putname+0xe8/0x130 <4>[ 166.948060] security_sb_statfs+0x61/0x90 <4>[ 166.948081] statfs_by_dentry+0xa1/0x1f0 <4>[ 166.948102] fd_statfs+0x5d/0xe0 <4>[ 166.948121] __do_sys_fstatfs+0x8d/0xf0 <4>[ 166.948139] ? __pfx___do_sys_fstatfs+0x10/0x10 <4>[ 166.948165] ? __secure_computing+0x183/0x2b0 <4>[ 166.948189] __x64_sys_fstatfs+0x57/0x80 <4>[ 166.948206] ? trace_hardirqs_on+0x37/0xe0 <4>[ 166.948224] x64_sys_call+0x18be/0x2060 <4>[ 166.948246] do_syscall_64+0xb2/0x1d0 <4>[ 166.948266] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 166.948287] RIP: 0033:0x7f861bee8d47 <4>[ 166.948310] Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 d1 b0 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 8a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 a9 b0 0d 00 f7 d8 64 89 02 b8 <4>[ 166.948328] RSP: 002b:00007fff172067f8 EFLAGS: 00000206 ORIG_RAX: 000000000000008a <4>[ 166.948351] RAX: ffffffffffffffda RBX: 0000000000000024 RCX: 00007f861bee8d47 <4>[ 166.948364] RDX: 0000000000000000 RSI: 00007fff17206840 RDI: 0000000000000024 <4>[ 166.948376] RBP: 0000000000000024 R08: 0000000000000069 R09: 0000000000000000 <4>[ 166.948388] R10: 0000000000000000 R11: 0000000000000206 R12: 00007fff17206840 <4>[ 166.948400] R13: 000055bdc0ba2e90 R14: 00007fff17206960 R15: 000055bdc0ba2e90 <4>[ 166.948421] <4>[ 166.948432] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Started [0;1;39msystemd-logind.service[0m - User Login Management. [[0;32m OK [0m] Reached target [0;1;39mmulti-user.target[0m - Multi-User System. [[0;32m OK [0m] Reached target [0;1;39mgraphical.target[0m - Graphical Interface. Starting [0;1;39msystemd-update-utmp-runle…[0m- Record Runlevel Change in UTMP... <4>[ 168.299719] ------------[ cut here ]------------ <4>[ 168.300029] WARNING: CPU: 0 PID: 3408 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.300092] Modules linked in: <4>[ 168.300130] CPU: 0 UID: 0 PID: 3408 Comm: (ate-utmp) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 168.300168] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 168.300179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 168.300193] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.300232] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 168.300254] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 168.300274] RAX: 0000000080000000 RBX: ffff888104fd13c0 RCX: ffff888154200000 <4>[ 168.300289] RDX: 000000000004c000 RSI: ffffffff88ebc501 RDI: ffff88815424c000 <4>[ 168.300302] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 168.300315] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea000413f440 <4>[ 168.300328] R13: ffff88815424c000 R14: 0000000000c18501 R15: 0000000000039408 <4>[ 168.300340] FS: 00007fec3203adc0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 168.300354] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 168.300367] CR2: 00007fec32212080 CR3: 0000000102dd8000 CR4: 00000000000006f0 <4>[ 168.300380] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 168.300393] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 168.300406] Call Trace: <4>[ 168.300418] <4>[ 168.300432] ? show_regs+0x68/0x80 <4>[ 168.300458] ? __warn+0xd5/0x260 <4>[ 168.300478] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.300501] ? report_bug+0x278/0x2e0 <4>[ 168.300529] ? handle_bug+0x7b/0xa0 <4>[ 168.300548] ? exc_invalid_op+0x1c/0x50 <4>[ 168.300567] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 168.300593] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 168.300614] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.300752] ? rcu_core_si+0x12/0x20 <4>[ 168.300800] rcu_core+0x683/0x1c80 <4>[ 168.300827] ? __pfx_rcu_core+0x10/0x10 <4>[ 168.300850] ? lapic_next_event+0x19/0x30 <4>[ 168.300871] ? handle_softirqs+0x18e/0x720 <4>[ 168.300896] rcu_core_si+0x12/0x20 <4>[ 168.300916] handle_softirqs+0x20c/0x720 <4>[ 168.300938] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 168.300958] ? trace_preempt_on+0x20/0xc0 <4>[ 168.300978] ? irq_exit_rcu+0x20/0xd0 <4>[ 168.300999] irq_exit_rcu+0x9c/0xd0 <4>[ 168.301018] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 168.301043] <4>[ 168.301054] <4>[ 168.301064] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 168.301087] RIP: 0010:free_pgtables+0x4ba/0x990 <4>[ 168.301111] Code: 0f 8e 4c 04 00 00 44 8b 80 e0 00 00 00 49 8d 47 2c 48 89 c6 48 c1 ee 03 0f b6 3c 1e 48 89 c6 83 e6 07 83 c6 03 40 38 fe 7c 09 <40> 84 ff 0f 85 f6 03 00 00 45 3b 47 2c 0f 84 80 fe ff ff 4d 8d 4f <4>[ 168.301131] RSP: 0018:ffff888102b27810 EFLAGS: 00000202 <4>[ 168.301150] RAX: ffff8881085708ec RBX: dffffc0000000000 RCX: ffffffff88e19c22 <4>[ 168.301164] RDX: ffffed1020791ade RSI: 0000000000000007 RDI: 0000000000000000 <4>[ 168.301177] RBP: ffff888102b27948 R08: 0000000000000081 R09: ffff888103c8d640 <4>[ 168.301190] R10: ffff888103c8d6ef R11: ffff888102b279a0 R12: ffff888107cf1000 <4>[ 168.301203] R13: ffff8881085708d0 R14: 0000000000000001 R15: ffff8881085708c0 <4>[ 168.301221] ? free_pgtables+0x432/0x990 <4>[ 168.301251] ? __pfx_free_pgtables+0x10/0x10 <4>[ 168.301270] ? trace_preempt_on+0x20/0xc0 <4>[ 168.301290] ? down_write+0xdc/0x140 <4>[ 168.301315] ? __pfx_down_write+0x10/0x10 <4>[ 168.301342] ? up_read+0x4e/0xd0 <4>[ 168.301364] ? preempt_count_sub+0x50/0x80 <4>[ 168.301389] exit_mmap+0x276/0x750 <4>[ 168.301412] ? __pfx_exit_mmap+0x10/0x10 <4>[ 168.301432] ? selinux_inode_permission+0x2d3/0x4c0 <4>[ 168.301471] __mmput+0xa3/0x320 <4>[ 168.301493] mmput+0x42/0x50 <4>[ 168.301511] begin_new_exec+0xf62/0x2a20 <4>[ 168.301538] load_elf_binary+0x660/0x4800 <4>[ 168.301561] ? __kernel_read+0x556/0xbc0 <4>[ 168.301584] ? __pfx___kernel_read+0x10/0x10 <4>[ 168.301604] ? trace_preempt_on+0x20/0xc0 <4>[ 168.301671] ? inode_security+0x48/0xe0 <4>[ 168.301705] ? __pfx_load_elf_binary+0x10/0x10 <4>[ 168.301728] ? load_misc_binary+0x6b7/0xb40 <4>[ 168.301750] ? trace_preempt_on+0x20/0xc0 <4>[ 168.301768] ? bprm_execve+0x60b/0x1520 <4>[ 168.301792] bprm_execve+0x62d/0x1520 <4>[ 168.301811] ? __pfx_get_arg_page+0x10/0x10 <4>[ 168.301834] ? __pfx_bprm_execve+0x10/0x10 <4>[ 168.301859] do_execveat_common.isra.0+0x3d4/0x550 <4>[ 168.301888] ? irqentry_exit_to_user_mode+0x48/0x150 <4>[ 168.301916] __x64_sys_execve+0x91/0xc0 <4>[ 168.301937] x64_sys_call+0x19a5/0x2060 <4>[ 168.301958] do_syscall_64+0xb2/0x1d0 <4>[ 168.301979] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 168.302001] RIP: 0033:0x7fec31cf1207 <4>[ 168.302048] Code: Unable to access opcode bytes at 0x7fec31cf11dd. <4>[ 168.302061] RSP: 002b:00007ffedafc7558 EFLAGS: 00000206 ORIG_RAX: 000000000000003b <4>[ 168.302084] RAX: ffffffffffffffda RBX: 00007ffedafc7ce0 RCX: 00007fec31cf1207 <4>[ 168.302099] RDX: 000055e0c7af7850 RSI: 000055e0c7af7970 RDI: 000055e0c7af7990 <4>[ 168.302112] RBP: 00007ffedafc7890 R08: 0000000000000000 R09: 0000000000000000 <4>[ 168.302124] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 <4>[ 168.302136] R13: 0000000000000000 R14: 00007ffedafc7bd0 R15: 00007ffedafc78dc <4>[ 168.302157] <4>[ 168.302167] ---[ end trace 0000000000000000 ]--- <4>[ 168.402815] ------------[ cut here ]------------ <4>[ 168.403102] WARNING: CPU: 1 PID: 3369 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.403159] Modules linked in: <4>[ 168.403194] CPU: 1 UID: 0 PID: 3369 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 168.403229] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 168.403240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 168.403254] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.403282] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 168.403304] RSP: 0000:ffff888154b09db0 EFLAGS: 00000202 <4>[ 168.403325] RAX: 0000000080000000 RBX: ffff88810268cc80 RCX: ffff888154200000 <4>[ 168.403339] RDX: 000000000004efe0 RSI: ffffffff88ebc501 RDI: ffff88815424efe0 <4>[ 168.403352] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 168.403366] R10: 0000000029f6378d R11: 00000000000e1378 R12: ffffea000409a300 <4>[ 168.403379] R13: ffff88815424efe0 R14: 0000000000c8c401 R15: 0000000000039408 <4>[ 168.403392] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 168.403408] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 168.403422] CR2: 00007f861b999834 CR3: 00000001041a2000 CR4: 00000000000006f0 <4>[ 168.403435] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 168.403448] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 168.403461] Call Trace: <4>[ 168.403474] <4>[ 168.403493] ? show_regs+0x68/0x80 <4>[ 168.403520] ? __warn+0xd5/0x260 <4>[ 168.403538] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.403568] ? report_bug+0x278/0x2e0 <4>[ 168.403595] ? handle_bug+0x7b/0xa0 <4>[ 168.403745] ? exc_invalid_op+0x1c/0x50 <4>[ 168.403827] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 168.403863] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 168.403888] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.403911] ? rcu_core_si+0x12/0x20 <4>[ 168.403936] rcu_core+0x683/0x1c80 <4>[ 168.403963] ? __pfx_rcu_core+0x10/0x10 <4>[ 168.403986] ? lapic_next_event+0x19/0x30 <4>[ 168.404005] ? handle_softirqs+0x18e/0x720 <4>[ 168.404029] rcu_core_si+0x12/0x20 <4>[ 168.404049] handle_softirqs+0x20c/0x720 <4>[ 168.404071] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 168.404091] ? trace_preempt_on+0x20/0xc0 <4>[ 168.404110] ? irq_exit_rcu+0x20/0xd0 <4>[ 168.404129] irq_exit_rcu+0x9c/0xd0 <4>[ 168.404147] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 168.404171] <4>[ 168.404182] <4>[ 168.404202] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 168.404226] RIP: 0010:do_user_addr_fault+0x172/0x930 <4>[ 168.404253] Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 0c 07 00 00 f6 83 