- fs_fill (clang-19-lkftconfig-compat)
Home
Home
Home
Home
seccomp_seccomp_benchmark_entry_2_bitmapped fail
Home
cgroup_test_cpu_test_cpucg_subtree_control pass
cgroup_test_cpu_test_cpucg_stats pass
cgroup_test_cpu_test_cpucg_nice pass
cgroup_test_cpu_test_cpucg_weight_overprovisioned pass
cgroup_test_cpu_test_cpucg_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
cgroup_test_cpu_test_cpucg_nested_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_max pass
cgroup_test_cpu_test_cpucg_max_nested pass
cgroup_test_cpu fail
cgroup_test_cpuset skip
cgroup_test_cpuset_prs_sh skip
cgroup_test_cpuset_v1_hp_sh skip
Home
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
Home
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 36103ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 39667ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 34930ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 19423ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 20546ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 19579ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 23200ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 8226ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 12174ms
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 262258us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 424466us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
Home
cgroup_test_cpu_test_cpucg_stats pass
cgroup_test_cpu_test_cpucg_nice pass
cgroup_test_cpu_test_cpucg_weight_overprovisioned pass
cgroup_test_cpu_test_c[ 93.559814] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=mqueue:mq_perf_tests RESULT=skip>
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
cgroup_test_cpu_test_cpucg_nested_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_max fail
cgroup_test_cpu_test_cpucg_max_nested pass
cgroup_test_cpuset skip
cgroup_test_cpuset_prs_sh skip
cgroup_test_cpuset_v1_hp_sh skip
Home
cgroup_test_cpu_test_cpucg_max fail
cgroup_test_cpu_test_cpucg_max_nested pass
Home
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stPGgAam: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st6leAOQ: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stlHt02w: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: sttTaCAq: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-66b0f1.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-d023e3.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccL1c3nJ.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccuVpgdP.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
[ 47.837212] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 47.838065] Modules linked in:
[ 47.841821] CPU: 0 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 47.843060] Tainted: [N]=TEST
[ 47.843550] Hardware name: linux,dummy-virt (DT)
[ 47.844599] pstate: 81400009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 47.845421] pc : kunit_test_null_dereference+0x2c/0x114
[ 47.847188] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[ 47.847855] sp : ffff800082eb7dd0
[ 47.848394] x29: ffff800082eb7de0 x28: 0000000000000000 x27: 1ffe00001900c4a1
[ 47.849720] x26: dfff800000000000 x25: ffff9e3faed08ed4 x24: fff00000c7c532a0
[ 47.850869] x23: 1ffe000018f8a641 x22: dfff800000000000 x21: dfff800000000000
[ 47.851934] x20: ffff9e3faed1631c x19: fff00000c7c53208 x18: ffff800080097930
[ 47.852998] x17: ffff80008009792c x16: 0000000000000000 x15: 0000000000000001
[ 47.854051] x14: 1ffe00001900c591 x13: 0000000000000000 x12: 0000000000000000
[ 47.855091] x11: fffd80001900c592 x10: dfff800000000000 x9 : 1ffe000018f8a642
[ 47.856253] x8 : 13a75d07ebd21e00 x7 : ffff80008009793c x6 : 0000000000000014
[ 47.857645] x5 : 00000000b13a34ac x4 : 0000000000000001 x3 : ffff9e3fb0b5afd8
[ 47.858619] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[ 47.859864] Call trace:
[ 47.860542] kunit_test_null_dereference+0x2c/0x114 (P)
[ 47.861652] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 47.862336] kthread+0x25c/0x35c
[ 47.862905] ret_from_fork+0x10/0x20
[ 47.864182] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8)
[ 47.865265] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 4.415092] ### dt-test ### EXPECT \ : WARNING: <<all>>
[ 4.415679] ### dt-test ### EXPECT \ : refcount_t: underflow; use-after-free.
[ 4.416154] ### dt-test ### EXPECT \ : ---[ end trace <<int>> ]---
[ 4.416698] ### dt-test ### pass of_unittest_lifecycle():3507
[ 4.417918] ------------[ cut here ]------------
[ 4.418622] refcount_t: underflow; use-after-free.
[ 4.420043] WARNING: CPU: 1 PID: 1 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148
[ 4.421547] Modules linked in:
[ 4.422979] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Tainted: G N 6.13.0-rc7 #1
[ 4.423790] Tainted: [N]=TEST
[ 4.424106] Hardware name: linux,dummy-virt (DT)
[ 4.424732] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 4.425448] pc : refcount_warn_saturate+0xf4/0x148
[ 4.425931] lr : refcount_warn_saturate+0xf4/0x148
[ 4.426443] sp : ffff80008002bbe0
[ 4.426758] x29: ffff80008002bbe0 x28: ffffa672000b3fb8 x27: ffffa672002b2e20
[ 4.427615] x26: ffffa671ffbc8110 x25: ffffa672000b3fb8 x24: ffffa671ffbc8a70
[ 4.428412] x23: ffffa672002b2e20 x22: fff00000c178e2c0 x21: ffffa67200ef1000
[ 4.428963] x20: ffffa672002b2e10 x19: fff00000c178e340 x18: 0000000000000006
[ 4.429723] x17: 0000000043964ea7 x16: 00000000d6c6f5e7 x15: ffff80008002b600
[ 4.430345] x14: ffff80010002b7ba x13: ffff80008002b7c2 x12: 0000000000000000
[ 4.431049] x11: fffffffffffe0000 x10: ffffa6720084e080 x9 : ffffa671fe148d60
[ 4.431767] x8 : 00000000ffffefff x7 : ffffa6720084e080 x6 : 80000000fffff000
[ 4.432417] x5 : 00000000000002a2 x4 : 0000000000000000 x3 : 0000000000000000
[ 4.433035] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c02e0000
[ 4.433934] Call trace:
[ 4.434494] refcount_warn_saturate+0xf4/0x148 (P)
[ 4.435147] kobject_put+0x16c/0x218
[ 4.435523] of_node_put+0x20/0x38
[ 4.435874] of_unittest+0x1ed0/0x2d28
[ 4.436258] do_one_initcall+0x60/0x298
[ 4.436669] kernel_init_freeable+0x204/0x3d8
[ 4.437154] kernel_init+0x28/0x1f0
[ 4.437526] ret_from_fork+0x10/0x20
[ 4.438209] ---[ end trace 0000000000000000 ]---
Home
[ 31.142677] ==================================================================
[ 31.143486] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[ 31.144386] Free of addr fff00000c5abd160 by task kunit_try_catch/180
[ 31.144868]
[ 31.145252] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.146563] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.147142] Hardware name: linux,dummy-virt (DT)
[ 31.147752] Call trace:
[ 31.148200] show_stack+0x20/0x38 (C)
[ 31.148808] dump_stack_lvl+0x8c/0xd0
[ 31.149440] print_report+0x118/0x5e0
[ 31.150325] kasan_report_invalid_free+0xb0/0xd8
[ 31.150915] check_slab_allocation+0xd4/0x108
[ 31.151577] __kasan_slab_pre_free+0x2c/0x48
[ 31.152251] kfree+0xe8/0x3c8
[ 31.152786] kfree_sensitive+0x3c/0xb0
[ 31.153315] kmalloc_double_kzfree+0x168/0x308
[ 31.154288] kunit_try_run_case+0x14c/0x3d0
[ 31.154854] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.155569] kthread+0x24c/0x2d0
[ 31.156100] ret_from_fork+0x10/0x20
[ 31.156615]
[ 31.156958] Allocated by task 180:
[ 31.157487] kasan_save_stack+0x3c/0x68
[ 31.158083] kasan_save_track+0x20/0x40
[ 31.158932] kasan_save_alloc_info+0x40/0x58
[ 31.159483] __kasan_kmalloc+0xd4/0xd8
[ 31.160096] __kmalloc_cache_noprof+0x15c/0x3c0
[ 31.160679] kmalloc_double_kzfree+0xb8/0x308
[ 31.161290] kunit_try_run_case+0x14c/0x3d0
[ 31.162107] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.162675] kthread+0x24c/0x2d0
[ 31.163211] ret_from_fork+0x10/0x20
[ 31.163730]
[ 31.165025] Freed by task 180:
[ 31.165419] kasan_save_stack+0x3c/0x68
[ 31.166333] kasan_save_track+0x20/0x40
[ 31.167063] kasan_save_free_info+0x4c/0x78
[ 31.167630] __kasan_slab_free+0x6c/0x98
[ 31.168451] kfree+0x114/0x3c8
[ 31.168965] kfree_sensitive+0x80/0xb0
[ 31.169602] kmalloc_double_kzfree+0x11c/0x308
[ 31.170547] kunit_try_run_case+0x14c/0x3d0
[ 31.171093] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.171410] kthread+0x24c/0x2d0
[ 31.171632] ret_from_fork+0x10/0x20
[ 31.171866]
[ 31.172065] The buggy address belongs to the object at fff00000c5abd160
[ 31.172065] which belongs to the cache kmalloc-16 of size 16
[ 31.172831] The buggy address is located 0 bytes inside of
[ 31.172831] 16-byte region [fff00000c5abd160, fff00000c5abd170)
[ 31.174920]
[ 31.175283] The buggy address belongs to the physical page:
[ 31.175991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 31.176814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.177550] page_type: f5(slab)
[ 31.177992] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 31.179037] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 31.179865] page dumped because: kasan: bad access detected
[ 31.180598]
[ 31.180898] Memory state around the buggy address:
[ 31.181525] fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[ 31.182623] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 31.183911] >fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 31.184646] ^
[ 31.185439] fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.186533] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.187168] ==================================================================
Home
[ 33.871336] ==================================================================
[ 33.872155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 33.873088] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 33.873725]
[ 33.875397] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.876226] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.876778] Hardware name: linux,dummy-virt (DT)
[ 33.877413] Call trace:
[ 33.877864] show_stack+0x20/0x38 (C)
[ 33.878476] dump_stack_lvl+0x8c/0xd0
[ 33.879240] print_report+0x118/0x5e0
[ 33.879832] kasan_report+0xc8/0x118
[ 33.880406] __asan_report_load8_noabort+0x20/0x30
[ 33.881049] kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 33.881788] kasan_bitops_generic+0x110/0x1c8
[ 33.882693] kunit_try_run_case+0x14c/0x3d0
[ 33.883291] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.883994] kthread+0x24c/0x2d0
[ 33.884509] ret_from_fork+0x10/0x20
[ 33.885074]
[ 33.885409] Allocated by task 249:
[ 33.886106] kasan_save_stack+0x3c/0x68
[ 33.886698] kasan_save_track+0x20/0x40
[ 33.887429] kasan_save_alloc_info+0x40/0x58
[ 33.887994] __kasan_kmalloc+0xd4/0xd8
[ 33.888506] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.889413] kasan_bitops_generic+0xa0/0x1c8
[ 33.890323] kunit_try_run_case+0x14c/0x3d0
[ 33.890884] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.891478] kthread+0x24c/0x2d0
[ 33.892096] ret_from_fork+0x10/0x20
[ 33.892626]
[ 33.892800] The buggy address belongs to the object at fff00000c5abd180
[ 33.892800] which belongs to the cache kmalloc-16 of size 16
[ 33.893777] The buggy address is located 8 bytes inside of
[ 33.893777] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 33.895661]
[ 33.895870] The buggy address belongs to the physical page:
[ 33.896387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 33.897681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.898923] page_type: f5(slab)
[ 33.899428] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 33.900454] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 33.901212] page dumped because: kasan: bad access detected
[ 33.902314]
[ 33.902630] Memory state around the buggy address:
[ 33.903268] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.904212] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.905066] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.905784] ^
[ 33.906680] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.907682] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.908651] ==================================================================
---
[ 34.179309] ==================================================================
[ 34.180126] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 34.180832] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.181551]
[ 34.181933] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.182943] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.183548] Hardware name: linux,dummy-virt (DT)
[ 34.184224] Call trace:
[ 34.184666] show_stack+0x20/0x38 (C)
[ 34.185321] dump_stack_lvl+0x8c/0xd0
[ 34.185963] print_report+0x118/0x5e0
[ 34.186544] kasan_report+0xc8/0x118
[ 34.187185] __asan_report_load8_noabort+0x20/0x30
[ 34.187895] kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 34.188534] kasan_bitops_generic+0x110/0x1c8
[ 34.189248] kunit_try_run_case+0x14c/0x3d0
[ 34.189896] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.190604] kthread+0x24c/0x2d0
[ 34.191227] ret_from_fork+0x10/0x20
[ 34.191763]
[ 34.192169] Allocated by task 249:
[ 34.192719] kasan_save_stack+0x3c/0x68
[ 34.193307] kasan_save_track+0x20/0x40
[ 34.193884] kasan_save_alloc_info+0x40/0x58
[ 34.194536] __kasan_kmalloc+0xd4/0xd8
[ 34.195073] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.195833] kasan_bitops_generic+0xa0/0x1c8
[ 34.196469] kunit_try_run_case+0x14c/0x3d0
[ 34.197148] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.197788] kthread+0x24c/0x2d0
[ 34.198386] ret_from_fork+0x10/0x20
[ 34.198964]
[ 34.199371] The buggy address belongs to the object at fff00000c5abd180
[ 34.199371] which belongs to the cache kmalloc-16 of size 16
[ 34.200617] The buggy address is located 8 bytes inside of
[ 34.200617] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.201840]
[ 34.202239] The buggy address belongs to the physical page:
[ 34.202986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.203881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.204767] page_type: f5(slab)
[ 34.205334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.206219] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.207098] page dumped because: kasan: bad access detected
[ 34.207766]
[ 34.208128] Memory state around the buggy address:
[ 34.208790] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.209493] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.210323] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.211120] ^
[ 34.211643] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.212401] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.213206] ==================================================================
---
[ 33.951375] ==================================================================
[ 33.952098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 33.952854] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 33.953693]
[ 33.955174] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.956475] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.957131] Hardware name: linux,dummy-virt (DT)
[ 33.957406] Call trace:
[ 33.957593] show_stack+0x20/0x38 (C)
[ 33.958268] dump_stack_lvl+0x8c/0xd0
[ 33.958839] print_report+0x118/0x5e0
[ 33.959620] kasan_report+0xc8/0x118
[ 33.960258] __asan_report_load8_noabort+0x20/0x30
[ 33.960946] kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 33.961602] kasan_bitops_generic+0x110/0x1c8
[ 33.962740] kunit_try_run_case+0x14c/0x3d0
[ 33.963511] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.964323] kthread+0x24c/0x2d0
[ 33.964797] ret_from_fork+0x10/0x20
[ 33.965286]
[ 33.965651] Allocated by task 249:
[ 33.966656] kasan_save_stack+0x3c/0x68
[ 33.967362] kasan_save_track+0x20/0x40
[ 33.967939] kasan_save_alloc_info+0x40/0x58
[ 33.968519] __kasan_kmalloc+0xd4/0xd8
[ 33.969151] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.969762] kasan_bitops_generic+0xa0/0x1c8
[ 33.970640] kunit_try_run_case+0x14c/0x3d0
[ 33.971314] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.971995] kthread+0x24c/0x2d0
[ 33.972593] ret_from_fork+0x10/0x20
[ 33.973192]
[ 33.973537] The buggy address belongs to the object at fff00000c5abd180
[ 33.973537] which belongs to the cache kmalloc-16 of size 16
[ 33.974989] The buggy address is located 8 bytes inside of
[ 33.974989] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 33.976147]
[ 33.977057] The buggy address belongs to the physical page:
[ 33.978078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 33.979105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.980082] page_type: f5(slab)
[ 33.980571] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 33.981364] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 33.982105] page dumped because: kasan: bad access detected
[ 33.982812]
[ 33.983156] Memory state around the buggy address:
[ 33.983804] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.985022] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.986131] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.986851] ^
[ 33.987373] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.988251] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.989073] ==================================================================
---
[ 34.068683] ==================================================================
[ 34.070468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 34.071322] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.072392]
[ 34.073108] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.074065] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.074574] Hardware name: linux,dummy-virt (DT)
[ 34.075145] Call trace:
[ 34.075868] show_stack+0x20/0x38 (C)
[ 34.076624] dump_stack_lvl+0x8c/0xd0
[ 34.077330] print_report+0x118/0x5e0
[ 34.078045] kasan_report+0xc8/0x118
[ 34.078739] __asan_report_load8_noabort+0x20/0x30
[ 34.079546] kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 34.080371] kasan_bitops_generic+0x110/0x1c8
[ 34.080942] kunit_try_run_case+0x14c/0x3d0
[ 34.081527] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.082241] kthread+0x24c/0x2d0
[ 34.082781] ret_from_fork+0x10/0x20
[ 34.083330]
[ 34.083685] Allocated by task 249:
[ 34.084223] kasan_save_stack+0x3c/0x68
[ 34.084726] kasan_save_track+0x20/0x40
[ 34.085325] kasan_save_alloc_info+0x40/0x58
[ 34.085900] __kasan_kmalloc+0xd4/0xd8
[ 34.086518] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.087174] kasan_bitops_generic+0xa0/0x1c8
[ 34.087809] kunit_try_run_case+0x14c/0x3d0
[ 34.088368] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.089115] kthread+0x24c/0x2d0
[ 34.089637] ret_from_fork+0x10/0x20
[ 34.090172]
[ 34.090536] The buggy address belongs to the object at fff00000c5abd180
[ 34.090536] which belongs to the cache kmalloc-16 of size 16
[ 34.091685] The buggy address is located 8 bytes inside of
[ 34.091685] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.092858]
[ 34.093229] The buggy address belongs to the physical page:
[ 34.093743] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.094721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.095417] page_type: f5(slab)
[ 34.095945] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.096667] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.097560] page dumped because: kasan: bad access detected
[ 34.098205]
[ 34.098566] Memory state around the buggy address:
[ 34.099217] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.100019] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.100756] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.101472] ^
[ 34.101989] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.102750] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.103561] ==================================================================
Home
[ 33.830320] ==================================================================
[ 33.831523] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[ 33.832558] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 33.833871]
[ 33.834551] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.835488] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.835972] Hardware name: linux,dummy-virt (DT)
[ 33.836949] Call trace:
[ 33.837540] show_stack+0x20/0x38 (C)
[ 33.838379] dump_stack_lvl+0x8c/0xd0
[ 33.839136] print_report+0x118/0x5e0
[ 33.839861] kasan_report+0xc8/0x118
[ 33.840599] kasan_check_range+0x100/0x1a8
[ 33.841368] __kasan_check_write+0x20/0x30
[ 33.842340] kasan_bitops_modify.constprop.0+0x100/0xbc8
[ 33.843205] kasan_bitops_generic+0x110/0x1c8
[ 33.843993] kunit_try_run_case+0x14c/0x3d0
[ 33.844783] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.845525] kthread+0x24c/0x2d0
[ 33.846468] ret_from_fork+0x10/0x20
[ 33.846997]
[ 33.847451] Allocated by task 249:
[ 33.848084] kasan_save_stack+0x3c/0x68
[ 33.848655] kasan_save_track+0x20/0x40
[ 33.849430] kasan_save_alloc_info+0x40/0x58
[ 33.850197] __kasan_kmalloc+0xd4/0xd8
[ 33.850669] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.851125] kasan_bitops_generic+0xa0/0x1c8
[ 33.851886] kunit_try_run_case+0x14c/0x3d0
[ 33.852620] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.853382] kthread+0x24c/0x2d0
[ 33.854211] ret_from_fork+0x10/0x20
[ 33.854665]
[ 33.854929] The buggy address belongs to the object at fff00000c5abd180
[ 33.854929] which belongs to the cache kmalloc-16 of size 16
[ 33.856670] The buggy address is located 8 bytes inside of
[ 33.856670] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 33.857886]
[ 33.858252] The buggy address belongs to the physical page:
[ 33.859215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 33.860131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.860810] page_type: f5(slab)
[ 33.861363] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 33.862282] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 33.863153] page dumped because: kasan: bad access detected
[ 33.863756]
[ 33.864237] Memory state around the buggy address:
[ 33.864771] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.865577] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.866439] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.867087] ^
[ 33.867623] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.868755] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.869478] ==================================================================
---
[ 34.030884] ==================================================================
[ 34.031587] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[ 34.032627] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.033308]
[ 34.033685] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.035240] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.035716] Hardware name: linux,dummy-virt (DT)
[ 34.036292] Call trace:
[ 34.036720] show_stack+0x20/0x38 (C)
[ 34.037300] dump_stack_lvl+0x8c/0xd0
[ 34.037877] print_report+0x118/0x5e0
[ 34.038471] kasan_report+0xc8/0x118
[ 34.038953] kasan_check_range+0x100/0x1a8
[ 34.039621] __kasan_check_write+0x20/0x30
[ 34.040184] kasan_bitops_modify.constprop.0+0x320/0xbc8
[ 34.040920] kasan_bitops_generic+0x110/0x1c8
[ 34.041468] kunit_try_run_case+0x14c/0x3d0
[ 34.042303] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.043292] kthread+0x24c/0x2d0
[ 34.043789] ret_from_fork+0x10/0x20
[ 34.044336]
[ 34.044639] Allocated by task 249:
[ 34.045453] kasan_save_stack+0x3c/0x68
[ 34.045880] kasan_save_track+0x20/0x40
[ 34.046702] kasan_save_alloc_info+0x40/0x58
[ 34.047253] __kasan_kmalloc+0xd4/0xd8
[ 34.047812] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.048422] kasan_bitops_generic+0xa0/0x1c8
[ 34.049053] kunit_try_run_case+0x14c/0x3d0
[ 34.049602] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.050627] kthread+0x24c/0x2d0
[ 34.051126] ret_from_fork+0x10/0x20
[ 34.051658]
[ 34.051988] The buggy address belongs to the object at fff00000c5abd180
[ 34.051988] which belongs to the cache kmalloc-16 of size 16
[ 34.053187] The buggy address is located 8 bytes inside of
[ 34.053187] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.055019]
[ 34.055366] The buggy address belongs to the physical page:
[ 34.055991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.057538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.058179] page_type: f5(slab)
[ 34.058706] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.059899] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.060841] page dumped because: kasan: bad access detected
[ 34.061461]
[ 34.061793] Memory state around the buggy address:
[ 34.062309] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.063180] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.063906] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.064729] ^
[ 34.065242] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.065993] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.066818] ==================================================================
---
[ 34.140973] ==================================================================
[ 34.141734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[ 34.142698] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.143699]
[ 34.144580] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.145513] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.146550] Hardware name: linux,dummy-virt (DT)
[ 34.147625] Call trace:
[ 34.148098] show_stack+0x20/0x38 (C)
[ 34.148713] dump_stack_lvl+0x8c/0xd0
[ 34.149596] print_report+0x118/0x5e0
[ 34.150364] kasan_report+0xc8/0x118
[ 34.150925] kasan_check_range+0x100/0x1a8
[ 34.151495] __kasan_check_write+0x20/0x30
[ 34.152140] kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[ 34.152711] kasan_bitops_generic+0x110/0x1c8
[ 34.153391] kunit_try_run_case+0x14c/0x3d0
[ 34.153964] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.154695] kthread+0x24c/0x2d0
[ 34.155237] ret_from_fork+0x10/0x20
[ 34.155786]
[ 34.156162] Allocated by task 249:
[ 34.156678] kasan_save_stack+0x3c/0x68
[ 34.157305] kasan_save_track+0x20/0x40
[ 34.157844] kasan_save_alloc_info+0x40/0x58
[ 34.158350] __kasan_kmalloc+0xd4/0xd8
[ 34.158928] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.159586] kasan_bitops_generic+0xa0/0x1c8
[ 34.160181] kunit_try_run_case+0x14c/0x3d0
[ 34.160795] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.161526] kthread+0x24c/0x2d0
[ 34.162077] ret_from_fork+0x10/0x20
[ 34.162646]
[ 34.162981] The buggy address belongs to the object at fff00000c5abd180
[ 34.162981] which belongs to the cache kmalloc-16 of size 16
[ 34.164078] The buggy address is located 8 bytes inside of
[ 34.164078] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.165274]
[ 34.165628] The buggy address belongs to the physical page:
[ 34.166203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.167066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.167881] page_type: f5(slab)
[ 34.168390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.169341] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.170197] page dumped because: kasan: bad access detected
[ 34.170798]
[ 34.171163] Memory state around the buggy address:
[ 34.171738] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.172460] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.173256] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.174031] ^
[ 34.174484] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.175249] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.175982] ==================================================================
---
[ 33.910397] ==================================================================
[ 33.911167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[ 33.912167] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 33.913070]
[ 33.913548] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.914403] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.914984] Hardware name: linux,dummy-virt (DT)
[ 33.915486] Call trace:
[ 33.915921] show_stack+0x20/0x38 (C)
[ 33.917067] dump_stack_lvl+0x8c/0xd0
[ 33.917642] print_report+0x118/0x5e0
[ 33.918589] kasan_report+0xc8/0x118
[ 33.919311] kasan_check_range+0x100/0x1a8
[ 33.920080] __kasan_check_write+0x20/0x30
[ 33.920860] kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[ 33.921708] kasan_bitops_generic+0x110/0x1c8
[ 33.922671] kunit_try_run_case+0x14c/0x3d0
[ 33.923252] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.923906] kthread+0x24c/0x2d0
[ 33.924369] ret_from_fork+0x10/0x20
[ 33.924881]
[ 33.925381] Allocated by task 249:
[ 33.925806] kasan_save_stack+0x3c/0x68
[ 33.926616] kasan_save_track+0x20/0x40
[ 33.927317] kasan_save_alloc_info+0x40/0x58
[ 33.928045] __kasan_kmalloc+0xd4/0xd8
[ 33.928691] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.929181] kasan_bitops_generic+0xa0/0x1c8
[ 33.930171] kunit_try_run_case+0x14c/0x3d0
[ 33.930732] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.931373] kthread+0x24c/0x2d0
[ 33.931815] ret_from_fork+0x10/0x20
[ 33.932923]
[ 33.933438] The buggy address belongs to the object at fff00000c5abd180
[ 33.933438] which belongs to the cache kmalloc-16 of size 16
[ 33.935142] The buggy address is located 8 bytes inside of
[ 33.935142] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 33.936807]
[ 33.937349] The buggy address belongs to the physical page:
[ 33.938276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 33.939192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.939913] page_type: f5(slab)
[ 33.941044] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 33.941841] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 33.943093] page dumped because: kasan: bad access detected
[ 33.943653]
[ 33.943883] Memory state around the buggy address:
[ 33.944365] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.945110] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 33.945899] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.946792] ^
[ 33.947686] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.948626] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.949549] ==================================================================
---
[ 34.105994] ==================================================================
[ 34.107225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[ 34.107954] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.108608]
[ 34.108904] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.109689] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.110304] Hardware name: linux,dummy-virt (DT)
[ 34.110904] Call trace:
[ 34.111312] show_stack+0x20/0x38 (C)
[ 34.111860] dump_stack_lvl+0x8c/0xd0
[ 34.112393] print_report+0x118/0x5e0
[ 34.113001] kasan_report+0xc8/0x118
[ 34.113615] kasan_check_range+0x100/0x1a8
[ 34.114268] __kasan_check_write+0x20/0x30
[ 34.114921] kasan_bitops_modify.constprop.0+0x344/0xbc8
[ 34.115576] kasan_bitops_generic+0x110/0x1c8
[ 34.116263] kunit_try_run_case+0x14c/0x3d0
[ 34.116790] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.117570] kthread+0x24c/0x2d0
[ 34.118148] ret_from_fork+0x10/0x20
[ 34.118665]
[ 34.119033] Allocated by task 249:
[ 34.119545] kasan_save_stack+0x3c/0x68
[ 34.120142] kasan_save_track+0x20/0x40
[ 34.120685] kasan_save_alloc_info+0x40/0x58
[ 34.121333] __kasan_kmalloc+0xd4/0xd8
[ 34.121914] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.122501] kasan_bitops_generic+0xa0/0x1c8
[ 34.123109] kunit_try_run_case+0x14c/0x3d0
[ 34.123622] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.124336] kthread+0x24c/0x2d0
[ 34.124850] ret_from_fork+0x10/0x20
[ 34.125380]
[ 34.125733] The buggy address belongs to the object at fff00000c5abd180
[ 34.125733] which belongs to the cache kmalloc-16 of size 16
[ 34.126764] The buggy address is located 8 bytes inside of
[ 34.126764] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.128089]
[ 34.128450] The buggy address belongs to the physical page:
[ 34.129172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.129961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.130777] page_type: f5(slab)
[ 34.131330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.132058] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.132951] page dumped because: kasan: bad access detected
[ 34.133671]
[ 34.134028] Memory state around the buggy address:
[ 34.134657] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.135437] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.136151] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.136958] ^
[ 34.137506] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.138288] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.139110] ==================================================================
---
[ 33.991324] ==================================================================
[ 33.992353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[ 33.993208] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 33.993770]
[ 33.995212] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.996164] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.996859] Hardware name: linux,dummy-virt (DT)
[ 33.997623] Call trace:
[ 33.998255] show_stack+0x20/0x38 (C)
[ 33.998991] dump_stack_lvl+0x8c/0xd0
[ 33.999738] print_report+0x118/0x5e0
[ 34.000474] kasan_report+0xc8/0x118
[ 34.001193] kasan_check_range+0x100/0x1a8
[ 34.001933] __kasan_check_write+0x20/0x30
[ 34.002686] kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[ 34.003532] kasan_bitops_generic+0x110/0x1c8
[ 34.004175] kunit_try_run_case+0x14c/0x3d0
[ 34.004748] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.005419] kthread+0x24c/0x2d0
[ 34.005884] ret_from_fork+0x10/0x20
[ 34.006681]
[ 34.006980] Allocated by task 249:
[ 34.007553] kasan_save_stack+0x3c/0x68
[ 34.008142] kasan_save_track+0x20/0x40
[ 34.008789] kasan_save_alloc_info+0x40/0x58
[ 34.009455] __kasan_kmalloc+0xd4/0xd8
[ 34.010141] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.010638] kasan_bitops_generic+0xa0/0x1c8
[ 34.011143] kunit_try_run_case+0x14c/0x3d0
[ 34.011618] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.012263] kthread+0x24c/0x2d0
[ 34.012681] ret_from_fork+0x10/0x20
[ 34.013157]
[ 34.013473] The buggy address belongs to the object at fff00000c5abd180
[ 34.013473] which belongs to the cache kmalloc-16 of size 16
[ 34.015246] The buggy address is located 8 bytes inside of
[ 34.015246] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.016477]
[ 34.016827] The buggy address belongs to the physical page:
[ 34.017477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.018186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.018998] page_type: f5(slab)
[ 34.019559] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.020444] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.021355] page dumped because: kasan: bad access detected
[ 34.021996]
[ 34.022364] Memory state around the buggy address:
[ 34.022994] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.023780] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.024520] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.025322] ^
[ 34.025754] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.026539] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.027388] ==================================================================
Home
[ 34.292358] ==================================================================
[ 34.292945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 34.293872] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.294833]
[ 34.295233] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.296389] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.296897] Hardware name: linux,dummy-virt (DT)
[ 34.297539] Call trace:
[ 34.297984] show_stack+0x20/0x38 (C)
[ 34.298552] dump_stack_lvl+0x8c/0xd0
[ 34.299101] print_report+0x118/0x5e0
[ 34.299790] kasan_report+0xc8/0x118
[ 34.300356] kasan_check_range+0x100/0x1a8
[ 34.300998] __kasan_check_write+0x20/0x30
[ 34.301668] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 34.302521] kasan_bitops_generic+0x11c/0x1c8
[ 34.303153] kunit_try_run_case+0x14c/0x3d0
[ 34.303740] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.304410] kthread+0x24c/0x2d0
[ 34.304966] ret_from_fork+0x10/0x20
[ 34.305582]
[ 34.305976] Allocated by task 249:
[ 34.306479] kasan_save_stack+0x3c/0x68
[ 34.307086] kasan_save_track+0x20/0x40
[ 34.307507] kasan_save_alloc_info+0x40/0x58
[ 34.308138] __kasan_kmalloc+0xd4/0xd8
[ 34.308724] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.309389] kasan_bitops_generic+0xa0/0x1c8
[ 34.310044] kunit_try_run_case+0x14c/0x3d0
[ 34.310667] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.311403] kthread+0x24c/0x2d0
[ 34.311909] ret_from_fork+0x10/0x20
[ 34.312507]
[ 34.312866] The buggy address belongs to the object at fff00000c5abd180
[ 34.312866] which belongs to the cache kmalloc-16 of size 16
[ 34.314234] The buggy address is located 8 bytes inside of
[ 34.314234] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.316135]
[ 34.316581] The buggy address belongs to the physical page:
[ 34.317230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.318071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.318871] page_type: f5(slab)
[ 34.319457] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.320431] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.321420] page dumped because: kasan: bad access detected
[ 34.322184]
[ 34.322591] Memory state around the buggy address:
[ 34.323264] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.324223] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.325102] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.325994] ^
[ 34.326568] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.327454] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.328379] ==================================================================
---
[ 34.216285] ==================================================================
[ 34.217328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 34.218516] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.219338]
[ 34.219724] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.220666] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.221201] Hardware name: linux,dummy-virt (DT)
[ 34.221799] Call trace:
[ 34.222252] show_stack+0x20/0x38 (C)
[ 34.222884] dump_stack_lvl+0x8c/0xd0
[ 34.223637] print_report+0x118/0x5e0
[ 34.224713] kasan_report+0xc8/0x118
[ 34.225405] kasan_check_range+0x100/0x1a8
[ 34.226594] __kasan_check_write+0x20/0x30
[ 34.227096] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 34.228214] kasan_bitops_generic+0x11c/0x1c8
[ 34.228893] kunit_try_run_case+0x14c/0x3d0
[ 34.229634] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.230388] kthread+0x24c/0x2d0
[ 34.230940] ret_from_fork+0x10/0x20
[ 34.231526]
[ 34.231913] Allocated by task 249:
[ 34.232452] kasan_save_stack+0x3c/0x68
[ 34.233093] kasan_save_track+0x20/0x40
[ 34.233732] kasan_save_alloc_info+0x40/0x58
[ 34.234395] __kasan_kmalloc+0xd4/0xd8
[ 34.235022] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.235611] kasan_bitops_generic+0xa0/0x1c8
[ 34.236294] kunit_try_run_case+0x14c/0x3d0
[ 34.236877] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.237622] kthread+0x24c/0x2d0
[ 34.238187] ret_from_fork+0x10/0x20
[ 34.238738]
[ 34.239126] The buggy address belongs to the object at fff00000c5abd180
[ 34.239126] which belongs to the cache kmalloc-16 of size 16
[ 34.240401] The buggy address is located 8 bytes inside of
[ 34.240401] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.241644]
[ 34.242026] The buggy address belongs to the physical page:
[ 34.242713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.243579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.244429] page_type: f5(slab)
[ 34.244962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.245856] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.246696] page dumped because: kasan: bad access detected
[ 34.247365]
[ 34.247711] Memory state around the buggy address:
[ 34.248407] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.249141] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.250048] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.250796] ^
[ 34.251310] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.252161] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.253043] ==================================================================
---
[ 34.366388] ==================================================================
[ 34.367181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 34.368064] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.368770]
[ 34.369164] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.370218] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.370802] Hardware name: linux,dummy-virt (DT)
[ 34.371483] Call trace:
[ 34.371825] show_stack+0x20/0x38 (C)
[ 34.372446] dump_stack_lvl+0x8c/0xd0
[ 34.373053] print_report+0x118/0x5e0
[ 34.373667] kasan_report+0xc8/0x118
[ 34.374305] kasan_check_range+0x100/0x1a8
[ 34.374846] __kasan_check_write+0x20/0x30
[ 34.375513] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 34.376263] kasan_bitops_generic+0x11c/0x1c8
[ 34.376937] kunit_try_run_case+0x14c/0x3d0
[ 34.377613] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.378348] kthread+0x24c/0x2d0
[ 34.378883] ret_from_fork+0x10/0x20
[ 34.379493]
[ 34.379843] Allocated by task 249:
[ 34.380391] kasan_save_stack+0x3c/0x68
[ 34.380961] kasan_save_track+0x20/0x40
[ 34.381560] kasan_save_alloc_info+0x40/0x58
[ 34.382204] __kasan_kmalloc+0xd4/0xd8
[ 34.382740] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.383407] kasan_bitops_generic+0xa0/0x1c8
[ 34.383970] kunit_try_run_case+0x14c/0x3d0
[ 34.384560] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.385305] kthread+0x24c/0x2d0
[ 34.385738] ret_from_fork+0x10/0x20
[ 34.386321]
[ 34.386660] The buggy address belongs to the object at fff00000c5abd180
[ 34.386660] which belongs to the cache kmalloc-16 of size 16
[ 34.387879] The buggy address is located 8 bytes inside of
[ 34.387879] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.389086]
[ 34.389451] The buggy address belongs to the physical page:
[ 34.390105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.390905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.391675] page_type: f5(slab)
[ 34.392172] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.392971] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.394073] page dumped because: kasan: bad access detected
[ 34.394718]
[ 34.395508] Memory state around the buggy address:
[ 34.396064] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.396869] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.397652] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.398403] ^
[ 34.398930] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.399691] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.400455] ==================================================================
---
[ 34.438902] ==================================================================
[ 34.439645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 34.440430] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.441299]
[ 34.441627] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.442517] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.443113] Hardware name: linux,dummy-virt (DT)
[ 34.443735] Call trace:
[ 34.444144] show_stack+0x20/0x38 (C)
[ 34.444798] dump_stack_lvl+0x8c/0xd0
[ 34.445342] print_report+0x118/0x5e0
[ 34.445949] kasan_report+0xc8/0x118
[ 34.446515] kasan_check_range+0x100/0x1a8
[ 34.447164] __kasan_check_write+0x20/0x30
[ 34.447752] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 34.448564] kasan_bitops_generic+0x11c/0x1c8
[ 34.449114] kunit_try_run_case+0x14c/0x3d0
[ 34.449819] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.450539] kthread+0x24c/0x2d0
[ 34.451135] ret_from_fork+0x10/0x20
[ 34.451729]
[ 34.452089] Allocated by task 249:
[ 34.452525] kasan_save_stack+0x3c/0x68
[ 34.453129] kasan_save_track+0x20/0x40
[ 34.453602] kasan_save_alloc_info+0x40/0x58
[ 34.454277] __kasan_kmalloc+0xd4/0xd8
[ 34.454773] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.455428] kasan_bitops_generic+0xa0/0x1c8
[ 34.455815] kunit_try_run_case+0x14c/0x3d0
[ 34.456463] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.457177] kthread+0x24c/0x2d0
[ 34.457607] ret_from_fork+0x10/0x20
[ 34.458188]
[ 34.458529] The buggy address belongs to the object at fff00000c5abd180
[ 34.458529] which belongs to the cache kmalloc-16 of size 16
[ 34.459710] The buggy address is located 8 bytes inside of
[ 34.459710] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.460937]
[ 34.461312] The buggy address belongs to the physical page:
[ 34.461885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.462774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.463460] page_type: f5(slab)
[ 34.463999] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.464828] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.465719] page dumped because: kasan: bad access detected
[ 34.466379]
[ 34.466683] Memory state around the buggy address:
[ 34.467330] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.468017] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.468870] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.469506] ^
[ 34.470053] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.470860] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.471626] ==================================================================
Home
[ 34.508019] ==================================================================
[ 34.508842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[ 34.509739] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.510670]
[ 34.511067] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.511872] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.512480] Hardware name: linux,dummy-virt (DT)
[ 34.513116] Call trace:
[ 34.513527] show_stack+0x20/0x38 (C)
[ 34.514080] dump_stack_lvl+0x8c/0xd0
[ 34.514725] print_report+0x118/0x5e0
[ 34.515345] kasan_report+0xc8/0x118
[ 34.515853] __asan_report_load8_noabort+0x20/0x30
[ 34.516577] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[ 34.517316] kasan_bitops_generic+0x11c/0x1c8
[ 34.517862] kunit_try_run_case+0x14c/0x3d0
[ 34.518526] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.519136] kthread+0x24c/0x2d0
[ 34.519686] ret_from_fork+0x10/0x20
[ 34.520308]
[ 34.520654] Allocated by task 249:
[ 34.521197] kasan_save_stack+0x3c/0x68
[ 34.521791] kasan_save_track+0x20/0x40
[ 34.522313] kasan_save_alloc_info+0x40/0x58
[ 34.522926] __kasan_kmalloc+0xd4/0xd8
[ 34.523548] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.524253] kasan_bitops_generic+0xa0/0x1c8
[ 34.524831] kunit_try_run_case+0x14c/0x3d0
[ 34.525380] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.526131] kthread+0x24c/0x2d0
[ 34.526614] ret_from_fork+0x10/0x20
[ 34.527110]
[ 34.527466] The buggy address belongs to the object at fff00000c5abd180
[ 34.527466] which belongs to the cache kmalloc-16 of size 16
[ 34.528645] The buggy address is located 8 bytes inside of
[ 34.528645] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.529765]
[ 34.530129] The buggy address belongs to the physical page:
[ 34.530790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.531656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.532407] page_type: f5(slab)
[ 34.532898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.533668] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.534589] page dumped because: kasan: bad access detected
[ 34.535204]
[ 34.535559] Memory state around the buggy address:
[ 34.536195] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.536951] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.537632] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.538472] ^
[ 34.538954] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.539708] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.540470] ==================================================================
---
[ 34.331330] ==================================================================
[ 34.332329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[ 34.333232] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.334382]
[ 34.334729] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.335744] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.336264] Hardware name: linux,dummy-virt (DT)
[ 34.336800] Call trace:
[ 34.337242] show_stack+0x20/0x38 (C)
[ 34.337794] dump_stack_lvl+0x8c/0xd0
[ 34.338369] print_report+0x118/0x5e0
[ 34.338923] kasan_report+0xc8/0x118
[ 34.339531] __asan_report_load8_noabort+0x20/0x30
[ 34.340205] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[ 34.340985] kasan_bitops_generic+0x11c/0x1c8
[ 34.341660] kunit_try_run_case+0x14c/0x3d0
[ 34.342225] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.342983] kthread+0x24c/0x2d0
[ 34.343525] ret_from_fork+0x10/0x20
[ 34.344064]
[ 34.344454] Allocated by task 249:
[ 34.344970] kasan_save_stack+0x3c/0x68
[ 34.345488] kasan_save_track+0x20/0x40
[ 34.346086] kasan_save_alloc_info+0x40/0x58
[ 34.346675] __kasan_kmalloc+0xd4/0xd8