91 00 00 00 02 0f 84 ee 01 00 00 e8 d4 62 4a 00 fb 0f 1f 44 00 00 <45> 31 c9 41 f6 c4 40 b8 15 02 00 00 48 8b 55 d0 41 0f 95 c1 41 81 <4>[ 168.404274] RSP: 0000:ffff888103c97ed0 EFLAGS: 00000292 <4>[ 168.404305] RAX: 0000000000000000 RBX: ffff888103c97f58 RCX: 0000000000000000 <4>[ 168.404319] RDX: 1ffff11020792ffd RSI: ffffffff8c067e9a RDI: ffffffff8877bb3c <4>[ 168.404334] RBP: ffff888103c97f18 R08: 0000000000000000 R09: 0000000000000000 <4>[ 168.404347] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000004 <4>[ 168.404361] R13: 00007f861b999834 R14: ffff888105d8ee40 R15: ffff88810374e780 <4>[ 168.404381] ? exc_page_fault+0x6a/0xf0 <4>[ 168.404403] ? do_user_addr_fault+0x16c/0x930 <4>[ 168.404424] ? trace_hardirqs_off_finish+0x39/0xe0 <4>[ 168.404447] exc_page_fault+0x6a/0xf0 <4>[ 168.404469] asm_exc_page_fault+0x2b/0x30 <4>[ 168.404489] RIP: 0033:0x7f861be98f36 <4>[ 168.404514] Code: 00 00 66 90 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 <4>[ 168.404531] RSP: 002b:00007fff17205f68 EFLAGS: 00000297 <4>[ 168.404548] RAX: 00007f861b999834 RBX: 0000000000000001 RCX: 0000000000000834 <4>[ 168.404561] RDX: 00007f861b999834 RSI: 00007f861b424728 RDI: 00007f861b999834 <4>[ 168.404574] RBP: 000055bdc0b5d315 R08: 000055bdc0b5d315 R09: 00007fff17205700 <4>[ 168.404586] R10: 00007fff172060ca R11: 0000000000000000 R12: 00007f861b999834 <4>[ 168.404599] R13: 00007f861b424728 R14: 000055bdc0b53260 R15: 00007fff172060c0 <4>[ 168.404705] <4>[ 168.404723] ---[ end trace 0000000000000000 ]--- <4>[ 168.614950] ------------[ cut here ]------------ <4>[ 168.615209] WARNING: CPU: 0 PID: 16 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.615268] Modules linked in: <4>[ 168.615303] CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 168.615339] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 168.615350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 168.615364] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.615391] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 168.615412] RSP: 0000:ffff888100837c60 EFLAGS: 00000202 <4>[ 168.615432] RAX: 0000000080000000 RBX: ffff888107175000 RCX: ffff888154200000 <4>[ 168.615446] RDX: 0000000000054fe0 RSI: ffffffff88ebc501 RDI: ffff888154254fe0 <4>[ 168.615459] RBP: ffff888100837ca0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 168.615472] R10: ffffffff8df3348f R11: 0000000000034800 R12: ffffea00041c5d40 <4>[ 168.615485] R13: ffff888154254fe0 R14: 00000000002ac401 R15: 0000000000039408 <4>[ 168.615498] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 168.615513] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 168.615525] CR2: 00007f38637e66a8 CR3: 00000001076bc000 CR4: 00000000000006f0 <4>[ 168.615538] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 168.615551] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 168.615564] Call Trace: <4>[ 168.615576] <4>[ 168.615589] ? show_regs+0x68/0x80 <4>[ 168.615718] ? __warn+0xd5/0x260 <4>[ 168.615810] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.615838] ? report_bug+0x278/0x2e0 <4>[ 168.615866] ? handle_bug+0x7b/0xa0 <4>[ 168.615886] ? exc_invalid_op+0x1c/0x50 <4>[ 168.615905] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 168.615931] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 168.615952] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 168.615974] ? rcu_core_si+0x12/0x20 <4>[ 168.615999] rcu_core+0x683/0x1c80 <4>[ 168.616024] ? __pfx_rcu_core+0x10/0x10 <4>[ 168.616044] ? __schedule+0xbca/0x2590 <4>[ 168.616066] ? handle_softirqs+0x18e/0x720 <4>[ 168.616089] rcu_core_si+0x12/0x20 <4>[ 168.616108] handle_softirqs+0x20c/0x720 <4>[ 168.616129] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 168.616149] ? __pfx_run_ksoftirqd+0x10/0x10 <4>[ 168.616168] ? __pfx_run_ksoftirqd+0x10/0x10 <4>[ 168.616186] run_ksoftirqd+0x36/0x50 <4>[ 168.616204] smpboot_thread_fn+0x401/0x690 <4>[ 168.616229] ? __pfx_smpboot_thread_fn+0x10/0x10 <4>[ 168.616251] kthread+0x257/0x310 <4>[ 168.616272] ? __pfx_kthread+0x10/0x10 <4>[ 168.616293] ret_from_fork+0x41/0x80 <4>[ 168.616313] ? __pfx_kthread+0x10/0x10 <4>[ 168.616334] ret_from_fork_asm+0x1a/0x30 <4>[ 168.616362] <4>[ 168.616373] ---[ end trace 0000000000000000 ]--- [[0;32m OK [0m] Finished [0;1;39msystemd-update-utmp-runle…e[0m - Record Runlevel Change in UTMP. <4>[ 169.236737] ------------[ cut here ]------------ <4>[ 169.237040] WARNING: CPU: 0 PID: 3386 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 169.237098] Modules linked in: <4>[ 169.237136] CPU: 0 UID: 0 PID: 3386 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 169.237176] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 169.237188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 169.237202] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 169.237232] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 169.237253] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 169.237274] RAX: 0000000080000000 RBX: ffff88810a85c780 RCX: ffff888154200000 <4>[ 169.237289] RDX: 000000000006a000 RSI: ffffffff88ebc501 RDI: ffff88815426a000 <4>[ 169.237302] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 169.237315] R10: ffffffff8df3348f R11: 00000000000000fd R12: ffffea00042a1700 <4>[ 169.237328] R13: ffff88815426a000 R14: 00000000002bc401 R15: 0000000000039408 <4>[ 169.237343] FS: 00007f861bd4e8c0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 169.237360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 169.237373] CR2: 00007f861ba3229e CR3: 0000000104418000 CR4: 00000000000006f0 <4>[ 169.237386] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 169.237399] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 169.237414] Call Trace: <4>[ 169.237425] <4>[ 169.237442] ? show_regs+0x68/0x80 <4>[ 169.237469] ? __warn+0xd5/0x260 <4>[ 169.237490] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 169.237513] ? report_bug+0x278/0x2e0 <4>[ 169.237541] ? handle_bug+0x7b/0xa0 <4>[ 169.237566] ? exc_invalid_op+0x1c/0x50 <4>[ 169.237590] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 169.237617] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 169.237776] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 169.237814] ? rcu_core_si+0x12/0x20 <4>[ 169.237842] rcu_core+0x683/0x1c80 <4>[ 169.237874] ? __pfx_rcu_core+0x10/0x10 <4>[ 169.237902] ? lapic_next_event+0x19/0x30 <4>[ 169.237924] ? handle_softirqs+0x18e/0x720 <4>[ 169.237948] rcu_core_si+0x12/0x20 <4>[ 169.237968] handle_softirqs+0x20c/0x720 <4>[ 169.237991] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 169.238012] ? trace_preempt_on+0x20/0xc0 <4>[ 169.238032] ? irq_exit_rcu+0x20/0xd0 <4>[ 169.238053] irq_exit_rcu+0x9c/0xd0 <4>[ 169.238073] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 169.238098] <4>[ 169.238109] <4>[ 169.238120] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 169.238142] RIP: 0010:ftrace_graph_ret_addr+0x1ad/0x2a0 <4>[ 169.238166] Code: 49 39 4c 24 20 75 a8 4c 89 e2 48 c1 ea 03 42 80 3c 2a 00 0f 85 8c 00 00 00 49 81 3c 24 f0 ab 75 88 74 8c 41 89 1f 49 8b 04 24 <48> 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 90 0f 0b <4>[ 169.238184] RSP: 0018:ffff8881061b7900 EFLAGS: 00000297 <4>[ 169.238203] RAX: ffffffff88f2dded RBX: 0000000000000000 RCX: ffff8881061b7b60 <4>[ 169.238218] RDX: ffffffff8875abf0 RSI: 1ffff11020c7ff25 RDI: ffff8881063ff928 <4>[ 169.238231] RBP: ffff8881061b7938 R08: ffff8881063fee40 R09: 00000000061b0001 <4>[ 169.238243] R10: ffff8881061b7a28 R11: 1ffff110201aae71 R12: ffff8881061b7b60 <4>[ 169.238256] R13: ffff8881061b7a48 R14: ffff8881061b7b58 R15: ffff8881061b7a50 <4>[ 169.238275] ? kasan_save_stack+0x3d/0x60 <4>[ 169.238348] ? ftrace_stub_direct_tramp+0x20/0x20 <4>[ 169.238390] update_stack_state+0x29d/0x660 <4>[ 169.238423] unwind_next_frame+0x18f/0x8e0 <4>[ 169.238451] ? __unwind_start+0x1fc/0x390 <4>[ 169.238471] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 169.238495] arch_stack_walk+0x9a/0x100 <4>[ 169.238518] ? stack_trace_save+0x97/0xd0 <4>[ 169.238540] stack_trace_save+0x97/0xd0 <4>[ 169.238559] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 169.238584] kasan_save_stack+0x3d/0x60 <4>[ 169.238688] kasan_save_track+0x18/0x40 <4>[ 169.238717] kasan_save_free_info+0x3f/0x60 <4>[ 169.238740] __kasan_slab_free+0x5e/0x80 <4>[ 169.238761] ? security_file_free+0xa0/0xd0 <4>[ 169.238783] kmem_cache_free+0x23a/0x340 <4>[ 169.238802] ? __pfx_locks_remove_file+0x10/0x10 <4>[ 169.238843] security_file_free+0xa0/0xd0 <4>[ 169.238881] __fput+0x484/0xad0 <4>[ 169.238910] __fput_sync+0x38/0x50 <4>[ 169.238930] __x64_sys_close+0x81/0xe0 <4>[ 169.238953] x64_sys_call+0x17ab/0x2060 <4>[ 169.238974] do_syscall_64+0xb2/0x1d0 <4>[ 169.238995] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 169.239014] RIP: 0033:0x7f861beed577 <4>[ 169.239041] Code: c7 c0 ff ff ff ff c3 0f 1f 40 00 48 8b 15 a1 68 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb ba 0f 1f 00 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 79 68 0d 00 f7 d8 64 89 02 b8 <4>[ 169.239060] RSP: 002b:00007fff1720f408 EFLAGS: 00000297 ORIG_RAX: 0000000000000003 <4>[ 169.239083] RAX: ffffffffffffffda RBX: 000055bdc0b55ff0 RCX: 00007f861beed577 <4>[ 169.239098] RDX: 00007f861bfc2f20 RSI: 0000000000000001 RDI: 0000000000000020 <4>[ 169.239110] RBP: 00007f861bfc3070 R08: 0000000000008000 R09: 0000000000000006 <4>[ 169.239122] R10: 0000000000000007 R11: 0000000000000297 R12: 0000000000000000 <4>[ 169.239134] R13: 00007fff1720f560 R14: 00007fff1720f558 R15: 00007fff1720f550 <4>[ 169.239158] <4>[ 169.239168] ---[ end trace 0000000000000000 ]--- Debian GNU/Linux trixie/sid runner-vwmj3eza-project-40964107-concurrent-2 ttyS0 runner-vwmj3eza-project-40964107-concurrent-2 