[ 34.347263] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.347778] kasan_bitops_generic+0xa0/0x1c8
[ 34.348432] kunit_try_run_case+0x14c/0x3d0
[ 34.349029] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.349675] kthread+0x24c/0x2d0
[ 34.350232] ret_from_fork+0x10/0x20
[ 34.350779]
[ 34.351129] The buggy address belongs to the object at fff00000c5abd180
[ 34.351129] which belongs to the cache kmalloc-16 of size 16
[ 34.352254] The buggy address is located 8 bytes inside of
[ 34.352254] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.353382]
[ 34.353741] The buggy address belongs to the physical page:
[ 34.354398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.355272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.356055] page_type: f5(slab)
[ 34.356552] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.357397] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.358202] page dumped because: kasan: bad access detected
[ 34.358814]
[ 34.359182] Memory state around the buggy address:
[ 34.359743] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.360532] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.361330] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.362001] ^
[ 34.362696] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.363494] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.364296] ==================================================================
---
[ 34.255133] ==================================================================
[ 34.255740] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[ 34.256748] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.258596]
[ 34.258974] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.260055] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.260652] Hardware name: linux,dummy-virt (DT)
[ 34.261215] Call trace:
[ 34.261574] show_stack+0x20/0x38 (C)
[ 34.262087] dump_stack_lvl+0x8c/0xd0
[ 34.262595] print_report+0x118/0x5e0
[ 34.263163] kasan_report+0xc8/0x118
[ 34.263694] __asan_report_load8_noabort+0x20/0x30
[ 34.264447] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[ 34.265241] kasan_bitops_generic+0x11c/0x1c8
[ 34.265965] kunit_try_run_case+0x14c/0x3d0
[ 34.266621] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.267369] kthread+0x24c/0x2d0
[ 34.268033] ret_from_fork+0x10/0x20
[ 34.268662]
[ 34.269050] Allocated by task 249:
[ 34.269619] kasan_save_stack+0x3c/0x68
[ 34.270236] kasan_save_track+0x20/0x40
[ 34.270890] kasan_save_alloc_info+0x40/0x58
[ 34.271566] __kasan_kmalloc+0xd4/0xd8
[ 34.272187] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.272880] kasan_bitops_generic+0xa0/0x1c8
[ 34.273560] kunit_try_run_case+0x14c/0x3d0
[ 34.274224] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.274962] kthread+0x24c/0x2d0
[ 34.275542] ret_from_fork+0x10/0x20
[ 34.276173]
[ 34.276555] The buggy address belongs to the object at fff00000c5abd180
[ 34.276555] which belongs to the cache kmalloc-16 of size 16
[ 34.277815] The buggy address is located 8 bytes inside of
[ 34.277815] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.279126]
[ 34.279548] The buggy address belongs to the physical page:
[ 34.280333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.281245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.282098] page_type: f5(slab)
[ 34.282633] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.283564] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.284456] page dumped because: kasan: bad access detected
[ 34.285165]
[ 34.285547] Memory state around the buggy address:
[ 34.286199] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.287074] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.287922] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.288662] ^
[ 34.289088] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.289765] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.290338] ==================================================================
---
[ 34.403196] ==================================================================
[ 34.403834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[ 34.404869] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.405619]
[ 34.406058] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.407035] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.407572] Hardware name: linux,dummy-virt (DT)
[ 34.408213] Call trace:
[ 34.408655] show_stack+0x20/0x38 (C)
[ 34.409228] dump_stack_lvl+0x8c/0xd0
[ 34.409842] print_report+0x118/0x5e0
[ 34.410459] kasan_report+0xc8/0x118
[ 34.411023] __asan_report_load8_noabort+0x20/0x30
[ 34.411710] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[ 34.412456] kasan_bitops_generic+0x11c/0x1c8
[ 34.413113] kunit_try_run_case+0x14c/0x3d0
[ 34.413645] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.414449] kthread+0x24c/0x2d0
[ 34.414944] ret_from_fork+0x10/0x20
[ 34.415535]
[ 34.415857] Allocated by task 249:
[ 34.416326] kasan_save_stack+0x3c/0x68
[ 34.416928] kasan_save_track+0x20/0x40
[ 34.417444] kasan_save_alloc_info+0x40/0x58
[ 34.418090] __kasan_kmalloc+0xd4/0xd8
[ 34.418601] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.419281] kasan_bitops_generic+0xa0/0x1c8
[ 34.419895] kunit_try_run_case+0x14c/0x3d0
[ 34.420497] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.421249] kthread+0x24c/0x2d0
[ 34.421770] ret_from_fork+0x10/0x20
[ 34.422357]
[ 34.422702] The buggy address belongs to the object at fff00000c5abd180
[ 34.422702] which belongs to the cache kmalloc-16 of size 16
[ 34.423843] The buggy address is located 8 bytes inside of
[ 34.423843] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.425316]
[ 34.425676] The buggy address belongs to the physical page:
[ 34.426333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.427144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.427887] page_type: f5(slab)
[ 34.428440] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.429282] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.430187] page dumped because: kasan: bad access detected
[ 34.430836]
[ 34.431199] Memory state around the buggy address:
[ 34.431835] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.432717] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.433474] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.434167] ^
[ 34.434736] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.435489] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.436298] ==================================================================
---
[ 34.473464] ==================================================================
[ 34.474427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[ 34.475360] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[ 34.476159]
[ 34.476514] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.477548] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.478135] Hardware name: linux,dummy-virt (DT)
[ 34.478699] Call trace:
[ 34.479103] show_stack+0x20/0x38 (C)
[ 34.479655] dump_stack_lvl+0x8c/0xd0
[ 34.480299] print_report+0x118/0x5e0
[ 34.480919] kasan_report+0xc8/0x118
[ 34.481477] __asan_report_load8_noabort+0x20/0x30
[ 34.482140] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[ 34.482875] kasan_bitops_generic+0x11c/0x1c8
[ 34.483542] kunit_try_run_case+0x14c/0x3d0
[ 34.484137] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.484904] kthread+0x24c/0x2d0
[ 34.485464] ret_from_fork+0x10/0x20
[ 34.486363]
[ 34.486697] Allocated by task 249:
[ 34.487039] kasan_save_stack+0x3c/0x68
[ 34.487636] kasan_save_track+0x20/0x40
[ 34.488253] kasan_save_alloc_info+0x40/0x58
[ 34.488843] __kasan_kmalloc+0xd4/0xd8
[ 34.489319] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.489976] kasan_bitops_generic+0xa0/0x1c8
[ 34.490613] kunit_try_run_case+0x14c/0x3d0
[ 34.491123] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.491862] kthread+0x24c/0x2d0
[ 34.492334] ret_from_fork+0x10/0x20
[ 34.492908]
[ 34.493267] The buggy address belongs to the object at fff00000c5abd180
[ 34.493267] which belongs to the cache kmalloc-16 of size 16
[ 34.494375] The buggy address is located 8 bytes inside of
[ 34.494375] allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[ 34.495505]
[ 34.495859] The buggy address belongs to the physical page:
[ 34.496568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 34.497430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.498182] page_type: f5(slab)
[ 34.498709] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.499586] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.500386] page dumped because: kasan: bad access detected
[ 34.501032]
[ 34.501377] Memory state around the buggy address:
[ 34.501874] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.502719] fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 34.503466] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.504154] ^
[ 34.504720] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.505506] fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.506256] ==================================================================
Home
[ 30.465041] ==================================================================
[ 30.465896] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[ 30.466695] Write of size 16 at addr fff00000c5abd120 by task kunit_try_catch/154
[ 30.467720]
[ 30.468130] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.469579] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.470593] Hardware name: linux,dummy-virt (DT)
[ 30.471047] Call trace:
[ 30.471482] show_stack+0x20/0x38 (C)
[ 30.472162] dump_stack_lvl+0x8c/0xd0
[ 30.472838] print_report+0x118/0x5e0
[ 30.473527] kasan_report+0xc8/0x118
[ 30.474458] __asan_report_store16_noabort+0x20/0x30
[ 30.475245] kmalloc_oob_16+0x3a0/0x3f8
[ 30.475722] kunit_try_run_case+0x14c/0x3d0
[ 30.476321] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.477026] kthread+0x24c/0x2d0
[ 30.477581] ret_from_fork+0x10/0x20
[ 30.478396]
[ 30.478747] Allocated by task 154:
[ 30.479150] kasan_save_stack+0x3c/0x68
[ 30.479713] kasan_save_track+0x20/0x40
[ 30.480294] kasan_save_alloc_info+0x40/0x58
[ 30.480885] __kasan_kmalloc+0xd4/0xd8
[ 30.481523] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.482490] kmalloc_oob_16+0xb4/0x3f8
[ 30.483073] kunit_try_run_case+0x14c/0x3d0
[ 30.483731] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.484369] kthread+0x24c/0x2d0
[ 30.484939] ret_from_fork+0x10/0x20
[ 30.485450]
[ 30.485819] The buggy address belongs to the object at fff00000c5abd120
[ 30.485819] which belongs to the cache kmalloc-16 of size 16
[ 30.487499] The buggy address is located 0 bytes inside of
[ 30.487499] allocated 13-byte region [fff00000c5abd120, fff00000c5abd12d)
[ 30.488685]
[ 30.489184] The buggy address belongs to the physical page:
[ 30.490184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 30.490607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.490939] page_type: f5(slab)
[ 30.491515] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.492471] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.493270] page dumped because: kasan: bad access detected
[ 30.494262]
[ 30.494594] Memory state around the buggy address:
[ 30.495910] fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[ 30.497046] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.498048] >fff00000c5abd100: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[ 30.498992] ^
[ 30.499474] fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.500274] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.500972] ==================================================================
Home
[ 30.465041] ==================================================================
[ 30.465896] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[ 30.466695] Write of size 16 at addr fff00000c5abd120 by task kunit_try_catch/154
[ 30.467720]
[ 30.468130] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.469579] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.470593] Hardware name: linux,dummy-virt (DT)
[ 30.471047] Call trace:
[ 30.471482] show_stack+0x20/0x38 (C)
[ 30.472162] dump_stack_lvl+0x8c/0xd0
[ 30.472838] print_report+0x118/0x5e0
[ 30.473527] kasan_report+0xc8/0x118
[ 30.474458] __asan_report_store16_noabort+0x20/0x30
[ 30.475245] kmalloc_oob_16+0x3a0/0x3f8
[ 30.475722] kunit_try_run_case+0x14c/0x3d0
[ 30.476321] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.477026] kthread+0x24c/0x2d0
[ 30.477581] ret_from_fork+0x10/0x20
[ 30.478396]
[ 30.478747] Allocated by task 154:
[ 30.479150] kasan_save_stack+0x3c/0x68
[ 30.479713] kasan_save_track+0x20/0x40
[ 30.480294] kasan_save_alloc_info+0x40/0x58
[ 30.480885] __kasan_kmalloc+0xd4/0xd8
[ 30.481523] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.482490] kmalloc_oob_16+0xb4/0x3f8
[ 30.483073] kunit_try_run_case+0x14c/0x3d0
[ 30.483731] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.484369] kthread+0x24c/0x2d0
[ 30.484939] ret_from_fork+0x10/0x20
[ 30.485450]
[ 30.485819] The buggy address belongs to the object at fff00000c5abd120
[ 30.485819] which belongs to the cache kmalloc-16 of size 16
[ 30.487499] The buggy address is located 0 bytes inside of
[ 30.487499] allocated 13-byte region [fff00000c5abd120, fff00000c5abd12d)
[ 30.488685]
[ 30.489184] The buggy address belongs to the physical page:
[ 30.490184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 30.490607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.490939] page_type: f5(slab)
[ 30.491515] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.492471] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.493270] page dumped because: kasan: bad access detected
[ 30.494262]
[ 30.494594] Memory state around the buggy address:
[ 30.495910] fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[ 30.497046] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.498048] >fff00000c5abd100: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[ 30.498992] ^
[ 30.499474] fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.500274] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.500972] ==================================================================
Home
[ 29.331899] ==================================================================
[ 29.333056] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[ 29.334443] Read of size 1 at addr fff00000c5abd0ff by task kunit_try_catch/126
[ 29.335326]
[ 29.335802] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.336906] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.337577] Hardware name: linux,dummy-virt (DT)
[ 29.338419] Call trace:
[ 29.338891] show_stack+0x20/0x38 (C)
[ 29.339535] dump_stack_lvl+0x8c/0xd0
[ 29.340092] print_report+0x118/0x5e0
[ 29.340717] kasan_report+0xc8/0x118
[ 29.341309] __asan_report_load1_noabort+0x20/0x30
[ 29.342001] kmalloc_oob_left+0x2ec/0x320
[ 29.342523] kunit_try_run_case+0x14c/0x3d0
[ 29.343210] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.343919] kthread+0x24c/0x2d0
[ 29.344571] ret_from_fork+0x10/0x20
[ 29.345208]
[ 29.345572] Allocated by task 1:
[ 29.346387] kasan_save_stack+0x3c/0x68
[ 29.347079] kasan_save_track+0x20/0x40
[ 29.347607] kasan_save_alloc_info+0x40/0x58
[ 29.348325] __kasan_kmalloc+0xd4/0xd8
[ 29.348844] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 29.349370] kvasprintf+0xcc/0x170
[ 29.349930] kasprintf+0xa8/0xe8
[ 29.350362] input_devnode+0x84/0xb8
[ 29.350939] device_get_devnode+0x114/0x258
[ 29.351896] dev_uevent+0x334/0x5b8
[ 29.352438] kobject_uevent_env+0x424/0xc98
[ 29.353065] kobject_uevent+0x14/0x20
[ 29.353609] device_add+0xc00/0x12b8
[ 29.354268] cdev_device_add+0xdc/0x208
[ 29.355563] evdev_connect+0x2e0/0x410
[ 29.356021] input_attach_handler.isra.0+0xec/0x1d8
[ 29.356876] input_register_device+0x48c/0x9d8
[ 29.358284] gpio_keys_probe+0xabc/0x1ec8
[ 29.358853] platform_probe+0xcc/0x198
[ 29.359385] really_probe+0x188/0x7f0
[ 29.359979] __driver_probe_device+0x164/0x378
[ 29.360563] driver_probe_device+0x64/0x180
[ 29.361451] __driver_attach+0x1cc/0x478
[ 29.362074] bus_for_each_dev+0x104/0x198
[ 29.362885] driver_attach+0x44/0x68
[ 29.363389] bus_add_driver+0x23c/0x4e8
[ 29.363904] driver_register+0xf8/0x3d0
[ 29.364420] __platform_driver_register+0x64/0x98
[ 29.364957] gpio_keys_init+0x24/0x38
[ 29.365562] do_one_initcall+0xcc/0x628
[ 29.366658] kernel_init_freeable+0x3e0/0x8b0
[ 29.367268] kernel_init+0x2c/0x1f8
[ 29.367764] ret_from_fork+0x10/0x20
[ 29.368318]
[ 29.368657] Freed by task 1:
[ 29.369175] kasan_save_stack+0x3c/0x68
[ 29.369659] kasan_save_track+0x20/0x40
[ 29.370556] kasan_save_free_info+0x4c/0x78
[ 29.371283] __kasan_slab_free+0x6c/0x98
[ 29.372033] kfree+0x114/0x3c8
[ 29.372454] dev_uevent+0x368/0x5b8
[ 29.372898] kobject_uevent_env+0x424/0xc98
[ 29.373420] kobject_uevent+0x14/0x20
[ 29.373888] device_add+0xc00/0x12b8
[ 29.375136] cdev_device_add+0xdc/0x208
[ 29.375719] evdev_connect+0x2e0/0x410
[ 29.376233] input_attach_handler.isra.0+0xec/0x1d8
[ 29.376893] input_register_device+0x48c/0x9d8
[ 29.378292] gpio_keys_probe+0xabc/0x1ec8
[ 29.378994] platform_probe+0xcc/0x198
[ 29.379591] really_probe+0x188/0x7f0
[ 29.380077] __driver_probe_device+0x164/0x378
[ 29.380704] driver_probe_device+0x64/0x180
[ 29.381311] __driver_attach+0x1cc/0x478
[ 29.382111] bus_for_each_dev+0x104/0x198
[ 29.382936] driver_attach+0x44/0x68
[ 29.383416] bus_add_driver+0x23c/0x4e8
[ 29.383866] driver_register+0xf8/0x3d0
[ 29.384763] __platform_driver_register+0x64/0x98
[ 29.385611] gpio_keys_init+0x24/0x38
[ 29.386384] do_one_initcall+0xcc/0x628
[ 29.386901] kernel_init_freeable+0x3e0/0x8b0
[ 29.387539] kernel_init+0x2c/0x1f8
[ 29.388036] ret_from_fork+0x10/0x20
[ 29.388595]
[ 29.388960] The buggy address belongs to the object at fff00000c5abd0e0
[ 29.388960] which belongs to the cache kmalloc-16 of size 16
[ 29.390519] The buggy address is located 15 bytes to the right of
[ 29.390519] allocated 16-byte region [fff00000c5abd0e0, fff00000c5abd0f0)
[ 29.391740]
[ 29.392252] The buggy address belongs to the physical page:
[ 29.392849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 29.393642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.395079] page_type: f5(slab)
[ 29.395478] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 29.396081] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 29.396661] page dumped because: kasan: bad access detected
[ 29.397389]
[ 29.397737] Memory state around the buggy address:
[ 29.398703] fff00000c5abcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.399428] fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[ 29.400365] >fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 29.401074] ^
[ 29.402268] fff00000c5abd100: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.402993] fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.403803] ==================================================================
Home
[ 33.490877] ==================================================================
[ 33.492203] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[ 33.493212] Read of size 1 at addr fff00000c66d4598 by task kunit_try_catch/245
[ 33.493824]
[ 33.494483] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.496053] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.496848] Hardware name: linux,dummy-virt (DT)
[ 33.497433] Call trace:
[ 33.497911] show_stack+0x20/0x38 (C)
[ 33.499312] dump_stack_lvl+0x8c/0xd0
[ 33.499936] print_report+0x118/0x5e0
[ 33.500568] kasan_report+0xc8/0x118
[ 33.501216] __asan_report_load1_noabort+0x20/0x30
[ 33.501875] memcmp+0x198/0x1d8
[ 33.502444] kasan_memcmp+0x16c/0x300
[ 33.502982] kunit_try_run_case+0x14c/0x3d0
[ 33.503560] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.504601] kthread+0x24c/0x2d0
[ 33.505123] ret_from_fork+0x10/0x20
[ 33.505715]
[ 33.506605] Allocated by task 245:
[ 33.507200] kasan_save_stack+0x3c/0x68
[ 33.507692] kasan_save_track+0x20/0x40
[ 33.508317] kasan_save_alloc_info+0x40/0x58
[ 33.508932] __kasan_kmalloc+0xd4/0xd8
[ 33.509725] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.510707] kasan_memcmp+0xbc/0x300
[ 33.511302] kunit_try_run_case+0x14c/0x3d0
[ 33.511892] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.512645] kthread+0x24c/0x2d0
[ 33.513208] ret_from_fork+0x10/0x20
[ 33.513826]
[ 33.514972] The buggy address belongs to the object at fff00000c66d4580
[ 33.514972] which belongs to the cache kmalloc-32 of size 32
[ 33.516197] The buggy address is located 0 bytes to the right of
[ 33.516197] allocated 24-byte region [fff00000c66d4580, fff00000c66d4598)
[ 33.517509]
[ 33.517830] The buggy address belongs to the physical page:
[ 33.518548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d4
[ 33.519841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.520601] page_type: f5(slab)
[ 33.521163] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 33.522164] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 33.522882] page dumped because: kasan: bad access detected
[ 33.524191]
[ 33.524449] Memory state around the buggy address:
[ 33.525139] fff00000c66d4480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 33.526389] fff00000c66d4500: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 33.526996] >fff00000c66d4580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.527890] ^
[ 33.528455] fff00000c66d4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.529319] fff00000c66d4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.530170] ==================================================================
Home
[ 31.095554] ==================================================================
[ 31.096757] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[ 31.097471] Read of size 1 at addr fff00000c5abd160 by task kunit_try_catch/180
[ 31.098386]
[ 31.099322] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.100202] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.101177] Hardware name: linux,dummy-virt (DT)
[ 31.102160] Call trace:
[ 31.102606] show_stack+0x20/0x38 (C)
[ 31.103290] dump_stack_lvl+0x8c/0xd0
[ 31.103816] print_report+0x118/0x5e0
[ 31.104233] kasan_report+0xc8/0x118
[ 31.104502] __kasan_check_byte+0x54/0x70
[ 31.104763] kfree_sensitive+0x30/0xb0
[ 31.105060] kmalloc_double_kzfree+0x168/0x308
[ 31.105817] kunit_try_run_case+0x14c/0x3d0
[ 31.106617] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.107761] kthread+0x24c/0x2d0
[ 31.108321] ret_from_fork+0x10/0x20
[ 31.109032]
[ 31.109464] Allocated by task 180:
[ 31.109931] kasan_save_stack+0x3c/0x68
[ 31.110413] kasan_save_track+0x20/0x40
[ 31.110989] kasan_save_alloc_info+0x40/0x58
[ 31.111896] __kasan_kmalloc+0xd4/0xd8
[ 31.112463] __kmalloc_cache_noprof+0x15c/0x3c0
[ 31.113047] kmalloc_double_kzfree+0xb8/0x308
[ 31.113674] kunit_try_run_case+0x14c/0x3d0
[ 31.114518] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.115213] kthread+0x24c/0x2d0
[ 31.115648] ret_from_fork+0x10/0x20
[ 31.116223]
[ 31.116564] Freed by task 180:
[ 31.117071] kasan_save_stack+0x3c/0x68
[ 31.117637] kasan_save_track+0x20/0x40
[ 31.118878] kasan_save_free_info+0x4c/0x78
[ 31.119719] __kasan_slab_free+0x6c/0x98
[ 31.120380] kfree+0x114/0x3c8
[ 31.120889] kfree_sensitive+0x80/0xb0
[ 31.121410] kmalloc_double_kzfree+0x11c/0x308
[ 31.122331] kunit_try_run_case+0x14c/0x3d0
[ 31.122942] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.123709] kthread+0x24c/0x2d0
[ 31.124259] ret_from_fork+0x10/0x20
[ 31.124819]
[ 31.125161] The buggy address belongs to the object at fff00000c5abd160
[ 31.125161] which belongs to the cache kmalloc-16 of size 16
[ 31.126659] The buggy address is located 0 bytes inside of
[ 31.126659] freed 16-byte region [fff00000c5abd160, fff00000c5abd170)
[ 31.127944]
[ 31.128298] The buggy address belongs to the physical page:
[ 31.128927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[ 31.129725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.130638] page_type: f5(slab)
[ 31.131339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 31.132167] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 31.132936] page dumped because: kasan: bad access detected
[ 31.133680]
[ 31.134396] Memory state around the buggy address:
[ 31.134988] fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[ 31.135814] fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 31.136658] >fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 31.137475] ^
[ 31.138464] fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.139037] fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.139834] ==================================================================
Home
[ 30.918505] ==================================================================
[ 30.919780] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[ 30.920548] Read of size 1 at addr fff00000c605f948 by task kunit_try_catch/172
[ 30.921578]
[ 30.922719] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.923616] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.924247] Hardware name: linux,dummy-virt (DT)
[ 30.924728] Call trace:
[ 30.925180] show_stack+0x20/0x38 (C)
[ 30.925760] dump_stack_lvl+0x8c/0xd0
[ 30.926375] print_report+0x118/0x5e0
[ 30.926970] kasan_report+0xc8/0x118
[ 30.927569] __asan_report_load1_noabort+0x20/0x30
[ 30.928473] kmalloc_uaf+0x300/0x338
[ 30.929039] kunit_try_run_case+0x14c/0x3d0
[ 30.929618] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.930729] kthread+0x24c/0x2d0
[ 30.931236] ret_from_fork+0x10/0x20
[ 30.931804]
[ 30.932530] Allocated by task 172:
[ 30.932942] kasan_save_stack+0x3c/0x68
[ 30.933548] kasan_save_track+0x20/0x40
[ 30.934635] kasan_save_alloc_info+0x40/0x58
[ 30.935265] __kasan_kmalloc+0xd4/0xd8
[ 30.935757] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.936400] kmalloc_uaf+0xb8/0x338
[ 30.936941] kunit_try_run_case+0x14c/0x3d0
[ 30.937489] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.938587] kthread+0x24c/0x2d0
[ 30.939023] ret_from_fork+0x10/0x20
[ 30.939581]
[ 30.939904] Freed by task 172:
[ 30.940419] kasan_save_stack+0x3c/0x68
[ 30.940982] kasan_save_track+0x20/0x40
[ 30.941546] kasan_save_free_info+0x4c/0x78
[ 30.942609] __kasan_slab_free+0x6c/0x98
[ 30.943431] kfree+0x114/0x3c8
[ 30.943921] kmalloc_uaf+0x11c/0x338
[ 30.944480] kunit_try_run_case+0x14c/0x3d0
[ 30.945051] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.945694] kthread+0x24c/0x2d0
[ 30.946437] ret_from_fork+0x10/0x20
[ 30.947024]
[ 30.947303] The buggy address belongs to the object at fff00000c605f940
[ 30.947303] which belongs to the cache kmalloc-16 of size 16
[ 30.949307] The buggy address is located 8 bytes inside of
[ 30.949307] freed 16-byte region [fff00000c605f940, fff00000c605f950)
[ 30.950653]
[ 30.950951] The buggy address belongs to the physical page:
[ 30.952106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605f
[ 30.953028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.953809] page_type: f5(slab)
[ 30.954599] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.955423] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.956960] page dumped because: kasan: bad access detected
[ 30.957561]
[ 30.958384] Memory state around the buggy address:
[ 30.958830] fff00000c605f800: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[ 30.959730] fff00000c605f880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.960492] >fff00000c605f900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 30.961320] ^
[ 30.962131] fff00000c605f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.963073] fff00000c605fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.963645] ==================================================================
Home
[ 30.512059] ==================================================================
[ 30.512861] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[ 30.513674] Read of size 16 at addr fff00000c605f920 by task kunit_try_catch/156
[ 30.514985]
[ 30.515471] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.516702] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.517368] Hardware name: linux,dummy-virt (DT)
[ 30.518266] Call trace:
[ 30.518799] show_stack+0x20/0x38 (C)
[ 30.519325] dump_stack_lvl+0x8c/0xd0
[ 30.519864] print_report+0x118/0x5e0
[ 30.520630] kasan_report+0xc8/0x118
[ 30.521144] __asan_report_load16_noabort+0x20/0x30
[ 30.522283] kmalloc_uaf_16+0x3bc/0x438
[ 30.522852] kunit_try_run_case+0x14c/0x3d0
[ 30.523577] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.524376] kthread+0x24c/0x2d0
[ 30.525059] ret_from_fork+0x10/0x20
[ 30.525583]
[ 30.526477] Allocated by task 156:
[ 30.526911] kasan_save_stack+0x3c/0x68
[ 30.527651] kasan_save_track+0x20/0x40
[ 30.528390] kasan_save_alloc_info+0x40/0x58
[ 30.529143] __kasan_kmalloc+0xd4/0xd8
[ 30.529624] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.530538] kmalloc_uaf_16+0x140/0x438
[ 30.531454] kunit_try_run_case+0x14c/0x3d0
[ 30.532220] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.533067] kthread+0x24c/0x2d0
[ 30.533745] ret_from_fork+0x10/0x20
[ 30.534543]
[ 30.534877] Freed by task 156:
[ 30.535251] kasan_save_stack+0x3c/0x68
[ 30.535812] kasan_save_track+0x20/0x40
[ 30.536923] kasan_save_free_info+0x4c/0x78
[ 30.537674] __kasan_slab_free+0x6c/0x98
[ 30.538547] kfree+0x114/0x3c8
[ 30.539216] kmalloc_uaf_16+0x190/0x438
[ 30.539946] kunit_try_run_case+0x14c/0x3d0
[ 30.540490] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.541361] kthread+0x24c/0x2d0
[ 30.542293] ret_from_fork+0x10/0x20
[ 30.542896]
[ 30.543383] The buggy address belongs to the object at fff00000c605f920
[ 30.543383] which belongs to the cache kmalloc-16 of size 16
[ 30.544467] The buggy address is located 0 bytes inside of
[ 30.544467] freed 16-byte region [fff00000c605f920, fff00000c605f930)
[ 30.545800]
[ 30.546665] The buggy address belongs to the physical page:
[ 30.547201] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605f
[ 30.547593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.547922] page_type: f5(slab)
[ 30.548388] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.549354] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.550715] page dumped because: kasan: bad access detected
[ 30.551418]
[ 30.551775] Memory state around the buggy address:
[ 30.552525] fff00000c605f800: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[ 30.553397] fff00000c605f880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.554441] >fff00000c605f900: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 30.555661] ^
[ 30.556179] fff00000c605f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.557403] fff00000c605fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.558510] ==================================================================
Home
[ 32.050857] ==================================================================
[ 32.051964] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[ 32.052762] Read of size 1 at addr fff00000c6002280 by task kunit_try_catch/203
[ 32.053590]
[ 32.053955] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.055358] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.055853] Hardware name: linux,dummy-virt (DT)
[ 32.056435] Call trace:
[ 32.056869] show_stack+0x20/0x38 (C)
[ 32.057450] dump_stack_lvl+0x8c/0xd0
[ 32.058038] print_report+0x118/0x5e0
[ 32.058566] kasan_report+0xc8/0x118
[ 32.059124] __kasan_check_byte+0x54/0x70
[ 32.059751] kmem_cache_destroy+0x34/0x218
[ 32.060383] kmem_cache_double_destroy+0x17c/0x2f8
[ 32.061157] kunit_try_run_case+0x14c/0x3d0
[ 32.061870] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 32.062656] kthread+0x24c/0x2d0
[ 32.063271] ret_from_fork+0x10/0x20
[ 32.063969]
[ 32.064434] Allocated by task 203:
[ 32.064693] kasan_save_stack+0x3c/0x68
[ 32.064952] kasan_save_track+0x20/0x40
[ 32.065359] kasan_save_alloc_info+0x40/0x58
[ 32.065971] __kasan_slab_alloc+0xa8/0xb0
[ 32.066577] kmem_cache_alloc_noprof+0x108/0x398
[ 32.067159] __kmem_cache_create_args+0x18c/0x2b0
[ 32.067827] kmem_cache_double_destroy+0xc8/0x2f8
[ 32.068502] kunit_try_run_case+0x14c/0x3d0
[ 32.069000] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 32.069725] kthread+0x24c/0x2d0
[ 32.070191] ret_from_fork+0x10/0x20
[ 32.070747]
[ 32.071088] Freed by task 203:
[ 32.071485] kasan_save_stack+0x3c/0x68
[ 32.072094] kasan_save_track+0x20/0x40
[ 32.072641] kasan_save_free_info+0x4c/0x78
[ 32.073287] __kasan_slab_free+0x6c/0x98
[ 32.073801] kmem_cache_free+0x118/0x470
[ 32.074397] slab_kmem_cache_release+0x38/0x50
[ 32.075043] kmem_cache_release+0x1c/0x30
[ 32.075610] kobject_put+0x17c/0x430
[ 32.076212] sysfs_slab_release+0x1c/0x30
[ 32.076803] kmem_cache_destroy+0x118/0x218
[ 32.077382] kmem_cache_double_destroy+0x130/0x2f8
[ 32.077921] kunit_try_run_case+0x14c/0x3d0
[ 32.078558] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 32.079161] kthread+0x24c/0x2d0
[ 32.079693] ret_from_fork+0x10/0x20
[ 32.080220]
[ 32.080560] The buggy address belongs to the object at fff00000c6002280
[ 32.080560] which belongs to the cache kmem_cache of size 208
[ 32.081711] The buggy address is located 0 bytes inside of
[ 32.081711] freed 208-byte region [fff00000c6002280, fff00000c6002350)
[ 32.082881]
[ 32.083208] The buggy address belongs to the physical page:
[ 32.083886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106002
[ 32.084710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 32.085554] page_type: f5(slab)
[ 32.086098] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[ 32.086902] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[ 32.087724] page dumped because: kasan: bad access detected
[ 32.088252]
[ 32.088589] Memory state around the buggy address:
[ 32.089237] fff00000c6002180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 32.090055] fff00000c6002200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.090842] >fff00000c6002280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 32.091524] ^
[ 32.092053] fff00000c6002300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 32.092833] fff00000c6002380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.093633] ==================================================================
Home
[ 31.498546] ==================================================================
[ 31.499763] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[ 31.500660] Read of size 4 at addr fff00000c6668500 by task swapper/1/0
[ 31.501404]
[ 31.502167] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0-rc7 #1
[ 31.503209] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.503852] Hardware name: linux,dummy-virt (DT)
[ 31.504521] Call trace:
[ 31.504965] show_stack+0x20/0x38 (C)
[ 31.505565] dump_stack_lvl+0x8c/0xd0
[ 31.506222] print_report+0x118/0x5e0
[ 31.506791] kasan_report+0xc8/0x118
[ 31.507634] __asan_report_load4_noabort+0x20/0x30
[ 31.508318] rcu_uaf_reclaim+0x64/0x70
[ 31.508914] rcu_core+0x9f4/0x1e20
[ 31.509539] rcu_core_si+0x18/0x30
[ 31.510111] handle_softirqs+0x374/0xb20
[ 31.510860] __do_softirq+0x1c/0x28
[ 31.511470] ____do_softirq+0x18/0x30
[ 31.512080] call_on_irq_stack+0x24/0x58
[ 31.512717] do_softirq_own_stack+0x24/0x38
[ 31.513357] __irq_exit_rcu+0x1fc/0x318
[ 31.514084] irq_exit_rcu+0x1c/0x80
[ 31.514729] el1_interrupt+0x38/0x58
[ 31.515413] el1h_64_irq_handler+0x18/0x28
[ 31.516064] el1h_64_irq+0x6c/0x70
[ 31.516774] arch_local_irq_enable+0x4/0x8 (P)
[ 31.517448] do_idle+0x384/0x4e8
[ 31.518233] cpu_startup_entry+0x68/0x80
[ 31.518858] secondary_start_kernel+0x288/0x340
[ 31.519515] __secondary_switched+0xc0/0xc8
[ 31.520219]
[ 31.520564] Allocated by task 186:
[ 31.521090] kasan_save_stack+0x3c/0x68
[ 31.521723] kasan_save_track+0x20/0x40
[ 31.522748] kasan_save_alloc_info+0x40/0x58
[ 31.523355] __kasan_kmalloc+0xd4/0xd8
[ 31.523922] __kmalloc_cache_noprof+0x15c/0x3c0
[ 31.524574] rcu_uaf+0xb0/0x2d0
[ 31.525122] kunit_try_run_case+0x14c/0x3d0
[ 31.525696] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.526699] kthread+0x24c/0x2d0
[ 31.527409] ret_from_fork+0x10/0x20
[ 31.528127]
[ 31.528463] Freed by task 0:
[ 31.528881] kasan_save_stack+0x3c/0x68
[ 31.529378] kasan_save_track+0x20/0x40
[ 31.529869] kasan_save_free_info+0x4c/0x78
[ 31.531032] __kasan_slab_free+0x6c/0x98
[ 31.531742] kfree+0x114/0x3c8
[ 31.532405] rcu_uaf_reclaim+0x28/0x70
[ 31.533139] rcu_core+0x9f4/0x1e20
[ 31.533797] rcu_core_si+0x18/0x30
[ 31.534600] handle_softirqs+0x374/0xb20
[ 31.535106] __do_softirq+0x1c/0x28
[ 31.535649]
[ 31.536041] Last potentially related work creation:
[ 31.536630] kasan_save_stack+0x3c/0x68
[ 31.537326] __kasan_record_aux_stack+0xbc/0xe8
[ 31.538173] kasan_record_aux_stack_noalloc+0x14/0x20
[ 31.538613] __call_rcu_common.constprop.0+0x74/0xa10
[ 31.539322] call_rcu+0x18/0x30
[ 31.539867] rcu_uaf+0x14c/0x2d0
[ 31.540336] kunit_try_run_case+0x14c/0x3d0
[ 31.540934] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.541611] kthread+0x24c/0x2d0
[ 31.542587] ret_from_fork+0x10/0x20
[ 31.543030]
[ 31.543309] The buggy address belongs to the object at fff00000c6668500
[ 31.543309] which belongs to the cache kmalloc-32 of size 32
[ 31.545263] The buggy address is located 0 bytes inside of
[ 31.545263] freed 32-byte region [fff00000c6668500, fff00000c6668520)
[ 31.546713]
[ 31.547058] The buggy address belongs to the physical page:
[ 31.547556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106668
[ 31.548520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.549394] page_type: f5(slab)
[ 31.549945] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 31.550700] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.551579] page dumped because: kasan: bad access detected
[ 31.552140]
[ 31.552477] Memory state around the buggy address:
[ 31.553367] fff00000c6668400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 31.554470] fff00000c6668480: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 31.555266] >fff00000c6668500: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.555999] ^
[ 31.556517] fff00000c6668580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.557277] fff00000c6668600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.558301] ==================================================================
Home
------------[ cut here ]------------
[ 238.894557] WARNING: CPU: 1 PID: 2040 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300
[ 238.896046] Modules linked in:
[ 238.896882] CPU: 1 UID: 0 PID: 2040 Comm: kunit_try_catch Tainted: G B D W N 6.13.0-rc7 #1
[ 238.897861] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 238.898508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 238.899577] RIP: 0010:drm_framebuffer_init+0x44/0x300
[ 238.900057] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41
[ 238.901923] RSP: 0000:ffff888104057ba0 EFLAGS: 00010246
[ 238.902330] RAX: dffffc0000000000 RBX: ffff888104057c98 RCX: 0000000000000000
[ 238.903138] RDX: 1ffff1102080af9c RSI: ffff888104057c98 RDI: ffff888104057ce0
[ 238.904057] RBP: ffff888104057be0 R08: ffff888103f06000 R09: ffffffffac5b5c20
[ 238.904856] R10: 0000000000000003 R11: 0000000045bcb4e2 R12: ffff888103f06000
[ 238.905869] R13: ffff888100317b20 R14: ffff888104057c18 R15: ffff888104057e28
[ 238.906626] FS: 0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[ 238.907435] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 238.908066] CR2: 00007ffff7ffe000 CR3: 00000000702b8000 CR4: 00000000000006f0
[ 238.909199] DR0: ffffffffae5ea164 DR1: ffffffffae5ea169 DR2: ffffffffae5ea16a
[ 238.910329] DR3: ffffffffae5ea16b DR6: 00000000ffff0ff0 DR7: 0000000000000600
[ 238.911472] Call Trace:
[ 238.911859] <TASK>
[ 238.912339] ? show_regs+0x68/0x80
[ 238.912856] ? __warn+0xd5/0x260
[ 238.913197] ? drm_framebuffer_init+0x44/0x300
[ 238.913759] ? report_bug+0x278/0x2e0
[ 238.914701] ? handle_bug+0x5c/0xb0
[ 238.915076] ? exc_invalid_op+0x1c/0x50
[ 238.915692] ? asm_exc_invalid_op+0x1f/0x30
[ 238.916253] ? drm_framebuffer_init+0x44/0x300
[ 238.917020] ? add_dr+0xc1/0x1d0
[ 238.917717] drm_test_framebuffer_init_bad_format+0xfd/0x240
[ 238.918514] ? add_dr+0x148/0x1d0
[ 238.918865] ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[ 238.919419] ? __drmm_add_action+0x1a4/0x280
[ 238.919865] ? __pfx_drm_mode_config_init_release+0x10/0x10
[ 238.921159] ? __pfx_drm_mode_config_init_release+0x10/0x10
[ 238.921695] ? __drmm_add_action_or_reset+0x22/0x50
[ 238.922777] ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[ 238.923357] ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[ 238.924351] kunit_try_run_case+0x1b3/0x490
[ 238.925157] ? __pfx_kunit_try_run_case+0x10/0x10
[ 238.925921] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 238.926385] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 238.927334] ? __kthread_parkme+0x82/0x160
[ 238.928159] ? preempt_count_sub+0x50/0x80
[ 238.928567] ? __pfx_kunit_try_run_case+0x10/0x10
[ 238.929191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 238.929759] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 238.930720] kthread+0x257/0x310
[ 238.931409] ? __pfx_kthread+0x10/0x10
[ 238.932165] ret_from_fork+0x41/0x80
[ 238.932839] ? __pfx_kthread+0x10/0x10
[ 238.933237] ret_from_fork_asm+0x1a/0x30
[ 238.933644] </TASK>
[ 238.933850] ---[ end trace 0000000000000000 ]---
Home
[ 29.215758] ==================================================================
[ 29.216991] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[ 29.218168] Free of addr ffff888101bd1140 by task kunit_try_catch/200
[ 29.218649]
[ 29.219151] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.220525] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.221184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.222093] Call Trace:
[ 29.222427] <TASK>
[ 29.223240] dump_stack_lvl+0x73/0xb0
[ 29.223945] print_report+0xd1/0x640
[ 29.224505] ? __virt_addr_valid+0x1db/0x2d0
[ 29.225151] ? kfree_sensitive+0x2e/0x90
[ 29.225792] ? kasan_complete_mode_report_info+0x64/0x200
[ 29.226313] ? kfree_sensitive+0x2e/0x90
[ 29.226893] kasan_report_invalid_free+0xc0/0xf0
[ 29.228526] ? kfree_sensitive+0x2e/0x90
[ 29.229037] ? kfree_sensitive+0x2e/0x90
[ 29.230125] check_slab_allocation+0x101/0x130
[ 29.230837] __kasan_slab_pre_free+0x28/0x40
[ 29.231376] kfree+0xf1/0x3f0
[ 29.231874] ? kfree_sensitive+0x2e/0x90
[ 29.232192] kfree_sensitive+0x2e/0x90
[ 29.232804] kmalloc_double_kzfree+0x19d/0x360
[ 29.233277] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 29.234811] ? __schedule+0xc3e/0x2790
[ 29.235248] ? __pfx_read_tsc+0x10/0x10
[ 29.235685] ? ktime_get_ts64+0x84/0x230
[ 29.236102] kunit_try_run_case+0x1b3/0x490
[ 29.237788] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.238887] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.239597] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.240075] ? __kthread_parkme+0x82/0x160
[ 29.240509] ? preempt_count_sub+0x50/0x80
[ 29.240912] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.241915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.242953] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.244491] kthread+0x257/0x310
[ 29.244952] ? __pfx_kthread+0x10/0x10
[ 29.245278] ret_from_fork+0x41/0x80
[ 29.246409] ? __pfx_kthread+0x10/0x10
[ 29.247150] ret_from_fork_asm+0x1a/0x30
[ 29.247589] </TASK>
[ 29.247829]
[ 29.247981] Allocated by task 200:
[ 29.248382] kasan_save_stack+0x3d/0x60
[ 29.249591] kasan_save_track+0x18/0x40
[ 29.250181] kasan_save_alloc_info+0x3b/0x50
[ 29.250896] __kasan_kmalloc+0xb7/0xc0
[ 29.251316] __kmalloc_cache_noprof+0x184/0x410
[ 29.252684] kmalloc_double_kzfree+0xaa/0x360
[ 29.252973] kunit_try_run_case+0x1b3/0x490
[ 29.253234] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.253572] kthread+0x257/0x310
[ 29.254180] ret_from_fork+0x41/0x80
[ 29.254890] ret_from_fork_asm+0x1a/0x30
[ 29.255217]
[ 29.255397] Freed by task 200:
[ 29.255837] kasan_save_stack+0x3d/0x60
[ 29.257661] kasan_save_track+0x18/0x40
[ 29.258085] kasan_save_free_info+0x3f/0x60
[ 29.258442] __kasan_slab_free+0x56/0x70
[ 29.259509] kfree+0x123/0x3f0
[ 29.259846] kfree_sensitive+0x67/0x90
[ 29.260249] kmalloc_double_kzfree+0x12c/0x360
[ 29.260910] kunit_try_run_case+0x1b3/0x490
[ 29.261994] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.263369] kthread+0x257/0x310
[ 29.263763] ret_from_fork+0x41/0x80
[ 29.264125] ret_from_fork_asm+0x1a/0x30
[ 29.264519]
[ 29.264748] The buggy address belongs to the object at ffff888101bd1140
[ 29.264748] which belongs to the cache kmalloc-16 of size 16
[ 29.265988] The buggy address is located 0 bytes inside of
[ 29.265988] 16-byte region [ffff888101bd1140, ffff888101bd1150)
[ 29.267036]
[ 29.267252] The buggy address belongs to the physical page:
[ 29.268610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 29.269343] flags: 0x200000000000000(node=0|zone=2)
[ 29.269907] page_type: f5(slab)
[ 29.270227] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 29.271064] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 29.271716] page dumped because: kasan: bad access detected
[ 29.272124]
[ 29.272388] Memory state around the buggy address:
[ 29.272736] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 29.273688] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 29.274336] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 29.275736] ^
[ 29.276254] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.277248] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.278542] ==================================================================
Home
[ 31.210838] ==================================================================
[ 31.212375] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[ 31.214077] Free of addr ffff888102b4c000 by task kunit_try_catch/245
[ 31.215399]
[ 31.215608] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.217002] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.217600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.220125] Call Trace:
[ 31.220674] <TASK>
[ 31.220940] dump_stack_lvl+0x73/0xb0
[ 31.221893] print_report+0xd1/0x640
[ 31.222421] ? __virt_addr_valid+0x1db/0x2d0
[ 31.222791] ? mempool_double_free_helper+0x185/0x370
[ 31.223282] ? kasan_addr_to_slab+0x11/0xa0
[ 31.223803] ? mempool_double_free_helper+0x185/0x370
[ 31.224890] kasan_report_invalid_free+0xc0/0xf0
[ 31.225676] ? mempool_double_free_helper+0x185/0x370
[ 31.226449] ? mempool_double_free_helper+0x185/0x370
[ 31.227621] __kasan_mempool_poison_object+0x1b3/0x1d0
[ 31.228816] mempool_free+0x2ec/0x380
[ 31.229561] mempool_double_free_helper+0x185/0x370
[ 31.230525] ? __pfx_mempool_double_free_helper+0x10/0x10
[ 31.231397] ? irqentry_exit+0x2a/0x60
[ 31.231693] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 31.232488] mempool_kmalloc_large_double_free+0xb1/0x100
[ 31.233388] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[ 31.234450] ? __pfx_mempool_kmalloc+0x10/0x10
[ 31.234820] ? __pfx_mempool_kfree+0x10/0x10
[ 31.235135] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[ 31.236329] kunit_try_run_case+0x1b3/0x490
[ 31.237460] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.238653] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.239555] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.240427] ? __kthread_parkme+0x82/0x160
[ 31.241266] ? preempt_count_sub+0x50/0x80
[ 31.242138] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.242663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.243111] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.243868] kthread+0x257/0x310
[ 31.244758] ? __pfx_kthread+0x10/0x10
[ 31.245779] ret_from_fork+0x41/0x80
[ 31.246789] ? __pfx_kthread+0x10/0x10
[ 31.248020] ret_from_fork_asm+0x1a/0x30
[ 31.248341] </TASK>
[ 31.248771]
[ 31.249250] The buggy address belongs to the physical page:
[ 31.249660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[ 31.251071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 31.252837] flags: 0x200000000000040(head|node=0|zone=2)
[ 31.253815] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 31.254444] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.255292] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 31.256615] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.257233] head: 0200000000000002 ffffea00040ad301 ffffffffffffffff 0000000000000000
[ 31.258140] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 31.258810] page dumped because: kasan: bad access detected
[ 31.259493]
[ 31.259666] Memory state around the buggy address:
[ 31.260887] ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.261626] ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.262489] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.263086] ^
[ 31.263435] ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.263939] ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.264925] ==================================================================
Home
[ 31.271293] ==================================================================
[ 31.272204] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[ 31.272966] Free of addr ffff888102b4c000 by task kunit_try_catch/247
[ 31.273581]