login: root <4>[ 170.283993] ------------[ cut here ]------------ <4>[ 170.284486] WARNING: CPU: 1 PID: 3402 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.284587] Modules linked in: <4>[ 170.284839] CPU: 1 UID: 0 PID: 3402 Comm: login Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 170.284977] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 170.285005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 170.285037] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.285119] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 170.285166] RSP: 0000:ffff888102f4fcf0 EFLAGS: 00000202 <4>[ 170.285232] RAX: 0000000080000000 RBX: ffff888104f59780 RCX: ffff888154200000 <4>[ 170.285266] RDX: 0000000000084000 RSI: ffffffff88ebc501 RDI: ffff888154284000 <4>[ 170.285294] RBP: ffff888102f4fd30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 170.285320] R10: 000000006a73cf60 R11: 0000000000000005 R12: ffffea000413d640 <4>[ 170.285347] R13: ffff888154284000 R14: 0000000000c80001 R15: 0000000000039408 <4>[ 170.285375] FS: 00007f24a4acd580(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 170.285408] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 170.285438] CR2: 0000564e45d3425e CR3: 0000000103e98000 CR4: 00000000000006f0 <4>[ 170.285465] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 170.285493] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 170.285523] Call Trace: <4>[ 170.285548] <4>[ 170.285579] ? show_regs+0x68/0x80 <4>[ 170.285859] ? __warn+0xd5/0x260 <4>[ 170.285919] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.285971] ? report_bug+0x278/0x2e0 <4>[ 170.286027] ? handle_bug+0x7b/0xa0 <4>[ 170.286067] ? exc_invalid_op+0x1c/0x50 <4>[ 170.286109] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 170.286164] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 170.286211] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.286266] rcu_core+0x683/0x1c80 <4>[ 170.286326] ? __pfx_rcu_core+0x10/0x10 <4>[ 170.286374] ? lapic_next_event+0x19/0x30 <4>[ 170.286415] ? handle_softirqs+0x18e/0x720 <4>[ 170.286463] rcu_core_si+0x12/0x20 <4>[ 170.286507] handle_softirqs+0x20c/0x720 <4>[ 170.286554] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 170.286597] ? trace_preempt_on+0x20/0xc0 <4>[ 170.286788] ? irq_exit_rcu+0x20/0xd0 <4>[ 170.286849] irq_exit_rcu+0x9c/0xd0 <4>[ 170.286910] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 170.286960] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 170.287008] RIP: 0033:0x7f24a4b08e59 <4>[ 170.287055] Code: c0 0f 85 fb 00 00 00 41 b8 0d 00 00 00 45 85 c0 0f 84 9b 01 00 00 41 8d 68 ff 41 83 f8 07 0f 85 13 05 00 00 41 b8 05 00 00 00 <4d> 63 e0 48 8b 74 24 28 48 8b 7c 24 20 44 89 c2 4a 8d 0c e3 44 89 <4>[ 170.287094] RSP: 002b:00007ffcf37f3780 EFLAGS: 00000206 <4>[ 170.287135] RAX: 000000000000000c RBX: 00007ffcf37f37b0 RCX: 0000000000000041 <4>[ 170.287166] RDX: 0000000000000000 RSI: 000000000000003b RDI: 0000564e45d34443 <4>[ 170.287192] RBP: 000000000000000d R08: 000000000000000c R09: 0000000000000000 <4>[ 170.287218] R10: 00007f24a4c4aff0 R11: 0000000000000006 R12: 0000000000000016 <4>[ 170.287246] R13: 00007ffcf37f5ec0 R14: 00007f24a4cad3c0 R15: 0000000000000006 <4>[ 170.287293] <4>[ 170.287317] ---[ end trace 0000000000000000 ]--- Linux runner-vwmj3eza-project-40964107-concurrent-2 6.11.0-rc2-next-20240807 #1 SMP PREEMPT_DYNAMIC @1723006616 x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. <4>[ 170.805773] ------------[ cut here ]------------ <4>[ 170.806099] WARNING: CPU: 0 PID: 3402 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.806160] Modules linked in: <4>[ 170.806195] CPU: 0 UID: 0 PID: 3402 Comm: login Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 170.806231] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 170.806242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 170.806255] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.806293] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 170.806315] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 170.806335] RAX: 0000000080000000 RBX: ffff8881043b4c80 RCX: ffff888154200000 <4>[ 170.806350] RDX: 0000000000090000 RSI: ffffffff88ebc501 RDI: ffff888154290000 <4>[ 170.806362] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 170.806384] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea000410ed00 <4>[ 170.806397] R13: ffff888154290000 R14: 0000000000c80001 R15: 0000000000039408 <4>[ 170.806411] FS: 00007f24a4acd580(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 170.806426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 170.806438] CR2: 0000564e70d1d4e8 CR3: 0000000103e98000 CR4: 00000000000006f0 <4>[ 170.806452] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 170.806465] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 170.806478] Call Trace: <4>[ 170.806490] <4>[ 170.806503] ? show_regs+0x68/0x80 <4>[ 170.806529] ? __warn+0xd5/0x260 <4>[ 170.806548] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.806570] ? report_bug+0x278/0x2e0 <4>[ 170.806595] ? handle_bug+0x7b/0xa0 <4>[ 170.806720] ? exc_invalid_op+0x1c/0x50 <4>[ 170.806811] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 170.806852] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 170.806884] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 170.806907] ? rcu_core_si+0x12/0x20 <4>[ 170.806941] rcu_core+0x683/0x1c80 <4>[ 170.806969] ? __pfx_rcu_core+0x10/0x10 <4>[ 170.806990] ? lapic_next_event+0x19/0x30 <4>[ 170.807011] ? handle_softirqs+0x18e/0x720 <4>[ 170.807033] rcu_core_si+0x12/0x20 <4>[ 170.807053] handle_softirqs+0x20c/0x720 <4>[ 170.807075] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 170.807098] irq_exit_rcu+0x9c/0xd0 <4>[ 170.807117] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 170.807141] <4>[ 170.807152] <4>[ 170.807162] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 170.807183] RIP: 0010:__lruvec_stat_mod_folio+0x3e/0x250 <4>[ 170.807212] Code: 48 89 e5 41 57 41 56 41 89 f6 41 55 41 89 d5 48 89 fa 41 54 48 c1 ea 03 53 48 89 fb 48 83 ec 08 80 3c 02 00 0f 85 be 01 00 00 <48> b8 00 00 00 00 00 fc ff df 4c 8b 23 49 c1 ec 3a 4a 8d 3c e5 80 <4>[ 170.807232] RSP: 0000:ffff888102f4fc48 EFLAGS: 00000246 <4>[ 170.807262] RAX: dffffc0000000000 RBX: ffffea0004272080 RCX: ffffffff88e6a26a <4>[ 170.807277] RDX: 1ffffd400084e410 RSI: 0000000000000011 RDI: ffffea0004272080 <4>[ 170.807290] RBP: ffff888102f4fc78 R08: 0000000000000001 R09: fffff9400084e410 <4>[ 170.807303] R10: ffffea0004272087 R11: 0000000080000000 R12: 0000000000000000 <4>[ 170.807316] R13: 0000000000000001 R14: 0000000000000011 R15: ffff888104e7d460 <4>[ 170.807334] ? folio_add_new_anon_rmap+0x27a/0x600 <4>[ 170.807363] ? __pte_offset_map_lock+0xe5/0x210 <4>[ 170.807386] __folio_mod_stat+0x52/0x1a0 <4>[ 170.807415] folio_add_new_anon_rmap+0x237/0x600 <4>[ 170.807440] __handle_mm_fault+0x2c3c/0x3170 <4>[ 170.807460] ? down_read_trylock+0x16b/0x200 <4>[ 170.807481] ? preempt_count_sub+0x50/0x80 <4>[ 170.807512] ? __pfx___handle_mm_fault+0x10/0x10 <4>[ 170.807536] ? __pfx_lock_vma_under_rcu+0x10/0x10 <4>[ 170.807561] handle_mm_fault+0x258/0x4c0 <4>[ 170.807580] ? exc_page_fault+0x6a/0xf0 <4>[ 170.807605] do_user_addr_fault+0x23e/0x930 <4>[ 170.807736] exc_page_fault+0x6a/0xf0 <4>[ 170.807766] asm_exc_page_fault+0x2b/0x30 <4>[ 170.807787] RIP: 0033:0x7f24a4b6d91c <4>[ 170.807812] Code: ca f1 13 00 31 d2 48 8d 34 29 48 39 fb 48 89 73 60 0f 95 c2 48 29 e8 48 c1 e2 02 48 83 c8 01 48 09 ea 48 83 ca 01 48 89 51 08 <48> 89 46 08 48 8d 41 10 48 8b 54 24 28 64 48 2b 14 25 28 00 00 00 <4>[ 170.807831] RSP: 002b:00007ffcf37f01f0 EFLAGS: 00000206 <4>[ 170.807850] RAX: 0000000000020b21 RBX: 00007f24a4cacac0 RCX: 0000564e70d154a0 <4>[ 170.807865] RDX: 0000000000008041 RSI: 0000564e70d1d4e0 RDI: 00007f24a4cacac0 <4>[ 170.807878] RBP: 0000000000008040 R08: 0000000000028b61 R09: 0000000000000000 <4>[ 170.807891] R10: 0000000000000004 R11: 0000564e70d1d000 R12: 0000000000007b60 <4>[ 170.807903] R13: 0000564e70d154a0 R14: 0000000000001000 R15: 0000000000008060 <4>[ 170.807925] <4>[ 170.807936] ---[ end trace 0000000000000000 ]--- <4>[ 171.018824] ------------[ cut here ]------------ <4>[ 171.019098] WARNING: CPU: 1 PID: 3396 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.019155] Modules linked in: <4>[ 171.019191] CPU: 1 UID: 0 PID: 3396 Comm: systemd-logind Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 171.019226] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 171.019237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 171.019250] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.019278] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 171.019299] RSP: 0000:ffff888106e97cf0 EFLAGS: 00000202 <4>[ 171.019320] RAX: 0000000080000000 RBX: ffff888105f42000 RCX: ffff888154200000 <4>[ 171.019334] RDX: 0000000000094fe0 RSI: ffffffff88ebc501 RDI: ffff888154294fe0 <4>[ 171.019347] RBP: ffff888106e97d30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 171.019359] R10: 00000000e8247ca3 R11: 0000000000000005 R12: ffffea000417d080 <4>[ 171.019371] R13: ffff888154294fe0 R14: 0000000000630501 R15: 0000000000039408 <4>[ 171.019385] FS: 00007fb437e109c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 171.019399] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 171.019412] CR2: 000055b92b3d1ed0 CR3: 0000000108772000 CR4: 00000000000006f0 <4>[ 171.019424] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 171.019437] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 171.019450] Call Trace: <4>[ 171.019460] <4>[ 171.019472] ? show_regs+0x68/0x80 <4>[ 171.019498] ? __warn+0xd5/0x260 <4>[ 171.019515] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.019537] ? report_bug+0x278/0x2e0 <4>[ 171.019563] ? handle_bug+0x7b/0xa0 <4>[ 171.019580] ? exc_invalid_op+0x1c/0x50 <4>[ 171.019598] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 171.019753] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 171.019837] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.019866] rcu_core+0x683/0x1c80 <4>[ 171.019897] ? __pfx_rcu_core+0x10/0x10 <4>[ 171.019920] ? lapic_next_event+0x19/0x30 <4>[ 171.019941] ? handle_softirqs+0x18e/0x720 <4>[ 171.019964] rcu_core_si+0x12/0x20 <4>[ 171.019984] handle_softirqs+0x20c/0x720 <4>[ 171.020006] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 171.020025] ? trace_preempt_on+0x20/0xc0 <4>[ 171.020046] ? irq_exit_rcu+0x20/0xd0 <4>[ 171.020066] irq_exit_rcu+0x9c/0xd0 <4>[ 171.020085] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 171.020108] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 171.020132] RIP: 0033:0x7fb437a822b0 <4>[ 171.020160] Code: 68 25 00 00 00 e9 90 fd ff ff ff 25 ca 49 37 00 68 26 00 00 00 e9 80 fd ff ff ff 25 c2 49 37 00 68 27 00 00 00 e9 70 fd ff ff 25 ba 49 37 00 68 28 00 00 00 e9 60 fd ff ff ff 25 b2 49 37 00 <4>[ 171.020183] RSP: 002b:00007ffd23f32b08 EFLAGS: 00000206 <4>[ 171.020216] RAX: 000055b92b3b8010 RBX: 000055b92b3b82c0 RCX: 0000000000000051 <4>[ 171.020232] RDX: 000055bc70a93a2f RSI: 000055b92b3cf0c0 RDI: 000055b92b3b82c0 <4>[ 171.020246] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000004 <4>[ 171.020259] R10: 0000000000000007 R11: 000055b92b3cf0d0 R12: 000055b92b3cef80 <4>[ 171.020272] R13: 0000000000000001 R14: 0000000000000000 R15: 00007ffd23f32cc0 <4>[ 171.020295] <4>[ 171.020306] ---[ end trace 0000000000000000 ]--- <4>[ 171.963804] ------------[ cut here ]------------ <4>[ 171.964220] WARNING: CPU: 0 PID: 3419 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.964276] Modules linked in: <4>[ 171.964315] CPU: 0 UID: 0 PID: 3419 Comm: (systemd) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 171.964352] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 171.964362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 171.964376] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.964406] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 171.964429] RSP: 0000:ffff888103847cf0 EFLAGS: 00000202 <4>[ 171.964449] RAX: 0000000080000000 RBX: ffff8881016cddc0 RCX: ffff888154200000 <4>[ 171.964463] RDX: 00000000000aefe0 RSI: ffffffff88ebc501 RDI: ffff8881542aefe0 <4>[ 171.964476] RBP: ffff888103847d30 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 171.964501] R10: 00000000e40fa532 R11: 0000000000000005 R12: ffffea000405b340 <4>[ 171.964527] R13: ffff8881542aefe0 R14: 0000000000a84401 R15: 0000000000039408 <4>[ 171.964544] FS: 00007ff0a43bddc0(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 171.964559] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 171.964572] CR2: 00007ff0a3c71000 CR3: 0000000106ade000 CR4: 00000000000006f0 <4>[ 171.964585] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 171.964598] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 171.964611] Call Trace: <4>[ 171.964818] <4>[ 171.964870] ? show_regs+0x68/0x80 <4>[ 171.964912] ? __warn+0xd5/0x260 <4>[ 171.964931] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.964956] ? report_bug+0x278/0x2e0 <4>[ 171.964982] ? handle_bug+0x7b/0xa0 <4>[ 171.965001] ? exc_invalid_op+0x1c/0x50 <4>[ 171.965019] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 171.965044] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 171.965066] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 171.965087] ? rcu_core_si+0x12/0x20 <4>[ 171.965113] rcu_core+0x683/0x1c80 <4>[ 171.965138] ? __pfx_rcu_core+0x10/0x10 <4>[ 171.965160] ? lapic_next_event+0x19/0x30 <4>[ 171.965179] ? handle_softirqs+0x18e/0x720 <4>[ 171.965201] rcu_core_si+0x12/0x20 <4>[ 171.965220] handle_softirqs+0x20c/0x720 <4>[ 171.965251] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 171.965271] ? trace_preempt_on+0x20/0xc0 <4>[ 171.965293] ? irq_exit_rcu+0x20/0xd0 <4>[ 171.965319] irq_exit_rcu+0x9c/0xd0 <4>[ 171.965344] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 171.965367] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 171.965389] RIP: 0033:0x7ff0a3d14df0 <4>[ 171.965418] Code: c2 48 89 43 40 4b 8d 44 25 00 80 8b 80 01 00 00 08 5b 5d 41 5c 41 5d 41 5e c3 48 89 f7 e8 38 e5 fa ff 49 89 c5 48 85 c0 74 48 <48> 8b 83 88 01 00 00 f3 0f 6f 00 41 0f 11 45 00 4d 39 e6 0f 83 5f <4>[ 171.965441] RSP: 002b:00007ffe090b4b90 EFLAGS: 00000206 <4>[ 171.965471] RAX: 0000557f436dda50 RBX: 0000557f436de9c0 RCX: 0000000000000006 <4>[ 171.965486] RDX: 0000557f436cf010 RSI: 0000557f436ddb90 RDI: 0000000000000012 <4>[ 171.965499] RBP: 000000000000002e R08: 0000000000000100 R09: 0000000000000001 <4>[ 171.965511] R10: 0000000000000002 R11: 0000000000000202 R12: 0000000000000010 <4>[ 171.965524] R13: 0000557f436dda50 R14: 0000000000000010 R15: 0000557f436de9c0 <4>[ 171.965546] <4>[ 171.965556] ---[ end trace 0000000000000000 ]--- <4>[ 172.268725] ------------[ cut here ]------------ <4>[ 172.268962] WARNING: CPU: 1 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.269017] Modules linked in: <4>[ 172.269062] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 172.269112] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 172.269126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 172.269144] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.269182] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 172.269211] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 172.269241] RAX: 0000000080000000 RBX: ffff888105d7c140 RCX: ffff888154200000 <4>[ 172.269261] RDX: 00000000000b8000 RSI: ffffffff88ebc501 RDI: ffff8881542b8000 <4>[ 172.269280] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 172.269299] R10: 000000006166379c R11: 0000000000000005 R12: ffffea0004175f00 <4>[ 172.269320] R13: ffff8881542b8000 R14: 0000000000838501 R15: 0000000000039408 <4>[ 172.269347] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 172.269369] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 172.269388] CR2: 00007f6fbd270000 CR3: 000000010873a000 CR4: 00000000000006f0 <4>[ 172.269407] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 172.269425] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 172.269443] Call Trace: <4>[ 172.269458] <4>[ 172.269477] ? show_regs+0x68/0x80 <4>[ 172.269513] ? __warn+0xd5/0x260 <4>[ 172.269538] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.269569] ? report_bug+0x278/0x2e0 <4>[ 172.269606] ? handle_bug+0x7b/0xa0 <4>[ 172.269794] ? exc_invalid_op+0x1c/0x50 <4>[ 172.269834] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 172.269874] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 172.269918] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.269954] rcu_core+0x683/0x1c80 <4>[ 172.269996] ? __pfx_rcu_core+0x10/0x10 <4>[ 172.270028] ? lapic_next_event+0x19/0x30 <4>[ 172.270052] ? handle_softirqs+0x18e/0x720 <4>[ 172.270074] rcu_core_si+0x12/0x20 <4>[ 172.270094] handle_softirqs+0x20c/0x720 <4>[ 172.270115] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 172.270137] irq_exit_rcu+0x9c/0xd0 <4>[ 172.270155] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 172.270178] <4>[ 172.270188] <4>[ 172.270198] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 172.270219] RIP: 0010:default_idle+0xf/0x20 <4>[ 172.270240] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 172.270259] RSP: 0018:ffff888100867de0 EFLAGS: 00000216 <4>[ 172.270279] RAX: ffff888154b00000 RBX: ffff88810083bf00 RCX: ffffffff8c0688b5 <4>[ 172.270293] RDX: ffffed102a966ae5 RSI: 0000000000000004 RDI: 00000000000824cc <4>[ 172.270305] RBP: ffff888100867de8 R08: 0000000000000001 R09: ffffed102a966ae4 <4>[ 172.270318] R10: ffff888154b35723 R11: 0000000000066c00 R12: 0000000000000001 <4>[ 172.270330] R13: ffffed10201077e0 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 172.270348] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 172.270374] ? arch_cpu_idle+0xd/0x20 <4>[ 172.270392] default_idle_call+0x48/0x80 <4>[ 172.270410] do_idle+0x313/0x3c0 <4>[ 172.270432] ? __pfx_do_idle+0x10/0x10 <4>[ 172.270463] cpu_startup_entry+0x5c/0x70 <4>[ 172.270483] start_secondary+0x214/0x290 <4>[ 172.270504] ? __pfx_start_secondary+0x10/0x10 <4>[ 172.270528] common_startup_64+0x12c/0x138 <4>[ 172.270555] <4>[ 172.270566] ---[ end trace 0000000000000000 ]--- <4>[ 172.903846] ------------[ cut here ]------------ <4>[ 172.904108] WARNING: CPU: 1 PID: 3419 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.904161] Modules linked in: <4>[ 172.904195] CPU: 1 UID: 0 PID: 3419 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 172.904233] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 172.904244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 172.904258] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.904285] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 172.904305] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 172.904325] RAX: 0000000080000000 RBX: ffff888103ce4a00 RCX: ffff888154200000 <4>[ 172.904338] RDX: 00000000000ccfe0 RSI: ffffffff88ebc501 RDI: ffff8881542ccfe0 <4>[ 172.904351] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 172.904364] R10: 0000000029f6378d R11: ffffffff8d64a2e0 R12: ffffea00040f3900 <4>[ 172.904376] R13: ffff8881542ccfe0 R14: 0000000000a84401 R15: 0000000000039408 <4>[ 172.904389] FS: 00007f6fbd001940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 172.904405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 172.904417] CR2: 000056210f208238 CR3: 000000010873a000 CR4: 00000000000006f0 <4>[ 