[ 31.274173] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.274969] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.275426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.276263] Call Trace:
[ 31.278243] <TASK>
[ 31.278793] dump_stack_lvl+0x73/0xb0
[ 31.279260] print_report+0xd1/0x640
[ 31.280068] ? __virt_addr_valid+0x1db/0x2d0
[ 31.280950] ? mempool_double_free_helper+0x185/0x370
[ 31.281788] ? kasan_addr_to_slab+0x11/0xa0
[ 31.282512] ? mempool_double_free_helper+0x185/0x370
[ 31.282964] kasan_report_invalid_free+0xc0/0xf0
[ 31.283377] ? mempool_double_free_helper+0x185/0x370
[ 31.284275] ? mempool_double_free_helper+0x185/0x370
[ 31.284700] __kasan_mempool_poison_pages+0x115/0x130
[ 31.285698] mempool_free+0x290/0x380
[ 31.286358] mempool_double_free_helper+0x185/0x370
[ 31.287172] ? __pfx_mempool_double_free_helper+0x10/0x10
[ 31.287620] ? finish_task_switch.isra.0+0x153/0x700
[ 31.288218] mempool_page_alloc_double_free+0xac/0x100
[ 31.288789] ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[ 31.289800] ? __switch_to+0x5d9/0xf60
[ 31.290841] ? __pfx_mempool_alloc_pages+0x10/0x10
[ 31.291404] ? __pfx_mempool_free_pages+0x10/0x10
[ 31.292512] ? __pfx_read_tsc+0x10/0x10
[ 31.293130] ? ktime_get_ts64+0x84/0x230
[ 31.293372] kunit_try_run_case+0x1b3/0x490
[ 31.294414] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.295278] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.295729] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.296797] ? __kthread_parkme+0x82/0x160
[ 31.297487] ? preempt_count_sub+0x50/0x80
[ 31.298189] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.298512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.299328] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.299871] kthread+0x257/0x310
[ 31.300202] ? __pfx_kthread+0x10/0x10
[ 31.301466] ret_from_fork+0x41/0x80
[ 31.302063] ? __pfx_kthread+0x10/0x10
[ 31.302965] ret_from_fork_asm+0x1a/0x30
[ 31.303717] </TASK>
[ 31.303966]
[ 31.304228] The buggy address belongs to the physical page:
[ 31.304915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[ 31.305686] flags: 0x200000000000000(node=0|zone=2)
[ 31.307125] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 31.308056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.308769] page dumped because: kasan: bad access detected
[ 31.309261]
[ 31.309471] Memory state around the buggy address:
[ 31.309916] ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.311113] ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.312533] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.313198] ^
[ 31.313848] ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.315132] ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.315718] ==================================================================
Home
[ 31.142079] ==================================================================
[ 31.143266] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[ 31.144439] Free of addr ffff8881029b6c00 by task kunit_try_catch/243
[ 31.145607]
[ 31.146362] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.147393] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.148114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.149490] Call Trace:
[ 31.149784] <TASK>
[ 31.150070] dump_stack_lvl+0x73/0xb0
[ 31.150473] print_report+0xd1/0x640
[ 31.151083] ? __virt_addr_valid+0x1db/0x2d0
[ 31.152212] ? mempool_double_free_helper+0x185/0x370
[ 31.153050] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.153787] ? mempool_double_free_helper+0x185/0x370
[ 31.154294] kasan_report_invalid_free+0xc0/0xf0
[ 31.155271] ? mempool_double_free_helper+0x185/0x370
[ 31.156691] ? mempool_double_free_helper+0x185/0x370
[ 31.157159] ? mempool_double_free_helper+0x185/0x370
[ 31.158197] check_slab_allocation+0x101/0x130
[ 31.158730] __kasan_mempool_poison_object+0x91/0x1d0
[ 31.158966] mempool_free+0x2ec/0x380
[ 31.159170] mempool_double_free_helper+0x185/0x370
[ 31.159535] ? __pfx_mempool_double_free_helper+0x10/0x10
[ 31.160789] ? finish_task_switch.isra.0+0x153/0x700
[ 31.161524] mempool_kmalloc_double_free+0xb1/0x100
[ 31.162357] ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[ 31.163188] ? __switch_to+0x5d9/0xf60
[ 31.163614] ? __pfx_mempool_kmalloc+0x10/0x10
[ 31.164299] ? __pfx_mempool_kfree+0x10/0x10
[ 31.164905] ? trace_hardirqs_on+0x37/0xe0
[ 31.165267] ? __pfx_read_tsc+0x10/0x10
[ 31.165787] ? ktime_get_ts64+0x84/0x230
[ 31.166123] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 31.166888] kunit_try_run_case+0x1b3/0x490
[ 31.167540] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.168041] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.168852] ? __kthread_parkme+0x82/0x160
[ 31.169216] ? preempt_count_sub+0x50/0x80
[ 31.169691] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.170181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.170855] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.171395] kthread+0x257/0x310
[ 31.171710] ? __pfx_kthread+0x10/0x10
[ 31.172380] ret_from_fork+0x41/0x80
[ 31.172724] ? __pfx_kthread+0x10/0x10
[ 31.173114] ret_from_fork_asm+0x1a/0x30
[ 31.173659] </TASK>
[ 31.173962]
[ 31.174184] Allocated by task 243:
[ 31.174581] kasan_save_stack+0x3d/0x60
[ 31.174979] kasan_save_track+0x18/0x40
[ 31.175277] kasan_save_alloc_info+0x3b/0x50
[ 31.176070] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 31.176990] remove_element+0x11e/0x190
[ 31.177505] mempool_alloc_preallocated+0x4d/0x90
[ 31.177922] mempool_double_free_helper+0x8b/0x370
[ 31.178495] mempool_kmalloc_double_free+0xb1/0x100
[ 31.178889] kunit_try_run_case+0x1b3/0x490
[ 31.179528] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.180172] kthread+0x257/0x310
[ 31.180442] ret_from_fork+0x41/0x80
[ 31.181274] ret_from_fork_asm+0x1a/0x30
[ 31.181764]
[ 31.181914] Freed by task 243:
[ 31.182137] kasan_save_stack+0x3d/0x60
[ 31.182796] kasan_save_track+0x18/0x40
[ 31.183267] kasan_save_free_info+0x3f/0x60
[ 31.184023] __kasan_mempool_poison_object+0x131/0x1d0
[ 31.184648] mempool_free+0x2ec/0x380
[ 31.184924] mempool_double_free_helper+0x10a/0x370
[ 31.185416] mempool_kmalloc_double_free+0xb1/0x100
[ 31.186023] kunit_try_run_case+0x1b3/0x490
[ 31.186631] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.187003] kthread+0x257/0x310
[ 31.187431] ret_from_fork+0x41/0x80
[ 31.187873] ret_from_fork_asm+0x1a/0x30
[ 31.188558]
[ 31.188805] The buggy address belongs to the object at ffff8881029b6c00
[ 31.188805] which belongs to the cache kmalloc-128 of size 128
[ 31.189567] The buggy address is located 0 bytes inside of
[ 31.189567] 128-byte region [ffff8881029b6c00, ffff8881029b6c80)
[ 31.190898]
[ 31.191937] The buggy address belongs to the physical page:
[ 31.193522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b6
[ 31.193867] flags: 0x200000000000000(node=0|zone=2)
[ 31.194226] page_type: f5(slab)
[ 31.194932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 31.195884] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 31.196363] page dumped because: kasan: bad access detected
[ 31.197543]
[ 31.197813] Memory state around the buggy address:
[ 31.198183] ffff8881029b6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 31.198764] ffff8881029b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.199969] >ffff8881029b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 31.201297] ^
[ 31.201993] ffff8881029b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.203684] ffff8881029b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 31.204221] ==================================================================
Home
[ 27.423690] ==================================================================
[ 27.424520] BUG: KASAN: invalid-free in kfree+0x271/0x3f0
[ 27.425419] Free of addr ffff888102798001 by task kunit_try_catch/158
[ 27.427343]
[ 27.427848] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.428689] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.429758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.430429] Call Trace:
[ 27.431003] <TASK>
[ 27.431262] dump_stack_lvl+0x73/0xb0
[ 27.432318] print_report+0xd1/0x640
[ 27.432899] ? __virt_addr_valid+0x1db/0x2d0
[ 27.433338] ? kfree+0x271/0x3f0
[ 27.433923] ? kasan_addr_to_slab+0x11/0xa0
[ 27.434233] ? kfree+0x271/0x3f0
[ 27.434650] kasan_report_invalid_free+0xc0/0xf0
[ 27.435381] ? kfree+0x271/0x3f0
[ 27.435812] ? kfree+0x271/0x3f0
[ 27.436177] __kasan_kfree_large+0x86/0xd0
[ 27.436532] free_large_kmalloc+0x3b/0xd0
[ 27.437217] kfree+0x271/0x3f0
[ 27.437564] ? kmalloc_large_invalid_free+0x90/0x2b0
[ 27.438235] kmalloc_large_invalid_free+0x121/0x2b0
[ 27.438989] ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[ 27.440325] ? __schedule+0xc3e/0x2790
[ 27.440750] ? __pfx_read_tsc+0x10/0x10
[ 27.441670] ? ktime_get_ts64+0x84/0x230
[ 27.442123] kunit_try_run_case+0x1b3/0x490
[ 27.442587] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.443330] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.443790] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.444682] ? __kthread_parkme+0x82/0x160
[ 27.445305] ? preempt_count_sub+0x50/0x80
[ 27.446315] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.446875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.447557] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.448202] kthread+0x257/0x310
[ 27.449322] ? __pfx_kthread+0x10/0x10
[ 27.450149] ret_from_fork+0x41/0x80
[ 27.450853] ? __pfx_kthread+0x10/0x10
[ 27.451492] ret_from_fork_asm+0x1a/0x30
[ 27.452566] </TASK>
[ 27.453324]
[ 27.453706] The buggy address belongs to the physical page:
[ 27.454728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102798
[ 27.455150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.456137] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.456753] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 27.457457] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 27.458191] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 27.459784] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 27.460736] head: 0200000000000002 ffffea000409e601 ffffffffffffffff 0000000000000000
[ 27.461494] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 27.463048] page dumped because: kasan: bad access detected
[ 27.463529]
[ 27.464261] Memory state around the buggy address:
[ 27.465109] ffff888102797f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.466175] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.467304] >ffff888102798000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.468362] ^
[ 27.468947] ffff888102798080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.470135] ffff888102798100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.471029] ==================================================================
Home
[ 31.385212] ==================================================================
[ 31.386833] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[ 31.387426] Free of addr ffff888102b50001 by task kunit_try_catch/251
[ 31.388283]
[ 31.388795] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.390651] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.391079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.391863] Call Trace:
[ 31.392141] <TASK>
[ 31.392938] dump_stack_lvl+0x73/0xb0
[ 31.393403] print_report+0xd1/0x640
[ 31.393894] ? __virt_addr_valid+0x1db/0x2d0
[ 31.394427] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[ 31.394761] ? kasan_addr_to_slab+0x11/0xa0
[ 31.395404] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[ 31.396029] kasan_report_invalid_free+0xc0/0xf0
[ 31.396614] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[ 31.397707] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[ 31.398517] __kasan_mempool_poison_object+0x102/0x1d0
[ 31.398889] mempool_free+0x2ec/0x380
[ 31.399448] mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[ 31.399945] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[ 31.400734] ? update_curr+0x5c1/0x810
[ 31.401067] mempool_kmalloc_large_invalid_free+0xb1/0x100
[ 31.402141] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[ 31.403170] ? schedule+0x7c/0x310
[ 31.403905] ? __pfx_mempool_kmalloc+0x10/0x10
[ 31.404608] ? __pfx_mempool_kfree+0x10/0x10
[ 31.405164] ? __pfx_read_tsc+0x10/0x10
[ 31.405562] ? ktime_get_ts64+0x84/0x230
[ 31.406209] kunit_try_run_case+0x1b3/0x490
[ 31.407136] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.407717] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.408277] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.408985] ? __kthread_parkme+0x82/0x160
[ 31.409758] ? preempt_count_sub+0x50/0x80
[ 31.410188] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.411435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.412025] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.412588] kthread+0x257/0x310
[ 31.412977] ? __pfx_kthread+0x10/0x10
[ 31.413710] ret_from_fork+0x41/0x80
[ 31.414064] ? __pfx_kthread+0x10/0x10
[ 31.415076] ret_from_fork_asm+0x1a/0x30
[ 31.415774] </TASK>
[ 31.416261]
[ 31.416636] The buggy address belongs to the physical page:
[ 31.417395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50
[ 31.418704] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 31.419896] flags: 0x200000000000040(head|node=0|zone=2)
[ 31.420743] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 31.422211] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.423006] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 31.424075] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.425365] head: 0200000000000002 ffffea00040ad401 ffffffffffffffff 0000000000000000
[ 31.426440] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 31.427819] page dumped because: kasan: bad access detected
[ 31.428143]
[ 31.429129] Memory state around the buggy address:
[ 31.429722] ffff888102b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.430788] ffff888102b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.431767] >ffff888102b50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 31.432407] ^
[ 31.432724] ffff888102b50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 31.433909] ffff888102b50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 31.435050] ==================================================================
Home
[ 28.847827] ==================================================================
[ 28.848802] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x172/0x330
[ 28.849911] Read of size 18446744073709551614 at addr ffff888101ea0104 by task kunit_try_catch/188
[ 28.851122]
[ 28.851339] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.852703] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.853430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.854928] Call Trace:
[ 28.855949] <TASK>
[ 28.856179] dump_stack_lvl+0x73/0xb0
[ 28.857033] print_report+0xd1/0x640
[ 28.857870] ? __virt_addr_valid+0x1db/0x2d0
[ 28.858795] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.860456] kasan_report+0x102/0x140
[ 28.861242] ? kmalloc_memmove_negative_size+0x172/0x330
[ 28.862156] ? kmalloc_memmove_negative_size+0x172/0x330
[ 28.863042] kasan_check_range+0x10c/0x1c0
[ 28.863488] __asan_memmove+0x27/0x70
[ 28.864194] kmalloc_memmove_negative_size+0x172/0x330
[ 28.865353] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[ 28.866171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.866570] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.867356] ? __pfx_read_tsc+0x10/0x10
[ 28.868310] ? ktime_get_ts64+0x84/0x230
[ 28.869100] kunit_try_run_case+0x1b3/0x490
[ 28.869587] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.870055] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.871051] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.872404] ? __kthread_parkme+0x82/0x160
[ 28.872905] ? preempt_count_sub+0x50/0x80
[ 28.873914] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.874566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.875316] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.876259] kthread+0x257/0x310
[ 28.876834] ? __pfx_kthread+0x10/0x10
[ 28.877237] ret_from_fork+0x41/0x80
[ 28.877537] ? __pfx_kthread+0x10/0x10
[ 28.877824] ret_from_fork_asm+0x1a/0x30
[ 28.878692] </TASK>
[ 28.879237]
[ 28.879625] Allocated by task 188:
[ 28.880335] kasan_save_stack+0x3d/0x60
[ 28.881043] kasan_save_track+0x18/0x40
[ 28.881741] kasan_save_alloc_info+0x3b/0x50
[ 28.882617] __kasan_kmalloc+0xb7/0xc0
[ 28.882991] __kmalloc_cache_noprof+0x184/0x410
[ 28.883812] kmalloc_memmove_negative_size+0xad/0x330
[ 28.884339] kunit_try_run_case+0x1b3/0x490
[ 28.885034] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.886090] kthread+0x257/0x310
[ 28.887344] ret_from_fork+0x41/0x80
[ 28.887826] ret_from_fork_asm+0x1a/0x30
[ 28.888614]
[ 28.888790] The buggy address belongs to the object at ffff888101ea0100
[ 28.888790] which belongs to the cache kmalloc-64 of size 64
[ 28.889791] The buggy address is located 4 bytes inside of
[ 28.889791] 64-byte region [ffff888101ea0100, ffff888101ea0140)
[ 28.891273]
[ 28.891558] The buggy address belongs to the physical page:
[ 28.892279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea0
[ 28.893127] flags: 0x200000000000000(node=0|zone=2)
[ 28.893821] page_type: f5(slab)
[ 28.894238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.894731] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.895584] page dumped because: kasan: bad access detected
[ 28.896073]
[ 28.896220] Memory state around the buggy address:
[ 28.897724] ffff888101ea0000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.898509] ffff888101ea0080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.899077] >ffff888101ea0100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 28.899900] ^
[ 28.900267] ffff888101ea0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.901504] ffff888101ea0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.902314] ==================================================================
Home
[ 35.852855] ==================================================================
[ 35.854557] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[ 35.856399] Read of size 8 at addr ffff888101eb7278 by task kunit_try_catch/289
[ 35.857853]
[ 35.858451] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.859225] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.859824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 35.861242] Call Trace:
[ 35.861521] <TASK>
[ 35.862198] dump_stack_lvl+0x73/0xb0
[ 35.863272] print_report+0xd1/0x640
[ 35.863659] ? __virt_addr_valid+0x1db/0x2d0
[ 35.864067] ? kasan_complete_mode_report_info+0x2a/0x200
[ 35.864605] kasan_report+0x102/0x140
[ 35.864972] ? copy_to_kernel_nofault+0x225/0x260
[ 35.866064] ? copy_to_kernel_nofault+0x225/0x260
[ 35.866718] __asan_report_load8_noabort+0x18/0x20
[ 35.867332] copy_to_kernel_nofault+0x225/0x260
[ 35.867943] copy_to_kernel_nofault_oob+0x179/0x4e0
[ 35.868571] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[ 35.869375] ? finish_task_switch.isra.0+0x153/0x700
[ 35.870031] ? __schedule+0xc3e/0x2790
[ 35.870550] ? trace_hardirqs_on+0x37/0xe0
[ 35.871095] ? __pfx_read_tsc+0x10/0x10
[ 35.871563] ? ktime_get_ts64+0x84/0x230
[ 35.872017] kunit_try_run_case+0x1b3/0x490
[ 35.872791] ? __pfx_kunit_try_run_case+0x10/0x10
[ 35.873223] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 35.873907] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 35.874308] ? __kthread_parkme+0x82/0x160
[ 35.874814] ? preempt_count_sub+0x50/0x80
[ 35.875389] ? __pfx_kunit_try_run_case+0x10/0x10
[ 35.875904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 35.876604] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 35.877089] kthread+0x257/0x310
[ 35.877739] ? __pfx_kthread+0x10/0x10
[ 35.878261] ret_from_fork+0x41/0x80
[ 35.879508] ? __pfx_kthread+0x10/0x10
[ 35.880420] ret_from_fork_asm+0x1a/0x30
[ 35.881165] </TASK>
[ 35.881462]
[ 35.881611] Allocated by task 289:
[ 35.882168] kasan_save_stack+0x3d/0x60
[ 35.882828] kasan_save_track+0x18/0x40
[ 35.883288] kasan_save_alloc_info+0x3b/0x50
[ 35.884480] __kasan_kmalloc+0xb7/0xc0
[ 35.885218] __kmalloc_cache_noprof+0x184/0x410
[ 35.885783] copy_to_kernel_nofault_oob+0xc5/0x4e0
[ 35.886936] kunit_try_run_case+0x1b3/0x490
[ 35.887422] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 35.888237] kthread+0x257/0x310
[ 35.888974] ret_from_fork+0x41/0x80
[ 35.889592] ret_from_fork_asm+0x1a/0x30
[ 35.890014]
[ 35.890308] The buggy address belongs to the object at ffff888101eb7200
[ 35.890308] which belongs to the cache kmalloc-128 of size 128
[ 35.892285] The buggy address is located 0 bytes to the right of
[ 35.892285] allocated 120-byte region [ffff888101eb7200, ffff888101eb7278)
[ 35.894535]
[ 35.894865] The buggy address belongs to the physical page:
[ 35.895457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eb7
[ 35.896113] flags: 0x200000000000000(node=0|zone=2)
[ 35.897211] page_type: f5(slab)
[ 35.898202] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 35.899122] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.900079] page dumped because: kasan: bad access detected
[ 35.900665]
[ 35.900852] Memory state around the buggy address:
[ 35.901341] ffff888101eb7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 35.902694] ffff888101eb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.903618] >ffff888101eb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 35.904206] ^
[ 35.905125] ffff888101eb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.906403] ffff888101eb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.907742] ==================================================================
Home
[ 35.909649] ==================================================================
[ 35.910829] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[ 35.911420] Write of size 8 at addr ffff888101eb7278 by task kunit_try_catch/289
[ 35.913410]
[ 35.913759] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.915380] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.915791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 35.916744] Call Trace:
[ 35.917296] <TASK>
[ 35.917804] dump_stack_lvl+0x73/0xb0
[ 35.918269] print_report+0xd1/0x640
[ 35.918660] ? __virt_addr_valid+0x1db/0x2d0
[ 35.918993] ? kasan_complete_mode_report_info+0x2a/0x200
[ 35.919828] kasan_report+0x102/0x140
[ 35.920542] ? copy_to_kernel_nofault+0x99/0x260
[ 35.921266] ? copy_to_kernel_nofault+0x99/0x260
[ 35.921949] kasan_check_range+0x10c/0x1c0
[ 35.922915] __kasan_check_write+0x18/0x20
[ 35.923687] copy_to_kernel_nofault+0x99/0x260
[ 35.924267] copy_to_kernel_nofault_oob+0x214/0x4e0
[ 35.924866] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[ 35.925320] ? finish_task_switch.isra.0+0x153/0x700
[ 35.925835] ? __schedule+0xc3e/0x2790
[ 35.926234] ? trace_hardirqs_on+0x37/0xe0
[ 35.926759] ? __pfx_read_tsc+0x10/0x10
[ 35.927222] ? ktime_get_ts64+0x84/0x230
[ 35.927689] kunit_try_run_case+0x1b3/0x490
[ 35.928315] ? __pfx_kunit_try_run_case+0x10/0x10
[ 35.928848] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 35.929457] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 35.929854] ? __kthread_parkme+0x82/0x160
[ 35.930394] ? preempt_count_sub+0x50/0x80
[ 35.930797] ? __pfx_kunit_try_run_case+0x10/0x10
[ 35.931165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 35.932002] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 35.932409] kthread+0x257/0x310
[ 35.932896] ? __pfx_kthread+0x10/0x10
[ 35.933385] ret_from_fork+0x41/0x80
[ 35.933917] ? __pfx_kthread+0x10/0x10
[ 35.934409] ret_from_fork_asm+0x1a/0x30
[ 35.934772] </TASK>
[ 35.934966]
[ 35.935227] Allocated by task 289:
[ 35.935897] kasan_save_stack+0x3d/0x60
[ 35.936195] kasan_save_track+0x18/0x40
[ 35.936753] kasan_save_alloc_info+0x3b/0x50
[ 35.937263] __kasan_kmalloc+0xb7/0xc0
[ 35.937737] __kmalloc_cache_noprof+0x184/0x410
[ 35.938166] copy_to_kernel_nofault_oob+0xc5/0x4e0
[ 35.938537] kunit_try_run_case+0x1b3/0x490
[ 35.938987] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 35.939698] kthread+0x257/0x310
[ 35.940115] ret_from_fork+0x41/0x80
[ 35.940668] ret_from_fork_asm+0x1a/0x30
[ 35.941114]
[ 35.941272] The buggy address belongs to the object at ffff888101eb7200
[ 35.941272] which belongs to the cache kmalloc-128 of size 128
[ 35.942520] The buggy address is located 0 bytes to the right of
[ 35.942520] allocated 120-byte region [ffff888101eb7200, ffff888101eb7278)
[ 35.943306]
[ 35.943678] The buggy address belongs to the physical page:
[ 35.944286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eb7
[ 35.945261] flags: 0x200000000000000(node=0|zone=2)
[ 35.945700] page_type: f5(slab)
[ 35.945953] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 35.946713] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.947467] page dumped because: kasan: bad access detected
[ 35.947922]
[ 35.948079] Memory state around the buggy address:
[ 35.948476] ffff888101eb7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.949095] ffff888101eb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.950250] >ffff888101eb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 35.950828] ^
[ 35.951604] ffff888101eb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.952075] ffff888101eb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.952794] ==================================================================
Home
[ 32.096782] ==================================================================
[ 32.097425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 32.098531] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.099136]
[ 32.099394] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.100267] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.101384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.102730] Call Trace:
[ 32.102919] <TASK>
[ 32.103118] dump_stack_lvl+0x73/0xb0
[ 32.103353] print_report+0xd1/0x640
[ 32.103927] ? __virt_addr_valid+0x1db/0x2d0
[ 32.104242] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.105122] kasan_report+0x102/0x140
[ 32.105821] ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 32.106700] ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 32.107846] kasan_check_range+0x10c/0x1c0
[ 32.108603] __kasan_check_write+0x18/0x20
[ 32.109290] kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 32.110175] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.111208] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.112188] ? trace_hardirqs_on+0x37/0xe0
[ 32.112890] ? kasan_bitops_generic+0x93/0x1c0
[ 32.113603] kasan_bitops_generic+0x117/0x1c0
[ 32.114508] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.114758] ? __pfx_read_tsc+0x10/0x10
[ 32.114943] ? ktime_get_ts64+0x84/0x230
[ 32.115146] kunit_try_run_case+0x1b3/0x490
[ 32.115390] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.115674] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.116054] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.117839] ? __kthread_parkme+0x82/0x160
[ 32.118429] ? preempt_count_sub+0x50/0x80
[ 32.118976] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.119614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.120278] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.120806] kthread+0x257/0x310
[ 32.121062] ? __pfx_kthread+0x10/0x10
[ 32.122100] ret_from_fork+0x41/0x80
[ 32.122864] ? __pfx_kthread+0x10/0x10
[ 32.123515] ret_from_fork_asm+0x1a/0x30
[ 32.124097] </TASK>
[ 32.124489]
[ 32.124815] Allocated by task 269:
[ 32.125386] kasan_save_stack+0x3d/0x60
[ 32.125798] kasan_save_track+0x18/0x40
[ 32.126431] kasan_save_alloc_info+0x3b/0x50
[ 32.126765] __kasan_kmalloc+0xb7/0xc0
[ 32.127280] __kmalloc_cache_noprof+0x184/0x410
[ 32.127632] kasan_bitops_generic+0x93/0x1c0
[ 32.129111] kunit_try_run_case+0x1b3/0x490
[ 32.129486] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.130286] kthread+0x257/0x310
[ 32.130560] ret_from_fork+0x41/0x80
[ 32.130912] ret_from_fork_asm+0x1a/0x30
[ 32.131805]
[ 32.132056] The buggy address belongs to the object at ffff888101bd1160
[ 32.132056] which belongs to the cache kmalloc-16 of size 16
[ 32.133392] The buggy address is located 8 bytes inside of
[ 32.133392] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.135659]
[ 32.136006] The buggy address belongs to the physical page:
[ 32.136723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.137799] flags: 0x200000000000000(node=0|zone=2)
[ 32.138276] page_type: f5(slab)
[ 32.138588] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.140221] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.141172] page dumped because: kasan: bad access detected
[ 32.141823]
[ 32.142074] Memory state around the buggy address:
[ 32.143017] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.143871] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.145022] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.145881] ^
[ 32.146587] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.147210] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.148794] ==================================================================
---
[ 32.383956] ==================================================================
[ 32.385563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[ 32.386578] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.387250]
[ 32.388291] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.389921] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.390297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.391270] Call Trace:
[ 32.391823] <TASK>
[ 32.392278] dump_stack_lvl+0x73/0xb0
[ 32.392866] print_report+0xd1/0x640
[ 32.393228] ? __virt_addr_valid+0x1db/0x2d0
[ 32.394006] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.394680] kasan_report+0x102/0x140
[ 32.395070] ? kasan_bitops_modify.constprop.0+0x548/0xd50
[ 32.395575] ? kasan_bitops_modify.constprop.0+0x548/0xd50
[ 32.396086] kasan_check_range+0x10c/0x1c0
[ 32.397019] __kasan_check_write+0x18/0x20
[ 32.397633] kasan_bitops_modify.constprop.0+0x548/0xd50
[ 32.398301] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.399025] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.399758] ? trace_hardirqs_on+0x37/0xe0
[ 32.400350] ? kasan_bitops_generic+0x93/0x1c0
[ 32.400944] kasan_bitops_generic+0x117/0x1c0
[ 32.401429] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.401902] ? __pfx_read_tsc+0x10/0x10
[ 32.402272] ? ktime_get_ts64+0x84/0x230
[ 32.402748] kunit_try_run_case+0x1b3/0x490
[ 32.403165] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.404345] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.404944] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.405448] ? __kthread_parkme+0x82/0x160
[ 32.405967] ? preempt_count_sub+0x50/0x80
[ 32.406810] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.407438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.408974] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.409342] kthread+0x257/0x310
[ 32.410068] ? __pfx_kthread+0x10/0x10
[ 32.410526] ret_from_fork+0x41/0x80
[ 32.411006] ? __pfx_kthread+0x10/0x10
[ 32.411441] ret_from_fork_asm+0x1a/0x30
[ 32.411966] </TASK>
[ 32.412265]
[ 32.412567] Allocated by task 269:
[ 32.412831] kasan_save_stack+0x3d/0x60
[ 32.413414] kasan_save_track+0x18/0x40
[ 32.413760] kasan_save_alloc_info+0x3b/0x50
[ 32.414790] __kasan_kmalloc+0xb7/0xc0
[ 32.415581] __kmalloc_cache_noprof+0x184/0x410
[ 32.416063] kasan_bitops_generic+0x93/0x1c0
[ 32.416557] kunit_try_run_case+0x1b3/0x490
[ 32.417469] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.417943] kthread+0x257/0x310
[ 32.418297] ret_from_fork+0x41/0x80
[ 32.418685] ret_from_fork_asm+0x1a/0x30
[ 32.419133]
[ 32.420002] The buggy address belongs to the object at ffff888101bd1160
[ 32.420002] which belongs to the cache kmalloc-16 of size 16
[ 32.421160] The buggy address is located 8 bytes inside of
[ 32.421160] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.422276]
[ 32.422520] The buggy address belongs to the physical page:
[ 32.423144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.423921] flags: 0x200000000000000(node=0|zone=2)
[ 32.424459] page_type: f5(slab)
[ 32.424798] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.425674] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.426355] page dumped because: kasan: bad access detected
[ 32.426831]
[ 32.427078] Memory state around the buggy address:
[ 32.427655] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.428309] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.428951] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.429744] ^
[ 32.430264] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.430982] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.431611] ==================================================================
---
[ 32.242161] ==================================================================
[ 32.242669] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[ 32.243694] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.244860]
[ 32.245237] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.246164] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.246476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.247498] Call Trace:
[ 32.247735] <TASK>
[ 32.247930] dump_stack_lvl+0x73/0xb0
[ 32.248624] print_report+0xd1/0x640
[ 32.249180] ? __virt_addr_valid+0x1db/0x2d0
[ 32.249722] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.250494] kasan_report+0x102/0x140
[ 32.250921] ? kasan_bitops_modify.constprop.0+0x374/0xd50
[ 32.251692] ? kasan_bitops_modify.constprop.0+0x374/0xd50
[ 32.252212] kasan_check_range+0x10c/0x1c0
[ 32.252758] __kasan_check_write+0x18/0x20
[ 32.253245] kasan_bitops_modify.constprop.0+0x374/0xd50
[ 32.253940] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.254582] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.255175] ? trace_hardirqs_on+0x37/0xe0
[ 32.255757] ? kasan_bitops_generic+0x93/0x1c0
[ 32.256276] kasan_bitops_generic+0x117/0x1c0
[ 32.256776] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.257444] ? __pfx_read_tsc+0x10/0x10
[ 32.258071] ? ktime_get_ts64+0x84/0x230
[ 32.258518] kunit_try_run_case+0x1b3/0x490
[ 32.258968] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.259947] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.260866] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.261350] ? __kthread_parkme+0x82/0x160
[ 32.262048] ? preempt_count_sub+0x50/0x80
[ 32.262491] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.262979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.264304] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.265380] kthread+0x257/0x310
[ 32.265922] ? __pfx_kthread+0x10/0x10
[ 32.266369] ret_from_fork+0x41/0x80
[ 32.266659] ? __pfx_kthread+0x10/0x10
[ 32.267096] ret_from_fork_asm+0x1a/0x30
[ 32.267711] </TASK>
[ 32.267971]
[ 32.268126] Allocated by task 269:
[ 32.268605] kasan_save_stack+0x3d/0x60
[ 32.269442] kasan_save_track+0x18/0x40
[ 32.269847] kasan_save_alloc_info+0x3b/0x50
[ 32.270289] __kasan_kmalloc+0xb7/0xc0
[ 32.270566] __kmalloc_cache_noprof+0x184/0x410
[ 32.270882] kasan_bitops_generic+0x93/0x1c0
[ 32.272188] kunit_try_run_case+0x1b3/0x490
[ 32.272523] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.273463] kthread+0x257/0x310
[ 32.273829] ret_from_fork+0x41/0x80
[ 32.274220] ret_from_fork_asm+0x1a/0x30
[ 32.275223]
[ 32.275762] The buggy address belongs to the object at ffff888101bd1160
[ 32.275762] which belongs to the cache kmalloc-16 of size 16
[ 32.277292] The buggy address is located 8 bytes inside of
[ 32.277292] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.279338]
[ 32.279490] The buggy address belongs to the physical page:
[ 32.280286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.281405] flags: 0x200000000000000(node=0|zone=2)
[ 32.281902] page_type: f5(slab)
[ 32.282257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.283801] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.284673] page dumped because: kasan: bad access detected
[ 32.285270]
[ 32.285515] Memory state around the buggy address:
[ 32.286219] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.286929] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.287221] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.287605] ^
[ 32.288701] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.289415] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.290064] ==================================================================
---
[ 32.339425] ==================================================================
[ 32.339931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 32.341068] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.341985]
[ 32.342164] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.343069] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.343837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.345143] Call Trace:
[ 32.345281] <TASK>
[ 32.345535] dump_stack_lvl+0x73/0xb0
[ 32.346048] print_report+0xd1/0x640
[ 32.346552] ? __virt_addr_valid+0x1db/0x2d0
[ 32.346875] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.347652] kasan_report+0x102/0x140
[ 32.348191] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 32.348840] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 32.349477] kasan_check_range+0x10c/0x1c0
[ 32.350046] __kasan_check_write+0x18/0x20
[ 32.350535] kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 32.350981] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.351743] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.352161] ? trace_hardirqs_on+0x37/0xe0
[ 32.352675] ? kasan_bitops_generic+0x93/0x1c0
[ 32.353160] kasan_bitops_generic+0x117/0x1c0
[ 32.353765] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.354236] ? __pfx_read_tsc+0x10/0x10
[ 32.354793] ? ktime_get_ts64+0x84/0x230
[ 32.355188] kunit_try_run_case+0x1b3/0x490
[ 32.355736] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.356177] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.356809] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.357479] ? __kthread_parkme+0x82/0x160
[ 32.357773] ? preempt_count_sub+0x50/0x80
[ 32.358353] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.358899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.359630] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.360284] kthread+0x257/0x310
[ 32.360662] ? __pfx_kthread+0x10/0x10
[ 32.361137] ret_from_fork+0x41/0x80
[ 32.361718] ? __pfx_kthread+0x10/0x10
[ 32.362220] ret_from_fork_asm+0x1a/0x30
[ 32.362721] </TASK>
[ 32.363046]
[ 32.363348] Allocated by task 269:
[ 32.363776] kasan_save_stack+0x3d/0x60
[ 32.364273] kasan_save_track+0x18/0x40
[ 32.364651] kasan_save_alloc_info+0x3b/0x50
[ 32.365231] __kasan_kmalloc+0xb7/0xc0
[ 32.365573] __kmalloc_cache_noprof+0x184/0x410
[ 32.366114] kasan_bitops_generic+0x93/0x1c0
[ 32.366737] kunit_try_run_case+0x1b3/0x490
[ 32.367255] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.367845] kthread+0x257/0x310
[ 32.368349] ret_from_fork+0x41/0x80
[ 32.368760] ret_from_fork_asm+0x1a/0x30
[ 32.369352]
[ 32.369632] The buggy address belongs to the object at ffff888101bd1160
[ 32.369632] which belongs to the cache kmalloc-16 of size 16
[ 32.371254] The buggy address is located 8 bytes inside of
[ 32.371254] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.372722]
[ 32.372838] The buggy address belongs to the physical page:
[ 32.373061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.373414] flags: 0x200000000000000(node=0|zone=2)
[ 32.373826] page_type: f5(slab)
[ 32.374231] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.374974] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.375721] page dumped because: kasan: bad access detected
[ 32.376121]
[ 32.376274] Memory state around the buggy address:
[ 32.377234] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.379000] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.379710] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.380372] ^
[ 32.380904] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.381725] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.382711] ==================================================================
---
[ 32.039252] ==================================================================
[ 32.040218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[ 32.041630] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.043256]
[ 32.043901] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.045783] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.047016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.047896] Call Trace:
[ 32.048124] <TASK>
[ 32.048454] dump_stack_lvl+0x73/0xb0
[ 32.048843] print_report+0xd1/0x640
[ 32.049296] ? __virt_addr_valid+0x1db/0x2d0
[ 32.049738] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.050237] kasan_report+0x102/0x140
[ 32.051258] ? kasan_bitops_modify.constprop.0+0x102/0xd50
[ 32.052388] ? kasan_bitops_modify.constprop.0+0x102/0xd50
[ 32.052961] kasan_check_range+0x10c/0x1c0
[ 32.053407] __kasan_check_write+0x18/0x20
[ 32.054401] kasan_bitops_modify.constprop.0+0x102/0xd50
[ 32.055365] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.056234] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.057018] ? trace_hardirqs_on+0x37/0xe0
[ 32.058140] ? kasan_bitops_generic+0x93/0x1c0
[ 32.058892] kasan_bitops_generic+0x117/0x1c0
[ 32.059362] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.060168] ? __pfx_read_tsc+0x10/0x10
[ 32.060875] ? ktime_get_ts64+0x84/0x230
[ 32.061629] kunit_try_run_case+0x1b3/0x490
[ 32.062246] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.063102] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.063891] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.064376] ? __kthread_parkme+0x82/0x160
[ 32.065304] ? preempt_count_sub+0x50/0x80
[ 32.065724] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.066201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.066789] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.068144] kthread+0x257/0x310
[ 32.068849] ? __pfx_kthread+0x10/0x10
[ 32.069300] ret_from_fork+0x41/0x80
[ 32.069979] ? __pfx_kthread+0x10/0x10
[ 32.070390] ret_from_fork_asm+0x1a/0x30
[ 32.070787] </TASK>
[ 32.071286]
[ 32.071602] Allocated by task 269:
[ 32.072587] kasan_save_stack+0x3d/0x60
[ 32.073282] kasan_save_track+0x18/0x40
[ 32.073940] kasan_save_alloc_info+0x3b/0x50
[ 32.074457] __kasan_kmalloc+0xb7/0xc0
[ 32.074836] __kmalloc_cache_noprof+0x184/0x410
[ 32.075227] kasan_bitops_generic+0x93/0x1c0
[ 32.075553] kunit_try_run_case+0x1b3/0x490
[ 32.076229] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.077101] kthread+0x257/0x310
[ 32.077442] ret_from_fork+0x41/0x80
[ 32.078005] ret_from_fork_asm+0x1a/0x30
[ 32.078292]
[ 32.078491] The buggy address belongs to the object at ffff888101bd1160
[ 32.078491] which belongs to the cache kmalloc-16 of size 16
[ 32.080845] The buggy address is located 8 bytes inside of
[ 32.080845] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.082128]
[ 32.082365] The buggy address belongs to the physical page:
[ 32.082870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.083722] flags: 0x200000000000000(node=0|zone=2)
[ 32.084197] page_type: f5(slab)
[ 32.084690] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.086237] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.086933] page dumped because: kasan: bad access detected
[ 32.087766]
[ 32.088074] Memory state around the buggy address:
[ 32.088586] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.089464] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.090754] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.091276] ^
[ 32.092028] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.093081] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.094143] ==================================================================
---
[ 32.151958] ==================================================================
[ 32.152743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 32.153796] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.154343]
[ 32.155143] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.155946] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.156886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.157652] Call Trace:
[ 32.157943] <TASK>
[ 32.158177] dump_stack_lvl+0x73/0xb0
[ 32.159116] print_report+0xd1/0x640
[ 32.159355] ? __virt_addr_valid+0x1db/0x2d0
[ 32.159686] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.160277] kasan_report+0x102/0x140
[ 32.160967] ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 32.161750] ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 32.162252] kasan_check_range+0x10c/0x1c0
[ 32.162775] __kasan_check_write+0x18/0x20
[ 32.163284] kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 32.163849] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.164630] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.165243] ? trace_hardirqs_on+0x37/0xe0
[ 32.165742] ? kasan_bitops_generic+0x93/0x1c0
[ 32.166249] kasan_bitops_generic+0x117/0x1c0
[ 32.166850] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.167243] ? __pfx_read_tsc+0x10/0x10
[ 32.167762] ? ktime_get_ts64+0x84/0x230
[ 32.168218] kunit_try_run_case+0x1b3/0x490
[ 32.168688] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.169117] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.169769] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.170239] ? __kthread_parkme+0x82/0x160
[ 32.170701] ? preempt_count_sub+0x50/0x80
[ 32.171037] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.171677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.172261] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.172732] kthread+0x257/0x310
[ 32.173158] ? __pfx_kthread+0x10/0x10
[ 32.173606] ret_from_fork+0x41/0x80
[ 32.174021] ? __pfx_kthread+0x10/0x10
[ 32.174344] ret_from_fork_asm+0x1a/0x30
[ 32.174884] </TASK>
[ 32.175201]
[ 32.175419] Allocated by task 269:
[ 32.175815] kasan_save_stack+0x3d/0x60
[ 32.176287] kasan_save_track+0x18/0x40
[ 32.176633] kasan_save_alloc_info+0x3b/0x50
[ 32.177159] __kasan_kmalloc+0xb7/0xc0
[ 32.177701] __kmalloc_cache_noprof+0x184/0x410
[ 32.178090] kasan_bitops_generic+0x93/0x1c0
[ 32.178619] kunit_try_run_case+0x1b3/0x490
[ 32.179055] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.179576] kthread+0x257/0x310
[ 32.179988] ret_from_fork+0x41/0x80
[ 32.180527] ret_from_fork_asm+0x1a/0x30
[ 32.180874]
[ 32.181027] The buggy address belongs to the object at ffff888101bd1160
[ 32.181027] which belongs to the cache kmalloc-16 of size 16
[ 32.182090] The buggy address is located 8 bytes inside of
[ 32.182090] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.183188]
[ 32.183443] The buggy address belongs to the physical page:
[ 32.183851] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.184688] flags: 0x200000000000000(node=0|zone=2)
[ 32.185033] page_type: f5(slab)
[ 32.185430] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.186118] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.186893] page dumped because: kasan: bad access detected
[ 32.187424]
[ 32.187655] Memory state around the buggy address:
[ 32.188154] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.188817] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.189459] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.189987] ^
[ 32.191149] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.191811] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.193122] ==================================================================
---
[ 32.194620] ==================================================================
[ 32.196275] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 32.197283] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.198943]
[ 32.199365] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.200253] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.201049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.201934] Call Trace:
[ 32.202209] <TASK>
[ 32.202997] dump_stack_lvl+0x73/0xb0
[ 32.203555] print_report+0xd1/0x640
[ 32.204006] ? __virt_addr_valid+0x1db/0x2d0
[ 32.204722] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.204969] kasan_report+0x102/0x140
[ 32.205150] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 32.205506] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 32.206050] kasan_check_range+0x10c/0x1c0
[ 32.206625] __kasan_check_write+0x18/0x20
[ 32.207086] kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 32.207804] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.208343] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.209118] ? trace_hardirqs_on+0x37/0xe0
[ 32.209629] ? kasan_bitops_generic+0x93/0x1c0
[ 32.210078] kasan_bitops_generic+0x117/0x1c0
[ 32.210883] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.211336] ? __pfx_read_tsc+0x10/0x10
[ 32.211849] ? ktime_get_ts64+0x84/0x230
[ 32.212251] kunit_try_run_case+0x1b3/0x490