172.904429] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 172.904442] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 172.904456] Call Trace: <4>[ 172.904466] <4>[ 172.904478] ? show_regs+0x68/0x80 <4>[ 172.904502] ? __warn+0xd5/0x260 <4>[ 172.904521] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.904542] ? report_bug+0x278/0x2e0 <4>[ 172.904567] ? handle_bug+0x7b/0xa0 <4>[ 172.904585] ? exc_invalid_op+0x1c/0x50 <4>[ 172.904602] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 172.904738] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 172.904767] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 172.904789] ? rcu_core_si+0x12/0x20 <4>[ 172.904813] rcu_core+0x683/0x1c80 <4>[ 172.904838] ? __pfx_rcu_core+0x10/0x10 <4>[ 172.904860] ? lapic_next_event+0x19/0x30 <4>[ 172.904878] ? handle_softirqs+0x18e/0x720 <4>[ 172.904900] rcu_core_si+0x12/0x20 <4>[ 172.904918] handle_softirqs+0x20c/0x720 <4>[ 172.904938] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 172.904957] ? trace_preempt_on+0x20/0xc0 <4>[ 172.904976] ? irq_exit_rcu+0x20/0xd0 <4>[ 172.904995] irq_exit_rcu+0x9c/0xd0 <4>[ 172.905012] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 172.905035] <4>[ 172.905044] <4>[ 172.905054] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 172.905075] RIP: 0010:__rcu_read_lock+0x0/0x70 <4>[ 172.905098] Code: 5d c7 05 6b 9a 50 05 01 00 00 00 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 <4>[ 172.905116] RSP: 0018:ffff888103847928 EFLAGS: 00000202 <4>[ 172.905134] RAX: 000000000001ab75 RBX: 00000000356ea974 RCX: 0000000000000004 <4>[ 172.905148] RDX: ffff888154600000 RSI: ffff888103847c20 RDI: ffff8881048e8500 <4>[ 172.905161] RBP: ffff888103847968 R08: 0000000000000008 R09: fefefefefefefeff <4>[ 172.905174] R10: 8080808080808080 R11: ffff888103847c10 R12: ffff8881546d5ba8 <4>[ 172.905186] R13: ffff8881048e8500 R14: ffff888103847c48 R15: ffff888103847c10 <4>[ 172.905208] ? inode_permission+0x122/0x4c0 <4>[ 172.905229] ? __d_lookup+0x61/0x1f0 <4>[ 172.905251] lookup_fast+0x139/0x450 <4>[ 172.905272] walk_component+0x55/0x4f0 <4>[ 172.905293] path_lookupat+0x117/0x680 <4>[ 172.905312] path_openat+0x2543/0x3e30 <4>[ 172.905328] ? kasan_save_stack+0x4d/0x60 <4>[ 172.905349] ? kasan_save_track+0x18/0x40 <4>[ 172.905366] ? __kasan_slab_alloc+0x91/0xa0 <4>[ 172.905385] ? kmem_cache_alloc_noprof+0x101/0x340 <4>[ 172.905404] ? getname_flags.part.0+0x4f/0x4a0 <4>[ 172.905421] ? getname+0x7b/0xb0 <4>[ 172.905436] ? do_sys_openat2+0xfa/0x190 <4>[ 172.905454] ? __x64_sys_openat+0x12c/0x210 <4>[ 172.905473] ? do_syscall_64+0xb2/0x1d0 <4>[ 172.905489] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 172.905512] ? __pfx_path_openat+0x10/0x10 <4>[ 172.905536] do_filp_open+0x19c/0x3b0 <4>[ 172.905555] ? __pfx_do_filp_open+0x10/0x10 <4>[ 172.905591] do_sys_openat2+0x145/0x190 <4>[ 172.905610] ? __pfx_do_sys_openat2+0x10/0x10 <4>[ 172.905686] ? call_rcu+0x12/0x20 <4>[ 172.905710] ? kmem_cache_free+0x143/0x340 <4>[ 172.905732] __x64_sys_openat+0x12c/0x210 <4>[ 172.905751] ? __fput+0x581/0xad0 <4>[ 172.905768] ? trace_preempt_on+0x20/0xc0 <4>[ 172.905786] ? __pfx___x64_sys_openat+0x10/0x10 <4>[ 172.905806] ? do_syscall_64+0xbf/0x1d0 <4>[ 172.905823] ? do_syscall_64+0x7e/0x1d0 <4>[ 172.905839] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 172.905860] x64_sys_call+0x1e3e/0x2060 <4>[ 172.905880] do_syscall_64+0xb2/0x1d0 <4>[ 172.905898] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 172.905916] RIP: 0033:0x7f6fbd11928c <4>[ 172.905938] Code: 48 89 44 24 38 31 c0 f6 c2 40 75 4a 89 d0 45 31 d2 f7 d0 a9 00 00 41 00 74 3c 80 3d dd 00 0e 00 00 74 60 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a0 00 00 00 48 8b 54 24 38 64 48 2b 14 25 <4>[ 172.905955] RSP: 002b:00007ffdbc7920a0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 <4>[ 172.905976] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6fbd11928c <4>[ 172.905989] RDX: 00000000002a0000 RSI: 000056210f206b90 RDI: 0000000000000013 <4>[ 172.906001] RBP: 0000000000000000 R08: 000000000000ff80 R09: 0000000000000002 <4>[ 172.906013] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffdbc7921b0 <4>[ 172.906025] R13: 0000000000000013 R14: 000056210f206b90 R15: 0000000000000000 <4>[ 172.906046] <4>[ 172.906055] ---[ end trace 0000000000000000 ]--- <4>[ 173.516767] ------------[ cut here ]------------ <4>[ 173.517046] WARNING: CPU: 1 PID: 3419 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.517104] Modules linked in: <4>[ 173.517138] CPU: 1 UID: 0 PID: 3419 Comm: systemd Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 173.517173] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 173.517185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 173.517199] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.517226] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 173.517248] RSP: 0000:ffff888103847cf0 EFLAGS: 00000202 <4>[ 173.517267] RAX: 0000000080000000 RBX: ffff888105a35780 RCX: ffff888154200000 <4>[ 173.517281] RDX: 00000000000dafe0 RSI: ffffffff88ebc501 RDI: ffff8881542dafe0 <4>[ 173.517295] RBP: ffff888103847d30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 173.517308] R10: ffffffff8df3348f R11: ffffffff8d64a2e0 R12: ffffea0004168d40 <4>[ 173.517320] R13: ffff8881542dafe0 R14: 0000000000a84401 R15: 0000000000039408 <4>[ 173.517333] FS: 00007f6fbd001940(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 173.517347] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 173.517360] CR2: 00007f6fbccbfd30 CR3: 000000010873a000 CR4: 00000000000006f0 <4>[ 173.517373] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 173.517385] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 173.517398] Call Trace: <4>[ 173.517411] <4>[ 173.517428] ? show_regs+0x68/0x80 <4>[ 173.517452] ? __warn+0xd5/0x260 <4>[ 173.517470] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.517492] ? report_bug+0x278/0x2e0 <4>[ 173.517518] ? handle_bug+0x7b/0xa0 <4>[ 173.517537] ? exc_invalid_op+0x1c/0x50 <4>[ 173.517554] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 173.517582] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 173.517607] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.517742] ? rcu_core_si+0x12/0x20 <4>[ 173.517818] rcu_core+0x683/0x1c80 <4>[ 173.517845] ? __pfx_rcu_core+0x10/0x10 <4>[ 173.517870] ? lapic_next_event+0x19/0x30 <4>[ 173.517889] ? handle_softirqs+0x18e/0x720 <4>[ 173.517910] rcu_core_si+0x12/0x20 <4>[ 173.517929] handle_softirqs+0x20c/0x720 <4>[ 173.517950] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 173.517969] ? trace_preempt_on+0x20/0xc0 <4>[ 173.517986] ? irq_exit_rcu+0x20/0xd0 <4>[ 173.518006] irq_exit_rcu+0x9c/0xd0 <4>[ 173.518023] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 173.518045] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 173.518065] RIP: 0033:0x7f6fbd191db0 <4>[ 173.518092] Code: 2e 0f 1f 84 00 00 00 00 00 90 0f b6 0e 0f b6 07 48 8d 15 23 77 00 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 <48> 85 d2 0f 84 bb 0f 00 00 48 83 fa 01 0f 84 bd 0f 00 00 49 89 d3 <4>[ 173.518112] RSP: 002b:00007ffdbc791908 EFLAGS: 00000202 <4>[ 173.518141] RAX: 0000000000000002 RBX: 00007ffdbc791a81 RCX: 000000000000090c <4>[ 173.518154] RDX: 0000000000000002 RSI: 00007f6fbcefe90c RDI: 00007ffdbc791a81 <4>[ 173.518167] RBP: 00007f6fbcefe90c R08: 0000000000000000 R09: 00007ffdbc791ba8 <4>[ 173.518179] R10: 0000000000000007 R11: 00007f6fbd1adc44 R12: 0000000000000002 <4>[ 173.518191] R13: 0000000000000001 R14: 00007ffdbc7919a8 R15: 00007ffdbc7919b7 <4>[ 173.518212] <4>[ 173.518222] ---[ end trace 0000000000000000 ]--- <4>[ 173.724708] ------------[ cut here ]------------ <4>[ 173.725007] WARNING: CPU: 1 PID: 3372 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.725070] Modules linked in: <4>[ 173.725107] CPU: 1 UID: 0 PID: 3372 Comm: (udev-worker) Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 173.725143] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 173.725153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 173.725168] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.725196] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 173.725218] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 173.725238] RAX: 0000000080000000 RBX: ffff888104f33330 RCX: ffff888154200000 <4>[ 173.725253] RDX: 00000000000dc000 RSI: ffffffff88ebc501 RDI: ffff8881542dc000 <4>[ 173.725266] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 173.725280] R10: ffffffff8df3348f R11: 00000000000a9000 R12: ffffea000413ccc0 <4>[ 173.725293] R13: ffff8881542dc000 R14: 0000000000c1c401 R15: 0000000000039408 <4>[ 173.725306] FS: 00007f861bd4e8c0(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 173.725321] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 173.725335] CR2: 00007f6fbd2896e0 CR3: 0000000107f3a000 CR4: 00000000000006f0 <4>[ 173.725347] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 173.725362] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 173.725380] Call Trace: <4>[ 173.725391] <4>[ 173.725403] ? show_regs+0x68/0x80 <4>[ 173.725430] ? __warn+0xd5/0x260 <4>[ 173.725455] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.725480] ? report_bug+0x278/0x2e0 <4>[ 173.725516] ? handle_bug+0x7b/0xa0 <4>[ 173.725535] ? exc_invalid_op+0x1c/0x50 <4>[ 173.725554] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 173.725580] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 173.725601] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 173.725744] ? rcu_core_si+0x12/0x20 <4>[ 173.725779] rcu_core+0x683/0x1c80 <4>[ 173.725806] ? __pfx_rcu_core+0x10/0x10 <4>[ 173.725829] ? lapic_next_event+0x19/0x30 <4>[ 173.725849] ? handle_softirqs+0x18e/0x720 <4>[ 