[ 32.212865] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.213191] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.213934] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.214587] ? __kthread_parkme+0x82/0x160
[ 32.215026] ? preempt_count_sub+0x50/0x80
[ 32.215704] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.216202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.216895] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.217600] kthread+0x257/0x310
[ 32.217980] ? __pfx_kthread+0x10/0x10
[ 32.218603] ret_from_fork+0x41/0x80
[ 32.219045] ? __pfx_kthread+0x10/0x10
[ 32.219636] ret_from_fork_asm+0x1a/0x30
[ 32.220252] </TASK>
[ 32.220607]
[ 32.220884] Allocated by task 269:
[ 32.221452] kasan_save_stack+0x3d/0x60
[ 32.221900] kasan_save_track+0x18/0x40
[ 32.222599] kasan_save_alloc_info+0x3b/0x50
[ 32.222951] __kasan_kmalloc+0xb7/0xc0
[ 32.223591] __kmalloc_cache_noprof+0x184/0x410
[ 32.224234] kasan_bitops_generic+0x93/0x1c0
[ 32.224784] kunit_try_run_case+0x1b3/0x490
[ 32.225203] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.225840] kthread+0x257/0x310
[ 32.226131] ret_from_fork+0x41/0x80
[ 32.226855] ret_from_fork_asm+0x1a/0x30
[ 32.227743]
[ 32.227951] The buggy address belongs to the object at ffff888101bd1160
[ 32.227951] which belongs to the cache kmalloc-16 of size 16
[ 32.229428] The buggy address is located 8 bytes inside of
[ 32.229428] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.230984]
[ 32.231197] The buggy address belongs to the physical page:
[ 32.232188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.232890] flags: 0x200000000000000(node=0|zone=2)
[ 32.233288] page_type: f5(slab)
[ 32.233548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.234025] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.234638] page dumped because: kasan: bad access detected
[ 32.235051]
[ 32.235276] Memory state around the buggy address:
[ 32.235734] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.236204] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.237429] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.238061] ^
[ 32.238721] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.239304] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.239976] ==================================================================
---
[ 32.292201] ==================================================================
[ 32.294524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 32.295373] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.296054]
[ 32.297099] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.297976] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.298422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.299593] Call Trace:
[ 32.299808] <TASK>
[ 32.300127] dump_stack_lvl+0x73/0xb0
[ 32.300622] print_report+0xd1/0x640
[ 32.301252] ? __virt_addr_valid+0x1db/0x2d0
[ 32.301820] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.302292] kasan_report+0x102/0x140
[ 32.302728] ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 32.303467] ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 32.304440] kasan_check_range+0x10c/0x1c0
[ 32.304917] __kasan_check_write+0x18/0x20
[ 32.305569] kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 32.306239] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 32.306893] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.307365] ? trace_hardirqs_on+0x37/0xe0
[ 32.307900] ? kasan_bitops_generic+0x93/0x1c0
[ 32.308503] kasan_bitops_generic+0x117/0x1c0
[ 32.309137] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.309747] ? __pfx_read_tsc+0x10/0x10
[ 32.310127] ? ktime_get_ts64+0x84/0x230
[ 32.310717] kunit_try_run_case+0x1b3/0x490
[ 32.311232] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.311697] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.312221] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.312870] ? __kthread_parkme+0x82/0x160
[ 32.313476] ? preempt_count_sub+0x50/0x80
[ 32.313914] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.314378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.315149] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.315718] kthread+0x257/0x310
[ 32.316158] ? __pfx_kthread+0x10/0x10
[ 32.316659] ret_from_fork+0x41/0x80
[ 32.317065] ? __pfx_kthread+0x10/0x10
[ 32.317572] ret_from_fork_asm+0x1a/0x30
[ 32.318131] </TASK>
[ 32.318339]
[ 32.318647] Allocated by task 269:
[ 32.318903] kasan_save_stack+0x3d/0x60
[ 32.319520] kasan_save_track+0x18/0x40
[ 32.319883] kasan_save_alloc_info+0x3b/0x50
[ 32.320441] __kasan_kmalloc+0xb7/0xc0
[ 32.320858] __kmalloc_cache_noprof+0x184/0x410
[ 32.321297] kasan_bitops_generic+0x93/0x1c0
[ 32.321822] kunit_try_run_case+0x1b3/0x490
[ 32.322146] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.322569] kthread+0x257/0x310
[ 32.323041] ret_from_fork+0x41/0x80
[ 32.323632] ret_from_fork_asm+0x1a/0x30
[ 32.324082]
[ 32.324231] The buggy address belongs to the object at ffff888101bd1160
[ 32.324231] which belongs to the cache kmalloc-16 of size 16
[ 32.325430] The buggy address is located 8 bytes inside of
[ 32.325430] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.326608]
[ 32.326857] The buggy address belongs to the physical page:
[ 32.327303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.328083] flags: 0x200000000000000(node=0|zone=2)
[ 32.328925] page_type: f5(slab)
[ 32.329270] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.330242] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.331079] page dumped because: kasan: bad access detected
[ 32.331773]
[ 32.331974] Memory state around the buggy address:
[ 32.332423] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.332833] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.333710] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.334112] ^
[ 32.335187] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.336357] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.337185] ==================================================================
Home
[ 32.801575] ==================================================================
[ 32.803098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 32.804098] Read of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.805238]
[ 32.805436] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.806709] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.806889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.807236] Call Trace:
[ 32.807403] <TASK>
[ 32.807775] dump_stack_lvl+0x73/0xb0
[ 32.808274] print_report+0xd1/0x640
[ 32.808747] ? __virt_addr_valid+0x1db/0x2d0
[ 32.809266] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.810653] kasan_report+0x102/0x140
[ 32.811021] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 32.811674] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 32.812232] __asan_report_load8_noabort+0x18/0x20
[ 32.813115] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 32.813695] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.814356] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.814807] ? trace_hardirqs_on+0x37/0xe0
[ 32.815235] ? kasan_bitops_generic+0x93/0x1c0
[ 32.815808] kasan_bitops_generic+0x122/0x1c0
[ 32.816121] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.817001] ? __pfx_read_tsc+0x10/0x10
[ 32.817948] ? ktime_get_ts64+0x84/0x230
[ 32.818562] kunit_try_run_case+0x1b3/0x490
[ 32.819074] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.819603] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.820112] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.821277] ? __kthread_parkme+0x82/0x160
[ 32.821946] ? preempt_count_sub+0x50/0x80
[ 32.822387] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.823221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.823815] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.824315] kthread+0x257/0x310
[ 32.824792] ? __pfx_kthread+0x10/0x10
[ 32.825071] ret_from_fork+0x41/0x80
[ 32.825750] ? __pfx_kthread+0x10/0x10
[ 32.826300] ret_from_fork_asm+0x1a/0x30
[ 32.826791] </TASK>
[ 32.827035]
[ 32.827378] Allocated by task 269:
[ 32.827973] kasan_save_stack+0x3d/0x60
[ 32.828300] kasan_save_track+0x18/0x40
[ 32.828865] kasan_save_alloc_info+0x3b/0x50
[ 32.829240] __kasan_kmalloc+0xb7/0xc0
[ 32.829693] __kmalloc_cache_noprof+0x184/0x410
[ 32.830090] kasan_bitops_generic+0x93/0x1c0
[ 32.830667] kunit_try_run_case+0x1b3/0x490
[ 32.830987] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.831380] kthread+0x257/0x310
[ 32.831886] ret_from_fork+0x41/0x80
[ 32.832618] ret_from_fork_asm+0x1a/0x30
[ 32.833124]
[ 32.833527] The buggy address belongs to the object at ffff888101bd1160
[ 32.833527] which belongs to the cache kmalloc-16 of size 16
[ 32.834473] The buggy address is located 8 bytes inside of
[ 32.834473] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.835938]
[ 32.836285] The buggy address belongs to the physical page:
[ 32.836994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.837736] flags: 0x200000000000000(node=0|zone=2)
[ 32.838172] page_type: f5(slab)
[ 32.838547] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.839144] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.839940] page dumped because: kasan: bad access detected
[ 32.840554]
[ 32.840849] Memory state around the buggy address:
[ 32.841265] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.842058] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.842639] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.843590] ^
[ 32.844222] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.844791] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.845520] ==================================================================
Home
[ 32.621023] ==================================================================
[ 32.622225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 32.623076] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.623576]
[ 32.623976] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.625092] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.625578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.626703] Call Trace:
[ 32.626952] <TASK>
[ 32.627283] dump_stack_lvl+0x73/0xb0
[ 32.627854] print_report+0xd1/0x640
[ 32.628245] ? __virt_addr_valid+0x1db/0x2d0
[ 32.628588] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.628954] kasan_report+0x102/0x140
[ 32.629566] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 32.630474] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 32.631155] kasan_check_range+0x10c/0x1c0
[ 32.631608] __kasan_check_write+0x18/0x20
[ 32.632234] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 32.633119] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.633912] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.634238] ? trace_hardirqs_on+0x37/0xe0
[ 32.634882] ? kasan_bitops_generic+0x93/0x1c0
[ 32.635622] kasan_bitops_generic+0x122/0x1c0
[ 32.636031] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.636435] ? __pfx_read_tsc+0x10/0x10
[ 32.637001] ? ktime_get_ts64+0x84/0x230
[ 32.637625] kunit_try_run_case+0x1b3/0x490
[ 32.638156] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.638722] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.639294] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.639888] ? __kthread_parkme+0x82/0x160
[ 32.640446] ? preempt_count_sub+0x50/0x80
[ 32.640922] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.641501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.642181] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.642893] kthread+0x257/0x310
[ 32.643313] ? __pfx_kthread+0x10/0x10
[ 32.643726] ret_from_fork+0x41/0x80
[ 32.644173] ? __pfx_kthread+0x10/0x10
[ 32.644710] ret_from_fork_asm+0x1a/0x30
[ 32.645269] </TASK>
[ 32.645585]
[ 32.645842] Allocated by task 269:
[ 32.646086] kasan_save_stack+0x3d/0x60
[ 32.646619] kasan_save_track+0x18/0x40
[ 32.647060] kasan_save_alloc_info+0x3b/0x50
[ 32.647633] __kasan_kmalloc+0xb7/0xc0
[ 32.648056] __kmalloc_cache_noprof+0x184/0x410
[ 32.648547] kasan_bitops_generic+0x93/0x1c0
[ 32.649143] kunit_try_run_case+0x1b3/0x490
[ 32.649567] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.650193] kthread+0x257/0x310
[ 32.650728] ret_from_fork+0x41/0x80
[ 32.651102] ret_from_fork_asm+0x1a/0x30
[ 32.651659]
[ 32.651887] The buggy address belongs to the object at ffff888101bd1160
[ 32.651887] which belongs to the cache kmalloc-16 of size 16
[ 32.652988] The buggy address is located 8 bytes inside of
[ 32.652988] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.654152]
[ 32.654459] The buggy address belongs to the physical page:
[ 32.654960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.656282] flags: 0x200000000000000(node=0|zone=2)
[ 32.656616] page_type: f5(slab)
[ 32.657048] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.658347] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.659100] page dumped because: kasan: bad access detected
[ 32.659755]
[ 32.659976] Memory state around the buggy address:
[ 32.660431] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.661134] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.661897] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.662598] ^
[ 32.663162] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.663916] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.664649] ==================================================================
---
[ 32.527922] ==================================================================
[ 32.528887] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 32.529767] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.530440]
[ 32.530667] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.531484] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.532032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.533696] Call Trace:
[ 32.533974] <TASK>
[ 32.534227] dump_stack_lvl+0x73/0xb0
[ 32.534677] print_report+0xd1/0x640
[ 32.535107] ? __virt_addr_valid+0x1db/0x2d0
[ 32.536245] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.536667] kasan_report+0x102/0x140
[ 32.537185] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 32.537891] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 32.538521] kasan_check_range+0x10c/0x1c0
[ 32.539131] __kasan_check_write+0x18/0x20
[ 32.539505] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 32.540394] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.541083] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.541725] ? trace_hardirqs_on+0x37/0xe0
[ 32.542312] ? kasan_bitops_generic+0x93/0x1c0
[ 32.542770] kasan_bitops_generic+0x122/0x1c0
[ 32.543203] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.543984] ? __pfx_read_tsc+0x10/0x10
[ 32.544530] ? ktime_get_ts64+0x84/0x230
[ 32.545082] kunit_try_run_case+0x1b3/0x490
[ 32.545811] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.546352] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.546966] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.547437] ? __kthread_parkme+0x82/0x160
[ 32.547832] ? preempt_count_sub+0x50/0x80
[ 32.548218] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.549440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.550043] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.551201] kthread+0x257/0x310
[ 32.551497] ? __pfx_kthread+0x10/0x10
[ 32.552343] ret_from_fork+0x41/0x80
[ 32.553064] ? __pfx_kthread+0x10/0x10
[ 32.553575] ret_from_fork_asm+0x1a/0x30
[ 32.553889] </TASK>
[ 32.554386]
[ 32.554709] Allocated by task 269:
[ 32.555215] kasan_save_stack+0x3d/0x60
[ 32.556429] kasan_save_track+0x18/0x40
[ 32.557024] kasan_save_alloc_info+0x3b/0x50
[ 32.557535] __kasan_kmalloc+0xb7/0xc0
[ 32.558112] __kmalloc_cache_noprof+0x184/0x410
[ 32.558775] kasan_bitops_generic+0x93/0x1c0
[ 32.559613] kunit_try_run_case+0x1b3/0x490
[ 32.560072] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.560610] kthread+0x257/0x310
[ 32.560942] ret_from_fork+0x41/0x80
[ 32.561291] ret_from_fork_asm+0x1a/0x30
[ 32.562008]
[ 32.562159] The buggy address belongs to the object at ffff888101bd1160
[ 32.562159] which belongs to the cache kmalloc-16 of size 16
[ 32.563460] The buggy address is located 8 bytes inside of
[ 32.563460] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.565297]
[ 32.565678] The buggy address belongs to the physical page:
[ 32.566467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.567620] flags: 0x200000000000000(node=0|zone=2)
[ 32.568006] page_type: f5(slab)
[ 32.568244] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.570272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.571185] page dumped because: kasan: bad access detected
[ 32.571891]
[ 32.572137] Memory state around the buggy address:
[ 32.572857] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.573394] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.574316] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.574942] ^
[ 32.575720] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.576302] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.576991] ==================================================================
---
[ 32.666183] ==================================================================
[ 32.666916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 32.668010] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.668678]
[ 32.668988] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.669857] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.670281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.671138] Call Trace:
[ 32.671588] <TASK>
[ 32.671885] dump_stack_lvl+0x73/0xb0
[ 32.672297] print_report+0xd1/0x640
[ 32.672896] ? __virt_addr_valid+0x1db/0x2d0
[ 32.673446] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.674085] kasan_report+0x102/0x140
[ 32.674514] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 32.675181] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 32.675781] kasan_check_range+0x10c/0x1c0
[ 32.676354] __kasan_check_write+0x18/0x20
[ 32.676988] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 32.677625] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.678361] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.678887] ? trace_hardirqs_on+0x37/0xe0
[ 32.679370] ? kasan_bitops_generic+0x93/0x1c0
[ 32.679996] kasan_bitops_generic+0x122/0x1c0
[ 32.680597] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.681147] ? __pfx_read_tsc+0x10/0x10
[ 32.681618] ? ktime_get_ts64+0x84/0x230
[ 32.682103] kunit_try_run_case+0x1b3/0x490
[ 32.682774] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.683248] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.683925] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.684497] ? __kthread_parkme+0x82/0x160
[ 32.685054] ? preempt_count_sub+0x50/0x80
[ 32.685379] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.686017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.686753] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.687294] kthread+0x257/0x310
[ 32.687682] ? __pfx_kthread+0x10/0x10
[ 32.688528] ret_from_fork+0x41/0x80
[ 32.688926] ? __pfx_kthread+0x10/0x10
[ 32.689345] ret_from_fork_asm+0x1a/0x30
[ 32.689695] </TASK>
[ 32.689966]
[ 32.690120] Allocated by task 269:
[ 32.690714] kasan_save_stack+0x3d/0x60
[ 32.691138] kasan_save_track+0x18/0x40
[ 32.691614] kasan_save_alloc_info+0x3b/0x50
[ 32.692115] __kasan_kmalloc+0xb7/0xc0
[ 32.692609] __kmalloc_cache_noprof+0x184/0x410
[ 32.693054] kasan_bitops_generic+0x93/0x1c0
[ 32.693640] kunit_try_run_case+0x1b3/0x490
[ 32.694142] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.694783] kthread+0x257/0x310
[ 32.695123] ret_from_fork+0x41/0x80
[ 32.695715] ret_from_fork_asm+0x1a/0x30
[ 32.696098]
[ 32.696433] The buggy address belongs to the object at ffff888101bd1160
[ 32.696433] which belongs to the cache kmalloc-16 of size 16
[ 32.697617] The buggy address is located 8 bytes inside of
[ 32.697617] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.698610]
[ 32.698821] The buggy address belongs to the physical page:
[ 32.699381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.700033] flags: 0x200000000000000(node=0|zone=2)
[ 32.700641] page_type: f5(slab)
[ 32.701076] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.701886] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.702783] page dumped because: kasan: bad access detected
[ 32.703449]
[ 32.703626] Memory state around the buggy address:
[ 32.704120] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.704873] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.705657] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.706365] ^
[ 32.706916] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.707616] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.708347] ==================================================================
---
[ 32.432965] ==================================================================
[ 32.434556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 32.435445] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.436204]
[ 32.436603] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.437558] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.437988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.438794] Call Trace:
[ 32.439070] <TASK>
[ 32.439578] dump_stack_lvl+0x73/0xb0
[ 32.440345] print_report+0xd1/0x640
[ 32.441010] ? __virt_addr_valid+0x1db/0x2d0
[ 32.441500] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.442043] kasan_report+0x102/0x140
[ 32.442536] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 32.443199] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 32.443880] kasan_check_range+0x10c/0x1c0
[ 32.444200] __kasan_check_write+0x18/0x20
[ 32.444851] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 32.445531] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.446192] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.446741] ? trace_hardirqs_on+0x37/0xe0
[ 32.447125] ? kasan_bitops_generic+0x93/0x1c0
[ 32.447770] kasan_bitops_generic+0x122/0x1c0
[ 32.448233] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.448913] ? __pfx_read_tsc+0x10/0x10
[ 32.449284] ? ktime_get_ts64+0x84/0x230
[ 32.449745] kunit_try_run_case+0x1b3/0x490
[ 32.450245] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.450788] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.451224] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.451920] ? __kthread_parkme+0x82/0x160
[ 32.452352] ? preempt_count_sub+0x50/0x80
[ 32.453166] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.453994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.454973] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.455585] kthread+0x257/0x310
[ 32.455950] ? __pfx_kthread+0x10/0x10
[ 32.456456] ret_from_fork+0x41/0x80
[ 32.456914] ? __pfx_kthread+0x10/0x10
[ 32.457366] ret_from_fork_asm+0x1a/0x30
[ 32.457815] </TASK>
[ 32.458071]
[ 32.458254] Allocated by task 269:
[ 32.458793] kasan_save_stack+0x3d/0x60
[ 32.459107] kasan_save_track+0x18/0x40
[ 32.459642] kasan_save_alloc_info+0x3b/0x50
[ 32.460122] __kasan_kmalloc+0xb7/0xc0
[ 32.460673] __kmalloc_cache_noprof+0x184/0x410
[ 32.461159] kasan_bitops_generic+0x93/0x1c0
[ 32.461539] kunit_try_run_case+0x1b3/0x490
[ 32.462100] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.462764] kthread+0x257/0x310
[ 32.463186] ret_from_fork+0x41/0x80
[ 32.463657] ret_from_fork_asm+0x1a/0x30
[ 32.464095]
[ 32.464342] The buggy address belongs to the object at ffff888101bd1160
[ 32.464342] which belongs to the cache kmalloc-16 of size 16
[ 32.465151] The buggy address is located 8 bytes inside of
[ 32.465151] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.466612]
[ 32.466871] The buggy address belongs to the physical page:
[ 32.467434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.468046] flags: 0x200000000000000(node=0|zone=2)
[ 32.468617] page_type: f5(slab)
[ 32.469077] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.469940] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.471137] page dumped because: kasan: bad access detected
[ 32.472118]
[ 32.472314] Memory state around the buggy address:
[ 32.472989] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.473677] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.474418] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.475102] ^
[ 32.475680] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.476363] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.476944] ==================================================================
---
[ 32.578544] ==================================================================
[ 32.579224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 32.580438] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.581788]
[ 32.581983] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.583276] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.583818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.584536] Call Trace:
[ 32.584729] <TASK>
[ 32.585114] dump_stack_lvl+0x73/0xb0
[ 32.585685] print_report+0xd1/0x640
[ 32.586114] ? __virt_addr_valid+0x1db/0x2d0
[ 32.586660] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.587185] kasan_report+0x102/0x140
[ 32.587683] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 32.588458] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 32.589128] kasan_check_range+0x10c/0x1c0
[ 32.589731] __kasan_check_write+0x18/0x20
[ 32.590256] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 32.590894] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.591640] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.592102] ? trace_hardirqs_on+0x37/0xe0
[ 32.592719] ? kasan_bitops_generic+0x93/0x1c0
[ 32.593209] kasan_bitops_generic+0x122/0x1c0
[ 32.593875] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.594459] ? __pfx_read_tsc+0x10/0x10
[ 32.595002] ? ktime_get_ts64+0x84/0x230
[ 32.595363] kunit_try_run_case+0x1b3/0x490
[ 32.595917] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.596456] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.596936] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.597606] ? __kthread_parkme+0x82/0x160
[ 32.597993] ? preempt_count_sub+0x50/0x80
[ 32.598488] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.598984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.599617] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.600309] kthread+0x257/0x310
[ 32.600671] ? __pfx_kthread+0x10/0x10
[ 32.601144] ret_from_fork+0x41/0x80
[ 32.601735] ? __pfx_kthread+0x10/0x10
[ 32.602061] ret_from_fork_asm+0x1a/0x30
[ 32.602636] </TASK>
[ 32.602961]
[ 32.603124] Allocated by task 269:
[ 32.603674] kasan_save_stack+0x3d/0x60
[ 32.604163] kasan_save_track+0x18/0x40
[ 32.604702] kasan_save_alloc_info+0x3b/0x50
[ 32.605221] __kasan_kmalloc+0xb7/0xc0
[ 32.605721] __kmalloc_cache_noprof+0x184/0x410
[ 32.606005] kasan_bitops_generic+0x93/0x1c0
[ 32.606280] kunit_try_run_case+0x1b3/0x490
[ 32.606625] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.606952] kthread+0x257/0x310
[ 32.607204] ret_from_fork+0x41/0x80
[ 32.607591] ret_from_fork_asm+0x1a/0x30
[ 32.607872]
[ 32.608084] The buggy address belongs to the object at ffff888101bd1160
[ 32.608084] which belongs to the cache kmalloc-16 of size 16
[ 32.609251] The buggy address is located 8 bytes inside of
[ 32.609251] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.610274]
[ 32.610601] The buggy address belongs to the physical page:
[ 32.611370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.611903] flags: 0x200000000000000(node=0|zone=2)
[ 32.612226] page_type: f5(slab)
[ 32.612617] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.613607] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.614511] page dumped because: kasan: bad access detected
[ 32.615126]
[ 32.615281] Memory state around the buggy address:
[ 32.615977] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.616736] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.617168] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.617615] ^
[ 32.618063] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.618897] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.619710] ==================================================================
---
[ 32.478201] ==================================================================
[ 32.478971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 32.480278] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.481391]
[ 32.481797] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.482765] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.483397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.484349] Call Trace:
[ 32.484861] <TASK>
[ 32.485157] dump_stack_lvl+0x73/0xb0
[ 32.485591] print_report+0xd1/0x640
[ 32.486075] ? __virt_addr_valid+0x1db/0x2d0
[ 32.486564] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.487406] kasan_report+0x102/0x140
[ 32.487691] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 32.488487] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 32.489255] kasan_check_range+0x10c/0x1c0
[ 32.489620] __kasan_check_write+0x18/0x20
[ 32.490438] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 32.491484] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.492239] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.492898] ? trace_hardirqs_on+0x37/0xe0
[ 32.493434] ? kasan_bitops_generic+0x93/0x1c0
[ 32.494214] kasan_bitops_generic+0x122/0x1c0
[ 32.494987] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.495882] ? __pfx_read_tsc+0x10/0x10
[ 32.496301] ? ktime_get_ts64+0x84/0x230
[ 32.496806] kunit_try_run_case+0x1b3/0x490
[ 32.497253] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.498665] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.499263] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.499996] ? __kthread_parkme+0x82/0x160
[ 32.500449] ? preempt_count_sub+0x50/0x80
[ 32.500652] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.500868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.501194] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.501700] kthread+0x257/0x310
[ 32.502065] ? __pfx_kthread+0x10/0x10
[ 32.503194] ret_from_fork+0x41/0x80
[ 32.503520] ? __pfx_kthread+0x10/0x10
[ 32.504199] ret_from_fork_asm+0x1a/0x30
[ 32.505122] </TASK>
[ 32.505609]
[ 32.505756] Allocated by task 269:
[ 32.506279] kasan_save_stack+0x3d/0x60
[ 32.506628] kasan_save_track+0x18/0x40
[ 32.507120] kasan_save_alloc_info+0x3b/0x50
[ 32.507810] __kasan_kmalloc+0xb7/0xc0
[ 32.508698] __kmalloc_cache_noprof+0x184/0x410
[ 32.509380] kasan_bitops_generic+0x93/0x1c0
[ 32.509836] kunit_try_run_case+0x1b3/0x490
[ 32.510270] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.510711] kthread+0x257/0x310
[ 32.511833] ret_from_fork+0x41/0x80
[ 32.512502] ret_from_fork_asm+0x1a/0x30
[ 32.512953]
[ 32.513208] The buggy address belongs to the object at ffff888101bd1160
[ 32.513208] which belongs to the cache kmalloc-16 of size 16
[ 32.514305] The buggy address is located 8 bytes inside of
[ 32.514305] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.515315]
[ 32.515606] The buggy address belongs to the physical page:
[ 32.515997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.516895] flags: 0x200000000000000(node=0|zone=2)
[ 32.517449] page_type: f5(slab)
[ 32.517917] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.518645] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.519308] page dumped because: kasan: bad access detected
[ 32.519988]
[ 32.520136] Memory state around the buggy address:
[ 32.520904] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.521674] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.522211] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.523049] ^
[ 32.523712] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.524473] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.525136] ==================================================================
---
[ 32.709784] ==================================================================
[ 32.710530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 32.712100] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.712922]
[ 32.713099] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.714592] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.715113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.716196] Call Trace:
[ 32.716456] <TASK>
[ 32.717111] dump_stack_lvl+0x73/0xb0
[ 32.717489] print_report+0xd1/0x640
[ 32.718182] ? __virt_addr_valid+0x1db/0x2d0
[ 32.718690] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.719237] kasan_report+0x102/0x140
[ 32.719657] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 32.720276] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 32.720779] kasan_check_range+0x10c/0x1c0
[ 32.721078] __kasan_check_write+0x18/0x20
[ 32.721594] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 32.722014] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.722720] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.723443] ? trace_hardirqs_on+0x37/0xe0
[ 32.723860] ? kasan_bitops_generic+0x93/0x1c0
[ 32.724532] kasan_bitops_generic+0x122/0x1c0
[ 32.724928] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.725526] ? __pfx_read_tsc+0x10/0x10
[ 32.725925] ? ktime_get_ts64+0x84/0x230
[ 32.726611] kunit_try_run_case+0x1b3/0x490
[ 32.726955] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.727694] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.728149] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.728754] ? __kthread_parkme+0x82/0x160
[ 32.729235] ? preempt_count_sub+0x50/0x80
[ 32.729856] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.730181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.731112] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.731666] kthread+0x257/0x310
[ 32.732153] ? __pfx_kthread+0x10/0x10
[ 32.732616] ret_from_fork+0x41/0x80
[ 32.733203] ? __pfx_kthread+0x10/0x10
[ 32.733757] ret_from_fork_asm+0x1a/0x30
[ 32.734199] </TASK>
[ 32.734548]
[ 32.734824] Allocated by task 269:
[ 32.735240] kasan_save_stack+0x3d/0x60
[ 32.735704] kasan_save_track+0x18/0x40
[ 32.735994] kasan_save_alloc_info+0x3b/0x50
[ 32.736658] __kasan_kmalloc+0xb7/0xc0
[ 32.737201] __kmalloc_cache_noprof+0x184/0x410
[ 32.737716] kasan_bitops_generic+0x93/0x1c0
[ 32.738149] kunit_try_run_case+0x1b3/0x490
[ 32.738707] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.739263] kthread+0x257/0x310
[ 32.739647] ret_from_fork+0x41/0x80
[ 32.740060] ret_from_fork_asm+0x1a/0x30
[ 32.740593]
[ 32.740909] The buggy address belongs to the object at ffff888101bd1160
[ 32.740909] which belongs to the cache kmalloc-16 of size 16
[ 32.741924] The buggy address is located 8 bytes inside of
[ 32.741924] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.742962]
[ 32.743289] The buggy address belongs to the physical page:
[ 32.743879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.744746] flags: 0x200000000000000(node=0|zone=2)
[ 32.745143] page_type: f5(slab)
[ 32.745639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.746358] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.747116] page dumped because: kasan: bad access detected
[ 32.747710]
[ 32.747969] Memory state around the buggy address:
[ 32.748383] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.749133] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.749810] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.750497] ^
[ 32.750953] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.751494] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.752842] ==================================================================
Home
[ 32.755220] ==================================================================
[ 32.756414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 32.757163] Read of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[ 32.758033]
[ 32.758783] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 32.759917] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 32.760633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.761521] Call Trace:
[ 32.761810] <TASK>
[ 32.762075] dump_stack_lvl+0x73/0xb0
[ 32.763415] print_report+0xd1/0x640
[ 32.763971] ? __virt_addr_valid+0x1db/0x2d0
[ 32.764519] ? kasan_complete_mode_report_info+0x2a/0x200
[ 32.765163] kasan_report+0x102/0x140
[ 32.765741] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 32.766290] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 32.766891] kasan_check_range+0x10c/0x1c0
[ 32.767306] __kasan_check_read+0x15/0x20
[ 32.768170] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 32.769066] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 32.769939] ? __kmalloc_cache_noprof+0x184/0x410
[ 32.770674] ? trace_hardirqs_on+0x37/0xe0
[ 32.771279] ? kasan_bitops_generic+0x93/0x1c0
[ 32.771794] kasan_bitops_generic+0x122/0x1c0
[ 32.772404] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 32.773144] ? __pfx_read_tsc+0x10/0x10
[ 32.773716] ? ktime_get_ts64+0x84/0x230
[ 32.774152] kunit_try_run_case+0x1b3/0x490
[ 32.774784] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.775474] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.775818] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.776054] ? __kthread_parkme+0x82/0x160
[ 32.776243] ? preempt_count_sub+0x50/0x80
[ 32.776550] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.776997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.778351] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.778835] kthread+0x257/0x310
[ 32.779024] ? __pfx_kthread+0x10/0x10
[ 32.779206] ret_from_fork+0x41/0x80
[ 32.779501] ? __pfx_kthread+0x10/0x10
[ 32.780030] ret_from_fork_asm+0x1a/0x30
[ 32.780708] </TASK>
[ 32.780922]
[ 32.781071] Allocated by task 269:
[ 32.781732] kasan_save_stack+0x3d/0x60
[ 32.782472] kasan_save_track+0x18/0x40
[ 32.782920] kasan_save_alloc_info+0x3b/0x50
[ 32.783262] __kasan_kmalloc+0xb7/0xc0
[ 32.784042] __kmalloc_cache_noprof+0x184/0x410
[ 32.784583] kasan_bitops_generic+0x93/0x1c0
[ 32.785265] kunit_try_run_case+0x1b3/0x490
[ 32.785870] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.786373] kthread+0x257/0x310
[ 32.786909] ret_from_fork+0x41/0x80
[ 32.787573] ret_from_fork_asm+0x1a/0x30
[ 32.787885]
[ 32.788246] The buggy address belongs to the object at ffff888101bd1160
[ 32.788246] which belongs to the cache kmalloc-16 of size 16
[ 32.789274] The buggy address is located 8 bytes inside of
[ 32.789274] allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[ 32.790655]
[ 32.790901] The buggy address belongs to the physical page:
[ 32.791668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 32.792549] flags: 0x200000000000000(node=0|zone=2)
[ 32.792978] page_type: f5(slab)
[ 32.793356] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 32.794128] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 32.794865] page dumped because: kasan: bad access detected
[ 32.795432]
[ 32.795618] Memory state around the buggy address:
[ 32.796143] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 32.796826] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 32.797585] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 32.798268] ^
[ 32.798926] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.799620] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.800283] ==================================================================
Home
[ 28.909610] ==================================================================
[ 28.910825] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x170/0x330
[ 28.911520] Read of size 64 at addr ffff8881029a7f84 by task kunit_try_catch/190
[ 28.912132]
[ 28.913239] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.914816] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.915270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.916171] Call Trace:
[ 28.916748] <TASK>
[ 28.917055] dump_stack_lvl+0x73/0xb0
[ 28.917988] print_report+0xd1/0x640
[ 28.918597] ? __virt_addr_valid+0x1db/0x2d0
[ 28.919075] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.919757] kasan_report+0x102/0x140
[ 28.920077] ? kmalloc_memmove_invalid_size+0x170/0x330
[ 28.920927] ? kmalloc_memmove_invalid_size+0x170/0x330
[ 28.921458] kasan_check_range+0x10c/0x1c0
[ 28.922410] __asan_memmove+0x27/0x70
[ 28.922771] kmalloc_memmove_invalid_size+0x170/0x330
[ 28.923440] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[ 28.924068] ? __schedule+0xc3e/0x2790
[ 28.924388] ? __pfx_read_tsc+0x10/0x10
[ 28.924858] ? ktime_get_ts64+0x84/0x230
[ 28.925179] kunit_try_run_case+0x1b3/0x490
[ 28.925730] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.926100] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.927512] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.927989] ? __kthread_parkme+0x82/0x160
[ 28.928648] ? preempt_count_sub+0x50/0x80
[ 28.929016] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.930150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.930869] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.931457] kthread+0x257/0x310
[ 28.931962] ? __pfx_kthread+0x10/0x10
[ 28.932330] ret_from_fork+0x41/0x80
[ 28.932788] ? __pfx_kthread+0x10/0x10
[ 28.933244] ret_from_fork_asm+0x1a/0x30
[ 28.933795] </TASK>
[ 28.934014]
[ 28.934263] Allocated by task 190:
[ 28.934620] kasan_save_stack+0x3d/0x60
[ 28.935060] kasan_save_track+0x18/0x40
[ 28.936256] kasan_save_alloc_info+0x3b/0x50
[ 28.936909] __kasan_kmalloc+0xb7/0xc0
[ 28.937276] __kmalloc_cache_noprof+0x184/0x410
[ 28.937808] kmalloc_memmove_invalid_size+0xad/0x330
[ 28.938510] kunit_try_run_case+0x1b3/0x490
[ 28.938887] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.939831] kthread+0x257/0x310
[ 28.940840] ret_from_fork+0x41/0x80
[ 28.941111] ret_from_fork_asm+0x1a/0x30
[ 28.941520]
[ 28.941679] The buggy address belongs to the object at ffff8881029a7f80
[ 28.941679] which belongs to the cache kmalloc-64 of size 64
[ 28.943610] The buggy address is located 4 bytes inside of
[ 28.943610] allocated 64-byte region [ffff8881029a7f80, ffff8881029a7fc0)
[ 28.944909]
[ 28.945309] The buggy address belongs to the physical page:
[ 28.945715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a7
[ 28.946159] flags: 0x200000000000000(node=0|zone=2)
[ 28.946775] page_type: f5(slab)
[ 28.947170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.949016] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.949754] page dumped because: kasan: bad access detected
[ 28.950175]
[ 28.950403] Memory state around the buggy address:
[ 28.950740] ffff8881029a7e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 28.952095] ffff8881029a7f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.952788] >ffff8881029a7f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 28.953331] ^
[ 28.953886] ffff8881029a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 28.954460] ffff8881029a8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.955081] ==================================================================
Home
[ 28.440165] ==================================================================
[ 28.441182] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x454/0x4a0
[ 28.442951] Write of size 16 at addr ffff888101e88200 by task kunit_try_catch/174
[ 28.444204]
[ 28.444521] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.445282] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.446378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.446922] Call Trace:
[ 28.447272] <TASK>
[ 28.447578] dump_stack_lvl+0x73/0xb0
[ 28.448008] print_report+0xd1/0x640
[ 28.448983] ? __virt_addr_valid+0x1db/0x2d0
[ 28.450003] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.450633] kasan_report+0x102/0x140
[ 28.451057] ? kmalloc_oob_16+0x454/0x4a0
[ 28.451598] ? kmalloc_oob_16+0x454/0x4a0
[ 28.452059] __asan_report_store16_noabort+0x1b/0x30
[ 28.452832] kmalloc_oob_16+0x454/0x4a0
[ 28.453224] ? __pfx_kmalloc_oob_16+0x10/0x10
[ 28.454313] ? __schedule+0xc3e/0x2790
[ 28.454617] ? __pfx_read_tsc+0x10/0x10
[ 28.455242] ? ktime_get_ts64+0x84/0x230
[ 28.455944] kunit_try_run_case+0x1b3/0x490
[ 28.456361] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.456914] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.458159] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.458750] ? __kthread_parkme+0x82/0x160
[ 28.459184] ? preempt_count_sub+0x50/0x80
[ 28.459837] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.460185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.461070] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.462263] kthread+0x257/0x310
[ 28.462655] ? __pfx_kthread+0x10/0x10
[ 28.463101] ret_from_fork+0x41/0x80
[ 28.463546] ? __pfx_kthread+0x10/0x10
[ 28.463991] ret_from_fork_asm+0x1a/0x30
[ 28.464450] </TASK>
[ 28.464686]
[ 28.465098] Allocated by task 174:
[ 28.466119] kasan_save_stack+0x3d/0x60
[ 28.466597] kasan_save_track+0x18/0x40
[ 28.467040] kasan_save_alloc_info+0x3b/0x50
[ 28.467611] __kasan_kmalloc+0xb7/0xc0
[ 28.468081] __kmalloc_cache_noprof+0x184/0x410
[ 28.469088] kmalloc_oob_16+0xa9/0x4a0
[ 28.470122] kunit_try_run_case+0x1b3/0x490
[ 28.470831] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.471892] kthread+0x257/0x310
[ 28.472676] ret_from_fork+0x41/0x80
[ 28.472987] ret_from_fork_asm+0x1a/0x30
[ 28.473987]
[ 28.474186] The buggy address belongs to the object at ffff888101e88200
[ 28.474186] which belongs to the cache kmalloc-16 of size 16
[ 28.475211] The buggy address is located 0 bytes inside of
[ 28.475211] allocated 13-byte region [ffff888101e88200, ffff888101e8820d)
[ 28.476170]
[ 28.476667] The buggy address belongs to the physical page:
[ 28.477190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e88
[ 28.478511] flags: 0x200000000000000(node=0|zone=2)
[ 28.479031] page_type: f5(slab)
[ 28.479551] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 28.480164] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.480969] page dumped because: kasan: bad access detected
[ 28.482006]
[ 28.482276] Memory state around the buggy address:
[ 28.482740] ffff888101e88100: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 28.483776] ffff888101e88180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 28.484623] >ffff888101e88200: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.485186] ^
[ 28.486051] ffff888101e88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.486817] ffff888101e88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.487438] ==================================================================
Home
[ 28.790172] ==================================================================
[ 28.791200] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[ 28.793241] Write of size 16 at addr ffff8881029ad569 by task kunit_try_catch/186
[ 28.794135]
[ 28.794565] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.795576] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.796566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.797454] Call Trace:
[ 28.798205] <TASK>
[ 28.798613] dump_stack_lvl+0x73/0xb0
[ 28.799063] print_report+0xd1/0x640
[ 28.799483] ? __virt_addr_valid+0x1db/0x2d0
[ 28.800208] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.801235] kasan_report+0x102/0x140
[ 28.801689] ? kmalloc_oob_memset_16+0x167/0x330
[ 28.802024] ? kmalloc_oob_memset_16+0x167/0x330
[ 28.802617] kasan_check_range+0x10c/0x1c0
[ 28.803036] __asan_memset+0x27/0x50
[ 28.803737] kmalloc_oob_memset_16+0x167/0x330
[ 28.804153] ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[ 28.804815] ? __schedule+0xc3e/0x2790
[ 28.805178] ? __pfx_read_tsc+0x10/0x10
[ 28.805795] ? ktime_get_ts64+0x84/0x230
[ 28.806244] kunit_try_run_case+0x1b3/0x490
[ 28.806808] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.807170] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.808352] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.808797] ? __kthread_parkme+0x82/0x160
[ 28.809610] ? preempt_count_sub+0x50/0x80
[ 28.810125] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.810713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.811274] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.812018] kthread+0x257/0x310
[ 28.812324] ? __pfx_kthread+0x10/0x10
[ 28.813342] ret_from_fork+0x41/0x80
[ 28.813673] ? __pfx_kthread+0x10/0x10
[ 28.814147] ret_from_fork_asm+0x1a/0x30
[ 28.814599] </TASK>
[ 28.814871]
[ 28.815127] Allocated by task 186:
[ 28.815769] kasan_save_stack+0x3d/0x60
[ 28.816240] kasan_save_track+0x18/0x40
[ 28.816688] kasan_save_alloc_info+0x3b/0x50
[ 28.817177] __kasan_kmalloc+0xb7/0xc0
[ 28.818183] __kmalloc_cache_noprof+0x184/0x410
[ 28.819146] kmalloc_oob_memset_16+0xad/0x330
[ 28.820255] kunit_try_run_case+0x1b3/0x490
[ 28.821029] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.822082] kthread+0x257/0x310
[ 28.822263] ret_from_fork+0x41/0x80
[ 28.822846] ret_from_fork_asm+0x1a/0x30
[ 28.823169]
[ 28.823270] The buggy address belongs to the object at ffff8881029ad500
[ 28.823270] which belongs to the cache kmalloc-128 of size 128
[ 28.824510] The buggy address is located 105 bytes inside of
[ 28.824510] allocated 120-byte region [ffff8881029ad500, ffff8881029ad578)
[ 28.825544]
[ 28.825736] The buggy address belongs to the physical page:
[ 28.827255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[ 28.828206] flags: 0x200000000000000(node=0|zone=2)
[ 28.828733] page_type: f5(slab)
[ 28.829070] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 28.829787] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 28.831621] page dumped because: kasan: bad access detected
[ 28.832574]
[ 28.832983] Memory state around the buggy address:
[ 28.834119] ffff8881029ad400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 28.835102] ffff8881029ad480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.836464] >ffff8881029ad500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 28.837045] ^
[ 28.837852] ffff8881029ad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.838909] ffff8881029ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.840354] ==================================================================
Home
[ 27.177576] ==================================================================
[ 27.178808] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[ 27.179608] Write of size 1 at addr ffff8881029a8178 by task kunit_try_catch/150
[ 27.180958]
[ 27.181822] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.183382] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.184109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.184958] Call Trace:
[ 27.185579] <TASK>
[ 27.186177] dump_stack_lvl+0x73/0xb0
[ 27.187031] print_report+0xd1/0x640
[ 27.187721] ? __virt_addr_valid+0x1db/0x2d0
[ 27.188164] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.188898] kasan_report+0x102/0x140
[ 27.189315] ? kmalloc_track_caller_oob_right+0x4ca/0x530
[ 27.190188] ? kmalloc_track_caller_oob_right+0x4ca/0x530
[ 27.191349] __asan_report_store1_noabort+0x1b/0x30
[ 27.191928] kmalloc_track_caller_oob_right+0x4ca/0x530
[ 27.193045] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[ 27.194098] ? __schedule+0xc3e/0x2790
[ 27.194912] ? __pfx_read_tsc+0x10/0x10
[ 27.195190] ? ktime_get_ts64+0x84/0x230
[ 27.195498] kunit_try_run_case+0x1b3/0x490
[ 27.196118] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.197479] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.198150] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.198868] ? __kthread_parkme+0x82/0x160
[ 27.199249] ? preempt_count_sub+0x50/0x80
[ 27.200098] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.200439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.201137] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.201916] kthread+0x257/0x310
[ 27.202201] ? __pfx_kthread+0x10/0x10
[ 27.202934] ret_from_fork+0x41/0x80
[ 27.203735] ? __pfx_kthread+0x10/0x10
[ 27.204334] ret_from_fork_asm+0x1a/0x30
[ 27.204614] </TASK>
[ 27.204918]
[ 27.205169] Allocated by task 150:
[ 27.205549] kasan_save_stack+0x3d/0x60
[ 27.207029] kasan_save_track+0x18/0x40
[ 27.207746] kasan_save_alloc_info+0x3b/0x50
[ 27.208028] __kasan_kmalloc+0xb7/0xc0
[ 27.208330] __kmalloc_node_track_caller_noprof+0x1c6/0x500
[ 27.209263] kmalloc_track_caller_oob_right+0x9a/0x530
[ 27.210136] kunit_try_run_case+0x1b3/0x490
[ 27.210472] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.211024] kthread+0x257/0x310
[ 27.211385] ret_from_fork+0x41/0x80
[ 27.211814] ret_from_fork_asm+0x1a/0x30
[ 27.212265]
[ 27.213582] The buggy address belongs to the object at ffff8881029a8100
[ 27.213582] which belongs to the cache kmalloc-128 of size 128
[ 27.215014] The buggy address is located 0 bytes to the right of
[ 27.215014] allocated 120-byte region [ffff8881029a8100, ffff8881029a8178)
[ 27.217040]
[ 27.217256] The buggy address belongs to the physical page:
[ 27.217934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a8
[ 27.218971] flags: 0x200000000000000(node=0|zone=2)
[ 27.219569] page_type: f5(slab)
[ 27.220052] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 27.220720] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.221615] page dumped because: kasan: bad access detected
[ 27.222839]
[ 27.223111] Memory state around the buggy address:
[ 27.223766] ffff8881029a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 27.224708] ffff8881029a8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.225863] >ffff8881029a8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 27.226730] ^
[ 27.227924] ffff8881029a8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.229146] ffff8881029a8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.229581] ==================================================================
Home
[ 27.776046] ==================================================================
[ 27.777056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[ 27.777594] Write of size 1 at addr ffff888100a9b0da by task kunit_try_catch/166
[ 27.778848]
[ 27.779395] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.782169] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.782640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.782996] Call Trace:
[ 27.783129] <TASK>
[ 27.783257] dump_stack_lvl+0x73/0xb0
[ 27.783574] print_report+0xd1/0x640
[ 27.783848] ? __virt_addr_valid+0x1db/0x2d0
[ 27.784919] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.786303] kasan_report+0x102/0x140
[ 27.787020] ? krealloc_less_oob_helper+0xec8/0x11d0
[ 27.787831] ? krealloc_less_oob_helper+0xec8/0x11d0
[ 27.788719] __asan_report_store1_noabort+0x1b/0x30
[ 27.789039] krealloc_less_oob_helper+0xec8/0x11d0
[ 27.789714] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 27.790785] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 27.791263] ? __pfx_krealloc_less_oob+0x10/0x10
[ 27.791705] krealloc_less_oob+0x1c/0x30
[ 27.792047] kunit_try_run_case+0x1b3/0x490
[ 27.792741] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.793188] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.794330] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.795689] ? __kthread_parkme+0x82/0x160
[ 27.796195] ? preempt_count_sub+0x50/0x80
[ 27.796909] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.797856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.798683] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.799123] kthread+0x257/0x310
[ 27.800161] ? __pfx_kthread+0x10/0x10
[ 27.800732] ret_from_fork+0x41/0x80
[ 27.801557] ? __pfx_kthread+0x10/0x10
[ 27.802368] ret_from_fork_asm+0x1a/0x30
[ 27.803439] </TASK>
[ 27.803622]
[ 27.803760] Allocated by task 166:
[ 27.804133] kasan_save_stack+0x3d/0x60
[ 27.805093] kasan_save_track+0x18/0x40
[ 27.805885] kasan_save_alloc_info+0x3b/0x50
[ 27.806906] __kasan_krealloc+0x190/0x1f0
[ 27.807478] krealloc_noprof+0xf3/0x340
[ 27.807726] krealloc_less_oob_helper+0x1ab/0x11d0
[ 27.808297] krealloc_less_oob+0x1c/0x30
[ 27.809078] kunit_try_run_case+0x1b3/0x490
[ 27.809755] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.810305] kthread+0x257/0x310
[ 27.811405] ret_from_fork+0x41/0x80
[ 27.811949] ret_from_fork_asm+0x1a/0x30
[ 27.812255]
[ 27.813266] The buggy address belongs to the object at ffff888100a9b000
[ 27.813266] which belongs to the cache kmalloc-256 of size 256
[ 27.814158] The buggy address is located 17 bytes to the right of
[ 27.814158] allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[ 27.816337]
[ 27.816879] The buggy address belongs to the physical page:
[ 27.817658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[ 27.818502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.819549] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.819866] page_type: f5(slab)
[ 27.820305] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.820988] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.822227] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.823233] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.824095] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[ 27.824950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.826220] page dumped because: kasan: bad access detected
[ 27.827032]
[ 27.827305] Memory state around the buggy address:
[ 27.827860] ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.828966] ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.830138] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 27.830796] ^
[ 27.831786] ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.832542] ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.833228] ==================================================================
Home
[ 27.648939] ==================================================================
[ 27.650093] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[ 27.650843] Write of size 1 at addr ffff888100a9b0c9 by task kunit_try_catch/166
[ 27.652322]
[ 27.652733] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.654179] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.654642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.656048] Call Trace:
[ 27.656260] <TASK>
[ 27.656764] dump_stack_lvl+0x73/0xb0
[ 27.657185] print_report+0xd1/0x640
[ 27.657832] ? __virt_addr_valid+0x1db/0x2d0
[ 27.658247] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.659068] kasan_report+0x102/0x140
[ 27.659408] ? krealloc_less_oob_helper+0xd72/0x11d0
[ 27.660651] ? krealloc_less_oob_helper+0xd72/0x11d0
[ 27.661209] __asan_report_store1_noabort+0x1b/0x30
[ 27.661801] krealloc_less_oob_helper+0xd72/0x11d0
[ 27.662201] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 27.662755] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 27.664061] ? __pfx_krealloc_less_oob+0x10/0x10
[ 27.664701] krealloc_less_oob+0x1c/0x30
[ 27.665096] kunit_try_run_case+0x1b3/0x490
[ 27.665635] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.666304] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.667367] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.668178] ? __kthread_parkme+0x82/0x160
[ 27.669378] ? preempt_count_sub+0x50/0x80
[ 27.669898] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.670304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.671799] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.672332] kthread+0x257/0x310
[ 27.672738] ? __pfx_kthread+0x10/0x10
[ 27.673397] ret_from_fork+0x41/0x80
[ 27.673876] ? __pfx_kthread+0x10/0x10
[ 27.674823] ret_from_fork_asm+0x1a/0x30
[ 27.675902] </TASK>
[ 27.676181]
[ 27.676344] Allocated by task 166:
[ 27.677808] kasan_save_stack+0x3d/0x60
[ 27.678269] kasan_save_track+0x18/0x40
[ 27.678758] kasan_save_alloc_info+0x3b/0x50
[ 27.679485] __kasan_krealloc+0x190/0x1f0
[ 27.680184] krealloc_noprof+0xf3/0x340
[ 27.680832] krealloc_less_oob_helper+0x1ab/0x11d0
[ 27.681304] krealloc_less_oob+0x1c/0x30
[ 27.681822] kunit_try_run_case+0x1b3/0x490
[ 27.682199] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.684081] kthread+0x257/0x310
[ 27.684392] ret_from_fork+0x41/0x80
[ 27.684852] ret_from_fork_asm+0x1a/0x30
[ 27.685249]
[ 27.685591] The buggy address belongs to the object at ffff888100a9b000
[ 27.685591] which belongs to the cache kmalloc-256 of size 256
[ 27.687529] The buggy address is located 0 bytes to the right of
[ 27.687529] allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[ 27.688841]
[ 27.689141] The buggy address belongs to the physical page:
[ 27.689818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[ 27.690894] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.691720] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.692816] page_type: f5(slab)
[ 27.693228] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.693868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.695636] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.697259] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.698503] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[ 27.698899] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.699901] page dumped because: kasan: bad access detected
[ 27.701352]
[ 27.702020] Memory state around the buggy address:
[ 27.703121] ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.704632] ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.705335] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 27.706057] ^
[ 27.706685] ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.707427] ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.708103] ==================================================================
Home
[ 27.710121] ==================================================================
[ 27.711727] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[ 27.713300] Write of size 1 at addr ffff888100a9b0d0 by task kunit_try_catch/166
[ 27.715473]
[ 27.715773] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.716742] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.717028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.718312] Call Trace:
[ 27.718737] <TASK>
[ 27.719026] dump_stack_lvl+0x73/0xb0
[ 27.719508] print_report+0xd1/0x640
[ 27.719901] ? __virt_addr_valid+0x1db/0x2d0
[ 27.721633] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.722256] kasan_report+0x102/0x140
[ 27.722771] ? krealloc_less_oob_helper+0xe25/0x11d0
[ 27.723814] ? krealloc_less_oob_helper+0xe25/0x11d0
[ 27.724377] __asan_report_store1_noabort+0x1b/0x30
[ 27.724827] krealloc_less_oob_helper+0xe25/0x11d0
[ 27.725261] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 27.726755] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 27.727275] ? __pfx_krealloc_less_oob+0x10/0x10
[ 27.727913] krealloc_less_oob+0x1c/0x30
[ 27.728355] kunit_try_run_case+0x1b3/0x490
[ 27.730378] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.731162] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.731904] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.732734] ? __kthread_parkme+0x82/0x160
[ 27.733413] ? preempt_count_sub+0x50/0x80
[ 27.734051] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.734508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.735116] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.735674] kthread+0x257/0x310
[ 27.736046] ? __pfx_kthread+0x10/0x10
[ 27.737224] ret_from_fork+0x41/0x80
[ 27.737916] ? __pfx_kthread+0x10/0x10
[ 27.738351] ret_from_fork_asm+0x1a/0x30
[ 27.739219] </TASK>
[ 27.739534]
[ 27.739801] Allocated by task 166:
[ 27.740313] kasan_save_stack+0x3d/0x60
[ 27.741567] kasan_save_track+0x18/0x40
[ 27.742304] kasan_save_alloc_info+0x3b/0x50
[ 27.742930] __kasan_krealloc+0x190/0x1f0
[ 27.743389] krealloc_noprof+0xf3/0x340
[ 27.743948] krealloc_less_oob_helper+0x1ab/0x11d0
[ 27.744435] krealloc_less_oob+0x1c/0x30
[ 27.745523] kunit_try_run_case+0x1b3/0x490
[ 27.745974] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.746891] kthread+0x257/0x310
[ 27.747263] ret_from_fork+0x41/0x80
[ 27.747688] ret_from_fork_asm+0x1a/0x30
[ 27.748092]
[ 27.749123] The buggy address belongs to the object at ffff888100a9b000
[ 27.749123] which belongs to the cache kmalloc-256 of size 256
[ 27.751102] The buggy address is located 7 bytes to the right of
[ 27.751102] allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[ 27.753676]
[ 27.754557] The buggy address belongs to the physical page:
[ 27.755994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[ 27.757251] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.757821] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.758373] page_type: f5(slab)
[ 27.758747] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.759578] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.760249] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.761889] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.762735] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[ 27.763777] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.765233] page dumped because: kasan: bad access detected
[ 27.765574]
[ 27.766178] Memory state around the buggy address:
[ 27.766859] ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.768005] ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.769271] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 27.770056] ^
[ 27.770635] ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.771729] ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.772330] ==================================================================
Home
[ 27.893957] ==================================================================
[ 27.894246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[ 27.896569] Write of size 1 at addr ffff888100a9b0eb by task kunit_try_catch/166
[ 27.897886]
[ 27.898323] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.900692] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.901169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.902159] Call Trace:
[ 27.902951] <TASK>
[ 27.903273] dump_stack_lvl+0x73/0xb0
[ 27.903712] print_report+0xd1/0x640
[ 27.904087] ? __virt_addr_valid+0x1db/0x2d0
[ 27.904521] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.906020] kasan_report+0x102/0x140
[ 27.906669] ? krealloc_less_oob_helper+0xd49/0x11d0
[ 27.907071] ? krealloc_less_oob_helper+0xd49/0x11d0
[ 27.907786] __asan_report_store1_noabort+0x1b/0x30
[ 27.908720] krealloc_less_oob_helper+0xd49/0x11d0
[ 27.909102] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 27.909683] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 27.911114] ? __pfx_krealloc_less_oob+0x10/0x10
[ 27.911935] krealloc_less_oob+0x1c/0x30
[ 27.913117] kunit_try_run_case+0x1b3/0x490
[ 27.914166] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.915248] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.915755] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.916263] ? __kthread_parkme+0x82/0x160
[ 27.916684] ? preempt_count_sub+0x50/0x80
[ 27.917090] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.918275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.919257] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.920156] kthread+0x257/0x310
[ 27.921004] ? __pfx_kthread+0x10/0x10
[ 27.921774] ret_from_fork+0x41/0x80
[ 27.922908] ? __pfx_kthread+0x10/0x10
[ 27.923238] ret_from_fork_asm+0x1a/0x30
[ 27.923945] </TASK>
[ 27.925191]
[ 27.925730] Allocated by task 166:
[ 27.926011] kasan_save_stack+0x3d/0x60
[ 27.926977] kasan_save_track+0x18/0x40
[ 27.927412] kasan_save_alloc_info+0x3b/0x50
[ 27.928041] __kasan_krealloc+0x190/0x1f0
[ 27.929332] krealloc_noprof+0xf3/0x340
[ 27.929856] krealloc_less_oob_helper+0x1ab/0x11d0
[ 27.930151] krealloc_less_oob+0x1c/0x30
[ 27.930419] kunit_try_run_case+0x1b3/0x490
[ 27.931722] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.932768] kthread+0x257/0x310
[ 27.933019] ret_from_fork+0x41/0x80
[ 27.933601] ret_from_fork_asm+0x1a/0x30
[ 27.934095]
[ 27.934551] The buggy address belongs to the object at ffff888100a9b000
[ 27.934551] which belongs to the cache kmalloc-256 of size 256
[ 27.936510] The buggy address is located 34 bytes to the right of
[ 27.936510] allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[ 27.937844]
[ 27.938174] The buggy address belongs to the physical page:
[ 27.938862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[ 27.940428] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.941117] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.941960] page_type: f5(slab)
[ 27.942978] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.944275] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.945387] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.946895] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.947745] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[ 27.948370] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.949014] page dumped because: kasan: bad access detected
[ 27.950207]
[ 27.950392] Memory state around the buggy address:
[ 27.951538] ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.952840] ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.954177] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 27.954822] ^
[ 27.955552] ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.956236] ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.957345] ==================================================================
---
[ 27.835133] ==================================================================
[ 27.836232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[ 27.837220] Write of size 1 at addr ffff888100a9b0ea by task kunit_try_catch/166
[ 27.838516]
[ 27.839273] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.840010] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.840445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.841216] Call Trace:
[ 27.842318] <TASK>
[ 27.842652] dump_stack_lvl+0x73/0xb0
[ 27.843354] print_report+0xd1/0x640
[ 27.844043] ? __virt_addr_valid+0x1db/0x2d0
[ 27.844651] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.845271] kasan_report+0x102/0x140
[ 27.846257] ? krealloc_less_oob_helper+0xe92/0x11d0
[ 27.846793] ? krealloc_less_oob_helper+0xe92/0x11d0
[ 27.847509] __asan_report_store1_noabort+0x1b/0x30
[ 27.848101] krealloc_less_oob_helper+0xe92/0x11d0
[ 27.848961] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 27.850032] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 27.850740] ? __pfx_krealloc_less_oob+0x10/0x10
[ 27.851554] krealloc_less_oob+0x1c/0x30
[ 27.852121] kunit_try_run_case+0x1b3/0x490
[ 27.852827] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.853656] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.854614] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.855625] ? __kthread_parkme+0x82/0x160
[ 27.856201] ? preempt_count_sub+0x50/0x80
[ 27.856833] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.857187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.858434] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.858932] kthread+0x257/0x310
[ 27.859224] ? __pfx_kthread+0x10/0x10
[ 27.859668] ret_from_fork+0x41/0x80
[ 27.860002] ? __pfx_kthread+0x10/0x10
[ 27.860796] ret_from_fork_asm+0x1a/0x30
[ 27.861145] </TASK>
[ 27.861454]
[ 27.862231] Allocated by task 166:
[ 27.862582] kasan_save_stack+0x3d/0x60
[ 27.863164] kasan_save_track+0x18/0x40
[ 27.863796] kasan_save_alloc_info+0x3b/0x50
[ 27.864236] __kasan_krealloc+0x190/0x1f0
[ 27.864515] krealloc_noprof+0xf3/0x340
[ 27.864876] krealloc_less_oob_helper+0x1ab/0x11d0
[ 27.866321] krealloc_less_oob+0x1c/0x30
[ 27.866928] kunit_try_run_case+0x1b3/0x490
[ 27.867511] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.868164] kthread+0x257/0x310
[ 27.869375] ret_from_fork+0x41/0x80
[ 27.870047] ret_from_fork_asm+0x1a/0x30
[ 27.870334]
[ 27.870627] The buggy address belongs to the object at ffff888100a9b000
[ 27.870627] which belongs to the cache kmalloc-256 of size 256
[ 27.872836] The buggy address is located 33 bytes to the right of
[ 27.872836] allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[ 27.875159]
[ 27.875800] The buggy address belongs to the physical page:
[ 27.876525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[ 27.877593] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.878222] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.878847] page_type: f5(slab)
[ 27.879206] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.881355] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.882091] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.883766] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.884677] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[ 27.885862] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.886849] page dumped because: kasan: bad access detected
[ 27.887153]
[ 27.887303] Memory state around the buggy address:
[ 27.888184] ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.889391] ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.890051] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 27.891716] ^
[ 27.892028] ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.892330] ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.893238] ==================================================================
Home
[ 27.533317] ==================================================================
[ 27.534245] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[ 27.535184] Write of size 1 at addr ffff88810039d2eb by task kunit_try_catch/164
[ 27.536208]
[ 27.536544] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.537273] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.538375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.539763] Call Trace:
[ 27.540246] <TASK>
[ 27.540827] dump_stack_lvl+0x73/0xb0
[ 27.541611] print_report+0xd1/0x640
[ 27.542176] ? __virt_addr_valid+0x1db/0x2d0
[ 27.542610] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.543220] kasan_report+0x102/0x140
[ 27.543967] ? krealloc_more_oob_helper+0x823/0x930
[ 27.544986] ? krealloc_more_oob_helper+0x823/0x930
[ 27.545433] __asan_report_store1_noabort+0x1b/0x30
[ 27.546880] krealloc_more_oob_helper+0x823/0x930
[ 27.548423] ? __schedule+0xc3e/0x2790
[ 27.550248] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 27.551255] ? finish_task_switch.isra.0+0x153/0x700
[ 27.552016] ? __switch_to+0x5d9/0xf60
[ 27.552244] ? __schedule+0xc3e/0x2790
[ 27.552970] ? __pfx_read_tsc+0x10/0x10
[ 27.554025] krealloc_more_oob+0x1c/0x30
[ 27.554928] kunit_try_run_case+0x1b3/0x490
[ 27.555323] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.555642] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.556297] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.557779] ? __kthread_parkme+0x82/0x160
[ 27.558333] ? preempt_count_sub+0x50/0x80
[ 27.559112] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.559927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.560758] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.561302] kthread+0x257/0x310
[ 27.562074] ? __pfx_kthread+0x10/0x10
[ 27.562869] ret_from_fork+0x41/0x80
[ 27.563322] ? __pfx_kthread+0x10/0x10
[ 27.563955] ret_from_fork_asm+0x1a/0x30
[ 27.564840] </TASK>
[ 27.565160]
[ 27.565326] Allocated by task 164:
[ 27.566222] kasan_save_stack+0x3d/0x60
[ 27.566861] kasan_save_track+0x18/0x40
[ 27.567677] kasan_save_alloc_info+0x3b/0x50
[ 27.568577] __kasan_krealloc+0x190/0x1f0
[ 27.569014] krealloc_noprof+0xf3/0x340
[ 27.569452] krealloc_more_oob_helper+0x1aa/0x930
[ 27.569926] krealloc_more_oob+0x1c/0x30
[ 27.570838] kunit_try_run_case+0x1b3/0x490
[ 27.571591] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.572103] kthread+0x257/0x310
[ 27.572704] ret_from_fork+0x41/0x80
[ 27.572967] ret_from_fork_asm+0x1a/0x30
[ 27.573808]
[ 27.574011] The buggy address belongs to the object at ffff88810039d200
[ 27.574011] which belongs to the cache kmalloc-256 of size 256
[ 27.575669] The buggy address is located 0 bytes to the right of
[ 27.575669] allocated 235-byte region [ffff88810039d200, ffff88810039d2eb)
[ 27.576980]
[ 27.577322] The buggy address belongs to the physical page:
[ 27.577744] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039c
[ 27.579134] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.580118] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.580852] page_type: f5(slab)
[ 27.581324] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.582143] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.583311] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.584551] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.584895] head: 0200000000000001 ffffea000400e701 ffffffffffffffff 0000000000000000
[ 27.585185] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.585629] page dumped because: kasan: bad access detected
[ 27.586688]
[ 27.586950] Memory state around the buggy address:
[ 27.587585] ffff88810039d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.588383] ffff88810039d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.588912] >ffff88810039d280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 27.589984] ^
[ 27.590809] ffff88810039d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.591587] ffff88810039d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.591996] ==================================================================
Home
[ 27.967660] ==================================================================
[ 27.968534] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[ 27.969547] Write of size 1 at addr ffff8881023aa0eb by task kunit_try_catch/168
[ 27.970331]
[ 27.970650] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.972433] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.973069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.973881] Call Trace:
[ 27.974332] <TASK>
[ 27.974666] dump_stack_lvl+0x73/0xb0
[ 27.975103] print_report+0xd1/0x640
[ 27.975503] ? __virt_addr_valid+0x1db/0x2d0
[ 27.975907] ? kasan_addr_to_slab+0x11/0xa0
[ 27.976278] kasan_report+0x102/0x140
[ 27.977026] ? krealloc_more_oob_helper+0x823/0x930
[ 27.977679] ? krealloc_more_oob_helper+0x823/0x930
[ 27.978220] __asan_report_store1_noabort+0x1b/0x30
[ 27.978978] krealloc_more_oob_helper+0x823/0x930
[ 27.979382] ? __schedule+0xc3e/0x2790
[ 27.979828] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 27.980659] ? finish_task_switch.isra.0+0x153/0x700
[ 27.981092] ? __switch_to+0x5d9/0xf60
[ 27.981767] ? __schedule+0xc3e/0x2790
[ 27.982559] ? __pfx_read_tsc+0x10/0x10
[ 27.982900] krealloc_large_more_oob+0x1c/0x30
[ 27.983391] kunit_try_run_case+0x1b3/0x490
[ 27.984015] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.984243] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.984767] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.985273] ? __kthread_parkme+0x82/0x160
[ 27.986520] ? preempt_count_sub+0x50/0x80
[ 27.986900] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.987392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.987994] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.989041] kthread+0x257/0x310
[ 27.990027] ? __pfx_kthread+0x10/0x10
[ 27.990322] ret_from_fork+0x41/0x80
[ 27.990784] ? __pfx_kthread+0x10/0x10
[ 27.991095] ret_from_fork_asm+0x1a/0x30
[ 27.991644] </TASK>
[ 27.991851]
[ 27.992021] The buggy address belongs to the physical page:
[ 27.992649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023a8
[ 27.993399] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.993872] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.994518] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 27.995480] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 27.996080] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 27.996983] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 27.998362] head: 0200000000000002 ffffea000408ea01 ffffffffffffffff 0000000000000000
[ 27.999105] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 28.000500] page dumped because: kasan: bad access detected
[ 28.001052]
[ 28.001275] Memory state around the buggy address:
[ 28.002220] ffff8881023a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 28.003151] ffff8881023aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 28.003669] >ffff8881023aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 28.004222] ^
[ 28.005339] ffff8881023aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 28.006252] ffff8881023aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 28.007326] ==================================================================
Home
[ 28.009118] ==================================================================
[ 28.010382] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[ 28.011326] Write of size 1 at addr ffff8881023aa0f0 by task kunit_try_catch/168
[ 28.011651]
[ 28.011765] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.012110] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.012310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.013805] Call Trace:
[ 28.014497] <TASK>
[ 28.014765] dump_stack_lvl+0x73/0xb0
[ 28.015190] print_report+0xd1/0x640
[ 28.016012] ? __virt_addr_valid+0x1db/0x2d0
[ 28.016943] ? kasan_addr_to_slab+0x11/0xa0
[ 28.017387] kasan_report+0x102/0x140
[ 28.018619] ? krealloc_more_oob_helper+0x7ed/0x930
[ 28.019329] ? krealloc_more_oob_helper+0x7ed/0x930
[ 28.019804] __asan_report_store1_noabort+0x1b/0x30
[ 28.020249] krealloc_more_oob_helper+0x7ed/0x930
[ 28.021127] ? __schedule+0xc3e/0x2790
[ 28.021464] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 28.022409] ? finish_task_switch.isra.0+0x153/0x700
[ 28.022934] ? __switch_to+0x5d9/0xf60
[ 28.023409] ? __schedule+0xc3e/0x2790
[ 28.024424] ? __pfx_read_tsc+0x10/0x10
[ 28.024730] krealloc_large_more_oob+0x1c/0x30
[ 28.025452] kunit_try_run_case+0x1b3/0x490
[ 28.026340] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.027169] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.027768] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.028271] ? __kthread_parkme+0x82/0x160
[ 28.028653] ? preempt_count_sub+0x50/0x80
[ 28.028944] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.029266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.029779] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.030141] kthread+0x257/0x310
[ 28.030618] ? __pfx_kthread+0x10/0x10
[ 28.031226] ret_from_fork+0x41/0x80
[ 28.031944] ? __pfx_kthread+0x10/0x10
[ 28.032580] ret_from_fork_asm+0x1a/0x30
[ 28.032871] </TASK>
[ 28.033154]
[ 28.033472] The buggy address belongs to the physical page:
[ 28.033925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023a8
[ 28.034744] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 28.035334] flags: 0x200000000000040(head|node=0|zone=2)
[ 28.035936] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 28.036799] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 28.037264] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 28.038084] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 28.038936] head: 0200000000000002 ffffea000408ea01 ffffffffffffffff 0000000000000000
[ 28.039478] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 28.040245] page dumped because: kasan: bad access detected
[ 28.040858]
[ 28.041021] Memory state around the buggy address:
[ 28.041340] ffff8881023a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 28.042107] ffff8881023aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 28.042875] >ffff8881023aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 28.043466] ^
[ 28.044050] ffff8881023aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 28.044837] ffff8881023aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 28.045394] ==================================================================
Home
[ 27.594602] ==================================================================
[ 27.595419] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[ 27.596227] Write of size 1 at addr ffff88810039d2f0 by task kunit_try_catch/164
[ 27.597010]
[ 27.597187] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.598367] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.599370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.600195] Call Trace:
[ 27.600651] <TASK>
[ 27.600975] dump_stack_lvl+0x73/0xb0
[ 27.601451] print_report+0xd1/0x640
[ 27.602041] ? __virt_addr_valid+0x1db/0x2d0
[ 27.602853] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.603301] kasan_report+0x102/0x140
[ 27.603737] ? krealloc_more_oob_helper+0x7ed/0x930
[ 27.605045] ? krealloc_more_oob_helper+0x7ed/0x930
[ 27.605855] __asan_report_store1_noabort+0x1b/0x30
[ 27.606401] krealloc_more_oob_helper+0x7ed/0x930
[ 27.607351] ? __schedule+0xc3e/0x2790
[ 27.607814] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 27.608089] ? finish_task_switch.isra.0+0x153/0x700
[ 27.608340] ? __switch_to+0x5d9/0xf60
[ 27.608858] ? __schedule+0xc3e/0x2790
[ 27.609419] ? __pfx_read_tsc+0x10/0x10
[ 27.609888] krealloc_more_oob+0x1c/0x30
[ 27.610634] kunit_try_run_case+0x1b3/0x490
[ 27.610965] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.611307] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.612095] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.613118] ? __kthread_parkme+0x82/0x160
[ 27.613704] ? preempt_count_sub+0x50/0x80
[ 27.614090] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.614585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.615208] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.615750] kthread+0x257/0x310
[ 27.616191] ? __pfx_kthread+0x10/0x10
[ 27.616764] ret_from_fork+0x41/0x80
[ 27.617065] ? __pfx_kthread+0x10/0x10
[ 27.617586] ret_from_fork_asm+0x1a/0x30
[ 27.618031] </TASK>
[ 27.618244]
[ 27.618481] Allocated by task 164:
[ 27.618938] kasan_save_stack+0x3d/0x60
[ 27.619373] kasan_save_track+0x18/0x40
[ 27.619652] kasan_save_alloc_info+0x3b/0x50
[ 27.620153] __kasan_krealloc+0x190/0x1f0
[ 27.620679] krealloc_noprof+0xf3/0x340
[ 27.621028] krealloc_more_oob_helper+0x1aa/0x930
[ 27.621703] krealloc_more_oob+0x1c/0x30
[ 27.622228] kunit_try_run_case+0x1b3/0x490
[ 27.622842] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.623436] kthread+0x257/0x310
[ 27.623734] ret_from_fork+0x41/0x80
[ 27.624100] ret_from_fork_asm+0x1a/0x30
[ 27.625176]
[ 27.625524] The buggy address belongs to the object at ffff88810039d200
[ 27.625524] which belongs to the cache kmalloc-256 of size 256
[ 27.627335] The buggy address is located 5 bytes to the right of
[ 27.627335] allocated 235-byte region [ffff88810039d200, ffff88810039d2eb)
[ 27.628326]
[ 27.628627] The buggy address belongs to the physical page:
[ 27.629223] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039c
[ 27.629908] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 27.630791] flags: 0x200000000000040(head|node=0|zone=2)
[ 27.631241] page_type: f5(slab)
[ 27.631664] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.632257] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.632923] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 27.633495] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 27.634158] head: 0200000000000001 ffffea000400e701 ffffffffffffffff 0000000000000000
[ 27.634871] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 27.635660] page dumped because: kasan: bad access detected
[ 27.636093]
[ 27.636242] Memory state around the buggy address:
[ 27.636848] ffff88810039d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.637563] ffff88810039d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 27.638188] >ffff88810039d280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 27.638811] ^
[ 27.639521] ffff88810039d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.640089] ffff88810039d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.640678] ==================================================================
Home
[ 29.335111] ==================================================================
[ 29.336604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[ 29.337462] Read of size 1 at addr ffff8881029ade78 by task kunit_try_catch/202
[ 29.338112]
[ 29.338396] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.339266] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.340030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.340599] Call Trace:
[ 29.340868] <TASK>
[ 29.342528] dump_stack_lvl+0x73/0xb0
[ 29.343035] print_report+0xd1/0x640
[ 29.343380] ? __virt_addr_valid+0x1db/0x2d0
[ 29.344036] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.344505] kasan_report+0x102/0x140
[ 29.344897] ? ksize_unpoisons_memory+0x7eb/0x9b0
[ 29.345324] ? ksize_unpoisons_memory+0x7eb/0x9b0
[ 29.345784] __asan_report_load1_noabort+0x18/0x20
[ 29.346340] ksize_unpoisons_memory+0x7eb/0x9b0
[ 29.347026] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 29.347626] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 29.348019] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 29.349540] kunit_try_run_case+0x1b3/0x490
[ 29.350036] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.350771] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.351205] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.351698] ? __kthread_parkme+0x82/0x160
[ 29.352124] ? preempt_count_sub+0x50/0x80
[ 29.353311] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.353778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.354455] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.354965] kthread+0x257/0x310
[ 29.355247] ? __pfx_kthread+0x10/0x10
[ 29.355720] ret_from_fork+0x41/0x80
[ 29.356014] ? __pfx_kthread+0x10/0x10
[ 29.356620] ret_from_fork_asm+0x1a/0x30
[ 29.357156] </TASK>
[ 29.357370]
[ 29.357702] Allocated by task 202:
[ 29.358880] kasan_save_stack+0x3d/0x60
[ 29.359653] kasan_save_track+0x18/0x40
[ 29.360096] kasan_save_alloc_info+0x3b/0x50
[ 29.360424] __kasan_kmalloc+0xb7/0xc0
[ 29.361364] __kmalloc_cache_noprof+0x184/0x410
[ 29.362045] ksize_unpoisons_memory+0xc8/0x9b0
[ 29.362587] kunit_try_run_case+0x1b3/0x490
[ 29.363017] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.364359] kthread+0x257/0x310
[ 29.364824] ret_from_fork+0x41/0x80
[ 29.365635] ret_from_fork_asm+0x1a/0x30
[ 29.366310]
[ 29.366557] The buggy address belongs to the object at ffff8881029ade00
[ 29.366557] which belongs to the cache kmalloc-128 of size 128
[ 29.367967] The buggy address is located 5 bytes to the right of
[ 29.367967] allocated 115-byte region [ffff8881029ade00, ffff8881029ade73)
[ 29.369026]
[ 29.369264] The buggy address belongs to the physical page:
[ 29.370454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[ 29.371052] flags: 0x200000000000000(node=0|zone=2)
[ 29.371672] page_type: f5(slab)
[ 29.372161] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 29.372999] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 29.373678] page dumped because: kasan: bad access detected
[ 29.374107]
[ 29.374563] Memory state around the buggy address:
[ 29.375054] ffff8881029add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 29.376005] ffff8881029add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.377033] >ffff8881029ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 29.378137] ^
[ 29.379182] ffff8881029ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.380128] ffff8881029adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.380905] ==================================================================
---
[ 29.382856] ==================================================================
[ 29.383795] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[ 29.384819] Read of size 1 at addr ffff8881029ade7f by task kunit_try_catch/202
[ 29.385627]
[ 29.386111] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.387474] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.387869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.388978] Call Trace:
[ 29.389367] <TASK>
[ 29.389742] dump_stack_lvl+0x73/0xb0
[ 29.390156] print_report+0xd1/0x640
[ 29.390588] ? __virt_addr_valid+0x1db/0x2d0
[ 29.391030] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.393258] kasan_report+0x102/0x140
[ 29.393748] ? ksize_unpoisons_memory+0x7b8/0x9b0
[ 29.394568] ? ksize_unpoisons_memory+0x7b8/0x9b0
[ 29.395151] __asan_report_load1_noabort+0x18/0x20
[ 29.395708] ksize_unpoisons_memory+0x7b8/0x9b0
[ 29.396879] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 29.397644] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 29.397890] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 29.398123] kunit_try_run_case+0x1b3/0x490
[ 29.398374] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.398826] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.400032] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.400876] ? __kthread_parkme+0x82/0x160
[ 29.401328] ? preempt_count_sub+0x50/0x80
[ 29.401724] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.402066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.403127] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.404061] kthread+0x257/0x310
[ 29.404906] ? __pfx_kthread+0x10/0x10
[ 29.405656] ret_from_fork+0x41/0x80
[ 29.406273] ? __pfx_kthread+0x10/0x10
[ 29.406709] ret_from_fork_asm+0x1a/0x30
[ 29.406920] </TASK>
[ 29.407051]
[ 29.407244] Allocated by task 202:
[ 29.407525] kasan_save_stack+0x3d/0x60
[ 29.407964] kasan_save_track+0x18/0x40
[ 29.408245] kasan_save_alloc_info+0x3b/0x50
[ 29.409067] __kasan_kmalloc+0xb7/0xc0
[ 29.409764] __kmalloc_cache_noprof+0x184/0x410
[ 29.410247] ksize_unpoisons_memory+0xc8/0x9b0
[ 29.410617] kunit_try_run_case+0x1b3/0x490
[ 29.411541] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.412183] kthread+0x257/0x310
[ 29.412898] ret_from_fork+0x41/0x80
[ 29.413319] ret_from_fork_asm+0x1a/0x30
[ 29.413950]
[ 29.414107] The buggy address belongs to the object at ffff8881029ade00
[ 29.414107] which belongs to the cache kmalloc-128 of size 128
[ 29.415897] The buggy address is located 12 bytes to the right of
[ 29.415897] allocated 115-byte region [ffff8881029ade00, ffff8881029ade73)
[ 29.417220]
[ 29.417761] The buggy address belongs to the physical page:
[ 29.418805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[ 29.419140] flags: 0x200000000000000(node=0|zone=2)
[ 29.419494] page_type: f5(slab)
[ 29.420162] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 29.421215] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 29.422243] page dumped because: kasan: bad access detected
[ 29.422770]
[ 29.422965] Memory state around the buggy address:
[ 29.423482] ffff8881029add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 29.424172] ffff8881029add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.425007] >ffff8881029ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 29.425760] ^
[ 29.426715] ffff8881029ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.427548] ffff8881029adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.428212] ==================================================================
Home
[ 29.285268] ==================================================================
[ 29.286888] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[ 29.287734] Read of size 1 at addr ffff8881029ade73 by task kunit_try_catch/202
[ 29.288466]
[ 29.288738] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.289281] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.290038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.291190] Call Trace:
[ 29.292027] <TASK>
[ 29.292248] dump_stack_lvl+0x73/0xb0
[ 29.293067] print_report+0xd1/0x640
[ 29.293978] ? __virt_addr_valid+0x1db/0x2d0
[ 29.294557] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.295194] kasan_report+0x102/0x140
[ 29.295671] ? ksize_unpoisons_memory+0x81e/0x9b0
[ 29.296134] ? ksize_unpoisons_memory+0x81e/0x9b0
[ 29.296700] __asan_report_load1_noabort+0x18/0x20
[ 29.297400] ksize_unpoisons_memory+0x81e/0x9b0
[ 29.297749] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 29.298762] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 29.299221] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 29.299667] kunit_try_run_case+0x1b3/0x490
[ 29.300188] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.300957] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.301396] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.302250] ? __kthread_parkme+0x82/0x160
[ 29.302660] ? preempt_count_sub+0x50/0x80
[ 29.303425] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.303904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.305029] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.305754] kthread+0x257/0x310
[ 29.306119] ? __pfx_kthread+0x10/0x10
[ 29.306934] ret_from_fork+0x41/0x80
[ 29.307368] ? __pfx_kthread+0x10/0x10
[ 29.307863] ret_from_fork_asm+0x1a/0x30
[ 29.308314] </TASK>
[ 29.308492]
[ 29.308630] Allocated by task 202:
[ 29.308873] kasan_save_stack+0x3d/0x60
[ 29.309331] kasan_save_track+0x18/0x40
[ 29.309907] kasan_save_alloc_info+0x3b/0x50
[ 29.311196] __kasan_kmalloc+0xb7/0xc0
[ 29.312972] __kmalloc_cache_noprof+0x184/0x410
[ 29.313919] ksize_unpoisons_memory+0xc8/0x9b0
[ 29.314141] kunit_try_run_case+0x1b3/0x490
[ 29.314407] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.315341] kthread+0x257/0x310
[ 29.315928] ret_from_fork+0x41/0x80
[ 29.316256] ret_from_fork_asm+0x1a/0x30
[ 29.316838]
[ 29.316996] The buggy address belongs to the object at ffff8881029ade00
[ 29.316996] which belongs to the cache kmalloc-128 of size 128
[ 29.319123] The buggy address is located 0 bytes to the right of
[ 29.319123] allocated 115-byte region [ffff8881029ade00, ffff8881029ade73)
[ 29.320737]
[ 29.320893] The buggy address belongs to the physical page:
[ 29.322059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[ 29.323089] flags: 0x200000000000000(node=0|zone=2)
[ 29.323969] page_type: f5(slab)
[ 29.324182] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 29.324761] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 29.325467] page dumped because: kasan: bad access detected
[ 29.325986]
[ 29.326173] Memory state around the buggy address:
[ 29.327975] ffff8881029add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 29.328858] ffff8881029add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.329557] >ffff8881029ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 29.330219] ^