173.725872] rcu_core_si+0x12/0x20 <4>[ 173.725892] handle_softirqs+0x20c/0x720 <4>[ 173.725914] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 173.725933] ? trace_preempt_on+0x20/0xc0 <4>[ 173.725953] ? irq_exit_rcu+0x20/0xd0 <4>[ 173.725974] irq_exit_rcu+0x9c/0xd0 <4>[ 173.725993] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 173.726017] <4>[ 173.726028] <4>[ 173.726038] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 173.726060] RIP: 0010:kasan_check_range+0x25/0x1c0 <4>[ 173.726083] Code: 90 90 90 90 90 66 0f 1f 00 48 85 f6 0f 84 66 01 00 00 55 48 89 f8 41 89 d0 48 01 f0 48 89 e5 41 55 41 54 53 0f 82 de 00 00 00 0f cc cc cc 48 b8 00 00 00 00 00 00 00 ff eb 0a 48 b8 00 00 00 <4>[ 173.726102] RSP: 0018:ffff88810119f880 EFLAGS: 00000286 <4>[ 173.726121] RAX: ffffea0004282848 RBX: ffffea0004282840 RCX: ffffffff88ecd5d8 <4>[ 173.726136] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffea0004282840 <4>[ 173.726149] RBP: ffff88810119f898 R08: 0000000000000000 R09: fffff94000850508 <4>[ 173.726160] R10: ffffea0004282847 R11: ffff888154b3efd0 R12: dffffc0000000000 <4>[ 173.726174] R13: ffff888104e78e70 R14: ffff88810119fb28 R15: ffffea0004282840 <4>[ 173.726192] ? free_swap_cache+0x58/0x1b0 <4>[ 173.726218] __kasan_check_read+0x15/0x20 <4>[ 173.726238] free_swap_cache+0x58/0x1b0 <4>[ 173.726257] free_pages_and_swap_cache+0x159/0x420 <4>[ 173.726280] ? __pfx_free_pages_and_swap_cache+0x10/0x10 <4>[ 173.726299] ? __mod_memcg_lruvec_state+0x173/0x440 <4>[ 173.726344] ? trace_preempt_on+0x20/0xc0 <4>[ 173.726362] ? flush_tlb_mm_range+0x284/0x450 <4>[ 173.726385] __tlb_batch_free_encoded_pages+0xa3/0x1d0 <4>[ 173.726410] tlb_finish_mmu+0x139/0x6b0 <4>[ 173.726429] ? preempt_count_sub+0x50/0x80 <4>[ 173.726454] exit_mmap+0x27e/0x750 <4>[ 173.726477] ? __pfx_exit_mmap+0x10/0x10 <4>[ 173.726501] ? preempt_count_sub+0x50/0x80 <4>[ 173.726532] __mmput+0xa3/0x320 <4>[ 173.726550] mmput+0x42/0x50 <4>[ 173.726568] do_exit+0x7c7/0x28f0 <4>[ 173.726587] ? trace_preempt_off+0x20/0xc0 <4>[ 173.726604] ? do_group_exit+0x11a/0x270 <4>[ 173.726680] ? __pfx_do_exit+0x10/0x10 <4>[ 173.726705] ? _raw_spin_unlock_irq+0x3c/0x80 <4>[ 173.726728] ? trace_preempt_on+0x20/0xc0 <4>[ 173.726744] ? do_group_exit+0x183/0x270 <4>[ 173.726766] do_group_exit+0xbb/0x270 <4>[ 173.726787] __x64_sys_exit_group+0x42/0x50 <4>[ 173.726808] x64_sys_call+0x2059/0x2060 <4>[ 173.726828] do_syscall_64+0xb2/0x1d0 <4>[ 173.726847] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 173.726879] RIP: 0033:0x7f861bec3725 <4>[ 173.726902] Code: Unable to access opcode bytes at 0x7f861bec36fb. <4>[ 173.726913] RSP: 002b:00007fff1720f728 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 <4>[ 173.726936] RAX: ffffffffffffffda RBX: 000055bdc0b97530 RCX: 00007f861bec3725 <4>[ 173.726950] RDX: 00000000000000e7 RSI: fffffffffffffdd0 RDI: 0000000000000000 <4>[ 173.726962] RBP: 00007fff1720f7bc R08: 90139c37bce3ca97 R09: 26822c005c2bc056 <4>[ 173.726975] R10: 0000000000000001 R11: 0000000000000246 R12: 000055bdc0b51c60 <4>[ 173.726986] R13: 00007fff1720f760 R14: 0000000000000000 R15: 000055bdc0b5a5e0 <4>[ 173.727009] <4>[ 173.727027] ---[ end trace 0000000000000000 ]--- <4>[ 174.047811] ------------[ cut here ]------------ <4>[ 174.048050] WARNING: CPU: 0 PID: 3425 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 174.048113] Modules linked in: <4>[ 174.048147] CPU: 0 UID: 0 PID: 3425 Comm: systemctl Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 174.048181] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 174.048191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 174.048257] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 174.048288] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 174.048308] RSP: 0000:ffff888154a09db0 EFLAGS: 00000202 <4>[ 174.048329] RAX: 0000000080000000 RBX: ffff888106575000 RCX: ffff888154200000 <4>[ 174.048343] RDX: 0000000000086000 RSI: ffffffff88ebc501 RDI: ffff888154286000 <4>[ 174.048355] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 174.048369] R10: 00000000d0eafde8 R11: 0000000000000005 R12: ffffea0004195d40 <4>[ 174.048381] R13: ffff888154286000 R14: 0000000000a84401 R15: 0000000000039408 <4>[ 174.048394] FS: 00007fdc86a24900(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 174.048410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 174.048422] CR2: 0000560fbdc0d098 CR3: 000000010808a000 CR4: 00000000000006f0 <4>[ 174.048435] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 174.048457] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 174.048485] Call Trace: <4>[ 174.048499] <4>[ 174.048511] ? show_regs+0x68/0x80 <4>[ 174.048539] ? __warn+0xd5/0x260 <4>[ 174.048558] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 174.048579] ? report_bug+0x278/0x2e0 <4>[ 174.048609] ? handle_bug+0x7b/0xa0 <4>[ 174.048846] ? exc_invalid_op+0x1c/0x50 <4>[ 174.048934] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 174.048962] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 174.048983] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 174.049007] rcu_core+0x683/0x1c80 <4>[ 174.049042] ? __pfx_rcu_core+0x10/0x10 <4>[ 174.049065] ? lapic_next_event+0x19/0x30 <4>[ 174.049084] ? handle_softirqs+0x18e/0x720 <4>[ 174.049108] rcu_core_si+0x12/0x20 <4>[ 174.049127] handle_softirqs+0x20c/0x720 <4>[ 174.049148] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 174.049166] ? trace_preempt_on+0x20/0xc0 <4>[ 174.049185] ? irq_exit_rcu+0x20/0xd0 <4>[ 174.049203] irq_exit_rcu+0x9c/0xd0 <4>[ 174.049222] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 174.049245] <4>[ 174.049255] <4>[ 174.049266] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 174.049289] RIP: 0010:__cond_resched+0x0/0x30 <4>[ 174.049315] Code: 9c 58 f6 c4 02 74 f4 55 48 89 e5 e8 ba fe ff ff 5d c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 0f 1f 44 00 00 65 8b 05 f8 51 fc 73 85 c0 74 07 31 c0 <4>[ 174.049336] RSP: 0000:ffff888104cbf968 EFLAGS: 00000246 <4>[ 174.049366] RAX: 0000000000000000 RBX: ffff88810bc665b0 RCX: ffff88810bc66598 <4>[ 174.049380] RDX: 0000000000440100 RSI: 0000000000000000 RDI: ffff88810bc665b0 <4>[ 174.049392] RBP: ffff888104cbfa08 R08: 0000000000000000 R09: ffffed102178ccc1 <4>[ 174.049405] R10: ffff88810bc6660f R11: ffff888104cbfda8 R12: 1ffff11020997f30 <4>[ 174.049418] R13: dffffc0000000000 R14: 0000000000000020 R15: ffff888104cbfc18 <4>[ 174.049442] ? down_read+0x72/0x270 <4>[ 174.049463] ? __pfx_down_read+0x10/0x10 <4>[ 174.049481] ? __pfx_map_id_up+0x10/0x10 <4>[ 174.049504] page_cache_ra_unbounded+0x107/0x450 <4>[ 174.049525] ? xas_load+0x1d/0x260 <4>[ 174.049547] page_cache_ra_order+0x50a/0x900 <4>[ 174.049572] page_cache_async_ra+0x388/0x4d0 <4>[ 174.049590] ? up_read+0x4e/0xd0 <4>[ 174.049728] filemap_fault+0x811/0x2170 <4>[ 174.049765] ? __pfx_filemap_fault+0x10/0x10 <4>[ 174.049791] ? __pfx_pte_offset_map_nolock+0x10/0x10 <4>[ 174.049814] __do_fault+0xf5/0x300 <4>[ 174.049835] __handle_mm_fault+0x1f51/0x3170 <4>[ 174.049852] ? down_read_trylock+0x16b/0x200 <4>[ 174.049872] ? preempt_count_sub+0x50/0x80 <4>[ 174.049894] ? __pfx___handle_mm_fault+0x10/0x10 <4>[ 174.049918] ? __pfx_lock_vma_under_rcu+0x10/0x10 <4>[ 174.049942] handle_mm_fault+0x258/0x4c0 <4>[ 174.049959] ? exc_page_fault+0x6a/0xf0 <4>[ 174.049980] do_user_addr_fault+0x23e/0x930 <4>[ 174.050001] exc_page_fault+0x6a/0xf0 <4>[ 174.050022] asm_exc_page_fault+0x2b/0x30 <4>[ 174.050041] RIP: 0033:0x560fbdc0d098 <4>[ 174.050086] Code: Unable to access opcode bytes at 0x560fbdc0d06e. <4>[ 174.050100] RSP: 002b:00007ffeefbf0430 EFLAGS: 00000206 <4>[ 174.050119] RAX: 0000000000000003 RBX: 0000560fbdce7146 RCX: 0000560fbdce7146 <4>[ 174.050132] RDX: 0000000000000000 RSI: 00007ffeefbf0488 RDI: 0000560fe1de3600 <4>[ 174.050145] RBP: 00007ffeefbf0488 R08: 0000560fbdccd8f0 R09: 0000560fbdce780c <4>[ 174.050158] R10: fffffffffffffecf R11: 0000560fe1de2970 R12: 0000560fbdce712d <4>[ 174.050170] R13: 0000560fbdccd8f0 R14: 0000560fbdce780c R15: 0000560fe1de3600 <4>[ 174.050192] <4>[ 174.050203] ---[ end trace 0000000000000000 ]--- [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# # [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# export SHELL=/bin/sh [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# . /lava-1/environment [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# /lava-1/bin/lava-test-runner /lava-1/0 [?2004l <4>[ 175.284696] ------------[ cut here ]------------ <4>[ 175.284968] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.285026] Modules linked in: <4>[ 175.285061] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 175.285098] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 175.285109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 175.285123] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.285151] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 175.285172] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 175.285190] RAX: 0000000080000000 RBX: ffff88810793f3c0 RCX: ffff888154200000 <4>[ 175.285203] RDX: 000000000010cfe0 RSI: ffffffff88ebc501 RDI: ffff88815430cfe0 <4>[ 175.285216] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 175.285230] R10: ffffffff8df3348f R11: 00000000fffe109d R12: ffffea00041e4fc0 <4>[ 175.285243] R13: ffff88815430cfe0 R14: 0000000088418401 R15: 0000000000039408 <4>[ 175.285256] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 175.285271] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 175.285283] CR2: 000055c85ca34d48 CR3: 00000001041a2000 CR4: 00000000000006f0 <4>[ 175.285296] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 175.285309] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 175.285322] Call Trace: <4>[ 