[ 29.331043] ffff8881029ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.332277] ffff8881029adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.333104] ==================================================================
Home
[ 31.623951] ==================================================================
[ 31.624778] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[ 31.625239] Read of size 1 at addr ffff8881029be3d8 by task kunit_try_catch/263
[ 31.626113]
[ 31.626707] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.627947] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.628816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.629808] Call Trace:
[ 31.630150] <TASK>
[ 31.630404] dump_stack_lvl+0x73/0xb0
[ 31.631106] print_report+0xd1/0x640
[ 31.631473] ? __virt_addr_valid+0x1db/0x2d0
[ 31.631971] ? kasan_complete_mode_report_info+0x2a/0x200
[ 31.632647] kasan_report+0x102/0x140
[ 31.633024] ? memchr+0x79/0x90
[ 31.633274] ? memchr+0x79/0x90
[ 31.633937] __asan_report_load1_noabort+0x18/0x20
[ 31.634294] memchr+0x79/0x90
[ 31.635220] kasan_memchr+0x163/0x320
[ 31.636106] ? __pfx_kasan_memchr+0x10/0x10
[ 31.636523] ? __schedule+0xc3e/0x2790
[ 31.637161] ? __pfx_read_tsc+0x10/0x10
[ 31.637708] ? ktime_get_ts64+0x84/0x230
[ 31.638231] kunit_try_run_case+0x1b3/0x490
[ 31.638671] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.639084] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.640119] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.640905] ? __kthread_parkme+0x82/0x160
[ 31.641359] ? preempt_count_sub+0x50/0x80
[ 31.642632] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.642969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.643784] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.644414] kthread+0x257/0x310
[ 31.644831] ? __pfx_kthread+0x10/0x10
[ 31.645188] ret_from_fork+0x41/0x80
[ 31.646603] ? __pfx_kthread+0x10/0x10
[ 31.647300] ret_from_fork_asm+0x1a/0x30
[ 31.648055] </TASK>
[ 31.648567]
[ 31.648718] Allocated by task 263:
[ 31.649688] kasan_save_stack+0x3d/0x60
[ 31.650200] kasan_save_track+0x18/0x40
[ 31.651115] kasan_save_alloc_info+0x3b/0x50
[ 31.651692] __kasan_kmalloc+0xb7/0xc0
[ 31.652023] __kmalloc_cache_noprof+0x184/0x410
[ 31.652493] kasan_memchr+0xad/0x320
[ 31.652875] kunit_try_run_case+0x1b3/0x490
[ 31.654075] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.655238] kthread+0x257/0x310
[ 31.655824] ret_from_fork+0x41/0x80
[ 31.656247] ret_from_fork_asm+0x1a/0x30
[ 31.656684]
[ 31.657160] The buggy address belongs to the object at ffff8881029be3c0
[ 31.657160] which belongs to the cache kmalloc-32 of size 32
[ 31.658812] The buggy address is located 0 bytes to the right of
[ 31.658812] allocated 24-byte region [ffff8881029be3c0, ffff8881029be3d8)
[ 31.661291]
[ 31.661525] The buggy address belongs to the physical page:
[ 31.661957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 31.662590] flags: 0x200000000000000(node=0|zone=2)
[ 31.663027] page_type: f5(slab)
[ 31.663862] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 31.665083] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.665707] page dumped because: kasan: bad access detected
[ 31.666139]
[ 31.666337] Memory state around the buggy address:
[ 31.666721] ffff8881029be280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.667275] ffff8881029be300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 31.668736] >ffff8881029be380: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 31.669654] ^
[ 31.670793] ffff8881029be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.671534] ffff8881029be480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.672097] ==================================================================
Home
[ 30.837422] ==================================================================
[ 30.838579] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[ 30.839189] Read of size 1 at addr ffff8881029b82bb by task kunit_try_catch/233
[ 30.840021]
[ 30.840300] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.841301] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.841821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.842768] Call Trace:
[ 30.843023] <TASK>
[ 30.843228] dump_stack_lvl+0x73/0xb0
[ 30.843915] print_report+0xd1/0x640
[ 30.844354] ? __virt_addr_valid+0x1db/0x2d0
[ 30.845088] ? kasan_complete_mode_report_info+0x2a/0x200
[ 30.845830] kasan_report+0x102/0x140
[ 30.846298] ? mempool_oob_right_helper+0x31a/0x380
[ 30.846935] ? mempool_oob_right_helper+0x31a/0x380
[ 30.847551] __asan_report_load1_noabort+0x18/0x20
[ 30.847993] mempool_oob_right_helper+0x31a/0x380
[ 30.848761] ? __pfx_mempool_oob_right_helper+0x10/0x10
[ 30.849223] mempool_slab_oob_right+0xb1/0x100
[ 30.849798] ? __pfx_mempool_slab_oob_right+0x10/0x10
[ 30.850194] ? __switch_to+0x5d9/0xf60
[ 30.850709] ? __pfx_mempool_alloc_slab+0x10/0x10
[ 30.851262] ? __pfx_mempool_free_slab+0x10/0x10
[ 30.851871] ? __pfx_read_tsc+0x10/0x10
[ 30.852348] ? ktime_get_ts64+0x84/0x230
[ 30.853037] kunit_try_run_case+0x1b3/0x490
[ 30.853632] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.854099] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 30.854700] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 30.855324] ? __kthread_parkme+0x82/0x160
[ 30.855875] ? preempt_count_sub+0x50/0x80
[ 30.856268] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.856997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.857783] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.858247] kthread+0x257/0x310
[ 30.858849] ? __pfx_kthread+0x10/0x10
[ 30.859241] ret_from_fork+0x41/0x80
[ 30.859764] ? __pfx_kthread+0x10/0x10
[ 30.860126] ret_from_fork_asm+0x1a/0x30
[ 30.860921] </TASK>
[ 30.861138]
[ 30.861290] Allocated by task 233:
[ 30.861910] kasan_save_stack+0x3d/0x60
[ 30.862271] kasan_save_track+0x18/0x40
[ 30.862934] kasan_save_alloc_info+0x3b/0x50
[ 30.863534] __kasan_mempool_unpoison_object+0x1bb/0x200
[ 30.863931] remove_element+0x11e/0x190
[ 30.864703] mempool_alloc_preallocated+0x4d/0x90
[ 30.865045] mempool_oob_right_helper+0x8b/0x380
[ 30.865797] mempool_slab_oob_right+0xb1/0x100
[ 30.866204] kunit_try_run_case+0x1b3/0x490
[ 30.866869] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.867587] kthread+0x257/0x310
[ 30.867878] ret_from_fork+0x41/0x80
[ 30.868140] ret_from_fork_asm+0x1a/0x30
[ 30.868885]
[ 30.869149] The buggy address belongs to the object at ffff8881029b8240
[ 30.869149] which belongs to the cache test_cache of size 123
[ 30.870111] The buggy address is located 0 bytes to the right of
[ 30.870111] allocated 123-byte region [ffff8881029b8240, ffff8881029b82bb)
[ 30.871267]
[ 30.871587] The buggy address belongs to the physical page:
[ 30.871963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b8
[ 30.872748] flags: 0x200000000000000(node=0|zone=2)
[ 30.873151] page_type: f5(slab)
[ 30.873822] raw: 0200000000000000 ffff888101aa8280 dead000000000122 0000000000000000
[ 30.874755] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 30.875353] page dumped because: kasan: bad access detected
[ 30.876119]
[ 30.876542] Memory state around the buggy address:
[ 30.876980] ffff8881029b8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.877854] ffff8881029b8200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[ 30.878578] >ffff8881029b8280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[ 30.879132] ^
[ 30.879781] ffff8881029b8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.880545] ffff8881029b8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.881157] ==================================================================
Home
[ 30.735070] ==================================================================
[ 30.735966] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[ 30.737228] Read of size 1 at addr ffff888101ea4d73 by task kunit_try_catch/229
[ 30.737940]
[ 30.738246] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.739379] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.739670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.740720] Call Trace:
[ 30.741296] <TASK>
[ 30.741678] dump_stack_lvl+0x73/0xb0
[ 30.741999] print_report+0xd1/0x640
[ 30.742616] ? __virt_addr_valid+0x1db/0x2d0
[ 30.743282] ? kasan_complete_mode_report_info+0x2a/0x200
[ 30.744223] kasan_report+0x102/0x140
[ 30.744561] ? mempool_oob_right_helper+0x31a/0x380
[ 30.744914] ? mempool_oob_right_helper+0x31a/0x380
[ 30.745825] __asan_report_load1_noabort+0x18/0x20
[ 30.746286] mempool_oob_right_helper+0x31a/0x380
[ 30.746966] ? __pfx_mempool_oob_right_helper+0x10/0x10
[ 30.747653] mempool_kmalloc_oob_right+0xb6/0x100
[ 30.748429] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[ 30.748988] ? __switch_to+0x5d9/0xf60
[ 30.749439] ? __pfx_mempool_kmalloc+0x10/0x10
[ 30.749914] ? __pfx_mempool_kfree+0x10/0x10
[ 30.751475] ? __pfx_read_tsc+0x10/0x10
[ 30.751962] ? ktime_get_ts64+0x84/0x230
[ 30.752329] kunit_try_run_case+0x1b3/0x490
[ 30.753054] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.753453] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 30.753960] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 30.754638] ? __kthread_parkme+0x82/0x160
[ 30.755517] ? preempt_count_sub+0x50/0x80
[ 30.756339] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.756827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.757358] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.757844] kthread+0x257/0x310
[ 30.758170] ? __pfx_kthread+0x10/0x10
[ 30.758788] ret_from_fork+0x41/0x80
[ 30.759218] ? __pfx_kthread+0x10/0x10
[ 30.759543] ret_from_fork_asm+0x1a/0x30
[ 30.759972] </TASK>
[ 30.760240]
[ 30.760518] Allocated by task 229:
[ 30.760903] kasan_save_stack+0x3d/0x60
[ 30.761435] kasan_save_track+0x18/0x40
[ 30.761715] kasan_save_alloc_info+0x3b/0x50
[ 30.762672] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 30.764294] remove_element+0x11e/0x190
[ 30.764925] mempool_alloc_preallocated+0x4d/0x90
[ 30.765410] mempool_oob_right_helper+0x8b/0x380
[ 30.766000] mempool_kmalloc_oob_right+0xb6/0x100
[ 30.766937] kunit_try_run_case+0x1b3/0x490
[ 30.767339] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.768058] kthread+0x257/0x310
[ 30.768488] ret_from_fork+0x41/0x80
[ 30.768870] ret_from_fork_asm+0x1a/0x30
[ 30.769297]
[ 30.769505] The buggy address belongs to the object at ffff888101ea4d00
[ 30.769505] which belongs to the cache kmalloc-128 of size 128
[ 30.771175] The buggy address is located 0 bytes to the right of
[ 30.771175] allocated 115-byte region [ffff888101ea4d00, ffff888101ea4d73)
[ 30.772954]
[ 30.773232] The buggy address belongs to the physical page:
[ 30.774022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea4
[ 30.775172] flags: 0x200000000000000(node=0|zone=2)
[ 30.775873] page_type: f5(slab)
[ 30.776248] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 30.777056] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.777914] page dumped because: kasan: bad access detected
[ 30.778559]
[ 30.778745] Memory state around the buggy address:
[ 30.779247] ffff888101ea4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.779917] ffff888101ea4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.781160] >ffff888101ea4d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 30.782012] ^
[ 30.782908] ffff888101ea4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.783838] ffff888101ea4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 30.784904] ==================================================================
Home
[ 31.891650] ==================================================================
[ 31.892161] BUG: KASAN: slab-use-after-free in kasan_strings+0xa0f/0xb60
[ 31.893523] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[ 31.894218]
[ 31.894443] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.895280] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.895587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.896118] Call Trace:
[ 31.896684] <TASK>
[ 31.897001] dump_stack_lvl+0x73/0xb0
[ 31.898726] print_report+0xd1/0x640
[ 31.900043] ? __virt_addr_valid+0x1db/0x2d0
[ 31.900801] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.901236] kasan_report+0x102/0x140
[ 31.901766] ? kasan_strings+0xa0f/0xb60
[ 31.902651] ? kasan_strings+0xa0f/0xb60
[ 31.902968] __asan_report_load1_noabort+0x18/0x20
[ 31.903556] kasan_strings+0xa0f/0xb60
[ 31.904462] ? __pfx_kasan_strings+0x10/0x10
[ 31.905232] ? __pfx_kasan_strings+0x10/0x10
[ 31.905921] kunit_try_run_case+0x1b3/0x490
[ 31.906133] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.906448] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.906843] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.907946] ? __kthread_parkme+0x82/0x160
[ 31.908490] ? preempt_count_sub+0x50/0x80
[ 31.908919] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.909754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.910500] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.911023] kthread+0x257/0x310
[ 31.911535] ? __pfx_kthread+0x10/0x10
[ 31.911912] ret_from_fork+0x41/0x80
[ 31.912671] ? __pfx_kthread+0x10/0x10
[ 31.913149] ret_from_fork_asm+0x1a/0x30
[ 31.913838] </TASK>
[ 31.914194]
[ 31.914685] Allocated by task 267:
[ 31.915333] kasan_save_stack+0x3d/0x60
[ 31.915872] kasan_save_track+0x18/0x40
[ 31.916308] kasan_save_alloc_info+0x3b/0x50
[ 31.916907] __kasan_kmalloc+0xb7/0xc0
[ 31.917450] __kmalloc_cache_noprof+0x184/0x410
[ 31.917967] kasan_strings+0xb3/0xb60
[ 31.918432] kunit_try_run_case+0x1b3/0x490
[ 31.919070] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.919752] kthread+0x257/0x310
[ 31.920199] ret_from_fork+0x41/0x80
[ 31.920808] ret_from_fork_asm+0x1a/0x30
[ 31.921151]
[ 31.921561] Freed by task 267:
[ 31.921947] kasan_save_stack+0x3d/0x60
[ 31.922647] kasan_save_track+0x18/0x40
[ 31.923030] kasan_save_free_info+0x3f/0x60
[ 31.923808] __kasan_slab_free+0x56/0x70
[ 31.924146] kfree+0x123/0x3f0
[ 31.924850] kasan_strings+0x13a/0xb60
[ 31.925209] kunit_try_run_case+0x1b3/0x490
[ 31.925844] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.926458] kthread+0x257/0x310
[ 31.926873] ret_from_fork+0x41/0x80
[ 31.927217] ret_from_fork_asm+0x1a/0x30
[ 31.927839]
[ 31.928095] The buggy address belongs to the object at ffff8881029be540
[ 31.928095] which belongs to the cache kmalloc-32 of size 32
[ 31.929546] The buggy address is located 16 bytes inside of
[ 31.929546] freed 32-byte region [ffff8881029be540, ffff8881029be560)
[ 31.930790]
[ 31.930946] The buggy address belongs to the physical page:
[ 31.931822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 31.932686] flags: 0x200000000000000(node=0|zone=2)
[ 31.933187] page_type: f5(slab)
[ 31.933753] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 31.934665] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.935521] page dumped because: kasan: bad access detected
[ 31.936146]
[ 31.936558] Memory state around the buggy address:
[ 31.936933] ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.937978] ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.938939] >ffff8881029be500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.939824] ^
[ 31.940582] ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.941186] ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.942071] ==================================================================
Home
[ 29.149770] ==================================================================
[ 29.151955] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19d/0x360
[ 29.152815] Read of size 1 at addr ffff888101bd1140 by task kunit_try_catch/200
[ 29.154319]
[ 29.154692] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.155854] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.156234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.157438] Call Trace:
[ 29.157671] <TASK>
[ 29.158455] dump_stack_lvl+0x73/0xb0
[ 29.159163] print_report+0xd1/0x640
[ 29.159534] ? __virt_addr_valid+0x1db/0x2d0
[ 29.160386] ? kasan_complete_mode_report_info+0x64/0x200
[ 29.161232] kasan_report+0x102/0x140
[ 29.161657] ? kmalloc_double_kzfree+0x19d/0x360
[ 29.162131] ? kmalloc_double_kzfree+0x19d/0x360
[ 29.163813] ? kmalloc_double_kzfree+0x19d/0x360
[ 29.164936] __kasan_check_byte+0x3d/0x50
[ 29.165416] kfree_sensitive+0x22/0x90
[ 29.165832] kmalloc_double_kzfree+0x19d/0x360
[ 29.166286] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 29.167639] ? __schedule+0xc3e/0x2790
[ 29.168411] ? __pfx_read_tsc+0x10/0x10
[ 29.169104] ? ktime_get_ts64+0x84/0x230
[ 29.169395] kunit_try_run_case+0x1b3/0x490
[ 29.170441] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.171000] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.171488] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.172104] ? __kthread_parkme+0x82/0x160
[ 29.172558] ? preempt_count_sub+0x50/0x80
[ 29.172971] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.173714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.174128] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.176012] kthread+0x257/0x310
[ 29.176390] ? __pfx_kthread+0x10/0x10
[ 29.176947] ret_from_fork+0x41/0x80
[ 29.177438] ? __pfx_kthread+0x10/0x10
[ 29.177727] ret_from_fork_asm+0x1a/0x30
[ 29.178335] </TASK>
[ 29.178776]
[ 29.179042] Allocated by task 200:
[ 29.180484] kasan_save_stack+0x3d/0x60
[ 29.181265] kasan_save_track+0x18/0x40
[ 29.182220] kasan_save_alloc_info+0x3b/0x50
[ 29.183129] __kasan_kmalloc+0xb7/0xc0
[ 29.183542] __kmalloc_cache_noprof+0x184/0x410
[ 29.183905] kmalloc_double_kzfree+0xaa/0x360
[ 29.184335] kunit_try_run_case+0x1b3/0x490
[ 29.184695] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.185208] kthread+0x257/0x310
[ 29.185714] ret_from_fork+0x41/0x80
[ 29.187231] ret_from_fork_asm+0x1a/0x30
[ 29.187914]
[ 29.188162] Freed by task 200:
[ 29.188632] kasan_save_stack+0x3d/0x60
[ 29.189034] kasan_save_track+0x18/0x40
[ 29.189407] kasan_save_free_info+0x3f/0x60
[ 29.190158] __kasan_slab_free+0x56/0x70
[ 29.191228] kfree+0x123/0x3f0
[ 29.191540] kfree_sensitive+0x67/0x90
[ 29.192029] kmalloc_double_kzfree+0x12c/0x360
[ 29.193857] kunit_try_run_case+0x1b3/0x490
[ 29.194587] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.195706] kthread+0x257/0x310
[ 29.196694] ret_from_fork+0x41/0x80
[ 29.197003] ret_from_fork_asm+0x1a/0x30
[ 29.197511]
[ 29.197692] The buggy address belongs to the object at ffff888101bd1140
[ 29.197692] which belongs to the cache kmalloc-16 of size 16
[ 29.199620] The buggy address is located 0 bytes inside of
[ 29.199620] freed 16-byte region [ffff888101bd1140, ffff888101bd1150)
[ 29.201018]
[ 29.201236] The buggy address belongs to the physical page:
[ 29.202153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 29.203726] flags: 0x200000000000000(node=0|zone=2)
[ 29.204316] page_type: f5(slab)
[ 29.205342] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 29.206316] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 29.207424] page dumped because: kasan: bad access detected
[ 29.208131]
[ 29.209435] Memory state around the buggy address:
[ 29.210076] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 29.210394] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 29.211337] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 29.211885] ^
[ 29.212559] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.213146] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.214819] ==================================================================
Home
[ 28.962283] ==================================================================
[ 28.963812] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380
[ 28.965134] Read of size 1 at addr ffff888101bd1128 by task kunit_try_catch/192
[ 28.966227]
[ 28.966455] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.967276] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.967553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.968434] Call Trace:
[ 28.968631] <TASK>
[ 28.968827] dump_stack_lvl+0x73/0xb0
[ 28.969348] print_report+0xd1/0x640
[ 28.969916] ? __virt_addr_valid+0x1db/0x2d0
[ 28.970439] ? kasan_complete_mode_report_info+0x64/0x200
[ 28.971206] kasan_report+0x102/0x140
[ 28.971500] ? kmalloc_uaf+0x322/0x380
[ 28.971785] ? kmalloc_uaf+0x322/0x380
[ 28.972077] __asan_report_load1_noabort+0x18/0x20
[ 28.972976] kmalloc_uaf+0x322/0x380
[ 28.974049] ? __pfx_kmalloc_uaf+0x10/0x10
[ 28.974838] ? __schedule+0xc3e/0x2790
[ 28.975529] ? __pfx_read_tsc+0x10/0x10
[ 28.975803] ? ktime_get_ts64+0x84/0x230
[ 28.976263] kunit_try_run_case+0x1b3/0x490
[ 28.976724] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.977319] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.978024] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.979064] ? __kthread_parkme+0x82/0x160
[ 28.979404] ? preempt_count_sub+0x50/0x80
[ 28.980202] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.980904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.981646] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.982428] kthread+0x257/0x310
[ 28.982803] ? __pfx_kthread+0x10/0x10
[ 28.983209] ret_from_fork+0x41/0x80
[ 28.983480] ? __pfx_kthread+0x10/0x10
[ 28.984358] ret_from_fork_asm+0x1a/0x30
[ 28.985008] </TASK>
[ 28.985268]
[ 28.985424] Allocated by task 192:
[ 28.985668] kasan_save_stack+0x3d/0x60
[ 28.986276] kasan_save_track+0x18/0x40
[ 28.987844] kasan_save_alloc_info+0x3b/0x50
[ 28.988326] __kasan_kmalloc+0xb7/0xc0
[ 28.989185] __kmalloc_cache_noprof+0x184/0x410
[ 28.989909] kmalloc_uaf+0xab/0x380
[ 28.990234] kunit_try_run_case+0x1b3/0x490
[ 28.990902] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.991582] kthread+0x257/0x310
[ 28.991960] ret_from_fork+0x41/0x80
[ 28.992706] ret_from_fork_asm+0x1a/0x30
[ 28.993117]
[ 28.993267] Freed by task 192:
[ 28.993697] kasan_save_stack+0x3d/0x60
[ 28.994023] kasan_save_track+0x18/0x40
[ 28.994456] kasan_save_free_info+0x3f/0x60
[ 28.995574] __kasan_slab_free+0x56/0x70
[ 28.995917] kfree+0x123/0x3f0
[ 28.996546] kmalloc_uaf+0x12d/0x380
[ 28.997067] kunit_try_run_case+0x1b3/0x490
[ 28.997458] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.998196] kthread+0x257/0x310
[ 28.999126] ret_from_fork+0x41/0x80
[ 28.999410] ret_from_fork_asm+0x1a/0x30
[ 29.000129]
[ 29.000370] The buggy address belongs to the object at ffff888101bd1120
[ 29.000370] which belongs to the cache kmalloc-16 of size 16
[ 29.002470] The buggy address is located 8 bytes inside of
[ 29.002470] freed 16-byte region [ffff888101bd1120, ffff888101bd1130)
[ 29.003715]
[ 29.003970] The buggy address belongs to the physical page:
[ 29.004456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[ 29.005119] flags: 0x200000000000000(node=0|zone=2)
[ 29.006246] page_type: f5(slab)
[ 29.006927] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 29.007921] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 29.008689] page dumped because: kasan: bad access detected
[ 29.009443]
[ 29.009912] Memory state around the buggy address:
[ 29.010491] ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[ 29.011249] ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[ 29.012424] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 29.013115] ^
[ 29.013618] ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.014284] ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.014765] ==================================================================
Home
[ 28.493784] ==================================================================
[ 28.495010] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0
[ 28.495834] Read of size 16 at addr ffff888101e88260 by task kunit_try_catch/176
[ 28.496835]
[ 28.497062] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.498023] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.499189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.500237] Call Trace:
[ 28.500686] <TASK>
[ 28.501010] dump_stack_lvl+0x73/0xb0
[ 28.501389] print_report+0xd1/0x640
[ 28.501930] ? __virt_addr_valid+0x1db/0x2d0
[ 28.502986] ? kasan_complete_mode_report_info+0x64/0x200
[ 28.503401] kasan_report+0x102/0x140
[ 28.503859] ? kmalloc_uaf_16+0x47d/0x4c0
[ 28.504247] ? kmalloc_uaf_16+0x47d/0x4c0
[ 28.505443] __asan_report_load16_noabort+0x18/0x20
[ 28.506030] kmalloc_uaf_16+0x47d/0x4c0
[ 28.506644] ? __pfx_kmalloc_uaf_16+0x10/0x10
[ 28.507094] ? __schedule+0xc3e/0x2790
[ 28.507461] ? __pfx_read_tsc+0x10/0x10
[ 28.508056] ? ktime_get_ts64+0x84/0x230
[ 28.508585] kunit_try_run_case+0x1b3/0x490
[ 28.509005] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.509369] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.509924] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.511306] ? __kthread_parkme+0x82/0x160
[ 28.511855] ? preempt_count_sub+0x50/0x80
[ 28.512519] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.513138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.513529] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.513894] kthread+0x257/0x310
[ 28.514980] ? __pfx_kthread+0x10/0x10
[ 28.515581] ret_from_fork+0x41/0x80
[ 28.516034] ? __pfx_kthread+0x10/0x10
[ 28.516499] ret_from_fork_asm+0x1a/0x30
[ 28.517218] </TASK>
[ 28.517440]
[ 28.517835] Allocated by task 176:
[ 28.519044] kasan_save_stack+0x3d/0x60
[ 28.519935] kasan_save_track+0x18/0x40
[ 28.520983] kasan_save_alloc_info+0x3b/0x50
[ 28.521664] __kasan_kmalloc+0xb7/0xc0
[ 28.522040] __kmalloc_cache_noprof+0x184/0x410
[ 28.522928] kmalloc_uaf_16+0x15c/0x4c0
[ 28.523209] kunit_try_run_case+0x1b3/0x490
[ 28.524020] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.524783] kthread+0x257/0x310
[ 28.525384] ret_from_fork+0x41/0x80
[ 28.526036] ret_from_fork_asm+0x1a/0x30
[ 28.527511]
[ 28.527752] Freed by task 176:
[ 28.528071] kasan_save_stack+0x3d/0x60
[ 28.528559] kasan_save_track+0x18/0x40
[ 28.528960] kasan_save_free_info+0x3f/0x60
[ 28.530171] __kasan_slab_free+0x56/0x70
[ 28.532199] kfree+0x123/0x3f0
[ 28.532769] kmalloc_uaf_16+0x1d7/0x4c0
[ 28.533142] kunit_try_run_case+0x1b3/0x490
[ 28.533855] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.534714] kthread+0x257/0x310
[ 28.535021] ret_from_fork+0x41/0x80
[ 28.536203] ret_from_fork_asm+0x1a/0x30
[ 28.537051]
[ 28.537251] The buggy address belongs to the object at ffff888101e88260
[ 28.537251] which belongs to the cache kmalloc-16 of size 16
[ 28.538548] The buggy address is located 0 bytes inside of
[ 28.538548] freed 16-byte region [ffff888101e88260, ffff888101e88270)
[ 28.540158]
[ 28.540602] The buggy address belongs to the physical page:
[ 28.541543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e88
[ 28.542124] flags: 0x200000000000000(node=0|zone=2)
[ 28.542862] page_type: f5(slab)
[ 28.543866] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 28.545517] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.546087] page dumped because: kasan: bad access detected
[ 28.547028]
[ 28.547178] Memory state around the buggy address:
[ 28.548331] ffff888101e88100: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 28.549036] ffff888101e88180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 28.551317] >ffff888101e88200: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[ 28.552216] ^
[ 28.552860] ffff888101e88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.554226] ffff888101e88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.555586] ==================================================================
Home
[ 30.120919] ==================================================================
[ 30.122064] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[ 30.122850] Read of size 1 at addr ffff888101e18640 by task kunit_try_catch/223
[ 30.123654]
[ 30.123995] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.124646] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.125293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.126143] Call Trace:
[ 30.126370] <TASK>
[ 30.126666] dump_stack_lvl+0x73/0xb0
[ 30.127245] print_report+0xd1/0x640
[ 30.128237] ? __virt_addr_valid+0x1db/0x2d0
[ 30.128850] ? kasan_complete_mode_report_info+0x64/0x200
[ 30.129706] kasan_report+0x102/0x140
[ 30.130169] ? kmem_cache_double_destroy+0x1bd/0x380
[ 30.131012] ? kmem_cache_double_destroy+0x1bd/0x380
[ 30.131571] ? kmem_cache_double_destroy+0x1bd/0x380
[ 30.132333] __kasan_check_byte+0x3d/0x50
[ 30.132649] kmem_cache_destroy+0x25/0x1d0
[ 30.133278] kmem_cache_double_destroy+0x1bd/0x380
[ 30.134075] ? __pfx_kmem_cache_double_destroy+0x10/0x10
[ 30.134618] ? finish_task_switch.isra.0+0x153/0x700
[ 30.135144] ? __switch_to+0x5d9/0xf60
[ 30.135707] ? __pfx_empty_cache_ctor+0x10/0x10
[ 30.136214] ? __pfx_read_tsc+0x10/0x10
[ 30.136536] ? ktime_get_ts64+0x84/0x230
[ 30.137127] kunit_try_run_case+0x1b3/0x490
[ 30.137944] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.138397] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 30.139076] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 30.139583] ? __kthread_parkme+0x82/0x160
[ 30.139976] ? preempt_count_sub+0x50/0x80
[ 30.140628] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.141092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.141659] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.142095] kthread+0x257/0x310
[ 30.142671] ? __pfx_kthread+0x10/0x10
[ 30.143160] ret_from_fork+0x41/0x80
[ 30.143752] ? __pfx_kthread+0x10/0x10
[ 30.144034] ret_from_fork_asm+0x1a/0x30
[ 30.144361] </TASK>
[ 30.144730]
[ 30.144979] Allocated by task 223:
[ 30.145365] kasan_save_stack+0x3d/0x60
[ 30.145799] kasan_save_track+0x18/0x40
[ 30.146254] kasan_save_alloc_info+0x3b/0x50
[ 30.146718] __kasan_slab_alloc+0x91/0xa0
[ 30.147197] kmem_cache_alloc_noprof+0x11e/0x3e0
[ 30.147750] __kmem_cache_create_args+0x177/0x250
[ 30.148795] kmem_cache_double_destroy+0xd3/0x380
[ 30.149131] kunit_try_run_case+0x1b3/0x490
[ 30.149436] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.150081] kthread+0x257/0x310
[ 30.150529] ret_from_fork+0x41/0x80
[ 30.150984] ret_from_fork_asm+0x1a/0x30
[ 30.151380]
[ 30.151536] Freed by task 223:
[ 30.151896] kasan_save_stack+0x3d/0x60
[ 30.152426] kasan_save_track+0x18/0x40
[ 30.152789] kasan_save_free_info+0x3f/0x60
[ 30.153325] __kasan_slab_free+0x56/0x70
[ 30.153797] kmem_cache_free+0x120/0x420
[ 30.154379] slab_kmem_cache_release+0x2e/0x40
[ 30.154899] kmem_cache_release+0x16/0x20
[ 30.155251] kobject_put+0x181/0x450
[ 30.155778] sysfs_slab_release+0x16/0x20
[ 30.156554] kmem_cache_destroy+0xf0/0x1d0
[ 30.157393] kmem_cache_double_destroy+0x14c/0x380
[ 30.158272] kunit_try_run_case+0x1b3/0x490
[ 30.158930] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.159717] kthread+0x257/0x310
[ 30.160097] ret_from_fork+0x41/0x80
[ 30.160419] ret_from_fork_asm+0x1a/0x30
[ 30.161077]
[ 30.161254] The buggy address belongs to the object at ffff888101e18640
[ 30.161254] which belongs to the cache kmem_cache of size 208
[ 30.162350] The buggy address is located 0 bytes inside of
[ 30.162350] freed 208-byte region [ffff888101e18640, ffff888101e18710)
[ 30.164146]
[ 30.164704] The buggy address belongs to the physical page:
[ 30.166025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e18
[ 30.167051] flags: 0x200000000000000(node=0|zone=2)
[ 30.168284] page_type: f5(slab)
[ 30.168553] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[ 30.170077] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[ 30.171159] page dumped because: kasan: bad access detected
[ 30.171515]
[ 30.171732] Memory state around the buggy address:
[ 30.172228] ffff888101e18500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.172622] ffff888101e18580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 30.173457] >ffff888101e18600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 30.174101] ^
[ 30.175519] ffff888101e18680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.176172] ffff888101e18700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.176974] ==================================================================
Home
[ 30.893759] ==================================================================
[ 30.895094] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[ 30.895695] Read of size 1 at addr ffff888101eb0300 by task kunit_try_catch/235
[ 30.896354]
[ 30.897129] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.898127] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.898602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.899524] Call Trace:
[ 30.899956] <TASK>
[ 30.900208] dump_stack_lvl+0x73/0xb0
[ 30.901011] print_report+0xd1/0x640
[ 30.901480] ? __virt_addr_valid+0x1db/0x2d0
[ 30.902000] ? kasan_complete_mode_report_info+0x64/0x200
[ 30.903277] kasan_report+0x102/0x140
[ 30.904033] ? mempool_uaf_helper+0x394/0x400
[ 30.904453] ? mempool_uaf_helper+0x394/0x400
[ 30.905437] __asan_report_load1_noabort+0x18/0x20
[ 30.905980] mempool_uaf_helper+0x394/0x400
[ 30.906507] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 30.907032] ? finish_task_switch.isra.0+0x153/0x700
[ 30.907688] mempool_kmalloc_uaf+0xb3/0x100
[ 30.908075] ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[ 30.908706] ? __switch_to+0x5d9/0xf60
[ 30.909090] ? __pfx_mempool_kmalloc+0x10/0x10
[ 30.910071] ? __pfx_mempool_kfree+0x10/0x10
[ 30.910646] ? __pfx_read_tsc+0x10/0x10
[ 30.911095] ? ktime_get_ts64+0x84/0x230
[ 30.911721] kunit_try_run_case+0x1b3/0x490
[ 30.912122] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.912797] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 30.913300] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 30.914332] ? __kthread_parkme+0x82/0x160
[ 30.914780] ? preempt_count_sub+0x50/0x80
[ 30.915142] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.915762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.916607] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.917151] kthread+0x257/0x310
[ 30.917863] ? __pfx_kthread+0x10/0x10
[ 30.918269] ret_from_fork+0x41/0x80
[ 30.918867] ? __pfx_kthread+0x10/0x10
[ 30.919180] ret_from_fork_asm+0x1a/0x30
[ 30.919893] </TASK>
[ 30.920132]
[ 30.920299] Allocated by task 235:
[ 30.920883] kasan_save_stack+0x3d/0x60
[ 30.921345] kasan_save_track+0x18/0x40
[ 30.922064] kasan_save_alloc_info+0x3b/0x50
[ 30.922632] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 30.923058] remove_element+0x11e/0x190
[ 30.924100] mempool_alloc_preallocated+0x4d/0x90
[ 30.924849] mempool_uaf_helper+0x97/0x400
[ 30.925432] mempool_kmalloc_uaf+0xb3/0x100
[ 30.926381] kunit_try_run_case+0x1b3/0x490
[ 30.926970] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.928149] kthread+0x257/0x310
[ 30.928599] ret_from_fork+0x41/0x80
[ 30.929399] ret_from_fork_asm+0x1a/0x30
[ 30.929873]
[ 30.930775] Freed by task 235:
[ 30.931468] kasan_save_stack+0x3d/0x60
[ 30.932145] kasan_save_track+0x18/0x40
[ 30.932482] kasan_save_free_info+0x3f/0x60
[ 30.933894] __kasan_mempool_poison_object+0x131/0x1d0
[ 30.934666] mempool_free+0x2ec/0x380
[ 30.935127] mempool_uaf_helper+0x11b/0x400
[ 30.936354] mempool_kmalloc_uaf+0xb3/0x100
[ 30.937233] kunit_try_run_case+0x1b3/0x490
[ 30.937803] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.938865] kthread+0x257/0x310
[ 30.939290] ret_from_fork+0x41/0x80
[ 30.939761] ret_from_fork_asm+0x1a/0x30
[ 30.940178]
[ 30.940872] The buggy address belongs to the object at ffff888101eb0300
[ 30.940872] which belongs to the cache kmalloc-128 of size 128
[ 30.941885] The buggy address is located 0 bytes inside of
[ 30.941885] freed 128-byte region [ffff888101eb0300, ffff888101eb0380)
[ 30.943585]
[ 30.944062] The buggy address belongs to the physical page:
[ 30.944600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eb0
[ 30.945952] flags: 0x200000000000000(node=0|zone=2)
[ 30.946644] page_type: f5(slab)
[ 30.947057] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 30.948069] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.948647] page dumped because: kasan: bad access detected
[ 30.949106]
[ 30.949294] Memory state around the buggy address:
[ 30.950090] ffff888101eb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.951131] ffff888101eb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.952021] >ffff888101eb0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.953017] ^
[ 30.953228] ffff888101eb0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.954622] ffff888101eb0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 30.955442] ==================================================================
Home
[ 31.021109] ==================================================================
[ 31.022152] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[ 31.022831] Read of size 1 at addr ffff8881029ba240 by task kunit_try_catch/239
[ 31.024546]
[ 31.025116] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.026142] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.026497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.028117] Call Trace:
[ 31.028521] <TASK>
[ 31.028739] dump_stack_lvl+0x73/0xb0
[ 31.029394] print_report+0xd1/0x640
[ 31.029823] ? __virt_addr_valid+0x1db/0x2d0
[ 31.030944] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.031494] kasan_report+0x102/0x140
[ 31.032016] ? mempool_uaf_helper+0x394/0x400
[ 31.032466] ? mempool_uaf_helper+0x394/0x400
[ 31.033331] __asan_report_load1_noabort+0x18/0x20
[ 31.034289] mempool_uaf_helper+0x394/0x400
[ 31.035080] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 31.035825] ? finish_task_switch.isra.0+0x153/0x700
[ 31.036067] mempool_slab_uaf+0xae/0x100
[ 31.036259] ? __pfx_mempool_slab_uaf+0x10/0x10
[ 31.037204] ? __switch_to+0x5d9/0xf60
[ 31.037937] ? __pfx_mempool_alloc_slab+0x10/0x10
[ 31.038970] ? __pfx_mempool_free_slab+0x10/0x10
[ 31.039475] ? __pfx_read_tsc+0x10/0x10
[ 31.040239] ? ktime_get_ts64+0x84/0x230
[ 31.040974] kunit_try_run_case+0x1b3/0x490
[ 31.041435] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.042151] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.042808] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.043513] ? __kthread_parkme+0x82/0x160
[ 31.044455] ? preempt_count_sub+0x50/0x80
[ 31.045131] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.045748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.047022] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.047520] kthread+0x257/0x310
[ 31.048202] ? __pfx_kthread+0x10/0x10
[ 31.049047] ret_from_fork+0x41/0x80
[ 31.049666] ? __pfx_kthread+0x10/0x10
[ 31.050411] ret_from_fork_asm+0x1a/0x30
[ 31.050857] </TASK>
[ 31.052275]
[ 31.052869] Allocated by task 239:
[ 31.053232] kasan_save_stack+0x3d/0x60
[ 31.054414] kasan_save_track+0x18/0x40
[ 31.054679] kasan_save_alloc_info+0x3b/0x50
[ 31.055240] __kasan_mempool_unpoison_object+0x1bb/0x200
[ 31.055806] remove_element+0x11e/0x190
[ 31.056218] mempool_alloc_preallocated+0x4d/0x90
[ 31.056972] mempool_uaf_helper+0x97/0x400
[ 31.058349] mempool_slab_uaf+0xae/0x100
[ 31.058893] kunit_try_run_case+0x1b3/0x490
[ 31.059805] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.060872] kthread+0x257/0x310
[ 31.061774] ret_from_fork+0x41/0x80
[ 31.062100] ret_from_fork_asm+0x1a/0x30
[ 31.063131]
[ 31.063339] Freed by task 239:
[ 31.063565] kasan_save_stack+0x3d/0x60
[ 31.064356] kasan_save_track+0x18/0x40
[ 31.065182] kasan_save_free_info+0x3f/0x60
[ 31.066150] __kasan_mempool_poison_object+0x131/0x1d0
[ 31.066744] mempool_free+0x2ec/0x380
[ 31.067665] mempool_uaf_helper+0x11b/0x400
[ 31.068139] mempool_slab_uaf+0xae/0x100
[ 31.068964] kunit_try_run_case+0x1b3/0x490
[ 31.069470] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.069942] kthread+0x257/0x310
[ 31.070276] ret_from_fork+0x41/0x80
[ 31.070721] ret_from_fork_asm+0x1a/0x30
[ 31.071031]
[ 31.071301] The buggy address belongs to the object at ffff8881029ba240
[ 31.071301] which belongs to the cache test_cache of size 123
[ 31.072633] The buggy address is located 0 bytes inside of
[ 31.072633] freed 123-byte region [ffff8881029ba240, ffff8881029ba2bb)
[ 31.073856]
[ 31.074173] The buggy address belongs to the physical page:
[ 31.074693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ba
[ 31.075162] flags: 0x200000000000000(node=0|zone=2)
[ 31.076041] page_type: f5(slab)
[ 31.076559] raw: 0200000000000000 ffff888101aa83c0 dead000000000122 0000000000000000
[ 31.077736] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 31.079008] page dumped because: kasan: bad access detected
[ 31.079637]
[ 31.079855] Memory state around the buggy address:
[ 31.080692] ffff8881029ba100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 31.081636] ffff8881029ba180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 31.082576] >ffff8881029ba200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 31.083268] ^
[ 31.084167] ffff8881029ba280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 31.084899] ffff8881029ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.085671] ==================================================================
Home
[ 31.730883] ==================================================================
[ 31.732103] BUG: KASAN: slab-use-after-free in strchr+0x9c/0xc0
[ 31.732525] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[ 31.733266]
[ 31.733605] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.734347] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.734766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.735640] Call Trace:
[ 31.735922] <TASK>
[ 31.736224] dump_stack_lvl+0x73/0xb0
[ 31.736672] print_report+0xd1/0x640
[ 31.737160] ? __virt_addr_valid+0x1db/0x2d0
[ 31.737585] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.738181] kasan_report+0x102/0x140
[ 31.738725] ? strchr+0x9c/0xc0
[ 31.739024] ? strchr+0x9c/0xc0
[ 31.739513] __asan_report_load1_noabort+0x18/0x20
[ 31.739924] strchr+0x9c/0xc0
[ 31.740171] kasan_strings+0x1b1/0xb60
[ 31.740713] ? __pfx_kasan_strings+0x10/0x10
[ 31.741131] ? __pfx_kasan_strings+0x10/0x10
[ 31.741630] kunit_try_run_case+0x1b3/0x490
[ 31.741954] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.742584] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.743175] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.743670] ? __kthread_parkme+0x82/0x160
[ 31.744190] ? preempt_count_sub+0x50/0x80
[ 31.744675] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.745009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.745749] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.746370] kthread+0x257/0x310
[ 31.746864] ? __pfx_kthread+0x10/0x10
[ 31.747228] ret_from_fork+0x41/0x80
[ 31.747622] ? __pfx_kthread+0x10/0x10
[ 31.748097] ret_from_fork_asm+0x1a/0x30
[ 31.748606] </TASK>
[ 31.748824]
[ 31.748975] Allocated by task 267:
[ 31.749366] kasan_save_stack+0x3d/0x60
[ 31.749889] kasan_save_track+0x18/0x40
[ 31.750341] kasan_save_alloc_info+0x3b/0x50
[ 31.750690] __kasan_kmalloc+0xb7/0xc0
[ 31.751104] __kmalloc_cache_noprof+0x184/0x410
[ 31.751736] kasan_strings+0xb3/0xb60
[ 31.752219] kunit_try_run_case+0x1b3/0x490
[ 31.752751] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.753121] kthread+0x257/0x310
[ 31.753489] ret_from_fork+0x41/0x80
[ 31.753943] ret_from_fork_asm+0x1a/0x30
[ 31.754507]
[ 31.754765] Freed by task 267:
[ 31.755131] kasan_save_stack+0x3d/0x60
[ 31.755492] kasan_save_track+0x18/0x40
[ 31.755773] kasan_save_free_info+0x3f/0x60
[ 31.756328] __kasan_slab_free+0x56/0x70
[ 31.756853] kfree+0x123/0x3f0
[ 31.757262] kasan_strings+0x13a/0xb60
[ 31.757674] kunit_try_run_case+0x1b3/0x490
[ 31.758063] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.758673] kthread+0x257/0x310
[ 31.758919] ret_from_fork+0x41/0x80
[ 31.759441] ret_from_fork_asm+0x1a/0x30
[ 31.759929]
[ 31.760172] The buggy address belongs to the object at ffff8881029be540
[ 31.760172] which belongs to the cache kmalloc-32 of size 32
[ 31.761950] The buggy address is located 16 bytes inside of
[ 31.761950] freed 32-byte region [ffff8881029be540, ffff8881029be560)
[ 31.763669]
[ 31.763923] The buggy address belongs to the physical page:
[ 31.764860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 31.765369] flags: 0x200000000000000(node=0|zone=2)
[ 31.765960] page_type: f5(slab)
[ 31.766360] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 31.767504] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.767958] page dumped because: kasan: bad access detected
[ 31.768838]
[ 31.769088] Memory state around the buggy address:
[ 31.769974] ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.770628] ffff8881029be480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 31.771225] >ffff8881029be500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.772225] ^
[ 31.773106] ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.773689] ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.774585] ==================================================================
Home
[ 31.832757] ==================================================================
[ 31.833244] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[ 31.833734] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[ 31.834925]
[ 31.835218] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.836558] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.836916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.837987] Call Trace:
[ 31.838821] <TASK>
[ 31.839476] dump_stack_lvl+0x73/0xb0
[ 31.840765] print_report+0xd1/0x640
[ 31.841221] ? __virt_addr_valid+0x1db/0x2d0
[ 31.842101] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.842840] kasan_report+0x102/0x140
[ 31.843395] ? strcmp+0xb0/0xc0
[ 31.844039] ? strcmp+0xb0/0xc0
[ 31.844416] __asan_report_load1_noabort+0x18/0x20
[ 31.845374] strcmp+0xb0/0xc0
[ 31.846084] kasan_strings+0x2e9/0xb60
[ 31.846738] ? __pfx_kasan_strings+0x10/0x10
[ 31.847387] ? __pfx_kasan_strings+0x10/0x10
[ 31.848040] kunit_try_run_case+0x1b3/0x490
[ 31.848797] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.849287] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.850301] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.851024] ? __kthread_parkme+0x82/0x160
[ 31.851438] ? preempt_count_sub+0x50/0x80
[ 31.852210] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.852759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.853881] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.854677] kthread+0x257/0x310
[ 31.855004] ? __pfx_kthread+0x10/0x10
[ 31.855384] ret_from_fork+0x41/0x80
[ 31.856293] ? __pfx_kthread+0x10/0x10
[ 31.856859] ret_from_fork_asm+0x1a/0x30
[ 31.857293] </TASK>
[ 31.857492]
[ 31.858335] Allocated by task 267:
[ 31.859166] kasan_save_stack+0x3d/0x60
[ 31.859651] kasan_save_track+0x18/0x40
[ 31.860049] kasan_save_alloc_info+0x3b/0x50
[ 31.861017] __kasan_kmalloc+0xb7/0xc0
[ 31.861394] __kmalloc_cache_noprof+0x184/0x410
[ 31.862253] kasan_strings+0xb3/0xb60
[ 31.863032] kunit_try_run_case+0x1b3/0x490
[ 31.863699] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.864198] kthread+0x257/0x310
[ 31.864588] ret_from_fork+0x41/0x80
[ 31.864947] ret_from_fork_asm+0x1a/0x30
[ 31.865936]
[ 31.866096] Freed by task 267:
[ 31.866359] kasan_save_stack+0x3d/0x60
[ 31.867329] kasan_save_track+0x18/0x40
[ 31.867671] kasan_save_free_info+0x3f/0x60
[ 31.868347] __kasan_slab_free+0x56/0x70
[ 31.868955] kfree+0x123/0x3f0
[ 31.869303] kasan_strings+0x13a/0xb60
[ 31.869870] kunit_try_run_case+0x1b3/0x490
[ 31.870310] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.871206] kthread+0x257/0x310
[ 31.871672] ret_from_fork+0x41/0x80
[ 31.872048] ret_from_fork_asm+0x1a/0x30
[ 31.872883]
[ 31.873175] The buggy address belongs to the object at ffff8881029be540
[ 31.873175] which belongs to the cache kmalloc-32 of size 32
[ 31.875148] The buggy address is located 16 bytes inside of
[ 31.875148] freed 32-byte region [ffff8881029be540, ffff8881029be560)
[ 31.876501]
[ 31.876999] The buggy address belongs to the physical page:
[ 31.877665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 31.878457] flags: 0x200000000000000(node=0|zone=2)
[ 31.879110] page_type: f5(slab)
[ 31.879480] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 31.880188] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.881599] page dumped because: kasan: bad access detected
[ 31.882172]
[ 31.882385] Memory state around the buggy address:
[ 31.882872] ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.884130] ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.885252] >ffff8881029be500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.886272] ^
[ 31.887092] ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.888033] ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.889074] ==================================================================
Home
[ 31.943724] ==================================================================
[ 31.944143] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[ 31.945623] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[ 31.946541]
[ 31.946734] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.947723] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.948184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.948999] Call Trace:
[ 31.949356] <TASK>
[ 31.949685] dump_stack_lvl+0x73/0xb0
[ 31.950109] print_report+0xd1/0x640
[ 31.950683] ? __virt_addr_valid+0x1db/0x2d0
[ 31.951230] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.951783] kasan_report+0x102/0x140
[ 31.952330] ? strlen+0x8f/0xb0
[ 31.952780] ? strlen+0x8f/0xb0
[ 31.953180] __asan_report_load1_noabort+0x18/0x20
[ 31.953774] strlen+0x8f/0xb0
[ 31.954055] kasan_strings+0x432/0xb60
[ 31.954682] ? __pfx_kasan_strings+0x10/0x10
[ 31.955273] ? __pfx_kasan_strings+0x10/0x10
[ 31.955740] kunit_try_run_case+0x1b3/0x490
[ 31.956259] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.956785] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.957329] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.957924] ? __kthread_parkme+0x82/0x160
[ 31.958375] ? preempt_count_sub+0x50/0x80
[ 31.958954] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.959569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.960166] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.960730] kthread+0x257/0x310
[ 31.961179] ? __pfx_kthread+0x10/0x10
[ 31.961694] ret_from_fork+0x41/0x80
[ 31.962054] ? __pfx_kthread+0x10/0x10
[ 31.962630] ret_from_fork_asm+0x1a/0x30
[ 31.963119] </TASK>
[ 31.963510]
[ 31.963712] Allocated by task 267:
[ 31.964200] kasan_save_stack+0x3d/0x60
[ 31.964593] kasan_save_track+0x18/0x40
[ 31.965144] kasan_save_alloc_info+0x3b/0x50
[ 31.965663] __kasan_kmalloc+0xb7/0xc0
[ 31.966118] __kmalloc_cache_noprof+0x184/0x410
[ 31.966519] kasan_strings+0xb3/0xb60
[ 31.966846] kunit_try_run_case+0x1b3/0x490
[ 31.967164] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.967820] kthread+0x257/0x310
[ 31.968245] ret_from_fork+0x41/0x80
[ 31.969223] ret_from_fork_asm+0x1a/0x30
[ 31.969882]
[ 31.970281] Freed by task 267:
[ 31.970544] kasan_save_stack+0x3d/0x60
[ 31.970959] kasan_save_track+0x18/0x40
[ 31.971384] kasan_save_free_info+0x3f/0x60
[ 31.971892] __kasan_slab_free+0x56/0x70
[ 31.972472] kfree+0x123/0x3f0
[ 31.973345] kasan_strings+0x13a/0xb60
[ 31.973800] kunit_try_run_case+0x1b3/0x490
[ 31.974529] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.975273] kthread+0x257/0x310
[ 31.975817] ret_from_fork+0x41/0x80
[ 31.976189] ret_from_fork_asm+0x1a/0x30
[ 31.976664]
[ 31.976820] The buggy address belongs to the object at ffff8881029be540
[ 31.976820] which belongs to the cache kmalloc-32 of size 32
[ 31.978889] The buggy address is located 16 bytes inside of
[ 31.978889] freed 32-byte region [ffff8881029be540, ffff8881029be560)
[ 31.980012]
[ 31.980269] The buggy address belongs to the physical page:
[ 31.980927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 31.981745] flags: 0x200000000000000(node=0|zone=2)
[ 31.982245] page_type: f5(slab)
[ 31.982694] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 31.983513] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.984201] page dumped because: kasan: bad access detected
[ 31.984799]
[ 31.984965] Memory state around the buggy address:
[ 31.985572] ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.986306] ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.987075] >ffff8881029be500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.987710] ^
[ 31.988304] ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.988955] ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.989731] ==================================================================
Home
[ 31.991041] ==================================================================
[ 31.991622] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[ 31.992286] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[ 31.993277]
[ 31.993493] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.994077] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.994581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.995582] Call Trace:
[ 31.995912] <TASK>
[ 31.996138] dump_stack_lvl+0x73/0xb0
[ 31.996561] print_report+0xd1/0x640
[ 31.997011] ? __virt_addr_valid+0x1db/0x2d0
[ 31.997624] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.998076] kasan_report+0x102/0x140
[ 31.998607] ? strnlen+0x73/0x80
[ 31.998889] ? strnlen+0x73/0x80
[ 31.999177] __asan_report_load1_noabort+0x18/0x20
[ 31.999836] strnlen+0x73/0x80
[ 32.000279] kasan_strings+0x4cc/0xb60
[ 32.000811] ? __pfx_kasan_strings+0x10/0x10
[ 32.001223] ? __pfx_kasan_strings+0x10/0x10
[ 32.001619] kunit_try_run_case+0x1b3/0x490
[ 32.002166] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.002801] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 32.003245] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 32.003766] ? __kthread_parkme+0x82/0x160
[ 32.004249] ? preempt_count_sub+0x50/0x80
[ 32.004627] ? __pfx_kunit_try_run_case+0x10/0x10
[ 32.005181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 32.005834] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.006521] kthread+0x257/0x310
[ 32.006828] ? __pfx_kthread+0x10/0x10
[ 32.007241] ret_from_fork+0x41/0x80
[ 32.007655] ? __pfx_kthread+0x10/0x10
[ 32.008133] ret_from_fork_asm+0x1a/0x30
[ 32.008537] </TASK>
[ 32.008757]
[ 32.008991] Allocated by task 267:
[ 32.009457] kasan_save_stack+0x3d/0x60
[ 32.009950] kasan_save_track+0x18/0x40
[ 32.010245] kasan_save_alloc_info+0x3b/0x50
[ 32.010851] __kasan_kmalloc+0xb7/0xc0
[ 32.011228] __kmalloc_cache_noprof+0x184/0x410
[ 32.011630] kasan_strings+0xb3/0xb60
[ 32.011956] kunit_try_run_case+0x1b3/0x490
[ 32.012528] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.013140] kthread+0x257/0x310
[ 32.013486] ret_from_fork+0x41/0x80
[ 32.013879] ret_from_fork_asm+0x1a/0x30
[ 32.014197]
[ 32.014376] Freed by task 267:
[ 32.014804] kasan_save_stack+0x3d/0x60
[ 32.015259] kasan_save_track+0x18/0x40
[ 32.015617] kasan_save_free_info+0x3f/0x60
[ 32.015997] __kasan_slab_free+0x56/0x70
[ 32.016525] kfree+0x123/0x3f0
[ 32.016930] kasan_strings+0x13a/0xb60
[ 32.017254] kunit_try_run_case+0x1b3/0x490
[ 32.017729] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 32.018081] kthread+0x257/0x310
[ 32.018525] ret_from_fork+0x41/0x80
[ 32.019009] ret_from_fork_asm+0x1a/0x30
[ 32.019499]
[ 32.019728] The buggy address belongs to the object at ffff8881029be540
[ 32.019728] which belongs to the cache kmalloc-32 of size 32
[ 32.020530] The buggy address is located 16 bytes inside of
[ 32.020530] freed 32-byte region [ffff8881029be540, ffff8881029be560)
[ 32.021628]
[ 32.021783] The buggy address belongs to the physical page:
[ 32.022140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 32.023094] flags: 0x200000000000000(node=0|zone=2)
[ 32.023655] page_type: f5(slab)
[ 32.023905] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 32.024517] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 32.025303] page dumped because: kasan: bad access detected
[ 32.025955]
[ 32.026200] Memory state around the buggy address:
[ 32.026643] ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 32.027288] ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 32.027957] >ffff8881029be500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 32.028691] ^
[ 32.029140] ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.029622] ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 32.030428] ==================================================================
Home
[ 31.776669] ==================================================================
[ 31.778401] BUG: KASAN: slab-use-after-free in strrchr+0x64/0x70
[ 31.778923] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[ 31.779724]
[ 31.779931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.781130] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.782663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.783728] Call Trace:
[ 31.783977] <TASK>
[ 31.784499] dump_stack_lvl+0x73/0xb0
[ 31.785175] print_report+0xd1/0x640
[ 31.785550] ? __virt_addr_valid+0x1db/0x2d0
[ 31.786017] ? kasan_complete_mode_report_info+0x64/0x200
[ 31.786560] kasan_report+0x102/0x140
[ 31.786933] ? strrchr+0x64/0x70
[ 31.787304] ? strrchr+0x64/0x70
[ 31.788346] __asan_report_load1_noabort+0x18/0x20
[ 31.789008] strrchr+0x64/0x70
[ 31.789368] kasan_strings+0x24c/0xb60
[ 31.790046] ? __pfx_kasan_strings+0x10/0x10
[ 31.790837] ? __pfx_kasan_strings+0x10/0x10
[ 31.791156] kunit_try_run_case+0x1b3/0x490
[ 31.792177] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.792868] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.793371] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.794543] ? __kthread_parkme+0x82/0x160
[ 31.795164] ? preempt_count_sub+0x50/0x80
[ 31.795954] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.796423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.796961] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.798111] kthread+0x257/0x310
[ 31.799261] ? __pfx_kthread+0x10/0x10
[ 31.799891] ret_from_fork+0x41/0x80
[ 31.800290] ? __pfx_kthread+0x10/0x10
[ 31.800906] ret_from_fork_asm+0x1a/0x30
[ 31.801404] </TASK>
[ 31.801681]
[ 31.801882] Allocated by task 267:
[ 31.802239] kasan_save_stack+0x3d/0x60
[ 31.803618] kasan_save_track+0x18/0x40
[ 31.804434] kasan_save_alloc_info+0x3b/0x50
[ 31.804888] __kasan_kmalloc+0xb7/0xc0
[ 31.805514] __kmalloc_cache_noprof+0x184/0x410
[ 31.806230] kasan_strings+0xb3/0xb60
[ 31.806935] kunit_try_run_case+0x1b3/0x490
[ 31.807632] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.808023] kthread+0x257/0x310
[ 31.808437] ret_from_fork+0x41/0x80
[ 31.808838] ret_from_fork_asm+0x1a/0x30
[ 31.809484]
[ 31.809970] Freed by task 267:
[ 31.810361] kasan_save_stack+0x3d/0x60
[ 31.811028] kasan_save_track+0x18/0x40
[ 31.811431] kasan_save_free_info+0x3f/0x60
[ 31.811878] __kasan_slab_free+0x56/0x70
[ 31.812287] kfree+0x123/0x3f0
[ 31.812562] kasan_strings+0x13a/0xb60
[ 31.812839] kunit_try_run_case+0x1b3/0x490
[ 31.814083] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.814674] kthread+0x257/0x310
[ 31.814981] ret_from_fork+0x41/0x80
[ 31.815390] ret_from_fork_asm+0x1a/0x30
[ 31.816277]
[ 31.816461] The buggy address belongs to the object at ffff8881029be540
[ 31.816461] which belongs to the cache kmalloc-32 of size 32
[ 31.817375] The buggy address is located 16 bytes inside of
[ 31.817375] freed 32-byte region [ffff8881029be540, ffff8881029be560)
[ 31.819009]
[ 31.819335] The buggy address belongs to the physical page:
[ 31.820142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[ 31.821084] flags: 0x200000000000000(node=0|zone=2)
[ 31.821788] page_type: f5(slab)
[ 31.822120] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 31.823371] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.823915] page dumped because: kasan: bad access detected
[ 31.824504]
[ 31.824784] Memory state around the buggy address:
[ 31.825251] ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.826495] ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.827372] >ffff8881029be500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 31.827996] ^
[ 31.828594] ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.829258] ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.830084] ==================================================================
Home
[ 29.688127] ==================================================================
[ 29.689782] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[ 29.690858] Read of size 8 at addr ffff888101ea1680 by task kunit_try_catch/208
[ 29.691461]
[ 29.692141] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.693372] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.693791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.694658] Call Trace:
[ 29.694944] <TASK>
[ 29.695631] dump_stack_lvl+0x73/0xb0
[ 29.696339] print_report+0xd1/0x640
[ 29.697379] ? __virt_addr_valid+0x1db/0x2d0
[ 29.697990] ? kasan_complete_mode_report_info+0x64/0x200
[ 29.698743] kasan_report+0x102/0x140
[ 29.699620] ? workqueue_uaf+0x4d8/0x560
[ 29.700360] ? workqueue_uaf+0x4d8/0x560
[ 29.701121] __asan_report_load8_noabort+0x18/0x20
[ 29.701855] workqueue_uaf+0x4d8/0x560
[ 29.702255] ? __pfx_workqueue_uaf+0x10/0x10
[ 29.702967] ? __schedule+0xc3e/0x2790
[ 29.703695] ? __pfx_read_tsc+0x10/0x10
[ 29.704104] ? ktime_get_ts64+0x84/0x230
[ 29.704842] kunit_try_run_case+0x1b3/0x490
[ 29.705562] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.706130] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.706765] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.707528] ? __kthread_parkme+0x82/0x160
[ 29.708092] ? preempt_count_sub+0x50/0x80
[ 29.708908] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.709778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.710285] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.710893] kthread+0x257/0x310
[ 29.711182] ? __pfx_kthread+0x10/0x10
[ 29.711929] ret_from_fork+0x41/0x80
[ 29.712318] ? __pfx_kthread+0x10/0x10
[ 29.713008] ret_from_fork_asm+0x1a/0x30
[ 29.713698] </TASK>
[ 29.713959]
[ 29.714140] Allocated by task 208:
[ 29.714593] kasan_save_stack+0x3d/0x60
[ 29.714989] kasan_save_track+0x18/0x40
[ 29.715697] kasan_save_alloc_info+0x3b/0x50
[ 29.716154] __kasan_kmalloc+0xb7/0xc0
[ 29.716884] __kmalloc_cache_noprof+0x184/0x410
[ 29.717204] workqueue_uaf+0x153/0x560
[ 29.717843] kunit_try_run_case+0x1b3/0x490
[ 29.718520] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.718955] kthread+0x257/0x310
[ 29.719217] ret_from_fork+0x41/0x80
[ 29.719771] ret_from_fork_asm+0x1a/0x30
[ 29.720272]
[ 29.720762] Freed by task 90:
[ 29.721157] kasan_save_stack+0x3d/0x60
[ 29.721515] kasan_save_track+0x18/0x40
[ 29.721983] kasan_save_free_info+0x3f/0x60
[ 29.722503] __kasan_slab_free+0x56/0x70
[ 29.722949] kfree+0x123/0x3f0
[ 29.723220] workqueue_uaf_work+0x12/0x20
[ 29.723845] process_one_work+0x5ee/0xf60
[ 29.724332] worker_thread+0x720/0x1300
[ 29.725019] kthread+0x257/0x310
[ 29.725284] ret_from_fork+0x41/0x80
[ 29.725897] ret_from_fork_asm+0x1a/0x30
[ 29.726498]
[ 29.726739] Last potentially related work creation:
[ 29.727285] kasan_save_stack+0x3d/0x60
[ 29.727719] __kasan_record_aux_stack+0xae/0xc0
[ 29.728193] kasan_record_aux_stack_noalloc+0xf/0x20
[ 29.729101] __queue_work+0x67e/0xf70
[ 29.729818] queue_work_on+0x74/0xa0
[ 29.730269] workqueue_uaf+0x26e/0x560
[ 29.730687] kunit_try_run_case+0x1b3/0x490
[ 29.731047] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.731804] kthread+0x257/0x310
[ 29.732172] ret_from_fork+0x41/0x80
[ 29.732760] ret_from_fork_asm+0x1a/0x30
[ 29.733148]
[ 29.733579] The buggy address belongs to the object at ffff888101ea1680
[ 29.733579] which belongs to the cache kmalloc-32 of size 32
[ 29.734722] The buggy address is located 0 bytes inside of
[ 29.734722] freed 32-byte region [ffff888101ea1680, ffff888101ea16a0)
[ 29.735690]
[ 29.735941] The buggy address belongs to the physical page:
[ 29.736513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea1
[ 29.737246] flags: 0x200000000000000(node=0|zone=2)
[ 29.737764] page_type: f5(slab)
[ 29.738133] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 29.738667] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 29.739737] page dumped because: kasan: bad access detected
[ 29.740316]
[ 29.740668] Memory state around the buggy address:
[ 29.741109] ffff888101ea1580: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 29.741917] ffff888101ea1600: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 29.742660] >ffff888101ea1680: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.743442] ^
[ 29.743946] ffff888101ea1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.744387] ffff888101ea1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.745240] ==================================================================
Home
[ 30.962890] ==================================================================
[ 30.963876] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[ 30.965460] Read of size 1 at addr ffff888102b4c000 by task kunit_try_catch/237
[ 30.966547]
[ 30.966751] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.967617] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.968034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.970098] Call Trace:
[ 30.970426] <TASK>
[ 30.970661] dump_stack_lvl+0x73/0xb0
[ 30.971139] print_report+0xd1/0x640
[ 30.971725] ? __virt_addr_valid+0x1db/0x2d0
[ 30.972171] ? kasan_addr_to_slab+0x11/0xa0
[ 30.972582] kasan_report+0x102/0x140
[ 30.973555] ? mempool_uaf_helper+0x394/0x400
[ 30.974145] ? mempool_uaf_helper+0x394/0x400
[ 30.974930] __asan_report_load1_noabort+0x18/0x20
[ 30.976144] mempool_uaf_helper+0x394/0x400
[ 30.977081] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 30.978042] ? irqentry_exit+0x2a/0x60
[ 30.978578] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 30.979151] mempool_kmalloc_large_uaf+0xb3/0x100
[ 30.979820] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[ 30.980180] ? __pfx_mempool_kmalloc+0x10/0x10
[ 30.980540] ? __pfx_mempool_kfree+0x10/0x10
[ 30.981095] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[ 30.981586] kunit_try_run_case+0x1b3/0x490
[ 30.981982] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.982946] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 30.983749] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 30.985240] ? __kthread_parkme+0x82/0x160
[ 30.986337] ? preempt_count_sub+0x50/0x80
[ 30.987595] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.988738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.989362] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.990255] kthread+0x257/0x310
[ 30.990974] ? __pfx_kthread+0x10/0x10
[ 30.992211] ret_from_fork+0x41/0x80
[ 30.992823] ? __pfx_kthread+0x10/0x10
[ 30.993104] ret_from_fork_asm+0x1a/0x30
[ 30.994191] </TASK>
[ 30.994541]
[ 30.995106] The buggy address belongs to the physical page:
[ 30.995531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[ 30.996494] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 30.997217] flags: 0x200000000000040(head|node=0|zone=2)
[ 30.998793] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 30.999723] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.001076] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 31.002190] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.003154] head: 0200000000000002 ffffea00040ad301 ffffffffffffffff 0000000000000000
[ 31.004290] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 31.005221] page dumped because: kasan: bad access detected
[ 31.006131]
[ 31.006330] Memory state around the buggy address:
[ 31.006671] ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.008191] ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.009221] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.009953] ^
[ 31.010288] ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.012063] ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.012957] ==================================================================
Home
[ 31.097218] ==================================================================
[ 31.098195] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[ 31.098928] Read of size 1 at addr ffff888102b4c000 by task kunit_try_catch/241
[ 31.099672]
[ 31.100002] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.101459] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.102171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.103802] Call Trace:
[ 31.104297] <TASK>
[ 31.104734] dump_stack_lvl+0x73/0xb0
[ 31.105367] print_report+0xd1/0x640
[ 31.106115] ? __virt_addr_valid+0x1db/0x2d0
[ 31.106590] ? kasan_addr_to_slab+0x11/0xa0
[ 31.107019] kasan_report+0x102/0x140
[ 31.107610] ? mempool_uaf_helper+0x394/0x400
[ 31.107955] ? mempool_uaf_helper+0x394/0x400
[ 31.108534] __asan_report_load1_noabort+0x18/0x20
[ 31.109088] mempool_uaf_helper+0x394/0x400
[ 31.110172] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 31.110953] ? finish_task_switch.isra.0+0x153/0x700
[ 31.111705] mempool_page_alloc_uaf+0xb1/0x100
[ 31.112162] ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[ 31.112798] ? __switch_to+0x5d9/0xf60
[ 31.113196] ? __pfx_mempool_alloc_pages+0x10/0x10
[ 31.114150] ? __pfx_mempool_free_pages+0x10/0x10
[ 31.114774] ? __pfx_read_tsc+0x10/0x10
[ 31.115206] ? ktime_get_ts64+0x84/0x230
[ 31.115773] kunit_try_run_case+0x1b3/0x490
[ 31.116195] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.116838] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 31.117227] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 31.118180] ? __kthread_parkme+0x82/0x160
[ 31.118835] ? preempt_count_sub+0x50/0x80
[ 31.119205] ? __pfx_kunit_try_run_case+0x10/0x10
[ 31.119877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 31.120585] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 31.121066] kthread+0x257/0x310
[ 31.121910] ? __pfx_kthread+0x10/0x10
[ 31.122283] ret_from_fork+0x41/0x80
[ 31.122779] ? __pfx_kthread+0x10/0x10
[ 31.123190] ret_from_fork_asm+0x1a/0x30
[ 31.123747] </TASK>
[ 31.124057]
[ 31.124304] The buggy address belongs to the physical page:
[ 31.125065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[ 31.126167] flags: 0x200000000000000(node=0|zone=2)
[ 31.126847] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 31.127755] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 31.128327] page dumped because: kasan: bad access detected
[ 31.128988]
[ 31.129220] Memory state around the buggy address:
[ 31.130128] ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.130773] ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.131429] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.131964] ^
[ 31.132547] ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.133113] ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 31.134163] ==================================================================
Home
[ 27.235898] ==================================================================
[ 27.238046] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x289/0x530
[ 27.238046]
[ 27.238679] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#55):
[ 27.240683] kmalloc_track_caller_oob_right+0x289/0x530
[ 27.241297] kunit_try_run_case+0x1b3/0x490
[ 27.241994] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.242767] kthread+0x257/0x310
[ 27.243138] ret_from_fork+0x41/0x80
[ 27.243540] ret_from_fork_asm+0x1a/0x30
[ 27.243965]
[ 27.244478] kfence-#55: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[ 27.244478]
[ 27.246447] allocated by task 150 on cpu 1 at 27.232243s (0.014015s ago):
[ 27.247696] kmalloc_track_caller_oob_right+0x19b/0x530
[ 27.248302] kunit_try_run_case+0x1b3/0x490
[ 27.249270] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.250295] kthread+0x257/0x310
[ 27.250578] ret_from_fork+0x41/0x80
[ 27.251397] ret_from_fork_asm+0x1a/0x30
[ 27.252236]
[ 27.252819] freed by task 150 on cpu 1 at 27.235155s (0.017516s ago):
[ 27.253657] kmalloc_track_caller_oob_right+0x289/0x530
[ 27.254322] kunit_try_run_case+0x1b3/0x490
[ 27.255018] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.255722] kthread+0x257/0x310
[ 27.255892] ret_from_fork+0x41/0x80
[ 27.256064] ret_from_fork_asm+0x1a/0x30
[ 27.256331]
[ 27.256579] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.257760] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.258483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.259618] ==================================================================
Home
[ 27.235898] ==================================================================
[ 27.238046] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x289/0x530
[ 27.238046]
[ 27.238679] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#55):
[ 27.240683] kmalloc_track_caller_oob_right+0x289/0x530
[ 27.241297] kunit_try_run_case+0x1b3/0x490
[ 27.241994] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.242767] kthread+0x257/0x310
[ 27.243138] ret_from_fork+0x41/0x80
[ 27.243540] ret_from_fork_asm+0x1a/0x30
[ 27.243965]
[ 27.244478] kfence-#55: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[ 27.244478]
[ 27.246447] allocated by task 150 on cpu 1 at 27.232243s (0.014015s ago):
[ 27.247696] kmalloc_track_caller_oob_right+0x19b/0x530
[ 27.248302] kunit_try_run_case+0x1b3/0x490
[ 27.249270] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.250295] kthread+0x257/0x310
[ 27.250578] ret_from_fork+0x41/0x80
[ 27.251397] ret_from_fork_asm+0x1a/0x30
[ 27.252236]
[ 27.252819] freed by task 150 on cpu 1 at 27.235155s (0.017516s ago):
[ 27.253657] kmalloc_track_caller_oob_right+0x289/0x530
[ 27.254322] kunit_try_run_case+0x1b3/0x490
[ 27.255018] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.255722] kthread+0x257/0x310
[ 27.255892] ret_from_fork+0x41/0x80
[ 27.256064] ret_from_fork_asm+0x1a/0x30
[ 27.256331]
[ 27.256579] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.257760] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.258483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.259618] ==================================================================
Home
------------[ cut here ]------------
[ 4.475341] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[ 4.484039] Modules linked in:
[ 4.487121] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc7 #1
[ 4.494049] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 4.500183] Call trace:
[ 4.500183] unwind_backtrace from show_stack+0x10/0x14
[ 4.507995] show_stack from dump_stack_lvl+0x54/0x68
[ 4.513092] dump_stack_lvl from __warn+0x7c/0x128
[ 4.517913] __warn from warn_slowpath_fmt+0x184/0x18c
[ 4.523101] warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[ 4.530120] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 4.536926] smp_call_function from set_memory_valid+0x7c/0xb8
[ 4.542816] set_memory_valid from kfence_guarded_free+0x168/0x300
[ 4.549041] kfence_guarded_free from rcu_core+0x2b8/0x964
[ 4.554565] rcu_core from handle_softirqs+0x108/0x344
[ 4.559722] handle_softirqs from __irq_exit_rcu+0xa0/0x114
[ 4.565338] __irq_exit_rcu from irq_exit+0x8/0x10
[ 4.570159] irq_exit from call_with_stack+0x18/0x20
[ 4.575134] call_with_stack from __irq_svc+0x8c/0xa4
[ 4.580230] Exception stack(0xf0059f50 to 0xf0059f98)
[ 4.585296] 9f40: 000073d4 00000001 00000001 00000000
[ 4.593536] 9f60: c2992500 c226fc60 c2004e9c c2004edc 00000000 00000000 00000000 00000000
[ 4.601745] 9f80: c226f0a0 f0059fa0 c13f9568 c13fa9e0 600f0113 ffffffff
[ 4.608398] __irq_svc from default_idle_call+0x1c/0xb0
[ 4.613647] default_idle_call from do_idle+0x200/0x288
[ 4.618927] do_idle from cpu_startup_entry+0x28/0x2c
[ 4.623992] cpu_startup_entry from secondary_start_kernel+0x120/0x128
[ 4.630554] secondary_start_kernel from 0x8041b094
[ 4.635498] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 4.475341] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[ 4.484039] Modules linked in:
[ 4.487121] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc7 #1
[ 4.494049] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 4.500183] Call trace:
[ 4.500183] unwind_backtrace from show_stack+0x10/0x14
[ 4.507995] show_stack from dump_stack_lvl+0x54/0x68
[ 4.513092] dump_stack_lvl from __warn+0x7c/0x128
[ 4.517913] __warn from warn_slowpath_fmt+0x184/0x18c
[ 4.523101] warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[ 4.530120] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 4.536926] smp_call_function from set_memory_valid+0x7c/0xb8
[ 4.542816] set_memory_valid from kfence_guarded_free+0x168/0x300
[ 4.549041] kfence_guarded_free from rcu_core+0x2b8/0x964
[ 4.554565] rcu_core from handle_softirqs+0x108/0x344
[ 4.559722] handle_softirqs from __irq_exit_rcu+0xa0/0x114
[ 4.565338] __irq_exit_rcu from irq_exit+0x8/0x10
[ 4.570159] irq_exit from call_with_stack+0x18/0x20
[ 4.575134] call_with_stack from __irq_svc+0x8c/0xa4
[ 4.580230] Exception stack(0xf0059f50 to 0xf0059f98)
[ 4.585296] 9f40: 000073d4 00000001 00000001 00000000
[ 4.593536] 9f60: c2992500 c226fc60 c2004e9c c2004edc 00000000 00000000 00000000 00000000
[ 4.601745] 9f80: c226f0a0 f0059fa0 c13f9568 c13fa9e0 600f0113 ffffffff
[ 4.608398] __irq_svc from default_idle_call+0x1c/0xb0
[ 4.613647] default_idle_call from do_idle+0x200/0x288
[ 4.618927] do_idle from cpu_startup_entry+0x28/0x2c
[ 4.623992] cpu_startup_entry from secondary_start_kernel+0x120/0x128
[ 4.630554] secondary_start_kernel from 0x8041b094
[ 4.635498] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 5.338684] WARNING: CPU: 1 PID: 24 at kernel/smp.c:815 smp_call_function_many_cond+0x4b0/0x5dc
[ 5.347503] Modules linked in:
[ 5.350585] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc7 #1
[ 5.357757] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 5.363891] Call trace:
[ 5.363922] unwind_backtrace from show_stack+0x18/0x1c
[ 5.371734] show_stack from dump_stack_lvl+0x6c/0x8c
[ 5.376831] dump_stack_lvl from __warn+0x84/0x130
[ 5.381652] __warn from warn_slowpath_fmt+0x18c/0x194
[ 5.386840] warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[ 5.386871] smp_call_function_many_cond from smp_call_function+0x34/0x3c
[ 5.386901] smp_call_function from set_memory_valid+0x84/0xc4
[ 5.386932] set_memory_valid from kfence_guarded_free+0x170/0x2dc
[ 5.386962] kfence_guarded_free from kmem_cache_free+0x360/0x408
[ 5.386993] kmem_cache_free from rcu_core+0x2cc/0x9dc
[ 5.387023] rcu_core from handle_softirqs+0x14c/0x3d0
[ 5.387023] handle_softirqs from run_ksoftirqd+0x48/0x60
[ 5.387054] run_ksoftirqd from smpboot_thread_fn+0xc0/0x15c
[ 5.387084] smpboot_thread_fn from kthread+0xe8/0x104
[ 5.387084] kthread from ret_from_fork+0x14/0x20
[ 5.387115] Exception stack(0xf006dfb0 to 0xf006dff8)
[ 5.387115] dfa0: 00000000 00000000 00000000 00000000
[ 5.387145] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 5.387145] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 5.387207] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 50.285720] WARNING: CPU: 0 PID: 467 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[ 50.288546] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 50.291986] CPU: 0 UID: 0 PID: 467 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 50.292933] Hardware name: linux,dummy-virt (DT)
[ 50.294299] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 50.294776] pc : __kvmalloc_node_noprof+0x138/0x148
[ 50.295902] lr : __kvmalloc_node_noprof+0x64/0x148
[ 50.297961] sp : ffff800080a73cd0
[ 50.298340] x29: ffff800080a73ce0 x28: fff00000c28c6d80 x27: 0000000000000000
[ 50.299571] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c013c840
[ 50.300479] x23: fff00000c013c8c0 x22: 4daf912ec973b6f4 x21: 0000000200001e00
[ 50.300980] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 50.301525] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 50.302012] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 50.302504] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 50.305003] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 50.305583] x5 : 0000000000000000 x4 : fff00000c28c6d80 x3 : 0000000000000000
[ 50.306072] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 50.306757] Call trace:
[ 50.307560] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 50.308938] alloc_fdtable+0x84/0x128
[ 50.309903] expand_files+0x78/0x2ec
[ 50.310441] ksys_dup3+0x60/0x120
[ 50.311247] __arm64_sys_dup3+0x20/0x30
[ 50.311729] invoke_syscall+0x48/0x10c
[ 50.312003] el0_svc_common.constprop.0+0x40/0xe0
[ 50.312308] do_el0_svc+0x1c/0x28
[ 50.312559] el0_svc+0x30/0xcc
[ 50.312825] el0t_64_sync_handler+0x10c/0x138
[ 50.313115] el0t_64_sync+0x198/0x19c
[ 50.314646] ---[ end trace 0000000000000000 ]---
Home
[ 116.150089] watchdog: BUG: soft lockup - CPU#0 stuck for 44s! [sh:318]
Home
[ 116.150089] watchdog: BUG: soft lockup - CPU#0 stuck for 44s! [sh:318]
Home
[ 52.888286] Oops: int3: 0000 [#1] PREEMPT SMP PTI
Home
[ 52.888286] Oops: int3: 0000 [#1] PREEMPT SMP PTI
Home
[ 52.900653] Kernel panic - not syncing: Fatal exception in interrupt
[ 52.902860] Kernel Offset: 0x2ae00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 52.924925] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
Home
[ 52.900653] Kernel panic - not syncing: Fatal exception in interrupt
[ 52.902860] Kernel Offset: 0x2ae00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 52.924925] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
Home
------------[ cut here ]------------
[ 54.494588] WARNING: CPU: 1 PID: 499 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[ 54.497170] Modules linked in:
[ 54.498051] CPU: 1 UID: 0 PID: 499 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 54.499553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 54.500191] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[ 54.500823] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[ 54.502687] RSP: 0018:ffff9ab0008cbdd8 EFLAGS: 00010246
[ 54.503302] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 54.504288] RDX: 0000000000000015 RSI: ffffffff830373cd RDI: 0000000000452cc0
[ 54.504918] RBP: ffff9ab0008cbdf0 R08: 0000000000000040 R09: 0000000000000000
[ 54.505217] R10: ffff9ab0008cbdd8 R11: 0000000000000000 R12: 0000000200001e00
[ 54.506044] R13: 00000000ffffffff R14: ffff9633c02bc8c0 R15: ffff9633c02bc840
[ 54.506828] FS: 00007f97ebe52740(0000) GS:ffff96343bd00000(0000) knlGS:0000000000000000
[ 54.507676] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 54.508112] CR2: 00007f97ebefb8f0 CR3: 0000000102b3a000 CR4: 00000000000006f0
[ 54.508597] Call Trace:
[ 54.509008] <TASK>
[ 54.509378] ? show_regs+0x68/0x80
[ 54.509982] ? __warn+0x91/0x140
[ 54.510172] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 54.510746] ? report_bug+0x175/0x1a0
[ 54.511015] ? handle_bug+0x5c/0xa0
[ 54.511576] ? exc_invalid_op+0x1c/0x80
[ 54.511813] ? asm_exc_invalid_op+0x1f/0x30
[ 54.512004] ? __kmalloc_node_noprof+0x39d/0x4c0
[ 54.512512] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 54.513093] ? __kvmalloc_node_noprof+0x53/0xe0
[ 54.513665] alloc_fdtable+0x78/0x120
[ 54.513970] expand_files+0x68/0x2e0
[ 54.514123] ? do_prlimit+0x134/0x210
[ 54.514375] ? trace_preempt_off+0x1e/0x70
[ 54.514764] ? ksys_dup3+0x61/0x100
[ 54.515052] ksys_dup3+0x6c/0x100
[ 54.515521] __x64_sys_dup2+0x32/0xc0
[ 54.515872] x64_sys_call+0x2082/0x20b0
[ 54.516184] do_syscall_64+0xb2/0x1d0
[ 54.516568] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 54.517111] RIP: 0033:0x7f97ebf4ac17
[ 54.518019] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 54.519383] RSP: 002b:00007fffffe997c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 54.520470] RAX: ffffffffffffffda RBX: 00007fffffe9a028 RCX: 00007f97ebf4ac17
[ 54.520762] RDX: 00007fffffe997f0 RSI: 0000000040000038 RDI: 0000000000000002
[ 54.520975] RBP: 00007fffffe999f0 R08: 0000000000000064 R09: 0000000000000000
[ 54.521184] R10: 00007f97ebe67170 R11: 0000000000000202 R12: 0000000000000000
[ 54.521740] R13: 00007fffffe9a038 R14: 00007f97ec086000 R15: 000055b6f7205dd8
[ 54.522579] </TASK>
[ 54.523080] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 193.522279] WARNING: CPU: 2 PID: 1469 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[ 193.523017] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth v4l2_h264 v4l2_vp9 v4l2_jpeg crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card snd_soc_spdif_tx v4l2_mem2mem panfrost snd_soc_simple_card_utils rockchipdrm videobuf2_v4l2 reset_gpio gpu_sched videodev drm_shmem_helper dw_mipi_dsi ecdh_generic analogix_dp ecc rfkill videobuf2_dma_contig dw_hdmi pwrseq_core cec phy_rockchip_pcie videobuf2_memops drm_display_helper videobuf2_common rtc_rk808 snd_soc_rockchip_i2s mc drm_dma_helper drm_client_lib snd_soc_es8316 rockchip_saradc drm_kms_helper rockchip_thermal industrialio_triggered_buffer pcie_rockchip_host kfifo_buf coresight_cpu_debug coresight drm fuse backlight ip_tables x_tables
[ 193.529193] CPU: 2 UID: 0 PID: 1469 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 193.529849] Hardware name: Radxa ROCK Pi 4B (DT)
[ 193.530258] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 193.530874] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 193.531317] lr : __kvmalloc_node_noprof+0x50/0x124
[ 193.531744] sp : ffff800084e13ce0
[ 193.532038] x29: ffff800084e13cf0 x28: ffff000001998000 x27: 0000000000000000
[ 193.532671] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 193.533303] x23: 0000000080000000 x22: ffff80008035c9a0 x21: 0000000200001e00
[ 193.533935] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 193.534567] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 193.535200] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 193.535831] x11: 0000000000000040 x10: 6eecf9c73f643800 x9 : 6eecf9c73f643800
[ 193.536462] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 193.537094] x5 : 0000000000000000 x4 : ffff800084e13cb0 x3 : 0000000000000000
[ 193.537726] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 193.538359] Call trace:
[ 193.538579] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 193.539023] alloc_fdtable+0x74/0x118
[ 193.539355] expand_files+0x114/0x2e0
[ 193.539685] ksys_dup3+0x64/0xe8
[ 193.539976] __arm64_sys_dup3+0x20/0x30
[ 193.540320] invoke_syscall+0x40/0xf8
[ 193.540650] el0_svc_common+0xa8/0xd8
[ 193.540978] do_el0_svc+0x1c/0x28
[ 193.541275] el0_svc+0x38/0x68
[ 193.541553] el0t_64_sync_handler+0x78/0x108
[ 193.541933] el0t_64_sync+0x198/0x19c
[ 193.542263] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 193.522279] WARNING: CPU: 2 PID: 1469 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[ 193.523017] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth v4l2_h264 v4l2_vp9 v4l2_jpeg crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card snd_soc_spdif_tx v4l2_mem2mem panfrost snd_soc_simple_card_utils rockchipdrm videobuf2_v4l2 reset_gpio gpu_sched videodev drm_shmem_helper dw_mipi_dsi ecdh_generic analogix_dp ecc rfkill videobuf2_dma_contig dw_hdmi pwrseq_core cec phy_rockchip_pcie videobuf2_memops drm_display_helper videobuf2_common rtc_rk808 snd_soc_rockchip_i2s mc drm_dma_helper drm_client_lib snd_soc_es8316 rockchip_saradc drm_kms_helper rockchip_thermal industrialio_triggered_buffer pcie_rockchip_host kfifo_buf coresight_cpu_debug coresight drm fuse backlight ip_tables x_tables
[ 193.529193] CPU: 2 UID: 0 PID: 1469 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 193.529849] Hardware name: Radxa ROCK Pi 4B (DT)
[ 193.530258] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 193.530874] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 193.531317] lr : __kvmalloc_node_noprof+0x50/0x124
[ 193.531744] sp : ffff800084e13ce0
[ 193.532038] x29: ffff800084e13cf0 x28: ffff000001998000 x27: 0000000000000000
[ 193.532671] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 193.533303] x23: 0000000080000000 x22: ffff80008035c9a0 x21: 0000000200001e00
[ 193.533935] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 193.534567] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 193.535200] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 193.535831] x11: 0000000000000040 x10: 6eecf9c73f643800 x9 : 6eecf9c73f643800
[ 193.536462] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 193.537094] x5 : 0000000000000000 x4 : ffff800084e13cb0 x3 : 0000000000000000
[ 193.537726] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 193.538359] Call trace:
[ 193.538579] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 193.539023] alloc_fdtable+0x74/0x118
[ 193.539355] expand_files+0x114/0x2e0
[ 193.539685] ksys_dup3+0x64/0xe8
[ 193.539976] __arm64_sys_dup3+0x20/0x30
[ 193.540320] invoke_syscall+0x40/0xf8
[ 193.540650] el0_svc_common+0xa8/0xd8
[ 193.540978] do_el0_svc+0x1c/0x28
[ 193.541275] el0_svc+0x38/0x68
[ 193.541553] el0t_64_sync_handler+0x78/0x108
[ 193.541933] el0t_64_sync+0x198/0x19c
[ 193.542263] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 202.133511] WARNING: CPU: 2 PID: 1472 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[ 202.134241] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card v4l2_vp9 ecdh_generic snd_soc_spdif_tx reset_gpio v4l2_h264 ecc rockchipdrm snd_soc_simple_card_utils v4l2_jpeg analogix_dp v4l2_mem2mem dw_mipi_dsi videobuf2_dma_contig panfrost videobuf2_memops rfkill drm_shmem_helper videobuf2_v4l2 dw_hdmi gpu_sched phy_rockchip_pcie snd_soc_rockchip_i2s pwrseq_core rtc_rk808 videodev cec drm_display_helper rockchip_saradc drm_client_lib videobuf2_common drm_dma_helper snd_soc_es8316 mc drm_kms_helper industrialio_triggered_buffer kfifo_buf coresight_cpu_debug rockchip_thermal coresight pcie_rockchip_host drm fuse backlight ip_tables x_tables
[ 202.140422] CPU: 2 UID: 0 PID: 1472 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 202.141080] Hardware name: Radxa ROCK Pi 4B (DT)
[ 202.141491] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 202.142104] pc : __kvmalloc_node_noprof+0x138/0x148
[ 202.142542] lr : __kvmalloc_node_noprof+0x64/0x148
[ 202.142968] sp : ffff800084d3bcd0
[ 202.143261] x29: ffff800084d3bce0 x28: ffff000001c06d80 x27: 0000000000000000
[ 202.143896] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000013eb440
[ 202.144529] x23: ffff0000013eb4c0 x22: ffff80008033b6f4 x21: 0000000200001e00
[ 202.145162] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 202.145796] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 202.146428] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 202.147061] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 202.147694] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 202.148327] x5 : 0000000000000000 x4 : ffff000001c06d80 x3 : 0000000000000000
[ 202.148960] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 202.149594] Call trace:
[ 202.149816] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 202.150253] alloc_fdtable+0x84/0x128
[ 202.150586] expand_files+0x78/0x2ec
[ 202.150909] ksys_dup3+0x60/0x120
[ 202.151206] __arm64_sys_dup3+0x20/0x30
[ 202.151550] invoke_syscall+0x48/0x10c
[ 202.151890] el0_svc_common.constprop.0+0x40/0xe0
[ 202.152310] do_el0_svc+0x1c/0x28
[ 202.152609] el0_svc+0x30/0xcc
[ 202.152887] el0t_64_sync_handler+0x10c/0x138
[ 202.153275] el0t_64_sync+0x198/0x19c
[ 202.153605] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 202.133511] WARNING: CPU: 2 PID: 1472 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[ 202.134241] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card v4l2_vp9 ecdh_generic snd_soc_spdif_tx reset_gpio v4l2_h264 ecc rockchipdrm snd_soc_simple_card_utils v4l2_jpeg analogix_dp v4l2_mem2mem dw_mipi_dsi videobuf2_dma_contig panfrost videobuf2_memops rfkill drm_shmem_helper videobuf2_v4l2 dw_hdmi gpu_sched phy_rockchip_pcie snd_soc_rockchip_i2s pwrseq_core rtc_rk808 videodev cec drm_display_helper rockchip_saradc drm_client_lib videobuf2_common drm_dma_helper snd_soc_es8316 mc drm_kms_helper industrialio_triggered_buffer kfifo_buf coresight_cpu_debug rockchip_thermal coresight pcie_rockchip_host drm fuse backlight ip_tables x_tables
[ 202.140422] CPU: 2 UID: 0 PID: 1472 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 202.141080] Hardware name: Radxa ROCK Pi 4B (DT)
[ 202.141491] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 202.142104] pc : __kvmalloc_node_noprof+0x138/0x148
[ 202.142542] lr : __kvmalloc_node_noprof+0x64/0x148
[ 202.142968] sp : ffff800084d3bcd0
[ 202.143261] x29: ffff800084d3bce0 x28: ffff000001c06d80 x27: 0000000000000000
[ 202.143896] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000013eb440
[ 202.144529] x23: ffff0000013eb4c0 x22: ffff80008033b6f4 x21: 0000000200001e00
[ 202.145162] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 202.145796] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 202.146428] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 202.147061] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 202.147694] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 202.148327] x5 : 0000000000000000 x4 : ffff000001c06d80 x3 : 0000000000000000
[ 202.148960] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 202.149594] Call trace:
[ 202.149816] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 202.150253] alloc_fdtable+0x84/0x128
[ 202.150586] expand_files+0x78/0x2ec
[ 202.150909] ksys_dup3+0x60/0x120
[ 202.151206] __arm64_sys_dup3+0x20/0x30
[ 202.151550] invoke_syscall+0x48/0x10c
[ 202.151890] el0_svc_common.constprop.0+0x40/0xe0
[ 202.152310] do_el0_svc+0x1c/0x28
[ 202.152609] el0_svc+0x30/0xcc
[ 202.152887] el0t_64_sync_handler+0x10c/0x138
[ 202.153275] el0t_64_sync+0x198/0x19c
[ 202.153605] ---[ end trace 0000000000000000 ]---
Home
[ 3.782684] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[ 3.789459] Modules linked in:
[ 3.792510] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0-rc7 #1
[ 3.799865] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 3.805999] Workqueue: events_unbound deferred_probe_work_func
[ 3.811889] PC is at edma_probe+0xb34/0xfe4
[ 3.816101] LR is at devm_kmalloc+0xf4/0x12c
[ 3.820373] pc : [<c0c0bc28>] lr : [<c0deb730>] psr: 60000013
[ 3.826690] sp : f0105938 ip : 00070007 fp : efcd56f0
[ 3.831939] r10: c3cadc10 r9 : c2f53840 r8 : c3cadc00
[ 3.837188] r7 : 00000002 r6 : 00000000 r5 : 00000003 r4 : 00000001
[ 3.843749] r3 : 00000001 r2 : 00000002 r1 : 00000002 r0 : c3cca1c0
[ 3.850311] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 3.857482] Control: 30c5387d Table: 80203000 DAC: 55555555
[ 3.863281] Register r0 information: slab kmalloc-rnd-13-128 start c3cca180 pointer offset 64 size 128
[ 3.872650] Register r1 information: non-paged memory
[ 3.877746] Register r2 information: non-paged memory
[ 3.882812] Register r3 information: non-paged memory
[ 3.887908] Register r4 information: non-paged memory
[ 3.892974] Register r5 information: non-paged memory
[ 3.898071] Register r6 information: NULL pointer
[ 3.902801] Register r7 information: non-paged memory
[ 3.907867] Register r8 information: slab kmalloc-rnd-15-1k start c3cadc00 pointer offset 0 size 1024
[ 3.917175] Register r9 information: slab kmalloc-rnd-08-512 start c2f53800 pointer offset 64 size 512
[ 3.926544] Register r10 information: slab kmalloc-rnd-15-1k start c3cadc00 pointer offset 16 size 1024
[ 3.936004] Register r11 information: non-slab/vmalloc memory
[ 3.941772] Register r12 information: non-paged memory
[ 3.946960] Process kworker/u10:2 (pid: 45, stack limit = 0x1b97c4a1)
[ 3.953430] Stack: (0xf0105938 to 0xf0106000)
[ 3.957824] 5920: 00000001 c13376c8
[ 3.966033] 5940: c3cadc10 c23d273c c23d273c efcd56f0 00000001 c3cd1740 c292a93c 00000000
[ 3.974243] 5960: 00000001 00000000 c24d3d48 c1334104 c1d8b2c0 c1d27400 efcd56f0 3f45655f
[ 3.982482] 5980: c24d3d48 fc8f9ed5 f0105a98 c1334d4c ffffffff c07028f8 00000000 00000000
[ 3.990692] 59a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 f46c0f7c
[ 3.998931] 59c0: f46c0f7c c3cadc10 c23d273c c23d273c 3f45655f c24d3d48 fc8f9ed5 f0105a98
[ 4.007141] 59e0: 00000001 c0de9334 c3cadc10 c23d273c 00000000 c0de5a70 c3cadc10 c23d273c
[ 4.015380] 5a00: c24d3d50 000000ab 00000001 c0de4af4 60000013 efcd56f0 c3cadc10 c3cadc10
[ 4.023590] 5a20: c24d3d50 000000ab c24d3d48 fc8f9ed5 00000001 c0de5780 c3cadc10 c23d273c
[ 4.031799] 5a40: f0105a98 00000000 c2826900 c0de5638 c0de5504 c0de5504 00000000 f0105a68
[ 4.040039] 5a60: 00000001 c0de1b74 c282696c c29eac38 c2826900 f46c0f7c c3cadc10 c3cadc54
[ 4.048248] 5a80: 00000000 00000001 00000000 c2826900 00000000 c0de490c c3cadc10 00000001
[ 4.056488] 5aa0: 00000100 f46c0f7c c3cadc10 c24d3d3c c2826900 c1a471f0 c3cadc10 c0de1de0
[ 4.064697] 5ac0: c3cadc10 c3caec10 00000000 c3caec10 c3cadc10 efcd5754 00000001 c0ddd4d4
[ 4.072906] 5ae0: f46c0f7c 00000000 00000000 00000000 c3cadc00 efcd56f0 c3cadc10 efcd5754
[ 4.081146] 5b00: 00000000 c1336d00 efcd56f0 c3caec10 c221d2b8 00000000 00000000 efcd5754
[ 4.089355] 5b20: c1843978 c1336f98 c29ad410 c3caec10 00000000 00000000 00000000 00000000
[ 4.097564] 5b40: 00000000 00000000 00000000 00000000 00000000 00000000 f46c0f7c efcd56f0
[ 4.105804] 5b60: c221d2b8 c1843978 efcd539c 00000000 c3caec10 00000001 c24c2728 c1337214
[ 4.114013] 5b80: 00000001 c1cfc9ea c3cc6c40 efcd5520 f0105be0 00000001 00000000 c1cfc9ea
[ 4.122253] 5ba0: c1e02ae6 c0a36af0 00000000 00000000 c1d8b2c0 c3caec10 c221d524 efcd539c
[ 4.130462] 5bc0: 00000000 00000000 43300000 00000000 00100000 00000000 00000200 00000000
[ 4.138702] 5be0: 00000002 c1b15cc0 ff9e82f0 ff9e82f0 00000001 00000001 00000001 00000000
[ 4.146911] 5c00: f46c0f7c c3caec10 c230f228 c230f228 3f45655f c24d3d48 fc8f9ed5 f0105cd8
[ 4.155120] 5c20: 00000001 c0de9334 c3caec10 c230f228 00000000 c0de5a70 c3caec10 c230f228
[ 4.163360] 5c40: c24d3d50 000000ab 00000001 c0de4af4 60000013 efcd539c c3caec10 c3caec10
[ 4.171569] 5c60: c24d3d50 000000ab c24d3d48 fc8f9ed5 00000001 c0de5780 c3caec10 c230f228
[ 4.179779] 5c80: f0105cd8 00000000 c2826900 c0de5638 c0de5504 c0de5504 00000000 f0105ca8
[ 4.188018] 5ca0: 00000001 c0de1b74 c282696c c386acb8 c2826900 f46c0f7c c3caec10 c3caec54
[ 4.196228] 5cc0: 00000000 00000001 00000000 c2826900 c221d524 c0de490c c3caec10 00000001
[ 4.204467] 5ce0: 00000100 f46c0f7c c3caec10 c24d3d3c c2826900 c1a471f0 c3caec10 c0de1de0
[ 4.212677] 5d00: c3caec10 c29ad410 00000000 c29ad410 c3caec10 efcd5400 00000001 c0ddd4d4
[ 4.220886] 5d20: f46c0f7c 00000000 00000000 00000000 c3caec00 efcd539c c3caec10 efcd5400