175.285333] <4>[ 175.285345] ? show_regs+0x68/0x80 <4>[ 175.285370] ? __warn+0xd5/0x260 <4>[ 175.285388] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.285408] ? report_bug+0x278/0x2e0 <4>[ 175.285434] ? handle_bug+0x7b/0xa0 <4>[ 175.285451] ? exc_invalid_op+0x1c/0x50 <4>[ 175.285473] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 175.285499] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 175.285520] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.285539] ? rcu_core_si+0x12/0x20 <4>[ 175.285563] rcu_core+0x683/0x1c80 <4>[ 175.285586] ? __pfx_rcu_core+0x10/0x10 <4>[ 175.285607] ? lapic_next_event+0x19/0x30 <4>[ 175.285759] ? handle_softirqs+0x18e/0x720 <4>[ 175.285799] rcu_core_si+0x12/0x20 <4>[ 175.285821] handle_softirqs+0x20c/0x720 <4>[ 175.285843] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 175.285864] irq_exit_rcu+0x9c/0xd0 <4>[ 175.285883] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 175.285904] <4>[ 175.285914] <4>[ 175.285924] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 175.285944] RIP: 0010:default_idle+0xf/0x20 <4>[ 175.285964] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 175.285981] RSP: 0018:ffffffff8d407df0 EFLAGS: 00000212 <4>[ 175.286000] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 175.286014] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 00000000000c02fc <4>[ 175.286027] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 175.286039] R10: ffff888154a35723 R11: 0000000000010000 R12: 0000000000000000 <4>[ 175.286051] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 175.286069] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 175.286095] ? arch_cpu_idle+0xd/0x20 <4>[ 175.286112] default_idle_call+0x48/0x80 <4>[ 175.286129] do_idle+0x313/0x3c0 <4>[ 175.286150] ? __pfx_do_idle+0x10/0x10 <4>[ 175.286173] cpu_startup_entry+0x5c/0x70 <4>[ 175.286192] rest_init+0x11a/0x140 <4>[ 175.286208] ? acpi_subsystem_init+0x5d/0x150 <4>[ 175.286231] start_kernel+0x31b/0x400 <4>[ 175.286254] x86_64_start_reservations+0x1c/0x30 <4>[ 175.286274] x86_64_start_kernel+0xcf/0xe0 <4>[ 175.286294] common_startup_64+0x12c/0x138 <4>[ 175.286320] <4>[ 175.286331] ---[ end trace 0000000000000000 ]--- <4>[ 175.700895] ------------[ cut here ]------------ <4>[ 175.701125] WARNING: CPU: 1 PID: 3438 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.701181] Modules linked in: <4>[ 175.701215] CPU: 1 UID: 0 PID: 3438 Comm: basename Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 175.701250] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 175.701259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 175.701273] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.701299] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 175.701318] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 175.701337] RAX: 0000000080000000 RBX: ffff88810415c500 RCX: ffff888154200000 <4>[ 175.701351] RDX: 000000000011afe0 RSI: ffffffff88ebc501 RDI: ffff88815431afe0 <4>[ 175.701364] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 175.701376] R10: 0000000001fbbb2e R11: ffffffff8d64a2e0 R12: ffffea0004105700 <4>[ 175.701389] R13: ffff88815431afe0 R14: 0000000000694401 R15: 0000000000039408 <4>[ 175.701402] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 175.701416] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 175.701428] CR2: 00007fa5052a7710 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 175.701441] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 175.701453] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 175.701464] Call Trace: <4>[ 175.701475] <4>[ 175.701486] ? show_regs+0x68/0x80 <4>[ 175.701510] ? __warn+0xd5/0x260 <4>[ 175.701528] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.701549] ? report_bug+0x278/0x2e0 <4>[ 175.701574] ? handle_bug+0x7b/0xa0 <4>[ 175.701591] ? exc_invalid_op+0x1c/0x50 <4>[ 175.701609] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 175.701727] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 175.701756] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 175.701778] ? rcu_core_si+0x12/0x20 <4>[ 175.701801] rcu_core+0x683/0x1c80 <4>[ 175.701826] ? __pfx_rcu_core+0x10/0x10 <4>[ 175.701846] ? lapic_next_event+0x19/0x30 <4>[ 175.701864] ? handle_softirqs+0x18e/0x720 <4>[ 175.701885] rcu_core_si+0x12/0x20 <4>[ 175.701903] handle_softirqs+0x20c/0x720 <4>[ 175.701923] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 175.701941] ? trace_preempt_on+0x20/0xc0 <4>[ 175.701959] ? irq_exit_rcu+0x20/0xd0 <4>[ 175.701978] irq_exit_rcu+0x9c/0xd0 <4>[ 175.701994] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 175.702017] <4>[ 175.702027] <4>[ 175.702038] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 175.702059] RIP: 0010:unwind_next_frame+0x144/0x8e0 <4>[ 175.702080] Code: a8 58 7f 00 00 49 39 fe 0f 84 66 01 00 00 48 05 40 7f 00 00 49 39 c6 0f 84 0e 01 00 00 49 8d 45 d8 49 39 c6 0f 84 eb 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 8d 7b 60 48 89 fe 48 c1 ee 03 80 <4>[ 175.702098] RSP: 0018:ffff888103037708 EFLAGS: 00000283 <4>[ 175.702116] RAX: ffff888103037f30 RBX: ffff888103037760 RCX: ffff888103037788 <4>[ 175.702131] RDX: ffff8881030377c8 RSI: 1ffff11020ad2bd4 RDI: ffff888103037f48 <4>[ 175.702144] RBP: ffff888103037750 R08: ffff888105695e80 R09: ffff8881030377a8 <4>[ 175.702157] R10: ffff888103037768 R11: ffff888103037c50 R12: 0000000000000000 <4>[ 175.702169] R13: ffff888103037f58 R14: ffff888103037eb0 R15: ffff888105695e80 <4>[ 175.702191] ? unwind_next_frame+0x18f/0x8e0 <4>[ 175.702210] ? __unwind_start+0x1fc/0x390 <4>[ 175.702227] ? do_group_exit+0xbb/0x270 <4>[ 175.702245] ? __kernel_text_address+0x16/0x50 <4>[ 175.702265] ? __pfx_stack_trace_consume_entry+0x10/0x10 <4>[ 175.702284] arch_stack_walk+0x9a/0x100 <4>[ 175.702305] ? do_group_exit+0xbb/0x270 <4>[ 175.702326] stack_trace_save+0x97/0xd0 <4>[ 175.702342] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 175.702361] ? stack_trace_save+0x97/0xd0 <4>[ 175.702378] ? __pfx_stack_trace_save+0x10/0x10 <4>[ 175.702396] kasan_save_stack+0x3d/0x60 <4>[ 175.702416] ? kasan_save_stack+0x3d/0x60 <4>[ 175.702433] ? __kasan_record_aux_stack+0xae/0xc0 <4>[ 175.702450] ? kasan_record_aux_stack+0x12/0x20 <4>[ 175.702466] ? task_work_add+0x1d6/0x2c0 <4>[ 175.702482] ? fput+0xea/0x2d0 <4>[ 175.702499] ? remove_vma+0xa4/0x120 <4>[ 175.702518] ? exit_mmap+0x342/0x750 <4>[ 175.702535] ? __mmput+0xa3/0x320 <4>[ 175.702552] ? mmput+0x42/0x50 <4>[ 175.702568] ? do_exit+0x7c7/0x28f0 <4>[ 175.702585] ? do_group_exit+0xbb/0x270 <4>[ 175.702671] __kasan_record_aux_stack+0xae/0xc0 <4>[ 175.702698] kasan_record_aux_stack+0x12/0x20 <4>[ 175.702717] task_work_add+0x1d6/0x2c0 <4>[ 175.702736] ? kasan_quarantine_put+0xc5/0x1d0 <4>[ 175.702756] ? __pfx_task_work_add+0x10/0x10 <4>[ 175.702774] ? __vm_area_free+0x4b/0x60 <4>[ 175.702795] fput+0xea/0x2d0 <4>[ 175.702814] remove_vma+0xa4/0x120 <4>[ 175.702833] exit_mmap+0x342/0x750 <4>[ 175.702860] ? __pfx_exit_mmap+0x10/0x10 <4>[ 175.702904] ? preempt_count_sub+0x50/0x80 <4>[ 175.702939] __mmput+0xa3/0x320 <4>[ 175.702958] mmput+0x42/0x50 <4>[ 175.702974] do_exit+0x7c7/0x28f0 <4>[ 175.702992] ? trace_preempt_off+0x20/0xc0 <4>[ 175.703007] ? do_group_exit+0x11a/0x270 <4>[ 175.703027] ? __pfx_do_exit+0x10/0x10 <4>[ 175.703045] ? _raw_spin_unlock_irq+0x3c/0x80 <4>[ 175.703065] ? trace_preempt_on+0x20/0xc0 <4>[ 175.703081] ? do_group_exit+0x183/0x270 <4>[ 175.703103] do_group_exit+0xbb/0x270 <4>[ 175.703124] __x64_sys_exit_group+0x42/0x50 <4>[ 175.703143] x64_sys_call+0x2059/0x2060 <4>[ 175.703163] do_syscall_64+0xb2/0x1d0 <4>[ 175.703180] entry_SYSCALL_64_after_hwframe+0x77/0x7f <4>[ 175.703199] RIP: 0033:0x7fa5052a7725 <4>[ 175.703220] Code: Unable to access opcode bytes at 0x7fa5052a76fb. <4>[ 175.703230] RSP: 002b:00007ffe7c041418 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 <4>[ 175.703252] RAX: ffffffffffffffda RBX: 00007fa5053a9fa8 RCX: 00007fa5052a7725 <4>[ 175.703265] RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000000 <4>[ 175.703277] RBP: 0000000000000002 R08: 00007ffe7c0413c0 R09: 00007ffe7c04134f <4>[ 175.703289] R10: 00007ffe7c0412d0 R11: 0000000000000206 R12: 0000000000000000 <4>[ 175.703300] R13: 0000000000000000 R14: 00007fa5053a8680 R15: 00007fa5053a9fc0 <4>[ 175.703322] <4>[ 175.703332] ---[ end trace 0000000000000000 ]--- + export TESTRUN_ID=0_kunit + cd /lava-1/0/tests/0_kunit + cat uuid + UUID=1_1.1.3.1 + set +x <8>[ 176.095473] + cd ./automated/linux/kunit/ + ./kunit.sh -m kunit-test.ko <4>[ 176.118997] ------------[ cut here ]------------ <4>[ 176.119423] WARNING: CPU: 0 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.119526] Modules linked in: <4>[ 176.119894] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 176.119988] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 176.120013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 176.120045] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.120110] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 176.120155] RSP: 0018:ffff888154a09db0 EFLAGS: 00000202 <4>[ 176.120201] RAX: 0000000080000000 RBX: ffff888102241100 RCX: ffff888154200000 <4>[ 176.120232] RDX: 0000000000122000 RSI: ffffffff88ebc501 RDI: ffff888154322000 <4>[ 176.120260] RBP: ffff888154a09df0 R08: ffffffff8d64a2e0 R09: 0000000000000001 <4>[ 176.120286] R10: 0000000009f60797 R11: 1ffff1102a947590 R12: ffffea0004089040 <4>[ 176.120314] R13: ffff888154322000 R14: 0000000088418401 R15: 0000000000039408 <4>[ 176.120342] FS: 0000000000000000(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 176.120374] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 176.120402] CR2: 00007f0dd6f6c218 CR3: 0000000105ed8000 CR4: 00000000000006f0 <4>[ 176.120430] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 176.120457] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 176.120485] Call Trace: <4>[ 176.120507] <4>[ 176.120536] ? show_regs+0x68/0x80 <4>[ 176.120587] ? __warn+0xd5/0x260 <4>[ 176.120724] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.120785] ? report_bug+0x278/0x2e0 <4>[ 176.120841] ? handle_bug+0x7b/0xa0 <4>[ 176.120882] ? exc_invalid_op+0x1c/0x50 <4>[ 176.120923] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 176.120977] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 176.121023] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.121071] ? rcu_core_si+0x12/0x20 <4>[ 176.121124] rcu_core+0x683/0x1c80 <4>[ 176.121177] ? __pfx_rcu_core+0x10/0x10 <4>[ 176.121225] ? scsi_complete+0x100/0x1f0 <4>[ 176.121269] ? handle_softirqs+0x18e/0x720 <4>[ 176.121316] rcu_core_si+0x12/0x20 <4>[ 176.121356] handle_softirqs+0x20c/0x720 <4>[ 176.121404] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 176.121453] irq_exit_rcu+0x9c/0xd0 <4>[ 176.121492] common_interrupt+0x90/0xa0 <4>[ 176.121536] <4>[ 176.121556] <4>[ 176.121580] asm_common_interrupt+0x2b/0x40 <4>[ 176.121704] RIP: 0010:default_idle+0xf/0x20 <4>[ 176.121758] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 176.121799] RSP: 0018:ffffffff8d407df0 EFLAGS: 00000202 <4>[ 176.121839] RAX: ffff888154a00000 RBX: ffffffff8d418640 RCX: ffffffff8c0688b5 <4>[ 176.121869] RDX: ffffed102a946ae5 RSI: 0000000000000004 RDI: 00000000000c0dd4 <4>[ 176.121897] RBP: ffffffff8d407df8 R08: 0000000000000001 R09: ffffed102a946ae4 <4>[ 176.121923] R10: ffff888154a35723 R11: 000000000001b400 R12: 0000000000000000 <4>[ 176.121950] R13: fffffbfff1a830c8 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 176.121992] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 176.122049] ? arch_cpu_idle+0xd/0x20 <4>[ 176.122086] default_idle_call+0x48/0x80 <4>[ 176.122125] do_idle+0x313/0x3c0 <4>[ 176.122173] ? __pfx_do_idle+0x10/0x10 <4>[ 176.122225] cpu_startup_entry+0x5c/0x70 <4>[ 176.122267] rest_init+0x11a/0x140 <4>[ 176.122306] ? acpi_subsystem_init+0x5d/0x150 <4>[ 176.122354] start_kernel+0x31b/0x400 <4>[ 176.122402] x86_64_start_reservations+0x1c/0x30 <4>[ 176.122448] x86_64_start_kernel+0xcf/0xe0 <4>[ 176.122492] common_startup_64+0x12c/0x138 <4>[ 176.122549] <4>[ 176.122570] ---[ end trace 0000000000000000 ]--- <4>[ 176.222777] ------------[ cut here ]------------ <4>[ 176.223212] WARNING: CPU: 1 PID: 0 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.223300] Modules linked in: <4>[ 176.223348] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 176.223405] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 176.223425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 176.223458] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.223504] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 176.223535] RSP: 0018:ffff888154b09db0 EFLAGS: 00000202 <4>[ 176.223569] RAX: 0000000080000000 RBX: ffff888107f3d4c8 RCX: ffff888154200000 <4>[ 176.223592] RDX: 000000000012afe0 RSI: ffffffff88ebc501 RDI: ffff88815432afe0 <4>[ 176.223775] RBP: ffff888154b09df0 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 176.223811] R10: ffffffff8df3348f R11: 00000000fffe1447 R12: ffffea00041fcf40 <4>[ 176.223835] R13: ffff88815432afe0 R14: 0000000000838501 R15: 0000000000039408 <4>[ 176.223857] FS: 0000000000000000(0000) GS:ffff888154b00000(0000) knlGS:0000000000000000 <4>[ 176.223884] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 176.223907] CR2: 00007fd655a06480 CR3: 00000001684b4000 CR4: 00000000000006f0 <4>[ 176.223928] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791023 <4>[ 176.223951] DR3: ffffffff8e791025 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 176.223974] Call Trace: <4>[ 176.223998] <4>[ 176.224027] ? show_regs+0x68/0x80 <4>[ 176.224072] ? __warn+0xd5/0x260 <4>[ 176.224102] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.224140] ? report_bug+0x278/0x2e0 <4>[ 176.224182] ? handle_bug+0x7b/0xa0 <4>[ 176.224213] ? exc_invalid_op+0x1c/0x50 <4>[ 176.224245] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 176.224286] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 176.224321] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 176.224358] ? rcu_core_si+0x12/0x20 <4>[ 176.224397] rcu_core+0x683/0x1c80 <4>[ 176.224441] ? __pfx_rcu_core+0x10/0x10 <4>[ 176.224478] ? lapic_next_event+0x19/0x30 <4>[ 176.224510] ? handle_softirqs+0x18e/0x720 <4>[ 176.224546] rcu_core_si+0x12/0x20 <4>[ 176.224591] handle_softirqs+0x20c/0x720 <4>[ 176.224724] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 176.224774] irq_exit_rcu+0x9c/0xd0 <4>[ 176.224806] sysvec_apic_timer_interrupt+0x7e/0x90 <4>[ 176.224846] <4>[ 176.224862] <4>[ 176.224879] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 176.224915] RIP: 0010:default_idle+0xf/0x20 <4>[ 176.224947] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 1a 3f 00 fb f4 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 <4>[ 176.224976] RSP: 0018:ffff888100867de0 EFLAGS: 00000206 <4>[ 176.225008] RAX: ffff888154b00000 RBX: ffff88810083bf00 RCX: ffffffff8c0688b5 <4>[ 176.225033] RDX: ffffed102a966ae5 RSI: 0000000000000004 RDI: 0000000000084764 <4>[ 176.225055] RBP: ffff888100867de8 R08: 0000000000000001 R09: ffffed102a966ae4 <4>[ 176.225084] R10: ffff888154b35723 R11: 000000000001d000 R12: 0000000000000001 <4>[ 176.225131] R13: ffffed10201077e0 R14: ffffffff8df33488 R15: 0000000000000000 <4>[ 176.225183] ? ct_kernel_exit.constprop.0+0xa5/0xd0 <4>[ 176.225230] ? arch_cpu_idle+0xd/0x20 <4>[ 176.225267] default_idle_call+0x48/0x80 <4>[ 176.225322] do_idle+0x313/0x3c0 <4>[ 176.225373] ? __pfx_do_idle+0x10/0x10 <4>[ 176.225425] cpu_startup_entry+0x5c/0x70 <4>[ 176.225460] start_secondary+0x214/0x290 <4>[ 176.225499] ? __pfx_start_secondary+0x10/0x10 <4>[ 176.225540] common_startup_64+0x12c/0x138 <4>[ 176.225586] <4>[ 176.225604] ---[ end trace 0000000000000000 ]--- INFO: Kernel config CONFIG_KUNIT_TEST=y not enabled dmesg pass <4>[ 177.693743] ------------[ cut here ]------------ <4>[ 177.693993] WARNING: CPU: 0 PID: 3458 at mm/slub.c:4550 slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 177.694053] Modules linked in: <4>[ 177.694087] CPU: 0 UID: 0 PID: 3458 Comm: python3 Tainted: G B D W N 6.11.0-rc2-next-20240807 #1 <4>[ 177.694124] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST <4>[ 177.694135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 <4>[ 177.694148] RIP: 0010:slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 177.694177] Code: 02 00 00 48 89 d8 41 0f 94 c6 48 29 c8 48 3d ff ff 1f 00 0f 86 1c ff ff ff e9 20 ff ff ff 45 84 f6 75 06 90 0f 0b 90 eb 8a 90 <0f> 0b 90 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc <4>[ 177.694200] RSP: 0000:ffff8881031c7cf0 EFLAGS: 00000202 <4>[ 177.694222] RAX: 0000000080000000 RBX: ffff888104f31000 RCX: ffff888154200000 <4>[ 177.694237] RDX: 000000000015c000 RSI: ffffffff88ebc501 RDI: ffff88815435c000 <4>[ 177.694250] RBP: ffff8881031c7d30 R08: ffffffff8d64a2e0 R09: fffffbfff1be6691 <4>[ 177.694264] R10: ffffffff8df3348f R11: 00000000000ed000 R12: ffffea000413cc40 <4>[ 177.694278] R13: ffff88815435c000 R14: 0000000000c94401 R15: 0000000000039408 <4>[ 177.694291] FS: 00007f4f490f7040(0000) GS:ffff888154a00000(0000) knlGS:0000000000000000 <4>[ 177.694307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[ 177.694320] CR2: 00007f4f48e51030 CR3: 0000000108752000 CR4: 00000000000006f0 <4>[ 177.694332] DR0: ffffffff8e791020 DR1: ffffffff8e791021 DR2: ffffffff8e791022 <4>[ 177.694345] DR3: ffffffff8e791023 DR6: 00000000ffff0ff0 DR7: 0000000000000600 <4>[ 177.694358] Call Trace: <4>[ 177.694371] <4>[ 177.694388] ? show_regs+0x68/0x80 <4>[ 177.694414] ? __warn+0xd5/0x260 <4>[ 177.694433] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 177.694454] ? report_bug+0x278/0x2e0 <4>[ 177.694482] ? handle_bug+0x7b/0xa0 <4>[ 177.694500] ? exc_invalid_op+0x1c/0x50 <4>[ 177.694518] ? asm_exc_invalid_op+0x1f/0x30 <4>[ 177.694544] ? __pfx_slab_free_after_rcu_debug+0x1/0x10 <4>[ 177.694569] ? slab_free_after_rcu_debug+0x1c9/0x270 <4>[ 177.694591] ? rcu_core_si+0x12/0x20 <4>[ 177.694641] rcu_core+0x683/0x1c80 <4>[ 177.694687] ? __pfx_rcu_core+0x10/0x10 <4>[ 177.694713] ? lapic_next_event+0x19/0x30 <4>[ 177.694734] ? handle_softirqs+0x18e/0x720 <4>[ 177.694758] rcu_core_si+0x12/0x20 <4>[ 177.694784] handle_softirqs+0x20c/0x720 <4>[ 177.694938] ? __pfx_handle_softirqs+0x10/0x10 <4>[ 177.695016] ? trace_preempt_on+0x20/0xc0 <4>[ 177.695042] ? irq_exit_rcu+0x20/0xd0 <4>[ 177.695063] irq_exit_rcu+0x9c/0xd0 <4>[ 177.695083] sysvec_apic_timer_interrupt+0x41/0x90 <4>[ 177.695108] asm_sysvec_apic_timer_interrupt+0x1f/0x30 <4>[ 177.695130] RIP: 0033:0x47c606 <4>[ 177.695159] Code: 01 00 00 48 85 f6 0f 85 b8 00 00 00 48 83 05 18 c7 5d 00 01 48 c7 07 08 8d a5 00 49 83 2c 24 01 75 12 4c 89 e7 e8 2a 01 06 00 <66> 2e 0f 1f 84 00 00 00 00 00 31 c0 48 83 c4 08 5b 5d 41 5c 41 5d <4>[ 177.695181] RSP: 002b:00007fff4d800170 EFLAGS: 00000206 <4>[ 177.695211] RAX: 00007f4f48e50000 RBX: 0000000000000000 RCX: 00007f4f48e510b0 <4>[ 177.695227] RDX: 0000000000000041 RSI: 00007f4f48e51070 RDI: 0000000000051070 <4>[ 177.695240] RBP: 00007fff4d800248 R08: 0000000000035000 R09: 0000000000000019 <4>[ 177.695251] R10: 0000000000000000 R11: 0000000000000004 R12: 00007f4f48e51070 <4>[ 177.695264] R13: 00007fff4d800240 R14: 0000000028509180 R15: 00007fff4d800430 <4>[ 177.695285] <4>[ 177.695296] ---[ end trace 0000000000000000 ]--- + ../../utils/send-to-lava.sh ./output/result.txt <8>[ 178.419596] + set +x <8>[ 178.444433] [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# poweroff