[ 4.229125] 5d40: c221d524 c1336d00 efcd539c c29ad410 c221d2b8 c221d524 00000000 efcd5400
[ 4.237335] 5d60: 00000000 c1336f98 00000000 c29ad410 43300000 00000000 43300003 00000000
[ 4.245574] 5d80: ff9e8254 00000200 00000000 00000000 00000000 00000000 f46c0f7c efcd539c
[ 4.253784] 5da0: c221d2b8 00000000 efc6946c 00000000 c29ad410 00000001 c291680d c1337214
[ 4.261993] 5dc0: 00000001 f0105eb8 c29ad410 efc6946c c3a0fb40 c29ad400 c230f14c c221d2b8
[ 4.270233] 5de0: f0105eb8 c0a35db8 c29ad410 c230f14c c230f14c 3f45655f c24d3d48 fc8f9ed5
[ 4.278442] 5e00: c291680d c0de9334 c29ad410 c230f14c 00000000 c0de5a70 c29ad410 c230f14c
[ 4.286682] 5e20: c24d3d50 00000001 c291680d c0de4af4 60000013 efc6946c c29ad410 c29ad410
[ 4.294891] 5e40: c24d3d50 00000001 c24d3d48 fc8f9ed5 c291680d c0de5780 c29ad410 c230f14c
[ 4.303100] 5e60: f0105eb8 00000000 c2826900 c0de5638 c0de5504 c0de5504 00000000 f0105e88
[ 4.311340] 5e80: c291680d c0de1b74 c282696c c386af38 c2826900 f46c0f7c c29ad410 c29ad454
[ 4.319549] 5ea0: 00000000 00000001 00000000 c2826900 c2916800 c0de490c c29ad410 00000001
[ 4.327789] 5ec0: c291680d f46c0f7c c29ad410 c24d3d3c c2826900 c1a471f0 00000000 c0de1de0
[ 4.335998] 5ee0: c23fe8f4 c29ad410 c2bffa54 c23fe910 00000000 00000004 c291680d c0de5298
[ 4.344207] 5f00: c29dab00 c23fe918 c2970c00 c2916880 0000000a c047f7b4 f0105f70 c1805e30
[ 4.352447] 5f20: 00000000 00000002 f46c0f7c c3832500 c29dab18 c29dab50 c29dab2c c2970c00
[ 4.360656] 5f40: c29dab00 c29dab2c c3832500 c2970c20 c246a65a 00000402 00000000 c0481c7c
[ 4.368896] 5f60: c29e3600 c04819cc c29dab00 00000040 c3832be4 c29e3614 c29e3600 c04819cc
[ 4.377105] 5f80: c29dab00 c3832500 00000000 c04884f4 c2e81d40 c04883bc 00000000 00000000
[ 4.385314] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[ 4.393554] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.401763] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[ 4.409973] Call trace:
[ 4.410003] edma_probe from platform_probe+0xac/0xe0
[ 4.417633] platform_probe from really_probe+0x170/0x3cc
[ 4.423065] really_probe from __driver_probe_device+0x90/0x18c
[ 4.429016] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.435577] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.442321] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.448822] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.454589] __device_attach from bus_probe_device+0xac/0x128
[ 4.460357] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.465820] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.472381] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.480163] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.486816] of_platform_populate from sysc_probe+0xa9c/0xbac
[ 4.492614] sysc_probe from platform_probe+0xac/0xe0
[ 4.497680] platform_probe from really_probe+0x170/0x3cc
[ 4.503143] really_probe from __driver_probe_device+0x90/0x18c
[ 4.509094] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.515655] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.522399] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.528869] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.534667] __device_attach from bus_probe_device+0xac/0x128
[ 4.540435] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.545867] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.552429] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.560241] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.566894] of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[ 4.573272] simple_pm_bus_probe from platform_probe+0xac/0xe0
[ 4.579162] platform_probe from really_probe+0x170/0x3cc
[ 4.584594] really_probe from __driver_probe_device+0x90/0x18c
[ 4.590545] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.597106] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.603851] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.610321] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.616119] __device_attach from bus_probe_device+0xac/0x128
[ 4.621887] bus_probe_device from deferred_probe_work_func+0x94/0xd4
[ 4.628356] deferred_probe_work_func from process_scheduled_works+0x25c/0x504
[ 4.635650] process_scheduled_works from worker_thread+0x2b0/0x3ac
[ 4.641937] worker_thread from kthread+0x138/0x164
[ 4.646850] kthread from ret_from_fork+0x14/0x38
[ 4.651580] Exception stack(0xf0105fb0 to 0xf0105ff8)
[ 4.656677] 5fa0: 00000000 00000000 00000000 00000000
[ 4.664886] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.673126] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 4.679779] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe)
[ 4.685882] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 213.850572] WARNING: CPU: 2 PID: 1428 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[ 213.858597] Modules linked in: x86_pkg_temp_thermal
[ 213.863489] CPU: 2 UID: 0 PID: 1428 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 213.870950] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 213.879415] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[ 213.884598] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 213.904688] RSP: 0018:ffffaca341963db8 EFLAGS: 00010246
[ 213.909978] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 213.918424] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffff83069fe8
[ 213.925646] RBP: ffffaca341963dd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 213.934066] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[ 213.941267] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[ 213.949709] FS: 00007f71f27ed740(0000) GS:ffff9e0cdfd00000(0000) knlGS:0000000000000000
[ 213.957863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 213.964920] CR2: 00007f71f2991680 CR3: 000000010f0b0001 CR4: 00000000003706f0
[ 213.972120] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 213.980574] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 213.987751] Call Trace:
[ 213.990494] <TASK>
[ 213.992591] ? show_regs+0x5d/0x70
[ 213.995998] ? __warn+0xcf/0x1d0
[ 213.999257] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 214.003791] ? report_bug+0x14c/0x1f0
[ 214.007454] ? handle_bug+0x67/0x90
[ 214.010973] ? exc_invalid_op+0x1f/0x50
[ 214.014815] ? asm_exc_invalid_op+0x1f/0x30
[ 214.019027] ? __kvmalloc_node_noprof+0x48/0xf0
[ 214.023559] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 214.028090] ? __kvmalloc_node_noprof+0x48/0xf0
[ 214.032615] alloc_fdtable+0x7b/0x120
[ 214.036280] expand_files+0x118/0x310
[ 214.039973] ? do_prlimit+0x11d/0x160
[ 214.043640] ? __se_sys_prlimit64+0x1ea/0x2a0
[ 214.047999] ksys_dup3+0x71/0xd0
[ 214.051229] __x64_sys_dup2+0x1e/0x80
[ 214.054896] x64_sys_call+0x8cf/0x2f50
[ 214.058651] do_syscall_64+0xd0/0x1a0
[ 214.062381] ? exc_page_fault+0x68/0xc0
[ 214.066215] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 214.071269] RIP: 0033:0x7f71f28e5c17
[ 214.074846] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 214.093618] RSP: 002b:00007ffe8e7ae6a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 214.101184] RAX: ffffffffffffffda RBX: 00007ffe8e7aef08 RCX: 00007f71f28e5c17
[ 214.108334] RDX: 00007ffe8e7ae828 RSI: 0000000040000038 RDI: 0000000000000002
[ 214.115520] RBP: 00007ffe8e7ae8c0 R08: 0000000000000064 R09: 0000000000000000
[ 214.122652] R10: 00007f71f2802170 R11: 0000000000000202 R12: 0000000000000000
[ 214.129810] R13: 00007ffe8e7aef18 R14: 00007f71f2a21000 R15: 0000556be3254cf8
[ 214.136937] </TASK>
[ 214.139127] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 213.850572] WARNING: CPU: 2 PID: 1428 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[ 213.858597] Modules linked in: x86_pkg_temp_thermal
[ 213.863489] CPU: 2 UID: 0 PID: 1428 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 213.870950] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 213.879415] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[ 213.884598] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 213.904688] RSP: 0018:ffffaca341963db8 EFLAGS: 00010246
[ 213.909978] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 213.918424] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffff83069fe8
[ 213.925646] RBP: ffffaca341963dd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 213.934066] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[ 213.941267] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[ 213.949709] FS: 00007f71f27ed740(0000) GS:ffff9e0cdfd00000(0000) knlGS:0000000000000000
[ 213.957863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 213.964920] CR2: 00007f71f2991680 CR3: 000000010f0b0001 CR4: 00000000003706f0
[ 213.972120] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 213.980574] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 213.987751] Call Trace:
[ 213.990494] <TASK>
[ 213.992591] ? show_regs+0x5d/0x70
[ 213.995998] ? __warn+0xcf/0x1d0
[ 213.999257] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 214.003791] ? report_bug+0x14c/0x1f0
[ 214.007454] ? handle_bug+0x67/0x90
[ 214.010973] ? exc_invalid_op+0x1f/0x50
[ 214.014815] ? asm_exc_invalid_op+0x1f/0x30
[ 214.019027] ? __kvmalloc_node_noprof+0x48/0xf0
[ 214.023559] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 214.028090] ? __kvmalloc_node_noprof+0x48/0xf0
[ 214.032615] alloc_fdtable+0x7b/0x120
[ 214.036280] expand_files+0x118/0x310
[ 214.039973] ? do_prlimit+0x11d/0x160
[ 214.043640] ? __se_sys_prlimit64+0x1ea/0x2a0
[ 214.047999] ksys_dup3+0x71/0xd0
[ 214.051229] __x64_sys_dup2+0x1e/0x80
[ 214.054896] x64_sys_call+0x8cf/0x2f50
[ 214.058651] do_syscall_64+0xd0/0x1a0
[ 214.062381] ? exc_page_fault+0x68/0xc0
[ 214.066215] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 214.071269] RIP: 0033:0x7f71f28e5c17
[ 214.074846] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 214.093618] RSP: 002b:00007ffe8e7ae6a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 214.101184] RAX: ffffffffffffffda RBX: 00007ffe8e7aef08 RCX: 00007f71f28e5c17
[ 214.108334] RDX: 00007ffe8e7ae828 RSI: 0000000040000038 RDI: 0000000000000002
[ 214.115520] RBP: 00007ffe8e7ae8c0 R08: 0000000000000064 R09: 0000000000000000
[ 214.122652] R10: 00007f71f2802170 R11: 0000000000000202 R12: 0000000000000000
[ 214.129810] R13: 00007ffe8e7aef18 R14: 00007f71f2a21000 R15: 0000556be3254cf8
[ 214.136937] </TASK>
[ 214.139127] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 206.006290] WARNING: CPU: 0 PID: 1446 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[ 206.015684] Modules linked in: x86_pkg_temp_thermal
[ 206.020567] CPU: 0 UID: 0 PID: 1446 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 206.027961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 206.035353] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[ 206.040491] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[ 206.059237] RSP: 0018:ffffab0c01a5fdd8 EFLAGS: 00010246
[ 206.064464] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 206.071597] RDX: 0000000000000015 RSI: ffffffff82c373cd RDI: 0000000000452cc0
[ 206.078727] RBP: ffffab0c01a5fdf0 R08: 0000000000000040 R09: 0000000000000000
[ 206.085862] R10: ffffab0c01a5fdd8 R11: 0000000000000000 R12: 0000000200001e00
[ 206.092994] R13: 00000000ffffffff R14: ffffa30980334080 R15: ffffa30980334000
[ 206.100128] FS: 00007f4b456f9740(0000) GS:ffffa30aefa00000(0000) knlGS:0000000000000000
[ 206.108241] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 206.114011] CR2: 00007f4b457769e0 CR3: 000000010e4bc004 CR4: 00000000003726f0
[ 206.121142] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 206.128276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 206.135408] Call Trace:
[ 206.137859] <TASK>
[ 206.139967] ? show_regs+0x68/0x80
[ 206.143399] ? __warn+0x91/0x140
[ 206.146656] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 206.151218] ? report_bug+0x175/0x1a0
[ 206.154910] ? handle_bug+0x5c/0xa0
[ 206.158462] ? exc_invalid_op+0x1c/0x80
[ 206.162327] ? asm_exc_invalid_op+0x1f/0x30
[ 206.166540] ? __kmalloc_node_noprof+0x39d/0x4c0
[ 206.171184] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 206.175743] ? __kvmalloc_node_noprof+0x53/0xe0
[ 206.180336] alloc_fdtable+0x78/0x120
[ 206.184020] expand_files+0x68/0x2e0
[ 206.187624] ? do_prlimit+0x134/0x210
[ 206.191315] ? trace_preempt_off+0x1e/0x70
[ 206.195415] ? ksys_dup3+0x61/0x100
[ 206.198907] ksys_dup3+0x6c/0x100
[ 206.202226] __x64_sys_dup2+0x32/0xc0
[ 206.205945] x64_sys_call+0x2082/0x20b0
[ 206.209810] do_syscall_64+0xb2/0x1d0
[ 206.213476] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 206.218554] RIP: 0033:0x7f4b457f1c17
[ 206.222133] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 206.240907] RSP: 002b:00007ffe34207698 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 206.248497] RAX: ffffffffffffffda RBX: 00007ffe34207ef8 RCX: 00007f4b457f1c17
[ 206.255632] RDX: 00007ffe342076c0 RSI: 0000000040000038 RDI: 0000000000000002
[ 206.262798] RBP: 00007ffe342078c0 R08: 0000000000000064 R09: 0000000000000000
[ 206.269949] R10: 00007f4b4570e170 R11: 0000000000000202 R12: 0000000000000000
[ 206.277081] R13: 00007ffe34207f08 R14: 00007f4b4592d000 R15: 00005606e27d4dd8
[ 206.284213] </TASK>
[ 206.286403] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 206.006290] WARNING: CPU: 0 PID: 1446 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[ 206.015684] Modules linked in: x86_pkg_temp_thermal
[ 206.020567] CPU: 0 UID: 0 PID: 1446 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 206.027961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 206.035353] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[ 206.040491] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[ 206.059237] RSP: 0018:ffffab0c01a5fdd8 EFLAGS: 00010246
[ 206.064464] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 206.071597] RDX: 0000000000000015 RSI: ffffffff82c373cd RDI: 0000000000452cc0
[ 206.078727] RBP: ffffab0c01a5fdf0 R08: 0000000000000040 R09: 0000000000000000
[ 206.085862] R10: ffffab0c01a5fdd8 R11: 0000000000000000 R12: 0000000200001e00
[ 206.092994] R13: 00000000ffffffff R14: ffffa30980334080 R15: ffffa30980334000
[ 206.100128] FS: 00007f4b456f9740(0000) GS:ffffa30aefa00000(0000) knlGS:0000000000000000
[ 206.108241] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 206.114011] CR2: 00007f4b457769e0 CR3: 000000010e4bc004 CR4: 00000000003726f0
[ 206.121142] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 206.128276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 206.135408] Call Trace:
[ 206.137859] <TASK>
[ 206.139967] ? show_regs+0x68/0x80
[ 206.143399] ? __warn+0x91/0x140
[ 206.146656] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 206.151218] ? report_bug+0x175/0x1a0
[ 206.154910] ? handle_bug+0x5c/0xa0
[ 206.158462] ? exc_invalid_op+0x1c/0x80
[ 206.162327] ? asm_exc_invalid_op+0x1f/0x30
[ 206.166540] ? __kmalloc_node_noprof+0x39d/0x4c0
[ 206.171184] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 206.175743] ? __kvmalloc_node_noprof+0x53/0xe0
[ 206.180336] alloc_fdtable+0x78/0x120
[ 206.184020] expand_files+0x68/0x2e0
[ 206.187624] ? do_prlimit+0x134/0x210
[ 206.191315] ? trace_preempt_off+0x1e/0x70
[ 206.195415] ? ksys_dup3+0x61/0x100
[ 206.198907] ksys_dup3+0x6c/0x100
[ 206.202226] __x64_sys_dup2+0x32/0xc0
[ 206.205945] x64_sys_call+0x2082/0x20b0
[ 206.209810] do_syscall_64+0xb2/0x1d0
[ 206.213476] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 206.218554] RIP: 0033:0x7f4b457f1c17
[ 206.222133] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 206.240907] RSP: 002b:00007ffe34207698 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 206.248497] RAX: ffffffffffffffda RBX: 00007ffe34207ef8 RCX: 00007f4b457f1c17
[ 206.255632] RDX: 00007ffe342076c0 RSI: 0000000040000038 RDI: 0000000000000002
[ 206.262798] RBP: 00007ffe342078c0 R08: 0000000000000064 R09: 0000000000000000
[ 206.269949] R10: 00007f4b4570e170 R11: 0000000000000202 R12: 0000000000000000
[ 206.277081] R13: 00007ffe34207f08 R14: 00007f4b4592d000 R15: 00005606e27d4dd8
[ 206.284213] </TASK>
[ 206.286403] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 149.763459] Bad function graph ret_stack pointer: 6
[ 149.763463] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:720 ftrace_return_to_handler+0x1c2/0x1f0
[ 149.777601] Modules linked in: x86_pkg_temp_thermal
[ 149.782526] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 149.791336] Tainted: [W]=WARN
[ 149.794308] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 149.801702] Workqueue: 0x0 (nfsiod)
[ 149.805322] RIP: 0010:ftrace_return_to_handler+0x1c2/0x1f0
[ 149.810810] Code: ff ff eb ab 90 0f 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 <0f> 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 0f 0b 90 49 c7
[ 149.829591] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010282
[ 149.834824] RAX: 0000000000000000 RBX: ffff963280160c00 RCX: ffff9635e7a9ca08
[ 149.841997] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[ 149.849145] RBP: ffff9a7d4044be80 R08: 00000000ffffdfff R09: ffff9a7d4044bca8
[ 149.856319] R10: 0000000000000001 R11: ffffffff8527bdc0 R12: ffff963281939140
[ 149.863461] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[ 149.870635] FS: 0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[ 149.878730] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 149.884509] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[ 149.891642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 149.898810] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 149.905976] Call Trace:
[ 149.908431] <TASK>
[ 149.910571] ? show_regs+0x68/0x80
[ 149.914019] ? __warn+0x91/0x140
[ 149.917262] ? ftrace_return_to_handler+0x1c2/0x1f0
[ 149.922174] ? report_bug+0x175/0x1a0
[ 149.925852] ? handle_bug+0x5c/0xa0
[ 149.929386] ? exc_invalid_op+0x1c/0x80
[ 149.933232] ? asm_exc_invalid_op+0x1f/0x30
[ 149.937456] ? ftrace_return_to_handler+0x1c2/0x1f0
[ 149.942355] return_to_handler+0x1a/0x40
[ 149.946321] ? __pfx_worker_thread+0x10/0x10
[ 149.950600] kthread+0xe8/0x110
[ 149.953780] ? __pfx_kthread+0x10/0x10
[ 149.957544] ret_from_fork+0x3e/0x60
[ 149.961165] ? __pfx_kthread+0x10/0x10
[ 149.964929] ret_from_fork_asm+0x1a/0x30
[ 149.968902] </TASK>
[ 149.971104] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 149.763459] Bad function graph ret_stack pointer: 6
[ 149.763463] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:720 ftrace_return_to_handler+0x1c2/0x1f0
[ 149.777601] Modules linked in: x86_pkg_temp_thermal
[ 149.782526] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 149.791336] Tainted: [W]=WARN
[ 149.794308] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 149.801702] Workqueue: 0x0 (nfsiod)
[ 149.805322] RIP: 0010:ftrace_return_to_handler+0x1c2/0x1f0
[ 149.810810] Code: ff ff eb ab 90 0f 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 <0f> 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 0f 0b 90 49 c7
[ 149.829591] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010282
[ 149.834824] RAX: 0000000000000000 RBX: ffff963280160c00 RCX: ffff9635e7a9ca08
[ 149.841997] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[ 149.849145] RBP: ffff9a7d4044be80 R08: 00000000ffffdfff R09: ffff9a7d4044bca8
[ 149.856319] R10: 0000000000000001 R11: ffffffff8527bdc0 R12: ffff963281939140
[ 149.863461] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[ 149.870635] FS: 0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[ 149.878730] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 149.884509] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[ 149.891642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 149.898810] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 149.905976] Call Trace:
[ 149.908431] <TASK>
[ 149.910571] ? show_regs+0x68/0x80
[ 149.914019] ? __warn+0x91/0x140
[ 149.917262] ? ftrace_return_to_handler+0x1c2/0x1f0
[ 149.922174] ? report_bug+0x175/0x1a0
[ 149.925852] ? handle_bug+0x5c/0xa0
[ 149.929386] ? exc_invalid_op+0x1c/0x80
[ 149.933232] ? asm_exc_invalid_op+0x1f/0x30
[ 149.937456] ? ftrace_return_to_handler+0x1c2/0x1f0
[ 149.942355] return_to_handler+0x1a/0x40
[ 149.946321] ? __pfx_worker_thread+0x10/0x10
[ 149.950600] kthread+0xe8/0x110
[ 149.953780] ? __pfx_kthread+0x10/0x10
[ 149.957544] ret_from_fork+0x3e/0x60
[ 149.961165] ? __pfx_kthread+0x10/0x10
[ 149.964929] ret_from_fork_asm+0x1a/0x30
[ 149.968902] </TASK>
[ 149.971104] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 150.201010] Please remove unsupported %( in format string
[ 150.206416] WARNING: CPU: 0 PID: 86 at lib/vsprintf.c:2704 format_decode+0x47d/0x5c0
[ 150.214161] Modules linked in: x86_pkg_temp_thermal
[ 150.219039] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 150.227821] Tainted: [W]=WARN
[ 150.230792] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 150.238185] Workqueue: 0x0 (nfsiod)
[ 150.241765] RIP: 0010:format_decode+0x47d/0x5c0
[ 150.246296] Code: ff 41 c6 44 24 05 08 ba 12 00 00 00 e9 6e fc ff ff 48 89 45 e0 c6 05 3d 96 f8 00 01 90 48 c7 c7 70 b1 ef 84 e8 54 76 e8 fe 90 <0f> 0b 90 90 48 8b 45 e0 e9 7c ff ff ff 48 8d 7d e8 e8 bd f0 ff ff
[ 150.265040] RSP: 0018:ffff9a7d4044bd88 EFLAGS: 00010082
[ 150.270268] RAX: 0000000000000000 RBX: ffffffff833d73c5 RCX: ffff9635e7a1ca08
[ 150.277400] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[ 150.284533] RBP: ffff9a7d4044bda8 R08: 0000000000000433 R09: 0000000000000433
[ 150.291664] R10: 0000000000000002 R11: ffffffff8527bdc0 R12: ffff9a7d4044bdd0
[ 150.298788] R13: ffffffff8597c060 R14: ffffffff8597bca5 R15: ffffffff833d73c5
[ 150.305913] FS: 0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[ 150.314005] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 150.319744] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[ 150.326878] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 150.334009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 150.341142] Call Trace:
[ 150.343593] <TASK>
[ 150.345694] ? show_regs+0x68/0x80
[ 150.349099] ? __warn+0x91/0x140
[ 150.352331] ? format_decode+0x47d/0x5c0
[ 150.356257] ? report_bug+0x175/0x1a0
[ 150.359922] ? preempt_count_sub+0x9/0x80
[ 150.363937] ? handle_bug+0x5c/0xa0
[ 150.367453] ? exc_invalid_op+0x1c/0x80
[ 150.371294] ? asm_exc_invalid_op+0x1f/0x30
[ 150.375479] ? panic+0x45/0x3b0
[ 150.378624] ? panic+0x45/0x3b0
[ 150.381774] ? format_decode+0x47d/0x5c0
[ 150.385697] ? format_decode+0x47c/0x5c0
[ 150.389623] ? panic+0x46/0x3b0
[ 150.392768] ? panic+0x46/0x3b0
[ 150.395914] ? panic+0x45/0x3b0
[ 150.399059] vsnprintf+0x72/0x580
[ 150.402380] ? __pfx_panic+0x10/0x10
[ 150.405972] vscnprintf+0x16/0x40
[ 150.409312] panic+0xe8/0x3b0
[ 150.412287] ? panic+0x9/0x3b0
[ 150.415343] ? cpus_read_unlock+0x35/0x70
[ 150.419360] ? __pfx_worker_thread+0x10/0x10
[ 150.423630] ? kthread+0xe8/0x110
[ 150.426972] ? __pfx_kthread+0x10/0x10
[ 150.430754] ? ret_from_fork+0x3e/0x60
[ 150.434507] ? __pfx_kthread+0x10/0x10
[ 150.438260] ? ret_from_fork_asm+0x1a/0x30
[ 150.442361] </TASK>
[ 150.444552] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 150.201010] Please remove unsupported %( in format string
[ 150.206416] WARNING: CPU: 0 PID: 86 at lib/vsprintf.c:2704 format_decode+0x47d/0x5c0
[ 150.214161] Modules linked in: x86_pkg_temp_thermal
[ 150.219039] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 150.227821] Tainted: [W]=WARN
[ 150.230792] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 150.238185] Workqueue: 0x0 (nfsiod)
[ 150.241765] RIP: 0010:format_decode+0x47d/0x5c0
[ 150.246296] Code: ff 41 c6 44 24 05 08 ba 12 00 00 00 e9 6e fc ff ff 48 89 45 e0 c6 05 3d 96 f8 00 01 90 48 c7 c7 70 b1 ef 84 e8 54 76 e8 fe 90 <0f> 0b 90 90 48 8b 45 e0 e9 7c ff ff ff 48 8d 7d e8 e8 bd f0 ff ff
[ 150.265040] RSP: 0018:ffff9a7d4044bd88 EFLAGS: 00010082
[ 150.270268] RAX: 0000000000000000 RBX: ffffffff833d73c5 RCX: ffff9635e7a1ca08
[ 150.277400] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[ 150.284533] RBP: ffff9a7d4044bda8 R08: 0000000000000433 R09: 0000000000000433
[ 150.291664] R10: 0000000000000002 R11: ffffffff8527bdc0 R12: ffff9a7d4044bdd0
[ 150.298788] R13: ffffffff8597c060 R14: ffffffff8597bca5 R15: ffffffff833d73c5
[ 150.305913] FS: 0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[ 150.314005] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 150.319744] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[ 150.326878] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 150.334009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 150.341142] Call Trace:
[ 150.343593] <TASK>
[ 150.345694] ? show_regs+0x68/0x80
[ 150.349099] ? __warn+0x91/0x140
[ 150.352331] ? format_decode+0x47d/0x5c0
[ 150.356257] ? report_bug+0x175/0x1a0
[ 150.359922] ? preempt_count_sub+0x9/0x80
[ 150.363937] ? handle_bug+0x5c/0xa0
[ 150.367453] ? exc_invalid_op+0x1c/0x80
[ 150.371294] ? asm_exc_invalid_op+0x1f/0x30
[ 150.375479] ? panic+0x45/0x3b0
[ 150.378624] ? panic+0x45/0x3b0
[ 150.381774] ? format_decode+0x47d/0x5c0
[ 150.385697] ? format_decode+0x47c/0x5c0
[ 150.389623] ? panic+0x46/0x3b0
[ 150.392768] ? panic+0x46/0x3b0
[ 150.395914] ? panic+0x45/0x3b0
[ 150.399059] vsnprintf+0x72/0x580
[ 150.402380] ? __pfx_panic+0x10/0x10
[ 150.405972] vscnprintf+0x16/0x40
[ 150.409312] panic+0xe8/0x3b0
[ 150.412287] ? panic+0x9/0x3b0
[ 150.415343] ? cpus_read_unlock+0x35/0x70
[ 150.419360] ? __pfx_worker_thread+0x10/0x10
[ 150.423630] ? kthread+0xe8/0x110
[ 150.426972] ? __pfx_kthread+0x10/0x10
[ 150.430754] ? ret_from_fork+0x3e/0x60
[ 150.434507] ? __pfx_kthread+0x10/0x10
[ 150.438260] ? ret_from_fork_asm+0x1a/0x30
[ 150.442361] </TASK>
[ 150.444552] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 148.849710] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 fgraph_retrieve_parent_data+0xb3/0x110
[ 148.859127] Modules linked in: x86_pkg_temp_thermal
[ 148.864070] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[ 148.871411] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 148.878842] Workqueue: 0x0 (nfsiod)
[ 148.882487] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[ 148.888179] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[ 148.906986] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[ 148.912272] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[ 148.919441] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[ 148.926605] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[ 148.933767] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[ 148.940934] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[ 148.948144] FS: 0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[ 148.956254] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 148.963379] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[ 148.971904] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 148.980445] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 148.988198] Call Trace:
[ 148.990679] <TASK>
[ 148.992822] ? ftrace_stub_direct_tramp+0x20/0x20
[ 148.997559] ? show_regs+0x68/0x80
[ 149.001018] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.005757] ? __warn+0x91/0x140
[ 149.009030] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.014135] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.018877] ? report_bug+0x175/0x1a0
[ 149.022593] ? handle_bug+0x5c/0xa0
[ 149.026132] ? exc_invalid_op+0x1c/0x80
[ 149.031386] ? asm_exc_invalid_op+0x1f/0x30
[ 149.037025] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.043445] profile_graph_return+0x188/0x1d0
[ 149.049200] ? schedule+0x38/0x110
[ 149.054028] ftrace_return_to_handler+0x172/0x1f0
[ 149.058775] ? preempt_count_sub+0x4/0x80
[ 149.064202] return_to_handler+0x1a/0x40
[ 149.069517] ------------[ cut here ]------------
[ 149.074164] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 ftrace_graph_ret_addr+0x93/0xa0
[ 149.084319] Modules linked in: x86_pkg_temp_thermal
[ 149.090623] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[ 149.099341] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 149.108136] Workqueue: 0x0 (nfsiod)
[ 149.113110] RIP: 0010:ftrace_graph_ret_addr+0x93/0xa0
[ 149.119556] Code: 48 63 d0 48 8d 14 d1 48 85 d2 74 15 48 39 72 10 75 d2 48 81 3a c0 e2 32 83 74 c9 41 89 00 4c 8b 0a 4c 89 c8 c3 cc cc cc cc 90 <0f> 0b 90 4c 89 c8 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90
[ 149.138344] RSP: 0018:ffff9a7d4044bac0 EFLAGS: 00010097
[ 149.144970] RAX: 0000000000000005 RBX: ffff9a7d4044be98 RCX: ffff963293d81000
[ 149.152152] RDX: 0000000000000206 RSI: ffff9a7d4044bea0 RDI: ffff963281939140
[ 149.160660] RBP: ffff9a7d4044bb00 R08: ffff9a7d4044bbb0 R09: ffffffff8332e2c0
[ 149.167836] R10: 0000000000000036 R11: ffff963293d810f0 R12: ffff9a7d4044bea8
[ 149.176349] R13: ffff9a7d4044be98 R14: ffff9a7d4044bb80 R15: ffff9a7d4044bea0
[ 149.183506] FS: 0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[ 149.192977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 149.198796] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[ 149.207331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 149.215859] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 149.224390] Call Trace:
[ 149.228247] <TASK>
[ 149.231757] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.237853] ? show_regs+0x68/0x80
[ 149.242659] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.248756] ? __warn+0x91/0x140
[ 149.252029] ? ftrace_graph_ret_addr+0x93/0xa0
[ 149.257860] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.262607] ? report_bug+0x175/0x1a0
[ 149.267673] ? handle_bug+0x5c/0xa0
[ 149.271426] ? exc_invalid_op+0x1c/0x80
[ 149.275309] ? asm_exc_invalid_op+0x1f/0x30
[ 149.279556] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.284317] ? ftrace_graph_ret_addr+0x93/0xa0
[ 149.288797] ? update_stack_state+0x10e/0x190
[ 149.293202] ? return_to_handler+0x1a/0x40
[ 149.297349] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.302089] unwind_next_frame+0x82/0x1e0
[ 149.306148] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.310886] show_trace_log_lvl+0x25b/0x400
[ 149.315125] ? report_bug+0x175/0x1a0
[ 149.318870] ? return_to_handler+0x1a/0x40
[ 149.323031] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.328127] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.332865] show_regs+0x68/0x80
[ 149.336140] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.340879] __warn+0x91/0x140
[ 149.343991] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.349096] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.353836] report_bug+0x175/0x1a0
[ 149.357390] handle_bug+0x5c/0xa0
[ 149.360743] exc_invalid_op+0x1c/0x80
[ 149.364471] asm_exc_invalid_op+0x1f/0x30
[ 149.368519] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[ 149.374214] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[ 149.393032] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[ 149.398306] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[ 149.405472] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[ 149.412639] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[ 149.419807] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[ 149.426994] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[ 149.434228] profile_graph_return+0x188/0x1d0
[ 149.438635] ? schedule+0x38/0x110
[ 149.442088] ftrace_return_to_handler+0x172/0x1f0
[ 149.446831] ? preempt_count_sub+0x4/0x80
[ 149.450899] return_to_handler+0x1a/0x40
[ 149.454881] ftrace_stub_direct_tramp+0x20/0x20
[ 149.459461] ? __pfx_worker_thread+0x10/0x10
[ 149.463778] kthread+0xe8/0x110
[ 149.466992] ? __pfx_kthread+0x10/0x10
[ 149.470804] ret_from_fork+0x3e/0x60
[ 149.474413] ? __pfx_kthread+0x10/0x10
[ 149.478210] ret_from_fork_asm+0x1a/0x30
[ 149.482227] </TASK>
[ 149.484449] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 148.849710] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 fgraph_retrieve_parent_data+0xb3/0x110
[ 148.859127] Modules linked in: x86_pkg_temp_thermal
[ 148.864070] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[ 148.871411] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 148.878842] Workqueue: 0x0 (nfsiod)
[ 148.882487] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[ 148.888179] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[ 148.906986] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[ 148.912272] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[ 148.919441] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[ 148.926605] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[ 148.933767] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[ 148.940934] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[ 148.948144] FS: 0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[ 148.956254] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 148.963379] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[ 148.971904] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 148.980445] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 148.988198] Call Trace:
[ 148.990679] <TASK>
[ 148.992822] ? ftrace_stub_direct_tramp+0x20/0x20
[ 148.997559] ? show_regs+0x68/0x80
[ 149.001018] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.005757] ? __warn+0x91/0x140
[ 149.009030] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.014135] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.018877] ? report_bug+0x175/0x1a0
[ 149.022593] ? handle_bug+0x5c/0xa0
[ 149.026132] ? exc_invalid_op+0x1c/0x80
[ 149.031386] ? asm_exc_invalid_op+0x1f/0x30
[ 149.037025] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.043445] profile_graph_return+0x188/0x1d0
[ 149.049200] ? schedule+0x38/0x110
[ 149.054028] ftrace_return_to_handler+0x172/0x1f0
[ 149.058775] ? preempt_count_sub+0x4/0x80
[ 149.064202] return_to_handler+0x1a/0x40
[ 149.069517] ------------[ cut here ]------------
[ 149.074164] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 ftrace_graph_ret_addr+0x93/0xa0
[ 149.084319] Modules linked in: x86_pkg_temp_thermal
[ 149.090623] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[ 149.099341] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 149.108136] Workqueue: 0x0 (nfsiod)
[ 149.113110] RIP: 0010:ftrace_graph_ret_addr+0x93/0xa0
[ 149.119556] Code: 48 63 d0 48 8d 14 d1 48 85 d2 74 15 48 39 72 10 75 d2 48 81 3a c0 e2 32 83 74 c9 41 89 00 4c 8b 0a 4c 89 c8 c3 cc cc cc cc 90 <0f> 0b 90 4c 89 c8 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90
[ 149.138344] RSP: 0018:ffff9a7d4044bac0 EFLAGS: 00010097
[ 149.144970] RAX: 0000000000000005 RBX: ffff9a7d4044be98 RCX: ffff963293d81000
[ 149.152152] RDX: 0000000000000206 RSI: ffff9a7d4044bea0 RDI: ffff963281939140
[ 149.160660] RBP: ffff9a7d4044bb00 R08: ffff9a7d4044bbb0 R09: ffffffff8332e2c0
[ 149.167836] R10: 0000000000000036 R11: ffff963293d810f0 R12: ffff9a7d4044bea8
[ 149.176349] R13: ffff9a7d4044be98 R14: ffff9a7d4044bb80 R15: ffff9a7d4044bea0
[ 149.183506] FS: 0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[ 149.192977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 149.198796] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[ 149.207331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 149.215859] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 149.224390] Call Trace:
[ 149.228247] <TASK>
[ 149.231757] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.237853] ? show_regs+0x68/0x80
[ 149.242659] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.248756] ? __warn+0x91/0x140
[ 149.252029] ? ftrace_graph_ret_addr+0x93/0xa0
[ 149.257860] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.262607] ? report_bug+0x175/0x1a0
[ 149.267673] ? handle_bug+0x5c/0xa0
[ 149.271426] ? exc_invalid_op+0x1c/0x80
[ 149.275309] ? asm_exc_invalid_op+0x1f/0x30
[ 149.279556] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.284317] ? ftrace_graph_ret_addr+0x93/0xa0
[ 149.288797] ? update_stack_state+0x10e/0x190
[ 149.293202] ? return_to_handler+0x1a/0x40
[ 149.297349] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.302089] unwind_next_frame+0x82/0x1e0
[ 149.306148] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.310886] show_trace_log_lvl+0x25b/0x400
[ 149.315125] ? report_bug+0x175/0x1a0
[ 149.318870] ? return_to_handler+0x1a/0x40
[ 149.323031] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.328127] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.332865] show_regs+0x68/0x80
[ 149.336140] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.340879] __warn+0x91/0x140
[ 149.343991] ? fgraph_retrieve_parent_data+0xb3/0x110
[ 149.349096] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.353836] report_bug+0x175/0x1a0
[ 149.357390] handle_bug+0x5c/0xa0
[ 149.360743] exc_invalid_op+0x1c/0x80
[ 149.364471] asm_exc_invalid_op+0x1f/0x30
[ 149.368519] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[ 149.374214] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[ 149.393032] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[ 149.398306] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[ 149.405472] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[ 149.412639] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[ 149.419807] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[ 149.426994] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[ 149.434228] profile_graph_return+0x188/0x1d0
[ 149.438635] ? schedule+0x38/0x110
[ 149.442088] ftrace_return_to_handler+0x172/0x1f0
[ 149.446831] ? preempt_count_sub+0x4/0x80
[ 149.450899] return_to_handler+0x1a/0x40
[ 149.454881] ftrace_stub_direct_tramp+0x20/0x20
[ 149.459461] ? __pfx_worker_thread+0x10/0x10
[ 149.463778] kthread+0xe8/0x110
[ 149.466992] ? __pfx_kthread+0x10/0x10
[ 149.470804] ret_from_fork+0x3e/0x60
[ 149.474413] ? __pfx_kthread+0x10/0x10
[ 149.478210] ret_from_fork_asm+0x1a/0x30
[ 149.482227] </TASK>
[ 149.484449] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 149.980450] WARNING: CPU: 0 PID: 86 at kernel/trace/fgraph.c:816 ftrace_return_to_handler+0x1d3/0x1f0
[ 149.989685] Modules linked in: x86_pkg_temp_thermal
[ 149.994610] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 150.003409] Tainted: [W]=WARN
[ 150.006423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 150.013825] Workqueue: 0x0 (nfsiod)
[ 150.017448] RIP: 0010:ftrace_return_to_handler+0x1d3/0x1f0
[ 150.022978] Code: 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 0f 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 <0f> 0b 90 49 c7 c5 80 73 3d 83 e9 27 ff ff ff e8 19 2c 01 01 66 0f
[ 150.041769] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010286
[ 150.047038] RAX: 0000000080000000 RBX: ffff963280160c00 RCX: 0000000000000000
[ 150.054214] RDX: ffff9635e7a00000 RSI: ffffffff833d8ef5 RDI: ffffffff833d8ef5
[ 150.061386] RBP: ffff9a7d4044be80 R08: 0000000000000000 R09: 0000000000000001
[ 150.068563] R10: 0000000000000018 R11: 0000000000000000 R12: ffff963281939140
[ 150.075717] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[ 150.082890] FS: 0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[ 150.091019] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 150.096806] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[ 150.103996] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 150.111141] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 150.118318] Call Trace:
[ 150.120804] <TASK>
[ 150.122946] ? show_regs+0x68/0x80
[ 150.126396] ? __warn+0x91/0x140
[ 150.129671] ? ftrace_return_to_handler+0x1d3/0x1f0
[ 150.134568] ? report_bug+0x175/0x1a0
[ 150.138277] ? handle_bug+0x5c/0xa0
[ 150.141788] ? exc_invalid_op+0x1c/0x80
[ 150.145671] ? asm_exc_invalid_op+0x1f/0x30
[ 150.149877] ? cpus_read_unlock+0x35/0x70
[ 150.153930] ? cpus_read_unlock+0x35/0x70
[ 150.157996] ? ftrace_return_to_handler+0x1d3/0x1f0
[ 150.162919] return_to_handler+0x1a/0x40
[ 150.166861] ? __pfx_worker_thread+0x10/0x10
[ 150.171172] kthread+0xe8/0x110
[ 150.174339] ? __pfx_kthread+0x10/0x10
[ 150.178136] ret_from_fork+0x3e/0x60
[ 150.181729] ? __pfx_kthread+0x10/0x10
[ 150.185528] ret_from_fork_asm+0x1a/0x30
[ 150.189475] </TASK>
[ 150.191701] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 149.528357] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:442 ftrace_return_to_handler+0x19d/0x1f0
[ 149.537669] Modules linked in: x86_pkg_temp_thermal
[ 149.542682] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 149.551573] Tainted: [W]=WARN
[ 149.554645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 149.562148] Workqueue: 0x0 (nfsiod)
[ 149.565858] RIP: 0010:ftrace_return_to_handler+0x19d/0x1f0
[ 149.571444] Code: 1f 00 41 83 c6 01 49 63 c6 48 83 f8 3f 0f 87 72 ff ff ff 48 83 c8 ff 44 89 f1 48 d3 e0 48 23 45 b0 0f 84 5e ff ff ff eb ab 90 <0f> 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b
[ 149.590338] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010297
[ 149.595675] RAX: 0000000000000005 RBX: ffff963280160c00 RCX: ffff963293d81000
[ 149.602951] RDX: 0000000000000206 RSI: ffffffff8354f862 RDI: ffff9a7d4044be90
[ 149.610165] RBP: ffff9a7d4044be80 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[ 149.617381] R10: ffff963281939140 R11: 0000000000000206 R12: ffff963281939140
[ 149.624593] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[ 149.631832] FS: 0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[ 149.640016] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 149.645874] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[ 149.653091] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 149.660327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 149.667561] Call Trace:
[ 149.670120] <TASK>
[ 149.672332] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.677153] ? show_regs+0x68/0x80
[ 149.680676] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.685520] ? __warn+0x91/0x140
[ 149.688867] ? ftrace_return_to_handler+0x19d/0x1f0
[ 149.693833] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.698626] ? report_bug+0x175/0x1a0
[ 149.702430] ? handle_bug+0x5c/0xa0
[ 149.706028] ? exc_invalid_op+0x1c/0x80
[ 149.709994] ? asm_exc_invalid_op+0x1f/0x30
[ 149.714350] ? ftrace_return_to_handler+0x172/0x1f0
[ 149.719337] ? ftrace_return_to_handler+0x19d/0x1f0
[ 149.724381] return_to_handler+0x1a/0x40
[ 149.728398] ? __pfx_worker_thread+0x10/0x10
[ 149.732767] kthread+0xe8/0x110
[ 149.736119] ? __pfx_kthread+0x10/0x10
[ 149.739991] ret_from_fork+0x3e/0x60
[ 149.743674] ? __pfx_kthread+0x10/0x10
[ 149.747548] ret_from_fork_asm+0x1a/0x30
[ 149.751692] </TASK>
[ 149.753981] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 149.528357] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:442 ftrace_return_to_handler+0x19d/0x1f0
[ 149.537669] Modules linked in: x86_pkg_temp_thermal
[ 149.542682] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 149.551573] Tainted: [W]=WARN
[ 149.554645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 149.562148] Workqueue: 0x0 (nfsiod)
[ 149.565858] RIP: 0010:ftrace_return_to_handler+0x19d/0x1f0
[ 149.571444] Code: 1f 00 41 83 c6 01 49 63 c6 48 83 f8 3f 0f 87 72 ff ff ff 48 83 c8 ff 44 89 f1 48 d3 e0 48 23 45 b0 0f 84 5e ff ff ff eb ab 90 <0f> 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b
[ 149.590338] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010297
[ 149.595675] RAX: 0000000000000005 RBX: ffff963280160c00 RCX: ffff963293d81000
[ 149.602951] RDX: 0000000000000206 RSI: ffffffff8354f862 RDI: ffff9a7d4044be90
[ 149.610165] RBP: ffff9a7d4044be80 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[ 149.617381] R10: ffff963281939140 R11: 0000000000000206 R12: ffff963281939140
[ 149.624593] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[ 149.631832] FS: 0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[ 149.640016] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 149.645874] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[ 149.653091] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 149.660327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 149.667561] Call Trace:
[ 149.670120] <TASK>
[ 149.672332] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.677153] ? show_regs+0x68/0x80
[ 149.680676] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.685520] ? __warn+0x91/0x140
[ 149.688867] ? ftrace_return_to_handler+0x19d/0x1f0
[ 149.693833] ? ftrace_stub_direct_tramp+0x20/0x20
[ 149.698626] ? report_bug+0x175/0x1a0
[ 149.702430] ? handle_bug+0x5c/0xa0
[ 149.706028] ? exc_invalid_op+0x1c/0x80
[ 149.709994] ? asm_exc_invalid_op+0x1f/0x30
[ 149.714350] ? ftrace_return_to_handler+0x172/0x1f0
[ 149.719337] ? ftrace_return_to_handler+0x19d/0x1f0
[ 149.724381] return_to_handler+0x1a/0x40
[ 149.728398] ? __pfx_worker_thread+0x10/0x10
[ 149.732767] kthread+0xe8/0x110
[ 149.736119] ? __pfx_kthread+0x10/0x10
[ 149.739991] ret_from_fork+0x3e/0x60
[ 149.743674] ? __pfx_kthread+0x10/0x10
[ 149.747548] ret_from_fork_asm+0x1a/0x30
[ 149.751692] </TASK>
[ 149.753981] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 149.980450] WARNING: CPU: 0 PID: 86 at kernel/trace/fgraph.c:816 ftrace_return_to_handler+0x1d3/0x1f0
[ 149.989685] Modules linked in: x86_pkg_temp_thermal
[ 149.994610] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 150.003409] Tainted: [W]=WARN
[ 150.006423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 150.013825] Workqueue: 0x0 (nfsiod)
[ 150.017448] RIP: 0010:ftrace_return_to_handler+0x1d3/0x1f0
[ 150.022978] Code: 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 0f 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 <0f> 0b 90 49 c7 c5 80 73 3d 83 e9 27 ff ff ff e8 19 2c 01 01 66 0f
[ 150.041769] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010286
[ 150.047038] RAX: 0000000080000000 RBX: ffff963280160c00 RCX: 0000000000000000
[ 150.054214] RDX: ffff9635e7a00000 RSI: ffffffff833d8ef5 RDI: ffffffff833d8ef5
[ 150.061386] RBP: ffff9a7d4044be80 R08: 0000000000000000 R09: 0000000000000001
[ 150.068563] R10: 0000000000000018 R11: 0000000000000000 R12: ffff963281939140
[ 150.075717] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[ 150.082890] FS: 0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[ 150.091019] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 150.096806] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[ 150.103996] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 150.111141] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 150.118318] Call Trace:
[ 150.120804] <TASK>
[ 150.122946] ? show_regs+0x68/0x80
[ 150.126396] ? __warn+0x91/0x140
[ 150.129671] ? ftrace_return_to_handler+0x1d3/0x1f0
[ 150.134568] ? report_bug+0x175/0x1a0
[ 150.138277] ? handle_bug+0x5c/0xa0
[ 150.141788] ? exc_invalid_op+0x1c/0x80
[ 150.145671] ? asm_exc_invalid_op+0x1f/0x30
[ 150.149877] ? cpus_read_unlock+0x35/0x70
[ 150.153930] ? cpus_read_unlock+0x35/0x70
[ 150.157996] ? ftrace_return_to_handler+0x1d3/0x1f0
[ 150.162919] return_to_handler+0x1a/0x40
[ 150.166861] ? __pfx_worker_thread+0x10/0x10
[ 150.171172] kthread+0xe8/0x110
[ 150.174339] ? __pfx_kthread+0x10/0x10
[ 150.178136] ret_from_fork+0x3e/0x60
[ 150.181729] ? __pfx_kthread+0x10/0x10
[ 150.185528] ret_from_fork_asm+0x1a/0x30
[ 150.189475] </TASK>
[ 150.191701] ---[ end trace 0000000000000000 ]---
Home
[ 150.449170] Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZH�L$8�
�DH�t$(H�T$0L�D$@L�L$HeH�
[ 150.459077] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 150.467856] Tainted: [W]=WARN
[ 150.470826] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 150.478210] Workqueue: 0x0 (nfsiod)
[ 150.481790] Call Trace:
[ 150.484233] <TASK>
[ 150.486331] dump_stack_lvl+0x29/0xb0
[ 150.490012] dump_stack+0x14/0x20
[ 150.493334] panic+0x349/0x3b0
[ 150.496395] ? panic+0x9/0x3b0
[ 150.499454] ? cpus_read_unlock+0x35/0x70
[ 150.503469] ? __pfx_worker_thread+0x10/0x10
[ 150.507746] ? kthread+0xe8/0x110
[ 150.511066] ? __pfx_kthread+0x10/0x10
[ 150.514820] ? ret_from_fork+0x3e/0x60
[ 150.518571] ? __pfx_kthread+0x10/0x10
[ 150.522325] ? ret_from_fork_asm+0x1a/0x30
[ 150.526427] </TASK>
[ 150.528657] Kernel Offset: 0x2200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 150.539355] ---[ end Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZH�L$8�
�DH�t$(H�T$0L�D$@L�L$HeH� ]---
Home
[ 150.449170] Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZH�L$8�
�DH�t$(H�T$0L�D$@L�L$HeH�
[ 150.459077] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G W 6.13.0-rc7 #1
[ 150.467856] Tainted: [W]=WARN
[ 150.470826] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 150.478210] Workqueue: 0x0 (nfsiod)
[ 150.481790] Call Trace:
[ 150.484233] <TASK>
[ 150.486331] dump_stack_lvl+0x29/0xb0
[ 150.490012] dump_stack+0x14/0x20
[ 150.493334] panic+0x349/0x3b0
[ 150.496395] ? panic+0x9/0x3b0
[ 150.499454] ? cpus_read_unlock+0x35/0x70
[ 150.503469] ? __pfx_worker_thread+0x10/0x10
[ 150.507746] ? kthread+0xe8/0x110
[ 150.511066] ? __pfx_kthread+0x10/0x10
[ 150.514820] ? ret_from_fork+0x3e/0x60
[ 150.518571] ? __pfx_kthread+0x10/0x10
[ 150.522325] ? ret_from_fork_asm+0x1a/0x30
[ 150.526427] </TASK>
[ 150.528657] Kernel Offset: 0x2200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 150.539355] ---[ end Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZH�L$8�
�DH�t$(H�T$0L�D$@L�L$HeH� ]---